Hi Karl,

On 09/12/2013 06:13 PM, Karl Malbrain wrote:
> I was under the impression that this list was to discuss things
> pre-draft -- e.g. general concepts first, details later in a specific
> work-group.  I'm sorry if you find the piece meal approach
> difficult.

Its not that its difficult but rather that another level of
detail might be needed before its clear if the approach could
work. (Being honest, I'm skeptical of anything that needs
every client who uses TLS have a private key, if that is what's
proposed.)

> 
> My  proposal in a nutshell:
> 
> 1. Use TLS strong authentication between client and server on all
> connections over the internet to obviate MITM attacks. 2. Make users'
> public keys public information to obviate current TLS limitations on
> obtaining them.
> 
> If everyone agrees with this, we can certainly move onto a draft to
> work out details, and yes, I'd need assistance from that point
> onward.

I'd say the overall thrust of the idea is clear(ish), but you
won't get rough consensus on something like that until after
its written down (ideally with running code), so I reckon this
is at the point where an I-D is the next step.

So if you get others who're interested and who know how to
do it, write up that I-D. (And again, if you're not sure how
to do it yourself, just ping me.)

S.


> 
> Karl
> 
> -----Original Message----- From: Stephen Farrell
> [mailto:[email protected]] Sent: Thursday, September 12, 2013
> 09:47 To: Karl Malbrain Cc: Jon Callas; Theodore Ts'o;
> [email protected]; Phillip Hallam-Baker Subject: Re: [perpass]
> proposed enhancement to TLS strong authentication protocol
> 
> 
> Hi,
> 
> We seem to be designing this protocol one mail at a time. Could I ask
> that we stop doing that and that Karl and whoever else is minded
> submit an internet-draft specifying the protocol so that it can be
> more easily reviewed.
> 
> Thanks, Stephen.
> 
> PS: Karl, if you need help with the mechanics just ask me offlist.
> 
> On 09/12/2013 05:24 PM, Karl Malbrain wrote:
>> The assumed attack profile is a MITM insertion into a connection
>> stream between server and client whereby the attacker gains
>> complete unencrypted access to all traffic over the connection, not
>> just meta data.
>> 
>> TLS already has a built-in concept of "strong authentication"
>> between server and client to defeat this attack.  It requires that
>> the TLS server pre-obtain by some secondary channel the public key
>> of the user.  This proposal eliminates that requirement by making
>> the user's public keys public knowledge.
>> 
>> Karl
>> 
>> From: Jon Callas [mailto:[email protected]] Sent: Thursday,
>> September 12, 2013 06:21 To: Karl Malbrain Cc: Jon Callas; Phillip
>> Hallam-Baker; Theodore Ts'o; [email protected] Subject: Re:
>> [perpass] proposed enhancement to TLS strong authentication
>> protocol
>> 
>> 
>> On Sep 11, 2013, at 11:56 AM, Karl Malbrain
>> <[email protected]<mailto:[email protected]>> wrote:
>> 
>> 
>> The goal of the proposal is to enable the use of strong
>> authentication for all TLS connections over the internet.  The
>> certificates as things-in-themselves don't really matter, they are
>> actually just a vehicle to post the public key of the user/server
>> in a reliable public place.  The security occurs when the
>> challenges to prove private key ownership are cross-issued by each
>> party.  MITM would not have the private keys to answer either
>> challenge.
>> 
>> Note that this still doesn't solve the problem of MITM obtaining
>> the server's private key.  I'm still working on that one.
>> 
>> I might be misunderstanding, but it seems to me that your global
>> directory would allow a passive listener to fingerprint the client
>> by sniffing in a variety of places -- near the client, near the
>> server, or near the directory.
>> 
>> If you assume an attacker interested in collecting metadata about
>> the clients, this would be suboptimal.
>> 
>> I may be missing something, but this sounds like it is just a
>> global, central certificate authority, albeit one that is not
>> actually issuing the certificates, but still assigning them GUIDs,
>> which are by definition globally unique.
>> 
>> Am I indeed missing something?
>> 
>> Jon
>> 
>> 
>> 
>> 
>> _______________________________________________ perpass mailing
>> list [email protected] 
>> https://www.ietf.org/mailman/listinfo/perpass
>> 
> _______________________________________________ perpass mailing list 
> [email protected] https://www.ietf.org/mailman/listinfo/perpass
> 
> 
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to