LWN: Comments on "Ubuntu to store copies of all users' address books" https://lwn.net/Articles/356911/ This is a special feed containing comments posted to the individual LWN article titled "Ubuntu to store copies of all users' address books". en-us Fri, 29 Aug 2025 12:36:17 +0000 Fri, 29 Aug 2025 12:36:17 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net AES security https://lwn.net/Articles/357438/ https://lwn.net/Articles/357438/ pharm <div class="FormattedComment"> Yes, a thinko on my part.<br> </div> Sun, 18 Oct 2009 16:08:00 +0000 AES security https://lwn.net/Articles/357347/ https://lwn.net/Articles/357347/ ABCD <div class="FormattedComment"> <font class="QuotedText">&gt; Just using the same encryption algorithm twice with two different keys of</font><br> <font class="QuotedText">&gt; size N does not increase the exhaustive search time from 2^n to 2^2n,</font><br> <font class="QuotedText">&gt; thanks to meet-in-the-middle attacks, which reduce the time to 4^n.</font><br> <p> I think there is a mistake somewhere in there, because 2^(2n) = (2^2)^n = 4^n.<br> </div> Fri, 16 Oct 2009 20:08:54 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357344/ https://lwn.net/Articles/357344/ mmahut <div class="FormattedComment"> Not really, I'm sure many head hunters would love to have my address book which is full of specific targets, mostly of colleagues and friends with same technical/career orientation.<br> </div> Fri, 16 Oct 2009 19:58:55 +0000 AES security https://lwn.net/Articles/357341/ https://lwn.net/Articles/357341/ brouhaha <div class="FormattedComment"> The meet in the middle attack reduces the time from 2^(2n) to 2^(n+1). This is why 3DES (even with 168 bits of keying) only effectively gives 112 bits of security. That's why I didn't propose 4DES, which wouldn't have any improvement in security over 3DES. However, my proposed 6DES would give 168 bits of security, or 8DES sould give 224, etc. 6DES has the advantage that you can use an existing 3DES implementation twice.<br> <p> However, that's just the time complexity. The meet in the middle attack also requires storage for 2^n blocks, which is obviously not available for n=112, let alone larger values of n.<br> <p> </div> Fri, 16 Oct 2009 19:22:09 +0000 AES security https://lwn.net/Articles/357299/ https://lwn.net/Articles/357299/ pharm <div class="FormattedComment"> Just using the same encryption algorithm twice with two different keys of size N does not increase <br> the exhaustive search time from 2^n to 2^2n, thanks to meet-in-the-middle attacks, which reduce <br> the time to 4^n. IOW in return for doubling your key size you've increased the search time by a <br> factor of 2: That doesn't seem a good tradeoff.<br> <p> Leave designing encryption algorithms to the experts: Personally, I know just enough to know that I <br> don't know anything like enough to start designing my own encryption schemes.<br> </div> Fri, 16 Oct 2009 13:02:35 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357279/ https://lwn.net/Articles/357279/ cas <div class="FormattedComment"> to me, blocking spam and ignoring/filtering advertising is extracting the tiny signal from all the noise.<br> <p> if i want to buy something, i'll go looking for it. until then, i DO NOT WANT TO HEAR ABOUT IT. EVEN IF IT'S EXACTLY THE KIND OF THING I MIGHT WANT.<br> <p> ads have one of two different effects on me:<br> <p> 1. i ignore them, filter them out, just plain don't notice them.<br> <p> 2. if they get past my mental filter, it's invariably because they're excruciatingly annoying or offensive. that product and company gets blacklisted by me, instantly, until i forget the annoyance (usually permanent because i have a good memory).<br> <p> <p> the creepiness factor of targeted advertising definitely qualifies as offensive for these purposes. that results in not only the product/company being boycotted but also whoever they got my details from - e.g. if it was a company i've bought from in the past, i am instantly and permanently an ex-customer.<br> <p> <p> from my POV, all advertising is spam (because 1. it drowns out the signal and 2. it's unsolicited - i *never* ask for advertising) and i don't want any of it. email spam, phone spam, tv spam, door-knocking spam, political spam, religious spam, pamphlet and flyer spam, billboard and other street spam - it's all the same, it's all just spam.<br> <p> <p> <p> <p> </div> Fri, 16 Oct 2009 10:32:04 +0000 AES security https://lwn.net/Articles/357265/ https://lwn.net/Articles/357265/ brouhaha I'm sufficiently paranoid that I much prefer 3DES to either AES128 or AES256. AES hasn't been subjected to anywhere near the amount of cryptanalysis as DES. If I didn't think 112 bits of key was enough to withstand brute-force attacks, I'd use two rounds of 3DES with different sets of keys (6DES). Fri, 16 Oct 2009 07:40:50 +0000 Howto fix the problem: https://lwn.net/Articles/357180/ https://lwn.net/Articles/357180/ dlang <div class="FormattedComment"> you are not the common case (neither am I), we can and do take steps like this so that we do not have a single point of failure.<br> <p> we also don't need a service like this because we can replicate and protect things ourselves.<br> <p> this service is intended for people who otherwise are not backing things up, let alone replicating an encryption key for the backup.<br> </div> Thu, 15 Oct 2009 17:39:08 +0000 Howto fix the problem: https://lwn.net/Articles/357179/ https://lwn.net/Articles/357179/ dlang <div class="FormattedComment"> you would be amazed at the number of people so do not protect their important documents like this.<br> </div> Thu, 15 Oct 2009 17:37:03 +0000 Howto fix the problem: https://lwn.net/Articles/357178/ https://lwn.net/Articles/357178/ dlang <div class="FormattedComment"> and a flood or fire would destroy your printout as well as your computer.<br> </div> Thu, 15 Oct 2009 17:36:16 +0000 Howto fix the problem: https://lwn.net/Articles/357164/ https://lwn.net/Articles/357164/ drag <div class="FormattedComment"> I save my important passwords on a LUKS-encrypted SD card. (it is small and <br> fits in my wallet and my laptops have SD support) <br> <p> The LUKS password is relatively simple (plain english phrase), but it <br> should be enough to protect it if I drop it somewhere. <br> <p> When you plug it into a Linux Gnome desktop automatically prompts you for <br> the password and opens up the folder for you. So it is very convenient.<br> <p> I can't recommend this approach to normal folks because it only works if <br> you plug it in rarely. If you leave it plugged in all the time then it is <br> no better then having it in a folder.<br> <p> But what is better (in terms of security) would be to print out keys into <br> ascii armor format or write down passwords to a hard copy. That way they <br> are impossible to hack! A person would have to physically break into my <br> house and search through my drawers and filing tower to find it. <br> </div> Thu, 15 Oct 2009 16:33:23 +0000 Howto fix the problem: https://lwn.net/Articles/357163/ https://lwn.net/Articles/357163/ drag <div class="FormattedComment"> <font class="QuotedText">&gt; do you want to run the risk of loosing everything if you loose the </font><br> password? or are you willing to take the risk that someone will break in <br> through the Canonical security, download your data, dig through it to find <br> something interesting, and take action on it?<br> <p> <p> It is easy to keep a password or key safe. Print it out into a hard copy <br> and put it in a secure place with the rest of my critical documentation <br> (automobile title, birth certificate, mortgage information, etc etc)<br> <p> Then it is win on both sides. As long as you make it absolutely known that <br> Canonical has no knowledge and cannot ever retrieve the password for you <br> then I think that is acceptable.<br> <p> I suppose if customers trust Canonical then they can just send them the <br> key/password to keep track of. It would be a lot easier to keep that safe <br> then a "cloud".<br> </div> Thu, 15 Oct 2009 16:23:28 +0000 Howto fix the problem: https://lwn.net/Articles/357145/ https://lwn.net/Articles/357145/ zooko <div class="FormattedComment"> Tarsnap seems like a well-engineered system, from reading the author's blog, but as far as I know <br> the server-side code is proprietary. The Tahoe-LAFS project (I'm a contributor) has excellent <br> encryption and erasure-coding features and if you like duplicity you can use Tahoe-LAFS as a <br> backend for duplicity. Also Tahoe-LAFS comes with its own integrated backup system which has <br> different trade-offs than the duplicity backend. (Duplicity does deltas for you, but you can't view or <br> download your files without going through duplicity. The Tahoe-LAFS integrated backup doesn't do <br> deltas, but it stores the files in a time-machine-style layout which you can browse and download <br> through the web.)