HTTP/1.1
draft-ietf-httpbis-messaging-19
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-01-26
|
19 | Gunter Van de Velde | Request closed, assignment withdrawn: Jon Mitchell Last Call OPSDIR review |
2024-01-26
|
19 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue |
2022-04-25
|
19 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2021-12-23
|
19 | (System) | RFC Editor state changed to AUTH48 |
2021-11-11
|
19 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2021-10-22
|
19 | (System) | RFC Editor state changed to REF from EDIT |
2021-10-11
|
19 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2021-10-08
|
19 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2021-10-08
|
19 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2021-10-06
|
19 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2021-09-16
|
19 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2021-09-16
|
19 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Paul Wouters was marked no-response |
2021-09-13
|
19 | (System) | RFC Editor state changed to EDIT |
2021-09-13
|
19 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2021-09-13
|
19 | (System) | Announcement was received by RFC Editor |
2021-09-13
|
19 | (System) | IANA Action state changed to In Progress |
2021-09-13
|
19 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2021-09-13
|
19 | Cindy Morgan | IESG has approved the document |
2021-09-13
|
19 | Cindy Morgan | Closed "Approve" ballot |
2021-09-13
|
19 | Cindy Morgan | Ballot approval text was generated |
2021-09-13
|
19 | Francesca Palombini | The IESG approved the intended status change from Proposed to Internet Standard following the September 9, 2021 IESG Teleconference and follow-up email thread. |
2021-09-13
|
19 | (System) | Removed all action holders (IESG state changed) |
2021-09-13
|
19 | Francesca Palombini | IESG state changed to Approved-announcement to be sent from Waiting for AD Go-Ahead |
2021-09-12
|
19 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2021-09-12
|
19 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-19.txt |
2021-09-12
|
19 | (System) | New version approved |
2021-09-12
|
19 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Mark Nottingham , Roy Fielding |
2021-09-12
|
19 | Julian Reschke | Uploaded new revision |
2021-09-06
|
18 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2021-09-04
|
18 | Marco Tiloca | Request for Last Call review by ARTART Completed: Ready with Nits. Reviewer: Marco Tiloca. Sent review to list. |
2021-09-03
|
18 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2021-09-03
|
18 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-httpbis-messaging-18. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-httpbis-messaging-18. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there are six actions which we must complete. IANA understands that one of the actions requested in the IANA Considerations section is dependent upon the approval and completion of IANA Actions in another document: draft-ietf-httpbis-semantics First, in the new Hypertext Transfer Protocol (HTTP) Field Name registry located at https://www.iana.org/assignments/http-fields and created as a result of the actions in Section 18.4 of draft-ietf-httpbis-semantics, the following entries will be added: +===================+==========+======+============+ | Field Name | Status | Ref. | Comments | +===================+==========+======+============+ | Close | standard | 9.6 | (reserved) | +-------------------+----------+------+------------+ | MIME-Version | standard | B.1 | | +-------------------+----------+------+------------+ | Transfer-Encoding | standard | 6.1 | | +-------------------+----------+------+------------+ Second, in the message namespace at https://www.iana.org/assignments/media-types the existing registration for message/http will have its reference and template information replaced with a reference to and information from this document. Third, in the application namespace at https://www.iana.org/assignments/media-types the existing registration for application/http will have its reference and template information replaced with a reference to and information from this document. Fourth, in the HTTP Transfer Coding registry at https://www.iana.org/assignments/http-parameters the reference for the registry and the following entries will be updated to a reference of [ RFC-to-be ]: +============+===============================+===========+ | Name | Description | Reference | +============+===============================+===========+ | chunked | Transfer in a series of | Section | | | chunks | 7.1 | +------------+-------------------------------+-----------+ | compress | UNIX "compress" data format | Section | | | [Welch] | 7.2 | +------------+-------------------------------+-----------+ | deflate | "deflate" compressed data | Section | | | ([RFC1951]) inside the "zlib" | 7.2 | | | data format ([RFC1950]) | | +------------+-------------------------------+-----------+ | gzip | GZIP file format [RFC1952] | Section | | | | 7.2 | +------------+-------------------------------+-----------+ | x-compress | Deprecated (alias for | Section | | | compress) | 7.2 | +------------+-------------------------------+-----------+ | x-gzip | Deprecated (alias for gzip) | Section | | | | 7.2 | +------------+-------------------------------+-----------+ In this registry the registration procedure reference will be changed to [ RFC-to-be; Section 7.3 ] Fifth, also in the HTTP Transfer Coding registry at https://www.iana.org/assignments/http-parameters the following entry will be added: +============+===============================+===========+ | Name | Description | Reference | +============+===============================+===========+ | trailers | (reserved) | Section | | | | 12.3 | +------------+-------------------------------+-----------+ Sixth, in the TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs registry at https://www.iana.org/assignments/tls-extensiontype-values/ the following registration will have its reference replaced with a reference to this document: +==========+=============================+================+ | Protocol | Identification Sequence | Reference | +==========+=============================+================+ | HTTP/1.1 | 0x68 0x74 0x74 0x70 0x2f | [ RFC-to-be ] | | | 0x31 0x2e 0x31 ("http/1.1") | | +----------+-----------------------------+----------------+ The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Lead IANA Services Specialist |
2021-09-02
|
18 | Barry Leiba | Closed request for Last Call review by ARTART with state 'Withdrawn': This request is a duplicate. Bug? |
2021-09-02
|
18 | Barry Leiba | Assignment of request for Last Call review by ARTART to Marco Tiloca was withdrawn |
2021-08-24
|
18 | Barry Leiba | Request for Last Call review by ARTART is assigned to Marco Tiloca |
2021-08-24
|
18 | Barry Leiba | Request for Last Call review by ARTART is assigned to Marco Tiloca |
2021-08-24
|
18 | Barry Leiba | Request for Last Call review by ARTART is assigned to Marco Tiloca |
2021-08-24
|
18 | Barry Leiba | Request for Last Call review by ARTART is assigned to Marco Tiloca |
2021-08-24
|
18 | Gonzalo Salgueiro | Assignment of request for Last Call review by ARTART to Gonzalo Salgueiro was rejected |
2021-08-24
|
18 | Barry Leiba | Request for Last Call review by ARTART is assigned to Gonzalo Salgueiro |
2021-08-24
|
18 | Barry Leiba | Request for Last Call review by ARTART is assigned to Gonzalo Salgueiro |
2021-08-23
|
18 | Cindy Morgan | The following Last Call announcement was sent out (ends 2021-09-06): From: The IESG To: IETF-Announce CC: draft-ietf-httpbis-messaging@ietf.org, francesca.palombini@ericsson.com, httpbis-chairs@ietf.org, ietf-http-wg@w3.org, tpauly@apple.com … The following Last Call announcement was sent out (ends 2021-09-06): From: The IESG To: IETF-Announce CC: draft-ietf-httpbis-messaging@ietf.org, francesca.palombini@ericsson.com, httpbis-chairs@ietf.org, ietf-http-wg@w3.org, tpauly@apple.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (HTTP/1.1) to Internet Standard The IESG has received a request from the HTTP WG (httpbis) to consider the following document: - 'HTTP/1.1' as Internet Standard This second Last Call is specifically on the intended RFC status change, which was incorrectly set to Proposed Standard on the previous Last Call. The IESG plans to make a decision in the next few weeks, and solicits final comments on the intended RFC status change from Proposed Standard to Internet Standard. Please send substantive comments to the last-call@ietf.org mailing lists by 2021-09-06. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns. This document obsoletes portions of RFC 7230. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-httpbis-messaging/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc7405: Case-Sensitive String Support in ABNF (Proposed Standard - Internet Engineering Task Force (IETF)) rfc8446: The Transport Layer Security (TLS) Protocol Version 1.3 (Proposed Standard - Internet Engineering Task Force (IETF)) |
2021-08-23
|
18 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2021-08-23
|
18 | Francesca Palombini | Last call was requested |
2021-08-23
|
18 | Francesca Palombini | IESG state changed to Last Call Requested from IESG Evaluation::AD Followup |
2021-08-23
|
18 | Francesca Palombini | Last call announcement was changed |
2021-08-23
|
18 | Francesca Palombini | Last call announcement was generated |
2021-08-23
|
18 | Francesca Palombini | Fixing intended RFC status (see https://mailarchive.ietf.org/arch/msg/httpbisa/V0om3C8M-9vsS0761CktqBHK7VU/) |
2021-08-23
|
18 | Francesca Palombini | Intended Status changed to Internet Standard from Proposed Standard |
2021-08-18
|
18 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-18.txt |
2021-08-18
|
18 | (System) | New version approved |
2021-08-18
|
18 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Mark Nottingham , Roy Fielding |
2021-08-18
|
18 | Julian Reschke | Uploaded new revision |
2021-07-25
|
17 | Benjamin Kaduk | [Ballot comment] Thanks for addressing my concern about absolute-form target URIs at origin servers (by confirming in -semantics that scheme-specific requirements must be met for … [Ballot comment] Thanks for addressing my concern about absolute-form target URIs at origin servers (by confirming in -semantics that scheme-specific requirements must be met for properly directed requests)! I read over the diff from -16 to -17 and had only one new (nit-level) comment: Section 9.4 Furthermore, using multiple connections can cause undesirable side effects in congested networks. Using larger number of multiple connections can also cause side effects in otherwise uncongested networks, because their aggregate and initially synchronized sending behavior can cause congestion that would not have been present if fewer parallel connections had been used. nit: "Using larger number of multiple connections" doesn't seem right, and possibly in more ways than just the singular/plural mismatch. However, I'll also retain my previous ballot comments, as on further inspection I'm not sure to what extent they were already covered in github. =====BEGIN PREVIOUS BALLOT COMMENT===== Thanks for another extremely well written document! The only general comment I have is that [Semantics] did such a good job of portraying the trailer section as a generic concept that I was surprised to see it presented as specific to the chunked transfer-encoding in this document. It seems to me (naively, of course), that when the content can accurately be delimited, whether by Content-Length or the chunked transfer-encoding, a trailer section could be read after the request or response and clearly distinguished from the start of a new request or response. I recognize that we have a significant deployed base to be mindful of backwards compatibility with, and so do not propose to recklessly add trailer sections everywhere. It might be worth some more prominent acknowledgment that in HTTP/1.1 the trailers section is limited to the chunked transfer-encoding, and discussion of why trailers are not usable in other HTTP/1.1 scenarios, though. I did make a github PR with a handful of editorial suggestions, at https://github.com/httpwg/http-core/pull/872 . 2.2 The presence of such whitespace in a request might be an attempt to trick a server into ignoring that field line or processing the line after it as a new request, either of which might result in a security vulnerability if other implementations within the request chain interpret the same message differently. [...] Given the previous procedure that gives as a permitted behavior to "consume the line without further processing", it seems like an attempt to get the server to ignore the field line would have succeeded if this procedure is followed? I suppose the important difference is that the field line is completely suppressed from any version of the message transmitted downstream, thus avoiding the opportunity for a different interpretation. Regardless, though, it seems like the text of the guidance as written (not quoted above) reads like it is setting us up for vulnerabilities in the presence of non-compliant (or HTTP/1.0?) implementations in the request chain. We might want to put in a bit more explanation of how the stated procedure avoids the vulnerability. Section 3.2 Recipients of an invalid request-line SHOULD respond with either a 400 (Bad Request) error or a 301 (Moved Permanently) redirect with the request-target properly encoded. [...] (I assume 301 rather than 308 was an intentional choice for maximum compatibility with old/broken clients.) Section 3.3 Supplying a default name for authority within the context of a secured connection is inherently unsafe if there is any chance that the user agent's intended authority might differ from the selected default. A server that can uniquely identify an authority from the request context MAY use that identity as a default without this risk. Is the contents of the TLS SNI extension sufficient request context to uniquely identify an intended authority? Section 5.1 The field line value does not include any leading or trailing whitespace: OWS occurring before the first non-whitespace octet of the field line value or after the last non-whitespace octet of the field line value ought to be excluded by parsers when extracting the field line value from a field line. I have in general tried to refrain from commenting on the extensive use of the phrase "ought to" in this group of documents, but this particular scenario seems like a strong candidate for a BCP 14 keyword. Section 9.8 TLS provides a facility for secure connection closure. When a valid closure alert is received, an implementation can be assured that no further data will be received on that connection. TLS implementations MUST initiate an exchange of closure alerts before closing a connection. A TLS implementation MAY, after sending a closure alert, close the connection without waiting for the peer to send its closure alert, generating an "incomplete close". [...] This is written as if it's imposing normative requirements on generic TLS implementations (not placing restrictions on what TLS implementations are suitable for HTTPS). Fortunately, these "MUST initiate" and "MAY close without waiting" requirements seem to already be present in RFC 8446... This SHOULD only be done when