uspki / policies

Certificate Policy development and drafting for Federal Public Trust Device PKI. For more information, email fpki@gsa.gov.
https://devicepki.idmanagement.gov
Other
42 stars 19 forks source link

CT Policy Days Discussion Topics #88

Closed TLSrUS closed 7 years ago

TLSrUS commented 7 years ago

CT Policy Days discussion topics - from 2/16/17 call

grandamp commented 7 years ago

With respect to the agenda item "Presentation: CT Standardization Roadmap":

Is there any intent to make use of Special Purpose Logs to alleviate other certificate lifecycle and management burdens? I.e., use of specialized logs for:

-Revoked End Entity certificates -Revoked Intermediates/Cross-certificates -Known Weak/Compromised/Massively Reused Keys -...

TLSrUS commented 7 years ago

CLASSIFICATION: UNCLASSIFIED

Todd:

Thanks for the suggestion - I added your question to the other CT Log questions and issues.

bd

lachellel commented 7 years ago

One of the breakout sessions was on threat modeling, and these three (3) topics were all discussed:

Notes will be posted and available for discussion.

Related topic to threat modeling was the collusion factor - (May there be any restrictions on USG running its own CT log?):

debcooley commented 7 years ago

Can you tell how many CAs and Browsers are represented?

It would be nice (and I'm sure we won't be the only ones to think this) if the browsers would standardize the number of CT logs required.

Do you know why a CA would choose to run more than one log?

Deb Cooley

techliaison commented 7 years ago

I didn’t count how many of each are attending, but there are log operators, people trying to run log auditor/monitoring programs as well as CAs and Browsers. I believe the “Browsers” attending include Mozilla, Apple, Microsoft and of course Google/Chrome. It sounds like so far only chrome is committed to requiring CT for all TLS certs. But some of the breakout sessions today will probably be about the question of how many logs should be required, how to deal with log lifecycle (how long it takes to get to “trusted status”, what to do if the log loses that status, how long it should be expected to be trusted, etc.)

Reasons for someone to run more than 1 log – May be related to the lifecycle concerns – the trees get very large and limiting their lifetimes may help with size & performance May want to run different logs potentially for certs with different validity periods