Nope, not yet!
Idea:
| Scenario | Attack requirement | Attack |
|---|---|---|
| CA only (2016) | 1 CA | Rogue cert |
| CA + CT (today) | 1 CA + 2 CT | Rogue cert + fake SCTs |
| CA + CT + luCT (soon) | 1 CA + 2 CT | Rogue cert + forked logs |
| CA + CT + luCT + Gossip | 1 CA + 2 CT + checkpointer | Full eclipse? |
What if an attacker just submits a rogue certificate to honest logs, but the domain owners don't care to ever check logs for rogue certificates?
Idea:
The story does not end here!
Some ideas:
Transparency logs have applications outside of CT:
These systems have been successfully deployed:
Draft: draft-ietf-plants-merkle-tree-certs-02
Idea:
Motivated by large signatures of post-quantum crypto