@techreport{jjmb-httpbis-trusted-traffic-00, number = {draft-jjmb-httpbis-trusted-traffic-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-jjmb-httpbis-trusted-traffic/00/}, author = {John Jason Brzozowski and Kris Beevers and James Cariello and John Colton and Lutz Jacob and John Leddy and Josh Shaul and Lou Steinberg}, title = {{Trusted Traffic}}, pagetotal = 12, year = 2018, month = may, day = 22, abstract = {Current methods for managing traffic through content inspection tend to process all sessions similarly. Internet traffic examples like DDoS mitigation require all data to pass through one of a limited number of scrubbing centers, which create both natural choke points and the potential for widespread collateral damage should a center become overloaded. Similar issues exist with email SPAM and malware filtering, traffic shaping, etc. We propose a method to utilize existing HTTP and HTTPS protocols that enables destinations to temporarily confer trust on sources, and for trusted traffic to be routed and processed differently from untrusted traffic.}, }