Netscape Receives Strong Crypto Export Permission 137
Update:: We were fooled. Someone posted this on http://www.activewin.com/frames/frmhome.shtml as new news (suckered them!), which apparently misled the slashdot submitter and us. This is an old press release from 1997 talking about exporting software for certain specialized banking purposes. As far as I know, it's still illegal to generally export 128-bit crypto products.
Thanks to the alert posters in the threads below and to alecf who was bright enough to submit it in the stories inbox (which any of the assorted slashdot authors who are online might be reading) for a fast response. Sorry for the "desinformation" (is that a pun?).
Unlocking International SSL (Score:1)
There's been a utility around for quite awhile that just flips a couple bits in your exportable netscape executable, and wala, you've got full 128bit SSL.
Re:Not true, it seems... (Score:1)
> ...www.fortify.com...
You mean: www.fortify.net [fortify.net]
--j
Re:Ummm, is this out of date? (Score:1)
My share trading account with Barclay's Stockbrokers Ltd in the UK [barclays-s...kers.co.uk] doesn't work with a Browser that doesn't have 128-bit encryption capabilities.
It's not the case that my IE/Netscape is the US version with 128-bit as standard, but it does have some 128-bit capability.
Re:a little off topic, but still salient-- I think (Score:1)
"So, Mrs. Jones, you expect us to believe that you can positively remember not raping and eating babies on the evening of May 3, 1989?"
"Yes, I neither raped nor ate a baby ever, including May 3 of 89."
"Well, this is strange to me, that you can so positively recall not doing something. May I remind the court that this is the very same Suzy Jones who on Monday could not remember her 98 character passphrase, but on Tuesday suddenly was gifted with total recall, not erring by a single character, despite the fact that this 'passphrase' is, to you and I, nothing more than a nonsensical string of uppercase letters, lowercase letters, numbers and punctuation. Will you, perhaps, tomorrow remember eating these babies, ma'am?"
Again, food for thought. Let me reiterate how much I appreciate all of this feedback. Please, everyone, feel free to drop me an e-mail as other angles on this situation occur to you. I'm always anxious to hash this over.
-"S"HM
Re:good for e-commerce (Score:1)
Why? I guess if you're worried about people's irrational feelings..
One of the most labor and resource intensive ways to get credit cards is by sniffing 40 bit SSL traffic and decrypting that. I wouldn't be surprised if it has never happened. There would be no motive for it.
In most situations, the 40 bit SSL connection will be the most secure the card number is at any point in its journey.
A more reasonable way for someone to get your credit card is by stealing a stack of carbons from their retail job. Or copying the database off of the "secure" webserver.
And even then, it doesn't matter to you. It's the bank's problem. You have laws protecting you, and will find it very easy to get the charges removed. Considering how laughably insecure credit cards are, it's obvious that the banks don't care too much.
Re:a little off topic, but still salient (Score:1)
Can Red Hat and others also distribute it? (Score:1)
It's been frustrating not having readily available Netscape RPMs with strong encryption.
This will hurt lobbying for more crypto export (Score:1)
The NSA just realized that if they allow strong e-commerce crypto, but still block strong email encryption, the big companies will stop complaining and we'll never be able to export PGP (legally, that is!).
Exactly. A lot of the noise towards opening up the U.S.'s export restrictions on crypto have been coming from big companies that want to do e-commerce. Greater e-commerce is in the U.S. government's best interest, as American companies currently dominate that scene, and stand to make a lot of taxable income if the whole world can use strong encryption to buy from them.
Once those companies get strong encryption exports for e-commerce, they'll be quiet and happy. No one will be strongly lobbying (with money to really make the government change its mind) for further opening up, and exports of crypto in other areas like email will never happen.
Plus, I'm sure the intelligence impact to the NSA of not being able to read https connections is minimal, unless it turns out that they're using credit card fraud to supplement their budget or something.
Interesting to note (Score:2)
the key phrase being "brute force attack" (Score:1)
Mr. Schneir is very correct, as usual (the man is an absolute godsend for those of us that like encryption but don't like working for a gov :) ). But note that those figures assume a brute force attack. Just as there is more than one way to skin a cat, there is more than one way to break encryption. IIRC brute-force is analogous to the worst-case scenario from algorithmic analysis, in that it can't get any less efficient than that (i.e. any special tricks or shortcuts save cpu time).
Now, understand that I am by no means a conspiracy theorist, but the NSA (and similar governmental agencies) have many, many things going for them when it comes to breaking codes: money (lots of it, were talking on a government, a-million-bucks-is-lunch-money scale), brains (lots and lots of really intelligent people really into their jobs in close proximity to one another), and time (they've been doing this for decades non-stop since the late forties, admittedly not with the current algorithms but half of those they came up with).
*shrug* It isn't the NSA I'm worried about anyway when it comes to my browser, just some snot-nosed punque with a sniffer his big brother coded... ;^)
Re:... (Score:2)
Well, breaking RC4 seems significantly more likely than a 128 bit brute force, but OTOH you can change which ciphers you use. If the NSA could break any SSL cipher, that's bad, since TripleDES, RC2, and RC4 are all used by SSL (well, IDEA is in there too but nobody uses it). If TripleDES is broken, you can safely say that all is lost. It's used in everything: S/MIME, PGP, GnuPG, banks use it, basically anything you can think of uses it. And you can set it to use TripleDES only if you want (I do). In any case, if nobody but the NSA can break RC4 (if an academic discovered an attack it would be published by now), then I'm pretty happy: as I've stated elsewhere, they don't want my CC #. And that's all I'm protecting with SSL.
Desinformation (Score:3)
The article mentioned in the story is several years old and the only export that has been approved is the capability to unlock stron encryption when talking to servers that present a particular kind of certificate.
Please, check your stories!
Re:This will hurt lobbying for more crypto export (Score:1)
LOL. So that's how they afford all that computing equipment!!!
Re:a little off topic, but still salient-- I think (Score:1)
As an example, DNA testing is sent to court approved labs. I have yet to see a court allow a lawyer walk in with his own DNA tested evidence by an unkown testing entity.
I know it is the modus operandi here to adopt the most paranoid stance with regard to data privacy and any actions that would seem to undermine it, but people need to stop and think before voicing their opinions. It seems that most people grab the first thing that jumps in their mind and jot down a couple of lengthy paragraphs in the hope that their words can reinforce their shallow thinking.
Re:... (Score:1)
Don't assume that just because *you* don't have the resources *they* don't.
Cool... (Score:2)
Of course, the Non-US made browsers already are going to have 128Bit Encryption in them. How long until IE is 128Bit is exportable?
And again, of course, how hard is it to gte a 128Bit Encryption browser outside of the US? Not very!
noooo (Score:1)
How can this not break many laws in the us anyhow?
nil*
But... (Score:1)
... (Score:3)
Ummm, is this out of date? (Score:4)
The comment about DESCHALL having broken 56 bit "last week" was suggestive to me, but at the bottom, note:
SOURCE Netscape Communications Corp. -0- 06/24/97
Past news. Ah well.
--j
one less step i guess (Score:2)
It was always incredibly easy to get it anyway, but it's nice that there's now government permission. Definately a step in the right direction.
--
grappler
good for e-commerce (Score:1)
Wait a minute here... (Score:1)
~=Keelor
Re:This is definately out of date. (Score:2)
Good catch, I should've noticed the name change not having been picked up.
I also see that the contact phone numbers are listed as being in the 415 area code. Netscape (err, AOL Mountain View) changed area codes (to 510) some time back.
--j
Re:Desinformation (Score:2)
Re:... (Score:1)
Hrm... hadn't thought of that. But it would be a bit extreme at this point, I think. We're at, what, 3 qubits now? So the NSA can't have more than 15 or so (keeping in mind they've usually about 2 - 5 years ahead of the public state-of-the-art, based on what we've seen released (SHA-1, Skipjack, etc)). And even if what you suggest were true, a 1024 bit RSA key would still be a non-trivial effort.
