Ben Laurie wrote:
http://www.links.org/?p=1226

Quite a few people have said to me that Certificate Transparency (CT) sounds like a good idea, but they’d like to see a proper spec.

Well, there’s been one of those for quite a while, you can find the latest version [...], or for your viewing convenience, I just made an HTML version <http://www.links.org/files/sunlight.html>.


May I ask a (maybe stupid) question?

"... audit proofs will be valid indefinitely ..."

Then what remains of the scheme reputation once Mallory managed to inject a fraudulent certificate in whatever is being audited (It's called a "log" but I understand it as a grow-only repository)?

Actually, my expectation would be to read an explanation of which security services are being offered, and which kind and level of assurance the CT server operating organization is expected to provide. What is the problem being addressed and to who does the main benefit accrue / from whom involvement is expected? Once I can see these, I may appreciate Apache and browser backward compatibility features and the like.

Thanks for your patience with my scrutiny.


--
- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, QC, Canada H2M 2A1

Tel. +1-514-385-5691
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to