RFC 9292




Internet Engineering Task Force (IETF)                        M. Thomson
Request for Comments: 9292                                       Mozilla
Category: Standards Track                                     C. A. Wood
ISSN: 2070-1721                                               Cloudflare
                                                             August 2022


                 Binary Representation of HTTP Messages

Abstract



   This document defines a binary format for representing HTTP messages.

Status of This Memo



   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9292.

Copyright Notice



   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents



   1.  Introduction
   2.  Conventions and Definitions
   3.  Format
     3.1.  Known-Length Messages
     3.2.  Indeterminate-Length Messages
     3.3.  Framing Indicator
     3.4.  Request Control Data
     3.5.  Response Control Data
       3.5.1.  Informational Status Codes
     3.6.  Header and Trailer Field Lines
     3.7.  Content
     3.8.  Padding and Truncation
   4.  Invalid Messages
   5.  Examples
     5.1.  Request Example
     5.2.  Response Example
   6.  Notable Differences with HTTP Protocol Messages
   7.  "message/bhttp" Media Type
   8.  Security Considerations
   9.  IANA Considerations
   10. References
     10.1.  Normative References
     10.2.  Informative References
   Acknowledgments

   Authors' Addresses



1.  Introduction



   This document defines a simple format for representing an HTTP
   message [HTTP], either request or response.  This allows for the
   encoding of HTTP messages that can be conveyed outside an HTTP
   protocol.  This enables the transformation of entire messages,
   including the application of authenticated encryption.

   The design of this format is informed by the framing structure of
   HTTP/2 [HTTP/2] and HTTP/3 [HTTP/3].  Rules for constructing messages
   rely on the rules defined in HTTP/2, but the format itself is
   distinct; see Section 6.

   This format defines "message/bhttp", a binary alternative to the
   "message/http" content type defined in [HTTP/1.1].  A binary format
   permits more efficient encoding and processing of messages.  A binary
   format also reduces exposure to security problems related to
   processing of HTTP messages.

   Two modes for encoding are described:

   *  a known-length encoding includes length prefixes for all major
      message components, and

   *  an indeterminate-length encoding enables efficient generation of
      messages where lengths are not known when encoding starts.

   This format is designed to convey the semantics of valid HTTP
   messages as simply and efficiently as possible.  It is not designed
   to capture all of the details of the encoding of messages from
   specific HTTP versions [HTTP/1.1] [HTTP/2] [HTTP/3].  As such, this
   format is unlikely to be suitable for applications that depend on an
   exact recording of the encoding of messages.

2.  Conventions and Definitions



   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   This document uses terminology from HTTP [HTTP] and notation from
   QUIC (Section 1.3 of [QUIC]).

3.  Format



   Section 6 of [HTTP] defines the general structure of HTTP messages
   and composes those messages into distinct parts.  This format
   describes how those parts are composed into a sequence of bytes.  At
   a high level, binary messages are comprised of:

   1.  Framing indicator.  This format uses a single integer to describe
       framing, which describes whether the message is a request or
       response and how subsequent sections are formatted; see
       Section 3.3.

   2.  For a response, zero or more informational responses.  Each
       informational response consists of an informational status code
       and header section.

   3.  Control data.  For a request, this contains the request method
       and target.  For a response, this contains the status code.

   4.  Header section.  This contains zero or more header fields.



   5.  Content.  This is a sequence of zero or more bytes.



   6.  Trailer section.  This contains zero or more trailer fields.



   7.  Optional padding.  Any amount of zero-valued bytes.



   All lengths and numeric values are encoded using the variable-length
   integer encoding from Section 16 of [QUIC].  Integer values do not
   need to be encoded on the minimum number of bytes necessary.

3.1.  Known-Length Messages



   A request or response that has a known length at the time of
   construction uses the format shown in Figure 1.

   Known-Length Request {
     Framing Indicator (i) = 0,
     Request Control Data (..),
     Known-Length Field Section (..),
     Known-Length Content (..),
     Known-Length Field Section (..),
     Padding (..),
   }

   Known-Length Response {
     Framing Indicator (i) = 1,
     Known-Length Informational Response (..) ...,
     Final Response Control Data (..),
     Known-Length Field Section (..),
     Known-Length Content (..),
     Known-Length Field Section (..),
     Padding (..),
   }

   Known-Length Field Section {
     Length (i),
     Field Line (..) ...,
   }

   Known-Length Content {
     Content Length (i),
     Content (..),
   }

   Known-Length Informational Response {
     Informational Response Control Data (..),
     Known-Length Field Section (..),
   }

                       Figure 1: Known-Length Message

   A known-length request consists of a framing indicator (Section 3.3),
   request control data (Section 3.4), a header section with a length
   prefix, binary content with a length prefix, a trailer section with a
   length prefix, and padding.

   A known-length response contains the same fields, with the exception
   that request control data is replaced by zero or more informational
   responses (Section 3.5.1) followed by response control data
   (Section 3.5).

   For a known-length encoding, the length prefix on field sections and
   content is a variable-length encoding of an integer.  This integer is
   the number of bytes in the field section or content, not including
   the length field itself.

   Fields in the header and trailer sections consist of a length-
   prefixed name and length-prefixed value; see Section 3.6.

   The format allows for the message to be truncated before any of the
   length prefixes that precede the field sections or content; see
   Section 3.8.

   The variable-length integer encoding means that there is a limit of
   2^62-1 bytes for each field section and the message content.

3.2.  Indeterminate-Length Messages



   A request or response that is constructed without encoding a known
   length for each section uses the format shown in Figure 2:

   Indeterminate-Length Request  {
     Framing Indicator (i) = 2,
     Request Control Data (..),
     Indeterminate-Length Field Section (..),
     Indeterminate-Length Content (..),
     Indeterminate-Length Field Section (..),
     Padding (..),
   }

   Indeterminate-Length Response  {
     Framing Indicator (i) = 3,
     Indeterminate-Length Informational Response (..) ...,
     Final Response Control Data (..),
     Indeterminate-Length Field Section (..),
     Indeterminate-Length Content (..),
     Indeterminate-Length Field Section (..),
     Padding (..),
   }

   Indeterminate-Length Content {
     Indeterminate-Length Content Chunk (..) ...,
     Content Terminator (i) = 0,
   }

   Indeterminate-Length Content Chunk {
     Chunk Length (i) = 1..,
     Chunk (..),
   }

   Indeterminate-Length Field Section {
     Field Line (..) ...,
     Content Terminator (i) = 0,
   }

   Indeterminate-Length Informational Response {
     Informational Response Control Data (..),
     Indeterminate-Length Field Section (..),
   }

                   Figure 2: Indeterminate-Length Message

   An indeterminate-length request consists of a framing indicator
   (Section 3.3), request control data (Section 3.4), a header section
   that is terminated by a zero value, any number of non-zero-length
   chunks of binary content, a zero value, a trailer section that is
   terminated by a zero value, and padding.

   An indeterminate-length response contains the same fields, with the
   exception that request control data is replaced by zero or more
   informational responses (Section 3.5.1) and response control data
   (Section 3.5).

   The indeterminate-length encoding only uses length prefixes for
   content blocks.  Multiple length-prefixed portions of content can be
   included, each prefixed by a non-zero Chunk Length integer describing
   the number of bytes in the block.  The Chunk Length is encoded as a
   variable-length integer.

   Each Field Line in an Indeterminate-Length Field Section starts with
   a Name Length field.  An Indeterminate-Length Field Section ends with
   a Content Terminator field.  The zero value of the Content Terminator
   distinguishes it from the Name Length field, which cannot contain a
   value of 0.

   Indeterminate-length messages can be truncated in a way similar to
   that for known-length messages; see Section 3.8.

   Indeterminate-length messages use the same encoding for Field Line as
   known-length messages; see Section 3.6.

3.3.  Framing Indicator



   The start of each binary message is a framing indicator that is a
   single integer that describes the structure of the subsequent
   sections.  The framing indicator can take just four values:

   *  A value of 0 describes a request of known length.

   *  A value of 1 describes a response of known length.

   *  A value of 2 describes a request of indeterminate length.

   *  A value of 3 describes a response of indeterminate length.

   Other values cause the message to be invalid; see Section 4.

3.4.  Request Control Data



   The control data for a request message contains the method and
   request target.  That information is encoded as an ordered sequence
   of fields: Method, Scheme, Authority, Path.  Each of these fields is
   prefixed with a length.

   The values of these fields follow the rules in HTTP/2 (Section 8.3.1
   of [HTTP/2]) that apply to the ":method", ":scheme", ":authority",
   and ":path" pseudo-header fields, respectively.  However, where the
   ":authority" pseudo-header field might be omitted in HTTP/2, a zero-
   length value is encoded instead.

   The format of request control data is shown in Figure 3.

   Request Control Data {
     Method Length (i),
     Method (..),
     Scheme Length (i),
     Scheme (..),
     Authority Length (i),
     Authority (..),
     Path Length (i),
     Path (..),
   }

                  Figure 3: Format of Request Control Data

3.5.  Response Control Data



   The control data for a response message consists of the status code.
   The status code (Section 15 of [HTTP]) is encoded as a variable-
   length integer, not a length-prefixed decimal string.

   The format of final response control data is shown in Figure 4.

   Final Response Control Data {
     Status Code (i) = 200..599,
   }

              Figure 4: Format of Final Response Control Data

3.5.1.  Informational Status Codes



   Responses that include informational status codes (see Section 15.2
   of [HTTP]) are encoded by repeating the response control data and
   associated header section until a final status code is encoded; that
   is, a Status Code field with a value from 200 to 599 (inclusive).
   The status code distinguishes between informational and final
   responses.

   The format of the informational response control data is shown in
   Figure 5.

   Informational Response Control Data {
     Status Code (i) = 100..199,
   }

          Figure 5: Format of Informational Response Control Data

   A response message can include any number of informational responses
   that precede a final status code.  These convey an informational
   status code and a header block.

   If the response control data includes an informational status code
   (that is, a value between 100 and 199 inclusive), the control data is
   followed by a header section (encoded with known length or
   indeterminate length according to the framing indicator) and another
   block of control data.  This pattern repeats until the control data
   contains a final status code (200 to 599 inclusive).

3.6.  Header and Trailer Field Lines



   Header and trailer sections consist of zero or more field lines; see
   Section 5 of [HTTP].  The format of a field section depends on
   whether the message is of known length or indeterminate length.

   Each Field Line encoding includes a name and a value.  Both the name
   and value are length-prefixed sequences of bytes.  The Name field is
   a minimum of one byte.  The format of a Field Line is shown in
   Figure 6.

   Field Line {
     Name Length (i) = 1..,
     Name (..),
     Value Length (i),
     Value (..),
   }

                      Figure 6: Format of a Field Line

   For field names, byte values that are not permitted in an HTTP field
   name cause the message to be invalid; see Section 5.1 of [HTTP] for a
   definition of what is valid and Section 4 regarding the handling of
   invalid messages.  A recipient MUST treat a message that contains
   field values that would cause an HTTP/2 message to be malformed
   according to Section 8.2.1 of [HTTP/2] as invalid; see Section 4.

   The same field name can be repeated over more than one field line;
   see Section 5.2 of [HTTP] for the semantics of repeated field names
   and rules for combining values.

   Messages are invalid (Section 4) if they contain fields named
   ":method", ":scheme", ":authority", ":path", or ":status".  Other
   pseudo-fields that are defined by protocol extensions MAY be
   included; pseudo-fields cannot be included in trailers (see
   Section 8.1 of [HTTP/2]).  A Field Line containing pseudo-fields MUST
   precede other Field Line values.  A message that contains a pseudo-
   field after any other field is invalid; see Section 4.

   Fields that relate to connections (Section 7.6.1 of [HTTP]) cannot be
   used to produce the effect on a connection in this context.  These
   fields SHOULD be removed when constructing a binary message.
   However, they do not cause a message to be invalid (Section 4);
   permitting these fields allows a binary message to capture messages
   that are exchanged in a protocol context.

   Like HTTP/2 or HTTP/3, this format has an exception for the
   combination of multiple instances of the Cookie field.  Instances of
   fields with the ASCII-encoded value of "cookie" are combined using a
   semicolon octet (0x3b) rather than a comma; see Section 8.2.3 of
   [HTTP/2].

3.7.  Content



   The content of messages is a sequence of bytes of any length.  Though
   a known-length message has a limit, this limit is large enough that
   it is unlikely to be a practical limitation.  There is no limit to
   the size of content in an indeterminate-length message.

3.8.  Padding and Truncation



   Messages can be padded with any number of zero-valued bytes.  Non-
   zero padding bytes cause a message to be invalid (see Section 4).
   Unlike other parts of a message, a processor MAY decide not to
   validate the value of padding bytes.

   Truncation can be used to reduce the size of messages that have no
   data in trailing field sections or content.  If the trailers of a
   message are empty, they MAY be omitted by the encoder in place of
   adding a length field equal to zero.  An encoder MAY omit empty
   content in the same way if the trailers are also empty.  A message
   that is truncated at any other point is invalid; see Section 4.

   Decoders MUST treat missing truncated fields as equivalent to having
   been sent with the length field set to zero.

   Padding is compatible with truncation of empty parts of the messages.
   Zero-valued bytes will be interpreted as a zero-length part, which is
   semantically equivalent to the part being absent.

4.  Invalid Messages

   This document describes a number of ways that a message can be
   invalid.  Invalid messages MUST NOT be processed further except to
   log an error and produce an error response.

   The format is designed to allow incremental processing.
   Implementations need to be aware of the possibility that an error
   might be detected after performing incremental processing.

5.  Examples

   This section includes example requests and responses encoded in both
   known-length and indeterminate-length forms.

5.1.  Request Example



   The example HTTP/1.1 message in Figure 7 shows the content in the
   "message/http" format.

   Valid HTTP/1.1 messages require lines terminated with CRLF (the two
   bytes 0x0d and 0x0a).  For simplicity and consistency, the content of
   these examples is limited to text, which also uses CRLF for line
   endings.

   GET /hello.txt HTTP/1.1
   User-Agent: curl/7.16.3 libcurl/7.16.3 OpenSSL/0.9.7l zlib/1.2.3
   Host: www.example.com
   Accept-Language: en, mi

                       Figure 7: Sample HTTP Request

   This can be expressed as a binary message (type "message/bhttp")
   using a known-length encoding as shown in hexadecimal in Figure 8.
   Figure 8 includes text alongside to show that most of the content is
   not modified.

   00034745 54056874 74707300 0a2f6865  ..GET.https../he
   6c6c6f2e 74787440 6c0a7573 65722d61  llo.txt@l.user-a
   67656e74 34637572 6c2f372e 31362e33  gent4curl/7.16.3
   206c6962 6375726c 2f372e31 362e3320   libcurl/7.16.3
   4f70656e 53534c2f 302e392e 376c207a  OpenSSL/0.9.7l z
   6c69622f 312e322e 3304686f 73740f77  lib/1.2.3.host.w
   77772e65 78616d70 6c652e63 6f6d0f61  ww.example.com.a
   63636570 742d6c61 6e677561 67650665  ccept-language.e
   6e2c206d 690000                      n, mi..

