Reading over the new draft I was thinking of the privacy considerations of
HPKP. A few thoughts:

(a) Obviously the state of a user's pin store contains a lot of information
about their browsing history. This is a primary concern.

(b) A clever site could use this as a tracking mechanism to evade
third-party cookie limits or other restrictions. For example, a tracking
domain could have a set of N public keys available for use, pin different
users to a unique sets of them, and then be included as N resources on a
third-party page. By noting which TLS connections lead to actual data
transfers, they can identify the user uniquely. This is an exotic threat
model, perhaps, but it might become interesting if protection against other
forms of third-party tracking improves.

(c) Potentially HPKP could be used for history sniffing, though I can't
think of a way to do this without the adversary having network-level access
and malicious certificats for the target domain.

Thinking of (a) and (b) is it worth adding a section to the spec on privacy
considerations? The high points would be that (a) Browsers SHOULD remove
dynamic pins for a domain whenever users request deletion of other
browser-history state for that domain, such as a "clear history" request or
the end of a private browsing session. (b) Browsers MAY decline to note
pins for privacy reasons for third-party domains while browsing, similar to
third-party cookie policies.

Joe
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to