Re: [Trans] Call for adoption, draft-linus-trans-gossip-ct

Tom Ritter <tom@ritter.vg> Fri, 24 July 2015 14:11 UTC

Return-Path: <tom@ritter.vg>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCA601A1B00 for <trans@ietfa.amsl.com>; Fri, 24 Jul 2015 07:11:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.379
X-Spam-Level:
X-Spam-Status: No, score=-1.379 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s85EjNLWexlD for <trans@ietfa.amsl.com>; Fri, 24 Jul 2015 07:11:01 -0700 (PDT)
Received: from mail-wi0-x230.google.com (mail-wi0-x230.google.com [IPv6:2a00:1450:400c:c05::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E9081A1A58 for <trans@ietf.org>; Fri, 24 Jul 2015 07:11:01 -0700 (PDT)
Received: by wicmv11 with SMTP id mv11so66448084wic.0 for <trans@ietf.org>; Fri, 24 Jul 2015 07:11:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ritter.vg; s=vg; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; bh=arBmSAsYR9IZzOEWENp5TWAwMYvULZmOi8Zoqj0ink8=; b=tJ2zaBDLCq0a/0morvmSRfAoKCNXNJB+AKVbl8QIhfPc7oue3NWX1OpSMDy6LzHDeB ww28RpJjab0wnUrKajoZYX8yQPew8ULO1CfAuthpUshFqFR4OxvdM73B0qvvPFLIoqK7 5Jd+eCmwr6znZizNhc7uX5En5/hRWXNL4jFq0=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding; bh=arBmSAsYR9IZzOEWENp5TWAwMYvULZmOi8Zoqj0ink8=; b=CVJohL9xR8nLewwAhH+nFV0oZrllUQkU55+YXc96FrZPu1s0w3udpeLjfwIkyoeCo6 BIw7WQQzosAFhNl5r9cqUYwMYapP8flykIvZV/bbQNfTn9clml5m/pOBpQGueojD/wAh ke3z+NE4zs1PR1K+kcSf9ZfF8hqOCi6TsuavtEagNtEWXEZeEpAff9WWWFXUpG6twXEj uYdrfvAp3JSTztLCp3hLyEDPp3MvqE+px/spVt3S4wzeoQ9ecNcdbWGJ7Jim9HVONRW9 QpYCuuzzPaOIF9HAZU1sy1QXmqJpmxxViAAZXO39XbcM0s3znBfbl4KMe3Xupme8SW0g 4hvg==
X-Gm-Message-State: ALoCoQk7gRPQG2k5LiMEi54ftdLxFiUESqAlZBPNSxLW29qIXfxeY61EDxLr/t5ltV0MmMnKodpa
X-Received: by 10.180.211.196 with SMTP id ne4mr7805609wic.23.1437747060103; Fri, 24 Jul 2015 07:11:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.28.174.67 with HTTP; Fri, 24 Jul 2015 07:10:40 -0700 (PDT)
In-Reply-To: <55B238F0.2080207@comodo.com>
References: <mailman.3884.1437667800.3631.trans@ietf.org> <6E6EF479-66BE-4EBE-956C-22009BCED863@gmail.com> <CABrd9SRG-SQtADhS=hee_Zf4vzMETyZOYtqg5Xp82Dq70C0puQ@mail.gmail.com> <55B238F0.2080207@comodo.com>
From: Tom Ritter <tom@ritter.vg>
Date: Fri, 24 Jul 2015 09:10:40 -0500
Message-ID: <CA+cU71nwX=mg+Ad=N4NMe1hBKYpFLmE+JBuoKd=wDkzX2E55MA@mail.gmail.com>
To: Rob Stradling <rob.stradling@comodo.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/trans/c5j0xyOtFlUaQUie2CFniaJaAMs>
Cc: "trans@ietf.org" <trans@ietf.org>, Ben Laurie <benl@google.com>, Bryan Ford <brynosaurus@gmail.com>
Subject: Re: [Trans] Call for adoption, draft-linus-trans-gossip-ct
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jul 2015 14:11:02 -0000

I'm an author, so +1 to adopt?

I reiterate Ben's point that we don't believe this draft has privacy
problems.  (Well you can _opt in_ to having privacy problems by using
a trusted auditor, which does leak your browsing history, but that's
not the expected use case for most clients by far.  The other two
approaches are designed to be privacy preserving.)

On 24 July 2015 at 08:09, Rob Stradling <rob.stradling@comodo.com> wrote:
> On 24/07/15 12:09, Ben Laurie wrote:
> <snip>
>>
>>     But say we enhance CT so clients can demand STHs *with* cert
>>     inclusion proofs from the web servers they talk to - as I suggested
>>     in the meeting today, and which I believe Ben Laurie mentioned is
>>     already in the works.  Then any Web client that does this will be
>>     proactively protected from MITM attacks involving faked, forked, or
>>     otherwise bad log entries.  And the client doesn’t have to
>>     compromise its privacy by gossiping with anyone.
>
> <snip>
>>
>> 2. Our original design for CT did indeed have certs served along with an
>> STH and an inclusion proof. Unfortunately, CAs categorically rejected
>> this approach because of the latency it introduced in the certificate
>> issuance process. Personally, I think it would be a better approach. Now
>> CAs are more accepting of CT, perhaps it would be worth revisiting the
>> question with them?
>
>
> I think we need to make this approach available as an option.  We should
> retain the lower-latency option (i.e. SCTs) too though.
>
> TRAC ticket 10 already aims to do this.
>
> DV certs are typically validated and issued quickly.  For EV certs and
> name-constrained Sub-CA certs, the process can take days/weeks/months, so
> added latency in issuance may be less of a concern.
>
> When OCSP Stapling and/or the CT TLS extension are used to convey "CT
> objects" to TLS clients, the TLS server could send SCTs for the first few
> hours, then switch to sending inclusion proofs / STHs once the log has
> generated them.

I like it. I like the OCSP approach better than Certs though, because
it eliminates the requirement of "private-enough DNS" to retrieve
Inclusion Proofs in STH Pollination, and lets more privacy-concerned
clients participate in STH Pollination.  (Because an Inclusion Proof
to a STH in a cert would be a very old STH, which we could not gossip
because (over time) that STH will become rarer and rarer and probably
lead to a fingerprint.

-tom