[websec] #9: explicitly note revocation check failures as errors causing connection termination?

"websec issue tracker" <trac+websec@trac.tools.ietf.org> Fri, 08 July 2011 23:04 UTC

Return-Path: <trac+websec@trac.tools.ietf.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 755C121F8C71 for <websec@ietfa.amsl.com>; Fri, 8 Jul 2011 16:04:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HiNMYtnRm0WW for <websec@ietfa.amsl.com>; Fri, 8 Jul 2011 16:04:49 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:1112:1::2a]) by ietfa.amsl.com (Postfix) with ESMTP id 0739221F8C4E for <websec@ietf.org>; Fri, 8 Jul 2011 16:04:49 -0700 (PDT)
Received: from localhost ([::1] helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.76) (envelope-from <trac+websec@trac.tools.ietf.org>) id 1QfK6K-0008LC-Us; Fri, 08 Jul 2011 16:04:48 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: websec issue tracker <trac+websec@trac.tools.ietf.org>
X-Trac-Version: 0.11.7
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.11.7, by Edgewall Software
To: jeff.hodges@kingsmountain.com
X-Trac-Project: websec
Date: Fri, 08 Jul 2011 23:04:48 -0000
X-URL: http://tools.ietf.org/websec/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/websec/trac/ticket/9
Message-ID: <070.44d3a8d3efb1d14822e889e8f61bab63@trac.tools.ietf.org>
X-Trac-Ticket-ID: 9
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: jeff.hodges@kingsmountain.com, websec@ietf.org
X-SA-Exim-Mail-From: trac+websec@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Cc: websec@ietf.org
Subject: [websec] #9: explicitly note revocation check failures as errors causing connection termination?
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 23:04:49 -0000

#9: explicitly note revocation check failures as errors causing connection
termination?

 http://www.ietf.org/mail-archive/web/websec/current/msg00306.html


 Subject: Re: [websec] Decouple HSTS's two orthogonal effects?
 From: Adam Barth <ietf@adambarth.com>
 Date: Tue, 29 Mar 2011 14:35:58 -0700
 To: Tom Ritter <tom@ritter.vg>
 Cc: websec@ietf.org

 On Tue, Mar 29, 2011 at 2:29 PM, Tom Ritter <tom@ritter.vg> wrote:
 > On Tue, Mar 29, 2011 at 4:58 PM, Adam Barth <ietf@adambarth.com> wrote:
 >> There's no coupling between HSTS and the particular algorithm a UA
 >> uses to verify certificates.  The UA is free to use whatever
 >> verification mechanism it desires.
 >
 > This is good, but perhaps some clarification to the draft would be in
 order:
 >
 > Section 2.2 states:
 >
 >   2.  The UA terminates, without user recourse, any secure transport
 >       connection attempts upon any and all secure transport errors or
 >       warnings, including those caused by a site presenting self-signed
 >       certificates

 If a self-signed certificate does not cause a secure transport error,
 then you're all set.  For example, it's fine for a self-signed
 certificate to be in the list of explicitly trusted certificates.  In
 that case, no secure transport error is generated.  Try it.  :)

 > Knowing that HSTS allows any validation method a posteriori allows you
 > interpret this correctly - that self-signed certs *may* be allowed
 > under HSTS, if the user has added them to their store.  But without
 > that, it may be interpretted incorrectly - that no self-signed certs
 > would be allowed.

 That's not what it says.

 > Furthermore, I'm not sure, but "any and all secure
 > transport errors or warnings" may be ambiguous.  I don't know if it's
 > an existing standard to enter a warning or error state in event of
 > (for example) a revocation check failure - although we do know that
 > most browsers do not present any warning or error.  There's more on
 > that in Adam Langley's thread.   If HSTS does not define whether or
 > not a revocation check failure is an error condition, I think it
 > should.

 Indeed.  A reference there would be helpful.

-- 
-------------------------------------------+--------------------------------
 Reporter:  jeff.hodges@…                  |       Owner:  =JeffH
     Type:  defect                         |      Status:  new   
 Priority:  major                          |   Milestone:        
Component:  strict-transport-sec           |     Version:        
 Severity:  Active WG Document             |    Keywords:        
-------------------------------------------+--------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/websec/trac/ticket/9>
websec <http://tools.ietf.org/websec/>