<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-masque-connect-udp-listen-09" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="CONNECT-UDP Bind">Proxying Bound UDP in HTTP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-masque-connect-udp-listen-09"/>
    <author initials="D." surname="Schinazi" fullname="David Schinazi">
      <organization>Google LLC</organization>
      <address>
        <email>dschinazi.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="A." surname="Singh" fullname="Abhi Singh">
      <organization>Google LLC</organization>
      <address>
        <email>abhisinghietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="14"/>
    <area>Transport</area>
    <workgroup>MASQUE</workgroup>
    <keyword>quic</keyword>
    <keyword>http</keyword>
    <keyword>datagram</keyword>
    <keyword>udp</keyword>
    <keyword>proxy</keyword>
    <keyword>tunnels</keyword>
    <keyword>quic in quic</keyword>
    <keyword>turtles all the way down</keyword>
    <keyword>masque</keyword>
    <keyword>http-ng</keyword>
    <keyword>listen</keyword>
    <keyword>bind</keyword>
    <abstract>
      <?line 53?>

<t>The mechanism to proxy UDP in HTTP only allows each UDP proxying request to
transmit to a specific host and port. This is well suited for UDP
client-server protocols such as HTTP/3, but is not sufficient for some UDP
peer-to-peer protocols like WebRTC. This document proposes an extension to
UDP proxying in HTTP that enables such use-cases.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-masque.github.io/draft-ietf-masque-connect-udp-listen/draft-ietf-masque-connect-udp-listen.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-masque-connect-udp-listen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MASQUE Working Group mailing list (<eref target="mailto:masque@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/masque/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/masque/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-masque/draft-ietf-masque-connect-udp-listen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The mechanism to proxy UDP in HTTP <xref target="CONNECT-UDP"/> allows creating
tunnels for communicating UDP payloads <xref target="UDP"/> to a fixed host and
port. Combined with the HTTP CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), it allows proxying the majority of a Web Browser's HTTP
traffic. However WebRTC <xref target="WebRTC"/> relies on ICE <xref target="ICE"/> to provide
connectivity between two Web browsers, and ICE relies on the ability to send
and receive UDP packets to multiple hosts. While in theory it might be
possible to accomplish this using multiple UDP proxying HTTP requests, HTTP
semantics <xref target="HTTP"/> do not guarantee that distinct requests will be handled
by the same server. This can lead to the UDP packets being sent from
distinct IP addresses, thereby preventing ICE from operating correctly.
Consequently, UDP proxying requests cannot enable WebRTC connectivity
between peers.</t>
      <t>This document describes an extension to UDP Proxying in HTTP that allows
sending and receiving UDP payloads to multiple hosts within the scope of a
single UDP proxying HTTP request.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document uses terminology from <xref target="CONNECT-UDP"/> and notational
conventions from <xref target="QUIC"/>. This document uses the terms Boolean,
Integer, List, and String from <xref section="3" sectionFormat="of" target="STRUCTURED-FIELDS"/>
to specify syntax and parsing. This document uses Augmented Backus-Naur Form
and parsing/serialization behaviors from <xref target="ABNF"/>.</t>
      </section>
    </section>
    <section anchor="mechanism">
      <name>Bound UDP Proxying Mechanism</name>
      <t>In unextended UDP proxying requests, the target host is encoded in the HTTP
request path or query. For bound UDP proxying, the target is either conveyed
in each HTTP Datagram (see <xref target="fmt-dgram-uncomp"/>), or registered via capsules
and then compressed (see <xref target="fmt-capsule-assign"/>).</t>
      <t>When performing URI Template Expansion of the UDP proxying template (see
<xref section="3" sectionFormat="of" target="CONNECT-UDP"/>), the client follows the same template as
unextended UDP proxying and sets the "target_host" and the "target_port"
variables to one of its targets. It adds the Connect-UDP-Bind header as
specified in <xref target="hdr"/> to request bind. If the proxy supports bound UDP
proxying, it returns the Connect-UDP-Bind response header value set to true.</t>
      <t>When "target_host" and "target_port" are set to a valid target, the client
is requesting bound UDP proxying but would accept fallback to unextended
UDP proxying to that target. If the client doesn't have a specific target, or
