> Specifically, it is the use of a 301 as specified in Section
> 7.2.  If a UA requests initially visits a site like www.paypal.com, it would
> not know if the host is an HSTS host or not.  Use of 301 is not secure and
> the user agent could be maliciously redirected to someplace other than a
> site owned by PayPal, for example.

Yes, this is well-understood and (prominently) noted in the security considerations...

###
14.6.  Bootstrap MITM Vulnerability

   The bootstrap MITM (Man-In-The-Middle) vulnerability is a
   vulnerability users and HSTS Hosts encounter in the situation where
   the user manually enters, or follows a link, to an unknown HSTS Host
   using a "http" URI rather than a "https" URI.  Because the UA uses an
   insecure channel in the initial attempt to interact with the
   specified server, such an initial interaction is vulnerable to
   various attacks (see Section 5.3 of [ForceHTTPS]).

   NOTE:  There are various features/facilities that UA implementations
          may employ in order to mitigate this vulnerability.  Please
          see Section 12 "User Agent Implementation Advice".
###


Plus, this spec is now a done deal.


However, the notion of devising some means for declaring general (web) host security policy and capabilities is one that's been discussed in various contexts (it's the question you're begging in your msg, IMV) -- and, yes, that's something to (now) put more cycles into thinking about.

=JeffH




_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to