Account confirmers, Anti-spam team, Confirmed users, Bureaucrats and Sysops emeriti
4,925
edits
Rick.andrews (talk | contribs) (Added some comments based on experience with Symantec customers) |
(A few clean-ups) |
||
Line 11: | Line 11: | ||
===== Response ===== | ===== Response ===== | ||
In Chrome at least, which is currently the only browser that checks CT, enterprises already have this capability via enterprise policies, which do not require the installation of a specific root CA. I.e. they can turn off the CT requirement for particular roots. | In Chrome at least, which is currently the only browser that checks CT, enterprises already have this capability via enterprise policies, which do not require the installation of a specific root CA. I.e. they can turn off the CT requirement for particular roots. However, Chrome's enterprise policy requires a list of all domain names that may appear in non-logged certs, and some enterprise customers have said they manage hundreds of domains that change frequently, so this approach may have challenges. It would be useful to know which reasons for redaction are of interest to such customers; it can't be the "concealing network topography" reason, because surely no company has a list of hundreds of internal-use domains which change frequently. | ||
However, Chrome's enterprise policy requires a list of all domain names that may appear in non-logged certs, and some enterprise customers manage hundreds of domains that change frequently. | |||
=== Concealing Network Topography === | === Concealing Network Topography === | ||
Line 39: | Line 37: | ||
===== Response ===== | ===== Response ===== | ||
Why would someone DOS a random camera just because it was there? | Why would someone DOS a random camera somewhere else on the Internet just because it was there? | ||
=== Logging Reveals Geolocation Information === | === Logging Reveals Geolocation Information === | ||
Line 57: | Line 55: | ||
=== Logging Reveals Personally Identifiable Information === | === Logging Reveals Personally Identifiable Information === | ||
Certificates used for S/MIME, code digning, and digital signatures contain various forms of Personally Identifiable Information (PII). | |||
===== Response ===== | ===== Response ===== | ||
Currently there | Currently there are no applications that use and make trust decisions based on SCTs for these types of certificates, and so their consideration is out of scope for this discussion. | ||
== Against == | == Against == |