Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem
Greg Wilkins <gregw@intalio.com> Thu, 18 September 2014 09:47 UTC
Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C25481A032A for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 18 Sep 2014 02:47:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.931
X-Spam-Level:
X-Spam-Status: No, score=-7.931 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-1.652, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LHiEV0fO1ONh for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 18 Sep 2014 02:47:48 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1570F1A0009 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 18 Sep 2014 02:47:47 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1XUYGo-0002fs-GN for ietf-http-wg-dist@listhub.w3.org; Thu, 18 Sep 2014 09:44:58 +0000
Resent-Date: Thu, 18 Sep 2014 09:44:58 +0000
Resent-Message-Id: <E1XUYGo-0002fs-GN@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <gregw@intalio.com>) id 1XUYGT-0002eW-7J for ietf-http-wg@listhub.w3.org; Thu, 18 Sep 2014 09:44:37 +0000
Received: from mail-wg0-f49.google.com ([74.125.82.49]) by maggie.w3.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.72) (envelope-from <gregw@intalio.com>) id 1XUYGR-0005xe-AD for ietf-http-wg@w3.org; Thu, 18 Sep 2014 09:44:37 +0000
Received: by mail-wg0-f49.google.com with SMTP id m15so592577wgh.8 for <ietf-http-wg@w3.org>; Thu, 18 Sep 2014 02:44:08 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:content-type; bh=OO16DMIL8CTFcNJrQLhxXYUO7X+B9YQ0Md9tjf2kKb0=; b=IPY0SEoNq2oBsCSCxJKpNWYFDHwWGgUXSM79R6gUEfyQWYMt/b1ta56lPJxvFqp5M3 J1f6W2Pyd1ZA8ShILeHe81XVjPpsUJXLG+zjLoyVBYfaF9F8i/w6TbHCKYzNbasbx6Wc IF+kVkEIuid7HGXNq7k4bGiaygbjvRwcVXkcX7OL1ickYTfpYYQy1+ZXxtGzu2JDAYDO ptZeqxSrArwNaJfqWR2a+wHR19706h7HesG8E5+sxfHyKrditYIGPTi47opCKqymEkBh iWcQyiEv5PRIL9RecIbMnZ4Qa531Wc482eSJsYUDG/pctFP1+Rp27BwJN7tVb/U88Kdp J1ig==
X-Gm-Message-State: ALoCoQmvhqFgE2Kbsg+iZUyhA97bPQICzKb/wE7onBtYT6+iuIVuyMGKd82JyFwVNp4PluYR/G4x
MIME-Version: 1.0
X-Received: by 10.194.103.200 with SMTP id fy8mr2082565wjb.123.1411033448556; Thu, 18 Sep 2014 02:44:08 -0700 (PDT)
Received: by 10.194.169.98 with HTTP; Thu, 18 Sep 2014 02:44:08 -0700 (PDT)
In-Reply-To: <CAH_hAJHrhY1nQAHQ_o0uVPuqccLDzYAyNEuZ6q1Dh4ePDBKA_A@mail.gmail.com>
References: <CAH_y2NF+sP9BmYuD4QbeHpwC_uj67itzaAFCnRVC6f--KDYOgg@mail.gmail.com> <CAOdDvNopynmwvwWLXvuC0q7skunFXcfRoVHe9s7BKcoCwaBgWQ@mail.gmail.com> <CAH_y2NGXz7e3ejqy_rD=39=yYp3+cS1Dm6c3yFEYZg6tsUp5VQ@mail.gmail.com> <CABkgnnWAdm1TLP2XCKNU-6RPACLfooQV73R7Gpoemv+9PNULCA@mail.gmail.com> <CAH_y2NFLjok-NRJtOw1vmSy68sf393iSOgA4K599q0BSBqbNgA@mail.gmail.com> <CABkgnnU-CMtv8KvYU9n+QoPBOBshtQv3RfLy2qw=qVNb2O-qGg@mail.gmail.com> <CAH_y2NHrbH5Objwhq9E89QexhQtND4uOdy8q7OEckTCU17WqKg@mail.gmail.com> <CAH_y2NErRd4rxinSzEH3-uTjdWVkZu9o6sSKSf47LxfPFTRONw@mail.gmail.com> <20140917073241.GA7665@LK-Perkele-VII> <CAFewVt4pxE+9NpzYuzMKGmEdrDXzk50mC99ZbrM6M-uEoKXrHA@mail.gmail.com> <CAH_y2NGYcDvPcxDvaTRBP3p4Pnb7gw39WUDY3bNVnOGQjBgciQ@mail.gmail.com> <CAFewVt7+UAJYfKAR6DRZi_mqdzSaYw6L-pT1qg=UyOaP1ojhTw@mail.gmail.com> <CAH_y2NEhAEaPiUgi_vX6Oimw+Y-k3WrnL0gJZKPxQ8KZVuFVfw@mail.gmail.com> <CABkgnnU6C+TzJzdeQZhwXucuPUrPh1yyp1cpRd9jSePMjAnONQ@mail.gmail.com> <541A653C.4050903@gmail.com> <CAH_y2NFKqH8HGfXk0VR2BZ3n1vKPXeQkM0-qVjGhnz_TFGAwew@mail.gmail.com> <CAH_hAJHrhY1nQAHQ_o0uVPuqccLDzYAyNEuZ6q1Dh4ePDBKA_A@mail.gmail.com>
Date: Thu, 18 Sep 2014 19:44:08 +1000
Message-ID: <CAH_y2NFdO-0KLhfE4+W4W9Gz0yR1dXm0c7bXsN1keZPK4cDL=g@mail.gmail.com>
From: Greg Wilkins <gregw@intalio.com>
To: Cory Benfield <cory@lukasa.co.uk>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="047d7bfe952277c25c050353d360"
Received-SPF: permerror client-ip=74.125.82.49; envelope-from=gregw@intalio.com; helo=mail-wg0-f49.google.com
X-W3C-Hub-Spam-Status: No, score=-3.8
X-W3C-Hub-Spam-Report: AWL=-3.100, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7
X-W3C-Scan-Sig: maggie.w3.org 1XUYGR-0005xe-AD d04d8e01fe843b3bdd8d2c4feb159d3e
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem
Archived-At: <http://www.w3.org/mid/CAH_y2NFdO-0KLhfE4+W4W9Gz0yR1dXm0c7bXsN1keZPK4cDL=g@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/27121
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
