[18790] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[kerry@vscape.com: Re: [p2p-hackers] P2P Authentication]

daemon@ATHENA.MIT.EDU (Eugen Leitl)
Mon Oct 31 09:42:37 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 27 Oct 2005 16:09:33 +0200
From: Eugen Leitl <eugen@leitl.org>
To: Cryptography List <cryptography@metzdowd.com>


--glBlQjEvVyxq38Av
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

----- Forwarded message from Kerry Bonin <kerry@vscape.com> -----

=46rom: Kerry Bonin <kerry@vscape.com>
Date: Thu, 27 Oct 2005 06:52:57 -0700
To: zooko@zooko.com, "Peer-to-peer development." <p2p-hackers@zgp.org>
Subject: Re: [p2p-hackers] P2P Authentication
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
Reply-To: "Peer-to-peer development." <p2p-hackers@zgp.org>

There are only two good ways to provide man-in-the-middle resistant=20
authentication with key repudiation in a distributed system - using a=20
completely trusted out of band channel to manage everything, or use a=20
PKI.  I've used PKI for >100k node systems, it works great if you keep=20
it simple and integrate your CRL mechanism - in a distributed system the=20
pieces are all already there!  I think some people are put off by the=20
size and complexity of the libraries involved, which doesn't have to be=20
the case - I've got a complete RSA/DSA X.509 compliant cert based PKI=20
(leveraging LibTomCrypt for crypto primitives) in about 2k lines of C++,=20
<30k object code, works great (I'll open that source as LGPL when I=20
deploy next year...)  The only hard part about integrating into a p2p=20
network is securing the CA's, and that's more of a network security=20
problem than a p2p problem...

Kerry

zooko@zooko.com wrote:

>>>And if they do, then why reinvent the wheel? Traditional public key
>>>signing works well for these cases.
>>>    =20
>>>
>...
>=20
>
>> Traditional public key signing doesn't work well if you want to
>>eliminate the central authority / trusted third party.  If you like
>>keeping those around, then yes, absolutely, traditional PKI works
>>swimmingly.
>>  =20
>>
>
>Where is the evidence of this bit about "traditional PKI working"?  As far=
=20
>as
>I've observed, traditional PKI works barely for small, highly centralized,
>hierarchical organizations and not at all for anything else.  Am I missing=
=20
>some
>case studies of PKI actually working as intended?
>
>Regards,
>
>Zooko
>_______________________________________________
>p2p-hackers mailing list
>p2p-hackers@zgp.org
>http://zgp.org/mailman/listinfo/p2p-hackers
>_______________________________________________
>Here is a web page listing P2P Conferences:
>http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences
>
>
>=20
>


_______________________________________________
p2p-hackers mailing list
p2p-hackers@zgp.org
http://zgp.org/mailman/listinfo/p2p-hackers
_______________________________________________
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences


----- End forwarded message -----
--=20
Eugen* Leitl <a href=3D"http://leitl.org">leitl</a>
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

--glBlQjEvVyxq38Av
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDYN+ddbAkQ4sp9r4RAlD5AJ9ESixOjXoCKNwsttopegsjutDIKQCgmb3+
WenPj/0G/fpE1VgtuA6jLNQ=
=n7bl
-----END PGP SIGNATURE-----

--glBlQjEvVyxq38Av--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post