@@ -67,7 +67,23 @@ Tranquility
67
67
- Tranquility begins at conception: the moment you type “https” in the address bar or see it in a link.
68
68
* There is no way in browsers today to use a secure transport but opt out of mandatory high-security tranquility.
69
69
70
- Upgrading
70
+ HSTS and Mixed Content
71
+ ------------
72
+ * Currently Mixed Content blocks happen before HSTS upgrades
73
+ * Good to identify broken links, bad to make HSTS the most useful possible migration tool
74
+
75
+ Scheme Upgrading
76
+ ------------
77
+ * Upgrade Insecure Resources Draft
78
+ - Try to modify the scheme of all subresource fetches from http->https
79
+ - And same-origin navigation
80
+ * Not a complete solution
81
+ - CSP for form action can help some...
82
+ - postMessage (COWL CSP directive may help)
83
+ - non-same-origin navigations can be risky with GET data
84
+ - what to do with local data?
85
+
86
+ Transparent (w/http scheme intact) Upgrading
71
87
---------
72
88
* “Security properties of the Web shouldn’t depend on the s” – paraphrasing TBL
73
89
* http URLs should ideally remain stable identifiers even as we upgrade to secure transports everywhere
@@ -87,7 +103,7 @@ Upgrade-related work in the IETF
87
103
- https://tools.ietf.org/html/draft-ietf-httpbis-http2-encryption-02
88
104
- DANE TLSRtype?
89
105
90
- Upgrading – What does it mean for the web security model?
106
+ Transparent Upgrading – What does it mean for the web security model?
91
107
----------------
92
108
* How to handle tranquility?
93
109
* Request to load HTML is upgraded successfully to “full TLS”. Some earlier resource instance already exists in the browser which was not upgraded.
0 commit comments