BIS has amended the EAR by implementing the agreements made by the Wassenaar Arrangement at the plenary meeting in December 2009 that pertained to "information security" items. This rule adds an overarching note that excludes particular products that use cryptography from being controlled as "information security" items. The new note focuses "information security" controls on the use of encryption for computing, communications, networking and information security. Many items in which the use of encryption is ancillary to the primary function of the item are no longer controlled under Category 5, Part 2, of the Commerce Control List (CCL).
The decontrols note appears as Note 4 to Category 5, Part 2 of the CCL and provides as follows:
Note 4: Category 5, Part 2 does not apply to items incorporating or using "cryptography" and meeting all of the following:
(a) The primary function or set of functions is not any of the following:
(1) "Information security";
(2) A computer, including operating systems, parts and components therefor;
(3) Sending, receiving or storing information (except in support of entertainment, mass commercial broadcasts, digital rights
management or medical records management); or
(4) Networking (includes operation, administration, management and provisioning);
(b) The cryptographic functionality is limited to supporting their primary function or set of functions; and
(c) When necessary, details of the items are accessible and will be provided, upon request, to the appropriate authority in the exporter’s
country in order to ascertain compliance with conditions described in paragraphs (a) and (b) above.
Note 4 completely removes the decontrolled items from control under Category 5, Part 2 of the CCL.
--
-- You received this message because you are subscribed to the Google
Groups "phonegap" group.
To post to this group, send email to phon...@googlegroups.com
To unsubscribe from this group, send email to
phonegap+u...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/phonegap?hl=en?hl=en
For more info on PhoneGap or to download the code go to www.phonegap.com
---
You received this message because you are subscribed to the Google Groups "phonegap" group.
To unsubscribe from this group and stop receiving emails from it, send an email to phonegap+u...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
gap: is an extension used by Phonegap Build to extend XML elements in config.xml
It should do nothing in your app. But it could be causing some issues, unknown.
Here is a link to the documentation for PhoneGap Build, and the related issue.
I'm outside in the pool. If there are any questions, I'll answer them later.
Cheers
Jesse
Jesse
Oh forgot to fix remove the gap: prefix. Jesse
Oh forgot to fix remove the gap: prefix. Jesse
Gents
Thanks. I'm sorry but I still have no idea what gap: does. It is used in the meta tag, but there is nothing in the content security policy reference. I know because I have been and read it.
It appears to only be referenced in the whitelist plugin, and whilst the plugin may talk about it doing JavaScript communication, why is it in the CSP tag? The CSP tag is reasonably well documented, gap: appears to be an ios only reference and is not mentioned at all.
It certainly does do something important, at least for my application, but at the moment it appears to be voodoo. It works but there is no doc on it whatsoever as to why AND its in a tag that seems counter intuitive. I can see why putting in URLs and unsafe declarations may fit in CSP, but I still have no idea why gap: is there.
Stuff like this is worrying as since it may be something the plugin author has added and is non standard, it may change. Whilst I don't claim to understand everything about CSP I can tentatively and dimly see how it fits together, gap: doesn't fit at all.
I suppose we'll have to delve into the plugin source code and see what we uncover.
Rob
gap: is required only on iOS (when using UIWebView) and is needed for JS->native communicationI've read that if you use https you have to mark that you use encryption, but the thing is, a phonegap app doesn't use encryption, I don't think connecting to a https server is using encryption, the encryption is on the server, not on the app. Using ATS doesn't add encryption to the app, it's still on the server.
--
You still need to submit your app to the U.S. Bureau of Industry and Security (BIS) for approval because they want to know how you are using encryption in your particular app, even though they have already approved the encryption in the iOS and Mac OS X. You are responsible for obtaining separate approval.
It is not necessary to provide Apple’s source code to the government because it has already been reviewed and approved by the U.S. Bureau of Industry and Security (BIS).
If your app uses, accesses, implements or incorporates industry standard encryption algorithms for purposes other than those listed as exemptions under question 2, you need to submit for an ERN authorization. Examples of standard encryption are: AES, SSL, https. This authorization requires that you submit an annual report to two U.S. Government agencies with information about your app every January.
Sample Scenarios
Scenario 1: An app uses or accesses only encryption algorithms provided in iOS or Mac OS for its security features
-- Only US Encryption Registration (ERN) will be required (even if the app is distributed in France)
Almost all items controlled under Category 5, Part 2 of the EAR are controlled because they include encryption functionality. Items may be controlled as encryption items even if the encryption is actually performed by the operating system, an external library, a third-party product or a cryptographic processor. If an item uses encryption functionality, whether or not the code that performs the encryption is included with the item, then BIS evaluates the item based on the encryption functionality it uses.
Similarly, if the item includes encryption functionality, even if the encryption functionality is not used by the item, then BIS evaluates the item based on the included encryption functionality.
My answer - Yes as it uses the encryption provided by the OS so move to next question
Note 4: Category 5, Part 2 does not apply to items incorporating or using "cryptography" and meeting all of the following:
(a) The primary function or set of functions is not any of the following:
(1) "Information security";
(2) A computer, including operating systems, parts and components therefor;
(3) Sending, receiving or storing information (except in support of entertainment, mass commercial broadcasts, digital rights
management or medical records management); or
(4) Networking (includes operation, administration, management and provisioning);
(b) The cryptographic functionality is limited to supporting their primary function or set of functions; and
(c) When necessary, details of the items are accessible and will be provided, upon request, to the appropriate authority in the exporter’s
country in order to ascertain compliance with conditions described in paragraphs (a) and (b) above.
Note 4 completely removes the decontrolled items from control under Category 5, Part 2 of the CCL.
Please note that certain products may be controlled under an ECCN elsewhere in the CCL even if they are no longer controlled for encryption reasons.
This is the section that is the most difficult to read. The use of double negatives and the OR's and AND's make it tricky. The key statement to me is (a) (3). We are sending, receiving and storing information. We must be sending and receiving information as we are using a transport protocol, https. There could be an argument made about storing information, but I'd hate to try and argue that one. Even putting something into a variable could be classified as strong it. There is also an argument that the app could be entertainment, so games might be excluded. Again I'd hate to argue that. I suspect that clause is in there for DRM usage. This means that most apps (IMHO) will not meet all the conditions in Note 4, therefore we are not exempt under Note 4.
My answer - NO so move to next question
My answer - NO so we have a controlled item according to BIS.
Scenario 1: An app uses or accesses only encryption algorithms provided in iOS or Mac OS for its security features
-- Only US Encryption Registration (ERN) will be required (even if the app is distributed in France)
I also do not think that if somebody replaced OpenSSL in https we would definitely be in the clear. It would depend on the key length as one of the questions gets into this level of detail. I do not know where your quote comes from so cannot comment on it without seeing it in a wider context.
It is clear to me that if you are using https on your Apple app, then you must register with the BIS people and get a ERN. Apple state this.
If you disagree please point out where my logic is incorrect. I would be delighted to be shown to be wrong.
Rob
My prediction - Dick Cheney dies, this all goes away.
--
-- You received this message because you are subscribed to the Google
Groups "phonegap" group.
To post to this group, send email to phon...@googlegroups.com
To unsubscribe from this group, send email to
phonegap+u...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/phonegap?hl=en?hl=en
For more info on PhoneGap or to download the code go to www.phonegap.com
---
You received this message because you are subscribed to the Google Groups "phonegap" group.
To unsubscribe from this group and stop receiving emails from it, send an email to phonegap+u...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
8. What is “non-standard cryptography”?
Non-standard cryptography, defined in Part 772– Definition of Terms, “means any implementation of “cryptography” involving the incorporation or use of proprietary or unpublished cryptographic functionality, including encryption algorithms or protocols that have not been adopted or approved by a duly recognized international standards body (e.g., IEEE, IETF, ISO, ITU, ETSI, 3GPP, TIA, and GSMA) and have not otherwise been published.”
The phrase non-standard cryptography is referenced through the section in the BIS regulations called
License Exception ENC – 740.17(b)(1) and Mass Market provision - 742.15(b)(1) allow self-classification of an item and export after submission of a required encryption registration.
Items described in 740.17 (b)(3) include:
Items that are self-classified with an encryption registration per 740.17(b)(1) ALSO require an annual self-classification report.
-----------------
IANAL but my reading of this states that you have to self-classify under License Exception ENC - 740.17(b)(1).
My French is not up to reading French law so I cannot comment on whether French law mirrors the US.
>> The key here is that Apple made claim to a secret, baked it into their SDK and now you are supposed to register if you use their proprietary stuff provided you use it. While I can't speak officially for
>> Commerce, I doubt the department of commerce wants to be flooded basically with Apple programs that all really point to how they do encryption. The original law is intended to limit and control the >> capabilities of foreign entities to use the encryption the US develops against the US, and registering a bajillion apple apps because they use Apple's SSL masks REAL technologies of significance
>> Commerce probably wants to actually pay attention to.
>> The key here is that Apple made claim to a secret, baked it into their SDK and now you are supposed to register if you use their proprietary stuff provided you use it.
>> While I can't speak officially for Commerce, I doubt the department of commerce wants to be flooded basically with Apple programs that all really point to how they do
>> encryption. The original law is intended to limit and control the capabilities of foreign entities to use the encryption the US develops against the US, and registering a
>> bajillion apple apps because they use Apple's SSL masks REAL technologies of significance
>> Commerce probably wants to actually pay attention to.
The regulations certainly aren't archaic, they have been updated in the last few years so somebody is going to the trouble of keeping it relevant.
I have no idea what CYA means.
