Dan,

On Apr 21, 2008, at 2:22 PM, Dan Wing wrote:

> During WGLC an objection was raised about R-CERTS in
> draft-ietf-sip-media-security-requirements.  I currently have  
> proposals for:
>
>  * reverting to the R12 text
>  * sticking with R-CERTS text
>  * removing the text completely
>
> I would like to understand what people want this requirement to  
> *mean* -- does
> it say what you think it should say?  Does it miss some aspect of
> signing/certificates that is important?

DY> I think this is an important requirement in that it allows the use  
of self-signed certificates.  If I recall previous discussions  
correctly, the major concern was that we didn't want to get in a  
situation where in order to use a key management protocol all parties  
were *required* to obtain certificates signed by a formal Certificate  
Authority.   We wanted any solution to allow the optional use of self- 
signed certs for various instances where CA-signed certs might not be  
appropriate or necessary.

DY> So I think the *intent* of the requirement - as I understand it -  
is still important to capture.  What about merging R12 and R-CERTS by  
simply replacing the "CA-issued" with "3rd-party-signed", as in:

   R-CERTS:  If the media security key management protocol
         employs certificates, it MUST be able to make use of both
         self-signed and 3rd-party-signed certificates.

DY> Or is that muddying things up even more?

My 2 cents,
Dan

>
>
> -----
>
> Details:
>
> In draft-ietf-sip-media-security-requirements-00 and -01, we had:
>
>   R12:  The media security key management protocol MUST NOT
>         require 3rd parties to sign certificates.
>
> in draft-ietf-sip-media-security-requirements-02, this was renamed  
> to R-CERTS
> and also had its text change to:
>
>   R-CERTS:  If the media security key management protocol
>         employs certificates, it MUST be able to make use of both
>         self-signed and CA-issued certificates.  As an alternative,
>         the media security key management protocol MAY make use of
>         "bare" public keys.
>
>
> Here is how some key management systems would fare with the original  
> R12 text:
>
>  * RFC4474 would comply -- because RFC4474 allows both self-signed
>    certificates and allows CA-signed certificates (reference end of
>    Step 1 of Section 6 of RFC4474).  One might reasonably expect most
>    deployments will use CA-signed certificates.
>
>  * OpenPGP certificates (if someone were to use it for SRTP
>    keying) would comply -- because R12 allows you to sign your own
>    key and does not require someone else sign your key.  One might
>    expect most deployments would include signatures by other
>    people (3rd parties).
>
>  * ZRTP would comply -- because there are no 3rd party signatures
>    whatsoever.
>
>  * MIKEY-RSA complies -- because it allows self-signed certificates
>    (reference the first bullet of Section 4.3.2 of RFC3830).
>
>  * Identity-Based Encryption (if someone were to use it for SRTP
>    keying) would comply -- because IBE uses 'bare' public keys.
>
>
> and with the R-CERTS text:
>
>  * RFC4474 would comply (same reason as R12).
>
>  * OpenPGP certificates (if someone were to use it for SRTP keying)
>    would not comply -- because R-CERTS allows you to sign your own
>    key, but only mentions Certificate Authorities as 3rd party
>    signers; OpenPGP does not have 'certificate authorities'.
>
>  * ZRTP would comply (same reason as R12).
>
>  * MIKEY-RSA complies (same reason as R12).
>
>  * Identity-Based Encryption (if someone were to use it for SRTP
>    keying) would comply (same reason as R12).
>
> -d
>
> _______________________________________________
> Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
> This list is for NEW development of the core SIP Protocol
> Use [EMAIL PROTECTED] for questions on current sip
> Use [EMAIL PROTECTED] for new developments on the application of sip

-- 
Dan York, CISSP, Director of Emerging Communication Technology
Office of the CTO    Voxeo Corporation     [EMAIL PROTECTED]
Phone: +1-407-455-5859  Skype: danyork  http://www.voxeo.com
Blogs: http://blogs.voxeo.com  http://www.disruptivetelephony.com

Build voice applications based on open standards.
Find out how at http://www.voxeo.com/free





_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to