On Sun, May 08, 2022 at 10:42:52AM +0200, Hiltjo Posthuma wrote:
> On Sat, May 07, 2022 at 10:13:40PM +0200, Marc Espie wrote:
> > On Fri, May 06, 2022 at 08:13:42AM -0000, Stuart Henderson wrote:
> > > On 2022-05-06, Theo Buehler <[email protected]> wrote:
> > > > While we could readily make libssl fall back to the legacy stack if
> > > > SSL_OP_NO_TICKET is disabled, I don't think this optimization outweighs
> > > > the overall benefit of TLSv1.3 - better protocol, cleaner code.
> > > 
> > > Especially when the major beneficiary of this is pkg_add when it
> > > searches for updates; the number of connections has been *hugely*
> > > reduced with the caching added recently.
> > 
> > I haven't enforced it, but https for pkg_add  makes zero sense
> > anyway: you don't gain any confidentiality, and the integrity of
> > the package is ensured by the signatures.
> > 
> > Note that https for base release makes little sense as well, apart
> > from the initial installs. Updates will also rely on signatures,
> > so all you gain from https is... exercising tls, and noticing
> > connections are slower.
> > 
> > (also: authentication is slow for old time architectures).
> > 
> > I'm still wondering what's the point of https for all this.
> > 
> 
> The actual HTTP data sent (not just the package data itself) is not 
> immediately
> visible, filterable or changed by a MiTM. They also cannot easily see which
> packages are installed or filter errata's, right?

Actually pkg_add is mostly predictable, for debug reasons, and all data
*sizes* are still very visible.

Knowing you talk to cdn.openbsd.org, just by looking at the packet sizes
you can predict what packages are getting installed/updated.

Reply via email to