Are HTTPS URLs encrypted?

前端 未结 14 1882
无人共我
无人共我 2020-11-22 04:26

Are all URLs encrypted when using TLS/SSL (HTTPS) encryption? I would like to know because I want all URL data to be hidden when using TLS/SSL (HTTPS).

If TLS/SSL gi

相关标签:
14条回答
  • 2020-11-22 05:08

    Since nobody provided a wire capture, here's one.
    Server Name (the domain part of the URL) is presented in the ClientHello packet, in plain text.

    The following shows a browser request to:
    https://i.stack.imgur.com/path/?some=parameters&go=here

    See this answer for more on TLS version fields (there are 3 of them - not versions, fields that each contain a version number!)

    From https://www.ietf.org/rfc/rfc3546.txt:

    3.1. Server Name Indication

    [TLS] does not provide a mechanism for a client to tell a server the name of the server it is contacting. It may be desirable for clients to provide this information to facilitate secure connections to servers that host multiple 'virtual' servers at a single underlying network address.

    In order to provide the server name, clients MAY include an extension of type "server_name" in the (extended) client hello.


    In short:

    • FQDN (the domain part of the URL) MAY be transmitted in clear inside the ClientHello packet if SNI extension is used

    • The rest of the URL (/path/?some=parameters&go=here) has no business being inside ClientHello since the request URL is a HTTP thing (OSI Layer 7), therefore it will never show up in a TLS handshake (Layer 4 or 5). That will come later on in a GET /path/?some=parameters&go=here HTTP/1.1 HTTP request, AFTER the secure TLS channel is established.


    EXECUTIVE SUMMARY

    Domain name MAY be transmitted in clear (if SNI extension is used in the TLS handshake) but URL (path and parameters) is always encrypted.


    MARCH 2019 UPDATE

    Thank you carlin.scott for bringing this one up.

    The payload in the SNI extension can now be encrypted via this draft RFC proposal. This capability only exists in TLS 1.3 (as an option and it's up to both ends to implement it) and there is no backwards compatibility with TLS 1.2 and below.

    CloudFlare is doing it and you can read more about the internals here — If the chicken must come before the egg, where do you put the chicken?

    In practice this means that instead of transmitting the FQDN in plain text (like the Wireshark capture shows), it is now encrypted.

    NOTE: This addresses the privacy aspect more than the security one since a reverse DNS lookup MAY reveal the intended destination host anyway.

    SEPTEMBER 2020 UPDATE

    There's now a draft RFC for encrypting the entire Client Hello message, not just the SNI part: https://datatracker.ietf.org/doc/draft-ietf-tls-esni/?include_text=1

    At the time of writing this browser support is VERY limited.

    0 讨论(0)
  • 2020-11-22 05:10

    I agree with the previous answers:

    To be explicit:

    With TLS, the first part of the URL (https://www.example.com/) is still visible as it builds the connection. The second part (/herearemygetparameters/1/2/3/4) is protected by TLS.

    However there are a number of reasons why you should not put parameters in the GET request.

    First, as already mentioned by others: - leakage through browser address bar - leakage through history

    In addition to that you have leakage of URL through the http referer: user sees site A on TLS, then clicks a link to site B. If both sites are on TLS, the request to site B will contain the full URL from site A in the referer parameter of the request. And admin from site B can retrieve it from the log files of server B.)

    0 讨论(0)
提交回复
热议问题