
From alexey.melnikov@isode.com  Wed Feb  1 07:00:41 2012
Return-Path: <alexey.melnikov@isode.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2900111E8089 for <websec@ietfa.amsl.com>; Wed,  1 Feb 2012 07:00:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.138
X-Spam-Level: 
X-Spam-Status: No, score=-102.138 tagged_above=-999 required=5 tests=[AWL=0.461, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id upf1z8rfEehe for <websec@ietfa.amsl.com>; Wed,  1 Feb 2012 07:00:40 -0800 (PST)
Received: from rufus.isode.com (cl-125.lon-03.gb.sixxs.net [IPv6:2a00:14f0:e000:7c::2]) by ietfa.amsl.com (Postfix) with ESMTP id 317AD11E8073 for <websec@ietf.org>; Wed,  1 Feb 2012 07:00:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1328108438; d=isode.com; s=selector; i=@isode.com; bh=/Pw0VyTYIJsLg9Ol0bmZyKAiYcX9DqCa7uRNWdbUXy8=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=K6H359SBtFXa3sI93yV0tHo4BGOpNCEmhjZ3Yi8XzmhKIJOoQb10tqUijHx33jaqfJECv0 2GUP2bLoiNlPVoE8fsTrOuZHgJIqed+mAplW8geC/CFrafTZ3Q1SxXlQiKNnWw++nqXKww 4BksfclO7q8YLG7cJYoa5lgSZ7O7/Gc=;
Received: from [172.16.1.29] (shiny.isode.com [62.3.217.250])  by rufus.isode.com (submission channel) via TCP with ESMTPSA  id <TylTlQAvKFTQ@rufus.isode.com>; Wed, 1 Feb 2012 15:00:38 +0000
Message-ID: <4F295398.1000108@isode.com>
Date: Wed, 01 Feb 2012 15:00:40 +0000
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:8.0) Gecko/20111105 Thunderbird/8.0
To: =JeffH <Jeff.Hodges@KingsMountain.com>
References: <4F288700.3040104@KingsMountain.com>
In-Reply-To: <4F288700.3040104@KingsMountain.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] #36: HSTS: fixup references
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Feb 2012 15:00:41 -0000

On 01/02/2012 00:27, =JeffH wrote:
> Alexey pointed out to me..
Hi Jeff,
> >
> > BTW, you moved lots of references to Informational (e.g. all IDNA
> > related), I think this is incorrect - their understanding is 
> required in
> > order to implement HSTS correctly.
>
> So, yes, I did (ruthlessly) move a ton of references to Informational. 
> I wanted to pare down the Normative references to the absolutely 
> necessary ones.
>
> Wrt IDNA refs, I'm happy to move them back to Normative if that's what 
> folks think. Note that in typical implementations, all the IDN 
> normalizations have occurred before getting to the actual HSTS 
> implementation. there's this text in Section 8. User Agent Processing 
> Model...
>
>    This processing model assumes that the UA implements IDNA2008
>    [RFC5890], or possibly IDNA2003 [RFC3490], as noted in Section 13
>    "Internationalized Domain Names for Applications (IDNA): Dependency
>    and Migration".  It also assumes that all domain names manipulated in
>    this specification's context are already IDNA-canonicalized as
>    outlined in Section 9 "Domain Name IDNA-Canonicalization" prior to
>    the processing specified in this section.
>
>    The above assumptions mean that this processing model also
>    specifically assumes that appropriate IDNA and Unicode validations
>    and character list testing have occurred on the domain names, in
>    conjunction with their IDNA-canonicalization, prior to the processing
>    specified in this section.  See the IDNA-specific security
>    considerations in Section 14.8 "Internationalized Domain Names" for
>    rationale and further details.
>
> So, if folks indeed wish IDN refs to be Normative, I'll move 'em back.
You have normative (RFC 2119) language about use of IDN related 
specifications in the document, IESG statement on normative/informative 
references apply: 
<http://www.ietf.org/iesg/statement/normative-informative.html>.
> Also please point out any other refs y'all think should be in the 
> Normative section but aren't.
>
> thanks,
>
> =JeffH


From Jeff.Hodges@KingsMountain.com  Wed Feb  1 07:34:15 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66C2211E8071 for <websec@ietfa.amsl.com>; Wed,  1 Feb 2012 07:34:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.037
X-Spam-Level: 
X-Spam-Status: No, score=-99.037 tagged_above=-999 required=5 tests=[AWL=-0.956, BAYES_40=-0.185, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lXA0iV7ELrZI for <websec@ietfa.amsl.com>; Wed,  1 Feb 2012 07:34:14 -0800 (PST)
Received: from oproxy6-pub.bluehost.com (oproxy6.bluehost.com [IPv6:2605:dc00:100:2::a6]) by ietfa.amsl.com (Postfix) with SMTP id 9582611E80F7 for <websec@ietf.org>; Wed,  1 Feb 2012 07:34:14 -0800 (PST)
Received: (qmail 29051 invoked by uid 0); 1 Feb 2012 15:34:13 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by cpoproxy3.bluehost.com with SMTP; 1 Feb 2012 15:34:13 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=4IDdgdvFtJcHT5CTLMZkzv4wntuPnrxT7NnP24r7R8M=;  b=dGhxXLL8Qhx7c7mWWpkC5ry08fbpGDVy/zJP6t8PhhHoAHqUje0Hip3HYcB39f1oMCtLrq2PtSNVvfZTKiSaxCO8ARGR5RLzFz1EW9CB7RV3pS/7ZeC9dBJcG2dn9dy6;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.136.48]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1RscCL-0005MC-0A; Wed, 01 Feb 2012 08:34:13 -0700
Message-ID: <4F295B75.9050800@KingsMountain.com>
Date: Wed, 01 Feb 2012 07:34:13 -0800
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.24) Gecko/20111108 Thunderbird/3.1.16
MIME-Version: 1.0
To: Alexey Melnikov <alexey.melnikov@isode.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] #36: HSTS: fixup references
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Feb 2012 15:34:15 -0000

 > You have normative (RFC 2119) language about use of IDN related
 > specifications in the document, IESG statement on normative/informative
 > references apply:
 > <http://www.ietf.org/iesg/statement/normative-informative.html>.

doh!

good point, thanks, will fix.

=JeffH



From ynir@checkpoint.com  Thu Feb  2 14:54:44 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1002F21F8655 for <websec@ietfa.amsl.com>; Thu,  2 Feb 2012 14:54:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.457
X-Spam-Level: 
X-Spam-Status: No, score=-10.457 tagged_above=-999 required=5 tests=[AWL=0.141, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P+ojR53t0ngU for <websec@ietfa.amsl.com>; Thu,  2 Feb 2012 14:54:43 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 305D121F8650 for <websec@ietf.org>; Thu,  2 Feb 2012 14:54:41 -0800 (PST)
X-CheckPoint: {4F2B10D0-0-1B221DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id q12Mse89029860 for <websec@ietf.org>; Fri, 3 Feb 2012 00:54:40 +0200
Received: from il-ex03.ad.checkpoint.com (194.29.34.71) by il-ex01.ad.checkpoint.com (194.29.34.26) with Microsoft SMTP Server (TLS) id 8.3.213.0; Fri, 3 Feb 2012 00:54:40 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex03.ad.checkpoint.com ([194.29.34.71]) with mapi; Fri, 3 Feb 2012 00:54:39 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: IETF WebSec WG <websec@ietf.org>
Date: Fri, 3 Feb 2012 00:54:39 +0200
Thread-Topic: I-D Action: draft-nir-websec-extended-origin-00.txt
Thread-Index: Aczh/aUIQO/LIhDuQAuf+kjfsK/BIA==
Message-ID: <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com>
References: <20120202220021.31936.37346.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: multipart/alternative; boundary="_000_C35E9FBD8AF74F63B7981316B985E032checkpointcom_"
MIME-Version: 1.0
X-KSE-AntiSpam-Interceptor-Info: protection disabled
Subject: [websec] Fwd: I-D Action: draft-nir-websec-extended-origin-00.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Feb 2012 22:54:44 -0000

--_000_C35E9FBD8AF74F63B7981316B985E032checkpointcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi

I have just submitted this draft. The purpose of this is to address the cas=
e where a single portal hides several real servers behind it, by translatin=
g their URLs into URL that seem to be from that server.

In that case the same origin policy is not enforced correctly, because cook=
ies and scripts from one server behind the portal (for example, a mail serv=
er) can be shared and can affect pages form another server behind the same =
portal.

This draft proposes a header that will tell the client (browser) what the r=
eal origin is, and allow the client to apply the SOP.

If people find this interesting, I would like to discuss this in Paris. Any=
 comments will be greatly appreciated.

Yoav

Begin forwarded message:

From: "internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>" <internet=
-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Subject: I-D Action: draft-nir-websec-extended-origin-00.txt
Date: February 3, 2012 12:00:21 AM GMT+02:00
To: "i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>" <i-d-announce@iet=
f.org<mailto:i-d-announce@ietf.org>>
Reply-To: "internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>" <inte=
rnet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>


A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.

Title           : A More Granular Web Origin Concept
Author(s)       : Yoav Nir
Filename        : draft-nir-websec-extended-origin-00.txt
Pages           : 8
Date            : 2012-02-02

  This document defines an HTTP header that allows to partition a
  single origin as defined in RFC 6454 into multiple origins, so that
  the same origin policy applies among them.

  The header introduced in this document allows the portal to specify
  that resources that appear to be from the same origin should, in
  fact, be treated as though they are from different origins, by
  extending the 3-tuple of the origin to a 4-tuple.  The user agent is
  expected to apply the same-origin policy according to the 4-tuple
  rather than the 3-tuple.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-websec-extended-origin-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-nir-websec-extended-origin-00.txt