if it wants bound UDP proxying without fallback, it sets both the "target_host" and
the "target_port" variables to the '<tt>*</tt>' character (ASCII
character 0x2A). Note that the '<tt>*</tt>' character <bcp14>MUST</bcp14> be percent-encoded
before sending, per <xref section="3.2.2" sectionFormat="of" target="TEMPLATE"/>.</t>
    </section>
    <section anchor="contextid">
      <name>Context Identifiers</name>
      <t>As with unextended UDP proxying, the semantics of HTTP Datagrams are
conveyed by Context IDs (see <xref section="4" sectionFormat="of" target="CONNECT-UDP"/>). Endpoints first
allocate a new Context ID (per <xref target="CONNECT-UDP"/>, clients allocate even
Context IDs while proxies allocate odd ones), and then use the
COMPRESSION_ASSIGN capsule (see <xref target="capsule-assign"/>) to convey the semantics
of the new Context ID to their peer. This process is known as registering
the Context ID.</t>
      <t>Each Context ID can have either compressed or uncompressed semantics. The
uncompressed variant encodes the target IP and port into each HTTP Datagram.
Conversely, the compressed variant exchanges the target IP and port once in
the capsule during registration, and then relies on shared state to map from
the Context ID to the IP and port.</t>
      <t>Context ID 0 was reserved by unextended UDP proxying to represent UDP
payloads sent to and from the "target_host" and "target_port" from the URI
template. When the mechanism from this document is in use:</t>
      <ul spacing="normal">
        <li>
          <t>if the "target_host" and "target_port" variables are set to '<tt>*</tt>', then
context ID 0 <bcp14>MUST NOT</bcp14> be used in HTTP Datagrams.</t>
        </li>
        <li>
          <t>otherwise, HTTP Datagrams with context ID 0 have the same semantics as in
unextended UDP proxying.</t>
        </li>
      </ul>
      <section anchor="capsule-assign">
        <name>The COMPRESSION_ASSIGN capsule</name>
        <t>The Compression Assign capsule (capsule type 0x11) is used to register the
semantics of a Context ID. It has the following format:</t>
        <figure anchor="fmt-capsule-assign">
          <name>Compression Assign Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_ASSIGN Capsule {
  Type (i) = 0x11,
  Length (i),
  Context ID (i),
  IP Version (8),
  [IP Address (32..128)],
  [UDP Port (16)],
}
]]></artwork>
        </figure>
        <t>It contains the following fields:</t>
        <dl>
          <dt>IP Version:</dt>
          <dd>
            <t>The IP Version of the following IP Address field. <bcp14>MUST</bcp14> be 0, 4 or 6.
Setting this to zero indicates that this capsule registers an uncompressed
context. Otherwise, the capsule registers a compressed context for the IP
address and UDP port it carries.</t>
          </dd>
          <dt>IP Address:</dt>
          <dd>
            <t>The IP Address of this context. This field is omitted if the IP Version
field is set to 0. Otherwise, it has a length of 32 bits when the
corresponding IP Version field value is 4, and 128 when the IP Version is 6.</t>
          </dd>
          <dt>UDP Port:</dt>
          <dd>
            <t>The UDP Port of this context, in network byte order. This field is omitted
if the IP Version field is set to 0.</t>
          </dd>
        </dl>
        <t>When an endpoint receives a COMPRESSION_ASSIGN capsule, it <bcp14>MUST</bcp14> either
accept or reject the corresponding registration:</t>
        <ul spacing="normal">
          <li>
            <t>if it accepts the registration, first the receiver <bcp14>MUST</bcp14> save the mapping
from Context ID to address and port (or save the fact that this context ID
is uncompressed). Second, the receiver <bcp14>MUST</bcp14> return a COMPRESSION_ACK
capsule with the Context ID set to the one from the received
COMPRESSION_ASSIGN capsule back to its peer, indicating it has accepted
the registration.</t>
          </li>
          <li>
            <t>if it rejects the registration, the receiver <bcp14>MUST</bcp14> respond by sending a
COMPRESSION_CLOSE capsule with the Context ID set to the one from the
received COMPRESSION_ASSIGN capsule.</t>
          </li>
        </ul>
        <t>As mandated in <xref section="4" sectionFormat="of" target="CONNECT-UDP"/>, clients can only allocate even
Context IDs, while proxies can only allocate odd ones. Since the value 0 was
reserved by unextended UDP proxying, the Context ID value of
COMPRESSION_ASSIGN can never be zero.</t>
        <t>Endpoints <bcp14>MUST NOT</bcp14> send two COMPRESSION_ASSIGN capsules with the same
Context ID. If a recipient detects a repeated Context ID, it <bcp14>MUST</bcp14> treat the
capsule as malformed. Receipt of a malformed capsule <bcp14>MUST</bcp14> be treated as an
error processing the Capsule Protocol, as defined in <xref section="3.3" sectionFormat="of" target="HTTP-DGRAM"/>.</t>
