- From: <noah_mendelsohn@us.ibm.com>
- Date: Mon, 18 Jan 2010 22:21:15 -0500
- To: Jonathan Rees <jar@creativecommons.org>
- Cc: "Mark S. Miller" <erights@google.com>, Tyler Close <tyler.close@gmail.com>, www-tag@w3.org
I've been giving this proposal some thought, and I'm not sure I buy the
premise. In particular:
> In special circumstances where URIs are adequately protected
> for the application in question
> [...]
> 3. the URI is confined to secure data paths
Going down this path seems to divide the Web. It suggests that there is
the wild and wooly main part of the Web, in which URIs wind up in all
sorts of places like logs, in memory in proxies, or in links get passed
around in emails, etc. The above suggests that there are also other
Web-like networks, built of the same technology, but much more private.
The suggestion is that there are little private Webs in which it is
possible to bound the places where a particular URI may wind up. I think
this is what you mean by URIs that are "adequately protected for the
application in question."
No doubt, it is possible to use technologies such as URIs and HTTPs to
implement such protected networks. Trivially, I could set up a one-hop
network with air-gap isolation from all other networks, control both ends
and run HTTP over that. I don't think that the result is "the Web", the
architecture of which the TAG attempts to describe. It's a network in
which linking is discouraged rather than encouraged.
In short, I'm tempted to stay away from the notion of protecting URIs. It
was certainly my premise as editor of the original metadata in URI finding
that URIs were presumed to be unprotected. I.e., it was assumed that in
normal use on the Web, any URI may well be discovered by users or software
not controlled by or associated with some particular application or
security domain. Furthermore, it's assumed that malicious software, and
perhaps even just creative Web spiders, can synthesize and attempt to
access URIs that are similar, but not identical to ones that are
encountered in other Web traffic. I'm so far unconvinced to change the
finding.
Maybe I need to understand the Google calendar case a bit better than I
do.
Noah
--------------------------------------
Noah Mendelsohn
IBM Corporation
One Rogers Street
Cambridge, MA 02142
1-617-693-4036
--------------------------------------
Jonathan Rees <jar@creativecommons.org>
Sent by: www-tag-request@w3.org
12/27/2009 11:46 AM
To: www-tag@w3.org
cc: Tyler Close <tyler.close@gmail.com>, "Mark S. Miller"
<erights@google.com>, (bcc: Noah Mendelsohn/Cambridge/IBM)
Subject: ACTION-278 Hiding metadata for security reasons
Regarding ACTION-278, here is preliminary draft text to add to the end
of section
2.7 "Hiding metadata for security reasons" of TAG finding "The use of
Metadata in URIs" [2]
Criticism welcome; I'm expecting I'll have to substantially revise in
the face of
the wisdom to be precipitated.
<snip>
In special circumstances where URIs are adequately protected for the
application in question, it may be safe to create URIs that carry
sensitive metadata. Most risks associated with metadata payloads are
avoided when the following rules are respected:
1. the URI conveys only specific, limited knowledge or authority
2. the URI protects the information it carries by a level of
obfuscation such as encryption and/or indirection via a random key
3. the URI is confined to secure data paths
4. the URI is restricted to a single use and/or is valid only during a
limited
lifetime
For example, a calendar system may provide an option to share a
calendar with another user. The access right may be designated by a
unguessable URI that can be sent to the other user, who on applying it
obtains read access in a coordinating mail application to the first
user's mailbox.
Adequacy of data path security is difficult to assess and great care
should be exercised in using this pattern. The calendar case works
because the URI in question has special use contexts (it is not likely
that is will be used for general browsing or bookmarking), it conveys
limited authority (read access to one calendar, not login access to an
email account), email and HTTP connections are assumed to be
sufficiently private, and the providing and consuming applications
both take steps to minimize disclosure risks.
</snip>
Best
Jonathan
[1] http://www.w3.org/2001/tag/group/track/actions/278
[2] http://www.w3.org/2001/tag/doc/metaDataInURI-31#hideforsecurity
Received on Tuesday, 19 January 2010 03:21:48 UTC