Interesting People mailing list archives
IP: two more on NSA KEy one from Spafford and one from MS
From: David Farber <farber () cis upenn edu>
Date: Sat, 4 Sep 1999 16:01:52 -0400
X-Sender: X-Sender: spaf@128.10.2.20 Reply-To: spaf () cs purdue edu X-URI: http://www.cerias.purdue.edu/ Date: Sat, 4 Sep 1999 11:49:52 -0500 To: farber () cis upenn edu From: Gene Spafford <spaf () cs purdue edu> Subject: Re: IP: Some more on "nsakey" Cc: ip-sub-1 () admin listbox com Well, it is always easier to believe a conspiracy theory or dark designs. However, there may be alternative explanations. For instance, I happen to know that various 3-letter agencies use a lot of Windows machines (in a sense, that should be scary all by itself :-). Suppose they want to load their own highly-classified, very closely-guarded version of their own crypto routines. Do you think they will send copies of their code out to Redmond to get it signed so it can be loaded? Or are they going to sign it themselves, with their own key, doing it in-house where it is "safe"? If they are going the in-house route, then either Microsoft needs to share the private key with them (bad idea), or the code needs to accommodate a second key schedule generated inside the TLA. Hmmm, that sounds familiar, doesn't it? Another explanation, that I may have read here (this issue has been discussed on many lists) is that to get the approval for export, the folks at MS needed to include a "back-up" key in case the first was compromised in some way. They would need to switch over to using the alternate key for all the systems already out there. But how would they do that unless the second key was already installed, so they could do the switch using that second key? So, if you were MS, and the NSA required you to install a backup key like this, what would you call it? Of course, it could be that MS wanted the backup key themselves, and the programmer involved in the coding decided to name it something silly. Or, there is a history of MS code being shipped with undocumented code elements, and things that MS management don't know are present. Suppose the code (involving only a few lines of code) was placed there by an agent of the intelligence services of some other country (it wouldn't be that hard to subvert an existing employee or place one at MS with good coding skills who could eventually gain access to the appropriate code). He/she names the variables with "NSA" in place in case anyone doing a code review would question it -- and includes a comment block that says "The NSA required this to be here -- do not change or ask questions." The "sinister purpose" might be correct, but you are blaming the wrong entity. Heck, maybe this is a grand design of Mr. Gates himself: after all, he's certainly having some aggravation from the U.S. Justice Department! There are other possible explanations for the name, too. These alternate explanations do not mean that the extra key does not have side-effects (such as clandestine installation and circumvention of the export controls). And of course, we will probably never know what the primary reason for this key is, nor will we know what role these side-effects may have had in the decision, despite what people eventually claim. The key thought is that there are possible scenarios for the naming of the key that do not involve nefarious activity, or do not involve such activity by the NSA. That should not be the immediate conclusion people reach. And, at the risk of starting some tirades, let me ask a (rhetorical) question: even if it was put there for purposes of clandestine monitoring, what is wrong with that? If this gets used to monitor terrorists with NBC weapons, drug cartels, or weapons labs in Iraq, isn't that what we want done? In that light, there should be some concern that this has now been exposed and possibly nullified! The history of cryptography shows -- repeatedly -- that having crypto assets makes a huge difference in times of conflict, and that getting such assets in place and working takes time. It would be naive to believe that there are no such threats looming, or that there is no such likelihood in the future. We should be clear in our discussions as to whether our concern is the presence of the code, or over who may have control of it. Is the issue really one of what controls are in place that ensure that the code isn't used against inappropriate targets (e.g., law-abiding, friendly businesses and citizens)? Unfortunately, we don't have strong assurances in this realm, and there have been some past abuses (or alleged abuses). But that may be moot if the code was actually placed for some other group's dark design. --spaf
From: "the terminal of Geoff Goodfellow" <geoff () iconia com> To: "Dave e-mail pamphleteer Farber" <farber () cis upenn edu> Microsoft Says Speculation About Security and NSA is 'Inaccurate and Unfounded' PR Newswire, Sep 3 20:35 REDMOND, Wash., Sept. 3 /PRNewswire/ -- Microsoft Corp. said today that speculation about Microsoft(R) Windows(R) security and the U.S. National Security Agency (NSA) is "inaccurate and unfounded." In response to speculation by a Canadian cryptography company that Microsoft had somehow allowed the NSA to hold a "backdoor" key to the encryption framework in its Windows operating system, Microsoft issued the following statement: "This report is inaccurate and unfounded. The key in question is a Microsoft key. It is maintained and safeguarded by Microsoft, and we have not shared this key with the NSA or any other party. "Microsoft takes security very seriously. This speculation is ironic since Microsoft has consistently opposed the various key escrow proposals suggested by the government because we don't believe they are good for consumers, the industry or national security. "Contrary to this report, the key in question would not allow security services to be started or stopped without the user's knowledge." Microsoft said the key is labeled "NSA key" because NSA is the technical review authority for U.S. export controls, and the key ensures compliance with U.S. export laws. The company reiterated that Microsoft has not shared this key with the NSA or any other company or agency. Founded in 1975, Microsoft (NASDAQ:MSFT) is the worldwide leader in software for personal computers. The company offers a wide range of products and services for business and personal use, each designed with the mission of making it easier and more enjoyable for people to take advantage of the full power of personal computing every day. NOTE: Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corp. in the United States and/or other countries. Other product and company names herein may be trademarks of their respective owners. SOURCE Microsoft Corp. -0- 09/03/1999 /NOTE TO EDITORS: If you are interested in viewing additional information on Microsoft, please visit the Microsoft Web page at http://www.microsoft.com/presspass/ on Microsoft's corporate information pages./ /CONTACT: press only, Jennifer Todd of Waggener Edstrom, 425-637-9097, or jtodd () wagged com, for Microsoft; or Mark Murray of Microsoft, 425-936-3306, or mmurray () microsoft com/ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Geoff_Goodfellow () iconia com, Prague CZ * tel/mobil +420 (0)603 706 558 "Success is getting what you want & happiness is wanting what you get" http://www.nytimes.com/library/tech/99/01/biztech/articles/17drop.html
Current thread:
- IP: two more on NSA KEy one from Spafford and one from MS David Farber (Sep 04)
