[Trans] I-D Action: draft-ietf-trans-threat-analysis-16.txt

internet-drafts@ietf.org Fri, 05 October 2018 13:04 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: trans@ietf.org
Delivered-To: trans@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C734130E45; Fri, 5 Oct 2018 06:04:40 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: trans@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.85.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: trans@ietf.org
Message-ID: <153874468032.1118.18435317761200854499@ietfa.amsl.com>
Date: Fri, 05 Oct 2018 06:04:40 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/trans/5cx48x2Nwae3OjjPezU7Sb0sFfo>
Subject: [Trans] I-D Action: draft-ietf-trans-threat-analysis-16.txt
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Oct 2018 13:04:41 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Public Notary Transparency WG of the IETF.

        Title           : Attack and Threat Model for Certificate Transparency
        Author          : Stephen Kent
	Filename        : draft-ietf-trans-threat-analysis-16.txt
	Pages           : 32
	Date            : 2018-10-05

Abstract:
   This document defines an attack model and discusses threats based on
   the system design presented in [I-D.ietf-trans-rfc6962-bis].  It
   analyzes potential vulnerabilities associated with that design, and
   considers compromises of system elements and malicious behavior by
   such elements.  It does not consider implementation vulnerabilities,
   including ones that might enable denial of service attacks against
   these elements.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-trans-threat-analysis/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-trans-threat-analysis-16
https://datatracker.ietf.org/doc/html/draft-ietf-trans-threat-analysis-16

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-trans-threat-analysis-16


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/