This widely circulated story is without substance
Wired News originated a story  claiming that NAI had quietly rejoined the KRA, after publicly disavowing it  following its acquisition of PGP last December . Here are the facts: NAI acquired Trusted Information Systems in May 1998. TIS had been a leader in the Alliance, and its technology was considered to be among the best solutions in this space. NAI resigned the leadership posts that TIS had held in the Alliance and continued to monitor its work, but stopped attending its meetings. The NAI name still appears on the KRA Web site , as it has since May. There is no news here. Perhaps Wired was tipped by a disgruntled KRA member after Network Associates sent a representative to a recent meeting to suggest that they disband, because Open Source development provides greater security and assurance than any approach based on key recovery. The following statement was sent to me by Jon Callas, CTO of Total Network Security (formerly PGP Inc.) at Network Associates.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here is the official statement: "NAI officially withdrew from the Key Recovery Alliance in late 1997. In May of 1998, NAI acquired Trusted Information Systems, which had been an active member of the KRA. NAI subsequently reliquished the leadership role TIS had taken in the organization. NAI Labs' TIS Advanced Research Division continues to monitor the KRA's activities from a technical perspective, but Network Associates in no way advocates mandatory key recovery." Jon -----BEGIN PGP SIGNATURE----- Version: PGP 6.0 iQA/AwUBNlC9e335wubxKSepEQJI6wCfSExUUVyfhEO3Nd0xOgu+7gF4SYQAnRBN 35N5BTvab2T8v+PEzhlbzv++ =l7xe -----END PGP SIGNATURE-----
SecureXpert Labs has discovered a deep and troubling security hole in the implementation of HTML frames . All recent versions of Netscape Navigator and MS Internet Explorer are vulnerable, and any Web site using frames can be exploited. The "frame spoof" vulnerability is breathtaking in its scope and simplicity. It represents not so much a bug in the browsers' code as a flaw in the security policy they implement.
SecureXpert will be working with Netscape and Microsoft on client-side fixes for the problem, but Dr. Reiner mused to the BugTraq list that the browser may not be the most appropriate place to patch this hole.
|Remarks:||1. is easy, but 2. involves a lot of extra ongoing work.|
|Corollary:||There is no such thing as a secure frame-based static web page.|
Domain name policy
See also TBTF for 2000-04-19, 03-31, 1999-12-16, 10-05, 08-30, 08-16, 07-26, 07-19, 07-08, 06-14, 05-22, more...
ICANN is flapping hard but gaining little altitude
The organization set to inherit dominion over Net naming and numbering held its first public meeting on 14 November. ICANN anticipated rough sailing and they certainly encountered it  from an audience of more than 150. Fewer than one-third raised their hands when interim chairwoman Esther Dyson asked how many thought that a concensus on general principles could be reached at the meeting. One participant, complaining about the secret process by which ICANN's initial board had been selected, said "The board has sprung as a virgin birth from some unknown entity." (In fact the "unknown entity" was the late Jon Postel, as a lawyer working with Postel's agency IANA explained.) Dyson asked the meeting, "How many think ICANN is an out-and-out fraud and are here to try to stop it?" Only a few hands went up, but someone shouted, "Could you separate those questions?" This meeting indicates how hard it will be for ICANN to find common ground in the naming transition -- a process rendered vastly more fraught by the death of Postel, the resignation of the Network Solutions CEO , and the imminent departure from the Clinton administration of Ira Magaziner , one of the few visible White House staffers who has a clue on the Net. The ICANN board will hold a second public meeting in Brussels on 25 November; the European Commission will host.
Email spam and antispam tactics
See also TBTF for 2000-07-20, 1999-07-19, 1998-11-17, 07-27, 03-30, 02-09, 01-12, 1997-11-24, 10-20, 09-29, 09-22, more...
C-spam: domain-name holders receive unsolicited commercial email
Was it  spam? It's a grey area. The recipients were customers of the sender, Network Solutions, and it might be claimed that an unsolicited emailing to customers could not be objectionable. But this mailing had a few points against it that shade it over into the black end of grey. Let's call it c-spam -- customer spam.
Paul Vixie, proprietor of the Realtime Blackhole List , , posted a request for commentary  to NANOG: Should he blackhole netsol.com? If 18.104.22.168 were entered onto the RBL, the domain would suddenly become invisible to large portions of the Net. (Note: internic.net would not be affected by such an action.) One poster commented that the usual means of fighting spam don't work in this case: one can't complain to NetSol's upstream provider and request that its connectivity be yanked. Another pointed out that if NetSol got sufficiently annoyed with Vixie they could simply deactivate vix.com and put him out of business.
At this writing the debate is still rolling on NANOG, Vixie is in discussions with NetSol sales/marketing management, the domain is not blackholed, and NetSol has agreed to hold off any further mailings until the discussions conclude.
Technology from Area 51?
A favorite sport among the geeks who frequent slashdot.org is speculating on the nature of the product Transmeta is developing . Their curiosity is understandable as the father of Linux, Linus Torvalds, works there. Now the ultra-secretive company may have offered the first glimpse of its technology, courtesy of a patent  issued earlier this month. Somewhat mysteriously titled Memory controller for a microprocessor for detecting a failure of speculation on the physical nature of a component being addressed, the patent reveals a chip that can translate Intel instructions into a more advanced format, VLIW (Very Long Instruction Word). It should run Windows faster than anything yet seen on the planet. It could also be highly efficient running Java or RISC processor code.
Some have speculated that the microprocessor is reverse-engineered from alien technology. This news.com story  catches an industry analyst in mid-quip:
Each must name a designated copyright contact
The Digital Millenium Copyright Act, which was signed into law last month, requires  all ISPs to register with the Copyright Office and to name a designated contact for complaints of copyright violation. The rules are only an interim step in the new law's implementation; regulators will draft permanent rules and host a public comment period within the next several months.
Open source software and the Linux OS
See also TBTF for 1999-08-16, 05-22, 03-26, 02-15, 02-01, 1998-11-17, 11-11, 11-03, 10-27, 10-12, 08-31, more...
Fears of Open Software lockout ease
The I2O Special Interest Group is developing specifications for an advanced I/O subsystem. On 4 November the group announced  that it had made version 1.5 of the I2O spec publicly available to all product developers at no cost. This announcement lays to rest year-old fears  that the I2O Consortium might use its closed membership roster and non-disclosure terms to hobble Linux implementation of the I/O system, especially on Intel's Merced chip. Here is discussion of the I2O development on Slashdot .
Taking a Tomahawk for a test cruise
On 16 November, Los Angeles television station KCOP posted on its Web site a piece titled Rockets Red Glare (no longer up as far as I can determine):
TBTF home and archive at http://tbtf.com/ . To subscribe send the the message "subscribe" to firstname.lastname@example.org. TBTF is Copy- right 1994-1998 by Keith Dawson, <dawson dot tbtf at gmail dot com>. Commercial use prohibited. For non-commercial purposes please forward, post, and link as you see fit. _______________________________________________ Keith Dawson dawson dot tbtf at gmail dot com Layer of ash separates morning and evening milk.