Re: [hybi] Upgrade Mechanism and HasMat (was Re: Extensibility mechanisms?)

Maciej Stachowiak <mjs@apple.com> Thu, 22 July 2010 16:39 UTC

Return-Path: <mjs@apple.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B27B23A684B for <hybi@core3.amsl.com>; Thu, 22 Jul 2010 09:39:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.555
X-Spam-Level:
X-Spam-Status: No, score=-106.555 tagged_above=-999 required=5 tests=[AWL=0.043, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AnAQ9WUr8i4n for <hybi@core3.amsl.com>; Thu, 22 Jul 2010 09:39:47 -0700 (PDT)
Received: from mail-out4.apple.com (mail-out4.apple.com [17.254.13.23]) by core3.amsl.com (Postfix) with ESMTP id 5D11A3A67AF for <hybi@ietf.org>; Thu, 22 Jul 2010 09:39:47 -0700 (PDT)
Received: from relay15.apple.com (relay15.apple.com [17.128.113.54]) by mail-out4.apple.com (Postfix) with ESMTP id D7C5BA4B0B51 for <hybi@ietf.org>; Thu, 22 Jul 2010 09:40:04 -0700 (PDT)
X-AuditID: 11807136-b7c9dae000000fcd-a9-4c487464b2a4
Received: from elliott.apple.com (elliott.apple.com [17.151.62.13]) by relay15.apple.com (Apple SCV relay) with SMTP id 84.24.04045.464784C4; Thu, 22 Jul 2010 09:40:04 -0700 (PDT)
MIME-version: 1.0
Content-type: multipart/alternative; boundary="Boundary_(ID_IXKhSTG4Jt2zvqm3/gvL6g)"
Received: from [17.151.96.25] by elliott.apple.com (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008; 32bit)) with ESMTPSA id <0L5Y00DQNWYSAG90@elliott.apple.com> for hybi@ietf.org; Thu, 22 Jul 2010 09:40:04 -0700 (PDT)
From: Maciej Stachowiak <mjs@apple.com>
In-reply-to: <4C47FF71.3050000@ericsson.com>
Date: Thu, 22 Jul 2010 09:40:04 -0700
Message-id: <AD95281A-605D-4169-9E4A-82D0C57F524E@apple.com>
References: <Pine.LNX.4.64.1007212153110.7242@ps20323.dreamhostps.com> <AANLkTiku76oSucTNDFdwgsFBNFa_cCpC-YktTnMfX47-@mail.gmail.com> <4C479130.4020500@caucho.com> <AANLkTikLDjBP-Xs5t6TxmJuq4nG8jwThQ=n34B4cEmup@mail.gmail.com> <4C479CE4.6070805@caucho.com> <AANLkTims1er0Rbv0ysP4gRs1Kd0He8hapHeJ3nON=JQa@mail.gmail.com> <4C47C5B0.3030006@caucho.com> <AANLkTi=ND-FOH8OoD=TCbiyeSZ-h0LhxQBXN5w-2hfvj@mail.gmail.com> <20100722055452.GL7174@1wt.eu> <AANLkTik_rpxo=1OfzHkwpC5soQG_NxvGuZNXx7gdhVTh@mail.gmail.com> <20100722064945.GM7174@1wt.eu> <AANLkTim7AsQGSwLE51uktj=B1vB6roZChAtDoCrE6fFG@mail.gmail.com> <4C47FF71.3050000@ericsson.com>
To: Salvatore Loreto <salvatore.loreto@ericsson.com>
X-Mailer: Apple Mail (2.1081)
X-Brightmail-Tracker: AAAAAQAAAZE=
Cc: hybi@ietf.org
Subject: Re: [hybi] Upgrade Mechanism and HasMat (was Re: Extensibility mechanisms?)
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Jul 2010 16:39:48 -0000

On Jul 22, 2010, at 1:21 AM, Salvatore Loreto wrote:

> Hi Adam,
> 
> first let me thank you, Willy, Maciej  for the discussion about cross-protocol vulnerability,
> having the explanation and picture of the problem always help the discussion and boost the
> possibility to find a good solution.
> 
> from my personal point of view,
> I see more value to work on a general solution to secure the HTTP Upgrade mechanism 
> against cross-protocol vulnerability, instead of trying to draft something ad-hoc for WebSocket
> 
> actually that sounds at least to me as something that perfectly fit in the HasMat BoF.
> 
> "The goal of this working group is to standardize a small number of
> selected specifications that have proven to improve security of Internet
> Web applications. The requirements guiding the work will be taken from
> the Web application and Web security communities.
> It would be extremely good if you (or someone else) can arrange a short presentation about this issue during the HasMat BoF!
> If nobody volunteer I can prepare a couple of slides (taking advantage of what you have discussed in this thread)
> and ask 5 minutes to the HasMat chairs to present them.

I'm not sure that is a good approach to the problem, for two reasons:

1) Cross-protocol vulnerabilities are highly dependent on the details, and it matters very much what the upgrade request looks like, and what protocol is used after upgrading. Upgrading to WebSocket has very different considerations from upgrading to TLS (RFC2817). It's not clear to me that this problem can be solved in a generic way.

2) Even if the problem could be solved generically for any instance of HTTP Upgrade, it would create significant delay if we add a dependency to WebSocket Protocol on a dependency that is currently undefined.

Regards,
Maciej