On Mon, Sep 22, 2014 at 5:56 AM, Henri Sivonen <[email protected]> wrote:

>> -- HTTP Strict Transport Security
>
> Yes, but I think this requirement shouldn't apply to subresources for
> the page to qualify, since top-level HSTS together with the "No mixed
> content" requirement mean that there's no sslstrip risk for embedded
> resources even if they are served from a non-HSTS CDN.

These days we're blocking loads of active mixed content, but passive
mixed content is still a concern to me. E.g. an attacker can mangle a
web app's UI pretty badly, including to perform attacks, if the app
gets its icons and buttons via SSLstrip-able sources.

>> -- HTTP Public Key Pinning
>
> I'm a bit worried about this one. I'd like the bar for this indicator
> to be such that it can motivate anyone with nginx to configure it
> right. This way, the new indicator could have a broad impact beyond
> just the largest sites. It's not clear to me if HPKP is practical for
> sites without Google/Twitter-level ops teams.

HPKP is indeed dangerous.

I don't anticipate any additional UI for it, let alone additional UI
that would motivate a not-ready-yet ops team to turn it on.

> It seems to me that it's at least currently impractical for small
> sites to get CAs to commit to issue future certs from a particular
> root or intermediate, so it seems to me that especially pinning an
> intermediate is hazardous unless you are big enough a customer of a CA
> to get commitments regarding future issuance practices.

Intermediates move slowly, and roots even more slowly. It's fairly
safe to assume that, for the lifetime if your end-entity cert, the CA
will still be operating, and if that they can and will cross-sign in
cases where they re-key heavily-used issuing certs.

But, yeah, have a backup pin, and pin at various places in the
certificate chain. I'd advise people to look at
net/http/transport_security_state_static.json and consider what
Dropbox, Google, Twitter, and Tor have done, and why.

> It's unclear to me if HPKP makes it safe and practical to use without
> actually forming a business relationship with two CAs in advance
> (which would be impractical for many small sites). It seems to me that
> HPKP makes it possible to generate a backup end-entity key pair in
> advance of having it certified. However, the spec itself discourages
> end-entity pinning altogether and it's pretty scary to pin a key
> before you know for sure you can get it certified by a CA later.

I wouldn't say we discourage EE pinning; but I would discourage
pinning EEs *exclusively*.

> (In some way, it seems like HPKP is the simplest thing that makes
> sense for Google, which has its own intermediate, but for the rest of
> us, being able to maintain a TACK-style signing key *to the side of*
> the CA-rooted chain would be better. What's the outlook of us
> supporting TACK or some other mechanism that allows pinning a
> site-specific signing key that's not part of the CA-rooted chain?)

I consider a backup pin to be enough like an "on the side" pin. But,
however, you may not.

>> -- Certificate Transparency
>
> Are we planning to support CT now? (I'm not stating an opinion for or
> against. I'm merely surprised to see CT mentioned as if it was
> something we'd support, since I don't recall seeing previous
> indications that we'd support it.)

I devoutly hope Mozilla does support CT.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to