Re: [Trans] [Public Notary Transparency Wiki] #170: Allow for separate SCT and STH keys?

"trans issue tracker" <trac+trans@ietf.org> Tue, 09 May 2017 13:32 UTC

Return-Path: <trac+trans@ietf.org>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 984D5129B82 for <trans@ietfa.amsl.com>; Tue, 9 May 2017 06:32:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.879
X-Spam-Level:
X-Spam-Status: No, score=-1.879 tagged_above=-999 required=5 tests=[ALL_TRUSTED=-1, BAYES_00=-1.9, MISSING_HEADERS=1.021] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WbflPabr8UsA; Tue, 9 May 2017 06:32:36 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E0F312944B; Tue, 9 May 2017 06:32:36 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: trans issue tracker <trac+trans@ietf.org>
X-Trac-Version: 1.0.10
Precedence: bulk
Cc: trans@ietf.org
Auto-Submitted: auto-generated
X-Mailer: Trac 1.0.10, by Edgewall Software
X-Trac-Project: Public Notary Transparency Wiki
Date: Tue, 09 May 2017 13:32:36 -0000
X-URL:
X-Trac-Ticket-URL: https://trac.ietf.org/trac/trans/ticket/170#comment:3
Message-ID: <037.ebb778ccc78e52dac71c39e8b73f37fb@ietf.org>
References: <022.9d8a06990859596aaa23fdb00d6774bc@ietf.org>
X-Trac-Ticket-ID: 170
In-Reply-To: <022.9d8a06990859596aaa23fdb00d6774bc@ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/trans/f23FQacmFnzSJ9OXL9rKaxe-XdE>
Subject: Re: [Trans] [Public Notary Transparency Wiki] #170: Allow for separate SCT and STH keys?
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 May 2017 13:32:37 -0000

#170: Allow for separate SCT and STH keys?
-------------------------+-----------------------
 Reporter:  rlb@…        |       Owner:  eranm@…
     Type:  defect       |      Status:  assigned
 Priority:  major        |   Milestone:  review
Component:  rfc6962-bis  |     Version:
 Severity:  -            |  Resolution:
 Keywords:               |
-------------------------+-----------------------

Comment (by linus@…):

 As a log implementer and log operator I'd like to express support for the
 idea of using separate keys for signing SCTs and STHs.

 In an architecture where the log owner can delegate //some// power to
 other organisations for operating frontend nodes by allowing frontend
 nodes to sign SCTs but not STHs, this would lower the risk of "full
 takeover" of a log. While there certainly are attacks that can be
 performed by an adversary capable of producing either SCTs //or// STHs I
 think there are also attacks that require that //both// SCTs and STHs can
 be signed.

 Note that the threat is not limited to an adversary getting hold of a copy
 of key material but also includes the capability of having SCTs and STHs
 signed by a signing service. I mention this because the design and
 implementation of such signing services would be less complex if they
 didn't have to deal with multiple keys and roles for these keys.

 While I disagree with the stated lack of benefit I do agree that there is
 a cost in client implementation and also in overall complexity of the
 system. I think that the benefit outweigh the cost but would like to hear
 other peoples view on this, especially CT client implementors.

--
Ticket URL: <https://trac.ietf.org/trac/trans/ticket/170#comment:3>
Public Notary Transparency  Wiki <https://trac.ietf.org/trac/trans>
My example project