Name Constraints, was Re: [caops-wg] Re: ca signing policy file
David Chadwick
d.w.chadwick at kent.ac.uk
Sun Oct 16 07:21:50 CDT 2005
Cowles, Robert D. wrote:
>
>
>
>>-----Original Message-----
>>From: David Chadwick [mailto:d.w.chadwick at kent.ac.uk]
>>Sent: Thursday, October 13, 2005 2:39 AM
>
> ...
>
>>Robert
>>
>>perhaps the real question is, do you change your authorisation rights
>>more or less frequently than your identifier. If more
>>frequently, then
>>it does not really matter if your identifier changes every
>>year or two
>>since you can change your authorisation rights to match the new
>>identifier when it comes active. But if your authorisation rights are
>>much longer lived than your identifier, then it becomes a
>>pain to have
>>to change these as well. However, in this case I would
>>suggest that your
>>authorisation rights are wrapped into the PKC, say in the
>>subjectDirectoryAttributes extension, then they would carry
>>over to the
>>new identifier.
>>
>>regards
>>
>>David
>
>
> In teresting point .. and that is precisely a problem
> we have with Attribute Certificates and Proxy Certificate
> renewal. I have been wondering if we can extend the allowed
> lifetime of proxy certificates so long as we can revoke
> their authorizaton to do anything.
Rob
proxy certs are interesting since they provide several features: the
ability to authenticate spawned jobs at different locations, and the
ability to push authorisation attributes to remote targets. The latter
feature is not needed with an attribute pull model, in which case the
authorisation token lifetime is independent of the proxy cert lifetime
so proxy certs could have very long lifetimes.
In the push model, if what proxies push are authorisation tokens in
their own right, such as signed ACs rather than straight attributes,
then one or more of the ACs could be revoked whilst leaving the proxy
cert and the other ACs still valid. In which case again the proxy cert
could have a long lifetime.
But if the proxy cert only pushes straight attributes and has a single
signature, then everything has to be revoked at the same time.
If proxies had a long lifetime, you would then need to revoke it when
the user's authentication token had been compromised or needed to be
withdrawn.
So its really swings and roundabouts. The more you compress into a
single token, then the less opportunity you have to partially revoke
bits of it.
regards
David
>
> BC
>
>
--
*****************************************************************
David W. Chadwick, BSc PhD
Professor of Information Systems Security
The Computing Laboratory, University of Kent, Canterbury, CT2 7NF
Tel: +44 1227 82 3221
Fax +44 1227 762 811
Mobile: +44 77 96 44 7184
Email: D.W.Chadwick at kent.ac.uk
Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html
Research Web site: http://sec.cs.kent.ac.uk
Entrust key validation string: MLJ9-DU5T-HV8J
PGP Key ID is 0xBC238DE5
*****************************************************************
More information about the caops-wg
mailing list