Re: [websec] Certificate Pinning via HSTS (.txt version)
Marsh Ray <marsh@extendedsubset.com> Tue, 13 September 2011 22:28 UTC
Return-Path: <marsh@extendedsubset.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88CA621F8CAE for <websec@ietfa.amsl.com>; Tue, 13 Sep 2011 15:28:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.576
X-Spam-Level:
X-Spam-Status: No, score=-2.576 tagged_above=-999 required=5 tests=[AWL=0.023, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0EHV9BCW4RQO for <websec@ietfa.amsl.com>; Tue, 13 Sep 2011 15:28:12 -0700 (PDT)
Received: from mho-02-ewr.mailhop.org (mho-04-ewr.mailhop.org [204.13.248.74]) by ietfa.amsl.com (Postfix) with ESMTP id 7136E21F8CA5 for <websec@ietf.org>; Tue, 13 Sep 2011 15:28:07 -0700 (PDT)
Received: from xs01.extendedsubset.com ([69.164.193.58]) by mho-02-ewr.mailhop.org with esmtpa (Exim 4.72) (envelope-from <marsh@extendedsubset.com>) id 1R3bUa-000I9T-W3; Tue, 13 Sep 2011 22:30:13 +0000
Received: from [192.168.1.15] (localhost [127.0.0.1]) by xs01.extendedsubset.com (Postfix) with ESMTP id A13376067; Tue, 13 Sep 2011 22:30:11 +0000 (UTC)
X-Mail-Handler: MailHop Outbound by DynDNS
X-Originating-IP: 69.164.193.58
X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/mailhop/outbound_abuse.html for abuse reporting information)
X-MHO-User: U2FsdGVkX1+Z/9pm0yhs22lMX4VrPlT5s6dS7r4ZSfM=
Message-ID: <4E6FD975.9010502@extendedsubset.com>
Date: Tue, 13 Sep 2011 17:30:13 -0500
From: Marsh Ray <marsh@extendedsubset.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.21) Gecko/20110831 Thunderbird/3.1.13
MIME-Version: 1.0
To: davidillsley@gmail.com
References: <4E6E9B77.1020802@KingsMountain.com> <4E6F9DC6.2080006@stpeter.im> <FA8A58ED-DD2B-446B-9F01-9D1D25140569@checkpoint.com> <4E6FB7CB.3020309@extendedsubset.com> <CAOuvq20H+pG1AF0u-=-Ow9oR=uGRb-wDwrFE6dPmT=HbvnO6VA@mail.gmail.com> <6D3E0CA6-E990-4D89-9AEE-C03066D0656E@gmail.com>
In-Reply-To: <6D3E0CA6-E990-4D89-9AEE-C03066D0656E@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] Certificate Pinning via HSTS (.txt version)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Sep 2011 22:28:17 -0000
On 09/13/2011 04:24 PM, davidillsley@gmail.com wrote: > > On 13 Sep 2011, at 21:35, Chris Palmer wrote: >> <snip> >> sites; small sites may have to choose no pinning or potentially >> bricking their site (up to the maxAge window). This is not worse than >> the status quo.""" > > What about sites which don't currently use https at all? The DNS records > for theregister.co.uk <http://theregister.co.uk> were redirected the > other week. An attacker who could do that could redirect to https, then > set a very long max-age pin. At that point, they'd be dependent on the > browser vendor unpinning affected users, right? Wouldn't they have to acquire a valid cert first? Not saying that's out of the realm of possibility, but... I think you have a point. The whole premise of this is that there are circumstances under which some attacker can obtain such a cert. If this feature translates to a risk of perma-DoS for the (100.0 - epsilon)% of sites that don't adopt it immediately then it may be more dangerous than it's worth. Consider an adversarial country like, say, Bananastan. They have an ISP or three, their own CA, and of course, no sense of humor. They may one day be subject to some criticisms in the online press which they perceive as unfair. Or maybe something on a video sharing site is contrary to their customs and traditions. So their local judge orders their local ISP to block the offending media provider. The ISP does this by advertising more specific BGP routes for the video site's netblocks(1). Being mostly streaming data of little consequence, the video site has not yet set up HSTS or even has full support for HTTPS (2). The ISP also sets the country's DNS resolvers to reply to name requests for the site with an IP address of a webserver where citizens can receive educational information(3). To be sure they get everybody, they do something I didn't know could be done with DNS (4). In order to save the the misguided users that accidentally used a subversive https: bookmark, the court orders the local CA to "do what it takes to make it work"(5). And just to be sure the message sticks, they set a long term HSTS pin on this cert and/or their CA (6). Hilarity ensues. - Marsh 1. YouTube - Pakistan - 2008 http://www.circleid.com/posts/82258_pakistan_hijacks_youtube_closer_look http://www.ripe.net/internet-coordination/news/industry-developments/youtube-hijacking-a-ripe-ncc-ris-case-study 2. http://youtube.com/ 3. http://web.archive.org/web/20060418030141/http://chinadigitaltimes.net/2006/01/image_of_internet_police_jingjing_and_chacha_online_hon.php 4. China - 2010 https://lists.dns-oarc.net/pipermail/dns-operations/2010-March/005260.html http://www.zdnet.co.uk/news/networking/2010/10/11/mystery-of-web-traffic-redirect-to-china-remains-unsolved-40090476/ 5. [...] 6. Why wouldn't this attack work?
- Re: [websec] Certificate Pinning via HSTS (.txt v… =JeffH
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Peter Saint-Andre
- Re: [websec] Certificate Pinning via HSTS (.txt v… =JeffH
- Re: [websec] Certificate Pinning via HSTS (.txt v… Yoav Nir
- Re: [websec] Certificate Pinning via HSTS (.txt v… Daniel Kahn Gillmor
- Re: [websec] Certificate Pinning via HSTS (.txt v… Marsh Ray
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Gervase Markham
- Re: [websec] Certificate Pinning via HSTS (.txt v… Steingruebl, Andy
- Re: [websec] Certificate Pinning via HSTS (.txt v… Marsh Ray
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Phillip Hallam-Baker
- Re: [websec] Certificate Pinning via HSTS (.txt v… davidillsley
- Re: [websec] Certificate Pinning via HSTS (.txt v… Marsh Ray
- Re: [websec] Certificate Pinning via HSTS (.txt v… Phillip Hallam-Baker
- Re: [websec] Certificate Pinning via HSTS (.txt v… davidillsley
- Re: [websec] Certificate Pinning via HSTS (.txt v… SM
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Yoav Nir
- Re: [websec] Certificate Pinning via HSTS (.txt v… Phillip Hallam-Baker