Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem
Cory Benfield <cory@lukasa.co.uk> Thu, 18 September 2014 08:37 UTC
Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 277211A86DE for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 18 Sep 2014 01:37:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.932
X-Spam-Level:
X-Spam-Status: No, score=-7.932 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-1.652, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fYnha-cBG0qo for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 18 Sep 2014 01:37:55 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4FD561A8727 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 18 Sep 2014 01:37:33 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1XUXAT-0000TF-7S for ietf-http-wg-dist@listhub.w3.org; Thu, 18 Sep 2014 08:34:21 +0000
Resent-Date: Thu, 18 Sep 2014 08:34:21 +0000
Resent-Message-Id: <E1XUXAT-0000TF-7S@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <cory@lukasa.co.uk>) id 1XUX9q-0000Re-N5 for ietf-http-wg@listhub.w3.org; Thu, 18 Sep 2014 08:33:42 +0000
Received: from mail-qg0-f50.google.com ([209.85.192.50]) by lisa.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <cory@lukasa.co.uk>) id 1XUX9p-0004bl-II for ietf-http-wg@w3.org; Thu, 18 Sep 2014 08:33:42 +0000
Received: by mail-qg0-f50.google.com with SMTP id z60so639153qgd.23 for <ietf-http-wg@w3.org>; Thu, 18 Sep 2014 01:33:15 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=1ifaDV8N5uk1efj43Gzq1yRxX0wm9Pecg8ZmbhNuoNs=; b=J8sBsmJwYluDLfVld0DF//EZr4lr+nb0o8htsBl3Ew0/fcRahFy1vNddfTrgMHK/+y 9FaAi8ijqSMIBTT3ONl7V/Bb0Jbp2q8/HBKVshtljaCEsXxlAu94zL8Rn2CMNnuvqzmD XS5FpwYfr4VtYE7/6YmoNmroLZQ3PR4ne8zfiX2M3SMP1QV1PZYs9LbsOl0ltF8814oI 7FnLhfMkhNyoZ/y3vG1SJEpFjZjNBRhomOysVNnLkOiSgQiVoZk6PJr8KZW/HHQBBfFn 1cmVxGQxGY8VoNGN6Rdl3EXGAnwstIjqXYfdxv0o60W64iePO4NZAb77ix3R+LYjjEzx 19NA==
X-Gm-Message-State: ALoCoQn/GcXj6TdtV7yHbuXkZXynfcZKYERiFP44pb/cCSzzqukEYtgbm6WqQSdDjCHTQAOXNLkS
MIME-Version: 1.0
X-Received: by 10.224.126.202 with SMTP id d10mr5942624qas.22.1411029195520; Thu, 18 Sep 2014 01:33:15 -0700 (PDT)
Received: by 10.229.90.134 with HTTP; Thu, 18 Sep 2014 01:33:15 -0700 (PDT)
X-Originating-IP: [2620:104:4001:73:88b1:758b:80e7:3419]
In-Reply-To: <CAH_y2NFKqH8HGfXk0VR2BZ3n1vKPXeQkM0-qVjGhnz_TFGAwew@mail.gmail.com>
References: <CAH_y2NF+sP9BmYuD4QbeHpwC_uj67itzaAFCnRVC6f--KDYOgg@mail.gmail.com> <CAOdDvNopynmwvwWLXvuC0q7skunFXcfRoVHe9s7BKcoCwaBgWQ@mail.gmail.com> <CAH_y2NGXz7e3ejqy_rD=39=yYp3+cS1Dm6c3yFEYZg6tsUp5VQ@mail.gmail.com> <CABkgnnWAdm1TLP2XCKNU-6RPACLfooQV73R7Gpoemv+9PNULCA@mail.gmail.com> <CAH_y2NFLjok-NRJtOw1vmSy68sf393iSOgA4K599q0BSBqbNgA@mail.gmail.com> <CABkgnnU-CMtv8KvYU9n+QoPBOBshtQv3RfLy2qw=qVNb2O-qGg@mail.gmail.com> <CAH_y2NHrbH5Objwhq9E89QexhQtND4uOdy8q7OEckTCU17WqKg@mail.gmail.com> <CAH_y2NErRd4rxinSzEH3-uTjdWVkZu9o6sSKSf47LxfPFTRONw@mail.gmail.com> <20140917073241.GA7665@LK-Perkele-VII> <CAFewVt4pxE+9NpzYuzMKGmEdrDXzk50mC99ZbrM6M-uEoKXrHA@mail.gmail.com> <CAH_y2NGYcDvPcxDvaTRBP3p4Pnb7gw39WUDY3bNVnOGQjBgciQ@mail.gmail.com> <CAFewVt7+UAJYfKAR6DRZi_mqdzSaYw6L-pT1qg=UyOaP1ojhTw@mail.gmail.com> <CAH_y2NEhAEaPiUgi_vX6Oimw+Y-k3WrnL0gJZKPxQ8KZVuFVfw@mail.gmail.com> <CABkgnnU6C+TzJzdeQZhwXucuPUrPh1yyp1cpRd9jSePMjAnONQ@mail.gmail.com> <541A653C.4050903@gmail.com> <CAH_y2NFKqH8HGfXk0VR2BZ3n1vKPXeQkM0-qVjGhnz_TFGAwew@mail.gmail.com>
Date: Thu, 18 Sep 2014 09:33:15 +0100
Message-ID: <CAH_hAJHrhY1nQAHQ_o0uVPuqccLDzYAyNEuZ6q1Dh4ePDBKA_A@mail.gmail.com>
From: Cory Benfield <cory@lukasa.co.uk>
To: Greg Wilkins <gregw@intalio.com>
Cc: Stuart Douglas <stuart.w.douglas@gmail.com>, Martin Thomson <martin.thomson@gmail.com>, Brian Smith <brian@briansmith.org>, Ilari Liusvaara <ilari.liusvaara@elisanet.fi>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=209.85.192.50; envelope-from=cory@lukasa.co.uk; helo=mail-qg0-f50.google.com
X-W3C-Hub-Spam-Status: No, score=-4.3
X-W3C-Hub-Spam-Report: AWL=-1.698, BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001
X-W3C-Scan-Sig: lisa.w3.org 1XUX9p-0004bl-II 8c2563b0b1e8d3380b500326385bb0a0
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem
Archived-At: <http://www.w3.org/mid/CAH_hAJHrhY1nQAHQ_o0uVPuqccLDzYAyNEuZ6q1Dh4ePDBKA_A@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/27119
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
Greg, I've rearranged your post below because I found it flowed weirdly. On 18 September 2014 06:21, Greg Wilkins <gregw@intalio.com> wrote: > I don't actually agree with the premise that browser vendors are that > morally corrupt. I think they have a difficult line to walk between > offering reasonable security and wide spread connectivity. If they are > offering old ciphers then I am sure that there are significant origin > resources that can only be accessed with them. Alright, this makes sense. We agree on the original premise, but let me state it outright: all user-agents are strongly incentivized to make as many connections as they possibly can. Being unable to provide a resource to a user almost always costs you that user. Users rarely pick a browser (e.g. Chrome), try to connect to a resource and find that it fails where another browser (say IE) succeeded, and then say "Thankyou Chrome for protecting me from myself!" They say "Chrome sucks and doesn't work". This is the exact same reason Microsoft have long had a team whose sole purpose is to specially