- From: Anders Rundgren <anders.rundgren.net@gmail.com>
- Date: Tue, 17 May 2016 06:03:58 +0200
- To: jeff.hodges@kingsmountain.com, W3C WebAppSec WG <public-webappsec@w3.org>
On 2016-05-16 16:27, jeff.hodges@kingsmountain.com wrote: > In case other(s) might find this useful.. Jeff, I can just reiterate my request for TAG or WebAppSec looking into native app access. IMO it is a serious mistake mixing in-browser extensions (like Chrome extensions) with schemes for accessing native applications from the Web: https://www.w3.org/community/browserext Why is that? Because the use-cases and security implications are entirely different. Anders > > WebAppSec WG > Mid-Year F2F 05/16-17 > > > Day 1: 16-May-2016 / 9:00 AM - 5:00 PM > Mozilla HQ, 331 E. Evelyn Ave Mountain View, CA > > ATTENDEES > Dan Veditz, Mike West, Brad Hill, Francois Marier, Deian Stefan, Richard > Barnes, Emily Stark, Joel Weinberger, Devdatta Akhawe, Tanvi Vyas, Wendy > Seltzer, John Wilander, Frederik Braun, Arthur Janc, Jeff Hodges, Daniel > Bates, Chris Palmer, Raymes Khoury > > Regrets > > > 09:00 - 09:30 Welcome, introductions > 09:30 - 10:30 CSP2 Feedback from Apple (Daniel Bates) > 10:30 - 11:15 Secure Contexts and related > > * Spec status update (Mike West) > > * Synchronized Security State Between Tabs (John Wilander) > > * Currently, failed security checks (cert validity, mixed > content …) in one tab/window do not affect other tabs under the same > origin. However, a compromise of one tab can harm other tabs since > stateful mechanisms such as cookies and local storage are shared per > origin. We would like to discuss synchronized security state, for > instance removing padlocks for all open tabs under an origin if any tab > under that origin loses its padlock. This of course raises the question > "Has this origin ever lost its padlock?" and whether that should affect > security status and stateful mechanisms. > > * Disallow Mixed Trust for Extended Validation (John Wilander) > > * The rules for being granted the Extended Validation (EV) “green > bar” are fairly lax. You pay a CA, they check your identity, and then > browsers signal to users that this is trusted content. We would like to > discuss the issue of mixed trust where content is loaded from servers > with a variety of identities and certificates. EV rules could for > instance be restricted in three steps: > > * Start with console warnings of mixed trust and evangelize > the upcoming change in policy. > * Deny EV treatment for mixed EV+non-EV content. > * Deny EV treatment for mixed EV content. I.e. only display > the green bar if all content is EV and from the same organization. > * This discussion needs to be synched with the CAB Forum down > the road. > > > 11:15 - 12:00 CORS and private IP address ranges > (from Mike West, Crispin Cowan) > https://mikewest.github.io/cors-rfc1918/ > > Modifications to Fetch which are intended to mitigate the risks > associated with unintentional exposure of devices and servers on a > client’s internal network to the web at large. > > 12:00 - 13:00 Lunch > > 13:00 - 14:00 Guest speaker: Zach Tollman from Wired: Implementer report > on adopting HTTPS > > > > 14:00 - 15:45 Permissions in Context (3 major related topics) > > Permission Delegation to Iframes + CSP embedded enforcement (from > Chris Palmer and Raymes Khoury) > > * https://noncombatant.github.io/permission-delegation-api/ > * > https://docs.google.com/document/d/1iaocsSuVrU11FFzZwy7EnJNOwxhAHMroWSOEERw5hO0/edit > * > https://lists.w3.org/Archives/Public/public-webappsec/2016Apr/0041.html > * > https://lists.w3.org/Archives/Public/public-webappsec/2016Mar/thread.html#msg34 > * https://w3c.github.io/webappsec-csp/embedded/ > > > Secure Context Components (from John Wilander) > > The Secure Contexts spec could become an effective way to allow > privileged execution in the browser. We’d like to discuss whether Secure > Contexts could have “components" so that privileged APIs could require > (named?) subsets of them. Specifically, we’d like to discuss the > following concepts as such components, in no particular order: > > * No mixed trust (across EV/non-EV/insecure context “same-origin” > frames/tabs) > * Only subresources from associated domains as discussed above. > * Signed web app as discussed above. > * CSP in place without unsafe options. > * Subresource Integrity for all applicable subresources. > * Token binding in place > (https://tools.ietf.org/html/draft-ietf-tokbind-protocol-05). > > > Feature Policy > https://igrigorik.github.io/feature-policy/ > > > > 15:45 - 17:00 Survey of current WebAppSec Portfolio (from Mike West and > Brad Hill) > * What are the priorities of in-flight work? > * What things have highest interest by user agent implementers? Are > there things unlikely to see interoperable implementations? > * Do we have room for new areas of work? > * What threat models are we targeting? > * Signed Web Apps proposed work area by Apple > * HSTS priming > > > > > AGENDA - Definite topics > * Suborigins > * Subresource Integrity > * COWL > > > AGENDA - Potential topics > * Report from Web Authentication WG > * Referrer Policy > * UI Security / VisibilityObserver > > > > > Day 2: 17-May-2016 / 9:00 AM - 5:00 PM / Mozilla HQ, Mountain View, CA > > ATTENDEES > Dan Veditz, Mike West, Brad Hill, Francois Marier, Deian Stefan, Richard > Barnes, Emily Stark, Joel Weinberger, Devdatta Akhawe, Tanvi Vyas, Wendy > Seltzer, Frederik Braun, Jeff Hodges, John Wilander > > Regrets > > > 09:00 - 10:30 > > > 10:30 - 11:00 CSP 3 ‘unsafe-dynamic’ and ‘unsafe-hash-attributes’ > proposals (Mike West) > > > 11:00 - 12:00 Credential Management (Mike West) and report on the work > of the Web Authentication WG / FIDO (Jeff Hodges) > > > 12:00 - 13:00 Lunch > > > 13:30 - 14:30 WebAppSec and the IETF > > * Report on work in-flight at IETF today. (Cookie policy by Mike West) > > * Proposals which are on the border between these organizations: > > * Restrict Accept, Content-Language, and Accept-Language (from > John Wilander) > * Some standard request headers are currently not very > restricted in what characters they can contain, for instance Accept, > Content-Language, and Accept-Language. It varies between browsers but > those three have few restrictions. Looking at RFC 2616 (HTTP 1.1) and > the Header Field Definitions > (http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.1) one > gets the impression that the named headers are validated by the browser > according to the grammar but they’re not. > > * Supposedly, browser vendors settled years ago on the more > relaxed Ajax spec which refers to field-value production, specified in > RFC 2616, Section 4.2: > http://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.2. A general > web client that wants to be standards compliant will use the headers > spec to restrict its values and a defensive server will use the spec for > input validation. But browsers are not restricting these headers very > much (at least not the last time I checked). > > * Since they are standard headers they can be set in > non-preflight CORS requests and potentially trigger bad behavior > server-side, including payloads for vulnerabilities like Shellshock. > > * Some other working group might be the right place but we > wanted to start this discussion in WebAppSec. > > > * Associated Domains (from John Wilander) (Jeff Hodges can > discuss DBOUND work at IETF which is related) > > * The technical notion of cross-origin differs significantly > from the notion of ownership and control of domain names. A few examples > are {apple.com, icloud.com, filemaker.com}, {google.com, google.ru, > youtube.com, gmail.com}, {facebook.com, instagram.com, facebook.net}, > {microsoft.com, xbox.com, microsoftstore.com} and {mozilla.com, > firefox.com}. Single sign-on, subresource integration, and user agent > tracking is arguably very different within one of these sets than across > them. If we could come up with a standardized way to state and validate > associated domains we could enforce better cross-origin policies. > > > 14:30-17:00 Spec updates on SRI, Suborigins and COWL, AOB > > * SRI > * Require-sri-for > * Integrity for downloads > * Cross-origin caching > * Other v2 features? > * Of note: https://martinthomson.github.io/http-mice/ (Merkle > Integrity Content Encoding) > > * Suborigins > * Cookies > > * COWL > * Welcome new editor Niklas Andréasson > * ServiceWorkers and Push > > > > > > > end > > >
Received on Tuesday, 17 May 2016 04:04:30 UTC