Re: [Trans] Gossip: Unsticking a client caught with potential evidence of log misbehavior

Ben Laurie <benl@google.com> Thu, 22 October 2015 10:23 UTC

Return-Path: <benl@google.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 564861A028A for <trans@ietfa.amsl.com>; Thu, 22 Oct 2015 03:23:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.388
X-Spam-Level:
X-Spam-Status: No, score=-1.388 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GieuvUWeYj2p for <trans@ietfa.amsl.com>; Thu, 22 Oct 2015 03:23:46 -0700 (PDT)
Received: from mail-yk0-x22a.google.com (mail-yk0-x22a.google.com [IPv6:2607:f8b0:4002:c07::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B79B1A0276 for <trans@ietf.org>; Thu, 22 Oct 2015 03:23:46 -0700 (PDT)
Received: by ykaz22 with SMTP id z22so77907502yka.2 for <trans@ietf.org>; Thu, 22 Oct 2015 03:23:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-type; bh=9L4zh0pitVFuOpb3YgvM+aVqcW8iS7ZRrAHJP7Jqzdc=; b=WtrZ74km6EfCaaIaq7MtMnhUza6+hRmkBiNJnA5X+aL1ufq02yVDwpgSuRxQeRg6HB rSYWOu5rgeP/y9x47rnSZpEoYeDieUq/Ormf8r4bPlzOYJNDsdGhA9jv/rYxYc/6xDtq FN1kj3DT+b+VG94mlWUVjQQe+HJNlFHGdiEtHRawvdLn2RjfkvjCKPLfrNSuevqy7Qax A28mfYw2X6npgeIpsHiZdt8fUhLbIs8zrjZpV+wyEpXCTCvAG7lSjkdiFftaeT6SxgyX Pu9r1DmyLEPWe+Zcw6Swdn3jqBcydJ2K3YNMi2YSYoIg8NE3upWfUcUcB2V5FMdWaeF5 MuVw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-type; bh=9L4zh0pitVFuOpb3YgvM+aVqcW8iS7ZRrAHJP7Jqzdc=; b=KrzBnS0EciXo1xcVMfZxXjqwdGySVHvGod+hc/xQZ0SHuYST4k+y54kjXwKOOJYCNZ 4fkGcvBbtGUoK/5PmHadFQ3ZDq+dSJ4Y/Vqn+IS+x3gfptHgAt2eCpW+OmLhEoU2HCwa ChwS+CN6Iutsi5wyndJA31CqUhlhfRpDl7IElrDLJBB17k4rDK9mzTCUT/RAieI10pmu WA5+yq5aMs8DjrkKcAlMm9uAOWZ4wiiKyCg4N5MhlLFEQvoHyKv9nkEXsF7xZ0WoXxLd VO5qEWKnrmNRzA/aY6zvrr8ara+w2vRYjto39HjK4hdk9m2ooP2cSsEX+pYw6DW1WT3D Owkw==
X-Gm-Message-State: ALoCoQm0SPGmL9PJJtHvd5lGdNu02vx43rLzTztEbC0JF9U8RLsyDJTzBp1g83+3v8usanxLRxz2
X-Received: by 10.129.92.138 with SMTP id q132mr10303049ywb.307.1445509425296; Thu, 22 Oct 2015 03:23:45 -0700 (PDT)
MIME-Version: 1.0
References: <CA+cU71m0wpnD1ZYOTtr=oW+1BjquFxyagtMt+wgCgC_PD0PE-g@mail.gmail.com> <CABrd9SQd2RETKQWe9-_KCHufAWjBhs2k008vEz-5cyM_gbY4Qw@mail.gmail.com> <E1812BE0-BD94-4050-95DB-C0483303AFF2@isoc.org> <CABEqWMC=pJUMEn8DxxTn6VTBs9hpayC-ZVUwcGdvg=PEw-Q=Rg@mail.gmail.com> <CALzYgEfsEOyuo9Ez2JqoMJ=WzZ3mFY+eTe6L2F6ZSLJEiVJAJQ@mail.gmail.com> <CA+cU71=YMq3jJhdnv_CqmteUhRnnxYmbpjQ=hN0DhFbBoy+ERg@mail.gmail.com> <CALzYgEcnW-Gm5jjv3cGj-MTPO9TA2u8sVpuJU8ML8dPi-ynKRA@mail.gmail.com> <87fv142urp.fsf@nordberg.se> <CA+cU71=s9fkKxYF47mYRnejLexsE2x924Dm+sU=fckzKKPdE4A@mail.gmail.com>
In-Reply-To: <CA+cU71=s9fkKxYF47mYRnejLexsE2x924Dm+sU=fckzKKPdE4A@mail.gmail.com>
From: Ben Laurie <benl@google.com>
Date: Thu, 22 Oct 2015 10:23:35 +0000
Message-ID: <CABrd9SSeb=sHYDphJSWvF+ROBEdsrfDfOLSTyHDHuRvOz_RobA@mail.gmail.com>
To: Tom Ritter <tom@ritter.vg>, Linus Nordberg <linus@nordu.net>
Content-Type: multipart/alternative; boundary="001a114d8024d0c63f0522aee353"
Archived-At: <http://mailarchive.ietf.org/arch/msg/trans/qQseWhI_yWbLm7fo7J56Fuv2k9k>
Cc: Katriel Cohn-Gordon <me@katriel.co.uk>, Robin Wilton <wilton@isoc.org>, Eran Messeri <eranm@google.com>, "trans@ietf.org" <trans@ietf.org>
Subject: Re: [Trans] Gossip: Unsticking a client caught with potential evidence of log misbehavior
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Oct 2015 10:23:48 -0000

