- From: Jo Rabin <jrabin@mtld.mobi>
- Date: Wed, 15 Oct 2008 13:19:43 +0100
- To: MWI BPWG Public <public-bpwg@w3.org>
OK, after a little deliberation it seems that the clearest and neatest
answer is to create a new section to discuss HTTPS.
http://www.w3.org/TR/2008/WD-mobileOK-basic10-tests-20080610/
So the proposal is
a) remove from 2.4.3 HTTP Response
http://www.w3.org/TR/2008/WD-mobileOK-basic10-tests-20080610/#http_response
Note:
To allow for self-signature of certificates during testing the signatory
of a certificate should not be checked.
and
If the response is an HTTPS response:
If the certificate is invalid, FAIL
If the certificate has expired, warn
b) Insert new section (before 2.4.2 HTTP Request)
HTTPS
Note:
Arbitrary root certificates (including self-signed certificates) should
be regarded as trusted.
When resolving a URI, if the URI has the scheme https:
If the certificate presented does not match the
requested URI, FAIL.
If the certificate has expired or is not yet valid, warn.
If certificate validation otherwise fails, FAIL.
Jo
On 08/10/2008 16:26, Thomas Roessler wrote:
> Hi Jo,
>
> sorry for the slow response. The text that you suggested sounds good.
> However, it appears like the dots in your proposal suggest that you want
> to continue expressing this piece of language in terms of the "HTTP
> response that results from an HTTPS Request", or some such.
>
> Unfortunately, the properties that you are checking here are *not*
> properties of any HTTP response: They are properties of the TLS
> handshake that occurs before even an HTTP *request* is sent. Please
> clarify this point.
>
> Thanks much,
> --
> Thomas Roessler, W3C <tlr@w3.org>
>
>
>
>
>
>
>
> On 6 Oct 2008, at 12:55, Jo Rabin wrote:
>
>> Hello Thomas
>>
>> We're keen to push ahead with this edit and are wondering if the
>> WSC-WG has had the chance to look at the proposed change attached?
>>
>> Many thanks
>> Jo
>>
>>
>> On 25/09/2008 10:30, Jo Rabin wrote:
>>> Hi Thomas
>>> Thanks for your comment on behalf of the WSC-WG. We'd appreciate your
>>> further comments on our proposed text, as follows.
>>> Many thanks
>>> Jo
>>> Under ACTION-841
>>> WSC Proposal:
>>> We propose that you update this criterion, at a minimum, as follows:
>>> If the resource is accessed through HTTPS:
>>> If the certificate presented does not match the
>>> resource's URI, FAIL.
>>> If the certificate has expired or is not yet valid, warn.
>>> If certificate validation otherwise fails, FAIL.
>>> Checker SHOULD consider arbitrary root certificates (including
>>> self-signed certificates) as trusted for the purposes of
>>> mobileOK testing.
>>> =====
>>> Current Text:
>>> Note:
>>> To allow for self-signature of certificates during testing the signatory
>>> of a certificate should not be checked.
>>> ...
>>> If the response is an HTTPS response:
>>> If the certificate is invalid, FAIL
>>> If the certificate has expired, warn
>>> =====
>>> Proposed replacement text:
>>> Note:
>>> Arbitrary root certificates (including self-signed certificates) should
>>> be regarded as trusted.
>>> ...
>>> If the response is the result of a request for a URI which has the
>>> scheme https:
>>> If the certificate presented does not match the
>>> requested URI, FAIL.
>>> If the certificate has expired or is not yet valid, warn.
>>> If certificate validation otherwise fails, FAIL.
>>> On 29/08/2008 10:01, Thomas Roessler wrote:
>>>> Hello,
>>>>
>>>> this is a post last call comment concerning the mobile OK basic
>>>> tests 1.0, on behalf of the Web Security Context Working Group.
>>>>
>>>> We notice that section 2.4.3 - HTTP Response - uses the notion of an
>>>> "HTTPS response". There is no such thing.
>>>>
>>>> We also notice that the notion of an "invalid certificate" does not
>>>> match what we understand to be the Best Practice Working Group's
>>>> intention with this test.
>>>>
>>>> We propose that you update this criterion, at a minimum, as follows:
>>>>
>>>> If the resource is accessed through HTTPS: If the
>>>> certificate presented does not match the
>>>> resource's URI, FAIL.
>>>>
>>>> If the certificate has expired or is not yet valid, warn.
>>>>
>>>> If certificate validation otherwise fails, FAIL.
>>>>
>>>> Checker SHOULD consider arbitrary root certificates (including
>>>> self-signed certificates) as trusted for the purposes of
>>>> mobileOK testing.
>>>>
>>>> Note that there are additional error conditions that can occur
>>>> during TLS negotiation, including a mismatch on supported algorithms
>>>> and protocol versions.
>>>>
>>>> Regards,
>>
>
Received on Wednesday, 15 October 2008 12:20:35 UTC