Copy Link
Add to Bookmark
Report
SURFPUNK Technical Journal 104
Date: Fri, 11 Feb 94 00:46:23 PST
Reply-To: <surfpunk@versant.com>
Return-Path: <cocot@versant.com>
Message-ID: <surfpunk-0104@SURFPUNK.Technical.Journal>
Mime-Version: 1.0
Content-Type: text/plain
From: surfpunk@versant.com (frphevgl pyrnenapr erdhverq)
To: surfpunk@versant.com (SURFPUNK Technical Journal)
Subject: [surfpunk-0104] CLIPPER: some reactions
Prof. Denning has issued a defense of the Clipper proposal
(which she advocated in a CACM article long before the
initiative was announced). Her specifics are easy enough
to refute and I'm sure others will do so. However, she
closes with an idea so radical that it shocked me.
Her idea that we citizens need a security clearance in
order to enter the debate over whether or not we should
give up a right we've had for all time (to make, use,
disseminate, ..., our own strong cryptography, interfering
with the government's ability to spy on us) is so radically
off base that the technical debate pales by comparison.
- Carl Ellison
I believe everything in this issue came over the Cypherpunks list,
except for the trailer, which was on bugtraq@crimelab.com ..... strick
________________________________________________________________________
________________________________________________________________________
From: gnu@toad.com (John Gilmore)
To: cypherpunks@toad.com
Date: Mon, 07 Feb 94 13:14:48 -0800
------- Forwarded Message
To: gnu@toad.com
From: whitfield.diffie@Eng.Sun.COM
Date: Mon, 7 Feb 1994 at 13h01
Subject: Preliminary remarks
A preliminary reading of the public announcements made on Friday,
4 February 1994, about the results of the Interagency Review of Crypto
Policy, suggests that there is less than meets the eye, but there are
some interesting points.
Whitfield Diffie
> The two escrow agents are the National Institute of Standards and
> Technology (NIST), a part of the Department of Commerce, and the
> Automated Systems Division of the Department of the Treasury. The
> two escrow agents were chosen because of their abilities to
> safeguard sensitive information, while at the same time being able
> to respond in a timely fashion when wiretaps encounter encrypted
> communications. In addition, NIST is responsible for establishing
> standards for protection of sensitive, unclassified information in
> Federal computer systems.
Why NIST should excel among federal agencies or even Department of
Commerce agencies in the ability ``to safeguard sensitive information,
while at the same time being able to respond in a timely fashion when
wiretaps encounter encrypted communications'' is hardly obvious. I
would have thought the patent office, which has responsibility for for
the confidentiality of patent applications and has never, in my
memory, been accused of leaking would have been more plausible. The
final sentence sounds more like a conflict of interest than a
recommendation. Perhaps there is more in this selection than meets
the eye.
> * License Reform: Under new licensing arrangements, encryption
> manufacturers will be able to ship their products from the United
> States directly to customers within approved regions without
> obtaining individual licenses for each end user.
> * Rapid review of export license applications: . . .
> goal of two working days.
> * Personal use exemption: We will no longer require that U.S.
> citizens obtain an export license prior to taking encryption
> products out of the U.S. temporarily for their own personal use.
Pending the fine print, I suspect these will please lots of
people.
> * Allow exports of key-escrow encryption: After initial review,
> key-escrow encryption products may now be exported to most end
> users. Additionally, key-escrow products will qualify for special
> licensing arrangements.
This is, to me, the most interesting point. Allowing exports,
undercuts my assumption that the export significance of the trap-door
was merely to make the system unpalatable to foreigners and thereby
support a no-export policy. It brings into high relief the question
of how escrowed keys will be handled in respect to foreign
intelligence. The possibilities would seem to be:
o NSA is allowing the export of key escrow devices
despite the fact that it will not have access to
escrowed keys for reading their traffic and will
not be able to read the traffic.
o There are procedures we haven't been told about for
allowing NSA to get keys for reading the communications
of exported devices.
This will undoubtedly inspire concern that that route will be used
to obtain keys for illegal taps on Americans.
