Dmitry,
My fault. The certs with unnecessery permissions are a subject to be Monitored, not Audited.
no problem.

There is a high-level description of the Auditors here: http://www.certificate-transparency.org/what-is-ct:
=====
Auditors are lightweight software components that typically perform two functions. First, they can verify that logs are behaving correctly and are cryptographically consistent. If a log is not behaving properly, then the log will need to explain itself or risk being shut down. Second, they can verify that a particular certificate appears in a log. This is a particularly important auditing function because the Certificate Transparency framework requires that all SSL certificates be registered in a log. If a certificate has not been registered in a log, it's a sign that the certificate is suspect, and TLS clients may refuse to connect to sites that have suspect certificates.
=====
It is not integrated as a part of neither RFC 6962 nor current draft, but it provides a high-level explanation of the Auditors' role.
Until this text is part of an IETF document, it doesn't enter into our discussion :-).

Frankly it seems a bit counterproductive to have a separate site where info about CT is
being posted, while we try to discuss 69269-bis in this WG.

Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to