Re: HSTS preload flaw

Rob Sayre <sayrer@gmail.com> Mon, 10 February 2020 07:02 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3382612008D for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 9 Feb 2020 23:02:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.749
X-Spam-Level:
X-Spam-Status: No, score=-2.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x9CV9KMO3Ax7 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 9 Feb 2020 23:02:25 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FEA5120077 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 9 Feb 2020 23:02:25 -0800 (PST)
Received: from lists by lyra.w3.org with local (Exim 4.92) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1j131Z-00089o-TB for ietf-http-wg-dist@listhub.w3.org; Mon, 10 Feb 2020 06:58:29 +0000
Resent-Date: Mon, 10 Feb 2020 06:58:29 +0000
Resent-Message-Id: <E1j131Z-00089o-TB@lyra.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by lyra.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <sayrer@gmail.com>) id 1j131T-000893-Gc for ietf-http-wg@listhub.w3.org; Mon, 10 Feb 2020 06:58:23 +0000
Received: from mail-il1-x144.google.com ([2607:f8b0:4864:20::144]) by titan.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from <sayrer@gmail.com>) id 1j131R-0008MA-9V for ietf-http-wg@w3.org; Mon, 10 Feb 2020 06:58:23 +0000
Received: by mail-il1-x144.google.com with SMTP id t17so4799648ilm.13 for <ietf-http-wg@w3.org>; Sun, 09 Feb 2020 22:58:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WmYC+Gyi0uf14dPGqG2SS/wXt/a/fIjRnFOmJC9igAA=; b=NwcZCRLjCPBErduAt1z9dYgKNl19hccX2aef2UnJrG2wOs+LqxTyQYGPcA91icVmno oupAweuWU/vABMcYSnbJkaKUtFlFzXPqQzugmcDAygKW6sC/663QHsWYzKL0vkq1UWKW lAe0gJbX5zIg9sYNAXgSV8fQNDllct6N025v5Dss115l9v1mtYnsMPCkzSmrSnWaPMrS QJjX7+TxDcloMH1fwaCVE573oZFLiy3tPLJXH77UFjtx8XUzhL0Mid7VtDVluZF98s32 x72Msno1fPjVhf5H1iox7RPaY7h0LkAdUqmXVKa22/1wcru8uMOhWl0rlqkGd2j4STUQ E7CQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WmYC+Gyi0uf14dPGqG2SS/wXt/a/fIjRnFOmJC9igAA=; b=FhCyu04BrBoXN1u4P8mwvJ7iCZvWL6VBv2tHxH27crPKC6wwFSFLVND9ZLjRVZdVX+ SLRLggGm+vyUfcKIIFfeGZk+G8d+wONDs55Y+UWrvncq23SKUaiuAJdqY4FH3vg9rL7f FLXZomy8rPpjX5N+xuvqpqzFgGHht1zjiKPJtASnu+cVe8OwRAu2FuL4XFVd6MzOEPEG E+C+FJrQHsAeMHWYFXXUykpUgVWg+9K7zBZuRnB2i2VDaM3H2Pr4qtXGboW/K2MUHJ/T ppPiqtCV8Tvx2H+brQOKeZZnJMTjjg/RRRcwB5h3+iwQrOMldFueDNjEf3mFEXEU7Brk V56g==
X-Gm-Message-State: APjAAAVpOo3Gk4rhaAVjB1ZjB0Papb4oE+Ha5Ct4IB5vYiB7kqZaz2aQ uppRbBwukJNmC1yYX/AgBfZOJEiz7V42+ssPh9WuPUSZ
X-Google-Smtp-Source: APXvYqz9UTS8DMXILOkekVVurYuly7XdlL10mVc7/Lw9EbL3C+d0RHFPnRTQAjl3Ha3h695cWTek3p9tJl8I2R7AQRk=
X-Received: by 2002:a92:990b:: with SMTP id p11mr59919ili.254.1581317900041; Sun, 09 Feb 2020 22:58:20 -0800 (PST)
MIME-Version: 1.0
References: <CAChr6Syfo-XpN0i4O0==G29KJ22oCvq+X_nbjgq8aAhtCR7BzA@mail.gmail.com> <A0F7BEB8-C236-429B-94F7-C2F748FDD70C@bzfx.net> <CAChr6SyG56wDh=EvEmMUzOfK5YWP3yhrQkXpmWx9MYe9BsghSw@mail.gmail.com> <2F2F0B6A-8FD5-459E-9395-FD0437A9E946@bzfx.net> <CACMfZd_iPqj5Q1=NE9zi_uQV5UsXQeVb818vxgQzHsSJ8m3SBw@mail.gmail.com> <4E5E865B-27E8-4933-B413-29494817246F@bzfx.net>
In-Reply-To: <4E5E865B-27E8-4933-B413-29494817246F@bzfx.net>
From: Rob Sayre <sayrer@gmail.com>
Date: Sun, 09 Feb 2020 22:58:08 -0800
Message-ID: <CAChr6Sz6ckL4u_4X=sTmt27E2mswTjjq=GcqSsRuFOEzn_iM-Q@mail.gmail.com>
To: Austin William Wright <aaa@bzfx.net>
Cc: Eric Mill <eric@konklone.com>, "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="000000000000b584fa059e3343d9"
Received-SPF: pass client-ip=2607:f8b0:4864:20::144; envelope-from=sayrer@gmail.com; helo=mail-il1-x144.google.com
X-W3C-Hub-Spam-Status: No, score=-4.0
X-W3C-Hub-Spam-Report: BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, TXREP=-1.348, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1j131R-0008MA-9V 6779562b9ef527193d334682969d611f
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HSTS preload flaw
Archived-At: <https://www.w3.org/mid/CAChr6Sz6ckL4u_4X=sTmt27E2mswTjjq=GcqSsRuFOEzn_iM-Q@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/37349
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Sun, Feb 9, 2020 at 10:28 PM Austin William Wright <aaa@bzfx.net> wrote:

>
> It seems to me if an attacker can get a victim to compose a sensitive
> request, but direct that request to an attacker-controlled scheme and port,
> why not an attacker-controlled host too, or any host not on an HSTS Preload
> list?
>

That's a fair question. Intercepting a single unencrypted innocuous request
is a viable way to get the victim to compose requests to
attacker-controlled servers over TLS. These hosts might not be legitimate,
but users won't always notice a discrepancy in domain names. Here is a toy
attack:

Serve a search engine UI, but pop up an "Accept Cookies" UI that is
seemingly intended to comply with privacy regulations. In response to a
click on any choice presented, redirect to an attack-controlled domain
(that might be served over TLS, with a misleading domain name).

thanks,
Rob