Re: [therightkey] The Trouble with Certificate Transparency

Tao Effect <contact@taoeffect.com> Sat, 27 September 2014 02:05 UTC

Return-Path: <contact@taoeffect.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B333A1A700D for <therightkey@ietfa.amsl.com>; Fri, 26 Sep 2014 19:05:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.334
X-Spam-Level:
X-Spam-Status: No, score=-1.334 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XGTdanQ-UJ5R for <therightkey@ietfa.amsl.com>; Fri, 26 Sep 2014 19:05:45 -0700 (PDT)
Received: from homiemail-a14.g.dreamhost.com (homie.mail.dreamhost.com [208.97.132.208]) by ietfa.amsl.com (Postfix) with ESMTP id 608B11A6F98 for <therightkey@ietf.org>; Fri, 26 Sep 2014 19:05:45 -0700 (PDT)
Received: from homiemail-a14.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a14.g.dreamhost.com (Postfix) with ESMTP id 37F10392075; Fri, 26 Sep 2014 19:05:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=taoeffect.com; h= content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; s=taoeffect.com; bh=qmMPnxKn5f0X4/XIu VXBscbNoM0=; b=B075lUe3sKKkZl6vBSgHr4Zj8li/ft1LI19wACTvNhdta6mC2 VHy5vJaCpR8ctDjBgak1xHDpfXROhzFHDg6nxDNLdNkiX1RFz+UgO3/pCbWCBCQC rcAaMCXrHU1jVUQ7T738DHkrfIVNK7Wdjka3zXWr3PbMbFSTOdJH0JR5PE=
Received: from [192.168.42.78] (50-0-138-93.dsl.dynamic.sonic.net [50.0.138.93]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: contact@taoeffect.com) by homiemail-a14.g.dreamhost.com (Postfix) with ESMTPSA id D863C392070; Fri, 26 Sep 2014 19:05:44 -0700 (PDT)
Content-Type: multipart/signed; boundary="Apple-Mail=_47113FB9-84AE-41B0-9E6B-688804B01250"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
X-Pgp-Agent: GPGMail 2.1 (f76fd85)
From: Tao Effect <contact@taoeffect.com>
In-Reply-To: <CADqLbz++OtVCLm3X6PQTq8FFq89CfMFFg2dq8WgK6oWSfJZQbg@mail.gmail.com>
Date: Fri, 26 Sep 2014 19:05:43 -0700
X-Mao-Original-Outgoing-Id: 433476343.499172-6bf805d4f472c77bdaf08eaced5b5d49
Message-Id: <2EF07525-0508-4E4E-950F-05709FAA5466@taoeffect.com>
References: <4906532C-F002-49E4-9F9F-D8D7D1AD96DB@taoeffect.com> <CADqLbz++OtVCLm3X6PQTq8FFq89CfMFFg2dq8WgK6oWSfJZQbg@mail.gmail.com>
To: Dmitry Belyavsky <beldmit@gmail.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/therightkey/znBllCTG3a5v6KySRec7zSsOEOs
Cc: therightkey@ietf.org
Subject: Re: [therightkey] The Trouble with Certificate Transparency
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Sep 2014 02:05:46 -0000

Dear Dmitry,

Thank you for the reply.

On Sep 25, 2014, at 6:40 AM, Dmitry Belyavsky <beldmit@gmail.com> wrote:

> If I understand correctly, it should be prevented by Auditors and the gossip protocol (yes, I understand it is not specified in fact). Auditors and gossip protocol are designed for solving precisely this case.

Well, please reply with the details of gossip.

This blog post was simply a more formal way of restating an email I'd brought up on [trans] back in May.

I pointed out back then that gossip was essential if this attack is to have any hope of being detected, and I am still waiting for those details.

> And, BTW, if we ask for more than one SCT in the cert as Ben does, the attack becomes much more difficult even for the perfect MITM.


Define "much more"? If we're dealing with "the perfect MITM", they might own one of the CAs, and then only need to send an NSL to another (or hack another). Not too difficult for "the perfect MITM".

Kind regards,
Greg Slepak

--
Please do not email me anything that you are not comfortable also sharing with the NSA.