A plausible procedure would be to allow export without individual
export licenses, but to require reporting of all exported devices and
to transfer the keys to those devices to NSA. This would raise the
question of whether NSA should have access to the keys for devices
exported under the personal use exemption.
o Despite all the assurances, there is another trap door
in the algorithm that will be used in reading foreign
traffic. A publicly explainable mechanism is needed
if the intercepts are to be used in court, but not if
they are to be `Handled Via COMINT Channels Only.'
> - Approval by the Commerce Secretary of the Escrowed Encryption
> Standard (EES) as a voluntary Federal Information Processing
> Standard, which will enable government agencies to purchase the
> Key Escrow chip for use with telephones and modems. The
> department's National Institute of Standards and Technology
> (NIST) will publish the standard.
This is a surprise to me. I thought that after a `no vote' of 300
to 2 the first time around, they would a least go through the ritual
of another round of comments.
> The Administration has created a new interagency working group on
> data security to deal with issues like encryption and digital
> telephony. . . .
> In addition, the working group will coordinate Administration
> policies regarding digital telephony. As more and more telephone
> companies install high-speed, digital communications links, it
> becomes more and more difficult for law enforcement agencies to
> conduct wiretaps. The working group will work with industry to
> ensure that new digital telecommunications systems are designed in
> a way that ensures that do not prevent court authorized wiretaps.
This suggests that they have stopped trying to stiff the telephone
companies for the cost of building in the spying and may come around
with some `incentives.' No doubt this will get them a much warmer
reception.
> These procedures do not create, and are not intended to create,
> any substantive rights for individuals intercepted through
> electronic surveillance, and noncompliance with these procedures
> shall not provide the basis for any motion to suppress or other
> objection to the introduction of electronic surveillance evidence
> lawfully acquired.
This hardly seems likely to allay the suspicions of anyone who was
skeptical about the abuse potential of key escrow.
------- End of Forwarded Message
________________________________________________________________________
From: Mike Godwin <mnemonic>
Message-Id: <199402072159.QAA06512@eff.org>
Subject: EFF Wants You (to add your voice to the crypto fight)
To: mech@eff.org, mnemonic (Mike Godwin)
Date: Mon, 7 Feb 1994 16:59:32 -0500 (EST)
* DISTRIBUTE WIDELY *
Monday, February 7th, 1994
From: Jerry Berman, Executive Director of EFF
jberman@eff.org
Dear Friends on the Electronic Frontier,
I'm writing a personal letter to you because the time has now come for
action. On Friday, February 4, 1994, the Administration announced that it
plans to proceed on every front to make the Clipper Chip encryption scheme
a national standard, and to discourage the development and sale of
alternative powerful encryption technologies. If the government succeeds
in this effort, the resulting blow to individual freedom and privacy could
be immeasurable.
As you know, over the last three years, we at EFF have worked to ensure
freedom and privacy on the Net. Now I'm writing to let you know about
something *you* can do to support freedom and privacy. *Please take a
moment to send e-mail to U.S. Rep. Maria Cantwell (cantwell@eff.org) to
show your support of H.R. 3627, her bill to liberalize export controls on
encryption software.* I believe this bill is critical to empowering
ordinary citizens to use strong encryption, as well as to ensuring that
the U.S. software industry remains competitive in world markets.
Here are some facts about the bill:
Rep. Cantwell introduced H.R. 3627 in the House of Representatives on
November 22, 1993. H.R. 3627 would amend the Export Control Act to move
authority over the export of nonmilitary software with encryption
capabilities from the Secretary of State (where the intelligence community
traditionally has stalled such exports) to the Secretary of Commerce. The
bill would also invalidate the current license requirements for
nonmilitary software containing encryption capablities, unless there is
substantial evidence that the software will be diverted, modified or
re-exported to a military or terroristic end-use.
If this bill is passed, it will greatly increase the availability of
secure software for ordinary citizens. Currently, software developers do
not include strong encryption capabilities in their products, because the
State Department refuses to license for export any encryption technology
that the NSA can't decipher. Developing two products, one with less secure
exportable encryption, would lead to costly duplication of effort, so even
software developed for sale in this country doesn't offer maximum
security. There is also a legitimate concern that software companies will
simply set up branches outside of this country to avoid the export
restrictions, costing American jobs.