On Thu, 22 Oct 2015 at 03:16 Tom Ritter <tom@ritter.vg> wrote:

> On 21 October 2015 at 08:52, Linus Nordberg <linus@nordu.net> wrote:
> > | > - The origin doesn't implement SCT Feedback.
> > | >
> > |  This is a hard one - if a domain operator isn't interested in learning
> > | about attacks against their domain, can anything be done about that?
> > | My suggestion for this case is to make it easy to delegate SCT
> Feedback -
> > | so domain owners can allow other domains which operate SCT Feedback to
> > | receive SCTs on their behalf. How does that sound?
> >
> > Scary because we want the end user to trust that the same-origin
> > principle is indeed followed if they're going to play along with SCT
> > Feedback. Opening up for delegation sounds like bad news wrt this.
>
> I am less concerned about this aspect of delegation. A server can
> always share data out of band width a third party.  And they can even
> delegate it to a third party without us knowing.  So enabling a
> mechanism that makes it _easy_ to delegate it does not worry me as
> much as it does you =)
>

I totally agree.


>
> > Impractical since the browser would have to know which domain that
> > example.com has delegated its SCT Feedback to.
>
> This is an engineering problem I don't see a neat solution to. So
> obviously the solution is a new HTTP header! SCT-Feedback:
>
> https://uncle-neds-discount-hanggliding-and-sct-feedback-correlator.website/google.com/
> ;)
>

Quite so.

> Susceptible of blocking since it cannot be performed in the same TLS
> > stream as the ordinary https request.
>
> But this one does worry me very much.  We mention it down in
> https://tools.ietf.org/html/draft-ietf-trans-gossip-01#section-10.2.1
> and I'm hopeful we will get implementations that multiplex gossip
> traffic as much as they can so it is much more difficult to block.
>

It does seem like it is possible to make life quite tricky for attackers...


>
>
> > | > - The data I have is an older STH, which is not tied to any specific
> > | > origin.
> > | >
> > | I think this case is less sensitive from a privacy perspective and so
> could
> > | be gossiped with any servers that do implement SCT Feedback?
> >
> > We have STH Pollination for STH's but only if the STH is fresh, defined
> > in the draft as no older than 14 days. I think Tom means that "older"
> > implies "not fresh".
>
> Yes.  The risk here is admittedly less than that of a SCT, but I do
> still worry about it.
> Would it solve the problem if we had an additional one-week grace
> period?  Where we say "You resolve older STHs into a fresh STH - but
> if you encounter an error trying to resolve a STH that is between 2
> and 3 weeks old, you pollinate it anyway?"
>
> What are the implications of that... So a log could refuse to resolve
> a consistency proof, and the client would pollinate it. A website
> (colluding with the log) could identify that client individually
> (because no one else would be pollinating that STH.)  Separately, if
> website A receives old-STH, and website B receives it as well, they
> can do some pretty reliable cross-origin linkage.  But they can't
> actually induce a client to pollinate old-STH without either the log's
> help (by refusing to resolve a consistency proof) or without blocking
> the consistency proof resolution.
>
> Are there more? That seems like it could be acceptable to me from a
> privacy POV... And it seems like it would solve the problem... I can't
> think of a way you receive (no-maliciously) an older-then-three-week
> STH.
>
> -tom
>
> _______________________________________________
> Trans mailing list
> Trans@ietf.org
> https://www.ietf.org/mailman/listinfo/trans
>