Re: [therightkey] IESG eval of charter

Ben Laurie <benl@google.com> Thu, 23 January 2014 03:45 UTC

Return-Path: <benl@google.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B2451A00EA for <therightkey@ietfa.amsl.com>; Wed, 22 Jan 2014 19:45:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.914
X-Spam-Level:
X-Spam-Status: No, score=-1.914 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5cZob4CjnGbG for <therightkey@ietfa.amsl.com>; Wed, 22 Jan 2014 19:45:00 -0800 (PST)
Received: from mail-ie0-x236.google.com (mail-ie0-x236.google.com [IPv6:2607:f8b0:4001:c03::236]) by ietfa.amsl.com (Postfix) with ESMTP id A28DA1A00DD for <therightkey@ietf.org>; Wed, 22 Jan 2014 19:45:00 -0800 (PST)
Received: by mail-ie0-f182.google.com with SMTP id lx4so541644iec.41 for <therightkey@ietf.org>; Wed, 22 Jan 2014 19:44:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=/5fVlZ/NJ8fHUSou1LyP0YooAH9T2t54OYzAAF9LQag=; b=gZ02UZMg5YduclyUcdtqyfquQ39p8dNt1qsNQq6tD3CTo9xrLeqE38RWbuY+XUDMyR +18sTuvoSXQ/ZDCH+EIcPT7VaTeMrERidOzdmc7dLAm65osJfuerif/OPNvSBLOKGJYZ BY/UQPMmpZnhcd1qp3l8y70AlQnfcoqbhRfTFA/MPxXMjKuu+myqAbRox3Ma32lEROvS xl8nkQSqGYBwHsr4fsLABB5+kz3cy/g9a+sR74nOaWsfeamk77siC3OJpljXhD5rd0Td TJSOG/wLihEmXb9kJcHXGRWYKN+YR8JDu5mpSbIo4dOxr8fgL021JG+I1LFcKhnDoYeu sR4g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=/5fVlZ/NJ8fHUSou1LyP0YooAH9T2t54OYzAAF9LQag=; b=FyD51xmVXjC0YuJrFffVtT3Owpa6dzdPbNTwBtCqi3ppZ61lbREF7011FcK+pTYWEU /ySSUAK12xNPUCUF5Onn04g6eSuOgRG72oPWxy7X32LNsmV0q+tsiewaofpSJnZ/Sqih JBV0crDVWKrM02Jktk0+ywFt9eHFtSMhQS6l+PGfwhimXgPS7LeZhjX1y0IaMwwrWXVF bKs/delCe1iOYaAtpcthsj21RsP3UB0PsV1kdoj3nCWbmLR0YMRoNsIIFDRIVaQ50+w+ ybehFPkn/846mdJ3osY/pzx/Exc1mIq+X/yWyAx3ntSlr/VurDgLALcw6w6FYCEdoW08 3NzQ==
X-Gm-Message-State: ALoCoQmHX0RTR1+qwWjl9tUVtBCGXFCJvCmDNW2DMIiSY/x/NXrETnRCt1d6nYV5J23a+rrNLbkwwVSON7TIbGLbbfHwVYqzii9uLZ1luk+pH7Ey5heGvWuQxa6d44YPZgtSqiaKWOKc0oEllqlK1JV+YkW1Zb0s1zctAPJ7Za9PZlUOZkH8irfWoCwvse1lJiqa9Yu5FK55
MIME-Version: 1.0
X-Received: by 10.50.66.144 with SMTP id f16mr6549664igt.48.1390448698875; Wed, 22 Jan 2014 19:44:58 -0800 (PST)
Received: by 10.64.230.140 with HTTP; Wed, 22 Jan 2014 19:44:58 -0800 (PST)
In-Reply-To: <52DFC4D9.3020207@cs.tcd.ie>
References: <52DEF8CB.1040608@cs.tcd.ie> <CF044407.2D04E%paul@marvell.com> <CF044DBD.2D077%paul@marvell.com> <52DFC4D9.3020207@cs.tcd.ie>
Date: Thu, 23 Jan 2014 03:44:58 +0000
Message-ID: <CABrd9STrRygD2PsZyOWAPuhkEHRTu9iOv19VEMqnzWvw9-dCtQ@mail.gmail.com>
From: Ben Laurie <benl@google.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Cc: Paul Lambert <paul@marvell.com>, "therightkey@ietf.org" <therightkey@ietf.org>
Subject: Re: [therightkey] IESG eval of charter
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jan 2014 03:45:03 -0000

On 22 January 2014 13:17, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
>
> Thanks Paul,
>
> I'll hold off on these changes for now as the IESG
> are reading this for tomorrow's telechat but we can
> look at them again after that. Be good to know if
> folks on the list like the changes though. (But
> let's not get into wordsmithing.)

I like that version.

>
> Also - I added the following in response to another
> comment:
>
> "While the privacy issues related to use of RFC6962 for public
> web sites are minimal, the working group will consider privacy
> as it might impact on uses of CT e.g. within enterprises or
> for other uses of logs."
>
> That's at [1] now.
>
> Cheers,
> S.
>
> [1] https://datatracker.ietf.org/doc/charter-ietf-trans/
>
> On 01/22/2014 12:16 AM, Paul Lambert wrote:
>>
>>
>> OHiya,
>>>>
>>>> Getting a number of comments [1] from IESG folks that
>>>> the charter's not so easy to grasp for non CT-aware
>>>> folks.
>>>>
>>>> My current try at fixing that at [2]. Please suggest
>>>> any *necessary* changes by tomorrow if you can. (And
>>>> in OLD/NEW format please, just to be nice to me:-)
>>>
>>> NEW is the first three paragraphs mostly a restructure for readability.
>>
>> Ooops - new is the first 4 paragraphs ending at the ³These logs can в
>>
>>>
>>> Paul
>>>
>>> - - - - -
>>>
>>> Cryptographic logs provide a mechanism to publish a list of events that
>>> can be verified for correct ordering and content.  The logs are
>>> append-only and can be efficiently verified by the world at large for
>>> correct log behavior.  Certificate Transparency (CT, RFC6962) logs the
>>> issuance of X.509 certificates.  The CT log enables the detection of
>>> mis-issued certificates providing validation of correct CA operation.  The
>>> working group will produce a standards-track version of the experimental
>>> CT RFC 6962 reflecting implementation and deployment experience since that
>>> specification was completed.
>>>
>>> Many other Internet protocols besides X.509 map public keys to some kind
>>> of identifier and would benefit from a verifiable log These possible
>>> application of a cryptographic log include: SMTPS, IPSec, DNSSEC and
>>> OpenPGP.
>>>
>>> These protocols rely on either ad-hoc mappings, (as in a web of trust), or
>>> on authorities (such as CAs) that attest to the mappings. History shows
>>> that neither of these mechanisms is entirely satisfactory.  Ad-hoc
>>> mappings are difficult to discover and maintain, and authorities make
>>> mistakes or are subverted.  Cryptographically verifiable logs can be used
>>> to support these and other protocols to maintain consistent and correct
>>> mappings.  Errors or subversion of the mappings can be detected and
>>> corrected to minimize any adverse impact.
>>>
>>> A cryptographically verifiable log is an append-only log of hashes.  The
>>> hashes can represent more-or-less anything and serve as a unique identify
>>> for any information object.  The log is structured to provide efficient
>>> access and cryptographic evidence of correct log operation. The individual
>>> hashes are linked together using Merkle Trees, which can be used to show
>>> that any particular version of the log is a superset of any particular
>>> previous version. Merkle Trees avoid the need to blindly trust logs: if a
>>> log attempts to show different things to different people, this can be
>>> efficiently detected by comparing tree roots and consistency proofs.
>>> Similarly, other misbehaviors of any log (e.g., issuing signed timestamps
>>> for certificates they then don't log) can be efficiently detected and
>>> proved to the world at large.
>>>
>>> These logs can potentially also assist with other interesting problems,
>>> such as how to assure end users that software they are running is, indeed,
>>> the software they intend to run.
>>>
>>> Work items:
>>>
>>> - Publish an update to RFC 6962 as a standards-track mechanism to apply
>>> verifiable logs to HTTP over TLS.  As DANE (RFC6698) provides an
>>> alternative keying infrastructure to that used in the current web PKI, the
>>> working group should consider appropriate client behavior in the presence
>>> of both DANE-based keying and current web PKI when standardising CT.
>>>
>>> - Discuss mechanisms and techniques that allow cryptographically
>>> verifiable logs to be deployed to improve the security of protocols and
>>> software distribution. Where such mechanisms appear sufficiently useful,
>>> the WG will re-charter to add relevant new work items.  Should no such
>>> items be chartered the WG will close when documents associated with the
>>> first work item are complete.
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>>
>>>> Bear in mind that we're developing the charter text
>>>> that will go to IETF review, so this need not be the
>>>> final final thing, e.g. the final wordsmithing polish
>>>> can be done later.
>>>>
>>>> Cheers,
>>>> S.
>>>>
>>>> [1] https://datatracker.ietf.org/doc/charter-ietf-trans/ballot/
>>>> [2] https://datatracker.ietf.org/doc/charter-ietf-trans/
>>>> _______________________________________________
>>>> therightkey mailing list
>>>> therightkey@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/therightkey
>>>
>>> _______________________________________________
>>> therightkey mailing list
>>> therightkey@ietf.org
>>> https://www.ietf.org/mailman/listinfo/therightkey
>>
>> _______________________________________________
>> therightkey mailing list
>> therightkey@ietf.org
>> https://www.ietf.org/mailman/listinfo/therightkey
>>
>>
> _______________________________________________
> therightkey mailing list
> therightkey@ietf.org
> https://www.ietf.org/mailman/listinfo/therightkey