Re: HSTS Fingerprinting.

John Wilander <wilander@apple.com> Tue, 01 October 2019 15:37 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 448EE12095C for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 1 Oct 2019 08:37:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level:
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (body has been altered)" header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id isJPzWBdkDYX for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 1 Oct 2019 08:37:26 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [IPv6:2603:400a:ffff:804:801e:34:0:38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DC0F1208DF for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 1 Oct 2019 08:37:26 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.89) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1iFKAy-0002TC-9a for ietf-http-wg-dist@listhub.w3.org; Tue, 01 Oct 2019 15:34:56 +0000
Resent-Date: Tue, 01 Oct 2019 15:34:56 +0000
Resent-Message-Id: <E1iFKAy-0002TC-9a@frink.w3.org>
Received: from uranus.w3.org ([128.30.52.58]) by frink.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <wilander@apple.com>) id 1iFKAx-0002SZ-9o for ietf-http-wg@listhub.w3.org; Tue, 01 Oct 2019 15:34:55 +0000
Received: from www-data by uranus.w3.org with local (Exim 4.89) (envelope-from <wilander@apple.com>) id 1iFKAw-0007bt-VB for ietf-http-wg@listhub.w3.org; Tue, 01 Oct 2019 15:34:55 +0000
Received: from titan.w3.org ([2603:400a:ffff:804:801e:34:0:4c]) by frink.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <wilander@apple.com>) id 1iFK9n-0002NJ-03 for ietf-http-wg@listhub.w3.org; Tue, 01 Oct 2019 15:33:43 +0000
Received: from nwk-aaemail-lapp01.apple.com ([17.151.62.66]) by titan.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <wilander@apple.com>) id 1iFK9l-0007KS-EM for ietf-http-wg@w3.org; Tue, 01 Oct 2019 15:33:42 +0000
Received: from pps.filterd (nwk-aaemail-lapp01.apple.com [127.0.0.1]) by nwk-aaemail-lapp01.apple.com (8.16.0.27/8.16.0.27) with SMTP id x91FRUgv016497; Tue, 1 Oct 2019 08:33:13 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : content-type : content-transfer-encoding : from : mime-version : subject : date : message-id : references : cc : in-reply-to : to; s=20180706; bh=ocED2RSu7p7wERIPYeJBQ/NbQ5te5/WdkcQwII2+5OM=; b=hjje8zewIkrrWOSuOTXWxqFYRqObc88rkt2L8vZAV02Vc3Ba+cwwoMuQUd54Om6sOAK8 zlwQNRkmmVfcLVDZGACTo2qabDZz4SuTpuelniPYPVFWcOMHFVqKv8gkSltqImDR4CYo btK7Ur0wSYiPLIkZPq5begjRnRkeEjMdF/JZ3SWHVUmdFOxsRgIwu6wWNHQzJdtDLbO2 h1u3ZasXG2KkSLlUI0Oz1pdNOEUnzu/UHbEoGedWiv79iBZhVzeJHMmUwmIJhfXhdv4c oL8WKAHP/jku2bl/x1q+p3hpna/oMwcdAs/8YDmTjnCUJNY0/2Lw+iUZTle5HA+3RM79 IQ==
Received: from mr2-mtap-s01.rno.apple.com (mr2-mtap-s01.rno.apple.com [17.179.226.133]) by nwk-aaemail-lapp01.apple.com with ESMTP id 2va6f1kdhd-4 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 01 Oct 2019 08:33:13 -0700
Received: from nwk-mmpp-sz10.apple.com (nwk-mmpp-sz10.apple.com [17.128.115.122]) by mr2-mtap-s01.rno.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0PYP00FBVCJDUB40@mr2-mtap-s01.rno.apple.com>; Tue, 01 Oct 2019 08:33:13 -0700 (PDT)
Received: from process_milters-daemon.nwk-mmpp-sz10.apple.com by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0PYP00H00C64R700@nwk-mmpp-sz10.apple.com>; Tue, 01 Oct 2019 08:33:13 -0700 (PDT)
X-Va-CD: 0
X-Va-ID: 1ff7cc1f-4dcc-4041-a591-6d294921e2e0
X-V-A:
X-V-T-CD: 454c4103d4b53eae49633cb385ebfbae
X-V-E-CD: 52e03201b0fa5b01af7ff830d36d48dd
X-V-R-CD: 03fc6684ebf0ddf0cbdf7156fb4a456f
X-V-CD: 0
X-V-ID: 101a7dc2-ed4c-441d-b89c-d174f138a22c
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-10-01_08:,, signatures=0
Received: from [17.234.32.25] (unknown [17.234.32.25]) by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0PYP00193CJCFC50@nwk-mmpp-sz10.apple.com>; Tue, 01 Oct 2019 08:33:13 -0700 (PDT)
Sender: wilander@apple.com
Content-type: multipart/alternative; boundary="Apple-Mail-2E8C4D7F-C1E1-49F3-A4C9-725DD1332BD6"
Content-transfer-encoding: 7bit
From: John Wilander <wilander@apple.com>
MIME-version: 1.0 (1.0)
Date: Tue, 01 Oct 2019 08:33:11 -0700
Message-id: <24876C29-1E4B-40A0-BB78-C86A5A5D8C36@apple.com>
References: <CAKXHy=cTSHvkt1Tj6imt2=2begaO-RXcioj-8xiu=zi0-KjU0g@mail.gmail.com>
Cc: HTTP Working Group <ietf-http-wg@w3.org>, Mark Nottingham <mnot@mnot.net>, Jeff Hodges <jdhodges@google.com>
In-reply-to: <CAKXHy=cTSHvkt1Tj6imt2=2begaO-RXcioj-8xiu=zi0-KjU0g@mail.gmail.com>
To: Mike West <mkwst@google.com>
X-Mailer: iPhone Mail (17B5059e)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-10-01_08:, , signatures=0
Received-SPF: pass client-ip=17.151.62.66; envelope-from=wilander@apple.com; helo=nwk-aaemail-lapp01.apple.com
X-W3C-Hub-Spam-Status: No, score=-9.1
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_IRR=-3, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1iFK9l-0007KS-EM 4c7f3940b7fd1b06b2a3e9fae80fbbcd
X-caa-id: 45d08787bc
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HSTS Fingerprinting.
Archived-At: <https://www.w3.org/mid/24876C29-1E4B-40A0-BB78-C86A5A5D8C36@apple.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/37037
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hi!

Just to be clear, what we saw in the wild was not HSTS fingerprinting but rather using HSTS as a deliberate stateful tracking vector. Maybe if sites were probing the dynamic HSTS cache in general could it be called fingerprinting but I try to reserve that term for stateless tracking.

   Regards, John

> On Oct 1, 2019, at 6:51 AM, Mike West <mkwst@google.com> wrote:
> 
> 
> Ping!
> 
> If this group doesn't feel any particular ownership, I'm happy to try to define some web browsery behavior in W3C/WHATWG. If y'all would prefer an RFC6797bis, great!
> 
> -mike
> 
> 
>> On Wed, Sep 18, 2019 at 3:10 AM Mike West <mkwst@google.com> wrote:
>> A year or two ago, +John Wilander and others at Apple proposed some changes to HSTS in https://webkit.org/blog/8146/protecting-against-hsts-abuse/ that went some way towards mitigating the abuses documented in Section 14.9 of RFC6797. Given some shifts in the way we're thinking about some other concepts, I've written up a short proposal at https://github.com/mikewest/strict-navigation-security that builds upon and simplifies Apple's proposal. We discussed it briefly at yesterday's webappsec meeting, and there seems to be interest in doing something in this space.
>> 
>> +Mark Nottingham and +Jeff Hodges suggested that I loop this group into that conversation, as the original websec group has disbanded. Is it a topic this group would like to pick up? If not, would y'all be comfortable with us defining some web browser behavior/Fetch integration in webappsec that constrains the existing RFC?
>> 
>> Thanks!
>> 
>> -mike