Re: PKI and S/MIME
Denis Pinkas <Denis.Pinkas@bull.net> Tue, 26 August 2003 16:37 UTC
Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13931 for <smime-archive@lists.ietf.org>; Tue, 26 Aug 2003 12:37:58 -0400 (EDT)
Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7QFrTgc063100 for <ietf-smime-bks@above.proper.com>; Tue, 26 Aug 2003 08:53:29 -0700 (PDT) (envelope-from owner-ietf-smime@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.9/8.12.9/Submit) id h7QFrT5T063099 for ietf-smime-bks; Tue, 26 Aug 2003 08:53:29 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-smime@mail.imc.org using -f
Received: from odin2.bull.net (odin2.bull.net [192.90.70.84]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7QFrSgc063094 for <ietf-smime@imc.org>; Tue, 26 Aug 2003 08:53:28 -0700 (PDT) (envelope-from Denis.Pinkas@bull.net)
Received: from clbull.frcl.bull.fr (IDENT:root@clbull.frcl.bull.fr [129.182.8.31]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id RAA22980; Tue, 26 Aug 2003 17:58:45 +0200
Received: from bull.net (frcls4013.frcl.bull.fr [129.182.108.120]) by clbull.frcl.bull.fr (8.9.3/8.9.3) with ESMTP id RAA10540; Tue, 26 Aug 2003 17:54:18 +0200
Message-ID: <3F4B8277.2080309@bull.net>
Date: Tue, 26 Aug 2003 17:53:27 +0200
From: Denis Pinkas <Denis.Pinkas@bull.net>
Organization: Bull SA.
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
X-Accept-Language: en-us, en, fr
MIME-Version: 1.0
To: "Hallam-Baker, Phillip" <pbaker@verisign.com>
CC: ietf-smime@imc.org
Subject: Re: PKI and S/MIME
References: <2A1D4C86842EE14CA9BC80474919782E01113011@mou1wnexm02.verisign.com>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>
Content-Transfer-Encoding: 7bit
Phill, > There are two ways the problem may be solved. > The simplest solution is that the domain owner appoints a single CA for the > entire zone and simply directs all XKMS requests to the XKMS server run by > the CA. > The second solution is that the domain owner runs a non-authoritative Locate > service locally. XKMS clients that register certificates with the CA of > their choice can then in turn register the certificate issued by the CA with > their local XKMS locate service. > In this second application the XKMS service may choose to impose some form > of validation constraint on the certs that it accepts. For example only > accepting certs from a limited number of CAs - or it may not. This specification does not provide this level of details. I have read the XKMS document (I would not call it " a specification" - see later) and provided 35 comments during the last call period. It would have been appropriate to provide these kinds of details but apparently the XKMS WG decided to be as general as possible, to provide *examples* instead of *specifications* and therefore the XKMS document is left open to many different interpretations. :-( This may be what some vendors are looking for: claiming *compatibility* with XKMS, while in reality each vendor will be non-interoperable with any other vendor and will have its own concept of trust (hidden and different from any other vendor). Denis > Incidentaly XKMS may also be used to register PGP keys or keys in > alternative PKIs. It is a key centric PKI, not a token centric one. > > > Storing end-user certs or keys in the DNS is a lousy idea for several > reasons. First the DNS is a machine configuration infrastructure and not a > user configuration infrastructure. Storing user information in the DNS > requires an administrative interface with a new constituency. Ain't going to > happen. Moreover the DNSSEC spec itself is still not in a deployable state, > or at least the IETF version of it is not. > > Storing certificates in LDAP is a lousy idea. LDAP is an internal enterprise > resource. Enterprises are not going to expose LDAP data in border > directories in significant numbers. It is not just the security issue, cost > plays a factor. LDAP is not a simple protocol, it is would be completely > overspecified for the job of a cert repository if the features LDAP provided > were relevant to the task. > > We considered certs in the DNS and LDAP before designing XKMS and rejected > them. Both technologies have been available for at least 6 years with > negligible uptake. We needed a new protocol because there was no acceptable > existing solution. Sometimes designing a new protocol from scratch is better > than attempting to use an inappropriate one. > > > Phill > > >>-----Original Message----- >>From: Anders Rundgren [mailto:anders.rundgren@telia.com] >>Sent: Wednesday, August 13, 2003 1:16 PM >>To: Blake Ramsdell; Simon Josefsson >>Cc: ietf-smime@imc.org; 'Sean P. Turner' >>Subject: Re: PKI and S/MIME >> >> >> >>Simon, >>I respect your work with DNS for location but is this really >>universal? How about my anders.rundgren@telia.com cert >>issued by VeriSign? Would it be appropriate to require ISPs >>like Telia to maintain a directory pointing to various TTP CAs? >> >>Or should ever domain-owner become a CA? >> >>Anders >> >>----- Original Message ----- >>From: "Simon Josefsson" <jas@extundo.com> >>To: "Blake Ramsdell" <blake@brutesquadlabs.com> >>Cc: <ietf-smime@imc.org>; "'Sean P. Turner'" <turners@ieca.com> >>Sent: Wednesday, August 13, 2003 09:32 >>Subject: Re: PKI and S/MIME >> >> >> >>"Blake Ramsdell" <blake@brutesquadlabs.com> writes: >> >> >>>There have been a number of messages recently about the use >> >>of PKI with >> >>>S/MIME, and the concerns about that. I like to think that we're all >>>pretty much in agreement that we've established a consistent, >>>interoperable practice for the actual syntax and contents of S/MIME >>>messages, as well as a reasonable cut of a certificate >> >>syntax profile >> >>>for end-entity certificates. >>> >>>Should there be a profile for certificate usage >> >>(certificate repository, >> >>>distribution and revocation checking) that is specific for >> >>our problem >> >>>domain? That is, select relevant other work and profile it >> >>for use in >> >>>the S/MIME interpersonal messaging domain? I would imagine >> >>that this >> >>>would be a new draft, start with a summary of the requirements, and >>>progress to profiles of relevant standards. >>> >>>It's also not clear if this is something to discuss in this working >>>group, or somewhere else. >>> >>>Comments? >> >>Since in practice, addressing this problem would help in getting >>"opportunistic S/MIME" to work, I believe it would be useful to >>address it. ("Opportunistic S/MIME" means to be able to encrypt >>messages to someone you don't have a prior trust relationship with, >>simply to provide encryption of data. There is a man in the middle >>attack, of course, but in practice the result often isn't worse than >>not using S/MIME.) >> >>A strawman at a requirement: >> >>* Be able to locate a certificate for a Internet user given only her >> email address. >> >>I should mention that this has been discussed several times before, in >>various fora, for similar applications (e.g., OpenPGP, IPSEC, SSH), so >>there is prior work to look at how to design this. To do even more >>self-promoting, I'd again like to mention the following draft: >> >>http://josefsson.org/draft-josefsson-pkix-dns.txt >> >>which do discuss it for S/MIME context as well. I don't have an >>opinion on if this WG is the proper place for it. >> >>Regards, >>Simon >> > >
- PKI and S/MIME Blake Ramsdell
- Re: PKI and S/MIME Simon Josefsson
- Re: PKI and S/MIME Anders Rundgren
- RE: PKI and S/MIME Blake Ramsdell
- Re: PKI and S/MIME Simon Josefsson
- Re: PKI and S/MIME Simon Josefsson
- DNS CERT vs. LDAP (was: RE: PKI and S/MIME) Blake Ramsdell
- RE: PKI and S/MIME Hallam-Baker, Phillip
- Re: PKI and S/MIME Steve Hole
- RE: PKI and S/MIME Steve Hole
- Re: PKI and S/MIME Steve Hole
- RE: PKI and S/MIME Steve Hole
- RE: PKI and S/MIME Hallam-Baker, Phillip
- RE: PKI and S/MIME Blake Ramsdell
- Re: PKI and S/MIME Simon Josefsson
- RE: PKI and S/MIME Blake Ramsdell
- Re: PKI and S/MIME Steve Hole
- Re: PKI and S/MIME Simon Josefsson
- Re: PKI and S/MIME Steve Hole
- RE: PKI and S/MIME Blake Ramsdell
- Re: PKI and S/MIME Denis Pinkas
- RE: PKI and S/MIME Hallam-Baker, Phillip
- Re: PKI and S/MIME Denis Pinkas