Re: [therightkey] Will the real RPF please stand up?

2012-02-16 Thread Kyle Hamilton
On Thu, Feb 16, 2012 at 3:11 PM, Stephen Kent wrote: yes, the Federal bridge CA is a bad idea, as implemented. Federal Bridge CA is a much better idea than what we have now. Currently, we have large numbers of absolutely-trusted roots with no controls on them other than ultimate distrust.

Re: [therightkey] Will the real RPF please stand up?

2012-02-16 Thread Phillip Hallam-Baker
Credential equivalence is not for every application. In particular there are cases where you want a user to have exactly one physical credential and that is a part of the security scheme. But I still think that the rule of 'private keys never move outside the device once they are in' is a good one

Re: [therightkey] Will the real RPF please stand up?

2012-02-16 Thread Stephen Kent
At 11:02 PM -0800 2/9/12, Kyle Hamilton wrote: On Wed, Feb 8, 2012 at 9:06 AM, Stephen Kent wrote: So, I don't agree that the distinction between the user and a machine operated by a user is really significant, in the end. (Yes, I am ware of the many security problems that arise because the us

Re: [therightkey] Will the real RPF please stand up?

2012-02-16 Thread Stephen Kent
At 6:12 PM -0800 2/10/12, Kyle Hamilton wrote: On Thu, Feb 9, 2012 at 3:05 PM, Stephen Kent wrote: At 11:29 PM +0100 2/9/12, DIEGO LOPEZ GARCIA wrote: >...and I do agree with you in that whichever entity making such assertion (X.509, SAML, JWT·) has to be authoritative for the identity assert

Re: [therightkey] Will the real RPF please stand up?

2012-02-12 Thread DIEGO LOPEZ GARCIA
On 11 Feb 2012, at 03:12 , Kyle Hamilton wrote: > What are these 'identities' that need to be asserted with authoritative > backing? I hope you're not just talking about state identities, even though > state identity is an important part of it. The current crop of authoritative > information

Re: [therightkey] Will the real RPF please stand up?

2012-02-10 Thread Kyle Hamilton
On Thu, Feb 9, 2012 at 3:05 PM, Stephen Kent wrote: At 11:29 PM +0100 2/9/12, DIEGO LOPEZ GARCIA wrote:  >...and I do agree with you in that whichever entity making such assertion (X.509, SAML, JWTŠ) has to be authoritative for the identity asserted if you want it to be usable. I think we are

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread DIEGO LOPEZ GARCIA
On 10 Feb 2012, at 01:22 , Stephen Kent wrote: >> Or should we just be trusting a certification authority to do what it >> says it will do in its CPS, perhaps just confirming that an email address >> asserted in a certificate request is indeed accessible by the party that's >> requesting a cert wi

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread Kyle Hamilton
On Wed, Feb 8, 2012 at 9:06 AM, Stephen Kent wrote: So, I don't agree that the distinction between the user and a machine operated by a user is really significant, in the end.  (Yes, I am ware of the many security problems that arise because the user doesn't really know what the code is doing,

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread Stephen Kent
At 3:14 PM -0800 2/9/12, Joe St Sauver wrote: Steve commented: #I think we are in agreement. CAs that are not authoritative for asserted #identities are as bad as federated trust entities with similar properties. I tend to be a concrete thinker, so I hope you'll indulge me for a minute in a con

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread Joe St Sauver
Steve commented: #I think we are in agreement. CAs that are not authoritative for asserted #identities are as bad as federated trust entities with similar properties. I tend to be a concrete thinker, so I hope you'll indulge me for a minute in a concrete exercise related to your assertion. -- As

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread Stephen Kent
At 11:29 PM +0100 2/9/12, DIEGO LOPEZ GARCIA wrote: On 8 Feb 2012, at 20:30 , Stephen Kent wrote: >...and I do agree with you in that whichever entity making such assertion (X.509, SAML, JWTŠ) has to be authoritative for the identity asserted if you want it to be usable. I think we are in a

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread DIEGO LOPEZ GARCIA
On 8 Feb 2012, at 20:30 , Stephen Kent wrote: > I think the real issue, which you ay have overlooked in my comments > above, is the notion that the best candidate for a CA is an entity > that is authoritative for the identity asserted in the cert. I cannot agree more with you in that statement. A

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread Stephen Kent
At 8:22 PM -0500 2/8/12, Phillip Hallam-Baker wrote: Alice has three mobile phones and six laptops. Using embedded keys in those devices for authorization is no problem since each device can have a separate private key and the authentication server tracks the fact that there are nine devices tha

Re: [therightkey] Will the real RPF please stand up?

2012-02-09 Thread Stephen Kent
At 2:40 PM -0800 2/8/12, Bill Frantz wrote: On 2/7/12 at 11:55, k...@bbn.com (Stephen Kent) wrote: Keys are not really great identifiers; they change, Keys don't change. People or programs may wish to change the keys they are using, but keys themselves are constant. Touche! You're right, b

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Daniel Kahn Gillmor
On 02/08/2012 08:22 PM, Phillip Hallam-Baker wrote: > Worse, Alice has to repeat the process once a year. Why would Alice have to repeat the process once a year? Are you suggesting she has to replace her decryption key every year? Does this have to do with the "repeat customer" lock-in model op

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Phillip Hallam-Baker
Umm, no, I was showing why end-to-end works for authentication (no need for the same key in every device) but not for S/MIME. The way to make S/MIME practical for Alice would be to do as you suggest and have Alice's private key out there in the cloud somewhere and have the server where it is kept

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Zack Weinberg
On Wed, Feb 8, 2012 at 5:22 PM, Phillip Hallam-Baker wrote: > Alice has three mobile phones and six laptops. ... > Trying to make S/MIME email work in that scenario is futile. The > sender only tracks one private key for Alice. So Alice has to export > her private key to all her S/MIME clients. No

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Phillip Hallam-Baker
Alice has three mobile phones and six laptops. Using embedded keys in those devices for authorization is no problem since each device can have a separate private key and the authentication server tracks the fact that there are nine devices that might authenticate Alice. The same model can even be

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Bill Frantz
On 2/7/12 at 11:55, k...@bbn.com (Stephen Kent) wrote: Keys are not really great identifiers; they change, Keys don't change. People or programs may wish to change the keys they are using, but keys themselves are constant. they are not human meaningful (and thus there has to be another la

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Stephen Kent
At 3:03 PM -0500 2/8/12, Phillip Hallam-Baker wrote: But authentication works in that scenario because the protocols can allow each user to have as many keys as they need. The key is not shared across devices, the protocols allow for multiple cards per end user Sorry, I don't understand you

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Phillip Hallam-Baker
But authentication works in that scenario because the protocols can allow each user to have as many keys as they need. The key is not shared across devices, the protocols allow for multiple cards per end user Sent from my iPad On Feb 8, 2012, at 12:06, Stephen Kent wrote: > At 6:52 PM -050

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Stephen Kent
At 7:56 PM +0100 2/8/12, DIEGO LOPEZ GARCIA wrote: On 8 Feb 2012, at 17:36 , Stephen Kent wrote: In the physical world we recognize that certain entities are authoritative for identifying people or orgs. These entities issue credentials to people and orgs, and these credentials are accepted

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread DIEGO LOPEZ GARCIA
On 8 Feb 2012, at 17:36 , Stephen Kent wrote: > In the physical world we recognize that certain > entities are authoritative for identifying people > or orgs. These entities issue credentials to > people and orgs, and these credentials are > accepted for identification and/or authorization > purpo

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Stephen Kent
At 6:52 PM -0500 2/7/12, Phillip Hallam-Baker wrote: ... The reason I no longer believe in end-to-end solutions is that the endpoint for a public key is always a machine and the desired endpoint is a person. yes, the machine is the endpoint, but machines are always in the loop for the sorts

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Stephen Kent
At 8:52 AM +0100 2/8/12, DIEGO LOPEZ GARCIA wrote: On 7 Feb 2012, at 23:25 , Stephen Kent wrote: federated authentication systems using certs generally seem to be motivated because folks can make cross-certification work properly. other federated auth systems seem to be based on having one or

Re: [therightkey] Will the real RPF please stand up?

2012-02-08 Thread Phillip Hallam-Baker
Yes, STARTTLS is broken in precisely the way I pointed out. BT! Now imagine that we have a mechanism that allows the mail server to state 'TLS is always offered'. The problem can be solved. On Wed, Feb 8, 2012 at 1:12 AM, Martin Rex wrote: > Phillip Hallam-Baker wrote: >> >> In practice m

Re: [therightkey] Will the real RPF please stand up?

2012-02-07 Thread DIEGO LOPEZ GARCIA
On 7 Feb 2012, at 23:25 , Stephen Kent wrote: > federated authentication systems using certs generally seem to be > motivated because folks can make cross-certification work properly. > other federated auth systems seem to be based on having one org trust > another to assert and identity for a use

Re: [therightkey] Will the real RPF please stand up?

2012-02-07 Thread Martin Rex
Phillip Hallam-Baker wrote: > > In practice most email that is sent encrypted is encrypted using TLS. > If we had an infrastructure that allowed mail servers to know that > their corresponding servers required use of TLS, the man in the middle > downgrade attack could be defeated. I'm sorry Phil

Re: [therightkey] Will the real RPF please stand up?

2012-02-07 Thread Ryan Hurst
3:53 PM To: Stephen Kent Cc: Joe St Sauver; therightkey@ietf.org Subject: Re: [therightkey] Will the real RPF please stand up? On Tue, Feb 7, 2012 at 5:25 PM, Stephen Kent wrote: > I think there are multiple reasons why client certs have not taken > off, based on 20+ years of experience

Re: [therightkey] Will the real RPF please stand up?

2012-02-07 Thread Phillip Hallam-Baker
On Tue, Feb 7, 2012 at 5:25 PM, Stephen Kent wrote: > I think there are multiple reasons why client certs have not taken off, > based on 20+ years of experience in the area. We provided a client cert > system for a financial firm in the early 90's. It was easy to use, > bootstrapped from the pass

Re: [therightkey] Will the real RPF please stand up?

2012-02-07 Thread Stephen Kent
At 12:05 PM -0800 2/7/12, Joe St Sauver wrote: ... This is actually a fascinating question, and one where the answer you get for "Why don't people deploy client certs?" varies from person to person. I attempt to capture a little of that in a talk I did a week or so ago at Internet2/ESNet Joint T

Re: [therightkey] Will the real RPF please stand up?

2012-02-07 Thread Joe St Sauver
Kent commented on Kyle Hamilton's remarks... #>Using the same key across multiple places may not seem to be #>something which has turned out to be a problem in practice, in that #>TLS sites use the same keys across every client. However, it's a #>major reason why client-side authentication isn

Re: [therightkey] Will the real RPF please stand up?

2012-02-07 Thread Stephen Kent
At 9:25 PM -0800 2/6/12, Kyle Hamilton wrote: ... And keys are just labels. I'm enough of an SPKI revanchist to say that keys are just names or labels. You can no more determine trustworthiness from a mere name than you can tell a book by its cover. To talk about trust, let alone trust*worththi

Re: [therightkey] Will the real RPF please stand up?

2012-02-06 Thread Kyle Hamilton
On Wed, Feb 1, 2012 at 12:28 AM, Jon Callas wrote: You might trust your mother, but do you trust your mother to set up your VPN? Finally, someone talking some sense. And keys are just labels. I'm enough of an SPKI revanchist to say that keys are just names or labels. You can no more determ

Re: [therightkey] Will the real RPF please stand up?

2012-02-04 Thread Matt DeMoss
As security engineers, our role is to (a) reduce the number of entities we trust; (b) reduce the extent to which we trust the remaining trusted entities; and (c) determine the trustworthiness of trusted entities. A system with voting like Convergence (depending on configuration) has the nice pro

Re: [therightkey] Will the real RPF please stand up?

2012-02-02 Thread Daniel Kahn Gillmor
On 02/01/2012 08:20 PM, Paul Lambert wrote: > I may be looking at the back end of the elephant, but terms like "pinning" > and such seem wrong. With a "key centric" view, the DNS address or other > information are attributes that can be assigned to a key versus a name > centric perspective that

Re: [therightkey] Will the real RPF please stand up?

2012-02-01 Thread Jon Callas
On Feb 1, 2012, at 10:43 AM, Phillip Hallam-Baker wrote: > That is a good point, and one that threatens to create a whole new chapter. > > > First, replying to Jon, what we are managing is not risk itself but > the cost imposed by the possibility of unintended outcomes. If the guy > is jumping

Re: [therightkey] Will the real RPF please stand up?

