Re: [websec] Consensus call: Issue #57 (max-max-age)

Tobias Gondrom <tobias.gondrom@gondrom.org> Wed, 22 May 2013 21:46 UTC

Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22DC511E813B for <websec@ietfa.amsl.com>; Wed, 22 May 2013 14:46:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -95.361
X-Spam-Level:
X-Spam-Status: No, score=-95.361 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q+d5clI3Hysi for <websec@ietfa.amsl.com>; Wed, 22 May 2013 14:46:22 -0700 (PDT)
Received: from lvps176-28-13-69.dedicated.hosteurope.de (lvps176-28-13-69.dedicated.hosteurope.de [176.28.13.69]) by ietfa.amsl.com (Postfix) with ESMTP id 4623811E8123 for <websec@ietf.org>; Wed, 22 May 2013 14:46:20 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=gondrom.org; b=hf02zUNni89pDI6Mp2Y86JUtTWiMaBORlWZS2mk/Q25GjU9H4GakF/cvS0HTVN6iYcUgGHgZiYEFQeHQzu6ZJR3O/5lNbXVBMXWler3z8txOB5/gmZkUDpb4KJOfSUYC; h=Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:CC:Subject:References:In-Reply-To:X-Enigmail-Version:Content-Type;
Received: (qmail 5288 invoked from network); 22 May 2013 23:46:19 +0200
Received: from 188-222-102-61.zone13.bethere.co.uk (HELO ?192.168.1.86?) (188.222.102.61) by lvps176-28-13-69.dedicated.hosteurope.de with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 22 May 2013 23:46:19 +0200
Message-ID: <519D3CAB.80004@gondrom.org>
Date: Wed, 22 May 2013 22:46:19 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130510 Thunderbird/17.0.6
MIME-Version: 1.0
To: ynir@checkpoint.com
References: <43C5DE99-43EB-42FC-8F61-24F9A9429FD1@checkpoint.com> <CA+cU71=Q_QkHqiQ95AZgw8Bi7U_mgCi4icMypwFUp1C6i=apUA@mail.gmail.com> <518EE510.9060600@it.aoyama.ac.jp> <8450797E-818C-445C-ABD2-1B8F9AE1DBB9@checkpoint.com> <5194918A.7030300@gondrom.org> <CAGZ8ZG0SWZD9e-NP2RhQMQ-=F5JUCCytF2NYTdWH7u13hhBqqQ@mail.gmail.com> <519D3254.1040508@gondrom.org> <7189D6F0-1917-419C-80F6-E8A3002642EA@checkpoint.com>
In-Reply-To: <7189D6F0-1917-419C-80F6-E8A3002642EA@checkpoint.com>
X-Enigmail-Version: 1.5.1
Content-Type: multipart/alternative; boundary="------------030804070107000306000004"
Cc: websec@ietf.org
Subject: Re: [websec] Consensus call: Issue #57 (max-max-age)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 May 2013 21:46:27 -0000

On 22/05/13 22:21, Yoav Nir wrote:
> Hi, Tobias
>
> On May 23, 2013, at 12:02 AM, Tobias Gondrom
> <tobias.gondrom@gondrom.org <mailto:tobias.gondrom@gondrom.org>> wrote:
>
> <snip />
>
>>> On Thu, May 16, 2013 at 12:58 AM, Tobias Gondrom
>>> <tobias.gondrom@gondrom.org <mailto:tobias.gondrom@gondrom.org>> wrote:
>>>
>>>
>>>     as mentioned before: I believe a time limit of 1 month is too short
>>>     considering that some of the high profile use cases (banks,
>>>     etc.) may
>>>     only have monthly or bi-monthly usage. In which case the key pin
>>>     would
>>>     regularly expire before people return to the site and the
>>>     protection is
>>>     null.
>>>
>>>
>>> You're assuming that pin assertions (like HPKP headers) are only
>>> processed by individual browsers. 
>>>
>>> I hope pin assertions will *also* be processed by web crawlers to
>>> create pin lists which are made available to browsers (via preloaded
>>> lists, secure links, online lookups, etc.)
>>>
>>> In that case, having pins last a month (instead of shorter) keeps
>>> the frequency of re-crawling sites and re-downloading pin lists
>>> manageable.  Longer pins wouldn't be a big improvement.#
>>
>> The web crawler idea could be interesting as a solution to early pin
>> expiry if we would have a hard limit in the RFC, but only if _all_
>> browsers will implement and use them. Which from my current
>> understanding is not on the horizon. At least I have seen no such
>> indications. Otherwise you get the varying implementations through
>> "creative approaches" you are worried about down below (and which I
>> don't like either).
>>
>> And maybe a question to go a step further:
>> Would you agree that if we would do a 30-day hard limit as you
>> propose, this would basically mean that all less frequent
>> banking/paypal/... users MUST (or a very strong SHOULD) use such a
>> web crawler to make sure that their pin has not expired before they
>> come back?
>> This would be a big problem in my eyes, as IMHO this assumption can
>> not be guaranteed nor expected to be rolled out consistently.
>
> There is an alternative to the web crawler (although the crawler would
> be better). Your browser could refresh the pins in the background. If
> the pin is about to expire (say, in 7 days) and you have an Internet
> connection, the browser can silently open a connection to the server,
> see that the SSL handshake fits the pin, and refresh the entry in the
> local pin database. This won't scale very well if every site on the
> Internet has pins, but I don't really expect anyone to note more than
> several tens of pins (banking sites, some government, maybe things
> that accept credit cards). With less than 100 sites, you can make do
> with noting 3-4 pins per day, which shouldn't consume too much traffic.

Interesting idea.
And could this maybe also solve Trevor's concerns?

E.g. we could add to the spec some implementation advise, like "even if
the user does not visit the pinned sites, the browser SHOULD attempt in
the background to refresh recognized pins if they are about to expire or
before 30 days have passed...."

That way, pinning updates would come in earlier even though the visit is
maybe only monthly.
Could possibly solve Trevor's use cases #2 and #3?

Note: I would still not want the 30 day hard limit in the spec, because
I feel that this can give results that will be unexpected from a user
point of view...

Best regards, Tobias


>
> I guess browsers would stop refreshing pins if you don't visit the
> site for a year.
>
> Yoav
>