<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-masque-connect-udp-listen-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="CONNECT-UDP Bind">Proxying Bound UDP in HTTP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-masque-connect-udp-listen-10"/>
    <author initials="D." surname="Schinazi" fullname="David Schinazi">
      <organization>Google LLC</organization>
      <address>
        <email>dschinazi.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="A." surname="Singh" fullname="Abhi Singh">
      <organization>Google LLC</organization>
      <address>
        <email>abhisinghietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="17"/>
    <area>Transport</area>
    <workgroup>MASQUE</workgroup>
    <keyword>quic</keyword>
    <keyword>http</keyword>
    <keyword>datagram</keyword>
    <keyword>udp</keyword>
    <keyword>proxy</keyword>
    <keyword>tunnels</keyword>
    <keyword>quic in quic</keyword>
    <keyword>turtles all the way down</keyword>
    <keyword>masque</keyword>
    <keyword>http-ng</keyword>
    <keyword>listen</keyword>
    <keyword>bind</keyword>
    <abstract>
      <?line 53?>

<t>The mechanism to proxy UDP in HTTP only allows each UDP proxying request to
transmit to a specific host and port. This is well suited for UDP
client-server protocols such as HTTP/3, but is not sufficient for some UDP
peer-to-peer protocols like WebRTC. This document proposes an extension to
UDP proxying in HTTP that enables such use-cases.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-masque.github.io/draft-ietf-masque-connect-udp-listen/draft-ietf-masque-connect-udp-listen.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-masque-connect-udp-listen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MASQUE Working Group mailing list (<eref target="mailto:masque@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/masque/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/masque/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-masque/draft-ietf-masque-connect-udp-listen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The mechanism to proxy UDP in HTTP <xref target="CONNECT-UDP"/> allows creating
tunnels for communicating UDP payloads <xref target="UDP"/> to a fixed host and
port. Combined with the HTTP CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), it allows proxying the majority of a Web Browser's HTTP
traffic. However WebRTC <xref target="WebRTC"/> relies on ICE <xref target="ICE"/> to provide
connectivity between two Web browsers, and ICE relies on the ability to send
and receive UDP packets to multiple hosts. While in theory it might be
possible to accomplish this using multiple UDP proxying HTTP requests, HTTP
semantics <xref target="HTTP"/> do not guarantee that distinct requests will be handled
by the same server. This can lead to the UDP packets being sent from
distinct IP addresses, thereby preventing ICE from operating correctly.
Consequently, UDP proxying requests cannot enable WebRTC connectivity
between peers.</t>
      <t>This document describes an extension to UDP Proxying in HTTP that allows
sending and receiving UDP payloads to multiple hosts within the scope of a
single UDP proxying HTTP request.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document uses terminology from <xref target="CONNECT-UDP"/> and notational
conventions from <xref target="QUIC"/>. This document uses the terms Boolean,
Integer, List, and String from <xref section="3" sectionFormat="of" target="STRUCTURED-FIELDS"/>
to specify syntax and parsing. This document uses Augmented Backus-Naur Form
and parsing/serialization behaviors from <xref target="ABNF"/>.</t>
      </section>
    </section>
    <section anchor="mechanism">
      <name>Bound UDP Proxying Mechanism</name>
      <t>In unextended UDP proxying requests, the target host is encoded in the HTTP
request path or query. For bound UDP proxying, the target is either conveyed
in each HTTP Datagram (see <xref target="fmt-dgram-uncomp"/>), or registered via capsules
and then compressed (see <xref target="fmt-capsule-assign"/>).</t>
      <t>When performing URI Template Expansion of the UDP proxying template (see
<xref section="3" sectionFormat="of" target="CONNECT-UDP"/>), the client follows the same template as
unextended UDP proxying and sets the "target_host" and the "target_port"
variables to one of its targets. It adds the Connect-UDP-Bind header as
specified in <xref target="hdr"/> to request bind. If the proxy supports bound UDP
proxying, it returns the Connect-UDP-Bind response header value set to true.</t>
      <t>When "target_host" and "target_port" are set to a valid target, the client
is requesting bound UDP proxying but would accept fallback to unextended
UDP proxying to that target. If the client doesn't have a specific target, or
if it wants bound UDP proxying without fallback, it sets both the "target_host" and
the "target_port" variables to the '<tt>*</tt>' character (ASCII
character 0x2A). Note that the '<tt>*</tt>' character <bcp14>MUST</bcp14> be percent-encoded
before sending, per <xref section="3.2.2" sectionFormat="of" target="TEMPLATE"/>.</t>
    </section>
    <section anchor="contextid">
      <name>Context Identifiers</name>
      <t>As with unextended UDP proxying, the semantics of HTTP Datagrams are
conveyed by Context IDs (see <xref section="4" sectionFormat="of" target="CONNECT-UDP"/>). Endpoints first
allocate a new Context ID (per <xref target="CONNECT-UDP"/>, clients allocate even
Context IDs while proxies allocate odd ones), and then use the
COMPRESSION_ASSIGN capsule (see <xref target="capsule-assign"/>) to convey the semantics
of the new Context ID to their peer. This process is known as registering
the Context ID.</t>
      <t>Each Context ID can have either compressed or uncompressed semantics. The
uncompressed variant encodes the target IP and port into each HTTP Datagram.
Conversely, the compressed variant exchanges the target IP and port once in
the capsule during registration, and then relies on shared state to map from
the Context ID to the IP and port.</t>
      <t>Context ID 0 was reserved by unextended UDP proxying to represent UDP
payloads sent to and from the "target_host" and "target_port" from the URI
template. When the mechanism from this document is in use:</t>
      <ul spacing="normal">
        <li>
          <t>if the "target_host" and "target_port" variables are set to '<tt>*</tt>', then
context ID 0 <bcp14>MUST NOT</bcp14> be used in HTTP Datagrams.</t>
        </li>
        <li>
          <t>otherwise, HTTP Datagrams with context ID 0 have the same semantics as in
unextended UDP proxying.</t>
        </li>
      </ul>
      <section anchor="capsule-assign">
        <name>The COMPRESSION_ASSIGN capsule</name>
        <t>The Compression Assign capsule (capsule type 0x11) is used to register the
semantics of a Context ID. It has the following format:</t>
        <figure anchor="fmt-capsule-assign">
          <name>Compression Assign Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_ASSIGN Capsule {
  Type (i) = 0x11,
  Length (i),
  Context ID (i),
  IP Version (8),
  [IP Address (32..128)],
  [UDP Port (16)],
}
]]></artwork>
        </figure>
        <t>It contains the following fields:</t>
        <dl>
          <dt>IP Version:</dt>
          <dd>
            <t>The IP Version of the following IP Address field. <bcp14>MUST</bcp14> be 0, 4 or 6.
Setting this to zero indicates that this capsule registers an uncompressed
context. Otherwise, the capsule registers a compressed context for the IP
address and UDP port it carries.</t>
          </dd>
          <dt>IP Address:</dt>
          <dd>
            <t>The IP Address of this context. This field is omitted if the IP Version
field is set to 0. Otherwise, it has a length of 32 bits when the
corresponding IP Version field value is 4, and 128 when the IP Version is 6.</t>
          </dd>
          <dt>UDP Port:</dt>
          <dd>
            <t>The UDP Port of this context, in network byte order. This field is omitted
if the IP Version field is set to 0.</t>
          </dd>
        </dl>
        <t>When an endpoint receives a COMPRESSION_ASSIGN capsule, it <bcp14>MUST</bcp14> either
accept or reject the corresponding registration:</t>
        <ul spacing="normal">
          <li>
            <t>if it accepts the registration, first the receiver <bcp14>MUST</bcp14> save the mapping
from Context ID to address and port (or save the fact that this context ID
is uncompressed). Second, the receiver <bcp14>MUST</bcp14> return a COMPRESSION_ACK
capsule with the Context ID set to the one from the received
COMPRESSION_ASSIGN capsule back to its peer, indicating it has accepted
the registration.</t>
          </li>
          <li>
            <t>if it rejects the registration, the receiver <bcp14>MUST</bcp14> respond by sending a
COMPRESSION_CLOSE capsule with the Context ID set to the one from the
received COMPRESSION_ASSIGN capsule.</t>
          </li>
        </ul>
        <t>As mandated in <xref section="4" sectionFormat="of" target="CONNECT-UDP"/>, clients can only allocate even
Context IDs, while proxies can only allocate odd ones. Since the value 0 was
reserved by unextended UDP proxying, the Context ID value of
COMPRESSION_ASSIGN can never be zero.</t>
        <t>Endpoints <bcp14>MUST NOT</bcp14> send two COMPRESSION_ASSIGN capsules with the same
Context ID. If a recipient detects a repeated Context ID, it <bcp14>MUST</bcp14> treat the
capsule as malformed. Receipt of a malformed capsule <bcp14>MUST</bcp14> be treated as an
error processing the Capsule Protocol, as defined in <xref section="3.3" sectionFormat="of" target="HTTP-DGRAM"/>.</t>
        <t>If the uncompressed context is closed, the proxy <bcp14>MUST NOT</bcp14> open new
compressed contexts. In such a case, the proxy opening contexts results in
tuples not desired by the client reaching it thereby nullifying the IP
restriction property of uncompressed compression close as described in
<xref target="restricting-ips"/>.</t>
        <t>Only one Context ID can be used per IP-port tuple. If an endpoint detects
that both it and its peer have opened a Context ID for the same tuple, the
endpoint <bcp14>MUST</bcp14> close the Context ID that was opened by the proxy. If an
endpoint receives a COMPRESSION_ASSIGN capsule whose tuple matches another
open Context ID, it <bcp14>MUST</bcp14> treat the capsule as malformed.</t>
        <t>Endpoints <bcp14>MAY</bcp14> pre-emptively use Context IDs not yet acknowledged by the peer
via COMPRESSION_ACK, knowing that those HTTP Datagrams can be dropped if
they arrive before the corresponding COMPRESSION_ASSIGN capsule, or if the
peer rejects the registration.</t>
      </section>
      <section anchor="capsule-ack">
        <name>The COMPRESSION_ACK capsule</name>
        <t>The Compression Acknowledgment capsule (capsule type 0x12) serves to confirm
registration of a context ID that was received via a COMPRESSION_ASSIGN
capsule.</t>
        <figure anchor="fmt-capsule-ack">
          <name>Compression Acknowledgment Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_ACK Capsule {
  Type (i) = 0x12,
  Length (i),
  Context ID (i),
}
]]></artwork>
        </figure>
        <t>An endpoint can only send a COMPRESSION_ACK capsule if it received a
COMPRESSION_ASSIGN capsule with the same Context ID. If an endpoint receives
COMPRESSION_ACK capsule for a context ID it did not attempt to register via
COMPRESSION_ASSIGN, that capsule is considered malformed.</t>
      </section>
      <section anchor="capsule-close">
        <name>The COMPRESSION_CLOSE capsule</name>
        <t>The Compression Close capsule (capsule type 0x13) serves two purposes. It
can be sent as a direct response to a received COMPRESSION_ASSIGN capsule,
to indicate that the registration was rejected. It can also be sent later to
indicate the closure of a previously assigned registration.</t>
        <figure anchor="fmt-capsule-close">
          <name>Compression Close Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_CLOSE Capsule {
  Type (i) = 0x13,
  Length (i),
  Context ID (i),
}
]]></artwork>
        </figure>
        <t>Once an endpoint has either sent or received a COMPRESSION_CLOSE for a given
Context ID, it <bcp14>MUST NOT</bcp14> send any further datagrams with that Context ID.
Since the value 0 was reserved by unextended UDP proxying, a
COMPRESSION_CLOSE capsule with Context ID set to zero is malformed.</t>
        <t>Endpoints <bcp14>MAY</bcp14> close any context regardless of which endpoint registered it.
This is useful for example, when a mapping is unused for a long time.
Another potential use is restricting some targets (see <xref target="restricting-ips"/>).</t>
        <t>Once a registration is closed, endpoints can instead use an uncompressed
Context ID to exchange UDP payloads for the given target, if such a context
has been registered (see <xref target="uncompressed"/>).</t>
      </section>
    </section>
    <section anchor="uncompressed">
      <name>Uncompressed Operation</name>
      <t>If the client wishes to send or receive uncompressed datagrams, it <bcp14>MUST</bcp14>
first send a COMPRESSION_ASSIGN capsule (see <xref target="fmt-capsule-assign"/>) to the
proxy with the IP Version set to zero. This registers the Context ID as
being uncompressed semantics: all HTTP Datagrams with this Context ID have
the following format:</t>
      <figure anchor="fmt-dgram-uncomp">
        <name>Uncompressed Bound UDP Proxying HTTP Datagram Format</name>
        <artwork><![CDATA[
Uncompressed Bound UDP Proxying Payload {
  IP Version (8),
  IP Address (32..128),
  UDP Port (16),
  UDP Payload (..),
}
]]></artwork>
      </figure>
      <t>It contains the following fields:</t>
      <dl>
        <dt>IP Version:</dt>
        <dd>
          <t>The IP Version of the following IP Address field. <bcp14>MUST</bcp14> be 4 or 6.</t>
        </dd>
        <dt>IP Address:</dt>
        <dd>
          <t>The IP Address of this proxied UDP packet. When sent from client to proxy,
this is the target host to which the proxy will send this UDP payload. When
sent from proxy to client, this represents the source IP address of the UDP
packet received by the proxy. This field has a length of 32 bits when the
corresponding IP Version field value is 4, and 128 when the IP Version is 6.</t>
        </dd>
        <dt>UDP Port:</dt>
        <dd>
          <t>The UDP Port of this proxied UDP packet in network byte order. When sent
from client to proxy, this is the target port to which the proxy will send
this UDP payload. When sent from proxy to client, this represents the source
UDP port of the UDP packet received by the proxy.</t>
        </dd>
        <dt>UDP Payload:</dt>
        <dd>
          <t>The unmodified UDP Payload of this proxied UDP packet (referred to as
"data octets" in <xref target="UDP"/>).</t>
        </dd>
      </dl>
      <t>A client <bcp14>MUST NOT</bcp14> open an uncompressed Context ID if one is already open. If
a server receives a request to open an uncompressed Context ID and it
already has one open, then the server <bcp14>MUST</bcp14> treat the second capsule as
malformed. Note that it's possible for the client to close the uncompressed
context and reopen it later with a different Context ID, as long as there
aren't two uncompressed contexts open at the same time. Only the client can
request uncompressed contexts. If a client receives a COMPRESSION_ASSIGN
capsule with the IP Version set to 0, it <bcp14>MUST</bcp14> treat it as malformed.</t>
    </section>
    <section anchor="compressed-operation">
      <name>Compressed Operation</name>
      <t>Endpoints <bcp14>MAY</bcp14> choose to compress the IP and port information per datagram
for a given target using Context IDs. This is accomplished by registering a
compressed Context ID using the COMPRESSION_ASSIGN capsule (see
<xref target="fmt-capsule-assign"/>).</t>
      <t>If the Context ID in an HTTP Datagram matches one previously registered for
compressed operation, the rest of the HTTP Datagram represents the UDP
payload:</t>
      <figure anchor="fmt-dgram-comp">
        <name>Compressed Bound UDP Proxying HTTP Datagram Format</name>
        <artwork><![CDATA[
Compressed Bound UDP Proxying Payload {
  UDP Payload (..),
}
]]></artwork>
      </figure>
      <t>It contains the following field:</t>
      <dl>
        <dt>UDP Payload:</dt>
        <dd>
          <t>The unmodified UDP Payload of this proxied UDP packet (referred to as
"data octets" in <xref target="UDP"/>).</t>
        </dd>
      </dl>
    </section>
    <section anchor="hdr">
      <name>The Connect-UDP-Bind Header Field</name>
      <t>The "Connect-UDP-Bind" header field’s value is a Boolean Structured Field
set to true. Clients and proxy both indicate support for this extension by
sending the Connect-UDP-Bind header field with a value of <tt>?1</tt>. Once an
endpoint has both sent and received the Connect-UDP-Bind header field set to
true, this extension is enabled. Any other value type <bcp14>MUST</bcp14> be handled as if
the field were not present by the recipients (for example, if this field is
defined multiple times, its type becomes a List and therefore is to be
ignored). This document does not define any parameters for the
Connect-UDP-Bind header field value, but future documents might define
parameters. Receivers <bcp14>MUST</bcp14> ignore unknown parameters.</t>
    </section>
    <section anchor="addr-hdr">
      <name>The Proxy-Public-Address Response Header Field</name>
      <t>Upon accepting the request, the proxy <bcp14>MUST</bcp14> select at least one public IP
address to bind. The proxy <bcp14>MAY</bcp14> assign more addresses. For each selected
address, it <bcp14>MUST</bcp14> select an open port to bind to this request. From then and
until the tunnel is closed, the proxy <bcp14>SHALL</bcp14> send packets received on these
IP-port tuples to the client. The proxy <bcp14>MUST</bcp14> communicate the selected
addresses and ports to the client using the "Proxy-Public-Address" header
field. The header field is a List. Each member of the List is a String,
comprised of the ip-port tuple. The format of the String is defined using
IP-literal, IPv4address, and port from <xref section="3.2" sectionFormat="of" target="URI"/>.</t>
      <figure anchor="target-format">
        <name>Proxy Address Format</name>
        <artwork><![CDATA[
ip-port-tuple = DQUOTE ( IP-literal / IPv4address ) ":" port DQUOTE
]]></artwork>
      </figure>
      <t>When a single IP-Port tuple is provided in the Proxy-Public-Address field,
the proxy <bcp14>MUST</bcp14> use the same public IP and Port for the remainder of the
connection. When multiple tuples are provided, maintaining address stability
per address family is <bcp14>RECOMMENDED</bcp14>.</t>
      <t>Note that since the addresses are conveyed in HTTP response headers, a
subsequent change of addresses on the proxy cannot be conveyed to the client.</t>
      <t>If the proxy only shares IP addresses from a single address family, that
indicates that the proxy only supports that family. The client <bcp14>SHOULD NOT</bcp14>
attempt to register compressed contexts or send uncompressed datagrams
intended for targets whose IP address families were not indicated via the IP
addresses listed in the Proxy-Public-Address header field, as the proxy will
