Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move authority discussion earlier #4419

Merged
merged 2 commits into from
Dec 8, 2020
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
42 changes: 21 additions & 21 deletions draft-ietf-quic-http.md
Original file line number Diff line number Diff line change
Expand Up @@ -316,10 +316,21 @@ authoritative server for an HTTP URL is discussed in Section 4.3 of

The "https" scheme associates authority with possession of a certificate that
the client considers to be trustworthy for the host identified by the authority
component of the URL. If a server presents a certificate and proof that it
controls the corresponding private key, then a client will accept a secured
TLS session with that server as being authoritative for all origins with the
"https" scheme and a host identified in the certificate.
component of the URL.

If a server presents a valid certificate and proof that it controls the
corresponding private key, then a client will accept a secured TLS session with
that server as being authoritative for all origins with the "https" scheme and a
host identified in the certificate. The host must be listed either as the CN
field of the certificate subject or as a dNSName in the subjectAltName field of
the certificate; see {{!RFC6125}}. For a host that is an IP address, the client
MUST verify that the address appears as an iPAddress in the subjectAltName field
of the certificate.

If the hostname or address is not present in the certificate, the client MUST
NOT consider the server authoritative for origins containing that hostname or
address. See Section 4.3 of {{!SEMANTICS}} for more detail on authoritative
access.

A client MAY attempt access to a resource with an "https" URI by resolving the
host identifier to an IP address, establishing a QUIC connection to that address
Expand Down Expand Up @@ -404,23 +415,12 @@ example, when a user navigates away from a particular web page) or until the
server closes the connection.

Once a connection exists to a server endpoint, this connection MAY be reused for
requests with multiple different URI authority components. In general, a server
is considered authoritative for all URIs with the "https" scheme for which the
hostname in the URI is present in the authenticated certificate provided by the
server, either as the CN field of the certificate subject or as a dNSName in the
subjectAltName field of the certificate; see {{!RFC6125}}. For a host that is
an IP address, the client MUST verify that the address appears as an iPAddress
in the subjectAltName field of the certificate. If the hostname or address is
not present in the certificate, the client MUST NOT consider the server
authoritative for origins containing that hostname or address. See Section 4.3
of {{!SEMANTICS}} for more detail on authoritative access.

Clients SHOULD NOT open more than one HTTP/3 connection to a given host and port
pair, where the host is derived from a URI, a selected alternative service
({{!ALTSVC}}), or a configured proxy. A client MAY open multiple HTTP/3
connections to the same IP address and UDP port using different transport or TLS
configurations but SHOULD avoid creating multiple connections with the same
configuration.
requests with multiple different URI authority components. Clients SHOULD NOT
open more than one HTTP/3 connection to a given host and port pair, where the
host is derived from a URI, a selected alternative service ({{!ALTSVC}}), or a
configured proxy. A client MAY open multiple HTTP/3 connections to the same IP
address and UDP port using different transport or TLS configurations but SHOULD
avoid creating multiple connections with the same configuration.

Servers are encouraged to maintain open HTTP/3 connections for as long as
possible but are permitted to terminate idle connections if necessary. When
Expand Down