Feeds

MPs' Pretty Good Privacy 'ban' finally explained

Parliament misunderstands privacy, not for the first time

High performance access to file storage

MPs have been told once again that they can't use PGP to encrypt their email because of supposed compatibility problems between the encryption software and VPN remote access software installed on parliamentary computers.

PGP explains that this prohibition by parliamentary technicians stemmed from a snag in using the PGP email proxy and an outdated version of the Infoexpress VPN client used by MPs. The latest versions of both packages would have worked together, but Commons techies chose to advise against using PGP in favour of a different product instead.

Francis Maude, shadow minister for the Cabinet Office, who has repeatedly asked questions on the subject since March, tabled another query on Thursday (12 November). Lib Dem MP Nick Harvey responded with the now stock answer that PGP doesn't mix with the software on MPs' PCs. An extract from Hansard (below) records the exchange.

Mr. Maude: To ask the hon. Member for North Devon, representing the House of Commons Commission pursuant to the answer of 13 October 2009, Official Report, column 781W, on Members: email, if the Commission will make it its policy to allow Pretty Good Privacy (PGP) software to be installed on hon. Members' computers and ensure that hon. Members' computers are compatible with PGP software. [299324]

Nick Harvey: No. The service provider has told us that this product is not compatible with software used by Parliament.

PGP has repeatedly said there's nothing about its encryption software that ought to preclude its use with VPN remote software, which is a different type of security application.

Previous Commons replies to the same question have revealed that an evaluation by the Parliamentary ICT (PICT) department found Pretty Good Privacy (PGP) to be "incompatible with Parliament’s current version of VPN (remote access) software". A different package was recommended as an alternative and offered to MPs at no cost.

PGP's response (below) to our latest query on the cryptographic conundrum reveals that Commons techies came across a compatibility problem between an old version of the supported VPN software and the then current version of PGP. No compatibility problem existed between the current versions of each package either at the time of the evaluation or now.

However since no re-evaluation has taken place, the Parliamentary ICT (PICT) department continues to advise MPs against using PGP.

We have investigated the problem that Parliament was having. In March 2007, they asked our technical support team about an incompatibility between the PGP email proxy and the Infoexpress VPN client they were using. At the time, our tech support told them that there was an updated version that fixed the incompatibility. The current versions of PGP and Infoexpress are still compatible.

We understand the difficulty in upgrading systems, especially with software like VPN clients, which when they don't work can't be fixed remotely. Nonetheless, there were and are compatible versions of PGP and Infoexpress available and in use today. Upon review it is our understanding that there are no incompatibility issues that prevent the MP/PICT from using PGP. Any other UK Government or commercial entities can use PGP Corporation's standards based and CAPS certified data protection solutions at this time.

What's never been in doubt is that MPs have a clear need to exchange secure electronic communications with each other and their constituents, using tools such as PGP. This need for confidentiality was highlighted by recent attempts by the Metropolitan Police to get copies of email correspondence between Members of Parliament, without first obtaining a warrant. The police request, made about emails exchanged between Damian Green MP and fellow Tory David Davis, provoked a round of parliamentary questions back in February. ®

Bootnote

Political blogger Dizzy Thinks was the first to report on the issue back in March. However it turns out the PGP prohibition has actually lasted more than two years, as PGP explains.

"A central government agency had an issue back in 2007 but PGP wasn't able to validate that this was the same problem (as the one that was raised in Parliament in 2009) until recently when the PICT confirmed it to be so," it explained.

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.