Re: [hybi] Websocket over TLS keep-alive overhead

Roberto Peon <fenix@google.com> Thu, 29 November 2012 18:42 UTC

Return-Path: <fenix@google.com>
X-Original-To: hybi@ietfa.amsl.com
Delivered-To: hybi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 917E321F8B53 for <hybi@ietfa.amsl.com>; Thu, 29 Nov 2012 10:42:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.976
X-Spam-Level:
X-Spam-Status: No, score=-102.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xynOY-VUt7wn for <hybi@ietfa.amsl.com>; Thu, 29 Nov 2012 10:42:46 -0800 (PST)
Received: from mail-ia0-f172.google.com (mail-ia0-f172.google.com [209.85.210.172]) by ietfa.amsl.com (Postfix) with ESMTP id 11F4721F8B3B for <hybi@ietf.org>; Thu, 29 Nov 2012 10:42:45 -0800 (PST)
Received: by mail-ia0-f172.google.com with SMTP id j26so12087985iaf.31 for <hybi@ietf.org>; Thu, 29 Nov 2012 10:42:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=GDzqeQ28+QgKsiYYw1Ij1owAvyDPwhlBVZRSMmT2s94=; b=HA38HZtHk8KiEdWuXQX8LtOeM/W1ZPX+q5g7X2acDaIWjPJpMNHDHMZI88yQML+N/h xrlshfgktI5baVUQbUBSyMZTeLbRpmxXzF03p+2KA0QwE35oDGWRXCw5RIOJooOv8ukE idx084yTzr1KzYBFRX5lLFe8Trg4uIZCGYJc6v4gJ8HWYNGbPWGWQ7PteOoVsFe6Mozd C0Qh18gR+Cx6R6rwmlL67gKzkp3MkzciQJjyRGKT9sinTMKajGudp+8VRqtPSHLWTSbW AANBm/lLD/FRXE4/7zGsDHkISof7TnwCQdAPOnF+eZHY+AbQE6eTZ/4mUzFGshq+U15i DruQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:x-gm-message-state; bh=GDzqeQ28+QgKsiYYw1Ij1owAvyDPwhlBVZRSMmT2s94=; b=XgeyOCyIDdELJm4sBmXS1jlKbvnNSQDbjOqrqB3Vwu80sMXCZ0oCxev5nAYPCFzae5 06B6aaDhe4AgzQgkwuL4pFfPJZ1BtB05UyJqmNF+s+upUsmKX26FPwrp5fZIOzeUnr+p dCg3Nq8dvKeN6XgTlesTJMKETaN85z5PJmJeEa83DF1PUbOBamScNODptpCXD6vPQASH e7eM9VGT1izpA1chAYOAmrOsOCTU5sFR23ZFYLUUI0Y0jo7UsHcw/jyT7rW1I+oynkyQ ttjdjOEQYamCszT3quFHhbTw5XrOdVUmhr5mCnkKFfjXSVJDreXtNQRSrfC9jj/St76J 8XxA==
MIME-Version: 1.0
Received: by 10.50.5.236 with SMTP id v12mr26679503igv.6.1354214565294; Thu, 29 Nov 2012 10:42:45 -0800 (PST)
Received: by 10.50.30.169 with HTTP; Thu, 29 Nov 2012 10:42:45 -0800 (PST)
Received: by 10.50.30.169 with HTTP; Thu, 29 Nov 2012 10:42:45 -0800 (PST)
In-Reply-To: <20121129101102.GA17793@jl-vm1.vm.bytemark.co.uk>
References: <E44893DD4E290745BB608EB23FDDB762317CFF@008-AM1MPN1-042.mgdnok.nokia.com> <634914A010D0B943A035D226786325D4339290CD54@EXVMBX020-12.exch020.serverdata.net> <CAH9hSJYm3Ucynuumd7iMO8Cw3use1BKBi2MTpybecuS1Si7caA@mail.gmail.com> <20121129101102.GA17793@jl-vm1.vm.bytemark.co.uk>
Date: Thu, 29 Nov 2012 10:42:45 -0800
Message-ID: <CAGzyod65+eFzY9BetHCXHM_rwRDok1WUMwsrtprWJ-g02NECDA@mail.gmail.com>
From: Roberto Peon <fenix@google.com>
To: Jamie Lokier <jamie@shareable.org>
Content-Type: multipart/alternative; boundary="e89a8f646e731d345b04cfa6a686"
X-Gm-Message-State: ALoCoQlJd+FY2drvHibLhykrkjeOmuBIXk589qQ+kH1EQm17HmY5yFAuNBdsm1BL+GFN+jlDO1E543wIRLF8NJc4cN+iAODGAoDwE//Kel4n3qb0aQyoS+pPy7uNDLjQaPPxs7EFob15R/Vd6o78RDzaoJANFa5eATnRa67PTu9wIYHVk5eg64hlcpEodLkhvM0MH6pZJwrz
Cc: hybi@ietf.org
Subject: Re: [hybi] Websocket over TLS keep-alive overhead
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Nov 2012 18:42:50 -0000

++
On Nov 29, 2012 2:11 AM, "Jamie Lokier" <jamie@shareable.org> wrote:

> Takeshi Yoshino wrote:
> >    Hi,
> >    Chromium is using 1/n-1 record splitting for TLS 1.0 connection w/ CBC
> >    mode cipher to work around BEAST exploit. So, even a WebSocket frame
> >    with 1 octet payload (client -> server, 7 octets in total. AES block
> >    size (16) * 2 - SHA1 HMAC size (20) - padding length field size (1) >
> >    7, so 1 application data record with 32 octets payload is enough) will
> >    be packed into two TLS records with big padding.
> >    re: TLS compression, it's disabled on Chromium to address another
> >    exploit called CRIME.
>
> It might make sense if TLS could transmit its own, much shorter,
> keepalive messages, which are for the sole purpose of keeping the link
> alive.  I would guess, since they have no other effect, that they
> wouldn't be exploitable in the same way.  Is that right?
>
> It would be best if they could be invoked from the higher layer rather
> than generated in TLS itself (because the higher layer will have a
> better idea of the keepalive patterns that it needs), and if they were
> one-way keepalives rather than PING/PONG to avoid amplification
> attacks, and because PING/PONG is not the most efficient keepalive
> pattern.
>
> Is there provision in TLS for that sort of thing now?
>
> (Of course over mobile links, it would make much more sense for power
> efficiency to have a single, aggregated keepalive stream for all
> sockets rather than one per active websocket, or some other way of
> taking advantage of the phone's existing mobile link-level keepalives
> which it already does and are designed for efficiency.)
>
> -- Jamie
> _______________________________________________
> hybi mailing list
> hybi@ietf.org
> https://www.ietf.org/mailman/listinfo/hybi
>