Lynn, et al,

Your point that PKI can be very "hard" is valid, but this must be
put in some sort of context. What is "hard" is handling
enrollment and registration of subjects (e.g., individuals,
businesses, roles) and managing the associated credentials and
transaction histories over potentially long time periods. Sort of
like what most banks do for their customer accounts (individual
consumers and businesses). Similar problems exist for employers
who must deal with complex employee relationships and associated
access controls and entitlements often spanning global
enterprises with all types of employees and contractors. 

The key point is that the machinery associated with an
infrastructure to support public key cryptographic applications
(PKI, if you will) does *not* have to be absurdly complex or
overengineered to meet overblown requirements.

Your point that "industrial strength service operations are
really hard to do right" is certainly true, but I think you are
also helping to make my case that we have tended to blame PKI for
the fact that legacy systems and applications are not easily
retrofitted to deal with transactions taking place over public
infrastructure, such as the Internet. From a legacy systems
perspective, it might be nice if everyone would continue using
the same old protocols and proprietary networks in the way these
things were designed to be used, but that tends to inhibit
progress and improvement.

To expand on my earlier point that the Financial Industry is
largely responsible for driving PKI requirements to unreasonable
levels, I would contend that this was motivated by two sets of 
objectives:

 (1) Attempts to move the burden of adapting legacy applications
     to meet Internet security requirements onto the backs of PKI
     systems and services, and

 (2) The desire to deflect new sources of liability away from
     financial institutions and onto PKI service providers and
     their technologies.

To be fair, both sets of objectives are understandable from the
perspective of traditional financial service providers. Their
investments in legacy infrastructure and applications are
enormous; and, as institutions that accept some financial
liabilities on behalf of their customers, new sources of
liability must be approached with great caution.

The AADS model you advocate addresses an aspect of integrating
public key crypto into legacy applications. For the benefit of
others on this list, AADS recognizes that if a party is
attempting to conduct secure transactions with a service that
issued credentials to the party, then the service should know, a
priori, what public key goes with that party. In other words, if
the service can recognize the party, and if the party is already
registered with the service, then the service should be able to
look up the party's public key without having to get a
certificate from the party. The service can then authenticate the
party by issuing a challenge that requires a response using the
private key held by the party. Similarly, other security
functions, such as encryption and digital signatures can be
implemented without having to exchange public key certificates.

AADS may help reduce the challenge of upgrading some legacy
systems to support new secure transactions. However, it is also
worth noting that this is exactly the model originally proposed
for use of public key crypto back in the 1970s when civilian uses
of this sort of cryptography were first being introduced. I.e.,
it is nothing new, although AADS provides useful formalization
for the procedures. 

The reason that certificates were "invented" was that new
applications for public key cryptography emerged where "a priori"
knowledge of public keys could not be assumed. Secure email is a
classic example of an application where there is a need to
exchange public keys between parties where there is no prior
knowledge of the other party's keys. SSL web sessions represents
another such application as do some payment applications (e.g.,
the FSTC eCheck initiative). I should also acknowledge that
different approaches for creating public key certificate-like
structures do exist, along with different trust models. 

The danger in continuing to flog the "dead" PKI horse is that it
further deflects attention away from the more relevant problems
of inadequate commercial solutions for any of the critical
security problems confronted by individuals, businesses and
governments. The ongoing debates surrounding authentication
services serves to sharply illustrate just how little progress
has been made. Furthermore, the current climate continues to
promote a contentious atmosphere with bitter competitive
rivalries and conflicting priorities undermining many efforts to
make forward progress.

To my earlier point, our current definition of PKI should be
viewed more as a path that is no longer going anywhere useful.
The options are to:

 * backtrack to some earlier stage of development and start anew,

 * somehow switch onto another path that shows greater promise,

 * or pick a new direction and take advantage of what progress has
   already been achieved.

Each of these options has its advocates, but I'll admit that I
tend to favor the latter option on pragmatic grounds.

What is even more important, however, is to focus on the critical
needs for effective security measures that can be widely deployed
and adopted, and that can evolve rapidly to confront an array of
new threats. 

Let's be honest, the security of payment transactions today is
far worse than it was a decade ago. This is due to the failure to
improve security measures for payment transactions, while broader
information dissemination and new technologies have enabled an
array of new threats with corresponding risks. Put differently,
the "moral hazards" embedded in our current payments
infrastructure are of historic proportions, and the trends are
not looking healthy right now.

Therefore, debating the "death of PKI" is a distraction that
deflects attention from the true problems. It is high time we
focus on better ways to mitigate the security risks associated
with both legacy and new payment transaction services. The need
for public key infrastructure to support new security measures
can then be defined rationally based on real requirements instead
of impossible or conflicting objectives. My personal suspicion is
that the eventual solutions will have aspects of many of the
current models, but without so much baggage.

Does this make sense?

Regards...  
-- 
...Chuck Wade           
   Consultant, Internet Security and Financial Services         
   +1 508 625-1137  Office Phone/Voice Mail             
   +1 309 422-9871  Fax Service


[EMAIL PROTECTED] wrote:
> 
> I was on a PKI panel at NISSC conference a couple years ago. The first
> three speakers were from the traditional PKI vendors and their basic
> message was something to the effect that .... everybody has heard all the
> stories about how really hard PKIs are ... well, I'm here to tell you that
> it is much, much easier than you've heard.
> 
> I then gave a AADS talk
> 
> Then the last speaker made some opening statement to the effect that ....
> they were responsible for the oldest and largest PKI in existance (some DoD
> thing) and everybody has heard all the stories about how really hard PKIs
> are ... will, I'm here to tell you that it is much, much harder than you've
> heard.
> 
> Now a couple years before that, my wife and I had been doing this stuff
> associated with electronic commerce.
> http://www.garlic.com/~lynn/aadsm5.htm#asrn2
> http://www.garlic.com/~lynn/aadsm5.htm#asrn3
> 
> and we had a couple decades experience between us with data processing that
> provided industrial strength service operations. So one of the things that
> we did as part of this SSL thingy was go around and perform due dilligence
> on the major PKI operations and talk about what it means to operate an
> industrial strength service. I think w/o exception the response was that
> they were starting to find that out ... that they had gone into it with the
> idea that it was somehow a computer or cryptographic technology thing and
> were finding out that the computer stuff and the crypto stuff represented
> possible 5 percent of what they needed to do.
> 
> The AADS stuff isn't so much about certificates or no certificates ... it
> is about industrial strength service operations are really hard to do right
> ... and incorporating public key into an existing service operation may
> have significant upfront effort just to get off the ground (aka AADS)
> compared to deploying a simple, stand-alone CA server (aka CADS) ... but
> AADS then is able to take advantage of significant investment in existing
> infrastructures for providing industrial strength data processing service
> ... and opposed to growing it from scratch for a brand-new operation.
> 
> Simple CA servers are pretty straight forward ... comparable to say any
> other departmental server effort. It is making the transition from simple
> departmental server stuff into large scale industrial strength data
> processing that lots of other issues start to raise their head (the
> transition from 10-20 person departmental service to a several hundred
> thousand person enterprise service is not necessarily a straight forward or
> even linear scale-up).
> 
> [EMAIL PROTECTED] on 5/28/2002 4:07 pm wrote:
> 
> 
> 
> 
> [EMAIL PROTECTED] wrote:
> >
> > http://www2.cio.com/research/security/edit/a05232002.html
> 
> Lynn,
> 
> Thanks for passing along the reference to the ALARMED editorial
> in CIO by Scott Berinato. It manages to come a bit closer to the
> truth than have many of the other pieces written on the death of PKI.
> 
> I would add a couple of observations of my own. First, the
> financial industry itself is largely responsible for escalating
> the requirements of PKI systems and services to truly absurd
> levels. Building massive infrastructure with extreme security
> appealed to the investment community that was happy to finance
> the PKI endeavors of multiple startups and spinoffs. After all,
> if the major banks were all saying they needed this stuff, then
> it must be a good investment to back the folks building these PKI
> palaces and Maginot Line defenses.
> 
> It is interesting to reflect on the original concepts for PKI
> systems (developed long before the term "PKI" came into use).
> These concepts envisioned simple workstation systems with addon
> security hardware for key protection that would operate as
> Certification Authorities (CAs) out where the credentials were
> being issued. The US DoD secure messaging systems actually
> deployed such CAs. The early Netscape server products also
> included simple CA software solutions, still used by many today.
> Microsoft offers similar CA solutions as well.
> 
> What is unfortunate in the current dialogue is how few people
> discuss the successes of PKI in their rush to be among the first
> to stamp on the grave of PKI. In reality, PKI is widely used
> today, and not just for SSL server side authentication and key
> exchange. Many organizations effectively use secure email
> solutions (e.g., S/MIME) with standard X.509 certs (I regularly
> conduct sensitive client business using S/MIME and certs I
> conveniently acquired from Thawte's service). Lotus Notes is very
> popular with many corporations, and is based on public key
> certificates, although only recently has Notes begun to use
> standard certs instead of their earlier proprietary constructs.
> 
> But more importantly, and perhaps more to the point, the core
> concept of digitally signing a public key remains central to many
> applications of public key cryptography. Furthermore, public key
> crypto remains a useful security technology that can be applied
> to a wide range of problems. Whether or not a signed document
> containing a public key is called a certificate, or something
> else, is mostly a matter of terminology and choice of standards.
> 
> Lynn, before you jump in with any claims about the virtues of
> AADS, I will acknowledge that certificate-like objects are not
> always required, especially when the appropriate keys (private
> and public) can be selected through some other context, such as
> the name or userid or account number of one of the parties.
> Hopefully, you will also agree that there are also situations
> where parties do not know "a priori" the public keys of the other
> parties, and some sort of mechanism is required to exchange and
> confirm the authenticity of the public keys.
> 
> So, as Mr. Berinato's editorial points out:
> 
>   "As complex as Public Key Infrastructure is,
>    the theory is sound."
> 
>   "So while the concept behind PKI was appealing,
>    everything else about it was shoddy."
> 
> Both are accurate observations, although I would tend to refer to
> commercial PKI solutions as more "overblown and gilded" than
> "shoddy," although I do know of some examples of shoddy PKI systems.
> 
> My conclusion is that PKI has come to mean a "poorly chosen path"
> for achieving effective deployment of security measures based on
> public key cryptography. The PKI path has favored entrenched
> interests and "big iron" solutions. This path has also confused
> many about what the ultimate destination should be. What needs to
> be recognized--and more broadly communicated--is that there are
> other paths to achieving effective use of public key crypto as a
> set of mechanisms for building secure applications. We need to
> stop focusing on the wrongness of the PKI path, and move the
> debate to more constructive dialogues about what the right path
> (or paths) should be. To this extent, I appreciate the
> suggestions that Anders has been putting forward because I
> believe he's talking about possible new paths, not bemoaning how
> we got here.
> 
> Just some thoughts...
> --
> ...Chuck Wade
>    Consultant, Internet Security and Financial Services
>    +1 508 625-1137  Office Phone/Voice Mail
>    +1 309 422-9871  Fax Service

Reply via email to