Ross's TCPA paper [please submit]

Stefek Zaba sjmz at hplb.hpl.hp.com
Wed Jun 26 13:34:04 EDT 2002


At the end of describing an "end of the GPL as we know it. Film at 11."
scenario, Ross asks:

> Can anyone from HP comment on whether this is actually their plan?

I "can't", in the sense of not being an Official HP Spokesdroid; but I'd
very much like to, being known to a good few of you, and having sat on my
fat behind for the last few years within a few yards of the HP team working
on the TCPA spec. I'd also like to apologise in advance for this being a
"hit-and-run" posting - I'm away from email for the next 10 or so days
(Glastonbury Festival first, then a crypto engagement in London), so can't
promise to follow up beyond this message.

No, a subversion of the GPL is not HP's strategic intent, never figured in
any TCPA design stuff I heard about, isn't what our local "could Linux
in general, and our Trusted Linux work in particular, play well with TCPA"
work is all about, and is - with apologies to Ross - no more than a
far-fetched imagining.

The Trusted Linux work is described at the "general comp sci reader" level
at http://www.hpl.hp.com/research/papers/Dalton.ACM.pdf
Marketing guff is at
  http://www.hp.com/security/products/linux/papers/
Source code for the kernel patches is at
  ftp://ftp.hp.com/pub/security/hplx_source/v1.0
(Because of HP's current revenue model for this software, the kernel
patches and some minimal tools are GPL'd, but the full-useability stuff is
payware. *That* illustrates how up-clued the Greater HP Corporation is about
GPL and open-source economics, OK? Flame us for stupidity if you will, but
ascribe deep conspiracy to our actions and you'll only look daft!) If you
look at the Trusted Linux writeups, you can see what a Nice Thing it would
be for the security properties if kernel-module loading could have some
hardware-based enforcement of policy. *That* is the kind of
TCPA-(Trusted)Linux integration we've been thinking about.

To the core issue of whether TCPA is a DRM-plot, my personal answer is "no:
it's a technical mechanism which can be used to implement a wide range
of security policies". Those policies include, in principle, strong protection
against "unwelcome" code (trojans, spyware, and the like - though depending on
what languages the malware's written in, and what the execution environment's
been programmed to treat as "loading code", some "user-level scripting" could
still do Bad Stuff). The TCPA spec - which has been out for public comment
for the last 15 months or more - includes explicit support for multiple
pseudonymous platform identities, to avoid the privacy-hostile consequences of
a fixed platform ID. Raw crypto capabilities on which the higher-level TCPA
functions are based are themselves exposed - with the notable exception of
freely-keyed symmetric crypto (usual influence of (now dated) exportablity
controls, I'm afraid).

It's simply not the case, as Ross's paper avers (section 4.1, initial para),
that TCPA is "an initiative led by Intel whose stated goal is to embed digital
rights management technology in the PC". TCPA does *enable* DRM, as it
*enables* anti-malware functionality, secure local storage of confidentiality
keys, a more predictable execution environment for security-critical code, and
many other applications which a general-purpose "this PC could be running
ANYTHING" platform is less well suited to. Arguing that *one* application is
"the" driving force behind the whole spec - in the absence of either contact
with the design team, or strong corroborative external evidence - is verging
on the delusional. Intellectually, it's on a par with the UK Government of
1996 arguing that because strong cryptography can frustrate some aspects of
intelligence gathering, strong controls on the use of crypto are therefore
necessary - a debate Ross and I and many others in the UK were eventually
successful in winning.

There are some further specifics in Ross's "end of the GPL as we know it"
posting which don't coincide with reality. For one thing, any user of a TCPA
platform can switch off the TCPA features - not only the platform Owner. So,
an unenhanced Apache (to take one of Ross's examples) can run on an "unTCPAd"
GNU/Linux distro on a TCPA-disabled machine as it does now. Any conspiracies
to subvert open-source licensing models would have to face that economic
competitor - and without added value for TCPA-enabled machines, the clone
motherboard vendors will soon drop support for TCPA, whether or not it's part
of some "industry-wide agreement". (A painfully-close-to-home comparative
instance is IrDA, the fast infra-red standard in which HP owns potentially
revenue-generating IP. Much of the early R&D work on that was done here in
HPLabs Bristol; a number of my colleagues hoped it would pay for all our
pensions. An industry consortium formed around the standard. Motherboard
manufacturers started to incorporate IrDA capability. However, the market
in general didn't find it to be enough of a "must have" that the few-dollar
manufacturing cost was justified; it's now built-in to rather few
motherboards, available as a "riser" option for some, and absent from most.
But I digress...) A closer look at the TCPA mechanisms will show that a "more
secure" Linux could choose to selectively use some TCPA features (say, the
local key storage ones) without buying into the controlled boot/controlled
loader support - and remember, in all cases, TCPA provides *support* for such
features - it's the *OS* which chooses whether they're used or not.

At some point, I hope someone Empowered To Speak And Answer For HP will issue
some more comprehensive reply to the issues Ross has been raising; but it's
difficult for me to watch the efforts of my colleagues in creating a spec for
a less leaky PC being traduced on this list by a well-respected, usually
well-informed source...

Cheers, Stefek

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list