Re: [TLS] Last Call: draft-ietf-tls-extractor (Keying Material

Dean Anderson <dean@av8.com> Tue, 21 July 2009 16:39 UTC

Return-Path: <dean@av8.com>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A71FB3A6B69; Tue, 21 Jul 2009 09:39:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.411
X-Spam-Level:
X-Spam-Status: No, score=-3.411 tagged_above=-999 required=5 tests=[AWL=1.188, BAYES_00=-2.599, GB_I_LETTER=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f1dzjF8VuoSX; Tue, 21 Jul 2009 09:39:16 -0700 (PDT)
Received: from cirrus.av8.net (cirrus.av8.net [130.105.36.66]) by core3.amsl.com (Postfix) with ESMTP id CEC2D3A6848; Tue, 21 Jul 2009 09:38:36 -0700 (PDT)
Received: from citation2.av8.net (citation2.av8.net [130.105.12.10]) (authenticated bits=0) by cirrus.av8.net (8.12.11/8.12.11) with ESMTP id n6LGcSCv007531 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 21 Jul 2009 12:38:29 -0400
Date: Tue, 21 Jul 2009 12:38:28 -0400
From: Dean Anderson <dean@av8.com>
X-X-Sender: dean@citation2.av8.net
To: Martin Rex <Martin.Rex@sap.com>
In-Reply-To: <200907211532.n6LFWUxp015495@fs4113.wdf.sap.corp>
Message-ID: <Pine.LNX.4.44.0907211205240.6961-100000@citation2.av8.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Cc: tls@ietf.org, ietf@ietf.org, rms@gnu.org
Subject: Re: [TLS] Last Call: draft-ietf-tls-extractor (Keying Material
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jul 2009 16:39:17 -0000

On Tue, 21 Jul 2009, Martin Rex wrote:

> I'm not aware of information that the Certicom patents apply to TLS
> extractors.
> 
> I'm not even aware of information that Certicom claims that the patent
> applies to TLS extractors when ECC crypto is used.

Actually, you are "aware" of these patents by any reasonable standard,
because you are "aware" of IPR disclosure 1004 and you are "aware" of at
least this discussion informing you of the patents.  Willfully
disregarding the patent notices does not make you "unaware", but just
serves to discredit any defense your lawyer might raise against charges
of intentional infringement.  To put it as plainly as possible, if the
demand letter from the patent holder isn't the first time you heard of
the patent, you might have a problem with intentional infringement. At
that point, it is often too late to challenge the validity of the
patent.


> The information that I've seen is that the Certicom patent claim
> "covers" TLS extractors when TLS is used with ECC crypto, and they
> acutally imply that their patents claims "cover" pretty much all
> standards around TLS when TLS is used with ECC crypto.

Some of their patents are indeed very broad in scope.

> TLS extractors is essentially the TLS PRF exposed with an API, so
> really, for IP lawyers, TLS with extractors has the exact same attack
> surface as TLS without TLS extractors.

If this is an argument against the validity of a patent, you should
bring it to the patent office. This body cannot challenge the validity
of a patent.  Except in certain circumstances, a court cannot challenge
the validity of a patent.

It is unwise to ignore a patent, since a court is to presume the
validity of a patent.  Court cases, like Bilsky, that invalidate a
patent, invalidate a whole class of patents when their reasoning is
statutory or constitutional. (Bilsky is statutory and if upheld, may
invalidate all software patents--unless Congress alters the law)  When
one wins an ordinary patent case, it is usually a factual matter that
the claims don't actually cover the use, or the other party has
committed some misconduct (eg. Qualcomm v. Broadcomm).  That you think
the patent is a bad patent that should never have been granted isn't a
valid legal reason to ignore a patent.


		--Dean


-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000