On 12/11/2013 05:55 PM, Ben Laurie wrote:
> Who's in?

I'd like to be part of it.

> Cryptographically verifiable logs can help to ameliorate the problems
> by making it possible to discover and rectify errors before they can
> cause harm.

Correct me if I am wrong, but the following comes to mind. I'd probably
say "too much harm" or "significant harm": the public log concept allows
for a short time window for successful attack. Much depends on the
number of logs a CA pushes their certs to, and how many monitors watch
these logs for suspicious changes. I am less concerned about the
consistency proofs and audit paths here, and more about what monitors
actually do. I.e., deployment issues.

> Work items: Specify a standards-track mechanism to apply verifiable
> logs to HTTP/TLS (i.e. RFC 6962-bis).

One thing that I was wondering about is whether the work can be taken
further at some point to include that mechanism from Sovereign Keys that
allows to give, say, an alternate Tor routing (or hidden service), for a
given domain, in order to avoid censorship. I'd agree that's not a
primary topic for CT, but a worthwhile goal to keep in mind for later.

Ralph

-- 
Ralph Holz
I8 - Network Architectures and Services
Technische Universität München
http://www.net.in.tum.de/de/mitarbeiter/holz/
Phone +49.89.289.18043
PGP: A805 D19C E23E 6BBB E0C4  86DC 520E 0C83 69B0 03EF
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to