To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CANOyrg8PD2Yp%3DqKWz8mPdNzPYgi57kr1GdXga7-nfoZtrz5wRg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CACvaWvZpz2TKxhZr56145izk-scvQOsKnzuPy-KuL7%3DwD9ymYg%40mail.gmail.com.
On 29 Jul 2016 20:23, "Rob Stradling" <rob.st...@comodo.com> wrote:
>
> Sharding based on the hash of the certificate would ensure a more even distribution (compared to sharding by issuer). However, I agree that freezing / rotating is the right approach.
I agree that technically this seems an appealing approach, but I don't think sharding based on certificate hash would be compliant with the RFC. I believe a log is required to accept submissions that chain to one of its accepted roots.
Is a log required to accept all certs on its root list? Can you point me to where the rfc says that?
Log operators MUST NOT impose any conditions on retrieving or sharing data from the log."
So I a log can't do https-only?
Hi,
It seems the simplest solution to deal with Log getting too big, would
be to just stop accepting new certificates when you reach a certain
size, and start another instance. The old log would become read-only
at that point.
The only requirement in the Chrome policy that I see might be a
problem would be this:
"If requested, accept certificates issued by a test CA run by Google
to enable Google to monitor the log’s compliance to these policies."
So Chrome might not consider the log "Qualified at time of check"
anymore, which could affect SCTs that are presented via extensions. So
server/ocsp responders operators that use extensions to send SCTs may
have to re-submit their certs in the new log and get new SCTs.
The frozen log would still be considered "Qualified at time of
issuance" for any logged certificate, so for certs using embedded SCTs
it should still work.
Is a log required to accept all certs on its root list? Can you point me to where the rfc says that?