source: draft-ietf-httpbis/diffs/draft-ietf-httpbis-p7-auth-20-from-19.diff.html @ 1929

Last change on this file since 1929 was 1809, checked in by julian.reschke@…, 8 years ago

Remove mentions of "seven" parts.

  • Property svn:eol-style set to native
  • Property svn:mime-type set to text/html; charset=iso-8859-1
File size: 186.8 KB
Line 
1<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
2<!-- Generated by rfcdiff 1.38: rfcdiff  -->
3<!-- <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional" > -->
4<html> 
5<head> 
6  <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
7  <meta http-equiv="Content-Style-Type" content="text/css" />
8  <title>Diff: draft-ietf-httpbis-p7-auth-19.txt - draft-ietf-httpbis-p7-auth-20.txt</title>
9  <style type="text/css">
10    body    { margin: 0.4ex; margin-right: auto; }
11    tr      { }
12    td      { white-space: pre; font-family: monospace; vertical-align: top; font-size: 0.86em;}
13    th      { font-size: 0.86em; }
14    .small  { font-size: 0.6em; font-style: italic; font-family: Verdana, Helvetica, sans-serif; }
15    .left   { background-color: #EEE; }
16    .right  { background-color: #FFF; }
17    .diff   { background-color: #CCF; }
18    .lblock { background-color: #BFB; }
19    .rblock { background-color: #FF8; }
20    .insert { background-color: #8FF; }
21    .delete { background-color: #ACF; }
22    .void   { background-color: #FFB; }
23    .cont   { background-color: #EEE; }
24    .linebr { background-color: #AAA; }
25    .lineno { color: red; background-color: #FFF; font-size: 0.7em; text-align: right; padding: 0 2px; }
26    .elipsis{ background-color: #AAA; }
27    .left .cont { background-color: #DDD; }
28    .right .cont { background-color: #EEE; }
29    .lblock .cont { background-color: #9D9; }
30    .rblock .cont { background-color: #DD6; }
31    .insert .cont { background-color: #0DD; }
32    .delete .cont { background-color: #8AD; }
33    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px 0; }
34  </style>
35</head>
36<body > 
37  <table border="0" cellpadding="0" cellspacing="0">
38  <tr bgcolor="orange"><th></th><th>&nbsp;draft-ietf-httpbis-p7-auth-19.txt&nbsp;</th><th> </th><th>&nbsp;draft-ietf-httpbis-p7-auth-20.txt&nbsp;</th><th></th></tr>
39      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
40      <tr><td class="lineno" valign="top"></td><td class="left">HTTPbis Working Group                                   R. Fielding, Ed.</td><td> </td><td class="right">HTTPbis Working Group                                   R. Fielding, Ed.</td><td class="lineno" valign="top"></td></tr>
41      <tr><td class="lineno" valign="top"></td><td class="left">Internet-Draft                                                     Adobe</td><td> </td><td class="right">Internet-Draft                                                     Adobe</td><td class="lineno" valign="top"></td></tr>
42      <tr><td class="lineno" valign="top"></td><td class="left">Obsoletes: 2616 (if approved)                              Y. Lafon, Ed.</td><td> </td><td class="right">Obsoletes: 2616 (if approved)                              Y. Lafon, Ed.</td><td class="lineno" valign="top"></td></tr>
43      <tr><td class="lineno" valign="top"></td><td class="left">Updates: 2617 (if approved)                                          W3C</td><td> </td><td class="right">Updates: 2617 (if approved)                                          W3C</td><td class="lineno" valign="top"></td></tr>
44      <tr><td class="lineno" valign="top"></td><td class="left">Intended status: Standards Track                         J. Reschke, Ed.</td><td> </td><td class="right">Intended status: Standards Track                         J. Reschke, Ed.</td><td class="lineno" valign="top"></td></tr>
45      <tr><td><a name="diff0001" /></td></tr>
46      <tr><td class="lineno" valign="top"></td><td class="lblock">Expires: <span class="delete">September 13, 2012</span>                                   greenbytes</td><td> </td><td class="rblock">Expires: <span class="insert">January 17, 2013</span>                                     greenbytes</td><td class="lineno" valign="top"></td></tr>
47      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                          <span class="delete">March 12,</span> 2012</td><td> </td><td class="rblock">                                                           <span class="insert">July 16,</span> 2012</td><td class="lineno" valign="top"></td></tr>
48      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
49      <tr><td class="lineno" valign="top"></td><td class="left">                    HTTP/1.1, part 7: Authentication</td><td> </td><td class="right">                    HTTP/1.1, part 7: Authentication</td><td class="lineno" valign="top"></td></tr>
50      <tr><td><a name="diff0002" /></td></tr>
51      <tr><td class="lineno" valign="top"></td><td class="lblock">                     draft-ietf-httpbis-p7-auth-<span class="delete">19</span></td><td> </td><td class="rblock">                     draft-ietf-httpbis-p7-auth-<span class="insert">20</span></td><td class="lineno" valign="top"></td></tr>
52      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
53      <tr><td class="lineno" valign="top"></td><td class="left">Abstract</td><td> </td><td class="right">Abstract</td><td class="lineno" valign="top"></td></tr>
54      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
55      <tr><td class="lineno" valign="top"></td><td class="left">   The Hypertext Transfer Protocol (HTTP) is an application-level</td><td> </td><td class="right">   The Hypertext Transfer Protocol (HTTP) is an application-level</td><td class="lineno" valign="top"></td></tr>
56      <tr><td class="lineno" valign="top"></td><td class="left">   protocol for distributed, collaborative, hypermedia information</td><td> </td><td class="right">   protocol for distributed, collaborative, hypermedia information</td><td class="lineno" valign="top"></td></tr>
57      <tr><td><a name="diff0003" /></td></tr>
58      <tr><td class="lineno" valign="top"></td><td class="lblock">   systems.  <span class="delete">HTTP has been in use by the World Wide Web global</span></td><td> </td><td class="rblock">   systems.  This document defines the HTTP Authentication framework.</td><td class="lineno" valign="top"></td></tr>
59      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   information initiative since 1990.</span>  This document <span class="delete">is Part 7 of the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
60      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   seven-part specification that defines the protocol referred to as</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
61      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   "HTTP/1.1" and, taken together, obsoletes RFC 2616.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
62      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
63      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Part 7</span> defines the HTTP Authentication framework.</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
64      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
65      <tr><td class="lineno" valign="top"></td><td class="left">Editorial Note (To be removed by RFC Editor)</td><td> </td><td class="right">Editorial Note (To be removed by RFC Editor)</td><td class="lineno" valign="top"></td></tr>
66      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
67      <tr><td><a name="diff0004" /></td></tr>
68      <tr><td class="lineno" valign="top"></td><td class="lblock">   Discussion of this draft <span class="delete">should take</span> place on the HTTPBIS working</td><td> </td><td class="rblock">   Discussion of this draft <span class="insert">takes</span> place on the HTTPBIS working group</td><td class="lineno" valign="top"></td></tr>
69      <tr><td class="lineno" valign="top"></td><td class="lblock">   group mailing list (ietf-http-wg@w3.org), which is archived at</td><td> </td><td class="rblock">   mailing list (ietf-http-wg@w3.org), which is archived at</td><td class="lineno" valign="top"></td></tr>
70      <tr><td class="lineno" valign="top"></td><td class="left">   &lt;http://lists.w3.org/Archives/Public/ietf-http-wg/&gt;.</td><td> </td><td class="right">   &lt;http://lists.w3.org/Archives/Public/ietf-http-wg/&gt;.</td><td class="lineno" valign="top"></td></tr>
71      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
72      <tr><td class="lineno" valign="top"></td><td class="left">   The current issues list is at</td><td> </td><td class="right">   The current issues list is at</td><td class="lineno" valign="top"></td></tr>
73      <tr><td class="lineno" valign="top"></td><td class="left">   &lt;http://tools.ietf.org/wg/httpbis/trac/report/3&gt; and related</td><td> </td><td class="right">   &lt;http://tools.ietf.org/wg/httpbis/trac/report/3&gt; and related</td><td class="lineno" valign="top"></td></tr>
74      <tr><td class="lineno" valign="top"></td><td class="left">   documents (including fancy diffs) can be found at</td><td> </td><td class="right">   documents (including fancy diffs) can be found at</td><td class="lineno" valign="top"></td></tr>
75      <tr><td class="lineno" valign="top"></td><td class="left">   &lt;http://tools.ietf.org/wg/httpbis/&gt;.</td><td> </td><td class="right">   &lt;http://tools.ietf.org/wg/httpbis/&gt;.</td><td class="lineno" valign="top"></td></tr>
76      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
77      <tr><td><a name="diff0005" /></td></tr>
78      <tr><td class="lineno" valign="top"></td><td class="lblock">   The changes in this draft are summarized in Appendix <span class="delete">C.20</span>.</td><td> </td><td class="rblock">   The changes in this draft are summarized in Appendix <span class="insert">D.1</span>.</td><td class="lineno" valign="top"></td></tr>
79      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
80      <tr><td class="lineno" valign="top"></td><td class="left">Status of This Memo</td><td> </td><td class="right">Status of This Memo</td><td class="lineno" valign="top"></td></tr>
81      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
82      <tr><td class="lineno" valign="top"></td><td class="left">   This Internet-Draft is submitted in full conformance with the</td><td> </td><td class="right">   This Internet-Draft is submitted in full conformance with the</td><td class="lineno" valign="top"></td></tr>
83      <tr><td class="lineno" valign="top"></td><td class="left">   provisions of BCP 78 and BCP 79.</td><td> </td><td class="right">   provisions of BCP 78 and BCP 79.</td><td class="lineno" valign="top"></td></tr>
84      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
85      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are working documents of the Internet Engineering</td><td> </td><td class="right">   Internet-Drafts are working documents of the Internet Engineering</td><td class="lineno" valign="top"></td></tr>
86      <tr><td class="lineno" valign="top"></td><td class="left">   Task Force (IETF).  Note that other groups may also distribute</td><td> </td><td class="right">   Task Force (IETF).  Note that other groups may also distribute</td><td class="lineno" valign="top"></td></tr>
87      <tr><td class="lineno" valign="top"></td><td class="left">   working documents as Internet-Drafts.  The list of current Internet-</td><td> </td><td class="right">   working documents as Internet-Drafts.  The list of current Internet-</td><td class="lineno" valign="top"></td></tr>
88      <tr><td class="lineno" valign="top"></td><td class="left">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td> </td><td class="right">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td class="lineno" valign="top"></td></tr>
89      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
90      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are draft documents valid for a maximum of six months</td><td> </td><td class="right">   Internet-Drafts are draft documents valid for a maximum of six months</td><td class="lineno" valign="top"></td></tr>
91      <tr><td class="lineno" valign="top"></td><td class="left">   and may be updated, replaced, or obsoleted by other documents at any</td><td> </td><td class="right">   and may be updated, replaced, or obsoleted by other documents at any</td><td class="lineno" valign="top"></td></tr>
92      <tr><td class="lineno" valign="top"></td><td class="left">   time.  It is inappropriate to use Internet-Drafts as reference</td><td> </td><td class="right">   time.  It is inappropriate to use Internet-Drafts as reference</td><td class="lineno" valign="top"></td></tr>
93      <tr><td class="lineno" valign="top"></td><td class="left">   material or to cite them other than as "work in progress."</td><td> </td><td class="right">   material or to cite them other than as "work in progress."</td><td class="lineno" valign="top"></td></tr>
94      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
95      <tr><td><a name="diff0006" /></td></tr>
96      <tr><td class="lineno" valign="top"></td><td class="lblock">   This Internet-Draft will expire on <span class="delete">September 13, 2012</span>.</td><td> </td><td class="rblock">   This Internet-Draft will expire on <span class="insert">January 17, 2013</span>.</td><td class="lineno" valign="top"></td></tr>
97      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
98      <tr><td class="lineno" valign="top"></td><td class="left">Copyright Notice</td><td> </td><td class="right">Copyright Notice</td><td class="lineno" valign="top"></td></tr>
99      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
100      <tr><td class="lineno" valign="top"></td><td class="left">   Copyright (c) 2012 IETF Trust and the persons identified as the</td><td> </td><td class="right">   Copyright (c) 2012 IETF Trust and the persons identified as the</td><td class="lineno" valign="top"></td></tr>
101      <tr><td class="lineno" valign="top"></td><td class="left">   document authors.  All rights reserved.</td><td> </td><td class="right">   document authors.  All rights reserved.</td><td class="lineno" valign="top"></td></tr>
102      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
103      <tr><td class="lineno" valign="top"></td><td class="left">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td class="right">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td class="lineno" valign="top"></td></tr>
104      <tr><td class="lineno" valign="top"></td><td class="left">   Provisions Relating to IETF Documents</td><td> </td><td class="right">   Provisions Relating to IETF Documents</td><td class="lineno" valign="top"></td></tr>
105      <tr><td class="lineno" valign="top"></td><td class="left">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td> </td><td class="right">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td class="lineno" valign="top"></td></tr>
106      <tr><td class="lineno" valign="top"></td><td class="left">   publication of this document.  Please review these documents</td><td> </td><td class="right">   publication of this document.  Please review these documents</td><td class="lineno" valign="top"></td></tr>
107      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
108      <tr bgcolor="gray" ><td></td><th><a name="part-l2" /><small>skipping to change at</small><em> page 2, line 40</em></th><th> </th><th><a name="part-r2" /><small>skipping to change at</small><em> page 3, line 9</em></th><td></td></tr>
109      <tr><td class="lineno" valign="top"></td><td class="left">   the copyright in such materials, this document may not be modified</td><td> </td><td class="right">   the copyright in such materials, this document may not be modified</td><td class="lineno" valign="top"></td></tr>
110      <tr><td class="lineno" valign="top"></td><td class="left">   outside the IETF Standards Process, and derivative works of it may</td><td> </td><td class="right">   outside the IETF Standards Process, and derivative works of it may</td><td class="lineno" valign="top"></td></tr>
111      <tr><td class="lineno" valign="top"></td><td class="left">   not be created outside the IETF Standards Process, except to format</td><td> </td><td class="right">   not be created outside the IETF Standards Process, except to format</td><td class="lineno" valign="top"></td></tr>
112      <tr><td class="lineno" valign="top"></td><td class="left">   it for publication as an RFC or to translate it into languages other</td><td> </td><td class="right">   it for publication as an RFC or to translate it into languages other</td><td class="lineno" valign="top"></td></tr>
113      <tr><td class="lineno" valign="top"></td><td class="left">   than English.</td><td> </td><td class="right">   than English.</td><td class="lineno" valign="top"></td></tr>
114      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
115      <tr><td class="lineno" valign="top"></td><td class="left">Table of Contents</td><td> </td><td class="right">Table of Contents</td><td class="lineno" valign="top"></td></tr>
116      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
117      <tr><td class="lineno" valign="top"></td><td class="left">   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4</td><td> </td><td class="right">   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4</td><td class="lineno" valign="top"></td></tr>
118      <tr><td class="lineno" valign="top"></td><td class="left">     1.1.  Conformance and Error Handling . . . . . . . . . . . . . .  4</td><td> </td><td class="right">     1.1.  Conformance and Error Handling . . . . . . . . . . . . . .  4</td><td class="lineno" valign="top"></td></tr>
119      <tr><td><a name="diff0007" /></td></tr>
120      <tr><td class="lineno" valign="top"></td><td class="lblock">     1.2.  Syntax Notation  . . . . . . . . . . . . . . . . . . . . .  <span class="delete">4</span></td><td> </td><td class="rblock">     1.2.  Syntax Notation  . . . . . . . . . . . . . . . . . . . . .  5</td><td class="lineno" valign="top"></td></tr>
121      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       1.2.1.  Core Rules . . . . . . . . . . . . . . . . . . . . . .</span>  5</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
122      <tr><td class="lineno" valign="top"></td><td class="left">   2.  Access Authentication Framework  . . . . . . . . . . . . . . .  5</td><td> </td><td class="right">   2.  Access Authentication Framework  . . . . . . . . . . . . . . .  5</td><td class="lineno" valign="top"></td></tr>
123      <tr><td class="lineno" valign="top"></td><td class="left">     2.1.  Challenge and Response . . . . . . . . . . . . . . . . . .  5</td><td> </td><td class="right">     2.1.  Challenge and Response . . . . . . . . . . . . . . . . . .  5</td><td class="lineno" valign="top"></td></tr>
124      <tr><td class="lineno" valign="top"></td><td class="left">     2.2.  Protection Space (Realm) . . . . . . . . . . . . . . . . .  7</td><td> </td><td class="right">     2.2.  Protection Space (Realm) . . . . . . . . . . . . . . . . .  7</td><td class="lineno" valign="top"></td></tr>
125      <tr><td><a name="diff0008" /></td></tr>
126      <tr><td class="lineno" valign="top"></td><td class="lblock">     2.3.  Authentication Scheme Registry . . . . . . . . . . . . . .  <span class="delete">7</span></td><td> </td><td class="rblock">     2.3.  Authentication Scheme Registry . . . . . . . . . . . . . .  <span class="insert">8</span></td><td class="lineno" valign="top"></td></tr>
127      <tr><td class="lineno" valign="top"></td><td class="left">       2.3.1.  Considerations for New Authentication Schemes  . . . .  8</td><td> </td><td class="right">       2.3.1.  Considerations for New Authentication Schemes  . . . .  8</td><td class="lineno" valign="top"></td></tr>
