LWN.net Logo

The post-PRISM internet

By Jake Edge
September 18, 2013
LinuxCon North America

As the founder of the ownCloud project, Frank Karlitschek has spent a fair amount of time considering the issues surrounding internet privacy. The recent revelations of widespread internet surveillance embodied in the PRISM program (and other related efforts largely revealed by Edward Snowden) have, essentially, broken the internet, he said. Karlitschek came to LinuxCon North America in New Orleans to talk about that serious threat to the internet—one that he believes the free and open source software communities have a responsibility to help fix.

A longtime open source developer, Karlitschek has worked with KDE, opendesktop.org, along with the KDE-Look and GNOME-Look sites. After starting the ownCloud project, he also helped found an ownCloud company in 2012. OwnCloud is "both a company and a community", he said.

But Karlitschek wasn't there to talk about ownCloud. Instead, he turned to the news to highlight the problem facing the internet, noting a few headlines from the last few months on surveillance-related topics: the NSA circumventing internet encryption, "full take" (storing all data gathered), and XKeyscore. The latter is a program that collects "nearly everything a user does on the internet", and because of the "full take" strategy used, the data all gets stored. The NSA doesn't have the capacity to analyze all that data now, so it stores it for later analysis—whenever it somehow becomes "interesting". It turns out that if the budget is high enough, one can essentially "store the internet", he said.

[Frank Karlitschek]

While XKeyscore only gathers metadata, that metadata is still quite privacy invasive. It can include things like the locations of people, who is "friends" with whom, what search terms people use, what they buy, and so on. If an agency puts it all together in the context of a single person, it can lead to surprisingly revealing conclusions.

In other news, Karlitschek noted that man-in-the-middle attacks are increasing, at least partly due to the brokenness of the SSL certificate authority scheme. He also pointed to the shutdowns of Lavabit and Groklaw as recent events of note. And, "news from yesterday" that he had seen in the European press (and not really in the US press, at least yet) indicated that much of the worldwide credit card transaction data had been compromised and collected by secret services.

The surveillance is not just a problem for one country, he said, as there are secret services all over the world that are reading our data. It is not just a problem of the NSA or the US—everyone who uses the internet anywhere is affected. These agencies are not just reading the data either, as man-in-the-middle attacks can also be used to change the data that is being sent if that is of interest. It is important to realize that this surveillance covers all of the communication on the internet, which increasingly is data that is coming from our devices. The data collected by those devices is sometimes surprising, including phones that never turn off their microphones—or, sometimes, their cameras.

He asked the audience to raise their hands if they used various internet services (banking, search, ...) and got majorities for them all, until he came to the last question. "Who thinks private data on the internet is still private?", he asked—to zero raised hands.

"The internet is under attack", Karlitschek said. This network and infrastructure that "we all love" and have used for years is being threatened. This is a huge problem, he said, because it is "not just a fun tool", the internet is "one of the most important inventions" ever created. It enables a free flow of knowledge, which makes it the best communication tool invented so far. It is an "awesome collaboration tool" that enables projects like, for example, Linux. Without the internet, there would be no Linux today, he said. Many companies have been able to build businesses on top of the internet, but all of that is now threatened.

There are various possible responses to this threat. One could decide to no longer transmit or store private information on the internet, but there is a problem with that approach. More and more things are tied to the internet every day, so it is more than just the web browser. Smartphones, gaming consoles, and regular phone conversations all use the internet even without the user directly accessing it through the browser. "Not using the internet for private data is not really an option these days", Karlitschek said.

Another response would be to use ssh, rsync, GPG, and "super awesome encrypted Linux tools". There are a few problems with that idea. For one thing, we don't know that ssh and others are safe as there are "new problems popping up every day". In addition, the transmission may be encrypted successfully, but the endpoints are still vulnerable; either the client or server end could be compromised. Another problem is that regular users can't really use those tools because they aren't targeted at those who are not technically savvy.

One could also just decide not to care about the surveillance that is going on, but privacy is very important. He is from Germany, which has some experience with both right- and left-wing secret services that were unconstrained, he said—it leads to "bad things".

Who invented and built the internet, he asked. The answer is that "we invented it". There would be no internet in its current form without Linux, he said. If users had to buy a Sun system to run a web server, it would have greatly changed things. Beyond Linux itself, we created languages like Java, PHP, and JavaScript; and free databases, open protocols, and many applications. Because we built it, "we also have to fix it".

There are political aspects to the problem that the politicians are, supposedly, working on, but Karlitschek doesn't hold out much hope for that kind of solution. Technologists have to work on it so that the internet "works like it is supposed to". To try to define how the internet should work, he and others have come up with a list of eight user rights that are meant to help define "how a good internet works".

Those rights range from things like "own the data"—taking a photo and uploading it to some service shouldn't change the ownership, the same goes for texts, emails, and so on—to "control access"—the user decides on when and with whom to share data, not the service. The other rights are in the same vein; the idea is to put users firmly in control of their data and the access to it.

Karlitschek then looked at four areas of internet use (email/messaging, the web, social networking, and file sync/share/collaboration) to see how they stack up on a few different "open data" criteria. Email and the web have similar scores. Both are decentralized, people can host their own or fairly easily migrate to a new service, they use open protocols, and have open source implementations available. All of that is very good, but both fail in the encryption area. Email has encryption using GPG, but regular users don't use it (and many technical people don't either), while SSL encryption is largely broken because of a certificate model that places too much trust in large governments and organizations.

Social networking is "very bad" on these criteria, he said. It is centralized (there is just one Facebook or G+ provider), it can't be self-hosted, migration is nearly impossible (and friends may not migrate even if the data does), open protocols aren't used, open source implementations don't really exist (Diaspora didn't really solve that problem as was hoped), and so on.

Things are a bit better in the file sharing realm, but that is still mostly centralized without open protocols (there are APIs, but that isn't enough) and with no encryption (or it is done on the server side, which is hopeless from a surveillance-avoidance perspective). On the plus side, migration is relatively easy (just moving files), and there are some open source implementations (including ownCloud).

Overall, that paints a fairly bleak picture, so what can we do about it, he asked. For regular users, starting to use GPG encryption and hoping that it is safe is one step. Stopping reliance on SSL for internet traffic encryption and using a VPN instead is another, he said. VPNs are hard for regular users to set up, however. Using Linux and open source as much as possible is important because "open source is very good protection against back doors". He noted that there were two occasions when someone tried to insert a back door into KDE and that both were noticed immediately during code review. He strongly recommends on-premises file-sharing facilities rather than relying on the internet. Beyond that, users need to understand the risks and costs as security is never really black or white, it is "all gray".

Developers "have a responsibility here", he said. They need to build security into the core of all software, and to put encryption into everything. Looking at SSL and the certificate system should be a priority. Another area of focus should be to make secure software that is usable for consumers—it needs to be so easy to use that everyone does so. He showed two examples of how not to do it: a Windows GPG dialog for key management with many buttons, choices, and cryptic options and the first rsync man page, which is just a mass of options. Those are not solutions for consumers, he said.

He would like to have an internet that is "safe and secure", one that can be used to transfer private data. Two groups have the power to make that happen, but one, politicians, is unlikely to be of help as they are beholden to the secret services and their budgets. So it is up to us, "we have to fix the internet".

Two audience questions touched on the efficacy of current cryptographic algorithms. Karlitschek said that he was no expert in the area, but was concerned that the NSA and others are putting several thousand people to work on breaking today's crypto. It is tough to battle against so many experts, he said. It is also difficult to figure out what to fix when we don't know what is broken. That makes it important to support efforts like that of the Electronic Frontier Foundation to find out what the NSA and others are actually doing, so that we can figure out where to focus our efforts.

Outside of Karlitschek's talk, there is some debate over how the "broken internet" will ever get fixed—if, indeed, it does. Technical solutions to the problem seem quite attractive, and Karlitschek is not the only one advocating that route. Whether well-funded privacy foes, such as governments and their secret services, can ultimately overwhelm those technical solutions remains to be seen. Outlawing encryption might be seen as stunningly good solution by some, but the unintended side effects of that would be equally stunning. E-commerce without encryption seems likely to fail miserably, for example. Hopefully saner heads will prevail, but those who prey on fear, while spreading uncertainty and doubt along the way, are legion.

[ I would like to thank LWN subscribers for travel assistance to New Orleans for LinuxCon North America. ]


(Log in to post comments)

The post-PRISM internet

Posted Sep 19, 2013 5:51 UTC (Thu) by thedevil (subscriber, #32913) [Link]

IMHO, when we define people as *consumers*, we have already lost.

The only hope (just a hope, never a certainty) is to appeal to
*citizens* and then try have as many as possible aspire to that name.

The post-PRISM internet

Posted Sep 19, 2013 19:26 UTC (Thu) by hummassa (subscriber, #307) [Link]

The current commercial definition of "people" is "eyeballs", which are a "product". "Consumers" are the advertisers.

The post-PRISM internet

Posted Sep 19, 2013 7:51 UTC (Thu) by michaeljt (subscriber, #39183) [Link]

> For regular users, starting to use GPG encryption and hoping that it is safe is one step.

Does that mean that we expect regular users to securely manage and use GPG keys? Even securely managing passwords is a headache, and not just for the technically naive.

The post-PRISM internet

Posted Sep 19, 2013 9:49 UTC (Thu) by NAR (subscriber, #1313) [Link]

I'm not quite sure how GPG would help anyway. It does not encrypt the metadata and even for encrypted e-mails the public mailing list archives would store the e-mails in plain text, wouldn't they? These public archives also contain tons of possibly privacy-related metadata. If only the "important" e-mails are encrypted, that's also useful metadata for the agencies.

There's also the problem of keeping the endpoints secure. I guess GPG encryption would be useless for webmails because agencies can(?) read even the HTTPS traffic. I also wonder what would it take for any secret agency/criminal group to create a pirated Windows 7 image which does not need activation but has backdoors, keyloggers, etc. and put it out on torrent.

I'm afraid in the end this is a social problem and needs social/political solution, not technical.

By the way, I always thought that the internet was invented by US government agencies (ARPA and stuff like that), not by a free community.

The post-PRISM internet

Posted Sep 19, 2013 10:43 UTC (Thu) by khim (subscriber, #9252) [Link]

By the way, I always thought that the internet was invented by US government agencies (ARPA and stuff like that), not by a free community.

“US government agencies” funded both ARPANet and, later, early Internet, but it was developed by a free community. On the other side of the pond have retained control—which, of course, resulted in failure (although it was not admitted for many years and, in fact, people spend insane amount of time trying to paint Internet as some kind of “warped implementation” of this failure).

The post-PRISM internet

Posted Sep 19, 2013 13:59 UTC (Thu) by drag (subscriber, #31333) [Link]

Don't forget that also that the OSI protocol stack was a actual competitor to TCP/IP and quite a huge nightmare at that.

The thing to remember for the internet is that it only works because it's completely decentralized and entirely voluntary. There is a huge amount of people that have put significant technology into the internet.. some of it with funding originated from governments, but far far more has come from the private sector. You have billions of dollars, hundreds of thousands of different companies, millions of people that have had some input into the evolution of the internet.

People have chosen, voluntarially, to follow the protocols and rules set up by other organizations. They did it because it was in their own best interest and it's the huge number of individuals working together to solve their own individual problems is the only thing that makes the internet work.

If you try to depend on some central steering committee or government bureaucracy to be a guiding hand and force people through laws to conform to some specific consortium's vision of how the internet should of worked from their perspective in 1989 (or whatever) then it would of never worked.

Evolving, organic, decentralized, unregulated... these are the characteristics of a effective network spanning the globe.

The post-PRISM internet

Posted Sep 19, 2013 8:57 UTC (Thu) by oever (subscriber, #987) [Link]

The User Data Manifestor has as first entry this:

Own the data

The data that someone directly or indirectly creates belongs to the person who created it.

That seems vague to me. If I visit a web site, that creates an entry in the logs. Do I own that entry?

The post-PRISM internet

Posted Sep 19, 2013 10:28 UTC (Thu) by mikapfl (subscriber, #84646) [Link]

> If I visit a web site, that creates an entry in the logs. Do I own that entry?

Yes, that is my understanding. And, it also mostly is what I understand from German law. Over here you need permission of the user to store their IP address in a log, because the IP address is identifying data which is the "property" of the user/citizen. Note that most sites just put some "we will store your stuff, including your IP address" note into their terms of service, but as far as I understood courts say this only works if the user actively signs up and clicks through the terms of service. So for sites which do not require registration, the safe choice in Germany is to not store IP addresses or anything else which could identify the user; however, you are of course allowed to increment a counter or something along these lines, as this doesn't identify the user, so the user doesn't "own" the data anymore.
That policy strikes me as remarkably sane. And it is usually ignored by most service providers and website operators.

The post-PRISM internet

Posted Sep 19, 2013 10:55 UTC (Thu) by epa (subscriber, #39769) [Link]

That policy strikes me as a remarkably deranged; surely part of the implicit 'terms of service' of the Internet as a whole is that if you send somebody an IP packet, that packet is labelled with your IP address, and they are allowed to record that address.

