Hi

I thought I would go over the list of issues for HSTS, and got stuck on the 
first one (#4).

The issue headline is as follows "Clarify that HSTS policy applies to entire 
host (all ports)"

The text in draft -01 that addresses this is in section 7.2:
   Note that the implication of the above steps is that the HSTS policy
   applies to all TCP ports on a host advertising the HSTS policy.

I have two issues with this. First, this does not allow to all *TCP* ports, 
only HTTP ports. We don't care about some SSH or FTP port. The text above that 
paragraph does say this, but I would remove sweeping references to TCP.

The other issue is that I can think of a use case where it would be OK to use 
HTTP (no S) on another port, and <disclosure type="full"> my company makes a 
product with such a use case </disclosure>:

A web server might be also running a CA, and that CA may issue a certificate 
for the website. But what is more relevant, the CRL DP for that certificate may 
be co-located with the web site. CRLs (or OCSP responses) need to received in 
the clear, otherwise you have a bootstrapping problem, so in that case, 
fetching the CRL needs an exception, even though it is to a host that 
advertises HSTS.

I don't believe this is really an issue for implementers. Fetching CRLs is 
usually done in a different context from the fetching of content, and the same 
could be said for hash&URL schemes that some are proposing for TLS, but I think 
we should explicitly say that this should apply only to HTTP application 
content.

Yoav
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to