Re: [TLS] the use cases for GSS-based TLS and the plea for integrating

Kyle Hamilton <aerowolf@gmail.com> Fri, 27 July 2007 15:28 UTC

Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IERjd-00086Z-UF; Fri, 27 Jul 2007 11:28:09 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IERjd-00086S-0h for tls@lists.ietf.org; Fri, 27 Jul 2007 11:28:09 -0400
Received: from wa-out-1112.google.com ([209.85.146.183]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IERjb-0006sk-VZ for tls@lists.ietf.org; Fri, 27 Jul 2007 11:28:08 -0400
Received: by wa-out-1112.google.com with SMTP id j4so1051015wah for <tls@lists.ietf.org>; Fri, 27 Jul 2007 08:28:07 -0700 (PDT)
DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:in-reply-to:references:mime-version:content-type:message-id:cc:content-transfer-encoding:from:subject:date:to:x-mailer; b=Gi/7QN09pEqHgDstAiqUeGOFVMO1ft3XO49wMK34Yl5KZ4O4Hd3uf8eOOSr7GP83BY0FSu/3anZizrRVuYEYcIGKoA+DzanGx/LVzeCSUPROl9T1a7RMyO41vIO2YcjukhKsgJ+WlIYFfTAeqsP2FoikjAt3ZnL8lD1n13uxA6E=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:in-reply-to:references:mime-version:content-type:message-id:cc:content-transfer-encoding:from:subject:date:to:x-mailer; b=TY7OlAOzzbZWmV8k/RYrUm9IKaSaSx5+4WyE0/ggRcmgKr6RYMLKZ6epC/tGHy71d9Tlf9hojGjj5uNhpaaFqHkVqNFfLVQg1HLsRkuxEJjdlMqUWSzdCCH7PVROU6m+YWR4Y6SNXG5MCz4gbpSACjxg/58pPr/Hhna/Xe1XmGE=
Received: by 10.114.38.2 with SMTP id l2mr3041747wal.1185550087374; Fri, 27 Jul 2007 08:28:07 -0700 (PDT)
Received: from ?172.16.1.114? ( [12.176.202.84]) by mx.google.com with ESMTPS id m31sm3084246wag.2007.07.27.08.28.06 (version=TLSv1/SSLv3 cipher=OTHER); Fri, 27 Jul 2007 08:28:07 -0700 (PDT)
In-Reply-To: <20070728020702.2x3rc53g7bksocc0@webmail.cs.auckland.ac.nz>
References: <200707171840.l6HIeg9M018099@fs4113.wdf.sap.corp> <48A6320349FD1EDBE937A357@dhcp-26f9.ietf69.org><C4E819FF73EA6ED22A3906CD@446E7922C82D299DB29D899F> <46A8FD4F.7050203@it.su.se> <FA998122A677CF4390C1E291BFCF598907DF564E@EXCH.missi.ncsc.mil> <20070728020702.2x3rc53g7bksocc0@webmail.cs.auckland.ac.nz>
Mime-Version: 1.0 (Apple Message framework v752.3)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <67C405F1-EAEA-46DF-A6F5-2F2397A32D43@gmail.com>
Content-Transfer-Encoding: 7bit
From: Kyle Hamilton <aerowolf@gmail.com>
Subject: Re: [TLS] the use cases for GSS-based TLS and the plea for integrating
Date: Fri, 27 Jul 2007 08:28:04 -0700
To: pgut001@cs.auckland.ac.nz
X-Mailer: Apple Mail (2.752.3)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: c3a18ef96977fc9bcc21a621cbf1174b
Cc: tls@lists.ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org

On Jul 27, 2007, at 7:07 AM, pgut001@cs.auckland.ac.nz wrote:

> "Kemp, David P." <DPKemp@missi.ncsc.mil> writes:
>> Symmetric mechanisms (static passwords, OTP, Kerberos, etc) all  
>> have the
>> property of requiring communication with an identity provider in  
>> real-time to
>> authenticate a user (except for pre-placed keys, a non-scalable  
>> technique that
>> is not under consideration for TLS even though it is supported in  
>> IPSec).

...ummm... the process of creating a key, sending a CSR, and then  
putting the returned certificate and certificate chain in place is a  
key pre-placement mechanism.

Then again, it would also theoretically be possible to generate  
session IDs that you distribute to the clients, and then the clients  
use those pre-generated sessions to share the keys that way.  (That  
path is fraught with so much peril that it's not worth considering  
for a general-purpose implementation, but I can envision a couple of  
specialized environments that it would be useful within.)

>> Asymmetric (certificate-based) mechanisms can authenticate a user  
>> without
>> communicating with an identity provider and without giving one  
>> party the
>> ability to masquerade as the other.

...so OCSP was designed for a purpose that really didn't need to be  
filled.

>> One certainly would not want to remove asymmetric authentication  
>> from TLS
>> (i.e., it should remain mandatory to implement).

I'm inclined to agree.  It is too useful.  However, the issue of  
enforcing X.509/PKIX is... questionable.

> I realise this has the potential to open up a huge can of worms  
> here, but I
> can't let this one pass by: "shared keys/passwords/whatever don't  
> scale" is
> one of the most persistent myths on computer security.  99.99% of all
> authentication is done via pre-shared keys/passwords, including  
> pretty much
> arbitrarily large infrastructures like eBay, Amazon, Gmail, any ISP  
> using
> RADIUS, and <insert-name-here>.  The ones that we know definitely  
> don't scale
> well in comparison are all the others: PKI, Kerberos, yadda yadda  
> yadda, and
> in particular the asymmetric-auth ones.

Why wouldn't the SSH paradigm work here?  You have the public key  
associated with the address you're talking to.  (and if the  
fingerprint popped up when you first connected to it, then a bank  
[for example] would be able to give you the fingerprint to verify  
against when you opened your account.

Personally, I'd like to see the banks that open merchant accounts do  
the certifications of merchant identity.  It would provide for a MUCH  
greater mechanism of knowing who to go after -- because if nothing  
else, the merchant account information could be used in a civil suit  
for garnishment.

> For how many more years do we have to keep flogging the PKI  
> corpse?  If it
> worked as intended, the multibillion-dollar phishing industry  
> wouldn't exist.
> Why keep it mandatory to implement something that very demonstrably  
> doesn't
> work?

There are circumstances for which it would work.  It just doesn't  
work very well in the current implementation.  That's the most  
important thing to consider: just because something doesn't work in  
the current implementation doesn't mean it doesn't work period.

To be honest, X.500 (and the entire X.5** suite) is horribly unsuited  
for the purposes for which it was designed -- but LDAP (lightweight  
access to X.500-style directories) has been shown to be useful, which  
means that not all of the work that went into it was wasted.

-Kyle H

_______________________________________________
TLS mailing list
TLS@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/tls