Hi everyone,
As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)
Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).
In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries, but we need to figure out how. I see two options:
Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.
Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.
I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".
Here's a strawman proposalIf Firefox only filters out domains with policies that start with “bulk”, they will automatically retain the eTLD and (eTLD-requested entries) entries, without hard-coding more specific knowledge in their script. At present, non-bulk HSTS entries only make up about 1% of the list, so this shouldn't make a significant size impact.
dkeeler@/Mozilla folks: Does this approach look reasonable to you? Do you have any other desires/requirements?
Gabriel/Microsoft: If Mozilla includes TLDs in their list, can you confirm whether Microsoft will automatically pick those up?
Anyone else who processes the preload list: Do you ever want to distinguish between kinds of preloaded entries beyond this kind of policy classification?
»Lucas
Hi everyone,
As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)
Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).
In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries, but we need to figure out how. I see two options:
Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.
Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.
I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvZOntrTEZ2jTrj7rryZ1zKNR57%3DGh3PSKpX88WM-e4nHA%40mail.gmail.com.
On Thu, Oct 19, 2017 at 7:19 PM Ryan Sleevi <rsl...@chromium.org> wrote:On Thu, Oct 19, 2017 at 5:31 PM, Lucas Garron <lga...@chromium.org> wrote:Hi everyone,
As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)
Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).
In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries, but we need to figure out how. I see two options:
Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.
Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.
I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".
Could you clarify more about "etld" and "etld-requested-gov"? We've been trying to stay away from terminology re: eTLD in the various spaces, so it might be helpful to be precise. That is, is it just related to TLDs? Or is there more you expect (e.g. ccTLDs)?Good to know! I also find eTLD a pretty awkward term. :-(In general, it is beneficial to preload parent domains instead of individual child domains. Although we are only in talks with gTLDs right now, I would be eager to preload any public suffix that is ready – old TLDs, gTLDs, ccTLDs, or anything at publicsuffix.org.For "eTLD-owner requested", the only TLD with which we currently have an arrangement is .gov. However, I believe there is interest from gov.uk (an SLD), and I'm hoping the approach might help other public suffixes who want to deprecate HTTP for new domains going forward.If it's just a matter of terminology, is "public suffix" or oversimplification to "TLD" a good alternative?
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvZOntrTEZ2jTrj7rryZ1zKNR57%3DGh3PSKpX88WM-e4nHA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CAKj7jtt19Hr9O%3DkpF5JFqaVsendh_2-X6TZNDntbTqq2bzYNpA%40mail.gmail.com.
On Fri, Oct 20, 2017 at 4:15 PM, 'Lucas Garron' via HSTS Discuss <hsts-d...@chromium.org> wrote:On Thu, Oct 19, 2017 at 7:19 PM Ryan Sleevi <rsl...@chromium.org> wrote:On Thu, Oct 19, 2017 at 5:31 PM, Lucas Garron <lga...@chromium.org> wrote:Hi everyone,
As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)
Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).
In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries, but we need to figure out how. I see two options:
Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.
Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.
I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".
Could you clarify more about "etld" and "etld-requested-gov"? We've been trying to stay away from terminology re: eTLD in the various spaces, so it might be helpful to be precise. That is, is it just related to TLDs? Or is there more you expect (e.g. ccTLDs)?Good to know! I also find eTLD a pretty awkward term. :-(In general, it is beneficial to preload parent domains instead of individual child domains. Although we are only in talks with gTLDs right now, I would be eager to preload any public suffix that is ready – old TLDs, gTLDs, ccTLDs, or anything at publicsuffix.org.For "eTLD-owner requested", the only TLD with which we currently have an arrangement is .gov. However, I believe there is interest from gov.uk (an SLD), and I'm hoping the approach might help other public suffixes who want to deprecate HTTP for new domains going forward.If it's just a matter of terminology, is "public suffix" or oversimplification to "TLD" a good alternative?I think you could probably drop "-gov" from the label either way. Though .gov is the first, and maybe the second will also be a government, there's nothing inherently government-specific about it. The idea here would be a class of domains for which the TLD is in a position to authorize their preloading as a policy matter, but not in a technical manner (at least not via the currently employed technical manner, via a HSTS flag).
Though I don't work on a browser, I do parse the preload list as part of enforcement/compliance efforts, and an annotation approach would be the easiest from a client perspective (and also likeliest to lead to consistent results across clients/browsers).-- Eric
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvZOntrTEZ2jTrj7rryZ1zKNR57%3DGh3PSKpX88WM-e4nHA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
On Thu, Oct 19, 2017 at 7:19 PM Ryan Sleevi <rsl...@chromium.org> wrote:On Thu, Oct 19, 2017 at 5:31 PM, Lucas Garron <lga...@chromium.org> wrote:Hi everyone,
As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)
Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).
In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries, but we need to figure out how. I see two options:
Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.
Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.
I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".
Could you clarify more about "etld" and "etld-requested-gov"? We've been trying to stay away from terminology re: eTLD in the various spaces, so it might be helpful to be precise. That is, is it just related to TLDs? Or is there more you expect (e.g. ccTLDs)?Good to know! I also find eTLD a pretty awkward term. :-(In general, it is beneficial to preload parent domains instead of individual child domains. Although we are only in talks with gTLDs right now, I would be eager to preload any public suffix that is ready – old TLDs, gTLDs, ccTLDs, or anything at publicsuffix.org.For "eTLD-owner requested", the only TLD with which we currently have an arrangement is .gov. However, I believe there is interest from gov.uk (an SLD), and I'm hoping the approach might help other public suffixes who want to deprecate HTTP for new domains going forward.If it's just a matter of terminology, is "public suffix" or oversimplification to "TLD" a good alternative?
Hi folks,
At this moment we can’t consume “eTLD”s, unfortunately. I have not had a chance to discuss in detail with the developers in charge. I think the “policy” field makes sense going forward, although, of course, we can’t consume it at this point.
Gabriel
Oh, I see. I was assuming, apparently incorrectly, that entries on the public suffix list would be excluded. That is, I think it's reasonable to preload gTLDs (under the new ICANN contracting structure), and potentially ccTLDs (due to the existing [lack of] restrictions), but would be uncomfortable with preloading legacy TLDs or arbitrary public suffices as a special case.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CADYDTCBDJSVOfTw3e%3Dd4_vPFasUDNQ%3DA6F0xKN1ks4J1P1MWBA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CAC7uhV-vqA4Sfb1RVb-uYMAoWRAmB400A%2Bb1AQCX5UzfahLfmA%40mail.gmail.com.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CADYDTCBDJSVOfTw3e%3Dd4_vPFasUDNQ%3DA6F0xKN1ks4J1P1MWBA%40mail.gmail.com.
--
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CAC7uhV-vqA4Sfb1RVb-uYMAoWRAmB400A%2Bb1AQCX5UzfahLfmA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvaAYRm33soYcb0YXOZw9qpJfgNzna8kmSnh44Z3a-u60w%40mail.gmail.com.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CADYDTCBDJSVOfTw3e%3Dd4_vPFasUDNQ%3DA6F0xKN1ks4J1P1MWBA%40mail.gmail.com.
--
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
--To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CAC7uhV-vqA4Sfb1RVb-uYMAoWRAmB400A%2Bb1AQCX5UzfahLfmA%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvaAYRm33soYcb0YXOZw9qpJfgNzna8kmSnh44Z3a-u60w%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CAKj7jtsEHAZcPcQ4DR8YCZx55OK5iVo-yRa2ZB0RZzG3Rz4D9Q%40mail.gmail.com.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CADYDTCBDJSVOfTw3e%3Dd4_vPFasUDNQ%3DA6F0xKN1ks4J1P1MWBA%40mail.gmail.com.
--
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
--To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CAC7uhV-vqA4Sfb1RVb-uYMAoWRAmB400A%2Bb1AQCX5UzfahLfmA%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvaAYRm33soYcb0YXOZw9qpJfgNzna8kmSnh44Z3a-u60w%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CADYDTCBDJSVOfTw3e%3Dd4_vPFasUDNQ%3DA6F0xKN1ks4J1P1MWBA%40mail.gmail.com.
--
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
--To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CAC7uhV-vqA4Sfb1RVb-uYMAoWRAmB400A%2Bb1AQCX5UzfahLfmA%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvaAYRm33soYcb0YXOZw9qpJfgNzna8kmSnh44Z3a-u60w%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.