[KEYPROV] Correction Re: PROTOWRITEUPfor draft-ietf-keyprov-symmetrickeyformat-07

Anders Rundgren <anders.rundgren@telia.com> Thu, 04 March 2010 10:47 UTC

Return-Path: <anders.rundgren@telia.com>
X-Original-To: keyprov@core3.amsl.com
Delivered-To: keyprov@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 76A1E28C0E1 for <keyprov@core3.amsl.com>; Thu, 4 Mar 2010 02:47:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level:
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, HELO_EQ_SE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DvtLKfNPNIF8 for <keyprov@core3.amsl.com>; Thu, 4 Mar 2010 02:47:23 -0800 (PST)
Received: from mail.primekey.se (walter.primekey.se [195.149.137.135]) by core3.amsl.com (Postfix) with ESMTP id C7E703A8888 for <keyprov@ietf.org>; Thu, 4 Mar 2010 02:47:22 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by mail.primekey.se (Postfix) with ESMTP id 8DEA0C3E49; Thu, 4 Mar 2010 11:47:21 +0100 (CET)
Message-ID: <4B8F8FB9.4030207@telia.com>
Date: Thu, 04 Mar 2010 11:47:21 +0100
From: Anders Rundgren <anders.rundgren@telia.com>
User-Agent: Thunderbird 2.0.0.23 (X11/20090817)
MIME-Version: 1.0
To: "Bajaj, Siddharth" <SBajaj@verisign.com>
References: <5BFE9E473DBFC24CA87F18F29B3F0AC406890589@sur-corp-ex-02.corp.ad.activcard.com> <4B8E91C6.4040507@telia.com> <F4E86EE3B25D5B4686A74658EB3593E13A46D8@mou1wnexmb03.vcorp.ad.vrsn.com> <4B8EB3E0.3070706@telia.com>
In-Reply-To: <4B8EB3E0.3070706@telia.com>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: keyprov@ietf.org
Subject: [KEYPROV] Correction Re: PROTOWRITEUPfor draft-ietf-keyprov-symmetrickeyformat-07
X-BeenThere: keyprov@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Provisioning of Symmetric Keys \(keyprov\)" <keyprov.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyprov>
List-Post: <mailto:keyprov@ietf.org>
List-Help: <mailto:keyprov-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Mar 2010 10:47:24 -0000

Just to get it straight:

I think the chairs (Hannes and Phil) and the people who wrote the KEYPROV
I-Ds have done an *excellent* job!

What I'm "dissing" is the fact that most of the vendors have developed a
browser-interface for the provisioning but they haven't made the details
of that public. This is surely not the way you create ubiquitous standards
but that was maybe not on the menu?

Going back to OATH, it seems that the HOTP algorithm is the only thing that
deserves being called "standard" since handheld HOTP devices should actually
be interchangable.

Standardizing card interfaces and middleware for OTP is undoable since the
actual application "Programmatic OTP" is quite marginal, in fact, I have to
date in not seen a single installation using such a scheme.

Taking a 128-160 bit key and mutilating it to 30-40 bits when running in
a computer-to-computer authentication scenario may be a way to preserve
investments in validation software but as a foundation for the future it
seems like a fairly silly solution when a standard (in all respects)
HTTP Digest Authentication does the same job (and is already in every browser)
but without adding truncation which cause difficult to handle OTP sync issues
and introduces susceptibility to DoS attacks.

http://www.ietf.org/mail-archive/web/keyprov/current/msg00514.html

But I think PKI and Information Cards is really the only way to go, OTP
should be confined to handhelds where it is doing a very nice job.

Anders

Anders Rundgren wrote:
> Siddharth,
> 
> You are right, a number of vendors have invested in what I consider
> dubious product concepts like "connected OTP".
> 
> I don't see why anyone would have to wait on the standard since the
> required middleware is 100% non-standard.
> 
> I.e. there is no client-side interoperability whatsoever between for 
> example
> VeriSign and RSA.  It was actually never a goal, as far as I remember.
> 
> Sorry for being negative but from my horizon KEYPROV became a very marginal
> scheme which is the reason I'm pursuing entirely different paths which
> may indeed one day reach OATH's to date not realized vision.
> 
> Anders
> 
> Bajaj, Siddharth wrote:
>>  
>> Hi Anders,
>>  
>> I'll beg to differ you with you - several OATH members including 
>> VeriSign have implemented drafts of the online provisioning protocol 
>> in their products today.
>>  
>> Others are waiting for this standard to be finalized so that they can 
>> implement the final versions.
>> Thanks,
>>  
>> Siddharth
>>
>> ------------------------------------------------------------------------
>> *From:* keyprov-bounces@ietf.org on behalf of Anders Rundgren
>> *Sent:* Wed 3/3/2010 8:43 AM
>> *To:* Philip Hoyer
>> *Cc:* keyprov@ietf.org
>> *Subject:* Re: [KEYPROV] PROTOWRITEUPfor 
>> draft-ietf-keyprov-symmetrickeyformat-07
>>
>> Philip Hoyer wrote:
>>  > And how is that redundant to an openly discussed peer reviewed agreed
>>  > IETF standard that RSA has also contributed to?
>>
>> There has indeed been open discussions regarding the *content* of
>> draft.  However, there has not been much open discussions regarding
>> *utility* and *deployment*, something which I feel has hampered the
>> entire KEYPROV effort.
>>
>> Why would anybody in their right mind use on-line provisioning with
>> DSKPP for discrete OTP tokens?  Isn't sort of half the value with OTP
>> *getting away* from middleware?
>>
>> RSA, VeriSign, Nicrosoft, IBM etc have contributed to many standards but
>> not all of them have been successful in the marketplace.
>>
>> Anders
>>
>>  >
>>  >
>>  > ----- Original Message -----
>>  > From: Anders Rundgren <anders.rundgren@telia.com>
>>  > To: Philip Hoyer
>>  > Cc: turners@ieca.com <turners@ieca.com>; keyprov@ietf.org 
>> <keyprov@ietf.org>
>>  > Sent: Wed Mar 03 17:10:46 2010
>>  > Subject: Re: [KEYPROV] PROTO WRITEUPfor
>>  > draft-ietf-keyprov-symmetrickeyformat-07
>>  >
>>  > Philip Hoyer wrote:
>>  >  > Redundant to what exactly?
>>  >
>>  > I believe I elaborated that in my initial posting.
>>  >
>>  > RSA have had seeds distributed in XML format for ages and they work
>>  > on multiple platforms including mobile phones.
>>  >
>>  >
>>  > Anders
>>  >
>>  >  >
>>  >  >
>>  >  > ----- Original Message -----
>>  >  > From: keyprov-bounces@ietf.org <keyprov-bounces@ietf.org>
>>  >  > To: Sean Turner <turners@ieca.com>
>>  >  > Cc: keyprov@ietf.org <keyprov@ietf.org>
>>  >  > Sent: Wed Mar 03 15:54:36 2010
>>  >  > Subject: Re: [KEYPROV] PROTO WRITEUPfor
>>  >  > draft-ietf-keyprov-symmetrickeyformat-07
>>  >  >
>>  >  > Sean Turner wrote:
>>  >  >  > Anders,
>>  >  >  >
>>  >  >  > PSKC is the mandatory to implement key package and nobody, 
>> that I am
>>  >  >  > aware of, is trying to change that.  The container defined in
>>  >  >  > draft-ietf-keyprov-symmetrickeyformat-07 is optional to 
>> implement.
>>  >  >
>>  >  > I just said that it felt like a redundant solution.
>>  >  >
>>  >  > /anders
>>  >  >
>>  >  >
>>  >  >  >
>>  >  >  > spt
>>  >  >  >
>>  >  >  > Anders Rundgren wrote:
>>  >  >  >> The document is great from a technical point of view.
>>  >  >  >>
>>  >  >  >> The utility is questionable since PSKC does the same
>>  >  >  >> thing and also interopes with DSKPP.  The rationale
>>  >  >  >> (which has been mentioned but not been put on paper)
>>  >  >  >> "cards cannot process XML" is true but provisioning
>>  >  >  >> generally relies on middleware doing the unpacking
>>  >  >  >> and then through some API inserting keys and attributes
>>  >  >  >> in the card.
>>  >  >  >>
>>  >  >  >> Creating tokens that would decipher CMS is technically
>>  >  >  >> doable but there is absolutely no point with that
>>  >  >  >>
>>  >  >  >> In case you want to know how you can deal with XML,
>>  >  >  >> secure transfer of secrets, and still keep the token
>>  >  >  >> device unaware of sophisticated data structures and
>>  >  >  >> public key verification you may take a peek in the
>>  >  >  >> following document:
>>  >  >  >>
>>  >  >  >> "setPiggybackedSymmetricKey"
>>  >  >  >>
>>  >  >  >> http://webpki.org/papers/keygen2/sks-api-arch.pdf 
>> <https://connect.verisign.com/papers/keygen2/,DanaInfo=.awfdsonFvzp+sks-api-arch.pdf> 
>>
>>  >  >  >>
>>  >  >  >> Anders
>>  >  >  >> _______________________________________________
>>  >  >  >> KEYPROV mailing list
>>  >  >  >> KEYPROV@ietf.org
>>  >  >  >> https://www.ietf.org/mailman/listinfo/keyprov 
>> <https://connect.verisign.com/mailman/listinfo/,DanaInfo=.awxyCmjzmHx1r,SSL+keyprov> 
>>
>>  >  >  >>
>>  >  >  >
>>  >  >
>>  >  > _______________________________________________
>>  >  > KEYPROV mailing list
>>  >  > KEYPROV@ietf.org
>>  >  > https://www.ietf.org/mailman/listinfo/keyprov 
>> <https://connect.verisign.com/mailman/listinfo/,DanaInfo=.awxyCmjzmHx1r,SSL+keyprov> 
>>
>>  >  >
>>  >
>>
>> _______________________________________________
>> KEYPROV mailing list
>> KEYPROV@ietf.org
>> https://www.ietf.org/mailman/listinfo/keyprov 
>> <https://connect.verisign.com/mailman/listinfo/,DanaInfo=.awxyCmjzmHx1r,SSL+keyprov> 
>>
>>
> 
> _______________________________________________
> KEYPROV mailing list
> KEYPROV@ietf.org
> https://www.ietf.org/mailman/listinfo/keyprov
>