John Border Hughes Network Systems, LLC

Slides:



Advertisements
Similar presentations
Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Advertisements

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Lesson 4: Web Browsing.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Security Forum 2001John Kristoff - DePaul University1 Network Firewalls John Kristoff DePaul University Chicago, IL
Content Networking - CON Content Overlay Network Vishal Kumar Singh Eilon Yardeni April, 28 th 2005.
Enterprise Privacy Promises and Enforcement Adam Barth John C. Mitchell.
Securing Squid (Proxy) Using Digest Authentication.
Towards a Safe Playground for HTTPS and Middle-Boxes with QoS2 Zhenyu Zhou CS Dept., Duke University.
IAITAM 2009 Annual Conference & Exhibition Bringing Green Together Utilizing Software Metering to Drive Down IT Costs Kris Barker Co-Founder & CEO, Express.
Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Why URI Declarations? A comparison.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
JOHN DOE PERIOD 8. AT LEAST 80% OF HUMANITY LIVES ON LESS THAN $10 A DAY.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
HCS 451 Week 2 Individual Risk Management Assessment Summary To purchase this material click below link 451-Week-2-Individual-Risk-Management-
P1, P2 & P3 Unit 8 Alex Speer.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Suresh Krishnan Secure Proxy ND Suresh Krishnan
Network Layer Security Howie Weiss (NASA/JPL/Cobham Analytic Solutions) Mike Pajevski (NASA/JPL) May 2010.
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
VPN Joshua Turner.
“Designing an Institution to Track Institutional Controls” Federal Perspective Brownfields 2003 October 28, 2003.
MPACT 2017 MANOR ISD JUNE 5-9, 2017.
Reconciling Issues re Performer & Assessor
Lesson 4: Web Browsing.
Control Structures II Chapter 3
Statistics 202: Statistical Aspects of Data Mining
ARGUMENTATIVE ESSAYS (OPINION ESSAYS)
Practical Censorship Evasion Leveraging Content Delivery Networks
Anonymous Communication
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
– Officiating Management Software
Outcomes and Plans Workshop
Whether you decide to use hidden frames or XMLHttp, there are several things you'll need to consider when building an Ajax application. Expanding the role.
Reconciling Issues re Performer & Assessor
Lead scanning Eventbuizz Lead scanner works as an efficient lead generator straight off your smartphone. Before the scanning is completed, you can gather.
Dumps
Top 5 Issues of Mozilla Firefox Browser in Problem 1: Firefox Not Responding, Slow  Feb 2018 Firefox is not working properly. It is slow to load,
CS4622: Computer Networking
Internet Basics.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Distributed architectures
Setting significance levels at the correct level
802.11b Wireless Network Security
Week 2: How Do We Ask God? (James 1:5-12).
Lecture 1: Multi-tier Architecture Overview
Anonymous Communication
Web Authentication and other security services
Electronic OAR – Introduction to
Exercise #4: Cell Biology Research Paper
Week 2: How Do We Ask God? (James 1:5-12). Week 2: How Do We Ask God? (James 1:5-12)
Conducting a meeting فرح جبر نعمة مشايخ.
Encrypting DNS traffic
Lesson 4: Web Browsing.
Welcome to the Classroom Management Workshop!
The Psychology of Learning
Tools to Show Effects of Different Download Order
Liaison report from 802 Architecture Group
Price and volume measures for other government services
SharePoint has been a pioneer of collaborative work culture and has been dubbed as one of the most successful products by Microsoft for enterprise businesses.
3 Week A: May 1 – 19 3 Week B: May 22 – June 9
Observation   What important observations seem to “pop out” from the data? Did anything surprise you? What patterns or trends appear in the data?
Distributed architectures
PD Place Mobile Discussion
Anonymous Communication
Inter-State Sharing of an Immunization Registry Application
Electronic OAR – Introduction to
Presentation transcript:

John Border Hughes Network Systems, LLC HTTP Workshop Summary John Border Hughes Network Systems, LLC

Workshop Info The HTTP Workshop was held during the last week of July in Münster, Germany Access to the agenda, attendee list, presentations used to foster discussion and a workshop report are available at the HTTP Workshop Wiki At the end, the output of the workshop was summarized as a list of HTTP Ideas Some of the observations are inferences on my part which may or may not be correct In general, I have not included information which can be found at either of the above two links

Observations1 Proxies Even though there was no backing off from the “everything should be encrypted end to end” positioning, there was definite (if somewhat grudging by some people) acknowledgement that proxies have a legitimate role to play The need to do things in the middle came up repeatedly from certain areas although, in the end, caching was the only application for a which a possible solution was actually discussed at the workshop

Observations2 Proxies (cont.) The idea of a secure proxy was oxymoronic to some of the participants In their view Security must always be end to end It should be possible to address many of the features currently implemented in the middle at the end points When that is not possible, only solutions which do not involve trusting the proxy are acceptable (e.g. blind caching) Not clear how they reconcile the above with legal intercept types of requirements

Observations3 HTTP Versions I cannot find my notes on who said it, (definitely not Google or Mozilla,) but at least one browser vendor is planning on implementing H2C (HTTP/2 in the clear) While not a slam dunk, there is a lot of interest in taking HTTP/3 towards a UDP QUIC-like solution Akamai has started working on a QUIC implementation to at least play with According to Mark Nottingham, new (“powerful”) features coming from W3C will all required HTTPS Firefox will eventually deprecate HTTP for all new features