Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sunlight: require binary comparison in chain building #69

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

@benlaurie
Copy link

In my experience it is not always possible to build a chain from available information. This level of ad-hocness makes me unhappy. Why stop requiring a correct chain?

@FiloSottile
Copy link
Contributor Author

@benlaurie I'm not sure I understand. We'd still require a correct chain on submission. We would additionally require simple Issuer/Subject comparison, to make it easier for monitors to rebuild the chain from a list of issuers, instead of including them with every leaf, which wastes a lot of bandwidth.

@benlaurie
Copy link

benlaurie commented Apr 8, 2024 via email

@FiloSottile
Copy link
Contributor Author

How do the issuers get the cert in the chain?

Chains are built and submitted like usual, no changes there. Sunlight logs take every issuer (roots and intermediates) from every chain that was submitted to the log, deduplicate them, and present them in the issuers bundle.

@aditsachde
Copy link

I've been looking at the feasibility of adapting a sunlight log to the RFC 6962 monitoring interface using a proxy, as proposed in sunlight.md, mostly as a learning exercise. The complexity mentioned by @AGWA on ct-policy@ shows up here as well, and I found that the best way to solve it is to just have the proxy store the fingerprints of the certificates in the chain. Other approaches add too much compute overhead relative to the cost of just storing the fingerprints and introduce a risk of not being able to exactly rebuild the submitted chain.

Looking at the number of entries in the Argon 2023 (1831993885) and Xenon 2023 (2079641353) shards, considering an average of 2 certificates/fingerprint in the chain, and 32 bytes per fingerprint, the additional storage overhead for a yearlong shard would be under 0.15 TB, or less than $4 per month on S3 (and less on average if considering the full life of the log). It seems like the ecosystem would be better served by Sunlight logs directly storing and serving fingerprints of the certificates that make up the submitted chain.

@benlaurie
Copy link

benlaurie commented Apr 8, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants