Brian,

I see that Richard already commented on part of your DH message, but to close the loop:

- DH uses public keys. no need for quotes here, as they are completely analogous to public keys for other asymmetric algorithms.

- what you described is ephemeral DH. it is one version of DH, and not the one originally envisioned by Whit and Marty when the invented this alg. (Their initial proposal called for long-lived DH keys, because they wanted to bind the public keys to people, for authentication.)

- static DH keys are used in certs. one way to use TLS with DH is based on cert-based DH keys. SMIME supports static-static and static-ephemeral DH modes (RFC 2631), but there is no pure ephemeral mode for SMIME, for obvious reasons. so, in a number of IETF contexts, DH is not used in a purely ephemeral fashion.

- not all PKIs use long-lived certs, c.f., RFC 3280 (proxy certs). I am familiar with at least one large PKI-based system where a cert is distributed to each user with a one-time-use limitation, as part of a secure provisioning scheme. so, even when a key is in a cert, that does not imply that it has a long lifetime.

- in some PKI contexts, very few certs are published, e.g., the typical TLS context. Here the TAs (which need not be certs) are published via browser distribution, but server certs (and client certs, when employed) are pushed inline. The same can be true for SMIME certs used to verify sigs, i.e., they can be passed inline vs. published. so,


I was not able to follow the proposal you outlined in your long message about using hash values and nonces distributed via DNSSEC. However, I would agree with Ross's comment, i.e. any secret value used in the computation of a hash chain is the moral equivalent of a private/secret key. Thus compromise of that per-router secret also will have adverse consequences. I also will note that non-repudiation is not the required security service in this context. One needs broadcast authentication, a service offered by digital signatures. The authentication is "broadcast" in that an AS does not know all of the other ASes that will have to verify a sig (of whatever form) on an update.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to