Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Track down sites suggesting to blindly preload #68

Open
lgarron opened this issue Dec 2, 2016 · 17 comments
Open

Track down sites suggesting to blindly preload #68

lgarron opened this issue Dec 2, 2016 · 17 comments

Comments

@lgarron
Copy link
Collaborator

lgarron commented Dec 2, 2016

Latest one:

@lgarron
Copy link
Collaborator Author

lgarron commented Jan 7, 2017

https://github.com/roots/trellis defaults to preload.
I've filed a bug at roots/trellis#727

@lgarron
Copy link
Collaborator Author

lgarron commented Jan 7, 2017

PR set to twitter/secureheaders at github/secure_headers#310

@lgarron
Copy link
Collaborator Author

lgarron commented Jan 7, 2017

The hstspreload.org site now also has a section about this: https://hstspreload.org/#opt-in

@lgarron
Copy link
Collaborator Author

lgarron commented Jan 19, 2017

@glennslaven
Copy link

Hi @lgarron,

Thanks for pointing this out, we've updated the gist to remove the preload directive.

@lgarron
Copy link
Collaborator Author

lgarron commented Jan 19, 2017

Thanks for pointing this out, we've updated the gist to remove the preload directive.

Looks good, thanks!
(You may also want to remove the trailing semicolon, but that doesn't affect correctness.)

@graingert
Copy link

@lgarron maybe the header should be changed to:

preload, SHA3(`${domain} I have read and understood https://hstspreload.org/#information`)

@lgarron
Copy link
Collaborator Author

lgarron commented Feb 2, 2017

@lgarron maybe the header should be changed to:

Then someone will find a way to automate it and shoot their users in the foot. :-P

More seriously, a site-specific confirmation is not a bad idea, but

  1. it requires extra configuration for infrastructure shared across multiple hosts (a specific value per host, instead of ≈ a boolean)
  2. It requires changing the header convention. This is a non-trivial change in semantics; I don't want to change or add anything other than preload without a spec.
  3. It requires us to figure out what to do for the special case of old domains.

It would probably be a good idea to discuss this at a meetup this year, which I would like to organize again once we've automated scanning and pruning.

@lgarron
Copy link
Collaborator Author

lgarron commented Feb 2, 2017

@graingert: Actually, would you mind filing a separate issue for that idea, so we can keep track of any progress on it in one place?

@graingert
Copy link

@lgarron 1. no because you can provide a set of SHA3(domain + edu-nonce) and as long as your domain is in the set you win

win = preload

@graingert
Copy link

Those that know enough to automate it, know not to

@lgarron
Copy link
Collaborator Author

lgarron commented Feb 2, 2017

@lgarron 1. no because you can provide a set of SHA3(domain + edu-nonce) and as long as your domain is in the set you win

Bloating headers is not a good idea. :-/

@graingert
Copy link

HPACK means it's fine

@lgarron
Copy link
Collaborator Author

lgarron commented Feb 2, 2017

HPACK means it's fine

I don't think this is an appropriate assumption to make on behalf of all sites and clients.

In any case, I think a single hash for just the current domain is reasonable to ask for, and rolling it out won't be any harder from our end.

@lgarron
Copy link
Collaborator Author

lgarron commented Apr 5, 2017

Talks about preloading but doesn't mention how to submit to the list: https://blog.stackpath.com/glossary/hsts/

@lgarron
Copy link
Collaborator Author

lgarron commented Jul 19, 2017

@Malvoz
Copy link

Malvoz commented Nov 12, 2019

I think https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security could need some clarification around preload and the submission list.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants