On Mon, Mar 6, 2017 at 6:30 PM, Rob Stradling <[email protected]>
wrote:

> I think the "white out" proposal that was discussed at the CT Policy Days
> is likely to be far more controversial than the various redaction proposals.
>
> "White out" proposes a mechanism for removing or omitting entire
> certificates from logs whilst still "proving" that those certificates are
> "included".  Relying parties have to trust the log to only "white out"
> certs for good reasons.  ISTM that this defeats most of the purpose of CT!
>
> From https://tools.ietf.org/html/rfc6962#section-1...
>   "Certificate transparency aims to mitigate the problem of misissued
>    certificates by providing publicly auditable, append-only, untrusted
>    logs of all issued certificates."
>
> ISTM that supporting "white out" would turn that sentence into this...
>   "Certificate transparency aims to mitigate the problem of misissued
>    certificates by providing publicly auditable, modifiable, trusted
>    logs of some issued certificates."
>
> That sounds not too dissimilar to the WebPKI minus CT!
>

Indeed.

I think the takeaway from the proposed solution is that it undermines the
goals of CT to provide the ability to later 'remove' certificates (by
effectively inserting a later node in the tree that includes sufficient
data to recreate the Merkle Tree, by providing its hash, while refusing to
provide that entry to clients).

This is the question of whether to solve this problem technologically - if
it is even possible (and full disclosure, like Rob states, I believe this
seriously undermines the security guarantees) - or whether through policy.
The policy approach is simply to shut the log down, should it ever need to
violate the append-only property, thereby avoiding any particular notion of
additional trustworthiness.

This then becomes an 'implementation guidance' aspect, as clients,
monitor/auditors, and CAs must all be prepared to adjust to changes in
trusted logs commiserate to their belief such a mechanism is
necessary/appropriate. That is, if implementations do not believe there
exists a need to 'remove' certificates, or are willing and able to tolerate
the disappearance of a log, then no further action is necessary.
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to