             Figure 8: Known-Length Binary Encoding of Request

   This example shows that the Host header field is not replicated in
   the ":authority" field, as is required for ensuring that the request
   is reproduced accurately; see Section 8.3.1 of [HTTP/2].

   The same message can be truncated with no effect on interpretation.
   In this case, the last two bytes -- corresponding to content and a
   trailer section -- can each be removed without altering the semantics
   of the message.

   The same message, encoded using an indeterminate-length encoding, is
   shown in Figure 9.  As the content of this message is empty, the
   difference in formats is negligible.

   02034745 54056874 74707300 0a2f6865  ..GET.https../he
   6c6c6f2e 7478740a 75736572 2d616765  llo.txt.user-age
   6e743463 75726c2f 372e3136 2e33206c  nt4curl/7.16.3 l
   69626375 726c2f37 2e31362e 33204f70  ibcurl/7.16.3 Op
   656e5353 4c2f302e 392e376c 207a6c69  enSSL/0.9.7l zli
   622f312e 322e3304 686f7374 0f777777  b/1.2.3.host.www
   2e657861 6d706c65 2e636f6d 0f616363  .example.com.acc
   6570742d 6c616e67 75616765 06656e2c  ept-language.en,
   206d6900 00000000 00000000 00000000   mi.............

         Figure 9: Indeterminate-Length Binary Encoding of Request

   This indeterminate-length encoding contains 10 bytes of padding.  As
   two additional bytes can be truncated in the same way as the known-
   length example, anything up to 12 bytes can be removed from this
   message without affecting its meaning.

5.2.  Response Example



   Response messages can contain interim (1xx) status codes, as the
   message in Figure 10 shows.  Figure 10 includes examples of
   informational status codes 102 and 103, as defined in [RFC2518] (now
   obsolete but defines status code 102) and [RFC8297], respectively.

   HTTP/1.1 102 Processing
   Running: "sleep 15"

   HTTP/1.1 103 Early Hints
   Link: </style.css>; rel=preload; as=style
   Link: </script.js>; rel=preload; as=script

   HTTP/1.1 200 OK
   Date: Mon, 27 Jul 2009 12:28:53 GMT
   Server: Apache
   Last-Modified: Wed, 22 Jul 2009 19:15:56 GMT
   ETag: "34aa387-d-1568eb00"
   Accept-Ranges: bytes
   Content-Length: 51
   Vary: Accept-Encoding
   Content-Type: text/plain

   Hello World! My content includes a trailing CRLF.

                      Figure 10: Sample HTTP Response

   As this is a longer example, only the indeterminate-length encoding
   is shown in Figure 11.  Note here that the specific text used in the
   reason phrase is not retained by this encoding.

   03406607 72756e6e 696e670a 22736c65  .@f.running."sle
   65702031 35220040 67046c69 6e6b233c  ep 15".@g.link#<
   2f737479 6c652e63 73733e3b 2072656c  /style.css>; rel
   3d707265 6c6f6164 3b206173 3d737479  =preload; as=sty
   6c65046c 696e6b24 3c2f7363 72697074  le.link$</script
   2e6a733e 3b207265 6c3d7072 656c6f61  .js>; rel=preloa
   643b2061 733d7363 72697074 0040c804  d; as=script.@..
   64617465 1d4d6f6e 2c203237 204a756c  date.Mon, 27 Jul
   20323030 39203132 3a32383a 35332047   2009 12:28:53 G
   4d540673 65727665 72064170 61636865  MT.server.Apache
   0d6c6173 742d6d6f 64696669 65641d57  .last-modified.W
   65642c20 3232204a 756c2032 30303920  ed, 22 Jul 2009
   31393a31 353a3536 20474d54 04657461  19:15:56 GMT.eta
   67142233 34616133 38372d64 2d313536  g."34aa387-d-156
   38656230 30220d61 63636570 742d7261  8eb00".accept-ra
   6e676573 05627974 65730e63 6f6e7465  nges.bytes.conte
   6e742d6c 656e6774 68023531 04766172  nt-length.51.var
   790f4163 63657074 2d456e63 6f64696e  y.Accept-Encodin
   670c636f 6e74656e 742d7479 70650a74  g.content-type.t
   6578742f 706c6169 6e003348 656c6c6f  ext/plain.3Hello
   20576f72 6c642120 4d792063 6f6e7465   World! My conte
   6e742069 6e636c75 64657320 61207472  nt includes a tr
   61696c69 6e672043 524c462e 0d0a0000  ailing CRLF.....

       Figure 11: Binary Response, including Informational Responses

   A response that uses the chunked encoding (see Section 7.1 of
   [HTTP/1.1]) as shown in Figure 12 can be encoded using indeterminate-
   length encoding, which minimizes buffering needed to translate into
   the binary format.  However, chunk boundaries do not need to be
   retained, and any chunk extensions cannot be conveyed using the
   binary format; see Section 6.

   HTTP/1.1 200 OK
   Transfer-Encoding: chunked

   4
   This
   6
    conte
   13;chunk-extension=foo
   nt contains CRLF.

   0
   Trailer: text



                    Figure 12: Chunked Encoding Example

   Figure 13 shows this message using the known-length encoding.  Note
   that the Transfer-Encoding header field is removed.

   0140c800 1d546869 7320636f 6e74656e  .@...This conten
   7420636f 6e746169 6e732043 524c462e  t contains CRLF.
   0d0a0d07 74726169 6c657204 74657874  ....trailer.text

                Figure 13: Known-Length Encoding of Response

6.  Notable Differences with HTTP Protocol Messages

   This format is designed to carry HTTP semantics just like HTTP/1.1
   [HTTP/1.1], HTTP/2 [HTTP/2], or HTTP/3 [HTTP/3].  However, there are
   some notable differences between this format and the format used in
   an interactive protocol version.

   In particular, as a standalone representation, this format lacks the
   following features of the formats used in those protocols:

   *  chunk extensions (Section 7.1.1 of [HTTP/1.1]) and transfer
      encoding (Section 6.1 of [HTTP/1.1])

   *  generic framing and extensibility capabilities

   *  field blocks other than a single header and trailer field block

   *  carrying reason phrases in responses (Section 4 of [HTTP/1.1])

   *  header compression [HPACK] [QPACK]

   *  response framing that depends on the corresponding request (such
      as HEAD) or the value of the status code (such as 204 or 304);
      these responses use the same framing as all other messages

   Some of these features are also absent in HTTP/2 and HTTP/3.

   Unlike HTTP/2 and HTTP/3, this format uses a fixed format for control
   data rather than using pseudo-fields.

   Note that while some messages -- CONNECT or upgrade requests in
   particular -- can be represented using this format, doing so serves
   no purpose, as these requests are used to affect protocol behavior,
   which this format cannot do without additional mechanisms.

7.  "message/bhttp" Media Type

   The "message/bhttp" media type can be used to enclose a single HTTP
   request or response message, provided that it obeys the MIME
   restrictions for all "message" types regarding line length and
   encodings.

   Type name:  message
   Subtype name:  bhttp
   Required parameters:  N/A
   Optional parameters:  N/A
   Encoding considerations:  Only "8bit" or "binary" is permitted.
   Security considerations:  See Section 8.
   Interoperability considerations:  N/A
   Published specification:  RFC 9292
   Applications that use this media type:  Applications seeking to
      convey HTTP semantics that are independent of a specific protocol.
   Fragment identifier considerations:  N/A
   Additional information:  Deprecated alias names for this type:  N/A
                            Magic number(s):  N/A
                            File extension(s):  N/A
                            Macintosh file type code(s):  N/A
   Person & email address to contact for further information:  See the
      Authors' Addresses section.
   Intended usage:  COMMON
   Restrictions on usage:  N/A
   Author:  See the Authors' Addresses section.
   Change controller:  IESG

8.  Security Considerations



   Many of the considerations that apply to HTTP message handling apply
   to this format; see Section 17 of [HTTP] and Section 11 of [HTTP/1.1]
   for common issues in handling HTTP messages.

