Feeds

Lavabit, secure email? Hardly, says infosec wizard Moxie Marlinspike

Claims of multiple security measures just 'promises,' researcher claims

SANS - Survey on application security programs

Former Lavabit proprietor Ladar Levison claims the new Dark Mail initiative he's cooking up with the team from Silent Circle will enable email that's virtually spy-proof, but according to at least one expert, the original Lavabit service was never all that secure to begin with.

"After all," security guru Moxie Marlinspike wrote in a blog post this week, "how is it possible that a service which wasn't supposed to have access to its users' emails found itself in a position where it had no other option but to shut down in an attempt to avoid complying with a request for the contents of its users' emails?"

The main problem with Lavabit's design, according to Marlinspike, is that each Lavabit user's private encryption key was stored on the Lavabit server. The key was itself encrypted with a password, true. But every time the user wanted to read an email, that password needed to be transmitted to the server, essentially negating any security.

"Unlike the design of most secure servers, which are ciphertext in and ciphertext out, this is the inverse: plaintext in and plaintext out," Marlinspike wrote. "The server stores your password for authentication, uses that same password for an encryption key, and promises not to look at either the incoming plaintext, the password itself, or the outgoing plaintext."

Those "promises," Marlinspike says, are essentially worthless.

For one thing, because he was in possession of every user's private key, all Levison would need to do to read your Lavabit email is intercept your password as it came into his server, use it to decrypt your private key, then use the private key to decrypt your mail. This is essentially what the Lavabit server did anyway; Levison just claims he never eavesdropped.

Even if he never did, however (and no one is suggesting he did), an attacker or a rogue employee who gained access to the Lavabit systems might not have been so scrupulous.

"The cryptography was nothing more than a lot of overhead and some shorthand for a promise not to peek," Marlinspike wrote. "Even though they advertised that they 'can't' read your email, what they meant was that they would choose not to."

Finally, an attacker that found a way to eavesdrop the communications between the server and the client would effectively negate all of the security mechanisms on the Lavabit server. The encryption, the passwords, the keys – none of it would really matter to an attacker with the ability to listen in over the wire, who would be able to obtain the user's password and unlock all of the rest.

Marlinspike says his criticisms of Lavabit aren't intended as attacks on Levison, but he does worry that the current effort to release the Lavabit code as an open source project will just lead to further vulnerable services that pretend to be secure.

"I think we should celebrate and support Ladar for making the hard choice that he did to at least speak out and let his users know they'd been compromised," he wrote. "However, I think we should simultaneously be extremely critical of the technical choices and false guarantees that put Ladar in that position."

The Reg has tried to contact Levison for comment on these matters, but our emails have bounced as undeliverable. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.