Re: Alt-Svc Privacy Concerns

Phil Lello <phil@dunlop-lello.uk> Sun, 10 April 2016 11:11 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11CD712D197 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 10 Apr 2016 04:11:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.916
X-Spam-Level:
X-Spam-Status: No, score=-7.916 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dunlop-lello-uk.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D9I16zi8EI_F for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 10 Apr 2016 04:11:09 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B96B812D15B for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 10 Apr 2016 04:11:09 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1apDCF-0002LA-8i for ietf-http-wg-dist@listhub.w3.org; Sun, 10 Apr 2016 11:06:27 +0000
Resent-Date: Sun, 10 Apr 2016 11:06:27 +0000
Resent-Message-Id: <E1apDCF-0002LA-8i@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <phil@dunlop-lello.uk>) id 1apDCC-0002KT-0J for ietf-http-wg@listhub.w3.org; Sun, 10 Apr 2016 11:06:24 +0000
Received: from mail-lf0-f45.google.com ([209.85.215.45]) by maggie.w3.org with esmtps (TLS1.2:RSA_ARCFOUR_SHA1:128) (Exim 4.80) (envelope-from <phil@dunlop-lello.uk>) id 1apDC9-0004Fg-UE for ietf-http-wg@w3.org; Sun, 10 Apr 2016 11:06:23 +0000
Received: by mail-lf0-f45.google.com with SMTP id j11so123811697lfb.1 for <ietf-http-wg@w3.org>; Sun, 10 Apr 2016 04:06:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dunlop-lello-uk.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=8HJyMu1l6qVfNUNQBnVVWvbou67Oie/pWLvdX5BMmFk=; b=0x6gdUsGbEciitvCl8PEhjxhW3Ux8GdyyfI1FF9sze7uSwBXKPFyxwfbyR5YROJUAj A+3qXssJTN/GkCcAhIBOa0nvizBq5rF7ZMZKU3afBS3j/y+3u6o9zxjfd40nmU/VAIxN zMxN9JQsipSAla4+D5FzblZlALfSzWdSRkgtgq62VBrb4d0PK1YSkxaxjOTP/9d+BRLM DiXJsHAowfcQmCOxNmnG8OmnpPDXOEC+nh7AGTc59qkng7uLI3v1X4lnzxdXfwY5VTSJ GGWWY63GJ95h0YpVUR+5XZQk+DDnXmk8JFaTxCAjVPSHepGpEsoCJk2eZqD7qnmi0i+u RNiw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=8HJyMu1l6qVfNUNQBnVVWvbou67Oie/pWLvdX5BMmFk=; b=YvLwhIEmVp0B/bmCLuWjb9aPQvO2wTY4x7wX8D6ESiR0rf/IliuevJv6lOrvIBezGY nwl9pX2edU1CZw5ckmgxpizduv03eNu9ZcYWl+j+rgo2Bm4BvR+W0Ynk/zfAFQ7uUN01 VByDEz1YaawLsaQAFDOn3C2V6q5EB7kN89246Bsvcz1ZbpKHXTKJZAJDa9U1mm2Uc6rF cr42Uh3bd0nQLVCsDKp+3L1TCrq4+OPkUoGZfMFTPD44tMuKEG7cRS/B0sb5w21BoEmt P2P6iI0S9aw6j4qxkhBuelTbfJJpGiYMt9IjlgpSusKDMEgc5jFV2w9rT2isbMNRKlLm Erig==
X-Gm-Message-State: AD7BkJJnbOg4OlBWAwzUn+wclEaprDcIoh3E726FkCDhW3lK7WEti31P99bJgKIN3yNC4D+KtCGX35q5aD4T76fQ
MIME-Version: 1.0
X-Received: by 10.112.150.34 with SMTP id uf2mr6510382lbb.34.1460286354549; Sun, 10 Apr 2016 04:05:54 -0700 (PDT)
Received: by 10.25.27.16 with HTTP; Sun, 10 Apr 2016 04:05:54 -0700 (PDT)
In-Reply-To: <CACweHNBoAOX4mWjyeAw7QWmsdb=zGVkx4-t2ftpcLzZg6k1sGg@mail.gmail.com>
References: <CAPofZaEG3gm79CznQuB8RdZb6hXYV7ZiBNTwYj=autVP1=_Cng@mail.gmail.com> <CABkgnnUr4bif_sLGYWq2CWEcZFzucjapjghF9E4HjnTvVGGfXw@mail.gmail.com> <CAPofZaEzobDStP9Pm2kSBZOMmmziu5N8bkALvb++ETdnva0K3A@mail.gmail.com> <CACweHNBoAOX4mWjyeAw7QWmsdb=zGVkx4-t2ftpcLzZg6k1sGg@mail.gmail.com>
Date: Sun, 10 Apr 2016 12:05:54 +0100
Message-ID: <CAPofZaHQFtyW06-R44O7YzuDjU5v2Ekdc+1o8TvVkdVgrctegQ@mail.gmail.com>
From: Phil Lello <phil@dunlop-lello.uk>
To: Matthew Kerwin <matthew@kerwin.net.au>
Cc: HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="047d7b3432946f0f6605301f69c9"
Received-SPF: none client-ip=209.85.215.45; envelope-from=phil@dunlop-lello.uk; helo=mail-lf0-f45.google.com
X-W3C-Hub-Spam-Status: No, score=-5.8
X-W3C-Hub-Spam-Report: AWL=-1.151, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1apDC9-0004Fg-UE d9f92cfd1fb08316d78a291d1dac516c
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Alt-Svc Privacy Concerns
Archived-At: <http://www.w3.org/mid/CAPofZaHQFtyW06-R44O7YzuDjU5v2Ekdc+1o8TvVkdVgrctegQ@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/31410
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Sun, Apr 10, 2016 at 5:47 AM, Matthew Kerwin <matthew@kerwin.net.au>
wrote:

