[14135] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Is cryptography where security took the wrong branch?

daemon@ATHENA.MIT.EDU (bmanning@karoshi.com)
Wed Sep 10 09:44:50 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: bmanning@karoshi.com
To: lynn@garlic.com (Anne & Lynn Wheeler)
Date: Wed, 10 Sep 2003 03:39:09 -0700 (PDT)
Cc: cryptography@metzdowd.com
In-Reply-To: <4.2.2.20030909141405.00c7bc70@mail.earthlink.net> from "Anne & Lynn Wheeler" at Sep 09, 2003 02:24:00 PM

> >certificate requests coming into a CA/PKI can be digitally signed, the 
> >CA/PKI can retrieve the authoritative authentication public key (for the 
> >domain name ownership) from the domain name infrastructure and 
> >authenticate the request .... eliminating all the identification gorp (and 
> >also done w/o the use of certificates).
> >
> >misc. additional recent musings:
> >http://www.garlic.com/~lynn/2003l.html#60  Proposal for a new PKI model 
> >(At least I hope it's new)

	Not particularly new. This was/is the promise of DNSSEC.
	early work, the TBDS and FMESHD projects.  Current IETF
	work, OE and IPSECKEY.

> The problem is that the domain name infrastructure has a database of domain 
> name owners .... but no real good infrastructure ... 

	Not entirely.  The reverse maps are a well defined infrastructure
	space.

> Of course, the bottom line is if the domain name infrastructure has a 
> real-time database of public keys for authentication purposes .... in part 
> for use by the CA/PKI industry for authenticating SSL domain name 
> certificate requests .... for use in authentication operations .... the use 
> of the domain name infrastructure's authentication public keys don't have 
> to just be restricted to authentication use by the CA/PKI industry. In 
> fact, domain name infrastructure authentication public keys could be used 
> to effectively for authentication operations that actually subsume the SSL 
> domain name certificates authentication operations.

	There are some other problems w/ using the DNS.
		No revolkation process.
		DNS caching
		third-party trust (DNS admins != delegation holder)

> 
> --
> Anne & Lynn Wheeler    http://www.garlic.com/~lynn/
> Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
>   
> 
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com
> 


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post