cdr wrote:

Here is a recent paper related to Key Continuity:
http://www.simson.net/ref/2005/johnny2_usenixsecurity05_submited.pdf


The mistake was made when it was decided that the browser security
solutions will be based exclusively on the "trusted third party" (TTP)
model. It is now obvious that no third party can be trusted in all
circumstances, there are circumstances in which no third party can be
trusted, and there is a murky world in-between with many circumstances
in which TTP model alone just does not perform to our satisfaction.

It is time to accept the obvious: Key Continuity Management (KCM) and
TTP are not exclusive but complementary: both have their place in the
"real world" and both should be supported by a browser.

If you believe that, you should design and propose a standard protocol that can support KCM and propose it to the IETF . The model of X.509 certs supported by the SSL protocol and RFC3280 cert path validation as it exists today is not compatible with KCM . Implementing KCM with X.509 and SSL (or S/MIME, as in the paper referenced) would be a violation of the standards, as it would cause the application to produce errors in cases the standards state are valid . There are very legit reasons for changing cert and key, such as to increase security if the old key has been compromised, or if you simply want a larger key size because you think the key has become crackable. The KCM model breaks apart in those cases. The X.509 model has revocation to deal with them.

I browsed through the KCM document and IMO it does not solve the problem of man-in-the-middle attacks. TTP is not perfect, but has revocation to recover from mistakes - what does KCM have ?
_______________________________________________
mozilla-crypto mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to