Re: I-D for a YANG data model to configure HTTP clients and servers

Dear HTTP WG,

I thought that it might be helpful for me to ask a couple specific questions:



1. Supported authentication schemes

My understanding is that there are varying opinions with the schemes listed in the Hypertext Transfer Protocol (HTTP) Authentication Scheme Registry <https://www.iana.org/assignments/http-authschemes/http-authschemes.xhtml>.  Partly because some are experimental/historic and partly because some proprietary ones aren’t listed.   Mark impressed upon me before that this draft should try to codify the bare minimum, which I took that to mean just “Basic”, but I’m wondering if there is any harm or even if it would be better, to also support “Digest”?

I’m well aware that both are insecure and require protection from the transport layer, and that Digest really isn’t more secure than Basic but, it seems that they are both pretty much universally supported or, rather, wherever “Basic” is supported, “Digest” seems to be supported also.  Is that in anyway true?

In any case, please be aware the the draft is in no way mandated that any implementation must support any authentication schema.  In YANG terms, the schemes are each individually declared to be supported using a “feature”.  So my question isn’t which schemes must implementations support, but rather which schemes should the standard model make available for implementations to choose to support, knowing that any additional auth schemes (not included in the YANG module) can be “augmented” (another YANG term) in by each implementation per their discretion.   Does that make sense?



2. Configuring an HTTP client to connect thru a Proxy

I think that only once in my career, perhaps a couple decades ago, I had to configure a client to connect thru a proxy.   With that in mind, I ask this question as someone that really doesn’t know what the state of the art is.

My fuzzy-memory is that, connecting thru an HTTP proxy entailed establishing an HTTP connection to a proxy, and that connection is most likely, if not exclusively, on top of TLS (i.e., HTTPS) and mutually authenticated.

That is, in order to configure an HTTP(S) client to connect through a proxy, effectively entails configuring it to establish a second HTTP(S) connection.  That is, a first HTTP(S) connection is *to* the proxy, and a second HTTP(S) connection is *thru* the proxy.   Yes?



Thanks!
Kent

Received on Friday, 15 May 2020 22:02:12 UTC