
From ynir@checkpoint.com  Thu Aug  2 11:18:14 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF84421E80C4; Thu,  2 Aug 2012 11:18:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.326
X-Spam-Level: 
X-Spam-Status: No, score=-10.326 tagged_above=-999 required=5 tests=[AWL=0.273, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oVZqVKvkAJt4; Thu,  2 Aug 2012 11:18:14 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id A486D21E80DF; Thu,  2 Aug 2012 11:18:13 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q72IIB04011132; Thu, 2 Aug 2012 21:18:11 +0300
X-CheckPoint: {501AC1CA-1-1B221DC2-4FFFF}
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Thu, 2 Aug 2012 21:18:10 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: Ben Campbell <ben@nostrum.com>
Date: Thu, 2 Aug 2012 21:18:09 +0300
Thread-Topic: Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
Thread-Index: Ac1w2yvprMHoxvR2RzOTiJG6heTTcA==
Message-ID: <C0912D8D-4DA8-4E0A-9C72-0AF917EE0F9E@checkpoint.com>
References: <50161BD5.7040901@KingsMountain.com> <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com>
In-Reply-To: <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, "draft-ietf-websec-strict-transport-sec.all@tools.ietf.org" <draft-ietf-websec-strict-transport-sec.all@tools.ietf.org>, IETF Discussion List <ietf@ietf.org>
Subject: Re: [websec] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Aug 2012 18:18:15 -0000

On Aug 2, 2012, at 10:46 AM, Ben Campbell wrote:

> Hi, thanks for the response.  Comments inline:
>=20
> On Jul 29, 2012, at 10:29 PM, =3DJeffH <Jeff.Hodges@kingsmountain.com> wr=
ote:
>=20
>>> -- I did not find any guidance on how to handle UAs that do not underst=
and
>>> this extension. I don't know if this needs to be normative, but the dra=
ft
>>> should at least mention the possibility and implications.
>>=20
>> Agreed. My -12 working copy now contains these new subsections..
>>=20
>> ###
>> 10.  Server Implementation and Deployment Advice
>>=20
>>  This section is non-normative.
>>=20
>> 10.1.  Non-Conformant User Agent Considerations
>>=20
>>  Non-conformant UAs ignore the Strict-Transport-Security header field,
>>  thus non-conformant user agents do not address the threats described
>>  in Section 2.3.1 "Threats Addressed".  Please refer to Section 14.1
>>  "Non-Conformant User Agent Implications" for further discussion.
>>=20
>>                      .
>>                      .
>>=20
>> 14.  Security Considerations
>>                      .
>>                      .
>> 14.1.  Non-Conformant User Agent Implications
>>=20
>>  Non-conformant UAs ignore the Strict-Transport-Security header field,
>>  thus non-conformant user agents do not address the threats described
>>  in Section 2.3.1 "Threats Addressed".
>>=20
>>  This means that the web application and its users wielding non-
>>  conformant user agents will be vulnerable to both:
>>=20
>>     Passive network attacks due to web site development and deployment
>>     bugs: For example, if the web application contains any insecure,
>>     non-"https", references to the web application server, and if not
>>     all of its cookies are flagged as "Secure", then its cookies will
>>     be vulnerable to passive network sniffing, and potentially
>>     subsequent misuse of user credentials.
>>=20
>>     Active network attacks: If an attacker is able to place a man-in-
>>     the-middle, secure transport connection attempts will likely yield
>>     warnings to the user, but without HSTS Policy being enforced, the
>>     present common practice is to allow the user to "click-through"
>>     and proceed.  This renders the user and possibly the web
>>     application open to abuse by such an attacker.
>>=20
>>  This is essentially the status-quo for all web applications and their
>>  users in the absence of HSTS Policy.
>> ###
>=20
> That's all good text, but I'm not sure it actually captures my concern.
>=20
> From the server's perspective, the fact that non-conformant UAs may exist=
, the server cannot assume that UAs will honor the extension. This means th=
at a UA might attempt unprotected access to some resource assumed to be pro=
tected by this extension. That is, the server can't merely select the exten=
sion and forget about things--it still needs to to take the same care to av=
oid leaking resources over unprotected connections that it would need to do=
 if this extension did not exist in the first place.
>=20
> I think this is implied by your last sentence above, but it would be bett=
er to say it explicitly.

Hi Ben

On this issue, it should be noted that there is never a guarantee that a UA=
 will respect this extension:
 - Older UAs and the latest and greatest Internet Explorer do not support t=
his
 - Any UA that has not visited this website yet may try to access insecurel=
y
 - Any UA that has visited this website, but has not done so within the tim=
e period may try to access insecurely

A server can use HSTS to reflect a "no HTTP" policy, but it cannot be used =
to enforce a "only clients that know I'm STS" policy. That is outside the s=
cope of the draft.

A DNS-based approach could solve the TOFU issue, but older clients (or thos=
e without access to the secure DNS) could always try to get things over HTT=
P

Yoav


From ynir@checkpoint.com  Thu Aug  2 11:40:33 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20B1021E8129 for <websec@ietfa.amsl.com>; Thu,  2 Aug 2012 11:40:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.331
X-Spam-Level: 
X-Spam-Status: No, score=-10.331 tagged_above=-999 required=5 tests=[AWL=0.267, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WF-cNcwwhobu for <websec@ietfa.amsl.com>; Thu,  2 Aug 2012 11:40:32 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 3311621E8128 for <websec@ietf.org>; Thu,  2 Aug 2012 11:40:31 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q72IeUPe013780 for <websec@ietf.org>; Thu, 2 Aug 2012 21:40:30 +0300
X-CheckPoint: {501AC705-6-1B221DC2-4FFFF}
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Thu, 2 Aug 2012 21:40:29 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: IETF WebSec WG <websec@ietf.org>
Date: Thu, 2 Aug 2012 21:40:27 +0300
Thread-Topic: [saag] WebSec status
Thread-Index: Ac1w3knOZJZOe76iTDeO/hhx8jqntg==
Message-ID: <B903AC47-343F-4674-A5E8-55ABE57238DE@checkpoint.com>
References: <3AACCB72-00F2-4CB5-992E-3578DB840461@checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: multipart/alternative; boundary="_000_B903AC47343F4674A5E855ABE57238DEcheckpointcom_"
MIME-Version: 1.0
Subject: [websec] Fwd: [saag] WebSec status
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Aug 2012 18:40:33 -0000

--_000_B903AC47343F4674A5E855ABE57238DEcheckpointcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Sorry. forgot to CC this list.

Begin forwarded message:

From: Yoav Nir <ynir@checkpoint.com<mailto:ynir@checkpoint.com>>
Subject: [saag] WebSec status
Date: August 2, 2012 9:15:07 AM PDT
To: "saag@ietf.org<mailto:saag@ietf.org>" <saag@ietf.org<mailto:saag@ietf.o=
rg>>

WebSec met at 9:00 AM on Tuesday morning.

HSTS is at IETF LC. All issues are resolved, and a new revision should go t=
o the IESG soon.
Cert Pinning is coming along, with several issues to be discussed on the li=
st
Still no editor for Mime-sniffing. If none is found soon, we may consider d=
ropping this item, but there are issues with HTML5 spec referencing it.
The Frame-Options drafts (X- and non-X-) are coming along OK, but the non-X=
 may become part of CSP and move to W3C

Yoav


--_000_B903AC47343F4674A5E855ABE57238DEcheckpointcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; ">Sorry. forgot to CC this l=
ist.<br><div><br><div>Begin forwarded message:</div><br class=3D"Apple-inte=
rchange-newline"><blockquote type=3D"cite"><div style=3D"margin-top: 0px; m=
argin-right: 0px; margin-bottom: 0px; margin-left: 0px;"><span style=3D"fon=
t-family:'Helvetica'; font-size:medium; color:rgba(0, 0, 0, 1.0);"><b>From:=
 </b></span><span style=3D"font-family:'Helvetica'; font-size:medium;">Yoav=
 Nir &lt;<a href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt;=
<br></span></div><div style=3D"margin-top: 0px; margin-right: 0px; margin-b=
ottom: 0px; margin-left: 0px;"><span style=3D"font-family:'Helvetica'; font=
-size:medium; color:rgba(0, 0, 0, 1.0);"><b>Subject: </b></span><span style=
=3D"font-family:'Helvetica'; font-size:medium;"><b>[saag] WebSec status</b>=
<br></span></div><div style=3D"margin-top: 0px; margin-right: 0px; margin-b=
ottom: 0px; margin-left: 0px;"><span style=3D"font-family:'Helvetica'; font=
-size:medium; color:rgba(0, 0, 0, 1.0);"><b>Date: </b></span><span style=3D=
"font-family:'Helvetica'; font-size:medium;">August 2, 2012 9:15:07 AM PDT<=
br></span></div><div style=3D"margin-top: 0px; margin-right: 0px; margin-bo=
ttom: 0px; margin-left: 0px;"><span style=3D"font-family:'Helvetica'; font-=
size:medium; color:rgba(0, 0, 0, 1.0);"><b>To: </b></span><span style=3D"fo=
nt-family:'Helvetica'; font-size:medium;">"<a href=3D"mailto:saag@ietf.org"=
>saag@ietf.org</a>" &lt;<a href=3D"mailto:saag@ietf.org">saag@ietf.org</a>&=
gt;<br></span></div><br><div>WebSec met at 9:00 AM on Tuesday morning.<br><=
br>HSTS is at IETF LC. All issues are resolved, and a new revision should g=
o to the IESG soon.<br>Cert Pinning is coming along, with several issues to=
 be discussed on the list<br>Still no editor for Mime-sniffing. If none is =
found soon, we may consider dropping this item, but there are issues with H=
TML5 spec referencing it.<br>The Frame-Options drafts (X- and non-X-) are c=
oming along OK, but the non-X may become part of CSP and move to W3C<br><br=
>Yoav<br></div></blockquote></div><br></body></html>=

--_000_B903AC47343F4674A5E855ABE57238DEcheckpointcom_--

From ben@nostrum.com  Thu Aug  2 10:46:17 2012
Return-Path: <ben@nostrum.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6EB611E81BC; Thu,  2 Aug 2012 10:46:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level: 
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SPF_PASS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVtHBLOq8qXu; Thu,  2 Aug 2012 10:46:16 -0700 (PDT)
Received: from nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id 4B07811E81AD; Thu,  2 Aug 2012 10:46:16 -0700 (PDT)
Received: from dhcp-625b.meeting.ietf.org (dhcp-625b.meeting.ietf.org [130.129.98.91]) (authenticated bits=0) by nostrum.com (8.14.3/8.14.3) with ESMTP id q72Hk62W012780 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 2 Aug 2012 12:46:11 -0500 (CDT) (envelope-from ben@nostrum.com)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.0 \(1485\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <50161BD5.7040901@KingsMountain.com>
Date: Thu, 2 Aug 2012 10:46:01 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com>
References: <50161BD5.7040901@KingsMountain.com>
To: =JeffH <Jeff.Hodges@kingsmountain.com>
X-Mailer: Apple Mail (2.1485)
Received-SPF: pass (nostrum.com: 130.129.98.91 is authenticated by a trusted mechanism)
X-Mailman-Approved-At: Thu, 02 Aug 2012 16:32:32 -0700
Cc: General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org, IETF Discussion List <ietf@ietf.org>
Subject: Re: [websec] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Aug 2012 17:46:18 -0000

Hi, thanks for the response.  Comments inline:

On Jul 29, 2012, at 10:29 PM, =3DJeffH <Jeff.Hodges@kingsmountain.com> =
wrote:
>=20
> > -- Does this draft update any other RFCs (e.g. 2616 or 2818)? If so, =
that
> > should be explicitly flagged and mentioned in the abstract.
>=20
> Good question, I don't believe we've discussed this possibility =
directly in the websec wg. In looking at the RFCs that do update =
RFC2616, it doesn't look like draft-ietf-websec-strict-transport-sec =
(HSTS) is of that ilk.
>=20
> However, it nominally appears that an argument could be made that it'd =
be appropriate to update RFC2818 via =
draft-ietf-websec-strict-transport-sec, specifically with regards to =
Section 2.1.  Connection Initiation.
>=20
> Though, RFC2818 is Informational, which may be an issue (?). Also, =
perhaps this is something to more appropriately do via a standards-track =
rfc2818bis, i.e., have the latter reference the HSTS spec.
>=20
> this is something to discuss this coming week @IETF-84 Vancouver it =
seems.
>=20
>=20

I will comment on this in response to your post-meeting email.


> > -- I did not find any guidance on how to handle UAs that do not =
understand
> > this extension. I don't know if this needs to be normative, but the =
draft
> > should at least mention the possibility and implications.
>=20
> Agreed. My -12 working copy now contains these new subsections..
>=20
> ###
> 10.  Server Implementation and Deployment Advice
>=20
>   This section is non-normative.
>=20
> 10.1.  Non-Conformant User Agent Considerations
>=20
>   Non-conformant UAs ignore the Strict-Transport-Security header =
field,
>   thus non-conformant user agents do not address the threats described
>   in Section 2.3.1 "Threats Addressed".  Please refer to Section 14.1
>   "Non-Conformant User Agent Implications" for further discussion.
>=20
>                       .
>                       .
>=20
> 14.  Security Considerations
>                       .
>                       .
> 14.1.  Non-Conformant User Agent Implications
>=20
>   Non-conformant UAs ignore the Strict-Transport-Security header =
field,
>   thus non-conformant user agents do not address the threats described
>   in Section 2.3.1 "Threats Addressed".
>=20
>   This means that the web application and its users wielding non-
>   conformant user agents will be vulnerable to both:
>=20
>      Passive network attacks due to web site development and =
deployment
>      bugs: For example, if the web application contains any insecure,
>      non-"https", references to the web application server, and if not
>      all of its cookies are flagged as "Secure", then its cookies will
>      be vulnerable to passive network sniffing, and potentially
>      subsequent misuse of user credentials.
>=20
>      Active network attacks: If an attacker is able to place a man-in-
>      the-middle, secure transport connection attempts will likely =
yield
>      warnings to the user, but without HSTS Policy being enforced, the
>      present common practice is to allow the user to "click-through"
>      and proceed.  This renders the user and possibly the web
>      application open to abuse by such an attacker.
>=20
>   This is essentially the status-quo for all web applications and =
their
>   users in the absence of HSTS Policy.
> ###

That's all good text, but I'm not sure it actually captures my concern.

=46rom the server's perspective, the fact that non-conformant UAs may =
exist, the server cannot assume that UAs will honor the extension. This =
means that a UA might attempt unprotected access to some resource =
assumed to be protected by this extension. That is, the server can't =
merely select the extension and forget about things--it still needs to =
to take the same care to avoid leaking resources over unprotected =
connections that it would need to do if this extension did not exist in =
the first place.

I think this is implied by your last sentence above, but it would be =
better to say it explicitly.


>=20
> >
> > -- How should a UA handle potential conflicts between a the policy =
record
> > that includes the includeSubdomain, and any records for subdomains =
that might
> > have different parameters?
>=20
> this is in the draft. the short answer is that at policy enforcement =
time, "superdomain matches win".
>=20
> At "noting an HSTS Host" time, the HSTS host's policy (if expressed) =
is noted regardless of whether there are superdomain HSTS hosts =
asserting "includeSubDomains".
>=20
> perhaps this needs to be made more clear?

Maybe I'm missing something, but I'm not getting that answer from the =
text. Can you point out the specific language?

>=20
>=20
> >
> > -- section 6.1:
> >
> > The draft mentions that directives may be extended, but defers =
creation of an
> > IANA registry to the time of first extension. IANA registries are =
not
> > expensive; I suggest it be created now. If there's a good reason not =
to, then
> > the draft should still address the specification policy for =
extensions.
> >
> > Also, do you expect that some future directive might need to have a
> > "required-to-understand" status? Given that this is a =
security-affecting
> > extension, it seems likely. If so, then the mechanism for expressing =
that
> > needs to be defined in this draft.
>=20
>=20
> These are good questions, and they beg the overall question of how =
complex this simple solution really needs to be and whether we really =
think we'll need any extensions. Something for us to discuss in the =
working group meeting on Tue morning I think.

I will comment on this in the post-meeting mail.

>=20
> >
> > -- section 7.2:
> >
> > Am I correct to assume that the server must never just serve the =
content over
> > a non-secure connection? If so, it would be helpful to mention that, =
maybe
> > even normatively.
>=20
> It's a SHOULD, see the Note in that section, so it's already =
effectively stated normatively, though one needs to understand HTTP =
workings to realize it in the way you stated it above.  Perhaps could =
add a simple statement as you suggest to the intro para for section 7 =
Server Processing Model, to address this concern?
>=20

I think something of the form SHOULD redirect to HTTPS, but MUST NOT =
under any circumstances send the content unprotected would improve the =
text. That's probably already implied, and a reasonable implementor =
wouldn't due it anyway. But my experience is that some readers will find =
strange interpretations whenever you give them the wiggle room to do so, =
so it's better to be explicit.

>=20
> >
> > -- section 8.4:
> >
> > Does this imply a duty for compliant UAs to check for revocation one =
way or
> > another?
>=20
> yes. though, per other relevant specifications, as duly cited. AFAIK =
the HSTS spec doesn't need to get into the details because the =
underlying security transport specs, namely TLS, already do this.

If that duty already exists, then I see no reason to add it here. But do =
the cited specs unambiguously _require_ revocation checks? I admit to =
not being an expert here, but on a quick scan it seems more like they =
say how you can do it, but do they say you have to?=20

[...]

>=20
> > -- section 1.2:
> >
> > The description of indented notes is almost precisely the opposite =
of how
> > they are described in the RFC editor's style guide. It describes =
them as
> > "parenthetical" notes, which is how experienced RFC readers are =
likely to
> > perceive them. While it doesn't say so explicitly, I think putting =
normative
> > text in parenthetical notes should be avoided. If these are intended =
to be
> > taken more strongly than that (and by the description, I take it =
they should
> > be taken more strongly than the surrounding text), then I suggest =
choosing a
> > stronger prefix than "NOTE:"
>=20
> As it turns out, almost all the Notes are parenthetical.
>=20
> I'll render the one(s) that are normative as a regular paragraph(s) =
and leave the others as-is. Will that address your concern?
>=20

Yes, thanks.

>=20
> >
> > -- section 7:
> >
> > Does the reference to I-D.ietf-tls-ssl-version3 indicate a =
requirement for
> > SSL3?
>=20
> no, it's just that SSLv3 remains a fact of life and is referenced for =
completeness' sake.
>=20
>=20

Okay.

>=20
> >
> > -- section 8.2, paragraph 5 (first non-numbered paragraph after =
numbered
> > list)
> >
> > To be pedantic, this could be taken to mean a congruent match only =
applies if
> > the includeSubdomains flag is not present. I assume it's intended to =
apply
> > whether or not the flag is present.
>=20
> [ I am assuming you actually are referring to section 8.3, as section =
8.2 doesn't mention the includeSubdomains flag and does not contain a =
numbered list. ]
>=20
> yes, a congruent match is intended to apply whether or not the flag is =
present.
>=20
>=20

yes, I meant 8.3. And on re-reading, I think the text is fine.

>=20
> > -- section 12 and subsections:
> >
> > I was surprised to see more apparently normative material after the
> > non-normative guidance sections. I think it would improve the =
organization to
> > put this closer to the normative rules for UAs.
>=20
> We can move section 12 up ahead of the non-normative guidance =
sections.

I think that would help, thanks.

>=20
>=20
> >
> > -- section 14.1, 4th paragraph (first non-bulleted paragraph =
following bullet
> > list)
> >
> > This issue is only true for proxies that act as a TLS MiTM, right?
>=20
> yes.
>=20
>=20
> > Would
> > proxies that tunnel TLS via the CONNECT method have this issue?
>=20
> I don't think so in the general case.
>=20
> I'm not sure what terminology to use to differentiate such proxies if =
this is a detail worth addressing.
>=20

Okay

>=20
> thanks again,
>=20
> =3DJeffH
>=20
>=20
>=20
>=20
>=20
>=20


From ben@nostrum.com  Thu Aug  2 15:54:12 2012
Return-Path: <ben@nostrum.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DCF811E8087; Thu,  2 Aug 2012 15:54:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level: 
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SPF_PASS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9BLtIgOAPNJW; Thu,  2 Aug 2012 15:54:11 -0700 (PDT)
Received: from nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id D23A711E8125; Thu,  2 Aug 2012 15:54:10 -0700 (PDT)
Received: from dhcp-4516.meeting.ietf.org (dhcp-4516.meeting.ietf.org [130.129.69.22]) (authenticated bits=0) by nostrum.com (8.14.3/8.14.3) with ESMTP id q72Ms8Gd041594 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 2 Aug 2012 17:54:09 -0500 (CDT) (envelope-from ben@nostrum.com)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.0 \(1485\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com>
Date: Thu, 2 Aug 2012 15:54:08 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <FCCDE600-F790-4804-A860-27CF62493ADA@nostrum.com>
References: <50161BD5.7040901@KingsMountain.com> <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com>
To: =JeffH <Jeff.Hodges@kingsmountain.com>
X-Mailer: Apple Mail (2.1485)
Received-SPF: pass (nostrum.com: 130.129.69.22 is authenticated by a trusted mechanism)
X-Mailman-Approved-At: Thu, 02 Aug 2012 16:32:32 -0700
Cc: General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org, IETF Discussion List <ietf@ietf.org>
Subject: Re: [websec] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Aug 2012 22:54:12 -0000

Jeff and I spoke f2f. Pending actual text, I believe we have resolutions =
to all of my comments save those about an extension registry, which Jeff =
will discuss with other interested parties.

Thanks!

Ben.

On Aug 2, 2012, at 10:46 AM, Ben Campbell <ben@nostrum.com> wrote:

> Hi, thanks for the response.  Comments inline:
>=20
> On Jul 29, 2012, at 10:29 PM, =3DJeffH <Jeff.Hodges@kingsmountain.com> =
wrote:
>>=20
>>> -- Does this draft update any other RFCs (e.g. 2616 or 2818)? If so, =
that
>>> should be explicitly flagged and mentioned in the abstract.
>>=20
>> Good question, I don't believe we've discussed this possibility =
directly in the websec wg. In looking at the RFCs that do update =
RFC2616, it doesn't look like draft-ietf-websec-strict-transport-sec =
(HSTS) is of that ilk.
>>=20
>> However, it nominally appears that an argument could be made that =
it'd be appropriate to update RFC2818 via =
draft-ietf-websec-strict-transport-sec, specifically with regards to =
Section 2.1.  Connection Initiation.
>>=20
>> Though, RFC2818 is Informational, which may be an issue (?). Also, =
perhaps this is something to more appropriately do via a standards-track =
rfc2818bis, i.e., have the latter reference the HSTS spec.
>>=20
>> this is something to discuss this coming week @IETF-84 Vancouver it =
seems.
>>=20
>>=20
>=20
> I will comment on this in response to your post-meeting email.
>=20
>=20
>>> -- I did not find any guidance on how to handle UAs that do not =
understand
>>> this extension. I don't know if this needs to be normative, but the =
draft
>>> should at least mention the possibility and implications.
>>=20
>> Agreed. My -12 working copy now contains these new subsections..
>>=20
>> ###
>> 10.  Server Implementation and Deployment Advice
>>=20
>>  This section is non-normative.
>>=20
>> 10.1.  Non-Conformant User Agent Considerations
>>=20
>>  Non-conformant UAs ignore the Strict-Transport-Security header =
field,
>>  thus non-conformant user agents do not address the threats described
>>  in Section 2.3.1 "Threats Addressed".  Please refer to Section 14.1
>>  "Non-Conformant User Agent Implications" for further discussion.
>>=20
>>                      .
>>                      .
>>=20
>> 14.  Security Considerations
>>                      .
>>                      .
>> 14.1.  Non-Conformant User Agent Implications
>>=20
>>  Non-conformant UAs ignore the Strict-Transport-Security header =
field,
>>  thus non-conformant user agents do not address the threats described
>>  in Section 2.3.1 "Threats Addressed".
>>=20
>>  This means that the web application and its users wielding non-
>>  conformant user agents will be vulnerable to both:
>>=20
>>     Passive network attacks due to web site development and =
deployment
>>     bugs: For example, if the web application contains any insecure,
>>     non-"https", references to the web application server, and if not
>>     all of its cookies are flagged as "Secure", then its cookies will
>>     be vulnerable to passive network sniffing, and potentially
>>     subsequent misuse of user credentials.
>>=20
>>     Active network attacks: If an attacker is able to place a man-in-
>>     the-middle, secure transport connection attempts will likely =
yield
>>     warnings to the user, but without HSTS Policy being enforced, the
>>     present common practice is to allow the user to "click-through"
>>     and proceed.  This renders the user and possibly the web
>>     application open to abuse by such an attacker.
>>=20
>>  This is essentially the status-quo for all web applications and =
their
>>  users in the absence of HSTS Policy.
>> ###
>=20
> That's all good text, but I'm not sure it actually captures my =
concern.
>=20
> =46rom the server's perspective, the fact that non-conformant UAs may =
exist, the server cannot assume that UAs will honor the extension. This =
means that a UA might attempt unprotected access to some resource =
assumed to be protected by this extension. That is, the server can't =
merely select the extension and forget about things--it still needs to =
to take the same care to avoid leaking resources over unprotected =
connections that it would need to do if this extension did not exist in =
the first place.
>=20
> I think this is implied by your last sentence above, but it would be =
better to say it explicitly.
>=20
>=20
>>=20
>>>=20
>>> -- How should a UA handle potential conflicts between a the policy =
record
>>> that includes the includeSubdomain, and any records for subdomains =
that might
>>> have different parameters?
>>=20
>> this is in the draft. the short answer is that at policy enforcement =
time, "superdomain matches win".
>>=20
>> At "noting an HSTS Host" time, the HSTS host's policy (if expressed) =
is noted regardless of whether there are superdomain HSTS hosts =
asserting "includeSubDomains".
>>=20
>> perhaps this needs to be made more clear?
>=20
> Maybe I'm missing something, but I'm not getting that answer from the =
text. Can you point out the specific language?
>=20
>>=20
>>=20
>>>=20
>>> -- section 6.1:
>>>=20
>>> The draft mentions that directives may be extended, but defers =
creation of an
>>> IANA registry to the time of first extension. IANA registries are =
not
>>> expensive; I suggest it be created now. If there's a good reason not =
to, then
>>> the draft should still address the specification policy for =
extensions.
>>>=20
>>> Also, do you expect that some future directive might need to have a
>>> "required-to-understand" status? Given that this is a =
security-affecting
>>> extension, it seems likely. If so, then the mechanism for expressing =
that
>>> needs to be defined in this draft.
>>=20
>>=20
>> These are good questions, and they beg the overall question of how =
complex this simple solution really needs to be and whether we really =
think we'll need any extensions. Something for us to discuss in the =
working group meeting on Tue morning I think.
>=20
> I will comment on this in the post-meeting mail.
>=20
>>=20
>>>=20
>>> -- section 7.2:
>>>=20
>>> Am I correct to assume that the server must never just serve the =
content over
>>> a non-secure connection? If so, it would be helpful to mention that, =
maybe
>>> even normatively.
>>=20
>> It's a SHOULD, see the Note in that section, so it's already =
effectively stated normatively, though one needs to understand HTTP =
workings to realize it in the way you stated it above.  Perhaps could =
add a simple statement as you suggest to the intro para for section 7 =
Server Processing Model, to address this concern?
>>=20
>=20
> I think something of the form SHOULD redirect to HTTPS, but MUST NOT =
under any circumstances send the content unprotected would improve the =
text. That's probably already implied, and a reasonable implementor =
wouldn't due it anyway. But my experience is that some readers will find =
strange interpretations whenever you give them the wiggle room to do so, =
so it's better to be explicit.
>=20
>>=20
>>>=20
>>> -- section 8.4:
>>>=20
>>> Does this imply a duty for compliant UAs to check for revocation one =
way or
>>> another?
>>=20
>> yes. though, per other relevant specifications, as duly cited. AFAIK =
the HSTS spec doesn't need to get into the details because the =
underlying security transport specs, namely TLS, already do this.
>=20
> If that duty already exists, then I see no reason to add it here. But =
do the cited specs unambiguously _require_ revocation checks? I admit to =
not being an expert here, but on a quick scan it seems more like they =
say how you can do it, but do they say you have to?=20
>=20
> [...]
>=20
>>=20
>>> -- section 1.2:
>>>=20
>>> The description of indented notes is almost precisely the opposite =
of how
>>> they are described in the RFC editor's style guide. It describes =
them as
>>> "parenthetical" notes, which is how experienced RFC readers are =
likely to
>>> perceive them. While it doesn't say so explicitly, I think putting =
normative
>>> text in parenthetical notes should be avoided. If these are intended =
to be
>>> taken more strongly than that (and by the description, I take it =
they should
>>> be taken more strongly than the surrounding text), then I suggest =
choosing a
>>> stronger prefix than "NOTE:"
>>=20
>> As it turns out, almost all the Notes are parenthetical.
>>=20
>> I'll render the one(s) that are normative as a regular paragraph(s) =
and leave the others as-is. Will that address your concern?
>>=20
>=20
> Yes, thanks.
>=20
>>=20
>>>=20
>>> -- section 7:
>>>=20
>>> Does the reference to I-D.ietf-tls-ssl-version3 indicate a =
requirement for
>>> SSL3?
>>=20
>> no, it's just that SSLv3 remains a fact of life and is referenced for =
completeness' sake.
>>=20
>>=20
>=20
> Okay.
>=20
>>=20
>>>=20
>>> -- section 8.2, paragraph 5 (first non-numbered paragraph after =
numbered
>>> list)
>>>=20
>>> To be pedantic, this could be taken to mean a congruent match only =
applies if
>>> the includeSubdomains flag is not present. I assume it's intended to =
apply
>>> whether or not the flag is present.
>>=20
>> [ I am assuming you actually are referring to section 8.3, as section =
8.2 doesn't mention the includeSubdomains flag and does not contain a =
numbered list. ]
>>=20
>> yes, a congruent match is intended to apply whether or not the flag =
is present.
>>=20
>>=20
>=20
> yes, I meant 8.3. And on re-reading, I think the text is fine.
>=20
>>=20
>>> -- section 12 and subsections:
>>>=20
>>> I was surprised to see more apparently normative material after the
>>> non-normative guidance sections. I think it would improve the =
organization to
>>> put this closer to the normative rules for UAs.
>>=20
>> We can move section 12 up ahead of the non-normative guidance =
sections.
>=20
> I think that would help, thanks.
>=20
>>=20
>>=20
>>>=20
>>> -- section 14.1, 4th paragraph (first non-bulleted paragraph =
following bullet
>>> list)
>>>=20
>>> This issue is only true for proxies that act as a TLS MiTM, right?
>>=20
>> yes.
>>=20
>>=20
>>> Would
>>> proxies that tunnel TLS via the CONNECT method have this issue?
>>=20
>> I don't think so in the general case.
>>=20
>> I'm not sure what terminology to use to differentiate such proxies if =
this is a detail worth addressing.
>>=20
>=20
> Okay
>=20
>>=20
>> thanks again,
>>=20
>> =3DJeffH
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20
>=20


From ynir@checkpoint.com  Tue Aug  7 05:27:24 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44B6921F8602 for <websec@ietfa.amsl.com>; Tue,  7 Aug 2012 05:27:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.366
X-Spam-Level: 
X-Spam-Status: No, score=-10.366 tagged_above=-999 required=5 tests=[AWL=0.233, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i35uVEDA-AYM for <websec@ietfa.amsl.com>; Tue,  7 Aug 2012 05:27:23 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 1324B21F8600 for <websec@ietf.org>; Tue,  7 Aug 2012 05:27:22 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q77CRLp6002220 for <websec@ietf.org>; Tue, 7 Aug 2012 15:27:21 +0300
X-CheckPoint: {502106D4-1-1B221DC2-4FFFF}
Received: from il-ex03.ad.checkpoint.com (194.29.34.71) by il-ex01.ad.checkpoint.com (194.29.34.26) with Microsoft SMTP Server (TLS) id 8.3.213.0; Tue, 7 Aug 2012 15:27:20 +0300
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex03.ad.checkpoint.com ([194.29.34.71]) with mapi; Tue, 7 Aug 2012 15:27:19 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: IETF WebSec WG <websec@ietf.org>
Date: Tue, 7 Aug 2012 15:27:18 +0300
Thread-Topic: Meeting Minutes
Thread-Index: Ac10l/xLB29X2JSaR2KDM1DahDOIew==
Message-ID: <8046EBF7-1B69-449E-A12D-FBAF754CB5B7@checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
x-cpdlp: 11f5a82712b45f89a2eb8b16762b167c390fd7de23
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-KSE-AntiSpam-Interceptor-Info: protection disabled
Subject: [websec] Meeting Minutes
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2012 12:27:24 -0000

Hi all

I have uploaded the minutes from last week's meeting. The URL is http://www=
.ietf.org/proceedings/84/minutes/minutes-84-websec
Please send corrections to Alexey, Tobias, or me.

Thanks again to Ted Hardie for taking the notes.

Yoav


From Jeff.Hodges@KingsMountain.com  Thu Aug  9 15:09:53 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8AF8421F86AD for <websec@ietfa.amsl.com>; Thu,  9 Aug 2012 15:09:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.561
X-Spam-Level: 
X-Spam-Status: No, score=-99.561 tagged_above=-999 required=5 tests=[AWL=0.934, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bEAzya51nVRP for <websec@ietfa.amsl.com>; Thu,  9 Aug 2012 15:09:52 -0700 (PDT)
Received: from oproxy8-pub.bluehost.com (oproxy8.bluehost.com [IPv6:2605:dc00:100:2::a8]) by ietfa.amsl.com (Postfix) with SMTP id 8498221F8606 for <websec@ietf.org>; Thu,  9 Aug 2012 15:09:52 -0700 (PDT)
Received: (qmail 28696 invoked by uid 0); 9 Aug 2012 22:09:51 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy8.bluehost.com with SMTP; 9 Aug 2012 22:09:51 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=yuFuPHKxRZWtxQDPeaT8duNauGgb8cVF2biruB7U3II=;  b=NNAT759sy301VaX53y74dj3O+P0JXCjgK2HVuqk2L2iKeE/K9I1Gl90toOilxW9eOgVjM8YTB18U7hwT6PFamj8YfbnzWUZ6/ZiY0ZTt5zELNT4fJMXFlEKlLjV++iCC;
Received: from [24.4.122.173] (port=38213 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1SzavP-0004t1-MQ; Thu, 09 Aug 2012 16:09:51 -0600
Message-ID: <5024352D.4040604@KingsMountain.com>
Date: Thu, 09 Aug 2012 15:09:49 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: IETF WebSec WG <websec@ietf.org>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: quoted-printable
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: Ben Campbell <ben@nostrum.com>
Subject: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Aug 2012 22:09:53 -0000

Hi, here's a write-up on the background of, and proposed resolution to th=
e=20
question of handling STS header field extendability more properly in the =
spec.

