RE: Change to padding in encryption -- enabling random access

"Manger, James" <James.H.Manger@team.telstra.com> Mon, 30 January 2017 06:08 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B3F11289B0 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 29 Jan 2017 22:08:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.12
X-Spam-Level:
X-Spam-Status: No, score=-10.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-3.199, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=teamtelstra.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DUhyxPI24rjt for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 29 Jan 2017 22:08:47 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6839B129978 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 29 Jan 2017 22:08:47 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1cY55X-0004Zn-Bm for ietf-http-wg-dist@listhub.w3.org; Mon, 30 Jan 2017 06:05:15 +0000
Resent-Date: Mon, 30 Jan 2017 06:05:15 +0000
Resent-Message-Id: <E1cY55X-0004Zn-Bm@frink.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <James.H.Manger@team.telstra.com>) id 1cY55R-0004Bq-SE for ietf-http-wg@listhub.w3.org; Mon, 30 Jan 2017 06:05:09 +0000
Received: from ipxcno.tcif.telstra.com.au ([203.35.82.208]) by titan.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from <James.H.Manger@team.telstra.com>) id 1cY551-0006C5-5B for ietf-http-wg@w3.org; Mon, 30 Jan 2017 06:04:54 +0000
X-IronPort-AV: E=Sophos;i="5.33,310,1477918800"; d="scan'208";a="19962033"
Received: from unknown (HELO ipcbni.tcif.telstra.com.au) ([10.97.216.204]) by ipocni.tcif.telstra.com.au with ESMTP; 30 Jan 2017 17:04:12 +1100
X-IronPort-AV: E=McAfee;i="5700,7163,8423"; a="292727175"
Received: from wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) by ipcbni.tcif.telstra.com.au with ESMTP; 30 Jan 2017 17:04:12 +1100
Received: from wsapp5871.srv.dir.telstra.com (10.75.139.13) by wsmsg3706.srv.dir.telstra.com (172.49.40.80) with Microsoft SMTP Server (TLS) id 8.3.485.1; Mon, 30 Jan 2017 17:04:12 +1100
Received: from wsapp5584.srv.dir.telstra.com (10.75.131.20) by wsapp5871.srv.dir.telstra.com (10.75.139.13) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Mon, 30 Jan 2017 17:04:11 +1100
Received: from AUS01-ME1-obe.outbound.protection.outlook.com (10.172.101.126) by wsapp5584.srv.dir.telstra.com (10.75.131.20) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Mon, 30 Jan 2017 17:04:11 +1100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=teamtelstra.onmicrosoft.com; s=selector1-team-telstra-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=sE39RmztXMDQ3DiJlQqi1QYsVefBkYPLgeLSPrFK8ZA=; b=HB1OUEiRX8d09jCj6iLYOzdkXxBvYAN3PHFnRNKSFBMulxRzBlvu79A5RT7RoWy51tj8kmQZgat4tNHXM95q7ChQQ557vC+DPJS+2JvnlPur48ZuTgx+ykdNH7fYCQsdbxlFmpglrsyt72tlADS+JhVDjTO6Sgz+zT618/XmHXA=
Received: from SYXPR01MB1615.ausprd01.prod.outlook.com (10.175.209.15) by SYXPR01MB1614.ausprd01.prod.outlook.com (10.175.209.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.860.13; Mon, 30 Jan 2017 06:04:10 +0000
Received: from SYXPR01MB1615.ausprd01.prod.outlook.com ([10.175.209.15]) by SYXPR01MB1615.ausprd01.prod.outlook.com ([10.175.209.15]) with mapi id 15.01.0860.024; Mon, 30 Jan 2017 06:04:10 +0000
From: "Manger, James" <James.H.Manger@team.telstra.com>
To: Martin Thomson <martin.thomson@gmail.com>
CC: HTTP Working Group <ietf-http-wg@w3.org>
Thread-Topic: Change to padding in encryption -- enabling random access
Thread-Index: AdJ6u17E6Lor8apvSIizqbE+dqcFRAAAW98AAAAT39A=
Date: Mon, 30 Jan 2017 06:04:10 +0000
Message-ID: <SYXPR01MB1615E583D39EB73552D16287E54B0@SYXPR01MB1615.ausprd01.prod.outlook.com>
References: <SYXPR01MB1615E160116B0FABB6703DC6E54B0@SYXPR01MB1615.ausprd01.prod.outlook.com> <CABkgnnXvmkMmncE8UdsouOW-NH4x=hu6gcPvY3H43ZRWST58CA@mail.gmail.com>
In-Reply-To: <CABkgnnXvmkMmncE8UdsouOW-NH4x=hu6gcPvY3H43ZRWST58CA@mail.gmail.com>
Accept-Language: en-AU, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=James.H.Manger@team.telstra.com;
x-originating-ip: [203.41.142.244]
x-ms-office365-filtering-correlation-id: 936b3a4f-ef7b-42a0-89df-08d448d5cf30
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:SYXPR01MB1614;
x-microsoft-exchange-diagnostics: 1; SYXPR01MB1614; 7:/uIDugKJeHs7F/fTwJLXLM4deCS34L4zZjg3pfjUsrQgz/+h4FQ9qX8/roYCI5URJarrxlQEk0Nch81WXn0/0xp+C4amdCbmNqZZBEc0gN7lQrM4db+GiTBxCu9WCroJE3cqP7zB2DJkzSTDp2Rf62w4Du7S0qvvdqgw9AUpTGV4LlVuXxncDfXQ7lzX7f7wBMtWlKLSRnKNfoSs7sqMkMb89QpJIx7E48YTL5NqkU53fX80DV5u1gAinpidh9SUzMznB7+cAAw2IW7A0tRLV86HDZep1hpuDv1KnkZZ6Wq/bPGwoopoU7c6ltjQhbsqKdJ2ZuZuRfmpQGbATh72WqllrdNYvv7ldE4qMX1i5hSM0/R1OKrbDFh8Ck2DRLcCl7/qL9vHl3i+XCQWQxv49bKUyuvVxHaVqlLm06cllgUJNL0Zd3kwi7rl6dviAcyYcB1JEgYXWb2jYduZxsmkUw==
x-microsoft-antispam-prvs: <SYXPR01MB16140DCDCB219B95FA780DCEE54B0@SYXPR01MB1614.ausprd01.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6041248)(20161123564025)(20161123562025)(20161123555025)(20161123560025)(6072148); SRVR:SYXPR01MB1614; BCL:0; PCL:0; RULEID:; SRVR:SYXPR01MB1614;
x-forefront-prvs: 0203C93D51
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(39450400003)(189002)(199003)(53936002)(3846002)(2950100002)(3280700002)(42882006)(6916009)(5660300001)(102836003)(105586002)(4326007)(110136003)(2906002)(7696004)(6116002)(106356001)(68736007)(66066001)(86362001)(7736002)(25786008)(74316002)(81156014)(8676002)(81166006)(9686003)(122556002)(189998001)(3660700001)(305945005)(99286003)(54356999)(92566002)(6506006)(55016002)(39060400001)(77096006)(33656002)(2900100001)(6436002)(50986999)(8936002)(76176999)(229853002)(38730400001)(97736004)(101416001); DIR:OUT; SFP:1102; SCL:1; SRVR:SYXPR01MB1614; H:SYXPR01MB1615.ausprd01.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:0; LANG:en;
received-spf: None (protection.outlook.com: team.telstra.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jan 2017 06:04:10.6600 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 49dfc6a3-5fb7-49f4-adea-c54e725bb854
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SYXPR01MB1614
X-OriginatorOrg: team.telstra.com
Received-SPF: none client-ip=203.35.82.208; envelope-from=James.H.Manger@team.telstra.com; helo=ipxcno.tcif.telstra.com.au
X-W3C-Hub-Spam-Status: No, score=-2.1
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, W3C_NW=0.5
X-W3C-Scan-Sig: titan.w3.org 1cY551-0006C5-5B c9c3d1cf588063dfa94747aadbaf572a
X-Original-To: ietf-http-wg@w3.org
Subject: RE: Change to padding in encryption -- enabling random access
Archived-At: <http://www.w3.org/mid/SYXPR01MB1615E583D39EB73552D16287E54B0@SYXPR01MB1615.ausprd01.prod.outlook.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/33394
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

>> How about a flag in the padding delimiter byte that, if set, means there is no padding in earlier records?

> It was always my thought that this sort of signal could be carried out
> of band even more easily.  Indicating to a random access reader that
> padding is always at the end achieves the goal without increasing
> per-record complexity anywhere.

But an out-of-band signal doesn't sound easy. Maybe the distribution of the key (IKM) could say "no padding will ever be used with this key". But that feels fragile, and is per-key not per-message. Other signals from the web server don't help as the point of an encrypted content-encoding was not to have to trust the web server.

Padding is in-band even when the encryptor doesn't want to use any, so an in-band signal that there is no earlier padding doesn't feel like complexity that is out-of-place.

--
James Manger