{"id":59528,"date":"2013-09-17T15:16:00","date_gmt":"2013-09-17T19:16:00","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2024-05-22T20:00:29","modified_gmt":"2024-05-23T00:00:29","slug":"did-nsa-subvert-ipv6-security","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/did-nsa-subvert-ipv6-security\/","title":{"rendered":"Did NSA Subvert IPv6 Security?"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20150929062114\/http:\/\/bizarrocentral.com:80\/tag\/alice-in-wonderland\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102323\" title=\"Did NSA Subvert IPv6 Security?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wondermatrix.jpg?resize=105%2C100&#038;ssl=1\" alt=\"Did NSA Subvert IPv6 Security?\" width=\"105\" height=\"100\" \/><\/a>Cryptographer and <a title=\"Electronic Frontier Foundation\" href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Electronic Frontier Foundation<\/a> (EFF) board member Bruce Schneier has given advice on how to be as secure as possible. &#8220;<em>Trust the math,<\/em>&#8221; <a href=\"http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-how-to-remain-secure-surveillance\" target=\"_blank\" rel=\"noopener noreferrer\">he says<\/a>. &#8220;<em>Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That&#8217;s how you can remain secure even in the face of the NSA.<\/em>&#8221;<\/p>\n<div id=\"attachment_102325\" style=\"width: 147px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.huffingtonpost.com\/2013\/07\/11\/obama-vietnam-president_n_3579709.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-102325\" class=\"wp-image-102325\" title=\"subverting the implementations of encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BARACK-OBAMA.jpg?resize=137%2C100&#038;ssl=1\" alt=\"subverting the implementations of encryption\" width=\"137\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BARACK-OBAMA.jpg?resize=150%2C110&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BARACK-OBAMA.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BARACK-OBAMA.jpg?w=260&amp;ssl=1 260w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><p id=\"caption-attachment-102325\" class=\"wp-caption-text\">All UR emails R mine<\/p><\/div>\n<p>Mr. Schneier <a title=\"Did the NSA Subvert the Security of IPv6?\" href=\"https:\/\/www.infosecurity-magazine.com\/view\/34405\/did-the-nsa-subvert-the-security-of-ipv6\/\" target=\"_blank\" rel=\"noopener noreferrer\">confirms<\/a> to <a title=\"Inforsecurity\" href=\"http:\/\/www.infosecurity-magazine.com\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Infosecurity<\/em><\/a> that the growing consensus is that <a href=\"http:\/\/www.infosecurity-magazine.com\/view\/34379\/nsa-and-gchq-crack-majority-of-encrypted-traffic\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bullrun<\/a>&#8216;s greatest success is in subverting the implementations of encryption and not in the ability to crack the encryption algorithms themselves. The general belief is that the <strong>NSA<\/strong> has persuaded, <strong>forced or possibly even tricked companies into building weaknesses or backdoors into their products<\/strong> that can be exploited later.<\/p>\n<p><em>I<\/em><em>nfosecurity<\/em> says the bottom line, however, is that the <strong>fabric of the internet can no longer be trusted<\/strong>. Meanwhile, <a href=\"http:\/\/www.mail-archive.com\/cryptography@metzdowd.com\/msg12325.html\" target=\"_blank\" rel=\"noopener noreferrer\">John Gilmore<\/a>, co-founder of EFF and a proponent of free open source software, has raised a tricky question: has <strong>NSA involvement in IPv6 and IPSEC<\/strong> discussions effectively <strong>downgraded its security?<\/strong> IPSEC is the technology that would make IP communications secure.<\/p>\n<p><a title=\"EFF.org\" href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"border: 0px none; margin-left: 2px; margin-right: 2px;\" title=\"EFF.org\" src=\"https:\/\/i0.wp.com\/www.eff.org\/files\/EFF-logo-trans.gif?resize=102%2C69&#038;ssl=1\" alt=\"EFF.org\" width=\"102\" height=\"69\" \/><\/a>Mr. Gilmore told the author that he was involved in trying to make IPSEC &#8220;<em>so usable that it would be used by default throughout the internet<\/em>.&#8221; But &#8220;<em>NSA employees participated throughout, and occupied leadership roles in the committee and among the editors of the documents.<\/em>&#8221;<\/p>\n<p>The result was &#8220;<em>so complex that every real cryptographer who tried to analyze it threw up their hands and said, &#8216;We can&#8217;t even begin to evaluate its security unless you simplify it radically<\/em>&#8216;&#8221; \u2013 something that never happened EFF&#8217;s Gilmore observed.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20130312163020\/http:\/\/amason1100.hubpages.com\/hub\/The-Patriot-Act-and-The-Destruction-of-Rights\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-102328\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patroit_act.jpg?resize=102%2C150&#038;ssl=1\" alt=\"\" width=\"102\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patroit_act.jpg?resize=102%2C150&amp;ssl=1 102w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patroit_act.jpg?resize=51%2C75&amp;ssl=1 51w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patroit_act.jpg?w=520&amp;ssl=1 520w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/a>Mr. Gilmore doesn&#8217;t explicitly say that the <strong>NSA sabotaged IPSEC<\/strong>, but the fact remains that in December 2011, IPSEC in IPv6 was downgraded from &#8216;must include&#8217; to a &#8216;should include.&#8217; He does, however, make very clear his belief in <strong>NSA involvement in other security standards.<\/strong><\/p>\n<p>Discussing <strong>cellphone encryption<\/strong>, the EFF co-founder says &#8220;<em>NSA employees explicitly lied to standards committees<\/em>&#8221; leading to &#8220;<em>encryption designed by a clueless Motorola employee.<\/em>&#8221;<\/p>\n<p>To this day, Mr. Gilmore notes that &#8220;<em>no mobile telephone standards committee has considered or adopted any end-to-end (phone-to-phone) privacy protocols. \u00a0This is because the big companies involved, huge telcos, are all in bed with NSA to make damn sure that working end-to-end encryption never becomes the default on mobile phones.<\/em>&#8221;<\/p>\n<p><strong><em>\u00a0rb-<\/em><\/strong><\/p>\n<p><em>Following the Snowden leaks revealing Bullrun \u2013 the NSA program to crack the world&#8217;s encryption \u2013 the article states that there is an emerging consensus that users can no longer automatically trust any security.<\/em><\/p>\n<p><em>Other <a title=\"Bullrun: The NSA Backdoor Anti-Encryption Bug Program That Breaks Most Encryption on the Internet\" href=\"https:\/\/siliconangle.com\/2013\/09\/06\/bullrun-the-nsa-backdoor-anti-encryption-bug-program-that-breaks-most-encryption-on-the-internet\/\" target=\"_blank\" rel=\"noopener noreferrer\">articles<\/a> say that NSA has compromised SSL so the NSA has access to credit cards and your 4G phones. This is another unnecessary attack on US e-commerce business who is going to buy something online when your account numbers are in the hands of US government hackers.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One way or another the NSA has forced security companies to build IPv6 weaknesses or backdoors into their products to be exploited later<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3044,1917,266,824,822,33,1751,4],"class_list":["post-59528","post","type-post","status-publish","format-standard","hentry","category-security","tag-3044","tag-bruce-schneier","tag-eff","tag-encryption","tag-ipsec","tag-ipv6","tag-nsa","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=59528"}],"version-history":[{"count":7,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59528\/revisions"}],"predecessor-version":[{"id":131269,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59528\/revisions\/131269"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=59528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=59528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=59528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}