Re: [cryptography] PKI - and the threat model is ...?

2011-09-13 Thread Ben Laurie
On Tue, Sep 13, 2011 at 12:36 PM, wrote: > >  | >  | let's take just one of the above as an example: high-value monetary >  | transactions - the only item in the list that I am somewhat familiar >  | with. >  | >  | I can not think of a single scenario where the two parties that do >  | that, pre

Re: [cryptography] PKI - and the threat model is ...?

2011-09-13 Thread dan
| | let's take just one of the above as an example: high-value monetary | transactions - the only item in the list that I am somewhat familiar | with. | | I can not think of a single scenario where the two parties that do | that, prefer a trust chain that includes a third party for introd

Re: [cryptography] PKI - and the threat model is ...?

2011-09-13 Thread M.R.
On 12/09/11 19:12, Marsh Ray wrote: On 09/12/2011 01:45 PM, M.R. wrote: The system is not expected to protect individual liberty, life or limb, nor is it expected to protect high-value monetary transactions, intellectual property assets, state secrets or critical civic infrastructure operations.

Re: [cryptography] PKI - and the threat model is ...?

2011-09-12 Thread Marsh Ray
On 09/12/2011 02:50 PM, Ian G wrote: On 13/09/2011, at 5:12, Marsh Ray wrote: It never was, and yet, it is asked to do that routinely today. This is where threat modeling falls flat. The more generally useful a communications facility that you develop, the less knowledge and control the eng

Re: [cryptography] PKI - and the threat model is ...?

2011-09-12 Thread Ian G
On 13/09/2011, at 5:12, Marsh Ray wrote: > It never was, and yet, it is asked to do that routinely today. > > This is where threat modeling falls flat. > > The more generally useful a communications facility that you develop, the > less knowledge and control the engineer has about the condit

Re: [cryptography] PKI - and the threat model is ...?

2011-09-12 Thread Marsh Ray
On 09/12/2011 01:45 PM, M.R. wrote: The system is not expected to protect individual liberty, life or limb, nor is it expected to protect high-value monetary transactions, intellectual property assets, state secrets or critical civic infrastructure operations. It never was, and yet, it is asked

Re: [cryptography] PKI - and the threat model is ...?

2011-09-12 Thread M.R.
In my, rather mundane world of corporate security, the threat model must answer (at the very least) the following questions: 1) What is the upper bound of the loss of protected asset? 2) Who is the attacker and what are his capabilities? 3) What is the estimated cost of mounting a successful at

Re: [cryptography] PKI - and the threat model is ...?

2011-09-12 Thread Ian G
On 13/09/2011, at 0:15, "M.R." wrote: > In these long and extensive discussions about "fixing PKI" there > seems to be a fair degree of agreement that one of the reasons > for the current difficulties is the fact that there was no precisely > defined threat model, documented and agreed upon ~be

Re: [cryptography] PKI - and the threat model is ...?

2011-09-12 Thread dan
M.R., > In these long and extensive discussions about "fixing PKI" there > seems to be a fair degree of agreement that one of the reasons > for the current difficulties is the fact that there was no precisely > defined threat model, documented and agreed upon ~before~ the > "SSL system" was desig

Re: [cryptography] PKI - and the threat model is ...?

2011-09-12 Thread Jon Callas
On Sep 12, 2011, at 7:15 AM, M.R. wrote: > In these long and extensive discussions about "fixing PKI" there > seems to be a fair degree of agreement that one of the reasons > for the current difficulties is the fact that there was no precisely > defined threat model, documented and agreed upon ~b

[cryptography] PKI - and the threat model is ...?

2011-09-12 Thread M.R.
In these long and extensive discussions about "fixing PKI" there seems to be a fair degree of agreement that one of the reasons for the current difficulties is the fact that there was no precisely defined threat model, documented and agreed upon ~before~ the "SSL system" was designed and deployed.