I also pose the question of which IANA policy to declare, down at the ver=
y end.

thanks,

=3DJeffH


Background:
----------

We've defined the Strict-Transport-Security (STS) header field like so..

      Strict-Transport-Security =3D "Strict-Transport-Security" ":"
                                  [ directive ]  *( ";" [ directive ] )


      directive                 =3D directive-name [ "=3D" directive-valu=
e ]
      directive-name            =3D token
      directive-value           =3D token | quoted-string


=2E.such that the definition of new directives is open-ended, i.e., the S=
TS header
field is extendable.

draft-ietf-websec-strict-transport-sec-11 presently states at the end of =
section=20
6.1..

    Additional directives extending the semantic functionality of the STS=

    header field can be defined in other specifications, with a registry
    defined for them at such time.


The only extensions we'd discussed in the past were the CertPinning, Lock=
CA,
LockEV.  We've decided that cert pinning is an intersecting but orthogona=
l
policy to HSTS, and thus best handled at this point via a separate header=
 field.
Also, the various LockFoo notions should be addressed in a cert pinning p=
olicy
context (i mentioned this in the WG session at IETF-82 Taipei).

Thus we don't have any presently anticipated extensions for the STS heade=
r field.

However, I don't believe we wish to change the (implicitly extensible) ma=
ner in=20
which the ABNF is specified, nor necessarily close the door to defining s=
ome=20
extension if we happen to come up with an appropriate need.


The IETF-84 Vancouver, WebSec WG meeting minutes [1] state on this topic.=
=2E

   The group then discussed the registry management, particularly around
   =93mandatory to understand=94 extensions. The sense of the room was th=
at the
   group did not want to create mandatory to understand extensions ever. =
If
   such extensions are needed, they will need a new header. Where the dra=
ft
   says other specifications can update this one, say that any necessary
   registries may be created when such an update comes around.

Note that -11 already states that a registry should be created at that ti=
me. Ben=20
indicated in his review that it isn't sufficient in his view (below).


Ben replied directly to me regarding the meeting minutes...
 >
 > I think we may be conflating two mostly orthangonal comments:
 >
(a)
 > -- If the working group doesn't expect "mandatory to understand" exten=
sions,
 > then I'm fine with it, other than thinking it might be worth noting th=
at any
 > such extensions must be safe to ignore.
 >
(b)
 > -- My questions about a registry don't depend on the mandatory to unde=
rstand.
 > I'm skeptical of any draft that says "you can extend this, but we will=
 leave
 > the creation of a registry until someone actually does it." In particu=
lar,
 > this defers making decisions about the documentation policy for extens=
ions
 > (rfc5226 section 4.1), which is rarely a good idea. The only situation=
 where
 > it seems to make sense to defer the registry would be if you really di=
dn't
 > expect any extensions--in which case the draft probably shouldn't ment=
ion
 > extending it.
 >
 > That all being said, please keep in mind that I, as a gen-art reviewer=
, am
 > only offering my opinion like anyone else. It's up to the work group a=
nd the
 > ADs to decide if they agree with me or not. So it's okay to say "We di=
sagree
 > with Ben here, and choose to leave it as is".


Proposed Resolution:
-------------------

For (a)

The spec already notes that UAs must ignore unrecognized directives. in a=
ny case=20
I've composed a note regarding furture-defined directives being ignored b=
y=20
(legacy) UAs.


For (b)

Alter the spec text to include a reference of the required IANA Policy fo=
r any=20
defined registry.

NOTE: we need to decide the type of IANA Policy (more below)

The spec text I now have in my -12 working copy at the end of section 6.1=
 is..

    Additional directives extending the semantic functionality of the STS=

    header field can be defined in other specifications, with a registry
    (having an IANA policy definition of FOO [RFC5226]) defined for them
    at such time.

    NOTE:  Such future directives will be ignored by UAs implementing
           only this specification, as well as by generally non-
           conforming UAs.  See Section 14.1 "Non-Conformant User Agent
           Implications" for further discussion.


We need to decide what IANA policy definition [RFC5226] we wish to declar=
e for=20
FOO in the above text.

Since HSTS is a security policy, I lean towards wanting to have relativel=
y=20
rigorous review applied to any registry and its contents created for HSTS=
=20
directives and thus am thinking a policy of "IETF Review" is what we ough=
t to=20
state here.

thoughts?

[1] https://www.ietf.org/proceedings/84/minutes/minutes-84-websec

---
end



From alexey.melnikov@isode.com  Fri Aug 10 01:55:37 2012
Return-Path: <alexey.melnikov@isode.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DA4F21F841B; Fri, 10 Aug 2012 01:55:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.375
X-Spam-Level: 
X-Spam-Status: No, score=-102.375 tagged_above=-999 required=5 tests=[AWL=-0.845, BAYES_00=-2.599, DATE_IN_PAST_06_12=1.069, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ROKsW45Fovmy; Fri, 10 Aug 2012 01:55:37 -0700 (PDT)
Received: from waldorf.isode.com (cl-125.lon-03.gb.sixxs.net [IPv6:2a00:14f0:e000:7c::2]) by ietfa.amsl.com (Postfix) with ESMTP id D4A7821F852C; Fri, 10 Aug 2012 01:55:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1344588934; d=isode.com; s=selector; i=@isode.com; bh=00/1+9E+AM7GqxYBAXVF+YQh/LQlEXBj8s3wxQ/OuJ8=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=ncGxuHp0wlue+qJqcRblnzyg4u4o351jL53HTSWq/NtO8sShNNfZnWRsqPQ2bQ1McIQWEA 9APIDlfHgo0XzhOs14XgV9ih2FtGFZDayBHPJZN9suNB8H3W7CBwqepyG03zutOipZpDgy Z4NyOgT5p1jF5tGZHBKnVxHiXIw0dwI=;
Received: from [172.16.1.29] (shiny.isode.com [62.3.217.250])  by waldorf.isode.com (submission channel) via TCP with ESMTPSA  id <UCTMfgBvaBmt@waldorf.isode.com>; Fri, 10 Aug 2012 09:55:33 +0100
X-SMTP-Protocol-Errors: PIPELINING
Message-ID: <502441B7.8020001@isode.com>
Date: Fri, 10 Aug 2012 00:03:19 +0100
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
To: Ben Campbell <ben@nostrum.com>, =JeffH <Jeff.Hodges@kingsmountain.com>
References: <50161BD5.7040901@KingsMountain.com> <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com>
In-Reply-To: <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org, IETF Discussion List <ietf@ietf.org>
Subject: Re: [websec] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 08:55:37 -0000

On 02/08/2012 10:46, Ben Campbell wrote:
> Hi, thanks for the response.  Comments inline:
>
> On Jul 29, 2012, at 10:29 PM, =JeffH <Jeff.Hodges@kingsmountain.com> wrote:
  [...]
>>> -- section 7.2:
>>>
>>> Am I correct to assume that the server must never just serve the content over
>>> a non-secure connection? If so, it would be helpful to mention that, maybe
>>> even normatively.
>> It's a SHOULD, see the Note in that section, so it's already effectively stated normatively, though one needs to understand HTTP workings to realize it in the way you stated it above.  Perhaps could add a simple statement as you suggest to the intro para for section 7 Server Processing Model, to address this concern?
>>
> I think something of the form SHOULD redirect to HTTPS, but MUST NOT under any circumstances send the content unprotected would improve the text.

Sounds good to me. (And yes, this is implied, but it doesn't hurt to 
state explicitly.)

> That's probably already implied, and a reasonable implementor wouldn't due it anyway. But my experience is that some readers will find strange interpretations whenever you give them the wiggle room to do so, so it's better to be explicit.



From tobias.gondrom@gondrom.org  Fri Aug 10 03:03:18 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A07C721F8645 for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 03:03:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.564
X-Spam-Level: 
X-Spam-Status: No, score=-97.564 tagged_above=-999 required=5 tests=[AWL=-2.203, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rtbTqWammlyy for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 03:03:18 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id A057C21F85F0 for <websec@ietf.org>; Fri, 10 Aug 2012 03:03:17 -0700 (PDT)
Received: (qmail 20391 invoked from network); 10 Aug 2012 12:03:11 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 10 Aug 2012 12:03:11 +0200
Message-ID: <5024DC5E.60404@gondrom.org>
Date: Fri, 10 Aug 2012 11:03:10 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: alexey.melnikov@isode.com
References: <50161BD5.7040901@KingsMountain.com> <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com> <502441B7.8020001@isode.com>
In-Reply-To: <502441B7.8020001@isode.com>
Content-Type: multipart/alternative; boundary="------------080205060203060004010107"
Cc: ben@nostrum.com, ietf@ietf.org, gen-art@ietf.org, websec@ietf.org, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org
Subject: Re: [websec] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 10:03:18 -0000

This is a multi-part message in MIME format.
--------------080205060203060004010107
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

On 10/08/12 00:03, Alexey Melnikov wrote:
> On 02/08/2012 10:46, Ben Campbell wrote:
>> Hi, thanks for the response.  Comments inline:
>>
>> On Jul 29, 2012, at 10:29 PM, =JeffH <Jeff.Hodges@kingsmountain.com> 
>> wrote:
>  [...]
>>>> -- section 7.2:
>>>>
>>>> Am I correct to assume that the server must never just serve the 
>>>> content over
>>>> a non-secure connection? If so, it would be helpful to mention 
>>>> that, maybe
>>>> even normatively.
>>> It's a SHOULD, see the Note in that section, so it's already 
>>> effectively stated normatively, though one needs to understand HTTP 
>>> workings to realize it in the way you stated it above. Perhaps could 
>>> add a simple statement as you suggest to the intro para for section 
>>> 7 Server Processing Model, to address this concern?
>>>
>> I think something of the form SHOULD redirect to HTTPS, but MUST NOT 
>> under any circumstances send the content unprotected would improve 
>> the text.
>
> Sounds good to me. (And yes, this is implied, but it doesn't hurt to 
> state explicitly.)
>
>> That's probably already implied, and a reasonable implementor 
>> wouldn't due it anyway. But my experience is that some readers will 
>> find strange interpretations whenever you give them the wiggle room 
>> to do so, so it's better to be explicit.
>
>
<hat="individual">
Agree with Alexey and Ben. Tobias



--------------080205060203060004010107
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 10/08/12 00:03, Alexey Melnikov
      wrote:<br>
    </div>
    <blockquote cite="mid:502441B7.8020001@isode.com" type="cite">On
      02/08/2012 10:46, Ben Campbell wrote:
      <br>
      <blockquote type="cite">Hi, thanks for the response.&nbsp; Comments
        inline:
        <br>
        <br>
        On Jul 29, 2012, at 10:29 PM, =JeffH
        <a class="moz-txt-link-rfc2396E" href="mailto:Jeff.Hodges@kingsmountain.com">&lt;Jeff.Hodges@kingsmountain.com&gt;</a> wrote:
        <br>
      </blockquote>
      &nbsp;[...]
      <br>
      <blockquote type="cite">
        <blockquote type="cite">
          <blockquote type="cite">-- section 7.2:
            <br>
            <br>
            Am I correct to assume that the server must never just serve
            the content over
            <br>
            a non-secure connection? If so, it would be helpful to
            mention that, maybe
            <br>
            even normatively.
            <br>
          </blockquote>
          It's a SHOULD, see the Note in that section, so it's already
          effectively stated normatively, though one needs to understand
          HTTP workings to realize it in the way you stated it above.&nbsp;
          Perhaps could add a simple statement as you suggest to the
          intro para for section 7 Server Processing Model, to address
          this concern?
          <br>
          <br>
        </blockquote>
        I think something of the form SHOULD redirect to HTTPS, but MUST
        NOT under any circumstances send the content unprotected would
        improve the text.
        <br>
      </blockquote>
      <br>
      Sounds good to me. (And yes, this is implied, but it doesn't hurt
      to state explicitly.)
      <br>
      <br>
      <blockquote type="cite">That's probably already implied, and a
        reasonable implementor wouldn't due it anyway. But my experience
        is that some readers will find strange interpretations whenever
        you give them the wiggle room to do so, so it's better to be
        explicit.
        <br>
      </blockquote>
      <br>
      <br>
    </blockquote>
    &lt;hat="individual"&gt;
    <br>
    <font face="Arial">Agree with Alexey and Ben. Tobias<br>
      <br>
    </font><br>
  </body>
</html>

--------------080205060203060004010107--

From ben@estacado.net  Fri Aug 10 07:19:17 2012
Return-Path: <ben@estacado.net>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 622DB21F8604; Fri, 10 Aug 2012 07:19:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IqPgMkHDslNP; Fri, 10 Aug 2012 07:19:16 -0700 (PDT)
Received: from estacado.net (vicuna.estacado.net [4.30.77.35]) by ietfa.amsl.com (Postfix) with ESMTP id 9771121F85C3; Fri, 10 Aug 2012 07:19:16 -0700 (PDT)
Received: from [10.0.1.30] (cpe-76-187-92-156.tx.res.rr.com [76.187.92.156]) (authenticated bits=0) by estacado.net (8.14.3/8.14.3) with ESMTP id q7AEGWUQ049872 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 10 Aug 2012 09:16:38 -0500 (CDT) (envelope-from ben@estacado.net)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.0 \(1485\))
From: Ben Campbell <ben@estacado.net>
In-Reply-To: <502441B7.8020001@isode.com>
Date: Fri, 10 Aug 2012 09:16:32 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <C11651CD-3713-4F2E-9026-E4D7AFF44B31@estacado.net>
References: <50161BD5.7040901@KingsMountain.com> <344AB802-6D45-4399-A628-6852A4732C16@nostrum.com> <502441B7.8020001@isode.com>
To: Alexey Melnikov <alexey.melnikov@isode.com>
X-Mailer: Apple Mail (2.1485)
X-Mailman-Approved-At: Fri, 10 Aug 2012 08:16:33 -0700
Cc: Ben Campbell <ben@nostrum.com>, IETF Discussion List <ietf@ietf.org>, General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org
Subject: Re: [websec] [Gen-art] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 14:19:17 -0000

Jeff and I had a f2f discussion about this point in Vancouver. To =
paraphrase (and I assume he will correct me if if I mischaracterize =
anything), Jeff indicated that this really wasn't a MUST level =
requirement due to the variation and vagaries in application behavior =
and abilities. Rather, it's more of a "do the best you can" sort of =
thing. Specifically, he indicated that an implementation that chose to =
go ahead and serve unprotected content due to the listed caveats on =
redirecting to HTTPS would necessarily be out-of-compliance.

If the requirement really that you SHOULD NOT (rather than MUST NOT) =
serve unprotected content, then I think the original language is okay.

Thanks!

Ben.

On Aug 9, 2012, at 6:03 PM, Alexey Melnikov <alexey.melnikov@isode.com> =
wrote:

> On 02/08/2012 10:46, Ben Campbell wrote:
>> Hi, thanks for the response.  Comments inline:
>>=20
>> On Jul 29, 2012, at 10:29 PM, =3DJeffH =
<Jeff.Hodges@kingsmountain.com> wrote:
> [...]
>>>> -- section 7.2:
>>>>=20
>>>> Am I correct to assume that the server must never just serve the =
content over
>>>> a non-secure connection? If so, it would be helpful to mention =
that, maybe
>>>> even normatively.
>>> It's a SHOULD, see the Note in that section, so it's already =
effectively stated normatively, though one needs to understand HTTP =
workings to realize it in the way you stated it above.  Perhaps could =
add a simple statement as you suggest to the intro para for section 7 =
Server Processing Model, to address this concern?
>>>=20
>> I think something of the form SHOULD redirect to HTTPS, but MUST NOT =
under any circumstances send the content unprotected would improve the =
text.
>=20
> Sounds good to me. (And yes, this is implied, but it doesn't hurt to =
state explicitly.)
>=20
>> That's probably already implied, and a reasonable implementor =
wouldn't due it anyway. But my experience is that some readers will find =
strange interpretations whenever you give them the wiggle room to do so, =
so it's better to be explicit.
>=20
>=20
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art


From Jeff.Hodges@KingsMountain.com  Fri Aug 10 14:34:20 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A43EC21F863F for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 14:34:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.099
X-Spam-Level: 
X-Spam-Status: No, score=-101.099 tagged_above=-999 required=5 tests=[AWL=1.166, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 93CR+9uRC64M for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 14:34:20 -0700 (PDT)
Received: from oproxy6-pub.bluehost.com (oproxy6-pub.bluehost.com [67.222.54.6]) by ietfa.amsl.com (Postfix) with SMTP id F0F9021F861B for <websec@ietf.org>; Fri, 10 Aug 2012 14:34:19 -0700 (PDT)
Received: (qmail 23990 invoked by uid 0); 10 Aug 2012 21:33:58 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by cpoproxy3.bluehost.com with SMTP; 10 Aug 2012 21:33:58 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=zQ42lv4nJ35pqAeoI1DBK7QuzkWuO0maehLqEdWcNw4=;  b=nP7T9HTdfxO9PV1OTuC7BwjLaByYiMHmmqcpWPoSCFT+jwlIiE5BqcKI9hkfVMcVRuPJ3wEKYorwfWULZSHCIfKDfdtB7Ypex/bymket+MziQjEpFNwgTfP/43MTahNx;
Received: from [24.4.122.173] (port=41385 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1SzwqC-0001Ci-He; Fri, 10 Aug 2012 15:33:56 -0600
Message-ID: <50257E43.8010005@KingsMountain.com>
Date: Fri, 10 Aug 2012 14:33:55 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Alexey Melnikov <alexey.melnikov@isode.com>,  Tobias Gondrom <tobias.gondrom@gondrom.org>, Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org, IETF Discussion List <ietf@ietf.org>
Subject: Re: [websec] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 21:34:20 -0000

Thanks Ben.

 > Jeff and I had a f2f discussion about this point in Vancouver. To paraphrase
 > (and I assume he will correct me if if I mischaracterize anything), Jeff
 > indicated that this really wasn't a MUST level requirement due to the
 > variation and vagaries in application behavior and abilities.

Yes, see the NOTE in section 7.2.

 > Rather, it's
 > more of a "do the best you can" sort of thing. Specifically, he indicated
 > that an implementation that chose to go ahead and serve unprotected content
 > due to the listed caveats on redirecting to HTTPS would necessarily be
 > out-of-compliance.

I presume you actually mean "not necessarily", which would then be correct, 
unless I'm misunderstanding something.


 > If the requirement really that you SHOULD NOT (rather than MUST NOT) serve
 > unprotected content, then I think the original language is okay.

agreed.

thanks,

=JeffH



From palmer@google.com  Fri Aug 10 14:52:26 2012
Return-Path: <palmer@google.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C062F21F8645 for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 14:52:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.977
X-Spam-Level: 
X-Spam-Status: No, score=-102.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qslHFyUJGpMP for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 14:52:26 -0700 (PDT)
Received: from mail-lpp01m010-f44.google.com (mail-lpp01m010-f44.google.com [209.85.215.44]) by ietfa.amsl.com (Postfix) with ESMTP id C217C21F853B for <websec@ietf.org>; Fri, 10 Aug 2012 14:52:24 -0700 (PDT)
Received: by lahm15 with SMTP id m15so1150892lah.31 for <websec@ietf.org>; Fri, 10 Aug 2012 14:52:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:x-system-of-record; bh=WGDzmQViYNxFQdE9OvmOw2o2HnNnuupOwkoI5xItsrc=; b=R603AD4nQkFdfAFbf42nv4WtvcFpmVf5+7+I0LVdPaN9OlTFECH6EJjVeY9E939qj3 gxeYRJajMVWipm0KoVMiNuEP9aHLnnKbercO6X5FEvC+q4tjs7YVSgKXvXiSMAXBJFhG fofCSm/R+ROfT+FMPCR6EafcUryI2e3danYeiXROjhz2NrjXs+/iBxW83sebb5cnYR4L b7rY1q/OXZCL8LgTJLYICp78Iw9ay1U0vun0bUpeR1e8LCiZRcwl6OCjJXy2GvDJDsN5 YpNkxUBkn4FTsNgpIBDcdATK1F7ULfXLx04nVDz5xIR4A9TwlbDO87B29UZWo8HQFH+b oEYw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:x-system-of-record:x-gm-message-state; bh=WGDzmQViYNxFQdE9OvmOw2o2HnNnuupOwkoI5xItsrc=; b=KO9tT2HTTbQyj/19kcPOz79v8b+GSgF7GIz+9Hw832xFeiUu4oq8dylUZqPUPvIPxk QlBJVpWtGTCkFiSThphf1bh7m+oV0Ty4FHPuL7b/rk9HFXGb5mKzh9yADLc7Y2YlC2mH GvJLoXV76hiZoaO5UQzsM5OkC6gh+6FvqicakkstAjPWesu/wN2ClUS50EaVpjj+WCV7 qk8VFl70VojeDDFLah+/SttETuZNOT2QL41HnHS9iEPo8xCOPSheCrH4ireubjvoebQv eI2uA4UuIhcTXndOMzMhh5suRgtOyfCkNrW9JJPIEb0uX733ihfFQLfhZigwDp/jIkwk l8lQ==
Received: by 10.112.43.98 with SMTP id v2mr3004553lbl.1.1344635543631; Fri, 10 Aug 2012 14:52:23 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.112.43.98 with SMTP id v2mr3004536lbl.1.1344635543443; Fri, 10 Aug 2012 14:52:23 -0700 (PDT)
Received: by 10.112.77.4 with HTTP; Fri, 10 Aug 2012 14:52:23 -0700 (PDT)
In-Reply-To: <5024352D.4040604@KingsMountain.com>
References: <5024352D.4040604@KingsMountain.com>
Date: Fri, 10 Aug 2012 14:52:23 -0700
Message-ID: <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com>
From: Chris Palmer <palmer@google.com>
To: "=JeffH" <Jeff.Hodges@kingsmountain.com>
Content-Type: text/plain; charset=UTF-8
X-System-Of-Record: true
X-Gm-Message-State: ALoCoQkL1u3Do6FjQS4kHdfFmfY1TYnHSguc06VzLtmFKv82FpfN0xzWpEE97w/NiXmQvIw5dcUJH0YEDgAxKSyl6l24cjBpAIFLxf6RclqG75rMhIm99KzbscEm3gEMp7pqtznQXVWUqY3qy4ss3DryXg6SIQ0MgfTAOlvs6Ul+kzf/Z5Z5MsLZatF6oCe0SXOYAVwRAV18
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 21:52:26 -0000

On Thu, Aug 9, 2012 at 3:09 PM, =JeffH <Jeff.Hodges@kingsmountain.com> wrote:

> The only extensions we'd discussed in the past were the CertPinning, LockCA,
> LockEV.  We've decided that cert pinning is an intersecting but orthogonal
> policy to HSTS, and thus best handled at this point via a separate header
> field.
> Also, the various LockFoo notions should be addressed in a cert pinning
> policy
> context (i mentioned this in the WG session at IETF-82 Taipei).

Please forgive my ignorance, but do LockCA and/or LockEV offer any
functionality that you can't already get with public key pinning as
currently specified? You can pin to a given CA's public key(s), and
you can pin to any given EV issuers' public keys.

From palmer@google.com  Fri Aug 10 15:20:25 2012
Return-Path: <palmer@google.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48CC911E80BF for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 15:20:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.977
X-Spam-Level: 
X-Spam-Status: No, score=-102.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hyUHvzRJWRq8 for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 15:20:24 -0700 (PDT)
Received: from mail-lpp01m010-f44.google.com (mail-lpp01m010-f44.google.com [209.85.215.44]) by ietfa.amsl.com (Postfix) with ESMTP id AEA8621F85E6 for <websec@ietf.org>; Fri, 10 Aug 2012 15:20:23 -0700 (PDT)
Received: by lahm15 with SMTP id m15so1159780lah.31 for <websec@ietf.org>; Fri, 10 Aug 2012 15:20:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding:x-system-of-record; bh=FTmmwBpKGjH+Tbnx5ZkrEUYsGph/GBInZy34ikeBInE=; b=YuthJyKzNEAkdwrV0uSD9UV5rkXvG4N6ZnY7q9m7tYuCoN3qgrpOqpQReRoF0ovabO I0+ycuMLW1/AbuG85sw2MVHd8mkK0uF70nNKiMag4lK5+9rNb1RM9etbD9YFx6AciC9r R2QY6Glvtn/mfpb/kQo/7rYecwqOjR0JDNab5MOQH2rwr60icnGk7CgxoTv0Okwmo4Lr 1Hsc/byl3JyFTXV97Hrg7/gLsaDrioUsx/WOixQiXoCtXg/+CBiZ8HTzBBim4HP42YMB BKirPKuyoIXZtqcnN3m+NCxXlrffjgyWQUf8oKK5Hv2xuC5p93i0d5ucBsG82fOWP40i PJJQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding:x-system-of-record :x-gm-message-state; bh=FTmmwBpKGjH+Tbnx5ZkrEUYsGph/GBInZy34ikeBInE=; b=D12dJCp5OGJ902dp8fj/PQFf4GKbYyQ7a4JOsP78+CpZw1SB87S9u6akj20iAnbiuJ ICyntSI6NVRKVyB9XTdQc1L1JTMnx56e/XYQCqrQSYa69wzFoimXv9eWUzK6OGOSBIjL D23LqBZOUcPvIAwCQ0JR3oVtMFSTkXxmo+TMkKkQHi0voX7xkZuWtzP4SCTBtd6RXrmf fySt54cMppRtPwc4q2Gtdj9gU1fHIWKVmQsqaiSJj6/AaMhp3PWXwzj6cTzYUIr4OQr+ /kaUzk8TtsXhBBROOHFviiVOZ4lb8QwJwXmTleBVwRJxN/VQ2j7k4DD2imxNsjF/uxDK ZDbQ==
Received: by 10.152.111.71 with SMTP id ig7mr4303285lab.28.1344637222718; Fri, 10 Aug 2012 15:20:22 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.152.111.71 with SMTP id ig7mr4303269lab.28.1344637222530; Fri, 10 Aug 2012 15:20:22 -0700 (PDT)
Received: by 10.112.77.4 with HTTP; Fri, 10 Aug 2012 15:20:22 -0700 (PDT)
In-Reply-To: <4FCF894B.8080002@gondrom.org>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org>
Date: Fri, 10 Aug 2012 15:20:22 -0700
Message-ID: <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
From: Chris Palmer <palmer@google.com>
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
X-Gm-Message-State: ALoCoQlgCWQpLBUJCtLrnE9UECixZZC6AdBUZRHQleP7GT37kfbb9jKNPg3mqo+RTc44xxM6LRtKNCOJRpwhVm3dqZ3yMiQWho6sdWRSO6Xs5bpDQqDbEImE400BdbKOyVOBfDS9+jjVu4U4wVA6mq+L0QqUY6dn6jcI3WTaOQ4bJ+0/N+vpi0669POpLQnrg1xWa8onDT/9
Cc: Chris Evans <cevans@google.com>, websec@ietf.org, paul.hoffman@vpnc.org, saag@ietf.org, turners@ieca.com, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 22:20:25 -0000

Hi all,

Resurrecting this ancient thread, and explicitly including Moxie and
Trevor in case they aren't already on any of the relevant mailing
lists.

So ultimately I do think we should decide on either HPKP or TACK, but
that we should make that decision after there has been some real-world
deployment experience with both (or, sadly, real-world non-deployment
of one or both).

Additionally, HPKP and TACK might converge, more or less. I have plans
to publish a new HPKP I-D that borrows some of TACK's pin activation
and expiration ideas, for example.

Additionally, one of the main criticisms of HPKP is that it is tied to
HTTP. I currently don't consider that a huge problem =E2=80=94 even though =
I
consider TACK's TLS-generic-ness a nice benefit =E2=80=94 for several reaso=
ns:

* HTTPS is the big, important application that we need to secure right now.

* IMAPS and POPS are surely on the list too, right after HTTPS; but
specifying "IPKP" and "PPKP" is likely to be relatively
straightforward once we get HPKP working.

* It's not clear that SMTP over TLS is very beneficial, because you
can't stop delivery due to pin validation failure (or really even
regular old X.509 failure). You could use certificate errors as
soft-fail spam signals, but you can in principle do that now, too,
without explicit pinning. I don't know how much benefit you'd get from
using pin validation failure as a spam signal.

* SSH already has PKP. :)

* The other common application protocols, like SIP, XMPP, and friends,
are likely to also be pretty easy to extend in a manner similar to
HPKP, "IPKP", and "PPKP".

And finally, as Ben Laurie pointed out, there is also Certificate
Transparency. I personally consider the "public log" class of
solutions (of which CT is a leading member, along with Sovereign Keys)
to be The Real Solution. Pinning-like solutions (including HPKP and
TACK) are a good, quick fix =E2=80=94 as long as they are quick and simple.


On Wed, Jun 6, 2012 at 9:46 AM, Tobias Gondrom
<tobias.gondrom@gondrom.org> wrote:
> Sean et al.,
>
> <hat=3D"individual">
> I agree with Paul and Yoav and think the coordination between dane and
> websec on HSTS and key-pinning is ok. Both WGs are aware of potential
> coordination issues when mechanisms in both (DNSSEC and HTTP header) will=
 be
> implemented eventually. I don't think we need an operations statement yet=
.
> Maybe at some point in the future an informational Best Practice or if yo=
u
> wish a Std Track can help.
>
> With regards to draft-perrin-tls-tack and draft-ietf-websec-key-pinning, =
I
> am not so sure about potential conflicts here and whether we need or want
> both.
> </hat>
>
> Best regards, Tobias
>
>
> Ps.:
> <hat=3D"WG chair">
> And on a personal note, one thing I am not so happy about is that I can s=
ee
> from the tls-tack draft, that the authors are aware of key-pinning (which=
 is
> nice) and perceive that there would be flaws, yet they chose to not post
> their comments on it to websec nor inform the WG about their new draft.
>
> To make it easier in the future to coordinate the two drafts and possibly
> discuss and decide whether to boil down to one, it might make sense to
> inform websec about draft-perrin-tls-tack and have a discussion about it =
at
> some point there.
> Just my 5cents.
> </hat>
>
>
>
>
> On 05/06/12 23:01, Paul Hoffman wrote:
>>
>> On Jun 5, 2012, at 2:46 PM, Yoav Nir wrote:
>>
>>>> The similarity of pinning and DANE has been discussed before. DANE
>>>> relies on DNSSEC being deployed, which key-pinning does not.
>>
>> Correct. Further, key-pinning in HTTP only applies to HTTP and relies on
>> the client being able to establish a TLS session using non-key-pinning
>> semantics. Key-pinning in TLS relies works with any lower-layer protocol=
 and
>> relies on the client being able to establish a TLS session using
>> non-key-pinning semantics.
>>
>>>> Come to think of it, the draft needs a section comparing with DANE, bu=
t
>>>> that's for another thread.
>>>>
>>>> draft-perrin-tls-tack seems to tackle the same problem as key-pinning.
>>>> Instead of the pins getting attested to in HTTP headers, you have a sp=
ecial
>>>> public/private key pair, that you use to sign the SPKI from the server
>>>> certificate within the a TLS extension. Like key-pinning there's a TOF=
U
>>>> element here, because the client only learns about the special key whe=
n it
>>>> encounters it in a TLS handshake.
>>>>
>>>> The obvious question is why would we need both key-pinning and tack.
>>
>> It would be clearer if you said "both key-pinning in HTTP and key-pinnin=
g
>> in TLS (tack)".
>>
>> --Paul Hoffman
>>
>> _______________________________________________
>> saag mailing list
>> saag@ietf.org
>> https://www.ietf.org/mailman/listinfo/saag
>
>
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag

From ben@estacado.net  Fri Aug 10 14:58:38 2012
Return-Path: <ben@estacado.net>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E60221F865E; Fri, 10 Aug 2012 14:58:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v1bz59dq3Dy9; Fri, 10 Aug 2012 14:58:37 -0700 (PDT)
Received: from estacado.net (vicuna.estacado.net [4.30.77.35]) by ietfa.amsl.com (Postfix) with ESMTP id 69D6221F865C; Fri, 10 Aug 2012 14:58:36 -0700 (PDT)
Received: from [10.12.11.64] ([10.12.11.64]) (authenticated bits=0) by estacado.net (8.14.3/8.14.3) with ESMTP id q7ALttiU010516 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 10 Aug 2012 16:55:55 -0500 (CDT) (envelope-from ben@estacado.net)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.0 \(1485\))
From: Ben Campbell <ben@estacado.net>
In-Reply-To: <50257E43.8010005@KingsMountain.com>
Date: Fri, 10 Aug 2012 16:55:47 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <570BD336-2C91-4C7E-AC03-9FD5423AEB35@estacado.net>
References: <50257E43.8010005@KingsMountain.com>
To: =JeffH <Jeff.Hodges@kingsmountain.com>
X-Mailer: Apple Mail (2.1485)
X-Mailman-Approved-At: Fri, 10 Aug 2012 16:43:00 -0700
Cc: Ben Campbell <ben@nostrum.com>, IETF Discussion List <ietf@ietf.org>, General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org
Subject: Re: [websec] [Gen-art] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 21:58:38 -0000

On Aug 10, 2012, at 4:33 PM, =3DJeffH <Jeff.Hodges@kingsmountain.com> =
wrote:

> Thanks Ben.
>=20
> > Jeff and I had a f2f discussion about this point in Vancouver. To =
paraphrase
> > (and I assume he will correct me if if I mischaracterize anything), =
Jeff
> > indicated that this really wasn't a MUST level requirement due to =
the
> > variation and vagaries in application behavior and abilities.
>=20
> Yes, see the NOTE in section 7.2.
>=20
> > Rather, it's
> > more of a "do the best you can" sort of thing. Specifically, he =
indicated
> > that an implementation that chose to go ahead and serve unprotected =
content
> > due to the listed caveats on redirecting to HTTPS would necessarily =
be
> > out-of-compliance.
>=20
> I presume you actually mean "not necessarily", which would then be =
correct, unless I'm misunderstanding something.

Oops, you are correct, that's a typo.

>=20
>=20
> > If the requirement really that you SHOULD NOT (rather than MUST NOT) =
serve
> > unprotected content, then I think the original language is okay.
>=20
> agreed.
>=20
> thanks,
>=20
> =3DJeffH
>=20
>=20
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art


From Jeff.Hodges@KingsMountain.com  Fri Aug 10 19:53:14 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C861A21F84B9 for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 19:53:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.412
X-Spam-Level: 
X-Spam-Status: No, score=-101.412 tagged_above=-999 required=5 tests=[AWL=1.187, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id khRKhA-+ptrl for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 19:53:14 -0700 (PDT)
Received: from oproxy12-pub.bluehost.com (oproxy12-pub.bluehost.com [50.87.16.10]) by ietfa.amsl.com (Postfix) with SMTP id 2DBC621F84B3 for <websec@ietf.org>; Fri, 10 Aug 2012 19:53:14 -0700 (PDT)
Received: (qmail 24689 invoked by uid 0); 11 Aug 2012 02:52:52 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy12.bluehost.com with SMTP; 11 Aug 2012 02:52:52 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=gO254EX9BSvkegsd6+csOkhsC5JANcYrpA75KrVCKnI=;  b=PLjfsLevMLLc3VfcQ0hAaAVTXe0p5wA/gJXmyuFS96Kx7/yB0Tzx5eLpnO+JMElYaKqccFaZ7ZcJiVewM3x5eJIQvBh+vXMjrCghqnyW734pVuhXHx4YdKDbEpPFsO8W;
Received: from [24.4.122.173] (port=42679 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T01oq-00053V-Dv; Fri, 10 Aug 2012 20:52:52 -0600
Message-ID: <5025C902.3060609@KingsMountain.com>
Date: Fri, 10 Aug 2012 19:52:50 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Chris Palmer <palmer@google.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] the (old) LockFoo ideas: LockCA, LockEV (was: handling STS header field extendability)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 02:53:14 -0000

 > On Thu, Aug 9, 2012 at 3:09 PM, =JeffH <Jeff.Hodges@kingsmountain.com> wrote:
 >
 >> The only extensions we'd discussed in the past were the CertPinning,
 >> LockCA, LockEV. We've decided that cert pinning is an intersecting but
 >> orthogonal policy to HSTS, and thus best handled at this point via a
 >> separate header field. Also, the various LockFoo notions should be
 >> addressed in a cert pinning policy context (i mentioned this in the WG
 >> session at IETF-82 Taipei).
 >
 > Please forgive my ignorance,

no worries, these were nascent ideas we discussed in the past in the context of 
HSTS, mostly just at past websec wg sessions.

 > but do LockCA and/or LockEV offer any
 > functionality that you can't already get with public key pinning as
 > currently specified?

probably not (they were mostly off-the-cuff ideas)


 > You can pin to a given CA's public key(s),

Yes, which provides essentially what we were imagining as LockCA functionality

 >  and you can pin to any given EV issuers' public keys.

yep.

I didn't mean to imply that these LockFoo notions would necessarily pose new use 
cases for draft-ietf-websec-key-pinning -- the latter I-D probably already 
addresses them.


HTH,

=JeffH



From Jeff.Hodges@KingsMountain.com  Fri Aug 10 21:41:17 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69A6F21F8508 for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 21:41:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.377
X-Spam-Level: 
X-Spam-Status: No, score=-101.377 tagged_above=-999 required=5 tests=[AWL=0.888, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pqQAKE5ZfQ5v for <websec@ietfa.amsl.com>; Fri, 10 Aug 2012 21:41:16 -0700 (PDT)
Received: from oproxy7-pub.bluehost.com (oproxy7-pub.bluehost.com [67.222.55.9]) by ietfa.amsl.com (Postfix) with SMTP id 6A78021F8507 for <websec@ietf.org>; Fri, 10 Aug 2012 21:41:15 -0700 (PDT)
Received: (qmail 1457 invoked by uid 0); 11 Aug 2012 04:40:53 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy7.bluehost.com with SMTP; 11 Aug 2012 04:40:53 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=pAUvay1+OwfsdgXlsoXr/7NnBbFxf3AmRbW1zQy4gVY=;  b=2JCYYopKE5hWt5Dw40q4+QK9rfVYp5cy9gFeYYUfHvOmPlvmXnpiNztH2QgqqV4BHksahsz5o4n29WYkPHuzReCP/hzaT4KTHDRICE4juqTotMrD9ZmyokkLG14pjE4X;
Received: from [24.4.122.173] (port=43149 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T03VN-0007RE-Lo; Fri, 10 Aug 2012 22:40:53 -0600
Message-ID: <5025E253.7070907@KingsMountain.com>
Date: Fri, 10 Aug 2012 21:40:51 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: General Area Review Team <gen-art@ietf.org>, IETF WebSec WG <websec@ietf.org>, draft-ietf-websec-strict-transport-sec.all@tools.ietf.org, IETF Discussion List <ietf@ietf.org>
Subject: Re: [websec] Gen-ART LC Review of draft-ietf-websec-strict-transport-sec-11
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 04:41:17 -0000

Hi,

I believe I've made requite changes to draft-ietf-websec-strict-transport-sec
per this thread as well as the WG f2f discussion @IETF-84 Vancouver and also my
f2f discussion with Ben after the websec wg meeting.

In the below I'm just going to try to identify the individual issues from Ben's
review without quoting all the thread discussion, but also highlight the changes
I have queued in my -12 working copy of draft-ietf-websec-strict-transport-sec.

If the below looks nominally OK I can submit my -12 working copy, please let me 
know (Alexey/Barry). (note: I'm going to be mostly offline for the next several 
days)

thanks,

=JeffH
------

Ben's "minor items":

M1) update 2818 ?

 >> -- Does this draft update any other RFCs (e.g. 2616 or 2818)?

Maybe 2818, but based on the informational status of 2818, websec wg 
discussions, and discussions with Ben and EKR, there's no statement of updating 
2818 in my -12 working copy.


M2) non-conformant UAs ?

 >>> -- I did not find any guidance on how to handle UAs that do not
 >>> understand this extension. I don't know if this needs to be normative,
 >>> but the draft should at least mention the possibility and implications.
 >>
 >> Agreed. My -12 working copy now contains these new subsections..
 >>
 >> <snip/>
 >>
 > That's all good text, but I'm not sure it actually captures my concern.
 >
 > <snip/> That is, the server can't merely select the extension and forget
 > about things--it still needs to to take the same care to avoid leaking
 > resources over unprotected connections that it would need to do if this
 > extension did not exist in the first place.
 >
 > I think this is implied by your last sentence above, but it would be better
 > to say it explicitly.

I've added text to my -12 working copy, it now states...

###
14.1.  Non-Conformant User Agent Implications

    Non-conformant user agents ignore the Strict-Transport-Security
    header field, thus non-conformant user agents do not address the
    threats described in Section 2.3.1 "Threats Addressed".

    This means that the web application and its users wielding non-
    conformant UAs will be vulnerable to both:

    o  Passive network attacks due to web site development and deployment
       bugs:

          For example, if the web application contains any insecure,
          non-"https", references to the web application server, and if
          not all of its cookies are flagged as "Secure", then its
          cookies will be vulnerable to passive network sniffing, and
          potentially subsequent misuse of user credentials.

    o  Active network attacks:

          For example, if an attacker is able to place a man-in-the-
          middle, secure transport connection attempts will likely yield
          warnings to the user, but without HSTS Policy being enforced,
          the present common practice is to allow the user to "click-
          through" and proceed.  This renders the user and possibly the
          web application open to abuse by such an attacker.

    This is essentially the status-quo for all web applications and their
    users in the absence of HSTS Policy.  Since web application providers
    typically do not control the type or version of UAs their web
    applications interact with, the implication is that HSTS Host
    deployers must generally exercise the same level of care to avoid web
    site development and deployment bugs (see Section 2.3.1.3) as they
    would if they were not asserting HSTS Policy.
###


M3) the superdomain match wins (?) question  (section 8.x generally)

 >>> -- How should a UA handle potential conflicts between a the policy
 >>> record that includes the includeSubdomain, and any records for subdomains
 >>> that might have different parameters?
 >>
 >> this is in the draft. the short answer is that at policy enforcement time,
 >> "superdomain matches win".
 >>
 >> At "noting an HSTS Host" time, the HSTS host's policy (if expressed) is
 >> noted regardless of whether there are superdomain HSTS hosts asserting
 >> "includeSubDomains".
 >>
 >> perhaps this needs to be made more clear?
 >
 > Maybe I'm missing something, but I'm not getting that answer from the text.

In our f2f discussion, Ben and I agreed that we need to clear that we stop on 
first match when doing policy enforcement -- but it turns out to be not quite 
that simple, due to the includeSubDomains semantics. Here's the relvant text now 
in my -12 working copy, the alterations are in step 5...

###
8.3.  URI Loading and Port Mapping

    Whenever the UA prepares to "load", also known as "dereference", any
    "http" URI [RFC3986] (including when following HTTP redirects
    [RFC2616]), the UA MUST first determine whether a domain name is
    given in the URI and whether it matches a Known HSTS Host, using
    these steps:
                         .
                         .
    4.  Otherwise, the substring is a given domain name, which MUST be
        matched against the UA's Known HSTS Hosts using the procedure in
        Section 8.2 "Known HSTS Host Domain Name Matching".

    5.  If when performing doman name matching, any superdomain match
        with an asserted includeSubDomains flag is found, or, if no
        superdomain matches with asserted includeSubDomains flags are
        found and a congruent match is found (with or without an asserted
        includeSubDomains flag), then before proceeding with the load:
                         .
                         .
###


M4) section 6.1: handling header field extensibility

[ see separate message entitled "handling STS header field extendability" ]
section 7.2 must not serve insecure content?



M5) section 7.2: state explicitly must not serve insecure content?

no changes necessary, see relevant discussion in this thread.



M6) section 8.4:formal duty for revocation checking ?

Based on f2f discussions with Ben and EKR, I now have the following text in my 
-12 working copy, and have moved the references to RFC2560 & RFC5280 to 
Informational. The rationale is that revocation checking is not required by the 
TLS and PKIX specs, they just say "here's how you can do it", and there's not 
really an appropriate spec to point at (which would have any chance at all to be 
actually adhered to by UAs due to the rapidly evolving nature of our 
understanding of the efficacy and performance and utility of "classical" 
revocation checking).

###
8.4.  Errors in Secure Transport Establishment

    When connecting to a Known HSTS Host, the UA MUST terminate the
    connection (see also Section 12 "User Agent Implementation Advice")
    if there are any errors, whether "warning" or "fatal" or any other
    error level, with the underlying secure transport.  For example, this
    includes any errors found in certificate validity checking UAs employ
    such as via Certificate Revocation Lists (CRL) [RFC5280], or via the
    Online Certificate Status Protocol (OCSP) [RFC2560].
###





Ben's editorial items:


E1) Unused Reference: 'RFC6376'                       -- done in -12

E2) fixup indented "Note:" such that one(s) that are normative as a regular 
paragraph(s) and leave the others as-is              -- done in -12

E3) reference to SSLv3, ref 6101 informatively       -- done in -12

E4) section 8.3 congruent match -- text is fine, no changes necessary

E5) move section 12 up ahead of the non-normative guidance sections
                                                      -- done in -12

E6) proxy sec cons apply to CONNECT proxy ?            -- done in -12
( noted that the type of proxy of concern is a "MITM non-transparent proxy",
   which ought to clarify that it's not a transparent HTTP CONNECT-based
   proxy. (I couldn't find any dominating terminology describing these
   beasts, it is all over the map, but maybe I'm missing something) )


---
end












From tom@ritter.vg  Sat Aug 11 07:42:52 2012
Return-Path: <tom@ritter.vg>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BA1C21F857D for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 07:42:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.977
X-Spam-Level: 
X-Spam-Status: No, score=-2.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YF47lz9+8o1j for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 07:42:51 -0700 (PDT)
Received: from mail-vb0-f44.google.com (mail-vb0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id 9271721F8569 for <websec@ietf.org>; Sat, 11 Aug 2012 07:42:51 -0700 (PDT)
Received: by vbbez10 with SMTP id ez10so2593012vbb.31 for <websec@ietf.org>; Sat, 11 Aug 2012 07:42:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ritter.vg; s=vg; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=bcVTcevosZzRIAdlo7dIYmXIPxPA4BTgtdE7o9lQSB0=; b=lBjb/eNm3D0UgcViw6pamTWO61Y1DYONwoJkUka4nHLDQwJMsXidte6MQctKAXPsFo P+4Pgk9znsD/cSv1o0xeu0iKYhVInfevo0HzhvTQ2vYt3i8A25XFJIbiroZbmH8KMvEU 3io8YnEb06hC9BPLyGFBXaK+rdFIS3Cu1fcIU=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:x-gm-message-state; bh=bcVTcevosZzRIAdlo7dIYmXIPxPA4BTgtdE7o9lQSB0=; b=KKrpgl5Mf+qTyGCH1eeQ4qBE5S//AfvvCxvx5Lsdr4Oeai6LxVS3mCrbJW6eojD5rn oDYwhHS2KRbnRPZ2rcw6al+rBbSoDgddzI1HRsf8BsEAJGIE1d90QYLit/a+xz9nwvZe jgu2z/G1k+LEsb8WZYzp5xm1AqR2ezuPJ4O+1oY9zg1azDQhPed85cDoeqHs4gnc69kL 8I1c8McDK3ZVmIcMvicMWFU7OKHPyEp7ZgbuSb2/uZfTpCvego3lVhqM6awAxGadcVyf AmUDjSdYOqZ5c65UJP+aRkK0PBIqRSmdMNpkx/bbVauUf7oOzVf2BO/N7S+AC4fGsg/P a7PQ==
Received: by 10.220.116.11 with SMTP id k11mr1920713vcq.74.1344696170762; Sat, 11 Aug 2012 07:42:50 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.58.145.163 with HTTP; Sat, 11 Aug 2012 07:42:30 -0700 (PDT)
In-Reply-To: <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com>
From: Tom Ritter <tom@ritter.vg>
Date: Sat, 11 Aug 2012 10:42:30 -0400
Message-ID: <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com>
To: Chris Palmer <palmer@google.com>
Content-Type: text/plain; charset=ISO-8859-1
X-Gm-Message-State: ALoCoQlZb7AZ7T9vtFBzdjMpUnZ+cEYPnulsiFFHL9BJswlQXmQW6rUyz/i3X4D5hGo8hjoBuOve
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 14:42:52 -0000

On 10 August 2012 17:52, Chris Palmer <palmer@google.com> wrote:
> Please forgive my ignorance, but do LockCA and/or LockEV offer any
> functionality that you can't already get with public key pinning as
> currently specified? You can pin to a given CA's public key(s), and
> you can pin to any given EV issuers' public keys.

I can't think of one for Lock CA; but LockEV could be useful for sites
that want to deploy some additional measure, but can't/don't want to
a) commit to a CA or b) enumerate all possible EV authorities.  It
should be ('should be', not 'is') more difficult to get a fraudulent
EV certificate through trickery or treachery than a DV certificate.

I don't think browsers differentiate between OV and DV in any
meaningful way, but I could be wrong.

-tom

From paul.hoffman@vpnc.org  Sat Aug 11 10:57:43 2012
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D92D921F861C; Sat, 11 Aug 2012 10:57:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.582
X-Spam-Level: 
X-Spam-Status: No, score=-102.582 tagged_above=-999 required=5 tests=[AWL=0.017, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0EB57QPjUIhy; Sat, 11 Aug 2012 10:57:43 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 49E9521F8617; Sat, 11 Aug 2012 10:57:43 -0700 (PDT)
Received: from [10.20.30.100] (50-1-50-97.dsl.dynamic.fusionbroadband.com [50.1.50.97]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.5) with ESMTP id q7BHvdS8049125 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Sat, 11 Aug 2012 10:57:39 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=windows-1252
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
Date: Sat, 11 Aug 2012 10:57:42 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <A20BCF75-BA32-42CF-80ED-82795D0C586F@vpnc.org>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
To: Chris Palmer <palmer@google.com>
X-Mailer: Apple Mail (2.1278)
Cc: IETF WebSec WG <websec@ietf.org>, IETF Security Area Advisory Group <saag@ietf.org>, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 17:57:44 -0000

On Aug 10, 2012, at 3:20 PM, Chris Palmer wrote:

> Additionally, one of the main criticisms of HPKP is that it is tied to
> HTTP.

I am one of those people who expressed that criticism in the past. =
Having said that:

> I currently don't consider that a huge problem =97 even though I
> consider TACK's TLS-generic-ness a nice benefit =97 for several =
reasons:
>=20
> * HTTPS is the big, important application that we need to secure right =
now.
>=20
> * IMAPS and POPS are surely on the list too, right after HTTPS; but
> specifying "IPKP" and "PPKP" is likely to be relatively
> straightforward once we get HPKP working.

Fully agree to both. TACK is more general, but HPKP's specificity is an =
advantage for deployability and interoperability, and other TLS-using =
application protocols can copy what they need from it when it is =
deployed.

> * It's not clear that SMTP over TLS is very beneficial, because you
> can't stop delivery due to pin validation failure (or really even
> regular old X.509 failure). You could use certificate errors as
> soft-fail spam signals, but you can in principle do that now, too,
> without explicit pinning. I don't know how much benefit you'd get from
> using pin validation failure as a spam signal.

Even if you could, the SMTP community hasn't spent much effort and =
thinking about the value of TLS failure as spam signals. Until they do, =
it is not wise for us to gate our work on them. If they deal with it, =
they can then deal with things like pinning issues.

> * SSH already has PKP. :)

And we can learn from that. And from the smiley.

> * The other common application protocols, like SIP, XMPP, and friends,
> are likely to also be pretty easy to extend in a manner similar to
> HPKP, "IPKP", and "PPKP".

Yes.

> And finally, as Ben Laurie pointed out, there is also Certificate
> Transparency. I personally consider the "public log" class of
> solutions (of which CT is a leading member, along with Sovereign Keys)
> to be The Real Solution. Pinning-like solutions (including HPKP and
> TACK) are a good, quick fix =97 as long as they are quick and simple.

"Here is what I say about them" proposals are orthogonal to "here is =
what I say about myself" proposals and should not be confused with each =
other.

--Paul Hoffman=

From trevp@trevp.net  Sat Aug 11 11:16:04 2012
Return-Path: <trevp@trevp.net>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10EA421F84A1 for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 11:16:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.977
X-Spam-Level: 
X-Spam-Status: No, score=-2.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ivIc82d72dPR for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 11:16:03 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id 4432121F84B5 for <websec@ietf.org>; Sat, 11 Aug 2012 11:16:03 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so2482799ghb.31 for <websec@ietf.org>; Sat, 11 Aug 2012 11:16:02 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-originating-ip:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding:x-gm-message-state; bh=lTUibbTXkpNEO56DtfydqlyEzmEq5SzjN79KjpgVv0U=; b=J6XRpB9uMRz1PaYkxHf/9MY81yha81SUwP/V11YgTtOyzK8k/X9rpxKfwY1i3LZGjk bVw22fJIYI8TjCfcmW2ap4KvZEN1gaS8ohruzU2RAA+tOb/57F8YAmNbnuPvJQkWhla7 smA6AaPD/bY5dbzhZitq1Ot3BNWf59OJ/rmEdQ84LhLeWnYttQisVRY4w+SJspsGsdad ZigobTevKmKXP1Xn+v7xsoKHbhBGsEEtnZ0RKgcXoV+BaQZxKNd2TKXqT/j8AKx+ffSW K8stXafnXQ6MW9lxyIRmyNR/gwSIROeXmXYbsTtYW0q6NBSb9UOg/t3b/WOKwKFKhvLZ u8zg==
MIME-Version: 1.0
Received: by 10.42.92.17 with SMTP id r17mr4403742icm.39.1344708962627; Sat, 11 Aug 2012 11:16:02 -0700 (PDT)
Received: by 10.64.78.200 with HTTP; Sat, 11 Aug 2012 11:16:02 -0700 (PDT)
X-Originating-IP: [67.127.59.13]
In-Reply-To: <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
Date: Sat, 11 Aug 2012 11:16:02 -0700
Message-ID: <CAGZ8ZG0K+R93mQFtmQns0ahSbNqwXv+rSO78nEXNn=UweZqsrg@mail.gmail.com>
From: Trevor Perrin <trevp@trevp.net>
To: Chris Palmer <palmer@google.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQlagtxLrbLdB5q7zxWoZllZMxoN2emJJYE2n/4U7CQZbFjwdRFZz9X/VP/SkcVQmiW5/zCI
Cc: Chris Evans <cevans@google.com>, websec@ietf.org, saag@ietf.org, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 18:16:04 -0000

Hi Chris, all,

On Fri, Aug 10, 2012 at 3:20 PM, Chris Palmer <palmer@google.com> wrote:
> So ultimately I do think we should decide on either HPKP or TACK, but
> that we should make that decision after there has been some real-world
> deployment experience with both (or, sadly, real-world non-deployment
> of one or both).

My 2c: We should keep exploring both TACK and HPKP.  I'd like to see
both proposals fleshed out, so we can do an in-depth comparison.
We'll try to send a draft-01 in a couple weeks.


> Additionally, HPKP and TACK might converge, more or less. I have plans
> to publish a new HPKP I-D that borrows some of TACK's pin activation
> and expiration ideas, for example.

Awesome, looking forward to it.

There's some things you'll have to grapple with (is pin activation
performed for each key individually, or for the keys as a set?  when
is it performed?  etc.)


> Additionally, one of the main criticisms of HPKP is that it is tied to
> HTTP. I currently don't consider that a huge problem =97 even though I
> consider TACK's TLS-generic-ness a nice benefit =97 for several reasons:
>
> * HTTPS is the big, important application that we need to secure right no=
w.

Agreed: TACK's TLS-generic-ness is a nice benefit, but a good solution
for HTTPS is more important than reusability.


> * It's not clear that SMTP over TLS is very beneficial, because you
> can't stop delivery due to pin validation failure (or really even
> regular old X.509 failure).

Pinning for MTA-to-MTA SMTP seems useful.  Since receiving MTAs often
have invalid certificates, they're hard to authenticate any other way.
 If a sending MTA doesn't want to reject connections on pin failure,
it could run in "warn-only" mode.


> * SSH already has PKP. :)

Not proposing to change that.  But a TACK_Extension *could*,
theoretically, be embedded in non-TLS, non-X.509 protocols...  And
TACK *does* have some nice lifecycle features (activation, break sigs,
generations)...


> And finally, as Ben Laurie pointed out, there is also Certificate
> Transparency. I personally consider the "public log" class of
> solutions (of which CT is a leading member, along with Sovereign Keys)
> to be The Real Solution. Pinning-like solutions (including HPKP and
> TACK) are a good, quick fix =97 as long as they are quick and simple.

I think pinning is likely to coexist or integrate with future trust systems=
.

For example, Cert Transparency is cool and would help detect bad
certs, but pinning would prevent their use.  I think sites would want
to deploy pinning even in a CT world.

Also, self-asserted pins like TACK and HPKP can be detected by trust
infrastructure (think Convergence or Google Cert Catalog) which
publishes them for auditors to review and for client apps to download.
 So, in a broad sense (pinning, CT, Convergence) are all "public
knowledge" systems which have some similar benefits.

Anyways, quick and simple is always good, but we shouldn't view
pinning as a disposable technology.  (Not that you're saying that, but
just don't want it to be misconstrued).


Trevor

From ynir@checkpoint.com  Sat Aug 11 13:38:10 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E0FB21F8549 for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 13:38:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.407
X-Spam-Level: 
X-Spam-Status: No, score=-10.407 tagged_above=-999 required=5 tests=[AWL=0.192, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RwU1t1bMeT4z for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 13:38:10 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 94BDD21F8535 for <websec@ietf.org>; Sat, 11 Aug 2012 13:38:09 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q7BKbs7S003179; Sat, 11 Aug 2012 23:37:54 +0300
X-CheckPoint: {5026BF95-0-1B221DC2-4FFFF}
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Sat, 11 Aug 2012 23:37:54 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: Chris Palmer <palmer@google.com>
Date: Sat, 11 Aug 2012 23:37:52 +0300
Thread-Topic: [saag] [websec] Pinning
Thread-Index: Ac14AS5KvY5+O10lTRm44RvftP/6Qg==
Message-ID: <24C52325-8B51-4DA0-B21D-DC72E184BB23@checkpoint.com>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
In-Reply-To: <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: Chris Evans <cevans@google.com>, IETF WebSec WG <websec@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>, Sean Turner <turners@ieca.com>, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 20:38:10 -0000

Hi Chris

I've removed SAAG from CC, trimmed most of your message, and re-arranged th=
e rest. Hope you don't mind=85

On Aug 11, 2012, at 1:20 AM, Chris Palmer wrote:

> Additionally, HPKP and TACK might converge, more or less. I have plans
> to publish a new HPKP I-D that borrows some of TACK's pin activation
> and expiration ideas, for example.

<hat type=3D"chair">

Just as a reminder, HPKP is now a working group draft. As such, change cont=
rol is with the WG. Changes that change the rules for activation and expira=
tion should be proposed and discussed on the list first.=20

Having said that, we are pretty far from last call on key-pinning, so I thi=
nk it would be OK to publish a version -03 with such proposed changes, as l=
ong as those changes are clearly marked as not being the result of WG conse=
nsus.
</hat>

As an individual, I understand the limitations of the "spare public key" ap=
proach of the current HPKP. It's an administrative hassle to generate n spa=
re keys and keep them safe, and if you have n+1 key compromise events withi=
n the max-age time, your site is blocked. But it does have the big advantag=
e that the server side can be deployed *now* with no additional software. U=
ntil I see how those borrowed ideas can help with these issues, I prefer HP=
KP.

> So ultimately I do think we should decide on either HPKP or TACK, but
> that we should make that decision after there has been some real-world
> deployment experience with both (or, sadly, real-world non-deployment
> of one or both).

Well, there's WG deciding, and there's the market deciding. The IETF can pu=
blish both approaches (as either proposed standard or experimental) and the=
 one (if any) that the market prefers can later be upgraded to standard (or=
 it can stay at proposed anyway)

Yoav=

From tom@ritter.vg  Sat Aug 11 13:58:00 2012
Return-Path: <tom@ritter.vg>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E29821F859B for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 13:58:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.977
X-Spam-Level: 
X-Spam-Status: No, score=-2.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CA+Qv671c3Kh for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 13:57:59 -0700 (PDT)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id 66FD921F8599 for <websec@ietf.org>; Sat, 11 Aug 2012 13:57:59 -0700 (PDT)
Received: by vcbfo14 with SMTP id fo14so2785348vcb.31 for <websec@ietf.org>; Sat, 11 Aug 2012 13:57:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ritter.vg; s=vg; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; bh=U9B6V74B8WleZyW7SFp/ryISkli0NUZBnDYjuoGeEFM=; b=G3qKMup5qswfPRMEFL+JvdxHnijOXZejvoymp5+zMlFtFBAswA5YvGfruYWaop6/6w F3/uttQtvPbCgOlivZ0ahMUvKrKJwaSycqx089MhOIHrj3Mx2RBFQNU3ox+P2CUSKfTC o1nOIN/1X22rT7CZqBu2gI1G6LpzQXa6ZX2Lg=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding:x-gm-message-state; bh=U9B6V74B8WleZyW7SFp/ryISkli0NUZBnDYjuoGeEFM=; b=GTuamsa3DYONqGotbhHanZw/8BptYxcGQkLYGxX5DK66neaIWZduS3HIjHkBcqwVcY KVIUUgmRbp3ZS+KPoKSgSWO5/i2Y3IareJNIDEUotDxmxCiCuC2VKFkfemnqPN7dDG1x NxiIxiYXd1JKsesEO37PuDg37RHK519GfCUC9f6V6df2s9koZKUZ3tUgIdNruf0YCdnJ SfhHCyge5ewD0ZS9k1EHprBiwzSfXqufDNDixgkXkcT344sXnL2OgXnMzHeL0KFKGoHF zo1n53bsFg021Kt6nMWs1F4sen3GKUWHkCHynhpvmKEqzxfX4Fiqp7azdbp52HhC4GSp OluA==
Received: by 10.220.222.145 with SMTP id ig17mr1897253vcb.15.1344718678513; Sat, 11 Aug 2012 13:57:58 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.58.145.163 with HTTP; Sat, 11 Aug 2012 13:57:38 -0700 (PDT)
In-Reply-To: <24C52325-8B51-4DA0-B21D-DC72E184BB23@checkpoint.com>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com> <24C52325-8B51-4DA0-B21D-DC72E184BB23@checkpoint.com>
From: Tom Ritter <tom@ritter.vg>
Date: Sat, 11 Aug 2012 16:57:38 -0400
Message-ID: <CA+cU71m=PZRgG34TTTjby=yCbB_z+i4MjEAtVJKE3uOxcKeA1g@mail.gmail.com>
To: Yoav Nir <ynir@checkpoint.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQlfpSCGRuQTm/Cdoc/Zdeq5qK1JJKGtRhxfNOHKqruovRhOQ6RPXmDOxYdBF5xboribBjrr
Cc: Chris Evans <cevans@google.com>, IETF WebSec WG <websec@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>, Sean Turner <turners@ieca.com>, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag] Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 20:58:00 -0000

I don't know IETF procedure for making changes, but one of the
outstanding issues I don't think has been resolved with
draft-ietf-websec-key-pinning-02 is inherited DSA parameters.  I
raised this issue here:
http://www.ietf.org/mail-archive/web/websec/current/msg01027.html with
suggested verbiage.

-tom

On 11 August 2012 16:37, Yoav Nir <ynir@checkpoint.com> wrote:
> Hi Chris
>
> I've removed SAAG from CC, trimmed most of your message, and re-arranged =
the rest. Hope you don't mind=85
>
> On Aug 11, 2012, at 1:20 AM, Chris Palmer wrote:
>
>> Additionally, HPKP and TACK might converge, more or less. I have plans
>> to publish a new HPKP I-D that borrows some of TACK's pin activation
>> and expiration ideas, for example.
>
> <hat type=3D"chair">
>
> Just as a reminder, HPKP is now a working group draft. As such, change co=
ntrol is with the WG. Changes that change the rules for activation and expi=
ration should be proposed and discussed on the list first.
>
> Having said that, we are pretty far from last call on key-pinning, so I t=
hink it would be OK to publish a version -03 with such proposed changes, as=
 long as those changes are clearly marked as not being the result of WG con=
sensus.
> </hat>
>
> As an individual, I understand the limitations of the "spare public key" =
approach of the current HPKP. It's an administrative hassle to generate n s=
pare keys and keep them safe, and if you have n+1 key compromise events wit=
hin the max-age time, your site is blocked. But it does have the big advant=
age that the server side can be deployed *now* with no additional software.=
 Until I see how those borrowed ideas can help with these issues, I prefer =
HPKP.
>
>> So ultimately I do think we should decide on either HPKP or TACK, but
>> that we should make that decision after there has been some real-world
>> deployment experience with both (or, sadly, real-world non-deployment
>> of one or both).
>
> Well, there's WG deciding, and there's the market deciding. The IETF can =
publish both approaches (as either proposed standard or experimental) and t=
he one (if any) that the market prefers can later be upgraded to standard (=
or it can stay at proposed anyway)
>
> Yoav
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec

From trac+websec@trac.tools.ietf.org  Sat Aug 11 14:20:44 2012
Return-Path: <trac+websec@trac.tools.ietf.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0573421F84A1 for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:20:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.299
X-Spam-Level: 
X-Spam-Status: No, score=-102.299 tagged_above=-999 required=5 tests=[AWL=0.300, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ajLU6TCIyz+C for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:20:43 -0700 (PDT)
Received: from grenache.tools.ietf.org (grenache.tools.ietf.org [77.72.230.30]) by ietfa.amsl.com (Postfix) with ESMTP id 54A3121F847F for <websec@ietf.org>; Sat, 11 Aug 2012 14:20:43 -0700 (PDT)
Received: from localhost ([127.0.0.1]:49498 helo=grenache.tools.ietf.org ident=www-data) by grenache.tools.ietf.org with esmtp (Exim 4.77) (envelope-from <trac+websec@trac.tools.ietf.org>) id 1T0J6l-0001qI-I0; Sat, 11 Aug 2012 23:20:31 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: "websec issue tracker" <trac+websec@trac.tools.ietf.org>
X-Trac-Version: 0.12.2
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.2, by Edgewall Software
To: draft-ietf-websec-key-pinning@tools.ietf.org
X-Trac-Project: websec
Date: Sat, 11 Aug 2012 21:20:31 -0000
X-URL: http://tools.ietf.org/websec/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/websec/trac/ticket/50
Message-ID: <051.d94c07ecb13014cd35f8ea0580233d57@trac.tools.ietf.org>
X-Trac-Ticket-ID: 50
X-SA-Exim-Connect-IP: 127.0.0.1
X-SA-Exim-Rcpt-To: draft-ietf-websec-key-pinning@tools.ietf.org, websec@ietf.org
X-SA-Exim-Mail-From: trac+websec@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on grenache.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: cevans@google.com, palmer@google.com
Resent-Message-Id: <20120811212043.54A3121F847F@ietfa.amsl.com>
Resent-Date: Sat, 11 Aug 2012 14:20:43 -0700 (PDT)
Resent-From: trac+websec@trac.tools.ietf.org
Cc: websec@ietf.org
Subject: [websec]  #50: Handing of pinning DSA public keys
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 21:20:44 -0000

#50: Handing of pinning DSA public keys

 http://www.ietf.org/mail-archive/web/websec/current/msg01027.html

 To close up the hole with inherited parameters, in 2.2, prior to the
 "We pin public keys" note, add:

   If the SubjectPublicKeyInfo of a certificate is incomplete when taken
   in isolation, such as when holding a DSA key without domain parameters,
   a public key pin cannot be formed.

-- 
-------------------------+---------------------------------------------
 Reporter:  Tom Ritter   |      Owner:  draft-ietf-websec-key-pinning@…
     Type:  defect       |     Status:  new
 Priority:  major        |  Milestone:
Component:  key-pinning  |    Version:
 Severity:  -            |   Keywords:
-------------------------+---------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/websec/trac/ticket/50>
websec <http://tools.ietf.org/websec/>


From trac+websec@trac.tools.ietf.org  Sat Aug 11 14:22:38 2012
Return-Path: <trac+websec@trac.tools.ietf.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E580111E8097 for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:22:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.317
X-Spam-Level: 
X-Spam-Status: No, score=-102.317 tagged_above=-999 required=5 tests=[AWL=0.282, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XjQDSdoGaN1b for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:22:38 -0700 (PDT)
Received: from grenache.tools.ietf.org (grenache.tools.ietf.org [77.72.230.30]) by ietfa.amsl.com (Postfix) with ESMTP id EB4F111E8087 for <websec@ietf.org>; Sat, 11 Aug 2012 14:22:37 -0700 (PDT)
Received: from localhost ([127.0.0.1]:49681 helo=grenache.tools.ietf.org ident=www-data) by grenache.tools.ietf.org with esmtp (Exim 4.77) (envelope-from <trac+websec@trac.tools.ietf.org>) id 1T0J8m-00036K-J4; Sat, 11 Aug 2012 23:22:36 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: "websec issue tracker" <trac+websec@trac.tools.ietf.org>
X-Trac-Version: 0.12.2
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.2, by Edgewall Software
To: draft-ietf-websec-key-pinning@tools.ietf.org
X-Trac-Project: websec
Date: Sat, 11 Aug 2012 21:22:36 -0000
X-URL: http://tools.ietf.org/websec/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/websec/trac/ticket/51
Message-ID: <051.e05eae1872f8f91c7be05e9dcd2eafec@trac.tools.ietf.org>
X-Trac-Ticket-ID: 51
X-SA-Exim-Connect-IP: 127.0.0.1
X-SA-Exim-Rcpt-To: draft-ietf-websec-key-pinning@tools.ietf.org, websec@ietf.org
X-SA-Exim-Mail-From: trac+websec@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on grenache.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: cevans@google.com, palmer@google.com
Resent-Message-Id: <20120811212237.EB4F111E8087@ietfa.amsl.com>
Resent-Date: Sat, 11 Aug 2012 14:22:37 -0700 (PDT)
Resent-From: trac+websec@trac.tools.ietf.org
Cc: websec@ietf.org
Subject: [websec]  #51: Clarification of section 2.4
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 21:22:39 -0000

#51: Clarification of section 2.4

 In 2.4, adding a phrase to the parenthetical comment in the big paragraph
 :

    If the connection has no errors, the UA will then apply a new
    correctness check: Pin Validation.  To perform Pin Validation, the UA
    will compute the fingerprints of the SPKI structures in each
    certificate in the host's validated certificate chain.  (The UA
    ignores certificates whose SPKI cannot be taken in isolation and
    superfluous certificates in the chain that do not form part
    of the validating chain.)  The UA will then check that the set of
    these fingerprints intersects the set of fingerprints in that host's
    Pinning Metadata.  If there is set intersection, the UA continues
    with the connection as normal.  Otherwise, the UA MUST treat this Pin
    Failure as a non-recoverable error.

-- 
-------------------------+---------------------------------------------
 Reporter:  Tom Ritter   |      Owner:  draft-ietf-websec-key-pinning@…
     Type:  defect       |     Status:  new
 Priority:  major        |  Milestone:
Component:  key-pinning  |    Version:
 Severity:  -            |   Keywords:
-------------------------+---------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/websec/trac/ticket/51>
websec <http://tools.ietf.org/websec/>


From trac+websec@trac.tools.ietf.org  Sat Aug 11 14:23:49 2012
Return-Path: <trac+websec@trac.tools.ietf.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5B5311E8087 for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:23:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.332
X-Spam-Level: 
X-Spam-Status: No, score=-102.332 tagged_above=-999 required=5 tests=[AWL=0.267, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tIQHdATE64PU for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:23:49 -0700 (PDT)
Received: from grenache.tools.ietf.org (grenache.tools.ietf.org [77.72.230.30]) by ietfa.amsl.com (Postfix) with ESMTP id 255E811E8097 for <websec@ietf.org>; Sat, 11 Aug 2012 14:23:49 -0700 (PDT)
Received: from localhost ([127.0.0.1]:49860 helo=grenache.tools.ietf.org ident=www-data) by grenache.tools.ietf.org with esmtp (Exim 4.77) (envelope-from <trac+websec@trac.tools.ietf.org>) id 1T0J9v-0000uC-K3; Sat, 11 Aug 2012 23:23:47 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: "websec issue tracker" <trac+websec@trac.tools.ietf.org>
X-Trac-Version: 0.12.2
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.2, by Edgewall Software
To: draft-ietf-websec-key-pinning@tools.ietf.org
X-Trac-Project: websec
Date: Sat, 11 Aug 2012 21:23:47 -0000
X-URL: http://tools.ietf.org/websec/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/websec/trac/ticket/52
Message-ID: <051.df0a7eb62cdb49309147ff5b8eb8e401@trac.tools.ietf.org>
X-Trac-Ticket-ID: 52
X-SA-Exim-Connect-IP: 127.0.0.1
X-SA-Exim-Rcpt-To: draft-ietf-websec-key-pinning@tools.ietf.org, websec@ietf.org
X-SA-Exim-Mail-From: trac+websec@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on grenache.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: cevans@google.com, palmer@google.com
Resent-Message-Id: <20120811212349.255E811E8097@ietfa.amsl.com>
Resent-Date: Sat, 11 Aug 2012 14:23:49 -0700 (PDT)
Resent-From: trac+websec@trac.tools.ietf.org
Cc: websec@ietf.org
Subject: [websec]  #52: Clarification of section 2.3.1
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 21:23:50 -0000

#52: Clarification of section 2.3.1

 I'd suggest the following change to 2.3.1, clarifying it's
 required-ness and a max-age of 0.

 2.3.1.  max-age

    max-age specifies the number of seconds, after the reception of the
    Public-Key-Pins HTTP Response Header, during which the UA regards the
    host as a Pinned Host.  The delta-seconds production is specified in
    [rfc-2616].

    max-age is a required attribute. If omitted, the UA MUST NOT note the
    host as a Pinned Host, and MUST discard any previously set Pinning
    Metadata for that host in its non-volatile store.

    If max-age is set to 0, the UA MUST likewise discard any previsouly
    set Pinning Metadata.

-- 
-------------------------+---------------------------------------------
 Reporter:  Tom Ritter   |      Owner:  draft-ietf-websec-key-pinning@…
     Type:  defect       |     Status:  new
 Priority:  major        |  Milestone:
Component:  key-pinning  |    Version:
 Severity:  -            |   Keywords:
-------------------------+---------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/websec/trac/ticket/52>
websec <http://tools.ietf.org/websec/>


From ynir@checkpoint.com  Sat Aug 11 14:30:27 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9329021F858A for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:30:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.41
X-Spam-Level: 
X-Spam-Status: No, score=-10.41 tagged_above=-999 required=5 tests=[AWL=0.189,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DoynlUHmsO6G for <websec@ietfa.amsl.com>; Sat, 11 Aug 2012 14:30:27 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id ACA1021F8582 for <websec@ietf.org>; Sat, 11 Aug 2012 14:30:26 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q7BLUNeI006911; Sun, 12 Aug 2012 00:30:23 +0300
X-CheckPoint: {5026CBE1-0-1B221DC2-4FFFF}
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Sun, 12 Aug 2012 00:30:23 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: Tom Ritter <tom@ritter.vg>
Date: Sun, 12 Aug 2012 00:30:22 +0300
Thread-Topic: [websec] [saag] Pinning
Thread-Index: Ac14CIPZgeokpe+LR9W2BRgCmgILvg==
Message-ID: <B08F616B-23CE-48E1-BC9D-611FF640B44C@checkpoint.com>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com> <24C52325-8B51-4DA0-B21D-DC72E184BB23@checkpoint.com> <CA+cU71m=PZRgG34TTTjby=yCbB_z+i4MjEAtVJKE3uOxcKeA1g@mail.gmail.com>
In-Reply-To: <CA+cU71m=PZRgG34TTTjby=yCbB_z+i4MjEAtVJKE3uOxcKeA1g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: Chris Evans <cevans@google.com>, IETF WebSec WG <websec@ietf.org>, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag] Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 21:30:27 -0000

Hi Tom

On Aug 11, 2012, at 11:57 PM, Tom Ritter wrote:

> I don't know IETF procedure for making changes, but one of the
> outstanding issues I don't think has been resolved with
> draft-ietf-websec-key-pinning-02 is inherited DSA parameters.  I
> raised this issue here:
> http://www.ietf.org/mail-archive/web/websec/current/msg01027.html with
> suggested verbiage.

That message of yours flew under the radar. I don't know why.

The IETF procedure for making changes is to raise the suggestion on the mai=
ling list, and discuss it there until consensus is reached.

To help with that, we may use an issue tracker (similar to a bug tracker li=
ke bugzilla). I've opened three tickets for the issues in your email:
http://trac.tools.ietf.org/wg/websec/trac/ticket/50
http://trac.tools.ietf.org/wg/websec/trac/ticket/51
http://trac.tools.ietf.org/wg/websec/trac/ticket/52

We can start a thread on each of them.

Easy way is the editors start the thread with "looking at issue #50, we agr=
ee and it seems OK to us. Anyone object?", and then if nobody objects, the =
text is updated, a new draft is published, and if you think it's OK, we clo=
se the ticket.  If there are objections (by the editors or others), they ge=
t discussed.

Yoav


From jhutz@cmu.edu  Sat Aug 11 15:18:25 2012
Return-Path: <jhutz@cmu.edu>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0F5A21F8510; Sat, 11 Aug 2012 15:18:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hPqkBM2-prfs; Sat, 11 Aug 2012 15:18:25 -0700 (PDT)
Received: from smtp02.srv.cs.cmu.edu (SMTP02.SRV.CS.CMU.EDU [128.2.217.197]) by ietfa.amsl.com (Postfix) with ESMTP id 2120321F84D6; Sat, 11 Aug 2012 15:18:25 -0700 (PDT)
Received: from [192.168.202.154] (pool-74-111-100-191.pitbpa.fios.verizon.net [74.111.100.191]) (authenticated bits=0) by smtp02.srv.cs.cmu.edu (8.13.6/8.13.6) with ESMTP id q7BMIIL8021870 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Aug 2012 18:18:19 -0400 (EDT)
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: Chris Palmer <palmer@google.com>
In-Reply-To: <22134_1344637228_q7AMKQRp022297_CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <22134_1344637228_q7AMKQRp022297_CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"
Date: Sat, 11 Aug 2012 18:18:18 -0400
Message-ID: <1344723498.15925.63.camel@destiny.pc.cs.cmu.edu>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
X-Scanned-By: mimedefang-cmuscs on 128.2.217.197
X-Mailman-Approved-At: Mon, 13 Aug 2012 00:42:15 -0700
Cc: Chris Evans <cevans@google.com>, websec@ietf.org, paul.hoffman@vpnc.org, saag@ietf.org, Moxie Marlinspike <moxie@thoughtcrime.org>, jhutz@cmu.edu
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Aug 2012 22:18:25 -0000

On Fri, 2012-08-10 at 15:20 -0700, Chris Palmer wrote:

> * It's not clear that SMTP over TLS is very beneficial, because you
> can't stop delivery due to pin validation failure (or really even
> regular old X.509 failure).

That depends.  Key pinning may not be very interesting for accepting
coming mail from unknown sources, but it may be very interesting when
TLS is used for communication between cooperating components of an
enterprise mail system, or with an outsourced anti-smap or anti-virus or
backup MX service.  And of course, it's also interesting when TLS is
used to protect authenticated mail submission services -- a user sending
outgoing mail via his ISP probably doesn't want to tell his username and
password to just anyone.

> * SSH already has PKP.


Well, no.  Certainly, SSH clients making a leap-of-faith connection to a
previously unknown host will generally remember that host's public key.
And yes, once a host's public key is known, clients will generally
reject a host that presents a public key other than the one known for
that host.  But then, web browsers do the same thing for leap-of-faith
connections to web servers, when a server has a self-signed certificate
or one signed by an unknown CA.  But while this behavior is common, it
is not required by any standard, not something I'd expect an SSH client
to do when an X.509 certificate is used, and not the same thing as key
pinning.

So in fact, if this gets done at the application layer, it likely will
eventually have to happen for SSH, too.


I would really rather not see a proliferation of application-layer
extensions to handle pinning of the long-term keys used for TLS.  While
I haven't participated in previous discussion on this question, I think
that in the long run this is much better handled at the TLS layer.

That said, there may be a benefit to solving the problem for HTTP at the
HTTP layer, _if_ doing so allows us to get something deployed more
quickly than a TLS-layer solution.

-- Jeff


From fanf2@hermes.cam.ac.uk  Mon Aug 13 07:08:37 2012
Return-Path: <fanf2@hermes.cam.ac.uk>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3329721F8754; Mon, 13 Aug 2012 07:08:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.257
X-Spam-Level: 
X-Spam-Status: No, score=-6.257 tagged_above=-999 required=5 tests=[AWL=0.342,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xs04g9Jc444H; Mon, 13 Aug 2012 07:08:36 -0700 (PDT)
Received: from ppsw-50.csi.cam.ac.uk (ppsw-50.csi.cam.ac.uk [131.111.8.150]) by ietfa.amsl.com (Postfix) with ESMTP id 0971221F8752; Mon, 13 Aug 2012 07:08:35 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-SpamDetails: not scanned
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from hermes-2.csi.cam.ac.uk ([131.111.8.54]:35222) by ppsw-50.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.157]:25) with esmtpa (EXTERNAL:fanf2) id 1T0vJn-0003Hk-s4 (Exim 4.72) (return-path <fanf2@hermes.cam.ac.uk>); Mon, 13 Aug 2012 15:08:31 +0100
Received: from fanf2 (helo=localhost) by hermes-2.csi.cam.ac.uk (hermes.cam.ac.uk) with local-esmtp id 1T0vJn-00069I-LW (Exim 4.67) (return-path <fanf2@hermes.cam.ac.uk>); Mon, 13 Aug 2012 15:08:31 +0100
Date: Mon, 13 Aug 2012 15:08:31 +0100
From: Tony Finch <dot@dotat.at>
X-X-Sender: fanf2@hermes-2.csi.cam.ac.uk
To: Chris Palmer <palmer@google.com>
In-Reply-To: <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
Message-ID: <alpine.LSU.2.00.1208131503550.16775@hermes-2.csi.cam.ac.uk>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
User-Agent: Alpine 2.00 (LSU 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: Tony Finch <fanf2@hermes.cam.ac.uk>
X-Mailman-Approved-At: Mon, 13 Aug 2012 07:40:23 -0700
Cc: Chris Evans <cevans@google.com>, websec@ietf.org, paul.hoffman@vpnc.org, saag@ietf.org, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 14:08:37 -0000

Chris Palmer <palmer@google.com> wrote:
>
> * It's not clear that SMTP over TLS is very beneficial,

It is not beneficial at the moment because it is underspecified - there is
no specification that says which identity to check against the
certificate (mail domain vs. host name), and there are significant
problems with either choice. In practice this has led to most SMTP server
certificates being unvalidatable or containing the wrong name.

See also draft-fanf-dane-smtp for a possible way to sort out this mess.

> because you can't stop delivery due to pin validation failure (or really
> even regular old X.509 failure).

I disagree. You can (and usually have to) stop delivery for DNS failures;
there is no reason why you can't do the same for authentication errors.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Northwest FitzRoy, Sole, Lundy, Fastnet: Southwesterly backing southerly 4 or
5. Moderate, occasionally rough in northwest Fitzroy and west Sole. Rain or
thundery showers. Moderate or good.

From bhill@paypal-inc.com  Mon Aug 13 10:59:02 2012
Return-Path: <bhill@paypal-inc.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D928121F8736 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 10:59:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.117
X-Spam-Level: 
X-Spam-Status: No, score=-9.117 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, DNS_FROM_RFC_BOGUSMX=1.482, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ka4DHS3fJdCO for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 10:59:02 -0700 (PDT)
Received: from den-mipot-002.corp.ebay.com (den-mipot-002.corp.ebay.com [216.113.175.153]) by ietfa.amsl.com (Postfix) with ESMTP id 1099A21F8717 for <websec@ietf.org>; Mon, 13 Aug 2012 10:59:01 -0700 (PDT)
DomainKey-Signature: s=ppinc; d=paypal-inc.com; c=nofws; q=dns; h=X-EBay-Corp:X-IronPort-AV:Received:Received:From:To:CC: Subject:Thread-Topic:Thread-Index:Date:Message-ID: References:In-Reply-To:Accept-Language:Content-Language: X-MS-Has-Attach:X-MS-TNEF-Correlator:x-originating-ip: x-ems-proccessed:x-ems-stamp:Content-Type: Content-Transfer-Encoding:MIME-Version:X-CFilter; b=sTEdi0cVyQ+bO6kvBWyP3Kwqqts9zgjFnuYQhNvOMC69d2cPbS+3m+tI Bk4BTxxuwvruXn+NOKQJjjiY3KNPzYXlTTHSgEzrI/OkpswHvvvC6vmzi 3CSXNxR5DTlIKbY;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paypal-inc.com; i=bhill@paypal-inc.com; q=dns/txt; s=ppinc; t=1344880742; x=1376416742; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=8eWfkggcPI7YYhNmnGVJWRBAXS9Sb/glfyH8pSt691I=; b=ix8ktrnUHczzjVVRSggBgZBRxBtbtxFg6RXvACsQlRmavqky7JtqgBuo C6Q7B/hunEyiPSdjFbT98oFT4gXBIKX7RyH6N/mbceUR9e5pTyuZm5Sds fBwNp167ZSezjBa;
X-EBay-Corp: Yes
X-IronPort-AV: E=Sophos;i="4.77,761,1336374000";  d="scan'208";a="9625515"
Received: from den-vtenf-002.corp.ebay.com (HELO DEN-EXMHT-006.corp.ebay.com) ([10.101.112.213]) by den-mipot-002.corp.ebay.com with ESMTP; 13 Aug 2012 10:58:59 -0700
Received: from DEN-EXDDA-S12.corp.ebay.com ([fe80::40c1:9cf7:d21e:46c]) by DEN-EXMHT-006.corp.ebay.com ([fe80::5c45:283f:1e47:5cdf%17]) with mapi id 14.02.0298.004; Mon, 13 Aug 2012 11:58:54 -0600
From: "Hill, Brad" <bhill@paypal-inc.com>
To: Tom Ritter <tom@ritter.vg>, Chris Palmer <palmer@google.com>
Thread-Topic: [websec] handling STS header field extendability
Thread-Index: AQHNdnu9G2/cgF2QOE2DrHCPRwkn4JdT/HaAgAEaOQCAAvRWEA==
Date: Mon, 13 Aug 2012 17:58:53 +0000
Message-ID: <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com>
In-Reply-To: <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.245.27.242]
x-ems-proccessed: 10SqDH0iR7ekR7SRpKqm5A==
x-ems-stamp: Va++kfOLVR9lLOzqohWklg==
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter: Scanned
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 17:59:03 -0000

There are, of course, non-browser HTTP clients that may respect HSTS, but E=
V certificates in particular are aimed at a browser audience as it is about=
 user trust indicators.

EV is *not* a security boundary in browsers, however.  It is a brand awaren=
ess and consumer trust product.=20

I am not aware of any user agents that treat EV and non-EV content as havin=
g different effective security principals for purposes of the Same Origin P=
olicy.  So, although it is more difficult to get an EV certificate than a D=
V one, that does not provide any effective security against a MITM attacker=
 who can obtain a DV certificate.  Such an attacker can always act as a par=
tial MITM and provide, using a DV certificate, trojan script content in an =
iframe with no security indicators or substitute an external script in a le=
gitimate page and that script will have full access to content delivered wi=
th an EV certificate.

I would posit that means a feature like LockEV has little to no practical v=
alue unless and until (not likely) Web user agents provide origin isolation=
 between EV and non-EV content.

-Brad Hill

> -----Original Message-----
> From: websec-bounces@ietf.org [mailto:websec-bounces@ietf.org] On Behalf
> Of Tom Ritter
> Sent: Saturday, August 11, 2012 7:43 AM
> To: Chris Palmer
> Cc: Ben Campbell; IETF WebSec WG
> Subject: Re: [websec] handling STS header field extendability
>=20
> On 10 August 2012 17:52, Chris Palmer <palmer@google.com> wrote:
> > Please forgive my ignorance, but do LockCA and/or LockEV offer any
> > functionality that you can't already get with public key pinning as
> > currently specified? You can pin to a given CA's public key(s), and
> > you can pin to any given EV issuers' public keys.
>=20
> I can't think of one for Lock CA; but LockEV could be useful for sites th=
at want
> to deploy some additional measure, but can't/don't want to
> a) commit to a CA or b) enumerate all possible EV authorities.  It should=
 be
> ('should be', not 'is') more difficult to get a fraudulent EV certificate=
 through
> trickery or treachery than a DV certificate.
>=20
> I don't think browsers differentiate between OV and DV in any meaningful
> way, but I could be wrong.
>=20
> -tom
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec

From collin.jackson@west.cmu.edu  Mon Aug 13 12:22:19 2012
Return-Path: <collin.jackson@west.cmu.edu>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD7A521F858A for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 12:22:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.81
X-Spam-Level: 
X-Spam-Status: No, score=-2.81 tagged_above=-999 required=5 tests=[AWL=0.167,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a1WTN9Bfh1vH for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 12:22:19 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by ietfa.amsl.com (Postfix) with ESMTP id 4EA9B21F85F7 for <websec@ietf.org>; Mon, 13 Aug 2012 12:22:19 -0700 (PDT)
Received: by yhq56 with SMTP id 56so3932513yhq.31 for <websec@ietf.org>; Mon, 13 Aug 2012 12:22:18 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding:x-gm-message-state; bh=KbyV/x7lGNEBZlYNbvjVsxNajwDDBXL/ebyDjwnJgI4=; b=cIXaetTVAWtGs7XF4vPch5+iAoc2dN1YtVg+YOYXtFXIvtdHeTyKnTFuvEhnnqViSs Jc0sQLLKYntCtkaQ0cBldIKPavkRkg6cWX1J9fb/qZYOdtOUUwRc/5RocjyJCcrpmLC5 rG2DGfzxDkRaErz4yNWR7t3mzBmqbFQh1Ihl38ntbZwskFXzQMp5k3zxi4ypM1gDdDUJ qCdGwLB4KJUoy+u+DNtVBYaixuZsR9OWnsQiHyW2dvk0I+pn1YZSQQtxCCk9r6UipY1L fHuRBisOHHjRCnPijIFa2+F/CQRW5/IKbxeSEbY4FQZOYH58QjVHgoppSs8VnVxCO0/g OdIg==
Received: by 10.236.141.42 with SMTP id f30mr8945655yhj.120.1344885738814; Mon, 13 Aug 2012 12:22:18 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by mx.google.com with ESMTPS id y10sm654752yhd.6.2012.08.13.12.22.18 (version=SSLv3 cipher=OTHER); Mon, 13 Aug 2012 12:22:18 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so3751340ghb.31 for <websec@ietf.org>; Mon, 13 Aug 2012 12:22:17 -0700 (PDT)
Received: by 10.68.219.226 with SMTP id pr2mr19847587pbc.1.1344885737410; Mon, 13 Aug 2012 12:22:17 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.68.21.131 with HTTP; Mon, 13 Aug 2012 12:21:37 -0700 (PDT)
In-Reply-To: <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com>
From: Collin Jackson <collin.jackson@sv.cmu.edu>
Date: Mon, 13 Aug 2012 12:21:37 -0700
Message-ID: <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com>
To: "Hill, Brad" <bhill@paypal-inc.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQl9jU+lPuX2rRJGZYGQOnMEykPms93JSAOQvzYIt+yibCFAs+zzvZ3YenjGN0EzQeyBOmq7
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 19:22:19 -0000

On Mon, Aug 13, 2012 at 10:58 AM, Hill, Brad <bhill@paypal-inc.com> wrote:
> There are, of course, non-browser HTTP clients that may respect HSTS, but=
 EV certificates in particular are aimed at a browser audience as it is abo=
ut user trust indicators.
>
> EV is *not* a security boundary in browsers, however.  It is a brand awar=
eness and consumer trust product.
>
> I am not aware of any user agents that treat EV and non-EV content as hav=
ing different effective security principals for purposes of the Same Origin=
 Policy.  So, although it is more difficult to get an EV certificate than a=
 DV one, that does not provide any effective security against a MITM attack=
er who can obtain a DV certificate.  Such an attacker can always act as a p=
artial MITM and provide, using a DV certificate, trojan script content in a=
n iframe with no security indicators or substitute an external script in a =
legitimate page and that script will have full access to content delivered =
with an EV certificate.
>
> I would posit that means a feature like LockEV has little to no practical=
 value unless and until (not likely) Web user agents provide origin isolati=
on between EV and non-EV content.

Quite the opposite, you just made the argument in favor of LockEV. If
LockEV is being used, the MITM attack with a DV certificate would no
longer be possible, because the DV certificate would not be accepted
by the browser.

Collin

From paul.hoffman@vpnc.org  Mon Aug 13 14:00:41 2012
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A97B321F849B for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:00:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xGhfbAub-NiT for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:00:41 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 6FC3021F849A for <websec@ietf.org>; Mon, 13 Aug 2012 14:00:40 -0700 (PDT)
Received: from sn87.proper.com (sn87.proper.com [75.101.18.87]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.5) with ESMTP id q7DL0bWZ038968 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 13 Aug 2012 14:00:38 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com>
Date: Mon, 13 Aug 2012 14:00:37 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com>
To: Collin Jackson <collin.jackson@sv.cmu.edu>
X-Mailer: Apple Mail (2.1278)
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:00:41 -0000

On Aug 13, 2012, at 12:21 PM, Collin Jackson wrote:

> On Mon, Aug 13, 2012 at 10:58 AM, Hill, Brad <bhill@paypal-inc.com> =
wrote:
>> There are, of course, non-browser HTTP clients that may respect HSTS, =
but EV certificates in particular are aimed at a browser audience as it =
is about user trust indicators.
>>=20
>> EV is *not* a security boundary in browsers, however.  It is a brand =
awareness and consumer trust product.
>>=20
>> I am not aware of any user agents that treat EV and non-EV content as =
having different effective security principals for purposes of the Same =
Origin Policy.  So, although it is more difficult to get an EV =
certificate than a DV one, that does not provide any effective security =
against a MITM attacker who can obtain a DV certificate.  Such an =
attacker can always act as a partial MITM and provide, using a DV =
certificate, trojan script content in an iframe with no security =
indicators or substitute an external script in a legitimate page and =
that script will have full access to content delivered with an EV =
certificate.
>>=20
>> I would posit that means a feature like LockEV has little to no =
practical value unless and until (not likely) Web user agents provide =
origin isolation between EV and non-EV content.
>=20
> Quite the opposite, you just made the argument in favor of LockEV. If
> LockEV is being used, the MITM attack with a DV certificate would no
> longer be possible, because the DV certificate would not be accepted
> by the browser.

In what case is that attack useful? The public key would still be the =
one that the site thought they had an EV cert for.

Confused...

--Paul Hoffman=

From collin.jackson@west.cmu.edu  Mon Aug 13 14:09:47 2012
Return-Path: <collin.jackson@west.cmu.edu>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4B3121F865E for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:09:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.866
X-Spam-Level: 
X-Spam-Status: No, score=-2.866 tagged_above=-999 required=5 tests=[AWL=0.111,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NPI0nfBDanLO for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:09:47 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id EA99F21F8650 for <websec@ietf.org>; Mon, 13 Aug 2012 14:09:46 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so3886882ghb.31 for <websec@ietf.org>; Mon, 13 Aug 2012 14:09:46 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding:x-gm-message-state; bh=fTHvW0PRGdEEbjYwxzA6ncTVTRvOInE6bYZ78beLlc8=; b=nCrNsNzmeYIY4+q7Dlpqr3pGjQWj171QyUZqe/f8Qk5ZoHZTMrxBcXvWIvsi8S70Lf ytNCodlSxXdyvmOkMkZETYuvnabrzqseQhk2H5UE2jfKIVH7KNOUP7OxPF0BfUw887MM 7Tt0cMGQWqeL0Cr3DMHU1YkRJBYyOG0xaqavO70xoXfsAU2r+bbyfWuw1twMZ/q3FWys le6VP0tCM1KpwdJg0v26NIzTmMnI9nLAhOJQBJSj4haTvB2kUMT964NsfWmIcQhD7ijQ x1eWemB92KXSLu9yN0gcmqKX0jUU2SwG2hdZzmS0i2VnxFDoxqdksLHoB5CX+CAmgioV p/bg==
Received: by 10.236.78.3 with SMTP id f3mr12553492yhe.34.1344892186509; Mon, 13 Aug 2012 14:09:46 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by mx.google.com with ESMTPS id l1sm1148581yhm.19.2012.08.13.14.09.46 (version=SSLv3 cipher=OTHER); Mon, 13 Aug 2012 14:09:46 -0700 (PDT)
Received: by yhq56 with SMTP id 56so4066722yhq.31 for <websec@ietf.org>; Mon, 13 Aug 2012 14:09:45 -0700 (PDT)
Received: by 10.66.74.67 with SMTP id r3mr18674398pav.1.1344892185348; Mon, 13 Aug 2012 14:09:45 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.68.21.131 with HTTP; Mon, 13 Aug 2012 14:09:05 -0700 (PDT)
In-Reply-To: <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org>
From: Collin Jackson <collin.jackson@sv.cmu.edu>
Date: Mon, 13 Aug 2012 14:09:05 -0700
Message-ID: <CANVv-VcEwGR3TyvJDSDxb9Y141-GSozAJtMBSFwDh9O6Oz_RTA@mail.gmail.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQnaOdLJXymrRRhBuz4lPF7LyfbBQPpAwUCJwoT/nxS3qpr+RwBYoBS6bw3nB8WxJpEFGOBu
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:09:47 -0000

I don't understand your question, but I'll attempt to rephrase my comment.

Brad was describing a network attacker that was able to obtain a DV
certificate (but not an EV certificate) for a target site. The
attacker can "act as a partial MITM and provide, using a DV
certificate, trojan script content in an iframe with no security
indicators or substitute an external script in a legitimate page and
that script will have full access to content delivered with an EV
certificate." This would allow, for example, the attacker to read
cookies and passwords entered into a bank's login form.

My point is that if the site is using LockEV, the network attacker's
DV certificate is useless, so LockEV is useful even if the browser's
script access checks don't pay attention to the EV/DV distinction.

On Mon, Aug 13, 2012 at 2:00 PM, Paul Hoffman <paul.hoffman@vpnc.org> wrote=
:
> On Aug 13, 2012, at 12:21 PM, Collin Jackson wrote:
>
>> On Mon, Aug 13, 2012 at 10:58 AM, Hill, Brad <bhill@paypal-inc.com> wrot=
e:
>>> There are, of course, non-browser HTTP clients that may respect HSTS, b=
ut EV certificates in particular are aimed at a browser audience as it is a=
bout user trust indicators.
>>>
>>> EV is *not* a security boundary in browsers, however.  It is a brand aw=
areness and consumer trust product.
>>>
>>> I am not aware of any user agents that treat EV and non-EV content as h=
aving different effective security principals for purposes of the Same Orig=
in Policy.  So, although it is more difficult to get an EV certificate than=
 a DV one, that does not provide any effective security against a MITM atta=
cker who can obtain a DV certificate.  Such an attacker can always act as a=
 partial MITM and provide, using a DV certificate, trojan script content in=
 an iframe with no security indicators or substitute an external script in =
a legitimate page and that script will have full access to content delivere=
d with an EV certificate.
>>>
>>> I would posit that means a feature like LockEV has little to no practic=
al value unless and until (not likely) Web user agents provide origin isola=
tion between EV and non-EV content.
>>
>> Quite the opposite, you just made the argument in favor of LockEV. If
>> LockEV is being used, the MITM attack with a DV certificate would no
>> longer be possible, because the DV certificate would not be accepted
>> by the browser.
>
> In what case is that attack useful? The public key would still be the one=
 that the site thought they had an EV cert for.
>
> Confused...
>
> --Paul Hoffman

From paul.hoffman@vpnc.org  Mon Aug 13 14:17:45 2012
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4ECF21F8691 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:17:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j8bBguCryVfm for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:17:45 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 155EE21F8645 for <websec@ietf.org>; Mon, 13 Aug 2012 14:17:45 -0700 (PDT)
Received: from sn87.proper.com (sn87.proper.com [75.101.18.87]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.5) with ESMTP id q7DLHhNR046730 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 13 Aug 2012 14:17:43 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <CANVv-VcEwGR3TyvJDSDxb9Y141-GSozAJtMBSFwDh9O6Oz_RTA@mail.gmail.com>
Date: Mon, 13 Aug 2012 14:17:43 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <9AC35DC0-6863-4C3F-AF4F-E34D4CD632CC@vpnc.org>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org> <CANVv-VcEwGR3TyvJDSDxb9Y141-GSozAJtMBSFwDh9O6Oz_RTA@mail.gmail.com>
To: Collin Jackson <collin.jackson@sv.cmu.edu>
X-Mailer: Apple Mail (2.1278)
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:17:45 -0000

On Aug 13, 2012, at 2:09 PM, Collin Jackson wrote:

> Brad was describing a network attacker that was able to obtain a DV
> certificate (but not an EV certificate) for a target site. The
> attacker can "act as a partial MITM and provide, using a DV
> certificate, trojan script content in an iframe with no security
> indicators or substitute an external script in a legitimate page and
> that script will have full access to content delivered with an EV
> certificate." This would allow, for example, the attacker to read
> cookies and passwords entered into a bank's login form.
>=20
> My point is that if the site is using LockEV, the network attacker's
> DV certificate is useless, so LockEV is useful even if the browser's
> script access checks don't pay attention to the EV/DV distinction.

If the site did LockEV without ever locking its public key or CA, you =
would be right. That seems like a ridiculous policy, though. LockCA =
seems much more likely.

--Paul Hoffman=

From bhill@paypal-inc.com  Mon Aug 13 14:21:05 2012
Return-Path: <bhill@paypal-inc.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA8FA21F84B3 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:21:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.117
X-Spam-Level: 
X-Spam-Status: No, score=-9.117 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, DNS_FROM_RFC_BOGUSMX=1.482, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 056Tl3MCFdAE for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:21:05 -0700 (PDT)
Received: from den-mipot-001.corp.ebay.com (den-mipot-001.corp.ebay.com [216.113.175.152]) by ietfa.amsl.com (Postfix) with ESMTP id E4DD721F84A0 for <websec@ietf.org>; Mon, 13 Aug 2012 14:21:04 -0700 (PDT)
DomainKey-Signature: s=ppinc; d=paypal-inc.com; c=nofws; q=dns; h=X-EBay-Corp:X-IronPort-AV:Received:Received:From:To:CC: Subject:Thread-Topic:Thread-Index:Date:Message-ID: References:In-Reply-To:Accept-Language:Content-Language: X-MS-Has-Attach:X-MS-TNEF-Correlator:x-originating-ip: x-ems-proccessed:x-ems-stamp:Content-Type: Content-Transfer-Encoding:MIME-Version:X-CFilter; b=MW/1BtIFwxRasd3rDmVRmaXKgRRz73d4VdfOkY3aoCgGrZXuDDAspiO7 JnV8VyfJjn2oOhxLfTb5fxlge6Q3zaqzWfLm9IPx9cgAPSaZszW6VclNf UeEbQAn2Hob6RuA;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paypal-inc.com; i=bhill@paypal-inc.com; q=dns/txt; s=ppinc; t=1344892865; x=1376428865; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=zfiIxbPDSRk/NLw6Qw88wmM3/eqTnhshQUo081sisHQ=; b=UY8r2OVyGDIHv3dk6n8ASPDu+HeWe7NZAmxE6qTYTfb8DiZWDDry25nD M3Ye0ZB1P9CQYHqQsB6zKHU1lpgii6aZl68DVypJPHp6xpa+nBUo1Tm1t hMfR8PSj9otLUjr;
X-EBay-Corp: Yes
X-IronPort-AV: E=Sophos;i="4.77,762,1336374000"; d="scan'208,217";a="9146511"
Received: from den-vtenf-001.corp.ebay.com (HELO DEN-EXMHT-006.corp.ebay.com) ([10.101.112.212]) by den-mipot-001.corp.ebay.com with ESMTP; 13 Aug 2012 14:21:04 -0700
Received: from DEN-EXDDA-S12.corp.ebay.com ([fe80::40c1:9cf7:d21e:46c]) by DEN-EXMHT-006.corp.ebay.com ([fe80::5c45:283f:1e47:5cdf%17]) with mapi id 14.02.0298.004; Mon, 13 Aug 2012 15:20:21 -0600
From: "Hill, Brad" <bhill@paypal-inc.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>, Collin Jackson <collin.jackson@sv.cmu.edu>
Thread-Topic: [websec] handling STS header field extendability
Thread-Index: AQHNdnu9G2/cgF2QOE2DrHCPRwkn4JdT/HaAgAEaOQCAAvRWEIAAfk+AgAAbqYD//53BMA==
Date: Mon, 13 Aug 2012 21:20:20 +0000
Message-ID: <370C9BEB4DD6154FA963E2F79ADC6F2E1C2818@DEN-EXDDA-S12.corp.ebay.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org>
In-Reply-To: <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.245.27.242]
x-ems-proccessed: 10SqDH0iR7ekR7SRpKqm5A==
x-ems-stamp: zn7wKYpsPqCW7ONKLuM9bQ==
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter: Scanned
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:21:05 -0000

I have an EV certificate for www.example.com.  On the main page, it include=
s the following tag:

 <script src=3D"https://scripts.example.com/myscript.js">

Mallory is presumably much more likely to be able to obtain a DV certificat=
e for scripts.example.com than an EV cert for www.example.com.  But Mallory=
 can still use the DV certificate to attack the EV content at www.example.c=
om by MITMing the fetch of myscript.js, which will be transcluded into the =
DOM. =20

Or alternately, assume that Mallory gets a DV certificate for www.example.c=
om which is different (and has a different key pair) from my legitimate EV =
certificate.  Mallory can still MITM content loaded in some frame other tha=
n the one displaying the EV indicator and gain control of that content beca=
use her "www.example.com" using the DV certificate is the same origin as my=
 "www.example.com" using the EV one.

So, Collin is right that perhaps I'm making the case *for* LockEV, but as m=
y first example shows, it would have to include a full-fledged mixed-conten=
t distinction between EV and non-EV, as currently exists between HTTPS and =
HTTP.

When you start to consider more modern technologies for intercommunication =
between multiple instances of client-side apps with things like postMessage=
, webRTC, etc. I wonder if you wouldn't need a full-fledged origin distinct=
ion on EV/non-EV, as we do today on protocol, to create a strong barrier, a=
nd if it is worth it and there is any appetite among browser vendors for su=
ch a thing.

-Brad

> -----Original Message-----
> From: Paul Hoffman [mailto:paul.hoffman@vpnc.org]
> Sent: Monday, August 13, 2012 2:01 PM
> To: Collin Jackson
> Cc: Hill, Brad; Ben Campbell; IETF WebSec WG
> Subject: Re: [websec] handling STS header field extendability
>=20
> On Aug 13, 2012, at 12:21 PM, Collin Jackson wrote:
>=20
> > On Mon, Aug 13, 2012 at 10:58 AM, Hill, Brad <bhill@paypal-inc.com>
> wrote:
> >> There are, of course, non-browser HTTP clients that may respect HSTS, =
but
> EV certificates in particular are aimed at a browser audience as it is ab=
out
> user trust indicators.
> >>
> >> EV is *not* a security boundary in browsers, however.  It is a brand
> awareness and consumer trust product.
> >>
> >> I am not aware of any user agents that treat EV and non-EV content as
> having different effective security principals for purposes of the Same O=
rigin
> Policy.  So, although it is more difficult to get an EV certificate than =
a DV one,
> that does not provide any effective security against a MITM attacker who =
can
> obtain a DV certificate.  Such an attacker can always act as a partial MI=
TM and
> provide, using a DV certificate, trojan script content in an iframe with =
no
> security indicators or substitute an external script in a legitimate page=
 and
> that script will have full access to content delivered with an EV certifi=
cate.
> >>
> >> I would posit that means a feature like LockEV has little to no practi=
cal
> value unless and until (not likely) Web user agents provide origin isolat=
ion
> between EV and non-EV content.
> >
> > Quite the opposite, you just made the argument in favor of LockEV. If
> > LockEV is being used, the MITM attack with a DV certificate would no
> > longer be possible, because the DV certificate would not be accepted
> > by the browser.
>=20
> In what case is that attack useful? The public key would still be the one=
 that
> the site thought they had an EV cert for.
>=20
> Confused...
>=20
> --Paul Hoffman

From palmer@google.com  Mon Aug 13 14:22:32 2012
Return-Path: <palmer@google.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9053B21F8650 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:22:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.977
X-Spam-Level: 
X-Spam-Status: No, score=-102.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QIk94oPRyhVc for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:22:32 -0700 (PDT)
Received: from mail-lb0-f172.google.com (mail-lb0-f172.google.com [209.85.217.172]) by ietfa.amsl.com (Postfix) with ESMTP id C769521F8627 for <websec@ietf.org>; Mon, 13 Aug 2012 14:22:31 -0700 (PDT)
Received: by lbbgg6 with SMTP id gg6so2404300lbb.31 for <websec@ietf.org>; Mon, 13 Aug 2012 14:22:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding:x-system-of-record; bh=V6adZXw7ytlxXXArWmeKM/+4aXR9p+433dopEcv8iss=; b=Pu2DgPynyEPrpudOgRhhCqJcAhUuIuaCi/HY6wEAOsXR6H1CJJxb/F+NzeqwXGnO6n 2YDgdPpndal69Zw3yAg101KP0ScdWqXB/TNGW7TNpVj9puur9wIxCLkuQ1yaml0Nj738 /JoOfJc/nTqrSYhqmIakzz+vc4W2+Ebu9ZZCXbDRwzE+SCM/Q9XBhH6YUafCvp7zVvZT bSufeyDr0hd3EI7GUwgwx5ypQ5UC76IRnJsD4uCtrSNcmDssUYfokuqqEchtwjr+d1i+ njYdmXENW0t9+9/aHSx1CdhCAlguJHalwuBzitrqvNoDY5tVZfJjsoXqLvZAtqp2MXPR T5iw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding:x-system-of-record :x-gm-message-state; bh=V6adZXw7ytlxXXArWmeKM/+4aXR9p+433dopEcv8iss=; b=h1X2cOLMBDb8Rh00EX5aoZr45eW8AGIaZX8yUCcMI6stLOQTbSbB4R6b4jVXWN7/+3 3ijUSozVGmrZz/5eSpW61qTP+ME84O5JsPdS35d0Ni0JKcwSZXmR4gqvNa1KMf/bWpJ1 zHAwfmTUmg1TVLw8dmXM/Rn4q/o532+BM+GS5KEjBuXiCo0Cpe1vfY38uZ6oP5bZs3gA 6J9b5NziH9n7gwk1NNuTq9QcQLCMLORGhxx7PHIcDPNlzekvPLNI2OTv2ycO2r83E9xH RAjGcz3IaYvcK9c+mqf2//dSI7vIBEUtJUHJOdQIEIDiAP+OoakUTlFtGzo1LB/E0DoZ /Azw==
Received: by 10.152.111.71 with SMTP id ig7mr13294940lab.28.1344892950808; Mon, 13 Aug 2012 14:22:30 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.152.111.71 with SMTP id ig7mr13294923lab.28.1344892950695; Mon, 13 Aug 2012 14:22:30 -0700 (PDT)
Received: by 10.112.77.4 with HTTP; Mon, 13 Aug 2012 14:22:30 -0700 (PDT)
In-Reply-To: <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com>
Date: Mon, 13 Aug 2012 14:22:30 -0700
Message-ID: <CAOuvq20sW5zsR5bSTpNFenmttE2Oj9YCYJHmaKRxUxmpf9w-WQ@mail.gmail.com>
From: Chris Palmer <palmer@google.com>
To: Collin Jackson <collin.jackson@sv.cmu.edu>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
X-Gm-Message-State: ALoCoQluO7yvaYU/rhTRq0MzhdQ1kgmXM9IjnRkc886v9ulUXIFehVfH1MVmQFLm6H9as4EbK1GKTDReCb8n6Tf+UioIHrPh1xeaF2MEcWTkfDqc58G0nM33VO2TOr/f8XsP4O0th3bdKVvDHWfgzPBacnWJrkqlljTXOoRJgPyb8/DHSF8aQGaCOiFk08R9fvDxTbNXOzDW
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:22:32 -0000

On Mon, Aug 13, 2012 at 12:21 PM, Collin Jackson
<collin.jackson@sv.cmu.edu> wrote:

> Quite the opposite, you just made the argument in favor of LockEV. If
> LockEV is being used, the MITM attack with a DV certificate would no
> longer be possible, because the DV certificate would not be accepted
> by the browser.

Not to intentionally pick on PayPal =E2=80=94 sorry, Brad :) =E2=80=94 but =
the attack
works because of explicit cross-origin script inclusion. The first
demo of this attack I saw was by Sotirov and Zusman at CanSecWest some
years ago. In the attack demo, EV paypal.com includes (included)
script from non-EV paypalobjects.com. If you distinguish EV paypal.com
and non-EV paypal.com as distinct origins, it doesn't help anything if
either origin explicitly includes script from any other origin (of any
security level).

Now, maybe you mean that we would treat EV and non-EV HTTPS mixed
scripting content as a new kind of mixed scripting problem, and then
have a rule of blocking mixed EV/non-EV scripting by default. We
recently changed Chrome to block mixed HTTP/HTTPS mixed scripting by
default, and that was "exciting" enough. Maybe someday we can block or
warn about mixed EV/non-EV content, but not in the next release,
probably...

From paul.hoffman@vpnc.org  Mon Aug 13 14:29:05 2012
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5783A11E8087 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:29:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B6uXOcJbYJdR for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:29:04 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id BD7B111E8072 for <websec@ietf.org>; Mon, 13 Aug 2012 14:29:04 -0700 (PDT)
Received: from sn87.proper.com (sn87.proper.com [75.101.18.87]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.5) with ESMTP id q7DLT3AM051862 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 13 Aug 2012 14:29:03 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <370C9BEB4DD6154FA963E2F79ADC6F2E1C2818@DEN-EXDDA-S12.corp.ebay.com>
Date: Mon, 13 Aug 2012 14:29:03 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <3811BC26-9859-4F3C-A5B3-E1EA0C7F522D@vpnc.org>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org> <370C9BEB4DD6154FA963E2F79ADC6F2E1C2818@DEN-EXDDA-S12.corp.ebay.com>
To: "Hill, Brad" <bhill@paypal-inc.com>
X-Mailer: Apple Mail (2.1278)
Cc: IETF WebSec WG <websec@ietf.org>, Ben Campbell <ben@nostrum.com>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:29:05 -0000

On Aug 13, 2012, at 2:20 PM, Hill, Brad wrote:

> I have an EV certificate for www.example.com.  On the main page, it =
includes the following tag:
>=20
> <script src=3D"https://scripts.example.com/myscript.js">
>=20
> Mallory is presumably much more likely to be able to obtain a DV =
certificate for scripts.example.com than an EV cert for www.example.com. =
 But Mallory can still use the DV certificate to attack the EV content =
at www.example.com by MITMing the fetch of myscript.js, which will be =
transcluded into the DOM. =20

If the security model is that www.example.com and scripts.example.com =
have the same security properties, then you are right. I don't see that =
in HSTS, but I could be missing something.

> Or alternately, assume that Mallory gets a DV certificate for =
www.example.com which is different (and has a different key pair) from =
my legitimate EV certificate.  Mallory can still MITM content loaded in =
some frame other than the one displaying the EV indicator and gain =
control of that content because her "www.example.com" using the DV =
certificate is the same origin as my "www.example.com" using the EV one.

Again: instead of "LockEV", wouldn't a much saner security policy be =
"LockKey"?

> So, Collin is right that perhaps I'm making the case *for* LockEV, but =
as my first example shows, it would have to include a full-fledged =
mixed-content distinction between EV and non-EV, as currently exists =
between HTTPS and HTTP.

...which seems like a bad idea whose only value is to sell EV certs.

> When you start to consider more modern technologies for =
intercommunication between multiple instances of client-side apps with =
things like postMessage, webRTC, etc. I wonder if you wouldn't need a =
full-fledged origin distinction on EV/non-EV, as we do today on =
protocol, to create a strong barrier, and if it is worth it and there is =
any appetite among browser vendors for such a thing.

Why not just use full-fledged origin non-distiction? What value does =
"EV" bring here?

--Paul Hoffman=

From bhill@paypal-inc.com  Mon Aug 13 14:31:21 2012
Return-Path: <bhill@paypal-inc.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02E8021F84E4 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:31:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.117
X-Spam-Level: 
X-Spam-Status: No, score=-9.117 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, DNS_FROM_RFC_BOGUSMX=1.482, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xmyl+1fUsTd4 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:31:20 -0700 (PDT)
Received: from den-mipot-002.corp.ebay.com (den-mipot-002.corp.ebay.com [216.113.175.153]) by ietfa.amsl.com (Postfix) with ESMTP id 1454521F84B9 for <websec@ietf.org>; Mon, 13 Aug 2012 14:31:17 -0700 (PDT)
DomainKey-Signature: s=ppinc; d=paypal-inc.com; c=nofws; q=dns; h=X-EBay-Corp:X-IronPort-AV:Received:Received:From:To:CC: Subject:Thread-Topic:Thread-Index:Date:Message-ID: References:Accept-Language:Content-Language: X-MS-Has-Attach:X-MS-TNEF-Correlator:x-originating-ip: x-ems-proccessed:x-ems-stamp:Content-Type: Content-Transfer-Encoding:MIME-Version:X-CFilter; b=uCE/fOEDNB5nrHtg0/f/0pdXC9yeSXXFRXBp9VF6twYa9FHLXUmettgF a9lup6ybJswyzZ8Bk08y706bEgXTnyULU0HMYsn87gCBjD95KeGVwtDKT LN3wIDQorAEKJA0;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paypal-inc.com; i=bhill@paypal-inc.com; q=dns/txt; s=ppinc; t=1344893477; x=1376429477; h=from:to:cc:subject:date:message-id:references: content-transfer-encoding:mime-version; bh=YKcUnsfv+V6PY0TYDs8+eix38k9vWdp5W5MKC0EJ/e0=; b=TF6kHzZPjCuyV1S9Hdls3q6ix200Sd1lNYw9EyjTdFlkIVXtKzzD7Vzh 2BMsxoNsrjbG03j63Fi2iGWurPxOP5N9RcnMYdQKhGX7ThtFNSR4XFZhJ iMU1XsGFLBqx3ft;
X-EBay-Corp: Yes
X-IronPort-AV: E=Sophos;i="4.77,762,1336374000"; d="scan'208,217";a="9633626"
Received: from den-vtenf-002.corp.ebay.com (HELO DEN-EXMHT-004.corp.ebay.com) ([10.101.112.213]) by den-mipot-002.corp.ebay.com with ESMTP; 13 Aug 2012 14:31:17 -0700
Received: from DEN-EXDDA-S12.corp.ebay.com ([fe80::40c1:9cf7:d21e:46c]) by DEN-EXMHT-004.corp.ebay.com ([fe80::a487:c570:9abc:bb59%14]) with mapi id 14.02.0298.004; Mon, 13 Aug 2012 15:31:13 -0600
From: "Hill, Brad" <bhill@paypal-inc.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>, Collin Jackson <collin.jackson@sv.cmu.edu>
Thread-Topic: [websec] handling STS header field extendability
Thread-Index: AQHNdnu9G2/cgF2QOE2DrHCPRwkn4JdT/HaAgAEaOQCAAvRWEIAAfk+AgAAbqYD//53BMIAAA9oQ
Date: Mon, 13 Aug 2012 21:31:11 +0000
Message-ID: <370C9BEB4DD6154FA963E2F79ADC6F2E1C2866@DEN-EXDDA-S12.corp.ebay.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org> 
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.245.27.242]
x-ems-proccessed: 10SqDH0iR7ekR7SRpKqm5A==
x-ems-stamp: RTNtbDiG+uAzf2lJRd2CXQ==
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter: Scanned
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:31:21 -0000

tl;dr version:

EV is not a security boundary today in web user agents, it is a way to get =
a user interface decoration.

If we want to ask browser vendors to make it into a security boundary which=
 they will defend, we need to think about a fairly complex and broad threat=
 model.

I'm not convinced that:

a) it's worth doing LockEV unless it's going to be a real security barrier
b) the complexity introduced in making it a real security barrier is worth =
it for such a rare attack

-Brad

> -----Original Message-----
> From: Hill, Brad
> Sent: Monday, August 13, 2012 2:20 PM
> To: 'Paul Hoffman'; Collin Jackson
> Cc: Ben Campbell; IETF WebSec WG
> Subject: RE: [websec] handling STS header field extendability
>=20
> I have an EV certificate for www.example.com.  On the main page, it inclu=
des
> the following tag:
>=20
>  <script src=3D"https://scripts.example.com/myscript.js">
>=20
> Mallory is presumably much more likely to be able to obtain a DV certific=
ate
> for scripts.example.com than an EV cert for www.example.com.  But Mallory
> can still use the DV certificate to attack the EV content at www.example.=
com
> by MITMing the fetch of myscript.js, which will be transcluded into the D=
OM.
>=20
> Or alternately, assume that Mallory gets a DV certificate for
> www.example.com which is different (and has a different key pair) from my
> legitimate EV certificate.  Mallory can still MITM content loaded in some
> frame other than the one displaying the EV indicator and gain control of =
that
> content because her "www.example.com" using the DV certificate is the sam=
e
> origin as my "www.example.com" using the EV one.
>=20
> So, Collin is right that perhaps I'm making the case *for* LockEV, but as=
 my
> first example shows, it would have to include a full-fledged mixed-conten=
t
> distinction between EV and non-EV, as currently exists between HTTPS and
> HTTP.
>=20
> When you start to consider more modern technologies for
> intercommunication between multiple instances of client-side apps with
> things like postMessage, webRTC, etc. I wonder if you wouldn't need a ful=
l-
> fledged origin distinction on EV/non-EV, as we do today on protocol, to c=
reate
> a strong barrier, and if it is worth it and there is any appetite among b=
rowser
> vendors for such a thing.
>=20
> -Brad
>=20
> > -----Original Message-----
> > From: Paul Hoffman [mailto:paul.hoffman@vpnc.org]
> > Sent: Monday, August 13, 2012 2:01 PM
> > To: Collin Jackson
> > Cc: Hill, Brad; Ben Campbell; IETF WebSec WG
> > Subject: Re: [websec] handling STS header field extendability
> >
> > On Aug 13, 2012, at 12:21 PM, Collin Jackson wrote:
> >
> > > On Mon, Aug 13, 2012 at 10:58 AM, Hill, Brad <bhill@paypal-inc.com>
> > wrote:
> > >> There are, of course, non-browser HTTP clients that may respect
> > >> HSTS, but
> > EV certificates in particular are aimed at a browser audience as it is
> > about user trust indicators.
> > >>
> > >> EV is *not* a security boundary in browsers, however.  It is a
> > >> brand
> > awareness and consumer trust product.
> > >>
> > >> I am not aware of any user agents that treat EV and non-EV content
> > >> as
> > having different effective security principals for purposes of the
> > Same Origin Policy.  So, although it is more difficult to get an EV
> > certificate than a DV one, that does not provide any effective
> > security against a MITM attacker who can obtain a DV certificate.
> > Such an attacker can always act as a partial MITM and provide, using a
> > DV certificate, trojan script content in an iframe with no security
> > indicators or substitute an external script in a legitimate page and th=
at
> script will have full access to content delivered with an EV certificate.
> > >>
> > >> I would posit that means a feature like LockEV has little to no
> > >> practical
> > value unless and until (not likely) Web user agents provide origin
> > isolation between EV and non-EV content.
> > >
> > > Quite the opposite, you just made the argument in favor of LockEV.
> > > If LockEV is being used, the MITM attack with a DV certificate would
> > > no longer be possible, because the DV certificate would not be
> > > accepted by the browser.
> >
> > In what case is that attack useful? The public key would still be the
> > one that the site thought they had an EV cert for.
> >
> > Confused...
> >
> > --Paul Hoffman

From bhill@paypal-inc.com  Mon Aug 13 14:40:56 2012
Return-Path: <bhill@paypal-inc.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B063321F8605 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:40:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.117
X-Spam-Level: 
X-Spam-Status: No, score=-9.117 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, DNS_FROM_RFC_BOGUSMX=1.482, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LJe4TMPYIU6V for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 14:40:56 -0700 (PDT)
Received: from den-mipot-002.corp.ebay.com (den-mipot-002.corp.ebay.com [216.113.175.153]) by ietfa.amsl.com (Postfix) with ESMTP id 256A821F85DF for <websec@ietf.org>; Mon, 13 Aug 2012 14:40:56 -0700 (PDT)
DomainKey-Signature: s=ppinc; d=paypal-inc.com; c=nofws; q=dns; h=X-EBay-Corp:X-IronPort-AV:Received:Received:From:To:CC: Subject:Thread-Topic:Thread-Index:Date:Message-ID: References:In-Reply-To:Accept-Language:Content-Language: X-MS-Has-Attach:X-MS-TNEF-Correlator:x-originating-ip: x-ems-proccessed:x-ems-stamp:Content-Type: Content-Transfer-Encoding:MIME-Version:X-CFilter; b=vYZLxTDQdqh4/r1hOXNkBJwqyyyb3GVRDcfKJeqSFkhw12hpNvCN/8kF DmgNHSoeMTBVBgFNCwZTjEuRU3zCfahOg3kUzU8AGV8VO5rPdUYarFGgV 2A5faV6/Sw4aBaZ;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paypal-inc.com; i=bhill@paypal-inc.com; q=dns/txt; s=ppinc; t=1344894056; x=1376430056; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=NF8DerJctzySio23qLVutOUzzDdkebwAlQKvTJL3fuU=; b=VtR81EsRAzlYtOL0q6q1J7QkeeRyPDyhqh2qyD3VIA0P+vaNXNzVWsW/ l6eWMCwHHl5mJnRzUVC0LXmYjOrKzJbkorO3Kth4u1ZRwJaQCKQW5PO6c hIMbv+qfIoQTCAp;
X-EBay-Corp: Yes
X-IronPort-AV: E=Sophos;i="4.77,762,1336374000";  d="scan'208";a="9633874"
Received: from den-vtenf-001.corp.ebay.com (HELO DEN-EXMHT-003.corp.ebay.com) ([10.101.112.212]) by den-mipot-002.corp.ebay.com with ESMTP; 13 Aug 2012 14:40:55 -0700
Received: from DEN-EXDDA-S12.corp.ebay.com ([fe80::40c1:9cf7:d21e:46c]) by DEN-EXMHT-003.corp.ebay.com ([fe80::55d3:9d86:3fc8:dbf4%14]) with mapi id 14.02.0298.004; Mon, 13 Aug 2012 15:40:55 -0600
From: "Hill, Brad" <bhill@paypal-inc.com>
To: Chris Palmer <palmer@google.com>, Collin Jackson <collin.jackson@sv.cmu.edu>
Thread-Topic: [websec] handling STS header field extendability
Thread-Index: AQHNdnu9G2/cgF2QOE2DrHCPRwkn4JdT/HaAgAEaOQCAAvRWEIAAfk+AgAAhxwD//53jIA==
Date: Mon, 13 Aug 2012 21:40:53 +0000
Message-ID: <370C9BEB4DD6154FA963E2F79ADC6F2E1C2898@DEN-EXDDA-S12.corp.ebay.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <CAOuvq20sW5zsR5bSTpNFenmttE2Oj9YCYJHmaKRxUxmpf9w-WQ@mail.gmail.com>
In-Reply-To: <CAOuvq20sW5zsR5bSTpNFenmttE2Oj9YCYJHmaKRxUxmpf9w-WQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.245.27.242]
x-ems-proccessed: 10SqDH0iR7ekR7SRpKqm5A==
x-ems-stamp: My5LBmPilrzzlRI5vXZEZA==
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter: Scanned
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 21:40:56 -0000
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==

From paul.hoffman@vpnc.org  Mon Aug 13 15:10:10 2012
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0500321F870B for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 15:10:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.282
X-Spam-Level: 
X-Spam-Status: No, score=-102.282 tagged_above=-999 required=5 tests=[AWL=-0.283, BAYES_00=-2.599, J_CHICKENPOX_22=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UQzFueoFmps9 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 15:10:09 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 91F4E21F8705 for <websec@ietf.org>; Mon, 13 Aug 2012 15:10:09 -0700 (PDT)
Received: from [10.20.30.100] (50-1-50-97.dsl.dynamic.fusionbroadband.com [50.1.50.97]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.5) with ESMTP id q7DM8x0V067412 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 13 Aug 2012 15:09:50 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <370C9BEB4DD6154FA963E2F79ADC6F2E1C2866@DEN-EXDDA-S12.corp.ebay.com>
Date: Mon, 13 Aug 2012 15:09:47 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <E24EE919-4CB1-4C42-8109-EBCFFE1891C1@vpnc.org>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org> <370C9BEB4DD6154FA963E2F79ADC6F2E1C2866@DEN-EXDDA-S12.corp.ebay.com>
To: "Hill, Brad" <bhill@paypal-inc.com>
X-Mailer: Apple Mail (2.1278)
Cc: IETF WebSec WG <websec@ietf.org>, Ben Campbell <ben@nostrum.com>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 22:10:10 -0000

On Aug 13, 2012, at 2:31 PM, Hill, Brad wrote:

> tl;dr version:
>=20
> EV is not a security boundary today in web user agents, it is a way to =
get a user interface decoration.
>=20
> If we want to ask browser vendors to make it into a security boundary =
which they will defend, we need to think about a fairly complex and =
broad threat model.
>=20
> I'm not convinced that:
>=20
> a) it's worth doing LockEV unless it's going to be a real security =
barrier
> b) the complexity introduced in making it a real security barrier is =
worth it for such a rare attack

+1 to all that.

--Paul Hoffman=

From dkeeler@mozilla.com  Mon Aug 13 15:16:57 2012
Return-Path: <dkeeler@mozilla.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D05A321F8699 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 15:16:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.677
X-Spam-Level: 
X-Spam-Status: No, score=-1.677 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_ORG=0.611, HOST_MISMATCH_COM=0.311]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nsMNfJGXJEqs for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 15:16:57 -0700 (PDT)
Received: from smtp.mozilla.org (mx1.corp.phx1.mozilla.com [63.245.216.69]) by ietfa.amsl.com (Postfix) with ESMTP id 0B6F721F8697 for <websec@ietf.org>; Mon, 13 Aug 2012 15:16:57 -0700 (PDT)
Received: from [10.250.4.221] (corp-240.mv.mozilla.com [63.245.220.240]) (Authenticated sender: dkeeler@mozilla.com) by mx1.mail.corp.phx1.mozilla.com (Postfix) with ESMTPSA id C3419F2561 for <websec@ietf.org>; Mon, 13 Aug 2012 15:16:56 -0700 (PDT)
Message-ID: <50297CA6.6080506@mozilla.com>
Date: Mon, 13 Aug 2012 15:16:06 -0700
From: David Keeler <dkeeler@mozilla.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120725 Thunderbird/14.0
MIME-Version: 1.0
To: websec@ietf.org
X-Enigmail-Version: 1.5a1pre
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Subject: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 22:18:22 -0000

Hello,

The current HSTS spec draft says "A max-age value of zero (i.e.,
"max-age=0") signals the UA to cease regarding the host as a Known HSTS
Host." (section 6.1.1) How does this interact with the includeSubdomains
directive?
For instance, if the UA receives an HSTS header with includeSubdomains
from example.com but then receives an HSTS header with max-age=0 from
sub.example.com, is sub.example.com to be noted as an HSTS host?
Either way, I believe the language of the spec could be a bit more clear.

Cheers,
David Keeler

From ietf@adambarth.com  Mon Aug 13 15:29:57 2012
Return-Path: <ietf@adambarth.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B841921F86A5 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 15:29:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.977
X-Spam-Level: 
X-Spam-Status: No, score=-2.977 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3veZm4lAC47q for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 15:29:57 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by ietfa.amsl.com (Postfix) with ESMTP id 4166D21F8620 for <websec@ietf.org>; Mon, 13 Aug 2012 15:29:57 -0700 (PDT)
Received: by yhq56 with SMTP id 56so4157116yhq.31 for <websec@ietf.org>; Mon, 13 Aug 2012 15:29:56 -0700 (PDT)
Received: by 10.236.138.138 with SMTP id a10mr12715123yhj.39.1344896996871; Mon, 13 Aug 2012 15:29:56 -0700 (PDT)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by mx.google.com with ESMTPS id e24sm1537976yhh.4.2012.08.13.15.29.55 (version=SSLv3 cipher=OTHER); Mon, 13 Aug 2012 15:29:55 -0700 (PDT)
Received: by vcbfo14 with SMTP id fo14so4455801vcb.31 for <websec@ietf.org>; Mon, 13 Aug 2012 15:29:54 -0700 (PDT)
Received: by 10.220.154.148 with SMTP id o20mr9285986vcw.18.1344896994373; Mon, 13 Aug 2012 15:29:54 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.58.144.129 with HTTP; Mon, 13 Aug 2012 15:29:24 -0700 (PDT)
In-Reply-To: <50297CA6.6080506@mozilla.com>
References: <50297CA6.6080506@mozilla.com>
From: Adam Barth <ietf@adambarth.com>
Date: Mon, 13 Aug 2012 15:29:24 -0700
Message-ID: <CAJE5ia91-j4avKvvKSUj2P1K_U=EFwGd+feVqMNv8AtkWqSA7Q@mail.gmail.com>
To: David Keeler <dkeeler@mozilla.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: websec@ietf.org
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 22:29:57 -0000

The way the implementation in Chrome works is that max-age=0 only
clears the entry for that particular host name.  If there's another
shorter host name with includeSubdomains, that isn't affected.

Adam


On Mon, Aug 13, 2012 at 3:16 PM, David Keeler <dkeeler@mozilla.com> wrote:
> Hello,
>
> The current HSTS spec draft says "A max-age value of zero (i.e.,
> "max-age=0") signals the UA to cease regarding the host as a Known HSTS
> Host." (section 6.1.1) How does this interact with the includeSubdomains
> directive?
> For instance, if the UA receives an HSTS header with includeSubdomains
> from example.com but then receives an HSTS header with max-age=0 from
> sub.example.com, is sub.example.com to be noted as an HSTS host?
> Either way, I believe the language of the spec could be a bit more clear.
>
> Cheers,
> David Keeler
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec

From collin.jackson@west.cmu.edu  Mon Aug 13 16:21:38 2012
Return-Path: <collin.jackson@west.cmu.edu>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E945121F859B for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 16:21:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.894
X-Spam-Level: 
X-Spam-Status: No, score=-2.894 tagged_above=-999 required=5 tests=[AWL=0.083,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xkJ4MQrBqB2f for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 16:21:38 -0700 (PDT)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by ietfa.amsl.com (Postfix) with ESMTP id 3B1EB21F8592 for <websec@ietf.org>; Mon, 13 Aug 2012 16:21:38 -0700 (PDT)
Received: by yenm5 with SMTP id m5so4199442yen.31 for <websec@ietf.org>; Mon, 13 Aug 2012 16:21:37 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding:x-gm-message-state; bh=DEFYGvBRP8rJaux9OCeGGBIDufQX4PvQfNCWM8ZK3q8=; b=ZRaRPLbKFN2eUWF3aN+UHHhZtZ0uIgsYbkb3vpOsFctH+wjUbzuGkR7uVfbDM+YpUf 3MchWWg1u5HhISUayhRs7jLeGNusgEhS1m4IAp7kILHmVCVtnBvEmpPjGXecfa3b1Uf6 X83H7OB4G8Bn5dxAjoOvoGuDLDNVrSJiX97AFwoSQ+ol8QhU2qRfZnrZ9lU8gr3joIGP 9IMJyaqWQkS82G5CSrv+laJkr5UI48mi2Fz6IcT4W/Xwduhpo/WNlLW+4z8eF9iizsty PPh48e0Ru7hKS1NL/fcE2VMARBi8gVJC9flRG9Od9ZJNcPd3xsPROBVikVEq+eh5D7RE EWHg==
Received: by 10.101.141.40 with SMTP id t40mr4014771ann.77.1344900097577; Mon, 13 Aug 2012 16:21:37 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by mx.google.com with ESMTPS id e24sm1755334yhh.4.2012.08.13.16.21.36 (version=SSLv3 cipher=OTHER); Mon, 13 Aug 2012 16:21:37 -0700 (PDT)
Received: by yhq56 with SMTP id 56so4206371yhq.31 for <websec@ietf.org>; Mon, 13 Aug 2012 16:21:36 -0700 (PDT)
Received: by 10.68.235.68 with SMTP id uk4mr35012903pbc.52.1344900096112; Mon, 13 Aug 2012 16:21:36 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.68.21.131 with HTTP; Mon, 13 Aug 2012 16:20:55 -0700 (PDT)
In-Reply-To: <370C9BEB4DD6154FA963E2F79ADC6F2E1C2818@DEN-EXDDA-S12.corp.ebay.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CA+cU71kx4Ck2aMeSHhnpb--aZ+mRmszQdojepM4aapVn2TsR=Q@mail.gmail.com> <370C9BEB4DD6154FA963E2F79ADC6F2E1C251C@DEN-EXDDA-S12.corp.ebay.com> <CANVv-VfcVBhd7AUqsZ83dKJiDL3V=_Fd2Wmm=o7WXMiEgCAusg@mail.gmail.com> <FD1D3117-B393-417A-868F-AB954907C16C@vpnc.org> <370C9BEB4DD6154FA963E2F79ADC6F2E1C2818@DEN-EXDDA-S12.corp.ebay.com>
From: Collin Jackson <collin.jackson@sv.cmu.edu>
Date: Mon, 13 Aug 2012 16:20:55 -0700
Message-ID: <CANVv-VdgHWDcXcL9JiT48mK9Aub51zJuy8zomMfUqpWHSzcPzg@mail.gmail.com>
To: "Hill, Brad" <bhill@paypal-inc.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQklk26OTko2M6AN1MM0PbfjQVFTYeFREMjfPlo/n1x+73gbS/uS83fUPX37X6pNDf65hxTl
Cc: Ben Campbell <ben@nostrum.com>, IETF WebSec WG <websec@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2012 23:21:39 -0000

On Mon, Aug 13, 2012 at 2:20 PM, Hill, Brad <bhill@paypal-inc.com> wrote:
> I have an EV certificate for www.example.com.  On the main page, it inclu=
des the following tag:
>
>  <script src=3D"https://scripts.example.com/myscript.js">
>
> Mallory is presumably much more likely to be able to obtain a DV certific=
ate for scripts.example.com than an EV cert for www.example.com.  But Mallo=
ry can still use the DV certificate to attack the EV content at www.example=
.com by MITMing the fetch of myscript.js, which will be transcluded into th=
e DOM.
>
> Or alternately, assume that Mallory gets a DV certificate for www.example=
.com which is different (and has a different key pair) from my legitimate E=
V certificate.  Mallory can still MITM content loaded in some frame other t=
han the one displaying the EV indicator and gain control of that content be=
cause her "www.example.com" using the DV certificate is the same origin as =
my "www.example.com" using the EV one.
>
> So, Collin is right that perhaps I'm making the case *for* LockEV, but as=
 my first example shows, it would have to include a full-fledged mixed-cont=
ent distinction between EV and non-EV, as currently exists between HTTPS an=
d HTTP.

I don't agree that browsers would need to include a mixed content
distinction between EV and non EV. In fact, I think that would be a
bad idea to do so. You can still make an all-EV site and benefit from
LockEV. The attacker will not be able to MITM it without an EV
certificate.

> When you start to consider more modern technologies for intercommunicatio=
n between multiple instances of client-side apps with things like postMessa=
ge, webRTC, etc. I wonder if you wouldn't need a full-fledged origin distin=
ction on EV/non-EV, as we do today on protocol, to create a strong barrier,=
 and if it is worth it and there is any appetite among browser vendors for =
such a thing.

As we wrote in our 2008 paper on finer-grained origins, I agree that
browsers should not include EV in the origin distinction. However,
LockEV would still be helpful to all-EV sites.

> Again: instead of "LockEV", wouldn't a much saner security policy be "Loc=
kKey"?

Sites might want to commit to serving everything over EV, but might
not want to commit to keeping the same key, or the same CA.

> I think that's important to consider about LockEV - PayPal is one of the =
sites most ready for and most pervasively EV, and it would not be prepared =
today to have a mixed-content policy enforced for EV/DV.  It would take a l=
ot of work and a great deal of expense to achieve this, and not just for Pa=
yPal.  Consider how many sites use off-origin analytics, ads, CDNs, etc.

We agree. I am opposed to using EV in the mixed content distinction.
However, LockEV still prevents MITM attacks using DV certificates
against all-EV sites.

> I'm not convinced that:
>
> a) it's worth doing LockEV unless it's going to be a real security barrie=
r

As long as a site isn't using DV certs for scripts, it's a real
security barrier.

> b) the complexity introduced in making it a real security barrier is wort=
h it for such a rare attack

There is very little complexity introduced if you don't introduce the
mixed content distinction.

Collin

From internet-drafts@ietf.org  Mon Aug 13 19:08:45 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52AA921F8759; Mon, 13 Aug 2012 19:08:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.357
X-Spam-Level: 
X-Spam-Status: No, score=-102.357 tagged_above=-999 required=5 tests=[AWL=0.242, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l+aqOg0FlPkh; Mon, 13 Aug 2012 19:08:44 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4CC921F8746; Mon, 13 Aug 2012 19:08:44 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.33
Message-ID: <20120814020844.21073.29677.idtracker@ietfa.amsl.com>
Date: Mon, 13 Aug 2012 19:08:44 -0700
Cc: websec@ietf.org
Subject: [websec] I-D Action: draft-ietf-websec-strict-transport-sec-12.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Aug 2012 02:08:45 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Web Security Working Group of the IETF.

	Title           : HTTP Strict Transport Security (HSTS)
	Author(s)       : Jeff Hodges
                          Collin Jackson
                          Adam Barth
	Filename        : draft-ietf-websec-strict-transport-sec-12.txt
	Pages           : 49
	Date            : 2012-08-13

Abstract:
   This specification defines a mechanism enabling web sites to declare
   themselves accessible only via secure connections, and/or for users
   to be able to direct their user agent(s) to interact with given sites
   only over secure connections.  This overall policy is referred to as
   HTTP Strict Transport Security (HSTS).  The policy is declared by web
   sites via the Strict-Transport-Security HTTP response header field,
   and/or by other means, such as user agent configuration, for example.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-websec-strict-transport-sec

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-12

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-websec-strict-transport-sec-12


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From barryleiba.mailing.lists@gmail.com  Mon Aug 13 21:13:37 2012
Return-Path: <barryleiba.mailing.lists@gmail.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 641C721F8627 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 21:13:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.018
X-Spam-Level: 
X-Spam-Status: No, score=-103.018 tagged_above=-999 required=5 tests=[AWL=-0.042, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z2m2dfHwVAG0 for <websec@ietfa.amsl.com>; Mon, 13 Aug 2012 21:13:37 -0700 (PDT)
Received: from mail-lb0-f172.google.com (mail-lb0-f172.google.com [209.85.217.172]) by ietfa.amsl.com (Postfix) with ESMTP id 884AF21F86C5 for <websec@ietf.org>; Mon, 13 Aug 2012 21:13:36 -0700 (PDT)
Received: by lbbgg6 with SMTP id gg6so16526lbb.31 for <websec@ietf.org>; Mon, 13 Aug 2012 21:13:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=MQUq4lSReMJXS5vCNPvnMLgir+3I/T9SHbSABQk1IVc=; b=I0jy+CznnMMebTSPjOdAHPvmamVmHH8xaM1H2hHM4VMYbLdUwRFeemwSfY8ZkM0v7D lXV2rK5KAq08YddMjKJLli4sD/aJYz9702CWNQcPMNiJYkJ+oDFwofa0V9izVRnmgO/3 35En1UhHbsnB2twa4mHlbBT5aO4ywUu3ibOxWCqu0dxhyq0zLWYtzoh1dOxLbIkdXXJP VQqbHp1gdJ1PnYBrUJs5rJQV4MkID+/N2NKZvrwELb9pNDt1UKQMWBSdRfOidLiEJzKt /15O6y4twzZdP/trlEP8c2sUOgFML5ZuUOzlLv1WOALqV52t88raN2ZMUexW002JZNn2 byDQ==
MIME-Version: 1.0
Received: by 10.152.114.3 with SMTP id jc3mr10863575lab.11.1344917615510; Mon, 13 Aug 2012 21:13:35 -0700 (PDT)
Sender: barryleiba.mailing.lists@gmail.com
Received: by 10.112.113.196 with HTTP; Mon, 13 Aug 2012 21:13:35 -0700 (PDT)
In-Reply-To: <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com>
Date: Tue, 14 Aug 2012 00:13:35 -0400
X-Google-Sender-Auth: FDY9NooTLF9Jh4un5OfHfZYTllY
Message-ID: <CAC4RtVCrfqi=7CfWsWLoQyQRuvGHj4hKAWQt8Pz3zHiiD4n4Cg@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: IETF WebSec WG <websec@ietf.org>
Content-Type: multipart/alternative; boundary=f46d04088c7fb9851e04c7320871
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Aug 2012 04:13:37 -0000

--f46d04088c7fb9851e04c7320871
Content-Type: text/plain; charset=ISO-8859-1

>
> Please forgive my ignorance, but do LockCA and/or LockEV offer any
> functionality that you can't already get with public key pinning as
> currently specified?
>

 Folks, this thread has rather been hijacked.  We need to have some WG
input on what registration policy to recommend for a possible future STS
header field registry.  That's what this thread is for, and I need to see
some WG discussion about it in order that Jeff may finish the document and
that I may move it forward.

Please take discussion of LockCA and LockEV to another thread.

Thanks,
Barry

--f46d04088c7fb9851e04c7320871
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Please forgive my ignorance, but do LockCA a=
nd/or LockEV offer any<br>
functionality that you can&#39;t already get with public key pinning as<br>
currently specified?<br>
</blockquote><div><br></div><div>=A0Folks, this thread has rather been hija=
cked. =A0We need to have some WG input on what registration policy to recom=
mend for a possible future STS header field registry. =A0That&#39;s what th=
is thread is for, and I need to see some WG discussion about it in order th=
at Jeff may finish the document and that I may move it forward.</div>
<div><br></div><div>Please take discussion of LockCA and LockEV to another =
thread.</div><div><br></div><div>Thanks,</div><div>Barry<span></span></div>

--f46d04088c7fb9851e04c7320871--

From ynir@checkpoint.com  Tue Aug 14 00:12:24 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61D7621F85C4 for <websec@ietfa.amsl.com>; Tue, 14 Aug 2012 00:12:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.416
X-Spam-Level: 
X-Spam-Status: No, score=-10.416 tagged_above=-999 required=5 tests=[AWL=0.183, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lV25zGdiTeTz for <websec@ietfa.amsl.com>; Tue, 14 Aug 2012 00:12:23 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 117EE11E8098 for <websec@ietf.org>; Tue, 14 Aug 2012 00:12:22 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q7E7CKNk013629 for <websec@ietf.org>; Tue, 14 Aug 2012 10:12:20 +0300
X-CheckPoint: {5029F727-2-1B221DC2-4FFFF}
Received: from il-ex03.ad.checkpoint.com (194.29.34.71) by il-ex01.ad.checkpoint.com (194.29.34.26) with Microsoft SMTP Server (TLS) id 8.3.213.0; Tue, 14 Aug 2012 10:12:19 +0300
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex03.ad.checkpoint.com ([194.29.34.71]) with mapi; Tue, 14 Aug 2012 10:12:18 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: IETF WebSec WG <websec@ietf.org>
Date: Tue, 14 Aug 2012 10:12:16 +0300
Thread-Topic: [websec] handling STS header field extendability
Thread-Index: Ac150zNRb1fEkDa/QvKTxfcyQGLsmAAF/5Iw
Message-ID: <006FEB08D9C6444AB014105C9AEB133F017A7F9331A9@il-ex01.ad.checkpoint.com>
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CAC4RtVCrfqi=7CfWsWLoQyQRuvGHj4hKAWQt8Pz3zHiiD4n4Cg@mail.gmail.com>
In-Reply-To: <CAC4RtVCrfqi=7CfWsWLoQyQRuvGHj4hKAWQt8Pz3zHiiD4n4Cg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
x-cpdlp: 11ec05d72c59a1cf2304c449eccd3ecd4ad377d26a
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-KSE-AntiSpam-Interceptor-Info: protection disabled
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Aug 2012 07:12:24 -0000

Right.

As a reminder, the proposed resolution is as follows:

 * Do not establish a registry now=20
      Let the first new header field specification establish it

 * A client that gets an unknown field ignores it=20
      This means no mandatory-to-understand extensions

At this stage, a +1 response is OK though not necessary (we got plenty of t=
hose in the room), but any disagreement should come with an explanation.

Thanks

Yoav

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
From: websec-bounces@ietf.org [mailto:websec-bounces@ietf.org] On Behalf Of=
 Barry Leiba
Sent: Tuesday, August 14, 2012 7:14 AM
To: IETF WebSec WG
Subject: Re: [websec] handling STS header field extendability

Please forgive my ignorance, but do LockCA and/or LockEV offer any
functionality that you can't already get with public key pinning as
currently specified?

=A0Folks, this thread has rather been hijacked. =A0We need to have some WG =
input on what registration policy to recommend for a possible future STS he=
ader field registry. =A0That's what this thread is for, and I need to see s=
ome WG discussion about it in order that Jeff may finish the document and t=
hat I may move it forward.

Please take discussion of LockCA and LockEV to another thread.

Thanks,
Barry

From tobias.gondrom@gondrom.org  Tue Aug 14 02:55:00 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 449AB21F861E for <websec@ietfa.amsl.com>; Tue, 14 Aug 2012 02:55:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.04
X-Spam-Level: 
X-Spam-Status: No, score=-97.04 tagged_above=-999 required=5 tests=[AWL=-1.678, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DGM2O23S6Qcj for <websec@ietfa.amsl.com>; Tue, 14 Aug 2012 02:54:59 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 61BD721F85F4 for <websec@ietf.org>; Tue, 14 Aug 2012 02:54:59 -0700 (PDT)
Received: (qmail 30135 invoked from network); 14 Aug 2012 11:54:57 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 14 Aug 2012 11:54:57 +0200
Message-ID: <502A2070.9030404@gondrom.org>
Date: Tue, 14 Aug 2012 10:54:56 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: websec@ietf.org
References: <5024352D.4040604@KingsMountain.com> <CAOuvq23dxoKyV2No55WEYePhVj+Fcab5cF65C1FsiqgtmEkXMA@mail.gmail.com> <CAC4RtVCrfqi=7CfWsWLoQyQRuvGHj4hKAWQt8Pz3zHiiD4n4Cg@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F017A7F9331A9@il-ex01.ad.checkpoint.com>
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F017A7F9331A9@il-ex01.ad.checkpoint.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Aug 2012 09:55:00 -0000

On 14/08/12 08:12, Yoav Nir wrote:
> Right.
>
> As a reminder, the proposed resolution is as follows:
>
>   * Do not establish a registry now
>        Let the first new header field specification establish it
>
>   * A client that gets an unknown field ignores it
>        This means no mandatory-to-understand extensions
>
> At this stage, a +1 response is OK though not necessary (we got plenty of those in the room), but any disagreement should come with an explanation.

<hat="individual">
+1. ;-)

Ps.: and thanks to Yoav for framing the topic.

>
> Thanks
>
> Yoav
>
> ================================================================
> From: websec-bounces@ietf.org [mailto:websec-bounces@ietf.org] On Behalf Of Barry Leiba
> Sent: Tuesday, August 14, 2012 7:14 AM
> To: IETF WebSec WG
> Subject: Re: [websec] handling STS header field extendability
>
> Please forgive my ignorance, but do LockCA and/or LockEV offer any
> functionality that you can't already get with public key pinning as
> currently specified?
>
>   Folks, this thread has rather been hijacked.  We need to have some WG input on what registration policy to recommend for a possible future STS header field registry.  That's what this thread is for, and I need to see some WG discussion about it in order that Jeff may finish the document and that I may move it forward.
>
> Please take discussion of LockCA and LockEV to another thread.
>
> Thanks,
> Barry
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec


From alexey.melnikov@isode.com  Fri Aug 17 05:56:30 2012
Return-Path: <alexey.melnikov@isode.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A3F021F8526; Fri, 17 Aug 2012 05:56:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.169
X-Spam-Level: 
X-Spam-Status: No, score=-102.169 tagged_above=-999 required=5 tests=[AWL=-0.966, BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JzMNmdyHCEOn; Fri, 17 Aug 2012 05:56:29 -0700 (PDT)
Received: from waldorf.isode.com (cl-125.lon-03.gb.sixxs.net [IPv6:2a00:14f0:e000:7c::2]) by ietfa.amsl.com (Postfix) with ESMTP id 353FE21F84E7; Fri, 17 Aug 2012 05:56:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1345208186; d=isode.com; s=selector; i=@isode.com; bh=q0YkPYMyJMbVRxe6UWeu7zCc0nwH40hINGExehkp3gk=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=qybYs4diXlLIaBBgHpghJBhsbci6qsT/NLSnMqkMmEra5uggRhGL6quoKs8GeuVN+4ryZn BCyip6nJbScI/MJ8mm5OCpQYXg2lCltjuxx5w2EkYZrSYIhHO0NecwYqmXtCMTG76say9n jUVyiSM0Bsh1xSy2OSj1n3xFPD4ynkw=;
Received: from [172.16.11.4] (shiny.isode.com [62.3.217.250])  by waldorf.isode.com (submission channel) via TCP with ESMTPA  id <UC4=dQBdyH-5@waldorf.isode.com>; Fri, 17 Aug 2012 13:56:26 +0100
Message-ID: <502E3FDB.8060800@isode.com>
Date: Fri, 17 Aug 2012 13:58:03 +0100
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:12.0) Gecko/20120428 Thunderbird/12.0.1
To: Chris Palmer <palmer@google.com>
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
In-Reply-To: <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-transfer-encoding: quoted-printable
Cc: Chris Evans <cevans@google.com>, websec@ietf.org, paul.hoffman@vpnc.org, saag@ietf.org, Moxie Marlinspike <moxie@thoughtcrime.org>
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Aug 2012 12:56:30 -0000

On 10/08/2012 23:20, Chris Palmer wrote:
> Hi all,
>
> Resurrecting this ancient thread, and explicitly including Moxie and
> Trevor in case they aren't already on any of the relevant mailing
> lists.
>
> So ultimately I do think we should decide on either HPKP or TACK, but
> that we should make that decision after there has been some real-world
> deployment experience with both (or, sadly, real-world non-deployment
> of one or both).
>
> Additionally, HPKP and TACK might converge, more or less. I have plans
> to publish a new HPKP I-D that borrows some of TACK's pin activation
> and expiration ideas, for example.
>
> Additionally, one of the main criticisms of HPKP is that it is tied to
> HTTP. I currently don't consider that a huge problem =E2=80=94 even though=
 I
> consider TACK's TLS-generic-ness a nice benefit =E2=80=94 for several reas=
ons:
>
> * HTTPS is the big, important application that we need to secure right now=
.
>
> * IMAPS and POPS are surely on the list too, right after HTTPS; but
> specifying "IPKP" and "PPKP" is likely to be relatively
> straightforward once we get HPKP working.
I am surely hoping there would be no IMAP, POP or SMTP extensions to=20
address this. IMHO, judging from past experiences of any new=20
functionality being adopted by IMAP/POP/SMTP, chances of such extensions=20
being deployed in any reasonable number of email clients any time soon=20
are close to 0. I think some more generic facility (like a TLS=20
extension) has much better chance of success.

Having said that, I think it is Ok if an HTTP facility is deployed now=20
before the TLS extension is finalized.
> * It's not clear that SMTP over TLS is very beneficial, because you
> can't stop delivery due to pin validation failure (or really even
> regular old X.509 failure). You could use certificate errors as
> soft-fail spam signals, but you can in principle do that now, too,
> without explicit pinning. I don't know how much benefit you'd get from
> using pin validation failure as a spam signal.
>


From Jeff.Hodges@KingsMountain.com  Fri Aug 17 15:55:36 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CB1821E8093 for <websec@ietfa.amsl.com>; Fri, 17 Aug 2012 15:55:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.512
X-Spam-Level: 
X-Spam-Status: No, score=-101.512 tagged_above=-999 required=5 tests=[AWL=1.087, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FPdA8h7RjMjj for <websec@ietfa.amsl.com>; Fri, 17 Aug 2012 15:55:35 -0700 (PDT)
Received: from oproxy11-pub.bluehost.com (oproxy11-pub.bluehost.com [173.254.64.10]) by ietfa.amsl.com (Postfix) with SMTP id 75A0C21E8091 for <websec@ietf.org>; Fri, 17 Aug 2012 15:55:35 -0700 (PDT)
Received: (qmail 20321 invoked by uid 0); 17 Aug 2012 22:55:14 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy11.bluehost.com with SMTP; 17 Aug 2012 22:55:13 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=OoDZPYzOIfzLLoy5l8Ni408s5Kfg1pcaUxY9oginTdo=;  b=hVIO0yuwiYoWUK/JJFn8uUCxm4RP1IGg4hOaFxxTeM0ANfBOnRgRcGqOezuw0lpaLF20RbTWg9uMVAFvtrI+8+PhhjAc0ntIsVbS4dbZqqpkrsTv9QoDF74btBx4ZR2j;
Received: from [216.113.168.128] (port=53948 helo=[10.244.136.52]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T2VRh-0003B1-RA for websec@ietf.org; Fri, 17 Aug 2012 16:55:13 -0600
Message-ID: <502ECBD3.6050902@KingsMountain.com>
Date: Fri, 17 Aug 2012 15:55:15 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: IETF WebSec WG <websec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Aug 2012 22:55:36 -0000

Yoav Nir noted:
 >
 > As a reminder, the proposed resolution is as follows:
 >
 >  * Do not establish a registry now
 >       Let the first new header field specification establish it
 >
 >  * A client that gets an unknown field ignores it
 >       This means no mandatory-to-understand extensions

Thanks, Yoav.

I'd also noted that we need to decide on a IANA policy to declare. My original 
message is here..

   https://www.ietf.org/mail-archive/web/websec/current/msg01315.html

..and I suggested that, since HSTS is a security policy, I lean towards wanting 
to have relatively rigorous review applied to any registry and its contents 
created for HSTS directives and thus am thinking a policy of "IETF Review" is 
what we ought to state (for "FOO" in the below excerpt from -12 at the end of 
section 6.1)..

    Additional directives extending the semantic functionality of the STS
    header field can be defined in other specifications, with a registry
    (having an IANA policy definition of FOO [RFC5226]) defined for them
    at such time.

    NOTE:  Such future directives will be ignored by UAs implementing
           only this specification, as well as by generally non-
           conforming UAs.  See Section 14.1 "Non-Conformant User Agent
           Implications" for further discussion.


thanks,

=JeffH


From ynir@checkpoint.com  Fri Aug 17 23:21:40 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C64411E80C5 for <websec@ietfa.amsl.com>; Fri, 17 Aug 2012 23:21:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.418
X-Spam-Level: 
X-Spam-Status: No, score=-10.418 tagged_above=-999 required=5 tests=[AWL=0.181, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FAlrexQ8f2mU for <websec@ietfa.amsl.com>; Fri, 17 Aug 2012 23:21:39 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 5EBD911E80A6 for <websec@ietf.org>; Fri, 17 Aug 2012 23:21:36 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q7I6LWUX017317; Sat, 18 Aug 2012 09:21:33 +0300
X-CheckPoint: {502F310D-1-1B221DC2-4FFFF}
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Sat, 18 Aug 2012 09:21:32 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: =JeffH <Jeff.Hodges@KingsMountain.com>
Date: Sat, 18 Aug 2012 09:21:34 +0300
Thread-Topic: [websec] handling STS header field extendability
Thread-Index: Ac19CbV/i/r3RaTwQPqblTNyJuS1Nw==
Message-ID: <B80C8460-9C37-4BFC-B4F0-D757E9FB3290@checkpoint.com>
References: <502ECBD3.6050902@KingsMountain.com>
In-Reply-To: <502ECBD3.6050902@KingsMountain.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Aug 2012 06:21:40 -0000

On Aug 18, 2012, at 1:55 AM, =3DJeffH wrote:

> Yoav Nir noted:
>>=20
>> As a reminder, the proposed resolution is as follows:
>>=20
>> * Do not establish a registry now
>>      Let the first new header field specification establish it
>>=20
>> * A client that gets an unknown field ignores it
>>      This means no mandatory-to-understand extensions
>=20
> Thanks, Yoav.
>=20
> I'd also noted that we need to decide on a IANA policy to declare.

Do we need to do this?  Assuming the proposed resolution achieves consensus=
 (and there have been no nays yet), we're not setting up a registry. I don'=
t think we get to set a policy for a registry we're not setting up.


> My original message is here..
>=20
>   https://www.ietf.org/mail-archive/web/websec/current/msg01315.html
>=20
> ..and I suggested that, since HSTS is a security policy, I lean towards w=
anting=20
> to have relatively rigorous review applied to any registry and its conten=
ts=20
> created for HSTS directives and thus am thinking a policy of "IETF Review=
" is=20
> what we ought to state (for "FOO" in the below excerpt from -12 at the en=
d of=20
> section 6.1)..
>=20
>    Additional directives extending the semantic functionality of the STS
>    header field can be defined in other specifications, with a registry
>    (having an IANA policy definition of FOO [RFC5226]) defined for them
>    at such time.
>=20
>    NOTE:  Such future directives will be ignored by UAs implementing
>           only this specification, as well as by generally non-
>           conforming UAs.  See Section 14.1 "Non-Conformant User Agent
>           Implications" for further discussion.
>=20

HSTS is a security policy. Suppose an extension requires that the certifica=
te contain a logo. Is that security-relevant?  According to section 2 of RF=
C 5226, policies are made to avoid hoarding of resources (I don't think tha=
t's relevant here), and to make sure it makes sense. I think "expert review=
" would be OK, but I don't think we need to bother with deciding this now.

Yoav


From tobias.gondrom@gondrom.org  Sat Aug 18 03:44:42 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B20A21F8539 for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 03:44:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.964
X-Spam-Level: 
X-Spam-Status: No, score=-96.964 tagged_above=-999 required=5 tests=[AWL=-1.602, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JOhRnetVcPId for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 03:44:41 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 2E9CD21F8546 for <websec@ietf.org>; Sat, 18 Aug 2012 03:44:39 -0700 (PDT)
Received: (qmail 10175 invoked from network); 18 Aug 2012 12:44:37 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 18 Aug 2012 12:44:37 +0200
Message-ID: <502F7214.6010102@gondrom.org>
Date: Sat, 18 Aug 2012 11:44:36 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: websec@ietf.org
References: <502ECBD3.6050902@KingsMountain.com> <B80C8460-9C37-4BFC-B4F0-D757E9FB3290@checkpoint.com>
In-Reply-To: <B80C8460-9C37-4BFC-B4F0-D757E9FB3290@checkpoint.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Aug 2012 10:44:42 -0000

On 18/08/12 07:21, Yoav Nir wrote:
> On Aug 18, 2012, at 1:55 AM, =JeffH wrote:
>
>> Yoav Nir noted:
>>> As a reminder, the proposed resolution is as follows:
>>>
>>> * Do not establish a registry now
>>>       Let the first new header field specification establish it
>>>
>>> * A client that gets an unknown field ignores it
>>>       This means no mandatory-to-understand extensions
>> Thanks, Yoav.
>>
>> I'd also noted that we need to decide on a IANA policy to declare.
> Do we need to do this?  Assuming the proposed resolution achieves consensus (and there have been no nays yet), we're not setting up a registry. I don't think we get to set a policy for a registry we're not setting up.

<hat="WG chair">
AFAIK from an administrative perspective, Yoav is right.
In general we set the IANA policy for registry updates at creation of 
the registry. So no need to do it here without the registry (assuming we 
don't create an IANA registry).



>
>
>> My original message is here..
>>
>>    https://www.ietf.org/mail-archive/web/websec/current/msg01315.html
>>
>> ..and I suggested that, since HSTS is a security policy, I lean towards wanting
>> to have relatively rigorous review applied to any registry and its contents
>> created for HSTS directives and thus am thinking a policy of "IETF Review" is
>> what we ought to state (for "FOO" in the below excerpt from -12 at the end of
>> section 6.1)..
>>
>>     Additional directives extending the semantic functionality of the STS
>>     header field can be defined in other specifications, with a registry
>>     (having an IANA policy definition of FOO [RFC5226]) defined for them
>>     at such time.
>>
>>     NOTE:  Such future directives will be ignored by UAs implementing
>>            only this specification, as well as by generally non-
>>            conforming UAs.  See Section 14.1 "Non-Conformant User Agent
>>            Implications" for further discussion.
>>
> HSTS is a security policy. Suppose an extension requires that the certificate contain a logo. Is that security-relevant?  According to section 2 of RFC 5226, policies are made to avoid hoarding of resources (I don't think that's relevant here), and to make sure it makes sense. I think "expert review" would be OK, but I don't think we need to bother with deciding this now.
>
> Yoav
>
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec


From tobias.gondrom@gondrom.org  Sat Aug 18 05:03:56 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0415F21F85A0 for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 05:03:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.83
X-Spam-Level: 
X-Spam-Status: No, score=-96.83 tagged_above=-999 required=5 tests=[AWL=-1.468, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V-iYvXztN1Pm for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 05:03:54 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 61F5521F859B for <websec@ietf.org>; Sat, 18 Aug 2012 05:03:46 -0700 (PDT)
Received: (qmail 11476 invoked from network); 18 Aug 2012 14:03:44 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 18 Aug 2012 14:03:44 +0200
Message-ID: <502F849F.6040505@gondrom.org>
Date: Sat, 18 Aug 2012 13:03:43 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: alexey.melnikov@isode.com
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com> <502E3FDB.8060800@isode.com>
In-Reply-To: <502E3FDB.8060800@isode.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Cc: cevans@google.com, websec@ietf.org, paul.hoffman@vpnc.org, saag@ietf.org, moxie@thoughtcrime.org
Subject: Re: [websec] [saag]  Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Aug 2012 12:03:56 -0000

On 17/08/12 13:58, Alexey Melnikov wrote:
> On 10/08/2012 23:20, Chris Palmer wrote:
>> Hi all,
>>
>> Resurrecting this ancient thread, and explicitly including Moxie and
>> Trevor in case they aren't already on any of the relevant mailing
>> lists.
>>
>> So ultimately I do think we should decide on either HPKP or TACK, but
>> that we should make that decision after there has been some real-world
>> deployment experience with both (or, sadly, real-world non-deployment
>> of one or both).
>>
>> Additionally, HPKP and TACK might converge, more or less. I have plans
>> to publish a new HPKP I-D that borrows some of TACK's pin activation
>> and expiration ideas, for example.
>>
>> Additionally, one of the main criticisms of HPKP is that it is tied to
>> HTTP. I currently don't consider that a huge problem — even though I
>> consider TACK's TLS-generic-ness a nice benefit — for several reasons:
>>
>> * HTTPS is the big, important application that we need to secure 
>> right now.
>>
>> * IMAPS and POPS are surely on the list too, right after HTTPS; but
>> specifying "IPKP" and "PPKP" is likely to be relatively
>> straightforward once we get HPKP working.
> I am surely hoping there would be no IMAP, POP or SMTP extensions to 
> address this. IMHO, judging from past experiences of any new 
> functionality being adopted by IMAP/POP/SMTP, chances of such 
> extensions being deployed in any reasonable number of email clients 
> any time soon are close to 0. I think some more generic facility (like 
> a TLS extension) has much better chance of success.
>
> Having said that, I think it is Ok if an HTTP facility is deployed now 
> before the TLS extension is finalized.

<hat="individual">
I agree with Alexey on both: chances of deployment in email clients is 
unclear and that it is ok to get an HTTP facility deployed.

>> * It's not clear that SMTP over TLS is very beneficial, because you
>> can't stop delivery due to pin validation failure (or really even
>> regular old X.509 failure). You could use certificate errors as
>> soft-fail spam signals, but you can in principle do that now, too,
>> without explicit pinning. I don't know how much benefit you'd get from
>> using pin validation failure as a spam signal.
>>
>


From tobias.gondrom@gondrom.org  Sat Aug 18 11:36:24 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C19421F848F for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 11:36:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.772
X-Spam-Level: 
X-Spam-Status: No, score=-96.772 tagged_above=-999 required=5 tests=[AWL=-1.410, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hLFrCTHuyZ2L for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 11:36:24 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 940EB21F8491 for <websec@ietf.org>; Sat, 18 Aug 2012 11:36:23 -0700 (PDT)
Received: (qmail 14296 invoked from network); 18 Aug 2012 20:36:21 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 18 Aug 2012 20:36:21 +0200
Message-ID: <502FE0A5.6090208@gondrom.org>
Date: Sat, 18 Aug 2012 19:36:21 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: ynir@checkpoint.com
References: <31946C2A-4ACD-46D7-8977-49B681204A7B@checkpoint.com> <8E52CEC5-4FEB-4464-AB11-21F1B9208C5C@checkpoint.com> <38489744-05A9-45F0-A752-7F0B9E96E641@vpnc.org> <4FCF894B.8080002@gondrom.org> <CAOuvq20iC817T-9U3zWG7S2Z=uU=G0i6usOT915ky+9FO8_Zwg@mail.gmail.com> <24C52325-8B51-4DA0-B21D-DC72E184BB23@checkpoint.com> <CA+cU71m=PZRgG34TTTjby=yCbB_z+i4MjEAtVJKE3uOxcKeA1g@mail.gmail.com> <B08F616B-23CE-48E1-BC9D-611FF640B44C@checkpoint.com>
In-Reply-To: <B08F616B-23CE-48E1-BC9D-611FF640B44C@checkpoint.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: websec@ietf.org, cevans@google.com, moxie@thoughtcrime.org
Subject: Re: [websec] [saag] Pinning
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Aug 2012 18:36:24 -0000

Hi all,

<hat="individual">
I agree with clarification #52 proposed by Tom.
http://trac.tools.ietf.org/wg/websec/trac/ticket/52

And agree with clarification #51
http://trac.tools.ietf.org/wg/websec/trac/ticket/51

For clarification #50:
http://trac.tools.ietf.org/wg/websec/trac/ticket/50
I am not sure the text is clear enough on what we mean by "a public key 
pin cannot be formed."

Best regards, Tobias



On 11/08/12 22:30, Yoav Nir wrote:
> Hi Tom
>
> On Aug 11, 2012, at 11:57 PM, Tom Ritter wrote:
>
>> I don't know IETF procedure for making changes, but one of the
>> outstanding issues I don't think has been resolved with
>> draft-ietf-websec-key-pinning-02 is inherited DSA parameters.  I
>> raised this issue here:
>> http://www.ietf.org/mail-archive/web/websec/current/msg01027.html with
>> suggested verbiage.
> That message of yours flew under the radar. I don't know why.
>
> The IETF procedure for making changes is to raise the suggestion on the mailing list, and discuss it there until consensus is reached.
>
> To help with that, we may use an issue tracker (similar to a bug tracker like bugzilla). I've opened three tickets for the issues in your email:
> http://trac.tools.ietf.org/wg/websec/trac/ticket/50
> http://trac.tools.ietf.org/wg/websec/trac/ticket/51
> http://trac.tools.ietf.org/wg/websec/trac/ticket/52
>
> We can start a thread on each of them.
>
> Easy way is the editors start the thread with "looking at issue #50, we agree and it seems OK to us. Anyone object?", and then if nobody objects, the text is updated, a new draft is published, and if you think it's OK, we close the ticket.  If there are objections (by the editors or others), they get discussed.
>
> Yoav
>
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec


From tobias.gondrom@gondrom.org  Sat Aug 18 11:58:21 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6378D21F8460 for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 11:58:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.717
X-Spam-Level: 
X-Spam-Status: No, score=-96.717 tagged_above=-999 required=5 tests=[AWL=-1.355, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0HMkPF2ZBW0o for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 11:58:21 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 8448C21F844E for <websec@ietf.org>; Sat, 18 Aug 2012 11:58:20 -0700 (PDT)
Received: (qmail 15462 invoked from network); 18 Aug 2012 20:58:19 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 18 Aug 2012 20:58:19 +0200
Message-ID: <502FE5CA.6070501@gondrom.org>
Date: Sat, 18 Aug 2012 19:58:18 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: websec@ietf.org
References: <50297CA6.6080506@mozilla.com> <CAJE5ia91-j4avKvvKSUj2P1K_U=EFwGd+feVqMNv8AtkWqSA7Q@mail.gmail.com>
In-Reply-To: <CAJE5ia91-j4avKvvKSUj2P1K_U=EFwGd+feVqMNv8AtkWqSA7Q@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Aug 2012 18:58:21 -0000

Hi David and Adam,

that was my understanding from the draft so far, too. See section 6.1.2 
first paragraph.

Having said that, David may be right and we could be more explicit about 
that max-age=0 and includeSubDomains does not ref up in the tree. (for 
example by adding one more example).
It was clear to me from the text, but well I can be too deep in things 
from time to time and take things for granted. Any other opinions on this?

Best, Tobias


On 13/08/12 23:29, Adam Barth wrote:
> The way the implementation in Chrome works is that max-age=0 only
> clears the entry for that particular host name.  If there's another
> shorter host name with includeSubdomains, that isn't affected.
>
> Adam
>
>
> On Mon, Aug 13, 2012 at 3:16 PM, David Keeler <dkeeler@mozilla.com> wrote:
>> Hello,
>>
>> The current HSTS spec draft says "A max-age value of zero (i.e.,
>> "max-age=0") signals the UA to cease regarding the host as a Known HSTS
>> Host." (section 6.1.1) How does this interact with the includeSubdomains
>> directive?
>> For instance, if the UA receives an HSTS header with includeSubdomains
>> from example.com but then receives an HSTS header with max-age=0 from
>> sub.example.com, is sub.example.com to be noted as an HSTS host?
>> Either way, I believe the language of the spec could be a bit more clear.
>>
>> Cheers,
>> David Keeler
>> _______________________________________________
>> websec mailing list
>> websec@ietf.org
>> https://www.ietf.org/mailman/listinfo/websec
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec


From barryleiba.mailing.lists@gmail.com  Sat Aug 18 17:56:04 2012
Return-Path: <barryleiba.mailing.lists@gmail.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 867A321F84C9 for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 17:56:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.01
X-Spam-Level: 
X-Spam-Status: No, score=-103.01 tagged_above=-999 required=5 tests=[AWL=-0.033, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oi9HrLBc1bQT for <websec@ietfa.amsl.com>; Sat, 18 Aug 2012 17:56:04 -0700 (PDT)
Received: from mail-lpp01m010-f44.google.com (mail-lpp01m010-f44.google.com [209.85.215.44]) by ietfa.amsl.com (Postfix) with ESMTP id AAB1021F847C for <websec@ietf.org>; Sat, 18 Aug 2012 17:56:03 -0700 (PDT)
Received: by lahm15 with SMTP id m15so2846585lah.31 for <websec@ietf.org>; Sat, 18 Aug 2012 17:56:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=eZLntToehUNiDT+MAYF7Cj+5r1mka3VX+aXjSBM6aBc=; b=d/MPqZSzSmqtjjmpL+j99fY7E8NhAec429Wv2ABcjciSnQlasZri2rgeDabHA38G34 egSZyIjj1LOfqWS14/wcEZo5RW5+QMHWavXmudOREHoFEd0UYu4874Zdc6Zk53jy9Piq XvPj4YYSXMN2bxX62npQscJAB/Tf61WYDvJ8wNR+tnz4bRtKPXq+bHQbUfIZz3cYdsJI /F8fV1BmaAdqxk6jbgg/o+MED8lkUoq/xsU2AagSXYH7ZZQm7O1UXLpbPFHfsGvpvVCN xpnwD4W2BbU6fX81k1amyVGXHiodseQt+Bhra+dGmY9LP3trplTfYYitUvTSpTNxbkWV 0sMQ==
MIME-Version: 1.0
Received: by 10.152.112.234 with SMTP id it10mr9325907lab.36.1345337762601; Sat, 18 Aug 2012 17:56:02 -0700 (PDT)
Sender: barryleiba.mailing.lists@gmail.com
Received: by 10.112.113.196 with HTTP; Sat, 18 Aug 2012 17:56:02 -0700 (PDT)
In-Reply-To: <502F7214.6010102@gondrom.org>
References: <502ECBD3.6050902@KingsMountain.com> <B80C8460-9C37-4BFC-B4F0-D757E9FB3290@checkpoint.com> <502F7214.6010102@gondrom.org>
Date: Sat, 18 Aug 2012 20:56:02 -0400
X-Google-Sender-Auth: rbARc7XNWSGt8otYgxSVgmToUmg
Message-ID: <CAC4RtVCypaYFQmV-_Mp7f3bqPqo=4mv2LY5Cs0UiNGmmkPHH=g@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
Content-Type: text/plain; charset=ISO-8859-1
Cc: websec@ietf.org
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Aug 2012 00:56:04 -0000

>>> I'd also noted that we need to decide on a IANA policy to declare.
>>
>> Do we need to do this?  Assuming the proposed resolution achieves
>> consensus (and there have been no nays yet), we're not setting up a
>> registry. I don't think we get to set a policy for a registry we're not
>> setting up.
>
> <hat="WG chair">
> AFAIK from an administrative perspective, Yoav is right.
> In general we set the IANA policy for registry updates at creation of the
> registry. So no need to do it here without the registry (assuming we don't
> create an IANA registry).

The point in this case is that this is a response to Ben's GenART
review, which suggested that we at least nail down the registration
policy at this point, lest someone come along later with an extension
and create the registry with, say, an FCFS policy (probably too
light), or perhaps with a Standards Action policy (arguably too
heavy).

The WG can validly disagree with Ben's review, and unless Russ (or
another AD) strongly agrees and uses it as a DISCUSS point, we're
done.  Even in that case, the WG can still argue against it and try to
convince the AD that it's OK not to do this... and, as Tobias point
out, we usually don't.

So maybe we should modify what Jeff said, thus:

>>> I'd also noted that we need to decide on a IANA policy to declare.

"We need to decide on an IANA policy *or* explicitly decide that we
don't want to choose that now, and leave it to whoever creates the
registry later."

Apparently, we have at least two votes for the latter, from Yoav and Tobias.

Barry (with AD hat off, but handily tucked at the ready under his arm)

From tobias.gondrom@gondrom.org  Sun Aug 19 01:23:12 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C84DE21F848F for <websec@ietfa.amsl.com>; Sun, 19 Aug 2012 01:23:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.667
X-Spam-Level: 
X-Spam-Status: No, score=-96.667 tagged_above=-999 required=5 tests=[AWL=-1.305, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tTACsBW-hUwN for <websec@ietfa.amsl.com>; Sun, 19 Aug 2012 01:23:11 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id A414D21F848A for <websec@ietf.org>; Sun, 19 Aug 2012 01:23:10 -0700 (PDT)
Received: (qmail 17429 invoked from network); 19 Aug 2012 10:23:06 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 19 Aug 2012 10:23:05 +0200
Message-ID: <5030A269.7070901@gondrom.org>
Date: Sun, 19 Aug 2012 09:23:05 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: barryleiba@computer.org
References: <502ECBD3.6050902@KingsMountain.com> <B80C8460-9C37-4BFC-B4F0-D757E9FB3290@checkpoint.com> <502F7214.6010102@gondrom.org> <CAC4RtVCypaYFQmV-_Mp7f3bqPqo=4mv2LY5Cs0UiNGmmkPHH=g@mail.gmail.com>
In-Reply-To: <CAC4RtVCypaYFQmV-_Mp7f3bqPqo=4mv2LY5Cs0UiNGmmkPHH=g@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: websec@ietf.org
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Aug 2012 08:23:12 -0000

On 19/08/12 01:56, Barry Leiba wrote:
>>>> I'd also noted that we need to decide on a IANA policy to declare.
>>> Do we need to do this?  Assuming the proposed resolution achieves
>>> consensus (and there have been no nays yet), we're not setting up a
>>> registry. I don't think we get to set a policy for a registry we're not
>>> setting up.
>> <hat="WG chair">
>> AFAIK from an administrative perspective, Yoav is right.
>> In general we set the IANA policy for registry updates at creation of the
>> registry. So no need to do it here without the registry (assuming we don't
>> create an IANA registry).
> The point in this case is that this is a response to Ben's GenART
> review, which suggested that we at least nail down the registration
> policy at this point, lest someone come along later with an extension
> and create the registry with, say, an FCFS policy (probably too
> light), or perhaps with a Standards Action policy (arguably too
> heavy).
>
> The WG can validly disagree with Ben's review, and unless Russ (or
> another AD) strongly agrees and uses it as a DISCUSS point, we're
> done.  Even in that case, the WG can still argue against it and try to
> convince the AD that it's OK not to do this... and, as Tobias point
> out, we usually don't.
Thanks for the clarification.
>
> So maybe we should modify what Jeff said, thus:
>
>>>> I'd also noted that we need to decide on a IANA policy to declare.
> "We need to decide on an IANA policy *or* explicitly decide that we
> don't want to choose that now, and leave it to whoever creates the
> registry later."
>
> Apparently, we have at least two votes for the latter, from Yoav and Tobias.
>
> Barry (with AD hat off, but handily tucked at the ready under his arm)

<hat="individual">
Yes, I would vote not to specify an IANA policy for a registry we don't define here. I would be in favor of leaving that to when or if we create such a registry later. Though I don't have a strong opinion on this.

Tobias


From Jeff.Hodges@KingsMountain.com  Mon Aug 20 10:55:29 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFF9021F8667 for <websec@ietfa.amsl.com>; Mon, 20 Aug 2012 10:55:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.418
X-Spam-Level: 
X-Spam-Status: No, score=-101.418 tagged_above=-999 required=5 tests=[AWL=0.847, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u1LKGePqHl7s for <websec@ietfa.amsl.com>; Mon, 20 Aug 2012 10:55:29 -0700 (PDT)
Received: from oproxy7-pub.bluehost.com (oproxy7-pub.bluehost.com [67.222.55.9]) by ietfa.amsl.com (Postfix) with SMTP id 421CC21F8650 for <websec@ietf.org>; Mon, 20 Aug 2012 10:55:29 -0700 (PDT)
Received: (qmail 1164 invoked by uid 0); 20 Aug 2012 17:55:06 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy7.bluehost.com with SMTP; 20 Aug 2012 17:55:06 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=hxOx4oD1EnV6b7MUT83ke3RcCWkfAlJMCDx/zBunmME=;  b=SWV01tHeYbLVIKRedWmYbQsc40FK6EzdaoXYxR5e1x6fzg9Bjq0+BPEtsfw2wiCiLHB8F966DwlpFGHlVMLLVbJlvXpnOkVRS8yK1QzOXGxhhZkQEs32yQX7bdtxY8cL;
Received: from [216.113.168.128] (port=63409 helo=[10.244.136.52]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T3WBu-0006HQ-0S for websec@ietf.org; Mon, 20 Aug 2012 11:55:06 -0600
Message-ID: <503279FA.5070304@KingsMountain.com>
Date: Mon, 20 Aug 2012 10:55:06 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: IETF WebSec WG <websec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Aug 2012 17:55:29 -0000

Thanks for the clarification Barry. Yes, this question is in response to Ben 
Campbell's review comment (which I was going to note, but you took care of it :)

 > "We need to decide on an IANA policy *or* explicitly decide that we
 > don't want to choose that now, and leave it to whoever creates the
 > registry later."

yes, that's a more accurate statement of the decision.

Either way is fine by me.

=JeffH


From ietf@adambarth.com  Mon Aug 20 17:20:04 2012
Return-Path: <ietf@adambarth.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA24711E809A for <websec@ietfa.amsl.com>; Mon, 20 Aug 2012 17:20:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.677
X-Spam-Level: 
X-Spam-Status: No, score=-2.677 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FhKzg+EKx-cc for <websec@ietfa.amsl.com>; Mon, 20 Aug 2012 17:20:04 -0700 (PDT)
Received: from mail-gh0-f172.google.com (mail-gh0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id 4847A11E8097 for <websec@ietf.org>; Mon, 20 Aug 2012 17:20:04 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so6087547ghb.31 for <websec@ietf.org>; Mon, 20 Aug 2012 17:20:03 -0700 (PDT)
Received: by 10.236.191.233 with SMTP id g69mr23479494yhn.113.1345508403896; Mon, 20 Aug 2012 17:20:03 -0700 (PDT)
Received: from mail-vb0-f44.google.com (mail-vb0-f44.google.com [209.85.212.44]) by mx.google.com with ESMTPS id o25sm31856158yhm.14.2012.08.20.17.20.02 (version=SSLv3 cipher=OTHER); Mon, 20 Aug 2012 17:20:02 -0700 (PDT)
Received: by vbbez10 with SMTP id ez10so6830127vbb.31 for <websec@ietf.org>; Mon, 20 Aug 2012 17:20:01 -0700 (PDT)
Received: by 10.52.96.33 with SMTP id dp1mr1680048vdb.67.1345508401352; Mon, 20 Aug 2012 17:20:01 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.58.64.169 with HTTP; Mon, 20 Aug 2012 17:19:31 -0700 (PDT)
In-Reply-To: <1883526372.2436253.1345507760090.JavaMail.root@mozilla.com>
References: <CAJE5ia91-j4avKvvKSUj2P1K_U=EFwGd+feVqMNv8AtkWqSA7Q@mail.gmail.com> <1883526372.2436253.1345507760090.JavaMail.root@mozilla.com>
From: Adam Barth <ietf@adambarth.com>
Date: Mon, 20 Aug 2012 17:19:31 -0700
Message-ID: <CAJE5ia_YpQ5WSJBwUWdeNZcc_SGRQQNqZpQnTU0BXK7Yju3yqA@mail.gmail.com>
To: Brian Smith <bsmith@mozilla.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: websec@ietf.org
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 00:20:05 -0000

On Mon, Aug 20, 2012 at 5:09 PM, Brian Smith <bsmith@mozilla.com> wrote:
> Adam Barth wrote:
>> The way the implementation in Chrome works is that max-age=0 only
>> clears the entry for that particular host name.  If there's another
>> shorter host name with includeSubdomains, that isn't affected.
>
> Let me try to clarify with an example, which I think should be explicitly documented in the spec:
>
> 1. We visit https://example.com and receive HSTS with max-age=1234567890 ; includeSubdomains
> 2. We visit https://sub.example.com and receive HSTS with max-age=0
>
> Now, is sub.example.com HSTS (because it inherits the HSTS setting from example.com), or is it non-HSTS (because we received a max-age=0 for that host)?

It is HSTS.  Visit (2) would have removed any sub.example.com-specific
entries in the HSTS state table, but there were none, so it didn't
have any effect on the world.

> When we receive a HSTS header from sub.example.com with max-age > 0, then we will treat the expiration time of sub.example.com to be MAX(expiration(example.com), expiration(sub.example.com)).

A simpler way to think about it is that you keep state for each host.
To answer the question of whether a given host is HSTS, you walk the
list of subdomains and check their unexpired state.

> But, if we receive a HSTS header from sub.example.com with max-age == 0, there are two possibilities:
>
> 1. We act consistently with the above case and calculate the HSTS expiration time of sub.example.com to be:
>
>        MAX(expiration(example.com), expiration(sub.example.com))
>     == MAX(expiration(example.com), 0)
>     == expiration(example.com)
>
>    This means that we would effectively be ignoring the max=age == 0 value sent by sub.example.com.

Correct.

> 2. We honor the max-age=0 directive sent by sub.example.com and turn off HSTS for sub.example.com, but not for example.com. That is, we would treat max-age == 0 from a subdomain as "do not do includeSubdomains inheritance for this subdomain."

This is not correct.  We do "honor" the max-age directive set by
sub.example.com by expiring any sub.example.com-specific state.
However, sub.example.com is HSTS due to state specific to example.com,
which is not expired.

> Now, it seems to me that the only reasonable choice is #2, but the spec seems to imply that we should do #1.

Choice #1 seems reasonable to me.

> Here's the problematic scenerio:
>
> 1. We visit https://example.com and get the HSTS header with includeSubdomains and an (effectively) infinite expiration time.

There is no such thing as an infinite expiration time.  Let's proceed
assuming you mean "one year" rather than infinite.

> 2. The owners of example.com decides to turn of HSTS for whatever reason (perhaps the domain changed owners, or there's a compatibility issue, or whatever), so they start sending out HSTS with max-age=0 for example.com and for all the subdomains.

That's not a correct way of disabling HSTS after (1).  Instead, they
need only send out an max-age=0 header for example.com itself.

> 3. We visit https://sub.example.com and get the max-age=0 HSTS header.
>
> If we choose choice #2, we do what the owners of example.com intended, by treating https://sub.example.com as non-HSTS right away, without ever needing to visit https://example.com, which we might NEVER do ever again.

I mean, it's just guesswork as to what they intend.  I can write a
similar story in which the intent is the reverse.

> If we choose choice #1, we will effectively be making https://sub.example.com HSTS forever, and the domain owner has no way to help us undo it.

They can simply initiate a request to https://example.com/ (e.g., by
using an HTTP redirect or an HTML image element) and clear the HSTS
state for that host name.

Adam

From tobias.gondrom@gondrom.org  Tue Aug 21 02:31:47 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D31EE21F86BD for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 02:31:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.277
X-Spam-Level: 
X-Spam-Status: No, score=-96.277 tagged_above=-999 required=5 tests=[AWL=-1.515, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, J_CHICKENPOX_33=0.6, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QMZij1Y6JvBW for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 02:31:47 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id D47E821F86C4 for <websec@ietf.org>; Tue, 21 Aug 2012 02:31:46 -0700 (PDT)
Received: (qmail 1374 invoked from network); 21 Aug 2012 11:31:44 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 21 Aug 2012 11:31:44 +0200
Message-ID: <50335580.2040701@gondrom.org>
Date: Tue, 21 Aug 2012 10:31:44 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: ietf@adambarth.com, bsmith@mozilla.com
References: <CAJE5ia91-j4avKvvKSUj2P1K_U=EFwGd+feVqMNv8AtkWqSA7Q@mail.gmail.com> <1883526372.2436253.1345507760090.JavaMail.root@mozilla.com> <CAJE5ia_YpQ5WSJBwUWdeNZcc_SGRQQNqZpQnTU0BXK7Yju3yqA@mail.gmail.com>
In-Reply-To: <CAJE5ia_YpQ5WSJBwUWdeNZcc_SGRQQNqZpQnTU0BXK7Yju3yqA@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: websec@ietf.org
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 09:31:48 -0000

On 21/08/12 01:19, Adam Barth wrote:
> On Mon, Aug 20, 2012 at 5:09 PM, Brian Smith <bsmith@mozilla.com> wrote:
>> Adam Barth wrote:
>>> The way the implementation in Chrome works is that max-age=0 only
>>> clears the entry for that particular host name.  If there's another
>>> shorter host name with includeSubdomains, that isn't affected.
>> Let me try to clarify with an example, which I think should be explicitly documented in the spec:
>>
>> 1. We visit https://example.com and receive HSTS with max-age=1234567890 ; includeSubdomains
>> 2. We visit https://sub.example.com and receive HSTS with max-age=0
>>
>> Now, is sub.example.com HSTS (because it inherits the HSTS setting from example.com), or is it non-HSTS (because we received a max-age=0 for that host)?
> It is HSTS.  Visit (2) would have removed any sub.example.com-specific
> entries in the HSTS state table, but there were none, so it didn't
> have any effect on the world.
>
>> When we receive a HSTS header from sub.example.com with max-age > 0, then we will treat the expiration time of sub.example.com to be MAX(expiration(example.com), expiration(sub.example.com)).
> A simpler way to think about it is that you keep state for each host.
> To answer the question of whether a given host is HSTS, you walk the
> list of subdomains and check their unexpired state.
>
>> But, if we receive a HSTS header from sub.example.com with max-age == 0, there are two possibilities:
>>
>> 1. We act consistently with the above case and calculate the HSTS expiration time of sub.example.com to be:
>>
>>         MAX(expiration(example.com), expiration(sub.example.com))
>>      == MAX(expiration(example.com), 0)
>>      == expiration(example.com)
>>
>>     This means that we would effectively be ignoring the max=age == 0 value sent by sub.example.com.
> Correct.
>
>> 2. We honor the max-age=0 directive sent by sub.example.com and turn off HSTS for sub.example.com, but not for example.com. That is, we would treat max-age == 0 from a subdomain as "do not do includeSubdomains inheritance for this subdomain."
> This is not correct.  We do "honor" the max-age directive set by
> sub.example.com by expiring any sub.example.com-specific state.
> However, sub.example.com is HSTS due to state specific to example.com,
> which is not expired.
>
>> Now, it seems to me that the only reasonable choice is #2, but the spec seems to imply that we should do #1.
> Choice #1 seems reasonable to me.
>
>> Here's the problematic scenerio:
>>
>> 1. We visit https://example.com and get the HSTS header with includeSubdomains and an (effectively) infinite expiration time.
> There is no such thing as an infinite expiration time.  Let's proceed
> assuming you mean "one year" rather than infinite.
>
>> 2. The owners of example.com decides to turn of HSTS for whatever reason (perhaps the domain changed owners, or there's a compatibility issue, or whatever), so they start sending out HSTS with max-age=0 for example.com and for all the subdomains.
> That's not a correct way of disabling HSTS after (1).  Instead, they
> need only send out an max-age=0 header for example.com itself.
>
>> 3. We visit https://sub.example.com and get the max-age=0 HSTS header.
>>
>> If we choose choice #2, we do what the owners of example.com intended, by treating https://sub.example.com as non-HSTS right away, without ever needing to visit https://example.com, which we might NEVER do ever again.
> I mean, it's just guesswork as to what they intend.  I can write a
> similar story in which the intent is the reverse.
>
>> If we choose choice #1, we will effectively be making https://sub.example.com HSTS forever, and the domain owner has no way to help us undo it.
> They can simply initiate a request to https://example.com/ (e.g., by
> using an HTTP redirect or an HTML image element) and clear the HSTS
> state for that host name.
>
> Adam

<hat="individual">

Would agree with Adam.

And for Brian, I think there is actually one more use case that you 
haven't considered:
Look at it in reverse order:
1. We visit https://sub.example.com and receive HSTS with max-age=1234567890
2. We visit https://example.com and receive HSTS with max-age=0 ; 
includeSubdomains

as far as I remember that would actually clear HSTS for sub.example.com?
So your mathematical formula above would not reflect this correctly:
"
       MAX(expiration(example.com), expiration(sub.example.com))
     == MAX(expiration(example.com), 0)
     == expiration(example.com)
"

Correct, or am I missing something here?

Best, Tobias




> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec


From Jeff.Hodges@KingsMountain.com  Tue Aug 21 11:53:39 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E98E421F86D9 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 11:53:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.466
X-Spam-Level: 
X-Spam-Status: No, score=-101.466 tagged_above=-999 required=5 tests=[AWL=0.799, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cnSpzAZoWRev for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 11:53:38 -0700 (PDT)
Received: from oproxy9.bluehost.com (oproxy9.bluehost.com [69.89.24.6]) by ietfa.amsl.com (Postfix) with SMTP id BF07B21F86D7 for <websec@ietf.org>; Tue, 21 Aug 2012 11:53:38 -0700 (PDT)
Received: (qmail 24847 invoked by uid 0); 21 Aug 2012 18:53:14 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy9.bluehost.com with SMTP; 21 Aug 2012 18:53:14 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=loYhBZxmx0XZj29mqyBy8CETE4Szd+nIInuRlDvZAs0=;  b=mj64vIE6xRS2HtfCgiwpmvx9lIEnoB84Gji4tZXRB55dX6n+zBEM6L/ahDO/w3oed8F1C3BLKE0BYOikahp8WNNDgdWxoO/BYwtNcLPbZyM/fE8vWF8UX9XvJqHXn+Sn;
Received: from [24.4.122.173] (port=37982 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T3tZi-0002w4-JQ; Tue, 21 Aug 2012 12:53:14 -0600
Message-ID: <5033D919.8070306@KingsMountain.com>
Date: Tue, 21 Aug 2012 11:53:13 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 18:53:40 -0000

Tobias wrote:
 >
 > Would agree with Adam.

agreed -- what Adam relates is how the spec and the implementations have worked 
for ages.


 > And for Brian, I think there is actually one more use case that you
 > haven't considered:
 > Look at it in reverse order:
 > 1. We visit https://sub.example.com and receive HSTS with max-age=1234567890
 > 2. We visit https://example.com and receive HSTS with max-age=0 ;
 > includeSubdomains
 >
 > as far as I remember that would actually clear HSTS for sub.example.com?

No, it would not do so.  As Adam said, the user agent maintains a list of 
distinct host names which have issued the HSTS Policy (aka STS header field).

The above scenario would result in no entry for example.com, and an entry for 
sub.example.com

=JeffH


From tobias.gondrom@gondrom.org  Tue Aug 21 12:09:10 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FBDF21F86C8 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 12:09:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.527
X-Spam-Level: 
X-Spam-Status: No, score=-96.527 tagged_above=-999 required=5 tests=[AWL=-1.165, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S7sWV8no8d9p for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 12:09:09 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 4294621F86D1 for <websec@ietf.org>; Tue, 21 Aug 2012 12:09:09 -0700 (PDT)
Received: (qmail 7669 invoked from network); 21 Aug 2012 21:09:07 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 21 Aug 2012 21:09:07 +0200
Message-ID: <5033DCD3.8020004@gondrom.org>
Date: Tue, 21 Aug 2012 20:09:07 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Jeff.Hodges@KingsMountain.com
References: <5033D919.8070306@KingsMountain.com>
In-Reply-To: <5033D919.8070306@KingsMountain.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: websec@ietf.org
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 19:09:10 -0000

<hat="individual">

Jeff,

thanks a lot for the clarification.


On 21/08/12 19:53, =JeffH wrote:
> Tobias wrote:
> >
> > Would agree with Adam.
>
> agreed -- what Adam relates is how the spec and the implementations 
> have worked for ages.
>
>
> > And for Brian, I think there is actually one more use case that you
> > haven't considered:
> > Look at it in reverse order:
> > 1. We visit https://sub.example.com and receive HSTS with 
> max-age=1234567890
> > 2. We visit https://example.com and receive HSTS with max-age=0 ;
> > includeSubdomains
> >
> > as far as I remember that would actually clear HSTS for 
> sub.example.com?
>
> No, it would not do so.  As Adam said, the user agent maintains a list 
> of distinct host names which have issued the HSTS Policy (aka STS 
> header field).
>
> The above scenario would result in no entry for example.com, and an 
> entry for sub.example.com

Fine by me. Am just wondering on whether this is unambiguous enough from 
the draft?
Do we need to be more clear on that? Or did I miss a clarifying point on 
that somewhere in the draft?

Specifically my confusion came when reading 6.1.1 and 6.1.2 and trying 
to apply them as:

first 6.1.1.: "A max-age value of zero (i.e., "max-age=0") signals the UA to
           cease regarding the host as a Known HSTS Host."
and then the next sentence in 6.1.2. "..."includeSubDomains" directive 
is a valueless flag which,
    if present, signals to the UA that the HSTS Policy applies to this 
HSTS Host as well as any subdomains"

Could that be misread as "0" means cease HSTS and then 
"includeSubDomains" extends that meaning to all subdomains?

Just my 5cents,

Tobias




>
> =JeffH
>


From Jeff.Hodges@KingsMountain.com  Tue Aug 21 12:47:12 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B66E711E80F6 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 12:47:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.538
X-Spam-Level: 
X-Spam-Status: No, score=-101.538 tagged_above=-999 required=5 tests=[AWL=0.727, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pEIdDGA697HP for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 12:47:12 -0700 (PDT)
Received: from oproxy6-pub.bluehost.com (oproxy6-pub.bluehost.com [67.222.54.6]) by ietfa.amsl.com (Postfix) with SMTP id 0504721F8709 for <websec@ietf.org>; Tue, 21 Aug 2012 12:47:11 -0700 (PDT)
Received: (qmail 23697 invoked by uid 0); 21 Aug 2012 19:46:47 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by cpoproxy3.bluehost.com with SMTP; 21 Aug 2012 19:46:47 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=9sS0W9CK0oSKnbKze5O+E1nfoKjmMs4ltGW/FJFPpEE=;  b=EA5hdUF1N+RL7R3JHD/lpM9zIBCWD16p9d/95g92wiCJzG0yJfnw54l1pZF/5CZIBa97rsQF58X35oJ9mNq4dnrCY84hqhVoA5qjgNttpEpW85McPXxRQ8c9D8ZsnaeJ;
Received: from [24.4.122.173] (port=38463 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T3uPX-00009T-7t; Tue, 21 Aug 2012 13:46:47 -0600
Message-ID: <5033E5A5.3020205@KingsMountain.com>
Date: Tue, 21 Aug 2012 12:46:45 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 19:47:12 -0000

Tobias replied:
 >
 > I replied:
 >
 >> Tobias wrote
 >>
 >> > Look at it in reverse order:
 >> > 1. We visit https://sub.example.com and receive HSTS with
 >> > max-age=1234567890
 >> > 2. We visit https://example.com and receive HSTS with max-age=0 ;
 >> > includeSubdomains
 >> >
 >> > as far as I remember that would actually clear HSTS for
 >> > sub.example.com?
 >>
 >> No, it would not do so.  As Adam said, the user agent maintains a list
 >> of distinct host names which have issued the HSTS Policy (aka STS
 >> header field).
 >>
 >> The above scenario would result in no entry for example.com, and an
 >> entry for sub.example.com
 >
 > Fine by me. Am just wondering on whether this is unambiguous enough from
 > the draft?
 > Do we need to be more clear on that? Or did I miss a clarifying point on
 > that somewhere in the draft?

well, there's also the normative text about this in Section 8.1 
"Strict-Transport-Security Response Header Field Processing". But there's no 
forward reference to it from S 6.1.x.

I'll try to fix that, see below.


 > Specifically my confusion came when reading 6.1.1 and 6.1.2 and trying
 > to apply them as:
 >
 > first 6.1.1.: "A max-age value of zero (i.e., "max-age=0") signals the UA to
 >            cease regarding the host as a Known HSTS Host."
 > and then the next sentence in 6.1.2. "..."includeSubDomains" directive
 > is a valueless flag which,
 >     if present, signals to the UA that the HSTS Policy applies to this
 > HSTS Host as well as any subdomains"
 >
 > Could that be misread as "0" means cease HSTS and then
 > "includeSubDomains" extends that meaning to all subdomains?

no, that's not how it's supposed to work, but like I said above, the normative 
text is in section 8.1.

So, I've made some updates in my -13 working copy to try to polish this out a bit...

###

6.1.1.  The max-age Directive

    The REQUIRED "max-age" directive specifies the number of seconds,
    after the reception of the STS header field, during which the UA
    regards the host (from whom the message was received) as a Known HSTS
    Host. ...

