FHIR Chat · fhircast-docs / Issue #234 May 2019 Ballot Comment: · fhircast-github

Stream: fhircast-github

Topic: fhircast-docs / Issue #234 May 2019 Ballot Comment:


view this post on Zulip Github Notifications (FHIRcast) (Apr 30 2019 at 19:54):

hl7-fhircast-bot opened Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (Apr 30 2019 at 19:54):

hl7-fhircast-bot labeled Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (Apr 30 2019 at 19:54):

hl7-fhircast-bot labeled Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (Apr 30 2019 at 19:54):

hl7-fhircast-bot labeled Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (Apr 30 2019 at 19:54):

hl7-fhircast-bot edited Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (May 05 2019 at 02:00):

NiklasSvenzen labeled Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (May 05 2019 at 02:02):

isaacvetter commented on Issue #234

Hey Phil!

Do note that https and authentication is required for each exchange, that no phi is exchanged over GET and that these methods are taken straight from the underlying web sub specification.

view this post on Zulip Github Notifications (FHIRcast) (May 05 2019 at 02:03):

NiklasSvenzen labeled Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (May 05 2019 at 03:52):

euvitudo commented on Issue #234

Hey Isaac,

I just realized that I was mistaking the fact that query strings are not encrypted in server logs for not encrypted at all. I think I'm ok with this for this issue and #233.

view this post on Zulip Github Notifications (FHIRcast) (May 08 2019 at 14:57):

wmaethner labeled Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (May 08 2019 at 18:52):

wmaethner commented on Issue #234

## Montreal May 2019 Working Group Vote

xx moved the following disposition, seconded by xx

Disposition: Withdrawn by author
Disposition Comment:

:+1: For: 12
:expressionless: Abstain: 0
:-1: Against: 0

:tada: The motion passed! :tada:

view this post on Zulip Github Notifications (FHIRcast) (May 08 2019 at 18:52):

wmaethner labeled Issue #234

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (Jun 05 2019 at 14:15):

wmaethner unlabeled Issue #234:

## May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._

view this post on Zulip Github Notifications (FHIRcast) (Sep 11 2019 at 20:34):

wmaethner commented on Issue #234:

Closing since the author withdrew the comment

view this post on Zulip Github Notifications (FHIRcast) (Sep 11 2019 at 20:34):

wmaethner closed Issue #234:

May 2019 Ballot Comment:

Submitted by @euvitudo
Chapter/section: Intent Verification Request
Url: https://fhircast.hl7.org/specification/May2019Ballot/#subscribing-and-unsubscribing
Type: NEG :exclamation:
In Person requested: Yes :bust_in_silhouette:

Summary:

Comment: Query parameters are inherently insecure and present risk of information leakage of hub-specific metadata to any listeners. In particular, the hub.challenge is easily obtained from the URL and can be echoed from a MITM. A POST via HTTPS would be much more secure and would more properly obfuscate the information in the request. The Session Discovery section mentions that hub.topics are presented in the SMART on FHIR launch. An alternative location to place these data, if GET is preferred, is the HTTP headers.

Existing wording: The Hub verifies a subscription request by sending an HTTPS GET (RFC2818) request to the subscriber's callback URL as given in the subscription request.
Proposed wording: The Hub verifies a subscription request by sending an HTTPS POST request to the subscriber's callback URL as given in the subscription request.


_This issue was imported by @hl7-fhircast-bot from the consolidated FHIRcast May 2019 ballot spreadsheet._


Last updated: Apr 12 2022 at 19:14 UTC