Re: Security for various IETF services

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Apr 9, 2014 at 1:17 PM, Dave Crocker <dhc@xxxxxxxxxxxx> wrote:
> On 4/9/2014 10:49 AM, Noel Chiappa wrote:
>>
>>      > the way forward is pretty straightforward: Take the S/MIME message
>>      > format and graft the PGP web of trust and fingerprint trust models
>> onto
>>      > it.
>>
>> I agree wholly with your prefatory observation, and like your suggested
>> solution.
>
>
>
> The interesting premise in the suggestion is that a web of trust key
> management model is useful at Internet scale.
>
> I don't understand why anyone believes that.

Perhaps they believe that I have the solution because they actually
read my proposal where I suggest something very different and back it
with like actual math and an attack model.

The actual code is designed in such a way that people can plug in any
trust model of their choice however.


https://datatracker.ietf.org/doc/draft-hallambaker-prismproof-trust/
http://www.youtube.com/watch?v=PBFnBpWkK8M

There are problems with both the S/MIME and the Web of Trust models
which I discuss in the video presentation.

What I am proposing is to combine features of both trust models and in
addition ground the system in time using Certificate Transparency.
What this means is that a given key can be accredited in both models
simultaneously.


The metric that I apply is the time based work factor for the
attacker. Timestamping documents against an append only notary that is
a member of a federation of such notaries can effectively raise the
work factor for the attacker to infinity after that point in time.


-- 
Website: http://hallambaker.com/





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]