Re: Challenge to TCPA/Palladium detractors

2002-08-12 Thread bear



On Thu, 8 Aug 2002, AARG!Anonymous wrote:

It's likely that only a limited number of compiler configurations would
be in common use, and signatures on the executables produced by each of
those could be provided.  Then all the app writer has to do is to tell
people, get compiler version so-and-so and compile with that, and your
object will match the hash my app looks for.

I don't like the idea of a trusted compiler.  No matter who makes
it.  People should choose compilers based on the compiler's merits
and make optimization and configuration decisions when compiling
based on their particular hardware, not in order to match some other
machine's or other user's ideal of trustable code.  The minute a
compiler becomes a standard, for any reason, it becomes a target
for people to subvert.

People who are likely to be a source of malicious clients will also
hack hardware if the data is sufficiently valuable to warrant it.
We have already seen how a relatively simple and inexpensive hardware
hack can be used to defeat palladium security, so while it may provide
suitable infrastructure if the attacker's motivation is just the price
of a movie ticket, it is not at all trustable as a structure if the
value of the data being protected rises above prices that justify
hardware hacking. Moreover, the same simple hardware hack defeats
every piece of palladium-protected content or software, so the cost
of hardware hacking can be amortized over many breaks.

I think you are trying to solve in hardware, problems which are
properly protocol-design problems.  This looks like the easy way
out because protocol design is hard, but the fact is that if there
is data you really want to protect which is more valuable than movie
tickets, what you want is a protocol that ensures no one using the
data ever has sufficient information to reconstruct more of it
than their particular licit use of it requires.

Bear


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-10 Thread R. Hirschfeld

 Date: Fri, 9 Aug 2002 19:30:09 -0700
 From: AARG!Anonymous [EMAIL PROTECTED]

 Re the debate over whether compilers reliably produce identical object
 (executable) files:
 
 The measurement and hashing in TCPA/Palladium will probably not be done
 on the file itself, but on the executable content that is loaded into
 memory.  For Palladium it is just the part of the program called the
 trusted agent.  So file headers with dates, compiler version numbers,
 etc., will not be part of the data which is hashed.
 
 The only thing that would really break the hash would be changes to the
 compiler code generator that cause it to create different executable
 output for the same input.  This might happen between versions, but
 probably most widely used compilers are relatively stable in that
 respect these days.  Specifying the compiler version and build flags
 should provide good reliability for having the executable content hash
 the same way for everyone.

A trivial observation: this cannot be true across hardware platforms.
TCPA claims to be platform and OS agnostic, but Palladium does not.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-10 Thread Russell Nelson

AARG!Anonymous writes:
  I'd like the Palladium/TCPA critics to offer an alternative proposal
  for achieving the following technical goal:
  
Allow computers separated on the internet to cooperate and share data
and computations such that no one can get access to the data outside
the limitations and rules imposed by the applications.

Can't be done.  I don't have time to go into ALL the reasons.
Fortunately for me, any one reason is sufficient.  #1: it's all about
the economics.  You have failed to specify that the cost of breaking
into the data has to exceed the value of the data.  But even if you
did that, you'd have to assume that the data was never worth more than
that to *anyone*.  As soon as it was worth that, they could break into
the data, and data is, after all, just data.

Ignore economics at your peril.

-- 
-russ nelson  http://russnelson.com |
Crynwr sells support for free software  | PGPok | businesses persuade
521 Pleasant Valley Rd. | +1 315 268 1925 voice | governments coerce
Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   |

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-09 Thread AARG!Anonymous

Anon wrote:
 You could even have each participant compile the program himself,
 but still each app can recognize the others on the network and
 cooperate with them.

Matt Crawford replied:
 Unless the application author can predict the exact output of the
 compilers, he can't issue a signature on the object code.  The
 compilers then have to be inside the trusted base, checking a
 signature on the source code and reflecting it somehow through a
 signature they create for the object code.

It's likely that only a limited number of compiler configurations would
be in common use, and signatures on the executables produced by each of
those could be provided.  Then all the app writer has to do is to tell
people, get compiler version so-and-so and compile with that, and your
object will match the hash my app looks for.
DEI

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: Challenge to TCPA/Palladium detractors

2002-08-09 Thread Lucky Green

Anonymous wrote:
 Matt Crawford replied:
  Unless the application author can predict the exact output of the 
  compilers, he can't issue a signature on the object code.  The 
  compilers then have to be inside the trusted base, checking a 
  signature on the source code and reflecting it somehow through a 
  signature they create for the object code.
 
 It's likely that only a limited number of compiler 
 configurations would be in common use, and signatures on the 
 executables produced by each of those could be provided.  
 Then all the app writer has to do is to tell people, get 
 compiler version so-and-so and compile with that, and your 
 object will match the hash my app looks for. DEI

The above view may be overly optimistic. IIRC, nobody outside PGP was
ever able to compile a PGP binary from source that matched the hash of
the binaries built by PGP. 

--Lucky Green


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-09 Thread AARG!Anonymous

Re the debate over whether compilers reliably produce identical object
(executable) files:

The measurement and hashing in TCPA/Palladium will probably not be done
on the file itself, but on the executable content that is loaded into
memory.  For Palladium it is just the part of the program called the
trusted agent.  So file headers with dates, compiler version numbers,
etc., will not be part of the data which is hashed.

The only thing that would really break the hash would be changes to the
compiler code generator that cause it to create different executable
output for the same input.  This might happen between versions, but
probably most widely used compilers are relatively stable in that
respect these days.  Specifying the compiler version and build flags
should provide good reliability for having the executable content hash
the same way for everyone.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-08 Thread R. Hirschfeld

 Date: Wed, 7 Aug 2002 12:50:29 -0700
 From: AARG!Anonymous [EMAIL PROTECTED]

 I'd like the Palladium/TCPA critics to offer an alternative proposal
 for achieving the following technical goal:
 
   Allow computers separated on the internet to cooperate and share data
   and computations such that no one can get access to the data outside
   the limitations and rules imposed by the applications.

The model and the goal are a bit different, but how about secure
multi-party computation, as introduced by Chaum, Crepeau, and Damgard
in 1988 and subsequently refined by others?

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Challenge to TCPA/Palladium detractors

2002-08-08 Thread R. Hirschfeld

 Date: Thu, 8 Aug 2002 21:55:40 +0200
 From: R. Hirschfeld [EMAIL PROTECTED]
 
  Date: Wed, 7 Aug 2002 12:50:29 -0700
  From: AARG!Anonymous [EMAIL PROTECTED]
 
  I'd like the Palladium/TCPA critics to offer an alternative proposal
  for achieving the following technical goal:
  
Allow computers separated on the internet to cooperate and share data
and computations such that no one can get access to the data outside
the limitations and rules imposed by the applications.
 
 The model and the goal are a bit different, but how about secure
 multi-party computation, as introduced by Chaum, Crepeau, and Damgard
 in 1988 and subsequently refined by others?

Sorry, I see from an earlier message of yours that you are looking for
a simple non-crypto solution, so I guess this doesn't fit the bill.

The examples you gave in your earlier message all seem to be
equivalent to having the participants send the data to a trusted third
party who performs the computation, except that the trusted third
party is transplanted to one or more of the participants computers,
which are protected against their owners.  I guess it boils down to
whether or not the level of trust is sufficient.  This seems iffy when
one of the participants is also the trust provider.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]