EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.26.14

Never Ever Use Coprocessors for Cryptology, Especially If Implemented in the United States

Posted in GNU/Linux, Hardware, Kernel, Security at 2:41 pm by Dr. Roy Schestowitz

Can you read the source code in this microchip?

AMD microchip

Summary: Why the hype about “accelerated” cryptology (like polygons rendering, but for cryptographic purposes) is a dangerous trap that should be shunned and perpetually avoided

THE QUICKEST and most convenient way to undermine all encryption is to weaken random number generation, e.g. lower the entropy, making keys more predictable and thus easily crackable by supercomputers (or even standard computers). This is effective against everything, including online financial transactions, simply because it cracks the very core components of today’s security: SSL, PGP, etc. My doctoral degree involved a great deal of work with entropy and my daytime job too sometimes involves it, so the subject is not foreign to me. I have been watching the NSA closely for a number of years, and always with great concern and suspicion. Now we know that the NSA compels (and even bribes) US companies to help undermine privacy, if not by direct handover of data (PRISM) then by making encryption too poor, setting up back doors, forcing companies to obey NSL/subpoenas, network wiretapping/DPI, or even a combination of all those things. No need for hypotheses anymore; there’s plenty of hard proof now.

Intel, a cleverly-named criminal company (serving the intelligence community), whose hardware-level random number generator (hidden in silicon) FreeBSD refuses to trust (OpenBSD too is historically very critical of Intel) is no longer the only x86 player seeking to manufacture consent (blind trust) for encryption with no source code, just minuscule circuits of semiconductors. AMD, another US company, is now following suit with ardware-level cryptology (i.e. cryptic algorithms for cryptology, which is a non-starter). This is bad just because AMD is a US company (FreeBSD did not single out the US); any company from any country should not be trusted with this type of task. It’s no better — and it is probably much worse — than proprietary software for one’s security. To quote Michael Larabel’s article about it: “Back in November was when patches first emerged for an AMD Cryptographic Coprocessor on Linux. This co-processor provides hardware encryption and other hashing functionality for the AES crypto API, AES CMAC, XTS-AES, and SHA cryptographic interfaces within the Linux kernel.

“Not much information is publicly known on this AMD Cryptographic Coprocessor but it’s believed to be part of AMD’s embedded ARM Cortex-A5 processor on upcoming server-class Opterons with TrustZone technology.”

“Have we learned nothing at all from Snowden’s explosive leaks?”So, Linux 3.14 will try to offload something so sensitive to proprietary code concealed in silicon. Bad idea. Very bad idea. Sure, it’s Linux, but it does open itself to some blobs (e.g. Microsoft’s hypervisor and more famously drivers for peripheral cards that handle graphics), firmware, and now peripheral, embedded-in-hardware proprietary algorithms. Have we learned nothing at all from Snowden’s explosive leaks? Just look what Microsoft has done (total complicity with the NSA). A new poll at FOSS Force asks: “Do you think Red Hat is cooperating with the NSA by building back doors into RHEL?”

The responses may surprise you. Only 42% say “No”. 28% say “I don’t know” and 30% say “Yes”. This relates to an article that alludes to Techrights. It was read by thousands and has been linked to by numerous news sites. I rarely ever comment in sites where identity cannot be verified (because of fakers), but this one challenged my claims and I had to respond. Here are my three replies:

It is not purely speculative. If you think that it is, then you must not have paid close enough attention.

I have been spending at least 2 hours per day since 2012 reading about the NSA. I knew what Snowden showed even before it was publicly known and I spoke about it with RMS on numerous occasions (he came to the UK to meet Assange and then myself, focusing on mass surveillance).

The truth of the matter just needs a little digging because the corporate press is not helping the general public find it out, just like it knowingly ‘buried’ a captured agent in Iran for several years (this leaked out in November).

Similarly, GNU/Linux sites did a very poor job covering (if at all) what happened in recent months regarding Linux. Let me summarise some facts (without links, as I don’t want to be put in the moderation queue again):

- Torvalds’ father said that the NSA had approached his son regarding back doors.

- Linux had a back door added to it about a decade ago. It got removed quickly afterwards and it wasn’t known who had added it. There was press coverage about it, but it was scarce.

- RSA received a bribe from the NSA to promote security standards with back doors.

