- From: Mike Bishop <Michael.Bishop@microsoft.com>
- Date: Wed, 12 Nov 2014 17:59:27 +0000
- To: Greg Wilkins <gregw@intalio.com>, Mark Nottingham <mnot@mnot.net>
- CC: HTTP Working Group <ietf-http-wg@w3.org>
- Message-ID: <586eb270c4554c2c9fc7d1535cdf1ef6@BL2PR03MB132.namprd03.prod.outlook.com>
Implementations might choose to handle that failure in any of several heuristics, which are outside the scope of the h2 spec. Another reasonable response might be trying again, offering only !BAD ciphers, for example, now that you know the server supports h2 (and thus, hopefully, the MTI ciphersuite). From: Greg Wilkins [mailto:gregw@intalio.com] Sent: Tuesday, November 11, 2014 8:59 PM To: Mark Nottingham Cc: HTTP Working Group Subject: Re: #612: 9.2.2 and ALPN On 12 November 2014 13:03, Mark Nottingham <mnot@mnot.net<mailto:mnot@mnot.net>> wrote: -8<- If the ciphersuite selected for h2 is... BAD = peer MAY INADEQUATE_SECURITY !BAD = peer MUST NOT INADEQUATE_SECURITY Peers probably shouldn't negotiate BAD where BAD is a fixed in-spec blacklist ->8- That looks very encouraging. An in-spec blacklist for BAD ciphers together to the !BAD==MUST NOT INADEQUATE_SECURITY, I think is a good compromise. It mostly addresses the fragile handshake concern while allowing h1 fallback without additional latency. I assume that there is an implied: BAD = peer MAY fallback to h1 (if able to influence ALPN protocol selection) and that will not be seen as a downgrade attack (or at least and acceptable one). cheers -- Greg Wilkins <gregw@intalio.com<mailto:gregw@intalio.com>> @ Webtide - an Intalio subsidiary http://eclipse.org/jetty HTTP, SPDY, Websocket server and client that scales http://www.webtide.com advice and support for jetty and cometd.
Received on Wednesday, 12 November 2014 17:59:56 UTC