OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

ekmi message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: [ekmi] Discussion on comment received on 15-day review of SKSML


I'm a bit surprised by the assertion made that keyprov is already widely implemented. My understanding, consistent with their own timeline (http://www.ietf.org/html.charters/keyprov-charter.html), is that they are just nearing the end of their implementation and interop testing. KEYPROV is not in full DRAFT status yet, that I know of, and thus may still be modified. If this were a FINAL DRAFT standard from IETF, then that would perhaps be a little different story. My guess is that a handful of vendors directly involved in the committee (Verisign for one) have test implementations of keyprov, but nothing finalized or production-deployed.

In terms of what it is: keyprov is for secure provisioning (aka distribution) of symmetric keys. From our conversations at the KMS in September, this was not necessarily the original intent of the standard. A few of us wondered why keyprov was even going forward with IKE2 in the offing.

I thus agree with Arshad's conclusion: let's get SKSML into Community Specification status so that we can close out the initial development. This will allow us to continue moving forward with the TC while we keep an eye on other developments. The comments about being compatible with keyprov could be equally applied to IKE and IKE2 and any other number of protocols. It may be worthwhile to interview each respective committee (as many as we can find working in this space, or reasonably tangential to it) and then produce a white paper that explains what each protocol does, it's current status, and how SKSML will or will not interoperate with them.

The big thing for now, though, is regaining some forward momentum as we enter the new year. Lack of forward progress for an extended period of time could lead to TC atrophy and death, which would be very undesirable.

fwiw.

-ben

--
Benjamin Tomhave, MS, CISSP
Senior Security Consultant, Mid-Atlantic Operation
BT Professional Services        http://www.ins.com/
M: 703.282.8600
E: benjamin.tomhave@bt.com
________________________________________
From: Arshad Noor [arshad.noor@strongauth.com]
Sent: Monday, December 29, 2008 2:15 PM
To: ekmi
Subject: [ekmi] Discussion on comment received on 15-day review of SKSML

All,

Many people are probably still on vacation and enjoying the holidays
with their families/loved ones, but I thought that it would be useful
to start the discussion on the comment received from Philip Hoyer on
the 15-day review of SKSML that concluded last week:

http://lists.oasis-open.org/archives/ekmi-comment/200812/msg00000.html

Here are my thoughts (in no particular order of importance):

1) We have not received any objections or concerns with the current
    definition of the SKSML protocol itself;

2) Harmonizing key-management standards are good for the industry and
    for customers; those amongst us at the Key Management Summit held
    in Baltimore in September 2008 heard this very clearly from the
    customers that attended the summit;

3) The IETF key-management effort has always been focused on symmetric
    authentication keys, which is a very different objective than what
    the EKMI TC is focused on.  This was discussed even before the TC
    came into existence:

http://lists.oasis-open.org/archives/oasis-charter-discuss/200611/msg00003.html

    Since it was agreed that there was no overlap between KEYPROV and
    EKMI TC (other than that both groups used symmetric cryptographic
    keys to achieve their different objectives), the OASIS TC was
    allowed to be created.

4) The key-container is an integral part of the SKSML protocol, but
    not the most critical part of the protocol.  The truly critical
    element is the KeyUsePolicy element, since this is what defines
    policy and establishes control.  Without the KUP, there is no
    key-management system;

5) The key-container in SKSML is tied to the use of XML Encryption
    and X509 digital certificates for transporting the key; this not
    only provides us the transport security, but also ties it to the
    authentication credential of the client (also an X509 digital
    certificate).  Without having studied the KEYPROV protocol, I am
    not certain what additional benefits SKSML will gain by allowing
    for different key-containers to carry the key.  At a minimum, it
    will require studying the impact on the security and assumptions
    we need to make about the requesting client;

6) We are at the point of only voting on a Committee Specification,
    not an OASIS standard.  The next 3-6 months will be spent in
    creating implementations to validate our choices and learn from
    the experience before voting on the standard.

I would recommend that, given the effort we have put in over the
last two years, we continue with making the current spec a Committee
Specification to validate our work through implementations.  At the
same time, I also recommend that one or more TC members engage in
discussions with Philip to understand the details and implications
of his suggestion.  The engaging-member(s) can then report back to
the TC with an analysis on what impact this suggestion has on SKSML
and his/her/their recommendation.  The analysis can occur concurrently
with the implementation validation so we will have a fair amount of
information before deciding on what to do before going for an OASIS
standards vote.

Let me know what others think about this.

Arshad Noor
StrongAuth, Inc.

---------------------------------------------------------------------
To unsubscribe from this mail list, you must leave the OASIS TC that
generates this mail.  Follow this link to all your TCs in OASIS at:
https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]