Changeset 2490 for wg_materials/ietf88
- Timestamp:
- 12/11/13 06:43:28 (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
wg_materials/ietf88/minutes.txt
r2489 r2490 13 13 #### IETF LC summary 14 14 15 Julian says, that the issues received were mostly editorial issues. All those issues received were addressed. 16 17 Julian notes that editorial feedback from APPSDIR and SECDIR, plus IANA feedback; no individual issues raised. Unless new issues come up, we are ready to move on in the process. 18 19 Barry notes that they did a short IETF LC, so that they would have comments for the meeting. The IESG will get plenty of time, to avoid hasty and unfortunate reviews. Mid-December telechat targeted. After that, RFCs! And life will be good. 20 21 Mark confirms for Barry that there are no document references which would cause an RFC editor blockage. 15 Julian says, that the issues received were mostly editorial issues. All those 16 issues received were addressed. 17 18 Julian notes that editorial feedback from APPSDIR and SECDIR, plus IANA 19 feedback; no individual issues raised. Unless new issues come up, we are ready 20 to move on in the process. 21 22 Barry notes that they did a short IETF LC, so that they would have comments for 23 the meeting. The IESG will get plenty of time, to avoid hasty and unfortunate 24 reviews. Mid-December telechat targeted. After that, RFCs! And life will be 25 good. 26 27 Mark confirms for Barry that there are no document references which would cause 28 an RFC editor blockage. 22 29 23 30 Mark also approved of Barry's bowtie … … 32 39 Julian recorded this as a design issue because this hadn't be considered. 33 40 34 Roy is OK with MUST on the content-length, that's a framing issue. p5 is different because it is an optional feature and if this fails, the thing breaks. 35 36 Barry is concerned that even for an optional feature, this needs to be defined so that it can work. He is also concerned about this turning into a security problem (integer overflow, etc...) 37 38 Mark: describes a cached 206 and the potential consequences of overflow in that case. Agreement that this might cause corruption. 41 Roy is OK with MUST on the content-length, that's a framing issue. p5 is 42 different because it is an optional feature and if this fails, the thing breaks. 43 44 Barry is concerned that even for an optional feature, this needs to be defined 45 so that it can work. He is also concerned about this turning into a security 46 problem (integer overflow, etc...) 47 48 Mark: describes a cached 206 and the potential consequences of overflow in that 49 case. Agreement that this might cause corruption. 39 50 40 51 Roy: OK with MUST … … 44 55 ##### #519 conneg + proactive and reactive 45 56 46 Roy: Henry has studied the use of 300 and 406 status codes and found that they aren't used. This doesn't mean that reactive conneg isn't used. Roy thinks that Henry hasn't read and understood the argument, and is instead arguing from the TAG. Roy doesn't see anything that he can fix. 47 48 Mark: Henry may be suffering a misaprehenshion that reactive == 300, when that is made clear elsewhere in the spec. 57 Roy: Henry has studied the use of 300 and 406 status codes and found that they 58 aren't used. This doesn't mean that reactive conneg isn't used. Roy thinks that 59 Henry hasn't read and understood the argument, and is instead arguing from the 60 TAG. Roy doesn't see anything that he can fix. 61 62 Mark: Henry may be suffering a misaprehenshion that reactive == 300, when that 63 is made clear elsewhere in the spec. 49 64 50 65 Conclusion: close, no fix. … … 52 67 ##### #432 cacheability of status codes 53 68 54 2^31 for max-age currently, why not 2^31-1. Do we leave this as-is and have this special case (2^31 exactly), or do we reduce the limit, or do we leave the max off. 69 2^31 for max-age currently, why not 2^31-1. Do we leave this as-is and have 70 this special case (2^31 exactly), or do we reduce the limit, or do we leave the 71 max off. 55 72 56 73 Barry suggests that once you explain it, you can do anything. 57 74 58 Roy: this is so arbitrary. 75 Roy: this is so arbitrary. We don't know why. 59 76 60 77 Stuart Cheshire: it's MAX_INT but probably a mistake … … 74 91 ##### On 2119 language 75 92 76 Mark doesn't want to rathole on this, but notes that HTTP is using its own dialect and using it consistently. 77 78 Julian notes that the fact that this is the issue that is raised most often, so the spec must be pretty good. 93 Mark doesn't want to rathole on this, but notes that HTTP is using its own 94 dialect and using it consistently. 95 96 Julian notes that the fact that this is the issue that is raised most often, so 97 the spec must be pretty good. 79 98 80 99 ##### -25 drafts 81 100 82 As soon as possible. Then IESG comments. Then maybe another iteration. Plan is to reach the RSE in January. 101 As soon as possible. Then IESG comments. Then maybe another iteration. Plan is 102 to reach the RSE in January. 83 103 84 104 ((what was the 2147483648 issue??)) 85 Issue #512, APPSIDR review 86 There is a 2147483648 (2**31) maximum for the delta-second value. APPSDIR wondered why this wasn't 2**31 - 1. As this is a historical value (apparently for creating a kind of NaN value for integers), decision is to keep it (to prevent breaking existing implementation), but add a note about it. 87 No, sorry, I missed that...Issue number? 105 106 107 #### Issue #512, APPSIDR review 108 109 There is a 2147483648 (2**31) maximum for the delta-second value. APPSDIR 110 wondered why this wasn't 2**31 - 1. As this is a historical value (apparently 111 for creating a kind of NaN value for integers), decision is to keep it (to 112 prevent breaking existing implementation), but add a note about it. 88 113 89 114 ### HTTP/2.x … … 97 122 #### Issue 1: Upgrade Mechanism 98 123 99 Mark talks about Alt-Svc, Upgrade (https://tools.ietf.org/html/draft-nottingham-httpbis-alt-svc-00) 100 101 Mike Bishop: whether we do this or not, it's not something for the spec. Talks about Upgrade and the feature not well known where the server can advertise support for HTTP/2.0 (as well as responding to client requests to upgrade). 124 Mark talks about Alt-Svc, Upgrade 125 (https://tools.ietf.org/html/draft-nottingham-httpbis-alt-svc-00) 126 127 Mike Bishop: whether we do this or not, it's not something for the spec. Talks 128 about Upgrade and the feature not well known where the server can advertise 129 support for HTTP/2.0 (as well as responding to client requests to upgrade). 102 130 103 131 Mark got the impression that there were lots of corner cases with Upgrade. 104 132 105 Mike: The performance problem is actually worse if you need to create a new connection. 133 Mike: The performance problem is actually worse if you need to create a new 134 connection. 106 135 107 136 Mark: Caching the information avoids that problem. … … 109 138 Mike: That's possible in other cases. 110 139 111 Stuart: Modular design requires separation. Performance often requires that those barriers are broken. 112 113 Mark: Breaking the strong tie between locator and server is desirable, particularly because the HTTP/2.0 connection could be long lived and parking connections long term can present a problem for servers who need to offload clients. 140 Stuart: Modular design requires separation. Performance often requires that 141 those barriers are broken. 142 143 Mark: Breaking the strong tie between locator and server is desirable, 144 particularly because the HTTP/2.0 connection could be long lived and parking 145 connections long term can present a problem for servers who need to offload 146 clients. 114 147 115 148 Dan Druta: concerned about lack of transparency. … … 117 150 Will Chan: the client is able to choose 118 151 119 Ted Hardie: there are a lot of potential corner cases here, and despite a desire to avoid corner cases, it might be that you haven't avoided those. Maybe we can talk about alternative services that are delivered at the same host. That makes a lot of the problems go away. Separating same-host and different-host might reduce the complexity inherent in the solution. 152 Ted Hardie: there are a lot of potential corner cases here, and despite a 153 desire to avoid corner cases, it might be that you haven't avoided those. Maybe 154 we can talk about alternative services that are delivered at the same host. 155 That makes a lot of the problems go away. Separating same-host and 156 different-host might reduce the complexity inherent in the solution. 120 157 121 158 Mark: just a small thing, security considerations. 122 159 123 Ted: distinction is important between certificate of www.example.com and certificate that is valid for www.example.com 124 125 Mark: Still thinks that the connection characteristics will require that later thing. 160 Ted: distinction is important between certificate of www.example.com and 161 certificate that is valid for www.example.com 162 163 Mark: Still thinks that the connection characteristics will require that later 164 thing. 126 165 127 166 Ted: HTTP/2.0 only, which might require new URI scheme … … 129 168 Mark: you had me up until you said "new URI scheme" 130 169 131 Gabriel M: Agrees with Ted, the CDN issues are not specific to HTTP/2.0. Concerned about putting risk on our current schedule. For just the in-the-clear upgrade, this doesn't buy anything over the existing (i.e., Upgrade) solution in the draft. 170 Gabriel M: Agrees with Ted, the CDN issues are not specific to HTTP/2.0. 171 Concerned about putting risk on our current schedule. For just the in-the-clear 172 upgrade, this doesn't buy anything over the existing (i.e., Upgrade) solution 173 in the draft. 132 174 133 175 Mark: issues with upgrade: blocking while upgrade goes 134 176 135 Ted: two ports on the same host is not something that we worry about, it's the different host scenarios that cause concerns. 177 Ted: two ports on the same host is not something that we worry about, it's the 178 different host scenarios that cause concerns. 136 179 137 180 Gabriel: Origin issues 138 181 139 Gabriel: maybe this is another option for dealing with discovery of HTTP/2.0, so that you can avoid Upgrade 140 141 Will: Channelling jpinner: this isn't in major deployments yet, but would like to restrict this to stuff that people use 142 143 Will: maybe something more like ALternate-Protocol (no host shift) is interesting. 144 145 Will + Patrick McManus: Chrome and Firefox aren't interested in HTTP/2.0 in the clear. 182 Gabriel: maybe this is another option for dealing with discovery of HTTP/2.0, 183 so that you can avoid Upgrade 184 185 Will: Channelling jpinner: this isn't in major deployments yet, but would like 186 to restrict this to stuff that people use 187 188 Will: maybe something more like ALternate-Protocol (no host shift) is 189 interesting. 190 191 Will + Patrick McManus: Chrome and Firefox aren't interested in HTTP/2.0 in the 192 clear. 146 193 147 194 Rob Trace: Microsoft is interested in HTTP/2.0 in the clear. 148 195 149 Mark: we're not ripping Upgrade, though we may if it turns out to be poorly implemented 150 151 Mark: question is whether we want to bring alt-svc (or a reduced form) into the spec in order to gain experience with it 152 153 Patrick: There are some problems in the draft; Patrick offers to help with the draft 154 155 Patrick: There are a ton of corner cases in Upgrade. Two objections are: it's not going to work, and it's not going to be secure. 156 157 Eliot Lear: Questions relate to the caching of the response, in particularm when you start going HTTP/2.0 directly on some port, what happens when you move location. 196 Mark: we're not ripping Upgrade, though we may if it turns out to be poorly 197 implemented 198 199 Mark: question is whether we want to bring alt-svc (or a reduced form) into the 200 spec in order to gain experience with it 201 202 Patrick: There are some problems in the draft; Patrick offers to help with the 203 draft 204 205 Patrick: There are a ton of corner cases in Upgrade. Two objections are: it's 206 not going to work, and it's not going to be secure. 207 208 Eliot Lear: Questions relate to the caching of the response, in particularm 209 when you start going HTTP/2.0 directly on some port, what happens when you move 210 location. 158 211 159 212 Mark: if you detect a network change, then clear your cache 160 213 161 Julian: Theory on why clients do not implement Upgrade: on other clients it requires writing both HTTP/1.1 and HTTP/2.0 both, which for testing clients is a big burden. 162 163 Roberto: this affects both HTTP specs, and it makes the most sense as a standalone. Maybe you want to downgrade from HTTP/2.0 to HTTP/1.1 214 Julian: Theory on why clients do not implement Upgrade: on other clients it 215 requires writing both HTTP/1.1 and HTTP/2.0 both, which for testing clients is 216 a big burden. 217 218 Roberto: this affects both HTTP specs, and it makes the most sense as a 219 standalone. Maybe you want to downgrade from HTTP/2.0 to HTTP/1.1 164 220 165 221 Mark: preparing for an adoption hum … … 167 223 Ted: maybe revise before continuing, 168 224 169 Mark: proposes that he and Patrick revise the doc based on the discussion and the editors will add a reference to the spec for that. 170 171 Mark: call for input from implementers to determine if it is implementable and addresses the issues 225 Mark: proposes that he and Patrick revise the doc based on the discussion and 226 the editors will add a reference to the spec for that. 227 228 Mark: call for input from implementers to determine if it is implementable and 229 addresses the issues 172 230 173 231 #### Issue 270: Priority Levelling 174 232 175 Talked about this lots. 233 Talked about this lots. Might have to delay this one. 176 234 177 235 Martin: propose that we move this faster 178 236 179 Will: wanted to collect data that provides justification for the complexity; unable to do this because SPDY/4 is vapourware 237 Will: wanted to collect data that provides justification for the complexity; 238 unable to do this because SPDY/4 is vapourware 180 239 181 240 Mark: we need to get this soon, maybe we ship without a fix … … 187 246 Martin: Issues around negotiation of extensions 188 247 189 Roberto: we want to be able to experiment, but we don't know about what those experiments might look like 248 Roberto: we want to be able to experiment, but we don't know about what those 249 experiments might look like 190 250 191 251 #### Issue 292: Cookie Crumbing … … 195 255 Mark: cookies were always special fro the outset, but we never documented it 196 256 197 Mark: some people didn't want to do this, but he wasn't convinced by those arguments 257 Mark: some people didn't want to do this, but he wasn't convinced by those 258 arguments 198 259 199 260 Roberto: doesn't like NULL being treated specially … … 203 264 Martin: we can require that intermediaries preserve order 204 265 205 Roberto: it's easy, you decompress, then compress, but ensure that you compress in order 266 Roberto: it's easy, you decompress, then compress, but ensure that you compress 267 in order 206 268 207 269 Julian: why? … … 209 271 Mark: nulls are being used to concatenate headers into a single header 210 272 211 Roberto: nulls were one way to preserve order, double toggle ensures that you can always control the order that headers are emitted by the decompressor 273 Roberto: nulls were one way to preserve order, double toggle ensures that you 274 can always control the order that headers are emitted by the decompressor 212 275 213 276 Roberto: if we do nulls, that shouldn't be a compressor problem … … 217 280 Mark: AD? 218 281 219 Barry: are you assuming that cookies will be used the same way in HTTP/2.0 as one [yes, transition] 282 Barry: are you assuming that cookies will be used the same way in HTTP/2.0 as 283 one [yes, transition] 220 284 221 285 Mark: maybe we should have a chat with Adam Barth … … 229 293 Mark: why does this need to be negotiated? 230 294 231 R Oberto: negotiation saves you from complexity295 Roberto: negotiation saves you from complexity 232 296 233 297 Martin: plunge the knife in and we can see if the patient squeals too loudly … … 237 301 #### Issue 216: Alternate Reference Sets 238 302 239 Herve': 240 241 Roberto: simple and better than the original proposal and it seems to accomplish the goal 303 Herve': 304 305 Roberto: simple and better than the original proposal and it seems to 306 accomplish the goal 242 307 243 308 Mark: let's do it 244 309 245 310 246 247 311 ## Tuesday Session 248 312 … … 259 323 EKR: You can't change the cert and ALPN codepoints, but you can resume. 260 324 261 Michael Tuexun: Is there a reason you don't provide this for a general mechanism? 325 Michael Tuexun: Is there a reason you don't provide this for a general 326 mechanism? 262 327 263 328 SF: You need to register the name. … … 267 332 SF: We did it because the port number is not reasonable to have different 268 333 269 Roberto Peon: This is there to negotiate the protocol, of anything else would be very strange. 270 271 Mike Bishop: There is another extension that can be used for passing arbitrary application data, but I cannot recall the RFC number 334 Roberto Peon: This is there to negotiate the protocol, of anything else would 335 be very strange. 336 337 Mike Bishop: There is another extension that can be used for passing arbitrary 338 application data, but I cannot recall the RFC number 272 339 273 340 (RFC 4680) 274 341 275 Sean Turner: If we're going to make it expert review, should it be only security or only apps or some combination? 276 277 Yoav Nir: Expert review should be in security because it can be used for other protocols. 342 Sean Turner: If we're going to make it expert review, should it be only 343 security or only apps or some combination? 344 345 Yoav Nir: Expert review should be in security because it can be used for other 346 protocols. 278 347 279 348 Eliot Lear: When my mother offered chocolate or vanilla, I always took both. 280 349 281 Mark Nottingham: I was concerned about how registration works, but I think we're ok there now. 350 Mark Nottingham: I was concerned about how registration works, but I think 351 we're ok there now. 282 352 283 353 ### HPACK review [Roberto Peon] 284 354 285 Actions by the Security folk to review and analyze. Mark and Stephen to discuss how to get adequate review, now that the documents have settled down. 286 287 EKR: Is it correct that the attack is effectively a brute force attack if you can't guess the secret. Are you saying that is weaker now? 355 Actions by the Security folk to review and analyze. Mark and Stephen to discuss 356 how to get adequate review, now that the documents have settled down. 357 358 EKR: Is it correct that the attack is effectively a brute force attack if you 359 can't guess the secret. Are you saying that is weaker now? 288 360 289 361 Roberto Peon: I'm saying that was weaker when you are using a stream compressor. … … 295 367 Stephen Farrel: Do we know someone good at analyzing it? 296 368 297 RP: There are a few people have looked into it. It was not about HPACK, but on the general use of Huffman. 369 RP: There are a few people have looked into it. It was not about HPACK, but on 370 the general use of Huffman. 298 371 299 372 Stephen Farrell: What is the timeframe that an analysis is useful? … … 301 374 RP: It's always easy to compress nothing. 302 375 303 NM: For the WG, we wanted to finish this up by next year, and we're on track. We are getting implementation experience. If we get this done by middle of next year, and it explodes, then we'll have problems. But this is something we can get fixed with HTTP/2.1 or its successor. This protocol needs to be easier to version. 376 NM: For the WG, we wanted to finish this up by next year, and we're on track. 377 We are getting implementation experience. If we get this done by middle of next 378 year, and it explodes, then we'll have problems. But this is something we can 379 get fixed with HTTP/2.1 or its successor. This protocol needs to be easier to 380 version. 304 381 305 382 Stephen Farrel: So we really want analysis within the next six months. 306 383 307 Yoav Nir: This table needs to be in both the client and server, and needs to be rather large. It's possible that the table might not be optimal in the future. 308 309 RP: We could just go with plaintext encoding, or we use another table or version the protocol. We know that it's possible to transmit a new table, but we're not sure it's really worhtwhile right now. 310 311 EKR: On the threat model, most of the chosen plaintext attacks have exploited some functionality of protocol to repeated induce response. As you suggest, cookies could use arbitrary entropy. What we need to be observant about is other forms of data that are lower entropy that you can get clients to send repeatedly, like credit cards, passwords, and PINs. 312 313 RP: I agree the smaller the thing the easier it is. If I have to guess a PIN, then I think their security model is already broken. 384 Yoav Nir: This table needs to be in both the client and server, and needs to be 385 rather large. It's possible that the table might not be optimal in the future. 386 387 RP: We could just go with plaintext encoding, or we use another table or 388 version the protocol. We know that it's possible to transmit a new table, but 389 we're not sure it's really worhtwhile right now. 390 391 EKR: On the threat model, most of the chosen plaintext attacks have exploited 392 some functionality of protocol to repeated induce response. As you suggest, 393 cookies could use arbitrary entropy. What we need to be observant about is 394 other forms of data that are lower entropy that you can get clients to send 395 repeatedly, like credit cards, passwords, and PINs. 396 397 RP: I agree the smaller the thing the easier it is. If I have to guess a PIN, 398 then I think their security model is already broken. 314 399 315 400 EKR: We are changing the security model somewhat. … … 317 402 NM: I think it's worth explain our proposal on cookie crumbs. 318 403 319 RP: We're looking at breaking cookies, but it's not clear this is making things easier or harder. If the encoder is naive and puts a small secret on its own, then you've reduced the total secrecy. 320 321 Jim Rosekind: IFirst interesting to note that the uncompressed case calls for the client to ask repeatedly, and some servers will get pissed off about that. 322 323 JR: Second thought is about using the static table. If the result took a data set, and you run this numerous times and analyse the space you actually need to explore. 324 325 RP: That was something the paper I talked about earlier, one could pare down the state space based on the bits on the wire. It was a very small reduction -- it was still exponential. 404 RP: We're looking at breaking cookies, but it's not clear this is making things 405 easier or harder. If the encoder is naive and puts a small secret on its own, 406 then you've reduced the total secrecy. 407 408 Jim Rosekind: IFirst interesting to note that the uncompressed case calls for 409 the client to ask repeatedly, and some servers will get pissed off about that. 410 411 JR: Second thought is about using the static table. If the result took a data 412 set, and you run this numerous times and analyse the space you actually need to 413 explore. 414 415 RP: That was something the paper I talked about earlier, one could pare down 416 the state space based on the bits on the wire. It was a very small reduction -- 417 it was still exponential. 326 418 327 419 Stephen Farrel: I'm wondering if the headers would be impacted by this. 328 329 RP: One of the things about having a compressor like this is people might use larger secrets, because the cost is less. 330 331 Paul Hoffman: I think you'll need to solicit for those reviews outside of just security. 420 RP: One of the things about having a compressor like this is people might use 421 larger secrets, because the cost is less. 422 423 Paul Hoffman: I think you'll need to solicit for those reviews outside of just 424 security. 332 425 333 426 Stephen Farrel: Between us we should try to find some way of getting review. 334 427 335 Lucy Lynch: There are a lot of people around that have experience in this, but not exactly in the same problem space. 336 337 Jim Rosekind: when you look at this pseudo random cookies that actually use a pattern. Using a greater amount of entropy can reduce the benefit from huffman encoding. 338 339 RP: With all due respect, you're wrong (-: This is generally base64 encoding, so it's already reduced. 340 341 JR: You're right that is using a reduced input set, but the tables might not favor some of the inputs. 428 Lucy Lynch: There are a lot of people around that have experience in this, but 429 not exactly in the same problem space. 430 431 Jim Rosekind: when you look at this pseudo random cookies that actually use a 432 pattern. Using a greater amount of entropy can reduce the benefit from huffman 433 encoding. 434 435 RP: With all due respect, you're wrong (-: This is generally base64 encoding, 436 so it's already reduced. 437 438 JR: You're right that is using a reduced input set, but the tables might not 439 favor some of the inputs. 342 440 343 441 YN: I thought one of the goals is to change to use binary encodings. … … 345 443 RP: We can't quite do that because of interop problems with 1.1 346 444 347 RP: Right now, the Huffman tables are different for requests and responses. The differences are noticable, and we've have talked about using a third table for cookies, but we haven't seen a good benefit there. We haven't actually seen the compressiong being larger so far. 348 349 JR: It is much more plausible if you're using ASCII characters in unif ways, but once you bring in the english language it gets easier. 350 351 RP: I agree but we haven't tried that yet for complexity reasons. We haven't made an issue for that yet. 352 353 Martin Thomson: There's plenty of places that such things show up, not just cookies. 445 RP: Right now, the Huffman tables are different for requests and responses. The 446 differences are noticable, and we've have talked about using a third table for 447 cookies, but we haven't seen a good benefit there. We haven't actually seen the 448 compressiong being larger so far. 449 450 JR: It is much more plausible if you're using ASCII characters in unif ways, 451 but once you bring in the english language it gets easier. 452 453 RP: I agree but we haven't tried that yet for complexity reasons. We haven't 454 made an issue for that yet. 455 456 Martin Thomson: There's plenty of places that such things show up, not just 457 cookies. 354 458 355 459 RP: Part of the problem for attackers is you don't know where the secret is. … … 357 461 ### Encryption and HTTP/2 + Opportunistic Encryption 358 462 359 360 463 Mark Nottingham presenting 361 464 362 465 ** NOTE: slides are _NOT_ on the materials page** 363 466 364 Ted Hardie: One of the big questiosn from yesterday was why would anyone want an HTTP/2 connection that was plaintext. If we can go from two states to two by eliminating the cleartext then we're in a better place. 467 Ted Hardie: One of the big questiosn from yesterday was why would anyone want 468 an HTTP/2 connection that was plaintext. If we can go from two states to two by 469 eliminating the cleartext then we're in a better place. 365 470 366 471 #### Alternate Proposal for Discovery … … 368 473 Paul Hoffman presenting 369 474 370 Use DNS to determine if the server for http: likely has a TLS equivalent, instead of using HTTP headers. The two are not necssarily orthogonal. This is a mechanism difference, not a conceptual difference. 371 372 Phil Haram-Baker: In my proposal, you can find the information in DNS because that's what DNS is for. The guidance could be used for multiple services. 373 374 MN: And that's why we described this in two separate layers. One is what to do, the other is how to figure out if you can. 375 376 RP: We experimented with something like this a long time ago, and I'm not interested in hearing about the mechanisms, but I'm much more interested in knowing if this increases our overal security. I'm not sure this actually increases the aggregate security. This third level might actually decrease security because it confuses users. It might make people thing that opportunistic encryption is good enough when it actually isn't. I used to think this was a good idea. 377 378 William Chan: I talked to various people on the Chrome team, and there some concerned about the relaxed mode. We're more interested in doing authentication always, even for HTTP: I am quite excited for encryptiong HTTP URIs. 379 380 NM: I would love to have the authentication. If we can good get good deployment, then it's great. From a se 381 382 EL: Concerned this introduces a new form of MitM. If yu have this header, that now says you can use relaxed, a MITM can insert the header or replace a 301 with a header, and the server thinks it has an encrypted tab but is really sending data through the MITM. 383 384 EL: Why would the attacker not just proxy HTTP, and I'm just saying this is another avenue. I'm also not sure we understand the consequences of adding a new primative about saying "don't bother to verify the certificate" and confusion about unathenticated encryption versus authenticated encryption. 385 386 Salvatore ??: I am worried we are putting to many things together, and changing things on the fly. It might be too much to manage. 387 388 NM: I think this is been kind of implicit in everything we do, because we might be switching to a new connection protocol. 389 390 YN: I think there is value protecting against passive attacks. Active attacks are 10x more expensive. I don't see much point in having authentication for HTTP because we have HTTPS. Having encryptiong wihtout encryption has some value, as long as user-agents don't say you've got protection. 391 392 Larry Masinter: I was thinking about cases where encryption might introduce excessive overhead, and one is delivery of video. There is value in encrypting the headers, though. 393 394 MN: This is a negotiation -- the client can request it, and the server can offer it. 395 396 RP: It is incorrect to say there is not benefit to encrypting video. It is useful for the content provider and for the distributer. 397 398 Tim Bray: I tell most people to just use TLS. For you information, the arguments against encryption are becoming less and less convincing. I think we should keep pushing the rock uphill because we're starting to win. 399 400 MN: One of the conclusions we have is whether server authentication needs to be lumped in. Does that mean we push everyone to just use HTTPS, or is there still benefit to HTTP. 401 402 Rohan Mahy: A lot of concerns are about what the user experience. To me it's clear -- if you are doing HTTPS, then here's the list of things to get the green locked icon. if it's HTTP, then there's no immediate indication. You just do it, and not tell enybody about it in the default case. 475 Use DNS to determine if the server for http: likely has a TLS equivalent, 476 instead of using HTTP headers. The two are not necssarily orthogonal. This is a 477 mechanism difference, not a conceptual difference. 478 479 Phil Haram-Baker: In my proposal, you can find the information in DNS because 480 that's what DNS is for. The guidance could be used for multiple services. 481 482 MN: And that's why we described this in two separate layers. One is what to do, 483 the other is how to figure out if you can. 484 485 RP: We experimented with something like this a long time ago, and I'm not 486 interested in hearing about the mechanisms, but I'm much more interested in 487 knowing if this increases our overal security. I'm not sure this actually 488 increases the aggregate security. This third level might actually decrease 489 security because it confuses users. It might make people thing that 490 opportunistic encryption is good enough when it actually isn't. I used to think 491 this was a good idea. 492 493 William Chan: I talked to various people on the Chrome team, and there some 494 concerned about the relaxed mode. We're more interested in doing authentication 495 always, even for HTTP: I am quite excited for encryptiong HTTP URIs. 496 497 NM: I would love to have the authentication. If we can good get good 498 deployment, then it's great. From a se 499 500 EL: Concerned this introduces a new form of MitM. If yu have this header, that 501 now says you can use relaxed, a MITM can insert the header or replace a 301 502 with a header, and the server thinks it has an encrypted tab but is really 503 sending data through the MITM. 504 505 EL: Why would the attacker not just proxy HTTP, and I'm just saying this is 506 another avenue. I'm also not sure we understand the consequences of adding a 507 new primative about saying "don't bother to verify the certificate" and 508 confusion about unathenticated encryption versus authenticated encryption. 509 510 Salvatore ??: I am worried we are putting to many things together, and changing 511 things on the fly. It might be too much to manage. 512 513 NM: I think this is been kind of implicit in everything we do, because we might 514 be switching to a new connection protocol. 515 516 YN: I think there is value protecting against passive attacks. Active attacks 517 are 10x more expensive. I don't see much point in having authentication for 518 HTTP because we have HTTPS. Having encryptiong wihtout encryption has some 519 value, as long as user-agents don't say you've got protection. 520 521 Larry Masinter: I was thinking about cases where encryption might introduce 522 excessive overhead, and one is delivery of video. There is value in encrypting 523 the headers, though. 524 525 MN: This is a negotiation -- the client can request it, and the server can 526 offer it. 527 528 RP: It is incorrect to say there is not benefit to encrypting video. It is 529 useful for the content provider and for the distributer. 530 531 Tim Bray: I tell most people to just use TLS. For you information, the 532 arguments against encryption are becoming less and less convincing. I think we 533 should keep pushing the rock uphill because we're starting to win. 534 535 MN: One of the conclusions we have is whether server authentication needs to be 536 lumped in. Does that mean we push everyone to just use HTTPS, or is there still 537 benefit to HTTP. 538 539 Rohan Mahy: A lot of concerns are about what the user experience. To me it's 540 clear -- if you are doing HTTPS, then here's the list of things to get the 541 green locked icon. if it's HTTP, then there's no immediate indication. You just 542 do it, and not tell enybody about it in the default case. 403 543 404 544 NM: By the way, that's what's in the draft. … … 406 546 Alissa Cooper: We should think of this as a gift to users (-: 407 547 408 Ted Hardie: I like the idea of not giving the browesr a signal of opportunisitc encryption. But users are not the only side in this. There are classes of software that might provide a false sense of security. We can get a benefit, but it might cost us some authenticated encryption, and that is a serious problem. I think we should just do HTTP/2.o is always authenticated encryption. If we can't get to server authentication always, then make it hard or hidden to do opportunistic. 409 410 Brian Dixon: From the perspective of opportunistic, it should be acceptable to use self-signed, but still require authentication. This might lower the bar, but this might still be of benefit. 411 412 Patrick McMannus: People don't always have all the information about what the protection there is if we rely on HTTPS only, so having encryption always is a good thing. I think it's better to require authenticated, since we really just get one chance. But if all we can really do is HTTP-relaxed, then it's still moving the bar forward. 413 414 ??: Most browsrs give you a place to enter certain configuration options on a per-host basis. While I don't think we should expose this to users, but I think there is benefit. 415 416 Johan ??: I'm a little skeptical of doing encryption at this level. Especialy as it plays with DNS. 417 418 Richard Barnes: Unauthenticated encryption is the new plaintext. This means that the worst case is that you are protected from passive attacks. We should shoot for authenticated encryption. If our goal is to increase the number of places that authentication and integrity protection is increased, I'm not sure these goals get us there. If we require authentication, it means people need to get the proper credentials at scale, but we're not there right now. 419 420 Christian Huitema: I am skeptical about the amount of protection you really get. I am concerned about the case where we first send the request in cleartext, with all of the potential traffic analisys information exposed, is not providing any benefit. We should think about the security considerations about this, and maybe have other ways of determining this information, or require another trip in order. 421 422 NM: We did talk about this in Seattle, and if people are going to do this for security purposes, then you would block this data. Such as sending a very minimal amount of infomration in an exloratory request or use DNS. 423 424 RP: I want to point out why people don't deploy HTTPS. It's not because of the cost of getting certs, but because HTTPS is significantly slower. People doing commerce are very interested in performance, and are unlikely to deploy unless HTTP2/ with TLS is as fast or faster. Our experimentation at Google has shown that HTTPS is as fast or faster for a large number of cases. 548 Ted Hardie: I like the idea of not giving the browesr a signal of opportunisitc 549 encryption. But users are not the only side in this. There are classes of 550 software that might provide a false sense of security. We can get a benefit, 551 but it might cost us some authenticated encryption, and that is a serious 552 problem. I think we should just do HTTP/2.o is always authenticated encryption. 553 If we can't get to server authentication always, then make it hard or hidden to 554 do opportunistic. 555 556 Brian Dixon: From the perspective of opportunistic, it should be acceptable to 557 use self-signed, but still require authentication. This might lower the bar, 558 but this might still be of benefit. 559 560 Patrick McMannus: People don't always have all the information about what the 561 protection there is if we rely on HTTPS only, so having encryption always is a 562 good thing. I think it's better to require authenticated, since we really just 563 get one chance. But if all we can really do is HTTP-relaxed, then it's still 564 moving the bar forward. 565 566 ??: Most browsrs give you a place to enter certain configuration options on a 567 per-host basis. While I don't think we should expose this to users, but I think 568 there is benefit. 569 570 Johan ??: I'm a little skeptical of doing encryption at this level. Especialy 571 as it plays with DNS. 572 573 Richard Barnes: Unauthenticated encryption is the new plaintext. This means 574 that the worst case is that you are protected from passive attacks. We should 575 shoot for authenticated encryption. If our goal is to increase the number of 576 places that authentication and integrity protection is increased, I'm not sure 577 these goals get us there. If we require authentication, it means people need to 578 get the proper credentials at scale, but we're not there right now. 579 580 Christian Huitema: I am skeptical about the amount of protection you really 581 get. I am concerned about the case where we first send the request in 582 cleartext, with all of the potential traffic analisys information exposed, is 583 not providing any benefit. We should think about the security considerations 584 about this, and maybe have other ways of determining this information, or 585 require another trip in order. 586 587 NM: We did talk about this in Seattle, and if people are going to do this for 588 security purposes, then you would block this data. Such as sending a very 589 minimal amount of infomration in an exloratory request or use DNS. 590 591 RP: I want to point out why people don't deploy HTTPS. It's not because of the 592 cost of getting certs, but because HTTPS is significantly slower. People doing 593 commerce are very interested in performance, and are unlikely to deploy unless 594 HTTP2/ with TLS is as fast or faster. Our experimentation at Google has shown 595 that HTTPS is as fast or faster for a large number of cases. 425 596 426 597 RP: < note taker missed it > 427 598 428 Stephen Friedl: I agree with Roberto. I don't trust locks on my browsers, and heaven forbid I explain to laymen. The only way to do this is HTTPS (with authentication) only. No more HTTP. And we should be rigorous about it. I am in the camp to push everything to HTTPS except for the small set of cases where it doesn't make sense. For ALPN, we should be more formal of how to register the types. 429 430 Rob Trace: I would like to have a secure web, but there is a long list of corner cases where it's applicable to have HTTP plaintext. It's hard to claim this is a security feature, since you still have to treat the content in and out as insecure. 599 Stephen Friedl: I agree with Roberto. I don't trust locks on my browsers, and 600 heaven forbid I explain to laymen. The only way to do this is HTTPS (with 601 authentication) only. No more HTTP. And we should be rigorous about it. I am in 602 the camp to push everything to HTTPS except for the small set of cases where it 603 doesn't make sense. For ALPN, we should be more formal of how to register the 604 types. 605 606 Rob Trace: I would like to have a secure web, but there is a long list of 607 corner cases where it's applicable to have HTTP plaintext. It's hard to claim 608 this is a security feature, since you still have to treat the content in and 609 out as insecure. 431 610 432 611 EKR: Is HTTP/2-over-TLS only still on the table? … … 434 613 MN: It appears that the position of HTTP/2. over only TLS is too extreme. 435 614 436 EKR: Doing nothing is stupid. What I think we're arguing about is whether having the relaxed version lowers the bar too much. I think determining how many would do the right thing, or at least do opportunistic is tricky and we don't know. I think opportunistic TLS is worth doing. 437 438 MN: People have expressed concern about confusing people about the security state, and I don't think that will be the case. Server admins will open a browser and look for the indicators. If there are none, then they don't think they have any protection. As for commernce, I'm not sure that's an important thing anymore. What's important is what happens out-of-the-box. If any encryption requires doing more than installing the software then people won't be doing it most times. 439 440 EL: One of the thigns I was thinking about was to do the discovery inline instead of a referall mechanisms. I think having all the security and HTTP people helps informs the discussion for perpass. A few people made some economic assertions, these are interesting questions for researchers to look into. Also, the IRTF meeting is discussing how to get researchers and those willing to pay for it together. 441 442 PHB: The original goal for HTTPS was to have the same level of trust for people buying things online as buying things in a store. So not turning on the lock if you haven't authenticated is good. Deploying opportunistic TLS increases the work attacks have to do which is good. But for the other attacks, where someone could downgrade someone from HTTP/2 to HTTP/1.1. Do you really want to re-encrypt YouTube vidoes each time? 615 EKR: Doing nothing is stupid. What I think we're arguing about is whether 616 having the relaxed version lowers the bar too much. I think determining how 617 many would do the right thing, or at least do opportunistic is tricky and we 618 don't know. I think opportunistic TLS is worth doing. 619 620 MN: People have expressed concern about confusing people about the security 621 state, and I don't think that will be the case. Server admins will open a 622 browser and look for the indicators. If there are none, then they don't think 623 they have any protection. As for commernce, I'm not sure that's an important 624 thing anymore. What's important is what happens out-of-the-box. If any 625 encryption requires doing more than installing the software then people won't 626 be doing it most times. 627 628 EL: One of the thigns I was thinking about was to do the discovery inline 629 instead of a referall mechanisms. I think having all the security and HTTP 630 people helps informs the discussion for perpass. A few people made some 631 economic assertions, these are interesting questions for researchers to look 632 into. Also, the IRTF meeting is discussing how to get researchers and those 633 willing to pay for it together. 634 635 PHB: The original goal for HTTPS was to have the same level of trust for people 636 buying things online as buying things in a store. So not turning on the lock if 637 you haven't authenticated is good. Deploying opportunistic TLS increases the 638 work attacks have to do which is good. But for the other attacks, where someone 639 could downgrade someone from HTTP/2 to HTTP/1.1. Do you really want to 640 re-encrypt YouTube vidoes each time? 443 641 444 642 AUDIENCE: YES 445 643 446 PHB: Once you get past that, you are really talking about doing strong crypto or crappy crypto. You could probably collapse the work factors to one or two choices. 447 448 Keith Moore: The decision this WG is making has a long term effect. I think we need to look beyond the current threat or the past threats. Right now active attacks are harder than passive attacks. But if a passive attack is feasible, then an active attack is also feasible. I'm not sure there's a benefit to do opportunistic because you can be downgraded, unless you can absolutely prevent it. 449 450 TH: What Keith said, but also this is an estimation problem (as EKR pointed out). We are taking the current state and adding opportunistic encryption, which prevents FireSheep. Does adding opportunistic reduce the number of times people get good certs? 644 PHB: Once you get past that, you are really talking about doing strong crypto 645 or crappy crypto. You could probably collapse the work factors to one or two 646 choices. 647 648 Keith Moore: The decision this WG is making has a long term effect. I think we 649 need to look beyond the current threat or the past threats. Right now active 650 attacks are harder than passive attacks. But if a passive attack is feasible, 651 then an active attack is also feasible. I'm not sure there's a benefit to do 652 opportunistic because you can be downgraded, unless you can absolutely prevent 653 it. 654 655 TH: What Keith said, but also this is an estimation problem (as EKR pointed 656 out). We are taking the current state and adding opportunistic encryption, 657 which prevents FireSheep. Does adding opportunistic reduce the number of times 658 people get good certs? 451 659 452 660 EKR: If we provide the unauth mechanism, [EKR line noise] 453 661 454 TH: If we ask "should HTTP/2.0 be TLS-only?" we might come to a different conclusion. 455 456 RP: My definition of commerce might be very different of yours. Pintrest doesn't actually sell anything, but they still add value. Commerce doesn't always mean adding things to a cart and checking out. Pintrest doesn't have a competitor right now, but latency matters. Second, it is far easier to add authentication later than to remove unauthentication later. If we weaken it by adding this third thing it will be hard to fix. 457 458 ??: Trying to protect against just the passive attack is silly. One thing is very clear is that if I have a HTTP URI, I want to try to use it in a secure way. If I use it in a secure way, I want to really be secure. 459 460 MN: If we did do opportunistic, do you want to see mitigation of downgrade attack. [Yes] 461 462 Stephen Farrel: I think there's value in trying to mitigate the passive attack, so I think the do nothing option is really stupid. Trying to insist on HTTPS everywhere is not feasible or scalable. I think the third option is the right approach. 662 TH: If we ask "should HTTP/2.0 be TLS-only?" we might come to a different 663 conclusion. 664 665 RP: My definition of commerce might be very different of yours. Pintrest 666 doesn't actually sell anything, but they still add value. Commerce doesn't 667 always mean adding things to a cart and checking out. Pintrest doesn't have a 668 competitor right now, but latency matters. Second, it is far easier to add 669 authentication later than to remove unauthentication later. If we weaken it by 670 adding this third thing it will be hard to fix. 671 672 ??: Trying to protect against just the passive attack is silly. One thing is 673 very clear is that if I have a HTTP URI, I want to try to use it in a secure 674 way. If I use it in a secure way, I want to really be secure. 675 676 MN: If we did do opportunistic, do you want to see mitigation of downgrade 677 attack. [Yes] 678 679 Stephen Farrel: I think there's value in trying to mitigate the passive attack, 680 so I think the do nothing option is really stupid. Trying to insist on HTTPS 681 everywhere is not feasible or scalable. I think the third option is the right 682 approach. 463 683 464 684 MN: I think we have an opportunity to improve performance with HTTP/2 465 685 466 Will Chan: One barrier I've heard is about mixed content. Even though I'm a big fan of telling people to just use HTTPS, but I need third-party ads and what do I do? While I want to got HTTPS only, I think there's still a lot of benefit because it reduces the barrier of entry. 467 468 EKR: I think you should consider option 0, and you consider TLS for HTTP/2 always. I think we should do something, and having some option for the server to indicate it only wants to do the authenticated mode. Is it ok to have mixed content? We need to consider the policies that are involved in these cases. 469 470 PHB: I think a lot of the argument is over a choice that doesn't exist. One is whether you have authenticated cert or not, since the IETF doesn't strongly define what authenticated really means. The only choice that can be made is whether the client can be allowed to turn off its root criteria. 471 472 Roy Fielding: I don't think you can require HTTP/2 to be encrypted always, given all the places that HTTP servers are deployed. I could get behind that if you use HTTP you use a secure transport protocol, ether it's TLS or SSH or something. I don't think it's a technical argument, but there is a social argument that you can and probably should make. 686 Will Chan: One barrier I've heard is about mixed content. Even though I'm a big 687 fan of telling people to just use HTTPS, but I need third-party ads and what do 688 I do? While I want to got HTTPS only, I think there's still a lot of benefit 689 because it reduces the barrier of entry. 690 691 EKR: I think you should consider option 0, and you consider TLS for HTTP/2 692 always. I think we should do something, and having some option for the server 693 to indicate it only wants to do the authenticated mode. Is it ok to have mixed 694 content? We need to consider the policies that are involved in these cases. 695 696 PHB: I think a lot of the argument is over a choice that doesn't exist. One is 697 whether you have authenticated cert or not, since the IETF doesn't strongly 698 define what authenticated really means. The only choice that can be made is 699 whether the client can be allowed to turn off its root criteria. 700 701 Roy Fielding: I don't think you can require HTTP/2 to be encrypted always, 702 given all the places that HTTP servers are deployed. I could get behind that if 703 you use HTTP you use a secure transport protocol, ether it's TLS or SSH or 704 something. I don't think it's a technical argument, but there is a social 705 argument that you can and probably should make. 473 706 474 707 #### What does the WG Want? 475 708 476 Mark Bishop: Just want to be clear, that for 2 and 3 that there's an option to go better, but no requirement. 477 478 LM: One considerations is if users would be presented with information about those connections. Which of these include those dialogs/information? And what is the performance impact? 709 Mark Bishop: Just want to be clear, that for 2 and 3 that there's an option to 710 go better, but no requirement. 711 712 LM: One considerations is if users would be presented with information about 713 those connections. Which of these include those dialogs/information? And what 714 is the performance impact? 479 715 480 716 Dixon: To clarify server auth, it should include both CA-based and DANE-based. 481 717 482 Rohan Mahy: I don't know what #3 means with the word somehow, especially in a technical context. 483 484 Gabriel Montenago: Remember what the desired final state is to increase the use of valid TLS. Where is that in these choices? I think plaintext has an important place in the world. 718 Rohan Mahy: I don't know what #3 means with the word somehow, especially in a 719 technical context. 720 721 Gabriel Montenago: Remember what the desired final state is to increase the use 722 of valid TLS. Where is that in these choices? I think plaintext has an 723 important place in the world. 485 724 486 725 Barry Leiba: You should be looking for who cannot live with some of these. 487 726 488 0) Don't know (yet) 727 0) Don't know (yet) 489 728 490 729 [strong humms for can't live with] … … 494 733 [strong humms for can't live with] 495 734 496 2) Opportunistic encryption w/o server authentication for HTTP URIs - just for passive attacks 735 2) Opportunistic encryption w/o server authentication for HTTP URIs - just for 736 passive attacks 497 737 498 738 [ less strong for can't live with ] 499 739 500 3) Opportunistic encryption with server authentication AND downgrade protection (somehow) for HTTP URIs; no requirement upon HTTP/2.0 when not available 501 502 [ weakest for can't live with ] 740 3) Opportunistic encryption with server authentication AND downgrade protection 741 (somehow) for HTTP URIs; no requirement upon HTTP/2.0 when not available 742 743 [ weakest for can't live with ] 503 744 504 745 4) Requre secure underlying protocol for HTTP/2.0 (at least in web browsing)
Note: See TracChangeset
for help on using the changeset viewer.