--
You received this message because you are subscribed to the Google Groups "cap-talk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cap-talk+u...@googlegroups.com.
To post to this group, send email to cap-...@googlegroups.com.
Visit this group at https://groups.google.com/group/cap-talk.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/87y3ds4hob.fsf%40dustycloud.org.
For more options, visit https://groups.google.com/d/optout.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/CANpA1Z3JGCXhC%2BnrA7RMVr_%3DRUjXc-3f5Yaaj8Spt0%3DVWp2cFg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
On 31 July 2018 at 15:13, Kevin Reid <kpr...@switchb.org> wrote:
> The straightforward approach as I see it is that there should be an
> operation — at the capability platform level, applicable to any capability
> rather than being application-specific — which means "please issue me a new
> capability exactly like this one except with fresh cryptographic features".
> Note specifically that this is no different from the normal case of sending
> a message and getting a response whose value is a capability, so it has no
> new cryptographic implications.
This is not that useful if a capability has been compromised though as anyone
who stole the capability can get a nice fresh one potentially.
It is fine if you want to update your algorithm or key strength but this does not happen very often.
So I think you may need a refresh route that involves going back to get the capability from where you got the original one from.
On Tue, Jul 31, 2018 at 8:50 PM, Kevin Reid <kpr...@switchb.org> wrote:
> In a capability system, you get capabilities from capabilities which you got
> from capabilities … — to think of there being an original capability which
> it makes sense to go back to is, in my opinion, a mistake, because it leads
> to your capability systems being necessarily small and bootstrapped from
> non-capability systems, which inhibits your ability to do actual capability
> design.
Perhaps its quibbling over the definition of capability, but we can
take the sealer/unsealer pattern
as a case where the unsealer absent the box gives no authority, and
the box absent the unsealer gives no authority,
essentially a primitive form of rights amplification where 2 benign
objects are brought together to form a capability...
Christopher Lemmer Webber Mon, Jul 30, 6:08 PM wrote:
- Alice uses (K0) for lots of services... she has individual capability
certificates issued for O1-1000 but they all use K0.
- Pros: Alice can update K0 in a single place and all of her services
are now also updated. She can invoke her capabilities for B and
also invoke O1-1000 and it's fine.
(Come to think of it, Carol may also be hosed in that scenario even
if Alice used the same key for everything but Alice's key got
rotated. Alice could surely invoke her certificate to the Bank with
her new key, but it seems like the delegation would break here too,
because if the cert chain was signed with Alice's old key, even
if she rotated it, we can't trust this old cert that Carol has.
Argh, my brain is breaking!)
|
I think that a "full-fledged" capability system — that is, one which provides for all needs which will come up in using it at scale and for a long time — must include standard provisions to help manage them effectively rather than leaving it up to individual users' and application designers' actions to be fully thoughtful.
Justin Cormack <jus...@specialbusservice.com> Tue, Jul 31, 8:10 PM wrote:
This is not that useful if a capability has been compromised though as anyone
who stole the capability can get a nice fresh one potentially. It is fine if you want
to update your algorithm or key strength but this does not happen very often. So
I think you may need a refresh route that involves going back to get the capability
from where you got the original one from.
Because certificates are non transferable (unless you transfer private keys...) they
do seem a poor fit for capabilities, you would have to do some sort of
chaining for each transfer which seems not very scalable.
Kevin Reid via googlegroups.com 9:01 AM
I'm not sure I understand your point, if you're intending to disagree with me. I don't mean to claim that "where you got a capability from" is not a thing to ever take into account. I say that it is a bad idea to design a system that, in order to function, needs to periodically look all the way back to something which is not a capability introduction, which is what I took "going back to get the capability from where you got the original one from" to mean.
On 1 August 2018 at 21:32, Tony Arcieri <bas...@gmail.com> wrote:
> The problems this post seems to be describing seem to stem from the
> capabilities-as-keys model, which is well-known not to live up to OCap's
> ideals.
Is it well known? References? Most of the articles I found were very
early before
things were practical.