Re: AD review of draft-ietf-httpbis-alt-svc-10
Chris Bentzel <chris@bentzel.net> Fri, 15 January 2016 21:27 UTC
Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78D801B32B0 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 15 Jan 2016 13:27:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.28
X-Spam-Level:
X-Spam-Status: No, score=-6.28 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cBTZzD_kmpBS for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 15 Jan 2016 13:27:15 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A6311B32AF for <httpbisa-archive-bis2Juki@lists.ietf.org>; Fri, 15 Jan 2016 13:27:14 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1aKBqQ-000855-Cw for ietf-http-wg-dist@listhub.w3.org; Fri, 15 Jan 2016 21:23:42 +0000
Resent-Date: Fri, 15 Jan 2016 21:23:42 +0000
Resent-Message-Id: <E1aKBqQ-000855-Cw@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <chris@bentzel.net>) id 1aKBqJ-000845-4Q for ietf-http-wg@listhub.w3.org; Fri, 15 Jan 2016 21:23:35 +0000
Received: from mail-ig0-f169.google.com ([209.85.213.169]) by lisa.w3.org with esmtps (TLS1.2:RSA_ARCFOUR_SHA1:128) (Exim 4.80) (envelope-from <chris@bentzel.net>) id 1aKBqD-0000T6-VO for ietf-http-wg@w3.org; Fri, 15 Jan 2016 21:23:34 +0000
Received: by mail-ig0-f169.google.com with SMTP id h5so18118834igh.0 for <ietf-http-wg@w3.org>; Fri, 15 Jan 2016 13:23:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bentzel-net.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-type; bh=i3Tc1WCgbTWwVTS1aKzoCe2Ojm8HW9r7B3dME+6Wktg=; b=lQsgXIeoaGRM0xHo865XCPoc/kVY8MfxfDunPwKJZ/6emhJ8lFLcIvswfID1ItDs/a O1J6ovORbYXjP/qDh8VWBPfHp284qGFJ801yqvcaek0aPTIq8B0pfugXM/Jgwn39r1Bp foXKs9BNu+EgkBdpDbnYQ7v6iSb0ZuKvtLEwP3AsL/P5mwWGjiPTZKzlBfUrWt/v7aVr uX4PyPRCQGM4Xt7vqCCnwMn8IVr/b7VkanF9tY7qmjjyN6D5IRd+c2C++QoOFihSGmDG s2Dldi3IdPFnX2YfEiCE0+KhWQMCk6z+YnZ0UrPioAQcZIuICo1/f2tUzU9NjFlEN62o P4Yg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-type; bh=i3Tc1WCgbTWwVTS1aKzoCe2Ojm8HW9r7B3dME+6Wktg=; b=aN6TYY84Efsz2lWRMRojr68uWmCK5NhcPtjpTTVS0Ep3yRh6U7zpM/aiVNcF2bgPwL fRCOn16J0QuSTkvo4GsL2Adv3/NV7yA6S9cds5xTRjQr/myBPaKiYxpbOE1gCkMDBH4m qw1XRNdX2n3VY+7r98OqcpmDgLxxSshR4CEckkKadvKHHcL6w1tYCZ1cWRQfaG89CbrR KQIY84IybZ4F1Ufm8xlGgRfL/WrMxpRKfF939FHEWNkbSkBN9jTYvmNxQ5OkZhKxMjIi JTJ6AXvHNtwl5ZW/TYv0HgM0I7m3EeCijQ6zxvGkEiMOlkHy8lBxY7gFBTdjdCKyT096 F27Q==
X-Gm-Message-State: AG10YORKy1xRS1hQ+lCQQxj6HZHyZL8mdNVD4w/VcWOV+N3GcyQiE6NhuegwMtQ0KSHyq1u6OPzo81e/ri0Hkg==
X-Received: by 10.50.62.148 with SMTP id y20mr658986igr.3.1452892983571; Fri, 15 Jan 2016 13:23:03 -0800 (PST)
MIME-Version: 1.0
References: <CALaySJK5fYy_JCv0Y7Fs3QpPk95fUxyt272JMc-QUpVKO7_gJA@mail.gmail.com> <56853BCC.7030005@gmx.de> <56927D52.2000106@gmx.de> <CALaySJ+mVOHinmehK2jm3jQaEkXJZ2BRbaY4a5wuw=eOOO-A9Q@mail.gmail.com> <BN3PR03MB13675838E560ED08916D245187C90@BN3PR03MB1367.namprd03.prod.outlook.com> <5693DC2E.7010001@cs.tcd.ie> <569562B6.904@cs.tcd.ie> <BN3PR03MB13677294EE2ABFE14D0A56D087CA0@BN3PR03MB1367.namprd03.prod.outlook.com> <CALaySJ+918e-VO2V6HTK6OnQc0kQrY-YYj=ZToxs3wXxZqjvCg@mail.gmail.com> <56962487.6030709@cs.tcd.ie> <BN3PR03MB1367417E3088E4AD82F9B53887CB0@BN3PR03MB1367.namprd03.prod.outlook.com> <5696A318.4010808@cs.tcd.ie> <312E9853-E205-454C-8A71-487FDF357A8D@mnot.net> <CABCZv0potRRAcezS1Q5ZASEyzTuOKtW7sE+Ey=EjxC_+teYr_w@mail.gmail.com> <CY1PR03MB137453C7B22E473C757581C987CD0@CY1PR03MB1374.namprd03.prod.outlook.com>
In-Reply-To: <CY1PR03MB137453C7B22E473C757581C987CD0@CY1PR03MB1374.namprd03.prod.outlook.com>
From: Chris Bentzel <chris@bentzel.net>
Date: Fri, 15 Jan 2016 21:22:54 +0000
Message-ID: <CABCZv0qupdF+nEzPWCsSZGL0NZ3X8LOMfzuz3pGatu426JfAQg@mail.gmail.com>
To: Mike Bishop <Michael.Bishop@microsoft.com>, Mark Nottingham <mnot@mnot.net>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Cc: Barry Leiba <barryleiba@computer.org>, "Julian F. Reschke" <julian.reschke@gmx.de>, "draft-ietf-httpbis-alt-svc@ietf.org" <draft-ietf-httpbis-alt-svc@ietf.org>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="047d7bdcab342ecfc6052966022d"
Received-SPF: none client-ip=209.85.213.169; envelope-from=chris@bentzel.net; helo=mail-ig0-f169.google.com
X-W3C-Hub-Spam-Status: No, score=-5.4
X-W3C-Hub-Spam-Report: AWL=-0.767, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: lisa.w3.org 1aKBqD-0000T6-VO af71f1bd72249d03f05d8017cc84d03f
X-Original-To: ietf-http-wg@w3.org
Subject: Re: AD review of draft-ietf-httpbis-alt-svc-10
Archived-At: <http://www.w3.org/mid/CABCZv0qupdF+nEzPWCsSZGL0NZ3X8LOMfzuz3pGatu426JfAQg@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/30944
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
That seems reasonable. On Fri, Jan 15, 2016 at 4:10 PM Mike Bishop <Michael.Bishop@microsoft.com> wrote: > The concern goes the other way, too – Alt-Svc mappings that you’ve > previously discovered continuing to be used in Incognito. If a server gave > you an Alt-Svc of “chrisbentzel-laptop-2.tracking.example.com” previously > and you used it once you entered Incognito, they could persist your > identity into that mode regardless of whether you persist updates you see > while Incognito. > > > > Having a separate cache of Alt-Svc mappings that gets used only for that > session would seem like a reasonable mitigation. > > > > *From:* Chris Bentzel [mailto:chris@bentzel.net] > *Sent:* Friday, January 15, 2016 1:04 PM > *To:* Mark Nottingham <mnot@mnot.net>; Stephen Farrell < > stephen.farrell@cs.tcd.ie> > *Cc:* Mike Bishop <Michael.Bishop@microsoft.com>; Barry Leiba < > barryleiba@computer.org>; Julian F. Reschke <julian.reschke@gmx.de>; > draft-ietf-httpbis-alt-svc@ietf.org; HTTP Working Group < > ietf-http-wg@w3.org> > > > *Subject:* Re: AD review of draft-ietf-httpbis-alt-svc-10 > > > > Chiming in (very) late on the "In particular, clients configured for > anonymous usage SHOULD NOT use alternative services." > > > > I'm actually not sure what folks here have in mind when they think of > "anonymous usage" configurations. > > > > Assuming that something like Chrome's Incognito Mode falls under that > bucket, it is likely that Chrome would use alternative services within an > incognito session but not persist the alternative service mappings - they'd > go away when the incognito session ends. > > > > On Thu, Jan 14, 2016 at 10:32 PM Mark Nottingham <mnot@mnot.net> wrote: > > In some side discussions, I've come across other people who are unhappy > with this state of affairs, so I don't think you're alone. I'll leave it up > to them to decide how to participate here. > > To be explicit -- we are opening up a potential same machine attack > (specifically, someone on a shared HTTP server who has the ability to both > add response headers -- such as with .htaccess or a CGI script -- and > listen to another port (possibly, ANY port) on the same box can then hijack > traffic intended for other users. > > The motivation for doing so is to enable the HTTP Opportunistic Security > specification, which offers weak protection against pervasive monitors, but > is vulnerable to active attackers, and doesn't improve Web security in > other (and important) ways that HTTPS does. We have only one implementation > of that specification in a browser, and no sign that it will be adopted by > others. > > Is this a reasonable tradeoff? We are planning to publish this is > Experimental, so the question might also be "is this a responsible > experiment to run?" > > Cheers, > > > > > On 14 Jan 2016, at 6:18 am, Stephen Farrell <stephen.farrell@cs.tcd.ie> > wrote: > > > > > > > > On 13/01/16 19:16, Mike Bishop wrote: > >> Yes, that's obviously a mitigation servers can set up, but that means > >> we're telling existing servers they need to disallow something that's > > > > Well s/need/can/ I think, but sure. > > > >> newly defined in order to prevent their users from hijacking them. > >> And I don't believe retroactive guidance like that is reasonable -- > >> that will lag actual deployment of the protocol, and will never be > >> 100%. > >> > >> My proposal was that ~eve remains able to advertise an Alt-Svc, but > >> that alternative must then authenticate itself as users.example.com > >> (which Eve's proxy cannot do) before clients will use it. > >> > >> I remain a little unhappy with this as it stands, but if no one else > >> thinks it's a problem, I'll stop now. > > > > Yeah, ditto:-) > > > > Cheers > > S > > > >> > >> -----Original Message----- From: Stephen Farrell > >> [mailto:stephen.farrell@cs.tcd.ie] Sent: Wednesday, January 13, 2016 > >> 2:19 AM To: Barry Leiba <barryleiba@computer.org>; Mike Bishop > >> <Michael.Bishop@microsoft.com> Cc: Julian Reschke > >> <julian.reschke@gmx.de>; draft-ietf-httpbis-alt-svc@ietf.org; HTTP > >> Working Group <ietf-http-wg@w3.org> Subject: Re: AD review of > >> draft-ietf-httpbis-alt-svc-10 > >> > >> > >> Hiya, > >> > >> Yes, I'm fine that ~eve in Mike's scenario can muck with ~alice as > >> specified. (And such servers still do exist, we have one still.) > >> > >> I'd say best would be to call that attack out in the draft, but I > >> don't think the mitigation for the misbehaviour is to authenticate > >> ~eve, which is what the text below seems to be saying. Authenticating > >> the web server for the name will help of course, but surely the real > >> mitigation for that attack is for the server to scrub the alt-svc > >> headers? (And to be clear, yes the port number thing is fine, I don't > >> think system ports is a deal these days.) > >> > >> All of the above of course also assumes that the "changing host" > >> stuff is worked out well, which I'm sure it is or will be, but > >> haven't checked. > >> > >> S > >> > >> On 13/01/16 00:34, Barry Leiba wrote: > >>> The point with all this, in my mind and with respect to the text we > >>> have, is whether it makes any practical difference any more > >>> whether Eve sets this up on port 23412 or on port 1000. My > >>> contention is that it doesn't, these days (while it might have in > >>> the past), and that implying that it's safe if the alt-svc is on a > >>> low-numbered port, but not safe (or less safe) if it's on a > >>> high-numbered port isn't doing any service to anyone. > >>> > >>> I think we should alert people to the possible > >>> attack/issues/whatever, but that we should not imply that any set > >>> of ports enjoy any sort of immunity against or resistance to those > >>> attacks. > >>> > >>> b > >>> > >>> > >>> On Tue, Jan 12, 2016 at 5:09 PM, Mike Bishop > >>> <Michael.Bishop@microsoft.com> wrote: > >>>> More whether you're okay with that text as mitigation to this > >>>> hypothetical attack: > >>>> > >>>> http://users.example.com is a shared server which hosts user home > >>>> pages. Eve places a config file in her wwwpages directory to add > >>>> an Alt-Svc header to pages served out of > >>>> http://users.example.com/~eve announcing an alternative service > >>>> for http://users.example.com on port 23412. Bob is using an > >>>> Alt-Svc-capable browser. After Bob has visited > >>>> http://users.example.com/~eve, he visits > >>>> http://users.example.com/~alice. His browser, obeying Eve's > >>>> Alt-Svc header, accesses the alternative service on port 23412, > >>>> where Eve is running a forward proxy that replaces all pages > >>>> except her own with dancing hamsters. > >>>> > >>>> The original mitigations proposed in the text were "prohibit > >>>> normal users from setting the Alt-Svc header" (which is > >>>> retroactive on pre-Alt-Svc servers) or "prohibit normal users > >>>> from listening for incoming requests" (which is contrary to the > >>>> security model of any shared machine I've used). This scenario > >>>> originally made me want to require strong auth on any change of > >>>> endpoint, but that breaks the opportunistic security draft. The > >>>> current text, which I agree does very little, was as strong as we > >>>> could think of a way to make it without breaking the way Opp-Sec > >>>> wanted to work. > >>>> > >>>> I haven't seen such a server since I was in college, so I don't > >>>> know whether they still actually exist and run that way. I > >>>> presume they do, even if rare, but I have no data. > >>>> > >>>> -----Original Message----- From: Stephen Farrell > >>>> [mailto:stephen.farrell@cs.tcd.ie] Sent: Tuesday, January 12, > >>>> 2016 12:32 PM To: Mike Bishop <Michael.Bishop@microsoft.com>; > >>>> Barry Leiba <barryleiba@computer.org>; Julian Reschke > >>>> <julian.reschke@gmx.de> Cc: draft-ietf-httpbis-alt-svc@ietf.org; > >>>> HTTP Working Group <ietf-http-wg@w3.org> Subject: Re: AD review > >>>> of draft-ietf-httpbis-alt-svc-10 > >>>> > >>>> > >>>> > >>>> On 11/01/16 16:45, Stephen Farrell wrote: > >>>>> > >>>>> > >>>>> On 11/01/16 16:34, Mike Bishop wrote: > >>>>>> Haven't heard back from Stephen on the port-change issue we > >>>>>> wanted him to weigh in on; I sent him a reminder. > >>>>> > >>>>> 2nd one worked:-) > >>>>> > >>>>> Lemme go back and read the mail. Please hassle me if I've not > >>>>> gotten back by tomorrow sometime > >>>> > >>>> So as I understand it (thanks Barry), the issue is whether or not > >>>> this text is ok: > >>>> > >>>> "Clients can reduce this risk by imposing stronger requirements > >>>> (e.g. strong authentication) when moving from System Ports to > >>>> User or Dynamic Ports, or from User Ports to Dynamic Ports, as > >>>> defined in Section 6 of [RFC6335]." > >>>> > >>>> FWIW, I have no problem with that. I'm not sure quite what it's > >>>> telling a client to do, but I don't think there's much difference > >>>> these days between lower numbered and higher numbered ports. (If > >>>> that's wrong, I'm sure someone will correct me:-) > >>>> > >>>> Note that I've not read the rest of the document, just that bit. > >>>> > >>>> Cheers, S. > >>>> > >>>>> > >>>>> Cheers, S. > >>>>> > >>>>>> > >>>>>> -----Original Message----- From: barryleiba@gmail.com > >>>>>> [mailto:barryleiba@gmail.com] On Behalf Of Barry Leiba Sent: > >>>>>> Sunday, January 10, 2016 9:20 AM To: Julian Reschke > >>>>>> <julian.reschke@gmx.de> Cc: > >>>>>> draft-ietf-httpbis-alt-svc@ietf.org; HTTP Working Group > >>>>>> <ietf-http-wg@w3.org> Subject: Re: AD review of > >>>>>> draft-ietf-httpbis-alt-svc-10 > >>>>>> > >>>>>>>>> I don't think this is a 2119 "MAY": what *else* can it > >>>>>>>>> do? You have no other guidance about which alternative > >>>>>>>>> alternative to pick, so.... I think this should just > >>>>>>>>> say, "it chooses the most suitable...." > >>>>>>>> > >>>>>>>> Agreed. I haven't changed that yet as it affects > >>>>>>>> normative language but I will unless somebody wants to > >>>>>>>> defend it soonish. > >>>>>>> > >>>>>>> <https://github.com/httpwg/http-extensions/commit/a9df1e33703a2cb4 > >>>>>>> > >>>>>>> > > 6c > >>>>>>> 9b > >>>>>>> > >>>>>>> > >>>>> 441bfca5bbc04fff80d1> > >>>>>> > >>>>>> Nice. Is this the last of the updates, or are we still > >>>>>> working on any? Whenever you're ready to post a new I-D > >>>>>> version, I'll give it a check and request last call. > >>>>>> > >>>>>> Barry > >>>>>> > >>>>> > >>>>> > >>> > > > > -- > Mark Nottingham https://www.mnot.net/ > > > > >
- AD review of draft-ietf-httpbis-alt-svc-10 Barry Leiba
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Julian Reschke
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Barry Leiba
- ABNF related feedback to: Re: AD review of draft-… Julian Reschke
- Re: ABNF related feedback to: Re: AD review of dr… Barry Leiba
- RE: AD review of draft-ietf-httpbis-alt-svc-10 Mike Bishop
- RE: ABNF related feedback to: Re: AD review of dr… Mike Bishop
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Barry Leiba
- Re: ABNF related feedback to: Re: AD review of dr… Julian Reschke
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Mark Nottingham
- Re: ABNF related feedback to: Re: AD review of dr… Martin Thomson
- Re: ABNF related feedback to: Re: AD review of dr… Mark Nottingham
- Re: ABNF related feedback to: Re: AD review of dr… Julian Reschke
- Re: ABNF related feedback to: Re: AD review of dr… Julian Reschke
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Julian Reschke
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Barry Leiba
- Re: ABNF related feedback to: Re: AD review of dr… Mark Nottingham
- Re: ABNF related feedback to: Re: AD review of dr… Julian Reschke
- Re: ABNF related feedback to: Re: AD review of dr… Julian Reschke
- RE: AD review of draft-ietf-httpbis-alt-svc-10 Mike Bishop
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Stephen Farrell
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Stephen Farrell
- RE: AD review of draft-ietf-httpbis-alt-svc-10 Mike Bishop
- RE: AD review of draft-ietf-httpbis-alt-svc-10 Mike Bishop
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Barry Leiba
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Stephen Farrell
- RE: AD review of draft-ietf-httpbis-alt-svc-10 Mike Bishop
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Stephen Farrell
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Mark Nottingham
- Re: (Possibly duplicate mail) Suggesting /.well-k… Barry Leiba
- RE: (Possibly duplicate mail) Suggesting /.well-k… Mike Bishop
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Chris Bentzel
- RE: AD review of draft-ietf-httpbis-alt-svc-10 Mike Bishop
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Chris Bentzel
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Martin Thomson
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Patrick McManus
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Chris Bentzel
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Barry Leiba
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Julian Reschke
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Mark Nottingham
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Julian Reschke
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Julian Reschke
- Re: AD review of draft-ietf-httpbis-alt-svc-10 Mark Nottingham