Opened 11 years ago
Closed 10 years ago
#7 closed defect (fixed)
clarify and add examples/justification wrt connection termination due to tls warnings/errors
| Reported by: | jeff.hodges@… | Owned by: | =JeffH |
|---|---|---|---|
| Priority: | major | Milestone: | |
| Component: | strict-transport-sec | Version: | |
| Severity: | Active WG Document | Keywords: | |
| Cc: |
Description
http://www.ietf.org/mail-archive/web/websec/current/msg00045.html
Subject: Re: [websec] Some questions about HSTS
From: "Steingruebl, Andy" <asteingruebl@…>
Date: Mon, 22 Nov 2010 09:57:21 -0700 (08:57 PST)
To: Yoav Nir <ynir@…>, "'websec@…'" <websec@…>
In sections 2.4.1.1, point #9 says:
- UAs need to prevent users from clicking-through security
warnings. Halting connection attempts in the face of secure
transport exceptions is acceptable.
What exactly are these secure transport exceptions? Expired certificates?
Mismatched FQDN? Revoked certificates? Unreachable CRL? Untrusted CA?
Self-signed?
Anything that would currently pop a browser warning for a user currently. Browsers differ slightly in how they handle OCSP, etc. In any case where a browser has already made the policy decision it should show a certificate "error", it must now abort.
Also, I don't understand why this change is needed. HSTS is supposed to stop
a very specific attack vector - a user duped into using insecure HTTP over the
(presumably secure) HTTPS.
As it is, HSTS cannot be used by servers with self-signed or corporate
certificates, for fear that user agents may not allow the user to browse.
That is correct. I personally believe, as do several of the contributors on this (and I hope I'm not speaking too much out of turn) that self-signed certificate warnings are just a punt, and an easy way for a user to make a bad security decision. If you want to support HTTPS, do it with a cert that your browser already trusts. Anything else is just a recipe for a MiTM attack. If a host advertises HSTS, it is specifically opting into this scheme, whereby all certificate warnings will cause abort, with no chance to "fool" the user into making the wrong decision.
Change History (2)
comment:1 Changed 11 years ago by jeff.hodges@…
comment:2 Changed 10 years ago by jeff.hodges@…
- Resolution set to fixed
- Status changed from new to closed
![(please configure the [header_logo] section in trac.ini)](https://www.ietf.org/images/ietflogotrans.gif)
see also....
http://www.ietf.org/mail-archive/web/websec/current/msg00063.html
Subject: Re: [websec] Some questions about HSTS
From: Adam Barth <ietf@…>
Date: Mon, 22 Nov 2010 22:06:24 -0800
To: Yoav Nir <ynir@…>
Cc: "websec@…" <websec@…>
On Mon, Nov 22, 2010 at 9:46 PM, Yoav Nir <ynir@…> wrote:
I don't recommend using HSTS with self-signed certificates. In this
scenario, I'd recommend the corporation install a root certificate in
all machines owned by the corporation and then use that root
certificate to issue whatever other certificates the corporation
needs.
Folks are already in for a headache if they let their certificates
expire. They'll get big nasty warnings in either case. The
difference is only whether those warnings will let the user ignore
them.
If you don't think your organization is sufficiently competent to
schedule a reminder to update its certificates, then I don't recommend
using HSTS.
Indeed. Please don't use HSTS with self-signed certificates. HSTS is
a feature for well-maintained web sites that have a need for strong
security. The reason we designed HSTS was to differentiate between
sites that actually want strong security and sites that are using TLS
but don't have strong security needs. If you don't need strong
security, you don't need HSTS (and the additional careful
administration it requires).
I don't think user agents should offer such a configuration flag.
They do what the spec says. TLS errors on HSTS hosts are treated as
fatal errors, much like the host's DNS name not resolving. There is
no recourse except to reload the page.
Adam
###
http://www.ietf.org/mail-archive/web/websec/current/msg00304.html
Subject: Re: [websec] Decouple HSTS's two orthogonal effects?
From: Adam Barth <ietf@…>
Date: Tue, 29 Mar 2011 13:58:08 -0700
To: websec@…
There's no coupling between HSTS and the particular algorithm a UA
uses to verify certificates. The UA is free to use whatever
verification mechanism it desires. You can remove whatever CAs you
consider sloppy from the list of trusted certificate authorities and
add in whatever other verification mechanism you like.
For example, if/when certificate verification through DNSSEC becomes
widespread, we won't need to change anything about the HSTS spec. Of
course, we'll need to change our implementations, but that's true
regardless of what the HSTS spec says.
Adam