Re: 2.2. Interaction with "https" URIs | Re: Op-sec simplification

Martin Thomson <martin.thomson@gmail.com> Wed, 02 November 2016 06:18 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 021511294BD for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 1 Nov 2016 23:18:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.998
X-Spam-Level:
X-Spam-Status: No, score=-7.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-1.497, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5WOO40Q663_5 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 1 Nov 2016 23:18:25 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B144F1293F2 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 1 Nov 2016 23:18:25 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1c1ooS-000142-LW for ietf-http-wg-dist@listhub.w3.org; Wed, 02 Nov 2016 06:14:16 +0000
Resent-Date: Wed, 02 Nov 2016 06:14:16 +0000
Resent-Message-Id: <E1c1ooS-000142-LW@frink.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <martin.thomson@gmail.com>) id 1c1ooM-00013D-LL for ietf-http-wg@listhub.w3.org; Wed, 02 Nov 2016 06:14:10 +0000
Received: from mail-qk0-f170.google.com ([209.85.220.170]) by titan.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <martin.thomson@gmail.com>) id 1c1ooG-000506-P4 for ietf-http-wg@w3.org; Wed, 02 Nov 2016 06:14:05 +0000
Received: by mail-qk0-f170.google.com with SMTP id o68so6788521qkf.3 for <ietf-http-wg@w3.org>; Tue, 01 Nov 2016 23:13:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=vl3/PoJwzNJblHESiW1PSU/Tsya2CJK1maz4E5Ta74U=; b=O1crfpvfvzahrSP3P40bB4bCrY+5Wt5BaVDVvzVmLFayj6sASPRa13IWOiz+mdgoUP 5237+eUsSv4hyTgDIdELLEOy8QQjrQb7UXlnV+Eq07EOBI5/TEgGu9uvkVeFJWyVi5S3 fFZCWeZzey9AnEfAOfuXOge06ufhY3fxZgp+ZF4cMGDg0GOcwY1Jf5QD1f0w2qGnnvbQ N3g6Obz8wjgRBW+dUUzkZ4nY3IghPfxQ7yJw6KO0ESn9THrCP01Z6JaIxOcw8Dyn+ZNr iwuFEU5oINNvBJ7OIrLLkd5OPMMFDQ4VYlhNH6HGy1en2AeD64NXOXv/XHVEFCRVrrY9 qGzw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=vl3/PoJwzNJblHESiW1PSU/Tsya2CJK1maz4E5Ta74U=; b=lC6ybAhy9K1UucKHHRsh1WXfHTweiiSpF6k/t/LRQkRWEwqtk5KSSu8AbtgpnJt1P2 5O9110/m3paL6kbpiEKBnMnG64yFAyx0r31cOPuMfu2I0rSwRuq3hSIvA32vSTYBGDs1 GwGsr4P5k9xmvzbpA4EpFbaFgHljtkaWQ3e37RXVBR4GHgTcLvPiahykNRb0sMgnHP9M Se6necIrs+VJk20gvgXUxtI2Wn+yLBHL8vF0f/NjiQ1jm5smtVOLaOltoIHOEqjARwk2 bZRGFTDzYLJUto6QzuZXYRRWkpzpmBAJ0HGJBa2pwz7M4XV8G/OyMHxSBCBCeTTjf3dm JEpg==
X-Gm-Message-State: ABUngvcw68DpOVCJ681wl2pbYnq3/V1w3zT4q5pMNef3OpHQOaPl0LstKLcMxlOryDGFQD1Fzv+fy3WayZ58Kg==
X-Received: by 10.55.99.141 with SMTP id x135mr1538458qkb.147.1478067218606; Tue, 01 Nov 2016 23:13:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.140.85.7 with HTTP; Tue, 1 Nov 2016 23:13:38 -0700 (PDT)
In-Reply-To: <201611020548.uA25m4Wm026906@shell.siilo.fmi.fi>
References: <20161031053239.E9C6D12F5D@welho-filter3.welho.com> <20161101172202.BE19F12310@welho-filter1.welho.com> <CABkgnnWhcp_tVx9M9FTOdSF-U5EoAzdNNVZaYzjdxUGhHydX7w@mail.gmail.com> <201611020548.uA25m4Wm026906@shell.siilo.fmi.fi>
From: Martin Thomson <martin.thomson@gmail.com>
Date: Wed, 02 Nov 2016 17:13:38 +1100
Message-ID: <CABkgnnUL+AJEi=92K95f22vrx17Rmm0j1rEahhwu-my3DPcEwA@mail.gmail.com>
To: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
Cc: HTTP working group mailing list <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=209.85.220.170; envelope-from=martin.thomson@gmail.com; helo=mail-qk0-f170.google.com
X-W3C-Hub-Spam-Status: No, score=-6.1
X-W3C-Hub-Spam-Report: AWL=0.097, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1c1ooG-000506-P4 a09fb7bb393e6f12e468d635b8131aad
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 2.2. Interaction with "https" URIs | Re: Op-sec simplification
Archived-At: <http://www.w3.org/mid/CABkgnnUL+AJEi=92K95f22vrx17Rmm0j1rEahhwu-my3DPcEwA@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/32806
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 2 November 2016 at 16:48, Kari Hurtta <hurtta-ietf@elmme-mailer.org> wrote:
> In these cases on these bad examples that http: -probe determined
> routing.  I guess that bad examples are NOT concern for op-sec, but it
> may be concern for browser (some secure cookie is then served
> to http: -routing for example when broser sent it to for
> https: -scheme).

I'm willing to say that (contrary to previously-held opinions), that
this is a risk that is worth taking.  If we find that the probe
triggers a bad route AND that bad route responds favourably to that
probe, THEN we have to assume that the bad route is smart enough to
handle requests with a slightly odd scheme.

Let's say that we have a gateway that routes based on the first
request, there's not really much that the gateway does that will
prevent the origin server from receiving a request for the .well-known
resource.  If the origin server is still stupid enough to provide a
positive response - for an origin that it shouldn't be expecting to be
serving requests for - then I don't think there is any way that they
can be helped.

If a gateway routes on path, and .well-known goes to a server that
advertises op-sec, and other resources don't, that's pathological.

If the gateway routes on almost every request, but occasionally gets
lazy, that's pathological.