[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: X.509 ACs vs. SPKI?



Ed,

In the (exceptional?) case where two identical public keys are generated
independently, and both happen to attempt access to the same resource,
then the hash of the entire cert is a must for uniqueness.

Aside from this condition, however, the hash of the public key is
sufficient for (classic) SPKI operation where verifier = issuer
(at least for chains of length 1).

OK, that doesn't get one very far ... I can't see how to leverage the
same assurance for longer chains.

___tony___


At 08:55 PM 5/25/99 -0700, Ed Gerck wrote:
>
>"Ellison, Carl M" wrote:
>
>> ... for secure binding,
>> the hash of the public key is a fine globally unique identifier and an
>> unanchored text name is wide open to abuse.
>
>I disagree. The hash of the public-key is also open to abuse since it
>does not securely include that key's validity date, does not include an
>originally secure reference to a valid revocation mechanism linked to
>the identity certificate from whence that public-key came and cannot
>contain other warranties or insurance by extension from the identity
>certificate itself.  Please see  my former e-mail.
>
>However, I agree if  one uses the whole identity certificate hash -- not
>the public-key hash. This was also discussed in my former e-mail.
>
>Cheers,
>
>Ed Gerck
>
>

Tony Bartoletti                                             LL
Center for Information Operations and Assurance          LL LL
Lawrence Livermore National Laboratory                LL LL LL
PO Box 808, L - 303                                   LL LL LL
Livermore, CA 94551-9900                              LL LL LLLLLLLL
phone: 925-422-3881   fax: 925-423-8002               LL LLLLLLLL
email: azb@llnl.gov                                   LLLLLLLL

Follow-Ups: References: