<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.6 -->
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc-ext html-pretty-print="prettyprint https://cdn.rawgit.com/google/code-prettify/master/loader/run_prettify.js"?>
<rfc xmlns:x="http://purl.org/net/xml2rfc/ext"
     category="exp"
     docName="draft-ietf-httpbis-client-hints-13"
     ipr="trust200902"
     submissionType="IETF">
   <x:feedback template="mailto:ietf-http-wg@w3.org?subject={docname},%20%22{section}%22\&amp;amp;body=%3c{ref}%3e:"/>
   <front>
      <title>HTTP Client Hints</title>
      <author fullname="Ilya Grigorik" initials="I." surname="Grigorik">
         <organization>Google</organization>
         <address>
            <email>ilya@igvita.com</email>
            <uri>https://www.igvita.com/</uri>
         </address>
      </author>
      <author fullname="Yoav Weiss" initials="Y." surname="Weiss">
         <organization>Google</organization>
         <address>
            <email>yoav@yoav.ws</email>
            <uri>https://blog.yoav.ws/</uri>
         </address>
      </author>
      <date year="2020" month="April" day="24"/>
      <area>Applications and Real-Time</area>
      <workgroup>HTTP</workgroup>
      <keyword>Content Negotiation</keyword>
      <abstract>
         <t>HTTP defines proactive content negotiation to allow servers to select the appropriate response for a given request, based upon the user agent’s characteristics, as expressed in request headers. In practice, clients are often unwilling to send those request headers, because it is not clear whether they will be used, and sending them impacts both performance and privacy.</t>
         <t>This document defines an Accept-CH response header that servers can use to advertise their use of request headers for proactive content negotiation, along with a set of guidelines for the creation of such headers, colloquially known as “Client Hints.”</t>
      </abstract>
      <note title="Note to Readers">
         <t>Discussion of this draft takes place on the HTTP working group mailing list (ietf-http-wg@w3.org), which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/">https://lists.w3.org/Archives/Public/ietf-http-wg/</eref>.</t>
         <t>Working Group information can be found at <eref target="http://httpwg.github.io/">http://httpwg.github.io/</eref>; source code and issues list for this draft can be found at <eref target="https://github.com/httpwg/http-extensions/labels/client-hints">https://github.com/httpwg/http-extensions/labels/client-hints</eref>.</t>
      </note>
   </front>
   <middle>
      <section anchor="introduction" title="Introduction">
         <t>There are thousands of different devices accessing the web, each with different device capabilities and preference information. These device capabilities include hardware and software characteristics, as well as dynamic user and client preferences. Historically, applications that wanted to allow the server to optimize content delivery and user experience based on such capabilities had to rely on passive identification (e.g., by matching the User-Agent header field (<xref target="RFC7231" x:fmt="of" x:sec="5.5.3"/>) against an established database of client signatures), use HTTP cookies <xref target="RFC6265"/> and URL parameters, or use some combination of these and similar mechanisms to enable ad hoc content negotiation.</t>
         <t>Such techniques are expensive to setup and maintain, and are not portable across both applications and servers. They also make it hard for both client and server to understand which data is required and is in use during the negotiation:</t>
         <t>
            <list style="symbols">
               <t>User agent detection cannot reliably identify all static variables, cannot infer dynamic client preferences, requires external device database, is not cache friendly, and is reliant on a passive fingerprinting surface.</t>
               <t>Cookie-based approaches are not portable across applications and servers, impose additional client-side latency by requiring JavaScript execution, and are not cache friendly.</t>
               <t>URL parameters, similar to cookie-based approaches, suffer from lack of portability, and are hard to deploy due to a requirement to encode content negotiation data inside of the URL of each resource.</t>
            </list>
         </t>
         <t>Proactive content negotiation (<xref target="RFC7231" x:fmt="of" x:sec="3.4.1"/>) offers an alternative approach; user agents use specified, well-defined request headers to advertise their capabilities and characteristics, so that servers can select (or formulate) an appropriate response.</t>
         <t>However, traditional proactive content negotiation techniques often mean that clients send these request headers prolifically. This causes performance concerns (because it creates “bloat” in requests), as well as privacy issues; passively providing such information allows servers to silently fingerprint the user agent.</t>
