Re: I want to try something for freedom.
On Thu, 2 Nov 2000, Robert Varga wrote:
> Yes, but it is in every aspect similar to what the person who wrote the
> first letter in this thread wants to do or is advised to do, namely to
> reverse-engineer the operation of a working system which is developed only
> for win* and based on proprietary algorithms. That's exactly the same what
> the person writing the DeCSS has done. Hence the company creating the
> authentication software would probably sue the person writing the first
> letter and could expect that the result would be the same as the DeCSS
> lawsuit, and it is currently lost. If this happens before the DeCSS
> lawsuit is finished in the Supreme Court, then the result will be likely
> the same as the first stages of the DeCSS lawsuit, meaning probably lost.
> This is only my two-pence of course, but I could not stand not to point
> out the similarities between the two situation.
I'm not even sure this will get into the lists...
The main reason that DeCSS has not been defendable as reverse engineering
for sake of compatibility is that the program has a clear purpose that is
not compatibility. It is a windows program that decodes a dvd movie and
writes it to another file.
Key points here:
1. it only runs on windows, thus no compatibility.
2. it doesn't actually play anything, only copy it. there are seperate
protections for *copying* works than for access to works.
If it had never been released for windows, and only released once it
worked on linux, the lawsuit might never have happened. (although there
has been interesting discussion surrounding the difference between
obtaining access to a work being protected, and creating a device to
obtain access to a work not being protected)
In this situation, there doesn't seem to be a copyrighted work being
protected, which means most of the more often debated parts of the DMCA do
In any case, here's what I'd do:
*most likely* that "proprietary authenticatioin client" isn't very
proprietary. I would be very surprised if they had actually done anything
creative in simply authenticating someone. *much* more likely, is that
they simply packaged known algorithms as a client and a server that worked
together. They wrote it, yes, but the probably used some 3rd party
component to do the real work. (i.e. encryption) The only 'proprietary'
piece you would have to worry about would be the patents on those
encryption algorithms. (like RSA)
- look at the product. find the vendor. go to their website read up. it
might just tell you right off what you are looking for.
- look at the installation package for the client software. what does it
install? is there something like RSAlib.dll? or ssl*.dll? or
blowfish.dll? (etc.) heck, do symbol dumps of all the dlls it installed.
- look at the server. (if you can) find someone who administers it (the
techie, not the librarian) and have a friendly discussion about it.
- nmap the server (this is possibly not a good idea, depending on how
paranoid the admins are.
- set up a dummy server and tell a windows box to try to connect to
it. forwarding both request and response while logging. look for the the
'authentication' and for well known things like ssl session startups. be
careful not to sniff anyones elses password.
You haven't done anything illegal, yet (although be careful about the
nmap) and you haven't even written anything, but you might know exactly
what you would need to do to write a linux client.