From c27df890169cfb957d2ec09290714931564251e2 Mon Sep 17 00:00:00 2001 From: Daniel Kahn Gillmor <dkg@fifthhorseman.net> Date: Tue, 9 May 2017 11:16:31 -0400 Subject: [PATCH] warn against mixing with other multiplexers (Closes #2) --- draft-dkg-dprive-demux-dns-http.md | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/draft-dkg-dprive-demux-dns-http.md b/draft-dkg-dprive-demux-dns-http.md index d844a69..4081efa 100644 --- a/draft-dkg-dprive-demux-dns-http.md +++ b/draft-dkg-dprive-demux-dns-http.md @@ -33,6 +33,14 @@ informative: RFC7830: RFC7858: I-D.ietf-dnsop-dns-wireformat-http: + HAPROXY: + target: https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt + title: The Proxy protocol + author: + name: Willy Tarreau + ins: W. Tarreau + org: HAProxy Technologies + date: 2017-03-10 normative: RFC1035: RFC1945: @@ -144,6 +152,19 @@ fail or trigger other "interesting" behaviors. This approach should be done only in channels sufficiently obscured that a transparent proxy would not try to interpret the resultant stream. +Avoid mixing with other demultiplexing +-------------------------------------- + +Some other (non-IETF) systems (e.g. {{HAPROXY}}) take a similar +approach with multiplexing data on top of HTTP by taking advantage of +bitpatterns that are presumed to not be present in normal HTTP +requests. + +Use of the approach described in this draft in conjunction with these +other approaches is not advisable. Doing so safely would require +explicit and detailed review of all three (or more) protocols +involved. + Why not ALPN? ------------- -- GitLab