[websec] FYI: related drafts on securing TSL and certificates

Tobias Gondrom <tobias.gondrom@gondrom.org> Thu, 15 December 2011 05:48 UTC

Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CED221F8419 for <websec@ietfa.amsl.com>; Wed, 14 Dec 2011 21:48:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.261
X-Spam-Level:
X-Spam-Status: No, score=-96.261 tagged_above=-999 required=5 tests=[AWL=0.517, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, HELO_MISMATCH_DE=1.448, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eMhZRL4U3qvY for <websec@ietfa.amsl.com>; Wed, 14 Dec 2011 21:48:17 -0800 (PST)
Received: from lvps83-169-7-107.dedicated.hosteurope.de (www.gondrom.org [83.169.7.107]) by ietfa.amsl.com (Postfix) with ESMTP id E33C721F8319 for <websec@ietf.org>; Wed, 14 Dec 2011 21:48:16 -0800 (PST)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=gondrom.org; b=KZfSYOAxSvNasmNiqENlwOBrbTFmKNikSNiTHHHe62sGVYMnCVQBVgN707ud/9mOK3Cl0v5o5TbJkqy/KSDhcj9PcXvn+mjcIhwTKax2uml0CJh+CMFd1dch0hi6s1Kn; h=Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:X-Priority:Content-Type:Content-Transfer-Encoding;
Received: (qmail 13971 invoked from network); 15 Dec 2011 06:48:12 +0100
Received: from unknown (HELO ?10.5.8.213?) (61.8.220.69) by www.gondrom.org with (DHE-RSA-AES256-SHA encrypted) SMTP; 15 Dec 2011 06:48:11 +0100
Message-ID: <4EE98A18.3010101@gondrom.org>
Date: Thu, 15 Dec 2011 05:48:08 +0000
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:8.0) Gecko/20111110 Thunderbird/8.0
MIME-Version: 1.0
To: websec@ietf.org
X-Priority: 4 (Low)
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: [websec] FYI: related drafts on securing TSL and certificates
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Dec 2011 05:48:18 -0000

Hello,

<hat="individual">

this is only fyi, but possibly noteworthy:
recently I came across two other articles aiming at making TLS/SSL more 
secure:
1. a draft from Ben Laurie and Adam Langley "Certificate Authority 
Transparency and Auditability"
www.links.org/files/CertificateAuthorityTransparencyandAuditability.pdf

2. and another proposal from EFF on "Sovereign Keys: A Proposal to Make 
HTTPS and Email More Secure"
https://www.eff.org/deeplinks/2011/11/sovereign-keys-proposal-make-https-and-email-more-secure

To oversimplify, both add some kind of certificate log stored at other 
sources - though differently.
 From my perspective this does not conflict with but could complement 
the current pinning and HSTS approach.

Best regards,

Tobias