Skip to content

Commit 8b71763

Browse files
committed
check in raw minutes
1 parent 5ce7f7e commit 8b71763

File tree

1 file changed

+312
-0
lines changed

1 file changed

+312
-0
lines changed

Diff for: ietf93/minutes.md

+312
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,312 @@
1+
HTTP WG IETF 93 Meeting Minutes
2+
3+
[ wseltzer is your etherpad scribe. please help correct! ]
4+
5+
mnot: Agenda bashing: https://tools.ietf.org/wg/httpbis/agenda?item=agenda-93-httpbis.html
6+
7+
### Specification Status
8+
9+
mnot: Tunnel-protocol in RFC editor queue.
10+
client-initiated content encoding submitted to IESG
11+
12+
Julian Reschke: Authentication-info header field. Obsoletes RFC 2617 in combination with BAsic and Digest specs; depends on PRECIS framework,
13+
14+
mnot: What do we need to do to obsolete 2617?
15+
16+
Barry: It's already taken care of. The documents flag it, when they're published. Looking at 2 HTTPAUTH WG docs (Basic and Digest)...
17+
[scrolling through document headers]
18+
they say Obsoletes: 2617 (if approved)
19+
20+
### [Alternative Services](https://tools.ietf.org/html/draft-ietf-httpbis-alt-svc)
21+
Discuss the [issues list](https://github.com/httpwg/http-extensions/issues?q=is%3Aopen+is%3Aissue+label%3Aalt-svc) and draft status.
22+
23+
mnot: Julian and I worked through issues list yesterday. Work from the bottom up.
24+
25+
## [Alt-Svc alternative cache invalidation #16] (https://github.com/httpwg/http-extensions/issues/16)
26+
27+
Julian: while the use case you mentioned would be handled, not convinced all would be. If we need to group alt-svc so they can be independently refreshed, we might need to think of labels
28+
29+
mnot: e.g. explicit label field in the header for a group. But complex to implement in clients.
30+
31+
Martin Thomson: Rather than identifying the mechanism, identify the source.
32+
33+
Mike Bishop: That doesn't entirely make sense to me. Any alt-svc can handle itself. Where it came from is the origin or someone authorized to speak for the origin. Need to think more about what we shoudl do for validation.
34+
35+
mnot: We know we need something, not sure what its shape should be. In the past, we've tended to overdesign. Keep it simple.
36+
37+
Patrick McManus: Operationally, seems a bit confusing to have two elements from the same origin, different sources
38+
39+
Martin: Propose a single global scope for a given origin. Whatever you learn next replaces what you have. Keeps things simple, but means you might not get the pinning with respect to H2. You can maintain with a bit more care.
40+
41+
mnot: if want to use alt-svc for oppsec, then switch to load-balancing...
42+
43+
Martin: that's why we have @@
44+
45+
Erik Nygren: If you had one global setting, and priorities, then set high priority for oppsec, lower priority, short-lived for load-balancing. Push a whole set.
46+
47+
Mike: max-age currently applies to the entire entry. If it applied per parameter,
48+
49+
Bence Beky: might be a need to send a header or frame to clear alt-svcs. While implementing hacks proposed on ML, I found them more complicated
50+
51+
Julian: According to ABNF, max-age is specific to parameters.
52+
53+
mnot: seems simplest to have one global scope. An empty frame resets.
54+
55+
Julian: Need to change the syntax to allow an empty alt-svc header. currently does not.
56+
57+
mnot: Does anyone who thinks we need more capable labeling system want to talk about use cases? Does anyone object to simple global scope?
58+
59+
[no objections]
60+
61+
Patrick: Not clear that oppsec needs an alternative.
62+
63+
Erik: Need clear guidance on what ordering to use (priority, shortest lifetime?)
64+
65+
mnot: when we've discussed in past, inclination to leave it to the client.
66+
67+
Erik: here, we probably want to make explicit
68+
69+
Martin: if no other preference, lexical ordering
70+
71+
## ALPN identifiers in Alt-Svc #43
72+
73+
mnot: marked as editor-ready. Do we need to discuss?
74+
75+
## need to define extensibility for alt-svc parameters #69 https://github.com/httpwg/http-extensions/issues/69
76+
77+
mnot: conventional would be to make must-ignore
78+
79+
Julian: still need to define how to add new ones
80+
81+
Erik: define the granularity of what to ignore.
82+
83+
mnot: proposal to make extensibility work at the attribute level. How do we do mandatory? we don't.
84+
Do we need an IANA registry for such extensions? One direction could be to establish directory on first need for it.
85+
86+
Barry: if you think there are likely to be extensions, go ahead and create it now. If not likely, then defer.
87+
88+
Julian: put it in now.
89+
90+
Mike: Issue 71, one proposal was to kick that out to extension, so we'd need a registry then.
91+
92+
mnot: ok, establish registry
93+
94+
## 71. Persistence of alternates across network changes alt-svc design
95+
