[1447] in RISKS Forum

home help back first fref pref prev next nref lref last post

Risks Digest 20.17

daemon@ATHENA.MIT.EDU (RISKS List Owner)
Wed Jan 20 14:04:32 1999

From: RISKS List Owner <risko@csl.sri.com>
Date: Wed, 20 Jan 99 10:57:59 PST
To: risks@MIT.EDU

RISKS-LIST: Risks-Forum Digest  Weds 20 January 1999  Volume 20 : Issue 17

   FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
   ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <URL:http://catless.ncl.ac.uk/Risks/20.17.html>
and at ftp.sri.com/risks/ .

  Contents:
Remarkable French announcement on crypto policy (Enzo Michalangeli and 
  John Young via Steve Bellovin from cryptography newsgroup)
Deep Crack cracks RSA's DES challenge in less than one day (PGN)
The RISKS of Web links (Daniel R. Tobias)
Virginia online sex offender database (Joe Thompson)
China solves the Millennium bug  (Pete Mellor)
Computer crash blew up radio listener's request messages (Kenji Rikitake)
REVIEW: "Stopping Spam", Alan Schwartz/Simson Garfinkel (Rob Slade)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Tue, 19 Jan 1999 17:59:22 -0800
From: Steve Bellovin <smb@research.att.com>
Subject: Remarkable French announcement on crypto policy

Date: Wed, 20 Jan 1999 08:50:53 +0800
>From: "Enzo Michelangeli" <em@who.net>
To: "John Young" <jya@pipeline.com>, <cryptography@c2.net>
Subject: Re: France allows 128-bit crypto

The third legislative initiative concerns cryptography. With the development
of electronic espionage instruments, cryptography appears as an essential
instrument of privacy protection.

We had, one year ago, made a first step towards liberalization of
cryptographic instruments. At that time I had announced that we were going
to make one further. The Government has, since then, heard the players,
questioned the experts and consulted its international partners. We have
today become convinced that the legislation of 1996 is no longer suitable.
In fact, it strongly restricts the usage of cryptography in France, on the
other hand, for all that, without allowing the public powers to fight
effectively against criminal actions of which encryption could facilitate
the dissimulation.

In order to change the orientation of our legislation, the Government has
thus retained the following orientations, that I have discussed with the
President of the Republic:

- - To offer a complete freedom of use of cryptography

- - To remove the compulsory nature or third-party escrow of encryption keys

- - To supplement the current legal framework by the introduction of
obligations, together with penal sanctions, concerning the handing-over
to the legal authorities, when they require it, of the cleartext
version of encrypted documents.  At the same time, the technical
skills of the public authorities will be significantly improved.

Changing the law will take many months. The Govenment has decided
that the main obstacles holding up the citizens from protecting the
confidentiality of their communications and the development of
electronic commerce be lifted without waiting. Also, waiting
for the announced legislative changes, the Government has decided
to raise the the the threshold of cryptology the use of which is
free, from 40 bit to 128 bit, considered by the experts a level
suitable to ensure durably a very high security.
- ---

Time to sing the Marseillaise again? :-)

Enzo

- -----Original Message-----
>From: John Young <jya@pipeline.com>
To: cryptography@c2.net <cryptography@c2.net>
Date: Wednesday, January 20, 1999 7:11 AM
Subject: France Allows 128 Bit Crypto

The French Prime Minister today announced that due to the threat of
espionage and invasion of privacy France will allow encryption
strength up to 128 bits:

http://www.premier-ministre.gouv.fr/PM/D190199.HTM

(c) Le troisihme chantier ligislatif concerne la cryptologie.
Alors que se diveloppent les moyens d'espionnage ilectronique, la
cryptologie apparant comme un moyen essentiel pour protiger la
confidentialiti des ichanges et la protection de la vie privie.

Nous avions, il y a un an, franchi un premier pas vers la
libiralisation des moyens de cryptologie. J'avais annonci alors que
nous en franchirions un autre ultirieurement. Le Gouvernement a,
depuis, entendu les acteurs, interrogi les experts et consulti ses
partenaires internationaux. Nous avons aujourd'hui acquis la
conviction que la ligislation de 1996 n'est plus adaptie. En effet,
elle restreint fortement l'usage de la cryptologie en France, sans
d'ailleurs permettre pour autant aux pouvoirs publics de lutter
efficacement contre des agissements criminels dont le chiffrement
pourrait faciliter la dissimulation.

Pour changer l'orientation de notre ligislation, le Gouvernement a
donc retenu les orientations suivantes dont je me suis entretenu
avec le Prisident de la Ripublique :

- - offrir une liberti complhte dans l'utilisation de la cryptologie ;

- - supprimer le caracthre obligatoire du recours au tiers de confiance
pour le diptt des clefs de chiffrement ;

- - compliter le dispositif juridique actuel par l'instauration
d'obligations, assorties de sanctions pinales, concernant la remise
aux autoritis judiciaires, lorsque celles-ci la demandent, de la
transcription en clair des documents chiffris. De mjme, les capacitis
techniques des pouvoirs publics seront significativement renforcies.

Changer la loi prendra plusieurs mois. Le Gouvernement a voulu que
les principales entraves qui phsent sur les citoyens pour protiger la
confidentialiti de leurs ichanges et sur le diveloppement du commerce
ilectronique soient levies sans attendre. Ainsi, dans l'attente des
modifications ligislatives annoncies, le Gouvernement a dicidi de
relever le seuil de la cryptologie dont l'utilisation est libre, de
40 bits ` 128 bits, niveau considiri par les experts comme assurant
durablement une trhs grande sicuriti.

------------------------------

Date: Wed, 20 Jan 1999 11:00:17 PST
From: "Peter G. Neumann" (Neumann@CSL.sri.com)
Subject: Deep Crack cracks RSA's DES challenge in less than one day

On Monday morning around 9am when this year's RSA DES challenge was
announced by Jim Bidzos at this week's RSA Data Security Conference in San
Jose, John Gilmore set Deep Crack to work.  (See RISKS-19.87 for
background.)  About 22:25 hours later, Deep Crack had found the 56-bit DES
key, capturing the $10,000 prize by breaking the 24-hour mark.  This latest
event further dramatizes the inherent risks of relying on cryptography.
(In three hours, Matt Blaze, Steve Bellovin, and I (with Jeff Schiller
unfortunately in absentia) tackle the question "Is Cryptography Enough?"
RISKS readers know well that the answer is NO.)

------------------------------

Date: Sat, 16 Jan 1999 11:20:21 -0600
From: "Daniel R. Tobias" <dan@softdisk.com>
Subject: The RISKS of Web links

I received a message this morning from somebody complaining about my
inclusion of a link to a pornographic Web site from a page that would
otherwise have been a suitable resource for him to refer to scholars and
students interested in the topic of my page.  This came as news to me, as I
had no knowledge of having any direct "porn" links from my site.  Some
pretty extreme politics and philosophical stuff, yes, but no dirty pictures.
So I checked the page in question and tried the links from it, and found
that one of them did indeed go to a porn site.

It turned out that what had happened was that the domain name of the site I
had linked to was either sold by its former owner or allowed to expire at
InterNIC due to nonpayment of renewal fees, and the domain was picked up by
a new owner who's in the business of online pornography.  This new owner set
up the server so that links to any page on the old site would bring up the
X-rated home page of the porn site, instead of just resulting in a "404 Not
Found" error.

This illustrates a big risk for anyone who maintains links to other Web
sites; places you link to can radically change their character, especially
if domain names expire and get acquired by different parties.  This may have
a highly damaging effect on the reputation of a site that winds up with such
a link, and the use of automated link-checking programs to weed out "404 Not
Founds" won't find this sort of problem.

--Dan
http://www.softdisk.com/comp/dan/

  [This does remind us of the Intuit 800 number case "Risks of old
  documentation" that Richard C. Wolber contributed in RISKS-20.15.  PGN]

------------------------------

Date: Tue, 19 Jan 1999 15:37:07 -0500
From: Joe Thompson <joe@orion-com.com>
Subject: Virginia online sex offender database

Virginia recently (December 29) released an online sex-offender database:

http://sex-offender.vsp.state.va.us/Images/Search.htm

In its first three weeks of operation, besides glitches involving names of
offenders, two of 49 local residents whose addresses were published in a
local weekly contacted them to say that the offender listed as living at
that address has moved.  The Virginia State Police have promised to update
the database "swiftly".

Needless to say, the Virginia chapter of the ACLU is pointing to these
errors as the exact reason they oppose the website. -- Joe

Joe Thompson  Charlottesville, VA    joe@orion-com.com
http://kensey.home.mindspring.com/

------------------------------

Date: Sat, 16 Jan 1999 19:47:13 GMT
From: Pete Mellor <pm@csr.city.ac.uk>
Subject: China solves the Millennium bug 

According to the BBC World Service yesterday, and various 
items in newspapers, China has solved its Millennium problems 
(at least where air transport is concerned) at a stroke. 

The chief executives of all of its airlines are ordered to be 
airborne at midnight on 31st December 1999. 

Peter Mellor, Centre for Software Reliability, City University, Northampton 
Square, London EC1V 0HB, UK. Tel: +44 (171) 477-8422, Fax: +44 (171) 477-8585 

  [Apparently "only under consideration", not established.  PGN]

------------------------------

Date: Sun, 17 Jan 1999 13:54:57 +0900 (JST)
From: Kenji Rikitake <kenji@k2r.org>
Subject: Computer crash blew up radio listener's request messages 

About 11:30pm EST, January 16, 1998, on CBC Radio One, Holger Petersen,
the host of the program called Saturday Night Blues, said that he lost
his listener's request voice messages due to "a computer crash" in CBC
office in Edmonton, Alberta, Canada.  Another proof of taking risk of
NOT making backup data.

Kenji Rikitake <kenji.rikitake@acm.org>, Toyonaka City, Osaka, JAPAN

------------------------------

Date: Mon, 18 Jan 1999 11:44:23 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
Subject: REVIEW: "Stopping Spam", Alan Schwartz/Simson Garfinkel

BKSTPSPM.RVW   981030

"Stopping Spam", Alan Schwartz/Simson Garfinkel, 1998, 1-56592-388-X,
U$19.95/C$29.95
%A   Alan Schwartz alansz@araw.mede.uic.edu
%A   Simson Garfinkel simsong@vineyard.net
%C   103 Morris Street, Suite A, Sebastopol, CA   95472
%D   1998
%G   1-56592-388-X
%I   O'Reilly & Associates, Inc.
%O   U$19.95/C$29.95 800-998-9938 fax: 707-829-0104 nuts@ora.com
%P   208 p.
%T   "Stopping Spam"

Eternal vigilance is the price of junk free email.  Therefore, readers
expecting to find a quick fix for spam in this book are possibly going
to be disappointed.  Those who persevere, however, will find much
useful material that is both interesting, and valuable in the fight
against unsolicited and commercial mass mail bombing.

Chapter one details the problem with a definition of spam, the
functionally differing types of spam, the different intention of spam
(including reputation attacks), and the reasons why spam should be
combatted, rather than merely tolerated and deleted.  A historical
background to the situation is provided in chapter two.  This includes
mention of viral programs (plus a repetition of the myth that CHRISTMA
EXEC caused a mass shutdown of VNET).  the primary emphasis, though,
is on the Green Card Lawyers, Cyberpromotions, and others of that ilk. 
(A warning against vigilante actions is also germane.)  The current
position is described very briefly in chapter three.  Groups of
spammers and spamming tools are noted.  (Perhaps the authors do not
want to give anyone ideas, but the technology section is very terse
indeed.)  In closing, a nightmare future spam scenario is provided.

Chapter four provides a solid technical background for further
discussion of spam, covering mail agents and the mail and news
protocols.  A number of steps that the average computer user can take
are listed in chapter five.  The range from hiding your identity or
preventing address "harvesting" (not all the suggestions are
convenient), to the more active detecting of spammers behind spoofing
techniques, and reporting to authorities.  Similar advice for
newsgroups is given in chapter six, emphasizing specific programs like
NoCeM.

Chapter seven moves into larger areas of responsibility with advice on
both policy and practical configuration settings to reduce both
incoming and outgoing spam.  The larger net community is addressed in
chapter eight.

An appendix lists a wide variety of resources, but the annotations may
not always give you the complete picture.  For example, the Spam Media
Tracker Web site is listed, but at a relatively old address.  This, of
course, happens all the time on the net, but it is stranger that there
is no mention of the spam-news mailing list, the original (and
ongoing) source for the site.

It would, or course, be prohibitive to identify all international
agencies dealing with spam.  However, do note that only US government
offices are noted as departments to report to.

While understandable, the tone of moral outrage that colours the
initial chapters may not be as helpful as a calmer precis.  As the
book hits its stride, though, it provides a good deal of helpful and
useful information.  All ISPs (Internet Service Providers), corporate
network administrators, and net help desks should have a copy of this
reference handy.  Any serious Internet user will also find it well
worth the price.  As the authors put it, in slightly different words,
the only thing necessary for the triumph of spammers is that good
users do nothing.

copyright Robert M. Slade, 1998   BKSTPSPM.RVW   981030
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
Find virus, book info http://victoria.tc.ca/int-grps/techrev/rms.html

------------------------------

Date: 23 Sep 1998 (LAST-MODIFIED)
From: RISKS-request@csl.sri.com
Subject: Abridged info on RISKS (comp.risks)

 The RISKS Forum is a MODERATED digest.  Its Usenet equivalent is comp.risks.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) 
 if possible and convenient for you.  Alternatively, via majordomo, 
 SEND DIRECT E-MAIL REQUESTS to <risks-request@csl.sri.com> with one-line, 
   SUBSCRIBE (or UNSUBSCRIBE) [with net address if different from FROM:] or
   INFO     [for unabridged version of RISKS information]
 .MIL users should contact <risks-request@pica.army.mil> (Dennis Rears).
 .UK users should contact <Lindsay.Marshall@newcastle.ac.uk>.
=> The INFO file (submissions, default disclaimers, archive sites, 
 copyright policy, PRIVACY digests, etc.) is also obtainable from
 http://www.CSL.sri.com/risksinfo.html  ftp://www.CSL.sri.com/pub/risks.info
 The full info file will appear now and then in future issues.  *** All 
 contributors are assumed to have read the full info file for guidelines. ***
=> SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line.
=> ARCHIVES are available: ftp://ftp.sri.com/risks or
 ftp ftp.sri.com<CR>login anonymous<CR>[YourNetAddress]<CR>cd risks
   [volume-summary issues are in risks-*.00]
   [back volumes have their own subdirectories, e.g., "cd 19" for volume 19]
 or http://catless.ncl.ac.uk/Risks/VL.IS.html      [i.e., VoLume, ISsue].
 PostScript copy of PGN's comprehensive historical summary of one liners:
   illustrative.PS at ftp.sri.com/risks .

------------------------------

End of RISKS-FORUM Digest 20.17 
************************

home help back first fref pref prev next nref lref last post