[therightkey] Comments on -> Re: WG Review: Public Notary Transparency (trans)

Paul Lambert <paul@marvell.com> Fri, 24 January 2014 18:29 UTC

Return-Path: <paul@marvell.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAC261A00E3; Fri, 24 Jan 2014 10:29:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.567
X-Spam-Level:
X-Spam-Status: No, score=-1.567 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, IP_NOT_FRIENDLY=0.334, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mCvqhh-eMMzy; Fri, 24 Jan 2014 10:29:26 -0800 (PST)
Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by ietfa.amsl.com (Postfix) with ESMTP id D66E01A0036; Fri, 24 Jan 2014 10:29:25 -0800 (PST)
Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.14.5/8.14.5) with SMTP id s0OISoPF029824; Fri, 24 Jan 2014 10:29:24 -0800
Received: from sc-owa02.marvell.com ([199.233.58.137]) by mx0b-0016f401.pphosted.com with ESMTP id 1hknvx10f3-1 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 24 Jan 2014 10:29:24 -0800
Received: from SC-vEXCH2.marvell.com ([10.93.76.134]) by sc-owa02.marvell.com ([10.93.76.22]) with mapi; Fri, 24 Jan 2014 10:29:23 -0800
From: Paul Lambert <paul@marvell.com>
To: "iesg@ietf.org" <iesg@ietf.org>
Date: Fri, 24 Jan 2014 10:29:22 -0800
Thread-Topic: Comments on -> Re: [therightkey] WG Review: Public Notary Transparency (trans)
Thread-Index: Ac8ZMjP4sXjRLvqsT0CJM5T6/5Y9GA==
Message-ID: <CF07ECF2.2D95F%paul@marvell.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.9.131030
acceptlanguage: en-US
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.11.87, 1.0.14, 0.0.0000 definitions=2014-01-24_04:2014-01-24, 2014-01-24, 1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1305240000 definitions=main-1401240109
Cc: trans WG <therightkey@ietf.org>
Subject: [therightkey] Comments on -> Re: WG Review: Public Notary Transparency (trans)
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jan 2014 18:29:27 -0000

Comments on draft Public Notary Transparency:

 - ŒTransparent Public Notary¹ would be better for a group name
   and match the new charter more closely (versus original charter
   was making an existing service Transparent)

 - charter is too public key focused. A Merkle Hash Tree can support
   a notary-like facility for any information that can be hashed
   Suggest changing paragraph two to use current examples but
   add a non-public key example and down-play public keys as just an
example

 - Is ŒPublic¹ necessary in the title and as a goal?
   A ŒTransparent Notary¹ could be public or private.  Enterprise or
private
   applications could readily benefit from notary functions.
   suggest removing public from title and add a sentence in scope
   describing public an private applications.

 - word-smithing for readability would be beneficial. Especially
   the introduction to better capture the groups new focus.

Paul





On 1/24/14, 9:53 AM, "The IESG" <iesg-secretary@ietf.org> wrote:

>A new IETF working group has been proposed in the Security Area. The IESG
>has not made any determination yet. The following draft charter was
>submitted, and is provided for informational purposes only. Please send
>your comments to the IESG mailing list (iesg at ietf.org) by 2014-02-03.
>
>Public Notary Transparency  (trans)
>------------------------------------------------
>Current Status: Proposed WG
>
>Assigned Area Director:
>  Stephen Farrell <stephen.farrell@cs.tcd.ie>
>
>Mailing list
>  Address: therightkey@ietf.org
>  To Subscribe: https://www.ietf.org/mailman/listinfo/therightkey
>  Archive: http://www.ietf.org/mail-archive/web/therightkey/
>
>Charter:
>
>Mitigating web site certificate mis-issuance is the initial problem of
>interest for this working group. Certificate Transparency (CT,
>RFC6962) allows such mis-issuance to be detected in interesting and
>useful cases, for example by an auditor acting for the web site, or
>one acting to check general CA behaviour. The working group will
>produce a standards-track version of the experimental RFC 6962
>for HTTP over TLS, reflecting implementation and deployment
>experience since that specification was completed.
>
>Many Internet protocols for example, SMTPS, IPsec, DNSSEC,
>OpenPGP and HTTPS, require  a mapping between some kind of
>identifier and some kind of public key. These protocols rely
>on either ad-hoc mappings, (as in a web of trust), or on authorities
>(such as CAs) that attest to the mappings. History shows that neither
>of these mechanisms is entirely satisfactory.  Ad-hoc mappings are
>difficult to discover and maintain, and authorities make mistakes or
>are subverted.
>
>Cryptographically verifiable logs can help to ameliorate these
>problems by making it possible to discover errors quickly, so that
>other mechanisms can be applied to rectify them. A cryptographically
>verifiable log is an append-only log of hashes of more-or-less anything
>that  is structured in such a way as to provide efficiently-accessible,
>cryptographically-supported evidence of correct log behaviour. For
>example, RFC 6962 says: "The append-only property of each log is
>technically achieved using Merkle Trees, which can be used to show
>that any particular version of the log is a superset of any particular
>previous version. Likewise, Merkle Trees avoid the need to blindly
>trust logs: if a log attempts to show different things to different
>people, this can be efficiently detected by comparing tree roots and
>consistency proofs. Similarly, other misbehaviors of any log (e.g.,
>issuing signed timestamps for certificates they then don't log) can be
>efficiently detected and proved to the world at large."
>
>These logs can potentially also assist with other interesting
>problems, such as how to assure end users that software they are
>running is, indeed, the software they intend to run.
>
>While the privacy issues related to use of RFC6962 for public
>web sites are minimal, the working group will consider privacy
>as it might impact on uses of CT e.g. within enterprises or
>for other uses of logs.
>
>Work items:
>
>- Publish an update to RFC 6962 as a standards-track mechanism to
>apply verifiable logs to HTTP over TLS.  As DANE (RFC6698) provides an
>alternative keying infrastructure to that used in the current web PKI,
>the working group should consider appropriate client behavior in the
>presence of both DANE-based keying and current web PKI when
>standardising CT.
>
>- Discuss mechanisms and techniques that allow cryptographically
>verifiable logs to be deployed to improve the security of protocols
>other than HTTP over TLS, for example SMTP/TLS or software
>distribution. Where such mechanisms appear sufficiently useful,
>the WG will re-charter to add relevant new work items.  Should
>no such items be chartered the WG will close when documents
>associated with the first work item are complete.
>
>
>
>Milestones:
>
>TBD
>_______________________________________________
>therightkey mailing list
>therightkey@ietf.org
>https://www.ietf.org/mailman/listinfo/therightkey