From: Adam Back <aba@dcs.ex.ac.uk>
To: cypherpunks@cyberpass.net
Message Hash: 6c0a2704dee70072d9943f2f01ce473b23adcabbedcfd29cdb4978f8e6f9fd81
Message ID: <199710242007.VAA06753@server.test.net>
Reply To: <199710241855.UAA11936@basement.replay.com>
UTC Datetime: 1997-10-24 22:36:18 UTC
Raw Date: Sat, 25 Oct 1997 06:36:18 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sat, 25 Oct 1997 06:36:18 +0800
To: cypherpunks@cyberpass.net
Subject: Re: GAK on the cheap
In-Reply-To: <199710241855.UAA11936@basement.replay.com>
Message-ID: <199710242007.VAA06753@server.test.net>
MIME-Version: 1.0
Content-Type: text/plain
Anonymous writes:
> GAK fans!
>
> Here's a patch to PGP 2.6.2 to force it to encrypt all messages to the
> FBI key.
>
> Patch crypto.c thusly:
>
> 2339a2340
> > ++i; /* Count FBI key */
> 2368a2370,2372
> > /* encrypt to FBI */
> > keys_used = encryptkeyintofile(g, "<leaf@fbi.gov>", keybuf, keyfile,
> > ckp_length, keys_used);
>
> That's it. Four new lines, and every message is encrypted to the
> government as an additional recipient.
Wow, anonymous, you're a genius!
> Don't let the FBI see this. If so, we'll be <ominous voice> "one
> step from GAK". Add a few SMTP filters and we're doomed.
Errr.. there is one problem anonymous, _deployment_. How are you
going to deploy the above patch. Who is going to use it?
Close to zero I suspect.
However there are simply loads of people using pgp5.0, and I'm sure
pgp5.5 will be the same in a while.
It's not the triviality of making something that can be used for GAK
that the argument is about.
The argument is about PGP Inc pre-deploying it in 5.0, 5.5 all ready
for the switch to be flicked.
Adam
--
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
Return to October 1997
Return to “lutz@taranis.iks-jena.de (Lutz Donnerhacke)”