- From: Michael Sweet <msweet@apple.com>
- Date: Fri, 27 Jun 2014 12:40:20 -0400
- To: David Krauss <potswa@gmail.com>
- Cc: Amos Jeffries <squid3@treenet.co.nz>, ietf-http-wg@w3.org
- Message-id: <33D0B8E6-5D37-4E69-83F6-1BC8A7FCA10F@apple.com>
David, On Jun 27, 2014, at 3:09 AM, David Krauss <potswa@gmail.com> wrote: > > On 2014�06�27, at 2:29 PM, Amos Jeffries <squid3@treenet.co.nz> wrote: > >> On 27/06/2014 2:22 p.m., Martin Thomson wrote: >> >>> It's different with headers. If we cap header size, then it becomes >>> literally impossible to make some requests. >> >> HTTP/1.1 header size is capped at 64KB by Squid. Other implementators >> previously stated 4KB, 8KB and 16KB caps. What is new? >> >> Ability to announce and negotiate a size will be added benefit for >> HTTP/2 if accepted. > > +1. Ignoring literally 99.98% of usage (add more 9�s for the 64K limit) is not only a mistake, it�s against the rules of any sane governing body. > > Has anyone contacted the Kerberos guys? I know nothing about security but it makes sense that an authentication protocol wouldn�t worry about proxyability. Without proxies to worry about, the client can be sure that headers sent by HTTP/1 will only be received as HTTP/1, and authentication sent via HTTP/2 will only be received by a server expecting it. It becomes a non-issue. > > RFC 4559 appears to cover the culprit and appears to suggest that it is MSIE. Perhaps a Microsoft rep on this list can find out whether HTTP/2 support for SPNEGO Kerberos will be needed? As someone that has implemented RFC 4559, the only thing that is particularly proxy-unfriendly is the size of Kerberos tickets from ActiveDirectory, which is a result of having all of the group/acl stuff for a particular user account being embedded in the ticket. We settled for supporting a maximum Authorization header size of 64k (which means we allow up to about 48k worth of ticket information Base64-encoded) - this is sufficient for most sites but we occasionally see organizations/users with larger tickets and they just break/don't work... Unfortunately, Kerberos tickets can also only be used once, so delta compression isn't going to be any help. Every request uses a new Authorization header value, so this (along with security concerns) is why my HTTP/2 implementation will only use the Literal Header Field Never Indexed encoding for the Authorization header. _________________________________________________________ Michael Sweet, Senior Printing System Engineer, PWG Chair
Attachments
- application/pkcs7-signature attachment: smime.p7s
Received on Friday, 27 June 2014 16:40:49 UTC