--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CACvaWvazkQF4WQ1McKK11xdgX0JZRJ0JUHpDLM21cP1q0U4aCg%40mail.gmail.com.
On Apr 26, 2016 7:06 AM, "Richard Salz" <rich...@gmail.com> wrote:
>
> I do think I understand the last paragraph. Let me try to restate it and see if I got it right.
>
> Chrome will continue to have one CT policy. Enforcement is required for EV. Enforcement is not required for DV. Some kind of enforcement for DV is a goal, but we don't what it will be.
>
Was that supposed to be "do" or "don't" in the first paragraph? And did you for a word between don't and what (perhaps "know")?
That's roughly correct, except that we do know want we want the policy to be, and our focus is on implementing aspects, such as SCT inclusion proof fetching and gossip on the client side, and improving monitoring and alerting for log operations (for CAs, monitors, and log operators needs) on the server, and seeing more robust and open logs in the ecosystem. So we are moving towards the goal, which might be simply summarized as "the same conceptual policy, but with less friction for all parties"
When will you share the specifics of the DV policy?
I did understand that the goal was to make DV less restrictive compared to EV. I did not understand that the things you listed were pre-reqs to determining and then announcing what the policy was. Thanks for the clarification (or explanation or however you want to characterize your, shall we call it, elucidation?).
Do you have examples of scenarios that do not satisfy the currently
stated policy, but do satisfy the current actual policy or this new
proposed policy.
Also, does this remove the concept of "Log qualified at the time of
SCTs issuance" ? And just replace it by "Log that was once qualified"
?
Meaning that, for example, SCTs issued today by the Certly.io log
today would still count toward the total count of required SCTs,
whereas before, they would only have counted if they were issued
before the April 15th deadline ?
It might help understanding if there was a better term to describe the
two types of Logs. For example, you could describe the currently
qualified logs as "Active Logs" and the once qualified logs as
"Inactive Logs" or "Deactivated log"
I was also assuming that, at some point, the metadata associated to
logs list in both chromium code and the certificate-transparency.org
logs list would be include by either a "expiration date" or some kind
of "inactive" marker to distinguish both kind of log.
Does "time of issuance" means the "NotValidBefore" time of the cert ?
It could also mean the "issuance time" of the SCT.
Also, does this language also means that Logs may have a "start date"
in addition to an "end date" ? With the start date indicating the
date where the Log status changed to "pending qualification" ? That
would for example disqualify SCTs that are added to a log before
I'm not sure what "accepted prior to the time of check" really means
here. I take it is a way to deal with Logs that were pending at some
point but never included in Chrome ?
The policy does not seem to explicitly address what happen with duplicate SCTs, or when different SCTs from the same logs are encountered.
The older policy had the "log independence" requirements that would make sure duplicate SCTs, or SCTs from the same log would only count once against the quorums.
What is current Chrome behavior in that regard ?
Still, put my question in the context of this condition:"There are AT LEAST the number of embedded SCTs shown in Table 1 from logs once or currently qualified."If I embed 3 copies of the same SCTs in the cert, does it satisfies this condition? (I would think not)
If I embed 3 different SCTs from the same log in the cert, would it satisfies this condition? (Assuming that logs would return different SCTs for the same certs...)
I'm not sure I understand the rationale for weakening the 2 SCTs fromTurning this first part of the policy over and over around my head,
currently valid logs.
It seems that there will be not much point in people needing the
"hybrid" form that would now be allowed where you have 1 external and
1 embedded SCTs from currently valid logs.
Is that just a byproduct of the current implementation, or is there a
scenario that Chromium wanted to support ?
On Thu, Apr 28, 2016 at 12:40 PM, Fabrice Gautier <fabrice...@gmail.com> wrote:I'm not sure I understand the rationale for weakening the 2 SCTs fromTurning this first part of the policy over and over around my head,
currently valid logs.Wait, perhaps there's a misunderstanding. I'm not sure why you suggest it's a weakening?
It seems that there will be not much point in people needing the
"hybrid" form that would now be allowed where you have 1 external and
1 embedded SCTs from currently valid logs.
Is that just a byproduct of the current implementation, or is there a
scenario that Chromium wanted to support ?
It addresses several cases. Say you have a CA which improperly followed policy - and, unfortunately, there have been a number. For example, they only embedded Google SCTs. One option is for the CA to re-issue that certificate, but that may carry with it additional obligations/constraints (such as revalidation in the case of EV). Another is that the server operator might simply enable OCSP Stapling or the TLS extension to 'fix' the mistake. In such a world, it seems highly inefficient and wasteful to require that they deliver an SCT from the same log via the TLS handshake that is also delivered within the certificate.We can think of no security risk by allowing 'pooling' of embedded SCTs with those delivered via TLS or OCSP. Nor can we identify any security or operational benefit from prohibiting 1 SCT via OCSP and 1 SCT via TLS, given that the same operational risks and concerns apply if you're delivering 2 SCTs via OCSP or 2 SCTs via TLS. So it was an intentional decision not to prohibit what is, in essence, an optimization strategy for when things get weird.This is especially important to consider if the set of logs changes over time, or as more (non-Chromium) clients implement support for CT, and may recognize different logs - such as not including uptime requirements, or having a different view of the uptime requirement. By recognizing that there's no advantage to sending SCTs from the same log over multiple means, we're hopefully simplifying the operational deployment.
Here is an interesting scenario:I have a certificate with 1 embedded SCT from a currently qualified Google Log, and 1 embedded SCT from a currently qualified non Google Log.As is, you don't satisfy the requirements (for a 24 month cert). But if I resend an SCT from one of those two logs in an extension, then I'm compliant.
In that case you are sending the SCTs from the same log over multiple means.But I understand that here re-sending the SCT from the same log indicate to Chrome that this server has the ability to dynamically update its SCTs list, so that it's not necessary to require more than 2 SCTs.
Is that covered in 6962 or is that a Chromium implementation detail?
Here is another example:I have a 24 month certificate embedding 3 SCTs, 2 from previously qualified non-Google logs, and 1 from a previously qualified Google log. I also send 1 SCT from a currently qualified Google Log.
I believe this was valid under the previously stated policy, but not under the one just proposed.