Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move to a cipher suite blacklist (WIP) #644

Merged
merged 22 commits into from Nov 25, 2014
Merged

Move to a cipher suite blacklist (WIP) #644

merged 22 commits into from Nov 25, 2014

Conversation

martinthomson
Copy link
Collaborator

This is based on the long set of negotiated changes added to #615. This adds the blacklist as Sam Hartman proposed at IETF 91.

Closes #612.

described in this section with a <xref target="ConnectionErrorHandler">connection
error</xref> of type <x:ref>INADEQUATE_SECURITY</x:ref>.
The TLS implementation MUST support the <xref target="TLS-EXT">Server Name Indication
(SNI)</xref> extension to TLS. HTTP/2 clients MUST indicate the target domain name when
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Even when the client is in Private Browsing mode?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, if we want SNI and thus TLS to be as widely deployable as we would like them to be. We might as well not send the "Host" header or not do DNS lookups in Private Browsing mode.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am merely reflecting the gathered consensus. In a private browsing context, we might want to start using an SNI confidentiality mechanism. waves hands

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Browsers support SNI identically in private browsing mode and the default browsing mode. There's no need for a change here regarding private browsing.

<t>
Note that clients might advertise support of cipher suites that are prohibited by the
above restrictions in order to allow for connection to servers that do not support
HTTP/2 and only prohibited cipher suites. This allows servers to select HTTP/1.1 with a
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/and only prohibited/and support only prohibited/
Seems easier to read.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9.2.2 requires ALPN capabilities beyond RFC7301
10 participants