Re: HSTS preload flaw

Eric Mill <eric@konklone.com> Mon, 10 February 2020 03:24 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F7B812008F for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 9 Feb 2020 19:24:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.749
X-Spam-Level:
X-Spam-Status: No, score=-2.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=konklone.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hm5WVmkZG2G1 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 9 Feb 2020 19:24:15 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F6F8120041 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 9 Feb 2020 19:24:14 -0800 (PST)
Received: from lists by lyra.w3.org with local (Exim 4.92) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1j0zck-0004gH-Vh for ietf-http-wg-dist@listhub.w3.org; Mon, 10 Feb 2020 03:20:39 +0000
Resent-Date: Mon, 10 Feb 2020 03:20:38 +0000
Resent-Message-Id: <E1j0zck-0004gH-Vh@lyra.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by lyra.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <eric@konklone.com>) id 1j0zcg-0004f7-2M for ietf-http-wg@listhub.w3.org; Mon, 10 Feb 2020 03:20:34 +0000
Received: from mail-ed1-x52a.google.com ([2a00:1450:4864:20::52a]) by titan.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from <eric@konklone.com>) id 1j0zca-0003cX-7p for ietf-http-wg@w3.org; Mon, 10 Feb 2020 03:20:33 +0000
Received: by mail-ed1-x52a.google.com with SMTP id dc19so6935367edb.10 for <ietf-http-wg@w3.org>; Sun, 09 Feb 2020 19:20:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=konklone.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=e7/YtLqIkMlL/04/Cx2c04D/Mu20DLLY7SNS80MJdNg=; b=TXjxjmoXN93JR0zLQDNRwjNekTXBx3MhHV0JJaxfU8sfZDxRO0m8uxuqoj9cYAwIJK WFMUBcUIQ4d1ujDnCJCKv0mEvDMeGcJB0UhxJC6Fuu2TsppCpKDZ8TBVQVHiGBZt7U1Q esgqVlt1NfNOelr1urbaGj7w8/0WKFWORGOxZbb46uwsuxbaBdr9Hx50zyGpI2BKZJ9i 3HvuCE/aIfxXsB+42ox5bD0nUkQBh2I/B4ou2IOshwSsD7PSzKjiYgwwIQul2jjo1HEO ivd8VLetOsCafiithuyS3+lhoecoD82gITTJRXbK4O7cL3apUclYUdAdUTzMxcXWRHuy yYGg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=e7/YtLqIkMlL/04/Cx2c04D/Mu20DLLY7SNS80MJdNg=; b=i9cSmOJsYYm/VRjTXq7c6lh+YsZAlQPPmiiDLmo8t0MeeCcXXj/DyliDO6x//vB8/G RvKzSmQtpSZaODcbMCW7tueYJCdd4Coc6O6H+WcbjqTyG9lJ9QO3urGM2JTU6/U7KOMT fLoD7+WilaVvbQRQ/Ni7jskHzUqcCeL4rpynE2sahNxdDhFmIO8UsYogsJP0nfoHQOlW P6scH2fT+siVvcBPSxxBRk6eTHRbocrruWuuR40eJZJSbonPu7iCrK97SPA1dZQXQ2ME bulTv58JkBhcm2eImxtPcayt+SzBBnh3E9TFq+ILN1Jx8acmYq2YT1dZE/+twmVjd+bF 7AjA==
X-Gm-Message-State: APjAAAVKzmf0BM6uZK034A51bcAOt3umTvOub1Ys1hNARyAu7U+HTNAv n/eAp/PeFHtDNs/2OITnIEY0oN1hHEqQrhd/0qskGQ==
X-Google-Smtp-Source: APXvYqzNr0HmomTyj4x6IvCRvkTXGPxV4e20rxeY6FnLkh6zJgmyDSYkdnieTXqj9KQ1k5D0oiDvxB7+gVZD6Uq1VLA=
X-Received: by 2002:a17:906:1d50:: with SMTP id o16mr9428363ejh.111.1581304825183; Sun, 09 Feb 2020 19:20:25 -0800 (PST)
MIME-Version: 1.0
References: <CAChr6Syfo-XpN0i4O0==G29KJ22oCvq+X_nbjgq8aAhtCR7BzA@mail.gmail.com> <A0F7BEB8-C236-429B-94F7-C2F748FDD70C@bzfx.net> <CAChr6SyG56wDh=EvEmMUzOfK5YWP3yhrQkXpmWx9MYe9BsghSw@mail.gmail.com> <2F2F0B6A-8FD5-459E-9395-FD0437A9E946@bzfx.net>
In-Reply-To: <2F2F0B6A-8FD5-459E-9395-FD0437A9E946@bzfx.net>
From: Eric Mill <eric@konklone.com>
Date: Sun, 09 Feb 2020 22:19:50 -0500
Message-ID: <CACMfZd_iPqj5Q1=NE9zi_uQV5UsXQeVb818vxgQzHsSJ8m3SBw@mail.gmail.com>
To: Austin Wright <aaa@bzfx.net>
Cc: Rob Sayre <sayrer@gmail.com>, "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="00000000000063106a059e303843"
Received-SPF: pass client-ip=2a00:1450:4864:20::52a; envelope-from=eric@konklone.com; helo=mail-ed1-x52a.google.com
X-W3C-Hub-Spam-Status: No, score=-4.9
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, TXREP=0.176, W3C_AA=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1j0zca-0003cX-7p 65bb69f64ee8a5b29ebe4463618afb26
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HSTS preload flaw
Archived-At: <https://www.w3.org/mid/CACMfZd_iPqj5Q1=NE9zi_uQV5UsXQeVb818vxgQzHsSJ8m3SBw@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/37347
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Sun, Feb 9, 2020 at 6:51 PM Austin Wright <aaa@bzfx.net> wrote:

> If encrypted connections are important to you as a server operator, it
> seems the only foolproof way to avoid plaintext communication is don’t
> listen on port 80.
>

Without getting into the overall issue, I just want to note for readers of
the thread - server operators can't avoid plaintext communication by
clients by not listening on port 80. Clients can attempt to initiate a
connection to a hostname over port 80 whether or not the "real" server is
listening on port 80, and that connection can be interfered with by a
malicious network actor. That's why HSTS exists - to provide some kind of
signal to the client that they should never bother even trying to make that
connection.