reflections on sdsi · lampson fest february 13, 2014. context 1970–1990 i invention of...

35
Reflections on SDSI Ronald L. Rivest Vannevar Bush Professor of EECS MIT, Cambridge, MA Lampson Fest February 13, 2014

Upload: others

Post on 07-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Reflections on SDSI

Ronald L. Rivest

Vannevar Bush Professor of EECSMIT, Cambridge, MA

Lampson Fest

February 13, 2014

Page 2: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Context 1970–1990

I Invention of public-key cryptography (Diffie & Hellman1976, RSA 1977)

I Invention of public-key certificate (Kohnfelder, MITB.S. thesis, 1978). Binds name to public key.

I X.509 hierarchical public-key infrastructure andcertificates (1988). Envisions strict hierarchy ofcertificate authorities.

I Invention of World Wide Web (TBL, first browser1990) – causing explosive growth of digitalcommunications and e-commerce.

Page 3: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Context 1970–1990

I Invention of public-key cryptography (Diffie & Hellman1976, RSA 1977)

I Invention of public-key certificate (Kohnfelder, MITB.S. thesis, 1978). Binds name to public key.

I X.509 hierarchical public-key infrastructure andcertificates (1988). Envisions strict hierarchy ofcertificate authorities.

I Invention of World Wide Web (TBL, first browser1990) – causing explosive growth of digitalcommunications and e-commerce.

Page 4: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Context 1970–1990

I Invention of public-key cryptography (Diffie & Hellman1976, RSA 1977)

I Invention of public-key certificate (Kohnfelder, MITB.S. thesis, 1978). Binds name to public key.

I X.509 hierarchical public-key infrastructure andcertificates (1988). Envisions strict hierarchy ofcertificate authorities.

I Invention of World Wide Web (TBL, first browser1990) – causing explosive growth of digitalcommunications and e-commerce.

Page 5: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Context 1970–1990

I Invention of public-key cryptography (Diffie & Hellman1976, RSA 1977)

I Invention of public-key certificate (Kohnfelder, MITB.S. thesis, 1978). Binds name to public key.

I X.509 hierarchical public-key infrastructure andcertificates (1988). Envisions strict hierarchy ofcertificate authorities.

I Invention of World Wide Web (TBL, first browser1990) – causing explosive growth of digitalcommunications and e-commerce.

Page 6: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Inquiring minds wanted to know:

I How can public-key technology best be used tosecure the Internet?

I Can’t we invent something simpler and better thanX.509 and ASN.1 ?

I What do we really need?I What’s in a name?I Do we really need CRL’s?I ...much discussion and unhappiness with existing

framework and tools...

Page 7: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Inquiring minds wanted to know:

I How can public-key technology best be used tosecure the Internet?

I Can’t we invent something simpler and better thanX.509 and ASN.1 ?

I What do we really need?I What’s in a name?I Do we really need CRL’s?I ...much discussion and unhappiness with existing

framework and tools...

Page 8: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Inquiring minds wanted to know:

I How can public-key technology best be used tosecure the Internet?

I Can’t we invent something simpler and better thanX.509 and ASN.1 ?

I What do we really need?

I What’s in a name?I Do we really need CRL’s?I ...much discussion and unhappiness with existing

framework and tools...

Page 9: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Inquiring minds wanted to know:

I How can public-key technology best be used tosecure the Internet?

I Can’t we invent something simpler and better thanX.509 and ASN.1 ?

I What do we really need?I What’s in a name?

I Do we really need CRL’s?I ...much discussion and unhappiness with existing

framework and tools...

Page 10: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Inquiring minds wanted to know:

I How can public-key technology best be used tosecure the Internet?

I Can’t we invent something simpler and better thanX.509 and ASN.1 ?

I What do we really need?I What’s in a name?I Do we really need CRL’s?

I ...much discussion and unhappiness with existingframework and tools...

Page 11: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Inquiring minds wanted to know:

I How can public-key technology best be used tosecure the Internet?

I Can’t we invent something simpler and better thanX.509 and ASN.1 ?

I What do we really need?I What’s in a name?I Do we really need CRL’s?I ...much discussion and unhappiness with existing

framework and tools...

Page 12: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SPKI begins

I Feb ’96: Perry Metzger begins SPKI (Simple PublicKey Infrastructure) mailing list.

