Re: [hybi] Insight you need to know: Browsers are at fault when servers crash

Mike Belshe <mike@belshe.com> Mon, 26 July 2010 03:59 UTC

Return-Path: <mike@belshe.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9DAF43A6809 for <hybi@core3.amsl.com>; Sun, 25 Jul 2010 20:59:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.976
X-Spam-Level:
X-Spam-Status: No, score=-1.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3QSj+ZSyYamn for <hybi@core3.amsl.com>; Sun, 25 Jul 2010 20:59:55 -0700 (PDT)
Received: from mail-pv0-f172.google.com (mail-pv0-f172.google.com [74.125.83.172]) by core3.amsl.com (Postfix) with ESMTP id B4AF03A67E7 for <hybi@ietf.org>; Sun, 25 Jul 2010 20:59:55 -0700 (PDT)
Received: by pvd12 with SMTP id 12so5956641pvd.31 for <hybi@ietf.org>; Sun, 25 Jul 2010 21:00:16 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.142.199.20 with SMTP id w20mr1571504wff.17.1280116816304; Sun, 25 Jul 2010 21:00:16 -0700 (PDT)
Received: by 10.142.74.7 with HTTP; Sun, 25 Jul 2010 21:00:16 -0700 (PDT)
In-Reply-To: <623C6D70-B4AF-49EC-BA07-6F90BD0FFFBF@apple.com>
References: <AANLkTilfxps1wWjFrwrH_3Js6Q9E331AMKFRNHfeHcdL@mail.gmail.com> <AANLkTi=vPAnnK0=gE=YN10vt9b-f6sWXXcwK+La5SriO@mail.gmail.com> <623C6D70-B4AF-49EC-BA07-6F90BD0FFFBF@apple.com>
Date: Sun, 25 Jul 2010 21:00:16 -0700
Message-ID: <AANLkTi=Q-PVrdaWuOu3H=wUiphe6JB4C+LauSOXKozoY@mail.gmail.com>
From: Mike Belshe <mike@belshe.com>
To: Maciej Stachowiak <mjs@apple.com>
Content-Type: multipart/alternative; boundary="000e0cd258821b59a8048c426c0e"
Cc: hybi@ietf.org
Subject: Re: [hybi] Insight you need to know: Browsers are at fault when servers crash
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jul 2010 03:59:56 -0000

On Sun, Jul 25, 2010 at 6:45 PM, Maciej Stachowiak <mjs@apple.com> wrote:

>
> On Jul 25, 2010, at 5:07 PM, Greg Wilkins wrote:
>
> > Mike,
> >
> > thanks for translating the intent of the browser dudes and explaining why
> they are so concerned about this issue.
> >
> > I am certainly not opposed to taking measures to ensure that websocket is
> not a easy-touch for attackers to use against other protocols and also to
> make it more robust against attacks itself.    I think these are reasonable
> requirements.
> >
> > However, I still don't see why the only acceptable solution to these
> concerns has to be a rigid non compliant HTTP handshake with space counting
> and unframed bytes on the wire?
> >
> > I think this WG has to clearly accept the concerns of browser vendors and
> make sure that the requirements clearly capture them.     But in return, the
> browser vendors have to accept that there is more than one way to skin a
> cat, and perhaps we can consider alternative solutions than the one that is
> currently causing significant objections and real world problems.
>
> From the perspective of a browser implementor:
>
> (1) I definitely don't think that the current draft WebSocket protocol is
> the only possible effective defense against cross-protocol attacks.
> (2) If anything, I'm not sure that it is effective enough.
> (3) I believe there have been proposals made that are more effective at
> mitigating cross-protocol attacks than the current draft, such as the TLS
> next protocol mechanism. However, TLS-only has its own downsides.
>

Adam has also suggested encrypting the channel.  Even without TLS, this
would go a long way toward preventing attackers from sending particular byte
patterns over the wire, and could probably be done without adding
round-trips.

Mike




>
> Regards,
> Maciej
>
>