1998-09-19 - Toto knows how to make a 0xdeadbeef attack?

Header Data

From: Adam Back <aba@dcs.ex.ac.uk>
To: cypherpunks@cyberpass.net
Message Hash: a3859d8db41b4360e8f7a087dbb5710ace7dd6b30ac69956e468a9f2ab556939
Message ID: <199809192107.WAA25895@server.eternity.org>
Reply To: N/A
UTC Datetime: 1998-09-19 08:44:59 UTC
Raw Date: Sat, 19 Sep 1998 16:44:59 +0800

Raw message

From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 19 Sep 1998 16:44:59 +0800
To: cypherpunks@cyberpass.net
Subject: Toto knows how to make a 0xdeadbeef attack?
Message-ID: <199809192107.WAA25895@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




As a result of my trawl through my cypherpunks archive last week
looking for publically posted private keys by Toto et al, I grepped
out a selection of encrypted messages sent to the list.  I thought I'd
have a go at decrypting these with the selection of passphrases John
Young posted earlier today, in case any were encrypted with the
publically posted keys, or with a conventional encryption key.

I came across this post [1] posted in 5 Sep 97 which contains this
encrypted message, and "challenge" to decrypt it.

Now if you try to decrypt it, it says you need key 0xE6A9C799, the
public key for which is on the key servers.  However keyids are
actually stored as 64 bits, internally to PGP messages, but only the
least significant 32 bits are displayed by PGP normally.  I use
pgpacket to look at things and it gives you all 64 bits, the message
has keyid:

	0xAA33463CE6A9C799

however the key I got off the keyserver [2] has keyid:

	0xAA33063CE6A9C799

which differs by 0x400000000000 or one bit.  That would require
knowing how to create a 0xdeadbeef key or at least use software to do
this, if it is available.

Unless the bit flip is part of the "challenge".  Who knows.

Toto did allude to hacking skills, though largely claimed ignorance.
I wonder if this was feigned, or if there are other Totos who are
doing the key hacks etc.  eg this challenge out of bureau42.ml.org
remailer.

Toto is a one man computer crypto forensics persons full-employment
insurance! -- the amount of stuff posted to the list with various
passwords, keys, etc.  The IRS guys must be either hiring some one who
knows crypto, or are going to be seriously confused at this point.
Then there's the use of S-Tools, they must be going boggle eyed
guessing passphrases for S-Tools for all the images ever posted
anonymously, or pseudonymously to the list.  One wonders almost if
this was his aim.

Any hints Toto(s)?  Firstly I haven't got the private key(s) for
0xAA33[0|4]63CE6A9C799, and secondly, what's the deal with the bit
flips/0xdeadbeef attacks?

My september forward secret key is below [3].  It is authenticated by
my high security key, and 12 days time or so, the private key gets
wiped.

Adam

[1]
======================================================================
Date: Fri, 5 Sep 1997 17:31:53 GMT
From: bureau42 Anonymous Remailer <remailer@bureau42.ml.org>
Comments: This message did not originate from the Sender address above.
        It was remailed automatically by anonymizing remailer software.
        Please report problems or inappropriate use to the
        remailer administrator at <remailer-admin@bureau42.ml.org>.
Subject: EFF $10,000,0000 Challenge
To: cypherpunks@toad.com
Sender: owner-cypherpunks@Algebra.COM
Precedence: bulk
X-Mailing-List: cypherpunks@algebra.com
X-List-Admin: ichudov@algebra.com
X-Loop: cypherpunks@algebra.com



The Electronic Forgery Foundation is proud to announce a major 
breakthrough in encryption technology -- Forged Encryption.

We are offering a prize of $10,000,000.00 for anyone who can
correctly decipher the following Forged Encryption message.

-----BEGIN PGP MESSAGE-----
Version: PGP for Personal Privacy 5.0
MessageID: od2CIT3fELE7K6bkIkKGJBj0MPUJ2TT8

hQCMA6ozRjzmqceZAQQAh02x0Dxer5vzZiSJ+v7bnMZQdgp425z5OH0NF/f/mXXc
vInw+UsuTXqWNEV5rEQKYjU3qHoe6suCz5f9hEEnOIBacsD28pYU4ahkGOCTuTY6
N3xKrtDRqLPInB8PY7Kfd56jjQsVVRKmJBwXqHbPax4YyUB6ZbKKvSPiuUsAAQSl
BAH3CFNKcmYjf+VtpjAVOpDNM/PMm1e6m33rZ01Sq6pXC0TTabCf7hkWscet0PCL
VX0l1Zw5IKaFqo+pZ3EICRMF6HQrc30G7L9TFeKr//3YsO3/bC4VBgNQHA0qf2nD
ldxAsTGPlRthBTxrzE0LjeOKi/pQOLXQMPQUwEIaL9rncjFgniplFoL6Nj0guJvW
VvS+gxth8hpeWss7WlFFioV0vShsS/lahA+eg/9nVy8ken8pr4m484w2vwoiSdce
CarVigVaRh6tCgh0jub7CHuDFg==
=Q9+G
-----END PGP MESSAGE-----

The EFF doesn't have a copy of the correct answer locked away in
a secret underground cave in Tibet, for verification, because
the above Forged Encryption message is just a bunch of crap we
typed in pretty much at random.

Does the government want to keep your private key in escrow? Give
them a copy of your EFF private key.
Hell, give them _two_ copies, in case one is corrupted.{;>) Smile
when you give them to the government agent. Ask him how his day
has been. Offer him some coffe, and ask about his family. Tell 
him you will send him a Christmas card with another copy of your
EFF private key, just in case the government misplaces the copies
you gave them.
Put your hand over your heart, salute the flag, and sing "God Bless
America" as the government agent leaves. Then fart.

Use the EFF Forged Encryption sofware regularly, to send messages
with Subject:'s like "The Plot Against the PREZ," "Confirmation of
the date of our armed assault," "The Nuke has arrived."
Keep a copy of your EFF Forged Encryption secret key in a directory
named "Off the Pigs." 
Most importantly, never reveal in your private email to others that
you are a deaf, dumb and blind quadraplegic who has been homebound
since birth. That way, the outrageous claims that government agents
make against you in their secret deposition for a warrant to kick
in your door and terrorize you will look all the more foolish during
your trial.

We at the Electronic Forgery Foundation realize that some of you wise
guys are thinking that, for $10 million, it is well worth your while
to write a program that will decipher the above message into something
meaningful. Well, knock yourself out, dudes, but if you think that
known forgers couldn't possibly be lying about the $10 million, then
go directly to http://www.clueserver/fucking_idiot, do not pass GO
and do not collect $200.

---------------------------------------------------------------------
  This message is copyrighted under the auspices of the Electronic 
  Forgery Foundation. Any misquoting, misrepresentation, or other
  abuse of this message would be greatly appreciated. Hell, you can
  tell people you wrote it, if you want to. We don't really care.
---------------------------------------------------------------------

[2] (long)keyid 0xAA33063CE6A9C799 (Toto <toto@sk.sympatico.ca>)
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 5.0
Comment: PGP Key Server 0.9.3-db2test
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=leOK
-----END PGP PUBLIC KEY BLOCK-----

[3]

Type Bits/KeyID    Date       User ID
pub  2048/86B519BD 1998/09/10 Adam Back <aba@dcs.ex.ac.uk> (FS key, Sep 98)

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
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=vpQX
-----END PGP PUBLIC KEY BLOCK-----





Thread