HTTPBIS Working Group
Internet-Draft Meta Platforms, Inc.
Updates: 9298 (if approved) August 28, 2024
Intended status: Standards Track
Expires: March 1, 2025
Security Considerations for Optimistic Use of HTTP Upgrade
draft-ietf-httpbis-optimistic-upgrade-00
Abstract
The HTTP/1.1 Upgrade mechanism allows the client to request a change
to a new protocol. This document discusses the security
considerations that apply to data sent by the client before this
request is confirmed, and updates RFC 9298 to avoid related security
issues.
About This Document
This note is to be removed before publishing as an RFC.
Status information for this document may be found at
.
Source for this draft and an issue tracker can be found at
.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 1, 2025.
Expires March 1, 2025 [Page 1]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Conventions and Definitions . . . . . . . . . . . . . . . . . 2
2. Background . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Possible Security Issues . . . . . . . . . . . . . . . . . . 4
3.1. Request Smuggling . . . . . . . . . . . . . . . . . . . . 4
3.2. Parser Exploits . . . . . . . . . . . . . . . . . . . . . 5
4. Operational Issues . . . . . . . . . . . . . . . . . . . . . 5
5. Impact on Existing Upgrade Tokens . . . . . . . . . . . . . . 5
5.1. "HTTP" . . . . . . . . . . . . . . . . . . . . . . . . . 5
5.2. "TLS" . . . . . . . . . . . . . . . . . . . . . . . . . . 6
5.3. "WebSocket"/"websocket" . . . . . . . . . . . . . . . . . 6
5.4. "connect-udp" . . . . . . . . . . . . . . . . . . . . . . 6
6. Guidance for Future Upgrade Tokens . . . . . . . . . . . . . 7
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 8
8.1. Normative References . . . . . . . . . . . . . . . . . . 8
8.2. Informative References . . . . . . . . . . . . . . . . . 8
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 9
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 9
1. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
Expires March 1, 2025 [Page 2]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
2. Background
In HTTP/1.1, a client is permitted to send an "Upgrade" request
header field ([RFC9110], Section 7.8) to indicate that it would like
to use this connection for a protocol other than HTTP/1.1. The
server replies with a "101 (Switching Protocols)" status code if it
accepts the protocol change. However, that specification also
permits the server to reject the upgrade request:
A server MAY ignore a received Upgrade header field if it wishes
to continue using the current protocol on that connection.
This rejection of the upgrade is common, and can happen for a variety
of reasons:
o The server does not support any of the client's indicated Upgrade
Tokens (i.e., the client's proposed new protocols), so it
continues to use HTTP/1.1.
o The server knows that an upgrade to the offered protocol will not
provide any improvement over HTTP/1.1 for this request to this
resource, so it chooses to respond in HTTP/1.1.
o The server requires the client to authenticate before upgrading
the protocol, so it replies with the status code "401
(Authentication Required)" and provides a challenge in an
"Authorization" response header ([RFC9110], Section 11.6.2).
o The resource has moved, so the server replies with a 3XX redirect
status code ([RFC9110], Section 3.4).
After rejecting the upgrade, the server will continue to interpret
subsequent bytes on that connection in accordance with HTTP/1.1.
[RFC9110] also states:
A client cannot begin using an upgraded protocol on the connection
until it has completely sent the request message (i.e., the client
can't change the protocol it is sending in the middle of a
message).
However, because of the possibility of rejection, the converse is not
true: a client cannot necessarily begin using an upgraded protocol
merely because it has finished sending the upgrade request message.
Expires March 1, 2025 [Page 3]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
In some cases, the client might expect that the upgrade will succeed.
If this expectation is correct, the client might be able to reduce
delay by immediately sending the first bytes of the upgraded protocol
"optimistically", without waiting for the server's response. This
document explores the security implications of this "optimistic"
behavior.
3. Possible Security Issues
When there are only two distinct parties involved in an HTTP/1.1
connection (i.e., the client and the server), HTTP Upgrade introduces
no new security issues: each party must already be prepared for the
other to send arbitrary data on the connection at any time. However,
HTTP connections often involve more than two parties, if the requests
or responses include third-party data. For example, a browser (party
1) might send an HTTP request to an origin (party 2) with path,
headers, or body controlled by a website from a different origin
(party 3). Post-upgrade protocols such as WebSocket similarly are
often used to convey data chosen by a third party.
If the third-party data source is untrusted, we call the data it
provides "attacker-controlled". The combination of attacker-
controlled data and optimistic HTTP Upgrade results in two
significant security issues.
3.1. Request Smuggling
In a Request Smuggling attack ([RFC9112], Section 11.2) the attacker-
controlled data is chosen in such a way that it is interpreted by the
server as an additional HTTP request. These attacks allow the
attacker to speak on behalf of the client while bypassing the
client's own rules about what requests it will issue. Request
Smuggling can occur if the client and server have distinct
interpretations of the data that flows between them.
If the server accepts an HTTP Upgrade, it interprets the subsequent
bytes in accordance with the new protocol. If it rejects the
upgrade, it interprets those bytes as HTTP/1.1. However, the client
doesn't know which interpretation the server will take until it
receives the server's response status code. If it uses the new
protocol optimistically, this creates a risk that the server will
interpret attacker-controlled data in the upgraded protocol as an
additional HTTP request issued by the client.
As a trivial example, consider an upgraded protocol in which the
entire post-upgrade content might be freely attacker-controlled
(e.g., "connect-tcp" [I-D.ietf-httpbis-connect-tcp]). If the client
is authenticated to the server using a connection-level
Expires March 1, 2025 [Page 4]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
authentication method such as TLS Client Certificates, the attacker
could send an HTTP/1.1 POST request in the post-upgrade payload. If
the client delivers this payload optimistically, and the upgrade
request fails, the server would interpret the payload as a subsequent
authenticated request issued by the client.
3.2. Parser Exploits
A related category of attacks use protocol disagreement to exploit
vulnerabilities in the server's request parsing logic. These attacks
apply when the HTTP client is trusted by the server, but the post-
upgrade data source is not. If the server software was developed
under the assumption that some or all of the HTTP request data is not
attacker-controlled, optimistic use of HTTP Upgrade can cause this
assumption to be violated, exposing vulnerabilities in the server's
HTTP request parser.
4. Operational Issues
If the server rejects the upgrade, the connection can continue to be
used for HTTP/1.1. There is no requirement to close the connection
in response to an upgrade rejection, and keeping the connection open
has performance advantages if additional HTTP requests to this server
are likely. Thus, it is normally inappropriate to close the
connection in response to a rejected upgrade.
5. Impact on Existing Upgrade Tokens
At the time of writing, there are four distinct Upgrade Tokens that
are registered, associated with published documents, and not marked
obsolete. This section considers the impact of this document's
considerations on each registered Upgrade Token.
5.1. "HTTP"
[RFC9110] is the source of the requirement quoted in Section 2. It
also defines the "HTTP/*.*" family of Upgrade Tokens. In HTTP/1.1,
the only potentially applicable versions of this token are "0.9",
"1.0", "1.1", and "2.0".
Versions "0.9" and "1.0" are sufficiently syntactically similar to
HTTP/1.1 that any such "downward upgrade" would be unlikely to result
in the security concerns discussed here. (An "upgrade" to version
1.1 has no effect at all.)
A version number of "2.0" corresponds to HTTP/2. Every HTTP/2
connection begins with a Client Connection Preface (Section 3.4 of
[RFC9113]) that was selected to ensure that a compliant HTTP/1.1
Expires March 1, 2025 [Page 5]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
server will not process further data on this connection. This avoids
security issues if an "HTTP/2.0" Upgrade Token is used
optimistically.
5.2. "TLS"
[RFC2817] correctly highlights the possibility of the server
rejecting the upgrade. The security considerations documented here
are applicable to any use of the "TLS" Upgrade Token, but no change
is required in [RFC2817].
5.3. "WebSocket"/"websocket"
Section 4.1 of [RFC6455] says:
Once the client's opening handshake has been sent, the client MUST
wait for a response from the server before sending any further
data.
Thus, optimistic use of HTTP Upgrade is already forbidden in the
WebSocket protocol. Additionally, the WebSocket protocol requires
high-entropy masking of client-to-server frames (Section 5.1 of
[RFC6455]).
5.4. "connect-udp"
Section 5 of [RFC9298] says:
A client MAY optimistically start sending UDP packets in HTTP
Datagrams before receiving the response to its UDP proxying
request.
However, in HTTP/1.1, this "proxying request" is an HTTP Upgrade
request. This upgrade is likely to be rejected in certain
circumstances, such as when the UDP destination address (which is
attacker-controlled) is invalid. Additionally, the contents of the
"connect-udp" protocol stream can include untrusted material (i.e.,
the UDP packets, which might come from other applications on the
client device). This creates the possibility of Request Smuggling
attacks. To avoid these concerns, this text is updated as follows:
When using HTTP/2 or later, a client MAY optimistically ...
Expires March 1, 2025 [Page 6]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
Section 3.3 of [RFC9298] describes the requirement for a successful
proxy setup response, including upgrading to the "connect-udp"
protocol, and says:
If any of these requirements are not met, the client MUST treat
this proxying attempt as failed and abort the connection.
However, this could be interpreted as an instruction to abort the
underlying TLS and TCP connections in the event of an unsuccessful
response such as "407 ("Proxy Authentication Required)". To avoid an
unnecessary delay in this case, this text is hereby updated as
follows:
If any of these requirements are not met, the client MUST treat
this proxying attempt as failed. If the "Upgrade" response header
field is absent, the client MAY reuse the connection for further
HTTP/1.1 requests; otherwise it MUST abort the underlying
connection.
6. Guidance for Future Upgrade Tokens
There are now several good examples of designs that prevent the
security concerns discussed in this document and may be applicable in
future specifications:
o Forbid optimistic use of HTTP Upgrade (WebSocket, Section 4.1 of
[RFC6455]).
o Embed a fixed preamble that terminates HTTP/1.1 processing
(HTTP/2, Section 3.4 of [RFC9113]).
o Apply high-entropy masking of client-to-server data (WebSocket,
Section 5.1 of [RFC6455]).
Future specifications for Upgrade Tokens MUST account for the
security issues discussed here and provide clear guidance on how
clients can avoid them.
7. IANA Considerations
This document has no IANA actions.
Expires March 1, 2025 [Page 7]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, .
[RFC9110] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
Ed., "HTTP Semantics", STD 97, RFC 9110,
DOI 10.17487/RFC9110, June 2022,
.
[RFC9298] Schinazi, D., "Proxying UDP in HTTP", RFC 9298,
DOI 10.17487/RFC9298, August 2022,
.
8.2. Informative References
[I-D.ietf-httpbis-connect-tcp]
Schwartz, B., "Template-Driven HTTP CONNECT Proxying for
TCP", draft-ietf-httpbis-connect-tcp-06 (work in
progress), October 2024.
[RFC2817] Khare, R. and S. Lawrence, "Upgrading to TLS Within
HTTP/1.1", RFC 2817, DOI 10.17487/RFC2817, May 2000,
.
[RFC6455] Fette, I. and A. Melnikov, "The WebSocket Protocol",
RFC 6455, DOI 10.17487/RFC6455, December 2011,
.
[RFC9112] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
Ed., "HTTP/1.1", STD 99, RFC 9112, DOI 10.17487/RFC9112,
June 2022, .
[RFC9113] Thomson, M., Ed. and C. Benfield, Ed., "HTTP/2", RFC 9113,
DOI 10.17487/RFC9113, June 2022,
.
Expires March 1, 2025 [Page 8]
Internet-Draft Optimistic HTTP Upgrade Security August 2024
Acknowledgments
Thanks to Mark Nottingham and Lucas Pardue for early reviews of this
document.
Author's Address
Benjamin M. Schwartz
Meta Platforms, Inc.
Email: ietf@bemasc.net
Expires March 1, 2025 [Page 9]