Re: [hybi] Extensibility mechanisms?

Scott Ferguson <ferg@caucho.com> Tue, 27 July 2010 00:09 UTC

Return-Path: <ferg@caucho.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84E9F3A6850 for <hybi@core3.amsl.com>; Mon, 26 Jul 2010 17:09:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.19
X-Spam-Level:
X-Spam-Status: No, score=-2.19 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q1-HHvG0ICxq for <hybi@core3.amsl.com>; Mon, 26 Jul 2010 17:09:23 -0700 (PDT)
Received: from smtp113.biz.mail.sp1.yahoo.com (smtp113.biz.mail.sp1.yahoo.com [69.147.92.226]) by core3.amsl.com (Postfix) with SMTP id B1A033A6829 for <hybi@ietf.org>; Mon, 26 Jul 2010 17:09:23 -0700 (PDT)
Received: (qmail 77636 invoked from network); 27 Jul 2010 00:09:42 -0000
Received: from [192.168.1.11] (ferg@66.92.8.203 with plain) by smtp113.biz.mail.sp1.yahoo.com with SMTP; 26 Jul 2010 17:09:42 -0700 PDT
X-Yahoo-SMTP: L1_TBRiswBB5.MuzAo8Yf89wczFo0A2C
X-YMail-OSG: 91MNb.4VM1kxMll2SzEdNb1vvJCj3LYonzlDv4KG7P4EOTt KXM9bKKt0VsBlZXrDxoFnz5U2tYzKoTOWqdBT5t5NB4RIvHjcqlawI5hBIn6 sKHjFjdjtHeFosztFUPFkw6SrlheC90khnzDYvFfbir6thDM6josGFIytSUC 7ju2l7I0Iq4crRNdxZ16ZCaQ3HWa6VfhPhkgA41PDbjZGIld1fV28rVPuToS UX0D5N.OTTzpP8L_uQuVjAIEBD_ZVeShuH.t3x8fOV.6g4kbEsjio95nnrrC c.8tYq9SBQDvNySdkuNipCIthPHiVA5WcufZxdAApWhBkdnJtPedeZg--
X-Yahoo-Newman-Property: ymail-3
Message-ID: <4C4E23C1.4090809@caucho.com>
Date: Mon, 26 Jul 2010 17:09:37 -0700
From: Scott Ferguson <ferg@caucho.com>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: Jamie Lokier <jamie@shareable.org>
References: <AANLkTikLDjBP-Xs5t6TxmJuq4nG8jwThQ=n34B4cEmup@mail.gmail.com> <4C479CE4.6070805@caucho.com> <AANLkTims1er0Rbv0ysP4gRs1Kd0He8hapHeJ3nON=JQa@mail.gmail.com> <4C47C5B0.3030006@caucho.com> <AANLkTi=ND-FOH8OoD=TCbiyeSZ-h0LhxQBXN5w-2hfvj@mail.gmail.com> <4C48A468.3040009@caucho.com> <AANLkTikeLr325F03bowJu7NeHEqY_+OzEnQcrxHbCwhW@mail.gmail.com> <4C48AF24.2040501@caucho.com> <AANLkTinodV_uPvJLxSG_uyg9pjeCjC=iDOxP0SinGxtN@mail.gmail.com> <4C48B3EC.8040908@caucho.com> <20100726222635.GD23142@shareable.org>
In-Reply-To: <20100726222635.GD23142@shareable.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Hybi <hybi@ietf.org>
Subject: Re: [hybi] Extensibility mechanisms?
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2010 00:09:24 -0000

Jamie Lokier wrote:
> Scott Ferguson wrote:
>   
>> Adam Barth wrote:
>>     
>>> On Thu, Jul 22, 2010 at 1:50 PM, Scott Ferguson <ferg@caucho.com> wrote:
>>>  
>>>       
>>>> Adam Barth wrote:
>>>>    
>>>>         
>>>>> We need to know the server understands web sockets before spamming
>>>>> them with attacker-controlled bytes.  If we don't, we'll repeat the
>>>>> long and tragic history of cross-protocol vulnerabilities caused by
>>>>> HTTP POST.
>>>>>
>>>>> This is a hard requirement.
>>>>>      
>> Yes, but that's not specific enough for your requirement because 
>> "consider and mitigate" doesn't necessarily imply "client must validate 
>> server before sending content."
>>
>> As long as everyone's clear and agrees on the "client must validate 
>> server before sending content" requirement, then we're fine.
>>     
>
> It seems a strange leap of logic, as it isn't the only way to mitigate
> the attack risk and it has perceptible negative consequences.
>   

Yes, which is why I thought it important to ask if the delay until 
validation is a hard requirement or not.

IMO, it may be worth spending a little time on proposals like Adam's to 
see if it's possible to reduce the handshake overhead below the server 
validation penalty.

> Anyway I can't see how "client must validate server before sending
> content" can be satisfied.  

Yes. I should have been more precise and said "before frame content".

> Clients are free to encode their content
> in the subprotocol field, and JavaScript apps might actually resort to
> that if it's the only way to hack around that side of the RT delay.
> I'm not sure if the API gives any way for JS apps to retrieve anything
> interesting sent on the other side of the handshake.
>
> Note I have no problem with "client must validate server before
> sending WebSocket encoded frames / dangerous frames / non-HTTP frames
> (take your pick)" .
>   

-- Scott

-- Scott
> -- Jamie
>
>
>
>