Re: Fwd: New Version Notification for draft-snell-httpbis-keynego-01.txt

James M Snell <jasnell@gmail.com> Mon, 25 November 2013 16:14 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CFCD1ADF98 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 25 Nov 2013 08:14:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.003
X-Spam-Level:
X-Spam-Status: No, score=-7.003 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LHG1J76EgC_C for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 25 Nov 2013 08:14:50 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id 77B231ADF9B for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 25 Nov 2013 08:14:50 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Vkymh-0004Xu-4B for ietf-http-wg-dist@listhub.w3.org; Mon, 25 Nov 2013 16:13:15 +0000
Resent-Date: Mon, 25 Nov 2013 16:13:15 +0000
Resent-Message-Id: <E1Vkymh-0004Xu-4B@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <jasnell@gmail.com>) id 1VkymQ-0004Vr-K1 for ietf-http-wg@listhub.w3.org; Mon, 25 Nov 2013 16:12:58 +0000
Received: from mail-oa0-f52.google.com ([209.85.219.52]) by maggie.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <jasnell@gmail.com>) id 1VkymP-0007UU-5O for ietf-http-wg@w3.org; Mon, 25 Nov 2013 16:12:58 +0000
Received: by mail-oa0-f52.google.com with SMTP id h16so4535844oag.39 for <ietf-http-wg@w3.org>; Mon, 25 Nov 2013 08:12:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=O5P/VaZN1XI4COyE8P8ZoJv1dlPe7QRSPOQF/CctGUI=; b=OXd0ZZYrgxYtHJbYefgpDJBCsu4RYGYlsc7c6KCVqf0tyXNLI/aTb8uHp0xysIUsho a+tSaMNuFXwLyWToLYmCixuveI5SFXjIFu+7uOIBhdHCiR8hw9AI51BY3XKnuLq4gSVl iswmcJ6TriPIU2LoOvOtkFGtuUWN9WkvaQikIqY+XrbSXO4X44Is67M1uRmOJuUY2eur ljXM+/+trq4V2KhEHRVXHko/kNWcse8wv1wyLvvqATFAk8YnwpB865Sv7fn1OpS1FJ5J u9OWbSeoEB3Uce+EgSYQKpBYwu10GBStDg7tzdvW104SVLFD89uRMefVzkZ46YHmeaW5 8nSw==
X-Received: by 10.182.97.138 with SMTP id ea10mr537049obb.77.1385395951076; Mon, 25 Nov 2013 08:12:31 -0800 (PST)
MIME-Version: 1.0
Received: by 10.60.98.236 with HTTP; Mon, 25 Nov 2013 08:12:08 -0800 (PST)
In-Reply-To: <5291230C.8090701@cs.tcd.ie>
References: <20131119210801.12883.32414.idtracker@ietfa.amsl.com> <CABP7RbcERk-geVL5p_Bcsp7ameHH-JgNq0asCVbbbaw4wC9haQ@mail.gmail.com> <5291230C.8090701@cs.tcd.ie>
From: James M Snell <jasnell@gmail.com>
Date: Mon, 25 Nov 2013 08:12:08 -0800
Message-ID: <CABP7Rbdi6wo-Y6ut-fABdM8DDxdUSj_QVArQgCLPEeUGSr8FiQ@mail.gmail.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Cc: "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=209.85.219.52; envelope-from=jasnell@gmail.com; helo=mail-oa0-f52.google.com
X-W3C-Hub-Spam-Status: No, score=-4.5
X-W3C-Hub-Spam-Report: AWL=-1.766, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001
X-W3C-Scan-Sig: maggie.w3.org 1VkymP-0007UU-5O 6e4260b4868ab112120ba45cc6cabea9
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Fwd: New Version Notification for draft-snell-httpbis-keynego-01.txt
Archived-At: <http://www.w3.org/mid/CABP7Rbdi6wo-Y6ut-fABdM8DDxdUSj_QVArQgCLPEeUGSr8FiQ@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/21178
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Sat, Nov 23, 2013 at 1:50 PM, Stephen Farrell
<stephen.farrell@cs.tcd.ie> wrote:
>
> So I finally had a chance to read this draft.
>

Appreciate you taking a look...

> I think the ideas are interesting, and it'd be good if HTTP/2.0
> was extensible so that future work in this direction could be
> explored. Perhaps if the WG do work on supporting proxies, then
> room for this as an extension to that could be found.
>
> However, today, this is nowhere near ready to be put up as an
> alternative to TLS in any respect. Its not even in the ballpark.
>

To be certain, providing a replacement for TLS is certainly not the
intent this early in the game. At this point, this is an experiment
only.

