1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
|
Internet Engineering Task Force (IETF) T. Pauly, Ed.
Request for Comments: 9484 Apple Inc.
Updates: 9298 D. Schinazi
Category: Standards Track A. Chernyakhovsky
ISSN: 2070-1721 Google LLC
M. Kühlewind
M. Westerlund
Ericsson
October 2023
Proxying IP in HTTP
Abstract
This document describes how to proxy IP packets in HTTP. This
protocol is similar to UDP proxying in HTTP but allows transmitting
arbitrary IP packets. More specifically, this document defines a
protocol that allows an HTTP client to create an IP tunnel through an
HTTP server that acts as an IP proxy. This document updates RFC
9298.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9484.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Revised BSD License text as described in Section 4.e of the
Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents
1. Introduction
2. Conventions and Definitions
3. Configuration of Clients
4. Tunnelling IP over HTTP
4.1. IP Proxy Handling
4.2. HTTP/1.1 Request
4.3. HTTP/1.1 Response
4.4. HTTP/2 and HTTP/3 Requests
4.5. HTTP/2 and HTTP/3 Responses
4.6. Limiting Request Scope
4.7. Capsules
4.7.1. ADDRESS_ASSIGN Capsule
4.7.2. ADDRESS_REQUEST Capsule
4.7.3. ROUTE_ADVERTISEMENT Capsule
4.8. IPv6 Extension Headers
5. Context Identifiers
6. HTTP Datagram Payload Format
7. IP Packet Handling
7.1. Link Operation
7.2. Routing Operation
7.2.1. Error Signalling
8. Examples
8.1. Remote Access VPN
8.2. Site-to-Site VPN
8.3. IP Flow Forwarding
8.4. Proxied Connection Racing
9. Extensibility Considerations
10. Performance Considerations
10.1. MTU Considerations
10.2. ECN Considerations
10.3. Differentiated Services Considerations
11. Security Considerations
12. IANA Considerations
12.1. HTTP Upgrade Token Registration
12.2. MASQUE URI Suffixes Registry Creation
12.3. Updates to masque Well-Known URI Registration
12.4. HTTP Capsule Types Registrations
13. References
13.1. Normative References
13.2. Informative References
Acknowledgments
Authors' Addresses
1. Introduction
HTTP provides the CONNECT method (see Section 9.3.6 of [HTTP]) for
creating a TCP [TCP] tunnel to a destination and a similar mechanism
for UDP [CONNECT-UDP]. However, these mechanisms cannot tunnel other
IP protocols [IANA-PN] nor convey fields of the IP header.
This document describes a protocol for tunnelling IP through an HTTP
server acting as an IP-specific proxy over HTTP. This can be used
for various use cases, such as remote access VPN, site-to-site VPN,
secure point-to-point communication, or general-purpose packet
tunnelling.
IP proxying operates similarly to UDP proxying [CONNECT-UDP], whereby
the proxy itself is identified with an absolute URL, optionally
containing the traffic's destination. Clients generate these URLs
using a URI Template [TEMPLATE], as described in Section 3.
This protocol supports all existing versions of HTTP by using HTTP
Datagrams [HTTP-DGRAM]. When using HTTP/2 [HTTP/2] or HTTP/3
[HTTP/3], it uses HTTP Extended CONNECT, as described in
[EXT-CONNECT2] and [EXT-CONNECT3]. When using HTTP/1.x [HTTP/1.1],
it uses HTTP Upgrade, as defined in Section 7.8 of [HTTP].
This document updates [CONNECT-UDP] to change the "masque" well-known
URI; see Section 12.3.
2. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
In this document, we use the term "IP proxy" to refer to the HTTP
server that responds to the IP proxying request. The term "client"
is used in the HTTP sense; the client constructs the IP proxying
request. If there are HTTP intermediaries (as defined in Section 3.7
of [HTTP]) between the client and the IP proxy, those are referred to
as "intermediaries" in this document. The term "IP proxying
endpoints" refers to both the client and the IP proxy.
This document uses terminology from [QUIC]. Where this document
defines protocol types, the definition format uses the notation from
Section 1.3 of [QUIC]. This specification uses the variable-length
integer encoding from Section 16 of [QUIC]. Variable-length integer
values do not need to be encoded in the minimum number of bytes
necessary.
Note that, when the HTTP version in use does not support multiplexing
streams (such as HTTP/1.1), any reference to "stream" in this
document represents the entire connection.
3. Configuration of Clients
Clients are configured to use IP proxying over HTTP via a URI
Template [TEMPLATE]. The URI Template MAY contain two variables:
"target" and "ipproto"; see Section 4.6. The optionality of the
variables needs to be considered when defining the template so that
the variable is either self-identifying or possible to exclude in the
syntax.
Examples are shown below:
https://example.org/.well-known/masque/ip/{target}/{ipproto}/
https://proxy.example.org:4443/masque/ip?t={target}&i={ipproto}
https://proxy.example.org:4443/masque/ip{?target,ipproto}
https://masque.example.org/?user=bob
Figure 1: URI Template Examples
The following requirements apply to the URI Template:
* The URI Template MUST be a level 3 template or lower.
* The URI Template MUST be in absolute form and MUST include non-
empty scheme, authority, and path components.
* The path component of the URI Template MUST start with a slash
"/".
* All template variables MUST be within the path or query components
of the URI.
* The URI Template MAY contain the two variables "target" and
"ipproto" and MAY contain other variables. If the "target" or
"ipproto" variables are included, their values MUST NOT be empty.
Clients can instead use "*" to indicate wildcard or no-preference
values; see Section 4.6.
* The URI Template MUST NOT contain any non-ASCII Unicode characters
and MUST only contain ASCII characters in the range 0x21-0x7E
inclusive (note that percent-encoding is allowed; see Section 2.1
of [URI]).
* The URI Template MUST NOT use Reserved Expansion ("+" operator),
Fragment Expansion ("#" operator), Label Expansion with Dot-
Prefix, Path Segment Expansion with Slash-Prefix, nor Path-Style
Parameter Expansion with Semicolon-Prefix.
Clients SHOULD validate the requirements above; however, clients MAY
use a general-purpose URI Template implementation that lacks this
specific validation. If a client detects that any of the
requirements above are not met by a URI Template, the client MUST
reject its configuration and abort the request without sending it to
the IP proxy.
As with UDP proxying, some client configurations for IP proxies will
only allow the user to configure the proxy host and proxy port.
Clients with such limitations MAY attempt to access IP proxying
capabilities using the default template, which is defined as:
"https://$PROXY_HOST:$PROXY_PORT/.well-known/masque/
ip/{target}/{ipproto}/", where $PROXY_HOST and $PROXY_PORT are the
configured host and port of the IP proxy, respectively. IP proxy
deployments SHOULD offer service at this location if they need to
interoperate with such clients.
4. Tunnelling IP over HTTP
To allow negotiation of a tunnel for IP over HTTP, this document
defines the "connect-ip" HTTP upgrade token. The resulting IP
tunnels use the Capsule Protocol (see Section 3.2 of [HTTP-DGRAM])
with HTTP Datagrams in the format defined in Section 6.
To initiate an IP tunnel associated with a single HTTP stream, a
client issues a request containing the "connect-ip" upgrade token.
When sending its IP proxying request, the client SHALL perform URI
Template expansion to determine the path and query of its request;
see Section 3.
By virtue of the definition of the Capsule Protocol (see Section 3.2
of [HTTP-DGRAM]), IP proxying requests do not carry any message
content. Similarly, successful IP proxying responses also do not
carry any message content.
IP proxying over HTTP MUST be operated over TLS or QUIC encryption,
or another equivalent encryption protocol, to provide
confidentiality, integrity, and authentication.
4.1. IP Proxy Handling
Upon receiving an IP proxying request:
* If the recipient is configured to use another HTTP server, it will
act as an intermediary by forwarding the request to the other HTTP
server. Note that such intermediaries may need to re-encode the
request if they forward it using a version of HTTP that is
different from the one used to receive it, as the request encoding
differs by version (see below).
* Otherwise, the recipient will act as an IP proxy. The IP proxy
can choose to reject the IP proxying request. Otherwise, it
extracts the optional "target" and "ipproto" variables from the
URI it has reconstructed from the request headers, decodes their
percent-encoding, and establishes an IP tunnel.
IP proxies MUST validate whether the decoded "target" and "ipproto"
variables meet the requirements in Section 4.6. If they do not, the
IP proxy MUST treat the request as malformed; see Section 8.1.1 of
[HTTP/2] and Section 4.1.2 of [HTTP/3]. If the "target" variable is
a DNS name, the IP proxy MUST perform DNS resolution (to obtain the
corresponding IPv4 and/or IPv6 addresses via A and/or AAAA records)
before replying to the HTTP request. If errors occur during this
process, the IP proxy MUST reject the request and SHOULD send details
using an appropriate Proxy-Status header field [PROXY-STATUS]. For
example, if DNS resolution returns an error, the proxy can use the
dns_error proxy error type from Section 2.3.2 of [PROXY-STATUS].
The lifetime of the IP forwarding tunnel is tied to the IP proxying
request stream. The IP proxy MUST maintain all IP address and route
assignments associated with the IP forwarding tunnel while the
request stream is open. IP proxies MAY choose to tear down the
tunnel due to a period of inactivity, but they MUST close the request
stream when doing so.
A successful IP proxying response (as defined in Sections 4.3 and
4.5) indicates that the IP proxy has established an IP tunnel and is
willing to proxy IP payloads. Any response other than a successful
IP proxying response indicates that the request has failed; thus, the
client MUST abort the request.
Along with a successful IP proxying response, the IP proxy can send
capsules to assign addresses and advertise routes to the client
(Section 4.7). The client can also assign addresses and advertise
routes to the IP proxy for network-to-network routing.
4.2. HTTP/1.1 Request
When using HTTP/1.1 [HTTP/1.1], an IP proxying request will meet the
following requirements:
* The method SHALL be "GET".
* The request SHALL include a single Host header field containing
the host and optional port of the IP proxy.
* The request SHALL include a Connection header field with value
"Upgrade" (note that this requirement is case-insensitive, as per
Section 7.6.1 of [HTTP]).
* The request SHALL include an Upgrade header field with value
"connect-ip".
An IP proxying request that does not conform to these restrictions is
malformed. The recipient of such a malformed request MUST respond
with an error and SHOULD use the 400 (Bad Request) status code.
For example, if the client is configured with URI Template
"https://example.org/.well-known/masque/ip/{target}/{ipproto}/" and
wishes to open an IP forwarding tunnel with no target or protocol
limitations, it could send the following request:
GET https://example.org/.well-known/masque/ip/*/*/ HTTP/1.1
Host: example.org
Connection: Upgrade
Upgrade: connect-ip
Capsule-Protocol: ?1
Figure 2: Example HTTP/1.1 Request
4.3. HTTP/1.1 Response
The server indicates a successful IP proxying response by replying
with the following requirements:
* The HTTP status code on the response SHALL be 101 (Switching
Protocols).
* The response SHALL include a Connection header field with value
"Upgrade" (note that this requirement is case-insensitive, as per
Section 7.6.1 of [HTTP]).
* The response SHALL include a single Upgrade header field with
value "connect-ip".
* The response SHALL meet the requirements of HTTP responses that
start the Capsule Protocol; see Section 3.2 of [HTTP-DGRAM].
If any of these requirements are not met, the client MUST treat this
proxying attempt as failed and close the connection.
For example, the server could respond with:
HTTP/1.1 101 Switching Protocols
Connection: Upgrade
Upgrade: connect-ip
Capsule-Protocol: ?1
Figure 3: Example HTTP/1.1 Response
4.4. HTTP/2 and HTTP/3 Requests
When using HTTP/2 [HTTP/2] or HTTP/3 [HTTP/3], IP proxying requests
use HTTP Extended CONNECT. This requires that servers send an HTTP
Setting, as specified in [EXT-CONNECT2] and [EXT-CONNECT3], and that
requests use HTTP pseudo-header fields with the following
requirements:
* The :method pseudo-header field SHALL be "CONNECT".
* The :protocol pseudo-header field SHALL be "connect-ip".
* The :authority pseudo-header field SHALL contain the authority of
the IP proxy.
* The :path and :scheme pseudo-header fields SHALL NOT be empty.
Their values SHALL contain the scheme and path from the URI
Template after the URI Template expansion process has been
completed; see Section 3. Variables in the URI Template can
determine the scope of the request, such as requesting full-tunnel
IP packet forwarding, or a specific proxied flow; see Section 4.6.
An IP proxying request that does not conform to these restrictions is
malformed; see Section 8.1.1 of [HTTP/2] and Section 4.1.2 of
[HTTP/3].
For example, if the client is configured with URI Template
"https://example.org/.well-known/masque/ip/{target}/{ipproto}/" and
wishes to open an IP forwarding tunnel with no target or protocol
limitations, it could send the following request:
HEADERS
:method = CONNECT
:protocol = connect-ip
:scheme = https
:path = /.well-known/masque/ip/*/*/
:authority = example.org
capsule-protocol = ?1
Figure 4: Example HTTP/2 or HTTP/3 Request
4.5. HTTP/2 and HTTP/3 Responses
The server indicates a successful IP proxying response by replying
with the following requirements:
* The HTTP status code on the response SHALL be in the 2xx
(Successful) range.
* The response SHALL meet the requirements of HTTP responses that
start the Capsule Protocol; see Section 3.2 of [HTTP-DGRAM].
If any of these requirements are not met, the client MUST treat this
proxying attempt as failed and abort the request. As an example, any
status code in the 3xx range will be treated as a failure and cause
the client to abort the request.
For example, the server could respond with:
HEADERS
:status = 200
capsule-protocol = ?1
Figure 5: Example HTTP/2 or HTTP/3 Response
4.6. Limiting Request Scope
Unlike UDP proxying requests, which require specifying a target host,
IP proxying requests can allow endpoints to send arbitrary IP packets
to any host. The client can choose to restrict a given request to a
specific IP prefix or IP protocol by adding parameters to its
request. When the IP proxy knows that a request is scoped to a
target prefix or protocol, it can leverage this information to
optimize its resource allocation; for example, the IP proxy can
assign the same public IP address to two IP proxying requests that
are scoped to different prefixes and/or different protocols.
The scope of the request is indicated by the client to the IP proxy
via the "target" and "ipproto" variables of the URI Template; see
Section 3. Both the "target" and "ipproto" variables are optional;
if they are not included, they are considered to carry the wildcard
value "*".
target:
The variable "target" contains a hostname or IP prefix of a
specific host to which the client wants to proxy packets. If the
"target" variable is not specified or its value is "*", the client
is requesting to communicate with any allowable host. "target"
supports using DNS names, IPv6 prefixes, and IPv4 prefixes. Note
that IPv6 scoped addressing zone identifiers [IPv6-ZONE-ID] are
not supported. If the target is an IP prefix (IP address
optionally followed by a percent-encoded slash followed by the
prefix length in bits), the request will only support a single IP
version. If the target is a hostname, the IP proxy is expected to
perform DNS resolution to determine which route(s) to advertise to
the client. The IP proxy SHOULD send a ROUTE_ADVERTISEMENT
capsule that includes routes for all addresses that were resolved
for the requested hostname, that are accessible to the IP proxy,
and belong to an address family for which the IP proxy also sends
an Assigned Address.
ipproto:
The variable "ipproto" contains an Internet Protocol Number; see
the defined list in the "Assigned Internet Protocol Numbers" IANA
registry [IANA-PN]. If present, it specifies that a client only
wants to proxy a specific IP protocol for this request. If the
value is "*", or the variable is not included, the client is
requesting to use any IP protocol. The IP protocol indicated in
the "ipproto" variable represents an allowable next header value
carried in IP headers that are directly sent in HTTP Datagrams
(the outermost IP headers). ICMP traffic is always allowed,
regardless of the value of this field.
Using the terms IPv6address, IPv4address, and reg-name from [URI],
the "target" and "ipproto" variables MUST adhere to the format in
Figure 6, using notation from [ABNF]. Additionally:
* If "target" contains an IPv6 literal or prefix, the colons (":")
MUST be percent-encoded. For example, if the target host is
"2001:db8::42", it will be encoded in the URI as
"2001%3Adb8%3A%3A42".
* If present, the IP prefix length in "target" SHALL be preceded by
a percent-encoded slash ("/"): "%2F". The IP prefix length MUST
represent a decimal integer between 0 and the length of the IP
address in bits, inclusive.
* If "target" contains an IP prefix and the prefix length is
strictly less than the length of the IP address in bits, the lower
bits of the IP address that are not covered by the prefix length
MUST all be set to 0.
* "ipproto" MUST represent a decimal integer between 0 and 255
inclusive or the wildcard value "*".
target = IPv6prefix / IPv4prefix / reg-name / "*"
IPv6prefix = IPv6address ["%2F" 1*3DIGIT]
IPv4prefix = IPv4address ["%2F" 1*2DIGIT]
ipproto = 1*3DIGIT / "*"
Figure 6: URI Template Variable Format
IP proxies MAY perform access control using the scoping information
provided by the client, i.e., if the client is not authorized to
access any of the destinations included in the scope, then the IP
proxy can immediately reject the request.
4.7. Capsules
This document defines multiple new capsule types that allow endpoints
to exchange IP configuration information. Both endpoints MAY send
any number of these new capsules.
4.7.1. ADDRESS_ASSIGN Capsule
The ADDRESS_ASSIGN capsule (capsule type 0x01) allows an endpoint to
assign its peer a list of IP addresses or prefixes. Every capsule
contains the full list of IP prefixes currently assigned to the
receiver. Any of these addresses can be used as the source address
on IP packets originated by the receiver of this capsule.
ADDRESS_ASSIGN Capsule {
Type (i) = 0x01,
Length (i),
Assigned Address (..) ...,
}
Figure 7: ADDRESS_ASSIGN Capsule Format
The ADDRESS_ASSIGN capsule contains a sequence of zero or more
Assigned Addresses.
Assigned Address {
Request ID (i),
IP Version (8),
IP Address (32..128),
IP Prefix Length (8),
}
Figure 8: Assigned Address Format
Each Assigned Address contains the following fields:
Request ID:
Request identifier, encoded as a variable-length integer. If this
address assignment is in response to an Address Request (see
Section 4.7.2), then this field SHALL contain the value of the
corresponding field in the request. Otherwise, this field SHALL
be zero.
IP Version:
IP Version of this address assignment, encoded as an unsigned
8-bit integer. It MUST be either 4 or 6.
IP Address:
Assigned IP address. If the IP Version field has value 4, the IP
Address field SHALL have a length of 32 bits. If the IP Version
field has value 6, the IP Address field SHALL have a length of 128
bits.
IP Prefix Length:
The number of bits in the IP address that are used to define the
prefix that is being assigned, encoded as an unsigned 8-bit
integer. This MUST be less than or equal to the length of the IP
Address field in bits. If the prefix length is equal to the
length of the IP address, the receiver of this capsule is allowed
to send packets from a single source address. If the prefix
length is less than the length of the IP address, the receiver of
this capsule is allowed to send packets from any source address
that falls within the prefix. If the prefix length is strictly
less than the length of the IP address in bits, the lower bits of
the IP Address field that are not covered by the prefix length
MUST all be set to 0.
If any of the capsule fields are malformed upon reception, the
receiver of the capsule MUST follow the error-handling procedure
defined in Section 3.3 of [HTTP-DGRAM].
If an ADDRESS_ASSIGN capsule does not contain an address that was
previously transmitted in another ADDRESS_ASSIGN capsule, it
indicates that the address has been removed. An ADDRESS_ASSIGN
capsule can also be empty, indicating that all addresses have been
removed.
In some deployments of IP proxying in HTTP, an endpoint needs to be
assigned an address by its peer before it knows what source address
to set on its own packets. For example, in the remote access VPN
case (Section 8.1), the client cannot send IP packets until it knows
what address to use. In these deployments, the endpoint that is
expecting an address assignment MUST send an ADDRESS_REQUEST capsule.
This isn't required if the endpoint does not need any address
assignment, for example, when it is configured out-of-band with
static addresses.
While ADDRESS_ASSIGN capsules are commonly sent in response to
ADDRESS_REQUEST capsules, endpoints MAY send ADDRESS_ASSIGN capsules
unprompted.
4.7.2. ADDRESS_REQUEST Capsule
The ADDRESS_REQUEST capsule (capsule type 0x02) allows an endpoint to
request assignment of IP addresses from its peer. The capsule allows
the endpoint to optionally indicate a preference for which address it
would get assigned.
ADDRESS_REQUEST Capsule {
Type (i) = 0x02,
Length (i),
Requested Address (..) ...,
}
Figure 9: ADDRESS_REQUEST Capsule Format
The ADDRESS_REQUEST capsule contains a sequence of one or more
Requested Addresses.
Requested Address {
Request ID (i),
IP Version (8),
IP Address (32..128),
IP Prefix Length (8),
}
Figure 10: Requested Address Format
Each Requested Address contains the following fields:
Request ID:
Request identifier, encoded as a variable-length integer. This is
the identifier of this specific address request. Each request
from a given endpoint carries a different identifier. Request IDs
MUST NOT be reused by an endpoint and MUST NOT be zero.
IP Version:
IP Version of this address request, encoded as an unsigned 8-bit
integer. It MUST be either 4 or 6.
IP Address:
Requested IP address. If the IP Version field has value 4, the IP
Address field SHALL have a length of 32 bits. If the IP Version
field has value 6, the IP Address field SHALL have a length of 128
bits.
IP Prefix Length:
Length of the IP Prefix requested in bits, encoded as an unsigned
8-bit integer. It MUST be less than or equal to the length of the
IP Address field in bits. If the prefix length is strictly less
than the length of the IP address in bits, the lower bits of the
IP Address field that are not covered by the prefix length MUST
all be set to 0.
If the IP address is all-zero (0.0.0.0 or ::), this indicates that
the sender is requesting an address of that address family but does
not have a preference for a specific address. In that scenario, the
prefix length still indicates the sender's preference for the prefix
length it is requesting.
If any of the capsule fields are malformed upon reception, the
receiver of the capsule MUST follow the error-handling procedure
defined in Section 3.3 of [HTTP-DGRAM].
Upon receiving the ADDRESS_REQUEST capsule, an endpoint SHOULD assign
one or more IP addresses to its peer and then respond with an
ADDRESS_ASSIGN capsule to inform the peer of the assignment. For
each Requested Address, the receiver of the ADDRESS_REQUEST capsule
SHALL respond with an Assigned Address with a matching Request ID.
If the requested address was assigned, the IP Address and IP Prefix
Length fields in the Assigned Address response SHALL be set to the
assigned values. If the requested address was not assigned, the IP
address SHALL be all-zero, and the IP Prefix Length SHALL be the
maximum length (0.0.0.0/32 or ::/128) to indicate that no address was
assigned. These address rejections SHOULD NOT be included in
subsequent ADDRESS_ASSIGN capsules. Note that other Assigned Address
entries that do not correspond to any Request ID can also be
contained in the same ADDRESS_ASSIGN response.
If an endpoint receives an ADDRESS_REQUEST capsule that contains zero
Requested Addresses, it MUST abort the IP proxying request stream.
Note that the ordering of Requested Addresses does not carry any
semantics. Similarly, the Request ID is only meant as a unique
identifier; it does not convey any priority or importance.
4.7.3. ROUTE_ADVERTISEMENT Capsule
The ROUTE_ADVERTISEMENT capsule (capsule type 0x03) allows an
endpoint to communicate to its peer that it is willing to route
traffic to a set of IP address ranges. This indicates that the
sender has an existing route to each address range and notifies its
peer that, if the receiver of the ROUTE_ADVERTISEMENT capsule sends
IP packets for one of these ranges in HTTP Datagrams, the sender of
the capsule will forward them along its preexisting route. Any
address that is in one of the address ranges can be used as the
destination address on IP packets originated by the receiver of this
capsule.
ROUTE_ADVERTISEMENT Capsule {
Type (i) = 0x03,
Length (i),
IP Address Range (..) ...,
}
Figure 11: ROUTE_ADVERTISEMENT Capsule Format
The ROUTE_ADVERTISEMENT capsule contains a sequence of zero or more
IP Address Ranges.
IP Address Range {
IP Version (8),
Start IP Address (32..128),
End IP Address (32..128),
IP Protocol (8),
}
Figure 12: IP Address Range Format
Each IP Address Range contains the following fields:
IP Version:
IP Version of this range, encoded as an unsigned 8-bit integer.
It MUST be either 4 or 6.
Start IP Address and End IP Address:
Inclusive start and end IP address of the advertised range. If
the IP Version field has value 4, these fields SHALL have a length
of 32 bits. If the IP Version field has value 6, these fields
SHALL have a length of 128 bits. The Start IP Address MUST be
less than or equal to the End IP Address.
IP Protocol:
The Internet Protocol Number for traffic that can be sent to this
range, encoded as an unsigned 8-bit integer. If the value is 0,
all protocols are allowed. If the value is not 0, it represents
an allowable next header value carried in IP headers that are sent
directly in HTTP Datagrams (the outermost IP headers). ICMP
traffic is always allowed, regardless of the value of this field.
If any of the capsule fields are malformed upon reception, the
receiver of the capsule MUST follow the error-handling procedure
defined in Section 3.3 of [HTTP-DGRAM].
Upon receiving the ROUTE_ADVERTISEMENT capsule, an endpoint MAY
update its local state regarding what its peer is willing to route
(subject to local policy), such as by installing entries in a routing
table.
Each ROUTE_ADVERTISEMENT contains the full list of address ranges.
If multiple ROUTE_ADVERTISEMENT capsules are sent in one direction,
each ROUTE_ADVERTISEMENT capsule supersedes prior ones. In other
words, if a given address range was present in a prior capsule but
the most recently received ROUTE_ADVERTISEMENT capsule does not
contain it, the receiver will consider that range withdrawn.
If multiple ranges using the same IP protocol were to overlap, some
routing table implementations might reject them. To prevent overlap,
the ranges are ordered; this places the burden on the sender and
makes verification by the receiver much simpler. If an IP Address
Range A precedes an IP Address Range B in the same
ROUTE_ADVERTISEMENT capsule, they MUST follow these requirements:
* The IP Version of A MUST be less than or equal to the IP Version
of B.
* If the IP Version of A and B are equal, the IP Protocol of A MUST
be less than or equal to the IP Protocol of B.
* If the IP Version and IP Protocol of A and B are both equal, the
End IP Address of A MUST be strictly less than the Start IP
Address of B.
If an endpoint receives a ROUTE_ADVERTISEMENT capsule that does not
meet these requirements, it MUST abort the IP proxying request
stream.
Since setting the IP protocol to zero indicates all protocols are
allowed, the requirements above make it possible for two routes to
overlap when one has its IP protocol set to zero and the other has it
set to non-zero. Endpoints MUST NOT send a ROUTE_ADVERTISEMENT
capsule with routes that overlap in such a way. Validating this
requirement is OPTIONAL, but if an endpoint detects the violation, it
MUST abort the IP proxying request stream.
4.8. IPv6 Extension Headers
Both request scoping (see Section 4.6) and the ROUTE_ADVERTISEMENT
capsule (see Section 4.7.3) use Internet Protocol Numbers. These
numbers represent both upper layers (as defined in Section 2 of
[IPv6], with examples that include TCP and UDP) and IPv6 extension
headers (as defined in Section 4 of [IPv6], with examples that
include Fragment and Options headers). IP proxies MAY reject
requests to scope to protocol numbers that are used for extension
headers. Upon receiving packets, implementations that support
scoping or routing by Internet Protocol Number MUST walk the chain of
extensions to find the outermost non-extension Internet Protocol
Number to match against the scoping rule. Note that the
ROUTE_ADVERTISEMENT capsule uses Internet Protocol Number 0 to
indicate that all protocols are allowed; it does not restrict the
route to the IPv6 Hop-by-Hop Options header (Section 4.3 of [IPv6]).
5. Context Identifiers
The mechanism for proxying IP in HTTP defined in this document allows
future extensions to exchange HTTP Datagrams that carry different
semantics from IP payloads. Some of these extensions can augment IP
payloads with additional data or compress IP header fields, while
others can exchange data that is completely separate from IP
payloads. In order to accomplish this, all HTTP Datagrams associated
with IP proxying request streams start with a Context ID field; see
Section 6.
Context IDs are 62-bit integers (0 to 2^62-1). Context IDs are
encoded as variable-length integers; see Section 16 of [QUIC]. The
Context ID value of 0 is reserved for IP payloads, while non-zero
values are dynamically allocated. Non-zero even-numbered Context IDs
are client-allocated, and odd-numbered Context IDs are proxy-
allocated. The Context ID namespace is tied to a given HTTP request;
it is possible for a Context ID with the same numeric value to be
simultaneously allocated in distinct requests, potentially with
different semantics. Context IDs MUST NOT be re-allocated within a
given HTTP request but MAY be allocated in any order. The Context ID
allocation restrictions to the use of even-numbered and odd-numbered
Context IDs exist in order to avoid the need for synchronization
between endpoints. However, once a Context ID has been allocated,
those restrictions do not apply to the use of the Context ID; it can
be used by either the client or the IP proxy, independent of which
endpoint initially allocated it.
Registration is the action by which an endpoint informs its peer of
the semantics and format of a given Context ID. This document does
not define how registration occurs. Future extensions MAY use HTTP
header fields or capsules to register Context IDs. Depending on the
method being used, it is possible for datagrams to be received with
Context IDs that have not yet been registered. For instance, this
can be due to reordering of the packet containing the datagram and
the packet containing the registration message during transmission.
6. HTTP Datagram Payload Format
When associated with IP proxying request streams, the HTTP Datagram
Payload field of HTTP Datagrams (see [HTTP-DGRAM]) has the format
defined in Figure 13. Note that, when HTTP Datagrams are encoded
using QUIC DATAGRAM frames, the Context ID field defined below
directly follows the Quarter Stream ID field that is at the start of
the QUIC DATAGRAM frame payload:
IP Proxying HTTP Datagram Payload {
Context ID (i),
Payload (..),
}
Figure 13: IP Proxying HTTP Datagram Format
The IP Proxying HTTP Datagram Payload contains the following fields:
Context ID:
A variable-length integer that contains the value of the Context
ID. If an HTTP/3 datagram that carries an unknown Context ID is
received, the receiver SHALL either drop that datagram silently or
buffer it temporarily (on the order of a round trip) while
awaiting the registration of the corresponding Context ID.
Payload:
The payload of the datagram, whose semantics depend on value of
the previous field. Note that this field can be empty.
IP packets are encoded using HTTP Datagrams with the Context ID set
to zero. When the Context ID is set to zero, the Payload field
contains a full IP packet (from the IP Version field until the last
byte of the IP payload).
7. IP Packet Handling
This document defines a tunneling mechanism that is conceptually an
IP link. However, because links are attached to IP routers,
implementations might need to handle some of the responsibilities of
IP routers if they do not delegate them to another implementation,
such as a kernel.
7.1. Link Operation
The IP forwarding tunnels described in this document are not fully
featured "interfaces" in the IPv6 addressing architecture sense
[IPv6-ADDR]. In particular, they do not necessarily have IPv6 link-
local addresses. Additionally, IPv6 stateless autoconfiguration or
router advertisement messages are not used in such interfaces, and
neither is neighbor discovery.
When using HTTP/2 or HTTP/3, a client MAY optimistically start
sending proxied IP packets before receiving the response to its IP
proxying request, noting however that those may not be processed by
the IP proxy if it responds to the request with a failure or if the
datagrams are received by the IP proxy before the request. Since
receiving addresses and routes is required in order to know that a
packet can be sent through the tunnel, such optimistic packets might
be dropped by the IP proxy if it chooses to provide different
addressing or routing information than what the client assumed.
Note that it is possible for multiple proxied IP packets to be
encapsulated in the same outer packet, for example, because a QUIC
packet can carry more than one QUIC DATAGRAM frame. It is also
possible for a proxied IP packet to span multiple outer packets,
because a DATAGRAM capsule can be split across multiple QUIC or TCP
packets.
7.2. Routing Operation
The requirements in this section are a repetition of requirements
that apply to IP routers in general and might not apply to
implementations of IP proxying that rely on external software for
routing.
When an endpoint receives an HTTP Datagram containing an IP packet,
it will parse the packet's IP header, perform any local policy checks
(e.g., source address validation), check their routing table to pick
an outbound interface, and then send the IP packet on that interface
or pass it to a local application. The endpoint can also choose to
drop any received packets instead of forwarding them. If a received
IP packet fails any correctness or policy checks, that is a
forwarding error, not a protocol violation, as far as IP proxying is
concerned; see Section 7.2.1. IP proxying endpoints MAY implement
additional filtering policies on the IP packets they forward.
In the other direction, when an endpoint receives an IP packet, it
checks to see if the packet matches the routes mapped for an IP
tunnel and performs the same forwarding checks as above before
transmitting the packet over HTTP Datagrams.
When IP proxying endpoints forward IP packets between different
links, they will decrement the IP Hop Count (or TTL) upon
encapsulation but not upon decapsulation. In other words, the Hop
Count is decremented right before an IP packet is transmitted in an
HTTP Datagram. This prevents infinite loops in the presence of
routing loops and matches the choices in IPsec [IPSEC]. This does
not apply to IP packets generated by the IP proxying endpoint itself.
Implementers need to ensure that they do not forward any link-local
traffic beyond the IP proxying interface that it was received on. IP
proxying endpoints also need to properly reply to packets destined to
link-local multicast addresses.
IPv6 requires that every link have an MTU of at least 1280 bytes
[IPv6]. Since IP proxying in HTTP conveys IP packets in HTTP
Datagrams and those can in turn be sent in QUIC DATAGRAM frames that
cannot be fragmented [DGRAM], the MTU of an IP tunnel can be limited
by the MTU of the QUIC connection that IP proxying is operating over.
This can lead to situations where the IPv6 minimum link MTU is
violated. IP proxying endpoints that operate as routers and support
IPv6 MUST ensure that the IP tunnel link MTU is at least 1280 bytes
(i.e., that they can send HTTP Datagrams with payloads of at least
1280 bytes). This can be accomplished using various techniques:
* If both IP proxying endpoints know for certain that HTTP
intermediaries are not in use, the endpoints can pad the QUIC
INITIAL packets of the outer QUIC connection that IP proxying is
running over. (Assuming QUIC version 1 is in use, the overhead is
1 byte for the type, 20 bytes for the maximal connection ID
length, 4 bytes for the maximal packet number length, 1 byte for
the DATAGRAM frame type, 8 bytes for the maximal Quarter Stream
ID, 1 byte for the zero Context ID, and 16 bytes for the
Authenticated Encryption with Associated Data (AEAD)
authentication tag, for a total of 51 bytes of overhead, which
corresponds to padding QUIC INITIAL packets to 1331 bytes or
more.)
* IP proxying endpoints can also send ICMPv6 echo requests with 1232
bytes of data to ascertain the link MTU and tear down the tunnel
if they do not receive a response. Unless endpoints have an out-
of-band means of guaranteeing that the previous techniques are
sufficient, they MUST use this method. If an endpoint does not
know an IPv6 address of its peer, it can send the ICMPv6 echo
request to the link-local all nodes multicast address (ff02::1).
If an endpoint is using QUIC DATAGRAM frames to convey IPv6 packets
and it detects that the QUIC MTU is too low to allow sending 1280
bytes, it MUST abort the IP proxying request stream.
7.2.1. Error Signalling
Since IP proxying endpoints often forward IP packets onwards to other
network interfaces, they need to handle errors in the forwarding
process. For example, forwarding can fail if the endpoint does not
have a route for the destination address, if it is configured to
reject a destination prefix by policy, or if the MTU of the outgoing
link is lower than the size of the packet to be forwarded. In such
scenarios, IP proxying endpoints SHOULD use ICMP [ICMP] [ICMPv6] to
signal the forwarding error to its peer by generating ICMP packets
and sending them using HTTP Datagrams.
Endpoints are free to select the most appropriate ICMP errors to
send. Some examples that are relevant for IP proxying include the
following:
* For invalid source addresses, send Destination Unreachable
(Section 3.1 of [ICMPv6]) with code 5, "Source address failed
ingress/egress policy".
* For unroutable destination addresses, send Destination Unreachable
(Section 3.1 of [ICMPv6]) with code 0, "No route to destination",
or code 1, "Communication with destination administratively
prohibited".
* For packets that cannot fit within the MTU of the outgoing link,
send Packet Too Big (Section 3.2 of [ICMPv6]).
In order to receive these errors, endpoints need to be prepared to
receive ICMP packets. If an endpoint does not send
ROUTE_ADVERTISEMENT capsules, such as a client opening an IP flow
through an IP proxy, it SHOULD process proxied ICMP packets from its
peer in order to receive these errors. Note that ICMP messages can
originate from a source address different from that of the IP
proxying peer and also from outside the target if scoping is in use
(see Section 4.6).
8. Examples
IP proxying in HTTP enables many different use cases that can benefit
from IP packet proxying and tunnelling. These examples are provided
to help illustrate some of the ways in which IP proxying in HTTP can
be used.
8.1. Remote Access VPN
The following example shows a point-to-network VPN setup, where a
client receives a set of local addresses and can send to any remote
host through the IP proxy. Such VPN setups can be either full-tunnel
or split-tunnel.
+--------+ IP A IP B +--------+ +---> IP D
| +--------------------+ IP | IP C |
| Client | IP Subnet C <--> ? | Proxy +-----------+---> IP E
| +--------------------+ | |
+--------+ +--------+ +---> IP ...
Figure 14: VPN Tunnel Setup
In this case, the client does not specify any scope in its request.
The IP proxy assigns the client an IPv4 address (192.0.2.11) and a
full-tunnel route of all IPv4 addresses (0.0.0.0/0). The client can
then send to any IPv4 host using its assigned address as its source
address.
[[ From Client ]] [[ From IP Proxy ]]
SETTINGS
H3_DATAGRAM = 1
SETTINGS
ENABLE_CONNECT_PROTOCOL = 1
H3_DATAGRAM = 1
STREAM(44): HEADERS
:method = CONNECT
:protocol = connect-ip
:scheme = https
:path = /vpn
:authority = proxy.example.com
capsule-protocol = ?1
STREAM(44): HEADERS
:status = 200
capsule-protocol = ?1
STREAM(44): DATA
Capsule Type = ADDRESS_REQUEST
(Request ID = 1
IP Version = 4
IP Address = 0.0.0.0
IP Prefix Length = 32)
STREAM(44): DATA
Capsule Type = ADDRESS_ASSIGN
(Request ID = 1
IP Version = 4
IP Address = 192.0.2.11
IP Prefix Length = 32)
STREAM(44): DATA
Capsule Type = ROUTE_ADVERTISEMENT
(IP Version = 4
Start IP Address = 0.0.0.0
End IP Address = 255.255.255.255
IP Protocol = 0) // Any
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated IP Packet
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated IP Packet
Figure 15: VPN Full-Tunnel Example
A setup for a split-tunnel VPN (the case where the client can only
access a specific set of private subnets) is quite similar. In this
case, the advertised route is restricted to 192.0.2.0/24, rather than
0.0.0.0/0.
[[ From Client ]] [[ From IP Proxy ]]
STREAM(44): DATA
Capsule Type = ADDRESS_ASSIGN
(Request ID = 0
IP Version = 4
IP Address = 192.0.2.42
IP Prefix Length = 32)
STREAM(44): DATA
Capsule Type = ROUTE_ADVERTISEMENT
(IP Version = 4
Start IP Address = 192.0.2.0
End IP Address = 192.0.2.41
IP Protocol = 0) // Any
(IP Version = 4
Start IP Address = 192.0.2.43
End IP Address = 192.0.2.255
IP Protocol = 0) // Any
Figure 16: VPN Split-Tunnel Example
8.2. Site-to-Site VPN
The following example shows how to connect a branch office network to
a corporate network such that all machines on those networks can
communicate. In this example, the IP proxying client is attached to
the branch office network 192.0.2.0/24, and the IP proxy is attached
to the corporate network 203.0.113.0/24. There are legacy clients on
the branch office network that only allow maintenance requests from
machines on their subnet, so the IP proxy is provisioned with an IP
address from that subnet.
192.0.2.1 <--+ +--------+ +-------+ +---> 203.0.113.9
| | +-------------+ IP | |
192.0.2.2 <--+---+ Client | IP Proxying | Proxy +---+---> 203.0.113.8
| | +-------------+ | |
192.0.2.3 <--+ +--------+ +-------+ +---> 203.0.113.7
Figure 17: Site-to-Site VPN Example
In this case, the client does not specify any scope in its request.
The IP proxy assigns the client an IPv4 address (203.0.113.100) and a
split-tunnel route to the corporate network (203.0.113.0/24). The
client assigns the IP proxy an IPv4 address (192.0.2.200) and a
split-tunnel route to the branch office network (192.0.2.0/24). This
allows hosts on both networks to communicate with each other and
allows the IP proxy to perform maintenance on legacy hosts in the
branch office. Note that IP proxying endpoints will decrement the IP
Hop Count (or TTL) when encapsulating forwarded packets, so protocols
that require that field be set to 255 will not function.
