On 17/01/17 17:07, Tom Ritter wrote:
<snip>
Any comments?

It assumes the malicious log doesn't backdate a SCT..

True. So, require multiple SCTs from multiple logs, and let the TLS client consider only the age of the most recent SCT timestamp.

It also assumes the client has a clock that is correct to the order of
a few days...

True.  Is it, or might it soon be, reasonable to make that assumption?

e.g., https://roughtime.googlesource.com/roughtime sounds promising, I think.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to