Re: [hybi] Experiment comparing Upgrade and CONNECT handshakes

Maciej Stachowiak <mjs@apple.com> Wed, 01 December 2010 23:07 UTC

Return-Path: <mjs@apple.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C03893A680D for <hybi@core3.amsl.com>; Wed, 1 Dec 2010 15:07:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -107.085
X-Spam-Level:
X-Spam-Status: No, score=-107.085 tagged_above=-999 required=5 tests=[AWL=-0.486, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yjn7APdBN53w for <hybi@core3.amsl.com>; Wed, 1 Dec 2010 15:07:40 -0800 (PST)
Received: from mail-out3.apple.com (mail-out3.apple.com [17.254.13.22]) by core3.amsl.com (Postfix) with ESMTP id 5660D3A680A for <hybi@ietf.org>; Wed, 1 Dec 2010 15:07:40 -0800 (PST)
Received: from relay15.apple.com (relay15.apple.com [17.128.113.54]) by mail-out3.apple.com (Postfix) with ESMTP id D2D50BC4C656 for <hybi@ietf.org>; Wed, 1 Dec 2010 15:08:54 -0800 (PST)
X-AuditID: 11807136-b7cf5ae0000051a4-76-4cf6d586d64a
Received: from gertie.apple.com (gertie.apple.com [17.151.62.15]) by relay15.apple.com (Apple SCV relay) with SMTP id DC.34.20900.685D6FC4; Wed, 1 Dec 2010 15:08:54 -0800 (PST)
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-type: text/plain; charset="us-ascii"
Received: from [17.72.146.19] by gertie.apple.com (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008; 32bit)) with ESMTPSA id <0LCR00DSEUYQST00@gertie.apple.com> for hybi@ietf.org; Wed, 01 Dec 2010 15:08:54 -0800 (PST)
From: Maciej Stachowiak <mjs@apple.com>
In-reply-to: <AANLkTik+pmVoyK0fkz6mG0+KDqdvyVxaYtM9w7KDo4Xa@mail.gmail.com>
Date: Wed, 01 Dec 2010 15:08:48 -0800
Message-id: <22E8BF2D-C86E-4A2A-9D4D-8DE070474324@apple.com>
References: <AANLkTik0wR-Oag5YJJDmdiSy67WW6TMaHmqWEo4o5kGW@mail.gmail.com> <AANLkTimwEtKrJm5KxTYZ4wrtONBYDTGjE5LF7__AHBEU@mail.gmail.com> <AANLkTik+pmVoyK0fkz6mG0+KDqdvyVxaYtM9w7KDo4Xa@mail.gmail.com>
To: Zhong Yu <zhong.j.yu@gmail.com>
X-Mailer: Apple Mail (2.1082)
X-Brightmail-Tracker: AAAAAA==
Cc: Hybi <hybi@ietf.org>
Subject: Re: [hybi] Experiment comparing Upgrade and CONNECT handshakes
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Dec 2010 23:07:41 -0000

On Dec 1, 2010, at 11:45 AM, Zhong Yu wrote:

> We can still cross examine the data and find something mysterious.
> 
> From POST to Upgrade column, the firewall circumvention attack
> successes decrease from 1376 to 1. If I'm mistaken, please correct me
> with the right explanation, but I believe the POST experiment sent
> clean/compliant HTTP requests, and the Upgrade experiment sent the
> attack data framed - the non-http bytes busted 99.9% parsers used by
> the transparent proxies.
> 
> Yet, the cache poisoning attack success count only drops from 15 to 8.
> This attack also depends on proxies' ability to parse http requests.
> If the non-http bytes in the Upgrade protocol would bust 99.9%
> parsers, we should see the attack success count drop to 15/1000 = 0.
> 
> So I must question the validity of the 8 success attacks. (note I also
> questioned the 1 success attack in the firewall circumvention case)
> More details are needed to analyze the experiments and the results.
> 
> This is important because these 9 cases are the only evidence
> presented so far that plaintext pay load in simple framing could be
> misinterpreted as compliant HTTP requests although it is not. The
> evidence is used to argue for stream obfuscation. As the only
> evidence, it should be examined carefully.

Perhaps Adam & company could publish the experiement code and cite it in the paper, so that anyone who is skeptical of the results could attempt to replicate the experiment or attempt to identify methodological errors. (It's sad that this is not the norm for CS papers.)

It might even be possible, though more work, to attempt replication solely based on the info in the paper.

Regards,
Maciej