On Mon, Oct 31, 2016 at 6:33 PM, Stephen Farrell
<[email protected]> wrote:
> On 01/11/16 01:04, Peter Bowen wrote:
>> On Mon, Oct 31, 2016 at 3:02 PM, Stephen Farrell <[email protected]> 
>> wrote:
>>>
>>> Can you call out the privacy aspect that applies to humans
>>> and that is a real part of the question related to support for
>>> redaction in CT?
>>
>> There are
>
> "Are" or "could be"?
>
> Serious question. The (non)existence of those in 6962 logs
> seems to me to be a) highly pertinent and b) demonstrable.

I'm not sure how you get that these don't exist.  Using the given name
and surname attribute types as indications of PII, and removing one
issuer's apparently confusion between surname and serial number, I see
thousands.  A few examples:

https://crt.sh/?id=9031476
https://crt.sh/?id=8997821
https://crt.sh/?id=45107003
https://crt.sh/?id=31130948

>> certificates that have personal information (e.g. given
>> name, surname, and physical location) in the subject distinguished
>> name or the subject alternative names.
>
> I can well imagine certs for web servers with some PII
> embedded for no good reason. "Don't do that by accident"
> would be as good a bit of advice as we could offer in
> CT I think as it's really much more an issue for acme
> in terms of current IETF work. (Or at least arguably.)

I wouldn't call this by accident.  Microsoft's root program
requirements 
(http://social.technet.microsoft.com/wiki/contents/articles/31633.microsoft-trusted-root-program-requirements.aspx)
explicitly call out Individual Validation (IV) is section 4(a)(15).
IV, by definition, puts Personal Information in the subject of the
certificate.

>> It is very possible that there
>> may be a desire to redact this information (in fact it could even be
>> required in some jurisdictions as CT could be considered a database).
>
> The above has "possible," "may be a desire," "could even
> be" and "could be considered" all in one sentence. That
> is not a template for a winning argument is it? :-)

I'm not a lawyer, so I'm not going to make any legal conclusions.  So
I'm going to continue to qualify anything related to legislation that
may exist in certain jurisdictions in which CT logs may exist.  Yes,
that is heavily caveated again, so feel free to ignore, but it is a
real concern.

>> We already see this with domains in many countries where the full
>> registrant details are not publicly available.
>
> DNS registration policies are not in scope here though.

I wasn't suggesting that they were.  I was using it to demonstrate a
related case where it was judged that restriction of information was
beneficial.

>>
>> Additionally, while 6962-bis does focus on certificates used for TLS
>> server authentication, there are other types of certificates that
>> could be logged.
>
> How many have been logged? Serious question. If there is a
> real problem here, I'm interested. If there is not, then I,
> for one, am not. Finding the evidence either way should not
> be hard.

Why does it matter how many have currently been logged?  Isn't the
point of this WG to create tech spec for a certificate log that can
log any kind of certificate?  Is it possible emailProtection certs
aren't being logged because of privacy concerns?

Thanks,
Peter

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to