Hi,

As mentioned just now in the Websec WG meeting.

At least one client supporting HSTS (maybe more) is using a hardcoded list of sites that are always HSTS enabled, as a method of countering the bootstrap problem.

As I understand it, the process for how a website get on such lists is currently very ad hoc, which isn't really a problem at this time, since it is experimental.

However, once HSTS moves into standardized deployment, it may be that many websites will want to get listed on such a list, which created a few scalability problems:

  - Number of clients maintaining such lists
  - Number of sites that want to get on such lists.

While HSTS is not going have the same problem severity, a similar problem exists in a more limited fashion, in the deployment of Root Certificates, where it causes some interoperability problems when sites use a Root Certificate not deployed in all clients (properly deployed HSTS will not run into those, but might encounter downgrade attacks).

For HSTS I expect that the number of websites wanting to get on the list(s) is going to number in the thousands (with one million sites, even 0.1% is 1000), which is likely to cause trouble for the maintainers of the list(s). However, the website administrators might also run into trouble locating all the lists they want to be on, and notifying them about their intention.

The first question the websec group need to answer is whether or not it should define how such a hardcoded list should work?

If the answer is yes, how should it be maintained? Should it be a single central repository? Who should host it and accept applications?

My thought is that there should at most be only a few such repositories, and that the process of getting listed should be as automatic as possible, while avoiding fraudulently added entries.

A strawman for such a automatic system could be that the website administrator submits a list of servers/domains that are to be HSTS enabled, digitally signed using (one of) the website's own certificate, chained to a list of approved CAs (which opens up another problem area of selecting those CAs). When approved the list is updated with the new entries, and then distributed to the relying parties. Using a digitally signed submission will make it harder to submit a fraudulent application, preventing a denial of service attack.


--
Sincerely,
Yngve N. Pettersen

********************************************************************
Senior Developer                     Email: [email protected]
Opera Software ASA                   http://www.opera.com/
Phone:  +47 24 16 42 60              Fax:    +47 24 16 40 01
********************************************************************
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to