html5/spec-author-view Overview.html,1.1750,1.1751 iana.html,1.606,1.607 spec.html,1.1893,1.1894 spec.preprocessed.html,1.732,1.733

Update of /sources/public/html5/spec-author-view
In directory hutz:/tmp/cvs-serv27969

Modified Files:
	Overview.html iana.html spec.html spec.preprocessed.html 
Log Message:
http+aes: Clarify that the nonce is zero and that thus the key must be fresh with each resource. (whatwg r7014)

[updated by splitter]


Index: Overview.html
===================================================================
RCS file: /sources/public/html5/spec-author-view/Overview.html,v
retrieving revision 1.1750
retrieving revision 1.1751
diff -u -d -r1.1750 -r1.1751
--- Overview.html	5 Mar 2012 05:58:48 -0000	1.1750
+++ Overview.html	5 Mar 2012 18:58:43 -0000	1.1751
@@ -364,7 +364,7 @@
     <dt>Editor:</dt>
     <dd><a href="mailto:ian@hixie.ch">Ian Hickson</a>, Google, Inc.</dd>
    </dl><p>This specification is available in the following formats: <a href="spec.html">single page HTML</a>, <a href="Overview.html">multipage HTML</a>, <a href="http://dev.w3.org/html5/spec/">full specification</a>.
-      This is revision 1.5603.</p> 
+      This is revision 1.5604.</p> 
      <p class="copyright"><a href="http://www.w3.org/Consortium/Legal/ipr-notice#Copyright">Copyright</a>
    &copy; 2011 <a href="http://www.w3.org/"><abbr title="World Wide
    Web Consortium">W3C</abbr></a><sup>&reg;</sup> (<a href="http://www.csail.mit.edu/"><abbr title="Massachusetts

Index: spec.html
===================================================================
RCS file: /sources/public/html5/spec-author-view/spec.html,v
retrieving revision 1.1893
retrieving revision 1.1894
diff -u -d -r1.1893 -r1.1894
--- spec.html	5 Mar 2012 05:58:48 -0000	1.1893
+++ spec.html	5 Mar 2012 18:58:44 -0000	1.1894
@@ -365,7 +365,7 @@
     <dt>Editor:</dt>
     <dd><a href="mailto:ian@hixie.ch">Ian Hickson</a>, Google, Inc.</dd>
    </dl><p>This specification is available in the following formats: <a href="spec.html">single page HTML</a>, <a href="Overview.html">multipage HTML</a>, <a href="http://dev.w3.org/html5/spec/">full specification</a>.
-      This is revision 1.5603.</p> 
+      This is revision 1.5604.</p> 
      <p class="copyright"><a href="http://www.w3.org/Consortium/Legal/ipr-notice#Copyright">Copyright</a>
    © 2011 <a href="http://www.w3.org/"><abbr title="World Wide
    Web Consortium">W3C</abbr></a><sup>®</sup> (<a href="http://www.csail.mit.edu/"><abbr title="Massachusetts
@@ -28475,12 +28475,12 @@
    <dd>Same as <code title="">http</code>, except that the message
    body must be decrypted by applying the AES-CTR algorithm using the
    key specified in the URL's <code title="">userinfo</code>
-   component, after unescaping it from the URL syntax to bytes. If
-   there is no such component, or if that component, when unescaped
-   from the URL syntax to bytes, does not consist of exactly 16, 24,
-   or 32 bytes, then the user agent must act as if the resource could
-   not be obtained due to a network error, and may report the problem
-   to the user.</dd>
+   component, after unescaping it from the URL syntax to bytes, and
+   using a zero nonce. If there is no such component, or if that
+   component, when unescaped from the URL syntax to bytes, does not
+   consist of exactly 16, 24, or 32 bytes, then the user agent must
+   act as if the resource could not be obtained due to a network
+   error, and may report the problem to the user.</dd>
    <dt>Encoding considerations:</dt>
    <dd>Same as <code title="">http</code>, but the <code title="">userinfo</code> component represents bytes encoded using
    ASCII and the URL escape mechanism.</dd>
@@ -28526,6 +28526,10 @@
     categorised by an attacker watching network traffic or with access
     to the system hosting the files without the attacker ever having
     to decrypt the "data.json" files.</p>
+    <p>Each resource encrypted in this fashion must use a fresh key.
+    Otherwise, an attacker can use commonalities in the resources'
+    plaintexts to determine the key and decrypt all the resources
+    sharing a key.</p>
     <p>The security considerations that apply to <code title="">http</code> apply as well.</p>
    </dd>
 

Index: spec.preprocessed.html
===================================================================
RCS file: /sources/public/html5/spec-author-view/spec.preprocessed.html,v
retrieving revision 1.732
retrieving revision 1.733
diff -u -d -r1.732 -r1.733
--- spec.preprocessed.html	5 Mar 2012 05:58:58 -0000	1.732
+++ spec.preprocessed.html	5 Mar 2012 18:58:53 -0000	1.733
@@ -381,7 +381,7 @@
     <dt>Editor:</dt>
     <dd><a href="mailto:ian@hixie.ch">Ian Hickson</a>, Google, Inc.</dd>
    </dl><p>This specification is available in the following formats: <a href="spec.html">single page HTML</a>, <a href="Overview.html">multipage HTML</a>, <a href="http://dev.w3.org/html5/spec/">full specification</a>.
-      This is revision 1.5603.</p> 
+      This is revision 1.5604.</p> 
      <p class="copyright"><a href="http://www.w3.org/Consortium/Legal/ipr-notice#Copyright">Copyright</a>
    &#169; 2011 <a href="http://www.w3.org/"><abbr title="World Wide
    Web Consortium">W3C</abbr></a><sup>&#174;</sup> (<a href="http://www.csail.mit.edu/"><abbr title="Massachusetts
@@ -28365,12 +28365,12 @@
    <dd>Same as <code title="">http</code>, except that the message
    body must be decrypted by applying the AES-CTR algorithm using the
    key specified in the URL's <code title="">userinfo</code>
-   component, after unescaping it from the URL syntax to bytes. If
-   there is no such component, or if that component, when unescaped
-   from the URL syntax to bytes, does not consist of exactly 16, 24,
-   or 32 bytes, then the user agent must act as if the resource could
-   not be obtained due to a network error, and may report the problem
-   to the user.</dd>
+   component, after unescaping it from the URL syntax to bytes, and
+   using a zero nonce. If there is no such component, or if that
+   component, when unescaped from the URL syntax to bytes, does not
+   consist of exactly 16, 24, or 32 bytes, then the user agent must
+   act as if the resource could not be obtained due to a network
+   error, and may report the problem to the user.</dd>
    <dt>Encoding considerations:</dt>
    <dd>Same as <code title="">http</code>, but the <code title="">userinfo</code> component represents bytes encoded using
    ASCII and the URL escape mechanism.</dd>
@@ -28416,6 +28416,10 @@
     categorised by an attacker watching network traffic or with access
     to the system hosting the files without the attacker ever having
     to decrypt the "data.json" files.</p>
+    <p>Each resource encrypted in this fashion must use a fresh key.
+    Otherwise, an attacker can use commonalities in the resources'
+    plaintexts to determine the key and decrypt all the resources
+    sharing a key.</p>
     <p>The security considerations that apply to <code title="">http</code> apply as well.</p>
    </dd>
 

Index: iana.html
===================================================================
RCS file: /sources/public/html5/spec-author-view/iana.html,v
retrieving revision 1.606
retrieving revision 1.607
diff -u -d -r1.606 -r1.607
--- iana.html	2 Mar 2012 23:58:29 -0000	1.606
+++ iana.html	5 Mar 2012 18:58:44 -0000	1.607
@@ -704,12 +704,12 @@
    <dd>Same as <code title="">http</code>, except that the message
    body must be decrypted by applying the AES-CTR algorithm using the
    key specified in the URL's <code title="">userinfo</code>
-   component, after unescaping it from the URL syntax to bytes. If
-   there is no such component, or if that component, when unescaped
-   from the URL syntax to bytes, does not consist of exactly 16, 24,
-   or 32 bytes, then the user agent must act as if the resource could
-   not be obtained due to a network error, and may report the problem
-   to the user.</dd>
+   component, after unescaping it from the URL syntax to bytes, and
+   using a zero nonce. If there is no such component, or if that
+   component, when unescaped from the URL syntax to bytes, does not
+   consist of exactly 16, 24, or 32 bytes, then the user agent must
+   act as if the resource could not be obtained due to a network
+   error, and may report the problem to the user.</dd>
    <dt>Encoding considerations:</dt>
    <dd>Same as <code title="">http</code>, but the <code title="">userinfo</code> component represents bytes encoded using
    ASCII and the URL escape mechanism.</dd>
@@ -755,6 +755,10 @@
     categorised by an attacker watching network traffic or with access
     to the system hosting the files without the attacker ever having
     to decrypt the "data.json" files.</p>
+    <p>Each resource encrypted in this fashion must use a fresh key.
+    Otherwise, an attacker can use commonalities in the resources'
+    plaintexts to determine the key and decrypt all the resources
+    sharing a key.</p>
     <p>The security considerations that apply to <code title="">http</code> apply as well.</p>
    </dd>
 

Received on Monday, 5 March 2012 18:59:06 UTC