[[ From Client ]] [[ From IP Proxy ]]
SETTINGS
H3_DATAGRAM = 1
SETTINGS
ENABLE_CONNECT_PROTOCOL = 1
H3_DATAGRAM = 1
STREAM(44): HEADERS
:method = CONNECT
:protocol = connect-ip
:scheme = https
:path = /corp
:authority = proxy.example.com
capsule-protocol = ?1
STREAM(44): HEADERS
:status = 200
capsule-protocol = ?1
STREAM(44): DATA
Capsule Type = ADDRESS_ASSIGN
(Request ID = 0
IP Version = 4
IP Address = 192.0.2.200
IP Prefix Length = 32)
STREAM(44): DATA
Capsule Type = ROUTE_ADVERTISEMENT
(IP Version = 4
Start IP Address = 192.0.2.0
End IP Address = 192.0.2.255
IP Protocol = 0) // Any
STREAM(44): DATA
Capsule Type = ADDRESS_ASSIGN
(Request ID = 0
IP Version = 4
IP Address = 203.0.113.100
IP Prefix Length = 32)
STREAM(44): DATA
Capsule Type = ROUTE_ADVERTISEMENT
(IP Version = 4
Start IP Address = 203.0.113.0
End IP Address = 203.0.113.255
IP Protocol = 0) // Any
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated IP Packet
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated IP Packet
Figure 18: Site-to-Site VPN Capsule Example
8.3. IP Flow Forwarding
The following example shows an IP flow forwarding setup, where a
client requests to establish a forwarding tunnel to
target.example.com using the Stream Control Transmission Protocol
(SCTP) (IP protocol 132) and receives a single local address and
remote address it can use for transmitting packets. A similar
approach could be used for any other IP protocol that isn't easily
proxied with existing HTTP methods, such as ICMP, Encapsulating
Security Payload (ESP), etc.
+--------+ IP A IP B +--------+
| +-------------------+ IP | IP C
| Client | IP C <--> D | Proxy +---------> IP D
| +-------------------+ |
+--------+ +--------+
Figure 19: Proxied Flow Setup
In this case, the client specifies both a target hostname and an
Internet Protocol Number in the scope of its request, indicating that
it only needs to communicate with a single host. The IP proxy is
able to perform DNS resolution on behalf of the client and allocate a
specific outbound socket for the client instead of allocating an
entire IP address to the client. In this regard, the request is
similar to a regular CONNECT proxy request.
The IP proxy assigns a single IPv6 address to the client
(2001:db8:1234::a) and a route to a single IPv6 host
(2001:db8:3456::b) scoped to SCTP. The client can send and receive
SCTP IP packets to the remote host.
[[ From Client ]] [[ From IP Proxy ]]
SETTINGS
H3_DATAGRAM = 1
SETTINGS
ENABLE_CONNECT_PROTOCOL = 1
H3_DATAGRAM = 1
STREAM(44): HEADERS
:method = CONNECT
:protocol = connect-ip
:scheme = https
:path = /proxy?target=target.example.com&ipproto=132
:authority = proxy.example.com
capsule-protocol = ?1
STREAM(44): HEADERS
:status = 200
capsule-protocol = ?1
STREAM(44): DATA
Capsule Type = ADDRESS_ASSIGN
(Request ID = 0
IP Version = 6
IP Address = 2001:db8:1234::a
IP Prefix Length = 128)
STREAM(44): DATA
Capsule Type = ROUTE_ADVERTISEMENT
(IP Version = 6
Start IP Address = 2001:db8:3456::b
End IP Address = 2001:db8:3456::b
IP Protocol = 132)
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated SCTP/IP Packet
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated SCTP/IP Packet
Figure 20: Proxied SCTP Flow Example
8.4. Proxied Connection Racing
The following example shows a setup where a client is proxying UDP
packets through an IP proxy in order to control connection
establishment racing through an IP proxy, as defined in Happy
Eyeballs [HEv2]. This example is a variant of the proxied flow but
highlights how IP-level proxying can enable new capabilities, even
for TCP and UDP.
+--------+ IP A IP B +--------+ IP C
| +-------------------+ |<------------> IP E
| Client | IP C <--> E | IP |
| | D <--> F | Proxy |
| +-------------------+ |<------------> IP F
+--------+ +--------+ IP D
Figure 21: Proxied Connection Racing Setup
As with proxied flows, the client specifies both a target hostname
and an Internet Protocol Number in the scope of its request. When
the IP proxy performs DNS resolution on behalf of the client, it can
send the various remote address options to the client as separate
routes. It can also ensure that the client has both IPv4 and IPv6
addresses assigned.
The IP proxy assigns both an IPv4 address (192.0.2.3) and an IPv6
address (2001:db8:1234::a) to the client, as well as an IPv4 route
(198.51.100.2) and an IPv6 route (2001:db8:3456::b), which represent
the resolved addresses of the target hostname, scoped to UDP. The
client can send and receive UDP IP packets to either one of the IP
proxy addresses to enable Happy Eyeballs through the IP proxy.
[[ From Client ]] [[ From IP Proxy ]]
SETTINGS
H3_DATAGRAM = 1
SETTINGS
ENABLE_CONNECT_PROTOCOL = 1
H3_DATAGRAM = 1
STREAM(44): HEADERS
:method = CONNECT
:protocol = connect-ip
:scheme = https
:path = /proxy?target=target.example.com&ipproto=17
:authority = proxy.example.com
capsule-protocol = ?1
STREAM(44): HEADERS
:status = 200
capsule-protocol = ?1
STREAM(44): DATA
Capsule Type = ADDRESS_ASSIGN
(Request ID = 0
IP Version = 4
IP Address = 192.0.2.3
IP Prefix Length = 32),
(Request ID = 0
IP Version = 6
IP Address = 2001:db8::1234:1234
IP Prefix Length = 128)
STREAM(44): DATA
Capsule Type = ROUTE_ADVERTISEMENT
(IP Version = 4
Start IP Address = 198.51.100.2
End IP Address = 198.51.100.2
IP Protocol = 17),
(IP Version = 6
Start IP Address = 2001:db8:3456::b
End IP Address = 2001:db8:3456::b
IP Protocol = 17)
...
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated IPv6 Packet
DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated IPv4 Packet
Figure 22: Proxied Connection Racing Example
9. Extensibility Considerations
Extensions to IP proxying in HTTP can define behavior changes to this
mechanism. Such extensions SHOULD define new capsule types to
exchange configuration information if needed. It is RECOMMENDED for
extensions that modify addressing to specify that their extension
capsules be sent before the ADDRESS_ASSIGN capsule and that they do
not take effect until the ADDRESS_ASSIGN capsule is parsed. This
allows modifications to address assignment to operate atomically.
Similarly, extensions that modify routing SHOULD behave similarly
with regard to the ROUTE_ADVERTISEMENT capsule.
10. Performance Considerations
Bursty traffic can often lead to temporally correlated packet losses;
in turn, this can lead to suboptimal responses from congestion
controllers in protocols running inside the tunnel. To avoid this,
IP proxying endpoints SHOULD strive to avoid increasing burstiness of
IP traffic; they SHOULD NOT queue packets in order to increase
batching beyond the minimal amount required to take advantage of
hardware offloads.
When the protocol running inside the tunnel uses congestion control
(e.g., [TCP] or [QUIC]), the proxied traffic will incur at least two
nested congestion controllers. When tunneled packets are sent using
QUIC DATAGRAM frames, the outer HTTP connection MAY disable
congestion control for those packets that contain only QUIC DATAGRAM
frames encapsulating IP packets. Implementers will benefit from
reading the guidance in Section 3.1.11 of [UDP-USAGE].
When the protocol running inside the tunnel uses loss recovery (e.g.,
[TCP] or [QUIC]) and the outer HTTP connection runs over TCP, the
proxied traffic will incur at least two nested loss recovery
mechanisms. This can reduce performance, as both can sometimes
independently retransmit the same data. To avoid this, IP proxying
SHOULD be performed over HTTP/3 to allow leveraging the QUIC DATAGRAM
frame.
10.1. MTU Considerations
When using HTTP/3 with the QUIC Datagram extension [DGRAM], IP
packets are transmitted in QUIC DATAGRAM frames. Since these frames
cannot be fragmented, they can only carry packets up to a given
length determined by the QUIC connection configuration and the Path
MTU (PMTU). If an endpoint is using QUIC DATAGRAM frames and it
attempts to route an IP packet through the tunnel that will not fit
inside a QUIC DATAGRAM frame, the IP proxy SHOULD NOT send the IP
packet in a DATAGRAM capsule, as that defeats the end-to-end
unreliability characteristic that methods such as Datagram
Packetization Layer PMTU Discovery (DPLPMTUD) depend on [DPLPMTUD].
In this scenario, the endpoint SHOULD drop the IP packet and send an
ICMP Packet Too Big message to the sender of the dropped packet; see
Section 3.2 of [ICMPv6].
10.2. ECN Considerations
If an IP proxying endpoint with a connection containing an IP
proxying request stream disables congestion control, it cannot signal
Explicit Congestion Notification (ECN) [ECN] support on that outer
connection. That is, the QUIC sender MUST mark all IP headers with
the Not ECN-Capable Transport (Not-ECT) codepoint for QUIC packets
that are outside of congestion control. The endpoint can still
report ECN feedback via QUIC ACK_ECN frames or the TCP ECN-Echo (ECE)
bit, as the peer might not have disabled congestion control.
Conversely, if congestion control is not disabled on the outer
congestion, the guidance in [ECN-TUNNEL] about transferring ECN marks
between inner and outer IP headers does not apply because the outer
connection will react correctly to congestion notifications if it
uses ECN. The inner traffic can also use ECN, independently of
whether it is in use on the outer connection.
10.3. Differentiated Services Considerations
Tunneled IP packets can have Differentiated Services Code Points
(DSCPs) [DSCP] set in the traffic class IP header field to request a
particular per-hop behavior. If an IP proxying endpoint is
configured as part of a Differentiated Services domain, it MAY
implement traffic differentiation based on these markings. However,
the use of HTTP can limit the possibilities for differentiated
treatment of the tunneled IP packets on the path between the IP
proxying endpoints.
When an HTTP connection is congestion-controlled, marking packets
with different DSCPs can lead to reordering between them, and that
can in turn lead the underlying transport connection's congestion
controller to perform poorly. If tunneled packets are subject to
congestion control by the outer connection, they need to avoid
carrying DSCP markings that are not equivalent in forwarding behavior
to prevent this situation. In this scenario, the IP proxying
endpoint MUST NOT copy the DSCP field from the inner IP header to the
outer IP header of the packet carrying this packet. Instead, an
application would need to use separate connections to the proxy, one
for each DSCP. Note that this document does not define a way for
requests to scope to particular DSCP values; such support is left to
future extensions.
If tunneled packets use QUIC datagrams and are not subject to
congestion control by the outer connection, the IP proxying endpoints
MAY translate the DSCP field value from the tunneled traffic to the
outer IP header. IP proxying endpoints MUST NOT coalesce multiple
inner packets into the same outer packet unless they have the same
DSCP marking or an equivalent traffic class. Note that the ability
to translate DSCP values is dependent on the tunnel ingress and
egress belonging to the same Differentiated Service domain or not.
11. Security Considerations
There are significant risks in allowing arbitrary clients to
establish a tunnel that permits sending to arbitrary hosts,
regardless of whether tunnels are scoped to specific hosts or not.
Bad actors could abuse this capability to send traffic and have it
attributed to the IP proxy. HTTP servers that support IP proxying
SHOULD restrict its use to authenticated users. Depending on the
deployment, possible authentication mechanisms include mutual TLS
between IP proxying endpoints, HTTP-based authentication via the HTTP
Authorization header [HTTP], or even bearer tokens. Proxies can
enforce policies for authenticated users to further constrain client
behavior or deal with possible abuse. For example, proxies can rate
limit individual clients that send an excessively large amount of
traffic through the proxy. As another example, proxies can restrict
address (prefix) assignment to clients based on certain client
attributes, such as geographic location.
Address assignment can have privacy implications for endpoints. For
example, if a proxy partitions its address space by the number of
authenticated clients and then assigns distinct address ranges to
each client, target hosts could use this information to determine
when IP packets correspond to the same client. Avoiding such
tracking vectors may be important for certain proxy deployments.
Proxies SHOULD avoid persistent per-client address (prefix)
assignment when possible.
Falsifying IP source addresses in sent traffic has been common for
denial-of-service attacks. Implementations of this mechanism need to
ensure that they do not facilitate such attacks. In particular,
there are scenarios where an endpoint knows that its peer is only
allowed to send IP packets from a given prefix. For example, that
can happen through out-of-band configuration information or when
allowed prefixes are shared via ADDRESS_ASSIGN capsules. In such
scenarios, endpoints MUST follow the recommendations from [BCP38] to
prevent source address spoofing.
Limiting request scope (see Section 4.6) allows two clients to share
one of the proxy's external IP addresses if their requests are scoped
to different Internet Protocol Numbers. If the proxy receives an
ICMP packet destined for that external IP address, it has the option
to forward it back to the clients. However, some of these ICMP
packets carry part of the original IP packet that triggered the ICMP
response. Forwarding such packets can accidentally divulge
information about one client's traffic to another client. To avoid
this, proxies that forward ICMP on shared external IP addresses MUST
inspect the invoking packet included in the ICMP packet and only
forward the ICMP packet to the client whose scoping matches the
invoking packet.
Implementers will benefit from reading the guidance in
[TUNNEL-SECURITY]. Since there are known risks with some IPv6
extension headers (e.g., [ROUTING-HDR]), implementers need to follow
the latest guidance regarding handling of IPv6 extension headers.
Transferring DSCP markings from inner to outer packets (see
Section 10.3) exposes end-to-end flow level information to an on-path
observer between the IP proxying endpoints. This can potentially
expose a single end-to-end flow. Because of this, such use of DSCPs
in privacy-sensitive contexts is NOT RECOMMENDED.
Opportunistic sending of IP packets (see Section 7.1) is not allowed
in HTTP/1.x because a server could reject the HTTP Upgrade and
attempt to parse the IP packets as a subsequent HTTP request,
allowing request smuggling attacks; see [OPTIMISTIC]. In particular,
an intermediary that re-encodes a request from HTTP/2 or 3 to
HTTP/1.1 MUST NOT forward any received capsules until it has parsed a
successful IP proxying response.
12. IANA Considerations
12.1. HTTP Upgrade Token Registration
IANA has registered "connect-ip" in the "HTTP Upgrade Tokens"
registry maintained at <https://www.iana.org/assignments/http-
upgrade-tokens>.
Value: connect-ip
Description: Proxying of IP Payloads
Expected Version Tokens: None
References: RFC 9484
12.2. MASQUE URI Suffixes Registry Creation
IANA has created the "MASQUE URI Suffixes" registry maintained at
<https://www.iana.org/assignments/masque>. The registration policy
is Expert Review; see Section 4.5 of [IANA-POLICY]. This new
registry governs the path segment that immediately follows "masque"
in paths that start with "/.well-known/masque/"; see
<https://www.iana.org/assignments/well-known-uris> for the
registration of "masque" in the "Well-Known URIs" registry.
This new registry contains three columns:
Path Segment: An ASCII string containing only characters allowed in
tokens; see Section 5.6.2 of [HTTP]. Entries in this registry
MUST all have distinct entries in this column.
Description: A description of the entry.
Reference: An optional reference defining the use of the entry.
The registry's initial entries are as follows:
+==============+==============+===========+
| Path Segment | Description | Reference |
+==============+==============+===========+
| udp | UDP Proxying | RFC 9298 |
+--------------+--------------+-----------+
| ip | IP Proxying | RFC 9484 |
+--------------+--------------+-----------+
Table 1: MASQUE URI Suffixes Registry
Designated experts for this registry are advised that they should
approve all requests as long as the expert believes that both (1) the
requested Path Segment will not conflict with existing or expected
future IETF work and (2) the use case is relevant to proxying.
12.3. Updates to masque Well-Known URI Registration
IANA has updated the entry for the "masque" URI suffix in the "Well-
Known URIs" registry maintained at <https://www.iana.org/assignments/
well-known-uris>.
IANA has updated the "Reference" field to include this document and
has replaced the "Related Information" field with "For sub-suffix
allocations, see the registry at <https://www.iana.org/assignments/
masque>.".
12.4. HTTP Capsule Types Registrations
IANA has added the following values to the "HTTP Capsule Types"
registry maintained at <https://www.iana.org/assignments/masque>.
+=======+=====================+
| Value | Capsule Type |
+=======+=====================+
| 0x01 | ADDRESS_ASSIGN |
+-------+---------------------+
| 0x02 | ADDRESS_REQUEST |
+-------+---------------------+
| 0x03 | ROUTE_ADVERTISEMENT |
+-------+---------------------+
Table 2: New Capsules
All of these new entries use the following values for these fields:
Status: permanent
Reference: RFC 9484
Change Controller: IETF
Contact: masque@ietf.org
Notes: None
13. References
13.1. Normative References
[ABNF] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
Specifications: ABNF", STD 68, RFC 5234,
DOI 10.17487/RFC5234, January 2008,
<https://www.rfc-editor.org/info/rfc5234>.
[BCP38] Ferguson, P. and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source
Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827,
May 2000, <https://www.rfc-editor.org/info/rfc2827>.
[DGRAM] Pauly, T., Kinnear, E., and D. Schinazi, "An Unreliable
Datagram Extension to QUIC", RFC 9221,
DOI 10.17487/RFC9221, March 2022,
<https://www.rfc-editor.org/info/rfc9221>.
[DSCP] Nichols, K., Blake, S., Baker, F., and D. Black,
"Definition of the Differentiated Services Field (DS
Field) in the IPv4 and IPv6 Headers", RFC 2474,
DOI 10.17487/RFC2474, December 1998,
<https://www.rfc-editor.org/info/rfc2474>.
[ECN] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
of Explicit Congestion Notification (ECN) to IP",
RFC 3168, DOI 10.17487/RFC3168, September 2001,
<https://www.rfc-editor.org/info/rfc3168>.
[EXT-CONNECT2]
McManus, P., "Bootstrapping WebSockets with HTTP/2",
RFC 8441, DOI 10.17487/RFC8441, September 2018,
<https://www.rfc-editor.org/info/rfc8441>.
[EXT-CONNECT3]
Hamilton, R., "Bootstrapping WebSockets with HTTP/3",
RFC 9220, DOI 10.17487/RFC9220, June 2022,
<https://www.rfc-editor.org/info/rfc9220>.
[HTTP] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
Ed., "HTTP Semantics", STD 97, RFC 9110,
DOI 10.17487/RFC9110, June 2022,
<https://www.rfc-editor.org/info/rfc9110>.
[HTTP-DGRAM]
Schinazi, D. and L. Pardue, "HTTP Datagrams and the
Capsule Protocol", RFC 9297, DOI 10.17487/RFC9297, August
2022, <https://www.rfc-editor.org/info/rfc9297>.
[HTTP/1.1] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
Ed., "HTTP/1.1", STD 99, RFC 9112, DOI 10.17487/RFC9112,
June 2022, <https://www.rfc-editor.org/info/rfc9112>.
[HTTP/2] Thomson, M., Ed. and C. Benfield, Ed., "HTTP/2", RFC 9113,
DOI 10.17487/RFC9113, June 2022,
<https://www.rfc-editor.org/info/rfc9113>.
[HTTP/3] Bishop, M., Ed., "HTTP/3", RFC 9114, DOI 10.17487/RFC9114,
June 2022, <https://www.rfc-editor.org/info/rfc9114>.
[IANA-POLICY]
Cotton, M., Leiba, B., and T. Narten, "Guidelines for
Writing an IANA Considerations Section in RFCs", BCP 26,
RFC 8126, DOI 10.17487/RFC8126, June 2017,
<https://www.rfc-editor.org/info/rfc8126>.
[ICMP] Postel, J., "Internet Control Message Protocol", STD 5,
RFC 792, DOI 10.17487/RFC0792, September 1981,
<https://www.rfc-editor.org/info/rfc792>.
[ICMPv6] Conta, A., Deering, S., and M. Gupta, Ed., "Internet
Control Message Protocol (ICMPv6) for the Internet
Protocol Version 6 (IPv6) Specification", STD 89,
RFC 4443, DOI 10.17487/RFC4443, March 2006,
<https://www.rfc-editor.org/info/rfc4443>.
[IPv6] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", STD 86, RFC 8200,
DOI 10.17487/RFC8200, July 2017,
<https://www.rfc-editor.org/info/rfc8200>.
[IPv6-ZONE-ID]
Carpenter, B., Cheshire, S., and R. Hinden, "Representing
IPv6 Zone Identifiers in Address Literals and Uniform
Resource Identifiers", RFC 6874, DOI 10.17487/RFC6874,
February 2013, <https://www.rfc-editor.org/info/rfc6874>.
[PROXY-STATUS]
Nottingham, M. and P. Sikora, "The Proxy-Status HTTP
Response Header Field", RFC 9209, DOI 10.17487/RFC9209,
June 2022, <https://www.rfc-editor.org/info/rfc9209>.
[QUIC] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based
Multiplexed and Secure Transport", RFC 9000,
DOI 10.17487/RFC9000, May 2021,
<https://www.rfc-editor.org/info/rfc9000>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[TCP] Eddy, W., Ed., "Transmission Control Protocol (TCP)",
STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022,
<https://www.rfc-editor.org/info/rfc9293>.
[TEMPLATE] Gregorio, J., Fielding, R., Hadley, M., Nottingham, M.,
and D. Orchard, "URI Template", RFC 6570,
DOI 10.17487/RFC6570, March 2012,
<https://www.rfc-editor.org/info/rfc6570>.
[URI] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66,
RFC 3986, DOI 10.17487/RFC3986, January 2005,
<https://www.rfc-editor.org/info/rfc3986>.
13.2. Informative References
[CONNECT-UDP]
Schinazi, D., "Proxying UDP in HTTP", RFC 9298,
DOI 10.17487/RFC9298, August 2022,
<https://www.rfc-editor.org/info/rfc9298>.
[DPLPMTUD] Fairhurst, G., Jones, T., Tüxen, M., Rüngeler, I., and T.
Völker, "Packetization Layer Path MTU Discovery for
Datagram Transports", RFC 8899, DOI 10.17487/RFC8899,
September 2020, <https://www.rfc-editor.org/info/rfc8899>.
[ECN-TUNNEL]
Briscoe, B., "Tunnelling of Explicit Congestion
Notification", RFC 6040, DOI 10.17487/RFC6040, November
2010, <https://www.rfc-editor.org/info/rfc6040>.
[HEv2] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2:
Better Connectivity Using Concurrency", RFC 8305,
DOI 10.17487/RFC8305, December 2017,
<https://www.rfc-editor.org/info/rfc8305>.
[IANA-PN] IANA, "Protocol Numbers",
<https://www.iana.org/assignments/protocol-numbers>.
[IPSEC] Kent, S. and K. Seo, "Security Architecture for the
Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
December 2005, <https://www.rfc-editor.org/info/rfc4301>.
[IPv6-ADDR]
Hinden, R. and S. Deering, "IP Version 6 Addressing
Architecture", RFC 4291, DOI 10.17487/RFC4291, February
2006, <https://www.rfc-editor.org/info/rfc4291>.
[OPTIMISTIC]
Schwartz, B. M., "Security Considerations for Optimistic
Use of HTTP Upgrade", Work in Progress, Internet-Draft,
draft-schwartz-httpbis-optimistic-upgrade-00, 21 August
2023, <https://datatracker.ietf.org/doc/html/draft-
schwartz-httpbis-optimistic-upgrade-00>.
[PROXY-REQS]
Chernyakhovsky, A., McCall, D., and D. Schinazi,
"Requirements for a MASQUE Protocol to Proxy IP Traffic",
Work in Progress, Internet-Draft, draft-ietf-masque-ip-
proxy-reqs-03, 27 August 2021,
<https://datatracker.ietf.org/doc/html/draft-ietf-masque-
ip-proxy-reqs-03>.
[ROUTING-HDR]
Abley, J., Savola, P., and G. Neville-Neil, "Deprecation
of Type 0 Routing Headers in IPv6", RFC 5095,
DOI 10.17487/RFC5095, December 2007,
<https://www.rfc-editor.org/info/rfc5095>.
[TUNNEL-SECURITY]
Krishnan, S., Thaler, D., and J. Hoagland, "Security
Concerns with IP Tunneling", RFC 6169,
DOI 10.17487/RFC6169, April 2011,
<https://www.rfc-editor.org/info/rfc6169>.
[UDP-USAGE]
Eggert, L., Fairhurst, G., and G. Shepherd, "UDP Usage
Guidelines", BCP 145, RFC 8085, DOI 10.17487/RFC8085,
March 2017, <https://www.rfc-editor.org/info/rfc8085>.
Acknowledgments
The design of this method was inspired by discussions in the MASQUE
Working Group around [PROXY-REQS]. The authors would like to thank
participants in those discussions for their feedback. Additionally,
Mike Bishop, Lucas Pardue, and Alejandro Sedeño provided valuable
feedback on the document.
Most of the text on client configuration is based on the
corresponding text in [CONNECT-UDP].
Authors' Addresses
Tommy Pauly (editor)
Apple Inc.
Email: tpauly@apple.com
David Schinazi
Google LLC
1600 Amphitheatre Parkway
Mountain View, CA 94043
United States of America
Email: dschinazi.ietf@gmail.com
Alex Chernyakhovsky
Google LLC
Email: achernya@google.com
Mirja Kühlewind
Ericsson
Email: mirja.kuehlewind@ericsson.com
Magnus Westerlund
Ericsson
Email: magnus.westerlund@ericsson.com
|