<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.0.25 -->

<!DOCTYPE rfc SYSTEM "../Tools/rfc2629xslt/rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>

<rfc ipr="trust200902" docName="draft-nottingham-httpbis-origin-frame-00" category="std">

  <front>
    <title abbrev="ORIGIN Frames">The ORIGIN HTTP/2 Frame</title>

    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization>Akamai</organization>
      <address>
        <email>mnot@mnot.net</email>
        <uri>http://www.mnot.net/</uri>
      </address>
    </author>
    <author initials="E." surname="Nygren" fullname="Erik Nygren">
      <organization>Akamai</organization>
      <address>
        <email>nygren@akamai.com</email>
      </address>
    </author>

    <date year="2015"/>

    <area>General</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document specifies the ORIGIN frame for HTTP/2, to indicate what origins are available on a
given connection.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>HTTP/2 <xref target="RFC7540"/> allows clients to coalesce different origins <xref target="RFC6454"/> onto the same
connection when certain conditions are met. In some cases, the server is not authoritative for a
coalesced origin, so the 421 (Misdirected Request) status code was defined.</t>

<t>Using a status code in this manner allows clients to recover from misdirected requests, but at the
penalty of adding latency. To address that, this specification defines a new HTTP/2 frame type,
“ORIGIN”, to allow servers to indicate what origins a connection is authoritative for.</t>

<section anchor="notational-conventions" title="Notational Conventions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”,
“RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in
<xref target="RFC2119"/>.</t>

</section>
<section anchor="the-origin-http2-frame" title="The ORIGIN HTTP/2 Frame">

<t>The ORIGIN HTTP/2 frame (<xref target="RFC7540"/>, Section 4) indicates what origin(s) <xref target="RFC6454"/> the sender
considers this connection authoritative for (in the sense of <xref target="RFC7540"/>, Section 10.1).</t>

<t>The ORIGIN frame is a non-critical extension to HTTP/2. Endpoints that do not support this frame
can safely ignore it.</t>

<t>It MUST occur on stream 0; an ORIGIN frame on any other stream is invalid and MUST be ignored.</t>

<t>When received by a client, it can be used to inform HTTP/2 connection coalescing (see <xref target="RFC7540"/>,
Section 9.1.1), but does not relax the requirement there that the server is authoritative.</t>

<t>If multiple ORIGIN frames are received on the same connection, only the most recent is to be
considered current.</t>

<t>Once an ORIGIN frame has been received and processed, clients that implement this specification
SHOULD NOT use that connection for a given origin if it did not appear within the current ORIGIN
frame.</t>

<t>The ORIGIN frame type is 0xb (decimal 11).</t>

<figure><artwork><![CDATA[
+-------------------------------+-------------------------------+
|         Origin-Len (16)       | Origin? (*)                 ...
+-------------------------------+-------------------------------+
]]></artwork></figure>

<t>The ORIGIN frame contains the following fields, sets of which may be
	repeated within the frame to indicate multiple origins:</t>

<t>Origin-Len:
  An unsigned, 16-bit integer indicating the length, in octets, of the Origin field.
Origin:
  An optional sequence of characters containing the ASCII serialization of an origin (<xref target="RFC6454"/>, Section 6.2) that the sender believes this connection is authoritative for.</t>

<t>The ORIGIN frame does not define any flags. It can contain one or more Origin-Len/Origin pairs.</t>

<t>The ORIGIN frame is processed hop-by-hop. An intermediary must not forward ORIGIN frames.</t>

<t>Clients configured to use a proxy MUST ignore any ORIGIN frames received from it.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>Clients that blindly trust the ORIGIN frame’s contents will be vulnerable to a large number of
attacks; hence the reinforcement that this specification does not relax the requirement for server
authority in <xref target="RFC7540"/>, Section 10.1.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor='RFC2119' target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>


<reference  anchor='RFC6454' target='http://www.rfc-editor.org/info/rfc6454'>
<front>
<title>The Web Origin Concept</title>
<author initials='A.' surname='Barth' fullname='A. Barth'><organization /></author>
<date year='2011' month='December' />
<abstract><t>This document defines the concept of an &quot;origin&quot;, which is often used as the scope of authority or privilege by user agents.  Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites.  In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string.  It also defines an HTTP header field, named &quot;Origin&quot;, that indicates which origins are associated with an HTTP request.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6454'/>
<seriesInfo name='DOI' value='10.17487/RFC6454'/>
</reference>


<reference  anchor='RFC7540' target='http://www.rfc-editor.org/info/rfc7540'>
<front>
<title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
<author initials='M.' surname='Belshe' fullname='M. Belshe'><organization /></author>
<author initials='R.' surname='Peon' fullname='R. Peon'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson' role='editor'><organization /></author>
<date year='2015' month='May' />
<abstract><t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t><t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t></abstract>
</front>
<seriesInfo name='RFC' value='7540'/>
<seriesInfo name='DOI' value='10.17487/RFC7540'/>
</reference>



    </references>




  </back>
</rfc>

