Re: dangers of TCPA/palladium

2002-08-08 Thread R. Hirschfeld

 From: Peter N. Biddle [EMAIL PROTECTED]
 Date: Mon, 5 Aug 2002 16:35:46 -0700

 You can know this to be true because the
 TOR will be made available for review and thus you can read the source and
 decide for yourself if it behaves this way.

This may be a silly question, but how do you know that the source code
provided really describes the binary?

It seems too much to hope for that if you compile the source code then
the hash of the resulting binary will be the same, as the binary would
seem to depend somewhat on the compiler and the hardware you compile
on.  But this means that you also can't just use the TOR you compiled,
as you then won't be able to unseal any data sealed with the standard
TOR.  Or do I misunderstand how this all works (very likely the case)?


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-08 Thread R. Hirschfeld

 Date: Wed, 7 Aug 2002 12:50:29 -0700
 From: AARG!Anonymous [EMAIL PROTECTED]

 I'd like the Palladium/TCPA critics to offer an alternative proposal
 for achieving the following technical goal:
 
   Allow computers separated on the internet to cooperate and share data
   and computations such that no one can get access to the data outside
   the limitations and rules imposed by the applications.

The model and the goal are a bit different, but how about secure
multi-party computation, as introduced by Chaum, Crepeau, and Damgard
in 1988 and subsequently refined by others?

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Utilizing Palladium against software piracy

2002-08-08 Thread Lucky Green

I would like to again thank the Palladium team, in particular Peter
Biddle, for participating in yesterday's panel at the USENIX Security
conference on Palladium and TCPA.

Unfortunately I do not have the time at the moment to write up the many
valuable and informative points made during the panel discussion. I
will, however, highlight one such issue:

As Peter pointed out, while the Palladium effort was started to meet the
content protection requirements of digital video content providers, he
also pointed out that Microsoft and its Palladium group have so far been
unable to determine a method in which Palladium could be utilized to
assist in the efforts against application software piracy. As Peter
mentioned, the Palladium team on several occasions had to tell the
Microsoft's anti-piracy group that Palladium is unsuitable to assist in
software (as distinct from content) licensing and anti-piracy efforts.
Since Microsoft is not aware of a method to utilize the Palladium
environment in the enforcement of software licenses, Peter argued,
Microsoft does not intend to and will not utilize Palladium to assist in
the enforcement of software licensing.

I, on the other hand, am able to think of several methods in which
Palladium or operating systems built on top of TCPA can be used to
assist in the enforcement of software licenses and the fight against
software piracy. I therefore, over the course of the night, wrote - and
my patent agent filed with the USPTO earlier today - an application for
an US Patent covering numerous methods by which software applications
can be protected against software piracy on a platform offering the
features that are slated to be provided by Palladium.

--Lucky Green


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



[ANNOUNCE] OpenSSL 0.9.6f released

2002-08-08 Thread Richard Levitte - VMS Whacker


  OpenSSL version 0.9.6f released
  ===

  OpenSSL - The Open Source toolkit for SSL/TLS
  http://www.openssl.org/

  The OpenSSL project team is pleased to announce the release of version
  0.9.6f of our open source toolkit for SSL/TLS.  This new OpenSSL version
  is a security and bugfix release and incorporates several changes to the
  toolkit (for a complete list see http://www.openssl.org/source/exp/CHANGES).

  The most significant changes are:

  o Various important bugfixes.

  We consider OpenSSL 0.9.6f to be the best version of OpenSSL available
  and we strongly recommend that users of older versions upgrade as
  soon as possible.  OpenSSL 0.9.6f is available for download via HTTP
  and FTP from the following master locations (you can find the various
  FTP mirrors under http://www.openssl.org/source/mirror.html):

o http://www.openssl.org/source/
o ftp://ftp.openssl.org/source/

  [1] OpenSSL comes in the form of two distributions this time.
  The reasons for this is that we want to deploy the external crypto device
  support but don't want to have it part of the normal distribution just
  yet.  The distribution containing the external crypto device support is
  popularly called engine, and is considered experimental.  It's been
  fairly well tested on Unix and flavors thereof.  If run on a system with
  no external crypto device, it will work just like the normal distribution.

  The distribution file names are:

  o openssl-0.9.6f.tar.gz [normal]
MD5 checksum: 160ac38bd2784e633ed291d03f0087d4
  o openssl-engine-0.9.6f.tar.gz [engine]
MD5 checksum: 26f4b7189fb3ef9c701e961ffe101a95

  The checksums were calculated using the following commands:

openssl md5  openssl-0.9.6f.tar.gz
openssl md5  openssl-engine-0.9.6f.tar.gz

  Yours,
  The OpenSSL Project Team...  

Mark J. Cox Ben Laurie  Andy Polyakoff
Ralf S. Engelschall Richard Levitte Geoff Thorpe
Dr. Stephen Henson  Bodo Möller
Lutz JänickeUlf Möller


-- 
Richard Levitte [EMAIL PROTECTED]
OpenSSL Project http://www.openssl.org/~levitte/

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-08 Thread R. Hirschfeld

 Date: Thu, 8 Aug 2002 21:55:40 +0200
 From: R. Hirschfeld [EMAIL PROTECTED]
 
  Date: Wed, 7 Aug 2002 12:50:29 -0700
  From: AARG!Anonymous [EMAIL PROTECTED]
 
  I'd like the Palladium/TCPA critics to offer an alternative proposal
  for achieving the following technical goal:
  
Allow computers separated on the internet to cooperate and share data
and computations such that no one can get access to the data outside
the limitations and rules imposed by the applications.
 
 The model and the goal are a bit different, but how about secure
 multi-party computation, as introduced by Chaum, Crepeau, and Damgard
 in 1988 and subsequently refined by others?

Sorry, I see from an earlier message of yours that you are looking for
a simple non-crypto solution, so I guess this doesn't fit the bill.

The examples you gave in your earlier message all seem to be
equivalent to having the participants send the data to a trusted third
party who performs the computation, except that the trusted third
party is transplanted to one or more of the participants computers,
which are protected against their owners.  I guess it boils down to
whether or not the level of trust is sufficient.  This seems iffy when
one of the participants is also the trust provider.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]