cryptoinmain.wml 32.7 KB
Newer Older
1 2 3 4 5 6
#use wml::debian::template title="Exploring Cryptographic Software in Debian's Main Archive" BARETITLE=true

# Nota bene! This is basically draft text from the lawyers, and it must
# _not_ be modified for spelling errors and such. Formatting changes are
# fine (I think). -- Joy

Jutta Wrage's avatar
Jutta Wrage committed
7 8 9 10 11 12
<table width="100%" summary="mail headers">
<colgroup span="2">
<col width="10%">
	<td><a href="">Software in the Public Interest</a>, <a href="">Debian Project</a></td></tr>
Jutta Wrage's avatar
Jutta Wrage committed
	<td>Roszel C. Thomsen II, Partner, <a href="">Thomsen &amp; Burke LLP</a></td></tr>
Jutta Wrage's avatar
Jutta Wrage committed
	<td>July 31, 2001</td></tr>
Jutta Wrage's avatar
Jutta Wrage committed
19 20 21 22
	<td>Exploring Cryptographic Software in Debian's Main Archive</td></tr>

<p>Thank you for this opportunity to comment on Sam Hartman's white paper
entitled <q>Exploring Cryptographic Software in Debian's Main Archive</q>.</p>
24 25 26 27 28 29 30 31 32 33 34 35 36

<p>We are providing this information as a general guideline to you. BXA
requires that each entity exporting products be familiar with and comply
with their affirmative obligations set forth in the Export Administration
Regulations.  Please note that the regulations are subject to change.  We
recommend that you obtain your own legal advice when attempting to
export.  In addition some countries may restrict certain levels of
encryption imported into their country. We recommend consulting legal
counsel in the appropriate country or the applicable governmental
agencies in the particular country.</p>

<p>By way of background, the export of cryptographic software from the
United States is governed under the United States Export Administration
37 38
Regulations (<q>EAR</q>, 15 CFR Part 730 et seq.) administered by the
Commerce Department's Bureau of Export Administration (<q>BXA</q>).  BXA
revised the provisions of the EAR governing cryptographic software most
40 41
recently on October 19, 2000.  I refer to these as the <q>new US
Regulations</q> in order to distinguish them from prior regulations that
42 43 44
were more restrictive.</p>

<p>When the Clinton Administration came to Washington, encryption items
were controlled for export from the United States as <q>munitions</q> under
46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79
the Arms Export Control Act and the International Traffic in Arms
Regulations.  Most applications for licenses to export strong encryption
items were denied.  Industry and public interest groups lobbied for
liberalization, and the Clinton Administration reformed the outdated
U.S. export controls on encryption items in a series of graduated steps,
culminating the new US Regulations.  The new Bush Administration is
considering further liberalizations that may be published later this

<p>Despite these liberalizations, the U.S. export controls on commercial
encryption items remain complex and onerous.  American companies must
submit encryption items for technical reviews by the intelligence
authorities prior to export.  Exports to some agencies of foreign
governments require licenses, as do exports to telecommunications and
Internet service providers wishing to provide services to some
government agencies.  Finally, post-export reporting requirements apply
to many exports from the United States.  Thus, U.S. encryption export
controls continue to impose a significant regulatory burden on American
companies, retarding the worldwide deployment of strong cryptography in
commercial software programs.</p>

<p>Not all software programs with encryption are commercial products,
however.  For purposes of the EAR, cryptographic source code controls
fall into three categories:  (a) open source, (b) community source, and
(c) proprietary source.  The rules governing exports of each type of
source code are different, and they have been amended in important
respects in the new US Regulations.</p>

<p>Open source refers to software that is available to the public without
restriction free of charge, under a GNU-style license agreement.  Debian
would appear to fall into this category.  The old regulations allowed
the export of open source to any end-user without a technical review,
provided that the person making the open source available filed a
contemporaneous notification with BXA and the National Security Agency
(<q>NSA</q>).  However, the old regulations were silent with respect to
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
restrictions (if any) on the export of compiled executable software
derived from open source.</p>

<p>Under the new US Regulations, not only the open source, but also the
compiled executable software derived from open source, is eligible for
export under the same conditions as the open source itself, provided
that the compiled executable is available without restriction and free
of charge.  Unfortunately, if you include the compiled executable
software into a product that you distribute for a fee, then the
resulting product is subject to all of the rules that apply to
commercial software programs.  For example, they must be submitted to
BXA and NSA for a one-time technical review, described above.</p>

<p>Community source refers to software that is available to the public free
of charge for non-commercial use but that contains further restrictions
on commercial use.  Community source may be exported under essentially
the same conditions as open source, but community source remains subject
to more detailed reporting requirements.</p>

100 101
<p>Proprietary source refers to all source code that is neither <q>open</q>
nor <q>community</q> source.  Exporters may provide proprietary source code
102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
to any end-user in the EU and its partners, and to any non-government
end-user in other countries, promptly upon filing of a technical review
with BXA and NSA.  The same reporting requirements applicable to
community source also apply to proprietary source.</p>

<p>Please keep in mind that persons in the US who may post to sites outside
the US are governed by US law, even if they do so in their individual
capacity.  Therefore, you may want to warn persons in the US that their
posting to the current crypto server outside the US are still subject to
US regulations.</p>

<p>Finally, you should be aware that a core set of US export controls apply
to all exports of open source cryptographic software from the United
States.  In essence, these controls prohibit the export of open source
cryptographic software under License Exception TSU to (1) prohibited
parties (listed at <a href=""></a>),
118 119 120 121 122 123 124
(2) prohibited countries (currently Cuba, Iran, Iraq, Libya, North
Korea, Sudan, Syria and Taliban Occupied Afghanistan) and (3) design,
development, stockpiling, production or use of nuclear, chemical or
biological weapons or missiles.</p>

<p>With this background, your specific questions with respect to Debian are
address in the order that they appear in Sam Hartman's white paper,
below in italics.</p>

<hr />
128 129 130 131 132

<h2><i>Exploring Cryptographic Software in Debian's Main Archive</i></h2>

<p><i>Sam Hartman</i></p>

<p><i>Debian Project</i></p>

<hrline />
136 137 138 139 140 141 142 143

<p style="margin-left: 2em">
    <i>Debian is a free operating system. Currently for US export reasons, Debian
    splits cryptographic software off into a separate archive located outside
    the US. This document summarizes the questions we would need to answer from
    a legal standpoint in order to merge these two archives.</i>

<hrline />
145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164

<h3><i>About Debian</i></h3>

<p><i>Debian is a group of individuals working to produce a free operating system.
These individuals are responsible for decisions they make while working on
Debian; there is no legal Debian organization that developers work for or that
decisions are made on behalf of. There is a registered non-profit, Software in
the Public Interest (SPI), that holds money and resources for Debian. So
decisions developers make may impact resources owned by SPI and thus impact
SPI. Other Debian resources are owned by various sponsors. Debian generally
depends on sponsors for network connectivity. There are also third-party groups
that copy the Debian software onto mirrors so that people around the world can
download and use it. Others make and sell CDs of Debian. All these groups might
be accountable to a greater or lesser extent for the decisions Debian makes. We
want to conduct ourselves in a manner that minimizes the liability for all
parties and, within that constraint, maximizes the value of our efforts.</i></p>

<p><i>As with all operating system vendors, Debian needs to include cryptographic
software. This software provides security, allows users to engage in Internet
commerce, and accomplishes other tasks requiring cryptography. Today, this
165 166
software is stored on a server outside the United States, known as the <q>non-US
server</q>. Currently Debian takes no measures to assist US developers in
167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252
following export control regulations if they upload software to the non-US
archive or to prevent them from uploading software. We would like to move
cryptographic software from the non-US server onto our main server in the US.</i></p>

<p><i>With the increasing networked nature of the work, and the fact that more and
more critical functions are being placed on computing platforms, and the
unfortunate growth of mischief and deliberate malice, security is going to be
increasingly important. Cryptography is an important corner stone of a number
of security processes. Any OS that does not make an effort to seamlessly
integrate cryptography is unlikely to be competitive.</i></p>

<p><i>Putting all software on a single source, and the corresponding ability to
create a single set of CD's that have integrated cryptographic support makes it
easier for the users, makes it easier for CD vendors, simplifies the task of
developers uploading software to these sites, and simplifies the task of
replicating the software repositories on the internet.</i></p>

<p><i>The rest of this document will focus on the main server within the US and on
its mirrors and copies around the world. It's important to realize that there
is currently a parallel structure set up to deal with the non-US server.</i></p>

