Re: Comments on draft-stark-expect-ct-00
Eric Rescorla <ekr@rtfm.com> Fri, 25 November 2016 19:21 UTC
Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58E96129697 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 25 Nov 2016 11:21:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.897
X-Spam-Level:
X-Spam-Status: No, score=-7.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-1.497, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xSCb_gOhGXOG for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 25 Nov 2016 11:20:58 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 038CA1295B9 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Fri, 25 Nov 2016 11:20:57 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1cAM00-0003bQ-TC for ietf-http-wg-dist@listhub.w3.org; Fri, 25 Nov 2016 19:17:28 +0000
Resent-Date: Fri, 25 Nov 2016 19:17:28 +0000
Resent-Message-Id: <E1cAM00-0003bQ-TC@frink.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <ekr@rtfm.com>) id 1cALzt-0003ae-F0 for ietf-http-wg@listhub.w3.org; Fri, 25 Nov 2016 19:17:21 +0000
Received: from mail-yw0-f177.google.com ([209.85.161.177]) by titan.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <ekr@rtfm.com>) id 1cALzn-0004xO-1X for ietf-http-wg@w3.org; Fri, 25 Nov 2016 19:17:16 +0000
Received: by mail-yw0-f177.google.com with SMTP id r204so69664672ywb.0 for <ietf-http-wg@w3.org>; Fri, 25 Nov 2016 11:16:54 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=S4zzJqRmy46+WRQM5Ym73qlJako1+dkO3P2m1Eqx87U=; b=1KJ7jzRs0Bd2geEbjYT+jp+uRII3Nj1uQWiE7yH9rQQ/WxqwQmBbnzC8V4vjwYfRt2 WTe5RuxnaB8d7+hL7UHUzZ+uVGBPq7GYLr6yvZglEVSA4xLLhtkwt6KZR+lTzqXZ5/1c 4CG499HALPTPx/tYiVlX9WxVgAg5YGz8n1n+o9F+uit1D6vpsrxgU9C8hk0lwFORPvpN 22A9sPB4DVTwRXbrzpkvbijF24Wh+8XlbsQ/EsMcYTf8RaS32eL5zszTfcj3KD+npdUx ARF8bgqeECL7Cw5htWgmb+OsN/BNcxXcz/XjP5TES2Ymr4wNLL+ldrrqz1OKCsf/sE6T wbjw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=S4zzJqRmy46+WRQM5Ym73qlJako1+dkO3P2m1Eqx87U=; b=gjCU4Bn/1FLJdURybvBdwDgAua6iQAoJ0KC39+RZFGD4W74P4CRGYnZ3UvlEZmvEaz Zk7VQBk5edu/p1Jgl6gvAtHsEA7w1dFvME5WY9fdmdEHQBv1EvsVe2EFHalJAs4MEqOn VeH8hIUKYGYm3nMLSnMQLsYvzvXc9of7X7gV8H8yguDXcDMSx2FRLqazyQmy3G4uuRbP 1YgcvH4ozAWGn4o435AA95U3VpGlRn7zwLL5QFIdJjoAbJ5chnDZp+Adqj1PYJyOHZdS PZ3TeNMwdVTjCA8kSqA/srLLIRPKmcRx7HhVzNeEL1eqwD5tf/vbuY8UlEhkCYsTRi3+ 7Prg==
X-Gm-Message-State: AKaTC01oMB20FnCbp4mXV+O8p2thtZXdkI71TIKphzn5QvH7TZkprOEteSFR9wEWY/GFJMPVo9BlJzypdM7TTA==
X-Received: by 10.129.81.78 with SMTP id f75mr11630452ywb.149.1480101408558; Fri, 25 Nov 2016 11:16:48 -0800 (PST)
MIME-Version: 1.0
Received: by 10.129.159.141 with HTTP; Fri, 25 Nov 2016 11:16:08 -0800 (PST)
In-Reply-To: <CAPP_2SYaNxzw8Cd9hBEz2RzK5kO8fdR8JxLk9B2Dr+yyGgwkyA@mail.gmail.com>
References: <CAPP_2SbEM+_Ynf_Jcf4fUwp142rZ+69nF=dH6G0Tt_izYJC6xA@mail.gmail.com> <CABcZeBNuoiqKZQ4eWS6KJnwaeeCVzw6zmozf3T=jQJajgerSVg@mail.gmail.com> <CAPP_2SZzww0JZDBCLGfK+mT9VDZR6L0iugXXL0xawRJ3Nd_p0Q@mail.gmail.com> <CABcZeBMz7mOdYLs1WPj+K-YdLJcmn1jEcvbUNe5VD3zA5B90aw@mail.gmail.com> <CAPP_2SYaNxzw8Cd9hBEz2RzK5kO8fdR8JxLk9B2Dr+yyGgwkyA@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 25 Nov 2016 11:16:08 -0800
Message-ID: <CABcZeBPKa-xdT6JoHVSQTjuHU5r=K0CL=2UmKrLW3jtf9Mu+uA@mail.gmail.com>
To: Emily Stark <estark@google.com>
Cc: HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="001a11456404b07fd7054224f616"
Received-SPF: none client-ip=209.85.161.177; envelope-from=ekr@rtfm.com; helo=mail-yw0-f177.google.com
X-W3C-Hub-Spam-Status: No, score=-6.0
X-W3C-Hub-Spam-Report: AWL=-0.597, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1cALzn-0004xO-1X f66106a4a822fb52864773956bc8ad4d
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Comments on draft-stark-expect-ct-00
Archived-At: <http://www.w3.org/mid/CABcZeBPKa-xdT6JoHVSQTjuHU5r=K0CL=2UmKrLW3jtf9Mu+uA@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/33017
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
On Mon, Nov 21, 2016 at 3:28 PM, Emily Stark <estark@google.com> wrote: > Summarizing some hallway conversations from IETF: > > - Caching in report-only mode: I can be convinced that this is useful, > in case where you are e.g. rolling out a CT-compliant certificate in > conjunction with Expect-CT (for example if you have a config that > turns on CT and also turns on Expect-CT in report-only mode, and the > config didn't make it out to a few of your servers). Will be > especially convinced if site owners say that this is how they want it > to work. > I'd in general be interested in hearing from site owners on how they feel about this header. That would be a good addition to this discussion. > > - Policy: One can draw an analogy to HSTS, where a site promises to > provide a certificate that is valid according to the client's > definition of valid, including factors that vary across clients > (variations in trust stores, SHA1 deprecation, etc.). In practice, I > don't think CT will be more of a foot-gun than HSTS (and certainly > much less than HPKP) because browsers are in close collaboration to > work out policies that play nicely with each other. > I'm not sure how strong the analogy is here. It's actually a nontrivial inconvenience for sites that different browsers have different policies. With that said, it's not something I'm willing to make a big deal of if the send of the WG is otherwise. -Ekr > On Mon, Nov 14, 2016 at 8:53 PM, Eric Rescorla <ekr@rtfm.com> wrote: > > On Tue, Nov 15, 2016 at 10:50 AM, Emily Stark <estark@google.com> wrote: > >> > >> > >> >> > >> >> (https://groups.google.com/d/msg/mozilla.dev.security. > policy/VJYX1Wnnhiw/ZaJBaKfKBQAJ). > >> >> That is, eventually, when browsers require CT for all certificates, > >> >> site owners will have to face this same problem of making sure that > >> >> all their certificate chains are compliant with the CT policies of > all > >> >> the UAs that they care about. So I guess I see the interop problem as > >> >> somewhat separate, perhaps something that should be addressed on its > >> >> own when the CT ecosystem and implementations have matured enough > that > >> >> UAs are able to standardize on one policy...? > >> >> > >> >> To put it another way, I see Expect-CT as a way that individual sites > >> >> can opt in to the future early ("the future" being when browsers > >> >> require CT for all certificates), and the future is quite possibly > >> >> different policies in different browsers, at least for some amount of > >> >> time. > >> > > >> > > >> > The problem is that as written the future is likely to involve a lot > of > >> > bustage. > >> > >> I feel like maybe I'm not understanding what you'd like to see > >> instead. Are you arguing that the Expect-CT draft should contain a > >> policy like "all EE certs must come with 2 SCTs from different logs", > >> even if that policy differs from what different browsers plan to > >> actually enforce for new certificates? Or that browsers shouldn't > >> require CT for all certificates until they standardize on such a > >> policy? > > > > > > I'm arguing that we shouldn't define a header that says "you must enforce > > CT" > > without defining what "enforce CT" means. > > > > -Ekr > > > >> > >> > > >> > > >> >> > S 2.1.3. > >> >> > What's the rationale for not caching the directive in report-only > >> >> > mode. > >> >> > If the purpose of the report-only mode is to tell you when you have > >> >> > nonconforming servers, then don't you want to be able to turn it on > >> >> > on server A and detect hwen server B is broken? That seems like it > >> >> > doesn't work if you don't cache. > >> >> > >> >> I'm tempted to say "because that's how HPKP does it", but that's > >> >> probably not the answer you're looking for. :) I'd expect that sites > >> >> would generally serve the report-only header on all responses > >> >> unconditionally. I can't really think of a common misconfiguration > >> >> scenario that would cause a CT violation and would *also* cause the > >> >> header to not be served, but maybe that's a failure of imagination on > >> >> my part. > >> > > >> > > >> > Two different independent servers with the same name behind > >> > a load balancer? Or a server farm where policies are rolled out > slowly. > >> > > >> > -Ekr > >> > > >> >> > >> >> > >> >> > > >> >> > -Ekr > >> >> > >> > > > > > >
- Comments on draft-stark-expect-ct-00 Eric Rescorla
- Re: Comments on draft-stark-expect-ct-00 Tom Ritter
- Re: Comments on draft-stark-expect-ct-00 Emily Stark
- Re: Comments on draft-stark-expect-ct-00 Tom Ritter
- Re: Comments on draft-stark-expect-ct-00 Emily Stark
- Re: Comments on draft-stark-expect-ct-00 Eric Rescorla
- Re: Comments on draft-stark-expect-ct-00 Emily Stark
- Re: Comments on draft-stark-expect-ct-00 Eric Rescorla
- Re: Comments on draft-stark-expect-ct-00 Emily Stark
- Re: Comments on draft-stark-expect-ct-00 Eric Rescorla
- Re: Comments on draft-stark-expect-ct-00 Nick Sullivan
- Re: Comments on draft-stark-expect-ct-00 Emily Stark