- From: Yutaka OIWA <y.oiwa@aist.go.jp>
- Date: Sun, 5 Oct 2014 13:09:00 +0900
- To: Michael B Allen <ioplex@gmail.com>
- Cc: HTTP Working Group <ietf-http-wg@w3.org>
Dear Michael, such properties are only true for "some" set of HTTP authentications, and NTLM is one of them, unfortunately. It's against the HTTP/1.1 spec and will be broken in HTTP/2. Some multi-hop HTTP authentications, especially all of those currently discussed in HTTPAUTH WG are not associated with any TCP connections, and will work well with both HTTP/1.1 and HTTP/2. Workaround for NTLM in HTTP/2 is proposed by Montenegro's draft, as mentioned in other replies. 2014-10-04 1:10 GMT+09:00 Michael B Allen <ioplex@gmail.com>: > An HTTP authentication sequence looks something like: > > C: GET /some/thing/6678 > S: 401 Unauthorized > WWW-Authenticate: MyAwsomeAuth XlwYXNzd29yZA... > > C: GET /some/thing/6678 > Authorization: NTLM MyAwsomeAuth bGxXwYXbxXlYX... > S: 200 OK > > The way this is implemented on the server is to create some > authentication state and associate it with the client TCP connection > using the client's IP and remote port as an index into a map of > ongoing authentication state objects. > > My question is, can HTTP/2 clients submit multiple requests on the > same TCP connection without waiting for responses? > > If yes, how could HTTP authentication possibly work when there would > be no way to lookup the correct authentication state object associated > with the submitted auth token? > > To be more specific, authentication almost always involves sending the > client some random data (let's call it a "challenge") that the client > must then transform using a shared secret and submit that to the > server (let's call it a "response"). So if the server gets two > authentication "response" tokens in sequence, how can the server know > which authentication state object matches the supplied response. > Meaning it is not possible to match the "response" with it's "ch > allenge". > > Mike > -- Yutaka OIWA, Ph.D. Planning Officer, Research Planning office for IT and Electronics (also: Senior Researcher, Research Institute for Secure Systems) National Institute of Advanced Industrial Science and Technology (AIST) Mail addresses: <y.oiwa@aist.go.jp>, <yutaka@oiwa.jp> OpenPGP: id[440546B5] fp[7C9F 723A 7559 3246 229D 3139 8677 9BD2 4405 46B5]
Received on Sunday, 5 October 2014 04:09:46 UTC