[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #24351 [Applications/Tor Browser]: Block Global Active Adversary Cloudflare
#24351: Block Global Active Adversary Cloudflare
-------------------------------------------------+-------------------------
Reporter: nullius | Owner: tbb-
| team
Type: enhancement | Status:
| needs_information
Priority: High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Major | Resolution:
Keywords: security, privacy, anonymity, mitm, | Actual Points:
cloudflare |
Parent ID: #18361 | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by nullius):
Replying to [comment:22 cypherpunks]:
> Do you have any actual evidence that they intercepted these decrypted
packets ''and'' used them for their own malicious goals, or those of other
3-letter entities? Otherwise this talk is pure gossip, and it belongs on
tabloids of the DailyMail.
First off, I ''do'' have evidence that they “intercepted these decrypted
packets”. That is how Cloudflare works, period. If you fail to
comprehend this, then go back and reread this thread—or read Cloudflare’s
own documentation—or for that matter, try learning how TLS actually works.
Without full interception and decryption of each and every connection, it
would impossible for them to scan application-layer requests for
“attacks”, insert their own HTTP response headers, and return cache items
from their own servers. Even with their misleadingly named “keyless SSL”,
their diagrams make explicit that they hold the TLS session keys
(symmetric keys) for all sessions (only in that case, not the server
certificate private keys).
As for the rest:
Absence of evidence is not evidence of absence; and your proposition is
diversionary, whereas the real issue is one of ''trust'' and of the
promises made by TLS.
Fact: Cloudflare performs mass decryption, then says in essence, ''Trust
us.''
Evidently, you accept that. For comparison, would you accept key escrow?
There is no “actual evidence” that police agencies would abuse that power,
or that blackhats would steal the escrowed keys. (There is no such
evidence, only because no such system has ever existed in the wild and at
scale.) Also, ''reductio ad absurdum'', would you accept centralized
decryption of 100% of Web traffic? 90%? At what threshold would you deem
such a power a threat in itself? Whom would you trust to have it?
You have no evidence that Cloudflare does not misuse this power, other
than their solemn promise that they don’t. In other words, no “actual
evidence”. But that is beside the point: Nobody should demand that level
of trust, on today’s Internet, in today’s world. The creation of a mass-
decryption chokepoint is implicitly malicious.
Sane people prefer to trust cryptographic algorithms. That is exactly why
we have such things in the first place. Why even bother with TLS? Why
not simply trust large, reputable companies to deliver packets without
peeking at them?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24351#comment:23>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs