W3C home > Mailing lists > Public > public-bpwg-ct@w3.org > November 2008

[CTG] Draft 2008-11-07 / HTTPS link rewriting

From: Eduardo Casais <casays@yahoo.com>
Date: Tue, 11 Nov 2008 01:36:54 -0800 (PST)
To: public-bpwg-ct@w3.org
Message-ID: <667559.25418.qm@web45012.mail.sp1.yahoo.com>

a)	no-transform

Section 4.2.8.2 states:

	"Servers can prevent users from exercising 
	this choice by applying a Cache-Control: 
	no-transform directive."

This is inexact: a no-transform directive exactly
means that the response sent by the server must
not be modified. It has no bearing on the SSL/TLS
setup. It does not apply to previous HTTP exchanges
that might have led to https URL rewriting. In other
words, it is not the right mechanism to prevent
breaking a secure connection, or to signal a refusal
to handle point-to-point connections instead of
end-to-end ones -- except by widely stretching its
signification outside the specifications of RFC2616.


b)	Connection setup

This is something that has been already stated by 
several commentators: a response with the 
cache-control directive comes too late. By that
time, the secure connection is already interrupted
at the proxy level. Consider the following example:
1. Client accesses a page with a list of links (e.g.
from a web directory), one of them is an https URL.
2. The page gets transcoded, the https URL rewritten.
3. Client access rewritten URL.
4. Server gets rewritten https request and responds.

At (4), a no-transform directive will only ensure
that the content will not get transformed further.
If the page only contains relative URL, there is 
a possibility that the exchange may continue over
the broken secure connection, as the base URL on
the client side may be taken as the rewritten URL.
At this stage, there is no guarantee that the
connection may actually be secure, even for 
further exchanges specifying no-transform. The 
most probable behaviour of a server under these
circumstances is to return the code 403.


c)	Signalling with the server

The correct approach is to enable the server to
distinguish whether the secure connection is 
end-to-end or point-to-point. Somebody familiar
with the details of SSL/TLS may suggest something
at this level.

Otherwise, the necessity of including a reliable,
mandatory marker of transcoder presence in the HTTP 
header is once again evident.


E.Casais


      
Received on Tuesday, 11 November 2008 09:38:09 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Tuesday, 11 November 2008 09:38:10 GMT