-
Notifications
You must be signed in to change notification settings - Fork 137
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using alt-svc on localhost #89
Comments
|
See also #73 |
|
1918 space is similarly problematic. |
|
Discussed in Prague; add security considerations / non-normative text that this is another form of privilege escalation, and should be taken into account. (both localhost and special use networks / rfc1918). Need to discuss with webappsec as well as security folks in ietf. |
|
Treating rfc1918 as special opens up a can of worms, especially as there is no clear mapping there in the IPv6 world and as other related spaces (rfc6598). We may just generally want to ensure AltSvc can't be used to probe/attack internal hosts behind a firewall regardless of what IP space is present. Due to the async behavior of Alt-Svc and the reliance on cert validation, we may be OK here as long as we don't treat rfc1918 space special (eg, as long as we don't relax cert validation requirements there). |
|
The prohibition on host changes for cleartext |
|
due to the prohibition on host changes and the async nature of alt-svc, the only issue I can see here is that example.com can probe for things behind the firewall that have the example.com cert :) but maybe I'm missing the concern? |
|
Discussed in Yokohama; we think we can close this with no action. |
|
@reschke please add to the changes section. |
You can identify an alternative on a different port on localhost trivially and it might be considered authoritative. You probably don't want to accept localhost as a valid alternative for an
http://example.comorigin.The text was updated successfully, but these errors were encountered: