<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-masque-connect-ethernet-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="CONNECT-ETHERNET">Proxying Ethernet in HTTP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-masque-connect-ethernet-08"/>
    <author initials="A. R." surname="Sedeño" fullname="Alejandro R Sedeño">
      <organization>Google LLC</organization>
      <address>
        <email>asedeno@google.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="10"/>
    <area>Transport</area>
    <workgroup>Multiplexed Application Substrate over QUIC Encryption</workgroup>
    <keyword>quic</keyword>
    <keyword>http</keyword>
    <keyword>datagram</keyword>
    <keyword>VPN</keyword>
    <keyword>proxy</keyword>
    <keyword>tunnels</keyword>
    <keyword>masque</keyword>
    <keyword>http-ng</keyword>
    <keyword>layer-2</keyword>
    <keyword>ethernet</keyword>
    <abstract>
      <?line 55?>

<t>This document describes how to proxy Ethernet frames in HTTP. This protocol
is similar to IP proxying in HTTP, but for Layer 2 instead of Layer 3. More
specifically, this document defines a protocol that allows an HTTP client to
create a tunnel to exchange Layer 2 Ethernet frames through an HTTP server
with an attached physical or virtual Ethernet segment.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-masque.github.io/draft-ietf-masque-connect-ethernet/draft-ietf-masque-connect-ethernet.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-masque-connect-ethernet/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MASQUE Working Group mailing list (<eref target="mailto:masque@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/masque/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/masque/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-masque/draft-ietf-masque-connect-ethernet"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP provides the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>) for
creating a TCP <xref target="TCP"/> tunnel to a destination, a similar mechanism for
UDP <xref target="CONNECT-UDP"/>, and an additional mechanism for IP
<xref target="CONNECT-IP"/>. However, these mechanisms can't carry Layer 2 frames
without further encapsulation inside of IP, for instance with EtherIP
<xref target="ETHERIP"/> or L2TP <xref target="L2TP"/> <xref target="L2TPv3"/>, which
consume additional header bytes, reducing the available MTU.</t>
      <t>This document describes a protocol for exchanging IEEE 802.3 <xref target="IEEE802.3"/>
Ethernet frames with an HTTP server. Either participant in the HTTP connection
can then relay Ethernet frames to and from a local or virtual interface. This
can be used by a node to support remote bridging of two Ethernet broadcast
domains to establish a Layer 2 VPN. This can simplify connectivity to
network-connected appliances that are configured to only interact with peers
connected to the same Ethernet broadcast domain.</t>
      <t>This protocol supports all existing versions of HTTP by using HTTP Datagrams
<xref target="HTTP-DGRAM"/>. When using HTTP/2 <xref target="H2"/> or HTTP/3 <xref target="H3"/>, it uses
HTTP Extended CONNECT as described in <xref target="EXT-CONNECT2"/> and
<xref target="EXT-CONNECT3"/>. When using HTTP/1.x <xref target="H1"/>, it uses HTTP Upgrade as
defined in <xref section="7.8" sectionFormat="of" target="HTTP"/>.</t>
      <t>This protocol necessarily incurs additional encapsulation overhead. When possible,
users should use higher-level proxying protocols, such as connect-ip or
connect-udp.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, we use the term "Ethernet proxy" to refer to the HTTP server
that responds to the Ethernet proxying request. The term "client" is used in the
HTTP sense; the client constructs the Ethernet proxying request. If there are
HTTP intermediaries (as defined in <xref section="3.7" sectionFormat="of" target="HTTP"/>) between the client
and the Ethernet proxy, those are referred to as "intermediaries" in this
document. The term "Ethernet proxying endpoints" refers to both the client and
the Ethernet proxy.</t>
      <t>This document uses terminology from <xref target="QUIC"/>. Where this document
defines protocol types, the definition format uses the notation from <xref section="1.3" sectionFormat="of" target="QUIC"/>. This specification uses the variable-length integer encoding
from <xref section="16" sectionFormat="of" target="QUIC"/>. Variable-length integer values do not
need to be encoded in the minimum number of bytes necessary.</t>
      <t>Note that, when the HTTP version in use does not support multiplexing streams
(such as HTTP/1.1), any reference to "stream" in this document represents the
entire connection.</t>
    </section>
    <section anchor="client-config">
      <name>Configuration of Clients</name>
      <t>Clients are configured to use Ethernet proxying over HTTP via a URI Template
<xref target="TEMPLATE"/>. The URI Templates used by this protocol do not require
any variables; implementations or extensions <bcp14>MAY</bcp14> specify their own. URI
Templates specified for this protocol <bcp14>MAY</bcp14> use the well-known location
<xref target="WELL-KNOWN"/> registered by this document.</t>
      <t>Examples are shown below:</t>
      <artwork><![CDATA[
https://example.org/.well-known/masque/ethernet/
https://proxy.example.org:4443/masque/ethernet/
https://masque.example.org/?user=bob
]]></artwork>
      <t>An implementation that supports connecting to multiple Ethernet segments might
add a "vlan-identifier" variable to specify which segment to connect to. The
optionality of variables needs to be considered when defining the template so
that variables are either self-identifying or possible to exclude in the syntax.
How valid values for such variables are communicated to the client is not a part
of this protocol.</t>
      <t>Hypothetical examples are shown below:</t>
      <artwork><![CDATA[
https://proxy.example.org:4443/masque/ethernet?vlan={vlan-identifier}
https://etherproxy.example.org/{vlan-identifier}
]]></artwork>
      <t>The following requirements apply to the URI Template:</t>
      <ul spacing="normal">
        <li>
          <t>The URI Template <bcp14>MUST</bcp14> be a level 3 template or lower.</t>
        </li>
        <li>
          <t>The URI Template <bcp14>MUST</bcp14> be in absolute form and <bcp14>MUST</bcp14> include non-empty scheme,
authority, and path components.</t>
        </li>
        <li>
          <t>The path component of the URI Template <bcp14>MUST</bcp14> start with a slash "/".</t>
        </li>
        <li>
          <t>All template variables <bcp14>MUST</bcp14> be within the path or query components of the URI.</t>
        </li>
        <li>
          <t>The URI Template <bcp14>MUST NOT</bcp14> contain any non-ASCII Unicode characters and <bcp14>MUST</bcp14>
only contain ASCII characters in the range 0x21-0x7E inclusive (note that
percent-encoding is allowed; see <xref section="2.1" sectionFormat="of" target="URI"/>).</t>
        </li>
        <li>
          <t>The URI Template <bcp14>MUST NOT</bcp14> use Reserved Expansion ("+" operator), Fragment
Expansion ("#" operator), Label Expansion with Dot-Prefix, Path Segment
Expansion with Slash-Prefix, nor Path-Style Parameter Expansion with
Semicolon-Prefix.</t>
        </li>
      </ul>
      <t>Clients <bcp14>SHOULD</bcp14> validate the requirements above; however, clients <bcp14>MAY</bcp14> use a
general-purpose URI Template implementation that lacks this specific
validation. If a client detects that any of the requirements above are not met
by a URI Template, the client <bcp14>MUST</bcp14> reject its configuration and abort the
request without sending it to the Ethernet proxy.</t>
    </section>
    <section anchor="tunnelling-ethernet-over-http">
      <name>Tunnelling Ethernet over HTTP</name>
      <t>To allow negotiation of a tunnel for Ethernet over HTTP, this document defines
the "connect-ethernet" HTTP upgrade token. The resulting Ethernet tunnels use the
Capsule Protocol (see <xref section="3.2" sectionFormat="of" target="HTTP-DGRAM"/>) with HTTP Datagrams in the
format defined in <xref target="payload-format"/>.</t>
      <t>To initiate an Ethernet tunnel associated with a single HTTP stream, a client
issues a request containing the "connect-ethernet" upgrade token.</t>
      <t>By virtue of the definition of the Capsule Protocol (see <xref section="3.2" sectionFormat="of" target="HTTP-DGRAM"/>), Ethernet proxying requests do not carry any message content.
Similarly, successful Ethernet proxying responses also do not carry any message
content.</t>
      <t>Ethernet proxying over HTTP <bcp14>MUST</bcp14> be operated over TLS or QUIC encryption, or another
equivalent encryption protocol, to provide confidentiality, integrity, and
authentication.</t>
      <section anchor="ethernet-proxy-handling">
        <name>Ethernet Proxy Handling</name>
        <t>Upon receiving an Ethernet proxying request:</t>
        <ul spacing="normal">
          <li>
            <t>If the recipient is configured to use another HTTP proxy, it will act as an
intermediary by forwarding the request to another HTTP server. Note that
such intermediaries may need to re-encode the request if they forward it
using a version of HTTP that is different from the one used to receive it,
as the request encoding differs by version (see below).</t>
          </li>
          <li>
            <t>Otherwise, the recipient will act as an Ethernet proxy. The Ethernet proxy
can choose to reject the Ethernet proxying request or establish an Ethernet
tunnel.</t>
          </li>
        </ul>
        <t>The lifetime of the Ethernet tunnel is tied to the Ethernet proxying request
stream.</t>
        <t>A successful response (as defined in Sections <xref format="counter" target="resp1"/> and <xref format="counter" target="resp23"/>)
indicates that the Ethernet proxy has established an Ethernet tunnel and is
willing to proxy Ethernet frames. Any response other than a successful response
indicates that the request has failed; thus, the client <bcp14>MUST</bcp14> abort the request.</t>
      </section>
      <section anchor="req1">
        <name>HTTP/1.1 Request</name>
        <t>When using HTTP/1.1 <xref target="H1"/>, an Ethernet proxying request will meet the following
requirements:</t>
        <ul spacing="normal">
          <li>
            <t>The method <bcp14>SHALL</bcp14> be "GET".</t>
          </li>
          <li>
            <t>The request <bcp14>SHALL</bcp14> include a single Host header field containing the host
and optional port of the Ethernet proxy.</t>
          </li>
          <li>
            <t>The request <bcp14>SHALL</bcp14> include a Connection header field with value "Upgrade"
(note that this requirement is case-insensitive as per <xref section="7.6.1" sectionFormat="of" target="HTTP"/>).</t>
          </li>
          <li>
            <t>The request <bcp14>SHALL</bcp14> include an Upgrade header field with value "connect-ethernet".</t>
          </li>
        </ul>
        <t>An Ethernet proxying request that does not conform to these restrictions is
malformed. The recipient of such a malformed request <bcp14>MUST</bcp14> respond with an error
and <bcp14>SHOULD</bcp14> use the 400 (Bad Request) status code.</t>
        <t>For example, if the client is configured with the URI Template
"https://example.org/.well-known/masque/ethernet/" and wishes to open an
Ethernet tunnel, it could send the following request.</t>
        <figure anchor="fig-req-h1">
          <name>Example HTTP/1.1 Request</name>
          <sourcecode type="http-message"><![CDATA[
GET https://example.org/.well-known/masque/ethernet/ HTTP/1.1
Host: example.org
Connection: Upgrade
Upgrade: connect-ethernet
Capsule-Protocol: ?1
]]></sourcecode>
        </figure>
      </section>
      <section anchor="resp1">
        <name>HTTP/1.1 Response</name>
        <t>The server indicates success by replying with a response that conforms to the
following requirements:</t>
        <ul spacing="normal">
          <li>
            <t>The HTTP status code on the response <bcp14>SHALL</bcp14> be 101 (Switching Protocols).</t>
          </li>
          <li>
            <t>The response <bcp14>SHALL</bcp14> include a Connection header field with value "Upgrade"
(note that this requirement is case-insensitive as per <xref section="7.6.1" sectionFormat="of" target="HTTP"/>).</t>
          </li>
          <li>
            <t>The response <bcp14>SHALL</bcp14> include a single Upgrade header field with value
"connect-ethernet".</t>
          </li>
          <li>
            <t>The response <bcp14>SHALL</bcp14> meet the requirements of HTTP responses that start the
Capsule Protocol; see <xref section="3.2" sectionFormat="of" target="HTTP-DGRAM"/>.</t>
          </li>
        </ul>
        <t>If any of these requirements are not met, the client <bcp14>MUST</bcp14> treat this proxying
attempt as failed and close the connection.</t>
        <t>For example, the server could respond with:</t>
        <figure anchor="fig-resp-h1">
          <name>Example HTTP/1.1 Response</name>
          <sourcecode type="http-message"><![CDATA[
HTTP/1.1 101 Switching Protocols
Connection: Upgrade
Upgrade: connect-ethernet
Capsule-Protocol: ?1
]]></sourcecode>
        </figure>
      </section>
      <section anchor="req23">
        <name>HTTP/2 and HTTP/3 Requests</name>
        <t>When using HTTP/2 <xref target="H2"/> or HTTP/3 <xref target="H3"/>, Ethernet proxying requests use HTTP
Extended CONNECT. This requires that servers send an HTTP Setting as specified
in <xref target="EXT-CONNECT2"/> and <xref target="EXT-CONNECT3"/> and that requests use HTTP
pseudo-header fields with the following requirements:</t>
        <ul spacing="normal">
          <li>
            <t>The :method pseudo-header field <bcp14>SHALL</bcp14> be "CONNECT".</t>
          </li>
          <li>
            <t>The :protocol pseudo-header field <bcp14>SHALL</bcp14> be "connect-ethernet".</t>
          </li>
          <li>
            <t>The :authority pseudo-header field <bcp14>SHALL</bcp14> contain the authority of the IP
proxy.</t>
          </li>
          <li>
            <t>The :path and :scheme pseudo-header fields <bcp14>SHALL NOT</bcp14> be empty. Their values
<bcp14>SHALL</bcp14> contain the scheme and path from the configured URI Template; see
<xref target="client-config"/>.</t>
          </li>
        </ul>
        <t>An Ethernet proxying request that does not conform to these restrictions is
malformed; see <xref section="8.1.1" sectionFormat="of" target="H2"/> and <xref section="4.1.2" sectionFormat="of" target="H3"/>.</t>
        <t>For example, if the client is configured with the URI Template
"https://example.org/.well-known/masque/ethernet/" and wishes to open an
Ethernet tunnel, it could send the following request.</t>
        <figure anchor="fig-req-h2">
          <name>Example HTTP/2 or HTTP/3 Request</name>
          <sourcecode type="http-message"><![CDATA[
HEADERS
:method = CONNECT
:protocol = connect-ethernet
:scheme = https
:path = /.well-known/masque/ethernet/
:authority = example.org
capsule-protocol = ?1
]]></sourcecode>
        </figure>
      </section>
      <section anchor="resp23">
        <name>HTTP/2 and HTTP/3 Responses</name>
        <t>The server indicates success by replying with a response that conforms to the
following requirements:</t>
        <ul spacing="normal">
          <li>
            <t>The HTTP status code on the response <bcp14>SHALL</bcp14> be in the 2xx (Successful) range.</t>
          </li>
          <li>
            <t>The response <bcp14>SHALL</bcp14> meet the requirements of HTTP responses that start the
Capsule Protocol; see <xref section="3.2" sectionFormat="of" target="HTTP-DGRAM"/>.</t>
          </li>
        </ul>
        <t>If any of these requirements are not met, the client <bcp14>MUST</bcp14> treat this proxying
attempt as failed and abort the request. As an example, any status code in the
3xx range will be treated as a failure and cause the client to abort the
request.</t>
        <t>For example, the server could respond with:</t>
        <figure anchor="fig-resp-h2">
          <name>Example HTTP/2 or HTTP/3 Response</name>
          <sourcecode type="http-message"><![CDATA[
HEADERS
:status = 200
capsule-protocol = ?1
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="context-identifiers">
      <name>Context Identifiers</name>
      <t>The mechanism for proxying Ethernet in HTTP defined in this document allows
future extensions to exchange HTTP Datagrams that have different semantics,
similar to the extension mechanisms specified in <xref section="5" sectionFormat="of" target="CONNECT-IP"/>. Some of these extensions could augment Ethernet payloads with
additional data or compress Ethernet frame header fields. To provide this
extension point, all HTTP Datagrams associated with Ethernet proxying
request streams start with a Context ID field; see <xref target="payload-format"/>.</t>
      <t>Context IDs are 62-bit integers (0-2<sup>62</sup>-1). Context IDs are encoded as
variable-length integers; see <xref section="16" sectionFormat="of" target="QUIC"/>. The Context ID value of 0
is reserved for Ethernet payloads, while non-zero values are dynamically
allocated. Non-zero even-numbered Context-IDs are client allocated, and
odd-numbered Context IDs are proxy-allocated. The Context ID namespace is tied
to a given HTTP request; it is possible for a Context ID with the same numeric
value to be simultaneously allocated in distinct requests, potentially with
different semantics. Context IDs <bcp14>MUST NOT</bcp14> be re-allocated within a given HTTP
request but <bcp14>MAY</bcp14> be allocated in any order. The Context ID allocation
restrictions to the use of even-numbered and odd-numbered Context IDs exist in
order to avoid the need for synchronization between endpoints. However, once a
Context ID has been allocated, those restrictions do not apply to the use of the
Context ID; it can be used by either the client or the Ethernet proxy,
independent of which endpoint initially allocated it.</t>
      <t>Registration is the action by which an endpoint informs its peer of the
semantics and format of a given Context ID. This document does not define how
registration occurs. Future extensions <bcp14>MAY</bcp14> use HTTP header fields or capsules
to register Context IDs. Depending on the method being used, it is possible for
datagrams to be received with Context IDs that have not yet been registered.
For instance, this can be due to reordering of the packet containing the
datagram and the packet containing the registration message during transmission.</t>
    </section>
    <section anchor="payload-format">
      <name>HTTP Datagram Payload Format</name>
      <t>When associated with Ethernet proxying request streams, the HTTP Datagram
Payload field of HTTP Datagrams (see <xref target="HTTP-DGRAM"/>) has the format defined in
<xref target="dgram-format"/>. Note that when HTTP Datagrams are encoded using QUIC DATAGRAM
frames, the Context ID field defined below directly follows the Quarter Stream
ID field which is at the start of the QUIC DATAGRAM frame payload.</t>
      <figure anchor="dgram-format">
        <name>Ethernet Proxying HTTP Datagram Format</name>
        <artwork><![CDATA[
Ethernet Proxying HTTP Datagram Payload {
  Context ID (i),
  Payload (..),
}
]]></artwork>
      </figure>
      <t>The Ethernet Proxying HTTP Datagram Payload contains the following fields:</t>
      <dl spacing="compact">
        <dt>Context ID:</dt>
        <dd>
          <t>A variable-length integer that contains the value of the Context ID. If an
HTTP/3 datagram which carries an unknown Context ID is received, the receiver
<bcp14>SHALL</bcp14> either drop that datagram silently or buffer it temporarily (on the order
of a round trip) while awaiting the registration of the corresponding Context
ID.</t>
        </dd>
        <dt>Payload:</dt>
        <dd>
          <t>The payload of the datagram, whose semantics depend on value of the previous
field. Note that this field can be empty.</t>
        </dd>
      </dl>
      <t>Ethernet frames are encoded using HTTP Datagrams with the Context ID set to
zero. When the Context ID is set to zero, the Payload field contains a full
Layer 2 Ethernet Frame (from the MAC destination field until the last byte of
the Frame check sequence field), as defined by IEEE 802.3 <xref target="IEEE802.3"/>. A
complete frame could include include an IEEE 802.1Q <xref target="IEEE802.1Q"/> tag (see
<xref target="vlan-recommendations"/>).</t>
      <t>If an Ethernet proxy receives an HTTP Datagram before it has received the
corresponding request, it <bcp14>SHALL</bcp14> either drop that HTTP Datagram silently or
buffer it temporarily (on the order of a round trip) while awaiting the
corresponding request.</t>
      <t>Note that buffering datagrams (either because the request was not yet received
or because the Context ID is not yet known) consumes resources. Receivers that
buffer datagrams <bcp14>SHOULD</bcp14> apply buffering limits in order to reduce the risk of
resource exhaustion occurring. For example, receivers can limit the total number
of buffered datagrams or the cumulative size of buffered datagrams on a
per-stream, per-context, or per-connection basis.</t>
    </section>
    <section anchor="ethernet-frame-handling">
      <name>Ethernet Frame Handling</name>
      <t>This document defines a tunnelling mechanism that is conceptually an Ethernet
link. An Ethernet proxying connection established between two Ethernet proxying
endpoints emulates a single Ethernet link between those two endpoints. This
provides an Ethernet MAC service that will deliver each Ethernet frame that is
received at the ingress to the egress at the other end of the tunnel.</t>
      <t>Endpoints implementing this mechanism might need to handle some of the
responsibilities of an Ethernet switch or bridge if they do not delegate them to
another component of the endpoint such as a kernel. Those responsibilities are
beyond the scope of this document, and include, but are not limited to, the
handling of broadcast packets and multicast groups, or the local termination of
PAUSE frames.</t>
      <t>If an Ethernet proxying endpoint fails to deliver a frame to an underlying
Ethernet segment, the endpoint <bcp14>MUST</bcp14> drop the frame.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>Ethernet proxying in HTTP enables the bridging of Ethernet broadcast domains.
