[127582] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Strength in Complexity?

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Mon Jul 7 10:38:07 2008

From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: paul.hoffman@vpnc.org, pgut001@cs.auckland.ac.nz
Cc: cryptography@metzdowd.com
In-Reply-To: <p0624080ec49561145055@[10.20.30.162]>
Date: Mon, 07 Jul 2008 21:07:15 +1200

Paul Hoffman <paul.hoffman@vpnc.org> end:

>Wrong. There is no requirement to "ignore everything else in the 
>cert". There is simply no requirement to use that material.

I suspect we're in violent agreement over this, just from two different 
persepectives.  From a security threat-modelling view I have to look at what 
the worst is that can happen if I deploy a cert (or whatever else it is I'm 
deplying).  Since the spec says that an implementation is free to ignore every 
single extension in a trust anchor/root cert then I have to assume that no 
extension I put in a root cert will ever be enforced (it *might* be, but it's 
not safe to rely on it).  From an optimist's point of view the spec is 
guaranteeing that extensions will be enforced.  From a paranoid security 
person's point of view the spec is guaranteeing that no extensions will be 
enforced.  I'm in the latter camp.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post