Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Are there any initiatives to apply C2PA to HTTPS/TLS non-repudiation so that servers hosting content become part of the chain of custody? #44

Open
pirate opened this issue Jan 14, 2024 · 3 comments
Assignees

Comments

@pirate
Copy link

pirate commented Jan 14, 2024

Right now HTTPS/TLS does not support non-repudiation. https://security.stackexchange.com/questions/103645/does-ssl-tls-provide-non-repudiation-service

It's a huge problem for internet archiving, legal cases, and journalism because no one can provably verify that a server provided some specific content (without having to trust the client who recorded it to have not tampered with the recording).

Addressing the lack of non-repudiation could be done by signing packets inside a TLS session (or using some of the other providence techniques discussed by C2PA), and would allow the server hosting content to be provably part of the chain-of-custody.

This solves the problems of:

  • a client presenting some web content thats been tampered with as authentic (e.g. a screenshot + fake WARC recording of a new york times page) in court when in fact the server served some different traffic
  • hosts taking something down and denying that they ever hosted it after-the-fact, or presenting different content to each user
  • and many more...
@lrosenthol
Copy link
Contributor

@pirate Interesting concept! No, we haven't discussed this specific area. We have had some previous conversions about WARC, Internet Archives and such - but nothing about how TLS certs (or just server identity) applies.

Definitely something for us to consider!

@lrosenthol lrosenthol self-assigned this Jan 17, 2024
@barnjamin
Copy link

I'd like to second this!

It'd be great to allow alternate Certificate Profiles to still produce Content Credentials. Maybe with some trade off in the trust model since they're easier to get?

FWIW I couldn't find any mention of non-repudiation in the spec but it is in the rust cert validation

@pirate
Copy link
Author

pirate commented Oct 4, 2024

In the meantime, https://tlsnotary.org/ has done some incredible work in this area, they figured out how to do a ZK proof with a witness server. It allows for signed attestation of a TLS session content by 3rd parties without having to share the cleartext with them or modify the TLS protocol at all.

Of course it would still be great to have other solutions too, protocl-layer or not :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants