[4583] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Intel & Symantec v. ZKS?

daemon@ATHENA.MIT.EDU (William H. Geiger III)
Sat May 1 13:27:00 1999

From: "William H. Geiger III" <whgiii@openpgp.net>
Date: Sat, 01 May 1999 12:11:24 -0500
To: cryptography@c2.net
In-Reply-To: <199904292040.WAA25584@mail.replay.com>

In <199904292040.WAA25584@mail.replay.com>, on 04/29/99 
   at 03:40 PM, Anonymous <nobody@replay.com> said:

>William H. Geiger III writes:

>> One has to wonder if this is the actions of a company that is trustworthy
>> enough to supply RNG's to the community. IMHO it is not and I sincerely
>> hope support for the PIII is *not* included in /dev/random and/or IPSEC. I
>> will not be adding any support code in my software.

>He quotes John Markoff's story in the New York Times:

>> Earlier this month, an Intel executive called executives at the Symantec
>> Corporation, maker of the popular Norton Antivirus software, and told them
>> that the demonstration program was "hostile code."
>>
>> Symantec agreed that the program fit its definition of a type of malicious
>> program known as a Trojan horse, so it included the software in its
>> continually updated list of dangerous programs, which include viruses,
>> that cause warnings to pop up on its customers' computers.

>In fact, this is perfectly reasonable on the part of Symantec, and if I
>had a PIII I would absolutely want my virus detection software to catch
>code which enables the serial number.  Any such action on the part of
>downloaded code is malicious and not in my interests, and anything the
>software can do to prevent it is good.

>This sets a precedent that code which reads the serial number contrary to
>the user's wishes is hostile.  This should help dissuade over-eager
>software registration programs from using the serial number in their
>registration process.  No antivirus software can detect all programs
>which try to read the serial number, but by making clear that such
>actions are antisocial it will help restrict its use.

>Granted, it would be better if the serial number didn't exist at all (but
>of course we know that network interface cards have always had serial
>numbers, don't we?).  And it would be better if Intel's method of turning
>off the serial number worked right.  But given that it does exist in a
>family of processors which will probably be widely used (ineffectual
>boycotts to the contrary), users do benefit by having unauthorized serial
>number programs be detected and identified as dangerous.

No, all this does is set the precedent of a major corporation flexing it's
muscle in an attempt to silence those who would expose their lies. This is
a typical case of corporate CYA and I am appalled by it. Do you honestly
think that Symantec is going to list any Microsoft products as a virus
when they covertly turn on this feature?

As far as ineffectual boycotts, I am not asking for the software not to
run on a P-III, I am asking that specific support for the P-III RNG not be
added. I don't think requiring Intel to shape up if they want to be
players in the crypto community is a Badthing(TM).


>> [Personally, given how bad the random number sources are in most
>> software, I'd say you are not doing your users a service. --Perry]

>Of course Perry is absolutely right.  The Intel RNG can provide a badly
>needed source of randomness.  The real problems are first, as was pointed
>out here yesterday, Intel has not documented how to read the RNG (and is
>apparently only supplying that information to partners like RSA and
>Microsoft).  And second, how should we count the entropy added by the
>RNG. Here is where the trust issue comes into play.  If it is really a
>good RNG we can count every bit as a bit of entropy.  If we don't trust
>it, we can use the RNG data but not count entropy from it at all.  Or we
>could split the difference and "semi" trust Intel, counting only some
>fraction of the nominal entropy provided by the RNG source.

So we should just blindly use a RNG of unknown properties from an
untrustworthy company? What will happen next when the P-IV has built in
crypto module (it is the next logical step)? Yes many programs have bad
random sources, many programs have bad crypto period. I don't use them and
I don't support them, plain and simple. I have to reiterate my original
statement from the /dev/random thread that I started:

"I have specific concerns, the #1 of which is that no analysis of this
program has been done!! If this was a crypto algorithm and one was to use
it without any analysis of it but only because "it came with the OS" one
would be severely chastised by the community. Unfortunately I am seeing
too many programmers blindly using /dev/(u)random on this very basis. I am
not saying it is a bad program, I am not saying it is a good program, I am
saying it is an unknown, and with something as important as one's random
number pool IMNSHO an unknown is not acceptable."

Here we have a RNG on unknown properties and yet there is already those
who wish to blindly rush out and uses it. You really should know better.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.openpgp.net
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
Talk About PGP on IRC EFNet Channel: #pgp Nick: whgiii

Hi Jeff!! :)
---------------------------------------------------------------



home help back first fref pref prev next nref lref last post