- From: Eric Rescorla <ekr@rtfm.com>
- Date: Tue, 7 Oct 2014 15:47:50 -0700
- To: Greg Wilkins <gregw@intalio.com>
- Cc: HTTP Working Group <ietf-http-wg@w3.org>
- Message-ID: <CABcZeBMGBJgKVbFda_7t6xOcn5MPfWSgyrgTybBcUE=bWaUuJQ@mail.gmail.com>
On Tue, Oct 7, 2014 at 3:14 PM, Greg Wilkins <gregw@intalio.com> wrote: > > Eric, > > You are saying that we will be OK if endpoints "just comply with 9.2.2", > yet that "clients and servers routinely have hidden switches to override > specification requirements". Thus you are saying we will routinely be > exposed to a fragile handshake that might not work. > No. I am saying that people who are doing testing can configure their software in noncompliant ways, which may cause bustage. -Ekr > 9.2.2 interpretation is and will be subject to configuration. Initially > the configuration might be made non compliant only for testing or for niche > deployments. But in future, who know how ciphers will evolve and how that > configuration will be changed in real deployments. > > We need a robust handshake that will not fail if there is some deviation > from strict 9.2.2 compliance in configuration. We need to allow "h2 > acceptability" to be evolve by experts and experience without the risk of > connection failure when there are mutually acceptable protocol/cipher > pairs. > > See other thread for the start of a concrete proposal for this. > > cheers > > > > > On 7 October 2014 15:06, Eric Rescorla <ekr@rtfm.com> wrote: > >> >> >> On Mon, Oct 6, 2014 at 4:55 PM, Greg Wilkins <gregw@intalio.com> wrote: >> >>> Nicholas, >>> >>> I was not implying that FF has done anything wrong and it is good to >>> know that there is a configuration to turn off 9.2.2 checking. >>> >>> But my point remains. if 9.2.2 is configurable, then a server cannot >>> know on what basis a cipher is offered - is it a h1 fallback cipher or a >>> configured weak cipher. If the server guesses wrong communication failure >>> results even though the pair might have protocol/cipher choices that are >>> acceptable. >>> >> >> I don't understand this argument. The server doesn't have to guess, it >> just complies >> with with 9.2.2 and things should work regardless of whether the client is >> configured to accept non-AEAD ciphers for h2 or not. >> >> More generally, clients and servers routinely have hidden switches to >> override >> specification requirements for testing purposes: to take a non-HTTP >> example, >> the getUserMedia() specification explicitly requires the user to be >> prompted >> before granting camera and microphone access, but Firefox has a pref in >> about:config to let you override that. When you flip that preference, >> Firefox >> becomes nonconformant. There are reasons to do that for testing, but if >> you >> do it, you're on your own. I don't see the situation here as being any >> different. >> >> -Ekr >> >> >> > > > -- > Greg Wilkins <gregw@intalio.com> > http://eclipse.org/jetty HTTP, SPDY, Websocket server and client that > scales > http://www.webtide.com advice and support for jetty and cometd. >
Received on Tuesday, 7 October 2014 22:48:59 UTC