    NOTE:  A max-age value of zero (i.e., "max-age=0") signals the UA to
           cease regarding the host as a Known HSTS Host, including the
           includeSubDomains flag (if set for that HSTS Host).  See also
           Section 8.1 "Strict-Transport-Security Response Header Field
           Processing".

...

8.1.  Strict-Transport-Security Response Header Field Processing

    ...

       The max-age value is essentially a "time to live" value relative
       to the reception time of the STS header field.

       If the max-age header field value token has a value of zero, the
       UA MUST remove its cached HSTS Policy information (including the
       includeSubDomains flag if set) if the HSTS Host is known, or, MUST
       NOT note this HSTS Host if it is not yet known.
...

###

note the now-explicit mention of treatment of the includeSubDomains flag in the 
above excerpts.

Does that help clarify things ?


=JeffH



From ietf@adambarth.com  Tue Aug 21 13:41:01 2012
Return-Path: <ietf@adambarth.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3ACC821F85FF for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 13:41:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.944
X-Spam-Level: 
X-Spam-Status: No, score=-2.944 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LjP+d8kCpVIz for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 13:41:00 -0700 (PDT)
Received: from mail-qa0-f44.google.com (mail-qa0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id 91ED221F85FC for <websec@ietf.org>; Tue, 21 Aug 2012 13:41:00 -0700 (PDT)
Received: by qadb17 with SMTP id b17so3899410qad.10 for <websec@ietf.org>; Tue, 21 Aug 2012 13:41:00 -0700 (PDT)
Received: by 10.229.137.12 with SMTP id u12mr15594500qct.28.1345581659888; Tue, 21 Aug 2012 13:40:59 -0700 (PDT)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by mx.google.com with ESMTPS id gw6sm1849541qab.21.2012.08.21.13.40.58 (version=SSLv3 cipher=OTHER); Tue, 21 Aug 2012 13:40:58 -0700 (PDT)
Received: by vcbfo14 with SMTP id fo14so276132vcb.31 for <websec@ietf.org>; Tue, 21 Aug 2012 13:40:57 -0700 (PDT)
Received: by 10.52.90.104 with SMTP id bv8mr3006852vdb.102.1345581657585; Tue, 21 Aug 2012 13:40:57 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.58.64.169 with HTTP; Tue, 21 Aug 2012 13:40:27 -0700 (PDT)
In-Reply-To: <1309411276.2656875.1345581509698.JavaMail.root@mozilla.com>
References: <50335580.2040701@gondrom.org> <1309411276.2656875.1345581509698.JavaMail.root@mozilla.com>
From: Adam Barth <ietf@adambarth.com>
Date: Tue, 21 Aug 2012 13:40:27 -0700
Message-ID: <CAJE5ia9+jNNpSx6D4wCDVWSM0RhqgHLa8d+_ctGv6wAc_qhj7w@mail.gmail.com>
To: Brian Smith <bsmith@mozilla.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: websec@ietf.org
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 20:41:01 -0000

On Tue, Aug 21, 2012 at 1:38 PM, Brian Smith <bsmith@mozilla.com> wrote:
>> Adam Barth wrote:
>> >Brian Smith wrote:
>> >> 2. The owners of example.com decides to turn of HSTS for whatever
>> >> reason (perhaps the domain changed owners, or there's a
>> >> compatibility issue, or whatever), so they start sending out HSTS
>> >> with max-age=3D0 for example.com and for all the subdomains.
>
>> > That's not a correct way of disabling HSTS after (1).  Instead,
>> > they need only send out an max-age=3D0 header for example.com itself.
>
> [...]
>
>> > They can simply initiate a request to https://example.com/ (e.g.,
>> > by using an HTTP redirect or an HTML image element) and clear the
>> > HSTS state for that host name.
>
> I understand what you're saying and it makes sense. And, I agree that in =
a web browser that is a pretty reasonable way to handle some emergency wher=
e you have to turn off HSTS for some reason, though I think it would be qui=
te tricky to do so in a way that is reliable.
>
> Another thing to keep in mind is that, in order to turn off HSTS, the sit=
e must comply with the browser's requirements for HSTS sites anyway; otherw=
ise the browser will ignore your HSTS header and avoid doing the redirect o=
r avoid loading the page with the img tag in it.
>
> FWIW, in Firefox we are also going to honor max-age=3D0 as a mechanism to=
 disable the entries in our pre-loaded HSTS list that will ship in the brow=
ser.

How long do you plan to cache the disable?

Adam

From tobias.gondrom@gondrom.org  Tue Aug 21 14:35:21 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 664F821F875C for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 14:35:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.189
X-Spam-Level: 
X-Spam-Status: No, score=-96.189 tagged_above=-999 required=5 tests=[AWL=-1.427, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, J_CHICKENPOX_45=0.6, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ecB51j6IXdmW for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 14:35:20 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 6C74921F8757 for <websec@ietf.org>; Tue, 21 Aug 2012 14:35:20 -0700 (PDT)
Received: (qmail 9551 invoked from network); 21 Aug 2012 23:35:18 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 21 Aug 2012 23:35:18 +0200
Message-ID: <5033FF14.2060301@gondrom.org>
Date: Tue, 21 Aug 2012 22:35:16 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Jeff.Hodges@KingsMountain.com
References: <5033E5A5.3020205@KingsMountain.com>
In-Reply-To: <5033E5A5.3020205@KingsMountain.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: websec@ietf.org
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 21:35:21 -0000

On 21/08/12 20:46, =JeffH wrote:
> Tobias replied:
> >
> > I replied:
> >
> >> Tobias wrote
> >>
> >> > Look at it in reverse order:
> >> > 1. We visit https://sub.example.com and receive HSTS with
> >> > max-age=1234567890
> >> > 2. We visit https://example.com and receive HSTS with max-age=0 ;
> >> > includeSubdomains
> >> >
> >> > as far as I remember that would actually clear HSTS for
> >> > sub.example.com?
> >>
> >> No, it would not do so.  As Adam said, the user agent maintains a list
> >> of distinct host names which have issued the HSTS Policy (aka STS
> >> header field).
> >>
> >> The above scenario would result in no entry for example.com, and an
> >> entry for sub.example.com
> >
> > Fine by me. Am just wondering on whether this is unambiguous enough 
> from
> > the draft?
> > Do we need to be more clear on that? Or did I miss a clarifying 
> point on
> > that somewhere in the draft?
>
> well, there's also the normative text about this in Section 8.1 
> "Strict-Transport-Security Response Header Field Processing". But 
> there's no forward reference to it from S 6.1.x.
>
> I'll try to fix that, see below.

<hat="individual">
well, I read section 8.1 before, too. Actually I re-read the whole ID in 
search of a sentence making a statement about how to handle this 
particular case above, but couldn't find any. So I don't think this is 
about forward reference. The question is, is it specified somewhere in 
the ID already and I just missed it (in which case it may be ok to just 
leave everything as is) or is it not specified in the draft, yet? (in 
which case it would make sense to add something, whether in section 8 or 
6 - with or without forward reference...)

>
>
> > Specifically my confusion came when reading 6.1.1 and 6.1.2 and trying
> > to apply them as:
> >
> > first 6.1.1.: "A max-age value of zero (i.e., "max-age=0") signals 
> the UA to
> >            cease regarding the host as a Known HSTS Host."
> > and then the next sentence in 6.1.2. "..."includeSubDomains" directive
> > is a valueless flag which,
> >     if present, signals to the UA that the HSTS Policy applies to this
> > HSTS Host as well as any subdomains"
> >
> > Could that be misread as "0" means cease HSTS and then
> > "includeSubDomains" extends that meaning to all subdomains?
>
> no, that's not how it's supposed to work, but like I said above, the 
> normative text is in section 8.1.

Didn't find that information on how to handle this particular case in 
section 8.1. Could you maybe point me to the paragraph or copy&paste on 
max-age=0 and includeSubDomain, in case I am ignorant/blind/stupid/can't 
find it....

>
> So, I've made some updates in my -13 working copy to try to polish 
> this out a bit...
>
> ###
>
> 6.1.1.  The max-age Directive
>
>    The REQUIRED "max-age" directive specifies the number of seconds,
>    after the reception of the STS header field, during which the UA
>    regards the host (from whom the message was received) as a Known HSTS
>    Host. ...
>
>    NOTE:  A max-age value of zero (i.e., "max-age=0") signals the UA to
>           cease regarding the host as a Known HSTS Host, including the
>           includeSubDomains flag (if set for that HSTS Host).  See also
>           Section 8.1 "Strict-Transport-Security Response Header Field
>           Processing".
>
> ...
>
> 8.1.  Strict-Transport-Security Response Header Field Processing
>
>    ...
>
>       The max-age value is essentially a "time to live" value relative
>       to the reception time of the STS header field.
>
>       If the max-age header field value token has a value of zero, the
>       UA MUST remove its cached HSTS Policy information (including the
>       includeSubDomains flag if set) if the HSTS Host is known, or, MUST
>       NOT note this HSTS Host if it is not yet known.
> ...
>
> ###
>
> note the now-explicit mention of treatment of the includeSubDomains 
> flag in the above excerpts.
>
> Does that help clarify things ?

Actually, the proposed text does not clarify it at all in my understanding.
Maybe I did not make my point clear enough:
the case in question is: does HSTS with max-age=0 and includeSubDomains 
mean you remove the HSTS flag (entry) for the subDomains as well (i.e. 
is this equivalent to receiving HSTS headers with max-age=0 for all 
subdomains)? You said "no" and that would be ok for me, but from the 
text you proposed this would still not be clear to me.

Do you see what I mean?

Tobias

>
>
> =JeffH
>
>


From Jeff.Hodges@KingsMountain.com  Tue Aug 21 15:09:29 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23DC221F86D1 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 15:09:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.714
X-Spam-Level: 
X-Spam-Status: No, score=-100.714 tagged_above=-999 required=5 tests=[AWL=-0.219, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7g0vJ2Vv5SpI for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 15:09:28 -0700 (PDT)
Received: from oproxy9.bluehost.com (oproxy9.bluehost.com [IPv6:2605:dc00:100:2::a2]) by ietfa.amsl.com (Postfix) with SMTP id 7C00D21F86D0 for <websec@ietf.org>; Tue, 21 Aug 2012 15:09:28 -0700 (PDT)
Received: (qmail 19992 invoked by uid 0); 21 Aug 2012 22:09:25 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy9.bluehost.com with SMTP; 21 Aug 2012 22:09:25 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=pKLvb8fF/68iU/8TtmTQUgVEJIrlJBai/guJtfYbufw=;  b=CV1SxAT0P3jWbEZnTgVePnTpZPIoOok4HfN/RsL2P/JvlCUvDGfp+fuTbRrZ7NOF6wDuOR4E5EhXJcD311FTXp2Bf/gchUeIFWq6IhoN0dy8MjhQY4B7mHfutuIbO77N;
Received: from [24.4.122.173] (port=39859 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T3wdZ-0003LU-J7; Tue, 21 Aug 2012 16:09:25 -0600
Message-ID: <50340714.4030209@KingsMountain.com>
Date: Tue, 21 Aug 2012 15:09:24 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Brian Smith <bsmith@mozilla.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] wrt Firefox's pre-loaded HSTS list impl (was: HSTS: max-age=0 interacting with includeSubdomains)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 22:09:29 -0000

Adam Barth wrote..
 >
 > On Tue, Aug 21, 2012 at 1:38 PM, Brian Smith <bsmith@mozilla.com> wrote:
 >>> Adam Barth wrote:
 >>>> Brian Smith wrote:
 >>>>> 2. The owners of example.com decides to turn of HSTS for whatever
 >>>>> reason (perhaps the domain changed owners, or there's a compatibility
 >>>>> issue, or whatever), so they start sending out HSTS with max-age=0
 >>>>> for example.com and for all the subdomains.
 >>
 >>>> That's not a correct way of disabling HSTS after (1).  Instead, they
 >>>> need only send out an max-age=0 header for example.com itself.
 >>
 >> [...]
 >>
 >>>> They can simply initiate a request to https://example.com/ (e.g., by
 >>>> using an HTTP redirect or an HTML image element) and clear the HSTS
 >>>> state for that host name.
 >>
 >> I understand what you're saying and it makes sense. And, I agree that in a
 >> web browser that is a pretty reasonable way to handle some emergency where
 >> you have to turn off HSTS for some reason, though I think it would be quite
 >> tricky to do so in a way that is reliable.
 >>
 >> Another thing to keep in mind is that, in order to turn off HSTS, the site
 >> must comply with the browser's requirements for HSTS sites anyway;
 >> otherwise the browser will ignore your HSTS header and avoid doing the
 >> redirect or avoid loading the page with the img tag in it.

I guess I'm curious what you mean by "browser's requirements for HSTS sites" and 
why it might avoid performing a redirect ?


 >> FWIW, in Firefox we are also going to honor max-age=0 as a mechanism to
 >> disable the entries in our pre-loaded HSTS list that will ship in the
 >> browser.
 >
 > How long do you plan to cache the disable?

And can the site then turn around and issue HSTS Policy with a non-zero max-age 
to reinstate the policy?

=JeffH


From ietf@adambarth.com  Tue Aug 21 15:41:46 2012
Return-Path: <ietf@adambarth.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DC9611E8091 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 15:41:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.947
X-Spam-Level: 
X-Spam-Status: No, score=-2.947 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0k1HYAGJHoM6 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 15:41:45 -0700 (PDT)
Received: from mail-qa0-f44.google.com (mail-qa0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id AACE311E808D for <websec@ietf.org>; Tue, 21 Aug 2012 15:41:45 -0700 (PDT)
Received: by qadb17 with SMTP id b17so3959924qad.10 for <websec@ietf.org>; Tue, 21 Aug 2012 15:41:45 -0700 (PDT)
Received: by 10.224.32.205 with SMTP id e13mr12050540qad.69.1345588905176; Tue, 21 Aug 2012 15:41:45 -0700 (PDT)
Received: from mail-vb0-f44.google.com (mail-vb0-f44.google.com [209.85.212.44]) by mx.google.com with ESMTPS id ea5sm2057800qab.2.2012.08.21.15.41.43 (version=SSLv3 cipher=OTHER); Tue, 21 Aug 2012 15:41:44 -0700 (PDT)
Received: by vbbez10 with SMTP id ez10so391112vbb.31 for <websec@ietf.org>; Tue, 21 Aug 2012 15:41:43 -0700 (PDT)
Received: by 10.52.90.104 with SMTP id bv8mr3241105vdb.102.1345588903362; Tue, 21 Aug 2012 15:41:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.58.64.169 with HTTP; Tue, 21 Aug 2012 15:41:13 -0700 (PDT)
In-Reply-To: <1490899566.2661542.1345584612752.JavaMail.root@mozilla.com>
References: <CAJE5ia9+jNNpSx6D4wCDVWSM0RhqgHLa8d+_ctGv6wAc_qhj7w@mail.gmail.com> <1490899566.2661542.1345584612752.JavaMail.root@mozilla.com>
From: Adam Barth <ietf@adambarth.com>
Date: Tue, 21 Aug 2012 15:41:13 -0700
Message-ID: <CAJE5ia9pL0O_bi73V9SG7pisTp9MdCa2meZb_1SVym+7-tDGuw@mail.gmail.com>
To: Brian Smith <bsmith@mozilla.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: websec@ietf.org
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2012 22:41:46 -0000

On Tue, Aug 21, 2012 at 2:30 PM, Brian Smith <bsmith@mozilla.com> wrote:
> Adam Barth wrote:
>> > FWIW, in Firefox we are also going to honor max-age=3D0 as a
>> > mechanism to disable the entries in our pre-loaded HSTS list that
>> > will ship in the browser.
>>
>> How long do you plan to cache the disable?
>
> Initially: until we receive an HSTS header with max-age > 0 for the site,=
 or until the user clears the dynamic HSTS database in a way that removes t=
he dynamic HSTS information (e.g. by using "Clear Recent History"), to rese=
t back to the "as shipped" state.

Interesting.  I wonder if that's something Chrome should do as well.
Let me ask agl for his thoughts.

Thanks,
Adam

From Jeff.Hodges@KingsMountain.com  Tue Aug 21 17:14:42 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0B8F21F8568 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 17:14:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.697
X-Spam-Level: 
X-Spam-Status: No, score=-100.697 tagged_above=-999 required=5 tests=[AWL=-0.202, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yGeeR3mAXUQE for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 17:14:40 -0700 (PDT)
Received: from oproxy9.bluehost.com (oproxy9.bluehost.com [IPv6:2605:dc00:100:2::a2]) by ietfa.amsl.com (Postfix) with SMTP id 061C921F8555 for <websec@ietf.org>; Tue, 21 Aug 2012 17:14:39 -0700 (PDT)
Received: (qmail 11875 invoked by uid 0); 22 Aug 2012 00:14:39 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy9.bluehost.com with SMTP; 22 Aug 2012 00:14:39 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=YWPIidrnRwNnkVu5KNLai6turaEGGeqol+SqbNesDLY=;  b=Kb/oxPEyOM3UouAVABDUH/iOOeQs4OZS8iye9rDr8BA/pMvKFKhnFcqCImPS8EJSnGNSYxndmMQCoespRzxqGQJJnJV0JjKpvRWN1uTrd7RKCwg3NVcMCeYBNOET2+mv;
Received: from [24.4.122.173] (port=40893 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T3yal-0002wc-BI; Tue, 21 Aug 2012 18:14:39 -0600
Message-ID: <5034246D.2060504@KingsMountain.com>
Date: Tue, 21 Aug 2012 17:14:37 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2012 00:14:42 -0000

Tobias asked:
 >
 > the case in question is: does HSTS with max-age=0 and includeSubDomains
 > mean you remove the HSTS flag (entry) for the subDomains as well ?

If you mean to ask whether a UA receiving this header from example.com..

   Strict-Transport-Security: max-age=0; includeSubDomains

..affects any _entries_ the UA may have in its HSTS list for subdomains of 
example.com, the answer is "no".

Also, receipt of the below header should be treated by the UA the same as 
receipt of the above header (where both headers are received from example.com)..

     Strict-Transport-Security: max-age=0


The intention is that receipt of an HSTS header field with "max-age=0" is 
treated the same regardless of the presence or absence of the includeSubDomains 
flag in the header field. The effect in both cases is to remove the entire entry 
for "example.com" from the UA's HSTS host list.

In other words, the UA maintains HSTS information indexed by hostname, and must 
receive an STS header from a given host (over a secure connection) in order to 
create, update, or delete HSTS info about the given host.

HTH,

=JeffH



From Jeff.Hodges@KingsMountain.com  Tue Aug 21 17:15:11 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A666F21F8568 for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 17:15:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.683
X-Spam-Level: 
X-Spam-Status: No, score=-100.683 tagged_above=-999 required=5 tests=[AWL=-0.188, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MnDt+zEye0Wi for <websec@ietfa.amsl.com>; Tue, 21 Aug 2012 17:15:10 -0700 (PDT)
Received: from oproxy11-pub.bluehost.com (unknown [IPv6:2605:dc00:100:2::a3]) by ietfa.amsl.com (Postfix) with SMTP id C310321F8555 for <websec@ietf.org>; Tue, 21 Aug 2012 17:15:10 -0700 (PDT)
Received: (qmail 17446 invoked by uid 0); 22 Aug 2012 00:15:10 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy11.bluehost.com with SMTP; 22 Aug 2012 00:15:10 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=zBWS9AksFmDaRpnkzu2cp52Lj4TfJC+/NLrEfRu8bgg=;  b=VFKyoYVGOr0h2cr+wl0Ubn73sMlrFEb99GQXC56eBY5D20M0rzJcqPGsU769HdIHpDoQ0liy1XxIJ/xmtp/IqttXbCwp2ac4MmC8oP7yKnhKFIAlDpbyn6Q9jByD3iGU;
Received: from [24.4.122.173] (port=40898 helo=[192.168.11.12]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T3ybF-0003RE-PT; Tue, 21 Aug 2012 18:15:09 -0600
Message-ID: <5034248B.20706@KingsMountain.com>
Date: Tue, 21 Aug 2012 17:15:07 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: Brian Smith <bsmith@mozilla.com>,  Tobias Gondrom <tobias.gondrom@gondrom.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] HSTS: max-age=0 interacting with includeSubdomains
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2012 00:15:11 -0000

Brian Smith added..
 >
 > Tobias Gondrom wrote:
 >> Actually, the proposed text does not clarify it at all in my
 >> understanding. Maybe I did not make my point clear enough: the case in
 >> question is: does HSTS with max-age=0 and includeSubDomains mean you remove
 >> the HSTS flag (entry) for the subDomains as well (i.e. is this equivalent
 >> to receiving HSTS headers with max-age=0 for all subdomains)? You said "no"
 >> and that would be ok for me, but from the text you proposed this would
 >> still not be clear to me.
 >>
 >> Do you see what I mean?
 >
 > I agree that the proposed change doesn't really make things less confusing.

Perhaps you could suggest mods to -12 that would help clarify it from your 
perspective?


 > My understanding (based on this discussion) is that an HSTS header can only
 > modify the HSTS information for the same host that the HSTS header was
 > received on.

correct.

 > This means that the client should not modify any information for
 > sub.example.org based on information it receives from example.org,

correct.

 >  and it
 > should not modify any information for example.org based on information it
 > receives from sub.example.org.

correct.


 > When making a connection to a host, the client reads the entry for the given
 > host, and for all parent domains that have includeSubdomains in their HSTS
 > entries.

essentially correct.  Rather, the UA examines any superdomain host (aka parent 
domain hosts) entries it may have and if any of them have includeSubdomains 
asserted, then HSTS Policy applies to the given host; otherwise HSTS Policy 
applies to the given host if it is a Known HSTS Host to that UA. Step 5 in 
Section 8.3.


 > After receiving an HSTS header from a given host, the client updates the
 > entry for the given host only.

correct.

 > When receiving an HSTS header and updating the
 > database, the client should never traverse the parent/child domain
 > hierarchy.

correct.


HTH,

=JeffH



From Jeff.Hodges@KingsMountain.com  Mon Aug 27 13:01:58 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF72C21F853D for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 13:01:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.841
X-Spam-Level: 
X-Spam-Status: No, score=-99.841 tagged_above=-999 required=5 tests=[AWL=-0.835, BAYES_05=-1.11, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P3SgpEtBt6eT for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 13:01:58 -0700 (PDT)
Received: from oproxy7-pub.bluehost.com (oproxy7.bluehost.com [IPv6:2605:dc00:100:2::a7]) by ietfa.amsl.com (Postfix) with SMTP id 2056421F8539 for <websec@ietf.org>; Mon, 27 Aug 2012 13:01:58 -0700 (PDT)
Received: (qmail 1574 invoked by uid 0); 27 Aug 2012 20:01:56 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy7.bluehost.com with SMTP; 27 Aug 2012 20:01:56 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References:Subject:To:MIME-Version:From:Date:Message-ID; bh=+UKfxqzR55BDBJ+9fNCUCNVOMJSb7xIFtDsYZ3Zw5d8=;  b=rqgTHAx7U6inAzUjFMy5CgR6uPYeTow68fit5a4vqf2eSrCRnQB1ubofMAHyW7CrrMloi8+diIYs67oYlF2C2V6+TY/VMemqMOS5PhwbBNHi4Jl1qjT+y7bAgpuA8XMk;
Received: from [216.113.168.128] (port=12836 helo=[10.244.137.150]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1T65VT-0006gA-TY for websec@ietf.org; Mon, 27 Aug 2012 14:01:55 -0600
Message-ID: <503BD234.5030509@KingsMountain.com>
Date: Mon, 27 Aug 2012 13:01:56 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: IETF WebSec WG <websec@ietf.org>
References: <503279FA.5070304@KingsMountain.com>
In-Reply-To: <503279FA.5070304@KingsMountain.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2012 20:01:58 -0000

On 08/20/2012 10:55 AM, =JeffH wrote:> Thanks for the clarification Barry. Yes, 
this question is in response to Ben
 > Campbell's review comment (which I was going to note, but you took care of it :)
 >
 >  > "We need to decide on an IANA policy *or* explicitly decide that we
 >  > don't want to choose that now, and leave it to whoever creates the
 >  > registry later."
 >
 > yes, that's a more accurate statement of the decision.
 >
 > Either way is fine by me.

Do we have a decision on this as yet?

thanks,

=JeffH




From tobias.gondrom@gondrom.org  Mon Aug 27 13:18:35 2012
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF89C21F8510 for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 13:18:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.444
X-Spam-Level: 
X-Spam-Status: No, score=-96.444 tagged_above=-999 required=5 tests=[AWL=-1.082, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RtkFGRr+i09l for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 13:18:35 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 8DE7B21F84FA for <websec@ietf.org>; Mon, 27 Aug 2012 13:18:34 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1;  q=dns; c=nofws; s=default; d=gondrom.org; b=QuXSU2gNhENsmHXzgfqBmJHwPQPWsYx06dkKkEoJSM18WZME5I6EtiXWmEpAzBVsYE5bp+8TQs2ddKDskeA5WCjIDd4gJETpmThs9l+DvQRYZuH06dxTCWOPvMs2T+Ts; h=Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding;
Received: (qmail 3708 invoked from network); 27 Aug 2012 22:18:31 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO ?192.168.1.65?) (94.194.102.93) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 27 Aug 2012 22:18:31 +0200
Message-ID: <503BD617.3000607@gondrom.org>
Date: Mon, 27 Aug 2012 21:18:31 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:14.0) Gecko/20120714 Thunderbird/14.0
MIME-Version: 1.0
To: websec@ietf.org
References: <503279FA.5070304@KingsMountain.com> <503BD234.5030509@KingsMountain.com>
In-Reply-To: <503BD234.5030509@KingsMountain.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2012 20:18:35 -0000

Hello dear websec fellows,

<hat="WG chair">
we have so far only very few comments regarding this. If you feel 
strongly either way, please say so ASAP, within the next 5 days (until 
Sep-1), otherwise we will have to go with the few comments we received 
to judge consensus based on them.

Thank you, Tobias


On 27/08/12 21:01, =JeffH wrote:
> On 08/20/2012 10:55 AM, =JeffH wrote:> Thanks for the clarification 
> Barry. Yes, this question is in response to Ben
> > Campbell's review comment (which I was going to note, but you took 
> care of it :)
> >
> >  > "We need to decide on an IANA policy *or* explicitly decide that we
> >  > don't want to choose that now, and leave it to whoever creates the
> >  > registry later."
> >
> > yes, that's a more accurate statement of the decision.
> >
> > Either way is fine by me.
>
> Do we have a decision on this as yet?
>
> thanks,
>
> =JeffH
>
>
>
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec


From ynir@checkpoint.com  Mon Aug 27 13:28:07 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC14121F8495 for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 13:28:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.439
X-Spam-Level: 
X-Spam-Status: No, score=-10.439 tagged_above=-999 required=5 tests=[AWL=0.160, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q2zA93ZZ7U5n for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 13:28:07 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id C513221F846B for <websec@ietf.org>; Mon, 27 Aug 2012 13:28:06 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id q7RKS38F005955; Mon, 27 Aug 2012 23:28:03 +0300
X-CheckPoint: {503BD477-1-1B221DC2-4FFFF}
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Mon, 27 Aug 2012 23:28:03 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
Date: Mon, 27 Aug 2012 23:28:06 +0300
Thread-Topic: [websec] handling STS header field extendability
Thread-Index: Ac2EknU8achNLVl6Twew+vwBv2SpNg==
Message-ID: <C4EDA5AF-D958-4FE3-AFF9-35C76E56F1C1@checkpoint.com>
References: <503279FA.5070304@KingsMountain.com> <503BD234.5030509@KingsMountain.com> <503BD617.3000607@gondrom.org>
In-Reply-To: <503BD617.3000607@gondrom.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
x-cpdlp: 1193c9b9ae2d3a45035bd4c620f020c777c1b75217
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "websec@ietf.org" <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2012 20:28:07 -0000

With no hats: let's not choose a policy for a registry that we are not sett=
ing up, especially since we're not even sure that it's ever going to be set=
 up.

We can leave it to the first extension document to set up the registry and =
policy. If that document ever comes.

Yoav

On Aug 27, 2012, at 11:18 PM, Tobias Gondrom wrote:

> Hello dear websec fellows,
>=20
> <hat=3D"WG chair">
> we have so far only very few comments regarding this. If you feel=20
> strongly either way, please say so ASAP, within the next 5 days (until=20
> Sep-1), otherwise we will have to go with the few comments we received=20
> to judge consensus based on them.
>=20
> Thank you, Tobias
>=20
>=20
> On 27/08/12 21:01, =3DJeffH wrote:
>> On 08/20/2012 10:55 AM, =3DJeffH wrote:> Thanks for the clarification=20
>> Barry. Yes, this question is in response to Ben
>>> Campbell's review comment (which I was going to note, but you took=20
>> care of it :)
>>>=20
>>>> "We need to decide on an IANA policy *or* explicitly decide that we
>>>> don't want to choose that now, and leave it to whoever creates the
>>>> registry later."
>>>=20
>>> yes, that's a more accurate statement of the decision.
>>>=20
>>> Either way is fine by me.
>>=20
>> Do we have a decision on this as yet?
>>=20
>> thanks,
>>=20
>> =3DJeffH


From paul.hoffman@vpnc.org  Mon Aug 27 14:13:12 2012
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A32921F8512 for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 14:13:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.574
X-Spam-Level: 
X-Spam-Status: No, score=-102.574 tagged_above=-999 required=5 tests=[AWL=0.025, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WdCPpynMrIID for <websec@ietfa.amsl.com>; Mon, 27 Aug 2012 14:13:11 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 9896921F8501 for <websec@ietf.org>; Mon, 27 Aug 2012 14:13:11 -0700 (PDT)
Received: from [10.20.30.108] (50-1-50-97.dsl.dynamic.fusionbroadband.com [50.1.50.97]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.5) with ESMTP id q7RLCrUM049955 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 27 Aug 2012 14:12:55 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.0 \(1486\))
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <C4EDA5AF-D958-4FE3-AFF9-35C76E56F1C1@checkpoint.com>
Date: Mon, 27 Aug 2012 14:12:54 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <F542467E-1F59-460F-9FCC-64132A2857F6@vpnc.org>
References: <503279FA.5070304@KingsMountain.com> <503BD234.5030509@KingsMountain.com> <503BD617.3000607@gondrom.org> <C4EDA5AF-D958-4FE3-AFF9-35C76E56F1C1@checkpoint.com>
To: Yoav Nir <ynir@checkpoint.com>
X-Mailer: Apple Mail (2.1486)
Cc: "websec@ietf.org" <websec@ietf.org>
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2012 21:13:12 -0000

On Aug 27, 2012, at 1:28 PM, Yoav Nir <ynir@checkpoint.com> wrote:

> With no hats: let's not choose a policy for a registry that we are not =
setting up, especially since we're not even sure that it's ever going to =
be set up.
>=20
> We can leave it to the first extension document to set up the registry =
and policy. If that document ever comes.

+1

--Paul Hoffman=

From alexey.melnikov@isode.com  Tue Aug 28 07:34:31 2012
Return-Path: <alexey.melnikov@isode.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25DD921F84FC for <websec@ietfa.amsl.com>; Tue, 28 Aug 2012 07:34:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.83
X-Spam-Level: 
X-Spam-Status: No, score=-102.83 tagged_above=-999 required=5 tests=[AWL=-0.231, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6w+NtSDIZQVG for <websec@ietfa.amsl.com>; Tue, 28 Aug 2012 07:34:30 -0700 (PDT)
Received: from waldorf.isode.com (cl-125.lon-03.gb.sixxs.net [IPv6:2a00:14f0:e000:7c::2]) by ietfa.amsl.com (Postfix) with ESMTP id 2A0B621F8494 for <websec@ietf.org>; Tue, 28 Aug 2012 07:34:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1346164469; d=isode.com; s=selector; i=@isode.com; bh=2GEmUZKO2bJH2sb64aupjSxhb/4AJ/JgP3XFhvmD2t0=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=wRQxd7FheBtrZdf2znZX9razyAFaMOd42GTgkTCLi/ROwRgHDoXgID8u/ipAL133RGzw6m 2IssKgb0SCD2FBP5mqqpiux7+QKZ2e9P7Jp9FOgS4vKKZ5j7bhBUF5xRbfxapguss8dhj1 joKqa58Kt/2EhfZufAq8QiRdpIIR2fs=;
Received: from [172.16.11.4] (shiny.isode.com [62.3.217.250])  by waldorf.isode.com (submission channel) via TCP with ESMTPA  id <UDzW9ABdyLSt@waldorf.isode.com>; Tue, 28 Aug 2012 15:34:29 +0100
Message-ID: <503CD79F.1040907@isode.com>
Date: Tue, 28 Aug 2012 15:37:19 +0100
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
References: <503279FA.5070304@KingsMountain.com> <503BD234.5030509@KingsMountain.com> <503BD617.3000607@gondrom.org>
In-Reply-To: <503BD617.3000607@gondrom.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: websec@ietf.org
Subject: Re: [websec] handling STS header field extendability
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Aug 2012 14:34:31 -0000

On 27/08/2012 21:18, Tobias Gondrom wrote:
> Hello dear websec fellows,
>
> <hat="WG chair">
> we have so far only very few comments regarding this. If you feel 
> strongly either way, please say so ASAP, within the next 5 days (until 
> Sep-1), otherwise we will have to go with the few comments we received 
> to judge consensus based on them.
<hat type="participant">

I don't have strong feelings either way. I don't believe we have many 
(if any at all) standardized extensions anyway.
If people believe that there would be extensions, I have a slight 
preference for picking an IANA policy now. Probably IETF review.
> Thank you, Tobias
>
>
> On 27/08/12 21:01, =JeffH wrote:
>> On 08/20/2012 10:55 AM, =JeffH wrote:> Thanks for the clarification 
>> Barry. Yes, this question is in response to Ben
>> > Campbell's review comment (which I was going to note, but you took 
>> care of it :)
>> >
>> >  > "We need to decide on an IANA policy *or* explicitly decide that we
>> >  > don't want to choose that now, and leave it to whoever creates the
>> >  > registry later."
>> >
>> > yes, that's a more accurate statement of the decision.
>> >
>> > Either way is fine by me.
>>
>> Do we have a decision on this as yet?
>>
>> thanks,
>>
>> =JeffH

