Movatterモバイル変換


[0]ホーム

URL:


RFC 9298Proxying UDP in HTTPAugust 2022
SchinaziStandards Track[Page]
Stream:
Internet Engineering Task Force (IETF)
RFC:
9298
Category:
Standards Track
Published:
ISSN:
2070-1721
Author:
D. Schinazi
Google LLC

RFC 9298

Proxying UDP in HTTP

Abstract

This document describes how to proxy UDP in HTTP, similar to how the HTTPCONNECT method allows proxying TCP in HTTP. More specifically, this documentdefines a protocol that allows an HTTP client to create a tunnel for UDPcommunications through an HTTP server that acts as a proxy.

Status of This Memo

This is an Internet Standards Track document.

This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.

Information about the current status of this document, any errata, and how to provide feedback on it may be obtained athttps://www.rfc-editor.org/info/rfc9298.

Copyright Notice

Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.

Table of Contents

1.Introduction

While HTTP provides the CONNECT method (seeSection 9.3.6 of [HTTP])for creating a TCP[TCP] tunnel to a proxy, it lacked a method fordoing so for UDP[UDP] traffic prior to this specification.

This document describes a protocol for tunneling UDP to a server acting as aUDP-specific proxy over HTTP. UDP tunnels are commonly used to create anend-to-end virtual connection, which can then be secured using QUIC[QUIC] or another protocol running over UDP. Unlike the HTTP CONNECTmethod, the UDP proxy itself is identified with an absolute URL containing thetraffic's destination. Clients generate those URLs using a URI Template[TEMPLATE], as described inSection 2.

This protocol supports all existing versions of HTTP by using HTTP Datagrams[HTTP-DGRAM]. When using HTTP/2[HTTP/2] or HTTP/3[HTTP/3], it uses HTTP Extended CONNECT as described in[EXT-CONNECT2]and[EXT-CONNECT3]. When using HTTP/1.x[HTTP/1.1], it uses HTTP Upgradeas defined inSection 7.8 of [HTTP].

1.1.Conventions and Definitions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED","MAY", and "OPTIONAL" in this document are to be interpreted asdescribed in BCP 14[RFC2119][RFC8174] when, and only when, theyappear in all capitals, as shown here.

In this document, we use the term "UDP proxy" to refer to the HTTP server thatacts upon the client's UDP tunneling request to open a UDP socket to a targetserver and that generates the response to this request. If there are HTTPintermediaries (as defined inSection 3.7 of [HTTP]) between the client andthe UDP proxy, those are referred to as "intermediaries" in this document.

Note that, when the HTTP version in use does not support multiplexing streams(such as HTTP/1.1), any reference to "stream" in this document represents theentire connection.

2.Client Configuration

HTTP clients are configured to use a UDP proxy with a URI Template[TEMPLATE] that has the variables "target_host" and "target_port".Examples are shown below:

https://example.org/.well-known/masque/udp/{target_host}/{target_port}/https://proxy.example.org:4443/masque?h={target_host}&p={target_port}https://proxy.example.org:4443/masque{?target_host,target_port}
Figure 1:URI Template Examples

The following requirements apply to the URI Template:

ClientsSHOULD validate the requirements above; however, clientsMAY use ageneral-purpose URI Template implementation that lacks this specific validation.If a client detects that any of the requirements above are not met by a URITemplate, the clientMUST reject its configuration and abort the request withoutsending it to the UDP proxy.

The original HTTP CONNECT method allowed for the conveyance of the target hostand port, but not the scheme, proxy authority, path, or query. Thus, clientswith proxy configuration interfaces that only allow the user to configure theproxy host and the proxy port exist. Client implementations of thisspecification that are constrained by such limitationsMAY attempt to access UDPproxying capabilities using the default template, which is defined as"https://$PROXY_HOST:$PROXY_PORT/.well-known/masque/udp/{target_host}/{target_port}/",where $PROXY_HOST and $PROXY_PORT are the configured host and port of the UDPproxy, respectively. UDP proxy deploymentsSHOULD offer service at this locationif they need to interoperate with such clients.