drop those datagrams and reject those registrations.</t>
    </section>
    <section anchor="behavior">
      <name>Proxy Behavior</name>
      <t>After accepting the bound UDP proxying request, the proxy uses an assigned
IP address and port to transmit UDP payloads received from the client to the
target IP Address and UDP Port specified in each HTTP Datagram received from
the client. The proxy uses the same ports to listen for UDP packets from any
authorized target and forwards them to the client by encapsulating them in
HTTP Datagrams, using the corresponding Context ID.</t>
      <t>If the proxy receives UDP payloads that don't correspond to any registration
(i.e., no compression for the given target was ever established and there is
no uncompressed registration), the proxy will either drop the datagram or
temporarily buffer it (see <xref section="5" sectionFormat="of" target="CONNECT-UDP"/>).</t>
      <section anchor="restricting-ips">
        <name>Restricting IPs</name>
        <t>If a client does not wish to receive datagrams from unknown senders, it can
close the uncompressed registration (or not open it in the first place). In
that scenario, the proxy effectively acts as a firewall against unwanted or
unknown IPs.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref section="7" sectionFormat="of" target="CONNECT-UDP"/> also
apply here. Since TURN can be run over this mechanism, implementors should
review the security considerations in <xref section="21" sectionFormat="of" target="TURN"/>.</t>
      <t>Since unextended UDP proxying requests carry the target as part of the
request, the proxy can protect unauthorized targets by rejecting requests
before creating the tunnel, and communicate the rejection reason in response
header fields. The uncompressed context allows transporting datagrams to and
from any target. Clients that keep the uncompressed context open need to be
able to receive from all targets. If the UDP proxy would reject unextended
UDP proxying requests to some targets (as recommended in <xref section="7" sectionFormat="of" target="CONNECT-UDP"/>), then for bound UDP proxying requests where the uncompressed
context is open, the UDP proxy needs to perform checks on the target of each
uncompressed context datagram it receives.</t>
      <t>Note that if the compression response (COMPRESSION_ACK OR COMPRESSION_CLOSE)
cannot be immediately sent due to flow or congestion control, an upper limit
on how many compression responses the endpoint is willing to buffer <bcp14>MUST</bcp14> be
set to prevent memory exhaustion. The proxy <bcp14>MUST</bcp14> abort the request stream if
this limit is reached.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>When moving traffic between uncompressed and compressed contexts, the
effective MTU will change. This can hinder Datagram Packetization Layer PMTU
Discovery (DPLPMTUD) between the client and the target
<xref target="DPLPMTUD"/>. To avoid that, if an endpoint intends to use
compression, it <bcp14>SHOULD</bcp14> request it as early as possible.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="iana-fields">
        <name>HTTP Fields</name>
        <t>This document will request IANA to register the following new items in the
"HTTP Field Name" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/http-fields"/>&gt;:</t>
        <table anchor="iana-fields-table">
          <name>New Fields</name>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Structured Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Connect-UDP-Bind</td>
              <td align="left">Item</td>
            </tr>
            <tr>
              <td align="left">Proxy-Public-Address</td>
              <td align="left">List</td>
            </tr>
          </tbody>
        </table>
        <t>All of these new entries use the following values for these fields:</t>
        <dl spacing="compact">
          <dt>Status:</dt>
          <dd>
            <t>provisional (permanent if this document is approved)</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Comments:</dt>
          <dd>
            <t>None</t>
          </dd>
        </dl>
      </section>
      <section anchor="iana-capsules">
        <name>Capsules</name>
        <t>This document will request IANA to register the following new items to the
"HTTP Capsule Types" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/masque"/>&gt;:</t>
        <table anchor="iana-capsules-table">
          <name>New Capsules</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Capsule Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x11</td>
              <td align="left">COMPRESSION_ASSIGN</td>
            </tr>
            <tr>
              <td align="left">0x12</td>
              <td align="left">COMPRESSION_ACK</td>
            </tr>
            <tr>
              <td align="left">0x13</td>
              <td align="left">COMPRESSION_CLOSE</td>
            </tr>
          </tbody>
        </table>
        <t>All of these new entries use the following values for these fields:</t>
        <dl spacing="compact">
          <dt>Status:</dt>
          <dd>
            <t>provisional (permanent if this document is approved)</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Change Controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Contact:</dt>
          <dd>
            <t>MASQUE Working Group <eref target="mailto:masque@ietf.org">masque@ietf.org</eref></t>
          </dd>
          <dt>Notes:</dt>
          <dd>
            <t>None</t>
          </dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="UDP">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="STRUCTURED-FIELDS">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P-H. Kamp" surname="P-H. Kamp"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields.</t>
              <t>This document obsoletes RFC 8941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9651"/>
          <seriesInfo name="DOI" value="10.17487/RFC9651"/>
        </reference>
        <reference anchor="ABNF">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="TEMPLATE">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="HTTP-DGRAM">
          <front>
            <title>HTTP Datagrams and the Capsule Protocol</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="L. Pardue" initials="L." surname="Pardue"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection.</t>
              <t>In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.</t>
              <t>HTTP Datagrams and the Capsule Protocol are intended for use by HTTP extensions, not applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9297"/>
          <seriesInfo name="DOI" value="10.17487/RFC9297"/>
        </reference>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="WebRTC" target="https://www.w3.org/TR/webrtc/">
          <front>
            <title>WebRTC</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January" day="26"/>
          </front>
          <seriesInfo name="W3C" value="Recommendation"/>
        </reference>
        <reference anchor="ICE">
          <front>
            <title>Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal</title>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>This document describes a protocol for Network Address Translator (NAT) traversal for UDP-based communication. This protocol is called Interactive Connectivity Establishment (ICE). ICE makes use of the Session Traversal Utilities for NAT (STUN) protocol and its extension, Traversal Using Relay NAT (TURN).</t>
              <t>This document obsoletes RFC 5245.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8445"/>
          <seriesInfo name="DOI" value="10.17487/RFC8445"/>
        </reference>
        <reference anchor="TURN">
          <front>
            <title>Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)</title>
            <author fullname="T. Reddy" initials="T." role="editor" surname="Reddy"/>
            <author fullname="A. Johnston" initials="A." role="editor" surname="Johnston"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>If a host is located behind a NAT, it can be impossible for that host to communicate directly with other hosts (peers) in certain situations. In these situations, it is necessary for the host to use the services of an intermediate node that acts as a communication relay. This specification defines a protocol, called "Traversal Using Relays around NAT" (TURN), that allows the host to control the operation of the relay and to exchange packets with its peers using the relay. TURN differs from other relay control protocols in that it allows a client to communicate with multiple peers using a single relay address.</t>
              <t>The TURN protocol was designed to be used as part of the Interactive Connectivity Establishment (ICE) approach to NAT traversal, though it can also be used without ICE.</t>
              <t>This document obsoletes RFCs 5766 and 6156.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8656"/>
          <seriesInfo name="DOI" value="10.17487/RFC8656"/>
        </reference>
        <reference anchor="DPLPMTUD">
          <front>
            <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
            <author fullname="T. Völker" initials="T." surname="Völker"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
              <t>The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
              <t>This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8899"/>
          <seriesInfo name="DOI" value="10.17487/RFC8899"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
      </references>
    </references>
    <?line 521?>

<section anchor="example">
      <name>Example</name>
      <t>In the example below, the client is configured with URI Template
"https://example.org/.well-known/masque/udp/{target_host}/{target_port}/"
and listens for traffic on the proxy, eventually decides that it no longer
wants to listen for connections from new targets, and limits its
communication with only 203.0.113.11:4321 and no other UDP target.</t>
      <artwork><![CDATA[
 Client                                             Server

 STREAM(44): HEADERS            -------->
   :method = CONNECT
   :protocol = connect-udp
   :scheme = https
   :path = /.well-known/masque/udp/%2A/%2A/
   :authority = proxy.example.org
   connect-udp-bind = ?1
   capsule-protocol = ?1

            <--------  STREAM(44): HEADERS
                         :status = 200
                         connect-udp-bind = ?1
                         capsule-protocol = ?1
                         proxy-public-address = "192.0.2.45:54321",  \
                                            "[2001:db8::1234]:54321"

// Register Context ID 2 to be used for uncompressed UDP payloads
// to/from any target.

 CAPSULE                       -------->
   Type = COMPRESSION_ASSIGN
   Context ID = 2
   IP Version = 0

// Proxy confirms registration.

            <-------- CAPSULE
                        Type = COMPRESSION_ACK
                        Context ID = 2

// Target talks to Client using the uncompressed context.

            <--------  DATAGRAM
                         Quarter Stream ID = 11
                         Context ID = 2
                         IP Version = 4
                         IP Address = 192.0.2.42
                         UDP Port = 1234
                         UDP Payload = Encapsulated UDP Payload

// Client responds on the same uncompressed context.

 DATAGRAM                       -------->
   Quarter Stream ID = 11
   Context ID = 2
   IP Version = 4
   IP Address = 192.0.2.42
   UDP Port = 1234
   UDP Payload = Encapsulated UDP Payload

// Another target talks to Client using the uncompressed context.

            <--------  DATAGRAM
                         Quarter Stream ID = 11
                         Context ID = 2
                         IP Version = 4
                         IP Address = 203.0.113.11
                         UDP Port = 4321
                         UDP Payload = Encapsulated UDP Payload

// Client responds on the same uncompressed context.

 DATAGRAM                       -------->
   Quarter Stream ID = 11
   Context ID = 2
   IP Version = 4
   IP Address = 203.0.113.11
   UDP Port = 4321
   UDP Payload = Encapsulated UDP Payload

// Register 203.0.113.11:4321 to compress it in the future.

 CAPSULE                       -------->
   Type = COMPRESSION_ASSIGN
   Context ID = 4
   IP Version = 4
   IP Address = 203.0.113.11
   UDP Port = 4321


// Proxy confirms registration.

            <-------- CAPSULE
                        Type = COMPRESSION_ACK
                        Context ID = 4

// Omit IP and Port for future packets intended for
// 203.0.113.11:4321 hereon.

 DATAGRAM                       -------->
   Context ID = 4
   UDP Payload = Encapsulated UDP Payload

            <--------  DATAGRAM
                        Context ID = 4
                        UDP Payload = Encapsulated UDP Payload

// Request packets without a corresponding compressed Context
// to be dropped by closing the uncompressed Context.

 CAPSULE                       -------->
   Type = COMPRESSION_CLOSE
   Context ID = 2

// Context ID 4 = 203.0.113.11:4321 traffic is accepted,
// and other traffic is dropped at the proxy.
]]></artwork>
    </section>
    <section anchor="comparison-with-connect-ip">
      <name>Comparison with CONNECT-IP</name>
      <t>While the use-cases described in <xref target="intro"/> could be supported using IP
proxying in HTTP <xref target="CONNECT-IP"/>, it would require that every HTTP
Datagram carries a complete IP header. This would lead to both
inefficiencies in the wire encoding and reduction in available Maximum
Transmission Unit (MTU). Furthermore, Web browsers would need to support
IPv4 and IPv6 header generation, parsing, validation and error handling.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This proposal is the result of many conversations with MASQUE working group
participants. In particular, the authors would like to thank <contact fullname="Marius Kleidl"/>, <contact fullname="Tommy Pauly"/>, <contact fullname="Lucas Pardue"/>, <contact fullname="Ben Schwartz"/>,
<contact fullname="Marten Seemann"/>, and <contact fullname="Magnus Westerlund"/> for their reviews.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
