Skip to content

Commit 2692bc8

Browse files
committed
Allow only trusted sources
1 parent 0462b93 commit 2692bc8

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

draft-ietf-httpapi-privacy.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,9 @@ that the error can be noticed and corrected.
123123
Servers MAY induce such an early failure by not accepting unencrypted
124124
connections, e.g. on port 80. This makes it impossible for a client to send a
125125
credential over an insecure channel to the authentic server, as no such channel
126-
can be opened.
126+
can be opened. Servers MAY alternatively restrict connections on port 80 to
127+
network sources which are more trusted, such as a VPN or virtual network
128+
interface.
127129

128130
However, this mitigation is limited against active network attackers, who can
129131
impersonate the server and accept the client's insecure connection attempt.
@@ -155,11 +157,11 @@ When the credential is next used over a secure channel, a server MAY return an
155157
error that indicates why the credential was revoked.
156158

157159
Credentials in a request can take on different forms. API keys and tokens are simple
158-
modes for authentication, but can be abused by attackers to forfeit requests and hence
160+
modes for authentication, but can be abused by attackers to forge requests and hence
159161
should be revoked if compromised. Requests can also be authenticated using derived values,
160162
where they only include digital signatures or message authentication codes (MACs)
161163
derived from credentials but not the credentials themselves. Since an attacker cannot
162-
abuse the derived values to forfeit requests, the server MAY choose to not revoke the
164+
abuse the derived values to forge requests, the server MAY choose to not revoke the
163165
credentials in this case.
164166

165167
# Client Recommendations

0 commit comments

Comments
 (0)