Feeds

Lavabit, secure email? Hardly, says infosec wizard Moxie Marlinspike

Claims of multiple security measures just 'promises,' researcher claims

Securing Web Applications Made Simple and Scalable

Former Lavabit proprietor Ladar Levison claims the new Dark Mail initiative he's cooking up with the team from Silent Circle will enable email that's virtually spy-proof, but according to at least one expert, the original Lavabit service was never all that secure to begin with.

"After all," security guru Moxie Marlinspike wrote in a blog post this week, "how is it possible that a service which wasn't supposed to have access to its users' emails found itself in a position where it had no other option but to shut down in an attempt to avoid complying with a request for the contents of its users' emails?"

The main problem with Lavabit's design, according to Marlinspike, is that each Lavabit user's private encryption key was stored on the Lavabit server. The key was itself encrypted with a password, true. But every time the user wanted to read an email, that password needed to be transmitted to the server, essentially negating any security.

"Unlike the design of most secure servers, which are ciphertext in and ciphertext out, this is the inverse: plaintext in and plaintext out," Marlinspike wrote. "The server stores your password for authentication, uses that same password for an encryption key, and promises not to look at either the incoming plaintext, the password itself, or the outgoing plaintext."

Those "promises," Marlinspike says, are essentially worthless.

For one thing, because he was in possession of every user's private key, all Levison would need to do to read your Lavabit email is intercept your password as it came into his server, use it to decrypt your private key, then use the private key to decrypt your mail. This is essentially what the Lavabit server did anyway; Levison just claims he never eavesdropped.

Even if he never did, however (and no one is suggesting he did), an attacker or a rogue employee who gained access to the Lavabit systems might not have been so scrupulous.

"The cryptography was nothing more than a lot of overhead and some shorthand for a promise not to peek," Marlinspike wrote. "Even though they advertised that they 'can't' read your email, what they meant was that they would choose not to."

Finally, an attacker that found a way to eavesdrop the communications between the server and the client would effectively negate all of the security mechanisms on the Lavabit server. The encryption, the passwords, the keys – none of it would really matter to an attacker with the ability to listen in over the wire, who would be able to obtain the user's password and unlock all of the rest.

Marlinspike says his criticisms of Lavabit aren't intended as attacks on Levison, but he does worry that the current effort to release the Lavabit code as an open source project will just lead to further vulnerable services that pretend to be secure.

"I think we should celebrate and support Ladar for making the hard choice that he did to at least speak out and let his users know they'd been compromised," he wrote. "However, I think we should simultaneously be extremely critical of the technical choices and false guarantees that put Ladar in that position."

The Reg has tried to contact Levison for comment on these matters, but our emails have bounced as undeliverable. ®

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.