From: Adam Back <aba@dcs.ex.ac.uk>
To: shamrock@cypherpunks.to
Message Hash: dc233afbfcd14170ac3977ba3f7d5a5b9232ac30f9e8b2e47498bddb7c9508a8
Message ID: <199710271050.KAA00998@server.test.net>
Reply To: <Pine.BSF.3.96.971027073312.10658A-100000@pakastelohi.cypherpunks.to>
UTC Datetime: 1997-10-27 11:31:08 UTC
Raw Date: Mon, 27 Oct 1997 19:31:08 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 27 Oct 1997 19:31:08 +0800
To: shamrock@cypherpunks.to
Subject: pgp2.x is dangerous too (Re: PGP Employee on MKR)
In-Reply-To: <Pine.BSF.3.96.971027073312.10658A-100000@pakastelohi.cypherpunks.to>
Message-ID: <199710271050.KAA00998@server.test.net>
MIME-Version: 1.0
Content-Type: text/plain
Lucky Green <shamrock@cypherpunks.to> writes:
> On Fri, 24 Oct 1997 mark@unicorn.com wrote:
> >
> > If you can explain the following, then I'll accept that my fears are merely
> > fantasies:
>
> OK, I must be missing something. How can it be more evil if the email
> isn't automatically sent to the owner of the MK key than if the email is
> automatically cd'ed?
Uh.. I think you've hit on the center of the problem here.
Here's my take on it:
CMR is potentially dangerous because it can be abused; therefore make
things which are harder to abuse for government communications
snooping.
pgp2.x is potentially dangerous because it can be abused; therefore
make things which are harder to abuse for government communications
snooping.
I think pgp2.x is potentially dangerous too -- the only difference
being that no-one that I know was widely deploying policy enforcers
for it.
Yes even easy to write code has to be deployed -- deployment is the
larger part of the battle, clearly. TIS has been selling GAKware for
years, and no-one much is using it, as one example. Passing a law
over-night that everyone must downgrade to TIS GAKware is problematic
-- people will revolt, even companies who have no political stance,
just because of the hassle of it.
Interoperability matters. If we can widely deploy software which
needs to `unpublished' to deploy GAK, we've built some additional
resistance to GAK. (With Luckian outlook, this will be a delay rather
than a prevention, but it's still a net good).
Standards matter too -- if we widely deployed a Internet mail standard
(say OpenPGP:-) which would have to be modified in non-backwards
compatible ways to introduce government communications message
snooping, we'd have enormous resistance to GAK. This is because it
becomes international -- if the US doesn't switch to GAK, then a
France which tries will face problems: cut themselves off, or not do
it, or attempt to do it, but have it unenforceable even for
non-technical users.
Now the main point isn't that CMR and policy enforcer is ever so
slightly more dangerous than pgp2.x, the point is that pgp5.x is being
widely deployed; and that people are switching from pgp2.x to 5.x
(especially due to limited backwards compatibility being used to
encourage move to non-patented algorithms).
Say, for the sake of argument, that OpenPGP adds a MUST or a SHOULD
feature to have some kind of forward secrecy. Say this feature gets
deployed everywhere. (I'm sure we'll all be 100% behind that one!)
Numerous anti-GAK features have been proposed. PFS TLS, which as I've
shown can be authenticated via the existing PGP WoT is one way (easy
to bolt on to existing PGP SMTP agents -- another weekends hack at
most). Providing opportunistic PFS inside the PGP message envelope by
sending new keys with messages, which may be used to reply in a
forward secret manner, and basing data recovery features on storage
recovery where possible are others.
Deploy such features. Deploy such standards.
Imagine trying to revoke SSL standard to make it non forward secret.
(Government recovery of web traffic, yeah). That'd be a tough one,
right?
I presume that is part of C2's motivation in delploying 128 bit web
servers, and 40 <-> 128 bit local proxies to uprate browser security.
> > 1. How PGP can prevent CMR being converted into GMR; their system builds
> > all the code required to support mandatory encryption to FBI and NSA
> > keys into every copy of PGP.
>
> Agreed. And so did PGP 2.x and any version of PGP that allows for
> encryption to multiple keys. Anybody can take the 2.6 source and hardcode
> in a second recipient key.
This to me doesn't say "give up", it says: make something that is more
resistant to being abused by governments. What the deployed base
does, and what the standards say is important. What the government in
some tin pot dictatorship hacks into pgp2.x hardly matters, if the new
standard refuses to talk to it.
> The answer is that no PK crypto system can prevent being converted
> for GAK use.
It just isn't that black and white. Some things are clearly much more
resistant than others. Most anything can be subverted by governments,
but some things are harder than others.
> I read the recently proposed alternatives and fail to see how they
> would prevent GMR any more than PGP's solution. All I saw were
> convoluted and frequently hasty designs, many of which lend
> themselves even more to GAK then what PGP did.
Pick a design, explain why it could lend itself to GAK, help improve
design to reduce danger.
Adam
--
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
Return to October 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”