Skip to main content

Attack and Threat Model for Certificate Transparency
draft-ietf-trans-threat-analysis-16

Document Type Expired Internet-Draft (trans WG)
Expired & archived
Author Stephen Kent
Last updated 2019-04-08 (Latest revision 2018-10-05)
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state WG Document
Revised I-D Needed - Issue raised by WGLC
Document shepherd Melinda Shore
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to "Melinda Shore" <melinda.shore@gmail.com>

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document defines an attack model and discusses threats based on the system design presented in [I-D.ietf-trans-rfc6962-bis]. It analyzes potential vulnerabilities associated with that design, and considers compromises of system elements and malicious behavior by such elements. It does not consider implementation vulnerabilities, including ones that might enable denial of service attacks against these elements.

Authors

Stephen Kent

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)