Closed mnot closed 4 years ago
From 2028:
Expand on message parsing robustness regarding whitespace. Clarify that whitespace-delimited parsing by recipients is allowed.
Add requirement on recipients of whitespace between start-line and first header field to be consistent with implementations and safe from the header spoofing issues.
Reduce ABNF conformance by recipients to a SHOULD.
Addresses #411, #412, and #414
unassigned
to 22
incorporated
new
to closed
incorporated
to ``closed
to reopened
fixed
reopened
to closed
3.5 Message Parsing Robustness -- "When a server listening only for HTTP request messages, or processing what appears from the start-line to be an HTTP request message, receives a sequence of octets that does not match the HTTP-message grammar aside from the robustness exceptions listed above, the server must respond with an HTTP/1.1 400 (Bad Request) response." This makes several existing implementations non-conformant (because they silently digest whitespace in those empty lines). See also the issue above about Tolerant Applications and SP/HT in the top-line.
Reported by @mnot, migrated from https://trac.ietf.org/trac/httpbis/ticket/414