[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: New entry in privacy/wiretap debate
Hello Hilarie,
There is no key recovery in the "operator action" model. Basically, we and others are arguing that most (probably all) IPsec devices already provide a customer with the ability to comply with a legal warrant without any modification at all. Responding to a lawful warrant is, for many classes of product, a management issue not a cryptographic one. Please see the following white paper for an explanation of our approach. Contact Elizabeth Kaufman
(mailto:ekaufman@cisco.com) if you have any questions.
There is no key recovery here!
http://www.cisco.com/warp/public/146/july98/2.html
- Elizabeth (using Chris Lonvick's PC in a meeting....)
At 12:45 AM 7/13/98 -0400, Hilarie Orman wrote:
>I read a newspaper article today that said Cisco, Sun, Network
>Associates, and others had a proposed agreement that would allow those
>with warrants to catch plaintext email from network devices at the
>edge devices. The implication was that email encryption would be
>entrusted to edge entities, not to users. The article implied that
>the diversion of data would be done based on IP headers. Is this
>idea based in any way on IPSEC or planned IPSEC products? It sounded
>as though it might be IPSEC with key recovery.
>
>Hilarie
>
>
>
>
Follow-Ups: