Rob,
On 01/10/14 16:05, Stephen Kent wrote:
<snip>
Rick,
<snip>
Still, your point is a good one.  We could push the syntax checking back
to Monitors, but then we loose the ability to provide immediate feedback
to CAs that are issuing syntactically malformed certs. I'll have to think
more about this issue.

Stephen,
The "ability to provide immediate feedback to CAs that are issuing syntactically malformed certs" sounds like a nice idea, but surely this could be implemented as a stand-alone application or web service?
Why would you want it to be an intrinsic part of CT?
The motivation for making it part of CT arose when Ben explained that his definition of mis-issuance included syntactic constraints from the CABF context. The notion that immediate feedback is desirable is consistent with the overall CT goal of forcing CAs to do something by threatening
that there certs will be rejected by browsers, only translated to logs :-).

Still, your argument that logs ought not reject certs that fail to meet syntactic criteria, so that all TLS clients can benefit from detection of mis-issued certs detection via
examination of logs, is compelling.

I have a suggested solution:

    - require a CA submitting a pre-cert to assert one of the following:
1. no assertion is made wrt syntactic conformance to CABF guudelines
        2. the cert conforms to DV Guidelines <insert guideline version>
        3. the cert conforms to EV guidelines <insert guideline version>

- require a log to include the CA assertion in its SCT, along with one of the following:
        1. this log does not check cert syntax
2. this log cannot check the specified CABF Guidelne version asserted by the CA 3. this log checked the cert against the CA's assertion and it passed 4. this log checked the cert against the CA's assertion and it failed

This would seem to address the concern that rejecting (not logging) a submitted cert is worse than logging a bad cert. It also addresses the concern that Rick mentioned, i.e., a mismatch between what Guideline version a CA is using vs. what a log can verify. It does not require that every log perform ANY syntax checking, and it lets Monitors and clients know whether a log has elected to no perform such checks. It also tells a Monitor which set of cert syntax rules the CA says it is enforcing, so that the Monitor can perform the checks. If the log doesn't perform checks, or is unable to check a specific version of the syntax checks, the Monitor can step in do so. The Monitor also can double check the log, to detect logs that are not doing the checks properly, e.g., because of errors, compromise, or conspiracy. This provides Monitors and clients with additional info when choosing which logs
to use.

Would this mechanism address your concerns?

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to