diff options
author | Rasmus Dahlberg <rasmus.dahlberg@kau.se> | 2021-06-30 21:08:37 +0200 |
---|---|---|
committer | Rasmus Dahlberg <rasmus.dahlberg@kau.se> | 2021-10-02 00:54:13 +0200 |
commit | 3690372114a03d4ce26307cbd2f466817c6fa338 (patch) | |
tree | 014b8db9e886f2db0a1643d42ef3390dd8f37f83 /doc | |
parent | c3c29abea43e2553c86c9753f119627a3697d1fd (diff) |
started to restructure and refactor the q/a section
Diffstat (limited to 'doc')
-rw-r--r-- | doc/design.md | 100 |
1 files changed, 34 insertions, 66 deletions
diff --git a/doc/design.md b/doc/design.md index 6031af7..02af4e3 100644 --- a/doc/design.md +++ b/doc/design.md @@ -317,77 +317,45 @@ TODO: add complete system overview. See drafty figure in archive. ``` ### A peek into the details -TODO: not refactored from here on. - Our bird's view introduction skipped many details that matter in practise. Some of these details are presented here using a question-answer format. A question-answer format is helpful because it is easily modified and extended. -#### What cryptographic primitives are supported? -The only supported hash algorithm is SHA256. The only supported signature -scheme is Ed25519. Not having any cryptographic agility makes the protocol less -complex and more secure. - -We can be cryptographically opinionated because of a key insight. Existing -signature tools like `gpg`, `ssh-keygen -Y`, and `signify` cannot verify proofs -of public logging. Therefore, _additional tooling must already be installed by -end-users_. That tooling should verify hashes using the log's hash function. -That tooling should also verify signatures using the log's signature scheme. -Both tree heads and tree leaves are being signed. - -#### Why not let the data publisher pick their own signature scheme and format? -Agility introduces complexity and difficult policy questions. For example, -which algorithms and formats should (not) be supported and why? Picking Ed25519 -is a current best practise that should be encouraged if possible. - -There is not much we can do if a data publisher _refuses_ to rely on the log's -hash function or signature scheme. - -#### What if the data publisher must use a specific signature scheme or format? -They may _cross-sign_ the data as follows. -1. Sign the data as they're used to. -2. Hash the data and use the result as the leaf's checksum to be logged. -3. Sign the leaf using the log's signature scheme. - -For verification, the end-user first verifies that the usual signature from step 1 is valid. Then the -end-user uses the additional tooling (which is already required) to verify the rest. -Cross-signing should be a relatively comfortable upgrade path that is backwards -compatible. The downside is that the data publisher may need to manage an -additional key-pair. +#### What is the point of having a shard hint? +Unlike X.509 certificates which already have validity ranges, a checksum does +not carry any such information. Therefore, we require that a claimant selects a +_shard hint_. The selected shard hint must be in the log's _shard interval_. A +shard interval is defined by a start time and an end time. Both ends of the +shard interval are inclusive and expressed as the number of seconds since the +UNIX epoch (January 1, 1970 00:00 UTC). + +Without sharding, a good Samaritan can add all leaves from an old log into a +newer one that just started its operations. This makes log operations +unsustainable in the long run because log sizes will grow indefinitely. + +Such re-logging also comes at the risk of activating someone else's rate limits. + +Note that _the claimant's shard hint is not a verified timestamp_. The +submitter should set the shard hint as large as possible. If a roughly verified +timestamp is needed, a cosigned tree head can be used instead. +#### How is the threat of log spam and poisoning reduced? +- Relates to: "why not log richer metadata and why not store the opaque data" +- Relates to: "why we removed identifier field from the leaf" +- Relates to: domain hint (maybe better as a separate heading) + +#### What are the details for witness cosigning? +- Relates to: explain `tree-head-latest`, `tree-head-to-sign` and +`tree-head-cosigned` + +#### What cryptographic primitives are supported? #### What (de)serialization parsers are needed? -#### What policy should be used? -#### Why witness cosigning? -#### Why sharding? -Unlike X.509 certificates which already have validity ranges, a -checksum does not carry any such information. Therefore, we require -that the submitter selects a _shard hint_. The selected shard hint -must be in the log's _shard interval_. A shard interval is defined by -a start time and an end time. Both ends of the shard interval are -inclusive and expressed as the number of seconds since the UNIX epoch -(January 1, 1970 00:00 UTC). - -Sharding simplifies log operations because it becomes explicit when a -log can be shutdown. A log must only accept logging requests that -have valid shard hints. A log should only accept logging requests -during the predefined shard interval. Note that _the submitter's -shard hint is not a verified timestamp_. The submitter should set the -shard hint as large as possible. If a roughly verified timestamp is -needed, a cosigned tree head can be used. - -Without a shard hint, the good Samaritan could log all leaves from an -earlier shard into a newer one. Not only would that defeat the -purpose of sharding, but it would also become a potential -denial-of-service vector. - -#### TODO -Add more key questions and answers. -- Log spamming -- Log poisoning -- Why we removed identifier field from the leaf -- Explain `latest`, `stable` and `cosigned` tree head. -- Privacy aspects -- How does this whole thing work with more than one log? +#### Are there any privacy concerns? + +#### Other +- How does it work with more than one log? +- What policy should a believer use? +- Coarse-grained vs fine-grained detectability properties +- \<insert more topics here\> ## Concluding remarks -Example of binary transparency and reproducible builds. |