The lack of widespread commercial encryption products means that it will
be very easy for the federal government to set its own standard--the
Clipper Chip standard. As you may know, the government's Clipper Chip
initiative is designed to set an encryption standard where the government
holds the keys to our private conversations. Together with the Digital
Telephony bill, which is aimed at making our telephone and computer
networks "wiretap-friendly," the Clipper Chip marks a dramatic new effort
on the part of the government to prevent us from being able to engage in
truly private conversations.
We've been fighting Clipper Chip and Digital Telephony in the policy arena
and will continue to do so. But there's another way to fight those
initiatives, and that's to make sure that powerful alternative encryption
technologies are in the hands of any citizen who wants to use them. The
government hopes that, by pushing the Clipper Chip in every way short of
explicitly banning alternative technologies, it can limit your choices for
secure communications.
Here's what you can do:
I urge you to write to Rep. Cantwell today at cantwell@eff.org. In the
Subject header of your message, type "I support HR 3627." In the body of
your message, express your reasons for supporting the bill. EFF will
deliver printouts of all letters to Rep. Cantwell. With a strong showing
of support from the Net community, Rep. Cantwell can tell her colleagues
on Capitol Hill that encryption is not only an industry concern, but also
a grassroots issue. *Again: remember to put "I support HR 3627" in your
Subject header.*
This is the first step in a larger campaign to counter the efforts of
those who would restrict our ability to speak freely and with privacy.
Please stay tuned--we'll continue to inform you of things you can do to
promote the removal of restrictions on encryption.
In the meantime, you can make your voice heard--it's as easy as e-mail.
Write to cantwell@eff.org today.
Sincerely,
Jerry Berman
Executive Director, EFF
jberman@eff.org
P.S. If you want additional information about the Cantwell bill, send
e-mail to cantwell-info@eff.org. To join EFF, write membership@eff.org.
The text of the Cantwell bill can be found with the any of the following
URLs (Universal Resource Locaters):
ftp://ftp.eff.org/pub/Policy/Legislation/cantwell.bill
http://www.eff.org/ftp/EFF/Policy/Legislation/cantwell.bill
gopher://gopher.eff.org/00/EFF/legislation/cantwell.bill
________________________________________________________________________
From: Mike Godwin <mnemonic>
Message-Id: <199402072010.PAA04906@eff.org>
Subject: Newspaper coverage of Administration encryption announcements
To: eff-staff, eff-board
Date: Mon, 7 Feb 1994 15:10:49 -0500 (EST)
The Washington Post, the New York Times, and the Wall Street Journal have
all published stories over the last three days concerning the
Administration's announcement on Friday, Feb. 5, 1994, that it will
continue to deploy the controversial "Clipper Chip" encryption technology
and will not significantly change its export controls.
>From the Post on Saturday:
"That means the administration will continue long-standing restrictions on
exports of powerful encryption devices that the NSA cannot crack, and
continue to encourage use of NSA-developed encryption gear, called the
"Clipper chip," by all U.S. firms. The Clipper Chip makes it relatively
easy for the government to eavesdrop on encrypted communications....
"Further, government officials said, the administration is expected in a
few weeks to endorse an FBI proposal that U.S. telecommunications firms be
required to guarantee law enforcement agencies' ability to tape phone and
computer lines regardless of where the technology goes.
"At the core of these high-tech disputes lies a fundamental conflict
between Americans' cherished privacy rights and the government's
investigative needs."
>From the Times on Saturday:
"But the Administration's action immediately drew a chorus of criticism
from both business and privacy-rights groups. Computer and software
companies, including Apple Computer, I.B.M. and Microsoft, have adamantly
opposed the Clipper Chip because they believe customers will not trust an
encryption program that was built by the government and whose inner
workings remain a secret.
"Perhaps more importantly, they fear that it will harm their ability to
export products; they predict that foreign customers will resist buying
computers and telecommunications equipment built with decoding technology
devised by the National Security Agency.
"Privacy-rights groups argue that the technology could lead to
unauthorized eavesdropping, because the keys for unscrambling the code
will remain in official hands.
"'This is bad for privacy, bad for security and bad for exports,' said
Jerry Berman, executive director of the Electronic Frontier Foundation, a
Washington nonprofit group that lobbies on privacy issues related to
electronic networks. 'The Administration is preparing to implement systems
that the public will not trust, that foreign countries will not buy, and
that terrorists will overcome.'"
