- From: Brian Smith <brian@briansmith.org>
- Date: Fri, 31 Oct 2014 14:05:06 -0700
- To: Jason Greene <jason.greene@redhat.com>
- Cc: Mark Nottingham <mnot@mnot.net>, HTTP Working Group <ietf-http-wg@w3.org>
- Message-ID: <CAFewVt6hEX6qVf_reEr91_dJNNP7TiJKxvihNLught3qiJhScg@mail.gmail.com>
Jason Greene <jason.greene@redhat.com> wrote: > > The question at hand is what interoperability cost is involved in 9.2.2. > If it is a cost paid by a few implementations who don’t have adequate APIs > immediately at hand, that is emphatically *not* a technical issue. > > AFAIK there is exactly *one* TLS implementation out there that has nearly > adequate facilities, NSS. > If NSS's facilities are adequate, then that is a very good sign for other implementations, because NSS's facilities for this are very simple, were very simple to implement, and were deployed without any (AFAIK) disruption to any production systems. > Ilari’s use case is a great example of where it all goes wrong: > http://lists.w3.org/Archives/Public/ietf-http-wg/2014OctDec/0167.html He wrote, in part: > 4) Server TLS stack picks ALPN "h2" and ciphersuite > XYZ (must be 9.2.2 compliant because of 1). > 5) The HTTP/2 stack has no (or only partial[1]) idea what XYZ is. First of all, it is almost always going to be a bad idea to have the server TLS stack choose which application protocol to use. Instead, it should defer that choice to the server application. Second of all, if the server doesn't take that advice, and the TLS stack has already chosen h2, then the HTTP/2 layer might as well keep going on the assumption that XYZ is OK, because it hasn't given itself any better choice, due to not taking that advice. If things don't work, the server administrator will likely fix it by improving the cipher suite configuration, probably by reading section 9.2.2 of the specification or documentation derived from it. Of course, it's better for the server software implementation to just automatically do the right thing, but that's a quality-of-implementation issue, not a protocol issue. Cheers, Brian
Received on Friday, 31 October 2014 21:05:33 UTC