- From: Mike Belshe <mike@belshe.com>
- Date: Mon, 26 Mar 2012 11:17:24 +0200
- To: "Adrien W. de Croy" <adrien@qbik.com>
- Cc: "Roy T. Fielding" <fielding@gbiv.com>, patrick mcmanus <pmcmanus@mozilla.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
- Message-ID: <CABaLYCu6xkfm9yTSTsz-VDXXugJq-uabXNph2GzRbCP6D_9A3A@mail.gmail.com>
On Mon, Mar 26, 2012 at 10:56 AM, Adrien W. de Croy <adrien@qbik.com> wrote: > > ------ Original Message ------ > From: "Mike Belshe" <mike@belshe.com> > To: "Roy T. Fielding" <fielding@gbiv.com> > Cc: "patrick mcmanus" <pmcmanus@mozilla.com>;"ietf-http-wg@w3.org" < > ietf-http-wg@w3.org> > Sent: 26/03/2012 9:34:38 p.m. > Subject: Re: SPDY = HTTP/2.0 or not ? > > > > On Mon, Mar 26, 2012 at 10:10 AM, Roy T. Fielding < <fielding@gbiv.com> > fielding@gbiv.com> wrote: > >> On Mar 26, 2012, at 9:44 AM, patrick mcmanus wrote: >> >> > On 3/26/2012 7:56 AM, Poul-Henning Kamp wrote: >> >> In message<CAAbTgTu7qbPiREWRRqFddgoko0FCt0jmxR=<NP1gqsiARCwscew@mail.gmail.com> >> NP1gqsiARCwscew@mail.gmail.com> >> >> , Brian Pane writes: >> >> >> >>> Nonetheless, I think it would be reasonable for HTTP/2.0 to require >> SSL. >> >> I think you need to talk to some people with big websites ;-) >> > Existence proofs: google does all of their logged in user search over >> SSL, Twitter encourages SSL by default, Facebook is widely used that way. >> It pretty clearly can be done at scale. Its not free, but its worth it. >> > >> > More importantly - no user wants to use an insecure protocol - ever. >> Web protocol design should serve them first. They have an unmet expectation >> of privacy and security that we should meet by making the application >> protocol secure all the time; the mixed- content vulnerabilities of HTTP/1 >> make that clear to me. >> >> >> I've never considered SSL to be a means of securing the protocol. >> It does a decent job of hiding the exchange of data from passive >> observers, but the way that typical user agents handle certificate >> management lacks what I would consider a secure protocol. >> > > There are two discussions here: > a) should http be secured (and what "secured" means) > > a-1. Should it be mandatory or optional. > > my vote: optional. > > > b) whether SSL is the right choice > > From a practical point of view, there aren't a lot of alternatives to SSL > on the table right now. Most people do agree that SSL does a reasonable > job of preventing eavesdropping. > > > I can see a lot of resistance from customers told they now need to buy and > maintain a certificate from a CA just to run a webserver. > This is just not true. Its free to get and has been for a while. > > Sure they can run a self-signed cert, but that doesn't fulfil the goal of > giving the user security. > > There are so many devices running an HTTP server now which don't have the > option to put in a cert. E.g. web admin on my ADSL modem. > Well, your existing device doesn't support HTTP/2.0 either. So maybe we shouldn't build HTTP/2.0? :-) Seems like a chicken and egg problem. > > It just makes no sense to say that it should be mandatory. > > > >> In any case, the notion that every user wants a secure protocol is >> irrelevant. There are many examples of HTTP use, in practice, for >> which SSL/TLS is neither desired nor appropriate. Even simple things, >> like the exchange that Apple devices use to discover network access point >> logins, cannot work with an assumption of SSL/TLS. Likewise, many uses of >> HTTP are in kiosks, public schools, libraries, and other areas for which >> your concern as a user is less important than the organization's >> responsibility to prevent misuse. >> > > I don't know of any examples where users want unsecured products or > protocols, actually. We can't solve all security issues of course, but > that doesn't mean we should leave it wide open either. And we can solve > much of the eavesdropping problem right now. So the question is really - > why wouldn't we? > > > my biggest concern is the mandatory nature of SSL/TLS in the proposal. > Let's be clear - the current SPDY draft does not require SSL. > > We will get access to the payload. > > If it is allowed it in the protocol, we can do it well. > > Otherwise we will do it badly. Which do you prefer? We _will_ do it. > No disagreement here. > > Because customers insist we do. > We need to differentiate corporate and consumer requirements here. Consumers are not asking you to do this. Private networks and corporations are. Both are legitimate. Mike > Adrien > > > >> >> There are ways to have both a secure protocol and visibility for >> intermediaries, but we don't have to agree to any of these "requirements" >> up front. If the protocol proposals can't stand for themselves, then >> I have no need for a new protocol. >> > > Protocols will only succeed if they provide real value. There is a > subjective question of whether security and privacy is part of the value or > not. > > Mike > > > >> >> ....Roy >> >> >> >
Received on Monday, 26 March 2012 09:18:01 UTC