Re: [websec] Sites with Key Pinning Headers (not preloaded pins)

Pawel Krawczyk <pawel.krawczyk@hush.com> Thu, 08 January 2015 15:50 UTC

Return-Path: <pawel.krawczyk@hush.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87ACE1A8AAA for <websec@ietfa.amsl.com>; Thu, 8 Jan 2015 07:50:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.301
X-Spam-Level:
X-Spam-Status: No, score=-2.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x4h3ZluoK1EZ for <websec@ietfa.amsl.com>; Thu, 8 Jan 2015 07:50:29 -0800 (PST)
Received: from smtp1.hushmail.com (smtp1.hushmail.com [65.39.178.135]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76B5A1A7005 for <websec@ietf.org>; Thu, 8 Jan 2015 07:50:29 -0800 (PST)
Received: from smtp1.hushmail.com (localhost [127.0.0.1]) by smtp1.hushmail.com (Postfix) with SMTP id 3489B402AD for <websec@ietf.org>; Thu, 8 Jan 2015 15:50:35 +0000 (UTC)
X-hush-tls-connected: 1
Received: from smtp.hushmail.com (w7.hushmail.com [65.39.178.32]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp1.hushmail.com (Postfix) with ESMTPS; Thu, 8 Jan 2015 15:50:33 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Pawel Krawczyk <pawel.krawczyk@hush.com>
In-Reply-To: <54AE6825.7010203@it.aoyama.ac.jp>
Date: Thu, 08 Jan 2015 15:50:23 +0000
Content-Transfer-Encoding: quoted-printable
Message-ID: <de9d5e4f018cc7a27de33e2ab966c5e5@smtp.hushmail.com>
References: <CAH8yC8=XEr9q8VHarucKa0rVqSPt3=oDzDRWXA3_u4rkhpZmoQ@mail.gmail.com> <8E436DD1-8EFB-4270-81CA-717B0FDD9A4F@gmail.com> <54AE6825.7010203@it.aoyama.ac.jp>
To: "\"Martin J. Dürst\"" <duerst@it.aoyama.ac.jp>
X-Mailer: Apple Mail (2.1993)
Archived-At: <http://mailarchive.ietf.org/arch/msg/websec/wb-EJxpPcz-ssruzbeUUb00zUBY>
Cc: Chris Evans <cevans@google.com>, IETF WebSec WG <websec@ietf.org>, Ryan Sleevi <sleevi@google.com>
Subject: Re: [websec] Sites with Key Pinning Headers (not preloaded pins)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec/>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Jan 2015 15:50:31 -0000

27 of them found here http://webcookies.org/http-headers/public-key-pins/

> On 8 Jan 2015, at 11:21, Martin J. Dürst <duerst@it.aoyama.ac.jp> wrote:
> 
> Hello Chris, Chris, Ryan, and everybody,
> 
> A student of mine is working on a small client-side implementation of key pinning. For testing, we would like to know sites that already send the respective headers (Public-Key-Pins and/or Public-Key-Pins-Report-Only). Any replies on the list or in private appreciated.
> 
> Regards,   Martin.
> 
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec
> 


-- 
Pawel Krawczyk
pawel.krawczyk@hush.com +44 7879 180015
CISSP, OWASP