[14492] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: anonymous DH & MITM

daemon@ATHENA.MIT.EDU (Jerrold Leichter)
Sat Oct 4 14:49:53 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 3 Oct 2003 20:19:33 -0400 (EDT)
From: Jerrold Leichter <jerrold.leichter@smarts.com>
To: Tim Dierks <tim@dierks.org>
Cc: Jerrold Leichter <jerrold.leichter@smarts.com>,
	Cryptography list <cryptography@metzdowd.com>
In-Reply-To: <6.0.0.21.2.20031003191816.07a67fd8@127.0.0.1>

| From: Tim Dierks <tim@dierks.org>
|
| I'm lost in a twisty page of MITM passages, all alike.
|
| My point was that in an anonymous protocol, for Alice to communicate with
| Mallet is equivalent to communicating with Bob, since the protocol is
| anonymous: there is no distinction. All the concept of MITM is intended to
| convey is that in an anonymous protocol, you don't know who you're talking
| to, period. Mallet having two conversations with Alice & Bob is equivalent
| to Mallet intermediating himself into a conversation between Alice & Bob.
|
| If you have some unintermediated channel to speak with a known someone
| once, you can exchange a value or values which will allow you to
| authenticate each other forevermore and detect any intermediations in the
| past. But the fundamental truth is that there's no way to bootstrap a
| secure communication between two authenticated parties if all direct &
| indirect communications between those parties may be intermediated. (Call
| this the 'brain in a jar' hypothesis.)
OK, let's set up two different scenarios:

	1.  Non-anonymous communication.  Alice talks to Bob.  Alice knows
		Bob is on the other end, Bob knows Alice is on the other
		end.  They share some secret data; Alice wishes it to be
		known only to her and Bob.  Mallet has a bug in Bob's home
		and copies the data.

		Can Alice or Bob detect that Mallet is there?  Clearly not if
		Mallet never uses the data in a detectable way.  No matter how
		many times Alice and Bob communicate, whether or not Mallet
		continues to bug Bob, neither Alice nor Bob can never learn of
		Mallet's presence.

	2.  Anonymous communication.  Alice and Bob have a conversation.
		Mallet plays MITM.  Alice and Bob don't know who their
		corresponding partner is, but they each tell the other
		that they will not reveal the secrets they exchange, and
		each believes the other - and indeed neither ever reveals
		those secrets.  They wish to know if anyone else had a
		chance to learn their secret.

		On the face of it, there's no difference between these two
		cases.  In each case, someone receives a copy of the secrets
		exchanged between Alice and Bob, but doesn't *do* anything
		with them that either Alice or Bob can see.

		However, in this case, unlike 1, if Alice and Bob continue to
		communicate - using private pseudonyms for each other to
		make "continue to communicate" a meaningful phrase - then,
		assuming Mallet cannot *always* interpose himself, they will
		eventually discover that someone has played a MITM game on
		them.

If, indeed, you have a full "brain in a jar", and Mallet *always* manages to
interpose himself, then, yes, this situation is almost certainly undetectable.
I've learned not to make snap judgements on stuff like this - too many
"clearly impossible" things turn out not to be.  In fact, I find the
distinction between cases 1 and 2 quite surprising!

							-- Jerry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post