Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id A3D6512DDA3
 for <quic-issues@ietfa.amsl.com>; Mon, 12 Nov 2018 02:06:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.47
X-Spam-Level: 
X-Spam-Status: No, score=-8.47 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.47, DKIM_SIGNED=0.1,
 DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001,
 MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001]
 autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
 header.d=github.com
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Ch--2tqjkGGr for <quic-issues@ietfa.amsl.com>;
 Mon, 12 Nov 2018 02:06:52 -0800 (PST)
Received: from out-6.smtp.github.com (out-6.smtp.github.com [192.30.252.197])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 40E741277BB
 for <quic-issues@ietf.org>; Mon, 12 Nov 2018 02:06:52 -0800 (PST)
Date: Mon, 12 Nov 2018 02:06:51 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com;
 s=pf2014; t=1542017211;
 bh=/cd3lTrgCj5NhZdJTZTBqIEj49ppyyXBiPZh8w+LDuc=;
 h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID:
 List-Archive:List-Post:List-Unsubscribe:From;
 b=C4DKFQfZPk2qK9BizvoswSw20bFAxpKRzGRVoBhSgjxpGCw40mKwpe3QcOU3DZ2vB
 qLEywsxEbLROBvoS1rWCj+v+SGWVS78aSsG3gx11CsMlFNkmThsXrksFlN185JrFTt
 K2aCfr+u8Lm2gceLb38OWUPYdpczJ7CgxAgIiedw=
From: Martin Thomson <notifications@github.com>
Reply-To: quicwg/base-drafts
 <reply+0166e4ab1e158d45fefe314acd32fa8e21754c8b83a9c75a92cf00000001180112bb92a169ce16a1bbee@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/1993/437824022@github.com>
In-Reply-To: <quicwg/base-drafts/issues/1993@github.com>
References: <quicwg/base-drafts/issues/1993@github.com>
Subject: Re: [quicwg/base-drafts] Introduce a bit to indicate the server
 doesn't do IP-based authentication (#1993)
Mime-Version: 1.0
Content-Type: multipart/alternative;
 boundary="--==_mimepart_5be950bb55564_2a093fb3334d45c42942ab";
 charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: martinthomson
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/veDUWMZ1ZTakIUKbPHrCHGH5KKE>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG
 <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>,
 <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>,
 <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Nov 2018 10:06:54 -0000


----==_mimepart_5be950bb55564_2a093fb3334d45c42942ab
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Since this idea probably traces back to me, I can't really say this is bad.  But I think that we can probably do something in an extension.  This is a somewhat specialized use case.  Happy to work with you, @annevk or @jakearchibald, to make that happen.

A generic TLS extension might be better here.  QUIC could pick that up, but it might also be nice to have that signal in other contexts than just QUIC.

I have significant reservations about how this sort of extension might be deployed safely.  We'll have to be very careful to explain the risks of a mistake.  Turning on a server-level config like this requires confidence that there are no resources on that server that are restricted.  Worse, if servers can be used for connection coalescing (in HTTP/2 or QUIC), then that risk extends to all resources across all origins that might be coalesced onto the same connection.

