The editor of this document is again making it clear that he intends to ignore input from the working group if what the working group wants for the document is different from what he wants.

The so-called analogies below have nothing at all to do with the attack scenario that is supposed to be described in the text. The only thing that comes even close is:
This is analogous to an attacker providing different contact info (postal and e-mail addresses, etc.), while using the same CA name and the same key.

There is nothing in the attack scenario that involves the attacker providing different contact info to the two CAs from which it is trying to get CA certificates, but providing different contact info doesn't make the CA that the attacker is operating into two CAs.

I could provide text describing the attack scenario that would be both technically correct and much easier to understand than what is currently in the document. However, there would be no point in my spending time writing something like that at the moment, as the current document editor has made it very clear that any such input would be ignored.

On 07/28/2016 10:00 AM, Stephen Kent wrote:
David,

Unfortunately, I must yet again point out that there has still been no attempt to address the issues that I and a few others have pointed out with this document.

I have explained on multiple occasions that it is both technically incorrect and confusing to refer to the attack as involving two CAs with the same name and key.
You have made this statement several times, but I do not recall you citing specific text from 5280 that supports your contention.

Although analogies are always imperfect, I'll propose two as a basis for rejecting your assertion.

1. When a person is the victim of identity theft, this is analogous to an attacker compromising the key of an extant CA and using it to create a CA instance with the same name and key as the targeted CA. We do not say that the identity thief is the same person as the victim, even though that is the goal of the identity thief. We recognize that, in the physical world, they are two different entities, even if the identity thief appears to be identical to the victim in the eyes of banks, government agencies, etc.

2. If an animal is cloned, the resulting offspring may be identical in appearance and genetics. Yet the clones are distinct animals, not one animal. Again, there is one animal only if one chooses to view the animal as beign defined by its appearance and genes, rather that physical world presence. This is analogous to an attacker providing different contact info (postal and e-mail addresses, etc.), while using the same CA name and the same key. These appear as two CAs as far as the CAs that issue certs to these entities are concerned.

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to