- From: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
- Date: Wed, 2 Nov 2016 19:24:22 +0200 (EET)
- To: Martin Thomson <martin.thomson@gmail.com>, HTTP working group mailing list <ietf-http-wg@w3.org>
- CC: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
( was off-list )
Martin Thomson <martin.thomson@gmail.com>: (Wed Nov 2 17:37:55 2016)
> On 2 November 2016 at 18:39, Kari Hurtta <hurtta-ietf@elmme-mailer.org> wrote:
> > Hmm. Is there requirement that authority must not serve
> > /.well-known/http-opportunistic with https -origin unless
> > http and https -origins provide identical resourses and processing ?
>
> The draft currently doesn't say anything about the
> https://.../.well.known/http-opportunistic resource. If the resource
> happens to say something about https origins, that's kinda
> nonsensical. Maybe I should point that out. Do you think that this
> would help?
>
> https://github.com/httpwg/http-extensions/pull/261
>
> (To paraphrase what I added: this is "http" opportunistic, not "https"
> opportunistic.)
>
> I mean, we could insist that the https:// resource not exist, but I
> don't think we need that on the basis that we already have a pretty
> strong signal, and it keeps things simple.
https://github.com/httpwg/http-extensions/pull/261/files/dc24113b22b545ba112ebbc707b38ef3396c9f8a?short_path=fd50b7c#diff-fd50b7c5883e57d650fa3ac7f47c12f9
| This document does not define semantics for "http-opportunistic" resources
| on an https origin, nor does it define semantics if
| the resource includes https origins.
That is OK, but it is mostly orthogonal about that
what I was meaning.
https://lists.w3.org/Archives/Public/ietf-http-wg/2016OctDec/0367.html
|> • No concern; that check that http://{...}/.well-known/http-opportunistic
|> succeed tells enough that there is no confusion
|
| I think that this is sufficient.
|
| The reason that I think this is OK, and the reason for removing a
| mixed-scheme flag was that the risk comes from confusion. That
| confusion exists as soon as an http:// request is made over a TLS
| connection.
|
| It's not that much worse when things are mixed. The bad examples of
| routing based on the first request are bad for many reasons. They are
| simply cause to NOT provide the .well-known resource.
Except if .well-known resource exists also on https: -origin
then bad routing still provides .well-known resource.
https://tools.ietf.org/html/draft-ietf-httpbis-http2-encryption-08#section-2.2
| The primary purpose of this check is to provide a client with some
| assurance that a server understands this specification and has taken
| steps to avoid being confused about request scheme.
So strong signal is that server tells that it supports Opportunistic HTTP
Security.
Reading http://{authority}/.well-known/http-opportunistic does not
test that there is no confusion.
( Also it is useless for http-client to check non-existence of
https://{authority}/.well-known/http-opportunistic
because existence of
https://{authority}/.well-known/http-opportunistic
is OK as far op-sec is considered. )
( If http: and https: origins are identical then there is no
bad routing; just one routing. )
Maybe that is enough.
/ Kari Hurtta
Received on Wednesday, 2 November 2016 17:25:03 UTC