Re: [hybi] Extensibility mechanisms?

Adam Barth <ietf@adambarth.com> Mon, 26 July 2010 07:00 UTC

Return-Path: <ietf@adambarth.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 87D0F3A69EF for <hybi@core3.amsl.com>; Mon, 26 Jul 2010 00:00:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.746
X-Spam-Level:
X-Spam-Status: No, score=-0.746 tagged_above=-999 required=5 tests=[AWL=-0.628, BAYES_20=-0.74, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4+UUyfBi9K9Y for <hybi@core3.amsl.com>; Mon, 26 Jul 2010 00:00:10 -0700 (PDT)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by core3.amsl.com (Postfix) with ESMTP id 906D03A683A for <hybi@ietf.org>; Mon, 26 Jul 2010 00:00:10 -0700 (PDT)
Received: by iwn38 with SMTP id 38so2737832iwn.31 for <hybi@ietf.org>; Mon, 26 Jul 2010 00:00:31 -0700 (PDT)
Received: by 10.231.167.67 with SMTP id p3mr8239677iby.20.1280127630570; Mon, 26 Jul 2010 00:00:30 -0700 (PDT)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by mx.google.com with ESMTPS id e8sm3376372ibb.8.2010.07.26.00.00.29 (version=SSLv3 cipher=RC4-MD5); Mon, 26 Jul 2010 00:00:30 -0700 (PDT)
Received: by iwn38 with SMTP id 38so2737769iwn.31 for <hybi@ietf.org>; Mon, 26 Jul 2010 00:00:26 -0700 (PDT)
Received: by 10.231.139.195 with SMTP id f3mr7088204ibu.139.1280127625885; Mon, 26 Jul 2010 00:00:25 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.231.79.85 with HTTP; Mon, 26 Jul 2010 00:00:05 -0700 (PDT)
In-Reply-To: <AANLkTimpXH7CQD3tfMszSGx8=_r3kZxU1Z84W4XUuOu5@mail.gmail.com>
References: <AANLkTikkfdlUxQ0MGNvVQKa5gfovkGHWdCgyN9juKSQJ@mail.gmail.com> <4C462F9E.9030207@caucho.com> <Pine.LNX.4.64.1007212153110.7242@ps20323.dreamhostps.com> <AANLkTiku76oSucTNDFdwgsFBNFa_cCpC-YktTnMfX47-@mail.gmail.com> <4C479130.4020500@caucho.com> <AANLkTikLDjBP-Xs5t6TxmJuq4nG8jwThQ=n34B4cEmup@mail.gmail.com> <4C479CE4.6070805@caucho.com> <AANLkTims1er0Rbv0ysP4gRs1Kd0He8hapHeJ3nON=JQa@mail.gmail.com> <4C47C5B0.3030006@caucho.com> <AANLkTi=ND-FOH8OoD=TCbiyeSZ-h0LhxQBXN5w-2hfvj@mail.gmail.com> <20100722055452.GL7174@1wt.eu> <F412C956-038F-400D-A431-C42B4C7B829C@apple.com> <AANLkTingCdW6aXjw2xVEuZ9L4RkT5dD2ncJtvrytQFbH@mail.gmail.com> <AANLkTikbpbB4zsMtFs1j5i_Y2+w=g2QZKe1QUdU8XJU6@mail.gmail.com> <AANLkTimpXH7CQD3tfMszSGx8=_r3kZxU1Z84W4XUuOu5@mail.gmail.com>
From: Adam Barth <ietf@adambarth.com>
Date: Mon, 26 Jul 2010 09:00:05 +0200
Message-ID: <AANLkTin0uWvqP+mQLqxVzjQUJewNi5JKT9njxyW-r4Tg@mail.gmail.com>
To: Greg Wilkins <gregw@webtide.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: Hybi <hybi@ietf.org>
Subject: Re: [hybi] Extensibility mechanisms?
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jul 2010 07:00:11 -0000

On Mon, Jul 26, 2010 at 1:58 AM, Greg Wilkins <gregw@webtide.com> wrote:
> your analysis of the cross protocol security issues continue to be very
> informative.

Thanks.  Glad you're finding it useful.

> But why does it have to be in the tone of "the WHATWG guys are the only ones
> that understand anything and there is no need to change anything"?   Perhaps
> you are reacting against the harsh tone that is sometimes directed towards
> the WHATWG guys in this WG and feeling like you need to defend them.  Well
> I'm sorry about that tone, but there has been significant stonewalling from
> that quarter and there is a lot of frustration here that many other concerns
> raised are being rejected.

I'm not sure why you consider me "one of the WHATWG guys."  I
participate about equally in WHATWG, W3C, and IETF.  At the moment I'm
more involved with IETF than the other two.

> So thanks for expanding on some of the details of the cross protocol
> attacks, and you have rightly drawn attention to deficiencies in some of the
> simplistic counter proposals.
> However, the bit that is missing is how your analysis relates to the current
> proposed solution with it's rigid content, space counting, random bytes
> without frames etc.   Surely that cannot be the only solution that addresses
> these issues?   Can't we try to find a solution that both reduces the cross
> protocol issues, but is also less objectional to most here in the WG?

I'm sure there are other solutions.  For example, I proposed a
handshake a while back that isn't rigid at all.  If you feel the
current proposal doesn't meet your requirements, please feel free to
propose something else.

> To harden a websocket server against attacks from other protocols, there are
> many things that framing can help with.  For example, we could shutdown
> connections after any bad frames (we are on reliable transports so no need
> to forgive bad frames) and/or have a simple frame checksum.
>
> To ensure that websocket clients are themselves not tools to attack other
> protocols we could also have less minimalistic framing. Lengths and
> checksums are going to be more of an obstacle to attackers than simple
> sentinel framing.
>
> I have yet to see a good description of an attack vector that is cut off by
> the rigid handshake, the space counting or the unframed bytes that could not
> be addressed by far simpler and less objectional means.
>
> regards
>
>
>
>
>