Hypertext Transfer Protocol (HTTP) 1.0
Hypertext Transfer Protocol (HTTP) Tim Berners-Lee, CERN
Internet Draft
Expires 5 May 1994 5 Nov 1993
Hypertext Transfer Protocol (HTTP)
A Stateless Search, Retrieve and Manipulation Protocol
This document is an Internet Draft. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its Areas,
and its Working Groups. Note that other groups may also distribute
working documents as Internet Drafts.
Internet Drafts are working documents valid for a maximum of six
months. Internet Drafts may be updated, replaced, or obsoleted by
other documents at any time. It is not appropriate to use Internet
Drafts as reference material or to cite them other than as a
"working draft" or "work in progress".
This document is a DRAFT specification of a protocol in use on the
internet and to be proposed as an Internet standard. Discussion
of this protocol takes place on the www-talk@info.cern.ch mailing
list -- to subscribe mail to www-talk-request@info.cern.ch.
Distribution of this memo is unlimited.
HTTP is a protocol with the lightness and speed necessary for a
distributed collaborative hypermedia information system. It is a
generic stateless object-oriented protocol, which may be used for
many similar tasks such as name servers, and distributed
object-oriented systems, by extending the commands, or "methods",
used. A feature if HTTP is the negotiation of data representation,
allowing systems to be built independently of the development of
new advanced representations.
Note: This specification
This HTTP protocol is an upgrade on the original protocol as
implemented in the earliest WWW releases. It is back-compatible
with that more limited protocol.
This specification includes the following parts:
The Request
Methods
A list of headers in the request message
The response
Status codes
A list of headers on any object transmitted
The content of any object content transmitted
Format negotiation algorithm
The HTTP Registration Authority
Security Considerations
Unresolved points
References
The following notes form recommended practice not part of the
specification:
Servers tolerating clients
Clients tolerating servers
When many sources of networked information are available to a
reader, and when a discipline of reference between different
sources exists, it is possible to rapidly follow references
between units of information which are provided at different remote
locations. As response times should ideally be of the order of
100ms in, for example, a hypertext jump, this requires a fast,
stateless, information retrieval protocol.
Practical information systems require more functionality than
simple retrieval, including search, front-end update and
annotation. This protocol allows an open-ended set of methods to be
used. It builds on the discipline of reference provided by the
Universal Resource Identifier (URI) as a name (URN, RFCxxxx) or
address (URL, RFCxxxx) allows the object of the method to be
specified.
Reference is made to the Multipurpose Internet Mail Extensions
(MIME, RFC1341) which are used to allow objects to be transmitted
in an open variety of representations.
On the internet, the communication takes place over a TCP/IP
connection. This does not preclude this protocol being implemented
over any other protocol on the internet or other networks. In
these cases, the mapping of the HTTP request and response
structures onto the transport data units of the protocol in
question is outside the scope of this specification. It should not
however be at all complicated.
The protocol is basically stateless, a transaction consisting of
Connection The establishment of a connection by the
client to the server - when using TCP/IP
port 80 is the well-known port, but other
non-reserverd ports may be specified in the
URL;
Request The sending, by the client, of a request
message to the server;
Response The sending, by the server, of a response to
the client;
Close The closing of the connection by either both
parties.
The format of the request and response parts is defined in this
specification. Whilst header information defined in this
specification is sent in ISO Latin-1 character set in CRLF
terminated lines, object transmission in binary is possible.
In all cases in HTTP where RFC822 characters are allowed, these may
be extended to use the full ISO Latin 1 character set. 8-bit
transmission is always used.
tableofcontents
REQUEST
The request is sent with a first line containing the method to be
applied to the object requested, the identifier of the object, and
the protocol version in use, followed by further information
encoded in the RFC822 header style. The format of the request is:
Request = SimpleRequest | FullRequest
SimpleRequest = GET CrLf
FullRequest = Method UR ProtocolVersion CrLf
[*]
[ ]
=
ProtocolVersion = HTTP/V1.0
uri =
= :
= MIME-conforming-message
The URI is the Uniform Resource Locator (URL) as defined in the
specification, or may be (when it is defined) a Uniform Resource
Name (URN) when a specification for this is settled, for servers
which support URN resolution.
Unless the server is being used as a gateway, a partial URL shall
be given with the assuptions of the protocol (HTTP:) and server
(the server) being obvious.
The URI should be encoded using the escaping scheme described in
the URL specification to a level such that (at least) spaces and
control characters (decimal 0-31 and 128-159) do not appear
unesacaped.
Note. The rest of an HTTP url after the host name and optional port
number is completely opaque to the client: The client may make no
deductions about the object from its URL.
