Ben,

...

This is true even if you use hashes, surely? For example, an old key (from a log no longer known to someone) could be reused. Or a key for a log that was never used publicly. Or the same key could be used for two logs accepted by different clients. And so on.

I would expect a Monitor to keep track of the public key for each log operator that it watches, (but that should be stated explicitly). Thus re-use of an old key by that log operator, for a new log instance, would be detected easily if the log ID were derived from the public key. The most common case, if the re-use is accidental, is probably starting a new log instance but not remembering to change the key. That would
be obvious/impossible if the ID were derived from the key.

However, I agree that a log re-using a key from some other log would not be
detected by this approach.

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to