- From: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
- Date: Wed, 2 Nov 2016 07:48:04 +0200 (EET)
- To: Martin Thomson <martin.thomson@gmail.com>
- CC: Kari Hurtta <hurtta-ietf@elmme-mailer.org>, HTTP working group mailing list <ietf-http-wg@w3.org>
Martin Thomson <martin.thomson@gmail.com>: (Wed Nov 2 02:52:35 2016)
> On 2 November 2016 at 04:22, Kari Hurtta <hurtta-ietf@elmme-mailer.org> wrote:
> > • No concern; that check that http://{...}/.well-known/http-opportunistic
> > succeed tells enough that there is no confusion
>
> I think that this is sufficient.
>
> The reason that I think this is OK, and the reason for removing a
> mixed-scheme flag was that the risk comes from confusion. That
> confusion exists as soon as an http:// request is made over a TLS
> connection.
>
> It's not that much worse when things are mixed. The bad examples of
> routing based on the first request are bad for many reasons. They are
> simply cause to NOT provide the .well-known resource.
Except of course on case where that .well-known was the first request.
In these cases on these bad examples that http: -probe determined
routing. I guess that bad examples are NOT concern for op-sec, but it
may be concern for browser (some secure cookie is then served
to http: -routing for example when broser sent it to for
https: -scheme).
In theses case they do not mess http: prosessing.
I asked earlier that
https://lists.w3.org/Archives/Public/ietf-http-wg/2016OctDec/0104.html
was that routing based on the first request only concern:
| Is reason that
| ∘ confusion happens if "http" follows "https", or
| ∘ scheme is determined only on first request ?
You answered
https://lists.w3.org/Archives/Public/ietf-http-wg/2016OctDec/0105.html
| The point of this is to cover off any problems that might arise from
| connection reuse. It's clumsy.
and
| we're incapable of detecting all cases where the server decides to do
| crazy things - I'm sure that I can devise a server architecture that
| will fail for any solution we devise - we have to instead take steps
| that we think are reasonable.
> > • Forbid using same connection for "http" requests
> > which would ordinarily be used for "https" requests.
>
> We've already established that this is difficult to define properly.
> And it's unnecessarily limiting.
>
> > • Forbid using same connection for "http" requests
> > which would ordinarily be used for "https" requests
> > but allow it if there is "mixed-scheme" -member (or
> > some other flag).
>
> As above.
>
> > • Forbid using same connection for "http" requests
> > which would ordinarily be used for "https" requests
> > unless same connection which was tested
> > for http://{...}/.well-known/http-opportunistic
> > are also after that tested:
> >
> > ∘ That https requests for /.well-known/http-opportunistic
> > on same host {...} does not return same object
> >
> > ∘ Note that if that test fails, then that connection
> > is no longer be good for http requests either.
>
> As above, just more complicated :)
/ Kari Hurtta
Received on Wednesday, 2 November 2016 05:48:41 UTC