Re: comprehensive TLS is not the solution, it's a bug ... (was 2 questions)

Amos Jeffries <squid3@treenet.co.nz> Wed, 01 April 2015 01:45 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D08071B2BD9 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 31 Mar 2015 18:45:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.912
X-Spam-Level:
X-Spam-Status: No, score=-6.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fg0uPaNPW2IX for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 31 Mar 2015 18:45:16 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9809D1B2BDB for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 31 Mar 2015 18:45:15 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Yd7f1-0007Wh-3q for ietf-http-wg-dist@listhub.w3.org; Wed, 01 Apr 2015 01:41:39 +0000
Resent-Date: Wed, 01 Apr 2015 01:41:39 +0000
Resent-Message-Id: <E1Yd7f1-0007Wh-3q@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.80) (envelope-from <squid3@treenet.co.nz>) id 1Yd7ey-0007Vw-E1 for ietf-http-wg@listhub.w3.org; Wed, 01 Apr 2015 01:41:36 +0000
Received: from 121-99-228-82.static.orcon.net.nz ([121.99.228.82] helo=treenet.co.nz) by maggie.w3.org with esmtp (Exim 4.72) (envelope-from <squid3@treenet.co.nz>) id 1Yd7ex-00020w-72 for ietf-http-wg@w3.org; Wed, 01 Apr 2015 01:41:36 +0000
Received: from [192.168.20.12] (121-99-25-188.bng1.nct.orcon.net.nz [121.99.25.188]) by treenet.co.nz (Postfix) with ESMTP id 3824DE6F12 for <ietf-http-wg@w3.org>; Wed, 1 Apr 2015 13:41:05 +1200 (NZST)
Message-ID: <551B4CAF.70409@treenet.co.nz>
Date: Wed, 01 Apr 2015 14:41:03 +1300
From: Amos Jeffries <squid3@treenet.co.nz>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: ietf-http-wg@w3.org
References: <5517E353.2070800@mathemainzel.info> <BL2PR03MB1321B441AC87F64CA1536BB87F50@BL2PR03MB132.namprd03.prod.outlook.com> <-2692015409415017710@unknownmsgid> <CAN5uf-Sxe4RWLb71-vWZvm0TVYMENK=4B+Awfz4c5NUAOEesaQ@mail.gmail.com> <880c6444186187addd3b67cc91230de4.1427779814@squirrel.mail> <551A62B7.5080100@treenet.co.nz> <6c1ec434cd6ee6344d0e2698441effa3.1427793164@squirrel.mail> <551A8334.2030504@treenet.co.nz> <20150331114724.GB7183@1wt.eu> <551AE6F9.7080002@mathemainzel.info> <20150331182822.GG7183@1wt.eu> <9D3FDA54-740F-487D-A316-D8C9A75CD9FB@me.com> <551AED98.7070601@mathemainzel.info> <DE153F85-6CE9-479F-B2CA-97B487990367@me.com> <CACweHNAqEkbgcOgtiq_V7oqWK6aQ6Fsb9VF++qZF0BAfo9vZbA@mail.gmail.com> <BL2PR03MB132223D60CD0113036E27A287F40@BL2PR03MB132.namprd03.prod.outlook.com> <7C5D147F-FFD0-4B55-95AF-2A513D5D5C56@me.com>
In-Reply-To: <7C5D147F-FFD0-4B55-95AF-2A513D5D5C56@me.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Received-SPF: pass client-ip=121.99.228.82; envelope-from=squid3@treenet.co.nz; helo=treenet.co.nz
X-W3C-Hub-Spam-Status: No, score=-4.4
X-W3C-Hub-Spam-Report: AWL=-2.392, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, TVD_RCVD_IP=0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1Yd7ex-00020w-72 9d355ed9b62d7eaa5d811f9f673b46e3
X-Original-To: ietf-http-wg@w3.org
Subject: Re: comprehensive TLS is not the solution, it's a bug ... (was 2 questions)
Archived-At: <http://www.w3.org/mid/551B4CAF.70409@treenet.co.nz>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/29157
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 1/04/2015 11:03 a.m., ChanMaxthon wrote:
> Maybe I missed out that and abused Server header, but the gist is still there: in the first request if cached information is not available, which is plain HTTP/1.1, the server advertises its availability of HTTP/2 capabilities; and on the second request or if a previous successful HTTP/2 session is still in cache HTTP/2 traffic is started by sending a HTTP/1.1 Upgrade request which is responded with a HTTP/2 response.
> 
> This non-symmetric behavior would throw off some of that MITM attempt (as an unwanted HTTP/1.1 response to this particular request is ignored.)
> 

No it won't. Google tried that style of upgrade with QUIC.

Which forced me to do this a short while ago:
<http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13193.patch>

Note that the change was done to fix *security vulnerabilities*
affecting even regular benevolent existing HTTP proxies. These occur
regardless of how secure QUIC itself might be. Alt-Svc draft is
struggling with the same class of issues.

Any proxy (MITM or not) which is erasing the client signals (Upgrade or
HTTP2-Settings headers) is just as likely to erase server signals with
more actual need to do so.

Amos