Joe Abley wrote:

On 25-Aug-2009, at 10:53, Todd Glassey wrote:

Joe - the question becomes one of the integrity of the records process

Yes, that's my point.
But your point is as a Systems Administrator rather than a Systems Auditor - the reasons for rolling the keys periodically pertain to Security Policy and the Practice which implements it.

That said there are all kinds of PKI Operations Practice reasons including "its part of our policy to roll keys periodically"

If there's no practical motivation to roll keys, then let's not do it. Rolling keys is a pain.
That's because of the design of the technical system - and if the policy controls specific to the use model had been designed before the protocol was implemented this wouldn't be so hard.

If there *is* a practical motivation to roll keys, then let's not infer any trust at all from old keys.
I agree that if a KEY is rolled it needs to have its application as a reliable TRUST ANCHOR revoked or terminated for events moving forward - but it still needs to be available for reviewing and re-certifying events from a forensic viewpoint. It *(the rolled key) still needs to be rolled so that requirement is still real.

Todd


Joe

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
------------------------------------------------------------------------


No virus found in this incoming message.
Checked by AVG - www.avg.com Version: 8.5.409 / Virus Database: 270.13.65/2324 - Release Date: 08/24/09 12:55:00


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to