Rick, thanks for raising this. I agree that we need to make the PRIVATE option work in these scenarios. As it happens, I mentioned this to Ben just before the trans meeting last week.

My suggestion is that we should permit both Certificate SCTs _and Precertificate SCTs_ to be delivered via OCSP Stapling and the TLS Extension.

There's no reason why a Precertificate couldn't be issued _after_ the corresponding Certificate has been issued! :-)

Would this work for you?


Slight complication...
In the SCT v1 format, entry_type is "implicit from the context in which the SCT is presented."
So, for the above idea to work, we would need to either:
  i) Define SCT v2, in which entry_type is expressed explicitly.
  or
ii) Define a CtExtensions extension to carry the entry_type explicitly in a v1 SCT.
  or
iii) Expect TLS Clients to attempt to verify v1 SCTs sent via OCSP Stapling or the TLS Extension twice (first time, assume entry_type is "x509_entry"; if the SCT signature doesn't verify, try again, this time assuming entry_type is "precert_entry").

On 10/03/14 18:58, Rick Andrews wrote:
Regarding Issue #1: _http://tools.ietf.org/wg/trans/trac/ticket/1#_
“Need options for avoiding logging private subdomains”, I think the
design is not yet complete.
I understand how this works when my customer has chosen the precert
delivery option (I mask the second level domain in the precert that I
send with the add-pre-chain command).
But if my customer has chosen to deliver SCTs via OCSP staple or TLS
extension, and they want to keep their subdomain private, what do I do?
I’m going to sign the cert without SCTs in it, but if I log it via an
add-chain command, the subdomains will be visible in the log.
-Rick

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to