SlideShare a Scribd company logo
Balancing Customer Privacy
with Transparency
Certificate Transparency: RFC 6962
The CT log (public database) contains either a copy of
the full certificate or a “pre-certificate” which contains
all the elements of the certificate except embedded CT
information.
Client support
• Mozilla Firefox – 2017
• Apple – iOS 10 and macOS Sierra allows applications to require CT
• Chrome – EV since 2015, all new certs starting Oct 2017
• OpenSSL 1.0.2 (no validation, just parsing)
Mozilla and Apple have not yet published information on which logs
they trust or policy on accepting logs
Information Disclosure
• Fully Qualified Domain Names
• secret.projects.example.com
• Subject Attributes
• Individual names
• Addresses
• Company affiliation
• Association with CA
• Corporate CA issuing any kind of certificate for a domain may be informative
(metadata FTW)
RFC 6962-bis
(bis is French for again or encore)
Calls out two options for privacy
1. Use wildcards (allows privacy for left most label)
2. Use Name Constrained subordinate CAs
Separate Draft proposes a third option
3. Pre-certificates with some subject information omitted
Choosing a certificate profile with less subject information is also an
option.
Use cases for privacy
• Binding of domain name to corporate entity (domain name uses proxy
registration)
• PII in certain certificate types (Qualified?)
• Overly descriptive labels in FQDNs (provides a blueprint of network
topology)
• Disclosure of confidential projects (e.g. newthing.example.com or
fordacquisition.gm.com) – may become public at a future point
Technical Implementations of DNS Privacy
• Private DNS subtree (e.g. corp.example.com subtree is permanently
private)
• Split Horizon DNS (e.g. two copies of the DNS zone)
• DNSSEC added NSEC3 to avoid disclosure of record names to address
similar concerns
IETF Public Notary Transparency (“trans”) WG
https://datatracker.ietf.org/wg/trans/charter/
https://www.ietf.org/mailman/listinfo/trans

More Related Content

PDF
Red Office Documents Security Proposal
PPTX
Andres
PDF
02 - Blockchain Technology - Blockchain Security
PDF
01 - Blockchain technology - Basics
PPT
Ch32
PDF
Magento 2 Seminar - Andra Lungu - API in Magento 2
PDF
HTTP OW 3000 mVt(3Vt) zelenaya lazernaya ukazka vodozashchishchennaya portati...
PPTX
Plan anual de trabajo
Red Office Documents Security Proposal
Andres
02 - Blockchain Technology - Blockchain Security
01 - Blockchain technology - Basics
Ch32
Magento 2 Seminar - Andra Lungu - API in Magento 2
HTTP OW 3000 mVt(3Vt) zelenaya lazernaya ukazka vodozashchishchennaya portati...
Plan anual de trabajo

Viewers also liked (11)

DOCX
Fall 2016 State of the Arts NYC Newsletter
PPTX
spring bed double
PPTX
Flyinbuy español jose luis jimenez moreno
PPTX
Sistema endocrino
PPTX
Gasto cardiaco
PPTX
Feminicidio
PPTX
Circulación
DOCX
AFINTINNI's R.resume
PPT
La Isla de los Caimanes
PDF
Colores de la carta
PPT
Exposicion planetas de ondas circulares
Fall 2016 State of the Arts NYC Newsletter
spring bed double
Flyinbuy español jose luis jimenez moreno
Sistema endocrino
Gasto cardiaco
Feminicidio
Circulación
AFINTINNI's R.resume
La Isla de los Caimanes
Colores de la carta
Exposicion planetas de ondas circulares
Ad

Similar to Balancing Customer Privacy with Transparency (20)

PPTX
CryptoStandards and protocols for digital secure communications
PPT
E-mail Security in Network Security NS5
PPT
ITE v5.0 - Chapter 6
PPTX
Ccna v5-S1-Chapter 10
PPTX
9. Application Layer9. Application Layer.pptx
PPTX
Parallel and distributed computing .pptx
PPTX
Chapter 10 : Application layer
PDF
CCNAv5 - S1: Chapter 10 Application Layer
PDF
Network security cs9 10
PPT
PDF
CNS - Unit v
PDF
Oci meetup v1
PDF
Oracle Cloud Infraestructure Update
PDF
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
PPTX
Lecture Notes- Network Services - Copy.pptx
PPTX
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
PDF
Lec 8.pptx.pdf
PDF
Storage Made Easy - File Fabric Use Cases
PPT
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
PDF
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
CryptoStandards and protocols for digital secure communications
E-mail Security in Network Security NS5
ITE v5.0 - Chapter 6
Ccna v5-S1-Chapter 10
9. Application Layer9. Application Layer.pptx
Parallel and distributed computing .pptx
Chapter 10 : Application layer
CCNAv5 - S1: Chapter 10 Application Layer
Network security cs9 10
CNS - Unit v
Oci meetup v1
Oracle Cloud Infraestructure Update
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
Lecture Notes- Network Services - Copy.pptx
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Lec 8.pptx.pdf
Storage Made Easy - File Fabric Use Cases
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
Ad

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PDF
Network Security Unit 5.pdf for BCA BBA.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Modernizing your data center with Dell and AMD
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.

Balancing Customer Privacy with Transparency

  • 2. Certificate Transparency: RFC 6962 The CT log (public database) contains either a copy of the full certificate or a “pre-certificate” which contains all the elements of the certificate except embedded CT information.
  • 3. Client support • Mozilla Firefox – 2017 • Apple – iOS 10 and macOS Sierra allows applications to require CT • Chrome – EV since 2015, all new certs starting Oct 2017 • OpenSSL 1.0.2 (no validation, just parsing) Mozilla and Apple have not yet published information on which logs they trust or policy on accepting logs
  • 4. Information Disclosure • Fully Qualified Domain Names • secret.projects.example.com • Subject Attributes • Individual names • Addresses • Company affiliation • Association with CA • Corporate CA issuing any kind of certificate for a domain may be informative (metadata FTW)
  • 5. RFC 6962-bis (bis is French for again or encore) Calls out two options for privacy 1. Use wildcards (allows privacy for left most label) 2. Use Name Constrained subordinate CAs Separate Draft proposes a third option 3. Pre-certificates with some subject information omitted Choosing a certificate profile with less subject information is also an option.
  • 6. Use cases for privacy • Binding of domain name to corporate entity (domain name uses proxy registration) • PII in certain certificate types (Qualified?) • Overly descriptive labels in FQDNs (provides a blueprint of network topology) • Disclosure of confidential projects (e.g. newthing.example.com or fordacquisition.gm.com) – may become public at a future point
  • 7. Technical Implementations of DNS Privacy • Private DNS subtree (e.g. corp.example.com subtree is permanently private) • Split Horizon DNS (e.g. two copies of the DNS zone) • DNSSEC added NSEC3 to avoid disclosure of record names to address similar concerns
  • 8. IETF Public Notary Transparency (“trans”) WG https://datatracker.ietf.org/wg/trans/charter/ https://www.ietf.org/mailman/listinfo/trans