Re: new version trusted-proxy20 draft

On 14/02/2014 22:42, "Patrick McManus" <pmcmanus@mozilla.com<mailto:pmcmanus@mozilla.com>> wrote:
On Fri, Feb 14, 2014 at 1:56 PM, Salvatore Loreto <salvatore.loreto@ericsson.com<mailto:salvatore.loreto@ericsson.com>> wrote:

  To distinguish between an HTTP2 connection meant to transport "https"
  URIs resources and an HTTP2 connection meant to transport "http" URIs
  resource, the draft proposes to

HTTP/2 doesn't require a connection to transport a consistent scheme as long as the underlying properties of the connection are sufficient for carrying all of the schemes on it. (i.e. you can't carry https:// without a minimum security set, but you can certainly mix https:// and http://)

Exactly: the explicit separation of the TLS connections that are intended for https vs http URIs is the core of Sal’s proposal.  And a significant delta from the current HTTP/2 spec.

  This document describes two alternative methods for an user-agent to
  automatically discover and for an user to provide consent for a
  Trusted Proxy to be securely involved when he or she is requesting an
  HTTP URI resource over HTTP2 with TLS.

This has the effect of signaling to an on path observer which transactions, in a large stream of them, will not be able to detect a MITM interaction.

A couple of questions to try and understand your concern:
1) Provided that a “h2clr” TLS tunnel, when established, is not retrospectively MITM-able, what advantage an on-path adversary would get from just observing it?
2) While TLS handshaking, what makes “h2clr” more prone to stealthy MITM’s than “h2”?

Cheers

Received on Sunday, 16 February 2014 21:51:02 UTC