3.Tunneling UDP over HTTP

To allow negotiation of a tunnel for UDP over HTTP, this document defines the"connect-udp" HTTP upgrade token. The resulting UDP tunnels use the CapsuleProtocol (seeSection 3.2 of [HTTP-DGRAM]) with HTTP Datagrams in the formatdefined inSection 5.

To initiate a UDP tunnel associated with a single HTTP stream, a client issues arequest containing the "connect-udp" upgrade token. The target of the tunnel isindicated by the client to the UDP proxy via the "target_host" and "target_port"variables of the URI Template; seeSection 2.

"target_host" supports using DNS names, IPv6 literals and IPv4 literals. Notethat IPv6 scoped addressing zone identifiers are not supported. Using the termsIPv6address, IPv4address, reg-name, and port from[URI], the "target_host" and"target_port" variablesMUST adhere to the format inFigure 2, usingnotation from[ABNF]. Additionally:

target_host = IPv6address / IPv4address / reg-nametarget_port = port
Figure 2:URI Template Variable Format

When sending its UDP proxying request, the clientSHALL perform URI Templateexpansion to determine the path and query of its request.

If the request is successful, the UDP proxy commits to converting received HTTPDatagrams into UDP packets, and vice versa, until the tunnel is closed.

By virtue of the definition of the Capsule Protocol (seeSection 3.2 of [HTTP-DGRAM]), UDP proxying requests do not carry any message content.Similarly, successful UDP proxying responses also do not carry any messagecontent.

3.1.UDP Proxy Handling

Upon receiving a UDP proxying request:

  • if the recipient is configured to use another HTTP proxy, it will act as anintermediary by forwarding the request to another HTTP server. Note that suchintermediaries may need to re-encode the request if they forward it using aversion of HTTP that is different from the one used to receive it, as therequest encoding differs by version (see below).
  • otherwise, the recipient will act as a UDP proxy. It extracts the"target_host" and "target_port" variables from the URI it has reconstructedfrom the request headers, decodes their percent-encoding, and establishes atunnel by directly opening a UDP socket to the requested target.

Unlike TCP, UDP is connectionless. The UDP proxy that opens the UDP socket hasno way of knowing whether the destination is reachable. Therefore, it needs torespond to the request without waiting for a packet from the target. However, ifthe "target_host" is a DNS name, the UDP proxyMUST perform DNS resolutionbefore replying to the HTTP request. If errors occur during this process, theUDP proxyMUST reject the request andSHOULD send details using an appropriateProxy-Status header field[PROXY-STATUS]. For example, if DNSresolution returns an error, the proxy can use the dns_error Proxy Error TypefromSection 2.3.2 of [PROXY-STATUS].

UDP proxies can use connected UDP sockets if their operating system supportsthem, as that allows the UDP proxy to rely on the kernel to only send it UDPpackets that match the correct 5-tuple. If the UDP proxy uses a non-connectedsocket, itMUST validate the IP source address and UDP source port on receivedpackets to ensure they match the client's request. Packets that do not matchMUST be discarded by the UDP proxy.

The lifetime of the socket is tied to the request stream. The UDP proxyMUSTkeep the socket open while the request stream is open. If a UDP proxy isnotified by its operating system that its socket is no longer usable, itMUSTclose the request stream. For example, this can happen when an ICMP DestinationUnreachable message is received; seeSection 3.1 of [ICMP6]. UDPproxiesMAY choose to close sockets due to a period of inactivity, but theyMUSTclose the request stream when closing the socket. UDP proxies that close socketsafter a period of inactivitySHOULD NOT use a period lower than two minutes; seeSection 4.3 of [BEHAVE].

A successful response (as defined in Sections3.3 and3.5)indicates that the UDP proxy has opened a socket to the requested target and iswilling to proxy UDP payloads. Any response other than a successful responseindicates that the request has failed; thus, the clientMUST abort the request.

UDP proxiesMUST NOT introduce fragmentation at the IP layer when forwardingHTTP Datagrams onto a UDP socket; overly large datagrams are silently dropped.In IPv4, the Don't Fragment (DF) bitMUST be set, if possible, to preventfragmentation on the path. Future extensionsMAY remove these requirements.

Implementers of UDP proxies will benefit from reading the guidance in[UDP-USAGE].

3.2.HTTP/1.1 Request

When using HTTP/1.1[HTTP/1.1], a UDP proxying request will meet the followingrequirements:

  • the methodSHALL be "GET".
  • the requestSHALL include a single Host header field containing the originof the UDP proxy.
  • the requestSHALL include a Connection header field with value "Upgrade"(note that this requirement is case-insensitive as perSection 7.6.1 of [HTTP]).
  • the requestSHALL include an Upgrade header field with value "connect-udp".

A UDP proxying request that does not conform to these restrictions is malformed.The recipient of such a malformed requestMUST respond with an error andSHOULDuse the 400 (Bad Request) status code.

For example, if the client is configured with URI Template"https://example.org/.well-known/masque/udp/{target_host}/{target_port}/" andwishes to open a UDP proxying tunnel to target 192.0.2.6:443, it could send thefollowing request:

GET https://example.org/.well-known/masque/udp/192.0.2.6/443/ HTTP/1.1Host: example.orgConnection: UpgradeUpgrade: connect-udpCapsule-Protocol: ?1
Figure 3:Example HTTP/1.1 Request

In HTTP/1.1, this protocol uses the GET method to mimic the design of theWebSocket Protocol[WEBSOCKET].

3.3.HTTP/1.1 Response

The UDP proxySHALL indicate a successful response by replying with thefollowing requirements:

  • the HTTP status code on the responseSHALL be 101 (Switching Protocols).
  • the responseSHALL include a Connection header field with value "Upgrade"(note that this requirement is case-insensitive as perSection 7.6.1 of [HTTP]).
  • the responseSHALL include a single Upgrade header field with value"connect-udp".
  • the responseSHALL meet the requirements of HTTP responses that start theCapsule Protocol; seeSection 3.2 of [HTTP-DGRAM].

If any of these requirements are not met, the clientMUST treat this proxyingattempt as failed and abort the connection.

For example, the UDP proxy could respond with:

HTTP/1.1 101 Switching ProtocolsConnection: UpgradeUpgrade: connect-udpCapsule-Protocol: ?1
Figure 4:Example HTTP/1.1 Response

3.4.HTTP/2 and HTTP/3 Requests

When using HTTP/2[HTTP/2] or HTTP/3[HTTP/3], UDP proxying requests use HTTPExtended CONNECT. This requires that servers send an HTTP Setting as specifiedin[EXT-CONNECT2] and[EXT-CONNECT3] and that requests use HTTPpseudo-header fields with the following requirements:

  • The :method pseudo-header fieldSHALL be "CONNECT".
  • The :protocol pseudo-header fieldSHALL be "connect-udp".
  • The :authority pseudo-header fieldSHALL contain the authority of the UDPproxy.
  • The :path and :scheme pseudo-header fieldsSHALL NOT be empty. TheirvaluesSHALL contain the scheme and path from the URI Template after the URITemplate expansion process has been completed.

A UDP proxying request that does not conform to these restrictions ismalformed (seeSection 8.1.1 of [HTTP/2] andSection 4.1.2 of [HTTP/3]).

For example, if the client is configured with URI Template"https://example.org/.well-known/masque/udp/{target_host}/{target_port}/" andwishes to open a UDP proxying tunnel to target 192.0.2.6:443, it could send thefollowing request:

HEADERS:method = CONNECT:protocol = connect-udp:scheme = https:path = /.well-known/masque/udp/192.0.2.6/443/:authority = example.orgcapsule-protocol = ?1
Figure 5:Example HTTP/2 Request

3.5.HTTP/2 and HTTP/3 Responses

The UDP proxySHALL indicate a successful response by replying with thefollowing requirements:

  • the HTTP status code on the responseSHALL be in the 2xx (Successful) range.
  • the responseSHALL meet the requirements of HTTP responses that start theCapsule Protocol; seeSection 3.2 of [HTTP-DGRAM].

If any of these requirements are not met, the clientMUST treat this proxyingattempt as failed and abort the request.

For example, the UDP proxy could respond with:

HEADERS:status = 200capsule-protocol = ?1
Figure 6:Example HTTP/2 Response

4.Context Identifiers

The mechanism for proxying UDP in HTTP defined in this document allows futureextensions to exchange HTTP Datagrams that carry different semantics from UDPpayloads. Some of these extensions can augment UDP payloads with additionaldata, while others can exchange data that is completely separate from UDPpayloads. In order to accomplish this, all HTTP Datagrams associated with UDPProxying request streams start with a Context ID field; seeSection 5.

Context IDs are 62-bit integers (0 to 262-1). Context IDs are encodedas variable-length integers; seeSection 16 of [QUIC]. The Context ID value of0 is reserved for UDP payloads, while non-zero values are dynamically allocated.Non-zero even-numbered Context IDs are client-allocated, and odd-numberedContext IDs are proxy-allocated. The Context ID namespace is tied to a givenHTTP request; it is possible for a Context ID with the same numeric value to besimultaneously allocated in distinct requests, potentially with differentsemantics. Context IDsMUST NOT be re-allocated within a given HTTP namespacebutMAY be allocated in any order. The Context ID allocation restrictions to theuse of even-numbered and odd-numbered Context IDs exist in order to avoid theneed for synchronization between endpoints. However, once a Context ID has beenallocated, those restrictions do not apply to the use of the Context ID; it canbe used by any client or UDP proxy, independent of which endpoint initiallyallocated it.

Registration is the action by which an endpoint informs its peer of thesemantics and format of a given Context ID. This document does not define howregistration occurs. Future extensionsMAY use HTTP header fields or capsules toregister Context IDs. Depending on the method being used, it is possible fordatagrams to be received with Context IDs that have not yet been registered. Forinstance, this can be due to reordering of the packet containing the datagramand the packet containing the registration message during transmission.

5.HTTP Datagram Payload Format

When HTTP Datagrams (seeSection 2 of [HTTP-DGRAM]) are associated with UDPProxying request streams, the HTTP Datagram Payload field has the format definedinFigure 7, using notation fromSection 1.3 of [QUIC]. Note that whenHTTP Datagrams are encoded using QUIC DATAGRAM frames[QUIC-DGRAM],the Context ID field defined below directly follows the Quarter Stream ID field,which is at the start of the QUIC DATAGRAM frame payload; seeSection 2.1 of [HTTP-DGRAM].

UDP Proxying HTTP Datagram Payload {  Context ID (i),  UDP Proxying Payload (..),}
Figure 7:UDP Proxying HTTP Datagram Format
Context ID:

A variable-length integer (seeSection 16 of [QUIC]) that contains the valueof the Context ID. If an HTTP/3 Datagram that carries an unknown Context ID isreceived, the receiverSHALL either drop that datagram silently or buffer ittemporarily (on the order of a round trip) while awaiting the registration ofthe corresponding Context ID.

UDP Proxying Payload:

The payload of the datagram, whose semantics depend on the value of theprevious field. Note that this field can be empty.

UDP packets are encoded using HTTP Datagrams with the Context ID field set tozero. When the Context ID field is set to zero, the UDP Proxying Payload fieldcontains the unmodified payload of a UDP packet (referred to as data octets in[UDP]).

