|  | <<  
             ^ 
              >> 
            
              | Date: 1999-08-17 
 
 Evaluation: Secure Freemail/services-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 
 Weil offensichtlich hohe Nachfrage besteht, schießen
 Freemail/services, die verschlüsselte E-Mail Services via WWW
 anbieten, nur so aus Boden. Bruce Schneier hat sich drei davon
 näher angesehen & bei allen mehr oder weniger grosse
 Sicherheitslücken entdeckt.
 
 Fazit:  Lieber doch S/MIME oder das gute alte PGP
 -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 ...
 HushMail <http://www.hushmail.com> is basically a PGP or S/MIME-
 like e-mail application that uses Java (although oddly enough,
 HushMail is not compatible with either).  The sender logs onto the
 HushMail Web site, and encrypts messages using a Java applet that
 is automatically downloaded onto his machine.  Both the sender and
 receiver need to have HushMail accounts for this to work.  Accounts
 can be anonymous.
 
 The algorithms are 1024-bit ElGamal for key exchange and
 signatures, and Blowfish for bulk encryption. But everyone's private
 key is stored on the HushMail server, protected in a passphrase.
 This means that one weak link is likely to be the passphrase; it's the
 only protection you have against someone who has legal or illegal
 access to the HushMail server.
 ..
 Another weak link is the Java applet.  When you download it, you
 have no idea if it is the correct applet.  Yes, the source code is
 public, but that doesn't help when you are at a public Internet
 terminal trying to encrypt or decrypt private e-mail.  A Trojaned Java
 applet can do all sorts of damage, and there is no way to know.
 ..
 This is actually a major problem.  The applet can be signed, but who
 signed it? Even if you check the certificate, the typical browser
 permits a dozen different PKI roots by default, and any one of them
 can issue a forged certificate.  This means you have to trust them all.
 And you have to trust that a Trojan didn't drop a phony certificate
 into your browser.  Note that a downloaded verifier can never solve
 this problem; it just turns the "how do I trust the applet" question into
 "how do I trust the verifier."
 ..
 All in all, though, HushMail seems like a reasonable implementation
 of the idea.  The company seems clued; they have a reasonably
 informative Web site, and respond promptly to security questions.
 
 ZipLip <http://www.ziplip.com> is different.  Both parties do not need
 an account to communicate.  The sender logs onto the ZipLip Web
 site and, using SSL, sends a message to someone else.  ZipLip
 then sends the recipient a message telling him that your message is
 waiting.  The recipient then logs onto ZipLip to receive the message.
 Encryption, outside the two SSL connections, is completely optional.
 
 ZipLip won't identify the encryption algorithm used, which is enough
 to discount them without further analysis.  But they do something
 even stupider; they allow the sender to create an encryption key and
 then give the recipient a "hint" so that he can guess it.  ZipLip's own
 Web site suggests: "The name of the project we're working on," or
 "The restaurant where we had dinner last night." Maybe there are
 100,000 restaurants, so that's a 17-bit key.
 
 The threats here are serious.  Both the sender and receiver need to
 verify their SSL connections, otherwise there is no security.  The
 ZipLip server is a major attack target, both because many messages
 will not be encrypted, and because those that are will have keys
 weakened by the requirement that both parties remember them.
 
 On the plus side, ZipLip claims a policy of deleting all mail 24 hours
 after delivery, which provides a level of lawyer-proofing that HushMail
 does not have...if they implement it properly.
 
 YNN-mail <http://www.ynnmail.com> is barely worth this paragraph.
 They encrypt stored messages with a 40-bit key, and don't use SSL
 when you sign up and send them a long-term password.  Snake-oil if
 I've ever seen it.
 
 And I just heard of another, ZixMail <http://www.zixmail.com/>.  I
 didn't have time to examine it in depth, but the FAQ -- look at their
 wishy-washy comments on encryption -- makes it sound like real
 snake oil, too.
 
 Web-based encrypted e-mail is less secure than PGP-encrypted e-
 mail (or S/MIME e-mail) for a few reasons.  One, the constant
 interaction between the communicants and the server leaves more
 opportunity for man-in-the-middle attacks, Trojan horses, etc.  Two,
 SSL-based authentication is more vulnerable to spoofing, since
 almost no one ever bothers to check the details of received
 certificates and there is no revocation mechanism in place.  And
 three, there are some very attractive attack targets: servers with large
 collections of secret e-mail and potential decryption keys.  Certainly
 Web-based encrypted e-mail is better than unencrypted e-mail, but
 I'd stick with PGP or S/MIME if possible.
 
 Source
 http://www.counterpane.com
 
 -.-  -.-. --.-
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 edited by Harkank
 published on: 1999-08-17
 comments to office@quintessenz.at
 subscribe Newsletter
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 <<  
                   ^ 
                    >>
 |  |  |  |