Skip to content

Commit 5ed440e

Browse files
committed
Update 100_percent_https_roadmap.md
1 parent d4a9439 commit 5ed440e

File tree

1 file changed

+18
-2
lines changed

1 file changed

+18
-2
lines changed

admin/100_percent_https_roadmap.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,23 @@ Tranquility
6767
- Tranquility begins at conception: the moment you type “https” in the address bar or see it in a link.
6868
* There is no way in browsers today to use a secure transport but opt out of mandatory high-security tranquility.
6969

70-
Upgrading
70+
HSTS and Mixed Content
71+
------------
72+
* Currently Mixed Content blocks happen before HSTS upgrades
73+
* Good to identify broken links, bad to make HSTS the most useful possible migration tool
74+
75+
Scheme Upgrading
76+
------------
77+
* Upgrade Insecure Resources Draft
78+
- Try to modify the scheme of all subresource fetches from http->https
79+
- And same-origin navigation
80+
* Not a complete solution
81+
- CSP for form action can help some...
82+
- postMessage (COWL CSP directive may help)
83+
- non-same-origin navigations can be risky with GET data
84+
- what to do with local data?
85+
86+
Transparent (w/http scheme intact) Upgrading
7187
---------
7288
* “Security properties of the Web shouldn’t depend on the s” – paraphrasing TBL
7389
* http URLs should ideally remain stable identifiers even as we upgrade to secure transports everywhere
@@ -87,7 +103,7 @@ Upgrade-related work in the IETF
87103
- https://tools.ietf.org/html/draft-ietf-httpbis-http2-encryption-02
88104
- DANE TLSRtype?
89105

90-
Upgrading – What does it mean for the web security model?
106+
Transparent Upgrading – What does it mean for the web security model?
91107
----------------
92108
* How to handle tranquility?
93109
* Request to load HTML is upgraded successfully to “full TLS”. Some earlier resource instance already exists in the browser which was not upgraded.

0 commit comments

Comments
 (0)