--_000_C35E9FBD8AF74F63B7981316B985E032checkpointcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; ">Hi<div><br></div><div>I ha=
ve just submitted this draft. The purpose of this is to address the case wh=
ere a single portal hides several real servers behind it, by translating th=
eir URLs into URL that seem to be from that server.</div><div><br></div><di=
v>In that case the same origin policy is not enforced correctly, because co=
okies and scripts from one server behind the portal (for example, a mail se=
rver) can be shared and can affect pages form another server behind the sam=
e portal.</div><div><br></div><div>This draft proposes a header that will t=
ell the client (browser) what the real origin is, and allow the client to a=
pply the SOP.</div><div><br></div><div>If people find this interesting, I w=
ould like to discuss this in Paris. Any comments will be greatly appreciate=
d.</div><div><br></div><div>Yoav<br><div><br><div>Begin forwarded message:<=
/div><br class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div=
 style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-le=
ft: 0px;"><span style=3D"font-family:'Helvetica'; font-size:medium; color:r=
gba(0, 0, 0, 1.0);"><b>From: </b></span><span style=3D"font-family:'Helveti=
ca'; font-size:medium;">"<a href=3D"mailto:internet-drafts@ietf.org">intern=
et-drafts@ietf.org</a>" &lt;<a href=3D"mailto:internet-drafts@ietf.org">int=
ernet-drafts@ietf.org</a>&gt;<br></span></div><div style=3D"margin-top: 0px=
; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;"><span style=3D"=
font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, 0, 1.0);"><b>Su=
bject: </b></span><span style=3D"font-family:'Helvetica'; font-size:medium;=
"><b>I-D Action: draft-nir-websec-extended-origin-00.txt</b><br></span></di=
v><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; mar=
gin-left: 0px;"><span style=3D"font-family:'Helvetica'; font-size:medium; c=
olor:rgba(0, 0, 0, 1.0);"><b>Date: </b></span><span style=3D"font-family:'H=
elvetica'; font-size:medium;">February 3, 2012 12:00:21 AM GMT+02:00<br></s=
pan></div><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px;"><span style=3D"font-family:'Helvetica'; font-size:m=
edium; color:rgba(0, 0, 0, 1.0);"><b>To: </b></span><span style=3D"font-fam=
ily:'Helvetica'; font-size:medium;">"<a href=3D"mailto:i-d-announce@ietf.or=
g">i-d-announce@ietf.org</a>" &lt;<a href=3D"mailto:i-d-announce@ietf.org">=
i-d-announce@ietf.org</a>&gt;<br></span></div><div style=3D"margin-top: 0px=
; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;"><span style=3D"=
font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, 0, 1.0);"><b>Re=
ply-To: </b></span><span style=3D"font-family:'Helvetica'; font-size:medium=
;">"<a href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a=
>" &lt;<a href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org=
</a>&gt;<br></span></div><br><div><br>A New Internet-Draft is available fro=
m the on-line Internet-Drafts directories.<br><br><span class=3D"Apple-tab-=
span" style=3D"white-space:pre">	</span>Title &nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: A More Granular Web Origin Concept<br><spa=
n class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>Author(s) &nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: Yoav Nir<br><span class=3D"Apple-tab-span=
" style=3D"white-space:pre">	</span>Filename &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;: draft-nir-websec-extended-origin-00.txt<br><span class=3D"App=
le-tab-span" style=3D"white-space:pre">	</span>Pages &nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: 8<br><span class=3D"Apple-tab-span"=
 style=3D"white-space:pre">	</span>Date &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: 2012-02-02<br><br> &nbsp;&nbsp;This docume=
nt defines an HTTP header that allows to partition a<br> &nbsp;&nbsp;single=
 origin as defined in RFC 6454 into multiple origins, so that<br> &nbsp;&nb=
sp;the same origin policy applies among them.<br><br> &nbsp;&nbsp;The heade=
r introduced in this document allows the portal to specify<br> &nbsp;&nbsp;=
that resources that appear to be from the same origin should, in<br> &nbsp;=
&nbsp;fact, be treated as though they are from different origins, by<br> &n=
bsp;&nbsp;extending the 3-tuple of the origin to a 4-tuple. &nbsp;The user =
agent is<br> &nbsp;&nbsp;expected to apply the same-origin policy according=
 to the 4-tuple<br> &nbsp;&nbsp;rather than the 3-tuple.<br><br><br>A URL f=
or this Internet-Draft is:<br><a href=3D"http://www.ietf.org/internet-draft=
s/draft-nir-websec-extended-origin-00.txt">http://www.ietf.org/internet-dra=
fts/draft-nir-websec-extended-origin-00.txt</a><br><br>Internet-Drafts are =
also available by anonymous FTP at:<br>ftp://ftp.ietf.org/internet-drafts/<=
br><br>This Internet-Draft can be retrieved at:<br>ftp://ftp.ietf.org/inter=
net-drafts/draft-nir-websec-extended-origin-00.txt<br></div></blockquote></=
div><br></div></body></html>=

--_000_C35E9FBD8AF74F63B7981316B985E032checkpointcom_--

From Jeff.Hodges@KingsMountain.com  Fri Feb 10 15:12:52 2012
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F2E321F8533 for <websec@ietfa.amsl.com>; Fri, 10 Feb 2012 15:12:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.371
X-Spam-Level: 
X-Spam-Status: No, score=-99.371 tagged_above=-999 required=5 tests=[AWL=-0.365, BAYES_05=-1.11, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I4+Oa0IRHppL for <websec@ietfa.amsl.com>; Fri, 10 Feb 2012 15:12:51 -0800 (PST)
Received: from oproxy5-pub.bluehost.com (oproxy5.bluehost.com [IPv6:2605:dc00:100:2::a5]) by ietfa.amsl.com (Postfix) with SMTP id F2A3021F8514 for <websec@ietf.org>; Fri, 10 Feb 2012 15:12:50 -0800 (PST)
Received: (qmail 18748 invoked by uid 0); 10 Feb 2012 23:12:50 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by cpoproxy2.bluehost.com with SMTP; 10 Feb 2012 23:12:50 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=eTAYfOwo5pDgVT+ez6cmovmp5HBowT3GYCATPfY7lT4=;  b=FptPl8ZFwRxMkMScFQBUCnfMRk1Xeqvk1KA3SWUxsNES51AYns1F/x3vjqO2uns39fd9vWjuDt0iyhVbniXhws3E2psWswsFzwX1lI6rmGelEhxY9Gg8ThVvF0CwIapD;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.136.165]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1Rvze5-0002zD-UK; Fri, 10 Feb 2012 16:12:49 -0700
Message-ID: <4F35A472.8060002@KingsMountain.com>
Date: Fri, 10 Feb 2012 15:12:50 -0800
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.26) Gecko/20120131 Thunderbird/3.1.18
MIME-Version: 1.0
To: Pete Resnick <presnick@qualcomm.com>,  Paul Hoffman <paul.hoffman@vpnc.org>, IETF WebSec WG <websec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [websec] wrt IDN processing-related security considerations for draft-ietf-websec-strict-transport-sec
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Feb 2012 23:12:52 -0000

Thanks for reviewing the IDNA text Pete.

 > I really, truly wish we could avoid all reference to 5895 and UTS46.
 > (And this comes from a co-author of the former.) Basically, those
 > documents are about taking user (or other sorts of "unwashed" input) and
 > doing something 'magic' before handing it to something that expects
 > proper IDNs. Really, I'd like this kind of protocol document to say,
 > "What goes is this field is something that is properly pre-processed by
 > whatever handed it to us and if it's bogus, we're not going to do
 > anything to 'help' it."

Note that that's what this spec attempts to do in the intro to section 7..

 >     This processing model assumes that the UA implements IDNA2008
 >     [RFC5890], or possibly IDNA2003 [RFC3490], as noted in Section 11
 >     "Internationalized Domain Names for Applications (IDNA): Dependency
 >     and Migration".  It also assumes that all domain names manipulated in
 >     this specification's context are already IDNA-canonicalized as
 >     outlined in Section 8 "Domain Name IDNA-Canonicalization" prior to
 >     the processing specified in this section.
 >
 >     The above assumptions mean that this processing model also
 >     specifically assumes that appropriate IDNA and Unicode validations
 >     and character list testing have occured on the domain names, in
 >     conjunction with their IDNA-canonicalization, prior to the processing
 >     specified in this section.  See the IDNA-specific security
 >     considerations in Section 13.2 "Internationalized Domain Names" for
 >     rationale and further details.

 > But I understand that this may be "happy
 > thoughts". If you really can't avoid talking about user input processing
 > in this document, I will hold my nose and say no more about it.

yeah, sigh: lacking a more generalized spec laying out all that subsumed 
detail, it seems prudent (from a completeness perspective, at least) to include 
it.  (I brought up concocting such a generalized 
how-shud-app-protocols-do-IDNA(-during-"transition-from-IDNA2003-to-2008") spec 
in the precis WG meeting in Taipei ietf-82, but there was a fair bit of 
pushback on the notion there)

But, if the ADs and IESG were to decide we could get by without such language 
(i.e. section 10 IDNA: Dependency and Migration) in this spec we could excise 
it. (I'll leave it in for now)

thanks again,

=JeffH




From tom@ritter.vg  Thu Feb 16 13:01:42 2012
Return-Path: <tom@ritter.vg>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F77B21F8633 for <websec@ietfa.amsl.com>; Thu, 16 Feb 2012 13:01:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.945
X-Spam-Level: 
X-Spam-Status: No, score=-2.945 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8KZpNj2Bvqff for <websec@ietfa.amsl.com>; Thu, 16 Feb 2012 13:01:38 -0800 (PST)
Received: from mail-ee0-f44.google.com (mail-ee0-f44.google.com [74.125.83.44]) by ietfa.amsl.com (Postfix) with ESMTP id 1B5EB21F8617 for <websec@ietf.org>; Thu, 16 Feb 2012 13:01:37 -0800 (PST)
Received: by eekc41 with SMTP id c41so1103510eek.31 for <websec@ietf.org>; Thu, 16 Feb 2012 13:01:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ritter.vg; s=vg; h=mime-version:from:date:message-id:subject:to:content-type; bh=yzXjAyudlTGgXwv2t8p4UOSVYYKXvUoY64uOD1Bzsjs=; b=azFGy/MkBPO9w4eKk27wCKrkXl7+PJPuU9qj+v5rz+BK3mHeb8Cg09vyekL1ON2Q41 Kf4sx6K50LYxnEgDVY44D9676gViBhTl38xZvT9v81aSYIcPKc+0rCNyQJYzu4+VYbdi s7wZkm7aCK3HYAH6UVcMaGQ2GHPxCMbWe1Phk=
Received: by 10.112.51.193 with SMTP id m1mr1626141lbo.58.1329426097144; Thu, 16 Feb 2012 13:01:37 -0800 (PST)
MIME-Version: 1.0
Received: by 10.112.38.4 with HTTP; Thu, 16 Feb 2012 13:01:17 -0800 (PST)
From: Tom Ritter <tom@ritter.vg>
Date: Thu, 16 Feb 2012 16:01:17 -0500
Message-ID: <CA+cU71ktj6oWYjeqTicefz5oqCeR7Zn-tGNh7yxBMHRdaoywYA@mail.gmail.com>
To: IETF WebSec WG <websec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1
X-Gm-Message-State: ALoCoQm/PI6sGI5TDcvi4+UpD+nW2DvU+Gu0lqew4KEuAQuCcsF1BZ5J6qgBpAFwU0jw+Kqw6nBZ
Subject: [websec] Outstanding Issues on draft-ietf-websec-key-pinning-01
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Feb 2012 21:01:42 -0000

In 2.3, I believe

If the Public-Key-Pins response header field does not meet all four
   of these criteria

should be "all three of these criteria" by my bullet-point count.

To close up the hole with inherited parameters, in 2.2, prior to the
"We pin public keys" note, add:

  If the SubjectPublicKeyInfo of a certificate is incomplete when taken
  in isolation, such as when holding a DSA key without domain parameters,
  a public key pin cannot be formed.

And in 2.4, adding a phrase to the parenthetical comment in the big paragraph :

   If the connection has no errors, the UA will then apply a new
   correctness check: Pin Validation.  To perform Pin Validation, the UA
   will compute the fingerprints of the SPKI structures in each
   certificate in the host's validated certificate chain.  (The UA
   ignores certificates whose SPKI cannot be taken in isolation and
   superfluous certificates in the chain that do not form part
   of the validating chain.)  The UA will then check that the set of
   these fingerprints intersects the set of fingerprints in that host's
   Pinning Metadata.  If there is set intersection, the UA continues
   with the connection as normal.  Otherwise, the UA MUST treat this Pin
   Failure as a non-recoverable error.

Finally, I'd suggest the following change to 2.3.1, clarifying it's
required-ness and a max-age of 0.

2.3.1.  max-age

   max-age specifies the number of seconds, after the reception of the
   Public-Key-Pins HTTP Response Header, during which the UA regards the
   host as a Pinned Host.  The delta-seconds production is specified in
   [rfc-2616].

   max-age is a required attribute. If omitted, the UA MUST NOT note the
   host as a Pinned Host, and MUST discard any previously set Pinning
   Metadata for that host in its non-volatile store.

   If max-age is set to 0, the UA MUST likewise discard any previsouly
   set Pinning Metadata.

I won't be insulted if you dislike my wording, but I think this is a
complete summary of raised oustanding issues on -01.

-tom

From dross@microsoft.com  Fri Feb 17 17:14:14 2012
Return-Path: <dross@microsoft.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BF4711E80AE for <websec@ietfa.amsl.com>; Fri, 17 Feb 2012 17:14:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qtIT8FUqclVa for <websec@ietfa.amsl.com>; Fri, 17 Feb 2012 17:14:14 -0800 (PST)
Received: from AM1EHSOBE002.bigfish.com (am1ehsobe006.messaging.microsoft.com [213.199.154.209]) by ietfa.amsl.com (Postfix) with ESMTP id C5E9811E808D for <websec@ietf.org>; Fri, 17 Feb 2012 17:14:05 -0800 (PST)
Received: from mail96-am1-R.bigfish.com (10.3.201.245) by AM1EHSOBE002.bigfish.com (10.3.204.22) with Microsoft SMTP Server id 14.1.225.23; Sat, 18 Feb 2012 01:14:05 +0000
Received: from mail96-am1 (localhost [127.0.0.1])	by mail96-am1-R.bigfish.com (Postfix) with ESMTP id 5EB554C00BA; Sat, 18 Feb 2012 01:14:05 +0000 (UTC)
X-SpamScore: 0
X-BigFish: VS0(zzzz1202hzz8275bhz2fh2a8h668h839h944h)
X-Forefront-Antispam-Report: CIP:131.107.125.8; KIP:(null); UIP:(null); IPV:NLI; H:TK5EX14MLTC103.redmond.corp.microsoft.com; RD:none; EFVD:NLI
Received-SPF: pass (mail96-am1: domain of microsoft.com designates 131.107.125.8 as permitted sender) client-ip=131.107.125.8; envelope-from=dross@microsoft.com; helo=TK5EX14MLTC103.redmond.corp.microsoft.com ; icrosoft.com ; 
Received: from mail96-am1 (localhost.localdomain [127.0.0.1]) by mail96-am1 (MessageSwitch) id 1329527643114647_26669; Sat, 18 Feb 2012 01:14:03 +0000 (UTC)
Received: from AM1EHSMHS016.bigfish.com (unknown [10.3.201.252])	by mail96-am1.bigfish.com (Postfix) with ESMTP id 116D34A0051; Sat, 18 Feb 2012 01:14:03 +0000 (UTC)
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (131.107.125.8) by AM1EHSMHS016.bigfish.com (10.3.207.154) with Microsoft SMTP Server (TLS) id 14.1.225.23; Sat, 18 Feb 2012 01:14:02 +0000
Received: from TK5EX14MBXC240.redmond.corp.microsoft.com ([169.254.4.36]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.02.0247.005; Fri, 17 Feb 2012 17:14:00 -0800
From: David Ross <dross@microsoft.com>
To: "Tobias Gondrom (tobias.gondrom@gondrom.org)" <tobias.gondrom@gondrom.org>, IETF WebSec WG <websec@ietf.org>
Thread-Topic: Frame-Options header and intermediate frames
Thread-Index: Aczt143YGrgRy5sXSO+kYLVJtEB9ng==
Date: Sat, 18 Feb 2012 01:14:00 +0000
Message-ID: <68291699F5EA8848B0EAC2E78480571FDF9911@TK5EX14MBXC240.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.70]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
Cc: Eduardo' Vela <evn@google.com>, Michal Zalewski <lcamtuf@coredump.cx>
Subject: [websec] Frame-Options header and intermediate frames
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Feb 2012 01:14:14 -0000

Michal Zalewski and Eduardo Vela brought up an interesting scenario pertain=
ing to the Frame-Options header.  Specifically, if only the top level page =
URL is validated w.r.t. SAMEORIGIN or ALLOW-FROM, malicious ads or other un=
safe content in an intermediate frame could re-frame content from the top l=
evel site for the purposes of clickjacking.

In the RFC draft currently there is the following:

---
SAMEORIGIN
...
	[TBD]current implementations do not display if the origin of
        the top-level-browsing-context is different than the origin of
        the page containing the FRAME-OPTIONS header.
---

There's a good argument that sites attempting to avoid attacks such as phis=
hing and clickjacking would not want to frame arbitrary content.  Users rea=
lly only have an easy way to make immediate and valid trust decisions about=
 the origin of the top level page, not frames contained within those pages.=
  But sites that frame arbitrary content do exist in the real world, for be=
tter or worse.  While there are different philosophical viewpoints on cross=
-domain framing, there doesn't seem to be any reason to avoid creating a Va=
lidateAllAncestors flag on Frame-Options which would instruct the browser t=
o validate the URL of each hosting frame up to the top level.  Given this, =
sites that frame arbitrary content could at least make use of SAMEORIGIN an=
d ALLOW-FROM for their intended purpose.

We'd like to get the intermediate frame issue documented and describe the o=
ptional ValidateAllAncestors flag in the RFC draft.

David Ross
dross@microsoft.com


From ietf@adambarth.com  Sat Feb 18 00:07:25 2012
Return-Path: <ietf@adambarth.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60DDA21E8043 for <websec@ietfa.amsl.com>; Sat, 18 Feb 2012 00:07:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.957
X-Spam-Level: 
X-Spam-Status: No, score=-2.957 tagged_above=-999 required=5 tests=[AWL=0.020,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GKQzAFWf4YYI for <websec@ietfa.amsl.com>; Sat, 18 Feb 2012 00:07:24 -0800 (PST)
Received: from mail-wi0-f172.google.com (mail-wi0-f172.google.com [209.85.212.172]) by ietfa.amsl.com (Postfix) with ESMTP id AE0F321E8026 for <websec@ietf.org>; Sat, 18 Feb 2012 00:07:23 -0800 (PST)
Received: by wibhm9 with SMTP id hm9so2514774wib.31 for <websec@ietf.org>; Sat, 18 Feb 2012 00:07:22 -0800 (PST)
Received-SPF: pass (google.com: domain of ietf@adambarth.com designates 10.180.101.228 as permitted sender) client-ip=10.180.101.228; 
Authentication-Results: mr.google.com; spf=pass (google.com: domain of ietf@adambarth.com designates 10.180.101.228 as permitted sender) smtp.mail=ietf@adambarth.com
Received: from mr.google.com ([10.180.101.228]) by 10.180.101.228 with SMTP id fj4mr3517952wib.4.1329552442450 (num_hops = 1); Sat, 18 Feb 2012 00:07:22 -0800 (PST)
Received: by 10.180.101.228 with SMTP id fj4mr3031497wib.4.1329552442383; Sat, 18 Feb 2012 00:07:22 -0800 (PST)
Received: from mail-lpp01m010-f44.google.com (mail-lpp01m010-f44.google.com [209.85.215.44]) by mx.google.com with ESMTPS id by3sm1990487wib.3.2012.02.18.00.07.20 (version=SSLv3 cipher=OTHER); Sat, 18 Feb 2012 00:07:21 -0800 (PST)
Received: by lahl5 with SMTP id l5so5310282lah.31 for <websec@ietf.org>; Sat, 18 Feb 2012 00:07:20 -0800 (PST)
Received-SPF: pass (google.com: domain of ietf@adambarth.com designates 10.152.132.133 as permitted sender) client-ip=10.152.132.133; 
Received: from mr.google.com ([10.152.132.133]) by 10.152.132.133 with SMTP id ou5mr8904671lab.46.1329552440256 (num_hops = 1); Sat, 18 Feb 2012 00:07:20 -0800 (PST)
Received: by 10.152.132.133 with SMTP id ou5mr7444139lab.46.1329552440234; Sat, 18 Feb 2012 00:07:20 -0800 (PST)
MIME-Version: 1.0
Received: by 10.112.100.66 with HTTP; Sat, 18 Feb 2012 00:06:50 -0800 (PST)
In-Reply-To: <68291699F5EA8848B0EAC2E78480571FDF9911@TK5EX14MBXC240.redmond.corp.microsoft.com>
References: <68291699F5EA8848B0EAC2E78480571FDF9911@TK5EX14MBXC240.redmond.corp.microsoft.com>
From: Adam Barth <ietf@adambarth.com>
Date: Sat, 18 Feb 2012 00:06:50 -0800
Message-ID: <CAJE5ia-D+BoFd0v+PAaRPh0g03LWMX_WGeZTfQz-vUSq7h83EQ@mail.gmail.com>
To: David Ross <dross@microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQnUHDTF+NRs1MB2VuoDoq1Zla04fc+0RuPMHqZZ4+UPKHOnPtwTTeyuv41IBrzGp+ZWIt9W
Cc: Eduardo' Vela <evn@google.com>, IETF WebSec WG <websec@ietf.org>, Michal Zalewski <lcamtuf@coredump.cx>
Subject: Re: [websec] Frame-Options header and intermediate frames
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Feb 2012 08:07:25 -0000

On Fri, Feb 17, 2012 at 5:14 PM, David Ross <dross@microsoft.com> wrote:
> Michal Zalewski and Eduardo Vela brought up an interesting scenario perta=
ining to the Frame-Options header. =A0Specifically, if only the top level p=
age URL is validated w.r.t. SAMEORIGIN or ALLOW-FROM, malicious ads or othe=
r unsafe content in an intermediate frame could re-frame content from the t=
op level site for the purposes of clickjacking.
>
> In the RFC draft currently there is the following:
>
> ---
> SAMEORIGIN
> ...
> =A0 =A0 =A0 =A0[TBD]current implementations do not display if the origin =
of
> =A0 =A0 =A0 =A0the top-level-browsing-context is different than the origi=
n of
> =A0 =A0 =A0 =A0the page containing the FRAME-OPTIONS header.
> ---
>
> There's a good argument that sites attempting to avoid attacks such as ph=
ishing and clickjacking would not want to frame arbitrary content. =A0Users=
 really only have an easy way to make immediate and valid trust decisions a=
bout the origin of the top level page, not frames contained within those pa=
ges. =A0But sites that frame arbitrary content do exist in the real world, =
for better or worse. =A0While there are different philosophical viewpoints =
on cross-domain framing, there doesn't seem to be any reason to avoid creat=
ing a ValidateAllAncestors flag on Frame-Options which would instruct the b=
rowser to validate the URL of each hosting frame up to the top level. =A0Gi=
ven this, sites that frame arbitrary content could at least make use of SAM=
EORIGIN and ALLOW-FROM for their intended purpose.
>
> We'd like to get the intermediate frame issue documented and describe the=
 optional ValidateAllAncestors flag in the RFC draft.

That sounds like a reasonable way to extend the existing syntax.  It's
slightly ugly, but I'm not sure how worried we should be about the
aesthetics.

Adam

From g.maone@informaction.com  Sat Feb 18 00:33:07 2012
Return-Path: <g.maone@informaction.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2ED6221F85FB for <websec@ietfa.amsl.com>; Sat, 18 Feb 2012 00:33:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id me1w1ht1Zbac for <websec@ietfa.amsl.com>; Sat, 18 Feb 2012 00:33:06 -0800 (PST)
Received: from mail2.informaction.com (mail2.informaction.com [82.103.137.214]) by ietfa.amsl.com (Postfix) with ESMTP id AE2F721F85F6 for <websec@ietf.org>; Sat, 18 Feb 2012 00:33:00 -0800 (PST)
Received: (qmail 4619 invoked by uid 89); 18 Feb 2012 08:32:56 -0000
Received: by simscan 1.4.0 ppid: 4612, pid: 4615, t: 0.1402s scanners: attach: 1.4.0 clamav: 0.97.2
/m: 54/d:13845
Received: from unknown (HELO ?192.168.1.196?) (g.maone@informaction.com@217.133.105.229) by ariel.informaction.com with ESMTPA; 18 Feb 2012 08:32:56 -0000
Message-ID: <4F3F623A.9060200@informaction.com>
Date: Sat, 18 Feb 2012 09:32:58 +0100
From: Giorgio Maone <g.maone@informaction.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:10.0.1) Gecko/20120208 Thunderbird/10.0.1
MIME-Version: 1.0
To: Adam Barth <ietf@adambarth.com>
References: <68291699F5EA8848B0EAC2E78480571FDF9911@TK5EX14MBXC240.redmond.corp.microsoft.com> <CAJE5ia-D+BoFd0v+PAaRPh0g03LWMX_WGeZTfQz-vUSq7h83EQ@mail.gmail.com>
In-Reply-To: <CAJE5ia-D+BoFd0v+PAaRPh0g03LWMX_WGeZTfQz-vUSq7h83EQ@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: Eduardo' Vela <evn@google.com>, IETF WebSec WG <websec@ietf.org>, Michal Zalewski <lcamtuf@coredump.cx>
Subject: Re: [websec] Frame-Options header and intermediate frames
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Feb 2012 08:33:07 -0000

On 18/02/2012 09:06, Adam Barth wrote:
> On Fri, Feb 17, 2012 at 5:14 PM, David Ross<dross@microsoft.com>  wrote:
here's a good argument that sites attempting to avoid attacks such as 
phishing and clickjacking would not want to frame arbitrary content. 
Users really only have an easy way to make immediate and valid trust 
decisions about the origin of the top level page, not frames contained 
within those pages.  But sites that frame arbitrary content do exist in 
the real world, for better or worse.  While there are different 
philosophical viewpoints on cross-domain framing, there doesn't seem to 
be any reason to avoid creating a ValidateAllAncestors flag on 
Frame-Options which would instruct the browser to validate the URL of 
each hosting frame up to the top level.  Given this, sites that frame 
arbitrary content could at least make use of SAMEORIGIN and ALLOW-FROM 
for their intended purpose.
>>
>> We'd like to get the intermediate frame issue documented and describe the optional ValidateAllAncestors flag in the RFC draft.
>
> That sounds like a reasonable way to extend the existing syntax.  It's
> slightly ugly

Would just "AllAncestors" be clear enough?
-- G


From dross@microsoft.com  Mon Feb 20 16:18:10 2012
Return-Path: <dross@microsoft.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57F5321F8601 for <websec@ietfa.amsl.com>; Mon, 20 Feb 2012 16:18:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.099
X-Spam-Level: 
X-Spam-Status: No, score=-5.099 tagged_above=-999 required=5 tests=[AWL=1.500,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zAzmcbeQdyz5 for <websec@ietfa.amsl.com>; Mon, 20 Feb 2012 16:18:09 -0800 (PST)
Received: from TX2EHSOBE002.bigfish.com (tx2ehsobe005.messaging.microsoft.com [65.55.88.15]) by ietfa.amsl.com (Postfix) with ESMTP id A35E321F85F7 for <websec@ietf.org>; Mon, 20 Feb 2012 16:18:09 -0800 (PST)
Received: from mail54-tx2-R.bigfish.com (10.9.14.239) by TX2EHSOBE002.bigfish.com (10.9.40.22) with Microsoft SMTP Server id 14.1.225.23; Tue, 21 Feb 2012 00:18:05 +0000
Received: from mail54-tx2 (localhost [127.0.0.1])	by mail54-tx2-R.bigfish.com (Postfix) with ESMTP id D4793C02AA; Tue, 21 Feb 2012 00:18:04 +0000 (UTC)
X-SpamScore: -16
X-BigFish: VS-16(zzbb2dI9371I542M1432N98dKzz1202hzz8275bhz2fh2a8h668h839h944h)
X-Forefront-Antispam-Report: CIP:131.107.125.8; KIP:(null); UIP:(null); IPV:NLI; H:TK5EX14HUBC103.redmond.corp.microsoft.com; RD:none; EFVD:NLI
Received-SPF: pass (mail54-tx2: domain of microsoft.com designates 131.107.125.8 as permitted sender) client-ip=131.107.125.8; envelope-from=dross@microsoft.com; helo=TK5EX14HUBC103.redmond.corp.microsoft.com ; icrosoft.com ; 
Received: from mail54-tx2 (localhost.localdomain [127.0.0.1]) by mail54-tx2 (MessageSwitch) id 1329783482442069_24098; Tue, 21 Feb 2012 00:18:02 +0000 (UTC)
Received: from TX2EHSMHS020.bigfish.com (unknown [10.9.14.252])	by mail54-tx2.bigfish.com (Postfix) with ESMTP id 6659D2A004B; Tue, 21 Feb 2012 00:18:02 +0000 (UTC)
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (131.107.125.8) by TX2EHSMHS020.bigfish.com (10.9.99.120) with Microsoft SMTP Server (TLS) id 14.1.225.23; Tue, 21 Feb 2012 00:18:01 +0000
Received: from TK5EX14MBXC240.redmond.corp.microsoft.com ([169.254.4.36]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.02.0247.005; Tue, 21 Feb 2012 00:17:56 +0000
From: David Ross <dross@microsoft.com>
To: Giorgio Maone <g.maone@informaction.com>, Adam Barth <ietf@adambarth.com>
Thread-Topic: [websec] Frame-Options header and intermediate frames
Thread-Index: Aczt143YGrgRy5sXSO+kYLVJtEB9ngAPLZ4AAADppwAAhYzC0A==
Date: Tue, 21 Feb 2012 00:17:55 +0000
Message-ID: <68291699F5EA8848B0EAC2E78480571FE01C5E@TK5EX14MBXC240.redmond.corp.microsoft.com>
References: <68291699F5EA8848B0EAC2E78480571FDF9911@TK5EX14MBXC240.redmond.corp.microsoft.com> <CAJE5ia-D+BoFd0v+PAaRPh0g03LWMX_WGeZTfQz-vUSq7h83EQ@mail.gmail.com> <4F3F623A.9060200@informaction.com>
In-Reply-To: <4F3F623A.9060200@informaction.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.71]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
Cc: Eduardo' Vela <evn@google.com>, IETF WebSec WG <websec@ietf.org>, Michal Zalewski <lcamtuf@coredump.cx>
Subject: Re: [websec] Frame-Options header and intermediate frames
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Feb 2012 00:18:10 -0000

AllAncestors sounds good to me.

David Ross
dross@microsoft.com

-----Original Message-----
From: Giorgio Maone [mailto:g.maone@informaction.com]=20
Sent: Saturday, February 18, 2012 12:33 AM
To: Adam Barth
Cc: David Ross; Eduardo' Vela; IETF WebSec WG; Michal Zalewski
Subject: Re: [websec] Frame-Options header and intermediate frames

On 18/02/2012 09:06, Adam Barth wrote:
> On Fri, Feb 17, 2012 at 5:14 PM, David Ross<dross@microsoft.com>  wrote:
here's a good argument that sites attempting to avoid attacks such as phish=
ing and clickjacking would not want to frame arbitrary content.=20
Users really only have an easy way to make immediate and valid trust decisi=
ons about the origin of the top level page, not frames contained within tho=
se pages.  But sites that frame arbitrary content do exist in the real worl=
d, for better or worse.  While there are different philosophical viewpoints=
 on cross-domain framing, there doesn't seem to be any reason to avoid crea=
ting a ValidateAllAncestors flag on Frame-Options which would instruct the =
browser to validate the URL of each hosting frame up to the top level.  Giv=
en this, sites that frame arbitrary content could at least make use of SAME=
ORIGIN and ALLOW-FROM for their intended purpose.
>>
>> We'd like to get the intermediate frame issue documented and describe th=
e optional ValidateAllAncestors flag in the RFC draft.
>
> That sounds like a reasonable way to extend the existing syntax.  It's=20
> slightly ugly

Would just "AllAncestors" be clear enough?
-- G




From James.H.Manger@team.telstra.com  Wed Feb 22 16:26:37 2012
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C3CC21F85EC for <websec@ietfa.amsl.com>; Wed, 22 Feb 2012 16:26:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.638
X-Spam-Level: 
X-Spam-Status: No, score=-0.638 tagged_above=-999 required=5 tests=[AWL=-2.338, BAYES_50=0.001, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327,  HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BGvGwDsmTJcP for <websec@ietfa.amsl.com>; Wed, 22 Feb 2012 16:26:36 -0800 (PST)
Received: from ipxbvo.tcif.telstra.com.au (ipxbvo.tcif.telstra.com.au [203.35.135.204]) by ietfa.amsl.com (Postfix) with ESMTP id 5BD1C21F85E3 for <websec@ietf.org>; Wed, 22 Feb 2012 16:26:34 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.73,466,1325422800"; d="scan'208,217";a="63340635"
Received: from unknown (HELO ipcdvi.tcif.telstra.com.au) ([10.97.217.212]) by ipobvi.tcif.telstra.com.au with ESMTP; 23 Feb 2012 11:26:34 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6628"; a="51780509"
Received: from wsmsg3707.srv.dir.telstra.com ([172.49.40.81]) by ipcdvi.tcif.telstra.com.au with ESMTP; 23 Feb 2012 11:26:32 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3707.srv.dir.telstra.com ([172.49.40.81]) with mapi; Thu, 23 Feb 2012 11:26:31 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Yoav Nir <ynir@checkpoint.com>, IETF WebSec WG <websec@ietf.org>
Date: Thu, 23 Feb 2012 11:26:29 +1100
Thread-Topic: I-D Action: draft-nir-websec-extended-origin-00.txt
Thread-Index: Aczh/aUIQO/LIhDuQAuf+kjfsK/BIAPvz+Fg
Message-ID: <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com>
References: <20120202220021.31936.37346.idtracker@ietfa.amsl.com> <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com>
In-Reply-To: <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E114EC261141WSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: Re: [websec] I-D Action: draft-nir-websec-extended-origin-00.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Feb 2012 00:26:37 -0000

--_000_255B9BB34FB7D647A506DC292726F6E114EC261141WSMSG3153Vsrv_
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

>> Title           : A More Granular Web Origin Concept
>> Filename   : draft-nir-websec-extended-origin-00.txt


> I have just submitted this draft. The purpose of this is to address the c=
ase where a single portal hides several real servers behind it, by translat=
ing their URLs into URL that seem to be from that server.
>
> In that case the same origin policy is not enforced correctly, because co=
okies and scripts from one server behind the portal (for example, a mail se=
rver) can be shared and can affect pages form another server behind the sam=
e portal.
>
> This draft proposes a header that will tell the client (browser) what the=
 real origin is, and allow the client to apply the SOP.


Yoav,

SSL VPNs that proxy a whole bunch of web sites via a single host are indeed=
 a security problem as they break the same-origin protections that the indi=
vidual web sites expect. However, I don=1B$B!G=1B(Bt think this draft=1B$B!=
G=1B(Bs solution is the best approach. It requires browsers to fix what SSL=
 VPN=1B$B!G=1B(Bs have broken; and doesn=1B$B!G=1B(Bt provide much improvem=
ent until the new functionality is implemented in all browsers and deployed=
 to most users.

Wouldn=1B$B!G=1B(Bt it be better for SSL VPNs to use lots of sub-domains? F=
or instance, to map internal sites to:
 https://a.sslvpn.example.com/webmail
  https://b.sslvpn.example.com/wiki/index.html
  https://c.sslvpn.example.com/stuff


If the =1B$B!H=1B(BExtended-Origin=1B$B!I=1B(B HTTP header approach does pr=
oceed=1B$B!D=1B(B

1] You don=1B$B!G=1B(Bt need multiple Extended-Origin headers for successiv=
e portals in a path. A portal about to insert a header can just take into a=
ccount any existing value if present. That is, insert a single Extended-Ori=
gin response header that is unique for each combination of {original-domain=
; original-extended-origin-header-value}.

2] I think it would be better to serialize an extended-origin as an additio=
nal sub-domain, not a fragment. The sub-domain could have a prefix so it ca=
nnot (or is highly unlikely to) clash with a real sub-domain. Example:
=1B$B"*=1B(B GET https://sslvpn.example.com/xyz
=1B$B"+=1B(B Extended-Origin: asdhgasghd
=1B$B"*=1B(B Origin: https://xb--asdhgasghd.sslvpn.example.com



--
James Manger



--_000_255B9BB34FB7D647A506DC292726F6E114EC261141WSMSG3153Vsrv_
Content-Type: text/html; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Diso-2022-jp"><meta name=3DGenerator content=3D"Mic=
rosoft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.apple-tab-span
	{mso-style-name:apple-tab-span;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:128785700;
	mso-list-type:hybrid;
	mso-list-template-ids:133453314 201916431 201916441 201916443 201916431 20=
1916441 201916443 201916431 201916441 201916443;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-AU link=3Dblue vli=
nk=3Dpurple style=3D'word-wrap: break-word;-webkit-nbsp-mode: space;-webkit=
-line-break: after-white-space'><div class=3DWordSection1><p class=3DMsoNor=
mal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";colo=
r:#1F497D'>&gt;&gt; </span>Title &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;: A More Granular Web Origin Concept<o:p></o:p></p><p cla=
ss=3DMsoNormal>&gt;&gt; Filename&nbsp;&nbsp;&nbsp;: draft-nir-websec-extend=
ed-origin-00.txt<br><br><b><span lang=3DEN-US style=3D'font-size:10.0pt;fon=
t-family:"Tahoma","sans-serif";color:#1F497D'><o:p></o:p></span></b></p><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNor=
mal><span style=3D'color:#1F497D'>&gt; </span>I have just submitted this dr=
aft. The purpose of this is to address the case where a single portal hides=
 several real servers behind it, by translating their URLs into URL that se=
em to be from that server.<o:p></o:p></p></div><div><p class=3DMsoNormal><s=
pan style=3D'color:#1F497D'>&gt;</span><o:p>&nbsp;</o:p></p></div><div><p c=
lass=3DMsoNormal><span style=3D'color:#1F497D'>&gt; </span>In that case the=
 same origin policy is not enforced correctly, because cookies and scripts =
from one server behind the portal (for example, a mail server) can be share=
d and can affect pages form another server behind the same portal.<o:p></o:=
p></p></div><div><p class=3DMsoNormal><span style=3D'color:#1F497D'>&gt;</s=
pan><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal><span style=3D'col=
or:#1F497D'>&gt; </span>This draft proposes a header that will tell the cli=
ent (browser) what the real origin is, and allow the client to apply the SO=
P.<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div=
><div><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p><=
/span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:=
"Calibri","sans-serif";color:#1F497D'>Yoav,<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>SSL VPNs that proxy a whole bunch of web sites via a single host are indee=
d a security problem as they break the same-origin protections that the ind=
ividual web sites expect. However, I don=1B$B!G=1B(Bt think this draft=1B$B=
!G=1B(Bs solution is the best approach. It requires browsers to fix what SS=
L VPN=1B$B!G=1B(Bs have broken; and doesn=1B$B!G=1B(Bt provide much improve=
ment until the new functionality is implemented in all browsers and deploye=
d to most users.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbs=
p;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fon=
t-family:"Calibri","sans-serif";color:#1F497D'>Wouldn=1B$B!G=1B(Bt it be be=
tter for SSL VPNs to use lots of sub-domains? For instance, to map internal=
 sites to:<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-si=
ze:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'> &nbsp;<a href=
=3D"https://a.sslvpn.example.com/webmail">https://a.sslvpn.example.com/webm=
ail</a><o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:=
11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp; <a href=3D"=
https://b.sslvpn.example.com/wiki/index.html">https://b.sslvpn.example.com/=
wiki/index.html</a><o:p></o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbs=
p; <a href=3D"https://c.sslvpn.example.com/stuff">https://c.sslvpn.example.=
com/stuff</a><o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;<=
/o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-f=
amily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>If the =1B$B!H=1B(BExtended-Origin=1B$B!I=1B(B HTT=
P header approach does proceed=1B$B!D=1B(B<o:p></o:p></span></p><p class=3D=
MsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>1]=
 You don=1B$B!G=1B(Bt need multiple Extended-Origin headers for successive =
portals in a path. A portal about to insert a header can just take into acc=
ount any existing value if present. That is, insert a single Extended-Origi=
n response header that is unique for each combination of {original-domain; =
original-extended-origin-header-value}.<o:p></o:p></span></p><p class=3DMso=
Normal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";c=
olor:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>2] I=
 think it would be better to serialize an extended-origin as an additional =
sub-domain, not a fragment. The sub-domain could have a prefix so it cannot=
 (or is highly unlikely to) clash with a real sub-domain. Example:<o:p></o:=
p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fami=
ly:"Calibri","sans-serif";color:#1F497D'>=1B$B"*=1B(B GET <a href=3D"https:=
//sslvpn.example.com/xyz">https://sslvpn.example.com/xyz</a><o:p></o:p></sp=
an></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif";color:#1F497D'>=1B$B"+=1B(B Extended-Origin: asdhgasghd=
<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;=
font-family:"Calibri","sans-serif";color:#1F497D'>=1B$B"*=1B(B Origin: http=
s://xb--asdhgasghd.sslvpn.example.com<o:p></o:p></span></p><p class=3DMsoLi=
stParagraph><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-ser=
if";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span s=
tyle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>=
<o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>--<o:p></o:p></span=
></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>James Manger<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
><o:p>&nbsp;</o:p></span></p></div></div></body></html>=

--_000_255B9BB34FB7D647A506DC292726F6E114EC261141WSMSG3153Vsrv_--

From gerv@mozilla.org  Thu Feb 23 06:47:32 2012
Return-Path: <gerv@mozilla.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F265921F8824 for <websec@ietfa.amsl.com>; Thu, 23 Feb 2012 06:47:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.299
X-Spam-Level: 
X-Spam-Status: No, score=-6.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a30YSp60h-2F for <websec@ietfa.amsl.com>; Thu, 23 Feb 2012 06:47:31 -0800 (PST)
Received: from dm-mail03.mozilla.org (dm-mail03.mozilla.org [63.245.208.213]) by ietfa.amsl.com (Postfix) with ESMTP id 8535F21F8823 for <websec@ietf.org>; Thu, 23 Feb 2012 06:47:31 -0800 (PST)
Received: from [192.168.0.101] (93.243.187.81.in-addr.arpa [81.187.243.93]) (Authenticated sender: gerv@mozilla.org) by dm-mail03.mozilla.org (Postfix) with ESMTP id 49A314AEDD1; Thu, 23 Feb 2012 06:47:30 -0800 (PST)
Message-ID: <4F465180.6030807@mozilla.org>
Date: Thu, 23 Feb 2012 14:47:28 +0000
From: Gervase Markham <gerv@mozilla.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:10.0) Gecko/20120118 Thunderbird/10.0
MIME-Version: 1.0
To: "Manger, James H" <James.H.Manger@team.telstra.com>
References: <20120202220021.31936.37346.idtracker@ietfa.amsl.com> <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com> <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] I-D Action: draft-nir-websec-extended-origin-00.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Feb 2012 14:47:32 -0000

On 23/02/12 00:26, Manger, James H wrote:
> Wouldn’t it be better for SSL VPNs to use lots of sub-domains? For
> instance, to map internal sites to:
>
> https://a.sslvpn.example.com/webmail
>
> https://b.sslvpn.example.com/wiki/index.html
>
> https://c.sslvpn.example.com/stuff

This would be much better. It would still allow the sites in some 
circumstances to maliciously mess with each other's cookies if they chose.

I'm not entirely familiar with VPN technology, but if it were possible 
for VPNs everywhere always to use the same domain name for this purpose, 
e.g. vpn.example, then we could add *.vpn.example to the Public Suffix 
List and get at least some sort of protection between subdomains. Or 
even code in "strip off this prefix before doing domain calculations" 
support into clients.

Just ideas :-)

Gerv

From ynir@checkpoint.com  Thu Feb 23 06:58:45 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D35921F87B6 for <websec@ietfa.amsl.com>; Thu, 23 Feb 2012 06:58:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.168
X-Spam-Level: 
X-Spam-Status: No, score=-9.168 tagged_above=-999 required=5 tests=[AWL=-1.170, BAYES_50=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K7v7GoeMq713 for <websec@ietfa.amsl.com>; Thu, 23 Feb 2012 06:58:44 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 61A0C21F87C3 for <websec@ietf.org>; Thu, 23 Feb 2012 06:58:43 -0800 (PST)
X-CheckPoint: {4F464FF3-1-1B221DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id q1NEwekk023858;  Thu, 23 Feb 2012 16:58:41 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Thu, 23 Feb 2012 16:58:40 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
Date: Thu, 23 Feb 2012 16:58:43 +0200
Thread-Topic: I-D Action: draft-nir-websec-extended-origin-00.txt
Thread-Index: AczyO6ClayzDt7DeQim8fjl7FzrVqw==
Message-ID: <7BC9C725-9604-49C9-9A6B-B24B6B088B0A@checkpoint.com>
References: <20120202220021.31936.37346.idtracker@ietfa.amsl.com> <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com> <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: multipart/alternative; boundary="_000_7BC9C725960449C99A6BB24B6B088B0Acheckpointcom_"
MIME-Version: 1.0
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] I-D Action: draft-nir-websec-extended-origin-00.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Feb 2012 14:58:45 -0000

--_000_7BC9C725960449C99A6BB24B6B088B0Acheckpointcom_
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

Hi James, thanks for reviewing.

The scheme that you propose (a.sslvpn.example.com<http://a.sslvpn.example.c=
om>, b.sslvpn.example.com<http://b.sslvpn.example.com>, etc.) really does w=
ork. In fact, the product that my company makes offers this as an option.

