[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: ISAKMP Extended Authentication



Hi Tero,

While a neat idea I don't see how this could scale, as well tuning every
host system into a CA seems problematic.  How do you enforce the identity in
the temporary cert when the 'authority' is the host, the host can claim the
'user' identity is anyone?  Is the gateway obligated to verify the info in
the temp cert matches the one in the 'permanent' cert?  What about access to
the crl repository, typically it would be behind the gateway, so how does
the host gain access to post the crl?   
Bye. 
----
Greg Carter, Entrust Technologies
greg.carter@entrust.com


> ----------
> From: 	Tero Kivinen[SMTP:kivinen@ssh.fi]
> Sent: 	Monday, November 23, 1998 5:41 PM
> To: 	John Irish
> Cc: 	IPSEC
> Subject: 	ISAKMP Extended Authentication
> 
> 
> So the hierarchy will be like this:
> 
> 	CA Root ----------------------------------.
> 	   |					   \
> 	Host key				   |
> 	   |					   |
> 	Temporary user certificate	permanent user certificate
> 
> Here "Temporary user certificate" and "permanent user certificate"
> are both certificates for the private key in the smart card. If only
> user authentication is needed then we use the "permanent user
> certificate", and if the both user and host authentication is needed
> then we have to create that "temporary user certificate" and use that.
> 
> 


Follow-Ups: