Ignore:
Timestamp:
14/06/14 11:20:37 (7 years ago)
Author:
julian.reschke@…
Message:

update to latest version of rfc2629.xslt, regen all HTML

File:
1 edited

Legend:

Unmodified
Added
Removed
  • draft-ietf-httpbis/23/p1-messaging.html

    r2304 r2726  
    22  PUBLIC "-//W3C//DTD HTML 4.01//EN">
    33<html lang="en">
    4    <head profile="http://www.w3.org/2006/03/hcard http://dublincore.org/documents/2008/08/04/dc-html/">
     4   <head profile="http://dublincore.org/documents/2008/08/04/dc-html/">
    55      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
    66      <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title><script>
    77var buttonsAdded = false;
    88
    9 function init() {
     9function initFeedback() {
    1010  var fb = document.createElement("div");
    1111  fb.className = "feedback noprint";
     
    106106body {
    107107  color: black;
    108   font-family: verdana, helvetica, arial, sans-serif;
    109   font-size: 10pt;
     108  font-family: cambria, helvetica, arial, sans-serif;
     109  font-size: 11pt;
    110110  margin-right: 2em;
    111111}
     
    132132}
    133133h1 {
    134   font-size: 14pt;
     134  font-size: 130%;
    135135  line-height: 21pt;
    136136  page-break-after: avoid;
     
    139139  page-break-before: always;
    140140}
    141 h1 a {
    142   color: #333333;
    143 }
    144141h2 {
    145   font-size: 12pt;
     142  font-size: 120%;
    146143  line-height: 15pt;
    147144  page-break-after: avoid;
    148145}
    149 h3, h4, h5, h6 {
    150   font-size: 10pt;
     146h3 {
     147  font-size: 110%;
    151148  page-break-after: avoid;
    152149}
    153 h2 a, h3 a, h4 a, h5 a, h6 a {
     150h4, h5, h6 {
     151  page-break-after: avoid;
     152}
     153h1 a, h2 a, h3 a, h4 a, h5 a, h6 a {
    154154  color: black;
    155155}
     
    208208table.tt {
    209209  vertical-align: top;
     210  border-color: gray;
     211}
     212table.tt th {
     213  border-color: gray;
     214}
     215table.tt td {
     216  border-color: gray;
     217}
     218table.all {
     219  border-style: solid;
     220  border-width: 2px;
    210221}
    211222table.full {
    212   border-style: outset;
    213   border-width: 1px;
    214 }
    215 table.headers {
    216   border-style: outset;
    217   border-width: 1px;
     223  border-style: solid;
     224  border-width: 2px;
    218225}
    219226table.tt td {
    220227  vertical-align: top;
    221228}
     229table.all td {
     230  border-style: solid;
     231  border-width: 1px;
     232}
    222233table.full td {
    223   border-style: inset;
     234  border-style: none solid;
    224235  border-width: 1px;
    225236}
     
    227238  vertical-align: top;
    228239}
     240table.all th {
     241  border-style: solid;
     242  border-width: 1px;
     243}
    229244table.full th {
    230   border-style: inset;
    231   border-width: 1px;
     245  border-style: solid;
     246  border-width: 1px 1px 2px 1px;
    232247}
    233248table.headers th {
    234   border-style: none none inset none;
    235   border-width: 1px;
     249  border-style: none none solid none;
     250  border-width: 2px;
    236251}
    237252table.left {
     
    248263  caption-side: bottom;
    249264  font-weight: bold;
    250   font-size: 9pt;
     265  font-size: 10pt;
    251266  margin-top: .5em;
    252267}
     
    255270  border-spacing: 1px;
    256271  width: 95%;
    257   font-size: 10pt;
     272  font-size: 11pt;
    258273  color: white;
    259274}
     
    288303  line-height: 150%;
    289304  font-weight: bold;
    290   font-size: 10pt;
    291305  margin-left: 0em;
    292306}
     
    294308  line-height: normal;
    295309  font-weight: normal;
    296   font-size: 9pt;
     310  font-size: 10pt;
    297311  margin-left: 0em;
    298312}
     
    302316ul p {
    303317  margin-left: 0em;
     318}
     319.title, .filename, h1, h2, h3, h4 {
     320  font-family: candara, helvetica, arial, sans-serif;
     321}
     322samp, tt, code, pre {
     323  font: consolas, monospace;
    304324}
    305325ul.ind, ul.ind ul {
     
    341361  font-weight: bold;
    342362  text-align: center;
    343   font-size: 9pt;
     363  font-size: 10pt;
    344364}
    345365.filename {
    346366  color: #333333;
     367  font-size: 75%;
    347368  font-weight: bold;
    348   font-size: 12pt;
    349369  line-height: 21pt;
    350370  text-align: center;
     
    353373  font-weight: bold;
    354374}
    355 .hidden {
    356   display: none;
    357 }
    358375.left {
    359376  text-align: left;
     
    363380}
    364381.title {
    365   color: #990000;
    366   font-size: 18pt;
     382  color: green;
     383  font-size: 150%;
    367384  line-height: 18pt;
    368385  font-weight: bold;
     
    370387  margin-top: 36pt;
    371388}
    372 .vcardline {
    373   display: block;
    374 }
    375389.warning {
    376   font-size: 14pt;
     390  font-size: 130%;
    377391  background-color: yellow;
    378392}
     
    417431    background-color: white;
    418432    vertical-align: top;
    419     font-size: 12pt;
     433    font-size: 110%;
    420434  }
    421435
     
    486500      <link rel="Appendix" title="D Change Log (to be removed by RFC Editor before publication)" href="#rfc.section.D">
    487501      <link href="p2-semantics.html" rel="next">
    488       <meta name="generator" content="http://greenbytes.de/tech/webdav/rfc2629.xslt, Revision 1.598, 2013/06/23 14:11:10, XSLT vendor: SAXON 8.9 from Saxonica http://www.saxonica.com/">
     502      <meta name="generator" content="http://greenbytes.de/tech/webdav/rfc2629.xslt, Revision 1.640, 2014/06/13 12:42:58, XSLT vendor: SAXON 8.9 from Saxonica http://www.saxonica.com/">
    489503      <link rel="schema.dct" href="http://purl.org/dc/terms/">
    490504      <meta name="dct.creator" content="Fielding, R.">
     
    497511      <meta name="description" content="The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypertext information systems. HTTP has been in use by the World Wide Web global information initiative since 1990. This document provides an overview of HTTP architecture and its associated terminology, defines the &#34;http&#34; and &#34;https&#34; Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes general security concerns for implementations.">
    498512   </head>
    499    <body onload="init();">
     513   <body onload="initFeedback();">
    500514      <table class="header">
    501515         <tbody>
     
    509523            </tr>
    510524            <tr>
    511                <td class="left">Obsoletes: <a href="http://tools.ietf.org/html/rfc2145">2145</a>, <a href="http://tools.ietf.org/html/rfc2616">2616</a> (if approved)
     525               <td class="left">Obsoletes: <a href="https://tools.ietf.org/html/rfc2145">2145</a>, <a href="https://tools.ietf.org/html/rfc2616">2616</a> (if approved)
    512526               </td>
    513527               <td class="right">J. Reschke, Editor</td>
    514528            </tr>
    515529            <tr>
    516                <td class="left">Updates: <a href="http://tools.ietf.org/html/rfc2817">2817</a>, <a href="http://tools.ietf.org/html/rfc2818">2818</a> (if approved)
     530               <td class="left">Updates: <a href="https://tools.ietf.org/html/rfc2817">2817</a>, <a href="https://tools.ietf.org/html/rfc2818">2818</a> (if approved)
    517531               </td>
    518532               <td class="right">greenbytes</td>
     
    542556      <p>The changes in this draft are summarized in <a href="#changes.since.22" title="Since draft-ietf-httpbis-p1-messaging-22">Appendix&nbsp;D.3</a>.
    543557      </p>
    544       <h1><a id="rfc.status" href="#rfc.status">Status of This Memo</a></h1>
    545       <p>This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.</p>
    546       <p>Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute
    547          working documents as Internet-Drafts. The list of current Internet-Drafts is at <a href="http://datatracker.ietf.org/drafts/current/">http://datatracker.ietf.org/drafts/current/</a>.
    548       </p>
    549       <p>Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other
    550          documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work
    551          in progress”.
    552       </p>
    553       <p>This Internet-Draft will expire on January 16, 2014.</p>
    554       <h1><a id="rfc.copyrightnotice" href="#rfc.copyrightnotice">Copyright Notice</a></h1>
    555       <p>Copyright © 2013 IETF Trust and the persons identified as the document authors. All rights reserved.</p>
    556       <p>This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights
    557          and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License
    558          text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified
    559          BSD License.
    560       </p>
    561       <p>This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November
    562          10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to
    563          allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s)
    564          controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative
    565          works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate
    566          it into languages other than English.
    567       </p>
     558      <div id="rfc.status">
     559         <h1><a href="#rfc.status">Status of This Memo</a></h1>
     560         <p>This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.</p>
     561         <p>Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute
     562            working documents as Internet-Drafts. The list of current Internet-Drafts is at <a href="http://datatracker.ietf.org/drafts/current/">http://datatracker.ietf.org/drafts/current/</a>.
     563         </p>
     564         <p>Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other
     565            documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work
     566            in progress”.
     567         </p>
     568         <p>This Internet-Draft will expire on January 16, 2014.</p>
     569      </div>
     570      <div id="rfc.copyrightnotice">
     571         <h1><a href="#rfc.copyrightnotice">Copyright Notice</a></h1>
     572         <p>Copyright © 2013 IETF Trust and the persons identified as the document authors. All rights reserved.</p>
     573         <p>This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights
     574            and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License
     575            text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified
     576            BSD License.
     577         </p>
     578         <p>This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November
     579            10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to
     580            allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s)
     581            controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative
     582            works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate
     583            it into languages other than English.
     584         </p>
     585      </div>
    568586      <hr class="noprint">
    569587      <h1 class="np" id="rfc.toc"><a href="#rfc.toc">Table of Contents</a></h1>
     
    691709            </ul>
    692710         </li>
    693          <li><a href="#rfc.authors">Authors' Addresses</a></li>
    694711         <li><a href="#rfc.section.A">A.</a>&nbsp;&nbsp;&nbsp;<a href="#compatibility">HTTP Version History</a><ul>
    695712               <li><a href="#rfc.section.A.1">A.1</a>&nbsp;&nbsp;&nbsp;<a href="#changes.from.1.0">Changes from HTTP/1.0</a><ul>
     
    711728         </li>
    712729         <li><a href="#rfc.index">Index</a></li>
     730         <li><a href="#rfc.authors">Authors' Addresses</a></li>
    713731      </ul>
    714       <h1 id="rfc.section.1" class="np"><a href="#rfc.section.1">1.</a>&nbsp;<a id="introduction" href="#introduction">Introduction</a></h1>
    715       <p id="rfc.section.1.p.1">The Hypertext Transfer Protocol (HTTP) is an application-level request/response protocol that uses extensible semantics and
    716          self-descriptive message payloads for flexible interaction with network-based hypertext information systems. This document
    717          is the first in a series of documents that collectively form the HTTP/1.1 specification:
    718       </p>
    719       <ul class="empty">
    720          <li>RFC xxx1: Message Syntax and Routing</li>
    721          <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content" id="rfc.xref.Part2.1">RFC xxx2</cite>: Semantics and Content
    722          </li>
    723          <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests" id="rfc.xref.Part4.1">RFC xxx3</cite>: Conditional Requests
    724          </li>
    725          <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Range Requests" id="rfc.xref.Part5.1">RFC xxx4</cite>: Range Requests
    726          </li>
    727          <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching" id="rfc.xref.Part6.1">RFC xxx5</cite>: Caching
    728          </li>
    729          <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Authentication" id="rfc.xref.Part7.1">RFC xxx6</cite>: Authentication
    730          </li>
    731       </ul>
    732       <p id="rfc.section.1.p.2">This HTTP/1.1 specification obsoletes and moves to historic status <cite title="Hypertext Transfer Protocol -- HTTP/1.1" id="rfc.xref.RFC2616.1">RFC 2616</cite>, its predecessor <cite title="Hypertext Transfer Protocol -- HTTP/1.1" id="rfc.xref.RFC2068.1">RFC 2068</cite>, and <cite title="Use and Interpretation of HTTP Version Numbers" id="rfc.xref.RFC2145.1">RFC 2145</cite> (on HTTP versioning). This specification also updates the use of CONNECT to establish a tunnel, previously defined in <cite title="Upgrading to TLS Within HTTP/1.1" id="rfc.xref.RFC2817.1">RFC 2817</cite>, and defines the "https" URI scheme that was described informally in <cite title="HTTP Over TLS" id="rfc.xref.RFC2818.1">RFC 2818</cite>.
    733       </p>
    734       <p id="rfc.section.1.p.3">HTTP is a generic interface protocol for information systems. It is designed to hide the details of how a service is implemented
    735          by presenting a uniform interface to clients that is independent of the types of resources provided. Likewise, servers do
    736          not need to be aware of each client's purpose: an HTTP request can be considered in isolation rather than being associated
    737          with a specific type of client or a predetermined sequence of application steps. The result is a protocol that can be used
    738          effectively in many different contexts and for which implementations can evolve independently over time.
    739       </p>
    740       <p id="rfc.section.1.p.4">HTTP is also designed for use as an intermediation protocol for translating communication to and from non-HTTP information
    741          systems. HTTP proxies and gateways can provide access to alternative information services by translating their diverse protocols
    742          into a hypertext format that can be viewed and manipulated by clients in the same way as HTTP services.
    743       </p>
    744       <p id="rfc.section.1.p.5">One consequence of this flexibility is that the protocol cannot be defined in terms of what occurs behind the interface. Instead,
    745          we are limited to defining the syntax of communication, the intent of received communication, and the expected behavior of
    746          recipients. If the communication is considered in isolation, then successful actions ought to be reflected in corresponding
    747          changes to the observable interface provided by servers. However, since multiple clients might act in parallel and perhaps
    748          at cross-purposes, we cannot require that such changes be observable beyond the scope of a single response.
    749       </p>
    750       <p id="rfc.section.1.p.6">This document describes the architectural elements that are used or referred to in HTTP, defines the "http" and "https" URI
    751          schemes, describes overall network operation and connection management, and defines HTTP message framing and forwarding requirements.
    752          Our goal is to define all of the mechanisms necessary for HTTP message handling that are independent of message semantics,
    753          thereby defining the complete set of requirements for message parsers and message-forwarding intermediaries.
    754       </p>
    755       <h2 id="rfc.section.1.1"><a href="#rfc.section.1.1">1.1</a>&nbsp;<a id="intro.requirements" href="#intro.requirements">Requirement Notation</a></h2>
    756       <p id="rfc.section.1.1.p.1">The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
    757          in this document are to be interpreted as described in <a href="#RFC2119" id="rfc.xref.RFC2119.1"><cite title="Key words for use in RFCs to Indicate Requirement Levels">[RFC2119]</cite></a>.
    758       </p>
    759       <p id="rfc.section.1.1.p.2">Conformance criteria and considerations regarding error handling are defined in <a href="#conformance" title="Conformance and Error Handling">Section&nbsp;2.5</a>.
    760       </p>
    761       <div id="rfc.iref.g.1"></div>
    762       <div id="rfc.iref.g.2"></div>
    763       <div id="rfc.iref.g.3"></div>
    764       <div id="rfc.iref.g.4"></div>
    765       <div id="rfc.iref.g.5"></div>
    766       <div id="rfc.iref.g.6"></div>
    767       <div id="rfc.iref.g.7"></div>
    768       <div id="rfc.iref.g.8"></div>
    769       <div id="rfc.iref.g.9"></div>
    770       <div id="rfc.iref.g.10"></div>
    771       <div id="rfc.iref.g.11"></div>
    772       <div id="rfc.iref.g.12"></div>
    773       <h2 id="rfc.section.1.2"><a href="#rfc.section.1.2">1.2</a>&nbsp;<a id="notation" href="#notation">Syntax Notation</a></h2>
    774       <p id="rfc.section.1.2.p.1">This specification uses the Augmented Backus-Naur Form (ABNF) notation of <a href="#RFC5234" id="rfc.xref.RFC5234.1"><cite title="Augmented BNF for Syntax Specifications: ABNF">[RFC5234]</cite></a> with the list rule extension defined in <a href="#abnf.extension" title="ABNF list extension: #rule">Appendix&nbsp;B</a>. <a href="#collected.abnf" title="Collected ABNF">Appendix&nbsp;C</a> shows the collected ABNF with the list rule expanded.
    775       </p>
    776       <div id="core.rules">
    777          <p id="rfc.section.1.2.p.2">            The following core rules are included by reference, as defined in <a href="#RFC5234" id="rfc.xref.RFC5234.2"><cite title="Augmented BNF for Syntax Specifications: ABNF">[RFC5234]</cite></a>, <a href="http://tools.ietf.org/html/rfc5234#appendix-B.1">Appendix B.1</a>: ALPHA (letters), CR (carriage return), CRLF (CR LF), CTL (controls), DIGIT (decimal 0-9), DQUOTE (double quote), HEXDIG
    778             (hexadecimal 0-9/A-F/a-f), HTAB (horizontal tab), LF (line feed), OCTET (any 8-bit sequence of data), SP (space), and VCHAR
    779             (any visible <a href="#USASCII" id="rfc.xref.USASCII.1"><cite title="Coded Character Set -- 7-bit American Standard Code for Information Interchange">[USASCII]</cite></a> character).
     732      <div id="introduction">
     733         <h1 id="rfc.section.1" class="np"><a href="#rfc.section.1">1.</a>&nbsp;<a href="#introduction">Introduction</a></h1>
     734         <p id="rfc.section.1.p.1">The Hypertext Transfer Protocol (HTTP) is an application-level request/response protocol that uses extensible semantics and
     735            self-descriptive message payloads for flexible interaction with network-based hypertext information systems. This document
     736            is the first in a series of documents that collectively form the HTTP/1.1 specification:
    780737         </p>
     738         <ul class="empty">
     739            <li>RFC xxx1: Message Syntax and Routing</li>
     740            <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content" id="rfc.xref.Part2.1">RFC xxx2</cite>: Semantics and Content
     741            </li>
     742            <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests" id="rfc.xref.Part4.1">RFC xxx3</cite>: Conditional Requests
     743            </li>
     744            <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Range Requests" id="rfc.xref.Part5.1">RFC xxx4</cite>: Range Requests
     745            </li>
     746            <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching" id="rfc.xref.Part6.1">RFC xxx5</cite>: Caching
     747            </li>
     748            <li><cite title="Hypertext Transfer Protocol (HTTP/1.1): Authentication" id="rfc.xref.Part7.1">RFC xxx6</cite>: Authentication
     749            </li>
     750         </ul>
     751         <p id="rfc.section.1.p.2">This HTTP/1.1 specification obsoletes and moves to historic status <cite title="Hypertext Transfer Protocol -- HTTP/1.1" id="rfc.xref.RFC2616.1">RFC 2616</cite>, its predecessor <cite title="Hypertext Transfer Protocol -- HTTP/1.1" id="rfc.xref.RFC2068.1">RFC 2068</cite>, and <cite title="Use and Interpretation of HTTP Version Numbers" id="rfc.xref.RFC2145.1">RFC 2145</cite> (on HTTP versioning). This specification also updates the use of CONNECT to establish a tunnel, previously defined in <cite title="Upgrading to TLS Within HTTP/1.1" id="rfc.xref.RFC2817.1">RFC 2817</cite>, and defines the "https" URI scheme that was described informally in <cite title="HTTP Over TLS" id="rfc.xref.RFC2818.1">RFC 2818</cite>.
     752         </p>
     753         <p id="rfc.section.1.p.3">HTTP is a generic interface protocol for information systems. It is designed to hide the details of how a service is implemented
     754            by presenting a uniform interface to clients that is independent of the types of resources provided. Likewise, servers do
     755            not need to be aware of each client's purpose: an HTTP request can be considered in isolation rather than being associated
     756            with a specific type of client or a predetermined sequence of application steps. The result is a protocol that can be used
     757            effectively in many different contexts and for which implementations can evolve independently over time.
     758         </p>
     759         <p id="rfc.section.1.p.4">HTTP is also designed for use as an intermediation protocol for translating communication to and from non-HTTP information
     760            systems. HTTP proxies and gateways can provide access to alternative information services by translating their diverse protocols
     761            into a hypertext format that can be viewed and manipulated by clients in the same way as HTTP services.
     762         </p>
     763         <p id="rfc.section.1.p.5">One consequence of this flexibility is that the protocol cannot be defined in terms of what occurs behind the interface. Instead,
     764            we are limited to defining the syntax of communication, the intent of received communication, and the expected behavior of
     765            recipients. If the communication is considered in isolation, then successful actions ought to be reflected in corresponding
     766            changes to the observable interface provided by servers. However, since multiple clients might act in parallel and perhaps
     767            at cross-purposes, we cannot require that such changes be observable beyond the scope of a single response.
     768         </p>
     769         <p id="rfc.section.1.p.6">This document describes the architectural elements that are used or referred to in HTTP, defines the "http" and "https" URI
     770            schemes, describes overall network operation and connection management, and defines HTTP message framing and forwarding requirements.
     771            Our goal is to define all of the mechanisms necessary for HTTP message handling that are independent of message semantics,
     772            thereby defining the complete set of requirements for message parsers and message-forwarding intermediaries.
     773         </p>
     774         <div id="intro.requirements">
     775            <h2 id="rfc.section.1.1"><a href="#rfc.section.1.1">1.1</a>&nbsp;<a href="#intro.requirements">Requirement Notation</a></h2>
     776            <p id="rfc.section.1.1.p.1">The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
     777               in this document are to be interpreted as described in <a href="#RFC2119" id="rfc.xref.RFC2119.1"><cite title="Key words for use in RFCs to Indicate Requirement Levels">[RFC2119]</cite></a>.
     778            </p>
     779            <p id="rfc.section.1.1.p.2">Conformance criteria and considerations regarding error handling are defined in <a href="#conformance" title="Conformance and Error Handling">Section&nbsp;2.5</a>.
     780            </p>
     781         </div>
     782         <div id="notation">
     783            <div id="rfc.iref.g.1"></div>
     784            <div id="rfc.iref.g.2"></div>
     785            <div id="rfc.iref.g.3"></div>
     786            <div id="rfc.iref.g.4"></div>
     787            <div id="rfc.iref.g.5"></div>
     788            <div id="rfc.iref.g.6"></div>
     789            <div id="rfc.iref.g.7"></div>
     790            <div id="rfc.iref.g.8"></div>
     791            <div id="rfc.iref.g.9"></div>
     792            <div id="rfc.iref.g.10"></div>
     793            <div id="rfc.iref.g.11"></div>
     794            <div id="rfc.iref.g.12"></div>
     795            <h2 id="rfc.section.1.2"><a href="#rfc.section.1.2">1.2</a>&nbsp;<a href="#notation">Syntax Notation</a></h2>
     796            <p id="rfc.section.1.2.p.1">This specification uses the Augmented Backus-Naur Form (ABNF) notation of <a href="#RFC5234" id="rfc.xref.RFC5234.1"><cite title="Augmented BNF for Syntax Specifications: ABNF">[RFC5234]</cite></a> with the list rule extension defined in <a href="#abnf.extension" title="ABNF list extension: #rule">Appendix&nbsp;B</a>. <a href="#collected.abnf" title="Collected ABNF">Appendix&nbsp;C</a> shows the collected ABNF with the list rule expanded.
     797            </p>
     798            <div id="core.rules">
     799               <p id="rfc.section.1.2.p.2">            The following core rules are included by reference, as defined in <a href="#RFC5234" id="rfc.xref.RFC5234.2"><cite title="Augmented BNF for Syntax Specifications: ABNF">[RFC5234]</cite></a>, <a href="https://tools.ietf.org/html/rfc5234#appendix-B.1">Appendix B.1</a>: ALPHA (letters), CR (carriage return), CRLF (CR LF), CTL (controls), DIGIT (decimal 0-9), DQUOTE (double quote), HEXDIG
     800                  (hexadecimal 0-9/A-F/a-f), HTAB (horizontal tab), LF (line feed), OCTET (any 8-bit sequence of data), SP (space), and VCHAR
     801                  (any visible <a href="#USASCII" id="rfc.xref.USASCII.1"><cite title="Coded Character Set -- 7-bit American Standard Code for Information Interchange">[USASCII]</cite></a> character).
     802               </p>
     803            </div>
     804            <p id="rfc.section.1.2.p.3">As a convention, ABNF rule names prefixed with "obs-" denote "obsolete" grammar rules that appear for historical reasons.</p>
     805         </div>
    781806      </div>
    782       <p id="rfc.section.1.2.p.3">As a convention, ABNF rule names prefixed with "obs-" denote "obsolete" grammar rules that appear for historical reasons.</p>
    783       <h1 id="rfc.section.2"><a href="#rfc.section.2">2.</a>&nbsp;<a id="architecture" href="#architecture">Architecture</a></h1>
    784       <p id="rfc.section.2.p.1">HTTP was created for the World Wide Web architecture and has evolved over time to support the scalability needs of a worldwide
    785          hypertext system. Much of that architecture is reflected in the terminology and syntax productions used to define HTTP.
    786       </p>
    787       <div id="rfc.iref.c.1"></div>
    788       <div id="rfc.iref.s.1"></div>
    789       <div id="rfc.iref.c.2"></div>
    790       <h2 id="rfc.section.2.1"><a href="#rfc.section.2.1">2.1</a>&nbsp;<a id="operation" href="#operation">Client/Server Messaging</a></h2>
    791       <p id="rfc.section.2.1.p.1">HTTP is a stateless request/response protocol that operates by exchanging <dfn>messages</dfn> (<a href="#http.message" title="Message Format">Section&nbsp;3</a>) across a reliable transport or session-layer "<dfn>connection</dfn>" (<a href="#connection.management" title="Connection Management">Section&nbsp;6</a>). An HTTP "<dfn>client</dfn>" is a program that establishes a connection to a server for the purpose of sending one or more HTTP requests. An HTTP "<dfn>server</dfn>" is a program that accepts connections in order to service HTTP requests by sending HTTP responses.
    792       </p>
    793       <div id="rfc.iref.u.1"></div>
    794       <div id="rfc.iref.o.1"></div>
    795       <div id="rfc.iref.b.1"></div>
    796       <div id="rfc.iref.s.2"></div>
    797       <div id="rfc.iref.s.3"></div>
    798       <div id="rfc.iref.r.1"></div>
    799       <p id="rfc.section.2.1.p.2">The terms client and server refer only to the roles that these programs perform for a particular connection. The same program
    800          might act as a client on some connections and a server on others. We use the term "<dfn>user agent</dfn>" to refer to any of the various client programs that initiate a request, including (but not limited to) browsers, spiders
    801          (web-based robots), command-line tools, native applications, and mobile apps. The term "<dfn>origin server</dfn>" is used to refer to the program that can originate authoritative responses to a request. For general requirements, we use
    802          the terms "<dfn>sender</dfn>" and "<dfn>recipient</dfn>" to refer to any component that sends or receives, respectively, a given message.
    803       </p>
    804       <p id="rfc.section.2.1.p.3">HTTP relies upon the Uniform Resource Identifier (URI) standard <a href="#RFC3986" id="rfc.xref.RFC3986.1"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a> to indicate the target resource (<a href="#target-resource" title="Identifying a Target Resource">Section&nbsp;5.1</a>) and relationships between resources. Messages are passed in a format similar to that used by Internet mail <a href="#RFC5322" id="rfc.xref.RFC5322.1"><cite title="Internet Message Format">[RFC5322]</cite></a> and the Multipurpose Internet Mail Extensions (MIME) <a href="#RFC2045" id="rfc.xref.RFC2045.1"><cite title="Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies">[RFC2045]</cite></a> (see <a href="p2-semantics.html#differences.between.http.and.mime" title="Differences between HTTP and MIME">Appendix A</a> of <a href="#Part2" id="rfc.xref.Part2.2"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> for the differences between HTTP and MIME messages).
    805       </p>
    806       <p id="rfc.section.2.1.p.4">Most HTTP communication consists of a retrieval request (GET) for a representation of some resource identified by a URI. In
    807          the simplest case, this might be accomplished via a single bidirectional connection (===) between the user agent (UA) and
    808          the origin server (O).
    809       </p>
    810       <div id="rfc.figure.u.1"></div><pre class="drawing">         request   &gt;
     807      <div id="architecture">
     808         <h1 id="rfc.section.2"><a href="#rfc.section.2">2.</a>&nbsp;<a href="#architecture">Architecture</a></h1>
     809         <p id="rfc.section.2.p.1">HTTP was created for the World Wide Web architecture and has evolved over time to support the scalability needs of a worldwide
     810            hypertext system. Much of that architecture is reflected in the terminology and syntax productions used to define HTTP.
     811         </p>
     812         <div id="operation">
     813            <div id="rfc.iref.c.1"></div>
     814            <div id="rfc.iref.s.1"></div>
     815            <div id="rfc.iref.c.2"></div>
     816            <h2 id="rfc.section.2.1"><a href="#rfc.section.2.1">2.1</a>&nbsp;<a href="#operation">Client/Server Messaging</a></h2>
     817            <p id="rfc.section.2.1.p.1">HTTP is a stateless request/response protocol that operates by exchanging <dfn>messages</dfn> (<a href="#http.message" title="Message Format">Section&nbsp;3</a>) across a reliable transport or session-layer "<dfn>connection</dfn>" (<a href="#connection.management" title="Connection Management">Section&nbsp;6</a>). An HTTP "<dfn>client</dfn>" is a program that establishes a connection to a server for the purpose of sending one or more HTTP requests. An HTTP "<dfn>server</dfn>" is a program that accepts connections in order to service HTTP requests by sending HTTP responses.
     818            </p>
     819            <div id="rfc.iref.u.1"></div>
     820            <div id="rfc.iref.o.1"></div>
     821            <div id="rfc.iref.b.1"></div>
     822            <div id="rfc.iref.s.2"></div>
     823            <div id="rfc.iref.s.3"></div>
     824            <div id="rfc.iref.r.1"></div>
     825            <p id="rfc.section.2.1.p.2">The terms client and server refer only to the roles that these programs perform for a particular connection. The same program
     826               might act as a client on some connections and a server on others. We use the term "<dfn>user agent</dfn>" to refer to any of the various client programs that initiate a request, including (but not limited to) browsers, spiders
     827               (web-based robots), command-line tools, native applications, and mobile apps. The term "<dfn>origin server</dfn>" is used to refer to the program that can originate authoritative responses to a request. For general requirements, we use
     828               the terms "<dfn>sender</dfn>" and "<dfn>recipient</dfn>" to refer to any component that sends or receives, respectively, a given message.
     829            </p>
     830            <p id="rfc.section.2.1.p.3">HTTP relies upon the Uniform Resource Identifier (URI) standard <a href="#RFC3986" id="rfc.xref.RFC3986.1"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a> to indicate the target resource (<a href="#target-resource" title="Identifying a Target Resource">Section&nbsp;5.1</a>) and relationships between resources. Messages are passed in a format similar to that used by Internet mail <a href="#RFC5322" id="rfc.xref.RFC5322.1"><cite title="Internet Message Format">[RFC5322]</cite></a> and the Multipurpose Internet Mail Extensions (MIME) <a href="#RFC2045" id="rfc.xref.RFC2045.1"><cite title="Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies">[RFC2045]</cite></a> (see <a href="p2-semantics.html#differences.between.http.and.mime" title="Differences between HTTP and MIME">Appendix A</a> of <a href="#Part2" id="rfc.xref.Part2.2"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> for the differences between HTTP and MIME messages).
     831            </p>
     832            <p id="rfc.section.2.1.p.4">Most HTTP communication consists of a retrieval request (GET) for a representation of some resource identified by a URI. In
     833               the simplest case, this might be accomplished via a single bidirectional connection (===) between the user agent (UA) and
     834               the origin server (O).
     835            </p>
     836            <div id="rfc.figure.u.1"></div><pre class="drawing">         request   &gt;
    811837    <b>UA</b> ======================================= <b>O</b>
    812838                                &lt;   response
    813839</pre><div id="rfc.iref.m.1"></div>
    814       <div id="rfc.iref.r.2"></div>
    815       <div id="rfc.iref.r.3"></div>
    816       <p id="rfc.section.2.1.p.6">A client sends an HTTP request to a server in the form of a <dfn>request</dfn> message, beginning with a request-line that includes a method, URI, and protocol version (<a href="#request.line" title="Request Line">Section&nbsp;3.1.1</a>), followed by header fields containing request modifiers, client information, and representation metadata (<a href="#header.fields" title="Header Fields">Section&nbsp;3.2</a>), an empty line to indicate the end of the header section, and finally a message body containing the payload body (if any, <a href="#message.body" title="Message Body">Section&nbsp;3.3</a>).
    817       </p>
    818       <p id="rfc.section.2.1.p.7">A server responds to a client's request by sending one or more HTTP <dfn>response</dfn> messages, each beginning with a status line that includes the protocol version, a success or error code, and textual reason
    819          phrase (<a href="#status.line" title="Status Line">Section&nbsp;3.1.2</a>), possibly followed by header fields containing server information, resource metadata, and representation metadata (<a href="#header.fields" title="Header Fields">Section&nbsp;3.2</a>), an empty line to indicate the end of the header section, and finally a message body containing the payload body (if any, <a href="#message.body" title="Message Body">Section&nbsp;3.3</a>).
    820       </p>
    821       <p id="rfc.section.2.1.p.8">A connection might be used for multiple request/response exchanges, as defined in <a href="#persistent.connections" title="Persistence">Section&nbsp;6.3</a>.
    822       </p>
    823       <p id="rfc.section.2.1.p.9">The following example illustrates a typical message exchange for a GET request on the URI "http://www.example.com/hello.txt":</p>
    824       <div id="rfc.figure.u.2"></div>
    825       <p>client request:</p><pre class="text2">GET /hello.txt HTTP/1.1
     840            <div id="rfc.iref.r.2"></div>
     841            <div id="rfc.iref.r.3"></div>
     842            <p id="rfc.section.2.1.p.6">A client sends an HTTP request to a server in the form of a <dfn>request</dfn> message, beginning with a request-line that includes a method, URI, and protocol version (<a href="#request.line" title="Request Line">Section&nbsp;3.1.1</a>), followed by header fields containing request modifiers, client information, and representation metadata (<a href="#header.fields" title="Header Fields">Section&nbsp;3.2</a>), an empty line to indicate the end of the header section, and finally a message body containing the payload body (if any, <a href="#message.body" title="Message Body">Section&nbsp;3.3</a>).
     843            </p>
     844            <p id="rfc.section.2.1.p.7">A server responds to a client's request by sending one or more HTTP <dfn>response</dfn> messages, each beginning with a status line that includes the protocol version, a success or error code, and textual reason
     845               phrase (<a href="#status.line" title="Status Line">Section&nbsp;3.1.2</a>), possibly followed by header fields containing server information, resource metadata, and representation metadata (<a href="#header.fields" title="Header Fields">Section&nbsp;3.2</a>), an empty line to indicate the end of the header section, and finally a message body containing the payload body (if any, <a href="#message.body" title="Message Body">Section&nbsp;3.3</a>).
     846            </p>
     847            <p id="rfc.section.2.1.p.8">A connection might be used for multiple request/response exchanges, as defined in <a href="#persistent.connections" title="Persistence">Section&nbsp;6.3</a>.
     848            </p>
     849            <p id="rfc.section.2.1.p.9">The following example illustrates a typical message exchange for a GET request on the URI "http://www.example.com/hello.txt":</p>
     850            <div id="rfc.figure.u.2"></div>
     851            <p>client request:</p><pre class="text2">GET /hello.txt HTTP/1.1
    826852User-Agent: curl/7.16.3 libcurl/7.16.3 OpenSSL/0.9.7l zlib/1.2.3
    827853Host: www.example.com
     
    829855
    830856</pre><div id="rfc.figure.u.3"></div>
    831       <p>server response:</p><pre class="text">HTTP/1.1 200 OK
     857            <p>server response:</p><pre class="text">HTTP/1.1 200 OK
    832858Date: Mon, 27 Jul 2009 12:28:53 GMT
    833859Server: Apache
     
    840866
    841867<span id="exbody">Hello World! My payload includes a trailing CRLF.
    842 </span></pre><h2 id="rfc.section.2.2"><a href="#rfc.section.2.2">2.2</a>&nbsp;<a id="implementation-diversity" href="#implementation-diversity">Implementation Diversity</a></h2>
    843       <p id="rfc.section.2.2.p.1">When considering the design of HTTP, it is easy to fall into a trap of thinking that all user agents are general-purpose browsers
    844          and all origin servers are large public websites. That is not the case in practice. Common HTTP user agents include household
    845          appliances, stereos, scales, firmware update scripts, command-line programs, mobile apps, and communication devices in a multitude
    846          of shapes and sizes. Likewise, common HTTP origin servers include home automation units, configurable networking components,
    847          office machines, autonomous robots, news feeds, traffic cameras, ad selectors, and video delivery platforms.
    848       </p>
    849       <p id="rfc.section.2.2.p.2">The term "user agent" does not imply that there is a human user directly interacting with the software agent at the time of
    850          a request. In many cases, a user agent is installed or configured to run in the background and save its results for later
    851          inspection (or save only a subset of those results that might be interesting or erroneous). Spiders, for example, are typically
    852          given a start URI and configured to follow certain behavior while crawling the Web as a hypertext graph.
    853       </p>
    854       <p id="rfc.section.2.2.p.3">The implementation diversity of HTTP means that we cannot assume the user agent can make interactive suggestions to a user
    855          or provide adequate warning for security or privacy options. In the few cases where this specification requires reporting
    856          of errors to the user, it is acceptable for such reporting to only be observable in an error console or log file. Likewise,
    857          requirements that an automated action be confirmed by the user before proceeding might be met via advance configuration choices,
    858          run-time options, or simple avoidance of the unsafe action; confirmation does not imply any specific user interface or interruption
    859          of normal processing if the user has already made that choice.
    860       </p>
    861       <div id="rfc.iref.i.1"></div>
    862       <h2 id="rfc.section.2.3"><a href="#rfc.section.2.3">2.3</a>&nbsp;<a id="intermediaries" href="#intermediaries">Intermediaries</a></h2>
    863       <p id="rfc.section.2.3.p.1">HTTP enables the use of intermediaries to satisfy requests through a chain of connections. There are three common forms of
    864          HTTP <dfn>intermediary</dfn>: proxy, gateway, and tunnel. In some cases, a single intermediary might act as an origin server, proxy, gateway, or tunnel,
    865          switching behavior based on the nature of each request.
    866       </p>
    867       <div id="rfc.figure.u.4"></div><pre class="drawing">         &gt;             &gt;             &gt;             &gt;
     868</span></pre></div>
     869         <div id="implementation-diversity">
     870            <h2 id="rfc.section.2.2"><a href="#rfc.section.2.2">2.2</a>&nbsp;<a href="#implementation-diversity">Implementation Diversity</a></h2>
     871            <p id="rfc.section.2.2.p.1">When considering the design of HTTP, it is easy to fall into a trap of thinking that all user agents are general-purpose browsers
     872               and all origin servers are large public websites. That is not the case in practice. Common HTTP user agents include household
     873               appliances, stereos, scales, firmware update scripts, command-line programs, mobile apps, and communication devices in a multitude
     874               of shapes and sizes. Likewise, common HTTP origin servers include home automation units, configurable networking components,
     875               office machines, autonomous robots, news feeds, traffic cameras, ad selectors, and video delivery platforms.
     876            </p>
     877            <p id="rfc.section.2.2.p.2">The term "user agent" does not imply that there is a human user directly interacting with the software agent at the time of
     878               a request. In many cases, a user agent is installed or configured to run in the background and save its results for later
     879               inspection (or save only a subset of those results that might be interesting or erroneous). Spiders, for example, are typically
     880               given a start URI and configured to follow certain behavior while crawling the Web as a hypertext graph.
     881            </p>
     882            <p id="rfc.section.2.2.p.3">The implementation diversity of HTTP means that we cannot assume the user agent can make interactive suggestions to a user
     883               or provide adequate warning for security or privacy options. In the few cases where this specification requires reporting
     884               of errors to the user, it is acceptable for such reporting to only be observable in an error console or log file. Likewise,
     885               requirements that an automated action be confirmed by the user before proceeding might be met via advance configuration choices,
     886               run-time options, or simple avoidance of the unsafe action; confirmation does not imply any specific user interface or interruption
     887               of normal processing if the user has already made that choice.
     888            </p>
     889         </div>
     890         <div id="intermediaries">
     891            <div id="rfc.iref.i.1"></div>
     892            <h2 id="rfc.section.2.3"><a href="#rfc.section.2.3">2.3</a>&nbsp;<a href="#intermediaries">Intermediaries</a></h2>
     893            <p id="rfc.section.2.3.p.1">HTTP enables the use of intermediaries to satisfy requests through a chain of connections. There are three common forms of
     894               HTTP <dfn>intermediary</dfn>: proxy, gateway, and tunnel. In some cases, a single intermediary might act as an origin server, proxy, gateway, or tunnel,
     895               switching behavior based on the nature of each request.
     896            </p>
     897            <div id="rfc.figure.u.4"></div><pre class="drawing">         &gt;             &gt;             &gt;             &gt;
    868898    <b>UA</b> =========== <b>A</b> =========== <b>B</b> =========== <b>C</b> =========== <b>O</b>
    869899               &lt;             &lt;             &lt;             &lt;
    870900</pre><p id="rfc.section.2.3.p.3">The figure above shows three intermediaries (A, B, and C) between the user agent and origin server. A request or response
    871          message that travels the whole chain will pass through four separate connections. Some HTTP communication options might apply
    872          only to the connection with the nearest, non-tunnel neighbor, only to the end-points of the chain, or to all connections along
    873          the chain. Although the diagram is linear, each participant might be engaged in multiple, simultaneous communications. For
    874          example, B might be receiving requests from many clients other than A, and/or forwarding requests to servers other than C,
    875          at the same time that it is handling A's request. Likewise, later requests might be sent through a different path of connections,
    876          often based on dynamic configuration for load balancing.
    877       </p>
    878       <p id="rfc.section.2.3.p.4"><span id="rfc.iref.u.2"></span><span id="rfc.iref.d.1"></span> <span id="rfc.iref.i.2"></span><span id="rfc.iref.o.2"></span> We use the terms "<dfn>upstream</dfn>" and "<dfn>downstream</dfn>" to describe various requirements in relation to the directional flow of a message: all messages flow from upstream to downstream.
    879          Likewise, we use the terms inbound and outbound to refer to directions in relation to the request path: "<dfn>inbound</dfn>" means toward the origin server and "<dfn>outbound</dfn>" means toward the user agent.
    880       </p>
    881       <p id="rfc.section.2.3.p.5"><span id="rfc.iref.p.1"></span> A "<dfn>proxy</dfn>" is a message forwarding agent that is selected by the client, usually via local configuration rules, to receive requests
    882          for some type(s) of absolute URI and attempt to satisfy those requests via translation through the HTTP interface. Some translations
    883          are minimal, such as for proxy requests for "http" URIs, whereas other requests might require translation to and from entirely
    884          different application-level protocols. Proxies are often used to group an organization's HTTP requests through a common intermediary
    885          for the sake of security, annotation services, or shared caching.
    886       </p>
    887       <p id="rfc.section.2.3.p.6"><span id="rfc.iref.t.1"></span> <span id="rfc.iref.n.1"></span> An HTTP-to-HTTP proxy is called a "<dfn>transforming proxy</dfn>" if it is designed or configured to modify request or response messages in a semantically meaningful way (i.e., modifications,
    888          beyond those required by normal HTTP processing, that change the message in a way that would be significant to the original
    889          sender or potentially significant to downstream recipients). For example, a transforming proxy might be acting as a shared
    890          annotation server (modifying responses to include references to a local annotation database), a malware filter, a format transcoder,
    891          or an intranet-to-Internet privacy filter. Such transformations are presumed to be desired by the client (or client organization)
    892          that selected the proxy and are beyond the scope of this specification. However, when a proxy is not intended to transform
    893          a given message, we use the term "<dfn>non-transforming proxy</dfn>" to target requirements that preserve HTTP message semantics. See <a href="p2-semantics.html#status.203" title="203 Non-Authoritative Information">Section 6.3.4</a> of <a href="#Part2" id="rfc.xref.Part2.3"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> and <a href="p6-cache.html#header.warning" title="Warning">Section 7.5</a> of <a href="#Part6" id="rfc.xref.Part6.2"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a> for status and warning codes related to transformations.
    894       </p>
    895       <p id="rfc.section.2.3.p.7"><span id="rfc.iref.g.13"></span><span id="rfc.iref.r.4"></span> <span id="rfc.iref.a.1"></span> A "<dfn>gateway</dfn>" (a.k.a., "<dfn>reverse proxy</dfn>") is an intermediary that acts as an origin server for the outbound connection, but translates received requests and forwards
    896          them inbound to another server or servers. Gateways are often used to encapsulate legacy or untrusted information services,
    897          to improve server performance through "<dfn>accelerator</dfn>" caching, and to enable partitioning or load balancing of HTTP services across multiple machines.
    898       </p>
    899       <p id="rfc.section.2.3.p.8">All HTTP requirements applicable to an origin server also apply to the outbound communication of a gateway. A gateway communicates
    900          with inbound servers using any protocol that it desires, including private extensions to HTTP that are outside the scope of
    901          this specification. However, an HTTP-to-HTTP gateway that wishes to interoperate with third-party HTTP servers ought to conform
    902          to user agent requirements on the gateway's inbound connection.
    903       </p>
    904       <p id="rfc.section.2.3.p.9"><span id="rfc.iref.t.2"></span> A "<dfn>tunnel</dfn>" acts as a blind relay between two connections without changing the messages. Once active, a tunnel is not considered a party
    905          to the HTTP communication, though the tunnel might have been initiated by an HTTP request. A tunnel ceases to exist when both
    906          ends of the relayed connection are closed. Tunnels are used to extend a virtual connection through an intermediary, such as
    907          when Transport Layer Security (TLS, <a href="#RFC5246" id="rfc.xref.RFC5246.1"><cite title="The Transport Layer Security (TLS) Protocol Version 1.2">[RFC5246]</cite></a>) is used to establish confidential communication through a shared firewall proxy.
    908       </p>
    909       <p id="rfc.section.2.3.p.10"><span id="rfc.iref.i.3"></span> <span id="rfc.iref.t.3"></span> <span id="rfc.iref.c.3"></span> The above categories for intermediary only consider those acting as participants in the HTTP communication. There are also
    910          intermediaries that can act on lower layers of the network protocol stack, filtering or redirecting HTTP traffic without the
    911          knowledge or permission of message senders. Network intermediaries often introduce security flaws or interoperability problems
    912          by violating HTTP semantics. For example, an "<dfn>interception proxy</dfn>" <a href="#RFC3040" id="rfc.xref.RFC3040.1"><cite title="Internet Web Replication and Caching Taxonomy">[RFC3040]</cite></a> (also commonly known as a "<dfn>transparent proxy</dfn>" <a href="#RFC1919" id="rfc.xref.RFC1919.1"><cite title="Classical versus Transparent IP Proxies">[RFC1919]</cite></a> or "<dfn>captive portal</dfn>") differs from an HTTP proxy because it is not selected by the client. Instead, an interception proxy filters or redirects
    913          outgoing TCP port 80 packets (and occasionally other common port traffic). Interception proxies are commonly found on public
    914          network access points, as a means of enforcing account subscription prior to allowing use of non-local Internet services,
    915          and within corporate firewalls to enforce network usage policies. They are indistinguishable from a man-in-the-middle attack.
    916       </p>
    917       <p id="rfc.section.2.3.p.11">HTTP is defined as a stateless protocol, meaning that each request message can be understood in isolation. Many implementations
    918          depend on HTTP's stateless design in order to reuse proxied connections or dynamically load-balance requests across multiple
    919          servers. Hence, servers <em class="bcp14">MUST NOT</em> assume that two requests on the same connection are from the same user agent unless the connection is secured and specific
    920          to that agent. Some non-standard HTTP extensions (e.g., <a href="#RFC4559" id="rfc.xref.RFC4559.1"><cite title="SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows">[RFC4559]</cite></a>) have been known to violate this requirement, resulting in security and interoperability problems.
    921       </p>
    922       <div id="rfc.iref.c.4"></div>
    923       <h2 id="rfc.section.2.4"><a href="#rfc.section.2.4">2.4</a>&nbsp;<a id="caches" href="#caches">Caches</a></h2>
    924       <p id="rfc.section.2.4.p.1">A "<dfn>cache</dfn>" is a local store of previous response messages and the subsystem that controls its message storage, retrieval, and deletion.
    925          A cache stores cacheable responses in order to reduce the response time and network bandwidth consumption on future, equivalent
    926          requests. Any client or server <em class="bcp14">MAY</em> employ a cache, though a cache cannot be used by a server while it is acting as a tunnel.
    927       </p>
    928       <p id="rfc.section.2.4.p.2">The effect of a cache is that the request/response chain is shortened if one of the participants along the chain has a cached
    929          response applicable to that request. The following illustrates the resulting chain if B has a cached copy of an earlier response
    930          from O (via C) for a request that has not been cached by UA or A.
    931       </p>
    932       <div id="rfc.figure.u.5"></div><pre class="drawing">            &gt;             &gt;
     901               message that travels the whole chain will pass through four separate connections. Some HTTP communication options might apply
     902               only to the connection with the nearest, non-tunnel neighbor, only to the end-points of the chain, or to all connections along
     903               the chain. Although the diagram is linear, each participant might be engaged in multiple, simultaneous communications. For
     904               example, B might be receiving requests from many clients other than A, and/or forwarding requests to servers other than C,
     905               at the same time that it is handling A's request. Likewise, later requests might be sent through a different path of connections,
     906               often based on dynamic configuration for load balancing.
     907            </p>
     908            <p id="rfc.section.2.3.p.4"><span id="rfc.iref.u.2"></span><span id="rfc.iref.d.1"></span> <span id="rfc.iref.i.2"></span><span id="rfc.iref.o.2"></span> We use the terms "<dfn>upstream</dfn>" and "<dfn>downstream</dfn>" to describe various requirements in relation to the directional flow of a message: all messages flow from upstream to downstream.
     909               Likewise, we use the terms inbound and outbound to refer to directions in relation to the request path: "<dfn>inbound</dfn>" means toward the origin server and "<dfn>outbound</dfn>" means toward the user agent.
     910            </p>
     911            <p id="rfc.section.2.3.p.5"><span id="rfc.iref.p.1"></span> A "<dfn>proxy</dfn>" is a message forwarding agent that is selected by the client, usually via local configuration rules, to receive requests
     912               for some type(s) of absolute URI and attempt to satisfy those requests via translation through the HTTP interface. Some translations
     913               are minimal, such as for proxy requests for "http" URIs, whereas other requests might require translation to and from entirely
     914               different application-level protocols. Proxies are often used to group an organization's HTTP requests through a common intermediary
     915               for the sake of security, annotation services, or shared caching.
     916            </p>
     917            <p id="rfc.section.2.3.p.6"><span id="rfc.iref.t.1"></span> <span id="rfc.iref.n.1"></span> An HTTP-to-HTTP proxy is called a "<dfn>transforming proxy</dfn>" if it is designed or configured to modify request or response messages in a semantically meaningful way (i.e., modifications,
     918               beyond those required by normal HTTP processing, that change the message in a way that would be significant to the original
     919               sender or potentially significant to downstream recipients). For example, a transforming proxy might be acting as a shared
     920               annotation server (modifying responses to include references to a local annotation database), a malware filter, a format transcoder,
     921               or an intranet-to-Internet privacy filter. Such transformations are presumed to be desired by the client (or client organization)
     922               that selected the proxy and are beyond the scope of this specification. However, when a proxy is not intended to transform
     923               a given message, we use the term "<dfn>non-transforming proxy</dfn>" to target requirements that preserve HTTP message semantics. See <a href="p2-semantics.html#status.203" title="203 Non-Authoritative Information">Section 6.3.4</a> of <a href="#Part2" id="rfc.xref.Part2.3"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> and <a href="p6-cache.html#header.warning" title="Warning">Section 7.5</a> of <a href="#Part6" id="rfc.xref.Part6.2"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a> for status and warning codes related to transformations.
     924            </p>
     925            <p id="rfc.section.2.3.p.7"><span id="rfc.iref.g.13"></span><span id="rfc.iref.r.4"></span> <span id="rfc.iref.a.1"></span> A "<dfn>gateway</dfn>" (a.k.a., "<dfn>reverse proxy</dfn>") is an intermediary that acts as an origin server for the outbound connection, but translates received requests and forwards
     926               them inbound to another server or servers. Gateways are often used to encapsulate legacy or untrusted information services,
     927               to improve server performance through "<dfn>accelerator</dfn>" caching, and to enable partitioning or load balancing of HTTP services across multiple machines.
     928            </p>
     929            <p id="rfc.section.2.3.p.8">All HTTP requirements applicable to an origin server also apply to the outbound communication of a gateway. A gateway communicates
     930               with inbound servers using any protocol that it desires, including private extensions to HTTP that are outside the scope of
     931               this specification. However, an HTTP-to-HTTP gateway that wishes to interoperate with third-party HTTP servers ought to conform
     932               to user agent requirements on the gateway's inbound connection.
     933            </p>
     934            <p id="rfc.section.2.3.p.9"><span id="rfc.iref.t.2"></span> A "<dfn>tunnel</dfn>" acts as a blind relay between two connections without changing the messages. Once active, a tunnel is not considered a party
     935               to the HTTP communication, though the tunnel might have been initiated by an HTTP request. A tunnel ceases to exist when both
     936               ends of the relayed connection are closed. Tunnels are used to extend a virtual connection through an intermediary, such as
     937               when Transport Layer Security (TLS, <a href="#RFC5246" id="rfc.xref.RFC5246.1"><cite title="The Transport Layer Security (TLS) Protocol Version 1.2">[RFC5246]</cite></a>) is used to establish confidential communication through a shared firewall proxy.
     938            </p>
     939            <p id="rfc.section.2.3.p.10"><span id="rfc.iref.i.3"></span> <span id="rfc.iref.t.3"></span> <span id="rfc.iref.c.3"></span> The above categories for intermediary only consider those acting as participants in the HTTP communication. There are also
     940               intermediaries that can act on lower layers of the network protocol stack, filtering or redirecting HTTP traffic without the
     941               knowledge or permission of message senders. Network intermediaries often introduce security flaws or interoperability problems
     942               by violating HTTP semantics. For example, an "<dfn>interception proxy</dfn>" <a href="#RFC3040" id="rfc.xref.RFC3040.1"><cite title="Internet Web Replication and Caching Taxonomy">[RFC3040]</cite></a> (also commonly known as a "<dfn>transparent proxy</dfn>" <a href="#RFC1919" id="rfc.xref.RFC1919.1"><cite title="Classical versus Transparent IP Proxies">[RFC1919]</cite></a> or "<dfn>captive portal</dfn>") differs from an HTTP proxy because it is not selected by the client. Instead, an interception proxy filters or redirects
     943               outgoing TCP port 80 packets (and occasionally other common port traffic). Interception proxies are commonly found on public
     944               network access points, as a means of enforcing account subscription prior to allowing use of non-local Internet services,
     945               and within corporate firewalls to enforce network usage policies. They are indistinguishable from a man-in-the-middle attack.
     946            </p>
     947            <p id="rfc.section.2.3.p.11">HTTP is defined as a stateless protocol, meaning that each request message can be understood in isolation. Many implementations
     948               depend on HTTP's stateless design in order to reuse proxied connections or dynamically load-balance requests across multiple
     949               servers. Hence, servers <em class="bcp14">MUST NOT</em> assume that two requests on the same connection are from the same user agent unless the connection is secured and specific
     950               to that agent. Some non-standard HTTP extensions (e.g., <a href="#RFC4559" id="rfc.xref.RFC4559.1"><cite title="SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows">[RFC4559]</cite></a>) have been known to violate this requirement, resulting in security and interoperability problems.
     951            </p>
     952         </div>
     953         <div id="caches">
     954            <div id="rfc.iref.c.4"></div>
     955            <h2 id="rfc.section.2.4"><a href="#rfc.section.2.4">2.4</a>&nbsp;<a href="#caches">Caches</a></h2>
     956            <p id="rfc.section.2.4.p.1">A "<dfn>cache</dfn>" is a local store of previous response messages and the subsystem that controls its message storage, retrieval, and deletion.
     957               A cache stores cacheable responses in order to reduce the response time and network bandwidth consumption on future, equivalent
     958               requests. Any client or server <em class="bcp14">MAY</em> employ a cache, though a cache cannot be used by a server while it is acting as a tunnel.
     959            </p>
     960            <p id="rfc.section.2.4.p.2">The effect of a cache is that the request/response chain is shortened if one of the participants along the chain has a cached
     961               response applicable to that request. The following illustrates the resulting chain if B has a cached copy of an earlier response
     962               from O (via C) for a request that has not been cached by UA or A.
     963            </p>
     964            <div id="rfc.figure.u.5"></div><pre class="drawing">            &gt;             &gt;
    933965       <b>UA</b> =========== <b>A</b> =========== <b>B</b> - - - - - - <b>C</b> - - - - - - <b>O</b>
    934966                  &lt;             &lt;
    935967</pre><p id="rfc.section.2.4.p.4"><span id="rfc.iref.c.5"></span> A response is "<dfn>cacheable</dfn>" if a cache is allowed to store a copy of the response message for use in answering subsequent requests. Even when a response
    936          is cacheable, there might be additional constraints placed by the client or by the origin server on when that cached response
    937          can be used for a particular request. HTTP requirements for cache behavior and cacheable responses are defined in <a href="p6-cache.html#caching.overview" title="Overview of Cache Operation">Section 2</a> of <a href="#Part6" id="rfc.xref.Part6.3"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>.
    938       </p>
    939       <p id="rfc.section.2.4.p.5">There are a wide variety of architectures and configurations of caches deployed across the World Wide Web and inside large
    940          organizations. These include national hierarchies of proxy caches to save transoceanic bandwidth, collaborative systems that
    941          broadcast or multicast cache entries, archives of pre-fetched cache entries for use in off-line or high-latency environments,
    942          and so on.
    943       </p>
    944       <h2 id="rfc.section.2.5"><a href="#rfc.section.2.5">2.5</a>&nbsp;<a id="conformance" href="#conformance">Conformance and Error Handling</a></h2>
    945       <p id="rfc.section.2.5.p.1">This specification targets conformance criteria according to the role of a participant in HTTP communication. Hence, HTTP
    946          requirements are placed on senders, recipients, clients, servers, user agents, intermediaries, origin servers, proxies, gateways,
    947          or caches, depending on what behavior is being constrained by the requirement. Additional (social) requirements are placed
    948          on implementations, resource owners, and protocol element registrations when they apply beyond the scope of a single communication.
    949       </p>
    950       <p id="rfc.section.2.5.p.2">The verb "generate" is used instead of "send" where a requirement differentiates between creating a protocol element and merely
    951          forwarding a received element downstream.
    952       </p>
    953       <p id="rfc.section.2.5.p.3">An implementation is considered conformant if it complies with all of the requirements associated with the roles it partakes
    954          in HTTP.
    955       </p>
    956       <p id="rfc.section.2.5.p.4">Conformance applies to both the syntax and semantics of HTTP protocol elements. A sender <em class="bcp14">MUST NOT</em> generate protocol elements that convey a meaning that is known by that sender to be false. A sender <em class="bcp14">MUST NOT</em> generate protocol elements that do not match the grammar defined by the ABNF rules for those protocol elements that are applicable
    957          to the sender's role. If a received protocol element is processed, the recipient <em class="bcp14">MUST</em> be able to parse any value that would match the ABNF rules for that protocol element, excluding only those rules not applicable
    958          to the recipient's role.
    959       </p>
    960       <p id="rfc.section.2.5.p.5">Unless noted otherwise, a recipient <em class="bcp14">MAY</em> attempt to recover a usable protocol element from an invalid construct. HTTP does not define specific error handling mechanisms
    961          except when they have a direct impact on security, since different applications of the protocol require different error handling
    962          strategies. For example, a Web browser might wish to transparently recover from a response where the <a href="p2-semantics.html#header.location" class="smpl">Location</a> header field doesn't parse according to the ABNF, whereas a systems control client might consider any form of error recovery
    963          to be dangerous.
    964       </p>
    965       <h2 id="rfc.section.2.6"><a href="#rfc.section.2.6">2.6</a>&nbsp;<a id="http.version" href="#http.version">Protocol Versioning</a></h2>
    966       <p id="rfc.section.2.6.p.1">HTTP uses a "&lt;major&gt;.&lt;minor&gt;" numbering scheme to indicate versions of the protocol. This specification defines version "1.1".
    967          The protocol version as a whole indicates the sender's conformance with the set of requirements laid out in that version's
    968          corresponding specification of HTTP.
    969       </p>
    970       <p id="rfc.section.2.6.p.2">The version of an HTTP message is indicated by an HTTP-version field in the first line of the message. HTTP-version is case-sensitive.</p>
    971       <div id="rfc.figure.u.6"></div><pre class="inline"><span id="rfc.iref.g.14"></span><span id="rfc.iref.g.15"></span>  <a href="#http.version" class="smpl">HTTP-version</a>  = <a href="#http.version" class="smpl">HTTP-name</a> "/" <a href="#core.rules" class="smpl">DIGIT</a> "." <a href="#core.rules" class="smpl">DIGIT</a>
     968               is cacheable, there might be additional constraints placed by the client or by the origin server on when that cached response
     969               can be used for a particular request. HTTP requirements for cache behavior and cacheable responses are defined in <a href="p6-cache.html#caching.overview" title="Overview of Cache Operation">Section 2</a> of <a href="#Part6" id="rfc.xref.Part6.3"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>.
     970            </p>
     971            <p id="rfc.section.2.4.p.5">There are a wide variety of architectures and configurations of caches deployed across the World Wide Web and inside large
     972               organizations. These include national hierarchies of proxy caches to save transoceanic bandwidth, collaborative systems that
     973               broadcast or multicast cache entries, archives of pre-fetched cache entries for use in off-line or high-latency environments,
     974               and so on.
     975            </p>
     976         </div>
     977         <div id="conformance">
     978            <h2 id="rfc.section.2.5"><a href="#rfc.section.2.5">2.5</a>&nbsp;<a href="#conformance">Conformance and Error Handling</a></h2>
     979            <p id="rfc.section.2.5.p.1">This specification targets conformance criteria according to the role of a participant in HTTP communication. Hence, HTTP
     980               requirements are placed on senders, recipients, clients, servers, user agents, intermediaries, origin servers, proxies, gateways,
     981               or caches, depending on what behavior is being constrained by the requirement. Additional (social) requirements are placed
     982               on implementations, resource owners, and protocol element registrations when they apply beyond the scope of a single communication.
     983            </p>
     984            <p id="rfc.section.2.5.p.2">The verb "generate" is used instead of "send" where a requirement differentiates between creating a protocol element and merely
     985               forwarding a received element downstream.
     986            </p>
     987            <p id="rfc.section.2.5.p.3">An implementation is considered conformant if it complies with all of the requirements associated with the roles it partakes
     988               in HTTP.
     989            </p>
     990            <p id="rfc.section.2.5.p.4">Conformance applies to both the syntax and semantics of HTTP protocol elements. A sender <em class="bcp14">MUST NOT</em> generate protocol elements that convey a meaning that is known by that sender to be false. A sender <em class="bcp14">MUST NOT</em> generate protocol elements that do not match the grammar defined by the ABNF rules for those protocol elements that are applicable
     991               to the sender's role. If a received protocol element is processed, the recipient <em class="bcp14">MUST</em> be able to parse any value that would match the ABNF rules for that protocol element, excluding only those rules not applicable
     992               to the recipient's role.
     993            </p>
     994            <p id="rfc.section.2.5.p.5">Unless noted otherwise, a recipient <em class="bcp14">MAY</em> attempt to recover a usable protocol element from an invalid construct. HTTP does not define specific error handling mechanisms
     995               except when they have a direct impact on security, since different applications of the protocol require different error handling
     996               strategies. For example, a Web browser might wish to transparently recover from a response where the <a href="p2-semantics.html#header.location" class="smpl">Location</a> header field doesn't parse according to the ABNF, whereas a systems control client might consider any form of error recovery
     997               to be dangerous.
     998            </p>
     999         </div>
     1000         <div id="http.version">
     1001            <h2 id="rfc.section.2.6"><a href="#rfc.section.2.6">2.6</a>&nbsp;<a href="#http.version">Protocol Versioning</a></h2>
     1002            <p id="rfc.section.2.6.p.1">HTTP uses a "&lt;major&gt;.&lt;minor&gt;" numbering scheme to indicate versions of the protocol. This specification defines version "1.1".
     1003               The protocol version as a whole indicates the sender's conformance with the set of requirements laid out in that version's
     1004               corresponding specification of HTTP.
     1005            </p>
     1006            <p id="rfc.section.2.6.p.2">The version of an HTTP message is indicated by an HTTP-version field in the first line of the message. HTTP-version is case-sensitive.</p>
     1007            <div id="rfc.figure.u.6"></div><pre class="inline"><span id="rfc.iref.g.14"></span><span id="rfc.iref.g.15"></span>  <a href="#http.version" class="smpl">HTTP-version</a>  = <a href="#http.version" class="smpl">HTTP-name</a> "/" <a href="#core.rules" class="smpl">DIGIT</a> "." <a href="#core.rules" class="smpl">DIGIT</a>
    9721008  <a href="#http.version" class="smpl">HTTP-name</a>     = %x48.54.54.50 ; "HTTP", case-sensitive
    9731009</pre><p id="rfc.section.2.6.p.4">The HTTP version number consists of two decimal digits separated by a "." (period or decimal point). The first digit ("major
    974          version") indicates the HTTP messaging syntax, whereas the second digit ("minor version") indicates the highest minor version
    975          within that major version to which the sender is conformant and able to understand for future communication. The minor version
    976          advertises the sender's communication capabilities even when the sender is only using a backwards-compatible subset of the
    977          protocol, thereby letting the recipient know that more advanced features can be used in response (by servers) or in future
    978          requests (by clients).
    979       </p>
    980       <p id="rfc.section.2.6.p.5">When an HTTP/1.1 message is sent to an HTTP/1.0 recipient <a href="#RFC1945" id="rfc.xref.RFC1945.1"><cite title="Hypertext Transfer Protocol -- HTTP/1.0">[RFC1945]</cite></a> or a recipient whose version is unknown, the HTTP/1.1 message is constructed such that it can be interpreted as a valid HTTP/1.0
    981          message if all of the newer features are ignored. This specification places recipient-version requirements on some new features
    982          so that a conformant sender will only use compatible features until it has determined, through configuration or the receipt
    983          of a message, that the recipient supports HTTP/1.1.
    984       </p>
    985       <p id="rfc.section.2.6.p.6">The interpretation of a header field does not change between minor versions of the same major HTTP version, though the default
    986          behavior of a recipient in the absence of such a field can change. Unless specified otherwise, header fields defined in HTTP/1.1
    987          are defined for all versions of HTTP/1.x. In particular, the <a href="#header.host" class="smpl">Host</a> and <a href="#header.connection" class="smpl">Connection</a> header fields ought to be implemented by all HTTP/1.x implementations whether or not they advertise conformance with HTTP/1.1.
    988       </p>
    989       <p id="rfc.section.2.6.p.7">New header fields can be defined such that, when they are understood by a recipient, they might override or enhance the interpretation
    990          of previously defined header fields. When an implementation receives an unrecognized header field, the recipient <em class="bcp14">MUST</em> ignore that header field for local processing regardless of the message's HTTP version. An unrecognized header field received
    991          by a proxy <em class="bcp14">MUST</em> be forwarded downstream unless the header field's field-name is listed in the message's <a href="#header.connection" class="smpl">Connection</a> header field (see <a href="#header.connection" id="rfc.xref.header.connection.1" title="Connection">Section&nbsp;6.1</a>). These requirements allow HTTP's functionality to be enhanced without requiring prior update of deployed intermediaries.
    992       </p>
    993       <p id="rfc.section.2.6.p.8">Intermediaries that process HTTP messages (i.e., all intermediaries other than those acting as tunnels) <em class="bcp14">MUST</em> send their own HTTP-version in forwarded messages. In other words, they <em class="bcp14">MUST NOT</em> blindly forward the first line of an HTTP message without ensuring that the protocol version in that message matches a version
    994          to which that intermediary is conformant for both the receiving and sending of messages. Forwarding an HTTP message without
    995          rewriting the HTTP-version might result in communication errors when downstream recipients use the message sender's version
    996          to determine what features are safe to use for later communication with that sender.
    997       </p>
    998       <p id="rfc.section.2.6.p.9">A client <em class="bcp14">SHOULD</em> send a request version equal to the highest version to which the client is conformant and whose major version is no higher
    999          than the highest version supported by the server, if this is known. A client <em class="bcp14">MUST NOT</em> send a version to which it is not conformant.
    1000       </p>
    1001       <p id="rfc.section.2.6.p.10">A client <em class="bcp14">MAY</em> send a lower request version if it is known that the server incorrectly implements the HTTP specification, but only after
    1002          the client has attempted at least one normal request and determined from the response status or header fields (e.g., <a href="p2-semantics.html#header.server" class="smpl">Server</a>) that the server improperly handles higher request versions.
    1003       </p>
    1004       <p id="rfc.section.2.6.p.11">A server <em class="bcp14">SHOULD</em> send a response version equal to the highest version to which the server is conformant and whose major version is less than
    1005          or equal to the one received in the request. A server <em class="bcp14">MUST NOT</em> send a version to which it is not conformant. A server <em class="bcp14">MAY</em> send a <a href="p2-semantics.html#status.505" class="smpl">505 (HTTP Version Not
    1006             Supported)</a> response if it cannot send a response using the major version used in the client's request.
    1007       </p>
    1008       <p id="rfc.section.2.6.p.12">A server <em class="bcp14">MAY</em> send an HTTP/1.0 response to a request if it is known or suspected that the client incorrectly implements the HTTP specification
    1009          and is incapable of correctly processing later version responses, such as when a client fails to parse the version number
    1010          correctly or when an intermediary is known to blindly forward the HTTP-version even when it doesn't conform to the given minor
    1011          version of the protocol. Such protocol downgrades <em class="bcp14">SHOULD NOT</em> be performed unless triggered by specific client attributes, such as when one or more of the request header fields (e.g., <a href="p2-semantics.html#header.user-agent" class="smpl">User-Agent</a>) uniquely match the values sent by a client known to be in error.
    1012       </p>
    1013       <p id="rfc.section.2.6.p.13">The intention of HTTP's versioning design is that the major number will only be incremented if an incompatible message syntax
    1014          is introduced, and that the minor number will only be incremented when changes made to the protocol have the effect of adding
    1015          to the message semantics or implying additional capabilities of the sender. However, the minor version was not incremented
    1016          for the changes introduced between <a href="#RFC2068" id="rfc.xref.RFC2068.2"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2068]</cite></a> and <a href="#RFC2616" id="rfc.xref.RFC2616.2"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2616]</cite></a>, and this revision has specifically avoided any such changes to the protocol.
    1017       </p>
    1018       <p id="rfc.section.2.6.p.14">When an HTTP message is received with a major version number that the recipient implements, but a higher minor version number
    1019          than what the recipient implements, the recipient <em class="bcp14">SHOULD</em> process the message as if it were in the highest minor version within that major version to which the recipient is conformant.
    1020          A recipient can assume that a message with a higher minor version, when sent to a recipient that has not yet indicated support
    1021          for that higher version, is sufficiently backwards-compatible to be safely processed by any implementation of the same major
    1022          version.
    1023       </p>
    1024       <div id="rfc.iref.r.5"></div>
    1025       <h2 id="rfc.section.2.7"><a href="#rfc.section.2.7">2.7</a>&nbsp;<a id="uri" href="#uri">Uniform Resource Identifiers</a></h2>
    1026       <p id="rfc.section.2.7.p.1">Uniform Resource Identifiers (URIs) <a href="#RFC3986" id="rfc.xref.RFC3986.2"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a> are used throughout HTTP as the means for identifying resources (<a href="p2-semantics.html#resources" title="Resources">Section 2</a> of <a href="#Part2" id="rfc.xref.Part2.4"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). URI references are used to target requests, indicate redirects, and define relationships.
    1027       </p>
    1028       <p id="rfc.section.2.7.p.2">This specification adopts the definitions of "URI-reference", "absolute-URI", "relative-part", "authority", "port", "host",
    1029          "path-abempty", "segment", "query", and "fragment" from the URI generic syntax. In addition, we define an "absolute-path"
    1030          rule (that differs from RFC 3986's "path-absolute" in that it allows a leading "//") and a "partial-URI" rule for protocol
    1031          elements that allow a relative URI but not a fragment.
    1032       </p>
    1033       <div id="rfc.figure.u.7"></div><pre class="inline"><span id="rfc.iref.g.16"></span><span id="rfc.iref.g.17"></span><span id="rfc.iref.g.18"></span><span id="rfc.iref.g.19"></span><span id="rfc.iref.g.20"></span><span id="rfc.iref.g.21"></span><span id="rfc.iref.g.22"></span><span id="rfc.iref.g.23"></span><span id="rfc.iref.g.24"></span><span id="rfc.iref.g.25"></span>  <a href="#uri" class="smpl">URI-reference</a> = &lt;URI-reference, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.3"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-4.1">Section 4.1</a>&gt;
    1034   <a href="#uri" class="smpl">absolute-URI</a>  = &lt;absolute-URI, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.4"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-4.3">Section 4.3</a>&gt;
    1035   <a href="#uri" class="smpl">relative-part</a> = &lt;relative-part, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.5"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-4.2">Section 4.2</a>&gt;
    1036   <a href="#uri" class="smpl">authority</a>     = &lt;authority, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.6"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.2">Section 3.2</a>&gt;
    1037   <a href="#uri" class="smpl">uri-host</a>      = &lt;host, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.7"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.2.2">Section 3.2.2</a>&gt;
    1038   <a href="#uri" class="smpl">port</a>          = &lt;port, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.8"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.2.3">Section 3.2.3</a>&gt;
    1039   <a href="#uri" class="smpl">path-abempty</a>  = &lt;path-abempty, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.9"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.3">Section 3.3</a>&gt;
    1040   <a href="#uri" class="smpl">segment</a>       = &lt;segment, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.10"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.3">Section 3.3</a>&gt;
    1041   <a href="#uri" class="smpl">query</a>         = &lt;query, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.11"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.4">Section 3.4</a>&gt;
    1042   <a href="#uri" class="smpl">fragment</a>      = &lt;fragment, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.12"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.5">Section 3.5</a>&gt;
     1010               version") indicates the HTTP messaging syntax, whereas the second digit ("minor version") indicates the highest minor version
     1011               within that major version to which the sender is conformant and able to understand for future communication. The minor version
     1012               advertises the sender's communication capabilities even when the sender is only using a backwards-compatible subset of the
     1013               protocol, thereby letting the recipient know that more advanced features can be used in response (by servers) or in future
     1014               requests (by clients).
     1015            </p>
     1016            <p id="rfc.section.2.6.p.5">When an HTTP/1.1 message is sent to an HTTP/1.0 recipient <a href="#RFC1945" id="rfc.xref.RFC1945.1"><cite title="Hypertext Transfer Protocol -- HTTP/1.0">[RFC1945]</cite></a> or a recipient whose version is unknown, the HTTP/1.1 message is constructed such that it can be interpreted as a valid HTTP/1.0
     1017               message if all of the newer features are ignored. This specification places recipient-version requirements on some new features
     1018               so that a conformant sender will only use compatible features until it has determined, through configuration or the receipt
     1019               of a message, that the recipient supports HTTP/1.1.
     1020            </p>
     1021            <p id="rfc.section.2.6.p.6">The interpretation of a header field does not change between minor versions of the same major HTTP version, though the default
     1022               behavior of a recipient in the absence of such a field can change. Unless specified otherwise, header fields defined in HTTP/1.1
     1023               are defined for all versions of HTTP/1.x. In particular, the <a href="#header.host" class="smpl">Host</a> and <a href="#header.connection" class="smpl">Connection</a> header fields ought to be implemented by all HTTP/1.x implementations whether or not they advertise conformance with HTTP/1.1.
     1024            </p>
     1025            <p id="rfc.section.2.6.p.7">New header fields can be defined such that, when they are understood by a recipient, they might override or enhance the interpretation
     1026               of previously defined header fields. When an implementation receives an unrecognized header field, the recipient <em class="bcp14">MUST</em> ignore that header field for local processing regardless of the message's HTTP version. An unrecognized header field received
     1027               by a proxy <em class="bcp14">MUST</em> be forwarded downstream unless the header field's field-name is listed in the message's <a href="#header.connection" class="smpl">Connection</a> header field (see <a href="#header.connection" id="rfc.xref.header.connection.1" title="Connection">Section&nbsp;6.1</a>). These requirements allow HTTP's functionality to be enhanced without requiring prior update of deployed intermediaries.
     1028            </p>
     1029            <p id="rfc.section.2.6.p.8">Intermediaries that process HTTP messages (i.e., all intermediaries other than those acting as tunnels) <em class="bcp14">MUST</em> send their own HTTP-version in forwarded messages. In other words, they <em class="bcp14">MUST NOT</em> blindly forward the first line of an HTTP message without ensuring that the protocol version in that message matches a version
     1030               to which that intermediary is conformant for both the receiving and sending of messages. Forwarding an HTTP message without
     1031               rewriting the HTTP-version might result in communication errors when downstream recipients use the message sender's version
     1032               to determine what features are safe to use for later communication with that sender.
     1033            </p>
     1034            <p id="rfc.section.2.6.p.9">A client <em class="bcp14">SHOULD</em> send a request version equal to the highest version to which the client is conformant and whose major version is no higher
     1035               than the highest version supported by the server, if this is known. A client <em class="bcp14">MUST NOT</em> send a version to which it is not conformant.
     1036            </p>
     1037            <p id="rfc.section.2.6.p.10">A client <em class="bcp14">MAY</em> send a lower request version if it is known that the server incorrectly implements the HTTP specification, but only after
     1038               the client has attempted at least one normal request and determined from the response status or header fields (e.g., <a href="p2-semantics.html#header.server" class="smpl">Server</a>) that the server improperly handles higher request versions.
     1039            </p>
     1040            <p id="rfc.section.2.6.p.11">A server <em class="bcp14">SHOULD</em> send a response version equal to the highest version to which the server is conformant and whose major version is less than
     1041               or equal to the one received in the request. A server <em class="bcp14">MUST NOT</em> send a version to which it is not conformant. A server <em class="bcp14">MAY</em> send a <a href="p2-semantics.html#status.505" class="smpl">505 (HTTP Version Not
     1042                  Supported)</a> response if it cannot send a response using the major version used in the client's request.
     1043            </p>
     1044            <p id="rfc.section.2.6.p.12">A server <em class="bcp14">MAY</em> send an HTTP/1.0 response to a request if it is known or suspected that the client incorrectly implements the HTTP specification
     1045               and is incapable of correctly processing later version responses, such as when a client fails to parse the version number
     1046               correctly or when an intermediary is known to blindly forward the HTTP-version even when it doesn't conform to the given minor
     1047               version of the protocol. Such protocol downgrades <em class="bcp14">SHOULD NOT</em> be performed unless triggered by specific client attributes, such as when one or more of the request header fields (e.g., <a href="p2-semantics.html#header.user-agent" class="smpl">User-Agent</a>) uniquely match the values sent by a client known to be in error.
     1048            </p>
     1049            <p id="rfc.section.2.6.p.13">The intention of HTTP's versioning design is that the major number will only be incremented if an incompatible message syntax
     1050               is introduced, and that the minor number will only be incremented when changes made to the protocol have the effect of adding
     1051               to the message semantics or implying additional capabilities of the sender. However, the minor version was not incremented
     1052               for the changes introduced between <a href="#RFC2068" id="rfc.xref.RFC2068.2"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2068]</cite></a> and <a href="#RFC2616" id="rfc.xref.RFC2616.2"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2616]</cite></a>, and this revision has specifically avoided any such changes to the protocol.
     1053            </p>
     1054            <p id="rfc.section.2.6.p.14">When an HTTP message is received with a major version number that the recipient implements, but a higher minor version number
     1055               than what the recipient implements, the recipient <em class="bcp14">SHOULD</em> process the message as if it were in the highest minor version within that major version to which the recipient is conformant.
     1056               A recipient can assume that a message with a higher minor version, when sent to a recipient that has not yet indicated support
     1057               for that higher version, is sufficiently backwards-compatible to be safely processed by any implementation of the same major
     1058               version.
     1059            </p>
     1060         </div>
     1061         <div id="uri">
     1062            <div id="rfc.iref.r.5"></div>
     1063            <h2 id="rfc.section.2.7"><a href="#rfc.section.2.7">2.7</a>&nbsp;<a href="#uri">Uniform Resource Identifiers</a></h2>
     1064            <p id="rfc.section.2.7.p.1">Uniform Resource Identifiers (URIs) <a href="#RFC3986" id="rfc.xref.RFC3986.2"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a> are used throughout HTTP as the means for identifying resources (<a href="p2-semantics.html#resources" title="Resources">Section 2</a> of <a href="#Part2" id="rfc.xref.Part2.4"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). URI references are used to target requests, indicate redirects, and define relationships.
     1065            </p>
     1066            <p id="rfc.section.2.7.p.2">This specification adopts the definitions of "URI-reference", "absolute-URI", "relative-part", "authority", "port", "host",
     1067               "path-abempty", "segment", "query", and "fragment" from the URI generic syntax. In addition, we define an "absolute-path"
     1068               rule (that differs from RFC 3986's "path-absolute" in that it allows a leading "//") and a "partial-URI" rule for protocol
     1069               elements that allow a relative URI but not a fragment.
     1070            </p>
     1071            <div id="rfc.figure.u.7"></div><pre class="inline"><span id="rfc.iref.g.16"></span><span id="rfc.iref.g.17"></span><span id="rfc.iref.g.18"></span><span id="rfc.iref.g.19"></span><span id="rfc.iref.g.20"></span><span id="rfc.iref.g.21"></span><span id="rfc.iref.g.22"></span><span id="rfc.iref.g.23"></span><span id="rfc.iref.g.24"></span><span id="rfc.iref.g.25"></span>  <a href="#uri" class="smpl">URI-reference</a> = &lt;URI-reference, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.3"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-4.1">Section 4.1</a>&gt;
     1072  <a href="#uri" class="smpl">absolute-URI</a>  = &lt;absolute-URI, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.4"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-4.3">Section 4.3</a>&gt;
     1073  <a href="#uri" class="smpl">relative-part</a> = &lt;relative-part, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.5"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-4.2">Section 4.2</a>&gt;
     1074  <a href="#uri" class="smpl">authority</a>     = &lt;authority, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.6"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.2">Section 3.2</a>&gt;
     1075  <a href="#uri" class="smpl">uri-host</a>      = &lt;host, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.7"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.2.2">Section 3.2.2</a>&gt;
     1076  <a href="#uri" class="smpl">port</a>          = &lt;port, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.8"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.2.3">Section 3.2.3</a>&gt;
     1077  <a href="#uri" class="smpl">path-abempty</a>  = &lt;path-abempty, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.9"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.3">Section 3.3</a>&gt;
     1078  <a href="#uri" class="smpl">segment</a>       = &lt;segment, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.10"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.3">Section 3.3</a>&gt;
     1079  <a href="#uri" class="smpl">query</a>         = &lt;query, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.11"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.4">Section 3.4</a>&gt;
     1080  <a href="#uri" class="smpl">fragment</a>      = &lt;fragment, defined in <a href="#RFC3986" id="rfc.xref.RFC3986.12"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.5">Section 3.5</a>&gt;
    10431081 
    10441082  <a href="#uri" class="smpl">absolute-path</a> = 1*( "/" segment )
    10451083  <a href="#uri" class="smpl">partial-URI</a>   = relative-part [ "?" query ]
    10461084</pre><p id="rfc.section.2.7.p.4">Each protocol element in HTTP that allows a URI reference will indicate in its ABNF production whether the element allows
    1047          any form of reference (URI-reference), only a URI in absolute form (absolute-URI), only the path and optional query components,
    1048          or some combination of the above. Unless otherwise indicated, URI references are parsed relative to the effective request
    1049          URI (<a href="#effective.request.uri" title="Effective Request URI">Section&nbsp;5.5</a>).
    1050       </p>
    1051       <h3 id="rfc.section.2.7.1"><a href="#rfc.section.2.7.1">2.7.1</a>&nbsp;<a id="http.uri" href="#http.uri">http URI scheme</a></h3>
    1052       <div id="rfc.iref.h.1"></div>
    1053       <div id="rfc.iref.u.3"></div>
    1054       <p id="rfc.section.2.7.1.p.1">The "http" URI scheme is hereby defined for the purpose of minting identifiers according to their association with the hierarchical
    1055          namespace governed by a potential HTTP origin server listening for TCP (<a href="#RFC0793" id="rfc.xref.RFC0793.1"><cite title="Transmission Control Protocol">[RFC0793]</cite></a>) connections on a given port.
    1056       </p>
    1057       <div id="rfc.figure.u.8"></div><pre class="inline"><span id="rfc.iref.g.26"></span>  <a href="#http.uri" class="smpl">http-URI</a> = "http:" "//" <a href="#uri" class="smpl">authority</a> <a href="#uri" class="smpl">path-abempty</a> [ "?" <a href="#uri" class="smpl">query</a> ]
     1085               any form of reference (URI-reference), only a URI in absolute form (absolute-URI), only the path and optional query components,
     1086               or some combination of the above. Unless otherwise indicated, URI references are parsed relative to the effective request
     1087               URI (<a href="#effective.request.uri" title="Effective Request URI">Section&nbsp;5.5</a>).
     1088            </p>
     1089            <div id="http.uri">
     1090               <h3 id="rfc.section.2.7.1"><a href="#rfc.section.2.7.1">2.7.1</a>&nbsp;<a href="#http.uri">http URI scheme</a></h3>
     1091               <div id="rfc.iref.h.1"></div>
     1092               <div id="rfc.iref.u.3"></div>
     1093               <p id="rfc.section.2.7.1.p.1">The "http" URI scheme is hereby defined for the purpose of minting identifiers according to their association with the hierarchical
     1094                  namespace governed by a potential HTTP origin server listening for TCP (<a href="#RFC0793" id="rfc.xref.RFC0793.1"><cite title="Transmission Control Protocol">[RFC0793]</cite></a>) connections on a given port.
     1095               </p>
     1096               <div id="rfc.figure.u.8"></div><pre class="inline"><span id="rfc.iref.g.26"></span>  <a href="#http.uri" class="smpl">http-URI</a> = "http:" "//" <a href="#uri" class="smpl">authority</a> <a href="#uri" class="smpl">path-abempty</a> [ "?" <a href="#uri" class="smpl">query</a> ]
    10581097             [ "#" <a href="#uri" class="smpl">fragment</a> ]
    1059 </pre><p id="rfc.section.2.7.1.p.3">The HTTP origin server is identified by the generic syntax's <a href="#uri" class="smpl">authority</a> component, which includes a host identifier and optional TCP port (<a href="#RFC3986" id="rfc.xref.RFC3986.13"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.2.2">Section 3.2.2</a>). The remainder of the URI, consisting of both the hierarchical path component and optional query component, serves as an
    1060          identifier for a potential resource within that origin server's name space.
    1061       </p>
    1062       <p id="rfc.section.2.7.1.p.4">If the host identifier is provided as an IP address, then the origin server is any listener on the indicated TCP port at that
    1063          IP address. If host is a registered name, then that name is considered an indirect identifier and the recipient might use
    1064          a name resolution service, such as DNS, to find the address of a listener for that host. The host <em class="bcp14">MUST NOT</em> be empty; if an "http" URI is received with an empty host, then it <em class="bcp14">MUST</em> be rejected as invalid. If the port subcomponent is empty or not given, then TCP port 80 is assumed (the default reserved
    1065          port for WWW services).
    1066       </p>
    1067       <p id="rfc.section.2.7.1.p.5">Regardless of the form of host identifier, access to that host is not implied by the mere presence of its name or address.
    1068          The host might or might not exist and, even when it does exist, might or might not be running an HTTP server or listening
    1069          to the indicated port. The "http" URI scheme makes use of the delegated nature of Internet names and addresses to establish
    1070          a naming authority (whatever entity has the ability to place an HTTP server at that Internet name or address) and allows that
    1071          authority to determine which names are valid and how they might be used.
    1072       </p>
    1073       <p id="rfc.section.2.7.1.p.6">When an "http" URI is used within a context that calls for access to the indicated resource, a client <em class="bcp14">MAY</em> attempt access by resolving the host to an IP address, establishing a TCP connection to that address on the indicated port,
    1074          and sending an HTTP request message (<a href="#http.message" title="Message Format">Section&nbsp;3</a>) containing the URI's identifying data (<a href="#message.routing" title="Message Routing">Section&nbsp;5</a>) to the server. If the server responds to that request with a non-interim HTTP response message, as described in <a href="p2-semantics.html#status.codes" title="Response Status Codes">Section 6</a> of <a href="#Part2" id="rfc.xref.Part2.5"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>, then that response is considered an authoritative answer to the client's request.
    1075       </p>
    1076       <p id="rfc.section.2.7.1.p.7">Although HTTP is independent of the transport protocol, the "http" scheme is specific to TCP-based services because the name
    1077          delegation process depends on TCP for establishing authority. An HTTP service based on some other underlying connection protocol
    1078          would presumably be identified using a different URI scheme, just as the "https" scheme (below) is used for resources that
    1079          require an end-to-end secured connection. Other protocols might also be used to provide access to "http" identified resources
    1080          — it is only the authoritative interface that is specific to TCP.
    1081       </p>
    1082       <p id="rfc.section.2.7.1.p.8">The URI generic syntax for authority also includes a deprecated userinfo subcomponent (<a href="#RFC3986" id="rfc.xref.RFC3986.14"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.2.1">Section 3.2.1</a>) for including user authentication information in the URI. Some implementations make use of the userinfo component for internal
    1083          configuration of authentication information, such as within command invocation options, configuration files, or bookmark lists,
    1084          even though such usage might expose a user identifier or password. Senders <em class="bcp14">MUST</em> exclude the userinfo subcomponent (and its "@" delimiter) when an "http" URI is transmitted within a message as a request
    1085          target or header field value. Recipients of an "http" URI reference <em class="bcp14">SHOULD</em> parse for userinfo and treat its presence as an error, since it is likely being used to obscure the authority for the sake
    1086          of phishing attacks.
    1087       </p>
    1088       <h3 id="rfc.section.2.7.2"><a href="#rfc.section.2.7.2">2.7.2</a>&nbsp;<a id="https.uri" href="#https.uri">https URI scheme</a></h3>
    1089       <div id="rfc.iref.h.2"></div>
    1090       <div id="rfc.iref.u.4"></div>
    1091       <p id="rfc.section.2.7.2.p.1">The "https" URI scheme is hereby defined for the purpose of minting identifiers according to their association with the hierarchical
    1092          namespace governed by a potential HTTP origin server listening to a given TCP port for TLS-secured connections (<a href="#RFC0793" id="rfc.xref.RFC0793.2"><cite title="Transmission Control Protocol">[RFC0793]</cite></a>, <a href="#RFC5246" id="rfc.xref.RFC5246.2"><cite title="The Transport Layer Security (TLS) Protocol Version 1.2">[RFC5246]</cite></a>).
    1093       </p>
    1094       <p id="rfc.section.2.7.2.p.2">All of the requirements listed above for the "http" scheme are also requirements for the "https" scheme, except that a default
    1095          TCP port of 443 is assumed if the port subcomponent is empty or not given, and the TCP connection <em class="bcp14">MUST</em> be secured, end-to-end, through the use of strong encryption prior to sending the first HTTP request.
    1096       </p>
    1097       <div id="rfc.figure.u.9"></div><pre class="inline"><span id="rfc.iref.g.27"></span>  <a href="#https.uri" class="smpl">https-URI</a> = "https:" "//" <a href="#uri" class="smpl">authority</a> <a href="#uri" class="smpl">path-abempty</a> [ "?" <a href="#uri" class="smpl">query</a> ]
     1098</pre><p id="rfc.section.2.7.1.p.3">The HTTP origin server is identified by the generic syntax's <a href="#uri" class="smpl">authority</a> component, which includes a host identifier and optional TCP port (<a href="#RFC3986" id="rfc.xref.RFC3986.13"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.2.2">Section 3.2.2</a>). The remainder of the URI, consisting of both the hierarchical path component and optional query component, serves as an
     1099                  identifier for a potential resource within that origin server's name space.
     1100               </p>
     1101               <p id="rfc.section.2.7.1.p.4">If the host identifier is provided as an IP address, then the origin server is any listener on the indicated TCP port at that
     1102                  IP address. If host is a registered name, then that name is considered an indirect identifier and the recipient might use
     1103                  a name resolution service, such as DNS, to find the address of a listener for that host. The host <em class="bcp14">MUST NOT</em> be empty; if an "http" URI is received with an empty host, then it <em class="bcp14">MUST</em> be rejected as invalid. If the port subcomponent is empty or not given, then TCP port 80 is assumed (the default reserved
     1104                  port for WWW services).
     1105               </p>
     1106               <p id="rfc.section.2.7.1.p.5">Regardless of the form of host identifier, access to that host is not implied by the mere presence of its name or address.
     1107                  The host might or might not exist and, even when it does exist, might or might not be running an HTTP server or listening
     1108                  to the indicated port. The "http" URI scheme makes use of the delegated nature of Internet names and addresses to establish
     1109                  a naming authority (whatever entity has the ability to place an HTTP server at that Internet name or address) and allows that
     1110                  authority to determine which names are valid and how they might be used.
     1111               </p>
     1112               <p id="rfc.section.2.7.1.p.6">When an "http" URI is used within a context that calls for access to the indicated resource, a client <em class="bcp14">MAY</em> attempt access by resolving the host to an IP address, establishing a TCP connection to that address on the indicated port,
     1113                  and sending an HTTP request message (<a href="#http.message" title="Message Format">Section&nbsp;3</a>) containing the URI's identifying data (<a href="#message.routing" title="Message Routing">Section&nbsp;5</a>) to the server. If the server responds to that request with a non-interim HTTP response message, as described in <a href="p2-semantics.html#status.codes" title="Response Status Codes">Section 6</a> of <a href="#Part2" id="rfc.xref.Part2.5"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>, then that response is considered an authoritative answer to the client's request.
     1114               </p>
     1115               <p id="rfc.section.2.7.1.p.7">Although HTTP is independent of the transport protocol, the "http" scheme is specific to TCP-based services because the name
     1116                  delegation process depends on TCP for establishing authority. An HTTP service based on some other underlying connection protocol
     1117                  would presumably be identified using a different URI scheme, just as the "https" scheme (below) is used for resources that
     1118                  require an end-to-end secured connection. Other protocols might also be used to provide access to "http" identified resources
     1119                  — it is only the authoritative interface that is specific to TCP.
     1120               </p>
     1121               <p id="rfc.section.2.7.1.p.8">The URI generic syntax for authority also includes a deprecated userinfo subcomponent (<a href="#RFC3986" id="rfc.xref.RFC3986.14"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.2.1">Section 3.2.1</a>) for including user authentication information in the URI. Some implementations make use of the userinfo component for internal
     1122                  configuration of authentication information, such as within command invocation options, configuration files, or bookmark lists,
     1123                  even though such usage might expose a user identifier or password. Senders <em class="bcp14">MUST</em> exclude the userinfo subcomponent (and its "@" delimiter) when an "http" URI is transmitted within a message as a request
     1124                  target or header field value. Recipients of an "http" URI reference <em class="bcp14">SHOULD</em> parse for userinfo and treat its presence as an error, since it is likely being used to obscure the authority for the sake
     1125                  of phishing attacks.
     1126               </p>
     1127            </div>
     1128            <div id="https.uri">
     1129               <h3 id="rfc.section.2.7.2"><a href="#rfc.section.2.7.2">2.7.2</a>&nbsp;<a href="#https.uri">https URI scheme</a></h3>
     1130               <div id="rfc.iref.h.2"></div>
     1131               <div id="rfc.iref.u.4"></div>
     1132               <p id="rfc.section.2.7.2.p.1">The "https" URI scheme is hereby defined for the purpose of minting identifiers according to their association with the hierarchical
     1133                  namespace governed by a potential HTTP origin server listening to a given TCP port for TLS-secured connections (<a href="#RFC0793" id="rfc.xref.RFC0793.2"><cite title="Transmission Control Protocol">[RFC0793]</cite></a>, <a href="#RFC5246" id="rfc.xref.RFC5246.2"><cite title="The Transport Layer Security (TLS) Protocol Version 1.2">[RFC5246]</cite></a>).
     1134               </p>
     1135               <p id="rfc.section.2.7.2.p.2">All of the requirements listed above for the "http" scheme are also requirements for the "https" scheme, except that a default
     1136                  TCP port of 443 is assumed if the port subcomponent is empty or not given, and the TCP connection <em class="bcp14">MUST</em> be secured, end-to-end, through the use of strong encryption prior to sending the first HTTP request.
     1137               </p>
     1138               <div id="rfc.figure.u.9"></div><pre class="inline"><span id="rfc.iref.g.27"></span>  <a href="#https.uri" class="smpl">https-URI</a> = "https:" "//" <a href="#uri" class="smpl">authority</a> <a href="#uri" class="smpl">path-abempty</a> [ "?" <a href="#uri" class="smpl">query</a> ]
    10981139              [ "#" <a href="#uri" class="smpl">fragment</a> ]
    10991140</pre><p id="rfc.section.2.7.2.p.4">Note that the "https" URI scheme depends on both TLS and TCP for establishing authority. Resources made available via the
    1100          "https" scheme have no shared identity with the "http" scheme even if their resource identifiers indicate the same authority
    1101          (the same host listening to the same TCP port). They are distinct name spaces and are considered to be distinct origin servers.
    1102          However, an extension to HTTP that is defined to apply to entire host domains, such as the Cookie protocol <a href="#RFC6265" id="rfc.xref.RFC6265.1"><cite title="HTTP State Management Mechanism">[RFC6265]</cite></a>, can allow information set by one service to impact communication with other services within a matching group of host domains.
    1103       </p>
    1104       <p id="rfc.section.2.7.2.p.5">The process for authoritative access to an "https" identified resource is defined in <a href="#RFC2818" id="rfc.xref.RFC2818.2"><cite title="HTTP Over TLS">[RFC2818]</cite></a>.
    1105       </p>
    1106       <h3 id="rfc.section.2.7.3"><a href="#rfc.section.2.7.3">2.7.3</a>&nbsp;<a id="uri.comparison" href="#uri.comparison">http and https URI Normalization and Comparison</a></h3>
    1107       <p id="rfc.section.2.7.3.p.1">Since the "http" and "https" schemes conform to the URI generic syntax, such URIs are normalized and compared according to
    1108          the algorithm defined in <a href="#RFC3986" id="rfc.xref.RFC3986.15"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-6">Section 6</a>, using the defaults described above for each scheme.
    1109       </p>
    1110       <p id="rfc.section.2.7.3.p.2">If the port is equal to the default port for a scheme, the normal form is to omit the port subcomponent. When not being used
    1111          in absolute form as the request target of an OPTIONS request, an empty path component is equivalent to an absolute path of
    1112          "/", so the normal form is to provide a path of "/" instead. The scheme and host are case-insensitive and normally provided
    1113          in lowercase; all other components are compared in a case-sensitive manner. Characters other than those in the "reserved"
    1114          set are equivalent to their percent-encoded octets (see <a href="#RFC3986" id="rfc.xref.RFC3986.16"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-2.1">Section 2.1</a>): the normal form is to not encode them.
    1115       </p>
    1116       <p id="rfc.section.2.7.3.p.3">For example, the following three URIs are equivalent:</p>
    1117       <div id="rfc.figure.u.10"></div><pre class="text">   http://example.com:80/~smith/home.html
     1141                  "https" scheme have no shared identity with the "http" scheme even if their resource identifiers indicate the same authority
     1142                  (the same host listening to the same TCP port). They are distinct name spaces and are considered to be distinct origin servers.
     1143                  However, an extension to HTTP that is defined to apply to entire host domains, such as the Cookie protocol <a href="#RFC6265" id="rfc.xref.RFC6265.1"><cite title="HTTP State Management Mechanism">[RFC6265]</cite></a>, can allow information set by one service to impact communication with other services within a matching group of host domains.
     1144               </p>
     1145               <p id="rfc.section.2.7.2.p.5">The process for authoritative access to an "https" identified resource is defined in <a href="#RFC2818" id="rfc.xref.RFC2818.2"><cite title="HTTP Over TLS">[RFC2818]</cite></a>.
     1146               </p>
     1147            </div>
     1148            <div id="uri.comparison">
     1149               <h3 id="rfc.section.2.7.3"><a href="#rfc.section.2.7.3">2.7.3</a>&nbsp;<a href="#uri.comparison">http and https URI Normalization and Comparison</a></h3>
     1150               <p id="rfc.section.2.7.3.p.1">Since the "http" and "https" schemes conform to the URI generic syntax, such URIs are normalized and compared according to
     1151                  the algorithm defined in <a href="#RFC3986" id="rfc.xref.RFC3986.15"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-6">Section 6</a>, using the defaults described above for each scheme.
     1152               </p>
     1153               <p id="rfc.section.2.7.3.p.2">If the port is equal to the default port for a scheme, the normal form is to omit the port subcomponent. When not being used
     1154                  in absolute form as the request target of an OPTIONS request, an empty path component is equivalent to an absolute path of
     1155                  "/", so the normal form is to provide a path of "/" instead. The scheme and host are case-insensitive and normally provided
     1156                  in lowercase; all other components are compared in a case-sensitive manner. Characters other than those in the "reserved"
     1157                  set are equivalent to their percent-encoded octets (see <a href="#RFC3986" id="rfc.xref.RFC3986.16"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-2.1">Section 2.1</a>): the normal form is to not encode them.
     1158               </p>
     1159               <p id="rfc.section.2.7.3.p.3">For example, the following three URIs are equivalent:</p>
     1160               <div id="rfc.figure.u.10"></div><pre class="text">   http://example.com:80/~smith/home.html
    11181161   http://EXAMPLE.com/%7Esmith/home.html
    11191162   http://EXAMPLE.com:/%7esmith/home.html
    1120 </pre><h1 id="rfc.section.3"><a href="#rfc.section.3">3.</a>&nbsp;<a id="http.message" href="#http.message">Message Format</a></h1>
    1121       <div id="rfc.iref.h.3"></div>
    1122       <div id="rfc.iref.h.4"></div>
    1123       <div id="rfc.iref.h.5"></div>
    1124       <p id="rfc.section.3.p.1">All HTTP/1.1 messages consist of a start-line followed by a sequence of octets in a format similar to the Internet Message
    1125          Format <a href="#RFC5322" id="rfc.xref.RFC5322.2"><cite title="Internet Message Format">[RFC5322]</cite></a>: zero or more header fields (collectively referred to as the "headers" or the "header section"), an empty line indicating
    1126          the end of the header section, and an optional message body.
    1127       </p>
    1128       <div id="rfc.figure.u.11"></div><pre class="inline"><span id="rfc.iref.g.28"></span>  <a href="#http.message" class="smpl">HTTP-message</a>   = <a href="#http.message" class="smpl">start-line</a>
     1163</pre></div>
     1164         </div>
     1165      </div>
     1166      <div id="http.message">
     1167         <h1 id="rfc.section.3"><a href="#rfc.section.3">3.</a>&nbsp;<a href="#http.message">Message Format</a></h1>
     1168         <div id="rfc.iref.h.3"></div>
     1169         <div id="rfc.iref.h.4"></div>
     1170         <div id="rfc.iref.h.5"></div>
     1171         <p id="rfc.section.3.p.1">All HTTP/1.1 messages consist of a start-line followed by a sequence of octets in a format similar to the Internet Message
     1172            Format <a href="#RFC5322" id="rfc.xref.RFC5322.2"><cite title="Internet Message Format">[RFC5322]</cite></a>: zero or more header fields (collectively referred to as the "headers" or the "header section"), an empty line indicating
     1173            the end of the header section, and an optional message body.
     1174         </p>
     1175         <div id="rfc.figure.u.11"></div><pre class="inline"><span id="rfc.iref.g.28"></span>  <a href="#http.message" class="smpl">HTTP-message</a>   = <a href="#http.message" class="smpl">start-line</a>
    11291176                   *( <a href="#header.fields" class="smpl">header-field</a> <a href="#core.rules" class="smpl">CRLF</a> )
    11301177                   <a href="#core.rules" class="smpl">CRLF</a>
    11311178                   [ <a href="#message.body" class="smpl">message-body</a> ]
    11321179</pre><p id="rfc.section.3.p.3">The normal procedure for parsing an HTTP message is to read the start-line into a structure, read each header field into a
    1133          hash table by field name until the empty line, and then use the parsed data to determine if a message body is expected. If
    1134          a message body has been indicated, then it is read as a stream until an amount of octets equal to the message body length
    1135          is read or the connection is closed.
    1136       </p>
    1137       <p id="rfc.section.3.p.4">Recipients <em class="bcp14">MUST</em> parse an HTTP message as a sequence of octets in an encoding that is a superset of US-ASCII <a href="#USASCII" id="rfc.xref.USASCII.2"><cite title="Coded Character Set -- 7-bit American Standard Code for Information Interchange">[USASCII]</cite></a>. Parsing an HTTP message as a stream of Unicode characters, without regard for the specific encoding, creates security vulnerabilities
    1138          due to the varying ways that string processing libraries handle invalid multibyte character sequences that contain the octet
    1139          LF (%x0A). String-based parsers can only be safely used within protocol elements after the element has been extracted from
    1140          the message, such as within a header field-value after message parsing has delineated the individual fields.
    1141       </p>
    1142       <p id="rfc.section.3.p.5">An HTTP message can be parsed as a stream for incremental processing or forwarding downstream. However, recipients cannot
    1143          rely on incremental delivery of partial messages, since some implementations will buffer or delay message forwarding for the
    1144          sake of network efficiency, security checks, or payload transformations.
    1145       </p>
    1146       <p id="rfc.section.3.p.6">A sender <em class="bcp14">MUST NOT</em> send whitespace between the start-line and the first header field. A recipient that receives whitespace between the start-line
    1147          and the first header field <em class="bcp14">MUST</em> either reject the message as invalid or consume each whitespace-preceded line without further processing of it (i.e., ignore
    1148          the entire line, along with any subsequent lines preceded by whitespace, until a properly formed header field is received
    1149          or the header block is terminated).
    1150       </p>
    1151       <p id="rfc.section.3.p.7">The presence of such whitespace in a request might be an attempt to trick a server into ignoring that field or processing
    1152          the line after it as a new request, either of which might result in a security vulnerability if other implementations within
    1153          the request chain interpret the same message differently. Likewise, the presence of such whitespace in a response might be
    1154          ignored by some clients or cause others to cease parsing.
    1155       </p>
    1156       <h2 id="rfc.section.3.1"><a href="#rfc.section.3.1">3.1</a>&nbsp;<a id="start.line" href="#start.line">Start Line</a></h2>
    1157       <p id="rfc.section.3.1.p.1">An HTTP message can either be a request from client to server or a response from server to client. Syntactically, the two
    1158          types of message differ only in the start-line, which is either a request-line (for requests) or a status-line (for responses),
    1159          and in the algorithm for determining the length of the message body (<a href="#message.body" title="Message Body">Section&nbsp;3.3</a>).
    1160       </p>
    1161       <p id="rfc.section.3.1.p.2">In theory, a client could receive requests and a server could receive responses, distinguishing them by their different start-line
    1162          formats, but in practice servers are implemented to only expect a request (a response is interpreted as an unknown or invalid
    1163          request method) and clients are implemented to only expect a response.
    1164       </p>
    1165       <div id="rfc.figure.u.12"></div><pre class="inline"><span id="rfc.iref.g.29"></span>  <a href="#http.message" class="smpl">start-line</a>     = <a href="#request.line" class="smpl">request-line</a> / <a href="#status.line" class="smpl">status-line</a>
    1166 </pre><h3 id="rfc.section.3.1.1"><a href="#rfc.section.3.1.1">3.1.1</a>&nbsp;<a id="request.line" href="#request.line">Request Line</a></h3>
    1167       <p id="rfc.section.3.1.1.p.1">A request-line begins with a method token, followed by a single space (SP), the request-target, another single space (SP),
    1168          the protocol version, and ending with CRLF.
    1169       </p>
    1170       <div id="rfc.figure.u.13"></div><pre class="inline"><span id="rfc.iref.g.30"></span>  <a href="#request.line" class="smpl">request-line</a>   = <a href="#method" class="smpl">method</a> <a href="#core.rules" class="smpl">SP</a> <a href="#request-target" class="smpl">request-target</a> <a href="#core.rules" class="smpl">SP</a> <a href="#http.version" class="smpl">HTTP-version</a> <a href="#core.rules" class="smpl">CRLF</a>
     1180            hash table by field name until the empty line, and then use the parsed data to determine if a message body is expected. If
     1181            a message body has been indicated, then it is read as a stream until an amount of octets equal to the message body length
     1182            is read or the connection is closed.
     1183         </p>
     1184         <p id="rfc.section.3.p.4">Recipients <em class="bcp14">MUST</em> parse an HTTP message as a sequence of octets in an encoding that is a superset of US-ASCII <a href="#USASCII" id="rfc.xref.USASCII.2"><cite title="Coded Character Set -- 7-bit American Standard Code for Information Interchange">[USASCII]</cite></a>. Parsing an HTTP message as a stream of Unicode characters, without regard for the specific encoding, creates security vulnerabilities
     1185            due to the varying ways that string processing libraries handle invalid multibyte character sequences that contain the octet
     1186            LF (%x0A). String-based parsers can only be safely used within protocol elements after the element has been extracted from
     1187            the message, such as within a header field-value after message parsing has delineated the individual fields.
     1188         </p>
     1189         <p id="rfc.section.3.p.5">An HTTP message can be parsed as a stream for incremental processing or forwarding downstream. However, recipients cannot
     1190            rely on incremental delivery of partial messages, since some implementations will buffer or delay message forwarding for the
     1191            sake of network efficiency, security checks, or payload transformations.
     1192         </p>
     1193         <p id="rfc.section.3.p.6">A sender <em class="bcp14">MUST NOT</em> send whitespace between the start-line and the first header field. A recipient that receives whitespace between the start-line
     1194            and the first header field <em class="bcp14">MUST</em> either reject the message as invalid or consume each whitespace-preceded line without further processing of it (i.e., ignore
     1195            the entire line, along with any subsequent lines preceded by whitespace, until a properly formed header field is received
     1196            or the header block is terminated).
     1197         </p>
     1198         <p id="rfc.section.3.p.7">The presence of such whitespace in a request might be an attempt to trick a server into ignoring that field or processing
     1199            the line after it as a new request, either of which might result in a security vulnerability if other implementations within
     1200            the request chain interpret the same message differently. Likewise, the presence of such whitespace in a response might be
     1201            ignored by some clients or cause others to cease parsing.
     1202         </p>
     1203         <div id="start.line">
     1204            <h2 id="rfc.section.3.1"><a href="#rfc.section.3.1">3.1</a>&nbsp;<a href="#start.line">Start Line</a></h2>
     1205            <p id="rfc.section.3.1.p.1">An HTTP message can either be a request from client to server or a response from server to client. Syntactically, the two
     1206               types of message differ only in the start-line, which is either a request-line (for requests) or a status-line (for responses),
     1207               and in the algorithm for determining the length of the message body (<a href="#message.body" title="Message Body">Section&nbsp;3.3</a>).
     1208            </p>
     1209            <p id="rfc.section.3.1.p.2">In theory, a client could receive requests and a server could receive responses, distinguishing them by their different start-line
     1210               formats, but in practice servers are implemented to only expect a request (a response is interpreted as an unknown or invalid
     1211               request method) and clients are implemented to only expect a response.
     1212            </p>
     1213            <div id="rfc.figure.u.12"></div><pre class="inline"><span id="rfc.iref.g.29"></span>  <a href="#http.message" class="smpl">start-line</a>     = <a href="#request.line" class="smpl">request-line</a> / <a href="#status.line" class="smpl">status-line</a>
     1214</pre><div id="request.line">
     1215               <h3 id="rfc.section.3.1.1"><a href="#rfc.section.3.1.1">3.1.1</a>&nbsp;<a href="#request.line">Request Line</a></h3>
     1216               <p id="rfc.section.3.1.1.p.1">A request-line begins with a method token, followed by a single space (SP), the request-target, another single space (SP),
     1217                  the protocol version, and ending with CRLF.
     1218               </p>
     1219               <div id="rfc.figure.u.13"></div><pre class="inline"><span id="rfc.iref.g.30"></span>  <a href="#request.line" class="smpl">request-line</a>   = <a href="#method" class="smpl">method</a> <a href="#core.rules" class="smpl">SP</a> <a href="#request-target" class="smpl">request-target</a> <a href="#core.rules" class="smpl">SP</a> <a href="#http.version" class="smpl">HTTP-version</a> <a href="#core.rules" class="smpl">CRLF</a>
    11711220</pre><div id="rfc.iref.m.2"></div>
    1172       <div id="method">
    1173          <p id="rfc.section.3.1.1.p.3">The method token indicates the request method to be performed on the target resource. The request method is case-sensitive.</p>
    1174       </div>
    1175       <div id="rfc.figure.u.14"></div><pre class="inline"><span id="rfc.iref.g.31"></span>  <a href="#method" class="smpl">method</a>         = <a href="#rule.token.separators" class="smpl">token</a>
     1221               <div id="method">
     1222                  <p id="rfc.section.3.1.1.p.3">The method token indicates the request method to be performed on the target resource. The request method is case-sensitive.</p>
     1223               </div>
     1224               <div id="rfc.figure.u.14"></div><pre class="inline"><span id="rfc.iref.g.31"></span>  <a href="#method" class="smpl">method</a>         = <a href="#rule.token.separators" class="smpl">token</a>
    11761225</pre><p id="rfc.section.3.1.1.p.5">The methods defined by this specification can be found in <a href="p2-semantics.html#methods" title="Request Methods">Section 4</a> of <a href="#Part2" id="rfc.xref.Part2.6"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>, along with information regarding the HTTP method registry and considerations for defining new methods.
    1177       </p>
    1178       <div id="rfc.iref.r.6"></div>
    1179       <p id="rfc.section.3.1.1.p.6">The request-target identifies the target resource upon which to apply the request, as defined in <a href="#request-target" title="Request Target">Section&nbsp;5.3</a>.
    1180       </p>
    1181       <p id="rfc.section.3.1.1.p.7">Recipients typically parse the request-line into its component parts by splitting on whitespace (see <a href="#message.robustness" title="Message Parsing Robustness">Section&nbsp;3.5</a>), since no whitespace is allowed in the three components. Unfortunately, some user agents fail to properly encode or exclude
    1182          whitespace found in hypertext references, resulting in those disallowed characters being sent in a request-target.
    1183       </p>
    1184       <p id="rfc.section.3.1.1.p.8">Recipients of an invalid request-line <em class="bcp14">SHOULD</em> respond with either a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> error or a <a href="p2-semantics.html#status.301" class="smpl">301 (Moved Permanently)</a> redirect with the request-target properly encoded. Recipients <em class="bcp14">SHOULD NOT</em> attempt to autocorrect and then process the request without a redirect, since the invalid request-line might be deliberately
    1185          crafted to bypass security filters along the request chain.
    1186       </p>
    1187       <p id="rfc.section.3.1.1.p.9">HTTP does not place a pre-defined limit on the length of a request-line. A server that receives a method longer than any that
    1188          it implements <em class="bcp14">SHOULD</em> respond with a <a href="p2-semantics.html#status.501" class="smpl">501 (Not Implemented)</a> status code. A server <em class="bcp14">MUST</em> be prepared to receive URIs of unbounded length and respond with the <a href="p2-semantics.html#status.414" class="smpl">414 (URI Too Long)</a> status code if the received request-target would be longer than the server wishes to handle (see <a href="p2-semantics.html#status.414" title="414 URI Too Long">Section 6.5.12</a> of <a href="#Part2" id="rfc.xref.Part2.7"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
    1189       </p>
    1190       <p id="rfc.section.3.1.1.p.10">Various ad-hoc limitations on request-line length are found in practice. It is <em class="bcp14">RECOMMENDED</em> that all HTTP senders and recipients support, at a minimum, request-line lengths of 8000 octets.
    1191       </p>
    1192       <h3 id="rfc.section.3.1.2"><a href="#rfc.section.3.1.2">3.1.2</a>&nbsp;<a id="status.line" href="#status.line">Status Line</a></h3>
    1193       <p id="rfc.section.3.1.2.p.1">The first line of a response message is the status-line, consisting of the protocol version, a space (SP), the status code,
    1194          another space, a possibly-empty textual phrase describing the status code, and ending with CRLF.
    1195       </p>
    1196       <div id="rfc.figure.u.15"></div><pre class="inline"><span id="rfc.iref.g.32"></span>  <a href="#status.line" class="smpl">status-line</a> = <a href="#http.version" class="smpl">HTTP-version</a> <a href="#core.rules" class="smpl">SP</a> <a href="#status.line" class="smpl">status-code</a> <a href="#core.rules" class="smpl">SP</a> <a href="#status.line" class="smpl">reason-phrase</a> <a href="#core.rules" class="smpl">CRLF</a>
     1226               </p>
     1227               <div id="rfc.iref.r.6"></div>
     1228               <p id="rfc.section.3.1.1.p.6">The request-target identifies the target resource upon which to apply the request, as defined in <a href="#request-target" title="Request Target">Section&nbsp;5.3</a>.
     1229               </p>
     1230               <p id="rfc.section.3.1.1.p.7">Recipients typically parse the request-line into its component parts by splitting on whitespace (see <a href="#message.robustness" title="Message Parsing Robustness">Section&nbsp;3.5</a>), since no whitespace is allowed in the three components. Unfortunately, some user agents fail to properly encode or exclude
     1231                  whitespace found in hypertext references, resulting in those disallowed characters being sent in a request-target.
     1232               </p>
     1233               <p id="rfc.section.3.1.1.p.8">Recipients of an invalid request-line <em class="bcp14">SHOULD</em> respond with either a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> error or a <a href="p2-semantics.html#status.301" class="smpl">301 (Moved Permanently)</a> redirect with the request-target properly encoded. Recipients <em class="bcp14">SHOULD NOT</em> attempt to autocorrect and then process the request without a redirect, since the invalid request-line might be deliberately
     1234                  crafted to bypass security filters along the request chain.
     1235               </p>
     1236               <p id="rfc.section.3.1.1.p.9">HTTP does not place a pre-defined limit on the length of a request-line. A server that receives a method longer than any that
     1237                  it implements <em class="bcp14">SHOULD</em> respond with a <a href="p2-semantics.html#status.501" class="smpl">501 (Not Implemented)</a> status code. A server <em class="bcp14">MUST</em> be prepared to receive URIs of unbounded length and respond with the <a href="p2-semantics.html#status.414" class="smpl">414 (URI Too Long)</a> status code if the received request-target would be longer than the server wishes to handle (see <a href="p2-semantics.html#status.414" title="414 URI Too Long">Section 6.5.12</a> of <a href="#Part2" id="rfc.xref.Part2.7"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
     1238               </p>
     1239               <p id="rfc.section.3.1.1.p.10">Various ad-hoc limitations on request-line length are found in practice. It is <em class="bcp14">RECOMMENDED</em> that all HTTP senders and recipients support, at a minimum, request-line lengths of 8000 octets.
     1240               </p>
     1241            </div>
     1242            <div id="status.line">
     1243               <h3 id="rfc.section.3.1.2"><a href="#rfc.section.3.1.2">3.1.2</a>&nbsp;<a href="#status.line">Status Line</a></h3>
     1244               <p id="rfc.section.3.1.2.p.1">The first line of a response message is the status-line, consisting of the protocol version, a space (SP), the status code,
     1245                  another space, a possibly-empty textual phrase describing the status code, and ending with CRLF.
     1246               </p>
     1247               <div id="rfc.figure.u.15"></div><pre class="inline"><span id="rfc.iref.g.32"></span>  <a href="#status.line" class="smpl">status-line</a> = <a href="#http.version" class="smpl">HTTP-version</a> <a href="#core.rules" class="smpl">SP</a> <a href="#status.line" class="smpl">status-code</a> <a href="#core.rules" class="smpl">SP</a> <a href="#status.line" class="smpl">reason-phrase</a> <a href="#core.rules" class="smpl">CRLF</a>
    11971248</pre><p id="rfc.section.3.1.2.p.3">The status-code element is a 3-digit integer code describing the result of the server's attempt to understand and satisfy
    1198          the client's corresponding request. The rest of the response message is to be interpreted in light of the semantics defined
    1199          for that status code. See <a href="p2-semantics.html#status.codes" title="Response Status Codes">Section 6</a> of <a href="#Part2" id="rfc.xref.Part2.8"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> for information about the semantics of status codes, including the classes of status code (indicated by the first digit),
    1200          the status codes defined by this specification, considerations for the definition of new status codes, and the IANA registry.
    1201       </p>
    1202       <div id="rfc.figure.u.16"></div><pre class="inline"><span id="rfc.iref.g.33"></span>  <a href="#status.line" class="smpl">status-code</a>    = 3<a href="#core.rules" class="smpl">DIGIT</a>
     1249                  the client's corresponding request. The rest of the response message is to be interpreted in light of the semantics defined
     1250                  for that status code. See <a href="p2-semantics.html#status.codes" title="Response Status Codes">Section 6</a> of <a href="#Part2" id="rfc.xref.Part2.8"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> for information about the semantics of status codes, including the classes of status code (indicated by the first digit),
     1251                  the status codes defined by this specification, considerations for the definition of new status codes, and the IANA registry.
     1252               </p>
     1253               <div id="rfc.figure.u.16"></div><pre class="inline"><span id="rfc.iref.g.33"></span>  <a href="#status.line" class="smpl">status-code</a>    = 3<a href="#core.rules" class="smpl">DIGIT</a>
    12031254</pre><p id="rfc.section.3.1.2.p.5">The reason-phrase element exists for the sole purpose of providing a textual description associated with the numeric status
    1204          code, mostly out of deference to earlier Internet application protocols that were more frequently used with interactive text
    1205          clients. A client <em class="bcp14">SHOULD</em> ignore the reason-phrase content.
    1206       </p>
    1207       <div id="rfc.figure.u.17"></div><pre class="inline"><span id="rfc.iref.g.34"></span>  <a href="#status.line" class="smpl">reason-phrase</a>  = *( <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">VCHAR</a> / <a href="#rule.quoted-string" class="smpl">obs-text</a> )
    1208 </pre><h2 id="rfc.section.3.2"><a href="#rfc.section.3.2">3.2</a>&nbsp;<a id="header.fields" href="#header.fields">Header Fields</a></h2>
    1209       <p id="rfc.section.3.2.p.1">Each HTTP header field consists of a case-insensitive field name followed by a colon (":"), optional leading whitespace, the
    1210          field value, and optional trailing whitespace.
    1211       </p>
    1212       <div id="rfc.figure.u.18"></div><pre class="inline"><span id="rfc.iref.g.35"></span><span id="rfc.iref.g.36"></span><span id="rfc.iref.g.37"></span><span id="rfc.iref.g.38"></span><span id="rfc.iref.g.39"></span>  <a href="#header.fields" class="smpl">header-field</a>   = <a href="#header.fields" class="smpl">field-name</a> ":" <a href="#rule.whitespace" class="smpl">OWS</a> <a href="#header.fields" class="smpl">field-value</a> <a href="#rule.whitespace" class="smpl">OWS</a>
     1255                  code, mostly out of deference to earlier Internet application protocols that were more frequently used with interactive text
     1256                  clients. A client <em class="bcp14">SHOULD</em> ignore the reason-phrase content.
     1257               </p>
     1258               <div id="rfc.figure.u.17"></div><pre class="inline"><span id="rfc.iref.g.34"></span>  <a href="#status.line" class="smpl">reason-phrase</a>  = *( <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">VCHAR</a> / <a href="#rule.quoted-string" class="smpl">obs-text</a> )
     1259</pre></div>
     1260         </div>
     1261         <div id="header.fields">
     1262            <h2 id="rfc.section.3.2"><a href="#rfc.section.3.2">3.2</a>&nbsp;<a href="#header.fields">Header Fields</a></h2>
     1263            <p id="rfc.section.3.2.p.1">Each HTTP header field consists of a case-insensitive field name followed by a colon (":"), optional leading whitespace, the
     1264               field value, and optional trailing whitespace.
     1265            </p>
     1266            <div id="rfc.figure.u.18"></div><pre class="inline"><span id="rfc.iref.g.35"></span><span id="rfc.iref.g.36"></span><span id="rfc.iref.g.37"></span><span id="rfc.iref.g.38"></span><span id="rfc.iref.g.39"></span>  <a href="#header.fields" class="smpl">header-field</a>   = <a href="#header.fields" class="smpl">field-name</a> ":" <a href="#rule.whitespace" class="smpl">OWS</a> <a href="#header.fields" class="smpl">field-value</a> <a href="#rule.whitespace" class="smpl">OWS</a>
    12131267  <a href="#header.fields" class="smpl">field-name</a>     = <a href="#rule.token.separators" class="smpl">token</a>
    12141268  <a href="#header.fields" class="smpl">field-value</a>    = *( <a href="#header.fields" class="smpl">field-content</a> / <a href="#header.fields" class="smpl">obs-fold</a> )
     
    12181272                 ; see <a href="#field.parsing" title="Field Parsing">Section&nbsp;3.2.4</a>
    12191273</pre><p id="rfc.section.3.2.p.3">The field-name token labels the corresponding field-value as having the semantics defined by that header field. For example,
    1220          the <a href="p2-semantics.html#header.date" class="smpl">Date</a> header field is defined in <a href="p2-semantics.html#header.date" title="Date">Section 7.1.1.2</a> of <a href="#Part2" id="rfc.xref.Part2.9"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> as containing the origination timestamp for the message in which it appears.
    1221       </p>
    1222       <h3 id="rfc.section.3.2.1"><a href="#rfc.section.3.2.1">3.2.1</a>&nbsp;<a id="field.extensibility" href="#field.extensibility">Field Extensibility</a></h3>
    1223       <p id="rfc.section.3.2.1.p.1">HTTP header fields are fully extensible: there is no limit on the introduction of new field names, each presumably defining
    1224          new semantics, nor on the number of header fields used in a given message. Existing fields are defined in each part of this
    1225          specification and in many other specifications outside the core standard. New header fields can be introduced without changing
    1226          the protocol version if their defined semantics allow them to be safely ignored by recipients that do not recognize them.
    1227       </p>
    1228       <p id="rfc.section.3.2.1.p.2">New HTTP header fields ought to be registered with IANA in the Message Header Field Registry, as described in <a href="p2-semantics.html#header.field.registry" title="Header Field Registry">Section 8.3</a> of <a href="#Part2" id="rfc.xref.Part2.10"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>. A proxy <em class="bcp14">MUST</em> forward unrecognized header fields unless the field-name is listed in the <a href="#header.connection" class="smpl">Connection</a> header field (<a href="#header.connection" id="rfc.xref.header.connection.2" title="Connection">Section&nbsp;6.1</a>) or the proxy is specifically configured to block, or otherwise transform, such fields. Other recipients <em class="bcp14">SHOULD</em> ignore unrecognized header fields.
    1229       </p>
    1230       <h3 id="rfc.section.3.2.2"><a href="#rfc.section.3.2.2">3.2.2</a>&nbsp;<a id="field.order" href="#field.order">Field Order</a></h3>
    1231       <p id="rfc.section.3.2.2.p.1">The order in which header fields with differing field names are received is not significant. However, it is "good practice"
    1232          to send header fields that contain control data first, such as <a href="#header.host" class="smpl">Host</a> on requests and <a href="p2-semantics.html#header.date" class="smpl">Date</a> on responses, so that implementations can decide when not to handle a message as early as possible. A server <em class="bcp14">MUST</em> wait until the entire header section is received before interpreting a request message, since later header fields might include
    1233          conditionals, authentication credentials, or deliberately misleading duplicate header fields that would impact request processing.
    1234       </p>
    1235       <p id="rfc.section.3.2.2.p.2">A sender <em class="bcp14">MUST NOT</em> generate multiple header fields with the same field name in a message unless either the entire field value for that header
    1236          field is defined as a comma-separated list [i.e., #(values)] or the header field is a well-known exception (as noted below).
    1237       </p>
    1238       <p id="rfc.section.3.2.2.p.3">Multiple header fields with the same field name can be combined into one "field-name: field-value" pair, without changing
    1239          the semantics of the message, by appending each subsequent field value to the combined field value in order, separated by
    1240          a comma. The order in which header fields with the same field name are received is therefore significant to the interpretation
    1241          of the combined field value; a proxy <em class="bcp14">MUST NOT</em> change the order of these field values when forwarding a message.
    1242       </p>
    1243       <div class="note" id="rfc.section.3.2.2.p.4">
    1244          <p><b>Note:</b> In practice, the "Set-Cookie" header field (<a href="#RFC6265" id="rfc.xref.RFC6265.2"><cite title="HTTP State Management Mechanism">[RFC6265]</cite></a>) often appears multiple times in a response message and does not use the list syntax, violating the above requirements on
    1245             multiple header fields with the same name. Since it cannot be combined into a single field-value, recipients ought to handle
    1246             "Set-Cookie" as a special case while processing header fields. (See Appendix A.2.3 of <a href="#Kri2001" id="rfc.xref.Kri2001.1"><cite title="HTTP Cookies: Standards, Privacy, and Politics">[Kri2001]</cite></a> for details.)
    1247          </p>
    1248       </div>
    1249       <h3 id="rfc.section.3.2.3"><a href="#rfc.section.3.2.3">3.2.3</a>&nbsp;<a id="whitespace" href="#whitespace">Whitespace</a></h3>
    1250       <div id="rule.LWS">
    1251          <p id="rfc.section.3.2.3.p.1">This specification uses three rules to denote the use of linear whitespace: OWS (optional whitespace), RWS (required whitespace),
    1252             and BWS ("bad" whitespace).
    1253          </p>
    1254       </div>
    1255       <div id="rule.OWS">
    1256          <p id="rfc.section.3.2.3.p.2">The OWS rule is used where zero or more linear whitespace octets might appear. For protocol elements where optional whitespace
    1257             is preferred to improve readability, a sender <em class="bcp14">SHOULD</em> generate the optional whitespace as a single SP; otherwise, a sender <em class="bcp14">SHOULD NOT</em> generate optional whitespace except as needed to white-out invalid or unwanted protocol elements during in-place message filtering.
    1258          </p>
    1259       </div>
    1260       <div id="rule.RWS">
    1261          <p id="rfc.section.3.2.3.p.3">The RWS rule is used when at least one linear whitespace octet is required to separate field tokens. A sender <em class="bcp14">SHOULD</em> generate RWS as a single SP.
    1262          </p>
    1263       </div>
    1264       <div id="rule.BWS">
    1265          <p id="rfc.section.3.2.3.p.4">The BWS rule is used where the grammar allows optional whitespace only for historical reasons. A sender <em class="bcp14">MUST NOT</em> generate BWS in messages. A recipient <em class="bcp14">MUST</em> parse for such bad whitespace and remove it before interpreting the protocol element.
    1266          </p>
    1267       </div>
    1268       <div id="rule.whitespace">
    1269          <p id="rfc.section.3.2.3.p.5">   </p>
    1270       </div>
    1271       <div id="rfc.figure.u.19"></div><pre class="inline"><span id="rfc.iref.g.40"></span><span id="rfc.iref.g.41"></span><span id="rfc.iref.g.42"></span>  <a href="#rule.whitespace" class="smpl">OWS</a>            = *( <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">HTAB</a> )
     1274               the <a href="p2-semantics.html#header.date" class="smpl">Date</a> header field is defined in <a href="p2-semantics.html#header.date" title="Date">Section 7.1.1.2</a> of <a href="#Part2" id="rfc.xref.Part2.9"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a> as containing the origination timestamp for the message in which it appears.
     1275            </p>
     1276            <div id="field.extensibility">
     1277               <h3 id="rfc.section.3.2.1"><a href="#rfc.section.3.2.1">3.2.1</a>&nbsp;<a href="#field.extensibility">Field Extensibility</a></h3>
     1278               <p id="rfc.section.3.2.1.p.1">HTTP header fields are fully extensible: there is no limit on the introduction of new field names, each presumably defining
     1279                  new semantics, nor on the number of header fields used in a given message. Existing fields are defined in each part of this
     1280                  specification and in many other specifications outside the core standard. New header fields can be introduced without changing
     1281                  the protocol version if their defined semantics allow them to be safely ignored by recipients that do not recognize them.
     1282               </p>
     1283               <p id="rfc.section.3.2.1.p.2">New HTTP header fields ought to be registered with IANA in the Message Header Field Registry, as described in <a href="p2-semantics.html#header.field.registry" title="Header Field Registry">Section 8.3</a> of <a href="#Part2" id="rfc.xref.Part2.10"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>. A proxy <em class="bcp14">MUST</em> forward unrecognized header fields unless the field-name is listed in the <a href="#header.connection" class="smpl">Connection</a> header field (<a href="#header.connection" id="rfc.xref.header.connection.2" title="Connection">Section&nbsp;6.1</a>) or the proxy is specifically configured to block, or otherwise transform, such fields. Other recipients <em class="bcp14">SHOULD</em> ignore unrecognized header fields.
     1284               </p>
     1285            </div>
     1286            <div id="field.order">
     1287               <h3 id="rfc.section.3.2.2"><a href="#rfc.section.3.2.2">3.2.2</a>&nbsp;<a href="#field.order">Field Order</a></h3>
     1288               <p id="rfc.section.3.2.2.p.1">The order in which header fields with differing field names are received is not significant. However, it is "good practice"
     1289                  to send header fields that contain control data first, such as <a href="#header.host" class="smpl">Host</a> on requests and <a href="p2-semantics.html#header.date" class="smpl">Date</a> on responses, so that implementations can decide when not to handle a message as early as possible. A server <em class="bcp14">MUST</em> wait until the entire header section is received before interpreting a request message, since later header fields might include
     1290                  conditionals, authentication credentials, or deliberately misleading duplicate header fields that would impact request processing.
     1291               </p>
     1292               <p id="rfc.section.3.2.2.p.2">A sender <em class="bcp14">MUST NOT</em> generate multiple header fields with the same field name in a message unless either the entire field value for that header
     1293                  field is defined as a comma-separated list [i.e., #(values)] or the header field is a well-known exception (as noted below).
     1294               </p>
     1295               <p id="rfc.section.3.2.2.p.3">Multiple header fields with the same field name can be combined into one "field-name: field-value" pair, without changing
     1296                  the semantics of the message, by appending each subsequent field value to the combined field value in order, separated by
     1297                  a comma. The order in which header fields with the same field name are received is therefore significant to the interpretation
     1298                  of the combined field value; a proxy <em class="bcp14">MUST NOT</em> change the order of these field values when forwarding a message.
     1299               </p>
     1300               <div class="note" id="rfc.section.3.2.2.p.4">
     1301                  <p><b>Note:</b> In practice, the "Set-Cookie" header field (<a href="#RFC6265" id="rfc.xref.RFC6265.2"><cite title="HTTP State Management Mechanism">[RFC6265]</cite></a>) often appears multiple times in a response message and does not use the list syntax, violating the above requirements on
     1302                     multiple header fields with the same name. Since it cannot be combined into a single field-value, recipients ought to handle
     1303                     "Set-Cookie" as a special case while processing header fields. (See Appendix A.2.3 of <a href="#Kri2001" id="rfc.xref.Kri2001.1"><cite title="HTTP Cookies: Standards, Privacy, and Politics">[Kri2001]</cite></a> for details.)
     1304                  </p>
     1305               </div>
     1306            </div>
     1307            <div id="whitespace">
     1308               <h3 id="rfc.section.3.2.3"><a href="#rfc.section.3.2.3">3.2.3</a>&nbsp;<a href="#whitespace">Whitespace</a></h3>
     1309               <div id="rule.LWS">
     1310                  <p id="rfc.section.3.2.3.p.1">This specification uses three rules to denote the use of linear whitespace: OWS (optional whitespace), RWS (required whitespace),
     1311                     and BWS ("bad" whitespace).
     1312                  </p>
     1313               </div>
     1314               <div id="rule.OWS">
     1315                  <p id="rfc.section.3.2.3.p.2">The OWS rule is used where zero or more linear whitespace octets might appear. For protocol elements where optional whitespace
     1316                     is preferred to improve readability, a sender <em class="bcp14">SHOULD</em> generate the optional whitespace as a single SP; otherwise, a sender <em class="bcp14">SHOULD NOT</em> generate optional whitespace except as needed to white-out invalid or unwanted protocol elements during in-place message filtering.
     1317                  </p>
     1318               </div>
     1319               <div id="rule.RWS">
     1320                  <p id="rfc.section.3.2.3.p.3">The RWS rule is used when at least one linear whitespace octet is required to separate field tokens. A sender <em class="bcp14">SHOULD</em> generate RWS as a single SP.
     1321                  </p>
     1322               </div>
     1323               <div id="rule.BWS">
     1324                  <p id="rfc.section.3.2.3.p.4">The BWS rule is used where the grammar allows optional whitespace only for historical reasons. A sender <em class="bcp14">MUST NOT</em> generate BWS in messages. A recipient <em class="bcp14">MUST</em> parse for such bad whitespace and remove it before interpreting the protocol element.
     1325                  </p>
     1326               </div>
     1327               <div id="rule.whitespace">
     1328                  <p id="rfc.section.3.2.3.p.5">   </p>
     1329               </div>
     1330               <div id="rfc.figure.u.19"></div><pre class="inline"><span id="rfc.iref.g.40"></span><span id="rfc.iref.g.41"></span><span id="rfc.iref.g.42"></span>  <a href="#rule.whitespace" class="smpl">OWS</a>            = *( <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">HTAB</a> )
    12721331                 ; optional whitespace
    12731332  <a href="#rule.whitespace" class="smpl">RWS</a>            = 1*( <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">HTAB</a> )
     
