<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-httpbis-connect-tcp-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Templated CONNECT-TCP">Template-Driven HTTP CONNECT Proxying for TCP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-connect-tcp-04"/>
    <author initials="B. M." surname="Schwartz" fullname="Benjamin M. Schwartz">
      <organization>Meta Platforms, Inc.</organization>
      <address>
        <email>ietf@bemasc.net</email>
      </address>
    </author>
    <date year="2024" month="July" day="22"/>
    <area>art</area>
    <workgroup>httpbis</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>TCP proxying using HTTP CONNECT has long been part of the core HTTP specification.  However, this proxying functionality has several important deficiencies in modern HTTP environments.  This specification defines an alternative HTTP proxy service configuration for TCP connections.  This configuration is described by a URI Template, similar to the CONNECT-UDP and CONNECT-IP protocols.</t>
    </abstract>
  </front>
  <middle>
    <?line 39?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="history">
        <name>History</name>
        <t>HTTP has used the CONNECT method for proxying TCP connections since HTTP/1.1.  When using CONNECT, the request target specifies a host and port number, and the proxy forwards TCP payloads between the client and this destination (<xref section="9.3.6" sectionFormat="comma" target="RFC9110"/>).  To date, this is the only mechanism defined for proxying TCP over HTTP.  In this specification, this is referred to as a "classic HTTP CONNECT proxy".</t>
        <t>HTTP/3 uses a UDP transport, so it cannot be forwarded using the pre-existing CONNECT mechanism.  To enable forward proxying of HTTP/3, the MASQUE effort has defined proxy mechanisms that are capable of proxying UDP datagrams <xref target="CONNECT-UDP"/>, and more generally IP datagrams <xref target="CONNECT-IP"/>.  The destination host and port number (if applicable) are encoded into the HTTP resource path, and end-to-end datagrams are wrapped into HTTP Datagrams <xref target="RFC9297"/> on the client-proxy path.</t>
      </section>
      <section anchor="problems">
        <name>Problems</name>
        <t>HTTP clients can be configured to use proxies by selecting a proxy hostname, a port, and whether to use a security protocol. However, Classic HTTP CONNECT requests using the proxy do not carry this configuration information. Instead, they only indicate the hostname and port of the target. This prevents any HTTP server from hosting multiple distinct proxy services, as the server cannot distinguish them by path (as with distinct resources) or by origin (as in "virtual hosting").</t>
        <t>The absence of an explicit origin for the proxy also rules out the usual defenses against server port misdirection attacks (see <xref section="7.4" sectionFormat="of" target="RFC9110"/>) and creates ambiguity about the use of origin-scoped response header fields (e.g., "Alt-Svc" <xref target="RFC7838"/>, "Strict-Transport-Security" <xref target="RFC6797"/>).</t>
      </section>
      <section anchor="overview">
        <name>Overview</name>
        <t>This specification describes an alternative mechanism for proxying TCP in HTTP.  Like <xref target="CONNECT-UDP"/> and <xref target="CONNECT-IP"/>, the proxy service is identified by a URI Template.  Proxy interactions reuse standard HTTP components and semantics, avoiding changes to the core HTTP protocol.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="specification">
      <name>Specification</name>
      <t>A template-driven TCP transport proxy for HTTP is identified by a URI Template <xref target="RFC6570"/> containing variables named "target_host" and "target_port".  This URI Template and its variable values <bcp14>MUST</bcp14> meet all the same requirements as for UDP proxying (<xref section="2" sectionFormat="comma" target="RFC9298"/>), and are subject to the same validation rules.  The client <bcp14>MUST</bcp14> substitute the destination host and port number into this template to produce the request URI.</t>
      <section anchor="in-http11">
        <name>In HTTP/1.1</name>
        <t>In HTTP/1.1, the client uses the proxy by issuing a request as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The method <bcp14>SHALL</bcp14> be "GET".</t>
          </li>
          <li>
            <t>The request <bcp14>SHALL</bcp14> include a single "Host" header field containing the origin of the proxy.</t>
          </li>
          <li>
            <t>The request <bcp14>SHALL</bcp14> include a "Connection" header field with the value "Upgrade".  (Note that this requirement is case-insensitive as per <xref section="7.6.1" sectionFormat="of" target="RFC9110"/>.)</t>
          </li>
          <li>
            <t>The request <bcp14>SHALL</bcp14> include an "Upgrade" header field with the value "connect-tcp".</t>
          </li>
          <li>
            <t>The request's target <bcp14>SHALL</bcp14> correspond to the URI derived from expansion of the proxy's URI Template.</t>
          </li>
        </ul>
        <t>If the request is well-formed and permissible, the proxy <bcp14>MUST</bcp14> attempt to establish the TCP connection before sending any response status code other than "100 (Continue)" (see <xref target="conveying-metadata"/>).  If the TCP connection is successful, the response <bcp14>SHALL</bcp14> be as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The HTTP status code <bcp14>SHALL</bcp14> be "101 (Switching Protocols)".</t>
          </li>
          <li>
            <t>The response <bcp14>SHALL</bcp14> include a "Connection" header field with the value "Upgrade".</t>
          </li>
          <li>
            <t>The response <bcp14>SHALL</bcp14> include a single "Upgrade" header field with the value "connect-tcp".</t>
          </li>
        </ul>
        <t>If the request is malformed or impermissible, the proxy <bcp14>MUST</bcp14> return a 4XX error code.  If a TCP connection was not established, the proxy <bcp14>MUST NOT</bcp14> switch protocols to "connect-tcp", and the client <bcp14>MAY</bcp14> reuse this connection for additional HTTP requests.</t>
        <t>After a success response is returned, the connection <bcp14>SHALL</bcp14> conform to all the usual requirements for classic CONNECT proxies in HTTP/1.1 (<xref section="9.3.6" sectionFormat="comma" target="RFC9110"/>).  Additionally, if the proxy observes a connection error from the client (e.g., a TCP RST, TCP timeout, or TLS error), it <bcp14>SHOULD</bcp14> send a TCP RST to the target.  If the proxy observes a connection error from the target, it <bcp14>SHOULD</bcp14> send a TLS "internal_error" alert to the client, or set the TCP RST bit if TLS is not in use.  These behaviors avoid truncation of transfers between the client and the target on vulnerable protocols (e.g., HTTP/1.1 without TLS) while preserving the confidentiality and integrity guarantees of the "https" scheme.</t>
        <figure>
          <name>Templated TCP proxy example in HTTP/1.1</name>
          <artwork><![CDATA[
Client                                                 Proxy

GET /proxy?target_host=192.0.2.1&target_port=443 HTTP/1.1
Host: example.com
Connection: Upgrade
Upgrade: connect-tcp

** Proxy establishes a TCP connection to 192.0.2.1:443 **

                            HTTP/1.1 101 Switching Protocols
                            Connection: Upgrade
                            Upgrade: connect-tcp
]]></artwork>
        </figure>
      </section>
      <section anchor="in-http2-and-http3">
        <name>In HTTP/2 and HTTP/3</name>
        <t>In HTTP/2 and HTTP/3, the proxy <bcp14>MUST</bcp14> include SETTINGS_ENABLE_CONNECT_PROTOCOL in its SETTINGS frame <xref target="RFC8441"/><xref target="RFC9220"/>.  The client uses the proxy by issuing an "extended CONNECT" request as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The :method pseudo-header field <bcp14>SHALL</bcp14> be "CONNECT".</t>
          </li>
          <li>
            <t>The :protocol pseudo-header field <bcp14>SHALL</bcp14> be "connect-tcp".</t>
          </li>
          <li>
            <t>The :authority pseudo-header field <bcp14>SHALL</bcp14> contain the authority of the proxy.</t>
          </li>
          <li>
            <t>The :path and :scheme pseudo-header fields <bcp14>SHALL</bcp14> contain the path and scheme of the request URI derived from the proxy's URI Template.</t>
          </li>
        </ul>
        <t>From this point on, the request and response <bcp14>SHALL</bcp14> conform to all the usual requirements for classic CONNECT proxies in this HTTP version (see <xref section="8.5" sectionFormat="of" target="RFC9113"/> and <xref section="4.4" sectionFormat="of" target="RFC9114"/>).</t>
        <t>A templated TCP proxying request that does not conform to all of these requirements represents a client error (see <xref section="15.5" sectionFormat="comma" target="RFC9110"/>) and may be malformed (see <xref section="8.1.1" sectionFormat="of" target="RFC9113"/> and <xref section="4.1.2" sectionFormat="of" target="RFC9114"/>).</t>
        <figure>
          <name>Templated TCP proxy example in HTTP/2</name>
          <artwork><![CDATA[
HEADERS
:method = CONNECT
:scheme = https
:authority = request-proxy.example
:path = /proxy?target_host=2001%3Adb8%3A%3A1&target_port=443
:protocol = connect-tcp
...
