diff options
Diffstat (limited to 'vendor/sabre/dav/docs/draft-ietf-httpbis-p1-messaging-11.txt')
-rw-r--r-- | vendor/sabre/dav/docs/draft-ietf-httpbis-p1-messaging-11.txt | 5152 |
1 files changed, 0 insertions, 5152 deletions
diff --git a/vendor/sabre/dav/docs/draft-ietf-httpbis-p1-messaging-11.txt b/vendor/sabre/dav/docs/draft-ietf-httpbis-p1-messaging-11.txt deleted file mode 100644 index c0d449877..000000000 --- a/vendor/sabre/dav/docs/draft-ietf-httpbis-p1-messaging-11.txt +++ /dev/null @@ -1,5152 +0,0 @@ - - - -HTTPbis Working Group R. Fielding, Ed. -Internet-Draft Day Software -Obsoletes: 2616 (if approved) J. Gettys -Updates: 2817 (if approved) Alcatel-Lucent -Intended status: Standards Track J. Mogul -Expires: February 5, 2011 HP - H. Frystyk - Microsoft - L. Masinter - Adobe Systems - P. Leach - Microsoft - T. Berners-Lee - W3C/MIT - Y. Lafon, Ed. - W3C - J. Reschke, Ed. - greenbytes - August 4, 2010 - - - HTTP/1.1, part 1: URIs, Connections, and Message Parsing - draft-ietf-httpbis-p1-messaging-11 - -Abstract - - The Hypertext Transfer Protocol (HTTP) is an application-level - protocol for distributed, collaborative, hypertext information - systems. HTTP has been in use by the World Wide Web global - information initiative since 1990. This document is Part 1 of the - seven-part specification that defines the protocol referred to as - "HTTP/1.1" and, taken together, obsoletes RFC 2616. Part 1 provides - an overview of HTTP and its associated terminology, defines the - "http" and "https" Uniform Resource Identifier (URI) schemes, defines - the generic message syntax and parsing requirements for HTTP message - frames, and describes general security concerns for implementations. - -Editorial Note (To be removed by RFC Editor) - - Discussion of this draft should take place on the HTTPBIS working - group mailing list (ietf-http-wg@w3.org). The current issues list is - at <http://tools.ietf.org/wg/httpbis/trac/report/3> and related - documents (including fancy diffs) can be found at - <http://tools.ietf.org/wg/httpbis/>. - - The changes in this draft are summarized in Appendix D.12. - -Status of This Memo - - - -Fielding, et al. Expires February 5, 2011 [Page 1] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - This Internet-Draft is submitted in full conformance with the - provisions of BCP 78 and BCP 79. - - Internet-Drafts are working documents of the Internet Engineering - Task Force (IETF). Note that other groups may also distribute - working documents as Internet-Drafts. The list of current Internet- - Drafts is at http://datatracker.ietf.org/drafts/current/. - - Internet-Drafts are draft documents valid for a maximum of six months - and may be updated, replaced, or obsoleted by other documents at any - time. It is inappropriate to use Internet-Drafts as reference - material or to cite them other than as "work in progress." - - This Internet-Draft will expire on February 5, 2011. - -Copyright Notice - - Copyright (c) 2010 IETF Trust and the persons identified as the - document authors. All rights reserved. - - This document is subject to BCP 78 and the IETF Trust's Legal - Provisions Relating to IETF Documents - (http://trustee.ietf.org/license-info) in effect on the date of - publication of this document. Please review these documents - carefully, as they describe your rights and restrictions with respect - to this document. Code Components extracted from this document must - include Simplified BSD License text as described in Section 4.e of - the Trust Legal Provisions and are provided without warranty as - described in the Simplified BSD License. - - This document may contain material from IETF Documents or IETF - Contributions published or made publicly available before November - 10, 2008. The person(s) controlling the copyright in some of this - material may not have granted the IETF Trust the right to allow - modifications of such material outside the IETF Standards Process. - Without obtaining an adequate license from the person(s) controlling - the copyright in such materials, this document may not be modified - outside the IETF Standards Process, and derivative works of it may - not be created outside the IETF Standards Process, except to format - it for publication as an RFC or to translate it into languages other - than English. - -Table of Contents - - 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 6 - 1.1. Requirements . . . . . . . . . . . . . . . . . . . . . . . 7 - 1.2. Syntax Notation . . . . . . . . . . . . . . . . . . . . . 7 - 1.2.1. ABNF Extension: #rule . . . . . . . . . . . . . . . . 7 - - - -Fielding, et al. Expires February 5, 2011 [Page 2] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - 1.2.2. Basic Rules . . . . . . . . . . . . . . . . . . . . . 8 - 1.2.3. ABNF Rules defined in other Parts of the - Specification . . . . . . . . . . . . . . . . . . . . 10 - 2. HTTP-related architecture . . . . . . . . . . . . . . . . . . 10 - 2.1. Client/Server Messaging . . . . . . . . . . . . . . . . . 10 - 2.2. Intermediaries . . . . . . . . . . . . . . . . . . . . . . 12 - 2.3. Caches . . . . . . . . . . . . . . . . . . . . . . . . . . 13 - 2.4. Transport Independence . . . . . . . . . . . . . . . . . . 14 - 2.5. HTTP Version . . . . . . . . . . . . . . . . . . . . . . . 14 - 2.6. Uniform Resource Identifiers . . . . . . . . . . . . . . . 16 - 2.6.1. http URI scheme . . . . . . . . . . . . . . . . . . . 16 - 2.6.2. https URI scheme . . . . . . . . . . . . . . . . . . . 18 - 2.6.3. http and https URI Normalization and Comparison . . . 18 - 3. HTTP Message . . . . . . . . . . . . . . . . . . . . . . . . . 19 - 3.1. Message Parsing Robustness . . . . . . . . . . . . . . . . 20 - 3.2. Header Fields . . . . . . . . . . . . . . . . . . . . . . 20 - 3.3. Message Body . . . . . . . . . . . . . . . . . . . . . . . 22 - 3.4. General Header Fields . . . . . . . . . . . . . . . . . . 25 - 4. Request . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 - 4.1. Request-Line . . . . . . . . . . . . . . . . . . . . . . . 26 - 4.1.1. Method . . . . . . . . . . . . . . . . . . . . . . . . 26 - 4.1.2. request-target . . . . . . . . . . . . . . . . . . . . 27 - 4.2. The Resource Identified by a Request . . . . . . . . . . . 29 - 4.3. Effective Request URI . . . . . . . . . . . . . . . . . . 29 - 5. Response . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 - 5.1. Status-Line . . . . . . . . . . . . . . . . . . . . . . . 31 - 5.1.1. Status Code and Reason Phrase . . . . . . . . . . . . 31 - 6. Protocol Parameters . . . . . . . . . . . . . . . . . . . . . 32 - 6.1. Date/Time Formats: Full Date . . . . . . . . . . . . . . . 32 - 6.2. Transfer Codings . . . . . . . . . . . . . . . . . . . . . 34 - 6.2.1. Chunked Transfer Coding . . . . . . . . . . . . . . . 35 - 6.2.2. Compression Codings . . . . . . . . . . . . . . . . . 37 - 6.2.3. Transfer Coding Registry . . . . . . . . . . . . . . . 38 - 6.3. Product Tokens . . . . . . . . . . . . . . . . . . . . . . 39 - 6.4. Quality Values . . . . . . . . . . . . . . . . . . . . . . 39 - 7. Connections . . . . . . . . . . . . . . . . . . . . . . . . . 39 - 7.1. Persistent Connections . . . . . . . . . . . . . . . . . . 39 - 7.1.1. Purpose . . . . . . . . . . . . . . . . . . . . . . . 40 - 7.1.2. Overall Operation . . . . . . . . . . . . . . . . . . 40 - 7.1.3. Proxy Servers . . . . . . . . . . . . . . . . . . . . 42 - 7.1.4. Practical Considerations . . . . . . . . . . . . . . . 44 - 7.2. Message Transmission Requirements . . . . . . . . . . . . 45 - 7.2.1. Persistent Connections and Flow Control . . . . . . . 45 - 7.2.2. Monitoring Connections for Error Status Messages . . . 45 - 7.2.3. Use of the 100 (Continue) Status . . . . . . . . . . . 46 - 7.2.4. Client Behavior if Server Prematurely Closes - Connection . . . . . . . . . . . . . . . . . . . . . . 48 - 8. Miscellaneous notes that might disappear . . . . . . . . . . . 49 - - - -Fielding, et al. Expires February 5, 2011 [Page 3] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - 8.1. Scheme aliases considered harmful . . . . . . . . . . . . 49 - 8.2. Use of HTTP for proxy communication . . . . . . . . . . . 49 - 8.3. Interception of HTTP for access control . . . . . . . . . 49 - 8.4. Use of HTTP by other protocols . . . . . . . . . . . . . . 49 - 8.5. Use of HTTP by media type specification . . . . . . . . . 49 - 9. Header Field Definitions . . . . . . . . . . . . . . . . . . . 49 - 9.1. Connection . . . . . . . . . . . . . . . . . . . . . . . . 49 - 9.2. Content-Length . . . . . . . . . . . . . . . . . . . . . . 50 - 9.3. Date . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 - 9.3.1. Clockless Origin Server Operation . . . . . . . . . . 52 - 9.4. Host . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 - 9.5. TE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 - 9.6. Trailer . . . . . . . . . . . . . . . . . . . . . . . . . 54 - 9.7. Transfer-Encoding . . . . . . . . . . . . . . . . . . . . 55 - 9.8. Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . 55 - 9.8.1. Upgrade Token Registry . . . . . . . . . . . . . . . . 56 - 9.9. Via . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 - 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 59 - 10.1. Header Field Registration . . . . . . . . . . . . . . . . 59 - 10.2. URI Scheme Registration . . . . . . . . . . . . . . . . . 59 - 10.3. Internet Media Type Registrations . . . . . . . . . . . . 59 - 10.3.1. Internet Media Type message/http . . . . . . . . . . . 59 - 10.3.2. Internet Media Type application/http . . . . . . . . . 61 - 10.4. Transfer Coding Registry . . . . . . . . . . . . . . . . . 62 - 10.5. Upgrade Token Registration . . . . . . . . . . . . . . . . 62 - 11. Security Considerations . . . . . . . . . . . . . . . . . . . 62 - 11.1. Personal Information . . . . . . . . . . . . . . . . . . . 63 - 11.2. Abuse of Server Log Information . . . . . . . . . . . . . 63 - 11.3. Attacks Based On File and Path Names . . . . . . . . . . . 63 - 11.4. DNS Spoofing . . . . . . . . . . . . . . . . . . . . . . . 63 - 11.5. Proxies and Caching . . . . . . . . . . . . . . . . . . . 64 - 11.6. Denial of Service Attacks on Proxies . . . . . . . . . . . 65 - 12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 65 - 13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 66 - 13.1. Normative References . . . . . . . . . . . . . . . . . . . 66 - 13.2. Informative References . . . . . . . . . . . . . . . . . . 68 - Appendix A. Tolerant Applications . . . . . . . . . . . . . . . . 70 - Appendix B. Compatibility with Previous Versions . . . . . . . . 71 - B.1. Changes from HTTP/1.0 . . . . . . . . . . . . . . . . . . 71 - B.1.1. Changes to Simplify Multi-homed Web Servers and - Conserve IP Addresses . . . . . . . . . . . . . . . . 72 - B.2. Compatibility with HTTP/1.0 Persistent Connections . . . . 72 - B.3. Changes from RFC 2616 . . . . . . . . . . . . . . . . . . 73 - Appendix C. Collected ABNF . . . . . . . . . . . . . . . . . . . 74 - Appendix D. Change Log (to be removed by RFC Editor before - publication) . . . . . . . . . . . . . . . . . . . . 78 - D.1. Since RFC2616 . . . . . . . . . . . . . . . . . . . . . . 78 - D.2. Since draft-ietf-httpbis-p1-messaging-00 . . . . . . . . . 78 - - - -Fielding, et al. Expires February 5, 2011 [Page 4] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - D.3. Since draft-ietf-httpbis-p1-messaging-01 . . . . . . . . . 80 - D.4. Since draft-ietf-httpbis-p1-messaging-02 . . . . . . . . . 81 - D.5. Since draft-ietf-httpbis-p1-messaging-03 . . . . . . . . . 81 - D.6. Since draft-ietf-httpbis-p1-messaging-04 . . . . . . . . . 82 - D.7. Since draft-ietf-httpbis-p1-messaging-05 . . . . . . . . . 82 - D.8. Since draft-ietf-httpbis-p1-messaging-06 . . . . . . . . . 83 - D.9. Since draft-ietf-httpbis-p1-messaging-07 . . . . . . . . . 84 - D.10. Since draft-ietf-httpbis-p1-messaging-08 . . . . . . . . . 84 - D.11. Since draft-ietf-httpbis-p1-messaging-09 . . . . . . . . . 85 - D.12. Since draft-ietf-httpbis-p1-messaging-10 . . . . . . . . . 85 - Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 5] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -1. Introduction - - The Hypertext Transfer Protocol (HTTP) is an application-level - request/response protocol that uses extensible semantics and MIME- - like message payloads for flexible interaction with network-based - hypertext information systems. HTTP relies upon the Uniform Resource - Identifier (URI) standard [RFC3986] to indicate request targets and - relationships between resources. Messages are passed in a format - similar to that used by Internet mail [RFC5322] and the Multipurpose - Internet Mail Extensions (MIME) [RFC2045] (see Appendix A of [Part3] - for the differences between HTTP and MIME messages). - - HTTP is a generic interface protocol for information systems. It is - designed to hide the details of how a service is implemented by - presenting a uniform interface to clients that is independent of the - types of resources provided. Likewise, servers do not need to be - aware of each client's purpose: an HTTP request can be considered in - isolation rather than being associated with a specific type of client - or a predetermined sequence of application steps. The result is a - protocol that can be used effectively in many different contexts and - for which implementations can evolve independently over time. - - HTTP is also designed for use as an intermediation protocol for - translating communication to and from non-HTTP information systems. - HTTP proxies and gateways can provide access to alternative - information services by translating their diverse protocols into a - hypertext format that can be viewed and manipulated by clients in the - same way as HTTP services. - - One consequence of HTTP flexibility is that the protocol cannot be - defined in terms of what occurs behind the interface. Instead, we - are limited to defining the syntax of communication, the intent of - received communication, and the expected behavior of recipients. If - the communication is considered in isolation, then successful actions - ought to be reflected in corresponding changes to the observable - interface provided by servers. However, since multiple clients might - act in parallel and perhaps at cross-purposes, we cannot require that - such changes be observable beyond the scope of a single response. - - This document is Part 1 of the seven-part specification of HTTP, - defining the protocol referred to as "HTTP/1.1" and obsoleting - [RFC2616]. Part 1 describes the architectural elements that are used - or referred to in HTTP, defines the "http" and "https" URI schemes, - describes overall network operation and connection management, and - defines HTTP message framing and forwarding requirements. Our goal - is to define all of the mechanisms necessary for HTTP message - handling that are independent of message semantics, thereby defining - the complete set of requirements for message parsers and message- - - - -Fielding, et al. Expires February 5, 2011 [Page 6] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - forwarding intermediaries. - -1.1. Requirements - - The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", - "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this - document are to be interpreted as described in [RFC2119]. - - An implementation is not compliant if it fails to satisfy one or more - of the "MUST" or "REQUIRED" level requirements for the protocols it - implements. An implementation that satisfies all the "MUST" or - "REQUIRED" level and all the "SHOULD" level requirements for its - protocols is said to be "unconditionally compliant"; one that - satisfies all the "MUST" level requirements but not all the "SHOULD" - level requirements for its protocols is said to be "conditionally - compliant". - -1.2. Syntax Notation - - This specification uses the Augmented Backus-Naur Form (ABNF) - notation of [RFC5234]. - - The following core rules are included by reference, as defined in - [RFC5234], Appendix B.1: ALPHA (letters), CR (carriage return), CRLF - (CR LF), CTL (controls), DIGIT (decimal 0-9), DQUOTE (double quote), - HEXDIG (hexadecimal 0-9/A-F/a-f), LF (line feed), OCTET (any 8-bit - sequence of data), SP (space), VCHAR (any visible [USASCII] - character), and WSP (whitespace). - - As a syntactic convention, ABNF rule names prefixed with "obs-" - denote "obsolete" grammar rules that appear for historical reasons. - -1.2.1. ABNF Extension: #rule - - The #rule extension to the ABNF rules of [RFC5234] is used to improve - readability. - - A construct "#" is defined, similar to "*", for defining comma- - delimited lists of elements. The full form is "<n>#<m>element" - indicating at least <n> and at most <m> elements, each separated by a - single comma (",") and optional whitespace (OWS, Section 1.2.2). - - Thus, - - 1#element => element *( OWS "," OWS element ) - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 7] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - and: - - #element => [ 1#element ] - - and for n >= 1 and m > 1: - - <n>#<m>element => element <n-1>*<m-1>( OWS "," OWS element ) - - For compatibility with legacy list rules, recipients SHOULD accept - empty list elements. In other words, consumers would follow the list - productions: - - #element => [ ( "," / element ) *( OWS "," [ OWS element ] ) ] - - 1#element => *( "," OWS ) element *( OWS "," [ OWS element ] ) - - Note that empty elements do not contribute to the count of elements - present, though. - - For example, given these ABNF productions: - - example-list = 1#example-list-elmt - example-list-elmt = token ; see Section 1.2.2 - - Then these are valid values for example-list (not including the - double quotes, which are present for delimitation only): - - "foo,bar" - " foo ,bar," - " foo , ,bar,charlie " - "foo ,bar, charlie " - - But these values would be invalid, as at least one non-empty element - is required: - - "" - "," - ", ," - - Appendix C shows the collected ABNF, with the list rules expanded as - explained above. - -1.2.2. Basic Rules - - HTTP/1.1 defines the sequence CR LF as the end-of-line marker for all - protocol elements other than the message-body (see Appendix A for - tolerant applications). - - - - -Fielding, et al. Expires February 5, 2011 [Page 8] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - This specification uses three rules to denote the use of linear - whitespace: OWS (optional whitespace), RWS (required whitespace), and - BWS ("bad" whitespace). - - The OWS rule is used where zero or more linear whitespace characters - might appear. OWS SHOULD either not be produced or be produced as a - single SP character. Multiple OWS characters that occur within - field-content SHOULD be replaced with a single SP before interpreting - the field value or forwarding the message downstream. - - RWS is used when at least one linear whitespace character is required - to separate field tokens. RWS SHOULD be produced as a single SP - character. Multiple RWS characters that occur within field-content - SHOULD be replaced with a single SP before interpreting the field - value or forwarding the message downstream. - - BWS is used where the grammar allows optional whitespace for - historical reasons but senders SHOULD NOT produce it in messages. - HTTP/1.1 recipients MUST accept such bad optional whitespace and - remove it before interpreting the field value or forwarding the - message downstream. - - - OWS = *( [ obs-fold ] WSP ) - ; "optional" whitespace - RWS = 1*( [ obs-fold ] WSP ) - ; "required" whitespace - BWS = OWS - ; "bad" whitespace - obs-fold = CRLF - ; see Section 3.2 - - Many HTTP/1.1 header field values consist of words (token or quoted- - string) separated by whitespace or special characters. These special - characters MUST be in a quoted string to be used within a parameter - value (as defined in Section 6.2). - - word = token / quoted-string - - token = 1*tchar - - tchar = "!" / "#" / "$" / "%" / "&" / "'" / "*" - / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~" - / DIGIT / ALPHA - ; any VCHAR, except special - - special = "(" / ")" / "<" / ">" / "@" / "," - / ";" / ":" / "\" / DQUOTE / "/" / "[" - - - -Fielding, et al. Expires February 5, 2011 [Page 9] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - / "]" / "?" / "=" / "{" / "}" - - A string of text is parsed as a single word if it is quoted using - double-quote marks. - - quoted-string = DQUOTE *( qdtext / quoted-pair ) DQUOTE - qdtext = OWS / %x21 / %x23-5B / %x5D-7E / obs-text - ; OWS / <VCHAR except DQUOTE and "\"> / obs-text - obs-text = %x80-FF - - The backslash character ("\") can be used as a single-character - quoting mechanism within quoted-string constructs: - - quoted-pair = "\" ( WSP / VCHAR / obs-text ) - - Producers SHOULD NOT escape characters that do not require escaping - (i.e., other than DQUOTE and the backslash character). - -1.2.3. ABNF Rules defined in other Parts of the Specification - - The ABNF rules below are defined in other parts: - - request-header = <request-header, defined in [Part2], Section 3> - response-header = <response-header, defined in [Part2], Section 5> - - - MIME-Version = <MIME-Version, defined in [Part3], Appendix A.1> - - - Cache-Control = <Cache-Control, defined in [Part6], Section 3.4> - Pragma = <Pragma, defined in [Part6], Section 3.4> - Warning = <Warning, defined in [Part6], Section 3.6> - -2. HTTP-related architecture - - HTTP was created for the World Wide Web architecture and has evolved - over time to support the scalability needs of a worldwide hypertext - system. Much of that architecture is reflected in the terminology - and syntax productions used to define HTTP. - -2.1. Client/Server Messaging - - HTTP is a stateless request/response protocol that operates by - exchanging messages across a reliable transport or session-layer - connection. An HTTP "client" is a program that establishes a - connection to a server for the purpose of sending one or more HTTP - requests. An HTTP "server" is a program that accepts connections in - order to service HTTP requests by sending HTTP responses. - - - -Fielding, et al. Expires February 5, 2011 [Page 10] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Note that the terms client and server refer only to the roles that - these programs perform for a particular connection. The same program - might act as a client on some connections and a server on others. We - use the term "user agent" to refer to the program that initiates a - request, such as a WWW browser, editor, or spider (web-traversing - robot), and the term "origin server" to refer to the program that can - originate authoritative responses to a request. For general - requirements, we use the term "sender" to refer to whichever - component sent a given message and the term "recipient" to refer to - any component that receives the message. - - Most HTTP communication consists of a retrieval request (GET) for a - representation of some resource identified by a URI. In the simplest - case, this might be accomplished via a single bidirectional - connection (===) between the user agent (UA) and the origin server - (O). - - request > - UA ======================================= O - < response - - A client sends an HTTP request to the server in the form of a request - message (Section 4), beginning with a method, URI, and protocol - version, followed by MIME-like header fields containing request - modifiers, client information, and payload metadata, an empty line to - indicate the end of the header section, and finally the payload body - (if any). - - A server responds to the client's request by sending an HTTP response - message (Section 5), beginning with a status line that includes the - protocol version, a success or error code, and textual reason phrase, - followed by MIME-like header fields containing server information, - resource metadata, and payload metadata, an empty line to indicate - the end of the header section, and finally the payload body (if any). - - The following example illustrates a typical message exchange for a - GET request on the URI "http://www.example.com/hello.txt": - - client request: - - GET /hello.txt HTTP/1.1 - User-Agent: curl/7.16.3 libcurl/7.16.3 OpenSSL/0.9.7l zlib/1.2.3 - Host: www.example.com - Accept: */* - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 11] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - server response: - - HTTP/1.1 200 OK - Date: Mon, 27 Jul 2009 12:28:53 GMT - Server: Apache - Last-Modified: Wed, 22 Jul 2009 19:15:56 GMT - ETag: "34aa387-d-1568eb00" - Accept-Ranges: bytes - Content-Length: 14 - Vary: Accept-Encoding - Content-Type: text/plain - - Hello World! - -2.2. Intermediaries - - A more complicated situation occurs when one or more intermediaries - are present in the request/response chain. There are three common - forms of intermediary: proxy, gateway, and tunnel. In some cases, a - single intermediary might act as an origin server, proxy, gateway, or - tunnel, switching behavior based on the nature of each request. - - > > > > - UA =========== A =========== B =========== C =========== O - < < < < - - The figure above shows three intermediaries (A, B, and C) between the - user agent and origin server. A request or response message that - travels the whole chain will pass through four separate connections. - Some HTTP communication options might apply only to the connection - with the nearest, non-tunnel neighbor, only to the end-points of the - chain, or to all connections along the chain. Although the diagram - is linear, each participant might be engaged in multiple, - simultaneous communications. For example, B might be receiving - requests from many clients other than A, and/or forwarding requests - to servers other than C, at the same time that it is handling A's - request. - - We use the terms "upstream" and "downstream" to describe various - requirements in relation to the directional flow of a message: all - messages flow from upstream to downstream. Likewise, we use the - terms "inbound" and "outbound" to refer to directions in relation to - the request path: "inbound" means toward the origin server and - "outbound" means toward the user agent. - - A "proxy" is a message forwarding agent that is selected by the - client, usually via local configuration rules, to receive requests - for some type(s) of absolute URI and attempt to satisfy those - - - -Fielding, et al. Expires February 5, 2011 [Page 12] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - requests via translation through the HTTP interface. Some - translations are minimal, such as for proxy requests for "http" URIs, - whereas other requests might require translation to and from entirely - different application-layer protocols. Proxies are often used to - group an organization's HTTP requests through a common intermediary - for the sake of security, annotation services, or shared caching. - - A "gateway" (a.k.a., "reverse proxy") is a receiving agent that acts - as a layer above some other server(s) and translates the received - requests to the underlying server's protocol. Gateways are often - used for load balancing or partitioning HTTP services across multiple - machines. Unlike a proxy, a gateway receives requests as if it were - the origin server for the target resource; the requesting client will - not be aware that it is communicating with a gateway. A gateway - communicates with the client as if the gateway is the origin server - and thus is subject to all of the requirements on origin servers for - that connection. A gateway communicates with inbound servers using - any protocol it desires, including private extensions to HTTP that - are outside the scope of this specification. - - A "tunnel" acts as a blind relay between two connections without - changing the messages. Once active, a tunnel is not considered a - party to the HTTP communication, though the tunnel might have been - initiated by an HTTP request. A tunnel ceases to exist when both - ends of the relayed connection are closed. Tunnels are used to - extend a virtual connection through an intermediary, such as when - transport-layer security is used to establish private communication - through a shared firewall proxy. - -2.3. Caches - - A "cache" is a local store of previous response messages and the - subsystem that controls its message storage, retrieval, and deletion. - A cache stores cacheable responses in order to reduce the response - time and network bandwidth consumption on future, equivalent - requests. Any client or server MAY employ a cache, though a cache - cannot be used by a server while it is acting as a tunnel. - - The effect of a cache is that the request/response chain is shortened - if one of the participants along the chain has a cached response - applicable to that request. The following illustrates the resulting - chain if B has a cached copy of an earlier response from O (via C) - for a request which has not been cached by UA or A. - - > > - UA =========== A =========== B - - - - - - C - - - - - - O - < < - - - - -Fielding, et al. Expires February 5, 2011 [Page 13] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - A response is "cacheable" if a cache is allowed to store a copy of - the response message for use in answering subsequent requests. Even - when a response is cacheable, there might be additional constraints - placed by the client or by the origin server on when that cached - response can be used for a particular request. HTTP requirements for - cache behavior and cacheable responses are defined in Section 2 of - [Part6]. - - There are a wide variety of architectures and configurations of - caches and proxies deployed across the World Wide Web and inside - large organizations. These systems include national hierarchies of - proxy caches to save transoceanic bandwidth, systems that broadcast - or multicast cache entries, organizations that distribute subsets of - cached data via optical media, and so on. - -2.4. Transport Independence - - HTTP systems are used in a wide variety of environments, from - corporate intranets with high-bandwidth links to long-distance - communication over low-power radio links and intermittent - connectivity. - - HTTP communication usually takes place over TCP/IP connections. The - default port is TCP 80 - (<http://www.iana.org/assignments/port-numbers>), but other ports can - be used. This does not preclude HTTP from being implemented on top - of any other protocol on the Internet, or on other networks. HTTP - only presumes a reliable transport; any protocol that provides such - guarantees can be used; the mapping of the HTTP/1.1 request and - response structures onto the transport data units of the protocol in - question is outside the scope of this specification. - - In HTTP/1.0, most implementations used a new connection for each - request/response exchange. In HTTP/1.1, a connection might be used - for one or more request/response exchanges, although connections - might be closed for a variety of reasons (see Section 7.1). - -2.5. HTTP Version - - HTTP uses a "<major>.<minor>" numbering scheme to indicate versions - of the protocol. The protocol versioning policy is intended to allow - the sender to indicate the format of a message and its capacity for - understanding further HTTP communication, rather than the features - obtained via that communication. No change is made to the version - number for the addition of message components which do not affect - communication behavior or which only add to extensible field values. - The <minor> number is incremented when the changes made to the - protocol add features which do not change the general message parsing - - - -Fielding, et al. Expires February 5, 2011 [Page 14] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - algorithm, but which might add to the message semantics and imply - additional capabilities of the sender. The <major> number is - incremented when the format of a message within the protocol is - changed. See [RFC2145] for a fuller explanation. - - The version of an HTTP message is indicated by an HTTP-Version field - in the first line of the message. HTTP-Version is case-sensitive. - - HTTP-Version = HTTP-Prot-Name "/" 1*DIGIT "." 1*DIGIT - HTTP-Prot-Name = %x48.54.54.50 ; "HTTP", case-sensitive - - Note that the major and minor numbers MUST be treated as separate - integers and that each MAY be incremented higher than a single digit. - Thus, HTTP/2.4 is a lower version than HTTP/2.13, which in turn is - lower than HTTP/12.3. Leading zeros MUST be ignored by recipients - and MUST NOT be sent. - - An application that sends a request or response message that includes - HTTP-Version of "HTTP/1.1" MUST be at least conditionally compliant - with this specification. Applications that are at least - conditionally compliant with this specification SHOULD use an HTTP- - Version of "HTTP/1.1" in their messages, and MUST do so for any - message that is not compatible with HTTP/1.0. For more details on - when to send specific HTTP-Version values, see [RFC2145]. - - The HTTP version of an application is the highest HTTP version for - which the application is at least conditionally compliant. - - Proxy and gateway applications need to be careful when forwarding - messages in protocol versions different from that of the application. - Since the protocol version indicates the protocol capability of the - sender, a proxy/gateway MUST NOT send a message with a version - indicator which is greater than its actual version. If a higher - version request is received, the proxy/gateway MUST either downgrade - the request version, or respond with an error, or switch to tunnel - behavior. - - Due to interoperability problems with HTTP/1.0 proxies discovered - since the publication of [RFC2068], caching proxies MUST, gateways - MAY, and tunnels MUST NOT upgrade the request to the highest version - they support. The proxy/gateway's response to that request MUST be - in the same major version as the request. - - Note: Converting between versions of HTTP might involve - modification of header fields required or forbidden by the - versions involved. - - - - - -Fielding, et al. Expires February 5, 2011 [Page 15] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -2.6. Uniform Resource Identifiers - - Uniform Resource Identifiers (URIs) [RFC3986] are used throughout - HTTP as the means for identifying resources. URI references are used - to target requests, indicate redirects, and define relationships. - HTTP does not limit what a resource might be; it merely defines an - interface that can be used to interact with a resource via HTTP. - More information on the scope of URIs and resources can be found in - [RFC3986]. - - This specification adopts the definitions of "URI-reference", - "absolute-URI", "relative-part", "port", "host", "path-abempty", - "path-absolute", "query", and "authority" from [RFC3986]. In - addition, we define a partial-URI rule for protocol elements that - allow a relative URI without a fragment. - - URI-reference = <URI-reference, defined in [RFC3986], Section 4.1> - absolute-URI = <absolute-URI, defined in [RFC3986], Section 4.3> - relative-part = <relative-part, defined in [RFC3986], Section 4.2> - authority = <authority, defined in [RFC3986], Section 3.2> - path-abempty = <path-abempty, defined in [RFC3986], Section 3.3> - path-absolute = <path-absolute, defined in [RFC3986], Section 3.3> - port = <port, defined in [RFC3986], Section 3.2.3> - query = <query, defined in [RFC3986], Section 3.4> - uri-host = <host, defined in [RFC3986], Section 3.2.2> - - partial-URI = relative-part [ "?" query ] - - Each protocol element in HTTP that allows a URI reference will - indicate in its ABNF production whether the element allows only a URI - in absolute form (absolute-URI), any relative reference (relative- - ref), or some other subset of the URI-reference grammar. Unless - otherwise indicated, URI references are parsed relative to the - request target (the default base URI for both the request and its - corresponding response). - -2.6.1. http URI scheme - - The "http" URI scheme is hereby defined for the purpose of minting - identifiers according to their association with the hierarchical - namespace governed by a potential HTTP origin server listening for - TCP connections on a given port. The HTTP server is identified via - the generic syntax's authority component, which includes a host - identifier and optional TCP port, and the remainder of the URI is - considered to be identifying data corresponding to a resource for - which that server might provide an HTTP interface. - - http-URI = "http:" "//" authority path-abempty [ "?" query ] - - - -Fielding, et al. Expires February 5, 2011 [Page 16] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - The host identifier within an authority component is defined in - [RFC3986], Section 3.2.2. If host is provided as an IP literal or - IPv4 address, then the HTTP server is any listener on the indicated - TCP port at that IP address. If host is a registered name, then that - name is considered an indirect identifier and the recipient might use - a name resolution service, such as DNS, to find the address of a - listener for that host. The host MUST NOT be empty; if an "http" URI - is received with an empty host, then it MUST be rejected as invalid. - If the port subcomponent is empty or not given, then TCP port 80 is - assumed (the default reserved port for WWW services). - - Regardless of the form of host identifier, access to that host is not - implied by the mere presence of its name or address. The host might - or might not exist and, even when it does exist, might or might not - be running an HTTP server or listening to the indicated port. The - "http" URI scheme makes use of the delegated nature of Internet names - and addresses to establish a naming authority (whatever entity has - the ability to place an HTTP server at that Internet name or address) - and allows that authority to determine which names are valid and how - they might be used. - - When an "http" URI is used within a context that calls for access to - the indicated resource, a client MAY attempt access by resolving the - host to an IP address, establishing a TCP connection to that address - on the indicated port, and sending an HTTP request message to the - server containing the URI's identifying data as described in - Section 4. If the server responds to that request with a non-interim - HTTP response message, as described in Section 5, then that response - is considered an authoritative answer to the client's request. - - Although HTTP is independent of the transport protocol, the "http" - scheme is specific to TCP-based services because the name delegation - process depends on TCP for establishing authority. An HTTP service - based on some other underlying connection protocol would presumably - be identified using a different URI scheme, just as the "https" - scheme (below) is used for servers that require an SSL/TLS transport - layer on a connection. Other protocols might also be used to provide - access to "http" identified resources --- it is only the - authoritative interface used for mapping the namespace that is - specific to TCP. - - The URI generic syntax for authority also includes a deprecated - userinfo subcomponent ([RFC3986], Section 3.2.1) for including user - authentication information in the URI. The userinfo subcomponent - (and its "@" delimiter) MUST NOT be used in an "http" URI. URI - reference recipients SHOULD parse for the existence of userinfo and - treat its presence as an error, likely indicating that the deprecated - subcomponent is being used to obscure the authority for the sake of - - - -Fielding, et al. Expires February 5, 2011 [Page 17] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - phishing attacks. - -2.6.2. https URI scheme - - The "https" URI scheme is hereby defined for the purpose of minting - identifiers according to their association with the hierarchical - namespace governed by a potential HTTP origin server listening for - SSL/TLS-secured connections on a given TCP port. - - All of the requirements listed above for the "http" scheme are also - requirements for the "https" scheme, except that a default TCP port - of 443 is assumed if the port subcomponent is empty or not given, and - the TCP connection MUST be secured for privacy through the use of - strong encryption prior to sending the first HTTP request. - - https-URI = "https:" "//" authority path-abempty [ "?" query ] - - Unlike the "http" scheme, responses to "https" identified requests - are never "public" and thus are ineligible for shared caching. Their - default is "private" and might be further constrained via use of the - Cache-Control header field. - - Resources made available via the "https" scheme have no shared - identity with the "http" scheme even if their resource identifiers - only differ by the single "s" in the scheme name. They are different - services governed by different authorities. However, some extensions - to HTTP that apply to entire host domains, such as the Cookie - protocol, do allow one service to effect communication with the other - services based on host domain matching. - - The process for authoritative access to an "https" identified - resource is defined in [RFC2818]. - -2.6.3. http and https URI Normalization and Comparison - - Since the "http" and "https" schemes conform to the URI generic - syntax, such URIs are normalized and compared according to the - algorithm defined in [RFC3986], Section 6, using the defaults - described above for each scheme. - - If the port is equal to the default port for a scheme, the normal - form is to elide the port subcomponent. Likewise, an empty path - component is equivalent to an absolute path of "/", so the normal - form is to provide a path of "/" instead. The scheme and host are - case-insensitive and normally provided in lowercase; all other - components are compared in a case-sensitive manner. Characters other - than those in the "reserved" set are equivalent to their percent- - encoded octets (see [RFC3986], Section 2.1): the normal form is to - - - -Fielding, et al. Expires February 5, 2011 [Page 18] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - not encode them. - - For example, the following three URIs are equivalent: - - http://example.com:80/~smith/home.html - http://EXAMPLE.com/%7Esmith/home.html - http://EXAMPLE.com:/%7esmith/home.html - - [[TODO-not-here: This paragraph does not belong here. --roy]] If - path-abempty is the empty string (i.e., there is no slash "/" path - separator following the authority), then the "http" URI MUST be given - as "/" when used as a request-target (Section 4.1.2). If a proxy - receives a host name which is not a fully qualified domain name, it - MAY add its domain to the host name it received. If a proxy receives - a fully qualified domain name, the proxy MUST NOT change the host - name. - -3. HTTP Message - - All HTTP/1.1 messages consist of a start-line followed by a sequence - of characters in a format similar to the Internet Message Format - [RFC5322]: zero or more header fields (collectively referred to as - the "headers" or the "header section"), an empty line indicating the - end of the header section, and an optional message-body. - - An HTTP message can either be a request from client to server or a - response from server to client. Syntactically, the two types of - message differ only in the start-line, which is either a Request-Line - (for requests) or a Status-Line (for responses), and in the algorithm - for determining the length of the message-body (Section 3.3). In - theory, a client could receive requests and a server could receive - responses, distinguishing them by their different start-line formats, - but in practice servers are implemented to only expect a request (a - response is interpreted as an unknown or invalid request method) and - clients are implemented to only expect a response. - - HTTP-message = start-line - *( header-field CRLF ) - CRLF - [ message-body ] - start-line = Request-Line / Status-Line - - Whitespace (WSP) MUST NOT be sent between the start-line and the - first header field. The presence of whitespace might be an attempt - to trick a noncompliant implementation of HTTP into ignoring that - field or processing the next line as a new request, either of which - might result in security issues when implementations within the - request chain interpret the same message differently. HTTP/1.1 - - - -Fielding, et al. Expires February 5, 2011 [Page 19] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - servers MUST reject such a message with a 400 (Bad Request) response. - -3.1. Message Parsing Robustness - - In the interest of robustness, servers SHOULD ignore at least one - empty line received where a Request-Line is expected. In other - words, if the server is reading the protocol stream at the beginning - of a message and receives a CRLF first, it SHOULD ignore the CRLF. - - Some old HTTP/1.0 client implementations generate an extra CRLF after - a POST request as a lame workaround for some early server - applications that failed to read message-body content that was not - terminated by a line-ending. An HTTP/1.1 client MUST NOT preface or - follow a request with an extra CRLF. If terminating the request - message-body with a line-ending is desired, then the client MUST - include the terminating CRLF octets as part of the message-body - length. - - The normal procedure for parsing an HTTP message is to read the - start-line into a structure, read each header field into a hash table - by field name until the empty line, and then use the parsed data to - determine if a message-body is expected. If a message-body has been - indicated, then it is read as a stream until an amount of octets - equal to the message-body length is read or the connection is closed. - Care must be taken to parse an HTTP message as a sequence of octets - in an encoding that is a superset of US-ASCII. Attempting to parse - HTTP as a stream of Unicode characters in a character encoding like - UTF-16 might introduce security flaws due to the differing ways that - such parsers interpret invalid characters. - - HTTP allows the set of defined header fields to be extended without - changing the protocol version (see Section 10.1). However, such - fields might not be recognized by a downstream recipient and might be - stripped by non-transparent intermediaries. Unrecognized header - fields MUST be forwarded by transparent proxies and SHOULD be ignored - by a recipient. - -3.2. Header Fields - - Each HTTP header field consists of a case-insensitive field name - followed by a colon (":"), optional whitespace, and the field value. - - header-field = field-name ":" OWS [ field-value ] OWS - field-name = token - field-value = *( field-content / OWS ) - field-content = *( WSP / VCHAR / obs-text ) - - No whitespace is allowed between the header field name and colon. - - - -Fielding, et al. Expires February 5, 2011 [Page 20] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - For security reasons, any request message received containing such - whitespace MUST be rejected with a response code of 400 (Bad - Request). A proxy MUST remove any such whitespace from a response - message before forwarding the message downstream. - - A field value MAY be preceded by optional whitespace (OWS); a single - SP is preferred. The field value does not include any leading or - trailing white space: OWS occurring before the first non-whitespace - character of the field value or after the last non-whitespace - character of the field value is ignored and SHOULD be removed before - further processing (as this does not change the meaning of the header - field). - - The order in which header fields with differing field names are - received is not significant. However, it is "good practice" to send - header fields that contain control data first, such as Host on - requests and Date on responses, so that implementations can decide - when not to handle a message as early as possible. A server MUST - wait until the entire header section is received before interpreting - a request message, since later header fields might include - conditionals, authentication credentials, or deliberately misleading - duplicate header fields that would impact request processing. - - Multiple header fields with the same field name MUST NOT be sent in a - message unless the entire field value for that header field is - defined as a comma-separated list [i.e., #(values)]. Multiple header - fields with the same field name can be combined into one "field-name: - field-value" pair, without changing the semantics of the message, by - appending each subsequent field value to the combined field value in - order, separated by a comma. The order in which header fields with - the same field name are received is therefore significant to the - interpretation of the combined field value; a proxy MUST NOT change - the order of these field values when forwarding a message. - - Note: The "Set-Cookie" header as implemented in practice (as - opposed to how it is specified in [RFC2109]) can occur multiple - times, but does not use the list syntax, and thus cannot be - combined into a single line. (See Appendix A.2.3 of [Kri2001] for - details.) Also note that the Set-Cookie2 header specified in - [RFC2965] does not share this problem. - - Historically, HTTP header field values could be extended over - multiple lines by preceding each extra line with at least one space - or horizontal tab character (line folding). This specification - deprecates such line folding except within the message/http media - type (Section 10.3.1). HTTP/1.1 senders MUST NOT produce messages - that include line folding (i.e., that contain any field-content that - matches the obs-fold rule) unless the message is intended for - - - -Fielding, et al. Expires February 5, 2011 [Page 21] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - packaging within the message/http media type. HTTP/1.1 recipients - SHOULD accept line folding and replace any embedded obs-fold - whitespace with a single SP prior to interpreting the field value or - forwarding the message downstream. - - Historically, HTTP has allowed field content with text in the ISO- - 8859-1 [ISO-8859-1] character encoding and supported other character - sets only through use of [RFC2047] encoding. In practice, most HTTP - header field values use only a subset of the US-ASCII character - encoding [USASCII]. Newly defined header fields SHOULD limit their - field values to US-ASCII characters. Recipients SHOULD treat other - (obs-text) octets in field content as opaque data. - - Comments can be included in some HTTP header fields by surrounding - the comment text with parentheses. Comments are only allowed in - fields containing "comment" as part of their field value definition. - - comment = "(" *( ctext / quoted-cpair / comment ) ")" - ctext = OWS / %x21-27 / %x2A-5B / %x5D-7E / obs-text - ; OWS / <VCHAR except "(", ")", and "\"> / obs-text - - The backslash character ("\") can be used as a single-character - quoting mechanism within comment constructs: - - quoted-cpair = "\" ( WSP / VCHAR / obs-text ) - - Producers SHOULD NOT escape characters that do not require escaping - (i.e., other than the backslash character "\" and the parentheses "(" - and ")"). - -3.3. Message Body - - The message-body (if any) of an HTTP message is used to carry the - payload body associated with the request or response. - - message-body = *OCTET - - The message-body differs from the payload body only when a transfer- - coding has been applied, as indicated by the Transfer-Encoding header - field (Section 9.7). When one or more transfer-codings are applied - to a payload in order to form the message-body, the Transfer-Encoding - header field MUST contain the list of transfer-codings applied. - Transfer-Encoding is a property of the message, not of the payload, - and thus MAY be added or removed by any implementation along the - request/response chain under the constraints found in Section 6.2. - - The rules for when a message-body is allowed in a message differ for - requests and responses. - - - -Fielding, et al. Expires February 5, 2011 [Page 22] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - The presence of a message-body in a request is signaled by the - inclusion of a Content-Length or Transfer-Encoding header field in - the request's header fields, even if the request method does not - define any use for a message-body. This allows the request message - framing algorithm to be independent of method semantics. - - For response messages, whether or not a message-body is included with - a message is dependent on both the request method and the response - status code (Section 5.1.1). Responses to the HEAD request method - never include a message-body because the associated response header - fields (e.g., Transfer-Encoding, Content-Length, etc.) only indicate - what their values would have been if the method had been GET. All - 1xx (Informational), 204 (No Content), and 304 (Not Modified) - responses MUST NOT include a message-body. All other responses do - include a message-body, although the body MAY be of zero length. - - The length of the message-body is determined by one of the following - (in order of precedence): - - 1. Any response to a HEAD request and any response with a status - code of 100-199, 204, or 304 is always terminated by the first - empty line after the header fields, regardless of the header - fields present in the message, and thus cannot contain a message- - body. - - 2. If a Transfer-Encoding header field (Section 9.7) is present and - the "chunked" transfer-coding (Section 6.2) is the final - encoding, the message-body length is determined by reading and - decoding the chunked data until the transfer-coding indicates the - data is complete. - - If a Transfer-Encoding header field is present in a response and - the "chunked" transfer-coding is not the final encoding, the - message-body length is determined by reading the connection until - it is closed by the server. If a Transfer-Encoding header field - is present in a request and the "chunked" transfer-coding is not - the final encoding, the message-body length cannot be determined - reliably; the server MUST respond with the 400 (Bad Request) - status code and then close the connection. - - If a message is received with both a Transfer-Encoding header - field and a Content-Length header field, the Transfer-Encoding - overrides the Content-Length. Such a message might indicate an - attempt to perform request or response smuggling (bypass of - security-related checks on message routing or content) and thus - ought to be handled as an error. The provided Content-Length - MUST be removed, prior to forwarding the message downstream, or - replaced with the real message-body length after the transfer- - - - -Fielding, et al. Expires February 5, 2011 [Page 23] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - coding is decoded. - - 3. If a message is received without Transfer-Encoding and with - either multiple Content-Length header fields or a single Content- - Length header field with an invalid value, then the message - framing is invalid and MUST be treated as an error to prevent - request or response smuggling. If this is a request message, the - server MUST respond with a 400 (Bad Request) status code and then - close the connection. If this is a response message received by - a proxy or gateway, the proxy or gateway MUST discard the - received response, send a 502 (Bad Gateway) status code as its - downstream response, and then close the connection. If this is a - response message received by a user-agent, the message-body - length is determined by reading the connection until it is - closed; an error SHOULD be indicated to the user. - - 4. If a valid Content-Length header field (Section 9.2) is present - without Transfer-Encoding, its decimal value defines the message- - body length in octets. If the actual number of octets sent in - the message is less than the indicated Content-Length, the - recipient MUST consider the message to be incomplete and treat - the connection as no longer usable. If the actual number of - octets sent in the message is more than the indicated Content- - Length, the recipient MUST only process the message-body up to - the field value's number of octets; the remainder of the message - MUST either be discarded or treated as the next message in a - pipeline. For the sake of robustness, a user-agent MAY attempt - to detect and correct such an error in message framing if it is - parsing the response to the last request on on a connection and - the connection has been closed by the server. - - 5. If this is a request message and none of the above are true, then - the message-body length is zero (no message-body is present). - - 6. Otherwise, this is a response message without a declared message- - body length, so the message-body length is determined by the - number of octets received prior to the server closing the - connection. - - Since there is no way to distinguish a successfully completed, close- - delimited message from a partially-received message interrupted by - network failure, implementations SHOULD use encoding or length- - delimited messages whenever possible. The close-delimiting feature - exists primarily for backwards compatibility with HTTP/1.0. - - A server MAY reject a request that contains a message-body but not a - Content-Length by responding with 411 (Length Required). - - - - -Fielding, et al. Expires February 5, 2011 [Page 24] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Unless a transfer-coding other than "chunked" has been applied, a - client that sends a request containing a message-body SHOULD use a - valid Content-Length header field if the message-body length is known - in advance, rather than the "chunked" encoding, since some existing - services respond to "chunked" with a 411 (Length Required) status - code even though they understand the chunked encoding. This is - typically because such services are implemented via a gateway that - requires a content-length in advance of being called and the server - is unable or unwilling to buffer the entire request before - processing. - - A client that sends a request containing a message-body MUST include - a valid Content-Length header field if it does not know the server - will handle HTTP/1.1 (or later) requests; such knowledge can be in - the form of specific user configuration or by remembering the version - of a prior received response. - - Request messages that are prematurely terminated, possibly due to a - cancelled connection or a server-imposed time-out exception, MUST - result in closure of the connection; sending an HTTP/1.1 error - response prior to closing the connection is OPTIONAL. Response - messages that are prematurely terminated, usually by closure of the - connection prior to receiving the expected number of octets or by - failure to decode a transfer-encoded message-body, MUST be recorded - as incomplete. A user agent MUST NOT render an incomplete response - message-body as if it were complete (i.e., some indication must be - given to the user that an error occurred). Cache requirements for - incomplete responses are defined in Section 2.1.1 of [Part6]. - - A server MUST read the entire request message-body or close the - connection after sending its response, since otherwise the remaining - data on a persistent connection would be misinterpreted as the next - request. Likewise, a client MUST read the entire response message- - body if it intends to reuse the same connection for a subsequent - request. Pipelining multiple requests on a connection is described - in Section 7.1.2.2. - -3.4. General Header Fields - - There are a few header fields which have general applicability for - both request and response messages, but which do not apply to the - payload being transferred. These header fields apply only to the - message being transmitted. - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 25] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - general-header = Cache-Control ; [Part6], Section 3.2 - / Connection ; Section 9.1 - / Date ; Section 9.3 - / Pragma ; [Part6], Section 3.4 - / Trailer ; Section 9.6 - / Transfer-Encoding ; Section 9.7 - / Upgrade ; Section 9.8 - / Via ; Section 9.9 - / Warning ; [Part6], Section 3.6 - / MIME-Version ; [Part3], Appendix A.1 - - General-header field names can be extended reliably only in - combination with a change in the protocol version. However, new or - experimental header fields might be given the semantics of general - header fields if all parties in the communication recognize them to - be general-header fields. - -4. Request - - A request message from a client to a server includes, within the - first line of that message, the method to be applied to the resource, - the identifier of the resource, and the protocol version in use. - - Request = Request-Line ; Section 4.1 - *( header-field CRLF ) ; Section 3.2 - CRLF - [ message-body ] ; Section 3.3 - -4.1. Request-Line - - The Request-Line begins with a method token, followed by the request- - target and the protocol version, and ending with CRLF. The elements - are separated by SP characters. No CR or LF is allowed except in the - final CRLF sequence. - - Request-Line = Method SP request-target SP HTTP-Version CRLF - -4.1.1. Method - - The Method token indicates the method to be performed on the resource - identified by the request-target. The method is case-sensitive. - - Method = token - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 26] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -4.1.2. request-target - - The request-target identifies the resource upon which to apply the - request. - - request-target = "*" - / absolute-URI - / ( path-absolute [ "?" query ] ) - / authority - - The four options for request-target are dependent on the nature of - the request. - - The asterisk "*" means that the request does not apply to a - particular resource, but to the server itself, and is only allowed - when the method used does not necessarily apply to a resource. One - example would be - - OPTIONS * HTTP/1.1 - - The absolute-URI form is REQUIRED when the request is being made to a - proxy. The proxy is requested to forward the request or service it - from a valid cache, and return the response. Note that the proxy MAY - forward the request on to another proxy or directly to the server - specified by the absolute-URI. In order to avoid request loops, a - proxy MUST be able to recognize all of its server names, including - any aliases, local variations, and the numeric IP address. An - example Request-Line would be: - - GET http://www.example.org/pub/WWW/TheProject.html HTTP/1.1 - - To allow for transition to absolute-URIs in all requests in future - versions of HTTP, all HTTP/1.1 servers MUST accept the absolute-URI - form in requests, even though HTTP/1.1 clients will only generate - them in requests to proxies. - - The authority form is only used by the CONNECT method (Section 7.9 of - [Part2]). - - The most common form of request-target is that used to identify a - resource on an origin server or gateway. In this case the absolute - path of the URI MUST be transmitted (see Section 2.6.1, path- - absolute) as the request-target, and the network location of the URI - (authority) MUST be transmitted in a Host header field. For example, - a client wishing to retrieve the resource above directly from the - origin server would create a TCP connection to port 80 of the host - "www.example.org" and send the lines: - - - - -Fielding, et al. Expires February 5, 2011 [Page 27] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - GET /pub/WWW/TheProject.html HTTP/1.1 - Host: www.example.org - - followed by the remainder of the Request. Note that the absolute - path cannot be empty; if none is present in the original URI, it MUST - be given as "/" (the server root). - - If a proxy receives a request without any path in the request-target - and the method specified is capable of supporting the asterisk form - of request-target, then the last proxy on the request chain MUST - forward the request with "*" as the final request-target. - - For example, the request - - OPTIONS http://www.example.org:8001 HTTP/1.1 - - would be forwarded by the proxy as - - OPTIONS * HTTP/1.1 - Host: www.example.org:8001 - - after connecting to port 8001 of host "www.example.org". - - The request-target is transmitted in the format specified in - Section 2.6.1. If the request-target is percent-encoded ([RFC3986], - Section 2.1), the origin server MUST decode the request-target in - order to properly interpret the request. Servers SHOULD respond to - invalid request-targets with an appropriate status code. - - A transparent proxy MUST NOT rewrite the "path-absolute" part of the - received request-target when forwarding it to the next inbound - server, except as noted above to replace a null path-absolute with - "/" or "*". - - Note: The "no rewrite" rule prevents the proxy from changing the - meaning of the request when the origin server is improperly using - a non-reserved URI character for a reserved purpose. Implementors - need to be aware that some pre-HTTP/1.1 proxies have been known to - rewrite the request-target. - - HTTP does not place a pre-defined limit on the length of a request- - target. A server MUST be prepared to receive URIs of unbounded - length and respond with the 414 (URI Too Long) status code if the - received request-target would be longer than the server wishes to - handle (see Section 8.4.15 of [Part2]). - - Various ad-hoc limitations on request-target length are found in - practice. It is RECOMMENDED that all HTTP senders and recipients - - - -Fielding, et al. Expires February 5, 2011 [Page 28] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - support request-target lengths of 8000 or more octets. - - Note: Fragments ([RFC3986], Section 3.5) are not part of the - request-target and thus will not be transmitted in an HTTP - request. - -4.2. The Resource Identified by a Request - - The exact resource identified by an Internet request is determined by - examining both the request-target and the Host header field. - - An origin server that does not allow resources to differ by the - requested host MAY ignore the Host header field value when - determining the resource identified by an HTTP/1.1 request. (But see - Appendix B.1.1 for other requirements on Host support in HTTP/1.1.) - - An origin server that does differentiate resources based on the host - requested (sometimes referred to as virtual hosts or vanity host - names) MUST use the following rules for determining the requested - resource on an HTTP/1.1 request: - - 1. If request-target is an absolute-URI, the host is part of the - request-target. Any Host header field value in the request MUST - be ignored. - - 2. If the request-target is not an absolute-URI, and the request - includes a Host header field, the host is determined by the Host - header field value. - - 3. If the host as determined by rule 1 or 2 is not a valid host on - the server, the response MUST be a 400 (Bad Request) error - message. - - Recipients of an HTTP/1.0 request that lacks a Host header field MAY - attempt to use heuristics (e.g., examination of the URI path for - something unique to a particular host) in order to determine what - exact resource is being requested. - -4.3. Effective Request URI - - HTTP requests often do not carry the absolute URI ([RFC3986], Section - 4.3) for the target resource; instead, the URI needs to be inferred - from the request-target, Host header field, and connection context. - The result of this process is called the "effective request URI". - The "target resource" is the resource identified by the effective - request URI. - - If the request-target is an absolute-URI, then the effective request - - - -Fielding, et al. Expires February 5, 2011 [Page 29] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - URI is the request-target. - - If the request-target uses the path-absolute (plus optional query) - syntax or if it is just the asterisk "*", then the effective request - URI is constructed by concatenating - - o the scheme name: "http" if the request was received over an - insecure TCP connection, or "https" when received over a SSL/ - TLS-secured TCP connection, - - o the character sequence "://", - - o the authority component, as specified in the Host header - (Section 9.4) and determined by the rules in Section 4.2, - [[effrequri-nohost: Do we need to include the handling of missing - hosts in HTTP/1.0 messages, as described in Section 4.2? -- See - <http://tools.ietf.org/wg/httpbis/trac/ticket/221> --jre]] and - - o the request-target obtained from the Request-Line, unless the - request-target is just the asterisk "*". - - Otherwise, when request-target uses the authority form, the effective - Request URI is undefined. - - Example 1: the effective request URI for the message - - GET /pub/WWW/TheProject.html HTTP/1.1 - Host: www.example.org:8080 - - (received over an insecure TCP connection) is "http", plus "://", - plus the authority component "www.example.org:8080", plus the - request-target "/pub/WWW/TheProject.html", thus - "http://www.example.org:8080/pub/WWW/TheProject.html". - - Example 2: the effective request URI for the message - - GET * HTTP/1.1 - Host: www.example.org - - (received over an SSL/TLS secured TCP connection) is "https", plus - "://", plus the authority component "www.example.org", thus - "https://www.example.org". - - Effective request URIs are compared using the rules described in - Section 2.6.3, except that empty path components MUST NOT be treated - as equivalent to an absolute path of "/". - - - - - -Fielding, et al. Expires February 5, 2011 [Page 30] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -5. Response - - After receiving and interpreting a request message, a server responds - with an HTTP response message. - - Response = Status-Line ; Section 5.1 - *( header-field CRLF ) ; Section 3.2 - CRLF - [ message-body ] ; Section 3.3 - -5.1. Status-Line - - The first line of a Response message is the Status-Line, consisting - of the protocol version followed by a numeric status code and its - associated textual phrase, with each element separated by SP - characters. No CR or LF is allowed except in the final CRLF - sequence. - - Status-Line = HTTP-Version SP Status-Code SP Reason-Phrase CRLF - -5.1.1. Status Code and Reason Phrase - - The Status-Code element is a 3-digit integer result code of the - attempt to understand and satisfy the request. These codes are fully - defined in Section 8 of [Part2]. The Reason Phrase exists for the - sole purpose of providing a textual description associated with the - numeric status code, out of deference to earlier Internet application - protocols that were more frequently used with interactive text - clients. A client SHOULD ignore the content of the Reason Phrase. - - The first digit of the Status-Code defines the class of response. - The last two digits do not have any categorization role. There are 5 - values for the first digit: - - o 1xx: Informational - Request received, continuing process - - o 2xx: Success - The action was successfully received, understood, - and accepted - - o 3xx: Redirection - Further action must be taken in order to - complete the request - - o 4xx: Client Error - The request contains bad syntax or cannot be - fulfilled - - o 5xx: Server Error - The server failed to fulfill an apparently - valid request - - - - -Fielding, et al. Expires February 5, 2011 [Page 31] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Status-Code = 3DIGIT - Reason-Phrase = *( WSP / VCHAR / obs-text ) - -6. Protocol Parameters - -6.1. Date/Time Formats: Full Date - - HTTP applications have historically allowed three different formats - for date/time stamps. However, the preferred format is a fixed- - length subset of that defined by [RFC1123]: - - Sun, 06 Nov 1994 08:49:37 GMT ; RFC 1123 - - The other formats are described here only for compatibility with - obsolete implementations. - - Sunday, 06-Nov-94 08:49:37 GMT ; obsolete RFC 850 format - Sun Nov 6 08:49:37 1994 ; ANSI C's asctime() format - - HTTP/1.1 clients and servers that parse a date value MUST accept all - three formats (for compatibility with HTTP/1.0), though they MUST - only generate the RFC 1123 format for representing HTTP-date values - in header fields. See Appendix A for further information. - - All HTTP date/time stamps MUST be represented in Greenwich Mean Time - (GMT), without exception. For the purposes of HTTP, GMT is exactly - equal to UTC (Coordinated Universal Time). This is indicated in the - first two formats by the inclusion of "GMT" as the three-letter - abbreviation for time zone, and MUST be assumed when reading the - asctime format. HTTP-date is case sensitive and MUST NOT include - additional whitespace beyond that specifically included as SP in the - grammar. - - HTTP-date = rfc1123-date / obs-date - - Preferred format: - - - - - - - - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 32] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - rfc1123-date = day-name "," SP date1 SP time-of-day SP GMT - - day-name = %x4D.6F.6E ; "Mon", case-sensitive - / %x54.75.65 ; "Tue", case-sensitive - / %x57.65.64 ; "Wed", case-sensitive - / %x54.68.75 ; "Thu", case-sensitive - / %x46.72.69 ; "Fri", case-sensitive - / %x53.61.74 ; "Sat", case-sensitive - / %x53.75.6E ; "Sun", case-sensitive - - date1 = day SP month SP year - ; e.g., 02 Jun 1982 - - day = 2DIGIT - month = %x4A.61.6E ; "Jan", case-sensitive - / %x46.65.62 ; "Feb", case-sensitive - / %x4D.61.72 ; "Mar", case-sensitive - / %x41.70.72 ; "Apr", case-sensitive - / %x4D.61.79 ; "May", case-sensitive - / %x4A.75.6E ; "Jun", case-sensitive - / %x4A.75.6C ; "Jul", case-sensitive - / %x41.75.67 ; "Aug", case-sensitive - / %x53.65.70 ; "Sep", case-sensitive - / %x4F.63.74 ; "Oct", case-sensitive - / %x4E.6F.76 ; "Nov", case-sensitive - / %x44.65.63 ; "Dec", case-sensitive - year = 4DIGIT - - GMT = %x47.4D.54 ; "GMT", case-sensitive - - time-of-day = hour ":" minute ":" second - ; 00:00:00 - 23:59:59 - - hour = 2DIGIT - minute = 2DIGIT - second = 2DIGIT - - The semantics of day-name, day, month, year, and time-of-day are the - same as those defined for the RFC 5322 constructs with the - corresponding name ([RFC5322], Section 3.3). - - Obsolete formats: - - obs-date = rfc850-date / asctime-date - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 33] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - rfc850-date = day-name-l "," SP date2 SP time-of-day SP GMT - date2 = day "-" month "-" 2DIGIT - ; day-month-year (e.g., 02-Jun-82) - - day-name-l = %x4D.6F.6E.64.61.79 ; "Monday", case-sensitive - / %x54.75.65.73.64.61.79 ; "Tuesday", case-sensitive - / %x57.65.64.6E.65.73.64.61.79 ; "Wednesday", case-sensitive - / %x54.68.75.72.73.64.61.79 ; "Thursday", case-sensitive - / %x46.72.69.64.61.79 ; "Friday", case-sensitive - / %x53.61.74.75.72.64.61.79 ; "Saturday", case-sensitive - / %x53.75.6E.64.61.79 ; "Sunday", case-sensitive - - - asctime-date = day-name SP date3 SP time-of-day SP year - date3 = month SP ( 2DIGIT / ( SP 1DIGIT )) - ; month day (e.g., Jun 2) - - Note: Recipients of date values are encouraged to be robust in - accepting date values that might have been sent by non-HTTP - applications, as is sometimes the case when retrieving or posting - messages via proxies/gateways to SMTP or NNTP. - - Note: HTTP requirements for the date/time stamp format apply only - to their usage within the protocol stream. Clients and servers - are not required to use these formats for user presentation, - request logging, etc. - -6.2. Transfer Codings - - Transfer-coding values are used to indicate an encoding - transformation that has been, can be, or might need to be applied to - a payload body in order to ensure "safe transport" through the - network. This differs from a content coding in that the transfer- - coding is a property of the message rather than a property of the - representation that is being transferred. - - transfer-coding = "chunked" ; Section 6.2.1 - / "compress" ; Section 6.2.2.1 - / "deflate" ; Section 6.2.2.2 - / "gzip" ; Section 6.2.2.3 - / transfer-extension - transfer-extension = token *( OWS ";" OWS transfer-parameter ) - - Parameters are in the form of attribute/value pairs. - - transfer-parameter = attribute BWS "=" BWS value - attribute = token - value = word - - - -Fielding, et al. Expires February 5, 2011 [Page 34] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - All transfer-coding values are case-insensitive. HTTP/1.1 uses - transfer-coding values in the TE header field (Section 9.5) and in - the Transfer-Encoding header field (Section 9.7). - - Transfer-codings are analogous to the Content-Transfer-Encoding - values of MIME, which were designed to enable safe transport of - binary data over a 7-bit transport service ([RFC2045], Section 6). - However, safe transport has a different focus for an 8bit-clean - transfer protocol. In HTTP, the only unsafe characteristic of - message-bodies is the difficulty in determining the exact message - body length (Section 3.3), or the desire to encrypt data over a - shared transport. - - A server that receives a request message with a transfer-coding it - does not understand SHOULD respond with 501 (Not Implemented) and - then close the connection. A server MUST NOT send transfer-codings - to an HTTP/1.0 client. - -6.2.1. Chunked Transfer Coding - - The chunked encoding modifies the body of a message in order to - transfer it as a series of chunks, each with its own size indicator, - followed by an OPTIONAL trailer containing header fields. This - allows dynamically produced content to be transferred along with the - information necessary for the recipient to verify that it has - received the full message. - - Chunked-Body = *chunk - last-chunk - trailer-part - CRLF - - chunk = chunk-size *WSP [ chunk-ext ] CRLF - chunk-data CRLF - chunk-size = 1*HEXDIG - last-chunk = 1*("0") *WSP [ chunk-ext ] CRLF - - chunk-ext = *( ";" *WSP chunk-ext-name - [ "=" chunk-ext-val ] *WSP ) - chunk-ext-name = token - chunk-ext-val = token / quoted-str-nf - chunk-data = 1*OCTET ; a sequence of chunk-size octets - trailer-part = *( header-field CRLF ) - - quoted-str-nf = DQUOTE *( qdtext-nf / quoted-pair ) DQUOTE - ; like quoted-string, but disallowing line folding - qdtext-nf = WSP / %x21 / %x23-5B / %x5D-7E / obs-text - ; WSP / <VCHAR except DQUOTE and "\"> / obs-text - - - -Fielding, et al. Expires February 5, 2011 [Page 35] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - The chunk-size field is a string of hex digits indicating the size of - the chunk-data in octets. The chunked encoding is ended by any chunk - whose size is zero, followed by the trailer, which is terminated by - an empty line. - - The trailer allows the sender to include additional HTTP header - fields at the end of the message. The Trailer header field can be - used to indicate which header fields are included in a trailer (see - Section 9.6). - - A server using chunked transfer-coding in a response MUST NOT use the - trailer for any header fields unless at least one of the following is - true: - - 1. the request included a TE header field that indicates "trailers" - is acceptable in the transfer-coding of the response, as - described in Section 9.5; or, - - 2. the server is the origin server for the response, the trailer - fields consist entirely of optional metadata, and the recipient - could use the message (in a manner acceptable to the origin - server) without receiving this metadata. In other words, the - origin server is willing to accept the possibility that the - trailer fields might be silently discarded along the path to the - client. - - This requirement prevents an interoperability failure when the - message is being received by an HTTP/1.1 (or later) proxy and - forwarded to an HTTP/1.0 recipient. It avoids a situation where - compliance with the protocol would have necessitated a possibly - infinite buffer on the proxy. - - A process for decoding the "chunked" transfer-coding can be - represented in pseudo-code as: - - - - - - - - - - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 36] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - length := 0 - read chunk-size, chunk-ext (if any) and CRLF - while (chunk-size > 0) { - read chunk-data and CRLF - append chunk-data to decoded-body - length := length + chunk-size - read chunk-size and CRLF - } - read header-field - while (header-field not empty) { - append header-field to existing header fields - read header-field - } - Content-Length := length - Remove "chunked" from Transfer-Encoding - - All HTTP/1.1 applications MUST be able to receive and decode the - "chunked" transfer-coding and MUST ignore chunk-ext extensions they - do not understand. - - Since "chunked" is the only transfer-coding required to be understood - by HTTP/1.1 recipients, it plays a crucial role in delimiting - messages on a persistent connection. Whenever a transfer-coding is - applied to a payload body in a request, the final transfer-coding - applied MUST be "chunked". If a transfer-coding is applied to a - response payload body, then either the final transfer-coding applied - MUST be "chunked" or the message MUST be terminated by closing the - connection. When the "chunked" transfer-coding is used, it MUST be - the last transfer-coding applied to form the message-body. The - "chunked" transfer-coding MUST NOT be applied more than once in a - message-body. - -6.2.2. Compression Codings - - The codings defined below can be used to compress the payload of a - message. - - Note: Use of program names for the identification of encoding - formats is not desirable and is discouraged for future encodings. - Their use here is representative of historical practice, not good - design. - - Note: For compatibility with previous implementations of HTTP, - applications SHOULD consider "x-gzip" and "x-compress" to be - equivalent to "gzip" and "compress" respectively. - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 37] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -6.2.2.1. Compress Coding - - The "compress" format is produced by the common UNIX file compression - program "compress". This format is an adaptive Lempel-Ziv-Welch - coding (LZW). - -6.2.2.2. Deflate Coding - - The "deflate" format is defined as the "deflate" compression - mechanism (described in [RFC1951]) used inside the "zlib" data format - ([RFC1950]). - - Note: Some incorrect implementations send the "deflate" compressed - data without the zlib wrapper. - -6.2.2.3. Gzip Coding - - The "gzip" format is produced by the file compression program "gzip" - (GNU zip), as described in [RFC1952]. This format is a Lempel-Ziv - coding (LZ77) with a 32 bit CRC. - -6.2.3. Transfer Coding Registry - - The HTTP Transfer Coding Registry defines the name space for the - transfer coding names. - - Registrations MUST include the following fields: - - o Name - - o Description - - o Pointer to specification text - - Names of transfer codings MUST NOT overlap with names of content - codings (Section 2.2 of [Part3]), unless the encoding transformation - is identical (as it is the case for the compression codings defined - in Section 6.2.2). - - Values to be added to this name space require a specification (see - "Specification Required" in Section 4.1 of [RFC5226]), and MUST - conform to the purpose of transfer coding defined in this section. - - The registry itself is maintained at - <http://www.iana.org/assignments/http-parameters>. - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 38] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -6.3. Product Tokens - - Product tokens are used to allow communicating applications to - identify themselves by software name and version. Most fields using - product tokens also allow sub-products which form a significant part - of the application to be listed, separated by whitespace. By - convention, the products are listed in order of their significance - for identifying the application. - - product = token ["/" product-version] - product-version = token - - Examples: - - User-Agent: CERN-LineMode/2.15 libwww/2.17b3 - Server: Apache/0.8.4 - - Product tokens SHOULD be short and to the point. They MUST NOT be - used for advertising or other non-essential information. Although - any token character MAY appear in a product-version, this token - SHOULD only be used for a version identifier (i.e., successive - versions of the same product SHOULD only differ in the product- - version portion of the product value). - -6.4. Quality Values - - Both transfer codings (TE request header, Section 9.5) and content - negotiation (Section 5 of [Part3]) use short "floating point" numbers - to indicate the relative importance ("weight") of various negotiable - parameters. A weight is normalized to a real number in the range 0 - through 1, where 0 is the minimum and 1 the maximum value. If a - parameter has a quality value of 0, then content with this parameter - is "not acceptable" for the client. HTTP/1.1 applications MUST NOT - generate more than three digits after the decimal point. User - configuration of these values SHOULD also be limited in this fashion. - - qvalue = ( "0" [ "." 0*3DIGIT ] ) - / ( "1" [ "." 0*3("0") ] ) - - Note: "Quality values" is a misnomer, since these values merely - represent relative degradation in desired quality. - -7. Connections - -7.1. Persistent Connections - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 39] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -7.1.1. Purpose - - Prior to persistent connections, a separate TCP connection was - established to fetch each URL, increasing the load on HTTP servers - and causing congestion on the Internet. The use of inline images and - other associated data often requires a client to make multiple - requests of the same server in a short amount of time. Analysis of - these performance problems and results from a prototype - implementation are available [Pad1995] [Spe]. Implementation - experience and measurements of actual HTTP/1.1 implementations show - good results [Nie1997]. Alternatives have also been explored, for - example, T/TCP [Tou1998]. - - Persistent HTTP connections have a number of advantages: - - o By opening and closing fewer TCP connections, CPU time is saved in - routers and hosts (clients, servers, proxies, gateways, tunnels, - or caches), and memory used for TCP protocol control blocks can be - saved in hosts. - - o HTTP requests and responses can be pipelined on a connection. - Pipelining allows a client to make multiple requests without - waiting for each response, allowing a single TCP connection to be - used much more efficiently, with much lower elapsed time. - - o Network congestion is reduced by reducing the number of packets - caused by TCP opens, and by allowing TCP sufficient time to - determine the congestion state of the network. - - o Latency on subsequent requests is reduced since there is no time - spent in TCP's connection opening handshake. - - o HTTP can evolve more gracefully, since errors can be reported - without the penalty of closing the TCP connection. Clients using - future versions of HTTP might optimistically try a new feature, - but if communicating with an older server, retry with old - semantics after an error is reported. - - HTTP implementations SHOULD implement persistent connections. - -7.1.2. Overall Operation - - A significant difference between HTTP/1.1 and earlier versions of - HTTP is that persistent connections are the default behavior of any - HTTP connection. That is, unless otherwise indicated, the client - SHOULD assume that the server will maintain a persistent connection, - even after error responses from the server. - - - - -Fielding, et al. Expires February 5, 2011 [Page 40] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Persistent connections provide a mechanism by which a client and a - server can signal the close of a TCP connection. This signaling - takes place using the Connection header field (Section 9.1). Once a - close has been signaled, the client MUST NOT send any more requests - on that connection. - -7.1.2.1. Negotiation - - An HTTP/1.1 server MAY assume that a HTTP/1.1 client intends to - maintain a persistent connection unless a Connection header including - the connection-token "close" was sent in the request. If the server - chooses to close the connection immediately after sending the - response, it SHOULD send a Connection header including the - connection-token "close". - - An HTTP/1.1 client MAY expect a connection to remain open, but would - decide to keep it open based on whether the response from a server - contains a Connection header with the connection-token close. In - case the client does not want to maintain a connection for more than - that request, it SHOULD send a Connection header including the - connection-token close. - - If either the client or the server sends the close token in the - Connection header, that request becomes the last one for the - connection. - - Clients and servers SHOULD NOT assume that a persistent connection is - maintained for HTTP versions less than 1.1 unless it is explicitly - signaled. See Appendix B.2 for more information on backward - compatibility with HTTP/1.0 clients. - - In order to remain persistent, all messages on the connection MUST - have a self-defined message length (i.e., one not defined by closure - of the connection), as described in Section 3.3. - -7.1.2.2. Pipelining - - A client that supports persistent connections MAY "pipeline" its - requests (i.e., send multiple requests without waiting for each - response). A server MUST send its responses to those requests in the - same order that the requests were received. - - Clients which assume persistent connections and pipeline immediately - after connection establishment SHOULD be prepared to retry their - connection if the first pipelined attempt fails. If a client does - such a retry, it MUST NOT pipeline before it knows the connection is - persistent. Clients MUST also be prepared to resend their requests - if the server closes the connection before sending all of the - - - -Fielding, et al. Expires February 5, 2011 [Page 41] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - corresponding responses. - - Clients SHOULD NOT pipeline requests using non-idempotent methods or - non-idempotent sequences of methods (see Section 7.1.2 of [Part2]). - Otherwise, a premature termination of the transport connection could - lead to indeterminate results. A client wishing to send a non- - idempotent request SHOULD wait to send that request until it has - received the response status line for the previous request. - -7.1.3. Proxy Servers - - It is especially important that proxies correctly implement the - properties of the Connection header field as specified in - Section 9.1. - - The proxy server MUST signal