Also mind that the NSA is not going to be brute forcing your keys (wasting their computing cycles) to recover your CC number.
Right. Even if the NSA can read it, who cares? The NSA doesn't want it, 37337 h4x0r's do, and they can't break it.
Re:Ummm, is this out of date? (Score:2)
Re:... (Score:1)
Re:... (Score:3)
This has been around for awhile, as Server Gated Crypto, and both IE and Netscape have this functionality. It's not that the NSA can break it (although I'm in no position to say that they can't, it's still possible), but that the only transactions being encrypted in this manner are going to be hand picked, to issue certificates, and probably only for bank/commerce transactions.
PS, all ACs, notice how I get my point across WITHOUT having to call him a karma whore? or bash his use of "..." as a subject. Remember, it's a free world, and it's his prerogative. Some of us actually appreciate intelligent conversation, regardless of its intent, and (last time I checked), he's still perfectly free to choose whatever subject he wants.
I'll shut up now and post so that I can be flamed.
Re:a little off topic, but still salient-- I think (Score:1)
One would suspect this-- I'd love for it to be the case-- but it won't be, not if the Clinton Admin's present stance becomes policy. The specific power that law enforcement agencies would be granted would be the right to not have to reveal how they arrive at plaintext (similar to the right law enforcement currently has to not reveal sources of "anonymous" tips.) The right to not-reveal would include the power to not have anyone looking over their shoulder (who has oversight over the NSA?) Remember, this isn't like a lawyer wandering in with his own evidence; this is the cops wandering in with their own evidence-- which is entirely normal.
I recognize that this reads as paranoid clap-trap, but I do believe this threat is very real. Witness the kinds of abuses committed by the Phillie PD or LAPD, each of which are currently being investigated on several thousand counts of fabricating evidence, as well as sundry other abuses.
(pardon the spelling-- I'm in a hurry) -"S"HM
Re:... (Score:1)
Huh? That's my point: there is no way to do a 128 bit brute force, at least not on an abstract cipher. Even a quantum computer will only be able to break in with 2**64 effort (or 2**84 with 168 bit 3DES keys). A quantum computer with that kind of power is decades away, and while the NSA does have advanced tech, it's highly unlikely that they're 20 years ahead of state-of-the-art.
If they can find a weakness in the cipher, sure. Finding a weakness in 3 ciphers (RC4, RC2, and 3DES) at the level where brute forcing the key is feasible seems highly unlikely. And if they can break TripleDES there's not much point in encrypting anything. 3DES has been studied for the last 20 something years, and never broken (publicly). If the NSA can break it, they can probably also break any other cipher out there.
Don't assume that just because *you* don't have the resources *they* don't.
LOL. I'm not assuming anything based on my capabilities. I could maybe break a 40 bit key, given a few weeks or so (on my computers, not by hand!). If they had to, the NSA could brute force a 64 bit or even 72 bit key. If the algorithm was bad I'm sure they could do much better.
Re:... (Score:1)
How much stronger (Score:2)
Sreeram.
Opera is not Limited (Score:2)
On the other hand, Opera will use 128bit with any server, not just those approved by the U.S. The beta is due this month.
Re:Ummm, is this out of date? (Score:1)
They absolutely do. Barclaycard [barclaycard.co.uk] have 128-bit encryption on their servers, which cause International editions of IE to act oddly.
rOD.
Re:... (Score:1)
on an abstract cipher. Even a quantum computer will only be able to break in
with 2**64 effort (or 2**84 with 168 bit 3DES keys). A quantum computer
with that kind of power is decades away, and while the NSA does have
advanced tech, it's highly unlikely that they're 20 years ahead of
state-of-the-art.
