- From: Glenn Maynard <glenn@zewt.org>
- Date: Mon, 21 Feb 2011 23:10:45 -0500
- To: Mark Nottingham <mnot@mnot.net>
- Cc: Adam Barth <w3c@adambarth.com>, public-webapps@w3.org
- Message-ID: <AANLkTimayHbLGoBqK8JEPR-MhSjj0EYnAsi4zQ5XbwSZ@mail.gmail.com>
On Mon, Feb 21, 2011 at 9:28 PM, Mark Nottingham <mnot@mnot.net> wrote: > > On 22/02/2011, at 1:08 PM, Adam Barth wrote: > > > I'm not sure I understand how this would work. Let's take the example > > of Sec-WebSocket-Key. When would the user agent send XHR2-Secure: > > Sec-WebSocket-Key ? > > > Ah, I see; you want to dynamically prohibit the client sending a header, > rather than declare what headers the client didn't allow modification of. > > A separate header won't help you, no. > > The problems I brought up still stand, however. I think we need to have a > discussion about how much convenience the implementers really need here, and > also to look at the impact on the registration procedure for HTTP headers. > The only practical issue I can see is the classic "must be first" problem--only one string can be first, so two specs doing this would be mutually exclusive. It would have been nicer to treat header names as a hyphen-delimited list, and prohibiting "sec" elements; eg. "Sec-WebSocket-Key", "WebSocket-Sec-Key", "WebSocket-Key-Sec". It's not worth changing at this point; it just means any other spec matching a group of headers needs to do that, to avoid colliding with XHR. (It's a little annoying that specs can't group headers together with a prefix; eg. if WebSocket defines a restricted "Key" header and an unrestricted "Value" header, it can't have all of its headers prefixed with "WebSocket"; some need to be "Sec-WebSocket". But that's just cosmetics.) -- Glenn Maynard
Received on Tuesday, 22 February 2011 04:11:18 UTC