Re: Charter Revision
Antonio Maña <amg@lcc.uma.es> Thu, 01 July 1999 11:21 UTC
Received: from mail.proper.com (mail.proper.com [206.86.127.224]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA25489 for <smime-archive@odin.ietf.org>; Thu, 1 Jul 1999 07:21:05 -0400 (EDT)
Received: (from majordomo@localhost) by mail.proper.com (8.8.8/8.8.5) id DAA27902 for ietf-smime-bks; Thu, 1 Jul 1999 03:18:58 -0700 (PDT)
Received: from correo.uma.es (correo.uma.es [150.214.40.73]) by mail.proper.com (8.8.8/8.8.5) with ESMTP id DAA27893 for <ietf-smime@imc.org>; Thu, 1 Jul 1999 03:18:13 -0700 (PDT)
Received: from sol10.lcc.uma.es (sol10.lcc.uma.es [150.214.108.1]) by correo.uma.es (8.9.3/8.9.3) with SMTP id MAA20072; Thu, 1 Jul 1999 12:20:18 +0200 (MET DST)
Received: from lcc.uma.es by sol10.lcc.uma.es (SMI-8.6/SMI-SVR4) id MAA04344; Thu, 1 Jul 1999 12:20:03 +0200
Message-ID: <377B3EFB.632022D5@lcc.uma.es>
Date: Thu, 01 Jul 1999 12:12:11 +0200
From: Antonio Maña <amg@lcc.uma.es>
Organization: Universidad de Málaga
X-Mailer: Mozilla 4.5 [es] (Win95; I)
X-Accept-Language: es,en
MIME-Version: 1.0
To: Larry Stoddard <m.stoddard@ieee.ca>
CC: lista smime <ietf-smime@imc.org>
Subject: Re: Charter Revision
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
Sender: owner-ietf-smime@imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>
Content-Transfer-Encoding: 8bit
Larry, first of all thank you for your comments, Larry Stoddard escribió: > > The problem with the key/cert management approach is that it requires > many keys. This will eliminate smart card based solutions as there is > not enough space to hold multiple keys and key histories. Unless you use > multiple smart cards, which would mean playing musical smart cards to > read all your mail. Lending a token means that you are giving access to > everything protected by the token, including the ability to sign. The > problem with lending encryption keys is that some authentication schemes > use encryption keys instead of signing keys to do anonymous > authentication. You are right about smart cards, but I think that the identity problem can be solved without smart cards. Also it depends on the type of key (specially the 'container' of the key not the key itself) that you can store several keys in a smart card. > Also for those that lease PKI services there will be an additional > charge for each cert issued, so there is an incentive to minimize the > number of certificates required. The goal is to separate authorization > from identity as any change in authorization will result in revocation > of the identity certificate. Also the management of roles is something > that should be handled in as distributed a fashion as possible, ideally > the role owner should be able to delegate his role without involving the > CA. Of course, ideally the authorization should be separated from the identity, but roles can be considered identities as well. The authorization of a role is in most cases intrinsic to that role, for example if I am sure that you are part of the support team of some company I can trust that any answer I receive from you regarding products of that company is correct. In that case I don't need an authorization that says that your can answer questions about products of that company. You say that the role owner should be able to delegate his role without involving the CA. That's because you are thinking about a commercial CA that issues generic 'identity' certificates. If the owner of the role can act as CA the problem disappears. I don't see the difference between issuing a 'identity' certificate that relates a role to a specific email address -and the corresponding public key- (which could also contain attributes to solve the authorization issues if needed) as I propose or issuing an 'authorization' (which I suppose is also a certificate) related to an existing 'identity' certificate. The second solution is more complex and, in most cases, I don't care 'who' (what physical person) is answering if I know that (s)he is allowed to play the role that corresponds to my request. Looking from another perspective, who should give the authorization to play some role? Probably not the role owner because otherwise there has to be some root to that chain that has an auto-authorization. I think that the authorization for some role (say support@software.company.com) should come from the upper level in the organization of the company (software.company.com in the example) > How do you foresee dealing with temporary delegation of signing > authority for a role? Issuing identity certs and then revoking them > would seem to be an extreme way of handling this and means more work for > LRA and CA administration, not to mention longer CRLs. An attribute > certificate with a short lifetime is more practical, especially if the > attribute cert can be issued by the local role owner. That's again because you are supposing an expensive 'identity' certificate with a long lifetime, an using CRLs to revoke certs. Would you agree that the solution I propose is at least equivalent to the identity+attribute solution if my 'identity' certificate could be issued and revoked as easily (locally) as the attribute certificate you propose?. Cheers, Antonio Maña. \|||/ ( . . ) +------------------o000-----U------000o------------------+ ! _ , ! ! Antonio Mana Gomez eMail: amg@lcc.uma.es ! ! http://www.lcc.uma.es/~amg ! +--------------------------------------------------------+ ! Departamento de Lenguajes y Ciencias de la Computacion ! ! E.T.S.I.Informatica. Desp. 1.2.B.19 ! ! Campus de Teatinos. ! ! 29071 MALAGA (SPAIN) ! +--------------------------------------------------------+ ! Phone: (+34) 5 213 27 54 Fax: (+34) 5 213 13 97 ! +--------------------------------------------------------+ ! PGP KEY TYPE: ! ! RSA 1024 ! ! KEY FINGERPRINT: ! ! 7900 CDBB 9766 AB87 F0CE 5B4F 3DF1 BA56 ! ! KEY SERVER: ! ! Cert'eM at http://socrates.crypto.lcc.uma.es ! +--------------------------------------------------------+
- Charter Revision Russ Housley
- RE: Charter Revision William Ottaway
- RE: Charter Revision Russ Housley
- Charter Revision Russ Housley
- RE: Charter Revision Pawling, John
- RE: Charter Revision Pawling, John
- RE: Charter Revision Phillip M Hallam-Baker
- RE: Charter Revision Carlisle Adams
- Re: Charter Revision Antonio Maña
- RE: Charter Revision Flanigan, Bill