Dimitry,

Stephen,

thank you for the formal description of treat model.

But I think that the Auditors should be mentioned in it too. If I am not mistaken, they are designed to watch the certificates with suspicious properties (CA permissions, etc.).

So the treats which are to be avoided using the Auditors seems to be missing.is case, the CT mechanisms have detected mis-issuance, but are not able to remedy the problem. (See Note 4 below.)

In 6962-bis (-04) the definition of the Auditor function is:

Auditors take partial information about a log as input and verify

that this information is consistent with other partial information

they have.


This is way too vague to be meaningful. So, I agree that an Auditor might be relevant to the attack analysis, I didn't include it this time because there is not a sufficiently detailed description of its functions. The examples of what an Auditor "can" do don't mention checking cert content against a set of criteria. They focus on detecting log inconsistencies. So, maybe Auditors should be mentioned in the discussion of detecting
log misbehavior.

Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to