Re: The future of forward proxy servers in an http/2 over TLS world

"Adrien de Croy" <adrien@qbik.com> Wed, 15 February 2017 00:03 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 493FA1299A2 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 14 Feb 2017 16:03:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level:
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dhohGxSjO0jU for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 14 Feb 2017 16:03:12 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9519B12999B for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 14 Feb 2017 16:03:07 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1cdn1I-0002CM-I4 for ietf-http-wg-dist@listhub.w3.org; Wed, 15 Feb 2017 00:00:28 +0000
Resent-Date: Wed, 15 Feb 2017 00:00:28 +0000
Resent-Message-Id: <E1cdn1I-0002CM-I4@frink.w3.org>
Received: from mimas.w3.org ([128.30.52.79]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <adrien@qbik.com>) id 1cdn1B-0002A9-6b for ietf-http-wg@listhub.w3.org; Wed, 15 Feb 2017 00:00:21 +0000
Received: from smtp.qbik.com ([122.56.26.1]) by mimas.w3.org with esmtps (TLS1.2:ECDHE_RSA_ARCFOUR_128_SHA1:128) (Exim 4.84_2) (envelope-from <adrien@qbik.com>) id 1cdn13-00031P-Pi for ietf-http-wg@w3.org; Wed, 15 Feb 2017 00:00:15 +0000
Received: From [192.168.1.146] (unverified [192.168.1.146]) by SMTP Server [192.168.1.3] (WinGate SMTP Receiver v9.0.4 (Build 5915)) with SMTP id <0000964578@smtp.qbik.com>; Wed, 15 Feb 2017 12:59:43 +1300
From: Adrien de Croy <adrien@qbik.com>
To: Dave Dolson <ddolson@sandvine.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
Date: Tue, 14 Feb 2017 23:59:43 +0000
Message-Id: <em994b67aa-a63c-4d3b-8cc4-ae2033d32823@bodybag>
In-Reply-To: <20170214234724.8495190.85030.137008@sandvine.com>
References: <20170214234724.8495190.85030.137008@sandvine.com>
Reply-To: Adrien de Croy <adrien@qbik.com>
User-Agent: eM_Client/7.0.27943.0
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="------=_MB775EF3A2-5EF5-42B0-9A56-8459DD923BB3"
Received-SPF: pass client-ip=122.56.26.1; envelope-from=adrien@qbik.com; helo=smtp.qbik.com
X-W3C-Hub-Spam-Status: No, score=-4.5
X-W3C-Hub-Spam-Report: AWL=-0.647, BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1cdn13-00031P-Pi 78ed081d3e472bb923c6c7903d1f2837
X-Original-To: ietf-http-wg@w3.org
Subject: Re: The future of forward proxy servers in an http/2 over TLS world
Archived-At: <http://www.w3.org/mid/em994b67aa-a63c-4d3b-8cc4-ae2033d32823@bodybag>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/33512
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

noted, I guess I should have stated "apart from basic connectivity" 
(CONNECT method).

My concern is that we have an impending train wreck relating to blocking 
sites.

My opinion is blocking will not stop, and that we would all benefit from 
a way of doing it that allows a good user experience, without 
compromising privacy unduly.

My question is whether this is something others agree on and whether we 
have enough determination to do anything about it.


------ Original Message ------
From: "Dave Dolson" <ddolson@sandvine.com>
To: "Adrien de Croy" <adrien@qbik.com>; "ietf-http-wg@w3.org" 
<ietf-http-wg@w3.org>
Sent: 15/02/2017 12:47:26 PM
Subject: Re: The future of forward proxy servers in an http/2 over TLS 
world

>Proxies may also provide anonymity, which can improve privacy.
>
>Depending, of course, whether you trust the server or the proxy more.
>
>
>
>From: Adrien de Croy
>Sent: Tuesday, February 14, 2017 5:41 PM
>To: ietf-http-wg@w3.org
>Reply To: Adrien de Croy
>Subject: The future of forward proxy servers in an http/2 over TLS 
>world
>
>
>At the moment, it feels like the functions provided by proxy servers 
>are being squeezed out by changes in the protocol.
>
>I can understand the desire for privacy, and we've had the argument 
>about whether it should be available to all or not too many times 
>already.
>
>However, there are other functions that a proxy is commonly used for 
>that are becoming impossible with the direction TLS, HTTPS HSTS, cert 
>pinning etc are going.
>
>Whilst I can understand a desire and need for privacy, an ability to be 
>able to go to a website without betraying which site you're going to 
>(e.g. see https://tools.ietf.org/html/draft-schwartz-dns-sni-01 
><https://tools.ietf.org/html/draft-schwartz-dns-sni-01>) there's 
>probably 1 remaining IMO critical bona fide purpose for a proxy which 
>is becoming very problematic for users.
>
>Blocking requests.
>
>So, do we feel there is still a place for blocking requests?  Our 
>customers still certainly want this.
>
>Currently the user experience is either appalling (generic connectivity 
>failure report which wastes a lot of user time), or requires deployment 
>of a MitM, which is being squeezed out as well.  We should be able to 
>do better, but it doesn't appear to be being addressed at all, and the 
>gulf is widening.
>
>I believe we need to put some time into working out how we can allow a 
>proxy to block requests without an awful user experience that costs 
>users and tech support countless hours to deal with.
>
>This means we have a need to be able to respond to CONNECT with a 
>denial, and some kind of message that can be displayed to the user.
>
>It may be that the only way this can be achieved is by the concept of a 
>trusted proxy.
>
>Otherwise if the group consensus is that requests should not be 
>blocked, we need to deal with the consequences of that.
>
>Adrien
>
>P.s. another key feature is caching, but that is becoming less useful 
>anyway.  Customers can often live without caching, they do not tolerate 
>being unable to block however.
>
>