From: norm@netcom.com (Norman Hardy)
To: cypherpunks@toad.com
Message Hash: 34c5a43b615255a3505cfe2f47f79d6782daf44297f25e1c61c814939d9ad492
Message ID: <9304202145.AA19546@netcom2.netcom.com>
Reply To: N/A
UTC Datetime: 1993-04-20 21:45:48 UTC
Raw Date: Tue, 20 Apr 93 14:45:48 PDT
From: norm@netcom.com (Norman Hardy)
Date: Tue, 20 Apr 93 14:45:48 PDT
To: cypherpunks@toad.com
Subject: Webs of Trust vs Trees of Trust
Message-ID: <9304202145.AA19546@netcom2.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
I have worked with the NCSC (National Computer Security Center)
on certifying operating systems according to the "Orange Book".
As I understand RIPEM there is a tree of agencies such that everyone
must trust all elements of the tree between him and the root.
This is much ingrained in all of the legally mandated security
systems that I am aware of. It assumes, at first glance, that there
is a root, an inner sanctum, which is totally trusted by all.
The Orange Book for operating system security has such assumptions
embedded deeply. We had to essentially weeken our security features
by disableing our "mutually supicious user" logic to meet their
requirements.
>In <40485.pfarrell@cs.gmu.edu> Pat Farrell says:
>At this Fall's National Computer Security Conference, Mr. McNulty
>was a speaker on the NIST's digital signature session. They talked about
>both the non-RSA DSS, and use of Certifying Authorities with a RSA-based
>scheme.
>>At that same conference, I gave a paper on security that described
>a fishnet of trust between systems. This was written in February 92,
>well before I read Phil's "web of trust" from the PGP docs, which I
>read sometime over the summer.
>During the Q&A, I asked Mr NcNulty to compare the advantages and
>disadvantages of a heirarchical CA approach to an interlocking fishnet/web
>of trust. I hoped he would at least recognize that any heirarchy has
>problems from the top down if an upper level is compromised. Instead,
>he could not address any differences. I believe that working in the
>government has made the hierarchy seem to be the only implementation that
>he envisioned. He fobbed the question off to one of his technical
>underlings, but he, too, was unable to answer it (or even coherently
>address it).
It is a pervasive mind-set in military security.
Return to April 1993
Return to “norm@netcom.com (Norman Hardy)”
1993-04-20 (Tue, 20 Apr 93 14:45:48 PDT) - Webs of Trust vs Trees of Trust - norm@netcom.com (Norman Hardy)