comp.lang.ada
 help / color / mirror / Atom feed
From: Stefan.Lucks@uni-weimar.de
Subject: Re: library/binding for sftp?
Date: Tue, 20 Aug 2013 10:14:47 +0200
Date: 2013-08-20T10:14:47+02:00	[thread overview]
Message-ID: <alpine.DEB.2.10.1308200931020.28419@debian> (raw)
In-Reply-To: <kuu8uc$n86$1@loke.gir.dk>

[-- Attachment #1: Type: TEXT/PLAIN, Size: 3032 bytes --]

On Mon, 19 Aug 2013, Randy Brukardt wrote:

> <Stefan.Lucks@uni-weimar.de> wrote in message
> news:alpine.DEB.2.10.1308191900320.24091@debian...
> On Fri, 9 Aug 2013, Randy Brukardt wrote:
>
>> 1. obscuring is the best method against unfocused surveillance
>> 2. unfocused surveillance works only with known protocols.
>>
>> I question the first statement.
>
> Right.
>
>> The second one is dangerously wrong, and there are plenty of
>> counterexamples.
>
> I view it as a definition.

Hu?

> If you truly are using only "unknown protocols", then you're by definition
> using a private wired connection,

Randy, please check your logic. The sentence in question was
   "unfocused surveillance which works only with known protocols".
This is logically equivalent to
   "unfocused surveillance does not work if at least one protocol is
    unknown."

I claim that using a homemade protocol over an existing physical and 
transport layer can (and actually is likely to) be less secure than a 
well-evaluated and publicly known security protocol.

The statement you are trying to defend is logically different
   "unfocused surveillance does not work if all protocols are
    unknown."

This is not a definition -- but it is a statement I can agree with.

> This is where I always lose it. Filenames being sensitive information? Only
> if the programmers in question are complete idiots. (And I realize there are
> plenty of them out there.)

Not really. Any security application or a security protocol is designed 
around a threat model. It is impossible to protect the user from any 
threat one can imagine -- so the user has to be aware what are the threats 
the protocol protects her from.

> I can't imagine any value being associated with knowing that there is a 
> file name "J2Typ_De.Ads" that makes up part of the Janus/Ada compiler.

Imagine you send or receive a file with the name dxtiddfh887876y2012.xls, 
where "dxtiddfh887876y2012" happens to be the reference number of a file 
Snowden copied from the NSA computers.Even if the content of the file has 
been well encrypted, the filename would earn you some "friendly visits" 
...

> Besides, anyone who puts anything sensitive in the cloud for long-term
> storage is going to be a victim sooner or later.

Agreed! But the topic was on protocols, i.e., data in transit, rather than 
long-term storage.

> If you need public connections, then surely use SSH.

Agreed. Which is what the OP has been asking about, namely sftp (which is 
ftp + ssh).

> In truth, though, it's probably all pointless. The government (anybodies
> government) will soon ban computers that they can't control.

I am fairly optimistic that this will not happen in Europe. I am not so 
sure about the US.


------  I  love  the  taste  of  Cryptanalysis  in  the morning!  ------
     <http://www.uni-weimar.de/cms/medien/mediensicherheit/home.html>
--Stefan.Lucks (at) uni-weimar.de, Bauhaus-Universität Weimar, Germany--

  parent reply	other threads:[~2013-08-20  8:14 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-08-05 12:41 library/binding for sftp? Stephen Leake
2013-08-05 15:18 ` Dmitry A. Kazakov
2013-08-06  6:24   ` Stephen Leake
2013-08-06  6:54     ` Dmitry A. Kazakov
2013-08-07 10:06       ` Stephen Leake
2013-08-07 13:04         ` Dmitry A. Kazakov
2013-08-07 17:15           ` Simon Clubley
2013-08-07 19:57             ` Dmitry A. Kazakov
2013-08-07 20:09               ` Alan Jump
2013-08-07 20:26                 ` Dmitry A. Kazakov
2013-08-07 20:32                   ` Alan Jump
2013-08-08  9:14                     ` Björn Persson
2013-08-08  9:49                       ` Dmitry A. Kazakov
2013-08-08 11:37                         ` Björn Persson
2013-08-08 19:18                           ` Randy Brukardt
2013-08-08 20:03                             ` Alan Jump
2013-08-09  9:19                               ` Björn Persson
2013-08-09 20:21                               ` Randy Brukardt
2013-08-09  8:49                             ` Björn Persson
2013-08-09 20:12                               ` Randy Brukardt
2013-08-19 17:26                                 ` Stefan.Lucks
2013-08-19 18:15                                   ` AdaMagica
2013-08-19 22:45                                   ` Randy Brukardt
2013-08-19 23:15                                   ` Randy Brukardt
2013-08-20  6:43                                     ` Georg Bauhaus
2013-09-13  9:58                                       ` Oliver Kleinke
2013-09-13 21:12                                         ` Georg Bauhaus
2013-08-20  8:14                                     ` Stefan.Lucks [this message]
2013-08-20 20:59                                       ` Randy Brukardt
2013-08-21  7:27                                         ` Stefan.Lucks
2013-08-21 16:46                                           ` Alan Jump
2013-08-22  5:53                                             ` Per Sandberg
2013-08-26 21:21                                           ` Randy Brukardt
2013-08-24  8:06                                       ` David Thompson
2013-08-24 11:26                                         ` Stefan.Lucks
2013-08-07 21:46               ` Dennis Lee Bieber
2013-08-07 17:44           ` Björn Persson
2013-08-05 18:40 ` Jeffrey Carter
2013-08-06  6:26   ` Stephen Leake
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox