Re: [perpass] Web-of-trust CAs

Phillip Hallam-Baker <hallam@gmail.com> Mon, 21 October 2013 19:20 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1DA211E8237 for <perpass@ietfa.amsl.com>; Mon, 21 Oct 2013 12:20:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.517
X-Spam-Level:
X-Spam-Status: No, score=-2.517 tagged_above=-999 required=5 tests=[AWL=0.082, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UmzNpASkm67P for <perpass@ietfa.amsl.com>; Mon, 21 Oct 2013 12:20:37 -0700 (PDT)
Received: from mail-la0-x231.google.com (mail-la0-x231.google.com [IPv6:2a00:1450:4010:c03::231]) by ietfa.amsl.com (Postfix) with ESMTP id D086C11E8262 for <perpass@ietf.org>; Mon, 21 Oct 2013 12:20:35 -0700 (PDT)
Received: by mail-la0-f49.google.com with SMTP id eh20so925661lab.8 for <perpass@ietf.org>; Mon, 21 Oct 2013 12:20:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=kLngrKlWE4XDp6CJZhSUU8TjPw/Mc7B22s7vwvJF614=; b=T47xZ17d/xAZJhANUpi/8+dKVAz5UFhts/gkQlDYKvVH7kQkcDXjgTcQGcp2ymmUjv VS3mMftu7PVeVs15yVcIOpx8D3m0iSOASzxLpt3CGudw0AKwtUDSTn99uM6/4B0yswUY 0EVL5iC7NeHYeKR2kK1eSBps+lLDbPLHmY18C8u3u71dfZZqlLxqvQ8aGpwXhv2mSc0/ CwRYOmRK0EVv7aXfmnqVuaDniRzVcnnWJj1+2NO8YscGfXv+dx4lTda4tH0bacL3iM4f UyLu6xpBiZp2/SMU6+Eh1QNmhYYxU+DR+1z1/d1Fq+6OXwEtnV/DcUQqtMP31xaliQlY a1WQ==
MIME-Version: 1.0
X-Received: by 10.112.29.147 with SMTP id k19mr14437962lbh.9.1382383234565; Mon, 21 Oct 2013 12:20:34 -0700 (PDT)
Received: by 10.112.148.165 with HTTP; Mon, 21 Oct 2013 12:20:34 -0700 (PDT)
In-Reply-To: <CAB5WduAHhQg2a5Lc4CTTe0pxYt7V3n0XsRqtuY3Acg117AatMg@mail.gmail.com>
References: <CAB5WduAHhQg2a5Lc4CTTe0pxYt7V3n0XsRqtuY3Acg117AatMg@mail.gmail.com>
Date: Mon, 21 Oct 2013 15:20:34 -0400
Message-ID: <CAMm+Lwi9SBRpz0kdojiwpzkruSMi3PNZ98wMp_yL4uCT+pZdKw@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: DataPacRat <datapacrat@gmail.com>
Content-Type: multipart/alternative; boundary="001a1133aa86a3ca9d04e9452de3"
Cc: perpass <perpass@ietf.org>
Subject: Re: [perpass] Web-of-trust CAs
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Oct 2013 19:20:38 -0000

On Mon, Oct 21, 2013 at 2:58 PM, DataPacRat <datapacrat@gmail.com> wrote:

> I've just posted a new version of a draft for an extension to the
> current vCard format, "Signed vCards" [1]. The general idea is to use
> existing encryption techniques to turn an existing format for
> "identity description" into one for "identity authentication",
> including non-email-based identifiers, change of identifiers over
> time, publication and revocation of keys, and so forth.
>
> The reason I'm putting all of this together is that, after finding out
> just how brittle the current Certificate Authority system is, I wanted
> to have a replacement that was much mushier and resistant to root-CA
> hijacking, possibly based on some form of web-of-trust. I'm currently
> trying to teach myself enough about webfist [2] to see if it can be
> adapted for the purpose, likely by replacing its current DKIM-based
> authentication system. My thought is that if that can be made to work,
> then it may be feasible to try combining Signed vCards with CA-style
> certificates.
>
> There's also the possibility that I'm completely deluded about the
> whole approach. I'm not an expert in the field; I'm just trying to
> find a solution that's within my meager skills. So I'm hoping to evoke
> as much feedback and constructive criticism as I can. Since swapping
> out hierarchical CAs for a system more resistant to a subpoena attack
> would seem to help reduce pervasive monitoring, this list seems a
> worthwhile place to discuss it.
>

I think you need to work out how to evaluate how trust in the Web of Trust
is evaluated:

http://tools.ietf.org/html/draft-hallambaker-prismproof-trust-00

You can accuse the CA system of being 'brittle' but so is Web of Trust once
you get past the keys that you signed directly yourself.


Putting the key in a vcard only addresses one part of the problem, you need
to know whether you have the right vcard. An attacker that can knock over a
CA will have no trouble knocking over a simple vcard scheme either.

To replace that system you have to show that what you propose as a
replacement is actually stronger and that it is not susceptible to
sovereign control by a single government (at minimum, some of us are not
going to be any more happy with a group of governments acting in concert
unless you can assure us that they will not collude).


Where vcard is supported, it makes a fine mechanism for converting a key
identifier to a key. It is a less good mechanism for establishing trust in
a key which is what most of us see as the hard part.

-- 
Website: http://hallambaker.com/