> On 10/04/2016 4:33 AM, "Phil Lello" <phil@dunlop-lello.uk> wrote:
> >
> > This is a slightly different issue than the described scenario, and I'm
> far from certain that the risks are adequately highlighted there.
> >
> > "By using unique names, servers could conceivably track client
> requests." seems incredibly weak to the point of being dismissive, since it
> suggests a per-client hostname being generated, and that it's incredibly
> unlikely anyone would bother.
> >
> > IMHO, it's quite likely that multiple seemingly unrelated sites operated
> by the same entity might legitimately converge users to a common
> servername. It's quite likely that at this point that the user agent would
> see these as candidates for sharing the same connection. It seems
> reasonable that there should at least be a recommendation for a user agent
> to warn users that there is significant potential for being tracked, and
> gain consent.
> >
>
> This sounds like a UX thing -- incognito sessions oughtn't reuse
> connections for different URI hostnames, even if the alt-svcs point to the
> same name. The consent, then, is not being incognito.
>

The primary justification I've read (both on IETF lists and industry
forums) for TLS-by-default and retiring HTTP-over-TCP boils down to not
trusting users to make security decisions for themselves. I don't see why
an inconsistent philosophy should be taken here.

Given the history and motivation for the 2011 EU Directive on cookies, I
don't think that would be viewed as sufficient consent, and this could be
interpreted as bypassing the intent of the law (but let's not engage in too
much debate here, that's a job for the law makers).

> Is it worth documenting this risk/advice somewhere, or is it already
> self-evident?
>
Given previous IETF standards and subsequent abuses (going back at 1981's
RFC 791 and Strict Source Routing), I don't think self-evident is good
enough.

IMHO, the UX aspects need documenting, for the following reasons:

 - It is presumably intended that the server certificate for the Alt-Svc is
matched on Host and not Alt-Svc
 - It is reasonable to assume that with Alt-Svc, a user agent will continue
to display the original URI to avoid confusion (and because correctly
displaying both Alt-Used and Host in the URI would be ugly and confusing).
 - When viewing the certificate for a resource, the user agent needs to
choose between the chain for the Alt-Svc, which won't necessarily match the
original URI, the chain for the original URI, which misrepresents the
source of the information, or both chains, which will require further user
education.

There appears to be a conflict when using Alt-Svc over TLS between keeping
information secret and respecting user privacy. Given that the IETF has
adopted a position on the former, it seems essential to adopt one on the
latter.