Re: [Asrg] Consent Proposal

Yakov Shafranovich <research@solidmatrix.com> Wed, 02 July 2003 00:14 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA22066 for <asrg-archive@odin.ietf.org>; Tue, 1 Jul 2003 20:14:36 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19XVGE-0006sN-9I for asrg-archive@odin.ietf.org; Tue, 01 Jul 2003 20:14:10 -0400
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id h620EABp026422 for asrg-archive@odin.ietf.org; Tue, 1 Jul 2003 20:14:10 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19XVGE-0006s5-4y for asrg-web-archive@optimus.ietf.org; Tue, 01 Jul 2003 20:14:10 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA22058; Tue, 1 Jul 2003 20:14:06 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19XVGC-0002wK-00; Tue, 01 Jul 2003 20:14:08 -0400
Received: from ietf.org ([132.151.1.19] helo=optimus.ietf.org) by ietf-mx with esmtp (Exim 4.12) id 19XVGB-0002wH-00; Tue, 01 Jul 2003 20:14:07 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19XVG5-0006q3-BE; Tue, 01 Jul 2003 20:14:01 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19XVFm-0006pe-2O for asrg@optimus.ietf.org; Tue, 01 Jul 2003 20:13:42 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA22049 for <asrg@ietf.org>; Tue, 1 Jul 2003 20:13:38 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19XVFk-0002vu-00 for asrg@ietf.org; Tue, 01 Jul 2003 20:13:40 -0400
Received: from 000-257-992.area7.spcsdns.net ([68.27.247.183] helo=68.27.247.183 ident=trilluser) by ietf-mx with smtp (Exim 4.12) id 19XVFh-0002vo-00 for asrg@ietf.org; Tue, 01 Jul 2003 20:13:38 -0400
Message-Id: <5.2.0.9.2.20030701201304.00bd2df8@solidmatrix.com>
X-Sender: research@solidmatrix.com
X-Mailer: QUALCOMM Windows Eudora Version 5.2.0.9
To: Markus Stumpf <maex-lists-spam-ietf-asrg@Space.Net>, Danny Angus <danny@apache.org>
From: Yakov Shafranovich <research@solidmatrix.com>
Subject: Re: [Asrg] Consent Proposal
Cc: asrg@ietf.org
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-MimeHeaders-Plugin-Info: v2.03.00
X-GCMulti: 1
Sender: asrg-admin@ietf.org
Errors-To: asrg-admin@ietf.org
X-BeenThere: asrg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=unsubscribe>
List-Id: Anti-Spam Research Group - IRTF <asrg.ietf.org>
List-Post: <mailto:asrg@ietf.org>
List-Help: <mailto:asrg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/asrg/>
Date: Tue, 01 Jul 2003 20:13:05 -0400

At 01:57 AM 7/2/2003 +0200, Markus Stumpf wrote:

>On Tue, Jul 01, 2003 at 10:54:46PM +0100, Danny Angus wrote:
> > We can look outside the domain of mail to find workable examples of trust,
> > PGP and SSL both make provision for the inclusion of out-of-channel trust
> > verification. I suppose in this situation it is whom you choose to inherit
> > trust from, and ultimately your trusted root trust providers.
>[..]
>
>There is no such thing as established working "trust" mechanisms in the
>Internet of today (IMHO!!) They all fail miserably as early as because of
>non existant working revocation spreading mechanisms. If I get a CERT
>from Verisign for 2 years and they revoke it after one year, who do you
>think will notice that? With their security breach some months ago
>antivirus producers added the falsly issued certs to their antigenes
>so that the end user has at least a very little chance to notice abuse.

What about a central CA issuing certificates to other CAs, controlled by 
IANA or ICANN-type of organization? There are mechanisms in place to check 
verifications of certificates in real-time, and that can be implemented as 
well.

Yakov



_______________________________________________
Asrg mailing list
Asrg@ietf.org
https://www1.ietf.org/mailman/listinfo/asrg