We'd be very grateful for some discussion of this so
that we can close it (one way or the other) and move
forward.

Thanks,

Melinda

On 1/11/16 8:31 AM, Karen Seo wrote:
Folks,

I agree with the approach discussed on the list of simplifying 6962-bis
to focus only on specifications for the CT log by moving the detailed
specifications for other components of the CT system to other documents.
This is in line with a message from Melinda on July 2 re: client
behavior, and amessage from Rich Saltz on July 6 re: the Auditor
function. To facilitate moving requirements for the CA/Subject part of
the system, I propose that we make the changes below with regard to
statements about CT requirements for CA and Subject behavior.  These
changes will also help to address some of the concerns that have been
cited elsewhere aboutthe text of 6962-bis (e.g., issues 139, 140, 144).

Karen

*_Changes to 6962-bis_*

_/**/_/*Section 3. Submitters*/

    *_From: _*Submitters submit certificates or pre-certificates to logs
    for public auditing, as described below. In order to enable
    attribution of each logged certificate or pre-certificate to its
    issuer, each submission MUST be accompanied by all additional
    certificates required to verify the chain up to an accepted root
    certificate. The root certificate itself MAY be omitted from the
    submission.

    If a log accepts a submission, it will return a Signed Certificate
    Timestamp (SCT) (see Section 5.6). The submitter SHOULD validate the
    returned SCT as described in Section 9.2 if they understand its
    format and they intend to use it directly in a TLS handshake or to
    construct a certificate.

    *_To:_*
    A Submitter sends a certificate or pre-certificate (see Section 3.1
    below) to one or more logs. This enables public monitoring of
    certificates to facilitate detection of certificate mis-issuance. If
    a log accepts a submission, it will return a Signed Certificate
    Timestamp (SCT) (see Section 5.6). This document specifies the
    interface to a log that a Submitter uses to log a certificate or
    pre-certificate (see Section 3). A detailed specification of how a
    Submitter should choose to submit a certificate vs. a
    pre-certificate and how it should process the SCT that is returned,
    will be described in a separate specification to be published later.

/*Sections 3.1 and 3.2*/

    *_From:_*
    3.1. Certificates
    Anyone can submit a certificate (Section 6.1) to a log. Since
    certificates may not be accepted by TLS clients unless logged, it is
    expected that certificate owners or their CAs will usually submit them.

    3.2. Precertificates
    Alternatively, (root as well as intermediate) CAs may pre-announce a
    certificate prior to issuance by submitting a pre-certificate
    (Section 6.2) that the log can use to create an entry that will be
    valid against the issued certificate. The CA MAY incorporate the
    returned SCT in the issued certificate.

    *_To: _*
    3.1 Certificates and Pre-certificates
    Anyone can submit a certificate to a log (see Section 6.1). It is
    expected that certificate owners (Subjects) or their CAs will
    usually submit certificates. Alternatively, (root as well as
    intermediate) CAs may log a certificate prior to issuance by
    submitting a pre-certificate.  The log will use this to create an
    entry and return an SCT that can be used to verify that the issued
    certificate was logged (see Section 6.2). The CA may incorporate the
    returned SCT in the issued certificate.

    /[The rest of 3.2 defines both what the log should accept for a
    pre-certificate and what the CA must do. So it should remain here
    but also be duplicated in a requirements document for CAs. ]/**

/*Section 4 Private Domain Names*/
/**/

    _*From: *_
    Some regard some DNS domain name labels within their registered
    domain space as private and security sensitive. Even though these
    domains are often only accessible within the domain owner's private
    network, it's common for them to be secured using publicly trusted
    TLS server certificates. We define a mechanism to allow these
    private labels to not appear in public logs.

    _*To: *_
    Some organizations regard some of the DNS domain name labels within
    their registered domain space as private and security sensitive.
    Even though these domains are often only accessible within the
    domain owner's private network, it's common for them to be secured
    using publicly trusted TLS server certificates. A detailed
    description of mechanisms that a CA could use to support this will
    be described in a separate specification to be published later.

/*Sections 4.1 Wildcard Certificates, 4.2 */***/Redacting Domain Name
Labels in Precertificates, and /*/*4.3 Using a Name-Constrained
Intermediate CA*/**
**

    /[The text in these sections applies only to CAs and should be moved
    to a requirements specification for CAs]/

***/Possible new section/*
**

    If the log checks the syntax of a pre-certificate, then that should
    be described in a new section called something like  "Checking
    Certificate Syntax ."  Any syntax checking done by the CA should be
    put in a requirememts specificatio/n/ for CAs.

/*Section 7 TLS Servers*/
/**/

    *_From:_*
    TLS servers MUST use at least one of the three mechanisms listed
    below to present one or more SCTs or inclusion proofs from one or
    more logs to each TLS client during TLS handshakes, where each SCT
    or inclusion proof corresponds to the server certificate or to a
    name- constrained intermediate the server certificate chains to.
    Three mechanisms are provided because they have different tradeoffs.

    *_To:_*
    A CT-aware TLS server (certificate Subject) can present one or more
    SCTs or inclusion proofs from one or more logs to each TLS client
    during a TLS handshake. (A TLS server is considered to be CT-aware
    if it is configured to send certificates with embedded SCTs or
    inclusion proofs during a TLS handshake, or to convey SCTs
    separately during the handshake.) Each SCT or inclusion proof
    corresponds to the server certificate or to a name-constrained
    intermediate CA certificate to which the server certificate chains.
    The mechanisms by which the TLS server presents the SCTs or
    inclusion proofs to a TLS client will be described in a TLS server
    requirements specification that will be published later.

    /[The rest of 7 and all of 7.1 should be moved to the//above
    mentioned TLS server requirements specification.//]/

/*Section 8 (Certification Authorities), 8.1. (Transparency Information
X.509v3 Extension), 8.1.1. OCSP Response Extension, 8.1.2. Certificate
Extension*/**

    /[These sections defines only CA actions/behavior. They should be
    moved to a requirements specification for CAs./*]
    *

/*Section 12.3 (Redaction of Public Domain Name Labels*/

    /[This subsection applies only to CAs.  It //should be moved to a
    requirements specification for CAs.]//*
    */

/**//**//*Section 12.5 Multiple SCTs*/
/**/

    /[This//subsection applies only to CAs and clients. The text should
    be moved to a requirements specification for CAs and a specification
    for browsers.]/**********************







_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans


_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to