These examples are provided to help illustrate some of the ways in which Ethernet
proxying can be used.</t>
      <section anchor="example-remote">
        <name>Remote Access L2VPN</name>
        <t>The following example shows a point to point VPN setup where a client
appears to be connected to a remote Layer 2 network.</t>
        <figure anchor="diagram-tunnel">
          <name>L2VPN Tunnel Setup</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="128" width="520" viewBox="0 0 520 128" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 80,32 L 80,96" fill="none" stroke="black"/>
                <path d="M 248,32 L 248,96" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,96" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 80,32" fill="none" stroke="black"/>
                <path d="M 248,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 424,32 L 456,32" fill="none" stroke="black"/>
                <path d="M 80,48 L 248,48" fill="none" stroke="black"/>
                <path d="M 88,64 L 104,64" fill="none" stroke="black"/>
                <path d="M 224,64 L 240,64" fill="none" stroke="black"/>
                <path d="M 320,64 L 456,64" fill="none" stroke="black"/>
                <path d="M 80,80 L 248,80" fill="none" stroke="black"/>
                <path d="M 8,96 L 80,96" fill="none" stroke="black"/>
                <path d="M 248,96 L 320,96" fill="none" stroke="black"/>
                <path d="M 424,96 L 456,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="464,96 452,90.4 452,101.6" fill="black" transform="rotate(0,456,96)"/>
                <polygon class="arrowhead" points="464,64 452,58.4 452,69.6" fill="black" transform="rotate(0,456,64)"/>
                <polygon class="arrowhead" points="464,32 452,26.4 452,37.6" fill="black" transform="rotate(0,456,32)"/>
                <polygon class="arrowhead" points="96,64 84,58.4 84,69.6" fill="black" transform="rotate(180,88,64)"/>
                <g class="text">
                  <text x="484" y="36">HOST</text>
                  <text x="512" y="36">1</text>
                  <text x="284" y="52">L2</text>
                  <text x="360" y="52">Layer</text>
                  <text x="392" y="52">2</text>
                  <text x="44" y="68">Client</text>
                  <text x="128" y="68">Layer</text>
                  <text x="160" y="68">2</text>
                  <text x="196" y="68">Tunnel</text>
                  <text x="288" y="68">Proxy</text>
                  <text x="484" y="68">HOST</text>
                  <text x="512" y="68">2</text>
                  <text x="376" y="84">Broadcast</text>
                  <text x="364" y="100">Domain</text>
                  <text x="484" y="100">HOST</text>
                  <text x="512" y="100">3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+--------+                    +--------+            +---> HOST 1
|        +--------------------+   L2   |  Layer 2   |
| Client |<--Layer 2 Tunnel---|  Proxy +------------+---> HOST 2
|        +--------------------+        |  Broadcast |
+--------+                    +--------+  Domain    +---> HOST 3

]]></artwork>
          </artset>
        </figure>
        <t>In this case, the client connects to the Ethernet proxy and immediately can
start sending Ethernet frames to the attached broadcast domain.</t>
        <figure anchor="fig-full-tunnel">
          <name>VPN Full-Tunnel Example</name>
          <artwork><![CDATA[
[[ From Client ]]             [[ From Ethernet Proxy ]]

SETTINGS
  H3_DATAGRAM = 1

                              SETTINGS
                                ENABLE_CONNECT_PROTOCOL = 1
                                H3_DATAGRAM = 1

STREAM(44): HEADERS
:method = CONNECT
:protocol = connect-ethernet
:scheme = https
:path = /.well-known/masque/ethernet/
:authority = proxy.example.com
capsule-protocol = ?1

                              STREAM(44): HEADERS
                              :status = 200
                              capsule-protocol = ?1

DATAGRAM
Quarter Stream ID = 11
Context ID = 0
Payload = Encapsulated Ethernet Frame

                              DATAGRAM
                              Quarter Stream ID = 11
                              Context ID = 0
                              Payload = Encapsulated Ethernet Frame
]]></artwork>
        </figure>
      </section>
      <section anchor="site-to-site-l2vpn">
        <name>Site-to-Site L2VPN</name>
        <t>The following example shows a site-to-site VPN setup where a client
joins a locally attached broadcast domain to a remote broadcast domain
through the Proxy.</t>
        <figure anchor="diagram-s2s">
          <name>Site-to-site L2VPN Example</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="256" width="432" viewBox="0 0 432 256" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 80,32 L 80,96" fill="none" stroke="black"/>
                <path d="M 96,96 L 96,192" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
                <path d="M 280,32 L 280,96" fill="none" stroke="black"/>
                <path d="M 336,96 L 336,192" fill="none" stroke="black"/>
                <path d="M 352,32 L 352,96" fill="none" stroke="black"/>
                <path d="M 80,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 280,32 L 352,32" fill="none" stroke="black"/>
                <path d="M 152,48 L 280,48" fill="none" stroke="black"/>
                <path d="M 160,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 256,64 L 272,64" fill="none" stroke="black"/>
                <path d="M 152,80 L 280,80" fill="none" stroke="black"/>
                <path d="M 80,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 280,96 L 352,96" fill="none" stroke="black"/>
                <path d="M 64,128 L 96,128" fill="none" stroke="black"/>
                <path d="M 336,128 L 368,128" fill="none" stroke="black"/>
                <path d="M 64,160 L 96,160" fill="none" stroke="black"/>
                <path d="M 336,160 L 368,160" fill="none" stroke="black"/>
                <path d="M 64,192 L 96,192" fill="none" stroke="black"/>
                <path d="M 336,192 L 368,192" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="376,192 364,186.4 364,197.6" fill="black" transform="rotate(0,368,192)"/>
                <polygon class="arrowhead" points="376,160 364,154.4 364,165.6" fill="black" transform="rotate(0,368,160)"/>
