[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Simon Josefsson <simon+keydist@josefsson.org>
CC: Derek Atkins <warlord@MIT.EDU>, Edward Lewis <lewis@tislabs.com>, keydist@cafax.se
From: Steve Hanna <steve.hanna@sun.com>
Date: Thu, 17 Jan 2002 12:04:29 -0500
Sender: owner-keydist@cafax.se
Subject: Re: looking for draft volunteers

So you're saying that the requirement "MUST be possible to secure
locating and retrival of the key" could include either verifying
the key using a trusted key or using an out-of-band mechanism?
That's true, although SSH depends on just this sort of out-of-band
mechanism and users almost always omit the out-of-band check.
In my opinion, we should require something better (although
out-of-band verification could always be an option).

So I would suggest changing that requirement to say "MUST be
possible to secure locating and retrieval of the key (including
support for at least one alternative to out-of-band verification)".

-Steve

Simon Josefsson wrote:
> 
> On Mon, 14 Jan 2002, Steve Hanna wrote:
> 
> > > > > Requirements on a Solution
> > > > >
> > > > >   "MUST be possible to locate application keys given only IP address
> > > > >   or hostname"
> > > >
> > > > You also need *some* sort of trusted key (DNS or PKI). Otherwise,
> > > > you're wide open for impersonation. Note that the first use case for
> > > > SSH above seems to suffer from this problem. You only brought one
> > > > key, the SSH host key for beagle. Now that machine is down. You're
> > > > SOL unless you also have another trusted key.
> > >
> > > I think the assumption is 'some DNSSec key'...
> >
> > If there's a built-in assumption here, it should be made explicit.
> > The use case should say "Fortunately, I have the key of the DNS
> > root or a PKI trust anchor." The requirements should say "MUST be
> > possible to locate application keys given only IP address or
> > hostname *and* a trusted key (DNS or PKI)"
> >
> > Simon, was there a built-in assumption there?
> 
> No.  I separated the issues into two requirements:
> 
>   "MUST be possible to locate application keys given only IP address
>   or hostname"
> 
>   "MUST be possible to secure locating and retrival of the key"
> 
> I did not want to restrict the mechanism of locating and retrieving keys
> by assuming the locating/retrieving mechanism is secure.
> 
> If DNSSEC never happens, it still can be useful to distribute, e.g., SSH
> keys using DNS as long as you have some other mechanism to secure the
> retrieval afterwards.  The retrieved key might contain information that
> lets you contact whatever trust point you may have to make sure it is the
> right key.  Clients in general should not have to be manually configured
> to point at one LDAP server, lets make the application find this out
> themselves.  (Of course, trust points should (only) be manually
> configured.)
> 
> Given the state of DNSSEC, I believe we should include this model as well
> (or at least not exclude it).

Home | Date list | Subject list