Eran,

On Thu, Jan 8, 2015 at 7:49 PM, Stephen Kent <[email protected] <mailto:[email protected]>> wrote:

    I have a few questions/comments about the set of proposed ticket
    closures:


    #37 - Are the gossiping clients discussed by this ticket just
    Auditors and Monitors, or
    does it apply to TLS clients as well?

Yes. Do you find it necessary to explicitly state that?
yes, I do. Gossiping among Monitors and Auditors seems more realistic than gossiping among TLS clients. The former are (presumably) a much smaller set of entities than the latter, and may be well known, making it credible that they may choose to communicate.

    Also, if gossiping is addressed in a separate set
    of docs, does that mean that 6962-bis will make only minimal
    mention of it? That seems
    appropriate since until those specs are completed and approved, on
    cannot attribute
    any security features to gossiping, right?

 Correct - let's break this to two:
(1) How clients can compare instances of Signed Tree Heads.
(2) The security features that are achieved by comparing instances of STHs.
6962-bis makes only minimal mention of gossip in relation to (1).
Regarding (2), rfc6962-bis can only point out the overall benefit of comparing STH instances (and it does), but the exact security benefits depends on the mechanism used for (1).
My reason for posing this question is so that I can accurately update the attack analysis that I posted previously, and that I hope will be part of 6962-bis. Since gossiping is not being specified yet, this means that some attacks that would have been detected will now be described
as successful.
FYI, the text diff is here:
https://github.com/google/certificate-transparency-rfcs/commit/52b15187c291a9a9e4aa2fa7146693d7487899f4


    #15 + #38 - For what range of clients is behavior not being
    specified? My recollection from
    the IETF meeting was that the discussion focused on TLS clients,
    not Monitors or
    Auditors, but the ticket closing comment is not clear on this
    point. Also, is it useful
    (vs. confusing) to discuss possible client behaviors in this doc,
    yet mandate none? I don't
    recall this issue (what to say about client behavior if we mandate
    none) being discussed
    ion detail on the list.

(1) Client behaviour is mostly not specified for TLS clients, which, as you correctly point out, was the topic discussed during the IETF meeting. Regarding monitors, given that there's benefit to the community even from partial monitors, I do not think it's reasonable to require a monitor to do *all* the things described in 6962-bis to be compliant, but point out the useful operations a monitor can perform and how it can do them.
Again, my reason for posing this question is to enable updating of the attack analysis. First, I'm not sure what a "partial" Monitor is. In my description of the function, a Monitor looks for certs in logs relative to a set of client-specified criteria. So, no Monitor is expected to examine ALL certs being logged on behalf of everybody. Second, I think I suggested that each Monitor advertise the set of logs that it examines, so there is also no expectation that every Monitor examines every log. So, if one adopts these definitions of what a Monitor does, what is a "partial" Monitor? If you think these definitions aren't appropriate, please offer concrete, alternative text, so that we have a common basis for discussing Monitor behavior.

If we just describe "useful" operations for Monitors, then an attack analysis can't be accurate in describing what benefits Monitors confer. I'd argue for being more precise in describing a minimal set of Monitor functions that every Monitor MUST perform, and then note additional, optional operations, if necessary. The two I-Ds that Rick and I authored, on checks to be performed for DV and EV certs, follow this model. If 6962-bis adds text of the sort I proposed, calling for a submitter of a (pre-)cert to state what sort of cert it is, then one can defer the spec of Monitor (and optional log) checking to the ancillary docs for each cert type.

(2) I think it's useful to point out the possible situations a TLS client my find itself in, so we have common terminology when we discuss client behaviour. It was not discussed on detail on the list but different aspects have been brought up in the last IETF meeting and on several tickets.
I'm not sure what "situations" means here; please elaborate.


    #40 - I don't recall seeing an explanation by the editors about
    why they have decided
    that "stand-along auditing isn't likely to happen." Absent such an
    explanation, and WG
    concurrence, it seems that closing this ticket is premature.

Is "based on experience from deploying RFC6962" a valid explanation? :)
not for me ;-).
In my opinion this section in RFC6962 was not clear and Ben added (in-person) that his intent was never to have a stand-alone entity that only does auditing, but that it is something that each participant in CT could do. The original section in RFC6962 contained a bit of both, so we cleared it up to indicate what are the auditing operations each participant can do.
Is a "participant" a client or is this a new, more generic term?


    #42 - Since this is a ticket I submitted, let me say that I don't
    think the
    adverb "overly" is appropriate ;-). My concern is that the text
    didn't provide an
    algorithmic way to determine when a submitted (pre-)cert with a
    redacted SAN was
    "dangerous" and ought not be accepted. Also, the issue was not
    whether a single entity
    controls the name space covered by the redacted name; it's whether
    the CA submitting the
    pre-cert controls that space. Finally, if we are not specifying
    how any client (TLS or Monitor)
    makes use of this feature, why is it part of the spec? Unless we
    have an agreed-upon set of
    rules for how to use redacted certs, we are adding complexity to
    6962-bis without identifying
    any benefits.

(1) to the best of my knowledge, detecting when a wildcard in a SAN is "too wild" is not specified anywhere, other than the CA/Browser Forum BR, and that is an equivalent problem. That's why I don't think it's appropriate to try and specify it here.
I see your point, but disagree. Yes, the use of wildcard DNS names in certs is analogous, to the redacted cert issue for pre-certs. But, as Rob noted in his message, the semantics are not identical. This is new, a CT-created topic. The CABF defines (for DV certs) the criteria to be used by a CA when a Subject requests a wildcard cert, and that spec is more detailed than what the most recent version of 6962-bis says. You seem to be saying that the IETF has no RFC for what constitutes appropriate checks for issuing a wildcard cert. Yes, that's true, but since we have no standards for ANY Web PKI cert issuance, this seems like an irrelevant observation ion this case. We're creating a new opportunity for bad things to happen, so why do we get a pass on addressing the security issues that arise? The CABF DV cert BR describes (11.1.3) the checks that a CA is supposed to perform to ensure that the Subject of such a cert controls the affected DNS subtree (and the EV spec prohibits wildcards). This is an appropriate statement because it is describing a procedure to be followed by a CA. But, in CT, CAs are not trusted, and the goal is to enable clients (of all sorts) to detect mis-issued certs. I don't think we can rely on a procedural statement for a CA to use here. 6962-bis needs to be more specific about what clients (at least Monitors, if we punt on requirements for TLS clients) are supposed to do to detect bad redacted certs. If we describe Monitor behavior, then at least we can justify the text by saying what a Monitor does when
checking logs of redacted certs against cert info for its clients.

(2) This falls into the TLS client behaviour specification - we'll point out this situation but it's up to the client to decide what to do with such a certificate.
Also Monitor behavior, as noted above.


    #43 - If key rollover is not supported, then the "freeze and begin
    a new one" process
    needs to be documented in detail. This description must describe
    how clients of the old
    log become aware of the transition to a new log (to avoid false
    positives).

Acknowledged - this will be described in the metadata section I intend to add.
great.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to