Re: [Trans] path validation
Stephen Kent <kent@bbn.com> Thu, 02 October 2014 16:14 UTC
Return-Path: <kent@bbn.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCDA61A87CE for <trans@ietfa.amsl.com>; Thu, 2 Oct 2014 09:14:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.987
X-Spam-Level:
X-Spam-Status: No, score=-4.987 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.786, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CCdBtkM2GIfF for <trans@ietfa.amsl.com>; Thu, 2 Oct 2014 09:14:00 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A14341A8789 for <trans@ietf.org>; Thu, 2 Oct 2014 09:13:59 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15]:50712 helo=comsec.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1XZj0w-000JhG-Da; Thu, 02 Oct 2014 12:13:58 -0400
Message-ID: <542D79C4.9080405@bbn.com>
Date: Thu, 02 Oct 2014 12:13:56 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Rob Stradling <rob.stradling@comodo.com>, trans@ietf.org
References: <54296FB2.1060109@bbn.com><4262AC0DB9856847A2D00EF817E81139233695@scygexch10.cygnacom.com><544B0DD62A64C1448B2DA253C011414607D1629838@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM><4262AC0DB9856847A2D00EF817E8113923370C@scygexch10.cygnacom.com><544B0DD62A64C1448B2DA253C011414607D162989C@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM><20140930005524.GP16215@hezmatt.org> <542C10ED.2060902@bbn.com> <542C1955.7080304@comodo.com>
In-Reply-To: <542C1955.7080304@comodo.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/trans/Dcq1aM7t3G_WFMXS-DW4ADCW2KQ
Subject: Re: [Trans] path validation
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Oct 2014 16:14:08 -0000
Rob, > On 01/10/14 15:34, Stephen Kent wrote: > <snip> >> I thought the CT design makes a counter argument, i.e., that CAs are >> motivated to log certs because, over time, TLS clients will reject >> connections to servers when there is no evidence of an SCT. > > Over time, yes, we hope that this will happen. But we obviously can't > guarantee that, in N months/years from now, 100% of TLS clients will > support CT. I agree, which is why I suggested that text to the contrary be modified in 6962-bis. > >> if this argument is true, then having logs check for syntactic >> mis-issuance is a good thing. > > I disagree. There is a gap between what is syntactically properly > issued (according to CABF guidelines, etc) and what a typical TLS > client actually accepts. is that a good thing? > If logs checked for syntactic mis-issuance, a rogue CA could exploit > this gap by maliciously mis-issuing certs containing "syntax errors". > CT would not reveal the attack (because the logs would refuse to issue > SCTs), but TLS clients that don't reject connections when no SCT is > provided would be vulnerable. See my attack analysis, which notes this as part of the larger set of what CT can and cannot detect. > We want to provide as much "herd immunity" as possible to TLS clients > that don't support CT. This means that we need all certs to be > publicly logged, to maximize the chances that any (maliciously) > mis-issued cert will be discovered quickly. That's a clear statement about wanting to protect clients who don't implement CT, i.e., don't mandate the presence of an SCT. That's a reasonable argument, better that a mere assertion that "logging is good." It belongs in 6962-bis. See my revised proposal on syntax checking, which addresses this. Steve
- [Trans] path validation Stephen Kent
- Re: [Trans] path validation Santosh Chokhani
- Re: [Trans] path validation Rick Andrews
- Re: [Trans] path validation Santosh Chokhani
- Re: [Trans] path validation Rick Andrews
- Re: [Trans] path validation David Leon Gil
- Re: [Trans] path validation Santosh Chokhani
- Re: [Trans] path validation Rick Andrews
- Re: [Trans] path validation Melinda Shore
- Re: [Trans] path validation Matt Palmer
- Re: [Trans] path validation Jeremy Rowley
- Re: [Trans] path validation Melinda Shore
- Re: [Trans] path validation Kyle Hamilton
- Re: [Trans] path validation Stephen Kent
- Re: [Trans] path validation Stephen Kent
- Re: [Trans] path validation Stephen Kent
- Re: [Trans] path validation David Leon Gil
- Re: [Trans] path validation Carl Wallace
- Re: [Trans] path validation Stephen Farrell
- Re: [Trans] path validation Rob Stradling
- Re: [Trans] path validation Stephen Kent
- Re: [Trans] path validation Stephen Kent
- Re: [Trans] path validation Stephen Kent
- Re: [Trans] path validation Russ Housley
- Re: [Trans] path validation David Leon Gil
- Re: [Trans] path validation Stephen Kent