Frank,

In your scenario, it seems you do not need trust anchor albeit it is not
clear how communication to online CA is secured and how trust is
extended beyond on-line CA.

You say, "In those cases, there already are ways to establish a secure
authenticated communication context with a trust-anchor provisioning
service".  What is this trust-anchor provisioning service; what is trust
anchor contents in your context; Is the trust anchor local, enterprise
wide or covers multiple enterprises; and how do you (I assume meaning
client or relying parties) establish secure authenticated communication
with the trust-anchor provisioning service.

-----Original Message-----
From: Frank Siebenlist [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, August 21, 2007 11:12 AM
To: Santosh Chokhani
Cc: ietf-trust-anchor@vpnc.org
Subject: Re: Draft Charter

In our deployments, we see more and more that PKI is not the primary
authentication mechanism and that online-CAs are used to obtain
pk-credentials, which means that this pki-trust is derived from other
already pre-configured primary authentication mechanisms, like shared
secrets, username/password, kerberos, OTP, etc.

In those cases, there already are ways to establish a secure
authenticated communication context with a trust-anchor provisioning
service, and the requirement to use only public key and dsig is not very
"helpful" in those scenarios.

-FS.


Santosh Chokhani wrote:
> Frank,
> 
> I agree with Steve.  I will be willing to expand the notion a bit.
But,
> in my thinking this deals with cryptographic protocols.  These
protocols
> require a public or secret key to establish the trust for
authentication
> and integrity checks.  Thus, it must be a key.  As it so happens, we
> have been dealing with PKI related matters and hence the starting key
> for authentication and integrity is a public key.
> 
> In short, any idea for trust anchor that does not deal with a crypto
key
> is a loser from crypto viewpoint.
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Frank
> Siebenlist
> Sent: Tuesday, August 21, 2007 1:40 AM
> To: Paul Hoffman
> Cc: Stephen Kent; Carl Wallace; ietf-trust-anchor@vpnc.org
> Subject: Re: Draft Charter
> 
> 
> Too bad as in general the overall policy enforcement requires other
> "trust anchors", "roots of trust", "assertion authorities", to be
> pre-configured, like attribute- and authorization authorities.
> 
> Furthermore, it also would disallow the use of other authentication
and
> key exchange mechanism to bootstrap from, like
> secure-password/shared-secret protocols with online CAs, in which case
> there would be no need for any trust-anchor's public key and no
digital
> signature.
> 
> Just to support x509/pkix style identity certs based on only public
keys
> and only dsigs makes it just as "useful" as x509/pkix... maybe this
> trust-anchor protocol shouldn't deserve its own wg and should instead
be
> used to "revive" pkix as it clearly deals with a deficiency not
> addressed in pkix's gazillion rfcs ;-)
> 
> -FS.
> 
> 
> 
> Paul Hoffman wrote:
>> At 9:26 PM -0400 8/20/07, Stephen Kent wrote:
>>> The notion of trust anchors has been, for the last 15 years or so, a
>>> purely public key notion.  So yes, I would argue that if we want to
>>> work on what it going to be called a trust anchor management
> protocol,
>>> it needs to be based on public keys and signature validation.  If
>>> folks want to do something else, make up a new name, this one is
> taken
>>> :-).
>> I agree with Steve. Everyone involved so far has been talking about
>> public keys, which if nothing else shows that this is the common
> theme.
>> --Paul Hoffman, Director
>> --VPN Consortium
>>
> 

-- 
Frank Siebenlist               [EMAIL PROTECTED]
The Globus Alliance - Argonne National Laboratory

Reply via email to