<br> <p> </div> Thu, 15 Oct 2009 16:01:15 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357143/ https://lwn.net/Articles/357143/ zooko <div class="FormattedComment"> Hm, actually Tahoe-LAFS might fit into that use case pretty well... But again I'm pushing my own <br> idea here when this thread is about Canonical's UbuntuOne. If you are interested in exploring <br> privacy-compatible storage and sync and then maybe join the tahoe-dev mailing list. :-)<br> <p> Regards,<br> <p> Zooko<br> </div> Thu, 15 Oct 2009 15:57:16 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357137/ https://lwn.net/Articles/357137/ jengelh <div class="FormattedComment"> They do not even need to tapper it in; since it's not handwritten, OCR should do.<br> </div> Thu, 15 Oct 2009 15:00:31 +0000 Howto fix the problem: https://lwn.net/Articles/357100/ https://lwn.net/Articles/357100/ sourcejedi <div class="FormattedComment"> Won't help. They still need their launchpad password.<br> <p> If you can trust someone to hold your launchpad password in escrow, you can surely trust them to do the same with your encryption password.<br> <p> In practice, I suspect you can just reset your launchpad password by email. So you have to rely on your ISP resetting your email password when you forget _that_. And that they don't go bust or disconnect you for using too much bandwidth making online backups :-)...<br> <p> Yes, many people are likely to accept this service given the choice. But this is a pretty low bar to pass. We can and should do better.<br> </div> Thu, 15 Oct 2009 13:19:52 +0000 Howto fix the problem: https://lwn.net/Articles/357098/ https://lwn.net/Articles/357098/ sourcejedi <div class="FormattedComment"> Try encfs + rsync. Encfs will encrypt both file content and names. (It won't hide filesizes, directory topology, permissions, and the approximate _lengths_ of filenames).<br> <p> <a href="http://ubuntuforums.org/showthread.php?t=148600">http://ubuntuforums.org/showthread.php?t=148600</a><br> <p> </div> Thu, 15 Oct 2009 13:09:10 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357090/ https://lwn.net/Articles/357090/ sourcejedi <div class="FormattedComment"> From experience, I don't recommend it though :-). There's another one-liner that goes 'Ubuntu is African for "person who cannot configure debian'. You have to plan on a spending some time up-front on configuration.<br> <p> E.g. on Ubuntu, setting automatic updates works out of the box. On Debian, "anacron" isn't part of the default desktop task (only the laptop one). If you turn your computer off to save your electricity bill, it won't pick up the updates at midnight or whenever they are scheduled for. You need "anacron" to catch up on the scheduled task(s) which you "missed" while the computer was turned off.<br> <p> -<br> Back on-topic... this sounds really ignorant to me. Mozilla have already shown you can do sync with encryption, (it's a labs project called Weave); there's no need to pass the server my personal data in plaintext.<br> </div> Thu, 15 Oct 2009 12:46:51 +0000 Check out Tarsnap https://lwn.net/Articles/357088/ https://lwn.net/Articles/357088/ fghorow <div class="FormattedComment"> From Colin Percival, the (Free?)BSD Security officer.<br> <p> Just a happy user of the service.<br> <p> (Be aware, it is a *for a fee* service, but the micropayments are truly micro!)<br> </div> Thu, 15 Oct 2009 12:26:51 +0000 Howto fix the problem: https://lwn.net/Articles/357083/ https://lwn.net/Articles/357083/ endecotp <div class="FormattedComment"> <font class="QuotedText">&gt; I am very uninterested in any sort of "cloud" backup </font><br> <font class="QuotedText">&gt; scheme that does not integrate encryption on the client </font><br> <font class="QuotedText">&gt; side.</font><br> <p> Does anyone know how to get rsync-like functionality with the data at the other end stored encrypted?<br> <p> I currently use rsync over ssh for some of my backups, so the data is encrypted on the wire but unencrypted on the remote disk. When I set this up I tried to find a way of storing the remote copy encrypted without losing rsync's efficient incremental transfers, but I didn't find anything satisfactory. Any ideas?<br> </div> Thu, 15 Oct 2009 11:06:10 +0000 Howto fix the problem: https://lwn.net/Articles/357079/ https://lwn.net/Articles/357079/ nix <div class="FormattedComment"> If the encryption key is relatively 'bare' (i.e. it's not made clear in the keyfile what service's data it's encrypting), just keep the encryption key on a USB key. Even if you drop it on a train, nobody who picks it up will have a clue what it's meant to decrypt.<br> <p> (Now everyone else can tell me how stupid this idea is.)<br> <p> </div> Thu, 15 Oct 2009 10:14:00 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357075/ https://lwn.net/Articles/357075/ jamesh <div class="FormattedComment"> One of the planned offerings is mobile synchronisation (via the SyncML found in most handsets capable of synchronisation). I'm not sure how client side encryption would work with that.<br> <p> But all the client code is free software, so if you didn't care about the mobile sync feature you could implement something like this.<br> </div> Thu, 15 Oct 2009 09:51:27 +0000 AES security https://lwn.net/Articles/357067/ https://lwn.net/Articles/357067/ job <div class="FormattedComment"> If you are paranoid you should use AES128 instead of 256 as there are indications that the larger key isn't diffused properly.<br> </div> Thu, 15 Oct 2009 08:25:13 +0000 Howto fix the problem: https://lwn.net/Articles/357066/ https://lwn.net/Articles/357066/ ekj <div class="FormattedComment"> I have a laptop, it does backups to a fileserver in the basement. It also does encrypted backups to a backup-service on the internet. The latter is there for the case that our house is burglarised, or burn down, or some other disaster destroys BOTH laptop AND fileserver at the same time.<br> <p> And yes, if that happens AND I've forgotten the password for the encryption, it's acceptable for me to suffer data-loss. We're talking miniscule probabilities here. (I'd have to forget the password I use for logging in every day at the precise same time that something catastrophic happens at home. That's a level of risk that is entirely acceptable to me.)<br> <p> Sending my entire digital world to some random company on the internet, for them and anyone that aquires, breaks into, subpoenas or otherwise gains access to their servers ? No thank you, not interested.<br> </div> Thu, 15 Oct 2009 08:02:39 +0000 Howto fix the problem: https://lwn.net/Articles/357063/ https://lwn.net/Articles/357063/ dlang <div class="FormattedComment"> do you want to run the risk of loosing everything if you loose the password? or are you willing to take the risk that someone will break in through the Canonical security, download your data, dig through it to find something interesting, and take action on it?<br> <p> I would not use their service personally (I would do the client-side encryption and keep track of the key), but I know a lot of users who I would recommend use something like this so that when they trash their system badly enough that they need to reinstall their systems they will still have their data. Many of these users have trouble remembering one password for their system, let alone taking appropriate actions to protect an encryption key.<br> </div> Thu, 15 Oct 2009 07:22:18 +0000 Howto fix the problem: https://lwn.net/Articles/357052/ https://lwn.net/Articles/357052/ drag <div class="FormattedComment"> For important things I write down my passwords and put them in my wallet. <br> Then I also save another copy somewhere else. <br> <p> The choice is simple really. <br> <p> <p> Do you want to keep track of a password..<br> or depend on the security of every machine in Canonical, every workstation <br> in the data center that people come into contact with that people use to <br> access administrative portions of the "cloud"? Do want to trust the <br> security of every machine on the cloud? Do you want to trust every <br> employee, every administrator, every janitor that access to the machines <br> that house your data?