]]></artwork>
        </figure>
      </section>
      <section anchor="use-of-relevant-headers">
        <name>Use of Relevant Headers</name>
        <section anchor="origin-scoped-headers">
          <name>Origin-scoped Headers</name>
          <t>Ordinary HTTP headers apply only to the single resource identified in the request or response.  An origin-scoped HTTP header is a special response header that is intended to change the client's behavior for subsequent requests to any resource on this origin.</t>
          <t>Unlike classic HTTP CONNECT proxies, a templated TCP proxy has an unambiguous origin of its own.  Origin-scoped headers apply to this origin when they are associated with a templated TCP proxy response.  Here are some origin-scoped headers that could potentially be sent by a templated TCP proxy:</t>
          <ul spacing="normal">
            <li>
              <t>"Alt-Svc" <xref target="RFC7838"/></t>
            </li>
            <li>
              <t>"Strict-Transport-Security" <xref target="RFC6797"/></t>
            </li>
            <li>
              <t>"Public-Key-Pins" <xref target="RFC7469"/></t>
            </li>
            <li>
              <t>"Accept-CH" <xref target="RFC8942"/></t>
            </li>
            <li>
              <t>"Set-Cookie" <xref target="RFC6265"/>, which has configurable scope.</t>
            </li>
            <li>
              <t>"Clear-Site-Data" <xref target="CLEAR-SITE-DATA"/></t>
            </li>
          </ul>
        </section>
        <section anchor="authentication-headers">
          <name>Authentication Headers</name>
          <t>Authentication to a templated TCP proxy normally uses ordinary HTTP authentication via the "401 (Unauthorized)" response code, the "WWW-Authenticate" response header field, and the "Authorization" request header field (<xref section="11.6" sectionFormat="comma" target="RFC9110"/>).  A templated TCP proxy does not use the "407 (Proxy Authentication Required)" response code and related header fields (<xref section="11.7" sectionFormat="comma" target="RFC9110"/>) because they do not traverse HTTP gateways (see <xref target="operational-considerations"/>).</t>
          <t>Clients <bcp14>SHOULD</bcp14> assume that all proxy resources generated by a single template share a protection space (i.e., a realm) (<xref section="11.5" sectionFormat="comma" target="RFC9110"/>).  For many authentication schemes, this will allow the client to avoid waiting for a "401 (Unauthorized)" response before each new connection through the proxy.</t>
        </section>
      </section>
      <section anchor="relationship-to-the-capsule-protocol">
        <name>Relationship to the Capsule Protocol</name>
        <t>Unlike the datagram-oriented templated HTTP proxying specifications <xref target="CONNECT-UDP"/><xref target="CONNECT-IP"/>, this specification does not make use of the Capsule Protocol <xref target="RFC9297"/>.  A future specification could define a procedure for performing TCP proxying using the Capsule Protocol, but no such procedure is defined here.</t>
        <t>When implementing this specification, clients and servers <bcp14>MUST NOT</bcp14> send a "Capsule-Protocol: ?1" header field.</t>
      </section>
    </section>
    <section anchor="additional-connection-setup-behaviors">
      <name>Additional Connection Setup Behaviors</name>
      <t>This section discusses some behaviors that are permitted or recommended in order to enhance the performance or functionality of connection setup.</t>
      <section anchor="latency-optimizations">
        <name>Latency optimizations</name>
        <t>When using this specification in HTTP/2 or HTTP/3, clients <bcp14>MAY</bcp14> start sending TCP stream content optimistically, subject to flow control limits (<xref section="5.2" sectionFormat="of" target="RFC9113"/> or <xref section="4.1" sectionFormat="of" target="RFC9000"/>).  Proxies <bcp14>MUST</bcp14> buffer this "optimistic" content until the TCP stream becomes writable, and discard it if the TCP connection fails.  (Clients <bcp14>MUST NOT</bcp14> use "optimistic" behavior in HTTP/1.1, as this would interfere with reuse of the connection after an error response such as "401 (Unauthorized)".)</t>
