- From: Bil Corry <bil@corry.biz>
- Date: Mon, 17 May 2010 12:11:14 -0700
- To: "Chandersekaran, Coimbatore Ctr SAF/XCTX" <Coimbatore.Chanderse.ctr@pentagon.af.mil>
- CC: "public-web-security@w3.org" <public-web-security@w3.org>
It's available here: http://lists.w3.org/Archives/Public/www-archive/2009Dec/att-0048/draft-hodges-strict-transport-sec-06.plain.html I found the link on the Wikipedia entry: http://en.wikipedia.org/wiki/Strict_Transport_Security#References - Bil Chandersekaran, Coimbatore Ctr SAF/XCTX wrote on 5/17/2010 11:03 AM: > Could someone send me a copy of STS - 06? I seem to have misplaced it. Thanks. > > Coimbatore S Chandersekaran > Chief Engineer, Distributed Systems and IA, > USAF CIO Office > 703-588-6161 > coimbatore.chandersekaran.ctr@pentagon.af.mil > > -----Original Message----- > From: public-web-security-request@w3.org [mailto:public-web-security-request@w3.org] On Behalf Of Deacon, Alex > Sent: Friday, May 14, 2010 8:24 PM > To: public-web-security@w3.org > Subject: VeriSign feedback/comments on STS -06 > > Jeff and all, > > I wanted to send along my feedback/comments on the STS draft (-06). > VeriSign is supportive of this work and based on my review the draft is > in pretty good shape already. Great job! > > > 1. Introduction > --------------- > * 3rd paragraph: Nit - Replace "Often, UAs provide for users to be able > to elect to continue..." with "Often, UAs enable users to elect to > continue..." > > * 4th paragraph: Nit - Replace "...to enable web sites and/or users to > be able to declare that such issues..." with "...to enable web sites > and/or users to declare that such issues..." > > 2.1 Use Cases > ------------- > * Nit - I would suggest we delete the first sentence of this section. > i.e. "The overall applicable....." > > 2.2 Strict Transport Security Policy Effects > -------------------------------------------- > * 1st Paragraph: s/wielding/asserting > > * Bullet 1.: I assume the intent is that *all* insecure connections > should be redirected, no? If so I would state that. i.e. "All insecure > ("http") connections...." > > * bullet 2.: Replace "including those caused by a site wielding > self-signed certificates." with "including those caused sites identified > using self-signed certificates." > > 2.3.1.1 Passive Network Attackers > --------------------------------- > * 1st paragraph: Are we concerned about all 'wireless networks"? Or is > the focus here on unsecured (i.e. non-WEP/WPA/etc) wifi networks? I'm > not an expert on cellular networks, but are they also a threat in this > regard? In discussing this internally there was confusion on this > point until we focused on public hot-spots, be they in starbucks or a > hotel or a conference center. It may drive home the point if we state > this scenario specifically. > > 5.1 Syntax > ---------- > * Several example Strict-Transport-Security header values would be > useful here. > > 6.1 HTTP-over-Secure-Transport Request Type > ------------------------------------------- > * s/Strict-Transport-Sec/Strict-Transport-Security > > * Its not clear why the first paragraph of this section states that STS > Sever *SHOULD* include a Strict-Transport-Security header but then in > the third paragraph it states the host *MUST* correctly return...at > least one valid STS header. I would seem to me that if the intent is to > be conformant to this spec then servers MUST include the STS > header....no matter what caches and load-balancers may do. > > 6.2 HTTP Request Type > ---------------------- > * 1st paragraph - Why is this requirement a SHOULD? Assuming the term > "STS Server" means its conformant to this spec, then servers *MUST* > return a 301. > > 7.1 STS Response header Field Processing > ---------------------------------------- > * Upon receipt of new STS header values for a "Known STS Server" we > (well perhaps just me) should think about "downgrade/rollback" style > attacks. For example can "bad things" happen by including or not > including (over time) the includeSubDomains field? Same goes for the > max-age values - i.e. is it OK on time t for the max-age to be 90 days, > and then at time t+5min for the server to specify the max age to 10 > seconds. Its late on a Friday evening, so perhaps there isn't an issue > here...but I thought I would mention it. > > * What does it mean to "ignore" the header (when received over insecure > transport or if there are syntax issues)? I believe it means we do not > want the user to be notified with a error dialog but the UA could log a > warning to the audit trail. > > 7.2 URI Loading > --------------- > * I don't see any normative words in this paragraph. Looks like we > want to change the last sentence to "....then UA's MUST replace the URI > scheme with "https" before proceeding with the load." > > 7.3 Errors in Secure Transport Establishment > -------------------------------------------- > * This may be overstepping the bounds of this spec, but we should > discuss outlining some "best practices" from a UX point of view. What > exactly does it mean to terminate the connection with no user recourse? > > > 9 Server Implementation Advice > ------------------------------ > * Second bullet: replace "site wielding that organization's > certificate," with "site identifying itself using a self-signed > certificate, then secure ...." > > > > > > > > > > >
Received on Monday, 17 May 2010 19:11:58 UTC