Skip to content

Commit a3edc93

Browse files
committed
Expand text on HTTP/1.1 implementation issues
1 parent 9fb6357 commit a3edc93

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

draft-ietf-httpbis-connect-tcp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -294,9 +294,9 @@ A malicious client can achieve cause highly asymmetric resource usage at the pro
294294
While this specification is fully functional under HTTP/1.1, performance-sensitive deployments SHOULD use HTTP/2 or HTTP/3 instead. When using HTTP/1.1:
295295

296296
* Each CONNECT request requires a new TCP and TLS connection, imposing a higher cost in setup latency, congestion control convergence, CPU time, and data transfer.
297-
* The abrupt closure signals ({{closing-connections}}) are more likely to be missing or corrupted:
298-
- Some implementations may be unable to omit the TLS closure alert or send a TCP RST, as recommended.
299-
- Faulty implementations may fail to send a TLS closure alert during graceful shutdown.
297+
* The graceful and abrupt closure signals ({{closing-connections}}) are more likely to be missing or corrupted:
298+
- Some implementations may be unable to emit the recommended abrupt closure signals, due to limitations in their TCP and TLS subsystems.
299+
- Faulty implementations may fail to send a TLS closure alert during graceful shutdown, or fail to report an error when the expected closure alert is not received. These misbehaviors are not compliant with {{RFC8446}}, but they are common nonetheless among HTTP/1.1 implementations today.
300300
* The number of active connections through each client may be limited by the number of available TCP client ports, especially if:
301301
- The client only has one IP address that can be used to reach the proxy.
302302
- The client is shared between many parties, such as when acting as a gateway or concentrator.

0 commit comments

Comments
 (0)