Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CSP policies for WebTransport? #59

Open
markafoltz opened this issue Sep 18, 2019 · 31 comments
Open

CSP policies for WebTransport? #59

markafoltz opened this issue Sep 18, 2019 · 31 comments
Assignees
Labels
Discuss at next meeting Flags an issue to be discussed at the next WG working Ready for PR

Comments

@markafoltz
Copy link

Currently, data exchange capabilities that are exposed to the Web are restricted through CSP connect-src, which restricts which origins can be connected to through WebSockets, XHR, etc.

  1. Will every WebTransport destination have an origin that can be verified by the UA (through Web PKI or some other means)?
  2. If the answer to "1" is yes, will WebTransport use connect-src or some other CSP policy mechanism?
  3. If the answer to "1" is no, how will application authors be able to enforce a WebTransport connection policy in their application?
@markafoltz
Copy link
Author

Possibly related to (or a specific issue in) Issue #13

@markafoltz markafoltz changed the title CSP policies for WebTransport CSP policies for WebTransport? Sep 18, 2019
@vasilvv
Copy link
Contributor

vasilvv commented Oct 1, 2019

I think this is yet another issue that can be addressed by providing QuicTransport endpoints with URLs associated with it. So if we add URL for #22 and #26, we would probably get CSP support for ~free.

@aboba
Copy link
Collaborator

aboba commented Dec 9, 2020

Discussed on December 8, 2020 WebTransport WG meeting. Agreement to support CSP for the Web PKI case. Concerns over impact of fingerprint verification on CSP support.

@wilaw wilaw added the Discuss at next meeting Flags an issue to be discussed at the next WG working label Feb 17, 2021
@jan-ivar
Copy link
Member

@vasilvv to write text and reach out to webappsec to discuss some of the more complex cases.

@wilaw wilaw removed the Discuss at next meeting Flags an issue to be discussed at the next WG working label Mar 24, 2021
@vasilvv
Copy link
Contributor

vasilvv commented Jun 22, 2021

So I think the answer for WebPKI-authenticated connections is fairly clear: we will check connect-src for WebTransport connections.

For the connections that are anchored against a custom certificate, I can see a few approaches:

  1. Make this orthogonal to CSP connect-src. One approach would be to add a new header, say, Sec-WebTransport-Allow-Custom-Certificates, that would opt the website into using custom certificates, or somehow encode that into CSP.
  2. Encode the fingerprint within the domain name. An approach I'd gp with is where a domain like example.com with certificate fingerprint 0x1234abcd gets translated into example.com.domain-1234abcd.fpr.arpa (I think @ekr proposed something among those lines a few years ago when I discussed that problem with him).

The first approach has the advantage of being very simple, but less powerful, as it's just an all-or-nothing approach. The second approach lets developers control the specific fingerprints, but it does require us to do more work. Notably, I have no idea what the policies are wrt assigning .arpa domain names, and what are all of the implications.

cc @mikewest since he expressed interest in this topic in the past.
cc @martinthomson and @DavidSchinazi as they probably know more about .arpa

@martinthomson
Copy link
Member

The discussions on webrtc-src are relevant here: w3c/webappsec-csp#457

I would say that a binary toggle for "custom certificate allowed" is probably easier than otherwise. Reconciling that with the WebRTC control would be ideal. Devising a new means of identifying specific certificates, similar to script-src with nonces, seems like a stretch goal.

You might consider a webtransport-src rule that inherits from connect-src.

@jan-ivar
Copy link
Member

jan-ivar commented Jun 22, 2021

Meeting:

  • Inherit from connect-src
  • Look at adding webtransport-src: none|* similar to webrtc-src.
  • Though WebTransport does not suffer from web compat like webrtc does at this point
  • Suggest failing the WebTransport constructor over this

@martinthomson
Copy link
Member

One addendum: just use a boolean flag ('fp') to turn custom certificate fingerprints on/off rather than devise a system for identifying specific fingerprints (do that later).

@annevk
Copy link
Member

annevk commented Jun 23, 2021

As I mentioned in one of the WebRTC threads, I think acting as if "obtaining the connection" failed is preferable as it gives more freedom to where implementations decide to enforce the policy and makes the API contract for developers simpler.

@mikewest
Copy link
Member

Seconding @annevk; we started enforcing on fetch() and XHR by throwing in the constructor, and shifted towards failing the connection instead, as it unified behavior between initial requests and redirects. I don't think that specific thing is a problem for web transport, but I do think aligning the behavior between WT on the one hand and fetch() on the other seems like the right way to go.

@martinthomson
Copy link
Member

So a new way to reject the ready promise?

@annevk
Copy link
Member

annevk commented Jun 23, 2021

Assuming the description at https://w3c.github.io/webtransport/#webtransport-ready is correct, yes. Using the same exception you do now to reject on connection establishment failure. (fetch() uses JavaScript's generic TypeError for all this.)

@jan-ivar
Copy link
Member

@yutakahirano With #367 merged can this be closed now, or was it left open for a reason?

My understanding of that PR is that we now link to CSP and that the details of how that policy works will be handled there. Is that right?

@yutakahirano
Copy link
Contributor

The interaction between custom certificates hasn't been resolved yet, IIRC.

@wilaw wilaw added the Discuss at next meeting Flags an issue to be discussed at the next WG working label Dec 1, 2021
@vasilvv
Copy link
Contributor

vasilvv commented Dec 29, 2021

Regarding the issue with custom certificates, I've been trying to figure the exact threat model for this issue. The model I currently have in my head is roughly: if an attacker can inject code into the webpage, and they can do active network attacks, then they can work around CSP policies (such as connect-src 'self') by establishing a connection to an allowed CSP origin but using custom certificate API to bypass the certificate check that would normally stop them. This is a fairly niche attack (due to the combination of those two prerequisites), but it's something we should still probably address.

A simple flag to control this was the approach we've agreed to last time we discussed this during a WG meeting, and I think it should be sufficient. We still need to figure out the placement and syntax for this; as a starting point, I am going to suggest adding a webtransport-no-certificate-hash directive to CSP that has no arguments and that automatically blocks all WebTransport connections that use serverCertificateHash argument. What do people think?

cc @martinthomson @mikewest

@DavidSchinazi
Copy link

Alternatively, could we add an HTTP header to the extended CONNECT request that mentions whether custom certificates were configured by the client JavaScript? That way server implementations could be configured by default to abort if that header is present.

@martinthomson
Copy link
Member

I'm a fan of a new 'certificate-hash' label for 'connect-src' and friends, which would be off by default and so cascade down naturally (being disabled automatically if CSP rules were in play).

@vasilvv
Copy link
Contributor

vasilvv commented Jan 4, 2022

I'm a fan of a new 'certificate-hash' label for 'connect-src' and friends, which would be off by default and so cascade down naturally (being disabled automatically if CSP rules were in play).

That would be a good approach, though I am not sure this is backwards-compatible, i.e. if a website sends connect-src certificate-hash to a browser that does not recognize it, would that break the directive?

@martinthomson
Copy link
Member

That form of compatibility is fairly simple. Under (my understanding of1) the CSP extension model, new directive values can only be more permissive, so it is safe to ignore unknown values.

The sort of compatibility problem that concerns me is the one where we ship the capability, then attempt to retrofit CSP to it. There, sites will exist that use connect-src (and derivatives) and certificate hashes successfully, so adding a special directive value to connect-src will result in those sites suddenly breaking. This is the problem WebRTC had to deal with; the result being somewhat inelegant.

Footnotes

  1. The CSP spec is remarkably obtuse and lacking in basic explanatory text that might make it easy to answer this sort of question, so I'm going on inference.

@wilaw wilaw removed the Discuss at next meeting Flags an issue to be discussed at the next WG working label Jan 12, 2022
@jan-ivar
Copy link
Member

jan-ivar commented Jan 18, 2022

Meeting:

  • Almost done. Need to bikeshed on the syntax for custom certificates.
  • Discuss at next meeting

@wilaw wilaw added the Discuss at next meeting Flags an issue to be discussed at the next WG working label Jan 26, 2022
@jan-ivar
Copy link
Member

jan-ivar commented Mar 2, 2022

Meeting:

  • People who use the custom certificates today in Chrome might be broken if we use connect-src 'certificate-hash'
  • Might be OK if we do it quickly.

@jan-ivar
Copy link
Member

Meeting:

  • @vasilvv to take a closer look at the CSP spec to ensure syntax is good.

@wilaw wilaw removed the Discuss at next meeting Flags an issue to be discussed at the next WG working label Apr 19, 2022
@jan-ivar
Copy link
Member

jan-ivar commented Jul 6, 2022

@vasilvv did you have time to look over the CSP spec? Can we close this now?

@nidhijaju
Copy link
Member

Discussed this with @vasilvv offline, and it's not clear if the current state is sufficient or we need to add anything to the CSP spec. Maybe worth discussing at the next meeting.

@wilaw wilaw added the Discuss at next meeting Flags an issue to be discussed at the next WG working label Nov 22, 2023
@jan-ivar
Copy link
Member

jan-ivar commented Feb 13, 2024

Meeting:

  • Covered in most useful cases
  • How should CSP interact with server certificate hashes?
  • Currently CSP can disallow any connection to example.com, check url, hostname before creating WebTransport. But what if I override the certificate?
  • If you use server certificate hashes do you lose CSP protection?
  • Option: Figure out how to solve it at the CSP level, and unclear how sensible that is
    • A CSP flag (similar to WebRTC disallow) that all of my connect sources require real certificate names
    • Explore whether this option is feasible

@jan-ivar
Copy link
Member

From #59 (comment) it looked like we were almost home:

Meeting:
* People who use the custom certificates today in Chrome might be broken if we use connect-src 'certificate-hash'
* Might be OK if we do it quickly.

@vasilvv do we still think connect-src 'certificate-hash' might work here? Should we not just do that?

@jan-ivar
Copy link
Member

jan-ivar commented Apr 9, 2024

Meeting:

  • more discussion needed

@jan-ivar
Copy link
Member

jan-ivar commented Jun 8, 2024

  • People who use the custom certificates today in Chrome might be broken if we use connect-src 'certificate-hash'

Based on chrome status it doesn't seem too late to do this.

From my (limited) understanding of CSP keywords, we'd need to define the keyword's interaction with other sources:

Content-Security-Policy: connect-src 'certificate-hash' https://A.com https://B.com

Clearly, this would disallow

new WebTransport("https://C.com"); // C is not A or B

But would it also disallow

new WebTransport("https://C.com", {serverCertificateHashes: [{algorithm: "sha-256", value}]});

?

If there's security value in limiting connects to specific URLs even without Web PKI, then probably yes.

@jan-ivar
Copy link
Member

jan-ivar commented Jun 10, 2024

Even if we do limit use of serverCertificateHashes to those URLs (A and B), there's no way to limit it just to A (and still allow B with TLS). That would probably require an independent directive instead. Something like:

Content-Security-Policy: webtransport-certificate-hash https://A.com;
                         connect-src https://B.com;

@jan-ivar
Copy link
Member

Meeting:

  • right url for server certificate hash use is https://chromestatus.com/metrics/feature/timeline/popularity/4112
  • if ship has sailed
    Content-Security-Policy: webtransport-no-certificate-hash
    
  • can we determine if actual usage are using CSP with custom certs is zero or near-zero?
  • demos should maybe not count?
  • moq tends to use proper certs
  • We can send out a note saying we are considering doing this.
  • what about:
    • if connect-src is absent, then certs are allowed
    • if connect-src is present, a separate keyword is needed to allow custom certs, like
      Content-Security-Policy: connect-certificate-hash https://A.com;
                               connect-src https://B.com;
      
  • might need to go into csp spec.

@jan-ivar
Copy link
Member

jan-ivar commented Oct 8, 2024

Discussed at TPAC:

  • Conclusion: adopt proposal 1, i.e
    • if connect-src is absent, then certs are allowed
    • if connect-src is present, a separate keyword is needed to allow custom certs:
      Content-Security-Policy: connect-src https://a.com/;
                               connect-certificate-hash: https://b.com/
    • Also need to open an issue against CSP to get a new keyword

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Discuss at next meeting Flags an issue to be discussed at the next WG working Ready for PR
Projects
None yet
Development

No branches or pull requests