Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem

Willy Tarreau <w@1wt.eu> Fri, 19 September 2014 06:11 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B260F1A884E for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 18 Sep 2014 23:11:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.554
X-Spam-Level:
X-Spam-Status: No, score=-8.554 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-1.652, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rOqWt_U_bKX4 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 18 Sep 2014 23:11:27 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A297A1A883F for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 18 Sep 2014 23:11:27 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1XUrNX-00069Q-He for ietf-http-wg-dist@listhub.w3.org; Fri, 19 Sep 2014 06:09:11 +0000
Resent-Date: Fri, 19 Sep 2014 06:09:11 +0000
Resent-Message-Id: <E1XUrNX-00069Q-He@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <w@1wt.eu>) id 1XUrN9-0005vt-H5 for ietf-http-wg@listhub.w3.org; Fri, 19 Sep 2014 06:08:47 +0000
Received: from 1wt.eu ([62.212.114.60]) by maggie.w3.org with esmtp (Exim 4.72) (envelope-from <w@1wt.eu>) id 1XUrN8-0004k6-L0 for ietf-http-wg@w3.org; Fri, 19 Sep 2014 06:08:47 +0000
Received: (from willy@localhost) by mail.home.local (8.14.4/8.14.4/Submit) id s8J689HC014073; Fri, 19 Sep 2014 08:08:09 +0200
Date: Fri, 19 Sep 2014 08:08:09 +0200
From: Willy Tarreau <w@1wt.eu>
To: Cory Benfield <cory@lukasa.co.uk>
Cc: Greg Wilkins <gregw@intalio.com>, Stuart Douglas <stuart.w.douglas@gmail.com>, Martin Thomson <martin.thomson@gmail.com>, Brian Smith <brian@briansmith.org>, Ilari Liusvaara <ilari.liusvaara@elisanet.fi>, HTTP Working Group <ietf-http-wg@w3.org>
Message-ID: <20140919060809.GB13993@1wt.eu>
References: <CAH_y2NErRd4rxinSzEH3-uTjdWVkZu9o6sSKSf47LxfPFTRONw@mail.gmail.com> <20140917073241.GA7665@LK-Perkele-VII> <CAFewVt4pxE+9NpzYuzMKGmEdrDXzk50mC99ZbrM6M-uEoKXrHA@mail.gmail.com> <CAH_y2NGYcDvPcxDvaTRBP3p4Pnb7gw39WUDY3bNVnOGQjBgciQ@mail.gmail.com> <CAFewVt7+UAJYfKAR6DRZi_mqdzSaYw6L-pT1qg=UyOaP1ojhTw@mail.gmail.com> <CAH_y2NEhAEaPiUgi_vX6Oimw+Y-k3WrnL0gJZKPxQ8KZVuFVfw@mail.gmail.com> <CABkgnnU6C+TzJzdeQZhwXucuPUrPh1yyp1cpRd9jSePMjAnONQ@mail.gmail.com> <541A653C.4050903@gmail.com> <CAH_y2NFKqH8HGfXk0VR2BZ3n1vKPXeQkM0-qVjGhnz_TFGAwew@mail.gmail.com> <CAH_hAJHrhY1nQAHQ_o0uVPuqccLDzYAyNEuZ6q1Dh4ePDBKA_A@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAH_hAJHrhY1nQAHQ_o0uVPuqccLDzYAyNEuZ6q1Dh4ePDBKA_A@mail.gmail.com>
User-Agent: Mutt/1.4.2.3i
Received-SPF: pass client-ip=62.212.114.60; envelope-from=w@1wt.eu; helo=1wt.eu
X-W3C-Hub-Spam-Status: No, score=-3.4
X-W3C-Hub-Spam-Report: AWL=-2.726, RP_MATCHES_RCVD=-0.651, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001
X-W3C-Scan-Sig: maggie.w3.org 1XUrN8-0004k6-L0 a3cbac0ccfe5426b68c129c3755265b9
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 9.2.2 Cipher fallback and FF<->Jetty interop problem
Archived-At: <http://www.w3.org/mid/20140919060809.GB13993@1wt.eu>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/27132
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Thu, Sep 18, 2014 at 09:33:15AM +0100, Cory Benfield wrote:
> I, a user-agent provider, am
> just as responsible as you to ensure good web citizenship. If hyper
> connects to Jetty, does the ALPN handshake, and then finds a block
> cipher has been negotiated, I am just as responsible as you for
> tearing that connection down. The correct statement here is that "good
> web citizens" are responsible for holding "bad web citizens" to
> account.

I disagree hre, only the admin knows in what context agents are deployed
and what security level is acceptable/accepted. Browser vendors have no
idea what usage is made from their product. If I'm using your browser to
retrieve photos from my low-level weather satellite in space for whom it's
extremely expensive to use higher crypto, it's *my* problem. And if I set
up an emergency server to cut the power in a datacenter using a 4096 bit
key and a cipher that is not supported by 9.2.2 because I feel it's more
secure than what is currently required, it's my decision as well.

I've always felt that the H2 spec is walking on the TLS group's feet here.
Inciting servers to increase their key length has always been done by cert
vendors, and browsers have always followed this support very early and this
model has been working for decades now. There's no reason for suddenly
breaking the net or making it harder to upgrade crypto there because the
algorithms are written black on white in the layer 7 protocol spec, which
also supports being transported over a clear medium!

Just like Roy, I won't implement any such control and will leave it to
the admin to configure the proper ciphers for this, because this is the
correct thing to do.

Willy