On 1 November 2012 11:22, Phillip Hallam-Baker <hal...@gmail.com> wrote:
> Zero net admin steps is probably a necessary criteria. What you think not
> hard might as well be rocket science to most.

Maybe, but the rocket science involved in getting a cert in the first
place is far worse.

>
>
> On Thu, Nov 1, 2012 at 5:10 AM, Ben Laurie <b...@google.com> wrote:
>>
>> On 31 October 2012 23:57, Rick Andrews <rick_andr...@symantec.com> wrote:
>> >> -----Original Message-----
>> >> From: Ben Laurie [mailto:b...@google.com]
>> >> Sent: Monday, October 29, 2012 3:10 AM
>> >> To: Rick Andrews
>> >> Cc: Rob Stradling; therightkey@ietf.org; Paul Hoffman
>> >> Subject: Re: [therightkey] Other solutions to the problem
>> >>
>> >> On 26 October 2012 22:31, Rick Andrews <rick_andr...@symantec.com>
>> >> wrote:
>> >> >> -----Original Message-----
>> >> >> From: Ben Laurie [mailto:b...@google.com]
>> >> >> Sent: Friday, October 26, 2012 1:51 AM
>> >> >> To: Rob Stradling
>> >> >> Cc: Rick Andrews; therightkey@ietf.org; Paul Hoffman
>> >> >> Subject: Re: [therightkey] Other solutions to the problem
>> >> >>
>> >> >> On 26 October 2012 09:24, Rob Stradling <rob.stradl...@comodo.com>
>> >> >> wrote:
>> >> >> > On 26/10/12 00:58, Rick Andrews wrote:
>> >> >> > <snip>
>> >> >> >
>> >> >> >> AFAICT, for CT to really work it will require participation from
>> >> >> every CA
>> >> >> >> whose roots are in browsers. I think you're underestimating how
>> >> hard
>> >> >> it will
>> >> >> >> be to achieve that.
>> >> >> >
>> >> >> >
>> >> >> > Rick,
>> >> >> >
>> >> >> > Ultimately, assuming the RFC5878 TLS extension gains widespread
>> >> >> support in
>> >> >> > server and client software, CT won't _require_ participation from
>> >> any
>> >> >> CA.
>> >> >> > Each certificate holder will be able to configure their server to
>> >> >> send their
>> >> >> > certificate's CT proof to each client.
>> >> >
>> >> > I see, so the certificate holder can submit their newly-minted
>> >> certificate to a log server to get a CT proof. Instead of requiring the
>> >> participation of every CA, you now require the participation of every
>> >> certificate holder.
>> >>
>> >> No, it is an option.
>> >
>> > I understand that. I was trying to point out that for CT to be
>> > effective, you either need all CAs to participate, or for every CA that
>> > doesn't participate, their customers who want protection have to 
>> > participate
>> > directly. I feel that's a pretty high bar to surmount.
>>
>> Its only software. The process of participating in CT for a server
>> operator is:
>>
>> 1. Run command line tool once, giving it your certificate as input and
>> an SCT file as output.
>>
>> 2. Add one line of configuration to your server config.
>>
>> Not exactly rocket science. If people _really_ find it hard, we could
>> build it into the servers so there was no manual step at all.
>>
>> >> >You might say that not every certificate holder will need or want CT,
>> >> but I would guess that the number that would want the protection would
>> >> be far greater than the number of CAs.
>> >>
>> >> Given that the plan is browsers will refuse non-CTed certs, I imagine
>> >> most holder of certificates used by the public will want CT.
>> >
>> > Do you have agreements with the major browser vendors to do this? It's
>> > possible that not all of them will be on board.
>>
>> In practice, only one major browser needs to participate to give herd
>> immunity. Obviously it would be nice if they all did, but it is not an
>> urgent problem.
>>
>> >> >> > But with participation from the CAs, it should be possible to
>> >> realize
>> >> >> the CT
>> >> >> > dream far sooner.  And (even in a future world where RFC5878 is
>> >> >> supported
>> >> >> > everywhere) if the CA takes care of CT proof distribution, then
>> >> that
>> >> >> makes
>> >> >> > life easier for the certificate holder.
>> >> >> >
>> >> >> >
>> >> >> >> Further, no one has yet brought up the privacy issue. CAs sell a
>> >> lot
>> >> >> of
>> >> >> >> certificates to companies for their internal use. Some of them
>> >> may
>> >> >> object to
>> >> >> >> publishing all their internal domain names.
>> >> >> >
>> >> >> >
>> >> >> > This has been a concern for Comodo too, so I spoke to AGL about it
>> >> a
>> >> >> few
>> >> >> > weeks ago.  AIUI, the plan is that CT clients will have a user-
>> >> >> configurable
>> >> >> > whitelist (empty by default) of domain names for which CT proofs
>> >> will
>> >> >> not be
>> >> >> > required.  Participating CAs should allow customers to opt-out
>> >> from
>> >> >> having
>> >> >> > their certs automatically logged with CT.
>> >> >
>> >> > I believe in your plan each browser will be a CT client. Aside from
>> >> the fact that the white list is an attractive target for hackers, I
>> >> don't see how the average user is going to know how to configure this
>> >> white list. I'm reminded of Adam's arguments against Convergence
>> >> (http://www.imperialviolet.org/2011/09/07/convergence.html).
>> >>
>> >> This is why I think the best solution is to issue private certs
>> >> through a name constrained intermediate which is logged.
>> >
>> > I agree.
>>
>> I'm glad we agree on something!
>> _______________________________________________
>> therightkey mailing list
>> therightkey@ietf.org
>> https://www.ietf.org/mailman/listinfo/therightkey
>
>
>
>
> --
> Website: http://hallambaker.com/
>
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to