Skip to content

Commit ab89f77

Browse files
authored
Fix 3 typos and grammar issue spotted by AD (#3366)
Fixes #3358 Fixes #3359
1 parent c59f276 commit ab89f77

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

draft-ietf-httpbis-unencoded-digest.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ to indicate preferences for content codings. It is possible for an endpoint to
9191
indicate a preference for no encoding, for example by sending the "identity"
9292
token. However, codings often provide data compression that is advantageous.
9393
Disabling content coding in order to simplify integrity checking is possibly an
94-
unacceptable trade off.
94+
unacceptable trade-off.
9595

9696
For a variety of reasons, decoding and re-encoding content in order to benefit
9797
from HTTP integrity fields is not preferable. This specification defines the
@@ -236,7 +236,7 @@ decoded output produces the same byte sequence as the input. While many
236236
registered content codings behave this way, there is no requirement for them to
237237
do so and it remains a possibility that decoding could produce a
238238
different byte sequence. In order to avoid unintended validation failures, care
239-
is advised when selecting content coding for use with `Unencoded-Digest`.
239+
is advised when selecting content codings for use with `Unencoded-Digest`.
240240

241241

242242
# Integrity Fields are Complementary
@@ -332,7 +332,7 @@ opportunity for an attacker to direct malicious data into a decoder. One
332332
possible mitigation would be to also provide a Content-Digest or Repr-Digest in
333333
the message, allowing for validation of the received bytes before further
334334
processing. An attacker that can substitute various parts of an HTTP message
335-
presents several risks, {{Sections 6.1, 6.2 and 6.3 of DIGEST-FIELDS}}
335+
presents several risks; {{Sections 6.1, 6.2 and 6.3 of DIGEST-FIELDS}}
336336
describe relevant considerations and mitigations.
337337

338338
A content coding may provide encryption capabilities, for example "aes128gcm"
@@ -343,9 +343,8 @@ who can read the HTTP message. This could be used as a side channel.
343343

344344
# IANA Considerations
345345

346-
Should this document be adopted and achieve working group consensus, IANA is
347-
asked to update the "Hypertext Transfer Protocol (HTTP) Field Name Registry"
348-
{{?HTTP=RFC9110}} as shown in the table below:
346+
IANA is asked to update the "Hypertext Transfer Protocol (HTTP) Field Name
347+
Registry" {{?HTTP=RFC9110}} as shown in the table below:
349348

350349
|-----------------------|-----------|-----------------|--------------------------------------------|
351350
| Field Name | Status | Structured Type | Reference |

0 commit comments

Comments
 (0)