> I figure by the time this got properly worked out, (in maybe a
> year or more) it'd be very like GSS-API without the API, but
> probably as complex. Now that might be interesting actually and
> maybe we could do GSS-API context token handling better this
> time around. Or maybe we wouldn't.
>
> I'm also quite unsure how the server side of this would work.
> With whom would the browser be negotiating? The web server or
> some web application? That wasn't clear to me and might make
> a big difference in terms of trust models, how the web-origin
> plays into the game and in terms of the liklihood of server
> side deployment happening.
>

The negotiation is with the origin... whatever that means. Typically,
that would imply that it's handled by the web server.

> The "algorithm" header field seems to have the same benefits
> and pitfalls as TLS ciphersuites, but goes beyond that to also
> codify the handshake protocol and the security framing. I think
> I kinda like that, and would go further and let that also
> determine if some header-field values are also input to the
> security framing. (E.g. the web-origin could be input to any
> MAC calculation for some "algorithm" header field values.)
> There's fun to be had there.
>

Yes, indeed. There are quite a few possibilities. The more exotic we
get, here, however, the more unanswered questions there are. Fun yes,
but could be quite complicated.

> The security properties of the framing are not even defined yet.
> I guess it'd be something like ESP or the TLS application data
> protocol, but the algorithm thing above means that those can
> vary by algorithm. I'm not sure if that's a good plan since it'd
> mean that you have to understand each algorithm to understand
> the security properties of payloads. In other words, there could
> be value in flexibility in terms of how you negotiate a session
> key, but not in the security framing for payloads. One to
>

The more I look at it, I think I agree. Having a defined structure for
secured DATA frame payloads would be the best approach. The one
drawback is that DATA frames used for HTTP traffic are limited to a
particular size... I want to try avoiding using too much of that up on
security overhead.

- James

> Anyway, I do think this might be an interesting near-term
> research thing to try play with and if the WG's solution for
> better proxy support looked a bit like this, then that would
> be good since it'd allow future experimentation along these
> lines.
>
> But this just ain't a replacement for TLS.
>
> IMO the WG should do what folks in Vancouver said: get more TLS
> used in HTTP/2.0. I'd prefer that be done via the http:// URI
> sent on top of opportunistic TLS plan with no new user i/f, but
> would also be ok (while a bit skeptical) with the plan Mark
> proposed last week to get more server-auth TLS. I do think
> either would be better done as an integral part of the spec.
>
> Cheers,
> S.
>
> PS: I hope I don't re-ignite the browser/proxy/tls battle
> again. Maybe if I say "VP8 or H.264?" that'll distract those
> who like such arguments;-)
>
> On 11/19/2013 09:13 PM, James M Snell wrote:
>> At Mark's urging, I've posted a significantly updated draft of the
>> "in-session key negotiation" draft that I had published last year.
>> Please treat this as purely experimental at this point. I am not
>> pushing this as a proposal just yet, just offering it up as one
>> possible approach to providing message-level security as opposed to
>> transport-level security. What this proposal does, in effect, is make
>> it possible to negotiate and use cryptographic keys from *inside* an
>> HTTP/2 connection as opposed to the TLS approach. A key benefit of
>> this approach is that it allows peers to establish secure
>> communication even over potentially insecure transports. Of course,
>> it's not a perfect solution.
>>
>> As always, feedback is welcomed and requested.
>>
>> - James
>>
>>
>> ---------- Forwarded message ----------
>> From:  <internet-drafts@ietf.org>
>> Date: Tue, Nov 19, 2013 at 1:08 PM
>> Subject: New Version Notification for draft-snell-httpbis-keynego-01.txt
>> To: "James M. Snell" <jasnell@gmail.com>
>>
>>
>>
>> A new version of I-D, draft-snell-httpbis-keynego-01.txt
>> has been successfully submitted by James M Snell and posted to the
>> IETF repository.
>>
>> Filename:        draft-snell-httpbis-keynego
>> Revision:        01
>> Title:           HTTP/2.0 Intra-Connection Negotiation
>> Creation date:   2013-11-19
>> Group:           Individual Submission
>> Number of pages: 6
>> URL:
>> http://www.ietf.org/internet-drafts/draft-snell-httpbis-keynego-01.txt
>> Status:          http://datatracker.ietf.org/doc/draft-snell-httpbis-keynego
>> Htmlized:        http://tools.ietf.org/html/draft-snell-httpbis-keynego-01
>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-snell-httpbis-keynego-01
>>
>> Abstract:
>>    This memo describes a proposed modification to HTTP/2.0 that
>>    introduces the concepts of Intra-Connection Negotiation and Secure
>>    Framing.
>>
>>
>>
>>
>> Please note that it may take a couple of minutes from the time of submission
>> until the htmlized version and diff are available at tools.ietf.org.
>>
>> The IETF Secretariat
>>
>>