Re: [hybi] Handshake was: The WebSocket protocol issues.

Ian Fette (イアンフェッティ) <ifette@google.com> Mon, 11 October 2010 21:17 UTC

Return-Path: <ifette@google.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D9CC83A6B8C for <hybi@core3.amsl.com>; Mon, 11 Oct 2010 14:17:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.6
X-Spam-Level:
X-Spam-Status: No, score=-104.6 tagged_above=-999 required=5 tests=[AWL=1.076, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bzNlWAxJQza5 for <hybi@core3.amsl.com>; Mon, 11 Oct 2010 14:17:19 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.35]) by core3.amsl.com (Postfix) with ESMTP id 71DDD3A681A for <hybi@ietf.org>; Mon, 11 Oct 2010 14:17:18 -0700 (PDT)
Received: from hpaq5.eem.corp.google.com (hpaq5.eem.corp.google.com [172.25.149.5]) by smtp-out.google.com with ESMTP id o9BLIUY4001642 for <hybi@ietf.org>; Mon, 11 Oct 2010 14:18:30 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1286831910; bh=tVY7a0GufUem9f2tOPZQ9BojaSg=; h=MIME-Version:Reply-To:In-Reply-To:References:Date:Message-ID: Subject:From:To:Cc:Content-Type; b=XUrpaH31GWE6xhEmHKLZ7uJyI2qg90vKF1KH7mGa/mwInNzcf5rtPmcWLX3WxivIE uiLDBIQ+SdfjwrM6bXqMA==
Received: from qyk36 (qyk36.prod.google.com [10.241.83.164]) by hpaq5.eem.corp.google.com with ESMTP id o9BLEPd9031310 for <hybi@ietf.org>; Mon, 11 Oct 2010 14:18:29 -0700
Received: by qyk36 with SMTP id 36so1971172qyk.18 for <hybi@ietf.org>; Mon, 11 Oct 2010 14:18:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:received:received:reply-to :in-reply-to:references:date:message-id:subject:from:to:cc :content-type; bh=IIyRzsPeN9W0473jBwNL4b1n2zXbGTEv5dmy0LEi8Io=; b=t6YaOik9z7Wj/UVJ95QWoa8uzl8eMQNEy+tnmSDHbttAQ7zIK3MUrla0w61MBpGmTT jA9378lzXWNnmjkV8XIA==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:reply-to:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; b=wDbYMAbJpyxC8aX8fubDjnUOxsmOOKPtWsYY8tf0W9hDobXLeoQUNjZP8AayyjdOKG C+bRNQZStVZVOcqSXqug==
MIME-Version: 1.0
Received: by 10.229.91.9 with SMTP id k9mr5509761qcm.248.1286831905326; Mon, 11 Oct 2010 14:18:25 -0700 (PDT)
Received: by 10.229.13.225 with HTTP; Mon, 11 Oct 2010 14:18:25 -0700 (PDT)
In-Reply-To: <20101011211228.GE17225@1wt.eu>
References: <20101009055723.GL4712@1wt.eu> <AANLkTimY2DjxgZybibSRtc7L34Wns2KhQC=Wa9K6PYku@mail.gmail.com> <20101009204009.GP4712@1wt.eu> <AANLkTi=Az0RmE1Uipo068zMh3YzgMpM2tQ+zYxaDT47A@mail.gmail.com> <20101011053354.GA12672@1wt.eu> <4CB2D7BD.1070004@opera.com> <9B9FA451-5551-4434-8EC1-BAC834FB9A61@apple.com> <AANLkTimDc_aqRTtgRpMKhdhk6x+vPGyOPvU3A=6mK9S7@mail.gmail.com> <4CB3373C.5050507@opera.com> <Pine.LNX.4.64.1010112100560.8618@ps20323.dreamhostps.com> <20101011211228.GE17225@1wt.eu>
Date: Mon, 11 Oct 2010 14:18:25 -0700
Message-ID: <AANLkTimJwyLouWc5McHpf4XbDz312ug1DB-rwnwORtaF@mail.gmail.com>
From: "Ian Fette (イアンフェッティ)" <ifette@google.com>
To: Willy Tarreau <w@1wt.eu>
Content-Type: multipart/alternative; boundary="001636164a2b9a48a804925de63e"
X-System-Of-Record: true
Cc: hybi <hybi@ietf.org>
Subject: Re: [hybi] Handshake was: The WebSocket protocol issues.
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: ifette@google.com
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Oct 2010 21:17:21 -0000

Willy,

People are welcome to use the null cipher suite with TLS.

On Mon, Oct 11, 2010 at 2:12 PM, Willy Tarreau <w@1wt.eu> wrote:

> Hi Ian,
>
> On Mon, Oct 11, 2010 at 09:04:08PM +0000, Ian Hickson wrote:
> > On Mon, 11 Oct 2010, James Graham wrote:
> > >
> > > So there is an underlying issue here that I don't understand. It seems
> > > clear to me that Adam and Eric's proposed handshake has a better
> > > security story with regard to cross-protocol attacks than -75, -76, or
> > > any other proposal other than using NPN with TLS. However there seem to
> > > be a number of people who have problems with this proposed handshake to
> > > the extent that they are prepared to forgo the security properties in
> > > order to get something different. In general people seem to be aware
> > > that they are making the security weaker since the arguments are mostly
> > > about how different approaches will probably be good enough in practice
> > > even though they are theoretically inferior.
> > >
> > > What I haven't followed is what the problems with the proposal actually
> > > are. I understand that I have likely missed these in other messages,
> but
> > > it would be helpful if people who believe that the proposed approach,
> or
> > > aspects of it, are unworkable could summarise the outstanding issues
> > > they see.
> >
> > I would like to ask a similar question, but to the people proposing Adam
> > and Eric's latest proposed handshake. What real problem does it solve
> that
> > NPN with TLS doesn't solve? As you say, it is weaker than NPN with TLS,
> so
> > why not just go all the way?
> >
> > This would have multiple advantages beyond just being more secure, for
> > example we could halve the number of schemes we're introducing, halve the
> > number of handshake implementations on both clients and servers, greatly
> > reduce the testing burden, etc.
>
> And unfortunately prevent content analysis in schools, and be blocked by
> default in many enterprises, and probably make virtual hosting impossible,
> unless the target resource can be announced in the TLS setup, which I'm
> not sure is possible with NPN.
>
> In fact, I think that if the WS work was started, it was to get rid of the
> mechanisms relying on long polling. And those mechanisms were invented
> because only HTTP passes everywhere. If we propose something which is
> not compatible with currently deployed HTTP infrastructures, we'll then
> still keep the current mechanisms and have WS proposed as an Nth
> alternative
> for some situations, which will definitely make the situation worse for the
> user and for the developer.
>
> That need of compatibility with already deployed HTTP infrastructure seems
> to be dismissed too much in this WG in my opinion, and I don't think I'm
> wrong to predict a success directly dependant on this compatibility.
>
> Regards,
> Willy
>
> _______________________________________________
> hybi mailing list
> hybi@ietf.org
> https://www.ietf.org/mailman/listinfo/hybi
>