2012-02-01 Thread Paul Lambert
Hi Martin, I think we may all be looking at this elephant from several different angles. We are having to write essays on our perspective to describe some broad generalizations that we are making. >> >> One of the better definitions I've heard. I would question whether >> >(c) is even in scop

Re: [therightkey] Will the real RPF please stand up?

2012-02-01 Thread Phillip Hallam-Baker
AM, Thomas Hardjono wrote: > > >> -Original Message- >> From: therightkey-boun...@ietf.org [mailto:therightkey- >> boun...@ietf.org] On Behalf Of Jon Callas >> Sent: Wednesday, February 01, 2012 3:28 AM >> To: therightkey@ietf.org >> Subject: Re: [therigh

Re: [therightkey] Will the real RPF please stand up?

2012-02-01 Thread Jon Callas
On Feb 1, 2012, at 5:31 AM, Kyle Hamilton wrote: > * PGP - S/MIME Signed by an unverified key: 02/01/2012 at 05:31:54 AM > > I do see a problem with defining the term 'trustworthy', because it's > reinventing the wheel. It's already been defined in law as "fiduciary". This > is the kind of re

Re: [therightkey] Will the real RPF please stand up?

2012-02-01 Thread Thomas Hardjono
> -Original Message- > From: therightkey-boun...@ietf.org [mailto:therightkey- > boun...@ietf.org] On Behalf Of Jon Callas > Sent: Wednesday, February 01, 2012 3:28 AM > To: therightkey@ietf.org > Subject: Re: [therightkey] Will the real RPF please stand up? > >

Re: [therightkey] Will the real RPF please stand up?

2012-02-01 Thread Kyle Hamilton
I do see a problem with defining the term 'trustworthy', because it's reinventing the wheel. It's already been defined in law as "fiduciary". This is the kind of relationship you have with your doctor, your lawyer, your accountant, your bank, your insurance company, even your cemetary, every o

Re: [therightkey] Will the real RPF please stand up?

2012-02-01 Thread Jon Callas
On Jan 31, 2012, at 7:35 PM, Phillip Hallam-Baker wrote: > I don't see the problem with defining the term 'trustworthy' > > Risk = Cost imposed by likelihood of probable loss. > Trust = Confidence with which risk is assessed. > Trusted = An entity that is relied on to mitigate risk (whether > tr

Re: [therightkey] Will the real RPF please stand up?

2012-01-31 Thread Phillip Hallam-Baker
I don't see the problem with defining the term 'trustworthy' Risk = Cost imposed by likelihood of probable loss. Trust = Confidence with which risk is assessed. Trusted = An entity that is relied on to mitigate risk (whether trustworthy or not). Trustworthy = An entity that meets rational criteria

Re: [therightkey] Will the real RPF please stand up?

2012-01-31 Thread Martin Millnert
On Tue, 2012-01-31 at 17:14 -0800, Paul Lambert wrote: > >-Original Message- > >From: therightkey-boun...@ietf.org [mailto:therightkey-boun...@ietf.org] > >On Behalf Of Jon Callas > ... > > > >On Jan 26, 2012, at 2:55 PM, Richard L. Barnes wrote: > > > > As security engineers, our role

Re: [therightkey] Will the real RPF please stand up?

2012-01-31 Thread Paul Lambert
>-Original Message- >From: therightkey-boun...@ietf.org [mailto:therightkey-boun...@ietf.org] >On Behalf Of Jon Callas ... > >On Jan 26, 2012, at 2:55 PM, Richard L. Barnes wrote: > > As security engineers, our role is to (a) reduce the number of > entities we trust; (b) reduce the

Re: [therightkey] Will the real RPF please stand up?

2012-01-31 Thread Jon Callas
On Jan 26, 2012, at 2:55 PM, Richard L. Barnes wrote: As security engineers, our role is to (a) reduce the number of entities we trust; (b) reduce the extent to which we trust the remaining trusted entities; and (c) determine the trustworthiness of trusted entities. >>> >>> R

Re: [therightkey] Will the real RPF please stand up?