         <t>This document defines a new response header, Accept-CH, that allows an origin server to explicitly ask that clients send these headers in requests. It also defines guidelines for content negotiation mechanisms that use it, colloquially referred to as Client Hints.</t>
         <t>Client Hints mitigate performance concerns by assuring that clients will only send the request headers when they’re actually going to be used, and privacy concerns of passive fingerprinting by requiring explicit opt-in and disclosure of required headers by the server through the use of the Accept-CH response header.</t>
         <t>This document defines Client Hints, a framework that enables servers to opt-in to specific proactive content negotiation features, adapting their content accordingly. However, it does not define any specific features that will use that infrastructure. Those features will be defined in their respective specifications.</t>
         <t>One example of such a feature is the User Agent Client Hints feature <xref target="UA-CH"/>.</t>
         <section anchor="notational-conventions" title="Notational Conventions">
            <t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/>
               <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
            <t>This document uses the Augmented Backus-Naur Form (ABNF) notation of <xref target="RFC5234"/>.</t>
         </section>
      </section>
      <section anchor="client-hint-request-header-fields"
               title="Client Hint Request Header Fields">
         <t>A Client Hint request header field is a HTTP header field that is used by HTTP clients to indicate data that can be used by the server to select an appropriate response. Each one conveys client preferences that the server can use to adapt and optimize the response.</t>
         <section anchor="sending-client-hints" title="Sending Client Hints">
            <t>Clients choose what Client Hints to send in a request based on their default settings, user configuration, and server preferences expressed in <spanx style="verb">Accept-CH</spanx>. The client and server can use an opt-in mechanism outlined below to negotiate which header fields need to be sent to allow for efficient content adaption, and optionally use additional mechanisms to negotiate delegation policies that control access of third parties to same header fields.</t>
            <t>Implementers SHOULD be aware of the passive fingerprinting implications when implementing support for Client Hints, and follow the considerations outlined in the <xref target="security-considerations">Security Considerations</xref> section of this document.</t>
         </section>
         <section anchor="server-processing-of-client-hints"
                  title="Server Processing of Client Hints">
            <t>When presented with a request that contains one or more client hint header fields, servers can optimize the response based upon the information in them. When doing so, and if the resource is cacheable, the server MUST also generate a Vary response header field (<xref target="RFC7231" x:fmt="of" x:sec="7.1.4"/>) to indicate which hints can affect the selected response and whether the selected response is appropriate for a later request.</t>
            <t>Furthermore, the server can generate additional response header fields (as specified by the hint or hints in use) that convey related values to aid client processing.</t>
         </section>
      </section>
      <section anchor="advertising-server-support" title="Advertising Server Support">
         <t>Servers can advertise support for Client Hints using the mechanism described below.</t>
         <section anchor="accept-ch" title="The Accept-CH Response Header Field">
            <t>The Accept-CH response header field indicates server support for the hints indicated in its value.</t>
            <t>Accept-CH is a Structured Header <xref target="I-D.ietf-httpbis-header-structure"/>. Its value MUST be an sh-list (<xref target="I-D.ietf-httpbis-header-structure" x:fmt="of" x:sec="3.1"/>) whose members are tokens (<xref target="I-D.ietf-httpbis-header-structure" x:fmt="of" x:sec="3.3.4"/>). Its ABNF is:</t>
            <figure>
               <artwork type="abnf">
  Accept-CH = sh-list
</artwork>
            </figure>
            <t>For example:</t>
            <figure>
               <artwork type="example">
  Accept-CH: Sec-CH-Example, Sec-CH-Example-2
</artwork>
            </figure>
            <t>When a client receives an HTTP response containing <spanx style="verb">Accept-CH</spanx>, that indicates that the origin opts-in to receive the indicated request header fields for subsequent same-origin requests. The opt-in MUST be ignored if delivered over non-secure transport (using a scheme different from HTTPS). It SHOULD be persisted and bound to the origin to enable delivery of Client Hints on subsequent requests to the server’s origin.</t>
