Re: 2 questions
Cory Benfield <cory@lukasa.co.uk> Mon, 30 March 2015 08:30 UTC
Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16A741A923D for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 30 Mar 2015 01:30:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.89
X-Spam-Level:
X-Spam-Status: No, score=-4.89 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mj-OPASmtTfH for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 30 Mar 2015 01:29:58 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B22461A9235 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 30 Mar 2015 01:29:58 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1YcV2Q-0003hb-Fe for ietf-http-wg-dist@listhub.w3.org; Mon, 30 Mar 2015 08:27:14 +0000
Resent-Date: Mon, 30 Mar 2015 08:27:14 +0000
Resent-Message-Id: <E1YcV2Q-0003hb-Fe@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.80) (envelope-from <cory@lukasa.co.uk>) id 1YcV2G-0003g1-NQ for ietf-http-wg@listhub.w3.org; Mon, 30 Mar 2015 08:27:04 +0000
Received: from mail-ob0-f178.google.com ([209.85.214.178]) by lisa.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <cory@lukasa.co.uk>) id 1YcV25-0007gV-RR for ietf-http-wg@w3.org; Mon, 30 Mar 2015 08:27:04 +0000
Received: by obbps3 with SMTP id ps3so2119429obb.3 for <ietf-http-wg@w3.org>; Mon, 30 Mar 2015 01:26:27 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=ceKo8s8rzJHGEcVcsYCWMSaLTXZ/dI/wPeuTE3aypmE=; b=kS6E6yijwA/z0iaV6nqz5aUv01ykw/8/uFSYe75SR8oahRZeLDLmEXqwfxPEN0O8SG aVsRjQQEk0+OW+L+LLi46N0m358hIsj4SqYzZmNne9aEKMkRIjH8Ljy01zwAZjOaZhkT EQ+pAvlphO4gQyv/noRjMaMJV0+Z1A7Rt9/uMB86Zr5gKJnblaSnGVijyGsmdphyL5KA 8cESZ/eD+nm7yul1QLmuIotAOA3EaoPSAKod3O+DJZc52lBg0YG4wKKk9Q3qasXLVzRu iB3HuLuEmaxQPWKUyRzrJc6WTHMddmxG5CTnTTEtQXS4L/F3I/pf7Z2cILz3+nZkmIqq BY7w==
X-Gm-Message-State: ALoCoQlnnhTQyLwJ0gIpeFdwjsfH+ZttwsdBKfatklj7bsKHQ7UZYhJZxRCxhRcsWnOgrD5mZH4o
MIME-Version: 1.0
X-Received: by 10.182.94.212 with SMTP id de20mr25798995obb.84.1427703987456; Mon, 30 Mar 2015 01:26:27 -0700 (PDT)
Received: by 10.202.90.131 with HTTP; Mon, 30 Mar 2015 01:26:27 -0700 (PDT)
X-Originating-IP: [2620:104:4001:73:29d0:6728:10ab:7293]
In-Reply-To: <em0a95d842-8dd6-4f76-b091-f920acfe1977@bodybag>
References: <AA96E87A-E451-4598-8FE8-33D259E9484A@gmail.com> <em0a95d842-8dd6-4f76-b091-f920acfe1977@bodybag>
Date: Mon, 30 Mar 2015 09:26:27 +0100
Message-ID: <CAH_hAJHreb974bdJY7UEgdf4E2QOKNNtqHE2aXC7Snx3wRNjew@mail.gmail.com>
From: Cory Benfield <cory@lukasa.co.uk>
To: Adrien de Croy <adrien@qbik.com>
Cc: Yoav Nir <ynir.ietf@gmail.com>, Glen <glen.84@gmail.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=209.85.214.178; envelope-from=cory@lukasa.co.uk; helo=mail-ob0-f178.google.com
X-W3C-Hub-Spam-Status: No, score=-5.3
X-W3C-Hub-Spam-Report: AWL=-0.675, BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: lisa.w3.org 1YcV25-0007gV-RR 6da06ef1728a8edce30976e13866fc91
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 2 questions
Archived-At: <http://www.w3.org/mid/CAH_hAJHreb974bdJY7UEgdf4E2QOKNNtqHE2aXC7Snx3wRNjew@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/29067
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
On 30 March 2015 at 04:15, Adrien de Croy <adrien@qbik.com> wrote: > > I can buy that 1/3 of web requests use TLS. > > however that does not apply to 1/3 of web sites using TLS. Probably just FB > and google alone account for 1/3 of web requests. > > There are surely hundreds of millions of sites. That's at least tens of > millions of administrators who will need to take on the burden of making TLS > work on their site. Many will not see any point in this. Pretty much all > the sites that felt a need to deploy TLS will have already done so, and the > others will not thank the IETF or google or the chromium project for > attempting to force costs on them. No-one is being *forced* to do anything. HTTP/1.1 is not going away. If you dig back through the archives of this working group you'll repeatedly find statements from almost all camps that HTTP/1.1 will be around for the foreseeable future. Website owners that cannot set up TLS will still find plenty of support for plaintext HTTP. In this case I think Google and Firefox are probably right: HTTP/2 in plaintext is likely to break frequently and mysteriously. This is mostly because of intermediaries that believe they understand HTTP, but don't do it very well (HAProxy is a good example I can think off of the top of my head). These intermediaries are usually transparent to HTTP/1.1 users, but they will likely break HTTP/2 traffic over port 80. Chrome and Firefox are therefore acting in the interest of both users and operators when they forbid this kind of traffic. They're saving your users from thinking your website is broken because their ISP deployed some terrible intermediate 'service' that mangles HTTP/2 (consider Comcast's injection of HTTP headers, for example). At this point in time, my HTTP/2 implementation does not support plaintext HTTP/2. I will add support for it in the next few weeks, but I do not expect it to work in the vast majority of cases, and will be emitting warning logs to that effect.
- 2 questions Glen
- Re: 2 questions Yoav Nir
- Re: 2 questions Cory Benfield
- Re: 2 questions Constantine A. Murenin
- Re: 2 questions Matthew Kerwin
- Re: 2 questions Walter H.
- Re: 2 questions Walter H.
- RE: 2 questions Mike Bishop
- Re: 2 questions Adrien de Croy
- Re: 2 questions Cory Benfield
- Re: 2 questions Amos Jeffries
- Re: 2 questions Amos Jeffries
- Re: 2 questions Cory Benfield
- Re: 2 questions Adrien de Croy
- Re: 2 questions Yoav Nir
- Re: 2 questions Roland Zink
- Re: 2 questions Martin Thomson
- Re: 2 questions Walter H.
- Re: 2 questions Walter H.
- Re: [Moderator Action] 2 questions Glen
- Re: 2 questions Dan Anderson
- Re: 2 questions Adrien de Croy
- RE: 2 questions Xiaoyin Liu
- Re: 2 questions Adrien de Croy
- Re: 2 questions Stephen Farrell
- comprehensive TLS is not the solution, it's a bug… Walter H.
- Re: comprehensive TLS is not the solution, it's a… Walter H.
- Re: 2 questions Eric J. Bowman
- Re: comprehensive TLS is not the solution, it's a… Amos Jeffries
- Re: comprehensive TLS is not the solution, it's a… Willy Tarreau
- Re: comprehensive TLS is not the solution, it's a… Walter H.
- Re: comprehensive TLS is not the solution, it's a… Walter H.
- Re: comprehensive TLS is not the solution, it's a… Willy Tarreau
- Re: comprehensive TLS is not the solution, it's a… Maxthon Chan
- Re: comprehensive TLS is not the solution, it's a… Roberto Peon
- Re: comprehensive TLS is not the solution, it's a… Walter H.
- Re: comprehensive TLS is not the solution, it's a… Maxthon Chan
- Re: comprehensive TLS is not the solution, it's a… Willy Tarreau
- Re: comprehensive TLS is not the solution, it's a… Maxthon Chan
- Re: 2 questions Adrien de Croy
- Re: 2 questions Stephen Farrell
- Re: comprehensive TLS is not the solution, it's a… Matthew Kerwin
- Re: comprehensive TLS is not the solution, it's a… Maxthon Chan
- Re: 2 questions Maxthon Chan
- RE: comprehensive TLS is not the solution, it's a… Mike Bishop
- Re: 2 questions Poul-Henning Kamp
- Re: comprehensive TLS is not the solution, it's a… ChanMaxthon
- Re: 2 questions Stephen Farrell
- Re: 2 questions Poul-Henning Kamp
- Re: 2 questions Stephen Farrell
- Re: comprehensive TLS is not the solution, it's a… Amos Jeffries
- Re: comprehensive TLS is not the solution, it's a… Amos Jeffries
- Re: 2 questions ChanMaxthon
- Re: 2 questions Amos Jeffries
- Re: 2 questions Yoav Nir
- Re: 2 questions Poul-Henning Kamp
- Re: 2 questions Maxthon Chan
- Re: 2 questions Simpson, Robby (GE Energy Management)
- Re: 2 questions Ted Hardie
- Re: 2 questions Jason T. Greene
- Re: 2 questions Benjamin Carlyle
- Re: 2 questions Martin Thomson
- Re: 2 questions OSCAR GONZALEZ DE DIOS
- Re: 2 questions Martin Thomson
- Re: 2 questions ChanMaxthon
- Re: 2 questions Glen
- Re: 2 questions Roland Zink
- Re: 2 questions Ilari Liusvaara
- Re: 2 questions Glen
- Re: 2 questions Jim Manico
- Re: 2 questions Yoav Nir
- Re: 2 questions Glen
- Re: 2 questions Glen
- Re: 2 questions Jim Manico
- Re: 2 questions Amos Jeffries
- Re: 2 questions Maxthon Chan
- Re: 2 questions Glen
- Re: 2 questions Glen
- Re: 2 questions Ilari Liusvaara
- Re: 2 questions Amos Jeffries
- Re: 2 questions Martin Thomson
- Re: 2 questions Yoav Nir
- Re: 2 questions Martin Thomson