the application knows (typically through detecting HTTP message boundaries) that it has sent or received all the message data that it cares about. ...whereas this SHOULD does not have an obvious analogue in RFC 8446, and thus it would make sense to retain the BCP 14 keyword for. NITS Section 4 The rest of the response message is to be interpreted in light of the semantics defined for that status code. See Section 15 of [Semantics] for information about the semantics of status codes, including the classes of status code (indicated by the first digit), the status codes defined by this specification, In some sense it seems that the referenced status codes are defined by [Semantics], not "this specification". I was initially going to propose (in my PR) a change to "defined for", but that seems incorrect and I don't have a better proposal handy. Section 5.2 A sender MUST NOT generate a message that includes line folding (i.e., that has any field line value that contains a match to the obs-fold rule) unless [...] Since we don't include the obs-fold production as a component of any other production, and field-value excludes CRLF, it seems that any such field line value would already be in violation of the ABNF and thus forbidden. I don't really want to advocate for including obs-fold in the field-value production in -semantics, though, so maybe accepting this nit is the least bad choice here. Section 9.2 A client that has more than one outstanding request on a connection MUST maintain a list of outstanding requests in the order sent and MUST associate each received response message on that connection to the highest ordered request that has not yet received a final (non- 1xx) response. "Highest ordered" implies some numerical rank-list of ordering, but we don't seem to clearly indicate whether older or newer requests receive higher numerical indices. It seems simples to just say "oldest" (or "newest", if that was the intent) rather than applying numerical ranking. =====END PREVIOUS BALLOT COMMENT===== |
2021-07-25
|
17 | Benjamin Kaduk | [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss |
2021-07-25
|
17 | (System) | Changed action holders to Francesca Palombini (IESG state changed) |
2021-07-25
|
17 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2021-07-25
|
17 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2021-07-25
|
17 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-17.txt |
2021-07-25
|
17 | (System) | New version approved |
2021-07-25
|
17 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Mark Nottingham , Roy Fielding |
2021-07-25
|
17 | Julian Reschke | Uploaded new revision |
2021-06-17
|
16 | (System) | Changed action holders to Roy Fielding, Mark Nottingham, Julian Reschke, Francesca Palombini (IESG state changed) |
2021-06-17
|
16 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2021-06-17
|
16 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2021-06-16
|
16 | Murray Kucherawy | [Ballot Position Update] Position for Murray Kucherawy has been changed to Yes from No Objection |
2021-06-16
|
16 | Murray Kucherawy | [Ballot comment] Thanks for a well-written document. I learned a bunch from reading this, especially the stuff that talked about how mail differs from HTTP. … [Ballot comment] Thanks for a well-written document. I learned a bunch from reading this, especially the stuff that talked about how mail differs from HTTP. Just one thing about which to inquire: There are a few places where a bare SHOULD is present that left me wondering why it's a SHOULD. For example, from Section 7.1: The chunked encoding does not define any parameters. Their presence SHOULD be treated as an error. Why isn't that a MUST? Is there a legitimate reason why I might not treat that as an error? This reappears in Section 7.2, and there were several others that left me with the same curiosity. Not a major point, but that additional context might be helpful to some implementers -- or, perhaps, some of them really should be MUSTs. |
2021-06-16
|
16 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2021-06-16
|
16 | Benjamin Kaduk | [Ballot discuss] Let's discuss whether the currently specified procedures for reconstructing the target URI from a request-target in absolute-form provide adequate security properties, at the … [Ballot discuss] Let's discuss whether the currently specified procedures for reconstructing the target URI from a request-target in absolute-form provide adequate security properties, at the origin server. I'm specifically concerned about taking the scheme directly from the request target, i.e., making the distinction between the "http" and "https" schemes. The simple procedure of "take the scheme from the request-target" would seem to allow for the client to cause the server to engage processing for the "https" origin without receiving the protection that https is supposed to provide. (The converse case does not immediately seem to present much risk but is probably worth preventing as well on general principles of retaining consistency.) I don't remember seeing any text that would require the server to validate the scheme from the request-target against the actual properties of the transport (or the configured fixed URI scheme as might be provisioned with a trusted outbound gateway, etc.) While we do reference §7.4 of [Semantics] with a note that reconstructing the target URI is only part of the process of identifying a target resource, that part of [Semantics] does not mention scheme validation as part of rejecting misdirected requests. Does the origin server need to validate the scheme from an absolute-form request-target? What is the scope of consequences if it fails to do so? |
2021-06-16
|
16 | Benjamin Kaduk | [Ballot comment] Thanks for another extremely well written document! The only general comment I have is that [Semantics] did such a good job of portraying … [Ballot comment] Thanks for another extremely well written document! The only general comment I have is that [Semantics] did such a good job of portraying the trailer section as a generic concept that I was surprised to see it presented as specific to the chunked transfer-encoding in this document. It seems to me (naively, of course), that when the content can accurately be delimited, whether by Content-Length or the chunked transfer-encoding, a trailer section could be read after the request or response and clearly distinguished from the start of a new request or response. I recognize that we have a significant deployed base to be mindful of backwards compatibility with, and so do not propose to recklessly add trailer sections everywhere. It might be worth some more prominent acknowledgment that in HTTP/1.1 the trailers section is limited to the chunked transfer-encoding, and discussion of why trailers are not usable in other HTTP/1.1 scenarios, though. I did make a github PR with a handful of editorial suggestions, at https://github.com/httpwg/http-core/pull/872 . 2.2 The presence of such whitespace in a request might be an attempt to trick a server into ignoring that field line or processing the line after it as a new request, either of which might result in a security vulnerability if other implementations within the request chain interpret the same message differently. [...] Given the previous procedure that gives as a permitted behavior to "consume the line without further processing", it seems like an attempt to get the server to ignore the field line would have succeeded if this procedure is followed? I suppose the important difference is that the field line is completely suppressed from any version of the message transmitted downstream, thus avoiding the opportunity for a different interpretation. Regardless, though, it seems like the text of the guidance as written (not quoted above) reads like it is setting us up for vulnerabilities in the presence of non-compliant (or HTTP/1.0?) implementations in the request chain. We might want to put in a bit more explanation of how the stated procedure avoids the vulnerability. Section 3.2 Recipients of an invalid request-line SHOULD respond with either a 400 (Bad Request) error or a 301 (Moved Permanently) redirect with the request-target properly encoded. [...] (I assume 301 rather than 308 was an intentional choice for maximum compatibility with old/broken clients.) Section 3.3 Supplying a default name for authority within the context of a secured connection is inherently unsafe if there is any chance that the user agent's intended authority might differ from the selected default. A server that can uniquely identify an authority from the request context MAY use that identity as a default without this risk. Is the contents of the TLS SNI extension sufficient request context to uniquely identify an intended authority? Section 5.1 The field line value does not include any leading or trailing whitespace: OWS occurring before the first non-whitespace octet of the field line value or after the last non-whitespace octet of the field line value ought to be excluded by parsers when extracting the field line value from a field line. I have in general tried to refrain from commenting on the extensive use of the phrase "ought to" in this group of documents, but this particular scenario seems like a strong candidate for a BCP 14 keyword. Section 9.8 TLS provides a facility for secure connection closure. When a valid closure alert is received, an implementation can be assured that no further data will be received on that connection. TLS implementations MUST initiate an exchange of closure alerts before closing a connection. A TLS implementation MAY, after sending a closure alert, close the connection without waiting for the peer to send its closure alert, generating an "incomplete close". [...] This is written as if it's imposing normative requirements on generic TLS implementations (not placing restrictions on what TLS implementations are suitable for HTTPS). Fortunately, these "MUST initiate" and "MAY close without waiting" requirements seem to already be present in RFC 8446... This SHOULD only be done when the application knows (typically through detecting HTTP message boundaries) that it has sent or received all the message data that it cares about. ...whereas this SHOULD does not have an obvious analogue in RFC 8446, and thus it would make sense to retain the BCP 14 keyword for. NITS Section 4 The rest of the response message is to be interpreted in light of the semantics defined for that status code. See Section 15 of [Semantics] for information about the semantics of status codes, including the classes of status code (indicated by the first digit), the status codes defined by this specification, In some sense it seems that the referenced status codes are defined by [Semantics], not "this specification". I was initially going to propose (in my PR) a change to "defined for", but that seems incorrect and I don't have a better proposal handy. Section 5.2 A sender MUST NOT generate a message that includes line folding (i.e., that has any field line value that contains a match to the obs-fold rule) unless [...] Since we don't include the obs-fold production as a component of any other production, and field-value excludes CRLF, it seems that any such field line value would already be in violation of the ABNF and thus forbidden. I don't really want to advocate for including obs-fold in the field-value production in -semantics, though, so maybe accepting this nit is the least bad choice here. Section 9.2 A client that has more than one outstanding request on a connection MUST maintain a list of outstanding requests in the order sent and MUST associate each received response message on that connection to the highest ordered request that has not yet received a final (non- 1xx) response. "Highest ordered" implies some numerical rank-list of ordering, but we don't seem to clearly indicate whether older or newer requests receive higher numerical indices. It seems simples to just say "oldest" (or "newest", if that was the intent) rather than applying numerical ranking. |
2021-06-16
|
16 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2021-06-16
|
16 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2021-06-16
|
16 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2021-06-16
|
16 | Zaheduzzaman Sarker | [Ballot comment] Thanks to the editors and contributors of this document for a great job. Specially for the security consideration section, it is very well … [Ballot comment] Thanks to the editors and contributors of this document for a great job. Specially for the security consideration section, it is very well written and anyone implementing this document should pay extra attentions to that section. I have following comment and question - * I consider this as editorial fix hence not holding a discuss but I would like to see this addressed. This document uses terminologies defined in section 3 of https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-semantics-16#section-3, for example - user agent, client. However, it does not refer to the the semantics doc. I think it must refer to the section 3 of semantic document. * Section 2.2 : it says - "When a server listening only for HTTP request messages, or processing what appears from the start-line to be an HTTP request message, receives a sequence of octets that does not match the HTTP-message grammar aside from the robustness exceptions listed above, the server SHOULD respond with a 400 (Bad Request) response and close the connection." Is there a reason why it is not a MUST but SHOULD? In my small scale implementation experiments I implemented it as a MUST. I believe if a 400 is send followed by a close connection then it is a "save yourself" action for the server and a MUST thing to do. * from the ID nits : there is an unused reference to RFC7231. |
2021-06-16
|
16 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2021-06-15
|
16 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2021-06-14
|
16 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2021-06-14
|
16 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2021-06-14
|
16 | Robert Wilton | [Ballot comment] Thank you for cleaning up this spec. I appreciate that the effort it takes to achieve this, but it is very helpful to … [Ballot comment] Thank you for cleaning up this spec. I appreciate that the effort it takes to achieve this, but it is very helpful to the wider community in the long term. Not surprisingly, I only have minor comments. Although HTTP makes use of some protocol elements similar to the Multipurpose Internet Mail Extensions (MIME) [RFC2045], see Appendix B for the differences between HTTP and MIME messages. Nit: This doesn't parse easily to me, perhaps drop the Although? Various ad hoc limitations on request-line length are found in practice. It is RECOMMENDED that all HTTP senders and recipients support, at a minimum, request-line lengths of 8000 octets. I was wondering how this applies to constrained devices, but I assume that very constrained devices should probably be using something like CoAP, and otherwise most device should be able to cope with an 8k buffer. Nit: Various fields seem have a arbitrary amount of space before the equals: E.g., "method = token". I presume that this whitespace is not meaningful, but wondered if the spec would be clearer if it wasn't there. A sender MUST NOT apply chunked more than once to a message body Nit: "apply chunked" doesn't read that well to me ... but I understand what it means. If you decide to change this, then I would check the other places where "chunked" is used. A client MUST NOT process, cache, or forward such extra data as a separate response, since such behavior would be vulnerable to cache poisoning. The intent in this paragraph seemed somewhat ambiguous. E.g., is the requirement that the client must not process/cache the extra data, or that it must not process/cache the extra data as a separate response? I assume the latter. All transfer-coding names are case-insensitive and ought to be registered within the HTTP Transfer Coding registry Would a 2119 SHOULD be better than ought? A client MUST NOT send a request containing Transfer-Encoding unless it knows the server will handle HTTP/1.1 requests (or later minor revisions); and also A client MUST NOT use the chunked transfer encoding unless it knows the server will handle HTTP/1.1 (or later) requests; Given that we are in 2021, and the HTTP/1.1 spec was published a couple of decades ago, I was wondering whether the MUST NOT is a bit strong? Thanks, Rob |
2021-06-14
|
16 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2021-06-11
|
16 | Martin Duke | [Ballot comment] (3.3) "Alternatively, it might be better to redirect the request to a safe resource that explains how to obtain a new client." Did … [Ballot comment] (3.3) "Alternatively, it might be better to redirect the request to a safe resource that explains how to obtain a new client." Did you mean "obtain a new user agent?" (7.1) "recipients MUST anticipate potentially large decimal numerals" s/decimal/hexidecimal (?) The chunk-size is in hex. (10) This section could use an introductory paragraph. It is not at all clear from the text why someone would enclose message as data or in what context this would occur. |
2021-06-11
|
16 | Martin Duke | [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke |
2021-06-10
|
16 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss |
2021-06-10
|
16 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
2021-06-10
|
16 | Olivier Bonaventure | Request for Last Call review by TSVART Completed: Ready. Reviewer: Olivier Bonaventure. Sent review to list. |
2021-06-10
|
16 | Roman Danyliw | [Ballot comment] Thanks for this revision to a crucial standards. Nits only: ** Section 6.1. Editorial. s/ A sender MUST NOT apply chunked more than … [Ballot comment] Thanks for this revision to a crucial standards. Nits only: ** Section 6.1. Editorial. s/ A sender MUST NOT apply chunked more than once/ A sender MUST NOT apply chunked encoding more than once/ ** Section 11.1. Hopefully s/sprintf/snprintf/ |
2021-06-10
|
16 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2021-06-10
|
16 | Lars Eggert | [Ballot discuss] This document seems to have unresolved IANA issues, so I am holding a DISCUSS for IANA until the issues are resolved. |
2021-06-10
|
16 | Lars Eggert | [Ballot comment] Section 9.1. , paragraph 2, comment: > protocols. Each connection applies to only one transport link. I'm not sure I understand what … [Ballot comment] Section 9.1. , paragraph 2, comment: > protocols. Each connection applies to only one transport link. I'm not sure I understand what is meant by "transport link" and how connections would "apply" to one. Section 9.4. , paragraph 4, comment: > consumes server resources. Furthermore, using multiple connections > can cause undesirable side effects in congested networks. Using larger number of multiple connections can even cause side effects in otherwise uncongested networks, because their aggregate and initially synchronized sending behavior can *cause* congestion that would not have been present if fewer parallel connections had been used. Section 13.1. , paragraph 14, comment: > [Welch] Welch, T. A., "A Technique for High-Performance Data > Compression", IEEE Computer 17(6), June 1984. This can become an informative reference, so to not create a DOWNREF, since it's only used in the description of an IANA codepoint. Section 13.2. , paragraph 12, comment: > [RFC7230] Fielding, R., Ed. and J. F. Reschke, Ed., "Hypertext > Transfer Protocol (HTTP/1.1): Message Syntax and Routing", > RFC 7230, DOI 10.17487/RFC7230, June 2014, > . I think it is common practice to normatively cite an RFC that is being obsoleted. ------------------------------------------------------------------------------- All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. Section 9.3. , paragraph 3, nit: - Connection header field (Section 7.6.1 of [Semantics]), if any: + based on the protocol version and Connection header field in the Section 11.2. , paragraph 2, nit: - Request smuggling ([Linhart]) is a technique that exploits - - - + Request smuggling [Linhart] is a technique that exploits Section 12.3. , paragraph 3, nit: - | | ([RFC1951]) inside the "zlib" | 7.2 | - - - - | | data format ([RFC1950]) | | - - ^ + | | [RFC1951] inside the "zlib" | 7.2 | + ++ + | | data format [RFC1950] | | + ^^ Section 7.1.1. , paragraph 6, nit: > to accept in the response, and whether or not the client is willing to prese > ^^^^^^^^^^^^^^ Consider shortening this phrase to just "whether". It is correct though if you mean "regardless of whether". Section 9.5. , paragraph 2, nit: > tack has received the client's acknowledgement of the packet(s) containing th > ^^^^^^^^^^^^^^^ Do not mix variants of the same word ("acknowledgement" and "acknowledgment") within a single text. Section 9.8. , paragraph 2, nit: > onse Splitting Response splitting (a.k.a, CRLF injection) is a common techni > ^^^^^ The abbreviation is missing a period after the last letter. Section 10.2. , paragraph 17, nit: > such that it can be used over many different forms of encrypted connection, > ^^^^^^^^^^^^^^ Consider using "many". "Appendix B. ", paragraph 2, nit: > (which indicate that the client ought stop sending the header field), and t > ^^^^^^^^^^ Did you mean "ought to stop"? "B.3. ", paragraph 2, nit: > ferring to RFC 723x. * Remove acknowledgements specific to RFC 723x. * Move > ^^^^^^^^^^^^^^^^ Do not mix variants of the same word ("acknowledgement" and "acknowledgment") within a single text. "B.4. ", paragraph 1, nit: > pecific to RFC 723x. * Move "Acknowledgements" to the very end and make them > ^^^^^^^^^^^^^^^^ Do not mix variants of the same word ("acknowledgement" and "acknowledgment") within a single text. "C.2.2. ", paragraph 4, nit: > ction 12.4, update the APLN protocol id for HTTP/1.1 ( ^^ This abbreviation for "identification" is spelled all-uppercase. Uncited references: [RFC7231]. Obsolete reference to RFC2068, obsoleted by RFC2616 (this may be on purpose). These URLs point to tools.ietf.org, which is being deprecated: * https://tools.ietf.org/html/draft-ietf-httpbis-semantics-16 * https://tools.ietf.org/html/draft-ietf-httpbis-cache-16 These URLs in the document can probably be converted to HTTPS: * http://packetstormsecurity.com/papers/general/whitepaper_httpresponse.pdf |
2021-06-10
|
16 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded for Lars Eggert |
2021-06-10
|
16 | Francesca Palombini | Ballot has been issued |
2021-06-10
|
16 | Francesca Palombini | [Ballot Position Update] New position, Yes, has been recorded for Francesca Palombini |
2021-06-10
|
16 | Francesca Palombini | Created "Approve" ballot |
2021-06-10
|
16 | Francesca Palombini | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2021-06-10
|
16 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2021-06-09
|
16 | Roni Even | Request for Last Call review by GENART Completed: Ready. Reviewer: Roni Even. Sent review to list. |
2021-06-08
|
16 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2021-06-08
