Re: [Trans] Goals and generic mis-issuance fgramework

Stephen Kent <kent@bbn.com> Mon, 24 November 2014 13:54 UTC

Return-Path: <kent@bbn.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96EC21A6F6F for <trans@ietfa.amsl.com>; Mon, 24 Nov 2014 05:54:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.51
X-Spam-Level:
X-Spam-Status: No, score=-1.51 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gNa2ICKy_Fv8 for <trans@ietfa.amsl.com>; Mon, 24 Nov 2014 05:54:53 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E17CD1A6F6E for <trans@ietf.org>; Mon, 24 Nov 2014 05:54:52 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:55402 helo=comsec.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1Xsu6d-0001Kp-NP for trans@ietf.org; Mon, 24 Nov 2014 08:55:07 -0500
Message-ID: <547338AF.6010903@bbn.com>
Date: Mon, 24 Nov 2014 08:54:55 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: trans@ietf.org
References: <5436FC38.1070201@bbn.com> <544B0DD62A64C1448B2DA253C011414607D2BA8687@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM> <93CB5AEA-4672-48D1-8477-DF5DE3D143CE@vigilsec.com>
In-Reply-To: <93CB5AEA-4672-48D1-8477-DF5DE3D143CE@vigilsec.com>
Content-Type: multipart/alternative; boundary="------------070408080103020704020308"
Archived-At: http://mailarchive.ietf.org/arch/msg/trans/PidkGFsboE1QCir1GJKf4KhE2Sc
Subject: Re: [Trans] Goals and generic mis-issuance fgramework
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Nov 2014 13:54:54 -0000

Russ,

Sorry I didn't get to this sooner, vacation, etc. I see that Rick 
already replied, but for
completeness ...


> ...
>
> Can't anyone build the certificate chain?  Since the logs are posting 
> the supported trust anchors, anyone can build a chain for the end 
> entity certificate.
Anyone can build a cert chain that should be accepted by a log, if the 
chain is "valid" relative to
one of the CAs for which the log says it will accept certs. I think this 
is why Rick suggested that I
make the fist sentence of the second paragraph more general, which I have.
> ...
>
> Alternatively, a log could check to see if the reported certificate is 
> already present, and if so, return the older entry to the party that 
> reports the certificate.  I seem to recall reading this idea at some 
> point, buy I admit I did not look into the current I-D to see if that 
> was where i read it.
I believe you're correct, i.e., a log may, at its discretion, return the 
SCT it generated previouslythen
if a duplicate cert is submitted.
>
>> ...
>
> If the log performs some validation checks, are you suggesting that a 
> relying party can leverage the work already done by the log?  If so, 
> it puts the log checking at a different place in the certificate 
> validation than I was imagining.
That's not what I meant to imply. I was saying that if an entity 
submitting a cert to a log asserted
the type of cert, then  a Monitor and/or a client knows what additional 
checks it ought to perform,
based on the assertion. So, for example, if a client gets a cert that 
the log entry and SCT say is
an S/MIME cert, but the cert has been submitted in a Web PKI context, 
this might raise an alarm. Also if
a log states that it performed syntax checks for the indicated type of 
cert, and a Monitor or client
performs the same checks and gets a different outcome, this should raise 
doubts about the log.

Nonetheless, I guess a client might choose to rely on cert validation by 
a log, although
one should do so only if one has confidence that the log (or a set of 
logs that all agree the
cert was valid) can do a better job than the client. Given experience 
with some browsers, that
might not be a bad idea ;-).

Steve