Minutes IETF102: trans
minutes-102-trans-00
Meeting Minutes | Public Notary Transparency (trans) WG | |
---|---|---|
Date and time | 2018-07-19 13:30 | |
Title | Minutes IETF102: trans | |
State | Active | |
Other versions | plain text | |
Last updated | 2018-07-20 |
minutes-102-trans-00
Public Notary Transparency (trans) IETF 102: 11:00 - 12:00 19 July 2018 Chairs: Paul Wouters, Melinda Shore Minutes by Melinda Shore (video at https://www.youtube.com/watch?v=ioxoCb9nLfM) Status update ------------- 6962-bis has six open items to resolve to be able to close the document: 1) change status from "Proposed Standard" to "Experimental Standard": There was some confusion about what was meant by "experimental." There was agreement that the revision from 6962 to 6962-bis is extremely valuable and everybody plans to implement -bis, but it's going to take some time. There didn't seem to be any objection 2) In EKR's AD review, he asked that we remove the "preventing tracking clients" claim. Andrew Ayer disagrees, as we don't know yet how gossip is going to work, and it might not be possible to deploy gossip if there's concern that it's going to lead to tracking. We'll take it to the mailing list 3) Also in EKR's AD review, he asked that we remove the "no security implications" claim. EKR was not in the room, so we'll delay discussion until he's available 4) Fotis Loukos requested that we clarify what we mean by "current NTP time." There is no proposed text. Given how late this is in the process, if someone doesn't give us text there's nothing to talk about, so if someone feels strongly about this they should contribute text. Nobody expressed concern. Fotis should produce text, or we'll drop it. 5) Using JSON format for error reporting: concern was that in some cases intermediates were being rate-limited but didn't know what the actual problem was. Corey Bonnell is going to produce text. Tim Hollebeek was concerned about making it mandatory and asked if it was going to be a SHOULD. We'll have it be a SHOULD for now, and if it works well we'll turn it into a MUST when the document is published as a proposed standard. 6) Option for CT logs to signal when rejections were due to rate limiting: this is covered by the proposal to use the JSON error reporting format Trans threat analysis --------------------- There hasn't been much progress and we don't want to keep the working group open for just this document. There doesn't seem to be much interest among working group participants. Rich Salz thinks we should flip a coin to settle the difference - he thinks the document has value. Paul and Melinda will discuss it after the meeting and take it back out to the mailing list. Other documents --------------- Gossip, binaries logging, and client behavior: if there's progress on those documents we can take it to a new working group. We don't need to remain open for those. NTIA is holding a workshop on software module transparency, and a specification may come out of that (wrt binary transparency), and Paul has a proposal for DNS transparency that doesn't reuse the CT format, so is probably a fit for another group. Redaction --------- Ben Schwartz asked about redaction and IP address certificates. Paul said that the people who are interested in working on that should write it up and organize a BOF. Tim Hollebeek said that the lack of activity on this is due entirely to the browser community, and that there are CAs who continue to be interested in doing something about redaction. None of the current methods work particularly well. Tim encouraged people who are interested in this to have discussions with browser root programs and to see if they can get some interest there, but this working group doesn't need to hang around for that. Ben pointed out that IP address certificates have very different security properties, and he's concerned about creating a situation in which there's an enumeration of every address that's ever requested an IP certificate. Tim said that IP certificates are rare and they have a number of issues, so they're being discussed actively in the CA/B Forum. Devin from Google Chrome asked why logging IP certificates is particularly concerning. Ben's use cases are services operated by clients that they want to be able to use securely from a browser but that they don't want publicly known. IPv4 addresses can be trivially enumerated but IPv6 addresses cannot, and he'd prefer if they weren't logged in CT logs. Tim pointed out that this conflicts with the "transparency" aspect of CT and he doesn't know how to weigh the tradeoffs. In existing redaction cases it turns out that people thought they were doing a better job of hiding things than they were. For example, most of the certificates not logged by Symantec ended up being logged by Google, anyway. EKR's review concerns --------------------- He's happy to go along with the working group decision on the "preventing tracking clients" text. His concern is that the text says "don't use deterministic signatures" and in the meantime the IETF is pushing people using RSA towards PSS, so those seem to be in conflict. He's not pressing towards any particular resolution. With respect to the "no security implications" text, it's fine with him. Andrew Ayer said that he thinks there was some confusion about this was in there in the first place. The original intent was anti-spam, but Andrew pointed out that it's not just anti-spam, but to link every certificate back to a certificate authority so that browsers can take action if there's a problem. So, there is a security implication and it's not just anti-spam. EKR suggested it would be useful if someone would add some text to that effect. The PR does include explanatory text. EKR: "looks good to me." He expects a new draft relatively soon. Shutting down ------------- Paul asked what happens to unfinished working items when a working group closes down. Alissa says that it's up to us, and the options are that the documents can be AD-sponsored, or they can just expire. For example, the gossip draft could potentially be AD-sponsored. Alissa said that we should keep the wg open until the -bis document is finished, and we might as well progress the other documents while we're open. Devin from Chrome asked what should be done if his group comes up with new proposals - where should those those be taken? We could potentially spin up a new working group. Chrome is hoping to have initial feedback around the time of IETF 104. EKR said that if what's found would just involve small changes, we could essentially rebadge 6962-bis as a proposed standard. If the changes are not small, we could spin up a new working group. Tim will probably have proposed improvements before 104, and he thinks they'll mostly take the form of new features rather than changes to the existing protocol. Those are better handled as new drafts rather than as -bis-bis. Alissa: close the group but keep the mailing list.