[762] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

KR in company policy

daemon@ATHENA.MIT.EDU (Antonomasia)
Fri May 9 09:46:50 1997

Date: Thu, 8 May 1997 18:40:25 +0100
From: Antonomasia <ant@notatla.demon.co.uk>
To: cryptography@c2.net
Cc: hal@rain.org



   [I sent this yesterday to Lucky, Tom and Pat.
    Lucky suggested posting it to the list.
    I'm copying it to Hal in case of a moderator's
    thumb pointing downward.
   ]

   My view of company computer equipment and office
   stuff in general is that the company owns it and
   can say what you should do with it.  This is a major
   reason why I have my home computer.  (I am not trying
   to excuse occasions when managers may produce stupid
   plans for the equipment.)

   My company has a policy which includes auditing what
   goes through the gateway.  Nevertheless, I have never
   been asked to produce keys or plaintext for any of my
   mail messages (PGP or Mixmaster). (I have verified that the
   company-supplied PGP is the same as that at ftp.ox.ac.uk.
   I do not believe workstations I administer have been
   compromised without my knowledge.)
   I am lead to think that the auditing either:

          1)   is a bluff

          2)   is only aimed at porn-seekers

          3)   established early-on what my interests are
               and that I can be trusted

In fact I do not use crypto for essential business.

I did consider encrypting my backups because of the ease of
stealing a tape with most of our work on it.  I never have.
Backups take nearly all night as it is.   Potential for getting
disciplined after tape theft is near zero.  Potential after
failure to recover backups is significant.  Managers are far,
far, far more interested in cost than security.

   Possible situations where management wants key access are:

     1)    They want access to business cyphertext.
           There should be a set policy of who gets what key,
           and in what circumstances, and who should know when
           he does so.  Use the written policy.
           If secrets are to be kept by some employees from others
           or if signatures are to have value a
           'boss owns all keys under him' policy will not work.
           Make the bosses realise this.  Obstructing corruption
           ought to be one aim of the policy.

     2)    They want access to personal cyphertext.
           You could avoid this by radically restricting
           personal use of the company computers.

     3)    They want access to mysterious cyphertext
           that landed as spam in your mailbox.  It may
           be hard to convince them, but you have no idea
           either.  Why not hand it over and ask _them_ what
           it is ?  In any event you are responsible for what
           you say and do rather than what some kook says to you.

   The plans I suggest for avoiding KR issues are:

   Make backups of keys as good as backups of cyphertext.
   You then do not risk 'lost key - retained text' situations.
   (The backups may be different though, both to keep the
    text and keys separately, and to allow deliberate
    destruction of old keys.)
 
   Store email as plaintext if it must be stored and the need for
   communications secrecy is over.  Or re-encrypt with a storage key.

   Hand over plaintext (in preference to a key) when management
   access is wanted.

   The hypothetical 'employee holds company cyphertext hostage'
   question is bogus.  If the employee has the power to change
   or delete the data then he is being trusted with it.  You
   either select staff better or split the work differently.
   Bonfire, removed media, refusal to decrypt  - what's the
   difference ?  This is not a crypto question.


   Tom:  Imagine that Netscape releases a product with KR/OKAY
         and the law makes it mandatory.  Netscape then has a
         lead over competitors.  Would you be happy with that ?
         Imagine that a competitor gets into that position while
         Netscape is still KR-less.  What do you think about that ?
         In saying 'business is business' you may be speeding GAK
         along.  Let the USG produce their own software with the
         features they want.


 Lucky Green wrote:
 > 
 > The notion that KR is the best, if not only, way to allow corporate
 > access to plaintext is a false perception that the pro-GAK forces
 > successfully managed to install into the minds of corporate America
 > and even many list members.

 From: Patrick Madden <madden@openmarket.com>
 : Lucky,
 : 
 : You've asserted several times recently that KR is not the best way to allow
 : corporate access to plaintext.  Unfortunately, if you posted it, I missed
 : the description of the alternate model you have in mind.  Could you please
 : post it--I'm in the middle of managing this situation in a real-world
 : context, so any concrete information (implementations, papers) would help me.
 : 
 : Thanks,
 : --Pat

 From: Tom Weinstein <tomw@netscape.com>
 : You keep saying this, but you haven't told us what the right solution
 : is.  Please enlighten me.



--
###############################################################
# Antonomasia           ant@notatla.demon.co.uk               #
#  (mail arcbot@notatla.demon.co.uk for cryptography archive) #
###############################################################

home help back first fref pref prev next nref lref last post