On May 4, 2015 3:59 AM, "Sigbjørn Vik" <sigb...@opera.com> wrote:
>
> We applaud Google's move to provide stable logs, but think the
> requirement that all certs be logged with Google is a bad move. This
> formalizes control over which certs are issued with a single entity, and
> the internet is all about decentralization.
Could you explain how this formalizes control? It sounds like your concern is over how Google's logs accept root certificates, is that correct? If so, how does that differ from a Google-run Root Program (which already exists for platforms such as Chrome on Android, iOS, and ChromeOS)?
> While this might be a good temporary requirement, we would not want this
> to be permanent, and would consider removing any such permanent
> requirements from our downstream version of chromium code. We do not
> believe the internet is best served with each browser having their own
> requirements for SCTs either.
How is it possible to _not_ arrive here? Browsers already have their own requirements for what root CAs they will accept, directly or indirectly.
Under the current policy, we require, for example, certain up time requirements and a certain maximum MMD. That seems inescapable as a policy decision.
> While browsers today can block individual certificates, this would
> essentially give a single entity the power to block CAs from issuing
> valid certificates for cooperating browsers. All CAs would have to apply
> to Google beforehand to issue such certificates, and might (in theory,
> in the future) be rejected for any reason.
How is this different from root stores today? And how would you propose this be treated differently in the future?
It seems inherent the need to use policy to address the risks of coercion, compromise, collusion, and collapse of logs and CAs, so I can't see how one can avoid needing some element of policies to address those risks, and the policies will always reflect the organizations that define them.
> As Chrome is the first browser to fully implement CT, the specification
> is important, and will form the basis of other implementations. We would
> want to the specification to be vendor agnostic, and would want to
> dissuade other vendors from adding their own requirements.
The specification is vendor agnostic. But you're currently depending on Chrome policy for what an acceptable log is, so that isn't exactly vendor agnostic.
That said, it seems you've raised some concerns with the approach, so I'm curious how you would see the present issues in the policy be addressed, if not the relaxation of independence. In particular, can you come up with a suitably robust criteria for independence that could objectively evaluate a log's suitability? If a log was operated by the same board of directors, but an independent holding company, would that be robust? Would you even know? What if it was that Log B was operated by the spouses and legal partners of Log A? Is that independent?
Ultimately, a set of objective criteria are needed, and with respect to independence, it is quite challenging to find such a set.
On May 4, 2015 9:22 AM, "Sigbjørn Vik" <sigb...@opera.com> wrote:
> It gives Google the power to pre-emptively reject any certificates
> issued for the web at large. Even if just by de facto, it will still
> change the dynamics of the web.
I'm sorry, I'm still not following how you see this happening?
> I am concerned about the principle, of a vendor requiring CAs to log all
> certificates ahead of time with a vendor supplied log.
This isn't required though. What is required is that the certificates are, at time of evaluation, provided with sufficient SCTs.
> Having requirements on the CA is quite different from having
> requirements on the certificates. Accepting a root, and having all
> certificates automatically accepted is quite different from needing all
> the certificates to be accepted ahead of time.
Again, this isn't required.
It sounds like you have a particular "worst case" scenario in mind, and from that are arguing against incremental improvements. It would help to know/elaborate what this scenario is, so that we can collectively look to see what can be done to ameliorate your concerns.
> > Under the current policy, we require, for example, certain up time
> > requirements and a certain maximum MMD. That seems inescapable as a
> > policy decision.
>
> As this is entirely vendor agnostic, this is not a problem, and not
> related to the issue I am raising.
It fundamentally is a vendor setting a policy. I fail to see how one set of requirements is vendor agnostic (especially when it is Google quantifying and measuring compliance) while at the same time arguing that it is vendor specific.
I think you're operating with some demarcation of policies into agnostic & specific, and it's unclear what that demarcation is so that we could propose an alternative that meets your desired definition.
> Quite different, in a number of ways. Today, individual certs are
> blocked after-the-fact.
Just to be clear, you see that as a strength in the current system, right? While we certainly aren't arguing for that, as hopefully clearly shown by our policies, the fact remains that a number of people point out the above as a _weakness_, not a strength.
> Any one browser cannot impose requirements on
> the CAs.
Well that's not true. That is exactly what root store policies do. There is no root store that requires exactly and only what the CA/B Forum, ETSI, or WebTrust have dictated. They all impose unliteral policies above and beyond, and have since time immemorial.
> With this, a vendor could unilaterally block the issuance of
> certificates ahead of issuance. In the worst case, Google could block
> all issuance of non-Google-CA certificates by rejecting logging. (I am
> not implying Google would, I am just concerned about the principle.)
And do you not think the current policies require that disclosure a priori? Logs applying for application are required to state their policies of acceptance, and required to update when those policies of acceptance change.
For example, Rocketeer (a Google log) states in https://code.google.com/p/chromium/issues/detail?id=431057 that it will "Will log any certificate that is anchored in a root trusted by one of the major browser vendors."
Certly.io (a non-Google log, although how would you prove it), states in https://code.google.com/p/chromium/issues/detail?id=442173 "The log is preloaded with the current (as of today) Ubuntu root list. An internal testing root is also included. CAs in at least one CA program (Microsoft, Mozilla, or Apple) who are not already added can contact me."
> While a browser today could stop accepting all but Google-CA
> certificates, that would hurt the browser, not the CAs, after this
> change, the burden falls on CAs if a vendor so misbehaves.
How so? This doesn't logically extend in any way. From the user's perspective, the act of accepting/rejecting a CA is virtually indistinguishable from a log doing so. That is, if a browser such as Chrome requires that a certificate be logged in a Google operated log, and that Google operated log rejects a certificate because of the CA that issued it or the technical content of it, how is that different than if Chrome simply rejected that certificate because of the CA that issued it or the technical content of it?
I mean, for that matter, Chrome already enforces technical constraints on certificates to ensure they comply with the Baseline Requirements, and reject such certificates that fail on certain criteria. How, from a user experience, is that different? It sounds like you're arguing that these are somehow distinct (a browser rejecting a CA vs a browser-required log rejecting a CA), but both seem fundamentally identical through an identity property.
> I consider "acceptable log policy" part of the specification, and see no
> reason why this cannot be made vendor agnostic too.
I'm sorry, but I need a something a little more concrete to understand what you are proposing here as acceptable log policy.
Are you saying the IETF Trans WG should come up with a definition of what represents a trustworthy log? That IANA (or, more aptly, ICANN, a non-profit US corporation) should maintain a list of known trustworthy logs? I just want to make sure we're being explicit here.
> I take it that part of the reason for this change was to get
> independence, and that Google logs were deemed "independent". So that a
> Google issued certificate with 3 Google SCTs is still deemed to have
> independent SCTs? That in itself sounds wrong.
Elaborate why, as otherwise we can't address the perceived wrongness, only the uncertainty being presented.
For example, is this mitigated by establishing "at least one Google and one not-Google"? If so, why? What attacks are you concerned about, and why? Let's elaborate the threat model.
Is your concern only with a Google-issued certificate? What if, say, a non-Google CA (and I'll use Digicert as an example, because they run a log) logged their certificate into three Google logs. Would you be concerned then? Why or why not?
> I believe logs being independent of the CA is more important than being
> independent of each other (at least one log should be run by someone
> else).
I'm not disagreeing with you, but it would help if you spell out why. Objectively, this sounds entirely subjective. The majority of the logs accepted today are CA's logs, but you haven't said anything yet against this when these logs have been accepted, nor really proposed any changes to policy.
> I have previously argued that ensuring at least one log is run in a
> location with a different government than where the CA is run - so that
> no single government can coerce a CA and a log to issue/fork secret
> certificates to be used in secret, walled-off networks. For this set of
> independence, the board of directors and owner company doesn't matter,
> only the law of the land of the operators and admins does (everybody who
> has access to private keys).
Except such coercion is detectable and would be the death of the log. No party can ensure the SCT never makes it to the public and thus reveals the fork. That is one of the key concepts of CT.
What about a CA like Symantec or GlobalSign, where the private keys are geographically diverse. Would a browser running a CT policy be required to investigate where each copy of the private key lives? What about subsidiary relationships - do those count towards your "where the CA is run" definition? How would the public be assured that this information was correct and due diligence was followed?
I'm not trying to be negative, but I think the requirement you've proposed there is far, far more difficult to quantify than you realize, and is fundamentally as problematic as the "independence" requirement is when it comes to having objective criteria.
>
> Those two sets of independence would, in my eyes, ensure more
> independence than forcing a Google log to be used. Having more SCTs than
> that is about redundancy, not independence, and it is up to CAs how much
> more independence they want.
To make sure it is clear - you want the log to not be (???) by the CA and not in the same jurisdiction?
