Hi,

> Let us consider a Tier 6 security regime applied to management of a CA:
> 
> Separation of duties - increases the number of trusted parties
> No sequential access - increases the number of trusted parties
> No lone zone - increases the number of trusted parties.
> 
> Those are all NSA/GCHQ doctrines. I am pretty sure that they
> understand security engineering at some level.

But can they be applied to, say, current X.509 PKI? I doubt that.

> People need to stop talking about links in chains. If you have a
> serious security architecture it does not look like a chain, it does
> not have a single point failure mode.

This seems too high-level and abstract to have a meaning. There seems to
be a chain in every "security architecture" (for whatever that may be).
Just think of work flows - these are inherent to any "architecture", and
work flows are chains.

Ralph

PS: My problem with the word "architecture" is that today it's mostly
used in publications when the authors just mean "something we thought up
for our little problem". It's used so often it's almost meaningless.

-- 
Dipl.-Inform. Ralph Holz
I8: Network Architectures and Services
Technische Universität München
http://www.net.in.tum.de/de/mitarbeiter/holz/

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to