>From the Wall Street Journal on Monday:
"The issue has become a controversial one between law enforcement
officials and the computer industry and civil libertarians. In unfolding
details of the administration's decision, Mike Nelson, an official at the
Office of Science and Technology Policy, said the issue was so difficult
it represented 'the Bosnia of telecommunications policy.'
"Jerry Berman, executive director of the Electronic Frontier Foundation, a
Washington-based computer users' civil-rights group, said the
administration's handling of the Clipper Chip policy could make it 'as
successful' as the Bosnia policy, which has come under widespread
criticism."
William Safire has also written about this in today's NYTimes.
[It was worth looking up --strick ]
________________________________________________________________________
________________________________________________________________________
The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix. Quantum Californians appear in one of two states,
spin surf or spin punk. Undetected, we are both, or might be neither.
________________________________________________________________________
Send postings to <surfpunk@versant.com>,
subscription requests to <surfpunk-request@versant.com>.
WWW Archive at ``http://www.acns.nwu.edu/surfpunk/''. [stale; moving soon]
________________________________________________________________________
________________________________________________________________________
From: erikb@tic.com (Chris Goggans)
Subject: Insecurity? What else is new?
Date: Thu, 10 Feb 94 00:02:42 -0600
To: firewalls@GreatCircle.COM
As many have read lately, the Internet is once
again the center of attention for people up in
arms about "SECURITY PROBLEMS!!"
This is a load of hooey. What is happening now,
is no different than what has been going on for
years. The only difference now is that more
reporters are (or at least consider themselves)
net aware.
Here's the story...
The biggest perpetrators of the recent break ins
(recent meaning the last year or so) have been a
group of miscreants who are oftimes referred to
as "The Posse."
They, and their friends, are located in
Pennsylvania, New York/New Jersey, Ohio, Arizona,
and Florida.
One of the PA residents, and the FL person,
involved in the breakins has parted ways with the
two main people involved due to in-fighting among
their little group. The New York/New Jersey
parties are not as actively involved in the
hacking, but perfom needed social engineering and
phone related tricks for the group in exchange
for other favors. The main antagonists are both
in their late teens...a PA data entry clerk, and
an OH hotel desk clerk.
Their main method of attack involves getting root
on a site then monitoring incoming and outgoing
traffic using ethernet sniffers (on suns since
they are too pathetic to port their swiped
esniff.c program to run on ultrix or other
variants) and capturing all tcp activity. They
then use this information to get in other hosts
and start over.
They have programs that allow them to get ypmaps
from remote (ypsnarf.c); to nfs mount damn near
anything; to get root using sendmail, rdist, the
mult bug, and others.
They have patches to allow them the ability to
place backdoors in login and in.telnetd, and to
run other shells to let them jump over
firewalls. They have utilities to remove
themselves from wtmp, utmp, pacct, ps, and
netstat. Unless you have a tcp-wrapper going,
you probably wont notice them.
I would estimate that about 25% of the American
Internet is compromised. This is predominantly
university traffic but since these are the people
behind breakins at The Well, CNS, Panix, NSFNet,
BarrNet, Sun, and others, its pretty safe to
assume that they have a lot of fun addresses to
play with.
Although they have amassed a HUGE amount of hosts
through their sniffing, it is unclear as to what
they want with the hosts. The predominant motive
appears to be the ability to get on IRC
anonymously and send ICMP floods to servers and
annoy people. They also play games impersonating
people on netnews and mail, they fake hacking
attempts in order to try to frame people, they
play phone games and prank people over and over
or otherwise disconnect or disrupt service, they
get credit information or billing records to
spread around, etc.
(As I said before, its pretty pathetic)
The real crime here is that the authorities know
precisely who is involved, and it persists. One
individual was even involved with the MOD busts a
few years back and is no longer a minor. Perhaps
this time his father won't be able to intervene.
They really dont seem to care what happens to
them, and they know full well that the
authorities have been questioning people about
them, yet they persist. Obviously the illusion
of power on the net is far more desirable than
their petty real lives.
my .02
- ->ME