Re: [therightkey] Revised Draft Charter for Transparency WG
Tim Moses <tim.moses@entrust.com> Tue, 07 January 2014 18:04 UTC
Return-Path: <tim.moses@entrust.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id 0F68D1AE0EE for <therightkey@ietfa.amsl.com>;
Tue, 7 Jan 2014 10:04:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.439
X-Spam-Level:
X-Spam-Status: No,
score=-2.439 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,
RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NKyp_t38R7vt for
<therightkey@ietfa.amsl.com>; Tue, 7 Jan 2014 10:04:50 -0800 (PST)
Received: from ipedge2.entrust.com (ipedge2.entrust.com [216.191.252.25]) by
ietfa.amsl.com (Postfix) with ESMTP id CED0F1AE0EA for <therightkey@ietf.org>;
Tue, 7 Jan 2014 10:04:49 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.95,620,1384318800"; d="scan'208";a="7774704"
Received: from unknown (HELO sottexchcas.corp.ad.entrust.com) ([10.4.51.224])
by ipedge2.entrust.com with ESMTP; 07 Jan 2014 13:04:40 -0500
Received: from SOTTEXCH11.corp.ad.entrust.com ([fe80::303b:8584:c6f4:be18]) by
SOTTEXCHCAS2.corp.ad.entrust.com ([::1]) with mapi id 14.03.0123.003;
Tue, 7 Jan 2014 13:04:39 -0500
From: Tim Moses <tim.moses@entrust.com>
To: Ben Laurie <benl@google.com>
Thread-Topic: [therightkey] Revised Draft Charter for Transparency WG
Thread-Index: AQHPC8Obgf4BDtDBOU6Dw0Co81lEw5p5dh6wgABcJwD//7GGmoAAV6+A//+y22w=
Date: Tue, 7 Jan 2014 18:04:39 +0000
Message-ID: <A6F80180-95B8-43BE-BAAE-9E864CCBFE53@entrust.com>
References: <CABrd9SSRGzC1gnAm+6Wy2w3FamSgvFK09cHqPXAqH7Ky-n8wtQ@mail.gmail.com>
<FA82C4B0-80FB-47FC-A4C6-3EE59238ADAC@entrust.com>
<CABrd9SRPExNOvmoG5Rhxh-qmpHMeQDGMvRS6-0MQQVi2pG2gnw@mail.gmail.com>
<6E6E4126-34A4-4633-A253-0996646FF5A5@entrust.com>,
<CABrd9SRDTWKkNkAEkHebhR1jmFHroW9v5qdRPR38vUhYO9Cz2w@mail.gmail.com>
In-Reply-To: <CABrd9SRDTWKkNkAEkHebhR1jmFHroW9v5qdRPR38vUhYO9Cz2w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "therightkey@ietf.org" <therightkey@ietf.org>
Subject: Re: [therightkey] Revised Draft Charter for Transparency WG
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>,
<mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>,
<mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jan 2014 18:04:52 -0000
I see. It seems unfortunate that reliance on one or more time stamps is not sufficient, but that the client also has to consult the log. All the best. Tim. > On Jan 7, 2014, at 12:40 PM, "Ben Laurie" <benl@google.com> wrote: > >> On 7 January 2014 17:26, Tim Moses <tim.moses@entrust.com> wrote: >> Ok. But that's at least one additional round trip, right? > > It does not need to be done before accepting the certificate. CT is > designed around responsiveness at the cost of finding out bad things > happened a little late. But this seems like an acceptable trade-off, > since a log still can only misbehave once (or for a short period of > time), which makes the cost of doing so very high. > >> Is it more realistic to say that the protocol fails if ALL of the CA and every timestamp relied upon is untrustworthy? > > I'm not sure what you mean by this, but perhaps the above makes it irrelevant? > >> >> All the best. Tim. >> >> >>>> On Jan 7, 2014, at 12:07 PM, "Ben Laurie" <benl@google.com> wrote: >>>> >>>> On 7 January 2014 16:37, Tim Moses <tim.moses@entrust.com> wrote: >>>> Hi Ben. Is it explained somewhere how it would be discovered that a log had issued a time stamp for a certificate that it then did not log? >>> >>> RFC 6962, Section 5.4 "Auditor". >>> >>>> According to my understanding, the time stamp would only be distributed within a certificate or OCSP response, and (therefore) its existence would not necessarily be apparent to an auditor. >>> >>> If no-one ever sees the certificate, then whether an SCT was issued or >>> not is unimportant. This is why recipients of certificates need to at >>> least audit the certificates they see. >>> >>> In the RFC "auditor" is a role that may be incorporated in other >>> things. From the RFC: "An auditor might be an integral component of a >>> TLS client". >>> >>> There may be a better way of explaining this. >>> >>> Possibly something to this effect should've been added to 5.2. I've >>> added an issue (https://code.google.com/p/certificate-transparency/issues/detail?id=25). >>> >>>> Maybe I missed something. >>>> >>>> All the best. Tim. >>>> >>>>> On Jan 7, 2014, at 11:14 AM, "Ben Laurie" <benl@google.com> wrote: >>>>> >>>>> Problem statement: many Internet protocols require a mapping between >>>>> some kind of identifier and some kind of key, for example, HTTPS, >>>>> SMTPS, IPSec, DNSSEC and OpenPGP. >>>>> >>>>> >>>>> These protocols rely on either ad-hoc mappings, or on authorities >>>>> which attest to the mappings. >>>>> >>>>> >>>>> History shows that neither of these mechanisms is entirely >>>>> satisfactory. Ad-hoc mappings are difficult to discover and maintain, >>>>> and authorities make mistakes or are subverted. >>>>> >>>>> >>>>> Cryptographically verifiable logs[1] can help to ameliorate the >>>>> problems by making it possible to discover and rectify errors before >>>>> they can cause harm. >>>>> >>>>> >>>>> These logs can also assist with other interesting problems, such as >>>>> how to assure end users that software they are running is, indeed, the >>>>> software they intend to run. >>>>> >>>>> >>>>> Work items: Specify a standards-track mechanism to apply verifiable >>>>> logs to HTTP/TLS (i.e. RFC 6962-bis). >>>>> >>>>> >>>>> Discuss mechanisms and techniques that allow cryptographically >>>>> verifiable logs to be deployed to improve the security of protocols >>>>> and software distribution. Where such mechanisms appear sufficiently >>>>> useful, the WG will re-charter to add relevant new work items. >>>>> >>>>> >>>>> [1] A cryptographically verifiable log is an append-only log of hashes >>>>> of more-or-less anything that is structured in such a way as to >>>>> provide efficiently-accessible, cryptographically-supported evidence >>>>> of correct log behaviour. >>>>> >>>>> >>>>> For example, from RFC 6962: “The append-only property of each log is >>>>> technically achieved using Merkle Trees, which can be used to show >>>>> that any particular version of the log is a superset of any particular >>>>> previous version. Likewise, Merkle Trees avoid the need to blindly >>>>> trust logs: if a log attempts to show different things to different >>>>> people, this can be efficiently detected by comparing tree roots and >>>>> consistency proofs. Similarly, other misbehaviors of any log (e.g., >>>>> issuing signed timestamps for certificates they then don't log) can be >>>>> efficiently detected and proved to the world at large.” >>>>> >>>>> >>>>> See RFC 6962, http://www.links.org/files/CertificateTransparencyVersion2.1a.pdf >>>>> and http://www.links.org/files/RevocationTransparency.pdf for >>>>> background. >>>>> _______________________________________________ >>>>> therightkey mailing list >>>>> therightkey@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/therightkey
- [therightkey] Revised Draft Charter for Transpare… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Paul Hoffman
- Re: [therightkey] Revised Draft Charter for Trans… Tim Moses
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Tim Moses
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Tim Moses
- Re: [therightkey] Revised Draft Charter for Trans… Ben Laurie
- Re: [therightkey] Revised Draft Charter for Trans… Stephen Farrell
- Re: [therightkey] Revised Draft Charter for Trans… Stephen Farrell
- Re: [therightkey] Revised Draft Charter for Trans… Stephen Farrell
- Re: [therightkey] Revised Draft Charter for Trans… Phillip Hallam-Baker