Re: full-disk subversion standards released

2009-03-05 Thread Kent Yoder
On Thu, Mar 5, 2009 at 12:13 PM, Kent Yoder  wrote:
> Hi Peter,
>
>>>Apart from the obvious fact that if the TPM is good for DRM then it is also
>>>good for protecting servers and the data on them,
>>
>> In which way, and for what sorts of "protection"?  And I mean that as a
>> serious inquiry, not just a "Did you spill my pint?" question.  At the moment
>> the sole significant use of TPMs is Bitlocker, which uses it as little more
>> than a PIN-protected USB memory key and even then functions just as well
>> without it.  To take a really simple usage case, how would you:
>>
>> - Generate a public/private key pair and use it to sign email (PGP, S/MIME,
>>  take your pick)?
>
>  I had this working using openCryptoki, the trousers TSS and Mozilla
> Thunderbird on openSUSE Linux.  If the setup instructions aren't in
> the various readmes of those projects I can help you set it up if
> you'd like.
>
>> - As above, but send the public portion of the key to someone and use the
>>  private portion to decrypt incoming email?
>
>  A simple PKCS#11 app to extract the public key is all that's needed
> with the above tools.
>
>> (for extra points, prove that it's workable by implementing it using an 
>> actual
>> TPM to send and receive email with it, which given the hit-and-miss
>
>  Done. :-)  Last time I tested this it worked fine...  Circa 
> 2006..-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


the bad idea that would not die

2009-03-05 Thread Perry E. Metzger

Excerpt:

   Aussie govt considers quantum leap in secure comms
   Commonwealth departments to trial Quantum Key Distribution.

   Australian governments may soon have the world's most secure data
   communication system if trials of a locally-developed quantum
   cryptography technology are successful.

http://www.computerworld.com.au/article/278658/aussie_govt_considers_quantum_leap_secure_comms

-- 
Perry E. Metzgerpe...@piermont.com

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: full-disk subversion standards released

2009-03-05 Thread Kent Yoder
Hi Peter,

>>Apart from the obvious fact that if the TPM is good for DRM then it is also
>>good for protecting servers and the data on them,
>
> In which way, and for what sorts of "protection"?  And I mean that as a
> serious inquiry, not just a "Did you spill my pint?" question.  At the moment
> the sole significant use of TPMs is Bitlocker, which uses it as little more
> than a PIN-protected USB memory key and even then functions just as well
> without it.  To take a really simple usage case, how would you:
>
> - Generate a public/private key pair and use it to sign email (PGP, S/MIME,
>  take your pick)?

  I had this working using openCryptoki, the trousers TSS and Mozilla
Thunderbird on openSUSE Linux.  If the setup instructions aren't in
the various readmes of those projects I can help you set it up if
you'd like.

> - As above, but send the public portion of the key to someone and use the
>  private portion to decrypt incoming email?

  A simple PKCS#11 app to extract the public key is all that's needed
with the above tools.

> (for extra points, prove that it's workable by implementing it using an actual
> TPM to send and receive email with it, which given the hit-and-miss

  Done. :-)  Last time I tested this it worked fine...  Circa 2006...

Kent

> functionality and implementation quality of TPMs is more or less a required
> second step).  I've implemented PGP email using a Fortezza card (which is
> surely the very last thing it was ever intended for), but not using a TPM...
>
>>Mark Ryan presented a plausible use case that is not DRM:
>>http://www.cs.bham.ac.uk/~mdr/research/projects/08-tpmFunc/.
>
> This use is like the joke about the dancing bear, the amazing thing isn't the
> quality of the "dancing" but the fact that the bear can "dance" at all :-).
> It's an impressive piece of lateral thinking, but I can't see people rushing
> out to buy TPM-enabled PCs for this.
>
> Peter.
>
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com
>

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Judge orders defendant to decrypt PGP-protected laptop

2009-03-05 Thread Ray Dillinger
On Tue, 2009-03-03 at 21:33 -0500, Ivan Krsti? wrote:

> If you give me the benefit of the doubt for having a reasonable  
> general grasp of the legal system and not thinking the judge is an  
> automaton or an idiot, can you explain to me how you think the judge  
> can meet the burden of proof for contempt in this instance? Surely you  
> don't wish to say that anyone using encryption can be held in contempt  
> on the _chance_ they're not divulging all the information; what, then,  
> is the other explanation?

The law is not administered by idiots.  

In particular, the law is not administered by people who are more 
idiotic than you.  You may disagree with them, or with the law, 
but that does not make them stupid.

On the one hand there are (inevitable) differences in profile
between a partition that sees daily use and a partition that 
doesn't.  If a forensics squad had a good look at my laptop, 
they'd see that my (unencrypted) Windows partition has not been 
booted or used in three years, whereas file dates, times, and 
contents indicate that one of the other partitions is used daily.

If he decrypts a partition that clearly does not get used 
frequently, and more to the point shows no signs of having been 
used on a day when it is known that the laptop was booted up,
then he is clearly in violation of the order.

More to the point, you're arguing about a case where they 
have testimony from multiple officers who have *SEEN* that 
the images are on the computer, where both defense and 
prosecution agree that they do not enjoy fifth-amendment 
priveleges, and where the testomony of multiple officers 
gives the partition name ("Z drive") in which the images 
were found.  If the decrypted partition does not match in 
these particulars, and especially if it does not show any 
evidence of usage while the laptop is known to have been 
powered up during the initial search, then the defendant 
is clearly in violation of the order. 

Now, I think there is a legitimate argument to be made about 
whether the defendant can be compelled to *use* a key which 
he has not got written down or otherwise stored anywhere 
outside his own head.  It's generally agreed that people can't 
be compelled to produce or disclose the existence of memorized 
keys, but can be compelled to produce or disclose the existence 
of any paper or device on which a key is recorded.  But 
regardless, if the order to use the key is considered legit, 
then failure to comply with the order (by using a different or 
"wrong" key, unlocking a different volume) is direct violation 
of a court order.  People go to jail for that.

Keep in mind that the right to be secure from search and seizure 
of one's documents has always been subject to due process and 
court orders in the form of search warrants.  The right to privacy 
is not an absolute right and never has been, and obstructing the 
execution of a lawfully served warrant is not a viable strategy
for staying out of jail.

Bear
(neither a lawyer, nor, usually, an idiot)


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com