Re: 2.2. Interaction with "https" URIs | Re: Op-sec simplification
Kari Hurtta <hurtta-ietf@elmme-mailer.org> Wed, 02 November 2016 17:29 UTC
Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 387F3129463 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 2 Nov 2016 10:29:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.398
X-Spam-Level:
X-Spam-Status: No, score=-8.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-1.497, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qBqT-z6E7MzJ for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 2 Nov 2016 10:29:20 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A28CC1296F5 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Wed, 2 Nov 2016 10:29:16 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1c1zHf-00031h-Ft for ietf-http-wg-dist@listhub.w3.org; Wed, 02 Nov 2016 17:25:07 +0000
Resent-Date: Wed, 02 Nov 2016 17:25:07 +0000
Resent-Message-Id: <E1c1zHf-00031h-Ft@frink.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <hurtta@siilo.fmi.fi>) id 1c1zHb-0001KB-Gm for ietf-http-wg@listhub.w3.org; Wed, 02 Nov 2016 17:25:03 +0000
Received: from smtpvgate.fmi.fi ([193.166.223.36]) by titan.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.84_2) (envelope-from <hurtta@siilo.fmi.fi>) id 1c1zHV-0006ZL-2a for ietf-http-wg@w3.org; Wed, 02 Nov 2016 17:24:58 +0000
Received: from souk.fmi.fi (souk.fmi.fi [193.166.211.113]) (envelope-from hurtta@siilo.fmi.fi) by smtpVgate.fmi.fi (8.13.8/8.13.8/smtpgate-20161014/smtpVgate) with ESMTP id uA2HOQEd014324 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 2 Nov 2016 19:24:26 +0200
Received: from shell.siilo.fmi.fi by souk.fmi.fi with ESMTP id uA2HOQKV012222 ; Wed, 2 Nov 2016 19:24:26 +0200
Received: from shell.siilo.fmi.fi ([127.0.0.1]) by shell.siilo.fmi.fi with ESMTP id uA2HOPcc018251 ; Wed, 2 Nov 2016 19:24:26 +0200
Received: by shell.siilo.fmi.fi id uA2HOMUm018250; Wed, 2 Nov 2016 19:24:22 +0200
Message-Id: <201611021724.uA2HOMUm018250@shell.siilo.fmi.fi>
In-Reply-To: <CABkgnnU=MshyG2bRBy9hc-wdg6LdtjzxiRR-gXc-HUzozjNMtQ@mail.gmail.com>
References: <20161031053239.E9C6D12F5D@welho-filter3.welho.com> <20161101172202.BE19F12310@welho-filter1.welho.com> <CABkgnnWhcp_tVx9M9FTOdSF-U5EoAzdNNVZaYzjdxUGhHydX7w@mail.gmail.com> <201611020739.uA27dCo9001992@shell.siilo.fmi.fi> <CABkgnnU=MshyG2bRBy9hc-wdg6LdtjzxiRR-gXc-HUzozjNMtQ@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>, HTTP working group mailing list <ietf-http-wg@w3.org>
Date: Wed, 02 Nov 2016 19:24:22 +0200
Sender: hurtta@siilo.fmi.fi
From: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
CC: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
X-Mailer: ELM [version ME+ 2.5 PLalpha43]
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="UTF-8"
X-Filter: smtpVgate.fmi.fi: 3 received headers rewritten with id 20161102/36365/01
X-Filter: smtpVgate.fmi.fi: ID 36372/01, 1 parts scanned for known viruses
X-Filter: souk.fmi.fi: ID 0185/01, 1 parts scanned for known viruses
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-3.0 (smtpVgate.fmi.fi [193.166.223.36]); Wed, 02 Nov 2016 19:24:28 +0200 (EET)
Received-SPF: none client-ip=193.166.223.36; envelope-from=hurtta@siilo.fmi.fi; helo=smtpVgate.fmi.fi
X-W3C-Hub-Spam-Status: No, score=-6.3
X-W3C-Hub-Spam-Report: AWL=-0.094, BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.294, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1c1zHV-0006ZL-2a 928e3ad0741a6caa89f43cb561da7e2b
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 2.2. Interaction with "https" URIs | Re: Op-sec simplification
Archived-At: <http://www.w3.org/mid/201611021724.uA2HOMUm018250@shell.siilo.fmi.fi>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/32812
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
( was off-list ) Martin Thomson <martin.thomson@gmail.com>: (Wed Nov 2 17:37:55 2016) > On 2 November 2016 at 18:39, Kari Hurtta <hurtta-ietf@elmme-mailer.org> wrote: > > Hmm. Is there requirement that authority must not serve > > /.well-known/http-opportunistic with https -origin unless > > http and https -origins provide identical resourses and processing ? > > The draft currently doesn't say anything about the > https://.../.well.known/http-opportunistic resource. If the resource > happens to say something about https origins, that's kinda > nonsensical. Maybe I should point that out. Do you think that this > would help? > > https://github.com/httpwg/http-extensions/pull/261 > > (To paraphrase what I added: this is "http" opportunistic, not "https" > opportunistic.) > > I mean, we could insist that the https:// resource not exist, but I > don't think we need that on the basis that we already have a pretty > strong signal, and it keeps things simple. https://github.com/httpwg/http-extensions/pull/261/files/dc24113b22b545ba112ebbc707b38ef3396c9f8a?short_path=fd50b7c#diff-fd50b7c5883e57d650fa3ac7f47c12f9 | This document does not define semantics for "http-opportunistic" resources | on an https origin, nor does it define semantics if | the resource includes https origins. That is OK, but it is mostly orthogonal about that what I was meaning. https://lists.w3.org/Archives/Public/ietf-http-wg/2016OctDec/0367.html |> • No concern; that check that http://{...}/.well-known/http-opportunistic |> succeed tells enough that there is no confusion | | I think that this is sufficient. | | The reason that I think this is OK, and the reason for removing a | mixed-scheme flag was that the risk comes from confusion. That | confusion exists as soon as an http:// request is made over a TLS | connection. | | It's not that much worse when things are mixed. The bad examples of | routing based on the first request are bad for many reasons. They are | simply cause to NOT provide the .well-known resource. Except if .well-known resource exists also on https: -origin then bad routing still provides .well-known resource. https://tools.ietf.org/html/draft-ietf-httpbis-http2-encryption-08#section-2.2 | The primary purpose of this check is to provide a client with some | assurance that a server understands this specification and has taken | steps to avoid being confused about request scheme. So strong signal is that server tells that it supports Opportunistic HTTP Security. Reading http://{authority}/.well-known/http-opportunistic does not test that there is no confusion. ( Also it is useless for http-client to check non-existence of https://{authority}/.well-known/http-opportunistic because existence of https://{authority}/.well-known/http-opportunistic is OK as far op-sec is considered. ) ( If http: and https: origins are identical then there is no bad routing; just one routing. ) Maybe that is enough. / Kari Hurtta
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Martin Thomson
- Op-sec simplification Martin Thomson
- Re: Op-sec simplification Kari Hurtta
- Re: Op-sec simplification Martin Thomson
- RE: Op-sec simplification Mike Bishop
- Re: Op-sec simplification Patrick McManus
- Re: Op-sec simplification Mark Nottingham
- Re: Op-sec simplification Martin Thomson
- Re: Op-sec simplification Mark Nottingham
- Re: Op-sec simplification Mark Nottingham
- RE: Op-sec simplification Mike Bishop
- Re: Op-sec simplification Patrick McManus
- Re: Op-sec simplification Kari Hurtta
- Re: Op-sec simplification Kari Hurtta
- Re: Op-sec simplification Martin Thomson
- 2.2. Interaction with "https" URIs | Re: Op-sec s… Kari Hurtta
- RE: Op-sec simplification Mike Bishop
- Re: Op-sec simplification Kari Hurtta
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Martin Thomson
- Re: Op-sec simplification Martin Thomson
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Kari Hurtta
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Martin Thomson
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Kari Hurtta
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Erik Nygren
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Kari Hurtta
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Martin Thomson
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Kari Hurtta
- Re: 2.2. Interaction with "https" URIs | Re: Op-s… Kari Hurtta