On Fri, Jul 7, 2023 at 1:21 PM Dennis Jackson <i...@dennis-jackson.uk>
wrote:

> Thank you for the comments. I'll fix most of them - responses inline for
> the rest:
>
> On 07/07/2023 17:38, Eric Rescorla wrote:
>
> S 3.1.2.
>
>    7.  Order the list by the date each certificate was included in the
>        CCADB, breaking ties with the lexicographic ordering of the
>        SHA256 certificate fingerprint.
>
> Would it be simpler to just sort by the hash?
>
> Possibly a premature optimization, but I was thinking that if a new
> version only included new certificates, it'd be nice to only have to append
> the new data to the existing dictionaries. I haven't yet worked out if
> that's actually going to deliver anything useful though.
>

Fair enough.


>
>        1.  If so, replace the opaque cert_data member of
>            CertificateEntry with its adjusted three byte identifier and
>            copy the CertificateEntry structure with corrected lengths to
>            the output.
>
> It seems like this is not injective in the face of certificates
> whose length is greater than or equal to 0xff0000. That's probably
> not a problem, but I think you should make it clear and have some
> way to manage it.
>
> If the length is corrected, isn't the only risk a collision with a
> certificate which is exactly three bytes and starts with 0xff?
>
Ah yes, I had forgotten about the length value. This indeed seems fine.

S 3.2.1
> How much value are you getting from the CT logs? It seems like
> additional complexity. I agree with your comment about having
> this submitted to CCADB.
>
> It seemed the fairest repeatable way to check whether a CA was offering
> certificates to WebPKI clients without having to write a lot of emails. I
> agree its not desirable to keep as a dependency in the long run.
>
Can you elaborate on the concern here? I.e., is it that we will overinclude
or underinclude if we just use CCADB?

Thanks,
-Ekr

S 5.1.
> ISTM that there are plenty of code points available.
>
> Thanks!
>
> Best,
> Dennis
>
>
>
>
>
>
>
>
> On Thu, Jul 6, 2023 at 3:18 PM Dennis Jackson <ietf=
> 40dennis-jackson...@dmarc.ietf.org> wrote:
>
>> Hi all,
>>
>> I've submitted the draft below that describes a new TLS certificate
>> compression scheme that I'm calling 'Abridged Certs' for now. The aim is
>> to deliver excellent compression for existing classical certificate
>> chains and smooth the transition to PQ certificate chains by eliminating
>> the root and intermediate certificates from the bytes on the wire. It
>> uses a shared dictionary constructed from the CA certificates listed in
>> the CCADB [1] and the associated extensions used in end entity
>> certificates.
>>
>> Abridged Certs compresses the median certificate chain from ~4000 to
>> ~1000 bytes based on a sample from the Tranco Top 100k. This beats
>> traditional TLS certificate compression which produces a median of ~3200
>> bytes when used alone and ~1400 bytes when combined with the outright
>> removal of CA certificates from the certificate chain. The draft
>> includes a more detailed evaluation.
>>
>> There were a few other key considerations. This draft doesn't impact
>> trust decisions, require trust in the certificates in the shared
>> dictionary or involve extra error handling. Nor does the draft favor
>> popular CAs or websites due to the construction of the shared
>> dictionary. Finally, most browsers already ship with a complete list of
>> trusted intermediate and root certificates that this draft reuses to
>> reduce the client storage footprint to a few kilobytes.
>>
>> I would love to get feedback from the working group on whether the draft
>> is worth developing further.
>>
>> For those interested, a few issues are tagged DISCUSS in the body of the
>> draft, including arrangements for deploying new versions with updated
>> dictionaries and the tradeoff between equitable CA treatment and the
>> disk space required on servers (currently 3MB).
>>
>> Best,
>> Dennis
>>
>> [1] Mozilla operates the Common CA Database on behalf of Apple,
>> Microsoft, Google and other members.
>>
>> On 06/07/2023 23:11, internet-dra...@ietf.org wrote:
>> > A new version of I-D, draft-jackson-tls-cert-abridge-00.txt
>> > has been successfully submitted by Dennis Jackson and posted to the
>> > IETF repository.
>> >
>> > Name:         draft-jackson-tls-cert-abridge
>> > Revision:     00
>> > Title:                Abridged Compression for WebPKI Certificates
>> > Document date:        2023-07-06
>> > Group:                Individual Submission
>> > Pages:                19
>> > URL:
>> https://www.ietf.org/archive/id/draft-jackson-tls-cert-abridge-00.txt
>> > Status:
>> https://datatracker.ietf.org/doc/draft-jackson-tls-cert-abridge/
>> > Html:
>> https://www.ietf.org/archive/id/draft-jackson-tls-cert-abridge-00.html
>> > Htmlized:
>> https://datatracker.ietf.org/doc/html/draft-jackson-tls-cert-abridge
>> >
>> >
>> > Abstract:
>> >     This draft defines a new TLS Certificate Compression scheme which
>> >     uses a shared dictionary of root and intermediate WebPKI
>> >     certificates.  The scheme smooths the transition to post-quantum
>> >     certificates by eliminating the root and intermediate certificates
>> >     from the TLS certificate chain without impacting trust negotiation.
>> >     It also delivers better compression than alternative proposals
>> whilst
>> >     ensuring fair treatment for both CAs and website operators.  It may
>> >     also be useful in other applications which store certificate chains,
>> >     e.g.  Certificate Transparency logs.
>> >
>> >
>>
>> >
>> >
>> > The IETF Secretariat
>> >
>> >
>>
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>>
>
> _______________________________________________
> TLS mailing listTLS@ietf.orghttps://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to