- From: Jo Rabin <jo@linguafranca.org>
- Date: Tue, 11 Nov 2008 18:59:38 +0000
- To: public-bpwg-ct <public-bpwg-ct@w3.org>
LC-2067 Awaits conformance statement ACTION-846 LC-2050 Need to take back to Eduardo LC-2023 Inserted note in section 4.2.6.1 rather than altering the list LC-2084 Need example from francois LC-2047 Need a diagram for what is in scope - could make one out of the diagram that used to be in the requirements section LC-2053 - Classes of devices need clarification LC-2040 - X-Device-* should be in an Internet Draft Pending ACTION-879 - Ask [someone] about adding IETF headers [on François Daoust - due 2008-11-11]. --- LC-2044 RESOLUTION: Ref LC-2044 Resolve yes, and change the text to say "*values* of User Agent and Accecpt headers", and clarify that we do not propose guidance for new user agents' use of these headers, it is out of scope *** I didn't add the clarification, it seems out of place *** And anyway RESOLUTION: re LC-2044, resolution on LC-2069 removes the part that required clarification, resolve partial, we won't talk about "use of evidence" --- The BIG one --- LC-2026, LC-2027, LC-2085, LC-2028, LC-2029, LC-2030, LC-2015, LC-2031, LC-2016, LC-2032, LC-2001, LC-2033, LC-2004, LC-2024 Pending Francois's ACTION-859 - Contact IETF TLS group and advise them of what we are thinking and ask for guidance on what to recommend to Content Provider about detecting the presence of a man-in-the-middle proxy Pending Discussion with Thomas Roessler about his concerns ref applications and possible security risks relating to the client thinking that all hosts are the same (i.e. that they are the proxy). Discussion: http://www.w3.org/2008/10/07-bpwg-minutes.html#item02 The amended text so far: 4.2.7.2 HTTPS Link Re-writing Note: The BPWG does not condone link rewriting, but notes that in some circumstances HTTPS is used in situations where the user is prepared to trade usability provided by a transforming proxy for the loss of end-to-end security. Servers can prevent users from exercising this choice by applying a Cache-Control: no-transform directive. If a proxy rewrites HTTPS links, it must advise the user of the security implications of doing so and must provide the option by-pass it and to communicate with the server directly. Notwithstanding anything else in this document, proxies must not rewrite HTTPS links in the presence of a Cache-Control: no-transform directive. If a proxy re-writes HTTPS links, replacement links must have the scheme https. When forwarding requests originating from HTTPS links proxies must include a Via header as discussed under 4.1.6.1 Proxy Treatment of Via Header. When forwarding responses from servers proxies must notify the user of invalid server certificates. Add some stuff below under guidance for servers Note: For clarity it is emphasized that it is not possible for a transforming proxy to transform content accessed via an HTTPS link without breaking end-to-end security.
Received on Tuesday, 11 November 2008 19:00:52 UTC