On 09/04/2010 12:08 PM, Arshad Noor wrote:
Ian G wrote:
On 4/09/10 4:21 AM, [email protected] wrote:
It's too bad there isn't a notion of identity seperate from keys.
The problem with all this is there is an assumption that we can
accurately model an identity in any form. In practice, we can't. In
more theoretical terms, we can't even define identity, let alone
design a single system to capture it.
Very simply: identity is a set of attributes of a transacting party,
relevant to the transaction's context.
I like that way of saying it, it sounds like a useful way to think about
actual systems. It might be hard to use in general discussion since it
probably doesn't match what most people have in mind.
The concept of identity is impossibly deep I think. AFAICT, it's an
essential part of biology and authentication has been a challenge since
the invention of the immune system, or maybe even the cell membrane. Is
this molecule part of me or is it foreign? Maybe this is an analogy
extended way off the deep end, I'm still not sure. Consider dogs, they
certainly use their noses for identifying each other (have you ever seen
a dog fooled by an imposter?) Doesn't smell come from those molecular
exchange processes? Probably humans gave up smell as a primary means of
recognition only relatively recently in evolutionary history.
People have a lot of built-in hardware for managing identity (e.g.,
special circuits for face and voice recognition). My theory is that for
this reason we have a very hard time appreciating the essential
complexity inherent in identity and authentication systems; too much
just happens automatically under the surface. Many times I've been in
conversations where the participants all believe that they have a good
working definition of identity for the discussion, but it inevitably
emerges that everyone has different ideas in mind.
But even with billions of years of biology working on the problem these
systems still fail on a regular basis. Foreign bodies trick our cells
into being a host or even incorporating their DNA. Ant species have
fascinating ways of masking and imitating others chemical signatures.
People fall for scams when clean-cut looking kids go door-to-door. And
of course, computer systems get owned through any number of failure
modes related to identity (often the root cause can be traced to
oversimplifications in the design or deployment).
For years and years, an "account username" was a reasonably sufficient
subject identifier. But it was just an approximation, and it breaks down
once systems become distributed in any non-trivial way. (If not sooner,
consider the number of admin and service accounts in comparison to users
on a typical system). When problems are encountered in operation, often
they are perceived as weaknesses in authentication. But when the deeper
cause is an insufficiently powerful and flexible identity model that
doesn't take into account the complex reality, strengthening the level
of authentication just makes the resulting system harder to use. So
trying to make the traditional models work across the entire internet
just isn't a good idea, despite the fact that conflating the concepts of
"user" and "living natural person" is highly appealing on many levels.
Most people are simply not going to leave a comment on a blog post if
the web form insists on a government issued photo ID.
It wasn't that long ago that if you lived in a small town, folks at the
bank knew you personally. They could also spot someone who wasn't from
the area with a useful degree of reliability. This was a flexible system
that leveraged people's built-in skills. Although it was far from
perfect, at least its failure modes tended to be proportional to common
sense expectations.
At the other extreme, I recently heard about some kind of national
digital ID card being introduced in Germany that had RFID, USB readers,
Windows drivers, and so on. It sounded like it basically amounted to
being required to present one's passport or birth certificate at any
number of reader terminals and official websites, no matter how mundane.
It doesn't sound like a good idea to me that renewing your cat's license
tag online should be treated the same as, say, a large bank transfer.
It's not going to be pretty when the limitations of such an approach are
encountered, non-repudiation seems not to work so well when half the
endpoint systems are owned by kernel-mode malware.
- Marsh
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography