Moxie Marlinspike

Moxie Marlinspike

Marlinspike in 2013
Citizenship US
Fields Computer security,
Software architecture
Known for Open Whisper Systems (founder),[1]
Signal Protocol (co-author),
Convergence (author)
Website
moxie.org

Moxie Marlinspike (pseudonym[2]) is a computer security researcher and cypherpunk. His research has focused primarily on techniques for intercepting communication, as well as methods for strengthening communication infrastructure against interception. Marlinspike is the former head of the security team at Twitter[3] and founder of Open Whisper Systems.[1] He is the author of a proposed SSL authentication system replacement called Convergence,[4] co-author of the Signal Protocol, and a member of the Institute for Disruptive Studies.[5] He runs a cloud-based WPA cracking service[6] and manages a targeted anonymity service called GoogleSharing.[7]

Biography

Originally from the state of Georgia,[8] Marlinspike moved to San Francisco in the late 1990s.[9] He then worked for several technology companies, including enterprise infrastructure software maker BEA Systems Inc.[8][9] During the mid-2000s, Marlinspike bought a derelict 27-foot Catalina sailboat and, along with three friends, refurbished it and sailed around the Bahamas while making a documentary about their journey called Hold Fast.[8][9]

In 2010, Marlinspike was the chief technology officer and co-founder of Whisper Systems,[10] an enterprise mobile security startup company. In May 2010, Whisper Systems launched TextSecure and RedPhone. These were applications that provided end-to-end encrypted SMS messaging and voice calling, respectively. The company was acquired by the social-media firm Twitter for an undisclosed amount in late 2011.[11] The acquisition was done "primarily so that Mr. Marlinspike could help the then-startup improve its security".[9] During his time as head of cybersecurity at Twitter,[12] the firm made Whisper Systems' apps open source.[13][14]

Marlinspike left Twitter in early 2013 and founded Open Whisper Systems as a collaborative open source project for the continued development of TextSecure and RedPhone.[15][16][17] At the time, Marlinspike and Trevor Perrin started developing the Signal Protocol, an early version of which was first introduced in the TextSecure app in February 2014.[18] In November 2015, Open Whisper Systems unified the TextSecure and RedPhone applications as Signal.[19] Between 2014 and 2016, Marlinspike worked with WhatsApp, Facebook, and Google to integrate the Signal Protocol into their messaging services.[20][21][22]

Notable research

SSL stripping

In a 2009 paper, Marlinspike introduced the concept of SSL stripping, a man-in-the-middle attack in which a network attacker could prevent a web browser from upgrading to an SSL connection in a subtle way that would likely go unnoticed by a user. He also announced the release of a tool, sslstrip,[23] which would automatically perform these types of man-in-the-middle attacks.[24][25] The HTTP Strict Transport Security (HSTS) specification was subsequently developed to combat these attacks.

SSL implementation attacks

Marlinspike has discovered a number of different vulnerabilities in popular SSL implementations. Notably, Marlinspike published a 2002 paper[26] on exploiting SSL/TLS implementations that did not correctly verify the X.509 v3 "BasicConstraints" extension in public key certificate chains. This allowed anyone with a valid CA-signed certificate for any domain name to create what appeared to be valid CA-signed certificates for any other domain. The vulnerable SSL/TLS implementations included the Microsoft CryptoAPI, making Internet Explorer and all other Windows software that relied on SSL/TLS connections vulnerable to a man-in-the-middle attack. In 2011, the same vulnerability was discovered to have remained present in the SSL/TLS implementation on Apple Inc.'s iOS.[27][28] Also notably, Marlinspike presented a 2009 paper,[29] where he introduced the concept of a null-prefix attack on SSL certificates. He revealed that all major SSL implementations failed to properly verify the Common Name value of a certificate, such that they could be tricked into accepting forged certificates by embedding null characters into the CN field.[30][31]

Solutions to the CA problem

In 2011, Marlinspike presented a talk titled SSL And The Future Of Authenticity[32] at the Black Hat security conference in Las Vegas. He outlined many of the current problems with certificate authorities, and announced the release of a software project called Convergence to replace Certificate Authorities.[33][34] In 2012, Marlinspike and Trevor Perrin submitted an Internet Draft for TACK,[35] which is designed to provide SSL certificate pinning and help solve the CA problem, to the IETF.[36]

Cracking MS-CHAPv2

In 2012, Marlinspike and David Hulton presented research that makes it possible to reduce the security of MS-CHAPv2 handshakes to a single DES encryption. Hulton built hardware capable of cracking the remaining DES encryption in less than 24 hours, and the two made the hardware available for anyone to use as an Internet service.[37]

Traveling

Marlinspike says that when flying within the USA he is unable to print his own boarding pass, is required to have airline ticketing agents make a phone call in order to issue one, and is subjected to secondary screening at TSA security checkpoints.[38]

While entering the United States via a flight from the Dominican Republic in 2010, Marlinspike was detained for five hours; federal agents requested his passwords, and all his electronic devices were confiscated and then returned.[39]

Speaking engagements

Recognition

References

  1. 1 2 3 "Moxie Marlinspike - 40 under 40". Fortune. Time Inc. 2016. Retrieved 22 September 2016.
  2. Rosenblum, Andrew (26 April 2016). "Moxie Marlinspike Makes Encryption for Everyone". Popular Science. Bonnier Corporation. Retrieved 9 July 2016.
  3. Hern, Alex (17 October 2014). "Twitter's former security head condemns Whisper's privacy flaws". The Guardian. Retrieved 22 January 2015.
  4. Messmer, Ellen (12 October 2011). "The SSL certificate industry can and should be replaced". Network World. IDG. Archived from the original on 1 March 2014. Retrieved 25 September 2016.
  5. Greene, Tim (18 August 2011). "With SSL, who can you really trust?". Network World. IDG. Archived from the original on 20 October 2011. Retrieved 25 September 2016.
  6. "New Cloud-Based Service Steals Wi-fi Passwords". PC World. Retrieved 2013-12-09.
  7. "A Better Way To Hide From Google". Forbes. 2013-11-25. Archived from the original on 12 October 2013. Retrieved 2013-12-09.
  8. 1 2 3 Greenberg, Andy (31 July 2016). "Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us". Wired. Condé Nast. Retrieved 31 July 2016.
  9. 1 2 3 4 Yadron, Danny (9 July 2015). "Moxie Marlinspike: The Coder Who Encrypted Your Texts". The Wall Street Journal. Archived from the original on 10 July 2015. Retrieved 27 September 2016.
  10. Mills, Elinor (2011-03-15). "CNet: WhisperCore App Encrypts All Data For Android". News.cnet.com. Retrieved 2013-12-09.
  11. "Twitter Acquires Moxie Marlinspike's Encryption Startup Whisper Systems". Forbes. Retrieved 2013-10-04.
  12. Powers, Shawn M.; Jablonski, Michael (February 2015). The Real Cyber War: The Political Economy of Internet Freedom. University of Illinois Press. p. 198. ISBN 978-0-252-09710-2. JSTOR 10.5406/j.ctt130jtjf.
  13. Chris Aniszczyk (20 December 2011). "The Whispers Are True". The Twitter Developer Blog. Twitter. Archived from the original on 24 October 2014. Retrieved 22 January 2015.
  14. "RedPhone is now Open Source!". Whisper Systems. 18 July 2012. Archived from the original on 31 July 2012. Retrieved 22 January 2015.
  15. Yadron, Danny (10 July 2015). "What Moxie Marlinspike Did at Twitter". Digits. The Wall Street Journal. Archived from the original on 18 March 2016. Retrieved 27 September 2016.
  16. Andy Greenberg (29 July 2014). "Your iPhone Can Finally Make Free, Encrypted Calls". Wired. Retrieved 18 January 2015.
  17. "A New Home". Open Whisper Systems. 21 January 2013. Retrieved 11 July 2015.
  18. Donohue, Brian (24 February 2014). "TextSecure Sheds SMS in Latest Version". Threatpost. Retrieved 14 July 2016.
  19. Greenberg, Andy (2 November 2015). "Signal, the Snowden-Approved Crypto App, Comes to Android". Wired. Condé Nast. Retrieved 24 November 2015.
  20. Metz, Cade (5 April 2016). "Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People". Wired. Condé Nast. Retrieved 2 August 2016.
  21. Greenberg, Andy (8 July 2016). "'Secret Conversations:' End-to-End Encryption Comes to Facebook Messenger". Wired. Condé Nast. Retrieved 24 September 2016.
  22. Greenberg, Andy (18 May 2016). "With Allo and Duo, Google Finally Encrypts Conversations End-to-End". Wired. Condé Nast. Retrieved 24 September 2016.
  23. "sslstrip". Thoughtcrime.org. Retrieved 2013-12-09.
  24. Greenberg, Andy (18 February 2009). "Breaking Your Browser's Padlock". Forbes. Archived from the original on 27 February 2014.
  25. Kelly Jackson Higgins February 24, 2009 (2009-02-24). "SSLStrip Hacking Tool Released". Darkreading.com. Retrieved 2013-12-09.
  26. "BasicConstraints Vulnerability". Retrieved 2013-12-09.
  27. Apple iOS Bug Worse Than Advertised/
  28. "iPhone data interception tool released". Scmagazine.com.au. 2011-07-27. Retrieved 2013-12-09.
  29. "More New Tricks For Defeating SSL In Practice". Youtube.com. 2011-01-15. Retrieved 2013-12-09.
  30. Zetter, Kim (2009-07-30). "Vulnerabilities Allow Attackers To Impersonate Any Website". Wired.com. Retrieved 2013-12-09.
  31. Goodin, Dan (2009-07-30). "Wildcard certificate spoofs web authentication". Theregister.co.uk. Retrieved 2013-12-09.
  32. "SSL And The Future Of Authenticity". Youtube.com. 2011-08-18. Retrieved 2013-12-09.
  33. "New SSL Alternative". Informationweek.com. Retrieved 2013-12-09.
  34. "Future of SSL in doubt?". Infosecurity-magazine.com. 2011-08-09. Retrieved 2013-12-09.
  35. "Trust Assertions For Certificate Keys". Tack.io. Retrieved 2013-12-09.
  36. Goodin, Dan (2012-05-23). "SSL fix flags forged certificates". Arstechnica.com. Retrieved 2013-12-09.
  37. New Tool From Moxie Marlinspike Cracks Some Crypto Passwords (Archive.org-Link)
  38. Mills, Elinor (2010-11-18). "Security researcher: I keep getting detained by feds". News.cnet.com. Retrieved 2013-12-09.
  39. Zetter, Kim. "Another Hacker's Laptop, Cellphones Searched At Border". Wired.com. Retrieved 2013-12-09.
  40. "DEF CON 17 - Moxie Marlinspike - More Tricks for Defeating SSL". YouTube. DEF CON. Retrieved 22 January 2015.
  41. "DEF CON 18 - Moxie Marlinspike - Changing Threats To Privacy: From TIA to Google". YouTube. DEF CON. Retrieved 22 January 2015.
  42. "DEF CON 19 - Moxie Marlinspike - SSL And The Future Of Authenticity". YouTube. DEF CON. Retrieved 22 January 2015.
  43. "DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2". YouTube. DEF CON. Retrieved 22 January 2015.
  44. "Webstock '15: Moxie Marlinspike - Making private communication simple". Vimeo. Webstock. Retrieved 22 April 2015.
  45. "Moxie Marlinspike". Shuttleworth Foundation. n.d. Retrieved 25 September 2016.
This article is issued from Wikipedia - version of the 11/30/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.