                <polygon class="arrowhead" points="376,128 364,122.4 364,133.6" fill="black" transform="rotate(0,368,128)"/>
                <polygon class="arrowhead" points="72,192 60,186.4 60,197.6" fill="black" transform="rotate(180,64,192)"/>
                <polygon class="arrowhead" points="72,160 60,154.4 60,165.6" fill="black" transform="rotate(180,64,160)"/>
                <polygon class="arrowhead" points="72,128 60,122.4 60,133.6" fill="black" transform="rotate(180,64,128)"/>
                <g class="text">
                  <text x="316" y="52">L2</text>
                  <text x="116" y="68">Client</text>
                  <text x="188" y="68">L2</text>
                  <text x="228" y="68">Tunnel</text>
                  <text x="320" y="68">Proxy</text>
                  <text x="20" y="132">HOST</text>
                  <text x="48" y="132">A</text>
                  <text x="128" y="132">Layer</text>
                  <text x="160" y="132">2</text>
                  <text x="288" y="132">Layer</text>
                  <text x="320" y="132">2</text>
                  <text x="396" y="132">HOST</text>
                  <text x="424" y="132">1</text>
                  <text x="144" y="148">Broadcast</text>
                  <text x="288" y="148">Broadcast</text>
                  <text x="20" y="164">HOST</text>
                  <text x="48" y="164">B</text>
                  <text x="132" y="164">Domain</text>
                  <text x="300" y="164">Domain</text>
                  <text x="396" y="164">HOST</text>
                  <text x="424" y="164">2</text>
                  <text x="20" y="196">HOST</text>
                  <text x="48" y="196">C</text>
                  <text x="396" y="196">HOST</text>
                  <text x="424" y="196">3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
         +--------+               +--------+
         |        +---------------+   L2   |
         | Client |---L2 Tunnel---|  Proxy |
         |        +---------------+        |
         +-+------+               +------+-+
           |                             |
HOST A <---+ Layer 2             Layer 2 +---> HOST 1
           | Broadcast         Broadcast |
HOST B <---+ Domain               Domain +---> HOST 2
           |                             |
HOST C <---+                             +---> HOST 3



]]></artwork>
          </artset>
        </figure>
        <t>In this case, the client connects to the Ethernet proxy and immediately can
start relaying Ethernet frames from its attached broadcast domain to the
proxy. The difference between this example and <xref target="example-remote"/> is limited to
what the Client is doing with the the tunnel; the exchange between the Client
and the Proxy is the same as in <xref target="fig-full-tunnel"/> above.</t>
      </section>
    </section>
    <section anchor="performance-considerations">
      <name>Performance Considerations</name>
      <t>When the protocol running inside the tunnel uses congestion control (e.g.,
<xref target="TCP"/> or <xref target="QUIC"/>), the proxied traffic will incur at least two nested
congestion controllers. Implementers will benefit from reading the guidance in
<xref section="3.1.11" sectionFormat="of" target="UDP-USAGE"/>. By default the tunneling of Ethernet
frames <bcp14>MUST NOT</bcp14> assume that the carried Ethernet frames contain congestion
controlled traffic. Optimizations for traffic flows carried within the Ethernet
Frames <bcp14>MAY</bcp14> be done in cases where the content of the Ethernet Frames have been
identified to be congestion controlled traffic.</t>
      <t>Some implementations might find it benefitial to maintain a small buffer of
frames to be sent through the tunnel to smooth out short term variations and
bursts in tunnel capacity. As such a buffer is limited, Ethernet frames can get
dropped when the buffer limit is exceeded.</t>
      <t>When the protocol running inside the tunnel uses loss recovery (e.g., <xref target="TCP"/> or
<xref target="QUIC"/>) and the outer HTTP connection runs over TCP, the proxied traffic will
incur at least two nested loss recovery mechanisms. This can reduce performance,
as both can sometimes independently retransmit the same data. To avoid this,
Ethernet proxying <bcp14>SHOULD</bcp14> be performed over HTTP/3 to allow leveraging the QUIC
DATAGRAM frame.</t>
      <section anchor="mtu-and-frame-ordering-considerations">
        <name>MTU and Frame Ordering Considerations</name>
        <t>When using HTTP/3 with the QUIC Datagram extension <xref target="QUIC-DGRAM"/>,
Ethernet frames can be transmitted in QUIC DATAGRAM frames. Since DATAGRAM
frames cannot be fragmented, they can only carry Ethernet frames up to a given
length determined by the QUIC connection configuration and the Path MTU
(PMTU). Implementations <bcp14>MAY</bcp14> rely on <xref target="QUIC"/>'s use of <xref target="DPLPMTUD"/> to
probe and discover the PMTU over the connection's lifetime, and adjust any
associated interface MTU as needed. Furthermore, the UDP packets carrying these
frames could be reordered by the network.</t>
        <t>When using HTTP/1.1 or HTTP/2, and when using HTTP/3 without the QUIC Datagram
extension <xref target="QUIC-DGRAM"/>, Ethernet frames are transmitted in DATAGRAM capsules as
defined in <xref target="HTTP-DGRAM"/>. DATAGRAM capsules are transmitted reliably over an
underlying stream, maintaining frame order, though they could be split across
multiple QUIC or TCP packets.</t>
        <t>The trade-off between supporting a larger MTU and avoiding fragmentation should
be considered when deciding what mode(s) to operate in. Implementations <bcp14>SHOULD
NOT</bcp14> intentionally reorder Ethernet frames, but are not required to provide
guaranteed in-order delivery. If in-order delivery of Ethernet frames is
required, DATAGRAM capsules can be used.</t>
      </section>
      <section anchor="vlan-recommendations">
        <name>IEEE 802.1Q tagging</name>
        <t>When the proxy transports Etherent frames that carry an IEEE 802.1Q
<xref target="IEEE802.1Q"/> VLAN tag, these are by default transparently forwarded through
the tunnel. When the tunnel ingress and/or egress interprets the tags, there
must be agreement (signaled or manually configured) on how to consistently
process each tag at the ingress and the egress. The procedure for this
signalling/configuration is not defined in this document.</t>
