On Aug 8, 2015, at 4:16 AM, Seth David Schoen <sch...@eff.org> wrote:
> 
> There is an ongoing discussion about how seriously one needs HTTPS with
> a .onion address.  There is already end-to-end encryption built into the
> Tor hidden service design, so communications with hidden services (even
> using an unencrypted application-layer protocol like HTTP) are already
> encrypted.

I’d like to echo the contents of this thread so far - it appears to be 
well-grounded in reality - but add that "lack of SSL" would have been a 
deal-breaker for Facebook’s deployment of an Onion site.  It would have not 
happened.

The reason is simply that HTTP and HTTPS have diverged (and are apparently 
likely to diverge further?) in how they treat (eg:) secure cookies, and rolling 
a custom version of our codebase to know and understand that “HTTP over Onion” 
will/may/will-not have features like referrer-scrubbing or CORS in a 
HTTPS-sympathetic manner (whilst the scheme in the request still *says* that it 
arrived over HTTP) would be complex.

I personally feel that to expect more common codebases such as Wordpress or 
Drupal to special-case Onion addresses would be presumptuous, be unlikely, add 
cost, and inhibit Onion adoption. Making “Onion” into a security “special case” 
for HTTP would be a nightmare as Randall Munroe explains: https://xkcd.com/927/ 
<https://xkcd.com/927/>

My personal preference is to think of “.onion” as the better-than-opportunistic 
crypto we once sought from IPsec+AH+ESP, since it’s clearly a transport 
protocol - after all, you can run SSH over it - and then layer vanilla HTTPS 
over that.  Other than extraordinarily contrived threat model circumstances, I 
cannot see a reason not to have both. Informal chats with folk near the 
CA/B-Forum have suggested that non-corporate/non-EV Onion certs may be a 
possibility in the future.  It might be good to have a few of them around as 
examples in order to be exemplars of that need.

    -a

—
Alec Muffett
Security Infrastructure
Facebook Engineering
London

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to