[145528] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Five Theses on Security Protocols

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sat Jul 31 18:04:10 2010

From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: cryptography@metzdowd.com, perry@piermont.com
In-Reply-To: <20100731123239.2efc2f51@jabberwock.cb.piermont.com>
Date: Sun, 01 Aug 2010 06:05:38 +1200

"Perry E. Metzger" <perry@piermont.com> writes:

>Inspired by recent discussion, these are my theses, which I hereby nail upon
>the virtual church door:

Are we allowed to play peanut gallery for this?

>1 If you can do an online check for the validity of a key, there is no
>  need for a long-lived signed certificate, since you could simply ask
>  a database in real time whether the holder of the key is authorized
>  to perform some action.

Based on the ongoing discussion I've now had, both on-list and off, about
blacklist-based key validity checking [0], I would like to propose an
addition:

  The checking should follow the credit-card authorised/declined model, and
  not be based on blacklists (a.k.a. "the second dumbest idea in computer
  security", see
  http://www.ranum.com/security/computer_security/editorials/dumb/).

(Oh yes, for a laugh, have a look at the X.509 approach to doing this.  It's
eighty-seven pages long, and that's not including the large number of other
RFCs that it includes by reference: http://tools.ietf.org/html/rfc5055).

> The signed certificate is completely superfluous.

This is, I suspect, the reason for the vehement opposition to any kind of
credit-card style validity checking of keys, if you were to introduce it, it
would make both certificates and the entities that issue them superfluous.

Peter.

[0] It's kinda scary that it's taking this much debate to try and convince
    people that blacklists are not a valid means of dealing with arbitrarily
    delegatable capabilities.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post