Government-Controlled Trust Hierarchies
Two recent threads have been: * Government-controlled ID systems (National ID Card, is-a-person credentials, etc.) * Software Key Escrow (SKE) These two threads are intimately connected, I claim. We would do well to consider how they relate, given the recent revelations about plans for SKE by Microsoft, the already-existing (but mostly unused?) features in Apple's AOCE/System 7 Pro/etc. system, the proposal by Stephen Walker at TIS of an SKE system, and the press for a National ID card. The "anarchic" model of the "web of trust" found in PGP is anathema to control freaks...sorry if this sounds like I'm grinding an ideological axe, but I don't feel I have to make posts to _this_ group sound like impartial, academic papers. Someone discussing key escrow here recently said that one thing he's want to see in any "voluntary" system is "proof of identity." Though many of us here dismissed his arguments as Detweileresque, in that Detweiler was always trashing pseudonymity (while being by far the most obvious user of it, ironically). But I think these arguments are common in some circles. For example, to use the Apple Open Collaboration Environment (AOCE) stuff, one gets one's key by submitting to RSA a notarized statement of one's identity. I haven't done this, and have no intentions to ever do so, but I gather than one take's one's passport, birth certificate, etc., down to a Notary Public, she confirms that the person is indeed "Sue D. Nym," signs and stamps the AOCE or RSADSI form, and this is snail-mailed to RSADSI in Redwood Shores. Some days or weeks later, one's key arrives. Sort of kills the idea of multiple keys for multiple purposes, of changing keys frequently, and of not going through such a process in the first place. Oh, and of course it costs money (the Notary for sure, and maybe RSADSI...though maybe Apple gives your a free coupon "Good for One Key Generation"). The Microsoft thing may be going down a similar track. The Microsoft paralegal who confirmed to me yesterday (via Blanc Weber, who can attest to what I'm saying) that MS is indeed pursuing SKE claimed that this is primarily to meet export laws and will not apply, he claims, to U.S. users. (I'm confused. If it's _export_ laws, and not _import_ laws into Haiti, Iraq, France, or other police state who may insist on key escrow, then won't all U.S.-sold packages of "Chicago" have to have this SKE built in? Why should U.S. export laws care about what key escrow laws other countries have? Since when do we enforce other countries' laws at our borders?)
From everything I am seeing, SKE will be incorporated into some widely-used operating systems, notably, Microsoft's upcoming release of "Chicago," the successor to Windows 3.1. (Chicago is essentially Windows 4.0)
Who will write this? The SKE proposal described at the Karlsruhe workshop in international key escrow was authored by Stephen Walker and David Balenson of Trusted Information Systems. Matt Blaze's post yesterday discussed this in more detail. I suggest we look very closely for connections between TIS and Microsoft, Apple, Novell, Sun, and any other major OS providers. I believe TIS is preparing an SKE system that involves the "proof of identity" notary system Apple and RSADSI are now using, that involves mandatory selection of escrow agents (*), and that will be widely deployed in upcoming future operating systems, probably in Chicago in 1995 and maybe in Apple's System 7.5 in '95 as well. As Hal Finney notes, this will nuke the "web of trust" model, and will also make all systems in which keys need to be generated on an ad hoc, as needed basis very difficult or impossible to deploy--at least if the built-in systems of Chicago or System 7.5 are to be used. (* A note of confusion. I don't see how the schemes described by Matt Blaze, Carl Ellison, and others here, in which groups of communicants agree on a mutual escrow agent can work. For example, suppose a bunch of say, "OK, we'll play your silly game. We'll use your software, but our "escrow agents" will be "cypherpunks.nil" and "bitbucket.void," both of which consign all incoming keys to oblivion. Whutja gonna do now?" This makes the escrow agents a charade, unless of course there are laws regulating escrow agents!) In closing, it looks like the anarchic, distributed, web-of-trust stuff has been recognized as something governments need to quash. The first attack, Clipper, failed miserably, for various reasons. The second attack is much more insidious. Use various pressures on Microsoft (Gee, I wonder what _that_ could be?) to deploy a Beltway Bandit-deveoloped (TIS, with inputs from Denning, NIST/NSA) system that is, happily, "freely exportable." This satisfies Cantwell (so she drops her bill), this allows Clipper to be quietly killed, this allows Microsoft to free export Chicago, Daytona, and other such products, and this presumably keeps the national security state people happy. Well, this is my scenario. It could be wrong in some details, but clearly something is brewing out there....too many pieces are matching up. Vigilance! --Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^859433 | Public Key: PGP and MailSafe available. "National borders are just speed bumps on the information superhighway."
Timothy C. May says:
The Microsoft thing may be going down a similar track. The Microsoft paralegal who confirmed to me yesterday (via Blanc Weber, who can attest to what I'm saying) that MS is indeed pursuing SKE claimed that this is primarily to meet export laws and will not apply, he claims, to U.S. users.
By the way, just so everyone knows, I understand (based on a conversation with Steve Kent, who should be a reliable source for this) that Microsoft is one of the suppliers to the upcoming DMS, or defense messaging system. The DMS will be using Tessera -- it means that Microsoft and several other firms are going to be the largest purveyors of escrowed software in the world. Perry
-----BEGIN PGP SIGNED MESSAGE-----
By the way, just so everyone knows, I understand (based on a conversation with Steve Kent, who should be a reliable source for this) that Microsoft is one of the suppliers to the upcoming DMS, or defense messaging system. The DMS will be using Tessera -- it means that Microsoft and several other firms are going to be the largest purveyors of escrowed software in the world.
Well, no, not actually; at least that's not the explanation that the various trade rags have been giving. DMS is an infrastructure for passing messages around. The actual Tessera hardware does the escrowed encryption and so on. All the software has to do is know how to talk to the Tessera PCMCIA card. One of the key features of DMS is that it uses as much commercial off-the-shelf (COTS) software as possible. To support Tessera, that COTS must either a) be purpose-built (like LJL/SESI's ArmorMail) to use Tessera, or b) have new versions planned for the future (Lotus Notes? MS Mail?) It's interesting to note that the APIs needed to talk to a Tessera card and National Semi's RSA-only card are very close to one another. It would be IMHO not too hard to patch, say, MS Mail (especially with the availability of MAPI!) to use alternate types of tokens. - -Paul - -- Paul Robichaux, KD4JZG | "Information is the currency of democracy." perobich@ingr.com | - some old guy named Thomas Jefferson Of course I don't speak for Intergraph. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLjgD2qfb4pLe9tolAQEejwP/bNbkE8auYcbBqRCWSx2D0gpzs5W+7A/m tL2c0dEA5ISMAWvwE51SixWBIf3kiT5+CBOh2ZNGEYd/oabynHEBXdYUQPYgaQ9E 9pG2wySN+aaSiGTypD7+jjIW3NVWgVKIzOWokixiQfh+W3e3ACASiuy986ZifJww 2C7C1IBGC8Y= =RDYy -----END PGP SIGNATURE-----
From: tcmay@netcom.com (Timothy C. May) Subject: Government-Controlled Trust Hierarchies Date: Wed, 27 Jul 1994 11:44:13 -0700 (PDT)
(* A note of confusion. I don't see how the schemes described by Matt Blaze, Carl Ellison, and others here, in which groups of communicants agree on a mutual escrow agent can work. For example, suppose a bunch ^^^^ of say, "OK, we'll play your silly game. We'll use your software, but our "escrow agents" will be "cypherpunks.nil" and "bitbucket.void," both of which consign all incoming keys to oblivion. Whutja gonna do now?" This makes the escrow agents a charade, unless of course there are laws regulating escrow agents!)
What means "work" ? If by this you mean "work to provide surveillance agents with citizens' keys" then of course it doesn't. Should that surprise you (that I would talk about a system which doesn't give the TLAs any access)? If I have 3 escrow agents -- Alice, Bob and Carol -- and they're friends of mine in different parts of the country, don't know each other, ..., then when I forget a password for some encrypted file, I can take the ID# of that file (in its LEAF-equivalent) and send a request to each of my friends for key pieces for that ID #. I've achieved backup of my own encryption keys against failure of my memory. If there's data my survivors should have, I list the escrow agents for that data in my will. If there's data which should die with me, I don't escrow its key(s). (I had used Curve Encrypt the other month and forgotten the password -- went a whole month before I remembered it. This isn't academic to me.) To me, this works. But don't let me dampen the inspection of SKE. Just having the machinery in place (as someone pointed out a day or two ago) makes it easier for the gov't to come along and demand to be the escrow agents:: "Why burden your friends with that duty? Why concern yourself with how to get to your keys. We'll keep them for you. We'll be on-line 24 hours a day, seven days a week. We'll be true *escrow* sites -- keeping keys which you can get to yourself. Of course, we'll also be law-abiding citizens (officers of the court?) and respond to any court orders. So should your friends, by the way, if you use them as escrow agents...." :-( The only real answer is (to me): 1. demand free export of public-domain crypto (anything published: RSA, DES, IDEA, FEAL, transposition, substitution, Hill, Vernam, etc., and any combination of those) 2. write good code (aimed at the naive user, with good Windows or Mac GUI) including strong crypto without gov't access to keys and sell it, share it or give it away. 3. make sure that the Congress acknowledges that private citizens have invented, distributed and used strong crypto (as strong as the military of the time) for 4000 years (cf., Kahn) and hasn't given keys to the gov't -- and shouldn't ever do so. 4. drive home the point (also cf. Kahn) that criminals have invented and used strong crypto in the past (hiring their own cryptographers) so that this is not a new danger and therefore doesn't need new drastic action. - Carl
participants (4)
-
Carl Ellison -
paul@poboy.b17c.ingr.com -
Perry E. Metzger -
tcmay@netcom.com