|
16 | Amanda Baber | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-httpbis-messaging-16. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-httpbis-messaging-16. If any part of this review is inaccurate, please let us know. IANA has a question about one of this document's five actions. See action 4. Also, IANA understands that one of the actions requested in the IANA Considerations section is dependent upon the approval and completion of IANA Actions in another document: draft-ietf-httpbis-semantics First, in the new Hypertext Transfer Protocol (HTTP) Field Name registry located at https://www.iana.org/assignments/http-fields and created as a result of the actions in Section 18.4 of draft-ietf-httpbis-semantics, the following entries will be added: +===================+==========+======+============+ | Field Name | Status | Ref. | Comments | +===================+==========+======+============+ | Close | standard | 9.6 | (reserved) | +-------------------+----------+------+------------+ | MIME-Version | standard | B.1 | | +-------------------+----------+------+------------+ | Transfer-Encoding | standard | 6.1 | | +-------------------+----------+------+------------+ Second, in the message namespace at https://www.iana.org/assignments/media-types the existing registration for message/http will have its reference and template information replaced with a reference to and information from this document. Third, in the application namespace at https://www.iana.org/assignments/media-types the existing registration for application/http will have its reference and template information replaced with a reference to and information from this document. Fourth, in the HTTP Transfer Coding registry at https://www.iana.org/assignments/http-parameters the following entries will be added: +============+===============================+===========+ | Name | Description | Reference | +============+===============================+===========+ | chunked | Transfer in a series of | Section | | | chunks | 7.1 | +------------+-------------------------------+-----------+ | compress | UNIX "compress" data format | Section | | | [Welch] | 7.2 | +------------+-------------------------------+-----------+ | deflate | "deflate" compressed data | Section | | | ([RFC1951]) inside the "zlib" | 7.2 | | | data format ([RFC1950]) | | +------------+-------------------------------+-----------+ | gzip | GZIP file format [RFC1952] | Section | | | | 7.2 | +------------+-------------------------------+-----------+ | trailers | (reserved) | Section | | | | 12.3 | +------------+-------------------------------+-----------+ | x-compress | Deprecated (alias for | Section | | | compress) | 7.2 | +------------+-------------------------------+-----------+ | x-gzip | Deprecated (alias for gzip) | Section | | | | 7.2 | +------------+-------------------------------+-----------+ QUESTION: Section 12.3 says, "Please update the 'HTTP Transfer Coding Registry' at with the registration procedure of Section 7.3." However, Section 7.3 does not appear to change the current registration procedure (IETF Review). Should that procedure have been changed? Or should IANA place other information from Section 7.3 in a note at the top of the registry? Fifth, in the TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs registry at https://www.iana.org/assignments/tls-extensiontype-values/ the following registration will have its reference replaced with a reference to this document: +==========+=============================+================+ | Protocol | Identification Sequence | Reference | +==========+=============================+================+ | HTTP/1.1 | 0x68 0x74 0x74 0x70 0x2f | [ RFC-to-be ] | | | 0x31 0x2e 0x31 ("http/1.1") | | +----------+-----------------------------+----------------+ Note: The actions will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Amanda Baber Lead IANA Services Specialist |
2021-06-03
|
16 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jon Mitchell |
2021-06-03
|
16 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jon Mitchell |
2021-05-27
|
16 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2021-05-27
|
16 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2021-05-27
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Paul Wouters |
2021-05-27
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Paul Wouters |
2021-05-27
|
16 | Amy Vezza | Placed on agenda for telechat - 2021-06-17 |
2021-05-27
|
16 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Olivier Bonaventure |
2021-05-27
|
16 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Olivier Bonaventure |
2021-05-27
|
16 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2021-05-27
|
16 | Amy Vezza | The following Last Call announcement was sent out (ends 2021-06-10): From: The IESG To: IETF-Announce CC: draft-ietf-httpbis-messaging@ietf.org, francesca.palombini@ericsson.com, httpbis-chairs@ietf.org, ietf-http-wg@w3.org, tpauly@apple.com … The following Last Call announcement was sent out (ends 2021-06-10): From: The IESG To: IETF-Announce CC: draft-ietf-httpbis-messaging@ietf.org, francesca.palombini@ericsson.com, httpbis-chairs@ietf.org, ietf-http-wg@w3.org, tpauly@apple.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (HTTP/1.1) to Proposed Standard The IESG has received a request from the HTTP WG (httpbis) to consider the following document: - 'HTTP/1.1' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2021-06-10. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns. This document obsoletes portions of RFC 7230. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-httpbis-messaging/ No IPR declarations have been submitted directly on this I-D. |
2021-05-27
|
16 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2021-05-27
|
16 | Francesca Palombini | Last call was requested |
2021-05-27
|
16 | Francesca Palombini | Last call announcement was generated |
2021-05-27
|
16 | Francesca Palombini | Ballot approval text was generated |
2021-05-27
|
16 | (System) | Changed action holders to Francesca Palombini (IESG state changed) |
2021-05-27
|
16 | Francesca Palombini | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2021-05-27
|
16 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2021-05-27
|
16 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-16.txt |
2021-05-27
|
16 | (System) | New version approved |
2021-05-27
|
16 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Mark Nottingham , Roy Fielding |
2021-05-27
|
16 | Julian Reschke | Uploaded new revision |
2021-05-26
|
15 | (System) | Changed action holders to Roy Fielding, Mark Nottingham, Julian Reschke, Francesca Palombini (IESG state changed) |
2021-05-26
|
15 | Francesca Palombini | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2021-04-18
|
15 | (System) | Changed action holders to Francesca Palombini (IESG state changed) |
2021-04-18
|
15 | Francesca Palombini | IESG state changed to AD Evaluation from Publication Requested |
2021-04-18
|
15 | Francesca Palombini | Ballot writeup was changed |
2021-04-13
|
15 | Tommy Pauly | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard; this obsoletes a previous standards-track document RFC 7230. This status is indicated in the document and Datatracker. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document is the newest revision of the RFCs that describe HTTP/1.1, the last revision of which was made in 2014. This document represents only the parts of HTTP that are specific to the 1.1 version, while the related semantics document covers the version-independent aspects of HTTP. Working Group Summary & Document Quality: The working group, led by the group of three editors, has poured a lot of time and effort into ensuring that these core documents are produced with great quality and clarity. This effort to revise the documents began in 2018, and over the past three years, the working group has spent about half of its meeting time discussing the ongoing work on these core documents. A detailed list of all issues that were discussed can be found on the GitHub repo: https://github.com/httpwg/http-core/issues. The messaging document in particular, as it primarily describes a long-existing version of the protocol, was more straightforward than the semantics document for WG discussion. Personnel: Document Shepherd: Tommy Pauly Responsible Area Director: Francesca Palombini I’ve reviewed this document as part of issuing the WGLC, and followed the various comments/issues filed by the WG and discussed in our recent interim meeting. I believe this document is quite ready to be forwarded, and is a truly useful and well-written specification. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. This document has been the product of careful and in-depth by the working group over several years, and went through a long last call. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No new reviews are needed here, in my opinion. This document isn’t introducing any new behavior or architecture, but rather consolidating and clarifying existing documents. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? The editors have not indicated any IPR on this document. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR has been reported. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG consensus seems quite solid. During WGLC, we received in-depth reviews from core participants, as well as many GitHub issues from WG participants. From when WGLC started until now, we received 54 issues on the HTTP core documents from people other than document editors. https://github.com/httpwg/http-core/issues?q=is%3Aissue+is%3Aclosed (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No such complaints have been expressed. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. == There is 1 instance of lines with non-ascii characters in the document. This is part of an address. -- The draft header indicates that this document obsoletes RFC7230, but the abstract doesn't seem to directly say this. It does mention RFC7230 though, so this could be OK. This is OK, as the abstract does explain the obsoletion. == Unused Reference: 'RFC7231' is defined on line 2032, but no explicit reference was found in the text This reference could likely be removed, or added along with 7230. ** Downref: Normative reference to an Informational RFC: RFC 1950 ** Downref: Normative reference to an Informational RFC: RFC 1951 ** Downref: Normative reference to an Informational RFC: RFC 1952 -- Possible downref: Non-RFC (?) normative reference: ref. 'USASCII' -- Possible downref: Non-RFC (?) normative reference: ref. 'Welch' -- Obsolete informational reference (is this intentional?): RFC 2068 (Obsoleted by RFC 2616) -- Duplicate reference: RFC7230, mentioned in 'RFC7230', was also mentioned in 'Err4667'. Recommend that the AD follows up with these downrefs. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. This document updates the reference for existing media types, but does not create any new registrations. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? These are highlighted by the nits checks: ** Downref: Normative reference to an Informational RFC: RFC 1950 ** Downref: Normative reference to an Informational RFC: RFC 1951 ** Downref: Normative reference to an Informational RFC: RFC 1952 -- Possible downref: Non-RFC (?) normative reference: ref. 'USASCII' -- Possible downref: Non-RFC (?) normative reference: ref. 'Welch' (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Please see (14) above. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. Yes, this document obsoletes portions of RFC 7230. This is described clearly in the document. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The IANA requests for this document are primarily to move references in existing tables to point to this document, along with filling out some information from the semantics document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. This document uses ABNF rules, which have been validated. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? No YANG impact. |
2021-04-13
|
15 | Tommy Pauly | Responsible AD changed to Francesca Palombini |
2021-04-13
|
15 | Tommy Pauly | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2021-04-13
|
15 | Tommy Pauly | IESG state changed to Publication Requested from I-D Exists |
2021-04-13
|
15 | Tommy Pauly | IESG process started in state Publication Requested |
2021-04-13
|
15 | Tommy Pauly | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2021-04-13
|
15 | Tommy Pauly | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard; this obsoletes a previous standards-track document RFC 7230. This status is indicated in the document and Datatracker. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document is the newest revision of the RFCs that describe HTTP/1.1, the last revision of which was made in 2014. This document represents only the parts of HTTP that are specific to the 1.1 version, while the related semantics document covers the version-independent aspects of HTTP. Working Group Summary & Document Quality: The working group, led by the group of three editors, has poured a lot of time and effort into ensuring that these core documents are produced with great quality and clarity. This effort to revise the documents began in 2018, and over the past three years, the working group has spent about half of its meeting time discussing the ongoing work on these core documents. A detailed list of all issues that were discussed can be found on the GitHub repo: https://github.com/httpwg/http-core/issues. The messaging document in particular, as it primarily describes a long-existing version of the protocol, was more straightforward than the semantics document for WG discussion. Personnel: Document Shepherd: Tommy Pauly Responsible Area Director: Francesca Palombini I’ve reviewed this document as part of issuing the WGLC, and followed the various comments/issues filed by the WG and discussed in our recent interim meeting. I believe this document is quite ready to be forwarded, and is a truly useful and well-written specification. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. This document has been the product of careful and in-depth by the working group over several years, and went through a long last call. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No new reviews are needed here, in my opinion. This document isn’t introducing any new behavior or architecture, but rather consolidating and clarifying existing documents. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? The editors have not indicated any IPR on this document. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR has been reported. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG consensus seems quite solid. During WGLC, we received in-depth reviews from core participants, as well as many GitHub issues from WG participants. From when WGLC started until now, we received 54 issues on the HTTP core documents from people other than document editors. https://github.com/httpwg/http-core/issues?q=is%3Aissue+is%3Aclosed (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No such complaints have been expressed. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. == There is 1 instance of lines with non-ascii characters in the document. This is part of an address. -- The draft header indicates that this document obsoletes RFC7230, but the abstract doesn't seem to directly say this. It does mention RFC7230 though, so this could be OK. This is OK, as the abstract does explain the obsoletion. == Unused Reference: 'RFC7231' is defined on line 2032, but no explicit reference was found in the text This reference could likely be removed, or added along with 7230. ** Downref: Normative reference to an Informational RFC: RFC 1950 ** Downref: Normative reference to an Informational RFC: RFC 1951 ** Downref: Normative reference to an Informational RFC: RFC 1952 -- Possible downref: Non-RFC (?) normative reference: ref. 'USASCII' -- Possible downref: Non-RFC (?) normative reference: ref. 'Welch' -- Obsolete informational reference (is this intentional?): RFC 2068 (Obsoleted by RFC 2616) -- Duplicate reference: RFC7230, mentioned in 'RFC7230', was also mentioned in 'Err4667'. Recommend that the AD follows up with these downrefs. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. This document updates the reference for existing media types, but does not create any new registrations. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? These are highlighted by the nits checks: ** Downref: Normative reference to an Informational RFC: RFC 1950 ** Downref: Normative reference to an Informational RFC: RFC 1951 ** Downref: Normative reference to an Informational RFC: RFC 1952 -- Possible downref: Non-RFC (?) normative reference: ref. 'USASCII' -- Possible downref: Non-RFC (?) normative reference: ref. 'Welch' (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Please see (14) above. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. Yes, this document obsoletes portions of RFC 7230. This is described clearly in the document. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The IANA requests for this document are primarily to move references in existing tables to point to this document, along with filling out some information from the semantics document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. This document uses ABNF rules, which have been validated. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? No YANG impact. |
2021-04-02
|
15 | Tommy Pauly | Notification list changed to tpauly@apple.com because the document shepherd was set |
2021-04-02
|
15 | Tommy Pauly | Document shepherd changed to Tommy Pauly |
2021-04-02
|
15 | Tommy Pauly | Changed consensus to Yes from Unknown |
2021-04-02
|
15 | Tommy Pauly | Intended Status changed to Proposed Standard from None |
2021-03-30
|
15 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-15.txt |
2021-03-30
|
15 | (System) | New version approved |
2021-03-30
|
15 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Mark Nottingham , Roy Fielding |
2021-03-30
|
15 | Julian Reschke | Uploaded new revision |
2021-02-12
|
14 | Tommy Pauly | Tag Revised I-D Needed - Issue raised by WGLC set. |
2021-02-12
|
14 | Tommy Pauly | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2021-01-14
|
14 | Tommy Pauly | IETF WG state changed to In WG Last Call from WG Document |
2021-01-12
|
14 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-14.txt |
2021-01-12
|
14 | (System) | New version approved |
2021-01-12
|
14 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Mark Nottingham , Roy Fielding |
2021-01-12
|
14 | Julian Reschke | Uploaded new revision |
2020-12-14
|
13 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-13.txt |
2020-12-14
|
13 | (System) | New version approved |
2020-12-14
|
13 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Mark Nottingham , Julian Reschke |
2020-12-14
|
13 | Julian Reschke | Uploaded new revision |
2020-10-02
|
12 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-12.txt |
2020-10-02
|
12 | (System) | New version approved |
2020-10-02
|
12 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Julian Reschke , Mark Nottingham |
2020-10-02
|
12 | Julian Reschke | Uploaded new revision |
2020-08-27
|
11 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-11.txt |
2020-08-27
|
11 | (System) | New version approved |
2020-08-27
|
11 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Roy Fielding , Mark Nottingham |
2020-08-27
|
11 | Julian Reschke | Uploaded new revision |
2020-07-12
|
10 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-10.txt |
2020-07-12
|
10 | (System) | New version approved |
2020-07-12
|
10 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Roy Fielding , Mark Nottingham |
2020-07-12
|
10 | Julian Reschke | Uploaded new revision |
2020-07-11
|
09 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-09.txt |
2020-07-11
|
09 | (System) | New version approved |
2020-07-11
|
09 | (System) | Request for posting confirmation emailed to previous authors: Mark Nottingham , Roy Fielding , Julian Reschke |
2020-07-11
|
09 | Julian Reschke | Uploaded new revision |
2020-05-26
|
08 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-08.txt |
2020-05-26
|
08 | (System) | New version approved |
2020-05-26
|
08 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Mark Nottingham , Roy Fielding |
2020-05-26
|
08 | Julian Reschke | Uploaded new revision |
2020-03-07
|
07 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-07.txt |
2020-03-07
|
07 | (System) | New version approved |
2020-03-07
|
07 | (System) | Request for posting confirmation emailed to previous authors: Julian Reschke , Roy Fielding , Mark Nottingham |
2020-03-07
|
07 | Julian Reschke | Uploaded new revision |
2019-11-04
|
06 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-06.txt |
2019-11-04
|
06 | (System) | New version approved |
2019-11-04
|
06 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Julian Reschke , Mark Nottingham |
2019-11-04
|
06 | Julian Reschke | Uploaded new revision |
2019-07-08
|
05 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-05.txt |
2019-07-08
|
05 | (System) | New version approved |
2019-07-08
|
05 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Julian Reschke , Mark Nottingham |
2019-07-08
|
05 | Julian Reschke | Uploaded new revision |
2019-03-09
|
04 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-04.txt |
2019-03-09
|
04 | (System) | New version approved |
2019-03-09
|
04 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Julian Reschke , Mark Nottingham |
2019-03-09
|
04 | Julian Reschke | Uploaded new revision |
2018-10-18
|
03 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-03.txt |
2018-10-18
|
03 | (System) | New version approved |
2018-10-18
|
03 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Julian Reschke , Mark Nottingham |
2018-10-18
|
03 | Julian Reschke | Uploaded new revision |
2018-07-02
|
02 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-02.txt |
2018-07-02
|
02 | (System) | New version approved |
2018-07-02
|
02 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Julian Reschke , Mark Nottingham |
2018-07-02
|
02 | Julian Reschke | Uploaded new revision |
2018-05-31
|
01 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-01.txt |
2018-05-31
|
01 | (System) | New version approved |
2018-05-31
|
01 | (System) | Request for posting confirmation emailed to previous authors: Roy Fielding , Julian Reschke , Mark Nottingham |
2018-05-31
|
01 | Julian Reschke | Uploaded new revision |
2018-05-30
|
00 | Mark Nottingham | This document now replaces draft-fielding-httpbis-http-messaging instead of None |
2018-04-03
|
00 | Julian Reschke | New version available: draft-ietf-httpbis-messaging-00.txt |
2018-04-03
|
00 | (System) | WG -00 approved |
2018-04-03
|
00 | Julian Reschke | Set submitter to ""Julian F. Reschke" ", replaces to (none) and sent approval email to group chairs: httpbis-chairs@ietf.org |
2018-04-03
|
00 | Julian Reschke | Uploaded new revision |