Re: Challenge to David Wagner on TCPA

2002-08-01 Thread Eric Murray

On Wed, Jul 31, 2002 at 11:45:35PM -0700, AARG! Anonymous wrote:
 Peter Trei writes:
  AARG!, our anonymous Pangloss, is strictly correct - Wagner should have
  said could rather than would.
 
 So TCPA and Palladium could restrict which software you could run.

TCPA (when it isn't turned off) WILL restrict the software that you
can run.  Software that has an invalid or missing signature won't be
able to access sensitive data[1].   Meaning that unapproved software
won't work.  Ok, technically it will run but can't access the data,
but that it a very fine hair to split, and depending on the nature of
the data that it can't access, it may not be able to run in truth.

If TCPA allows all software to run, it defeats its purpose.
Therefore Wagner's statement is logically correct.


Yes, the spec says that it can be turned off.  At that point you
can run anything that doesn't need any of the protected data or
other TCPA services.   But, why would a software vendor that wants
the protection that TCPA provides allow his software to run
without TCPA as well, abandoning those protections?
I doubt many would do so, the majority of TCPA-enabled
software will be TCPA-only.  Perhaps not at first, but eventually
when there are enough TCPA machines out there.  More likely, spiffy
new content and features will be enabled if one has TCPA and is
properly authenticated, disabled otherwise.  But as we have seen
time after time, today's spiffy new content is tomorrows
virtual standard.

This will require the majority of people to run with TCPA turned on
if they want the content.  TCPA doesn't need to be required by law,
the market will require it.  At some point, running without TCPA
will be as difficult as avoiding MS software in an otherwise all-MS
office theoretically possible, but difficult in practice.

TCPA could be required by the government or MS or insert evil
company here is, I agree, a red herring.  It is not outside
the realm of possibility, in fact I'd bet that someone at MS has
seriously thought through the implications.  But to my mind
the requirement by defacto standard scenerio I outline above
is much more likely, in fact it is certain to happen if TCPA
gets in more than say 50% of computers.

I worked for a short while on a very early version of TCPA with Geoff
Strongin from AMD.  We were both concerned that TCPA not be able to
be used to restrict user's freedom, and at the time I thought that
you can always turn it off was good enough.  Now I'm not so sure.
If someday all the stuff that you do with your computer touches data that can
only be operated on by TCPA-enabled software, what are you going to do?

BTW, what's your credentials?  You seem familiar with the TCPA spec, which
is no mean feat considering that it seems to have been written to
make it as difficult to understand as possible (or perhaps someone
hired an out-of-work ISO standards writer).  I think that Peter's
guess is spot on.  Of course having you participate as a nym
is much preferable to not having you participate at all, so don't
feel as though you have to out yourself or stop posting.


[1] TCPAmain_20v1_1a.pdf, section 2.2


Eric



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: 1024-bit RSA keys in danger of compromise

2002-03-28 Thread Eric Murray



Here's the distribution of RSA key sizes in SSL servers, as
recorded by my SSL server survey in June 2000 and June 2001

RSA Server Key size
   Key bits2000 2001
2048 .2% .2%
1024   70% 80%
= 1000 2%   .7%
= 768  2%   1%
512 -   0%
= 512  25% 17%



Eric



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Fingerprints (was: Re: biometrics)

2002-01-28 Thread Eric Murray

On Mon, Jan 28, 2002 at 02:54:57PM -0700, [EMAIL PROTECTED] wrote:
 
 I believe NIST published something about FBI needing 40 minutia standard
 for registration in their database.

[reasons why the FBI wants so many minutae deleted]

As an example of the real world, a couple years ago I put together
a working demo of a smartcard authenticated by a fingerprint
(the card then went on to participate in SET).  The pre-release
fingerprint chip I used would regularly grab about 20 minutae, more
like 10 on a bad scan (dirty finger, poor position, etc).

If you set the macthing parameters to require all minutae to match,
you'd get a positive (i.e. match all minutae) on about one in ten scans.


And of course the other reason for wanting such good prints is simply
that the FBI can demand them.


Eric




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Crypto hardware

2001-07-12 Thread Eric Murray

On Tue, Jul 10, 2001 at 02:28:08PM -0700, Kent Crispin wrote:
 A couple of years ago at the RSA conference one of the vendors was 
 exhibiting a tamperproof that would keep a secret key and perform 
 encryptions/signatures using the key.  Since the key never left the 
 box, in theory security reduced to physical security around the box.  
 The intended use of the box was as a master for a CA.  I thought the 
 vendor was GTE, but I didn't find anything definitive on their site.
 
 Does this description trigger any recollection?  Are there similar 
 devices on the market from other sources?

Was it the BBN Safekeeper?
I haven't seen one, but I have had it described
to me as a PC welded into a box, intended for
use as a CA.

Eric



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Cryptobox (was Re: Edupage, June 20, 2001)

2001-06-21 Thread Eric Murray

On Thu, Jun 21, 2001 at 02:36:05PM +0100, R. A. Hettinga wrote:
 At 5:08 PM -0600 on 6/20/01, EDUCAUSE wrote:
 
 
  PRIVATE LIFE
  Researchers at Ottawa University are developing Cryptobox, a
  program that encrypts e-mail, instant messages, and other Internet
  communications. The program works by sending transmissions over
  a peer-to-peer network, scrambling each end of the transmission
  with an encryption code and hiding it underneath a stream of junk
  traffic. The system automatically decodes the transmissions once
  they reach their destinations. The researchers have already
  tested Cryptobox in a network of 40 real and 200 virtual clients
  and report that the test succeeded. Independent researchers are
  skeptical, however. Richard Clayton, a computer scientist at
  Cambridge University, noted, It's unclear whether they can make
  this work and keep it stable in the real world with millions of
  systems. The program could, if successful on a large scale,
  solve one of the main security vulnerabilities of the Internet.
  Currently, e-mails, instant messages, and many other transmissions
  can be easily intercepted by those with access to key areas of a
  network.

...unless they're running one of the myriad existing solutions
(like IPSEC, PGP, S/MIME, SMTPS).
I love it when journalists regurgitate press releases without
doing even the most basic research.


More on Cryptobox at:
http://www.osopinion.com/perl/story/11281.html  and
http://cryptobox.sourceforge.net/new/index.html


Eric



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Lie in X.BlaBla...

2001-06-03 Thread Eric Murray

On Fri, Jun 01, 2001 at 09:43:50AM -0700, Greg Broiles wrote:
 At 09:58 AM 6/1/2001 +0800, Enzo Michelangeli wrote:
   At 07:22 AM 5/31/2001 +0800, Enzo Michelangeli wrote:
  
   Besides, it would be idiotic to grant access to information or
 authorization
   for a transaction to someone, just because he or she has presented a
 public
   key certificate: authentication protocols require possession of the
 private
   key. Those legislators just don't know what they are talking about.
   Scary.
  
   The statute didn't say just because or describe a technical architecture
   for an access control system - it criminalized the presentation of a
   certificate without owning the corresponding private key.
 
 Uhm... So, which devious use of someone else's certificate were those guys
 trying to address? Also a bona fide certificate server could fall afoul of
 such law.
 
 They were trying to address any fraudulent (not devious) use of a 
 certificate to gain access or information, without regard to the technical 
 details.


I'm not a lawyer but I read it the way Greg does.
Intent is required, so simply sending a cert that's part of a chain
and which you don't hold the corresponding private key for, or
acting as a directory, isn't illegal.

But I'd bet that some enterprising DA, given a case where someone
sends four certs in a chain and got the EE cert by fraudulent means, will
charge them with four counts of violating this law.


Eric



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]