Re: [hybi] Extensibility mechanisms?

Jamie Lokier <jamie@shareable.org> Mon, 26 July 2010 22:32 UTC

Return-Path: <jamie@shareable.org>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 28F1A3A6A98 for <hybi@core3.amsl.com>; Mon, 26 Jul 2010 15:32:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.48
X-Spam-Level:
X-Spam-Status: No, score=-2.48 tagged_above=-999 required=5 tests=[AWL=0.119, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id afvE8n5-64PY for <hybi@core3.amsl.com>; Mon, 26 Jul 2010 15:32:39 -0700 (PDT)
Received: from mail2.shareable.org (mail2.shareable.org [80.68.89.115]) by core3.amsl.com (Postfix) with ESMTP id 39D583A6A99 for <hybi@ietf.org>; Mon, 26 Jul 2010 15:32:38 -0700 (PDT)
Received: from jamie by mail2.shareable.org with local (Exim 4.63) (envelope-from <jamie@shareable.org>) id 1OdWE3-00045d-Kc; Mon, 26 Jul 2010 23:32:47 +0100
Date: Mon, 26 Jul 2010 23:32:47 +0100
From: Jamie Lokier <jamie@shareable.org>
To: Maciej Stachowiak <mjs@apple.com>
Message-ID: <20100726223247.GE23142@shareable.org>
References: <Pine.LNX.4.64.1007212153110.7242@ps20323.dreamhostps.com> <AANLkTiku76oSucTNDFdwgsFBNFa_cCpC-YktTnMfX47-@mail.gmail.com> <4C479130.4020500@caucho.com> <AANLkTikLDjBP-Xs5t6TxmJuq4nG8jwThQ=n34B4cEmup@mail.gmail.com> <4C479CE4.6070805@caucho.com> <AANLkTims1er0Rbv0ysP4gRs1Kd0He8hapHeJ3nON=JQa@mail.gmail.com> <4C47C5B0.3030006@caucho.com> <AANLkTi=ND-FOH8OoD=TCbiyeSZ-h0LhxQBXN5w-2hfvj@mail.gmail.com> <20100722055452.GL7174@1wt.eu> <F412C956-038F-400D-A431-C42B4C7B829C@apple.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <F412C956-038F-400D-A431-C42B4C7B829C@apple.com>
User-Agent: Mutt/1.5.13 (2006-08-11)
Cc: Hybi <hybi@ietf.org>
Subject: Re: [hybi] Extensibility mechanisms?
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jul 2010 22:32:41 -0000

Maciej Stachowiak wrote:
> I believe the TLS-based handshake (as proposed by Adam) is more
> robust than solutions involving nonces and challenge/response built
> into an HTTP-like handshake. The reason for this is that it's hard
> for the attacker to control the bytes sent, other than to cause the
> initiation of a TLS handshake, which is something that all network
> services are already exposed to by browsers. The attacker cannot get
> to the next-level protocol running over TLS unless the server
> explicitly opts in. With HTTP-based schemes, it takes much more care
> to avoid sending information as the "wrong" protocol.

Isn't the TLS handshake rather fragile and vulnerable, by virtue of
lots of services sitting behind TLS and using it only to get an
encrypted channel?  If you can open a connection and start TLS, say on
the ftps/imaps or even https port then it's basically unprotected
bytes again after the TLS stage, wrapped *inside* TLS, giving a false
sense of security.

Or is there some extra magic sent in the TLS setup which will be
consistently rejected by non-WebSocket TLS servers?

Thanks,
-- Jamie