Re: [Trans] path validation

Stephen Kent <kent@bbn.com> Thu, 02 October 2014 16:14 UTC

Return-Path: <kent@bbn.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCDA61A87CE for <trans@ietfa.amsl.com>; Thu, 2 Oct 2014 09:14:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.987
X-Spam-Level:
X-Spam-Status: No, score=-4.987 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.786, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CCdBtkM2GIfF for <trans@ietfa.amsl.com>; Thu, 2 Oct 2014 09:14:00 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A14341A8789 for <trans@ietf.org>; Thu, 2 Oct 2014 09:13:59 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15]:50712 helo=comsec.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1XZj0w-000JhG-Da; Thu, 02 Oct 2014 12:13:58 -0400
Message-ID: <542D79C4.9080405@bbn.com>
Date: Thu, 02 Oct 2014 12:13:56 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Rob Stradling <rob.stradling@comodo.com>, trans@ietf.org
References: <54296FB2.1060109@bbn.com><4262AC0DB9856847A2D00EF817E81139233695@scygexch10.cygnacom.com><544B0DD62A64C1448B2DA253C011414607D1629838@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM><4262AC0DB9856847A2D00EF817E8113923370C@scygexch10.cygnacom.com><544B0DD62A64C1448B2DA253C011414607D162989C@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM><20140930005524.GP16215@hezmatt.org> <542C10ED.2060902@bbn.com> <542C1955.7080304@comodo.com>
In-Reply-To: <542C1955.7080304@comodo.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/trans/Dcq1aM7t3G_WFMXS-DW4ADCW2KQ
Subject: Re: [Trans] path validation
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Oct 2014 16:14:08 -0000

Rob,
> On 01/10/14 15:34, Stephen Kent wrote:
> <snip>
>> I thought the CT design  makes a counter argument, i.e., that CAs are
>> motivated to log certs because, over time, TLS clients will reject
>> connections to servers when there is no evidence of an SCT.
>
> Over time, yes, we hope that this will happen.  But we obviously can't 
> guarantee that, in N months/years from now, 100% of TLS clients will 
> support CT.
I agree, which is why I suggested that text to the contrary be modified 
in 6962-bis.
>
>> if this argument is true, then having logs check for syntactic
>> mis-issuance is a good thing.
>
> I disagree.  There is a gap between what is syntactically properly 
> issued (according to CABF guidelines, etc) and what a typical TLS 
> client actually accepts. 
is that a good thing?
> If logs checked for syntactic mis-issuance, a rogue CA could exploit 
> this gap by maliciously mis-issuing certs containing "syntax errors".  
> CT would not reveal the attack (because the logs would refuse to issue 
> SCTs), but TLS clients that don't reject connections when no SCT is 
> provided would be vulnerable.
See my attack analysis, which notes this as part of the larger set of 
what CT can and cannot
detect.
> We want to provide as much "herd immunity" as possible to TLS clients 
> that don't support CT.  This means that we need all certs to be 
> publicly logged, to maximize the chances that any (maliciously) 
> mis-issued cert will be discovered quickly.
That's a clear statement about wanting to protect clients who don't 
implement CT, i.e.,
don't mandate the presence of an SCT.  That's a reasonable argument, 
better that a mere
assertion that "logging is good." It belongs in 6962-bis. See my revised 
proposal on syntax
checking, which addresses this.

Steve