RE: Multiple TAAs

2007-09-11 Thread Stephen Kent
At 4:30 PM -0400 9/10/07, [EMAIL PROTECTED] wrote: Steve, >In the specific area of application proxy software verification, >I'm pushing the complexity of determining whether a TA can >verify a software package into the PKIX certificate infrastructure >that can already handle it - I'd like

RE: Multiple TAAs

2007-09-11 Thread Stephen Kent
will want to install TAs that are constrained in what they are used to verify, which is consistent with the need to interpret TA data to enforce such constraints. However, this is perhaps orthogonal to a technically sound TAM solution (which should allow the Enterprise to designate multiple TAAs

RE: Multiple TAAs

2007-09-10 Thread Thomas Hardjono
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > Stephen Kent > Sent: Monday, September 10, 2007 12:13 PM > To: [EMAIL PROTECTED] > Cc: ietf-trust-anchor@vpnc.org > Subject: RE: Multiple TAAs > . > > > &

RE: Multiple TAAs

2007-09-10 Thread Black_David
Steve, > >In the specific area of application proxy software verification, > >I'm pushing the complexity of determining whether a TA can > >verify a software package into the PKIX certificate infrastructure > >that can already handle it - I'd like to keep that area of > >functionality out of the

RE: Multiple TAAs

2007-09-10 Thread Stephen Kent
... Ok, here's that example: For example, imagine a security device that implements IPsec but also incorporates application layer proxies as well. The device vendor is the only authorized source for the IPsec software. One or more other vendors are authorized sources for the application la

RE: Multiple TAAs

2007-09-05 Thread Black_David
Steve, > I agree that if multiple TAAs are completely independent of one > another, the simplest approach is to treat the stores as independent. > > Complexity arises when different TAAs are not completely independent. > If there are relationships among TAAs, then we hav

Re: Multiple TAAs

2007-09-04 Thread Stephen Kent
David, I agree that if multiple TAAs are completely independent of one another, the simplest approach is to treat the stores as independent. Complexity arises when different TAAs are not completely independent. If there are relationships among TAAs, then we have to be able to express the

RE: Multiple TAAs

2007-08-18 Thread Russ Housley
ld be very useful to constrain the applications that the delegated-to trust anchor could impact. Russ Carl Wallace wrote:   > > At 12:11 PM 8/17/2007, [EMAIL PROTECTED] wrote: > > >My preference is that managing different privileges for > multiple TAAs > > >administe

RE: Multiple TAAs

2007-08-18 Thread Russ Housley
David: I think we have reached agreement on the vast bulk of the things in my message and your reply. One exception: One more item. Russ wrote: > I see no reason for there to me more than one all-powerful TA as > long as the all-powerful TA can be used to make updates to the > all-powerfu

RE: Multiple TAAs

2007-08-18 Thread Black_David
-- From: Carl Wallace [mailto:[EMAIL PROTECTED] Sent: Saturday, August 18, 2007 2:36 PM To: [EMAIL PROTECTED]; Black, David Cc: ietf-trust-anchor@vpnc.org Subject: RE: Multiple TAAs

RE: Multiple TAAs

2007-08-18 Thread Carl Wallace
> > At 12:11 PM 8/17/2007, [EMAIL PROTECTED] wrote: > > >My preference is that managing different privileges for > multiple TAAs > > >administering the same trust anchor store ought to be out > of scope, > > >unless someone has a compelling use c

RE: Multiple TAAs

2007-08-18 Thread Black_David
Russ, > At 12:11 PM 8/17/2007, [EMAIL PROTECTED] wrote: > >My preference is that managing different privileges for multiple > >TAAs administering the same trust anchor store ought to be out of > >scope, unless someone has a compelling use case with which to argue > &g

Re: Multiple TAAs

2007-08-17 Thread Yoav Nir
ggested, that the IT department appoint itself as the one and only TAA and then repeat all of Microsoft's changes, may be the way enterprises choose to handle this (either that or outsourcing it like all other IT). but then you don't need multiple TAAs at all. You may want to allow

Re: Multiple TAAs

2007-08-17 Thread Russ Housley
PROTECTED] wrote: My preference is that managing different privileges for multiple TAAs administering the same trust anchor store ought to be out of scope, unless someone has a compelling use case with which to argue otherwise.

Multiple TAAs

2007-08-17 Thread Black_David
I want to expand on something I said at the microphone in Chicago - I think the easiest (and likely to be the most common) solution to multiple TAAs that don't have the same management privileges is separate trust anchor stores and that an operational model of all TAAs for a trust anchor