Re: HSTS preload flaw

Austin Wright <aaa@bzfx.net> Sun, 09 February 2020 08:10 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2C791200D8 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 9 Feb 2020 00:10:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.75
X-Spam-Level:
X-Spam-Status: No, score=-2.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=bzfx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vVFvhNPtwA9s for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 9 Feb 2020 00:10:07 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 126EF1200B3 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 9 Feb 2020 00:10:07 -0800 (PST)
Received: from lists by lyra.w3.org with local (Exim 4.92) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1j0hby-00040j-8f for ietf-http-wg-dist@listhub.w3.org; Sun, 09 Feb 2020 08:06:38 +0000
Resent-Date: Sun, 09 Feb 2020 08:06:38 +0000
Resent-Message-Id: <E1j0hby-00040j-8f@lyra.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by lyra.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <aaa@bzfx.net>) id 1j0hbt-0003zx-M6 for ietf-http-wg@listhub.w3.org; Sun, 09 Feb 2020 08:06:33 +0000
Received: from mail-pf1-x431.google.com ([2607:f8b0:4864:20::431]) by titan.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from <aaa@bzfx.net>) id 1j0hbJ-0006JH-UL for ietf-http-wg@w3.org; Sun, 09 Feb 2020 08:06:33 +0000
Received: by mail-pf1-x431.google.com with SMTP id 84so2066259pfy.6 for <ietf-http-wg@w3.org>; Sun, 09 Feb 2020 00:05:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bzfx.net; s=google; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=HFn/hd8l4LD3TIZfyRCUQy4fccR/Sag1CagQBu3nM18=; b=2c3tf7FEfnON9AkTIrWVe5u1iKtLHhxJe4NSQUY4RwpW5k+H8mwjPFGddVILt1JznH wKouOZVALDXERXDrYNh64tF34FNMo/qKHWW+DfnpntEQKawVXQ6N76roJVBpzwi+cUSu fUiG84rdCfbEmCJ1fyeMc2ZLGB30GFACnpiys=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=HFn/hd8l4LD3TIZfyRCUQy4fccR/Sag1CagQBu3nM18=; b=g8QEHXJv40hcOdlPQBV8MpK/hZvCPFUvQ4ixMaxIoXF9EWe4kU9XMzjWBJj63m4YJ3 +YYsr+c7GLzkKhoP5iTbtIpzWg85fookF74XvqyaHBFEnpmx0PoObnBEWh+JwY72/n7B 8kSSQ7I/1YAHNR9++ylLunWez7cOb0abYa37jM4kkDlDqCJpAHcuV6YPW7MOughBn1d4 bTyI4v88XQClSYiUpCdBg/XwPVyVpmHyxLw9CTaThgL1drnKpZkv2raXJJEOLtjMB3+T /xnp73K2u57Bkyw5DvkkX7II4CixbYW/nC1ItHXBN+nI/EBSEYmNRxBWue276A/1taTC j7Hg==
X-Gm-Message-State: APjAAAU0ezw92i0QVPOS0rcjYeREMd/In2z13T5O2JpAA7PMQmwKFaD4 y8lwghqaq5cRKFQXayKuWyl/qw==
X-Google-Smtp-Source: APXvYqzPUOgi0clqdGxzBwUsoI/f1Tf4ifOMtpfltHXdCNMJDyTGXalQWAM2B68OQj2dh4T0GwRyQQ==
X-Received: by 2002:aa7:9633:: with SMTP id r19mr7766036pfg.90.1581235554802; Sun, 09 Feb 2020 00:05:54 -0800 (PST)
Received: from [192.168.0.116] (71-223-240-170.phnx.qwest.net. [71.223.240.170]) by smtp.gmail.com with ESMTPSA id w25sm8298123pfi.106.2020.02.09.00.05.53 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 09 Feb 2020 00:05:54 -0800 (PST)
From: Austin Wright <aaa@bzfx.net>
Message-Id: <A0F7BEB8-C236-429B-94F7-C2F748FDD70C@bzfx.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_EBCE200C-EF25-411E-816D-6C95197A7319"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\))
Date: Sun, 09 Feb 2020 01:05:49 -0700
In-Reply-To: <CAChr6Syfo-XpN0i4O0==G29KJ22oCvq+X_nbjgq8aAhtCR7BzA@mail.gmail.com>
Cc: "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
To: Rob Sayre <sayrer@gmail.com>
References: <CAChr6Syfo-XpN0i4O0==G29KJ22oCvq+X_nbjgq8aAhtCR7BzA@mail.gmail.com>
X-Mailer: Apple Mail (2.3608.60.0.2.5)
Received-SPF: pass client-ip=2607:f8b0:4864:20::431; envelope-from=aaa@bzfx.net; helo=mail-pf1-x431.google.com
X-W3C-Hub-Spam-Status: No, score=-6.1
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1j0hbJ-0006JH-UL 0436e06964951a272ccf8aee73045abd
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HSTS preload flaw
Archived-At: <https://www.w3.org/mid/A0F7BEB8-C236-429B-94F7-C2F748FDD70C@bzfx.net>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/37343
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

I don’t think you can call this a bug. As far as I know, this behavior is not standardized as any part of HTTP, but is described and centrally managed by Chromium project. That is, it’s a feature of Google Chrome and nobody else is under any obligation to implement it.

And even if it was, I don’t really see how you can say “At least 600k domains were impacted”. What would an attack look like? You have to have a user-agent willing to send a sensitive payload in plaintext, and a server with port 80 open to receive it.

Austin Wright.

> On Feb 7, 2020, at 18:03, Rob Sayre <sayrer@gmail.com> wrote:
> 
> Hi,
> 
> I reported a bug that found HSTS not present for .app, .dev and several other TLDs in Safari on all operating systems, as well as Chrome, Firefox, and Edge on iOS.
> 
> https://bugs.webkit.org/show_bug.cgi?id=202925 <https://bugs.webkit.org/show_bug.cgi?id=202925> [perhaps still private]
> 
> Google made the issue public about a month ago without asking me:
> https://bugs.chromium.org/p/chromium/issues/detail?id=1013612#c44 <https://bugs.chromium.org/p/chromium/issues/detail?id=1013612#c44>
> 
> A commenter on the Chromium bug maintains that this issue is not a bug. However, this issue was responsibly reported, and fixed in iOS 13.3 and contemporaneous releases on other operating systems:
> 
> https://developer.apple.com/documentation/ios_ipados_release_notes/ios_ipados_13_3_release_notes <https://developer.apple.com/documentation/ios_ipados_release_notes/ios_ipados_13_3_release_notes>
> 
> It wasn't exactly a clever exploit (I noticed a .app domain that shouldn't have loaded over http), but perhaps there should be more careful monitoring of HSTS preload lists. At least 600k domains were impacted.
> 
> thanks,
> Rob
>