On 08/11/17 00:54, Eran Messeri wrote:
One way for a single SCT to be valid for multiple certificates is to omit the fields that change from the data covered by the SCT's signature. For short-lived certificates this would (likely) be the serial number, notBefore and notAfter dates.

This means there's no need to re-request an SCT each time a new short-lived certificate is minted, and the SCT covers all key fields in the certificate's TBSCertificate structure (Subject Alternative Names, key,  etc).
> The drawback is that without a serial number

Hi Eran.  Just thinking about the problem space here...

(1) it is not possible to verify CAs don't violate the unique serial number requirement (effectively reducing auditing capabilities)

One way to mitigate this would be to require the use of a deterministic serial number scheme (i.e., where the serial number is calculated from the rest of the TBSCertificate just before the cert is signed).

(2) mis-issued certificates can't be revoked using the usual means.

The "usual means" of revocation (CRL and OCSP) "don't work" anyway. That is, many of today's TLS clients no longer use these mechanisms.

Alternative revocation mechanisms could be invented that revoke groups of certs (e.g., perhaps by SHA-256(SubjectPublicKeyInfo), or by SHA-256(SharedSCT), etc, instead of by serial number).

Note that such a mechanism cannot be implemented either using 6962 or 6962-bis: Both documents mandate that the SCT covers all fields in the TBSCertificate (at least). But, if the design was changed to exclude some fields, it seems to me that this solution would otherwise be compatible with the rest of the CT protocol.

How about defining an SCT extension that, when present, indicates that the SCT's signature doesn't cover serial number, notBefore and notAfter?

On Mon, Nov 6, 2017 at 9:09 PM, Melinda Shore <[email protected] <mailto:[email protected]>> wrote:

    The question of how to log short-lived certificates is something
    that's been coming up more frequently recently, and it's
    independent (mostly) of the issuance mechanism.  I think we've
    got time to discuss it during the session at IETF 100, and
    it would be helpful if there's a specific proposal to use as
    a starting point.  Will the folks working on this be
    at the meeting?

    Melinda


    _______________________________________________
    Trans mailing list
    [email protected] <mailto:[email protected]>
    https://www.ietf.org/mailman/listinfo/trans
    <https://www.ietf.org/mailman/listinfo/trans>




_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

COMODO CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender by replying to the e-mail containing this attachment. Replies to this email may be monitored by COMODO for operational or business reasons. Whilst every endeavour is taken to ensure that e-mails are free from viruses, no liability can be accepted and the recipient is requested to use their own virus checking software.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to