The Protocol/Version field defines the format of the rest of the
request.. At the moment only HTRQ is defined .
If the protocol version is not specified, the server assumes that
the browser uses HTTP version 0.9.
Uniform Resource Identifier
This is a string identifying the object. It contains no blanks. It
may be a Uniform Resource Locator [ URL ] defining the address of
an object as described in RFCxxxx, or it may be a representation of
the name of an object (URN, Universal Resource Name) where that
object has been registered in some name space. At the time of
writing, no suitable naming system exists, but this protocol will
accept such names so long as they are distinguishable from the
existing URL name spaces.
Method field indicates the method to be performed on the object
identified by the URL. More details are with the list of method
names below .
These are RFC822 format headers with special field names given in
the list below , as well as any other HTTP object headers or MIME
headers.
The content of an object is sent (depending on the method) with the
request and/or the reply.
Methods
The Method field in HTTP indicates the method to be performed on
the object identified by the URL. The method GET below is always
supported, The list of other methods acceptable by the object are
returned in response to either of these two requests.
This list may be extended from time to time by a process of
registration with the design authority. Method names are case
sensitive. Currently specified methods are as follows:
GET means retrieve whatever data is identified
by the URI, so where the URI refers to a
data-producing process, or a script which can
be run by such a process, it is this data
which will be returned, and not the source
text of the script or process. Also used for
searches .
HEAD is the same as GET but returns only HTTP
headers and no document body.
CHECKOUT Similar to GET but locks the object against
update by other people. The lock may be
broken by a higher authority or on timeout:
in this case a future CHECKIN will fail. (
Phase out? )
SHOWMETHOD Returns a description (perhaps a form) for a
given method when applied to the given
object. The method name is specified in a
For-Method: field. (TBS)
PUT specifies that the data in the body section
is to be stored under the supplied URL. The
URL must already exist. The new contenst of
the document are the data part of the
request. POST and REPLY should be used for
creating new documents.
DELETE Requests that the server delete the
information corresponding to the given URL.
After a successfull DELETE method, the URL
becomes invalid for any future methods.
POST Creates a new object linked to the specified
object. The message-id field of the new
object may be set by the client or else will
be given by the server. A URL will be
allocated by the server and returned to the
client. The new document is the data part of
the request. It is considered to be
subordinate to the specified object, in the
way that a file is subordinate to a directory
containing it, or a news article is
subordinate to a newsgroup to which it is
posted.
LINK Links an existing object to the specified
object.
UNLINK Removes link (or other meta-) information
from an object.
CHECKIN Similar to PUT, but releases the lock set on
the object. Fails if no lock has been set by
CHECKOUT. Suggestion : phase out this
(rcs-like) model in favor of the PUT
(cvs-like, non-locking) model of code
management.
TEXTSEARCH The object may be queried with a text
string. The search form of the GET method is
used to query the object.
SPACEJUMP The object will accept a query whose terms
are the cooridnates of a point within the
object. The method is implemented using GET
with a derived URL .
SEARCH Proposed only. The index (etc) identified
by the URL is to be searched for something
matching in some sense the enclosed message.
How does the client know what message fromats
are acceptable to the server? (Suggestion of
Fred Williams)
(Some of these methods require more detailed specification)
Note: case sensitivity of method names
Although lack of case sensitivity in methos names would be a
tolerant approach with a limited method set, we require the
extensibility of HTTP to cover an arbitrary underlying object
system. In such a system, method names may be case sensitive, and
so we must preserve case in HTTP.
GET
A representation of the object is transferred to the client.
Some URIs refer to specific variants of an object, and some refer
to objects with many variants. In the latter case, the
representations, encodings, and languages acceptable may be
specified in the header request fields, and may affect the
particular value which is returned.
Other possible replies allow a set of URIs to be returned to the
client, who may use them to retrieve the object. This allows name
servers to be implemented using HTTP, and also forwarding address
to be given when objects have been moved.
Annotation replies
Some servers keep 'parallel webs" -- separate stores of information
about other server's objects. Typically this incldues annotation
links. This information may be retrieved using the GET method,
but a special reply is returned.
Searching using GET
When the TEXTSEARCH or SPACEJUMP methods are supported, their
implementation is in fact by means of the GET method, by
constructing a derived URL.
The URL used with GET is the URL of the object, suffixed by a "?"
character and the text to be searched. If the object being searched
is in fact itself the result of a search (ie the URL contains a
"?"), then those search terms are first stripped off, so the search
is performed on the original object.
