Re: [perpass] The problem with scaling authentication...

Stephen Kent <kent@bbn.com> Mon, 25 November 2013 20:14 UTC

Return-Path: <kent@bbn.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C4E91AE03A for <perpass@ietfa.amsl.com>; Mon, 25 Nov 2013 12:14:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7_ZZzGcyniG6 for <perpass@ietfa.amsl.com>; Mon, 25 Nov 2013 12:14:32 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 450431AE03C for <perpass@ietf.org>; Mon, 25 Nov 2013 12:14:31 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:48867 helo=comsec.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1Vl2YA-000B7Y-PL for perpass@ietf.org; Mon, 25 Nov 2013 15:14:30 -0500
Message-ID: <5293AFA5.3070804@bbn.com>
Date: Mon, 25 Nov 2013 15:14:29 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: perpass@ietf.org
References: <CAL02cgSsznNFOjtAfMwWDBOW34LT_md3N+rUpGhDvXKM+dpP2w@mail.gmail.com> <6.2.5.6.2.20131125092440.0d240ae0@resistor.net>
In-Reply-To: <6.2.5.6.2.20131125092440.0d240ae0@resistor.net>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [perpass] The problem with scaling authentication...
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Nov 2013 20:14:33 -0000

>> Just wanted to observe that authentication woes are not unique to the 
>> Internet and its collection of CAs. Authenticating things on a global 
>> basis is hard.
>
> There is a significant number of examples of bad decisions. I'd say 
> that proof of possession was not used as much in the non-Internet world.
>
> Regards,
> -sm
I'm puzzled by your last comment. In the PKI context, the phrase "proof 
of possession"
(PoP) refers to a mechanism used to verify that a subject requesting a 
cert possesses the
private key corresponding to the public key in the cert request.

When an entity receives a cert containing Subject name (or Subject alt name)
that is not appropriately associated with the entity, that is NOT a failure
of PoP. The entity presumably does possess the corresponding private key,
since it can't complete a TLS exchange without it.

Steve