        <t>If the uncompressed context is closed, the proxy <bcp14>MUST NOT</bcp14> open new
compressed contexts. In such a case, the proxy opening contexts results in
tuples not desired by the client reaching it thereby nullifying the IP
restriction property of uncompressed compression close as described in
<xref target="restricting-ips"/>.</t>
        <t>Only one Context ID can be used per IP-port tuple. If an endpoint detects
that both it and its peer have opened a Context ID for the same tuple, the
endpoint <bcp14>MUST</bcp14> close the Context ID that was opened by the proxy. If an
endpoint receives a COMPRESSION_ASSIGN capsule whose tuple matches another
open Context ID, it <bcp14>MUST</bcp14> treat the capsule as malformed.</t>
        <t>Endpoints <bcp14>MAY</bcp14> pre-emptively use Context IDs not yet acknowledged by the peer
via COMPRESSION_ACK, knowing that those HTTP Datagrams can be dropped if
they arrive before the corresponding COMPRESSION_ASSIGN capsule, or if the
peer rejects the registration.</t>
      </section>
      <section anchor="capsule-ack">
        <name>The COMPRESSION_ACK capsule</name>
        <t>The Compression Acknowledgment capsule (capsule type 0x12) serves to confirm
registration of a context ID that was received via a COMPRESSION_ASSIGN
capsule.</t>
        <figure anchor="fmt-capsule-ack">
          <name>Compression Acknowledgment Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_ACK Capsule {
  Type (i) = 0x12,
  Length (i),
  Context ID (i),
}
]]></artwork>
        </figure>
        <t>An endpoint can only send a COMPRESSION_ACK capsule if it received a
COMPRESSION_ASSIGN capsule with the same Context ID. If an endpoint receives
COMPRESSION_ACK capsule for a context ID it did not attempt to register via
COMPRESSION_ASSIGN, that capsule is considered malformed.</t>
      </section>
      <section anchor="capsule-close">
        <name>The COMPRESSION_CLOSE capsule</name>
        <t>The Compression Close capsule (capsule type 0x13) serves two purposes. It
can be sent as a direct response to a received COMPRESSION_ASSIGN capsule,
to indicate that the registration was rejected. It can also be sent later to
indicate the closure of a previously assigned registration.</t>
        <figure anchor="fmt-capsule-close">
          <name>Compression Close Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_CLOSE Capsule {
  Type (i) = 0x13,
  Length (i),
  Context ID (i),
}
]]></artwork>
        </figure>
        <t>Once an endpoint has either sent or received a COMPRESSION_CLOSE for a given
Context ID, it <bcp14>MUST NOT</bcp14> send any further datagrams with that Context ID.
Since the value 0 was reserved by unextended UDP proxying, a
COMPRESSION_CLOSE capsule with Context ID set to zero is malformed.</t>
        <t>Endpoints <bcp14>MAY</bcp14> close any context regardless of which endpoint registered it.
This is useful for example, when a mapping is unused for a long time.
Another potential use is restricting some targets (see <xref target="restricting-ips"/>).</t>
        <t>Once a registration is closed, endpoints can instead use an uncompressed
Context ID to exchange UDP payloads for the given target, if such a context
has been registered (see <xref target="uncompressed"/>).</t>
      </section>
    </section>
    <section anchor="uncompressed">
      <name>Uncompressed Operation</name>
      <t>If the client wishes to send or receive uncompressed datagrams, it <bcp14>MUST</bcp14>
first send a COMPRESSION_ASSIGN capsule (see <xref target="fmt-capsule-assign"/>) to the
proxy with the IP Version set to zero. This registers the Context ID as
being uncompressed semantics: all HTTP Datagrams with this Context ID have
the following format:</t>
      <figure anchor="fmt-dgram-uncomp">
        <name>Uncompressed Bound UDP Proxying HTTP Datagram Format</name>
        <artwork><![CDATA[
Uncompressed Bound UDP Proxying Payload {
  IP Version (8),
  IP Address (32..128),
  UDP Port (16),
  UDP Payload (..),
}
]]></artwork>
      </figure>
      <t>It contains the following fields:</t>
      <dl>
        <dt>IP Version:</dt>
        <dd>
          <t>The IP Version of the following IP Address field. <bcp14>MUST</bcp14> be 4 or 6.</t>
        </dd>
        <dt>IP Address:</dt>
        <dd>
          <t>The IP Address of this proxied UDP packet. When sent from client to proxy,
this is the target host to which the proxy will send this UDP payload. When
sent from proxy to client, this represents the source IP address of the UDP
packet received by the proxy. This field has a length of 32 bits when the
corresponding IP Version field value is 4, and 128 when the IP Version is 6.</t>
        </dd>
        <dt>UDP Port:</dt>
        <dd>
          <t>The UDP Port of this proxied UDP packet in network byte order. When sent
from client to proxy, this is the target port to which the proxy will send
this UDP payload. When sent from proxy to client, this represents the source
UDP port of the UDP packet received by the proxy.</t>
        </dd>
        <dt>UDP Payload:</dt>
        <dd>
          <t>The unmodified UDP Payload of this proxied UDP packet (referred to as
"data octets" in <xref target="UDP"/>).</t>
        </dd>
      </dl>
      <t>A client <bcp14>MUST NOT</bcp14> open an uncompressed Context ID if one is already open. If
a server receives a request to open an uncompressed Context ID and it
already has one open, then the server <bcp14>MUST</bcp14> treat the second capsule as
malformed. Note that it's possible for the client to close the uncompressed
context and reopen it later with a different Context ID, as long as there
aren't two uncompressed contexts open at the same time. Only the client can
request uncompressed contexts. If a client receives a COMPRESSION_ASSIGN
capsule with the IP Version set to 0, it <bcp14>MUST</bcp14> treat it as malformed.</t>
    </section>
    <section anchor="compressed-operation">
      <name>Compressed Operation</name>
      <t>Endpoints <bcp14>MAY</bcp14> choose to compress the IP and port information per datagram
for a given target using Context IDs. This is accomplished by registering a
compressed Context ID using the COMPRESSION_ASSIGN capsule (see
<xref target="fmt-capsule-assign"/>).</t>
      <t>If the Context ID in an HTTP Datagram matches one previously registered for
compressed operation, the rest of the HTTP Datagram represents the UDP
payload:</t>
      <figure anchor="fmt-dgram-comp">
        <name>Compressed Bound UDP Proxying HTTP Datagram Format</name>
        <artwork><![CDATA[
Compressed Bound UDP Proxying Payload {
  UDP Payload (..),
}
]]></artwork>
      </figure>
      <t>It contains the following field:</t>
      <dl>
        <dt>UDP Payload:</dt>
        <dd>
          <t>The unmodified UDP Payload of this proxied UDP packet (referred to as
"data octets" in <xref target="UDP"/>).</t>
        </dd>
      </dl>
    </section>
    <section anchor="hdr">
      <name>The Connect-UDP-Bind Header Field</name>
      <t>The "Connect-UDP-Bind" header field’s value is a Boolean Structured Field
set to true. Clients and proxy both indicate support for this extension by
sending the Connect-UDP-Bind header field with a value of <tt>?1</tt>. Once an
endpoint has both sent and received the Connect-UDP-Bind header field set to
true, this extension is enabled. Any other value type <bcp14>MUST</bcp14> be handled as if
the field were not present by the recipients (for example, if this field is
defined multiple times, its type becomes a List and therefore is to be
ignored). This document does not define any parameters for the
Connect-UDP-Bind header field value, but future documents might define
parameters. Receivers <bcp14>MUST</bcp14> ignore unknown parameters.</t>
    </section>
    <section anchor="addr-hdr">
      <name>The Proxy-Public-Address Response Header Field</name>
      <t>Upon accepting the request, the proxy <bcp14>MUST</bcp14> select at least one public IP
address to bind. The proxy <bcp14>MAY</bcp14> assign more addresses. For each selected
address, it <bcp14>MUST</bcp14> select an open port to bind to this request. From then and
until the tunnel is closed, the proxy <bcp14>SHALL</bcp14> send packets received on these
IP-port tuples to the client. The proxy <bcp14>MUST</bcp14> communicate the selected
addresses and ports to the client using the "Proxy-Public-Address" header
field. The header field is a List. Each member of the List is a String,
comprised of the ip-port tuple. The format of the String is defined using
IP-literal, IPv4address, and port from <xref section="3.2" sectionFormat="of" target="URI"/>.</t>
      <figure anchor="target-format">
        <name>Proxy Address Format</name>
        <artwork><![CDATA[
ip-port-tuple = DQUOTE ( IP-literal / IPv4address ) ":" port DQUOTE
]]></artwork>
      </figure>
      <t>When a single IP-Port tuple is provided in the Proxy-Public-Address field,
the proxy <bcp14>MUST</bcp14> use the same public IP and Port for the remainder of the
connection. When multiple tuples are provided, maintaining address stability
per address family is <bcp14>RECOMMENDED</bcp14>.</t>
      <t>Note that since the addresses are conveyed in HTTP response headers, a
subsequent change of addresses on the proxy cannot be conveyed to the client.</t>
      <t>If the proxy only shares IP addresses from a single address family, that
indicates that the proxy only supports that family. The client <bcp14>SHOULD NOT</bcp14>
attempt to register compressed contexts or send uncompressed datagrams
intended for targets whose IP address families were not indicated via the IP
addresses listed in the Proxy-Public-Address header field, as the proxy will
drop those datagrams and reject those registrations.</t>
    </section>
    <section anchor="behavior">
      <name>Proxy Behavior</name>
      <t>After accepting the bound UDP proxying request, the proxy uses an assigned
IP address and port to transmit UDP payloads received from the client to the
target IP Address and UDP Port specified in each HTTP Datagram received from
the client. The proxy uses the same ports to listen for UDP packets from any
authorized target and forwards them to the client by encapsulating them in
HTTP Datagrams, using the corresponding Context ID.</t>
      <t>If the proxy receives UDP payloads that don't correspond to any registration
(i.e., no compression for the given target was ever established and there is
no uncompressed registration), the proxy will either drop the datagram or
temporarily buffer it (see <xref section="5" sectionFormat="of" target="CONNECT-UDP"/>).</t>
      <section anchor="restricting-ips">
        <name>Restricting IPs</name>
        <t>If a client does not wish to receive datagrams from unknown senders, it can
close the uncompressed registration (or not open it in the first place). In
that scenario, the proxy effectively acts as a firewall against unwanted or
unknown IPs.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref section="7" sectionFormat="of" target="CONNECT-UDP"/> also
apply here. Since TURN can be run over this mechanism, implementors should
review the security considerations in <xref section="21" sectionFormat="of" target="TURN"/>.</t>
      <t>Since unextended UDP proxying requests carry the target as part of the
request, the proxy can protect unauthorized targets by rejecting requests
before creating the tunnel, and communicate the rejection reason in response
header fields. The uncompressed context allows transporting datagrams to and
from any target. Clients that keep the uncompressed context open need to be
able to receive from all targets. If the UDP proxy would reject unextended
UDP proxying requests to some targets (as recommended in <xref section="7" sectionFormat="of" target="CONNECT-UDP"/>), then for bound UDP proxying requests where the uncompressed
context is open, the UDP proxy needs to perform checks on the target of each
uncompressed context datagram it receives.</t>
      <t>Note that if the compression response (COMPRESSION_ACK OR COMPRESSION_CLOSE)
cannot be immediately sent due to flow or congestion control, an upper limit
on how many compression responses the endpoint is willing to buffer <bcp14>MUST</bcp14> be
set to prevent memory exhaustion. The proxy <bcp14>MUST</bcp14> abort the request stream if
this limit is reached.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>When moving traffic between uncompressed and compressed contexts, the
effective MTU will change. This can hinder Datagram Packetization Layer PMTU
Discovery (DPLPMTUD) between the client and the target
<xref target="DPLPMTUD"/>. To avoid that, if an endpoint intends to use
compression, it <bcp14>SHOULD</bcp14> request it as early as possible.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="iana-fields">
        <name>HTTP Fields</name>
        <t>This document will request IANA to register the following new items in the
"HTTP Field Name" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/http-fields"/>&gt;:</t>
        <table anchor="iana-fields-table">
          <name>New Fields</name>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Structured Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Connect-UDP-Bind</td>
              <td align="left">Item</td>
            </tr>
            <tr>
              <td align="left">Proxy-Public-Address</td>
              <td align="left">List</td>
            </tr>
          </tbody>
        </table>
        <t>All of these new entries use the following values for these fields:</t>
        <dl spacing="compact">
          <dt>Status:</dt>
          <dd>
            <t>provisional (permanent if this document is approved)</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Comments:</dt>
          <dd>
            <t>None</t>
          </dd>
        </dl>
      </section>
      <section anchor="iana-capsules">
        <name>Capsules</name>
        <t>This document will request IANA to register the following new items to the
"HTTP Capsule Types" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/masque"/>&gt;:</t>
        <table anchor="iana-capsules-table">
          <name>New Capsules</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Capsule Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x11</td>
              <td align="left">COMPRESSION_ASSIGN</td>
            </tr>
            <tr>
              <td align="left">0x13</td>
              <td align="left">COMPRESSION_ACK</td>
            </tr>
            <tr>
              <td align="left">0x14</td>
              <td align="left">COMPRESSION_CLOSE</td>
            </tr>
          </tbody>
        </table>
        <t>All of these new entries use the following values for these fields:</t>
        <dl spacing="compact">
          <dt>Status:</dt>
          <dd>
            <t>provisional (permanent if this document is approved)</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Change Controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Contact:</dt>
          <dd>
            <t>MASQUE Working Group <eref target="mailto:masque@ietf.org">masque@ietf.org</eref></t>
          </dd>
          <dt>Notes:</dt>
          <dd>
            <t>None</t>
          </dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="UDP">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="STRUCTURED-FIELDS">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P-H. Kamp" surname="P-H. Kamp"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields.</t>
              <t>This document obsoletes RFC 8941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9651"/>
          <seriesInfo name="DOI" value="10.17487/RFC9651"/>
        </reference>
        <reference anchor="ABNF">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="TEMPLATE">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="HTTP-DGRAM">
          <front>
            <title>HTTP Datagrams and the Capsule Protocol</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="L. Pardue" initials="L." surname="Pardue"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection.</t>
              <t>In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.</t>
              <t>HTTP Datagrams and the Capsule Protocol are intended for use by HTTP extensions, not applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9297"/>
          <seriesInfo name="DOI" value="10.17487/RFC9297"/>
        </reference>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="WebRTC" target="https://www.w3.org/TR/webrtc/">
          <front>
            <title>WebRTC</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January" day="26"/>
          </front>
          <seriesInfo name="W3C" value="Recommendation"/>
        </reference>
        <reference anchor="ICE">
          <front>
            <title>Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal</title>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>This document describes a protocol for Network Address Translator (NAT) traversal for UDP-based communication. This protocol is called Interactive Connectivity Establishment (ICE). ICE makes use of the Session Traversal Utilities for NAT (STUN) protocol and its extension, Traversal Using Relay NAT (TURN).</t>
              <t>This document obsoletes RFC 5245.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8445"/>
          <seriesInfo name="DOI" value="10.17487/RFC8445"/>
        </reference>
        <reference anchor="TURN">
          <front>
            <title>Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)</title>
            <author fullname="T. Reddy" initials="T." role="editor" surname="Reddy"/>
            <author fullname="A. Johnston" initials="A." role="editor" surname="Johnston"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>If a host is located behind a NAT, it can be impossible for that host to communicate directly with other hosts (peers) in certain situations. In these situations, it is necessary for the host to use the services of an intermediate node that acts as a communication relay. This specification defines a protocol, called "Traversal Using Relays around NAT" (TURN), that allows the host to control the operation of the relay and to exchange packets with its peers using the relay. TURN differs from other relay control protocols in that it allows a client to communicate with multiple peers using a single relay address.</t>
              <t>The TURN protocol was designed to be used as part of the Interactive Connectivity Establishment (ICE) approach to NAT traversal, though it can also be used without ICE.</t>
              <t>This document obsoletes RFCs 5766 and 6156.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8656"/>
          <seriesInfo name="DOI" value="10.17487/RFC8656"/>
        </reference>
        <reference anchor="DPLPMTUD">
          <front>
            <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
            <author fullname="T. Völker" initials="T." surname="Völker"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
              <t>The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
              <t>This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8899"/>
          <seriesInfo name="DOI" value="10.17487/RFC8899"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
      </references>
    </references>
    <?line 521?>

