Re: [apps-discuss] I-D Action: draft-nottingham-http-browser-hints-00.txt

Mark Nottingham <mnot@mnot.net> Fri, 20 May 2011 00:51 UTC

Return-Path: <mnot@mnot.net>
X-Original-To: apps-discuss@ietfa.amsl.com
Delivered-To: apps-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ED0DE06D8 for <apps-discuss@ietfa.amsl.com>; Thu, 19 May 2011 17:51:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.601
X-Spam-Level:
X-Spam-Status: No, score=-104.601 tagged_above=-999 required=5 tests=[AWL=-2.002, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9KT1AIL391uD for <apps-discuss@ietfa.amsl.com>; Thu, 19 May 2011 17:51:40 -0700 (PDT)
Received: from mxout-07.mxes.net (mxout-07.mxes.net [216.86.168.182]) by ietfa.amsl.com (Postfix) with ESMTP id A9E4CE0658 for <apps-discuss@ietf.org>; Thu, 19 May 2011 17:51:40 -0700 (PDT)
Received: from chancetrain-lm.mnot.net (unknown [118.209.62.233]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 2948922E257; Thu, 19 May 2011 20:51:32 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Mark Nottingham <mnot@mnot.net>
In-Reply-To: <BANLkTikp68JoF7xAm=s8QaE6JTL9JGUc_Q@mail.gmail.com>
Date: Fri, 20 May 2011 10:51:30 +1000
Content-Transfer-Encoding: quoted-printable
Message-Id: <EB487AB6-E24F-4C2A-8550-6B5A7EF411FC@mnot.net>
References: <20110517042149.2176.20778.idtracker@ietfa.amsl.com> <1603FA8A-5BBC-4574-815A-2E13850F1D52@mnot.net> <20110517053416.GB26443@1wt.eu> <FC3C8827-D071-4EE8-B7DA-CBA7E26ACF1B@mnot.net> <BANLkTikp68JoF7xAm=s8QaE6JTL9JGUc_Q@mail.gmail.com>
To: Brian Pane <brianp@brianp.net>
X-Mailer: Apple Mail (2.1084)
Cc: Apps Discuss <apps-discuss@ietf.org>
Subject: Re: [apps-discuss] I-D Action: draft-nottingham-http-browser-hints-00.txt
X-BeenThere: apps-discuss@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: General discussion of application-layer protocols <apps-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-discuss>
List-Post: <mailto:apps-discuss@ietf.org>
List-Help: <mailto:apps-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 May 2011 00:51:41 -0000

Hi Brian,

I've been thinking about HTTP compression schemes too, but IMO the barrier to entry for hop-by-hop is probably too high, as that's getting perilously close to HTTP 2.0, and if we're going to go that far, we might as well go the whole hog (a la SPDY, WAKA, etc.). Also, header compression only works well if you have many requests on a connection; IME we're not there yet.

Rather, I'm seeing this draft as a mechanism for backing away from the spiral of unfortunate behaviours that the browsers have to implement to interoperate with really broken sites. My site doesn't need convoluted Accept-* headers, nor does it need a painfully wordy User-Agent, but the browsers still send the because some other broken sites do require this. Likewise, my site doesn't need browsers to be careful about pipelining.

Also, there is more in the draft than just reducing request header sizes; while that might be the most beneficial case for you, I actually started the draft for the pconn-ip behaviour. 

Regards,


On 19/05/2011, at 12:03 PM, Brian Pane wrote:

> Reading through the browser hints draft,
> http://www.ietf.org/id/draft-nottingham-http-browser-hints-00.txt , my
> first reaction is that it specifies a really arbitrary subset of
> request headers that clients can be advised to stop sending.
> 
> While there's definitely some benefit to be gained by addressing
> special cases like this, I think a general-case solution would be
> preferable: a hop-by-hop response header that tells the client that
> the server (or intermediary) supports compressed headers.  This would
> require the definition of a compressed header standard, of course.
> 
> Of the specific headers covered in the draft, many have the same
> values on every request: Accept, Accept-Charset, User-Agent.  Header
> compression would be very effective for these and for some other
> common headers: Host, X-Forwarded-For, and Accept-Encoding.  In
> addition, Cookie and Referrer would benefit from compression in a lot
> of common cases.
> 
> -Brian
> _______________________________________________
> apps-discuss mailing list
> apps-discuss@ietf.org
> https://www.ietf.org/mailman/listinfo/apps-discuss

--
Mark Nottingham   http://www.mnot.net/