[perpass] [rfc-editor@rfc-editor.org: RFC 8164 on Opportunistic Security for HTTP/2]

Stephane Bortzmeyer <bortzmeyer@nic.fr> Tue, 16 May 2017 14:11 UTC

Return-Path: <bortzmeyer@nic.fr>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id D440612EBBF for <perpass@ietfa.amsl.com>; Tue, 16 May 2017 07:11:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id ruxcn6wi5LZo for <perpass@ietfa.amsl.com>; Tue, 16 May 2017 07:11:52 -0700 (PDT)
Received: from mx4.nic.fr (mx4.nic.fr [IPv6:2001:67c:2218:2::4:12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C04512EBEF for <perpass@ietf.org>; Tue, 16 May 2017 07:07:15 -0700 (PDT)
Received: from mx4.nic.fr (localhost []) by mx4.nic.fr (Postfix) with SMTP id 3A4272805BD for <perpass@ietf.org>; Tue, 16 May 2017 16:07:13 +0200 (CEST)
Received: by mx4.nic.fr (Postfix, from userid 500) id 333BB2805FE; Tue, 16 May 2017 16:07:13 +0200 (CEST)
Received: from relay01.prive.nic.fr (relay01.prive.nic.fr [IPv6:2001:67c:2218:15::11]) by mx4.nic.fr (Postfix) with ESMTP id 2BDE62805BD for <perpass@ietf.org>; Tue, 16 May 2017 16:07:13 +0200 (CEST)
Received: from b12.nic.fr (b12.users.prive.nic.fr []) by relay01.prive.nic.fr (Postfix) with ESMTP id 27EFF6023DF3 for <perpass@ietf.org>; Tue, 16 May 2017 16:07:13 +0200 (CEST)
Received: by b12.nic.fr (Postfix, from userid 1000) id 24B3540B37; Tue, 16 May 2017 16:07:13 +0200 (CEST)
Date: Tue, 16 May 2017 16:07:13 +0200
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: perpass@ietf.org
Message-ID: <20170516140713.ydv3mqa76tc7g3hv@nic.fr>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="rjwm6vwfgwa2a5bi"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-Operating-System: Debian GNU/Linux 9.0
X-Kernel: Linux 4.9.0-2-amd64 x86_64
X-Charlie: Je suis Charlie
Organization: NIC France
X-URL: http://www.nic.fr/
User-Agent: NeoMutt/20170113 (1.7.2)
X-Bogosity: No, tests=bogofilter, spamicity=0.000000, version=1.2.2
X-PMX-Version:, Antispam-Engine:, Antispam-Data: 2017.5.16.135716
Archived-At: <https://mailarchive.ietf.org/arch/msg/perpass/b1EYaXP8QDQGZGXdaco2R71ONGY>
Subject: [perpass] [rfc-editor@rfc-editor.org: RFC 8164 on Opportunistic Security for HTTP/2]
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2017 14:11:55 -0000

Relevant for this (quiet…) list, I think.
--- Begin Message ---
A new Request for Comments is now available in online RFC libraries.

        RFC 8164

        Title:      Opportunistic Security for HTTP/2 
        Author:     M. Nottingham, 
                    M. Thomson
        Status:     Experimental
        Stream:     IETF
        Date:       May 2017
        Mailbox:    mnot@mnot.net, 
        Pages:      10
        Characters: 19620
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-httpbis-http2-encryption-11.txt

        URL:        https://www.rfc-editor.org/info/rfc8164

        DOI:        10.17487/RFC8164

This document describes how "http" URIs can be accessed using
Transport Layer Security (TLS) and HTTP/2 to mitigate pervasive
monitoring attacks.  This mechanism not a replacement for "https"
URIs; it is vulnerable to active attacks.

This document is a product of the Hypertext Transfer Protocol Bis Working Group of the IETF.

EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

The RFC Editor Team
Association Management Solutions, LLC

--- End Message ---