Download presentation
Presentation is loading. Please wait.
Published byLaura Young Modified over 8 years ago
1
Jens’ Soapbox J Jensen Rutherford Appleton Laboratory Berlin, Sep 2009
2
Soapbox History First official Soapbox on EU PMAgenda Luminy, January 2005 That was Soapbox part two Although I can’t believe there was a PMA where I didn’t speak?
3
Pre-Soapbox Soapbox I Praeterea Censeo Do not send CP/CPS to the list! Huge attachments are evil and rude Send pointers to CP/CPS
4
Pre-Soapbox Soapbox II For CA issuing CAs (non-EE), aka HLCA Permit non-IGTF CAs in signing policy file Explicit or implicit naming Improves security, doesn’t weaken it Already backed by TAGPMA!
5
Pre-Soapbox Soapbox III Jens’ Great Guide to Good Grid Governance Non-technical but advanced writeup of soapbox (SJ lecture series) To be published as IGTF doc –or book
6
Pre-Soapbox Soapbox IV The role of the proxy Case long-lived proxies being used to bypass the rules RP issue or CA issue? IGTF?
7
Questions in Quixotic Quest for Quotidian Quality The Soapbox proper: A Signatures Miscellany - mostly in the SJ series
8
Qui Quis Ubi Quibus Cur Quomodo Quando Auxilio Signatures are often permitted rather than supported But these are signatures in wider context Used for AUP, email Worth looking at, for the SJ (but also QQ)
9
Signatures Assertions …assert the integrity of stuff …asserts timestamp of signature …assert the authenticity of the signer (source) …assert legal binding (ECA2000,15(2)(a))
10
Assertions Explicit: stuff, time, who Implicit: intent Absent: why, context
11
Electronic vs Digitial Conscious vs Automatic Conscious effort to make signature –Yes, this is my signature –Yes, I signed this stuff at that time –The stuff has not been changed –I cannot deny having signed it (much later)
12
Electronic vs Digital US: Digital is conscious –Electronic may be automatic –Or may be a scanned paper signature [ABA] UK/EU: Electronic is conscious –Or Electronic = Digital, synonymous –[ECA2000,EC/1999/93]
13
The Law Lots of stuff for electronic signatures Evidential weight: duty of care etc –BIP 0008 Understand intent, not crypto “Classic signatures” understood
14
Signature Evaluation The question of Trust in certificate The question of trusting user’s intent –Usability vs Signalling intent –Frequency and training –Language, interface [johnny] The question of time
15
Signature Evaluation The Use in Controlled Environments –The Grid is a C.E.? –Other online equiv., banks, e-commerce
16
Signature Evaluation - Time verifycreate “Geography” EndStart Timeliness Sig Rev OK invalid Sig
17
Key Management Quality of generation Duty of care again in key lifecycle Same as yesterday’s robotbox –AuC, AuZ, log Leakage of key/other key threats –Cf. yesterday’s talk
18
Key Management Sysadmins and other privileged entities Key backups Escrow Proxies: loose cannons
19
Key generation and Escrow Are escrowed keys inherently less trusted for signatures –ECA2000, 14 (1) Are keys generated by (non-user) inherently less trusted
20
Distance Stuff Things to sign Key Used to sign Action Interface Usability
21
Distance Stuff Stuff to sign Key Key to sign with Freq I/face Interface Language Intent Legal I/face
22
The Trust Distance W&F “warm” “fuzzy” CA Cert Policy Pro- cess Image © STFC
23
RP concerns User Distance To Key Concern for confidentiality of key Authorised and logged use of key Wider risk of “leakage” Perceived distance by user
24
RP Concerns How many people can access the private key Consequence of errors
25
RP Concerns: LoA Asked for (eg openid) Good enough today Required tomorrow Special apps areas Grid opens Finance, biomed Usability
26
Authorising Use of Key Value of signature may req diff LoA Individually authenticated (normal) Role (human robots, as it were) Dual control (eg root CA) Audited (eg CA)
27
Delegation of Authority Depending on m’ware support –And infrastructure Limit authority Cf. projects eg Stanford authority
28
Threshold of Invoking Recourse If something goes wrong, who to turn to What is the process Can it be invoked at level of wrongness Does it actually work Signature may be out of scope of CA Or not
29
Speed Considerations Longer chains are expensive RSA verifications are expensive-ish –Exponents with few bits help (public key: verification) –Shorter keys help
30
The Confusion clusion Layering reduces the WF –Exdirection Capturing intent is difficult Specific considerations useful in wider contexts LoWF
31
Refs R Anderson : Engineering… BIP 0008 Why Johnny can’t encrypt [PGP] ECA2000, other dig sig stds.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.