Attack and Threat Model for Certificate Transparency
draft-ietf-trans-threat-analysis-16
Document | Type |
Expired Internet-Draft
(trans WG)
Expired & archived
|
|
---|---|---|---|
Author | Stephen Kent | ||
Last updated | 2019-04-08 (Latest revision 2018-10-05) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | WG Document | |
Document shepherd | Melinda Shore | ||
IESG | IESG state | Expired | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | "Melinda Shore" <melinda.shore@gmail.com> |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document defines an attack model and discusses threats based on the system design presented in [I-D.ietf-trans-rfc6962-bis]. It analyzes potential vulnerabilities associated with that design, and considers compromises of system elements and malicious behavior by such elements. It does not consider implementation vulnerabilities, including ones that might enable denial of service attacks against these elements.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)