Re: X.509 and ssh

Ken Johanson <ken@xxxxxxxx> writes:
Moreover, x509 certs (and constructed CAs) instantly lend themselves
to a whole host of other secure AND trust applications, https,
ldaps, smtps, ftps, imaps (to name a few), mail signing /
encryption, software signing. When you extend their reach out to all
these other forms of communication, and used by computer laymen,
old-fashioned random public key strings is simply not at all

Anyone who claims that that x509 is disadvantaged compared to plain
PKI, is simply demonstrating that they have no practical or level
experience with BOTH technologies. That really shows like sore thumb
to those of us who do have both exeriences.

one of the issues from x.509 identity certificates from the early 90s
was the eventual realization that certificates potentially grossly
overloaded with personal information represented significant privacy
and liability issues.

as a result, in the mid-90s you saw the introduction of
relying-party-only certificates ...

where the only unique information in the certificate was some sort of
account number (that could be used to index a respository where the
actual entity information resided, including the original issued
public key information, along with that public key) and a public key.

an entity created some sort of message or transaction, digitally
signed the transaction and appended the RPO-certificate. It was
trivial to show for these scenarios that the appended certificate was
redundant and superfluous.

I got a lot of flack in the mid-90s for demonstrating that appending
such certificate was redundant and superfluous. The conventional
wisdom at the time was that appendidng certificates was required for
everything and if you voiced any sort of opposing view, you were a
heretic doing the work of the devil. One of the lines was about
appending certificates to retail payment transactions would bring the
business process into the modern era. My counter-argument was that the
purpose of appending certificates to payment transactions was to
provide sufficient information for offline authorization ... and, as
such was actually a return to the 50s era, predating online

This is the business process analysis of appended certificates
following the offline credential model or the letters of
introduction/credit from the sailing ship days (dating back at least
several centuries). The credential/certificate paradigm is useful in
offline scenarios where the relying party.

1) doesn't have their own information about the other party

2) doesn't have any online access to trusted authorities for
information about the other party

3) must rely on prepackaged, stale, static credential/certificate
about the other party rather than having online access to realtime

when we were called in to work with small client/server startup
that wanted to do payments on their server and had this technology
called SSL ...

we had to work out the business process details of using SSL
technology for payments ... as well as doing walkthru audits of these
emerging operations calling themselves certification authorities.

for the original payment gateway, for using SSL between the server and
the payment gateway (for payment transactions), one of the first
things we had to do was specify something called mutual authentication
(which hadn't yet been created for SSL). However, as we flushed out
the business process of servers interacting with the payment gateway,
we were keeping tables of authorized merchants and the gateway and
gateway specificate information loaded at each merchant. By the time
we were done with the process, it was evident that any certificate use
was also totally redundent and superfluous (purely a side-effect of
using the crypto function that were part of the SSL library).

The payment gateway had registered information (including public keys)
of all authorized merchants and all authorized merchants had
configuration information regarding the payment gateway (including its
public key). There was absolutely no incremental business process
advantage of appending digital certificates to any of the

The other part of stale, static, redundant and superfluous
certificates, at least related to payment transactions was that a
typical retail payment transaction is on the order of 60-80 bytes.
The RPO-certificate overhead from the mid-90s was on the order of
4k-12k bytes (i.e. appending stale, static, redundant and superfluous
digital certificates to payment transaction was causing a two orders
of magnitude payload bloat). Somewhat as a result, there was an
effort started in the financial standards organization for
"compressed" digital certificates ... with a goal of reducing the
4k-12k byte overhead down into the 300 byte range. Part of their
effort was looking at eliminating all non-unique information from a
RPO-certificate issued by a financial institution (CPS, misc. other
stuff). I raised the issue that a perfectly valid compression
technique was to eliminate all information already in possesion of the
relying party. Since I could show that the relying party already had
all possible information in the digital certificate, it was possible
to reduce the digital certificates. Rather than claiming it was
redundant and superfluous to attack stale, static digital certificates
to a transaction, it was possible to show that it was possible to
attach zero-byte digital certificates to every transaction (for a
significant reduction in the enormous payload bloat caused by digital

Another model for certificates ... with respect to thhe emulation of
credential/certificates in the offline world (where the relying party
had no other mechanism for establishing information in first time
communcation with total stranger), was the offline email model from
the early 80s. The relying party would dialup their local (electronic)
post office, exchange email, and hangup. They potentially then had to
deal with frist time email from a total stranger and no way of
establishing any information about the sender.

