[5] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

[rosenthl@mcc.com: Kerberos authentication for X-Mosaic 2.4 and NCSA HTTPD]

daemon@ATHENA.MIT.EDU (yandros@MIT.EDU)
Fri Aug 12 14:43:47 1994

From: yandros@MIT.EDU
Date: Fri, 12 Aug 1994 14:43:44 +0500
To: www-security.discuss@charon.LOCAL


  Date: Fri, 12 Aug 94 09:38:32 CDT
  From: rosenthl@mcc.com (Doug Rosenthal)
  To: hallam@dxal18.cern.ch
  Cc: www-security@ns1.rutgers.edu, Lei_Tang@GS59.SP.CS.CMU.EDU
  In-Reply-To: hallam@dxal18.cern.ch's message of Fri, 12 Aug 94 12:21:53 +0200 <9408121021.AA18702@dxal18.cern.ch>
  Subject: Kerberos authentication for X-Mosaic 2.4 and NCSA HTTPD 
  
  
     I think this demonstrates precisely why we need different authentication
     systems. Public key is slow. Kerberos is fast but requires a trusted 
     intermediary. For many security scenarios this is OK. Especially if you
     have already set up kerberos.
  
  I would argue that in many on-line client/server scenarios (such as
  the WWW) even the public key approach will require a trusted
  intermediary.  I.e., I don't think on-line services will be able to
  depend on CRLs for detecting invalid (old, stolen, etc.) public key
  certificates, both for timeliness and performance considerations.  I
  think they will need to rely on an on-line trusted intermediary to
  validate the certificates, especially when financial transactions are
  involved.  For more "loosely-coupled" applications, like privacy
  enhanced mail, using CRLs may be fine.
  
     The idea is to modularise the library so that a person with a proverbial
     good idea can easily fing a hook to fasten it to - in any area. So a person
     with a new transformer - encryption, compression, image handling, formatting,
     etc can just call a routine to slot something in.
  
  Wrt security/encryption, having hooks in a common library sounds
  great.  However, it seems that there are several other issues to be
  addressed for interoperability, like security mechanism negotiation
  between client and server, standard encryption encapsulation formats,
  etc.  I.e., various implementations could hook in there own RSA
  modules, but that doesn't insure any two of them can interoperate.
  I know that S-HTTP is trying to address some of this, as is the IETF
  CAT.  However, there's so much to choose from (RSA/DSA,
  PKCS/PEM/PGP/SPKM, etc.).
  
     Of course we are not there now but that is where we want to be :-)
  
  Great; I hope many of the other issues can be standardized as well.
  
  - Doug
  

home help back first fref pref prev next nref lref last post