A recent flurry of interest in message level security for Plain Old HTTP: Gunnar makes valid criticisms (though he confounds REST with HTTP); and Robert takes the point. And the issue pops up again on www-tag.
The criticism is this: Using TLS, each intermediary decrypts the message, and re-encrypts it to send along to the next leg of its journey. The message is vulnerable to prying eyes at those transition points.
How hard can it be to graft MLS onto HTTP without the baggage of WS-Security and XML Encrypt, and XML DSig? Somebody must have done this long ago, right? Couldn't find it with a quick google, but it has to look like this:
Define a content transfer encoding for PK, and pass the cert bits, or a URL:
Content-transfer-encoding: RSA; cert="...base64 bits here..."
Content-transfer-encoding: RSA; certref="http://foo.bar/cert"
You'd also use these values in "Accept-Encoding" headers.
And we're done, as far as HTTP is concerned.
Applications are in charge of trust. Maybe HTML5 could enhance the
<form> element so you could have:
<form method="POST" action="action" certref="http://mybank.com/cert">
and user agents would then encode the entity using PK encryption, and deliver the cert bits in the header as above. As with TLS, the UAs could generate temporary one-off local certs for this purpose.
To GET a secure page, you'd have to have sent the proper Accept-Encoding with your cert as a parameter. If you failed to send this header you'd just get 406, and you'd have to restry with your cert.
This has all been done before somewhere, right?
Hugh Winkler holding forth on computing and the Web
- ► 2008 (21)
- ► 2007 (38)
- ▼ December (7)
- ► 2005 (28)