2012-01-27 Thread Phillip Hallam-Baker
On Fri, Jan 27, 2012 at 5:21 AM, Ralph Holz wrote: > Hi, > Separation of duties - increases the number of trusted parties No sequential access - increases the number of trusted parties No lone zone - increases the number of trusted parties. Those are all NSA/GCHQ doctrines

Re: [therightkey] Will the real RPF please stand up?

2012-01-27 Thread Ralph Holz
Hi, >>> Separation of duties - increases the number of trusted parties >>> No sequential access - increases the number of trusted parties >>> No lone zone - increases the number of trusted parties. >>> >>> Those are all NSA/GCHQ doctrines. I am pretty sure that they >>> understand security enginee

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
That reminds me of the Media Lab idea that binary choices are bad and things should be specified as a range. What we are doing here is attempting to reduce risk and risk is a continuous variable. In the simplest model of risk we merely consider if there is a non negligible probability of a loss.

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Martin Millnert
On Thu, 2012-01-26 at 14:10 -0800, Chris Palmer wrote: > On Thu, Jan 26, 2012 at 1:43 PM, David Conrad wrote: > > > I'm curious: where do you draw the line? Should routing system security be > > included? Email security (since many transactions relating to DNS zone > > administration occur vi

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
The way I was taught to do security analysis is you start off with everything on the table and look to identify all possible sources of risk. You do that by identifying assets, the risks against those assets etc. etc. It is an iterative process and it is frequently useful to work in both directions

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Martin Rex
David Conrad wrote: > > On Jan 26, 2012, at 1:52 PM, Martin Rex wrote: > >> Security that looks at 'all possible sources of error' seems to me > >> to be a halting state problem > > > Drawing a line amounts to sticking your head in the sand. > > Or a realization that it isn't realistic to try to

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
On Thu, Jan 26, 2012 at 6:15 PM, Ralph Holz wrote: > Hi, > >> Let us consider a Tier 6 security regime applied to management of a CA: >> >> Separation of duties - increases the number of trusted parties >> No sequential access - increases the number of trusted parties >> No lone zone - increases t

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread David Conrad
On Jan 26, 2012, at 1:52 PM, Martin Rex wrote: >> Security that looks at 'all possible sources of error' seems to me >> to be a halting state problem > Drawing a line amounts to sticking your head in the sand. Or a realization that it isn't realistic to try to solve "all possible sources of error

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Ralph Holz
Hi, > I prefer trying to help people manage risk. People have assets that > they would like to protect. What matters to them is > > 1) The cost of protecting those assets (financial and non-financial) > 2) The value of those assets (financial, human, etc.) 3) The > reduction in risk that is ach

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
In other words, they mitigate risk. If we talk in terms of risk and risk alone as I proposed we can put numbers on things and use that as a basis for an objective comparison of the schemes. You have three separate degrees of freedom and no principle to compare them by so putting numbers on your s

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Richard L. Barnes
Those are all (b). On Jan 26, 2012, at 6:03 PM, Phillip Hallam-Baker wrote: > It is nonsense. > > Let us consider a Tier 6 security regime applied to management of a CA: > > Separation of duties - increases the number of trusted parties > No sequential access - increases the number of trusted

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Ralph Holz
Hi, > Let us consider a Tier 6 security regime applied to management of a CA: > > Separation of duties - increases the number of trusted parties > No sequential access - increases the number of trusted parties > No lone zone - increases the number of trusted parties. > > Those are all NSA/GCHQ d

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Chris Palmer
On Thu, Jan 26, 2012 at 3:03 PM, Phillip Hallam-Baker wrote: > Separation of duties - increases the number of trusted parties > No sequential access - increases the number of trusted parties > No lone zone - increases the number of trusted parties. But they can reduce the extent to which you mus

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
It is nonsense. Let us consider a Tier 6 security regime applied to management of a CA: Separation of duties - increases the number of trusted parties No sequential access - increases the number of trusted parties No lone zone - increases the number of trusted parties. Those are all NSA/GCHQ doc

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Richard L. Barnes
>>> As security engineers, our role is to (a) reduce the number of >>> entities we trust; (b) reduce the extent to which we trust the >>> remaining trusted entities; and (c) determine the trustworthiness of >>> trusted entities. >> >> Really? > > Yep. +1 One of the better definitions I've hea

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Martin Rex
Richard L. Barnes wrote: > > >>> If a system is going to be robust in practice it has to take account > >>> of all possible sources of error including administrative incompetence > >>> and user error. > >> > >> I'm curious: where do you draw the line? Should routing system security > >> be inclu

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Chris Palmer
On Thu, Jan 26, 2012 at 2:21 PM, Phillip Hallam-Baker wrote: >> As security engineers, our role is to (a) reduce the number of >> entities we trust; (b) reduce the extent to which we trust the >> remaining trusted entities; and (c) determine the trustworthiness of >> trusted entities. > > Really?

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
On Thu, Jan 26, 2012 at 5:10 PM, Chris Palmer wrote: > On Thu, Jan 26, 2012 at 1:43 PM, David Conrad wrote: > >> I'm curious: where do you draw the line?  Should routing system security be >> included?  Email security (since many transactions relating to DNS zone >> administration occur via ema

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
As I said in the original post, look at this problem and then ask yourselves how Perspectives, Convergence, SK and CT might help solve it. I can see the potential for leverage in all four schemes since they all provide a means of persisting information over time. On Thu, Jan 26, 2012 at 5:02 PM,

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Chris Palmer
On Thu, Jan 26, 2012 at 1:43 PM, David Conrad wrote: > I'm curious: where do you draw the line?  Should routing system security be > included?  Email security (since many transactions relating to DNS zone > administration occur via email)? Telephone? Etc. > > Security that looks at 'all possibl

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Andrew Sullivan
On Thu, Jan 26, 2012 at 04:34:07PM -0500, Phillip Hallam-Baker wrote: > Getting defensive about problems is not going to solve them. I'd like to know what you thought to be defensive in what I said. I was merely trying to point out that we need to make distinctions about pieces of the system if

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
Of course routing security is considered. The reason that you want TLS in the first place is precisely the fact that routing can be compromised (ranging from WiFi evil twin up to BGP attack). Security has to look at all sources of error but that does not mean it has to eliminate them. Security i

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Richard L. Barnes
>>> If a system is going to be robust in practice it has to take account >>> of all possible sources of error including administrative incompetence >>> and user error. >> >> I'm curious: where do you draw the line? Should routing system security >> be included? Email security (since many transac

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Martin Rex
David Conrad wrote: > > Phillip Hallam-Baker wrote: > > > > If a system is going to be robust in practice it has to take account > > of all possible sources of error including administrative incompetence > > and user error. > > I'm curious: where do you draw the line? Should routing system secur

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread David Conrad
On Jan 26, 2012, at 1:34 PM, Phillip Hallam-Baker wrote: > If a system is going to be robust in practice it has to take account > of all possible sources of error including administrative incompetence > and user error. I'm curious: where do you draw the line? Should routing system security be in

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
>From a security point of view it is the security of the system that matters, not the security of the individual components. The S in DNS stands for System. If a system is going to be robust in practice it has to take account of all possible sources of error including administrative incompetence

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
Maybe to you, but not to me. If we are going to do any good we have to deal with all the problems and not just a few cherry picked problems that we think should be the ones people are worried about. As I pointed out, there is actually quite a bit that technology can do here. This is a real proble

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Andrew Sullivan
On Thu, Jan 26, 2012 at 03:06:52PM -0500, Daniel Kahn Gillmor wrote: > > DNS is certainly not a shining beacon when it comes to resistance to > fraud or coercion. Let's not make it a single point of failure. I think it would be really nice if we would make some distinctions among different phæno

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Daniel Kahn Gillmor
Thanks to Phillip for raising this point. On 01/26/2012 02:35 PM, Richard L. Barnes wrote: > Illegitimate transfers are out of scope. From the point of view of the DNS, > an illegitimate transfer is indistinguishable from a legitimate transfer. eh? The whole point of this discussion, as i unde

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Richard L. Barnes
Illegitimate transfers are out of scope. From the point of view of the DNS, an illegitimate transfer is indistinguishable from a legitimate transfer. The only thing technology could do for this case is allow the web site to tell customers "I'm not planning to change anything in the next N days"

[therightkey] Will the real RPF please stand up?

2012-01-26 Thread Phillip Hallam-Baker
This is a site I have been using for over a year now. How would I as a regular Internet user be expected to work out which site is the real one? This could be site napping or it could be phishing fraud. I tend to suspect that the email is telling the truth, but it is also possible that it is a p