        <t>A proxy that is used to access to multiple VLANs <bcp14>MAY</bcp14> map each individual
VLAN to a distinct URI, such that each Ethernet proxying request is
associated with only one VLAN. This provides flexibility in forwarding,
while meeting the requirements for the relative priority and ordering
between frames associated with a VLAN. To reduce overhead, the IEEE 802.1Q
field could be stripped and, when required, could be reapplied at the egress
associating the frame with the appropriate priority and VLAN.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are risks in allowing arbitrary clients to establish a tunnel to a Layer 2
network. Bad actors could abuse this capability to attack hosts on that network
that they would otherwise be unable to reach. HTTP servers that support Ethernet
proxying <bcp14>SHOULD</bcp14> restrict its use to authenticated users. Depending on the
deployment, possible authentication mechanisms include mutual TLS between IP
proxying endpoints, HTTP-based authentication via the HTTP Authorization header
<xref target="HTTP"/>, or even bearer tokens. Proxies can enforce policies for authenticated
users to further constrain client behavior or deal with possible abuse. For
example, proxies can rate limit individual clients that send an excessively
large amount of traffic through the proxy.</t>
      <t>Users of this protocol may send arbitrary Ethernet frames through the tunnel,
including frames with arbitrary source MAC addresses. This could allow
impersonation of other hosts, poisoning of ARP <xref target="RFC826"/>, NDP <xref target="RFC4861"/> and
CAM (Content Addressable Memory) tables, and cause a denial of service to other
hosts on the network. These are the same attacks available to an arbitrary
client with physical access to the network. An implementation that is intended
for point-to-site connections might limit clients to a single source MAC
address, or Ethernet proxying endpoints might be configured to limit forwarding
to pre-configured MAC addresses, or clients could be authenticated by
<xref target="IEEE802.1X"/> Port Based Network Access Control, though such filtering is outside
the scope of this protocol. Dynamic signalling or negotiation of MAC address
filtering is left to future extensions.</t>
      <t>This protocol is agnostic to where on the Ethernet segment a gateway for
higher-level routing might be located. A client may connect via an Ethernet
proxy and discover an existing gateway on the Ethernet segment, supply a new
gateway to the Ethernet segment, both, or neither.</t>
      <t>Opportunistic sending of Ethernet frames is not allowed in HTTP/1.x
because a server could reject the HTTP Upgrade and attempt to parse
the Ethernet frames as a subsequent HTTP request, allowing request
smuggling attacks; see
<xref target="OPTIMISTIC"/>. In
particular, an intermediary that re-encodes a request from HTTP/2 or 3
to HTTP/1.1 <bcp14>MUST NOT</bcp14> forward any received capsules until it has parsed
a successful Ethernet proxying response.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="http-upgrade-token">
        <name>HTTP Upgrade Token</name>
        <t>This document will request IANA to register "connect-ethernet" in the HTTP
Upgrade Token Registry maintained at
&lt;<eref target="https://www.iana.org/assignments/http-upgrade-tokens"/>&gt;.</t>
        <dl spacing="compact">
          <dt>Value:</dt>
          <dd>
            <t>connect-ethernet</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>Proxying of Ethernet Payloads</t>
          </dd>
          <dt>Expected Version Tokens:</dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>References:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
      </section>
      <section anchor="iana-suffix">
        <name>Updates to the MASQUE URI Suffixes Registry</name>
        <t>This document will request IANA to register "ethernet" in the MASQUE URI
Suffixes Registry maintained at &lt;<eref target="https://www.iana.org/assignments/masque"/>&gt;,
created by <xref section="12.2" sectionFormat="of" target="CONNECT-IP"/>.</t>
        <table anchor="iana-suffixes-table">
          <name>New MASQUE URI Suffixes</name>
          <thead>
            <tr>
              <th align="left">Path Segment</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ethernet</td>
              <td align="left">Ethernet Proxying</td>
              <td align="left">This Document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="H1" to="HTTP/1.1"/>
    <displayreference target="H2" to="HTTP/2"/>
    <displayreference target="H3" to="HTTP/3"/>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="H1">
          <front>
            <title>HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
              <t>This document obsoletes portions of RFC 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="99"/>
          <seriesInfo name="RFC" value="9112"/>
          <seriesInfo name="DOI" value="10.17487/RFC9112"/>
        </reference>
        <reference anchor="H2">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="H3">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="IEEE802.3">
          <front>
            <title>IEEE Standard for Ethernet</title>
            <author>
              <organization/>
            </author>
            <date month="July" year="2022"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2022.9844436"/>
          <seriesInfo name="ISBN" value="[&quot;9781504487252&quot;]"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="IEEE802.1Q">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks--Bridges and Bridged Networks</title>
            <author>
              <organization/>
            </author>
            <date month="December" year="2022"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2022.10004498"/>
          <seriesInfo name="ISBN" value="[&quot;9781504491884&quot;]"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="TCP">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
        <reference anchor="HTTP-DGRAM">
          <front>
            <title>HTTP Datagrams and the Capsule Protocol</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="L. Pardue" initials="L." surname="Pardue"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection.</t>
              <t>In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.</t>