Cory, I accept that 'morally corrupt' was an overly flippant way to describe commercial competition between implementations that may drive less than secure choices (and again I don't think browser vendors are doing a particular bad job on that front - it was a hypothetical acceptance of the premise). But competition also exists between servers and protocols. If using a server that provides h2 or switching h2 on results in connection failures then users are going to use other servers or switch off h2. That is hardly an incentive for h2 adoption. You suggest that jetty is going to be a bad web citizen by not implementing 9.2.2. That is not the case, I very much would like to implement 9.2.2 and but I cannot see how I can do that in a future proof and/or portable way. Jetty runs on every thing from mobile pones to ancient main frames, so I have a wide range of platforms that I need to be concerned about. For now I'm probably going to go with some hard coded regex that will approximate the restriction for todays popular ciphers, but that's just a timebomb that will wait until millions of implementations are deployed with differing implementations of 9.2.2 and then a new cipher will detonate the bomb! If it is really necessary to discriminate between which ciphers are acceptable for which protocols, then ALPN needs to be enhanced so the client can communicate it's list of h2 acceptable ciphers to the server, as even the best faith attempt of the server to implement 9.2.2 will eventually guess wrong and connection failure will occur. 9.2.2 may be laudable, but it is unimplementable in any robust future proof way. At the very least it needs to specify a proper fallback/retry mechanism for if the client and server disagree on acceptable ciphers. I have still not heard how a new cipher like my hypothetical XYZ could be deployed into a web where the current 9.2.2 is widely implemented. regards On 18 September 2014 18:33, Cory Benfield <cory@lukasa.co.uk> wrote: > Greg, I've rearranged your post below because I found it flowed weirdly. > > On 18 September 2014 06:21, Greg Wilkins <gregw@intalio.com> wrote: > > I don't actually agree with the premise that browser vendors are that > > morally corrupt. I think they have a difficult line to walk between > > offering reasonable security and wide spread connectivity. If they > are > > offering old ciphers then I am sure that there are significant origin > > resources that can only be accessed with them. > > Alright, this makes sense. We agree on the original premise, but let > me state it outright: all user-agents are strongly incentivized to > make as many connections as they possibly can. Being unable to provide > a resource to a user almost always costs you that user. Users rarely > pick a browser (e.g. Chrome), try to connect to a resource and find > that it fails where another browser (say IE) succeeded, and then say > "Thankyou Chrome for protecting me from myself!" They say "Chrome > sucks and doesn't work". This is the exact same reason Microsoft have > long had a team whose sole purpose is to specially code bugs *back in* > to new Windows versions to prevent programs breaking. > > Most users will never thank a user-agent for making them more secure, > but they will always blame a user-agent for refusing to fetch > information for them. If there is a competitor user-agent that makes > them less secure but gives them access to a resource they want, > they'll just switch to that. Given that most browsers are not > charities, it cannot be a surprise that they aim to increase their > market share. Everyone is very nice in this forum because civility is > good and the world is made better by us all getting a bite at the > apple, but don't for a moment think that we're not all in some form of > competition. > > > So he is saying that because browser vendor value market share more than > > their users security it is apparently our job to withhold the h2 > protocol or > > just fail to connect in an effort to push them towards being good web > > citizens. > > No, this responsibility goes both ways. I, a user-agent provider, am > just as responsible as you to ensure good web citizenship. If hyper > connects to Jetty, does the ALPN handshake, and then finds a block > cipher has been negotiated, I am just as responsible as you for > tearing that connection down. The correct statement here is that "good > web citizens" are responsible for holding "bad web citizens" to > account. > > I am confident that browsers will abide by the requirement in the > draft spec to tear down h2 connections to servers that don't negotiate > secure ciphers per 9.2.2. Everyone on this list will be working > together on this point (I hope). So the responsibility is not just for > you. > > > But let's accept the premise that browser vendors are indeed morally > corrupt > > and will deploy insecure ciphers rather than lose market share. > > Why would anyone accept this premise? Especially with the loaded > language. I will accept a related premise: "browser vendors are > running businesses, and have an inclination to serve their own > financial best interests as well as the interests of their users". I > don't assume that *anyone* on this list is morally corrupt: I have > seen no evidence for this fact. > > > Let's also > > assume that origin server deployers are also prepared to accept those bad > > ciphers and make their content available over them... I have absolutely > no > > idea how allowing those two to tango over http/1 rather than h2 pushes > them > > to any better security practises. > > It doesn't. None of the design goals I have ever seen for h2 include > making http/1 more secure. Why would they? And besides, what could the > spec possibly say? "If you negotiate h2 with insecure ciphers, tear > down the connection and refuse to ever allow connections from that > peer again"? If the connection fails, *clearly* a http/1 connection > can be made, so any ruling in the h2 spec does nothing to prevent what > you just discussed. > > > Perhaps the failing abysmally to connect > > part might be a bit more persuasive, but I expect that is more likely to > > make them remove the good ciphers. > > Yes it would. Again, server vendors want as many clients to be able to > connect to them as possible. > > > If failure to connect is a driver to better cipher policy, then we need > not > > hobble h2 to achieve that. Instead the browser vendors and server > deployers > > can simply grow a pair and remove the bad ciphers. > > Failing to connect is not a driver to good security policy, it's a > driver to *bad* security policy. Good security policy refuses > connections, bad security policy accepts them. And there will always > be pressure to make connections where others cannot. This is why > browsers let you browse to website with expired certs, it's why > libraries let you turn off certificate verification, and it's why > servers let you say you'll accept the TLS NULL cipher: because if they > don't, others will. > > I don't think anyone in this list is a bad internet citizen because > we're all here trying to make it better! We've all got a vested > interest in the web being the best it can be. The problem is that us > taking the moral high ground leads to users picking up projects that > don't take the moral high ground. Absolutism here doesn't help anyone. > We have to work with what we've got. We have to be as secure as we can > be without driving users to implementations that don't care about > security. > > Greg, I'm genuinely sympathetic to your original complaint. I've had > problem with cipher suites as well, and have accepted that the best I > can do is fail if the server screwed up. I don't like that approach. > But I think the goal of section 9.2.2 is laudable and I'd be loathe to > remove it without replacing it with something equally important. > > Cory > -- Greg Wilkins <gregw@intalio.com> http://eclipse.org/jetty HTTP, SPDY, Websocket server and client that scales http://www.webtide.com advice and support for jetty and cometd.
- 9.2.2 Cipher fallback and FF<->Jetty interop prob… Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Ilari Liusvaara
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Brian Smith
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roy T. Fielding
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roy T. Fielding
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Ilari Liusvaara
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Cory Benfield
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Ilari Liusvaara
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roy T. Fielding
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jim Manico
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Mark Nottingham
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Patrick McManus
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Willy Tarreau
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Julian Reschke
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Jason Greene
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Greg Wilkins
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Amos Jeffries
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Stuart Douglas
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Roland Zink
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Simone Bordet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Michael Sweet
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Eric Rescorla
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Andrei Popov
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … Martin Thomson
- RE: 9.2.2 Cipher fallback and FF<->Jetty interop … Rob Trace
- Re: 9.2.2 Cipher fallback and FF<->Jetty interop … John Mattsson