Re: 103 (Early Hints) vs. response headers

Kazuho Oku <kazuhooku@gmail.com> Thu, 16 March 2017 15:14 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52E84129569 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 16 Mar 2017 08:14:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.002
X-Spam-Level:
X-Spam-Status: No, score=-7.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ki4Us9zmjnJb for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 16 Mar 2017 08:13:58 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF6AE129555 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 16 Mar 2017 08:13:56 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1coX3j-0003eC-5w for ietf-http-wg-dist@listhub.w3.org; Thu, 16 Mar 2017 15:11:23 +0000
Resent-Date: Thu, 16 Mar 2017 15:11:23 +0000
Resent-Message-Id: <E1coX3j-0003eC-5w@frink.w3.org>
Received: from mimas.w3.org ([128.30.52.79]) by frink.w3.org with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <kazuhooku@gmail.com>) id 1coX3d-0003c6-Cv for ietf-http-wg@listhub.w3.org; Thu, 16 Mar 2017 15:11:17 +0000
Received: from mail-pg0-f45.google.com ([74.125.83.45]) by mimas.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from <kazuhooku@gmail.com>) id 1coX3W-0003ii-8I for ietf-http-wg@w3.org; Thu, 16 Mar 2017 15:11:12 +0000
Received: by mail-pg0-f45.google.com with SMTP id g2so26510452pge.3 for <ietf-http-wg@w3.org>; Thu, 16 Mar 2017 08:10:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=VzAT2bohWNG+rXCeceVNUOClBLaffKCjT3RcLF/1xWg=; b=TyYRxWf09INT36w8PHFG57aXpZaLsEVP0ks7v8mA5lnWTSX0oAGgZRlxCdVmjEGrKu Y/eXULTEcZfeaKmp8bMRRmudxiUdvB0OIgoGSwQa7OYsl/BzMb5YCziB7/jMLYEFRTx9 ITFLOQBy5BNOSNeV5rjzQjp+/k+di0qolguQwZjvKXYuN1wNtOORHeUjKD6hhPgW01HJ kC+Vw5Mf9SG6R45Ji+6FHP0E1ZVrc7fGET9ytTOYAa60qdyiEnJ6tJ+fKqMdiLxtfCRv r0ReJCbInc5rZ1UnPnwnLE93WLgG7/o1vTR60UPEF3xBaJFI0X5RrgHLer1H4w3dZvv2 34ug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=VzAT2bohWNG+rXCeceVNUOClBLaffKCjT3RcLF/1xWg=; b=rhrM9kWXB+6zKnVvumVI2Sh/ONuCB9oQidA6PGRiYWFus4Wm1maYCQiPB7u8EUqCt2 18YQHHBkXlpAGjk+yxzBZsffr9t05KJOR50bU1uHA8XQoPkWlFXs0QARObZ8qA4l06OA yq+MHqlwxoBi/1uFcDbghV3OUOvRLIb8jxmu3mnBL8RA7yb9Im8fYfBYuqSFVlQ14bxo GKU1RqKqvtHso2rnMRzoSHz50FOwtbvZVqi9iNjVQggogSYCWA6wDNPFwuwwv632H+UD 4LuuKWVubzb1khWbDsuGqnf9gYRVctT/o0j9uPoZEKGyhSkPCQsOSnoWnnE2qlUdtVqY +vrA==
X-Gm-Message-State: AFeK/H3ZcrEbnZFXM1Fa1tUt4JXzEHeqdv/z60gVQV1XT58Zw0k02ToYc2WsjYTNynEhR2QhUhAm81YYDATIjA==
X-Received: by 10.99.149.6 with SMTP id p6mr10369070pgd.122.1489677043705; Thu, 16 Mar 2017 08:10:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.149.13 with HTTP; Thu, 16 Mar 2017 08:10:43 -0700 (PDT)
In-Reply-To: <20170316143158.GB15641@1wt.eu>
References: <CALHHdhwQBfBN0Xz-4kxRJrJekiCLnro1i-MVw954wTRyOWAtvw@mail.gmail.com> <E10BB6E0-3BD8-44EC-AE18-076D38077371@mnot.net> <CANatvzxS7Z9U5Jr2N_EeyY5NUrZ-weuGsetuUQdLWGGOQKVLNw@mail.gmail.com> <20170315062242.GB13814@1wt.eu> <CANatvzyeYxHFDDh-Hms6V0gJ+MkgW6v78uLj9bieR_nAaOfPHw@mail.gmail.com> <20170316143158.GB15641@1wt.eu>
From: Kazuho Oku <kazuhooku@gmail.com>
Date: Fri, 17 Mar 2017 00:10:43 +0900
Message-ID: <CANatvzxoqDhDh0KgG3Jw29GQdrvL6GQjXPJUYiDiKJ-hPNt2GQ@mail.gmail.com>
To: Willy Tarreau <w@1wt.eu>
Cc: Mark Nottingham <mnot@mnot.net>, Vasiliy Faronov <vfaronov@gmail.com>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=74.125.83.45; envelope-from=kazuhooku@gmail.com; helo=mail-pg0-f45.google.com
X-W3C-Hub-Spam-Status: No, score=-4.5
X-W3C-Hub-Spam-Report: AWL=-0.450, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1coX3W-0003ii-8I f61ba75c3e8fb9270a617e2212133de2
X-Original-To: ietf-http-wg@w3.org
Subject: Re: 103 (Early Hints) vs. response headers
Archived-At: <http://www.w3.org/mid/CANatvzxoqDhDh0KgG3Jw29GQdrvL6GQjXPJUYiDiKJ-hPNt2GQ@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/33742
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Thank you for pointing that out. It's good to know that there'd be
ways to detect the behavior of a client.

OTOH, I think that, in the long term, we would benefit more from
having a well-defined behavior than detecting and handling clients
that behave in various ways.

Therefore, my preference goes to explicitly stating that the headers
of a 103 response must not be applied as part of the informational
response, and if there's a need in practice to make such distinction,
introduce negotiation to Early Hints.

2017-03-16 23:31 GMT+09:00 Willy Tarreau <w@1wt.eu>:
> Hi Kazuho,
>
> On Thu, Mar 16, 2017 at 10:55:31PM +0900, Kazuho Oku wrote:
>> >> So to me it seems that if we state in Early Hints that the headers of
>> >> a 103 response is ones that are applied (speculatively) to the final
>> >> response but not the informational response itself, then we'd be
>> >> overriding RFC 6265.
>> >
>> > I'm not seeing it this way. In fact you may decide to put some headers
>> > there for this exact reason : while 1xx MAY be ignored, those implementing
>> > 103 MAY/WILL consider them. And you're sending 103 hoping that someone
>> > will make good use of it, not as a guarantee, so I don't think it
>> > contradicts 6265.
>>
>> While I would not say that RFC 6265 and Early Hints would contradict,
>> I still think that the requirement of how a Set-Cookie header _can_ be
>> handled is narrowed by Early Hints. Consider the response below.
>>
>> HTTP/1.1 103 Early Hints
>> Set-Cookie: a=b
>>
>> HTTP/1.1 200 OK
>> Content-Type: text/plain; charset=utf-8
>> Content-Length: 12
>>
>> Hello world
>>
>> RFC 6265 allows the client to store cookie `a` by stating that a
>> client MAY accept a Set-Cookie header within any 100-level response.
>>
>> If we are to state in Early Hints that the headers of a 103 response
>> are to be applied (speculatively) to the final response but not to the
>> informational response itself, we would effectively be forbidding such
>> behavior for clients that implements 103.
>>
>> In other words, a client that _do_ recognize a Set-Cookie header in
>> 100-level responses (it is a MAY in RFC 7230 section 6.2) would need
>> to special-case the handling of 103. From server-side perspective, it
>> would continue to be unable to expect whether if the client would
>> accept or ignore the set-cookie header in a 103 response since there
>> is no negotiation for Early Hints.
>>
>> To me this seems like a variation of what was pointed out by Vasiliy
>> (by using the Warnings header).
>
> Hmmm I see, indeed you can end up in an unknown state there. But maybe
> once properly documented it can be turned to a benefit for improved
> deployment. Let's consider this for example :
>
>  HTTP/1.1 103 Early Hints
>  Set-Cookie: cookie_support_on_103=yes
>
>  HTTP/1.1 200 OK
>  Content-Type: text/plain; charset=utf-8
>  Set-Cookie: this_is_a_regular=application_cookie
>  Content-Length: 12
>
>  Hello world
>
> The server can detect in a subsequent request whether or not the path is
> clean. And by registering a standard cookie name for this use case we
> could even end up with the first request sending the information regarding
> this support from the browser based on the learning from a previous call
> without ever conflicting with application cookies, meaning that on subsequent
> calls the server may decide to pass much more info on the 103 response. Of
> course the cookie name and value would have to be much shorter than in the
> example above :-)
>
> Willy



-- 
Kazuho Oku