Something that is rather difficult to prove, at present, is that a
certificate has been used after it has expired or been revoked.

If servers were required to include a signature over a recent STH (or
STH+OCSP staple) along with their SCT, this would provide an easy way
of showing that a *server* was behaving incorrectly. E.g., as a TLS
extension:

struct {
  STH;
  sign(SignedCertificateTimestamp || OCSP || STH);
} FreshnessProof;

This seems rather better than signing a timestamp; the STH isn't
predictable without a colluding log, so it isn't possible to
"accidentally" sign a future time.

Any thoughts?

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to