Re: [hybi] Extensibility mechanisms?

Adam Barth <ietf@adambarth.com> Sun, 18 April 2010 21:11 UTC

Return-Path: <ietf@adambarth.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 589523A67A3 for <hybi@core3.amsl.com>; Sun, 18 Apr 2010 14:11:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.324
X-Spam-Level:
X-Spam-Status: No, score=0.324 tagged_above=-999 required=5 tests=[AWL=-0.299, BAYES_50=0.001, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7lo61THmkOej for <hybi@core3.amsl.com>; Sun, 18 Apr 2010 14:11:53 -0700 (PDT)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by core3.amsl.com (Postfix) with ESMTP id A1A003A69AD for <hybi@ietf.org>; Sun, 18 Apr 2010 14:11:28 -0700 (PDT)
Received: by gyh4 with SMTP id 4so2303501gyh.31 for <hybi@ietf.org>; Sun, 18 Apr 2010 14:11:17 -0700 (PDT)
Received: by 10.91.58.11 with SMTP id l11mr2721112agk.0.1271625076812; Sun, 18 Apr 2010 14:11:16 -0700 (PDT)
Received: from mail-yw0-f200.google.com (mail-yw0-f200.google.com [209.85.211.200]) by mx.google.com with ESMTPS id 4sm1346009yxd.16.2010.04.18.14.11.15 (version=SSLv3 cipher=RC4-MD5); Sun, 18 Apr 2010 14:11:16 -0700 (PDT)
Received: by ywh38 with SMTP id 38so2259682ywh.29 for <hybi@ietf.org>; Sun, 18 Apr 2010 14:11:15 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.231.146.198 with HTTP; Sun, 18 Apr 2010 14:10:54 -0700 (PDT)
In-Reply-To: <k2r2a10ed241004181406zf93cf5c4p9652e4a78980027d@mail.gmail.com>
References: <h2w5c902b9e1004152345j992b815bz5f8d38f06a19181a@mail.gmail.com> <4BC96A0D.4080904@webtide.com> <Pine.LNX.4.64.1004180246380.751@ps20323.dreamhostps.com> <4BCAB2C1.2000404@webtide.com> <B9DC25B0-CD21-44E7-BD9B-06D0C9440933@apple.com> <Pine.LNX.4.64.1004181812370.751@ps20323.dreamhostps.com> <4BCB6641.70408@webtide.com> <Pine.LNX.4.64.1004182010070.751@ps20323.dreamhostps.com> <4BCB6FD0.7080003@webtide.com> <k2r2a10ed241004181406zf93cf5c4p9652e4a78980027d@mail.gmail.com>
From: Adam Barth <ietf@adambarth.com>
Date: Sun, 18 Apr 2010 14:10:54 -0700
Received: by 10.101.143.12 with SMTP id v12mr11955161ann.88.1271625075370; Sun, 18 Apr 2010 14:11:15 -0700 (PDT)
Message-ID: <u2y5c4444771004181410yed7ffb48pd909a9241b9655f4@mail.gmail.com>
To: Mike Belshe <mike@belshe.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: Hybi <hybi@ietf.org>
Subject: Re: [hybi] Extensibility mechanisms?
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Apr 2010 21:11:56 -0000

On Sun, Apr 18, 2010 at 2:06 PM, Mike Belshe <mike@belshe.com> wrote:
> On Sun, Apr 18, 2010 at 1:47 PM, Greg Wilkins <gregw@webtide.com> wrote:
>>
>> Ian Hickson wrote:
>>
>> > Why would a large scale deployments with complex infrastructure that
>> > can't
>> > handle BEEP framing opt-in to an experimental non-standard feature that
>> > uses BEEP framing?
>>
>> because experiments are a precursor to real deployments.
>>
>> >
>> >> If you want to send BEEP over a HTTP connection, then you should
>> >> upgrade
>> >> to BEEP, not websocket.
>> >
>> > If the handshake involves an optional opt-in to a non-standard
>> > experimental feature, and you accept it, then you're not upgrading to
>> > Web
>> > Socket, you're upgrading to a non-standard protocol influenced by Web
>> > Sockets, as defined by the convention you and the client are using.
>>
>> My point is that an intermediary can't possible know about
>> all subprotocols (experimental or otherwise), nor be expected
>> to upgrade everytime a new subprotocol is invented.
>>
>> Intermediaries can know about websocket framing and so long as
>> all sub protocols and extensions are restricted to adhere to
>> websocket framing, then intermediaries can continue to work
>> regardless of sub protocols.
>
> Should intermediaries know about these protocols?  Why?
> In my view, new protocols should be thinking not just about "right now" but
> also about the future.  It takes a long time for protocols to be adopted, so
> thinking only of 2010 is a mistake.  Think about 2020.
> In the year 2020, should the guy sitting next to you in the coffee shop be
> able to sniff your traffic to see what you're doing?  Sure, maybe you're
> only watching a movie, but who's business is it but yours?  Should common
> users be expected to understand when their data is private and when it is
> not?  Why should they?  Is it realistic to expect them to?
>
> If we run all websockets through SSL, the protocol is stronger.  And poor
> users aren't left holding the bag wondering why they just got hacked.
> But, even if we don't care about end-user security, surely we care about
> deployability of the protocol.  Unlike any protocol layering on top of port
> 80, running with SSL is deployable today without updating the intermediaries
> at all.
> So, to review you get:
>    a) A protocol designed for the future.
>    b) A deployable protocol
>    c) A more reliable and robust protocol, because it can't be accidentally
> broken by intermediaries making incorrect assumptions about what it is
> transporting.  (We've seen this so often in history, we ought to learn the
> lesson!)

Indeed.  SSL is on the cusp of being universally deployable today.  We
should be planning for a world where SSL is ubiquitous.

Now, we can have a discussion about certificates being a hassle and
the follies of PKI.  It's probably still worth having two modes: one
where we verify the servers certificate and one where we don't.

Adam