              <t>HTTP Datagrams and the Capsule Protocol are intended for use by HTTP extensions, not applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9297"/>
          <seriesInfo name="DOI" value="10.17487/RFC9297"/>
        </reference>
        <reference anchor="EXT-CONNECT2">
          <front>
            <title>Bootstrapping WebSockets with HTTP/2</title>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document defines a mechanism for running the WebSocket Protocol (RFC 6455) over a single stream of an HTTP/2 connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8441"/>
          <seriesInfo name="DOI" value="10.17487/RFC8441"/>
        </reference>
        <reference anchor="EXT-CONNECT3">
          <front>
            <title>Bootstrapping WebSockets with HTTP/3</title>
            <author fullname="R. Hamilton" initials="R." surname="Hamilton"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9220"/>
          <seriesInfo name="DOI" value="10.17487/RFC9220"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="TEMPLATE">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="WELL-KNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="QUIC-DGRAM">
          <front>
            <title>An Unreliable Datagram Extension to QUIC</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9221"/>
          <seriesInfo name="DOI" value="10.17487/RFC9221"/>
        </reference>
        <reference anchor="DPLPMTUD">
          <front>
            <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
            <author fullname="T. Völker" initials="T." surname="Völker"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
              <t>The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
              <t>This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8899"/>
          <seriesInfo name="DOI" value="10.17487/RFC8899"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IEEE802.1X">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks--Port-Based Network Access Control</title>
            <author>
              <organization/>
            </author>
            <date month="February" year="2020"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2020.9018454"/>
          <seriesInfo name="ISBN" value="[&quot;9781504464406&quot;]"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="ETHERIP">
          <front>
            <title>EtherIP: Tunneling Ethernet Frames in IP Datagrams</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="September" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3378"/>
          <seriesInfo name="DOI" value="10.17487/RFC3378"/>
        </reference>
        <reference anchor="L2TP">
          <front>
            <title>Layer Two Tunneling Protocol "L2TP"</title>
            <author fullname="W. Townsley" initials="W." surname="Townsley"/>
            <author fullname="A. Valencia" initials="A." surname="Valencia"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="G. Pall" initials="G." surname="Pall"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="B. Palter" initials="B." surname="Palter"/>
            <date month="August" year="1999"/>
            <abstract>
              <t>This document describes the Layer Two Tunneling Protocol (L2TP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2661"/>
          <seriesInfo name="DOI" value="10.17487/RFC2661"/>
        </reference>
        <reference anchor="L2TPv3">
          <front>
            <title>Layer Two Tunneling Protocol - Version 3 (L2TPv3)</title>
            <author fullname="J. Lau" initials="J." role="editor" surname="Lau"/>
            <author fullname="M. Townsley" initials="M." role="editor" surname="Townsley"/>
            <author fullname="I. Goyret" initials="I." role="editor" surname="Goyret"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document describes "version 3" of the Layer Two Tunneling Protocol (L2TPv3). L2TPv3 defines the base control protocol and encapsulation for tunneling multiple Layer 2 connections between two IP nodes. Additional documents detail the specifics for each data link type being emulated. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3931"/>
          <seriesInfo name="DOI" value="10.17487/RFC3931"/>
        </reference>
        <reference anchor="UDP-USAGE">
          <front>
            <title>UDP Usage Guidelines</title>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="RFC826">
          <front>
            <title>An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware</title>
            <author fullname="D. Plummer" initials="D." surname="Plummer"/>
            <date month="November" year="1982"/>
            <abstract>
              <t>The purpose of this RFC is to present a method of Converting Protocol Addresses (e.g., IP addresses) to Local Network Addresses (e.g., Ethernet addresses). This is an issue of general concern in the ARPA Internet Community at this time. The method proposed here is presented for your consideration and comment. This is not the specification of an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="37"/>
          <seriesInfo name="RFC" value="826"/>
          <seriesInfo name="DOI" value="10.17487/RFC0826"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="OPTIMISTIC">
          <front>
            <title>Security Considerations for Optimistic Protocol Transitions in HTTP/1.1</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="18" month="September" year="2025"/>
            <abstract>
              <t>   In HTTP/1.1, the client can request a change to a new protocol on the
   existing connection.  This document discusses the security
   considerations that apply to data sent by the client before this
   request is confirmed, and adds new requirements to RFC 9112 and RFC
   9298 to avoid related security issues.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-optimistic-upgrade-06"/>
        </reference>
      </references>
    </references>
    <?line 686?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much of the initial version of this draft borrows heavily from <xref target="CONNECT-IP"/>.</t>
      <t>The author would like to thank Alexander Chernyakhovsky and David Schinazi
for their advice while preparing this document, and Etienne Dechamps for
useful discussion on the subject material. Additionally, Mirja Kühlewind,
Magnus Westerlund, Martin Thompson, and Gorry Fairhurst provided valuable
feedback on the document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