persistent connections separately with - its clients and the origin servers (or other proxy servers) that it - connects to. Each persistent connection applies to only one - transport link. - - A proxy server MUST NOT establish a HTTP/1.1 persistent connection - with an HTTP/1.0 client (but see Section 19.7.1 of [RFC2068] for - information and discussion of the problems with the Keep-Alive header - implemented by many HTTP/1.0 clients). - -7.1.3.1. End-to-end and Hop-by-hop Headers - - For the purpose of defining the behavior of caches and non-caching - proxies, we divide HTTP headers into two categories: - - o End-to-end headers, which are transmitted to the ultimate - recipient of a request or response. End-to-end headers in - responses MUST be stored as part of a cache entry and MUST be - transmitted in any response formed from a cache entry. - - o Hop-by-hop headers, which are meaningful only for a single - transport-level connection, and are not stored by caches or - forwarded by proxies. - - The following HTTP/1.1 headers are hop-by-hop headers: - - o Connection - - o Keep-Alive - - o Proxy-Authenticate - - - - - -Fielding, et al. Expires February 5, 2011 [Page 42] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - o Proxy-Authorization - - o TE - - o Trailer - - o Transfer-Encoding - - o Upgrade - - All other headers defined by HTTP/1.1 are end-to-end headers. - - Other hop-by-hop headers MUST be listed in a Connection header - (Section 9.1). - -7.1.3.2. Non-modifiable Headers - - Some features of HTTP/1.1, such as Digest Authentication, depend on - the value of certain end-to-end headers. A transparent proxy SHOULD - NOT modify an end-to-end header unless the definition of that header - requires or specifically allows that. - - A transparent proxy MUST NOT modify any of the following fields in a - request or response, and it MUST NOT add any of these fields if not - already present: - - o Content-Location - - o Content-MD5 - - o ETag - - o Last-Modified - - A transparent proxy MUST NOT modify any of the following fields in a - response: - - o Expires - - but it MAY add any of these fields if not already present. If an - Expires header is added, it MUST be given a field-value identical to - that of the Date header in that response. - - A proxy MUST NOT modify or add any of the following fields in a - message that contains the no-transform cache-control directive, or in - any request: - - - - - -Fielding, et al. Expires February 5, 2011 [Page 43] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - o Content-Encoding - - o Content-Range - - o Content-Type - - A non-transparent proxy MAY modify or add these fields to a message - that does not include no-transform, but if it does so, it MUST add a - Warning 214 (Transformation applied) if one does not already appear - in the message (see Section 3.6 of [Part6]). - - Warning: Unnecessary modification of end-to-end headers might - cause authentication failures if stronger authentication - mechanisms are introduced in later versions of HTTP. Such - authentication mechanisms MAY rely on the values of header fields - not listed here. - - A transparent proxy MUST preserve the message payload ([Part3]), - though it MAY change the message-body through application or removal - of a transfer-coding (Section 6.2). - -7.1.4. Practical Considerations - - Servers will usually have some time-out value beyond which they will - no longer maintain an inactive connection. Proxy servers might make - this a higher value since it is likely that the client will be making - more connections through the same server. The use of persistent - connections places no requirements on the length (or existence) of - this time-out for either the client or the server. - - When a client or server wishes to time-out it SHOULD issue a graceful - close on the transport connection. Clients and servers SHOULD both - constantly watch for the other side of the transport close, and - respond to it as appropriate. If a client or server does not detect - the other side's close promptly it could cause unnecessary resource - drain on the network. - - A client, server, or proxy MAY close the transport connection at any - time. For example, a client might have started to send a new request - at the same time that the server has decided to close the "idle" - connection. From the server's point of view, the connection is being - closed while it was idle, but from the client's point of view, a - request is in progress. - - This means that clients, servers, and proxies MUST be able to recover - from asynchronous close events. Client software SHOULD reopen the - transport connection and retransmit the aborted sequence of requests - without user interaction so long as the request sequence is - - - -Fielding, et al. Expires February 5, 2011 [Page 44] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - idempotent (see Section 7.1.2 of [Part2]). Non-idempotent methods or - sequences MUST NOT be automatically retried, although user agents MAY - offer a human operator the choice of retrying the request(s). - Confirmation by user-agent software with semantic understanding of - the application MAY substitute for user confirmation. The automatic - retry SHOULD NOT be repeated if the second sequence of requests - fails. - - Servers SHOULD always respond to at least one request per connection, - if at all possible. Servers SHOULD NOT close a connection in the - middle of transmitting a response, unless a network or client failure - is suspected. - - Clients (including proxies) SHOULD limit the number of simultaneous - connections that they maintain to a given server (including proxies). - - Previous revisions of HTTP gave a specific number of connections as a - ceiling, but this was found to be impractical for many applications. - As a result, this specification does not mandate a particular maximum - number of connections, but instead encourages clients to be - conservative when opening multiple connections. - - In particular, while using multiple connections avoids the "head-of- - line blocking" problem (whereby a request that takes significant - server-side processing and/or has a large payload can block - subsequent requests on the same connection), each connection used - consumes server resources (sometimes significantly), and furthermore - using multiple connections can cause undesirable side effects in - congested networks. - - Note that servers might reject traffic that they deem abusive, - including an excessive number of connections from a client. - -7.2. Message Transmission Requirements - -7.2.1. Persistent Connections and Flow Control - - HTTP/1.1 servers SHOULD maintain persistent connections and use TCP's - flow control mechanisms to resolve temporary overloads, rather than - terminating connections with the expectation that clients will retry. - The latter technique can exacerbate network congestion. - -7.2.2. Monitoring Connections for Error Status Messages - - An HTTP/1.1 (or later) client sending a message-body SHOULD monitor - the network connection for an error status code while it is - transmitting the request. If the client sees an error status code, - it SHOULD immediately cease transmitting the body. If the body is - - - -Fielding, et al. Expires February 5, 2011 [Page 45] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - being sent using a "chunked" encoding (Section 6.2), a zero length - chunk and empty trailer MAY be used to prematurely mark the end of - the message. If the body was preceded by a Content-Length header, - the client MUST close the connection. - -7.2.3. Use of the 100 (Continue) Status - - The purpose of the 100 (Continue) status code (see Section 8.1.1 of - [Part2]) is to allow a client that is sending a request message with - a request body to determine if the origin server is willing to accept - the request (based on the request headers) before the client sends - the request body. In some cases, it might either be inappropriate or - highly inefficient for the client to send the body if the server will - reject the message without looking at the body. - - Requirements for HTTP/1.1 clients: - - o If a client will wait for a 100 (Continue) response before sending - the request body, it MUST send an Expect request-header field - (Section 9.2 of [Part2]) with the "100-continue" expectation. - - o A client MUST NOT send an Expect request-header field (Section 9.2 - of [Part2]) with the "100-continue" expectation if it does not - intend to send a request body. - - Because of the presence of older implementations, the protocol allows - ambiguous situations in which a client might send "Expect: 100- - continue" without receiving either a 417 (Expectation Failed) or a - 100 (Continue) status code. Therefore, when a client sends this - header field to an origin server (possibly via a proxy) from which it - has never seen a 100 (Continue) status code, the client SHOULD NOT - wait for an indefinite period before sending the request body. - - Requirements for HTTP/1.1 origin servers: - - o Upon receiving a request which includes an Expect request-header - field with the "100-continue" expectation, an origin server MUST - either respond with 100 (Continue) status code and continue to - read from the input stream, or respond with a final status code. - The origin server MUST NOT wait for the request body before - sending the 100 (Continue) response. If it responds with a final - status code, it MAY close the transport connection or it MAY - continue to read and discard the rest of the request. It MUST NOT - perform the requested method if it returns a final status code. - - o An origin server SHOULD NOT send a 100 (Continue) response if the - request message does not include an Expect request-header field - with the "100-continue" expectation, and MUST NOT send a 100 - - - -Fielding, et al. Expires February 5, 2011 [Page 46] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - (Continue) response if such a request comes from an HTTP/1.0 (or - earlier) client. There is an exception to this rule: for - compatibility with [RFC2068], a server MAY send a 100 (Continue) - status code in response to an HTTP/1.1 PUT or POST request that - does not include an Expect request-header field with the "100- - continue" expectation. This exception, the purpose of which is to - minimize any client processing delays associated with an - undeclared wait for 100 (Continue) status code, applies only to - HTTP/1.1 requests, and not to requests with any other HTTP-version - value. - - o An origin server MAY omit a 100 (Continue) response if it has - already received some or all of the request body for the - corresponding request. - - o An origin server that sends a 100 (Continue) response MUST - ultimately send a final status code, once the request body is - received and processed, unless it terminates the transport - connection prematurely. - - o If an origin server receives a request that does not include an - Expect request-header field with the "100-continue" expectation, - the request includes a request body, and the server responds with - a final status code before reading the entire request body from - the transport connection, then the server SHOULD NOT close the - transport connection until it has read the entire request, or - until the client closes the connection. Otherwise, the client - might not reliably receive the response message. However, this - requirement is not be construed as preventing a server from - defending itself against denial-of-service attacks, or from badly - broken client implementations. - - Requirements for HTTP/1.1 proxies: - - o If a proxy receives a request that includes an Expect request- - header field with the "100-continue" expectation, and the proxy - either knows that the next-hop server complies with HTTP/1.1 or - higher, or does not know the HTTP version of the next-hop server, - it MUST forward the request, including the Expect header field. - - o If the proxy knows that the version of the next-hop server is - HTTP/1.0 or lower, it MUST NOT forward the request, and it MUST - respond with a 417 (Expectation Failed) status code. - - o Proxies SHOULD maintain a cache recording the HTTP version numbers - received from recently-referenced next-hop servers. - - - - - -Fielding, et al. Expires February 5, 2011 [Page 47] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - o A proxy MUST NOT forward a 100 (Continue) response if the request - message was received from an HTTP/1.0 (or earlier) client and did - not include an Expect request-header field with the "100-continue" - expectation. This requirement overrides the general rule for - forwarding of 1xx responses (see Section 8.1 of [Part2]). - -7.2.4. Client Behavior if Server Prematurely Closes Connection - - If an HTTP/1.1 client sends a request which includes a request body, - but which does not include an Expect request-header field with the - "100-continue" expectation, and if the client is not directly - connected to an HTTP/1.1 origin server, and if the client sees the - connection close before receiving a status line from the server, the - client SHOULD retry the request. If the client does retry this - request, it MAY use the following "binary exponential backoff" - algorithm to be assured of obtaining a reliable response: - - 1. Initiate a new connection to the server - - 2. Transmit the request-headers - - 3. Initialize a variable R to the estimated round-trip time to the - server (e.g., based on the time it took to establish the - connection), or to a constant value of 5 seconds if the round- - trip time is not available. - - 4. Compute T = R * (2**N), where N is the number of previous retries - of this request. - - 5. Wait either for an error response from the server, or for T - seconds (whichever comes first) - - 6. If no error response is received, after T seconds transmit the - body of the request. - - 7. If client sees that the connection is closed prematurely, repeat - from step 1 until the request is accepted, an error response is - received, or the user becomes impatient and terminates the retry - process. - - If at any point an error status code is received, the client - - o SHOULD NOT continue and - - o SHOULD close the connection if it has not completed sending the - request message. - - - - - -Fielding, et al. Expires February 5, 2011 [Page 48] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -8. Miscellaneous notes that might disappear - -8.1. Scheme aliases considered harmful - - [[TBD-aliases-harmful: describe why aliases like webcal are - harmful.]] - -8.2. Use of HTTP for proxy communication - - [[TBD-proxy-other: Configured to use HTTP to proxy HTTP or other - protocols.]] - -8.3. Interception of HTTP for access control - - [[TBD-intercept: Interception of HTTP traffic for initiating access - control.]] - -8.4. Use of HTTP by other protocols - - [[TBD-profiles: Profiles of HTTP defined by other protocol. - Extensions of HTTP like WebDAV.]] - -8.5. Use of HTTP by media type specification - - [[TBD-hypertext: Instructions on composing HTTP requests via - hypertext formats.]] - -9. Header Field Definitions - - This section defines the syntax and semantics of HTTP/1.1 header - fields related to message framing and transport protocols. - -9.1. Connection - - The "Connection" general-header field allows the sender to specify - options that are desired for that particular connection and MUST NOT - be communicated by proxies over further connections. - - The Connection header's value has the following grammar: - - Connection = "Connection" ":" OWS Connection-v - Connection-v = 1#connection-token - connection-token = token - - HTTP/1.1 proxies MUST parse the Connection header field before a - message is forwarded and, for each connection-token in this field, - remove any header field(s) from the message with the same name as the - connection-token. Connection options are signaled by the presence of - - - -Fielding, et al. Expires February 5, 2011 [Page 49] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - a connection-token in the Connection header field, not by any - corresponding additional header field(s), since the additional header - field might not be sent if there are no parameters associated with - that connection option. - - Message headers listed in the Connection header MUST NOT include end- - to-end headers, such as Cache-Control. - - HTTP/1.1 defines the "close" connection option for the sender to - signal that the connection will be closed after completion of the - response. For example, - - Connection: close - - in either the request or the response header fields indicates that - the connection SHOULD NOT be considered "persistent" (Section 7.1) - after the current request/response is complete. - - An HTTP/1.1 client that does not support persistent connections MUST - include the "close" connection option in every request message. - - An HTTP/1.1 server that does not support persistent connections MUST - include the "close" connection option in every response message that - does not have a 1xx (Informational) status code. - - A system receiving an HTTP/1.0 (or lower-version) message that - includes a Connection header MUST, for each connection-token in this - field, remove and ignore any header field(s) from the message with - the same name as the connection-token. This protects against - mistaken forwarding of such header fields by pre-HTTP/1.1 proxies. - See Appendix B.2. - -9.2. Content-Length - - The "Content-Length" header field indicates the size of the message- - body, in decimal number of octets, for any message other than a - response to the HEAD method or a response with a status code of 304. - In the case of responses to the HEAD method, it indicates the size of - the payload body (not including any potential transfer-coding) that - would have been sent had the request been a GET. In the case of the - 304 (Not Modified) response, it indicates the size of the payload - body (not including any potential transfer-coding) that would have - been sent in a 200 (OK) response. - - Content-Length = "Content-Length" ":" OWS 1*Content-Length-v - Content-Length-v = 1*DIGIT - - An example is - - - -Fielding, et al. Expires February 5, 2011 [Page 50] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Content-Length: 3495 - - Implementations SHOULD use this field to indicate the message-body - length when no transfer-coding is being applied and the payload's - body length can be determined prior to being transferred. - Section 3.3 describes how recipients determine the length of a - message-body. - - Any Content-Length greater than or equal to zero is a valid value. - - Note that the use of this field in HTTP is significantly different - from the corresponding definition in MIME, where it is an optional - field used within the "message/external-body" content-type. - -9.3. Date - - The "Date" general-header field represents the date and time at which - the message was originated, having the same semantics as the - Origination Date Field (orig-date) defined in Section 3.6.1 of - [RFC5322]. The field value is an HTTP-date, as described in - Section 6.1; it MUST be sent in rfc1123-date format. - - Date = "Date" ":" OWS Date-v - Date-v = HTTP-date - - An example is - - Date: Tue, 15 Nov 1994 08:12:31 GMT - - Origin servers MUST include a Date header field in all responses, - except in these cases: - - 1. If the response status code is 100 (Continue) or 101 (Switching - Protocols), the response MAY include a Date header field, at the - server's option. - - 2. If the response status code conveys a server error, e.g., 500 - (Internal Server Error) or 503 (Service Unavailable), and it is - inconvenient or impossible to generate a valid Date. - - 3. If the server does not have a clock that can provide a reasonable - approximation of the current time, its responses MUST NOT include - a Date header field. In this case, the rules in Section 9.3.1 - MUST be followed. - - A received message that does not have a Date header field MUST be - assigned one by the recipient if the message will be cached by that - recipient or gatewayed via a protocol which requires a Date. An HTTP - - - -Fielding, et al. Expires February 5, 2011 [Page 51] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - implementation without a clock MUST NOT cache responses without - revalidating them on every use. An HTTP cache, especially a shared - cache, SHOULD use a mechanism, such as NTP [RFC1305], to synchronize - its clock with a reliable external standard. - - Clients SHOULD only send a Date header field in messages that include - a payload, as is usually the case for PUT and POST requests, and even - then it is optional. A client without a clock MUST NOT send a Date - header field in a request. - - The HTTP-date sent in a Date header SHOULD NOT represent a date and - time subsequent to the generation of the message. It SHOULD - represent the best available approximation of the date and time of - message generation, unless the implementation has no means of - generating a reasonably accurate date and time. In theory, the date - ought to represent the moment just before the payload is generated. - In practice, the date can be generated at any time during the message - origination without affecting its semantic value. - -9.3.1. Clockless Origin Server Operation - - Some origin server implementations might not have a clock available. - An origin server without a clock MUST NOT assign Expires or Last- - Modified values to a response, unless these values were associated - with the resource by a system or user with a reliable clock. It MAY - assign an Expires value that is known, at or before server - configuration time, to be in the past (this allows "pre-expiration" - of responses without storing separate Expires values for each - resource). - -9.4. Host - - The "Host" request-header field specifies the Internet host and port - number of the resource being requested, allowing the origin server or - gateway to differentiate between internally-ambiguous URLs, such as - the root "/" URL of a server for multiple host names on a single IP - address. - - The Host field value MUST represent the naming authority of the - origin server or gateway given by the original URL obtained from the - user or referring resource (generally an http URI, as described in - Section 2.6.1). - - Host = "Host" ":" OWS Host-v - Host-v = uri-host [ ":" port ] ; Section 2.6.1 - - A "host" without any trailing port information implies the default - port for the service requested (e.g., "80" for an HTTP URL). For - - - -Fielding, et al. Expires February 5, 2011 [Page 52] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - example, a request on the origin server for - <http://www.example.org/pub/WWW/> would properly include: - - GET /pub/WWW/ HTTP/1.1 - Host: www.example.org - - A client MUST include a Host header field in all HTTP/1.1 request - messages. If the requested URI does not include an Internet host - name for the service being requested, then the Host header field MUST - be given with an empty value. An HTTP/1.1 proxy MUST ensure that any - request message it forwards does contain an appropriate Host header - field that identifies the service being requested by the proxy. All - Internet-based HTTP/1.1 servers MUST respond with a 400 (Bad Request) - status code to any HTTP/1.1 request message which lacks a Host header - field. - - See Sections 4.2 and B.1.1 for other requirements relating to Host. - -9.5. TE - - The "TE" request-header field indicates what extension transfer- - codings it is willing to accept in the response, and whether or not - it is willing to accept trailer fields in a chunked transfer-coding. - - Its value consists of the keyword "trailers" and/or a comma-separated - list of extension transfer-coding names with optional accept - parameters (as described in Section 6.2). - - TE = "TE" ":" OWS TE-v - TE-v = #t-codings - t-codings = "trailers" / ( transfer-extension [ te-params ] ) - te-params = OWS ";" OWS "q=" qvalue *( te-ext ) - te-ext = OWS ";" OWS token [ "=" word ] - - The presence of the keyword "trailers" indicates that the client is - willing to accept trailer fields in a chunked transfer-coding, as - defined in Section 6.2.1. This keyword is reserved for use with - transfer-coding values even though it does not itself represent a - transfer-coding. - - Examples of its use are: - - TE: deflate - TE: - TE: trailers, deflate;q=0.5 - - The TE header field only applies to the immediate connection. - Therefore, the keyword MUST be supplied within a Connection header - - - -Fielding, et al. Expires February 5, 2011 [Page 53] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - field (Section 9.1) whenever TE is present in an HTTP/1.1 message. - - A server tests whether a transfer-coding is acceptable, according to - a TE field, using these rules: - - 1. The "chunked" transfer-coding is always acceptable. If the - keyword "trailers" is listed, the client indicates that it is - willing to accept trailer fields in the chunked response on - behalf of itself and any downstream clients. The implication is - that, if given, the client is stating that either all downstream - clients are willing to accept trailer fields in the forwarded - response, or that it will attempt to buffer the response on - behalf of downstream recipients. - - Note: HTTP/1.1 does not define any means to limit the size of a - chunked response such that a client can be assured of buffering - the entire response. - - 2. If the transfer-coding being tested is one of the transfer- - codings listed in the TE field, then it is acceptable unless it - is accompanied by a qvalue of 0. (As defined in Section 6.4, a - qvalue of 0 means "not acceptable".) - - 3. If multiple transfer-codings are acceptable, then the acceptable - transfer-coding with the highest non-zero qvalue is preferred. - The "chunked" transfer-coding always has a qvalue of 1. - - If the TE field-value is empty or if no TE field is present, the only - transfer-coding is "chunked". A message with no transfer-coding is - always acceptable. - -9.6. Trailer - - The "Trailer" general-header field indicates that the given set of - header fields is present in the trailer of a message encoded with - chunked transfer-coding. - - Trailer = "Trailer" ":" OWS Trailer-v - Trailer-v = 1#field-name - - An HTTP/1.1 message SHOULD include a Trailer header field in a - message using chunked transfer-coding with a non-empty trailer. - Doing so allows the recipient to know which header fields to expect - in the trailer. - - If no Trailer header field is present, the trailer SHOULD NOT include - any header fields. See Section 6.2.1 for restrictions on the use of - trailer fields in a "chunked" transfer-coding. - - - -Fielding, et al. Expires February 5, 2011 [Page 54] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Message header fields listed in the Trailer header field MUST NOT - include the following header fields: - - o Transfer-Encoding - - o Content-Length - - o Trailer - -9.7. Transfer-Encoding - - The "Transfer-Encoding" general-header field indicates what transfer- - codings (if any) have been applied to the message body. It differs - from Content-Encoding (Section 2.2 of [Part3]) in that transfer- - codings are a property of the message (and therefore are removed by - intermediaries), whereas content-codings are not. - - Transfer-Encoding = "Transfer-Encoding" ":" OWS - Transfer-Encoding-v - Transfer-Encoding-v = 1#transfer-coding - - Transfer-codings are defined in Section 6.2. An example is: - - Transfer-Encoding: chunked - - If multiple encodings have been applied to a representation, the - transfer-codings MUST be listed in the order in which they were - applied. Additional information about the encoding parameters MAY be - provided by other header fields not defined by this specification. - - Many older HTTP/1.0 applications do not understand the Transfer- - Encoding header. - -9.8. Upgrade - - The "Upgrade" general-header field allows the client to specify what - additional communication protocols it would like to use, if the - server chooses to switch protocols. Additionally, the server MUST - use the Upgrade header field within a 101 (Switching Protocols) - response to indicate which protocol(s) are being switched to. - - Upgrade = "Upgrade" ":" OWS Upgrade-v - Upgrade-v = 1#product - - For example, - - Upgrade: HTTP/2.0, SHTTP/1.3, IRC/6.9, RTA/x11 - - - - -Fielding, et al. Expires February 5, 2011 [Page 55] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - The Upgrade header field is intended to provide a simple mechanism - for transition from HTTP/1.1 to some other, incompatible protocol. - It does so by allowing the client to advertise its desire to use - another protocol, such as a later version of HTTP with a higher major - version number, even though the current request has been made using - HTTP/1.1. This eases the difficult transition between incompatible - protocols by allowing the client to initiate a request in the more - commonly supported protocol while indicating to the server that it - would like to use a "better" protocol if available (where "better" is - determined by the server, possibly according to the nature of the - method and/or resource being requested). - - The Upgrade header field only applies to switching application-layer - protocols upon the existing transport-layer connection. Upgrade - cannot be used to insist on a protocol change; its acceptance and use - by the server is optional. The capabilities and nature of the - application-layer communication after the protocol change is entirely - dependent upon the new protocol chosen, although the first action - after changing the protocol MUST be a response to the initial HTTP - request containing the Upgrade header field. - - The Upgrade header field only applies to the immediate connection. - Therefore, the upgrade keyword MUST be supplied within a Connection - header field (Section 9.1) whenever Upgrade is present in an HTTP/1.1 - message. - - The Upgrade header field cannot be used to indicate a switch to a - protocol on a different connection. For that purpose, it is more - appropriate to use a 301, 302, 303, or 305 redirection response. - - This specification only defines the protocol name "HTTP" for use by - the family of Hypertext Transfer Protocols, as defined by the HTTP - version rules of Section 2.5 and future updates to this - specification. Additional tokens can be registered with IANA using - the registration procedure defined below. - -9.8.1. Upgrade Token Registry - - The HTTP Upgrade Token Registry defines the name space for product - tokens used to identify protocols in the Upgrade header field. Each - registered token is associated with contact information and an - optional set of specifications that details how the connection will - be processed after it has been upgraded. - - Registrations are allowed on a First Come First Served basis as - described in Section 4.1 of [RFC5226]. The specifications need not - be IETF documents or be subject to IESG review. Registrations are - subject to the following rules: - - - -Fielding, et al. Expires February 5, 2011 [Page 56] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - 1. A token, once registered, stays registered forever. - - 2. The registration MUST name a responsible party for the - registration. - - 3. The registration MUST name a point of contact. - - 4. The registration MAY name a set of specifications associated with - that token. Such specifications need not be publicly available. - - 5. The responsible party MAY change the registration at any time. - The IANA will keep a record of all such changes, and make them - available upon request. - - 6. The responsible party for the first registration of a "product" - token MUST approve later registrations of a "version" token - together with that "product" token before they can be registered. - - 7. If absolutely required, the IESG MAY reassign the responsibility - for a token. This will normally only be used in the case when a - responsible party cannot be contacted. - -9.9. Via - - The "Via" general-header field MUST be used by gateways and proxies - to indicate the intermediate protocols and recipients between the - user agent and the server on requests, and between the origin server - and the client on responses. It is analogous to the "Received" field - defined in Section 3.6.7 of [RFC5322] and is intended to be used for - tracking message forwards, avoiding request loops, and identifying - the protocol capabilities of all senders along the request/response - chain. - - Via = "Via" ":" OWS Via-v - Via-v = 1#( received-protocol RWS received-by - [ RWS comment ] ) - received-protocol = [ protocol-name "/" ] protocol-version - protocol-name = token - protocol-version = token - received-by = ( uri-host [ ":" port ] ) / pseudonym - pseudonym = token - - The received-protocol indicates the protocol version of the message - received by the server or client along each segment of the request/ - response chain. The received-protocol version is appended to the Via - field value when the message is forwarded so that information about - the protocol capabilities of upstream applications remains visible to - all recipients. - - - -Fielding, et al. Expires February 5, 2011 [Page 57] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - The protocol-name is optional if and only if it would be "HTTP". The - received-by field is normally the host and optional port number of a - recipient server or client that subsequently forwarded the message. - However, if the real host is considered to be sensitive information, - it MAY be replaced by a pseudonym. If the port is not given, it MAY - be assumed to be the default port of the received-protocol. - - Multiple Via field values represent each proxy or gateway that has - forwarded the message. Each recipient MUST append its information - such that the end result is ordered according to the sequence of - forwarding applications. - - Comments MAY be used in the Via header field to identify the software - of the recipient proxy or gateway, analogous to the User-Agent and - Server header fields. However, all comments in the Via field are - optional and MAY be removed by any recipient prior to forwarding the - message. - - For example, a request message could be sent from an HTTP/1.0 user - agent to an internal proxy code-named "fred", which uses HTTP/1.1 to - forward the request to a public proxy at p.example.net, which - completes the request by forwarding it to the origin server at - www.example.com. The request received by www.example.com would then - have the following Via header field: - - Via: 1.0 fred, 1.1 p.example.net (Apache/1.1) - - Proxies and gateways used as a portal through a network firewall - SHOULD NOT, by default, forward the names and ports of hosts within - the firewall region. This information SHOULD only be propagated if - explicitly enabled. If not enabled, the received-by host of any host - behind the firewall SHOULD be replaced by an appropriate pseudonym - for that host. - - For organizations that have strong privacy requirements for hiding - internal structures, a proxy MAY combine an ordered subsequence of - Via header field entries with identical received-protocol values into - a single such entry. For example, - - Via: 1.0 ricky, 1.1 ethel, 1.1 fred, 1.0 lucy - - could be collapsed to - - Via: 1.0 ricky, 1.1 mertz, 1.0 lucy - - Applications SHOULD NOT combine multiple entries unless they are all - under the same organizational control and the hosts have already been - replaced by pseudonyms. Applications MUST NOT combine entries which - - - -Fielding, et al. Expires February 5, 2011 [Page 58] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - have different received-protocol values. - -10. IANA Considerations - -10.1. Header Field Registration - - The Message Header Field Registry located at <http://www.iana.org/ - assignments/message-headers/message-header-index.html> shall be - updated with the permanent registrations below (see [RFC3864]): - - +-------------------+----------+----------+-------------+ - | Header Field Name | Protocol | Status | Reference | - +-------------------+----------+----------+-------------+ - | Connection | http | standard | Section 9.1 | - | Content-Length | http | standard | Section 9.2 | - | Date | http | standard | Section 9.3 | - | Host | http | standard | Section 9.4 | - | TE | http | standard | Section 9.5 | - | Trailer | http | standard | Section 9.6 | - | Transfer-Encoding | http | standard | Section 9.7 | - | Upgrade | http | standard | Section 9.8 | - | Via | http | standard | Section 9.9 | - +-------------------+----------+----------+-------------+ - - The change controller is: "IETF (iesg@ietf.org) - Internet - Engineering Task Force". - -10.2. URI Scheme Registration - - The entries for the "http" and "https" URI Schemes in the registry - located at <http://www.iana.org/assignments/uri-schemes.html> shall - be updated to point to Sections 2.6.1 and 2.6.2 of this document (see - [RFC4395]). - -10.3. Internet Media Type Registrations - - This document serves as the specification for the Internet media - types "message/http" and "application/http". The following is to be - registered with IANA (see [RFC4288]). - -10.3.1. Internet Media Type message/http - - The message/http type can be used to enclose a single HTTP request or - response message, provided that it obeys the MIME restrictions for - all "message" types regarding line length and encodings. - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 59] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Type name: message - - Subtype name: http - - Required parameters: none - - Optional parameters: version, msgtype - - version: The HTTP-Version number of the enclosed message (e.g., - "1.1"). If not present, the version can be determined from the - first line of the body. - - msgtype: The message type -- "request" or "response". If not - present, the type can be determined from the first line of the - body. - - Encoding considerations: only "7bit", "8bit", or "binary" are - permitted - - Security considerations: none - - Interoperability considerations: none - - Published specification: This specification (see Section 10.3.1). - - Applications that use this media type: - - Additional information: - - Magic number(s): none - - File extension(s): none - - Macintosh file type code(s): none - - Person and email address to contact for further information: See - Authors Section. - - Intended usage: COMMON - - Restrictions on usage: none - - Author/Change controller: IESG - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 60] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -10.3.2. Internet Media Type application/http - - The application/http type can be used to enclose a pipeline of one or - more HTTP request or response messages (not intermixed). - - Type name: application - - Subtype name: http - - Required parameters: none - - Optional parameters: version, msgtype - - version: The HTTP-Version number of the enclosed messages (e.g., - "1.1"). If not present, the version can be determined from the - first line of the body. - - msgtype: The message type -- "request" or "response". If not - present, the type can be determined from the first line of the - body. - - Encoding considerations: HTTP messages enclosed by this type are in - "binary" format; use of an appropriate Content-Transfer-Encoding - is required when transmitted via E-mail. - - Security considerations: none - - Interoperability considerations: none - - Published specification: This specification (see Section 10.3.2). - - Applications that use this media type: - - Additional information: - - Magic number(s): none - - File extension(s): none - - Macintosh file type code(s): none - - Person and email address to contact for further information: See - Authors Section. - - Intended usage: COMMON - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 61] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Restrictions on usage: none - - Author/Change controller: IESG - -10.4. Transfer Coding Registry - - The registration procedure for HTTP Transfer Codings is now defined - by Section 6.2.3 of this document. - - The HTTP Transfer Codings Registry located at - <http://www.iana.org/assignments/http-parameters> shall be updated - with the registrations below: - - +----------+--------------------------------------+-----------------+ - | Name | Description | Reference | - +----------+--------------------------------------+-----------------+ - | chunked | Transfer in a series of chunks | Section 6.2.1 | - | compress | UNIX "compress" program method | Section 6.2.2.1 | - | deflate | "deflate" compression mechanism | Section 6.2.2.2 | - | | ([RFC1951]) used inside the "zlib" | | - | | data format ([RFC1950]) | | - | gzip | Same as GNU zip [RFC1952] | Section 6.2.2.3 | - +----------+--------------------------------------+-----------------+ - -10.5. Upgrade Token Registration - - The registration procedure for HTTP Upgrade Tokens -- previously - defined in Section 7.2 of [RFC2817] -- is now defined by - Section 9.8.1 of this document. - - The HTTP Status Code Registry located at - <http://www.iana.org/assignments/http-upgrade-tokens/> shall be - updated with the registration below: - - +-------+---------------------------+-------------------------------+ - | Value | Description | Reference | - +-------+---------------------------+-------------------------------+ - | HTTP | Hypertext Transfer | Section 2.5 of this | - | | Protocol | specification | - +-------+---------------------------+-------------------------------+ - -11. Security Considerations - - This section is meant to inform application developers, information - providers, and users of the security limitations in HTTP/1.1 as - described by this document. The discussion does not include - definitive solutions to the problems revealed, though it does make - some suggestions for reducing security risks. - - - -Fielding, et al. Expires February 5, 2011 [Page 62] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -11.1. Personal Information - - HTTP clients are often privy to large amounts of personal information - (e.g., the user's name, location, mail address, passwords, encryption - keys, etc.), and SHOULD be very careful to prevent unintentional - leakage of this information. We very strongly recommend that a - convenient interface be provided for the user to control - dissemination of such information, and that designers and - implementors be particularly careful in this area. History shows - that errors in this area often create serious security and/or privacy - problems and generate highly adverse publicity for the implementor's - company. - -11.2. Abuse of Server Log Information - - A server is in the position to save personal data about a user's - requests which might identify their reading patterns or subjects of - interest. This information is clearly confidential in nature and its - handling can be constrained by law in certain countries. People - using HTTP to provide data are responsible for ensuring that such - material is not distributed without the permission of any individuals - that are identifiable by the published results. - -11.3. Attacks Based On File and Path Names - - Implementations of HTTP origin servers SHOULD be careful to restrict - the documents returned by HTTP requests to be only those that were - intended by the server administrators. If an HTTP server translates - HTTP URIs directly into file system calls, the server MUST take - special care not to serve files that were not intended to be - delivered to HTTP clients. For example, UNIX, Microsoft Windows, and - other operating systems use ".." as a path component to indicate a - directory level above the current one. On such a system, an HTTP - server MUST disallow any such construct in the request-target if it - would otherwise allow access to a resource outside those intended to - be accessible via the HTTP server. Similarly, files intended for - reference only internally to the server (such as access control - files, configuration files, and script code) MUST be protected from - inappropriate retrieval, since they might contain sensitive - information. Experience has shown that minor bugs in such HTTP - server implementations have turned into security risks. - -11.4. DNS Spoofing - - Clients using HTTP rely heavily on the Domain Name Service, and are - thus generally prone to security attacks based on the deliberate mis- - association of IP addresses and DNS names. Clients need to be - cautious in assuming the continuing validity of an IP number/DNS name - - - -Fielding, et al. Expires February 5, 2011 [Page 63] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - association. - - In particular, HTTP clients SHOULD rely on their name resolver for - confirmation of an IP number/DNS name association, rather than - caching the result of previous host name lookups. Many platforms - already can cache host name lookups locally when appropriate, and - they SHOULD be configured to do so. It is proper for these lookups - to be cached, however, only when the TTL (Time To Live) information - reported by the name server makes it likely that the cached - information will remain useful. - - If HTTP clients cache the results of host name lookups in order to - achieve a performance improvement, they MUST observe the TTL - information reported by DNS. - - If HTTP clients do not observe this rule, they could be spoofed when - a previously-accessed server's IP address changes. As network - renumbering is expected to become increasingly common [RFC1900], the - possibility of this form of attack will grow. Observing this - requirement thus reduces this potential security vulnerability. - - This requirement also improves the load-balancing behavior of clients - for replicated servers using the same DNS name and reduces the - likelihood of a user's experiencing failure in accessing sites which - use that strategy. - -11.5. Proxies and Caching - - By their very nature, HTTP proxies are men-in-the-middle, and - represent an opportunity for man-in-the-middle attacks. Compromise - of the systems on which the proxies run can result in serious - security and privacy problems. Proxies have access to security- - related information, personal information about individual users and - organizations, and proprietary information belonging to users and - content providers. A compromised proxy, or a proxy implemented or - configured without regard to security and privacy considerations, - might be used in the commission of a wide range of potential attacks. - - Proxy operators need to protect the systems on which proxies run as - they would protect any system that contains or transports sensitive - information. In particular, log information gathered at proxies - often contains highly sensitive personal information, and/or - information about organizations. Log information needs to be - carefully guarded, and appropriate guidelines for use need to be - developed and followed. (Section 11.2). - - Proxy implementors need to consider the privacy and security - implications of their design and coding decisions, and of the - - - -Fielding, et al. Expires February 5, 2011 [Page 64] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - configuration options they provide to proxy operators (especially the - default configuration). - - Users of a proxy need to be aware that proxies are no trustworthier - than the people who run them; HTTP itself cannot solve this problem. - - The judicious use of cryptography, when appropriate, might suffice to - protect against a broad range of security and privacy attacks. Such - cryptography is beyond the scope of the HTTP/1.1 specification. - -11.6. Denial of Service Attacks on Proxies - - They exist. They are hard to defend against. Research continues. - Beware. - -12. Acknowledgments - - HTTP has evolved considerably over the years. It has benefited from - a large and active developer community--the many people who have - participated on the www-talk mailing list--and it is that community - which has been most responsible for the success of HTTP and of the - World-Wide Web in general. Marc Andreessen, Robert Cailliau, Daniel - W. Connolly, Bob Denny, John Franks, Jean-Francois Groff, Phillip M. - Hallam-Baker, Hakon W. Lie, Ari Luotonen, Rob McCool, Lou Montulli, - Dave Raggett, Tony Sanders, and Marc VanHeyningen deserve special - recognition for their efforts in defining early aspects of the - protocol. - - This document has benefited greatly from the comments of all those - participating in the HTTP-WG. In addition to those already - mentioned, the following individuals have contributed to this - specification: - - Gary Adams, Harald Tveit Alvestrand, Keith Ball, Brian Behlendorf, - Paul Burchard, Maurizio Codogno, Josh Cohen, Mike Cowlishaw, Roman - Czyborra, Michael A. Dolan, Daniel DuBois, David J. Fiander, Alan - Freier, Marc Hedlund, Greg Herlihy, Koen Holtman, Alex Hopmann, Bob - Jernigan, Shel Kaphan, Rohit Khare, John Klensin, Martijn Koster, - Alexei Kosut, David M. Kristol, Daniel LaLiberte, Ben Laurie, Paul J. - Leach, Albert Lunde, John C. Mallery, Jean-Philippe Martin-Flatin, - Mitra, David Morris, Gavin Nicol, Ross Patterson, Bill Perry, Jeffrey - Perry, Scott Powers, Owen Rees, Luigi Rizzo, David Robinson, Marc - Salomon, Rich Salz, Allan M. Schiffman, Jim Seidman, Chuck Shotton, - Eric W. Sink, Simon E. Spero, Richard N. Taylor, Robert S. Thau, Bill - (BearHeart) Weinman, Francois Yergeau, Mary Ellen Zurko. - - Thanks to the "cave men" of Palo Alto. You know who you are. - - - - -Fielding, et al. Expires February 5, 2011 [Page 65] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Jim Gettys (the editor of [RFC2616]) wishes particularly to thank Roy - Fielding, the editor of [RFC2068], along with John Klensin, Jeff - Mogul, Paul Leach, Dave Kristol, Koen Holtman, John Franks, Josh - Cohen, Alex Hopmann, Scott Lawrence, and Larry Masinter for their - help. And thanks go particularly to Jeff Mogul and Scott Lawrence - for performing the "MUST/MAY/SHOULD" audit. - - The Apache Group, Anselm Baird-Smith, author of Jigsaw, and Henrik - Frystyk implemented RFC 2068 early, and we wish to thank them for the - discovery of many of the problems that this document attempts to - rectify. - - This specification makes heavy use of the augmented BNF and generic - constructs defined by David H. Crocker for [RFC5234]. Similarly, it - reuses many of the definitions provided by Nathaniel Borenstein and - Ned Freed for MIME [RFC2045]. We hope that their inclusion in this - specification will help reduce past confusion over the relationship - between HTTP and Internet mail message formats. - -13. References - -13.1. Normative References - - [ISO-8859-1] International Organization for Standardization, - "Information technology -- 8-bit single-byte coded - graphic character sets -- Part 1: Latin alphabet No. - 1", ISO/IEC 8859-1:1998, 1998. - - [Part2] Fielding, R., Ed., Gettys, J., Mogul, J., Frystyk, H., - Masinter, L., Leach, P., Berners-Lee, T., Lafon, Y., - Ed., and J. Reschke, Ed., "HTTP/1.1, part 2: Message - Semantics", draft-ietf-httpbis-p2-semantics-11 (work in - progress), August 2010. - - [Part3] Fielding, R., Ed., Gettys, J., Mogul, J., Frystyk, H., - Masinter, L., Leach, P., Berners-Lee, T., Lafon, Y., - Ed., and J. Reschke, Ed., "HTTP/1.1, part 3: Message - Payload and Content Negotiation", - draft-ietf-httpbis-p3-payload-11 (work in progress), - August 2010. - - [Part6] Fielding, R., Ed., Gettys, J., Mogul, J., Frystyk, H., - Masinter, L., Leach, P., Berners-Lee, T., Lafon, Y., - Ed., Nottingham, M., Ed., and J. Reschke, Ed., - "HTTP/1.1, part 6: Caching", - draft-ietf-httpbis-p6-cache-11 (work in progress), - August 2010. - - - - -Fielding, et al. Expires February 5, 2011 [Page 66] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - [RFC1950] Deutsch, L. and J-L. Gailly, "ZLIB Compressed Data - Format Specification version 3.3", RFC 1950, May 1996. - - RFC 1950 is an Informational RFC, thus it might be less - stable than this specification. On the other hand, - this downward reference was present since the - publication of RFC 2068 in 1997 ([RFC2068]), therefore - it is unlikely to cause problems in practice. See also - [BCP97]. - - [RFC1951] Deutsch, P., "DEFLATE Compressed Data Format - Specification version 1.3", RFC 1951, May 1996. - - RFC 1951 is an Informational RFC, thus it might be less - stable than this specification. On the other hand, - this downward reference was present since the - publication of RFC 2068 in 1997 ([RFC2068]), therefore - it is unlikely to cause problems in practice. See also - [BCP97]. - - [RFC1952] Deutsch, P., Gailly, J-L., Adler, M., Deutsch, L., and - G. Randers-Pehrson, "GZIP file format specification - version 4.3", RFC 1952, May 1996. - - RFC 1952 is an Informational RFC, thus it might be less - stable than this specification. On the other hand, - this downward reference was present since the - publication of RFC 2068 in 1997 ([RFC2068]), therefore - it is unlikely to cause problems in practice. See also - [BCP97]. - - [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate - Requirement Levels", BCP 14, RFC 2119, March 1997. - - [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, - "Uniform Resource Identifier (URI): Generic Syntax", - RFC 3986, STD 66, January 2005. - - [RFC5234] Crocker, D., Ed. and P. Overell, "Augmented BNF for - Syntax Specifications: ABNF", STD 68, RFC 5234, - January 2008. - - [USASCII] American National Standards Institute, "Coded Character - Set -- 7-bit American Standard Code for Information - Interchange", ANSI X3.4, 1986. - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 67] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -13.2. Informative References - - [BCP97] Klensin, J. and S. Hartman, "Handling Normative - References to Standards-Track Documents", BCP 97, - RFC 4897, June 2007. - - [Kri2001] Kristol, D., "HTTP Cookies: Standards, Privacy, and - Politics", ACM Transactions on Internet Technology Vol. - 1, #2, November 2001, - <http://arxiv.org/abs/cs.SE/0105018>. - - [Nie1997] Frystyk, H., Gettys, J., Prud'hommeaux, E., Lie, H., - and C. Lilley, "Network Performance Effects of - HTTP/1.1, CSS1, and PNG", ACM Proceedings of the ACM - SIGCOMM '97 conference on Applications, technologies, - architectures, and protocols for computer communication - SIGCOMM '97, September 1997, - <http://doi.acm.org/10.1145/263105.263157>. - - [Pad1995] Padmanabhan, V. and J. Mogul, "Improving HTTP Latency", - Computer Networks and ISDN Systems v. 28, pp. 25-35, - December 1995, - <http://portal.acm.org/citation.cfm?id=219094>. - - [RFC1123] Braden, R., "Requirements for Internet Hosts - - Application and Support", STD 3, RFC 1123, - October 1989. - - [RFC1305] Mills, D., "Network Time Protocol (Version 3) - Specification, Implementation", RFC 1305, March 1992. - - [RFC1900] Carpenter, B. and Y. Rekhter, "Renumbering Needs Work", - RFC 1900, February 1996. - - [RFC1945] Berners-Lee, T., Fielding, R., and H. Nielsen, - "Hypertext Transfer Protocol -- HTTP/1.0", RFC 1945, - May 1996. - - [RFC2045] Freed, N. and N. Borenstein, "Multipurpose Internet - Mail Extensions (MIME) Part One: Format of Internet - Message Bodies", RFC 2045, November 1996. - - [RFC2047] Moore, K., "MIME (Multipurpose Internet Mail - Extensions) Part Three: Message Header Extensions for - Non-ASCII Text", RFC 2047, November 1996. - - [RFC2068] Fielding, R., Gettys, J., Mogul, J., Nielsen, H., and - T. Berners-Lee, "Hypertext Transfer Protocol -- - - - -Fielding, et al. Expires February 5, 2011 [Page 68] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - HTTP/1.1", RFC 2068, January 1997. - - [RFC2109] Kristol, D. and L. Montulli, "HTTP State Management - Mechanism", RFC 2109, February 1997. - - [RFC2145] Mogul, J., Fielding, R., Gettys, J., and H. Nielsen, - "Use and Interpretation of HTTP Version Numbers", - RFC 2145, May 1997. - - [RFC2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., - Masinter, L., Leach, P., and T. Berners-Lee, "Hypertext - Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999. - - [RFC2817] Khare, R. and S. Lawrence, "Upgrading to TLS Within - HTTP/1.1", RFC 2817, May 2000. - - [RFC2818] Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000. - - [RFC2965] Kristol, D. and L. Montulli, "HTTP State Management - Mechanism", RFC 2965, October 2000. - - [RFC3864] Klyne, G., Nottingham, M., and J. Mogul, "Registration - Procedures for Message Header Fields", BCP 90, - RFC 3864, September 2004. - - [RFC4288] Freed, N. and J. Klensin, "Media Type Specifications - and Registration Procedures", BCP 13, RFC 4288, - December 2005. - - [RFC4395] Hansen, T., Hardie, T., and L. Masinter, "Guidelines - and Registration Procedures for New URI Schemes", - BCP 115, RFC 4395, February 2006. - - [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing - an IANA Considerations Section in RFCs", BCP 26, - RFC 5226, May 2008. - - [RFC5322] Resnick, P., "Internet Message Format", RFC 5322, - October 2008. - - [Spe] Spero, S., "Analysis of HTTP Performance Problems", - <http://sunsite.unc.edu/mdma-release/http-prob.html>. - - [Tou1998] Touch, J., Heidemann, J., and K. Obraczka, "Analysis of - HTTP Performance", ISI Research Report ISI/RR-98-463, - Aug 1998, <http://www.isi.edu/touch/pubs/http-perf96/>. - - (original report dated Aug. 1996) - - - -Fielding, et al. Expires February 5, 2011 [Page 69] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -Appendix A. Tolerant Applications - - Although this document specifies the requirements for the generation - of HTTP/1.1 messages, not all applications will be correct in their - implementation. We therefore recommend that operational applications - be tolerant of deviations whenever those deviations can be - interpreted unambiguously. - - Clients SHOULD be tolerant in parsing the Status-Line and servers - SHOULD be tolerant when parsing the Request-Line. In particular, - they SHOULD accept any amount of WSP characters between fields, even - though only a single SP is required. - - The line terminator for header fields is the sequence CRLF. However, - we recommend that applications, when parsing such headers, recognize - a single LF as a line terminator and ignore the leading CR. - - The character set of a representation SHOULD be labeled as the lowest - common denominator of the character codes used within that - representation, with the exception that not labeling the - representation is preferred over labeling the representation with the - labels US-ASCII or ISO-8859-1. See [Part3]. - - Additional rules for requirements on parsing and encoding of dates - and other potential problems with date encodings include: - - o HTTP/1.1 clients and caches SHOULD assume that an RFC-850 date - which appears to be more than 50 years in the future is in fact in - the past (this helps solve the "year 2000" problem). - - o Although all date formats are specified to be case-sensitive, - recipients SHOULD match day, week and timezone names case- - insensitively. - - o An HTTP/1.1 implementation MAY internally represent a parsed - Expires date as earlier than the proper value, but MUST NOT - internally represent a parsed Expires date as later than the - proper value. - - o All expiration-related calculations MUST be done in GMT. The - local time zone MUST NOT influence the calculation or comparison - of an age or expiration time. - - o If an HTTP header incorrectly carries a date value with a time - zone other than GMT, it MUST be converted into GMT using the most - conservative possible conversion. - - - - - -Fielding, et al. Expires February 5, 2011 [Page 70] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -Appendix B. Compatibility with Previous Versions - - HTTP has been in use by the World-Wide Web global information - initiative since 1990. The first version of HTTP, later referred to - as HTTP/0.9, was a simple protocol for hypertext data transfer across - the Internet with only a single method and no metadata. HTTP/1.0, as - defined by [RFC1945], added a range of request methods and MIME-like - messaging that could include metadata about the data transferred and - modifiers on the request/response semantics. However, HTTP/1.0 did - not sufficiently take into consideration the effects of hierarchical - proxies, caching, the need for persistent connections, or name-based - virtual hosts. The proliferation of incompletely-implemented - applications calling themselves "HTTP/1.0" further necessitated a - protocol version change in order for two communicating applications - to determine each other's true capabilities. - - HTTP/1.1 remains compatible with HTTP/1.0 by including more stringent - requirements that enable reliable implementations, adding only those - new features that will either be safely ignored by an HTTP/1.0 - recipient or only sent when communicating with a party advertising - compliance with HTTP/1.1. - - It is beyond the scope of a protocol specification to mandate - compliance with previous versions. HTTP/1.1 was deliberately - designed, however, to make supporting previous versions easy. It is - worth noting that, at the time of composing this specification, we - would expect general-purpose HTTP/1.1 servers to: - - o understand any valid request in the format of HTTP/1.0 and 1.1; - - o respond appropriately with a message in the same major version - used by the client. - - And we would expect HTTP/1.1 clients to: - - o understand any valid response in the format of HTTP/1.0 or 1.1. - - For most implementations of HTTP/1.0, each connection is established - by the client prior to the request and closed by the server after - sending the response. Some implementations implement the Keep-Alive - version of persistent connections described in Section 19.7.1 of - [RFC2068]. - -B.1. Changes from HTTP/1.0 - - This section summarizes major differences between versions HTTP/1.0 - and HTTP/1.1. - - - - -Fielding, et al. Expires February 5, 2011 [Page 71] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -B.1.1. Changes to Simplify Multi-homed Web Servers and Conserve IP - Addresses - - The requirements that clients and servers support the Host request- - header, report an error if the Host request-header (Section 9.4) is - missing from an HTTP/1.1 request, and accept absolute URIs - (Section 4.1.2) are among the most important changes defined by this - specification. - - Older HTTP/1.0 clients assumed a one-to-one relationship of IP - addresses and servers; there was no other established mechanism for - distinguishing the intended server of a request than the IP address - to which that request was directed. The changes outlined above will - allow the Internet, once older HTTP clients are no longer common, to - support multiple Web sites from a single IP address, greatly - simplifying large operational Web servers, where allocation of many - IP addresses to a single host has created serious problems. The - Internet will also be able to recover the IP addresses that have been - allocated for the sole purpose of allowing special-purpose domain - names to be used in root-level HTTP URLs. Given the rate of growth - of the Web, and the number of servers already deployed, it is - extremely important that all implementations of HTTP (including - updates to existing HTTP/1.0 applications) correctly implement these - requirements: - - o Both clients and servers MUST support the Host request-header. - - o A client that sends an HTTP/1.1 request MUST send a Host header. - - o Servers MUST report a 400 (Bad Request) error if an HTTP/1.1 - request does not include a Host request-header. - - o Servers MUST accept absolute URIs. - -B.2. Compatibility with HTTP/1.0 Persistent Connections - - Some clients and servers might wish to be compatible with some - previous implementations of persistent connections in HTTP/1.0 - clients and servers. Persistent connections in HTTP/1.0 are - explicitly negotiated as they are not the default behavior. HTTP/1.0 - experimental implementations of persistent connections are faulty, - and the new facilities in HTTP/1.1 are designed to rectify these - problems. The problem was that some existing HTTP/1.0 clients might - send Keep-Alive to a proxy server that doesn't understand Connection, - which would then erroneously forward it to the next inbound server, - which would establish the Keep-Alive connection and result in a hung - HTTP/1.0 proxy waiting for the close on the response. The result is - that HTTP/1.0 clients must be prevented from using Keep-Alive when - - - -Fielding, et al. Expires February 5, 2011 [Page 72] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - talking to proxies. - - However, talking to proxies is the most important use of persistent - connections, so that prohibition is clearly unacceptable. Therefore, - we need some other mechanism for indicating a persistent connection - is desired, which is safe to use even when talking to an old proxy - that ignores Connection. Persistent connections are the default for - HTTP/1.1 messages; we introduce a new keyword (Connection: close) for - declaring non-persistence. See Section 9.1. - - The original HTTP/1.0 form of persistent connections (the Connection: - Keep-Alive and Keep-Alive header) is documented in Section 19.7.1 of - [RFC2068]. - -B.3. Changes from RFC 2616 - - Empty list elements in list productions have been deprecated. - (Section 1.2.1) - - Rules about implicit linear whitespace between certain grammar - productions have been removed; now it's only allowed when - specifically pointed out in the ABNF. The NUL character is no longer - allowed in comment and quoted-string text. The quoted-pair rule no - longer allows escaping control characters other than HTAB. Non-ASCII - content in header fields and reason phrase has been obsoleted and - made opaque (the TEXT rule was removed) (Section 1.2.2) - - Clarify that HTTP-Version is case sensitive. (Section 2.5) - - Remove reference to non-existent identity transfer-coding value - tokens. (Sections 6.2 and 3.3) - - Require that invalid whitespace around field-names be rejected. - (Section 3.2) - - Update use of abs_path production from RFC1808 to the path-absolute + - query components of RFC3986. (Section 4.1.2) - - Clarification that the chunk length does not include the count of the - octets in the chunk header and trailer. Furthermore disallowed line - folding in chunk extensions. (Section 6.2.1) - - Remove hard limit of two connections per server. (Section 7.1.4) - - Clarify exactly when close connection options must be sent. - (Section 9.1) - -Appendix C. Collected ABNF - - - -Fielding, et al. Expires February 5, 2011 [Page 73] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - BWS = OWS - - Cache-Control = <Cache-Control, defined in [Part6], Section 3.4> - Chunked-Body = *chunk last-chunk trailer-part CRLF - Connection = "Connection:" OWS Connection-v - Connection-v = *( "," OWS ) connection-token *( OWS "," [ OWS - connection-token ] ) - Content-Length = "Content-Length:" OWS 1*Content-Length-v - Content-Length-v = 1*DIGIT - - Date = "Date:" OWS Date-v - Date-v = HTTP-date - - GMT = %x47.4D.54 ; GMT - - HTTP-Prot-Name = %x48.54.54.50 ; HTTP - HTTP-Version = HTTP-Prot-Name "/" 1*DIGIT "." 1*DIGIT - HTTP-date = rfc1123-date / obs-date - HTTP-message = start-line *( header-field CRLF ) CRLF [ message-body - ] - Host = "Host:" OWS Host-v - Host-v = uri-host [ ":" port ] - - MIME-Version = <MIME-Version, defined in [Part3], Appendix A.1> - Method = token - - OWS = *( [ obs-fold ] WSP ) - - Pragma = <Pragma, defined in [Part6], Section 3.4> - - RWS = 1*( [ obs-fold ] WSP ) - Reason-Phrase = *( WSP / VCHAR / obs-text ) - Request = Request-Line *( header-field CRLF ) CRLF [ message-body ] - Request-Line = Method SP request-target SP HTTP-Version CRLF - Response = Status-Line *( header-field CRLF ) CRLF [ message-body ] - - Status-Code = 3DIGIT - Status-Line = HTTP-Version SP Status-Code SP Reason-Phrase CRLF - - TE = "TE:" OWS TE-v - TE-v = [ ( "," / t-codings ) *( OWS "," [ OWS t-codings ] ) ] - Trailer = "Trailer:" OWS Trailer-v - Trailer-v = *( "," OWS ) field-name *( OWS "," [ OWS field-name ] ) - Transfer-Encoding = "Transfer-Encoding:" OWS Transfer-Encoding-v - Transfer-Encoding-v = *( "," OWS ) transfer-coding *( OWS "," [ OWS - transfer-coding ] ) - - URI-reference = <URI-reference, defined in [RFC3986], Section 4.1> - - - -Fielding, et al. Expires February 5, 2011 [Page 74] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Upgrade = "Upgrade:" OWS Upgrade-v - Upgrade-v = *( "," OWS ) product *( OWS "," [ OWS product ] ) - - Via = "Via:" OWS Via-v - Via-v = *( "," OWS ) received-protocol RWS received-by [ RWS comment - ] *( OWS "," [ OWS received-protocol RWS received-by [ RWS comment ] - ] ) - - Warning = <Warning, defined in [Part6], Section 3.6> - - absolute-URI = <absolute-URI, defined in [RFC3986], Section 4.3> - asctime-date = day-name SP date3 SP time-of-day SP year - attribute = token - authority = <authority, defined in [RFC3986], Section 3.2> - - chunk = chunk-size *WSP [ chunk-ext ] CRLF chunk-data CRLF - chunk-data = 1*OCTET - chunk-ext = *( ";" *WSP chunk-ext-name [ "=" chunk-ext-val ] *WSP ) - chunk-ext-name = token - chunk-ext-val = token / quoted-str-nf - chunk-size = 1*HEXDIG - comment = "(" *( ctext / quoted-cpair / comment ) ")" - connection-token = token - ctext = OWS / %x21-27 ; '!'-''' - / %x2A-5B ; '*'-'[' - / %x5D-7E ; ']'-'~' - / obs-text - - date1 = day SP month SP year - date2 = day "-" month "-" 2DIGIT - date3 = month SP ( 2DIGIT / ( SP DIGIT ) ) - day = 2DIGIT - day-name = %x4D.6F.6E ; Mon - / %x54.75.65 ; Tue - / %x57.65.64 ; Wed - / %x54.68.75 ; Thu - / %x46.72.69 ; Fri - / %x53.61.74 ; Sat - / %x53.75.6E ; Sun - day-name-l = %x4D.6F.6E.64.61.79 ; Monday - / %x54.75.65.73.64.61.79 ; Tuesday - / %x57.65.64.6E.65.73.64.61.79 ; Wednesday - / %x54.68.75.72.73.64.61.79 ; Thursday - / %x46.72.69.64.61.79 ; Friday - / %x53.61.74.75.72.64.61.79 ; Saturday - / %x53.75.6E.64.61.79 ; Sunday - - field-content = *( WSP / VCHAR / obs-text ) - - - -Fielding, et al. Expires February 5, 2011 [Page 75] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - field-name = token - field-value = *( field-content / OWS ) - - general-header = Cache-Control / Connection / Date / Pragma / Trailer - / Transfer-Encoding / Upgrade / Via / Warning / MIME-Version - - header-field = field-name ":" OWS [ field-value ] OWS - hour = 2DIGIT - http-URI = "http://" authority path-abempty [ "?" query ] - https-URI = "https://" authority path-abempty [ "?" query ] - - last-chunk = 1*"0" *WSP [ chunk-ext ] CRLF - - message-body = *OCTET - minute = 2DIGIT - month = %x4A.61.6E ; Jan - / %x46.65.62 ; Feb - / %x4D.61.72 ; Mar - / %x41.70.72 ; Apr - / %x4D.61.79 ; May - / %x4A.75.6E ; Jun - / %x4A.75.6C ; Jul - / %x41.75.67 ; Aug - / %x53.65.70 ; Sep - / %x4F.63.74 ; Oct - / %x4E.6F.76 ; Nov - / %x44.65.63 ; Dec - - obs-date = rfc850-date / asctime-date - obs-fold = CRLF - obs-text = %x80-FF - - partial-URI = relative-part [ "?" query ] - path-abempty = <path-abempty, defined in [RFC3986], Section 3.3> - path-absolute = <path-absolute, defined in [RFC3986], Section 3.3> - port = <port, defined in [RFC3986], Section 3.2.3> - product = token [ "/" product-version ] - product-version = token - protocol-name = token - protocol-version = token - pseudonym = token - - qdtext = OWS / "!" / %x23-5B ; '#'-'[' - / %x5D-7E ; ']'-'~' - / obs-text - qdtext-nf = WSP / "!" / %x23-5B ; '#'-'[' - / %x5D-7E ; ']'-'~' - / obs-text - - - -Fielding, et al. Expires February 5, 2011 [Page 76] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - query = <query, defined in [RFC3986], Section 3.4> - quoted-cpair = "\" ( WSP / VCHAR / obs-text ) - quoted-pair = "\" ( WSP / VCHAR / obs-text ) - quoted-str-nf = DQUOTE *( qdtext-nf / quoted-pair ) DQUOTE - quoted-string = DQUOTE *( qdtext / quoted-pair ) DQUOTE - qvalue = ( "0" [ "." *3DIGIT ] ) / ( "1" [ "." *3"0" ] ) - - received-by = ( uri-host [ ":" port ] ) / pseudonym - received-protocol = [ protocol-name "/" ] protocol-version - relative-part = <relative-part, defined in [RFC3986], Section 4.2> - request-header = <request-header, defined in [Part2], Section 3> - request-target = "*" / absolute-URI / ( path-absolute [ "?" query ] ) - / authority - response-header = <response-header, defined in [Part2], Section 5> - rfc1123-date = day-name "," SP date1 SP time-of-day SP GMT - rfc850-date = day-name-l "," SP date2 SP time-of-day SP GMT - - second = 2DIGIT - special = "(" / ")" / "<" / ">" / "@" / "," / ";" / ":" / "\" / - DQUOTE / "/" / "[" / "]" / "?" / "=" / "{" / "}" - start-line = Request-Line / Status-Line - - t-codings = "trailers" / ( transfer-extension [ te-params ] ) - tchar = "!" / "#" / "$" / "%" / "&" / "'" / "*" / "+" / "-" / "." / - "^" / "_" / "`" / "|" / "~" / DIGIT / ALPHA - te-ext = OWS ";" OWS token [ "=" word ] - te-params = OWS ";" OWS "q=" qvalue *te-ext - time-of-day = hour ":" minute ":" second - token = 1*tchar - trailer-part = *( header-field CRLF ) - transfer-coding = "chunked" / "compress" / "deflate" / "gzip" / - transfer-extension - transfer-extension = token *( OWS ";" OWS transfer-parameter ) - transfer-parameter = attribute BWS "=" BWS value - - uri-host = <host, defined in [RFC3986], Section 3.2.2> - - value = word - - word = token / quoted-string - - year = 4DIGIT - - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 77] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - ABNF diagnostics: - - ; Chunked-Body defined but not used - ; Content-Length defined but not used - ; HTTP-message defined but not used - ; Host defined but not used - ; Request defined but not used - ; Response defined but not used - ; TE defined but not used - ; URI-reference defined but not used - ; general-header defined but not used - ; http-URI defined but not used - ; https-URI defined but not used - ; partial-URI defined but not used - ; request-header defined but not used - ; response-header defined but not used - ; special defined but not used - -Appendix D. Change Log (to be removed by RFC Editor before publication) - -D.1. Since RFC2616 - - Extracted relevant partitions from [RFC2616]. - -D.2. Since draft-ietf-httpbis-p1-messaging-00 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/1>: "HTTP Version - should be case sensitive" - (<http://purl.org/NET/http-errata#verscase>) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/2>: "'unsafe' - characters" (<http://purl.org/NET/http-errata#unsafe-uri>) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/3>: "Chunk Size - Definition" (<http://purl.org/NET/http-errata#chunk-size>) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/4>: "Message Length" - (<http://purl.org/NET/http-errata#msg-len-chars>) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/8>: "Media Type - Registrations" (<http://purl.org/NET/http-errata#media-reg>) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/11>: "URI includes - query" (<http://purl.org/NET/http-errata#uriquery>) - - - - - -Fielding, et al. Expires February 5, 2011 [Page 78] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/15>: "No close on - 1xx responses" (<http://purl.org/NET/http-errata#noclose1xx>) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/16>: "Remove - 'identity' token references" - (<http://purl.org/NET/http-errata#identity>) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/26>: "Import query - BNF" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/31>: "qdtext BNF" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/35>: "Normative and - Informative references" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/42>: "RFC2606 - Compliance" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/45>: "RFC977 - reference" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/46>: "RFC1700 - references" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/47>: "inconsistency - in date format explanation" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/48>: "Date reference - typo" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/65>: "Informative - references" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/66>: "ISO-8859-1 - Reference" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/86>: "Normative up- - to-date references" - - Other changes: - - o Update media type registrations to use RFC4288 template. - - o Use names of RFC4234 core rules DQUOTE and WSP, fix broken ABNF - for chunk-data (work in progress on - <http://tools.ietf.org/wg/httpbis/trac/ticket/36>) - - - - - -Fielding, et al. Expires February 5, 2011 [Page 79] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -D.3. Since draft-ietf-httpbis-p1-messaging-01 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/19>: "Bodies on GET - (and other) requests" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/55>: "Updating to - RFC4288" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/57>: "Status Code - and Reason Phrase" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/82>: "rel_path not - used" - - Ongoing work on ABNF conversion - (<http://tools.ietf.org/wg/httpbis/trac/ticket/36>): - - o Get rid of duplicate BNF rule names ("host" -> "uri-host", - "trailer" -> "trailer-part"). - - o Avoid underscore character in rule names ("http_URL" -> "http- - URL", "abs_path" -> "path-absolute"). - - o Add rules for terms imported from URI spec ("absoluteURI", - "authority", "path-absolute", "port", "query", "relativeURI", - "host) -- these will have to be updated when switching over to - RFC3986. - - o Synchronize core rules with RFC5234. - - o Get rid of prose rules that span multiple lines. - - o Get rid of unused rules LOALPHA and UPALPHA. - - o Move "Product Tokens" section (back) into Part 1, as "token" is - used in the definition of the Upgrade header. - - o Add explicit references to BNF syntax and rules imported from - other parts of the specification. - - o Rewrite prose rule "token" in terms of "tchar", rewrite prose rule - "TEXT". - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 80] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -D.4. Since draft-ietf-httpbis-p1-messaging-02 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/51>: "HTTP-date vs. - rfc1123-date" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/64>: "WS in quoted- - pair" - - Ongoing work on IANA Message Header Registration - (<http://tools.ietf.org/wg/httpbis/trac/ticket/40>): - - o Reference RFC 3984, and update header registrations for headers - defined in this document. - - Ongoing work on ABNF conversion - (<http://tools.ietf.org/wg/httpbis/trac/ticket/36>): - - o Replace string literals when the string really is case-sensitive - (HTTP-Version). - -D.5. Since draft-ietf-httpbis-p1-messaging-03 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/28>: "Connection - closing" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/97>: "Move - registrations and registry information to IANA Considerations" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/120>: "need new URL - for PAD1995 reference" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/127>: "IANA - Considerations: update HTTP URI scheme registration" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/128>: "Cite HTTPS - URI scheme definition" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/129>: "List-type - headers vs Set-Cookie" - - Ongoing work on ABNF conversion - (<http://tools.ietf.org/wg/httpbis/trac/ticket/36>): - - - - - -Fielding, et al. Expires February 5, 2011 [Page 81] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - o Replace string literals when the string really is case-sensitive - (HTTP-Date). - - o Replace HEX by HEXDIG for future consistence with RFC 5234's core - rules. - -D.6. Since draft-ietf-httpbis-p1-messaging-04 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/34>: "Out-of-date - reference for URIs" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/132>: "RFC 2822 is - updated by RFC 5322" - - Ongoing work on ABNF conversion - (<http://tools.ietf.org/wg/httpbis/trac/ticket/36>): - - o Use "/" instead of "|" for alternatives. - - o Get rid of RFC822 dependency; use RFC5234 plus extensions instead. - - o Only reference RFC 5234's core rules. - - o Introduce new ABNF rules for "bad" whitespace ("BWS"), optional - whitespace ("OWS") and required whitespace ("RWS"). - - o Rewrite ABNFs to spell out whitespace rules, factor out header - value format definitions. - -D.7. Since draft-ietf-httpbis-p1-messaging-05 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/30>: "Header LWS" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/52>: "Sort 1.3 - Terminology" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/63>: "RFC2047 - encoded words" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/74>: "Character - Encodings in TEXT" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/77>: "Line Folding" - - - - -Fielding, et al. Expires February 5, 2011 [Page 82] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/83>: "OPTIONS * and - proxies" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/94>: "Reason-Phrase - BNF" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/111>: "Use of TEXT" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/118>: "Join - "Differences Between HTTP Entities and RFC 2045 Entities"?" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/134>: "RFC822 - reference left in discussion of date formats" - - Final work on ABNF conversion - (<http://tools.ietf.org/wg/httpbis/trac/ticket/36>): - - o Rewrite definition of list rules, deprecate empty list elements. - - o Add appendix containing collected and expanded ABNF. - - Other changes: - - o Rewrite introduction; add mostly new Architecture Section. - - o Move definition of quality values from Part 3 into Part 1; make TE - request header grammar independent of accept-params (defined in - Part 3). - -D.8. Since draft-ietf-httpbis-p1-messaging-06 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/161>: "base for - numeric protocol elements" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/162>: "comment ABNF" - - Partly resolved issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/88>: "205 Bodies" - (took out language that implied that there might be methods for - which a request body MUST NOT be included) - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/163>: "editorial - improvements around HTTP-date" - - - - - -Fielding, et al. Expires February 5, 2011 [Page 83] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - -D.9. Since draft-ietf-httpbis-p1-messaging-07 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/93>: "Repeating - single-value headers" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/131>: "increase - connection limit" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/157>: "IP addresses - in URLs" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/172>: "take over - HTTP Upgrade Token Registry" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/173>: "CR and LF in - chunk extension values" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/184>: "HTTP/0.9 - support" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/188>: "pick IANA - policy (RFC5226) for Transfer Coding / Content Coding" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/189>: "move - definitions of gzip/deflate/compress to part 1" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/194>: "disallow - control characters in quoted-pair" - - Partly resolved issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/148>: "update IANA - requirements wrt Transfer-Coding values" (add the IANA - Considerations subsection) - -D.10. Since draft-ietf-httpbis-p1-messaging-08 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/201>: "header - parsing, treatment of leading and trailing OWS" - - Partly resolved issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/60>: "Placement of - 13.5.1 and 13.5.2" - - - -Fielding, et al. Expires February 5, 2011 [Page 84] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/200>: "use of term - "word" when talking about header structure" - -D.11. Since draft-ietf-httpbis-p1-messaging-09 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/73>: "Clarification - of the term 'deflate'" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/83>: "OPTIONS * and - proxies" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/122>: "MIME-Version - not listed in P1, general header fields" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/143>: "IANA registry - for content/transfer encodings" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/165>: "Case- - sensitivity of HTTP-date" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/200>: "use of term - "word" when talking about header structure" - - Partly resolved issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/196>: "Term for the - requested resource's URI" - -D.12. Since draft-ietf-httpbis-p1-messaging-10 - - Closed issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/28>: "Connection - Closing" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/90>: "Delimiting - messages with multipart/byteranges" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/95>: "Handling - multiple Content-Length headers" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/109>: "Clarify - entity / representation / variant terminology" - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/220>: "consider - removing the 'changes from 2068' sections" - - - -Fielding, et al. Expires February 5, 2011 [Page 85] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Partly resolved issues: - - o <http://tools.ietf.org/wg/httpbis/trac/ticket/159>: "HTTP(s) URI - scheme definitions" - -Index - - A - application/http Media Type 61 - - B - browser 10 - - C - cache 13 - cacheable 14 - chunked (Coding Format) 35 - client 10 - Coding Format - chunked 35 - compress 38 - deflate 38 - gzip 38 - compress (Coding Format) 38 - connection 10 - Connection header 49 - Content-Length header 50 - - D - Date header 51 - deflate (Coding Format) 38 - downstream 12 - - E - effective request URI 29 - - G - gateway 13 - Grammar - absolute-URI 16 - ALPHA 7 - asctime-date 34 - attribute 34 - authority 16 - BWS 9 - chunk 35 - chunk-data 35 - chunk-ext 35 - - - -Fielding, et al. Expires February 5, 2011 [Page 86] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - chunk-ext-name 35 - chunk-ext-val 35 - chunk-size 35 - Chunked-Body 35 - comment 22 - Connection 49 - connection-token 49 - Connection-v 49 - Content-Length 50 - Content-Length-v 50 - CR 7 - CRLF 7 - ctext 22 - CTL 7 - Date 51 - Date-v 51 - date1 33 - date2 34 - date3 34 - day 33 - day-name 33 - day-name-l 33 - DIGIT 7 - DQUOTE 7 - extension-code 32 - extension-method 26 - field-content 20 - field-name 20 - field-value 20 - general-header 26 - GMT 33 - header-field 20 - HEXDIG 7 - Host 52 - Host-v 52 - hour 33 - HTTP-date 32 - HTTP-message 19 - HTTP-Prot-Name 15 - http-URI 16 - HTTP-Version 15 - https-URI 18 - last-chunk 35 - LF 7 - message-body 22 - Method 26 - minute 33 - month 33 - - - -Fielding, et al. Expires February 5, 2011 [Page 87] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - obs-date 33 - obs-text 10 - OCTET 7 - OWS 9 - path-absolute 16 - port 16 - product 39 - product-version 39 - protocol-name 57 - protocol-version 57 - pseudonym 57 - qdtext 10 - qdtext-nf 35 - query 16 - quoted-cpair 22 - quoted-pair 10 - quoted-str-nf 35 - quoted-string 10 - qvalue 39 - Reason-Phrase 32 - received-by 57 - received-protocol 57 - Request 26 - Request-Line 26 - request-target 27 - Response 31 - rfc850-date 34 - rfc1123-date 33 - RWS 9 - second 33 - SP 7 - special 9 - Status-Code 32 - Status-Line 31 - t-codings 53 - tchar 9 - TE 53 - te-ext 53 - te-params 53 - TE-v 53 - time-of-day 33 - token 9 - Trailer 54 - trailer-part 35 - Trailer-v 54 - transfer-coding 34 - Transfer-Encoding 55 - Transfer-Encoding-v 55 - - - -Fielding, et al. Expires February 5, 2011 [Page 88] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - transfer-extension 34 - transfer-parameter 34 - Upgrade 55 - Upgrade-v 55 - uri-host 16 - URI-reference 16 - value 34 - VCHAR 7 - Via 57 - Via-v 57 - word 9 - WSP 7 - year 33 - gzip (Coding Format) 38 - - H - header field 19 - header section 19 - Headers - Connection 49 - Content-Length 50 - Date 51 - Host 52 - TE 53 - Trailer 54 - Transfer-Encoding 55 - Upgrade 55 - Via 57 - headers 19 - Host header 52 - http URI scheme 16 - https URI scheme 18 - - I - inbound 12 - intermediary 12 - - M - Media Type - application/http 61 - message/http 59 - message 11 - message/http Media Type 59 - - O - origin server 10 - outbound 12 - - - - -Fielding, et al. Expires February 5, 2011 [Page 89] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - P - proxy 12 - - R - request 11 - resource 16 - response 11 - reverse proxy 13 - - S - server 10 - spider 10 - - T - target resource 29 - TE header 53 - Trailer header 54 - Transfer-Encoding header 55 - tunnel 13 - - U - Upgrade header 55 - upstream 12 - URI scheme - http 16 - https 18 - user agent 10 - - V - Via header 57 - -Authors' Addresses - - Roy T. Fielding (editor) - Day Software - 23 Corporate Plaza DR, Suite 280 - Newport Beach, CA 92660 - USA - - Phone: +1-949-706-5300 - Fax: +1-949-706-5305 - EMail: fielding@gbiv.com - URI: http://roy.gbiv.com/ - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 90] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Jim Gettys - Alcatel-Lucent Bell Labs - 21 Oak Knoll Road - Carlisle, MA 01741 - USA - - EMail: jg@freedesktop.org - URI: http://gettys.wordpress.com/ - - - Jeffrey C. Mogul - Hewlett-Packard Company - HP Labs, Large Scale Systems Group - 1501 Page Mill Road, MS 1177 - Palo Alto, CA 94304 - USA - - EMail: JeffMogul@acm.org - - - Henrik Frystyk Nielsen - Microsoft Corporation - 1 Microsoft Way - Redmond, WA 98052 - USA - - EMail: henrikn@microsoft.com - - - Larry Masinter - Adobe Systems, Incorporated - 345 Park Ave - San Jose, CA 95110 - USA - - EMail: LMM@acm.org - URI: http://larry.masinter.net/ - - - Paul J. Leach - Microsoft Corporation - 1 Microsoft Way - Redmond, WA 98052 - - EMail: paulle@microsoft.com - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 91] - -Internet-Draft HTTP/1.1, Part 1 August 2010 - - - Tim Berners-Lee - World Wide Web Consortium - MIT Computer Science and Artificial Intelligence Laboratory - The Stata Center, Building 32 - 32 Vassar Street - Cambridge, MA 02139 - USA - - EMail: timbl@w3.org - URI: http://www.w3.org/People/Berners-Lee/ - - - Yves Lafon (editor) - World Wide Web Consortium - W3C / ERCIM - 2004, rte des Lucioles - Sophia-Antipolis, AM 06902 - France - - EMail: ylafon@w3.org - URI: http://www.raubacapeu.net/people/yves/ - - - Julian F. Reschke (editor) - greenbytes GmbH - Hafenweg 16 - Muenster, NW 48155 - Germany - - Phone: +49 251 2807760 - Fax: +49 251 2807761 - EMail: julian.reschke@greenbytes.de - URI: http://greenbytes.de/tech/webdav/ - - - - - - - - - - - - - - - - - - -Fielding, et al. Expires February 5, 2011 [Page 92] - |