Timeline


and

30/07/14:

22:34 WikiStart edited by melinda.shore@…
Initial version, added implementation section (diff)
22:08 Ticket #43 (key rollover) created by kent@…
Section 9 alludes to key rollover, but does not address how this …
22:07 Ticket #42 (redacted cert dangers) created by kent@…
Section 7.3 alludes to the dangers of accepting an SCT for a redacted …
22:04 Ticket #41 (missing threat model and security analysis) created by kent@…
There is no threat model for CT, and thus nor analysis of how the …
22:03 Ticket #40 (Auditor behavior) created by kent@…
Section 5.4 purports to describe Auditor clients, but the text is very …
22:01 Ticket #39 (Monitor behavior) created by kent@…
Sectio 5.3 says that a monitor “watches for certificates of interest” …
22:00 Ticket #38 (Client Behavior: A separate document for specifying client behavior) created by kent@…
Section 5.2 contains some comments about TLS client behavior, but the …
21:57 Ticket #37 (client gossping) created by kent@…
Section 5 calls for clients to gossip, to detect inconsistent …
21:55 Ticket #36 (error indications for log/client exchanges) created by kent@…
Section 4 defines interfaces to logs for access by clients. it calls …
21:35 Ticket #35 (server SCT transmission restriction is misstated) created by kent@…
Section 3.4.1 explains how a client notifies a server that the client …
21:25 Ticket #34 (use of RFC 5246 syntax to define the SCT) created by kent@…
Section 3.3 defines the syntax of the SCT using the syntax developed …
21:17 Ticket #33 (Cert chain length as log metadata) created by kent@…
Section 3.1 notes that a log operator may limit the length of chains …
21:16 Ticket #32 (algorithm needed for client checks of SCT) created by kent@…
Section 3 does not detail the checks that a client is expected to …
21:16 Ticket #31 (incremental deployment and client behavior) created by kent@…
Section 3 states that a client MUST rejects that are not accompanied …
21:15 Ticket #30 (Publish MMD as log metadata) created by kent@…
Section 3 introduces the term “Maximum Merge Delay (MMD)” but no means …
21:15 Ticket #29 (what does "immediately" mean?) created by kent@…
Section 3 of 6962-bis says that a log operator MUST return an SCT …
21:14 Ticket #28 (Algorithm agility) created by kent@…
6962-bis does not address algorithm agility. Revise the document to …
21:11 Ticket #27 (Signature & hash alg specification) created by kent@…
Section 2.1.4 says that a log operator MUST use one of two specified …

29/07/14:

13:52 Ticket #20 (Do we want to be tied to TLS signing algorithms?) closed by eranm@…
fixed: If a hash/signature algorithm is not good enough to be used in TLS …

22/07/14:

10:29 Ticket #26 (Precertificates: Find alternative format to X.509) created by eranm@…
A fundamental problem with the existing Precertificates mechanism …

21/07/14:

15:25 Ticket #25 (Freezing a log's state) created by eranm@…
Describe a way to make a log read only. This is useful for: * A …

10/07/14:

16:53 Ticket #24 (Add a section about log metadata) created by eranm@…
Such a section should describe what is considered a log's metadata, …
15:45 Ticket #23 (How can TLS clients match an SCT to a certificate?) created by eranm@…
(Relevant to SCTs from stapled OCSP response and TLS handshake) …

07/07/14:

14:09 Ticket #22 (Explain why there are three delivery mechanisms for SCTs) created by benl@…
[EOM]
13:57 Ticket #21 (Clarify signature checking purpose and mechanism) created by benl@…
Signatures on submissions are checked to mitigate spam. Make this …

04/07/14:

15:57 Ticket #20 (Do we want to be tied to TLS signing algorithms?) created by benl@…
Russ Housley observes: In Section 2.1.4, this protocol supports two …
Note: See TracTimeline for information about the timeline view.