By virtue of the definition of the UDP header[UDP], it is not possible toencode UDP payloads longer than 65527 bytes. Therefore, endpointsMUST NOT sendHTTP Datagrams with a UDP Proxying Payload field longer than 65527 using ContextID zero. An endpoint that receives an HTTP Datagram using Context ID zero whoseUDP Proxying Payload field is longer than 65527MUST abort the correspondingstream. If a UDP proxy knows it can only send out UDP packets of a certainlength due to its underlying link MTU, it has no choice but to discard incomingHTTP Datagrams using Context ID zero whose UDP Proxying Payload field is longerthan that limit. If the discarded HTTP Datagram was transported by a DATAGRAMcapsule, the receiverSHOULD discard that capsule without buffering the capsulecontents.

If a UDP proxy receives an HTTP Datagram before it has received thecorresponding request, itSHALL either drop that HTTP Datagram silently orbuffer it temporarily (on the order of a round trip) while awaiting thecorresponding request.

Note that buffering datagrams (either because the request was not yet receivedor because the Context ID is not yet known) consumes resources. Receivers thatbuffer datagramsSHOULD apply buffering limits in order to reduce the risk ofresource exhaustion occurring. For example, receivers can limit the total numberof buffered datagrams or the cumulative size of buffered datagrams on aper-stream, per-context, or per-connection basis.

A clientMAY optimistically start sending UDP packets in HTTP Datagrams beforereceiving the response to its UDP proxying request. However, implementers shouldnote that such proxied packets may not be processed by the UDP proxy if itresponds to the request with a failure or if the proxied packets are received bythe UDP proxy before the request and the UDP proxy chooses to not buffer them.

6.Performance Considerations

Bursty traffic can often lead to temporally correlated packet losses; in turn,this can lead to suboptimal responses from congestion controllers in protocolsrunning over UDP. To avoid this, UDP proxiesSHOULD strive to avoid increasingburstiness of UDP traffic; theySHOULD NOT queue packets in order to increasebatching.

When the protocol running over UDP that is being proxied uses congestion control(e.g.,[QUIC]), the proxied traffic will incur at least two nested congestioncontrollers. The underlying HTTP connectionMUST NOT disable congestion controlunless it has an out-of-band way of knowing with absolute certainty that theinner traffic is congestion-controlled.

If a client or UDP proxy with a connection containing a UDP Proxying requeststream disables congestion control, itMUST NOT signal Explicit CongestionNotification (ECN)[ECN] support on that connection. That is, itMUSTmark all IP headers with the Not-ECT codepoint. ItMAY continue to report ECNfeedback via QUIC ACK_ECN frames or the TCP ECE bit, as the peer may not havedisabled congestion control.

When the protocol running over UDP that is being proxied uses loss recovery(e.g.,[QUIC]), and the underlying HTTP connection runs over TCP, the proxiedtraffic will incur at least two nested loss recovery mechanisms. This can reduceperformance as both can sometimes independently retransmit the same data. Toavoid this, UDP proxyingSHOULD be performed over HTTP/3 to allow leveraging theQUIC DATAGRAM frame.

6.1.MTU Considerations

When using HTTP/3 with the QUIC Datagram extension[QUIC-DGRAM], UDP payloadsare transmitted in QUIC DATAGRAM frames. Since those cannot be fragmented, theycan only carry payloads up to a given length determined by the QUIC connectionconfiguration and the Path MTU (PMTU). If a UDP proxy is using QUIC DATAGRAMframes and it receives a UDP payload from the target that will not fit inside aQUIC DATAGRAM frame, the UDP proxySHOULD NOT send the UDP payload in a DATAGRAMcapsule, as that defeats the end-to-end unreliability characteristic thatmethods such as Datagram Packetization Layer PMTU Discovery (DPLPMTUD) depend on[DPLPMTUD]. In this scenario, the UDP proxySHOULD drop the UDPpayload and send an ICMP Packet Too Big message to the target; seeSection 3.2 of [ICMP6].

6.2.Tunneling of ECN Marks

UDP proxying does not create an IP-in-IP tunnel, so the guidance in[ECN-TUNNEL] about transferring ECN marks between inner and outer IPheaders does not apply. There is no inner IP header in UDP proxying tunnels.

In this specification, note that UDP proxying clients do not have the ability tocontrol the ECN codepoints on UDP packets the UDP proxy sends to the target, norcan UDP proxies communicate the markings of each UDP packet from target to UDPproxy.

A UDP proxyMUST ignore ECN bits in the IP header of UDP packets received fromthe target, and itMUST set the ECN bits to Not-ECT on UDP packets it sends tothe target. These do not relate to the ECN markings of packets sent betweenclient and UDP proxy in any way.

7.Security Considerations

There are significant risks in allowing arbitrary clients to establish a tunnelto arbitrary targets, as that could allow bad actors to send traffic and have itattributed to the UDP proxy. HTTP servers that support UDP proxying ought torestrict its use to authenticated users.

There exist software and network deployments that perform access control checksbased on the source IP address of incoming requests. For example, some softwareallows unauthenticated configuration changes if they originated from 127.0.0.1.Such software could be running on the same host as the UDP proxy or in the samebroadcast domain. Proxied UDP traffic would then be received with a source IPaddress belonging to the UDP proxy. If this source address is used for accesscontrol, UDP proxying clients could use the UDP proxy to escalate their accessprivileges beyond those they might otherwise have. This could lead tounauthorized access by UDP proxying clients unless the UDP proxy disallows UDPproxying requests to vulnerable targets, such as the UDP proxy's own addressesand localhost, link-local, multicast, and broadcast addresses. UDP proxies canuse the destination_ip_prohibited Proxy Error Type fromSection 2.3.5 of [PROXY-STATUS] when rejecting such requests.

UDP proxies share many similarities with TCP CONNECT proxies when consideringthem as infrastructure for abuse to enable denial-of-service (DoS) attacks. Bothcan obfuscate the attacker's source address from the attack target. In the caseof a stateless volumetric attack (e.g., a TCP SYN flood or a UDP flood), bothtypes of proxies pass the traffic to the target host. With stateful volumetricattacks (e.g., HTTP flooding) being sent over a TCP CONNECT proxy, the proxywill only send data if the target has indicated its willingness to accept databy responding with a TCP SYN-ACK. Once the path to the target is flooded, theTCP CONNECT proxy will no longer receive replies from the target and will stopsending data. Since UDP does not establish shared state between the UDP proxyand the target, the UDP proxy could continue sending data to the target in sucha situation. While a UDP proxy could potentially limit the number of UDP packetsit is willing to forward until it has observed a response from the target, thatprovides limited protection against DoS attacks when attacks target open UDPports where the protocol running over UDP would respond and that would beinterpreted as willingness to accept UDP by the UDP proxy. Such a packet limitcould also cause issues for valid traffic.

The security considerations described inSection 4 of [HTTP-DGRAM] also applyhere. Since it is possible to tunnel IP packets over UDP, the guidance in[TUNNEL-SECURITY] can apply.

8.IANA Considerations

8.1.HTTP Upgrade Token

IANA has registered "connect-udp" in the "HTTP Upgrade Tokens" registrymaintained at <https://www.iana.org/assignments/http-upgrade-tokens>.

Value:

connect-udp

Description:

Proxying of UDP Payloads

Expected Version Tokens:

None

Reference:

RFC 9298

8.2.Well-Known URI

IANA has registered "masque" in the "Well-Known URIs" registry maintained at<https://www.iana.org/assignments/well-known-uris>.

URI Suffix:

masque

Change Controller:

IETF

Reference:

RFC 9298

Status:

permanent

Related Information:

Includes all resources identified with the path prefix"/.well-known/masque/udp/"

9.References

9.1.Normative References

[ABNF]
Crocker, D., Ed. andP. Overell,"Augmented BNF for Syntax Specifications: ABNF",RFC 2234,DOI 10.17487/RFC2234,,<https://www.rfc-editor.org/info/rfc2234>.
[ECN]
Ramakrishnan, K.,Floyd, S., andD. Black,"The Addition of Explicit Congestion Notification (ECN) to IP",RFC 3168,DOI 10.17487/RFC3168,,<https://www.rfc-editor.org/info/rfc3168>.
[EXT-CONNECT2]
McManus, P.,"Bootstrapping WebSockets with HTTP/2",RFC 8441,DOI 10.17487/RFC8441,,<https://www.rfc-editor.org/info/rfc8441>.
[EXT-CONNECT3]
Hamilton, R.,"Bootstrapping WebSockets with HTTP/3",RFC 9220,DOI 10.17487/RFC9220,,<https://www.rfc-editor.org/info/rfc9220>.
[HTTP]
Fielding, R., Ed.,Nottingham, M., Ed., andJ. Reschke, Ed.,"HTTP Semantics",STD 97,RFC 9110,DOI 10.17487/RFC9110,,<https://www.rfc-editor.org/info/rfc9110>.
[HTTP-DGRAM]
Schinazi, D. andL. Pardue,"HTTP Datagrams and the Capsule Protocol",RFC 9297,DOI 10.17487/RFC9297,,<https://www.rfc-editor.org/info/rfc9297>.
[HTTP/1.1]
Fielding, R., Ed.,Nottingham, M., Ed., andJ. Reschke, Ed.,"HTTP/1.1",STD 99,RFC 9112,DOI 10.17487/RFC9112,,<https://www.rfc-editor.org/info/rfc9112>.
[HTTP/2]
Thomson, M., Ed. andC. Benfield, Ed.,"HTTP/2",RFC 9113,DOI 10.17487/RFC9113,,<https://www.rfc-editor.org/info/rfc9113>.
[HTTP/3]
Bishop, M., Ed.,"HTTP/3",RFC 9114,DOI 10.17487/RFC9114,,<https://www.rfc-editor.org/info/rfc9114>.
[PROXY-STATUS]
Nottingham, M. andP. Sikora,"The Proxy-Status HTTP Response Header Field",RFC 9209,DOI 10.17487/RFC9209,,<https://www.rfc-editor.org/info/rfc9209>.
[QUIC]
Iyengar, J., Ed. andM. Thomson, Ed.,"QUIC: A UDP-Based Multiplexed and Secure Transport",RFC 9000,DOI 10.17487/RFC9000,,<https://www.rfc-editor.org/info/rfc9000>.
[QUIC-DGRAM]
Pauly, T.,Kinnear, E., andD. Schinazi,"An Unreliable Datagram Extension to QUIC",RFC 9221,DOI 10.17487/RFC9221,,<https://www.rfc-editor.org/info/rfc9221>.
[RFC2119]
Bradner, S.,"Key words for use in RFCs to Indicate Requirement Levels",BCP 14,RFC 2119,DOI 10.17487/RFC2119,,<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174]
Leiba, B.,"Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words",BCP 14,RFC 8174,DOI 10.17487/RFC8174,,<https://www.rfc-editor.org/info/rfc8174>.
[TCP]
Eddy, W., Ed.,"Transmission Control Protocol (TCP)",STD 7,RFC 9293,DOI 10.17487/RFC9293,,<https://www.rfc-editor.org/info/rfc9293>.
[TEMPLATE]
Gregorio, J.,Fielding, R.,Hadley, M.,Nottingham, M., andD. Orchard,"URI Template",RFC 6570,DOI 10.17487/RFC6570,,<https://www.rfc-editor.org/info/rfc6570>.
[UDP]
Postel, J.,"User Datagram Protocol",STD 6,RFC 768,DOI 10.17487/RFC0768,,<https://www.rfc-editor.org/info/rfc768>.
[URI]
Berners-Lee, T.,Fielding, R., andL. Masinter,"Uniform Resource Identifier (URI): Generic Syntax",STD 66,RFC 3986,DOI 10.17487/RFC3986,,<https://www.rfc-editor.org/info/rfc3986>.