<br> <p> All in all it is a massive undertaking trying to keep data safe and <br> security for what will be practically forever if you take the approach that <br> users should take no responsibility for their data!<br> <p> And it's hugely expensive undertaking, to boot. It is virtually impossible <br> to do in correct manner if you think about it.<br> <p> Meanwhile if your job is to handle already encrypted data then it is much <br> simpler. You could post your customer's data to craigslist and not have to <br> worry about it.<br> <p> It is not difficult to print out copies of your keys into ascii armor <br> format and put a hard copy in a secure place. People do that shit all the <br> time with all sorts of documents. They rent out lock boxes in banks, go and <br> get fire-proof safes at Walmart for 50 bucks, and all sorts of stuff like <br> that.<br> <p> (and, frankly, the notion that you should never write down your passwords <br> or create hard copies of your keys is one of the worst pieces of security <br> "common sense" I have had the misfortune to run into over and over again.)<br> <p> If you value your data and want to be able to use Ubuntu's cloud service <br> for anything other then a toy or a cheap way to sync address books then <br> client-side encryption is just the obvious way to go from my perspective. <br> I could be wrong, but it makes sense to me.<br> </div> Thu, 15 Oct 2009 05:33:21 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357050/ https://lwn.net/Articles/357050/ lacostej <div class="FormattedComment"> To me, targeted advertising is signal out of the random advertising noise...<br> </div> Thu, 15 Oct 2009 05:10:32 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357042/ https://lwn.net/Articles/357042/ lysse <div class="FormattedComment"> But nor do I particularly want to give anyone else the opportunity to examine in forensic detail just how sad and featureless my life is...<br> </div> Thu, 15 Oct 2009 04:25:25 +0000 Traffic analysis can surprise https://lwn.net/Articles/357039/ https://lwn.net/Articles/357039/ dlang <div class="FormattedComment"> if someone is after you specifically, _anything_ you do can be significant.<br> <p> however, if someone is not after you specifically, but is just after things that they can sell, it becomes much easier to have reasonable defenses<br> <p> "I don't have to outrun the bear, I just have to outrun you"<br> <p> with "you" being enough other users that the bad guys don't get around to bothering with me.<br> <p> yes, this is security by obscurity, and if someone decides to go after you it doesn't help much, but the reality is that for the vast majority of people this really is good enough.<br> </div> Thu, 15 Oct 2009 04:15:16 +0000 Howto fix the problem: https://lwn.net/Articles/357037/ https://lwn.net/Articles/357037/ dlang <div class="FormattedComment"> the only issue with encrypting the data before you send it up to the cloud is where you store your encryption keys.<br> <p> if you loose those keys you loose your data, so it does no good to store your data in multiple places if your keys only exist on one machine.<br> <p> for many people who do not have good ways to store the keys, they are actually better of in many ways with the data in the clear so that they can pull it back down to a replacement machine if something happens to the first one.<br> <p> yes, this is not good from a security point of view, but in this case the security risks need to be balanced against the availability risks. which one is more important will vary from person to person.<br> </div> Thu, 15 Oct 2009 04:09:32 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357035/ https://lwn.net/Articles/357035/ rahvin <div class="FormattedComment"> While you are at it, include all your bookmarks so your hobbies and interests can be indexed and categorized and targeted advertising delivered. <br> </div> Thu, 15 Oct 2009 04:02:31 +0000 Traffic analysis can surprise https://lwn.net/Articles/357027/ https://lwn.net/Articles/357027/ jreiser <div class="FormattedComment"> The date and time of contact with the database are useful to those who might want to track you and those with whom you communicate. A Snoop can learn a lot by correlating that data with all the other data that is available. Many times the result is "only" classification into broad categories, but sometimes a very specific inference can be drawn.