[CQ-Contest] LotW and trust models
Lyndon Nerenberg
lyndon at orthanc.ca
Tue Sep 30 18:39:22 EDT 2003
It's obvious from most of the comments here that people don't understand
trust models and how they relate to security systems. What follows in a
slightly annotated excerpt from an off-list reply I made that might shed
some light on why things are the way they are. Note that the off-list
reply was PGP signed. This message is not, because the mailing list
software that manages the list rejects messages that use the new
application/pgp-signature MIME type.
--- Forwarded extract follows ---
The trust model needed to ensure the integrity of the credentials
requires that you trust all intermediaries to a minimum level that is
appropriate
to the service you are authenticating. This includes, e.g., the transport
mechanism used to deliver the request. In this context, the post office
is rated sufficiently trustworthy, while unsigned (in the cryptographic
sense) email is not.
This is a hard problem to solve. In my previous job I helped design a
system for the electronic delivery and payment of bills via electronic
mail. The hardest part of the design was being able to make the
guarantee, to a level acceptable by the courts, that the entity sending
the bill was who they claimed to be, and that the recipient was who they
claimed to be. The latter was equally as important as the former, being
necessary to allow the billing intermediary to prove to the court that
the recipient did in fact receive the bill. The solution was not a
technical one, but instead required us to provide policy mechanisms that
would allow all parties in the transaction to prove to each other,
through means other than the billing/payment system itself, that they
were who they claimed to be. This out-of-band initial identification
isn't there to make life difficult for everyone: it is required by the
mathematics of public key signature systems.
An example ... this message is PGP signed. What does that tell you? It
tells you that someone with access to the private key of the PGP
certificate that signed this message, signed this message. It in no way
confirms that the person who signed the message is in fact the person
named in the From header of the message. For you to truly believe that
the message was signed by me, you need to confirm that the PGP
certificate used to sign this messages does belong to me in fact. You
can't do that by email, because you don't know who is really sending (and
signing) these email messages. You have to verify my PGP certificate by
some other means. If you were confidant that you could recognize my voice
over the telephone, and had first-hand knowledge of my telephone number,
you could call me up and ask for my PGP fingerprint. After I gave that to
you, you would compare it with the fingerprint of the certificate that
signed this message. If they matched, then, and ONLY then, could you
state with certainty that it was in fact me who sent the message.
(Technically, it asserts that the signer held the certificate's private
key. Presumably I'm not going to hand that out, since that would let the
holder forge my identity.)
What the ARRL is doing is no different. They're just doing the
out-of-band identity verification using a set of tools that are easily
available to them (and to the end-users of the system).
--- End of forwarded extract ---
--lyndon
More information about the CQ-Contest
mailing list