Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

List of HTTP header fields

From Wikipedia, the free encyclopedia
(Redirected fromHTTP headers)

HTTP
Request methods
Header fields
Response status codes
Security access control methods
Security vulnerabilities

HTTP header fields are a list ofstrings sent and received by both the client program and server on every HTTP request and response. Theseheaders are usually invisible to theend-user and are only processed orlogged by the server and client applications. They define how information sent/received through the connection are encoded (as inContent-Encoding), the session verification and identification of the client (as inbrowser cookies, IP address,user-agent) or their anonymity thereof (VPN or proxy masking, user-agent spoofing), how the server should handle data (as inDo-Not-Track orGlobal Privacy Control), the age (the time it has resided in a sharedcache) of the document being downloaded, amongst others.

General format

[edit]

In HTTP version 1.x, header fields are transmitted after the request line (in case of a request HTTP message) or the response line (in case of a response HTTP message), which is the first line of a message. Header fields are colon-separated key-value pairs in clear-textstring format, terminated by acarriage return (CR) andline feed (LF) character sequence. The end of the header section is indicated by an empty field line, resulting in the transmission of two consecutive CR-LF pairs. In the past, long lines could be folded into multiple lines; continuation lines are indicated by the presence of a space (SP) or horizontal tab (HT) as the first character on the next line. This folding was deprecated in RFC 7230.[1]

HTTP/2[2] andHTTP/3 instead use abinary protocol, where headers are encoded in a singleHEADERS and zero or moreCONTINUATION frames using HPACK[3] (HTTP/2) or QPACK (HTTP/3), which both provide efficient header compression. The request or response line from HTTP/1 has also been replaced by several pseudo-header fields, each beginning with a colon (:).

Field names

[edit]

A core set of fields is standardized by theInternet Engineering Task Force (IETF) inRFC 9110 and9111. TheField Names,Header Fields andRepository of Provisional Registrations are maintained by theIANA. Additional field names and permissible values may be defined by each application.

Header field names are case-insensitive.[4] This is in contrast to HTTP method names (GET, POST, etc.), which are case-sensitive.[5]

HTTP/2 makes some restrictions on specific header fields (see below).

Non-standard header fields were conventionally marked by prefixing the field name withX- but this convention was deprecated in June 2012 because of the inconveniences it caused when non-standard fields became standard.[6] An earlier restriction on use ofDowngraded- was lifted in March 2013.[7]

Field values

[edit]

A few fields can contain comments (i.e. in User-Agent, Server, Via fields), which can be ignored by software.[8]

Many field values may contain a quality (q) key-value pair separated byequals sign, specifying a weight to use incontent negotiation.[9] For example, a browser may indicate that it accepts information in German or English, with German as preferred by setting theq value forde higher than that ofen, as follows:

Accept-Language: de; q=1.0, en; q=0.5

Size limits

[edit]

The standard imposes no limits to the size of each header field name or value, or to the number of fields. However, most servers, clients, and proxy software impose some limits for practical and security reasons. For example, the Apache 2.3 server by default limits the size of each field to 8,190 bytes, and there can be at most 100 header fields in a single request.[10]

Request fields

[edit]

Standard request fields

[edit]
NameDescriptionExampleStatusStandard
A-IMAcceptable instance-manipulations for the request.[11]A-IM: feedPermanentRFC 3229
AcceptMedia type(s) that is/are acceptable for the response. SeeContent negotiation.Accept: text/htmlPermanentRFC 9110
Accept-CharsetCharacter sets that are acceptable.Accept-Charset: utf-8PermanentRFC 9110
Accept-DatetimeAcceptable version in time.Accept-Datetime: Thu, 31 May 2007 20:35:00 GMTProvisionalRFC 7089
Accept-EncodingList of acceptable encodings. SeeHTTP compression.Accept-Encoding: gzip, deflatePermanentRFC 9110
Accept-LanguageList of acceptable human languages for response. SeeContent negotiation.Accept-Language: en-USPermanentRFC 9110
Access-Control-Request-Method,
Access-Control-Request-Headers
[12]
Initiates a request forcross-origin resource sharing withOrigin (below).Access-Control-Request-Method: GETPermanent: standard
AuthorizationAuthentication credentials forHTTP authentication.Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==PermanentRFC 9110
Cache-ControlUsed to specify directives thatmust be obeyed by all caching mechanisms along the request-response chain.Cache-Control: no-cachePermanentRFC 9111
ConnectionControl options for the current connection and list of hop-by-hop request fields.[13]

Must not be used with HTTP/2.[14]

Connection: keep-alive

Connection: Upgrade

PermanentRFC 9110
Content-EncodingThe type of encoding used on the data. SeeHTTP compression.Content-Encoding: gzipPermanentRFC 9110
Content-LengthThe length of the request body inoctets (8-bit bytes).Content-Length: 348PermanentRFC 9110
Content-MD5ABase64-encoded binaryMD5 sum of the content of the request body.Content-MD5: Q2hlY2sgSW50ZWdyaXR5IQ==Obsolete[15]RFC 1544,1864,4021
Content-TypeTheMedia type of the body of the request (used with POST and PUT requests).Content-Type: application/x-www-form-urlencodedPermanentRFC 9110
CookieAnHTTP cookie previously sent by the server withSet-Cookie (below).Cookie: $Version=1; Skin=new;Permanent: standardRFC 2965,6265
DateThe date and time at which the message was originated (in "HTTP-date" format as defined byRFC 9110: HTTP Semantics, section 5.6.7 "Date/Time Formats").Date: Tue, 15 Nov 1994 08:12:31 GMTPermanentRFC 9110
ExpectIndicates that particular server behaviors are required by the client.Expect: 100-continuePermanentRFC 9110
ForwardedDisclose original information of a client connecting to a web server through an HTTP proxy.[16]Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43Forwarded: for=192.0.2.43, for=198.51.100.17PermanentRFC 7239
FromThe email address of the user making the request.From: user@example.comPermanentRFC 9110
HostThe domain name of the server (forvirtual hosting), and theTCP port number on which the server is listening. Theport number may be omitted if the port is the standard port for the service requested.

Mandatory since HTTP/1.1.[17]If the request is generated directly in HTTP/2, it should not be used.[18]

Host: en.wikipedia.org:8080

Host: en.wikipedia.org

PermanentRFC 9110,9113
HTTP2-SettingsA request that upgrades from HTTP/1.1 to HTTP/2 MUST include exactly oneHTTP2-Settings header field. TheHTTP2-Settings header field is a connection-specific header field that includes parameters that govern the HTTP/2 connection, provided in anticipation of the server accepting the request to upgrade.[19][20]HTTP2-Settings: token64ObsoleteRFC 7540,9113
If-MatchOnly perform the action if the client supplied entity matches the same entity on the server. This is mainly for methods like PUT to only update a resource if it has not been modified since the user last updated it.If-Match: "737060cd8c284d8af7ad3082f209582d"PermanentRFC 9110
If-Modified-SinceAllows a304 Not Modified to be returned if content is unchanged.If-Modified-Since: Sat, 29 Oct 1994 19:43:31 GMTPermanentRFC 9110
If-None-MatchAllows a304 Not Modified to be returned if content is unchanged, seeHTTP ETag.If-None-Match: "737060cd8c284d8af7ad3082f209582d"PermanentRFC 9110
If-RangeIf the entity is unchanged, send me the part(s) that I am missing; otherwise, send me the entire new entity.If-Range: "737060cd8c284d8af7ad3082f209582d"PermanentRFC 9110
If-Unmodified-SinceOnly send the response if the entity has not been modified since a specific time.If-Unmodified-Since: Sat, 29 Oct 1994 19:43:31 GMTPermanentRFC 9110
Max-ForwardsLimit the number of times the message can be forwarded through proxies or gateways.Max-Forwards: 10PermanentRFC 9110
Origin[12]Initiates a request forcross-origin resource sharing (asks server forAccess-Control-* response fields).Origin: http://www.example-social-network.comPermanent: standardRFC 6454
PragmaImplementation-specific fields that may have various effects anywhere along the request-response chain.Pragma: no-cacheOutdatedRFC 9111
PreferAllows client to request that certain behaviors be employed by a server while processing a request.Prefer: return=representationPermanentRFC 7240
Proxy-AuthorizationAuthorization credentials for connecting to a proxy.Proxy-Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==PermanentRFC 9110
RangeRequest only part of an entity. Bytes are numbered from 0. SeeByte serving.Range: bytes=500-999PermanentRFC 9110
Referer [sic]This is the address of the previous web page from which a link to the currently requested page was followed. (The word "referrer" has been misspelled in the RFC as well as in most implementations to the point that it has become standard usage and is considered correct terminology.)Referer: http://en.wikipedia.org/wiki/Main_PagePermanentRFC 9110
TEThe transfer encodings the user agent is willing to accept: the same values as for the response header field Transfer-Encoding can be used, plus the "trailers" value (related to the "chunked" transfer method) to notify the server it expects to receive additional fields in the trailer after the last, zero-sized, chunk.

Onlytrailers is supported in HTTP/2.[14]

TE: trailers,deflatePermanentRFC 9110
TrailerThe Trailer general field value indicates that the given set of header fields is present in the trailer of a message encoded withchunked transfer coding.Trailer: Max-ForwardsPermanentRFC 9110
Transfer-EncodingThe form of encoding used to safely transfer the entity to the user.Currently defined methods are:chunked, compress, deflate, gzip, identity.

Must not be used with HTTP/2.[14]

Transfer-Encoding: chunkedPermanentRFC 9110
User-AgentTheuser agent string of the user agent.User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20100101 Firefox/12.0PermanentRFC 9110
UpgradeAsk the server to upgrade to another protocol.

Must not be used in HTTP/2.[14]

Upgrade: h2c, HTTPS/1.3, IRC/6.9, RTA/x11, websocketPermanentRFC 9110
ViaInforms the server of proxies through which the request was sent.Via: 1.0 fred, 1.1 example.com (Apache/1.1)PermanentRFC 9110
WarningA general warning about possible problems with the entity body.Warning: 199 Miscellaneous warningObsolete[21]RFC 7234,9111

Common non-standard request fields

[edit]
Field nameDescriptionExample
Upgrade-Insecure-Requests[22]Tells a server which (presumably in the middle of a HTTP -> HTTPS migration) hosts mixed content that the client would prefer redirection to HTTPS and can handleContent-Security-Policy: upgrade-insecure-requestsUpgrade-Insecure-Requests: 1
X-Requested-WithMainly used to identifyAjax requests (mostJavaScript frameworks send this field with value ofXMLHttpRequest); also identifies Android apps using WebView[23] X-Requested-With: XMLHttpRequest
DNT[24]Requests a web application to disable their tracking of a user. This is Mozilla's version of the X-Do-Not-Track header field (sinceFirefox 4.0 Beta 11).Safari andIE9 also have support for this field.[25] On March 7, 2011, a draft proposal was submitted to IETF.[26] TheW3C Tracking Protection Working Group is producing a specification.[27]DNT: 1 (Do Not Track Enabled)

DNT: 0 (Do Not Track Disabled)

X-Forwarded-For[28]Ade facto standard for identifying the originating IP address of a client connecting to a web server through an HTTP proxy or load balancer. Superseded byForwarded header.X-Forwarded-For: client1, proxy1, proxy2

X-Forwarded-For: 129.78.138.66, 129.78.64.103

X-Forwarded-Host[29]Ade facto standard for identifying the original host requested by the client in theHost HTTP request header, since the host name and/or port of the reverse proxy (load balancer) may differ from the origin server handling the request. Superseded byForwarded header.X-Forwarded-Host: en.wikipedia.org:8080

X-Forwarded-Host: en.wikipedia.org

X-Forwarded-Proto[30]Ade facto standard for identifying the originating protocol of an HTTP request, since a reverse proxy (or a load balancer) may communicate with a web server using HTTP even if the request to the reverse proxy is HTTPS. An alternative form of the header (X-ProxyUser-Ip) is used by Google clients talking to Google servers. Superseded byForwarded header.X-Forwarded-Proto: https
Front-End-Https[31]Non-standard header field used by Microsoft applications and load-balancersFront-End-Https: on
X-Http-Method-Override[32]Requests a web application to override the method specified in the request (typically POST) with the method given in the header field (typically PUT or DELETE). This can be used when a user agent or firewall prevents PUT or DELETE methods from being sent directly (this is either a bug in the software component, which ought to be fixed, or an intentional configuration, in which case bypassing it may be the wrong thing to do).X-HTTP-Method-Override: DELETE
X-ATT-DeviceId[33]Allows easier parsing of the MakeModel/Firmware that is usually found in the User-Agent String of AT&T DevicesX-Att-Deviceid: GT-P7320/P7320XXLPG
X-Wap-Profile[34]Links to an XML file on the Internet with a full description and details about the device currently connecting. In the example to the right is an XML file for an AT&T Samsung Galaxy S2.x-wap-profile:http://wap.samsungmobile.com/uaprof/SGH-I777.xml
Proxy-Connection[35]Implemented as a misunderstanding of the HTTP specifications. Common because of mistakes in implementations of early HTTP versions. Has exactly the same functionality as standard Connection field.

Must not be used with HTTP/2.[14]

Proxy-Connection: keep-alive
X-UIDH[36][37][38]Server-sidedeep packet inspection of a unique ID identifying customers ofVerizon Wireless; also known as "perma-cookie" or "supercookie"X-UIDH: ...
X-Csrf-Token[39]Used to preventcross-site request forgery. Alternative header names are:X-CSRFToken[40] andX-XSRF-TOKEN[41]X-Csrf-Token: i8XNjC4b8KVok4uw5RftR38Wgp2BFwql
X-Request-ID,[stackoverflow2 1][42]

X-Correlation-ID,[43]Correlation-ID[44]

Correlates HTTP requests between a client and server. Superseded by the traceparent header

[45]

X-Request-ID: f058ebd6-02f7-4d3f-942e-904344e8cde5
Save-Data[46]The Save-Data client hint request header available in Chrome, Opera, and Yandex browsers lets developers deliver lighter, faster applications to users who opt-in to data saving mode in their browser.Save-Data: on
Sec-GPC[47]The Sec-GPC (Global Privacy Control) request header indicates whether the user consents to a website or service selling or sharing their personal information with third parties.Sec-GPC: 1

Response fields

[edit]

Standard response fields

[edit]
Field nameDescriptionExampleStatusStandard
Accept-CHRequestsHTTP Client HintsAccept-CH: UA, PlatformExperimentalRFC 8942
Access-Control-Allow-Origin,
Access-Control-Allow-Credentials,
Access-Control-Expose-Headers,
Access-Control-Max-Age,
Access-Control-Allow-Methods,
Access-Control-Allow-Headers
[12]
Specifying which web sites can participate incross-origin resource sharingAccess-Control-Allow-Origin: *Permanent: standardRFC 7480
Accept-Patch[48]Specifies which patch document formats this server supportsAccept-Patch: text/example;charset=utf-8PermanentRFC 5789
Accept-RangesWhat partial content range types this server supports viabyte servingAccept-Ranges: bytesPermanentRFC 9110
AgeThe age the object has been in aproxy cache in secondsAge: 12PermanentRFC 9111
AllowValid methods for a specified resource. To be used for a405 Method not allowedAllow: GET, HEADPermanentRFC 9110
Alt-Svc[49]A server uses "Alt-Svc" header (meaning Alternative Services) to indicate that its resources can also be accessed at a different network location (host or port) or using a different protocol

When using HTTP/2, servers should instead send an ALTSVC frame.[50]

Alt-Svc: http/1.1="http2.example.com:8001"; ma=7200Permanent
Cache-ControlTells all caching mechanisms from server to client whether they may cache this object. It is measured in secondsCache-Control: max-age=3600PermanentRFC 9111
ConnectionControl options for the current connection and list of hop-by-hop response fields.[13]

Must not be used with HTTP/2.[14]

Connection: closePermanentRFC 9110
Content-Disposition[51]An opportunity to raise a "File Download" dialogue box for a known MIME type with binary format or suggest a filename for dynamic content. Quotes are necessary with special characters.Content-Disposition: attachment; filename="fname.ext"PermanentRFC 2616,4021,6266
Content-EncodingThe type of encoding used on the data. SeeHTTP compression.Content-Encoding: gzipPermanentRFC 9110
Content-LanguageThe natural language or languages of the intended audience for the enclosed content[52]Content-Language: daPermanentRFC 9110
Content-LengthThe length of the response body inoctets (8-bit bytes)Content-Length: 348PermanentRFC 9110
Content-LocationAn alternate location for the returned dataContent-Location: /index.htmPermanentRFC 9110
Content-MD5ABase64-encoded binaryMD5 sum of the content of the responseContent-MD5: Q2hlY2sgSW50ZWdyaXR5IQ==Obsolete[15]RFC 1544,1864,4021
Content-RangeWhere in a full body message this partial message belongsContent-Range: bytes 21010-47021/47022PermanentRFC 9110
Content-TypeTheMIME type of this contentContent-Type: text/html; charset=utf-8PermanentRFC 9110
DateThe date and time that the message was sent (in "HTTP-date" format as defined by RFC 9110)Date: Tue, 15 Nov 1994 08:12:31 GMTPermanentRFC 9110
Delta-BaseSpecifies the delta-encoding entity tag of the response.[11]Delta-Base: "abc"PermanentRFC 3229
ETagAn identifier for a specific version of a resource, often amessage digestETag: "737060cd8c284d8af7ad3082f209582d"PermanentRFC 9110
ExpiresGives the date/time after which the response is considered stale (in "HTTP-date" format as defined by RFC 9110)Expires: Thu, 01 Dec 1994 16:00:00 GMTPermanent: standardRFC 9111
IMInstance-manipulations applied to the response.[11]IM: feedPermanentRFC 3229
Last-ModifiedThe last modified date for the requested object (in "HTTP-date" format as defined by RFC 9110)Last-Modified: Tue, 15 Nov 1994 12:45:26 GMTPermanentRFC 9110
LinkUsed to express a typed relationship with another resource, where the relation type is defined by RFC 8288Link: </feed>; rel="alternate"[53]PermanentRFC 8288
LocationUsed inredirection, or when a new resource has been created.
  • Example 1:Location: http://www.w3.org/pub/WWW/People.html
  • Example 2:Location: /pub/WWW/People.html
PermanentRFC 9110
P3PThis field is supposed to setP3P policy, in the form ofP3P:CP="your_compact_policy". However, P3P did not take off,[54] most browsers have never fully implemented it, a lot of websites set this field with fake policy text, that was enough to fool browsers the existence of P3P policy and grant permissions forthird party cookies.P3P: CP="This is not a P3P policy! See https://en.wikipedia.org/wiki/Special:CentralAutoLogin/P3P for more info."Permanent
PragmaImplementation-specific fields that may have various effects anywhere along the request-response chain.Pragma: no-cachePermanentRFC 9111
Preference-AppliedIndicates which Prefer tokens were honored by the server and applied to the processing of the request.Preference-Applied: return=representationPermanentRFC 7240
Proxy-AuthenticateRequest authentication to access the proxy.Proxy-Authenticate: BasicPermanentRFC 9110
Public-Key-Pins[55]HTTP Public Key Pinning, announces hash of website's authenticTLS certificatePublic-Key-Pins: max-age=2592000; pin-sha256="E9CZ9INDbd+2eRQozYqqbQ2yXLVKB9+xcprMF+44U1g=";PermanentRFC 7469
Retry-AfterIf an entity is temporarily unavailable, this instructs the client to try again later. Value could be a specified period of time (in seconds) or a HTTP-date.[56]
  • Example 1:Retry-After: 120
  • Example 2:Retry-After: Fri, 07 Nov 2014 23:59:59 GMT

Permanent

RFC 9110
ServerA name for the serverServer: Apache/2.4.1 (Unix)PermanentRFC 9110
Set-CookieAnHTTP cookieSet-Cookie: CookieName=CookieValue; Max-Age=3600; Version=1Permanent: standardRFC 6265
Strict-Transport-SecurityA HSTS Policy informing the HTTP client how long to cache the HTTPS only policy and whether this applies to subdomains.Strict-Transport-Security: max-age=16070400; includeSubDomainsPermanent: standard
TrailerThe Trailer general field value indicates that the given set of header fields is present in the trailer of a message encoded withchunked transfer coding.Trailer: Max-ForwardsPermanentRFC 9110
Transfer-EncodingThe form of encoding used to safely transfer the entity to the user.Currently defined methods are:chunked, compress, deflate, gzip, identity.

Must not be used with HTTP/2.[14]

Transfer-Encoding: chunkedPermanentRFC 9110
TkTracking Status header, value suggested to be sent in response to a DNT(do-not-track), possible values:
"!" — under construction"?" — dynamic"G" — gateway to multiple parties"N" — not tracking"T" — tracking"C" — tracking with consent"P" — tracking only if consented"D" — disregarding DNT"U" — updated
Tk: ?Permanent
UpgradeAsk the client to upgrade to another protocol.

Must not be used in HTTP/2[14]

Upgrade: h2c, HTTPS/1.3, IRC/6.9, RTA/x11, websocketPermanentRFC 9110
VaryTells downstream proxies how to match future request headers to decide whether the cached response can be used rather than requesting a fresh one from the origin server.
  • Example 1:Vary: *
  • Example 2:Vary: Accept-Language
PermanentRFC 9110
ViaInforms the client of proxies through which the response was sent.Via: 1.0 fred, 1.1 example.com (Apache/1.1)PermanentRFC 9110
WarningA general warning about possible problems with the entity body.Warning: 199 Miscellaneous warningObsolete[21]RFC 7234,9111
WWW-AuthenticateIndicates the authentication scheme that should be used to access the requested entity.WWW-Authenticate: BasicPermanentRFC 9110
X-Frame-Options[57]Clickjacking protection:deny - no rendering within a frame,sameorigin - no rendering if origin mismatch,allow-from - allow from specified location,allowall - non-standard, allow from any location X-Frame-Options: denyObsolete[58]

Common non-standard response fields

[edit]
Field nameDescriptionExample
Content-Security-Policy,
X-Content-Security-Policy,
X-WebKit-CSP[59]
Content Security Policy definition.X-WebKit-CSP: default-src 'self'
Expect-CT[60]Notify to prefer to enforceCertificate Transparency.Expect-CT: max-age=604800, enforce, report-uri="https://example.example/report"
NEL[61]Used to configure network request logging.NEL:{"report_to":"name_of_reporting_group","max_age":12345,"include_subdomains":false,"success_fraction":0.0,"failure_fraction":1.0}
Permissions-Policy[62]To allow or disable different features or APIs of the browser.Permissions-Policy: fullscreen=(), camera=(), microphone=(), geolocation=(), interest-cohort=()[63]
RefreshTells the browser torefresh the page orredirect to a different URL, after a given number of seconds (0 meaning immediately);or when a new resource has been created[clarification needed]. Header introduced by Netscape in 1995 and became a de facto standard supported by most web browsers. Eventually standardized in the HTML Living Standard in 2017.[64]Refresh: 5; url=http://www.w3.org/pub/WWW/People.html
Report-To[65]Instructs the user agent to store reporting endpoints for an origin.Report-To:{"group":"csp-endpoint","max_age":10886400,"endpoints":[{"url":"https-url-of-site-which-collects-reports"}]}
StatusCGI header field specifying thestatus of the HTTP response. Normal HTTP responses use a separate "Status-Line" instead, defined by RFC 9110.[66]Status: 200 OK
Timing-Allow-OriginTheTiming-Allow-Origin response header specifies origins that are allowed to see values of attributes retrieved via features of theResource Timing API, which would otherwise be reported as zero due to cross-origin restrictions.[67]Timing-Allow-Origin: *

Timing-Allow-Origin: <origin>[, <origin>]*

X-Content-Duration[68]Provide the duration of the audio or video in seconds. Not supported by current browsers – the header was only supported by Gecko browsers, from which support was removed in 2015.[69]X-Content-Duration: 42.666
X-Content-Type-Options[70]The only defined value, "nosniff", preventsInternet Explorer from MIME-sniffing a response away from the declared content-type. This also applies toGoogle Chrome, when downloading extensions.[71]X-Content-Type-Options: nosniff[72]
X-Powered-By[stackoverflow1 1]Specifies the technology (e.g. ASP.NET, PHP, JBoss) supporting the web application (version details are often inX-Runtime,X-Version, orX-AspNet-Version)X-Powered-By: PHP/5.4.0
X-Redirect-By[73]Specifies the component that is responsible for a particular redirect.X-Redirect-By: WordPress
X-Redirect-By: Polylang
X-Request-ID, X-Correlation-ID[stackoverflow2 1]Correlates HTTP requests between a client and server.X-Request-ID: f058ebd6-02f7-4d3f-942e-904344e8cde5
X-UA-Compatible[74]Recommends the preferred rendering engine (often a backward-compatibility mode) to use to display the content. Also used to activateChrome Frame in Internet Explorer. In HTML Standard, only theIE=edge value is defined.[75]X-UA-Compatible: IE=edge
X-UA-Compatible: IE=EmulateIE7
X-UA-Compatible: Chrome=1
X-XSS-Protection[76]Cross-site scripting (XSS) filterX-XSS-Protection: 1; mode=block

Effects of selected fields

[edit]

Avoiding caching

[edit]

If a web server responds withCache-Control: no-cache then a web browser or othercaching system (intermediate proxies) must not use the response to satisfy subsequent requests without first checking with the originating server (this process is called validation). This header field is part of HTTP version 1.1, and is ignored by some caches and browsers. It may be simulated by setting theExpires HTTP version 1.0 header field value to a time earlier than the response time. Notice that no-cache is not instructing the browser or proxies about whether or not to cache the content. It just tells the browser and proxies to validate the cache content with the server before using it (this is done by using If-Modified-Since, If-Unmodified-Since, If-Match, If-None-Match attributes mentioned above). Sending a no-cache value thus instructs a browser or proxy to not use the cache contents merely based on "freshness criteria" of the cache content. Another common way to prevent old content from being shown to the user without validation isCache-Control: max-age=0. This instructs the user agent that the content is stale and should be validated before use.

The header fieldCache-Control: no-store is intended to instruct a browser application to make a best effort not to write it to disk (i.e not to cache it).

The request that a resource should not be cached is no guarantee that it will not be written to disk. In particular, the HTTP/1.1 definition draws a distinction between history stores and caches. If the user navigates back to a previous page a browser may still show you a page that has been stored on disk in the history store. This is correct behavior according to the specification. Many user agents show different behavior in loading pages from the history store or cache depending on whether the protocol is HTTP or HTTPS.

TheCache-Control: no-cache HTTP/1.1 header field is also intended for use in requests made by the client. It is a means for the browser to tell the server and any intermediate caches that it wants a fresh version of the resource. ThePragma: no-cache header field, defined in the HTTP/1.0 spec, has the same purpose. It, however, is only defined for the request header. Its meaning in a response header is not specified.[77] The behavior ofPragma: no-cache in a response is implementation specific. While some user agents do pay attention to this field in responses,[78] the HTTP/1.1 RFC specifically warns against relying on this behavior.

See also

[edit]

References

[edit]
  1. ^"Field Parsing".Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing. June 2014. sec. 3.2.4.doi:10.17487/RFC7230.RFC7230.
  2. ^HTTP/2. June 2022.doi:10.17487/RFC9113.RFC9113.
  3. ^Peon, R.; Ruellan, H. (May 2015)."HPACK: Header Compression for HTTP/2".IETF.doi:10.17487/RFC7541. RetrievedDecember 13, 2021.{{cite journal}}:Cite journal requires|journal= (help)
  4. ^"Field Names".HTTP Semantics. June 2022. sec. 5.1.doi:10.17487/RFC9110.RFC9110.
  5. ^"Methods: Overview".HTTP Semantics. June 2022. sec. 9.1.doi:10.17487/RFC9110.RFC9110.
  6. ^Internet Engineering Task Force (June 1, 2012)."RFC 6648".doi:10.17487/RFC6648. RetrievedNovember 12, 2012.{{cite journal}}:Cite journal requires|journal= (help)
  7. ^"Message Headers". Iana.org. June 11, 2014. RetrievedJune 12, 2014.
  8. ^"Comments".HTTP Semantics. June 2022. sec. 5.6.5.doi:10.17487/RFC9110.RFC9110.
  9. ^"Quality Values".HTTP Semantics. June 2022. sec. 12.4.2.doi:10.17487/RFC9110.RFC9110.
  10. ^"core - Apache HTTP Server". Httpd.apache.org. Archived fromthe original on May 9, 2012. RetrievedMarch 13, 2012.
  11. ^abcRFC 3229.doi:10.17487/RFC3229.
  12. ^abc"Cross-Origin Resource Sharing". RetrievedJuly 24, 2017.
  13. ^ab"Connection header".HTTP Semantics. June 2022. sec. 7.6.1.doi:10.17487/RFC9110.RFC9110.
  14. ^abcdefgh"Connection-Specific Header Fields".HTTP/2. June 2022. sec. 8.2.2.doi:10.17487/RFC9113.RFC9113.
  15. ^ab"Changes from RFC 2616".Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content. June 2014. sec. B.doi:10.17487/RFC7231.RFC7231.
  16. ^Petersson, A.; Nilsson, M. (June 2014)."Forwarded HTTP Extension: Introduction".IETF.doi:10.17487/RFC7239. RetrievedJanuary 7, 2016.{{cite journal}}:Cite journal requires|journal= (help)
  17. ^"Host and :authority".HTTP Semantics. June 2022. sec. 7.2.doi:10.17487/RFC9110.RFC9110.
  18. ^"Request Pseudo-Header Fields".HTTP/2. June 2022. sec. 8.3.1.doi:10.17487/RFC9113.RFC9113.
  19. ^"Message Headers".www.iana.org. RetrievedNovember 26, 2018.
  20. ^"HTTP2-Settings Header Field".Hypertext Transfer Protocol Version 2 (HTTP/2). sec. 3.2.1.doi:10.17487/RFC7540.RFC7540.
  21. ^ab"Warning header".HTTP Caching. June 2022. sec. 5.5.doi:10.17487/RFC9111.RFC9111.
  22. ^"Upgrade Insecure Requests - W3C Candidate Recommendation".W3C. October 8, 2015. RetrievedJanuary 14, 2016.
  23. ^"The "X-Requested-With" Header – Stoutner". October 31, 2022.
  24. ^"Try out the "Do Not Track" HTTP header". RetrievedJanuary 31, 2011.
  25. ^"Web Tracking Protection: Minimum Standards and Opportunities to Innovate". RetrievedMarch 24, 2011.
  26. ^IETFDo Not Track: A Universal Third-Party Web Tracking Opt Out March 7, 2011
  27. ^W3CTracking Preference Expression (DNT), January 26, 2012
  28. ^Amos Jeffries (July 2, 2010)."SquidFaq/ConfiguringSquid - Squid Web Proxy Wiki". RetrievedSeptember 10, 2009.
  29. ^The Apache Software Foundation."mod_proxy - Apache HTTP Server Version 2.2". RetrievedNovember 12, 2014.
  30. ^Dave Steinberg (April 10, 2007)."How do I adjust my SSL site to work with GeekISP's loadbalancer?". RetrievedSeptember 30, 2010.
  31. ^"Helping to Secure Communication: Client to Front-End Server". July 27, 2006. RetrievedApril 23, 2012.
  32. ^"OpenSocial Core API Server Specification 2.5.1". RetrievedOctober 8, 2014.
  33. ^"ATT Device ID". Archived fromthe original on February 16, 2012. RetrievedJanuary 14, 2012.
  34. ^"WAP Profile". RetrievedJanuary 14, 2012.
  35. ^de Boyne Pollard, Jonathan (2007)."The Proxy-Connection: header is a mistake in how some web browsers use HTTP". Archived fromthe original on October 23, 2016. RetrievedJanuary 16, 2018.
  36. ^"Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls".Electronic Frontier Foundation. RetrievedJanuary 19, 2014.
  37. ^"Checking known AT&T, Verizon, Sprint, Bell Canada & Vodacom Unique Identifier beacons". RetrievedJanuary 19, 2014.
  38. ^Craig Timberg."Verizon, AT&T tracking their users with 'supercookies'".The Washington Post. RetrievedJanuary 19, 2014.
  39. ^"SAP Cross-Site Request Forgery Protection".SAP SE. RetrievedJanuary 20, 2015.
  40. ^"Django Cross Site Request Forgery protection".Django (web framework). Archived fromthe original on January 20, 2015. RetrievedJanuary 20, 2015.
  41. ^"Angular Cross Site Request Forgery (XSRF) Protection".AngularJS. RetrievedJanuary 20, 2015.
  42. ^"HTTP Request IDs".devcenter.heroku.com. RetrievedMarch 22, 2022.
  43. ^"The Value of Correlation IDs".Rapid7 Blog. December 23, 2016. RetrievedApril 13, 2018.
  44. ^Hilton, Peter (July 12, 2017)."Correlation IDs for microservices architectures - Peter Hilton".hilton.org.uk. RetrievedApril 13, 2018.
  45. ^"W3C Trace Context".w3c.org. RetrievedJune 19, 2024.
  46. ^"Save Data API Living Document Draft Community Group Report 2.1.1. Save-Data Request Header Field".Web Platform Incubator Community Group. June 30, 2020. RetrievedMarch 5, 2021.
  47. ^MDN contributors (March 3, 2023)."Sec-GPC".MDN Web Docs. RetrievedMarch 12, 2023.
  48. ^Dusseault, L.; Snell, J. (2010)."RFC 5789".doi:10.17487/RFC5789.S2CID 42062521. RetrievedDecember 24, 2014.{{cite journal}}:Cite journal requires|journal= (help)
  49. ^Nottingham, M.; McManus, P.; Reschke, J. (April 2016)."HTTP Alternative Services". IETF.doi:10.17487/RFC7838. RetrievedApril 19, 2016.{{cite journal}}:Cite journal requires|journal= (help)
  50. ^Nottingham, M.; McManus, P.; Reschke, J. (April 2016)."HTTP Alternative Services, section 3". IETF.doi:10.17487/RFC7838. RetrievedJune 8, 2017.{{cite journal}}:Cite journal requires|journal= (help)
  51. ^Reschke, J. (2011)."RFC 6266".doi:10.17487/RFC6266. RetrievedMarch 13, 2015.{{cite journal}}:Cite journal requires|journal= (help)
  52. ^"Content-Language".HTTP Semantics. June 2022. sec. 8.5.doi:10.17487/RFC9110.RFC9110.
  53. ^Indicate the canonical version of a URL by responding with the Link rel="canonical" HTTP header Retrieved: 2012-02-09
  54. ^W3CP3P Work Suspended
  55. ^"Public Key Pinning Extension for HTTP". IETF. RetrievedApril 17, 2015.
  56. ^"Retry-After".HTTP Semantics. June 2022. sec. 10.2.3.doi:10.17487/RFC9110.RFC9110.
  57. ^Ross, D.; Gondrom, T. (2013)."HTTP Header Field X-Frame-Options". IETF.doi:10.17487/RFC7034. RetrievedJune 12, 2014.{{cite journal}}:Cite journal requires|journal= (help)
  58. ^"Content Security Policy Level 2". RetrievedAugust 2, 2014.
  59. ^"Content Security Policy". W3C. 2012. RetrievedApril 28, 2017.
  60. ^"Expect-CT".Mozilla Developer Network. RetrievedJuly 23, 2021.
  61. ^"NEL".Mozilla Developer Network. 2021. RetrievedMay 18, 2021.
  62. ^"Permissions Policy". W3C. 2020. RetrievedMay 1, 2021.
  63. ^"Am I FLoCed?". EFF. 2021. RetrievedMay 1, 2021.
  64. ^"Define the HTTP Refresh header by annevk · Pull Request #2892 · whatwg/html".GitHub. August 9, 2017. RetrievedApril 17, 2021.
  65. ^"CSP: report-to".Mozilla Developer Network. 2021. RetrievedMay 18, 2021.
  66. ^RFC 9110: HTTP Semantics
  67. ^"Timing-Allow-Origin".Mozilla Developer Network. RetrievedJanuary 25, 2018.
  68. ^"Configuring servers for Ogg media". May 26, 2014. RetrievedJanuary 3, 2015.
  69. ^"Clean up duration tracking and use mirroring for cross-thread access".Bugzilla@Mozilla. RetrievedFebruary 9, 2024.
  70. ^Eric Lawrence (September 3, 2008)."IE8 Security Part VI: Beta 2 Update". RetrievedSeptember 28, 2010.
  71. ^"Hosting - Google Chrome Extensions - Google Code". RetrievedJune 14, 2012.
  72. ^van Kesteren, Anne (August 26, 2016)."Fetch standard".WHATWG.Archived from the original on August 26, 2016. RetrievedAugust 26, 2016.
  73. ^"X-Redirect-By HTTP response header". RetrievedMay 29, 2021.
  74. ^"Defining Document Compatibility: Specifying Document Compatibility Modes". April 1, 2011. RetrievedJanuary 24, 2012.
  75. ^"HTML Living Standard 4.2.5.3 Pragma directives, X-UA-Compatible state".WHATWG. March 12, 2021. RetrievedMarch 14, 2021.For meta elements with an http-equiv attribute in the X-UA-Compatible state, the content attribute must have a value that is an ASCII case-insensitive match for the string"IE=edge".
  76. ^Eric Lawrence (July 2, 2008)."IE8 Security Part IV: The XSS Filter". RetrievedSeptember 30, 2010.
  77. ^"Pragme".HTTP Caching. June 2022. sec. 5.4.doi:10.17487/RFC9111.RFC9111.
  78. ^"How to prevent caching in Internet Explorer".Microsoft. September 22, 2011. RetrievedApril 15, 2015.

As ofthis edit, this article uses content from"What is the X-REQUEST-ID http header?", authored byStefan Kögl at Stack Exchange, which is licensed in a way that permits reuse under theCreative Commons Attribution-ShareAlike 3.0 Unported License, but not under theGFDL. All relevant terms must be followed.

  1. ^ab"What is the X-REQUEST-ID http header?". RetrievedMarch 20, 2022.

As ofthis edit, this article uses content from"Why does ASP.NET framework add the 'X-Powered-By:ASP.NET' HTTP Header in responses?", authored byAdrian Grigore at Stack Exchange, which is licensed in a way that permits reuse under theCreative Commons Attribution-ShareAlike 3.0 Unported License, but not under theGFDL. All relevant terms must be followed.

  1. ^"Why does ASP.NET framework add the 'X-Powered-By:ASP.NET' HTTP Header in responses? - Stack Overflow". RetrievedMarch 20, 2022.

External links

[edit]


Retrieved from "https://en.wikipedia.org/w/index.php?title=List_of_HTTP_header_fields&oldid=1274983218"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp