On Tuesday 25 March 2003 22:34, Steven M. Bellovin wrote:

> Let me quote what the (U.S.) 2nd Circuit Court of Appeals said in the
> T.J. Hooper case (60 F.2d 737, 1932):
> 
>         Indeed in most cases reasonable prudence is in face common prudence;
>         but strictly it is never its measure; a whole calling may have unduly lagged
>         in the adoption of new and available devices.
>         It may never set its own tests, however persuasive be its usages.
>         Courts must in the end say what is required; there are precautions
>         so imperative that even their universal disregard will not
>         excuse their omission....
> 
>       But here there was no custom at all as to receiving sets; some had
>         them, some did not; the most that can be urged is that they had
>         not yet become general.  Certainly in such a case we need not
>         pause; when some have thought a device necessary, at least we may
>         say that they were right, and the others too slack.
> 
> Given that there were published warnings of *practical* MITM attacks (my 
> papers, Radia Perlman's dissertation on secure routing, Lawrence 
> Joncheray's paper on TCP hijacking, etc.), I have no doubt whatsoever 
> what a (U.S.) court would have ruled if there had ever been a real attack.

I'm sorry, I won't be able to do more than
speculate on this, and I wasn't aware of
your legal background, so please take the
below as "not advice."  I.e., IANAL and
all that.

Courts are notoriously difficult to predict.
That's why they say "take legal advice" :-)

And, it may very well be that Netscape
took legal advice, and at that time, it did
seem that MITM protection at the level
of CA-certificates was a reasonable choice
(c.f., David Wagner's post) amongst other
reasonable choices, so I don't think there
is any doubt that what was done back in
'94 was reasonable in the circumstances.

But, on the face of it, you appear to be
saying that because the court saw warnings
then it ruled that the warnings were sufficient.

I don't read that at all.  I see that interpretatation
as a Chicken Little argument.  This opens the
way to Info-war style consultants saying that
because you were warned, you are liable.

That above snippet says "there are precautions
so imperative" which implies the court had already
reached its opinion on the merits of this protection,
which is precisely what this discussion has
aimed to address.  In fact, the court said very
clearly that it is the one to decide what the test
is - not the industry.

The court then went on to say that, as it found
the precautions imperitive, and as the industry
had warned, albeit contraversially, then, it
concluded, relying on the lack of industry custom
and agreement as a defence was insufficient.

So, with respect, I would say that the above
should be read as "do not rely on discordant
others, be they so-called experts or Chicken
Littles on either side, in applying your own
prudential measures," which is quite the
reverse of your reading.



Now, the above is speculation;  not having
the full ruling and the full training, one can't
do more.  But, to take mere warnings as
liabilities is to forgoe ones profession as an
engineer, and hand ones responsibilities
over on the one hand to the religious seers
of doom, and on the other, to the lawyers.

The ludicrousness of this approach is
perhaps more crystallised when we consider
that half of the world's web servers are
shipped for free (c.f Apache).  The crypto
components are still, AFAIK, dealt with
outside America for the most part.

And, a growing share of browsers are now
shipping for free or near-free.  We've seen
over the last year or so, Konqueror, Mozilla,
and Safari rise to take back the forgotten
gauntlet of "browser for the rest of us."

These are not sold products.  There are no
contracts that imply security.  The world
of open source is not necessarily going to
be treated in the courts the same as a
purchased product with implicit liabilities
of a consumer nature.

I grant that America may be moving towards
a world where Eric Y or Ben L will be norieged
and hailed before a california court in some
case for inadequate MITM protection, but,
I personally don't see that as a world that I
would accept on the face value of some
legal handwaving.

Is that really what we want for our Internet?

-- 
iang

PS:  It is apropos that the CA industry uses
the same approach in trying to define industry
custom as sufficient;  see Jane K Winn,
_Courriers without Luggage_ for her expose of
the fallacy in this.  In contrast to your implied
claim that SSL providers would be at risk if
they didn't do the MITM approach, I'd suspect
that CAs are on the hook, because of the
very arguments that Winn and, now, Hooper
advance. )


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to