--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+unsubscribe@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CAO%2BqTAmC9A-wMoQdpkzDzH1Cu7eVCDVNG8KfjVsXLrK%3D3mQhVw%40mail.gmail.com.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+unsubscribe@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/482ab251-25bc-46f2-b8e3-e950dbe89031%40chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CAFK%3DoS9GCFU9RDVU4-b0QN%2BeVEjjMY3fGZNbdHKg9BOYJjVLvw%40mail.gmail.com.
I think there's also still a question of what availability means. Obviously, for Chrome, available should include available to Chrome's monitors.
However, what about other monitors? Although some monitors showed us as down for longer than 24 hours, others did not. Which monitors do we need to be up for?
One of the reasons we had issues (Rick will be posting more about this soon) is that the number of queries downloading the tree jumped from about 10 an hour to 600,000 an hour. If the we block the entity requesting 600,000 downloads an hour, are we no longer available to that monitor?
As a thought experiment, I'd like to propose the following:If a malicious log wished to conceal the existence of a certificate for longer than their MMD (or even 2x their MMD), they could incorporate the certificate into their Merkle tree and publish corresponding SCTs and inclusion proofs, while returning an error for any get-entries request that included the entry they wished to hide.They could further attempt to distinguish between auditors and monitors that publish the contents of logs vs. monitors that merely are checking for cryptographic consistency and MMD adherence, and allow the latter to fetch the entries in question. They could therefore appear to be behaving entirely correctly from, e.g. the UA monitor's perspective.
How can we craft a policy that forbids this behavior while allowing for honest logs to occasionally experience downtime? Is this covered by the present "availability" requirements? (not if we only consider the perspective of Chromium's monitor)
"Split view" requirements? (not if we interpret "split view" as "publishing different and inconsistent STHs to different parties")Back to the issue with Yeti2018: on reflection, I was looking at the concept of the MMD with monitor-tinted glasses. Yeti2018 published STHs that proved they included every entry within their MMD, and I see the logic in only requiring a STH to prove MMD compliance. I still think this should count as misbehavior, but I am not convinced it does under the present CT log policy.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/482ab251-25bc-46f2-b8e3-e950dbe89031%40chromium.org.
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CAFK%3DoS9GCFU9RDVU4-b0QN%2BeVEjjMY3fGZNbdHKg9BOYJjVLvw%40mail.gmail.com.