Re: [hybi] New port and Tunneling?

Willy Tarreau <w@1wt.eu> Sun, 15 August 2010 21:03 UTC

Return-Path: <w@1wt.eu>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6157D3A681D for <hybi@core3.amsl.com>; Sun, 15 Aug 2010 14:03:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.898
X-Spam-Level:
X-Spam-Status: No, score=-2.898 tagged_above=-999 required=5 tests=[AWL=-0.855, BAYES_00=-2.599, HELO_IS_SMALL6=0.556]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L-xlcO9vn3uK for <hybi@core3.amsl.com>; Sun, 15 Aug 2010 14:02:59 -0700 (PDT)
Received: from 1wt.eu (1wt.eu [62.212.114.60]) by core3.amsl.com (Postfix) with ESMTP id 093C83A6850 for <hybi@ietf.org>; Sun, 15 Aug 2010 14:02:58 -0700 (PDT)
Received: (from willy@localhost) by mail.home.local (8.14.4/8.14.4/Submit) id o7FL3WB9029692; Sun, 15 Aug 2010 23:03:32 +0200
Date: Sun, 15 Aug 2010 23:03:32 +0200
From: Willy Tarreau <w@1wt.eu>
To: Shelby Moore <shelby@coolpage.com>
Message-ID: <20100815210332.GH27614@1wt.eu>
References: <7ffabb591b2292c9b81abecfaec3cdb6.squirrel@sm.webmail.pair.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <7ffabb591b2292c9b81abecfaec3cdb6.squirrel@sm.webmail.pair.com>
User-Agent: Mutt/1.4.2.3i
Cc: hybi@ietf.org
Subject: Re: [hybi] New port and Tunneling?
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Aug 2010 21:03:00 -0000

On Sun, Aug 15, 2010 at 04:48:35PM -0400, Shelby Moore wrote:
> I googled this discussion list archive and did not find much on this.
> 
> Seems the great likelihood of messy soft failure and other a priori
> unquantifiable complexity with reusing the port 80 or 443+TLS due to the
> HTTP legacy on the network and/or complexity issues with HTTP Upgrade or
> non-mainstream use of TLS.
> 
> Seems what we really need is a hard fail, so we can dynamically and
> gracefully downgrade to long polling solutions (Comet/BOSH...).  K.I.S.S.
> 
> We are going to have to downgrade whether due to proxy soft failure or new
> port tunnel failure, so why chose the higher complexity "root canal"
> route?
> 
> Am I missing something or is the K.I.S.S.  way to get a hard fail is
> tunnel over a new port?  Then we can get P2P WebSockets too (wow)!
> 
> http://samy.pl/pwnat/
> http://mackys.livejournal.com/896428.html
> 
> FAQ at the above link seems to be pretty simple and deterministic in terms
> of failure detection.
> 
> The man-in-middle vulnerability and the beneficial features of HTTP (e.g.
> URL redirection, virtual hosting,...) could still be obtained by
> handshaking orthogonally with standard HTTP GET.
> 
> Educate me please.  Certainly the solution can't be this simple correct? Why?

The specific port was discussed too. But it does not solve everything.
In your opinion, why do Comet/BOSH work over HTTP ? Precisely because
they can reach almost 100% of the visitors. In many (I mean *many*)
enterprises, here's what you have as options to access the outside :
  - port 80 via a proxy/cache/anti-virus/url-filtering
  - port 443 on a small hand-selected list of sites
  - nothing else

I've heard it's basically the same with mobile gateways at most operators.

And given the number of malware on the net, the trend is certainly not
going backwards. Thus, port 80 with HTTP has a major advantage over the
other alternatives. Right now the success rate of tests appears lower
with HTTP than with TLS, but in my opinion, it will increase once the
protocol is ratified, because proxy vendors will simply add support for
it in their proxies.

If you open a dedicated port, it's very interesting in order to reduce
the number of round trips, but you'll still miss a part of the population.

Also, TLS as proposed by Adam looks very promising. But it still has the
inconvenient that it will never be blindly opened in many enterprises due
to the impossibility to analyse it. And it does not easily allow server
stickiness for a user connecting to the WS port of the HTTP server he was
on.

However, having TLS as a complement of HTTP would be very nice and it
could probably make sense to try it by default.

Regards,
Willy