    12751334  <a href="#rule.whitespace" class="smpl">BWS</a>            = <a href="#rule.whitespace" class="smpl">OWS</a>
    12761335                 ; "bad" whitespace
    1277 </pre><h3 id="rfc.section.3.2.4"><a href="#rfc.section.3.2.4">3.2.4</a>&nbsp;<a id="field.parsing" href="#field.parsing">Field Parsing</a></h3>
    1278       <p id="rfc.section.3.2.4.p.1">No whitespace is allowed between the header field-name and colon. In the past, differences in the handling of such whitespace
    1279          have led to security vulnerabilities in request routing and response handling. A server <em class="bcp14">MUST</em> reject any received request message that contains whitespace between a header field-name and colon with a response code of <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a>. A proxy <em class="bcp14">MUST</em> remove any such whitespace from a response message before forwarding the message downstream.
    1280       </p>
    1281       <p id="rfc.section.3.2.4.p.2">A field value is preceded by optional whitespace (OWS); a single SP is preferred. The field value does not include any leading
    1282          or trailing white space: OWS occurring before the first non-whitespace octet of the field value or after the last non-whitespace
    1283          octet of the field value ought to be excluded by parsers when extracting the field value from a header field.
    1284       </p>
    1285       <p id="rfc.section.3.2.4.p.3">A recipient of field-content containing multiple sequential octets of optional (OWS) or required (RWS) whitespace <em class="bcp14">SHOULD</em> either replace the sequence with a single SP or transform any non-SP octets in the sequence to SP octets before interpreting
    1286          the field value or forwarding the message downstream.
    1287       </p>
    1288       <p id="rfc.section.3.2.4.p.4">Historically, HTTP header field values could be extended over multiple lines by preceding each extra line with at least one
    1289          space or horizontal tab (obs-fold). This specification deprecates such line folding except within the message/http media type
    1290          (<a href="#internet.media.type.message.http" title="Internet Media Type message/http">Section&nbsp;7.3.1</a>). Senders <em class="bcp14">MUST NOT</em> generate messages that include line folding (i.e., that contain any field-value that contains a match to the <a href="#header.fields" class="smpl">obs-fold</a> rule) unless the message is intended for packaging within the message/http media type.
    1291       </p>
    1292       <p id="rfc.section.3.2.4.p.5">A server that receives an <a href="#header.fields" class="smpl">obs-fold</a> in a request message that is not within a message/http container <em class="bcp14">MUST</em> either reject the message by sending a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a>, preferably with a representation explaining that obsolete line folding is unacceptable, or replace each received <a href="#header.fields" class="smpl">obs-fold</a> with one or more <a href="#core.rules" class="smpl">SP</a> octets prior to interpreting the field value or forwarding the message downstream.
    1293       </p>
    1294       <p id="rfc.section.3.2.4.p.6">A proxy or gateway that receives an <a href="#header.fields" class="smpl">obs-fold</a> in a response message that is not within a message/http container <em class="bcp14">MUST</em> either discard the message and replace it with a <a href="p2-semantics.html#status.502" class="smpl">502 (Bad Gateway)</a> response, preferably with a representation explaining that unacceptable line folding was received, or replace each received <a href="#header.fields" class="smpl">obs-fold</a> with one or more <a href="#core.rules" class="smpl">SP</a> octets prior to interpreting the field value or forwarding the message downstream.
    1295       </p>
    1296       <p id="rfc.section.3.2.4.p.7">A user agent that receives an <a href="#header.fields" class="smpl">obs-fold</a> in a response message that is not within a message/http container <em class="bcp14">MUST</em> replace each received <a href="#header.fields" class="smpl">obs-fold</a> with one or more <a href="#core.rules" class="smpl">SP</a> octets prior to interpreting the field value.
    1297       </p>
    1298       <p id="rfc.section.3.2.4.p.8">Historically, HTTP has allowed field content with text in the ISO-8859-1 <a href="#ISO-8859-1" id="rfc.xref.ISO-8859-1.1"><cite title="Information technology -- 8-bit single-byte coded graphic character sets -- Part 1: Latin alphabet No. 1">[ISO-8859-1]</cite></a> charset, supporting other charsets only through use of <a href="#RFC2047" id="rfc.xref.RFC2047.1"><cite title="MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text">[RFC2047]</cite></a> encoding. In practice, most HTTP header field values use only a subset of the US-ASCII charset <a href="#USASCII" id="rfc.xref.USASCII.3"><cite title="Coded Character Set -- 7-bit American Standard Code for Information Interchange">[USASCII]</cite></a>. Newly defined header fields <em class="bcp14">SHOULD</em> limit their field values to US-ASCII octets. Recipients <em class="bcp14">SHOULD</em> treat other octets in field content (obs-text) as opaque data.
    1299       </p>
    1300       <h3 id="rfc.section.3.2.5"><a href="#rfc.section.3.2.5">3.2.5</a>&nbsp;<a id="field.limits" href="#field.limits">Field Limits</a></h3>
    1301       <p id="rfc.section.3.2.5.p.1">HTTP does not place a pre-defined limit on the length of each header field or on the length of the header block as a whole.
    1302          Various ad-hoc limitations on individual header field length are found in practice, often depending on the specific field
    1303          semantics.
    1304       </p>
    1305       <p id="rfc.section.3.2.5.p.2">A server <em class="bcp14">MUST</em> be prepared to receive request header fields of unbounded length and respond with an appropriate <a href="p2-semantics.html#status.4xx" class="smpl">4xx (Client Error)</a> status code if the received header field(s) are larger than the server wishes to process.
    1306       </p>
    1307       <p id="rfc.section.3.2.5.p.3">A client <em class="bcp14">MUST</em> be prepared to receive response header fields of unbounded length. A client <em class="bcp14">MAY</em> discard or truncate received header fields that are larger than the client wishes to process if the field semantics are such
    1308          that the dropped value(s) can be safely ignored without changing the response semantics.
    1309       </p>
    1310       <h3 id="rfc.section.3.2.6"><a href="#rfc.section.3.2.6">3.2.6</a>&nbsp;<a id="field.components" href="#field.components">Field value components</a></h3>
    1311       <div id="rule.token.separators">
    1312          <p id="rfc.section.3.2.6.p.1">    Many HTTP header field values consist of words (token or quoted-string) separated by whitespace or special characters. These
    1313             special characters <em class="bcp14">MUST</em> be in a quoted string to be used within a parameter value (as defined in <a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>).
    1314          </p>
    1315       </div>
    1316       <div id="rfc.figure.u.20"></div><pre class="inline"><span id="rfc.iref.g.43"></span><span id="rfc.iref.g.44"></span><span id="rfc.iref.g.45"></span><span id="rfc.iref.g.46"></span>  <a href="#rule.token.separators" class="smpl">word</a>           = <a href="#rule.token.separators" class="smpl">token</a> / <a href="#rule.quoted-string" class="smpl">quoted-string</a>
     1336</pre></div>
     1337            <div id="field.parsing">
     1338               <h3 id="rfc.section.3.2.4"><a href="#rfc.section.3.2.4">3.2.4</a>&nbsp;<a href="#field.parsing">Field Parsing</a></h3>
     1339               <p id="rfc.section.3.2.4.p.1">No whitespace is allowed between the header field-name and colon. In the past, differences in the handling of such whitespace
     1340                  have led to security vulnerabilities in request routing and response handling. A server <em class="bcp14">MUST</em> reject any received request message that contains whitespace between a header field-name and colon with a response code of <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a>. A proxy <em class="bcp14">MUST</em> remove any such whitespace from a response message before forwarding the message downstream.
     1341               </p>
     1342               <p id="rfc.section.3.2.4.p.2">A field value is preceded by optional whitespace (OWS); a single SP is preferred. The field value does not include any leading
     1343                  or trailing white space: OWS occurring before the first non-whitespace octet of the field value or after the last non-whitespace
     1344                  octet of the field value ought to be excluded by parsers when extracting the field value from a header field.
     1345               </p>
     1346               <p id="rfc.section.3.2.4.p.3">A recipient of field-content containing multiple sequential octets of optional (OWS) or required (RWS) whitespace <em class="bcp14">SHOULD</em> either replace the sequence with a single SP or transform any non-SP octets in the sequence to SP octets before interpreting
     1347                  the field value or forwarding the message downstream.
     1348               </p>
     1349               <p id="rfc.section.3.2.4.p.4">Historically, HTTP header field values could be extended over multiple lines by preceding each extra line with at least one
     1350                  space or horizontal tab (obs-fold). This specification deprecates such line folding except within the message/http media type
     1351                  (<a href="#internet.media.type.message.http" title="Internet Media Type message/http">Section&nbsp;7.3.1</a>). Senders <em class="bcp14">MUST NOT</em> generate messages that include line folding (i.e., that contain any field-value that contains a match to the <a href="#header.fields" class="smpl">obs-fold</a> rule) unless the message is intended for packaging within the message/http media type.
     1352               </p>
     1353               <p id="rfc.section.3.2.4.p.5">A server that receives an <a href="#header.fields" class="smpl">obs-fold</a> in a request message that is not within a message/http container <em class="bcp14">MUST</em> either reject the message by sending a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a>, preferably with a representation explaining that obsolete line folding is unacceptable, or replace each received <a href="#header.fields" class="smpl">obs-fold</a> with one or more <a href="#core.rules" class="smpl">SP</a> octets prior to interpreting the field value or forwarding the message downstream.
     1354               </p>
     1355               <p id="rfc.section.3.2.4.p.6">A proxy or gateway that receives an <a href="#header.fields" class="smpl">obs-fold</a> in a response message that is not within a message/http container <em class="bcp14">MUST</em> either discard the message and replace it with a <a href="p2-semantics.html#status.502" class="smpl">502 (Bad Gateway)</a> response, preferably with a representation explaining that unacceptable line folding was received, or replace each received <a href="#header.fields" class="smpl">obs-fold</a> with one or more <a href="#core.rules" class="smpl">SP</a> octets prior to interpreting the field value or forwarding the message downstream.
     1356               </p>
     1357               <p id="rfc.section.3.2.4.p.7">A user agent that receives an <a href="#header.fields" class="smpl">obs-fold</a> in a response message that is not within a message/http container <em class="bcp14">MUST</em> replace each received <a href="#header.fields" class="smpl">obs-fold</a> with one or more <a href="#core.rules" class="smpl">SP</a> octets prior to interpreting the field value.
     1358               </p>
     1359               <p id="rfc.section.3.2.4.p.8">Historically, HTTP has allowed field content with text in the ISO-8859-1 <a href="#ISO-8859-1" id="rfc.xref.ISO-8859-1.1"><cite title="Information technology -- 8-bit single-byte coded graphic character sets -- Part 1: Latin alphabet No. 1">[ISO-8859-1]</cite></a> charset, supporting other charsets only through use of <a href="#RFC2047" id="rfc.xref.RFC2047.1"><cite title="MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text">[RFC2047]</cite></a> encoding. In practice, most HTTP header field values use only a subset of the US-ASCII charset <a href="#USASCII" id="rfc.xref.USASCII.3"><cite title="Coded Character Set -- 7-bit American Standard Code for Information Interchange">[USASCII]</cite></a>. Newly defined header fields <em class="bcp14">SHOULD</em> limit their field values to US-ASCII octets. Recipients <em class="bcp14">SHOULD</em> treat other octets in field content (obs-text) as opaque data.
     1360               </p>
     1361            </div>
     1362            <div id="field.limits">
     1363               <h3 id="rfc.section.3.2.5"><a href="#rfc.section.3.2.5">3.2.5</a>&nbsp;<a href="#field.limits">Field Limits</a></h3>
     1364               <p id="rfc.section.3.2.5.p.1">HTTP does not place a pre-defined limit on the length of each header field or on the length of the header block as a whole.
     1365                  Various ad-hoc limitations on individual header field length are found in practice, often depending on the specific field
     1366                  semantics.
     1367               </p>
     1368               <p id="rfc.section.3.2.5.p.2">A server <em class="bcp14">MUST</em> be prepared to receive request header fields of unbounded length and respond with an appropriate <a href="p2-semantics.html#status.4xx" class="smpl">4xx (Client Error)</a> status code if the received header field(s) are larger than the server wishes to process.
     1369               </p>
     1370               <p id="rfc.section.3.2.5.p.3">A client <em class="bcp14">MUST</em> be prepared to receive response header fields of unbounded length. A client <em class="bcp14">MAY</em> discard or truncate received header fields that are larger than the client wishes to process if the field semantics are such
     1371                  that the dropped value(s) can be safely ignored without changing the response semantics.
     1372               </p>
     1373            </div>
     1374            <div id="field.components">
     1375               <h3 id="rfc.section.3.2.6"><a href="#rfc.section.3.2.6">3.2.6</a>&nbsp;<a href="#field.components">Field value components</a></h3>
     1376               <div id="rule.token.separators">
     1377                  <p id="rfc.section.3.2.6.p.1">    Many HTTP header field values consist of words (token or quoted-string) separated by whitespace or special characters. These
     1378                     special characters <em class="bcp14">MUST</em> be in a quoted string to be used within a parameter value (as defined in <a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>).
     1379                  </p>
     1380               </div>
     1381               <div id="rfc.figure.u.20"></div><pre class="inline"><span id="rfc.iref.g.43"></span><span id="rfc.iref.g.44"></span><span id="rfc.iref.g.45"></span><span id="rfc.iref.g.46"></span>  <a href="#rule.token.separators" class="smpl">word</a>           = <a href="#rule.token.separators" class="smpl">token</a> / <a href="#rule.quoted-string" class="smpl">quoted-string</a>
    13171382
    13181383  <a href="#rule.token.separators" class="smpl">token</a>          = 1*<a href="#rule.token.separators" class="smpl">tchar</a>
     
    13271392                 / "]" / "?" / "=" / "{" / "}"
    13281393</pre><div id="rule.quoted-string">
    1329          <p id="rfc.section.3.2.6.p.3">   A string of text is parsed as a single word if it is quoted using double-quote marks.</p>
    1330       </div>
    1331       <div id="rfc.figure.u.21"></div><pre class="inline"><span id="rfc.iref.g.47"></span><span id="rfc.iref.g.48"></span><span id="rfc.iref.g.49"></span>  <a href="#rule.quoted-string" class="smpl">quoted-string</a>  = <a href="#core.rules" class="smpl">DQUOTE</a> *( <a href="#rule.quoted-string" class="smpl">qdtext</a> / <a href="#rule.quoted-pair" class="smpl">quoted-pair</a> ) <a href="#core.rules" class="smpl">DQUOTE</a>
     1394                  <p id="rfc.section.3.2.6.p.3">   A string of text is parsed as a single word if it is quoted using double-quote marks.</p>
     1395               </div>
     1396               <div id="rfc.figure.u.21"></div><pre class="inline"><span id="rfc.iref.g.47"></span><span id="rfc.iref.g.48"></span><span id="rfc.iref.g.49"></span>  <a href="#rule.quoted-string" class="smpl">quoted-string</a>  = <a href="#core.rules" class="smpl">DQUOTE</a> *( <a href="#rule.quoted-string" class="smpl">qdtext</a> / <a href="#rule.quoted-pair" class="smpl">quoted-pair</a> ) <a href="#core.rules" class="smpl">DQUOTE</a>
    13321397  <a href="#rule.quoted-string" class="smpl">qdtext</a>         = <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> /%x21 / %x23-5B / %x5D-7E / <a href="#rule.quoted-string" class="smpl">obs-text</a>
    13331398  <a href="#rule.quoted-string" class="smpl">obs-text</a>       = %x80-FF
    13341399</pre><div id="rule.quoted-pair">
    1335          <p id="rfc.section.3.2.6.p.5"> The backslash octet ("\") can be used as a single-octet quoting mechanism within quoted-string constructs:</p>
    1336       </div>
    1337       <div id="rfc.figure.u.22"></div><pre class="inline"><span id="rfc.iref.g.50"></span>  <a href="#rule.quoted-pair" class="smpl">quoted-pair</a>    = "\" ( <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">VCHAR</a> / <a href="#rule.quoted-string" class="smpl">obs-text</a> )
     1400                  <p id="rfc.section.3.2.6.p.5"> The backslash octet ("\") can be used as a single-octet quoting mechanism within quoted-string constructs:</p>
     1401               </div>
     1402               <div id="rfc.figure.u.22"></div><pre class="inline"><span id="rfc.iref.g.50"></span>  <a href="#rule.quoted-pair" class="smpl">quoted-pair</a>    = "\" ( <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">VCHAR</a> / <a href="#rule.quoted-string" class="smpl">obs-text</a> )
    13381403</pre><p id="rfc.section.3.2.6.p.7">Recipients that process the value of a quoted-string <em class="bcp14">MUST</em> handle a quoted-pair as if it were replaced by the octet following the backslash.
    1339       </p>
    1340       <p id="rfc.section.3.2.6.p.8">Senders <em class="bcp14">SHOULD NOT</em> generate a quoted-pair in a quoted-string except where necessary to quote DQUOTE and backslash octets occurring within that
    1341          string.
    1342       </p>
    1343       <div id="rule.comment">
    1344          <p id="rfc.section.3.2.6.p.9">  Comments can be included in some HTTP header fields by surrounding the comment text with parentheses. Comments are only allowed
    1345             in fields containing "comment" as part of their field value definition.
    1346          </p>
    1347       </div>
    1348       <div id="rfc.figure.u.23"></div><pre class="inline"><span id="rfc.iref.g.51"></span><span id="rfc.iref.g.52"></span>  <a href="#rule.comment" class="smpl">comment</a>        = "(" *( <a href="#rule.comment" class="smpl">ctext</a> / <a href="#rule.quoted-cpair" class="smpl">quoted-cpair</a> / <a href="#rule.comment" class="smpl">comment</a> ) ")"
     1404               </p>
     1405               <p id="rfc.section.3.2.6.p.8">Senders <em class="bcp14">SHOULD NOT</em> generate a quoted-pair in a quoted-string except where necessary to quote DQUOTE and backslash octets occurring within that
     1406                  string.
     1407               </p>
     1408               <div id="rule.comment">
     1409                  <p id="rfc.section.3.2.6.p.9">  Comments can be included in some HTTP header fields by surrounding the comment text with parentheses. Comments are only allowed
     1410                     in fields containing "comment" as part of their field value definition.
     1411                  </p>
     1412               </div>
     1413               <div id="rfc.figure.u.23"></div><pre class="inline"><span id="rfc.iref.g.51"></span><span id="rfc.iref.g.52"></span>  <a href="#rule.comment" class="smpl">comment</a>        = "(" *( <a href="#rule.comment" class="smpl">ctext</a> / <a href="#rule.quoted-cpair" class="smpl">quoted-cpair</a> / <a href="#rule.comment" class="smpl">comment</a> ) ")"
    13491414  <a href="#rule.comment" class="smpl">ctext</a>          = <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / %x21-27 / %x2A-5B / %x5D-7E / <a href="#rule.quoted-string" class="smpl">obs-text</a>
    13501415</pre><div id="rule.quoted-cpair">
    1351          <p id="rfc.section.3.2.6.p.11"> The backslash octet ("\") can be used as a single-octet quoting mechanism within comment constructs:</p>
     1416                  <p id="rfc.section.3.2.6.p.11"> The backslash octet ("\") can be used as a single-octet quoting mechanism within comment constructs:</p>
     1417               </div>
     1418               <div id="rfc.figure.u.24"></div><pre class="inline"><span id="rfc.iref.g.53"></span>  <a href="#rule.quoted-cpair" class="smpl">quoted-cpair</a>   = "\" ( <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">VCHAR</a> / <a href="#rule.quoted-string" class="smpl">obs-text</a> )
     1419</pre><p id="rfc.section.3.2.6.p.13">Senders <em class="bcp14">SHOULD NOT</em> escape octets in comments that do not require escaping (i.e., other than the backslash octet "\" and the parentheses "(" and
     1420                  ")").
     1421               </p>
     1422            </div>
     1423         </div>
     1424         <div id="message.body">
     1425            <h2 id="rfc.section.3.3"><a href="#rfc.section.3.3">3.3</a>&nbsp;<a href="#message.body">Message Body</a></h2>
     1426            <p id="rfc.section.3.3.p.1">The message body (if any) of an HTTP message is used to carry the payload body of that request or response. The message body
     1427               is identical to the payload body unless a transfer coding has been applied, as described in <a href="#header.transfer-encoding" id="rfc.xref.header.transfer-encoding.1" title="Transfer-Encoding">Section&nbsp;3.3.1</a>.
     1428            </p>
     1429            <div id="rfc.figure.u.25"></div><pre class="inline"><span id="rfc.iref.g.54"></span>  <a href="#message.body" class="smpl">message-body</a> = *OCTET
     1430</pre><p id="rfc.section.3.3.p.3">The rules for when a message body is allowed in a message differ for requests and responses.</p>
     1431            <p id="rfc.section.3.3.p.4">The presence of a message body in a request is signaled by a <a href="#header.content-length" class="smpl">Content-Length</a> or <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field. Request message framing is independent of method semantics, even if the method does not define any use for a
     1432               message body.
     1433            </p>
     1434            <p id="rfc.section.3.3.p.5">The presence of a message body in a response depends on both the request method to which it is responding and the response
     1435               status code (<a href="#status.line" title="Status Line">Section&nbsp;3.1.2</a>). Responses to the HEAD request method never include a message body because the associated response header fields (e.g., <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a>, <a href="#header.content-length" class="smpl">Content-Length</a>, etc.), if present, indicate only what their values would have been if the request method had been GET (<a href="p2-semantics.html#HEAD" title="HEAD">Section 4.3.2</a> of <a href="#Part2" id="rfc.xref.Part2.11"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). <a href="p2-semantics.html#status.2xx" class="smpl">2xx (Successful)</a> responses to CONNECT switch to tunnel mode instead of having a message body (<a href="p2-semantics.html#CONNECT" title="CONNECT">Section 4.3.6</a> of <a href="#Part2" id="rfc.xref.Part2.12"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). All <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a>, <a href="p2-semantics.html#status.204" class="smpl">204 (No Content)</a>, and <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> responses do not include a message body. All other responses do include a message body, although the body might be of zero
     1436               length.
     1437            </p>
     1438            <div id="header.transfer-encoding">
     1439               <div id="rfc.iref.t.4"></div>
     1440               <div id="rfc.iref.c.6"></div>
     1441               <h3 id="rfc.section.3.3.1"><a href="#rfc.section.3.3.1">3.3.1</a>&nbsp;<a href="#header.transfer-encoding">Transfer-Encoding</a></h3>
     1442               <p id="rfc.section.3.3.1.p.1">The Transfer-Encoding header field lists the transfer coding names corresponding to the sequence of transfer codings that
     1443                  have been (or will be) applied to the payload body in order to form the message body. Transfer codings are defined in <a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>.
     1444               </p>
     1445               <div id="rfc.figure.u.26"></div><pre class="inline"><span id="rfc.iref.g.55"></span>  <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> = 1#<a href="#transfer.codings" class="smpl">transfer-coding</a>
     1446</pre><p id="rfc.section.3.3.1.p.3">Transfer-Encoding is analogous to the Content-Transfer-Encoding field of MIME, which was designed to enable safe transport
     1447                  of binary data over a 7-bit transport service (<a href="#RFC2045" id="rfc.xref.RFC2045.2"><cite title="Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies">[RFC2045]</cite></a>, <a href="https://tools.ietf.org/html/rfc2045#section-6">Section 6</a>). However, safe transport has a different focus for an 8bit-clean transfer protocol. In HTTP's case, Transfer-Encoding is
     1448                  primarily intended to accurately delimit a dynamically generated payload and to distinguish payload encodings that are only
     1449                  applied for transport efficiency or security from those that are characteristics of the selected resource.
     1450               </p>
     1451               <p id="rfc.section.3.3.1.p.4">All HTTP/1.1 recipients <em class="bcp14">MUST</em> implement the chunked transfer coding (<a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>) because it plays a crucial role in framing messages when the payload body size is not known in advance. If chunked is applied
     1452                  to a payload body, the sender <em class="bcp14">MUST NOT</em> apply chunked more than once (i.e., chunking an already chunked message is not allowed). If any transfer coding is applied
     1453                  to a request payload body, the sender <em class="bcp14">MUST</em> apply chunked as the final transfer coding to ensure that the message is properly framed. If any transfer coding is applied
     1454                  to a response payload body, the sender <em class="bcp14">MUST</em> either apply chunked as the final transfer coding or terminate the message by closing the connection.
     1455               </p>
     1456               <div id="rfc.figure.u.27"></div>
     1457               <p>For example,</p><pre class="text">  Transfer-Encoding: gzip, chunked
     1458</pre><p>indicates that the payload body has been compressed using the gzip coding and then chunked using the chunked coding while
     1459                  forming the message body.
     1460               </p>
     1461               <p id="rfc.section.3.3.1.p.6">Unlike <a href="p2-semantics.html#header.content-encoding" class="smpl">Content-Encoding</a> (<a href="p2-semantics.html#content.codings" title="Content Codings">Section 3.1.2.1</a> of <a href="#Part2" id="rfc.xref.Part2.13"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>), Transfer-Encoding is a property of the message, not of the representation, and any recipient along the request/response
     1462                  chain <em class="bcp14">MAY</em> decode the received transfer coding(s) or apply additional transfer coding(s) to the message body, assuming that corresponding
     1463                  changes are made to the Transfer-Encoding field-value. Additional information about the encoding parameters <em class="bcp14">MAY</em> be provided by other header fields not defined by this specification.
     1464               </p>
     1465               <p id="rfc.section.3.3.1.p.7">Transfer-Encoding <em class="bcp14">MAY</em> be sent in a response to a HEAD request or in a <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> response (<a href="p4-conditional.html#status.304" title="304 Not Modified">Section 4.1</a> of <a href="#Part4" id="rfc.xref.Part4.2"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests">[Part4]</cite></a>) to a GET request, neither of which includes a message body, to indicate that the origin server would have applied a transfer
     1466                  coding to the message body if the request had been an unconditional GET. This indication is not required, however, because
     1467                  any recipient on the response chain (including the origin server) can remove transfer codings when they are not needed.
     1468               </p>
     1469               <p id="rfc.section.3.3.1.p.8">Transfer-Encoding was added in HTTP/1.1. It is generally assumed that implementations advertising only HTTP/1.0 support will
     1470                  not understand how to process a transfer-encoded payload. A client <em class="bcp14">MUST NOT</em> send a request containing Transfer-Encoding unless it knows the server will handle HTTP/1.1 (or later) requests; such knowledge
     1471                  might be in the form of specific user configuration or by remembering the version of a prior received response. A server <em class="bcp14">MUST NOT</em> send a response containing Transfer-Encoding unless the corresponding request indicates HTTP/1.1 (or later).
     1472               </p>
     1473               <p id="rfc.section.3.3.1.p.9">A server that receives a request message with a transfer coding it does not understand <em class="bcp14">SHOULD</em> respond with <a href="p2-semantics.html#status.501" class="smpl">501 (Not Implemented)</a>.
     1474               </p>
     1475            </div>
     1476            <div id="header.content-length">
     1477               <div id="rfc.iref.c.7"></div>
     1478               <h3 id="rfc.section.3.3.2"><a href="#rfc.section.3.3.2">3.3.2</a>&nbsp;<a href="#header.content-length">Content-Length</a></h3>
     1479               <p id="rfc.section.3.3.2.p.1">When a message does not have a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field, a Content-Length header field can provide the anticipated size, as a decimal number of octets, for a potential
     1480                  payload body. For messages that do include a payload body, the Content-Length field-value provides the framing information
     1481                  necessary for determining where the body (and message) ends. For messages that do not include a payload body, the Content-Length
     1482                  indicates the size of the selected representation (<a href="p2-semantics.html#representations" title="Representations">Section 3</a> of <a href="#Part2" id="rfc.xref.Part2.14"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
     1483               </p>
     1484               <div id="rfc.figure.u.28"></div><pre class="inline"><span id="rfc.iref.g.56"></span>  <a href="#header.content-length" class="smpl">Content-Length</a> = 1*<a href="#core.rules" class="smpl">DIGIT</a>
     1485</pre><p id="rfc.section.3.3.2.p.3">An example is</p>
     1486               <div id="rfc.figure.u.29"></div><pre class="text">  Content-Length: 3495
     1487</pre><p id="rfc.section.3.3.2.p.5">A sender <em class="bcp14">MUST NOT</em> send a Content-Length header field in any message that contains a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field.
     1488               </p>
     1489               <p id="rfc.section.3.3.2.p.6">A user agent <em class="bcp14">SHOULD</em> send a Content-Length in a request message when no <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> is sent and the request method defines a meaning for an enclosed payload body. For example, a Content-Length header field
     1490                  is normally sent in a POST request even when the value is 0 (indicating an empty payload body). A user agent <em class="bcp14">SHOULD NOT</em> send a Content-Length header field when the request message does not contain a payload body and the method semantics do not
     1491                  anticipate such a body.
     1492               </p>
     1493               <p id="rfc.section.3.3.2.p.7">A server <em class="bcp14">MAY</em> send a Content-Length header field in a response to a HEAD request (<a href="p2-semantics.html#HEAD" title="HEAD">Section 4.3.2</a> of <a href="#Part2" id="rfc.xref.Part2.15"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>); a server <em class="bcp14">MUST NOT</em> send Content-Length in such a response unless its field-value equals the decimal number of octets that would have been sent
     1494                  in the payload body of a response if the same request had used the GET method.
     1495               </p>
     1496               <p id="rfc.section.3.3.2.p.8">A server <em class="bcp14">MAY</em> send a Content-Length header field in a <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> response to a conditional GET request (<a href="p4-conditional.html#status.304" title="304 Not Modified">Section 4.1</a> of <a href="#Part4" id="rfc.xref.Part4.3"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests">[Part4]</cite></a>); a server <em class="bcp14">MUST NOT</em> send Content-Length in such a response unless its field-value equals the decimal number of octets that would have been sent
     1497                  in the payload body of a <a href="p2-semantics.html#status.200" class="smpl">200 (OK)</a> response to the same request.
     1498               </p>
     1499               <p id="rfc.section.3.3.2.p.9">A server <em class="bcp14">MUST NOT</em> send a Content-Length header field in any response with a status code of <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a> or <a href="p2-semantics.html#status.204" class="smpl">204 (No Content)</a>. A server <em class="bcp14">SHOULD NOT</em> send a Content-Length header field in any <a href="p2-semantics.html#status.2xx" class="smpl">2xx (Successful)</a> response to a CONNECT request (<a href="p2-semantics.html#CONNECT" title="CONNECT">Section 4.3.6</a> of <a href="#Part2" id="rfc.xref.Part2.16"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
     1500               </p>
     1501               <p id="rfc.section.3.3.2.p.10">Aside from the cases defined above, in the absence of Transfer-Encoding, an origin server <em class="bcp14">SHOULD</em> send a Content-Length header field when the payload body size is known prior to sending the complete header block. This will
     1502                  allow downstream recipients to measure transfer progress, know when a received message is complete, and potentially reuse
     1503                  the connection for additional requests.
     1504               </p>
     1505               <p id="rfc.section.3.3.2.p.11">Any Content-Length field value greater than or equal to zero is valid. Since there is no predefined limit to the length of
     1506                  a payload, recipients <em class="bcp14">SHOULD</em> anticipate potentially large decimal numerals and prevent parsing errors due to integer conversion overflows (<a href="#attack.protocol.element.size.overflows" title="Buffer Overflows">Section&nbsp;8.3</a>).
     1507               </p>
     1508               <p id="rfc.section.3.3.2.p.12">If a message is received that has multiple Content-Length header fields with field-values consisting of the same decimal value,
     1509                  or a single Content-Length header field with a field value containing a list of identical decimal values (e.g., "Content-Length:
     1510                  42, 42"), indicating that duplicate Content-Length header fields have been generated or combined by an upstream message processor,
     1511                  then the recipient <em class="bcp14">MUST</em> either reject the message as invalid or replace the duplicated field-values with a single valid Content-Length field containing
     1512                  that decimal value prior to determining the message body length.
     1513               </p>
     1514               <div class="note" id="rfc.section.3.3.2.p.13">
     1515                  <p><b>Note:</b> HTTP's use of Content-Length for message framing differs significantly from the same field's use in MIME, where it is an optional
     1516                     field used only within the "message/external-body" media-type.
     1517                  </p>
     1518               </div>
     1519            </div>
     1520            <div id="message.body.length">
     1521               <div id="rfc.iref.c.8"></div>
     1522               <h3 id="rfc.section.3.3.3"><a href="#rfc.section.3.3.3">3.3.3</a>&nbsp;<a href="#message.body.length">Message Body Length</a></h3>
     1523               <p id="rfc.section.3.3.3.p.1">The length of a message body is determined by one of the following (in order of precedence):</p>
     1524               <p id="rfc.section.3.3.3.p.2"></p>
     1525               <ol>
     1526                  <li>
     1527                     <p>Any response to a HEAD request and any response with a <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a>, <a href="p2-semantics.html#status.204" class="smpl">204 (No Content)</a>, or <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> status code is always terminated by the first empty line after the header fields, regardless of the header fields present
     1528                        in the message, and thus cannot contain a message body.
     1529                     </p>
     1530                  </li>
     1531                  <li>
     1532                     <p>Any <a href="p2-semantics.html#status.2xx" class="smpl">2xx (Successful)</a> response to a CONNECT request implies that the connection will become a tunnel immediately after the empty line that concludes
     1533                        the header fields. A client <em class="bcp14">MUST</em> ignore any <a href="#header.content-length" class="smpl">Content-Length</a> or <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header fields received in such a message.
     1534                     </p>
     1535                  </li>
     1536                  <li>
     1537                     <p>If a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field is present and the chunked transfer coding (<a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>) is the final encoding, the message body length is determined by reading and decoding the chunked data until the transfer
     1538                        coding indicates the data is complete.
     1539                     </p>
     1540                     <p>If a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field is present in a response and the chunked transfer coding is not the final encoding, the message body length is
     1541                        determined by reading the connection until it is closed by the server. If a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field is present in a request and the chunked transfer coding is not the final encoding, the message body length cannot
     1542                        be determined reliably; the server <em class="bcp14">MUST</em> respond with the <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> status code and then close the connection.
     1543                     </p>
     1544                     <p>If a message is received with both a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> and a <a href="#header.content-length" class="smpl">Content-Length</a> header field, the Transfer-Encoding overrides the Content-Length. Such a message might indicate an attempt to perform request
     1545                        or response smuggling (bypass of security-related checks on message routing or content) and thus ought to be handled as an
     1546                        error. A sender <em class="bcp14">MUST</em> remove the received Content-Length field prior to forwarding such a message downstream.
     1547                     </p>
     1548                  </li>
     1549                  <li>
     1550                     <p>If a message is received without <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> and with either multiple <a href="#header.content-length" class="smpl">Content-Length</a> header fields having differing field-values or a single Content-Length header field having an invalid value, then the message
     1551                        framing is invalid and <em class="bcp14">MUST</em> be treated as an error to prevent request or response smuggling. If this is a request message, the server <em class="bcp14">MUST</em> respond with a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> status code and then close the connection. If this is a response message received by a proxy, the proxy <em class="bcp14">MUST</em> close the connection to the server, discard the received response, and send a <a href="p2-semantics.html#status.502" class="smpl">502 (Bad Gateway)</a> response to the client. If this is a response message received by a user agent, it <em class="bcp14">MUST</em> be treated as an error by discarding the message and closing the connection.
     1552                     </p>
     1553                  </li>
     1554                  <li>
     1555                     <p>If a valid <a href="#header.content-length" class="smpl">Content-Length</a> header field is present without <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a>, its decimal value defines the expected message body length in octets. If the sender closes the connection or the recipient
     1556                        times out before the indicated number of octets are received, the recipient <em class="bcp14">MUST</em> consider the message to be incomplete and close the connection.
     1557                     </p>
     1558                  </li>
     1559                  <li>
     1560                     <p>If this is a request message and none of the above are true, then the message body length is zero (no message body is present).</p>
     1561                  </li>
     1562                  <li>
     1563                     <p>Otherwise, this is a response message without a declared message body length, so the message body length is determined by
     1564                        the number of octets received prior to the server closing the connection.
     1565                     </p>
     1566                  </li>
     1567               </ol>
     1568               <p id="rfc.section.3.3.3.p.3">Since there is no way to distinguish a successfully completed, close-delimited message from a partially-received message interrupted
     1569                  by network failure, a server <em class="bcp14">SHOULD</em> use encoding or length-delimited messages whenever possible. The close-delimiting feature exists primarily for backwards compatibility
     1570                  with HTTP/1.0.
     1571               </p>
     1572               <p id="rfc.section.3.3.3.p.4">A server <em class="bcp14">MAY</em> reject a request that contains a message body but not a <a href="#header.content-length" class="smpl">Content-Length</a> by responding with <a href="p2-semantics.html#status.411" class="smpl">411 (Length Required)</a>.
     1573               </p>
     1574               <p id="rfc.section.3.3.3.p.5">Unless a transfer coding other than chunked has been applied, a client that sends a request containing a message body <em class="bcp14">SHOULD</em> use a valid <a href="#header.content-length" class="smpl">Content-Length</a> header field if the message body length is known in advance, rather than the chunked transfer coding, since some existing
     1575                  services respond to chunked with a <a href="p2-semantics.html#status.411" class="smpl">411 (Length Required)</a> status code even though they understand the chunked transfer coding. This is typically because such services are implemented
     1576                  via a gateway that requires a content-length in advance of being called and the server is unable or unwilling to buffer the
     1577                  entire request before processing.
     1578               </p>
     1579               <p id="rfc.section.3.3.3.p.6">A user agent that sends a request containing a message body <em class="bcp14">MUST</em> send a valid <a href="#header.content-length" class="smpl">Content-Length</a> header field if it does not know the server will handle HTTP/1.1 (or later) requests; such knowledge can be in the form of
     1580                  specific user configuration or by remembering the version of a prior received response.
     1581               </p>
     1582               <p id="rfc.section.3.3.3.p.7">If the final response to the last request on a connection has been completely received and there remains additional data to
     1583                  read, a user agent <em class="bcp14">MAY</em> discard the remaining data or attempt to determine if that data belongs as part of the prior response body, which might be
     1584                  the case if the prior message's Content-Length value is incorrect. A client <em class="bcp14">MUST NOT</em> process, cache, or forward such extra data as a separate response, since such behavior would be vulnerable to cache poisoning.
     1585               </p>
     1586            </div>
     1587         </div>
     1588         <div id="incomplete.messages">
     1589            <h2 id="rfc.section.3.4"><a href="#rfc.section.3.4">3.4</a>&nbsp;<a href="#incomplete.messages">Handling Incomplete Messages</a></h2>
     1590            <p id="rfc.section.3.4.p.1">A server that receives an incomplete request message, usually due to a canceled request or a triggered time-out exception, <em class="bcp14">MAY</em> send an error response prior to closing the connection.
     1591            </p>
     1592            <p id="rfc.section.3.4.p.2">A client that receives an incomplete response message, which can occur when a connection is closed prematurely or when decoding
     1593               a supposedly chunked transfer coding fails, <em class="bcp14">MUST</em> record the message as incomplete. Cache requirements for incomplete responses are defined in <a href="p6-cache.html#response.cacheability" title="Storing Responses in Caches">Section 3</a> of <a href="#Part6" id="rfc.xref.Part6.4"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>.
     1594            </p>
     1595            <p id="rfc.section.3.4.p.3">If a response terminates in the middle of the header block (before the empty line is received) and the status code might rely
     1596               on header fields to convey the full meaning of the response, then the client cannot assume that meaning has been conveyed;
     1597               the client might need to repeat the request in order to determine what action to take next.
     1598            </p>
     1599            <p id="rfc.section.3.4.p.4">A message body that uses the chunked transfer coding is incomplete if the zero-sized chunk that terminates the encoding has
     1600               not been received. A message that uses a valid <a href="#header.content-length" class="smpl">Content-Length</a> is incomplete if the size of the message body received (in octets) is less than the value given by Content-Length. A response
     1601               that has neither chunked transfer coding nor Content-Length is terminated by closure of the connection, and thus is considered
     1602               complete regardless of the number of message body octets received, provided that the header block was received intact.
     1603            </p>
     1604         </div>
     1605         <div id="message.robustness">
     1606            <h2 id="rfc.section.3.5"><a href="#rfc.section.3.5">3.5</a>&nbsp;<a href="#message.robustness">Message Parsing Robustness</a></h2>
     1607            <p id="rfc.section.3.5.p.1">Older HTTP/1.0 user agent implementations might send an extra CRLF after a POST request as a workaround for some early server
     1608               applications that failed to read message body content that was not terminated by a line-ending. An HTTP/1.1 user agent <em class="bcp14">MUST NOT</em> preface or follow a request with an extra CRLF. If terminating the request message body with a line-ending is desired, then
     1609               the user agent <em class="bcp14">MUST</em> count the terminating CRLF octets as part of the message body length.
     1610            </p>
     1611            <p id="rfc.section.3.5.p.2">In the interest of robustness, servers <em class="bcp14">SHOULD</em> ignore at least one empty line received where a request-line is expected. In other words, if a server is reading the protocol
     1612               stream at the beginning of a message and receives a CRLF first, the server <em class="bcp14">SHOULD</em> ignore the CRLF.
     1613            </p>
     1614            <p id="rfc.section.3.5.p.3">Although the line terminator for the start-line and header fields is the sequence CRLF, recipients <em class="bcp14">MAY</em> recognize a single LF as a line terminator and ignore any preceding CR.
     1615            </p>
     1616            <p id="rfc.section.3.5.p.4">Although the request-line and status-line grammar rules require that each of the component elements be separated by a single
     1617               SP octet, recipients <em class="bcp14">MAY</em> instead parse on whitespace-delimited word boundaries and, aside from the CRLF terminator, treat any form of whitespace as
     1618               the SP separator while ignoring preceding or trailing whitespace; such whitespace includes one or more of the following octets:
     1619               SP, HTAB, VT (%x0B), FF (%x0C), or bare CR.
     1620            </p>
     1621            <p id="rfc.section.3.5.p.5">When a server listening only for HTTP request messages, or processing what appears from the start-line to be an HTTP request
     1622               message, receives a sequence of octets that does not match the HTTP-message grammar aside from the robustness exceptions listed
     1623               above, the server <em class="bcp14">SHOULD</em> respond with a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> response.
     1624            </p>
     1625         </div>
    13521626      </div>
    1353       <div id="rfc.figure.u.24"></div><pre class="inline"><span id="rfc.iref.g.53"></span>  <a href="#rule.quoted-cpair" class="smpl">quoted-cpair</a>   = "\" ( <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / <a href="#core.rules" class="smpl">VCHAR</a> / <a href="#rule.quoted-string" class="smpl">obs-text</a> )
    1354 </pre><p id="rfc.section.3.2.6.p.13">Senders <em class="bcp14">SHOULD NOT</em> escape octets in comments that do not require escaping (i.e., other than the backslash octet "\" and the parentheses "(" and
    1355          ")").
    1356       </p>
    1357       <h2 id="rfc.section.3.3"><a href="#rfc.section.3.3">3.3</a>&nbsp;<a id="message.body" href="#message.body">Message Body</a></h2>
    1358       <p id="rfc.section.3.3.p.1">The message body (if any) of an HTTP message is used to carry the payload body of that request or response. The message body
    1359          is identical to the payload body unless a transfer coding has been applied, as described in <a href="#header.transfer-encoding" id="rfc.xref.header.transfer-encoding.1" title="Transfer-Encoding">Section&nbsp;3.3.1</a>.
    1360       </p>
    1361       <div id="rfc.figure.u.25"></div><pre class="inline"><span id="rfc.iref.g.54"></span>  <a href="#message.body" class="smpl">message-body</a> = *OCTET
    1362 </pre><p id="rfc.section.3.3.p.3">The rules for when a message body is allowed in a message differ for requests and responses.</p>
    1363       <p id="rfc.section.3.3.p.4">The presence of a message body in a request is signaled by a <a href="#header.content-length" class="smpl">Content-Length</a> or <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field. Request message framing is independent of method semantics, even if the method does not define any use for a
    1364          message body.
    1365       </p>
    1366       <p id="rfc.section.3.3.p.5">The presence of a message body in a response depends on both the request method to which it is responding and the response
    1367          status code (<a href="#status.line" title="Status Line">Section&nbsp;3.1.2</a>). Responses to the HEAD request method never include a message body because the associated response header fields (e.g., <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a>, <a href="#header.content-length" class="smpl">Content-Length</a>, etc.), if present, indicate only what their values would have been if the request method had been GET (<a href="p2-semantics.html#HEAD" title="HEAD">Section 4.3.2</a> of <a href="#Part2" id="rfc.xref.Part2.11"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). <a href="p2-semantics.html#status.2xx" class="smpl">2xx (Successful)</a> responses to CONNECT switch to tunnel mode instead of having a message body (<a href="p2-semantics.html#CONNECT" title="CONNECT">Section 4.3.6</a> of <a href="#Part2" id="rfc.xref.Part2.12"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). All <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a>, <a href="p2-semantics.html#status.204" class="smpl">204 (No Content)</a>, and <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> responses do not include a message body. All other responses do include a message body, although the body might be of zero
    1368          length.
    1369       </p>
    1370       <div id="rfc.iref.t.4"></div>
    1371       <div id="rfc.iref.c.6"></div>
    1372       <h3 id="rfc.section.3.3.1"><a href="#rfc.section.3.3.1">3.3.1</a>&nbsp;<a id="header.transfer-encoding" href="#header.transfer-encoding">Transfer-Encoding</a></h3>
    1373       <p id="rfc.section.3.3.1.p.1">The Transfer-Encoding header field lists the transfer coding names corresponding to the sequence of transfer codings that
    1374          have been (or will be) applied to the payload body in order to form the message body. Transfer codings are defined in <a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>.
    1375       </p>
    1376       <div id="rfc.figure.u.26"></div><pre class="inline"><span id="rfc.iref.g.55"></span>  <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> = 1#<a href="#transfer.codings" class="smpl">transfer-coding</a>
    1377 </pre><p id="rfc.section.3.3.1.p.3">Transfer-Encoding is analogous to the Content-Transfer-Encoding field of MIME, which was designed to enable safe transport
    1378          of binary data over a 7-bit transport service (<a href="#RFC2045" id="rfc.xref.RFC2045.2"><cite title="Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies">[RFC2045]</cite></a>, <a href="http://tools.ietf.org/html/rfc2045#section-6">Section 6</a>). However, safe transport has a different focus for an 8bit-clean transfer protocol. In HTTP's case, Transfer-Encoding is
    1379          primarily intended to accurately delimit a dynamically generated payload and to distinguish payload encodings that are only
    1380          applied for transport efficiency or security from those that are characteristics of the selected resource.
    1381       </p>
    1382       <p id="rfc.section.3.3.1.p.4">All HTTP/1.1 recipients <em class="bcp14">MUST</em> implement the chunked transfer coding (<a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>) because it plays a crucial role in framing messages when the payload body size is not known in advance. If chunked is applied
    1383          to a payload body, the sender <em class="bcp14">MUST NOT</em> apply chunked more than once (i.e., chunking an already chunked message is not allowed). If any transfer coding is applied
    1384          to a request payload body, the sender <em class="bcp14">MUST</em> apply chunked as the final transfer coding to ensure that the message is properly framed. If any transfer coding is applied
    1385          to a response payload body, the sender <em class="bcp14">MUST</em> either apply chunked as the final transfer coding or terminate the message by closing the connection.
    1386       </p>
    1387       <div id="rfc.figure.u.27"></div>
    1388       <p>For example,</p><pre class="text">  Transfer-Encoding: gzip, chunked
    1389 </pre><p>indicates that the payload body has been compressed using the gzip coding and then chunked using the chunked coding while
    1390          forming the message body.
    1391       </p>
    1392       <p id="rfc.section.3.3.1.p.6">Unlike <a href="p2-semantics.html#header.content-encoding" class="smpl">Content-Encoding</a> (<a href="p2-semantics.html#content.codings" title="Content Codings">Section 3.1.2.1</a> of <a href="#Part2" id="rfc.xref.Part2.13"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>), Transfer-Encoding is a property of the message, not of the representation, and any recipient along the request/response
    1393          chain <em class="bcp14">MAY</em> decode the received transfer coding(s) or apply additional transfer coding(s) to the message body, assuming that corresponding
    1394          changes are made to the Transfer-Encoding field-value. Additional information about the encoding parameters <em class="bcp14">MAY</em> be provided by other header fields not defined by this specification.
    1395       </p>
    1396       <p id="rfc.section.3.3.1.p.7">Transfer-Encoding <em class="bcp14">MAY</em> be sent in a response to a HEAD request or in a <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> response (<a href="p4-conditional.html#status.304" title="304 Not Modified">Section 4.1</a> of <a href="#Part4" id="rfc.xref.Part4.2"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests">[Part4]</cite></a>) to a GET request, neither of which includes a message body, to indicate that the origin server would have applied a transfer
    1397          coding to the message body if the request had been an unconditional GET. This indication is not required, however, because
    1398          any recipient on the response chain (including the origin server) can remove transfer codings when they are not needed.
    1399       </p>
    1400       <p id="rfc.section.3.3.1.p.8">Transfer-Encoding was added in HTTP/1.1. It is generally assumed that implementations advertising only HTTP/1.0 support will
    1401          not understand how to process a transfer-encoded payload. A client <em class="bcp14">MUST NOT</em> send a request containing Transfer-Encoding unless it knows the server will handle HTTP/1.1 (or later) requests; such knowledge
    1402          might be in the form of specific user configuration or by remembering the version of a prior received response. A server <em class="bcp14">MUST NOT</em> send a response containing Transfer-Encoding unless the corresponding request indicates HTTP/1.1 (or later).
    1403       </p>
    1404       <p id="rfc.section.3.3.1.p.9">A server that receives a request message with a transfer coding it does not understand <em class="bcp14">SHOULD</em> respond with <a href="p2-semantics.html#status.501" class="smpl">501 (Not Implemented)</a>.
    1405       </p>
    1406       <div id="rfc.iref.c.7"></div>
    1407       <h3 id="rfc.section.3.3.2"><a href="#rfc.section.3.3.2">3.3.2</a>&nbsp;<a id="header.content-length" href="#header.content-length">Content-Length</a></h3>
    1408       <p id="rfc.section.3.3.2.p.1">When a message does not have a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field, a Content-Length header field can provide the anticipated size, as a decimal number of octets, for a potential
    1409          payload body. For messages that do include a payload body, the Content-Length field-value provides the framing information
    1410          necessary for determining where the body (and message) ends. For messages that do not include a payload body, the Content-Length
    1411          indicates the size of the selected representation (<a href="p2-semantics.html#representations" title="Representations">Section 3</a> of <a href="#Part2" id="rfc.xref.Part2.14"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
    1412       </p>
    1413       <div id="rfc.figure.u.28"></div><pre class="inline"><span id="rfc.iref.g.56"></span>  <a href="#header.content-length" class="smpl">Content-Length</a> = 1*<a href="#core.rules" class="smpl">DIGIT</a>
    1414 </pre><p id="rfc.section.3.3.2.p.3">An example is</p>
    1415       <div id="rfc.figure.u.29"></div><pre class="text">  Content-Length: 3495
    1416 </pre><p id="rfc.section.3.3.2.p.5">A sender <em class="bcp14">MUST NOT</em> send a Content-Length header field in any message that contains a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field.
    1417       </p>
    1418       <p id="rfc.section.3.3.2.p.6">A user agent <em class="bcp14">SHOULD</em> send a Content-Length in a request message when no <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> is sent and the request method defines a meaning for an enclosed payload body. For example, a Content-Length header field
    1419          is normally sent in a POST request even when the value is 0 (indicating an empty payload body). A user agent <em class="bcp14">SHOULD NOT</em> send a Content-Length header field when the request message does not contain a payload body and the method semantics do not
    1420          anticipate such a body.
    1421       </p>
    1422       <p id="rfc.section.3.3.2.p.7">A server <em class="bcp14">MAY</em> send a Content-Length header field in a response to a HEAD request (<a href="p2-semantics.html#HEAD" title="HEAD">Section 4.3.2</a> of <a href="#Part2" id="rfc.xref.Part2.15"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>); a server <em class="bcp14">MUST NOT</em> send Content-Length in such a response unless its field-value equals the decimal number of octets that would have been sent
    1423          in the payload body of a response if the same request had used the GET method.
    1424       </p>
    1425       <p id="rfc.section.3.3.2.p.8">A server <em class="bcp14">MAY</em> send a Content-Length header field in a <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> response to a conditional GET request (<a href="p4-conditional.html#status.304" title="304 Not Modified">Section 4.1</a> of <a href="#Part4" id="rfc.xref.Part4.3"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests">[Part4]</cite></a>); a server <em class="bcp14">MUST NOT</em> send Content-Length in such a response unless its field-value equals the decimal number of octets that would have been sent
    1426          in the payload body of a <a href="p2-semantics.html#status.200" class="smpl">200 (OK)</a> response to the same request.
    1427       </p>
    1428       <p id="rfc.section.3.3.2.p.9">A server <em class="bcp14">MUST NOT</em> send a Content-Length header field in any response with a status code of <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a> or <a href="p2-semantics.html#status.204" class="smpl">204 (No Content)</a>. A server <em class="bcp14">SHOULD NOT</em> send a Content-Length header field in any <a href="p2-semantics.html#status.2xx" class="smpl">2xx (Successful)</a> response to a CONNECT request (<a href="p2-semantics.html#CONNECT" title="CONNECT">Section 4.3.6</a> of <a href="#Part2" id="rfc.xref.Part2.16"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
    1429       </p>
    1430       <p id="rfc.section.3.3.2.p.10">Aside from the cases defined above, in the absence of Transfer-Encoding, an origin server <em class="bcp14">SHOULD</em> send a Content-Length header field when the payload body size is known prior to sending the complete header block. This will
    1431          allow downstream recipients to measure transfer progress, know when a received message is complete, and potentially reuse
    1432          the connection for additional requests.
    1433       </p>
    1434       <p id="rfc.section.3.3.2.p.11">Any Content-Length field value greater than or equal to zero is valid. Since there is no predefined limit to the length of
    1435          a payload, recipients <em class="bcp14">SHOULD</em> anticipate potentially large decimal numerals and prevent parsing errors due to integer conversion overflows (<a href="#attack.protocol.element.size.overflows" title="Buffer Overflows">Section&nbsp;8.3</a>).
    1436       </p>
    1437       <p id="rfc.section.3.3.2.p.12">If a message is received that has multiple Content-Length header fields with field-values consisting of the same decimal value,
    1438          or a single Content-Length header field with a field value containing a list of identical decimal values (e.g., "Content-Length:
    1439          42, 42"), indicating that duplicate Content-Length header fields have been generated or combined by an upstream message processor,
    1440          then the recipient <em class="bcp14">MUST</em> either reject the message as invalid or replace the duplicated field-values with a single valid Content-Length field containing
    1441          that decimal value prior to determining the message body length.
    1442       </p>
    1443       <div class="note" id="rfc.section.3.3.2.p.13">
    1444          <p><b>Note:</b> HTTP's use of Content-Length for message framing differs significantly from the same field's use in MIME, where it is an optional
    1445             field used only within the "message/external-body" media-type.
    1446          </p>
    1447       </div>
    1448       <div id="rfc.iref.c.8"></div>
    1449       <h3 id="rfc.section.3.3.3"><a href="#rfc.section.3.3.3">3.3.3</a>&nbsp;<a id="message.body.length" href="#message.body.length">Message Body Length</a></h3>
    1450       <p id="rfc.section.3.3.3.p.1">The length of a message body is determined by one of the following (in order of precedence):</p>
    1451       <p id="rfc.section.3.3.3.p.2"></p>
    1452       <ol>
    1453          <li>
    1454             <p>Any response to a HEAD request and any response with a <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a>, <a href="p2-semantics.html#status.204" class="smpl">204 (No Content)</a>, or <a href="p4-conditional.html#status.304" class="smpl">304 (Not Modified)</a> status code is always terminated by the first empty line after the header fields, regardless of the header fields present
    1455                in the message, and thus cannot contain a message body.
    1456             </p>
    1457          </li>
    1458          <li>
    1459             <p>Any <a href="p2-semantics.html#status.2xx" class="smpl">2xx (Successful)</a> response to a CONNECT request implies that the connection will become a tunnel immediately after the empty line that concludes
    1460                the header fields. A client <em class="bcp14">MUST</em> ignore any <a href="#header.content-length" class="smpl">Content-Length</a> or <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header fields received in such a message.
    1461             </p>
    1462          </li>
    1463          <li>
    1464             <p>If a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field is present and the chunked transfer coding (<a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>) is the final encoding, the message body length is determined by reading and decoding the chunked data until the transfer
    1465                coding indicates the data is complete.
    1466             </p>
    1467             <p>If a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field is present in a response and the chunked transfer coding is not the final encoding, the message body length is
    1468                determined by reading the connection until it is closed by the server. If a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> header field is present in a request and the chunked transfer coding is not the final encoding, the message body length cannot
    1469                be determined reliably; the server <em class="bcp14">MUST</em> respond with the <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> status code and then close the connection.
    1470             </p>
    1471             <p>If a message is received with both a <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> and a <a href="#header.content-length" class="smpl">Content-Length</a> header field, the Transfer-Encoding overrides the Content-Length. Such a message might indicate an attempt to perform request
    1472                or response smuggling (bypass of security-related checks on message routing or content) and thus ought to be handled as an
    1473                error. A sender <em class="bcp14">MUST</em> remove the received Content-Length field prior to forwarding such a message downstream.
    1474             </p>
    1475          </li>
    1476          <li>
    1477             <p>If a message is received without <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> and with either multiple <a href="#header.content-length" class="smpl">Content-Length</a> header fields having differing field-values or a single Content-Length header field having an invalid value, then the message
    1478                framing is invalid and <em class="bcp14">MUST</em> be treated as an error to prevent request or response smuggling. If this is a request message, the server <em class="bcp14">MUST</em> respond with a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> status code and then close the connection. If this is a response message received by a proxy, the proxy <em class="bcp14">MUST</em> close the connection to the server, discard the received response, and send a <a href="p2-semantics.html#status.502" class="smpl">502 (Bad Gateway)</a> response to the client. If this is a response message received by a user agent, it <em class="bcp14">MUST</em> be treated as an error by discarding the message and closing the connection.
    1479             </p>
    1480          </li>
    1481          <li>
    1482             <p>If a valid <a href="#header.content-length" class="smpl">Content-Length</a> header field is present without <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a>, its decimal value defines the expected message body length in octets. If the sender closes the connection or the recipient
    1483                times out before the indicated number of octets are received, the recipient <em class="bcp14">MUST</em> consider the message to be incomplete and close the connection.
    1484             </p>
    1485          </li>
    1486          <li>
    1487             <p>If this is a request message and none of the above are true, then the message body length is zero (no message body is present).</p>
    1488          </li>
    1489          <li>
    1490             <p>Otherwise, this is a response message without a declared message body length, so the message body length is determined by
    1491                the number of octets received prior to the server closing the connection.
    1492             </p>
    1493          </li>
    1494       </ol>
    1495       <p id="rfc.section.3.3.3.p.3">Since there is no way to distinguish a successfully completed, close-delimited message from a partially-received message interrupted
    1496          by network failure, a server <em class="bcp14">SHOULD</em> use encoding or length-delimited messages whenever possible. The close-delimiting feature exists primarily for backwards compatibility
    1497          with HTTP/1.0.
    1498       </p>
    1499       <p id="rfc.section.3.3.3.p.4">A server <em class="bcp14">MAY</em> reject a request that contains a message body but not a <a href="#header.content-length" class="smpl">Content-Length</a> by responding with <a href="p2-semantics.html#status.411" class="smpl">411 (Length Required)</a>.
    1500       </p>
    1501       <p id="rfc.section.3.3.3.p.5">Unless a transfer coding other than chunked has been applied, a client that sends a request containing a message body <em class="bcp14">SHOULD</em> use a valid <a href="#header.content-length" class="smpl">Content-Length</a> header field if the message body length is known in advance, rather than the chunked transfer coding, since some existing
    1502          services respond to chunked with a <a href="p2-semantics.html#status.411" class="smpl">411 (Length Required)</a> status code even though they understand the chunked transfer coding. This is typically because such services are implemented
    1503          via a gateway that requires a content-length in advance of being called and the server is unable or unwilling to buffer the
    1504          entire request before processing.
    1505       </p>
    1506       <p id="rfc.section.3.3.3.p.6">A user agent that sends a request containing a message body <em class="bcp14">MUST</em> send a valid <a href="#header.content-length" class="smpl">Content-Length</a> header field if it does not know the server will handle HTTP/1.1 (or later) requests; such knowledge can be in the form of
    1507          specific user configuration or by remembering the version of a prior received response.
    1508       </p>
    1509       <p id="rfc.section.3.3.3.p.7">If the final response to the last request on a connection has been completely received and there remains additional data to
    1510          read, a user agent <em class="bcp14">MAY</em> discard the remaining data or attempt to determine if that data belongs as part of the prior response body, which might be
    1511          the case if the prior message's Content-Length value is incorrect. A client <em class="bcp14">MUST NOT</em> process, cache, or forward such extra data as a separate response, since such behavior would be vulnerable to cache poisoning.
    1512       </p>
    1513       <h2 id="rfc.section.3.4"><a href="#rfc.section.3.4">3.4</a>&nbsp;<a id="incomplete.messages" href="#incomplete.messages">Handling Incomplete Messages</a></h2>
    1514       <p id="rfc.section.3.4.p.1">A server that receives an incomplete request message, usually due to a canceled request or a triggered time-out exception, <em class="bcp14">MAY</em> send an error response prior to closing the connection.
    1515       </p>
    1516       <p id="rfc.section.3.4.p.2">A client that receives an incomplete response message, which can occur when a connection is closed prematurely or when decoding
    1517          a supposedly chunked transfer coding fails, <em class="bcp14">MUST</em> record the message as incomplete. Cache requirements for incomplete responses are defined in <a href="p6-cache.html#response.cacheability" title="Storing Responses in Caches">Section 3</a> of <a href="#Part6" id="rfc.xref.Part6.4"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>.
    1518       </p>
    1519       <p id="rfc.section.3.4.p.3">If a response terminates in the middle of the header block (before the empty line is received) and the status code might rely
    1520          on header fields to convey the full meaning of the response, then the client cannot assume that meaning has been conveyed;
    1521          the client might need to repeat the request in order to determine what action to take next.
    1522       </p>
    1523       <p id="rfc.section.3.4.p.4">A message body that uses the chunked transfer coding is incomplete if the zero-sized chunk that terminates the encoding has
    1524          not been received. A message that uses a valid <a href="#header.content-length" class="smpl">Content-Length</a> is incomplete if the size of the message body received (in octets) is less than the value given by Content-Length. A response
    1525          that has neither chunked transfer coding nor Content-Length is terminated by closure of the connection, and thus is considered
    1526          complete regardless of the number of message body octets received, provided that the header block was received intact.
    1527       </p>
    1528       <h2 id="rfc.section.3.5"><a href="#rfc.section.3.5">3.5</a>&nbsp;<a id="message.robustness" href="#message.robustness">Message Parsing Robustness</a></h2>
    1529       <p id="rfc.section.3.5.p.1">Older HTTP/1.0 user agent implementations might send an extra CRLF after a POST request as a workaround for some early server
    1530          applications that failed to read message body content that was not terminated by a line-ending. An HTTP/1.1 user agent <em class="bcp14">MUST NOT</em> preface or follow a request with an extra CRLF. If terminating the request message body with a line-ending is desired, then
    1531          the user agent <em class="bcp14">MUST</em> count the terminating CRLF octets as part of the message body length.
    1532       </p>
    1533       <p id="rfc.section.3.5.p.2">In the interest of robustness, servers <em class="bcp14">SHOULD</em> ignore at least one empty line received where a request-line is expected. In other words, if a server is reading the protocol
    1534          stream at the beginning of a message and receives a CRLF first, the server <em class="bcp14">SHOULD</em> ignore the CRLF.
    1535       </p>
    1536       <p id="rfc.section.3.5.p.3">Although the line terminator for the start-line and header fields is the sequence CRLF, recipients <em class="bcp14">MAY</em> recognize a single LF as a line terminator and ignore any preceding CR.
    1537       </p>
    1538       <p id="rfc.section.3.5.p.4">Although the request-line and status-line grammar rules require that each of the component elements be separated by a single
    1539          SP octet, recipients <em class="bcp14">MAY</em> instead parse on whitespace-delimited word boundaries and, aside from the CRLF terminator, treat any form of whitespace as
    1540          the SP separator while ignoring preceding or trailing whitespace; such whitespace includes one or more of the following octets:
    1541          SP, HTAB, VT (%x0B), FF (%x0C), or bare CR.
    1542       </p>
    1543       <p id="rfc.section.3.5.p.5">When a server listening only for HTTP request messages, or processing what appears from the start-line to be an HTTP request
    1544          message, receives a sequence of octets that does not match the HTTP-message grammar aside from the robustness exceptions listed
    1545          above, the server <em class="bcp14">SHOULD</em> respond with a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> response.
    1546       </p>
    1547       <h1 id="rfc.section.4"><a href="#rfc.section.4">4.</a>&nbsp;<a id="transfer.codings" href="#transfer.codings">Transfer Codings</a></h1>
    1548       <p id="rfc.section.4.p.1">Transfer coding names are used to indicate an encoding transformation that has been, can be, or might need to be applied to
    1549          a payload body in order to ensure "safe transport" through the network. This differs from a content coding in that the transfer
    1550          coding is a property of the message rather than a property of the representation that is being transferred.
    1551       </p>
    1552       <div id="rfc.figure.u.30"></div><pre class="inline"><span id="rfc.iref.g.57"></span><span id="rfc.iref.g.58"></span>  <a href="#transfer.codings" class="smpl">transfer-coding</a>    = "chunked" ; <a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>
     1627      <div id="transfer.codings">
     1628         <h1 id="rfc.section.4"><a href="#rfc.section.4">4.</a>&nbsp;<a href="#transfer.codings">Transfer Codings</a></h1>
     1629         <p id="rfc.section.4.p.1">Transfer coding names are used to indicate an encoding transformation that has been, can be, or might need to be applied to
     1630            a payload body in order to ensure "safe transport" through the network. This differs from a content coding in that the transfer
     1631            coding is a property of the message rather than a property of the representation that is being transferred.
     1632         </p>
     1633         <div id="rfc.figure.u.30"></div><pre class="inline"><span id="rfc.iref.g.57"></span><span id="rfc.iref.g.58"></span>  <a href="#transfer.codings" class="smpl">transfer-coding</a>    = "chunked" ; <a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>
    15531634                     / "compress" ; <a href="#compress.coding" title="Compress Coding">Section&nbsp;4.2.1</a>
    15541635                     / "deflate" ; <a href="#deflate.coding" title="Deflate Coding">Section&nbsp;4.2.2</a>
     
    15571638  <a href="#transfer.codings" class="smpl">transfer-extension</a> = <a href="#rule.token.separators" class="smpl">token</a> *( <a href="#rule.whitespace" class="smpl">OWS</a> ";" <a href="#rule.whitespace" class="smpl">OWS</a> <a href="#rule.parameter" class="smpl">transfer-parameter</a> )
    15581639</pre><div id="rule.parameter">
    1559          <p id="rfc.section.4.p.3">   Parameters are in the form of attribute/value pairs.</p>
    1560       </div>
    1561       <div id="rfc.figure.u.31"></div><pre class="inline"><span id="rfc.iref.g.59"></span><span id="rfc.iref.g.60"></span><span id="rfc.iref.g.61"></span><span id="rfc.iref.g.62"></span><span id="rfc.iref.g.63"></span>  <a href="#rule.parameter" class="smpl">transfer-parameter</a> = <a href="#rule.parameter" class="smpl">attribute</a> <a href="#rule.whitespace" class="smpl">BWS</a> "=" <a href="#rule.whitespace" class="smpl">BWS</a> <a href="#rule.parameter" class="smpl">value</a>
     1640            <p id="rfc.section.4.p.3">   Parameters are in the form of attribute/value pairs.</p>
     1641         </div>
     1642         <div id="rfc.figure.u.31"></div><pre class="inline"><span id="rfc.iref.g.59"></span><span id="rfc.iref.g.60"></span><span id="rfc.iref.g.61"></span><span id="rfc.iref.g.62"></span><span id="rfc.iref.g.63"></span>  <a href="#rule.parameter" class="smpl">transfer-parameter</a> = <a href="#rule.parameter" class="smpl">attribute</a> <a href="#rule.whitespace" class="smpl">BWS</a> "=" <a href="#rule.whitespace" class="smpl">BWS</a> <a href="#rule.parameter" class="smpl">value</a>
    15621643  <a href="#rule.parameter" class="smpl">attribute</a>          = <a href="#rule.token.separators" class="smpl">token</a>
    15631644  <a href="#rule.parameter" class="smpl">value</a>              = <a href="#rule.token.separators" class="smpl">word</a>
    15641645</pre><p id="rfc.section.4.p.5">All transfer-coding names are case-insensitive and ought to be registered within the HTTP Transfer Coding registry, as defined
    1565          in <a href="#transfer.coding.registry" title="Transfer Coding Registry">Section&nbsp;7.4</a>. They are used in the <a href="#header.te" class="smpl">TE</a> (<a href="#header.te" id="rfc.xref.header.te.1" title="TE">Section&nbsp;4.3</a>) and <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> (<a href="#header.transfer-encoding" id="rfc.xref.header.transfer-encoding.2" title="Transfer-Encoding">Section&nbsp;3.3.1</a>) header fields.
    1566       </p>
    1567       <div id="rfc.iref.c.9"></div>
    1568       <h2 id="rfc.section.4.1"><a href="#rfc.section.4.1">4.1</a>&nbsp;<a id="chunked.encoding" href="#chunked.encoding">Chunked Transfer Coding</a></h2>
    1569       <p id="rfc.section.4.1.p.1">The chunked transfer coding modifies the body of a message in order to transfer it as a series of chunks, each with its own
    1570          size indicator, followed by an <em class="bcp14">OPTIONAL</em> trailer containing header fields. This allows dynamically generated content to be transferred along with the information necessary
    1571          for the recipient to verify that it has received the full message.
    1572       </p>
    1573       <div id="rfc.figure.u.32"></div><pre class="inline"><span id="rfc.iref.g.64"></span><span id="rfc.iref.g.65"></span><span id="rfc.iref.g.66"></span><span id="rfc.iref.g.67"></span><span id="rfc.iref.g.68"></span><span id="rfc.iref.g.69"></span><span id="rfc.iref.g.70"></span><span id="rfc.iref.g.71"></span><span id="rfc.iref.g.72"></span><span id="rfc.iref.g.73"></span><span id="rfc.iref.g.74"></span>  <a href="#chunked.encoding" class="smpl">chunked-body</a>   = *<a href="#chunked.encoding" class="smpl">chunk</a>
     1646            in <a href="#transfer.coding.registry" title="Transfer Coding Registry">Section&nbsp;7.4</a>. They are used in the <a href="#header.te" class="smpl">TE</a> (<a href="#header.te" id="rfc.xref.header.te.1" title="TE">Section&nbsp;4.3</a>) and <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a> (<a href="#header.transfer-encoding" id="rfc.xref.header.transfer-encoding.2" title="Transfer-Encoding">Section&nbsp;3.3.1</a>) header fields.
     1647         </p>
     1648         <div id="chunked.encoding">
     1649            <div id="rfc.iref.c.9"></div>
     1650            <h2 id="rfc.section.4.1"><a href="#rfc.section.4.1">4.1</a>&nbsp;<a href="#chunked.encoding">Chunked Transfer Coding</a></h2>
     1651            <p id="rfc.section.4.1.p.1">The chunked transfer coding modifies the body of a message in order to transfer it as a series of chunks, each with its own
     1652               size indicator, followed by an <em class="bcp14">OPTIONAL</em> trailer containing header fields. This allows dynamically generated content to be transferred along with the information necessary
     1653               for the recipient to verify that it has received the full message.
     1654            </p>
     1655            <div id="rfc.figure.u.32"></div><pre class="inline"><span id="rfc.iref.g.64"></span><span id="rfc.iref.g.65"></span><span id="rfc.iref.g.66"></span><span id="rfc.iref.g.67"></span><span id="rfc.iref.g.68"></span><span id="rfc.iref.g.69"></span><span id="rfc.iref.g.70"></span><span id="rfc.iref.g.71"></span><span id="rfc.iref.g.72"></span><span id="rfc.iref.g.73"></span><span id="rfc.iref.g.74"></span>  <a href="#chunked.encoding" class="smpl">chunked-body</a>   = *<a href="#chunked.encoding" class="smpl">chunk</a>
    15741656                   <a href="#chunked.encoding" class="smpl">last-chunk</a>
    15751657                   <a href="#chunked.encoding" class="smpl">trailer-part</a>
     
    15911673  <a href="#chunked.encoding" class="smpl">qdtext-nf</a>      = <a href="#core.rules" class="smpl">HTAB</a> / <a href="#core.rules" class="smpl">SP</a> / %x21 / %x23-5B / %x5D-7E / <a href="#rule.quoted-string" class="smpl">obs-text</a>
    15921674</pre><p id="rfc.section.4.1.p.3">Chunk extensions within the chunked transfer coding are deprecated. Senders <em class="bcp14">SHOULD NOT</em> send chunk-ext. Definition of new chunk extensions is discouraged.
    1593       </p>
    1594       <p id="rfc.section.4.1.p.4">The chunk-size field is a string of hex digits indicating the size of the chunk-data in octets. The chunked transfer coding
    1595          is complete when a chunk with a chunk-size of zero is received, possibly followed by a trailer, and finally terminated by
    1596          an empty line.
    1597       </p>
    1598       <div id="rfc.iref.t.5"></div>
    1599       <h3 id="rfc.section.4.1.1"><a href="#rfc.section.4.1.1">4.1.1</a>&nbsp;<a id="header.trailer" href="#header.trailer">Trailer</a></h3>
    1600       <p id="rfc.section.4.1.1.p.1">A trailer allows the sender to include additional fields at the end of a chunked message in order to supply metadata that
    1601          might be dynamically generated while the message body is sent, such as a message integrity check, digital signature, or post-processing
    1602          status. The trailer <em class="bcp14">MUST NOT</em> contain fields that need to be known before a recipient processes the body, such as <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a>, <a href="#header.content-length" class="smpl">Content-Length</a>, and <a href="#header.trailer" class="smpl">Trailer</a>.
    1603       </p>
    1604       <p id="rfc.section.4.1.1.p.2">When a message includes a message body encoded with the chunked transfer coding and the sender desires to send metadata in
    1605          the form of trailer fields at the end of the message, the sender <em class="bcp14">SHOULD</em> send a <a href="#header.trailer" class="smpl">Trailer</a> header field before the message body to indicate which fields will be present in the trailers. This allows the recipient to
    1606          prepare for receipt of that metadata before it starts processing the body, which is useful if the message is being streamed
    1607          and the recipient wishes to confirm an integrity check on the fly.
    1608       </p>
    1609       <div id="rfc.figure.u.33"></div><pre class="inline"><span id="rfc.iref.g.75"></span>  <a href="#header.trailer" class="smpl">Trailer</a> = 1#<a href="#header.fields" class="smpl">field-name</a>
     1675            </p>
     1676            <p id="rfc.section.4.1.p.4">The chunk-size field is a string of hex digits indicating the size of the chunk-data in octets. The chunked transfer coding
     1677               is complete when a chunk with a chunk-size of zero is received, possibly followed by a trailer, and finally terminated by
     1678               an empty line.
     1679            </p>
     1680            <div id="header.trailer">
     1681               <div id="rfc.iref.t.5"></div>
     1682               <h3 id="rfc.section.4.1.1"><a href="#rfc.section.4.1.1">4.1.1</a>&nbsp;<a href="#header.trailer">Trailer</a></h3>
     1683               <p id="rfc.section.4.1.1.p.1">A trailer allows the sender to include additional fields at the end of a chunked message in order to supply metadata that
     1684                  might be dynamically generated while the message body is sent, such as a message integrity check, digital signature, or post-processing
     1685                  status. The trailer <em class="bcp14">MUST NOT</em> contain fields that need to be known before a recipient processes the body, such as <a href="#header.transfer-encoding" class="smpl">Transfer-Encoding</a>, <a href="#header.content-length" class="smpl">Content-Length</a>, and <a href="#header.trailer" class="smpl">Trailer</a>.
     1686               </p>
     1687               <p id="rfc.section.4.1.1.p.2">When a message includes a message body encoded with the chunked transfer coding and the sender desires to send metadata in
     1688                  the form of trailer fields at the end of the message, the sender <em class="bcp14">SHOULD</em> send a <a href="#header.trailer" class="smpl">Trailer</a> header field before the message body to indicate which fields will be present in the trailers. This allows the recipient to
     1689                  prepare for receipt of that metadata before it starts processing the body, which is useful if the message is being streamed
     1690                  and the recipient wishes to confirm an integrity check on the fly.
     1691               </p>
     1692               <div id="rfc.figure.u.33"></div><pre class="inline"><span id="rfc.iref.g.75"></span>  <a href="#header.trailer" class="smpl">Trailer</a> = 1#<a href="#header.fields" class="smpl">field-name</a>
    16101693</pre><p id="rfc.section.4.1.1.p.4">If no <a href="#header.trailer" class="smpl">Trailer</a> header field is present, the sender of a chunked message body <em class="bcp14">SHOULD</em> send an empty trailer.
    1611       </p>
    1612       <p id="rfc.section.4.1.1.p.5">A server <em class="bcp14">MUST</em> send an empty trailer with the chunked transfer coding unless at least one of the following is true:
    1613       </p>
    1614       <ol>
    1615          <li>the request included a <a href="#header.te" class="smpl">TE</a> header field that indicates "trailers" is acceptable in the transfer coding of the response, as described in <a href="#header.te" id="rfc.xref.header.te.2" title="TE">Section&nbsp;4.3</a>; or,
    1616          </li>
    1617          <li>the trailer fields consist entirely of optional metadata and the recipient could use the message (in a manner acceptable to
    1618             the server where the field originated) without receiving that metadata. In other words, the server that generated the header
    1619             field is willing to accept the possibility that the trailer fields might be silently discarded along the path to the client.
    1620          </li>
    1621       </ol>
    1622       <p id="rfc.section.4.1.1.p.6">The above requirement prevents the need for an infinite buffer when a message is being received by an HTTP/1.1 (or later)
    1623          proxy and forwarded to an HTTP/1.0 recipient.
    1624       </p>
    1625       <h3 id="rfc.section.4.1.2"><a href="#rfc.section.4.1.2">4.1.2</a>&nbsp;<a id="decoding.chunked" href="#decoding.chunked">Decoding chunked</a></h3>
    1626       <p id="rfc.section.4.1.2.p.1">A process for decoding the chunked transfer coding can be represented in pseudo-code as:</p>
    1627       <div id="rfc.figure.u.34"></div><pre class="text">  length := 0
     1694               </p>
     1695               <p id="rfc.section.4.1.1.p.5">A server <em class="bcp14">MUST</em> send an empty trailer with the chunked transfer coding unless at least one of the following is true:
     1696               </p>
     1697               <ol>
     1698                  <li>the request included a <a href="#header.te" class="smpl">TE</a> header field that indicates "trailers" is acceptable in the transfer coding of the response, as described in <a href="#header.te" id="rfc.xref.header.te.2" title="TE">Section&nbsp;4.3</a>; or,
     1699                  </li>
     1700                  <li>the trailer fields consist entirely of optional metadata and the recipient could use the message (in a manner acceptable to
     1701                     the server where the field originated) without receiving that metadata. In other words, the server that generated the header
     1702                     field is willing to accept the possibility that the trailer fields might be silently discarded along the path to the client.
     1703                  </li>
     1704               </ol>
     1705               <p id="rfc.section.4.1.1.p.6">The above requirement prevents the need for an infinite buffer when a message is being received by an HTTP/1.1 (or later)
     1706                  proxy and forwarded to an HTTP/1.0 recipient.
     1707               </p>
     1708            </div>
     1709            <div id="decoding.chunked">
     1710               <h3 id="rfc.section.4.1.2"><a href="#rfc.section.4.1.2">4.1.2</a>&nbsp;<a href="#decoding.chunked">Decoding chunked</a></h3>
     1711               <p id="rfc.section.4.1.2.p.1">A process for decoding the chunked transfer coding can be represented in pseudo-code as:</p>
     1712               <div id="rfc.figure.u.34"></div><pre class="text">  length := 0
    16281713  read chunk-size, chunk-ext (if any), and CRLF
    16291714  while (chunk-size &gt; 0) {
     
    16421727  Remove Trailer from existing header fields
    16431728</pre><p id="rfc.section.4.1.2.p.3">All recipients <em class="bcp14">MUST</em> be able to receive and decode the chunked transfer coding and <em class="bcp14">MUST</em> ignore chunk-ext extensions they do not understand.
    1644       </p>
    1645       <h2 id="rfc.section.4.2"><a href="#rfc.section.4.2">4.2</a>&nbsp;<a id="compression.codings" href="#compression.codings">Compression Codings</a></h2>
    1646       <p id="rfc.section.4.2.p.1">The codings defined below can be used to compress the payload of a message.</p>
    1647       <div id="rfc.iref.c.10"></div>
    1648       <h3 id="rfc.section.4.2.1"><a href="#rfc.section.4.2.1">4.2.1</a>&nbsp;<a id="compress.coding" href="#compress.coding">Compress Coding</a></h3>
    1649       <p id="rfc.section.4.2.1.p.1">The "compress" coding is an adaptive Lempel-Ziv-Welch (LZW) coding <a href="#Welch" id="rfc.xref.Welch.1"><cite title="A Technique for High Performance Data Compression">[Welch]</cite></a> that is commonly produced by the UNIX file compression program "compress". Recipients <em class="bcp14">SHOULD</em> consider "x-compress" to be equivalent to "compress".
    1650       </p>
    1651       <div id="rfc.iref.d.2"></div>
    1652       <h3 id="rfc.section.4.2.2"><a href="#rfc.section.4.2.2">4.2.2</a>&nbsp;<a id="deflate.coding" href="#deflate.coding">Deflate Coding</a></h3>
    1653       <p id="rfc.section.4.2.2.p.1">The "deflate" coding is a "zlib" data format <a href="#RFC1950" id="rfc.xref.RFC1950.1"><cite title="ZLIB Compressed Data Format Specification version 3.3">[RFC1950]</cite></a> containing a "deflate" compressed data stream <a href="#RFC1951" id="rfc.xref.RFC1951.1"><cite title="DEFLATE Compressed Data Format Specification version 1.3">[RFC1951]</cite></a> that uses a combination of the Lempel-Ziv (LZ77) compression algorithm and Huffman coding.
    1654       </p>
    1655       <div class="note" id="rfc.section.4.2.2.p.2">
    1656          <p><b>Note:</b> Some incorrect implementations send the "deflate" compressed data without the zlib wrapper.
    1657          </p>
    1658       </div>
    1659       <div id="rfc.iref.g.76"></div>
    1660       <h3 id="rfc.section.4.2.3"><a href="#rfc.section.4.2.3">4.2.3</a>&nbsp;<a id="gzip.coding" href="#gzip.coding">Gzip Coding</a></h3>
    1661       <p id="rfc.section.4.2.3.p.1">The "gzip" coding is an LZ77 coding with a 32 bit CRC that is commonly produced by the gzip file compression program <a href="#RFC1952" id="rfc.xref.RFC1952.1"><cite title="GZIP file format specification version 4.3">[RFC1952]</cite></a>. Recipients <em class="bcp14">SHOULD</em> consider "x-gzip" to be equivalent to "gzip".
    1662       </p>
    1663       <div id="rfc.iref.t.6"></div>
    1664       <h2 id="rfc.section.4.3"><a href="#rfc.section.4.3">4.3</a>&nbsp;<a id="header.te" href="#header.te">TE</a></h2>
    1665       <p id="rfc.section.4.3.p.1">The "TE" header field in a request indicates what transfer codings, besides chunked, the client is willing to accept in response,
    1666          and whether or not the client is willing to accept trailer fields in a chunked transfer coding.
    1667       </p>
    1668       <p id="rfc.section.4.3.p.2">The TE field-value consists of a comma-separated list of transfer coding names, each allowing for optional parameters (as
    1669          described in <a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>), and/or the keyword "trailers". Clients <em class="bcp14">MUST NOT</em> send the chunked transfer coding name in TE; chunked is always acceptable for HTTP/1.1 recipients.
    1670       </p>
    1671       <div id="rfc.figure.u.35"></div><pre class="inline"><span id="rfc.iref.g.77"></span><span id="rfc.iref.g.78"></span><span id="rfc.iref.g.79"></span><span id="rfc.iref.g.80"></span>  <a href="#header.te" class="smpl">TE</a>        = #<a href="#header.te" class="smpl">t-codings</a>
     1729               </p>
     1730            </div>
     1731         </div>
     1732         <div id="compression.codings">
     1733            <h2 id="rfc.section.4.2"><a href="#rfc.section.4.2">4.2</a>&nbsp;<a href="#compression.codings">Compression Codings</a></h2>
     1734            <p id="rfc.section.4.2.p.1">The codings defined below can be used to compress the payload of a message.</p>
     1735            <div id="compress.coding">
     1736               <div id="rfc.iref.c.10"></div>
     1737               <h3 id="rfc.section.4.2.1"><a href="#rfc.section.4.2.1">4.2.1</a>&nbsp;<a href="#compress.coding">Compress Coding</a></h3>
     1738               <p id="rfc.section.4.2.1.p.1">The "compress" coding is an adaptive Lempel-Ziv-Welch (LZW) coding <a href="#Welch" id="rfc.xref.Welch.1"><cite title="A Technique for High Performance Data Compression">[Welch]</cite></a> that is commonly produced by the UNIX file compression program "compress". Recipients <em class="bcp14">SHOULD</em> consider "x-compress" to be equivalent to "compress".
     1739               </p>
     1740            </div>
     1741            <div id="deflate.coding">
     1742               <div id="rfc.iref.d.2"></div>
     1743               <h3 id="rfc.section.4.2.2"><a href="#rfc.section.4.2.2">4.2.2</a>&nbsp;<a href="#deflate.coding">Deflate Coding</a></h3>
     1744               <p id="rfc.section.4.2.2.p.1">The "deflate" coding is a "zlib" data format <a href="#RFC1950" id="rfc.xref.RFC1950.1"><cite title="ZLIB Compressed Data Format Specification version 3.3">[RFC1950]</cite></a> containing a "deflate" compressed data stream <a href="#RFC1951" id="rfc.xref.RFC1951.1"><cite title="DEFLATE Compressed Data Format Specification version 1.3">[RFC1951]</cite></a> that uses a combination of the Lempel-Ziv (LZ77) compression algorithm and Huffman coding.
     1745               </p>
     1746               <div class="note" id="rfc.section.4.2.2.p.2">
     1747                  <p><b>Note:</b> Some incorrect implementations send the "deflate" compressed data without the zlib wrapper.
     1748                  </p>
     1749               </div>
     1750            </div>
     1751            <div id="gzip.coding">
     1752               <div id="rfc.iref.g.76"></div>
     1753               <h3 id="rfc.section.4.2.3"><a href="#rfc.section.4.2.3">4.2.3</a>&nbsp;<a href="#gzip.coding">Gzip Coding</a></h3>
     1754               <p id="rfc.section.4.2.3.p.1">The "gzip" coding is an LZ77 coding with a 32 bit CRC that is commonly produced by the gzip file compression program <a href="#RFC1952" id="rfc.xref.RFC1952.1"><cite title="GZIP file format specification version 4.3">[RFC1952]</cite></a>. Recipients <em class="bcp14">SHOULD</em> consider "x-gzip" to be equivalent to "gzip".
     1755               </p>
     1756            </div>
     1757         </div>
     1758         <div id="header.te">
     1759            <div id="rfc.iref.t.6"></div>
     1760            <h2 id="rfc.section.4.3"><a href="#rfc.section.4.3">4.3</a>&nbsp;<a href="#header.te">TE</a></h2>
     1761            <p id="rfc.section.4.3.p.1">The "TE" header field in a request indicates what transfer codings, besides chunked, the client is willing to accept in response,
     1762               and whether or not the client is willing to accept trailer fields in a chunked transfer coding.
     1763            </p>
     1764            <p id="rfc.section.4.3.p.2">The TE field-value consists of a comma-separated list of transfer coding names, each allowing for optional parameters (as
     1765               described in <a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>), and/or the keyword "trailers". Clients <em class="bcp14">MUST NOT</em> send the chunked transfer coding name in TE; chunked is always acceptable for HTTP/1.1 recipients.
     1766            </p>
     1767            <div id="rfc.figure.u.35"></div><pre class="inline"><span id="rfc.iref.g.77"></span><span id="rfc.iref.g.78"></span><span id="rfc.iref.g.79"></span><span id="rfc.iref.g.80"></span>  <a href="#header.te" class="smpl">TE</a>        = #<a href="#header.te" class="smpl">t-codings</a>
    16721768  <a href="#header.te" class="smpl">t-codings</a> = "trailers" / ( <a href="#transfer.codings" class="smpl">transfer-coding</a> [ <a href="#header.te" class="smpl">t-ranking</a> ] )
    16731769  <a href="#header.te" class="smpl">t-ranking</a> = <a href="#rule.whitespace" class="smpl">OWS</a> ";" <a href="#rule.whitespace" class="smpl">OWS</a> "q=" <a href="#header.te" class="smpl">rank</a>
     
    16751771             / ( "1" [ "." 0*3("0") ] )
    16761772</pre><p id="rfc.section.4.3.p.4">Three examples of TE use are below.</p>
    1677       <div id="rfc.figure.u.36"></div><pre class="text">  TE: deflate
     1773            <div id="rfc.figure.u.36"></div><pre class="text">  TE: deflate
    16781774  TE:
    16791775  TE: trailers, deflate;q=0.5
    16801776</pre><p id="rfc.section.4.3.p.6">The presence of the keyword "trailers" indicates that the client is willing to accept trailer fields in a chunked transfer
    1681          coding, as defined in <a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>, on behalf of itself and any downstream clients. For requests from an intermediary, this implies that either: (a) all downstream
    1682          clients are willing to accept trailer fields in the forwarded response; or, (b) the intermediary will attempt to buffer the
    1683          response on behalf of downstream recipients. Note that HTTP/1.1 does not define any means to limit the size of a chunked response
    1684          such that an intermediary can be assured of buffering the entire response.
    1685       </p>
    1686       <p id="rfc.section.4.3.p.7">When multiple transfer codings are acceptable, the client <em class="bcp14">MAY</em> rank the codings by preference using a case-insensitive "q" parameter (similar to the qvalues used in content negotiation
    1687          fields, <a href="p2-semantics.html#quality.values" title="Quality Values">Section 5.3.1</a> of <a href="#Part2" id="rfc.xref.Part2.17"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). The rank value is a real number in the range 0 through 1, where 0.001 is the least preferred and 1 is the most preferred;
    1688          a value of 0 means "not acceptable".
    1689       </p>
    1690       <p id="rfc.section.4.3.p.8">If the TE field-value is empty or if no TE field is present, the only acceptable transfer coding is chunked. A message with
    1691          no transfer coding is always acceptable.
    1692       </p>
    1693       <p id="rfc.section.4.3.p.9">Since the TE header field only applies to the immediate connection, a sender of TE <em class="bcp14">MUST</em> also send a "TE" connection option within the <a href="#header.connection" class="smpl">Connection</a> header field (<a href="#header.connection" id="rfc.xref.header.connection.3" title="Connection">Section&nbsp;6.1</a>) in order to prevent the TE field from being forwarded by intermediaries that do not support its semantics.
    1694       </p>
    1695       <h1 id="rfc.section.5"><a href="#rfc.section.5">5.</a>&nbsp;<a id="message.routing" href="#message.routing">Message Routing</a></h1>
    1696       <p id="rfc.section.5.p.1">HTTP request message routing is determined by each client based on the target resource, the client's proxy configuration,
    1697          and establishment or reuse of an inbound connection. The corresponding response routing follows the same connection chain
    1698          back to the client.
    1699       </p>
    1700       <div id="rfc.iref.t.7"></div>
    1701       <div id="rfc.iref.t.8"></div>
    1702       <h2 id="rfc.section.5.1"><a href="#rfc.section.5.1">5.1</a>&nbsp;<a id="target-resource" href="#target-resource">Identifying a Target Resource</a></h2>
    1703       <p id="rfc.section.5.1.p.1">HTTP is used in a wide variety of applications, ranging from general-purpose computers to home appliances. In some cases,
    1704          communication options are hard-coded in a client's configuration. However, most HTTP clients rely on the same resource identification
    1705          mechanism and configuration techniques as general-purpose Web browsers.
    1706       </p>
    1707       <p id="rfc.section.5.1.p.2">HTTP communication is initiated by a user agent for some purpose. The purpose is a combination of request semantics, which
    1708          are defined in <a href="#Part2" id="rfc.xref.Part2.18"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>, and a target resource upon which to apply those semantics. A URI reference (<a href="#uri" title="Uniform Resource Identifiers">Section&nbsp;2.7</a>) is typically used as an identifier for the "<dfn>target resource</dfn>", which a user agent would resolve to its absolute form in order to obtain the "<dfn>target URI</dfn>". The target URI excludes the reference's fragment component, if any, since fragment identifiers are reserved for client-side
    1709          processing (<a href="#RFC3986" id="rfc.xref.RFC3986.17"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-3.5">Section 3.5</a>).
    1710       </p>
    1711       <h2 id="rfc.section.5.2"><a href="#rfc.section.5.2">5.2</a>&nbsp;<a id="connecting.inbound" href="#connecting.inbound">Connecting Inbound</a></h2>
    1712       <p id="rfc.section.5.2.p.1">Once the target URI is determined, a client needs to decide whether a network request is necessary to accomplish the desired
    1713          semantics and, if so, where that request is to be directed.
    1714       </p>
    1715       <p id="rfc.section.5.2.p.2">If the client has a cache <a href="#Part6" id="rfc.xref.Part6.5"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a> and the request can be satisfied by it, then the request is usually directed there first.
    1716       </p>
    1717       <p id="rfc.section.5.2.p.3">If the request is not satisfied by a cache, then a typical client will check its configuration to determine whether a proxy
    1718          is to be used to satisfy the request. Proxy configuration is implementation-dependent, but is often based on URI prefix matching,
    1719          selective authority matching, or both, and the proxy itself is usually identified by an "http" or "https" URI. If a proxy
    1720          is applicable, the client connects inbound by establishing (or reusing) a connection to that proxy.
    1721       </p>
    1722       <p id="rfc.section.5.2.p.4">If no proxy is applicable, a typical client will invoke a handler routine, usually specific to the target URI's scheme, to
    1723          connect directly to an authority for the target resource. How that is accomplished is dependent on the target URI scheme and
    1724          defined by its associated specification, similar to how this specification defines origin server access for resolution of
    1725          the "http" (<a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>) and "https" (<a href="#https.uri" title="https URI scheme">Section&nbsp;2.7.2</a>) schemes.
    1726       </p>
    1727       <p id="rfc.section.5.2.p.5">HTTP requirements regarding connection management are defined in <a href="#connection.management" title="Connection Management">Section&nbsp;6</a>.
    1728       </p>
    1729       <h2 id="rfc.section.5.3"><a href="#rfc.section.5.3">5.3</a>&nbsp;<a id="request-target" href="#request-target">Request Target</a></h2>
    1730       <p id="rfc.section.5.3.p.1">Once an inbound connection is obtained, the client sends an HTTP request message (<a href="#http.message" title="Message Format">Section&nbsp;3</a>) with a request-target derived from the target URI. There are four distinct formats for the request-target, depending on
    1731          both the method being requested and whether the request is to a proxy.
    1732       </p>
    1733       <div id="rfc.figure.u.37"></div><pre class="inline"><span id="rfc.iref.g.81"></span><span id="rfc.iref.g.82"></span><span id="rfc.iref.g.83"></span><span id="rfc.iref.g.84"></span><span id="rfc.iref.g.85"></span>  <a href="#request-target" class="smpl">request-target</a> = <a href="#origin-form" class="smpl">origin-form</a>
     1777               coding, as defined in <a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>, on behalf of itself and any downstream clients. For requests from an intermediary, this implies that either: (a) all downstream
     1778               clients are willing to accept trailer fields in the forwarded response; or, (b) the intermediary will attempt to buffer the
     1779               response on behalf of downstream recipients. Note that HTTP/1.1 does not define any means to limit the size of a chunked response
     1780               such that an intermediary can be assured of buffering the entire response.
     1781            </p>
     1782            <p id="rfc.section.4.3.p.7">When multiple transfer codings are acceptable, the client <em class="bcp14">MAY</em> rank the codings by preference using a case-insensitive "q" parameter (similar to the qvalues used in content negotiation
     1783               fields, <a href="p2-semantics.html#quality.values" title="Quality Values">Section 5.3.1</a> of <a href="#Part2" id="rfc.xref.Part2.17"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). The rank value is a real number in the range 0 through 1, where 0.001 is the least preferred and 1 is the most preferred;
     1784               a value of 0 means "not acceptable".
     1785            </p>
     1786            <p id="rfc.section.4.3.p.8">If the TE field-value is empty or if no TE field is present, the only acceptable transfer coding is chunked. A message with
     1787               no transfer coding is always acceptable.
     1788            </p>
     1789            <p id="rfc.section.4.3.p.9">Since the TE header field only applies to the immediate connection, a sender of TE <em class="bcp14">MUST</em> also send a "TE" connection option within the <a href="#header.connection" class="smpl">Connection</a> header field (<a href="#header.connection" id="rfc.xref.header.connection.3" title="Connection">Section&nbsp;6.1</a>) in order to prevent the TE field from being forwarded by intermediaries that do not support its semantics.
     1790            </p>
     1791         </div>
     1792      </div>
     1793      <div id="message.routing">
     1794         <h1 id="rfc.section.5"><a href="#rfc.section.5">5.</a>&nbsp;<a href="#message.routing">Message Routing</a></h1>
     1795         <p id="rfc.section.5.p.1">HTTP request message routing is determined by each client based on the target resource, the client's proxy configuration,
     1796            and establishment or reuse of an inbound connection. The corresponding response routing follows the same connection chain
     1797            back to the client.
     1798         </p>
     1799         <div id="target-resource">
     1800            <div id="rfc.iref.t.7"></div>
     1801            <div id="rfc.iref.t.8"></div>
     1802            <h2 id="rfc.section.5.1"><a href="#rfc.section.5.1">5.1</a>&nbsp;<a href="#target-resource">Identifying a Target Resource</a></h2>
     1803            <p id="rfc.section.5.1.p.1">HTTP is used in a wide variety of applications, ranging from general-purpose computers to home appliances. In some cases,
     1804               communication options are hard-coded in a client's configuration. However, most HTTP clients rely on the same resource identification
     1805               mechanism and configuration techniques as general-purpose Web browsers.
     1806            </p>
     1807            <p id="rfc.section.5.1.p.2">HTTP communication is initiated by a user agent for some purpose. The purpose is a combination of request semantics, which
     1808               are defined in <a href="#Part2" id="rfc.xref.Part2.18"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>, and a target resource upon which to apply those semantics. A URI reference (<a href="#uri" title="Uniform Resource Identifiers">Section&nbsp;2.7</a>) is typically used as an identifier for the "<dfn>target resource</dfn>", which a user agent would resolve to its absolute form in order to obtain the "<dfn>target URI</dfn>". The target URI excludes the reference's fragment component, if any, since fragment identifiers are reserved for client-side
     1809               processing (<a href="#RFC3986" id="rfc.xref.RFC3986.17"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="https://tools.ietf.org/html/rfc3986#section-3.5">Section 3.5</a>).
     1810            </p>
     1811         </div>
     1812         <div id="connecting.inbound">
     1813            <h2 id="rfc.section.5.2"><a href="#rfc.section.5.2">5.2</a>&nbsp;<a href="#connecting.inbound">Connecting Inbound</a></h2>
     1814            <p id="rfc.section.5.2.p.1">Once the target URI is determined, a client needs to decide whether a network request is necessary to accomplish the desired
     1815               semantics and, if so, where that request is to be directed.
     1816            </p>
     1817            <p id="rfc.section.5.2.p.2">If the client has a cache <a href="#Part6" id="rfc.xref.Part6.5"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a> and the request can be satisfied by it, then the request is usually directed there first.
     1818            </p>
     1819            <p id="rfc.section.5.2.p.3">If the request is not satisfied by a cache, then a typical client will check its configuration to determine whether a proxy
     1820               is to be used to satisfy the request. Proxy configuration is implementation-dependent, but is often based on URI prefix matching,
     1821               selective authority matching, or both, and the proxy itself is usually identified by an "http" or "https" URI. If a proxy
     1822               is applicable, the client connects inbound by establishing (or reusing) a connection to that proxy.
     1823            </p>
     1824            <p id="rfc.section.5.2.p.4">If no proxy is applicable, a typical client will invoke a handler routine, usually specific to the target URI's scheme, to
     1825               connect directly to an authority for the target resource. How that is accomplished is dependent on the target URI scheme and
     1826               defined by its associated specification, similar to how this specification defines origin server access for resolution of
     1827               the "http" (<a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>) and "https" (<a href="#https.uri" title="https URI scheme">Section&nbsp;2.7.2</a>) schemes.
     1828            </p>
     1829            <p id="rfc.section.5.2.p.5">HTTP requirements regarding connection management are defined in <a href="#connection.management" title="Connection Management">Section&nbsp;6</a>.
     1830            </p>
     1831         </div>
     1832         <div id="request-target">
     1833            <h2 id="rfc.section.5.3"><a href="#rfc.section.5.3">5.3</a>&nbsp;<a href="#request-target">Request Target</a></h2>
     1834            <p id="rfc.section.5.3.p.1">Once an inbound connection is obtained, the client sends an HTTP request message (<a href="#http.message" title="Message Format">Section&nbsp;3</a>) with a request-target derived from the target URI. There are four distinct formats for the request-target, depending on
     1835               both the method being requested and whether the request is to a proxy.
     1836            </p>
     1837            <div id="rfc.figure.u.37"></div><pre class="inline"><span id="rfc.iref.g.81"></span><span id="rfc.iref.g.82"></span><span id="rfc.iref.g.83"></span><span id="rfc.iref.g.84"></span><span id="rfc.iref.g.85"></span>  <a href="#request-target" class="smpl">request-target</a> = <a href="#origin-form" class="smpl">origin-form</a>
    17341838                 / <a href="#absolute-form" class="smpl">absolute-form</a>
    17351839                 / <a href="#authority-form" class="smpl">authority-form</a>
     
    17411845  <a href="#asterisk-form" class="smpl">asterisk-form</a>  = "*"
    17421846</pre><div id="origin-form">
    1743          <p id="rfc.section.5.3.p.3"><span id="rfc.iref.o.3"></span> <b>origin-form</b>
    1744          </p>
    1745       </div>
    1746       <p id="rfc.section.5.3.p.4">The most common form of request-target is the <dfn>origin-form</dfn>. When making a request directly to an origin server, other than a CONNECT or server-wide OPTIONS request (as detailed below),
    1747          a client <em class="bcp14">MUST</em> send only the absolute path and query components of the target URI as the request-target. If the target URI's path component
    1748          is empty, then the client <em class="bcp14">MUST</em> send "/" as the path within the origin-form of request-target. A <a href="#header.host" class="smpl">Host</a> header field is also sent, as defined in <a href="#header.host" id="rfc.xref.header.host.1" title="Host">Section&nbsp;5.4</a>, containing the target URI's authority component (excluding any userinfo).
    1749       </p>
    1750       <p id="rfc.section.5.3.p.5">For example, a client wishing to retrieve a representation of the resource identified as</p>
    1751       <div id="rfc.figure.u.38"></div><pre class="text">http://www.example.org/where?q=now
     1847               <p id="rfc.section.5.3.p.3"><span id="rfc.iref.o.3"></span> <b>origin-form</b>
     1848               </p>
     1849            </div>
     1850            <p id="rfc.section.5.3.p.4">The most common form of request-target is the <dfn>origin-form</dfn>. When making a request directly to an origin server, other than a CONNECT or server-wide OPTIONS request (as detailed below),
     1851               a client <em class="bcp14">MUST</em> send only the absolute path and query components of the target URI as the request-target. If the target URI's path component
     1852               is empty, then the client <em class="bcp14">MUST</em> send "/" as the path within the origin-form of request-target. A <a href="#header.host" class="smpl">Host</a> header field is also sent, as defined in <a href="#header.host" id="rfc.xref.header.host.1" title="Host">Section&nbsp;5.4</a>, containing the target URI's authority component (excluding any userinfo).
     1853            </p>
     1854            <p id="rfc.section.5.3.p.5">For example, a client wishing to retrieve a representation of the resource identified as</p>
     1855            <div id="rfc.figure.u.38"></div><pre class="text">http://www.example.org/where?q=now
    17521856</pre><p id="rfc.section.5.3.p.7">directly from the origin server would open (or reuse) a TCP connection to port 80 of the host "www.example.org" and send the
    1753          lines:
    1754       </p>
    1755       <div id="rfc.figure.u.39"></div><pre class="text2">GET /where?q=now HTTP/1.1
     1857               lines:
     1858            </p>
     1859            <div id="rfc.figure.u.39"></div><pre class="text2">GET /where?q=now HTTP/1.1
    17561860Host: www.example.org
    17571861</pre><p id="rfc.section.5.3.p.9">followed by the remainder of the request message.</p>
    1758       <div id="absolute-form">
    1759          <p id="rfc.section.5.3.p.10"><span id="rfc.iref.a.2"></span> <b>absolute-form</b>
    1760          </p>
    1761       </div>
    1762       <p id="rfc.section.5.3.p.11">When making a request to a proxy, other than a CONNECT or server-wide OPTIONS request (as detailed below), a client <em class="bcp14">MUST</em> send the target URI in <dfn>absolute-form</dfn> as the request-target. The proxy is requested to either service that request from a valid cache, if possible, or make the
    1763          same request on the client's behalf to either the next inbound proxy server or directly to the origin server indicated by
    1764          the request-target. Requirements on such "forwarding" of messages are defined in <a href="#message.forwarding" title="Message Forwarding">Section&nbsp;5.7</a>.
    1765       </p>
    1766       <p id="rfc.section.5.3.p.12">An example absolute-form of request-line would be:</p>
    1767       <div id="rfc.figure.u.40"></div><pre class="text2">GET http://www.example.org/pub/WWW/TheProject.html HTTP/1.1
     1862            <div id="absolute-form">
     1863               <p id="rfc.section.5.3.p.10"><span id="rfc.iref.a.2"></span> <b>absolute-form</b>
     1864               </p>
     1865            </div>
     1866            <p id="rfc.section.5.3.p.11">When making a request to a proxy, other than a CONNECT or server-wide OPTIONS request (as detailed below), a client <em class="bcp14">MUST</em> send the target URI in <dfn>absolute-form</dfn> as the request-target. The proxy is requested to either service that request from a valid cache, if possible, or make the
     1867               same request on the client's behalf to either the next inbound proxy server or directly to the origin server indicated by
     1868               the request-target. Requirements on such "forwarding" of messages are defined in <a href="#message.forwarding" title="Message Forwarding">Section&nbsp;5.7</a>.
     1869            </p>
     1870            <p id="rfc.section.5.3.p.12">An example absolute-form of request-line would be:</p>
     1871            <div id="rfc.figure.u.40"></div><pre class="text2">GET http://www.example.org/pub/WWW/TheProject.html HTTP/1.1
    17681872</pre><p id="rfc.section.5.3.p.14">To allow for transition to the absolute-form for all requests in some future version of HTTP, HTTP/1.1 servers <em class="bcp14">MUST</em> accept the absolute-form in requests, even though HTTP/1.1 clients will only send them in requests to proxies.
    1769       </p>
    1770       <div id="authority-form">
    1771          <p id="rfc.section.5.3.p.15"><span id="rfc.iref.a.3"></span> <b>authority-form</b>
    1772          </p>
    1773       </div>
    1774       <p id="rfc.section.5.3.p.16">The <dfn>authority-form</dfn> of request-target is only used for CONNECT requests (<a href="p2-semantics.html#CONNECT" title="CONNECT">Section 4.3.6</a> of <a href="#Part2" id="rfc.xref.Part2.19"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). When making a CONNECT request to establish a tunnel through one or more proxies, a client <em class="bcp14">MUST</em> send only the target URI's authority component (excluding any userinfo) as the request-target. For example,
    1775       </p>
    1776       <div id="rfc.figure.u.41"></div><pre class="text2">CONNECT www.example.com:80 HTTP/1.1
     1873            </p>
     1874            <div id="authority-form">
     1875               <p id="rfc.section.5.3.p.15"><span id="rfc.iref.a.3"></span> <b>authority-form</b>
     1876               </p>
     1877            </div>
     1878            <p id="rfc.section.5.3.p.16">The <dfn>authority-form</dfn> of request-target is only used for CONNECT requests (<a href="p2-semantics.html#CONNECT" title="CONNECT">Section 4.3.6</a> of <a href="#Part2" id="rfc.xref.Part2.19"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). When making a CONNECT request to establish a tunnel through one or more proxies, a client <em class="bcp14">MUST</em> send only the target URI's authority component (excluding any userinfo) as the request-target. For example,
     1879            </p>
     1880            <div id="rfc.figure.u.41"></div><pre class="text2">CONNECT www.example.com:80 HTTP/1.1
    17771881</pre><div id="asterisk-form">
    1778          <p id="rfc.section.5.3.p.18"><span id="rfc.iref.a.4"></span> <b>asterisk-form</b>
    1779          </p>
    1780       </div>
    1781       <p id="rfc.section.5.3.p.19">The <dfn>asterisk-form</dfn> of request-target is only used for a server-wide OPTIONS request (<a href="p2-semantics.html#OPTIONS" title="OPTIONS">Section 4.3.7</a> of <a href="#Part2" id="rfc.xref.Part2.20"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). When a client wishes to request OPTIONS for the server as a whole, as opposed to a specific named resource of that server,
    1782          the client <em class="bcp14">MUST</em> send only "*" (%x2A) as the request-target. For example,
    1783       </p>
    1784       <div id="rfc.figure.u.42"></div><pre class="text2">OPTIONS * HTTP/1.1
     1882               <p id="rfc.section.5.3.p.18"><span id="rfc.iref.a.4"></span> <b>asterisk-form</b>
     1883               </p>
     1884            </div>
     1885            <p id="rfc.section.5.3.p.19">The <dfn>asterisk-form</dfn> of request-target is only used for a server-wide OPTIONS request (<a href="p2-semantics.html#OPTIONS" title="OPTIONS">Section 4.3.7</a> of <a href="#Part2" id="rfc.xref.Part2.20"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). When a client wishes to request OPTIONS for the server as a whole, as opposed to a specific named resource of that server,
     1886               the client <em class="bcp14">MUST</em> send only "*" (%x2A) as the request-target. For example,
     1887            </p>
     1888            <div id="rfc.figure.u.42"></div><pre class="text2">OPTIONS * HTTP/1.1
    17851889</pre><p id="rfc.section.5.3.p.21">If a proxy receives an OPTIONS request with an absolute-form of request-target in which the URI has an empty path and no query
    1786          component, then the last proxy on the request chain <em class="bcp14">MUST</em> send a request-target of "*" when it forwards the request to the indicated origin server.
    1787       </p>
    1788       <div id="rfc.figure.u.43"></div>
    1789       <p>For example, the request</p><pre class="text2">OPTIONS http://www.example.org:8001 HTTP/1.1
     1890               component, then the last proxy on the request chain <em class="bcp14">MUST</em> send a request-target of "*" when it forwards the request to the indicated origin server.
     1891            </p>
     1892            <div id="rfc.figure.u.43"></div>
     1893            <p>For example, the request</p><pre class="text2">OPTIONS http://www.example.org:8001 HTTP/1.1
    17901894</pre><div id="rfc.figure.u.44"></div>
    1791       <p>would be forwarded by the final proxy as</p><pre class="text2">OPTIONS * HTTP/1.1
     1895            <p>would be forwarded by the final proxy as</p><pre class="text2">OPTIONS * HTTP/1.1
    17921896Host: www.example.org:8001
    17931897</pre><p>after connecting to port 8001 of host "www.example.org".</p>
    1794       <div id="rfc.iref.h.6"></div>
    1795       <h2 id="rfc.section.5.4"><a href="#rfc.section.5.4">5.4</a>&nbsp;<a id="header.host" href="#header.host">Host</a></h2>
    1796       <p id="rfc.section.5.4.p.1">The "Host" header field in a request provides the host and port information from the target URI, enabling the origin server
    1797          to distinguish among resources while servicing requests for multiple host names on a single IP address. Since the Host field-value
    1798          is critical information for handling a request, it <em class="bcp14">SHOULD</em> be sent as the first header field following the request-line.
    1799       </p>
    1800       <div id="rfc.figure.u.45"></div><pre class="inline"><span id="rfc.iref.g.86"></span>  <a href="#header.host" class="smpl">Host</a> = <a href="#uri" class="smpl">uri-host</a> [ ":" <a href="#uri" class="smpl">port</a> ] ; <a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>
     1898         </div>
     1899         <div id="header.host">
     1900            <div id="rfc.iref.h.6"></div>
     1901            <h2 id="rfc.section.5.4"><a href="#rfc.section.5.4">5.4</a>&nbsp;<a href="#header.host">Host</a></h2>
     1902            <p id="rfc.section.5.4.p.1">The "Host" header field in a request provides the host and port information from the target URI, enabling the origin server
     1903               to distinguish among resources while servicing requests for multiple host names on a single IP address. Since the Host field-value
     1904               is critical information for handling a request, it <em class="bcp14">SHOULD</em> be sent as the first header field following the request-line.
     1905            </p>
     1906            <div id="rfc.figure.u.45"></div><pre class="inline"><span id="rfc.iref.g.86"></span>  <a href="#header.host" class="smpl">Host</a> = <a href="#uri" class="smpl">uri-host</a> [ ":" <a href="#uri" class="smpl">port</a> ] ; <a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>
    18011907</pre><p id="rfc.section.5.4.p.3">A client <em class="bcp14">MUST</em> send a Host header field in all HTTP/1.1 request messages. If the target URI includes an authority component, then the Host
    1802          field-value <em class="bcp14">MUST</em> be identical to that authority component after excluding any userinfo (<a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>). If the authority component is missing or undefined for the target URI, then the Host header field <em class="bcp14">MUST</em> be sent with an empty field-value.
    1803       </p>
    1804       <p id="rfc.section.5.4.p.4">For example, a GET request to the origin server for &lt;http://www.example.org/pub/WWW/&gt; would begin with:</p>
    1805       <div id="rfc.figure.u.46"></div><pre class="text2">GET /pub/WWW/ HTTP/1.1
     1908               field-value <em class="bcp14">MUST</em> be identical to that authority component after excluding any userinfo (<a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>). If the authority component is missing or undefined for the target URI, then the Host header field <em class="bcp14">MUST</em> be sent with an empty field-value.
     1909            </p>
     1910            <p id="rfc.section.5.4.p.4">For example, a GET request to the origin server for &lt;http://www.example.org/pub/WWW/&gt; would begin with:</p>
     1911            <div id="rfc.figure.u.46"></div><pre class="text2">GET /pub/WWW/ HTTP/1.1
    18061912Host: www.example.org
    18071913</pre><p id="rfc.section.5.4.p.6">The Host header field <em class="bcp14">MUST</em> be sent in an HTTP/1.1 request even if the request-target is in the absolute-form, since this allows the Host information
    1808          to be forwarded through ancient HTTP/1.0 proxies that might not have implemented Host.
    1809       </p>
    1810       <p id="rfc.section.5.4.p.7">When a proxy receives a request with an absolute-form of request-target, the proxy <em class="bcp14">MUST</em> ignore the received Host header field (if any) and instead replace it with the host information of the request-target. If
    1811          the proxy forwards the request, it <em class="bcp14">MUST</em> generate a new Host field-value based on the received request-target rather than forward the received Host field-value.
    1812       </p>
    1813       <p id="rfc.section.5.4.p.8">Since the Host header field acts as an application-level routing mechanism, it is a frequent target for malware seeking to
    1814          poison a shared cache or redirect a request to an unintended server. An interception proxy is particularly vulnerable if it
    1815          relies on the Host field-value for redirecting requests to internal servers, or for use as a cache key in a shared cache,
    1816          without first verifying that the intercepted connection is targeting a valid IP address for that host.
    1817       </p>
    1818       <p id="rfc.section.5.4.p.9">A server <em class="bcp14">MUST</em> respond with a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> status code to any HTTP/1.1 request message that lacks a Host header field and to any request message that contains more than
    1819          one Host header field or a Host header field with an invalid field-value.
    1820       </p>
    1821       <div id="rfc.iref.e.1"></div>
    1822       <h2 id="rfc.section.5.5"><a href="#rfc.section.5.5">5.5</a>&nbsp;<a id="effective.request.uri" href="#effective.request.uri">Effective Request URI</a></h2>
    1823       <p id="rfc.section.5.5.p.1">A server that receives an HTTP request message <em class="bcp14">MUST</em> reconstruct the user agent's original target URI, based on the pieces of information learned from the request-target, <a href="#header.host" class="smpl">Host</a> header field, and connection context, in order to identify the intended target resource and properly service the request.
    1824          The URI derived from this reconstruction process is referred to as the "<dfn>effective request URI</dfn>".
    1825       </p>
    1826       <p id="rfc.section.5.5.p.2">For a user agent, the effective request URI is the target URI.</p>
    1827       <p id="rfc.section.5.5.p.3">If the request-target is in absolute-form, then the effective request URI is the same as the request-target. Otherwise, the
    1828          effective request URI is constructed as follows.
    1829       </p>
    1830       <p id="rfc.section.5.5.p.4">If the request is received over a TLS-secured TCP connection, then the effective request URI's scheme is "https"; otherwise,
    1831          the scheme is "http".
    1832       </p>
    1833       <p id="rfc.section.5.5.p.5">If the request-target is in authority-form, then the effective request URI's authority component is the same as the request-target.
    1834          Otherwise, if a <a href="#header.host" class="smpl">Host</a> header field is supplied with a non-empty field-value, then the authority component is the same as the Host field-value. Otherwise,
    1835          the authority component is the concatenation of the default host name configured for the server, a colon (":"), and the connection's
    1836          incoming TCP port number in decimal form.
    1837       </p>
    1838       <p id="rfc.section.5.5.p.6">If the request-target is in authority-form or asterisk-form, then the effective request URI's combined path and query component
    1839          is empty. Otherwise, the combined path and query component is the same as the request-target.
    1840       </p>
    1841       <p id="rfc.section.5.5.p.7">The components of the effective request URI, once determined as above, can be combined into absolute-URI form by concatenating
    1842          the scheme, "://", authority, and combined path and query component.
    1843       </p>
    1844       <div id="rfc.figure.u.47"></div>
    1845       <p>Example 1: the following message received over an insecure TCP connection</p><pre class="text">GET /pub/WWW/TheProject.html HTTP/1.1
     1914               to be forwarded through ancient HTTP/1.0 proxies that might not have implemented Host.
     1915            </p>
     1916            <p id="rfc.section.5.4.p.7">When a proxy receives a request with an absolute-form of request-target, the proxy <em class="bcp14">MUST</em> ignore the received Host header field (if any) and instead replace it with the host information of the request-target. If
     1917               the proxy forwards the request, it <em class="bcp14">MUST</em> generate a new Host field-value based on the received request-target rather than forward the received Host field-value.
     1918            </p>
     1919            <p id="rfc.section.5.4.p.8">Since the Host header field acts as an application-level routing mechanism, it is a frequent target for malware seeking to
     1920               poison a shared cache or redirect a request to an unintended server. An interception proxy is particularly vulnerable if it
     1921               relies on the Host field-value for redirecting requests to internal servers, or for use as a cache key in a shared cache,
     1922               without first verifying that the intercepted connection is targeting a valid IP address for that host.
     1923            </p>
     1924            <p id="rfc.section.5.4.p.9">A server <em class="bcp14">MUST</em> respond with a <a href="p2-semantics.html#status.400" class="smpl">400 (Bad Request)</a> status code to any HTTP/1.1 request message that lacks a Host header field and to any request message that contains more than
     1925               one Host header field or a Host header field with an invalid field-value.
     1926            </p>
     1927         </div>
     1928         <div id="effective.request.uri">
     1929            <div id="rfc.iref.e.1"></div>
     1930            <h2 id="rfc.section.5.5"><a href="#rfc.section.5.5">5.5</a>&nbsp;<a href="#effective.request.uri">Effective Request URI</a></h2>
     1931            <p id="rfc.section.5.5.p.1">A server that receives an HTTP request message <em class="bcp14">MUST</em> reconstruct the user agent's original target URI, based on the pieces of information learned from the request-target, <a href="#header.host" class="smpl">Host</a> header field, and connection context, in order to identify the intended target resource and properly service the request.
     1932               The URI derived from this reconstruction process is referred to as the "<dfn>effective request URI</dfn>".
     1933            </p>
     1934            <p id="rfc.section.5.5.p.2">For a user agent, the effective request URI is the target URI.</p>
     1935            <p id="rfc.section.5.5.p.3">If the request-target is in absolute-form, then the effective request URI is the same as the request-target. Otherwise, the
     1936               effective request URI is constructed as follows.
     1937            </p>
     1938            <p id="rfc.section.5.5.p.4">If the request is received over a TLS-secured TCP connection, then the effective request URI's scheme is "https"; otherwise,
     1939               the scheme is "http".
     1940            </p>
     1941            <p id="rfc.section.5.5.p.5">If the request-target is in authority-form, then the effective request URI's authority component is the same as the request-target.
     1942               Otherwise, if a <a href="#header.host" class="smpl">Host</a> header field is supplied with a non-empty field-value, then the authority component is the same as the Host field-value. Otherwise,
     1943               the authority component is the concatenation of the default host name configured for the server, a colon (":"), and the connection's
     1944               incoming TCP port number in decimal form.
     1945            </p>
     1946            <p id="rfc.section.5.5.p.6">If the request-target is in authority-form or asterisk-form, then the effective request URI's combined path and query component
     1947               is empty. Otherwise, the combined path and query component is the same as the request-target.
     1948            </p>
     1949            <p id="rfc.section.5.5.p.7">The components of the effective request URI, once determined as above, can be combined into absolute-URI form by concatenating
     1950               the scheme, "://", authority, and combined path and query component.
     1951            </p>
     1952            <div id="rfc.figure.u.47"></div>
     1953            <p>Example 1: the following message received over an insecure TCP connection</p><pre class="text">GET /pub/WWW/TheProject.html HTTP/1.1
    18461954Host: www.example.org:8080
    18471955</pre><div id="rfc.figure.u.48"></div>
    1848       <p>has an effective request URI of</p><pre class="text">http://www.example.org:8080/pub/WWW/TheProject.html
     1956            <p>has an effective request URI of</p><pre class="text">http://www.example.org:8080/pub/WWW/TheProject.html
    18491957</pre><div id="rfc.figure.u.49"></div>
    1850       <p>Example 2: the following message received over a TLS-secured TCP connection</p><pre class="text">OPTIONS * HTTP/1.1
     1958            <p>Example 2: the following message received over a TLS-secured TCP connection</p><pre class="text">OPTIONS * HTTP/1.1
    18511959Host: www.example.org
    18521960</pre><div id="rfc.figure.u.50"></div>
    1853       <p>has an effective request URI of</p><pre class="text">https://www.example.org
     1961            <p>has an effective request URI of</p><pre class="text">https://www.example.org
    18541962</pre><p id="rfc.section.5.5.p.12">An origin server that does not allow resources to differ by requested host <em class="bcp14">MAY</em> ignore the <a href="#header.host" class="smpl">Host</a> field-value and instead replace it with a configured server name when constructing the effective request URI.
    1855       </p>
    1856       <p id="rfc.section.5.5.p.13">Recipients of an HTTP/1.0 request that lacks a <a href="#header.host" class="smpl">Host</a> header field <em class="bcp14">MAY</em> attempt to use heuristics (e.g., examination of the URI path for something unique to a particular host) in order to guess
    1857          the effective request URI's authority component.
    1858       </p>
    1859       <h2 id="rfc.section.5.6"><a href="#rfc.section.5.6">5.6</a>&nbsp;<a id="associating.response.to.request" href="#associating.response.to.request">Associating a Response to a Request</a></h2>
    1860       <p id="rfc.section.5.6.p.1">HTTP does not include a request identifier for associating a given request message with its corresponding one or more response
    1861          messages. Hence, it relies on the order of response arrival to correspond exactly to the order in which requests are made
    1862          on the same connection. More than one response message per request only occurs when one or more informational responses (<a href="p2-semantics.html#status.1xx" class="smpl">1xx</a>, see <a href="p2-semantics.html#status.1xx" title="Informational 1xx">Section 6.2</a> of <a href="#Part2" id="rfc.xref.Part2.21"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>) precede a final response to the same request.
    1863       </p>
    1864       <p id="rfc.section.5.6.p.2">A client that has more than one outstanding request on a connection <em class="bcp14">MUST</em> maintain a list of outstanding requests in the order sent and <em class="bcp14">MUST</em> associate each received response message on that connection to the highest ordered request that has not yet received a final
    1865          (non-<a href="p2-semantics.html#status.1xx" class="smpl">1xx</a>) response.
    1866       </p>
    1867       <h2 id="rfc.section.5.7"><a href="#rfc.section.5.7">5.7</a>&nbsp;<a id="message.forwarding" href="#message.forwarding">Message Forwarding</a></h2>
    1868       <p id="rfc.section.5.7.p.1">As described in <a href="#intermediaries" title="Intermediaries">Section&nbsp;2.3</a>, intermediaries can serve a variety of roles in the processing of HTTP requests and responses. Some intermediaries are used
    1869          to improve performance or availability. Others are used for access control or to filter content. Since an HTTP stream has
    1870          characteristics similar to a pipe-and-filter architecture, there are no inherent limits to the extent an intermediary can
    1871          enhance (or interfere) with either direction of the stream.
    1872       </p>
    1873       <p id="rfc.section.5.7.p.2">Intermediaries that forward a message <em class="bcp14">MUST</em> implement the <a href="#header.connection" class="smpl">Connection</a> header field, as specified in <a href="#header.connection" id="rfc.xref.header.connection.4" title="Connection">Section&nbsp;6.1</a>, to exclude fields that are only intended for the incoming connection.
    1874       </p>
    1875       <p id="rfc.section.5.7.p.3">In order to avoid request loops, a proxy that forwards requests to other proxies <em class="bcp14">MUST</em> be able to recognize and exclude all of its own server names, including any aliases, local variations, or literal IP addresses.
    1876       </p>
    1877       <div id="rfc.iref.v.1"></div>
    1878       <h3 id="rfc.section.5.7.1"><a href="#rfc.section.5.7.1">5.7.1</a>&nbsp;<a id="header.via" href="#header.via">Via</a></h3>
    1879       <p id="rfc.section.5.7.1.p.1">The "Via" header field indicates the presence of intermediate protocols and recipients between the user agent and the server
    1880          (on requests) or between the origin server and the client (on responses), similar to the "Received" header field in email
    1881          (<a href="http://tools.ietf.org/html/rfc5322#section-3.6.7">Section 3.6.7</a> of <a href="#RFC5322" id="rfc.xref.RFC5322.3"><cite title="Internet Message Format">[RFC5322]</cite></a>). Via can be used for tracking message forwards, avoiding request loops, and identifying the protocol capabilities of senders
    1882          along the request/response chain.
    1883       </p>
    1884       <div id="rfc.figure.u.51"></div><pre class="inline"><span id="rfc.iref.g.87"></span><span id="rfc.iref.g.88"></span><span id="rfc.iref.g.89"></span><span id="rfc.iref.g.90"></span><span id="rfc.iref.g.91"></span><span id="rfc.iref.g.92"></span>  <a href="#header.via" class="smpl">Via</a> = 1#( <a href="#header.via" class="smpl">received-protocol</a> <a href="#rule.whitespace" class="smpl">RWS</a> <a href="#header.via" class="smpl">received-by</a> [ <a href="#rule.whitespace" class="smpl">RWS</a> <a href="#rule.comment" class="smpl">comment</a> ] )
     1963            </p>
     1964            <p id="rfc.section.5.5.p.13">Recipients of an HTTP/1.0 request that lacks a <a href="#header.host" class="smpl">Host</a> header field <em class="bcp14">MAY</em> attempt to use heuristics (e.g., examination of the URI path for something unique to a particular host) in order to guess
     1965               the effective request URI's authority component.
     1966            </p>
     1967         </div>
     1968         <div id="associating.response.to.request">
     1969            <h2 id="rfc.section.5.6"><a href="#rfc.section.5.6">5.6</a>&nbsp;<a href="#associating.response.to.request">Associating a Response to a Request</a></h2>
     1970            <p id="rfc.section.5.6.p.1">HTTP does not include a request identifier for associating a given request message with its corresponding one or more response
     1971               messages. Hence, it relies on the order of response arrival to correspond exactly to the order in which requests are made
     1972               on the same connection. More than one response message per request only occurs when one or more informational responses (<a href="p2-semantics.html#status.1xx" class="smpl">1xx</a>, see <a href="p2-semantics.html#status.1xx" title="Informational 1xx">Section 6.2</a> of <a href="#Part2" id="rfc.xref.Part2.21"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>) precede a final response to the same request.
     1973            </p>
     1974            <p id="rfc.section.5.6.p.2">A client that has more than one outstanding request on a connection <em class="bcp14">MUST</em> maintain a list of outstanding requests in the order sent and <em class="bcp14">MUST</em> associate each received response message on that connection to the highest ordered request that has not yet received a final
     1975               (non-<a href="p2-semantics.html#status.1xx" class="smpl">1xx</a>) response.
     1976            </p>
     1977         </div>
     1978         <div id="message.forwarding">
     1979            <h2 id="rfc.section.5.7"><a href="#rfc.section.5.7">5.7</a>&nbsp;<a href="#message.forwarding">Message Forwarding</a></h2>
     1980            <p id="rfc.section.5.7.p.1">As described in <a href="#intermediaries" title="Intermediaries">Section&nbsp;2.3</a>, intermediaries can serve a variety of roles in the processing of HTTP requests and responses. Some intermediaries are used
     1981               to improve performance or availability. Others are used for access control or to filter content. Since an HTTP stream has
     1982               characteristics similar to a pipe-and-filter architecture, there are no inherent limits to the extent an intermediary can
     1983               enhance (or interfere) with either direction of the stream.
     1984            </p>
     1985            <p id="rfc.section.5.7.p.2">Intermediaries that forward a message <em class="bcp14">MUST</em> implement the <a href="#header.connection" class="smpl">Connection</a> header field, as specified in <a href="#header.connection" id="rfc.xref.header.connection.4" title="Connection">Section&nbsp;6.1</a>, to exclude fields that are only intended for the incoming connection.
     1986            </p>
     1987            <p id="rfc.section.5.7.p.3">In order to avoid request loops, a proxy that forwards requests to other proxies <em class="bcp14">MUST</em> be able to recognize and exclude all of its own server names, including any aliases, local variations, or literal IP addresses.
     1988            </p>
     1989            <div id="header.via">
     1990               <div id="rfc.iref.v.1"></div>
     1991               <h3 id="rfc.section.5.7.1"><a href="#rfc.section.5.7.1">5.7.1</a>&nbsp;<a href="#header.via">Via</a></h3>
     1992               <p id="rfc.section.5.7.1.p.1">The "Via" header field indicates the presence of intermediate protocols and recipients between the user agent and the server
     1993                  (on requests) or between the origin server and the client (on responses), similar to the "Received" header field in email
     1994                  (<a href="https://tools.ietf.org/html/rfc5322#section-3.6.7">Section 3.6.7</a> of <a href="#RFC5322" id="rfc.xref.RFC5322.3"><cite title="Internet Message Format">[RFC5322]</cite></a>). Via can be used for tracking message forwards, avoiding request loops, and identifying the protocol capabilities of senders
     1995                  along the request/response chain.
     1996               </p>
     1997               <div id="rfc.figure.u.51"></div><pre class="inline"><span id="rfc.iref.g.87"></span><span id="rfc.iref.g.88"></span><span id="rfc.iref.g.89"></span><span id="rfc.iref.g.90"></span><span id="rfc.iref.g.91"></span><span id="rfc.iref.g.92"></span>  <a href="#header.via" class="smpl">Via</a> = 1#( <a href="#header.via" class="smpl">received-protocol</a> <a href="#rule.whitespace" class="smpl">RWS</a> <a href="#header.via" class="smpl">received-by</a> [ <a href="#rule.whitespace" class="smpl">RWS</a> <a href="#rule.comment" class="smpl">comment</a> ] )
    18851998
    18861999  <a href="#header.via" class="smpl">received-protocol</a> = [ <a href="#header.upgrade" class="smpl">protocol-name</a> "/" ] <a href="#header.upgrade" class="smpl">protocol-version</a>
     
    18892002  <a href="#header.via" class="smpl">pseudonym</a>         = <a href="#rule.token.separators" class="smpl">token</a>
    18902003</pre><p id="rfc.section.5.7.1.p.3">Multiple Via field values represent each proxy or gateway that has forwarded the message. Each intermediary appends its own
    1891          information about how the message was received, such that the end result is ordered according to the sequence of forwarding
    1892          recipients.
    1893       </p>
    1894       <p id="rfc.section.5.7.1.p.4">A proxy <em class="bcp14">MUST</em> send an appropriate Via header field, as described below, in each message that it forwards. An HTTP-to-HTTP gateway <em class="bcp14">MUST</em> send an appropriate Via header field in each inbound request message and <em class="bcp14">MAY</em> send a Via header field in forwarded response messages.
    1895       </p>
    1896       <p id="rfc.section.5.7.1.p.5">For each intermediary, the received-protocol indicates the protocol and protocol version used by the upstream sender of the
    1897          message. Hence, the Via field value records the advertised protocol capabilities of the request/response chain such that they
    1898          remain visible to downstream recipients; this can be useful for determining what backwards-incompatible features might be
    1899          safe to use in response, or within a later request, as described in <a href="#http.version" title="Protocol Versioning">Section&nbsp;2.6</a>. For brevity, the protocol-name is omitted when the received protocol is HTTP.
    1900       </p>
    1901       <p id="rfc.section.5.7.1.p.6">The received-by field is normally the host and optional port number of a recipient server or client that subsequently forwarded
    1902          the message. However, if the real host is considered to be sensitive information, it <em class="bcp14">MAY</em> be replaced by a pseudonym. If the port is not given, it <em class="bcp14">MAY</em> be assumed to be the default port of the received-protocol.
    1903       </p>
    1904       <p id="rfc.section.5.7.1.p.7">Comments <em class="bcp14">MAY</em> be used in the Via header field to identify the software of each recipient, analogous to the <a href="p2-semantics.html#header.user-agent" class="smpl">User-Agent</a> and <a href="p2-semantics.html#header.server" class="smpl">Server</a> header fields. However, all comments in the Via field are optional and <em class="bcp14">MAY</em> be removed by any recipient prior to forwarding the message.
    1905       </p>
    1906       <p id="rfc.section.5.7.1.p.8">For example, a request message could be sent from an HTTP/1.0 user agent to an internal proxy code-named "fred", which uses
    1907          HTTP/1.1 to forward the request to a public proxy at p.example.net, which completes the request by forwarding it to the origin
    1908          server at www.example.com. The request received by www.example.com would then have the following Via header field:
    1909       </p>
    1910       <div id="rfc.figure.u.52"></div><pre class="text">  Via: 1.0 fred, 1.1 p.example.net
     2004                  information about how the message was received, such that the end result is ordered according to the sequence of forwarding
     2005                  recipients.
     2006               </p>
     2007               <p id="rfc.section.5.7.1.p.4">A proxy <em class="bcp14">MUST</em> send an appropriate Via header field, as described below, in each message that it forwards. An HTTP-to-HTTP gateway <em class="bcp14">MUST</em> send an appropriate Via header field in each inbound request message and <em class="bcp14">MAY</em> send a Via header field in forwarded response messages.
     2008               </p>
     2009               <p id="rfc.section.5.7.1.p.5">For each intermediary, the received-protocol indicates the protocol and protocol version used by the upstream sender of the
     2010                  message. Hence, the Via field value records the advertised protocol capabilities of the request/response chain such that they
     2011                  remain visible to downstream recipients; this can be useful for determining what backwards-incompatible features might be
     2012                  safe to use in response, or within a later request, as described in <a href="#http.version" title="Protocol Versioning">Section&nbsp;2.6</a>. For brevity, the protocol-name is omitted when the received protocol is HTTP.
     2013               </p>
     2014               <p id="rfc.section.5.7.1.p.6">The received-by field is normally the host and optional port number of a recipient server or client that subsequently forwarded
     2015                  the message. However, if the real host is considered to be sensitive information, it <em class="bcp14">MAY</em> be replaced by a pseudonym. If the port is not given, it <em class="bcp14">MAY</em> be assumed to be the default port of the received-protocol.
     2016               </p>
     2017               <p id="rfc.section.5.7.1.p.7">Comments <em class="bcp14">MAY</em> be used in the Via header field to identify the software of each recipient, analogous to the <a href="p2-semantics.html#header.user-agent" class="smpl">User-Agent</a> and <a href="p2-semantics.html#header.server" class="smpl">Server</a> header fields. However, all comments in the Via field are optional and <em class="bcp14">MAY</em> be removed by any recipient prior to forwarding the message.
     2018               </p>
     2019               <p id="rfc.section.5.7.1.p.8">For example, a request message could be sent from an HTTP/1.0 user agent to an internal proxy code-named "fred", which uses
     2020                  HTTP/1.1 to forward the request to a public proxy at p.example.net, which completes the request by forwarding it to the origin
     2021                  server at www.example.com. The request received by www.example.com would then have the following Via header field:
     2022               </p>
     2023               <div id="rfc.figure.u.52"></div><pre class="text">  Via: 1.0 fred, 1.1 p.example.net
    19112024</pre><p id="rfc.section.5.7.1.p.10">A proxy or gateway used as a portal through a network firewall <em class="bcp14">SHOULD NOT</em> forward the names and ports of hosts within the firewall region unless it is explicitly enabled to do so. If not enabled,
    1912          the received-by host of any host behind the firewall <em class="bcp14">SHOULD</em> be replaced by an appropriate pseudonym for that host.
    1913       </p>
    1914       <p id="rfc.section.5.7.1.p.11">A proxy or gateway <em class="bcp14">MAY</em> combine an ordered subsequence of Via header field entries into a single such entry if the entries have identical received-protocol
    1915          values. For example,
    1916       </p>
    1917       <div id="rfc.figure.u.53"></div><pre class="text">  Via: 1.0 ricky, 1.1 ethel, 1.1 fred, 1.0 lucy
     2025                  the received-by host of any host behind the firewall <em class="bcp14">SHOULD</em> be replaced by an appropriate pseudonym for that host.
     2026               </p>
     2027               <p id="rfc.section.5.7.1.p.11">A proxy or gateway <em class="bcp14">MAY</em> combine an ordered subsequence of Via header field entries into a single such entry if the entries have identical received-protocol
     2028                  values. For example,
     2029               </p>
     2030               <div id="rfc.figure.u.53"></div><pre class="text">  Via: 1.0 ricky, 1.1 ethel, 1.1 fred, 1.0 lucy
    19182031</pre><p id="rfc.section.5.7.1.p.13">could be collapsed to</p>
    1919       <div id="rfc.figure.u.54"></div><pre class="text">  Via: 1.0 ricky, 1.1 mertz, 1.0 lucy
     2032               <div id="rfc.figure.u.54"></div><pre class="text">  Via: 1.0 ricky, 1.1 mertz, 1.0 lucy
    19202033</pre><p id="rfc.section.5.7.1.p.15">Senders <em class="bcp14">SHOULD NOT</em> combine multiple entries unless they are all under the same organizational control and the hosts have already been replaced
    1921          by pseudonyms. Senders <em class="bcp14">MUST NOT</em> combine entries that have different received-protocol values.
    1922       </p>
    1923       <h3 id="rfc.section.5.7.2"><a href="#rfc.section.5.7.2">5.7.2</a>&nbsp;<a id="message.transformations" href="#message.transformations">Transformations</a></h3>
    1924       <p id="rfc.section.5.7.2.p.1">Some intermediaries include features for transforming messages and their payloads. A transforming proxy might, for example,
    1925          convert between image formats in order to save cache space or to reduce the amount of traffic on a slow link. However, operational
    1926          problems might occur when these transformations are applied to payloads intended for critical applications, such as medical
    1927          imaging or scientific data analysis, particularly when integrity checks or digital signatures are used to ensure that the
    1928          payload received is identical to the original.
    1929       </p>
    1930       <p id="rfc.section.5.7.2.p.2">If a proxy receives a request-target with a host name that is not a fully qualified domain name, it <em class="bcp14">MAY</em> add its own domain to the host name it received when forwarding the request. A proxy <em class="bcp14">MUST NOT</em> change the host name if it is a fully qualified domain name.
    1931       </p>
    1932       <p id="rfc.section.5.7.2.p.3">A proxy <em class="bcp14">MUST NOT</em> modify the "absolute-path" and "query" parts of the received request-target when forwarding it to the next inbound server,
    1933          except as noted above to replace an empty path with "/" or "*".
    1934       </p>
    1935       <p id="rfc.section.5.7.2.p.4">A proxy <em class="bcp14">MUST NOT</em> modify header fields that provide information about the end points of the communication chain, the resource state, or the
    1936          selected representation. A proxy <em class="bcp14">MAY</em> change the message body through application or removal of a transfer coding (<a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>).
    1937       </p>
    1938       <p id="rfc.section.5.7.2.p.5">A non-transforming proxy <em class="bcp14">MUST NOT</em> modify the message payload (<a href="p2-semantics.html#payload" title="Payload Semantics">Section 3.3</a> of <a href="#Part2" id="rfc.xref.Part2.22"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). A transforming proxy <em class="bcp14">MUST NOT</em> modify the payload of a message that contains the no-transform cache-control directive.
    1939       </p>
    1940       <p id="rfc.section.5.7.2.p.6">A transforming proxy <em class="bcp14">MAY</em> transform the payload of a message that does not contain the no-transform cache-control directive; if the payload is transformed,
    1941          the transforming proxy <em class="bcp14">MUST</em> add a Warning header field with the warn-code of 214 ("Transformation Applied") if one does not already appear in the message
    1942          (see <a href="p6-cache.html#header.warning" title="Warning">Section 7.5</a> of <a href="#Part6" id="rfc.xref.Part6.6"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>). If the payload of a <a href="p2-semantics.html#status.200" class="smpl">200 (OK)</a> response is transformed, the transforming proxy can also inform downstream recipients that a transformation has been applied
    1943          by changing the response status code to <a href="p2-semantics.html#status.203" class="smpl">203 (Non-Authoritative Information)</a> (<a href="p2-semantics.html#status.203" title="203 Non-Authoritative Information">Section 6.3.4</a> of <a href="#Part2" id="rfc.xref.Part2.23"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
    1944       </p>
    1945       <h1 id="rfc.section.6"><a href="#rfc.section.6">6.</a>&nbsp;<a id="connection.management" href="#connection.management">Connection Management</a></h1>
    1946       <p id="rfc.section.6.p.1">HTTP messaging is independent of the underlying transport or session-layer connection protocol(s). HTTP only presumes a reliable
    1947          transport with in-order delivery of requests and the corresponding in-order delivery of responses. The mapping of HTTP request
    1948          and response structures onto the data units of an underlying transport protocol is outside the scope of this specification.
    1949       </p>
    1950       <p id="rfc.section.6.p.2">As described in <a href="#connecting.inbound" title="Connecting Inbound">Section&nbsp;5.2</a>, the specific connection protocols to be used for an HTTP interaction are determined by client configuration and the <a href="#target-resource" class="smpl">target URI</a>. For example, the "http" URI scheme (<a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>) indicates a default connection of TCP over IP, with a default TCP port of 80, but the client might be configured to use
    1951          a proxy via some other connection, port, or protocol.
    1952       </p>
    1953       <p id="rfc.section.6.p.3">HTTP implementations are expected to engage in connection management, which includes maintaining the state of current connections,
    1954          establishing a new connection or reusing an existing connection, processing messages received on a connection, detecting connection
    1955          failures, and closing each connection. Most clients maintain multiple connections in parallel, including more than one connection
    1956          per server endpoint. Most servers are designed to maintain thousands of concurrent connections, while controlling request
    1957          queues to enable fair use and detect denial of service attacks.
    1958       </p>
    1959       <div id="rfc.iref.c.11"></div>
    1960       <div id="rfc.iref.c.12"></div>
    1961       <h2 id="rfc.section.6.1"><a href="#rfc.section.6.1">6.1</a>&nbsp;<a id="header.connection" href="#header.connection">Connection</a></h2>
    1962       <p id="rfc.section.6.1.p.1">The "Connection" header field allows the sender to indicate desired control options for the current connection. In order to
    1963          avoid confusing downstream recipients, a proxy or gateway <em class="bcp14">MUST</em> remove or replace any received connection options before forwarding the message.
    1964       </p>
    1965       <p id="rfc.section.6.1.p.2">When a header field aside from Connection is used to supply control information for or about the current connection, the sender <em class="bcp14">MUST</em> list the corresponding field-name within the "Connection" header field. A proxy or gateway <em class="bcp14">MUST</em> parse a received Connection header field before a message is forwarded and, for each connection-option in this field, remove
    1966          any header field(s) from the message with the same name as the connection-option, and then remove the Connection header field
    1967          itself (or replace it with the intermediary's own connection options for the forwarded message).
    1968       </p>
    1969       <p id="rfc.section.6.1.p.3">Hence, the Connection header field provides a declarative way of distinguishing header fields that are only intended for the
    1970          immediate recipient ("hop-by-hop") from those fields that are intended for all recipients on the chain ("end-to-end"), enabling
    1971          the message to be self-descriptive and allowing future connection-specific extensions to be deployed without fear that they
    1972          will be blindly forwarded by older intermediaries.
    1973       </p>
    1974       <p id="rfc.section.6.1.p.4">The Connection header field's value has the following grammar:</p>
    1975       <div id="rfc.figure.u.55"></div><pre class="inline"><span id="rfc.iref.g.93"></span><span id="rfc.iref.g.94"></span>  <a href="#header.connection" class="smpl">Connection</a>        = 1#<a href="#header.connection" class="smpl">connection-option</a>
     2034                  by pseudonyms. Senders <em class="bcp14">MUST NOT</em> combine entries that have different received-protocol values.
     2035               </p>
     2036            </div>
     2037            <div id="message.transformations">
     2038               <h3 id="rfc.section.5.7.2"><a href="#rfc.section.5.7.2">5.7.2</a>&nbsp;<a href="#message.transformations">Transformations</a></h3>
     2039               <p id="rfc.section.5.7.2.p.1">Some intermediaries include features for transforming messages and their payloads. A transforming proxy might, for example,
     2040                  convert between image formats in order to save cache space or to reduce the amount of traffic on a slow link. However, operational
     2041                  problems might occur when these transformations are applied to payloads intended for critical applications, such as medical
     2042                  imaging or scientific data analysis, particularly when integrity checks or digital signatures are used to ensure that the
     2043                  payload received is identical to the original.
     2044               </p>
     2045               <p id="rfc.section.5.7.2.p.2">If a proxy receives a request-target with a host name that is not a fully qualified domain name, it <em class="bcp14">MAY</em> add its own domain to the host name it received when forwarding the request. A proxy <em class="bcp14">MUST NOT</em> change the host name if it is a fully qualified domain name.
     2046               </p>
     2047               <p id="rfc.section.5.7.2.p.3">A proxy <em class="bcp14">MUST NOT</em> modify the "absolute-path" and "query" parts of the received request-target when forwarding it to the next inbound server,
     2048                  except as noted above to replace an empty path with "/" or "*".
     2049               </p>
     2050               <p id="rfc.section.5.7.2.p.4">A proxy <em class="bcp14">MUST NOT</em> modify header fields that provide information about the end points of the communication chain, the resource state, or the
     2051                  selected representation. A proxy <em class="bcp14">MAY</em> change the message body through application or removal of a transfer coding (<a href="#transfer.codings" title="Transfer Codings">Section&nbsp;4</a>).
     2052               </p>
     2053               <p id="rfc.section.5.7.2.p.5">A non-transforming proxy <em class="bcp14">MUST NOT</em> modify the message payload (<a href="p2-semantics.html#payload" title="Payload Semantics">Section 3.3</a> of <a href="#Part2" id="rfc.xref.Part2.22"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). A transforming proxy <em class="bcp14">MUST NOT</em> modify the payload of a message that contains the no-transform cache-control directive.
     2054               </p>
     2055               <p id="rfc.section.5.7.2.p.6">A transforming proxy <em class="bcp14">MAY</em> transform the payload of a message that does not contain the no-transform cache-control directive; if the payload is transformed,
     2056                  the transforming proxy <em class="bcp14">MUST</em> add a Warning header field with the warn-code of 214 ("Transformation Applied") if one does not already appear in the message
     2057                  (see <a href="p6-cache.html#header.warning" title="Warning">Section 7.5</a> of <a href="#Part6" id="rfc.xref.Part6.6"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>). If the payload of a <a href="p2-semantics.html#status.200" class="smpl">200 (OK)</a> response is transformed, the transforming proxy can also inform downstream recipients that a transformation has been applied
     2058                  by changing the response status code to <a href="p2-semantics.html#status.203" class="smpl">203 (Non-Authoritative Information)</a> (<a href="p2-semantics.html#status.203" title="203 Non-Authoritative Information">Section 6.3.4</a> of <a href="#Part2" id="rfc.xref.Part2.23"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
     2059               </p>
     2060            </div>
     2061         </div>
     2062      </div>
     2063      <div id="connection.management">
     2064         <h1 id="rfc.section.6"><a href="#rfc.section.6">6.</a>&nbsp;<a href="#connection.management">Connection Management</a></h1>
     2065         <p id="rfc.section.6.p.1">HTTP messaging is independent of the underlying transport or session-layer connection protocol(s). HTTP only presumes a reliable
     2066            transport with in-order delivery of requests and the corresponding in-order delivery of responses. The mapping of HTTP request
     2067            and response structures onto the data units of an underlying transport protocol is outside the scope of this specification.
     2068         </p>
     2069         <p id="rfc.section.6.p.2">As described in <a href="#connecting.inbound" title="Connecting Inbound">Section&nbsp;5.2</a>, the specific connection protocols to be used for an HTTP interaction are determined by client configuration and the <a href="#target-resource" class="smpl">target URI</a>. For example, the "http" URI scheme (<a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a>) indicates a default connection of TCP over IP, with a default TCP port of 80, but the client might be configured to use
     2070            a proxy via some other connection, port, or protocol.
     2071         </p>
     2072         <p id="rfc.section.6.p.3">HTTP implementations are expected to engage in connection management, which includes maintaining the state of current connections,
     2073            establishing a new connection or reusing an existing connection, processing messages received on a connection, detecting connection
     2074            failures, and closing each connection. Most clients maintain multiple connections in parallel, including more than one connection
     2075            per server endpoint. Most servers are designed to maintain thousands of concurrent connections, while controlling request
     2076            queues to enable fair use and detect denial of service attacks.
     2077         </p>
     2078         <div id="header.connection">
     2079            <div id="rfc.iref.c.11"></div>
     2080            <div id="rfc.iref.c.12"></div>
     2081            <h2 id="rfc.section.6.1"><a href="#rfc.section.6.1">6.1</a>&nbsp;<a href="#header.connection">Connection</a></h2>
     2082            <p id="rfc.section.6.1.p.1">The "Connection" header field allows the sender to indicate desired control options for the current connection. In order to
     2083               avoid confusing downstream recipients, a proxy or gateway <em class="bcp14">MUST</em> remove or replace any received connection options before forwarding the message.
     2084            </p>
     2085            <p id="rfc.section.6.1.p.2">When a header field aside from Connection is used to supply control information for or about the current connection, the sender <em class="bcp14">MUST</em> list the corresponding field-name within the "Connection" header field. A proxy or gateway <em class="bcp14">MUST</em> parse a received Connection header field before a message is forwarded and, for each connection-option in this field, remove
     2086               any header field(s) from the message with the same name as the connection-option, and then remove the Connection header field
     2087               itself (or replace it with the intermediary's own connection options for the forwarded message).
     2088            </p>
     2089            <p id="rfc.section.6.1.p.3">Hence, the Connection header field provides a declarative way of distinguishing header fields that are only intended for the
     2090               immediate recipient ("hop-by-hop") from those fields that are intended for all recipients on the chain ("end-to-end"), enabling
     2091               the message to be self-descriptive and allowing future connection-specific extensions to be deployed without fear that they
     2092               will be blindly forwarded by older intermediaries.
     2093            </p>
     2094            <p id="rfc.section.6.1.p.4">The Connection header field's value has the following grammar:</p>
     2095            <div id="rfc.figure.u.55"></div><pre class="inline"><span id="rfc.iref.g.93"></span><span id="rfc.iref.g.94"></span>  <a href="#header.connection" class="smpl">Connection</a>        = 1#<a href="#header.connection" class="smpl">connection-option</a>
    19762096  <a href="#header.connection" class="smpl">connection-option</a> = <a href="#rule.token.separators" class="smpl">token</a>
    19772097</pre><p id="rfc.section.6.1.p.6">Connection options are case-insensitive.</p>
    1978       <p id="rfc.section.6.1.p.7">A sender <em class="bcp14">MUST NOT</em> send a connection option corresponding to a header field that is intended for all recipients of the payload. For example, <a href="p6-cache.html#header.cache-control" class="smpl">Cache-Control</a> is never appropriate as a connection option (<a href="p6-cache.html#header.cache-control" title="Cache-Control">Section 7.2</a> of <a href="#Part6" id="rfc.xref.Part6.7"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>).
    1979       </p>
    1980       <p id="rfc.section.6.1.p.8">The connection options do not have to correspond to a header field present in the message, since a connection-specific header
    1981          field might not be needed if there are no parameters associated with that connection option. Recipients that trigger certain
    1982          connection behavior based on the presence of connection options <em class="bcp14">MUST</em> do so based on the presence of the connection-option rather than only the presence of the optional header field. In other
    1983          words, if the connection option is received as a header field but not indicated within the Connection field-value, then the
    1984          recipient <em class="bcp14">MUST</em> ignore the connection-specific header field because it has likely been forwarded by an intermediary that is only partially
    1985          conformant.
    1986       </p>
    1987       <p id="rfc.section.6.1.p.9">When defining new connection options, specifications ought to carefully consider existing deployed header fields and ensure
    1988          that the new connection option does not share the same name as an unrelated header field that might already be deployed. Defining
    1989          a new connection option essentially reserves that potential field-name for carrying additional information related to the
    1990          connection option, since it would be unwise for senders to use that field-name for anything else.
    1991       </p>
    1992       <p id="rfc.section.6.1.p.10">The "<dfn>close</dfn>" connection option is defined for a sender to signal that this connection will be closed after completion of the response.
    1993          For example,
    1994       </p>
    1995       <div id="rfc.figure.u.56"></div><pre class="text">  Connection: close
     2098            <p id="rfc.section.6.1.p.7">A sender <em class="bcp14">MUST NOT</em> send a connection option corresponding to a header field that is intended for all recipients of the payload. For example, <a href="p6-cache.html#header.cache-control" class="smpl">Cache-Control</a> is never appropriate as a connection option (<a href="p6-cache.html#header.cache-control" title="Cache-Control">Section 7.2</a> of <a href="#Part6" id="rfc.xref.Part6.7"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Caching">[Part6]</cite></a>).
     2099            </p>
     2100            <p id="rfc.section.6.1.p.8">The connection options do not have to correspond to a header field present in the message, since a connection-specific header
     2101               field might not be needed if there are no parameters associated with that connection option. Recipients that trigger certain
     2102               connection behavior based on the presence of connection options <em class="bcp14">MUST</em> do so based on the presence of the connection-option rather than only the presence of the optional header field. In other
     2103               words, if the connection option is received as a header field but not indicated within the Connection field-value, then the
     2104               recipient <em class="bcp14">MUST</em> ignore the connection-specific header field because it has likely been forwarded by an intermediary that is only partially
     2105               conformant.
     2106            </p>
     2107            <p id="rfc.section.6.1.p.9">When defining new connection options, specifications ought to carefully consider existing deployed header fields and ensure
     2108               that the new connection option does not share the same name as an unrelated header field that might already be deployed. Defining
     2109               a new connection option essentially reserves that potential field-name for carrying additional information related to the
     2110               connection option, since it would be unwise for senders to use that field-name for anything else.
     2111            </p>
     2112            <p id="rfc.section.6.1.p.10">The "<dfn>close</dfn>" connection option is defined for a sender to signal that this connection will be closed after completion of the response.
     2113               For example,
     2114            </p>
     2115            <div id="rfc.figure.u.56"></div><pre class="text">  Connection: close
    19962116</pre><p id="rfc.section.6.1.p.12">in either the request or the response header fields indicates that the connection <em class="bcp14">MUST</em> be closed after the current request/response is complete (<a href="#persistent.tear-down" id="rfc.xref.persistent.tear-down.1" title="Tear-down">Section&nbsp;6.6</a>).
    1997       </p>
    1998       <p id="rfc.section.6.1.p.13">A client that does not support <a href="#persistent.connections" class="smpl">persistent connections</a> <em class="bcp14">MUST</em> send the "close" connection option in every request message.
    1999       </p>
    2000       <p id="rfc.section.6.1.p.14">A server that does not support <a href="#persistent.connections" class="smpl">persistent connections</a> <em class="bcp14">MUST</em> send the "close" connection option in every response message that does not have a <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a> status code.
    2001       </p>
    2002       <h2 id="rfc.section.6.2"><a href="#rfc.section.6.2">6.2</a>&nbsp;<a id="persistent.establishment" href="#persistent.establishment">Establishment</a></h2>
    2003       <p id="rfc.section.6.2.p.1">It is beyond the scope of this specification to describe how connections are established via various transport or session-layer
    2004          protocols. Each connection applies to only one transport link.
    2005       </p>
    2006       <h2 id="rfc.section.6.3"><a href="#rfc.section.6.3">6.3</a>&nbsp;<a id="persistent.connections" href="#persistent.connections">Persistence</a></h2>
    2007       <p id="rfc.section.6.3.p.1">HTTP/1.1 defaults to the use of "<dfn>persistent connections</dfn>", allowing multiple requests and responses to be carried over a single connection. The "<a href="#header.connection" class="smpl">close</a>" connection-option is used to signal that a connection will not persist after the current request/response. HTTP implementations <em class="bcp14">SHOULD</em> support persistent connections.
    2008       </p>
    2009       <p id="rfc.section.6.3.p.2">A recipient determines whether a connection is persistent or not based on the most recently received message's protocol version
    2010          and <a href="#header.connection" class="smpl">Connection</a> header field (if any):
    2011       </p>
    2012       <ul>
    2013          <li>If the <a href="#header.connection" class="smpl">close</a> connection option is present, the connection will not persist after the current response; else,
    2014          </li>
    2015          <li>If the received protocol is HTTP/1.1 (or later), the connection will persist after the current response; else,</li>
    2016          <li>If the received protocol is HTTP/1.0, the "keep-alive" connection option is present, the recipient is not a proxy, and the
    2017             recipient wishes to honor the HTTP/1.0 "keep-alive" mechanism, the connection will persist after the current response; otherwise,
    2018          </li>
    2019          <li>The connection will close after the current response.</li>
    2020       </ul>
    2021       <p id="rfc.section.6.3.p.3">A server <em class="bcp14">MAY</em> assume that an HTTP/1.1 client intends to maintain a persistent connection until a <a href="#header.connection" class="smpl">close</a> connection option is received in a request.
    2022       </p>
    2023       <p id="rfc.section.6.3.p.4">A client <em class="bcp14">MAY</em> reuse a persistent connection until it sends or receives a <a href="#header.connection" class="smpl">close</a> connection option or receives an HTTP/1.0 response without a "keep-alive" connection option.
    2024       </p>
    2025       <p id="rfc.section.6.3.p.5">In order to remain persistent, all messages on a connection <em class="bcp14">MUST</em> have a self-defined message length (i.e., one not defined by closure of the connection), as described in <a href="#message.body" title="Message Body">Section&nbsp;3.3</a>. A server <em class="bcp14">MUST</em> read the entire request message body or close the connection after sending its response, since otherwise the remaining data
    2026          on a persistent connection would be misinterpreted as the next request. Likewise, a client <em class="bcp14">MUST</em> read the entire response message body if it intends to reuse the same connection for a subsequent request.
    2027       </p>
    2028       <p id="rfc.section.6.3.p.6">A proxy server <em class="bcp14">MUST NOT</em> maintain a persistent connection with an HTTP/1.0 client (see <a href="http://tools.ietf.org/html/rfc2068#section-19.7.1">Section 19.7.1</a> of <a href="#RFC2068" id="rfc.xref.RFC2068.3"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2068]</cite></a> for information and discussion of the problems with the Keep-Alive header field implemented by many HTTP/1.0 clients).
    2029       </p>
    2030       <p id="rfc.section.6.3.p.7">Clients and servers <em class="bcp14">SHOULD NOT</em> assume that a persistent connection is maintained for HTTP versions less than 1.1 unless it is explicitly signaled. See <a href="#compatibility.with.http.1.0.persistent.connections" title="Keep-Alive Connections">Appendix&nbsp;A.1.2</a> for more information on backward compatibility with HTTP/1.0 clients.
    2031       </p>
    2032       <h3 id="rfc.section.6.3.1"><a href="#rfc.section.6.3.1">6.3.1</a>&nbsp;<a id="persistent.retrying.requests" href="#persistent.retrying.requests">Retrying Requests</a></h3>
    2033       <p id="rfc.section.6.3.1.p.1">Connections can be closed at any time, with or without intention. Implementations ought to anticipate the need to recover
    2034          from asynchronous close events.
    2035       </p>
    2036       <p id="rfc.section.6.3.1.p.2">When an inbound connection is closed prematurely, a client <em class="bcp14">MAY</em> open a new connection and automatically retransmit an aborted sequence of requests if all of those requests have idempotent
    2037          methods (<a href="p2-semantics.html#idempotent.methods" title="Idempotent Methods">Section 4.2.2</a> of <a href="#Part2" id="rfc.xref.Part2.24"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). A proxy <em class="bcp14">MUST NOT</em> automatically retry non-idempotent requests.
    2038       </p>
    2039       <p id="rfc.section.6.3.1.p.3">A user agent <em class="bcp14">MUST NOT</em> automatically retry a request with a non-idempotent method unless it has some means to know that the request semantics are
    2040          actually idempotent, regardless of the method, or some means to detect that the original request was never applied. For example,
    2041          a user agent that knows (through design or configuration) that a POST request to a given resource is safe can repeat that
    2042          request automatically. Likewise, a user agent designed specifically to operate on a version control repository might be able
    2043          to recover from partial failure conditions by checking the target resource revision(s) after a failed connection, reverting
    2044          or fixing any changes that were partially applied, and then automatically retrying the requests that failed.
    2045       </p>
    2046       <p id="rfc.section.6.3.1.p.4">An automatic retry <em class="bcp14">SHOULD NOT</em> be repeated if it fails.
    2047       </p>
    2048       <h3 id="rfc.section.6.3.2"><a href="#rfc.section.6.3.2">6.3.2</a>&nbsp;<a id="pipelining" href="#pipelining">Pipelining</a></h3>
    2049       <p id="rfc.section.6.3.2.p.1">A client that supports persistent connections <em class="bcp14">MAY</em> "<dfn>pipeline</dfn>" its requests (i.e., send multiple requests without waiting for each response). A server <em class="bcp14">MAY</em> process a sequence of pipelined requests in parallel if they all have safe methods (<a href="p2-semantics.html#safe.methods" title="Safe Methods">Section 4.2.1</a> of <a href="#Part2" id="rfc.xref.Part2.25"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>), but <em class="bcp14">MUST</em> send the corresponding responses in the same order that the requests were received.
    2050       </p>
    2051       <p id="rfc.section.6.3.2.p.2">A client that pipelines requests <em class="bcp14">MUST</em> be prepared to retry those requests if the connection closes before it receives all of the corresponding responses. A client
    2052          that assumes a persistent connection and pipelines immediately after connection establishment <em class="bcp14">MUST NOT</em> pipeline on a retry connection until it knows the connection is persistent.
    2053       </p>
    2054       <p id="rfc.section.6.3.2.p.3">Idempotent methods (<a href="p2-semantics.html#idempotent.methods" title="Idempotent Methods">Section 4.2.2</a> of <a href="#Part2" id="rfc.xref.Part2.26"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>) are significant to pipelining because they can be automatically retried after a connection failure. A user agent <em class="bcp14">SHOULD NOT</em> pipeline requests after a non-idempotent method until the final response status code for that method has been received, unless
    2055          the user agent has a means to detect and recover from partial failure conditions involving the pipelined sequence.
    2056       </p>
    2057       <p id="rfc.section.6.3.2.p.4">An intermediary that receives pipelined requests <em class="bcp14">MAY</em> pipeline those requests when forwarding them inbound, since it can rely on the outbound user agent(s) to determine what requests
    2058          can be safely pipelined. If the inbound connection fails before receiving a response, the pipelining intermediary <em class="bcp14">MAY</em> attempt to retry a sequence of requests that have yet to receive a response if the requests all have idempotent methods; otherwise,
    2059          the pipelining intermediary <em class="bcp14">SHOULD</em> forward any received responses and then close the corresponding outbound connection(s) so that the outbound user agent(s)
    2060          can recover accordingly.
    2061       </p>
    2062       <h2 id="rfc.section.6.4"><a href="#rfc.section.6.4">6.4</a>&nbsp;<a id="persistent.concurrency" href="#persistent.concurrency">Concurrency</a></h2>
    2063       <p id="rfc.section.6.4.p.1">Clients <em class="bcp14">SHOULD</em> limit the number of simultaneous connections that they maintain to a given server.
    2064       </p>
    2065       <p id="rfc.section.6.4.p.2">Previous revisions of HTTP gave a specific number of connections as a ceiling, but this was found to be impractical for many
    2066          applications. As a result, this specification does not mandate a particular maximum number of connections, but instead encourages
    2067          clients to be conservative when opening multiple connections.
    2068       </p>
    2069       <p id="rfc.section.6.4.p.3">Multiple connections are typically used to avoid the "head-of-line blocking" problem, wherein a request that takes significant
    2070          server-side processing and/or has a large payload blocks subsequent requests on the same connection. However, each connection
    2071          consumes server resources. Furthermore, using multiple connections can cause undesirable side effects in congested networks.
    2072       </p>
    2073       <p id="rfc.section.6.4.p.4">Note that servers might reject traffic that they deem abusive, including an excessive number of connections from a client.</p>
    2074       <h2 id="rfc.section.6.5"><a href="#rfc.section.6.5">6.5</a>&nbsp;<a id="persistent.failures" href="#persistent.failures">Failures and Time-outs</a></h2>
    2075       <p id="rfc.section.6.5.p.1">Servers will usually have some time-out value beyond which they will no longer maintain an inactive connection. Proxy servers
    2076          might make this a higher value since it is likely that the client will be making more connections through the same server.
    2077          The use of persistent connections places no requirements on the length (or existence) of this time-out for either the client
    2078          or the server.
    2079       </p>
    2080       <p id="rfc.section.6.5.p.2">When a client or server wishes to time-out it <em class="bcp14">SHOULD</em> issue a graceful close on the transport connection. Clients and servers <em class="bcp14">SHOULD</em> both constantly watch for the other side of the transport close, and respond to it as appropriate. If a client or server does
    2081          not detect the other side's close promptly it could cause unnecessary resource drain on the network.
    2082       </p>
    2083       <p id="rfc.section.6.5.p.3">A client, server, or proxy <em class="bcp14">MAY</em> close the transport connection at any time. For example, a client might have started to send a new request at the same time
    2084          that the server has decided to close the "idle" connection. From the server's point of view, the connection is being closed
    2085          while it was idle, but from the client's point of view, a request is in progress.
    2086       </p>
    2087       <p id="rfc.section.6.5.p.4">Servers <em class="bcp14">SHOULD</em> maintain persistent connections and allow the underlying transport's flow control mechanisms to resolve temporary overloads,
    2088          rather than terminate connections with the expectation that clients will retry. The latter technique can exacerbate network
    2089          congestion.
    2090       </p>
    2091       <p id="rfc.section.6.5.p.5">A client sending a message body <em class="bcp14">SHOULD</em> monitor the network connection for an error response while it is transmitting the request. If the client sees an error response,
    2092          it <em class="bcp14">SHOULD</em> immediately cease transmitting the body and close the connection.
    2093       </p>
    2094       <div id="rfc.iref.c.13"></div>
    2095       <div id="rfc.iref.c.14"></div>
    2096       <h2 id="rfc.section.6.6"><a href="#rfc.section.6.6">6.6</a>&nbsp;<a id="persistent.tear-down" href="#persistent.tear-down">Tear-down</a></h2>
    2097       <p id="rfc.section.6.6.p.1">The <a href="#header.connection" class="smpl">Connection</a> header field (<a href="#header.connection" id="rfc.xref.header.connection.5" title="Connection">Section&nbsp;6.1</a>) provides a "<a href="#header.connection" class="smpl">close</a>" connection option that a sender <em class="bcp14">SHOULD</em> send when it wishes to close the connection after the current request/response pair.
    2098       </p>
    2099       <p id="rfc.section.6.6.p.2">A client that sends a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST NOT</em> send further requests on that connection (after the one containing <a href="#header.connection" class="smpl">close</a>) and <em class="bcp14">MUST</em> close the connection after reading the final response message corresponding to this request.
    2100       </p>
    2101       <p id="rfc.section.6.6.p.3">A server that receives a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST</em> initiate a close of the connection (see below) after it sends the final response to the request that contained <a href="#header.connection" class="smpl">close</a>. The server <em class="bcp14">SHOULD</em> send a <a href="#header.connection" class="smpl">close</a> connection option in its final response on that connection. The server <em class="bcp14">MUST NOT</em> process any further requests received on that connection.
    2102       </p>
    2103       <p id="rfc.section.6.6.p.4">A server that sends a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST</em> initiate a close of the connection (see below) after it sends the response containing <a href="#header.connection" class="smpl">close</a>. The server <em class="bcp14">MUST NOT</em> process any further requests received on that connection.
    2104       </p>
    2105       <p id="rfc.section.6.6.p.5">A client that receives a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST</em> cease sending requests on that connection and close the connection after reading the response message containing the close;
    2106          if additional pipelined requests had been sent on the connection, the client <em class="bcp14">SHOULD NOT</em> assume that they will be processed by the server.
    2107       </p>
    2108       <p id="rfc.section.6.6.p.6">If a server performs an immediate close of a TCP connection, there is a significant risk that the client will not be able
    2109          to read the last HTTP response. If the server receives additional data from the client on a fully-closed connection, such
    2110          as another request that was sent by the client before receiving the server's response, the server's TCP stack will send a
    2111          reset packet to the client; unfortunately, the reset packet might erase the client's unacknowledged input buffers before they
    2112          can be read and interpreted by the client's HTTP parser.
    2113       </p>
    2114       <p id="rfc.section.6.6.p.7">To avoid the TCP reset problem, servers typically close a connection in stages. First, the server performs a half-close by
    2115          closing only the write side of the read/write connection. The server then continues to read from the connection until it receives
    2116          a corresponding close by the client, or until the server is reasonably certain that its own TCP stack has received the client's
    2117          acknowledgement of the packet(s) containing the server's last response. Finally, the server fully closes the connection.
    2118       </p>
    2119       <p id="rfc.section.6.6.p.8">It is unknown whether the reset problem is exclusive to TCP or might also be found in other transport connection protocols.</p>
    2120       <div id="rfc.iref.u.5"></div>
    2121       <h2 id="rfc.section.6.7"><a href="#rfc.section.6.7">6.7</a>&nbsp;<a id="header.upgrade" href="#header.upgrade">Upgrade</a></h2>
    2122       <p id="rfc.section.6.7.p.1">The "Upgrade" header field is intended to provide a simple mechanism for transitioning from HTTP/1.1 to some other protocol
    2123          on the same connection. A client <em class="bcp14">MAY</em> send a list of protocols in the Upgrade header field of a request to invite the server to switch to one or more of those protocols,
    2124          in order of descending preference, before sending the final response. A server <em class="bcp14">MAY</em> ignore a received Upgrade header field if it wishes to continue using the current protocol on that connection.
    2125       </p>
    2126       <div id="rfc.figure.u.57"></div><pre class="inline"><span id="rfc.iref.g.95"></span>  <a href="#header.upgrade" class="smpl">Upgrade</a>          = 1#<a href="#header.upgrade" class="smpl">protocol</a>
     2117            </p>
     2118            <p id="rfc.section.6.1.p.13">A client that does not support <a href="#persistent.connections" class="smpl">persistent connections</a> <em class="bcp14">MUST</em> send the "close" connection option in every request message.
     2119            </p>
     2120            <p id="rfc.section.6.1.p.14">A server that does not support <a href="#persistent.connections" class="smpl">persistent connections</a> <em class="bcp14">MUST</em> send the "close" connection option in every response message that does not have a <a href="p2-semantics.html#status.1xx" class="smpl">1xx (Informational)</a> status code.
     2121            </p>
     2122         </div>
     2123         <div id="persistent.establishment">
     2124            <h2 id="rfc.section.6.2"><a href="#rfc.section.6.2">6.2</a>&nbsp;<a href="#persistent.establishment">Establishment</a></h2>
     2125            <p id="rfc.section.6.2.p.1">It is beyond the scope of this specification to describe how connections are established via various transport or session-layer
     2126               protocols. Each connection applies to only one transport link.
     2127            </p>
     2128         </div>
     2129         <div id="persistent.connections">
     2130            <h2 id="rfc.section.6.3"><a href="#rfc.section.6.3">6.3</a>&nbsp;<a href="#persistent.connections">Persistence</a></h2>
     2131            <p id="rfc.section.6.3.p.1">HTTP/1.1 defaults to the use of "<dfn>persistent connections</dfn>", allowing multiple requests and responses to be carried over a single connection. The "<a href="#header.connection" class="smpl">close</a>" connection-option is used to signal that a connection will not persist after the current request/response. HTTP implementations <em class="bcp14">SHOULD</em> support persistent connections.
     2132            </p>
     2133            <p id="rfc.section.6.3.p.2">A recipient determines whether a connection is persistent or not based on the most recently received message's protocol version
     2134               and <a href="#header.connection" class="smpl">Connection</a> header field (if any):
     2135            </p>
     2136            <ul>
     2137               <li>If the <a href="#header.connection" class="smpl">close</a> connection option is present, the connection will not persist after the current response; else,
     2138               </li>
     2139               <li>If the received protocol is HTTP/1.1 (or later), the connection will persist after the current response; else,</li>
     2140               <li>If the received protocol is HTTP/1.0, the "keep-alive" connection option is present, the recipient is not a proxy, and the
     2141                  recipient wishes to honor the HTTP/1.0 "keep-alive" mechanism, the connection will persist after the current response; otherwise,
     2142               </li>
     2143               <li>The connection will close after the current response.</li>
     2144            </ul>
     2145            <p id="rfc.section.6.3.p.3">A server <em class="bcp14">MAY</em> assume that an HTTP/1.1 client intends to maintain a persistent connection until a <a href="#header.connection" class="smpl">close</a> connection option is received in a request.
     2146            </p>
     2147            <p id="rfc.section.6.3.p.4">A client <em class="bcp14">MAY</em> reuse a persistent connection until it sends or receives a <a href="#header.connection" class="smpl">close</a> connection option or receives an HTTP/1.0 response without a "keep-alive" connection option.
     2148            </p>
     2149            <p id="rfc.section.6.3.p.5">In order to remain persistent, all messages on a connection <em class="bcp14">MUST</em> have a self-defined message length (i.e., one not defined by closure of the connection), as described in <a href="#message.body" title="Message Body">Section&nbsp;3.3</a>. A server <em class="bcp14">MUST</em> read the entire request message body or close the connection after sending its response, since otherwise the remaining data
     2150               on a persistent connection would be misinterpreted as the next request. Likewise, a client <em class="bcp14">MUST</em> read the entire response message body if it intends to reuse the same connection for a subsequent request.
     2151            </p>
     2152            <p id="rfc.section.6.3.p.6">A proxy server <em class="bcp14">MUST NOT</em> maintain a persistent connection with an HTTP/1.0 client (see <a href="https://tools.ietf.org/html/rfc2068#section-19.7.1">Section 19.7.1</a> of <a href="#RFC2068" id="rfc.xref.RFC2068.3"><cite title="Hypertext Transfer Protocol -- HTTP/1.1">[RFC2068]</cite></a> for information and discussion of the problems with the Keep-Alive header field implemented by many HTTP/1.0 clients).
     2153            </p>
     2154            <p id="rfc.section.6.3.p.7">Clients and servers <em class="bcp14">SHOULD NOT</em> assume that a persistent connection is maintained for HTTP versions less than 1.1 unless it is explicitly signaled. See <a href="#compatibility.with.http.1.0.persistent.connections" title="Keep-Alive Connections">Appendix&nbsp;A.1.2</a> for more information on backward compatibility with HTTP/1.0 clients.
     2155            </p>
     2156            <div id="persistent.retrying.requests">
     2157               <h3 id="rfc.section.6.3.1"><a href="#rfc.section.6.3.1">6.3.1</a>&nbsp;<a href="#persistent.retrying.requests">Retrying Requests</a></h3>
     2158               <p id="rfc.section.6.3.1.p.1">Connections can be closed at any time, with or without intention. Implementations ought to anticipate the need to recover
     2159                  from asynchronous close events.
     2160               </p>
     2161               <p id="rfc.section.6.3.1.p.2">When an inbound connection is closed prematurely, a client <em class="bcp14">MAY</em> open a new connection and automatically retransmit an aborted sequence of requests if all of those requests have idempotent
     2162                  methods (<a href="p2-semantics.html#idempotent.methods" title="Idempotent Methods">Section 4.2.2</a> of <a href="#Part2" id="rfc.xref.Part2.24"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). A proxy <em class="bcp14">MUST NOT</em> automatically retry non-idempotent requests.
     2163               </p>
     2164               <p id="rfc.section.6.3.1.p.3">A user agent <em class="bcp14">MUST NOT</em> automatically retry a request with a non-idempotent method unless it has some means to know that the request semantics are
     2165                  actually idempotent, regardless of the method, or some means to detect that the original request was never applied. For example,
     2166                  a user agent that knows (through design or configuration) that a POST request to a given resource is safe can repeat that
     2167                  request automatically. Likewise, a user agent designed specifically to operate on a version control repository might be able
     2168                  to recover from partial failure conditions by checking the target resource revision(s) after a failed connection, reverting
     2169                  or fixing any changes that were partially applied, and then automatically retrying the requests that failed.
     2170               </p>
     2171               <p id="rfc.section.6.3.1.p.4">An automatic retry <em class="bcp14">SHOULD NOT</em> be repeated if it fails.
     2172               </p>
     2173            </div>
     2174            <div id="pipelining">
     2175               <h3 id="rfc.section.6.3.2"><a href="#rfc.section.6.3.2">6.3.2</a>&nbsp;<a href="#pipelining">Pipelining</a></h3>
     2176               <p id="rfc.section.6.3.2.p.1">A client that supports persistent connections <em class="bcp14">MAY</em> "<dfn>pipeline</dfn>" its requests (i.e., send multiple requests without waiting for each response). A server <em class="bcp14">MAY</em> process a sequence of pipelined requests in parallel if they all have safe methods (<a href="p2-semantics.html#safe.methods" title="Safe Methods">Section 4.2.1</a> of <a href="#Part2" id="rfc.xref.Part2.25"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>), but <em class="bcp14">MUST</em> send the corresponding responses in the same order that the requests were received.
     2177               </p>
     2178               <p id="rfc.section.6.3.2.p.2">A client that pipelines requests <em class="bcp14">MUST</em> be prepared to retry those requests if the connection closes before it receives all of the corresponding responses. A client
     2179                  that assumes a persistent connection and pipelines immediately after connection establishment <em class="bcp14">MUST NOT</em> pipeline on a retry connection until it knows the connection is persistent.
     2180               </p>
     2181               <p id="rfc.section.6.3.2.p.3">Idempotent methods (<a href="p2-semantics.html#idempotent.methods" title="Idempotent Methods">Section 4.2.2</a> of <a href="#Part2" id="rfc.xref.Part2.26"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>) are significant to pipelining because they can be automatically retried after a connection failure. A user agent <em class="bcp14">SHOULD NOT</em> pipeline requests after a non-idempotent method until the final response status code for that method has been received, unless
     2182                  the user agent has a means to detect and recover from partial failure conditions involving the pipelined sequence.
     2183               </p>
     2184               <p id="rfc.section.6.3.2.p.4">An intermediary that receives pipelined requests <em class="bcp14">MAY</em> pipeline those requests when forwarding them inbound, since it can rely on the outbound user agent(s) to determine what requests
     2185                  can be safely pipelined. If the inbound connection fails before receiving a response, the pipelining intermediary <em class="bcp14">MAY</em> attempt to retry a sequence of requests that have yet to receive a response if the requests all have idempotent methods; otherwise,
     2186                  the pipelining intermediary <em class="bcp14">SHOULD</em> forward any received responses and then close the corresponding outbound connection(s) so that the outbound user agent(s)
     2187                  can recover accordingly.
     2188               </p>
     2189            </div>
     2190         </div>
     2191         <div id="persistent.concurrency">
     2192            <h2 id="rfc.section.6.4"><a href="#rfc.section.6.4">6.4</a>&nbsp;<a href="#persistent.concurrency">Concurrency</a></h2>
     2193            <p id="rfc.section.6.4.p.1">Clients <em class="bcp14">SHOULD</em> limit the number of simultaneous connections that they maintain to a given server.
     2194            </p>
     2195            <p id="rfc.section.6.4.p.2">Previous revisions of HTTP gave a specific number of connections as a ceiling, but this was found to be impractical for many
     2196               applications. As a result, this specification does not mandate a particular maximum number of connections, but instead encourages
     2197               clients to be conservative when opening multiple connections.
     2198            </p>
     2199            <p id="rfc.section.6.4.p.3">Multiple connections are typically used to avoid the "head-of-line blocking" problem, wherein a request that takes significant
     2200               server-side processing and/or has a large payload blocks subsequent requests on the same connection. However, each connection
     2201               consumes server resources. Furthermore, using multiple connections can cause undesirable side effects in congested networks.
     2202            </p>
     2203            <p id="rfc.section.6.4.p.4">Note that servers might reject traffic that they deem abusive, including an excessive number of connections from a client.</p>
     2204         </div>
     2205         <div id="persistent.failures">
     2206            <h2 id="rfc.section.6.5"><a href="#rfc.section.6.5">6.5</a>&nbsp;<a href="#persistent.failures">Failures and Time-outs</a></h2>
     2207            <p id="rfc.section.6.5.p.1">Servers will usually have some time-out value beyond which they will no longer maintain an inactive connection. Proxy servers
     2208               might make this a higher value since it is likely that the client will be making more connections through the same server.
     2209               The use of persistent connections places no requirements on the length (or existence) of this time-out for either the client
     2210               or the server.
     2211            </p>
     2212            <p id="rfc.section.6.5.p.2">When a client or server wishes to time-out it <em class="bcp14">SHOULD</em> issue a graceful close on the transport connection. Clients and servers <em class="bcp14">SHOULD</em> both constantly watch for the other side of the transport close, and respond to it as appropriate. If a client or server does
     2213               not detect the other side's close promptly it could cause unnecessary resource drain on the network.
     2214            </p>
     2215            <p id="rfc.section.6.5.p.3">A client, server, or proxy <em class="bcp14">MAY</em> close the transport connection at any time. For example, a client might have started to send a new request at the same time
     2216               that the server has decided to close the "idle" connection. From the server's point of view, the connection is being closed
     2217               while it was idle, but from the client's point of view, a request is in progress.
     2218            </p>
     2219            <p id="rfc.section.6.5.p.4">Servers <em class="bcp14">SHOULD</em> maintain persistent connections and allow the underlying transport's flow control mechanisms to resolve temporary overloads,
     2220               rather than terminate connections with the expectation that clients will retry. The latter technique can exacerbate network
     2221               congestion.
     2222            </p>
     2223            <p id="rfc.section.6.5.p.5">A client sending a message body <em class="bcp14">SHOULD</em> monitor the network connection for an error response while it is transmitting the request. If the client sees an error response,
     2224               it <em class="bcp14">SHOULD</em> immediately cease transmitting the body and close the connection.
     2225            </p>
     2226         </div>
     2227         <div id="persistent.tear-down">
     2228            <div id="rfc.iref.c.13"></div>
     2229            <div id="rfc.iref.c.14"></div>
     2230            <h2 id="rfc.section.6.6"><a href="#rfc.section.6.6">6.6</a>&nbsp;<a href="#persistent.tear-down">Tear-down</a></h2>
     2231            <p id="rfc.section.6.6.p.1">The <a href="#header.connection" class="smpl">Connection</a> header field (<a href="#header.connection" id="rfc.xref.header.connection.5" title="Connection">Section&nbsp;6.1</a>) provides a "<a href="#header.connection" class="smpl">close</a>" connection option that a sender <em class="bcp14">SHOULD</em> send when it wishes to close the connection after the current request/response pair.
     2232            </p>
     2233            <p id="rfc.section.6.6.p.2">A client that sends a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST NOT</em> send further requests on that connection (after the one containing <a href="#header.connection" class="smpl">close</a>) and <em class="bcp14">MUST</em> close the connection after reading the final response message corresponding to this request.
     2234            </p>
     2235            <p id="rfc.section.6.6.p.3">A server that receives a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST</em> initiate a close of the connection (see below) after it sends the final response to the request that contained <a href="#header.connection" class="smpl">close</a>. The server <em class="bcp14">SHOULD</em> send a <a href="#header.connection" class="smpl">close</a> connection option in its final response on that connection. The server <em class="bcp14">MUST NOT</em> process any further requests received on that connection.
     2236            </p>
     2237            <p id="rfc.section.6.6.p.4">A server that sends a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST</em> initiate a close of the connection (see below) after it sends the response containing <a href="#header.connection" class="smpl">close</a>. The server <em class="bcp14">MUST NOT</em> process any further requests received on that connection.
     2238            </p>
     2239            <p id="rfc.section.6.6.p.5">A client that receives a <a href="#header.connection" class="smpl">close</a> connection option <em class="bcp14">MUST</em> cease sending requests on that connection and close the connection after reading the response message containing the close;
     2240               if additional pipelined requests had been sent on the connection, the client <em class="bcp14">SHOULD NOT</em> assume that they will be processed by the server.
     2241            </p>
     2242            <p id="rfc.section.6.6.p.6">If a server performs an immediate close of a TCP connection, there is a significant risk that the client will not be able
     2243               to read the last HTTP response. If the server receives additional data from the client on a fully-closed connection, such
     2244               as another request that was sent by the client before receiving the server's response, the server's TCP stack will send a
     2245               reset packet to the client; unfortunately, the reset packet might erase the client's unacknowledged input buffers before they
     2246               can be read and interpreted by the client's HTTP parser.
     2247            </p>
     2248            <p id="rfc.section.6.6.p.7">To avoid the TCP reset problem, servers typically close a connection in stages. First, the server performs a half-close by
     2249               closing only the write side of the read/write connection. The server then continues to read from the connection until it receives
     2250               a corresponding close by the client, or until the server is reasonably certain that its own TCP stack has received the client's
     2251               acknowledgement of the packet(s) containing the server's last response. Finally, the server fully closes the connection.
     2252            </p>
     2253            <p id="rfc.section.6.6.p.8">It is unknown whether the reset problem is exclusive to TCP or might also be found in other transport connection protocols.</p>
     2254         </div>
     2255         <div id="header.upgrade">
     2256            <div id="rfc.iref.u.5"></div>
     2257            <h2 id="rfc.section.6.7"><a href="#rfc.section.6.7">6.7</a>&nbsp;<a href="#header.upgrade">Upgrade</a></h2>
     2258            <p id="rfc.section.6.7.p.1">The "Upgrade" header field is intended to provide a simple mechanism for transitioning from HTTP/1.1 to some other protocol
     2259               on the same connection. A client <em class="bcp14">MAY</em> send a list of protocols in the Upgrade header field of a request to invite the server to switch to one or more of those protocols,
     2260               in order of descending preference, before sending the final response. A server <em class="bcp14">MAY</em> ignore a received Upgrade header field if it wishes to continue using the current protocol on that connection.
     2261            </p>
     2262            <div id="rfc.figure.u.57"></div><pre class="inline"><span id="rfc.iref.g.95"></span>  <a href="#header.upgrade" class="smpl">Upgrade</a>          = 1#<a href="#header.upgrade" class="smpl">protocol</a>
    21272263
    21282264  <a href="#header.upgrade" class="smpl">protocol</a>         = <a href="#header.upgrade" class="smpl">protocol-name</a> ["/" <a href="#header.upgrade" class="smpl">protocol-version</a>]
     
    21302266  <a href="#header.upgrade" class="smpl">protocol-version</a> = <a href="#rule.token.separators" class="smpl">token</a>
    21312267</pre><p id="rfc.section.6.7.p.3">A server that sends a <a href="p2-semantics.html#status.101" class="smpl">101 (Switching Protocols)</a> response <em class="bcp14">MUST</em> send an Upgrade header field to indicate the new protocol(s) to which the connection is being switched; if multiple protocol
    2132          layers are being switched, the new protocols <em class="bcp14">MUST</em> be listed in layer-ascending order. A server <em class="bcp14">MUST NOT</em> switch to a protocol that was not indicated by the client in the corresponding request's Upgrade header field. A server <em class="bcp14">MAY</em> choose to ignore the order of preference indicated by the client and select the new protocol(s) based on other factors, such
    2133          as the nature of the request or the current load on the server.
    2134       </p>
    2135       <p id="rfc.section.6.7.p.4">A server that sends a <a href="p2-semantics.html#status.426" class="smpl">426 (Upgrade Required)</a> response <em class="bcp14">MUST</em> send an Upgrade header field to indicate the acceptable protocols, in order of descending preference.
    2136       </p>
    2137       <p id="rfc.section.6.7.p.5">A server <em class="bcp14">MAY</em> send an Upgrade header field in any other response to advertise that it implements support for upgrading to the listed protocols,
    2138          in order of descending preference, when appropriate for a future request.
    2139       </p>
    2140       <div id="rfc.figure.u.58"></div>
    2141       <p>The following is a hypothetical example sent by a client:</p><pre class="text2">GET /hello.txt HTTP/1.1
     2268               layers are being switched, the new protocols <em class="bcp14">MUST</em> be listed in layer-ascending order. A server <em class="bcp14">MUST NOT</em> switch to a protocol that was not indicated by the client in the corresponding request's Upgrade header field. A server <em class="bcp14">MAY</em> choose to ignore the order of preference indicated by the client and select the new protocol(s) based on other factors, such
     2269               as the nature of the request or the current load on the server.
     2270            </p>
     2271            <p id="rfc.section.6.7.p.4">A server that sends a <a href="p2-semantics.html#status.426" class="smpl">426 (Upgrade Required)</a> response <em class="bcp14">MUST</em> send an Upgrade header field to indicate the acceptable protocols, in order of descending preference.
     2272            </p>
     2273            <p id="rfc.section.6.7.p.5">A server <em class="bcp14">MAY</em> send an Upgrade header field in any other response to advertise that it implements support for upgrading to the listed protocols,
     2274               in order of descending preference, when appropriate for a future request.
     2275            </p>
     2276            <div id="rfc.figure.u.58"></div>
     2277            <p>The following is a hypothetical example sent by a client:</p><pre class="text2">GET /hello.txt HTTP/1.1
    21422278Host: www.example.com
    21432279Connection: upgrade
     
    21452281
    21462282</pre><p id="rfc.section.6.7.p.7">Upgrade cannot be used to insist on a protocol change; its acceptance and use by the server is optional. The capabilities
    2147          and nature of the application-level communication after the protocol change is entirely dependent upon the new protocol(s)
    2148          chosen, although the first action after changing the protocol <em class="bcp14">MUST</em> be a response to the initial HTTP request that contained the Upgrade header field.
    2149       </p>
    2150       <p id="rfc.section.6.7.p.8">For example, if the Upgrade header field is received in a GET request and the server decides to switch protocols, it first
    2151          responds with a <a href="p2-semantics.html#status.101" class="smpl">101 (Switching Protocols)</a> message in HTTP/1.1 and then immediately follows that with the new protocol's equivalent of a response to a GET on the target
    2152          resource. This allows a connection to be upgraded to protocols with the same semantics as HTTP without the latency cost of
    2153          an additional round-trip. A server <em class="bcp14">MUST NOT</em> switch protocols unless the received message semantics can be honored by the new protocol; an OPTIONS request can be honored
    2154          by any protocol.
    2155       </p>
    2156       <div id="rfc.figure.u.59"></div>
    2157       <p>The following is an example response to the above hypothetical request:</p><pre class="text">HTTP/1.1 101 Switching Protocols
     2283               and nature of the application-level communication after the protocol change is entirely dependent upon the new protocol(s)
     2284               chosen, although the first action after changing the protocol <em class="bcp14">MUST</em> be a response to the initial HTTP request that contained the Upgrade header field.
     2285            </p>
     2286            <p id="rfc.section.6.7.p.8">For example, if the Upgrade header field is received in a GET request and the server decides to switch protocols, it first
     2287               responds with a <a href="p2-semantics.html#status.101" class="smpl">101 (Switching Protocols)</a> message in HTTP/1.1 and then immediately follows that with the new protocol's equivalent of a response to a GET on the target
     2288               resource. This allows a connection to be upgraded to protocols with the same semantics as HTTP without the latency cost of
     2289               an additional round-trip. A server <em class="bcp14">MUST NOT</em> switch protocols unless the received message semantics can be honored by the new protocol; an OPTIONS request can be honored
     2290               by any protocol.
     2291            </p>
     2292            <div id="rfc.figure.u.59"></div>
     2293            <p>The following is an example response to the above hypothetical request:</p><pre class="text">HTTP/1.1 101 Switching Protocols
    21582294Connection: upgrade
    21592295Upgrade: HTTP/2.0
     
    21622298(as defined by new protocol) to the "GET /hello.txt" request ...]
    21632299</pre><p id="rfc.section.6.7.p.10">When Upgrade is sent, the sender <em class="bcp14">MUST</em> also send a <a href="#header.connection" class="smpl">Connection</a> header field (<a href="#header.connection" id="rfc.xref.header.connection.6" title="Connection">Section&nbsp;6.1</a>) that contains an "upgrade" connection option, in order to prevent Upgrade from being accidentally forwarded by intermediaries
    2164          that might not implement the listed protocols. A server <em class="bcp14">MUST</em> ignore an Upgrade header field that is received in an HTTP/1.0 request.
    2165       </p>
    2166       <p id="rfc.section.6.7.p.11">The Upgrade header field only applies to switching protocols on top of the existing connection; it cannot be used to switch
    2167          the underlying connection (transport) protocol, nor to switch the existing communication to a different connection. For those
    2168          purposes, it is more appropriate to use a <a href="p2-semantics.html#status.3xx" class="smpl">3xx (Redirection)</a> response (<a href="p2-semantics.html#status.3xx" title="Redirection 3xx">Section 6.4</a> of <a href="#Part2" id="rfc.xref.Part2.27"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
    2169       </p>
    2170       <p id="rfc.section.6.7.p.12">This specification only defines the protocol name "HTTP" for use by the family of Hypertext Transfer Protocols, as defined
    2171          by the HTTP version rules of <a href="#http.version" title="Protocol Versioning">Section&nbsp;2.6</a> and future updates to this specification. Additional tokens ought to be registered with IANA using the registration procedure
    2172          defined in <a href="#upgrade.token.registry" title="Upgrade Token Registry">Section&nbsp;7.5</a>.
    2173       </p>
    2174       <h1 id="rfc.section.7"><a href="#rfc.section.7">7.</a>&nbsp;<a id="IANA.considerations" href="#IANA.considerations">IANA Considerations</a></h1>
    2175       <h2 id="rfc.section.7.1"><a href="#rfc.section.7.1">7.1</a>&nbsp;<a id="header.field.registration" href="#header.field.registration">Header Field Registration</a></h2>
    2176       <p id="rfc.section.7.1.p.1">HTTP header fields are registered within the Message Header Field Registry maintained at &lt;<a href="http://www.iana.org/assignments/message-headers/message-header-index.html">http://www.iana.org/assignments/message-headers/message-header-index.html</a>&gt;.
    2177       </p>
    2178       <p id="rfc.section.7.1.p.2">This document defines the following HTTP header fields, so their associated registry entries shall be updated according to
    2179          the permanent registrations below (see <a href="#BCP90" id="rfc.xref.BCP90.1"><cite title="Registration Procedures for Message Header Fields">[BCP90]</cite></a>):
    2180       </p>
    2181       <div id="rfc.table.1">
    2182          <div id="iana.header.registration.table"></div>
    2183          <table class="tt full left" cellpadding="3" cellspacing="0">
    2184             <thead>
    2185                <tr>
    2186                   <th>Header Field Name</th>
    2187                   <th>Protocol</th>
    2188                   <th>Status</th>
    2189                   <th>Reference</th>
    2190                </tr>
    2191             </thead>
    2192             <tbody>
    2193                <tr>
    2194                   <td class="left">Connection</td>
    2195                   <td class="left">http</td>
    2196                   <td class="left">standard</td>
    2197                   <td class="left"><a href="#header.connection" id="rfc.xref.header.connection.7" title="Connection">Section&nbsp;6.1</a>
    2198                   </td>
    2199                </tr>
    2200                <tr>
    2201                   <td class="left">Content-Length</td>
    2202                   <td class="left">http</td>
    2203                   <td class="left">standard</td>
    2204                   <td class="left"><a href="#header.content-length" id="rfc.xref.header.content-length.1" title="Content-Length">Section&nbsp;3.3.2</a>
    2205                   </td>
    2206                </tr>
    2207                <tr>
    2208                   <td class="left">Host</td>
    2209                   <td class="left">http</td>
    2210                   <td class="left">standard</td>
    2211                   <td class="left"><a href="#header.host" id="rfc.xref.header.host.2" title="Host">Section&nbsp;5.4</a>
    2212                   </td>
    2213                </tr>
    2214                <tr>
    2215                   <td class="left">TE</td>
    2216                   <td class="left">http</td>
    2217                   <td class="left">standard</td>
    2218                   <td class="left"><a href="#header.te" id="rfc.xref.header.te.3" title="TE">Section&nbsp;4.3</a>
    2219                   </td>
    2220                </tr>
    2221                <tr>
    2222                   <td class="left">Trailer</td>
    2223                   <td class="left">http</td>
    2224                   <td class="left">standard</td>
    2225                   <td class="left"><a href="#header.trailer" id="rfc.xref.header.trailer.1" title="Trailer">Section&nbsp;4.1.1</a>
    2226                   </td>
    2227                </tr>
    2228                <tr>
    2229                   <td class="left">Transfer-Encoding</td>
    2230                   <td class="left">http</td>
    2231                   <td class="left">standard</td>
    2232                   <td class="left"><a href="#header.transfer-encoding" id="rfc.xref.header.transfer-encoding.3" title="Transfer-Encoding">Section&nbsp;3.3.1</a>
    2233                   </td>
    2234                </tr>
    2235                <tr>
    2236                   <td class="left">Upgrade</td>
    2237                   <td class="left">http</td>
    2238                   <td class="left">standard</td>
    2239                   <td class="left"><a href="#header.upgrade" id="rfc.xref.header.upgrade.2" title="Upgrade">Section&nbsp;6.7</a>
    2240                   </td>
    2241                </tr>
    2242                <tr>
    2243                   <td class="left">Via</td>
    2244                   <td class="left">http</td>
    2245                   <td class="left">standard</td>
    2246                   <td class="left"><a href="#header.via" id="rfc.xref.header.via.1" title="Via">Section&nbsp;5.7.1</a>
    2247                   </td>
    2248                </tr>
    2249             </tbody>
    2250          </table>
     2300               that might not implement the listed protocols. A server <em class="bcp14">MUST</em> ignore an Upgrade header field that is received in an HTTP/1.0 request.
     2301            </p>
     2302            <p id="rfc.section.6.7.p.11">The Upgrade header field only applies to switching protocols on top of the existing connection; it cannot be used to switch
     2303               the underlying connection (transport) protocol, nor to switch the existing communication to a different connection. For those
     2304               purposes, it is more appropriate to use a <a href="p2-semantics.html#status.3xx" class="smpl">3xx (Redirection)</a> response (<a href="p2-semantics.html#status.3xx" title="Redirection 3xx">Section 6.4</a> of <a href="#Part2" id="rfc.xref.Part2.27"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>).
     2305            </p>
     2306            <p id="rfc.section.6.7.p.12">This specification only defines the protocol name "HTTP" for use by the family of Hypertext Transfer Protocols, as defined
     2307               by the HTTP version rules of <a href="#http.version" title="Protocol Versioning">Section&nbsp;2.6</a> and future updates to this specification. Additional tokens ought to be registered with IANA using the registration procedure
     2308               defined in <a href="#upgrade.token.registry" title="Upgrade Token Registry">Section&nbsp;7.5</a>.
     2309            </p>
     2310         </div>
    22512311      </div>
    2252       <p id="rfc.section.7.1.p.3">Furthermore, the header field-name "Close" shall be registered as "reserved", since using that name as an HTTP header field
    2253          might conflict with the "close" connection option of the "<a href="#header.connection" class="smpl">Connection</a>" header field (<a href="#header.connection" id="rfc.xref.header.connection.8" title="Connection">Section&nbsp;6.1</a>).
    2254       </p>
    2255       <div id="rfc.table.u.1">
    2256          <table class="tt full left" cellpadding="3" cellspacing="0">
    2257             <thead>
    2258                <tr>
    2259                   <th>Header Field Name</th>
    2260                   <th>Protocol</th>
    2261                   <th>Status</th>
    2262                   <th>Reference</th>
    2263                </tr>
    2264             </thead>
    2265             <tbody>
    2266                <tr>
    2267                   <td class="left">Close</td>
    2268                   <td class="left">http</td>
    2269                   <td class="left">reserved</td>
    2270                   <td class="left"><a href="#header.field.registration" title="Header Field Registration">Section&nbsp;7.1</a>
    2271                   </td>
    2272                </tr>
    2273             </tbody>
    2274          </table>
     2312      <div id="IANA.considerations">
     2313         <h1 id="rfc.section.7"><a href="#rfc.section.7">7.</a>&nbsp;<a href="#IANA.considerations">IANA Considerations</a></h1>
     2314         <div id="header.field.registration">
     2315            <h2 id="rfc.section.7.1"><a href="#rfc.section.7.1">7.1</a>&nbsp;<a href="#header.field.registration">Header Field Registration</a></h2>
     2316            <p id="rfc.section.7.1.p.1">HTTP header fields are registered within the Message Header Field Registry maintained at &lt;<a href="http://www.iana.org/assignments/message-headers/message-header-index.html">http://www.iana.org/assignments/message-headers/message-header-index.html</a>&gt;.
     2317            </p>
     2318            <p id="rfc.section.7.1.p.2">This document defines the following HTTP header fields, so their associated registry entries shall be updated according to
     2319               the permanent registrations below (see <a href="#BCP90" id="rfc.xref.BCP90.1"><cite title="Registration Procedures for Message Header Fields">[BCP90]</cite></a>):
     2320            </p>
     2321            <div id="rfc.table.1">
     2322               <div id="iana.header.registration.table"></div>
     2323               <table class="tt full left" cellpadding="3" cellspacing="0">
     2324                  <thead>
     2325                     <tr>
     2326                        <th>Header Field Name</th>
     2327                        <th>Protocol</th>
     2328                        <th>Status</th>
     2329                        <th>Reference</th>
     2330                     </tr>
     2331                  </thead>
     2332                  <tbody>
     2333                     <tr>
     2334                        <td class="left">Connection</td>
     2335                        <td class="left">http</td>
     2336                        <td class="left">standard</td>
     2337                        <td class="left"><a href="#header.connection" id="rfc.xref.header.connection.7" title="Connection">Section&nbsp;6.1</a>
     2338                        </td>
     2339                     </tr>
     2340                     <tr>
     2341                        <td class="left">Content-Length</td>
     2342                        <td class="left">http</td>
     2343                        <td class="left">standard</td>
     2344                        <td class="left"><a href="#header.content-length" id="rfc.xref.header.content-length.1" title="Content-Length">Section&nbsp;3.3.2</a>
     2345                        </td>
     2346                     </tr>
     2347                     <tr>
     2348                        <td class="left">Host</td>
     2349                        <td class="left">http</td>
     2350                        <td class="left">standard</td>
     2351                        <td class="left"><a href="#header.host" id="rfc.xref.header.host.2" title="Host">Section&nbsp;5.4</a>
     2352                        </td>
     2353                     </tr>
     2354                     <tr>
     2355                        <td class="left">TE</td>
     2356                        <td class="left">http</td>
     2357                        <td class="left">standard</td>
     2358                        <td class="left"><a href="#header.te" id="rfc.xref.header.te.3" title="TE">Section&nbsp;4.3</a>
     2359                        </td>
     2360                     </tr>
     2361                     <tr>
     2362                        <td class="left">Trailer</td>
     2363                        <td class="left">http</td>
     2364                        <td class="left">standard</td>
     2365                        <td class="left"><a href="#header.trailer" id="rfc.xref.header.trailer.1" title="Trailer">Section&nbsp;4.1.1</a>
     2366                        </td>
     2367                     </tr>
     2368                     <tr>
     2369                        <td class="left">Transfer-Encoding</td>
     2370                        <td class="left">http</td>
     2371                        <td class="left">standard</td>
     2372                        <td class="left"><a href="#header.transfer-encoding" id="rfc.xref.header.transfer-encoding.3" title="Transfer-Encoding">Section&nbsp;3.3.1</a>
     2373                        </td>
     2374                     </tr>
     2375                     <tr>
     2376                        <td class="left">Upgrade</td>
     2377                        <td class="left">http</td>
     2378                        <td class="left">standard</td>
     2379                        <td class="left"><a href="#header.upgrade" id="rfc.xref.header.upgrade.2" title="Upgrade">Section&nbsp;6.7</a>
     2380                        </td>
     2381                     </tr>
     2382                     <tr>
     2383                        <td class="left">Via</td>
     2384                        <td class="left">http</td>
     2385                        <td class="left">standard</td>
     2386                        <td class="left"><a href="#header.via" id="rfc.xref.header.via.1" title="Via">Section&nbsp;5.7.1</a>
     2387                        </td>
     2388                     </tr>
     2389                  </tbody>
     2390               </table>
     2391            </div>
     2392            <p id="rfc.section.7.1.p.3">Furthermore, the header field-name "Close" shall be registered as "reserved", since using that name as an HTTP header field
     2393               might conflict with the "close" connection option of the "<a href="#header.connection" class="smpl">Connection</a>" header field (<a href="#header.connection" id="rfc.xref.header.connection.8" title="Connection">Section&nbsp;6.1</a>).
     2394            </p>
     2395            <div id="rfc.table.u.1">
     2396               <table class="tt full left" cellpadding="3" cellspacing="0">
     2397                  <thead>
     2398                     <tr>
     2399                        <th>Header Field Name</th>
     2400                        <th>Protocol</th>
     2401                        <th>Status</th>
     2402                        <th>Reference</th>
     2403                     </tr>
     2404                  </thead>
     2405                  <tbody>
     2406                     <tr>
     2407                        <td class="left">Close</td>
     2408                        <td class="left">http</td>
     2409                        <td class="left">reserved</td>
     2410                        <td class="left"><a href="#header.field.registration" title="Header Field Registration">Section&nbsp;7.1</a>
     2411                        </td>
     2412                     </tr>
     2413                  </tbody>
     2414               </table>
     2415            </div>
     2416            <p id="rfc.section.7.1.p.4">The change controller is: "IETF (iesg@ietf.org) - Internet Engineering Task Force".</p>
     2417         </div>
     2418         <div id="uri.scheme.registration">
     2419            <h2 id="rfc.section.7.2"><a href="#rfc.section.7.2">7.2</a>&nbsp;<a href="#uri.scheme.registration">URI Scheme Registration</a></h2>
     2420            <p id="rfc.section.7.2.p.1">IANA maintains the registry of URI Schemes <a href="#BCP115" id="rfc.xref.BCP115.1"><cite title="Guidelines and Registration Procedures for New URI Schemes">[BCP115]</cite></a> at &lt;<a href="http://www.iana.org/assignments/uri-schemes.html">http://www.iana.org/assignments/uri-schemes.html</a>&gt;.
     2421            </p>
     2422            <p id="rfc.section.7.2.p.2">This document defines the following URI schemes, so their associated registry entries shall be updated according to the permanent
     2423               registrations below:
     2424            </p>
     2425            <div id="rfc.table.u.2">
     2426               <table class="tt full left" cellpadding="3" cellspacing="0">
     2427                  <thead>
     2428                     <tr>
     2429                        <th>URI Scheme</th>
     2430                        <th>Description</th>
     2431                        <th>Reference</th>
     2432                     </tr>
     2433                  </thead>
     2434                  <tbody>
     2435                     <tr>
     2436                        <td class="left">http</td>
     2437                        <td class="left">Hypertext Transfer Protocol</td>
     2438                        <td class="left"><a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a></td>
     2439                     </tr>
     2440                     <tr>
     2441                        <td class="left">https</td>
     2442                        <td class="left">Hypertext Transfer Protocol Secure</td>
     2443                        <td class="left"><a href="#https.uri" title="https URI scheme">Section&nbsp;2.7.2</a></td>
     2444                     </tr>
     2445                  </tbody>
     2446               </table>
     2447            </div>
     2448         </div>
     2449         <div id="internet.media.type.http">
     2450            <h2 id="rfc.section.7.3"><a href="#rfc.section.7.3">7.3</a>&nbsp;<a href="#internet.media.type.http">Internet Media Type Registration</a></h2>
     2451            <p id="rfc.section.7.3.p.1">This document serves as the specification for the Internet media types "message/http" and "application/http". The following
     2452               is to be registered with IANA (see <a href="#BCP13" id="rfc.xref.BCP13.1"><cite title="Media Type Specifications and Registration Procedures">[BCP13]</cite></a>).
     2453            </p>
     2454            <div id="internet.media.type.message.http">
     2455               <div id="rfc.iref.m.3"></div>
     2456               <div id="rfc.iref.m.4"></div>
     2457               <h3 id="rfc.section.7.3.1"><a href="#rfc.section.7.3.1">7.3.1</a>&nbsp;<a href="#internet.media.type.message.http">Internet Media Type message/http</a></h3>
     2458               <p id="rfc.section.7.3.1.p.1">The message/http type can be used to enclose a single HTTP request or response message, provided that it obeys the MIME restrictions
     2459                  for all "message" types regarding line length and encodings.
     2460               </p>
     2461               <p id="rfc.section.7.3.1.p.2"></p>
     2462               <dl>
     2463                  <dt>Type name:</dt>
     2464                  <dd>message</dd>
     2465                  <dt>Subtype name:</dt>
     2466                  <dd>http</dd>
     2467                  <dt>Required parameters:</dt>
     2468                  <dd>none</dd>
     2469                  <dt>Optional parameters:</dt>
     2470                  <dd>version, msgtype
     2471                     <dl>
     2472                        <dt>version:</dt>
     2473                        <dd>The HTTP-version number of the enclosed message (e.g., "1.1"). If not present, the version can be determined from the first
     2474                           line of the body.
     2475                        </dd>
     2476                        <dt>msgtype:</dt>
     2477                        <dd>The message type — "request" or "response". If not present, the type can be determined from the first line of the body.</dd>
     2478                     </dl>
     2479                  </dd>
     2480                  <dt>Encoding considerations:</dt>
     2481                  <dd>only "7bit", "8bit", or "binary" are permitted</dd>
     2482                  <dt>Security considerations:</dt>
     2483                  <dd>none</dd>
     2484                  <dt>Interoperability considerations:</dt>
     2485                  <dd>none</dd>
     2486                  <dt>Published specification:</dt>
     2487                  <dd>This specification (see <a href="#internet.media.type.message.http" title="Internet Media Type message/http">Section&nbsp;7.3.1</a>).
     2488                  </dd>
     2489                  <dt>Applications that use this media type:</dt>
     2490                  <dt>Additional information:</dt>
     2491                  <dd>
     2492                     <dl>
     2493                        <dt>Magic number(s):</dt>
     2494                        <dd>none</dd>
     2495                        <dt>File extension(s):</dt>
     2496                        <dd>none</dd>
     2497                        <dt>Macintosh file type code(s):</dt>
     2498                        <dd>none</dd>
     2499                     </dl>
     2500                  </dd>
     2501                  <dt>Person and email address to contact for further information:</dt>
     2502                  <dd>See Authors Section.</dd>
     2503                  <dt>Intended usage:</dt>
     2504                  <dd>COMMON</dd>
     2505                  <dt>Restrictions on usage:</dt>
     2506                  <dd>none</dd>
     2507                  <dt>Author:</dt>
     2508                  <dd>See Authors Section.</dd>
     2509                  <dt>Change controller:</dt>
     2510                  <dd>IESG</dd>
     2511               </dl>
     2512            </div>
     2513            <div id="internet.media.type.application.http">
     2514               <div id="rfc.iref.m.5"></div>
     2515               <div id="rfc.iref.a.5"></div>
     2516               <h3 id="rfc.section.7.3.2"><a href="#rfc.section.7.3.2">7.3.2</a>&nbsp;<a href="#internet.media.type.application.http">Internet Media Type application/http</a></h3>
     2517               <p id="rfc.section.7.3.2.p.1">The application/http type can be used to enclose a pipeline of one or more HTTP request or response messages (not intermixed).</p>
     2518               <p id="rfc.section.7.3.2.p.2"></p>
     2519               <dl>
     2520                  <dt>Type name:</dt>
     2521                  <dd>application</dd>
     2522                  <dt>Subtype name:</dt>
     2523                  <dd>http</dd>
     2524                  <dt>Required parameters:</dt>
     2525                  <dd>none</dd>
     2526                  <dt>Optional parameters:</dt>
     2527                  <dd>version, msgtype
     2528                     <dl>
     2529                        <dt>version:</dt>
     2530                        <dd>The HTTP-version number of the enclosed messages (e.g., "1.1"). If not present, the version can be determined from the first
     2531                           line of the body.
     2532                        </dd>
     2533                        <dt>msgtype:</dt>
     2534                        <dd>The message type — "request" or "response". If not present, the type can be determined from the first line of the body.</dd>
     2535                     </dl>
     2536                  </dd>
     2537                  <dt>Encoding considerations:</dt>
     2538                  <dd>HTTP messages enclosed by this type are in "binary" format; use of an appropriate Content-Transfer-Encoding is required when
     2539                     transmitted via E-mail.
     2540                  </dd>
     2541                  <dt>Security considerations:</dt>
     2542                  <dd>none</dd>
     2543                  <dt>Interoperability considerations:</dt>
     2544                  <dd>none</dd>
     2545                  <dt>Published specification:</dt>
     2546                  <dd>This specification (see <a href="#internet.media.type.application.http" title="Internet Media Type application/http">Section&nbsp;7.3.2</a>).
     2547                  </dd>
     2548                  <dt>Applications that use this media type:</dt>
     2549                  <dt>Additional information:</dt>
     2550                  <dd>
     2551                     <dl>
     2552                        <dt>Magic number(s):</dt>
     2553                        <dd>none</dd>
     2554                        <dt>File extension(s):</dt>
     2555                        <dd>none</dd>
     2556                        <dt>Macintosh file type code(s):</dt>
     2557                        <dd>none</dd>
     2558                     </dl>
     2559                  </dd>
     2560                  <dt>Person and email address to contact for further information:</dt>
     2561                  <dd>See Authors Section.</dd>
     2562                  <dt>Intended usage:</dt>
     2563                  <dd>COMMON</dd>
     2564                  <dt>Restrictions on usage:</dt>
     2565                  <dd>none</dd>
     2566                  <dt>Author:</dt>
     2567                  <dd>See Authors Section.</dd>
     2568                  <dt>Change controller:</dt>
     2569                  <dd>IESG</dd>
     2570               </dl>
     2571            </div>
     2572         </div>
     2573         <div id="transfer.coding.registry">
     2574            <h2 id="rfc.section.7.4"><a href="#rfc.section.7.4">7.4</a>&nbsp;<a href="#transfer.coding.registry">Transfer Coding Registry</a></h2>
     2575            <p id="rfc.section.7.4.p.1">The HTTP Transfer Coding Registry defines the name space for transfer coding names. It is maintained at &lt;<a href="http://www.iana.org/assignments/http-parameters">http://www.iana.org/assignments/http-parameters</a>&gt;.
     2576            </p>
     2577            <div id="transfer.coding.registry.procedure">
     2578               <h3 id="rfc.section.7.4.1"><a href="#rfc.section.7.4.1">7.4.1</a>&nbsp;<a href="#transfer.coding.registry.procedure">Procedure</a></h3>
     2579               <p id="rfc.section.7.4.1.p.1">Registrations <em class="bcp14">MUST</em> include the following fields:
     2580               </p>
     2581               <ul>
     2582                  <li>Name</li>
     2583                  <li>Description</li>
     2584                  <li>Pointer to specification text</li>
     2585               </ul>
     2586               <p id="rfc.section.7.4.1.p.2">Names of transfer codings <em class="bcp14">MUST NOT</em> overlap with names of content codings (<a href="p2-semantics.html#content.codings" title="Content Codings">Section 3.1.2.1</a> of <a href="#Part2" id="rfc.xref.Part2.28"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>) unless the encoding transformation is identical, as is the case for the compression codings defined in <a href="#compression.codings" title="Compression Codings">Section&nbsp;4.2</a>.
     2587               </p>
     2588               <p id="rfc.section.7.4.1.p.3">Values to be added to this name space require IETF Review (see <a href="https://tools.ietf.org/html/rfc5226#section-4.1">Section 4.1</a> of <a href="#RFC5226" id="rfc.xref.RFC5226.1"><cite title="Guidelines for Writing an IANA Considerations Section in RFCs">[RFC5226]</cite></a>), and <em class="bcp14">MUST</em> conform to the purpose of transfer coding defined in this specification.
     2589               </p>
     2590               <p id="rfc.section.7.4.1.p.4">Use of program names for the identification of encoding formats is not desirable and is discouraged for future encodings.</p>
     2591            </div>
     2592            <div id="transfer.coding.registration">
     2593               <h3 id="rfc.section.7.4.2"><a href="#rfc.section.7.4.2">7.4.2</a>&nbsp;<a href="#transfer.coding.registration">Registration</a></h3>
     2594               <p id="rfc.section.7.4.2.p.1">The HTTP Transfer Coding Registry shall be updated with the registrations below:</p>
     2595               <div id="rfc.table.2">
     2596                  <div id="iana.transfer.coding.registration.table"></div>
     2597                  <table class="tt full left" cellpadding="3" cellspacing="0">
     2598                     <thead>
     2599                        <tr>
     2600                           <th>Name</th>
     2601                           <th>Description</th>
     2602                           <th>Reference</th>
     2603                        </tr>
     2604                     </thead>
     2605                     <tbody>
     2606                        <tr>
     2607                           <td class="left">chunked</td>
     2608                           <td class="left">Transfer in a series of chunks</td>
     2609                           <td class="left"><a href="#chunked.encoding" title="Chunked Transfer Coding">Section&nbsp;4.1</a>
     2610                           </td>
     2611                        </tr>
     2612                        <tr>
     2613                           <td class="left">compress</td>
     2614                           <td class="left">UNIX "compress" data format <a href="#Welch" id="rfc.xref.Welch.2"><cite title="A Technique for High Performance Data Compression">[Welch]</cite></a></td>
     2615                           <td class="left"><a href="#compress.coding" title="Compress Coding">Section&nbsp;4.2.1</a>
     2616                           </td>
     2617                        </tr>
     2618                        <tr>
     2619                           <td class="left">deflate</td>
     2620                           <td class="left">"deflate" compressed data (<a href="#RFC1951" id="rfc.xref.RFC1951.2"><cite title="DEFLATE Compressed Data Format Specification version 1.3">[RFC1951]</cite></a>) inside the "zlib" data format (<a href="#RFC1950" id="rfc.xref.RFC1950.2"><cite title="ZLIB Compressed Data Format Specification version 3.3">[RFC1950]</cite></a>)
     2621                           </td>
     2622                           <td class="left"><a href="#deflate.coding" title="Deflate Coding">Section&nbsp;4.2.2</a>
     2623                           </td>
     2624                        </tr>
     2625                        <tr>
     2626                           <td class="left">gzip</td>
     2627                           <td class="left">GZIP file format <a href="#RFC1952" id="rfc.xref.RFC1952.2"><cite title="GZIP file format specification version 4.3">[RFC1952]</cite></a></td>
     2628                           <td class="left"><a href="#gzip.coding" title="Gzip Coding">Section&nbsp;4.2.3</a>
     2629                           </td>
     2630                        </tr>
     2631                        <tr>
     2632                           <td class="left">x-compress</td>
     2633                           <td class="left">Deprecated (alias for compress)</td>
     2634                           <td class="left"><a href="#compress.coding" title="Compress Coding">Section&nbsp;4.2.1</a>
     2635                           </td>
     2636                        </tr>
     2637                        <tr>
     2638                           <td class="left">x-gzip</td>
     2639                           <td class="left">Deprecated (alias for gzip)</td>
     2640                           <td class="left"><a href="#gzip.coding" title="Gzip Coding">Section&nbsp;4.2.3</a>
     2641                           </td>
     2642                        </tr>
     2643                     </tbody>
     2644                  </table>
     2645               </div>
     2646            </div>
     2647         </div>
     2648         <div id="upgrade.token.registry">
     2649            <h2 id="rfc.section.7.5"><a href="#rfc.section.7.5">7.5</a>&nbsp;<a href="#upgrade.token.registry">Upgrade Token Registry</a></h2>
     2650            <p id="rfc.section.7.5.p.1">The HTTP Upgrade Token Registry defines the name space for protocol-name tokens used to identify protocols in the <a href="#header.upgrade" class="smpl">Upgrade</a> header field. The registry is maintained at &lt;<a href="http://www.iana.org/assignments/http-upgrade-tokens">http://www.iana.org/assignments/http-upgrade-tokens</a>&gt;.
     2651            </p>
     2652            <div id="upgrade.token.registry.procedure">
     2653               <h3 id="rfc.section.7.5.1"><a href="#rfc.section.7.5.1">7.5.1</a>&nbsp;<a href="#upgrade.token.registry.procedure">Procedure</a></h3>
     2654               <p id="rfc.section.7.5.1.p.1">Each registered protocol name is associated with contact information and an optional set of specifications that details how
     2655                  the connection will be processed after it has been upgraded.
     2656               </p>
     2657               <p id="rfc.section.7.5.1.p.2">Registrations happen on a "First Come First Served" basis (see <a href="https://tools.ietf.org/html/rfc5226#section-4.1">Section 4.1</a> of <a href="#RFC5226" id="rfc.xref.RFC5226.2"><cite title="Guidelines for Writing an IANA Considerations Section in RFCs">[RFC5226]</cite></a>) and are subject to the following rules:
     2658               </p>
     2659               <ol>
     2660                  <li>A protocol-name token, once registered, stays registered forever.</li>
     2661                  <li>The registration <em class="bcp14">MUST</em> name a responsible party for the registration.
     2662                  </li>
     2663                  <li>The registration <em class="bcp14">MUST</em> name a point of contact.
     2664                  </li>
     2665                  <li>The registration <em class="bcp14">MAY</em> name a set of specifications associated with that token. Such specifications need not be publicly available.
     2666                  </li>
     2667                  <li>The registration <em class="bcp14">SHOULD</em> name a set of expected "protocol-version" tokens associated with that token at the time of registration.
     2668                  </li>
     2669                  <li>The responsible party <em class="bcp14">MAY</em> change the registration at any time. The IANA will keep a record of all such changes, and make them available upon request.
     2670                  </li>
     2671                  <li>The IESG <em class="bcp14">MAY</em> reassign responsibility for a protocol token. This will normally only be used in the case when a responsible party cannot
     2672                     be contacted.
     2673                  </li>
     2674               </ol>
     2675               <p id="rfc.section.7.5.1.p.3">This registration procedure for HTTP Upgrade Tokens replaces that previously defined in <a href="https://tools.ietf.org/html/rfc2817#section-7.2">Section 7.2</a> of <a href="#RFC2817" id="rfc.xref.RFC2817.2"><cite title="Upgrading to TLS Within HTTP/1.1">[RFC2817]</cite></a>.
     2676               </p>
     2677            </div>
     2678            <div id="upgrade.token.registration">
     2679               <h3 id="rfc.section.7.5.2"><a href="#rfc.section.7.5.2">7.5.2</a>&nbsp;<a href="#upgrade.token.registration">Upgrade Token Registration</a></h3>
     2680               <p id="rfc.section.7.5.2.p.1">The HTTP Upgrade Token Registry shall be updated with the registration below:</p>
     2681               <div id="rfc.table.u.3">
     2682                  <table class="tt full left" cellpadding="3" cellspacing="0">
     2683                     <thead>
     2684                        <tr>
     2685                           <th>Value</th>
     2686                           <th>Description</th>
     2687                           <th>Expected Version Tokens</th>
     2688                           <th>Reference</th>
     2689                        </tr>
     2690                     </thead>
     2691                     <tbody>
     2692                        <tr>
     2693                           <td class="left">HTTP</td>
     2694                           <td class="left">Hypertext Transfer Protocol</td>
     2695                           <td class="left">any DIGIT.DIGIT (e.g, "2.0")</td>
     2696                           <td class="left"><a href="#http.version" title="Protocol Versioning">Section&nbsp;2.6</a></td>
     2697                        </tr>
     2698                     </tbody>
     2699                  </table>
     2700               </div>
     2701               <p id="rfc.section.7.5.2.p.2">The responsible party is: "IETF (iesg@ietf.org) - Internet Engineering Task Force".</p>
     2702            </div>
     2703         </div>
    22752704      </div>
    2276       <p id="rfc.section.7.1.p.4">The change controller is: "IETF (iesg@ietf.org) - Internet Engineering Task Force".</p>
    2277       <h2 id="rfc.section.7.2"><a href="#rfc.section.7.2">7.2</a>&nbsp;<a id="uri.scheme.registration" href="#uri.scheme.registration">URI Scheme Registration</a></h2>
    2278       <p id="rfc.section.7.2.p.1">IANA maintains the registry of URI Schemes <a href="#BCP115" id="rfc.xref.BCP115.1"><cite title="Guidelines and Registration Procedures for New URI Schemes">[BCP115]</cite></a> at &lt;<a href="http://www.iana.org/assignments/uri-schemes.html">http://www.iana.org/assignments/uri-schemes.html</a>&gt;.
    2279       </p>
    2280       <p id="rfc.section.7.2.p.2">This document defines the following URI schemes, so their associated registry entries shall be updated according to the permanent
    2281          registrations below:
    2282       </p>
    2283       <div id="rfc.table.u.2">
    2284          <table class="tt full left" cellpadding="3" cellspacing="0">
    2285             <thead>
    2286                <tr>
    2287                   <th>URI Scheme</th>
    2288                   <th>Description</th>
    2289                   <th>Reference</th>
    2290                </tr>
    2291             </thead>
    2292             <tbody>
    2293                <tr>
    2294                   <td class="left">http</td>
    2295                   <td class="left">Hypertext Transfer Protocol</td>
    2296                   <td class="left"><a href="#http.uri" title="http URI scheme">Section&nbsp;2.7.1</a></td>
    2297                </tr>
    2298                <tr>
    2299                   <td class="left">https</td>
    2300                   <td class="left">Hypertext Transfer Protocol Secure</td>
    2301                   <td class="left"><a href="#https.uri" title="https URI scheme">Section&nbsp;2.7.2</a></td>
    2302                </tr>
    2303             </tbody>
    2304          </table>
     2705      <div id="security.considerations">
     2706         <h1 id="rfc.section.8"><a href="#rfc.section.8">8.</a>&nbsp;<a href="#security.considerations">Security Considerations</a></h1>
     2707         <p id="rfc.section.8.p.1">This section is meant to inform developers, information providers, and users of known security concerns relevant to HTTP/1.1
     2708            message syntax, parsing, and routing.
     2709         </p>
     2710         <div id="dns.related.attacks">
     2711            <h2 id="rfc.section.8.1"><a href="#rfc.section.8.1">8.1</a>&nbsp;<a href="#dns.related.attacks">DNS-related Attacks</a></h2>
     2712            <p id="rfc.section.8.1.p.1">HTTP clients rely heavily on the Domain Name Service (DNS), and are thus generally prone to security attacks based on the
     2713               deliberate misassociation of IP addresses and DNS names not protected by DNSSEC. Clients need to be cautious in assuming the
     2714               validity of an IP number/DNS name association unless the response is protected by DNSSEC (<a href="#RFC4033" id="rfc.xref.RFC4033.1"><cite title="DNS Security Introduction and Requirements">[RFC4033]</cite></a>).
     2715            </p>
     2716         </div>
     2717         <div id="attack.intermediaries">
     2718            <h2 id="rfc.section.8.2"><a href="#rfc.section.8.2">8.2</a>&nbsp;<a href="#attack.intermediaries">Intermediaries and Caching</a></h2>
     2719            <p id="rfc.section.8.2.p.1">By their very nature, HTTP intermediaries are men-in-the-middle, and represent an opportunity for man-in-the-middle attacks.
     2720               Compromise of the systems on which the intermediaries run can result in serious security and privacy problems. Intermediaries
     2721               have access to security-related information, personal information about individual users and organizations, and proprietary
     2722               information belonging to users and content providers. A compromised intermediary, or an intermediary implemented or configured
     2723               without regard to security and privacy considerations, might be used in the commission of a wide range of potential attacks.
     2724            </p>
     2725            <p id="rfc.section.8.2.p.2">Intermediaries that contain a shared cache are especially vulnerable to cache poisoning attacks.</p>
     2726            <p id="rfc.section.8.2.p.3">Implementers need to consider the privacy and security implications of their design and coding decisions, and of the configuration
     2727               options they provide to operators (especially the default configuration).
     2728            </p>
     2729            <p id="rfc.section.8.2.p.4">Users need to be aware that intermediaries are no more trustworthy than the people who run them; HTTP itself cannot solve
     2730               this problem.
     2731            </p>
     2732         </div>
     2733         <div id="attack.protocol.element.size.overflows">
     2734            <h2 id="rfc.section.8.3"><a href="#rfc.section.8.3">8.3</a>&nbsp;<a href="#attack.protocol.element.size.overflows">Buffer Overflows</a></h2>
     2735            <p id="rfc.section.8.3.p.1">Because HTTP uses mostly textual, character-delimited fields, attackers can overflow buffers in implementations, and/or perform
     2736               a Denial of Service against implementations that accept fields with unlimited lengths.
     2737            </p>
     2738            <p id="rfc.section.8.3.p.2">To promote interoperability, this specification makes specific recommendations for minimum size limits on request-line (<a href="#request.line" title="Request Line">Section&nbsp;3.1.1</a>) and blocks of header fields (<a href="#header.fields" title="Header Fields">Section&nbsp;3.2</a>). These are minimum recommendations, chosen to be supportable even by implementations with limited resources; it is expected
     2739               that most implementations will choose substantially higher limits.
     2740            </p>
     2741            <p id="rfc.section.8.3.p.3">This specification also provides a way for servers to reject messages that have request-targets that are too long (<a href="p2-semantics.html#status.414" title="414 URI Too Long">Section 6.5.12</a> of <a href="#Part2" id="rfc.xref.Part2.29"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>) or request entities that are too large (<a href="p2-semantics.html#status.4xx" title="Client Error 4xx">Section 6.5</a> of <a href="#Part2" id="rfc.xref.Part2.30"><cite title="Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content">[Part2]</cite></a>). Additional status codes related to capacity limits have been defined by extensions to HTTP <a href="#RFC6585" id="rfc.xref.RFC6585.1"><cite title="Additional HTTP Status Codes">[RFC6585]</cite></a>.
     2742            </p>
     2743            <p id="rfc.section.8.3.p.4">Recipients <em class="bcp14">SHOULD</em> carefully limit the extent to which they read other fields, including (but not limited to) request methods, response status
     2744               phrases, header field-names, and body chunks, so as to avoid denial of service attacks without impeding interoperability.
     2745            </p>
     2746         </div>
     2747         <div id="message.integrity">
     2748            <h2 id="rfc.section.8.4"><a href="#rfc.section.8.4">8.4</a>&nbsp;<a href="#message.integrity">Message Integrity</a></h2>
     2749            <p id="rfc.section.8.4.p.1">HTTP does not define a specific mechanism for ensuring message integrity, instead relying on the error-detection ability of
     2750               underlying transport protocols and the use of length or chunk-delimited framing to detect completeness. Additional integrity
     2751               mechanisms, such as hash functions or digital signatures applied to the content, can be selectively added to messages via
     2752               extensible metadata header fields. Historically, the lack of a single integrity mechanism has been justified by the informal
     2753               nature of most HTTP communication. However, the prevalence of HTTP as an information access mechanism has resulted in its
     2754               increasing use within environments where verification of message integrity is crucial.
     2755            </p>
     2756            <p id="rfc.section.8.4.p.2">User agents are encouraged to implement configurable means for detecting and reporting failures of message integrity such
     2757               that those means can be enabled within environments for which integrity is necessary. For example, a browser being used to
     2758               view medical history or drug interaction information needs to indicate to the user when such information is detected by the
     2759               protocol to be incomplete, expired, or corrupted during transfer. Such mechanisms might be selectively enabled via user agent
     2760               extensions or the presence of message integrity metadata in a response. At a minimum, user agents ought to provide some indication
     2761               that allows a user to distinguish between a complete and incomplete response message (<a href="#incomplete.messages" title="Handling Incomplete Messages">Section&nbsp;3.4</a>) when such verification is desired.
     2762            </p>
     2763         </div>
     2764         <div id="abuse.of.server.log.information">
     2765            <h2 id="rfc.section.8.5"><a href="#rfc.section.8.5">8.5</a>&nbsp;<a href="#abuse.of.server.log.information">Server Log Information</a></h2>
     2766            <p id="rfc.section.8.5.p.1">A server is in the position to save personal data about a user's requests over time, which might identify their reading patterns
     2767               or subjects of interest. In particular, log information gathered at an intermediary often contains a history of user agent
     2768               interaction, across a multitude of sites, that can be traced to individual users.
     2769            </p>
     2770            <p id="rfc.section.8.5.p.2">HTTP log information is confidential in nature; its handling is often constrained by laws and regulations. Log information
     2771               needs to be securely stored and appropriate guidelines followed for its analysis. Anonymization of personal information within
     2772               individual entries helps, but is generally not sufficient to prevent real log traces from being re-identified based on correlation
     2773               with other access characteristics. As such, access traces that are keyed to a specific client should not be published even
     2774               if the key is pseudonymous.
     2775            </p>
     2776            <p id="rfc.section.8.5.p.3">To minimize the risk of theft or accidental publication, log information should be purged of personally identifiable information,
     2777               including user identifiers, IP addresses, and user-provided query parameters, as soon as that information is no longer necessary
     2778               to support operational needs for security, auditing, or fraud control.
     2779            </p>
     2780         </div>
    23052781      </div>
    2306       <h2 id="rfc.section.7.3"><a href="#rfc.section.7.3">7.3</a>&nbsp;<a id="internet.media.type.http" href="#internet.media.type.http">Internet Media Type Registration</a></h2>
    2307       <p id="rfc.section.7.3.p.1">This document serves as the specification for the Internet media types "message/http" and "application/http". The following
    2308          is to be registered with IANA (see <a href="#BCP13" id="rfc.xref.BCP13.1"><cite title="Media Type Specifications and Registration Procedures">[BCP13]</cite></a>).
    2309       </p>
    2310       <div id="rfc.iref.m.3"></div>
    2311       <div id="rfc.iref.m.4"></div>
    2312       <h3 id="rfc.section.7.3.1"><a href="#rfc.section.7.3.1">7.3.1</a>&nbsp;<a id="internet.media.type.message.http" href="#internet.media.type.message.http">Internet Media Type message/http</a></h3>
    2313       <p id="rfc.section.7.3.1.p.1">The message/http type can be used to enclose a single HTTP request or response message, provided that it obeys the MIME restrictions
    2314          for all "message" types regarding line length and encodings.
    2315       </p>
    2316       <p id="rfc.section.7.3.1.p.2"></p>
    2317       <dl>
    2318          <dt>Type name:</dt>
    2319          <dd>message</dd>
    2320          <dt>Subtype name:</dt>
    2321          <dd>http</dd>
    2322          <dt>Required parameters:</dt>
    2323          <dd>none</dd>
    2324          <dt>Optional parameters:</dt>
    2325          <dd>version, msgtype
    2326             <dl>
    2327                <dt>version:</dt>
    2328                <dd>The HTTP-version number of the enclosed message (e.g., "1.1"). If not present, the version can be determined from the first
    2329                   line of the body.
    2330                </dd>
    2331                <dt>msgtype:</dt>
    2332                <dd>The message type — "request" or "response". If not present, the type can be determined from the first line of the body.</dd>
    2333             </dl>
    2334          </dd>
    2335          <dt>Encoding considerations:</dt>
    2336          <dd>only "7bit", "8bit", or "binary" are permitted</dd>
    2337          <dt>Security considerations:</dt>
    2338          <dd>none</dd>
    2339          <dt>Interoperability considerations:</dt>
    2340          <dd>none</dd>
    2341          <dt>Published specification:</dt>
    2342          <dd>This specification (see <a href="#internet.media.type.message.http" title="Internet Media Type message/http">Section&nbsp;7.3.1</a>).
    2343          </dd>
    2344          <dt>Applications that use this media type:</dt>
    2345          <dt>Additional information:</dt>
    2346          <dd>
    2347             <dl>
    2348                <dt>Magic number(s):</dt>
    2349                <dd>none</dd>
    2350                <dt>File extension(s):</dt>
    2351                <dd>none</dd>
    2352                <dt>Macintosh file type code(s):</dt>
    2353                <dd>none</dd>
    2354             </dl>
    2355          </dd>
    2356          <dt>Person and email address to contact for further information:</dt>
    2357          <dd>See Authors Section.</dd>
    2358          <dt>Intended usage:</dt>
    2359          <dd>COMMON</dd>
    2360          <dt>Restrictions on usage:</dt>
    2361          <dd>none</dd>
    2362          <dt>Author:</dt>
    2363          <dd>See Authors Section.</dd>
    2364          <dt>Change controller:</dt>
    2365          <dd>IESG</dd>
    2366       </dl>
    2367       <div id="rfc.iref.m.5"></div>
    2368       <div id="rfc.iref.a.5"></div>
    2369       <h3 id="rfc.section.7.3.2"><a href="#rfc.section.7.3.2">7.3.2</a>&nbsp;<a id="internet.media.type.application.http" href="#internet.media.type.application.http">Internet Media Type application/http</a></h3>
    2370       <p id="rfc.section.7.3.2.p.1">The application/http type can be used to enclose a pipeline of one or more HTTP request or response messages (not intermixed).</p>
    2371       <p id="rfc.section.7.3.2.p.2"></p>
    2372       <dl>
    2373          <dt>Type name:</dt>
    2374          <dd>application</dd>
    2375          <dt>Subtype name:</dt>
    2376          <dd>http</dd>
    2377          <dt>Required parameters:</dt>
    2378          <dd>none</dd>
    2379          <dt>Optional parameters:</dt>
    2380          <dd>version, msgtype
    2381             <dl>
    2382                <dt>version:</dt>
    2383                <dd>The HTTP-version number of the enclosed messages (e.g., "1.1"). If not present, the version can be determined from the first
    2384                   line of the body.
    2385                </dd>
    2386                <dt>msgtype:</dt>
    2387                <dd>The message type — "request" or "response". If not present, the type can be determined from the first line of the body.</dd>
    2388             </dl>
    2389          </dd>
    2390          <dt>Encoding considerations:</dt>
    2391          <dd>HTTP messages enclosed by this type are in "binary" format; use of an appropriate Content-Transfer-Encoding is required when
    2392             transmitted via E-mail.
    2393          </dd>
    2394          <dt>Security considerations:</dt>
    2395          <dd>none</dd>
    2396          <dt>Interoperability considerations:</dt>
    2397          <dd>none</dd>
    2398