You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@ekinnear noted today that the performance impact of proxies closing the connection after returning HTTP 407 are not merely hypothetical, and are significant in practice. This draft currently says that proxies MAY adopt this behavior as a mitigation for potential misbehaving clients.
Some things we could do:
Remove this MAY. After a closer look at some earlier anecdotes, we have not actually found a client that exhibits the misbehavior.
Conduct some kind of study or outreach to see if we can find any misbehaving clients (i.e. CONNECT clients that send first-flight payload data without waiting for the 200 response).
Define a request header like "Vulnerable-To-Request-Smuggling: ?0", by which the client promises that it is proxying TCP connections for a trusted TCP client or delaying payload data until after the success response, so there is no need for defensive measures.
The text was updated successfully, but these errors were encountered:
Definitely not the last one -- too close to the Evil Bit. I'd be inclined to leave this as MAY, but not stronger, and expand on the text a little bit. It's a defense that has a performance cost, and implementers need to decide whether they're willing to pay the price to have that defense. That's what MAY is -- we don't endorse it, we just note the option.
The right solution is to use HTTP/2 or HTTP/3, where this won't be an issue.
@ekinnear noted today that the performance impact of proxies closing the connection after returning HTTP 407 are not merely hypothetical, and are significant in practice. This draft currently says that proxies MAY adopt this behavior as a mitigation for potential misbehaving clients.
Some things we could do:
The text was updated successfully, but these errors were encountered: