[comp.arch] built-in security features

roger@nsc.nsc.com (Roger Thompson) (01/04/89)

I'm in the process of doing a market study on "Computer Security".

Granted this is rather broad, but one has to start somewhere.  My
bottom line interest is to determine what if anything a semiconductor
manufacturer such as National Semiconductor should do in the
design of their various products which will make the systems designers
job easier IF he has requirements in the the area of Computer Security.
In short,  if your system has security requirements what could
we do to make your life vastly easier.

I would like feed-back from those of you working on ACTUAL product
development.  My questions are

	1.)  Is security important --- if it isn't let me know
	2.)  If it is --- I have a few questions

		a.) is your product commercial or government driven.
		    what is the consumer base?  I don't need the 
		    actual customer name.

		b.) what type of product is it?  Is it a workstation,
		    a peripheral controller, a network server or
		    a stand-alone controller.

		c.) Is security provided via software solutions,
		    hardware only, or a mix of hardware and software.

	3.)  If you had your choice, what would you like to see
	     in the way of enhancements to microprocessor, peripheral
	     controllers and memory devices.

I would like to see responses via email and I'll summarize the
results.

Thanx for your help in advance.

andy@Gang-of-Four.Stanford.EDU (Andy Freeman) (01/10/89)

In article <8846@nsc.nsc.com> roger@nsc.nsc.com (Roger Thompson) writes:
>In short,  if your system has security requirements what could
>we do to make your life vastly easier.

The world does change.  Some time before the IBM-PC was introduced,
"someone" suggested anti- software piracy features to Intel.  The
basic idea was to have dealers trap-door encrypt code, using a
processor-specific number, before delivering it to their customers.
The cpu chip would then decrypt the code in real-time and execute it,
but only if the dealer had encrypted it for that particular chip.

Intel's response was that they sold chips and that software piracy
helped them sell more.

-andy
UUCP:  {arpa gateways, decwrl, uunet, rutgers}!polya.stanford.edu!andy
ARPA:  andy@polya.stanford.edu
(415) 329-1718/723-3088 home/cubicle

nusip@maccs.McMaster.CA (Mike Borza) (01/17/89)

In article <5995@polya.Stanford.EDU> andy@Gang-of-Four.Stanford.EDU (Andy Freeman) writes:
>In article <8846@nsc.nsc.com> roger@nsc.nsc.com (Roger Thompson) writes:
>
>The world does change.  Some time before the IBM-PC was introduced,
>"someone" suggested anti- software piracy features to Intel.  The
>basic idea was to have dealers trap-door encrypt code, using a

While the details are somewhat hazy now, I believe that HP did sell
some systems with a similar scheme, whereby a system call or dedicated
read-only memory location was available to software to verify that the
software was running on a CPU for which it was licensed.  As I recall,
the scheme was quickly abandoned for a variety of reasons, not least
of which was the potential liability if a legally-licensed user had to
replace the CPU.  I think the scheme was described in an HP Journal
article (c. 1982) describing the design of the system software and
hardware (series 200?).

mike borza <nusip@maccs.uucp>
....it's all so hazy now....

rpw3@amdcad.AMD.COM (Rob Warnock) (01/18/89)

+---------------
| >The world does change.  Some time before the IBM-PC was introduced,
| >"someone" suggested anti- software piracy features to Intel.  The
| >basic idea was to have dealers trap-door encrypt code, using a
| While the details are somewhat hazy now, I believe that HP did sell
| some systems with a similar scheme...
+---------------

Fortune Systems (yes, they still exist, as part of SCI) had a protection
scheme on their Unix systems which allowed user backups. Uninstalled software
was encrypted with a "global" key known only to Fortune. The act of installing
it -- using a protected (gencrypted) "install" program -- caused it to be
decrypted and re-encrypted with a key based on the CPU serial number (the
key was stored in a PAL on the motherboard). Thus once the software had been
"installed" on a given CPU, you could make as many copies as you like (back
it up, put it on a net server, etc.), but it would only run on the specific
CPU it had been "installed" on.

And the "install" procedure was about as user-friendly as one might want.
You stuck a shrink-wrapped disk in (unwrapping it first ;-} ) and selected
"Install New Product" on the "System Management" menu. Each product disk
had a product-specific install script that could ask questions for local
configuration, if needed.

Motherboard changes required moving the (socketed) security PAL. And a
damaged security PAL could be replaced [with a *lot* of questions asked,
as the PALs never broke!] from the factory, based on the serial number of
the CPU. (Oh, and the PAL stored not the actual serial number, but some
encrypted/checksummed function of the serial number.)

Actually, it worked pretty well. There was a way for a large site to buy
CPUs in a "group", and then buy "group-coded" versions of software that
would run on any machine in the group (but priced so high nobody used it).
More importantly, there was a program for 3rd-party software vendors so
they could have their disks "branded" by Fortune to make them one-time
installable. (You didn't *have* to use copy-protection, by the way. Things
compiled on a Fortune would run on any CPU unless specifically "branded".)
Physical security of uninstalled disks was an issue, as clearly any
uninstalled program disk was a single-use "blank check". (There were some
tricks played to prevent copying of uninstalled disks.)

Many people in this group (and others) have expressed disgust with the
whole notion of copy-protection, but Fortune's original business plan was
based (rightly or wrongly) on having a number of proprietary applications
run on their system, and at the time (1980) "software piracy" was estimated
in the trade press to account for as much as 80% of the software actually
being run. So they wanted to protect their development investment.

Of course, they went a bit far, for my taste. They were so scared of somebody
copying their programs that they encrypted/decrypted a protected program if
it ever had to swap out/in. This seriously affected multi-user performance,
to say the least! They forgot that "security" is always a balancing act,
between what it costs the perpetrator to penetrate and what it costs you
(in lost function/convenience) to protect. (*Sheesh!* Look, anybody capable
of picking bits off swap space is capable of using a logic analyzer and
cracking the scheme more straightforwardly!)


Rob Warnock
Systems Architecture Consultant

UUCP:	  {amdcad,fortune,sun}!redwood!rpw3
ATTmail:  !rpw3
DDD:	  (415)572-2607
USPS:	  627 26th Ave, San Mateo, CA  94403

shane@chablis.cc.umich.edu (Shane Looker) (01/19/89)

In article <1804@maccs.McMaster.CA> nusip@maccs.UUCP (Mike Borza) writes:
:In article <5995@polya.Stanford.EDU> andy@Gang-of-Four.Stanford.EDU (Andy Freeman) writes:
:>In article <8846@nsc.nsc.com> roger@nsc.nsc.com (Roger Thompson) writes:
:>
:>The world does change.  Some time before the IBM-PC was introduced,
:>"someone" suggested anti- software piracy features to Intel.  The
:>basic idea was to have dealers trap-door encrypt code, using a
:
:While the details are somewhat hazy now, I believe that HP did sell
:some systems with a similar scheme, whereby a system call or dedicated
:read-only memory location was available to software to verify that the
:software was running on a CPU for which it was licensed.  As I recall,
:the scheme was quickly abandoned for a variety of reasons, not least
:of which was the potential liability if a legally-licensed user had to
:replace the CPU.  
:
:mike borza <nusip@maccs.uucp>


If I remember correctly, the Apple Lisa used a scheme where, when
software was originally run on a machine, it registered the CPU number.
You then could not use the software on any other Lisa.  Needless to
say, software was forever getting corrupted or breaking in some way,
and a new version couldn't be installed for a while.  (This was in a
semi-public lab.)

No wonder those machines never flew...

Shane Looker   |  Looker@um.cc.umich.edu
America works less, when you say "Union Yes!"

pag@tcsc3b2.UUCP (Philip A. Gross) (01/20/89)

In article <24102@amdcad.AMD.COM>, rpw3@amdcad.AMD.COM (Rob Warnock) writes:
[...stuff deleted...]
> Fortune Systems (yes, they still exist, as part of SCI) had a protection
> scheme on their Unix systems which allowed user backups. Uninstalled software
> was encrypted with a "global" key known only to Fortune. The act of installing
> it -- using a protected (gencrypted) "install" program -- caused it to be
> decrypted and re-encrypted with a key based on the CPU serial number (the
> key was stored in a PAL on the motherboard). Thus once the software had been
> "installed" on a given CPU, you could make as many copies as you like (back
> it up, put it on a net server, etc.), but it would only run on the specific
> CPU it had been "installed" on.
> 
[...stuff deleted...]
> Motherboard changes required moving the (socketed) security PAL. And a
> damaged security PAL could be replaced [with a *lot* of questions asked,
> as the PALs never broke!] from the factory, based on the serial number of
> the CPU. (Oh, and the PAL stored not the actual serial number, but some
> encrypted/checksummed function of the serial number.)
> 
[...even more stuff deleted...]
> More importantly, there was a program for 3rd-party software vendors so
> they could have their disks "branded" by Fortune to make them one-time
> installable. (You didn't *have* to use copy-protection, by the way. Things
> compiled on a Fortune would run on any CPU unless specifically "branded".)
> Physical security of uninstalled disks was an issue, as clearly any
> uninstalled program disk was a single-use "blank check". (There were some
> tricks played to prevent copying of uninstalled disks.)
[...yet more stuff deleted...]

The AT&T 3B2 line of computers as well as the NCR Towers make use of a
what is generally called a firmware serial number that is kept on the
motherboard.  On the AT&T box, the serial number is recorded in one of
four EPROMS on the motherboard. On the NCR box, it is recorded perhaps
in some other manner.  NCR makes use of it during the installation of the
UNIX operating system, effectively locking the OS to the particular Tower
it was installed on.

While AT&T (from what I understand) doesn't make use of the firmware serial
number in the installation of the UNIX operating system, they do provide
a function call in 'C' which can be used to get, among other things, the
firmware serial number.  This can then be used during the installation of
software to lock the software onto that particular box.  In fact, the 
accounting software and 4GL database that we resale does this.


========================================+======================================
Philip A. Gross				|
The Computer Solution Co., Inc.  	|  I haven't heard what I have
1009 Sycamore Square, P.O. Box 716	|  to say about that yet.
Midlothian, VA  23113-0716	   	|
Voice: (804)794-3491		   	|
----------------------------------------+--------------------------------------
INTERNET:	pag%tcsc3b2@wb3ffv.ampr.org
USENET:		...!ames!haven!aplcen!wb3ffv!tcsc3b2!pag
UUCP:		tcsc3b2!pag		(804)794-1514
ATTMAIL:	attmail!tcsc3b2!pag
*******************************************************************************
	The opinions expressed here are strictly mine and nobody elses.
===============================================================================

kean@tank.uchicago.edu (Keane Arase) (01/24/89)

In article <356@tcsc3b2.UUCP> pag@tcsc3b2.UUCP (Philip A. Gross) writes:

>The AT&T 3B2 line of computers as well as the NCR Towers make use of a
>what is generally called a firmware serial number that is kept on the
>motherboard.  On the AT&T box, the serial number is recorded in one of
>four EPROMS on the motherboard. On the NCR box, it is recorded perhaps
>in some other manner.  NCR makes use of it during the installation of the
>UNIX operating system, effectively locking the OS to the particular Tower
>it was installed on.

While it is true NCR looks at the serial number on it's Towers when
installing unix, it is extremely simple to bypass this check when
installing unix.  (A couple of comments in one of the shell scripts
and unix can be installed on *any* Tower.)

No I never did this, nor do I condone such actions.  I merely wish to point
out that this type of protection can be bypassed.  (As a disclaimer, I used
to work *extensively* with NCR Towers.  Please don't ask my opinion on NCR
equipment, as I have a bias against them.)

>
>========================================+======================================
>Philip A. Gross				|
>The Computer Solution Co., Inc.  	|  I haven't heard what I have
>1009 Sycamore Square, P.O. Box 716	|  to say about that yet.
>Midlothian, VA  23113-0716	   	|
>Voice: (804)794-3491		   	|
>----------------------------------------+--------------------------------------
>INTERNET:	pag%tcsc3b2@wb3ffv.ampr.org
>USENET:		...!ames!haven!aplcen!wb3ffv!tcsc3b2!pag
>UUCP:		tcsc3b2!pag		(804)794-1514
>ATTMAIL:	attmail!tcsc3b2!pag
>*******************************************************************************
>	The opinions expressed here are strictly mine and nobody elses.
>===============================================================================
---

Keane Arase, Systems Programmer
University of Chicago Computing Organizations
Acedemic and Public Computing, Technical Project Support
kean@tank.uchicago.edu
syskean@uchimvs1.uchicago.edu

              **  Please file the standard disclaimers here  **

peter@stca77.stc.oz (Peter Jeremy) (01/24/89)

In article <5995@polya.Stanford.EDU> andy@Gang-of-Four.Stanford.EDU
(Andy Freeman) writes:
>The world does change.  Some time before the IBM-PC was introduced,
>"someone" suggested anti- software piracy features to Intel.  The
>basic idea was to have dealers trap-door encrypt code, using a
>processor-specific number, before delivering it to their customers.
>The cpu chip would then decrypt the code in real-time and execute it,
>but only if the dealer had encrypted it for that particular chip.

The IBM/370 has a unique CPU ID available via a supervisor instruction.
If the OS made it available, this could presumably be used by a software
package to verify that it was running on the licensed hardware. (Although
I seem to recall the this instruction was one that did something slightly
different under VM).  Probably most other mainframes (and early mini's)
have something similar.

This is not as secure as encrypting the code, but I don't think mainframe
software piracy is as big as problem as PC stuff.

>Intel's response was that they sold chips and that software piracy
>helped them sell more.

Also, building unique ID's into chips adds extra complexity into the
manufacturing process.  And what happens when the CPU fails?  This would
not be a big a problem for mainframes, since the ID could be a bunch of
straps (or a ROM) which can be changed by the field engineer.
-- 
Peter Jeremy (VK2PJ)         peter@stca77.stc.oz
Alcatel-STC Australia        ...!uunet!stca77.stc.oz!peter
41 Mandible St               peter%stca77.stc.oz@uunet.UU.NET
ALEXANDRIA  NSW  2015

gillies@m.cs.uiuc.edu (01/24/89)

Xerox Information Systems Division sells a lot to the government, and
sells to some fortune-500 companies (Boeing, etc).  Here is how they
protect their system software from copying:

Each Daybreak=6085/Star=8010 workstation has a unique identifier.
This identifier is the 6-byte absoluately unique ID used for a 48-bit
ethernet host ID.  I'll call this the "UID".  The ethernet cards are
made & sold only by Xerox, and I believe the UID is in an EPROM chip
which (probably) also contains startup microcode.

This is very-much a closed-architecture / proprietary product (source
code is never distributed, & the assembly language is proprietary like
on the old Pyramid computers), so the following scheme works fairly
well:

Each sites gets a full set of floppies with every piece of software
Xerox makes.

Each major software package has an "product number" K.  Xerox has a
(perhaps public-key?) private encryption function F(K, UID).  The O/S
is programmed with the (public) decryption function Finverse().

During initialization, each package reads a "product factoring file"
looking for its number F(K, UID).  It then applies Finverse and checks
to see if Finverse(F(K, UID)) = K,UID.  If so, then the program will
run.  If not, then it says "call technical support to get
authorization to run this package"

You install all the software you want, then run the "factoring"
program, and call Xerox, giving them your UID.  Xerox checks to make
sure you paid for certain packages, then gives you the numbers
F(K2,UID), F(K2,UID), ..., computed from your UID & the package
numbers K1, K2, ....

There may be some added subtlety, but this is the main idea.

Anyway, this scheme provides enough protection for their needs.  Of
course, there are obvious attacks, but you asked for a REAL-WORLD
system.  Some obvious flaws are:

	1.  Reprogram the ROM chip to be the same as a competitor, who
has paid for all the software.  But you better not *EVER* connect to his
network!
	2.  Dissect each software package and remove the checks
(nearly impossible without any development tools or debuggers)
	3.  Spoof Xerox into giving you the numbers by saying you're
from another company (with the software), then giving out your machine
number & package numbers (Xerox can check machine ownership).

Also, after every release the encryption/decryption functions change,
so they can charge for new software versions.

Nobody says you must solve this problem totally, in order to make a
healthy profit on your product.  I doubt if *ANYONE* outside Xerox has
ever broken the product factoring system.  If anyone ever did, then
you could just revise the hardware/software to thwart the attack their
attack.

I think this system serves the needs of Xerox adequately.

Don Gillies {uiucdcs!gillies} U of Illinois

rogerson@PEDEV.Columbia.NCR.COM (rogerson) (01/24/89)

In article <1546@tank.uchicago.edu> kean@tank.uchicago.edu (Keane Arase) writes:
>In article <356@tcsc3b2.UUCP> pag@tcsc3b2.UUCP (Philip A. Gross) writes:
>
>>The AT&T 3B2 line of computers as well as the NCR Towers make use of a
>>what is generally called a firmware serial number that is kept on the

	This is no longer true.  The current NCR Tower series have no such
	protection scheme.  I can't even find one of the old Towers around
	here which did use this protection scheme.  According to one of
	my co-workers it is extremely easy to defeat.

  	Still, such protection schemes are stupid and do not help sales
	of your computers any.

	-----Dale
		Rogerson-----

scc@cl.cam.ac.uk (Stephen Crawley) (01/27/89)

Don Gillies (gillies@m.cs.uiuc.edu) message about Xerox workstations
contains some factual errors.

The working microcode for a Xerox D machine (Dandelion, DandyTiger, Dolphin,
Dove = Daybreak, etc) is loaded from Hard disc, Floppy disc or from the
Ethernet when the machine is booted.  Different microcode is used for 
Mesa, InterLISP, Smalltalk and (I think) for standalone diagnostics.  
When a new release of a product comes out, you often get a new microcode
image.  Eg the XDE 5.0 release had microcode with extra instructions
to implement C character pointer operations.

The source code of many products IS available.  In the Mesa world, the
source code for the base operating system (Pilot), for XDE and for
all of the XDE tools are available.  True, Xerox won't release the 
source code for their network servers or for Viewpoint.  

The assembly languages are no longer proprietry.  I don't think that 
the InterLISP and Smalltalk instruction sets ever were.

> I doubt if *ANYONE* outside Xerox has ever broken the product 
> factoring system.

I think you'd be surprised how easy it is :-)

-- Steve

pag@tcsc3b2.UUCP (Philip A. Gross) (01/28/89)

In article <3377@cbnews.ATT.COM>, djz@cbnews.ATT.COM (Danny Zerkel) writes:
> >The AT&T 3B2 line of computers as well as the NCR Towers make use of a
> >what is generally called a firmware serial number that is kept on the
> >motherboard.  On the AT&T box, the serial number is recorded in one of
> >four EPROMS on the motherboard. ...
> Which works until the system board dies and is replaced by maintanence,
> rendering all your expensive copy protected software useless... :-(

Generally, we insist that the AT&T service tech migrate the EPROMS from
the original system board to the new one, if at all possible.  Otherwise,
the customer merely needs to obtain a new INSTALL diskette to update
his software to the serial number contained in the new set of EPROMS,
otherwise his software don't work.


===================================+===========================================
Philip A. Gross			   |INTERNET:	pag%tcsc3b2@wb3ffv.ampr.org
The Computer Solution Co., Inc.    |USENET:	...!wb3ffv!tcsc3b2!pag
1009 Sycamore Square, P.O. Box 716 |UUCP:	tcsc3b2!pag	(804)794-1514
Midlothian, VA  23113-0716         |ATTMAIL:	attmail!tcsc3b2!pag
Voice: (804)794-3491               |
        The opinions expressed here are strictly mine and nobody elses.
        << I haven't heard what I have to say about that yet. >> :-)

pag@tcsc3b2.UUCP (Philip A. Gross) (01/28/89)

In article <2373@PEDEV.Columbia.NCR.COM>, rogerson@PEDEV.Columbia.NCR.COM (rogerson) writes:
> In article <1546@tank.uchicago.edu> kean@tank.uchicago.edu (Keane Arase) writes:
> >In article <356@tcsc3b2.UUCP> pag@tcsc3b2.UUCP (Philip A. Gross) writes:
> >
> >>The AT&T 3B2 line of computers as well as the NCR Towers make use of a
> >>what is generally called a firmware serial number that is kept on the
> 
>   	Still, such protection schemes are stupid and do not help sales
> 	of your computers any.
> 

The big issue is, does it really matter if the software makes use of
a hardware imbedded serial number.  The software will operate smoothly
and consistently so long as it is retained on the CPU it was installed
on.  The customer generally does not even need to know that their is
any copy protection mechanisms in force.  The customer can make all the
backups of the software they need to, all without violation of the
copyright protection because the software will not operate on any _other_
CPU once it has been installed.

We generally do not inform the customer that there is any copy protection
being used.  However, we do STRONGLY advise them that they should contact
us, along with their AT&T service personnel whenever they experience a
hardware problem which may involve the exchange of the motherboard.
Under such circumstances, their are simple procedures in place which will
allow the software to be 're-installed' on a machine which has had the 
motherboard replaced.

Generally if the customer has had to have the motherboard replaced in the
computer, re-installation of licensed software is not a major concern.

===================================+===========================================
Philip A. Gross			   |INTERNET:	pag%tcsc3b2@wb3ffv.ampr.org
The Computer Solution Co., Inc.    |USENET:	...!wb3ffv!tcsc3b2!pag
1009 Sycamore Square, P.O. Box 716 |UUCP:	tcsc3b2!pag	(804)794-1514
Midlothian, VA  23113-0716         |ATTMAIL:	attmail!tcsc3b2!pag
Voice: (804)794-3491               |
        The opinions expressed here are strictly mine and nobody elses.
        << I haven't heard what I have to say about that yet. >> :-)

les@chinet.chi.il.us (Leslie Mikesell) (02/02/89)

In article <424@tcsc3b2.UUCP> pag@tcsc3b2.UUCP (Philip A. Gross) writes:

 >The big issue is, does it really matter if the software makes use of
 >a hardware imbedded serial number.  The software will operate smoothly
 >and consistently so long as it is retained on the CPU it was installed
 >on.  The customer generally does not even need to know that their is
 >any copy protection mechanisms in force.  The customer can make all the
 >backups of the software they need to, all without violation of the
 >copyright protection because the software will not operate on any _other_
 >CPU once it has been installed.

 >We generally do not inform the customer that there is any copy protection
 >being used.  However, we do STRONGLY advise them that they should contact
 >us, along with their AT&T service personnel whenever they experience a
 >hardware problem which may involve the exchange of the motherboard.
 >Under such circumstances, their are simple procedures in place which will
 >allow the software to be 're-installed' on a machine which has had the 
 >motherboard replaced.

>Generally if the customer has had to have the motherboard replaced in the
>computer, re-installation of licensed software is not a major concern.

We keep spare machines and can swap one into operation in an hour or
two (about the amount of time you spend on hold when you call service..).
I suspect that other sites that consider their computer operations
important do likewise.  I would be *real* unhappy to find out after a 
swap that some piece of software didn't work *on purpose*, especially
if I hadn't been told to expect it.

Les Mikesell

mcdonald@uxe.cso.uiuc.edu (02/03/89)

>We generally do not inform the customer that there is any copy protection
>being used.  However, we do STRONGLY advise them that they should contact
>us, along with their AT&T service personnel whenever they experience a
>hardware problem which may involve the exchange of the motherboard.
>Under such circumstances, their are simple procedures in place which will
>allow the software to be 're-installed' on a machine which has had the 
>motherboard replaced.

>Philip A. Gross			   |INTERNET:	pag%tcsc3b2@wb3ffv.ampr.org
>The Computer Solution Co., Inc.    |USENET:	...!wb3ffv!tcsc3b2!pag
>1009 Sycamore Square, P.O. Box 716 |UUCP:	tcsc3b2!pag	(804)794-1514
>Midlothian, VA  23113-0716         |ATTMAIL:	attmail!tcsc3b2!pag

Not informing potential buyers that your program is copy protected
is a VERY nasty thing. Nasty to the users, nasty to potential users
nasty to your company's reputation, and potentially bad for your
bottom line. When we have bought software that wasn't a "known
quantity", we always insert clauses in our purchase order that specifies
that the software is 
1: Not copy protected in any way. That is, it will run on a simple,
straightforward copy of the distribution media, can be installed from that
copy any number of times, does not depend on any specific hardware device
(i.e. we can install it on two machines, only one of which can possible
be in service at the same time, and have it run on either without
changing any hardware between computers), and will contine to run
on the computer it is installed on even if any unit specific hardware
is changed (i.e. serial number roms changed to a new serial number.)

2: If the vendor wants to try to sell us software that violates 
article 1, that vendor must have an officer of the company discuss this
with us in great detail, and must individually negotiate a contract.

3: If software that is copy protected is indeed delivered without a
contract specifically negotiated as under #2, and it causes us problems,
the selling company will pay for the cost of any problems, plus 
10 time the cost of the problems, plus 10 times the price of the software.

To date, no company has had any problems with this - either they have
said truthfully "we're not copy protected" or they have said "uh -
well - maybe we don't want to do business with you - we care more
about copy protection than a sale" -  and that was the end of that.

(By "we" I mean my group and most of our department- the larger entity
we are in has perhaps negotiated as in number 2; I'm not sure about this,
though.)

What would your company do if a purchase order had such a clause?

Doug McDonald

aglew@mcdurb.Urbana.Gould.COM (02/03/89)

>We generally do not inform the customer that there is any copy protection
>being used.  However, we do STRONGLY advise them that they should contact
>us, along with their AT&T service personnel whenever they experience a
>hardware problem which may involve the exchange of the motherboard.
>Under such circumstances, their are simple procedures in place which will
>allow the software to be 're-installed' on a machine which has had the 
>motherboard replaced.
>
>Philip A. Gross			   |INTERNET:	pag%tcsc3b2@wb3ffv.ampr.org
>The Computer Solution Co., Inc.    |USENET:	...!wb3ffv!tcsc3b2!pag

Well, let's see... back when I was an undergrad I worked on IBM PCs
that had more than a dozen purchased software packages installed
- starting off with DOS, going through FORTRAN, LATTICE C, various 
mathematical subroutine libraries, HALO graph, and ending up with the
little things like Sidekick.

These were *not* all purchased at the same store. No store in town
sold all of these - mant *had* to be purchased separately.

Now, then, if, every time one of the lab PCs died, I had had to call each
of these vendors separately - conservatively estimating 2 hours on the phone
to each vendors customer service, plus maybe an hour of reinstallation
- gee, that's 36 hours, almost a full week, just reinstalling software
after a board swap. That's almost as long as the mean time to failure
of one of the lab systems (not a single system, mind you, just time to
failure of any one of multiple systems).

Well, I guess that gives you an argument for buying all of your software
at one place (preferably *your* place). But that's not always possible.

kenny@m.cs.uiuc.edu (02/07/89)

/* Written 10:44 am  Feb  2, 1989 by mcdonald@uxe.cso.uiuc.edu in m.cs.uiuc.edu:comp.arch */
What would your company do if a purchase order had such a clause?
/* End of text from m.cs.uiuc.edu:comp.arch */

At least one company that I worked for would run screaming and never
speak to you as a customer again -- and they didn't use nor believe in
copy protection.

But consider -- you get a new model disc or something -- something
that maybe wasn't even invented at the time the software was released
-- and suddenly the program no longer works (Maybe it's got timing
dependencies, or something).  Now you whine, `But this violates the
clause that says the software has to continue to run when the hardware
platform is changed!' and sue the pants off the vendor for ten times
the loss of your business during the time the machine was down.  You
can even go as far as to claim that the failure made you go bankrupt,
and sue for ten times the value of your business.

Such is the stuff of which hundred-million-dollar lawsuits are made.

Rephrasing the contract to exclude bugs and include only intentional
copy protection won't help, either, as it's anyone's guess what a jury
will decide is `intentional,' and what to me is a `bug' may be
`intentional restriction on operation' to a jury.