W3C home > Mailing lists > Public > ietf-http-wg@w3.org > April to June 2021

Roman Danyliw's No Objection on draft-ietf-httpbis-cache-16: (with COMMENT)

From: Roman Danyliw via Datatracker <noreply@ietf.org>
Date: Thu, 10 Jun 2021 05:30:35 -0700
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-httpbis-cache@ietf.org, httpbis-chairs@ietf.org, ietf-http-wg@w3.org, mt@lowentropy.net, mt@lowentropy.net
Message-ID: <162332823475.15098.14942237085665451828@ietfa.amsl.com>
Roman Danyliw has entered the following ballot position for
draft-ietf-httpbis-cache-16: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-httpbis-cache/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks to Derek Atkins for the SECDIR review.

** Section 7.  It would be worth mentioning that user-agents that have
interactive human users such as browsers should provide a means to explicitly
purge the contents local cache.

** Section 7.  Per “Caches expose additional potential vulnerabilities, since
the contents of the cache represent an attractive target for malicious
exploitation”, do you mean “expose an additional attack surface” (rather than
“potential vulnerability”)?

** Section 7.1.  Per “Various attacks might be amplified by being stored in a
cache”, this text is vague.  Is there a specific amplification tied to given
attack being suggested here, or is this meant to suggest that the presence of a
malicious payload in a cache seeded by an attacker could reach multiple users?

** Section 7.2.  Recommend being clearer on the threat rather than the attack
vector (“timing attack”):

OLD
This is sometimes called "double keying."

NEW
This is sometimes called "double keying” and provides isolation between
cross-origin content.
Received on Thursday, 10 June 2021 12:33:25 UTC

This archive was generated by hypermail 2.4.0 : Thursday, 10 June 2021 12:34:22 UTC