Joe Abley wrote:

On 25-Aug-2009, at 12:48, Todd Glassey wrote:

If there *is* a practical motivation to roll keys, then let's not infer any trust at all from old keys.
I agree that if a KEY is rolled it needs to have its application as a reliable TRUST ANCHOR revoked or terminated for events moving forward - but it still needs to be available for reviewing and re-certifying events from a forensic viewpoint. It *(the rolled key) still needs to be rolled so that requirement is still real.

This is all very interesting speculation, but I'm not sure I understand how the use of old keys for forensic purposes relates to the problem of trying to establish a new trust anchor after a period of disconnection.

Joe THIS IS NOT SPECULATION... its preparing for Court which is what ALL log management is about - and that's not arguable. Therein we also see this http://www.latimes.com/news/nationworld/nation/la-na-crime-labs26-2009jul26,0,420958.story which is a unique story on how our work as technologists can easily be called into and challenged in Court's of law - specifically in criminal prosecutions.

Sorry - the Court's now allow the taking apart of the Wizard in Court to figure whether the Wizard is just another jerk-off or actually has some magic. So that changes the totality of the reporting models. That said - both things are critical - the managing of the change-log of the Key and the re-issuance process.

Todd




Joe
------------------------------------------------------------------------


No virus found in this incoming message.
Checked by AVG - www.avg.com Version: 8.5.409 / Virus Database: 270.13.66/2325 - Release Date: 08/25/09 06:08:00


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to