Re: [Trans] Certificate verification

Matt Palmer <mpalmer@hezmatt.org> Mon, 20 October 2014 22:28 UTC

Return-Path: <mpalmer@hezmatt.org>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D34BF1ACF5E for <trans@ietfa.amsl.com>; Mon, 20 Oct 2014 15:28:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.979
X-Spam-Level:
X-Spam-Status: No, score=-0.979 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_ORG=0.611, HOST_MISMATCH_NET=0.311, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L2aa4dBmqUK0 for <trans@ietfa.amsl.com>; Mon, 20 Oct 2014 15:28:00 -0700 (PDT)
Received: from mail.hezmatt.org (mpalmer-1-pt.tunnel.tserv8.dal1.ipv6.he.net [IPv6:2001:470:1f0e:9e6::2]) by ietfa.amsl.com (Postfix) with ESMTP id A784B1ACF73 for <trans@ietf.org>; Mon, 20 Oct 2014 15:28:00 -0700 (PDT)
Received: from mistress.home.hezmatt.org (unknown [10.6.66.6]) by mail.hezmatt.org (Postfix) with ESMTP id C0B9E282E37 for <trans@ietf.org>; Tue, 21 Oct 2014 09:27:59 +1100 (EST)
Received: by mistress.home.hezmatt.org (Postfix, from userid 1000) id 8F22FA5312; Tue, 21 Oct 2014 09:27:58 +1100 (EST)
Date: Tue, 21 Oct 2014 09:27:58 +1100
From: Matt Palmer <mpalmer@hezmatt.org>
To: trans@ietf.org
Message-ID: <20141020222758.GQ16429@hezmatt.org>
References: <871tq6uaf1.fsf@nordberg.se> <CABrd9STBA9jh6oHXBzEgUD73rWDRbgrFZc69H5tHOzD4Cw=WHg@mail.gmail.com> <87ppdmhqg7.fsf@nordberg.se> <alpine.LFD.2.10.1410201340380.1071@bofh.nohats.ca> <87zjcqjuio.fsf@nordberg.se>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <87zjcqjuio.fsf@nordberg.se>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: http://mailarchive.ietf.org/arch/msg/trans/3vo06fMfCcPk7KmIeX7ve4ZumM4
Subject: Re: [Trans] Certificate verification
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Oct 2014 22:28:02 -0000

On Mon, Oct 20, 2014 at 11:33:51PM +0200, Linus Nordberg wrote:
> Paul Wouters <paul@nohats.ca> wrote
> Mon, 20 Oct 2014 13:44:57 -0400 (EDT):
> 
> | On Mon, 20 Oct 2014, Linus Nordberg wrote:
> | 
> | as individual without chair hat...
> | 
> | >   Logs MUST verify that the submitted end-entity certificate or
> | 
> | > My intention was to make the specification less restrictive by changing
> | >
> | >                               Logs MAY accept certificates that have
> | >   expired, are not yet valid, have been revoked, or are otherwise not
> | >   fully valid according to X.509 verification rules in order to
> | >   accommodate quirks of CA certificate-issuing software.
> | 
> | That seems to bring up the topic a bit too broadly I think? How about:
> 
> The text above is the current text in 6962bis-4.
> 
> 
> | 	Logs MUST protect themselves against spam. They MAY require a
> | 	fully validated X.509 certification chain to one of their configured
> | 	trusted root CA's.
> 
> This may be OK for the spam issue but certainly not for attribution.

Is attribution critical for the core functionality of CT?  (I know this goes
back to the "purpose of CT" thread that Stephen's done a lot of work
defining, and I've got to get around to participating in that thread)  While
I agree that the remediation mechanisms available increase if you know which
root CA to hassle to get a cert revoked, knowledge that a cert was issued
still has *some* value, even if there's no clear indication of who issued it
(in a fanciful future of infinite storage, where self-signed certs were
accepted in logs).

- Matt

-- 
Java. The elegant simplicity of C++. The blazing speed of Smalltalk.
		-- From http://c2.com/cgi/wiki?SmalltalkMinusMinus