On Apr 4, 2016 11:10 AM, "Fabrice Gautier" <fabrice...@gmail.com> wrote:
>
> Ah, I was under the impression that that list - being signed by Google
> - was the "official" reference.
>
> Is there another list I'm missing, or is the chromium source code the
> official reference ?
>
The official reference is the source (and this is clarified on the Chromium CT page that includes the policies)
The bits on certificate-transparency.org is maintained by a team at Google, but it is not the canonical source. For example, it includes information about logs not trusted by Chromium and various other aspects of the CT ecosystem.
If it helps, as Mozilla and Apple continue implement support for CT (both have partial implementations), you can imagine that the certificate-transparency.org site will include information relevant to their operations as well, but the canonical source of truth for Chromium will remain Chromium source.
Does that help clear it up?
With that said, this is the right list for any discussions relating to this.
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CAKexNNNwa21-rQ7TQ8NXouog59h5HKdn3af3kc0DMXe9CguAMA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/7c2de7f6-7c58-44db-9e9b-788af4580600%40chromium.org.
Ryan, can you please clarify regarding the removal date, April 15th:Is the intention that SCTs from Certly's log with timestamp past April 15th not be accepted anymore? What's the latest time Certly's log can issue SCTs (that would be accepted by Chrome)?
Thanks, that's what I was looking for a clarification on (even though my question wasn't phrased correctly :)).That implies we can grab a Signed Tree Head from Certly's log on the 15th to indicate the timestamp after which SCTs no longer count towards the log diversity requirement and after which there's no point in auditing that particular log, IIUC (i.e. no point in auditing SCTs issued after that date, but SCTs issued before that date should be audited like any other SCTs from known logs).
On Mon, Apr 11, 2016 at 8:45 PM, Ryan Sleevi <rsl...@chromium.org> wrote:On Mon, Apr 11, 2016 at 8:59 AM, Eran Messeri <er...@google.com> wrote:Thanks, that's what I was looking for a clarification on (even though my question wasn't phrased correctly :)).That implies we can grab a Signed Tree Head from Certly's log on the 15th to indicate the timestamp after which SCTs no longer count towards the log diversity requirement and after which there's no point in auditing that particular log, IIUC (i.e. no point in auditing SCTs issued after that date, but SCTs issued before that date should be audited like any other SCTs from known logs).I'm not sure why you would necessarily audit SCTs issued before that date; the SCTs will not be trusted, simply counted for diversity, and the presence of other SCTs from other logs provides the assurance that the certificate was appropriately logged and disclosed, and that disclosure is publicly available.So I don't believe you should need to do what you described.(Warning: Theoretical discussion below. Has no real security implications for Chrome users, as far as I can tell.).My assumption is that we audit CT logs to detect logs that misbehave by issuing SCTs but not incorporating the certificate into the tree.The reason for auditing "frozen" logs is to find out if, before they were frozen, they issued any SCTs for certificates that were not incorporated into the tree.If a frozen log was found to misbehave in that way, one could argue that the sensible course of action is to completely distrust the log, except for a whitelist of precertificates extracted from this log (which we are confident are public because we could extract them).However, the reason I believe it has no security implications for Chrome users as SCTs from other logs (in addition to Certly's log) are needed and it is enough that one of the SCTs could be audited for the client to be (mostly*) confident the certificate is public.
* - mostly confident because the client could still be presented with a split view of the log, but that attack is much harder to mount, especially when Signed Tree Heads are distributed to Chrome clients centrally.
On Apr 4, 2016 11:10 AM, "Fabrice Gautier" <fabrice...@gmail.com> wrote:
>
> Ah, I was under the impression that that list - being signed by Google
> - was the "official" reference.
>
> Is there another list I'm missing, or is the chromium source code the
> official reference ?
>The official reference is the source (and this is clarified on the Chromium CT page that includes the policies)
On Monday, April 4, 2016 at 11:28:11 AM UTC-7, Ryan Sleevi wrote:
On Apr 4, 2016 11:10 AM, "Fabrice Gautier" <fabrice...@gmail.com> wrote:
>
> Ah, I was under the impression that that list - being signed by Google
> - was the "official" reference.
>
> Is there another list I'm missing, or is the chromium source code the
> official reference ?
>The official reference is the source (and this is clarified on the Chromium CT page that includes the policies)
Note that the link to the source code on that page (https://www.chromium.org/Home/chromium-security/certificate-transparency) is broken right now.