summaryrefslogtreecommitdiff
path: root/doc/conferences/seminar/outline
blob: 1531353eb1d3d83f32cee73b8dd25f0613802f12 (plain)
  1. outline for 1 hr seminar talk to CS/security academics
  2. - key-based authentication is here to stay. (e.g. https, ssh).
  3. - host vs. user
  4. - raises key management/distribution issues
  5. - what PKIs are available? X.509, OpenPGP, SPKI
  6. - social vulnerabilities - single-signer vs. multi-signer
  7. - protocol vulnerabilities - single cert vs. multi-cert (server
  8. vs. client again)
  9. - utility for group-internal work, phased approach to public
  10. Stream-based communications over the public network have an
  11. authentication problem. Most data streams are not authenticated in
  12. either direction, and most of those that are authenticated in at least
  13. one direction use authentication regimes which suffer from a range of
  14. known structural problems.
  15. Public-key-based authentication offers security advantages over
  16. shared-secret approaches, but it introduces additional questions of
  17. key distribution, binding, and revocation. Two common solutions to
  18. these problems on today's network are X.509 certificates (used by TLS
  19. connections like HTTPS) and so-called "key continuity management"
  20. (KCM) (used by popular SSH implementations and the "security
  21. exceptions" interface for some web browsers). Both of these schemes
  22. present security concerns of their own: KCM has trouble with initial
  23. contact, key revocation, and re-keying; and X.509's single-issuer
  24. certificate format has a systemic bias that selects for unaccountable
  25. third-party authorities. New work ("the Monkeysphere") extends the
  26. OpenPGP Web of Trust into authenticating stream-based communications
  27. (instead of its traditional message-based environment of e-mails and
  28. files) by means of a protocol-independent overlay. As a simple,
  29. alternative PKI, the Monkeysphere resolves these failings, and also
  30. provides features currently only available as protocol extensions
  31. (such as SNI).