[secdir] [new-work] WG Review: Web Security (websec)

IESG Secretary <iesg-secretary@ietf.org> Tue, 28 September 2010 17:15 UTC

Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@core3.amsl.com
Received: from [] (localhost []) by core3.amsl.com (Postfix) with ESMTP id ECC533A6E0C; Tue, 28 Sep 2010 10:15:29 -0700 (PDT)
X-Original-To: new-work@ietf.org
Delivered-To: new-work@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id 6A5033A6B5A; Tue, 28 Sep 2010 10:15:08 -0700 (PDT)
From: IESG Secretary <iesg-secretary@ietf.org>
To: new-work@ietf.org
Mime-Version: 1.0
Message-Id: <20100928171511.6A5033A6B5A@core3.amsl.com>
Date: Tue, 28 Sep 2010 10:15:08 -0700
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Tue, 28 Sep 2010 10:31:32 -0700
Subject: [secdir] [new-work] WG Review: Web Security (websec)
X-BeenThere: secdir@ietf.org
Reply-To: iesg@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Sep 2010 17:15:30 -0000

A new IETF working group has been proposed in the Applications Area.  The
IESG has not made any determination as yet. The following draft charter
was submitted, and is provided for informational purposes only. Please
send your comments to the IESG mailing list (iesg@ietf.org) by Tuesday,
October 5, 2010.  

Web Security (websec)
Status: Proposed Working Group
Last updated: 2010-09-23

   Tobias Gondrom <tobias.gondrom@gondrom.org>

Applications Area Directors:
   Alexey Melnikov <alexey.melnikov@isode.com>
   Peter Saint-Andre <stpeter@stpeter.im>

Applications Area Advisor:
   Peter Saint-Andre <stpeter@stpeter.im>

Security Area Advisor:
   Sean Turner <turners@ieca.com>

Mailing Lists:
  General Discussion: hasmat@ietf.org
  To Subscribe: <https://www.ietf.org/mailman/listinfo/hasmat>
  Archive: <http://www.ietf.org/mail-archive/web/hasmat/>
  [to be changed to websec@ietf.org if approved]

Problem Statement

Although modern Web applications are built on top of HTTP, they provide
rich functionality and have requirements beyond the original vision of
static web pages.  HTTP, and the applications built on it, have evolved
organically.  Over the past few years, we have seen a proliferation of
AJAX-based web applications (AJAX being shorthand for asynchronous
JavaScript and XML), as well as Rich Internet Applications (RIAs), based
on so-called Web 2.0 technologies.  These applications bring both
luscious eye-candy and convenient functionality, e.g. social networking,
to their users, making them quite compelling.  At the same time, we are
seeing an increase in attacks against these applications and their
underlying technologies.

The list of attacks is long and includes Cross-Site-Request Forgery
(CSRF)-based attacks, content-sniffing, cross-site-scripting (XSS)
attacks, attacks against browsers supporting anti-XSS policies,
clickjacking attacks, malvertising attacks, as well as man-in-the-middle
(MITM) attacks against "secure" (e.g. Transport Layer Security
(TLS/SSL)-based) web sites along with distribution of the tools to carry
out such attacks (e.g. sslstrip).

Objectives and Scope

With the arrival of new attacks the introduction of new web security
indicators, security techniques, and policy communication mechanisms
have sprinkled throughout the various layers of the Web and HTTP.

The goal of this working group is to compose an overall "problem
statement and requirements" document derived from surveying the
issues outlined in the above section ([1] provides a starting point).
The requirements guiding the work will be taken from the Web
application and Web security communities.  The scope of this document
is HTTP applications security, but does not include HTTP authentication,
nor internals of transport security which are addressed by other working
groups (although it may make reference to transport security as an
available security "primitive").  See the "Out of Scope" section, below.

Additionally, the WG will standardize a small number of selected
specifications that have proven to improve security of Internet
Web applications.  Initial work will be the following topics:

  - Same origin policy, as discussed in draft-abarth-origin
    (see also Appendices A and B, below)

  - HTTP Strict transport security, as discussed in

  - Media type sniffing, as discussed in draft-abarth-mime-sniff

This working group will work closely with IETF Apps Area WGs (such as
HYBI, HTTPstate, and HTTPbis), as well as appropriate W3C working
group(s) (e.g. HTML, WebApps).

Out of Scope

As noted in the objectives and scope (above), this working group's
scope does not include working on HTTP Authentication nor underlying
transport (secure or not) topics. So, for example, these items are
out-of-scope for this WG:

  - Replacements for BASIC and DIGEST authentication

  - New transports (e.g. SCTP and the like)


1. A document illustrating the security problems Web applications are
facing and listing design requirements.  This document shall be

2. A selected set of technical specifications documenting deployed
HTTP-based Web security solutions. These documents shall be Standards

Goals and Milestones

Oct 2010    Submit "HTTP Application Security Problem Statement and
           Requirements" as initial WG item.

Oct 2010    Submit "Media Type Sniffing" as initial WG item.

Oct 2010    Submit "Web Origin Concept" as initial WG item.

Oct 2010    Submit "Strict Transport Security" as initial WG item.

Feb 2011    Submit "HTTP Application Security Problem Statement and
           Requirements" to the IESG for consideration as an
           Informational RFC.

Mar 2011    Submit "Media Type Sniffing" to the IESG for consideration
           as a Standards Track RFC.

Mar 2011    Submit "Web Origin Concept" to the IESG for consideration as
           a Standards Track RFC.

Mar 2011    Submit "Strict Transport Security" to the IESG for
           consideration as a Standards Track RFC.

Apr 2011    Possible re-chartering


[1] Hodges and Steingruebl, "The Need for a Coherent Web Security Policy
Framework", W2SP position paper, 2010.


A. Relationship between origin work in IETF WebSec and W3C HTML WG

draft-abarth-origin defines the nuts-and-bolts of working with
origins (computing them from URIs, comparing them to each other, etc).
HTML5 defines HTML-specific usage of origins.  For example, when
making an HTTP request, HTML5 defines how to compute which origin
among all the origins rendering HTML is the one responsible for making
the request.  draft-abarth-origin then takes that origin, serializes
it to a string, and shoves it in a header.

B. Origin work may yield two specifications

There also seems to be demand for a document that describes the
same-origin security model overall.  However, it seems like that
document ought to be more informative rather than normative. The
working group may split draft-abarth-origin into separate informative
and standards track specifications, the former describing same-origin
security model, and the latter specifying the nuts-and-bolts of working
with origins (computing them from URLs, comparing them to each other,
new-work mailing list