David,

On Monday, September 29, 2014, Rick Andrews <[email protected] <mailto:[email protected]>> wrote:

    Santosh,

    Since it's not an absolute requirement at this point (either from
    CABF or from individual browsers' policies) I suggest that log
    servers cannot enforce the use of technical constraints in
    intermediate CAs.


We're talking about (non-normatively-specified) monitor servers here, right?
I am suggesting that the checks be mandatory, and that logs perform them, so
that syntactically mis-issued certs don't get SCTs. If getting an SCT based on a pre-cert is supposed to "encourage" CAs to play the CT game, then this helps them
get off on the right foot.
Log servers need to continue to accept based solely on signature validity; otherwise they'll miss misissuance. (So *log* servers will necessarily be agnostic about this.)
I disagree. Once Ben said that he meant mis-issuance to be interpreted in a much broader context, and cited EV cert requirements as an example, I pursued documenting what that would mean. If the WG wants to say that mis-issuance is more than issuing a cert to the wrong Subject, then
we need to say just what it is, not hand wave.

Also, log servers, per se, do not detect mis-issuance, unless we have them perform the checks I suggested. What I think you meant to say is that if log servers reject syntactically mis-issued certs, then these certs will not be subject to analysis by Monitors. That's true, but there seems to be an inconsistent argument in play. If one argues that TLS client will, eventually, reject c erts that do not contain (or are not accompanied by) SCTs, then having logs reject syntactically
mis-issued certs is a good thing.

If we agree that the CABF guidelines for Web PKI CAs are the best reference we have for this (which seems reasonable for the Web PKI context), then why not enforce them? Having logs do the checks has the advantage that CAs get immediate feedback when they don't get it right at
this basic level.

Monitors, I think, should focus on detecting semantic mis-issuance for the Subjects that they serve. Not every Subject may arrange to have a Monitor protect its name and key binding, and not every Subject will perform monitoring for itself. So, if logs perform the basis, syntactic checks, we get that level of coverage for a lot of Subjects, without having to require them to perform or arrange for Monitor functions. Again, this is analogous to the argument that has been made for pre-certs, i.e., forcing a CA to embed an SCT into a cert avoids relying on Subjects to upgrade their web software to pass a post-issuance SCT during the TLS handshake. if that is a valid argument for why we're using the rather complex pre-cert mechanism, it seems that my
argument for log checking of cert syntax is equally valid.

Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to