TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

CRIME

63 点作者 stalled超过 12 年前

4 条评论

honest0pinion超过 12 年前
I've never been attracted to SPDY as I have doing HTTP 1.1 pipelining for years before SPDY appeared. It's great for getting lots of data from the same source, though I don't know about the way typical webpages are these days with so many connections to pull-in offiste resources, many of which offer the user zero value (they benefit the site owner only). That's a problem with how people are deisgning websites. Not something that's solved with a transmission procotol.<p>SPDY did offer a couple of new things over 1.1.<p>SPDY wants to compress headers, but I asked "Why?"<p>What exactly are they planning to put in the headers to make them so big they need to be compressed? Normal headers are not large. And headers can actually be quite useful after pipelining a large amount of data when you want to carve into pieces later. They are like record separators.<p>Another new addition was de-serialization. But I see nothing wrong with receiving the data in the order I requested it. If the transmission is interrupted, at least then I can restart where I left off.<p>I'm just not convinced compressing headers or de-serializing adds such a speed boost as to justify a new protocol.<p>And now, with this exploit, I don't need to even think about SPDY anymore. Except has a potential security hole.<p>Sorry SPDY fans, but this is just my opinion as a dumb end user. Pipelining worked just fine before SPDY. Alas, no one used it. Why? Maybe because it didn't have a catchy acronym and a corporate brand behind it. I honestly don't know. Because it's efficient and makes perfect sense. I used it. And I still do.<p>I will never use SPDY, especially not now. (It's on by default in Firefox but you can disable it.)
评论 #4557506 未加载
评论 #4557531 未加载
评论 #4557445 未加载
mjs超过 12 年前
It seems like the solution is to special case sensitive headers like "Cookie", so that the compressed version doesn't leak information. But isn't every byte equally worthy of protection? What if there's sensitive information in the body?<p>(I get that the format of the Cookie header is probably much more structured/predictable than usernames or account details that might appear in the body, but surely a good cryptosystem would be 100% resistent to these sorts of side-channel attacks, without any need to guess which headers need to be handled more carefully.)
评论 #4557368 未加载
评论 #4557840 未加载
duskwuff超过 12 年前
Interesting -- looks as though the speculation as to the nature of CRIME was pretty much dead-on. Took years for anyone to realize that compression introduced a vulnerability into HTTPS, but as soon as everyone knew that there was something there, the nature of the attack was immediately guessed.<p>(Although I'd be much more worried if the community had discovered a <i>different</i> vulnerability!)
评论 #4557451 未加载
stalled超过 12 年前
(Previous discussion: <a href="http://news.ycombinator.com/item?id=4510829" rel="nofollow">http://news.ycombinator.com/item?id=4510829</a>)