11.07.2015 Views

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The in<strong>for</strong>mation sent in the From field might conflict with the user'sprivacy interests or their site's security policy, and hence itSHOULD NOT be transmitted without the user being able to disable,enable, and modify the contents of the field. The user MUST be ableto set the contents of this field within a user preference orapplication defaults configuration.We suggest, though do not require, that a convenient toggle interfacebe provided <strong>for</strong> the user to enable or disable the sending of From andReferer in<strong>for</strong>mation.The User-Agent (section 14.43) or Server (section 14.38) headerfields can sometimes be used to determine that a specific client orserver have a particular security hole which might be exploited.Un<strong>for</strong>tunately, this same in<strong>for</strong>mation is often used <strong>for</strong> other valuablepurposes <strong>for</strong> which HTTP currently has no better mechanism.15.1.3 Encoding Sensitive In<strong>for</strong>mation in URI'sBecause the source of a link might be private in<strong>for</strong>mation or mightreveal an otherwise private in<strong>for</strong>mation source, it is stronglyrecommended that the user be able to select whether or not theReferer field is sent. For example, a browser client could have atoggle switch <strong>for</strong> browsing openly/anonymously, which wouldrespectively enable/disable the sending of Referer and Fromin<strong>for</strong>mation.Clients SHOULD NOT include a Referer header field in a (non-secure)HTTP request if the referring page was transferred with a secureprotocol.Authors of services which use the HTTP protocol SHOULD NOT use GETbased <strong>for</strong>ms <strong>for</strong> the submission of sensitive data, because this willcause this data to be encoded in the <strong>Request</strong>-URI. Many existingservers, proxies, and user agents will log the request URI in someplace where it might be visible to third parties. Servers can usePOST-based <strong>for</strong>m submission instead15.1.4 Privacy Issues Connected to Accept HeadersAccept request-headers can reveal in<strong>for</strong>mation about the user to allservers which are accessed. The Accept-Language header in particularcan reveal in<strong>for</strong>mation the user would consider to be of a privatenature, because the understanding of particular languages is often<strong>Fielding</strong>, et al. Standards Track [Page 152]RFC <strong>2616</strong> HTTP/1.1 June 1999

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!