Re: last call Feedback for Opportunistic Security for HTTP (Experimental)

Kari hurtta <hurtta-ietf@elmme-mailer.org> Thu, 08 September 2016 17:22 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E3A012B1FE for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 8 Sep 2016 10:22:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.429
X-Spam-Level:
X-Spam-Status: No, score=-8.429 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.508, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O1gXEPEto6l9 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 8 Sep 2016 10:22:06 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70191128E19 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 8 Sep 2016 10:22:06 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1bi2ws-00016G-1G for ietf-http-wg-dist@listhub.w3.org; Thu, 08 Sep 2016 17:17:14 +0000
Resent-Date: Thu, 08 Sep 2016 17:17:14 +0000
Resent-Message-Id: <E1bi2ws-00016G-1G@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <khurtta@welho.com>) id 1bi2wf-000149-JD for ietf-http-wg@listhub.w3.org; Thu, 08 Sep 2016 17:17:01 +0000
Received: from welho-filter1.welho.com ([83.102.41.23]) by maggie.w3.org with esmtp (Exim 4.80) (envelope-from <khurtta@welho.com>) id 1bi2wd-0000lk-Kh for ietf-http-wg@w3.org; Thu, 08 Sep 2016 17:17:01 +0000
Received: from localhost (localhost [127.0.0.1]) by welho-filter1.welho.com (Postfix) with ESMTP id 5C306F88C; Thu, 8 Sep 2016 20:16:31 +0300 (EEST)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp3.welho.com ([IPv6:::ffff:83.102.41.86]) by localhost (welho-filter1.welho.com [::ffff:83.102.41.23]) (amavisd-new, port 10024) with ESMTP id hntrlhCB9K1g; Thu, 8 Sep 2016 20:16:31 +0300 (EEST)
Received: from hurtta09lk.keh.iki.fi (89-27-35-245.bb.dnainternet.fi [89.27.35.245]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by welho-smtp3.welho.com (Postfix) with ESMTPS id E41D32315; Thu, 8 Sep 2016 20:16:30 +0300 (EEST)
In-Reply-To: <CAOdDvNrxjKNHzgxqZnD6A2q+0j9XzPyE77rMv4GsVyw5rwfSvw@mail.gmail.com>
References: <CAOdDvNrxjKNHzgxqZnD6A2q+0j9XzPyE77rMv4GsVyw5rwfSvw@mail.gmail.com>
To: HTTP working group mailing list <ietf-http-wg@w3.org>
Date: Thu, 08 Sep 2016 20:16:30 +0300
Sender: hurtta@hurtta09lk.keh.iki.fi
From: Kari hurtta <hurtta-ietf@elmme-mailer.org>
CC: Kari hurtta <hurtta-ietf@elmme-mailer.org>
X-Mailer: ELM [version ME+ 2.5 PLalpha41]
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20160908171631.5C306F88C@welho-filter1.welho.com>
Received-SPF: none client-ip=83.102.41.23; envelope-from=khurtta@welho.com; helo=welho-filter1.welho.com
X-W3C-Hub-Spam-Status: No, score=-5.2
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-1.269, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1bi2wd-0000lk-Kh c0dfdc653e4371779f9e16efc8577196
X-Original-To: ietf-http-wg@w3.org
Subject: Re: last call Feedback for Opportunistic Security for HTTP (Experimental)
Archived-At: <http://www.w3.org/mid/20160908171631.5C306F88C@welho-filter1.welho.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/32389
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

https://lists.w3.org/Archives/Public/ietf-http-wg/2016JulSep/0570.html

> The .wk, even absent tls-commit, brings with it a couple properties that
> have been argued for here in the past. Erik (and maybe Kari? Sorry for not
> looking it up) made strong cases that in the case of http:// over tls the
> alternate needs a stronger opt in than TLS auth provides in order to
> confirm that it is an alternate for a specific origin (including especially
> the scheme). I think the concern is that if a host does indeed have a cert
> for foo.example.com on port 443 (deployed to serve https) but that doesn't
> mean it wants to see requests for http://foo.example.com there..

I did not wrote about this (I think), but I agree.

> fwiw I agree that 7838 allows http over TLS with auth. But if we feel there
> is a stronger way to do that with concerns that are specific to the http://
> scheme, there's nothing wrong with defining that - especially if that's
> what is implemented.

It make sense that client want see 

GET /.well-known/http-opportunistic HTTP/1.1
Host: www.example.com

HTTP/1.1 200 OK
Content-Type: application/json
Connection: close

{
  "http://www.example.com": {
     "lifetime": 86400
  }
}

on alternative service to indicate that this port is meant for 
http:// scheme.

Otherwise valid certificate may be just for https:// scheme.

And

GET /.well-known/http-opportunistic HTTP/1.1
Host: www.example.com

HTTP/1.1 200 OK
Content-Type: application/json
Connection: close

{
  "http://www.example.com": {
     "lifetime": 86400,
     "mixed-scheme": true
  }
} 

is stronger case for that.


Client may require other indications
than just these what RFC 7838
"HTTP Alternative Services" says.

Mentioning that possibility on
/.well-known/http-opportunistic
specification makes sense.


https://lists.w3.org/Archives/Public/ietf-http-wg/2016JulSep/0566.html

> 1] opportunistic security should require TLS authentication. 

I have not yet strong preference here.

If TLS authentication is required, then
seems that "tls-port" can be get rid of.

Client of course can require TLS authentication
always.


> 3] get rid of tls-commit (i.e. the latch to opp sec) as this plays very
> poorly with alt-svc.

Make sense.


I also had on my last comments some notes about that lifetime
of commitment (unclear specification)

https://lists.w3.org/Archives/Public/ietf-http-wg/2016JulSep/0087.html
https://lists.w3.org/Archives/Public/ietf-http-wg/2016JulSep/0008.html
https://lists.w3.org/Archives/Public/ietf-http-wg/2016AprJun/0431.html

I also noted that "tls-commit" does not require 
/.well-known/http-opportunistic on alternative service.

https://lists.w3.org/Archives/Public/ietf-http-wg/2016AprJun/0409.html


I agree to get rid of "tls-commit" for simplify.


=====

So /.well-known/http-opportunistic becomes
to check that TLS port is meant for http -scheme
(and perhaps that origin and alternative service
 both gives same /.well-known/http-opportunistic ).

/ Kari Hurtta