Older blog entries for argp (starting at number 16)

26 Aug 2008 (updated 25 Mar 2009 at 18:49 UTC) »

διαγραμματική παράσταση του ελληνικού ιστού εμπιστοσύνης (ενημέρωση)

11 May 2008 (updated 25 Mar 2009 at 18:50 UTC) »

διαγραμματική παράσταση του ελληνικού ιστού εμπιστοσύνης

Μετά τη συνάντηση της 23 Απριλίου στη Θεσσαλονίκη αποφάσισα να δημιουργήσω (και να συντηρώ) τη διαγραμματική παράσταση του ελληνικού ιστού εμπιστοσύνης. Προφανώς το εγχείρημα αυτό απαιτεί μεγάλο όγκο αρχικών δεδομένων και αυτοματοποίηση της διαδικασίας δημιουργίας του γράφου. Τη δεύτερη απαίτηση την ικανοποίησα με ένα απλό Perl πρόγραμμα μεγέθους μερικών δεκάδων γραμμών το οποίο κάνει χρήση του προγράμματος sig2dot.pl ως βιβλιοθήκη.

Για την ικανοποίηση της πρώτης απαίτησης μπορείτε να συνεισφέρετε στέλνοντάς μου στη διεύθυνση argp at domain cs.tcd.ie το αποτέλεσμα της εντολής gpg --list-sigs > $USER.txt.

Κάποια πρώτα αποτελέσματα υπάρχουν παρακάτω. Η πρόσφατη συνάντηση στη Θεσσαλονίκη είναι εμφανής στο πάνω δεξιά μέρος του γράφου.

συνάντηση για συλλογή/ανταλλαγή υπογραφών σε pgp/gpg κλειδιά

Την Τετάρτη 23 Απριλίου του 2008 στη Θεσσαλονίκη θα διεξαχθεί συνάντηση για συλλογή/ανταλλαγή υπογραφών σε pgp/gpg κλειδιά. Για τη συμμετοχή σας θα χρειαστείτε κάποιο επίσημο έγγραφο που να πιστοποιεί την ταυτότητα που αντιστοιχεί στο κλειδί σας, και αρκετά αντίγραφα από το ψηφιακό δακτυλικό αποτύπωμα του κλειδιού σας και του ονόματός σας γραμμένα σε χαρτί.

Περισσότερες πληροφορίες για τη διαδικασία που θα ακολουθηθεί υπάρχουν εδώ.

Το ακριβές μέρος και η ώρα θα ανακοινωθούν μέσα τις επόμενες μέρες.

ελληνικός ορθογράφος για το vim

Δυστυχώς η τελευταία έκδοση του vim δεν συμπεριλαμβάνει ελληνικό λεξικό για τον ενσωματωμένο ορθογράφο του. Ευτυχώς μπορούμε πολύ εύκολα να δημιουργήσουμε ένα χρησιμοποιώντας το ελληνικό λεξικό που παρέχει το OpenOffice:

$ cd ~/
$ wget http://ftp.services.openoffice.org/pub/OpenOffice.org/contrib/dictionaries/el_GR.zip
$ unzip el_GR.zip

Στη συνέχεια κάνουμε εκκίνηση του vim, και δίνουμε την παρακάτω εντολή:

:mkspell el ~/el_GR

Αφού έχουμε κλείσει το vim βλέπουμε ότι έχει δημιουργηθεί το αρχείο ~/el.utf-8.spl, το οποίο πρέπει να μεταφερθεί στον κατάλληλο κατάλογο:

$ mkdir -p ~/.vim/spell
$ mv ~/el.utf-8.spl ~/.vim/spell
$ rm -f el_GR.aff el_GR.dic el_GR.zip README_el_GR.txt

Από εδώ και πέρα τα πράγματα είναι απλά. Ο τρόπος με τον οποίο θα χρησιμοποιηθεί ο ελληνικός ορθογράφος κατά τη χρήση του vim είναι θέμα προσωπικής προτίμησης. Για λόγους πληρότητας παραθέτω παρακάτω τις συναφείς σειρές του ~/.vimrc αρχείου μου (τα λεξικά en_us και en_gb συμπεριλαμβάνονται στο vim):

map <F8> <Esc>:setlocal spell! spelllang=el<CR>
map <F7> <Esc>:setlocal spell! spelllang=en_us<CR>
map <F6> <Esc>:setlocal spell! spelllang=en_gb<CR>
13 Mar 2008 (updated 25 May 2008 at 08:12 UTC) »

usenix proceedings

All USENIX-sponsored conference proceedings were in the past freely available, except those of conferences held in the last twelve months. Those were only available to USENIX members. Today, USENIX announced that they are making all their conference proceedings freely available to everyone.

This is going to be very helpful for all researchers, although I don't think that there are many people interested in any area of systems research that are not USENIX members already. In any case, I hope that ACM, IEEE and Springer/LNCS proceedings become freely available as well (but somehow I doubt it).

huskarl

Huskarl is the product of a final year B.Sc. project that I have co-supervised. Dragomir Penev has investigated the past and present attacks against Bluetooth's authentication and key exchange mechanisms, and has developed an alternative solution based on public key cryptography.

The new protocol utilizes symmetric and asymmetric cryptography to authenticate two Bluetooth devices, in a way similar to the very popular Secure Shell (SSH) protocol. There is no dependency on any kind of shared secrets (e.g. PINs), or other data exchanged between the devices in plaintext. Symmetric encryption is used to reduce the load that a purely asymmetric protocol would have.

The detailed message exchanges and a performance analysis of Huskarl can be found in the published paper. In this post I will discuss the choice behind Huskarl's underlying security model, as this was my major contribution to the project.

As in the case of the SSH security model, Huskarl avoids reliance on any kind of infrastructure in order to introduce previously unknown Bluetooth entities by weakening the traditional threat model that assumes a universal omnipresent adversary. In Huskarl the bindings between digital identities and public keys are established by

  • assuming that the first time a connection happens no attacker substitutes a legitimate participant's key with his own, or
  • via an out of band channel.

The first approach makes the protocol vulnerable to man-in-the-middle attacks on the first channel establishment between two communicating Bluetooth entities. Although initial exchanges constitute a very small percentage of a network's total traffic, there are no guarantees that they will not be compromised. However, in the case that an attacker manages to perform a man-in-the-middle attack in an initial exchange between a pair of Bluetooth devices, he then needs to be present in every subsequent channel establishment between the specific pair. Otherwise, the devices will notice that the public key of the other party has changed and therefore know that either the initial or the current exchange has been compromised. The devices can then abort the communication and remove the offending public key from their key database, or act according to some other locally defined policy.

The second approach, i.e. the existence of an out of band channel, may not be as far fetched as it initially appears. Near Field Communication (NFC) is a new very short range wireless connectivity protocol that evolved from a combination of existing contactless identification technologies. There are mobile phones currently available on the market that have NFC capabilities, for example see the Nokia 6131 NFC. As this, and other similar technologies, become widely adopted, security protocols operating along the design choices of Huskarl will be the preferred choice to other costly and centralized approaches.

Huskarl's prototype implementation was developed on Linux using the BlueZ Bluetooth protocol stack and OpenSSL. It is published under GPLv2 and is hosted on SourceForge.

7 Feb 2008 (updated 2 Jul 2009 at 11:39 UTC) »

metakall

For the past three months I have been doing part-time research and development work for Metakall, a research commercialization project that was born at the Centre for Telecommunications Value-Chain Research (CTVR). The main idea behind Metakall is that we provide the technology to allow end users to pay wireless hotspot operators small amounts of cash in real-time for network access. Instead of maintaining subscriptions or buying fixed amounts of access, Metakall users dynamically pay just for the network connectivity service they need for a single VoIP call, or to read their email messages. We are currently conducting an internal to CTVR small scale user trial, with a larger scale user trial with external participants planned to follow shortly.

At the moment I cannot discuss the technical details of our solution due to a pending patent application, but I am happy to report that our prototype implementation is fully portable. We currently support most Windows flavors (including Windows Mobile and Windows CE of course), Linux and Mac OS X. Metakall's focus on portability constantly gives me the opportunity to experiment with various Linux-based devices; from the first generation SIP phone Linksys WIP300 that is based on uClinux, to the Nokia 770 Internet Tablet, to the impressive OpenMoko that I have just started exploring. Strictly from a developer's point of view, the Nokia 770 device is currently my favorite platform. However, the completely open nature and the vision behind OpenMoko is something that greatly appeals to me. I eagerly anticipate the second version of the OpenMoko phone (expected this October) that will add a wireless interface, giving us the means to fully deploy the Metakall software on this exciting platform.

25 Jun 2007 (updated 2 Jul 2007 at 12:07 UTC) »

http://www.trustcomp.org/treck/

In direct relation to my previous post; I am involved in the program committee of the ACM SAC 2008 TRECK track - the 4th Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK) track of the 23rd ACM Symposium on Applied Computing. We are interested in original and unpublished research on computational models of trust and online reputation mechanisms. Specifically, the TRECK track's focus is on the set of applications that benefit from the use of such technologies. Therefore, I believe that it is of particular interest to the open source world, both as an application area in itself (trust-enabled distributed SCM systems as alternatives to the strictly centralized models of development would be a very interesting topic of research), and as a highly relevant forum to publish new systems (Konfidi immediately comes to mind as a promising example).

The submission deadline is September 8, 2007, which is more than enough, well, if not more than enough then certainly adequate, and the full information regarding the venue, dates and a suggested list of topics of interest can be found at http://www.trustcomp.org/treck/.

20 Jun 2007 (updated 7 Feb 2008 at 08:58 UTC) »

google as a ``trust authority''

I have recently noticed that I am using Google as a way to avoid phishing websites when I am making online purchases or doing online banking. As an example, to find Bank of Ireland's online banking website I avoid to directly type its URL since I can never remember it and a misspelling would most probably lead me to a fake server. Therefore, I simply google the terms ``365 bank of ireland'' and I am certain that the first result would link to the correct website. Basically, I am using Google as a ``trust authority;'' as an entity that I trust to refer me to the authentic provider I am looking for and not another masquerading as the target provider.

In a traditional PKI setting a Certificate Authority (CA) provides a very similar, in a semantic and not strictly technical sense, service; it gives guarantees to a service consumer that the service provider he is about to disclose sensitive information to is indeed the entity it claims to be. The main difference is that a PKI CA follows a manual way to verify the digital identity of a service provider before it issues an identity certificate (and, as I have previously studied, they cannot really be trusted on this due to mainly cost reasons). On the other hand, Google relies on an automated way to map keywords to service providers. PageRank could be modified, or a similar algorithm could be developed, to associate public keys to identities, and rank them in case more than one keys refer to the same identity based on a variety of factors like the time period the key has been associated with the target identity, eigenvector centrality, as well as others.

Actually, Dimitris Glynos and myself have done some joint research work on the subject and have interesting and encouraging results to share - not to mention a full Python implementation of our proposed scheme that we plan to release as an open source project running on Linux. But this is the topic of another post.

I am not saying that Google should be trusted with even more power. What I am saying is that the PKI trust model doesn't work, particularly as a phishing countermeasure, but also in more general application domains as its limited adoption, among other facts, clearly demonstrates, and that we need to study alternatives.

7 older entries...

New Advogato Features

New HTML Parser: The long-awaited libxml2 based HTML parser code is live. It needs further work but already handles most markup better than the original parser.

Keep up with the latest Advogato features by reading the Advogato status blog.

If you're a C programmer with some spare time, take a look at the mod_virgule project page and help us with one of the tasks on the ToDo list!