- From: Roberto Peon <grmocg@gmail.com>
- Date: Mon, 26 Jan 2015 13:49:21 -0800
- To: Hervé Ruellan <herve.ruellan@crf.canon.fr>
- Cc: "Black, David" <david.black@emc.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>, Jari Arkko <jari.arkko@piuha.net>, Martin Thomson <martin.thomson@gmail.com>, "ietf@ietf.org" <ietf@ietf.org>, "General Area Review Team (gen-art@ietf.org)" <gen-art@ietf.org>, "fenix@google.com" <fenix@google.com>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
- Message-ID: <CAP+FsNePViw8rANC2L6KufTiYy-E8mCLZH06znqXZ1HENNLhtg@mail.gmail.com>
s/decided/decide/ I'm sure it can be further massaged before it is document ready -=R On Mon, Jan 26, 2015 at 1:48 PM, Roberto Peon <grmocg@gmail.com> wrote: > Herve-- > I'm not sure that the text in 7.1.2 is explicit enough to be understood-- > I'd be hard-pressed to define "guess" reliably. The bit that is missing, > imho, is that the provenance of the request is from a 3rd party, which is > reason to be suspicious. > > An alternate wording: > An encoder seeing many 3rd party requests which contain keys whose values > never match may decided to ensure that such keys are never indexed when > going to that site, as this effectively prevents probing of the compression > context, and, if not malicious, would likely offer no benefit from indexing > anyway. > > -=R > > > > On Mon, Jan 26, 2015 at 9:29 AM, Hervé Ruellan <herve.ruellan@crf.canon.fr > > wrote: > >> I tried to integrate all these comments, as well as those of Martin on >> GitHub into: https://github.com/http2/http2-spec/pull/704 >> >> Hervé. >> >> >> On 01/23/2015 05:51 PM, Black, David wrote: >> >>> This sort of guidance will definitely be a useful addition. A little >>> more wordsmithing on Stephen's proposed text follows: >>> >>> The decision on whether a header field is ok to >>> compress or >>> not is highly dependent on the context. As a generic >>> guidance, header fields used for conveying highly valued >>> information, such as the Authorization or Cookie header >>> fields, can be considered to be on the more sensitive >>> side. In addition, a header field with a short value >>> has potentially a smaller entropy and can be more at >>> risk. We know that compressing low-entropy sensitive >>> header fields can create vulnerabilities so such >>> cases are most likely the ones to not compress today. >>> Note though that the criteria to apply here may evolve >>> over time as we gain knowledge of new attacks. >>> >>> >>> OLD >>> We know that compressing low-entropy sensitive >>> header fields can create vulnerabilities so such >>> cases are most likely the ones to not compress today. >>> Note though that the criteria to apply here may evolve >>> over time as we gain knowledge of new attacks. >>> NEW >>> We currently know that compressing low-entropy sensitive >>> header fields can create vulnerabilities so compression >>> of such fields ought to be avoided. >>> This guidance may evolve >>> over time as we gain knowledge of new attacks. >>> >>> Thanks, >>> --David >>> >>> -----Original Message----- >>>> From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] >>>> Sent: Friday, January 23, 2015 10:45 AM >>>> To: Jari Arkko; Hervé Ruellan >>>> Cc: Martin Thomson; Black, David; ietf@ietf.org; General Area Review >>>> Team >>>> (gen-art@ietf.org); fenix@google.com; ietf-http-wg@w3.org >>>> Subject: Re: [Gen-art] Gen-ART and OPS-Dir review of draft-ietf-httpbis- >>>> header-compression-10 >>>> >>>> -----BEGIN PGP SIGNED MESSAGE----- >>>> Hash: SHA1 >>>> >>>> >>>> >>>> On 23/01/15 15:35, Jari Arkko wrote: >>>> >>>>> >>>>> I made a proposal at >>>>>> https://github.com/http2/http2-spec/pull/704 >>>>>> >>>>> >>>>> Looked reasonable to me. >>>>> >>>> >>>> Me too. Quibbling, I'd suggest: >>>> >>>> OLD: >>>> >>>> The decision on whether a header field is sensitive or >>>> not is highly dependent on the context. As a generic >>>> guidance, header fields used for conveying highly valued >>>> information, such as the Authorization or Cookie header >>>> fields, can be considered to be on the more sensitive >>>> side. In addition, a header field with a short value >>>> has potentially a smaller entropy and can be more at >>>> risk. >>>> >>>> NEW: >>>> >>>> The decision on whether a header field is ok to >>>> compress or >>>> not is highly dependent on the context. As a generic >>>> guidance, header fields used for conveying highly valued >>>> information, such as the Authorization or Cookie header >>>> fields, can be considered to be on the more sensitive >>>> side. In addition, a header field with a short value >>>> has potentially a smaller entropy and can be more at >>>> risk. We know that compressing low-entropy sensitive >>>> header fields can create vulnerabilities so such >>>> cases are most likely the ones to not compress today. >>>> Note though that the criteria to apply here may evolve >>>> over time as we gain knowledge of new attacks. >>>> >>>> Cheers, >>>> S. >>>> >>>> >>>> >>>> >>>> >>>>> jari >>>>> >>>>> -----BEGIN PGP SIGNATURE----- >>>> Version: GnuPG v1 >>>> >>>> iQEcBAEBAgAGBQJUwmyOAAoJEC88hzaAX42iJKkIAJtbLdBsQe12+yyg47yupU9x >>>> xbJJ8WZj7vN9Owc9DbzPUczcejjxPUETWwiJ4gzGEnqOTgkH4Ljbt3DnZO1OrdwL >>>> J5sdie+/x85WuimEgz8GLeOvHe3vyKAJzRIGuX4c4PFgxQ2EBQTJwMM9/qBx9Wp4 >>>> gLNSMmvd0DT8mfozQokju4H4SsxEgFWIERpDO1Has/3ska0u0qhCrJgIdSSWWn08 >>>> yvsjoPDfp+SPEJOa+vWoWqP971QXaGsm5lnhPDLTJ+u06cWpzeQerOEmS3dMYX4A >>>> 0gcR73olUgS9gqVQ/HIYDKLxsOX3DXH0QSJhHOgYrE6GNPUX2bz7npN0PP7+x0s= >>>> =Txbn >>>> -----END PGP SIGNATURE----- >>>> >>> >> >
Received on Monday, 26 January 2015 21:49:48 UTC