OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

pki-issues message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Today's PKI Issues Concall


In preparation for today's PKI TC Issues SC concall
(scheduled for 2:00 PM EST, I believe) I have reviewed
the comments received since our last concall. Of course,
we still have lots of comments with recommendations left
over from last week's Issues SC concall that we still
need to discuss. But in the interests of keeping up with
comments, here are the ones that I have seen since then.

I believe that both of these comments are in areas that
I signed up for, so I have also supplied a commentary
and recommendation for each one. We can discuss these
after all the ones left over from our last meeting,
if we have time.

If you have seen any other comments that aren't on our
lists, please send them on.

Thanks,

Steve

--------

anders.rundgren@telia.com-2003-11-23-Guidelines-7

Brief Quote:
  Practically every aspect of client-side Web-PKI, ranging from
  on-line key generation and certification support, to on-line
  (web-form) signing, is currently entirely vendor-dependent.

  [The commenter then goes on to suggest that standards should
  be developed in these areas and widely implemented.]

Commentary/Recommendation:
  The PKI Action Plan already calls for the development of
  specific standards or profiles for document signing (including
  form signing). In our last TC meeting, we added language
  stating that certificate management is also a concern. So I
  don't think that any changes to the PKI Action Plan are
  required. This comment can be passed on to those who will
  be working on the Application Guidelines Action Item.

Terry.Jones@vac-acc.gc.ca-2003-11-17-General-18

Brief Quote:
  I agree that PKI is an enabling technology, and that efforts
  have to be made to make better use of the advantages it
  provides. The proliferation of viruses and worms carrying
  keystroke loggers and remote control applications should
  cause users to assume that their PC may be compromised. This
  may drive the need for better assurances that the end user
  is who they say they are, and electronic exchanges are what
  they appear to be. PKI and supporting technologies can offer
  solutions.

Commentary/Recommendation:
  I'm glad the commenter agrees that we should use PKI more.
  I share his concern about workstation compromise, but I'm
  not so confident that PKI will help address that. In fact,
  combining compromised workstations with user certificates
  seems especially dangerous since the workstation can easily
  perform unauthorized operations using the user's private key.

  The techniques I'm aware of to reduce the threat of workstation
  compromise include: firewalls, anti-virus and malware protection,
  improving software quality, limiting software privileges through
  fine-grained privilege and memory protection, using a secure
  limited-function device to perform high-risk operations,
  physical security, code signing, trusted hardware platforms,
  and auditting and intrusion detection to detect workstation
  compromise. PKI can be part of some of these, but it isn't
  typically the main part.

  I recommend that we contact the commenter, thank him for his
  comments, and ask for clarification about his suggestion that
  PKI can offer solutions to workstation compromise.

S/MIME Cryptographic Signature



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]