Hi,

I think that cryptographic authentication which does not obscure the 
message being conveyed, should not only be allowed, but should be 
encouraged for practices like repeater linking via the internet and 
remote controlled transceivers, etc


However, I am very much against the conveyance of encrypted traffic 
(deliberately obscured messages) via amateur radio. I even consider the 
D-Star is treading a very fine line because the codec used is secret and 
the only way to decode it is with DVSI's magic black-box chip. I am not 
familiar with the HIPAA regulations. If HIPAA provides for relaxed 
privacy rules in time of emergency, then there is no problem?. Cleartext 
communications have the advantage that anyone with the right equipment, 
even just riding in the ambulance with a handheld because the 
paramedic's trunked radio system is down can make a difference without 
dealing with the issues of key managment and having the right crypto 
hardware.

Thinking about it, if there has been a large scale disaster or other 
emergency situation sufficient to require hams to provide emergency 
medical communications, and I am seriously unwell, requiring urgent 
medical assistance, then secrecy of communications between whoever is 
treating me and whoever holds my medical records will be the least of my 
concerns.

If this is not acceptable, then a compromise might be to allow only 
personally identifiable information to be encrypted (eg name, sex, DOB) 
with everything else sent cleartext.


I imagine that crypto authentication could work on a "web of trust", 
like SSL/TLS.
For instance, I generate a public/private key pair (or I may be supplied 
with one) and my public key is signed by an entity that certifies that I 
am indeed a ham. NZART confirms my licence and signs my key with their 
private key.
ARRL and NZART trust each other as licence certifiers so they sign each 
other's keys (the IARU is probably a good way to connect the various 
licence certifiers with each other).
A ham in say the USA has his key signed by say the ARRL (or maybe the 
FCC if the US gov't wants to handle it?)
Then, when I try to connect to the VOIP to RF gateway in the USA, the 
remote machine sees that my key is signed by NZART, and NZART's key is 
signed by ARRL, which is marked as a trusted certifier by the repeater 
trustee, so I am granted TX privileges.
To prevent session hijacking, each authenticated packet would need to 
contain a crypto authentication token instead of the regular CRC - maybe 
something like the method used for "rolling code" alarm remote controls 
where the token is a hash of the packet contents a rolling packets sent 
counter (this protects against replay attacks) and a shared secret 
(which would be negotiated during the authentication process). Since 
this shared secret is just a number used for authentication, is not 
"intelligible information" or a way of conveying a message, and all 
"messages" are sent clear text, the negotiation of this shared secret 
should not be considered to be "a message obscured by cryptography".


Regarding the press listening to amateur emergency comms, should we be 
concerned about this? what is it that we are doing that we don't want to 
be public?
My understanding is that keeping the public in the dark, feeding them 
half-truths and bull-dust is a good way to breed conspiracy theories and 
mistrust of authorities, which can be counter-productive to good 
emergency management.


73 ZL2WRW
Ross Whenmouth <r...@topwire.co.nz>

------------------------------------------------------------------------------
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
endpoint security space. For insight on selecting the right partner to 
tackle endpoint security challenges, access the full report. 
http://p.sf.net/sfu/symantec-dev2dev
_______________________________________________
Freetel-codec2 mailing list
Freetel-codec2@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freetel-codec2

Reply via email to