I think Eran's proposal is a definite improvement (compared to the current 6962-bis redaction mechanism), because it makes client implementation simpler and more robust.

I agree that Andrew's extension of Eran's proposal is an elegant fix to the SCT re-use attack. However, I'd like to propose an alternative...


1. When redacting a LABEL in the "redacted SAN" extension, the issuer replaces LABEL with "?"||HEX(HASH(SERIAL_NUMBER||LABEL)) instead of just "?".

2. If the client desires stronger SCT matching, it checks that each redacted label in the redacted SAN extension matches the corresponding label in the SAN extension, by computing HASH(SERIAL_NUMBER||LABEL), where SERIAL_NUMBER is the serial number of the certificate.


Advantages:
- Slightly simpler than Andrew's proposal. (i.e. no SALT needs to be generated, put into a certificate extension, then removed to reconstruct the TBSCertificate). - Provides a (partial) technical solution to 'un'redaction (which is something that needs to be addressed before Chrome will ever support redaction [1]): If a domain owner's certificate team observes an unexpected precertificate, they can calculate HASH(SERIAL_NUMBER||LABEL) for all of the LABELs they manage.

Disadvantages:
- A dictionary attack might reveal the LABEL. It wouldn't be possible to compute a rainbow table to generalize this attack, because the SERIAL_NUMBER is different for each certificate.


If there's an effective way to solve the 'un'redaction problem purely via policy, then I'd say Andrew's proposal is superior. However, if there isn't, then perhaps my proposal is a necessary compromise.


[1] https://groups.google.com/a/chromium.org/d/msg/ct-policy/vsTzv8oNcws/imuC3iloBwAJ

On 17/06/16 22:33, Daniel Kahn Gillmor wrote:
On Fri 2016-06-17 07:02:12 -0400, Eran Messeri wrote:
In short: Rather than describe how the client should modify the labels in
SAN extension to get to the redacted form that was logged, the issuer will
generate the redacted SAN extension and log it, as a part of the
TBSCertificate submitted to the log.

I like this proposal.

A clarification:

It took me a second to realize that the "redacted SAN extension" is
*also* present in the issued certificate, alongside the normal SAN
extension.  the SCT is only over the TBSCertificate without the normal
SAN extension.

Disadvantages:
- The commonName in the subject field cannot be redacted this way.

This is not a problem.  the CA/Browser Forum Baseline requirements say
that the commonName in the Subject field is "Deprecated (Discouraged,
but not prohibited)"

A user who really cares about redaction can simply leave out the
commonName in the Subject field.

I also think Andrew Ayer's extension of this proposal (the "Redacted
Labels Salt" extension) is an elegant fix to the remaining technical
concern about redacted SCT abuse.

I would support their inclusion in 6962-bis.

           --dkg


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

COMODO CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender by replying to the e-mail containing this attachment. Replies to this email may be monitored by COMODO for operational or business reasons. Whilst every endeavour is taken to ensure that e-mails are free from viruses, no liability can be accepted and the recipient is requested to use their own virus checking software.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to