   Strict parsing of the format with no tolerance for errors can help
   avoid a number of attacks.  However, implementations still need to be
   aware of the possibility of resource exhaustion attacks that might
   arise from receiving large messages, particularly those with large
   numbers of fields.

   Implementations need to ensure that they aren't subject to resource
   exhaustion attacks from maliciously crafted messages.  Overall, the
   format is designed to allow for minimal state when processing
   messages.  However, producing a combined field value (Section 5.2 of
   [HTTP]) for fields might require the commitment of resources.  In
   particular, combining might be necessary for the Cookie field when
   translating this format for use in other contexts, such as use in an
   API or translation to HTTP/1.1 [HTTP/1.1], where the recipient of the
   field might not expect multiple values.

9.  IANA Considerations



   IANA has added the media type "message/bhttp" to the "Media Types"
   registry at <https://www.iana.org/assignments/media-types>.  See
   Section 7 for registration information.

10.  References



10.1.  Normative References



   [HTTP]     Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
              Ed., "HTTP Semantics", STD 97, RFC 9110,
              DOI 10.17487/RFC9110, June 2022,
              <https://www.rfc-editor.org/info/rfc9110>.

   [HTTP/2]   Thomson, M., Ed. and C. Benfield, Ed., "HTTP/2", RFC 9113,
              DOI 10.17487/RFC9113, June 2022,
              <https://www.rfc-editor.org/info/rfc9113>.

   [QUIC]     Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based
              Multiplexed and Secure Transport", RFC 9000,
              DOI 10.17487/RFC9000, May 2021,
              <https://www.rfc-editor.org/info/rfc9000>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

10.2.  Informative References



   [HPACK]    Peon, R. and H. Ruellan, "HPACK: Header Compression for
              HTTP/2", RFC 7541, DOI 10.17487/RFC7541, May 2015,
              <https://www.rfc-editor.org/info/rfc7541>.

   [HTTP/1.1] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
              Ed., "HTTP/1.1", STD 99, RFC 9112, DOI 10.17487/RFC9112,
              June 2022, <https://www.rfc-editor.org/info/rfc9112>.

   [HTTP/3]   Bishop, M., Ed., "HTTP/3", RFC 9114, DOI 10.17487/RFC9114,
              June 2022, <https://www.rfc-editor.org/info/rfc9114>.

   [QPACK]    Krasic, C., Bishop, M., and A. Frindell, Ed., "QPACK:
              Field Compression for HTTP/3", RFC 9204,
              DOI 10.17487/RFC9204, June 2022,
              <https://www.rfc-editor.org/info/rfc9204>.

   [RFC2518]  Goland, Y., Whitehead, E., Faizi, A., Carter, S., and D.
              Jensen, "HTTP Extensions for Distributed Authoring --
              WEBDAV", RFC 2518, DOI 10.17487/RFC2518, February 1999,
              <https://www.rfc-editor.org/info/rfc2518>.

   [RFC8297]  Oku, K., "An HTTP Status Code for Indicating Hints",
              RFC 8297, DOI 10.17487/RFC8297, December 2017,
              <https://www.rfc-editor.org/info/rfc8297>.

Acknowledgments

   Julian Reschke, David Schinazi, Lucas Pardue, and Tommy Pauly
   provided excellent feedback on both the design and its documentation.

Authors' Addresses



   Martin Thomson
   Mozilla
   Email: mt@lowentropy.net


   Christopher A. Wood
   Cloudflare
   Email: caw@heapingbits.net