- From: Yutaka OIWA <y.oiwa@aist.go.jp>
- Date: Thu, 14 Jun 2012 10:51:21 +0900
- To: Alexey Melnikov <alexey.melnikov@isode.com>
- Cc: HTTP Working Group <ietf-http-wg@w3.org>
Dear Alexey,
Thank you very much.
Your comments are really valuable for me to improve the draft.
I'd like to answer immediately for the comment on optional
authentication design:
2012/6/11 Alexey Melnikov <alexey.melnikov@isode.com>:
> Optional authentication: is a new header field really needed or can this be already done using a 200 response containing a WWW-Authenticate header field? Was use of 200 with WWW-Authenticate tried and it didn't work with existing browsers?
As far as I know,
* Until recently, validity for the use of WWW-Authenticate header in
200-response
was unclear. It was clarified in the discussion of httpbis and it
is now OK.
(I designed the protocol before that.)
* My design principle is that, clients not supporting optional authentication
should ignore the request, so that Web site programmers can implement
their own fallback mechanisms.
* Someone in httpbis ML has checked for behavior of various browsers,
and it will work (ignored) for all except one browser (forcibly
authenticate),
I remember.
* I want some consensus whether we can ignore this one case for the future,
or we have to be conservative on that.
* I like both approaches, so if people think the alternative is better,
I'd like to migrate it.
* We need some additional rules for making optional authentication
with 200-status work (such as how the server will tell client about
success/failure status of the authentication).
I will research it and update the draft once the direction is decided.
--
Yutaka OIWA, Ph.D. Leader, Software Reliability Research Group
Research Institute for Secure Systems (RISEC)
National Institute of Advanced Industrial Science and Technology (AIST)
Mail addresses: <y.oiwa@aist.go.jp>, <yutaka@oiwa.jp>
OpenPGP: id[440546B5] fp[7C9F 723A 7559 3246 229D 3139 8677 9BD2 4405 46B5]
Received on Thursday, 14 June 2012 01:52:06 UTC