[3780] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Using proxies to bypass ITAR

daemon@ATHENA.MIT.EDU (John Lehmann (SSASyd))
Wed Dec 11 19:47:23 1996

From: "John Lehmann (SSASyd)" <LEHMANNJ@saatchi.com.au>
To: "'www-security'" <www-security@ns2.rutgers.edu>
Date: Thu, 12 Dec 96 09:44:00 S
Errors-To: owner-www-security@ns2.rutgers.edu


Hello,

I have just been a part of setting up a major department store online   
(here, in Australia).  For a number of reasons, we chose to use winNT and   
MIIS and so are limited by ITAR to using a 40-bit key.  In the long-term   
this is obviously unacceptable, as is also using a 56-bit key or any of   
the other funny escrowie solutions proposed by the US government.

A computer running Apache-SSL sits on the other end of my desk.  I have   
been contemplating suggesting to our client that they move to some such   
more flexible arrangement, at least for the sections of the site that   
deal with such details as credit-card numbers.  There has, however, been   
a large investment in working with MIIS, that I am loathe to redo. *sigh*

I have been watching the recent discussion of more-secure-proxy-server   
wrappers (Securescape, SafePassage) with great interest.  As they become   
more common at various levels (I believe that many Australian ISPs offer   
ssl-proxying, and most of them seem to be using Apache, rather than one   
of the crippled US-developed servers) it will become sensible to offer a   
better level of security to customers.

So, I was wondering, would it be feasible to wrap (with a firewall) a   
US-developed-server-with-poor-security in a more-secure-proxy in a manner   
complementary to the service offered by SafePassage and similar products?

 --
John Lehmann
Saatchi & Saatchi, Interactive

home help back first fref pref prev next nref lref last post