Hi, I've taken a look at this and have a few comments.

Although the security issues are addressed in section 5, I think it could 
benefit from a little more detail and clarification in sections 2 and 3.

2.1 Root store provider

Does the audit reporting and updating method described conform to any standard? 
I've seen auditors follow their own procedures which do not match this 
description.

3.2.1. One root CA cross-certifies another root CA

Is there a defined and agreed way for older CAs to cross certify newer CAs 
particularly if they're not owned by the same organisation? For example if the 
criterion for cross certification is less than that required by the root store 
for the original CA there could be some interesting issues. 3.2.2 refers to 
adherence to the root store policy so should that also be in 3.2.1?

3.2.5 to 3.2.7

I'd have expected more emphasis on technically constraining third party and 
subscriber RAs and CAs. For one thing legal contracts may be subject to 
non-disclosure which could make it difficult to audit properly but if they're 
not technically constrained that will be what's required.

5.3. Root CA compromise

The last sentence is incomplete ;-)


A further thought: although potentially contentious should the scope be 
expanded to include other applications which use https but are not, in the 
traditional sense, web browsers? I'm thinking in particular of applications 
that utilise the protocol but don't have or use any form of trusted root store. 
To my mind this is a much bigger security issue than is covered in the draft as 
it stands. Of course this gets us into a discussion of how synonymous "web" is 
with "http/s".

Regards, Rob




-----Original Message-----
From: wpkops [mailto:wpkops-boun...@ietf.org] On Behalf Of 
internet-dra...@ietf.org
Sent: 29 May 2014 11:11
To: i-d-annou...@ietf.org
Cc: wpkops@ietf.org
Subject: [wpkops] I-D Action: draft-ietf-wpkops-trustmodel-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Web PKI OPS Working Group of the IETF.

        Title           : Trust models of the Web PKI
        Authors         : Inigo Barreira
                          Bruce Morton
        Filename        : draft-ietf-wpkops-trustmodel-02.txt
        Pages           : 11
        Date            : 2014-05-29

Abstract:
   This is one of a set of documents to define the operation of the Web
   PKI.  It describes the currently deployed Web PKI trust.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-wpkops-trustmodel/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-wpkops-trustmodel-02

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-wpkops-trustmodel-02


Please note that it may take a couple of minutes from the time of submission 
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
wpkops mailing list
wpkops@ietf.org
https://www.ietf.org/mailman/listinfo/wpkops

_______________________________________________
wpkops mailing list
wpkops@ietf.org
https://www.ietf.org/mailman/listinfo/wpkops

Reply via email to