Ben,



On Fri, 13 Nov 2015 at 17:13 Stephen Kent <[email protected]> wrote:

    Ben,

    Section 10 of 6962-bis-10 says:

        Ifnecessary, the new log can contain existing entries from the
        frozen

        log, which monitors can verify are an exact match.


    To me, this suggests a connection between and old log a a new one, so
    they don't seem to be completely independent, as you suggest. But,
    I see
    you point that a new log will have new metadata and the fact that
    it has
    any ties to the old log is largely irrelevant (other than the somewhat
    mysterious comment above).

I think it was more an observation that if you make the claim "log Y contains all of log X" someone should probably check. :-) Standardising that kind of claim seems a little pointless because there are an infinite number of related claims (e.g. "log Y contains all of log X up to entry N" or "log Y contains all of log X except certificates of type T") and reasons for making them.
So the text in question should me omitted since there is no way for a log to make
the claim in a standard fashion? I'm OK with that change.

    There is a need to make available the metadata
    for each new log to all log clients. The issue of alg agility for
    log metadata
    is addressed via that mechanism (which seems to be unspecified).


    So, I agree that this issue can be closed, if Section 10 is
    revised to explain
    what I noted above.


OK. You might want to update the ticket so we don't lose this!
Here is suggested text for Section 10 to address this issue:

   The term "algorithm agility" refers to mechanism and procedures that
   enable
   use of different sets of algorithms within a protocol or system. It
   also often
   encompasses the transition from one set of cryptographic algorithms
   to another,
   in a fashion that avoids service disruption.

   All of the cryptographic algorithms defined for use with CT are
   represented as log metadata.
   None of these algorithms can be changed for an extant log. When a
   new log is created
   the log operator MUST specify all of the cryptographic algorithms as
   part of the metadata
   for that log.  This metadata MUST be made available to all log
   clients. For TLS clients
   that are web browsers, CT relies on browser vendors to convey this
   metadata to the clients.
   For all other log clients, the means of disseminating log metadata
   is undefined.

   The set of cryptographic algorithms initially specified for CT (in
   RFC XXXX) will change
   over time. New, standard algorithms will be published as (standards
   track) RFCs. Log
   operators and clients will be required to support these algorithms
   (for new logs)
   during a time  frame specified by these RFCs.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to