[148173] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] HTTP should be deprecated.

daemon@ATHENA.MIT.EDU (Alex Stanford)
Wed Nov 13 20:01:58 2013

X-Original-To: cryptography@metzdowd.com
Date: Wed, 13 Nov 2013 16:59:36 -0500
From: Alex Stanford <ahstanford@gmail.com>
To: =?windows-1252?Q?Lodewijk_andr=E9_de_la_porte?= <l@odewijk.nl>
In-Reply-To: <CAHWD2r+xZNq=4rYVZ8L5mxTAgo6konCuZqdwo4PtrSXRrj+jDQ@mail.gmail.com>
Cc: cryptography <cryptography@metzdowd.com>, Eric Mill <eric@konklone.com>,
	Peter Saint-Andre <stpeter@stpeter.im>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

This is a multi-part message in MIME format.
--===============5642988608783486479==
Content-Type: multipart/alternative;
 boundary="------------060701030609030409090908"

This is a multi-part message in MIME format.
--------------060701030609030409090908
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit

Hi Lewis,

Thanks for reaching out.

I feel terrible about security and data integrity in America, but also 
in the world as a whole.

We have thoroughly explored Canada and Europe as options for our HQ and 
infrastructure. Problem is, my research shows that very few first-world 
countries are even remotely outside the reach of the USG.Sure America 
has the Patriot Act and National Securtiy Letters to worry about, but I 
don't think a lack of these options will stop the USG from obtaining 
data they want.

What we've done is bring extreme awareness of InfoSec to the table. 
Every step of the way we work to find the best solution using readily 
available technology. Is it perfect or ideal? Hardly. But we think it 
better to do our best than to throw our hands up in the air.

Here are 10 quick examples of measures we take that I could think up for 
you on the spot:

1) Isolation testing for shared/virtualized environments
2) Very minimalistic logging, and for very minimalistic period of time
3) "Scorched earth" prepared (whether it be a natural disaster or an 
overreaching NSL, we have plans on how to make our infrastructure 
disappear and reappear... elsewhere -- in far off jurisdictions if 
necessary.)
4) An International staff that won't come to a halt even if my US staff 
was "compromised".
5) PGP email, private XMPP, SilentDesktop, TextSecure and RedPhone 
contact support for customers with severe privacy concerns (at no extra 
cost, just ask)
6) Privatized IPMI for servers (on a private VLAN and IP restricted -- 
not public, which would be a clear hole for the USG)
7) An owner who isn't afraid to stand up for what's right, even if it 
means personal sacrifices.
8) Every member of our staff is trained and tested regularly on social 
engineering awareness and resilience
9) Internally we avoid "the cloud" or at least always have a secure 
alternative and the awareness/diligence of knowing when to use which.
10) We pen test our own software and infrastructure regularly and have 
rigorous daily routines regarding the update of software and reviewing 
the latest vulnerabilities.

In short, we work to be very vigilant about privacy and security, it is 
at the core of our business. That said, it is not our goal to harbor 
criminals. In the case of a valid warrant (one that doesn't violate 
rights and has gone through the proper transparent process -- e.g. not 
an NSL) for a specific user who is clearly breaking laws, we will turn 
over relevant information. In these cases, we notify the client before 
turning over the information. It's mass surveillance and/or a lack of 
due (and fair) process which we will not participate. We see sensitive 
things like anonymous journalism, human rights activists, etc. as 
perfect use cases for our infrastructure.

We think that having trust in the people in charge of the infrastructure 
is more important than the jurisdiction.

Of course, our upstream providers (PEER1 [a Canadian company fwiw] or 
their upstream providers) could potentially cooperate with tapping of 
the pipes without us knowing. Our attempt at mitigation is making SSL 
extremely affordable to our customers (we have the lowest consumer rates 
in the world on trusted EV certs, at least that I know of), managing the 
private keys with extreme paranoia and offering managed implementation 
of PFS for clients who need it.

Could we provide more security/privacy? We perpetually believe so, and 
we're always working to make it happen.

Kind regards,
Alex

> Lodewijk andré de la porte <mailto:l@odewijk.nl>
> Wednesday, November 13, 2013 1:32 PM
>
> How do you feel about security and data integrity as an American 
> company? I'm quite sorry but I cannot deal with any company connected 
> to America regarding hosting, although I really do love the mentality 
> presented on your website. The patriot and related acts make it simply 
> impossible to achieve the level of security that my business needs. If 
> it is possible, please convince me!
>
> All the best,
> Lewis
> Alex Stanford <mailto:ahstanford@gmail.com>
> Wednesday, November 13, 2013 9:21 AM
> HTTPS can be a problem for CDNs for a couple of reasons:
>
> 1) In order to truly cache from the edge all the way back to origin 
> over HTTPS you have to juggle certs at each PoP and track which certs 
> are valid, at least in the CDN architectures I am familiar with. One 
> trick we've used is to allow HTTP or HTTPS for static files on origin, 
> but force dynamic pages to HTTPS - then the CDN caches via HTTP but 
> serves via HTTPS. This implementation works quite well for us.
>
> 2) Certs are generally tied to an IP or set of IPs and applying 
> multiple certs to one IP can prove difficult. So, CDNs assign IPs at 
> each node specifically for a particular hostname in order to provide a 
> custom SSL cert to a customer. So, a customer requiring custom SSL may 
> thereby require dozens of dedicated IPs.
>
> At my business (fullambit.net) we're working to overcome these issues. 
> Our shared hosting accounts come with a dedicated IP, a trusted SSL 
> cert, anycast DNS and CDN service included by default. However, this 
> default CDN service is limited to a shared CDN hostname. This is 
> usually not a concern for customers, and other CDNs offer the same 
> type of deal (cdn77.com for example). It's when we come to custom SSL 
> certs on the CDN that we start to stand apart. We only charge 
> $27.99/yr for a Thawte 123 DV certificate or $109.99 for a Thawte Web 
> Server EV certificate. The only caveat is that we ask customers to 
> commit to at least 1TB/mo for the entirety of the year, at a rate of 
> $39.99 per TB. We're also flexible in offering other certificates. 
> ($8.79 /yr for RapidSSL, and we can do Wildcards too, for example)
>
> My point being that while it is a challenge to offer SSL as a CDN, it 
> is also entirely possible, and I would assume even more so for big 
> companies like Akamai. CDN's and caching really shouldn't be part of 
> the equation when it comes to HTTPSing the Internet.
> Eric Mill <mailto:eric@konklone.com>
> Monday, November 04, 2013 2:01 PM
> I'm very pro-HTTPS for as many places as possible, switched to use it 
> on my own site, and documented how to do it 
> <https://konklone.com/post/switch-to-https-now-for-free> in detail.
>
> But I'm also very pro-"it should be easy to publish things on the 
> Internet", and key management *is* a pain in the ass. Requiring it 
> Internet-wide would raise the barrier for people new to web publishing 
> to get started, and/or make more people just use a *.wordpress.com 
> <http://wordpress.com/> or *.whatever.com 
> <http://whatever.com/> domain, rather than bother getting their own.
>
> Instead, we should establish very clear norms about HTTPS for services 
> and web applications of all kinds. If you have the ability to add 
> HTTPS support, you should, and the mandate is especially clear for 
> hosting services.
>
> For example, one glaring gap for me is Github Pages. It's impossible 
> to use HTTPS if you host something via Github Pages, whether or not 
> you use your own domain name (unless you do something expensive like 
> put CloudFront in front of it).
>
> Caching with HTTPS is a problem. One source of reluctance for major 
> platforms to support HTTPS is because CDNs like Akamai raise their 
> prices drastically if you want HTTPS. That's a major market force that 
> guides the decision companies make, and it's one we should commit 
> ourselves to changing.
>
>
>
>
>
> -- 
> konklone.com <http://konklone.com> | @konklone 
> <https://twitter.com/konklone>
> _______________________________________________
> The cryptography mailing list
> cryptography@metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography
> Peter Saint-Andre <mailto:stpeter@stpeter.im>
> Monday, November 04, 2013 12:28 PM
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Some of us are working on that for some protocols:
>
> https://github.com/stpeter/manifesto
>
> Peter
>
> - -- 
> Peter Saint-Andre
> https://stpeter.im/
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
> Comment: GPGTools - http://gpgtools.org
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iQIcBAEBAgAGBQJSd9lbAAoJEOoGpJErxa2pzhIP/iAdZkNEdgWRrt9N/7Tc06IK
> 3U9zDSzve6BglycwKsCmB8e9+dOuXjw383PiiydbiMDkmUOj7uvkiI069TImfk4E
> Q49WKlBX3rNeqSuk3OAE4CgsnQLxxKns52q4TqfunsDgQS4EJL0xb6VH/O62JxFO
> vjX6N0l6XYS/VnjJJi4jsqAsFjwsx0sVHP30bpvNNqTr511RRSdIa3udUE3CY8mP
> Hf/8V6x6kLQENXgW4lYNyLMG3r4Q3/BkHkurLuw33jdCxNu6Wx4RB5xFPCWKFQyS
> XgrYUBDRfVFHB0OqiukFE0uBqVvuTB9UH47zZiFuN3GM55UJ4TE8gks4W2v7Ku/n
> vby+u/vToqZGGLJYwd2AzyfUag629KhnCbMJ1arp+fd5hMx5O3mbvzB7sJu92Suj
> ZYB3LIkWUc/F5EJXCZN73HhxiyFbkWi5kVfPLkd5UybpI9CNd9Kglh00TBryZ5Ws
> dGF/cOuwtWVOoNn5VeJDFm9MRbDnICwkpguuIdWCZGC8e30A7e4cuR3OFrNVkkfg
> 2ZmFaiVPN93aKeWiXclCkdTwxCXHoRByfSO89Z6QHDhQqbSQ6WMKaidPPbphGyjl
> yyPUG3EsleZQBWdSic+5dgV4TIu2EMzY9IAYGuuNZruFRvr/ZUDnNosIbdg3UnXH
> yNFG+7eTIcVkax5Riqgz
> =S+19
> -----END PGP SIGNATURE-----
> _______________________________________________
> The cryptography mailing list
> cryptography@metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography
> Greg <mailto:greg@kinostudios.com>
> Monday, November 04, 2013 10:50 AM
> Could someone please forward this message to the Elders of the Internet™?
>
> It's time to make encryption mandatory in all communication protocols.
>
> Thx,
>
> - Greg
>
> --
> Please do not email me anything that you are not comfortable also 
> sharing with the NSA.
>
> _______________________________________________
> The cryptography mailing list
> cryptography@metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography

--------------060701030609030409090908
Content-Type: multipart/related;
 boundary="------------020806030102000908080203"


--------------020806030102000908080203
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html><head>
<meta content="text/html; charset=windows-1252" 
http-equiv="Content-Type">
</head><body bgcolor="#FFFFFF" text="#000000">Hi Lewis,<br>
<br>
Thanks for reaching out.<br>
<br>
I feel terrible about security and data integrity in America, but also 
in the world as a whole.<br>
<br>
We have thoroughly explored Canada and Europe as options for our HQ and 
infrastructure. Problem is, my research shows that very few first-world 
countries are even remotely outside the reach of the USG.<span> Sure 
America has the Patriot Act and National Securtiy Letters to worry 
about, but I don't think a lack of
 these options will stop the USG from obtaining data they want. </span><br>
<br>
What we've done is bring extreme awareness of InfoSec to the table. 
Every step of the way we work to find the best solution using readily 
available technology. Is it perfect or ideal? Hardly. But we think it 
better to do our best than to throw our hands up in the air.<br>
<br>
Here are 10 quick examples of measures we take that I could think up for
 you on the spot:<br>
<br>
1) Isolation testing for shared/virtualized environments<br>
2) Very minimalistic logging, and for very minimalistic period of time<br>
3) "Scorched earth" prepared (whether it be a natural disaster or an 
overreaching NSL, we have plans on how to make our infrastructure 
disappear and reappear... elsewhere -- in far off jurisdictions if 
necessary.)<br>
4) An International staff that won't come to a halt even if my US staff 
was "compromised".<br>
5) PGP email, private XMPP, SilentDesktop, TextSecure and RedPhone 
contact support for customers with severe privacy concerns (at no extra 
cost, just ask)<br>
6) Privatized IPMI for servers (on a private VLAN and IP restricted -- 
not public, which would be a clear hole for the USG)<br>
7) An owner who isn't afraid to stand up for what's right, even if it 
means personal sacrifices.<br>
8) Every member of our staff is trained and tested regularly on social 
engineering awareness and resilience<br>
9) Internally we avoid "the cloud" or at least always have a secure 
alternative and the awareness/diligence of knowing when to use which.<br>
10) We pen test our own software and infrastructure regularly and have 
rigorous daily routines regarding the update of software and reviewing 
the latest vulnerabilities.<br>
<br>
In short, we work to be very vigilant about privacy and security, it is 
at the core of our business. That said, it is not our goal to harbor 
criminals. In the case of a valid warrant (one that doesn't violate 
rights and has gone through the proper transparent process -- e.g. not 
an NSL) for a specific user who is clearly breaking laws, we will turn 
over relevant information. In these cases, we notify the client before 
turning over the information. It's mass surveillance and/or a lack of 
due (and fair) process which we will not participate. We see sensitive 
things like anonymous journalism, human rights activists, etc. as 
perfect use cases for our infrastructure. <br>
<br>
We think that having trust in the people in charge of the infrastructure
 is more important than the jurisdiction.<br>
<br>
Of course, our upstream providers (PEER1 [a Canadian company fwiw] or 
their upstream providers) could potentially cooperate with tapping of 
the pipes without us knowing. Our attempt at mitigation is making SSL 
extremely affordable to our customers (we have the lowest consumer rates
 in the world on trusted EV certs, at least that I know of), managing 
the private keys with extreme paranoia and offering managed 
implementation of PFS for clients who need it.<br>
<br>
Could we provide more security/privacy? We perpetually believe so, and 
we're always working to make it happen. <br>
<br>
Kind regards,<br>
Alex<br>
<br>
<blockquote style="border: 0px none;" 
cite="mid:CAHWD2r+xZNq=4rYVZ8L5mxTAgo6konCuZqdwo4PtrSXRrj+jDQ@mail.gmail.com"
 type="cite">
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px"> 	<div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="l@odewijk.nl" photoname="Lodewijk andré de la porte" 
src="cid:part1.01060703.04020007@gmail.com" 
name="compose-unknown-contact.jpg" height="25px" width="25px"></div>   <div
 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
   	<a moz-do-not-send="true" href="mailto:l@odewijk.nl" 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Lodewijk andré de la porte</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">Wednesday, 
November 13, 2013 1:32 PM</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div dir="ltr"><div 
class="gmail_extra"><br></div><div class="gmail_extra">How do you feel 
about security and data integrity as an American company? I'm quite 
sorry but I cannot deal with any company connected to America regarding 
hosting, although I really do love the mentality presented on your 
website. The patriot and related acts make it simply impossible to 
achieve the level of security that my business needs. If it is possible,
 please convince me!<br>