code bugs *back in* to new Windows versions to prevent programs breaking. Most users will never thank a user-agent for making them more secure, but they will always blame a user-agent for refusing to fetch information for them. If there is a competitor user-agent that makes them less secure but gives them access to a resource they want, they'll just switch to that. Given that most browsers are not charities, it cannot be a surprise that they aim to increase their market share. Everyone is very nice in this forum because civility is good and the world is made better by us all getting a bite at the apple, but don't for a moment think that we're not all in some form of competition. > So he is saying that because browser vendor value market share more than > their users security it is apparently our job to withhold the h2 protocol or > just fail to connect in an effort to push them towards being good web > citizens. No, this responsibility goes both ways. I, a user-agent provider, am just as responsible as you to ensure good web citizenship. If hyper connects to Jetty, does the ALPN handshake, and then finds a block cipher has been negotiated, I am just as responsible as you for tearing that connection down. The correct statement here is that "good web citizens" are responsible for holding "bad web citizens" to account. I am confident that browsers will abide by the requirement in the draft spec to tear down h2 connections to servers that don't negotiate secure ciphers per 9.2.2. Everyone on this list will be working together on this point (I hope). So the responsibility is not just for you. > But let's accept the premise that browser vendors are indeed morally corrupt > and will deploy insecure ciphers rather than lose market share. Why would anyone accept this premise? Especially with the loaded language. I will accept a related premise: "browser vendors are running businesses, and have an inclination to serve their own financial best interests as well as the interests of their users". I don't assume that *anyone* on this list is morally corrupt: I have seen no evidence for this fact. > Let's also > assume that origin server deployers are also prepared to accept those bad > ciphers and make their content available over them... I have absolutely no > idea how allowing those two to tango over http/1 rather than h2 pushes them > to any better security practises. It doesn't. None of the design goals I have ever seen for h2 include making http/1 more secure. Why would they? And besides, what could the spec possibly say? "If you negotiate h2 with insecure ciphers, tear down the connection and refuse to ever allow connections from that peer again"? If the connection fails, *clearly* a http/1 connection can be made, so any ruling in the h2 spec does nothing to prevent what you just discussed. > Perhaps the failing abysmally to connect > part might be a bit more persuasive, but I expect that is more likely to > make them remove the good ciphers. Yes it would. Again, server vendors want as many clients to be able to connect to them as possible. > If failure to connect is a driver to better cipher policy, then we need not > hobble h2 to achieve that. Instead the browser vendors and server deployers > can simply grow a pair and remove the bad ciphers. Failing to connect is not a driver to good security policy, it's a driver to *bad* security policy. Good security policy refuses connections, bad security policy accepts them. And there will always be pressure to make connections where others cannot. This is why browsers let you browse to website with expired certs, it's why libraries let you turn off certificate verification, and it's why servers let you say you'll accept the TLS NULL cipher: because if they don't, others will. I don't think anyone in this list is a bad internet citizen because we're all here trying to make it better! We've all got a vested interest in the web being the best it can be. The problem is that us taking the moral high ground leads to users picking up projects that don't take the moral high ground. Absolutism here doesn't help anyone. We have to work with what we've got. We have to be as secure as we can be without driving users to implementations that don't care about security. Greg, I'm genuinely sympathetic to your original complaint. I've had problem with cipher suites as well, and have accepted that the best I can do is fail if the server screwed up. I don't like that approach. But I think the goal of section 9.2.2 is laudable and I'd be loathe to remove it without replacing it with something equally important. Cory
- 9.2.2 Cipher fallback and FF<->Jetty interop prob… Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Ilari Liusvaara
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roy T. Fielding
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roy T. Fielding
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Ilari Liusvaara
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Ilari Liusvaara
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roy T. Fielding
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jim Manico
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Mark Nottingham
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Julian Reschke
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Rob Trace
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … John Mattsson