>On the contrary: it_will_  make it impossible for people to know what 
> _we_  are doing. This is not one system I'm talking about: it's 
> countless independent VPNs. No one person in the world will ever know 
> what_we_  are doing.

'countless independent VPNs' + 'a one-time pre-shared key' = big trouble

My advice - Torproject.org
Currently the best math/crypto based solution to provide private service 
hosting and anonymous browsing. Open source, peer reviewed, thoroughly abused 
by smart people and so on. Tor also solves the very real metadata problem this 
paper does not even address. 

Any code that makes it into the kernel introduces complexity must offset its 
long term cost with usefulness. I don't think this repackaged port knocking 
mess passes that test.

J

-----Original Message-----
From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf Of 
Giancarlo Razzolini
Sent: Monday, October 20, 2014 7:34 AM
To: Ian Grant
Cc: Bret Lambert; OpenBSD general usage list
Subject: Re: Shadow TCP stacks

On 19-10-2014 21:01, Ian Grant wrote:
> On the contrary: it_will_  make it impossible for people to know what 
> _we_  are doing. This is not one system I'm talking about: it's 
> countless independent VPNs. No one person in the world will ever know 
> what_we_  are doing.
Except perhaps for the nations with mass surveillance capabilities.
>
> It's not security by obscurity, it's a one-time pre-shared key.
Well, the need for a PSK doesn't change the fact that you're trying to conceal 
something, but not making it inherently more secure.
>
> You think someone can analyse all the HTTP traffic in a country? So 
> what if they could? By the time they've analysed the dumps the service 
> won't be on that host anymore.
In what world do you live? Didn't you followed the news regarding Eduard 
Snowden disclosures? Not only it is possible to analyze all HTTP traffic on any 
given country, but it's also possible to analyze ALL traffic on any given 
country. This is exactly what NSA is doing and perhaps others also. Hell, even 
some companies such as akamai and others can see a great chunk of the internet 
traffic.
>
> The issue I am addressing is not privacy. You would know that if you 
> had read the Foundation paper:
>
>
http://livelogic.blogspot.com/2014/10/the-foundation-parts-iii-iii.html
Yes, you're not addressing *just* privacy. But your original post e-mail 
subject of "shadow TCP stacks" is misleading.
> Well, "they" don't have a choice, because OpenBSD is open source, or 
> haven't you heard?
Even if you did manage to create a nice patch, bug free, with great security 
and all, I don't ever see this getting into the OpenBSD source tree. And, as 
Henning, an OpenBSD developer, putted on a reply to you, you don't get to 
decide what they put into their source code tree. As I said before, focus on 
the proper development of good and strong cryptography, and you'll sure see 
your contributions get into OpenBSD, provided they are in the project's 
interest, of course.

Cheers

[demime 1.01d removed an attachment of type application/pkcs7-signature which 
had a name of smime.p7s]

Reply via email to