TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tcpcrypt

92 pointsby rnicholsonalmost 15 years ago

11 comments

thoraxalmost 15 years ago
I really like when people acknowledge the difference between passive and active attackers. I really, really want there to be more passive protection by default without requiring every computer/node/server to have a trusted certificate.<p>I really would like to see a better handling for this in the case of https as well. I want a way to see a mechanism that a site can offer to provide passive communication protection but where the site does not guarantee its identity, thus meaning it's possible for a MitM attack if you're willing to accept that risk.
评论 #1609708 未加载
评论 #1609683 未加载
tptacekalmost 15 years ago
This is basically useless as-is for things like banking security, because the security of SSL is premised on inherent resistence to "active" (MITM) attackers.
评论 #1609538 未加载
ycwebalmost 15 years ago
A lot of the SSL vs. SSH discussion on here is just demonstrating the fact that there is no one-size-fits-all solution for authentication.<p>The point of tcpcrypt is to get the best security possible under any setting, so it can be used with both SSL- and SSH-like settings. See slide 5 of the talk on the web site:<p><a href="http://tcpcrypt.org/tcpcrypt-slides.pdf" rel="nofollow">http://tcpcrypt.org/tcpcrypt-slides.pdf</a><p>One thing I haven't seen discussed yet is that fact that come October, the EKE patent is going to expire, which means that all of a sudden it's going to be legal to do strong authentication using only human-chosen passwords. Strong password authentication is desperately needed, because people overwhelmingly both chose week passwords and don't think carefully about where they send those passwords.<p>Somewhat independent of tcpcrypt, section 4.3 of the tcpcrypt Usenix paper suggests a nice and simple secure password-authentication protocol. Deploying such a protocol would make a huge difference, except... what are you authenticating? You can prove possession of a password, but this doesn't actually protect you unless the authentication is tied to session traffic, and you are authenticating communication endpoints. SSL, IPSec, and even SSH don't provide adequate hooks for doing this (though SSH would be easier to retrofit than the other two). Tcpcrypt does.<p>So the way to view this is that in the absence of authentication, tcpcrypt will be vulnerable to MITM. But as soon as you go to authenticate yourself to a server (by typing a password or verifying a certificate), the authentication will fail, and the MITM will no longer be able to deceive the user.
yasonalmost 15 years ago
There's not much point in encryption unless you know who you're talking with.
评论 #1613014 未加载
thwartedalmost 15 years ago
Sounds like the ubiquitous opportunistic encryption that was a goal of FreeS/WAN.<p><a href="http://www.freeswan.org/" rel="nofollow">http://www.freeswan.org/</a> <i>2004/03/01</i><p><i>FreeS/WAN is no longer in active development. Although we've created a solid IPsec implentation widely used to construct Virtual Private Networks, the project's major goal, ubiquitous Opportunistic Encryption, is unlikely to be reached given its current level of community support.</i>
评论 #1610163 未加载
X-Istencealmost 15 years ago
I can't find this anywhere, and I looked in the source code as well, what is the license for this?<p>The Linux kernel module is GPL, however there is no license on the rest of the source code. I have no idea if I can use any part of this and port it over to FreeBSD as a kernel module for example.
评论 #1610289 未加载
drdaemanalmost 15 years ago
Why reinvent the wheel when we already have IPsec?
评论 #1609356 未加载
评论 #1609523 未加载
评论 #1609790 未加载
评论 #1615022 未加载
评论 #1609362 未加载
peterwwillisalmost 15 years ago
i really don't like any aspect of this at all. so, my encryption is not guartanteed, i don't know if it's working, it doesn't cover all network traffic, and isn't shipped by default with any operating systems. i'm never going to use this and i'm never going to recommend it to anyone for any purpose. (sorry, i drank a jug of haterade this morning)
评论 #1609577 未加载
评论 #1609833 未加载
sweisalmost 15 years ago
The performance comparison to SSL is not really fair, since tcpcrypt does not offer security against passive attackers.
评论 #1612024 未加载
cafalmost 15 years ago
How serious can they be about ubiquitous encryption, if they can't even be bothered enabling HTTPS on their site?
nik61almost 15 years ago
They don't look very trustworthy to me.