Re: New Version Notification for draft-nottingham-http2-encryption-03.txt

Martin Thomson <martin.thomson@gmail.com> Tue, 20 May 2014 16:57 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 624E41A04AB for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 20 May 2014 09:57:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.653
X-Spam-Level:
X-Spam-Status: No, score=-7.653 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.651, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A-jUnWgjCDAD for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Tue, 20 May 2014 09:57:01 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B9BD1A0494 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Tue, 20 May 2014 09:57:01 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1WmnJf-00067R-Bb for ietf-http-wg-dist@listhub.w3.org; Tue, 20 May 2014 16:55:04 +0000
Resent-Date: Tue, 20 May 2014 16:55:03 +0000
Resent-Message-Id: <E1WmnJf-00067R-Bb@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <martin.thomson@gmail.com>) id 1WmnJS-0005Gv-Er for ietf-http-wg@listhub.w3.org; Tue, 20 May 2014 16:54:50 +0000
Received: from mail-wg0-f43.google.com ([74.125.82.43]) by maggie.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <martin.thomson@gmail.com>) id 1WmnJR-00082I-IH for ietf-http-wg@w3.org; Tue, 20 May 2014 16:54:50 +0000
Received: by mail-wg0-f43.google.com with SMTP id l18so804896wgh.14 for <ietf-http-wg@w3.org>; Tue, 20 May 2014 09:54:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=ae0IDICbk3Xk2UPUVI4li4mFIVDN9zzw4OmlhIkDYJA=; b=0YEMzX2ocStBOGILzSTFodmsTvN5pUuSztOkbkxpV3UXTjVMBCYXXZdWORAz4YQDfE kg9Jbn/ChJKseToHs+q3XQ/sU2tiyPwCojiRtA0CdVpd8oEO2GAhDGUhTSr2eMJPuYAH Xsa3AzUiTwYzYRyQmI6ow+f6+jxO5F0Jo2nrpTJXsvDJkpqdu5ZWqSbsS1D4E3vuG/Rz EBFSjD/mjxJoWh24H/9h6+aSKGIv03Me1Y99FWnJoCR3ygJkTVv4Uiru8IcHYukVHQUb K0HGeuvjwfRBsMQKuAcFzHyDAh7DSxkcjUN17nL4+TG/t8V6fEsnPyreWHBO6MwOJwiU cobg==
MIME-Version: 1.0
X-Received: by 10.180.36.35 with SMTP id n3mr5254115wij.23.1400604863025; Tue, 20 May 2014 09:54:23 -0700 (PDT)
Received: by 10.194.235.163 with HTTP; Tue, 20 May 2014 09:54:22 -0700 (PDT)
In-Reply-To: <CAPik8yb2P5RoGMLB=OtcbnpgZd-if9FpEp0HcLQcyVMtie4Yig@mail.gmail.com>
References: <20140520034054.10225.92036.idtracker@ietfa.amsl.com> <5905C797-A8E2-417B-94AB-589C174382BA@mnot.net> <CAPik8yb2P5RoGMLB=OtcbnpgZd-if9FpEp0HcLQcyVMtie4Yig@mail.gmail.com>
Date: Tue, 20 May 2014 09:54:22 -0700
Message-ID: <CABkgnnUJ+eDyjJteYj0pDQyy3k-j+DC2io71P-p8F=ufvDEUwg@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
To: Paul Hoffman <paul.hoffman@gmail.com>
Cc: Mark Nottingham <mnot@mnot.net>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=74.125.82.43; envelope-from=martin.thomson@gmail.com; helo=mail-wg0-f43.google.com
X-W3C-Hub-Spam-Status: No, score=-3.5
X-W3C-Hub-Spam-Report: AWL=-2.735, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001
X-W3C-Scan-Sig: maggie.w3.org 1WmnJR-00082I-IH 97d0edffa283270ff3f1e1e45eb0014a
X-Original-To: ietf-http-wg@w3.org
Subject: Re: New Version Notification for draft-nottingham-http2-encryption-03.txt
Archived-At: <http://www.w3.org/mid/CABkgnnUJ+eDyjJteYj0pDQyy3k-j+DC2io71P-p8F=ufvDEUwg@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/23723
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 20 May 2014 08:26, Paul Hoffman <paul.hoffman@gmail.com> wrote:
> The new material on what might be called "alternate service pinning" has the
> advantages and faults of any of the security pinning protocols that the IETF
> makes. Please note how tortured the key pinning discussion in the websec WG
> has become; there is no reason why alternate service pinning will be any
> easier. This isn't to say that you shouldn't do it, just that you should
> expect it to be a protracted and sometimes circular discussion full of "but
> what if; so the protocol now has to".

The hope was to attract some of the expertise in the hopes that that
would help avoid all of the torture.

> Separately, the text in Section 4 concerns me because it seems easy to
> mis-implement. That is, the API flag that says "this connection is/isn't
> running under authenticated TLS" becomes critical; it is even more important
> than the API flag for "this connection is/isn't running under TLS".  Please
> consider calling this out more strongly in Section 4, and add it to the
> Security Considerations. Encouraging developers to have a unit test for
> "start a connection with unauthenticated TLS and then then try to request an
> https: resource and make sure that fails".

The idea that TLS == security is one that has been very well
socialized.  The education programme has been very effective.  So yes,
I get your point.

Maybe there's a case for further highlighting the distinction we want
to retain, at least at the broadest level of generality: https ==
secure, http == not.  That is the point of Section 6.1, but I might be
convinced that repetition of this is necessary.