Re: The PKC-only application security model ...

2008-07-24 Thread Anne & Lynn Wheeler

Thierry Moreau wrote:
In draft-ietf-sip-dtls-srtp-framework, the detailed scheme uses 
self-signed certificates created by client end-entities themselves. 
The basic idea is identical. At the detailed level in my document, the 
client end-entity "auto-issues" a security certificate with a 
"breached" CA private key.


In the TLS Certificate request message, a list of CA distinguished 
names is provided to the end entity. Referring to a "breached" CA 
public key is an invitation to submit a meaningless end-entity 
certificate, making the detailed scheme "more plain" with respect to 
TLS options (i.e. an empty list in a certificate request message could 
be a not so well supported mode in TLS software implementations).


So, maybe the reference to the notion of self-signed EE certificates 
in draft-ietf-sip-dtls-srtp-framework could be replaced by 
"meaningless EE certificates" (or something else), which would include 
both self-signed or auto-issued. In such a case, the RFC publication 
for my document would become more pressing.


A related discussion occurred on the IETK PKIX mailing list in June 
2008 under the subject "RFC 5280 Question".



re:
http://www.garlic.com/~lynn/2008k.html#48 The PKC-only application 
security model
http://www.garlic.com/~lynn/2008k.html#49 The PKC-only application 
security model
http://www.garlic.com/~lynn/2008k.html#51 The PKC-only application 
security model


another approach that X9 financial standard organization took to attempt 
the enormous
digital certificate bloat was standards effort for "compressed" digital 
signature ...
possibly reducing  100-times bloat to possibly only 5 to 10 times bloat. 
There
was some conjecture that such "lightweight" digital certificates might 
also find

place in wireless applications.

part of compression effort was to recognize that the server already had much
of the information was exactly the same in every certificate and/or the 
server

already possessed.

I raised the issue (rather than harping on the theme that digital 
certificates
being redundant and superfluous ... besides 100 times bloat)  that 
(for all the
situations they were looking at) the server already had all the 
information in a digital
certificate. Therefor, it would be possible to define a new class of 
zero byte
digital certificates that would be appended to every digitally signed 
transaction.


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


AppleID Security

2008-07-24 Thread Alec Muffett

Disclaimer: Yes, I am referenced, but I've been blarting about this for nearly 
two years now, and nobody's paid the slighest notice before; the matter of 
making website security both a) easy and b) better can now only become *more* 
urgent.

http://www.theregister.co.uk/2008/07/24/apple_id_fraud/

- alec

ps: hello again everyone; long time no see.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: The PKC-only application security model ...

2008-07-24 Thread Thierry Moreau



Tom Scavo wrote:


On Wed, Jul 23, 2008 at 6:32 PM, Thierry Moreau
<[EMAIL PROTECTED]> wrote:


The document I published on my web site today is focused on fielding
certificateless public operations with the TLS protocol which does not
support client public keys without certificates - hence the meaningless
security certificate.



As such, your document is directly applicable to a proposed standard
that is now winding its way through the OASIS process:

http://wiki.oasis-open.org/security/SamlHoKWebSSOProfile

The proponents of this variant of SAML Web Browser SSO have no
interest in an online database of public keys, but your profile is
relevant nonetheless, for its interoperability aspects.


Thanks, I will look into this.


You mentioned earlier that this may become an IETF RFC.  Do I take
this to mean that your company holds no patent, copyright, trademark
or license rights that would prevent us from relying on your profile?


Neither patent nor patent application for the matter contained in the 
referenced document.


--

- Thierry Moreau

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: The PKC-only application security model ...

2008-07-24 Thread Thierry Moreau



Eric Rescorla wrote:


At Wed, 23 Jul 2008 17:32:02 -0500,
Thierry Moreau wrote:




Anne & Lynn Wheeler wrote about various flavors of certificateless 
public key operation in various standards, notably in the financial 
industry.


Thanks for reporting those.

No doubt that certificateless public key operation is neither new nor 
absence from today's scene.


The document I published on my web site today is focused on fielding 
certificateless public operations with the TLS protocol which does not 
support client public keys without certificates - hence the meaningless 
security certificate. Nothing fancy in this technique, just a small 
contribution with the hope to facilitate the use of client-side PKC.



DTLS-SRTP 
(http://tools.ietf.org/html/draft-ietf-sip-dtls-srtp-framework-02,

http://tools.ietf.org/html/draft-ietf-avt-dtls-srtp)
uses a similar technique: certificates solely as a key 
carrier authenticated by an out-of-band exchange.




In draft-ietf-sip-dtls-srtp-framework, the detailed scheme uses 
self-signed certificates created by client end-entities themselves. The 
basic idea is identical. At the detailed level in my document, the 
client end-entity "auto-issues" a security certificate with a "breached" 
CA private key.


In the TLS Certificate request message, a list of CA distinguished names 
is provided to the end entity. Referring to a "breached" CA public key 
is an invitation to submit a meaningless end-entity certificate, making 
the detailed scheme "more plain" with respect to TLS options (i.e. an 
empty list in a certificate request message could be a not so well 
supported mode in TLS software implementations).


So, maybe the reference to the notion of self-signed EE certificates in 
draft-ietf-sip-dtls-srtp-framework could be replaced by "meaningless EE 
certificates" (or something else), which would include both self-signed 
or auto-issued. In such a case, the RFC publication for my document 
would become more pressing.


A related discussion occurred on the IETK PKIX mailing list in June 2008 
under the subject "RFC 5280 Question".


Regards,


--

- Thierry Moreau

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: The PKC-only application security model ...

2008-07-24 Thread Tom Scavo
On Wed, Jul 23, 2008 at 6:32 PM, Thierry Moreau
<[EMAIL PROTECTED]> wrote:
>
> The document I published on my web site today is focused on fielding
> certificateless public operations with the TLS protocol which does not
> support client public keys without certificates - hence the meaningless
> security certificate.

As such, your document is directly applicable to a proposed standard
that is now winding its way through the OASIS process:

http://wiki.oasis-open.org/security/SamlHoKWebSSOProfile

The proponents of this variant of SAML Web Browser SSO have no
interest in an online database of public keys, but your profile is
relevant nonetheless, for its interoperability aspects.

You mentioned earlier that this may become an IETF RFC.  Do I take
this to mean that your company holds no patent, copyright, trademark
or license rights that would prevent us from relying on your profile?

Thanks,

Tom Scavo
NCSA

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: The PKC-only application security model ...

2008-07-24 Thread Eric Rescorla
At Wed, 23 Jul 2008 17:32:02 -0500,
Thierry Moreau wrote:
> 
> 
> 
> Anne & Lynn Wheeler wrote about various flavors of certificateless 
> public key operation in various standards, notably in the financial 
> industry.
> 
> Thanks for reporting those.
> 
> No doubt that certificateless public key operation is neither new nor 
> absence from today's scene.
> 
> The document I published on my web site today is focused on fielding 
> certificateless public operations with the TLS protocol which does not 
> support client public keys without certificates - hence the meaningless 
> security certificate. Nothing fancy in this technique, just a small 
> contribution with the hope to facilitate the use of client-side PKC.

DTLS-SRTP 
(http://tools.ietf.org/html/draft-ietf-sip-dtls-srtp-framework-02,
http://tools.ietf.org/html/draft-ietf-avt-dtls-srtp)
uses a similar technique: certificates solely as a key 
carrier authenticated by an out-of-band exchange.

-Ekr

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: The PKC-only application security model ...

2008-07-24 Thread Anne & Lynn Wheeler

Thierry Moreau wrote:
Anne & Lynn Wheeler wrote about various flavors of certificateless 
public key operation in various standards, notably in the financial 
industry.


Thanks for reporting those.

No doubt that certificateless public key operation is neither new nor 
absence from today's scene.


The document I published on my web site today is focused on fielding 
certificateless public operations with the TLS protocol which does not 
support client public keys without certificates - hence the 
meaningless security certificate. Nothing fancy in this technique, 
just a small contribution with the hope to facilitate the use of 
client-side PKC.


this post references scenario for replacing the SSL server domain name 
certificates with a certificate-less public key infrastructure
http://www.garlic.com/~lynn/2008k.html#49 The PKC-only application 
security model


the first reply
http://www.garlic.com/~lynn/2008k.html#48 The PKC-only application 
security model


mentions certificate-less X9.59 (financial transaction), 
certificate-less KERBEROS (large number of infrastructure and 
application authentication operation) and certificate-less RADIUS 
(possibly dominant client authentication infrastructure in the world 
today used by lots of ISP, corporate intranets, webhosting operations, etc).


RADIUS provides a generalized authentication, authorization, and 
accounting infrastructure ... where AAA specifics can be specified on an 
account or client basis (i.e. including being able to easily 
accomodating both password and public key concurrently).

http://www.garlic.com/~lynn/subpubkey.html#radius

There are even RADIUS "plug-ins" for webservers for doing webserver 
client authentication.


A combination of replacing SSL server domain name certificates with 
certificate-less server operation and
and using certifcate-less RADIUS (client) authentication ... covers 
mutual (client & server) operation.


RADIUS references from our rfc index:
http://www.garlic.com/~lynn/rfcietff.htm

click on "Term (term->RFC#)" field and then click on "RADIUS" (in the 
"Acronym fastpath"):


Remote authentication dial in user service (RADIUS)
see also authentication , network access server , network services
5176 5090 5080 5030 4849 4818 4679 4675 4673 4672 4671 4670 4669 4668
4603 4590 4372 4014 3580 3579 3576 3575 3162 2882 2869 2868 2867 2866
2865 2809 2621 2620 2619 2618 2548 2139 2138 2059 2058



clicking on any of the RFC numbers, retrieves the RFC summary in the 
lower frame. Clicking on the ".txt=nnn" field (in a RFC summary) 
retrieves the actual RFC.



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: The PKC-only application security model ...

2008-07-24 Thread Nicolas Williams
On Wed, Jul 23, 2008 at 05:32:02PM -0500, Thierry Moreau wrote:
> The document I published on my web site today is focused on fielding 
> certificateless public operations with the TLS protocol which does not 
> support client public keys without certificates - hence the meaningless 
> security certificate. Nothing fancy in this technique, just a small 
> contribution with the hope to facilitate the use of client-side PKC.

Advice on how to generate self-signed certs for this purpose would be
good for an FYI, or even a BCP.  I don't think we need extensions to any
protocols that support PKI to support bare PK (though some protocols
have both, e.g., IKE).

Nico
-- 

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]