I suspect that server-level CORS is a common-enough implementation technique.  So we likely already have servers taking that risk.  So on balance this is probably worth doing.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/1993#issuecomment-437824022
----==_mimepart_5be950bb55564_2a093fb3334d45c42942ab
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p>Since this idea probably traces back to me, I can't really say this is=
 bad.  But I think that we can probably do something in an extension.  Th=
is is a somewhat specialized use case.  Happy to work with you, <a class=3D=
"user-mention" data-hovercard-type=3D"user" data-hovercard-url=3D"/hoverc=
ards?user_id=3D1544111" data-octo-click=3D"hovercard-link-click" data-oct=
o-dimensions=3D"link_type:self" href=3D"https://github.com/annevk">@annev=
k</a> or <a class=3D"user-mention" data-hovercard-type=3D"user" data-hove=
rcard-url=3D"/hovercards?user_id=3D93594" data-octo-click=3D"hovercard-li=
nk-click" data-octo-dimensions=3D"link_type:self" href=3D"https://github.=
com/jakearchibald">@jakearchibald</a>, to make that happen.</p>
<p>A generic TLS extension might be better here.  QUIC could pick that up=
, but it might also be nice to have that signal in other contexts than ju=
st QUIC.</p>
<p>I have significant reservations about how this sort of extension might=
 be deployed safely.  We'll have to be very careful to explain the risks =
of a mistake.  Turning on a server-level config like this requires confid=
ence that there are no resources on that server that are restricted.  Wor=
se, if servers can be used for connection coalescing (in HTTP/2 or QUIC),=
 then that risk extends to all resources across all origins that might be=
 coalesced onto the same connection.</p>
<p>I suspect that server-level CORS is a common-enough implementation tec=
hnique.  So we likely already have servers taking that risk.  So on balan=
ce this is probably worth doing.</p>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&m=
dash;<br />You are receiving this because you are subscribed to this thre=
ad.<br />Reply to this email directly, <a href=3D"https://github.com/quic=
wg/base-drafts/issues/1993#issuecomment-437824022">view it on GitHub</a>,=
 or <a href=3D"https://github.com/notifications/unsubscribe-auth/AWbkq4kT=
gzCsUW-19-szDKJV-BmbXaAoks5uuUg7gaJpZM4YZTK5">mute the thread</a>.<img sr=
c=3D"https://github.com/notifications/beacon/AWbkq5eN6MxbJht2R42_MVYlUfMZ=
ZCR3ks5uuUg7gaJpZM4YZTK5.gif" height=3D"1" width=3D"1" alt=3D"" /></p>
<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_versio=
n":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name"=
:"GitHub"},"entity":{"external_key":"github/quicwg/base-drafts","title":"=
quicwg/base-drafts","subtitle":"GitHub repository","main_image_url":"http=
s://assets-cdn.github.com/images/email/message_cards/header.png","avatar_=
image_url":"https://assets-cdn.github.com/images/email/message_cards/avat=
ar.png","action":{"name":"Open in GitHub","url":"https://github.com/quicw=
g/base-drafts"}},"updates":{"snippets":[{"icon":"PERSON","message":"@mart=
inthomson in #1993: Since this idea probably traces back to me, I can't r=
eally say this is bad.  But I think that we can probably do something in =
an extension.  This is a somewhat specialized use case.  Happy to work wi=
th you, @annevk or @jakearchibald, to make that happen.\r\n\r\nA generic =
TLS extension might be better here.  QUIC could pick that up, but it migh=
t also be nice to have that signal in other contexts than just QUIC.\r\n\=
r\nI have significant reservations about how this sort of extension might=
 be deployed safely.  We'll have to be very careful to explain the risks =
of a mistake.  Turning on a server-level config like this requires confid=
ence that there are no resources on that server that are restricted.  Wor=
se, if servers can be used for connection coalescing (in HTTP/2 or QUIC),=
 then that risk extends to all resources across all origins that might be=
 coalesced onto the same connection.\r\n\r\nI suspect that server-level C=
ORS is a common-enough implementation technique.  So we likely already ha=
ve servers taking that risk.  So on balance this is probably worth doing.=
"}],"action":{"name":"View Issue","url":"https://github.com/quicwg/base-d=
rafts/issues/1993#issuecomment-437824022"}}}</script>
<script type=3D"application/ld+json">[
{
"@context": "http://schema.org",
"@type": "EmailMessage",
"potentialAction": {
"@type": "ViewAction",
"target": "https://github.com/quicwg/base-drafts/issues/1993#issuecomment=
-437824022",
"url": "https://github.com/quicwg/base-drafts/issues/1993#issuecomment-43=
7824022",
"name": "View Issue"
},
"description": "View this Issue on GitHub",
"publisher": {
"@type": "Organization",
"name": "GitHub",
"url": "https://github.com"
}
},
{
"@type": "MessageCard",
"@context": "http://schema.org/extensions",
"hideOriginalBody": "false",
"originator": "AF6C5A86-E920-430C-9C59-A73278B5EFEB",
"title": "Re: [quicwg/base-drafts] Introduce a bit to indicate the server=
 doesn't do IP-based authentication (#1993)",
"sections": [
{
"text": "",
"activityTitle": "**Martin Thomson**",
"activityImage": "https://assets-cdn.github.com/images/email/message_card=
s/avatar.png",
"activitySubtitle": "@martinthomson",
"facts": [

]
}
],
"potentialAction": [
{
"name": "Add a comment",
"@type": "ActionCard",
"inputs": [
{
"isMultiLine": true,
"@type": "TextInput",
"id": "IssueComment",
"isRequired": false
}
],
"actions": [
{
"name": "Comment",
"@type": "HttpPOST",
"target": "https://api.github.com",
"body": "{\n\"commandName\": \"IssueComment\",\n\"repositoryFullName\": \=
"quicwg/base-drafts\",\n\"issueId\": 1993,\n\"IssueComment\": \"{{IssueCo=
mment.value}}\"\n}"
}
]
},
{
"name": "Close issue",
"@type": "HttpPOST",
"target": "https://api.github.com",
"body": "{\n\"commandName\": \"IssueClose\",\n\"repositoryFullName\": \"q=
uicwg/base-drafts\",\n\"issueId\": 1993\n}"
},
{
"targets": [
{
"os": "default",
"uri": "https://github.com/quicwg/base-drafts/issues/1993#issuecomment-43=
7824022"
}
],
"@type": "OpenUri",
"name": "View on GitHub"
},
{
"name": "Unsubscribe",
"@type": "HttpPOST",
"target": "https://api.github.com",
"body": "{\n\"commandName\": \"MuteNotification\",\n\"threadId\": 4092853=
05\n}"
}
],
"themeColor": "26292E"
}
]</script>=

----==_mimepart_5be950bb55564_2a093fb3334d45c42942ab--

