Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DNS relaxation, smaller initial Origin Set #285

Merged
merged 28 commits into from Feb 13, 2017
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
4 changes: 2 additions & 2 deletions draft-ietf-httpbis-origin-frame.md
Expand Up @@ -125,7 +125,7 @@ Once parsed, the value MUST have:

* a scheme of "https",
* a host that is reflected in a `subjectAltName` of the connection's TLS certificate (using the wildcard rules defined in {{!RFC2818}}, Section 3.1), and
* a port that reflects the connection's local port on the server.
* a port that reflects the connection's remote port on the client.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hmm. how does this interact with Alt-Svc? Seems that you could be connected to a port number different than the origin port number (thanks to Alt-Svc) and still want to use origin frames.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah. need to think about how to best specify that.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mcmanus see latest commit; I defer the cert checks until use of the origin, and I think that takes care of the concerns here.


If any of these requirements are violated, the client MUST ignore the field.

Expand Down Expand Up @@ -192,6 +192,6 @@ The following algorithm illustrates how a client could handle received ORIGIN fr
1. Parse `origin_raw` as an ASCII serialization of an origin ({{!RFC6454}}, Section 6.2) and let the result be `parsed_origin`. If parsing fails, skip to the next `origin_raw`.
2. If the `scheme` of `parsed_origin` is not "https", skip to the next `origin_raw`.
3. If the `host` of `parsed_origin` does not match a `subjectAltName` in the connection's presented certificate (using the wildcard rules defined in {{!RFC2818}}, Section 3.1), skip to the next `origin_raw`.
4. If the `port` of `parsed_origin` does not match the connection's local port, skip to the next `origin_raw`.
4. If the `port` of `parsed_origin` does not match the connection's remote port, skip to the next `origin_raw`.
5. Add `parsed_origin` to the Origin Set.