Fwd: Re: Crypographically Strong Software Distribution HOWTO

2001-07-07 Thread Greg Broiles
: Rodney Thayer [EMAIL PROTECTED] Subject: Re: Crypographically Strong Software Distribution HOWTO (I can't tell where the signal and where the noise is in this thread, so I'll just say this to you, feel free to forward.) PKIX and it's legacy ancestor, X.509, have a 'revocation reason' field

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread Greg Broiles
At 02:13 PM 7/3/2001 -0400, V. Alex Brennen wrote: In the case of such a large project, perhaps you could issue a separate role key pair to each developer and generate revocation certificates which are held by the core group for those keys. When a developer leaves the group, the revocation

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread V. Alex Brennen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, 3 Jul 2001, Greg Broiles wrote: At 02:13 PM 7/3/2001 -0400, V. Alex Brennen wrote: In the case of such a large project, perhaps you could issue a separate role key pair to each developer and generate revocation certificates which are

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread Rich Salz
Oh? How? All you are suggesting is that the role key is held by a CA - well, who is that going to be, then? Unh, no. The same way the ASF determines who gets commit access could be teh same way the ASF determines who their CA will give release-signing keys to. The same way the ASF takes away

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread V. Alex Brennen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, 3 Jul 2001, Ben Laurie wrote: What this does not address is the common situation where the distribution gets signed by a different person each time (example: Apache). I had hoped the suggestion to identify a release master was

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread Ben Laurie
Rich Salz wrote: Oh? How? All you are suggesting is that the role key is held by a CA - well, who is that going to be, then? Unh, no. The same way the ASF determines who gets commit access could be teh same way the ASF determines who their CA will give release-signing keys to. The

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread Rich Salz
What this does not address is the common situation where the distribution gets signed by a different person each time (example: Apache). I've put some pretty serious thought into this problem and come to a few conclusions. The obvious answer is use a role key. All that work... when a

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread Ben Laurie
V. Alex Brennen wrote: In the case of such a large project, perhaps you could issue a separate role key pair to each developer and generate revocation certificates which are held by the core group for those keys. When a developer leaves the group, the revocation certificate for his key would

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread V. Alex Brennen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, 3 Jul 2001, Ben Laurie wrote: I think it would be good to see the Apache Project make a policy as to request (require) the signature of releases by the individual responsible for the release. It would also be good to ask apache core

Re: Crypographically Strong Software Distribution HOWTO

2001-07-03 Thread Ask Bjoern Hansen
On Tue, 3 Jul 2001, Rich Salz wrote: So how does this work in practice? Who controls commit access? What mechanisms protect that? The same mechanisms that protect *the source* can be the same mechanisms that protect *the release.* I believe we have a greater need for protecting the

Re: Crypographically Strong Software Distribution HOWTO

2001-07-02 Thread Kent Crispin
On Mon, Jul 02, 2001 at 04:37:00PM -0400, Rich Salz wrote: I've written a HOWTO on the cryptographically strong distribution of computer software. Any constructive criticism would be appreciated. Seems pretty nice; thanks for doing this. Any chance of using SHA1 instead of MD5? MD5

Re: Crypographically Strong Software Distribution HOWTO

2001-07-02 Thread Jon Callas
In our last episode (Re: Crypographically Strong Software Distribution HOWTO, shown on 7/2/01), Kent Crispin said: Any references for either the weaknesses of md5, or what the IETF has to say on the issue? Hans Dobbertin found some weaknesses in MD5 in 1996. I found two quickie references

Re: Crypographically Strong Software Distribution HOWTO

2001-07-02 Thread Bram Cohen
On Mon, 2 Jul 2001, Jon Callas wrote: The answer is that you SHOULD (in IETF terms, see RFC 2119, http://www.ietf.org/rfc/rfc2119.txt for a definition of MAY, SHOULD, MUST, etc.) That document clarifies nothing, it might as well say the following - 1. MUST This word, or the terms REQUIRED

Re: Crypographically Strong Software Distribution HOWTO

2001-07-02 Thread Sandy Harris
Jon Callas wrote: Hans Dobbertin found some weaknesses in MD5 in 1996. I found two quickie references, a note by Dobbertin on the issue: http://www.math.ohio-state.edu/~fiedorow/PGP/MD5_discussion and his paper on the weaknesses: http://www.cs.ucsd.edu/users/bsy/dobbertin.ps The

Re: Crypographically Strong Software Distribution HOWTO

2001-07-02 Thread Bill Frantz
I've written a HOWTO on the cryptographically strong distribution of computer software. Any constructive criticism would be appreciated. I hope to standardize the use of this model in the GNU/Linux free software community. You can find the HOWTO here:

Re: Crypographically Strong Software Distribution HOWTO

2001-07-02 Thread Don Davis
Hans Dobbertin found some weaknesses in MD5 in 1996. Also note that RFC 2104 on the HMAC construction used in IPSEC explicitly cites Dobbertin and says the attack does not apply: this is because dobbertin's attack works only against message-digest applications of md5; his attack doesn't work