The point is that they might not have to brute-force it. It's possible that they've found a way to factor very large numbers, a breakthrough which would render all the current ciphers useless. In addition, the NSA being 20 years ahead of the public is not unheard of. Hopefully someone who knows better than me can elaborate, but I believe that when DES was being developed, the NSA made some suggestions that no one could figure out. They seemed useless at the time, but 20 years later, when the public discovered differential cryptanalysis, the suggestions were what kept the cipher safe. The logical conclusion would be that the NSA knew about DC 20 years before the public.
Bad news (Score:1)
I don't want a proprietary extension to the open source browser, I want strong encryption to come in the open source distribution.
The only good thing I can see in this is a thorn in the eye of Internet Explorer, but even as such I can't see it as having significant effect, the exportation laws are by neccessity more of a hinderance to truely international development efforts like the Open Source community than proprietary developers.
The silly exportation rule need to come down completely. Granted if this is a first step, that could be a good thing, but it will probably be long until the good old American paranoia steps back. Until then this can only serve to unfairly unbalance the market. Similar allowances will probably soon follow for IE, which means that browsers that distribute source with their programs will be the loser.
Eythain
Re:... (Score:1)
would render all the current ciphers useless.
Unless Diffie-Hellman key exchange were used instead of RSA (and DH is in SSL3). And for sym ciphers, there isn't anything basic that you can point to, and say "we can do this, so we can break this". The only real relation between, say, RC4 and 3DES is that they both use large secret keys.
So the only attack which can break both is a brute force attack. And as someone pointed out, breaking the key exchange will break SSL. But just being able to factor won't help you much in DH is used (tho I will admit that DH is not used much in SSL).
And more to the point: if the NSA can break RSA, why don't they let PGP be exported? It won't stop them!
The logical conclusion would be that the NSA knew about DC 20 years before the public.
Indeed, as did the team at IBM (and if you try to tell me that the NSA told the IBM team about it, I'll laugh). The NSA asked them not to tell, and they agreed. In fact, the team (specifically Coppersmith), claimed that they invented the entire thing. There's a quote by him somewhere, something like "The NSA did not dictate a single wire!", presumably refering to the fact that it was done in hardware.
Re:... (Score:1)
Re:a little off topic, but still salient-- I think (Score:1)
In the latter case, the defendant would have to expose her private encryption key to the courts (seeing as how persons being prosecuted definitely don't retain the right to keep their encrypt/decrypt methods secret.) Thus, she'd, again be forced into giving herself away to one extent or another.
-"S"HM
Re:Karma whoring, and why people reply to you (Score:1)
Get over yourself Signal_11.
The moderation here is screwed up, and everyone knows it. We are sick of seeing your posts moderated up to +4 or better just for pandering to the prejudices of the moderators. We know that the way to get points is to extoll the virtues of Linux, bash Microsoft, and flam Mac users. That's not the point of a comments page. It's for posting your opinion not for sucking up to the moderators.
You abuse the system. It's as much the moderators' fault as yours, but since the moderators are anonymouse, there's no way to flame them, and thus you get to bear the brunt of our frustration. But then, what did you expect for selling yourself out to gain slashdot karma?
Swell (Score:2)
Re:Desinformation (Score:3)
"When yous comes to Slashdot yous can git desinformation, dats all about da issues." It's obvious to me that the poster is either from the ghetto or was an extra on deliverence.
Re:... (Score:1)
He did?
User Info for Signal 11 (7608)
http://www.malign.net
signal11@mediaone.net?Subject=Slashdot
Karma 279 (mostly the sum of moderation done to users comments)
Karma whore or not, 279 is pretty damn impressive
Re:HAHAHAHAHA (Score:2)
--
Michael Sims-michael at slashdot.org
Re:I don't get it (Score:1)
Can you imagine the hysterics some people would get into if SGI were to pay someone in the Netherlands to produce non-US-exportable computer hardware for export to China? That could seriously hamper domestic efforts to simply get the restrictions eased/lifted.
In any case, they'd have to get the people writing the code outside access to the strong crypto code, or at least hooks to it. There might be more legal trouble with that than simply exporting the binary-only software.
Oh well.
Jon
what the hell? (Score:1)
or without https http://www.fortify.net/README_main.html#compariso
This is Fortify for Netscape, a program that provides world-wide, unconditional, full strength 128-bit cryptography to users of Netscape Navigator (v3 and v4) and Communicator (v4).
What exactly were you trying to say? Were you correcting me on something? I know what fortify is - that's why I made the comment I did.
--
grappler
Re:Cool... (Score:1)
*cough*Opera*cough*
Re:Permission? So... what security holes were put (Score:1)
And when you think about it, the fed is only acting in their own interest. I mean, the taxes from American businesses help pay their taxes. They get nothing from foreign companies.
So, I tend to think that things are pretty much as they should be as long as the feds don't bite the hand that feeds it.
Re:Permission? So... what security holes were put (Score:1)
I also noticed some interesting "this is great, will give netscape an advantage over microsoft" posts. Intersting how many slashdotters hate government control until it can hurt MS. It can also give Netscape an advantage over a number of other private and open source companies who want to export too. Don't forget that in your war cries against MS. If the feds can attack MS, they can attack you too.
Re:Permission? So... what security holes were put (Score:1)
Re:But... (Score:1)
Re:a little off topic, but still salient-- I think (Score:1)
the court requests that she divulge her private key. She refuses, claiming to not be able to remember the key (just about her only recourse, short of simply giving them the key.)
the law enforcement agency brings forth their cryptotext and dummied plaintext, which reveals the defendant to have been embroiled in all manner of nefarious business.
the defendant's only defense is to come forward with the session key, which she can only retrieve with her private key-- QED she knew the key all along. Perjury. Unless she's the president, she's going to get hucked into teh slammer.
I don't want this nit-picking to detract from your point: the session key angle is good, and I'm really glad that you brought it forward. Goes to show that you can't keep a good algo down.
If we can find a way out of the "perjury trap," I'll finally get to sleep soundly again. -"S"HM
Re:Karma whoring, and why people reply to you (Score:1)
So that makes him more then a Karma Whore, it makes him a small time Media Whore. He loves it too.
-One of the AC's who's always after him, posting logged in because the previous poster was brave enough to as well.
Re:... (Score:1)
Good catch! (Score:1)
I think it probably means nothing, that it is just a direct quote of some Netscape PR-material that like mention Netscape products a lot. But of course, it could mean exactly what it says, and that there is a backdoor in SuiteSpot for the three letter agencies. Putting a backdoor in the server side software would make perfect sence, because as we all know, Communicator 5.0 will be open source, meaning that any backdoors in Communicator would eventually be discovered.
Probably nothing, but OTOH, one should never trust the NSA/CIA/XXX.
Re:Desinformation (Score:1)
Before badmouthing Slashdot, how about consulting a dictionary, as there is no such word as "desinformation".
Re:Netscape cannot be considered secure (Score:1)
One should always be cynical of these crypto liberalization announcements, but I think the chances of the NSA being able to break 128-bit crypto are slim.
The "missing link" you refer to above is usually not secret. We've seen lots of crypto liberalization announcements and they've always had strings attached (more like steel cables). In the case of this old 1997 announcement I think the string was that you had to be a bank, which would mean you have to make all transactions available to the feds anyway.
Other strings that we've seen attached:
People who say the NSA are way ahead of the civilian state-of-the-art in cryptography are usually using old examples. Just look at Skipjack. The algorithm was made public and after just a couple of weeks of analysis it was hanging by a thread. Not a large margin of security at all.
Re:"Immediate download"? Ha! (Score:1)
The very first sentence gave the hoax away (Score:1)
"Netscape Communications Corporation (Nasdaq: NSCP) today announced [...]
Once the AOL purchase went through, NSCP was no longer listed on Nasdaq.
Cheers,
ZicoKnows@hotmail.com
Not true, it seems... (Score:1)
Re:Cool... (Score:1)
No more personal info. (Score:2)
Time, will tell.
Imagine the processor power required to
-Scott Ruttencutter
Scott Ruttencutter
Re:Ummm, is this out of date? (Score:1)
article_45.shtml 03-Dec-99 10:08 13k
*shrug*
~=Keelor
Does this mean they broke it? (Score:1)
Netscape cannot be considered secure (Score:1)
Don't trust it. For that matter, PGP 2.x isn't trustworthy either. Anything the U.S. gov't says is "OK" to export, is not to be considered reliable security.
a little off topic, but still salient-- I think (Score:4)
Maybe I've seen "Conspiracy Theory" one too many times, there seem to be some scary implications to this. Specifically, if investigators cannot be compelled to reveal how they decoded encrypted info, then they could conceivably take an encrypted doc which they could positively attach to the defendant (i.e. an encrypted document the defendant admits to, or can be convincingly illustrated to a court of law to be, the owner of) and then present in court ANY plaintext as being its source. These investigators (and, under the new regs, this would include domestic-charter, as well as foreign-charter, law-enforcement) could make up the foulest, nastiest, most incriminating admission in the world and claim it to be the plaintext. With a decent algorithm (i.e. ANY strong algo) there is NO WAY to verify that a plaintext and cryptotext match up without the key (that's the point of encryption, for godssakes.) As the investigators cannot be made to reveal HOW they got plain from cipher, the only defense the defendant could make would be to decrypt the doc in question before the court herself, and that would require her to expose to the court her cryptosystem and key (the latter, of course, being a far more damning exposure than the former, assuming she uses strong crypto.) I.E., in the end, she would be giving up the one thing that protected her. Even if the case is thrown out of court (which, God-willing, it would be, seeing as how the investigators would have to admit to submitting false, or at least spurious, evidence,) the defendant would still be up a creek, as all her past and present encrypted data would be exposed.
Any even worse scenario: another clause in these regs permits courts to subpoena private keys (previously considered unconstitutional, as it forces a person to incriminate herself.) If the defendant refused to do so, claiming to have forgotten the key, and the prosecution later played its dummied-plaintext trump card, she would be put in the position of either 1) going to prison for heinous crimes she never even considered committing or 2) admitting to perjury.
This would seem to be a very-much bad situation that we, as citizens, are being put into. The NSA, again, has designed a brilliant protocol.
Just food for thought. This is the sort of thing that keeps me up late, watching TV and talking to the dog.
-"S"HM
Re:Ummm, is this out of date? (Score:2)
For a minute there when I read the post I had visions of Bill Gates crapping his pants in fear anger and frustration. Would have been very nice if Netscape had *really* been given the right to export a strong crypto browser, and especially if MS had to wait for their turn until the DOJ thang was settled.
Consciousness is not what it thinks it is
Thought exists only as an abstraction
This is definately out of date. (Score:2)
Can any provide any supporting documentation that shows that something new has happened with respect to Netscape Communicator and encryption export restrictions?
??? How come so many doubt it ??? (Score:1)
"Immediate download"? Ha! (Score:1)
Immediate? Not really! I still get:
Bad Domain DNS NAME:
Host Name: adsl-145-99-x-x.snelnet.nl
IP Address: 145.99.x.x
Your DNS name probably won't be accepted.
Still have to go to Zedz [zedz.net] and Fortify [fortify.net]...
Re:Can Red Hat and others also distribute it? (Score:1)
See http://www.definitelinux.com/
Easy way to get 128bit encryption (Score:3)
--
Re:Desinformation (Score:1)
The NSA wasn't giving out any desinformation, but was more than happy to provide skipjackinformation.
Johan
Re:Karma whoring, and why people reply to you (Score:2)
posting logged in because the previous poster was brave enough to as well.
I did a little experiment a few months ago. I flamed the same posts with the same basic arguments, once logged in, and once as an AC. The logged-in posts either went up or got left alone, and all the AC posts got put down to -1.
Re:Desinformation (Score:1)
Legal to IMPORT! (Score:1)
this network. (It is replay.com now changed to
some god-awful name like zedz.nl which rhymes with
'feds' - How could you Alex!) What is it that makes
America feel superior in a field long dominated by
Europe? Finally it should be very advantageous for
any American company to develop crypto outside the USA and get the MUCH bigger world market in addition to the (isolationist) US market. This is
really silly and i laugh at the US like anyone else.
Re:a little off topic, but still salient-- I think (Score:1)
Um, no. If the defendant used a decent cryptosystem with session keys, she'd only have to use her private key to recover the session key. She could then present her session key to the court and reveal the correct plaintext.
Still not a good thing, but not as bad as it could be.
Re:Well sorry pal.. (Score:1)
Re:a little off topic, but still salient-- I think (Score:2)
I don't think there'd be any problem getting around the perjury bit that you suggest. On Monday, I say "I do not recall the key at this time." I'm lying, of course, but unless you're telepathic, you can't prove it. On Tuesday, as a result of the situation you described, I say "I remember now...the key is 123ABC."
If accused of perjury, all I have to say is "It's as I said. On Monday, I couldn't remember. On Tuesday, I could." Only a telepath could tell any different.
Why would this be interesting anyway? (Score:1)
not a threat! (Score:1)
Sorry. Troll.
Re:... (Score:2)
Do you have any idea how hard it would be to brute force a 128 bit key? Acording to Schneier, who seems to get some respect around here, a machine with 10**14 processors, each of which could crack a million keys a second, would need 10**11 years to crack a 128 bit key. The universe has been around 10**10 years or so. Get over it, it's not going to happen, and even if it were possible in our lifetimes (I don't think it is), do you really think they would use this trillion dollar machine to break your SSL session and get your credit card #?? No, they would go to your CC company's office and ask nicely if they wanted that.
Re:Wait a minute here... (Score:1)
So they can do what, get your CC #? Who cares? (Answer: not the NSA!). You'll notice it talks about 128 bit SSL, but not 128 bit S/MIME. That's becuase the only thing SSL protects is commerce stuff, not email (like S/MIME does). The NSA just realized that if they allow strong e-commerce crypto, but still block strong email encryption, the big companies will stop complaining and we'll never be able to export PGP (legally, that is!).
Semantic, Pedantic point (Score:2)
See, there's this country just north of the USA that's already able to use the 128 bit versions, no problem.
Remember, Americans, you're not the only North Americans.
---
Consider this... (Score:2)
----------------
"Great spirits have always encountered violent opposition from mediocre minds." - Albert Einstein
Why Netscape and not IE? (Score:1)
Your use of the 128-bit High Encryption Software Component is subject to the following additional terms: Export Notice - The 128-bit High Encryption Software Component contains strong encryption features. The 128-bit High Encryption Software Component may be distributed in the United States, its territories, possessions and dependencies, and Canada without an export license. Export of the 128-bit High Encryption Software Component from the United States is regulated under "EI controls" of the Export Administration Regulations (EAR, 15 CFR 730-744) of the U.S. Commerce Department, Bureau of Export Administration (BXA). An export license or applicable license exception is required to export the 128-bit High Encryption Software Component outside the United States or Canada. For additional information see http://www.microsoft.com/exporting/.
You agree that you will not directly or indirectly export or re-export the 128-bit High Encryption Software Component (or portions thereof) to any country, other than Canada, or to any person or entity subject to U.S. export restrictions without first obtaining a Commerce Department export license or determining that there is an applicable license exception. You warrant and represent that neither the BXA nor any other U.S. federal agency has suspended, revoked, or denied your export privileges.
Now why can Netscape export it? Maybe the figure Netscape crashes so much it dosent matter...
Permission? So... what security holes were put in? (Score:2)
When netscape receives the same permission on its open sourced mozilla project... only then will I believe we're receiving real security.
