Re: HTTPS 2.0 without TLS extension?

Yoav Nir <ynir@checkpoint.com> Fri, 26 July 2013 20:06 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9950F11E80FB for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 26 Jul 2013 13:06:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.261
X-Spam-Level:
X-Spam-Status: No, score=-10.261 tagged_above=-999 required=5 tests=[AWL=-0.262, BAYES_00=-2.599, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OI8A0YJt7vOi for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 26 Jul 2013 13:06:03 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id 8FEEB11E813A for <httpbisa-archive-bis2Juki@lists.ietf.org>; Fri, 26 Jul 2013 13:06:02 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1V2oFl-0002L9-Qw for ietf-http-wg-dist@listhub.w3.org; Fri, 26 Jul 2013 20:04:41 +0000
Resent-Date: Fri, 26 Jul 2013 20:04:41 +0000
Resent-Message-Id: <E1V2oFl-0002L9-Qw@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <ynir@checkpoint.com>) id 1V2oFd-0002K3-EP for ietf-http-wg@listhub.w3.org; Fri, 26 Jul 2013 20:04:33 +0000
Received: from smtp.checkpoint.com ([194.29.34.68]) by lisa.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <ynir@checkpoint.com>) id 1V2oFX-0001Z1-05 for ietf-http-wg@w3.org; Fri, 26 Jul 2013 20:04:33 +0000
Received: from drp-ex10.ad.checkpoint.com (drp-ex10.ad.checkpoint.com [192.168.228.21]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r6QK3pmZ030033; Fri, 26 Jul 2013 23:03:51 +0300
X-CheckPoint: {51F2D627-11-1B221DC2-1FFFF}
Received: from DRP-EX10.ad.checkpoint.com ([169.254.1.252]) by DRP-EX10.ad.checkpoint.com ([169.254.1.46]) with mapi id 14.02.0342.003; Fri, 26 Jul 2013 22:03:51 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Zhong Yu <zhong.j.yu@gmail.com>
CC: Martin Thomson <martin.thomson@gmail.com>, =?utf-8?B?V2lsbGlhbSBDaGFuICjpmYjmmbrmmIwp?= <willchan@chromium.org>, "HTTP Working Group" <ietf-http-wg@w3.org>
Thread-Topic: HTTPS 2.0 without TLS extension?
Thread-Index: AQHOhtQTsno4szXGeU2gyoo0a+EYMZlyVdGAgAAUMACAAADrgIAAAgsAgAA8jgCAA1N0AIABSlUA
Date: Fri, 26 Jul 2013 20:03:50 +0000
Message-ID: <499DCFD9-B77C-4918-AB93-910B30B67FAE@checkpoint.com>
References: <CACuKZqEBAqXs-cQF1U-g3npaXGR0LEoXZYxDv-3a+ftn-YG=_g@mail.gmail.com> <CAA4WUYjS=JXYAYKe0ueqUFbdEUC3pM8xuj--b=F=WPgnSc9xYg@mail.gmail.com> <CACuKZqGjYtmkFBEEDX+s=n=_15frt+qoQws4TWgiDEijBE+Mow@mail.gmail.com> <CACuKZqHJ-x3Q69Uvtoj4C1TGy4F+PeUyqzbdUxEUVZOVr2KEnA@mail.gmail.com> <CAA4WUYiA5A2pnqMOrntb-B_uGQRBAGeaAAf8ELtBmHhCzan63Q@mail.gmail.com> <CABkgnnWHCWzxUyLTF_EqudYSa3xcsSp1vcF9oukJTc7fQgXktA@mail.gmail.com> <CACuKZqGou7te9QSV_0LrmjnJOzjxXRurt0b1tTMwrJSoMH-Nrw@mail.gmail.com>
In-Reply-To: <CACuKZqGou7te9QSV_0LrmjnJOzjxXRurt0b1tTMwrJSoMH-Nrw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.31.44.18]
Content-Type: text/plain; charset="utf-8"
Content-ID: <F7ECC0897A370D4FB1397FB6822190B0@ad.checkpoint.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Received-SPF: pass client-ip=194.29.34.68; envelope-from=ynir@checkpoint.com; helo=smtp.checkpoint.com
X-W3C-Hub-Spam-Status: No, score=-6.7
X-W3C-Hub-Spam-Report: AWL=-0.223, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-1.452, SPF_PASS=-0.001
X-W3C-Scan-Sig: lisa.w3.org 1V2oFX-0001Z1-05 21f402a5c7c2943ca9a8c5fa0961659e
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HTTPS 2.0 without TLS extension?
Archived-At: <http://www.w3.org/mid/499DCFD9-B77C-4918-AB93-910B30B67FAE@checkpoint.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/18931
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Jul 26, 2013, at 3:21 AM, Zhong Yu <zhong.j.yu@gmail.com> wrote:

> On Tue, Jul 23, 2013 at 5:34 PM, Martin Thomson
> <martin.thomson@gmail.com> wrote:
>> On 23 July 2013 11:57, William Chan (陈智昌) <willchan@chromium.org> wrote:
>>> I find your argument for mandating HTTP Upgrade to HTTP/2.0 over TLS
>>> uncompelling. If others find it compelling, I would be interested in hearing
>>> so.
>> 
>> If we are going to enable variant modes of operation, then the
>> justification will need to be quite strong.  I don't believe that
>> there are many up-sides to this particular mode of operation that
>> would argue for its inclusion.
>> 
>> If all this comes down to is an inability to talk ALPN, maybe someone
>> can help us understand the situation that makes it difficult to deploy
>> that (I can imagine a few cases where this might be the case, but it
>> would be better to get to concrete cases).
> 
> I sent some questions to Java SSL people and got a response:
> 
> http://mail.openjdk.java.net/pipermail/security-dev/2013-July/008236.html
> http://mail.openjdk.java.net/pipermail/security-dev/2013-July/008271.html
> 
> My take is that Java will not add official support of ALPN before ALPN
> becomes a stable and well accepted standard. So it's a chicken and egg
> situation here. (Imagine how embarrassing it would be if Java standard
> API supports NPN:)

It would only be a chicken and egg situation if Java ruled the world. The TLS working group will publish ALPN as an RFC. Soon after, there will be updates of OpenSSL, SChannel (or whatever Microsoft calls it these days), and NSS. By then, it would be quite a lot of chicken to lay a java egg and carry metaphors way further than they should be.

> Since the support of ALPN requires API change, Java is unlikely to
> back port the support to earlier versions of Java, which a lot of
> deployments will be stuck on for some time.

Will those earlier versions of Java support HTTP/2 ?

> Obviously Java will have to support ALPN when HTTP2 and ALPN gains a
> strong foothold.

I don't see much need for ALPN before HTTP/2 is ready, but we might see implementations of the draft in months. And those implementations will come with ALPN.

> So I think the best thing to do in the meantime is to make ALPN
> optional; clients and servers should support TLS+Upgrade (which is
> trivial, suppose Upgrade must be supported anyway on plain TCP) for
> the time being. This will help HTTP/2.0 to be adopted earlier,
> consequently it'll push Java to support ALPN sooner.

Nobody is forcing anyone to support upgrade. Some people from Google said they have no interest in HTTP/2 in the clear, so they could have servers that don't support Upgrade. 

Like you, I think HTTP/2 should not depend on the upgrade mechanisms, and that if a connection (with or without TLS) begins with the magic header, it should be treated as HTTP/2 even if there was neither Upgrade nor ALPN, and that any implementation that has Upgrade in the clear, should have Upgrade in TLS. I just don't buy the Java argument.