Re: [Trans] Fw: Re: WGLC started for draft-ietf-trans-threat-analysis

Ryan Sleevi <ryan-ietf@sleevi.com> Mon, 21 May 2018 18:41 UTC

Return-Path: <ryan-ietf@sleevi.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C68DD12E8D5 for <trans@ietfa.amsl.com>; Mon, 21 May 2018 11:41:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sleevi.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 93vGY2G_UfzO for <trans@ietfa.amsl.com>; Mon, 21 May 2018 11:41:01 -0700 (PDT)
Received: from homiemail-a36.g.dreamhost.com (homie-sub4.mail.dreamhost.com [69.163.253.135]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46A7512E8D4 for <trans@ietf.org>; Mon, 21 May 2018 11:41:01 -0700 (PDT)
Received: from homiemail-a36.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a36.g.dreamhost.com (Postfix) with ESMTP id A35B29005CA3 for <trans@ietf.org>; Mon, 21 May 2018 11:41:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sleevi.com; h=mime-version :in-reply-to:references:from:date:message-id:subject:to:cc :content-type; s=sleevi.com; bh=4yp6pS2nCK54DUIOiM9olYucGWc=; b= LXrprnn3nlFe8RkbndBFQyP5PLY/JjZ5s1D4YUwV4rwT8D/OUhOPfmKcbGaUOtgs hK357CtDL58UrrgE1KFQiWAxn9XQraBVfGDhYtDm9c4s4EJjoIhrivXIQbn/z0+Y Ysn1CGb2lP0uHDGyWlJIKQcgamQZxNzaZ1x6k7rIDVs=
Received: from mail-it0-f47.google.com (mail-it0-f47.google.com [209.85.214.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: ryan@sleevi.com) by homiemail-a36.g.dreamhost.com (Postfix) with ESMTPSA id 4AFAE9005C9D for <trans@ietf.org>; Mon, 21 May 2018 11:41:00 -0700 (PDT)
Received: by mail-it0-f47.google.com with SMTP id c3-v6so22285827itj.4 for <trans@ietf.org>; Mon, 21 May 2018 11:41:00 -0700 (PDT)
X-Gm-Message-State: ALKqPwfyRQ6Bxgh3TREhqXURs2GMHUjCeTS2waUGx6KB5sLNt5uGZIm7 ZNbt3K93nV+l1V2aQdx3HH80KuZxo2DKUU+erd8=
X-Google-Smtp-Source: AB8JxZr2epyvnLRlAzRZq+MLHnF7IMUL6Anou9g+QjV6HV0yOog8Uw8QuYg9/4wEQZ7WktUmopKVqltOTXDsjeT8iU0=
X-Received: by 2002:a24:9d44:: with SMTP id f65-v6mr11712769itd.119.1526928059560; Mon, 21 May 2018 11:40:59 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:985a:0:0:0:0:0 with HTTP; Mon, 21 May 2018 11:40:58 -0700 (PDT)
In-Reply-To: <z_TIgNyWjgjV4k6G4deE0fHezpEeWD0UIwdPv1xJuQ1z2wLPVcgDPfogcAMW0bThJuuvI7S9H02au_l293RUfSmfZ7pnGyRxI_DHGCNe0gA=@zerho.info>
References: <alpine.LRH.2.21.1804161658150.17034@bofh.nohats.ca> <20180507122941.300b69582fa3acdb52b625af@andrewayer.name> <alhGtNm005X-hBR82niHi9RpJoLosgZF8ah8HC4qLzFX0PPStVGSTbgJtP-zrg1u8vgfb_IiQ70ANuRua2kjRf4zwutQHVRo3pE2PCgZfHo=@zerho.info> <CAErg=HH7XM=a3fyYeSLnGA+C1iYrZT6VRPdpMfJw-JVqUirjEA@mail.gmail.com> <yqGvHLiIFLQmYLTXEs2HOxQ9pP5_634xn8j11yFHd0kTzP0CrgQpvrOuunpLVTDMJTjSohfMkruNfl_-8buytZkxqrko2I__1Vqe5dJ4mx4=@zerho.info> <CAErg=HFChT=PZJXJXXMrObE_R7C6JUtoTVWVHSJ_1qFHbYGopA@mail.gmail.com> <H6YU269er4XOfoCJXCreRcvJxuC9Q-t3qoygTBrLpkQqnQCDou75SAXhM1S0UomT1VGphqB6L5hyEln3qfoA8RTozgAwzL0HW7AWjsqndiY=@zerho.info> <z_TIgNyWjgjV4k6G4deE0fHezpEeWD0UIwdPv1xJuQ1z2wLPVcgDPfogcAMW0bThJuuvI7S9H02au_l293RUfSmfZ7pnGyRxI_DHGCNe0gA=@zerho.info>
From: Ryan Sleevi <ryan-ietf@sleevi.com>
Date: Mon, 21 May 2018 14:40:58 -0400
X-Gmail-Original-Message-ID: <CAErg=HFGA_3+vDAV2gtvZBmx9fMfwQB+1UDRPCALDfubgEkyTA@mail.gmail.com>
Message-ID: <CAErg=HFGA_3+vDAV2gtvZBmx9fMfwQB+1UDRPCALDfubgEkyTA@mail.gmail.com>
To: Stephen Kent <s@zerho.info>
Cc: Trans <trans@ietf.org>, Ryan Sleevi <ryan-ietf@sleevi.com>
Content-Type: multipart/alternative; boundary="000000000000967ad2056cbba469"
Archived-At: <https://mailarchive.ietf.org/arch/msg/trans/jFbQ-eesp3ezDD1GChSvAE792P8>
Subject: Re: [Trans] Fw: Re: WGLC started for draft-ietf-trans-threat-analysis
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 May 2018 18:41:06 -0000

Thanks for the replies, Stephen.

Given the disagreements in interpretation and application of 6962-bis, it
sounds like this document should not progress until we've resolved those
matters in 6962-bis. Does that sound like a reasonable path forward? I
don't feel comfortable that this document describes the running code, and
I'm hesitant to believe we'll get rough consensus because of it, so that
might be a worthwhile path forward here.

Given the issues Andrew has pointed out, which I'm largely agreeing with or
contextualizing, would you feel comfortable proposing changes to 6962-bis
on areas you feel it disagrees with the feedback, or is that something that
you would feel more confident if Andrew and I do? If they are accepted,
would you feel comfortable making these changes to the threat document?

As it stands, I don't feel like the threat document is reflective of intent
or practice, and that leaves me a bit concerned about its general utility
for future readers.

On Mon, May 21, 2018 at 2:05 PM, Stephen Kent <s@zerho.info> wrote:

> Ryan,
>
> Responses inline
>
>
>
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On May 18, 2018 12:19 PM, Stephen Kent <s@zerho.info> wrote:
>
>
>
>
>
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On May 17, 2018 2:57 PM, Ryan Sleevi <ryan-ietf@sleevi.com> wrote:
>
>
>
> On Thu, May 17, 2018 at 2:09 PM, Stephen Kent <s@zerho.info> wrote:
>
>> Ryan,
>> Thanks for the comments, despite by unformatted reply to Andrew.
>> Responses to your comments are inline below.
>>
>>
>> <snip>
>
>>
>> This is not an intended function of logs, and not a single one of the 58
>>> logs currently in operation performs syntactic misissuance checks.
>>> Furthermore, having logs perform this function would violate separation of
>>> concerns. Instead, monitors perform syntactic misissuance checks. crt.sh,
>>> for instance, runs all certificates through several certificate linters.
>>>
>>> The document examines possible ways that one might detect syntax
>>> problems and how elements of CT might facilitate remediation of detected
>>> problems. Logs, if they chose to perform such checks, could help in this
>>> respect and that’s why they are discussed, irrespective of how logs
>>> currently operate. Also, I don’t see where 6962-bis states that a monitor
>>> performs syntax checks. For example, the 6962-bis text for the description
>>> of Monitor operation still says “Monitors watch logs to check that they
>>> behave correctly, for certificates of interest, or both.” (The “or both”
>>> makes no sense here, as I noted several times in 2017, but …)
>>
>>
>> I have to agree with Andrew here, to the extent that we have considered
>> for Chrome formulating explicit policies prohibiting logs from doing what's
>> described here.. Logs that perform such checks would not help the
>> ecosystem, but rather, they would actively harm the PKIs they were serving,
>> by preventing public record of and discovery of misissuance.