The post-PRISM internet

Posted Sep 20, 2013 17:56 UTC (Fri) by giraffedata (subscriber, #1954) [Link]

surely part of the implicit 'terms of service' of the Internet as a whole is that if you send somebody an IP packet, that packet is labelled with your IP address, and they are allowed to record that address.

That seems pretty normal to me. I can think of lots of cases where a person is obviously sending information to someone and the recipient is not allowed to record it. For example, I believe there are laws in some places that a surveillance video has to be discarded after some short period (with various limitations on the subjects' ability to authorize keeping it longer). I know of laws that allow people to require credit cards or other ID documents as conditions of doing business, but do not allow them to record the numbers.

We do have to distinguish between the temporary recording implicit in using the information, like in the data structures that represent the TCP connection, and a log for future reference.

The post-PRISM internet

Posted Sep 20, 2013 18:18 UTC (Fri) by giraffedata (subscriber, #1954) [Link]

If visiting a web site is enough to qualify as indirectly creating the resulting log entry, then I'd have to agree that this is extremely vague, and it could lead to ridiculous results.

Maybe an author indirectly creates book reviews by publishing a book.

At the very least, it means every piece of data has a multitude of owners.

So I suspect that was not what the Manifesto had in mind. The idea that a visitor owns the web site log entry is an entirely separate concept - that a person owns information about himself.

The post-PRISM internet

Posted Sep 19, 2013 9:41 UTC (Thu) by glaesera (subscriber, #91429) [Link]

I follow him in so far as the internet made Linux possible in the first place and that vice versa the internet is now mostly built on Linux-infrastructure, because it has been a networking operating-system from the beginning.
We are still in the dark ages of the internet, the stone-age was probably before Linux' advent.
It is not widely known yet, that instead of feeding the NSA with lots of personal and private data by using that greatest search engine of all times, other services from its makers or doing the marketing-networking, that everyone likes so much, it is now possible to get information directly from the NSA in turn:
http://www.nsa.gov/public_info/declass/index.shtml
http://www.nsa.gov/public_info/declass/cryptologic_quarte...
http://www.nsa.gov/public_info/declass/cryptologic_spectr...
Quite a lot of documents and articles have been declassified and published there, and especially the ones about cryptography might be of interest for the Linux-world.


The post-PRISM internet

Posted Sep 19, 2013 12:54 UTC (Thu) by glaesera (subscriber, #91429) [Link]

If you are interested in them, you can also have a look at this:
https://en.wikipedia.org/wiki/Selinux
There are also links for further reading.

Fixing SSL with DANE

Posted Sep 20, 2013 12:44 UTC (Fri) by shane (subscriber, #3335) [Link]

Fixing SSL with DANE

Posted Sep 25, 2013 20:46 UTC (Wed) by copsewood (subscriber, #199) [Link]

I think this is an improvement over the current CA system, but far from a perfect solution. My own view here is the perfect should not be the enemy of the good. At least the Iranian secret police under DANE can only mess with servers and systems which use the .ir namespace. They can't interfere with every namespace as with the current CA system. Them and over 500 CA's who can presumably be leant upon by thousands of nasty government agencies.

Fixing SSL with DANE

Posted Sep 26, 2013 9:31 UTC (Thu) by shane (subscriber, #3335) [Link]

You make an interesting point about being able to limit risk to specific parts of the DNS hierarchy. This is nice, but also a bit scary considering that the root of the DNS is operated completely by companies in the US who are presumably subject to the Kafkaesque "National Security Letter" regime, where presumably the FBI could insist that the private keys to the DNS root be handed over and it would be illegal for ICANN to tell us about it.

However, I believe DANE can operate in a mode which is essentially strictly adding more checks, so you can fail an SSL verification if either the CA validation fails or the DNSSEC check fails. By selecting a CA that you somewhat trust who is in a different geographical & legal location from your DNS, I think you significantly improve your protection from undetectable attacks. (Of course, you increase your risk of DoS since if either the CA or your DNS parent decides to revoke your authentication you become insecure, but security is always about trade-offs!)

Fixing SSL with DANE

Posted Sep 26, 2013 21:51 UTC (Thu) by copsewood (subscriber, #199) [Link]

Yes, I've thought about the ICANN being leant upon problem, but I don't think this is very likely to be a great risk in practice because it raises the stakes so much. Not so much with .com and .net etc, but in connection with falsifying the address of TLD servers of a two letter domain e.g. .fr or .de which relates to another sovereign nation, and which would be very quickly spotted by many observers independently and quickly, the cost of the diplomatic outrage would more than offset the likely very transitory security advantage of being able to carry out such an attack through this means. Most of these things, from a practical if not a purist point of view, boil down to costs and benefits. Besides which, trying this trick once would likely be once too often, with the consequence of enough nations deciding they prefer the root domain to come under the ITU and mandating their national telecommunications to make use of an alternate ITU provided root. Until that happens, such a transfer to an alternate root seems somewhat less likely on pragmatic grounds.

The post-PRISM internet

Posted Sep 23, 2013 14:34 UTC (Mon) by cdmiller (subscriber, #2813) [Link]

Maybe the owncloud folks could start showing some developer responsibility of their "own" by no longer storing clear text passwords or claiming the revelation of folks passwords is not a security problem...

https://github.com/owncloud/core/issues/2718#issuecomment...

https://github.com/owncloud/core/issues/2502

The post-PRISM internet

Posted Sep 24, 2013 19:02 UTC (Tue) by lsl (subscriber, #86508) [Link]

As I see it from a glance over that bug report those passwords are used for authentication against other services and therefore must be present in cleartext form. Owncloud is supposed to run unattended, right? If there's no user to ask for some kind of password for the passwords with what key do you want to encrypt them? On machines without a TPM or similar there is no way to do that. Storing the passwords in the clear instead of obfuscating them is at least honest and doesn't provide a false sense of security.

Did I miss something?

Vote. Seriously. Register, learn, and vote.

Posted Sep 25, 2013 19:08 UTC (Wed) by vomlehn (subscriber, #45588) [Link]

As an experienced engineer, I am concerned when we focus exclusively on technical fixes. Yes, fix the technology whenever you can, but that approach will always have its limitations. So long as people are involved, people can break or fix problems. If you are fortunate enough to live in a democracy, know that it's not between politicians and "us". We still elect politicians, so they are still "us"; without our votes, they would not be in office. So, please, get involved. Go listen to your elected officials. Talk to them, get so they know you by name. Read their position papers. Ask the hard questions in public places. Register to vote. Run for election yourself. And, even if it's raining, vote!

Vote. Seriously. Register, learn, and vote.

Posted Sep 27, 2013 5:22 UTC (Fri) by DavidS (subscriber, #84675) [Link]

Thank you! Finally, a voice of sanity! As much as I would prefer a fully encrypted internet, the real problem is governments who believe that raping citizen's privacy is OK. And if we cannot convince our elected representatives, we're not living in a democracy, it in a elected tyranny.

I'm also wondering at the apparent hypocrisy of those US citizens who now nonchalantly claim to work on "securing" the internet, while it is obvious that the current legal situation means that they're only free to work on this until they are successful enough for the NSA to take note. In which case they can either betray their goals and users or go to jail.

Vote. Seriously. Register, learn, and vote.

Posted Sep 27, 2013 8:06 UTC (Fri) by andresfreund (subscriber, #69562) [Link]

> Thank you! Finally, a voice of sanity! As much as I would prefer a fully encrypted internet, the real problem is governments who believe that raping citizen's privacy is OK. And if we cannot convince our elected representatives, we're not living in a democracy, it in a elected tyranny.

Is it just me or is the use of the word "rape" or "raping" in contexts that haven't to do with either bothersome? At least for me it detracts and devalues the actual point somebody makes. Which I actually tend to agree with in this case.

Vote. Seriously. Register, learn, and vote.

Posted Sep 27, 2013 8:41 UTC (Fri) by paulj (subscriber, #341) [Link]

I think you need to look up the etymology of "rape". It has long meant "take by force", and that is still a common and accepted use in english.

Vote. Seriously. Register, learn, and vote.

Posted Sep 27, 2013 8:57 UTC (Fri) by andresfreund (subscriber, #69562) [Link]

Ok. Not being a native speaker I didn't know it's still used without a connotation. Doesn't change the fact that it's detracting to me though.

Vote. Seriously. Register, learn, and vote.

Posted Sep 27, 2013 9:17 UTC (Fri) by Quazatron (guest, #4368) [Link]

As much as I agree with you, change in meatspace happens at a glacial pace, so technical countermeasures that make it harder to conduct this kind of wholesale surveillance are need.

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds