11.07.2015 Views

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

they would protect any system that contains or transports sensitivein<strong>for</strong>mation. In particular, log in<strong>for</strong>mation gathered at proxies oftencontains highly sensitive personal in<strong>for</strong>mation, and/or in<strong>for</strong>mationabout organizations. Log in<strong>for</strong>mation should be carefully guarded, andappropriate guidelines <strong>for</strong> use developed and followed. (Section15.1.1).<strong>Fielding</strong>, et al. Standards Track [Page 155]RFC <strong>2616</strong> HTTP/1.1 June 1999Caching proxies provide additional potential vulnerabilities, sincethe contents of the cache represent an attractive target <strong>for</strong>malicious exploitation. Because cache contents persist after an HTTPrequest is complete, an attack on the cache can reveal in<strong>for</strong>mationlong after a user believes that the in<strong>for</strong>mation has been removed fromthe network. There<strong>for</strong>e, cache contents should be protected assensitive in<strong>for</strong>mation.Proxy implementors should consider the privacy and securityimplications of their design and coding decisions, and of theconfiguration options they provide to proxy operators (especially thedefault configuration).Users of a proxy need to be aware that they are no trustworthier thanthe people who run the proxy; HTTP itself cannot solve this problem.The judicious use of cryptography, when appropriate, may suffice toprotect against a broad range of security and privacy attacks. Suchcryptography is beyond the scope of the HTTP/1.1 specification.15.7.1 Denial of Service Attacks on ProxiesThey exist. They are hard to defend against. Research continues.Beware.16 AcknowledgmentsThis specification makes heavy use of the augmented BNF and genericconstructs defined by David H. Crocker <strong>for</strong> RFC 822 [9]. Similarly, itreuses many of the definitions provided by Nathaniel Borenstein andNed Freed <strong>for</strong> MIME [7]. We hope that their inclusion in thisspecification will help reduce past confusion over the relationshipbetween HTTP and Internet mail message <strong>for</strong>mats.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!