aboutsummaryrefslogtreecommitdiff
path: root/slides/2021-aha/src/body.tex
blob: 0778fe7772109266493a524e08de5f34820b4875 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
%
% Title page
% - Hi everyone
% - Welcome to my talk <tile>
% - I'm Rasmus
% -- I work in the TCR group together with Fredrik and others
% -- I've been here since September, and it started out as an internship.  Then
% we decided to prolong that into something more permanent.
% -- I am also aff. with Kau, where I do my PhD studies.
% -- Surprise surprise, my thesis is about transparent logs.
%

\begin{frame}
	\vfill
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\mktitle{Outline}
			\begin{enumerate}
				\item Transparent Logging
					\begin{itemize}
						\item Why? % Let's talk DigiNotar
						\item How? % Let's talk CT
						\item What? % What should you make transparent
					\end{itemize}
				\item ``System Transparency Logging''
			\end{enumerate}
		\end{column}
		\begin{column}{0.5\textwidth}
			\centering
			\includegraphics[width=\columnwidth]{img/rgdd}
			\burl{https://creativecommons.org/licenses/by-sa/4.0/}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	\vfill
	\begin{columns}
		\begin{column}{0.45\textwidth}
			\mktitle{Let's travel in space and time}
			\begin{itemize}
				\item June, 2011
				\item Netherlands, Beverwijk
				\item DigiNotar
			\end{itemize}
		\end{column}
		\begin{column}{0.55\textwidth}
			\centering
			\includegraphics[width=\columnwidth]{img/beverwijk}
			\burl{https://creativecommons.org/licenses/by-sa/3.0/}
			% https://commons.wikimedia.org/wiki/File:Nzkanaal2.jpg
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	%
	% To give you the backdrop.
	%
	% DigiNotar was a so-called certificate authority that issues web certs
	% - If this means nothing to you, it is sort of like passports but for
	% websites.  In real life we have a trusted government body that is
	% responsible of issuing our passports.  We trust that a passport will not
	% be issued for us unless we can prove that we are who we say we are.
	% - In the digital world certificate authorities play this role but for
	% websites.  This way, you can be sure that you are really visiting
	% mullvad.net, and not someone that is impersonating our domain.
	%
	% So, the expectation here is that you would only issue a certificate to the
	% rightful domain owner.  At minimum, this requires some identity checking.
	%
	% Let's get back to what happened then.
	%
	% It turns out that DigiNotar was hacked.  They issued fraudulent
	% certificates for Google, Facebook, Twitter, Mozilla, Tor, and many others.
	%
	% This was detected by DigiNotar a week after the incident.
	% - They decided to be silent.
	%
	% The only reason why we detected this is because of a large scale attack
	% in Iran, which targeted 300k gmail users.  If the attacker had been more
	% stealthy, we probably would not have detected the attack.
	%
	% Fortunately we did detect the attack.  Soon thereafter, none of the major
	% browser trusted DigiNotar anymore.  In September, a bankruptcy was filed.
	%
	\vfill
	\begin{columns}
		\begin{column}{0.45\textwidth}
			\mktitle{What happened?}
			\begin{itemize}
				\item DigiNotar issued web certificates
				\item Did not live up to expectations
				\item Then lied about it for weeks
			\end{itemize}
		\end{column}
		\begin{column}{0.55\textwidth}
			\centering
			\includegraphics[width=\columnwidth]{img/diginotar}
			\burl{https://www.bbc.com/news/technology-14989334}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	%
	% What to make of this then?
	%
	% First of all, DigiNotar was neither the first nor the last.  Many
	% certificate authorities messed up before them.  Many certificate
	% authorities messed up after them.
	%
	% It would be incredibly helpful if we could detect if a certificate
	% authority makes mistakes.  In the case of certificate management,
	% detection really comes down to the ability of discovering which
	% certificates have been issued for whom.
	%
	% From this intuition the idea of Certificate Transparency is simple.
	% - Talk about figure.
	% - Emphasize that the log is not a trusted party due to crypto magic.
	%
	\vfill
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\mktitle{What to make of this}
			\begin{itemize}
				\item DigiNotar was neither first nor last\footnotemark
				\item Detection of certificate mis-issuance?
				\item Discoverability with transparent logs\footnotemark
			\end{itemize}
		\end{column}
		\begin{column}{0.5\textwidth}
			\input{img/ct}
		\end{column}
	\end{columns}
	\vfill
	\pause
	\centering\alert{Chrome and Safari enforce Certificate Transparency}

	\footnotetext[1]{\burl{https://sslmate.com/certspotter/failures}}
	\footnotetext[2]{\burl{https://certificate.transparency.dev/}}
\end{frame}

\begin{frame}
	%
	% Okay, great that we have transparency for certificates.  Does that mean
	% are done?
	%
	% The short answer is no.  We are definitely not done.  There is still a lot
	% of remaining work with Certificate Transparency.  There is even more work
	% left to do when we think about other use-cases of transparency logging.
	%
	% (Use do you get the same binaries as everyone else for example, leave the
	% rest for them to think about if they want to)
	%
	\mktitle{Transparency logging is good for more than just certificates}
	Source code \\
	Binaries \\
	Config files \\
	TPM quotes \\
	Media content \\
	Tax declarations \\
	Documents of ownership \\
	BGP announcements \\
	Tor's consensus \\
	... \\
	\vfill
	\pause
	\alert{The log we are working on is helpful for all these use-cases!}
\end{frame}

%
% https://curl.se/download.html
%
\begin{frame}
	%
	% 1. Introduce the setup.  Daniel represents many software projects.
	% 2. How would you know if your private key got compromised?
	%
	\mktitle{Example use-case\#1}
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\mktitle{Meet Daniel}
			\begin{itemize}
				\item The author of \texttt{curl}
				\item Digitally signs new releases
				\item Long-term signing key-pair
			\end{itemize}
		\end{column}
		\begin{column}{0.5\textwidth}
			\centering
			\includegraphics[height=.6\textheight]{img/curl}
			\burl{https://creativecommons.org/licenses/by-sa/4.0/}
		\end{column}
	\end{columns}
\end{frame}

%
% https://arxiv.org/pdf/2104.06020.pdf, page 6 for the challenge.
%
\begin{frame}
	%
	% 1. What is R-B.
	% 2. Challenge
	% 3. How I think that challenge could be approached
	%
	\mktitle{Example use-case\#2}
	\begin{columns}
		\begin{column}{0.6\textwidth}
			\mktitle{Meet the R-B project}
			\begin{itemize}
				\item Same input gives the same output
				\item Consensus of ``valid'' checksum?
			\end{itemize}
		\end{column}
		\begin{column}{0.4\textwidth}
			\centering
			\includegraphics[width=\columnwidth]{img/rb}
			\burl{https://creativecommons.org/licenses/by-sa/4.0/}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	\mktitle{Problem summary}
	\vfill
	\begin{columns}
		\begin{column}{0.125\textwidth}
		\end{column}
		\begin{column}{0.75\textwidth}
			\begin{enumerate}
				\item Which signatures were produced by what private keys?
				\item Consensus of checksums that should be considered valid?
			\end{enumerate}
		\end{column}
		\begin{column}{0.125\textwidth}
		\end{column}
	\end{columns}
	\vfill
\end{frame}

\begin{frame}
	%
	% 1. Introduce the system.  Think first two paragraphs in design.md
	%
	\mktitle{Our starting point}
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\begin{itemize}
				\item Data publisher
				\item End-user
				\item Assumptions
					\begin{itemize}
						\item Public key can be located
						\item Signed data can be located
						\item End-user can install extra tooling
					\end{itemize}
			\end{itemize}
		\end{column}
		\begin{column}{0.5\textwidth}
			\centering
			\input{img/before}
		\end{column}
	\end{columns}
	\vfill
	\pause
	\alert{The attacker can compromise the data publisher}\\
	\pause
	\alert{The goal is to detect unwanted key-usage}
\end{frame}

\begin{frame}
	%
	% 1. Our design is about transparency logs.  So, I need to explain briefly
	% what a transparency log is.
	% 2. Append-only Merkle tree.  You can think of the data as being stored in
	% the leaves.  Each leaf is hashed.  Parents concatenate their children
	% hashes to produces their own hash values.  Repeat until single root hash.
	% 3. The root hash is usually called a tree head.
	% 4. Tree head interesting because it fixes the structure and the content of
	% the tree.  Add/remove/modify -> new tree head.
	% 5. If the log signs the tree head, you can hold it accountable for its
	% structure and content.
	% 6. This is important because the attacker can control the log.
	% 7. So we cannot trust that the log is append-only.  We will need to verify
	% that.  To this end we have consistency proofs.  The intuition is that you
	% can force the log to reveal a number of cryptographic hashes.  These
	% hashes will prove that the tree head you see today is consistent with the
	% tree head you saw yesterday.
	% 8. You can also prove that something is in the log efficiently.  This is
	% called an inclusion proof.  The intuition is that you reveal a number of
	% hashes.  If you can use them to reconstruct the root of a globally
	% consistent tree head you can be sure that some data is in the log.
	% 8. Global consistency (as opposed to just consistency) is what prevents
	% the log from creating forks.  I will return to this later on because it is
	% an important part of our design.
	% (9. Not having global consistency would be like having a blockchain
	% without a consensus mechanism.)
	%
	\mktitle{An intuition of transparency log properties}
	\input{img/mt}
	\vfill
	\begin{columns}
		\begin{column}{0.33\textwidth}
			\begin{itemize}
				\item Tree head
			\end{itemize}
		\end{column}
		\begin{column}{0.33\textwidth}
			\begin{itemize}
				\item Consistency proof
			\end{itemize}
		\end{column}
		\begin{column}{0.33\textwidth}
			\begin{itemize}
				\item Inclusion proof
			\end{itemize}
		\end{column}
	\end{columns}
	\vfill
	\pause
	\alert{The attacker can control the log}
\end{frame}

\begin{frame}
	\mktitle{Preparing a logging request}
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\begin{itemize}
				\item Select a shard hint and checksum
				\item Sign using your private key
			\end{itemize}
		\end{column}
		\begin{column}{0.5\textwidth}
			\lstinputlisting[style=CStyle]{img/tree-leaf.trunnel}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	\mktitle{Submitting a logging request}
	\begin{columns}
		\begin{column}{0.2\textwidth}
			\underline{Key-value pairs:}
			\begin{itemize}
				\item Shard hint
				\item Checksum
				\item Signature
				\item Public key
				\item Domain hint
			\end{itemize}
		\end{column}
		\begin{column}{0.8\textwidth}
			\centering
			\input{img/log-request}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	\mktitle{Distributing proofs of public logging}
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\begin{itemize}
				\item End-user will not talk to the log
				\item Proofs of logging
					\begin{itemize}
						\item Inclusion proof
						\item Tree head
					\end{itemize}
				\item Witness cosigning
			\end{itemize}
		\end{column}
		\begin{column}{0.5\textwidth}
			\centering
			\input{img/after}
		\end{column}
	\end{columns}
	\pause
	\alert{The attacker can control a threshold of witnesses}
\end{frame}

\begin{frame}
	\mktitle{Example use-case\#1}
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\mktitle{Remember Daniel?}
			\begin{itemize}
				\item Sign a checksum of each \texttt{curl} release
				\item Start logging every signed checksum
				\item Monitor the log for your own leaves
			\end{itemize}
		\end{column}
		\begin{column}{0.5\textwidth}
			\centering
			\includegraphics[height=.6\textheight]{img/curl}
			\burl{https://creativecommons.org/licenses/by-sa/4.0/}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	\mktitle{Example use-case\#2}
	\begin{columns}
		\begin{column}{0.6\textwidth}
			\mktitle{Remember the R-B project?}
			\begin{itemize}
				\item Sign the expected checksum of each build
				\item A valid checksum is a logged checksum
				\item Rebuilders validate logged checksums
			\end{itemize}
		\end{column}
		\begin{column}{0.4\textwidth}
			\centering
			\includegraphics[width=\columnwidth]{img/rb}
			\burl{https://creativecommons.org/licenses/by-sa/4.0/}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	\mktitle{Summary and feature overview}
	\begin{columns}
		\begin{column}{0.5\textwidth}
			\begin{itemize}
				\item Signed checksums
				\item Sharding
				\item Preserved data flows
				\item Anti-spam
				\item Global consistency
				\item Few simple parsers
				\item No cryptographic agility
			\end{itemize}
		\end{column}
		\begin{column}{0.5\textwidth}
			\includegraphics[width=\columnwidth]{img/clean}
		\end{column}
	\end{columns}
\end{frame}

\begin{frame}
	\vfill
	\begin{columns}
		\begin{column}{0.7\textwidth}
			\mktitle{Current status}
			\begin{itemize}
				\item Version v0 README and documentation\footnotemark
				\item A public instance of the log is up and running
				\item At least one party is witnessing the log
				\item Come say hello and contribute if you want!
					\begin{itemize}
						\item \texttt{irc/oftc \#siglog}
						\item Matrix bridge\footnotemark
						\item Open meetings every Tuesday, 1300
					\end{itemize}
			\end{itemize}
		\end{column}
		\begin{column}{0.3\textwidth}
			\centering
			\includegraphics[width=\columnwidth]{img/thanks}
		\end{column}
	\end{columns}
	\footnotetext[1]{\burl{https://github.com/system-transparency/stfe/}}
	\footnotetext[2]{\burl{https://app.element.io/\#/room/\#siglog:matrix.org}}
\end{frame}