Joe Abley wrote:
On 25-Aug-2009, at 12:48, Todd Glassey wrote:
If there *is* a practical motivation to roll keys, then let's not
infer any trust at all from old keys.
I agree that if a KEY is rolled it needs to have its application as a
reliable TRUST ANCHOR revoked or terminated for events moving forward
- but it still needs to be available for reviewing and re-certifying
events from a forensic viewpoint. It *(the rolled key) still needs to
be rolled so that requirement is still real.
This is all very interesting speculation, but I'm not sure I
understand how the use of old keys for forensic purposes relates to
the problem of trying to establish a new trust anchor after a period
of disconnection.
Joe THIS IS NOT SPECULATION... its preparing for Court which is what
ALL log management is about - and that's not arguable. Therein we also
see this
http://www.latimes.com/news/nationworld/nation/la-na-crime-labs26-2009jul26,0,420958.story
which is a unique story on how our work as technologists can easily be
called into and challenged in Court's of law - specifically in criminal
prosecutions.
Sorry - the Court's now allow the taking apart of the Wizard in Court to
figure whether the Wizard is just another jerk-off or actually has some
magic. So that changes the totality of the reporting models. That said -
both things are critical - the managing of the change-log of the Key and
the re-issuance process.
Todd
Joe
------------------------------------------------------------------------
No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.5.409 / Virus Database: 270.13.66/2325 - Release Date: 08/25/09 06:08:00
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop