[ietf-enroll] Please help with TTI model document v2
Thierry Moreau
thierry.moreau at connotech.com
Wed Sep 29 16:53:14 EDT 2004
Paul Hoffman / VPNC wrote:
> At 8:51 PM -0700 9/24/04, max pritikin wrote:
>
>> Comments highly appreciated!
>> . . .
>> Thanks for any feedback,
>
> Indeed. This is a weird WG; there seems to be lots of interest but
> very few people sending input to the mailing list. If y'all are
> interested, please review and comment!
General observations about the TTI modeling
The science of physics showed that a model is usually neither
right or wrong. A model is more or less useful in explaining
current (and predicting future) observations.
In the TTI model, the object matter of observations would be
*enrollment and configuration protocols* and the observations
are issues such as:
the use of symmetric or asymmetric cryptography in a
protocol to achieve some introduction material agreement
elements
integrity, authentication, and trust, where these notions
needs to be defined
authentication: with regard to introduction, a sense
of assurance for an entity A that a given
cryptographic key is under the control of a given
entity B,
with regard to a cryptographic protocol, a
cryptographic assurance that a protocol element can
be successfully performed only by an entity that
controls a given cryptographic key
integrity: some assurance about a data element for an
entity, based on assumptions that are either well-
known in the trade (e.g. given a symmetric secret
key, a MAC mechanism provides data integrity) or
that should be explicit in the documentation of a
security scheme
trust: an a-priori assurance for an entity that a set
of procedural elements is performed as stated in the
documentation of a security scheme
the recourse to cryptographic mechanisms *or procedural
mechanisms* to ensure integrity, authentication, and
confidentiality protection (the TTI model implies some
non-crypto procedural mechanisms such as a sealed
envelope for confidentiality or direct contact with a
person or an entity representative for authentication).
Note: I didn't attempt to define confidentiality
since the use of this term in section 5.1 and
5.2 of the draft is very ambiguous
(cryptography-based or procedural-based,
whether confidentiality implies a pre-
established association between the introducer
and either petitioner or registrar, whether
these matters are addressed by the model or
not)
Another measure of a model usefulness in the field of
information security would be a threat analysis where any
entity role in the model is (analytically) subverted to
identify potential vulnerabilities. The model would be useful
if the threat analysis applied to the model predicts the
threat analysis applied to the enrollment and configuration
protocol.
These general observations being said, the current TTI
document (draft-pritikin-ttimodel-02.txt) fails to address the
general problem (no prior relationship between the petitioner
and the registrar) in clearly specifying how non-cryptographic
measures (that are deemed to be severely constrained by
operational, economic and cultural issues, e.g. respectively
non-practicability of manual hash verification, high cost of
manual symmetric key distribution, level of compliance to
credit card number privacy guidelines) can be leveraged upon
with the help of an introducer to come up with some level of
authentication assurance for the registrar.
A description of a TTI model (perhaps the TTI losing its
original significance) is certainly possible that would
1) start with definitions of confidentiality,
authentication, trust, and integrity, both in cryptography-
assisted sense and procedural sense (e.g. some confidentiality
provided by courier service, some integrity provided by the
look-and-feel of a user interface),
2) define some typical procedural actions (device
manufacturing-time imprint, obtaining authentication assurance
by observation of a transmission characteristics, ...),
3) encompass alternate TTI exchanges (set of crypto-assisted
digital protocol elements and out-of-band actions) with their
respective trust assumptions,
3) claim some security properties for TTI exchanges so
described (e.g. at the end of the exchange, the registrar is
satisfied that the key XYZ is indeed controlled by the
petitioner).
For sure, the alternate TTI exchanges would be influenced by
the most wanted solutions (e.g. wireless introduction and
enrolment), but the level of description abstraction should be
such that closely related TTI exchanges could be merged and
diverging ones could find a common terminology for their
relative understanding.
I was under the impression that some contributions to the
mailing list were moving forward in that direction, departing
from the narrow view that "recursive use of prior associations
is the strength of TTI."
Unfortunately, I am not in a position to commit resources to
the advancement of this project.
Sincerely,
--
- Thierry Moreau
CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, Qc
Canada H2M 2A1
Tel.: (514)385-5691
Fax: (514)385-5900
web site: http://www.connotech.com
e-mail: thierry.moreau at connotech.com
More information about the ietf-enroll
mailing list