TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Explicit Trusted Proxy in HTTP/2.0

109 pointsby rdlowreyabout 11 years ago

10 comments

saurikabout 11 years ago
Wasn&#x27;t this already discussed on Hacker News, in quite some detail, yesterday? And wasn&#x27;t the big revelation that this only applied to traffic that was not CA verified and thereby was inherently man-in-the-middle-attackable <i>anyway</i> (as the actually-secure https connections are marked in a way where this feature does not apply), making this a misunderstanding?
评论 #7296490 未加载
评论 #7297989 未加载
评论 #7297283 未加载
评论 #7298667 未加载
Lukasaabout 11 years ago
As discussed yesterday, this is <i>not</i> a new MITM vulnerability. To make this work you need to establish a TLS connection to the proxy which is verified in the usual certificate authority way. Note that the standard says that user agents that discover they&#x27;re talking to a trusted proxy should obtain user consent to talk to that proxy.<p>Any situation in which someone can force your machine to trust one of these proxies is a situation when they had administrator access to your machine <i>anyway</i>, and in that situation you&#x27;re already screwed.<p>Would it kill HN to actually read one of these specs instead of just whining about it?
评论 #7296353 未加载
评论 #7296560 未加载
评论 #7296804 未加载
jolissabout 11 years ago
Before people start associating this with actual HTTP&#x2F;2.0, it is worth emphasizing that this is a separate document. None of this &quot;trusted proxy&quot; MITM nonsense is in the HTTP&#x2F;2.0 draft: <a href="http://datatracker.ietf.org/doc/draft-ietf-httpbis-http2/?include_text=1" rel="nofollow">http:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;draft-ietf-httpbis-http2&#x2F;?in...</a><p>Thankfully, it seems fairly unlikely that the trusted proxy thing is going to get anywhere: It serves the interests of Ericsson and AT&amp;T, but <i>not</i> those of the HTTP&#x2F;2.0 spec authors (who are from Google and Mozilla) or server and browser vendors that will have to implement HTTP&#x2F;2.0.
tjaervabout 11 years ago
Some context: <a href="http://lauren.vortex.com/archive/001076.html" rel="nofollow">http:&#x2F;&#x2F;lauren.vortex.com&#x2F;archive&#x2F;001076.html</a><p>&quot;What they propose for the new HTTP&#x2F;2.0 protocol is nothing short of officially sanctioned snooping.&quot;
评论 #7297251 未加载
barrkelabout 11 years ago
I particularly like how the Privacy section is completely blank.
评论 #7297162 未加载
rdlowreyabout 11 years ago
Section 6 (Security Considerations) is truly shocking. And Section 7 (Privacy Considerations)? Whaddya know? It&#x27;s <i>empty</i>!
dschiptsovabout 11 years ago
In some third-world countries you cannot get a telecom licence unless you &quot;implement&quot; this, or your license could be easily revoked or canceled.<p>In Russia, for example, there are explicit regulations which says that no telecom company can operate unless it provides &quot;monitoring and law-enforcement facilities&quot;.<p>My guess is that <i>each</i> country nowadays has regulations of this sort, so telecom equipment manufactures are forced to &quot;add required functionality&quot;. Of course, US has such &quot;secret&quot; regulations.)<p>So, it is much better to face the reality and to standardize this shit to reduce the pain of telecom &quot;workers&quot;.)
alephnilabout 11 years ago
It is an improvement compared to HTTP&#x2F;1.1, in that it allows for opportunistic encryption, and it is those connections that can be cached (or if you so prefer, snooped). This will still make it harder for NSA and similar agencies to do mass surveillance without traces. They would either have to insert their own certificate, or get the private key from the ISP. That is far more difficult to do in a covert manner. This alone makes HTTP&#x2F;2.0 an improvement.
评论 #7298373 未加载
crbakerabout 11 years ago
I understand that HTTP&#x2F;2.0 needs to address both scalability and security, but the proposed &quot;trusted&quot; proxies smells really bad. Knowing what we know today, in that the current level of security offered by HTTP&#x2F;1.1 is barely adequate to protect web citizens from real and present threats, shouldn&#x27;t we be radically rethinking HTTP security.
yeukhonabout 11 years ago
This would be an awesome term project for students studying computer security to find problems in the draft, if there is <i>any</i>.