[ resent with correct Subject: ]
Hi Alexey, thanks for the review, apologies for latency.
> The two directives defined in this specification are described below.
> The overall requirements for directives are:
>
> o The order of appearance of directives is not significant.
>
> o All directives MUST appear only once in an STS header field.
>
> o Directive names are case-insensitive.
>
> o UAs MUST ignore any STS header fields containing directives that
> do not conform to their ABNF definition.
>
> Should this list also say something about how unrecognized directives
> should be treated? I.e. are they ignored by default, is the whole
> STS header field ignored, etc.
Does the last bullet item above not address those questions?
> Additional directives extending the semantic functionality of the STS
> header field may be defined in other specifications (which "update"
> this specification),
>
> Is this a requirement on future extensions?
> (In general "updating" this specification using Updates: in the header
> of the relevant RFC
> is a) a heavy weight mechanism (it prevents Experimental extensions) and
> b) this seems
> like a wrong mechanism anyway, as Updates usually means that the
> document being
> updated can't be implemented without the document which updates it.)
We can place in the above para whatever we/you/ourADs wish. Suggestions welcome.
> 8.3. Errors in Secure Transport Establishment
>
> When connecting to a Known HSTS Host, the UA MUST terminate the
> connection (see also Section 11 "User Agent Implementation Advice",
> below) if there are any errors (e.g., certificate errors), whether
> "warning" or "fatal" or any other error level, with the underlying
> secure transport. This includes any issues with certificate
> revocation checking whether via the Certificate Revocation List (CRL)
> [RFC5280], or via the Online Certificate Status Protocol (OCSP)
> [RFC2560].
>
> This was discussed in Paris, but I had this in my notes already and would
> like to emphasize this: I assume that explaining the reason for the failure
> to the user (without letting the user to opt-out) is Ok? I think the
> document
> needs to make it clear that this is not prohibited.
the above is being discussed in the "Showing errors in HSTS" thread.
> 10.3. Implications of includeSubDomains
>
> For example, certification authorities often offer their CRL
> distribution and OCSP services over plain HTTP, and sometimes at a
>
> The first use of OCSP needs an Informative reference.
It's referenced way up at beginning of spec, but now ref'd here also in my -07
working copy.
> subdomain of a publicly-available web application which may be
> secured by TLS/SSL. For example, <https://example-ca.com/> is a
> publicly-available web application for "Example CA", a certification
> authority. Customers use this web application to register their
> public keys and obtain certificates. Example CA generates
> certificates for customers containing
> <http://crl-and-ocsp.example-ca.com/> as the value for the "CRL
> Distribution Points" and "Authority Information Access:OCSP"
> certificate fields.
>
> 13. Internationalized Domain Names for Applications (IDNA): Dependency
> and Migration
>
> IDNA2008 obsoletes IDNA2003, but there are differences between the
> two specifications, and thus there can be differences in processing
> (e.g., converting) domain name labels that have been registered under
> one from those registered under the other. There will be a
> transition period of some time during which IDNA2003-based domain
> name labels will exist in the wild. User agents SHOULD implement
> IDNA2008 [RFC5890] and MAY implement [RFC5895] (see also Section 7 of
> [RFC5894]) or [UTS46] in order to facilitate their IDNA transition.
>
> I might be kicking a dead horse here, but MAY sounds a bit weak.
> I especially dislike having the choice between 2 incompatible specs,
> I think this might cause some interop problems.
As far as I can tell, having had fairly extensive discussions with IDNA folk
both privately and on various lists such as idna-update@, the above relects the
the unfortunate state of the world at this time. For instance, Pete Resnick
signed off on the language in the spec in this message to websec@...
Re: [websec] wrt IDN processing-related security considerations for
draft-ietf-websec-strict-transport-sec
https://www.ietf.org/mail-archive/web/websec/current/msg01015.html
we should probably fork off any further discussion on this topic to that thread.
> Also, does "in order to facilitate their IDNA transition" apply
> to the second reference or to both references?
It applies to both. One may implement [RFC5895] /or/ [UTS46] to facilitate
one's IDNA transition (as I understand it).
again, followups on this item and the above should probably be in the "Re:
[websec] wrt IDN processing-related security considerations for
draft-ietf-websec-strict-transport-sec" thread here on websec@.
> In Section 14.5: NTP needs an Informative Reference.
fixed in my -07 working copy.
> 15. IANA Considerations
>
> Below is the Internet Assigned Numbers Authority (IANA) Provisional
>
> I think here (and below) we should use "Permanent" registration for this
> header field.
>
> Message Header Field registration information per [RFC3864].
>
> Header field name: Strict-Transport-Security
> Applicable protocol: HTTP
> Status: provisional
> Author/Change controller: TBD
> Specification document(s): this one
fixed in my -07 working copy
thanks again,
=JeffH
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec