- From: Roberto Peon <grmocg@gmail.com>
- Date: Thu, 14 Nov 2013 00:24:30 -0800
- To: Martin J. Dürst <duerst@it.aoyama.ac.jp>
- Cc: Mark Nottingham <mnot@mnot.net>, Rob Trace <Rob.Trace@microsoft.com>, HTTP Working Group <ietf-http-wg@w3.org>, James M Snell <jasnell@gmail.com>, Michael Sweet <msweet@apple.com>, Tim Bray <tbray@textuality.com>, Tao Effect <contact@taoeffect.com>, Mike Belshe <mike@belshe.com>
- Message-ID: <CAP+FsNeCm1vrgHBQbW+CgV-NBry+qEU-xVWuwttD2ZNV2tkEsQ@mail.gmail.com>
Ignoring improving aggregate security for a second (it would be beyond foolish to do so longer than this paragraph), everyone seems to be forgetting how poorly non http/1.1 actually works out there on the wild wild internet. 10-20% failure rates are simply unacceptable for both site operators and client writers. -=R On Nov 13, 2013 9:09 PM, Martin J. Dürst <duerst@it.aoyama.ac.jp> wrote: > If I Rob this correctly, this may mean that a future version of IE will > implement HTTP 2.0 without encryption for http: URIs. > > Next let's say that Apache 3.0 implements HTTP 2.0 which can be configured > to run without encryption (after all, Apache is used in internal contexts, > too). > > What's the chance of this *not* leaking out into the open internet and > forcing other browser vendors to also allow HTTP 2.0 for http: URIs without > encryption? After all, experience has shown that users quickly abandon a > browser that doesn't work for some websites, and that browser vendors know > about this and try to avoid it. > > Just some thoughts. > > Regards, Martin. > > [Not a hacker,..., but just a maintainer of some small web sites with not > enough time to set up certificates and TLS (similar to Karl).] > > On 2013/11/14 3:36, Rob Trace wrote: > >> We are one browser vendor who is in support of HTTP 2.0 for HTTP://URIs. The same is true for our web server. I also believe that we should >> strongly encourage the use of TLS with HTTP, but not at the expense of >> creating a standard that is as broadly applicable as HTTP 1.1. >> >> >> >> I think this statement correctly captures the proposal: >> >> >> >> To be clear - we will still define how to use HTTP/2.0 with http:// >>> >> >> URIs, because in some use cases, an implementer may make an >>> >> >> informed choice to use the protocol without encryption. >>> >> >> >> >> This is essentially what the document states today and this would fulfill >> the requirements from the charter. >> >> -Rob >> >> From: Michael Sweet [mailto:msweet@apple.com] >> Sent: Wednesday, November 13, 2013 10:27 AM >> To: Mike Belshe >> Cc: Tao Effect; Tim Bray; James M Snell; Mark Nottingham; HTTP Working >> Group >> Subject: Re: Moving forward on improving HTTP's security >> >> Honestly if there is no unencrypted path then you are just updating >> HTTPS, not HTTP/1.1. >> >> >> On Nov 13, 2013, at 1:14 PM, Mike Belshe<mike@belshe.com<mailto: >> mike@belshe.com>> wrote: >> >> >> Agree with Tim; I am also in support of 100% TLS all the time. >> >> I would like us to do both Mark's proposals: >> (A) opportunistic upgrade of http to SSL >> and >> (C) HTTP/2.0 is TLS all the time. >> >> Mike >> >> >> On Wed, Nov 13, 2013 at 9:46 AM, Tao Effect<contact@taoeffect.com<mailto: >> contact@taoeffect.com>> wrote: >> On Nov 13, 2013, at 12:31 PM, Tim Bray<tbray@textuality.com<mailto: >> tbray@textuality.com>> wrote: >> Let's not let the perfect be the enemy of the good. >> >> FWIW, here's one voice in support of HTTP/2==TLS. >> >> Not much content there supporting your vote. :-( >> >> A vote doesn't count (in my book at least), if it doesn't have strong >> rationale before it. >> >> To me this also comes across as security theater (what a wonderful >> expression). >> >> Let's get this clear: >> >> 1. Perfection is not being requested. Just something other than "abysmal". >> >> 2. TLS that depends on CAs is not by any means "good". It is bad. Very >> bad. I would even support a viewpoint that says it's worse than HTTP >> because of the false sense of security that it gives people. >> >> - Greg >> >> -- >> Please do not email me anything that you are not comfortable also sharing >> with the NSA. >> >> On Nov 13, 2013, at 12:31 PM, Tim Bray<tbray@textuality.com<mailto: >> tbray@textuality.com>> wrote: >> >> >> On Wed, Nov 13, 2013 at 9:22 AM, James M Snell<jasnell@gmail.com<mailto: >> jasnell@gmail.com>> wrote: >> To be honest, much of this comes across to me as knee-jerk security >> theater. Sure, using TLS is a good thing, but by itself it doesn't >> come even remotely close to dealing with the range of fundamental >> security and privacy issues that have come to light over the past few >> months. If not handled properly, it could definitely give a false >> sense of security. >> >> Let's not let the perfect be the enemy of the good. >> >> FWIW, here's one voice in support of HTTP/2==TLS. And another saying >> let's not give up on opportunistic encryption. >> >> >> >> >> >> >> On Wed, Nov 13, 2013 at 2:01 AM, Mark Nottingham<mnot@mnot.net<mailto: >> mnot@mnot.net>> wrote: >> [snip] >> >>> >>> The most relevant proposals were: >>> >>> FWIW, I intend to make another proposal once (a) the base http/2 >> protocol is complete and (b) protocol extensions have been dealt with >> properly. >> >> [snip] >> >>> >>> As a result, I believe the best way that we can meet the goal of >>> increasing use of TLS on the Web is to encourage its use by only using >>> HTTP/2.0 with https:// URIs. >>> >>> -1. HTTP/2 should not be limited to TLS only. If someone wishes to >> craft text that strongly encourages use of TLS in specific >> applications of HTTP/2, then that would be fine. But the protocol >> itself should not require it. >> >> This can be effected without any changes to our current document; >>> browser vendors are not required to implement HTTP/2.0 for http:// URIs >>> today. However, we will discuss formalising this with suitable requirements >>> to encourage interoperability; suggestions for text are welcome. >>> >>> FWIW, I have to concur with the others on this thread, Mark. The >> language you're using here makes it sound like the decision has >> already been made. >> >> To be clear - we will still define how to use HTTP/2.0 with http://URIs, because in some use cases, an implementer may make an informed choice >>> to use the protocol without encryption. However, for the common case -- >>> browsing the open Web -- you'll need to use https:// URIs and if you >>> want to use the newest version of HTTP. >>> >>> Again, -1 to making this a normative requirement. Our task ought to be >> ensuring that people who bother to read the specification are fully >> informed of the choices they are making, and not to make those choices >> for them. Yes, I get it, some security is better than no security, but >> adding constraints that only partially address the problem, just >> because it makes us feel good or because it looks better from a PR >> perspective, is not the right approach. >> >> What I think would be helpful is taking some time to draw up a >> description of: >> >> 1. The specific types of threats to HTTP/1.1 and HTTP/2 we feel are >> significant. >> 2. The specific types of threats we collectively feel ought to be >> addressed by HTTP/2, and the ones we feel are beyond our scope >> 3. A broader list of options for how those threats can be mitigated >> >> In other words, an I-D describing the relevant threat model. >> >> Once we have that, we can make a more informed collective decision. >> >> - James >> >> This is by no means the end of our security-related work. For example: >>> >>> * Alternate approaches to proxy caching (such as peer-to-peer caching >>> protocols) may be proposed here or elsewhere, since traditional proxy >>> caching use cases will no longer be met when TLS is in wider use. >>> >>> * As discussed in the perpass BoF, strengthening how we use TLS (e.g., >>> for Perfect Forward Security) is on the table. >>> >>> * A number of people expressed interest in refining and/or extending how >>> proxies work in HTTP (both 1.0 and 2.0), as discussed in >>> draft-nottingham-http-proxy-problem (among many other relevant drafts). >>> >>> Furthermore, other security-related work in the IETF (see the perpass >>> BoF) and elswhere (e.g., W3C) may affect HTTP. For example, a number of >>> people have pointed out how weaknesses in PKIX affect the Web. >>> >>> Your input, as always, is appreciated. I believe this approach is as >>> close to consensus as we're going to get on this contentious subject right >>> now. As HTTP/2 is deployed, we will evaluate adoption of the protocol and >>> might revisit this decision if we identify ways to further improve security. >>> >>> >>> >> >> >> >> _______________________________________________________________ >> Michael Sweet, Senior Printing System Engineer, PWG Chair >> >> >> >
Received on Thursday, 14 November 2013 08:24:58 UTC