Ben,
On 1 July 2014 18:34, Stephen Kent <[email protected]> wrote:
Ben,
...

As you point out, the log can relax validation rules, which deals with
this problem (and we do, indeed, do that in our implementation).
My comments noted that relaxing rules in an unspecified fashion creates
potential
problems for those submitting pre-certs. The specific changes needed to
enable
acceptance oif pre-certs need to be spelled out.
Hmm. What we do is check the signatures validate all the way up the
chain. That's it. I'm not sure we need anything tighter than that, so
I guess we could specify that?
Ok, that's what _you_ do, but 5280 describes a long list of cert path validation rules and your doc just says that these can be relaxed. It does not prohibit a log from performing the full set dictated by PKIX and X.509 path validation procedures, nor does it provide guidance of which subset SHOULD/MUST be performed. Absent such guidance different log operators can legitimately perform different checks, resulting in chaos.

CAs that randomly generate serial numbers during issuance can't
pre-generate
serial numbers to be used in the TBScertificate, then subsequently in the
final certificate. Is the serial number *that* important that it MUST be
included in the SCT?  The issuer for the TBScertificate does not match
the
value of the certificate that signed it, so what's the point of the
serial
number?  The CN, SAN, signing algorithms and keys are the most critical
components.  Can we limit the SCT to these values?
Serial numbers are used for revocation, so we need to know what they are.
I understand the desire to have the serial number be submitted as part
of the pre-cert, but the problem raised by Doug is a valid one that
cannot be ignored.
My response is that, yes, the serial number is *that* important that
is MUST be included in the SCT.
If we had a agreed-upon requirements doc that explained why the serial number is critical, and if it discussed the impact on CAs that may use serial number management techniques that preclude pre-determining the serial number assigned to a cert, then we would be in good shape. But we don't. So, I think we may have a serious problem
with this aspect of the precert model.
...
The burden on fixing it is not on Doug; it is on the authors of the doc!
Our position is that compliant CAs _can_ use Precertificate Signing
Certificates - though possibly not with the exact toolchain they use
to issue certificates. If someone wants to propose a mechanism that is
compatible with whatever restrictions their s/w imposes, we'd be happy
to consider it.
"Compliant" with what set of specs? I noted an aspect of a design for a CA-focused HSM that, for several years, was used by VeriSign to issue every cert. It is a powerful feature for high assurance cert issuance. It is also incompatible with the precert design. The precert design seems to preclude use of some approaches to serial number management that may reduce CA secruity. Thus it appears to be a tradeoff, one that this WG has not
discussed. Please describe what you mean by a "complaint" CA.
Ben, it's not reasonable to tell CAs that their extant serial number
management
mechanism has to change to accommodate the CT design. It is the
responsibility
of the CT designers to figure out how to accommodate valid CA operation
models.
I don't agree. If things have to change in order to achieve the agreed
goals, then they have to change. It is not our obligation to preserve
the world in its current perfection.
Agreed goals? As I noted, this WG does not have a agreed-upon set of requirements. We have an experimental RFC (that does not appear to have been carefully reviewed prior to publication, not unreasonable for an experimental RFC, but ...) as a starting point. The RFC identifies 3 different ways to convey SCTs. One of these appears to be problematic. So, maybe it's time to discuss why there are three ways to deliver
SCTs, and why the precert method is critical.
The serial number is required to fulfil the purpose of CT. If you want
to not have serial numbers in the log, then we must also change the
revocation mechanisms.
I don't recall the doc mentioning revocation as a remediation mechanism. On this list someone suggested that CT is a reputation mechanism, and one might infer that the primary remediation mechanism is shaming CAs into submission. If we had an architecture doc, not just a description of a set of mechanisms, we would not have to guess what aspects of CT are critical and agreed upon by the WG (not just the document authors).

Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to