this x.509, pki, etc was outgrowth of the iso x.400/x.50x stuff ... that was, in turn, continuation of the iso osi stuff.
i don't have a lot of references to the x.50x stuff from the 80s. i was involved in trying to get hsp (high-speed protocol) standards work accepted by x3s3.3 (iso chartered us standards group for networking related stuff). remember that this iso osi stuff was being mandated by a number of govs. (including us federal) along with mandates eliminating tcp/ip and the internet. now, i've stumbled across some old email from 85 era discussion public key and digital signature technology ... but can't find any specific on PKI and x.509. however the x3s3.3 stuff with relationship to iso was interesting. iso had some mandate that standards work woujldn't be accepted for stuff that violated the osi model. http://www.garlic.com/~lynn/subnetwork.html#xtphsp unfortunately, hsp 1) went directly from the level4/transport interface directly to the LAN/MAC interface ... bypassing the level4/level3 (transport/network) interface. this violated osi model and so couldn't be considered for iso standards work 2) support internetworking protocol ... aka the stuff that allowed the internetworking of different networks. internetworking doesn't exist in the osi model ... so supporting tcp/ip also violated osi model and couldn't be considered for iso standards work 3) talked directly to the lan/mac interface. lan/mac definition sits approx. in the middle of osi level 3 ... and violates the osi model. so anything that supports lan/mac interface also violate the osi model ... and therefor can't be considered. now i had done some work on the original relational/sql database http://www.garlic.com/subtopic.html#systemr and in the early 90s were producing the ha/cmp product http://www.garlic.com/~lynn/subtopic.html#hacmp which included doing some work on parallel scaleup. minor meeting reference regarding parallel oracle scaleup http://www.garlic.com/~lynn/95.html#13 so i think it was at the (92?) acm sigmod database in san jose ... that somebody was trying to explain the x.500/x.509 stuff that was going on ... as ... a bunch of networking engineers trying to reinvent 1960s database technology. a couple years later were were doing some financial consulting and were asked to work with a small client/server start up in menlo park on doing payment transactions and something called a payment gateway that was going to turn into something that is frequently referred today as e-commerce. who turns up at this startup responsible for this thing called a commerce server ... but a couple of the people that were in the above mentioned meeting looking at parallel scaleup http://www.garlic.com/~lynn/aadsm5.htm#asrn2 http://www.garlic.com/~lynn/aadsm5.htm#asrn3 now, one of the things we had to do as part of this stuff that was going to be called e-commerce was go around and do audits of some of these new organizations that were calling themselves certification authorities ... who would be issuing these things called ssl domain name cerver certificates. misc. collected postings on ssl domain name server certificates http://www.garlic.com/~lynn/subpubkey.html#sslcert now x.500/dap has somewhat evaporated ("1960s database technollogy being re-invented by network engineers")... being replaced with something called ldap ... or leight-weight dap. and x.509 ... which was going reference some amount of x.500 has taken on a life of its own. however, the original design point for x.509 is still to provide relying parties with information about the original entity performing a digital signature ... when the relying party has no other recourse to information about the originator (aka the first time communication between complete strangers). however, it can be claimed that the original target market segment for first time communication between two strangers, where the relying-party has no other recourse for information about the other party (because of no previous contact or unable to directly contact some certification authority and/or other authoritative agency about the entity in question) is rapidly disappearing because of the ubiquitous pervasive creep of the internet into all areas of the world. even the no-value market segment ... which some PKIs tried to move into (aka online resources became readily available for relying parties to obtain real time information about the stranger they were interacting with ... there value of the operations couldn't provide cost justification for doing real-time vetting) is also rapidly disappear as the cost of online connectivity rapidly declines. as a result, the market segments where PKIs have some valid justification are rapidly shrinking. pieces of past posts in this thread: http://www.garlic.com/~lynn/2005s.html#49 phishing web sites using self-signed certs http://www.garlic.com/~lynn/2005s.html#49 phishing web sites using self-signed certs http://www.garlic.com/~lynn/2005s.html#52 TTP and KCM it somewhat seemed that x.509 standards work was moving out of ISO and into IETF when it started to appear that the various gov. mandates to eliminate the internet and tcp/ip (and replace them with iso osi, x.400, x.50x, etc) was not going to be succesful. the original pk-init draft for kerberos http://www.garlic.com/~lynn/subpubkey.html#kerberos i.e. allowing public keys to be registered in lieu of passwords and performing digital signature validation for authentication was originally straight-foward, simple authentication process .... http://www.garlic.com/~lynn/subpubkey.html#certless the specification was added later for the use of certificates as part of the digital signature operation ... turning simple, straight-forward authentication operation into a heavy-weight identification operation. if it was a pure x.509 identification implementation, total strangers would be allowed onto every system as long as they were able to present a valid x.509 identity certificate. note that even in a pure x.509 identity certificate environment ... the relying party still needs to have obtained and registered in their trusted public key repository, the public keys for the certification authorities (otherwise the relying parties would not be able to validate the certification authorities digital signatures on the digital certificates ... which is the root operation required for PKI. -- Anne & Lynn Wheeler | http://www.garlic.com/~lynn/ _______________________________________________ mozilla-crypto mailing list mozilla-crypto@mozilla.org http://mail.mozilla.org/listinfo/mozilla-crypto