Re: HSTS Misuse

Philipp Junghannß <teamhydro55555@gmail.com> Mon, 23 May 2016 10:42 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CC0F12D5FF for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 23 May 2016 03:42:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.446
X-Spam-Level:
X-Spam-Status: No, score=-8.446 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.426, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KTIv7oWO_892 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 23 May 2016 03:42:53 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EAC5E12D09A for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 23 May 2016 03:42:52 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1b4nG6-0004EA-BW for ietf-http-wg-dist@listhub.w3.org; Mon, 23 May 2016 10:38:50 +0000
Resent-Date: Mon, 23 May 2016 10:38:50 +0000
Resent-Message-Id: <E1b4nG6-0004EA-BW@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <teamhydro55555@gmail.com>) id 1b4nG1-0004BE-48 for ietf-http-wg@listhub.w3.org; Mon, 23 May 2016 10:38:45 +0000
Received: from mail-lb0-f171.google.com ([209.85.217.171]) by maggie.w3.org with esmtps (TLS1.2:RSA_ARCFOUR_SHA1:128) (Exim 4.80) (envelope-from <teamhydro55555@gmail.com>) id 1b4nFz-00082s-KW for ietf-http-wg@w3.org; Mon, 23 May 2016 10:38:44 +0000
Received: by mail-lb0-f171.google.com with SMTP id ww9so53951692lbc.2 for <ietf-http-wg@w3.org>; Mon, 23 May 2016 03:38:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ZN0cmNr3Hp+fgQaOUWiXjVg+fciaunWzfgbiujSHQ5M=; b=YUO9RZL4VOT/BQUTZLJwF4wDk7I2SZ5UmvlbiPih2Cg8ZlNH4PmchU4+vKV7BjTSQF FJ72pAZ7hDxZbm68tGHwLbO57bgHT3rdw+9pSLNkjpBcLkVBcaq0INO+HD1DmeyPyEzv UIAd+yYqB31g6t36NNX5hZZ0zln55HAc/I5WKGHyjoss3myG7vVR3Td4wPWiy9SkvR2k NKDl9Y/MGt+8K9HYhSoXeOdBwtfYiLH8quOgXh8jQ/CR6Cz82NobBXlwBOCvyaIgBDN1 6qC2lHjeFYhhO+nUzBQQy+mWIykkYco5s3mVxCFtArav8ooZYNZMdxBvimzqlvuQI4+G p6uw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ZN0cmNr3Hp+fgQaOUWiXjVg+fciaunWzfgbiujSHQ5M=; b=Mx/YeoKGSuYt/kmsxIK2xRuIzLRyEESXfDUQOTIHhbeBE0fQJOK+M2qUHDHu4nPS/t wUFurfoSiTB/TklyFPBZFQTyjsD40dnAfwV9Ha2cQZ1hlfogpbMyyrF/Gz4eHXNAYRNN teJsGpA9baztBo1i5MTRBJNPodHmwhP9IZjI+Bg6F9zdqimqBmbtFKOOa/0B9PbEQ876 u2o1TZ4Fz0QlbY4NZ1mX7gpB0unBWGMPO8nacgXHVzOMKUDSkMdHVFwZ/W6XiSZfKHaL TbCaXA1YK4g8bmMe1sumnuESgWxGRf4UIGj/fyRcYWLy6wACC4McuC6Azx11mDPs+owy 7mBw==
X-Gm-Message-State: AOPr4FUv4EjKJxHw3A/7ZTlCdImm0/+1TWLLoab0Vv5+gpSJjeObHe4+yh8SRfheqfnkJA4q8NLFhiFBTY1nCA==
X-Received: by 10.112.166.72 with SMTP id ze8mr5585602lbb.128.1463999896688; Mon, 23 May 2016 03:38:16 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.148.74 with HTTP; Mon, 23 May 2016 03:37:37 -0700 (PDT)
In-Reply-To: <CAATNdDxmM_-MfakHa6wguM0+aOtFmEr-yFaT+-yan0PRdSJCEg@mail.gmail.com>
References: <CAATNdDzB=Dgtqmyj5mB_VE24kvi9Nqt-6f2tdL0fJsZS0HypNQ@mail.gmail.com> <CACHSkNpx31zci8Kxv7LS85OJoJfuzC-hZx1RMzoiQ9-v4S=ObQ@mail.gmail.com> <CAATNdDwUpXAvpZp-=L-mif2zDSkMjA6VtKv_hrCQZJQBmt0Ctg@mail.gmail.com> <7301d13860eca437fc01c21ace8d322a@ultrawaves.net> <CACHSkNq4P3SPvE+XBWBPHLb5gaWcYNS0CFz8QNP+z7BUsM_TCA@mail.gmail.com> <CAATNdDxmM_-MfakHa6wguM0+aOtFmEr-yFaT+-yan0PRdSJCEg@mail.gmail.com>
From: Philipp Junghannß <teamhydro55555@gmail.com>
Date: Mon, 23 May 2016 12:37:37 +0200
Message-ID: <CACHSkNq4JpETZvB+M4bJNq7CtGfizsfaNLNABO62D_YMHbOPKQ@mail.gmail.com>
To: Dennis Olvany <dennisolvany@gmail.com>
Cc: Solarus Lumenor <solarus@ultrawaves.fr>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="001a11c38158cb1ecb0533800905"
Received-SPF: pass client-ip=209.85.217.171; envelope-from=teamhydro55555@gmail.com; helo=mail-lb0-f171.google.com
X-W3C-Hub-Spam-Status: No, score=-4.7
X-W3C-Hub-Spam-Report: AWL=-0.270, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1b4nFz-00082s-KW ae3a43614856f450e44aaf5b5a95331d
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HSTS Misuse
Archived-At: <http://www.w3.org/mid/CACHSkNq4JpETZvB+M4bJNq7CtGfizsfaNLNABO62D_YMHbOPKQ@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/31660
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

