chromium / hstspreload.org

:lock: Chromium's HSTS preload list submission website.
https://hstspreload.org
BSD 3-Clause "New" or "Revised" License
772 stars 89 forks source link

Track down sites suggesting to blindly preload #68

Open lgarron opened 7 years ago

lgarron commented 7 years ago

Latest one:

lgarron commented 7 years ago

https://github.com/roots/trellis defaults to preload. I've filed a bug at https://github.com/roots/trellis/issues/727

lgarron commented 7 years ago

PR set to twitter/secureheaders at https://github.com/twitter/secureheaders/pull/310

lgarron commented 7 years ago

The hstspreload.org site now also has a section about this: https://hstspreload.org/#opt-in

lgarron commented 7 years ago

https://www.section.io/blog/using-varnish-to-tweak-your-http-responses/

screen shot 2017-01-18 at 18 36 32

The relevant gist is owned by @section-io-gists

glennslaven commented 7 years ago

Hi @lgarron,

Thanks for pointing this out, we've updated the gist to remove the preload directive.

lgarron commented 7 years ago

Thanks for pointing this out, we've updated the gist to remove the preload directive.

Looks good, thanks! (You may also want to remove the trailing semicolon, but that doesn't affect correctness.)

graingert commented 7 years ago

@lgarron maybe the header should be changed to:

preload, SHA3(`${domain} I have read and understood https://hstspreload.org/#information`)
lgarron commented 7 years ago

@lgarron maybe the header should be changed to:

Then someone will find a way to automate it and shoot their users in the foot. :-P

More seriously, a site-specific confirmation is not a bad idea, but 1) it requires extra configuration for infrastructure shared across multiple hosts (a specific value per host, instead of ≈ a boolean) 2) It requires changing the header convention. This is a non-trivial change in semantics; I don't want to change or add anything other than preload without a spec. 3) It requires us to figure out what to do for the special case of old domains.

It would probably be a good idea to discuss this at a meetup this year, which I would like to organize again once we've automated scanning and pruning.

lgarron commented 7 years ago

@graingert: Actually, would you mind filing a separate issue for that idea, so we can keep track of any progress on it in one place?

graingert commented 7 years ago

@lgarron 1. no because you can provide a set of SHA3(domain + edu-nonce) and as long as your domain is in the set you win

win = preload

graingert commented 7 years ago

Those that know enough to automate it, know not to

lgarron commented 7 years ago

@lgarron 1. no because you can provide a set of SHA3(domain + edu-nonce) and as long as your domain is in the set you win

Bloating headers is not a good idea. :-/

graingert commented 7 years ago

HPACK means it's fine

lgarron commented 7 years ago

HPACK means it's fine

I don't think this is an appropriate assumption to make on behalf of all sites and clients.

In any case, I think a single hash for just the current domain is reasonable to ask for, and rolling it out won't be any harder from our end.

lgarron commented 7 years ago

Talks about preloading but doesn't mention how to submit to the list: https://blog.stackpath.com/glossary/hsts/

lgarron commented 7 years ago

https://varvy.com/pagespeed/hsts.html

Malvoz commented 4 years ago

I think https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security could need some clarification around preload and the submission list.