Matt,

Thanks for the review and comments.


2.1.1.2. Malicious or conspiring log

   In this case, the bogus (pre-)certificate has been submitted to one
   or more logs that are either simply malicious or are conspiring with
   the attacker. It is assumed that the logs issue SCTs (in an attempt
   to fool browsers and/or Monitors). In this context, a log probably
   will suppress a bogus certificate log entry. (This case encompasses
   the scenario in which a log creates an entry for the certificate but
   reports it selectively.)
Do you have any thoughts on what a "simply malicious" log might look like,
behaviourally speaking?  Is there a way to differentiate, from the outside,
whether a log is "simply malicious" or "conspiring"?  Do we even care that
there's a difference?
probably not. we'll avoid making the distinction in the next rev.
I wonder if it would be clearer to stick to observed behaviour, rather than
motivation?  So, rather than talking about a "simply malicious" or
"conspiring" log, say instead something like, "a log which does not
faithfully report all submitted entries, and/or presents different views of
the log to different observers".
the text above seems like a good way to characterize bad log behavior.
we will still include comments about motivation (that's a common aspect
of a threat model), but I agree that externally observed behavior is the best
way to characterize this.
   Note that a malicious log also could create and report entries for
   bogus certificates that have not been issued by the indicated CA.
   These could cause the Monitor to report non-existent semantic
   problems to the Subject who would in turn report them to the
   (apparently) issuing CA. This might cause the CA to do needless
   investigative work or perhaps incorrectly revoke and re-issue the
   Subject's certificate.
How is a malicious log going to be able to report bogus certificates?  The
closest a malicious log could come is to whack together a cert chain that
has the same issuer names, etc, but that won't validate to the CA's *actual*
root certificate.  Is the point of this section, then, to indicate that
reporters of bogus certificates (or the CAs that receive them) should
validate the cert chain before taking action?
good point. There has been some ambiguity about whether every log will always
verify complete cert chains to one of the roots it accepts, in part of the
question of what level of cert path processing one can expect of a log. If we're clear that (good) logs will do this, always, then creating a bogus log entry for a cert
will mark a log as misbehaving. In that case, checking the cert chain for a
log entry will detect such misbehavior. We'll add text to this end. Thanks.
>From Note 5:

   Absent a  ''gossip'' mechanism that enables Monitors to verify that
   data from logs are reported in a consistent fashion, CT cannot claim
   to provide protection against logs that are malicious or may
   conspire with, or are victims of, attackers effecting certificate
   mis-issuance. Developing such a mechanism is not easy. The mechanism
   SHOULD protect the privacy of users (with respect to which web sites
   they visit). It needs to scale to accommodate a potentially large
   number of self-monitoring Subjects and a vast number of browsers (if
   browsers are part of the mechanism). Even when a gossip mechanism is
   defined, it will be necessary to describe how the CT system will
   deal with a mis-behaving or compromised log. For example, will there
   be a mechanism to alert all TLS clients to reject SCTs issued by
   such a log? Absent a description of a mitigation strategy to deal
   with mis-behaving or compromised logs, CT cannot ensure detection of
   mis-issuance in a wide range of scenarios.
This doesn't seem so much an issue of threat model, as it is a commentary on
the current state of CT, and I don't think it belongs in this document.
I agree that this note is not in the same style as most of the rest of the
analysis. However, I am concerned that we don't have agreement on how a gossip
mechanism can work, while meeting legitimate privacy concerns and the larger
goals ascribed to it. So I think it's appropriate to retain this note for now, as a reminder of what needs to be addressed as part of the overall CT architecture.
I have analogous comments, elsewhere in the doc, that mention the issue of
the role of browsers in CT and the problem of incremental deployment. The same
arguments probably apply to those comments.

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to