I Carl Ellison gives many “use cases” not yet wellhandled, such as granting of permissions.

I Inspired by earlier work by Lampson, Ellison alsoargues for elimination of names in favor of usingpublic-keys as the only handles (identifiers) forprincipals.

Page 13: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SPKI begins

I Feb ’96: Perry Metzger begins SPKI (Simple PublicKey Infrastructure) mailing list.

I Carl Ellison gives many “use cases” not yet wellhandled, such as granting of permissions.

I Inspired by earlier work by Lampson, Ellison alsoargues for elimination of names in favor of usingpublic-keys as the only handles (identifiers) forprincipals.

Page 14: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SPKI begins

I Feb ’96: Perry Metzger begins SPKI (Simple PublicKey Infrastructure) mailing list.

I Carl Ellison gives many “use cases” not yet wellhandled, such as granting of permissions.

I Inspired by earlier work by Lampson, Ellison alsoargues for elimination of names in favor of usingpublic-keys as the only handles (identifiers) forprincipals.

Page 15: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Lampson/Rivest start thinking about names

I March 1996: Lampson and Rivest begin discussionswith Ellison, other SPKI folks, and with each other, onthese issues, especially names.

I Lampson emails (1 mar 96):“So my belief is that anything people have to look atshould be stated in terms of meaningful names, notkeys. The keys should be kept internal to the system.Of course you can say that you’ll have extracertificates linking names to keys, but the names willstill be the "real" thing. It’s true that the system takesaction based on messages being signed by keys, butthe configuration, which is the important thing, isestablished in terms of names, since that’s the onlyway people can describe it. So it must be that thenames are the real thing and the keys just an internalmechanism. ”

Page 16: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Lampson/Rivest start thinking about names

I March 1996: Lampson and Rivest begin discussionswith Ellison, other SPKI folks, and with each other, onthese issues, especially names.

I Lampson emails (1 mar 96):“So my belief is that anything people have to look atshould be stated in terms of meaningful names, notkeys. The keys should be kept internal to the system.Of course you can say that you’ll have extracertificates linking names to keys, but the names willstill be the "real" thing. It’s true that the system takesaction based on messages being signed by keys, butthe configuration, which is the important thing, isestablished in terms of names, since that’s the onlyway people can describe it. So it must be that thenames are the real thing and the keys just an internalmechanism. ”

Page 17: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Names

Names want simultaneously to be:I Short, memorable.

I Meaningful and easy to use.I Local (non-hierarchical; bottom-up).I Globally unique.

These are not compatible!

Page 18: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Names

Names want simultaneously to be:I Short, memorable.I Meaningful and easy to use.

I Local (non-hierarchical; bottom-up).I Globally unique.

These are not compatible!

Page 19: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Names

Names want simultaneously to be:I Short, memorable.I Meaningful and easy to use.I Local (non-hierarchical; bottom-up).

I Globally unique.

These are not compatible!

Page 20: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Names

Names want simultaneously to be:I Short, memorable.I Meaningful and easy to use.I Local (non-hierarchical; bottom-up).I Globally unique.

These are not compatible!

Page 21: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Names

Names want simultaneously to be:I Short, memorable.I Meaningful and easy to use.I Local (non-hierarchical; bottom-up).I Globally unique.

These are not compatible!

Page 22: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

It gets worse!

I If PKI and certificates are mostly about bindings ofnames to public keys: how do you know who isauthorized to assert such a binding for a given name?

I Especially if names are non-hierarchical?I Who is relevant “CA” for a name?

Page 23: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

It gets worse!

I If PKI and certificates are mostly about bindings ofnames to public keys: how do you know who isauthorized to assert such a binding for a given name?

I Especially if names are non-hierarchical?

I Who is relevant “CA” for a name?

Page 24: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

It gets worse!

I If PKI and certificates are mostly about bindings ofnames to public keys: how do you know who isauthorized to assert such a binding for a given name?

I Especially if names are non-hierarchical?I Who is relevant “CA” for a name?

Page 25: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SDSI

Lampson and Rivest publish draft SDSI (SimpleDistributed Security Infrastructure) in June 1996:

I Innovation: Associate a name space with each publickey.

I In effect, each name now has the form of a dottedpair consisting of a public key and an identifier.

PK.identifierI PK is the only PK authorized to sign bindings for

PK.identifier. Certificate thus has form:PK.identifier =⇒ PK’ (signed by PK)

Page 26: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SDSI

Lampson and Rivest publish draft SDSI (SimpleDistributed Security Infrastructure) in June 1996:

I Innovation: Associate a name space with each publickey.

I In effect, each name now has the form of a dottedpair consisting of a public key and an identifier.

PK.identifier

I PK is the only PK authorized to sign bindings forPK.identifier. Certificate thus has form:

PK.identifier =⇒ PK’ (signed by PK)

Page 27: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SDSI

Lampson and Rivest publish draft SDSI (SimpleDistributed Security Infrastructure) in June 1996:

I Innovation: Associate a name space with each publickey.

I In effect, each name now has the form of a dottedpair consisting of a public key and an identifier.

PK.identifierI PK is the only PK authorized to sign bindings for

PK.identifier. Certificate thus has form:PK.identifier =⇒ PK’ (signed by PK)

Page 28: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SDSI Advantages

I Names (identifiers) can be local and meaningful toissuer.

I Name conflicts avoided; global uniqueness OK.I Names can naturally refer to groups.I Extended names have a nice algebra:

PK.Microsoft.Research.ButlerLampsonchains four name spaces together to give nice indirecthandle for Butler, even if I only know public key ofMicrosoft; Certificate can bind to extended name:PK.butler=⇒PK.Microsoft.Research.ButlerLampson

Page 29: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SDSI Advantages

I Names (identifiers) can be local and meaningful toissuer.

I Name conflicts avoided; global uniqueness OK.

I Names can naturally refer to groups.I Extended names have a nice algebra:

PK.Microsoft.Research.ButlerLampsonchains four name spaces together to give nice indirecthandle for Butler, even if I only know public key ofMicrosoft; Certificate can bind to extended name:PK.butler=⇒PK.Microsoft.Research.ButlerLampson

Page 30: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SDSI Advantages

I Names (identifiers) can be local and meaningful toissuer.

I Name conflicts avoided; global uniqueness OK.I Names can naturally refer to groups.

I Extended names have a nice algebra:PK.Microsoft.Research.ButlerLampson

chains four name spaces together to give nice indirecthandle for Butler, even if I only know public key ofMicrosoft; Certificate can bind to extended name:PK.butler=⇒PK.Microsoft.Research.ButlerLampson

Page 31: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

SDSI Advantages

I Names (identifiers) can be local and meaningful toissuer.

I Name conflicts avoided; global uniqueness OK.I Names can naturally refer to groups.I Extended names have a nice algebra:

PK.Microsoft.Research.ButlerLampsonchains four name spaces together to give nice indirecthandle for Butler, even if I only know public key ofMicrosoft; Certificate can bind to extended name:PK.butler=⇒PK.Microsoft.Research.ButlerLampson

Page 32: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

What happened to World Domination?

Why didn’t SDSI take over?I SDSI is great for writing ACL’s—oriented more

towards access-control than for authentication.

I Elegant naming algebra still leaves an interesting (butsolvable) search problem for finding certificate chains.This starts with (requesting) key, and findsexplanation why it is implied by ACL.

I In practice, search problem is often vaguer: givenattributes of another principal, find their public key.

Page 33: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

What happened to World Domination?

Why didn’t SDSI take over?I SDSI is great for writing ACL’s—oriented more

towards access-control than for authentication.I Elegant naming algebra still leaves an interesting (but

solvable) search problem for finding certificate chains.This starts with (requesting) key, and findsexplanation why it is implied by ACL.

I In practice, search problem is often vaguer: givenattributes of another principal, find their public key.

Page 34: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

What happened to World Domination?

Why didn’t SDSI take over?I SDSI is great for writing ACL’s—oriented more

towards access-control than for authentication.I Elegant naming algebra still leaves an interesting (but

solvable) search problem for finding certificate chains.This starts with (requesting) key, and findsexplanation why it is implied by ACL.

I In practice, search problem is often vaguer: givenattributes of another principal, find their public key.

Page 35: Reflections on SDSI · Lampson Fest February 13, 2014. Context 1970–1990 I Invention of public-key cryptography (Diffie & Hellman 1976, RSA 1977) I Invention of public-key certificate

Thanks and Happy Birthday, Butler!