<br></div><div class="gmail_extra">All the best,<br></div><div 
class="gmail_extra">Lewis<br></div></div>

  </div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px"> 	<div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="ahstanford@gmail.com" photoname="Alex Stanford" 
src="cid:part1.01060703.04020007@gmail.com" 
name="compose-unknown-contact.jpg" height="25px" width="25px"></div>   <div
 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
   	<a moz-do-not-send="true" href="mailto:ahstanford@gmail.com" 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Alex Stanford</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">Wednesday, 
November 13, 2013 9:21 AM</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody">
<meta http-equiv="Content-Type" content="text/html; 
charset=windows-1252">
HTTPS can be a problem for
 CDNs for a couple of reasons:<br>
<br>
1) In order to truly cache from the edge all the way back to origin over
 HTTPS you have to juggle certs at each PoP and track which certs are 
valid, at least in the CDN architectures I am familiar with. One trick 
we've used is to allow HTTP or HTTPS for static files on origin, but 
force dynamic pages to HTTPS - then the CDN caches via HTTP but serves 
via HTTPS. This implementation works quite well for us.<br>
<br>
2) Certs are generally tied to an IP or set of IPs and applying multiple
 certs to one IP can prove difficult. So, CDNs assign IPs at each node 
specifically for a particular hostname in order to provide a custom SSL 
cert to a customer. So, a customer requiring custom SSL may thereby 
require dozens of dedicated IPs.<br>
<br>
At my business (fullambit.net) we're working to overcome these issues. 
Our shared hosting accounts come with a dedicated IP, a trusted SSL 
cert, anycast DNS and CDN service included by default. However, this 
default CDN service is limited to a shared CDN hostname. This is usually
 not a concern for customers, and other CDNs offer the same type of deal
 (cdn77.com for example). It's when we come to custom SSL certs on the 
CDN that we start to stand apart. We only charge $27.99/yr for a Thawte 
123 DV certificate or $109.99 for a Thawte Web Server EV certificate. 
The only caveat is that we ask customers to commit to at least 1TB/mo 
for the entirety of the year, at a rate of $39.99 per TB. We're also 
flexible in offering other certificates. ($8.79 /yr for RapidSSL, and we
 can do Wildcards too, for example)<br>
<br>
My point being that while it is a challenge to offer SSL as a CDN, it is
 also entirely possible, and I would assume even more so for big 
companies like Akamai. CDN's and caching really shouldn't be part of the
 equation when it comes to HTTPSing the Internet.<br>

  </div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px"> 	<div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="eric@konklone.com" photoname="Eric Mill" 
src="cid:part3.05050903.06000306@gmail.com" name="postbox-contact.jpg" 
height="25px" width="25px"></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
   	<a moz-do-not-send="true" href="mailto:eric@konklone.com" 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Eric Mill</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">Monday, November 
04, 2013 2:01 PM</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div dir="ltr"><span 
style="font-family:arial,sans-serif;font-size:13px">I'm very pro-HTTPS 
for as many places as possible, switched to use it on my own site, and </span><a
 moz-do-not-send="true" target="_blank" 
style="font-family:arial,sans-serif;font-size:13px" 
href="https://konklone.com/post/switch-to-https-now-for-free">documented
 how to do it</a><span 
style="font-family:arial,sans-serif;font-size:13px"> in detail.</span><div
 style="font-family:arial,sans-serif;font-size:13px">


<br></div><div style="font-family:arial,sans-serif;font-size:13px">But 
I'm also very pro-"it should be easy to publish things on the Internet",
 and key management *is* a pain in the ass. Requiring it Internet-wide 
would raise the barrier for people new to web publishing to get started,
 and/or make more people just use a *.<a moz-do-not-send="true" 
target="_blank" href="http://wordpress.com/">wordpress.com</a> or *.<a 
moz-do-not-send="true" target="_blank" href="http://whatever.com/">whatever.com</a> domain,
 rather than bother getting their own.</div>


<div style="font-family:arial,sans-serif;font-size:13px"><br></div><div 
style="font-family:arial,sans-serif;font-size:13px">Instead, we should 
establish very clear norms about HTTPS for services and web applications
 of all kinds. If you have the ability to add HTTPS support, you should,
 and the mandate is especially clear for hosting services.</div>


<div style="font-family:arial,sans-serif;font-size:13px"><br></div><div 
style="font-family:arial,sans-serif;font-size:13px">For example, one 
glaring gap for me is Github Pages. It's impossible to use HTTPS if you 
host something via Github Pages, whether or not you use your own domain 
name (unless you do something expensive like put CloudFront in front of 
it).</div>


<div style="font-family:arial,sans-serif;font-size:13px"><br></div><div 
style="font-family:arial,sans-serif;font-size:13px">Caching with HTTPS 
is a problem. One source of reluctance for major platforms to support 
HTTPS is because CDNs like Akamai raise their prices drastically if you 
want HTTPS. That's a major market force that guides the decision 
companies make, and it's one we should commit ourselves to changing.</div>


</div><div class="gmail_extra"><br><br><br><br clear="all"><div><br></div>--
 <br><div dir="ltr"><div><a moz-do-not-send="true" target="_blank" 
href="http://konklone.com">konklone.com</a> | <a moz-do-not-send="true" 
target="_blank" href="https://twitter.com/konklone">@konklone</a><br>

</div></div>
</div>

<div>_______________________________________________<br>The cryptography
 mailing list<br><a class="moz-txt-link-abbreviated" href="mailto:cryptography@metzdowd.com">cryptography@metzdowd.com</a><br><a class="moz-txt-link-freetext" href="http://www.metzdowd.com/mailman/listinfo/cryptography">http://www.metzdowd.com/mailman/listinfo/cryptography</a></div></div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px"> 	<div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="stpeter@stpeter.im" photoname="Peter Saint-Andre" 
src="cid:part4.01000107.09060909@gmail.com" name="postbox-contact.jpg" 
height="25px" width="25px"></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
   	<a moz-do-not-send="true" href="mailto:stpeter@stpeter.im" 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Peter Saint-Andre</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">Monday, November 
04, 2013 12:28 PM</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div>-----BEGIN PGP SIGNED 
MESSAGE-----<br>Hash: SHA1<br></div><div><!----><br>Some of us are 
working on that for some protocols:<br><br><a class="moz-txt-link-freetext" href="https://github.com/stpeter/manifesto">https://github.com/stpeter/manifesto</a><br><br>Peter<br><br>-
 -- <br>Peter Saint-Andre<br><a class="moz-txt-link-freetext" href="https://stpeter.im/">https://stpeter.im/</a><br><br><br>-----BEGIN 
PGP SIGNATURE-----<br>Version: GnuPG/MacGPG2 v2.0.19 (Darwin)<br>Comment:
 GPGTools - <a class="moz-txt-link-freetext" href="http://gpgtools.org">http://gpgtools.org</a><br>Comment: Using GnuPG with Thunderbird
 - <a class="moz-txt-link-freetext" href="http://www.enigmail.net/">http://www.enigmail.net/</a><br><br>iQIcBAEBAgAGBQJSd9lbAAoJEOoGpJErxa2pzhIP/iAdZkNEdgWRrt9N/7Tc06IK<br>3U9zDSzve6BglycwKsCmB8e9+dOuXjw383PiiydbiMDkmUOj7uvkiI069TImfk4E<br>Q49WKlBX3rNeqSuk3OAE4CgsnQLxxKns52q4TqfunsDgQS4EJL0xb6VH/O62JxFO<br>vjX6N0l6XYS/VnjJJi4jsqAsFjwsx0sVHP30bpvNNqTr511RRSdIa3udUE3CY8mP<br>Hf/8V6x6kLQENXgW4lYNyLMG3r4Q3/BkHkurLuw33jdCxNu6Wx4RB5xFPCWKFQyS<br>XgrYUBDRfVFHB0OqiukFE0uBqVvuTB9UH47zZiFuN3GM55UJ4TE8gks4W2v7Ku/n<br>vby+u/vToqZGGLJYwd2AzyfUag629KhnCbMJ1arp+fd5hMx5O3mbvzB7sJu92Suj<br>ZYB3LIkWUc/F5EJXCZN73HhxiyFbkWi5kVfPLkd5UybpI9CNd9Kglh00TBryZ5Ws<br>dGF/cOuwtWVOoNn5VeJDFm9MRbDnICwkpguuIdWCZGC8e30A7e4cuR3OFrNVkkfg<br>2ZmFaiVPN93aKeWiXclCkdTwxCXHoRByfSO89Z6QHDhQqbSQ6WMKaidPPbphGyjl<br>yyPUG3EsleZQBWdSic+5dgV4TIu2EMzY9IAYGuuNZruFRvr/ZUDnNosIbdg3UnXH<br>yNFG+7eTIcVkax5Riqgz<br>=S+19<br>-----END
 PGP SIGNATURE-----<br>_______________________________________________<br>The
 cryptography mailing list<br><a class="moz-txt-link-abbreviated" href="mailto:cryptography@metzdowd.com">cryptography@metzdowd.com</a><br><a class="moz-txt-link-freetext" href="http://www.metzdowd.com/mailman/listinfo/cryptography">http://www.metzdowd.com/mailman/listinfo/cryptography</a><br></div></div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px"> 	<div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="greg@kinostudios.com" photoname="Greg" 
src="cid:part1.01060703.04020007@gmail.com" 
name="compose-unknown-contact.jpg" height="25px" width="25px"></div>   <div
 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
   	<a moz-do-not-send="true" href="mailto:greg@kinostudios.com" 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Greg</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">Monday, November 
04, 2013 10:50 AM</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div>Could someone please 
forward this message to the Elders of the Internet™?<br><br>It's time to
 make encryption mandatory in all communication protocols.<br><br>Thx,<br><br>-
 Greg<br><br>--<br>Please do not email me anything that you are not 
comfortable also sharing with the NSA.<br><br></div><div>_______________________________________________<br>The
 cryptography mailing list<br><a class="moz-txt-link-abbreviated" href="mailto:cryptography@metzdowd.com">cryptography@metzdowd.com</a><br><a class="moz-txt-link-freetext" href="http://www.metzdowd.com/mailman/listinfo/cryptography">http://www.metzdowd.com/mailman/listinfo/cryptography</a></div></div>
</blockquote>
</body></html>

--------------020806030102000908080203
Content-Type: image/jpeg; x-apple-mail-type=stationery;
 name="compose-unknown-contact.jpg"
Content-Transfer-Encoding: base64
Content-ID: <part1.01060703.04020007@gmail.com>
Content-Disposition: inline;
 filename="compose-unknown-contact.jpg"
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--------------020806030102000908080203
Content-Type: image/jpeg; x-apple-mail-type=stationery;
 name="postbox-contact.jpg"
Content-Transfer-Encoding: base64
Content-ID: <part3.05050903.06000306@gmail.com>
Content-Disposition: inline;
 filename="postbox-contact.jpg"
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--------------020806030102000908080203
Content-Type: image/jpeg; x-apple-mail-type=stationery;
 name="postbox-contact.jpg"
Content-Transfer-Encoding: base64
Content-ID: <part4.01000107.09060909@gmail.com>
Content-Disposition: inline;
 filename="postbox-contact.jpg"
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--------------020806030102000908080203--

--------------060701030609030409090908--

--===============5642988608783486479==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============5642988608783486479==--

home help back first fref pref prev next nref lref last post