[147506] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Crypto Standards v.s. Engineering habits - Was:

daemon@ATHENA.MIT.EDU (Phillip Hallam-Baker)
Sat Oct 5 10:39:24 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <524D3B1E.1040803@gmail.com>
Date: Fri, 4 Oct 2013 09:57:39 -0400
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Alan Braggins <alan.braggins@gmail.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============1601752106272698629==
Content-Type: multipart/alternative; boundary=089e01419b1c840ebc04e7eaaf0b

--089e01419b1c840ebc04e7eaaf0b
Content-Type: text/plain; charset=ISO-8859-1

On Thu, Oct 3, 2013 at 5:38 AM, Alan Braggins <alan.braggins@gmail.com>wrote:

> On 02/10/13 18:42, Arnold Reinhold wrote:
>
>> On 1 Oct 2013 23:48 Jerry Leichter wrote:
>>
>>  The larger the construction project, the tighter the limits on this
>>> stuff.  I used to work with a former structural engineer, and he repeated
>>> some of the "bad example" stories they are taught.  A famous case a number
>>> of years back involved a hotel in, I believe, Kansas City.  The hotel had a
>>> large, open atrium, with two levels of concrete "skyways" for walking
>>> above.  The "skyways" were hung from the roof.  As the structural engineer
>>> specified their attachment, a long threaded steel rod ran from the roof,
>>> through one skyway - with the skyway held on by a nut - and then down to
>>> the second skyway, also held on by a nut.  The builder, realizing that he
>>> would have to thread the nut for the upper skyway up many feet of rod, made
>>> a "minor" change:  He instead used two threaded rods, one from roof to
>>> upper skyway, one from upper skyway to lower skyway.  It's all the same,
>>> right?  Well, no:  In the original design, the upper nut holds the weight
>>> of just the upper skyway.  In the m
>>>
>> o
>
>>   di
>>
>>> fied version, it holds the weight of *both* skyways.  The upper
>>> fastening failed, the structure collapsed, and as I recall several people
>>> on the skyways at the time were killed.  So ... not even a factor of two
>>> safety margin there.  (The take-away from the story as delivered to future
>>> structural engineers was *not* that there wasn't a large enough safety
>>> margin - the calculations were accurate and well within the margins used in
>>> building such structures.  The issue was that no one checked that the
>>> structure was actually built as designed.)
>>>
>>
>> This would be the 1981 Kansas City Hyatt Regency walkway collapse (
>> http://en.wikipedia.org/wiki/**Hyatt_Regency_walkway_collapse<http://en.wikipedia.org/wiki/Hyatt_Regency_walkway_collapse>
>> **)
>>
>
> Which says of the original design: "Investigators determined eventually
> that this design supported only 60 percent of the minimum load required by
> Kansas City building codes.[19]", though the reference seems to be a dead
> link. (And as built it supported 30% or the required minimum.)
>
> So even if it had been built as designed, the safety margin would not
> have been "well within the margins used in building such structures".


The case is described in Why Buildings Fall Down.

The original design was sound structurally but could not be built as it
would have required the entire length of the connection rod to be threaded.
There was no way to connect one structure to the other.

The modified design could be built but had a subtle flaw: the upper skyway
was now holding the entire weight of both The strength of the joint was
unaffected by the change but the load on the joint doubled.


We see very similar effects in cryptographic systems. But the main problem
is that our analysis apparatus focuses on the part of the problem we know
how to analyze rather than the part of the problem that fails most often.

Compare the treatment of coding errors in cryptographic software and the
treatment of CA mis-issue. Coding errors are much more likely to impact the
end user and much more likely to occur. But those get a free pass. Nobody
has ever suggested that the bugs in Sendmail in the early 1990s should have
stopped people using the product (OK apart from me). But seven mis-issued
certificates and there is a pitchfork wielding mob outside my house.

The fact that the Iranian Revolutionary Guard has a web site filled with
hijacked software that is larded up with backdoors completely missed the
attention of most of the people worrying about the seven certificates, all
of which were revoked within minutes and would be rejected by any browser
that implemented revocation checking like they should. But much easier to
flame on about the evils of CAs than ask why the browser providers prefer
shaving a few milliseconds off the latency of their browser response than
making their customers secure.


Oh and it seems that someone has murdered the head of the IRG cyber effort.
I condemn it without qualification. There are many people who have a vested
interest in keeping wars and confrontations going. There are many beltway
contractors who stand to make a lot of money if they can persuade the US
people to fund a fourth branch of the military to fight cyber wars and fund
it as lavishly as they have foolishly funded the existing three.

A trillion dollars a year spent on bombs bullets and death is no cause for
pride. Nobody should ever carry a gun or wear a military uniform with
anything other than shame for the fact that our inability to solve our
political issues without threat of violence makes it necessary. We do not
need to spend hundreds of billions more on a new form of warfare. But there
are many who would get a lot richer if we did.

As Eisenhower observed, spending too much on the military makes the country
less safe. If politicians believe their war machine is invincible, some
stupid fool is going to use it just because they can. Just like the last
President did. At the end of the cold war when the Soviet Union was on its
knees, so was Margaret Thatcher, begging Gorbachev to send the tanks into
East Berlin and stop the collapse of the enemy that her world was built in
opposition to. And Thatcher claimed to be speaking for the other Western
leaders as well. I have the transcript of the meeting if anyone is
interested.


While most of the information on the Comodo attack is in the public domain
there is some that was with-held. The reason was not to protect Comodo but
to protect the attacker in the unlikely event that they were actually
telling the truth and they were acting outside government direction. The
chance is very small but if they were acting on their own initiative and
had diverted the entire Iranian Internet they would risk a long prison
sentence, possibly a capital sentence if they were caught. I am not going
to provide the Iranian authorities with information that could assist them
in that even if the guy had attacked us.


One of the more ridiculous spectacles resulting from PRISM is the parade of
establishment worthies telling us that we don't need to be worried about
the government intercepts and we should not worry our silly heads about
matters that are too complex to understand. Well I knew quite a few members
of the British cabinet when they were up at Oxford, I have known
politicians all my life, my cousin was a cabinet member, I have met world
leaders and acknowledged leading foreign policy experts. That experience
gives me absolutely no confidence in the establishment worthies.

-- 
Website: http://hallambaker.com/

--089e01419b1c840ebc04e7eaaf0b
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><br><div class=3D"gmail=
_quote">On Thu, Oct 3, 2013 at 5:38 AM, Alan Braggins <span dir=3D"ltr">&lt=
;<a href=3D"mailto:alan.braggins@gmail.com" target=3D"_blank">alan.braggins=
@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im">On 02/10/13 18:42, Arnold =
Reinhold wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
On 1 Oct 2013 23:48 Jerry Leichter wrote:<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
The larger the construction project, the tighter the limits on this stuff. =
=A0I used to work with a former structural engineer, and he repeated some o=
f the &quot;bad example&quot; stories they are taught. =A0A famous case a n=
umber of years back involved a hotel in, I believe, Kansas City. =A0The hot=
el had a large, open atrium, with two levels of concrete &quot;skyways&quot=
; for walking above. =A0The &quot;skyways&quot; were hung from the roof. =
=A0As the structural engineer specified their attachment, a long threaded s=
teel rod ran from the roof, through one skyway - with the skyway held on by=
 a nut - and then down to the second skyway, also held on by a nut. =A0The =
builder, realizing that he would have to thread the nut for the upper skywa=
y up many feet of rod, made a &quot;minor&quot; change: =A0He instead used =
two threaded rods, one from roof to upper skyway, one from upper skyway to =
lower skyway. =A0It&#39;s all the same, right? =A0Well, no: =A0In the origi=
nal design, the upper nut holds the weight of just the upper skyway. =A0In =
the m<br>

</blockquote></blockquote>
o<br>
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex"><div class=3D"im">
=A0 di<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
fied version, it holds the weight of *both* skyways. =A0The upper fastening=
 failed, the structure collapsed, and as I recall several people on the sky=
ways at the time were killed. =A0So ... not even a factor of two safety mar=
gin there. =A0(The take-away from the story as delivered to future structur=
al engineers was *not* that there wasn&#39;t a large enough safety margin -=
 the calculations were accurate and well within the margins used in buildin=
g such structures. =A0The issue was that no one checked that the structure =
was actually built as designed.)<br>

</blockquote>
<br></div><div class=3D"im">
This would be the 1981 Kansas City Hyatt Regency walkway collapse (<a href=
=3D"http://en.wikipedia.org/wiki/Hyatt_Regency_walkway_collapse" target=3D"=
_blank">http://en.wikipedia.org/wiki/<u></u>Hyatt_Regency_walkway_collapse<=
/a><u></u>)<br>

</div></blockquote>
<br>
Which says of the original design: &quot;Investigators determined eventuall=
y that this design supported only 60 percent of the minimum load required b=
y Kansas City building codes.[19]&quot;, though the reference seems to be a=
 dead link. (And as built it supported 30% or the required minimum.)<br>

