Feeds

If I tell you that I'll have to kill you: Red Hat fights the DMCA

Not that it had a great deal of choice...

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Red Hat has struck a small blow against the DMCA, by publishing a security patch which can only be explained fully to people who are not within US jurisdiction. The company's position here seems to be not altogether voluntary - according to a spokesman "it is bizarre, and unfortunately something Red Hat cannot easily do much about," but like it or not Red Hat has been recruited to the campaign to make the DMCA look ridiculous.

The patch itself is on the Red Hat site, on this page, and the oddity here can be seen if you go down to the bottom. Under the heading "references" there is a link to http://www.thefreeworld.net/non-US/. At this point, those of you reading this while within US jurisdiction should have a care. We will endeavour to unfold the tale to you without exposing ourselves to action under the DMCA, but we stress now that we are not encouraging you to do so, nor is it our intention to provide you with the tools to do so.

Thefreeworld.net is not as yet an especially widely-known site, but its purpose is explained here. Briefly, it notes that the US has shown a readiness to bust individuals who perfectly legally publish information and software outside of the US, on the basis that this is published to people within US jurisdiction, among others. In order to publish this information without getting busted, Thefreeworld.net uses a licensing agreement which specifically rules out people within US jurisdiction. You can see the licence here, and again we stress that people within US jurisdiction should not accept this licence.

This bit makes it all nice and clear:

By continuing you warrant that you:
* are not a citizen of the USA.
* are not under US jurisdiction, including embassies, naval vessels, military bases and other areas of US jurisdiction.
* are permitted to import security information that may include information that can be used to subvert copy or content protection, even though this is not the primary purpose of the supply of this information.
* are not obtaining the information with the intent to commit a crime.
* understand the information is provided without fee and without warranty and/or guarantee of correctness of any kind.
* acknowledge that by downloading the data outside of the European Union you are performing an act of importation.

This rules out several Register staffers, and as Mr Orlowski in particular, not being a US citizen but being within easy reach of the feds, is particularly vulnerable to being lined up in front of a military tribunal in Cuba and shot, we caution him to stay away.

So what's all this got to do with Red Hat? Well, non-qualifying people, we can't exactly tell you that. But when we asked Red Hat about it we got an official comment which at least partially explains it: "RHSA-2002-158 is an errata kernel which addresses certain security vulnerabilities. Quite simply, these vulnerabilities were discovered and documented by ppl outside of the US, and due to the Digital Millenium Copyright Act legislation in the US, it is potentially dangerous to disclose any information on security vulnerabilities, which may also be used in order to circumvent digital security - i.e. computer security. For this reason, RH cannot publish this security information, as it is not available from the community in the first instance. The www.thefreeworld.net site allows for accessing this information, but requires you agree to terms which protect the author and documenter of the patches from being accusations that they themselves have breached DMCA."

Got that? In some instances at least, the very act of explaining what has been fixed by a security patch could be construed as explaining how the security of a product could be breached, and hence could be viewed as a breach of the DMCA.

This is of course ridiculous. Does this mean that all of the companies issuing security advisories are breaching the DMCA? Well, quite possibly. Does it mean The Register's pole position security watcher John Leyden might be breaching the DMCA every day of his life? Oh dear.

Obviously, it is ridiculous, and the notion that the DMCA could be used to send virtually the entire security industry to prison for a very long time is ridiculous - just as ridiculous as the idea that the US authorities are going to start flying non-US citizens to Cuba to shoot them. But if neither of these things are ever going to happen, why do the laws permit them? At the very least, it's untidy.

It seems to us that the authors of the explanatory document which US citizens are not permitted to read would have been most unlikely to get themselves busted by just publishing it. We could of course be wrong, but it seems to us the more likely purpose of the exercise was to make a point, which they have done splendidly.

The document has been copyrighted, and the authors have chosen to restrict its distribution, and to use Thefreeworld.net licence as the mechanism for doing so. Note that it is the copyright, rather than fear of the DMCA, that has forced Red Hat to join in. Looking at the Ts & Cs we think it would probably be OK (i.e. not a breach of copyright) for us to publish it here via a click-through agreement for the benefit (or should that be continuing deprivation?) of US readers, and we could adopt a DMCA defence wall along the lines of Thefreeworld.net's in order to shield ourselves from the other stuff. Not that we'd be any more likely to get busted than the authors, but we feel a responsibility to support their stance here.

But as you already know where you can or can't read it, our duplicating the mechanisms here would serve no purpose. Making points in the way the authors have however does serve a purpose, because it keeps the DMCA in the public eye, and exposes its stupidities. More of this would be good, and possibly most excellent sport, we think.

And the perpetrators? It's not entirely clear, but Red Hat names some of the people involved in the fixes. In addition, we understand that some guy called Alan Cox might have been in some way connected. You may have heard of him. ®

New hybrid storage solutions

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Keep that consumer browser tat away from our software says Oracle
Big Red decides it will only support Firefox's Extended Support Releases
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
TIBCO ponders new 'financial options', including sale or merger
Your challenge: find ways to satisfy shareholders of mid-sized enterprise software outfit
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.