- NIST and others had NSA moles and bogus (corrupt) peer review process to help usher in security standards with back doors.

- NSA is a large Red Hat client.

- The NSA sends patches to Red Hat, which in turn sends those for Linus Torvalds to put in Linux.

(the above two are now confirmed to me by Red Hat staff)

- BSD does not trust hardware-level random number generators, suspecting — quite rightly given the NSA’s track record — that it has too low an entropy.

- Several top-level Linux developers found vulnerabilities in Linux random number generation. They quietly (without much press coverage anywhere) addressed the issue (raising the entropy) a few months back. Only the latest kernel release has the fixes applied AFAIK (I don’t know if Greg K-H backported any of it because coverage is too scarce). To lay out the magnitude of this issue, it compromises SSL, PGP, etc. (pretty much everything with encryption, even passwords) not just at client side (desktop, tablet, smartphone) but also the server side (i.e. the Internet). This is huge! But the media hasn’t covered it.

Suffice to say, Red Hat has not done anything to convince me I was wrong. Instead, I notice that Red Hat staff is stalking me in LinkedIn and I see my article cited in several news sites which wrote about the issue in several languages (3 articles in Google News are in Spanish).

If you found holes in the above statements or if you want links attached, please request them and I will provide citations. I wrote about everything before, even years ago (NSA involvement in SLE* and RHEL I covered around 2007 or 2008).

I am frustrated to see people turning against the messenger rather than the message. I see a lot of the same done to Sam Varghese. We are making ourselves more vulnerable by refusing to listen to what seems uncomfortable.

Another reply:

I was thinking along the same lines — that Edward Snowden’s leaks (by the way, they’re not just his anymore, as anonymous people from the NSA reportedly leak more and more documents to be published under his name for their safety) can at some stage show encryption undermined at more levels (hardware level, or even kernel level). We already know that encryption was undermined at RSA and NIST by NSA moles, using bribes too. We also know that Linux (kernel) developers recently revised random number generators, after they had found a weakness.

Several state officials (in 6 state at the very least) now work to stop the NSA locally. Some call for a ban on companies that facilitate the NSA (that would include Red Hat), under the premise that they are complicit in crime. I am not kidding, watch the news this week (I don’t want to paste links here as the last time I did so my comment took half a day to appear).

Lastly, there are numerous E-mails sent from and to Red Hat. These further validated my suspicions.

I saw a lot of personal attacks (trying to discredit me or even remove links to my analyses). I even heard the usual personal attacks against Sam Varghese (which I expected from Red Hat because he dares to do real journalism, i.e. journalism that companies don’t like).

Trusting Red Hat should be based on its record, not emotional leanings and faith.

Don’t get me wrong. I was not offended by you and you oughtn’t be offended by my response. I am used to this type of divisive treatment (people trying to ostracise me) since the days I criticised Novell — only to be proven right throughout and at the very end (Novell gave its patents to Linux foes).

I hope you will wait patiently for more information and assess the facts based on their merit. Don’t rely purely/solely on what you read in OpenSource.com (Red Hat). I saw Novell doing its self-delusional spiel (IP “peace of mind”) and fortunately, at the end, Novell did not find enough fools to sell its lies to.

I have been frank in my analysis of Red Hat (on patents, build process, etc.) and if you want links for particular bits of my claims, just ask. I have a repository of tens of thousands of links I collect while researching. Sometimes people refuse to accept even a well-sourced claim because of cognitive dissonance — something I’ve had a lot of experience with when dealing with Microsoft spinners.

“Journalism is printing what someone else does not want printed: everything else is public relations.”

― George Orwell

Here is my original reply, challenging the counter-arguments:

This article starts with an incorrect assertion that I accuse “Red Hat of being in cahoots with the NSA.”

No, NSA is a big client of Red Hat (this was not just revealed but also confirmed to me by Red Hat staff some days ago, by E-mail) and it was also confirmed that NSA submits patches to Linux through Red Hat (think of NIST and RSA; we don’t even have NSA E-mail address to keep track of). Back doors can also be added outside the scope of source code, during a build process. My job involves dealing with this risk. I don’t think you read an essential earlier post:

http://techrights.org/2013/11/24/tpm-back-doors-patriot-act-etc/

This, in turn, links to proof that the NSA did try to put back doors in Linux, as noted by Torvalds the father. See:

http://techrights.org/2013/11/17/nils-torvalds-on-back-doors/

http://techrights.org/2013/09/20/linux-backdoor-question/

http://techrights.org/2013/09/25/surveillance-lawlessness/

Defending Red Hat makes sense, but mischaractering my position is a little unfair. I note that trusting Red Hat is not easy and based on articles I read half a decade ago, NSA was involved in the build process of Windows, OS X, SUSE, and Red Hat (only those 4 were mentioned).

The bottom line is this. Do not have blind trust in Linux. Not even access to source code is enough because the build process needs to be carefully checked and validated; moreover, Linux is joined with some proprietary code and even hardware-level code, so trust is seriously harmed. Now that we know about Red Hat’s relationship with the NSA we should ask ourselves if the NSA is once again trying to put back doors in Linux, or worse, maybe it already did. Letting blobs enter the pipeline helps the NSA achieve (but hide) what it already said it wanted to achieve.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. The EPO is Becoming an Embarrassment to Europe and a Growing Threat to the European Union

    The increasingly pathetic moves by Battistelli and the ever-declining image/status of the EPO (only 0% of polled stakeholders approve Battistelli's management) is causing damage to the reputation of the European Union, even if the EPO is not a European Union organ but an international one



  2. Patent Misconceptions Promoted by the Patent Meta-Industry

    Cherry-picking one's way into the perception of patent eligibility for software and the misguided belief that without patents there will be no innovation



  3. As the United States Shuts Its Door on Low-Quality Patents the Patent Trolls Move to Asia

    Disintegration of Intellectual Ventures (further shrinkage after losing software patents at CAFC), China's massive patent bubble, and Singapore's implicit invitation/facilitation of patent trolls (bubble economy)



  4. Links 17/2/2017: Wine 2.2, New Ubuntu LTS

    Links for the day



  5. Bad Advice From Mintz Levin and Bejin Bieneman PLC Would Have People Believe That Software Patents Are Still Worth Pursuing

    The latest examples of misleading articles which, in spite of the avalanche of software patents in the United States, continue to promote these



  6. Patents Are Not Property, They Are a Monopoly, and They Are Not Owned But Temporarily Granted

    Patent maximalism and distortion of concepts associated with patents tackled again, for terminology is being hijacked by those who turned patents into their "milking cows"



  7. SoftBank Group, New Owner of ARM, Could Potentially Become (in Part) a Patent Troll or an Aggressor Like Qualcomm

    SoftBank grabbed headlines (in the West at least) when it bought ARM, but will it soon grab headlines for going after practicing companies using a bunch of patents that it got from Inventergy, ARM, and beyond?



  8. Technicolor, Having Turned Into a Patent Troll, Attacks Android/Tizen/Linux With Patents in Europe

    Technicolor, which a lot of the media portrayed as a patent troll in previous years (especially after it had sued Apple, HTC and Samsung), is now taking action against Samsung in Europe (Paris, Dusseldorf and Mannheim)



  9. Michelle Lee is Still “in Charge” of the US Patent System

    Contrary to a malicious whispering campaign against Lee (a coup attempt, courtesy of patent maximalists who make a living from mass litigation), she is still in charge of the USPTO



  10. Our Assessment: EPO Wants a Lot of Low-Quality Patents and Low-Paid Staff With UPC (Prosecution Galore)

    The European Patent Office seems to be less interested in examination and more interested in facilitating overzealous prosecution all across Europe and beyond; The Administrative Council has shown no signs that it is interested in profound changes, except those proposed by Battistelli in the face of growing resistance from staff and from ordinary stakeholders



  11. Links 16/2/2017: HITMAN for GNU/Linux, Go 1.8

    Links for the day



  12. Yet More Complaints About the European Patent Office in the Bavarian Regional Government

    Some German politicians do care about the welfare of EPO staff, a lot more so than the EPO's management that is actively crushing this staff



  13. EPO Staff Representatives to Escalate Complaint About Severe Injustices to the EPO's Secretive Board 28

    In a new letter to President Benoît Battistelli it is made abundantly apparent -- however politely -- that Battistelli's gross abuses could further complicate things for Battistelli, who is already embroiled in a fight with his predecessor, Roland Grossenbacher



  14. New Survey Reveals That High Patent Quality, or Elimination of Bad Patents, is Desirable to Patent Holders

    A new survey from Bloomberg BNA and AIPLA reveals that the Patent Trial and Appeal Board (PTAB), which still grows in prominence, is supported by people who have themselves gotten patents (not those who are in the bureaucracy of patents and self-serving politics)



  15. Open Patent Office is Not the Solution; Ending Software Patents is the Solution

    Our remarks about the goals and methods of the newly-established Open Patent Office and what is instead needed in order to combat the menace that threatens software development



  16. New Scholarly Paper Says “UK’s Withdrawal From the EU Could Mean That the Entire (Unitary Patent) System Will Not Go Into Effect”

    A paper from academics -- not from the patent microcosm (for a change) -- provides a more sobering interpretation, suggesting quite rightly that the UPC can't happen in the UK (or in Europe), or simply not endure if some front groups such as CIPA somehow managed to bamboozle politicians into it (ratification in haste, before the facts are known)



  17. Patent Trolls Update: Rodney Gilstrap Maintains His Support for Trolls, MPEG-LA Goes Hunting in China, and Blackberry Hits Nokia

    A roundup of the latest news about patent trolls and what they are up to in the United States, Europe, and Asia



  18. Guest Post: EPO, an Idyllic Place to Work

    The true face of the EPO as explained by an insider, recalling the history that led to the negative image and toxic work atmosphere



  19. Links 15/2/2017: Linux 4.9.10 and Linux 4.4.49

    Links for the day



  20. Claude Rouiller (ILOAT) and ILO Rulings Effectively Disregarded by the European Patent Office

    The compositions of kangaroo courts at the EPO continue to be absurd, in spite of a ruling from the International Labour Organisation (ILO), which insisted that change must be made following a lot of mistrials



  21. National Law Journal Believes That Gorsuch as Supreme Court Justice Would be Opponent of Patent Reform

    Whispering campaign surrounds Neil Gorsuch's alleged or perceived views on patents, and in particular the America Invents Act (AIA) which brought the Patent Trial and Appeal Board (PTAB), a serial invalidator of software patents, owing to Alice (a Supreme Court decision)



  22. Center for Intellectual Property Understanding (CIPU) is a Lobby Group for Software Patents and Patent Maximalism

    An introduction to what the Center for Intellectual Property Understanding really is, what it is for, and who is behind it



  23. The European Patent Office Looks More and More Like the Sicilian Mafia Every Day

    Battistelli has constructed or pulled together a Mafia-like family inside the EPO, where all those who protect the 'King' (or Don) are rewarded and the rest are removed with prejudice



  24. EPO-Connected Writers Are Using Alternative Facts or Fake News to Promote the Unitary Patent in British Media

    The misuse of publications for the purpose of lobbying by Battistelli and Team UPC (a small group of opportunists looking to exploit change that they themselves introduce) is worth noting, for its frequency is on the rise again



  25. Microsoft Has Not Managed to Blackmail Huawei Over Android and GNU/Linux, But Its Trolls/Satellites Are Trying

    The story of Huawei gets more complicated, even though software patents are losing their teeth and notorious patent trolls are altogether losing their patents



  26. IBM Has Become an Enemy of GNU/Linux and a Loud Proponent of Software Patents

    IBM's poisonous policy on patents, which has long been incompatible with Free/Libre software, has gotten even worse and the company now takes the lead in lobbying for patenting of software



  27. Leaked: European Patent Office a Fire Hazard Waiting to Cause Tragedy (Possible Deaths)

    The EPO has known for a while that is was not in compliance with regulations, but as usual -- flaunting immunity and impunity -- nothing happened



  28. For Valentine's Day, Battistelli Learns to Stop Worrying and Love to Lie

    Battistelli lies about patent quality once again, incidentally on the very same day that serious leaks regarding patent quality got published (and need distracting from)



  29. India Cites Public Interest in Patent Case Where Embargo Attempted Against Local Drugmaker

    India turns away a foreign corporation that attempts to use patents to shut down (or destroy the business model of) an Indian company



  30. Links 14/2/2017: Linux Lite 3.4, GNU Health 3.0.6

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts