> 
> Subverting one CA cuts across a large scale of Internet traffic and might be
> noticed or can be routed around.  

With respect to "be noticed", forcing clients to opt-in seems like it would 
clearly be noticed. My understanding was that you were saying that the 
middlebox could block traffic. That seems in conflict with your statement that 
they can be "routed around". 

>Certificate transparency helps prevent a
> single CA from being coerced into misissuance.  

It seems like a middlebox that is able to deny traffic (has that level of 
power, would simply use their own CA and force trust of that)

>With this extension, someone
> doesn’t have to coerce a CA or force victims to trust a new CA.  Instead they
> have to gain the cooperation of the origin(s) they are interested in.  

Gaining the cooperation of the servers (origins) seems relevant. If they get 
the cooperation of the servers, they can simply get the data directly from 
them. But, again, they also have to get the cooperation of the clients. 

If a middlebox has sufficient power to block traffic, force clients into opting 
in, and coerce servers into opting in, it seems like they have sufficient 
alternative options that are of equivalent effort ("ease").



_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to