Skip to content

Commit 4ae3255

Browse files
committed
Add rationale for why this doc exists
In response to Christian Huitema's early SECDIR review
1 parent 3cde05e commit 4ae3255

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

draft-ietf-httpapi-privacy.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,13 @@ This document describes actions API servers and clients should take in order to
8585
safeguard credentials. These recommendations are not directed at resources where
8686
no authentication is used.
8787

88+
Some have wondered if this document is really necessary. After all, we have
89+
been telling people send passwords and such in the clear for decades.
90+
Regrettably, this lesson seems to be largely forgotten by those developing
91+
Web-based APIs. The blog post that motivated this document, {{BLOG}}, did a
92+
spot-check in May, 2024, and found over two dozen websites that were
93+
vulnerable to the issues listed here.
94+
8895

8996
## Conventions and Definitions
9097

@@ -147,7 +154,7 @@ when a credential has been received over an insecure channel.
147154

148155
HTTP status code 403 (Forbidden) indicates that "the server understood the
149156
request but refuses to fulfill it" {!HTTP=RFC9110}. While this is generally
150-
understood to mean that "the server considers [the credentials] insufficient to
157+
understood to mean that "the server considers \[the credentials] insufficient to
151158
grant access," it also states that "a request might be forbidden for reasons
152159
unrelated to the credentials." Servers SHOULD return status code 403 to all
153160
requests received over an insecure channel, regardless of the validity of the

0 commit comments

Comments
 (0)