-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False claim in privacy section #121
Comments
/cc @clelland |
@MattMenke2 - it's unclear to me what's the scenario you're referring to as a "transparent proxy". It seems to me that for proxies that are UA set, we can (and do, IIUC) exclude them from NEL reports. But if we're talking about proxies that the network automatically sends traffic to, the client in that case is not aware of the proxy's IP, and hence can't report it. I'm sure I'm missing something, so I'd love clarifications. |
If the browser doesn't know about it, I'd call it transparent - Chrome certainly doesn't know there's a proxy. Proxies that work at the DNS layer (unusual, since they require an SSL-decrypting proxy, and certs installed on the client to allow that) don't require Chrome to know about them. Chrome isn't aware of the proxy's IP, but it's aware of its own IP, and (I assume - it's been 4 years since I made that comment) sending something to the server that the server would not otherwise get. |
Sorry, Chrome is giving the server IP to the server, I think? If there's a proxy that works at the DNS layer, then Chrome would be giving the proxy's IP to the server, not the server's IP. Chrome knows the proxy IP because Chrome uses DNS to look up IPs, and DNS would be returning the "transparent" proxy's IP, not the server's. |
I agree with @yoavweiss that we should exclude The most that we can do about proxies that are not visible to the client is a note in the spec, which I think was the original request. |
The issue is Chrome may not know a proxy is in use (Proxy could work at the DNS layer + locally installed certs, as opposed to being explicitly configured), in which case, providing the "server IP" is actually providing the server with the proxy IP. |
Chrome may be able to check if it's using a publicly trusted cert or not (I'm not positive of that), and just not send along the server IP if so. That would be a more restrictive check, though, since it would affect explicitly configured proxies which also decrypt SSL, using a locally installed cert. This is likely a more common configuration, used by some enterprises. |
The privacy section claims that the server IP is available to the server. This isn't always the case. If I set up all DNS resolutions to map to a transparent (SSL-MitMing) proxy, then NEL exposes the IP of that proxy, which is PII, regardless of whether or not the proxy has a public IP address, to the NEL server.
This might be an unusual setup, but I still think it needs to be mentioned, and the claim that this information is always public needs to be corrected.
The text was updated successfully, but these errors were encountered: