Re: [hybi] Handshake was: The WebSocket protocol issues.

Bjoern Hoehrmann <derhoermi@gmx.net> Sat, 09 October 2010 01:40 UTC

Return-Path: <derhoermi@gmx.net>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4B97D3A6405 for <hybi@core3.amsl.com>; Fri, 8 Oct 2010 18:40:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.837
X-Spam-Level:
X-Spam-Status: No, score=-2.837 tagged_above=-999 required=5 tests=[AWL=-0.238, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o6a+xpZoedBi for <hybi@core3.amsl.com>; Fri, 8 Oct 2010 18:40:06 -0700 (PDT)
Received: from mail.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id 660ED3A63C9 for <hybi@ietf.org>; Fri, 8 Oct 2010 18:40:04 -0700 (PDT)
Received: (qmail invoked by alias); 09 Oct 2010 01:41:10 -0000
Received: from dslb-094-223-184-138.pools.arcor-ip.net (EHLO hive) [94.223.184.138] by mail.gmx.net (mp071) with SMTP; 09 Oct 2010 03:41:10 +0200
X-Authenticated: #723575
X-Provags-ID: V01U2FsdGVkX1+yRMJZDV6yuHiDUiLF1D4HtUKmhsP/Fw+3zYuZMt XKXsdn/O6wD4pB
From: Bjoern Hoehrmann <derhoermi@gmx.net>
To: Greg Wilkins <gregw@webtide.com>
Date: Sat, 09 Oct 2010 03:41:05 +0200
Message-ID: <qnhva69uj10v0907duhm6d2iq4f7lr6hl1@hive.bjoern.hoehrmann.de>
References: <4CABCBFA.6020100@caucho.com> <AANLkTi=5wbCXWpOtUQT1MndgCxt9gj6uR_3U=nONpjKc@mail.gmail.com> <4CABD11F.3060500@caucho.com> <AANLkTiksehiSp7DB17MBVBb457p6pN5E8vma6FHz1c9j@mail.gmail.com> <4CACA667.3040309@caucho.com> <4CAF9589.1060007@caucho.com> <AANLkTinnnT5Oib7FvDdZF2q_WUT8=q8KNmfkfajE0Mor@mail.gmail.com> <4CAFA043.10101@caucho.com> <AANLkTi=eo-cjBz160FN0cn53v4-CpDSYaEneqkr_ZP7k@mail.gmail.com> <AANLkTi=B1rGBgi4jYZ_TqX9Qt1xtXoyneZtztnLOkW6b@mail.gmail.com>
In-Reply-To: <AANLkTi=B1rGBgi4jYZ_TqX9Qt1xtXoyneZtztnLOkW6b@mail.gmail.com>
X-Mailer: Forte Agent 3.3/32.846
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-Y-GMX-Trusted: 0
Cc: hybi <hybi@ietf.org>
Subject: Re: [hybi] Handshake was: The WebSocket protocol issues.
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Oct 2010 01:40:08 -0000

* Greg Wilkins wrote:
> + It is not certain that the HTTP server will allow a PHP script to
>generate a 101 response.

A typical Apache configuration allows you to make "nph" scripts where
the server will essentially send whatever bytes a script generates back
to the client. I am not sure if recent versions of Apache have anything
in place to handle Upgrade requests in a special manner, or what happens
if the browser sends more data while the nph script is generating out-
put, or what happens after the script is done generating output, but if
you only need to send a certain octet sequence derived from the request,
then you will most likely be able to establish the connection in common
setups. If that allows for any notable attack is unclear for the reasons
I just mentioned.
-- 
Björn Höhrmann · mailto:bjoern@hoehrmann.de · http://bjoern.hoehrmann.de
Am Badedeich 7 · Telefon: +49(0)160/4415681 · http://www.bjoernsworld.de
25899 Dagebüll · PGP Pub. KeyID: 0xA4357E78 · http://www.websitedev.de/