also lets not forget that what will happen if we have an obnoxiouslyy long
HSTS and the domain gets sold? have fun eating that one.
obviously the issue gets even better with HPKP. for HSTS you can can get
around with letsencrypt and ANY other trusted certs but HPKP pins specific
keys, in other words when for example the previous server/owner or whoever
has pinned some EV CAs and the next owner is an individual, that person can
forget it because (for some stupid reason) individuals cant get EV certs.

2016-05-23 12:33 GMT+02:00 Dennis Olvany <dennisolvany@gmail.com>:

> That is precisely the caveat, Philipp. If the server is not controlled by
> the domain owner then there is the possibility that an hsts implementation
> could impact the domain owner's ability to repurpose the domain for non-ssl
> service.
>
> On Mon, May 23, 2016 at 6:16 AM Philipp Junghannß <
> teamhydro55555@gmail.com> wrote:
>
>> a DNS based HSTS is a great Idea and when used with DNSSec it gets even
>> better because (obvious) nobody can try and forge headers.
>>
>> to address the issue of Dennis Olvan: The server (owned e.g. by some
>> provider) IS using HTTPS but uses HSTS without the permission of the domain
>> owner, which results in the scenario that he cannot use plaintext or mixed
>> when changing the server, or repurposing the domain. That's what I think he
>> means.
>>
>> 2016-05-2311:49 GMT+02:00 Solarus Lumenor <solarus@ultrawaves.fr>:
>>
>> Le 2016-05-22 15:13, Dennis Olvany a écrit :
>>>
>>> I suppose third-party HSTS may be a good way to describe the scenario I
>>> propose. To be more clear, let's say that the https server is provided by a
>>> web hosting company and their customer is the domain owner.
>>>
>>> Hello.
>>>
>>> In my opinion its a bad practice that should be avoided.
>>>
>>> For a domain given, a HTTPS server must only use HSTS if it serves
>>> fully-encrypted content.
>>> If it serves plain-text or mixed-content for a domain that uses HSTS,
>>> it’s an error.
>>>
>>> If you want to redirect HTTPS connexion to plain-text content then you
>>> MUST NOT use HSTS on all the servers or CDN serving this domain.
>>> If one or more Virtual Host activate HSTS on your domain, your clients
>>> will be stuck for a while.
>>>
>>> As long as HSTS in DNS is not standardized or implemented, the domain
>>> owner does not matters, it’s only a server problem.
>>>
>>> Solarus
>>>
>>>
>>
>>