In the URL, keywords are seperated with plus signs ("+"). Real
spaces, plus signs, and other illegal characters [who defines
illegal characters?] are represented as hexadecimal ASCII escape
sequences (%##, e.g., space = %20, plus = %2B)
Browsers accepting text input should define keywords as seperated
by spaces (and therefore map them to plus signs). More advanced
browsers may allow separate keyword input and, therefore, a finer
level of control over the content without users needing to
understand the underlying mechanisms (e.g., that they must use %20
to get a real space).
Examples
The following is a request on an object supporting TEXTSEARCH:
GET /indexes/botany?annual+plants HTTP/1.0
This request on an object supporting SPACEJUMP selects point
(0.2,3.8) within a map:
GET /maps/uk/dorset/winspit/0.2+3.8 HTTP/1.0
LINK
The link method of HTTP adds meta information (Object header
information) to an object, without touching the object's content.
For example, it requests the creation of a link from the specified
object to another object.
The request is followed by a set of object headers which are to be
added.
In cases in which a new header is added and the semantics of the
header do not allow it to coexist with a similar header, then the
previous header is deleted. For example, an object may only have
one title, so specifying a title overwrites and preexsiting title.
Link Types
The link type unless void is specified in the WWW-Link object field
for each link. If not specified, void is assumed.
Unresolved points
As this is generalised to allow any metainformation to be added, a
better name might be DESCRIBE or attribute (as a verb). I don't
like "describe" as it does not suggest alteration.
"Bestow"/"Rescind" might be better. For example, one could bestow a
title or author on something previously title-less. We are looking
at a general data model behind here a little like a relational
database. This function adds records. "Set" and "Reset"?
Related Methods
LINK is like POST except that
no storage is requested for the destination object, and
the destination is not assumed to be subordinate to the
specified object.
See also: UNLINK.
Tim BL
POST
This method of HTTP creates a new object linked to and subordinate
to the specified object. The content of the new object is
enclosed as the body of the request.
The POST method is desiged to allow a uniform function to cover
Annotation existing documents;
Posting a message to a bulletin board topic, newsgroup, mailing
list, or similar group of articles;
Adding a file to a directory;
Extending a document during authorship.
The client may not assume any postconditions of the method in terms
of web topology. For example, if a POST is accepted, the effect may
be delayed or overruled by human moderation, batch processing, etc.
The client should not be surprised if a link is not immediately
(or never) created.
However, the semantics are a request for a link to be made from the
object whose URL is quoted to the new, enclosed, object.
If no URL for the NEW object is given by the client, the server is
requested to see to the storage of the new object. That is, the
server does not have to store it but will have to return a URL be
which it can later be retrieved. The semantics of this method
(currently) imply nothing of any undertakings by the server to
maintain the availability of the object.
If the client gives a URL, then the server is not obliged to store
the object, but may take a copy and may in that case issue a new
URL.
Return object headers
The method shall return a set (possibly empty) of object headers
for the newly posted object. If a URL has been assigned by the
server, then that may be included. Similarly, if a URN has been
assigned, then that shall be returned. Other things which may be
returned include for example the expiry-date if any. The server may
return the entire metadata for the object (as in the HEAD command),
or a subset of it.
The object body shall not be returned, so the transaction shall end
with the blank line terminating the headers.
Link type
The link type may be specified by explicitly giving a (reverse)
link in the object header of the linked object. If a link or links
between the two objects are present in those headers, then that
link is used. If no such link is specified, then the server should
generate a link. The link type in this case is determined by the
server. The server may perform other operations as a result of the
new object being added: lists and indexes might be updated, for
example.
Submission
When articles are submitted, the analogy of being addeed to a body
of knowledge by being linked is close. When a form is submitted,
this can be done with POST, though in this case side-effects will
be expected.
(Should submission for action have a different method -- see
showmethod -- or should it be just POST for simplicity? When
interfacing with other systems such as bews and mail, the
distinction is not made as the system does not have the ability to
distinguish different methods. We now have a possibility of making
a separate action, though.)
Unresolved points
The client has no way of knowing what data formats the server is
prepared to accept. This may not be a serious problem, but it may
be if the server has some restrictions. This applies to all
submissions of object content from client to server, for all
methods.
Related methods.
When a new URL has been returned by the server, it may in general
(typically, but not necessarily) be usable as the argument of
DELETE , GET , PUT , etc, methods.
To make a link between two existing objects, see LINK.
Tim BL
SEARCH
Some correspondance about SEARCH:
Q
How did the client know that the server could search for tex? Maybe t
his server can only serach for text and GIF patterns, even though it g
ave out tex. How can the client know that a GIF search is possible?
Answer
I assume the following has happened:
client requests with ACCEPT: text/x-TeX
If the server, which it should if possible, replies with the doc
requested in ``TeX''.
Therefore a server can obviously do an ``internal representation'' to
``TeX'' conversion.
Since the server responded in a particular representation (ie TeX)
The client should be able to search in ``TeX'' provide the ``SEARCH''
method is in the required ALLOWED: section of the response.
The server should only respond with ALLOWED: SEARCH ... if it can do a
Tex to ``internal representation'' conversion for searching.
Fred Williams fwilliam@ccs.carleton.ca
SHOWMETHOD
When an object can support more operations than are defined in this
specification, SHOWMETHOD allows a client to understand the
interface to that operation sufficiently to allow the user to
perform it interactively.
Required parameter field
For-Method: This filed contains only the method name
about which the client is inquiring.
Preconditions
The methodname spacified in the For-Method field must have been
previously issued in a "Allowed:" field returned with the given
object.
The client should specify an Accept: field which includes at least
one form langauge it it wants to be able to interpret the result.
Postcondidtion
SHOWMETHOD returns, if possible, a form in a representation
acceptable to the client. This form will contain instructions for
ordering the operation, and fields for the parameters.
A suitable language for the form might be HTTP2, but any language
may be used which is acceptable to the client.
SPACEJUMP
This method is similar to the TEXTSEARCH method, but instead of the
search criterion being a text string, it is a set of coordinates
defining a point within the image. The semantics of the operation
are not defined here. Typically, the user clicks on a point within
the image with a mouse or other pointing device.
Two or more coordinates are supplied, in the order x, y z, t. All
coordinates are scaled so that 0 represents the bottom left hand
point and 1.0 represents the top right hand point.
The z access direction follows the normal right-hand rule, that is
extends toward the viewer when the x and y axes are flat as in the
normal two-dimensional representation.
In the case of a time-occupying object, 0 represents the starting
instance, and 1.0 represents the finishing instant.
The method is implemented using GET with a derived URL .
TEXTSEARCH
This is a simple form of search. The text is assumed to derive from
the requesting user, and is in no special format.
The exact algorithm to be applied is not defined in this
specification, but techniques such as vocabulary proximity matching
between the request data portion and the contents or titles of
documents, keyword matching, stemming, and the use of a thesaurus
are quite appropriate.
Whilst this method name is given as a flag to specify that the
function is available, the search form of the GET method is in fact
used to query the object.
UNLINK
This method deletes metainformation about an object. The request
contains object geaders which are to be removed. Only headers
exactly matching the headers given are removed.
Obviously the operation may be used for unlinking objects. It may
also be used for removing other metainformation such as object
title, expiry date, etc.
Related methods
See LINK.
Tim BL
These header lines are sent by the client in a HTTP protocol
transaction. All lines are RFC822 format headers. The list of
headers is terminated by an empty line.
FROM:
In Internet mail format, this gives the name of the requesting
user. This field may be used for logging purposes and an insecure
form of access protection. The interpretation of this field is
that the request is being performed on behalf of the person given,
who accepts responsability for the method performed.
The Internet mail address in this field does not have to correspond
to the internet host which issued the request. (For example, when a
request is passed through a gateway, then the original issuer's
address should be used).
The mail address should, if possible, be a valid mail address,
whether or not it is in fact an internet mail address or the
internet mail representation of an address on some other mail
system.
ACCEPT:
This field contains a comma-separated list of representation
schemes (Content-Type metainformation values) which will be
accepted in the response to this request.
The set given may of course vary from request to request from the
same user.
This field may be wrapped onto several lines according to RCFC822,
and also more than one occurence of the field is allowed with the
signifiance being the same as if all the entries has been in one
field. The format of each entry in the list is (/ meaning "or")
= Accept: *[ ; ]
= *[ , ]
= =
= q / mxs / mxb
=
See the appendix on the negotiation algorithm as a function and
penalty model.
If no Accept: field is present, then it is assumed that text/plain
and text/html are accepted.
Example
Accept: text/plain; text/html
Accept: text/x-dvi, q=.8, mxb=100000, mxt=5.0; text/x-c
Wildcards
In order to save time, and also allow clients to receive content
types of which they may not be aware, an asterisk "*" may be used
in place of either the second half of the content-type value, or
both halves. This only applies to the Accept: filed, and not to
the content-type field of course.
Example
Accept: *.*, q=0.1
Accept: audio/*, q=0.2
Accept: audio/basic q=1
may be interpreted as "if you have basic audio, send it; otherwise
send me some other audio, or failing that, just give me what
you've got."
ACCEPT-ENCODING:
Similar to Accept, but lists the Content-Encoding types which are
acceptable in the response.
