This story appeared on Network
World at
http://www.networkworld.com/columnists/2007/070907bradner.html
FCC ignores more
than 100 years of wisdom
By Scott Bradner, Network World,
07/09/07
In 1883 French cryptographer
Auguste Kerckhoffs published a set of six design principles for military
encryption systems. The second of these principles is generally known today
under the observation that security through obscurity is not security. The
Federal Communications Commission (FCC) seems not to have read the history
books or to be aware of how its sister federal agencies develop security
standards.
In a common English translation,
Kerckhoffs' second principle says that a secure crypto system "must not be
required to be secret, and it must be able to fall into the hands of the enemy
without inconvenience."
There are many reasons for this.
They range from the catastrophic results in the case of a breach that exposes a
weakness to the reduced chance of a weakness if many eyes look at a system
before it is deployed. The latter is the primary reason that the federal
National Institute of Standards and Technology (NIST) conducts public contests
for new encryption standards. Security expert Bruce Schneier published a very
good essay on this topic a few years back.
The FCC has just decided that
obscurity is better than security when it comes to software radios.
Specifically, it said "manufacturers
should not intentionally make the distinctive elements that implement that
manufacturer's particular security measures in a software defined radio
public" if that would help circumvent FCC rules.
Because no manufacturer will want
to prove that public disclosure will not cause such a risk, they are being told
to keep the code secret.
On one hand, this is like saying
that manufacturers should keep circuit diagrams of old radios secret so that
someone would not know where to solder in a resistor to change the output
strength. And on the other, it's pretending that hidden code somehow will be
hackproof.
In the same decision the FCC made
it clear that open source software is in the FCC doghouse: "A system that
is wholly dependent on open source elements will have a high burden to
demonstrate that it is sufficiently secure to warrant authorization as a
software defined radio." This is a message that I am sure was well
received in Redmond, but a message that demonstrated bias rather than analysis
on the part of the FCC.
The Software Defined Radio (SDR)
Forum politely responded that the FCC did not know what it was doing and asked
it to get a clue.
With this decision the FCC
reinforces my decade-old suspicion that clues just do not like hanging around
Washington, D.C. (Postman: Read that Letter!)
It is not at all sure that the SDR
Forum or anyone else can find clues that are willing to undertake the mission
of breaking down the mental barriers protecting the FCC from the knowledge of
the past or from the technologies and business models of the future, but
stranger things have happened. For example, the last time that the FCC tried to
make rules about software the courts force-fed them the clue that this was not
the FCC's job. (Broadcast flag: Protecting the past.)
It just might be a that court will
tell the FCC the obvious -- that the design of secure systems is not one of the
FCC's missions (or competences).
Disclaimer: "Harvard"
and "clue" have been associated more often than "Harvard and
clueless," but this exploration of clue locale is my own, not one from the
university.
All contents copyright 1995-2007
Network World, Inc. http://www.networkworld.com