128      <tr><td class="lineno" valign="top"></td><td class="left">   3.  Status Code Definitions  . . . . . . . . . . . . . . . . . . .  9</td><td> </td><td class="right">   3.  Status Code Definitions  . . . . . . . . . . . . . . . . . . .  9</td><td class="lineno" valign="top"></td></tr>
129      <tr><td class="lineno" valign="top"></td><td class="left">     3.1.  401 Unauthorized . . . . . . . . . . . . . . . . . . . . .  9</td><td> </td><td class="right">     3.1.  401 Unauthorized . . . . . . . . . . . . . . . . . . . . .  9</td><td class="lineno" valign="top"></td></tr>
130      <tr><td><a name="diff0009" /></td></tr>
131      <tr><td class="lineno" valign="top"></td><td class="lblock">     3.2.  407 Proxy Authentication Required  . . . . . . . . . . . . <span class="delete"> 9</span></td><td> </td><td class="rblock">     3.2.  407 Proxy Authentication Required  . . . . . . . . . . . . <span class="insert">10</span></td><td class="lineno" valign="top"></td></tr>
132      <tr><td class="lineno" valign="top"></td><td class="left">   4.  Header Field Definitions . . . . . . . . . . . . . . . . . . . 10</td><td> </td><td class="right">   4.  Header Field Definitions . . . . . . . . . . . . . . . . . . . 10</td><td class="lineno" valign="top"></td></tr>
133      <tr><td class="lineno" valign="top"></td><td class="left">     4.1.  Authorization  . . . . . . . . . . . . . . . . . . . . . . 10</td><td> </td><td class="right">     4.1.  Authorization  . . . . . . . . . . . . . . . . . . . . . . 10</td><td class="lineno" valign="top"></td></tr>
134      <tr><td class="lineno" valign="top"></td><td class="left">     4.2.  Proxy-Authenticate . . . . . . . . . . . . . . . . . . . . 11</td><td> </td><td class="right">     4.2.  Proxy-Authenticate . . . . . . . . . . . . . . . . . . . . 11</td><td class="lineno" valign="top"></td></tr>
135      <tr><td class="lineno" valign="top"></td><td class="left">     4.3.  Proxy-Authorization  . . . . . . . . . . . . . . . . . . . 11</td><td> </td><td class="right">     4.3.  Proxy-Authorization  . . . . . . . . . . . . . . . . . . . 11</td><td class="lineno" valign="top"></td></tr>
136      <tr><td><a name="diff0010" /></td></tr>
137      <tr><td class="lineno" valign="top"></td><td class="lblock">     4.4.  WWW-Authenticate . . . . . . . . . . . . . . . . . . . . . 1<span class="delete">1</span></td><td> </td><td class="rblock">     4.4.  WWW-Authenticate . . . . . . . . . . . . . . . . . . . . . 1<span class="insert">2</span></td><td class="lineno" valign="top"></td></tr>
138      <tr><td class="lineno" valign="top"></td><td class="left">   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 12</td><td> </td><td class="right">   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 12</td><td class="lineno" valign="top"></td></tr>
139      <tr><td><a name="diff0011" /></td></tr>
140      <tr><td class="lineno" valign="top"></td><td class="lblock">     5.1.  <span class="delete">Authenticaton</span> Scheme Registry  . . . . . . . . . . . . . . 12</td><td> </td><td class="rblock">     5.1.  <span class="insert">Authentication</span> Scheme Registry . . . . . . . . . . . . . . 12</td><td class="lineno" valign="top"></td></tr>
141      <tr><td class="lineno" valign="top"></td><td class="lblock">     5.2.  Status Code Registration . . . . . . . . . . . . . . . . . <span class="delete">12</span></td><td> </td><td class="rblock">     5.2.  Status Code Registration . . . . . . . . . . . . . . . . . <span class="insert">13</span></td><td class="lineno" valign="top"></td></tr>
142      <tr><td class="lineno" valign="top"></td><td class="left">     5.3.  Header Field Registration  . . . . . . . . . . . . . . . . 13</td><td> </td><td class="right">     5.3.  Header Field Registration  . . . . . . . . . . . . . . . . 13</td><td class="lineno" valign="top"></td></tr>
143      <tr><td class="lineno" valign="top"></td><td class="left">   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 13</td><td> </td><td class="right">   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 13</td><td class="lineno" valign="top"></td></tr>
144      <tr><td class="lineno" valign="top"></td><td class="left">     6.1.  Authentication Credentials and Idle Clients  . . . . . . . 13</td><td> </td><td class="right">     6.1.  Authentication Credentials and Idle Clients  . . . . . . . 13</td><td class="lineno" valign="top"></td></tr>
145      <tr><td><a name="diff0012" /></td></tr>
146      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">     6.2.  Protection Spaces  . . . . . . . . . . . . . . . . . . . . 14</span></td><td class="lineno" valign="top"></td></tr>
147      <tr><td class="lineno" valign="top"></td><td class="left">   7.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 14</td><td> </td><td class="right">   7.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 14</td><td class="lineno" valign="top"></td></tr>
148      <tr><td><a name="diff0013" /></td></tr>
149      <tr><td class="lineno" valign="top"></td><td class="lblock">   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . <span class="delete">14</span></td><td> </td><td class="rblock">   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . <span class="insert">15</span></td><td class="lineno" valign="top"></td></tr>
150      <tr><td class="lineno" valign="top"></td><td class="lblock">     8.1.  Normative References . . . . . . . . . . . . . . . . . . . <span class="delete">14</span></td><td> </td><td class="rblock">     8.1.  Normative References . . . . . . . . . . . . . . . . . . . <span class="insert">15</span></td><td class="lineno" valign="top"></td></tr>
151      <tr><td class="lineno" valign="top"></td><td class="lblock">     8.2.  Informative References . . . . . . . . . . . . . . . . . . <span class="delete">14</span></td><td> </td><td class="rblock">     8.2.  Informative References . . . . . . . . . . . . . . . . . . <span class="insert">15</span></td><td class="lineno" valign="top"></td></tr>
152      <tr><td class="lineno" valign="top"></td><td class="lblock">   Appendix A.  Changes from RFCs 2616 and 2617 . . . . . . . . . . . <span class="delete">15</span></td><td> </td><td class="rblock">   Appendix A.  Changes from RFCs 2616 and 2617 . . . . . . . . . . . <span class="insert">16</span></td><td class="lineno" valign="top"></td></tr>
153      <tr><td class="lineno" valign="top"></td><td class="lblock">   Appendix B.  <span class="delete">Collected</span> ABNF  . . . . . . . . . . . . . . . . . . . 16</td><td> </td><td class="rblock">   Appendix B.  <span class="insert">Imported</span> ABNF . . . . . . . . . . . . . . . . . . . <span class="insert">.</span> 16</td><td class="lineno" valign="top"></td></tr>
154      <tr><td class="lineno" valign="top"></td><td class="lblock">   Appendix C.  <span class="delete">Change Log (to be removed by RFC Editor before</span></td><td> </td><td class="rblock">   Appendix C.  <span class="insert">Collected ABNF</span>  . . . . . . . . . . . . . . . . . . . 17</td><td class="lineno" valign="top"></td></tr>
155      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">                publication)  . . . . . . . . . . . . . . . . . . . . 16</span></td><td> </td><td class="rblock">   <span class="insert">Appendix D.  Change Log (to be removed by RFC Editor before</span></td><td class="lineno" valign="top"></td></tr>
156      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.1.  Since RFC 2616 . . . . . . . . . . . . . . . . . . . . . . 16</span></td><td> </td><td class="rblock"><span class="insert">                publication)</span>  . . . . . . . . . . . . . . . . . . . . 17</td><td class="lineno" valign="top"></td></tr>
157      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.2.  Since draft-ietf-httpbis-p7-auth-00  . .</span> . . . . . . . . . <span class="delete">16</span></td><td> </td><td class="rblock">     <span class="insert">D.1.</span>  Since <span class="insert">draft-ietf-httpbis-p7-auth-19</span>  . . . . . . . . . . . 17</td><td class="lineno" valign="top"></td></tr>
158      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.3.  Since draft-ietf-httpbis-p7-auth-01  .</span> . . . . . . . . . . 17</td><td> </td><td class="rblock">   Index  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . <span class="insert">18</span></td><td class="lineno" valign="top"></td></tr>
159      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">C.4.  Since draft-ietf-httpbis-p7-auth-02  . . . . . . . . . . . 17</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
160      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.5.  Since draft-ietf-httpbis-p7-auth-03  . .</span> . . . . . . . . . <span class="delete">17</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
161      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.6.  Since draft-ietf-httpbis-p7-auth-04</span>  . . . . . . . . . . . 17</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
162      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">C.7.</span>  Since <span class="delete">draft-ietf-httpbis-p7-auth-05</span>  . . . . . . . . . . . 17</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
163      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">C.8.  Since draft-ietf-httpbis-p7-auth-06  . . . . . . . . . . . 18</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
164      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.9.  Since draft-ietf-httpbis-p7-auth-07  . . . . . . . . . . . 18</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
165      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.10. Since draft-ietf-httpbis-p7-auth-08  . . . . . . . . . . . 18</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
166      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.11. Since draft-ietf-httpbis-p7-auth-09  . . . . . . . . . . . 18</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
167      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.12. Since draft-ietf-httpbis-p7-auth-10  . . . . . . . . . . . 18</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
168      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.13. Since draft-ietf-httpbis-p7-auth-11  . . . . . . . . . . . 18</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
169      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.14. Since draft-ietf-httpbis-p7-auth-12  . . . . . . . . . . . 19</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
170      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.15. Since draft-ietf-httpbis-p7-auth-13  . . . . . . . . . . . 19</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
171      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.16. Since draft-ietf-httpbis-p7-auth-14  . . . . . . . . . . . 19</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
172      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.17. Since draft-ietf-httpbis-p7-auth-15  . . . . . . . . . . . 19</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
173      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.18. Since draft-ietf-httpbis-p7-auth-16  . . . . . . . . . . . 19</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
174      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.19. Since draft-ietf-httpbis-p7-auth-17  . . . . . . . . . . . 20</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
175      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     C.20. Since draft-ietf-httpbis-p7-auth-18  . . . . . . . . . . . 20</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
176      <tr><td class="lineno" valign="top"></td><td class="lblock">   Index  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . <span class="delete">20</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
177      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
178      <tr><td class="lineno" valign="top"></td><td class="left">1.  Introduction</td><td> </td><td class="right">1.  Introduction</td><td class="lineno" valign="top"></td></tr>
179      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
180      <tr><td class="lineno" valign="top"></td><td class="left">   This document defines HTTP/1.1 access control and authentication.  It</td><td> </td><td class="right">   This document defines HTTP/1.1 access control and authentication.  It</td><td class="lineno" valign="top"></td></tr>
181      <tr><td><a name="diff0014" /></td></tr>
182      <tr><td class="lineno" valign="top"></td><td class="lblock">   includes the relevant parts of RFC 2616 with only minor <span class="delete">changes,</span> plus</td><td> </td><td class="rblock">   includes the relevant parts of RFC 2616 with only minor <span class="insert">changes</span></td><td class="lineno" valign="top"></td></tr>
183      <tr><td class="lineno" valign="top"></td><td class="lblock">   the general framework for HTTP authentication, as previously defined</td><td> </td><td class="rblock"><span class="insert">   ([RFC2616]),</span> plus the general framework for HTTP authentication, as</td><td class="lineno" valign="top"></td></tr>
184      <tr><td class="lineno" valign="top"></td><td class="lblock">   in "HTTP Authentication: Basic and Digest Access Authentication"</td><td> </td><td class="rblock">   previously defined in "HTTP Authentication: Basic and Digest Access</td><td class="lineno" valign="top"></td></tr>
185      <tr><td class="lineno" valign="top"></td><td class="lblock">   ([RFC2617]).</td><td> </td><td class="rblock">   Authentication" ([RFC2617]).</td><td class="lineno" valign="top"></td></tr>
186      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
187      <tr><td class="lineno" valign="top"></td><td class="left">   HTTP provides several OPTIONAL challenge-response authentication</td><td> </td><td class="right">   HTTP provides several OPTIONAL challenge-response authentication</td><td class="lineno" valign="top"></td></tr>
188      <tr><td class="lineno" valign="top"></td><td class="left">   mechanisms which can be used by a server to challenge a client</td><td> </td><td class="right">   mechanisms which can be used by a server to challenge a client</td><td class="lineno" valign="top"></td></tr>
189      <tr><td class="lineno" valign="top"></td><td class="left">   request and by a client to provide authentication information.  The</td><td> </td><td class="right">   request and by a client to provide authentication information.  The</td><td class="lineno" valign="top"></td></tr>
190      <tr><td class="lineno" valign="top"></td><td class="left">   "basic" and "digest" authentication schemes continue to be specified</td><td> </td><td class="right">   "basic" and "digest" authentication schemes continue to be specified</td><td class="lineno" valign="top"></td></tr>
191      <tr><td class="lineno" valign="top"></td><td class="left">   in RFC 2617.</td><td> </td><td class="right">   in RFC 2617.</td><td class="lineno" valign="top"></td></tr>
192      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
193      <tr><td class="lineno" valign="top"></td><td class="left">1.1.  Conformance and Error Handling</td><td> </td><td class="right">1.1.  Conformance and Error Handling</td><td class="lineno" valign="top"></td></tr>
194      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
195      <tr><td class="lineno" valign="top"></td><td class="left">   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td> </td><td class="right">   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td class="lineno" valign="top"></td></tr>
196      <tr><td class="lineno" valign="top"></td><td class="left">   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this</td><td> </td><td class="right">   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this</td><td class="lineno" valign="top"></td></tr>
197      <tr><td class="lineno" valign="top"></td><td class="left">   document are to be interpreted as described in [RFC2119].</td><td> </td><td class="right">   document are to be interpreted as described in [RFC2119].</td><td class="lineno" valign="top"></td></tr>
198      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
199      <tr><td><a name="diff0015" /></td></tr>
200      <tr><td class="lineno" valign="top"></td><td class="lblock">   This <span class="delete">document defines</span> conformance criteria <span class="delete">for several roles</span> in HTTP</td><td> </td><td class="rblock">   This <span class="insert">specification targets</span> conformance criteria <span class="insert">according to the role</span></td><td class="lineno" valign="top"></td></tr>
201      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">communication, including Senders, Recipients, Clients, Servers, User-</span></td><td> </td><td class="rblock"><span class="insert">   of a participant</span> in HTTP <span class="insert">communication.  Hence, HTTP requirements are</span></td><td class="lineno" valign="top"></td></tr>
202      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Agents, Origin Servers, Intermediaries, Proxies and Gateways.</span>  See</td><td> </td><td class="rblock"><span class="insert">   placed on senders, recipients, clients, servers, user agents,</span></td><td class="lineno" valign="top"></td></tr>
203      <tr><td class="lineno" valign="top"></td><td class="lblock">   Section 2 of [Part1] for definitions of these terms.</td><td> </td><td class="rblock"><span class="insert">   intermediaries, origin servers, proxies, gateways, or caches,</span></td><td class="lineno" valign="top"></td></tr>
204      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   depending on what behavior is being constrained by the requirement.</span></td><td class="lineno" valign="top"></td></tr>
205      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   See Section 2 of [Part1] for definitions of these terms.</td><td class="lineno" valign="top"></td></tr>
206      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
207      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">The verb "generate" is used instead of "send" where a requirement</span></td><td class="lineno" valign="top"></td></tr>
208      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   differentiates between creating a protocol element and merely</span></td><td class="lineno" valign="top"></td></tr>
209      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   forwarding a received element downstream.</span></td><td class="lineno" valign="top"></td></tr>
210      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
211      <tr><td class="lineno" valign="top"></td><td class="left">   An implementation is considered conformant if it complies with all of</td><td> </td><td class="right">   An implementation is considered conformant if it complies with all of</td><td class="lineno" valign="top"></td></tr>
212      <tr><td><a name="diff0016" /></td></tr>
213      <tr><td class="lineno" valign="top"></td><td class="lblock">   the requirements associated with <span class="delete">its role(s).</span>  Note that SHOULD-level</td><td> </td><td class="rblock">   the requirements associated with <span class="insert">the roles it partakes in HTTP.</span>  Note</td><td class="lineno" valign="top"></td></tr>
214      <tr><td class="lineno" valign="top"></td><td class="lblock">   requirements are relevant here, unless one of the documented</td><td> </td><td class="rblock">   that SHOULD-level requirements are relevant here, unless one of the</td><td class="lineno" valign="top"></td></tr>
215      <tr><td class="lineno" valign="top"></td><td class="lblock">   exceptions is applicable.</td><td> </td><td class="rblock">   documented exceptions is applicable.</td><td class="lineno" valign="top"></td></tr>
216      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
217      <tr><td class="lineno" valign="top"></td><td class="left">   This document also uses ABNF to define valid protocol elements</td><td> </td><td class="right">   This document also uses ABNF to define valid protocol elements</td><td class="lineno" valign="top"></td></tr>
218      <tr><td class="lineno" valign="top"></td><td class="left">   (Section 1.2).  In addition to the prose requirements placed upon</td><td> </td><td class="right">   (Section 1.2).  In addition to the prose requirements placed upon</td><td class="lineno" valign="top"></td></tr>
219      <tr><td><a name="diff0017" /></td></tr>
220      <tr><td class="lineno" valign="top"></td><td class="lblock">   them, <span class="delete">Senders</span> MUST NOT generate protocol elements that are <span class="delete">invalid.</span></td><td> </td><td class="rblock">   them, <span class="insert">senders</span> MUST NOT generate protocol elements that <span class="insert">do not match</span></td><td class="lineno" valign="top"></td></tr>
221      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   the grammar defined by the ABNF rules for those protocol elements</span></td><td class="lineno" valign="top"></td></tr>
222      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   that</span> are <span class="insert">applicable to the sender's role.  If a received protocol</span></td><td class="lineno" valign="top"></td></tr>
223      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   element is processed, the recipient MUST be able to parse any value</span></td><td class="lineno" valign="top"></td></tr>
224      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   that would match the ABNF rules for that protocol element, excluding</span></td><td class="lineno" valign="top"></td></tr>
225      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   only those rules not applicable to the recipient's role.</span></td><td class="lineno" valign="top"></td></tr>
226      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
227      <tr><td><a name="diff0018" /></td></tr>
228      <tr><td class="lineno" valign="top"></td><td class="lblock">   Unless noted otherwise, <span class="delete">Recipients</span> MAY <span class="delete">take steps</span> to recover a usable</td><td> </td><td class="rblock">   Unless noted otherwise, <span class="insert">a recipient</span> MAY <span class="insert">attempt</span> to recover a usable</td><td class="lineno" valign="top"></td></tr>
229      <tr><td class="lineno" valign="top"></td><td class="lblock">   protocol element from an invalid construct.  <span class="delete">However,</span> HTTP does not</td><td> </td><td class="rblock">   protocol element from an invalid construct.  HTTP does not define</td><td class="lineno" valign="top"></td></tr>
230      <tr><td class="lineno" valign="top"></td><td class="lblock">   define specific error handling <span class="delete">mechanisms,</span> except <span class="delete">in cases where it</span></td><td> </td><td class="rblock">   specific error handling <span class="insert">mechanisms</span> except <span class="insert">when they have a</span> direct</td><td class="lineno" valign="top"></td></tr>
231      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   has</span> direct impact on <span class="delete">security.  This is because</span> different <span class="delete">uses</span> of the</td><td> </td><td class="rblock">   impact on <span class="insert">security, since</span> different <span class="insert">applications</span> of the protocol</td><td class="lineno" valign="top"></td></tr>
232      <tr><td class="lineno" valign="top"></td><td class="lblock">   protocol require different error handling <span class="delete">strategies; for</span> example, a</td><td> </td><td class="rblock">   require different error handling <span class="insert">strategies.  For</span> example, a Web</td><td class="lineno" valign="top"></td></tr>
233      <tr><td class="lineno" valign="top"></td><td class="lblock">   Web browser <span class="delete">may</span> wish to transparently recover from a response where</td><td> </td><td class="rblock">   browser <span class="insert">might</span> wish to transparently recover from a response where the</td><td class="lineno" valign="top"></td></tr>
234      <tr><td class="lineno" valign="top"></td><td class="lblock">   the Location header field doesn't parse according to the ABNF,</td><td> </td><td class="rblock">   Location header field doesn't parse according to the ABNF, <span class="insert">whereas</span> a</td><td class="lineno" valign="top"></td></tr>
235      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">whereby in</span> a systems control <span class="delete">protocol using HTTP, this type</span> of error</td><td> </td><td class="rblock">   systems control <span class="insert">client might consider any form</span> of error recovery to</td><td class="lineno" valign="top"></td></tr>
236      <tr><td class="lineno" valign="top"></td><td class="lblock">   recovery <span class="delete">could lead</span> to <span class="delete">dangerous consequences.</span></td><td> </td><td class="rblock">   <span class="insert">be dangerous.</span></td><td class="lineno" valign="top"></td></tr>
237      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
238      <tr><td class="lineno" valign="top"></td><td class="left">1.2.  Syntax Notation</td><td> </td><td class="right">1.2.  Syntax Notation</td><td class="lineno" valign="top"></td></tr>
239      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
240      <tr><td class="lineno" valign="top"></td><td class="left">   This specification uses the Augmented Backus-Naur Form (ABNF)</td><td> </td><td class="right">   This specification uses the Augmented Backus-Naur Form (ABNF)</td><td class="lineno" valign="top"></td></tr>
241      <tr><td class="lineno" valign="top"></td><td class="left">   notation of [RFC5234] with the list rule extension defined in Section</td><td> </td><td class="right">   notation of [RFC5234] with the list rule extension defined in Section</td><td class="lineno" valign="top"></td></tr>
242      <tr><td><a name="diff0019" /></td></tr>
243      <tr><td class="lineno" valign="top"></td><td class="lblock">   1.2 of [Part1].  Appendix B shows the collected ABNF with the list</td><td> </td><td class="rblock">   1.2 of [Part1].  Appendix B <span class="insert">describes rules imported from other</span></td><td class="lineno" valign="top"></td></tr>
244      <tr><td class="lineno" valign="top"></td><td class="lblock">   rule expanded.</td><td> </td><td class="rblock"><span class="insert">   documents.  Appendix C</span> shows the collected ABNF with the list rule</td><td class="lineno" valign="top"></td></tr>
245      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock">   expanded.</td><td class="lineno" valign="top"></td></tr>
246      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">The following core rules are included by reference, as defined in</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
247      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   [RFC5234], Appendix B.1: ALPHA (letters), CR (carriage return), CRLF</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
248      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   (CR LF), CTL (controls), DIGIT (decimal 0-9), DQUOTE (double quote),</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
249      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   HEXDIG (hexadecimal 0-9/A-F/a-f), LF (line feed), OCTET (any 8-bit</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
250      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   sequence of data), SP (space), and VCHAR (any visible US-ASCII</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
251      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   character).</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
252      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
253      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">1.2.1.  Core Rules</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
254      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
255      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   The core rules below are defined in [Part1]:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
256      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
257      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     BWS           = &lt;BWS, defined in [Part1], Section 3.2.1&gt;</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
258      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     OWS           = &lt;OWS, defined in [Part1], Section 3.2.1&gt;</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
259      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     quoted-string = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt;</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
260      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     token         = &lt;token, defined in [Part1], Section 3.2.4&gt;</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
261      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
262      <tr><td class="lineno" valign="top"></td><td class="left">2.  Access Authentication Framework</td><td> </td><td class="right">2.  Access Authentication Framework</td><td class="lineno" valign="top"></td></tr>
263      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
264      <tr><td class="lineno" valign="top"></td><td class="left">2.1.  Challenge and Response</td><td> </td><td class="right">2.1.  Challenge and Response</td><td class="lineno" valign="top"></td></tr>
265      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
266      <tr><td class="lineno" valign="top"></td><td class="left">   HTTP provides a simple challenge-response authentication mechanism</td><td> </td><td class="right">   HTTP provides a simple challenge-response authentication mechanism</td><td class="lineno" valign="top"></td></tr>
267      <tr><td class="lineno" valign="top"></td><td class="left">   that can be used by a server to challenge a client request and by a</td><td> </td><td class="right">   that can be used by a server to challenge a client request and by a</td><td class="lineno" valign="top"></td></tr>
268      <tr><td class="lineno" valign="top"></td><td class="left">   client to provide authentication information.  It uses an extensible,</td><td> </td><td class="right">   client to provide authentication information.  It uses an extensible,</td><td class="lineno" valign="top"></td></tr>
269      <tr><td class="lineno" valign="top"></td><td class="left">   case-insensitive token to identify the authentication scheme,</td><td> </td><td class="right">   case-insensitive token to identify the authentication scheme,</td><td class="lineno" valign="top"></td></tr>
270      <tr><td class="lineno" valign="top"></td><td class="left">   followed by additional information necessary for achieving</td><td> </td><td class="right">   followed by additional information necessary for achieving</td><td class="lineno" valign="top"></td></tr>
271      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
272      <tr bgcolor="gray" ><td></td><th><a name="part-l3" /><small>skipping to change at</small><em> page 6, line 24</em></th><th> </th><th><a name="part-r3" /><small>skipping to change at</small><em> page 6, line 20</em></th><td></td></tr>
273      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
274      <tr><td class="lineno" valign="top"></td><td class="left">     challenge   = auth-scheme [ 1*SP ( b64token / #auth-param ) ]</td><td> </td><td class="right">     challenge   = auth-scheme [ 1*SP ( b64token / #auth-param ) ]</td><td class="lineno" valign="top"></td></tr>
275      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
276      <tr><td class="lineno" valign="top"></td><td class="left">      Note: User agents will need to take special care in parsing the</td><td> </td><td class="right">      Note: User agents will need to take special care in parsing the</td><td class="lineno" valign="top"></td></tr>
277      <tr><td class="lineno" valign="top"></td><td class="left">      WWW-Authenticate and Proxy-Authenticate header field values</td><td> </td><td class="right">      WWW-Authenticate and Proxy-Authenticate header field values</td><td class="lineno" valign="top"></td></tr>
278      <tr><td class="lineno" valign="top"></td><td class="left">      because they can contain more than one challenge, or if more than</td><td> </td><td class="right">      because they can contain more than one challenge, or if more than</td><td class="lineno" valign="top"></td></tr>
279      <tr><td class="lineno" valign="top"></td><td class="left">      one of each is provided, since the contents of a challenge can</td><td> </td><td class="right">      one of each is provided, since the contents of a challenge can</td><td class="lineno" valign="top"></td></tr>
280      <tr><td class="lineno" valign="top"></td><td class="left">      itself contain a comma-separated list of authentication</td><td> </td><td class="right">      itself contain a comma-separated list of authentication</td><td class="lineno" valign="top"></td></tr>
281      <tr><td class="lineno" valign="top"></td><td class="left">      parameters.</td><td> </td><td class="right">      parameters.</td><td class="lineno" valign="top"></td></tr>
282      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
283      <tr><td><a name="diff0020" /></td></tr>
284      <tr><td class="lineno" valign="top"></td><td class="lblock">      Note: Many <span class="delete">browser</span>s fail to parse challenges containing unknown</td><td> </td><td class="rblock">      Note: Many <span class="insert">client</span>s fail to parse challenges containing unknown</td><td class="lineno" valign="top"></td></tr>
285      <tr><td class="lineno" valign="top"></td><td class="left">      schemes.  A workaround for this problem is to list well-supported</td><td> </td><td class="right">      schemes.  A workaround for this problem is to list well-supported</td><td class="lineno" valign="top"></td></tr>
286      <tr><td class="lineno" valign="top"></td><td class="left">      schemes (such as "basic") first.</td><td> </td><td class="right">      schemes (such as "basic") first.</td><td class="lineno" valign="top"></td></tr>
287      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
288      <tr><td class="lineno" valign="top"></td><td class="left">   A user agent that wishes to authenticate itself with an origin server</td><td> </td><td class="right">   A user agent that wishes to authenticate itself with an origin server</td><td class="lineno" valign="top"></td></tr>
289      <tr><td class="lineno" valign="top"></td><td class="left">   -- usually, but not necessarily, after receiving a 401 (Unauthorized)</td><td> </td><td class="right">   -- usually, but not necessarily, after receiving a 401 (Unauthorized)</td><td class="lineno" valign="top"></td></tr>
290      <tr><td><a name="diff0021" /></td></tr>
291      <tr><td class="lineno" valign="top"></td><td class="lblock">   -- <span class="delete">MAY</span> do so by including an Authorization header field with the</td><td> </td><td class="rblock">   -- <span class="insert">can</span> do so by including an Authorization header field with the</td><td class="lineno" valign="top"></td></tr>
292      <tr><td class="lineno" valign="top"></td><td class="left">   request.</td><td> </td><td class="right">   request.</td><td class="lineno" valign="top"></td></tr>
293      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
294      <tr><td class="lineno" valign="top"></td><td class="left">   A client that wishes to authenticate itself with a proxy -- usually,</td><td> </td><td class="right">   A client that wishes to authenticate itself with a proxy -- usually,</td><td class="lineno" valign="top"></td></tr>
295      <tr><td class="lineno" valign="top"></td><td class="left">   but not necessarily, after receiving a 407 (Proxy Authentication</td><td> </td><td class="right">   but not necessarily, after receiving a 407 (Proxy Authentication</td><td class="lineno" valign="top"></td></tr>
296      <tr><td><a name="diff0022" /></td></tr>
297      <tr><td class="lineno" valign="top"></td><td class="lblock">   Required) -- <span class="delete">MAY</span> do so by including a Proxy-Authorization header</td><td> </td><td class="rblock">   Required) -- <span class="insert">can</span> do so by including a Proxy-Authorization header</td><td class="lineno" valign="top"></td></tr>
298      <tr><td class="lineno" valign="top"></td><td class="left">   field with the request.</td><td> </td><td class="right">   field with the request.</td><td class="lineno" valign="top"></td></tr>
299      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
300      <tr><td class="lineno" valign="top"></td><td class="left">   Both the Authorization field value and the Proxy-Authorization field</td><td> </td><td class="right">   Both the Authorization field value and the Proxy-Authorization field</td><td class="lineno" valign="top"></td></tr>
301      <tr><td><a name="diff0023" /></td></tr>
302      <tr><td class="lineno" valign="top"></td><td class="lblock">   value <span class="delete">consist of credentials containing</span> the <span class="delete">authentication</span></td><td> </td><td class="rblock">   value <span class="insert">contain</span> the <span class="insert">client's credentials</span> for the realm of the resource</td><td class="lineno" valign="top"></td></tr>
303      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   information of the client</span> for the realm of the resource being</td><td> </td><td class="rblock">   being <span class="insert">requested, based upon a challenge received from the server</span></td><td class="lineno" valign="top"></td></tr>
304      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">requested.  The</span> user agent <span class="delete">MUST choose</span> to <span class="delete">use one of</span> the <span class="delete">challenges</span></td><td> </td><td class="rblock"><span class="insert">   (possibly at some point in the past).  When creating their values,</span></td><td class="lineno" valign="top"></td></tr>
305      <tr><td class="lineno" valign="top"></td><td class="lblock">   with the <span class="delete">strongest</span> auth-scheme it <span class="delete">understands and request</span> credentials</td><td> </td><td class="rblock"><span class="insert">   the</span> user agent <span class="insert">ought</span> to <span class="insert">do so by selecting</span> the <span class="insert">challenge</span> with <span class="insert">what it</span></td><td class="lineno" valign="top"></td></tr>
306      <tr><td class="lineno" valign="top"></td><td class="lblock">   from the user <span class="delete">based upon that challenge.</span></td><td> </td><td class="rblock"><span class="insert">   considers to be</span> the <span class="insert">most secure</span> auth-scheme <span class="insert">that</span> it <span class="insert">understands,</span></td><td class="lineno" valign="top"></td></tr>
307      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   obtaining</span> credentials from the user <span class="insert">as appropriate.</span></td><td class="lineno" valign="top"></td></tr>
308      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
309      <tr><td class="lineno" valign="top"></td><td class="left">     credentials = auth-scheme [ 1*SP ( b64token / #auth-param ) ]</td><td> </td><td class="right">     credentials = auth-scheme [ 1*SP ( b64token / #auth-param ) ]</td><td class="lineno" valign="top"></td></tr>
310      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
311      <tr><td><a name="diff0024" /></td></tr>
312      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">If</span> the origin server <span class="delete">does not wish to accept the credentials sent</span></td><td> </td><td class="rblock">   <span class="insert">Upon a request for a protected resource that omits credentials,</span></td><td class="lineno" valign="top"></td></tr>
313      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   with a request, it</span> SHOULD return a 401 (Unauthorized) response.  <span class="delete">The</span></td><td> </td><td class="rblock"><span class="insert">   contains invalid credentials (e.g., a bad password) or partial</span></td><td class="lineno" valign="top"></td></tr>
314      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   response</span> MUST include a WWW-Authenticate header field containing at</td><td> </td><td class="rblock"><span class="insert">   credentials (e.g., when</span> the <span class="insert">authentication scheme requires more than</span></td><td class="lineno" valign="top"></td></tr>
315      <tr><td class="lineno" valign="top"></td><td class="lblock">   least one (possibly new) challenge applicable to the requested</td><td> </td><td class="rblock"><span class="insert">   one round trip), an</span> origin server SHOULD return a 401 (Unauthorized)</td><td class="lineno" valign="top"></td></tr>
316      <tr><td class="lineno" valign="top"></td><td class="lblock">   resource.</td><td> </td><td class="rblock">   response.  <span class="insert">Such responses</span> MUST include a WWW-Authenticate header</td><td class="lineno" valign="top"></td></tr>
317      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   field containing at least one (possibly new) challenge applicable to</td><td class="lineno" valign="top"></td></tr>
318      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   the requested resource.</td><td class="lineno" valign="top"></td></tr>
319      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
320      <tr><td><a name="diff0025" /></td></tr>
321      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">If</span> a <span class="delete">proxy does not accept the</span> credentials <span class="delete">sent with</span> a <span class="delete">request, it</span></td><td> </td><td class="rblock">   <span class="insert">Likewise, upon</span> a <span class="insert">request that requires authentication by proxies that</span></td><td class="lineno" valign="top"></td></tr>
322      <tr><td class="lineno" valign="top"></td><td class="lblock">   SHOULD return a 407 (Proxy Authentication <span class="delete">Required).  The response</span></td><td> </td><td class="rblock"><span class="insert">   omit</span> credentials <span class="insert">or contain invalid or partial credentials,</span> a <span class="insert">proxy</span></td><td class="lineno" valign="top"></td></tr>
323      <tr><td class="lineno" valign="top"></td><td class="lblock">   MUST include a Proxy-Authenticate header field containing a (possibly</td><td> </td><td class="rblock">   SHOULD return a 407 (Proxy Authentication <span class="insert">Required) response.  Such</span></td><td class="lineno" valign="top"></td></tr>
324      <tr><td class="lineno" valign="top"></td><td class="lblock">   new) challenge applicable to the <span class="delete">proxy for</span> the <span class="delete">requested resource.</span></td><td> </td><td class="rblock"><span class="insert">   responses</span> MUST include a Proxy-Authenticate header field containing a</td><td class="lineno" valign="top"></td></tr>
325      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   (possibly new) challenge applicable to the <span class="insert">proxy.</span></td><td class="lineno" valign="top"></td></tr>
326      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
327      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   A server receiving credentials that are valid, but not adequate to</span></td><td class="lineno" valign="top"></td></tr>
328      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   gain access, ought to respond with</span> the <span class="insert">403 (Forbidden) status code</span></td><td class="lineno" valign="top"></td></tr>
329      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   (Section 4.6.3 of [Part2]).</span></td><td class="lineno" valign="top"></td></tr>
330      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
331      <tr><td class="lineno" valign="top"></td><td class="left">   The HTTP protocol does not restrict applications to this simple</td><td> </td><td class="right">   The HTTP protocol does not restrict applications to this simple</td><td class="lineno" valign="top"></td></tr>
332      <tr><td class="lineno" valign="top"></td><td class="left">   challenge-response mechanism for access authentication.  Additional</td><td> </td><td class="right">   challenge-response mechanism for access authentication.  Additional</td><td class="lineno" valign="top"></td></tr>
333      <tr><td class="lineno" valign="top"></td><td class="left">   mechanisms MAY be used, such as encryption at the transport level or</td><td> </td><td class="right">   mechanisms MAY be used, such as encryption at the transport level or</td><td class="lineno" valign="top"></td></tr>
334      <tr><td class="lineno" valign="top"></td><td class="left">   via message encapsulation, and with additional header fields</td><td> </td><td class="right">   via message encapsulation, and with additional header fields</td><td class="lineno" valign="top"></td></tr>
335      <tr><td class="lineno" valign="top"></td><td class="left">   specifying authentication information.  However, such additional</td><td> </td><td class="right">   specifying authentication information.  However, such additional</td><td class="lineno" valign="top"></td></tr>
336      <tr><td class="lineno" valign="top"></td><td class="left">   mechanisms are not defined by this specification.</td><td> </td><td class="right">   mechanisms are not defined by this specification.</td><td class="lineno" valign="top"></td></tr>
337      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
338      <tr><td><a name="diff0026" /></td></tr>
339      <tr><td class="lineno" valign="top"></td><td class="lblock">   Proxies MUST forward the WWW-Authenticate and Authorization <span class="delete">headers</span></td><td> </td><td class="rblock">   Proxies MUST forward the WWW-Authenticate and Authorization <span class="insert">header</span></td><td class="lineno" valign="top"></td></tr>
340      <tr><td class="lineno" valign="top"></td><td class="lblock">   unmodified and follow the rules found in Section 4.1.</td><td> </td><td class="rblock"><span class="insert">   fields</span> unmodified and follow the rules found in Section 4.1.</td><td class="lineno" valign="top"></td></tr>
341      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
342      <tr><td class="lineno" valign="top"></td><td class="left">2.2.  Protection Space (Realm)</td><td> </td><td class="right">2.2.  Protection Space (Realm)</td><td class="lineno" valign="top"></td></tr>
343      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
344      <tr><td class="lineno" valign="top"></td><td class="left">   The authentication parameter realm is reserved for use by</td><td> </td><td class="right">   The authentication parameter realm is reserved for use by</td><td class="lineno" valign="top"></td></tr>
345      <tr><td class="lineno" valign="top"></td><td class="left">   authentication schemes that wish to indicate the scope of protection.</td><td> </td><td class="right">   authentication schemes that wish to indicate the scope of protection.</td><td class="lineno" valign="top"></td></tr>
346      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
347      <tr><td class="lineno" valign="top"></td><td class="left">   A protection space is defined by the canonical root URI (the scheme</td><td> </td><td class="right">   A protection space is defined by the canonical root URI (the scheme</td><td class="lineno" valign="top"></td></tr>
348      <tr><td class="lineno" valign="top"></td><td class="left">   and authority components of the effective request URI; see Section</td><td> </td><td class="right">   and authority components of the effective request URI; see Section</td><td class="lineno" valign="top"></td></tr>
349      <tr><td class="lineno" valign="top"></td><td class="left">   5.5 of [Part1]) of the server being accessed, in combination with the</td><td> </td><td class="right">   5.5 of [Part1]) of the server being accessed, in combination with the</td><td class="lineno" valign="top"></td></tr>
350      <tr><td class="lineno" valign="top"></td><td class="left">   realm value if present.  These realms allow the protected resources</td><td> </td><td class="right">   realm value if present.  These realms allow the protected resources</td><td class="lineno" valign="top"></td></tr>
351      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
352      <tr bgcolor="gray" ><td></td><th><a name="part-l4" /><small>skipping to change at</small><em> page 8, line 31</em></th><th> </th><th><a name="part-r4" /><small>skipping to change at</small><em> page 8, line 36</em></th><td></td></tr>
353      <tr><td class="lineno" valign="top"></td><td class="left">   There are certain aspects of the HTTP Authentication Framework that</td><td> </td><td class="right">   There are certain aspects of the HTTP Authentication Framework that</td><td class="lineno" valign="top"></td></tr>
354      <tr><td class="lineno" valign="top"></td><td class="left">   put constraints on how new authentication schemes can work:</td><td> </td><td class="right">   put constraints on how new authentication schemes can work:</td><td class="lineno" valign="top"></td></tr>
355      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
356      <tr><td class="lineno" valign="top"></td><td class="left">   o  HTTP authentication is presumed to be stateless: all of the</td><td> </td><td class="right">   o  HTTP authentication is presumed to be stateless: all of the</td><td class="lineno" valign="top"></td></tr>
357      <tr><td class="lineno" valign="top"></td><td class="left">      information necessary to authenticate a request MUST be provided</td><td> </td><td class="right">      information necessary to authenticate a request MUST be provided</td><td class="lineno" valign="top"></td></tr>
358      <tr><td class="lineno" valign="top"></td><td class="left">      in the request, rather than be dependent on the server remembering</td><td> </td><td class="right">      in the request, rather than be dependent on the server remembering</td><td class="lineno" valign="top"></td></tr>
359      <tr><td class="lineno" valign="top"></td><td class="left">      prior requests.  Authentication based on, or bound to, the</td><td> </td><td class="right">      prior requests.  Authentication based on, or bound to, the</td><td class="lineno" valign="top"></td></tr>
360      <tr><td class="lineno" valign="top"></td><td class="left">      underlying connection is outside the scope of this specification</td><td> </td><td class="right">      underlying connection is outside the scope of this specification</td><td class="lineno" valign="top"></td></tr>
361      <tr><td class="lineno" valign="top"></td><td class="left">      and inherently flawed unless steps are taken to ensure that the</td><td> </td><td class="right">      and inherently flawed unless steps are taken to ensure that the</td><td class="lineno" valign="top"></td></tr>
362      <tr><td class="lineno" valign="top"></td><td class="left">      connection cannot be used by any party other than the</td><td> </td><td class="right">      connection cannot be used by any party other than the</td><td class="lineno" valign="top"></td></tr>
363      <tr><td><a name="diff0027" /></td></tr>
364      <tr><td class="lineno" valign="top"></td><td class="lblock">      authenticated user (see Section 2.<span class="delete">3</span> of [Part1]).</td><td> </td><td class="rblock">      authenticated user (see Section 2.<span class="insert">4</span> of [Part1]).</td><td class="lineno" valign="top"></td></tr>
365      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
366      <tr><td class="lineno" valign="top"></td><td class="left">   o  The authentication parameter "realm" is reserved for defining</td><td> </td><td class="right">   o  The authentication parameter "realm" is reserved for defining</td><td class="lineno" valign="top"></td></tr>
367      <tr><td class="lineno" valign="top"></td><td class="left">      Protection Spaces as defined in Section 2.2.  New schemes MUST NOT</td><td> </td><td class="right">      Protection Spaces as defined in Section 2.2.  New schemes MUST NOT</td><td class="lineno" valign="top"></td></tr>
368      <tr><td class="lineno" valign="top"></td><td class="left">      use it in a way incompatible with that definition.</td><td> </td><td class="right">      use it in a way incompatible with that definition.</td><td class="lineno" valign="top"></td></tr>
369      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
370      <tr><td class="lineno" valign="top"></td><td class="left">   o  The "b64token" notation was introduced for compatibility with</td><td> </td><td class="right">   o  The "b64token" notation was introduced for compatibility with</td><td class="lineno" valign="top"></td></tr>
371      <tr><td class="lineno" valign="top"></td><td class="left">      existing authentication schemes and can only be used once per</td><td> </td><td class="right">      existing authentication schemes and can only be used once per</td><td class="lineno" valign="top"></td></tr>
372      <tr><td class="lineno" valign="top"></td><td class="left">      challenge/credentials.  New schemes thus ought to use the "auth-</td><td> </td><td class="right">      challenge/credentials.  New schemes thus ought to use the "auth-</td><td class="lineno" valign="top"></td></tr>
373      <tr><td class="lineno" valign="top"></td><td class="left">      param" syntax instead, because otherwise future extensions will be</td><td> </td><td class="right">      param" syntax instead, because otherwise future extensions will be</td><td class="lineno" valign="top"></td></tr>
374      <tr><td class="lineno" valign="top"></td><td class="left">      impossible.</td><td> </td><td class="right">      impossible.</td><td class="lineno" valign="top"></td></tr>
375      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
376      <tr><td class="lineno" valign="top"></td><td class="left">   o  The parsing of challenges and credentials is defined by this</td><td> </td><td class="right">   o  The parsing of challenges and credentials is defined by this</td><td class="lineno" valign="top"></td></tr>
377      <tr><td class="lineno" valign="top"></td><td class="left">      specification, and cannot be modified by new authentication</td><td> </td><td class="right">      specification, and cannot be modified by new authentication</td><td class="lineno" valign="top"></td></tr>
378      <tr><td class="lineno" valign="top"></td><td class="left">      schemes.  When the auth-param syntax is used, all parameters ought</td><td> </td><td class="right">      schemes.  When the auth-param syntax is used, all parameters ought</td><td class="lineno" valign="top"></td></tr>
379      <tr><td class="lineno" valign="top"></td><td class="left">      to support both token and quoted-string syntax, and syntactical</td><td> </td><td class="right">      to support both token and quoted-string syntax, and syntactical</td><td class="lineno" valign="top"></td></tr>
380      <tr><td class="lineno" valign="top"></td><td class="left">      constraints ought to be defined on the field value after parsing</td><td> </td><td class="right">      constraints ought to be defined on the field value after parsing</td><td class="lineno" valign="top"></td></tr>
381      <tr><td class="lineno" valign="top"></td><td class="left">      (i.e., quoted-string processing).  This is necessary so that</td><td> </td><td class="right">      (i.e., quoted-string processing).  This is necessary so that</td><td class="lineno" valign="top"></td></tr>
382      <tr><td class="lineno" valign="top"></td><td class="left">      recipients can use a generic parser that applies to all</td><td> </td><td class="right">      recipients can use a generic parser that applies to all</td><td class="lineno" valign="top"></td></tr>
383      <tr><td class="lineno" valign="top"></td><td class="left">      authentication schemes.</td><td> </td><td class="right">      authentication schemes.</td><td class="lineno" valign="top"></td></tr>
384      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
385      <tr><td><a name="diff0028" /></td></tr>
386      <tr><td class="lineno" valign="top"></td><td class="lblock">      Note: <span class="delete">t</span>he fact that the value syntax for the "realm" parameter is</td><td> </td><td class="rblock">      Note: <span class="insert">T</span>he fact that the value syntax for the "realm" parameter is</td><td class="lineno" valign="top"></td></tr>
387      <tr><td class="lineno" valign="top"></td><td class="left">      restricted to quoted-string was a bad design choice not to be</td><td> </td><td class="right">      restricted to quoted-string was a bad design choice not to be</td><td class="lineno" valign="top"></td></tr>
388      <tr><td class="lineno" valign="top"></td><td class="left">      repeated for new parameters.</td><td> </td><td class="right">      repeated for new parameters.</td><td class="lineno" valign="top"></td></tr>
389      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
390      <tr><td class="lineno" valign="top"></td><td class="left">   o  Definitions of new schemes ought to define the treatment of</td><td> </td><td class="right">   o  Definitions of new schemes ought to define the treatment of</td><td class="lineno" valign="top"></td></tr>
391      <tr><td class="lineno" valign="top"></td><td class="left">      unknown extension parameters.  In general, a "must-ignore" rule is</td><td> </td><td class="right">      unknown extension parameters.  In general, a "must-ignore" rule is</td><td class="lineno" valign="top"></td></tr>
392      <tr><td class="lineno" valign="top"></td><td class="left">      preferable over "must-understand", because otherwise it will be</td><td> </td><td class="right">      preferable over "must-understand", because otherwise it will be</td><td class="lineno" valign="top"></td></tr>
393      <tr><td class="lineno" valign="top"></td><td class="left">      hard to introduce new parameters in the presence of legacy</td><td> </td><td class="right">      hard to introduce new parameters in the presence of legacy</td><td class="lineno" valign="top"></td></tr>
394      <tr><td class="lineno" valign="top"></td><td class="left">      recipients.  Furthermore, it's good to describe the policy for</td><td> </td><td class="right">      recipients.  Furthermore, it's good to describe the policy for</td><td class="lineno" valign="top"></td></tr>
395      <tr><td class="lineno" valign="top"></td><td class="left">      defining new parameters (such as "update the specification", or</td><td> </td><td class="right">      defining new parameters (such as "update the specification", or</td><td class="lineno" valign="top"></td></tr>
396      <tr><td class="lineno" valign="top"></td><td class="left">      "use this registry").</td><td> </td><td class="right">      "use this registry").</td><td class="lineno" valign="top"></td></tr>
397      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
398      <tr bgcolor="gray" ><td></td><th><a name="part-l5" /><small>skipping to change at</small><em> page 9, line 25</em></th><th> </th><th><a name="part-r5" /><small>skipping to change at</small><em> page 9, line 30</em></th><td></td></tr>
399      <tr><td class="lineno" valign="top"></td><td class="left">   o  Authentication schemes need to document whether they are usable in</td><td> </td><td class="right">   o  Authentication schemes need to document whether they are usable in</td><td class="lineno" valign="top"></td></tr>
400      <tr><td class="lineno" valign="top"></td><td class="left">      origin-server authentication (i.e., using WWW-Authenticate),</td><td> </td><td class="right">      origin-server authentication (i.e., using WWW-Authenticate),</td><td class="lineno" valign="top"></td></tr>
401      <tr><td class="lineno" valign="top"></td><td class="left">      and/or proxy authentication (i.e., using Proxy-Authenticate).</td><td> </td><td class="right">      and/or proxy authentication (i.e., using Proxy-Authenticate).</td><td class="lineno" valign="top"></td></tr>
402      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
403      <tr><td class="lineno" valign="top"></td><td class="left">   o  The credentials carried in an Authorization header field are</td><td> </td><td class="right">   o  The credentials carried in an Authorization header field are</td><td class="lineno" valign="top"></td></tr>
404      <tr><td class="lineno" valign="top"></td><td class="left">      specific to the User Agent, and therefore have the same effect on</td><td> </td><td class="right">      specific to the User Agent, and therefore have the same effect on</td><td class="lineno" valign="top"></td></tr>
405      <tr><td class="lineno" valign="top"></td><td class="left">      HTTP caches as the "private" Cache-Control response directive,</td><td> </td><td class="right">      HTTP caches as the "private" Cache-Control response directive,</td><td class="lineno" valign="top"></td></tr>
406      <tr><td class="lineno" valign="top"></td><td class="left">      within the scope of the request they appear in.</td><td> </td><td class="right">      within the scope of the request they appear in.</td><td class="lineno" valign="top"></td></tr>
407      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
408      <tr><td class="lineno" valign="top"></td><td class="left">      Therefore, new authentication schemes which choose not to carry</td><td> </td><td class="right">      Therefore, new authentication schemes which choose not to carry</td><td class="lineno" valign="top"></td></tr>
409      <tr><td><a name="diff0029" /></td></tr>
410      <tr><td class="lineno" valign="top"></td><td class="lblock">      credentials in the Authorization header (e.g., using a newly</td><td> </td><td class="rblock">      credentials in the Authorization header <span class="insert">field</span> (e.g., using a newly</td><td class="lineno" valign="top"></td></tr>
411      <tr><td class="lineno" valign="top"></td><td class="lblock">      defined <span class="delete">header)</span> will need to explicitly disallow caching, by</td><td> </td><td class="rblock">      defined <span class="insert">header field)</span> will need to explicitly disallow caching, by</td><td class="lineno" valign="top"></td></tr>
412      <tr><td class="lineno" valign="top"></td><td class="left">      mandating the use of either Cache-Control request directives</td><td> </td><td class="right">      mandating the use of either Cache-Control request directives</td><td class="lineno" valign="top"></td></tr>
413      <tr><td class="lineno" valign="top"></td><td class="left">      (e.g., "no-store") or response directives (e.g., "private").</td><td> </td><td class="right">      (e.g., "no-store") or response directives (e.g., "private").</td><td class="lineno" valign="top"></td></tr>
414      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
415      <tr><td class="lineno" valign="top"></td><td class="left">3.  Status Code Definitions</td><td> </td><td class="right">3.  Status Code Definitions</td><td class="lineno" valign="top"></td></tr>
416      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
417      <tr><td class="lineno" valign="top"></td><td class="left">3.1.  401 Unauthorized</td><td> </td><td class="right">3.1.  401 Unauthorized</td><td class="lineno" valign="top"></td></tr>
418      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
419      <tr><td class="lineno" valign="top"></td><td class="left">   The request requires user authentication.  The response MUST include</td><td> </td><td class="right">   The request requires user authentication.  The response MUST include</td><td class="lineno" valign="top"></td></tr>
420      <tr><td class="lineno" valign="top"></td><td class="left">   a WWW-Authenticate header field (Section 4.4) containing a challenge</td><td> </td><td class="right">   a WWW-Authenticate header field (Section 4.4) containing a challenge</td><td class="lineno" valign="top"></td></tr>
421      <tr><td class="lineno" valign="top"></td><td class="left">   applicable to the target resource.  The client MAY repeat the request</td><td> </td><td class="right">   applicable to the target resource.  The client MAY repeat the request</td><td class="lineno" valign="top"></td></tr>
422      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
423      <tr bgcolor="gray" ><td></td><th><a name="part-l6" /><small>skipping to change at</small><em> page 11, line 7</em></th><th> </th><th><a name="part-r6" /><small>skipping to change at</small><em> page 11, line 12</em></th><td></td></tr>
424      <tr><td class="lineno" valign="top"></td><td class="left">       subsequent request.  But if the response is stale, all caches</td><td> </td><td class="right">       subsequent request.  But if the response is stale, all caches</td><td class="lineno" valign="top"></td></tr>
425      <tr><td class="lineno" valign="top"></td><td class="left">       MUST first revalidate it with the origin server, using the header</td><td> </td><td class="right">       MUST first revalidate it with the origin server, using the header</td><td class="lineno" valign="top"></td></tr>
426      <tr><td class="lineno" valign="top"></td><td class="left">       fields from the new request to allow the origin server to</td><td> </td><td class="right">       fields from the new request to allow the origin server to</td><td class="lineno" valign="top"></td></tr>
427      <tr><td class="lineno" valign="top"></td><td class="left">       authenticate the new request.</td><td> </td><td class="right">       authenticate the new request.</td><td class="lineno" valign="top"></td></tr>
428      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
429      <tr><td class="lineno" valign="top"></td><td class="left">   3.  If the response includes the "public" cache-control directive, it</td><td> </td><td class="right">   3.  If the response includes the "public" cache-control directive, it</td><td class="lineno" valign="top"></td></tr>
430      <tr><td class="lineno" valign="top"></td><td class="left">       MAY be returned in reply to any subsequent request.</td><td> </td><td class="right">       MAY be returned in reply to any subsequent request.</td><td class="lineno" valign="top"></td></tr>
431      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
432      <tr><td class="lineno" valign="top"></td><td class="left">4.2.  Proxy-Authenticate</td><td> </td><td class="right">4.2.  Proxy-Authenticate</td><td class="lineno" valign="top"></td></tr>
433      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
434      <tr><td><a name="diff0030" /></td></tr>
435      <tr><td class="lineno" valign="top"></td><td class="lblock">   The "Proxy-Authenticate" header field consists of <span class="delete">a</span> challenge that</td><td> </td><td class="rblock">   The "Proxy-Authenticate" header field consists of <span class="insert">at least one</span></td><td class="lineno" valign="top"></td></tr>
436      <tr><td class="lineno" valign="top"></td><td class="lblock">   indicates the authentication <span class="delete">scheme</span> and parameters applicable to the</td><td> </td><td class="rblock">   challenge that indicates the authentication <span class="insert">scheme(s)</span> and parameters</td><td class="lineno" valign="top"></td></tr>
437      <tr><td class="lineno" valign="top"></td><td class="lblock">   proxy for this effective request URI (Section 5.5 of [Part1]).  It</td><td> </td><td class="rblock">   applicable to the proxy for this effective request URI (Section 5.5</td><td class="lineno" valign="top"></td></tr>
438      <tr><td class="lineno" valign="top"></td><td class="lblock">   MUST be included as part of a 407 (Proxy Authentication Required)</td><td> </td><td class="rblock">   of [Part1]).  It MUST be included as part of a 407 (Proxy</td><td class="lineno" valign="top"></td></tr>
439      <tr><td class="lineno" valign="top"></td><td class="lblock">   response.</td><td> </td><td class="rblock">   Authentication Required) response.</td><td class="lineno" valign="top"></td></tr>
440      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
441      <tr><td class="lineno" valign="top"></td><td class="left">     Proxy-Authenticate = 1#challenge</td><td> </td><td class="right">     Proxy-Authenticate = 1#challenge</td><td class="lineno" valign="top"></td></tr>
442      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
443      <tr><td class="lineno" valign="top"></td><td class="left">   Unlike WWW-Authenticate, the Proxy-Authenticate header field applies</td><td> </td><td class="right">   Unlike WWW-Authenticate, the Proxy-Authenticate header field applies</td><td class="lineno" valign="top"></td></tr>
444      <tr><td><a name="diff0031" /></td></tr>
445      <tr><td class="lineno" valign="top"></td><td class="lblock">   only to the current <span class="delete">connection</span> and SHOULD NOT <span class="delete">be passed on</span> to</td><td> </td><td class="rblock">   only to the current <span class="insert">connection,</span> and <span class="insert">intermediaries</span> SHOULD NOT <span class="insert">forward</span></td><td class="lineno" valign="top"></td></tr>
446      <tr><td class="lineno" valign="top"></td><td class="lblock">   downstream clients.  However, an intermediate proxy might need to</td><td> </td><td class="rblock"><span class="insert">   it</span> to downstream clients.  However, an intermediate proxy might need</td><td class="lineno" valign="top"></td></tr>
447      <tr><td class="lineno" valign="top"></td><td class="lblock">   obtain its own credentials by requesting them from the downstream</td><td> </td><td class="rblock">   to obtain its own credentials by requesting them from the downstream</td><td class="lineno" valign="top"></td></tr>
448      <tr><td class="lineno" valign="top"></td><td class="left">   client, which in some circumstances will appear as if the proxy is</td><td> </td><td class="right">   client, which in some circumstances will appear as if the proxy is</td><td class="lineno" valign="top"></td></tr>
449      <tr><td class="lineno" valign="top"></td><td class="left">   forwarding the Proxy-Authenticate header field.</td><td> </td><td class="right">   forwarding the Proxy-Authenticate header field.</td><td class="lineno" valign="top"></td></tr>
450      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
451      <tr><td class="lineno" valign="top"></td><td class="left">   Note that the parsing considerations for WWW-Authenticate apply to</td><td> </td><td class="right">   Note that the parsing considerations for WWW-Authenticate apply to</td><td class="lineno" valign="top"></td></tr>
452      <tr><td class="lineno" valign="top"></td><td class="left">   this header field as well; see Section 4.4 for details.</td><td> </td><td class="right">   this header field as well; see Section 4.4 for details.</td><td class="lineno" valign="top"></td></tr>
453      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
454      <tr><td class="lineno" valign="top"></td><td class="left">4.3.  Proxy-Authorization</td><td> </td><td class="right">4.3.  Proxy-Authorization</td><td class="lineno" valign="top"></td></tr>
455      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
456      <tr><td class="lineno" valign="top"></td><td class="left">   The "Proxy-Authorization" header field allows the client to identify</td><td> </td><td class="right">   The "Proxy-Authorization" header field allows the client to identify</td><td class="lineno" valign="top"></td></tr>
457      <tr><td class="lineno" valign="top"></td><td class="left">   itself (or its user) to a proxy which requires authentication.  Its</td><td> </td><td class="right">   itself (or its user) to a proxy which requires authentication.  Its</td><td class="lineno" valign="top"></td></tr>
458      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
459      <tr bgcolor="gray" ><td></td><th><a name="part-l7" /><small>skipping to change at</small><em> page 12, line 32</em></th><th> </th><th><a name="part-r7" /><small>skipping to change at</small><em> page 12, line 42</em></th><td></td></tr>
460      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
461      <tr><td class="lineno" valign="top"></td><td class="left">      Note: The challenge grammar production uses the list syntax as</td><td> </td><td class="right">      Note: The challenge grammar production uses the list syntax as</td><td class="lineno" valign="top"></td></tr>
462      <tr><td class="lineno" valign="top"></td><td class="left">      well.  Therefore, a sequence of comma, whitespace, and comma can</td><td> </td><td class="right">      well.  Therefore, a sequence of comma, whitespace, and comma can</td><td class="lineno" valign="top"></td></tr>
463      <tr><td class="lineno" valign="top"></td><td class="left">      be considered both as applying to the preceding challenge, or to</td><td> </td><td class="right">      be considered both as applying to the preceding challenge, or to</td><td class="lineno" valign="top"></td></tr>
464      <tr><td class="lineno" valign="top"></td><td class="left">      be an empty entry in the list of challenges.  In practice, this</td><td> </td><td class="right">      be an empty entry in the list of challenges.  In practice, this</td><td class="lineno" valign="top"></td></tr>
465      <tr><td class="lineno" valign="top"></td><td class="left">      ambiguity does not affect the semantics of the header field value</td><td> </td><td class="right">      ambiguity does not affect the semantics of the header field value</td><td class="lineno" valign="top"></td></tr>
466      <tr><td class="lineno" valign="top"></td><td class="left">      and thus is harmless.</td><td> </td><td class="right">      and thus is harmless.</td><td class="lineno" valign="top"></td></tr>
467      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
468      <tr><td class="lineno" valign="top"></td><td class="left">5.  IANA Considerations</td><td> </td><td class="right">5.  IANA Considerations</td><td class="lineno" valign="top"></td></tr>
469      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
470      <tr><td><a name="diff0032" /></td></tr>
471      <tr><td class="lineno" valign="top"></td><td class="lblock">5.1.  Authenticaton Scheme Registry</td><td> </td><td class="rblock">5.1.  Authenticat<span class="insert">i</span>on Scheme Registry</td><td class="lineno" valign="top"></td></tr>
472      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
473      <tr><td class="lineno" valign="top"></td><td class="left">   The registration procedure for HTTP Authentication Schemes is defined</td><td> </td><td class="right">   The registration procedure for HTTP Authentication Schemes is defined</td><td class="lineno" valign="top"></td></tr>
474      <tr><td class="lineno" valign="top"></td><td class="left">   by Section 2.3 of this document.</td><td> </td><td class="right">   by Section 2.3 of this document.</td><td class="lineno" valign="top"></td></tr>
475      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
476      <tr><td class="lineno" valign="top"></td><td class="left">   The HTTP Method Authentication Scheme shall be created at</td><td> </td><td class="right">   The HTTP Method Authentication Scheme shall be created at</td><td class="lineno" valign="top"></td></tr>
477      <tr><td class="lineno" valign="top"></td><td class="left">   &lt;http://www.iana.org/assignments/http-authschemes&gt;.</td><td> </td><td class="right">   &lt;http://www.iana.org/assignments/http-authschemes&gt;.</td><td class="lineno" valign="top"></td></tr>
478      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
479      <tr><td class="lineno" valign="top"></td><td class="left">5.2.  Status Code Registration</td><td> </td><td class="right">5.2.  Status Code Registration</td><td class="lineno" valign="top"></td></tr>
480      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
481      <tr><td class="lineno" valign="top"></td><td class="left">   The HTTP Status Code Registry located at</td><td> </td><td class="right">   The HTTP Status Code Registry located at</td><td class="lineno" valign="top"></td></tr>
482      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
483      <tr bgcolor="gray" ><td></td><th><a name="part-l8" /><small>skipping to change at</small><em> page 14, line 8</em></th><th> </th><th><a name="part-r8" /><small>skipping to change at</small><em> page 14, line 22</em></th><td></td></tr>
484      <tr><td class="lineno" valign="top"></td><td class="left">      for the client to retain the credentials.</td><td> </td><td class="right">      for the client to retain the credentials.</td><td class="lineno" valign="top"></td></tr>
485      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
486      <tr><td class="lineno" valign="top"></td><td class="left">   This is currently under separate study.  There are a number of work-</td><td> </td><td class="right">   This is currently under separate study.  There are a number of work-</td><td class="lineno" valign="top"></td></tr>
487      <tr><td class="lineno" valign="top"></td><td class="left">   arounds to parts of this problem, and we encourage the use of</td><td> </td><td class="right">   arounds to parts of this problem, and we encourage the use of</td><td class="lineno" valign="top"></td></tr>
488      <tr><td class="lineno" valign="top"></td><td class="left">   password protection in screen savers, idle time-outs, and other</td><td> </td><td class="right">   password protection in screen savers, idle time-outs, and other</td><td class="lineno" valign="top"></td></tr>
489      <tr><td class="lineno" valign="top"></td><td class="left">   methods which mitigate the security problems inherent in this</td><td> </td><td class="right">   methods which mitigate the security problems inherent in this</td><td class="lineno" valign="top"></td></tr>
490      <tr><td class="lineno" valign="top"></td><td class="left">   problem.  In particular, user agents which cache credentials are</td><td> </td><td class="right">   problem.  In particular, user agents which cache credentials are</td><td class="lineno" valign="top"></td></tr>
491      <tr><td class="lineno" valign="top"></td><td class="left">   encouraged to provide a readily accessible mechanism for discarding</td><td> </td><td class="right">   encouraged to provide a readily accessible mechanism for discarding</td><td class="lineno" valign="top"></td></tr>
492      <tr><td class="lineno" valign="top"></td><td class="left">   cached credentials under user control.</td><td> </td><td class="right">   cached credentials under user control.</td><td class="lineno" valign="top"></td></tr>
493      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
494      <tr><td><a name="diff0033" /></td></tr>
495      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">6.2.  Protection Spaces</span></td><td class="lineno" valign="top"></td></tr>
496      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
497      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   Authentication schemes that solely rely on the "realm" mechanism for</span></td><td class="lineno" valign="top"></td></tr>
498      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   establishing a protection space will expose credentials to all</span></td><td class="lineno" valign="top"></td></tr>
499      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   resources on a server.  Clients that have successfully made</span></td><td class="lineno" valign="top"></td></tr>
500      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   authenticated requests with a resource can use the same</span></td><td class="lineno" valign="top"></td></tr>
501      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   authentication credentials for other resources on the same server.</span></td><td class="lineno" valign="top"></td></tr>
502      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   This makes it possible for a different resource to harvest</span></td><td class="lineno" valign="top"></td></tr>
503      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   authentication credentials for other resources.</span></td><td class="lineno" valign="top"></td></tr>
504      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
505      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   This is of particular concern when a server hosts resources for</span></td><td class="lineno" valign="top"></td></tr>
506      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   multiple parties under the same canonical root URI (Section 2.2).</span></td><td class="lineno" valign="top"></td></tr>
507      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   Possible mitigation strategies include restricting direct access to</span></td><td class="lineno" valign="top"></td></tr>
508      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   authentication credentials (i.e., not making the content of the</span></td><td class="lineno" valign="top"></td></tr>
509      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   Authorization request header field available), and separating</span></td><td class="lineno" valign="top"></td></tr>
510      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   protection spaces by using a different host name for each party.</span></td><td class="lineno" valign="top"></td></tr>
511      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
512      <tr><td class="lineno" valign="top"></td><td class="left">7.  Acknowledgments</td><td> </td><td class="right">7.  Acknowledgments</td><td class="lineno" valign="top"></td></tr>
513      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
514      <tr><td class="lineno" valign="top"></td><td class="left">   This specification takes over the definition of the HTTP</td><td> </td><td class="right">   This specification takes over the definition of the HTTP</td><td class="lineno" valign="top"></td></tr>
515      <tr><td class="lineno" valign="top"></td><td class="left">   Authentication Framework, previously defined in RFC 2617.  We thank</td><td> </td><td class="right">   Authentication Framework, previously defined in RFC 2617.  We thank</td><td class="lineno" valign="top"></td></tr>
516      <tr><td class="lineno" valign="top"></td><td class="left">   John Franks, Phillip M. Hallam-Baker, Jeffery L. Hostetler, Scott D.</td><td> </td><td class="right">   John Franks, Phillip M. Hallam-Baker, Jeffery L. Hostetler, Scott D.</td><td class="lineno" valign="top"></td></tr>
517      <tr><td class="lineno" valign="top"></td><td class="left">   Lawrence, Paul J. Leach, Ari Luotonen, and Lawrence C. Stewart for</td><td> </td><td class="right">   Lawrence, Paul J. Leach, Ari Luotonen, and Lawrence C. Stewart for</td><td class="lineno" valign="top"></td></tr>
518      <tr><td class="lineno" valign="top"></td><td class="left">   their work on that specification.  See Section 6 of [RFC2617] for</td><td> </td><td class="right">   their work on that specification.  See Section 6 of [RFC2617] for</td><td class="lineno" valign="top"></td></tr>
519      <tr><td class="lineno" valign="top"></td><td class="left">   further acknowledgements.</td><td> </td><td class="right">   further acknowledgements.</td><td class="lineno" valign="top"></td></tr>
520      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
521      <tr><td class="lineno" valign="top"></td><td class="left">   See Section 9 of [Part1] for the Acknowledgments related to this</td><td> </td><td class="right">   See Section 9 of [Part1] for the Acknowledgments related to this</td><td class="lineno" valign="top"></td></tr>
522      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
523      <tr bgcolor="gray" ><td></td><th><a name="part-l9" /><small>skipping to change at</small><em> page 14, line 21</em></th><th> </th><th><a name="part-r9" /><small>skipping to change at</small><em> page 15, line 4</em></th><td></td></tr>
524      <tr><td class="lineno" valign="top"></td><td class="left">   Authentication Framework, previously defined in RFC 2617.  We thank</td><td> </td><td class="right">   Authentication Framework, previously defined in RFC 2617.  We thank</td><td class="lineno" valign="top"></td></tr>
525      <tr><td class="lineno" valign="top"></td><td class="left">   John Franks, Phillip M. Hallam-Baker, Jeffery L. Hostetler, Scott D.</td><td> </td><td class="right">   John Franks, Phillip M. Hallam-Baker, Jeffery L. Hostetler, Scott D.</td><td class="lineno" valign="top"></td></tr>
526      <tr><td class="lineno" valign="top"></td><td class="left">   Lawrence, Paul J. Leach, Ari Luotonen, and Lawrence C. Stewart for</td><td> </td><td class="right">   Lawrence, Paul J. Leach, Ari Luotonen, and Lawrence C. Stewart for</td><td class="lineno" valign="top"></td></tr>
527      <tr><td class="lineno" valign="top"></td><td class="left">   their work on that specification.  See Section 6 of [RFC2617] for</td><td> </td><td class="right">   their work on that specification.  See Section 6 of [RFC2617] for</td><td class="lineno" valign="top"></td></tr>
528      <tr><td class="lineno" valign="top"></td><td class="left">   further acknowledgements.</td><td> </td><td class="right">   further acknowledgements.</td><td class="lineno" valign="top"></td></tr>
529      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
530      <tr><td class="lineno" valign="top"></td><td class="left">   See Section 9 of [Part1] for the Acknowledgments related to this</td><td> </td><td class="right">   See Section 9 of [Part1] for the Acknowledgments related to this</td><td class="lineno" valign="top"></td></tr>
531      <tr><td class="lineno" valign="top"></td><td class="left">   document revision.</td><td> </td><td class="right">   document revision.</td><td class="lineno" valign="top"></td></tr>
532      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
533      <tr><td class="lineno" valign="top"></td><td class="left">8.  References</td><td> </td><td class="right">8.  References</td><td class="lineno" valign="top"></td></tr>
534      <tr><td><a name="diff0034" /></td></tr>
535      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">                                                                         </span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
536      <tr><td class="lineno" valign="top"></td><td class="left">8.1.  Normative References</td><td> </td><td class="right">8.1.  Normative References</td><td class="lineno" valign="top"></td></tr>
537      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
538      <tr><td class="lineno" valign="top"></td><td class="left">   [Part1]    Fielding, R., Ed., Lafon, Y., Ed., and J. Reschke, Ed.,</td><td> </td><td class="right">   [Part1]    Fielding, R., Ed., Lafon, Y., Ed., and J. Reschke, Ed.,</td><td class="lineno" valign="top"></td></tr>
539      <tr><td><a name="diff0035" /></td></tr>
540      <tr><td class="lineno" valign="top"></td><td class="lblock">              "HTTP/1.1, part 1: <span class="delete">URIs, Connections, and</span> Message</td><td> </td><td class="rblock">              "HTTP/1.1, part 1: Message <span class="insert">Routing and Syntax"",</span></td><td class="lineno" valign="top"></td></tr>
541      <tr><td class="lineno" valign="top"></td><td class="lblock">              <span class="delete">Parsing", draft-ietf-httpbis-p1-messaging-19</span> (work in</td><td> </td><td class="rblock"><span class="insert">              draft-ietf-httpbis-p1-messaging-20 (work in progress),</span></td><td class="lineno" valign="top"></td></tr>
542      <tr><td class="lineno" valign="top"></td><td class="lblock">              progress), <span class="delete">March</span> 2012.</td><td> </td><td class="rblock"><span class="insert">              July 2012.</span></td><td class="lineno" valign="top"></td></tr>
543      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
544      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   [Part2]    Fielding, R., Ed., Lafon, Y., Ed., and J. Reschke, Ed.,</span></td><td class="lineno" valign="top"></td></tr>
545      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">              "HTTP/1.1, part 2: Semantics and Payloads",</span></td><td class="lineno" valign="top"></td></tr>
546      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">              draft-ietf-httpbis-p2-semantics-20</span> (work in progress),</td><td class="lineno" valign="top"></td></tr>
547      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">              <span class="insert">July</span> 2012.</td><td class="lineno" valign="top"></td></tr>
548      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
549      <tr><td class="lineno" valign="top"></td><td class="left">   [Part6]    Fielding, R., Ed., Lafon, Y., Ed., Nottingham, M., Ed.,</td><td> </td><td class="right">   [Part6]    Fielding, R., Ed., Lafon, Y., Ed., Nottingham, M., Ed.,</td><td class="lineno" valign="top"></td></tr>
550      <tr><td class="lineno" valign="top"></td><td class="left">              and J. Reschke, Ed., "HTTP/1.1, part 6: Caching",</td><td> </td><td class="right">              and J. Reschke, Ed., "HTTP/1.1, part 6: Caching",</td><td class="lineno" valign="top"></td></tr>
551      <tr><td><a name="diff0036" /></td></tr>
552      <tr><td class="lineno" valign="top"></td><td class="lblock">              <span class="delete">draft-ietf-httpbis-p6-cache-19</span> (work in progress),</td><td> </td><td class="rblock">              <span class="insert">draft-ietf-httpbis-p6-cache-20</span> (work in progress),</td><td class="lineno" valign="top"></td></tr>
553      <tr><td class="lineno" valign="top"></td><td class="lblock">              <span class="delete">March</span> 2012.</td><td> </td><td class="rblock">              <span class="insert">July</span> 2012.</td><td class="lineno" valign="top"></td></tr>
554      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
555      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate</td><td> </td><td class="right">   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate</td><td class="lineno" valign="top"></td></tr>
556      <tr><td class="lineno" valign="top"></td><td class="left">              Requirement Levels", BCP 14, RFC 2119, March 1997.</td><td> </td><td class="right">              Requirement Levels", BCP 14, RFC 2119, March 1997.</td><td class="lineno" valign="top"></td></tr>
557      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
558      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC5234]  Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax</td><td> </td><td class="right">   [RFC5234]  Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax</td><td class="lineno" valign="top"></td></tr>
559      <tr><td class="lineno" valign="top"></td><td class="left">              Specifications: ABNF", STD 68, RFC 5234, January 2008.</td><td> </td><td class="right">              Specifications: ABNF", STD 68, RFC 5234, January 2008.</td><td class="lineno" valign="top"></td></tr>
560      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
561      <tr><td class="lineno" valign="top"></td><td class="left">8.2.  Informative References</td><td> </td><td class="right">8.2.  Informative References</td><td class="lineno" valign="top"></td></tr>
562      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
563      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC2616]  Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,</td><td> </td><td class="right">   [RFC2616]  Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,</td><td class="lineno" valign="top"></td></tr>
564      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
565      <tr bgcolor="gray" ><td></td><th><a name="part-l10" /><small>skipping to change at</small><em> page 15, line 28</em></th><th> </th><th><a name="part-r10" /><small>skipping to change at</small><em> page 16, line 15</em></th><td></td></tr>
566      <tr><td class="lineno" valign="top"></td><td class="left">Appendix A.  Changes from RFCs 2616 and 2617</td><td> </td><td class="right">Appendix A.  Changes from RFCs 2616 and 2617</td><td class="lineno" valign="top"></td></tr>
567      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
568      <tr><td class="lineno" valign="top"></td><td class="left">   The "realm" parameter isn't required anymore in general;</td><td> </td><td class="right">   The "realm" parameter isn't required anymore in general;</td><td class="lineno" valign="top"></td></tr>
569      <tr><td class="lineno" valign="top"></td><td class="left">   consequently, the ABNF allows challenges without any auth parameters.</td><td> </td><td class="right">   consequently, the ABNF allows challenges without any auth parameters.</td><td class="lineno" valign="top"></td></tr>
570      <tr><td class="lineno" valign="top"></td><td class="left">   (Section 2)</td><td> </td><td class="right">   (Section 2)</td><td class="lineno" valign="top"></td></tr>
571      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
572      <tr><td class="lineno" valign="top"></td><td class="left">   The "b64token" alternative to auth-param lists has been added for</td><td> </td><td class="right">   The "b64token" alternative to auth-param lists has been added for</td><td class="lineno" valign="top"></td></tr>
573      <tr><td class="lineno" valign="top"></td><td class="left">   consistency with legacy authentication schemes such as "Basic".</td><td> </td><td class="right">   consistency with legacy authentication schemes such as "Basic".</td><td class="lineno" valign="top"></td></tr>
574      <tr><td class="lineno" valign="top"></td><td class="left">   (Section 2)</td><td> </td><td class="right">   (Section 2)</td><td class="lineno" valign="top"></td></tr>
575      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
576      <tr><td><a name="diff0037" /></td></tr>
577      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">Introduce Authentication Scheme Registry.  (Section 2.3)</span></td><td class="lineno" valign="top"></td></tr>
578      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
579      <tr><td class="lineno" valign="top"></td><td class="left">   Change ABNF productions for header fields to only define the field</td><td> </td><td class="right">   Change ABNF productions for header fields to only define the field</td><td class="lineno" valign="top"></td></tr>
580      <tr><td class="lineno" valign="top"></td><td class="left">   value.  (Section 4)</td><td> </td><td class="right">   value.  (Section 4)</td><td class="lineno" valign="top"></td></tr>
581      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
582      <tr><td><a name="diff0038" /></td></tr>
583      <tr><td class="lineno" valign="top"></td><td class="lblock">Appendix B.  Collected ABNF</td><td> </td><td class="rblock">Appendix B.  <span class="insert">Imported ABNF</span></td><td class="lineno" valign="top"></td></tr>
584      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
585      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   The following core rules are included by reference, as defined in</span></td><td class="lineno" valign="top"></td></tr>
586      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   Appendix B.1 of [RFC5234]: ALPHA (letters), CR (carriage return),</span></td><td class="lineno" valign="top"></td></tr>
587      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   CRLF (CR LF), CTL (controls), DIGIT (decimal 0-9), DQUOTE (double</span></td><td class="lineno" valign="top"></td></tr>
588      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   quote), HEXDIG (hexadecimal 0-9/A-F/a-f), LF (line feed), OCTET (any</span></td><td class="lineno" valign="top"></td></tr>
589      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   8-bit sequence of data), SP (space), and VCHAR (any visible US-ASCII</span></td><td class="lineno" valign="top"></td></tr>
590      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   character).</span></td><td class="lineno" valign="top"></td></tr>
591      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
592      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   The rules below are defined in [Part1]:</span></td><td class="lineno" valign="top"></td></tr>
593      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
594      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">     BWS           = &lt;BWS, defined in [Part1], Section 3.2.1&gt;</span></td><td class="lineno" valign="top"></td></tr>
595      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">     OWS           = &lt;OWS, defined in [Part1], Section 3.2.1&gt;</span></td><td class="lineno" valign="top"></td></tr>
596      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">     quoted-string = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt;</span></td><td class="lineno" valign="top"></td></tr>
597      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">     token         = &lt;token, defined in [Part1], Section 3.2.4&gt;</span></td><td class="lineno" valign="top"></td></tr>
598      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
599      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">Appendix C.</span>  Collected ABNF</td><td class="lineno" valign="top"></td></tr>
600      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
601      <tr><td class="lineno" valign="top"></td><td class="left">   Authorization = credentials</td><td> </td><td class="right">   Authorization = credentials</td><td class="lineno" valign="top"></td></tr>
602      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
603      <tr><td class="lineno" valign="top"></td><td class="left">   BWS = &lt;BWS, defined in [Part1], Section 3.2.1&gt;</td><td> </td><td class="right">   BWS = &lt;BWS, defined in [Part1], Section 3.2.1&gt;</td><td class="lineno" valign="top"></td></tr>
604      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
605      <tr><td class="lineno" valign="top"></td><td class="left">   OWS = &lt;OWS, defined in [Part1], Section 3.2.1&gt;</td><td> </td><td class="right">   OWS = &lt;OWS, defined in [Part1], Section 3.2.1&gt;</td><td class="lineno" valign="top"></td></tr>
606      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
607      <tr><td class="lineno" valign="top"></td><td class="left">   Proxy-Authenticate = *( "," OWS ) challenge *( OWS "," [ OWS</td><td> </td><td class="right">   Proxy-Authenticate = *( "," OWS ) challenge *( OWS "," [ OWS</td><td class="lineno" valign="top"></td></tr>
608      <tr><td class="lineno" valign="top"></td><td class="left">    challenge ] )</td><td> </td><td class="right">    challenge ] )</td><td class="lineno" valign="top"></td></tr>
609      <tr><td class="lineno" valign="top"></td><td class="left">   Proxy-Authorization = credentials</td><td> </td><td class="right">   Proxy-Authorization = credentials</td><td class="lineno" valign="top"></td></tr>
610      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
611      <tr bgcolor="gray" ><td></td><th><a name="part-l11" /><small>skipping to change at</small><em> page 16, line 35</em></th><th> </th><th><a name="part-r11" /><small>skipping to change at</small><em> page 17, line 35</em></th><td></td></tr>
612      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
613      <tr><td class="lineno" valign="top"></td><td class="left">   challenge = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) *(</td><td> </td><td class="right">   challenge = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param ) *(</td><td class="lineno" valign="top"></td></tr>
614      <tr><td class="lineno" valign="top"></td><td class="left">    OWS "," [ OWS auth-param ] ) ] ) ]</td><td> </td><td class="right">    OWS "," [ OWS auth-param ] ) ] ) ]</td><td class="lineno" valign="top"></td></tr>
615      <tr><td class="lineno" valign="top"></td><td class="left">   credentials = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param )</td><td> </td><td class="right">   credentials = auth-scheme [ 1*SP ( b64token / [ ( "," / auth-param )</td><td class="lineno" valign="top"></td></tr>
616      <tr><td class="lineno" valign="top"></td><td class="left">    *( OWS "," [ OWS auth-param ] ) ] ) ]</td><td> </td><td class="right">    *( OWS "," [ OWS auth-param ] ) ] ) ]</td><td class="lineno" valign="top"></td></tr>
617      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
618      <tr><td class="lineno" valign="top"></td><td class="left">   quoted-string = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt;</td><td> </td><td class="right">   quoted-string = &lt;quoted-string, defined in [Part1], Section 3.2.4&gt;</td><td class="lineno" valign="top"></td></tr>
619      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
620      <tr><td class="lineno" valign="top"></td><td class="left">   token = &lt;token, defined in [Part1], Section 3.2.4&gt;</td><td> </td><td class="right">   token = &lt;token, defined in [Part1], Section 3.2.4&gt;</td><td class="lineno" valign="top"></td></tr>
621      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
622      <tr><td><a name="diff0039" /></td></tr>
623      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">ABNF diagnostics:</span></td><td> </td><td class="rblock">Appendix <span class="insert">D.</span>  Change Log (to be removed by RFC Editor before publication)</td><td class="lineno" valign="top"></td></tr>
624      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
625      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   ; Authorization defined but not used</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
626      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   ; Proxy-Authenticate defined but not used</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
627      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   ; Proxy-Authorization defined but not used</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
628      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   ; WWW-Authenticate defined but not used</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
629      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
630      <tr><td class="lineno" valign="top"></td><td class="lblock">Appendix <span class="delete">C.</span>  Change Log (to be removed by RFC Editor before publication)</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
631      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
632      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.1.  Since RFC 2616</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
633      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
634      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Extracted relevant partitions from [RFC2616].</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
635      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
636      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.2.  Since draft-ietf-httpbis-p7-auth-00</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
637      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
638      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Closed issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
639      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
640      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/35&gt;: "Normative and</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
641      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      Informative references"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
642      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
643      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.3.  Since draft-ietf-httpbis-p7-auth-01</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
644      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
645      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Ongoing work on ABNF conversion</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
646      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   (&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/36&gt;):</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
647      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
648      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  Explicitly import BNF rules for "challenge" and "credentials" from</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
649      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      RFC2617.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
650      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
651      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  Add explicit references to BNF syntax and rules imported from</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
652      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      other parts of the specification.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
653      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
654      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.4.  Since draft-ietf-httpbis-p7-auth-02</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
655      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
656      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Ongoing work on IANA Message Header Field Registration</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
657      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   (&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/40&gt;):</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
658      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
659      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  Reference RFC 3984, and update header field registrations for</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
660      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      header fields defined in this document.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
661      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
662      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.5.  Since draft-ietf-httpbis-p7-auth-03</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
663      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
664      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   None.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
665      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
666      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.6.  Since draft-ietf-httpbis-p7-auth-04</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
667      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
668      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Ongoing work on ABNF conversion</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
669      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   (&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/36&gt;):</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
670      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
671      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  Use "/" instead of "|" for alternatives.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
672      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
673      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  Introduce new ABNF rules for "bad" whitespace ("BWS"), optional</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
674      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      whitespace ("OWS") and required whitespace ("RWS").</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
675      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
676      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  Rewrite ABNFs to spell out whitespace rules, factor out header</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
677      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      field value format definitions.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
678      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
679      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.7.  Since draft-ietf-httpbis-p7-auth-05</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
680      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
681      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Final work on ABNF conversion</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
682      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   (&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/36&gt;):</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
683      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
684      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  Add appendix containing collected and expanded ABNF, reorganize</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
685      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      ABNF introduction.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
686      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
687      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.8.  Since draft-ietf-httpbis-p7-auth-06</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
688      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
689      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   None.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
690      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
691      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.9.  Since draft-ietf-httpbis-p7-auth-07</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
692      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
693      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Closed issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
694      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
695      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/198&gt;: "move IANA</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
696      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      registrations for optional status codes"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
697      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
698      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.10.  Since draft-ietf-httpbis-p7-auth-08</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
699      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
700      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   No significant changes.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
701      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
702      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.11.  Since draft-ietf-httpbis-p7-auth-09</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
703      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
704      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Partly resolved issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
705      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
706      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/196&gt;: "Term for the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
707      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      requested resource's URI"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
708      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
709      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.12.  Since draft-ietf-httpbis-p7-auth-10</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
710      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
711      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   None.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
712      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
713      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.13.  Since draft-ietf-httpbis-p7-auth-11</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
714      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
715      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Closed issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
716      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
717      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/130&gt;: "introduction</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
718      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      to part 7 is work-in-progress"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
719      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
720      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/195&gt;: "auth-param</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
721      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      syntax"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
722      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
723      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/224&gt;: "Header</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
724      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      Classification"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
725      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
726      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/237&gt;: "absorbing the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
727      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      auth framework from 2617"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
728      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
729      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Partly resolved issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
730      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
731      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/141&gt;: "should we</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
732      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      have an auth scheme registry"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
733      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
734      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.14.  Since draft-ietf-httpbis-p7-auth-12</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
735      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
736      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   None.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
737      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
738      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.15.  Since draft-ietf-httpbis-p7-auth-13</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
739      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
740      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Closed issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
741      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
742      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/276&gt;: "untangle</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
743      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      ABNFs for header fields"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
744      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
745      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.16.  Since draft-ietf-httpbis-p7-auth-14</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
746      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
747      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   None.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
748      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
749      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.17.  Since draft-ietf-httpbis-p7-auth-15</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
750      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
751      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Closed issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
752      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
753      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/78&gt;: "Relationship</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
754      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      between 401, Authorization and WWW-Authenticate"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
755      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
756      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/177&gt;: "Realm</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
757      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      required on challenges"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
758      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
759      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/195&gt;: "auth-param</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
760      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      syntax"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
761      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
762      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/257&gt;:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
763      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      "Considerations for new authentications schemes"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
764      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
765      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/287&gt;: "LWS in auth-</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
766      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      param ABNF"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
767      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
768      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/309&gt;: "credentials</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
769      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      ABNF missing SP (still using implied LWS?)"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
770      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
771      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.18.  Since draft-ietf-httpbis-p7-auth-16</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
772      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
773      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Closed issues:</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
774      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
775      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/186&gt;: "Document</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
776      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      HTTP's error-handling philosophy"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
777      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
778      <tr><td><a name="diff0040" /></td></tr>
779      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/320&gt;: "add advice on</span></td><td> </td><td class="rblock">   <span class="insert">Changes up to the first Working Group Last Call draft are summarized</span></td><td class="lineno" valign="top"></td></tr>
780      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      defining auth scheme parameters"</span></td><td> </td><td class="rblock"><span class="insert">   in &lt;http://trac.tools.ietf.org/html/</span></td><td class="lineno" valign="top"></td></tr>
781      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   draft-ietf-httpbis-p7-auth-19#appendix-C&gt;.</span></td><td class="lineno" valign="top"></td></tr>
782      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
783      <tr><td><a name="diff0041" /></td></tr>
784      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.19.  Since draft-ietf-httpbis-p7-auth-17</span></td><td> </td><td class="rblock"><span class="insert">D.1.  Since draft-ietf-httpbis-p7-auth-19</span></td><td class="lineno" valign="top"></td></tr>
785      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
786      <tr><td class="lineno" valign="top"></td><td class="left">   Closed issues:</td><td> </td><td class="right">   Closed issues:</td><td class="lineno" valign="top"></td></tr>
787      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
788      <tr><td><a name="diff0042" /></td></tr>
789      <tr><td class="lineno" valign="top"></td><td class="lblock">   o  <span class="delete">&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/314&gt;: "allow</span></td><td> </td><td class="rblock">   o  <span class="insert">&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/348&gt;: "Realms and</span></td><td class="lineno" valign="top"></td></tr>
790      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      unquoted realm parameters"</span></td><td> </td><td class="rblock"><span class="insert">      scope"</span></td><td class="lineno" valign="top"></td></tr>
791      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
792      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/321&gt;: "Repeating</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
793      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      auth-params"</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
794      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
795      <tr><td><a name="diff0043" /></td></tr>
796      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">C.20.  Since draft-ietf-httpbis-p7-auth-18</span></td><td> </td><td class="rblock"><span class="insert">   o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/349&gt;: "Strength"</span></td><td class="lineno" valign="top"></td></tr>
797      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
798      <tr><td><a name="diff0044" /></td></tr>
799      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">Closed issues:</span></td><td> </td><td class="rblock">   <span class="insert">o  &lt;http://tools.ietf.org/wg/httpbis/trac/ticket/357&gt;:</span></td><td class="lineno" valign="top"></td></tr>
800      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      "Authentication exchanges"</span></td><td class="lineno" valign="top"></td></tr>
801      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
802      <tr><td><a name="diff0045" /></td></tr>
803      <tr><td class="lineno" valign="top"></td><td class="lblock">   o  <span class="delete">&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/334&gt;: "recipient</span></td><td> </td><td class="rblock">   o  <span class="insert">&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/361&gt;: "ABNF</span></td><td class="lineno" valign="top"></td></tr>
804      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      behavior</span> for <span class="delete">new auth parameters"</span></td><td> </td><td class="rblock"><span class="insert">      requirements</span> for <span class="insert">recipients"</span></td><td class="lineno" valign="top"></td></tr>
805      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
806      <tr><td><a name="diff0046" /></td></tr>
807      <tr><td class="lineno" valign="top"></td><td class="lblock">   o  <span class="delete">&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/342&gt;: "WWW-</span></td><td> </td><td class="rblock">   o  <span class="insert">&lt;http://tools.ietf.org/wg/httpbis/trac/ticket/368&gt;: "note</span></td><td class="lineno" valign="top"></td></tr>
808      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      Authenticate ABNF slightly ambiguous"</span></td><td> </td><td class="rblock"><span class="insert">      introduction of new IANA registries as normative changes"</span></td><td class="lineno" valign="top"></td></tr>
809      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
810      <tr><td class="lineno" valign="top"></td><td class="left">Index</td><td> </td><td class="right">Index</td><td class="lineno" valign="top"></td></tr>
811      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
812      <tr><td class="lineno" valign="top"></td><td class="left">   4</td><td> </td><td class="right">   4</td><td class="lineno" valign="top"></td></tr>
813      <tr><td class="lineno" valign="top"></td><td class="left">      401 Unauthorized (status code)  9</td><td> </td><td class="right">      401 Unauthorized (status code)  9</td><td class="lineno" valign="top"></td></tr>
814      <tr><td><a name="diff0047" /></td></tr>
815      <tr><td class="lineno" valign="top"></td><td class="lblock">      407 Proxy Authentication Required (status code)  <span class="delete">9</span></td><td> </td><td class="rblock">      407 Proxy Authentication Required (status code)  <span class="insert">10</span></td><td class="lineno" valign="top"></td></tr>
816      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
817      <tr><td class="lineno" valign="top"></td><td class="left">   A</td><td> </td><td class="right">   A</td><td class="lineno" valign="top"></td></tr>
818      <tr><td class="lineno" valign="top"></td><td class="left">      auth-param  5</td><td> </td><td class="right">      auth-param  5</td><td class="lineno" valign="top"></td></tr>
819      <tr><td class="lineno" valign="top"></td><td class="left">      auth-scheme  5</td><td> </td><td class="right">      auth-scheme  5</td><td class="lineno" valign="top"></td></tr>
820      <tr><td class="lineno" valign="top"></td><td class="left">      Authorization header field  10</td><td> </td><td class="right">      Authorization header field  10</td><td class="lineno" valign="top"></td></tr>
821      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
822      <tr><td class="lineno" valign="top"></td><td class="left">   B</td><td> </td><td class="right">   B</td><td class="lineno" valign="top"></td></tr>
823      <tr><td class="lineno" valign="top"></td><td class="left">      b64token  5</td><td> </td><td class="right">      b64token  5</td><td class="lineno" valign="top"></td></tr>
824      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
825      <tr><td class="lineno" valign="top"></td><td class="left">   C</td><td> </td><td class="right">   C</td><td class="lineno" valign="top"></td></tr>
826      <tr><td><a name="diff0048" /></td></tr>
827      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      Canonical Root URI  7</span></td><td class="lineno" valign="top"></td></tr>
828      <tr><td class="lineno" valign="top"></td><td class="left">      challenge  6</td><td> </td><td class="right">      challenge  6</td><td class="lineno" valign="top"></td></tr>
829      <tr><td class="lineno" valign="top"></td><td class="left">      credentials  6</td><td> </td><td class="right">      credentials  6</td><td class="lineno" valign="top"></td></tr>
830      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
831      <tr><td class="lineno" valign="top"></td><td class="left">   G</td><td> </td><td class="right">   G</td><td class="lineno" valign="top"></td></tr>
832      <tr><td class="lineno" valign="top"></td><td class="left">      Grammar</td><td> </td><td class="right">      Grammar</td><td class="lineno" valign="top"></td></tr>
833      <tr><td class="lineno" valign="top"></td><td class="left">         auth-param  5</td><td> </td><td class="right">         auth-param  5</td><td class="lineno" valign="top"></td></tr>
834      <tr><td class="lineno" valign="top"></td><td class="left">         auth-scheme  5</td><td> </td><td class="right">         auth-scheme  5</td><td class="lineno" valign="top"></td></tr>
835      <tr><td class="lineno" valign="top"></td><td class="left">         Authorization  10</td><td> </td><td class="right">         Authorization  10</td><td class="lineno" valign="top"></td></tr>
836      <tr><td class="lineno" valign="top"></td><td class="left">         b64token  5</td><td> </td><td class="right">         b64token  5</td><td class="lineno" valign="top"></td></tr>
837      <tr><td class="lineno" valign="top"></td><td class="left">         challenge  6</td><td> </td><td class="right">         challenge  6</td><td class="lineno" valign="top"></td></tr>
838      <tr><td class="lineno" valign="top"></td><td class="left">         credentials  6</td><td> </td><td class="right">         credentials  6</td><td class="lineno" valign="top"></td></tr>
839      <tr><td class="lineno" valign="top"></td><td class="left">         Proxy-Authenticate  11</td><td> </td><td class="right">         Proxy-Authenticate  11</td><td class="lineno" valign="top"></td></tr>
840      <tr><td class="lineno" valign="top"></td><td class="left">         Proxy-Authorization  11</td><td> </td><td class="right">         Proxy-Authorization  11</td><td class="lineno" valign="top"></td></tr>
841      <tr><td class="lineno" valign="top"></td><td class="left">         WWW-Authenticate  12</td><td> </td><td class="right">         WWW-Authenticate  12</td><td class="lineno" valign="top"></td></tr>
842      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
843      <tr><td class="lineno" valign="top"></td><td class="left">   H</td><td> </td><td class="right">   H</td><td class="lineno" valign="top"></td></tr>
844      <tr><td class="lineno" valign="top"></td><td class="left">      Header Fields</td><td> </td><td class="right">      Header Fields</td><td class="lineno" valign="top"></td></tr>
845      <tr><td class="lineno" valign="top"></td><td class="left">         Authorization  10</td><td> </td><td class="right">         Authorization  10</td><td class="lineno" valign="top"></td></tr>
846      <tr><td class="lineno" valign="top"></td><td class="left">         Proxy-Authenticate  11</td><td> </td><td class="right">         Proxy-Authenticate  11</td><td class="lineno" valign="top"></td></tr>
847      <tr><td class="lineno" valign="top"></td><td class="left">         Proxy-Authorization  11</td><td> </td><td class="right">         Proxy-Authorization  11</td><td class="lineno" valign="top"></td></tr>
848      <tr><td><a name="diff0049" /></td></tr>
849      <tr><td class="lineno" valign="top"></td><td class="lblock">         WWW-Authenticate  1<span class="delete">1</span></td><td> </td><td class="rblock">         WWW-Authenticate  1<span class="insert">2</span></td><td class="lineno" valign="top"></td></tr>
850      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
851      <tr><td class="lineno" valign="top"></td><td class="left">   P</td><td> </td><td class="right">   P</td><td class="lineno" valign="top"></td></tr>
852      <tr><td class="lineno" valign="top"></td><td class="left">      Protection Space  7</td><td> </td><td class="right">      Protection Space  7</td><td class="lineno" valign="top"></td></tr>
853      <tr><td class="lineno" valign="top"></td><td class="left">      Proxy-Authenticate header field  11</td><td> </td><td class="right">      Proxy-Authenticate header field  11</td><td class="lineno" valign="top"></td></tr>
854      <tr><td class="lineno" valign="top"></td><td class="left">      Proxy-Authorization header field  11</td><td> </td><td class="right">      Proxy-Authorization header field  11</td><td class="lineno" valign="top"></td></tr>
855      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
856      <tr><td class="lineno" valign="top"></td><td class="left">   R</td><td> </td><td class="right">   R</td><td class="lineno" valign="top"></td></tr>
857      <tr><td class="lineno" valign="top"></td><td class="left">      Realm  7</td><td> </td><td class="right">      Realm  7</td><td class="lineno" valign="top"></td></tr>
858      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
859      <tr><td class="lineno" valign="top"></td><td class="left">   S</td><td> </td><td class="right">   S</td><td class="lineno" valign="top"></td></tr>
860      <tr><td class="lineno" valign="top"></td><td class="left">      Status Codes</td><td> </td><td class="right">      Status Codes</td><td class="lineno" valign="top"></td></tr>
861      <tr><td class="lineno" valign="top"></td><td class="left">         401 Unauthorized  9</td><td> </td><td class="right">         401 Unauthorized  9</td><td class="lineno" valign="top"></td></tr>
862      <tr><td><a name="diff0050" /></td></tr>
863      <tr><td class="lineno" valign="top"></td><td class="lblock">         407 Proxy Authentication Required  <span class="delete">9</span></td><td> </td><td class="rblock">         407 Proxy Authentication Required  <span class="insert">10</span></td><td class="lineno" valign="top"></td></tr>
864      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
865      <tr><td class="lineno" valign="top"></td><td class="left">   W</td><td> </td><td class="right">   W</td><td class="lineno" valign="top"></td></tr>
866      <tr><td><a name="diff0051" /></td></tr>
867      <tr><td class="lineno" valign="top"></td><td class="lblock">      WWW-Authenticate header field  1<span class="delete">1</span></td><td> </td><td class="rblock">      WWW-Authenticate header field  1<span class="insert">2</span></td><td class="lineno" valign="top"></td></tr>
868      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
869      <tr><td class="lineno" valign="top"></td><td class="left">Authors' Addresses</td><td> </td><td class="right">Authors' Addresses</td><td class="lineno" valign="top"></td></tr>
870      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
871      <tr><td class="lineno" valign="top"></td><td class="left">   Roy T. Fielding (editor)</td><td> </td><td class="right">   Roy T. Fielding (editor)</td><td class="lineno" valign="top"></td></tr>
872      <tr><td class="lineno" valign="top"></td><td class="left">   Adobe Systems Incorporated</td><td> </td><td class="right">   Adobe Systems Incorporated</td><td class="lineno" valign="top"></td></tr>
873      <tr><td class="lineno" valign="top"></td><td class="left">   345 Park Ave</td><td> </td><td class="right">   345 Park Ave</td><td class="lineno" valign="top"></td></tr>
874      <tr><td class="lineno" valign="top"></td><td class="left">   San Jose, CA  95110</td><td> </td><td class="right">   San Jose, CA  95110</td><td class="lineno" valign="top"></td></tr>
875      <tr><td class="lineno" valign="top"></td><td class="left">   USA</td><td> </td><td class="right">   USA</td><td class="lineno" valign="top"></td></tr>
876      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
877      <tr><td class="lineno" valign="top"></td><td class="left">   EMail: fielding@gbiv.com</td><td> </td><td class="right">   EMail: fielding@gbiv.com</td><td class="lineno" valign="top"></td></tr>
878      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
879      <tr bgcolor="gray" ><td></td><th><a name="part-l12" /><small>skipping to change at</small><em> page 22, line 4</em></th><th> </th><th><a name="part-r12" /><small>skipping to change at</small><em> page 19, line 36</em></th><td></td></tr>
880      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
881      <tr><td class="lineno" valign="top"></td><td class="left">   Yves Lafon (editor)</td><td> </td><td class="right">   Yves Lafon (editor)</td><td class="lineno" valign="top"></td></tr>
882      <tr><td class="lineno" valign="top"></td><td class="left">   World Wide Web Consortium</td><td> </td><td class="right">   World Wide Web Consortium</td><td class="lineno" valign="top"></td></tr>
883      <tr><td class="lineno" valign="top"></td><td class="left">   W3C / ERCIM</td><td> </td><td class="right">   W3C / ERCIM</td><td class="lineno" valign="top"></td></tr>
884      <tr><td class="lineno" valign="top"></td><td class="left">   2004, rte des Lucioles</td><td> </td><td class="right">   2004, rte des Lucioles</td><td class="lineno" valign="top"></td></tr>
885      <tr><td class="lineno" valign="top"></td><td class="left">   Sophia-Antipolis, AM  06902</td><td> </td><td class="right">   Sophia-Antipolis, AM  06902</td><td class="lineno" valign="top"></td></tr>
886      <tr><td class="lineno" valign="top"></td><td class="left">   France</td><td> </td><td class="right">   France</td><td class="lineno" valign="top"></td></tr>
887      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
888      <tr><td class="lineno" valign="top"></td><td class="left">   EMail: ylafon@w3.org</td><td> </td><td class="right">   EMail: ylafon@w3.org</td><td class="lineno" valign="top"></td></tr>
889      <tr><td class="lineno" valign="top"></td><td class="left">   URI:   http://www.raubacapeu.net/people/yves/</td><td> </td><td class="right">   URI:   http://www.raubacapeu.net/people/yves/</td><td class="lineno" valign="top"></td></tr>
890      <tr><td><a name="diff0052" /></td></tr>
891      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">                                                                         </span></td><td class="lineno" valign="top"></td></tr>
892      <tr><td class="lineno" valign="top"></td><td class="left">   Julian F. Reschke (editor)</td><td> </td><td class="right">   Julian F. Reschke (editor)</td><td class="lineno" valign="top"></td></tr>
893      <tr><td class="lineno" valign="top"></td><td class="left">   greenbytes GmbH</td><td> </td><td class="right">   greenbytes GmbH</td><td class="lineno" valign="top"></td></tr>
894      <tr><td class="lineno" valign="top"></td><td class="left">   Hafenweg 16</td><td> </td><td class="right">   Hafenweg 16</td><td class="lineno" valign="top"></td></tr>
895      <tr><td class="lineno" valign="top"></td><td class="left">   Muenster, NW  48155</td><td> </td><td class="right">   Muenster, NW  48155</td><td class="lineno" valign="top"></td></tr>
896      <tr><td class="lineno" valign="top"></td><td class="left">   Germany</td><td> </td><td class="right">   Germany</td><td class="lineno" valign="top"></td></tr>
897      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
898      <tr><td><a name="diff0053" /></td></tr>
899      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">Phone: +49 251 2807760</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
900      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Fax:   +49 251 2807761</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
901      <tr><td class="lineno" valign="top"></td><td class="left">   EMail: julian.reschke@greenbytes.de</td><td> </td><td class="right">   EMail: julian.reschke@greenbytes.de</td><td class="lineno" valign="top"></td></tr>
902      <tr><td class="lineno" valign="top"></td><td class="left">   URI:   http://greenbytes.de/tech/webdav/</td><td> </td><td class="right">   URI:   http://greenbytes.de/tech/webdav/</td><td class="lineno" valign="top"></td></tr>
903
904     <tr><td></td><td class="left"></td><td> </td><td class="right"></td><td></td></tr>
905     <tr bgcolor="gray"><th colspan="5" align="center"><a name="end">&nbsp;End of changes. 53 change blocks.&nbsp;</a></th></tr>
906     <tr class="stats"><td></td><th><i>300 lines changed or deleted</i></th><th><i> </i></th><th><i>166 lines changed or added</i></th><td></td></tr>
907     <tr><td colspan="5" align="center" class="small"><br/>This html diff was produced by rfcdiff 1.38. The latest version is available from <a href="http://www.tools.ietf.org/tools/rfcdiff/" >http://tools.ietf.org/tools/rfcdiff/</a> </td></tr>
908   </table>
909   </body>
910   </html>
Note: See TracBrowser for help on using the repository browser.