decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Arrons Law suggestion | 129 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Arrons Law suggestion
Authored by: Chromatix on Sunday, February 03 2013 @ 11:55 AM EST
PJ makes a good point about ROT13 or equivalents not being sufficient to justify being called an effective protection measure - it only counts as obfuscation, not encryption. Meanwhile, WEP (the older and weaker form of encryption on WiFi) probably should be considered such, because it was designed and marketed as such and includes a passphrase, even if it is rather easy to break these days.

My suggestion would be that if the access control is a whitelist based on at least one of the three long-recognised types of "key": something secret that you know (a password or PIN with a sufficiently large keyspace to be unguessable), something you have (an RSA token, SIM card, large cryptographic key or codebook), or something you are (a biometric, eg. fingerprint or iris scan); if it needs at least one of those three in addition to the algorithm or protocol itself, then it can be considered effective access control for the purposes of determining whether access was unauthorised. ROT13 doesn't need any such thing, only the (trivial) algorithm; WEP requires a passphrase and doesn't send it in the clear, so it remains secret. Chip&Pin requires both the "have" and the "know" parts - the bank card and the PIN.

But a public venue that used WEP while displaying notices all over the place with the passphrase on it would not count, because the passphrase is no longer a secret from anyone who has seen one of those notices. Likewise a SCADA system with a backdoor built in by the manufacturer does not have effective access control because the backdoor will eventually cease to be a secret. (Many a medieval fortress with impressive walls and front gates fell to a few determined men climbing up the latrine pipes.)

A good way to define the MAC address and pseudonym idea is that blocking based on them is as a blacklist. Blacklists are notoriously easy to evade and thus cannot be considered effective access control in a criminality context, because they presume a priori that access is permitted, and only disallow access to entities that they can identify as belonging to a prohibited set. Proving a negative is much harder than proving a positive, so blacklists don't work very well. At best, they provide a hint to the user that they have overstepped some boundary, but unless that hint is backed up by an explicit notice, such a hint cannot be presumed as having been taken. So in practice they are used to reduce the burden from malicious users in cases where the damage they can cause is already limited (eg. spam, flamewars, overload rather than theft or real damage).

Incidentally, physical access control measures might form part of the computer's access control - so using a fake ID (if it's one that isn't trivial to fake) to get into the premises might count as breaching an effective access control measure, as would forging or stealing a key to a physical lock that protects access to the required hardware, or installing a physical network bridge (eg. a PwnPlug) that connects the "high-sec" network to the outside world.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )