Skip to content

Commit 02e30eb

Browse files
authored
Merge pull request #12 from ietf-wg-httpapi/explicitly
Explicitly explicit
2 parents 6f89f05 + 7e31124 commit 02e30eb

File tree

1 file changed

+10
-4
lines changed

1 file changed

+10
-4
lines changed

draft-ietf-httpapi-privacy.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,10 @@ recommendations above.
182182
## Implement Relevant Protocols
183183

184184
Clients SHOULD support and query for HTTPS records {{!RFC9460}} when
185-
establishing a connection and SHOULD respect HSTS headers {{!RFC6797}} received
185+
establishing a connection. This gives servers an opportunity to provide more
186+
complete information about capabilities, some of which are security-relevant.
187+
188+
Clients SHOULD respect HSTS headers {{!RFC6797}} received
186189
from a server. This includes implementing persistent storage of HSTS indications
187190
received from the server.
188191

@@ -195,9 +198,12 @@ token whose value begins with "secret-token:" over an insecure channel.
195198
## Disallow Insecure by Default
196199

197200
When authentication is used, clients SHOULD require an explicit indication from
198-
the user or caller that an insecure context is expected. Without such an
199-
indication, attempts to send credentials should fail without producing any
200-
network traffic.
201+
the user or caller that an insecure context is expected which is distinct from
202+
the provided URI. Depending on the interface, this might be a UI preference or
203+
an API flag.
204+
205+
Absent such an indication, clients of HTTP APIs MUST implement and use HTTPS
206+
exclusively.
201207

202208
# Security Considerations
203209

0 commit comments

Comments
 (0)