On 05/08/14 10:56, Eran Messeri wrote:
No, there are also monitor implementations in C++ and (partially)
python, log clients in C++, python and Java, as well as a TLS client in C++.

There's also plenty of test data for rfc6962 implementations.

While we're at it, there's another implementation in Chromium of SCT
deserialization and validation, using NSS (vs. OpenSSL used in the
open-source repository).

Talking of SCTs and OpenSSL...

The OpenSSL_1_0_2-stable branch already has code to parse and view RFC6962 SCT Lists embedded in certificates and OCSP responses. Right now I'm frantically coding extra functionality, such as SCT signature validation, in the hope of getting this into the initial 1.0.2 release.

Thanks for the "OpenSSL used in the open-source repository" tip, Eran. I'll check this out right now. It may save me some time. :-)

On 4 Aug 2014 18:55, "Fabrice Gautier" <[email protected]
<mailto:[email protected]>> wrote:

    On Thu, Jul 31, 2014 at 6:36 AM, Ben Laurie <[email protected]
    <mailto:[email protected]>> wrote:
     > On 30 July 2014 17:13, Melinda Shore <[email protected]
    <mailto:[email protected]>> wrote:
     >> During the session last week I was a bit surprised by the number of
     >> people saying that they were doing implementations, and I think it
     >> might be useful to get a better handle on that.  If nothing else, it
     >> helps quite a bit during the publication process if it's known
     >> that there are interoperable implementations and that we know a
    little
     >> bit about them.
     >>
     >> So, I'd be grateful if people who've are working on implementations
     >> and who can discuss them publicly could speak up, let us know the
     >> status and whether or not you'll be releasing source, and provide a
     >> pointer to a repo or other documentation if you're able.  Also let
     >> me know whether or not you'd be willing to have your implementation
     >> mentioned on a wiki page listing implementations.
     >
     > Obviously(?) Google has an open source implementation here:
     > https://github.com/google/certificate-transparency.

    My understanding is that this is only an implementation of a CT log,
    am I correct ?


     > We also have two internal production implementations, both of which
     > share as much code as is feasible with the open source. No current
     > plan to release source that is not already released.
     >
     > Feel free to mention them on a wiki page.
     >
     >>
     >> Thanks again,
     >>
     >> Melinda
     >>
     >> _______________________________________________
     >> Trans mailing list
     >> [email protected] <mailto:[email protected]>
     >> https://www.ietf.org/mailman/listinfo/trans
     >
     > _______________________________________________
     > Trans mailing list
     > [email protected] <mailto:[email protected]>
     > https://www.ietf.org/mailman/listinfo/trans

    _______________________________________________
    Trans mailing list
    [email protected] <mailto:[email protected]>
    https://www.ietf.org/mailman/listinfo/trans



_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

COMODO CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender by replying to the e-mail containing this attachment. Replies to this email may be monitored by COMODO for operational or business reasons. Whilst every endeavour is taken to ensure that e-mails are free from viruses, no liability can be accepted and the recipient is requested to use their own virus checking software.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to