Bryan,

Thanks for the feedback.

I added text to address the concerns you cited about the threat analysis document last year, based on comments you made in the London meeting. I don't recall you mentioning this specific concern at that time or in subsequent messages. Can you refer me to one or
more specific message in which you cited the oversight you mentioned below?

I finally had a chance to take a look at the latest version of the threat analysis document.

Months ago, I pointed out that the document presents a lopsided view of the potential types of attacks, in general considering only attacks in which CAs or log servers misbehave “in place”, while completely neglecting even to mention the large class of attack scenarios in which an attacker steals the servers’ keys and uses them to create secret “evil twins” of the CAs and/or log servers elsewhere on the Internet (or off the Internet) in domains more under the attacker’s control. In other words, the attacker leaves the “normal” CAs and log servers that most of the Internet sees operating completely normally and appearing to be honest, but creates and uses evil twins of those CAs and log servers elsewhere for (basically undetectable) attacks against target victims.
I will write text to address a class of attacks where a CA's or a a log's private key is compromised and the attack is undetected. I do agree with Ben, however, about the difficulty faced by CT or other mechanisms when users operate in an isolated environment. If a user lives in a country where the telecom infrastructure is controlled by state security forces, there may be few if any ways for the user to acquire externally supplied security info. I don't anticipate addressing that topic.

Also, BTW, Eran (a co-author of 6962-bis) provided feedback on the treat analysis document,
which was reflected in the -02 version.

Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to