On Wed, 12 Jan 2000, Jeff Younker wrote:

[Sheesh, I wanna play too!]

> This implies that speed is a poor criterion for determining the quality of
> cryptographic code.

Indeed it is.  Unfortunately, with patent encumbered code where the 
patent holder won't allow you to code independent products without 
pricing you out of the market, there's not much to be done in the way of 
determining the quality of said code.  Now you can assume that the code 
is perfect, or you can assume it's evil, in a security context, key 
security code that has no means of independent verification automatically 
gets villified in my book.  

> hardware platform the code is running on. I suspect that this expertise is
> what you are paying for when you buy the BSAFE libraries.  ]

You suspect it's that, Bennett suspects that it isn't.  The point still 
stands that BSAFE doesn't compete on technical merit, it "competes" on 
the legal merit of an enforced monopoly.  Now, it's been quite a number 
of years since I even loaded BSAFE (but yes, I purchased a copy specificly to 
try to get around the legal hurdles - it wasn't worth it - there was still a 
*massive* per-server license fee for anything I developed internally 
for internal use.)  so I don't recall if the toolkit is staticly or dynamicly 
linked, but if it's static, and if the source isn't available, how can anyone 
verify such suspicions?  

In this thread I've seen some pretty rash things bandied about, and I'd 
like to try to address a couple more of them.

1.  If more open toolkits were available, the world would be a better 
place, because privacy protection would be easily affordable, and not 
some $300/server alternative for using code I wrote myself (when the 
server costs $800, $300 to use an algorithm from a toolkit I'm forced to 
use because of legality isn't that great in my view of things.)  SSLeay 
was a good independent implementation, it had the benifit of peer review, 
but it wasn't possible to use it for a home-grown company-internal Web 
server without spending more than a competing commercial closed-source 
product.

2. Competing implementations raise the bar.  Let's suppose for a minute 
(and I'm not suggesting this is anything other than pure fiction) that 
NSA got RSA to agree to trapdoor a BSAFE algorithm such as DES (and I've 
read papers that seem to say it's possible to trapdoor DES without 
breaking it, but my mathematical background isn't good enough to assert 
or deny such supposition).  Anyone producing sofware using DES that used 
the particular implementation in question would be immediately trojaned.  
Without any means of verifying that the code is indeed safe.  Now, 
fortunately the DES algorithm isn't patent encumbered, so it's rather 
easy to compare the source of several implementations and even code new 
ones freely (ignoring the distribution issues some governements impose.)  
The same won't be true of RSA until later this year.  But if we take the 
supposition that this happened, and we looked at the fact that (in our 
theoretical world) everyone writing DES software had to use BSAFE, we'd 
have a pretty large house of cards upon which all our privacy was built.  


I won't get into the intellectual property arguments because I don't 
think they're as directly germain to INFOSEC, but from a security 
standpoint, the fact that such encumberances are exclusionary to *differing 
implementations* bothers me *significantly*. 

I really wish someone could explain to me the economic or business arguments 
that make RSA's pricing scheme make sense:  If I buy their code, or 
the code of a vendor in bed with them, it's cheaper than if I write my own 
and just pay to use their algorithm!  Surely there's nothing other than 
railroading the use of a single implementation that makes that play out well, 
and surely we *all* agree that in security having a single implementation is a 
potential vulnerability.
     
It doesn't matter to me if RSA hires all the best crypto rocket 
scientists on the planet, and I can't code my way out of a wet paper 
bag.  Stopping me from being able to use an implementation where I've 
written the code, checked the libraries, verified the compiler, and 
everything else that falls under due dilligence is bad.  If my platform 
of choise isn't supported by BSAFE or a commercial product, I'm forced to 
pay more than replacing the entire platform is worth to code up my own 
implmentation.

As a corporate user, I'm perfectly prepared to pay a _reasonable_ 
ammount of money to a patent holder to roll my own software that uses a 
patented algorithm.  RSA's position on their intellectual property has 
however been what I consider unreasonable.  Because of that stance, I'll 
be fielding things that use Blowfish and D-H wherever possible.  In 
September when RSA's patent runs out, I'll be moving to a free library 
for anything that uses RSA.

At this point, I don't care if BSAFE _is_ well-written and secure.  I 
care that a security company puts its own interests before those of its 
customers in a predatory and exploitative way that is detrimental to 
security.  I wouldn't choose a firewall vendor that forced me to rely on a 
proprietary authentication protocol and charged me $200/client to write my own 
clients, and I won't choose a crypto provider that attempts the same.  Nor will 
I be getting another copy of BSAFE, or even certificates from their progeny if 
I can at all help it.


Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to