Deb,

Thanks for reading the doc and providing comments prior to our next planned rev.

My responses are inline below.

Steve


All,

This is my first post on list ever, so be gentle :)

General: This is actually an attack model with an analysis of detection and consequence. Perhaps the name could be changed to reflect that.

I agree. We'll change it for the next rev.

General: 2.2’s outline should follow 2.1’s outline. Move ‘Malicious or conspiring third party Monitor’ to section 2.2.1.3 and remove it from 2.2.1.1.3 and 2.2.1.2.1. It may be complete either way, but it is more likely to look complete if it is symmetric.

We'll try to better align the outlines between 2.1 and 2.2. But, because the CA assummptions differ, it may not be possible to make the outlines completely parallel (without introducing redundant sections that may make reading harder in a different way). We'll review the placement of 2.2.1.1.3 and 2.2.1.2.1 in the context of outline realignment.

General: Remove the references to the Notes in Sections 2 and 3. They will stand alone.

do you mean the notes will stand alone? I agree that the notes can stand alone, but I worry that folks reading the sections that now contain those forward references may not tie them back to
the relevant sections without the forward references.

Section 2.1.1.1.1:  Change to:
“If a Subject is tracking the log(s) to which a certificate was submitted, and is performing self-monitoring, then it will be able to detect a bogus (pre-) certificate and request revocation. In this case, the CA will make use of the log entry, supplied by the Subject to determine the serial number of the mis-issued certificate, and investigate/revoke it.”

We'll make the suggested change.

Section 2.1.1.1.1, 2.1.1.1.2, 2.2.1.1.1, 2.2.1.1.2 : Make the “If there are many logs, it may not be feasible for a Subject to track all of them” a note in Section 4 (it is sort of Note 1 currently).

we can add text to state this potential problem, in the indicated sections. However, it is the Monitor function that tracks logs. Only when a Subject self-monitors is the specific text you cited correct. So, we'll substitute Monitor for Subject in your text, OK?


Section 2.1.1.1.2: Change this in a similar manner to 2.1.1.1.1, for the same reasons.

OK.

Section 2.1.1.2.2: How will gossiping detect this? The Log owner issues the SCT, but doesn’t actually put the certificate into the log. How is this detectable by gossiping? Not like an attacker is going to submit that certificate to multiple logs. He just wants the SCT.

I based this comment on the projected capabilities of a gossip mechanism, the details of which are yet to be agreed upon. I think the notion is that multiple Auditors query log(s) to determine if the returned log entries and STHs represent consistent views. I'll try to generate some better
text here, and to discuss the Audit function in the intro, to help clarify.


Section 2.1.2: Does the 3rd party monitor have a role in the case where the certificate isn’t logged? Should that fact be stated? Perhaps a sentence to that effect in Section 2.1.2.3 would be in order?

When a cert is not logged, no Monitor, even a self-monitoring Subject, will detect issuance of a bogus cert based on Monitor functions. That's what this section is intended to convey, but we can
try to improve the wording.

Section 2.1.2.1: Either remove the last sentence in the parenthetical, or work it into the paragraph without the parenthetical.

OK.

Section 2.2.1.2: Add a section on Self-monitoring Subject and a section on benign third party Monitor.


Section 2.2.1.1.3 and 2.2.1.2.1: Combine these into Section 2.2.1.3 called malicious or conspiring third party monitor.

I don't follow your comment above. it doesn't match the outline for section 2.1. I think 2.2.1.2.1 should be subsumed under 2.2.1.2, but 2.2.1.1.1 seems appropriate as an enumeration
of cases under 2.2.1.1.


Section 3, Syntactic checks: We need to think about whether this makes sense. This paper gets much simpler w/out it. Currently not included in rfc6962bis.

6962bis failed to define what a mis-issued cert is, even though the term is the focus of the CT effort. When I asked Ben about this last year I initially thought that only bogus certs (as we now define them) were mis-issued. But, Ben stated that a failure to adhere to the DV or EV cert profiles would be considered mis-issuance for certs of that genre. I agree that this should counted as mis-issuance, and if we intend to expand CT beyond Web PKI certs, then syntactic mis-issuance is even more important. That's why we have two candidate syntactic cert profiles posted, and why I proposed a mechanism to allow a submitter to declare what type of cert is being submitted to a log. I also suggest that logs be allowed to optionally check submitted (pre-) certs against an declared type, perform appropriate checks if they
can (and are willing) and record the results in the SCT.

Section 4, Notes: These are issues that will need to be addressed. I would make a more descriptive name and keep them numbered.

OK. We'll add more text for each note and use outline numbering for them.

Section 4, Note 1: Make this two items. First: How are new logs discovered by monitors? Second: how does a subject know which logs the monitor is checking?

Good point. we'll do that.
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to