Re: [Trans] Fwd: Certificate Transparency with Russian GOST algorithms

Dmitry Belyavsky <beldmit@gmail.com> Tue, 01 April 2014 09:25 UTC

Return-Path: <beldmit@gmail.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8DFD1A098C for <trans@ietfa.amsl.com>; Tue, 1 Apr 2014 02:25:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id laltWcrh6tig for <trans@ietfa.amsl.com>; Tue, 1 Apr 2014 02:25:38 -0700 (PDT)
Received: from mail-yh0-x22b.google.com (mail-yh0-x22b.google.com [IPv6:2607:f8b0:4002:c01::22b]) by ietfa.amsl.com (Postfix) with ESMTP id 7D7FC1A7032 for <trans@ietf.org>; Tue, 1 Apr 2014 02:25:36 -0700 (PDT)
Received: by mail-yh0-f43.google.com with SMTP id b6so8711579yha.16 for <trans@ietf.org>; Tue, 01 Apr 2014 02:25:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=FSj6Y4uus0qf4JnBvEb/7HAtrvQdn8w3nMJgulnRLYQ=; b=vcq7rBQJWuIlDKkKCY4L0Z/T5eYs2tPCBUn0jh3owIQqLOtDJx6OnaqOFX7si7OyB4 tc8KpykFllz2c6miJaC7o/E2dAzsJ/9ta+I/vqgOd0z1MtBLI1GGwm3wD7p8Fu5E/bqr O+jkt96GLgShW9ZVJCcsFWXGre2s0jqTdHVAK8XbIkG7W8aujXscideE5jEnu2+qgnfF GYoCY+dquMM5jTc3m9beeyNd9NbR0m3tk96sXL+tkRbo6tlWdzOPN2dAFMX7Py8OBLHr e/vaNd46qfFstXrHKC0bU4nZIXT/NinQAndEzsJFRwN/0M7cYyqST1R91Dp/TC8crBvj Nl7A==
MIME-Version: 1.0
X-Received: by 10.236.175.37 with SMTP id y25mr9975079yhl.100.1396344332833; Tue, 01 Apr 2014 02:25:32 -0700 (PDT)
Received: by 10.170.220.193 with HTTP; Tue, 1 Apr 2014 02:25:32 -0700 (PDT)
In-Reply-To: <CABrd9ST2jZ+7bRETAztX8yZnTfOomUHt1gexHXY51_Q+VSrcRA@mail.gmail.com>
References: <CADqLbz+F0tAHSKj32faD+WYzm4WMwbWyMG4eHH=2_pu_g5C8+w@mail.gmail.com> <CABrd9ST2jZ+7bRETAztX8yZnTfOomUHt1gexHXY51_Q+VSrcRA@mail.gmail.com>
Date: Tue, 01 Apr 2014 13:25:32 +0400
Message-ID: <CADqLbzLnDvPZ+TAhk_qjKd-6s2DXWJEpnKL-Ldd1nnfa9ci8iw@mail.gmail.com>
From: Dmitry Belyavsky <beldmit@gmail.com>
To: Ben Laurie <benl@google.com>
Content-Type: multipart/alternative; boundary="20cf305b0abcf1568f04f5f7bf6c"
Archived-At: http://mailarchive.ietf.org/arch/msg/trans/yAbUCPio4aHAElQUWLTPDuur4Gs
Cc: "trans@ietf.org" <trans@ietf.org>
Subject: Re: [Trans] Fwd: Certificate Transparency with Russian GOST algorithms
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Apr 2014 09:25:40 -0000

Hello Ben,


On Mon, Mar 31, 2014 at 2:51 PM, Ben Laurie <benl@google.com> wrote:

> On 31 March 2014 09:21, Dmitry Belyavsky <beldmit@gmail.com> wrote:
> > Dear Ben,
> >
> > Sorry for my late response.
> >
> > 18.03.2014 18:20, Ben Laurie wrote:
> >> As I mentioned elsewhere, in our view you change algorithm by starting
> >> a new log.
> >
> > Ok. What about a way to find out the algorithm in use?
>
> That is metadata that clients must discover outside the protocol
> (along with things like MMD, log URL, etc).
>

I think that whether we have to discover the log URL outside the protocol,
it will be better to specify URL like https://<log server>/ct/meta/ to find
out the concrete setting f the log server.


>
> >> It seems to me there shouldn't be any difficulty accommodating GOST
> >> like this - I guess we'd have to add the rule that non-GOST
> >> certificates MUST NOT use GOST logs. Not sure whether we should
> >> require the opposite, though (i.e. GOST certificates MUST NOT use
> >> EC/SHA logs)?
> >
> > What is expected to be a right behaviour in case when a certificate has
> SCT
> > from some different log servers, if some of the SCT signatures can't be
> > verified? If they are to be just ignored, I'm not sure we need such a
> > limitation.
>
> Fair point.
>

So it seems to me that this (or any other reasonable) behaviour should be
specified somewhere in the section describing TLS client behaviour.

Thank you!


-- 
SY, Dmitry Belyavsky