I also don't consider this an denial of service attempt. I used to work for IBM and we had to pay very, very close attention to US law when we pulled together global deals. We had to go into the ins and outs for each country as part of the deal and almost always had US lawyers from Armonk involved to check and make sure that we kept on the right side of the US and UN regulations. No company wants to get on the wrong side if the US laws. Apple may choose to not put backdoors in their products, thats very relevant this morning, but if the US law said they had to, Tim Cook will tell his company to do so, as would IBM, Cisco, Microsoft and every single other US company. At the moment US law says they don't have to.
Again what legal/patents are you taking about? I'd be interested in seeing and reading more about this. When Apple has patents and a legal justification it goes out for somebody 100%, witness Samsung. If Apple had any patents on HTTPS or something similar, I have no doubt they would sueing the world.
(a) The primary function or set of functions is not any of the following:
(1) "Information security";
(2) A computer, including operating systems, parts and components therefor;
(3) Sending, receiving or storing information (except in support of entertainment, mass commercial broadcasts, digital rights
management or medical records management); or
(4) Networking (includes operation, administration, management and provisioning);
(b) The cryptographic functionality is limited to supporting their primary function or set of functions; and
(c) When necessary, details of the items are accessible and will be provided, upon request, to the appropriate authority in the exporter’s
country in order to ascertain compliance with conditions described in paragraphs (a) and (b) above.
You still need to submit your app to the U.S. Bureau of Industry and Security (BIS) for approval because they want to know how you are using encryption in your particular app, even though they have already approved the encryption in the iOS and Mac OS X. You are responsible for obtaining separate approval.
It is not necessary to provide Apple’s source code to the government because it has already been reviewed and approved by the U.S. Bureau of Industry and Security (BIS).
If your app uses, accesses, implements or incorporates industry standard encryption algorithms for purposes other than those listed as exemptions under question 2, you need to submit for an ERN authorization. Examples of standard encryption are: AES, SSL, https. This authorization requires that you submit an annual report to two U.S. Government agencies with information about your app every January.
Sample Scenarios
Scenario 1: An app uses or accesses only encryption algorithms provided in iOS or Mac OS for its security features
-- Only US Encryption Registration (ERN) will be required (even if the app is distributed in France)
-------------------------------
The highlighted section "exemptions under question 2"refers back to your Note 4. It logically links up and the references are consistent (thankfully). If you think you can swing the exemptions then you could get away with it, especially as Apple doesn't appear to check anything.
You also make the point that the Apple cryptography is open source and as per OpenSSL doesn't require approval, Apple itself doesn't agree with your assessment, see Scenario 1. Apple believe that you need an ERN just because you use the encryption in iOS or OSX, so Apple doesn't believe that being open source excludes you from obtaining an ERN. You may subsequently be able to swing an exception through Note 4, but according to Apple that can't be because the cryptography is open source otherwise they would state it.
I think at the end of the day, it comes down to what level of risk you want to take. Some people believe the risk is negligible, I do not. Apple has a habit of blowing up over things, certain issues become hot topics for no adequately explored reason. I have spent too many months (years?) of my life trying to build my app business to jeopardise it for not following the rules here. I also spent too many years at IBM working with the lawyers trying to avoid big deals blowing up in my face due to legal issues. I've seen the fallout when people make legal assumptions and get proven wrong.
The reason I brought this up was because I could not find a sensible answer to the encryption problem, far too many people state opinions on the internet with zero data to back them up. Some people talk complete bollocks about the export regs and I was determined to try and get to the bottom of it. I don't think we have a definitive answer though. I also think it isn't black and white but shades of grey. Get two lawyers to look at this and you'll get three different views, a large bill and a disclaimer that anything they tell you could be completely wrong. I suspect this is the most thorough discussion on encryption regulations on the net now :)
Getting the ERN was painless, I've spent more time discussing it here than actually getting it. It's cost me 30 mins to get it and Apple will be happy. They may pull my app in future but it won't be because I haven't jumped through whatever hoops Apple and BIS have set out for me. I think unless somebody is 100% certain they do not need ERN, and in law there is normally no such level of confidence, people should get the ERN and then they know they have cleared that regulatory hurdle. What's the cost of getting it wrong?
Anyway, I have to get back to work, I have to debug a set of parallel FTP function calls that drop files when run at high speed with PASV mode. <Sigh>
All the best,
Rob
--
For more options, visit this group at
http://groups.google.com/group/phonegap?hl=en?hl=en
For more info on PhoneGap or to download the code go to www.phonegap.com
---
You received this message because you are subscribed to the Google Groups "phonegap" group.
To unsubscribe from this group and stop receiving emails from it, send an email to phonegap+unsubscribe@googlegroups.com.
--
-- You received this message because you are subscribed to the Google
Groups "phonegap" group.
To post to this group, send email to phon...@googlegroups.com
To unsubscribe from this group, send email to
For more options, visit this group at
http://groups.google.com/group/phonegap?hl=en?hl=en
For more info on PhoneGap or to download the code go to www.phonegap.com
---
You received this message because you are subscribed to the Google Groups "phonegap" group.
To unsubscribe from this group and stop receiving emails from it, send an email to phonegap+unsubscribe@googlegroups.com.
--~M
--