Melinda,

#76: Normative client behavior specified in Section 3.4

Changes ([email protected]):

  * owner:[email protected]  =>
      [email protected]
  * status:  reopened => new


Comment:

  Propose this ticket be closed (fixed) as we've added the following text
  (section 9.2):
  "However, specifying the TLS clients' behavior once compliance or non-
  compliance has been determined (for example, whether a certificate should
  be rejected due to the lack of valid SCTs) is outside the scope of this
  document."
I think the wording here is still imprecise. For example, the text in 9.2
says "TLS clientsMUST reject SCTs whose timestamp is in the future." But
this, combined with the text above, does not say that a TLS client SHOULD
treat a cert as invalid is it contains (or is associated with) an SCT that
is "rejected." Is this ambiguity intentional? Also, the term "compliance" seems
needlessly vague here.

My colleagues plan to post a proposed client requirements spec (focusing on
browsers and browser vendors) later this week. It tries to be more explicit
about this and other client behaviors (required and optional).
  I also think that the text on SCT validity is quite clear:
  "TLS clients SHOULD validate each SCT by computing the signature input
  from the SCT data as well as the certificate and verifying the signature,
  using the corresponding log's public key."

  So not sure what can be added, unless Steve Kent points to the problematic
  wording in draft 10.
The following problematic comments re client behavior (wrt SCTs) appear in -10

   The intent is that eventually clients would refuse to honor

certificates that do not appear in a log, effectively forcing CAs to

add all issued certificates to the logs.


   TLS clients can thus requirethat all

certificates they accept as valid are accompanied by signed

timestamps.



Sincecertificates may not be accepted by TLS clients unless logged ...

   In addition, if TLS clients will not accept unlogged certificates ...

   certificates that have not been publicly logged, and thus

do not have a valid SCT, are not considered compliant (so TLS clients

may decide, for example, to reject them).


------------------------------------------------------------------------


These statements do not literally mandate client behavior, but they

expressing intent which could easily be interpreted as client behavior
specs.


Steve

------------------------------------------------------------------------
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to