summaryrefslogtreecommitdiff
path: root/doc/conferences/lca2010/outline
diff options
context:
space:
mode:
authorDaniel Kahn Gillmor <dkg@fifthhorseman.net>2009-07-30 23:09:46 -0400
committerDaniel Kahn Gillmor <dkg@fifthhorseman.net>2009-07-30 23:09:46 -0400
commit98dddb87efcbb90a82a7b2dfc094160811a09f86 (patch)
tree468542e111161492913ab8e357a4fb5db7bf88ae /doc/conferences/lca2010/outline
parent37c39c434872a2fc48da7e8d1d78ec2382090426 (diff)
initial draft of LCA2010 entry; hoping for feedback on a tight deadline
Diffstat (limited to 'doc/conferences/lca2010/outline')
-rw-r--r--doc/conferences/lca2010/outline62
1 files changed, 62 insertions, 0 deletions
diff --git a/doc/conferences/lca2010/outline b/doc/conferences/lca2010/outline
new file mode 100644
index 0000000..15c4868
--- /dev/null
+++ b/doc/conferences/lca2010/outline
@@ -0,0 +1,62 @@
+
+
+
+The presentation is in three parts:
+
+Background
+----------
+
+ * Why authentication using asymmetric crypto (as opposed to shared
+ secrets) is important on today's network.
+
+ * Overview of how ssh uses asymmetric crypto authentication (user ->
+ host, host -> user)
+
+ * Overview of relevant bits of OpenPGP (key -> User ID bindings,
+ certifications, usage flags, key -> subkey bindings)
+
+ * Overview of keyservers (the idea of gossip, One Big Network,
+ propagation, issues around redundancy, logging, private access)
+
+
+How
+---
+
+ * How does the monkeysphere do it? (very brief under-the-hood)
+
+ * How does a server administrator publish a host's ssh key to the Web
+ of Trust? How do they maintain it?
+
+ * How does a user incorporate WoT-based host-key checking into their
+ regular ssh usage?
+
+ * How does a user publish their own ssh identity to the WoT for hosts
+ to find it? How do they maintain it?
+
+ * How does a server administrator tell a server to admit certain
+ people (as identified by the WoT) to certain accounts? How do they
+ tell the server which certifications are trustworthy?
+
+Possible Futures
+----------------
+
+ * Use the Monkeysphere with ssh implementations other than OpenSSH
+ (dropbear, lsh, putty, etc)
+
+ * Expansion of the Monkeysphere's out-of-band PKI mechanism for
+ authentication in protocols other than SSH (TLS, HTTPS) without
+ protocol modification.
+
+ * Use of OpenPGP certificates directly in SSH. OpenPGP is referenced
+ in RFC 4253 already: optional, rarely implemented, and deliberately
+ ambiguous about how to calculate key->identity bindings.
+
+ * Use of OpenPGP certificates for authentication directly in
+ protocols. RFC 5081 provides a mechanism for OpenPGP certificates
+ in TLS, but is similarly ambiguous about certificate verification.
+
+ * Better end-user control over verification: Who or what are you
+ really connecting to? How do you know? How can this information
+ be effectively and intuitively displayed to a typical user?
+
+ * What would you like to see?