source: draft-ietf-httpbis/04/draft-ietf-httpbis-p7-auth-04.xml @ 1544

Last change on this file since 1544 was 1500, checked in by julian.reschke@…, 8 years ago

fix mime types

  • Property svn:eol-style set to native
  • Property svn:mime-type set to text/xml
File size: 30.8 KB
Line 
1<?xml version="1.0" encoding="UTF-8"?>
2<!--
3    This XML document is the output of clean-for-DTD.xslt; a tool that strips
4    extensions to RFC2629(bis) from documents for processing with xml2rfc.
5-->
6<?xml-stylesheet type='text/xsl' href='../myxml2rfc.xslt'?>
7<?rfc toc="yes" ?>
8<?rfc symrefs="yes" ?>
9<?rfc sortrefs="yes" ?>
10<?rfc compact="yes"?>
11<?rfc subcompact="no" ?>
12<?rfc linkmailto="no" ?>
13<?rfc editing="no" ?>
14<?rfc comments="yes"?>
15<?rfc inline="yes"?>
16<!DOCTYPE rfc
17  PUBLIC "" "rfc2629.dtd">
18<rfc obsoletes="2616" updates="2617" category="std" ipr="full3978" docName="draft-ietf-httpbis-p7-auth-04">
19<front>
20
21  <title abbrev="HTTP/1.1, Part 7">HTTP/1.1, part 7: Authentication</title>
22
23  <author initials="R." surname="Fielding" fullname="Roy T. Fielding" role="editor">
24    <organization abbrev="Day Software">Day Software</organization>
25    <address>
26      <postal>
27        <street>23 Corporate Plaza DR, Suite 280</street>
28        <city>Newport Beach</city>
29        <region>CA</region>
30        <code>92660</code>
31        <country>USA</country>
32      </postal>
33      <phone>+1-949-706-5300</phone>
34      <facsimile>+1-949-706-5305</facsimile>
35      <email>fielding@gbiv.com</email>
36      <uri>http://roy.gbiv.com/</uri>
37    </address>
38  </author>
39
40  <author initials="J." surname="Gettys" fullname="Jim Gettys">
41    <organization>One Laptop per Child</organization>
42    <address>
43      <postal>
44        <street>21 Oak Knoll Road</street>
45        <city>Carlisle</city>
46        <region>MA</region>
47        <code>01741</code>
48        <country>USA</country>
49      </postal>
50      <email>jg@laptop.org</email>
51      <uri>http://www.laptop.org/</uri>
52    </address>
53  </author>
54 
55  <author initials="J." surname="Mogul" fullname="Jeffrey C. Mogul">
56    <organization abbrev="HP">Hewlett-Packard Company</organization>
57    <address>
58      <postal>
59        <street>HP Labs, Large Scale Systems Group</street>
60        <street>1501 Page Mill Road, MS 1177</street>
61        <city>Palo Alto</city>
62        <region>CA</region>
63        <code>94304</code>
64        <country>USA</country>
65      </postal>
66      <email>JeffMogul@acm.org</email>
67    </address>
68  </author>
69
70  <author initials="H." surname="Frystyk" fullname="Henrik Frystyk Nielsen">
71    <organization abbrev="Microsoft">Microsoft Corporation</organization>
72    <address>
73      <postal>
74        <street>1 Microsoft Way</street>
75        <city>Redmond</city>
76        <region>WA</region>
77        <code>98052</code>
78        <country>USA</country>
79      </postal>
80      <email>henrikn@microsoft.com</email>
81    </address>
82  </author>
83
84  <author initials="L." surname="Masinter" fullname="Larry Masinter">
85    <organization abbrev="Adobe Systems">Adobe Systems, Incorporated</organization>
86    <address>
87      <postal>
88        <street>345 Park Ave</street>
89        <city>San Jose</city>
90        <region>CA</region>
91        <code>95110</code>
92        <country>USA</country>
93      </postal>
94      <email>LMM@acm.org</email>
95      <uri>http://larry.masinter.net/</uri>
96    </address>
97  </author>
98 
99  <author initials="P." surname="Leach" fullname="Paul J. Leach">
100    <organization abbrev="Microsoft">Microsoft Corporation</organization>
101    <address>
102      <postal>
103        <street>1 Microsoft Way</street>
104        <city>Redmond</city>
105        <region>WA</region>
106        <code>98052</code>
107      </postal>
108      <email>paulle@microsoft.com</email>
109    </address>
110  </author>
111   
112  <author initials="T." surname="Berners-Lee" fullname="Tim Berners-Lee">
113    <organization abbrev="W3C/MIT">World Wide Web Consortium</organization>
114    <address>
115      <postal>
116        <street>MIT Computer Science and Artificial Intelligence Laboratory</street>
117        <street>The Stata Center, Building 32</street>
118        <street>32 Vassar Street</street>
119        <city>Cambridge</city>
120        <region>MA</region>
121        <code>02139</code>
122        <country>USA</country>
123      </postal>
124      <email>timbl@w3.org</email>
125      <uri>http://www.w3.org/People/Berners-Lee/</uri>
126    </address>
127  </author>
128
129  <author initials="Y." surname="Lafon" fullname="Yves Lafon" role="editor">
130    <organization abbrev="W3C">World Wide Web Consortium</organization>
131    <address>
132      <postal>
133        <street>W3C / ERCIM</street>
134        <street>2004, rte des Lucioles</street>
135        <city>Sophia-Antipolis</city>
136        <region>AM</region>
137        <code>06902</code>
138        <country>France</country>
139      </postal>
140      <email>ylafon@w3.org</email>
141      <uri>http://www.raubacapeu.net/people/yves/</uri>
142    </address>
143  </author>
144
145  <author initials="J. F." surname="Reschke" fullname="Julian F. Reschke" role="editor">
146    <organization abbrev="greenbytes">greenbytes GmbH</organization>
147    <address>
148      <postal>
149        <street>Hafenweg 16</street>
150        <city>Muenster</city><region>NW</region><code>48155</code>
151        <country>Germany</country>
152      </postal>
153      <phone>+49 251 2807760</phone>   
154      <facsimile>+49 251 2807761</facsimile>   
155      <email>julian.reschke@greenbytes.de</email>       
156      <uri>http://greenbytes.de/tech/webdav/</uri>     
157    </address>
158  </author>
159
160  <date month="August" year="2008" day="29"/>
161
162<abstract>
163<t>
164   The Hypertext Transfer Protocol (HTTP) is an application-level
165   protocol for distributed, collaborative, hypermedia information
166   systems. HTTP has been in use by the World Wide Web global information
167   initiative since 1990. This document is Part 7 of the seven-part specification
168   that defines the protocol referred to as "HTTP/1.1" and, taken together,
169   obsoletes RFC 2616.  Part 7 defines HTTP Authentication.
170</t>
171</abstract>
172
173<note title="Editorial Note (To be removed by RFC Editor)">
174  <t>
175    Discussion of this draft should take place on the HTTPBIS working group
176    mailing list (ietf-http-wg@w3.org). The current issues list is
177    at <eref target="http://www.tools.ietf.org/wg/httpbis/trac/report/11"/>
178    and related documents (including fancy diffs) can be found at
179    <eref target="http://www.tools.ietf.org/wg/httpbis/"/>.
180  </t>
181  <t>
182    The changes in this draft are summarized in <xref target="changes.since.02"/>.
183  </t>
184</note>
185</front>
186<middle>
187<section title="Introduction" anchor="introduction">
188<t>
189   This document defines HTTP/1.1 access control and authentication. Right now it
190   includes the extracted relevant sections of
191   RFC 2616 with only minor changes.
192   The intention is to move the general framework for HTTP authentication here,
193   as currently specified in <xref target="RFC2617"/>, and allow the individual
194   authentication mechanisms to be defined elsewhere.  This introduction will
195   be rewritten when that occurs.
196</t>
197<t>
198   HTTP provides several OPTIONAL challenge-response authentication
199   mechanisms which can be used by a server to challenge a client
200   request and by a client to provide authentication information. The
201   general framework for access authentication, and the specification of
202   "basic" and "digest" authentication, are specified in "HTTP
203   Authentication: Basic and Digest Access Authentication" <xref target="RFC2617"/>. This
204   specification adopts the definitions of "challenge" and "credentials"
205   from that specification.
206</t>
207
208<section title="Requirements" anchor="intro.requirements">
209<t>
210   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
211   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
212   document are to be interpreted as described in <xref target="RFC2119"/>.
213</t>
214<t>
215   An implementation is not compliant if it fails to satisfy one or more
216   of the MUST or REQUIRED level requirements for the protocols it
217   implements. An implementation that satisfies all the MUST or REQUIRED
218   level and all the SHOULD level requirements for its protocols is said
219   to be "unconditionally compliant"; one that satisfies all the MUST
220   level requirements but not all the SHOULD level requirements for its
221   protocols is said to be "conditionally compliant."
222</t>
223</section>
224</section>
225
226<section title="Notational Conventions and Generic Grammar" anchor="notation">
227<t>
228  This specification uses the ABNF syntax defined in Section 2.1 of <xref target="Part1"/>.
229  <cref anchor="abnf.dep">ABNF syntax and basic rules will be adopted from RFC 5234, see
230  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/36&gt;.</cref>
231</t>
232<t anchor="abnf.dependencies">
233 
234 
235  The ABNF rules below are defined in other specifications:
236</t>
237<figure><iref primary="true" item="Grammar" subitem="challenge"/><iref primary="true" item="Grammar" subitem="credentials"/><artwork type="abnf2616"><![CDATA[
238  challenge   = <challenge, defined in [RFC2617], Section 1.2>
239  credentials = <credentials, defined in [RFC2617], Section 1.2>
240]]></artwork></figure>
241</section>
242
243
244<section title="Status Code Definitions">
245<section title="401 Unauthorized" anchor="status.401">
246  <iref primary="true" item="401 Unauthorized (status code)"/>
247  <iref primary="true" item="Status Codes" subitem="401 Unauthorized"/>
248<t>
249   The request requires user authentication. The response MUST include a
250   WWW-Authenticate header field (<xref target="header.www-authenticate"/>) containing a challenge
251   applicable to the requested resource. The client MAY repeat the
252   request with a suitable Authorization header field (<xref target="header.authorization"/>). If
253   the request already included Authorization credentials, then the 401
254   response indicates that authorization has been refused for those
255   credentials. If the 401 response contains the same challenge as the
256   prior response, and the user agent has already attempted
257   authentication at least once, then the user SHOULD be presented the
258   entity that was given in the response, since that entity might
259   include relevant diagnostic information. HTTP access authentication
260   is explained in "HTTP Authentication: Basic and Digest Access
261   Authentication" <xref target="RFC2617"/>.
262</t>
263</section>
264<section title="407 Proxy Authentication Required" anchor="status.407">
265  <iref primary="true" item="407 Proxy Authentication Required (status code)"/>
266  <iref primary="true" item="Status Codes" subitem="407 Proxy Authentication Required"/>
267<t>
268   This code is similar to 401 (Unauthorized), but indicates that the
269   client must first authenticate itself with the proxy. The proxy MUST
270   return a Proxy-Authenticate header field (<xref target="header.proxy-authenticate"/>) containing a
271   challenge applicable to the proxy for the requested resource. The
272   client MAY repeat the request with a suitable Proxy-Authorization
273   header field (<xref target="header.proxy-authorization"/>). HTTP access authentication is explained
274   in "HTTP Authentication: Basic and Digest Access Authentication"
275   <xref target="RFC2617"/>.
276</t>
277</section>
278</section>
279
280<section title="Header Field Definitions" anchor="header.fields">
281<t>
282   This section defines the syntax and semantics of HTTP/1.1 header fields
283   related to authentication.
284</t>
285
286<section title="Authorization" anchor="header.authorization">
287  <iref primary="true" item="Authorization header"/>
288  <iref primary="true" item="Headers" subitem="Authorization"/>
289 
290<t>
291      A user agent that wishes to authenticate itself with a server--
292      usually, but not necessarily, after receiving a 401 response--does
293      so by including an Authorization request-header field with the
294      request.  The Authorization field value consists of credentials
295      containing the authentication information of the user agent for
296      the realm of the resource being requested.
297</t>
298<figure><iref primary="true" item="Grammar" subitem="Authorization"/><artwork type="abnf2616"><![CDATA[
299  Authorization  = "Authorization" ":" credentials
300]]></artwork></figure>
301<t>
302      HTTP access authentication is described in "HTTP Authentication:
303      Basic and Digest Access Authentication" <xref target="RFC2617"/>. If a request is
304      authenticated and a realm specified, the same credentials SHOULD
305      be valid for all other requests within this realm (assuming that
306      the authentication scheme itself does not require otherwise, such
307      as credentials that vary according to a challenge value or using
308      synchronized clocks).
309</t>
310<t>
311      When a shared cache (see Section 9 of <xref target="Part6"/>) receives a request
312      containing an Authorization field, it MUST NOT return the
313      corresponding response as a reply to any other request, unless one
314      of the following specific exceptions holds:
315</t>
316<t>
317  <list style="numbers">
318      <t>If the response includes the "s-maxage" cache-control
319         directive, the cache MAY use that response in replying to a
320         subsequent request. But (if the specified maximum age has
321         passed) a proxy cache MUST first revalidate it with the origin
322         server, using the request-headers from the new request to allow
323         the origin server to authenticate the new request. (This is the
324         defined behavior for s-maxage.) If the response includes "s-maxage=0",
325         the proxy MUST always revalidate it before re-using
326         it.</t>
327
328      <t>If the response includes the "must-revalidate" cache-control
329         directive, the cache MAY use that response in replying to a
330         subsequent request. But if the response is stale, all caches
331         MUST first revalidate it with the origin server, using the
332         request-headers from the new request to allow the origin server
333         to authenticate the new request.</t>
334
335      <t>If the response includes the "public" cache-control directive,
336         it MAY be returned in reply to any subsequent request.</t>
337  </list>
338</t>
339</section>
340
341<section title="Proxy-Authenticate" anchor="header.proxy-authenticate">
342  <iref primary="true" item="Proxy-Authenticate header"/>
343  <iref primary="true" item="Headers" subitem="Proxy-Authenticate"/>
344 
345<t>
346   The Proxy-Authenticate response-header field MUST be included as part
347   of a 407 (Proxy Authentication Required) response. The field value
348   consists of a challenge that indicates the authentication scheme and
349   parameters applicable to the proxy for this Request-URI.
350</t>
351<figure><iref primary="true" item="Grammar" subitem="Proxy-Authenticate"/><artwork type="abnf2616"><![CDATA[
352  Proxy-Authenticate  = "Proxy-Authenticate" ":" 1#challenge
353]]></artwork></figure>
354<t>
355   The HTTP access authentication process is described in "HTTP
356   Authentication: Basic and Digest Access Authentication" <xref target="RFC2617"/>. Unlike
357   WWW-Authenticate, the Proxy-Authenticate header field applies only to
358   the current connection and SHOULD NOT  be passed on to downstream
359   clients. However, an intermediate proxy might need to obtain its own
360   credentials by requesting them from the downstream client, which in
361   some circumstances will appear as if the proxy is forwarding the
362   Proxy-Authenticate header field.
363</t>
364</section>
365
366<section title="Proxy-Authorization" anchor="header.proxy-authorization">
367  <iref primary="true" item="Proxy-Authorization header"/>
368  <iref primary="true" item="Headers" subitem="Proxy-Authorization"/>
369 
370<t>
371   The Proxy-Authorization request-header field allows the client to
372   identify itself (or its user) to a proxy which requires
373   authentication. The Proxy-Authorization field value consists of
374   credentials containing the authentication information of the user
375   agent for the proxy and/or realm of the resource being requested.
376</t>
377<figure><iref primary="true" item="Grammar" subitem="Proxy-Authorization"/><artwork type="abnf2616"><![CDATA[
378  Proxy-Authorization     = "Proxy-Authorization" ":" credentials
379]]></artwork></figure>
380<t>
381   The HTTP access authentication process is described in "HTTP
382   Authentication: Basic and Digest Access Authentication" <xref target="RFC2617"/>. Unlike
383   Authorization, the Proxy-Authorization header field applies only to
384   the next outbound proxy that demanded authentication using the Proxy-Authenticate
385   field. When multiple proxies are used in a chain, the
386   Proxy-Authorization header field is consumed by the first outbound
387   proxy that was expecting to receive credentials. A proxy MAY relay
388   the credentials from the client request to the next proxy if that is
389   the mechanism by which the proxies cooperatively authenticate a given
390   request.
391</t>
392</section>
393
394<section title="WWW-Authenticate" anchor="header.www-authenticate">
395  <iref primary="true" item="WWW-Authenticate header"/>
396  <iref primary="true" item="Headers" subitem="WWW-Authenticate"/>
397 
398<t>
399   The WWW-Authenticate response-header field MUST be included in 401
400   (Unauthorized) response messages. The field value consists of at
401   least one challenge that indicates the authentication scheme(s) and
402   parameters applicable to the Request-URI.
403</t>
404<figure><iref primary="true" item="Grammar" subitem="WWW-Authenticate"/><artwork type="abnf2616"><![CDATA[
405  WWW-Authenticate  = "WWW-Authenticate" ":" 1#challenge
406]]></artwork></figure>
407<t>
408   The HTTP access authentication process is described in "HTTP
409   Authentication: Basic and Digest Access Authentication" <xref target="RFC2617"/>. User
410   agents are advised to take special care in parsing the WWW-Authenticate
411   field value as it might contain more than one challenge,
412   or if more than one WWW-Authenticate header field is provided, the
413   contents of a challenge itself can contain a comma-separated list of
414   authentication parameters.
415</t>
416</section>
417
418</section>
419
420<section title="IANA Considerations" anchor="IANA.considerations">
421<section title="Message Header Registration" anchor="message.header.registration">
422<t>
423   The Message Header Registry located at <eref target="http://www.iana.org/assignments/message-headers/message-header-index.html"/> should be updated
424   with the permanent registrations below (see <xref target="RFC3864"/>):
425</t>
426<!--AUTOGENERATED FROM extract-header-defs.xslt, do not edit manually-->
427<texttable align="left" suppress-title="true" anchor="iana.header.registration.table">
428   <ttcol>Header Field Name</ttcol>
429   <ttcol>Protocol</ttcol>
430   <ttcol>Status</ttcol>
431   <ttcol>Reference</ttcol>
432
433   <c>Authorization</c>
434   <c>http</c>
435   <c>standard</c>
436   <c>
437      <xref target="header.authorization"/>
438   </c>
439   <c>Proxy-Authenticate</c>
440   <c>http</c>
441   <c>standard</c>
442   <c>
443      <xref target="header.proxy-authenticate"/>
444   </c>
445   <c>Proxy-Authorization</c>
446   <c>http</c>
447   <c>standard</c>
448   <c>
449      <xref target="header.proxy-authorization"/>
450   </c>
451   <c>WWW-Authenticate</c>
452   <c>http</c>
453   <c>standard</c>
454   <c>
455      <xref target="header.www-authenticate"/>
456   </c>
457</texttable>
458<!--(END)-->
459<t>
460   The change controller is: "IETF (iesg@ietf.org) - Internet Engineering Task Force".
461</t>
462</section>
463</section>
464
465<section title="Security Considerations" anchor="security.considerations">
466<t>
467   This section is meant to inform application developers, information
468   providers, and users of the security limitations in HTTP/1.1 as
469   described by this document. The discussion does not include
470   definitive solutions to the problems revealed, though it does make
471   some suggestions for reducing security risks.
472</t>
473
474<section title="Authentication Credentials and Idle Clients" anchor="auth.credentials.and.idle.clients">
475<t>
476   Existing HTTP clients and user agents typically retain authentication
477   information indefinitely. HTTP/1.1 does not provide a method for a
478   server to direct clients to discard these cached credentials. This is
479   a significant defect that requires further extensions to HTTP.
480   Circumstances under which credential caching can interfere with the
481   application's security model include but are not limited to:
482  <list style="symbols">
483     <t>Clients which have been idle for an extended period following
484        which the server might wish to cause the client to reprompt the
485        user for credentials.</t>
486
487     <t>Applications which include a session termination indication
488        (such as a `logout' or `commit' button on a page) after which
489        the server side of the application `knows' that there is no
490        further reason for the client to retain the credentials.</t>
491  </list>
492</t>
493<t>
494   This is currently under separate study. There are a number of work-arounds
495   to parts of this problem, and we encourage the use of
496   password protection in screen savers, idle time-outs, and other
497   methods which mitigate the security problems inherent in this
498   problem. In particular, user agents which cache credentials are
499   encouraged to provide a readily accessible mechanism for discarding
500   cached credentials under user control.
501</t>
502</section>
503</section>
504
505<section title="Acknowledgments" anchor="ack">
506<t>
507  <cref>TBD.</cref>
508</t>
509</section>
510</middle>
511
512<back>
513
514<references title="Normative References">
515
516<reference anchor="Part1">
517  <front>
518    <title abbrev="HTTP/1.1">HTTP/1.1, part 1: URIs, Connections, and Message Parsing</title>
519    <author initials="R." surname="Fielding" fullname="Roy T. Fielding" role="editor">
520      <organization abbrev="Day Software">Day Software</organization>
521      <address><email>fielding@gbiv.com</email></address>
522    </author>
523    <author initials="J." surname="Gettys" fullname="Jim Gettys">
524      <organization>One Laptop per Child</organization>
525      <address><email>jg@laptop.org</email></address>
526    </author>
527    <author initials="J." surname="Mogul" fullname="Jeffrey C. Mogul">
528      <organization abbrev="HP">Hewlett-Packard Company</organization>
529      <address><email>JeffMogul@acm.org</email></address>
530    </author>
531    <author initials="H." surname="Frystyk" fullname="Henrik Frystyk Nielsen">
532      <organization abbrev="Microsoft">Microsoft Corporation</organization>
533      <address><email>henrikn@microsoft.com</email></address>
534    </author>
535    <author initials="L." surname="Masinter" fullname="Larry Masinter">
536      <organization abbrev="Adobe Systems">Adobe Systems, Incorporated</organization>
537      <address><email>LMM@acm.org</email></address>
538    </author>
539    <author initials="P." surname="Leach" fullname="Paul J. Leach">
540      <organization abbrev="Microsoft">Microsoft Corporation</organization>
541      <address><email>paulle@microsoft.com</email></address>
542    </author>
543    <author initials="T." surname="Berners-Lee" fullname="Tim Berners-Lee">
544      <organization abbrev="W3C/MIT">World Wide Web Consortium</organization>
545      <address><email>timbl@w3.org</email></address>
546    </author>
547    <author initials="Y." surname="Lafon" fullname="Yves Lafon" role="editor">
548      <organization abbrev="W3C">World Wide Web Consortium</organization>
549      <address><email>ylafon@w3.org</email></address>
550    </author>
551    <author initials="J. F." surname="Reschke" fullname="Julian F. Reschke" role="editor">
552      <organization abbrev="greenbytes">greenbytes GmbH</organization>
553      <address><email>julian.reschke@greenbytes.de</email></address>
554    </author>
555    <date month="August" year="2008"/>
556  </front>
557  <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-p1-messaging-04"/>
558 
559</reference>
560
561<reference anchor="Part6">
562  <front>
563    <title abbrev="HTTP/1.1">HTTP/1.1, part 6: Caching</title>
564    <author initials="R." surname="Fielding" fullname="Roy T. Fielding" role="editor">
565      <organization abbrev="Day Software">Day Software</organization>
566      <address><email>fielding@gbiv.com</email></address>
567    </author>
568    <author initials="J." surname="Gettys" fullname="Jim Gettys">
569      <organization>One Laptop per Child</organization>
570      <address><email>jg@laptop.org</email></address>
571    </author>
572    <author initials="J." surname="Mogul" fullname="Jeffrey C. Mogul">
573      <organization abbrev="HP">Hewlett-Packard Company</organization>
574      <address><email>JeffMogul@acm.org</email></address>
575    </author>
576    <author initials="H." surname="Frystyk" fullname="Henrik Frystyk Nielsen">
577      <organization abbrev="Microsoft">Microsoft Corporation</organization>
578      <address><email>henrikn@microsoft.com</email></address>
579    </author>
580    <author initials="L." surname="Masinter" fullname="Larry Masinter">
581      <organization abbrev="Adobe Systems">Adobe Systems, Incorporated</organization>
582      <address><email>LMM@acm.org</email></address>
583    </author>
584    <author initials="P." surname="Leach" fullname="Paul J. Leach">
585      <organization abbrev="Microsoft">Microsoft Corporation</organization>
586      <address><email>paulle@microsoft.com</email></address>
587    </author>
588    <author initials="T." surname="Berners-Lee" fullname="Tim Berners-Lee">
589      <organization abbrev="W3C/MIT">World Wide Web Consortium</organization>
590      <address><email>timbl@w3.org</email></address>
591    </author>
592    <author initials="Y." surname="Lafon" fullname="Yves Lafon" role="editor">
593      <organization abbrev="W3C">World Wide Web Consortium</organization>
594      <address><email>ylafon@w3.org</email></address>
595    </author>
596    <author initials="J. F." surname="Reschke" fullname="Julian F. Reschke" role="editor">
597      <organization abbrev="greenbytes">greenbytes GmbH</organization>
598      <address><email>julian.reschke@greenbytes.de</email></address>
599    </author>
600    <date month="August" year="2008"/>
601  </front>
602  <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-p6-cache-04"/>
603 
604</reference>
605
606<reference anchor="RFC2119">
607  <front>
608    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
609    <author initials="S." surname="Bradner" fullname="Scott Bradner">
610      <organization>Harvard University</organization>
611      <address><email>sob@harvard.edu</email></address>
612    </author>
613    <date month="March" year="1997"/>
614  </front>
615  <seriesInfo name="BCP" value="14"/>
616  <seriesInfo name="RFC" value="2119"/>
617</reference>
618
619<reference anchor="RFC2617">
620  <front>
621    <title abbrev="HTTP Authentication">HTTP Authentication: Basic and Digest Access Authentication</title>
622    <author initials="J." surname="Franks" fullname="John Franks">
623      <organization>Northwestern University, Department of Mathematics</organization>
624      <address><email>john@math.nwu.edu</email></address>
625    </author>
626    <author initials="P.M." surname="Hallam-Baker" fullname="Phillip M. Hallam-Baker">
627      <organization>Verisign Inc.</organization>
628      <address><email>pbaker@verisign.com</email></address>
629    </author>
630    <author initials="J.L." surname="Hostetler" fullname="Jeffery L. Hostetler">
631      <organization>AbiSource, Inc.</organization>
632      <address><email>jeff@AbiSource.com</email></address>
633    </author>
634    <author initials="S.D." surname="Lawrence" fullname="Scott D. Lawrence">
635      <organization>Agranat Systems, Inc.</organization>
636      <address><email>lawrence@agranat.com</email></address>
637    </author>
638    <author initials="P.J." surname="Leach" fullname="Paul J. Leach">
639      <organization>Microsoft Corporation</organization>
640      <address><email>paulle@microsoft.com</email></address>
641    </author>
642    <author initials="A." surname="Luotonen" fullname="Ari Luotonen">
643      <organization>Netscape Communications Corporation</organization>
644    </author>
645    <author initials="L." surname="Stewart" fullname="Lawrence C. Stewart">
646      <organization>Open Market, Inc.</organization>
647      <address><email>stewart@OpenMarket.com</email></address>
648    </author>
649    <date month="June" year="1999"/>
650  </front>
651  <seriesInfo name="RFC" value="2617"/>
652</reference>
653
654</references>
655
656<references title="Informative References">
657
658<reference anchor="RFC2616">
659  <front>
660    <title>Hypertext Transfer Protocol -- HTTP/1.1</title>
661    <author initials="R." surname="Fielding" fullname="R. Fielding">
662      <organization>University of California, Irvine</organization>
663      <address><email>fielding@ics.uci.edu</email></address>
664    </author>
665    <author initials="J." surname="Gettys" fullname="J. Gettys">
666      <organization>W3C</organization>
667      <address><email>jg@w3.org</email></address>
668    </author>
669    <author initials="J." surname="Mogul" fullname="J. Mogul">
670      <organization>Compaq Computer Corporation</organization>
671      <address><email>mogul@wrl.dec.com</email></address>
672    </author>
673    <author initials="H." surname="Frystyk" fullname="H. Frystyk">
674      <organization>MIT Laboratory for Computer Science</organization>
675      <address><email>frystyk@w3.org</email></address>
676    </author>
677    <author initials="L." surname="Masinter" fullname="L. Masinter">
678      <organization>Xerox Corporation</organization>
679      <address><email>masinter@parc.xerox.com</email></address>
680    </author>
681    <author initials="P." surname="Leach" fullname="P. Leach">
682      <organization>Microsoft Corporation</organization>
683      <address><email>paulle@microsoft.com</email></address>
684    </author>
685    <author initials="T." surname="Berners-Lee" fullname="T. Berners-Lee">
686      <organization>W3C</organization>
687      <address><email>timbl@w3.org</email></address>
688    </author>
689    <date month="June" year="1999"/>
690  </front>
691  <seriesInfo name="RFC" value="2616"/>
692</reference>
693
694<reference anchor="RFC3864">
695  <front>
696    <title>Registration Procedures for Message Header Fields</title>
697    <author initials="G." surname="Klyne" fullname="G. Klyne">
698      <organization>Nine by Nine</organization>
699      <address><email>GK-IETF@ninebynine.org</email></address>
700    </author>
701    <author initials="M." surname="Nottingham" fullname="M. Nottingham">
702      <organization>BEA Systems</organization>
703      <address><email>mnot@pobox.com</email></address>
704    </author>
705    <author initials="J." surname="Mogul" fullname="J. Mogul">
706      <organization>HP Labs</organization>
707      <address><email>JeffMogul@acm.org</email></address>
708    </author>
709    <date year="2004" month="September"/>
710  </front>
711  <seriesInfo name="BCP" value="90"/>
712  <seriesInfo name="RFC" value="3864"/>
713</reference>
714
715</references>
716
717
718<section title="Compatibility with Previous Versions" anchor="compatibility">
719
720<section title="Changes from RFC 2616" anchor="changes.from.rfc.2616">
721</section>
722
723</section>
724
725<section title="Change Log (to be removed by RFC Editor before publication)" anchor="change.log">
726
727<section title="Since RFC2616">
728<t>
729  Extracted relevant partitions from <xref target="RFC2616"/>.
730</t>
731</section>
732
733<section title="Since draft-ietf-httpbis-p7-auth-00">
734<t>
735  Closed issues:
736  <list style="symbols"> 
737    <t>
738      <eref target="http://www3.tools.ietf.org/wg/httpbis/trac/ticket/35"/>:
739      "Normative and Informative references"
740    </t>
741  </list>
742</t>
743</section>
744
745<section title="Since draft-ietf-httpbis-p7-auth-01">
746<t>
747  Ongoing work on ABNF conversion (<eref target="http://www3.tools.ietf.org/wg/httpbis/trac/ticket/36"/>):
748  <list style="symbols"> 
749    <t>
750      Explicitly import BNF rules for "challenge" and "credentials" from RFC2617.
751    </t>
752    <t>
753      Add explicit references to BNF syntax and rules imported from other parts of the specification.
754    </t>
755  </list>
756</t>
757</section>
758
759<section title="Since draft-ietf-httpbis-p7-auth-02" anchor="changes.since.02">
760<t>
761  Ongoing work on IANA Message Header Registration (<eref target="http://www3.tools.ietf.org/wg/httpbis/trac/ticket/40"/>):
762  <list style="symbols"> 
763    <t>
764      Reference RFC 3984, and update header registrations for headers defined
765      in this document.
766    </t>
767  </list>
768</t>
769</section>
770
771<section title="Since draft-ietf-httpbis-p7-auth-03" anchor="changes.since.03">
772<t>
773</t>
774</section>
775
776</section>
777
778</back>
779</rfc>
Note: See TracBrowser for help on using the repository browser.