Attack and Threat Model for Certificate Transparency
draft-ietf-trans-threat-analysis-16

Document Type Expired Internet-Draft (trans WG)
Last updated 2019-04-08 (latest revision 2018-10-05)
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream WG state WG Document
Revised I-D Needed - Issue raised by WGLC
Document shepherd Melinda Shore
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to "Melinda Shore" <melinda.shore@gmail.com>

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-trans-threat-analysis-16.txt

Abstract

This document defines an attack model and discusses threats based on the system design presented in [I-D.ietf-trans-rfc6962-bis]. It analyzes potential vulnerabilities associated with that design, and considers compromises of system elements and malicious behavior by such elements. It does not consider implementation vulnerabilities, including ones that might enable denial of service attacks against these elements.

Authors

Stephen Kent (kent@alum.mit.edu)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)