On 29/06/2024 00:14, David Benjamin wrote:

We have published a second, related draft, TLS Trust Anchor Identifiers. This draft outlines a separate mechanism we had considered during the design of TLS Trust Expressions, and is intended to solve many of the same problems that Trust Expressions does. Some of the feedback we received about TLS Trust Expressions renewed our interest in this approach.

I’ve reviewed the Trust Anchors draft and although I understand the motivation for an alternative to Trust Expressions, I feel many of the same concerns with Trust Expressions around effectiveness, complexity and risk of abuse apply equally to the Trust Anchors design.

I’ve produced two documents to outline these concerns and summarize mailing list conversation so far. The first [1] tackles the concerns about the risks of abuse and the second [2] tackles issues with the proposed use cases. I hope both are useful for folks wanting to come up to speed on the discussion on the mailing list ahead of the meeting next week.

We are planning to add a further document on detailed risk scenarios, as best as we can articulate them, regarding the “surveillance and possible future legislation” discussions on the list. This document isn’t quite ready but we will follow up with the list when it is.

I hope the mentioned summary [1] of the risks and concerns around Trust Expressions and Trust Anchors will be useful if you’re still planning to produce your own document tackling these issues. It covers the key concerns that were discussed on the mailing list, in particular, the risks of fragmenting the WebPKI, the risks of abuse for building domestic root programs for surveillance, and the impact of on client privacy by exposing the client’s root store.

We added a PKI transition strategies document with a more detailed discussion of some transition scenarios, and how various alternatives we have considered apply to them:

I’ve tried to develop this discussion in my comments on the use cases [2]. In brief, although both drafts are positioned as solving a broad range of problems, I feel that many of the problems are quite minor and largely not well motivated. Further, examining the proposed use cases in detail suggests that both drafts rely on quite optimistic assumptions about deployment that will not be possible to satisfy in practice.

I do think managing the transition to a Post-Quantum WebPKI is perhaps the most interesting problem, but as discussed in the linked comments, I don’t think Trust Expressions or Trust Anchors offers an improvement over much simpler alternatives which are already widely supported and so do not incur the complex implementation, operational and organizational challenges of these proposals.

I’m also concerned that some of your comments in the explainer either misunderstand or misrepresent the existing approaches like Abridged Certificate Compression which functions quite differently to the way you claim.

For those heading to Vancouver, safe travels and see you next week!

Best,
Dennis


[1] https://github.com/dennisjackson/trust-negotiation-comments/blob/main/concerns-and-risks.md

[2] https://github.com/dennisjackson/trust-negotiation-comments/blob/main/comments-on-usecases.md

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to