<br>
So even if it had been built as designed, the safety margin would not<br>
have been &quot;well within the margins used in building such structures&qu=
ot;.</blockquote><div><br></div><div>The case is described in Why Buildings=
 Fall Down.</div><div><br></div><div>The original design was sound structur=
ally but could not be built as it would have required the entire length of =
the connection rod to be threaded. There was no way to connect one structur=
e to the other.</div>
<div><br></div><div>The modified design could be built but had a subtle fla=
w: the upper skyway was now holding the entire weight of both The strength =
of the joint was unaffected by the change but the load on the joint doubled=
.</div>
<div><br></div><div><br></div><div>We see very similar effects in cryptogra=
phic systems. But the main problem is that our analysis apparatus focuses o=
n the part of the problem we know how to analyze rather than the part of th=
e problem that fails most often.</div>
<div><br></div><div>Compare the treatment of coding errors in cryptographic=
 software and the treatment of CA mis-issue. Coding errors are much more li=
kely to impact the end user and much more likely to occur. But those get a =
free pass. Nobody has ever suggested that the bugs in Sendmail in the early=
 1990s should have stopped people using the product (OK apart from me). But=
 seven mis-issued certificates and there is a pitchfork wielding mob outsid=
e my house.</div>
<div><br></div><div>The fact that the Iranian Revolutionary Guard has a web=
 site filled with hijacked software that is larded up with backdoors comple=
tely missed the attention of most of the people worrying about the seven ce=
rtificates, all of which were revoked within minutes and would be rejected =
by any browser that implemented revocation checking like they should. But m=
uch easier to flame on about the evils of CAs than ask why the browser prov=
iders prefer shaving a few milliseconds off the latency of their browser re=
sponse than making their customers secure.</div>
<div><br></div><div><br></div><div>Oh and it seems that someone has murdere=
d the head of the IRG cyber effort. I condemn it without qualification. The=
re are many people who have a vested interest in keeping wars and confronta=
tions going. There are many beltway contractors who stand to make a lot of =
money if they can persuade the US people to fund a fourth branch of the mil=
itary to fight cyber wars and fund it as lavishly as they have foolishly fu=
nded the existing three.=A0</div>
<div><br></div><div>A trillion dollars a year spent on bombs bullets and de=
ath is no cause for pride. Nobody should ever carry a gun or wear a militar=
y uniform with anything other than shame for the fact that our inability to=
 solve our political issues without threat of violence makes it necessary. =
We do not need to spend hundreds of billions more on a new form of warfare.=
 But there are many who would get a lot richer if we did.</div>
<div><br></div><div>As Eisenhower observed, spending too much on the milita=
ry makes the country less safe. If politicians believe their war machine is=
 invincible, some stupid fool is going to use it just because they can. Jus=
t like the last President did. At the end of the cold war when the Soviet U=
nion was on its knees, so was Margaret Thatcher, begging Gorbachev to send =
the tanks into East Berlin and stop the collapse of the enemy that her worl=
d was built in opposition to. And Thatcher claimed to be speaking for the o=
ther Western leaders as well. I have the transcript of the meeting if anyon=
e is interested.</div>
<div><br></div><div><br></div><div>While most of the information on the Com=
odo attack is in the public domain there is some that was with-held. The re=
ason was not to protect Comodo but to protect the attacker in the unlikely =
event that they were actually telling the truth and they were acting outsid=
e government direction. The chance is very small but if they were acting on=
 their own initiative and had diverted the entire Iranian Internet they wou=
ld risk a long prison sentence, possibly a capital sentence if they were ca=
ught. I am not going to provide the Iranian authorities with information th=
at could assist them in that even if the guy had attacked us.</div>
<div><br></div><div><br></div><div>One of the more ridiculous spectacles re=
sulting from PRISM is the parade of establishment worthies telling us that =
we don&#39;t need to be worried about the government intercepts and we shou=
ld not worry our silly heads about matters that are too complex to understa=
nd. Well I knew quite a few members of the British cabinet when they were u=
p at Oxford, I have known politicians all my life, my cousin was a cabinet =
member, I have met world leaders and acknowledged leading foreign policy ex=
perts. That experience gives me absolutely no confidence in the establishme=
nt worthies.=A0</div>
</div><div><br></div>-- <br>Website: <a href=3D"http://hallambaker.com/">ht=
tp://hallambaker.com/</a><br>
</div></div>

--089e01419b1c840ebc04e7eaaf0b--

--===============1601752106272698629==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============1601752106272698629==--

home help back first fref pref prev next nref lref last post