<section anchor="example">
      <name>Example</name>
      <t>In the example below, the client is configured with URI Template
"https://example.org/.well-known/masque/udp/{target_host}/{target_port}/"
and listens for traffic on the proxy, eventually decides that it no longer
wants to listen for connections from new targets, and limits its
communication with only 203.0.113.11:4321 and no other UDP target.</t>
      <artwork><![CDATA[
 Client                                             Server

 STREAM(44): HEADERS            -------->
   :method = CONNECT
   :protocol = connect-udp
   :scheme = https
   :path = /.well-known/masque/udp/%2A/%2A/
   :authority = proxy.example.org
   connect-udp-bind = ?1
   capsule-protocol = ?1

            <--------  STREAM(44): HEADERS
                         :status = 200
                         connect-udp-bind = ?1
                         capsule-protocol = ?1
                         proxy-public-address = "192.0.2.45:54321",  \
                                            "[2001:db8::1234]:54321"

// Register Context ID 2 to be used for uncompressed UDP payloads
// to/from any target.

 CAPSULE                       -------->
   Type = COMPRESSION_ASSIGN
   Context ID = 2
   IP Version = 0

// Proxy confirms registration.

            <-------- CAPSULE
                        Type = COMPRESSION_ACK
                        Context ID = 2

// Target talks to Client using the uncompressed context.

            <--------  DATAGRAM
                         Quarter Stream ID = 11
                         Context ID = 2
                         IP Version = 4
                         IP Address = 192.0.2.42
                         UDP Port = 1234
                         UDP Payload = Encapsulated UDP Payload

// Client responds on the same uncompressed context.

 DATAGRAM                       -------->
   Quarter Stream ID = 11
   Context ID = 2
   IP Version = 4
   IP Address = 192.0.2.42
   UDP Port = 1234
   UDP Payload = Encapsulated UDP Payload

// Another target talks to Client using the uncompressed context.

            <--------  DATAGRAM
                         Quarter Stream ID = 11
                         Context ID = 2
                         IP Version = 4
                         IP Address = 203.0.113.11
                         UDP Port = 4321
                         UDP Payload = Encapsulated UDP Payload

// Client responds on the same uncompressed context.

 DATAGRAM                       -------->
   Quarter Stream ID = 11
   Context ID = 2
   IP Version = 4
   IP Address = 203.0.113.11
   UDP Port = 4321
   UDP Payload = Encapsulated UDP Payload

// Register 203.0.113.11:4321 to compress it in the future.

 CAPSULE                       -------->
   Type = COMPRESSION_ASSIGN
   Context ID = 4
   IP Version = 4
   IP Address = 203.0.113.11
   UDP Port = 4321


// Proxy confirms registration.

            <-------- CAPSULE
                        Type = COMPRESSION_ACK
                        Context ID = 4

// Omit IP and Port for future packets intended for
// 203.0.113.11:4321 hereon.

 DATAGRAM                       -------->
   Context ID = 4
   UDP Payload = Encapsulated UDP Payload

            <--------  DATAGRAM
                        Context ID = 4
                        UDP Payload = Encapsulated UDP Payload

// Request packets without a corresponding compressed Context
// to be dropped by closing the uncompressed Context.

 CAPSULE                       -------->
   Type = COMPRESSION_CLOSE
   Context ID = 2

// Context ID 4 = 203.0.113.11:4321 traffic is accepted,
// and other traffic is dropped at the proxy.
]]></artwork>
    </section>
    <section anchor="comparison-with-connect-ip">
      <name>Comparison with CONNECT-IP</name>
      <t>While the use-cases described in <xref target="intro"/> could be supported using IP
proxying in HTTP <xref target="CONNECT-IP"/>, it would require that every HTTP
Datagram carries a complete IP header. This would lead to both
inefficiencies in the wire encoding and reduction in available Maximum
Transmission Unit (MTU). Furthermore, Web browsers would need to support
IPv4 and IPv6 header generation, parsing, validation and error handling.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This proposal is the result of many conversations with MASQUE working group
participants. In particular, the authors would like to thank <contact fullname="Marius Kleidl"/>, <contact fullname="Tommy Pauly"/>, <contact fullname="Lucas Pardue"/>, <contact fullname="Ben Schwartz"/>,
<contact fullname="Marten Seemann"/>, and <contact fullname="Magnus Westerlund"/> for their reviews.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
