[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Keith Moore <moore@cs.utk.edu>
Cc: Steve Hanna <steve.hanna@sun.com>, Simon Josefsson <simon+keydist@josefsson.org>, Edward Lewis <lewis@tislabs.com>, keydist@cafax.se
From: Derek Atkins <warlord@MIT.EDU>
Date: 14 Jan 2002 18:42:23 -0500
In-Reply-To: <200201142317.g0ENHJi00683@astro.cs.utk.edu>
Sender: owner-keydist@cafax.se
User-Agent: Gnus/5.0808 (Gnus v5.8.8) Emacs/20.7
Subject: Re: looking for draft volunteers

Keith Moore <moore@cs.utk.edu> writes:

> > Unless, of course, we have a single CA that we can all trust.  And
> > quite honestly the only central authority that anyone in the internet
> > has any trust in at the moment (albeit very little trust) is the DNS
> > root.
> 
> Quite honestly, there is no central authority in the Internet (or
> in the Real World) which everyone will (or should) trust absolutely.  
> 
> (And if you make it so attractive to attack the DNS root then it becomes
> even less trustworthy than it is now)
> 
> But in the meatspace world this doesn't stop us from extending limited 
> amounts of trust to various kinds of credentials - including some issued 
> by central authorities of fairly large domains - but we vary the degree 
> of trust that we place in a credential according to the authority that
> issued it, our perceived liklihood that it's forged, and the purpose for
> which we're authenticating.

That's fine.

> If you want to store the DNS root key (or perhaps the keys of most
> TLDs) on your client, and use DNSSEC keys to verify the public key
> of a random email recipient with which you have no prior association,
> that's probably better than having no key at all.  But you'd be 
> naive to trust that key to safeguard information for which disclosure
> could cost lives.

Of course.  Similarly, I wouldn't trust a key from soley DNS to
identify my bank or banker.  The point is that DNSSec _is_ better than
nothing, and most work on the internet _is_ casual communication.

For more important stuff there is usually some meat-space relationship
a priori during which trust/key information can be exchanged.  I can
certainly see a bank sending out their key information in statements,
for example, or having them printed in their brochures.

> In other words, getting keys solely by DNSSEC and knowledge of the 
> DNS root might be okay for casual use, but it's not a mechanism in
> which one should place arbitrary amounts of trust.  At the same time,
> using DNS to find keys and using external means to authenticate 
> them can provide keys which are more trustworthy (because you have
> that external information) without your having to have previously
> acquired and verified every key you might want to use.

That's fine, too.  My point is that I think it's ok if we only solve
the casual use problem.

> I think a single framework could accomodate the entire spectrum
> of trustworthiness vs. pre-verification.  The real trick is to 
> provide the user with enough information so that he doesn't place
> an inappropriate amount of trust in whatever keys he's getting.

I'm not 100% convinced that a single framework is either necessary or
sufficient, but we can discuss that.

> Keith 

-derek

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available

Home | Date list | Subject list