<p><i>Every few months Debian developers release a new official version of Debian.
This software is made available on the main (and for cryptographic software,
the non-US) server to a group of primary mirrors around the world. These
mirrors copy the software off the main server and make it available to users
and secondary mirrors. The users can use HTTP, FTP, or a variety of other
methods to retrieve the software. CD images are made available to users and
resellers. These images can be burned onto physical CDs by individuals or by
those wanting to sell/give away Debian.</i></p>

<p><i>In addition, there are two constantly evolving releases of Debian: the testing
and unstable releases. These releases are updated on a daily basis by
developers around the world. Like the official releases, these releases are
made available on the main and non-US servers to primary mirrors. The primary
mirrors make software available via HTTP, FTP and other methods both to end
users and to secondary mirrors. CD images are sometimes made from these
releases. The important difference between these evolving releases and the
official release is that they are constantly changing.</i></p>

<p><i>Often, developers upload binaries and source code at the same time. However, we
support many different types of computers each of which requires different
binaries for the same source code. Most developers make binaries only for one
of the computer architectures we support when they upload a changed program.
Automated processes go and use the source code they have uploaded to make
binaries for the other architectures. As such, some binaries for a particular
source code program will likely be uploaded at a later time than that source

<p><i>Some Debian developers also use Debian resources to work on as-yet-unreleased
software. The primary resource that is useful for this task is the Debian CVS
server. Source code to projects on this server is almost always available to
the public, but may change many times in a day. The CVS server is in the US.</i></p>

<p><i>However most Debian software is not developed directly by Debian developers.
Instead, the software is released to the public by some third party. Some
software is made available to the public on sites within the US, while other
original authors release their software on sites outside the US. Debian
developers are responsible for integrating the software into Debian. As part of
this job, many Debian developers end up working closely with the original
software author, often contributing code back to the original release.</i></p>

<p><i>The software in Debian complies with the Debian Free Software Guidelines; the
DFSG. We believe this software has publicly available source code in the sense
of section 740.13(e) of the EAR. The guidelines require that the source code be
redistributable. The DFSG indirectly requires that one be able to distribute a
product based on the source code without paying a fee. We distribute all the
source code in Debian as part of our releases. Other software is distributed in
our non-free archive, but our focus in this document is on the DFSG-free
software. We would be interested in knowing to what extent we could move
non-DFSG-free software for which we can distribute source code into the US, but
we want to make sure advice in this area does not get confused with advice on
how to handle DFSG-free software.</i></p>

<p><i>Debian developers live around the world and are citizens of many countries.
Obviously some are US citizens, but many others are not. Some may be citizens
of the seven forbidden countries in EAR section 740.13(e).</i></p>

<p><i>As mentioned, we have mirrors all around the world. We do not have any official
mirrors (mirrors with which the project is connected) in any of the seven
countries listed in EAR section 740.13(e), although since our software is
publicly available, it might be copied into these countries. Most mirrors
within the US currently only mirror the main server (the one without
cryptography), although some mirror both the main and non-US portions of the
archive. Debian takes no responsibility for mirrors within the US that mirror
the non-US portion of the archive.</i></p>

<hrline />
254 255 256

<h3><i>Our Goal</i></h3>

<p><i>We want to include cryptographic software in our main archive.  We want to
258 259
understand the risks to developers, users, SPI, mirror maintainers, CD
resellers, sponsors and any other parties that are connected with Debian so
that we can make an informed decision.  We want to be able to document and
publicize these risks so that these parties do not commit a crime through
ignorance.  Obviously, we also want to avoid taking unnecessary risks.</i></p>
263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279

<p><i>In particular we would like to consider the following activities:</i></p>

<li><i>On a daily basis, adding and modifying DFSG-free software to our releases.
    In practice only the testing and unstable releases are modified on a daily
    basis, but the other releases are modified from time to time.</i></li>

<li><i>Distributing cryptographic software as part of our releases over the
    Internet and on CDs.</i></li>

<li><i>Adding and changing DFSG-free cryptographic software on our CVS server.</i></li>

<li><i>Any reactions we'd have to have to any changes in cryptographic regulations
    (or laws).</i></li>

<hrline />

<p><em>END Debian Document Preamble</em></p>
283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300

<p>I will try to reflect these goals in my answers to your questions.  By
way of summary, I think that an initial notification should suffice for
the current archive and updates thereto.  A new notification would be
required only if a new program with encryption should be added to the
archive.  Additional distribution of freeware does not require further
notification.  However, commercial versions would be subject to the
technical review, licensing and reporting requirements that apply to
other commercial products.  Predicting the future of changes to laws or
regulations is difficult, but if the law changes, you would either have
to take down the site or modify it in order to remain in compliance. 
You have no obligation to inform other constituencies of their legal
obligations, but if you have a list of frequently asked questions, I
would be pleased to suggest appropriate responses that you might wish to

<p>Questions (Note, each question by Debian is marked with "D:")</p>

Jutta Wrage's avatar
Jutta Wrage committed
301 302 303 304 305 306
<blockquote class="question">
	Do we need to notify the Bureau of Export Administration (BXA)
	about software we add to releases?
307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337

<p>If the notification is drafted properly, and the archive remains on the
site identified in the notification, then you only have to file a single
notification with BXA for the initial archive.  Only one notification
for one U.S. site is required;  no separate notification is required for
mirror sites inside or outside the U.S.  This notification would only
have to be updated if you added a new program implementing encryption.</p>

	Department of Commerce
	Bureau of Export Administration
	Office of Strategic Trade and Foreign Policy Controls
	14th Street and Pennsylvania Ave., N.W.
	Room 2705
	Washington, DC 20230

	Re:  Unrestricted Encryption Source Code Notification 
	Commodity:	Debian Source Code

	Dear Sir/Madam:
	Pursuant to paragraph (e)(1) of Part 740.13 of the U.S. Export
	Administration Regulations ("EAR", 15 CFR Part 730 et seq.), we are
	providing this written notification of the Internet location of the
	unrestricted, publicly available Debian Source Code. Debian Source Code
	is a free operating system developed by a group of individuals,
	coordinated by the non-profit Software in the Public Interest.  This
	archive is updated from time to time, but its location is constant.
	Therefore, and this notification serves as a one-time notification for
	subsequent updates that may occur in the future.  New programs will be
	the subject of a separate notification.  The Internet location for the
	Debian Source Code is:
339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354

	  This site is mirrored to a number of other sites located
	outside the United States.

	  A duplicate copy of this notification has been sent to the ENC
	Encryption Request Coordinator, P.O. Box 246, Annapolis Junction, MD

	  If you have any questions, please call me at (xxx) xxx-xxxx.


Jutta Wrage's avatar
Jutta Wrage committed
355 356 357 358 359
<blockquote class="question">
	What information do we need to include in the notifications?
360 361 362 363 364 365

<p>The draft language above includes the information that you need to
include in the notification</p>

Jutta Wrage's avatar
Jutta Wrage committed
366 367 368
<blockquote class="question">
	How often do we need to notify?  We want to notify as little as
370 371
	possible as it creates more work for us and for the government,
	but we want to notify as often as necessary to follow the
Jutta Wrage's avatar
Jutta Wrage committed
372 373
374 375 376 377 378 379 380 381 382

<p>As drafted above, and assuming that the archive remains on the Internet
site identified in the notification, you should not have to file a
subsequent notification for subsequent updates.  You would only file
another notification if you added a new program implementing

Jutta Wrage's avatar
Jutta Wrage committed
383 384 385 386
<blockquote class="question">
	If we move our cryptographic software into this country,
387 388 389 390 391 392
	and the laws or regulations change to be more restrictive, what
	are we likely to lose?  Would we have to destroy any software,
	or CDs?  Would we have to remove it from our master or secondary
	sites?  If we use the increased availability of cryptographic
	software to improve the security of the rest of the system, and
	the cryptographic legal climate worsens, would be likely to have
Jutta Wrage's avatar
Jutta Wrage committed
393 394
	to discard all copies of such software in the U.S.?
395 396 397 398 399 400 401 402 403 404 405

<p>The trend has been toward increased liberalization of the export
controls on cryptography in the United States, rather than increased
restrictions.  This trend has been constant over the past decade and has
accelerated in the past year.  We cannot advise you with respect to what
you might lose unless and until new regulations are published.  However,
we believe that you would retain copyrights to the software and some,
albeit perhaps more limited, rights to export.</p>

Jutta Wrage's avatar
Jutta Wrage committed
406 407 408 409 410
<blockquote class="question">
	In order of decreasing preference, we would like to notify:
Jutta Wrage's avatar
Jutta Wrage committed
	<li>Once for the entire Debian archive</li>

