Cryptographic Software in Debian's Main Archive 96
Cine writes: "James Troup and Sam Hartman recently sent a note to all debian mirror maintainers, to inform them about the current situation and future plans. Sometime after March 8th, crypto software like OpenSSH, SSL support, and many other enhancements will be integrated into the debian main archive. This is in accordance to legal advice the Debian project received."
Re:SLASHDOT IST TOT (Score:1)
translation:
Congratulations, you killed slashdot because you couldn't resist the coroporate pressure and because you introduced subscriptions.
The translation may not be 100% accurate, but it's about the new subscription system introduced yesterday
Re:Wait... (Score:1)
Crypto (Score:5, Interesting)
better yet, it is and has been! (Score:2)
As US residents who did not know how to program crypto know, crypto is available in outher countries. A few years ago, the easiest way to get secure shell was to get OpenBSD from Canada, or buy something expensive. Programers with access to crypto knowledge could make what they wanted.
One of the main goals of public key encryption thechnology was to aid people in countries likely to be on US blacklists. Giving those people the ability to communicate privatly is much worse for oppressive governments than any improvement in that government's software library. Governments can usually afford programers and have what they want where they want it.
Most countries have proved that crypto is a doubtful tool of subversion. Oppresive countries have made cryptography illegal (yes, I'm refering to past US laws and current UK laws). Those that use it only set themselves up for investigation. Indeed, we can be sure that owning a computer at all in some places will earn you a beating.
I'm happy to see the US going in the right direction for a change. I have and love Debian. One of the best things about it is secure shell. It's great to be able to use and administer my home machines from work or anywhere else in the world without worrying about someone breaking in. "ssh user@mahine -X" run on my lan makes all of my machies transparently usable at once through a single monitor and keyboard. Having this wonderful tool even easier to get is a great step forward. Hopefully the US will consider this one of the weapons to freely distribute from the "Arsenal of Democracy". Go get it!
Hi. Here is Crypto (Score:1)
Re:Hi. Here is Crypto (Score:4, Insightful)
Re:Hi. Here is Crypto (Score:1)
Hope it works out (Score:4, Interesting)
One thing that was interesting is that under section 740.13(e) of the US EAR, the software can be exported as long as the people that are exporting it file for export notification. Apparently one thing that they were worried about was whether or not the individual mirrors had to each file or if Debian could just file for the main archives and all the mirrors. According to their legal advice that should be okay. Let's just hope that they don't have any legal problems with it in the future.
glad to see (Score:2, Insightful)
This advice is bogus. (Score:1, Interesting)
This restricts people from selling debian.
Which makes life hard for CD distributors, and is in contradiction with the GPL.
Note: I do not sell debian( or any software ).
Re:This advice is bogus. (Score:2)
Re:This advice is bogus. (Score:3, Insightful)
Yes, but it's the US gummit doing the restricting. Nor is this issue specific to Debian: any distro which includes crypto-enabled software (mozilla, galeon, even mutt) is going to have the same issues. If you want to sell a modern, non-crippled Linux distro of any type from the US, you're either going to have to:
a) sell only to US citizens, or
b) do the paperwork.
Which makes life hard for CD distributors
Apparently, the US gummint doesn't care. If I were a US-based CD vendor, I'd definitely complain to my gummint, but I'm not.
and is in contradiction with the GPL.
No, the GPL has nothing to do with it. The GPL addresses copyright issues. Other legal issues, like patents and other gummint regulations, are outside the scope of the GPL.
Re:This advice is bogus. (Score:1)
I don't know about the badges, but both sides have guns. [tuxedo.org]
And to think... (Score:2, Interesting)
Re:And to think... (Score:2)
no real effect (Score:2, Insightful)
Re:no real effect (Score:2, Funny)
The flip-side of this is that CD vendors in the US might be slightly more reluctant to jump through the hoops necessary to distribute Debian on CD. However, the same hoops are going to be required for any other distros that include non-crippled SSL-enabled apps and the like, so I don't imagine this is going to be a major problem.
Re:no real effect (Score:2)
Nonsense, it'll make things easier. They don't have to burn non-US CDs, which makes images easier to find, and as long as they don't ship to the export-restricted countries (which is easier to filter via mail than download), then they're fine.
--Dan
Re:no real effect (Score:4, Informative)
Unless I am missing something, this won't have any real effect on end users.
It will have benefits for end users, though probably not highly visible ones.
Cryptographic software packaged for Debian is available (and has been for a long time already) through non-us.debian.org [debian.org], but crypto-in-main will make further integration of crypto possible. A number of packages in main will get enhanced functionality once crypto is in main. E.g. CVS can start supporting Kerberos for authentication.
The functionality enhancements made possible by crypto-in-main are not limited to the direct benefits of crypto, as I can illustrate with the Gnumeric [debian.org] package. The Gnumeric spreadsheet can be built to be able to fetch data from databases using GDA [debian.org], the GNU Data Access library. Currently the Debian package is not built with GDA support. The reason for this is that Debian's GDA packages are on non-US (because their source package requires the PostgreSQL development package; PostgreSQL is on non-US as it is built with SSL support). Once we have crypto-in-main, I can build Gnumeric packages that have GDA support (probably in a separate plugin package).
Re:no real effect (Score:2)
Tremendous effect (Score:2)
This allows you to do some really nice things. You want temporary root access? Sure - put your card in the reader and type in your passphrase. Once you remove the card, root access goes away.
Or you need access to a database containing confidential information? Put in the your card and you gain access to database... but it will be dropped when you remove your card.
Re:Tremendous effect (Score:1)
I think you're missing Mr. Coward's point. Crypto was already available to Debian users. To most, this change will be all-but-transparent, due to the magic of apt-get.
[OT?] Debconf 2002 announced (Score:2, Informative)
Perhaps this is a bit offtopic, but Debconf 2002 was also announced [debian.org] today. Will holding it in Canada make a difference crypto-wise? Probably not, but it should be a rockin' good time for participants anyway.
It's also been conveniently scheduled to coincide nicely with the Ottawa Linux Symposium [linuxsymposium.org]. Other than that, more info will be forthcoming within the next couple of weeks.
IP address based restrictions (Score:5, Interesting)
This is the second time I've seen this "recomendation" come out of a legal organization, in almost exactly the same wording no less. I've got to believe therefore that they are pulling it from some other source, such as an official regulation or other document.
Does anyone have such a list though? Can anyone provide a copy of it? Is it even technically possible to generate? In real time, or even close? I mean sure, it's technically trivial to implement this blocking, just a few iptables/ipchains commands, or some entries in the firewall's firmware... but I think getting that list to begin with is nearly impossible. How do you know where the other end of the phone line that is dialed into some modem bank on the other side of the net is?
In the last instance that I saw this (an external server at work) corporate legal was threatening to pull the plug if the admins didn't provide proof they were doing this. After much head scratching and searching the net my sugested response was that they would be happy to implement this just as soon as the legal department provided them with such a list.
I'm told they never heard back from legal on that topic.
Re:IP address based restrictions (Score:3, Informative)
I know it's not an IP list, but it would be fairly simple to impliment - just block those TLD's. I suppose it would slow your server down some, having to reverse resolve every IP that connects to it. As far as updating the list, that shouldn't be too hard - all you have to do is have your lawyer give you a call every time a country is added or removed from the list (how often does that happen?) and just add their ccTLD to the block list. Or, just did a quick Google search and you can get a list from the U.S. Department of State [pmdtc.org].
Re:IP address based restrictions (Score:3, Informative)
Re:IP address based restrictions (Score:4, Informative)
I suggest the debian maintainers should check at LEAST this site.
http://caida.org
If you want to testdrive the acuracy of the mappings, why not check if it works fine for your connection. Just inset your IP number and go!:
http://netgeo.caida.org/perl/netgeo.cgi?target=
Re:IP address based restrictions (Score:1)
http://netgeo.caida.org/perl/netgeo.cgi?target=
Re:IP address based restrictions (Score:1)
Shame you weren't girl also
Re:IP address based restrictions (Score:1)
Re:IP address based restrictions (Score:5, Funny)
This achievement is a real testament to the vision and wisdom of our leaders.
Re:IP address based restrictions (Score:1)
Money is spent on being sneaky... (Score:5, Insightful)
It amazes me that the U.S. government has done as much as it can to try to outlaw privacy. To me, it seems that things are out of control in some parts of the U.S. government. The U.S. spends more on surveillance of everyone everywhere than any country ever has in the history of the world. Money is spent on being sneaky, rather than on making good relationships.
It is futile to try to avoid the export of software, particularly when having it is legal in other countries. Yet taxpayer money is spent on this. The U.S. government, in my opinion, should not try to control the entire world.
More on the extremes of U.S. government policy: What should be the Response to Violence? [hevanet.com]
Hey Moderator! (Score:1)
This is just a bad idea. (Score:4, Informative)
US crypto regulations are not only a nuisance, they're also volatile. "Things are getting better", we hear. Bullshit. Things are changing unpredictably. Few people (and certainly no software developers) have any idea what US policy will be next year.
The only sensible policy is to keep the crypto archive in a country that has never had export regulations for crypto software (there are many).
Re:This is just a bad idea. (Score:1)
As you say, it is very easy to get non-US software, add a line in sources.list, and never think about it again. However, there are a lot of other applications where crypto isn't needed for the package to work.
For example, you can get 'lynx' from the main server. If you need https support, just fetch the 'lynx-ssl' package from the non-US server.
But what if the maintainer is from the USA? I suppose that would prohibit him from uploading such a package to the non-US server.
Compare the LDAP utilities. There is no cryptographic version of them in the Debian archive. Ben Collins couldn't upload them.
Of course, I do some magic with stunnel to get my passwords encrypted anyway, but it's not the best way to go.
And the LDAP packages are just an example. How many other packages out there would be built with the (optional) crypto support, if they could be uploaded in the US main archive?
Yay! (Score:2)
Now, I just wonder if the FreeS/WAN folks will ever get their code integrated with the standard Linux kernel..