- From: Ilari Liusvaara <ilari.liusvaara@elisanet.fi>
- Date: Wed, 20 Nov 2013 06:39:06 +0200
- To: James M Snell <jasnell@gmail.com>
- Cc: Roberto Peon <grmocg@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, Mark Nottingham <mnot@mnot.net>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
On Tue, Nov 19, 2013 at 05:52:57PM -0800, James M Snell wrote: > Also, keep in the mind the CONNECT tunnel option. One could negotiate > an agreement and use that along with a CONNECT tunnel. Once that's > done, any traffic that passes back and forth within that tunnel would > be protected, limiting potential leakage. If we add incremental > integrity checking to the picture, this becomes more reliable (albeit > more complex as well). How would that work? CONNECT is essentially TCP stream carried within HTTP/2 mux. -Ilari
Received on Wednesday, 20 November 2013 04:39:30 UTC