Jutta Wrage's avatar
Jutta Wrage committed
414 415
	<li>Once for each official release (keeping in mind that
	  testing/unstable change between releases)</li>

Jutta Wrage's avatar
Jutta Wrage committed
417 418
	<li>Once when a new program containing cryptography is added to
	  the archive</li>

Jutta Wrage's avatar
Jutta Wrage committed
420 421
	<li>Once when a new version of a program containing cryptography
	  is added to the archive.</li>
Jutta Wrage's avatar
Jutta Wrage committed
424 425 426 427 428 429 430 431

<p>I think that you only have to file a new notification if you add a new
program that incorporates cryptography.  Updates to existing programs
should be covered by the broad language of the notification we
suggested, above.</p>

Jutta Wrage's avatar
Jutta Wrage committed
432 433 434 435 436 437
<blockquote class="question">
	New packages enter the debian archive through the following sequence
	of steps.  At what point must the notification happen?
Jutta Wrage's avatar
Jutta Wrage committed
439 440 441 442 443 444 445 446 447
	<li>Upstream developer releases a package as open-source.
	   This step gets skipped in the case of a native-Debian package.</li>
	<li>A Debian developer packages the source and binary for Debian,
	   frequently with source changes.</li>
	<li>The package is uploaded to ftp-master, incoming.</li>
	<li>The new package fails to install, because it's new.</li>
	<li>Ftp admins add the needed records for the package.</li>
	<li>The package installs into the archive, within a few days.</li>
	<li>The package gets copied to the mirror sites.</li>
448 449 450 451 452 453 454 455 456 457 458 459 460

<p>The regulations are pretty clear that the notification has to occur
prior to or contemporaneous with public availability.  Exports prior to
public availability require an export license.  Therefore, if the archive
in step 3 is not publicly available, then either the package must be made
publicly available prior to step 3 (and notifications sent), or export
licenses will be needed for Debian developers.  If the archive in step 3
is publicly available, then notification at that point would eliminate the
need to have export licenses for Debian developers.</p>

Jutta Wrage's avatar
Jutta Wrage committed
461 462 463 464
<blockquote class="question">
	If the upstream author has notified BXA, is the notification needed?
465 466 467
	(Packaging for debian can involve modifications to the source
	involving file locations, and occasionally functional differences,
	although the general goal is to make the upstream code work in
Jutta Wrage's avatar
Jutta Wrage committed
468 469
	Debian with minimal modification.)
470 471 472 473 474

<p>If the upstream author has notified BXA, that is sufficient.</p>

Jutta Wrage's avatar
Jutta Wrage committed
475 476 477 478 479 480
<blockquote class="question">
	Do we need to notify when new binaries (object code) are added if
	we have already notified for the source code?
481 482 483 484 485 486

<p>I do not think that you have to file a new notification for object code,
provided that a notification for the source code has been filed.</p>

Jutta Wrage's avatar
Jutta Wrage committed
487 488 489 490
<blockquote class="question">
	Is notification required for programs that do not contain crypto
491 492
	algorithms, but are linked against crypto libraries?  What about
	programs that launch other programs in order to do cryptographic
Jutta Wrage's avatar
Jutta Wrage committed
493 494
495 496 497 498 499 500

<p>As long as the program is open source, it may include an open crypto API
and still qualify under License Exception TSU.</p>

Jutta Wrage's avatar
Jutta Wrage committed
501 502 503 504
<blockquote class="question">
	New programs can be checked easily prior to their release (and
505 506 507 508
	notification done at that time), but when an update is performed,
	there isn't a manual step at which to do the notification.  Would
	it be acceptable to notify BXA for each addition of software, with
	an indication that future updates may include the addition of
Jutta Wrage's avatar
Jutta Wrage committed
509 510
	crypto functionality?
511 512 513 514 515 516 517 518

<p>Yes.  Overreporting should probably be avoided where reasonable, but
underreporting must be avoided.  Future updates of an existing program
do not require separate notification.  Only new programs require separate

Jutta Wrage's avatar
Jutta Wrage committed
519 520 521 522 523
<blockquote class="question">
	Can we automate the process of sending in notifications?
524 525 526 527 528 529 530

<p>You may automate the process of sending notifications. This in an
internal procedural matter.  BXA and NSA do not care how you handle the
filing of notifications internally.</p>

Jutta Wrage's avatar
Jutta Wrage committed
531 532 533 534 535
<blockquote class="question">
	What form should the notification take?
536 537 538 539 540 541

<p>The BXA notification may be in either electronic or paper form; 
however, the NSA notification must be in paper form.</p>

Jutta Wrage's avatar
Jutta Wrage committed
542 543 544
<blockquote class="question">
	Who can send in the notifications?  For example, do they need to
Jutta Wrage's avatar
Jutta Wrage committed
546 547
	be a US citizen?
548 549 550 551 552

<p>Any person may send in the notification;  citizenship is not relevant.</p>

Jutta Wrage's avatar
Jutta Wrage committed
553 554 555 556 557 558
<blockquote class="question">
	Are there any other concerns we should be aware of?  What steps
	other than notification do we need to take?
559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586

<p>Other than notification, you might consider implementing a reverse IP
lookup that identifies the computer requesting the download, and that
blocks downloads of the cryptographic archive to countries embargoed by
the United States:  Cuba, Iran, Iraq, Libya, North Korea, Syria, Sudan
and Taliban Occupied Afghanistan.  In addition, you might consider
having a provision in your license agreement, or a separate screen prior
to download, that advises the person downloading the software as

<p>This software is subject to U.S. export controls applicable to open source
software that includes encryption.  Debian has filed the notification with
the Bureau of Export Administration and the National Security Agency that
is required prior to export under the provisions of License Exception TSU
of the U.S. Export Administration Regulations.  Consistent with the
requirements of License Exception TSU, you represent and warrant that you
are eligible to receive this software, that you are not located in a country
subject to embargo by the United States, and that you will not use the
software directly or indirectly in the design, development, stockpiling
or use of nuclear, chemical or biological weapons or missiles.  Compiled
binary code that is given away free of charge may be re-exported under the
provisions of License Exception TSU.  However, additional technical review
and other requirements may apply to commercial products incorporating this
code, prior to export from the United States.  For additional information,
please refer to</p>

Jutta Wrage's avatar
Jutta Wrage committed
587 588 589 590
<blockquote class="question">
	Currently, users around the world can access and potentially
591 592 593 594 595 596
	download software that is awaiting integration into our archive.
	Likely, we would do any necessary notifications as software is
	processed into the archive, so software in this state would be
	awaiting notification.  Would this be a problem?  If so, would it
	be acceptable to set up an alternate queue of cryptographic
	software awaiting integration into the archive available only to
	our developers?  In order to process software into our distribution,
598 599
	developers who are often outside the US need to examine the
	software and make sure it meets certain guidelines. How should we
	accomplish this access?  Are there any other solutions to this
Jutta Wrage's avatar
Jutta Wrage committed
601 602 603
	pre-notification area of the archive we should consider?
	<p>One issue we often run into is software patents. Clearly the
604 605 606
	integration  of cryptography into software doesn't remove any of the
	patent concerns we would normally have to think about. However, are
	there any new issues we need to consider when patents interact with
	cryptography export regulations?  It seems that at least for exemption
	TSU (section 740.13 of the EAR), patents do not influence whether the
Jutta Wrage's avatar
Jutta Wrage committed
609 610 611
	source code is public.
612 613 614 615 616 617 618 619 620 621 622 623 624 625

<p>It is important to differentiate between the archive that has been a
subject of notification, and new programs.  You can update the archive
that has been a subject of notification without further notification, as
described above.  Only new programs need to be subject of a separate
notification, prior to posting.  If new programs must be reviewed by
developers prior to posting, and such software is not both publicly
available and already notified to the U.S. government, then I recommend
that you consider obtaining an export license authorizing this limited,
pre-notification review.  You are correct that patents do not disqualify
software from eligibility for export under License Exception TSU.</p>

Jutta Wrage's avatar
Jutta Wrage committed
626 627 628
<blockquote class="question">
	Distribution, Mirroring and CDs</p>

	<p>Do our mirrors within the US need to notify the BXA if we add
632 633 634 635 636
	cryptography to our archive?  How often do they need to notify BXA?
	We would like to avoid a situation where mirrors have to notify for
	each new program Debian adds to the archive, even if our master
	server must send in such notifications. We need to keep operations
	simple for mirror operators.  What, if anything, would mirrors
Jutta Wrage's avatar
Jutta Wrage committed
	outside the US need to do?</p>

639 640
	<p>If we send an update to a mirror rather than waiting for it to
	download software, do we need to take any special steps?  What if we
Jutta Wrage's avatar
Jutta Wrage committed
641 642 643
	send a mirror a request to download new/changed software?
644 645 646 647 648 649

