Re: [hybi] Ticket#1 Http Compliance
Greg Wilkins <gregw@webtide.com> Thu, 13 May 2010 12:53 UTC
Return-Path: <gregw@webtide.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D18453A6839 for <hybi@core3.amsl.com>; Thu, 13 May 2010 05:53:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.417
X-Spam-Level:
X-Spam-Status: No, score=-0.417 tagged_above=-999 required=5 tests=[AWL=-0.232, BAYES_40=-0.185]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tpXXcBkwiyDd for <hybi@core3.amsl.com>; Thu, 13 May 2010 05:53:33 -0700 (PDT)
Received: from mail-ww0-f44.google.com (mail-ww0-f44.google.com [74.125.82.44]) by core3.amsl.com (Postfix) with ESMTP id A8F183A6B18 for <hybi@ietf.org>; Thu, 13 May 2010 05:52:12 -0700 (PDT)
Received: by wwb28 with SMTP id 28so930339wwb.31 for <hybi@ietf.org>; Thu, 13 May 2010 05:51:59 -0700 (PDT)
Received: by 10.227.146.205 with SMTP id i13mr8382998wbv.214.1273755119424; Thu, 13 May 2010 05:51:59 -0700 (PDT)
Received: from [192.168.0.100] (host116-234-static.43-88-b.business.telecomitalia.it [88.43.234.116]) by mx.google.com with ESMTPS id z33sm8729980wbd.19.2010.05.13.05.51.58 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 13 May 2010 05:51:58 -0700 (PDT)
Message-ID: <4BEBF5E8.2020800@webtide.com>
Date: Thu, 13 May 2010 14:51:52 +0200
From: Greg Wilkins <gregw@webtide.com>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: "hybi@ietf.org" <hybi@ietf.org>
References: <4BEAB021.5030600@webtide.com> <16A430F2-1458-404C-839B-7EEF23434026@apple.com> <4BEBBD7D.8090609@webtide.com> <16DD953D-55E8-4188-B979-0AA348878C73@apple.com> <4BEBCC37.5070808@webtide.com> <3276A7F4-0A3A-4099-8A35-860DD0B93032@apple.com>
In-Reply-To: <3276A7F4-0A3A-4099-8A35-860DD0B93032@apple.com>
X-Enigmail-Version: 0.95.7
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Subject: Re: [hybi] Ticket#1 Http Compliance
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 May 2010 12:53:34 -0000
Maciej Stachowiak wrote: > On May 13, 2010, at 2:53 AM, Greg Wilkins wrote: >> telnet is not HTTP compliant as I can telnet to a >> HTTP server and do all sorts of illegal stuff. > > Can you give an example that's relevant to WebSocket? Is there anything in a > current or previous draft that's HTTP compatible but not HTTP compliant? > That would make it easier to assess the practical impact of this change. I believe the current -76 handshake could be described as HTTP compatible, but it is not HTTP compliant. The use of redirects and BASIC authentication would also be compliant features that the current specification does not support because it is only compatible. > Can you give examples of things from the current draft that are not HTTP > compliant? I assume the random characters after the request are one > thing. Is there anything else? The random characters are the most obvious non compliance. But there is also a restriction on the headers that can be sent, which I think is boarder-line non compliance, so that for example user-agent cannot be sent. There is also a restriction on the server that it's only valid responses to a handshake is to either accept with a 101 or to close the connection. A compliant HTTP server should be able to respond with any compliant HTTP response. The websocket specification can say that websocket clients can ignore all non-101 responses and close the connection, but they cannot require that a HTTP server act contrary to the HTTP specification simply because a client made some mistake in the formulation of their websocket URL (for example). In order to claim websocket compliance, I do not want to have to change my server so that every URL that receives a bad websocket upgrade has to close the connection without sending some legal HTTP error response (eg 400 or 404). regards
- [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Roberto Peon
- Re: [hybi] Ticket#1 Http Compliance Anne van Kesteren
- Re: [hybi] Ticket#1 Http Compliance Maciej Stachowiak
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Salvatore Loreto
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Maciej Stachowiak
- Re: [hybi] Ticket#1 Http Compliance Maciej Stachowiak
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Anne van Kesteren
- Re: [hybi] Ticket#1 Http Compliance Maciej Stachowiak
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Anne van Kesteren
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- [hybi] requirements document is a milestone (was … Salvatore Loreto
- Re: [hybi] Ticket#1 Http Compliance Scott Ferguson
- Re: [hybi] Ticket#1 Http Compliance Thomson, Martin
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins
- Re: [hybi] Ticket#1 Http Compliance Greg Wilkins