Re: [therightkey] Comments on -> Re: WG Review: Public Notary Transparency (trans)

Ben Laurie <benl@google.com> Fri, 24 January 2014 18:37 UTC

Return-Path: <benl@google.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FDB21A0040 for <therightkey@ietfa.amsl.com>; Fri, 24 Jan 2014 10:37:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.914
X-Spam-Level:
X-Spam-Status: No, score=-1.914 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EiLa5M1BkcR2 for <therightkey@ietfa.amsl.com>; Fri, 24 Jan 2014 10:36:58 -0800 (PST)
Received: from mail-ie0-x22a.google.com (mail-ie0-x22a.google.com [IPv6:2607:f8b0:4001:c03::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 6F9091A0028 for <therightkey@ietf.org>; Fri, 24 Jan 2014 10:36:58 -0800 (PST)
Received: by mail-ie0-f170.google.com with SMTP id u16so3296129iet.1 for <therightkey@ietf.org>; Fri, 24 Jan 2014 10:36:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=MBnqBdoZuIKmJwhCDEd6t2xJs8KK6f2OR0mwq/xeS+c=; b=HkVRT+67EsHHZZr9TdeF69jHSXV2mJS62jcSpdtj+qvKAKn7eGJcnTcVnpOymFhfNG 83GiN6CCTb8khVVny0EfvCNiXuGqCa36oMRUc/vBBq5BrKiPOzUwIFp/3SQEwr+W8sUf 2rzh0Tfv5FwQJQdofad0nbIzFJN+aH41ZA8QcYOMTjYP9OapdFk6LNJbhYrrbJE68tTZ L30Q46RDYYGST7gddrW0Xg13AuKgYPPVQ01cfJp6faJETz4QX8m9BRCuum1MSAjlytzd QuTeuaMJcki+YhYq17m7F1UM/zG/ROGwvSbz9ny7MaZIeggcqLUppWKDyhwdxE9cRNB+ tE6A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=MBnqBdoZuIKmJwhCDEd6t2xJs8KK6f2OR0mwq/xeS+c=; b=OV8ao8znIC/9Kk8PNH+pHENewmVQXu7ivBRuog/p+syUEEDrN/uxlZ92/PyO3/LDWb SrQARlrf2cHcFYOtCw8Yf5ZCD9TIY+cm1wK/M0iZPj9wsiG73CgB8pyWtJT7mg0YWyz6 ZaxKbAE87tzyvIzayzNlggMsM+PEXXkHjPvq2L0/7FUrpiTSyMq4QvoJIqsPQPrY8x+m kLi5oPRGpDgWKtcg8MTV0dDoCyYidZS9C6y9GsBUPM2NUsXHNN6RcANPLdQMJ7mzGYQI pwi7dYeVM8WMQnt2kYZlshC/GzDw+rat6TgWiGm406SjZmOgKqmds/pqVPSO7zg6aQ/Y 5nJw==
X-Gm-Message-State: ALoCoQn6fqr3NcrbsFftoSkSAwNPEmje6kCdXAfIs2d3upg5WlLjR9tCoXYSDqOV+vdhaHkbgm3N+rzBObUxbEgI4Nsgzipaldho5W+DG+wm4ccnIyoa37mGxwxlotOl83mLjYcrCS25sMu56p2mhL1kWFh3FdBK9qXAYXPen35bz1FeQx1vRVhnWk+kExYR77reqPew9Nzw
MIME-Version: 1.0
X-Received: by 10.42.20.3 with SMTP id e3mr11922947icb.2.1390588610050; Fri, 24 Jan 2014 10:36:50 -0800 (PST)
Received: by 10.64.230.140 with HTTP; Fri, 24 Jan 2014 10:36:49 -0800 (PST)
In-Reply-To: <CF07ECF2.2D95F%paul@marvell.com>
References: <CF07ECF2.2D95F%paul@marvell.com>
Date: Fri, 24 Jan 2014 18:36:49 +0000
Message-ID: <CABrd9STDL0-GYcUzR=gLB3aoHJCA99T1-uCg2FoBTbxtQCYLow@mail.gmail.com>
From: Ben Laurie <benl@google.com>
To: Paul Lambert <paul@marvell.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Cc: trans WG <therightkey@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Subject: Re: [therightkey] Comments on -> Re: WG Review: Public Notary Transparency (trans)
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jan 2014 18:37:01 -0000

On 24 January 2014 18:29, Paul Lambert <paul@marvell.com> wrote:
>
> Comments on draft Public Notary Transparency:
>
>  - ŒTransparent Public Notary¹ would be better for a group name
>    and match the new charter more closely (versus original charter
>    was making an existing service Transparent)
>
>  - charter is too public key focused. A Merkle Hash Tree can support
>    a notary-like facility for any information that can be hashed
>    Suggest changing paragraph two to use current examples but
>    add a non-public key example and down-play public keys as just an
> example
>
>  - Is ŒPublic¹ necessary in the title and as a goal?
>    A ŒTransparent Notary¹ could be public or private.  Enterprise or
> private
>    applications could readily benefit from notary functions.
>    suggest removing public from title and add a sentence in scope
>    describing public an private applications.

The focus on public keys is deliberate. As the second work item says,
WG would re-charter for transparency of other things. This is because
it turns out that whilst there's clearly a general mechanism, there's
a lot of details that may change depending on what exactly is being
logged.

>
>  - word-smithing for readability would be beneficial. Especially
>    the introduction to better capture the groups new focus.
>
> Paul
>
>
>
>
>
> On 1/24/14, 9:53 AM, "The IESG" <iesg-secretary@ietf.org> wrote:
>
>>A new IETF working group has been proposed in the Security Area. The IESG
>>has not made any determination yet. The following draft charter was
>>submitted, and is provided for informational purposes only. Please send
>>your comments to the IESG mailing list (iesg at ietf.org) by 2014-02-03.
>>
>>Public Notary Transparency  (trans)
>>------------------------------------------------
>>Current Status: Proposed WG
>>
>>Assigned Area Director:
>>  Stephen Farrell <stephen.farrell@cs.tcd.ie>
>>
>>Mailing list
>>  Address: therightkey@ietf.org
>>  To Subscribe: https://www.ietf.org/mailman/listinfo/therightkey
>>  Archive: http://www.ietf.org/mail-archive/web/therightkey/
>>
>>Charter:
>>
>>Mitigating web site certificate mis-issuance is the initial problem of
>>interest for this working group. Certificate Transparency (CT,
>>RFC6962) allows such mis-issuance to be detected in interesting and
>>useful cases, for example by an auditor acting for the web site, or
>>one acting to check general CA behaviour. The working group will
>>produce a standards-track version of the experimental RFC 6962
>>for HTTP over TLS, reflecting implementation and deployment
>>experience since that specification was completed.
>>
>>Many Internet protocols for example, SMTPS, IPsec, DNSSEC,
>>OpenPGP and HTTPS, require  a mapping between some kind of
>>identifier and some kind of public key. These protocols rely
>>on either ad-hoc mappings, (as in a web of trust), or on authorities
>>(such as CAs) that attest to the mappings. History shows that neither
>>of these mechanisms is entirely satisfactory.  Ad-hoc mappings are
>>difficult to discover and maintain, and authorities make mistakes or
>>are subverted.
>>
>>Cryptographically verifiable logs can help to ameliorate these
>>problems by making it possible to discover errors quickly, so that
>>other mechanisms can be applied to rectify them. A cryptographically
>>verifiable log is an append-only log of hashes of more-or-less anything
>>that  is structured in such a way as to provide efficiently-accessible,
>>cryptographically-supported evidence of correct log behaviour. For
>>example, RFC 6962 says: "The append-only property of each log is
>>technically achieved using Merkle Trees, which can be used to show
>>that any particular version of the log is a superset of any particular
>>previous version. Likewise, Merkle Trees avoid the need to blindly
>>trust logs: if a log attempts to show different things to different
>>people, this can be efficiently detected by comparing tree roots and
>>consistency proofs. Similarly, other misbehaviors of any log (e.g.,
>>issuing signed timestamps for certificates they then don't log) can be
>>efficiently detected and proved to the world at large."
>>
>>These logs can potentially also assist with other interesting
>>problems, such as how to assure end users that software they are
>>running is, indeed, the software they intend to run.
>>
>>While the privacy issues related to use of RFC6962 for public
>>web sites are minimal, the working group will consider privacy
>>as it might impact on uses of CT e.g. within enterprises or
>>for other uses of logs.
>>
>>Work items:
>>
>>- Publish an update to RFC 6962 as a standards-track mechanism to
>>apply verifiable logs to HTTP over TLS.  As DANE (RFC6698) provides an
>>alternative keying infrastructure to that used in the current web PKI,
>>the working group should consider appropriate client behavior in the
>>presence of both DANE-based keying and current web PKI when
>>standardising CT.
>>
>>- Discuss mechanisms and techniques that allow cryptographically
>>verifiable logs to be deployed to improve the security of protocols
>>other than HTTP over TLS, for example SMTP/TLS or software
>>distribution. Where such mechanisms appear sufficiently useful,
>>the WG will re-charter to add relevant new work items.  Should
>>no such items be chartered the WG will close when documents
>>associated with the first work item are complete.
>>
>>
>>
>>Milestones:
>>
>>TBD
>>_______________________________________________
>>therightkey mailing list
>>therightkey@ietf.org
>>https://www.ietf.org/mailman/listinfo/therightkey
>
> _______________________________________________
> therightkey mailing list
> therightkey@ietf.org
> https://www.ietf.org/mailman/listinfo/therightkey