<br> </div> Thu, 15 Oct 2009 02:27:28 +0000 Howto fix the problem: https://lwn.net/Articles/357026/ https://lwn.net/Articles/357026/ drag <div class="FormattedComment"> Yeah. I don't think that couchdb does any sort of encryption either. <br> <p> I am very uninterested in any sort of "cloud" backup scheme that does not <br> integrate encryption on the client side. <br> <p> Why? (a person may ask) A few reasons. Whether or not a person should trust <br> a third party corporation is entirely up to debate... when the encryption <br> on the client side then it is not a matter of debate; whether you trust <br> them or not is irrelevant. <br> <p> The other thing is that it makes storage side a lot cheaper and a lot <br> easier to implement. I don't have to worry so much about security... A <br> attacker could break the system and corrupt my data, but there is no <br> information leakage possible. So while things like TLS and hashing of the <br> data is important from a identity management and data integrity point of <br> view it is entirely unimportant to prevent things like identity theft or <br> whatever. The worst thing that could possibly happen is a DOS attack.<br> <p> This makes things cheaper; I only have to keep a database of hashes and <br> check those periodically and authenticate writes, but reads can be done by <br> anybody and I wouldn't really care... so data preservation techniques like <br> "lots of copies all over the place" is easy to implement and can be spread <br> out over lots of organizations without having to care exactly what those <br> organizations are doing. <br> <p> As you can imagine that if I was a third party provider of storage that <br> this sort of approach would massively reduce the amount of headaches I have <br> to deal with.<br> </div> Thu, 15 Oct 2009 02:18:40 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357022/ https://lwn.net/Articles/357022/ sitaram <div class="FormattedComment"> awesome... I hate to decrease SNR on LWN, but this was a fantastic one-liner :)<br> </div> Thu, 15 Oct 2009 01:36:07 +0000 Howto fix the problem: https://lwn.net/Articles/357019/ https://lwn.net/Articles/357019/ msebast <div class="FormattedComment"> Yes. Encryption should be part of the marketing message. Make it clear that the only thing Canonical knows is that you stored some data and they can't tell what's in there.<br> <p> I guess Elilot Murphy's email was intended for people who already know what couchDB is. <br> <p> I've heard about couchDB a few times but never seen any mention of encryption. So I've always assumed this is something I don't want and didn't investigate further.<br> <p> </div> Thu, 15 Oct 2009 01:19:18 +0000 Howto fix the problem: https://lwn.net/Articles/357012/ https://lwn.net/Articles/357012/ drag <div class="FormattedComment"> Like what? That I use Evolution or not? How much information I feel like <br> backing up?<br> <p> I really doubt there is much useful information that anybody could gleam from <br> syncing to a online backup share other then the location of the firewall I <br> was operating behind at the time I did my last sync.<br> </div> Thu, 15 Oct 2009 00:11:23 +0000 Howto fix the problem: https://lwn.net/Articles/357010/ https://lwn.net/Articles/357010/ gdt <p>Even with encryption, traffic analysis can still reveal information you'd rather keep private.</p> Wed, 14 Oct 2009 23:42:42 +0000 Yes, encryption option would solve all problems https://lwn.net/Articles/357004/ https://lwn.net/Articles/357004/ coriordan I'm also interested to hear if this has been discussed. Wed, 14 Oct 2009 22:04:36 +0000 Ubuntu to store copies of all users' address books https://lwn.net/Articles/357003/ https://lwn.net/Articles/357003/ coriordan <div class="FormattedComment"> No. You can transition without planning :-)<br> </div> Wed, 14 Oct 2009 21:54:25 +0000 I'll take privacy over innovation https://lwn.net/Articles/357002/ https://lwn.net/Articles/357002/ coriordan <div class="FormattedComment"> When I sit down at my computer, I don't think to myself "Oh, I hope the applications I'm using are innovative".<br> <p> My privacy, on the other hand, is something I do think about.<br> </div> Wed, 14 Oct 2009 21:53:22 +0000