Re: dissemination of public encryption certificates
jpierre@netscape.com (Julien Pierre) Sat, 16 August 2003 01:01 UTC
Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA19597 for <smime-archive@lists.ietf.org>; Fri, 15 Aug 2003 21:01:47 -0400 (EDT)
Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7G0aIqt029057 for <ietf-smime-bks@above.proper.com>; Fri, 15 Aug 2003 17:36:18 -0700 (PDT) (envelope-from owner-ietf-smime@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.9/8.12.9/Submit) id h7G0aI7q029056 for ietf-smime-bks; Fri, 15 Aug 2003 17:36:18 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-smime@mail.imc.org using -f
Received: from netscape.com (c3po.aoltw.net [64.236.137.25]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7G0aHqt029049 for <ietf-smime@imc.org>; Fri, 15 Aug 2003 17:36:17 -0700 (PDT) (envelope-from jpierre@netscape.com)
Received: from judge.mcom.com (judge.nscp.aoltw.net [10.169.8.47]) by netscape.com (8.10.0/8.10.0) with ESMTP id h7G0aED16471 for <ietf-smime@imc.org>; Fri, 15 Aug 2003 17:36:14 -0700 (PDT)
Received: from kitty.nscp.aoltw.net ([10.169.25.23]) by judge.mcom.com (Netscape Messaging Server 4.15) with ESMTP id HJOSBT00.21N; Fri, 15 Aug 2003 17:35:53 -0700
Date: Fri, 15 Aug 2003 17:37:10 -0700
From: jpierre@netscape.com
Subject: Re: dissemination of public encryption certificates
To: Anders Rundgren <anders.rundgren@telia.com>
cc: ietf-smime@imc.org
In-Reply-To: <00ec01c362fb$ebeff1f0$0500a8c0@arport>
Message-ID: <3F3D7CB6.9020407@netscape.com>
References: <3F3AF421.6060008@netscape.com> <2A1D4C86842EE14CA9BC80474919782E01112FFC@mou1wnexm02.verisign.com> <001301c360ef$41128990$0500a8c0@arport> <EXECMAIL.20030814103028.E@kepler.messagingdirect.com> <00ec01c362fb$ebeff1f0$0500a8c0@arport>
X-Mailer: AOL Communicator (20030811Trnk.1 Win)
Organization: Netscape
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="sha1"; boundary="------------ms010704000904080802040505"
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>
Anders, Anders Rundgren wrote on 08/15/2003, 0:06: > May I add some naive thought to the table? > > That the issuer is of great importance for signatures and authentication > purposes is undoubtedly true. > > But I cannot really say that I see the same need for TPP-issued > encryption > certificates. Is there even a need for encryption-certificates? It > seems sufficient > that users in their e-mail client create key-pairs and publish the public > key in the associated domain. If you trust the lookup service like XKMS > why should this not be enough? Certificates establish a permanent, traceable link between the user's identity and the public key. If I correctly understand what you propose, the XKMS service would provide a temporary link between the user's identity and the the public key. One reason this link isn't enough is revocation. If the key gets compromised at some point, how do you indicate at a later time not to trust that key anymore ? And how do you do it retroactively ? Correct me if I'm wrong, but most revocation systems today are based on CRLs rather than KRLs. The government was the only user of KRLs but even they are using CRLs now. Most software as a result primarily supports certificate-based revocation, not key-based revocation. > Well you could actually create a > self-signed > certificate in your mail client and send a signed message (using > a trusted signer cert/key) containg the generated encryption key or > cert to > encryptionregistry@yourdomain to get it automatically published. > No apparent need for CAs and associated root and path validation > for encryption certificates. It should be a policy of the repository however to decide whether or not to apply path validations for certificates it stores. Certainly one could decide not to do any validation if they so chose. However eventually, when an end user does a query, they most likely won't trust that self-signed certificate due to their trust domain configuration. So it would not be in the interest of the repository to have too lax of a policy on cert issuers. > XKMS introduces an optional trust-anchor itself but that would not > work (scale)with encryption certificates for a global Internet. So no > matter what you do, there will be lose ends on all lookup solutions. > Only the hard transfer-the-globally-recognized-TTP-certificate-out- > band will be "fully secure" and we already know that this does not > support the more dynamic scenarious we are currently discussing. It can work if there is a set of well-known accepted trusted roots. I don't think every single random root should be automatically trusted. What's missing is a way to easily replicate the trust domain - ie. let the repositories dynamically add roots once a new CA goes in business and gains acceptance. > For enterprise usage I doubt that end-to-end encryption is of much value > as lost keys create too much hassles. Most business systems are likely > to rather use HTTPS which is easier to handle than S/MIME encryption. HTTPS and S/MIME have different uses and benefits. If you sign a contract over HTTPS there is no persistent proof, whereas there is with S/MIME. The problem of lost encryption keys for enterprises is already solved with key escrow. All the necessary mechanisms are already in place today. Most businesses want to be able to access their employees' communications anyway, so there is another reason that they use key escrow for encryption keys. Signing keys are of course a different matter and should not be escrowed. -- I am the dog in dogfood
- dissemination of public encryption certificates Julien Pierre
- RE: dissemination of public encryption certificat… Blake Ramsdell
- RE: dissemination of public encryption certificat… Alberti Antoine
- Re: dissemination of public encryption certificat… Alberto Cozer
- RE: dissemination of public encryption certificat… Hallam-Baker, Phillip
- Re: dissemination of public encryption certificat… Simon Josefsson
- Re: dissemination of public encryption certificat… Anders Rundgren
- RE: dissemination of public encryption certificat… Julien Pierre
- RE: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Steve Hole
- RE: dissemination of public encryption certificat… Hallam-Baker, Phillip
- Re: dissemination of public encryption certificat… Michael Helm
- RE: dissemination of public encryption certificat… Hallam-Baker, Phillip
- RE: dissemination of public encryption certificat… Blake Ramsdell
- RE: dissemination of public encryption certificat… Julien Pierre
- RE: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Julien Pierre
- RE: dissemination of public encryption certificat… Paul Hoffman / IMC
- Re: dissemination of public encryption certificat… Anders Rundgren
- Re (subtopic): LDAP certificate distribution Steve Hole
- Re (subtopic): certificate issuance and trust Steve Hole
- Re: dissemination of public encryption certificat… Julien Pierre
- Re: Re (subtopic): certificate issuance and trust Julien Pierre
- Re: Re (subtopic): LDAP certificate distribution Vadim Fedukovich
- Re: Re (subtopic): certificate issuance and trust Steve Hole
- Re: Re (subtopic): certificate issuance and trust Julien Pierre
- Re (subtopic): Four corner model Anders Rundgren
- Re: dissemination of public encryption certificat… Peter Gutmann