Sadly, our customers don't like it, hence the other option.  Using multiple=
 FQDNs requires them to either buy multiple certificates, or a wildcard cer=
tificate, both options are more expensive. Additionally this requires them =
to add multiple DNS records, which for some reason they find cumbersome.

About your other comments:

1) (no need for multiple headers) I agree. I think I will change this in -0=
1. I don't really think stacking portals is a good engineering idea. I just=
 added this for completeness, and I can replace it with text along your com=
ment

2) I don't see that it makes much of a difference. I can do it either way. =
Can you explain what is the advantage of this over the pseudo-fragment form=
at?

Thanks

Yoav

On Feb 23, 2012, at 2:26 AM, Manger, James H wrote:

>> Title           : A More Granular Web Origin Concept
>> Filename   : draft-nir-websec-extended-origin-00.txt


> I have just submitted this draft. The purpose of this is to address the c=
ase where a single portal hides several real servers behind it, by translat=
ing their URLs into URL that seem to be from that server.
>
> In that case the same origin policy is not enforced correctly, because co=
okies and scripts from one server behind the portal (for example, a mail se=
rver) can be shared and can affect pages form another server behind the sam=
e portal.
>
> This draft proposes a header that will tell the client (browser) what the=
 real origin is, and allow the client to apply the SOP.


Yoav,

SSL VPNs that proxy a whole bunch of web sites via a single host are indeed=
 a security problem as they break the same-origin protections that the indi=
vidual web sites expect. However, I don=1B$B!G=1B(Bt think this draft=1B$B!=
G=1B(Bs solution is the best approach. It requires browsers to fix what SSL=
 VPN=1B$B!G=1B(Bs have broken; and doesn=1B$B!G=1B(Bt provide much improvem=
ent until the new functionality is implemented in all browsers and deployed=
 to most users.

Wouldn=1B$B!G=1B(Bt it be better for SSL VPNs to use lots of sub-domains? F=
or instance, to map internal sites to:
 https://a.sslvpn.example.com/webmail
  https://b.sslvpn.example.com/wiki/index.html
  https://c.sslvpn.example.com/stuff


If the =1B$B!H=1B(BExtended-Origin=1B$B!I=1B(B HTTP header approach does pr=
oceed=1B$B!D=1B(B

1] You don=1B$B!G=1B(Bt need multiple Extended-Origin headers for successiv=
e portals in a path. A portal about to insert a header can just take into a=
ccount any existing value if present. That is, insert a single Extended-Ori=
gin response header that is unique for each combination of {original-domain=
; original-extended-origin-header-value}.

2] I think it would be better to serialize an extended-origin as an additio=
nal sub-domain, not a fragment. The sub-domain could have a prefix so it ca=
nnot (or is highly unlikely to) clash with a real sub-domain. Example:
=1B$B"*=1B(B GET https://sslvpn.example.com/xyz
=1B$B"+=1B(B Extended-Origin: asdhgasghd
=1B$B"*=1B(B Origin: https://xb--asdhgasghd.sslvpn.example.com


--_000_7BC9C725960449C99A6BB24B6B088B0Acheckpointcom_
Content-Type: text/html; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

<html><head><base href=3D"x-msg://57/"></head><body style=3D"word-wrap: bre=
ak-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "=
>Hi James, thanks for reviewing.<div><br></div><div>The scheme that you pro=
pose (<a href=3D"http://a.sslvpn.example.com">a.sslvpn.example.com</a>, <a =
href=3D"http://b.sslvpn.example.com">b.sslvpn.example.com</a>, etc.) really=
 does work. In fact, the product that my company makes offers this as an op=
tion.</div><div><br></div><div>Sadly, our customers don't like it, hence th=
e other option. &nbsp;Using multiple FQDNs requires them to either buy mult=
iple certificates, or a wildcard certificate, both options are more expensi=
ve. Additionally this requires them to add multiple DNS records, which for =
some reason they find cumbersome.</div><div><br></div><div>About your other=
 comments:</div><div><br></div><div>1) (no need for multiple headers) I agr=
ee. I think I will change this in -01. I don't really think stacking portal=
s is a good engineering idea. I just added this for completeness, and I can=
 replace it with text along your comment</div><div><br></div><div>2) I don'=
t see that it makes much of a difference. I can do it either way. Can you e=
xplain what is the advantage of this over the pseudo-fragment format?</div>=
<div><br></div><div>Thanks</div><div><br></div><div>Yoav</div><div><br></di=
v><div><div><div>On Feb 23, 2012, at 2:26 AM, Manger, James H wrote:</div><=
br class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span clas=
s=3D"Apple-style-span" style=3D"border-collapse: separate; font-family: Tah=
oma; font-style: normal; font-variant: normal; font-weight: normal; letter-=
spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto;=
 text-indent: 0px; text-transform: none; white-space: normal; widows: 2; wo=
rd-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-ver=
tical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-=
size-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; "><di=
v lang=3D"EN-AU" link=3D"blue" vlink=3D"purple" style=3D"word-wrap: break-w=
ord; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><di=
v class=3D"WordSection1" style=3D"page: WordSection1; "><div style=3D"margi=
n-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; f=
ont-size: 12pt; font-family: 'Times New Roman', serif; "><span style=3D"fon=
t-size: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">=
&gt;&gt;<span class=3D"Apple-converted-space">&nbsp;</span></span>Title &nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: A More Granular =
Web Origin Concept<o:p></o:p></div><div style=3D"margin-top: 0cm; margin-ri=
ght: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-=
family: 'Times New Roman', serif; ">&gt;&gt; Filename&nbsp;&nbsp;&nbsp;: dr=
aft-nir-websec-extended-origin-00.txt<br><br><b><span lang=3D"EN-US" style=
=3D"font-size: 10pt; font-family: Tahoma, sans-serif; color: rgb(31, 73, 12=
5); "><o:p></o:p></span></b></div><div style=3D"margin-top: 0cm; margin-rig=
ht: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-f=
amily: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; font-fam=
ily: Calibri, sans-serif; color: rgb(31, 73, 125); "><o:p>&nbsp;</o:p></spa=
n></div><div><div style=3D"margin-top: 0cm; margin-right: 0cm; margin-left:=
 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'Times New Rom=
an', serif; "><span style=3D"color: rgb(31, 73, 125); ">&gt;<span class=3D"=
Apple-converted-space">&nbsp;</span></span>I have just submitted this draft=
. The purpose of this is to address the case where a single portal hides se=
veral real servers behind it, by translating their URLs into URL that seem =
to be from that server.<o:p></o:p></div></div><div><div style=3D"margin-top=
: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-s=
ize: 12pt; font-family: 'Times New Roman', serif; "><span style=3D"color: r=
gb(31, 73, 125); ">&gt;</span><o:p>&nbsp;</o:p></div></div><div><div style=
=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.=
0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><span sty=
le=3D"color: rgb(31, 73, 125); ">&gt;<span class=3D"Apple-converted-space">=
&nbsp;</span></span>In that case the same origin policy is not enforced cor=
rectly, because cookies and scripts from one server behind the portal (for =
example, a mail server) can be shared and can affect pages form another ser=
ver behind the same portal.<o:p></o:p></div></div><div><div style=3D"margin=
-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; fo=
nt-size: 12pt; font-family: 'Times New Roman', serif; "><span style=3D"colo=
r: rgb(31, 73, 125); ">&gt;</span><o:p>&nbsp;</o:p></div></div><div><div st=
yle=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom:=
 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"color: rgb(31, 73, 125); ">&gt;<span class=3D"Apple-converted-spac=
e">&nbsp;</span></span>This draft proposes a header that will tell the clie=
nt (browser) what the real origin is, and allow the client to apply the SOP=
.<o:p></o:p></div></div><div><div style=3D"margin-top: 0cm; margin-right: 0=
cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-family=
: 'Times New Roman', serif; "><o:p>&nbsp;</o:p></div></div><div><div style=
=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.=
0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><span sty=
le=3D"color: rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div style=
=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.=
0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><span sty=
le=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73,=
 125); ">Yoav,<o:p></o:p></span></div><div style=3D"margin-top: 0cm; margin=
-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; fo=
nt-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; font=
-family: Calibri, sans-serif; color: rgb(31, 73, 125); "><o:p>&nbsp;</o:p><=
/span></div><div style=3D"margin-top: 0cm; margin-right: 0cm; margin-left: =
0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'Times New Roma=
n', serif; "><span style=3D"font-size: 11pt; font-family: Calibri, sans-ser=
if; color: rgb(31, 73, 125); ">SSL VPNs that proxy a whole bunch of web sit=
es via a single host are indeed a security problem as they break the same-o=
rigin protections that the individual web sites expect. However, I don=1B$B=
!G=1B(Bt think this draft=1B$B!G=1B(Bs solution is the best approach. It re=
quires browsers to fix what SSL VPN=1B$B!G=1B(Bs have broken; and doesn=1B$=
B!G=1B(Bt provide much improvement until the new functionality is implement=
ed in all browsers and deployed to most users.<o:p></o:p></span></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-botto=
m: 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><spa=
n style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rgb(31=
, 73, 125); "><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12=
pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt=
; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">Wouldn=1B$B!=
G=1B(Bt it be better for SSL VPNs to use lots of sub-domains? For instance,=
 to map internal sites to:<o:p></o:p></span></div><div style=3D"margin-top:=
 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-si=
ze: 12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size=
: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;=
<a href=3D"https://a.sslvpn.example.com/webmail" style=3D"color: blue; text=
-decoration: underline; ">https://a.sslvpn.example.com/webmail</a><o:p></o:=
p></span></div><div style=3D"margin-top: 0cm; margin-right: 0cm; margin-lef=
t: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'Times New R=
oman', serif; "><span style=3D"font-size: 11pt; font-family: Calibri, sans-=
serif; color: rgb(31, 73, 125); ">&nbsp;<span class=3D"Apple-converted-spac=
e">&nbsp;</span><a href=3D"https://b.sslvpn.example.com/wiki/index.html" st=
yle=3D"color: blue; text-decoration: underline; ">https://b.sslvpn.example.=
com/wiki/index.html</a><o:p></o:p></span></div><div style=3D"margin-top: 0c=
m; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size:=
 12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: 1=
1pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;<sp=
an class=3D"Apple-converted-space">&nbsp;</span><a href=3D"https://c.sslvpn=
.example.com/stuff" style=3D"color: blue; text-decoration: underline; ">htt=
ps://c.sslvpn.example.com/stuff</a><o:p></o:p></span></div><div style=3D"ma=
rgin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt=
; font-size: 12pt; font-family: 'Times New Roman', serif; "><span style=3D"=
font-size: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125);=
 "><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0cm; margin-righ=
t: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-fa=
mily: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; font-fami=
ly: Calibri, sans-serif; color: rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span=
></div><div style=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; =
margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', s=
erif; "><span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; c=
olor: rgb(31, 73, 125); ">If the =1B$B!H=1B(BExtended-Origin=1B$B!I=1B(B HT=
TP header approach does proceed=1B$B!D=1B(B<o:p></o:p></span></div><div sty=
le=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><span s=
tyle=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 7=
3, 125); "><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0cm; mar=
gin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt;=
 font-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; f=
ont-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">1] You don=1B$B=
!G=1B(Bt need multiple Extended-Origin headers for successive portals in a =
path. A portal about to insert a header can just take into account any exis=
ting value if present. That is, insert a single Extended-Origin response he=
ader that is unique for each combination of {original-domain; original-exte=
nded-origin-header-value}.<o:p></o:p></span></div><div style=3D"margin-top:=
 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-si=
ze: 12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size=
: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); "><o:p>&=
nbsp;</o:p></span></div><div style=3D"margin-top: 0cm; margin-right: 0cm; m=
argin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'Ti=
mes New Roman', serif; "><span style=3D"font-size: 11pt; font-family: Calib=
ri, sans-serif; color: rgb(31, 73, 125); ">2] I think it would be better to=
 serialize an extended-origin as an additional sub-domain, not a fragment. =
The sub-domain could have a prefix so it cannot (or is highly unlikely to) =
clash with a real sub-domain. Example:<o:p></o:p></span></div><div style=3D=
"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.000=
1pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><span style=
=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 1=
25); ">=1B$B"*=1B(B GET<span class=3D"Apple-converted-space">&nbsp;</span><=
a href=3D"https://sslvpn.example.com/xyz" style=3D"color: blue; text-decora=
tion: underline; ">https://sslvpn.example.com/xyz</a><o:p></o:p></span></di=
v><div style=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margi=
n-bottom: 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;=
 "><span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color:=
 rgb(31, 73, 125); ">=1B$B"+=1B(B Extended-Origin: asdhgasghd<o:p></o:p></s=
pan></div><div style=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0c=
m; margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'Times New Roman'=
, serif; "><span style=3D"font-size: 11pt; font-family: Calibri, sans-serif=
; color: rgb(31, 73, 125); ">=1B$B"*=1B(B Origin:<span class=3D"Apple-conve=
rted-space">&nbsp;</span><a href=3D"https://xb--asdhgasghd.sslvpn.example.c=
om" style=3D"color: blue; text-decoration: underline; ">https://xb--asdhgas=
ghd.sslvpn.example.com</a><o:p></o:p></span></div></div></div></div></span>=
</blockquote></div><br></div></body></html>=

--_000_7BC9C725960449C99A6BB24B6B088B0Acheckpointcom_--

From James.H.Manger@team.telstra.com  Thu Feb 23 15:35:05 2012
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C601A21F87E5 for <websec@ietfa.amsl.com>; Thu, 23 Feb 2012 15:35:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.646
X-Spam-Level: 
X-Spam-Status: No, score=-1.646 tagged_above=-999 required=5 tests=[AWL=-0.746, BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5qo4u8S9Da6a for <websec@ietfa.amsl.com>; Thu, 23 Feb 2012 15:35:05 -0800 (PST)
Received: from ipxcvo.tcif.telstra.com.au (ipxcvo.tcif.telstra.com.au [203.35.135.208]) by ietfa.amsl.com (Postfix) with ESMTP id 8038C21F8723 for <websec@ietf.org>; Thu, 23 Feb 2012 15:35:03 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.73,472,1325422800"; d="scan'208,217";a="65371862"
Received: from unknown (HELO ipcbvi.tcif.telstra.com.au) ([10.97.217.204]) by ipocvi.tcif.telstra.com.au with ESMTP; 24 Feb 2012 10:35:02 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6629"; a="51620461"
Received: from wsmsg3701.srv.dir.telstra.com ([172.49.40.169]) by ipcbvi.tcif.telstra.com.au with ESMTP; 24 Feb 2012 10:35:02 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3701.srv.dir.telstra.com ([172.49.40.169]) with mapi; Fri, 24 Feb 2012 10:35:01 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Yoav Nir <ynir@checkpoint.com>
Date: Fri, 24 Feb 2012 10:35:00 +1100
Thread-Topic: I-D Action: draft-nir-websec-extended-origin-00.txt
Thread-Index: AczyO6ClayzDt7DeQim8fjl7FzrVqwARihCA
Message-ID: <255B9BB34FB7D647A506DC292726F6E114EC261EA8@WSMSG3153V.srv.dir.telstra.com>
References: <20120202220021.31936.37346.idtracker@ietfa.amsl.com> <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com> <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com> <7BC9C725-9604-49C9-9A6B-B24B6B088B0A@checkpoint.com>
In-Reply-To: <7BC9C725-9604-49C9-9A6B-B24B6B088B0A@checkpoint.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E114EC261EA8WSMSG3153Vsrv_"
MIME-Version: 1.0
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] I-D Action: draft-nir-websec-extended-origin-00.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Feb 2012 23:35:05 -0000

--_000_255B9BB34FB7D647A506DC292726F6E114EC261EA8WSMSG3153Vsrv_
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

> The scheme that you propose (a.sslvpn.example.com<http://a.sslvpn.example=
.com>, b.sslvpn.example.com<http://b.sslvpn.example.com>, etc.) really does=
 work. In fact, the product that my company makes offers this as an option.

Good to hear.

> Sadly, our customers don't like it, hence the other option.  Using multip=
le FQDNs requires them to either buy multiple certificates, or a wildcard c=
ertificate, both options are more expensive. Additionally this requires the=
m to add multiple DNS records, which for some reason they find cumbersome.

Not sure that that is a good enough reason to introduce extended origins.

>> 2] I think it would be better to serialize an extended-origin as an addi=
tional sub-domain, not a fragment. The sub-domain could have a prefix so it=
 cannot (or is highly unlikely to) clash with a real sub-domain. Example:
>> =1B$B"*=1B(B GET https://sslvpn.example.com/xyz
>> =1B$B"+=1B(B Extended-Origin: asdhgasghd
>> =1B$B"*=1B(B Origin: https://xb--asdhgasghd.sslvpn.example.com

> 2) I don't see that it makes much of a difference. I can do it either way=
. Can you explain what is the advantage of this over the pseudo-fragment fo=
rmat?

No big advantage. A pseudo-sub-domain hints at the better approach (using a=
ctual sub-domains). It matches the existing syntax (which probably simplifi=
es some code).

--
James Manger

--_000_255B9BB34FB7D647A506DC292726F6E114EC261EA8WSMSG3153Vsrv_
Content-Type: text/html; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Diso-2022-jp"><meta name=3DGenerator content=3D"Mic=
rosoft Word 12 (filtered medium)"><base href=3D"x-msg://57/"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"MS PGothic";
	panose-1:2 11 6 0 7 2 5 8 2 4;}
@font-face
	{font-family:"\@MS PGothic";
	panose-1:2 11 6 0 7 2 5 8 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"MS PGothic","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"MS PGothic","sans-serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-AU link=3Dblue vli=
nk=3Dpurple style=3D'word-wrap: break-word;-webkit-nbsp-mode: space;-webkit=
-line-break: after-white-space'><div class=3DWordSection1><div><p class=3DM=
soNormal><span style=3D'color:#1F497D'>&gt; </span>The scheme that you prop=
ose (<a href=3D"http://a.sslvpn.example.com">a.sslvpn.example.com</a>, <a h=
ref=3D"http://b.sslvpn.example.com">b.sslvpn.example.com</a>, etc.) really =
does work. In fact, the product that my company makes offers this as an opt=
ion.<o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'color:#1F=
497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Good to hear.=
<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;=
font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span><=
/p></div><div><p class=3DMsoNormal><span style=3D'color:#1F497D'>&gt; </spa=
n>Sadly, our customers don't like it, hence the other option. &nbsp;Using m=
ultiple FQDNs requires them to either buy multiple certificates, or a wildc=
ard certificate, both options are more expensive. Additionally this require=
s them to add multiple DNS records, which for some reason they find cumbers=
ome.<o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'color:#1F=
497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Not sure that=
 that is a good enough reason to introduce extended origins.<o:p></o:p></sp=
an></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DM=
soNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"=
;color:#1F497D'>&gt;&gt; </span><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'>2] I think it would be better to ser=
ialize an extended-origin as an additional sub-domain, not a fragment. The =
sub-domain could have a prefix so it cannot (or is highly unlikely to) clas=
h with a real sub-domain. Example:</span><span style=3D'font-family:"Times =
New Roman","serif"'><o:p></o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&gt;=
&gt; </span><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-ser=
if";color:#1F497D'>=1B$B"*=1B(B GET<span class=3Dapple-converted-space>&nbs=
p;</span><a href=3D"https://sslvpn.example.com/xyz">https://sslvpn.example.=
com/xyz</a></span><span style=3D'font-family:"Times New Roman","serif"'><o:=
p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fon=
t-family:"Calibri","sans-serif";color:#1F497D'>&gt;&gt; </span><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>=1B$=
B"+=1B(B Extended-Origin: asdhgasghd</span><span style=3D'font-family:"Time=
s New Roman","serif"'><o:p></o:p></span></p><p class=3DMsoNormal><span styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&gt=
;&gt; </span><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>=1B$B"*=1B(B Origin:<span class=3Dapple-converted-space=
>&nbsp;</span><a href=3D"https://xb--asdhgasghd.sslvpn.example.com">https:/=
/xb--asdhgasghd.sslvpn.example.com</a></span><span style=3D'font-family:"Ti=
mes New Roman","serif"'><o:p></o:p></span></p><p class=3DMsoNormal><span st=
yle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><=
o:p>&nbsp;</o:p></span></p></div><div><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>&gt; </span>2) I don't see that it makes much of a difference=
. I can do it either way. Can you explain what is the advantage of this ove=
r the pseudo-fragment format?<o:p></o:p></p></div><div><p class=3DMsoNormal=
><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNo=
rmal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";col=
or:#1F497D'>No big advantage. A pseudo-sub-domain hints at the better appro=
ach (using actual sub-domains). It matches the existing syntax (which proba=
bly simplifies some code).<o:p></o:p></span></p></div><div><p class=3DMsoNo=
rmal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DM=
soNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"=
;color:#1F497D'>--<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D=
'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>James M=
anger<o:p></o:p></span></p></div></div></body></html>=

--_000_255B9BB34FB7D647A506DC292726F6E114EC261EA8WSMSG3153Vsrv_--

From ynir@checkpoint.com  Sun Feb 26 04:14:09 2012
Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24F3021F85FD for <websec@ietfa.amsl.com>; Sun, 26 Feb 2012 04:14:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.453
X-Spam-Level: 
X-Spam-Status: No, score=-10.453 tagged_above=-999 required=5 tests=[AWL=0.145, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lpGxm-kEhV4k for <websec@ietfa.amsl.com>; Sun, 26 Feb 2012 04:14:08 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id C884921F85FB for <websec@ietf.org>; Sun, 26 Feb 2012 04:14:07 -0800 (PST)
X-CheckPoint: {4F4A1DC3-1-1B221DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id q1QCE0LE002784;  Sun, 26 Feb 2012 14:14:05 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Sun, 26 Feb 2012 14:14:00 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
Date: Sun, 26 Feb 2012 14:14:07 +0200
Thread-Topic: I-D Action: draft-nir-websec-extended-origin-00.txt
Thread-Index: Acz0gB82ZoFbAcw4QyOD8khg3P9KmQ==
Message-ID: <C800BA3D-8988-4DDA-B5BB-759435634746@checkpoint.com>
References: <20120202220021.31936.37346.idtracker@ietfa.amsl.com> <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com> <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com> <7BC9C725-9604-49C9-9A6B-B24B6B088B0A@checkpoint.com> <255B9BB34FB7D647A506DC292726F6E114EC261EA8@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E114EC261EA8@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: multipart/alternative; boundary="_000_C800BA3D89884DDAB5BB759435634746checkpointcom_"
MIME-Version: 1.0
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] I-D Action: draft-nir-websec-extended-origin-00.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Feb 2012 12:14:09 -0000

--_000_C800BA3D89884DDAB5BB759435634746checkpointcom_
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable


On Feb 24, 2012, at 1:35 AM, Manger, James H wrote:

> The scheme that you propose (a.sslvpn.example.com<http://a.sslvpn.example=
.com>, b.sslvpn.example.com<http://b.sslvpn.example.com>, etc.) really does=
 work. In fact, the product that my company makes offers this as an option.

Good to hear.

> Sadly, our customers don't like it, hence the other option.  Using multip=
le FQDNs requires them to either buy multiple certificates, or a wildcard c=
ertificate, both options are more expensive. Additionally this requires the=
m to add multiple DNS records, which for some reason they find cumbersome.

Not sure that that is a good enough reason to introduce extended origins.

I checked the products of some of our competitors, and they seem to also of=
fer both options. IMHO the cost and complexity of deployment for the user a=
re valid considerations for engineering.

In this case, the cost is incurred not because of technical necessity but b=
ecause of the way browsers work with commercial CAs - that wildcard certifi=
cates are more expensive, and multiple certificates are also more expensive=
.  Regardless, the cost and complexity are real.

I hope to have a -01 draft ready in time, which will address your other poi=
nt.

Thanks again for the review

Yoav



--_000_C800BA3D89884DDAB5BB759435634746checkpointcom_
Content-Type: text/html; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

<html><head><base href=3D"x-msg://57/"></head><body style=3D"word-wrap: bre=
ak-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "=
><br><div><div>On Feb 24, 2012, at 1:35 AM, Manger, James H wrote:</div><br=
 class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; font-family: Taho=
ma; font-style: normal; font-variant: normal; font-weight: normal; letter-s=
pacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; =
text-indent: 0px; text-transform: none; white-space: normal; widows: 2; wor=
d-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vert=
ical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-s=
ize-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div=
 lang=3D"EN-AU" link=3D"blue" vlink=3D"purple" style=3D"word-wrap: break-wo=
rd; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div=
 class=3D"WordSection1" style=3D"page: WordSection1; "><div><div style=3D"m=
argin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001p=
t; font-size: 12pt; font-family: 'MS PGothic', sans-serif; "><span style=3D=
"color: rgb(31, 73, 125); ">&gt;<span class=3D"Apple-converted-space">&nbsp=
;</span></span>The scheme that you propose (<a href=3D"http://a.sslvpn.exam=
ple.com" style=3D"color: blue; text-decoration: underline; ">a.sslvpn.examp=
le.com</a>,<span class=3D"Apple-converted-space">&nbsp;</span><a href=3D"ht=
tp://b.sslvpn.example.com" style=3D"color: blue; text-decoration: underline=
; ">b.sslvpn.example.com</a>, etc.) really does work. In fact, the product =
that my company makes offers this as an option.<o:p></o:p></div></div><div>=
<div style=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-=
bottom: 0.0001pt; font-size: 12pt; font-family: 'MS PGothic', sans-serif; "=
><span style=3D"color: rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><d=
iv style=3D"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bo=
ttom: 0.0001pt; font-size: 12pt; font-family: 'MS PGothic', sans-serif; "><=
span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rgb=
(31, 73, 125); ">Good to hear.<o:p></o:p></span></div><div style=3D"margin-=
top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; fon=
t-size: 12pt; font-family: 'MS PGothic', sans-serif; "><span style=3D"font-=
size: 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); "><o=
:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: 0cm; margi=
n-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; f=
ont-family: 'MS PGothic', sans-serif; "><span style=3D"color: rgb(31, 73, 1=
25); ">&gt;<span class=3D"Apple-converted-space">&nbsp;</span></span>Sadly,=
 our customers don't like it, hence the other option. &nbsp;Using multiple =
FQDNs requires them to either buy multiple certificates, or a wildcard cert=
ificate, both options are more expensive. Additionally this requires them t=
o add multiple DNS records, which for some reason they find cumbersome.<o:p=
></o:p></div></div><div><div style=3D"margin-top: 0cm; margin-right: 0cm; m=
argin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'MS=
 PGothic', sans-serif; "><span style=3D"color: rgb(31, 73, 125); "><o:p>&nb=
sp;</o:p></span></div><div style=3D"margin-top: 0cm; margin-right: 0cm; mar=
gin-left: 0cm; margin-bottom: 0.0001pt; font-size: 12pt; font-family: 'MS P=
Gothic', sans-serif; "><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125); ">Not sure that that is a good enoug=
h reason to introduce extended origins.<o:p></o:p></span></div></div></div>=
</div></span></blockquote><br></div><div>I checked the products of some of =
our competitors, and they seem to also offer both options. IMHO the cost an=
d complexity of deployment for the user are valid considerations for engine=
ering.&nbsp;</div><div><br></div><div>In this case, the cost is incurred no=
t because of technical necessity but because of the way browsers work with =
commercial CAs - that wildcard certificates are more expensive, and multipl=
e certificates are also more expensive. &nbsp;Regardless, the cost and comp=
lexity are real.</div><div><br></div><div>I hope to have a -01 draft ready =
in time, which will address your other point.&nbsp;</div><div><br></div><di=
v>Thanks again for the review</div><div><br></div><div>Yoav</div><div><br><=
/div><br></body></html>=

--_000_C800BA3D89884DDAB5BB759435634746checkpointcom_--

From ietf@adambarth.com  Sun Feb 26 09:54:08 2012
Return-Path: <ietf@adambarth.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8605021F8568 for <websec@ietfa.amsl.com>; Sun, 26 Feb 2012 09:54:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.958
X-Spam-Level: 
X-Spam-Status: No, score=-2.958 tagged_above=-999 required=5 tests=[AWL=0.019,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eaLmdqRiB6Pt for <websec@ietfa.amsl.com>; Sun, 26 Feb 2012 09:54:08 -0800 (PST)
Received: from mail-ee0-f44.google.com (mail-ee0-f44.google.com [74.125.83.44]) by ietfa.amsl.com (Postfix) with ESMTP id B9EC621F855B for <websec@ietf.org>; Sun, 26 Feb 2012 09:54:07 -0800 (PST)
Received: by eeke51 with SMTP id e51so509487eek.31 for <websec@ietf.org>; Sun, 26 Feb 2012 09:54:07 -0800 (PST)
Received-SPF: pass (google.com: domain of ietf@adambarth.com designates 10.14.120.210 as permitted sender) client-ip=10.14.120.210; 
Authentication-Results: mr.google.com; spf=pass (google.com: domain of ietf@adambarth.com designates 10.14.120.210 as permitted sender) smtp.mail=ietf@adambarth.com
Received: from mr.google.com ([10.14.120.210]) by 10.14.120.210 with SMTP id p58mr187299eeh.98.1330278847037 (num_hops = 1); Sun, 26 Feb 2012 09:54:07 -0800 (PST)
Received: by 10.14.120.210 with SMTP id p58mr142551eeh.98.1330278846846; Sun, 26 Feb 2012 09:54:06 -0800 (PST)
Received: from mail-lpp01m010-f44.google.com (mail-lpp01m010-f44.google.com [209.85.215.44]) by mx.google.com with ESMTPS id s48sm47742835eem.0.2012.02.26.09.54.05 (version=SSLv3 cipher=OTHER); Sun, 26 Feb 2012 09:54:05 -0800 (PST)
Received: by lagj5 with SMTP id j5so1079802lag.31 for <websec@ietf.org>; Sun, 26 Feb 2012 09:54:04 -0800 (PST)
Received-SPF: pass (google.com: domain of ietf@adambarth.com designates 10.112.82.6 as permitted sender) client-ip=10.112.82.6; 
Received: from mr.google.com ([10.112.82.6]) by 10.112.82.6 with SMTP id e6mr4411750lby.31.1330278844351 (num_hops = 1); Sun, 26 Feb 2012 09:54:04 -0800 (PST)
Received: by 10.112.82.6 with SMTP id e6mr3734344lby.31.1330278844202; Sun, 26 Feb 2012 09:54:04 -0800 (PST)
MIME-Version: 1.0
Received: by 10.112.1.230 with HTTP; Sun, 26 Feb 2012 09:53:34 -0800 (PST)
In-Reply-To: <C800BA3D-8988-4DDA-B5BB-759435634746@checkpoint.com>
References: <20120202220021.31936.37346.idtracker@ietfa.amsl.com> <C35E9FBD-8AF7-4F63-B798-1316B985E032@checkpoint.com> <255B9BB34FB7D647A506DC292726F6E114EC261141@WSMSG3153V.srv.dir.telstra.com> <7BC9C725-9604-49C9-9A6B-B24B6B088B0A@checkpoint.com> <255B9BB34FB7D647A506DC292726F6E114EC261EA8@WSMSG3153V.srv.dir.telstra.com> <C800BA3D-8988-4DDA-B5BB-759435634746@checkpoint.com>
From: Adam Barth <ietf@adambarth.com>
Date: Sun, 26 Feb 2012 09:53:34 -0800
Message-ID: <CAJE5ia_hBFBC4ukd2pQTkLkO_qm0=BaMQfwqaLsUGe5TuqeoFA@mail.gmail.com>
To: Yoav Nir <ynir@checkpoint.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQlljAy7HGvaLKpuvzmYEO1cjNDvmjB9qrxgbDjWRqclwzreh5bcEdSzfb0ZcAXp0hGvSw99
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] I-D Action: draft-nir-websec-extended-origin-00.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Feb 2012 17:54:08 -0000

2012/2/26 Yoav Nir <ynir@checkpoint.com>:
>
> On Feb 24, 2012, at 1:35 AM, Manger, James H wrote:
>
>>=A0The scheme that you propose (a.sslvpn.example.com,=A0b.sslvpn.example.=
com,
>> etc.) really does work. In fact, the product that my company makes offer=
s
>> this as an option.
>
> Good to hear.
>
>>=A0Sadly, our customers don't like it, hence the other option. =A0Using
>> multiple FQDNs requires them to either buy multiple certificates, or a
>> wildcard certificate, both options are more expensive. Additionally this
>> requires them to add multiple DNS records, which for some reason they fi=
nd
>> cumbersome.
>
> Not sure that that is a good enough reason to introduce extended origins.
>
>
> I checked the products of some of our competitors, and they seem to also
> offer both options. IMHO the cost and complexity of deployment for the us=
er
> are valid considerations for engineering.
>
> In this case, the cost is incurred not because of technical necessity but
> because of the way browsers work with commercial CAs - that wildcard
> certificates are more expensive, and multiple certificates are also more
> expensive. =A0Regardless, the cost and complexity are real.
>
> I hope to have a -01 draft ready in time, which will address your other
> point.
>
> Thanks again for the review

Frankly, your proposal is very unlikely to be implemented.  The
engineering effort required to implement is quite large, if it's even
possible.  Consider, for example, that beyond just changing the
browser, you'd also need to change Flash, Java, and every other
plug-in that implements the same-origin policy.

In addition to that complexity, there are many assumptions in browsers
and in the software that surrounds browsers that origins are
determined by URL.  Your proposal breaks that assumption.

Adam
