[nycbug-talk] Hot Story: German Gov. intelligence agencies decrypt PGP, SSH

Isaac (.ike) Levy ike at blackskyresearch.net
Sun Jun 16 22:01:24 EDT 2013


On Jun 16, 2013, at 9:10 PM, nop <nop at insidiae.net> wrote:

> What are current protocols at peoples' work sites now?
> 
> Whenever.

Often.  Of course everyone around me changes keys every morning, and right after lunch, M-F.  (So, weekends are still obviously a vulnerable time.)

I am of course kidding, but *nobody* likes talking about these policies, because most environments are willfully lax here.  Why?  I don't know.

--
Major gains can be had, by at least hitting the basics:

In web shops, I've repeatedly gotten the greenest daisy-fresh rookie web devs to adhere to (and not be upset about), the most basic policies, by making it simple, and providing a quick start doc to them which walks them through these 3 steps:

TASK FOR USERS (make keys):
--
1) be explicit about making keys
# cd ~/.ssh/ 
# ssh-keygen -C 'Optional Comment Goes Here' -b 4096 -t rsa -f id_rsa
(this can conform to whatever your policies are, crypto, key size, etc...)

2) explain in a sentence that private key must stay on your laptop, (make another doc or a footnote to show how to use ssh-agent, if your environment warrants it)

3) explain to send public key to the admins, (usb key or email or other, whatever your environment warrants).
--

If you don't treat your devs like idiots, they typically comply, and even *gasp* can be compelled to read some man pages.

For other policy basics, in small web shops, I can't tell you how valuable spot-checking key passwords are, e.g. ask a user to do the following:
# ssh-add -D
# ssh -i /path/to/some_key user at somehost

If no password prompt, revoke the user key, and make the user generate a new one.

--
For policy changes, I've found nothing but forcing "key changing parties" gets this to happen among users.  For admins, the key changing parties are a non-thing kind of event, like shaving or clipping toe-nails.

For non-admin/security types, a case of beer typically helps smooth the event along.

--
One last thing about ssh agent use, it can be a real problem in those unavoidable 'tons of eggs in the basket' systems in your infrastructure… Worth a discussion with your fellow admins, IMHO.


> I know the Google forces SSH key pair changes frequently (monthly or
> even weekly?), which makes sense.  It's not like forcing regular passwd
> changes and users recycling passwds or writing them down as a forced bad
> practice.
> 
> I assume people at least use different keys for work and personal.. and
> use passwds with SSH and GPG/PGP?
> 
> Natch.

Natches, on your belt, for every key changed.

(nop did teach me how to use ssh properly, once upon a time :)

>  
> 
> And that 2048-bit keys aren't a hassle to your CPU compared to 1024…

My .02¢

Shucks, 4096 bit RSA keys haven't been "too big" since 4u boxes were as punchy as my iPhone, (and the ssh logins could have a very noticeable effect on the performance of the MTA or web server on the box…).

Biggest keys everywhere, pretty much all the time, IMHO.

> 
> You can "share" a connection in openssh now, so there is no reason to get crazy on those bits.
> 
> http://protempore.net/~calvins/howto/ssh-connection-sharing/

Woah now.  Multiplexing is not only useful, it's also fun…  Not sure if fun is allowed.

Rocket-
.ike






More information about the talk mailing list