Re: SNI Extension for Alt-Svc

Martin Thomson <martin.thomson@gmail.com> Fri, 01 December 2017 00:32 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D51BE1273B1 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 30 Nov 2017 16:32:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.989
X-Spam-Level:
X-Spam-Status: No, score=-6.989 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vU3p4yJSGLsh for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 30 Nov 2017 16:32:45 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F2E8124D68 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 30 Nov 2017 16:32:45 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.89) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1eKZAx-0000BB-QU for ietf-http-wg-dist@listhub.w3.org; Fri, 01 Dec 2017 00:27:31 +0000
Resent-Date: Fri, 01 Dec 2017 00:27:31 +0000
Resent-Message-Id: <E1eKZAx-0000BB-QU@frink.w3.org>
Received: from mimas.w3.org ([128.30.52.79]) by frink.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <martin.thomson@gmail.com>) id 1eKZAl-0000A3-L8 for ietf-http-wg@listhub.w3.org; Fri, 01 Dec 2017 00:27:19 +0000
Received: from mail-oi0-f47.google.com ([209.85.218.47]) by mimas.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.89) (envelope-from <martin.thomson@gmail.com>) id 1eKZAh-00087i-8c for ietf-http-wg@w3.org; Fri, 01 Dec 2017 00:27:19 +0000
Received: by mail-oi0-f47.google.com with SMTP id k2so6097299oib.11 for <ietf-http-wg@w3.org>; Thu, 30 Nov 2017 16:26:54 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=APJDnVzUt6wVNIPvMYHxzpEsMV1QCeoAXMPj4uGHffI=; b=qP2CdC9J26gD7zc2cbl24yYnNTnAk4LqhOVvDox+GqmViV9cwH92IBpEdBhXDgGDR/ THUjKLURxfxBeMHoUtYD+0NslibC0tcW+6RWVPhHnmAQ3krnasPz0z9ZpnNiED3pjG7+ sJhSWyXwu4fc4h4v9vwfhKuCHFCPfmW0ICEkE5kf4Tt79S/DTWZwRETnlW/Fhe+j4mFH qVUWcpt8ArOqrbu7Mg6VsbzA16FGtJU0kf4RTUnRBXBq6sJNAxhvCXein+YyFG5VtFY1 y8yAflPUsjxj5Eo0TdCfRVZZ1wxteRsPkQC16aRrwGdT9ptXItu5atXeRkLUb3bB3AQN O5wQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=APJDnVzUt6wVNIPvMYHxzpEsMV1QCeoAXMPj4uGHffI=; b=V2Dfs+ZaYXF1VQwCMFVuShZ6VXoZhrIvIvTAlfLTI4hikT/vcUr14hT95zEbA19t9x F/3WbBnYq1KvXWqUKFvUESlsmCAnuQIV6H7dArTsyBsbETwXIL1vswleGIaJt1fOtkRA 06Nb+IgFNYmzJLBUxpu5fOKmPL/UFHCRcL3jyOswEWJmUNXnom1QkH8OEzcf64oNrdlS sXtlYCVGzxoQ3L3YM2tpe2CDSup7wlijJloeIuapNQNNQOa5p9SEGD5uMMvkPLFLNsdJ fhqsI9w5uWHulhsDZ9hDV6Lb86nYzwAXD5ijvURnSilUI5TXpxVDet7DeLmMmULZomTP I2Cw==
X-Gm-Message-State: AJaThX5q0YcteGtaJtdgdvUTm1xQHaRGeUBDsGWUln43IfqClAdh9iT/ tzS2aAsgUMG39EG9PcWCD7Pc0C+DAn1ZFPPFv3U=
X-Google-Smtp-Source: AGs4zMZwyN/42rtZuwxzRTMCoDWCG9hH67qL2Zwud8kN+WjSLi5iPR3wLV8ow0n9css3+FcpX4nIbDIA7TeZ6Ahafvk=
X-Received: by 10.202.10.68 with SMTP id 65mr6160870oik.84.1512088013869; Thu, 30 Nov 2017 16:26:53 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.8.11 with HTTP; Thu, 30 Nov 2017 16:26:53 -0800 (PST)
In-Reply-To: <MWHPR08MB243210349ABEB2B0E48123E0DA380@MWHPR08MB2432.namprd08.prod.outlook.com>
References: <MWHPR08MB243210349ABEB2B0E48123E0DA380@MWHPR08MB2432.namprd08.prod.outlook.com>
From: Martin Thomson <martin.thomson@gmail.com>
Date: Fri, 01 Dec 2017 11:26:53 +1100
Message-ID: <CABkgnnWQQttpgpYWu7iqSHgAz82oo+qZ2qiRx3RNmBbChn=KaA@mail.gmail.com>
To: Mike Bishop <mbishop@evequefou.be>
Cc: Lucas Pardue <Lucas.Pardue@bbc.co.uk>, Mark Nottingham <mnot@mnot.net>, HTTP Working Group <ietf-http-wg@w3.org>, Patrick McManus <mcmanus@ducksong.com>
Content-Type: multipart/alternative; boundary="001a11377878ef9a56055f3c6c56"
Received-SPF: pass client-ip=209.85.218.47; envelope-from=martin.thomson@gmail.com; helo=mail-oi0-f47.google.com
X-W3C-Hub-Spam-Status: No, score=-6.0
X-W3C-Hub-Spam-Report: AWL=0.080, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.055, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1eKZAh-00087i-8c 115489fafda61c7d3fd5302c879a49cf
X-Original-To: ietf-http-wg@w3.org
Subject: Re: SNI Extension for Alt-Svc
Archived-At: <https://www.w3.org/mid/CABkgnnWQQttpgpYWu7iqSHgAz82oo+qZ2qiRx3RNmBbChn=KaA@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/34901
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hi Mike,

Interesting idea.

How would you imagine this interacting with a client's TLS session cache?
Specifying unique SNI values that contain encrypted information is
interesting, but you want to ensure that the TLS session cache for the
hostname is not used or you could get linkability based on the value of a
session ID or session ticket.

Also, I think that it would be good to have some sort of commitment to TLS
1.3 support.  Then you could rely on the server certificate being
protected.  I don't want to have to rely on secondary certificates and the
associated delays.  This seems like it could be a reasonable alternative to
the secondary certificates work.


On Fri, Dec 1, 2017 at 4:56 AM, Mike Bishop <mbishop@evequefou.be> wrote:

> I was already planning to spin up a thread on that draft today, so thanks
> for deciding what I'm doing next today!  😉  Forking a separate thread.
>
>
>
> WG, https://tools.ietf.org/html/draft-bishop-httpbis-sni-altsvc-00
> proposes a new parameter for Alt-Svc suggesting that a client use a
> different (presumably generic) hostname in the TLS SNI extension, and
> instead gain Alt-Svc "reasonable assurances" by requesting the origin's
> certificate via Secondary Certificates (which is currently under Call for
> Adoption).  It gives a solution, albeit HTTP-specific, to SNI privacy by
> providing a discoverability path for which generic hostname can be used to
> reach a more sensitive origin under encryption.
>
>
>
> As to the frame reference, I intentionally didn't reference which
> protocol, in part because Alt-Svc itself says it can be carried by various
> mechanisms and the definition of an Alt-Svc extension doesn't need to get
> into that layer.  The Alt-Svc frame for HTTP/QUIC is specified by
> https://tools.ietf.org/html/draft-bishop-httpbis-altsvc-quic-00.  While
> frames are present in both HTTP/2 and HTTP/QUIC, I don't think that makes
> frames a generic HTTP concept -- it's a property of certain mappings, and
> specified individually in each of them.
>
>
>
> -----Original Message-----
> From: Lucas Pardue [mailto:Lucas.Pardue@bbc.co.uk]
> Sent: Thursday, November 30, 2017 2:13 AM
> To: Mike Bishop <mbishop@evequefou.be>; ilariliusvaara@welho.com
> Cc: Mark Nottingham <mnot@mnot.net>; HTTP Working Group <
> ietf-http-wg@w3.org>; Patrick McManus <mcmanus@ducksong.com>
> Subject: RE: DRAFT: more details for HTTPtre
>
>
>
> Hi Mike,
>
>
>
> The connection coalescing case is interesting as it's not currently
> described in HTTP/QUIC. Presumably by oversight or time constraint rather
> than intent. (We've got a ticket open tracking that one.)
>
>
>
> Changing track, I've just seen your SNI I-D
>
> https://tools.ietf.org/html/draft-bishop-httpbis-sni-altsvc-00
>
>
>
> References to Frames don't state a specific mapping (HTTP/2 or HTTP/QUIC).
> Reading between the lines this seems intentional, which got me thinking
> that also Frames could be described as a new HTTP semantic for
> binary-capable wire formats.
>
>
>
> Lucas
>
> ________________________________________
>
> From: Mike Bishop [mbishop@evequefou.be]
>
> Sent: 28 November 2017 18:32
>
> To: Lucas Pardue; ilariliusvaara@welho.com
>
> Cc: Mark Nottingham; HTTP Working Group; Patrick McManus
>
> Subject: RE: DRAFT: more details for HTTPtre
>
>
>
> I agree that HPACK is largely decouplable from HTTP/2, or HTTP.  The core
> of the protocol is a general-purpose compression algorithm for streaming
> key-value dictionaries, rather than straight text.  The pieces that bind it
> to H2 are incidental, and perhaps we could have structured it differently.
>
>
>
> Coalescing isn't a new semantic -- each HTTP mapping defines how
> parallelism and connection reuse should work in that mapping.  HTTP/2
> simply happens to define it more expansively than HTTP/1.1.
>
>
>
>
>
>
>
>
>
>
>
>
>
> -----------------------------
>
> http://www.bbc.co.uk
>
> This e-mail (and any attachments) is confidential and may contain personal
> views which are not the views of the BBC unless specifically stated.
>
> If you have received it in
>
> error, please delete it from your system.
>
> Do not use, copy or disclose the
>
> information in any way nor act in reliance on it and notify the sender
> immediately.
>
> Please note that the BBC monitors e-mails sent or received.
>
> Further communication will signify your consent to this.
>
> -----------------------------
>