W3C home > Mailing lists > Public > ietf-http-wg@w3.org > October to December 2016

RE: Expectations for TLS session reuse

From: Mike Bishop <Michael.Bishop@microsoft.com>
Date: Thu, 22 Dec 2016 17:56:29 +0000
To: Patrick McManus <mcmanus@ducksong.com>, Richard Bradbury <richard.bradbury@rd.bbc.co.uk>
CC: Martin Thomson <martin.thomson@gmail.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>, Eric Rescorla <ekr@rtfm.com>, Lucas Pardue <Lucas.Pardue@bbc.co.uk>
Message-ID: <BN6PR03MB27082667DCC8A6DE50FD830187920@BN6PR03MB2708.namprd03.prod.outlook.com>
In theory, Richard is correct – “verif[y] that the communicating server’s identity matches the target URI’s authority component” could be considered satisfied if the cert were valid for the target name, even if it’s not the name the connection was originally opened to.

However, I don’t know of any HTTP/1.1 clients that actually implement it that way, and as I said before, I know of HTTP/1.1 servers that will refuse a request in that circumstance.  So as a practical matter, Patrick is correct too.

From: Patrick McManus [mailto:mcmanus@ducksong.com]
Sent: Thursday, December 22, 2016 7:39 AM
To: Richard Bradbury <richard.bradbury@rd.bbc.co.uk>
Cc: Martin Thomson <martin.thomson@gmail.com>; Mike Bishop <Michael.Bishop@microsoft.com>; ietf-http-wg@w3.org; Eric Rescorla <ekr@rtfm.com>; Lucas Pardue <Lucas.Pardue@bbc.co.uk>; Patrick McManus <mcmanus@ducksong.com>
Subject: Re: Expectations for TLS session reuse

On Thu, Dec 22, 2016 at 7:25 AM, Richard Bradbury <richard.bradbury@rd.bbc.co.uk<mailto:richard.bradbury@rd.bbc.co.uk>> wrote:
the position is the same for HTTP/1.1 as it is for HTTP/2

I don't think this is true. H1 is governed by 7230 section 9.. in practice it is a connection per origin:

 The "https" scheme (Section 2.7.2<https://tools.ietf.org/html/rfc7230#section-2.7.2>) is intended to prevent (or at

   least reveal) many of these potential attacks on establishing

   authority, provided that the negotiated TLS connection is secured and

   the client properly verifies that the communicating server's identity

   matches the target URI's authority component (see [RFC2818<https://tools.ietf.org/html/rfc2818>]).

whereas H2 loosens that a little bit for coalescing in 7540.
Received on Thursday, 22 December 2016 17:56:58 UTC

This archive was generated by hypermail 2.3.1 : Thursday, 22 December 2016 17:57:02 UTC