- From: Adrien de Croy <adrien@qbik.com>
- Date: Sat, 31 Jan 1998 02:58:09 +1200
- To: Josh Cohen <joshco@microsoft.com>, Ben Laurie <ben@algroup.co.uk>
- Cc: http-wg@cuckoo.hpl.hp.com
Hi At 03:23 30/01/98 -0800, Josh Cohen wrote: > > >-> -----Original Message----- >-> From: Adrien de Croy [mailto:adrien@qbik.com] >-> Sent: Thursday, January 29, 1998 11:37 PM >-> To: Ben Laurie >-> Cc: http-wg@cuckoo.hpl.hp.com >-> Subject: Re: HTTP/1.1 : Chunking >-> >-> >-> 4.2 Message headers >-> >-> The allowing of multiple headers if their values form a >-> single list seems a >-> redundant complexity. Unless you are catering for people >-> debugging by hand >[...snip...] >-> >-> Personally I would remove allowing this from the spec. I >-> don't believe any >-> client software would implement it (unless they are >-> programming in Pascal or >-> something with a string length limitation - UGH!). >-> >Does the spec allow you to collapse multiple headers into >a single line? If so, you can put them in your name/value >list just the same. It does, and that is definitely what I will be doing, but the thing is that the spec allows it, which means implementors must check for it. >-> >-> Proxy Authentication. >-> >-> There are some problems with the proposed method where it >-> relates to chained >-> proxies, or a "use proxy" response. Basically it may be >-> necessary for a >-> client to include many Proxy-Authorization fields in a >-> request, since it is >-> possible that only the client holds the credentials of the >-> proxies involved. >-> Otherwise ALL agents in the chain (including the end server) >-> MUST support >-> persistent connections. >-> > > >-> If it needs multiple authorisation fields, how can each >-> proxy tell which one >-> is intended for it. It would have to try them all for a >-> match, strip it >-> out, and pass the request on. >-> >Huh? (put 305 aside for the moment) >If the client is going through multiple chained (auth requesting ) >proxies then it must include credentials for each of them. >As a side affect, each credential is readable by all >proxies in front of it. >The proxy knows which credential set is for it >by looking for the realm value that it generated. OK. > >As a former proxy implementor, I am happy to agree that >the proxy-auth system is a bit ugly and could use some work. >A proposal to include more specific realm info (for the chained > case) was rejected because it could cause backward compat problems. > Are these backward compatibility problems real - how many implementations would need to significantly alter their behavior due to a change here, given that proxy authentication was not even a part of HTTP/1.0 >-> Multiple byte-range requests? >-> >-> Normally I guess these would only be made by caches, as clients would >-> generally always need the end of a file, rather than chunks >-> out of the >-> middle of it. Are overlapping byte ranges meant to be >Not really. If a client is doing pipelined range requests, >it may very well, retreive bits of an entity at a time, >ie bytes >1) 1-100 of entity A >2) 1-100 of entity B >3) 1-100 of entity C >4) 101-200 of entity A >5) 101-200 of entity B >6) 101-200 of entity C >to affect a sort of multiplex... This is critical >for user experience to perform well with only 1 >or two connections.. OK > >-> condensed by the >-> server? or supplied as requested. >-> >-> Since the protocol is >-> changing, why not make >-> it REAL easy to validate cache files by assigning every >-> cachable resource a >-> globally unique identifier which changes with modifications >-> to the resource. >-> Then a validation would simply involve sending the identifier >-> Say in the form of URL: File Version, or system file time. >-> This would >-> completely remove the complexity of validation with servers, >-> and caches >-> could still use freshness concepts for efficiency. It would >-> also remove the >-> dependency on synchronised clocks etc. >-> >Doesnt Etags meet this requirement? > It would if the presence of ETag was mandatory, and there was some definition of the content such that the ETag could be compared by the recipient to determine precedence. >further, be careful saying that "since the protocol is changing".. >No, the protocol isnt changing necessarily. >We are bound that all changes must be backward compatible. >Additionally, we are past the time for new features to be added >in the protocol. (at least in v1.1). You might look to the extensions >working group for a mechanism to plug in new features... >that list is ietf-http-ext@w3.org Hmmm, OK. As for backward compatibility, that is pretty subjective. In software development, it is more easy (read more reliable) to implement a simple protocol than one which is backwardly compatible and complex. Cheers Adrien > >--- >Josh Cohen <josh@microsoft.com> >Program Manager - Internet Technologies > ---------------------------------------------------------------------------- ------ Adrien de Croy - adrien@qbik.com. Qbik New Zealand Limited, Auckland, New Zealand See our pages and learn about WinGate at http://www.qbik.com/ ---------------------------------------------------------------------------- ------
Received on Friday, 30 January 1998 06:07:31 UTC