Re: [therightkey] Revised Draft Charter for Transparency WG

Tim Moses <tim.moses@entrust.com> Tue, 07 January 2014 17:27 UTC

Return-Path: <tim.moses@entrust.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51AE61AE085 for <therightkey@ietfa.amsl.com>; Tue, 7 Jan 2014 09:27:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.439
X-Spam-Level:
X-Spam-Status: No, score=-2.439 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VmR55G26nmHJ for <therightkey@ietfa.amsl.com>; Tue, 7 Jan 2014 09:27:06 -0800 (PST)
Received: from ipedge2.entrust.com (ipedge2.entrust.com [216.191.252.25]) by ietfa.amsl.com (Postfix) with ESMTP id C4BD11ADF4B for <therightkey@ietf.org>; Tue, 7 Jan 2014 09:27:05 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.95,619,1384318800"; d="scan'208";a="7774271"
Received: from unknown (HELO sottexchcas.corp.ad.entrust.com) ([10.4.51.93]) by ipedge2.entrust.com with ESMTP; 07 Jan 2014 12:26:56 -0500
Received: from SOTTEXCH11.corp.ad.entrust.com ([fe80::303b:8584:c6f4:be18]) by sottexchcas1.corp.ad.entrust.com ([::1]) with mapi id 14.03.0123.003; Tue, 7 Jan 2014 12:26:57 -0500
From: Tim Moses <tim.moses@entrust.com>
To: Ben Laurie <benl@google.com>
Thread-Topic: [therightkey] Revised Draft Charter for Transparency WG
Thread-Index: AQHPC8Obgf4BDtDBOU6Dw0Co81lEw5p5dh6wgABcJwD//7GGmg==
Date: Tue, 7 Jan 2014 17:26:55 +0000
Message-ID: <6E6E4126-34A4-4633-A253-0996646FF5A5@entrust.com>
References: <CABrd9SSRGzC1gnAm+6Wy2w3FamSgvFK09cHqPXAqH7Ky-n8wtQ@mail.gmail.com> <FA82C4B0-80FB-47FC-A4C6-3EE59238ADAC@entrust.com>, <CABrd9SRPExNOvmoG5Rhxh-qmpHMeQDGMvRS6-0MQQVi2pG2gnw@mail.gmail.com>
In-Reply-To: <CABrd9SRPExNOvmoG5Rhxh-qmpHMeQDGMvRS6-0MQQVi2pG2gnw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "therightkey@ietf.org" <therightkey@ietf.org>
Subject: Re: [therightkey] Revised Draft Charter for Transparency WG
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jan 2014 17:27:08 -0000

Ok.  But that's at least one additional round trip, right?

Is it more realistic to say that the protocol fails if ALL of the CA and every timestamp relied upon is untrustworthy?

All the best. Tim.


> On Jan 7, 2014, at 12:07 PM, "Ben Laurie" <benl@google.com> wrote:
> 
>> On 7 January 2014 16:37, Tim Moses <tim.moses@entrust.com> wrote:
>> Hi Ben.  Is it explained somewhere how it would be discovered that a log had issued a time stamp for a certificate that it then did not log?
> 
> RFC 6962, Section 5.4 "Auditor".
> 
>> According to my understanding, the time stamp would only be distributed within a certificate or OCSP response, and (therefore) its existence would not necessarily be apparent to an auditor.
> 
> If no-one ever sees the certificate, then whether an SCT was issued or
> not is unimportant. This is why recipients of certificates need to at
> least audit the certificates they see.
> 
> In the RFC "auditor" is a role that may be incorporated in other
> things. From the RFC: "An auditor might be an integral component of a
> TLS client".
> 
> There may be a better way of explaining this.
> 
> Possibly something to this effect should've been added to 5.2. I've
> added an issue (https://code.google.com/p/certificate-transparency/issues/detail?id=25).
> 
>> Maybe I missed something.
>> 
>> All the best. Tim.
>> 
>>> On Jan 7, 2014, at 11:14 AM, "Ben Laurie" <benl@google.com> wrote:
>>> 
>>> Problem statement: many Internet protocols require a mapping between
>>> some kind of identifier and some kind of key, for example, HTTPS,
>>> SMTPS, IPSec, DNSSEC and OpenPGP.
>>> 
>>> 
>>> These protocols rely on either ad-hoc mappings, or on authorities
>>> which attest to the mappings.
>>> 
>>> 
>>> History shows that neither of these mechanisms is entirely
>>> satisfactory. Ad-hoc mappings are difficult to discover and maintain,
>>> and authorities make mistakes or are subverted.
>>> 
>>> 
>>> Cryptographically verifiable logs[1] can help to ameliorate the
>>> problems by making it possible to discover and rectify errors before
>>> they can cause harm.
>>> 
>>> 
>>> These logs can also assist with other interesting problems, such as
>>> how to assure end users that software they are running is, indeed, the
>>> software they intend to run.
>>> 
>>> 
>>> Work items: Specify a standards-track mechanism to apply verifiable
>>> logs to HTTP/TLS (i.e. RFC 6962-bis).
>>> 
>>> 
>>> Discuss mechanisms and techniques that allow cryptographically
>>> verifiable logs to be deployed to improve the security of protocols
>>> and software distribution. Where such mechanisms appear sufficiently
>>> useful, the WG will re-charter to add relevant new work items.
>>> 
>>> 
>>> [1] A cryptographically verifiable log is an append-only log of hashes
>>> of more-or-less anything that  is structured in such a way as to
>>> provide efficiently-accessible, cryptographically-supported evidence
>>> of correct log behaviour.
>>> 
>>> 
>>> For example, from RFC 6962: “The append-only property of each log is
>>> technically achieved using Merkle Trees, which can be used to show
>>> that any particular version of the log is a superset of any particular
>>> previous version. Likewise, Merkle Trees avoid the need to blindly
>>> trust logs: if a log attempts to show different things to different
>>> people, this can be efficiently detected by comparing tree roots and
>>> consistency proofs. Similarly, other misbehaviors of any log (e.g.,
>>> issuing signed timestamps for certificates they then don't log) can be
>>> efficiently detected and proved to the world at large.”
>>> 
>>> 
>>> See RFC 6962, http://www.links.org/files/CertificateTransparencyVersion2.1a.pdf
>>> and http://www.links.org/files/RevocationTransparency.pdf for
>>> background.
>>> _______________________________________________
>>> therightkey mailing list
>>> therightkey@ietf.org
>>> https://www.ietf.org/mailman/listinfo/therightkey