[cabfpub] Upcoming changes to Google Chrome's certificate handling

Sigbjørn Vik sigbjorn at opera.com
Fri Nov 8 10:00:41 UTC 2013


On 07-Nov-13 20:44, Jeremy Rowley wrote:

> 5)      Size. We do not support Google’s recommendation for three
> separate time stamps.  Two is sufficient to provide protection.  In
> fact, I’d prefer to include only a single proof in each certificate.  If
> you log a cert to multiple servers, you can include a new proof later on
> during re-issue, which minimizes concerns about log compromise. 
> Regardless, I do not think Google should dictate the number of logs. 
> Instead, each CA should individually evaluate the risks of a log
> compromise or unavailability and decide the number of proofs required.

There is an additional requirement I would like to see implemented on
the proofs, that at least one is issued by a log under a different
jurisdiction than the certificate. The threat scenario is a government
agency telling CAs "We want a certificate for this site and a forked log
proving it.", then deploying this in a closed network from where it will
never leak.

A log proof from the CA itself should never be considered sufficient, as
this makes authoritarian misconduct much easier. A requirement for
different jurisdictions would also make life easier for CAs, as they
don't have to worry about government interference.

-- 
Sigbjørn Vik
Opera Software



More information about the Public mailing list