- From: Bil Corry <bil@corry.biz>
- Date: Mon, 17 May 2010 12:11:14 -0700
- To: "Chandersekaran, Coimbatore Ctr SAF/XCTX" <Coimbatore.Chanderse.ctr@pentagon.af.mil>
- CC: "public-web-security@w3.org" <public-web-security@w3.org>
It's available here:
http://lists.w3.org/Archives/Public/www-archive/2009Dec/att-0048/draft-hodges-strict-transport-sec-06.plain.html
I found the link on the Wikipedia entry:
http://en.wikipedia.org/wiki/Strict_Transport_Security#References
- Bil
Chandersekaran, Coimbatore Ctr SAF/XCTX wrote on 5/17/2010 11:03 AM:
> Could someone send me a copy of STS - 06? I seem to have misplaced it. Thanks.
>
> Coimbatore S Chandersekaran
> Chief Engineer, Distributed Systems and IA,
> USAF CIO Office
> 703-588-6161
> coimbatore.chandersekaran.ctr@pentagon.af.mil
>
> -----Original Message-----
> From: public-web-security-request@w3.org [mailto:public-web-security-request@w3.org] On Behalf Of Deacon, Alex
> Sent: Friday, May 14, 2010 8:24 PM
> To: public-web-security@w3.org
> Subject: VeriSign feedback/comments on STS -06
>
> Jeff and all,
>
> I wanted to send along my feedback/comments on the STS draft (-06).
> VeriSign is supportive of this work and based on my review the draft is
> in pretty good shape already. Great job!
>
>
> 1. Introduction
> ---------------
> * 3rd paragraph: Nit - Replace "Often, UAs provide for users to be able
> to elect to continue..." with "Often, UAs enable users to elect to
> continue..."
>
> * 4th paragraph: Nit - Replace "...to enable web sites and/or users to
> be able to declare that such issues..." with "...to enable web sites
> and/or users to declare that such issues..."
>
> 2.1 Use Cases
> -------------
> * Nit - I would suggest we delete the first sentence of this section.
> i.e. "The overall applicable....."
>
> 2.2 Strict Transport Security Policy Effects
> --------------------------------------------
> * 1st Paragraph: s/wielding/asserting
>
> * Bullet 1.: I assume the intent is that *all* insecure connections
> should be redirected, no? If so I would state that. i.e. "All insecure
> ("http") connections...."
>
> * bullet 2.: Replace "including those caused by a site wielding
> self-signed certificates." with "including those caused sites identified
> using self-signed certificates."
>
> 2.3.1.1 Passive Network Attackers
> ---------------------------------
> * 1st paragraph: Are we concerned about all 'wireless networks"? Or is
> the focus here on unsecured (i.e. non-WEP/WPA/etc) wifi networks? I'm
> not an expert on cellular networks, but are they also a threat in this
> regard? In discussing this internally there was confusion on this
> point until we focused on public hot-spots, be they in starbucks or a
> hotel or a conference center. It may drive home the point if we state
> this scenario specifically.
>
> 5.1 Syntax
> ----------
> * Several example Strict-Transport-Security header values would be
> useful here.
>
> 6.1 HTTP-over-Secure-Transport Request Type
> -------------------------------------------
> * s/Strict-Transport-Sec/Strict-Transport-Security
>
> * Its not clear why the first paragraph of this section states that STS
> Sever *SHOULD* include a Strict-Transport-Security header but then in
> the third paragraph it states the host *MUST* correctly return...at
> least one valid STS header. I would seem to me that if the intent is to
> be conformant to this spec then servers MUST include the STS
> header....no matter what caches and load-balancers may do.
>
> 6.2 HTTP Request Type
> ----------------------
> * 1st paragraph - Why is this requirement a SHOULD? Assuming the term
> "STS Server" means its conformant to this spec, then servers *MUST*
> return a 301.
>
> 7.1 STS Response header Field Processing
> ----------------------------------------
> * Upon receipt of new STS header values for a "Known STS Server" we
> (well perhaps just me) should think about "downgrade/rollback" style
> attacks. For example can "bad things" happen by including or not
> including (over time) the includeSubDomains field? Same goes for the
> max-age values - i.e. is it OK on time t for the max-age to be 90 days,
> and then at time t+5min for the server to specify the max age to 10
> seconds. Its late on a Friday evening, so perhaps there isn't an issue
> here...but I thought I would mention it.
>
> * What does it mean to "ignore" the header (when received over insecure
> transport or if there are syntax issues)? I believe it means we do not
> want the user to be notified with a error dialog but the UA could log a
> warning to the audit trail.
>
> 7.2 URI Loading
> ---------------
> * I don't see any normative words in this paragraph. Looks like we
> want to change the last sentence to "....then UA's MUST replace the URI
> scheme with "https" before proceeding with the load."
>
> 7.3 Errors in Secure Transport Establishment
> --------------------------------------------
> * This may be overstepping the bounds of this spec, but we should
> discuss outlining some "best practices" from a UX point of view. What
> exactly does it mean to terminate the connection with no user recourse?
>
>
> 9 Server Implementation Advice
> ------------------------------
> * Second bullet: replace "site wielding that organization's
> certificate," with "site identifying itself using a self-signed
> certificate, then secure ...."
>
>
>
>
>
>
>
>
>
>
>
Received on Monday, 17 May 2010 19:11:58 UTC