You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mnot: Julian and I worked through issues list yesterday. Work from the bottom up.
24
20
25
-
##[Alt-Svc alternative cache invalidation #16] (https://github.com/httpwg/http-extensions/issues/16)
21
+
### Alt-Svc alternative cache invalidation #16
26
22
27
23
Julian: while the use case you mentioned would be handled, not convinced all would be. If we need to group alt-svc so they can be independently refreshed, we might need to think of labels
28
24
29
25
mnot: e.g. explicit label field in the header for a group. But complex to implement in clients.
30
26
31
27
Martin Thomson: Rather than identifying the mechanism, identify the source.
32
28
33
-
Mike Bishop: That doesn't entirely make sense to me. Any alt-svc can handle itself. Where it came from is the origin or someone authorized to speak for the origin. Need to think more about what we shoudl do for validation.
29
+
Mike Bishop: That doesn't entirely make sense to me. Any alt-svc can handle itself. Where it came from is the origin or someone authorized to speak for the origin. Need to think more about what we should do for validation.
34
30
35
-
mnot: We know we need something, not sure what its shape should be. In the past, we've tended to overdesign. Keep it simple.
31
+
mnot: We know we need something, not sure what its shape should be. In the past, we've tended to over-design. Keep it simple.
36
32
37
33
Patrick McManus: Operationally, seems a bit confusing to have two elements from the same origin, different sources
38
34
@@ -68,11 +64,11 @@ Erik: here, we probably want to make explicit
68
64
69
65
Martin: if no other preference, lexical ordering
70
66
71
-
## ALPN identifiers in Alt-Svc #43
67
+
###ALPN identifiers in Alt-Svc #43
72
68
73
69
mnot: marked as editor-ready. Do we need to discuss?
74
70
75
-
## need to define extensibility for alt-svc parameters #69https://github.com/httpwg/http-extensions/issues/69
71
+
###need to define extensibility for alt-svc parameters #69
76
72
77
73
mnot: conventional would be to make must-ignore
78
74
@@ -91,7 +87,7 @@ Mike: Issue 71, one proposal was to kick that out to extension, so we'd need a r
91
87
92
88
mnot: ok, establish registry
93
89
94
-
## 71. Persistence of alternates across network changes alt-svc design
90
+
###71. Persistence of alternates across network changes alt-svc design
95
91
96
92
mnot: it would be nice to have an option to say whether alt-svc should be flushed. Do we need to define that extension now, or defer?
97
93
@@ -103,23 +99,22 @@ mnot: any objections?
103
99
104
100
mnot: add a parameter to do this now.
105
101
106
-
## 73 Alt-Svc: Elevation of privilege alt-svc design
102
+
###73 Alt-Svc: Elevation of privilege alt-svc design
107
103
108
-
mnot: we currently allow someone to advertise alternative on same origin without strongly authenticating. Designed for oppsec so you don't need a valid cert. Is this reasonable?
109
-
one suggestion, disallow advertising port higher than privileged ports if origin is on privileged port;
104
+
mnot: we currently allow someone to advertise alternative on same origin without strongly authenticating. Designed for oppsec so you don't need a valid cert. Is this reasonable? one suggestion, disallow advertising port higher than privileged ports if origin is on privileged port.
110
105
111
106
Martin: Another potential attack if you have untrusted actor on your host. if you have cluster, id one node on the cluster, someone can target all the traffic to one node as DDOS
112
107
I don't like the segregation on 1024, but might be ok
113
-
alternative, if you see alt-svc frame, you might ignore header, on the ground that server is capbable of sending frame. header less trusted.
108
+
alternative, if you see alt-svc frame, you might ignore header, on the ground that server is capable of sending frame. header less trusted.
114
109
115
110
mnot: should we treat localhost specially? ongoing discussion in webappsec about mixed content in local host.
116
111
117
112
Martin: I might open that issue.
118
113
119
-
Patrick: I don't have a lot of faith in the 1024, but don't storngly object.
114
+
Patrick: I don't have a lot of faith in the 1024, but don't strongly object.
120
115
Another issue I've heard, when changing hosts, verifying certs, right mechanism is CORS, and this violates CORS.
121
116
122
-
mnot: I'd like to hear more, because that's a very differnt layer
117
+
mnot: I'd like to hear more, because that's a very different layer
123
118
124
119
Patrick: DNS rebinding attacks can do the same.
125
120
@@ -131,7 +126,7 @@ mnot: we're really just talking about http urls.
131
126
132
127
Mike: for http, I really don't want to let you move me to a different port without HTTPS, but might be ok
133
128
134
-
mnot: you can alwasy ignore the advertisement
129
+
mnot: you can always ignore the advertisement
135
130
136
131
Martin: What level of advice do we think is appropriate? Do we outline the potential use?
137
132
@@ -145,20 +140,21 @@ Martin: We might describe the risks.
145
140
146
141
mnot: describe the risks and recommend a privilege barrier
147
142
148
-
## 74 Alt-Svc: Alternates of alternates
143
+
###74 Alt-Svc: Alternates of alternates
149
144
150
145
mnot: is everyone comfortable with what's in the issue as "second reading"? Yes.
151
146
152
-
## 75 Alt-Svc header with 421 status alt-svc design
147
+
###75 Alt-Svc header with 421 status alt-svc design
153
148
154
149
Mike: asking you to reverse the text in 421
155
150
156
151
Patrick: it should be flipped to must not
157
152
158
153
mnot: must be ignored.
154
+
159
155
An alt-svc header in a 421 must be ignored.
160
156
161
-
## Alt-Svc and Cert Pinning #76
157
+
###Alt-Svc and Cert Pinning #76
162
158
163
159
mnot [reads]
164
160
spec currently reads must be valid, but not necessarily identical credentials.
@@ -169,10 +165,10 @@ mnot: oppsec is not proof against active attackers in any way. if we start tryin
169
165
170
166
Mike: but here, you're making the attack worse, because you could redirect wth host, have a long-lived alt-svc
171
167
172
-
Martin: we also have guidance about clearing state between networks, particularly for unsecured origins. If you're mitmd once due to cert compromise, high chance in the browser that that can be persisted already.
168
+
Martin: we also have guidance about clearing state between networks, particularly for unsecured origins. If you're mitm'd once due to cert compromise, high chance in the browser that that can be persisted already.
173
169
if you can get something in browser cache, storage, service workers...
174
170
175
-
mnot: oppsec provides no secuirty indicators to user.
171
+
mnot: oppsec provides no security indicators to user.
176
172
177
173
Martin: we can talk about concerns, don't need to change the design
178
174
@@ -183,7 +179,7 @@ Erik: oppsec can't send to a different hostname
183
179
mnot: so even for https origin, we're rooting our trust in the certificate. a bad cert could persist.
184
180
Need to add security considerations and possible mitigations.
185
181
186
-
## 83 Alt-Svc Header - hop by hop
182
+
###83 Alt-Svc Header - hop by hop
187
183
188
184
mnot: any proxy in the way is going to strip it.
189
185
@@ -193,15 +189,15 @@ Martin: I like that you can push this all the way through a proxy. Not consisten
193
189
194
190
mnot: close with no action.
195
191
196
-
## 87 alt-svc response header field in HTTP/2 frame
192
+
###87 alt-svc response header field in HTTP/2 frame
197
193
198
194
Martin: only reason to treat differently if ability to write to header field is less privileged than ability to write to frame.
199
195
200
-
mnot: there may be circumstances where it's intreesting to put it into header.
196
+
mnot: there may be circumstances where it's interesting to put it into header.
201
197
202
198
mnot: no special handling
203
199
204
-
## 89 Using alt-svc on localhost
200
+
###89 Using alt-svc on localhost
205
201
206
202
mnot: do we know enough now?
207
203
@@ -211,7 +207,8 @@ mnot: rough-in some text, discuss with browser security folks.
211
207
212
208
mnot: through with alt-svc issues. lots of work for the editors
mnot: checkpoint. We've only had one browser implementation. TAG F2F and WebAppSec discussions of things that look like oppsec. Have another good look once alt-svc settles down.
217
214
not inclined to publish right away.
@@ -229,10 +226,9 @@ Patrick: lots of parallel paths. I think we all want to wind up at full HTTPS.
229
226
other issues: 3d party content; hosting providers' models; corp behind the firewall.
230
227
I believe there's medium-term value here. Don't want to put oppsec on back burner forever.
mnot: some people have said that's interesting. poll on mailing list said yes, it's useful to make machine-readable. If we're going to differentiate, how?
238
234
header? status code?
@@ -248,8 +244,9 @@ Wendy Seltzer: As a researcher, I think it will be interesting to get differenti
248
244
249
245
mnot: ok, taking back to list.
250
246
251
-
### Potential Work
252
-
## Search method
247
+
## Potential Work
248
+
249
+
### Search method
253
250
254
251
Julian: common webdev question: why can't I use a payload with GET?
0 commit comments