ietf
[Top] [All Lists]

Target audience? (was Re: [saag] Last Call: <draft-dukhovni-opportunistic-security-01.txt> (Opportunistic Security: some protection most of the time) to Informational RFC)

2014-08-04 12:11:19
On 8/4/2014 9:51 AM, Stephen Kent wrote:
Viktor

On Thu, Jul 31, 2014 at 09:24:33PM +0100, t.p. wrote:

But on key management, I am not sure I agree with you.  Yes, ECDHE
is a part of key management, but I would not think it on its own as
being key management; or put differently, you either have key
management or you do not, so 'authenticated key management'
seems to me .. well, not real.  I look in vain for it in RFC2401
or RFC2828.
One tends to distinguish between key management and key agreement.
I've not previously seen ephemeral key agreement described as key
management.  


I've published nothing on key management.  I sometimes hear people talk
about it.  I often misplace my keys and sometimes am locked out of my
house....

2 minute search:

     http://en.wikipedia.org/wiki/Cryptographic_key_types

     "One of the most important aspects of any cryptographic system is
key management..."

followed by a long list of types of key workings, including:

     " Private ephemeral key agreement key

       Private ephemeral key agreement keys are the private keys of
asymmetric key pairs that are used only once to establish one or more
keys (e.g., key wrapping keys, data encryption keys, or MAC keys) and,
optionally, other keying material (e.g., Initialization Vectors).

     "Public ephemeral key agreement key

      Public ephemeral key agreement keys are the public keys of
asymmetric key pairs that are used in a single key establishment
transaction to establish one or more keys (e.g., key wrapping keys, data
encryption keys, or MAC keys) and, optionally, other keying material
(e.g., Initialization Vectors).

Looks to me like they are listed as key management methods.


More generally, for this draft, I would expect the term 'key management'
to have extremely broad and inclusive meaning, only barely qualifying as
a technical definition, simply because I thought this document was
intended for broad use.


Discussions on the topic of this draft have regularly included
statements along the lines of "I believe x" or "when I say y, I mean z",
presumably meaning that the speaker's personal usage represents a
definitive basis for the position they are espousing.

Another popular style of comment is to make fine-grained distinctions,
demanding significant nuance in usage.


All of which leads to the basic question of who this draft is for?  I
thought it was for broad-based use among technicians, technical managers
and others, including folk who are not security experts and folk who
might not even be networking or computer experts.


It really would help to gain some rough consensus about the target
audience for this document, so that that population can be referenced
when attempting to evaluate choices, rather than having anyone attempt
to rely on their personal preferences, here on the IETF.



d/
-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net

<Prev in Thread] Current Thread [Next in Thread>