- From: William A. Rowe Jr. <wrowe@rowe-clan.net>
- Date: Wed, 01 Dec 2010 03:30:26 -0600
- To: Greg Wilkins <gregw@webtide.com>
- CC: "Eric J. Bowman" <eric@bisonsystems.net>, HTTP Working Group <ietf-http-wg@w3.org>, hybi <hybi@ietf.org>
On 11/26/2010 6:55 AM, Greg Wilkins wrote: > > And do you get similar feeling to think about using the CONNECT method > to establish tunnels for arbitrary protocols? CONNECT suffers from the same issues you identify is deploying a new port. Namely, http servers will reject those requests. Leveraging CONNECT successfully would require additional HTTP-level authentication to identify users and prevent abuse (as most proxies do). Restructuring the internet, whether it is adding a new port to unblock, or permitting specific classes of CONNECT traffic, would be a similar battle.
Received on Wednesday, 1 December 2010 09:31:00 UTC