Re: The use of binary data in any part of HTTP 2.0 is not good

Mark Nottingham <mnot@mnot.net> Mon, 21 January 2013 00:51 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B66B21F842B for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 20 Jan 2013 16:51:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.8
X-Spam-Level:
X-Spam-Status: No, score=-7.8 tagged_above=-999 required=5 tests=[AWL=-0.100, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id saLGR-dSg50z for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 20 Jan 2013 16:51:16 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id 4998221F8427 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 20 Jan 2013 16:51:16 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Tx5as-0007sc-4h for ietf-http-wg-dist@listhub.w3.org; Mon, 21 Jan 2013 00:50:34 +0000
Resent-Date: Mon, 21 Jan 2013 00:50:34 +0000
Resent-Message-Id: <E1Tx5as-0007sc-4h@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <mnot@mnot.net>) id 1Tx5an-0007rx-Nj for ietf-http-wg@listhub.w3.org; Mon, 21 Jan 2013 00:50:29 +0000
Received: from mxout-07.mxes.net ([216.86.168.182]) by maggie.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <mnot@mnot.net>) id 1Tx5am-0002Zt-St for ietf-http-wg@w3.org; Mon, 21 Jan 2013 00:50:29 +0000
Received: from mnot-mini.mnot.net (unknown [118.209.240.13]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 66DFE22E1F4; Sun, 20 Jan 2013 19:50:05 -0500 (EST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: Mark Nottingham <mnot@mnot.net>
In-Reply-To: <CAA4WUYhxHbFeaw-M=DUdKKKafhdDE4U5==N2QGY2hd_ptxSHiA@mail.gmail.com>
Date: Mon, 21 Jan 2013 11:50:01 +1100
Cc: "Adrien W. de Croy" <adrien@qbik.com>, Pablo <paa.listas@gmail.com>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <B2A83604-183E-49BF-A962-238AF5F19DA9@mnot.net>
References: <em670f0a0f-3c5a-4f99-88cb-03bd4234ce63@bombed> <7F8E363D-6D6E-4FDD-B8EA-24A31383B1A3@mnot.net> <CAA4WUYiPRpm0OWesf5wTGLX--HWtDmgjFr+wSEEVr-beH8J=qw@mail.gmail.com> <3EFE45C2-8147-432C-8D15-7E8C5AEC39DC@mnot.net> <CAA4WUYhxHbFeaw-M=DUdKKKafhdDE4U5==N2QGY2hd_ptxSHiA@mail.gmail.com>
To: "William Chan (陈智昌)" <willchan@chromium.org>
X-Mailer: Apple Mail (2.1499)
Received-SPF: pass client-ip=216.86.168.182; envelope-from=mnot@mnot.net; helo=mxout-07.mxes.net
X-W3C-Hub-Spam-Status: No, score=-4.2
X-W3C-Hub-Spam-Report: AWL=-2.309, BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001
X-W3C-Scan-Sig: maggie.w3.org 1Tx5am-0002Zt-St 461bfe9a7fce01fa2e25f666439a1866
X-Original-To: ietf-http-wg@w3.org
Subject: Re: The use of binary data in any part of HTTP 2.0 is not good
Archived-At: <http://www.w3.org/mid/B2A83604-183E-49BF-A962-238AF5F19DA9@mnot.net>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/16070
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 21/01/2013, at 11:41 AM, William Chan (陈智昌) <willchan@chromium.org> wrote:

> Many times these intermediaries / 3rd party software are trying to do
> "legitimate" things like sniffing headers so they can do filtering
> based on that. If we add a sender-configured option to enable
> disabling header encoding/compression at the client, it's very likely
> that 3rd party software will take advantage of that option for popular
> client software (popular browsers). Thus, even if such an option
> existed in the spec, I would be nervous about exposing it within
> Chromium in such a way that 3rd party software could force it on.

Roberto mentioned that the sender could just choose not to compress their output; how would you stop that?


> And if such a mechanism existed sender-side, I still don't see what
> (beyond a secured transport like TLS) prevents an ISP or corporate
> network administrator who has filtering software he/she wants to run
> from adding a hop that enables this debug option to make it easier to
> pass through to 3rd party authored filtering software running within
> the ISP / corporate network.
> 
> My concerns are admittedly erring on the side of paranoia, but it is
> definitely advised by our (Google Chrome) previous experience in this
> area. Please see
> https://developers.google.com/speed/articles/use-compression where we
> provide data on the prevalence of the aforementioned Accept-Encoding
> stripping issue. "There are a handful of ISPs, where the percentage of
> uncompressed content is over 95%. One likely hypothesis is that either
> an ISP or a corporate proxy removes or mangles the Accept-Encoding
> header." Accept-Encoding is a sender-side controlled header, so unless
> the proposed option is protected somehow via TLS or something, I would
> imagine that it likewise would expose us to the issue we've seen with
> Accept-Encoding stripping.

Again, this isn't negotiation (as currently discussed); it's the sender choosing not to compress.

Even if it were a negotiation, I suspect you'd find that the dynamics that you saw in play with compressing payloads doesn't play out the same way as it does with headers. Intermediaries strip accept-encoding because decompressing and recompressing the response bodies coming through them presents a scalability challenge; if we do our job right with header compression, it shouldn't be nearly as much of a problem for them.

Besides which, if we design HTTP/2 to be unpalatable to middleboxes, they'll merely block it and force all traffic to HTTP/1, meaning that those users won't see *any* benefits from the new protocol.


> All options are ripe for abuse. We should be very careful to make sure
> the option is truly necessary, rather than just potentially useful, in
> order to counterbalance the downside of possible abuse.

To counter that -- I'm somewhat wary of approaching protocol design as an exercise in controlling how the result is used; people *will* work around your intent. While we can do some social engineering in this process, it's very soft, and very limited, power.

Cheers,

--
Mark Nottingham   http://www.mnot.net/