Re: The future of forward proxy servers in an http/2 over TLS world
Chris Bentzel <chris@bentzel.net> Mon, 27 February 2017 01:21 UTC
Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0214912957A for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 26 Feb 2017 17:21:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.4
X-Spam-Level:
X-Spam-Status: No, score=-6.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bentzel-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M5Hg21G6PvLX for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 26 Feb 2017 17:21:15 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F67B129564 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 26 Feb 2017 17:21:15 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1ci9wr-0004gw-TT for ietf-http-wg-dist@listhub.w3.org; Mon, 27 Feb 2017 01:17:57 +0000
Resent-Date: Mon, 27 Feb 2017 01:17:57 +0000
Resent-Message-Id: <E1ci9wr-0004gw-TT@frink.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <chris@bentzel.net>) id 1ci9wl-0004dz-9s for ietf-http-wg@listhub.w3.org; Mon, 27 Feb 2017 01:17:51 +0000
Received: from mail-ua0-f177.google.com ([209.85.217.177]) by titan.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <chris@bentzel.net>) id 1ci9we-0001FX-1U for ietf-http-wg@w3.org; Mon, 27 Feb 2017 01:17:45 +0000
Received: by mail-ua0-f177.google.com with SMTP id 40so41418587uau.2 for <ietf-http-wg@w3.org>; Sun, 26 Feb 2017 17:17:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bentzel-net.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=0y3kucijgljViYwRYox5vzuHLrn8noh6Rw2/LcDWfqg=; b=ZXrAEdrfjbHtTW069n6xJQTVQdkjSo6XI5YoN4YBZxe9105vdTjsvX2+txQiDimu+C c8aDc0PPH4I7tK1FQ3U9ILuGPq7nJBhPpvFyU2oUUbAIkgHQBByjhK65i9cwNyd/KX0x bgMU2sivF/eQiZHRolavBUXXpXqKMPeOpHYh0gkqAQoQAgOfxHY9pjhbgxewHyN8Nk+M okUdfxbjQf+8RSQGX4wJICB+OkYyuygTFbHpF/ioKK420EMMb9WsW9PvMpHqtpCYxCQ6 P/L1cwM60OSNwgWXt/+drZsW/oqSW3EW8u8R0uhtPVLQXyKLnkmrU8CXGiBqnYtlvz6x 9N4Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=0y3kucijgljViYwRYox5vzuHLrn8noh6Rw2/LcDWfqg=; b=qeCaiN8BbTzHjacyUpVF/MitZcuv+1rOc7xfrs3K888TuExmejpRt/N48kdMsa717i N4Df57wamuPTiS/H+Njr1sSvBuNLuOYLyMvBlyMkT6D6K+8uWqS+t8klQnseOTv/ZHTX twqxCdEFbCkdg51QgstMKN8p7PkfBVmgzay1J1/od0eFI7PNE5J67dOU9MMzzb7cl2Ek eIynxXAsw5sNfbGIEeXwkD+NwJDKup354t6zAaAxBHXj7/k+sMMBQBZBm4NN+ko3egYf phFCcMnQcsd/DLSdnhLLBDOD4H0z0sYNr8awq260bbUVdgc+SAUC2Z0ye1q+Lj42S6xx DmWA==
X-Gm-Message-State: AMke39n/WUA1BSn8uek5V7+cpW/JoGJF2r7nJJXEjvLudsGjoCHcBTot9ZQFNpGLQ647mbzRqcR7Pan1tA2liw==
X-Received: by 10.159.37.169 with SMTP id 38mr6457138uaf.80.1488157730519; Sun, 26 Feb 2017 17:08:50 -0800 (PST)
MIME-Version: 1.0
References: <emde1bfa93-84c0-49f7-83a4-b9bed24e0276@bodybag> <CA+3+x5GV9MdYOP3gHLABe+=GVVKf7ugbMWHquuzVHGCbwY-s5w@mail.gmail.com> <44039619.275607.1487333645445.JavaMail.zimbra@laposte.net> <E5473FDB-0CBE-43F4-A5B3-7FF36DEAB32B@squid-cache.org>
In-Reply-To: <E5473FDB-0CBE-43F4-A5B3-7FF36DEAB32B@squid-cache.org>
From: Chris Bentzel <chris@bentzel.net>
Date: Mon, 27 Feb 2017 01:08:40 +0000
Message-ID: <CABCZv0rsRLSsvMTzPZV7szr8zvZ45BZ=prSEWprhuvTzmQwEXg@mail.gmail.com>
To: Francesco Chemolli <kinkie@squid-cache.org>, ietf-http-wg@w3.org
Content-Type: multipart/alternative; boundary="001a113d0efce5d1a2054978b86a"
Received-SPF: none client-ip=209.85.217.177; envelope-from=chris@bentzel.net; helo=mail-ua0-f177.google.com
X-W3C-Hub-Spam-Status: No, score=-5.2
X-W3C-Hub-Spam-Report: AWL=-1.741, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1ci9we-0001FX-1U 8a45e64db8ca9a6fdbf4198bd2e96f5f
X-Original-To: ietf-http-wg@w3.org
Subject: Re: The future of forward proxy servers in an http/2 over TLS world
Archived-At: <http://www.w3.org/mid/CABCZv0rsRLSsvMTzPZV7szr8zvZ45BZ=prSEWprhuvTzmQwEXg@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/33614
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
Hi - interesting discussion. I work on Chrome but not on UX. --- We could probably look at improving the UI around ERR_TUNNEL_CONNECTION_FAILED listed further up the thread. Thanks for bringing that up. --- I think it would be interesting to have a consistent error code(s) for responding to a CONNECT in a way that specifies the proxy is blocking it. This could help non-browser-clients understand what's going on, and even if browser clients don't want to display strings/UX provided by the proxy it would be able to provide more details. Sorry if this was already discussed (I saw 451 mentioned for example). This would ideally let users know that their access is being blocked, but would not give richer information (like who to contact) if response code with custom browser UX is used. --- In terms of showing a response body, there are two concerns: a) There have historically been a number of attacks around 407 and responses to CONNECT [1][2][3]. While these are ultimately implementation issues rather than fundamental problems, this worries me that it will likely open up another attack. b) To limit, the body would need to be treated as from a totally unique origin or even just plain text. You could imagine plain text showing up similar to a beforeunload handler or alert for example. However, these have been increasingly been abused for scams. It wouldn't be a stretch of imagination to think of a proxy which blocks access to a site with text of "Access to facebook blocked because we detected you have a virus. Call 1-800-555-1212 to talk to our technical support." Given the high prevalence of WPAD in clients it'd be a bit scary to even show text in that case. Arguably if a proxy is explicitly specified and uses https it may be reasonable to then show the text in the response body even if it doesn't work in the common case. [1]: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/pbp-final-with-update.pdf [2]: http://falseconnect.com/ [3]: https://bugs.chromium.org/p/chromium/issues/detail?id=431504 On Fri, Feb 17, 2017 at 8:04 AM Francesco Chemolli <kinkie@squid-cache.org> wrote: > > On 17 Feb 2017, at 12:14, nicolas.mailhot@laposte.net wrote: > > So there *is* blocking at the gateway level, there *will* *be* blocking at > the gateway level, the question is not whether this blocking should exist > or not, but if the user experience can be made less miserable than it is > today [...] > > > ..Following up with with 10 minutes of open stage enthusiastic standing > ovation. > > I support this description of the state of things, and the conclusion. > Let's remember that there's not only browsers: HTTP is taking over the > role of transport for most remaining holdouts of other mechanisms for > sever-to-server inter-organisation message passing. In this use-case the > user interface is obviously much less of an issue (if at all), but the > use-case for to a centralised HTTP L7 forward control point is very much > there. > > I've had several conversations with UA contributors over this, and from > what I recall everyone agrees that the presentation side of things is the > most critical aspect; I hope this thread will renew interest in finding a > solution, ideally shared so to give end-users the least surprise. > > Francesco Chemolli (kinkie) > Squid >
- The future of forward proxy servers in an http/2 … Adrien de Croy
- Re: The future of forward proxy servers in an htt… Dave Dolson
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Poul-Henning Kamp
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Alex Rousskov
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Patrick McManus
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Patrick McManus
- Re: The future of forward proxy servers in an htt… Ryan Hamilton
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Patrick McManus
- Re: The future of forward proxy servers in an htt… Alex Rousskov
- RE: The future of forward proxy servers in an htt… Mike Bishop
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Alex Rousskov
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Tom Bergan
- Re: The future of forward proxy servers in an htt… Alex Rousskov
- Re: The future of forward proxy servers in an htt… Poul-Henning Kamp
- Re: The future of forward proxy servers in an htt… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Tom Bergan
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Roland Zink
- Re: The future of forward proxy servers in an htt… Ryan Hamilton
- Re: The future of forward proxy servers in an htt… Amos Jeffries
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Willy Tarreau
- Re: The future of forward proxy servers in an htt… Tom Bergan
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… nicolas.mailhot
- Re: The future of forward proxy servers in an htt… Francesco Chemolli
- Re: The future of forward proxy servers in an htt… Chris Bentzel
- Re: The future of forward proxy servers in an htt… Mark Nottingham
- Re: The future of forward proxy servers in an htt… Alex Rousskov
- Re: The future of forward proxy servers in an htt… Mark Nottingham
- Re: The future of forward proxy servers in an htt… Alex Rousskov
- Re: The future of forward proxy servers in an htt… Willy Tarreau
- Re: The future of forward proxy servers in an htt… Poul-Henning Kamp
- Re: The future of forward proxy servers in an htt… Patrick McManus
- Re: The future of forward proxy servers in an htt… Willy Tarreau
- Re: The future of forward proxy servers in an htt… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Alex Rousskov
- Re: The future of forward proxy servers in an htt… Poul-Henning Kamp
- Re: The future of forward proxy servers in an htt… Roland Zink
- UI | Re: The future of forward proxy servers in a… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Poul-Henning Kamp
- forward HTTPS proxy | Re: The future of forward p… Kari Hurtta
- RE: forward HTTPS proxy | Re: The future of forwa… Mike Bishop
- Re: forward HTTPS proxy | Re: The future of forwa… Alex Rousskov
- Re: forward HTTPS proxy | Re: The future of forwa… Kari Hurtta
- Re: forward HTTPS proxy | Re: The future of forwa… Kari Hurtta
- Re: forward HTTPS proxy | Re: The future of forwa… Kari Hurtta
- Re: The future of forward proxy servers in an htt… Adrien de Croy
- Re: The future of forward proxy servers in an htt… Tom Bergan