<p>Once the notification has been filed for the central server, no further
notification is required for mirror sites.</p>

Jutta Wrage's avatar
Jutta Wrage committed
650 651 652 653
<blockquote class="question">
	Which of the following vendors (if any) would be able to ship
654 655
	unmodified Debian binaries (and source) with only notification?
	Which would require review and approval?  Could the review be
Jutta Wrage's avatar
Jutta Wrage committed
656 657 658
	concurrent with shipment, or must approval predate shipment?
659 660 661 662
	A) mail-order shipment of CD's for the cost of the media?<br />
	B) mail-order shipment of CD's for profit?<br />
	C) off-the-shelf sales of CD's for the cost of the media?<br />
	D) off-the-shelf sales of CD's for profit?<br />
	E) vendor providing CD's from A or C above, along with hardware.  HW
664 665
	   sold at a profit, but with no preinstall?<br />
	F) E, but with software pre-installed?<br />
	G) any of the above, selling support for the software?
Jutta Wrage's avatar
Jutta Wrage committed

Jutta Wrage's avatar
Jutta Wrage committed
	<p>If it's easier, another way to look at this is:  what conditions must
670 671
	be met for the vendor to ship binaries under License Exception TSU,
	and what expenses is the vendor allowed to recover costs and/or sell
Jutta Wrage's avatar
Jutta Wrage committed
	at a profit?</p>
673 674 675 676 677 678 679

<p>Reasonable and customary fees for reproduction and distribution are
allowed, but not license fees or royalties.  Support also is allowed,
subject to the above limitation.</p>

Jutta Wrage's avatar
Jutta Wrage committed
680 681 682 683
<blockquote class="question">
	If the one-time review is required for unmodified binaries shipped
	for-profit, can that approval be used by other vendors which are
Jutta Wrage's avatar
Jutta Wrage committed
685 686
	shipping unmodified binaries?
687 688 689 690 691

<p>A one time review is for the product, and is vendor-independent.</p>

Jutta Wrage's avatar
Jutta Wrage committed
692 693 694 695 696 697
<blockquote class="question">
	Would it be acceptable to set up an official mirror in a country
	forbidden in EAR section 740.13(e)?
698 699 700 701 702 703

<p>You would have to apply for a license to set up an official mirror in an
embargoed country.</p>

Jutta Wrage's avatar
Jutta Wrage committed
704 705 706 707
<blockquote class="question">
	If it is technically infeasible to block access from the T7 countries
	to a web (or ftp, etc) server, does due diligence require extreme
	measures?  Does the defacto standard of (US) industry common-practice
Jutta Wrage's avatar
Jutta Wrage committed
710 711
	meet due diligence?
712 713 714 715 716 717 718

<p>The de facto industry standard should suffice.  I hope that the government
will recognize that any system devised by man can be defeated, with enough

Jutta Wrage's avatar
Jutta Wrage committed
719 720 721 722
<blockquote class="question">
	What steps should we take if we become aware of someone downloading
723 724
	software into one of these countries from a mirror within the US?
	What if we become aware of downloads into one of these countries
Jutta Wrage's avatar
Jutta Wrage committed
725 726 727
	from a mirror outside the US?
	<p>Some of our developers may live in or be citizens of the seven
728 729 730 731
	countries forbidden for exemption TSU.  Would it be a problem for
	these developers to have access to cryptographic software on our
	machines?  Would we need to ask them not to download such software?
	What steps should we take if we become aware of them downloading
Jutta Wrage's avatar
Jutta Wrage committed
	cryptographic software?</p>
733 734 735

<p>Simply posting cryptographic software on a server that may be accessible
from an embargoed country does not constitute <q>knowledge</q> that the
737 738 739 740 741 742 743
software has been exported there.  Therefore, criminal liability would
not apply to the act of posting.  We recommend that you perform IP
checking and deny downloads to known embargoed countries.  This due
diligence also would provide a defense to a claim of civil liability. 
If you find out that your software has been downloaded to a prohibited
destination, then I recommend that you block future downloads to that
specific site unless and until you obtain a license from BXA.</p>

<hr />
746 747 748 749

<p>Debian thanks the <a href="">Hewlett-Packard</a>
<a href="">Linux Systems Operation</a>
for their support in obtaining this legal opinion.</p>