shibboleth-dev - RE: Encryption key strategies
Subject: Shibboleth Developers
List archive
- From: "Scott Cantor" <>
- To: <>
- Subject: RE: Encryption key strategies
- Date: Thu, 29 Jun 2006 14:58:16 -0400
- Organization: The Ohio State University
> Setting aside the totally absurd notion that someone can setup a
> shibboleth IdP or SP, yet be incapable of running a simple cron
> task, the entire methodology of client-pull of metadata from a
> federation repository is backwards. It is the federation that
> knows when something has changed - not the clients.
I agree with your conclusion, but not your first sentence, unless by
"absurd" you mean "wow, the world is just nuts". Because that's reality.
Whether people can or can't set it up is irrelevant, what they do is what
matters.
Secondly, Windows doesn't have cron let alone cron.daily, and I have 50+
Windows SPs here. It's not at all unusual for those sysadmins to not even be
aware of the AT command.
Most every SSO system out there uses keys of some sort and most of them are
probably pretty vulnerable to key compromise windows. Nothing new. I'm just
raising the issue that clearly CRLs are a laughable answer, as you note, nor
does anybody use them, so the current use of CAs is broken just on
principle.
-- Scott
- Re: Encryption key strategies, (continued)
- Re: Encryption key strategies, Thomas Lenggenhager, 06/26/2006
- RE: Encryption key strategies, Scott Cantor, 06/26/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
- RE: Encryption key strategies, Scott Cantor, 06/28/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
- RE: Encryption key strategies, Scott Cantor, 06/28/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
- RE: Encryption key strategies, Scott Cantor, 06/28/2006
- Re: Encryption key strategies, Ian Young, 06/29/2006
- Re: Encryption key strategies, Jim Fox, 06/29/2006
- RE: Encryption key strategies, Scott Cantor, 06/29/2006
- Re: Encryption key strategies, Ian Young, 06/29/2006
- RE: Encryption key strategies, Scott Cantor, 06/28/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
- RE: Encryption key strategies, Scott Cantor, 06/28/2006
- On using CRLs in Shibboleth (was: Re: Encryption key strategies), Reimer Karlsen-Masur, DFN-CERT, 06/29/2006
- RE: On using CRLs in Shibboleth (was: Re: Encryption key strategies), Scott Cantor, 06/29/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
- RE: Encryption key strategies, Scott Cantor, 06/28/2006
- Re: Encryption key strategies, Thomas Lenggenhager, 06/26/2006
Archive powered by MHonArc 2.6.16.