On 04/01/2017 07:13 PM, Subodh Iyengar wrote:
> Thanks for your question Brian.
>
> The motivation behind delegated credentials is to create a more
> reasonable deployment model for short lived credentials.

My apologies for being blunt, but that text reads like a solution in
search of a problem.  That is, what is expected to be achieved by having
shorter-lived credentials?  Is there a threat model for which having
them brings security advantages, or are there operational concerns, or ... ?

> [....]

> This led us to think of whether we could deploy short lived
> credentials with another approach. Once you can deploy short lived
> credentials we found several use cases for these:
>
> * Removing private keys from currently trusted hosts and keeping them
> in even more secure locations. In this way you could increase security
> by moving keys from places they currently exist.
> * You could make a security / performance by giving delegated
> credentials to your less trusted locations where you could make the
> tradeoff that if one of these is stolen it's valid only for a very
> short period of time.
>
> I'm not too familiar with the cloud provider to service owner
> trust model, but your idea of giving the cloud provider a delegated
> credential instead of a longer lived certificate key sounds great.
>
> Delegated credentials bounds time, however if used with other
> mechanisms you can make security protections even more robust. For
> example you could give your cloud provider a delegated credential
> bound to a certificate with a different origin. If you find that
> something bad has happened you can stop routing traffic to that origin
> as well.
>

These are also some useful analysis, but still leaves me wondering what
the actual goal to be achieved is.  Put another way, I assume that there
is some attacker with some capabilities that will be stymied in some way
by the deployment of delegated credentials, as compared to having real
certificates/keys deployed to the machines that are going to get
delegated credentials on them.  But what benefit, and what are the
attacker's capabilities?

There is also an alternate world in which the TLS terminators should not
have certificates/keys on them but it is okay to give them delegated
credentials.  Here, one benefit is clear: performance.  But the attacker
capabilities against which this is supposed to be useful/acceptable
remain unclear.

Can you share some more thoughts about which of these two pictures you
have in mind, and what the attacker capabilities are in that scenario?

Thanks,

Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to