Re: [KEYPROV] PROTO WRITEUPfor draft-ietf-keyprov-symmetrickeyformat-07

"Philip Hoyer" <phoyer@actividentity.com> Wed, 03 March 2010 16:27 UTC

Return-Path: <phoyer@actividentity.com>
X-Original-To: keyprov@core3.amsl.com
Delivered-To: keyprov@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 94D6928C136 for <keyprov@core3.amsl.com>; Wed, 3 Mar 2010 08:27:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level:
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lLcue+ZS+xnG for <keyprov@core3.amsl.com>; Wed, 3 Mar 2010 08:27:03 -0800 (PST)
Received: from frhub1.activcard.fr (frhub1.activcard.fr [92.103.229.143]) by core3.amsl.com (Postfix) with ESMTP id AB28A28C10A for <keyprov@ietf.org>; Wed, 3 Mar 2010 08:27:02 -0800 (PST)
Received: from sur-corp-ex-02.corp.ad.activcard.com (sur-corp-ex-02.corp.ad.activcard.com [192.168.33.40]) by frhub1.activcard.fr (Postfix) with ESMTP id DEF511838FD; Wed, 3 Mar 2010 17:27:03 +0100 (CET)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CABAEE.A988F113"
Date: Wed, 03 Mar 2010 17:29:14 +0100
Message-ID: <5BFE9E473DBFC24CA87F18F29B3F0AC406890589@sur-corp-ex-02.corp.ad.activcard.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [KEYPROV] PROTO WRITEUPfor draft-ietf-keyprov-symmetrickeyformat-07
Thread-Index: Acq67Gblst1yjmDlTUia849Y7t+xHgAAkKnm
From: Philip Hoyer <phoyer@actividentity.com>
To: anders.rundgren@telia.com
Cc: keyprov@ietf.org
Subject: Re: [KEYPROV] PROTO WRITEUPfor draft-ietf-keyprov-symmetrickeyformat-07
X-BeenThere: keyprov@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Provisioning of Symmetric Keys \(keyprov\)" <keyprov.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyprov>
List-Post: <mailto:keyprov@ietf.org>
List-Help: <mailto:keyprov-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Mar 2010 16:27:04 -0000

And how is that redundant to an openly discussed peer reviewed agreed IETF standard that RSA has also contributed to?


----- Original Message -----
From: Anders Rundgren <anders.rundgren@telia.com>
To: Philip Hoyer
Cc: turners@ieca.com <turners@ieca.com>; keyprov@ietf.org <keyprov@ietf.org>
Sent: Wed Mar 03 17:10:46 2010
Subject: Re: [KEYPROV] PROTO WRITEUPfor	draft-ietf-keyprov-symmetrickeyformat-07

Philip Hoyer wrote:
> Redundant to what exactly?

I believe I elaborated that in my initial posting.

RSA have had seeds distributed in XML format for ages and they work
on multiple platforms including mobile phones.


Anders

> 
> 
> ----- Original Message -----
> From: keyprov-bounces@ietf.org <keyprov-bounces@ietf.org>
> To: Sean Turner <turners@ieca.com>
> Cc: keyprov@ietf.org <keyprov@ietf.org>
> Sent: Wed Mar 03 15:54:36 2010
> Subject: Re: [KEYPROV] PROTO WRITEUPfor 
> draft-ietf-keyprov-symmetrickeyformat-07
> 
> Sean Turner wrote:
>  > Anders,
>  >
>  > PSKC is the mandatory to implement key package and nobody, that I am
>  > aware of, is trying to change that.  The container defined in
>  > draft-ietf-keyprov-symmetrickeyformat-07 is optional to implement.
> 
> I just said that it felt like a redundant solution.
> 
> /anders
> 
> 
>  >
>  > spt
>  >
>  > Anders Rundgren wrote:
>  >> The document is great from a technical point of view.
>  >>
>  >> The utility is questionable since PSKC does the same
>  >> thing and also interopes with DSKPP.  The rationale
>  >> (which has been mentioned but not been put on paper)
>  >> "cards cannot process XML" is true but provisioning
>  >> generally relies on middleware doing the unpacking
>  >> and then through some API inserting keys and attributes
>  >> in the card.
>  >>
>  >> Creating tokens that would decipher CMS is technically
>  >> doable but there is absolutely no point with that
>  >>
>  >> In case you want to know how you can deal with XML,
>  >> secure transfer of secrets, and still keep the token
>  >> device unaware of sophisticated data structures and
>  >> public key verification you may take a peek in the
>  >> following document:
>  >>
>  >> "setPiggybackedSymmetricKey"
>  >>
>  >> http://webpki.org/papers/keygen2/sks-api-arch.pdf
>  >>
>  >> Anders
>  >> _______________________________________________
>  >> KEYPROV mailing list
>  >> KEYPROV@ietf.org
>  >> https://www.ietf.org/mailman/listinfo/keyprov
>  >>
>  >
> 
> _______________________________________________
> KEYPROV mailing list
> KEYPROV@ietf.org
> https://www.ietf.org/mailman/listinfo/keyprov
>