[therightkey] Revised Draft Charter for Transparency WG
Ben Laurie <benl@google.com> Tue, 07 January 2014 16:14 UTC
Return-Path: <benl@google.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id 62D101ADFD9 for <therightkey@ietfa.amsl.com>;
Tue, 7 Jan 2014 08:14:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.917
X-Spam-Level:
X-Spam-Status: No,
score=-1.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,
DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622,
RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gOKE4hSvnTTe for
<therightkey@ietfa.amsl.com>; Tue, 7 Jan 2014 08:14:33 -0800 (PST)
Received: from mail-ve0-x231.google.com (mail-ve0-x231.google.com
[IPv6:2607:f8b0:400c:c01::231]) by ietfa.amsl.com (Postfix) with ESMTP id
4429B1AE04B for <therightkey@ietf.org>; Tue, 7 Jan 2014 08:14:33 -0800 (PST)
Received: by mail-ve0-f177.google.com with SMTP id db12so276619veb.22 for
<therightkey@ietf.org>; Tue, 07 Jan 2014 08:14:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113;
h=mime-version:date:message-id:subject:from:to:content-type
:content-transfer-encoding; bh=uS+wH4IHE15Kzkz6pMHV4+v5q6l9z4Mwm/ZNzR/u9O0=;
b=ANjo7rD2HL6VO5uVV3saYRcYqoLipixui8Jh5OfLgQB4/rdpD0rOiSOkpGrM/3bbOn
T5nUUawtiba8OjTWhw8iMyQWBtj3fuXf0YEzH5sg3LF00BtYUI6oGmrrl0u6bIvuIlt9
z/OPk3GZlb1LMSJLfIBo5mBYJk3OF+lB6DSjLN2LkwkuZONRFIZdQl/I1rQLZKYi8AfL
s0p0DQrAFrlt+bUi7B28zCCTddpO63oR1VE2FIiNYFSyrD2Vvmy6TJ1C3CPObNp0q0zT
u0nMkzavg+25jbBnWRO8NznRuz/lrRusosZHN5AOmG2NdRmAwcer07do+4xIRjzHXUsC vhWw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net;
s=20130820;
h=x-gm-message-state:mime-version:date:message-id:subject:from:to
:content-type:content-transfer-encoding;
bh=uS+wH4IHE15Kzkz6pMHV4+v5q6l9z4Mwm/ZNzR/u9O0=;
b=e6GQP2Ca3kVUR6R+TJlSEc4lnYHoK1j4kc7kxZ8BEYHQ40exNe0VS3fnM53QdF1E2Z
b7fMF8wQPatLPe3R0IRhgg7LlvgZ05f7hxV8SrBnfME+k9Z41akc8PKzNIyNpYX+UMul
zFszHUV8BFKdSIsmI32lL8XH2in0UcPwdTEu5uq/RLNR/L3gzcwfazWh4SfkiTWHPvHR
wNJzkxp73qITcc6E9YQe244iJVaUteWK7UAzJnPs283jJQBmtIhpSyv7Tip8XyEgOWGi
skNuEhAGsxGYjBOxPHrDUQCCn6UvDRSV8PvpZ1ioVJkc1taZwysYye/NXBqEq1e9FoVB 5HGA==
X-Gm-Message-State: ALoCoQndwTfNQkmMSJyI3Z/KYOeIGG81K9Lcr09Ga9tJxNOJlO6Z0Xo1SjwRC37r3yx+5vFRcrELFOyh9Tr+oON4eMs9UFKCFUTTWtdDwYw42BTKzT9CB7IiB4wot9Xa18zfQpnTY3pG0NpJ4ZL2YLtY4H4a6vAevZGyfTyjysqTXk8qE+7QnwZ530I04daW7N/OF0YHGHIY
MIME-Version: 1.0
X-Received: by 10.58.248.198 with SMTP id yo6mr3298246vec.40.1389111264138;
Tue, 07 Jan 2014 08:14:24 -0800 (PST)
Received: by 10.52.169.202 with HTTP; Tue, 7 Jan 2014 08:14:24 -0800 (PST)
Date: Tue, 7 Jan 2014 16:14:24 +0000
Message-ID: <CABrd9SSRGzC1gnAm+6Wy2w3FamSgvFK09cHqPXAqH7Ky-n8wtQ@mail.gmail.com>
From: Ben Laurie <benl@google.com>
To: "therightkey@ietf.org" <therightkey@ietf.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Subject: [therightkey] Revised Draft Charter for Transparency WG
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>,
<mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>,
<mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jan 2014 16:14:36 -0000
Problem statement: many Internet protocols require a mapping between some kind of identifier and some kind of key, for example, HTTPS, SMTPS, IPSec, DNSSEC and OpenPGP. These protocols rely on either ad-hoc mappings, or on authorities which attest to the mappings. History shows that neither of these mechanisms is entirely satisfactory. Ad-hoc mappings are difficult to discover and maintain, and authorities make mistakes or are subverted. Cryptographically verifiable logs[1] can help to ameliorate the problems by making it possible to discover and rectify errors before they can cause harm. These logs can also assist with other interesting problems, such as how to assure end users that software they are running is, indeed, the software they intend to run. Work items: Specify a standards-track mechanism to apply verifiable logs to HTTP/TLS (i.e. RFC 6962-bis). Discuss mechanisms and techniques that allow cryptographically verifiable logs to be deployed to improve the security of protocols and software distribution. Where such mechanisms appear sufficiently useful, the WG will re-charter to add relevant new work items. [1] A cryptographically verifiable log is an append-only log of hashes of more-or-less anything that is structured in such a way as to provide efficiently-accessible, cryptographically-supported evidence of correct log behaviour. For example, from RFC 6962: “The append-only property of each log is technically achieved using Merkle Trees, which can be used to show that any particular version of the log is a superset of any particular previous version. Likewise, Merkle Trees avoid the need to blindly trust logs: if a log attempts to show different things to different people, this can be efficiently detected by comparing tree roots and consistency proofs. Similarly, other misbehaviors of any log (e.g., issuing signed timestamps for certificates they then don't log) can be efficiently detected and proved to the world at large.” See RFC 6962, http://www.links.org/files/CertificateTransparencyVersion2.1a.pdf and http://www.links.org/files/RevocationTransparency.pdf for background.
- [therightkey] Revised Draft Charter for Transpare… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Paul Hoffman
- Re: [therightkey] Revised Draft Charter for Trans… Tim Moses
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Tim Moses
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Tim Moses
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Stephen Farrell
- Re: [therightkey] Revised Draft Charter for Trans… Stephen Farrell
- Re: [therightkey] Revised Draft Charter for Trans… Stephen Farrell
- Re: [therightkey] Revised Draft Charter for Trans… Phillip Hallam-Baker