Re: [Trans] How to redact an entry

Ben Laurie <benl@google.com> Wed, 16 November 2016 11:16 UTC

Return-Path: <benl@google.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF416129400 for <trans@ietfa.amsl.com>; Wed, 16 Nov 2016 03:16:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level:
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.497, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hEiVMW4K7mEq for <trans@ietfa.amsl.com>; Wed, 16 Nov 2016 03:16:49 -0800 (PST)
Received: from mail-vk0-x22a.google.com (mail-vk0-x22a.google.com [IPv6:2607:f8b0:400c:c05::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A88161288B8 for <trans@ietf.org>; Wed, 16 Nov 2016 03:16:49 -0800 (PST)
Received: by mail-vk0-x22a.google.com with SMTP id w194so111968840vkw.2 for <trans@ietf.org>; Wed, 16 Nov 2016 03:16:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=kMp/tF0+Nh7cpMK0TYPFT+pil7q5BGKbDUVFuZz1qu8=; b=lkraq5YNqgUB6Z9ipBbd96PL42wplwy7Asr9uysYK3rhzYKFETU0ssOF27lEGZ+k48 Nmi3ESZjwqNSRMvO8awCcQGNlTb1fQoXFyNndkj4LWiZKNgHDx455lpMdN54Mj94cQm7 o/jxnW25v4PtwVeR4p8vYL877TQGvr03lFL36/n0NBLWSt4U8vSNIeD5IQcEuNjey9EJ 56oZEQeyb5/Z3yp7kkKaim4Edk4KuafVXzrmxp8cUyI/f0daTjSJpJaZZ3ae0nF6KDaR DtCYpKq7fgnvTycBRS4i2IKFwR/ykfenANW9GetAIjuVkgDpzpylhVbcVAI/14Nef+ik T5fA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=kMp/tF0+Nh7cpMK0TYPFT+pil7q5BGKbDUVFuZz1qu8=; b=lnlCsyC7NEF7fW6Y6zlSePFexQAfJJbk3DEkrDkaP1AortfnkSpR6j3qxEz55VYwos pFK2wZmp3ufITJ1IgHQhR26XtAR5Ff2QC0dJCWUUPIX9olvyxWPB0pqxS47rkd486G/L Ht/fnWNuq5RrqZPWMzPqxN+sf+iD3eddveikLXKwrEs9iegt2rTA/MEn8wHz42RRc0Kw xl7BfSnJ6k3fSI6cfSRsCsE9wp5XJEku5TcQyFW+1zDCTANIIHS4MiuEOiLTg1e5RUNP RwQU9CpRIKJRlBBB0JqStMdnHx6W4WkJeDfS6BfobQeIxLaYSJ+qrI8ICH0BFHDtlBYC Zj5w==
X-Gm-Message-State: ABUngvduXJgdTlAY0Xfori9HgkFnbwCRFuhNrqqm8ZzOvabJHRbf7c+4zerXE/ureJtEoTSzK5JUjTXQ27M20+kK
X-Received: by 10.31.16.36 with SMTP id g36mr901147vki.170.1479295008419; Wed, 16 Nov 2016 03:16:48 -0800 (PST)
MIME-Version: 1.0
Received: by 10.31.162.67 with HTTP; Wed, 16 Nov 2016 03:16:47 -0800 (PST)
In-Reply-To: <4E665C5B-BC28-428E-9BFB-626D3364E05B@nohats.ca>
References: <CABrd9SSeePrsNq8ERjxpbEvUAdyb=yQOGAom0qh9SZMoP=nsMw@mail.gmail.com> <CAMm+LwiZUw+JpEanY5vkxGBOtdrs9HfYzp34cBtwDv34uJCjKw@mail.gmail.com> <4E665C5B-BC28-428E-9BFB-626D3364E05B@nohats.ca>
From: Ben Laurie <benl@google.com>
Date: Wed, 16 Nov 2016 11:16:47 +0000
Message-ID: <CABrd9STPBWt=p-eAW5t=QSw2oexuSeW5tbtcbczagA0jx77gQA@mail.gmail.com>
To: Paul Wouters <paul@nohats.ca>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/trans/aRIBtbDIlTSGugt5XnsLyhVGejE>
Cc: Phillip Hallam-Baker <ietf@hallambaker.com>, "trans@ietf.org" <trans@ietf.org>
Subject: Re: [Trans] How to redact an entry
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Nov 2016 11:16:52 -0000

On 16 November 2016 at 03:46, Paul Wouters <paul@nohats.ca> wrote:
> How can I as log consumer detect the difference between the log removing
> illegal content and the log being compelled by a government to hide a rogue
> certificate?

Court orders are court orders. That issue is not in the log's domain.

>
> Sent from my iPhone
>
> On Nov 16, 2016, at 10:01, Phillip Hallam-Baker <ietf@hallambaker.com>
> wrote:
>
>
>
> On Tue, Nov 15, 2016 at 2:49 PM, Ben Laurie <benl@google.com> wrote:
>>
>> Eran asked me to briefly describe how redaction in a transparency log
>> would work.
>>
>> First, we introduce a new leaf type, "Redacted". The content of this
>> leaf is simply the hash of the original leaf, the entry number of the
>> redaction reason entry (see below) and a signature over the content by
>> the log key.
>>
>> Rather than hashing this entry, verifiers simply use the enclosed hash
>> to calculate the tree hash.
>>
>> Secondly, we introduce a second new leaf type, "Redaction reason".
>> This leaf contains two things: the entry number of the redacted entry
>> and a textual explanation of why it was redacted (possibly we need to
>> get a little more elaborate here, but perhaps the simplest thing to do
>> is to allow it to include URLs to point to any supporting material).
>> This leaf type would be hashed in the usual way.
>>
>> Observers of the log can verify that every redacted entry has a
>> corresponding redaction reason entry, and if not, can produce proof it
>> does not (this is why the redacted entry has to be signed directly).
>>
>> Note that the redacted entry could not include the entry number of the
>> redaction reason, if preferred, though that would force an observer of
>> that entry to download the whole log to verify the reason and also
>> would make proof of non-compliance bulky. :-)
>
>
> I decided I had to do something of this sort in the Mesh notary log. It is
> probably a good idea to do it as a matter of course.
>
> Lets consider the general case for a moment, what happens if someone puts
> some child pornography into the log. Obviously you can't publish it or you
> go to jail. So you have to take it out which breaks the log.
>
> So either you have to devise a scheme that you are certain cannot be used to
> publish abusive material or you have to have a way to suppress it either. I
> think the second approach is better.
>
>
> Of course putting bad stuff in a Trans log would be a lot more effort than
> putting it into the blockchain or the like. But don't think it is
> impossible. I have a few attacks that are worrying enough not to want to
> share in public. The sort of thing that has Special Branch making house
> calls.
>
> So I would hash the received data values before enrolling the hash in the
> notary log as a matter of course.
>
> _______________________________________________
> Trans mailing list
> Trans@ietf.org
> https://www.ietf.org/mailman/listinfo/trans