Re: dissemination of public encryption certificates

jpierre@netscape.com (Julien Pierre) Sat, 16 August 2003 01:01 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA19597 for <smime-archive@lists.ietf.org>; Fri, 15 Aug 2003 21:01:47 -0400 (EDT)
Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7G0aIqt029057 for <ietf-smime-bks@above.proper.com>; Fri, 15 Aug 2003 17:36:18 -0700 (PDT) (envelope-from owner-ietf-smime@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.9/8.12.9/Submit) id h7G0aI7q029056 for ietf-smime-bks; Fri, 15 Aug 2003 17:36:18 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-smime@mail.imc.org using -f
Received: from netscape.com (c3po.aoltw.net [64.236.137.25]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7G0aHqt029049 for <ietf-smime@imc.org>; Fri, 15 Aug 2003 17:36:17 -0700 (PDT) (envelope-from jpierre@netscape.com)
Received: from judge.mcom.com (judge.nscp.aoltw.net [10.169.8.47]) by netscape.com (8.10.0/8.10.0) with ESMTP id h7G0aED16471 for <ietf-smime@imc.org>; Fri, 15 Aug 2003 17:36:14 -0700 (PDT)
Received: from kitty.nscp.aoltw.net ([10.169.25.23]) by judge.mcom.com (Netscape Messaging Server 4.15) with ESMTP id HJOSBT00.21N; Fri, 15 Aug 2003 17:35:53 -0700
Date: Fri, 15 Aug 2003 17:37:10 -0700
From: jpierre@netscape.com
Subject: Re: dissemination of public encryption certificates
To: Anders Rundgren <anders.rundgren@telia.com>
cc: ietf-smime@imc.org
In-Reply-To: <00ec01c362fb$ebeff1f0$0500a8c0@arport>
Message-ID: <3F3D7CB6.9020407@netscape.com>
References: <3F3AF421.6060008@netscape.com> <2A1D4C86842EE14CA9BC80474919782E01112FFC@mou1wnexm02.verisign.com> <001301c360ef$41128990$0500a8c0@arport> <EXECMAIL.20030814103028.E@kepler.messagingdirect.com> <00ec01c362fb$ebeff1f0$0500a8c0@arport>
X-Mailer: AOL Communicator (20030811Trnk.1 Win)
Organization: Netscape
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="sha1"; boundary="------------ms010704000904080802040505"
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>

Anders,

Anders Rundgren wrote on 08/15/2003, 0:06:

 > May I add some naive thought to the table?
 >
 > That the issuer is of great importance for signatures and authentication
 > purposes is undoubtedly true.
 >
 > But I cannot really say that I see the same need for TPP-issued
 > encryption
 > certificates.  Is there even a need for encryption-certificates?  It
 > seems sufficient
 > that users in their e-mail client create key-pairs and publish the public
 > key in the associated domain.  If you trust the lookup service like XKMS
 > why should this not be enough?

Certificates establish a permanent, traceable link between the user's 
identity and the public key.

If I correctly understand what you propose, the XKMS service would 
provide a temporary link between the user's identity and the the public key.

One reason this link isn't enough is revocation. If the key gets 
compromised at some point, how do you indicate at a later time not to 
trust that key anymore ? And how do you do it retroactively ?

Correct me if I'm wrong, but most revocation systems today are based on 
CRLs rather than KRLs. The government was the only user of KRLs but even 
they are using CRLs now. Most software as a result primarily supports 
certificate-based revocation, not key-based revocation.

 > Well you could actually create a
 > self-signed
 > certificate in your mail client and send a signed message (using
 > a trusted signer cert/key) containg the generated encryption key or
 > cert to
 > encryptionregistry@yourdomain to get it automatically published.
 > No apparent need for CAs and associated root and path validation
 > for encryption certificates.

It should be a policy of the repository however to decide whether or not 
to apply path validations for certificates it stores. Certainly one 
could decide not to do any validation if they so chose.
However eventually, when an end user does a query, they most likely 
won't trust that self-signed certificate due to their trust domain 
configuration. So it would not be in the interest of the repository to 
have too lax of a policy on cert issuers.

 > XKMS introduces an optional trust-anchor itself but that would not
 > work (scale)with encryption certificates for a global Internet.  So no
 > matter what you do, there will be lose ends on all lookup solutions.
 > Only the hard transfer-the-globally-recognized-TTP-certificate-out-
 > band will be "fully secure" and we already know that this does not
 > support the more dynamic scenarious we are currently discussing.

It can work if there is a set of well-known accepted trusted roots. I 
don't think every single random root should be automatically trusted. 
What's missing is a way to easily replicate the trust domain - ie. let 
the repositories dynamically add roots once a new CA goes in business 
and gains acceptance.

 > For enterprise usage I doubt that end-to-end encryption is of much value
 > as lost keys create too much hassles.  Most business systems are likely
 > to rather use HTTPS which is easier to handle than S/MIME encryption.

HTTPS and S/MIME have different uses and benefits. If you sign a 
contract over HTTPS there is no persistent proof, whereas there is with 
S/MIME.

The problem of lost encryption keys for enterprises is already solved 
with key escrow. All the necessary mechanisms are already in place 
today. Most businesses want to be able to access their employees' 
communications anyway, so there is another reason that they use key 
escrow for encryption keys. Signing keys are of course a different 
matter and should not be escrowed.

-- 
I am the dog in dogfood