Closed
Bug 1026609
Opened 11 years ago
Closed 11 years ago
http/2 draft 13
Categories
(Core :: Networking: HTTP, defect)
Core
Networking: HTTP
Tracking
()
RESOLVED
FIXED
mozilla33
People
(Reporter: u408661, Assigned: u408661)
References
Details
(Whiteboard: [spdy] [http2release])
Attachments
(2 files, 2 obsolete files)
100.75 KB,
patch
|
mcmanus
:
review+
|
Details | Diff | Splinter Review |
589.06 KB,
patch
|
mcmanus
:
review+
|
Details | Diff | Splinter Review |
http://tools.ietf.org/html/draft-ietf-httpbis-http2-13
http://tools.ietf.org/html/draft-ietf-httpbis-header-compression-08
Marking this as blocking http2 release, since this will (hopefully) be the wglc version of the spec.
Attachment #8442372 -
Flags: review?(mcmanus)
Attachment #8442373 -
Flags: review?(mcmanus)
Tested with nghttp2 locally, as well as node-http2 updates both in unit tests and in an independent test, everything seems ok so far :)
Comment 5•11 years ago
|
||
http://tools.ietf.org/html/draft-ietf-httpbis-http2-13#appendix-A.1
Draft 13 restricts TLS cipher suites to AEAD. Amend Http2Session::ConfirmTLSProfile() to enforce this?
http://tools.ietf.org/html/draft-ietf-httpbis-http2-13#section-9.2.2
> HTTP MUST NOT be used with cipher suites that
> use stream or block ciphers. Authenticated Encryption with
> Additional Data (AEAD) modes, such as the Galois Counter Model (GCM)
> mode for AES [RFC5288] are acceptable.
(In reply to Dave Garrett from comment #5)
> http://tools.ietf.org/html/draft-ietf-httpbis-http2-13#appendix-A.1
>
> Draft 13 restricts TLS cipher suites to AEAD. Amend
> Http2Session::ConfirmTLSProfile() to enforce this?
Indeed it does. That's a bigger bit of work to expose the cipher suite when we need it, and it makes sense (in my opinion) to move forward with the main bits of the protocol and get that in later (which is what we've done with other TLS restrictions in http/2 that required more work than the main protocol bits)
Argh, existing patch has a compile error on linux. New patch incoming.
Attachment #8442372 -
Attachment is obsolete: true
Attachment #8442372 -
Flags: review?(mcmanus)
Attachment #8442446 -
Flags: review?(mcmanus)
Comment 9•11 years ago
|
||
(In reply to Nicholas Hurley [:hurley] from comment #6)
> (In reply to Dave Garrett from comment #5)
> > http://tools.ietf.org/html/draft-ietf-httpbis-http2-13#appendix-A.1
> >
> > Draft 13 restricts TLS cipher suites to AEAD. Amend
> > Http2Session::ConfirmTLSProfile() to enforce this?
>
> Indeed it does. That's a bigger bit of work to expose the cipher suite when
> we need it, and it makes sense (in my opinion) to move forward with the main
> bits of the protocol and get that in later (which is what we've done with
> other TLS restrictions in http/2 that required more work than the main
> protocol bits)
file the followup and tag it http2release - we'll want to do it nowish rather than downtheroadish.
Comment 10•11 years ago
|
||
non-technical nudge. I'm headed to uberconf and have 2 90m sessions on http/2 this coming weds, planning to use FF for one of them. It would be super awesome if this could land so that the attendees could use FF against twitter which is on draft 13 as of this morning.
Comment 11•11 years ago
|
||
Comment on attachment 8442446 [details] [diff] [review]
part 1 - client implementation
Review of attachment 8442446 [details] [diff] [review]:
-----------------------------------------------------------------
right now we just rst_stream a push promise when we have push disabled.. but I would like to protocol_error the session when it can be done reliably. I only worry about race conditions - so we need to track a settings ack to set a bool when we get the ack for the disable push promise setting. can we add that into a separate bug but do it soon?
I was checking on the extensibility stuff and I found a log of "unknow frame type" - can you fix my typo in this patch set?
::: netwerk/protocol/http/Http2Session.cpp
@@ +777,5 @@
> {
> MOZ_ASSERT(PR_GetCurrentThread() == gSocketThread);
> LOG3(("Http2Session::SendHello %p\n", this));
>
> + // sized for magic + 4 settings and a session window update to follow
3 settings, right?
@@ +812,5 @@
>
> // Advertise the Push RWIN for the session, and on each new pull stream
> // send a window update with END_FLOW_CONTROL
> + CopyAsNetwork16(packet + 8 + 6 * numberOfEntries, SETTINGS_TYPE_INITIAL_WINDOW);
> + CopyAsNetwork32(packet + 8 + 6 * numberOfEntries + 2, mPushAllowance);
+ (6 * numberOfEntries) + 2 .. just for clarity
@@ +1307,1 @@
> LOG3(("Settings ID %d, Value %d", id, value));
you can make those formatters unsigned if you get a chance
::: netwerk/protocol/http/Http2Session.h
@@ -119,1 @@
> const static uint8_t kFlag_COMPRESSED = 0x20; // data
we removed FLAG_COMPRESSED, so it can be removed from the header and the error handler in the cpp
Attachment #8442446 -
Flags: review?(mcmanus) → review-
Updated•11 years ago
|
Attachment #8442373 -
Flags: review?(mcmanus) → review+
Assignee | ||
Comment 12•11 years ago
|
||
(In reply to Patrick McManus [:mcmanus] from comment #11)
> right now we just rst_stream a push promise when we have push disabled.. but
> I would like to protocol_error the session when it can be done reliably. I
> only worry about race conditions - so we need to track a settings ack to set
> a bool when we get the ack for the disable push promise setting. can we add
> that into a separate bug but do it soon?
Bug 1030203 has been filed. For the rest of your comments, a new patch will be incoming (likely after lunch, when I have more free time).
Assignee | ||
Comment 13•11 years ago
|
||
All comments fixed!
New try run just because platforms other than os x debug seem to like to yell at me when I mess up something to do with signed/unsigned integers :)
https://tbpl.mozilla.org/?tree=Try&rev=0ee90b2e9a48
Attachment #8442446 -
Attachment is obsolete: true
Attachment #8446021 -
Flags: review?(mcmanus)
Comment 14•11 years ago
|
||
Comment on attachment 8446021 [details] [diff] [review]
part 1 - client implementation
Review of attachment 8446021 [details] [diff] [review]:
-----------------------------------------------------------------
keep the r+ if osx makes you rearrange the formatters :)
Attachment #8446021 -
Flags: review?(mcmanus) → review+
Assignee | ||
Comment 15•11 years ago
|
||
Comment 16•11 years ago
|
||
https://hg.mozilla.org/mozilla-central/rev/838a3af27397
https://hg.mozilla.org/mozilla-central/rev/bd8457579ad5
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla33
You need to log in
before you can comment on or make changes to this bug.
Description
•