Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem

Eric Rescorla <ekr@rtfm.com> Mon, 22 September 2014 18:26 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 828311A1BEC for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 22 Sep 2014 11:26:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.065
X-Spam-Level:
X-Spam-Status: No, score=-7.065 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.786, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HAy68AnG8QCb for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 22 Sep 2014 11:26:08 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC6691A1BCD for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 22 Sep 2014 11:26:07 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1XW8Gk-0000JQ-Hp for ietf-http-wg-dist@listhub.w3.org; Mon, 22 Sep 2014 18:23:26 +0000
Resent-Date: Mon, 22 Sep 2014 18:23:26 +0000
Resent-Message-Id: <E1XW8Gk-0000JQ-Hp@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <ekr@rtfm.com>) id 1XW8GQ-0000Gf-Sc for ietf-http-wg@listhub.w3.org; Mon, 22 Sep 2014 18:23:06 +0000
Received: from mail-we0-f175.google.com ([74.125.82.175]) by lisa.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <ekr@rtfm.com>) id 1XW8GK-0001CM-Oi for ietf-http-wg@w3.org; Mon, 22 Sep 2014 18:23:06 +0000
Received: by mail-we0-f175.google.com with SMTP id u57so2552681wes.20 for <ietf-http-wg@w3.org>; Mon, 22 Sep 2014 11:22:33 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=JGo+s0gcO0eUPqXFLoURaPEHyUhR9iBCZNWycct67Dw=; b=Roxi4j9bP1+ldrEUruTobzDLmvnAfdb66j/HJA/+5syPnhaHSuPc5Bx5RpOHChr3M/ rqKB2LZtyXYHo+MBbNXKZO83/snKiziSyR+c3IYy05mtVFEH2B3gC48cGQrNYZhYKPKj YAWv71TT+wugZNLnYXtFfI9PnWa9EA5QHxiLwMs1S5Rx6xOIDzQaaEu+hos5sV43vz0u HU8QqLqDXFQR7s1lccWRjFL528ZBvfrA+gqeg3MKAqr0AB7kUDfMQYphkDgeofqj4gfP xalCBX5WFfDOQCsVW8/KTmjxEWhBf8uXSkkBLzlaNo0x7YwE5D7Rs/G32atHng+zTWgV Tt2w==
X-Gm-Message-State: ALoCoQmtgNAO79kLgYXBRrmT7DcWHdKwJXG57yNlWuw21luZZkV3OUYE9/eOxxRemBmaN1RQ6IQf
X-Received: by 10.194.119.9 with SMTP id kq9mr21839151wjb.25.1411410152957; Mon, 22 Sep 2014 11:22:32 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.27.176.100 with HTTP; Mon, 22 Sep 2014 11:21:52 -0700 (PDT)
In-Reply-To: <B765DC59-BCBB-45C0-B766-C74EB0738CB5@redhat.com>
References: <CAH_y2NF+sP9BmYuD4QbeHpwC_uj67itzaAFCnRVC6f--KDYOgg@mail.gmail.com> <CAOdDvNopynmwvwWLXvuC0q7skunFXcfRoVHe9s7BKcoCwaBgWQ@mail.gmail.com> <CAH_y2NGXz7e3ejqy_rD=39=yYp3+cS1Dm6c3yFEYZg6tsUp5VQ@mail.gmail.com> <CABkgnnWAdm1TLP2XCKNU-6RPACLfooQV73R7Gpoemv+9PNULCA@mail.gmail.com> <CAH_y2NFLjok-NRJtOw1vmSy68sf393iSOgA4K599q0BSBqbNgA@mail.gmail.com> <CABkgnnU-CMtv8KvYU9n+QoPBOBshtQv3RfLy2qw=qVNb2O-qGg@mail.gmail.com> <CAH_y2NHrbH5Objwhq9E89QexhQtND4uOdy8q7OEckTCU17WqKg@mail.gmail.com> <CAH_y2NErRd4rxinSzEH3-uTjdWVkZu9o6sSKSf47LxfPFTRONw@mail.gmail.com> <20140917073241.GA7665@LK-Perkele-VII> <CAFewVt4pxE+9NpzYuzMKGmEdrDXzk50mC99ZbrM6M-uEoKXrHA@mail.gmail.com> <CAH_y2NGYcDvPcxDvaTRBP3p4Pnb7gw39WUDY3bNVnOGQjBgciQ@mail.gmail.com> <CAFewVt7+UAJYfKAR6DRZi_mqdzSaYw6L-pT1qg=UyOaP1ojhTw@mail.gmail.com> <CAH_y2NEhAEaPiUgi_vX6Oimw+Y-k3WrnL0gJZKPxQ8KZVuFVfw@mail.gmail.com> <CABkgnnU6C+TzJzdeQZhwXucuPUrPh1yyp1cpRd9jSePMjAnONQ@mail.gmail.com> <CAH_y2NH=skUXk0QwCs4uVqWE=iOLhi5K+kvARDUQ7uMeogrw9A@mail.gmail.com> <CABcZeBPvQfkqnPkfzY53RVAHNw0govmp8p8obvp99w8zs4=RKw@mail.gmail.com> <D7B49F55-663F-4005-AD06-7E4057491608@redhat.com> <CABcZeBO8R9NLcwsNNKqPVZexw3duTe5Crneke8T1DOzs4wmBWg@mail.gmail.com> <B765DC59-BCBB-45C0-B766-C74EB0738CB5@redhat.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 22 Sep 2014 11:21:52 -0700
Message-ID: <CABcZeBMogV=+s0Uud7TvK1WrdVn-k-Bp=yLu49wzpSXiM2XwZg@mail.gmail.com>
To: Jason Greene <jason.greene@redhat.com>
Cc: Greg Wilkins <gregw@intalio.com>, Patrick McManus <pmcmanus@mozilla.com>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="089e0118451eccb30f0503ab8816"
Received-SPF: none client-ip=74.125.82.175; envelope-from=ekr@rtfm.com; helo=mail-we0-f175.google.com
X-W3C-Hub-Spam-Status: No, score=-3.1
X-W3C-Hub-Spam-Report: AWL=-2.418, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7
X-W3C-Scan-Sig: lisa.w3.org 1XW8GK-0001CM-Oi 89128e522786b4bad2a0ab093b7bf1b0
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem
Archived-At: <http://www.w3.org/mid/CABcZeBMogV=+s0Uud7TvK1WrdVn-k-Bp=yLu49wzpSXiM2XwZg@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/27149
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Mon, Sep 22, 2014 at 10:44 AM, Jason Greene <jason.greene@redhat.com>
wrote:

>
> On Sep 22, 2014, at 12:29 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>
> >
> >
> > On Mon, Sep 22, 2014 at 9:41 AM, Jason Greene <jason.greene@redhat.com>
> wrote:
> >
> > On Sep 22, 2014, at 11:18 AM, Eric Rescorla <ekr@rtfm.com> wrote:
> >
> > >
> > > I don't actually think this is that important an issue either. As I
> understood the discussion
> > > in Zurich, the new TLS limitations were directed towards pulling users
> of HTTP2 towards
> > > modern algorithms. However, algorithms which have serious weaknesses
> should probably
> > > be deprecated in all versions of HTTP (as with
> https://tools.ietf.org/html/draft-ietf-tls-prohibiting-rc4-00)
> > >
> > > Say we decided that in future we preferred Aero (
> https://tools.ietf.org/html/draft-mcgrew-aero-01)
> > > to AEAD constructions. That seems like something we could roll out in
> HTTP3 but wouldn't
> > > be appropriate to retroactively apply to TLS 1.2 unless there was
> something seriously wrong
> > > with AEAD (and then see above).
> >
> > I think this hypothetical actually counters your point. Every rev of the
> HTTP spec introduces interop cost, therefore having to rev the protocol
> just because TLS needs to rev is unnecessary cost.
> >
> > I think we're talking past each other here. There are two major cases:
> >
> > - We're kind of sad that people use algorithm X and we wish they would
> >    do something more modern.
> > - There is something seriously wrong with algorithm X and people need
> >   transition off it pronto.
> >
> > In the former case, we have pretty limited options, since it's probably
> not
> > worth breaking interop over. So, we can do nothing or we can gradually
> > tell people to upgrade at preexisting protocol upgrade points. I.e., we
> > wouldn't roll out HTTP3 to do this, we'd just do it when we were already
> > rolling out HTTP3 (the same way as 9.2.2 is now). in the second case,
> > we would want to adjust all versions of HTTP so no new rev would be
> > required.
>
> Ok but then if you wait on HTTP/3, 9.2.2 then precludes your ability to
> select a more modern cipher category like the Aero example. So it doesn’t
> seem to really meet the former case, and it certainly doesn’t meet the
> latter.


I don't think that's true. 9.2.2 doesn't say you can't do non-AEAD. It says
that you can't do stream or block. Rather:

"Clients MUST accept DHE sizes of up to 4096 bits. HTTP MUST NOT be used
with cipher suites that use stream or block ciphers. Authenticated
Encryption with Additional Data (AEAD) modes, such as the Galois Counter
Model (GCM) mode for AES <http://http2.github.io/http2-spec/#RFC5288>
[RFC5288] are acceptable."

I would assume that any new cipher spec would come with a "this is OK for
HTTP2" bit (or not). So I don't see the interop problem.

-Ekr