On 8 Sep 99, at 10:43, Ben Nagy wrote:

> Am I the only one that doesn't know what this is about? Reference?
> 
> (feeling lazy for not doing own research)

  It has been known for some months that NT provides *two* keys for verifying 
signature of Microsoft-supplied crypto components.  This allows installation 
and acceptance of non-MS crypto components without disturbing the signature 
of genuine MS components, either by obtaining the second key from MS (legit) 
*OR* by replacing the second key with your own (exploit).
  It was recently discovered that the internal symbol name for the second key 
is "_NSAKEY", inspiring hysterical speculation that this key is there to 
allow the NSA a backdoor into every NT box on the planet.

  For those who've only seen the hype:

(a) That's not how these keys are used.

(b) The NSA is an organization that might want to -- and be able to -- 
supplement MS's crypto with their own.  They may have requested inclusion of 
a second key to allow this; this *is* how these keys are intended to be used.

(c) No exploit involving substitution of the second key is yet known to 
exist, except as a theoretical exercise.  [Time to start a pool on how long 
until we see one?]  Note that this provides a much simpler alternative than 
trojanning the entire MS crypto suite, so the second key, simply by its 
existence, makes the system *generally* much less secure, without necessarily 
giving special access to a specific agency.

(d) If there really is a "back door", it probably doesn't say "NSA" on it.  
(Or are we supposed to think that?)


David G
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to