1998-09-16 - Re: DARPA Hires NetAss/TIS TO Develop Secure DNS

Header Data

From: Alan Olsen <alan@clueserver.org>
To: Bill Stewart <bill.stewart@pobox.com>
Message Hash: 06e4430316a9fe1efc8150baac8a4486b16c1981e12a52ac28ff48a51c764730
Message ID: <Pine.LNX.3.96.980917134007.10944C-100000@clueserver.org>
Reply To: <3.0.5.32.19980916190027.008d4dc0@idiom.com>
UTC Datetime: 1998-09-16 16:49:24 UTC
Raw Date: Thu, 17 Sep 1998 00:49:24 +0800

Raw message

From: Alan Olsen <alan@clueserver.org>
Date: Thu, 17 Sep 1998 00:49:24 +0800
To: Bill Stewart <bill.stewart@pobox.com>
Subject: Re: DARPA Hires NetAss/TIS TO Develop Secure DNS
In-Reply-To: <3.0.5.32.19980916190027.008d4dc0@idiom.com>
Message-ID: <Pine.LNX.3.96.980917134007.10944C-100000@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 16 Sep 1998, Bill Stewart wrote:

> 
> This is somewhat tacky.  SecureDNS exists, and TIS got export approval
> a while back to publish a "bones" version, minus encryption routines.
> John Gilmore and his lawyer decided that, since it only does authentication,
> not message encryption, it should be ok to publish _with_ the crypto
> algorithms, and it's been quietly sitting on his web pages.
> Recently the Feds sent him a letter saying "Oh, no, we didn't mean
> it was OK to publish/export this encryption-based authentication system
> just because the law says you can, so stop it"....
> Now they're paying for another version.  Are they going to try something
> DSS-based instead of RSA, just so you don't need encryption-capable
> crypto with it, or is this going to be another scam?
> Or is it just different parts of the Feds not talking to each other?

Maybe they suddenly felt the need to be able to backdoor DNS hijacking.
(Maybe the reason TIS is involved...)

alan@ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.





Thread