On Sat, Jun 28, 2025 at 02:59:18AM -0400, Winston de Greef wrote:
> This is clearly not true. I've seen multiple clients complaining about
> >> Sectigo's rate limits being way too low for a well behaving monitor to keep
> >> up.
> >
> > Exactly -- Sectigo's problems have _nothing_ to do with not being able to
> > contact misbehaving clients to tell them what they're doing wrong. As
> > such, it's not relevant to a discussion about a possible policy or
> > specification change that would enable providing differential service based
> > on whether or not a misbehaving client can be contacted via email.
>
> But would Sectigo be able to implement a higher rate limit if there was
> contact information?
No.
Sectigo's problem isn't misbehaving clients, it's just having
insufficient capacity and/or a poor implementation, such that the logs
are unable to support the existing load of the well-behaved ecosystem.
(This statement is based on my interpretation of information given by
Sectigo representatives in this group; if my characterisation is
incorrect, I'd appreciate clarification from a Sectigo representative)
> The example argument I've provided would result in the
> answer being yes, so it is relevant.
Your "example argument" relating to emails-in-user-agents is, by your
own admission, "magic":
> where this improvement comes from. (Maybe in this hypothetical situation
> including an email in the user agent does magically free up cpu-cycles.) My
The statement "would Sectigo be able to implement a higher rate limit if
there was magic?" is, indeed, likely to be true, but absent evidence
supporting the existence of said magic, it seems a stretch to call such
a statement "relevant".
> We're going to have to agree to disagree on that, then. The entire
> > security of CT is predicated on a diverse population of monitors being able
> > to freely access the log contents. Thus, anything that impacts
> > availability directly impacts the broader security guarantees of CT, hence
> > my "deepest skepticism".
>
> As I understand it, the security benefits of CT comes from the following
> two ideas:
>
> 1. There is a thriving ecosystem of auditors that gossip to each
> other and to clients that want to verify SCTs (ie browsers) so that clients
> that verify SCTs can know that someone has taken a close look at
> the certificate..
> 2. There is a thriving ecosystem of monitors that see certificates as
> soon as possible, and can raise the alarm if they find a misissued
> certificate.
>
> Auditors and clients verifying SCTs will not hit a rate limit of 75
> requests per second.
Objection m'lud, assertion not in evidence.
> Monitors can better do their job if they have stable
> and fast access to issued certificates (or pre-certificates).
Stipulated.
> Filipo's
> proposed contact-information based rate limit does not impact auditors,
Assertion not in evidence.
> and
> would be a benefit (if the example argument is to be believed)
It's an argument whose existence is predicated on "magic", so you'll
hopefully forgive me if I don't uncritically accept it as a given.
> I feel like this example presents a situation where increasing explicit
> limitations "you must include contact information if you want a higher rate
> limit" while reducing implicit limitations "log availability" has a net
> positive on the security benefits of CT.
I disagree with the premise of the assertion, and hence do not accept
the conclusion.
> Maybe more specifically: this policy "impacts availability" by making it a
> bit harder for monitors to set up access, but increases log availability
> with increased stability.
It does not increase log availability.
> > "something that limits log clients, but increases log availability" is
> > unlikely to exist.
>
> Well, this might be true. I can't say I've come across anything that I'm
> convinced does this. But the point of my reasoning is that if something
> like this were to exist, it would be a good idea to apply it (I tried to
> communicate this by starting with an assertion that there is something like
> this. If there is something like this, then we should do ...) However, it
> seems to me that your bar of "deepest skepticism" would result in the
> conclusion that it's best not to apply this hypothetical improvement.
> Therefore, I don't think you are using the right bar.
No, "deepest skepticism" would not result in a hypothetical improvement
which was actually shown to be an improvement from being rejected,
merely rejecting hypothetical improvements which did not have evidence
of improvement.
> The most that limiting some log clients could do is to make resources
> > available to serve other clients.
>
> I don't think these limits are a zero sum game: if a log requires clients
> to include contact information for a higher rate limit, this places a limit
> on the clients. If however, this means that the log operator can prevent
> resources from being wasted by contacting a client and convince them to fix
> a bug causing misbehavior, this is net positive.
This is a different mechanism to the one you previously argued for,
where reducing availability to some clients by X% somehow allows the log
to magically increase availability to other clients by X+N%.
Enabling communication between logs and clients allows the system to run
with feedback, an essential part of producing a stable operating point.
You won't get any argument on that point from me, I survived my control
theory course.
There are many potential mechanisms for feedback in the client/log
communication pipeline other than "provide an email address and have a
human manually reach out". The basis for evaluating a proposed solution
should not ever be solely "is this better than not doing it?", but
rather "is this better than the other known solutions?". New medicines
aren't brought to market solely because they're "better than nothing";
new medicines are better than what we've already got.
HTTP status codes and response bodies, for instance, are already in use
(in fact, they're even a necessary component of the proposed "email in
the user agent" mechanism), and provide an admirable mechanism for
providing feedback to clients. In addition to already largely existing,
this feedback mechanism has the additional benefits of being
privacy-preserving, discriminating between clients _solely_ on their
impact on the log's availability (rather than a multi-order derivative),
and is also extremely amenable to automation.
> Another possible situation that leads to a positive result is that a log
> operator can achieve better performance when get-entries requests are made
> with start % 64 == 0 and end=start+64. If the log operator configures a
> higher rate limit for requests that match that restriction, this increases
> the amount of requests all monitors can make.
Feel free to propose that, then, with appropriate evidence, so that it
can be evaluated as a potential policy or specification change.
> > Comparing "5% more availability" with "putting an email in the user agent"
> > is invalid. Putting an email address in a user agent does not, _in and of
> > itself_, provide a single extra CPU cycle or bit of network bandwidth with
> > which to serve clients (in fact, as it increases the size of all requests,
> > it ever-so-slightly does the opposite).
> >
> > Rather, what including emails in user agents allows, relative to
> > "something that limits log clients", is providing differential
> > rate-limiting. Such rate-limiting might increase availability for a
> > _subset_ of well-behaved clients (those which provide emails) by 5%. It
> > would, however, necessarily _degrade_ availability for those well-behaved
> > clients that don't provide emails, by an equal-or-greater amount.
>
> I describe a hypothetical situation wherein including an email actually
> does result in increasing availability by 5%. It doesn't actually matter
> where this improvement comes from. (Maybe in this hypothetical situation
> including an email in the user agent does magically free up cpu-cycles.) My
> point is that if including emails does this, monitors would want it
> implemented.
And if there were a goose that laid golden eggs, I'd want that, too.
But I'm not going to have a conversation with my bank manager which asks
them to assume, for the sake of argument, that I've got a flock of them
in my backyard.
> Also, in a less magical world, there is a mechanism where including an
> email improves availability beyond just shuffling capacity around. Namely,
> that log operators can contact monitors and ask them to fix a bug in their
> implementation. This reduces the use of the log's resources by this
> monitor, leaving more resources for the other monitors (or more buffer
> resources), increasing availability.
There is already a mechanism by which log operators can contact
monitors: HTTP status codes and response bodies.
- Matt