Skip to main content

Public Notary Transparency
charter-ietf-trans-01

Yes

(Stephen Farrell)
(Ted Lemon)

No Objection

(Brian Haberman)
(Gonzalo Camarillo)
(Joel Jaeggli)
(Martin Stiemerling)

Note: This ballot was opened for revision 00-00 and is now closed.

Ballot question: "Is this charter ready for external review?"

Sean Turner Former IESG member
Yes
Yes (2014-01-22 for -00-03) Unknown
Let's call it:

LIMPID: Leave the Iesg out of Making names for Protocols are Internationally Deployed

:)

Says this having commented earlier on in their AD tenure against something called LSD .....
Stephen Farrell Former IESG member
Yes
Yes (for -00-00) Unknown

                            
Ted Lemon Former IESG member
Yes
Yes (for -00-03) Unknown

                            
Adrian Farrel Former IESG member
(was Block) No Objection
No Objection (2014-01-22 for -00-02) Unknown
Thanks for addressing my Blocking concern and the second of my Comments. I leave the unaddressed comment here in case it worries you that your current text is ambiguous and causes chuckles ("hashes of more-or-less anything that is structured in such a way as to provide...")

Would be nice to clean up the long sentences to avoid run-on subordinate
clauses that are ambiguous. Thus...
OLD
A
cryptographically verifiable log is an append-only log of hashes of more-or-less
anything that  is structured in such a way as to provide efficiently-accessible,
cryptographically-supported evidence of correct log behaviour.
NEW
A
cryptographically verifiable log is an append-only log of hashes of more-or-less
anything.  The log is structured in such a way as to provide efficiently-accessible,
cryptographically-supported evidence of correct log behaviour.
END
Barry Leiba Former IESG member
No Objection
No Objection (2014-01-20 for -00-00) Unknown
Here's my official comment about the name: "Transparency" won't do it.  Don't bikeshed on it, but come up with something better.
Brian Haberman Former IESG member
No Objection
No Objection (for -00-00) Unknown

                            
Gonzalo Camarillo Former IESG member
No Objection
No Objection (for -00-04) Unknown

                            
Jari Arkko Former IESG member
No Objection
No Objection (2014-01-21 for -00-00) Unknown
For some reason, I think the background motivation (mapping) and the main work item (cryptographic logs). Maybe I'm just slow today or it is too late, but I would have been happy with the explanation of cryptographic logs and that the working group is going to work on them. And I agree about the name with other ADs.
Joel Jaeggli Former IESG member
No Objection
No Objection (for -00-03) Unknown

                            
Martin Stiemerling Former IESG member
No Objection
No Objection (2014-02-04 for -00-05) Unknown

                            
Pete Resnick Former IESG member
(was Block) No Objection
No Objection (2014-01-22 for -00-03) Unknown
This at least clarifies it to the point that I understand what they intend to do. I still think it's a shame that they won't be able to work on generic CT for TLS (as against CT for HTTPS) without a re-charter, but that's between the proponents and Stephen.
Richard Barnes Former IESG member
No Objection
No Objection (2014-01-23 for -00-03) Unknown
COMMENT 1: 
It's important for this charter to be very clear about what logs do and do not do.  They do not correct errors; they only make them visible.  Then you use other things (e.g., cert revocation) to correct the errors.

OLD: "Cryptographically verifiable logs can help to ameliorate these
problems by making it possible to discover and rectify errors before
they can cause harm."
NEW: "Cryptographically verifiable logs can help to ameliorate these
problems by making it possible to discover errors quickly, so that other
mechanisms can be applied to rectify them."


COMMENT 2:
The paragraph starting "These logs can potentially also..." seems speculative and not especially helpful here.


COMMENT 3:
BLOCK 1:
The first deliverable seems to conflate a few things:
  1. How certs get into the logs
  2. How relying parties get information from the logs
  3. How relying parties use information from the logs in validation
The third of these seems quite different from the first two.  For example, the DANE considerations only apply to (3).  Would it be useful to disaggregate these into say two deliverables?  One for log operators (1/2), and one for clients (2/3)?
Spencer Dawkins Former IESG member
No Objection
No Objection (2014-01-19 for -00-00) Unknown
I agree with Barry's suggestion to change the fabulously vague name, and it looks like that's been accepted, modulo an actual suggestion that works :-)
Stewart Bryant Former IESG member
(was Block) No Objection
No Objection (2014-01-22 for -00-02) Unknown
Thanks for addressing my concern