9.2.Informative References

[BEHAVE]
Audet, F., Ed. andC. Jennings,"Network Address Translation (NAT) Behavioral Requirements for Unicast UDP",BCP 127,RFC 4787,DOI 10.17487/RFC4787,,<https://www.rfc-editor.org/info/rfc4787>.
[DPLPMTUD]
Fairhurst, G.,Jones, T.,Tüxen, M.,Rüngeler, I., andT. Völker,"Packetization Layer Path MTU Discovery for Datagram Transports",RFC 8899,DOI 10.17487/RFC8899,,<https://www.rfc-editor.org/info/rfc8899>.
[ECN-TUNNEL]
Briscoe, B.,"Tunnelling of Explicit Congestion Notification",RFC 6040,DOI 10.17487/RFC6040,,<https://www.rfc-editor.org/info/rfc6040>.
[HELIUM]
Schwartz, B. M.,"Hybrid Encapsulation Layer for IP and UDP Messages (HELIUM)",Work in Progress,Internet-Draft, draft-schwartz-httpbis-helium-00,,<https://datatracker.ietf.org/doc/html/draft-schwartz-httpbis-helium-00>.
[HiNT]
Pardue, L.,"HTTP-initiated Network Tunnelling (HiNT)",Work in Progress,Internet-Draft, draft-pardue-httpbis-http-network-tunnelling-00,,<https://datatracker.ietf.org/doc/html/draft-pardue-httpbis-http-network-tunnelling-00>.
[ICMP6]
Conta, A.,Deering, S., andM. Gupta, Ed.,"Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification",STD 89,RFC 4443,DOI 10.17487/RFC4443,,<https://www.rfc-editor.org/info/rfc4443>.
[MASQUE-ORIGINAL]
Schinazi, D.,"The MASQUE Protocol",Work in Progress,Internet-Draft, draft-schinazi-masque-00,,<https://datatracker.ietf.org/doc/html/draft-schinazi-masque-00>.
[TUNNEL-SECURITY]
Krishnan, S.,Thaler, D., andJ. Hoagland,"Security Concerns with IP Tunneling",RFC 6169,DOI 10.17487/RFC6169,,<https://www.rfc-editor.org/info/rfc6169>.
[UDP-USAGE]
Eggert, L.,Fairhurst, G., andG. Shepherd,"UDP Usage Guidelines",BCP 145,RFC 8085,DOI 10.17487/RFC8085,,<https://www.rfc-editor.org/info/rfc8085>.
[WEBSOCKET]
Fette, I. andA. Melnikov,"The WebSocket Protocol",RFC 6455,DOI 10.17487/RFC6455,,<https://www.rfc-editor.org/info/rfc6455>.

Acknowledgments

This document is a product of the MASQUE Working Group, and the author thanks all MASQUE enthusiasts for their contributions. This proposal was inspired directly or indirectly by prior work from many people, in particular[HELIUM] byBen Schwartz,[HiNT] byLucas Pardue, and the original MASQUE Protocol[MASQUE-ORIGINAL] by the author of this document.

The author would like to thankEric Rescorla for suggesting the use of an HTTP method to proxy UDP. The author is indebted toMark Nottingham andLucas Pardue for the many improvements they contributed to this document. The extensibility design in this document came out of the HTTP Datagrams Design Team, whose members wereAlan Frindell,Alex Chernyakhovsky,Ben Schwartz,Eric Rescorla,Lucas Pardue,Marcus Ihlar,Martin Thomson,Mike Bishop,Tommy Pauly,Victor Vasiliev, and the author of this document.

Author's Address

David Schinazi
Google LLC
1600 Amphitheatre Parkway
Mountain View,CA94043
United States of America
Email:dschinazi.ietf@gmail.com

[8]ページ先頭

©2009-2025 Movatter.jp