Matt,

Fair question. If attribution is not possible, because we choose to not require chaining to a root accepted by the log (as currently called for) then the attack analysis will be updated to reflect this loss of security functionality in those
cases.

Note that my proposal to allow (not require) logs to perform syntactic checks, and to note the result of such checks, is compatible with logs that choose to not perform even basic path validation. It would be another class of (non) checks that can be registered in the proposed IANA registry and reported by a log. Also, if basic path validation is not performed, a log should advertise that, just as it should advertise the set of root CAs that it does check. This allows Monitors and clients to know what the log says it is doing, so that others do not have to guess
or learn by some unspecified, OOB means.

I suggest another registry entry for logging self-signed certs will make sense
too, if 6962-bis stops excluding them.

Steve


    Is attribution critical for the core functionality of CT?  (I know this goes
    back to the "purpose of CT" thread that Stephen's done a lot of work
    defining, and I've got to get around to participating in that thread)  While
    I agree that the remediation mechanisms available increase if you know which
    root CA to hassle to get a cert revoked, knowledge that a cert was issued
    still has *some* value, even if there's no clear indication of who issued it
    (in a fanciful future of infinite storage, where self-signed certs were
    accepted in logs).

    - Matt


_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to