Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem

Jason Greene <jason.greene@redhat.com> Mon, 22 September 2014 19:04 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 535D11A1B4B for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 22 Sep 2014 12:04:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.688
X-Spam-Level:
X-Spam-Status: No, score=-7.688 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.786, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U7TEAPzsozPj for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 22 Sep 2014 12:04:54 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1D2C1A1B1D for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 22 Sep 2014 12:04:54 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1XW8rZ-0007Bs-A1 for ietf-http-wg-dist@listhub.w3.org; Mon, 22 Sep 2014 19:01:29 +0000
Resent-Date: Mon, 22 Sep 2014 19:01:29 +0000
Resent-Message-Id: <E1XW8rZ-0007Bs-A1@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <jason.greene@redhat.com>) id 1XW8rB-0007AB-VN for ietf-http-wg@listhub.w3.org; Mon, 22 Sep 2014 19:01:06 +0000
Received: from mx1.redhat.com ([209.132.183.28]) by lisa.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <jason.greene@redhat.com>) id 1XW8rA-000376-9d for ietf-http-wg@w3.org; Mon, 22 Sep 2014 19:01:05 +0000
Received: from int-mx14.intmail.prod.int.phx2.redhat.com (int-mx14.intmail.prod.int.phx2.redhat.com [10.5.11.27]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id s8MJ0Yf6016345 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 22 Sep 2014 15:00:34 -0400
Received: from [10.3.231.41] (vpn-231-41.phx2.redhat.com [10.3.231.41]) by int-mx14.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id s8MJ0W5Y002390 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 22 Sep 2014 15:00:33 -0400
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Jason Greene <jason.greene@redhat.com>
In-Reply-To: <CABcZeBMogV=+s0Uud7TvK1WrdVn-k-Bp=yLu49wzpSXiM2XwZg@mail.gmail.com>
Date: Mon, 22 Sep 2014 14:00:31 -0500
Cc: Greg Wilkins <gregw@intalio.com>, Patrick McManus <pmcmanus@mozilla.com>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <6F2E1693-0036-48AE-A9D9-04ED6DEB1DF7@redhat.com>
References: <CAH_y2NF+sP9BmYuD4QbeHpwC_uj67itzaAFCnRVC6f--KDYOgg@mail.gmail.com> <CAOdDvNopynmwvwWLXvuC0q7skunFXcfRoVHe9s7BKcoCwaBgWQ@mail.gmail.com> <CAH_y2NGXz7e3ejqy_rD=39=yYp3+cS1Dm6c3yFEYZg6tsUp5VQ@mail.gmail.com> <CABkgnnWAdm1TLP2XCKNU-6RPACLfooQV73R7Gpoemv+9PNULCA@mail.gmail.com> <CAH_y2NFLjok-NRJtOw1vmSy68sf393iSOgA4K599q0BSBqbNgA@mail.gmail.com> <CABkgnnU-CMtv8KvYU9n+QoPBOBshtQv3RfLy2qw=qVNb2O-qGg@mail.gmail.com> <CAH_y2NHrbH5Objwhq9E89QexhQtND4uOdy8q7OEckTCU17WqKg@mail.gmail.com> <CAH_y2NErRd4rxinSzEH3-uTjdWVkZu9o6sSKSf47LxfPFTRONw@mail.gmail.com> <20140917073241.GA7665@LK-Perkele-VII> <CAFewVt4pxE+9NpzYuzMKGmEdrDXzk50mC99ZbrM6M-uEoKXrHA@mail.gmail.com> <CAH_y2NGYcDvPcxDvaTRBP3p4Pnb7gw39WUDY3bNVnOGQjBgciQ@mail.gmail.com> <CAFewVt7+UAJYfKAR6DRZi_mqdzSaYw6L-pT1qg=UyOaP1ojhTw@mail.gmail.com> <CAH_y2NEhAEaPiUgi_vX6Oimw+Y-k3WrnL0gJZKPxQ8KZVuFVfw@mail.gmail.com> <CABkgnnU6C+TzJzdeQZhwXucuPUrPh1yyp1cpRd9jSePMjAnONQ@mail.gmail.com> <CAH_y2NH=skUXk0QwCs4uVqWE=iOLhi5K+kvARDU! Q7uMeogrw9A@mail.gmail.com> <CABcZeBPvQfkqnPkfzY53RVAHNw0govmp8p8obvp99w8zs4=RKw@mail.gmail.com> <D7B49F55-663F-4005-AD06-7E4057491608@redhat.com> <CABcZeBO8R9NLcwsNNKqPVZexw3duTe5Crneke8T1DOzs4wmBWg@mail.gmail.com> <B765DC59-BCBB-45C0-B766-C74EB0738CB5@redhat.com> <CABcZeBMogV=+s0Uud7TvK1WrdVn-k-Bp=yLu49wzpSXiM2XwZg@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.27
Received-SPF: pass client-ip=209.132.183.28; envelope-from=jason.greene@redhat.com; helo=mx1.redhat.com
X-W3C-Hub-Spam-Status: No, score=-6.4
X-W3C-Hub-Spam-Report: AWL=-0.468, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.964, SPF_HELO_PASS=-0.001
X-W3C-Scan-Sig: lisa.w3.org 1XW8rA-000376-9d 925cc5fb5bc851ec376df7de9457e811
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem
Archived-At: <http://www.w3.org/mid/6F2E1693-0036-48AE-A9D9-04ED6DEB1DF7@redhat.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/27150
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Sep 22, 2014, at 1:21 PM, Eric Rescorla <ekr@rtfm.com> wrote:

> On Mon, Sep 22, 2014 at 10:44 AM, Jason Greene <jason.greene@redhat.com> wrote:
> 
> 
>> Ok but then if you wait on HTTP/3, 9.2.2 then precludes your ability to select a more modern cipher category like the Aero example. So it doesn’t seem to really meet the former case, and it certainly doesn’t meet the latter.
> 
> I don't think that's true. 9.2.2 doesn't say you can't do non-AEAD. It says
> that you can't do stream or block. Rather:
> 
> "Clients MUST accept DHE sizes of up to 4096 bits. HTTP MUST NOT be used with cipher suites that use stream or block ciphers. Authenticated Encryption with Additional Data (AEAD) modes, such as the Galois Counter Model (GCM) mode for AES [RFC5288] are acceptable."
> 
> I would assume that any new cipher spec would come with a "this is OK for
> HTTP2" bit (or not). So I don't see the interop problem.

It does, but only for today. My wondering could be more precise though. In your hypothetical future example, AEAD is no longer “modern”, but Aero is. Until HTTP/3 is released, HTTP/2 at that time will not meet your first case [1], since AEAD would still be acceptable by the rules of 9.2.2. Granted, the TLS stack if recent in the future hypothetical can and should still pick Aero, just like it can and should pick AEAD today, without 9.2.2.

Put another way, 9.2.2 is a temporary social hack.


[1] "We're kind of sad that people use algorithm X and we wish they would do something more modern”



--
Jason T. Greene
WildFly Lead / JBoss EAP Platform Architect
JBoss, a division of Red Hat