- From: Jeffrey Yasskin <jyasskin@google.com>
- Date: Tue, 30 Jan 2018 21:26:14 +0000
- To: Eric Rescorla <ekr@rtfm.com>
- Cc: Jana Iyengar <jri@google.com>, HTTP Working Group <ietf-http-wg@w3.org>
- Message-ID: <CANh-dX=3jR-zsUQj-X=CH0HvWk4nb_GH_yO+YWt--Jbn6SkdbA@mail.gmail.com>
On Tue, Jan 30, 2018 at 1:13 PM Eric Rescorla <ekr@rtfm.com> wrote: > > > On Tue, Jan 30, 2018 at 12:35 PM, Jeffrey Yasskin <jyasskin@google.com> > wrote: > >> On Tue, Jan 30, 2018 at 12:18 PM Eric Rescorla <ekr@rtfm.com> wrote: >> >>> >>> >>> On Tue, Jan 30, 2018 at 11:50 AM, Jana Iyengar <jri@google.com> wrote: >>> >>>> I'm watching from the sidelines, but a clarification question: >>>> >>>> Thanks for taking a look at this. However, I don't think it really >>>>> addresses the concern that I raised, which is not solely about talking to >>>>> the origin but about having a digital signature from the origin server >>>>> substitute for an HTTPS connection to the origin. >>>>> >>>> >>>> In the current world, client does DNS lookup, establishes a TCP >>>> connection, creates a secure channel to an authenticated origin, and gets >>>> content from it over this channel. >>>> >>> >>> Yes. >>> >>> >>> Per my understanding, the proposal here basically removes the DNS lookup >>>> + TCP connection to the origin, but creates a secure channel to an >>>> authenticated proxy, and separately authenticates content that it gets from >>>> it. >>>> >>> >>> Well, the proxy is largely irrelevant here, as the client has no >>> particular relationship with it. From a security perspective, the client >>> gets some content from a random location and trusts it because it's >>> digitally signed by the origin server. >>> >>> >>> The client would previously have authenticated the channel to the origin >>>> and gotten any content from it. In this proposal, a client does a TLS >>>> handshake to secure the channel to the proxy, and then authenticates >>>> content that comes over it. Is this understanding correct? If so, it >>>> *seems* equivalent security to HTTPS. >>>> >>> >>> I don't think that's true. At *most* it provided data origin >>> authentication/integrity (feel free to argue non-repudiation, but that's >>> not really relevant here). It doesn't provide confidentiality to the origin >>> server at all. >>> >> >> Exactly, it's confidentiality to the physical server (given the >> recently-added privacy guidance to restrict package fetches to TLS) but not >> to the origin server. >> https://tools.ietf.org/html/draft-yasskin-http-origin-signed-responses-02#section-7 >> explains why that's not quite as bad as for a "random" location, but it's >> still a different guarantee than the lock icon usually claims. >> > > Rather then nitpicking "random location".... It seems like the situation > is that if o2.com has produced a signed package than anyone with a TLS > certificate who can get you to connect to them can present you content with > origin o2.com, no? > Yes, if you follow a link, whoever presented the link can know you followed it (either via javascript or via a 302 redirect), and the link can result in content from o2.com. signed-exchanges change whether there's a physical connection to o2.com, but that physical connection isn't user-visible in any case. Jeffrey
Received on Tuesday, 30 January 2018 21:26:58 UTC