You are not logged in.
Long story short, tcpcrypt is a new TCP extension and draft standard for automatic transport-layer encryption. Using it as simple as installing the package and running /etc/rc.d/tcpcryptd start
I created an AUR package here: http://aur.archlinux.org/packages.php?ID=40308
What does it do?
Opportunistic - automatically enabled if both ends support tcpcrypt, gracefully falls back to normal TCP if not
No configuration - Just works
Transparent - any regular TCP application can use it
No kernel compilation necessary - just run a daemon to enable (Eventually it'll be merged into the Linux kernel, but until then this is a VERY convenient solution)
Works on Linux, OSX, FreeBSD and Windows
Low overhead
It was recently covered in an LWN.net article and presented on USENIX Security Symposium. (IETF/RFC draft, Design paper PDF, tcpcrypt.org website)
Basically, it's what IPsec and TLS always should have been. The catch is, it doesn't do any authentication itself, but it makes it very easy for applications to do auhtentication (to prevent MITM etc). But un-authenticated encryption is still much better than no encryption at all.
They also have plans to improve TLS, such that encryption is done by tcpcrypt, with TLS only adding authentication (with PKI certificates as usual). In other words, both http:// and https:// would be encrypted with tcpcrypt, but https:// uses a server SSL certificate.
Testing
Record yourself among the first tcpcrypt users: Hall of Fame
If you install it on 2 machines, try ssh'ing between them and run tcnetstat -- it will show a list of connections
You can also test it by going to tcpcrypt.org; at the bottom it will say something like "Your tcpcrypt session ID is: DAC08BB7DBD2..."
In the worst case, the tcpcryptd daemon may crash and temporarily halt all your TCP connections. When that happens, run /etc/rc.d/tcpcryptd stop and un-encrypted connections will resume as if nothing happened
Please report bugs to their bug tracker: http://github.com/sorbo/tcpcrypt/issues
Last edited by intgr (2010-08-27 15:23:16)
Offline
Sounds pretty interesting.....downloaded and installed.
Offline
I noticed that it began to consume quite a bit of memory after a while...I had to restart the daemon when it filled my RAM.
Offline
I had to restart the daemon when it filled my RAM.
You're right, it leaks memory quite a lot. I hadn't noticed and looked now, it was well into 700MB RES
Anyway, I uploaded a new PKGBUILD version that excludes the "lo" (localhost) interface from being encrypted.
Offline
I reported the memory leak....
Offline
I've waited for the issue to be fixed, but it seems I can't run tcpcryptd currently :
tcpcryptd: nfq_unbind_pf(): Invalid argument
Iptable rules are changed but then I can't visit any website. Is the problem know or is it something specific to my computer ?
version : local/tcpcrypt-git 20101011-1
Offline
The memory leak in tcpcryptd has been fixed, so anyone who was turned off by this bug can start using it again.
I've waited for the issue to be fixed, but it seems I can't run tcpcryptd currently :
tcpcryptd: nfq_unbind_pf(): Invalid argument
Weird, I built tcpcrypt-git right now (20101011-1) and it's working as expected.
Can you install ltrace, run this command as root and post its output?
ltrace -l /usr/lib/libnetfilter_queue.so.1 -l /usr/lib/libnfnetlink.so.0 tcpcryptd
Thanks!
Last edited by intgr (2010-10-11 20:27:07)
Offline
Initializing...
nfq_open(0xb75c43a0, 0xb74ecdfd, 0x5c5c5c5c, 0xb75c2ff4, 0xb75c43a0) = 0x8b6c0b8
nfq_nfnlh(0x8b6c0b8, 0xb74ecdfd, 0x5c5c5c5c, 0xb75c2ff4, 0xb75c43a0) = 0x8b6cd90
nfnl_rcvbufsiz(0x8b6cd90, 0x100000, 0x5c5c5c5c, 0xb75c2ff4, 0xb75c43a0) = 0x200000
nfq_unbind_pf(0x8b6c0b8, 2, 0x200000, 0x100000, 0xb75c43a0) = -1
tcpcryptd: nfq_unbind_pf(): Invalid argument
+++ exited (status 1) +++
Offline
nfq_unbind_pf(0x8b6c0b8, 2, 0x200000, 0x100000, 0xb75c43a0) = -1 tcpcryptd: nfq_unbind_pf(): Invalid argument
What kernel version are you running? Did you compile a custom kernel?
I searched around a bit and I found people reporting this problem with other software on kernel version 2.6.23 (1 2 3 4)
Offline
Yes I'm running the eeepc kernel :
local/kernel-eee 2.6.35.6-1
If you wan't to see the kernel configuration :
http://code.toofishes.net/cgit/dan/eee.git/
I'll check if that works with the default kernel...
EDIT : It works on my main workstation.
Last edited by faelar (2010-10-13 19:35:02)
Offline
I reported your issue here: http://github.com/sorbo/tcpcrypt/issues#issue/2
It would be great if you can help to track down the problem.
Offline