Re: [TLS] the use cases for GSS-based TLS and the plea for integrating
Kyle Hamilton <aerowolf@gmail.com> Fri, 27 July 2007 15:28 UTC
Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IERjd-00086Z-UF; Fri, 27 Jul 2007 11:28:09 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IERjd-00086S-0h for tls@lists.ietf.org; Fri, 27 Jul 2007 11:28:09 -0400
Received: from wa-out-1112.google.com ([209.85.146.183]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IERjb-0006sk-VZ for tls@lists.ietf.org; Fri, 27 Jul 2007 11:28:08 -0400
Received: by wa-out-1112.google.com with SMTP id j4so1051015wah for <tls@lists.ietf.org>; Fri, 27 Jul 2007 08:28:07 -0700 (PDT)
DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:in-reply-to:references:mime-version:content-type:message-id:cc:content-transfer-encoding:from:subject:date:to:x-mailer; b=Gi/7QN09pEqHgDstAiqUeGOFVMO1ft3XO49wMK34Yl5KZ4O4Hd3uf8eOOSr7GP83BY0FSu/3anZizrRVuYEYcIGKoA+DzanGx/LVzeCSUPROl9T1a7RMyO41vIO2YcjukhKsgJ+WlIYFfTAeqsP2FoikjAt3ZnL8lD1n13uxA6E=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:in-reply-to:references:mime-version:content-type:message-id:cc:content-transfer-encoding:from:subject:date:to:x-mailer; b=TY7OlAOzzbZWmV8k/RYrUm9IKaSaSx5+4WyE0/ggRcmgKr6RYMLKZ6epC/tGHy71d9Tlf9hojGjj5uNhpaaFqHkVqNFfLVQg1HLsRkuxEJjdlMqUWSzdCCH7PVROU6m+YWR4Y6SNXG5MCz4gbpSACjxg/58pPr/Hhna/Xe1XmGE=
Received: by 10.114.38.2 with SMTP id l2mr3041747wal.1185550087374; Fri, 27 Jul 2007 08:28:07 -0700 (PDT)
Received: from ?172.16.1.114? ( [12.176.202.84]) by mx.google.com with ESMTPS id m31sm3084246wag.2007.07.27.08.28.06 (version=TLSv1/SSLv3 cipher=OTHER); Fri, 27 Jul 2007 08:28:07 -0700 (PDT)
In-Reply-To: <20070728020702.2x3rc53g7bksocc0@webmail.cs.auckland.ac.nz>
References: <200707171840.l6HIeg9M018099@fs4113.wdf.sap.corp> <48A6320349FD1EDBE937A357@dhcp-26f9.ietf69.org><C4E819FF73EA6ED22A3906CD@446E7922C82D299DB29D899F> <46A8FD4F.7050203@it.su.se> <FA998122A677CF4390C1E291BFCF598907DF564E@EXCH.missi.ncsc.mil> <20070728020702.2x3rc53g7bksocc0@webmail.cs.auckland.ac.nz>
Mime-Version: 1.0 (Apple Message framework v752.3)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <67C405F1-EAEA-46DF-A6F5-2F2397A32D43@gmail.com>
Content-Transfer-Encoding: 7bit
From: Kyle Hamilton <aerowolf@gmail.com>
Subject: Re: [TLS] the use cases for GSS-based TLS and the plea for integrating
Date: Fri, 27 Jul 2007 08:28:04 -0700
To: pgut001@cs.auckland.ac.nz
X-Mailer: Apple Mail (2.752.3)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: c3a18ef96977fc9bcc21a621cbf1174b
Cc: tls@lists.ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org
On Jul 27, 2007, at 7:07 AM, pgut001@cs.auckland.ac.nz wrote: > "Kemp, David P." <DPKemp@missi.ncsc.mil> writes: >> Symmetric mechanisms (static passwords, OTP, Kerberos, etc) all >> have the >> property of requiring communication with an identity provider in >> real-time to >> authenticate a user (except for pre-placed keys, a non-scalable >> technique that >> is not under consideration for TLS even though it is supported in >> IPSec). ...ummm... the process of creating a key, sending a CSR, and then putting the returned certificate and certificate chain in place is a key pre-placement mechanism. Then again, it would also theoretically be possible to generate session IDs that you distribute to the clients, and then the clients use those pre-generated sessions to share the keys that way. (That path is fraught with so much peril that it's not worth considering for a general-purpose implementation, but I can envision a couple of specialized environments that it would be useful within.) >> Asymmetric (certificate-based) mechanisms can authenticate a user >> without >> communicating with an identity provider and without giving one >> party the >> ability to masquerade as the other. ...so OCSP was designed for a purpose that really didn't need to be filled. >> One certainly would not want to remove asymmetric authentication >> from TLS >> (i.e., it should remain mandatory to implement). I'm inclined to agree. It is too useful. However, the issue of enforcing X.509/PKIX is... questionable. > I realise this has the potential to open up a huge can of worms > here, but I > can't let this one pass by: "shared keys/passwords/whatever don't > scale" is > one of the most persistent myths on computer security. 99.99% of all > authentication is done via pre-shared keys/passwords, including > pretty much > arbitrarily large infrastructures like eBay, Amazon, Gmail, any ISP > using > RADIUS, and <insert-name-here>. The ones that we know definitely > don't scale > well in comparison are all the others: PKI, Kerberos, yadda yadda > yadda, and > in particular the asymmetric-auth ones. Why wouldn't the SSH paradigm work here? You have the public key associated with the address you're talking to. (and if the fingerprint popped up when you first connected to it, then a bank [for example] would be able to give you the fingerprint to verify against when you opened your account. Personally, I'd like to see the banks that open merchant accounts do the certifications of merchant identity. It would provide for a MUCH greater mechanism of knowing who to go after -- because if nothing else, the merchant account information could be used in a civil suit for garnishment. > For how many more years do we have to keep flogging the PKI > corpse? If it > worked as intended, the multibillion-dollar phishing industry > wouldn't exist. > Why keep it mandatory to implement something that very demonstrably > doesn't > work? There are circumstances for which it would work. It just doesn't work very well in the current implementation. That's the most important thing to consider: just because something doesn't work in the current implementation doesn't mean it doesn't work period. To be honest, X.500 (and the entire X.5** suite) is horribly unsuited for the purposes for which it was designed -- but LDAP (lightweight access to X.500-style directories) has been shown to be useful, which means that not all of the work that went into it was wasted. -Kyle H _______________________________________________ TLS mailing list TLS@lists.ietf.org https://www1.ietf.org/mailman/listinfo/tls
- [TLS] the use cases for GSS-based TLS and the ple… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- [TLS] Re: the use cases for GSS-based TLS and the… Simon Josefsson
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] Re: the use cases for GSS-based TLS and… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- [TLS] Re: the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Yoav Nir
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- RE: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Kyle Hamilton
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman