We've posted a followup blog post:

Certificate Transparency’s improved gossip protocols show promise

https://blog.okturtles.com/2015/03/certificate-transparencys-improved-gossip-protocols-show-promise/

I also updated our previous blog post to make a note of this new information.

Great work folks. 👍

Cheers,
Greg

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

On Mar 27, 2015, at 4:56 PM, Tao Effect <[email protected]> wrote:

> Dear Paul,
> 
> This is fantastic news. Great work list!
> 
> I am working on a new blog post on this topic to post to the okTurtles blog 
> and am getting ready to publish it.
> 
> If you (or anyone else on this list) would like to proof read a draft of it 
> before it's published (sometime today, or tomorrow at the latest), please 
> contact me off-list at this email.
> 
>> Yes, but I'm sure the authors would love to received improved text for this 
>> section of the document.
> 
> I'll see if I can come up with something. :)
> 
> Cheers,
> Greg
> 
> --
> Please do not email me anything that you are not comfortable also sharing 
> with the NSA.
> 
> On Mar 27, 2015, at 3:36 PM, [email protected] wrote:
> 
>> On Fri, 27 Mar 2015, Tao Effect wrote:
>> 
>>> To illustrate:
>>> A = server's real certificate
>>> B = malicious MITM certificate
>>> T1. Client receives A.
>>> T2. Client receives B, sends back A.
>>> T3. MITM pretends to leave, sends A. Client sends B.
>> 
>> T3 cannot happen. The draft states:
>> 
>>   SCTs and corresponding certificates are POSTed to the originating
>>   HTTPS server at the well-known URL:
>> 
>>   https://<domain>/.well-known/ct/v1/sct-feedback
>> 
>> This means you must have a valid TLS connection to send the data. As
>> long as the attacker does not have the private key of the attacked
>> web server, this cannot happen.
>> 
>>> So, my question is: does your document properly take that into account and 
>>> state that the data sent in 3.1.3 *must* be sent after a
>>> fully encrypted TLS connection has been established?
>> 
>> Yes, but I'm sure the authors would love to received improved text for
>> this section of the document.
>> 
>>> P.S. FYI Paul, any time I CC your email I get a bounced "Undelivered Mail" 
>>> response:
>>> 
>>>      Final-Recipient: rfc822; [email protected]
>>> Original-Recipient: rfc822;[email protected]
>>> Action: failed
>>> Status: 5.1.1
>>> Remote-MTA: dns; 193.110.157.102
>>> Diagnostic-Code: smtp; 550 5.1.1 <[email protected]>: Recipient address
>>>    rejected: User unknown in local recipient table
>> 
>> Sorry about that. I added an alias to fix it. (my home DSL is down so
>> mail is rerouted temporarily, and I'm far from home)
>> 
>> Paul
>> 
>> _______________________________________________
>> Trans mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/trans
> 
> _______________________________________________
> Trans mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/trans

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to