On Sep 11, 2013, at 11:56 AM, Karl Malbrain <[email protected]> wrote:
> The goal of the proposal is to enable the use of strong authentication for
> all TLS connections over the internet. The certificates as
> things-in-themselves don’t really matter, they are actually just a vehicle to
> post the public key of the user/server in a reliable public place. The
> security occurs when the challenges to prove private key ownership are
> cross-issued by each party. MITM would not have the private keys to answer
> either challenge.
>
> Note that this still doesn’t solve the problem of MITM obtaining the server’s
> private key. I’m still working on that one.
I might be misunderstanding, but it seems to me that your global directory
would allow a passive listener to fingerprint the client by sniffing in a
variety of places -- near the client, near the server, or near the directory.
If you assume an attacker interested in collecting metadata about the clients,
this would be suboptimal.
I may be missing something, but this sounds like it is just a global, central
certificate authority, albeit one that is not actually issuing the
certificates, but still assigning them GUIDs, which are by definition globally
unique.
Am I indeed missing something?
Jon
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass