Re: Spencer Dawkins' Yes on draft-ietf-httpbis-alt-svc-13: (with COMMENT)

Mark Nottingham <mnot@mnot.net> Thu, 03 March 2016 03:05 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E9921B3A39 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 2 Mar 2016 19:05:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.006, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UFLB9bMyjT36 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 2 Mar 2016 19:05:14 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 89E6E1B3A34 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Wed, 2 Mar 2016 19:05:14 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1abJV4-00051T-ID for ietf-http-wg-dist@listhub.w3.org; Thu, 03 Mar 2016 03:00:26 +0000
Resent-Date: Thu, 03 Mar 2016 03:00:26 +0000
Resent-Message-Id: <E1abJV4-00051T-ID@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <mnot@mnot.net>) id 1abJUy-0004LK-F1 for ietf-http-wg@listhub.w3.org; Thu, 03 Mar 2016 03:00:20 +0000
Received: from mxout-07.mxes.net ([216.86.168.182]) by maggie.w3.org with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from <mnot@mnot.net>) id 1abJUq-0000fQ-EQ for ietf-http-wg@w3.org; Thu, 03 Mar 2016 03:00:18 +0000
Received: from [192.168.1.101] (unknown [120.149.194.112]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 170CB22E260; Wed, 2 Mar 2016 21:59:41 -0500 (EST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Mark Nottingham <mnot@mnot.net>
In-Reply-To: <20160302212354.10269.70508.idtracker@ietfa.amsl.com>
Date: Thu, 03 Mar 2016 13:59:39 +1100
Cc: The IESG <iesg@ietf.org>, Mike Bishop <michael.bishop@microsoft.com>, HTTP WG <ietf-http-wg@w3.org>
Content-Transfer-Encoding: 7bit
Message-Id: <F291F271-6D4F-4E36-BC13-1438D9FB911D@mnot.net>
References: <20160302212354.10269.70508.idtracker@ietfa.amsl.com>
To: Spencer Dawkins <spencerdawkins.ietf@gmail.com>
X-Mailer: Apple Mail (2.3112)
Received-SPF: pass client-ip=216.86.168.182; envelope-from=mnot@mnot.net; helo=mxout-07.mxes.net
X-W3C-Hub-Spam-Status: No, score=-8.3
X-W3C-Hub-Spam-Report: AWL=1.313, BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_IRR=-3, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1abJUq-0000fQ-EQ 3b506ccce1c7cc69389ae9e18ca3c320
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Spencer Dawkins' Yes on draft-ietf-httpbis-alt-svc-13: (with COMMENT)
Archived-At: <http://www.w3.org/mid/F291F271-6D4F-4E36-BC13-1438D9FB911D@mnot.net>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/31160
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hi Spencer,

> A couple of very nitty nits.
> 
> In this text
> 
>   When the protocol does not explicitly carry the scheme (e.g., as is
>   usually the case for HTTP/1.1 over TLS, servers can mitigate this
>                                         ^
> I think there's a missing closing parenthesis right around here.
> 
> If there's not, I'm having trouble parsing the sentence.

Already fixed.

>   risk by either assuming that all requests have an insecure context,
>   or by refraining from advertising alternative services for insecure
>   schemes (such as HTTP).
> 
> If there was an obvious reference for SPDY in this text
> 
>   The Alt-Svc header field was influenced by the design of the
>   Alternate-Protocol header field in SPDY.
> 
> that might be useful to include.

There's a URL; not sure how stable though.

Cheers,


--
Mark Nottingham   https://www.mnot.net/