Not for everybody ? (Score:2)
International users who have Netscape Communicator do not need to download a new version of Netscape Communicator to take advantage of the strong encryption capabilities being announced today. Negotiation of the strong encryption between International versions of Netscape Communicator and Netscape SuiteSpot servers approved for export to banks occurs through a unique mechanism based on a special-use digital certificate. Approval of this certificate based mechanism is the culmination of months of effort between Netscape and numerous government agencies. Netscape and VeriSign have worked closely together to develop digital certificates that allow Netscape SuiteSpot servers to initiate strong communications sessions with Netscape Communicator. VeriSign will issue special-use digital certificates pending final approval from the United States Department of Commerce. Banks around the world can obtain Netscape Communicator and Netscape SuiteSpot servers with strong encryption immediately.
this seems to imply that in order for users to use 128bit, they have to be talking with a netscape suitespot server, which means that general 128bit encryption has not really been legalized, but only 128bit encryption between two software programs created by the same software house
What do you think ?
Re:... (Score:1)
Re:This is definately out of date. (Score:1)
Re:... (Score:1)
but yeah, I agree with you on the possibility of a cryptanalytic attack. That would be the only possibility, unless they've actually got quantum computers. (I say would be because we all know that this thread is moot, given the recent update to the header :)
#define X(x,y) x##y
Re:Does this mean they broke it? (Score:1)
#define X(x,y) x##y
128 bit outside US -- here in Estonia (Score:1)
Here in Estonia [ciesin.ee] we have at least two banks - Hansabank [hansa.ee] and Union Bank [www.eyp.ee] who use 128-bit encryption in their internet banking pages.
Here are the internet banking pages: Hansabank [hansa.ee] and Union Bank [www.eyp.ee]. There you can choose between 128-bit and 40-bit security.
I am not sure about the third major bank because I am not their client.
Re:Karma whoring, and why people reply to you (Score:2)
I see about a billion AC's in this thread not marked as "Offtopic". I wonder why *you* got moderated down... Hmm.
And, for future reference, guys, my Anonymous posts don't get treated that badly. But I have seen that behavior happen before. Try posting the same thing you would have posted anyhow, anonymously. And see if anyone looks at these silly "comment" things, anyhow.
But more people *do* see the logged-in posts, because some people do set their threshold above 0, guys. (I usually set mine to 1, unless I see a lot of "x comments below blah threshold", or I'm really interested in the thread, but lately I've been setting mine to -1, out of moderator mistrust) And if you see a post, and you like it, you might moderate it up.
Also, there is a lot of Anonymous Coward distrust, because they offer *no* way to contact them. They are definitely more admirable when they do. Even a slashdot account is enough, and an e-mail address (anonymous or not) is a nice touch. I distrust Anonymous Cowards because they have no reason to be accountable for what they do or say, and I don't know if I'm talking to the same person. I could post anonymously to myself and make it look like I'm being harassed to get scored up. How messed up is that? If I have a discussion with someone, and I can't see a face, I'd at least like to have a name. But really intelligent commentary will do.
---
pb Reply or e-mail rather than vaguely moderate [152.7.41.11].
128 bit encryption for Netscape already available (Score:1)
Re:HAHAHAHAHA (Score:1)
Re:... (Score:1)
Re:... (Score:1)
Misleading article. Here's the translation (Score:4)
"International users who have Netscape Communicator do not need to download a new version of Netscape Communicator to take advantage of the strong encryption capabilities being announced today. Negotiation of the strong encryption between international versions of Netscape Communicator and Netscape SuiteSpot servers approved for export to banks occurs through a unique mechanism based on a special-use digital certificate."
This is a capability that's beein in both IE and Netscape for a while. It's called "Server Gated Crypto", and it works like this:
An exportable browser connects to a bank's server. The bank sends the browser a special certificate that has an extension which tells the browser to do Server Gated Crypto. They both drop connection and reconnect, with the domestic-grade encryption.
This does not mean that Netscape is able to export 128bit crypto freely, nor does it mean they can stop making different versions. It means that the ability for the export browser to use domestic crypto is controlled at the CA (like VeriSign) and not in the browser. The CA gets permission to issue these special certs to a certain group of customers (banks, mostly), and THAT controls the crypto.
It was an interesting attempt to relax crypto just enough to assuage the privacy advocates cry of "but, e-commerce needs strong crypto".