Hi Trevor. 

I think (a) is definitely worth doing, but I also think that (b) can be done 
along the way. Is there some reason why (a) and (b) can't be requirements 
filled by a single mechanism?

Regarding smart cookies vs channel ID: Not changing TLS is a definite advantage 
of Smart Cookies. Reading that message again ([1]), I'm not sure whether the 
cookie_binding is necessary, but I get that it protects against passing 
cookies. The only issue I have with this is that it relies on extractors, and 
so will break at TLS proxies. While this is good from a security perspective, 
it's a killer for deployment. I think that Channel ID works in the presence of 
proxies, assuming the proxies are updated and move the encrypted extension 
unchanged.

Yoav

[1] http://www.ietf.org/mail-archive/web/websec/current/msg01729.html


On Aug 20, 2013, at 3:44 AM, Trevor Perrin <tr...@trevp.net> wrote:

> To pick this up again, it would be great to have:
> 
> (a) Some cryptographic binding for cookies, either using asymmetric
> crypto (ChannelID) or symmetric (Smart Cookies), to prevent them being
> useable when transferred between browsers.
> 
> (b) Some origin-binding for cookies to prevent them leaking to
> subdomains and being forced by other domains (Origin Cookies).
> 
> 
> Both (a) and (b) address the threats of cookie-forcing and
> cookie-stealing, but neither is a complete replacement for the other:
> 
> (a) Cryptographic binding of cookies would not prevent an attacker
> who controls related domains from:
>  - deleting cookies
>  - stealing a cookie from user A and then forcing it back to A,
> later, to roll-back the cookie to an earlier value
> 
> (b) Origin binding of cookies would not protect against a failure in
> TLS confidentiality that exposes the cookie's value.
> 
> 
> Questions
> =========
> * Are both (a) and (b) worth doing?  Should we prioritize one?
> 
> * Regarding ChannelID vs Smart Cookies:  ChannelID provides a
> "bindable" identifier that could be used for other things besides
> cookies (OAuth tokens? other?).  But it also requires TLS changes and
> an additional signing operation on the client.  The Smart Cookie
> approach is more efficient but also narrowly scoped to cookies.
> 
> Do people have other arguments, or strong feelings, one way or the other?
> 
> 
> Trevor
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec

_______________________________________________
websec mailing list
websec@ietf.org
https://www.ietf.org/mailman/listinfo/websec

Reply via email to