Re: [websec] #34: HSTS cache manipulation and misuse by server enabled by wildcard cert

=JeffH <Jeff.Hodges@KingsMountain.com> Mon, 16 January 2012 02:57 UTC

Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78B6221F8469 for <websec@ietfa.amsl.com>; Sun, 15 Jan 2012 18:57:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.038
X-Spam-Level:
X-Spam-Status: No, score=-99.038 tagged_above=-999 required=5 tests=[AWL=-1.143, BAYES_50=0.001, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u+wWSo4zXGrx for <websec@ietfa.amsl.com>; Sun, 15 Jan 2012 18:57:05 -0800 (PST)
Received: from oproxy3-pub.bluehost.com (oproxy3.bluehost.com [IPv6:2605:dc00:100:2::a3]) by ietfa.amsl.com (Postfix) with SMTP id DFD7021F8464 for <websec@ietf.org>; Sun, 15 Jan 2012 18:57:04 -0800 (PST)
Received: (qmail 28631 invoked by uid 0); 16 Jan 2012 02:57:04 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy3.bluehost.com with SMTP; 16 Jan 2012 02:57:04 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=lqXW5GPsRcw5y9sIPYmRY8MeCKpNVq+I30J1xnWEKp4=; b=6LThgeN+7OUg6shKPgzw6OvTyPegLVpKORZqv1EQ2jPPFXOIM3ImqZCQIzYv2C3G2B5/UEJyb2pihOvAHQR5nyyy6XCrnwnJyhVQSwDBN8Z+uTAB0Kisew1h1ns1zjJA;
Received: from c-24-4-122-173.hsd1.ca.comcast.net ([24.4.122.173] helo=[192.168.11.18]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1Rmckp-000707-W0 for websec@ietf.org; Sun, 15 Jan 2012 19:57:04 -0700
Message-ID: <4F1391FE.9080500@KingsMountain.com>
Date: Sun, 15 Jan 2012 18:57:02 -0800
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.24) Gecko/20111108 Thunderbird/3.1.16
MIME-Version: 1.0
To: IETF WebSec WG <websec@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [websec] #34: HSTS cache manipulation and misuse by server enabled by wildcard cert
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jan 2012 02:57:05 -0000

Adam wondered..
 >
 > Why not just postMessage of the HTML <form> element?  If you want be
 > more sneaky about it, you can just the HTTP cache.  Anyway, web sites
 > are allowed to send messages to each other.

Yeah.  I submitted that item for completeness-sake, it'd gotten shuffled deep 
in the proverbial pile, and we hadn't discussed it here as yet.

=JeffH