Investigatory Powers Act - Government mandated backdoors
Peter Fairbrother
zenadsl6186 at zen.co.uk
Fri Dec 2 13:30:07 GMT 2016
On 02/12/16 11:07, Roland Perry wrote:
> In article <20161201161134.Horde.mgH5fJInnXW5Fx1GRWN_Kj1 at mail.vbbc.biz>,
> Paul Brown <pol at geekstuff.tv> writes
>>
>> I assume the list has seen http://www.theregister.co.uk/2016/11/30/inv
>> estigatory_powers_act_backdoors/ ?
>>
>> Mandatory notification to HMG of system architecture changes/patches
>> which might impair the ability of the security services to snoop and
>> decrypt customer data.
>
> I'll post word-for-word two paras A and B, which I sent to another list
> six months ago and are still completely applicable:
>
> A) "It merely says that when a new service emerges it must be
> notified to the authorities so that it can be assessed as to
> whether it should be added (after the normal due process) to the
> list of services for which the service provider has already
> received warrants."
>
> While it appears at first glance to be instructing CSPs to ask for
> permission to introduce new services, there is no power for the Home
> Office to refuse such permission, and all they require is notification
> of what the new service is (for example starting a 5G mobile network in
> addition to your existing 2,3,4G one).
Yep.
> And as for new (or existing) services needing a backdoor, that's not
> what Act is asking for.
>
> B) "Because a backdoor implies a 'key' being given to a third party
> such law enforcement to do its own decryption, whereas the Bill
> just asks for CSPs to use their existing key to the front door
> to produce the plain text, if they are able to."
The Bill also permits the SoS to require "relevant operators" to
maintain or perhaps generate the ability to produce the plain text.
Probably the most important example is Forward Secrecy in eg TLS suites.
In order to maintain the ability to produce the plain text, relevant
operators can effectively be required to modify their systems to retain
the keys used rather than discarding them.
Some may consider that a required backdoor, but as the relevant operator
keeps the keys, and they are not available to Plod etc without a
warrant, I don't know whether it really counts. Maybe 1/2 a required
backdoor.
Of course there is a small problem for the SoS and/or Plod here - if an
effect of the modification to the system, eg removing the deletion of
keys, makes any of the content available to a person other than the
sender or recipient then it would be interception, and unlawful.
> In other words it's only the encryption applied internally by the CSP
> (or by someone acting on behalf of the CSP) which is involved. The
> classic (and now somewhat aged) example is 2G's A5/1.
Yep. Eg, crypto software writers are pretty much unaffected.
[..]
>> and the probably impact to the UK as a whole - especially given the
>> hugely broad definition of "Commmunication Service Provider"
>
> The measure is only expected to cover CSPs with more than 10,000
> customers
The term CSP or "Commmunication Service Provider" does not appear
anywhere in the Bill. Apparently they have gone all trendy, and are
"telecommunications operators" now.
"Expected to" - yeah, that sounds about typical.
-- Peter Fairbrother
More information about the ukcrypto
mailing list