Eran,

Overall this is a very thorough document, I find it describes pretty well the scenarios where CT is and isn't effective, so the work to codify these scenarios is much appreciated.
thanks.

I'll send the editorial comments separately, the broader comments I have are: - I find the distinction between self-monitoring Subjects and third-party Monitors a bit superfluous - it seems to me the implicit trust relationship when a Subject relies on a third-party Monitor to detect mis-issuance on its behalf which is the same for self-monitoring Subject, which trusts its employees (for example) to alert about mis-issuance. My proposal is to merge these two cases in most cases and point out explicit cases where there's reliance on out-of-bound channels (e.g. what's described in section 3.1.2.1) for monitoring operations.
I think it is useful to treat these two separately for a few reasons. A
self-monitoring Subject has no trust issues with the entity performing the
Monitor function, unlike in the case of a third party Monitor. While I agree
that there is an implicit trust relationship in the second case, it is important to make this distinction explicit when discussing attack models. too often implicit trust assumption lead to ignoring these assumptions when evaluating system security. Also, if a CA elects to provide Monitor service for the Subjects to which its issues certs, it will be easy for these Subjects to not think about the additional trust they have vested in the CA. Moreover, a self-monitoring Subject may face more problems acquiring log metadata than a third party Monitor, and if many Subjects elect to self-monitor, the burden on CT system resources grows, a possibly important architectural issue.
- The document correctly points out scenarios where CT would not help detect mis-issuance, based on the assumptions that relaying parties (browsers) do not contact logs for inclusion checking or doing anything with the received SCTs. However, given there are plans to get clients to report SCTs back to websites <https://groups.google.com/a/chromium.org/forum/#%21search/expect-ct/chromium-reviews/kJmKKydQ0DU/7NNZia3fDAAJ> it'd be useful if the threat analysis document took that into account (to be fair an up-to-date description of the ideas for implementing the Audit function is in order).
The gossip aspect of Auditing is only targeted as Experimental at this time, which is why I tended to not put much emphasis on the mechanisms being explored in that context. But, I could add a paragraph stating that such a mechanism might become available in the future, and note that it would address this problem of not having SCTs verified via inclusion proofs. This is the text I propose to include in the introduction, on page 5:

   Also note that one proposal for distributing Audit information (to
   detect misbehaving logs) calls for a browser to send SCTs it
   receives to the corresponding website when visited by the browser.
   If a website acquires an inclusion proof from a log for each
   (unique) SCT it receives in this fashuion, this would cause a bogus
   SCT to be discovered, and, presumably, trigger a revocation request.


- More broadly browsers may, while not outright rejecting certificates without SCTs, can provide other indication to users that some certificates are likely to be publicly known by being accompanied with SCTs.
I agree that a browser might notify a user in some fashion about the lack of an SCT for a cert, short of rejecting the cert. However, what you seem to allude to above is a sort of external info about which sites are know to have SCTs. This is not
metadata that has ever been mentioned in 6962-bis, so for now it strikes me
as out of scope. However, if a browser requirements doc were to specify how this
is to be done, then I would certainly add it to this discussion.
- The description of attackers is pretty accurate. I suggest explicitly stating (in section 2) that traffic interception with consent of the relaying party (browser), e.g. when a user installs an anti-virus which adds a root certificate to the local trust store, are explicitly out of scope for Certificate Transparency and are not considered a threat.
Good point, I'll add the following text to Section 2:

   Finally, note that a browser trust store ,ay include a CA that is
   intended to issue certificates to enable monitoring of encrypted
   browser sessions. The inclusion of a trust anchor for such a CA is
   intended to facilitate monitoring encrypted content, via an
   authorized man-in-the-middle (MITM) attack. CT is not designed to
   detect and counter this type of locally-authorized interception.



Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to