RE: Multiple TAAs

2007-09-10 Thread Black_David
Steve, > >In the specific area of application proxy software verification, > >I'm pushing the complexity of determining whether a TA can > >verify a software package into the PKIX certificate infrastructure > >that can already handle it - I'd like to keep that area of > >functionality out of the

RE: TAA definition

2007-09-06 Thread Black_David
Henry, > > This gets back to the issue I cited earlier, and reiterated several > > times. Each TAA has to have an ability to associate some scope with > > it. This scope may have to be imposed on TAs installed "under" each > > TAA. That way one can use static analysis of TAAs to determine >

RE: Multiple TAAs

2007-09-05 Thread Black_David
Steve, > I agree that if multiple TAAs are completely independent of one > another, the simplest approach is to treat the stores as independent. > > Complexity arises when different TAAs are not completely independent. > If there are relationships among TAAs, then we have to be able to > exp

RE: TAA definition

2007-08-24 Thread Black_David
That's correct, and I'm in favor of calling out the concept of a TSA explicitly in order to avoid some of the confusion we've gotten into on the list. Thanks, --David David L. Black, Senior Technologist EMC Corporation, 176 South St., Hopkint

RE: TAA definition

2007-08-24 Thread Black_David
> >As for the TAA definition, how about: > > > >A Trust Anchor Administrator (TAA) is the entity represented by the trust > >anchor. The TAA controls the private key of the trust anchor. > > A public key with associated crypto parameters and associated > restrictions do not "represent" anyone.

RE: Draft Charter

2007-08-22 Thread Black_David
Frank, > Your "translation" sounds good ;-) > > I just don't understand your concern about tls with pre-shared secret - > kerberos' security would be enhanced when it would deploy that for it's > password-based authN+keyexchange - it seems to me like a better authN > protocol to use for any pass

RE: Draft Charter

2007-08-21 Thread Black_David
> In all cases, we would like to standardize the trust root provisioning > protocol without having to mandate any boots-trapping public key. Just > having the message exchange protocol with standardized formats for the > trust-anchor info including meta-data for the anchor's issuing > constraints

RE: Multiple TAAs

2007-08-18 Thread Black_David
Carl, > Why limit the arrangement such that the contracted service can manage everything? Why not? In particular, I see profound contractual difficulties if the enterprise can't trust the contracted service to manage all the trust anchors - if it's not trusted for that, what else is it not tru

RE: Multiple TAAs

2007-08-18 Thread Black_David
Russ, > At 12:11 PM 8/17/2007, [EMAIL PROTECTED] wrote: > >My preference is that managing different privileges for multiple > >TAAs administering the same trust anchor store ought to be out of > >scope, unless someone has a compelling use case with which to argue > >otherwise. > > I think we nee

Multiple TAAs

2007-08-17 Thread Black_David
I want to expand on something I said at the microphone in Chicago - I think the easiest (and likely to be the most common) solution to multiple TAAs that don't have the same management privileges is separate trust anchor stores and that an operational model of all TAAs for a trust anchor store ha