>>
>>
>> I understand the argument that logs ought to not perform any syntax
>> checking behind what is needed to verify a signature chain. But, the text
>> in 6962-bis doesn't say that, so, again, your complaint seems more
>> appropriately directed at that document.
>>
>>
>> I'm also not sure why you believe "or both" is not reflective of the
>> reality. There are monitors that simply treat Logs as databases of
>> certificates, without regard for ensuring the cryptographic properties - on
>> a reliance of other members of the ecosystem performing such verification,
>> and perhaps agreeing upon some common shared STH. In this model, "or both"
>> is entirely reflective of real world.
>>
>>
>> I didn't say that "or both" does not reflect reality. I said that it
>> makes no sense grammatically :-). Typically the phrase "or both" refers to
>> two antecedents, e.g., A or B or both. In the sentence I cited from section
>> 8 of 6962-bis can you identify the antecedents? I can't. I find it very
>> confusing.
>>
>
> Monitors watch logs to check that they (logs) behave correctly
> Monitors watch logs for certificates of interest
> Monitors watch logs both to check that they (logs) behave correctly and to
> check for certificates of interest.
>
>
> OK, I now see why the “or both” makes sense, but it appears to be wrong J.
>
>
>
>
> Both descriptions of Monitor operation in 8.2 say that step 4, checking
> for a certificate of interest, is performed “If applicable”. That implies
> that steps 1-3 and 5 are checking to see if a log is behaving correctly (in
> a very basic sense). So, it seems that Monitors are always checking logs
> for consistency, and optionally checking for certs of interest. If so, the
> opening sentence should say that Monitors watch logs to check that they
> behave correctly (in a basic sense) and, optionally, they watch logs for
> certificates of interest.
>
>
>
>
>>
>>
>>
>>
>>> Page 20 says that "syntactic checking [of pre-certificates] by a log
>>> helps avoid issuance of an erroneous certificate." This is contrary to
>>> RFC6962 and RFC6962-bis, which both state that issuing a pre-certificate is
>>> a binding commitment by the CA to issue a certificate. It would be
>>> dangerous for a CA to follow the advice on page 20, as browsers rightly
>>> consider misissuance of a pre-certificate to be equivalent to misissuance
>>> of a real certificate.
>>>
>>> I'll change the text on page 20 to state that a log could help a CA
>>> detect and avoid issuing a syntactically erroneous cert. Also, what 6962
>>> says is not relevant here- that was an experimental doc, not standards
>>> track. Submission of a pre-cert to a log probably does indicate an internet
>>> to issue a cert, but certificate issuance need not result in delivery to a
>>> Subject. If a CA were advised by a log that a certificate was malformed
>>> (e.g.., due to “quirks of CA certificate-issuing software” then the CA
>>> could ditch the certificate, or revoke it, and try again.
>>
>>
>> I don't think that would be a positive change, and have to agree with
>> Andrew here, that it would seem moreso detrimental to the ecosystem that CT
>> aims to improve.
>>
>> I'm not sure the rationale for ditching the certificate is at all
>> reasonable - the fact that such a certificate was even considered as 'log
>> worthy' by a CA is a demonstration of a failure by that CA to uphold public
>> trust. In that model, it's vitally essential for the Log to make that known
>> - not to help the CA cover it up. In this regard, that the CA has used its
>> key to sign something - anything - that fails the checks is a demonstration
>> of risk to any PKI that trust this CAs.
>>
>> I think painting it as quirks does a disservice - it's an operational
>> failure of the CA, and thus, by proxy, a security and trust failure by the
>> CA. That is, if anything, one of the most noteworthy events - rather than
>> the inverse.
>>
>>
>> The text in 6962-bis describes potential syntactic deviation from 5280 as
>> quirks that need to accommodated by CT, not me. I agree that catching
>> syntax errors by CAs, and providing an incentive for them to rectify such
>> errors is a good goal. That could be accomplished several ways. For
>> example, a log could refuse to use an SCT, making the cert less trustworthy
>> to browser clients, and using an error message to there submitting CA. Or,
>> a log could make an entry for the cert, generate an SCT, but return it with
>> an error indication. Logging the certs, retiring an SCT, and providing no
>> error feedback, seems to provide the least help in rectifying. the problem.
>>
>
> Right, I'm explicitly disagreeing with that position. I'm saying that Logs
> that refuse to issue an SCT actively harms the CT ecosystem and does not
> help the furtherance of the improving, at least, the Web PKI.
>
> From the point of view of RFC 6962 and RFC 6962-bis, it's not a protocol
> error for a CA to have submitted such a cert, so returning an error message
> for unrelated reasons seems to be the least helpful, in that it conflates
> two separate systems of concern.
>
>
> (As an aside, I’m not sure what you cite 6962. It’s an experimental RFC
> that is Obsoleted by 6962-bis.)
>
>
>
> Section 5.1 defines an error code “bad submission” that is sent if the
> submission is not a “valid” certificate or pre-certificate (see table on
> page 28). Since what constitutes a valid certificate is ambiguous (see my
> earlier comment about RFC 5280), I think this error code could be
> inapplicable in the case of a syntax problem.
>
>
>
>>
>>
>>
>>
>>> CAs must perform syntactic checks on the TBSCertificate prior to signing
>>> anything.
>>>
>>> In principle yes, but in practice, … “quirks of CA certificate-issuing
>>> software”
>>
>>
>> I'm not sure what you're referring to as quirks again. This is a rather
>> fatal failure mode, and one of the express goals of 6962 (and, through
>> proxy, 6962-bis) is to detect and publicize any CA with such quirks, such
>> that relying parties can move to distrust or otherwise restrict such CAs.
>>
>>
>> I think David Cooper's message suggests that CA "quirks" have not been
>> uncommon, at least not historically. I recall when a widely-used (on mobile
>> devices) browser failed to require the CA Boolean for a v3 cert purporting
>> to be associated with a CA. This was a serious vulnerability that was
>> exploited. If certs from the offending CAs were rejected by all browsers,
>> the offendingCAs would have been forced to fix the problem. But, that was
>> not  the case. The major browsers (Chrome, IE, Safari, Firefox, Opera) have
>> not been very diligent about rejecting certs that deviated from 5280 specs.
>> My guess is that no vendor wanted to become potentially less attractive to
>> users by being there first (only?) to enforce such requirements. This may
>> get better over time, but ...
>>
>
> I'm not disagreeing that CA non-compliance to RFC 5280, which is a
> normative requirement of the Baseline Requirements, has unfortunately not
> been uncommon.
> I'm saying it's not accurate to describe such non-compliance as a 'quirk'
> - a somehow benign deviance - when it is active misissuance and failure to
> abide by both stated and expected policy.
>
>
> I agree that issuing certificates with syntax errors is serious, but the
> term “quirk” was chosen by the authors of 6962-bis, not me.
>
>
>
>
> Regarding your view of diligence in rejecting such certs, I can't help but
> feel that's a non-sequitor in the context of CT. However, since this has
> been suggested a few times now as somehow a deficiency or non-conformancy
> on behalf of the browsers or RFC 5280 clients, recall the following:
>
> https://tools.ietf.org/html/rfc5280#section-6.1
>    Therefore, the algorithm only includes checks to verify that the
>    certification path is valid according to X.509 and does not include
>    checks to verify that the certificates and CRLs conform to this
>    profile.  While the algorithm could be extended to include checks for
>    conformance to the profiles in Sections 4 and 5, this profile
>    RECOMMENDS against including such checks.
>
>
> The text you cite applies to certificate path validation. Other parts of
> 5280 define syntactic requirements for certificates
>
>
> RFC 5280 is but one profile, and for a number of clients, they must deal
> with profiles for other constituencies - for example, local
> Enterprise-defined profiles.
>
>
> I’m not sure what you point is here. I knew Jon and during my 10+ years on
> the IAB we (politely) disagreed about his mantra. I argued that being
> liberal in what one accepts is a dangerous strategy re security, despite
> from the perspective of interoperability.
>
>
> While this is unquestionably symptomatic of the problems with the
> Robustness Principle, as Martin Thompson has so thoroughly explored in
> https://tools.ietf.org/html/draft-thomson-postel-was-wrong, it's worth
> noting that such criticism is a bit misplaced.
>
>
>> Section 4.2.1.1 is premised on two I-Ds that were not adopted by trans
>>> and have expired. I suggest that sections 4.1.1.1 and 4.2.1.1 be removed
>>> entirely.
>>>
>>> I believe that the two I-Ds in question were generated because of the
>>> text that I was writing here, not the other way around. The text in
>>> 4.1.1..1 says that a log could optionally check for syntax problems; it
>>> does not say that they MUST/SHOULD do so. I'll change the text in 4.1.1.1
>>> to note, parenthetically, that syntax checks by a log are optional.
>>
>>
>> As mentioned, I think syntax checks should be SHOULD NOT. I only hesitate
>> to say MUST NOT because I think that requires normatively specifying that
>> few syntax checks that are necessary for spam/abuse prevention (for
>> example, checking the basicConstraints bit on the issuer, so that anyone
>> with a leaf can't just spam), and the ecosystem is still working through
>> them.
>>
>>
>> Again, your suggestion for a SHOULD NOT ought tin be directed to
>> 6962-bis, not to this document. My analysis is based primarily on what
>> 6962-bis does or does not require of compliant CAs, logs, clients,
>> Monitors, and Auditors.
>>
>
> I agree that I think RFC 6962-bis can benefit from improvements, to
> highlight that the syntactical checks, as interpreted by you, was not
> inline with the intention of syntax checks as written - that is, for
> example, ensuring an interpretable parsing of the Certificate into its
> corresponding tbsCertificate and signature fields, or the relationship of
> the tbsCertificate's issuer to the next certificate's subject, etc.
>
> That is, syntax is as minimal as necessary to ensure it's just not
> arbitrary random bytes being added to the log (as that presents an
> operational risk), but not to those matters of policy or profile
> enforcement explicitly recommended against by 5280.
>
>
> If 6962-bis stated that logs MUST NOT check syntax beyond what is needed
> to perform certificate path validation, then we would not be disagreeing.
>
>
>
>> I agree that a browser placing greater trust in a certificate because it
>>> has been logged is not fool-proof. However, it represents an important
>>> initial check. I believe Richard Barnes made some good arguments on the
>>> list last year about the utility of logging and the complexity and
>>> potential privacy issues that arise if browsers engage in auditing. So,
>>> yes, I believe that receipt of a certificate containing an SCT probably
>>> will inspire greater confidence. I will revise the text to insert the term
>>> "probably". Browser interactions with an audit system are not yet
>>> standardized and present some privacy concerns, so one ought not assume
>>> that the more extensive checks you note will be widely deployed.
>>>
>>
>> Like Andrew, I share these concerns about misplaced trust.
>>
>>
>> I don't dispute the fact that a more thorough checking of SCTs would be
>> beneficial, but 6962-bis does not even require a client to fetch an
>> inclusion proof (see section 8.1.4). Also note that Section 8.1.6 says that
>> what a client has to do to satisfy "compliance" and what it does in the
>> face of non-compliance is largely a local matter.
>>
>
> I'm not sure how this addresses or responds to the concerns?
>
>
> The abstract for 6962-bis says: “The intent is that eventually clients
> would refuse to honor certificates that do not appear in a log,
> effectively forcing CAs to add all issued certificates to the logs.” This
> text suggests that the goal is for browsers to distrust certificates
> without SCTs. To me that suggests that the authors believe that a browser
> ought to view a certificate with an SCT as more trustworthy than one
> without, even if the browser performs no additional checks.
>
>
>
>> The document should be updated to remove mention of monitors trusting or
>>> relying upon logs, and to make clear that the primary response to a
>>> misbehaving log is for browsers to distrust it.
>>>
>>> A monitor selects a set of logs that it will use to check for mis-issued
>>> certificates. By so doing it is implicitly trusting (relying on) them. If
>>> they are detected to misbehave, Monitors will, presumably, stop relying on
>>> them, as you indicated in your example.
>>
>>
>> I fear this may misunderstand or misrepresent one of the goals of CT. A
>> monitor fully can continue to trust and rely on WoSign and StartCom logs
>> (in this example) as sources of logged certificates. While it may not be a
>> comprehensive view - that is, such logs may be omitting certificates - from
>> a monitor perspective, that does not alter or undermine the purpose and
>> value of the log, particularly for detecting misissuance.
>>
>> A log is not necessarily expected to contain all certificates in
>> existence. Consider the set of logs we see these days that adopt policies
>> in which they will only accept certificates with validity periods in
>> defined bands, which beyond providing a defined lifetime of operation, also
>> helps bound growth. There's no reason to suggest or believe these logs
>> become any less useful once their issued certificates expire - for example,
>> as ways of analyzing past CA malfeasance ("quirks", but really "security
>> bugs"). The same way applies to logs that misbehave.
>>
>>
>> I don't see how your observations above relate to my comment that a
>> Monitors relies on (trusts) the logs that it chooses to check. Can you cite
>> text in 6962-bis that states what you characterize as the goals of CT
>> relative to Monitors?
>>
>
> I'm not sure how you're arriving at a conclusion that there's either
> reliance or trust involved here on the part of monitors, so that may be the
> heart of the confusion.
>
>
> There is no requirement that any Monitor watch all logs. Thus, when a
> Monitor elects to watch a set of logs it is relying on them as it tries to
> perform it’s optional task  of watching logs for certificates of interest
> for the clients of the Monitor. This seems consistent with the text in
> Section 1 (6962-bis): “Those who are concerned about misissuance can
> monitor the logs, asking them regularly for all new entries, and can thus
> check whether domains for which they are responsible have had
> certificates issued that they did not expect.” If a Monitor is associated
> with a CA, the choice of logs may be different; the CA would certainly
> watch the logs to which it submits its certs to receive SCTs. But it also
> may watch other logs to detect certificates issued under the same name as
> certificates that it has issued (to protect its clients).
>
>
>
>> D.      Signature/chain mutation attack
>>>
>>> There's another way a log can misbehave which ought to be mentioned in
>>> section 3.1.1.2. A misbehaving log that conspires with a CA could log a
>>> misissued certificate, but mutate the certificate's signature or chain such
>>> that the certificate is no longer cryptographically attributable to the CA.
>>> The CA could then plausibly deny that it issued the certificate. Since the
>>> signature and chain are not part of the Merkle Tree, the SCT will be
>>> accepted by browsers and be auditable, despite the log entry being mutated
>>> and useless for responding to the misissuance.
>>>
>>> Monitors should be sure to validate the signature and chain of logged
>>> certificates so that this misbehavior can be detected.
>>>
>>> I don’t think I understand the attack. Where is the mutated certificate
>>> signature? If you can provide a clear, detailed description of the attack I
>>> could include it in the revised text.
>>
>>
>> Within the entry itself, as part of the proof of issuance to a CA.
>>
>>
>> I need a more complete description of the attack it if is to be included
>> in this doc.
>>
>
> I'm not sure how to further expand on this, as this is a rather complete
> and comprehensive description. Perhaps Andrew could reword it, but in terms
> of informational content, it's fully descriptive of the risk - a log and a
> CA conspiring using unauthenticated data that is still relied upon by
> monitors.
>
>
> If you look at the descriptions of attacks involving a malicious CA and a
> misbehaving (or compressed log  in 3.2.1.2 and 3.3.3) they provide a lot of
> detail, compared to the very terse statement above.
>
>
>
> Steve
>
>
> _______________________________________________
> Trans mailing list
> Trans@ietf.org
> https://www.ietf.org/mailman/listinfo/trans
>
>