Re: Fwd: New Version Notification for draft-snell-httpbis-keynego-01.txt

Stephen Farrell <stephen.farrell@cs.tcd.ie> Sat, 23 November 2013 21:52 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64AFE1AE2B8 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 23 Nov 2013 13:52:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.427
X-Spam-Level:
X-Spam-Status: No, score=-7.427 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.525, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0rm54pB1bWq6 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sat, 23 Nov 2013 13:52:09 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id 920B81AE270 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sat, 23 Nov 2013 13:52:09 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1VkL6F-00005D-3M for ietf-http-wg-dist@listhub.w3.org; Sat, 23 Nov 2013 21:50:47 +0000
Resent-Date: Sat, 23 Nov 2013 21:50:47 +0000
Resent-Message-Id: <E1VkL6F-00005D-3M@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <stephen.farrell@cs.tcd.ie>) id 1VkL5z-0008W6-HB for ietf-http-wg@listhub.w3.org; Sat, 23 Nov 2013 21:50:31 +0000
Received: from mercury.scss.tcd.ie ([134.226.56.6]) by maggie.w3.org with esmtp (Exim 4.72) (envelope-from <stephen.farrell@cs.tcd.ie>) id 1VkL5x-00041W-ID for ietf-http-wg@w3.org; Sat, 23 Nov 2013 21:50:31 +0000
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id C174BBE57; Sat, 23 Nov 2013 21:50:06 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A1LUQ1cF-cTC; Sat, 23 Nov 2013 21:50:05 +0000 (GMT)
Received: from [10.87.48.12] (unknown [86.45.52.84]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id C5D98BE54; Sat, 23 Nov 2013 21:50:04 +0000 (GMT)
Message-ID: <5291230C.8090701@cs.tcd.ie>
Date: Sat, 23 Nov 2013 21:50:04 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: James M Snell <jasnell@gmail.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
References: <20131119210801.12883.32414.idtracker@ietfa.amsl.com> <CABP7RbcERk-geVL5p_Bcsp7ameHH-JgNq0asCVbbbaw4wC9haQ@mail.gmail.com>
In-Reply-To: <CABP7RbcERk-geVL5p_Bcsp7ameHH-JgNq0asCVbbbaw4wC9haQ@mail.gmail.com>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Received-SPF: none client-ip=134.226.56.6; envelope-from=stephen.farrell@cs.tcd.ie; helo=mercury.scss.tcd.ie
X-W3C-Hub-Spam-Status: No, score=-3.7
X-W3C-Hub-Spam-Report: AWL=-3.176, RP_MATCHES_RCVD=-0.548
X-W3C-Scan-Sig: maggie.w3.org 1VkL5x-00041W-ID fdf25619d12a43285689b033344787cd
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Fwd: New Version Notification for draft-snell-httpbis-keynego-01.txt
Archived-At: <http://www.w3.org/mid/5291230C.8090701@cs.tcd.ie>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/21147
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

So I finally had a chance to read this draft.

I think the ideas are interesting, and it'd be good if HTTP/2.0
was extensible so that future work in this direction could be
explored. Perhaps if the WG do work on supporting proxies, then
room for this as an extension to that could be found.

However, today, this is nowhere near ready to be put up as an
alternative to TLS in any respect. Its not even in the ballpark.

I figure by the time this got properly worked out, (in maybe a
year or more) it'd be very like GSS-API without the API, but
probably as complex. Now that might be interesting actually and
maybe we could do GSS-API context token handling better this
time around. Or maybe we wouldn't.

I'm also quite unsure how the server side of this would work.
With whom would the browser be negotiating? The web server or
some web application? That wasn't clear to me and might make
a big difference in terms of trust models, how the web-origin
plays into the game and in terms of the liklihood of server
side deployment happening.

The "algorithm" header field seems to have the same benefits
and pitfalls as TLS ciphersuites, but goes beyond that to also
codify the handshake protocol and the security framing. I think
I kinda like that, and would go further and let that also
determine if some header-field values are also input to the
security framing. (E.g. the web-origin could be input to any
MAC calculation for some "algorithm" header field values.)
There's fun to be had there.

The security properties of the framing are not even defined yet.
I guess it'd be something like ESP or the TLS application data
protocol, but the algorithm thing above means that those can
vary by algorithm. I'm not sure if that's a good plan since it'd
mean that you have to understand each algorithm to understand
the security properties of payloads. In other words, there could
be value in flexibility in terms of how you negotiate a session
key, but not in the security framing for payloads. One to

Anyway, I do think this might be an interesting near-term
research thing to try play with and if the WG's solution for
better proxy support looked a bit like this, then that would
be good since it'd allow future experimentation along these
lines.

But this just ain't a replacement for TLS.

IMO the WG should do what folks in Vancouver said: get more TLS
used in HTTP/2.0. I'd prefer that be done via the http:// URI
sent on top of opportunistic TLS plan with no new user i/f, but
would also be ok (while a bit skeptical) with the plan Mark
proposed last week to get more server-auth TLS. I do think
either would be better done as an integral part of the spec.

Cheers,
S.

PS: I hope I don't re-ignite the browser/proxy/tls battle
again. Maybe if I say "VP8 or H.264?" that'll distract those
who like such arguments;-)

On 11/19/2013 09:13 PM, James M Snell wrote:
> At Mark's urging, I've posted a significantly updated draft of the
> "in-session key negotiation" draft that I had published last year.
> Please treat this as purely experimental at this point. I am not
> pushing this as a proposal just yet, just offering it up as one
> possible approach to providing message-level security as opposed to
> transport-level security. What this proposal does, in effect, is make
> it possible to negotiate and use cryptographic keys from *inside* an
> HTTP/2 connection as opposed to the TLS approach. A key benefit of
> this approach is that it allows peers to establish secure
> communication even over potentially insecure transports. Of course,
> it's not a perfect solution.
> 
> As always, feedback is welcomed and requested.
> 
> - James
> 
> 
> ---------- Forwarded message ----------
> From:  <internet-drafts@ietf.org>
> Date: Tue, Nov 19, 2013 at 1:08 PM
> Subject: New Version Notification for draft-snell-httpbis-keynego-01.txt
> To: "James M. Snell" <jasnell@gmail.com>
> 
> 
> 
> A new version of I-D, draft-snell-httpbis-keynego-01.txt
> has been successfully submitted by James M Snell and posted to the
> IETF repository.
> 
> Filename:        draft-snell-httpbis-keynego
> Revision:        01
> Title:           HTTP/2.0 Intra-Connection Negotiation
> Creation date:   2013-11-19
> Group:           Individual Submission
> Number of pages: 6
> URL:
> http://www.ietf.org/internet-drafts/draft-snell-httpbis-keynego-01.txt
> Status:          http://datatracker.ietf.org/doc/draft-snell-httpbis-keynego
> Htmlized:        http://tools.ietf.org/html/draft-snell-httpbis-keynego-01
> Diff:            http://www.ietf.org/rfcdiff?url2=draft-snell-httpbis-keynego-01
> 
> Abstract:
>    This memo describes a proposed modification to HTTP/2.0 that
>    introduces the concepts of Intra-Connection Negotiation and Secure
>    Framing.
> 
> 
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> The IETF Secretariat
> 
>