- From: Adrien de Croy <adrien@qbik.com>
- Date: Wed, 15 Feb 2017 20:27:30 +0000
- To: "Ryan Hamilton" <rch@google.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
- Message-Id: <em6bf5d320-e99f-4248-b6b8-9b1d5e030363@bodybag>
also, as was the argument made way back. a client that can't tell the difference between a 403 and a 200 status response to a connect, and therefore can't display the body in a way appropriate to this should just be fixed. It's entirely possible to render the body on a 403 response, knowing it's a 403 response, in a way that can't expose the user to any phishing, for example a) disable and/or strip any hyperlinks b) suppress any jscript or embedded resources (CSS, JS) except images, which are vetted also c) show it in a different frame with diagonal black and yellow This would have solved the problem from the start. Adrien ------ Original Message ------ From: "Ryan Hamilton" <rch@google.com> To: "Adrien de Croy" <adrien@qbik.com> Sent: 16/02/2017 9:22:06 AM Subject: Re: The future of forward proxy servers in an http/2 over TLS world >On Wed, Feb 15, 2017 at 12:11 PM, Adrien de Croy <adrien@qbik.com> >wrote: >>We already support this with WinGate and I've verified it with Chrome >>and Firefox. In that case couldn't the client trust an error response >>body from CONNECT? > >We used to do this in Chrome, but removed it because of the potential >for phishing. Here's just on example > >Imagine that at user has their browser configured to do proxy auto >discovery. They walk into a cafe and join a wireless network which >sends their traffic to a malicious proxy. The user types >https://mail.example.com/, and is presented with a CONNECT error page >whose contents look exactly like the actual mail.example.com login page >to which they dutifully type their username and password.
Received on Wednesday, 15 February 2017 20:28:07 UTC