            <t>Based on the Accept-CH example above, which is received in response to a user agent navigating to “https://example.com”, and delivered over a secure transport, a user agent will have to persist an Accept-CH preference bound to “https://example.com”. It will then use it for user agent navigations to e.g. “https://example.com/foobar.html”, but not to e.g. “https://foobar.example.com/”. It will similarly use the preference for any same-origin resource requests (e.g. to “https://example.com/image.jpg”) initiated by the page constructed from the navigation’s response, but not to cross-origin resource requests (e.g. “https://thirdparty.com/resource.js”). This preference will not extend to resource requests initiated to “https://example.com” from other origins (e.g. from navigations to “https://other-example.com/”).</t>
         </section>
         <section anchor="interaction-with-caches" title="Interaction with Caches">
            <t>When selecting a response based on one or more Client Hints, and if the resource is cacheable, the server needs to generate a Vary response header field (<xref target="RFC7234"/>) to indicate which hints can affect the selected response and whether the selected response is appropriate for a later request.</t>
            <figure>
               <artwork type="example">
  Vary: Sec-CH-Example
</artwork>
            </figure>
            <t>Above example indicates that the cache key needs to include the Sec-CH-Example header field.</t>
            <figure>
               <artwork type="example">
  Vary: Sec-CH-Example, Sec-CH-Example-2
</artwork>
            </figure>
            <t>Above example indicates that the cache key needs to include the Sec-CH-Example and Sec-CH-Example-2 header fields.</t>
         </section>
      </section>
      <section anchor="security-considerations" title="Security Considerations">
         <section anchor="information-exposure" title="Information Exposure">
            <t>Request header fields used in features relying on this document expose information about the user’s environment to enable proactive content negotiation. Such information might reveal new information about the user and implementers ought to consider the following considerations, recommendations, and best practices.</t>
            <t>The underlying assumption is that exposing information about the user as a request header is equivalent (from a security perspective) to exposing this information by other means. (for example, if the request’s origin can access that information using JavsScript APIs, and transmit it to its servers)</t>
            <t>Because Client Hints is an explicit opt-in mechanism, that means that servers that want access to information about the user’s environment need to actively ask for it, enabling user agents and privacy researchers to keep track of which origins collect that data, and potentially act upon it. The header-based opt-in means that we can remove passive fingerprinting vectors, such as the User-Agent string (enabling active access to that information through <eref target="https://wicg.github.io/ua-client-hints/#http-ua-hints">User-Agent Client Hints</eref>), or otherwise expose information already available through script (e.g. the <eref target="https://wicg.github.io/savedata/#save-data-request-header-field">Save-Data Client Hint</eref>), without increasing the passive fingerprinting surface.</t>
            <t>Therefore, features relying on this document to define Client Hint headers MUST NOT provide new information that is otherwise not available to the application via other means, such as existing request headers, HTML, CSS, or JavaScript.</t>
            <t>Such features SHOULD take into account the following aspects of the information exposed:</t>
            <t>
               <list style="symbols">
                  <t>Entropy - Exposing highly granular data can be used to help identify users across multiple requests to different origins. Reducing the set of header field values that can be expressed, or restricting them to an enumerated range where the advertised value is close but is not an exact representation of the current value, can improve privacy and reduce risk of linkability by ensuring that the same value is sent by multiple users.</t>
                  <t>Sensitivity - The feature SHOULD NOT expose user-sensitive information. To that end, information available to the application, but gated behind specific user actions (e.g. a permission prompt or user activation) SHOULD NOT be exposed as a Client Hint.</t>
                  <t>Change over time - The feature SHOULD NOT expose user information that changes over time, unless the state change itself is also exposed (e.g. through JavaScript callbacks).</t>
               </list>
            </t>
            <t>Different features will be positioned in different points in the space between low-entropy, non-sensitive and static information (e.g. user agent information), and high-entropy, sensitive and dynamic information (e.g. geolocation). User agents SHOULD consider the value provided by a particular feature vs these considerations, and MAY have different policies regarding that tradeoff on a per-feature basis.</t>
            <t>Implementers ought to consider both user- and server- controlled mechanisms and policies to control which Client Hints header fields are advertised:</t>
            <t>
               <list style="symbols">
                  <t>Implementers SHOULD restrict delivery of some or all Client Hints header fields to the opt-in origin only, unless the opt-in origin has explicitly delegated permission to another origin to request Client Hints header fields.</t>
                  <t>Implementers considering providing user choice mechanisms that allow users to balance privacy concerns against bandwidth limitations need to also consider that explaining to users the privacy implications involved, such as the risks of passive fingerprinting, is challenging and likely impractical.</t>
                  <t>Implementations specific to certain use cases or threat models MAY avoid transmitting some or all of Client Hints header fields. For example, avoid transmission of header fields that can carry higher risks of linkability.</t>
               </list>
            </t>
            <t>Implementers SHOULD support Client Hints opt-in mechanisms and MUST clear persisted opt-in preferences when any one of site data, browsing history, browsing cache, cookies, or similar, are cleared.</t>
         </section>
         <section anchor="deployment-and-security-risks"
                  title="Deployment and Security Risks">
            <t>Deployment of new request headers requires several considerations:</t>
            <t>
               <list style="symbols">
                  <t>Potential conflicts due to existing use of header field name</t>
                  <t>Properties of the data communicated in header field value</t>
               </list>
            </t>
            <t>Authors of new Client Hints are advised to carefully consider whether they need to be able to be added by client-side content (e.g., scripts), or whether they need to be exclusively set by the user agent. In the latter case, the Sec- prefix on the header field name has the effect of preventing scripts and other application content from setting them in user agents. Using the “Sec-“ prefix signals to servers that the user agent - and not application content - generated the values. See <xref target="FETCH"/> for more information.</t>
            <t>By convention, request headers that are client hints are encouraged to use a CH- prefix, to make them easier to identify as using this framework; for example, CH-Foo or, with a “Sec-“ prefix, Sec-CH-Foo. Doing so makes them easier to identify programmatically (e.g., for stripping unrecognised hints from requests by privacy filters).</t>
         </section>
         <section anchor="abuse-detection" title="Abuse Detection">
            <t>A user agent that tracks access to active fingerprinting information SHOULD consider emission of Client Hints headers similarly to the way it would consider access to the equivalent API.</t>
            <t>Research into abuse of Client Hints might look at how HTTP responses that contain Client Hints differ from those with different values, and from those without. This might be used to reveal which Client Hints are in use, allowing researchers to further analyze that use.</t>
         </section>
      </section>
      <section anchor="cost-of-sending-hints" title="Cost of Sending Hints">
         <t>While HTTP header compression schemes reduce the cost of adding HTTP header fields, sending Client Hints to the server incurs an increase in request byte size. Servers SHOULD take that into account when opting in to receive Client Hints, and SHOULD NOT opt-in to receive hints unless they are to be used for content adaptation purposes.</t>
         <t>Due to request byte size increase, features relying on this document to define Client Hints MAY consider restricting sending those hints to certain request destinations <xref target="FETCH"/>, where they are more likely to be useful.</t>
      </section>
      <section anchor="iana-considerations" title="IANA Considerations">
         <t>This document defines the “Accept-CH” HTTP response header field, and registers it in the Permanent Message Header Fields registry.</t>
         <section anchor="iana-accept-ch" title="Accept-CH">
            <t>
               <list style="symbols">
                  <t>Header field name: Accept-CH</t>
                  <t>Applicable protocol: HTTP</t>
                  <t>Status: standard</t>
                  <t>Author/Change controller: IETF</t>
                  <t>Specification document(s): <xref target="accept-ch"/> of this document</t>
                  <t>Related information: for Client Hints</t>
               </list>
            </t>
         </section>
      </section>
   </middle>
   <back>
      <references title="Normative References">
         <reference anchor="RFC5234">
            <front>
               <title>Augmented BNF for Syntax Specifications: ABNF</title>
               <author fullname="D. Crocker"
                       initials="D."
                       role="editor"
                       surname="Crocker"/>
               <author fullname="P. Overell" initials="P." surname="Overell"/>
               <date month="January" year="2008"/>
            </front>
            <seriesInfo name="STD" value="68"/>
            <seriesInfo name="RFC" value="5234"/>
            <seriesInfo name="DOI" value="10.17487/RFC5234"/>
         </reference>
         <reference anchor="RFC7231">
            <front>
               <title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
               <author fullname="R. Fielding"
                       initials="R."
                       role="editor"
                       surname="Fielding"/>
               <author fullname="J. Reschke"
                       initials="J."
                       role="editor"
                       surname="Reschke"/>
               <date month="June" year="2014"/>
            </front>
            <seriesInfo name="RFC" value="7231"/>
            <seriesInfo name="DOI" value="10.17487/RFC7231"/>
         </reference>
         <reference anchor="RFC7234">
            <front>
               <title>Hypertext Transfer Protocol (HTTP/1.1): Caching</title>
               <author fullname="R. Fielding"
                       initials="R."
                       role="editor"
                       surname="Fielding"/>
               <author fullname="M. Nottingham"
                       initials="M."
                       role="editor"
                       surname="Nottingham"/>
               <author fullname="J. Reschke"
                       initials="J."
                       role="editor"
                       surname="Reschke"/>
               <date month="June" year="2014"/>
            </front>
            <seriesInfo name="RFC" value="7234"/>
            <seriesInfo name="DOI" value="10.17487/RFC7234"/>
         </reference>
         <reference anchor="FETCH" target="https://fetch.spec.whatwg.org/">
            <front>
               <title>Fetch</title>
               <author fullname="Anne van Kesteren" initials="A." surname="van Kesteren">
                  <organization>Mozilla</organization>
               </author>
               <date year="n.d."/>
            </front>
         </reference>
         <reference anchor="RFC2119">
            <front>
               <title>Key words for use in RFCs to Indicate Requirement Levels</title>
               <author fullname="S. Bradner" initials="S." surname="Bradner"/>
               <date month="March" year="1997"/>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
         </reference>
         <reference anchor="RFC8174">
            <front>
               <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
               <author fullname="B. Leiba" initials="B." surname="Leiba"/>
               <date month="May" year="2017"/>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
         </reference>
         <reference anchor="I-D.ietf-httpbis-header-structure">
            <front>
               <title>Structured Field Values for HTTP</title>
               <author fullname="Mark Nottingham" initials="M" surname="Nottingham"/>
               <author fullname="Poul-Henning Kamp" initials="P" surname="Kamp"/>
               <date day="19" month="April" year="2020"/>
            </front>
            <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-header-structure-18"/>
         </reference>
      </references>
      <references title="Informative References">
         <reference anchor="RFC6265">
            <front>
               <title>HTTP State Management Mechanism</title>
               <author fullname="A. Barth" initials="A." surname="Barth"/>
               <date month="April" year="2011"/>
            </front>
            <seriesInfo name="RFC" value="6265"/>
            <seriesInfo name="DOI" value="10.17487/RFC6265"/>
         </reference>
         <reference anchor="UA-CH" target="https://wicg.github.io/ua-client-hints/">
            <front>
               <title>User Agent Client Hints</title>
               <author fullname="Mike West" initials="M." surname="West">
                  <organization>Google</organization>
               </author>
               <author fullname="Yoav Weiss" initials="Y." surname="Weiss">
                  <organization>Google</organization>
               </author>
               <date year="n.d."/>
            </front>
         </reference>
      </references>
      <section anchor="changes" title="Changes">
         <section anchor="since-00" title="Since -00">
            <t>
               <list style="symbols">
                  <t>Issue 168 (make Save-Data extensible) updated ABNF.</t>
                  <t>Issue 163 (CH review feedback) editorial feedback from httpwg list.</t>
                  <t>Issue 153 (NetInfo API citation) added normative reference.</t>
               </list>
            </t>
         </section>
         <section anchor="since-01" title="Since -01">
            <t>
               <list style="symbols">
                  <t>Issue 200: Moved Key reference to informative.</t>
                  <t>Issue 215: Extended passive fingerprinting and mitigation considerations.</t>
                  <t>Changed document status to experimental.</t>
               </list>
            </t>
         </section>
         <section anchor="since-02" title="Since -02">
            <t>
               <list style="symbols">
                  <t>Issue 239: Updated reference to CR-css-values-3</t>
                  <t>Issue 240: Updated reference for Network Information API</t>
                  <t>Issue 241: Consistency in IANA considerations</t>
                  <t>Issue 250: Clarified Accept-CH</t>
               </list>
            </t>
         </section>
         <section anchor="since-03" title="Since -03">
            <t>
               <list style="symbols">
                  <t>Issue 284: Extended guidance for Accept-CH</t>
                  <t>Issue 308: Editorial cleanup</t>
                  <t>Issue 306: Define Accept-CH-Lifetime</t>
               </list>
            </t>
         </section>
         <section anchor="since-04" title="Since -04">
            <t>
               <list style="symbols">
                  <t>Issue 361: Removed Downlink</t>
                  <t>Issue 361: Moved Key to appendix, plus other editorial feedback</t>
               </list>
            </t>
         </section>
         <section anchor="since-05" title="Since -05">
            <t>
               <list style="symbols">
                  <t>Issue 372: Scoped CH opt-in and delivery to secure transports</t>
                  <t>Issue 373: Bind CH opt-in to origin</t>
               </list>
            </t>
         </section>
         <section anchor="since-06" title="Since -06">
            <t>
               <list style="symbols">
                  <t>Issue 524: Save-Data is now defined by NetInfo spec, dropping</t>
                  <t>PR 775: Removed specific features to be defined in other specifications</t>
               </list>
            </t>
         </section>
         <section anchor="since-07" title="Since -07">
            <t>
               <list style="symbols">
                  <t>Issue 761: Clarified that the defined headers are response headers.</t>
                  <t>Issue 730: Replaced Key reference with Variants.</t>
                  <t>Issue 700: Replaced ABNF with structured headers.</t>
                  <t>PR 878: Removed Accept-CH-Lifetime based on feedback at IETF 105</t>
               </list>
            </t>
         </section>
         <section anchor="since-08" title="Since -08">
            <t>
               <list style="symbols">
                  <t>PR 985: Describe the bytesize cost of hints.</t>
                  <t>PR 776: Add Sec- and CH- prefix considerations.</t>
                  <t>PR 1001: Clear CH persistence when cookies are cleared.</t>
               </list>
            </t>
         </section>
         <section anchor="since-09" title="Since -09">
            <t>
               <list style="symbols">
                  <t>PR 1064: Fix merge issues with “cost of sending hints”.</t>
               </list>
            </t>
         </section>
         <section anchor="since-10" title="Since -10">
            <t>
               <list style="symbols">
                  <t>PR 1072: LC feedback from Julian Reschke.</t>
                  <t>PR 1080: Improve list style.</t>
                  <t>PR 1082: Remove section mentioning Variants.</t>
                  <t>PR 1097: Editorial feedback from mnot.</t>
                  <t>PR 1131: Remove unused references.</t>
                  <t>PR 1132: Remove nested list.</t>
               </list>
            </t>
         </section>
         <section anchor="since-11" title="Since -11">
            <t>
               <list style="symbols">
                  <t>PR 1134: Re-insert back section.</t>
               </list>
            </t>
         </section>
      </section>
      <section anchor="acknowledgements" numbered="false" title="Acknowledgements">
         <t>Thanks to Mark Nottingham, Julian Reschke, Chris Bentzel, Ben Greenstein, Tarun Bansal, Roy Fielding, Vasiliy Faronov, Ted Hardie, Jonas Sicking, Martin Thomson, and numerous other members of the IETF HTTP Working Group for invaluable help and feedback.</t>
      </section>
   </back>
</rfc>
