Skip to content

Commit 6a3e084

Browse files
committed
Update 100_percent_https_roadmap.md
1 parent d387d57 commit 6a3e084

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

admin/100_percent_https_roadmap.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ Starting Assumptions
2929

3030
e.g. 4 if Facebook is going to send a security token somewhere on your behalf, it wants to be sure it will never do so over an insecure channel or one that is only “optimistically” secure.
3131

32+
TimBL: users must be able to control how the user agent trusts on their behalf
33+
3234
The Invariants
3335
----------------------------------
3436
From the Biba and Bell-LaPadula formal integrity models.
@@ -55,8 +57,8 @@ No Read Down / No Write Up
5557
- http resources can GET/POST to https resources
5658
- Cookies (even w/secure flag) can be written by http and are sent to https
5759
* Distinct invariants, but the web is very bad a data/code separation.
58-
* Even if we wanted to make an exception to Read Down (e.g. open data over http) it is impossible to guarantee that No Write Up isn’t also violated.
59-
- “optionally blockable” mixed content attempts this distinction, but XHR + JS is not strongly typed enough to allow read down without write up in an “open data” application
60+
* Even if we wanted to make an exception to Read Down (e.g. to read an open data source that is served only over http) it is impossible to guarantee that No Write Up isn’t also violated.
61+
- “optionally blockable” mixed content attempts this distinction, but XHR + JS is not strongly typed enough to allow read down without write up in such an application
6062
* There is also metadata and other information leakage possible in a secure->insecure read operation
6163

6264
No Write Down

0 commit comments

Comments
 (0)