bitmask bitmask encryption for encryption for mere
play

BitmasK: BitmasK: encryption for encryption for mere mortals - PowerPoint PPT Presentation

# # BitmasK: BitmasK: encryption for encryption for mere mortals mere mortals FOSDEM 2018 FOSDEM 2018 kali - meskio - kwadronaut kali - meskio - kwadronaut https://leap.se Problem: encrypted email is Problem: encrypted email is


  1. # # BitmasK: BitmasK: encryption for encryption for mere mortals mere mortals FOSDEM 2018 FOSDEM 2018 kali - meskio - kwadronaut kali - meskio - kwadronaut https://leap.se

  2. Problem: encrypted email is Problem: encrypted email is ...complicated ...complicated

  3. Problem: Problem: providers providers

  4. Peer to peer? Peer to peer?

  5. Better Better federation! federation! Protect providers from their users Protect providers from their users Protect users from the provider Protect users from the provider

  6. What does What does LEAP do? LEAP do? LEAP Platform: toolkit to make it easier to run a service provider New protocols: so no need to trust your connection provider Bitmask client: smooth working client with compatible providers

  7. leap mail service leap mail service End-to-end encryption Backwards compatible with email and current OpenPGP usage Service provider has no access to user data Automatic key discovery and validation Cloud synchronized for high availability on multiple devices

  8. email service email service

  9. soledad soledad

  10. mx mx

  11. transitional key validation transitional key validation generic rules for automatic key management, transition from TOFU to more advanced ruleset. bind key <-> email address key directory endorser (provider) binding info: evidence for "educated guess" veri�ed key transition (automatic) [leap.se/en/docs/design/transitional-key-validation]

  12. TOFU TOFU With a bunch of exceptions

  13. 1. First Contact 1. First Contact When one or more keys are �rst discovered for a particular email address, the key with the highest validation level is registered.

  14. 2. Regular Refresh 2. Regular Refresh All keys are regularly refreshed to check for modi�ed expirations, or new subkeys, or new keys signed by old keys. This refresh SHOULD happen via some anonymizing mechanism.

  15. 3. Key Replacement 3. Key Replacement A registered key MUST be replaced by a new key in one of the following situations, and ONLY these situations: Veri�ed key transitions. If the user manually veri�es the �ngerprint of the new key. If the registered key is expired or revoked and the new key is of equal or higher validation level. If the registered key has never been successfully used and the new key has a higher validation level. If the registered key has no expiration date.

  16. VPN VPN Prevent eavesdropping. Circunvent internet censorship. Prevent leaks (DNS, IPv6, ...).

  17. LEAP platform LEAP platform sudo gem install leap_cli leap new example --domain example.org cd example leap add-user --self leap cert ca leap cert dh leap cert csr leap node add blueberry services:openvpn \ ip_address:1.1.1.1 openvpn.gateway_address:1.1.1.2 leap node add raspberry services:couchdb,webapp \ ip_address:1.1.1.3 leap init node leap deploy

  18. sysadmins are human sysadmins are human and deserve usability too and deserve usability too

  19. "leap deploy" "leap deploy"

  20. show me the code! show me the code! https://0xacab.org/leap/ ~10 important repos GPL code

  21. current state current state

  22. Email Beta (0.10…) Email Beta (0.10…) works on Linux works on Linux Bitmask VPN Bitmask VPN works on Linux && Android works on Linux && Android

  23. next steps next steps OSX and windows

  24. let a thousand providers let a thousand providers bloom bloom

  25. 🐨 thanks! questions? 🐨 thanks! questions? https://bitmask.net https://bitmask.net https://leap.se https://leap.se katzenpost.mixnetworks.org katzenpost.mixnetworks.org 😽

  26. 2. ability to use multiple 2. ability to use multiple devices devices

  27. 🔒 🔒 🔅 Synchronization Of Synchronization Of Locally Encrypted Data Among Devices Locally Encrypted Data Among Devices

  28. data = 🖃 data = 🖃 + 🔒 + 🔒

  29. bitmask keymanager bitmask keymanager requires no user interaction requires no user interaction

  30. interoperability is a must interoperability is a must many projects converging many projects converging (Watch AUTOCRYPT: Enigmail, K9, Mailpile, Bitmask) (Watch AUTOCRYPT: Enigmail, K9, Mailpile, Bitmask)

  31. SOLEDAD SOLEDAD Synchronization of Locally Encrypted Data Among Devices auth: srp kdf: scrypt AES-256-GCM built on top of canonical's u1db vector clocks clientside: sqlcipher backend serverside: couchdb cluster

  32. Problem: Attachments Problem: Attachments Syncing blobs in a convoluted store Pluggable BlobsIO backend for server (in dev) FS as MVP, others welcome!

  33. Validation levels Validation levels low == less trust on the source

  34. 1. Weak Chain 1. Weak Chain sks key servers, email attached key, OpenPGP header, ...

  35. 2. Provider Trust 2. Provider Trust web�nger, provider mailvelope

  36. 3. Provider Endorsement 3. Provider Endorsement NickNym

  37. 4. Historical Auditing 4. Historical Auditing CONIKS, google's transparent keyserver

  38. 5. Known Key 5. Known Key client pinned keys

  39. 6. Fingerprint 6. Fingerprint manual veri�cation

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend