Re: The PKC-only application security model ...
Anne & Lynn Wheeler wrote about various flavors of certificateless public key operation in various standards, notably in the financial industry. Thanks for reporting those. No doubt that certificateless public key operation is neither new nor absence from today's scene. The document I published on my web site today is focused on fielding certificateless public operations with the TLS protocol which does not support client public keys without certificates - hence the meaningless security certificate. Nothing fancy in this technique, just a small contribution with the hope to facilitate the use of client-side PKC. - Thierry Moreau - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
Re: The PKC-only application security model ...
Thierry Moreau wrote: A)The big picture refers to the "PKC-only application security scheme", in which client-server applications may be secured with client-side public key pairs, but *no trusted certification authority* is involved (server operators are expected to maintain a trusted database of their clients' public keys). original PK-init (public key) draft for Kerberos was (only) certificateless public key operation ... i.e. kerberos server operators maintaining trusted database of their clients' public keys (in lieu of passwords) ... PKI/certificate mode of operation was eventually added to the specification. lots of past posts about certificateless public key kerberos http://www.garlic.com/~lynn/subpubkey.html#kerberos similar implementation was done for RADIUS http://www.garlic.com/~lynn/subpubkey.html#radius general posts about certificateless (sometimes "naked") public key http://www.garlic.com/~lynn/subpubkey.html#certless X9.59 is financial transaction standard also using certificateless public key operation http://www.garlic.com/~lynn/x959.html#x959 part of the issue was that in the mid-90s, the x9a10 financial standard working group had been given the requirement to preserve the integrity of the financial infrastructure for all retail payments. One of the issues for x9.59 was that it had to be lightweight enough to operate in existing infrastructures. Some of the certificate-oriented payment transaction standards from the period resulted in factor of 100 times (two orders of magnitude) payload (i.e. certificate payload overhead could be 100 times larger than basic payment transaction) and processing (i.e. certificate processing overhead could be 100 times larger than basic payment transaction) bloat http://www.garlic.com/~lynn/subpubkey.html#bloat general discussions of the "account authority public key" model (as contrast to "certification authority public key" model) http://www.garlic.com/~lynn/x959.html#aads - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
The PKC-only application security model ...
Dear all: This is a two-fold announcement, big picture and specific document announcement. The whole thing is "for your information" as security experts. A) The big picture refers to the "PKC-only application security scheme", in which client-server applications may be secured with client-side public key pairs, but *no trusted certification authority* is involved (server operators are expected to maintain a trusted database of their clients' public keys). B) The specific document announcement refers to what is required to field the PKC-only application security scheme: explicit meaningless security certificates. The reference is "Explicit Meaningless X.509 Security Certificates as a Specifications-Based Interoperability Mechanism", http://www.connotech.com/pkc-only-meaningless-certs.pdf This post leaves it to your imagination and creativity about how a PKC-only security scheme may work in practical details, i.e. how the third party trust management may be replaced by first party trust management (first party = server operator as the relying party for client public keys). I have been doing some work in this area, but I have no results to report in a properly written document. Anyway, the PKC-only security scheme does not imply significant standardization for interoperability among independent service operators. The document is open for discussion. It covers the minimal provisions for PKC-only deployment in the installed base of browsers supporting the TLS protocol. Sometimes in the future, a very reduced version might be prepared as an Internet draft intended to the RFC editor publication route (RFC3932) with the experimental status (this is different from the individual RFC submission route in which the IESG is involved in the document publication process but no IETF working group is assigned an editorial role). Good reading. -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, Qc Canada H2M 2A1 Tel.: (514)385-5691 Fax: (514)385-5900 web site: http://www.connotech.com e-mail: [EMAIL PROTECTED] - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
Re: how to check if your ISP's DNS servers are safe
On 07/23/2008 12:44 AM, Steven M. Bellovin wrote: >> Niels Provos has a web page up with some javascript that automatically >> checks if your DNS caching server has been properly patched or not. >> >> http://www.provos.org/index.php?/pages/dnstest.html >> >> It is worth telling people to try. >> > Those who prefer command lines can try > > dig +short porttest.dns-oarc.net TXT Thanks, that's helpful. Note that the command-line version accepts the "@server" option, which is useful if you have to deal with a mess of primaries, secondaries, forwarders, et cetera: dig @NS1 +short porttest.dns-oarc.net TXT dig @NS2 +short porttest.dns-oarc.net TXT dig @NS3 +short porttest.dns-oarc.net TXT - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
Re: how to check if your ISP's DNS servers are safe
On Tue, 22 Jul 2008 10:21:14 -0400 "Perry E. Metzger" <[EMAIL PROTECTED]> wrote: > > Niels Provos has a web page up with some javascript that automatically > checks if your DNS caching server has been properly patched or not. > > http://www.provos.org/index.php?/pages/dnstest.html > > It is worth telling people to try. > Those who prefer command lines can try dig +short porttest.dns-oarc.net TXT --Steve Bellovin, http://www.cs.columbia.edu/~smb - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
Re: Looking through a modulo operation
"Matt Ball" wrote > Here is a C implementation of __random32: > > typedef unsigned long u32; > struct rnd_state { u32 s1, s2, s3; }; > static u32 __random32(struct rnd_state *state) > { > #define TAUSWORTHE(s,a,b,c,d) ((s&c)<>b) > > state->s1 = TAUSWORTHE(state->s1, 13, 19, 4294967294UL, 12); > state->s2 = TAUSWORTHE(state->s2, 2, 25, 4294967288UL, 4); > state->s3 = TAUSWORTHE(state->s3, 3, 11, 4294967280UL, 17); > > return (state->s1 ^ state->s2 ^ state->s3); > } I see TAUSWORTHE (briefly tested with the above constants) isn't a permutation of the 32-bit input state and is going to get very dull when s is 0. - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]