Re: [perpass] Draft charter for a Transparency Working Group
Robin Wilton <wilton@isoc.org> Mon, 06 January 2014 17:20 UTC
Return-Path: <wilton@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FE0A1AE115 for <perpass@ietfa.amsl.com>; Mon, 6 Jan 2014 09:20:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oW8IbP1cdehE for <perpass@ietfa.amsl.com>; Mon, 6 Jan 2014 09:20:26 -0800 (PST)
Received: from smtp110.iad3a.emailsrvr.com (smtp110.iad3a.emailsrvr.com [173.203.187.110]) by ietfa.amsl.com (Postfix) with ESMTP id 17B431AE111 for <perpass@ietf.org>; Mon, 6 Jan 2014 09:20:25 -0800 (PST)
Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp14.relay.iad3a.emailsrvr.com (SMTP Server) with ESMTP id 95C622B8086; Mon, 6 Jan 2014 12:20:16 -0500 (EST)
X-Virus-Scanned: OK
Received: by smtp14.relay.iad3a.emailsrvr.com (Authenticated sender: wilton-AT-isoc.org) with ESMTPSA id C3E8D2B80FF; Mon, 6 Jan 2014 12:20:15 -0500 (EST)
Mime-Version: 1.0 (Apple Message framework v1283)
Content-Type: multipart/alternative; boundary="Apple-Mail=_682D8C24-8DA6-4737-B8A9-A27119A111EE"
From: Robin Wilton <wilton@isoc.org>
In-Reply-To: <CABrd9SQHq+AkvvJQ6-XuwmDyT8-662GeavcU47jFoYYN8v1CAg@mail.gmail.com>
Date: Mon, 06 Jan 2014 17:20:53 +0000
Message-Id: <A4181252-CA90-4593-9924-E1EEC91E983F@isoc.org>
References: <CABrd9STYF166vXEXNneJfPyfo5VG3LPKmzyZpAhvYnDTsy_U9g@mail.gmail.com> <52A8B1D0.2080304@dcrocker.net> <CABrd9SS9FGsm-waznAHeMr33XzprhRF=DXVjknyL-7bOyArAxg@mail.gmail.com> <CAMm+LwjNXpszKMqXr231Vti=pfwYn98Fgmuv1T5M__nhGmZHQw@mail.gmail.com> <CABrd9SSYnBRtecDSwUZUjvKJPLB+XX6Kk_9NHtQ=X-5jo4jGxQ@mail.gmail.com> <52A8E0E9.5020409@dcrocker.net> <CABrd9ST+CKNNHZ-jLd1=boeWUh-sjZf1WF5fmayCF7+DjnD65w@mail.gmail.com> <52A9E61C.8030300@bbn.com> <CABrd9SSMs0+73R9Ug3tnLGt-56sYz0XEzy1RGYy=Yx7KM4r--w@mail.gmail.com> <52C19300.3050201@bbn.com> <CABrd9SQHq+AkvvJQ6-XuwmDyT8-662GeavcU47jFoYYN8v1CAg@mail.gmail.com>
To: Ben Laurie <benl@google.com>
X-Mailer: Apple Mail (2.1283)
Cc: perpass <perpass@ietf.org>, Stephen Kent <kent@bbn.com>, saag <saag@ietf.org>
Subject: Re: [perpass] Draft charter for a Transparency Working Group
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jan 2014 17:20:28 -0000
Hi all - A further suggestion inline. One motivation for my suggesting a change is that I am instinctively uneasy when the word "proof" crops up in this kind of context. I think what we're doing is providing the means to accrue evidence, on the basis of which someone can make an inference as to whether correct log behaviour has been recorded. R On 6 Jan 2014, at 17:02, Ben Laurie wrote: > On 30 December 2013 15:36, Stephen Kent <kent@bbn.com> wrote: >> Ben, >> >>> How's this? >>> >>> [1] A cryptographically verifiable log is an append-only log of hashes >>> of more-or-less anything that can prove its own correctness >>> cryptographically. >>> >>> For example, from RFC 6962: “The append-only property of each log is >>> technically achieved using Merkle Trees, which can be used to show >>> that any particular version of the log is a superset of any particular >>> previous version. Likewise, Merkle Trees avoid the need to blindly >>> trust logs: if a log attempts to show different things to different >>> people, this can be efficiently detected by comparing tree roots and >>> consistency proofs. Similarly, other misbehaviours of any log (e.g., >>> issuing signed timestamps for certificates they then don't log) can be >>> efficiently detected and proved to the world at large.” >>> >>> See RFC 6962, >>> http://www.links.org/files/CertificateTransparencyVersion2.1a.pdf >>> and http://www.links.org/files/RevocationTransparency.pdf for >>> background. >>> >> Sorry to be so late in responding; holidays ... > > Likewise. > >> The text describing how 6962 uses Merkle trees is good. I think the >> phrase "prove its own correctness" is way too broad. The example >> you cite shows how to demonstrate internal consistency for a log, >> and to enable third parties to verify certain lob properties. That >> is much narrower than what the term "correctness" implies. > > How about, instead of "can prove its own correctness > cryptographically", we say "allows efficient verification of > behaviour"? "A cryptographically verifiable log is an append-only log of hashes, structured in such a way as to provide efficiently-accessible, cryptographically-supported evidence of correct [log] behaviour". That way, you capture the following: - use of hashing/cryptographic mechanisms to maintain the integrity of the evidence trail - reference to the relevance of structure (Merkle trees) - de-coupling of the evidence (signed records) from what it is that the evidence is intended to show (correct behaviour) Hope this helps - Robin > _______________________________________________ > perpass mailing list > perpass@ietf.org > https://www.ietf.org/mailman/listinfo/perpass
- [perpass] Draft charter for a Transparency Workin… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Dave Crocker
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Phillip Hallam-Baker
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Dave Crocker
- Re: [perpass] Draft charter for a Transparency Wo… Douglas Otis
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Phillip Hallam-Baker
- Re: [perpass] Draft charter for a Transparency Wo… Stephen Kent
- Re: [perpass] Draft charter for a Transparency Wo… Dave Crocker
- Re: [perpass] [saag] Draft charter for a Transpar… Paul Lambert
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Phillip Hallam-Baker
- Re: [perpass] Draft charter for a Transparency Wo… Phillip Hallam-Baker
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Stephen Kent
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Robin Wilton
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie
- Re: [perpass] Draft charter for a Transparency Wo… Stephen Kent
- Re: [perpass] Draft charter for a Transparency Wo… Ben Laurie