Re: Alissa Cooper's No Objection on draft-ietf-httpbis-expect-ct-07: (with COMMENT)

Emily Stark <estark@google.com> Sat, 10 November 2018 19:37 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26678128CE4 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 10 Nov 2018 11:37:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.251
X-Spam-Level:
X-Spam-Status: No, score=-10.251 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m4XPcDge6wOZ for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 10 Nov 2018 11:37:35 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [IPv6:2603:400a:ffff:804:801e:34:0:38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F0621286D9 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sat, 10 Nov 2018 11:37:34 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.89) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1gLZ1t-00061g-6G for ietf-http-wg-dist@listhub.w3.org; Sat, 10 Nov 2018 19:34:49 +0000
Resent-Date: Sat, 10 Nov 2018 19:34:49 +0000
Resent-Message-Id: <E1gLZ1t-00061g-6G@frink.w3.org>
Received: from mimas.w3.org ([2603:400a:ffff:804:801e:34:0:4f]) by frink.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <estark@google.com>) id 1gLZ1q-00060z-Ht for ietf-http-wg@listhub.w3.org; Sat, 10 Nov 2018 19:34:46 +0000
Received: from mail-yb1-xb2f.google.com ([2607:f8b0:4864:20::b2f]) by mimas.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.89) (envelope-from <estark@google.com>) id 1gLZ1p-0000jk-7Y for ietf-http-wg@w3.org; Sat, 10 Nov 2018 19:34:46 +0000
Received: by mail-yb1-xb2f.google.com with SMTP id i78-v6so2460281ybg.0 for <ietf-http-wg@w3.org>; Sat, 10 Nov 2018 11:34:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=EwVUjwUXzXZXq1ieDawSDCzlSwktpHUpwA/u3sshVIo=; b=ooRbR7kM6R8z2w363k/iY1grvBLZpQWiJfSfCg3P7u6fcbUjBCxSALoGA+1LXvJvKL XpG+IpMPdiBEanEzYkeMWIyzoFZuyVjtrTLehAfVkGzjcHodStVOs7Ldtsqd7EoQ2HqU LLTMsGjGtBBI7xVDsCScs+jjgqtftfNXaCHDyf0yCUQdeJs4VA2aqI0Vf0ZF9B7/Z0Sz mSG/JH/g1cUT+krf+dMdlNADmXClJuG9URQuvnETJLs4fEenx0NrxEOiy8ji+6oOxwd5 HpZFpb9S0rHabtqt69bYF5APqB45/DO6+0sSypz5Wpn+H6vscTYgwcjy+R4GYXqVJ41/ YpAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=EwVUjwUXzXZXq1ieDawSDCzlSwktpHUpwA/u3sshVIo=; b=SkqV7n8SJx8qShPIOXp6YwLWkOyQEIBD8sBTqZdHWfOkVw8vGSV7aJ3Iiuf2XB1TIT i7GYnzQe77TiaNpZ29Ra+ir/xCM1KdY8M422hrdfrOc11oMaLbTaCB+rrzQf24je5VIk h4ofG8Thp8QheD4J313TEtm5ijapYts2Myv5h/VCHZB3ZX0UvwmTwK/7YJdyONRxqm2O JmiEp5QTvGQAH+YqpmjQvP/Yc75PGIdazAVt4RbDuQC6+yQE9LBRNjLc4rPZ3Y+8zoh7 IeEA7VkhVLVWa++nNGnbJahkQKeplvhpEBJk2M0ULU81zTXaxzagcFMT3hcma5oqkZoW xFRw==
X-Gm-Message-State: AGRZ1gJJlnVJt7HDpi/ir7fWdFpI9lEO6TCdEUcuzb29aF93Kh3RvUIW Yfo6oVu/NCC5TgGo0rP84AyWJEJwhQufBS9KQhY1uA==
X-Google-Smtp-Source: AJdET5cvmKdPiPXCeJKbdJq4ANkWqxApPt2MsVFg0nd0ozCT1G/3m8kw+T6W2i5yq0yHnCaEdEG1uWUkHye1fu6FQ+Q=
X-Received: by 2002:a5b:38a:: with SMTP id k10-v6mr13081046ybp.420.1541878464042; Sat, 10 Nov 2018 11:34:24 -0800 (PST)
MIME-Version: 1.0
References: <153677633623.9564.4819271047676538323.idtracker@ietfa.amsl.com>
In-Reply-To: <153677633623.9564.4819271047676538323.idtracker@ietfa.amsl.com>
From: Emily Stark <estark@google.com>
Date: Sat, 10 Nov 2018 11:34:12 -0800
Message-ID: <CAPP_2Sa3JHVPNe1N1Pm-LZuWPQeYYgR7dZtiTZOju+7UwvE0-g@mail.gmail.com>
To: alissa@cooperw.in
Cc: iesg@ietf.org, draft-ietf-httpbis-expect-ct@ietf.org, Mark Nottingham <mnot@mnot.net>, httpbis-chairs@ietf.org, httpbis <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="000000000000235ec0057a548ea1"
X-W3C-Hub-Spam-Status: No, score=-21.6
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1gLZ1p-0000jk-7Y 97e12d152314c8ef2d8355b3fbbea589
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Alissa Cooper's No Objection on draft-ietf-httpbis-expect-ct-07: (with COMMENT)
Archived-At: <https://www.w3.org/mid/CAPP_2Sa3JHVPNe1N1Pm-LZuWPQeYYgR7dZtiTZOju+7UwvE0-g@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/36047
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Thanks for the review. Replies inline.

On Wed, Sep 12, 2018 at 11:19 AM Alissa Cooper <alissa@cooperw.in> wrote:

> Alissa Cooper has entered the following ballot position for
> draft-ietf-httpbis-expect-ct-07: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-httpbis-expect-ct/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> S 2.1.4.
>    "Expect-CT: max-age=86400, enforce"
>
> Is the whitespace after the comma intentional?
>

Yes, the examples are intended to show that whitespace is optional.


>
> S 3.1.
>       "*  The "status" key, with a string value that the UA MUST set to
>          one of the following values: "unknown" (indicating that the UA
>          does not have or does not trust the public key of the log from
>          which the SCT was issued), "valid" (indicating that the UA
>          successfully validated the SCT as described in Section 5.2 of
>          [RFC6962] or Section 8.2.3 of [I-D.ietf-trans-rfc6962-bis]), or
>          "invalid" (indicating that the SCT validation failed because
>          of, e.g., a bad signature)."
>
> I'm surprised that the state of "does not have public key" and "does
> not trust public key" don't have independent value from each other
> such that a single status value is sufficient to cover both. Are there
> no cases where the difference between these states would be material?
> I guess this information could be gleaned in other ways aside from
> this kind of report, but I'm still curious about this.
>

As you suggested, I think the information is better gleaned from other
sources. For example, the owner of an Expect-CT host that receives an
"unknown" SCT report should go look up the log policy of the affected UA to
figure out how to fix their SCTs.


>
> S 4.2.
>     "4.2.  Avoiding amplification attacks"
>
> This title seems like a bit of a misnomer given that the attacks can't
> be fully avoided.
>

Fixed in
https://github.com/httpwg/http-extensions/commit/15a86b656ede69f71897ba1f8cb056cef4844810


>
> S 5.
>   "Additionally, reports submitted to the "report-uri" could reveal
>    information to a third party about which webpage is being accessed
>    and by which IP address, by using individual "report-uri" values for
>    individually-tracked pages.  This information could be leaked even if
>    client-side scripting were disabled."
>
> Isn't there a more generalized potential privacy exposure here if the
> report-uri uses HTTP rather than HTTPS? That is, the whole report
> could be exposed to any observer even without individual report-uri
> values for individual pages.
>
>
Fixed in
https://github.com/httpwg/http-extensions/commit/15a86b656ede69f71897ba1f8cb056cef4844810
by limiting report-uris to HTTPS only.