Re: comparing eproxy proposals -- with some corrections

Peter Lepeska <bizzbyster@gmail.com> Tue, 21 January 2014 16:49 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1166F1A0119 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 21 Jan 2014 08:49:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.536
X-Spam-Level:
X-Spam-Status: No, score=-7.536 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.535, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pd77rA8Fxm3d for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 21 Jan 2014 08:49:35 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id D24BD1A0191 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 21 Jan 2014 08:49:34 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1W5eTw-0004rH-Hd for ietf-http-wg-dist@listhub.w3.org; Tue, 21 Jan 2014 16:47:20 +0000
Resent-Date: Tue, 21 Jan 2014 16:47:20 +0000
Resent-Message-Id: <E1W5eTw-0004rH-Hd@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <bizzbyster@gmail.com>) id 1W5eTm-0004ov-BZ for ietf-http-wg@listhub.w3.org; Tue, 21 Jan 2014 16:47:10 +0000
Received: from mail-ve0-f177.google.com ([209.85.128.177]) by maggie.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <bizzbyster@gmail.com>) id 1W5eTk-000098-KH for ietf-http-wg@w3.org; Tue, 21 Jan 2014 16:47:10 +0000
Received: by mail-ve0-f177.google.com with SMTP id jz11so1727844veb.36 for <ietf-http-wg@w3.org>; Tue, 21 Jan 2014 08:46:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=iZfzDH5pqs1N6Ii6aK7tu9MgdDv0+HFIuaKkZF56iLg=; b=QlNUx6pMdhcl+pT5LpeBdB0pLStgceaQLjsqbOVc6L7hh7/DbeC6e06Hn5Nyxc4pOI KNH0K88J2k57+UgqwANFI7gakl/02BG7JotO00PlktgaIMRxd8Rle5L5ER/JlMXNC4Uw X67hXjDkc2NVexu0BUbhhjOTrDqSChDAjoeax/NOtmjMWZRUSb3Vx9LXG64p0xZYnvYi C9wXrePEItXGx7gp16oHmw2dgT5V6vSD2oANtAdmSTGsTTEbt+aoOgqduytOZdwDrKdJ lihjTqs6wmUBwYEVpfddbwbp0DTgsQR8NbF6njxLjeNx+6KaPjCmyRifGOWXycwZn886 QGsw==
MIME-Version: 1.0
X-Received: by 10.58.6.239 with SMTP id e15mr15408460vea.14.1390322802676; Tue, 21 Jan 2014 08:46:42 -0800 (PST)
Received: by 10.58.155.232 with HTTP; Tue, 21 Jan 2014 08:46:42 -0800 (PST)
In-Reply-To: <CANmPAYGCHyCHyg_Haq_3EhABJGak2ccKH41iasoyoMv1Rp=KZg@mail.gmail.com>
References: <CANmPAYGCHyCHyg_Haq_3EhABJGak2ccKH41iasoyoMv1Rp=KZg@mail.gmail.com>
Date: Tue, 21 Jan 2014 17:46:42 +0100
Message-ID: <CANmPAYE+dC0=Axv1hkhq38n=E2SOv=Qp4couX1QGPPKPaQXDjg@mail.gmail.com>
From: Peter Lepeska <bizzbyster@gmail.com>
To: "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="047d7b6d7f7ac6da4704f07dc02d"
Received-SPF: pass client-ip=209.85.128.177; envelope-from=bizzbyster@gmail.com; helo=mail-ve0-f177.google.com
X-W3C-Hub-Spam-Status: No, score=-3.5
X-W3C-Hub-Spam-Report: AWL=-2.704, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001
X-W3C-Scan-Sig: maggie.w3.org 1W5eTk-000098-KH 2323f2f283fe9d57c73167f05a60ec82
X-Original-To: ietf-http-wg@w3.org
Subject: Re: comparing eproxy proposals -- with some corrections
Archived-At: <http://www.w3.org/mid/CANmPAYE+dC0=Axv1hkhq38n=E2SOv=Qp4couX1QGPPKPaQXDjg@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/21910
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

I realized that #4 (my understanding of Salvatore's proposal) can be
enhanced by having the proxy send the content server cert down to the
browser ahead of any application data so that the browser can do its own
certificate validation. This essentially adds the benefits of #2 to #4
below.

I've also been thinking about the fact that implementors do not typically
have the ability to make mods to client, proxy, AND web server (with the
exception of nghttp that I'm aware of). Therefore the choice of which
eproxy proposal to implement should one desire to take the next step with
this is constrained by which of the three he or she has control over.

-- So, for instance, if you only control the proxy (squid for instance),
then MITM is the only choice you have. This is the do nothing case as we
don't currently have a proposal on the table for eproxy that requires
changes only to the proxy.

-- If you control proxy and browser, then 2, 3, and 4 are possible. Since
as I mention above #4 can be enhanced by forwarding the content server
certificate to the browser and it therefore eliminates transitive trust in
a way that is similar to #2, and it is the fewest round trips proposal
(assuming the HTTP2S point-to-point session to the proxy is already
established), I think #4 is the leading contender. Again, this is if you
only control browser and proxy.

-- If you have the ability to modify browser, proxy, and server, then a
scheme similar to the Any Node Refusal proposal makes the most sense to me,
given the goals in the vidya draft.

Thanks and I hope this helps to frame discussion and provide a useful
overview of what is being considered.

See some of you tomorrow.

Thanks,

Peter


On Sun, Jan 19, 2014 at 3:52 AM, Peter Lepeska <bizzbyster@gmail.com> wrote:

> As an exercise, I’ve attempted to define the 5 eproxy schemes that
> have been proposed up until now. And then compared these schemes to
> the eproxy GOALS section described here:
> http://tools.ietf.org/html/draft-vidya-httpbis-explicit-proxy-ps-00.
>
> Here are the five proposed HTTP2S eproxy schemes as I understand them:
>
> 1. MITM -- This is the current way TLS is proxied that involves the
> proxy generating certs to impersonate the content server.
>
> 2. Proxy Server TLS Extension -- Described here:
> http://tools.ietf.org/html/draft-mcgrew-tls-proxy-server-01. Using a
> proposed extension to TLS, the proxy forwards the server cert to the
> client so that it can authenticate the content server. I think of this
> as MITM without impersonation, but I hope that doesn’t misrepresent
> the proposal.
>
> 3. Shared decryption key material -- This idea is described in both
> http://tools.ietf.org/html/draft-rpeon-httpbis-exproxy-00 and
>
> http://tools.ietf.org/html/draft-loreto-httpbis-trusted-proxy20-00#section-4.1
> .
> The core concept, in my understanding, is that the proxy is able to
> see the end-to-end TLS traffic in plaintext b/c the UA exports the
> session key and uploads it to the proxy.
>
> 4. Client forwards plaintext requests to secure proxy -- This idea is
> described in the loreto trusted proxy draft (link above see section
> 4.2). The concept is that two standard point-to-point (P-t-P) TLS
> sessions are established between client and proxy and proxy and server
> and then the browser simply forwards its HTTP2 requests to the proxy
> over that secure link.
>
>
> 5. Any Node Refusal -- This is the proposal I posted to the mailing
> list earlier and have re-posted here --
>
> https://github.com/bizzbyster/AnyNodeRefusal/wiki/HTTP2S-Eproxy-with-Any-Node-Refusal
> -- that leverages James’ intra-connection TLS negotiation to establish
> an unencrypted end-to-end TLS session across two point-to-point
> encrypted sessions. In Roberto’s draft, a version of this idea also
> shows up relating to an end-to-end CONNECT using a null cipher over
> two p-t-p encrypted TLS sessions. As the name implies, any node can
> refuse, data integrity is guaranteed, and the proxy cannot operate in
> stealth mode.
>
> Now to see which goals are met by each proposal...
>
> 6.2.  Goals
>
>    These are the goals of a solution aimed at making proxying explicit
>
>    in HTTP.
>
>    o  In the presence of a proxy, users' communications SHOULD at least
>
>       use a channel that is point-to-point encrypted.
>
> All meet this.
>
>    o  Users MUST be able to opt-out of communicating sensitive
>
>       information over a channel which is not end-to-end private.
>
> All but MITM meet this.
>
>    o  Content-providers MAY serve certain content only in an end-to-end
>
>       confidential fashion.
>
> Only Any Node Refusal meets this.
>
>    o  Interception proxies MUST be precluded from intercepting secure
>
>       communications between the user and the content-provider.
>
> I don’t really understand this one. Isn’t this a question of how you
> establish trust? That is not defined in any of these schemes.
>
>    o  User-agents and servers MUST know when a transforming proxy is
>
>       interposed in the communications channel.
>
> Only Any Node Refusal meets this.
>
>    o  User-agents MUST be able to detect when content requested with an
>
>       https scheme has been modified by any intermediate entity.
>
> Only Any Node Refusal meets this.
>
>    o  Entities other than the server or user-agent SHOULD still be able
>
>       to provide caching services.
>
> I think all meet this except #3 above, Shared Decryption Key Material.
> I can’t see how that scheme can provide caching services.
>
>    o  User agents MUST be able to verify that the content is in fact
>
>       served by the content provider.
>
> Only Any Node Refusal and Shared Decryption Key Material meet this.
>
>    o  A set of signaling semantics should exist which allows the
>
>       content-provider and the user to have the appropriate level of
>
>       security or privacy signaled per resource.
>
> Only Any Node Refusal meets this.
>
>    o  Ideally, HTTP URI semantics SHOULD NOT change, but if it does, it
>
>       must remain backwards-compatible.
>
> All meet this, I believe.
>
>    o  Configuration and deployment of proxies should be as easy as
>
>       currently used solutions.
>
> I think this really depends on how trust is established, which isn’t
> covered by these proposals.
>
>    o  Introduction of explicit proxying MUST NOT require a flag day
>
>       upgrade - in other words, it should work with existing client and
>
>       content provider implementations during the transition.
>
> I don’t think any require this.
>
> Conclusion: I think the eproxy spec has to address three difficult
> things: 1) discovery of proxies, 2) establishing trust, and 3) the
> runtime requirements of UAs, proxies, and servers as defined by the
> GOALS section above. All three are really hard problems but I think
> ANR is a step towards solving #3.
>
> Thanks,
>
> Peter
>