Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Anne & Lynn Wheeler
lynn at garlic.com
Sat Dec 27 10:13:23 EST 2003
At 02:07 AM 12/28/2003 +1300, Peter Gutmann wrote:
>That's my big gripe with OCSP, it's compromised in almost every way in order
>to make it completely bug-compatible with CRLs. It's really mostly an online
>CRL query protocol rather than any kind of status protocol (in other words a
>responder can give you an, uhh, "live" response from a week-old CRL via OCSP).
>A recent update to the protocol even removes the use of nonces, to make replay
>attacks possible.
in general, distributed cache/filesystem cache consistency algorithms
aren't about trust or trust propogation but integrity and consistency.
I had done the initial distributed lock manager for ha/cmp. misc. past posts:
http://www.garlic.com/~lynn/2001.html#40 Disk drive behavior
http://www.garlic.com/~lynn/2001c.html#66 KI-10 vs. IBM at Rutgers
http://www.garlic.com/~lynn/2001e.html#2 Block oriented I/O over IP
http://www.garlic.com/~lynn/2001j.html#47 OT - Internet Explorer V6.0
http://www.garlic.com/~lynn/2001k.html#5 OT - Internet Explorer V6.0
http://www.garlic.com/~lynn/2002e.html#67 Blade architectures
http://www.garlic.com/~lynn/2002f.html#1 Blade architectures
http://www.garlic.com/~lynn/2002k.html#8 Avoiding JCL Space Abends
http://www.garlic.com/~lynn/2003i.html#70 A few Z990 Gee-Wiz stats
issue with certficates as cache entries ... is that they are purely r/o,
static entries ... and the cache consistency protocols (either CRLs or
OCSP) is purely with respect to whether the information is still fresh or
not. however, I still contend that the primary design point for these
deployed certificates is to allow relying-parties to perform offline
operations when they wouldn't nominally have access to the real data (from
which the certificate is derived).
the issue with the CRLs is that the are an electronic version of the paper
booklets of invalid numbers in the credit card industry before online
transactions. the issue is that the switch to a real online paradigm in the
credit card industry in the '70s pretty much obsoleted the need for offline
credentials (they retained the same form factor but added the magstripe for
online transactions) and any infrastructure support for offline paradigm
(like CRLs). OCSP appears to acquire all the infrastructure costs of doing
online transaction while retaining all the disadvantages of CRL paradigm
... i.e. undergo the costs of doing an actual online transaction w/o having
any of the advantages of actually having done an online transaction. a
trivial example is there is none of the benefits of aggregation (credit
limit, fraud use patterns, etc) that comes with having a real online
transaction.
the market niche for certificates are still the offline world (which is
rapidly disappearing) or for extremely low value operations that don't
justify the expense of online transaction. This issue in the later is
two-fold 1) online transaction related costs continue to rapidly decline
and 2) for low/no value operations it is difficult to justify the cost and
complexity of PKI infrastructure.
--
Anne & Lynn Wheeler http://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list