During the early establishment of electronic commerce, I had frequent
opportunity in exchanges to refer to the merchant digital certificates
as comfort certificates.

Stale, static digital certificates are a tangible representation of a
certification business process. In the offline world, certificates and
credentials were used as a representation of such certification
business processes for the relying parties who had no direct access or
knowledge regarding the original certification process. These stale,
static certificates and credentials provided a sense of comfort to the
relying parties that some certification process had actually occured.

One of the things that appears to have happened with regard to
physical certificates and credentials ... is that they seemed to have
taken on some mystical properties totally independent of the
certification process that they were created to represent. The
existance of a certificate or credential no convey mystical comfort
.... even though they purely are required for representation of the
certification process ... for relying parties that have no other means
of acquiring information about the certification process.

Another example of such credentials/certificates taking on mystical
comfort properties are the diploma mills ... where the pieces of
parchment produced by diploma mills seem to take on attributes totally
independent of any educational attainment that the parchment is
suppose to represent.

An issue, is that in transition to online paradigm, it is possible for
relying parties to have direct online real-time access to the
certified information ... making having to rely on the stale, static
representations of credentials and certificates, redundant and

However, there is an enormous paradigm change from an offline-based
paradigm ... when the majority of people may still draw great comfort
from artificial constructs that emulate the offline
credential/certificate paradigm ... to an online-based paradigm
dealing with realtime information and realtime business processes.

One of the big PKI marketing issues has been "trust". However, the
actual trust has to be in the certification process ... where any
certificate is purely a stale, static representation of that
certification process for use by relying parties that have no other
means of directly accessing the information.

As the world has migrated to more and more online ... that is somewhat
pushing the X.509 and PKI operations into market segments that have no
online mechanisms and/or can't justify the costs associated with
online operation. However, as online becomes more and more ubiquitous
and online costs continue to decline, that market segment for x.509
and PKI operations is rapidly shrinking (needing stale static
certificates as representation of some certification process for
relying parties that otherwise don't have direct access to the
information). Also part of the problem of moving into the no-value
market segment, is that it becomes difficult to justify any revenue
flow as part of doing no-value operations.

a slightly related commented on some of the PKI operations attempting
to misuse constructs with very specific meaning

slightly related set of posts on having worked on word smithing both
the cal. state and federal electronic signature legislation

a collection of earlier posts in this thread: X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh X.509 and ssh

misc. past posts mentioning the enormous benefits of zero byte
certificates cardtech/securetech & CA PKI cardtech/securetech & CA PKI KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt)) KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt)) Public Key Infrastructure: An Artifact... Thin PKI won - You lost X9.59 Electronic Payment Standard revised Shocking Truth about Digital Signatures Simple PKI Software for PKI Software for PKI Employee Certificates - Security Issues Invisible Ink, E-signatures slow to broadly catch on (addenda) surrogate/agent addenda (long) Maybe It's Snake Oil All the Way Down certificates & the alternative view VS: On-line signature standards the limits of crypto and authentication GP4.3 - Growth and Fraud - Case #3 - Phishing

Anne & Lynn Wheeler |

Relevant Pages

  • Re: OpenVMS SSH to freeSSHd on Windows
    ... freeSSHd on Windows is the server, ... No problem generating certificates, testing SSH - JUST NOT ON THE SERVER WHERE I STATED THE CONVERSION MUST BE UNDERSTAKEN!!!! ... It appears that freeSSHd is based on/uses OpenSSH - VMS generated certificates are not compatible with it. ...
  • Re: Authentication w/o user ids and passwords.
    ... Lyal Collins wrote: ... >> What about SSH and certificates? ... >> use ssh to make connections and open connections for the web so long as ... are more secure than passwords alone or certificates. ...
  • Re: Why is bind important?
    ... >>>like SSL and SSH do use certificates. ... Of course nobody checks them. ... HTTP, not SSL. ...
  • Re: Why is bind important?
    ... >>>like SSL and SSH do use certificates. ... Of course nobody checks them. ... HTTP, not SSL. ...
  • Re: Somewhat off-topic: cloned, possibly hacked
    ... the number of such certificates passed 1 million. ... with the on-file public key) ... ... the certification authority business tries to imply digital certificates ... transaction payload ... ...