Re: [therightkey] Comments on -> Re: WG Review: Public Notary Transparency (trans)
Ben Laurie <benl@google.com> Fri, 24 January 2014 18:37 UTC
Return-Path: <benl@google.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id 3FDB21A0040 for <therightkey@ietfa.amsl.com>;
Fri, 24 Jan 2014 10:37:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.914
X-Spam-Level:
X-Spam-Status: No,
score=-1.914 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,
DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622,
RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EiLa5M1BkcR2 for
<therightkey@ietfa.amsl.com>; Fri, 24 Jan 2014 10:36:58 -0800 (PST)
Received: from mail-ie0-x22a.google.com (mail-ie0-x22a.google.com
[IPv6:2607:f8b0:4001:c03::22a]) by ietfa.amsl.com (Postfix) with ESMTP id
6F9091A0028 for <therightkey@ietf.org>; Fri, 24 Jan 2014 10:36:58 -0800 (PST)
Received: by mail-ie0-f170.google.com with SMTP id u16so3296129iet.1 for
<therightkey@ietf.org>; Fri, 24 Jan 2014 10:36:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113;
h=mime-version:in-reply-to:references:date:message-id:subject:from:to
:cc:content-type:content-transfer-encoding;
bh=MBnqBdoZuIKmJwhCDEd6t2xJs8KK6f2OR0mwq/xeS+c=;
b=HkVRT+67EsHHZZr9TdeF69jHSXV2mJS62jcSpdtj+qvKAKn7eGJcnTcVnpOymFhfNG
83GiN6CCTb8khVVny0EfvCNiXuGqCa36oMRUc/vBBq5BrKiPOzUwIFp/3SQEwr+W8sUf
2rzh0Tfv5FwQJQdofad0nbIzFJN+aH41ZA8QcYOMTjYP9OapdFk6LNJbhYrrbJE68tTZ
L30Q46RDYYGST7gddrW0Xg13AuKgYPPVQ01cfJp6faJETz4QX8m9BRCuum1MSAjlytzd
QuTeuaMJcki+YhYq17m7F1UM/zG/ROGwvSbz9ny7MaZIeggcqLUppWKDyhwdxE9cRNB+ tE6A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net;
s=20130820;
h=x-gm-message-state:mime-version:in-reply-to:references:date
:message-id:subject:from:to:cc:content-type :content-transfer-encoding;
bh=MBnqBdoZuIKmJwhCDEd6t2xJs8KK6f2OR0mwq/xeS+c=;
b=OV8ao8znIC/9Kk8PNH+pHENewmVQXu7ivBRuog/p+syUEEDrN/uxlZ92/PyO3/LDWb
SrQARlrf2cHcFYOtCw8Yf5ZCD9TIY+cm1wK/M0iZPj9wsiG73CgB8pyWtJT7mg0YWyz6
ZaxKbAE87tzyvIzayzNlggMsM+PEXXkHjPvq2L0/7FUrpiTSyMq4QvoJIqsPQPrY8x+m
kLi5oPRGpDgWKtcg8MTV0dDoCyYidZS9C6y9GsBUPM2NUsXHNN6RcANPLdQMJ7mzGYQI
pwi7dYeVM8WMQnt2kYZlshC/GzDw+rat6TgWiGm406SjZmOgKqmds/pqVPSO7zg6aQ/Y 5nJw==
X-Gm-Message-State: ALoCoQn6fqr3NcrbsFftoSkSAwNPEmje6kCdXAfIs2d3upg5WlLjR9tCoXYSDqOV+vdhaHkbgm3N+rzBObUxbEgI4Nsgzipaldho5W+DG+wm4ccnIyoa37mGxwxlotOl83mLjYcrCS25sMu56p2mhL1kWFh3FdBK9qXAYXPen35bz1FeQx1vRVhnWk+kExYR77reqPew9Nzw
MIME-Version: 1.0
X-Received: by 10.42.20.3 with SMTP id e3mr11922947icb.2.1390588610050;
Fri, 24 Jan 2014 10:36:50 -0800 (PST)
Received: by 10.64.230.140 with HTTP; Fri, 24 Jan 2014 10:36:49 -0800 (PST)
In-Reply-To: <CF07ECF2.2D95F%paul@marvell.com>
References: <CF07ECF2.2D95F%paul@marvell.com>
Date: Fri, 24 Jan 2014 18:36:49 +0000
Message-ID: <CABrd9STDL0-GYcUzR=gLB3aoHJCA99T1-uCg2FoBTbxtQCYLow@mail.gmail.com>
From: Ben Laurie <benl@google.com>
To: Paul Lambert <paul@marvell.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Cc: trans WG <therightkey@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Subject: Re: [therightkey] Comments on -> Re: WG Review: Public Notary
Transparency (trans)
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>,
<mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>,
<mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jan 2014 18:37:01 -0000
On 24 January 2014 18:29, Paul Lambert <paul@marvell.com> wrote: > > Comments on draft Public Notary Transparency: > > - ŒTransparent Public Notary¹ would be better for a group name > and match the new charter more closely (versus original charter > was making an existing service Transparent) > > - charter is too public key focused. A Merkle Hash Tree can support > a notary-like facility for any information that can be hashed > Suggest changing paragraph two to use current examples but > add a non-public key example and down-play public keys as just an > example > > - Is ŒPublic¹ necessary in the title and as a goal? > A ŒTransparent Notary¹ could be public or private. Enterprise or > private > applications could readily benefit from notary functions. > suggest removing public from title and add a sentence in scope > describing public an private applications. The focus on public keys is deliberate. As the second work item says, WG would re-charter for transparency of other things. This is because it turns out that whilst there's clearly a general mechanism, there's a lot of details that may change depending on what exactly is being logged. > > - word-smithing for readability would be beneficial. Especially > the introduction to better capture the groups new focus. > > Paul > > > > > > On 1/24/14, 9:53 AM, "The IESG" <iesg-secretary@ietf.org> wrote: > >>A new IETF working group has been proposed in the Security Area. The IESG >>has not made any determination yet. The following draft charter was >>submitted, and is provided for informational purposes only. Please send >>your comments to the IESG mailing list (iesg at ietf.org) by 2014-02-03. >> >>Public Notary Transparency (trans) >>------------------------------------------------ >>Current Status: Proposed WG >> >>Assigned Area Director: >> Stephen Farrell <stephen.farrell@cs.tcd.ie> >> >>Mailing list >> Address: therightkey@ietf.org >> To Subscribe: https://www.ietf.org/mailman/listinfo/therightkey >> Archive: http://www.ietf.org/mail-archive/web/therightkey/ >> >>Charter: >> >>Mitigating web site certificate mis-issuance is the initial problem of >>interest for this working group. Certificate Transparency (CT, >>RFC6962) allows such mis-issuance to be detected in interesting and >>useful cases, for example by an auditor acting for the web site, or >>one acting to check general CA behaviour. The working group will >>produce a standards-track version of the experimental RFC 6962 >>for HTTP over TLS, reflecting implementation and deployment >>experience since that specification was completed. >> >>Many Internet protocols for example, SMTPS, IPsec, DNSSEC, >>OpenPGP and HTTPS, require a mapping between some kind of >>identifier and some kind of public key. These protocols rely >>on either ad-hoc mappings, (as in a web of trust), or on authorities >>(such as CAs) that attest to the mappings. History shows that neither >>of these mechanisms is entirely satisfactory. Ad-hoc mappings are >>difficult to discover and maintain, and authorities make mistakes or >>are subverted. >> >>Cryptographically verifiable logs can help to ameliorate these >>problems by making it possible to discover errors quickly, so that >>other mechanisms can be applied to rectify them. A cryptographically >>verifiable log is an append-only log of hashes of more-or-less anything >>that is structured in such a way as to provide efficiently-accessible, >>cryptographically-supported evidence of correct log behaviour. For >>example, RFC 6962 says: "The append-only property of each log is >>technically achieved using Merkle Trees, which can be used to show >>that any particular version of the log is a superset of any particular >>previous version. Likewise, Merkle Trees avoid the need to blindly >>trust logs: if a log attempts to show different things to different >>people, this can be efficiently detected by comparing tree roots and >>consistency proofs. Similarly, other misbehaviors of any log (e.g., >>issuing signed timestamps for certificates they then don't log) can be >>efficiently detected and proved to the world at large." >> >>These logs can potentially also assist with other interesting >>problems, such as how to assure end users that software they are >>running is, indeed, the software they intend to run. >> >>While the privacy issues related to use of RFC6962 for public >>web sites are minimal, the working group will consider privacy >>as it might impact on uses of CT e.g. within enterprises or >>for other uses of logs. >> >>Work items: >> >>- Publish an update to RFC 6962 as a standards-track mechanism to >>apply verifiable logs to HTTP over TLS. As DANE (RFC6698) provides an >>alternative keying infrastructure to that used in the current web PKI, >>the working group should consider appropriate client behavior in the >>presence of both DANE-based keying and current web PKI when >>standardising CT. >> >>- Discuss mechanisms and techniques that allow cryptographically >>verifiable logs to be deployed to improve the security of protocols >>other than HTTP over TLS, for example SMTP/TLS or software >>distribution. Where such mechanisms appear sufficiently useful, >>the WG will re-charter to add relevant new work items. Should >>no such items be chartered the WG will close when documents >>associated with the first work item are complete. >> >> >> >>Milestones: >> >>TBD >>_______________________________________________ >>therightkey mailing list >>therightkey@ietf.org >>https://www.ietf.org/mailman/listinfo/therightkey > > _______________________________________________ > therightkey mailing list > therightkey@ietf.org > https://www.ietf.org/mailman/listinfo/therightkey
- [therightkey] Comments on -> Re: WG Review: Publi… Paul Lambert
- Re: [therightkey] Comments on -> Re: WG Review: P… Ben Laurie