Ross,
      I might have been misunderstood.
I did not mean that we should normally use encrypted text for the 
messages and almost all the time we would not. However, especially if 
there was a large number of deceased, the authorities would be reluctant 
to allow that traffic to go unencrypted over our networks.
The media is these days very much a wild card.

73 Barry VK2AAB

Ross Whenmouth wrote:
> Hi,
> 
> I think that cryptographic authentication which does not obscure the 
> message being conveyed, should not only be allowed, but should be 
> encouraged for practices like repeater linking via the internet and 
> remote controlled transceivers, etc
> 
> 
> However, I am very much against the conveyance of encrypted traffic 
> (deliberately obscured messages) via amateur radio. I even consider the 
> D-Star is treading a very fine line because the codec used is secret and 
> the only way to decode it is with DVSI's magic black-box chip. I am not 
> familiar with the HIPAA regulations. If HIPAA provides for relaxed 
> privacy rules in time of emergency, then there is no problem?. Cleartext 
> communications have the advantage that anyone with the right equipment, 
> even just riding in the ambulance with a handheld because the 
> paramedic's trunked radio system is down can make a difference without 
> dealing with the issues of key managment and having the right crypto 
> hardware.
> 
> Thinking about it, if there has been a large scale disaster or other 
> emergency situation sufficient to require hams to provide emergency 
> medical communications, and I am seriously unwell, requiring urgent 
> medical assistance, then secrecy of communications between whoever is 
> treating me and whoever holds my medical records will be the least of my 
> concerns.
> 
> If this is not acceptable, then a compromise might be to allow only 
> personally identifiable information to be encrypted (eg name, sex, DOB) 
> with everything else sent cleartext.
> 
> 
> I imagine that crypto authentication could work on a "web of trust", 
> like SSL/TLS.
> For instance, I generate a public/private key pair (or I may be supplied 
> with one) and my public key is signed by an entity that certifies that I 
> am indeed a ham. NZART confirms my licence and signs my key with their 
> private key.
> ARRL and NZART trust each other as licence certifiers so they sign each 
> other's keys (the IARU is probably a good way to connect the various 
> licence certifiers with each other).
> A ham in say the USA has his key signed by say the ARRL (or maybe the 
> FCC if the US gov't wants to handle it?)
> Then, when I try to connect to the VOIP to RF gateway in the USA, the 
> remote machine sees that my key is signed by NZART, and NZART's key is 
> signed by ARRL, which is marked as a trusted certifier by the repeater 
> trustee, so I am granted TX privileges.
> To prevent session hijacking, each authenticated packet would need to 
> contain a crypto authentication token instead of the regular CRC - maybe 
> something like the method used for "rolling code" alarm remote controls 
> where the token is a hash of the packet contents a rolling packets sent 
> counter (this protects against replay attacks) and a shared secret 
> (which would be negotiated during the authentication process). Since 
> this shared secret is just a number used for authentication, is not 
> "intelligible information" or a way of conveying a message, and all 
> "messages" are sent clear text, the negotiation of this shared secret 
> should not be considered to be "a message obscured by cryptography".
> 
> 
> Regarding the press listening to amateur emergency comms, should we be 
> concerned about this? what is it that we are doing that we don't want to 
> be public?
> My understanding is that keeping the public in the dark, feeding them 
> half-truths and bull-dust is a good way to breed conspiracy theories and 
> mistrust of authorities, which can be counter-productive to good 
> emergency management.
> 
> 
> 73 ZL2WRW
> Ross Whenmouth <[email protected]>
> 
> ------------------------------------------------------------------------------
> Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
> Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
> endpoint security space. For insight on selecting the right partner to 
> tackle endpoint security challenges, access the full report. 
> http://p.sf.net/sfu/symantec-dev2dev
> _______________________________________________
> Freetel-codec2 mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/freetel-codec2
> 

------------------------------------------------------------------------------
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
endpoint security space. For insight on selecting the right partner to 
tackle endpoint security challenges, access the full report. 
http://p.sf.net/sfu/symantec-dev2dev
_______________________________________________
Freetel-codec2 mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/freetel-codec2

Reply via email to