Re (subtopic): LDAP certificate distribution
Steve Hole <steve.hole@messagingdirect.com> Fri, 15 August 2003 16:55 UTC
Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA03491 for <smime-archive@lists.ietf.org>; Fri, 15 Aug 2003 12:55:11 -0400 (EDT)
Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7FGQPqt008819 for <ietf-smime-bks@above.proper.com>; Fri, 15 Aug 2003 09:26:25 -0700 (PDT) (envelope-from owner-ietf-smime@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.9/8.12.9/Submit) id h7FGQPxW008818 for ietf-smime-bks; Fri, 15 Aug 2003 09:26:25 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-smime@mail.imc.org using -f
Received: from rembrandt.esys.ca (rembrandt.esys.ca [198.161.92.131]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7FGQOqt008813 for <ietf-smime@imc.org>; Fri, 15 Aug 2003 09:26:24 -0700 (PDT) (envelope-from steve.hole@messagingdirect.com)
Received: from kepler.esys.ca (kepler.esys.ca [198.161.92.108]) (authenticated) by rembrandt.esys.ca (8.11.6/8.11.0.Beta0) with ESMTP id h7FGUBV09721; Fri, 15 Aug 2003 10:30:11 -0600
From: Steve Hole <steve.hole@messagingdirect.com>
Date: Fri, 15 Aug 2003 10:30:11 -0700
To: Julien Pierre <jpierre@netscape.com>
Subject: Re (subtopic): LDAP certificate distribution
Cc: ietf-smime@imc.org
In-Reply-To: <3F3C4C43.6010205@netscape.com>
References: <3F3C4C43.6010205@netscape.com> <3F3AF421.6060008@netscape.com> <2A1D4C86842EE14CA9BC80474919782E01112FFC@mou1wnexm02.verisign.com> <001301c360ef$41128990$0500a8c0@arport> <EXECMAIL.20030814103028.E@kepler.messagingdirect.com>
Message-ID: <EXECMAIL.20030815103011.B1437@kepler.esys.ca>
X-Mailer: Execmail for Linux 6.0.0 alpha Build (1)
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id h7FGQOqt008814
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>
Content-Transfer-Encoding: 8bit
On Thu, 14 Aug 2003 19:58:11 -0700 Julien Pierre <jpierre@netscape.com> wrote: > Why ? Because you have to run a root. That is, the hierarchy has to have a top level interconnect. This quickly becomes an issue of governance. National goverments get involved the way they got involved in DNS. The difference is that the governments got involved *before* the service was running, not after the way they did with DNS. There is a long track record of attempts at establishing global X.500 whitepages services. There were several attempts that I participated in that just didn't gain traction. I think in retrospect it was primarily a cost issue again. The *business* people and organizations who had interest in participating couldn't stomach a "build it an they will come" approach when there were real costs and somewhat amorphous benefits. People just don't get why you need it and the formal delegation and governance rules made it non-trivial to set up. Note that I said "Whitepages". Regrettably, PKI information at the global level was always linked to other personal information that would aid in the search and retrieval of useful information on people. This was a goal that I happily promoted and thought "was a great idea". Wrong. What I (and many others) never thought about was the privacy concerns. Sure the system is secure and access controlled etc etc. But, the governance issues around actually making this information available on the Internet was really huge. By the time some of this was figured out, the perception had become that none of it was truly deployable. Very few commercial organizations (government doesn't count) wanted that information available and didn't believe that secure interpersonal email (the one obvious use application) needed that level of support. There were some not insubstantial technical hurdles with root management and scaling as well. Problems that probably could have been (and were for the most part) solved, but took long enough to solve that people just didn't believe. Basically, there was enough disinterest that the whole thing just stagnated. Finally, the one thing that could have driven the service -- storage of keys -- was itself a substantial cost item because of the cost of certification. While certification costs have dropped, in the beginning they were excruciating and only the richest could play. Therefore, there never was a groundswell of use that demanded that the "situation be improved". You need a Web like uptake to get the necessary infrastructure allocated and serviced. In short there was always a substantial cost. My experience with the Internet is that the only things that successfully deploy to Internet scale are things that start with the groundswell of the common user. It has to be easy and it has to be (near) free. > > There is only one choice -- DNS. I (and Steve Kille and others) have > > been flogging LDAP directories and working on LDAP/X.500 interconnects > > for > > a decade. Global X.500/LDAP isn't going to happen in our lifetime. > > Can you summarize why ? Pretty much did above :-) For what it's worth, I am NOT saying "LDAP is useless". What I'm saying is that you need to leverage the one and only global directory service the Internet is ever likely to successfully deploy to get to your LDAP (or XKMS) services. Then we avoid the governance, root and cost issues associated with global directory whitepages. > > Precisely. They must be able to do a DNS lookup for the information > > either as a direct data return or a reference to a secondary storage > > service, which absolutely could and probably should be LDAP. To > > work in practice I think that it should be possible to get a direct pull > > from the DNS so that organizations are not required to deploy an LDAP > > directory and all that goes along with it (much as that pains me). > > I think other people have pointed out that DNS itself is not suited as > the repository for the certificates. > Since the query starts with only the e-mail address, which contains a > userid and domain, I think it is appropriate to start the lookup in the > DNS. There should be a standard schema to get to the appropriate LDAP > server from the user's e-mail domain. The certificate would then be > looked up from it. The client application could also fall back to a > "default" LDAP server if the DNS query fails to find the appropriate > directory. Works for me. More LDAP servers sold then :-) > > The worst that can happen is that don't find the cert your looking for. > > Trust issues MUST be dealt with, but certificate trust chains and > > approaches are both well understood. > > > > The best that can happen is that suddenly I can go and find a cert for > > joe@foobar.com with a simple DNS query. BEAUTIFUL! Why wouldn't I want > > to do that? > > Sounds good, but we have to make sure this is deployable for a lot of > people. I don't really see how it would be. > > If LDAP is used to store the certs, perhaps all a domain owner might > have to do would be do add an entry in the DNS, either with a new record > type, or even simpler for quicker deployment, a standard name, eg > pki-public-ldap . This entry could be pointed to some free public > directory if the ISP doesn't want to run it itself. I think we are in agreement. That was easy :-) As noted in other messages the practical hurdles for deployment center on management (key issuer) and client (user). Unless something is specified there is no hope of even getting to those hurdles though. Cheers. --- Steve Hole Chief Technology Officer - Billing and Payment Systems ACI Worldwide <mailto:holes@ACIWorldwide.com> Phone: 780-424-4922
- dissemination of public encryption certificates Julien Pierre
- RE: dissemination of public encryption certificat… Blake Ramsdell
- RE: dissemination of public encryption certificat… Alberti Antoine
- Re: dissemination of public encryption certificat… Alberto Cozer
- RE: dissemination of public encryption certificat… Hallam-Baker, Phillip
- Re: dissemination of public encryption certificat… Simon Josefsson
- Re: dissemination of public encryption certificat… Anders Rundgren
- RE: dissemination of public encryption certificat… Julien Pierre
- RE: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Steve Hole
- RE: dissemination of public encryption certificat… Hallam-Baker, Phillip
- Re: dissemination of public encryption certificat… Michael Helm
- RE: dissemination of public encryption certificat… Hallam-Baker, Phillip
- RE: dissemination of public encryption certificat… Blake Ramsdell
- RE: dissemination of public encryption certificat… Julien Pierre
- RE: dissemination of public encryption certificat… Julien Pierre
- Re: dissemination of public encryption certificat… Julien Pierre
- RE: dissemination of public encryption certificat… Paul Hoffman / IMC
- Re: dissemination of public encryption certificat… Anders Rundgren
- Re (subtopic): LDAP certificate distribution Steve Hole
- Re (subtopic): certificate issuance and trust Steve Hole
- Re: dissemination of public encryption certificat… Julien Pierre
- Re: Re (subtopic): certificate issuance and trust Julien Pierre
- Re: Re (subtopic): LDAP certificate distribution Vadim Fedukovich
- Re: Re (subtopic): certificate issuance and trust Steve Hole
- Re: Re (subtopic): certificate issuance and trust Julien Pierre
- Re (subtopic): Four corner model Anders Rundgren
- Re: dissemination of public encryption certificat… Peter Gutmann