Thanks, Rich.  Participants: please send comments/corrections/etc.
to the mailing list.

On 11/2/15 2:38 PM, Salz, Rich wrote:
Certificate Transparency (trans)
IETF 94; 13:00-15:00 Monday 2 November 2015
Chairs: Melinda Shore, Paul Wouters
Minutes by Rich Salz


STATUS UPDATE
--------------------
* milestone review and reset; not great. Initial WGLC date 12/2014, proposed 
now 12/2015.  Gossip 10/2016; threat 7/2016

* open trac issues run-down (Eran) ; 59 comments and 12 tickets closed since 
IETF-93 (mainly via Rob Stradling). Details: 75 wording; 5 and 70 adding 
extensions to STH's; 77 remove client behavior; 96 log metadata not dynamic and 
distribution is out-of-scope; 106 add LogID to STH; 107, make TLS-encodable; 
110 reorganize requirements into separate sections; 105, shrink logid via OID's 
not a hash value (reduces SCT size by nearly a 3rd).
Open tickets divide into three areas: missing functionality (104, 10, 109), "better wording 
required" where there is consensus, but editorial work needs to be done 
(64,76,78,93,94,95,99), technicalities/small issues (81,83,87,102,108,53,97).  Feedback, 
particularly on domain redaction, is wanted.  Bryan brought up STH extensions issue: all extensions 
being signed is problematic if, e.g., the thing being added is an "alternate signature"  
To followup offline.

* implementation news?  OpenSSL is implementing it. Other working on Google ref 
code, want to add STH extensions.


THREAT ANALYSIS
---------------------
  (Steve Kent; not present)  No comments, so ready for WGLC?  Melinda: no, we 
need reviewers. Volunteers include: Eran, Bryan, Rich, Karen.  See Steve's 
slides (in proceedings) for questions about the doc. Will there be an 
architecture document?  Eran volunteered to edit, dkg volunteered to contribute.


GOSSIPING IN CT (Linus Nordberg)
-----------------------------------------
At IETF 93, WG adopted, no major changes to previous mechanisms; better wording 
including rationale.
Policy recommendations.
Issues: STH freshness. Protection of locally-trusted roots? Log misbehavior that is 
privacy sensitive? What is "same domain" for SCT feed back? Define data format 
for trusted auditors?  Various TBD and TODO in the text.
Discussion about what inclusion proof is/contains. Dkg and bryan agree 
embedding them in cert is probably bad idea.

LOG SERVER OPERATIONS
--------------------------------
Karen O'Donahue is interested in operational issues of public log servers. 
Governance model. What do we need to get this deployed more? If you're 
interested, contact her. There was post-meeting discussion about risks, e.g.

POTENTIAL NEW WORK
-----------------------------
* Architecture draft -- see above.

* Logging binary (executable) signatures (Daniel Kahn-Gillmor/Dacheng Zhang) -- update 
from dkg:  various participants including debian, freebsd, python pip, node.js; if you if 
distribute "binary artifacts" contact [email protected]  Right now working on 
identifying common attributes. Early stages. Bryan: what if attacker turns off CT for 
future updates? Dkg: yes, that's an issue, but main goal is to detect unlogged/malicious 
software. Linus: are you protecting mis-use of existing signing keys? Dkg: yes. Paul: 
Fedora is interested. Are other implementations being done to allow this 
(generalization)? Linus, Eran: yes. dkg: No timetable yet for WG ID; if we can come to 
agreement, we'll come to the WG.

* DNSSEC logging (Paul Wouters): Some agreement on what to log, e.g. not A or 
AAAA records, but rather the path. Wes: concern about parent/child relationship 
this doesn't protect that. Paul: not sure, but mostly concerned about domains 
moving across registrars and such. Have to keep every DS record ever seen? 
Poul: share Wes's concerns, there are operational issues similar to key 
rollover.  Wes: useful if married to public suffix list. PHB: I'm interested in 
protecting against attacks from my registrar or registree.  Dkg: Suggest get 
experience by logging the root zone. Stefan: DNS lookup doesn't imply actually 
visiting the site; Paul agrees. There will be a BarBof this week (per Melinda), 
watch mailing list. Paul: draft concentrates on data formats and we now see 
that there important issues to resolve first.

* CT over DNS (Eran): Seeking feedback. Motivation is to preserve privacy for 
inclusion proofs, by not having them go to logs and disclose. New query is TXT 
lookup for base32-leafhash.hash.domain (slide moved too fast). Various TXT 
retrievals walk through the Merkle proof. Server returns as many nodes as it 
can (probably around seven). Also defined TXT query for sth.certid.domain  
Similarly TXT consistency proof query/steps.  Doc in Github repo, to be updated 
shortly. Linus: Will it explode with 100M certs? Eran: no. Wes: how many new 
DNS servers? Eran: we're doing custom server, it's dynamic. Wes: is this DNSSEC 
signed? Eran: probably not needed since the data is signed.

STH COLLECTIVE SIGNING  (Bryan Ford)
-----------------------------------------------
Split multiple authority functions across multiple parties so that single compromise 
doesn't break. This is complementary to gossip. Motivation is clients in tyrannical 
environment where "ruler" has stolen private keys.  Raise the number of keys 
that need to be stolen to a very large number.
CoSi: scalable collective signing. Authority generates statements; witnesses 
countersign in an efficient way. Uses Merkle trees, Schnorr signatures and 
multisignatures. Allows for server failures (assumed rare but not negligible). 
Implementation https://github.com/DeDiS/cothority includes integration into 
Google CT log server (demo shown). Interested in getting more participation. 
Eran: do users need all the witness keys?  Bryan: no, only STH.
Want feedback, too early to have a WG adopted document.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans


_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to