There are two types of log metadata. Some if the data is analogous to trust anchor info and thus distributing it to TLS clients using the same (not standardized) browser vendor mechanisms makes sense. (This does, though, raise an issue about how non-browser client acquire this info; Monitors and Auditors are not necessarily products of vendors and thus there may not be the same infrastructure to distribute this sort of data.)

Other log metadata (e.g., MMD and STH frequency) is less like trust anchor info and it could be distributed by having a signed, time-stamped data structure posted at a known location associated with the log. A potential benefit of this model is that a log operator can know that if it changes these parameters, all clients are able to acquire the new info at the same time. If one relies on an unspecified distribution mechanism for these parameters, a log operator cannot know when all clients have received the new info. That uncertainty might cause operational problems. So, the title for this issuer is not really whether ALL
metadata should be dynamic, but rather whether some of it should be.

Steve
#96: Metadata: Should it be dynamic?

Changes (by [email protected]):

  * milestone:   => review


Comment:

  We've already discussed this, I feel sure, and the general point is that
  allowing logs to manipulate their own metadata is dangerous, as you state.
  That's why the I-D says its distribution is out of scope.

  As you know, in practice, Chrome defines its own log metadata, and that is
  what clients use. I imagine this will be the general pattern.

  I propose this is resolved as wontfix.


_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to