On Tue, May 13, 2014 at 2:09 PM, Chris Palmer <[email protected]> wrote:
>
> PKP vs. PKP-RO:
> https://code.google.com/p/key-pinning-draft/source/detail?r=994a00dc31bf2cca6f3edea29871a6a4f18090f9

The new text about PKP-RO in 2.5 (quoted below) seems to say that a
PKP-RO header is only evaluated against the current connection, not
stored as a pin.  I thought we decided the opposite (which is what I
think 2.3.2 is saying):

2.3.2 (existing text):
  If a Host sets both the Public-Key-Pins header and the Public-Key-
   Pins-Report-Only header, the UA MUST note and enforce Pin Validation
   as specified by the Public-Key-Pins header, and SHOULD note the Pins
   and directives given in the Public-Key-Pins-Report-Only header.

2.5 (new text):
    The UA SHOULD NOT note any pins or other policy expressed in the PKP-
    RO response header field.


> Interactions with built-in pins:
> https://code.google.com/p/key-pinning-draft/source/detail?r=bbf42b1e5e9b49a8cdf193f9c7fe230d0d290543
>
> Cookie security considerations:
> https://code.google.com/p/key-pinning-draft/source/detail?r=7b4474e7d3666f1aebb3f1bcde69bf552aa65d78

Those look OK to me.

Trevor

_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to