Skip to content

Commit f15ecf5

Browse files
committed
Rework RFC 9112 Update instructions
1 parent 3cb6d16 commit f15ecf5

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

draft-ietf-httpbis-optimistic-upgrade.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -153,18 +153,16 @@ Future specifications for upgrade tokens should restrict their use to GET reques
153153

154154
# Guidance for HTTP CONNECT
155155

156-
In HTTP/1.1, proxy clients that send CONNECT requests on behalf of untrusted TCP clients MUST do one or both of the following:
156+
This document updates RFC 9112 to include the remaining text of this section. The requirements in this section apply only to HTTP/1.1.
157+
158+
Proxy clients that send CONNECT requests on behalf of untrusted TCP clients MUST do one or both of the following:
157159

158160
1. Wait for a 2xx (Successful) response before forwarding any TCP payload data.
159161
1. Send a "Connection: close" request header.
160162

161-
Proxy clients that don't implement at least one of these two behaviors are vulnerable to a trivial request smuggling attack ({{request-smuggling}}).
162-
163-
At the time of writing, some proxy clients are believed to be vulnerable as described. As a mitigation, this document updates RFC 9112 by adding the following section:
163+
Proxy clients that don't implement at least one of these two behaviors are vulnerable to a trivial request smuggling attack ({{RFC9112, Section 11.2}}).
164164

165-
> 9.6.1. Rejecting a CONNECT Request
166-
>
167-
> In HTTP/1.1, proxy servers MUST close the underlying connection when rejecting a CONNECT request, without processing any further requests on that connection, unless the client is known to wait for a 2xx (Successful) response before forwarding TCP payload data. This requirement applies whether or not the request includes a "close" connection option.
165+
At the time of writing, some proxy clients are believed to be vulnerable as described. As a mitigation, proxy servers MUST close the underlying connection when rejecting a CONNECT request, without processing any further requests on that connection, unless the client is known to wait for a 2xx (Successful) response before forwarding TCP payload data. This requirement applies whether or not the request includes a "close" connection option.
168166

169167
Note that this mitigation will frequently impair the performance of correctly implemented clients, especially when returning a 407 (Proxy Authentication Required) response. This performance loss can be avoided by using HTTP/2 or HTTP/3, which are not vulnerable to this attack.
170168

0 commit comments

Comments
 (0)