Re: [therightkey] [cabfpub] Updated Certificate Transparency + Extended Validation plan

Rob Stradling <rob.stradling@comodo.com> Wed, 05 February 2014 18:21 UTC

Return-Path: <rob.stradling@comodo.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4A3D1A0140 for <therightkey@ietfa.amsl.com>; Wed, 5 Feb 2014 10:21:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.29
X-Spam-Level:
X-Spam-Status: No, score=-1.29 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_NET=0.611, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nSXKTXDitfmJ for <therightkey@ietfa.amsl.com>; Wed, 5 Feb 2014 10:21:17 -0800 (PST)
Received: from ian.brad.office.comodo.net (eth5.brad-fw.brad.office.ccanet.co.uk [178.255.87.226]) by ietfa.amsl.com (Postfix) with ESMTP id 0C98E1A01C7 for <therightkey@ietf.org>; Wed, 5 Feb 2014 10:21:16 -0800 (PST)
Received: (qmail 10479 invoked by uid 1000); 5 Feb 2014 18:21:14 -0000
Received: from nigel.brad.office.comodo.net (HELO [192.168.0.58]) (192.168.0.58) (smtp-auth username rob, mechanism plain) by ian.brad.office.comodo.net (qpsmtpd/0.40) with (CAMELLIA256-SHA encrypted) ESMTPSA; Wed, 05 Feb 2014 18:21:14 +0000
Message-ID: <52F2811A.9030800@comodo.com>
Date: Wed, 05 Feb 2014 18:21:14 +0000
From: Rob Stradling <rob.stradling@comodo.com>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: certificate-transparency@googlegroups.com
References: <CABrd9STwBDxwB1vtmS9Ozb5e_7D=zfOqkOBeAaT2HG7X-cw5gw@mail.gmail.com> <52F25835.60702@comodo.com> <CAL9PXLzCqvBGW=Du9ZAdMXiVgcO8WJHXf+wG7EuzE2246TFEmg@mail.gmail.com> <52F27445.6040701@comodo.com> <CAL9PXLzfatu_2LNCrCAKZWYLJArXE7+PDXswGD5fYK0byg-iJQ@mail.gmail.com>
In-Reply-To: <CAL9PXLzfatu_2LNCrCAKZWYLJArXE7+PDXswGD5fYK0byg-iJQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: "therightkey@ietf.org" <therightkey@ietf.org>, CABFPub <public@cabforum.org>
Subject: Re: [therightkey] [cabfpub] Updated Certificate Transparency + Extended Validation plan
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Feb 2014 18:21:19 -0000

On 05/02/14 17:49, Adam Langley wrote:
> On Wed, Feb 5, 2014 at 12:26 PM, Rob Stradling <rob.stradling@comodo.com> wrote:
>> Presumably it's somewhere between 10 and 31 days, since 1 SCT is acceptable
>> for Stapled OCSP and the BRs permit OCSP Responses to be valid for up to 10
>> days.
>
> The speed at which we need to distrust a log depends on the minimum
> number of SCTs actually, which is why allowing a single SCT in stapled
> OCSP responses is such a large concession. If the minimum number of
> SCTs were two then the pressure to distrust a log (and the pressure on
> the logs) would be dramatically reduced because compromising one log
> wouldn't be sufficient.
>
>> Do you still think [1] is a good plan?
>
> Sure, if any CAs are willing to do it now :)

I think "servers could just download their refreshed certificate over 
HTTP periodically and automatically" is the showstopper at the moment. 
Yes they could, but I'm not aware of any server that actually implements 
such a feature.

For at least httpd and nginx, I guess it would be pretty easy (albeit 
crude) to implement this in a simple shell script.  The bigger problem 
would be getting it widely deployed to servers.

>> How about requiring only 1 SCT for certs with durations <= the maximum
>> validity period for an OCSP Response?
>
> I agree that, if we're going to allow one SCT for stapled OCSP
> responses then we might as well allow one for 10 day certs.
>
> However, the only case where ~100 bytes makes any different is if the
> certificate chain is right on the edge of the initcwnd and the server
> cannot (somehow?) set the initcwnd. I.e. it's gone cargo cult.

What % of deployed servers can't (and/or don't?) set the initcwnd?

How small (in bytes) does a certificate chain need to be in order to 
avoid overflowing the initcwnd?

Thanks.

-- 
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

COMODO CA Limited, Registered in England No. 04058690
Registered Office:
   3rd Floor, 26 Office Village, Exchange Quay,
   Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and 
intended solely for the use of the individual or entity to whom they are 
addressed.  If you have received this email in error please notify the 
sender by replying to the e-mail containing this attachment. Replies to 
this email may be monitored by COMODO for operational or business 
reasons. Whilst every endeavour is taken to ensure that e-mails are free 
from viruses, no liability can be accepted and the recipient is 
requested to use their own virus checking software.