Attack and Threat Model for Certificate Transparency
draft-ietf-trans-threat-analysis-16
Document | Type | Expired Internet-Draft (trans WG) | |
---|---|---|---|
Author | Stephen Kent | ||
Last updated | 2019-04-08 (Latest revision 2018-10-05) | ||
Stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
Stream | WG state | WG Document | |
Document shepherd | Melinda Shore | ||
IESG | IESG state | Expired | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | "Melinda Shore" <melinda.shore@gmail.com> |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-ietf-trans-threat-analysis-16.txt
https://www.ietf.org/archive/id/draft-ietf-trans-threat-analysis-16.txt
Abstract
This document defines an attack model and discusses threats based on the system design presented in [I-D.ietf-trans-rfc6962-bis]. It analyzes potential vulnerabilities associated with that design, and considers compromises of system elements and malicious behavior by such elements. It does not consider implementation vulnerabilities, including ones that might enable denial of service attacks against these elements.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)