        <t>Servers that host a proxy under this specification <bcp14>MAY</bcp14> offer support for TLS early data in accordance with <xref target="RFC8470"/>.  Clients <bcp14>MAY</bcp14> send "connect-tcp" requests in early data, and <bcp14>MAY</bcp14> include "optimistic" TCP content in early data (in HTTP/2 and HTTP/3).  At the TLS layer, proxies <bcp14>MAY</bcp14> ignore, reject, or accept the <tt>early_data</tt> extension (<xref section="4.2.10" sectionFormat="comma" target="RFC8446"/>).  At the HTTP layer, proxies <bcp14>MAY</bcp14> process the request immediately, return a "425 (Too Early)" response (<xref section="5.2" sectionFormat="comma" target="RFC8470"/>), or delay some or all processing of the request until the handshake completes.  For example, a proxy with limited anti-replay defenses might choose to perform DNS resolution of the <tt>target_host</tt> when a request arrives in early data, but delay the TCP connection until the TLS handshake completes.</t>
      </section>
      <section anchor="conveying-metadata">
        <name>Conveying metadata</name>
        <t>This specification supports the "Expect: 100-continue" request header (<xref section="10.1.1" sectionFormat="comma" target="RFC9110"/>) in any HTTP version.  The "100 (Continue)" status code confirms receipt of a request at the proxy without waiting for the proxy-destination TCP handshake to succeed or fail.  This might be particularly helpful when the destination host is not responding, as TCP handshakes can hang for several minutes before failing.  Clients <bcp14>MAY</bcp14> send "Expect: 100-continue", and proxies <bcp14>MUST</bcp14> respect it by returning "100 (Continue)" if the request is not immediately rejected.</t>
        <t>Proxies implementing this specification <bcp14>SHOULD</bcp14> include a "Proxy-Status" response header <xref target="RFC9209"/> in any success or failure response (i.e., status codes 101, 2XX, 4XX, or 5XX) to support advanced client behaviors and diagnostics.  In HTTP/2 or HTTP/3, proxies <bcp14>MAY</bcp14> additionally send a "Proxy-Status" trailer in the event of an unclean shutdown.</t>
      </section>
    </section>
    <section anchor="applicability">
      <name>Applicability</name>
      <section anchor="servers">
        <name>Servers</name>
        <t>For server operators, template-driven TCP proxies are particularly valuable in situations where virtual-hosting is needed, or where multiple proxies must share an origin.  For example, the proxy might benefit from sharing an HTTP gateway that provides DDoS defense, performs request sanitization, or enforces user authorization.</t>
        <t>The URI template can also be structured to generate high-entropy Capability URLs <xref target="CAPABILITY"/>, so that only authorized users can discover the proxy service.</t>
      </section>
      <section anchor="clients">
        <name>Clients</name>
        <t>Clients that support both classic HTTP CONNECT proxies and template-driven TCP proxies <bcp14>MAY</bcp14> accept both types via a single configuration string.  If the configuration string can be parsed as a URI Template containing the required variables, it is a template-driven TCP proxy.  Otherwise, it is presumed to represent a classic HTTP CONNECT proxy.</t>
        <t>In some cases, it is valuable to allow "connect-tcp" clients to reach "connect-tcp"-only proxies when using a legacy configuration method that cannot convey a URI Template.  To support this arrangement, clients <bcp14>SHOULD</bcp14> treat certain errors during classic HTTP CONNECT as indications that the proxy might only support "connect-tcp":</t>
        <ul spacing="normal">
          <li>
            <t>In HTTP/1.1: the response status code is "426 (Upgrade Required)", with an "Upgrade: connect-tcp" response header.</t>
          </li>
          <li>
            <t>In any HTTP version: the response status code is "501 (Not Implemented)".
            </t>
            <ul spacing="normal">
              <li>
                <t>Requires SETTINGS_ENABLE_CONNECT_PROTOCOL to have been negotiated in HTTP/2 or HTTP/3.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>If the client infers that classic HTTP CONNECT is not supported, it <bcp14>SHOULD</bcp14> retry the request using the registered default template for "connect-tcp":</t>
        <figure>
          <name>Registered default template</name>
          <artwork><![CDATA[
https://$PROXY_HOST:$PROXY_PORT/.well-known/masque
                 /tcp/{target_host}/{target_port}/
]]></artwork>
        </figure>
        <t>If this request succeeds, the client <bcp14>SHOULD</bcp14> record a preference for "connect-tcp" to avoid further retry delays.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Template-driven TCP proxying is largely subject to the same security risks as classic HTTP CONNECT.  For example, any restrictions on authorized use of the proxy (see <xref section="9.3.6" sectionFormat="comma" target="RFC9110"/>) apply equally to both.</t>
      <t>A small additional risk is posed by the use of a URI Template parser on the client side.  The template input string could be crafted to exploit any vulnerabilities in the parser implementation.  Client implementers should apply their usual precautions for code that processes untrusted inputs.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Templated TCP proxies can make use of standard HTTP gateways and path-routing to ease implementation and allow use of shared infrastructure.  However, current gateways might need modifications to support TCP proxy services.  To be compatible, a gateway must:</t>
      <ul spacing="normal">
        <li>
          <t>support Extended CONNECT (if acting as an HTTP/2 or HTTP/3 server).</t>
        </li>
        <li>
          <t>support HTTP/1.1 Upgrade to "connect-tcp" (if acting as an HTTP/1.1 server)
          </t>
          <ul spacing="normal">
            <li>
              <t>only after forwarding the upgrade request to the origin and observing a success response.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>forward the "connect-tcp" protocol to the origin.</t>
        </li>
        <li>
          <t>convert "connect-tcp" requests between all supported HTTP server and client versions.</t>
        </li>
        <li>
          <t>allow any "Proxy-Status" headers to traverse the gateway.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-upgrade-token">
        <name>New Upgrade Token</name>
        <t>IF APPROVED, IANA is requested to add the following entry to the HTTP Upgrade Token Registry:</t>
        <ul spacing="normal">
          <li>
            <t>Value: "connect-tcp"</t>
          </li>
          <li>
            <t>Description: Proxying of TCP payloads</t>
          </li>
          <li>
            <t>Reference: (This document)</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-template">
        <name>New MASQUE Default Template</name>
        <t>IF APPROVED, IANA is requested to add the following entry to the "MASQUE URI Suffixes" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Path Segment</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">tcp</td>
              <td align="left">TCP Proxying</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6570">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="RFC9298">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="RFC8441">
          <front>
            <title>Bootstrapping WebSockets with HTTP/2</title>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document defines a mechanism for running the WebSocket Protocol (RFC 6455) over a single stream of an HTTP/2 connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8441"/>
          <seriesInfo name="DOI" value="10.17487/RFC8441"/>
        </reference>
        <reference anchor="RFC9220">
          <front>
            <title>Bootstrapping WebSockets with HTTP/3</title>
            <author fullname="R. Hamilton" initials="R." surname="Hamilton"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9220"/>
          <seriesInfo name="DOI" value="10.17487/RFC9220"/>
        </reference>
        <reference anchor="RFC9113">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9114">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC8470">
          <front>
            <title>Using Early Data in HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="W. Tarreau" initials="W." surname="Tarreau"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>Using TLS early data creates an exposure to the possibility of a replay attack. This document defines mechanisms that allow clients to communicate with servers about HTTP requests that are sent in early data. Techniques are described that use these mechanisms to mitigate the risk of replay.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8470"/>
          <seriesInfo name="DOI" value="10.17487/RFC8470"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9209">
          <front>
            <title>The Proxy-Status HTTP Response Header Field</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P. Sikora" initials="P." surname="Sikora"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document defines the Proxy-Status HTTP response field to convey the details of an intermediary's response handling, including generated errors.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9209"/>
          <seriesInfo name="DOI" value="10.17487/RFC9209"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CAPABILITY" target="https://www.w3.org/TR/capability-urls/">
          <front>
            <title>Good Practices for Capability URLs</title>
            <author>
              <organization/>
            </author>
            <date year="2014" month="February"/>
          </front>
        </reference>
        <reference anchor="CLEAR-SITE-DATA" target="https://www.w3.org/TR/clear-site-data/">
          <front>
            <title>Clear Site Data</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="November"/>
          </front>
        </reference>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
        <reference anchor="RFC9297">
          <front>
            <title>HTTP Datagrams and the Capsule Protocol</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="L. Pardue" initials="L." surname="Pardue"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection.</t>
              <t>In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.</t>
              <t>HTTP Datagrams and the Capsule Protocol are intended for use by HTTP extensions, not applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9297"/>
          <seriesInfo name="DOI" value="10.17487/RFC9297"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="J. Reschke" initials="J." surname="Reschke"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="RFC6797">
          <front>
            <title>HTTP Strict Transport Security (HSTS)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <author fullname="C. Jackson" initials="C." surname="Jackson"/>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>This specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections. This overall policy is referred to as HTTP Strict Transport Security (HSTS). The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6797"/>
          <seriesInfo name="DOI" value="10.17487/RFC6797"/>
        </reference>
        <reference anchor="RFC7469">
          <front>
            <title>Public Key Pinning Extension for HTTP</title>
            <author fullname="C. Evans" initials="C." surname="Evans"/>
            <author fullname="C. Palmer" initials="C." surname="Palmer"/>
            <author fullname="R. Sleevi" initials="R." surname="Sleevi"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document defines a new HTTP header that allows web host operators to instruct user agents to remember ("pin") the hosts' cryptographic identities over a period of time. During that time, user agents (UAs) will require that the host presents a certificate chain including at least one Subject Public Key Info structure whose fingerprint matches one of the pinned fingerprints for that host. By effectively reducing the number of trusted authorities who can authenticate the domain during the lifetime of the pin, pinning may reduce the incidence of man-in-the-middle attacks due to compromised Certification Authorities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7469"/>
          <seriesInfo name="DOI" value="10.17487/RFC7469"/>
        </reference>
        <reference anchor="RFC8942">
          <front>
            <title>HTTP Client Hints</title>
            <author fullname="I. Grigorik" initials="I." surname="Grigorik"/>
            <author fullname="Y. Weiss" initials="Y." surname="Weiss"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>HTTP defines proactive content negotiation to allow servers to select the appropriate response for a given request, based upon the user agent's characteristics, as expressed in request headers. In practice, user agents are often unwilling to send those request headers, because it is not clear whether they will be used, and sending them impacts both performance and privacy.</t>
              <t>This document defines an Accept-CH response header that servers can use to advertise their use of request headers for proactive content negotiation, along with a set of guidelines for the creation of such headers, colloquially known as "Client Hints."</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8942"/>
          <seriesInfo name="DOI" value="10.17487/RFC8942"/>
        </reference>
        <reference anchor="RFC6265">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
      </references>
    </references>
    <?line 251?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Amos Jeffries, Tommy Pauly, Kyle Nekritz, David Schinazi, and Kazuho Oku for close review and suggested changes.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
