Changeset 1108 for draft-ietf-httpbis/latest
- Timestamp:
- 09/02/11 01:13:40 (11 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
draft-ietf-httpbis/latest/p1-messaging.xml
r1107 r1108 691 691 <iref primary="true" item="transforming proxy"/> 692 692 <iref primary="true" item="non-transforming proxy"/> 693 An HTTP-to-HTTP proxy is called a "transforming proxy" if it designed693 An HTTP-to-HTTP proxy is called a "transforming proxy" if it is designed 694 694 or configured to modify request or response messages in a semantically 695 695 meaningful way (i.e., modifications, beyond those required by normal … … 732 732 through a shared firewall proxy. 733 733 </t> 734 <t><iref primary="true" item="intercept "/><iref primary="true" item="transparent proxy"/>734 <t><iref primary="true" item="interception proxy"/><iref primary="true" item="transparent proxy"/> 735 735 In addition, there may exist network intermediaries that are not 736 736 considered part of the HTTP communication but nevertheless act as 737 737 filters or redirecting agents (usually violating HTTP semantics, 738 738 causing security problems, and otherwise making a mess of things). 739 These network intermediaries are often referred to as "intercepts" 740 or "transparent proxies", and are commonly found on public network 741 access points as a means of enforcing account subscription prior to 742 allowing use of non-local Internet services. 739 Such a network intermediary, referred to as an "interception proxy" 740 <xref target="RFC3040"/> or "transparent proxy" <xref target="RFC1919"/>, 741 differs from an HTTP proxy because it has not been selected by the client. 742 Instead, the network intermediary redirects outgoing TCP port 80 packets 743 (and occasionally other common port traffic) to an internal HTTP server. 744 Interception proxies are commonly found on public network access points 745 as a means of enforcing account subscription prior to allowing use of 746 non-local Internet services. They are indistinguishable from a 747 man-in-the-middle attack. 743 748 </t> 744 749 </section> … … 4341 4346 </reference> 4342 4347 4348 <reference anchor='RFC1919'> 4349 <front> 4350 <title>Classical versus Transparent IP Proxies</title> 4351 <author initials='M.' surname='Chatel' fullname='Marc Chatel'> 4352 <organization /> 4353 <address><email>mchatel@pax.eunet.ch</email></address> 4354 </author> 4355 <date year='1996' month='March' /> 4356 </front> 4357 <seriesInfo name='RFC' value='1919' /> 4358 </reference> 4359 4343 4360 <reference anchor="RFC1945"> 4344 4361 <front> … … 4535 4552 </front> 4536 4553 <seriesInfo name='RFC' value='2965' /> 4554 </reference> 4555 4556 <reference anchor='RFC3040'> 4557 <front> 4558 <title>Internet Web Replication and Caching Taxonomy</title> 4559 <author initials='I.' surname='Cooper' fullname='I. Cooper'> 4560 <organization>Equinix, Inc.</organization> 4561 </author> 4562 <author initials='I.' surname='Melve' fullname='I. Melve'> 4563 <organization>UNINETT</organization> 4564 </author> 4565 <author initials='G.' surname='Tomlinson' fullname='G. Tomlinson'> 4566 <organization>CacheFlow Inc.</organization> 4567 </author> 4568 <date year='2001' month='January' /> 4569 </front> 4570 <seriesInfo name='RFC' value='3040' /> 4537 4571 </reference> 4538 4572
Note: See TracChangeset
for help on using the changeset viewer.