On Wed, Jan 3, 2018 at 6:45 AM, Mateusz Jończyk <[email protected]> wrote:

> W dniu 03.01.2018 o 14:19, Eric Rescorla pisze:
> > I have several comments:
> >
> > - This is almost entirely out of scope for TLS, so you should start with
> > CAPPORT. If they're interested, then we can discuss the code point
> assignment in
> > TLS.
> >
> > - You point #2 would effectively require either changes to the browser
> or CA
> > issuance policies (the BRs would prohibit issuing to an entity under
> these
> > conditions). I'm not sure that browser manufacturers would be excited
> about
> > either set of changes. Resolving this seems like a threshold question
> for this
> > proposal.
>
> It could be possible for providers to obtain certifiates for subdomains
> such as
> opendns.access_administratively_disabled.net. Then the server reachable at
> access_administratively_disabled.net would provide a certificate for
> opendns.access_administratively_disabled.net, which would be incorrect but
> browsers would in this special case trust it.
>

Well, this seems like the first arm, in which you change the browser, so
the question
then becomes whether the browsers wish to do so. Are you aware of any
browser vendor which is interested?


> It seems like there are going to be rather a large number of such
> > entities (every Firewall in the world?) so it may not be practical.
>
> Firewall and blocking list providers would deploy their own
> access_administratively_disabled.net servers. For example, Microsoft is
> providing their own filtering solution (which is called Microsoft Forefront
> Threat Management Gateway) [1] and it could deploy one
> access_administratively_disabled.net server globally.
>

And how would this work if the firewall admin wants to add their own list
of sites to be blocked?

-Ekr


>
> [1] http://msdn.microsoft.com/en-us/library/ff827462(v=vs.85).aspx
>
> Greetings,
> Mateusz Jończyk
>
> >
> >
> >
> >
> > -Ekr
> >
> >
> >
> > On Wed, Jan 3, 2018 at 4:48 AM, Mateusz Jończyk <[email protected]
> > <mailto:[email protected]>> wrote:
> >
> >     Hello,
> >     Based on Your feedback (for which I am grateful) I have designed a
> new version
> >     of the access_administratively_disabled mechanism.
> >
> >     1. One new AlertDescription value should be specified:
> >     access_administratively_disabled.
> >
> >     2. The information why the webpage is blocked is specified at the URL
> >     https://access_administratively_disabled.net?d=${domain_name}
> >     <https://access_administratively_disabled.net?d=${domain_name}> as
> a simple
> >     string.
> >
> >     3. Certificates for access_administratively_disabled.net
> >     <http://access_administratively_disabled.net> are assigned in a
> >     non-usual way: any big entity that blocks websites (e.g. OpenDNS)
> may get a
> >     certificate for access_administratively_disabled.net
> >     <http://access_administratively_disabled.net> provided that their
> >     identity is validated (i.e. in an Extended-Validation way). The list
> of entities
> >     that received certificates for this domain would be made public and
> managed by
> >     IANA. This way the risk of phishing would be eliminated.
> >
> >     4. Any entity that is blocking some websites would redirect traffic
> for
> >     access_administratively_disabled.net
> >     <http://access_administratively_disabled.net> to their own servers.
> >
> >     5. After getting an access_administratively_disabled warning a
> browser would
> >     open https://access_admininistratively_disabled.net?d=${domain_name}
> >     <https://access_admininistratively_disabled.net?d=${domain_name}> ,
> validate
> >     its certificate and display to the user information: what get
> blocked, by whom
> >     and why.
> >
> >     6. If https://access_administratively_disabled.net
> >     <https://access_administratively_disabled.net> would not have a
> valid
> >     certificate, the browser would only display that the website is
> being blocked,
> >     without giving any reason.
> >
> >     7. IANA or someone else would provide a default
> >     https://access_administratively_disabled.net
> >     <https://access_administratively_disabled.net> service for the
> public internet.
> >
> >     This mechanism would provide blocking transparency without affecting
> security.
> >
> >     Greetings,
> >     Mateusz Jończyk
> >
> >
>
>
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to