Skip to content

Commit ead95a3

Browse files
committed
Cleanup minutes
1 parent 8b71763 commit ead95a3

File tree

1 file changed

+42
-41
lines changed

1 file changed

+42
-41
lines changed

Diff for: ietf93/minutes.md

+42-41
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,34 @@
1-
HTTP WG IETF 93 Meeting Minutes
1+
# HTTP WG IETF 93 Meeting Minutes
22

3-
[ wseltzer is your etherpad scribe. please help correct! ]
3+
__Scribed by Wendy Seltzer__
44

5-
mnot: Agenda bashing: https://tools.ietf.org/wg/httpbis/agenda?item=agenda-93-httpbis.html
65

76
### Specification Status
87

9-
mnot: Tunnel-protocol in RFC editor queue.
10-
client-initiated content encoding submitted to IESG
8+
mnot: Tunnel-protocol in RFC editor queue. Client-initiated content encoding submitted to IESG.
119

12-
Julian Reschke: Authentication-info header field. Obsoletes RFC 2617 in combination with BAsic and Digest specs; depends on PRECIS framework,
10+
Julian Reschke: Authentication-info header field obsoletes RFC 2617 in combination with Basic and Digest specs; depends on PRECIS framework.
1311

1412
mnot: What do we need to do to obsolete 2617?
1513

16-
Barry: It's already taken care of. The documents flag it, when they're published. Looking at 2 HTTPAUTH WG docs (Basic and Digest)...
17-
[scrolling through document headers]
18-
they say Obsoletes: 2617 (if approved)
14+
Barry: It's already taken care of. The documents flag it, when they're published.
1915

20-
### [Alternative Services](https://tools.ietf.org/html/draft-ietf-httpbis-alt-svc)
21-
Discuss the [issues list](https://github.com/httpwg/http-extensions/issues?q=is%3Aopen+is%3Aissue+label%3Aalt-svc) and draft status.
16+
17+
## [Alternative Services](https://tools.ietf.org/html/draft-ietf-httpbis-alt-svc)
2218
2319
mnot: Julian and I worked through issues list yesterday. Work from the bottom up.
2420

25-
## [Alt-Svc alternative cache invalidation #16] (https://github.com/httpwg/http-extensions/issues/16)
21+
### Alt-Svc alternative cache invalidation #16
2622

2723
Julian: while the use case you mentioned would be handled, not convinced all would be. If we need to group alt-svc so they can be independently refreshed, we might need to think of labels
2824

2925
mnot: e.g. explicit label field in the header for a group. But complex to implement in clients.
3026

3127
Martin Thomson: Rather than identifying the mechanism, identify the source.
3228

33-
Mike Bishop: That doesn't entirely make sense to me. Any alt-svc can handle itself. Where it came from is the origin or someone authorized to speak for the origin. Need to think more about what we shoudl do for validation.
29+
Mike Bishop: That doesn't entirely make sense to me. Any alt-svc can handle itself. Where it came from is the origin or someone authorized to speak for the origin. Need to think more about what we should do for validation.
3430

35-
mnot: We know we need something, not sure what its shape should be. In the past, we've tended to overdesign. Keep it simple.
31+
mnot: We know we need something, not sure what its shape should be. In the past, we've tended to over-design. Keep it simple.
3632

3733
Patrick McManus: Operationally, seems a bit confusing to have two elements from the same origin, different sources
3834

@@ -68,11 +64,11 @@ Erik: here, we probably want to make explicit
6864

6965
Martin: if no other preference, lexical ordering
7066

71-
## ALPN identifiers in Alt-Svc #43
67+
### ALPN identifiers in Alt-Svc #43
7268

7369
mnot: marked as editor-ready. Do we need to discuss?
7470

75-
## need to define extensibility for alt-svc parameters #69 https://github.com/httpwg/http-extensions/issues/69
71+
### need to define extensibility for alt-svc parameters #69
7672

7773
mnot: conventional would be to make must-ignore
7874

@@ -91,7 +87,7 @@ Mike: Issue 71, one proposal was to kick that out to extension, so we'd need a r
9187

9288
mnot: ok, establish registry
9389

94-
## 71. Persistence of alternates across network changes alt-svc design
90+
### 71. Persistence of alternates across network changes alt-svc design
9591

9692
mnot: it would be nice to have an option to say whether alt-svc should be flushed. Do we need to define that extension now, or defer?
9793

@@ -103,23 +99,22 @@ mnot: any objections?
10399

104100
mnot: add a parameter to do this now.
105101

106-
## 73 Alt-Svc: Elevation of privilege alt-svc design
102+
### 73 Alt-Svc: Elevation of privilege alt-svc design
107103

108-
mnot: we currently allow someone to advertise alternative on same origin without strongly authenticating. Designed for oppsec so you don't need a valid cert. Is this reasonable?
109-
one suggestion, disallow advertising port higher than privileged ports if origin is on privileged port;
104+
mnot: we currently allow someone to advertise alternative on same origin without strongly authenticating. Designed for oppsec so you don't need a valid cert. Is this reasonable? one suggestion, disallow advertising port higher than privileged ports if origin is on privileged port.
110105

111106
Martin: Another potential attack if you have untrusted actor on your host. if you have cluster, id one node on the cluster, someone can target all the traffic to one node as DDOS
112107
I don't like the segregation on 1024, but might be ok
113-
alternative, if you see alt-svc frame, you might ignore header, on the ground that server is capbable of sending frame. header less trusted.
108+
alternative, if you see alt-svc frame, you might ignore header, on the ground that server is capable of sending frame. header less trusted.
114109

115110
mnot: should we treat localhost specially? ongoing discussion in webappsec about mixed content in local host.
116111

117112
Martin: I might open that issue.
118113

119-
Patrick: I don't have a lot of faith in the 1024, but don't storngly object.
114+
Patrick: I don't have a lot of faith in the 1024, but don't strongly object.
120115
Another issue I've heard, when changing hosts, verifying certs, right mechanism is CORS, and this violates CORS.
121116

122-
mnot: I'd like to hear more, because that's a very differnt layer
117+
mnot: I'd like to hear more, because that's a very different layer
123118

124119
Patrick: DNS rebinding attacks can do the same.
125120

@@ -131,7 +126,7 @@ mnot: we're really just talking about http urls.
131126

132127
Mike: for http, I really don't want to let you move me to a different port without HTTPS, but might be ok
133128

134-
mnot: you can alwasy ignore the advertisement
129+
mnot: you can always ignore the advertisement
135130

136131
Martin: What level of advice do we think is appropriate? Do we outline the potential use?
137132

@@ -145,20 +140,21 @@ Martin: We might describe the risks.
145140

146141
mnot: describe the risks and recommend a privilege barrier
147142

148-
## 74 Alt-Svc: Alternates of alternates
143+
### 74 Alt-Svc: Alternates of alternates
149144

150145
mnot: is everyone comfortable with what's in the issue as "second reading"? Yes.
151146

152-
## 75 Alt-Svc header with 421 status alt-svc design
147+
### 75 Alt-Svc header with 421 status alt-svc design
153148

154149
Mike: asking you to reverse the text in 421
155150

156151
Patrick: it should be flipped to must not
157152

158153
mnot: must be ignored.
154+
159155
An alt-svc header in a 421 must be ignored.
160156

161-
## Alt-Svc and Cert Pinning #76
157+
### Alt-Svc and Cert Pinning #76
162158

163159
mnot [reads]
164160
spec currently reads must be valid, but not necessarily identical credentials.
@@ -169,10 +165,10 @@ mnot: oppsec is not proof against active attackers in any way. if we start tryin
169165

170166
Mike: but here, you're making the attack worse, because you could redirect wth host, have a long-lived alt-svc
171167

172-
Martin: we also have guidance about clearing state between networks, particularly for unsecured origins. If you're mitmd once due to cert compromise, high chance in the browser that that can be persisted already.
168+
Martin: we also have guidance about clearing state between networks, particularly for unsecured origins. If you're mitm'd once due to cert compromise, high chance in the browser that that can be persisted already.
173169
if you can get something in browser cache, storage, service workers...
174170

175-
mnot: oppsec provides no secuirty indicators to user.
171+
mnot: oppsec provides no security indicators to user.
176172

177173
Martin: we can talk about concerns, don't need to change the design
178174

@@ -183,7 +179,7 @@ Erik: oppsec can't send to a different hostname
183179
mnot: so even for https origin, we're rooting our trust in the certificate. a bad cert could persist.
184180
Need to add security considerations and possible mitigations.
185181

186-
## 83 Alt-Svc Header - hop by hop
182+
### 83 Alt-Svc Header - hop by hop
187183

188184
mnot: any proxy in the way is going to strip it.
189185

@@ -193,15 +189,15 @@ Martin: I like that you can push this all the way through a proxy. Not consisten
193189

194190
mnot: close with no action.
195191

196-
## 87 alt-svc response header field in HTTP/2 frame
192+
### 87 alt-svc response header field in HTTP/2 frame
197193

198194
Martin: only reason to treat differently if ability to write to header field is less privileged than ability to write to frame.
199195

200-
mnot: there may be circumstances where it's intreesting to put it into header.
196+
mnot: there may be circumstances where it's interesting to put it into header.
201197

202198
mnot: no special handling
203199

204-
## 89 Using alt-svc on localhost
200+
### 89 Using alt-svc on localhost
205201

206202
mnot: do we know enough now?
207203

@@ -211,7 +207,8 @@ mnot: rough-in some text, discuss with browser security folks.
211207

212208
mnot: through with alt-svc issues. lots of work for the editors
213209

214-
### [Opportunistic Security](https://tools.ietf.org/html/draft-ietf-httpbis-http2-encryption)
210+
211+
## [Opportunistic Security](https://tools.ietf.org/html/draft-ietf-httpbis-http2-encryption)
215212

216213
mnot: checkpoint. We've only had one browser implementation. TAG F2F and WebAppSec discussions of things that look like oppsec. Have another good look once alt-svc settles down.
217214
not inclined to publish right away.
@@ -229,10 +226,9 @@ Patrick: lots of parallel paths. I think we all want to wind up at full HTTPS.
229226
other issues: 3d party content; hosting providers' models; corp behind the firewall.
230227
I believe there's medium-term value here. Don't want to put oppsec on back burner forever.
231228

232-
### [451](https://tools.ietf.org/html/draft-ietf-httpbis-legally-restricted-status)
233-
Discuss the [issues list](https://github.com/httpwg/http-extensions/issues?q=is%3Aopen+is%3Aissue+label%3A451) and draft status.
229+
## [451](https://tools.ietf.org/html/draft-ietf-httpbis-legally-restricted-status)
234230
235-
## 80 distinguishing intermediaries from origins.
231+
### 80 distinguishing intermediaries from origins.
236232

237233
mnot: some people have said that's interesting. poll on mailing list said yes, it's useful to make machine-readable. If we're going to differentiate, how?
238234
header? status code?
@@ -248,8 +244,9 @@ Wendy Seltzer: As a researcher, I think it will be interesting to get differenti
248244

249245
mnot: ok, taking back to list.
250246

251-
### Potential Work
252-
## Search method
247+
## Potential Work
248+
249+
### Search method
253250

254251
Julian: common webdev question: why can't I use a payload with GET?
255252
[reading slides] (https://httpwg.github.io/wg-materials/ietf93/ietf-93-httpbis-search.pdf)
@@ -282,25 +279,29 @@ SEARCH RFC is experimental, I'm the author, so we should be able to relax payloa
282279
mnot: my inclination is to call for adoption. any more discussion?
283280
Call for adoption on the list.
284281

285-
## New content-codings.
282+
### New content-codings.
283+
286284
New content-codings - [Presentation](https://docs.google.com/presentation/d/1rncpm-SRSzVv86lHQipGHi0TXwjoDycXkLGhkwUwB4c/edit#slide=id.p)
287285

288286
Martin: give people a sense how all these things fit together.
289287
[reviewing slides]
290288

291289
### Remaining items on the [watchlist](https://github.com/httpwg/wiki/wiki/WatchList)
290+
292291
mnot: Julian wants to wait for new RFC format for non-ascii for @@
293292
Encrypted content encoding, client hints
294293
inclined to call for adoption on client hints.
295294

296295
Martin: some extensive security review, getting it into WG would help on feedback.
297296

298297
mnot: I'd explicitly reach out to Security Area.
298+
299299
weak interest in Patch status
300+
300301
there's a repo with an issues list for HTTP/1.1
302+
301303
Strong feelings on any of these docs?
302304

303-
[cookies!]
304305

305306

306307

0 commit comments

Comments
 (0)