96+
mnot: it would be nice to have an option to say whether alt-svc should be flushed. Do we need to define that extension now, or defer?
97+
98+
Erik: worthwhile to put it in from the beginning.
99+
100+
mnot: any objections?
101+
102+
[no objections]
103+
104+
mnot: add a parameter to do this now.
105+
106+
## 73 Alt-Svc: Elevation of privilege alt-svc design
107+
108+
mnot: we currently allow someone to advertise alternative on same origin without strongly authenticating. Designed for oppsec so you don't need a valid cert. Is this reasonable?
109+
one suggestion, disallow advertising port higher than privileged ports if origin is on privileged port;
110+
111+
Martin: Another potential attack if you have untrusted actor on your host. if you have cluster, id one node on the cluster, someone can target all the traffic to one node as DDOS
112+
I don't like the segregation on 1024, but might be ok
113+
alternative, if you see alt-svc frame, you might ignore header, on the ground that server is capbable of sending frame. header less trusted.
114+
115+
mnot: should we treat localhost specially? ongoing discussion in webappsec about mixed content in local host.
116+
117+
Martin: I might open that issue.
118+
119+
Patrick: I don't have a lot of faith in the 1024, but don't storngly object.
120+
Another issue I've heard, when changing hosts, verifying certs, right mechanism is CORS, and this violates CORS.
121+
122+
mnot: I'd like to hear more, because that's a very differnt layer
123+
124+
Patrick: DNS rebinding attacks can do the same.
125+
126+
mnot: not CORS, but something the server can do to indicate it's used as alternative
127+
128+
Mike: see oppsec discussion
129+
130+
mnot: we're really just talking about http urls.
131+
132+
Mike: for http, I really don't want to let you move me to a different port without HTTPS, but might be ok
133+
134+
mnot: you can alwasy ignore the advertisement
135+
136+
Martin: What level of advice do we think is appropriate? Do we outline the potential use?
137+
138+
Erik: What about being fairly vague in alt-svc, more specific in oppsec?
139+
140+
mnot: still put info about privileged ports here?
141+
142+
Erik: certainly in oppsec.
143+
144+
Martin: We might describe the risks.
145+
146+
mnot: describe the risks and recommend a privilege barrier
147+
148+
## 74 Alt-Svc: Alternates of alternates
149+
150+
mnot: is everyone comfortable with what's in the issue as "second reading"? Yes.
151+
152+
## 75 Alt-Svc header with 421 status alt-svc design
153+
154+
Mike: asking you to reverse the text in 421
155+
156+
Patrick: it should be flipped to must not
157+
158+
mnot: must be ignored.
159+
An alt-svc header in a 421 must be ignored.
160+
161+
## Alt-Svc and Cert Pinning #76
162+
163+
mnot [reads]
164+
spec currently reads must be valid, but not necessarily identical credentials.
165+
166+
Mike: starting from HTTP means there are attacks that will work against you.
167+
168+
mnot: oppsec is not proof against active attackers in any way. if we start trying to plug holes, we'll never stop.
169+
170+
Mike: but here, you're making the attack worse, because you could redirect wth host, have a long-lived alt-svc
171+
172+
Martin: we also have guidance about clearing state between networks, particularly for unsecured origins. If you're mitmd once due to cert compromise, high chance in the browser that that can be persisted already.
173+
if you can get something in browser cache, storage, service workers...
174+
175+
mnot: oppsec provides no secuirty indicators to user.
176+
177+
Martin: we can talk about concerns, don't need to change the design
178+
179+
Mike: can live with it
180+
181+
Erik: oppsec can't send to a different hostname
182+
183+
mnot: so even for https origin, we're rooting our trust in the certificate. a bad cert could persist.
184+
Need to add security considerations and possible mitigations.
185+
186+
## 83 Alt-Svc Header - hop by hop
187+
188+
mnot: any proxy in the way is going to strip it.
189+
190+
Martin: Thumbs down. Patrick: nod.
191+
192+
Martin: I like that you can push this all the way through a proxy. Not consistency for consistency's sake.
193+
194+
mnot: close with no action.
195+
196+
## 87 alt-svc response header field in HTTP/2 frame
197+
198+
Martin: only reason to treat differently if ability to write to header field is less privileged than ability to write to frame.
199+
200+
mnot: there may be circumstances where it's intreesting to put it into header.
201+
202+
mnot: no special handling
203+
204+
## 89 Using alt-svc on localhost
205+
206+
mnot: do we know enough now?
207+
208+
Martin: treat public address-space -> private or into localhost as privilege escalation. Recommend ignoring the alternative that appears
209+
210+
mnot: rough-in some text, discuss with browser security folks.
211+
212+
mnot: through with alt-svc issues. lots of work for the editors
213+
214+
### [Opportunistic Security](https://tools.ietf.org/html/draft-ietf-httpbis-http2-encryption)
215+
216+
mnot: checkpoint. We've only had one browser implementation. TAG F2F and WebAppSec discussions of things that look like oppsec. Have another good look once alt-svc settles down.
217+
not inclined to publish right away.
218+
219+
Martin: some uncertainty in community what the right strategy is here. Upgrade Insecure from WebAppSec, akin to HSTS.
220+
original vision for oppsec was to try to move cleartext http closer to https
221+
other changes could let us avoid that. Doesn't address the landing page issue, where you start from HTTP
222+
223+
mnot: other issues, hard to get certs for some people; hard to transition from http to https on some websites. W3C efforts to make that easier
224+
225+
Erik: IPv4 space issues and SNI. We're not yet at the SNI adoption point where everyone can use v4 HTTPS without IP address.
226+
tradeoff
227+
228+
Patrick: lots of parallel paths. I think we all want to wind up at full HTTPS.
229+
other issues: 3d party content; hosting providers' models; corp behind the firewall.
230+
I believe there's medium-term value here. Don't want to put oppsec on back burner forever.
231+
232+
### [451](https://tools.ietf.org/html/draft-ietf-httpbis-legally-restricted-status)
233+
Discuss the [issues list](https://github.com/httpwg/http-extensions/issues?q=is%3Aopen+is%3Aissue+label%3A451) and draft status.
234+
235+
## 80 distinguishing intermediaries from origins.
236+
237+
mnot: some people have said that's interesting. poll on mailing list said yes, it's useful to make machine-readable. If we're going to differentiate, how?
238+
header? status code?
239+
240+
mnot: my inclination would be to use a different status code. not a lot of feedback about whether it's done right. Headers, more likely to make errors.
241+
lots easier to change one digit in-flight in a status code than to change a header.
242+
243+
Martin: it won't be anywhere near as cool
244+
245+
mnot: if the web is going to HTTPS, then one would think intermediaries have less opportunity to add legal restriction codes
246+
247+
Wendy Seltzer: As a researcher, I think it will be interesting to get differentiated information; don't have a strong feeling which mode.
248+
249+
mnot: ok, taking back to list.
250+
251+
### Potential Work
252+
## Search method
253+
254+
Julian: common webdev question: why can't I use a payload with GET?
255+
[reading slides] (https://httpwg.github.io/wg-materials/ietf93/ietf-93-httpbis-search.pdf)
256+
257+
Phil Hunt. I was one of those trying to use GET. I had a draft that was uglier than necessary because it couldn't use SEARCH, dealing with stored results.
258+
https://tools.ietf.org/html/draft-hunt-scim-search-00
259+
260+
mnot: safe POST, or use to store search?
261+
262+
Phil: POST to store the search query, SEARCH to execute. Query itself becomes a restful object.
263+
stateful results are useful.
264+
265+
Martin: Stored queries. I'm not worried about that. We frequently log GET requests and do all sorts of "non safe" things on the server. Channeling Roy, the client is not responsible for its side effects on the server.
266+
267+
mnot: why not just use POST?
268+
269+
Julian: leave the stored query stuff out of the spec. SEARCH is GET with a body [meme alert]
270+
271+
mnot: think I'm ok with that.
272+
273+
Phil: if you look at SCIM, @@
274+
275+
PUT v SEARCH?
276+
277+
mnot: I'd be concerned that if this gets implemented in browser, we lose a lot of cache efficiency on the web.
278+
279+
Julian: if we do this, explain why it's almost always better to use GET
280+
SEARCH RFC is experimental, I'm the author, so we should be able to relax payload to make it more generic.
281+
282+
mnot: my inclination is to call for adoption. any more discussion?
283+
Call for adoption on the list.
284+
285+
## New content-codings.
286+
New content-codings - [Presentation](https://docs.google.com/presentation/d/1rncpm-SRSzVv86lHQipGHi0TXwjoDycXkLGhkwUwB4c/edit#slide=id.p)
287+
288+
Martin: give people a sense how all these things fit together.
289+
[reviewing slides]
290+
291+
### Remaining items on the [watchlist](https://github.com/httpwg/wiki/wiki/WatchList)
292+
mnot: Julian wants to wait for new RFC format for non-ascii for @@
293+
Encrypted content encoding, client hints
294+
inclined to call for adoption on client hints.
295+
296+
Martin: some extensive security review, getting it into WG would help on feedback.
297+
298+
mnot: I'd explicitly reach out to Security Area.
299+
weak interest in Patch status
300+
there's a repo with an issues list for HTTP/1.1
301+
Strong feelings on any of these docs?
302+
303+
[cookies!]
304+
305+
306+
307+
308+
309+
310+
311+
312+

0 commit comments

Comments
 (0)