Eran,

Thanks for the careful reading of the architecture doc, and the comments. Response below, in-line.


Overall the relationships between the different entities that participate in CT are well described in this document. The diagrams and concise description of the roles of each entity make it easy to read and understand. It should serve well to establish common terminology around CT.
thanks.

Most comments I have are nitpicks - I realize there's a trade-off between accuracy and conciseness and tried only pointing out where (I think) it's significant.

Issues filed:
Ticket #148 - Architecture document: Spelling/improvements to Introduction
Ticket #149 - Architecture document: Figure 1: Finer-grained distinction between entities Ticket #150 - Architecture document: Indicate missing SCT is equivalent to invalid one. Ticket #151 - Architecture document: Only the leaf cert + timestamp are in the SCT. Ticket #152 - Architecture document: CT-aware TLS clients may require SCTs for all certs.
I have responded to each ticket, using the issue tracker, so I won't repeat those responses here.
Other comments and suggestions:

On section 3, The elements of CT architecture:
Figure 2:
- Browsers also need to get fresh STHs and consistency proofs between STHs to use the output of get-proof-by-hash.
I would say that somewhat differently; browsers may choose to get this info so that they can have higher confidence that an SCT really corresponds to a log entry. But saying that browsers "nee" to get this info seems a bit too stringent, at this time. This is a topic for the browser spec, an initial version of which was posted by David Mandleberg late last year.
- Suggesting to drop the "Browser Vendor" component as it's arguably redundant - a browser vendor would care about the output of the auditor.
We included BV as a separate component because of its role in providing log metadata to browsers and as a source of revocation status data. I agree that a BV cares about Auditor info. I think
we said that explicitly
- Suggest adding a footnote that "An auditor can actively verify MMD compliance by submitting new entries to the log and checking when they're appended to the tree.".
good point. We might mention that here, but it's primarily a topic for the Auditor spec.

Figure 3:
- Nitpick, but subjects may request revocation from CAs - Is it more common for browsers to accept revocation requests from subjects or base their blacklists on CRLs issued by CAs? if the latter, than the figure may be less surprising if that's the path stated there.
yes, in general, a Subject requests a CA to revoke its own cert, or one issued in the name of the Subject. Sorry that we omitted that line. We'll add it. the Figure does not show a browser requesting revocation of a cert, just getting revocation status data from ether a CA or a BV,


Figure 4, repeating later in section 3.3 Monitors:
- The acceptable public keys may be optional - a monitor may simply notify a Subject of each new certificate it observes. While I don't think this option should be mentioned everywhere monitors are mentioned, it's worth noting there may be other operation modes for monitors.
I agree that a Monitor could do that, but such behavior is not mentioned in 6962-bis, nor in the Monitor/Auditor spec we posted. This is a good example of why we need to have more discussion in the WG about what behavior we expect for all elements of CT, not just the log.

3.5. CT-aware TLS clients:
- One paragraphe before the end, mentioning feedback to log operators via subjects - suggest adding an explicit reference to the section in the Gossip draft that describes this reporting mechanism (or at least explicitly state the Gossip document describes such a mechanism).
The architecture doc is focused on what CT standards call for, and the Gossip doc is currently designated as Experimental. So I am reluctant to cite it. However, if you propose a sentence
or two to add to this section, we can see if it fits.

3.6. Auditors:
- For MMD monitoring, I suggest indicating that an auditor can check MMD actively by submitting new entries to the log (either by issuing them or by gathering them from the internet and feeding them to the log). That's what Google's monitor does, for example.
As I said above, this is primarily a topic for the Auditor spec, but I will add the following text after the first sentence in the paragraph: For example, an Auditor might submit an certificate to a log and request an STH after the indicated MMD, to verify that the log is meeting its advertised MMD.

Regarding the TBD parts (Monitor-auditor, CA-subject, browser-vendor), what prevents writing them? Shall I have a go at contributing text?
The architecture doc was posted on 12/17, before we posted the I-Ds for each of TBD references you noted above. Those I-Ds were posted on 12/19, 12/23, and 12/24. Comments/contributions are welcome for these documents too.

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to