Phillip Hallam-Baker <hallam@xxxxxxxxx> wrote: > Now imagine that this personal PKI is designed so that my personal root > key need never expire. Or at least not until I do. So now let's take a > fingerprint of that key. And let's imagine that I provide that > fingerprint to the IETF during registration ‘somehow’ (add encryption > to taste). Do we need to involve the IETF secretariat, or can we do this some other indirect way? I can put any text on my badge that I like. > I will elide the cryptography, but assume I am using plenty. The user > experience I am looking at right now would have the conference present > a QR code on a screen that changes every 30 seconds or so or each time > it is scanned. That presents a domain name and a cryptographic > challenge. When scanned using the app, the challenge is put through a > one way function to obtain the locator for a document giving the rest > of the information needed to complete the registration. okay. > So now my app is saying ‘do you want to pick up your IETF badge’ or > whatever and I click yes and that causes the app to post my Mesh > fingerprint to a URI indicated in the document and that causes the desk > to get a note to look for phill’s badge and also tells my conference > scheduling app to load the IETF material. [Quite possibly customized to > include my Directorate etc. private events] That's interesting. > Now imagine we have been doing this sort of thing for five years. At > this point, we have a pretty solid binding of identity. It is not > perfect but it has a very very high work factor and if the attacker > hasn’t planned the attack in advance, they kinda need a time machine. Someone who has attended 15 IETF meetings (3*5) is probably whomever their badge says, regardless of who the government says they are ;-) -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works | IoT architect [ ] mcr@xxxxxxxxxxxx http://www.sandelman.ca/ | ruby on rails [ -- Michael Richardson <mcr+IETF@xxxxxxxxxxxx>, Sandelman Software Works -= IPv6 IoT consulting =-
Attachment:
signature.asc
Description: PGP signature