<div dir="ltr"><div>> Oh, quite the contrary. It just forces the attacker to get clever. <br></div><div>
<p style="font-family:"Segoe UI"">If your server only sends data through an "outgoing data diode", then it does
not expose any entry point (you just disable all services : no SSH, no ping, no
HTTP... nothing). There is no way you can establish a connection to the server. How can you hack a server if you have absolutely no way to
access it from the outside ? It seems just impossible.<br></p>
<p style="font-family:"Segoe UI"">Now if you also use an "incoming data diode" to receive data, then you have
no direct feedback. The only feedback you get is through the "outgoing data
diode." It will be very difficult to get information about the server internals
in this condition. Imagine : you have a black box and you try to model it from
indirect feedback. Although it is theoretically possible, it would be very
difficult. All depends on the resources you are intended to spend... Is the game
worth the candle?</p>
<p style="font-family:"Segoe UI"">To make this task even harder, you can make the feedback very difficult to
analyze. For example, you can voluntarily introduce randomness. GNUNET does it,
for example. When you send a message to a node, you also send "fake" messages to
many other nodes (chosen at random). A spy (man in the middle) could not
distinguish between "fake" and "real" messages... You can although randomly
delay the responses : measuring duration between responses won't give any usable
information. These are just examples. You can think of many ways to make life
harder to a "malicious man in the middle" that tries to reverse engineer your
system by collecting and analyzing data collected by observing your black box.</p><p style="font-family:"Segoe UI"">Denis<br></p></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">Le mar. 28 juil. 2020 à 21:59, Robert J. Hansen <<a href="mailto:rjh@sixdemonbag.org">rjh@sixdemonbag.org</a>> a écrit :<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">> Have you heard about data diodes ? If not, then you can read this<br>
> document<br>
> <<a href="https://owlcyberdefense.com/blog/what-is-data-diode-technology-how-does-it-work/" rel="noreferrer" target="_blank">https://owlcyberdefense.com/blog/what-is-data-diode-technology-how-does-it-work/</a>>.<br>
<br>
Strange but true: although I can't claim to have been on the research<br>
team that invented the data diode, I *was* on the research team that<br>
invented the first cheap optical data diode. We packaged it up into an<br>
Altoids tin. Total materials cost was under $100, and most of that was<br>
spent on the custom PCB.<br>
<br>
> Data diodes are unhackable because it relies on the law of physics...<br>
<br>
Oh, quite the contrary. It just forces the attacker to get clever.<br>
<br>
Our paper from 2006:<br>
<br>
<a href="https://www.usenix.org/legacy/event/evt06/tech/full_papers/jones/jones_html/index.html" rel="noreferrer" target="_blank">https://www.usenix.org/legacy/event/evt06/tech/full_papers/jones/jones_html/index.html</a><br>
<br>
<br>
_______________________________________________<br>
Gnupg-users mailing list<br>
<a href="mailto:Gnupg-users@gnupg.org" target="_blank">Gnupg-users@gnupg.org</a><br>
<a href="http://lists.gnupg.org/mailman/listinfo/gnupg-users" rel="noreferrer" target="_blank">http://lists.gnupg.org/mailman/listinfo/gnupg-users</a><br>
</blockquote></div>