Delivery-Date: Thu, 08 Oct 2015 22:53:17 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 4B4D81E1465;
	Thu,  8 Oct 2015 22:53:15 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 18F3B3789C;
	Fri,  9 Oct 2015 02:53:10 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 604013789E
 for <tor-talk@lists.torproject.org>; Fri,  9 Oct 2015 02:53:06 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id xS0MpCApalTx for <tor-talk@lists.torproject.org>;
 Fri,  9 Oct 2015 02:53:06 +0000 (UTC)
Received: from mail-lb0-x234.google.com (mail-lb0-x234.google.com
 [IPv6:2a00:1450:4010:c04::234])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 00A4B3789C
 for <tor-talk@lists.torproject.org>; Fri,  9 Oct 2015 02:53:05 +0000 (UTC)
Received: by lbcao8 with SMTP id ao8so67349773lbc.3
 for <tor-talk@lists.torproject.org>; Thu, 08 Oct 2015 19:53:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :content-type; bh=fGPPmsuxpj7QFO77sQ2GBiCou70I0rds/85AtZNL7JY=;
 b=Rx+FhbhnWSib1/b/2k8kDMnt54Z+9XjVOwA99yVzHUz0DHq3amHUueiURDSxcOASjk
 uK7qoXeMYPNMXBFj9Wvc/FlzlvDg5qX3qOAYwfGKygf78Gj8zBhudlC8e7mIzVJr4RIW
 b5g4Kr1n7znZjhIxKYZV6eRKbWLZzss9o1XbJuMODRrKAwZtYbfAitE6tBpkmlIWSxDt
 jyBQwcvQlzbZY3zbCHc8pT33JxCZaSz3pZBDcDCOkiYIVI/bTSt4IgmUrAZDZ817/yPi
 TDGAY/i4aualhwrOWF/MFtvfd7NNZEJm9lJdsFmw0ZT2NMgsT/OtetuUdG3ow5zaSkzn
 9CMA==
MIME-Version: 1.0
X-Received: by 10.112.200.202 with SMTP id ju10mr5149676lbc.97.1444359182785; 
 Thu, 08 Oct 2015 19:53:02 -0700 (PDT)
Received: by 10.25.145.142 with HTTP; Thu, 8 Oct 2015 19:53:02 -0700 (PDT)
In-Reply-To: <20151008191015.GC30048@localhost.localdomain>
References: <5609B662.8010702@cryptolab.net> <560A62FD.7070308@pimienta.org>
 <829658081.4249.1443539214512.JavaMail.open-xchange@ox1app>
 <560B1BEF.20203@bitmessage.ch>
 <CAJVRA1T_7RJEHQv9wcbTwSnv+05cKxE2TmRUYa08oTRYPDddeA@mail.gmail.com>
 <20151008191015.GC30048@localhost.localdomain>
Date: Thu, 8 Oct 2015 19:53:02 -0700
Message-ID: <CAJVRA1SA22F4OHeTinPB+-Oqjsy8qS9bmfrEyH7hY2N1qBsNVw@mail.gmail.com>
From: coderman <coderman@gmail.com>
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] pidgin and tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 10/8/15, sh-expires-12-2015@quantentunnel.de
<sh-expires-12-2015@quantentunnel.de> wrote:
> ....
> One of the major problems is the design of Pidign, which tries
> to build a convenient IM client before it takes security into
> consideration

"security vs. usability", as ever...



> Still, it is possible to a achieve a high degree of privacy.
> The amount of "security" will vary and depend on many factors.
>
> A vm is none of them:
> Confining it, doesn't make it more secure, and it mitigates nothing in
> pidgin or libpurple. A broken IM client is still broken, even when
> confined (I am tempted to say buried) in a VM.

consider the Tor Browser PDF exploit that accessed $HOME for keys and other.

if Tor Browser (and Pidgin) are isolated from each other, this $HOME
type attack of reduced risk.

one example.



> If OP has to rely on an IM, like pidgin or a protocol, there is no more
> or added "security" by putting it into a vm or container.
> All he gains is isolation in a best case scenario.

do you not see the benefit in isolating applications at risk of rogue
remote execution?

i agree it is not the only security measure, nor the most important.
but it is useful, and that is why i mention it. more useful would be
using a secure client, but, again, usability.



> Honestly, let's recommend a more secure implemenation
> of the protocol OP wishes to use and educate OP how to use it in
> a manner, that neither privacy and anonymity of the involved parties
> are compromised and the authenticity of the exchanged messages is given.

i disagree with this approach. make the secure usable. don't force
users to adapt to "secure".



> Using Tor with Pidgin, we are at a disadvantage...
> If security is a result of good design, good design is when there
> is nothing left to remove and the design is still secure.

so, you're going to design and implement a usable, secure chat and presence?
:)


> Contrary to the popular misconception, that security is some kind of
> fairydust, product or duct-tape that we can apply to protocols or software
> afterwarts.

actually, i saw this Kickstarter the other day...  ;P


best regards,
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

