Ben,

...

    If the CA that logged the bogus certificate fails to revoke it,
    browser vendors might blacklist the certificate. However, as noted
    above, the doppelganger, which was not logged, will match the SCT
    created for the logged certificate. If remediation is effected by
    blacklisting (instead of revocation by one of the malicious CAs)
    then the ability of CT to deal with this sort of attack may be
    diminished.


Once more, this problem is not CT's problem - it is a problem with RFC 5280 et al. That is, the problem exists regardless of the existence or use of CT.
I assume we agree that the issue is not whether inclusion of the AIA extension in all EE certs should be a MUST in 5280, right? Is your point that no standard specifies in detail how to manage revocation status data? If so, then this lack of detail applies not only to CRLs and OCSP but
also to browser blacklists, so it's not just a 5280 issue.

In any case, the discussion is an analysis of attacks in the context of CT, so to that
extent it is a CT issue.

Does this mean 5280 should be updated?
I think not. As I noted in prior messages, 5820 is the general PKI spec for Internet use of X.509 certs. There is not always a need to mandate inclusion of AIA, hence it's optional. It's appropriate to profile 5280 for specific application contexts, like the Web PKI. There was an IETF WG that was
trying to characterize that context (WPKOPS) but it failed.

Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to