The former has definitional issues - is it operated by? How do you quantify that? What about the CAs that have engaged in financial relationships with Digicert - are those meeting your definition of independence? How would that be quantified - would the CA have to self-declare? What would they self-declare? How would the auditor - which I presume means WebTrust/ETSI (and thus would require 18 months, on the early, to incorporate into any audit frameworks) - measure this? The lack of a financial relationship between the log is a negative statement - that is, there's no evidence you can provide to show you do have a relationship, only suppress that evidence.
Or are you simply looking for a legal opinion letter? If so, how does that mitigate any of the coercion or collusion concerns you seem to have?
With respect to jurisdictional independence, how do you quantify that? For example, extradition treaties involve in-kind recognition of the legal rights of distinct countries. And it's well known that treaties such as the Trans-Pacific Partnership or the EU membership agreements extend well into the realm of computer-based activities. So how do you quantify jurisdictional independence?
>
> If you do want more independence, that is achievable. It seems most logs
> are operated by CAs anyhow, and CAs could make assurances that such logs
> are operated by that CA alone. That would give a business incentive for
> other CAs to choose such a log.
Except most of the logs aren't operated by that CA alone, and I'm not sure that represents a bad thing in practice or in spirit; but it seems you do?
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CACvaWvYcgWz%3Dc-OiXAd9DFSzeWMG_EufDT5sOzp-3G_F7BbfdA%40mail.gmail.com.
On May 4, 2015 11:55 AM, "Peter Bowen" <pzb...@gmail.com> wrote:
>
> If we assume log.trans.xm is hosted on GCE and ct.other.xs is hosted
> on another provider, would one SCT from each of these this meet the
> requirement for 12-month certificate?
Fair question, and the intended answer is no.
I think the distinction here that probably needs to be made is one log operated by Google and one log that is independent from Google. Unfortunately, that reintroduces the I word.
Does anyone else have any feedback on this thread?
Ryan, can you also check this site https://www.efpe.eu? I see that it has the 3 logs from google and can't find another one so is it complying with the current policy? With the may2015 one? Somewhere else where to look at? Just to be clear.
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/2c0b852e-2013-46f7-bc92-ce78468c9358%40chromium.org.
Can you clarify whether the May 2015 policy update will be rolled out to a stable Chrome release by July 1, 2015?My question is centered around whether we would need to support the previous Dec 2014 policy around log independence from July 1, 2015 until the latest policy takes effect. If the latest policy rolls out to stable Chrome by July 1, this will not be an issue.
Ryan, can you also check this site https://www.efpe.eu? I see that it has the 3 logs from google and can't find another one so is it complying with the current policy? With the may2015 one? Somewhere else where to look at? Just to be clear.
Hi Ryan,What I mean by "support the previous Dec 2014 policy" is that it includes supporting the relaxation of log independence that ends on July 1, 2015. If this policy was already fully implemented in Chrome, the log independence relaxation would go away on July 1, 2015 and certificates requiring 3 SCTs would need to come from 3 independent logs.Suppose we are currently issuing certificates requiring 3 SCTs with 2 from Google and 1 non-Google.This would be non-compliant under the Dec 2014 policy on July 1, 2015, when the log relaxation ends.However, if the May 2015 policy is rolled out to Chrome before July 1, 2015, we would be compliant.I suppose this issue would also go away if the "removal of the log independence on July 1, 2015" part of the Dec 2014 policy has not been rolled out to Chrome. We would then just go from the Dec 2014 "relaxed" independence policy straight to the May 2015 independence policy.
Hi Ryan. A couple of questions about dates...
Given that the Dec 2014 independence requirement was deferred and never actually came into effect, the May 2015 policy update took us from
no independence requirement
to
"with at least one SCT being from a Google-operated log and at least one SCT being from a non-Google-operated log".
Q1: What was (or what will be) the effective date of your May 2015 CT policy update?
(The policy itself doesn't seem to say)
Q2: What (if any) will be the enforcement date (in Chrome) of your May 2015 CT policy update?
> On the topic of whitelisting, there are no plans to extend the whitelist.
Well, I figure there's no harm in asking, so let me upgrade my "I do
like the idea" to a formal request...
Please would you extend the whitelist so that it includes the ~1000 EV
certificates that
a) were logged in at least 1 Google-operated CT log between 1st July
2015 and (at least) 3rd August 2015
and that
b) contain embedded SCTs that are on their own sufficient to satisfy the
Dec 2014 policy but not the May 2015 policy
?
Thanks for considering this request.