- From: Eduardo Casais <casays@yahoo.com>
- Date: Fri, 6 Nov 2009 10:40:08 -0800 (PST)
- To: public-bpwg-comments@w3.org
- Message-ID: <255035.90392.qm@web45012.mail.sp1.yahoo.com>
A proposal to endow servers with the possibility to protect their HTTPS services from URL rewriting. I. CONTEXT The CTG allows proxies to rewrite URL, including those indicating that the communication between terminal and server is to be established as an end-to-end connection over TLS/SSL. The W3C acknowledges the serious security concerns that arise from such rewriting operations, but does not provide any mechanism for servers to protect their services from the corresponding security risks. HTTPS URL rewriting has perhaps been the more contentious issue of the CTG so far, and has serious consequences on the credibility of the mobile Web for advanced applications requiring privacy, payment security; it opens up a can of worm regarding liability and certification of mobile e-commerce solutions. II. PROPOSAL The following text is to be added to a new section 4.2.9.4 of the CTG: "Proxies must provide a means for servers to express preferences for inhibiting HTTPS URL rewriting regardless of the preferences expressed by the user. Those preferences must be maintained on a Web site by Web site basis." III. RATIONALE The proposal addresses the issues raised by HTTPS URL rewriting, without imposing a specific mode of implementation. As such, it does not prescribe (non-standard) mechanisms, nor introduces new technology into the CTG, but only sets formal requirements as to their end-effect. I re-establishes the consistency between on the one hand the facts that a) the original decision to establish HTTPS connections lies within the server; b) the knowledge about what level of security is appropriate for a Web application lies on the server side; c) problems of liability, customer support, and commercial reputation fall back onto the server; and, on the other hand, the facts that d) the server is not given any decision power as to whether end-to-end security is to be respected or not; e) only the end-user, who does not possess all required knowledge to assess the situation, is given mechanisms in the current CTG to prevent transformations on site by site basis. It takes into account the fact that none of the available mechanisms utilized by well-behaved proxies is reliable when it comes for a server to detecting whether an HTTPS URL rewriting has taken place or not. In particular, "via" fields may or may not be retransmitted integrally by some HTTP standards-compliant proxies, as indicated in section 4.1.6.1 of the CTG. It is in line with the practice in some countries, where operators have set up mechanisms such as "white lists" to exclude financial institutes from HTTPS URL rewriting. This demonstrates that, notwithstanding whatever is stated about the relevance of rewriting HTTPS links, the consequences of such operations are taken quite seriously. E.Casais
Received on Friday, 6 November 2009 18:40:46 UTC