= Accept-Encoding: *[ , ]
= *[ , ]
Example
Accept-Encoding: x-compress; x-zip
ACCEPT-LANGUAGE:
Similar to Accept, but lists the Language values which are
preferable in the response. A response in an unspecifies language
is not illegal. See also: Language .
Language coding TBS. (ISO standard xxxx)
USER-AGENT:
This line if present gives the software program used by the
original client. This is for statistical purposes and the tracing
of protocol violations. It should be included. The first white
space delimited word must be the software product name, with an
optional slash and version designator. Other products which form
part of the user agent may be put as separate words.
= User-Agent: +
= [/]
=
Example:
UserAgent: LII-Cello/1.0 libwww/2.5
REFERER:
This optional header field allows the client to specify, for the
server's benefit, the address ( URI ) of the document (or element
within the document) from which the URI in the request was
obtained.
This allows a server to generate lists of back-links to documents,
for interest, logging, etc. It allows bad links to be traced for
maintenance.
If a partial URI is given, then it should be parsed relative to the
URI of the object of the request.
Example:
Referer: http://info.cern.ch/hypertext/DataSources/Over
view.html
AUTHORIZATION:
If this line is present it contains authorization information. The
format is To Be Specified (TBS). The format of this field is in
extensible form. The first word is a specification of the
authorisation system in use.
Proposals have been as follows: (see the specification for current
one implemented by AL Sep 1993)
User/Password scheme
Authorization: user fred:mypassword
The scheme name is "user". The second word is a user name
(typically derived from a USER environment variable or prompted
for), with an optional password separated by a colon (as in the URL
syntax for FTP). Without a password, this povides very low level
security. With the password, it provides a low-level security as
used by unmodified FTP, Telnet, etc.
Kerberos
Authorization: kerberos kerberosauthenticationsparam
eters
The format of the kerberosauthenticationsparameters is to be
specified.
CHARGETO:
This line if present contains account information for the costs of
the application of the method requested. The format is TBS. The
format of this field must be in extensible form. The first word
starts with a specification of the namespace in which the account
is . (This is similar to extensible URL definition.) No namespaces
are currently defined. Namespaces will be registered with the
registration authority .
The format of the rest of the line is a function of the charging
system, but it is recommended that this include a maximum cost
whose payment is authorized by the client for this transaction, and
a cost unit.
Note: Server tolerance of bad clients
Whilst it is seen appropriate for testing parsers to check full
conformance to this specification, it is recommended that
operational parsers be tolerant of deviations.
In particular, lines should be regarded as terminated by the Line
Feed, and the preceeding Carriage Return character ignored.
Any HTTP Header Field Name which is not recognised should be
ignored in operational parsers.
It is recommended that servers use URIs free of "variant"
characters whose representation differs in some of the national
variant character sets, punctuation characters, and spaces. This
will make URIs easier to handle by humans when the need (such as
debugging, or transmission through non hypertext systems) arises.
RESPONSE
The response from the server shall start with the following syntax
(See also: note on client tolerance ):
::=
::= 3*
::= 3*
::= 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
::= *
identifies the HyperText Transfer Protocol
version being used by the server. For the
version described by this document version it
is "HTTP/1.0" (without the quotes).
< status code > gives the coded results of the attempt to
understand and satisfy the request. A three
digit ASCII decimal number.
gives an explanation for a human reader,
except where noted for particular status
codes.
Fields on the status line are delimited by a single blank (parsers
should accept any amount of white space). The possible values of
the status code are listed below .
Response headers
The headers on returned objects those RFC822 format headers listed
as object headers , as well as any MIME conforming headers, notably
the Content-Type field. Note that this specification doesnot
define any headers particular to the response which are not also
apropriate to any transmission of an object with a request.
Response data
Additional information may follow, in the format of a MIME message
body. The significance of the data depends on the status code.
The Content-Type used for the data may be any Content-Type which
the client has expressed his ability to accept, or text/plain, or
text/html. That is, one can always assume that the client can
handle text/plain and text/html.
Status codes
The values of the numeric status code to HTTP requests are as
follows. The data sections of messages Error, Forward and
redirection responses may be used to contain human-readable
diagnostic information.
SUCCESS 2XX
These codes indicate success. The body section if present is the
object returned by the request. It is a MIME format object. It is
in MIME format, and may only be in text/plain, text/html or one fo
the formats specified as acceptable in the request.
OK 200
The request was fulfilled.
CREATED 201
Following a POST command, this indicates success, but the textual
part of the response line indicates the URI by which the newly
created document should be known.
Accepted 202
The request has been accepted for processing, but the processing
has not been completed. The request may or may not eventually be
acted upon, as it may be disallowed when processing actually takes
place. there is no facility for status returns from asynchronous
operations such as this.
Partial Information 203
When received in the response to a GET command, this indicates that
the returned metainformation is not a definitive set of the object
from a server with a copy of the object, but is from a private
overlaid web. This may include annotation information about the
object, for example
ERROR 4XX, 5XX
The 4xx codes are intended for cases in which the client seems to
have erred, and the 5xx codes for the cases in which the server is
aware that the server has erred. It is impossible to distinguish
these cases in general, so the difference is only informational.
The body section may contain a document describing the error in
human readable form. The document is in MIME format, and may only
be in text/plain, text/html or one for the formats specified as
acceptable in the request.
Bad request 400
The request had bad syntax or was inherently impossible to be
satisfied.
Unauthorized 401
The parameter to this message gives a specification of
authorization schemes which are acceptable. The client should
retry the request with a suitable Authorization header.
PaymentRequired 402
The parameter to this message gives a specification of charging
schemes acceptable. The client may retry the request with a
suitable ChargeTo header.
Forbidden 403
The request is for something forbidden. Authorization will not
help.
Not found 404
The server has not found anything matching the URI given
Internal Error 500
The server encountered an unexpected condition which prevented it
from fulfilling the request.
Not implemented 501
The server does not support the facility required.
REDIRECTION 3XX
The codes in this section indicate action to be taken (normally
automatically) by the client in order to fulfill the request.
Moved 301
The data requested has been assigned a new URI, the change is
permanent. (N.B. this is an optimisation, which must,
pragmatically, be included in this definition. Browsers with link
editing capabiliy should automatically relink to the new reference,
where possible)
The response contains one or more header lines of the form
URI: String CrLf
Which specify alternative addresses for the object in question.
The String is an optional comment field. If the response is to
indicate a set of variants which each correspond to the requested
URI, then the multipart/alternative wrapping may be used to
distinguish different sets
Found 302
The data requested actually resides under a different URL, however,
the redirection may be altered on occasion (when making links to
these kinds of document, the browser should default to using the
Udi of the redirection document, but have the option of linking to
the final document) as for "Forward".
The response format is the same as for Moved .
Method 303
Method:
body-section
Like the found response, this suggests that the client go try
another network address. In this case, a different method may be
used too, rather than GET.
The body-section contains the parameters to be used for the method.
This allows a document to be a pointer to a complex query
operation.
@@TBS in more detail.
The body may be preceded by the following additional fields as
listed .
Object MetaInformation
The header fields given with or in relation to objects in HTTP are
as follows. All are optional. These headers specify
metainformation: that is, information about the object, not the
information which is contained in the object.
There is no reason for limiting these fields to HTTP use, as any
other system which requires metainformation is encouraged to use
them.
The order of header lines withing the HTTP header has no
significance. However, those fields which are not MIME fields
should occur before the MIME fields, so that the MIME fields and
following form a valid MIME document. This is not mandatory.
Any header fields which are not understood should be ignored.
(TBS in more detail)
ALLOWED: *METHOD
Lists the set of requests which the requesting user is allowed to
issue for this URL. If this header line is omitted, the default
allowed methods are "GET HEAD"
Example of use:
Allow: GET HEAD PUT
PUBLIC: *METHOD
As "Allow" but lists those requests which anyone may use. If
omitted, the default is "GET" only.
Example of use:
Public: GET HEAD TEXTSEARCH
CONTENT-LENGTH: INT
Implies that the body is binary and should be read directly from
the communications link, without parsing lines, etc. When the
data is part of the request, prevents the escaping and de-escaping
of the termination sequence .
@@@ This should be part of the MIME header, as it applies to any
binary encoded part. Note HTML is the first internet protocol to
allow MIME "binary" encoding. In MIME, the use of Content-Length is
currently allowed only for external messages.
CONTENT-TYPE:
As defined in MIME, except where noted here.
Extra non-MIME types
It is reasonable to put strict limits on transfer formats for mail,
where there is no guarantee that the receiver will understand a
weird format. However, in HTTP one knows that the receiver will be
able to receive it because it will have been sent in the Accept:
field. There is therefore a lot to be gained from a very complete
registry of well-defined types for HTTP which may nevertheless not
be recommended for mail. In this case, the content-type list for
HTTP may be a superset of the MIME list.
The x- convention for experimental types is of course still
available as well.
Type parameters
Parameters on the content type are extremely useful for describing
resolutions, colour depths, etc. They will allow a client to
specify in the Accept: field the resolution of its device. This may
allow the server to economise greatly on transmission time by
reducing the resultion of an image, for example.
These parameters are to be specified when types are registered..
@@ TBS.
Multipart types
MIME provides for a number of "multipart" types. These are
encapsulations of several body parts in the one message. In HTTP,
Multipart types may be returned on the condition that the client
has indicated acceptability (using Accept:)of the multipart type
and also of the content types of each consitutent body part.
The body parts (unlike in MIME) MAY contain HTTP metainformation
header fields which ARE significant.
Multipart/alternative
This is normally used in mail to send different content-type
variants when the receiver's capabilities are not known. This is
not the case with HTTP. Multipart/alternate may however be used to
provide meta information of many instances of an object, in the
case of a indirection response. This allows, for example, pointers
to be returned by a name server to a set of instances of an object.
Multipart/related
This is the type to be used when the first body part contains
references to other parts which the server wishes to send at the
same time. For example, the first part could be an HTML document,
and the included bodyparts could be the inline images mentioned
within the text.
The body parts may have URI: fields if the body parts have URIs,
and so they may be referred to by these URIs in the body-parts. If
the body-parts are transient (as in speech insertions in mail
messages) then the [propsed] "cid:" URI type may be used to refer
to them by content-identifier.
Multipart/mixed
This may be used to simply transfer an unrelated unstructured set
of objects.
Multipart/parallel
This may be used as in MIME to indicate simultaneous presentation.
[It is the author's belief that this is a trivial case of a
compound presentation which in general should be described by a
script which would be teh first bodypart of a multipart/related
document].
DATE: DATE
Creation date of object. (or last modified, and separately have a
Created: field?) Format as in RFC850 but GMT MUST BE USED.
EXPIRES: DATE
Gives the date after which the information given ceases to be valid
and should be retrieved again. This allows control of caching
mechanisms, and also allows for the periodic refreshing of displays
of volatile data. Format as for Date:. This does NOT imply that
the original object will cease to exist.
LAST-MODIFIED: DATE
Last time object was modified, i.e. the date of this version if the
document is a "living document". Format as for Date:.
MESSAGE-ID: URI
A unique identifier for the message. As in RFC850 , except that the
unlimited lifetime of HTTP objects requires that the Message-ID be
unique in all time, not just in two years.
A document may only have one Message-ID.
No two documents, even if different versions of the same live
document, may have the same Message-id.
Note: Unlike the URI field, this does not fgive a way of accessing
the document, so the Message-Id cannot be used to refer to the
document. In the case of NNTP articles, the message-id may in fact
be used within the URI for retrieval using NNTP.
URI: 1*URI
This gives a URI with which the object may be found. There is no
guarantee that the object can be retrieved using the URI specified.
However, it is guaranteed that if an object is successfully
retrieved using that URI it will be to a certain given degree the
same object as this one.
If the URI is used to refer to a set of variants, then the
dimensiosn in which the variants may differ must be given with the
"vary" parameter:
Syntax URI: [ ; vary = dimension [ , dimension
]* ]
dimension content-type | language | version
If no "vary" parameters are given, then the URI may not return
anything other than the same bit stream as this object.
Multiple occurencies of this field give alternative access names or
addresses for the object.
Examples
URI: http://info.cern.ch/pub/www/doc/url6.multi; vary
=content-type
This indicates that retrieval given the URI will return the same
document, never an updated version, but optionally in a different
rendition.
URI: http://info.cern.ch/pub/www/doc/url.multi;
vary=content-type, language, version
This indicates that the URI will return the smae document, possibly
in a different rendition, possibly updated, and without excluding
the provision of translations into different languages.URI:
http://info.cern.ch/pub/www/doc/url6.ps vary=content-typeThis
indicates that accessing the URI in question will return exactly
the same bitstream.
VERSION:
This is a string defining the version of an evolving object. Its
format is currently undefined , and so it should be treated as
opaque to the reader, defined by the informatiuon provider. The
version field is used to indicate evolution along a single path of
a partucular work. It is NOT used to indicate derived works (use a
link), translations , or renditions in different representations .
Note: It would be useful to have sufficient semantics to be able
to deduce whether one version predated or postdated another.
However, it may also be useful to be able to insert a particular
local code management system's own version stamp in this field.
Typically, publishers will have quite complex version information
containing hidden local semantics, giving value to the idea of this
field being opaque to other readers ofthe document.
DERIVED-FROM:
When an editied object is resubmitted using PUT for example, this
field gives the value of the Version . This typically allows a
server to check for example that two concurrent modifications by
different parties will not be lost, and for example to use
established version management techniques to merge both
modifications.
LANGUAGE: CODE
The language code is the ISO code for the language in which the
document is written. If the language is not known, this field
should be omitted of course .
The language code is an ISO 3316 language code with an optional
ISO639 country code to specify a national variant.
Example
Language: en_UK
means that the content of the message is in British English, while
Language: en
means that the language is English in one of its forms. (@@ If a
document is in more than one language, for example requires both
Greek Latin and French to be understood, should this be
representable?)
See also: Accept-Language .
COST: TBS
The cost of retrieving the object is given. This is the cost of
access of a copyright work. Format of units to be specified.
Currently refers to an unspecified charging scheme to be agreed out
of band between parties.
WWW-LINK:
Note. It is proposed that any HTML metainformation element (allowed
withing the HEAD as opposed to BODY element of the document) be a
valid candidate for an HTTP object header. WWW_Link is a required
example. The suggestion was that the isomorphism should be realized
by prepending "WWW-" t the HTML element name to make the HTTP
header name, and the HTML attributes imply identically named
semicolon-separated MIME-style header parameters. Other clear
candidates include WWW-Title.
It is open to discussion whether the "WWW-" should be removed.
This is semantically equivalent to the LINK element in an HTML
document which should be consulted for a full explanation.
Examples
WWW-Link: href="http://info.cern.ch/a/b/c"; rel="includes"
WWW-Link: href="mailto:timbl@info.cern.ch"; rev=made
The first example indicates that this object includes the specified
/a/b/c object. The second indicates that the author of the object
is identified by the given mail address.
Note: Client tolerance of bad servers
Servers not implementing the specification as written are not HTTP
compiant. Servers should always be made completely copmpliant.
However, clients should also tolerate deviant servers where
possible.
In order that clients using the HTTP protocol should be able to
communicate with servers using the protocol originally implemented
in the W3 data model, clients should tolerate responses which do
not start with a numeric version number and response codes.
In this case, they should assume that the rest of the response is a
document body in type text/html.
WHITE SPACE
Clients should be tolerant in parsing response status lines, in
particular they should accept any sequence of white space (SP and
TAB) characters between fields.
Lines should be regarded as terminated by the Line Feed, and the
preceeding Carriage Return character ignored.
HTTP NEGOTIATION ALGORITM
This note defines the significance of the q, mxb and mxs values
optionally sent in the Accept: field of the HTTP protocol request
message.
It is assumed that there is a certain value of the presentation of
the document, optimally rendered using all the information
available in its original source.
It is further assumed that one can allocate a number between 0 and
1 to represent the loss of value which occurs when a document is
rendered into a representation with loss of information. Whilst
this is a very subjective measurement, and in fact largely a
function of the document in question, the approximation is made
that one can define this "degradation" figure as a function of
merely the representation involved.
The next assumption is that the other cost to the user of viewing
the document is a function of the time taken for presentation. We
first assume that the cost is linear in time, and then assume that
the time is linear in the size of the message.
The final net value to the user can therefore be written
presented_value = initial_value * total-degradation - a - b *
size
for a document in a given incoming representation. Suppose we
normalize the initial value of the document to be 1. The server
may judge that the value in a particular format is less than 1 is a
conversion on the server side has lost information. The total
degradation is then the product of any degradation due to
conversions internal to the server, and the degradation "q" sent in
the Accept field. If q is not sent, it defaults to 1.
The values of a and b have components from processing time on the
server, network delays, and processing time on the client. These
delays are not additive as a good system will pipeline the
processing, and whilst the result may be linear in message size,
calculation of it in advance is not simple. The amount of
pipelining and the loads on machines and network are all difficult
to predict, so a very rough assumption must be made.
We make the client responsible for taking into account network
delays. The client will in fact be in a better position to do this,
as the client will after one transaction be aware of the round-trip
time.
We assume that the delays imposed by the server and by the client
(including network) are additive. We assume that the client's
delay is proportional to message size.
The three parameters given by the client to the server are
q The degradation (quality) factor between 0
and 1. If omitted, 1 is assumed.
mxb The size of message (in bytes) which even if
immediately available from the server will
cause the value to the reader to become zero
mxs The delay (in seconds) which, even for a very
small message with no length-related penalty,
will cause the value to the reader to become
zero.
These parameters are chosen in part because they are easy to
visualize as the largest tolerable delay and size. If not sent,
they default to infinity.
The server may optimize the presented value for the user when
deciding what to return. The hope is that fine decisions will not
have to be made, as in most cases the results for different formats
will be very different, and there will be a clear winner.
A suitable algorithm is that the assumed value v of a document of
initial value u delivered to the network after a delay t whose
transfer length on the net is b bytes is
v = u * q - b/mxb - t/mxs
Note that t is the time from the arrival of the request to the
first byte being available on the net. [[See also: Design issues
discussions around this point.]]
HTTP Negotiation algoritm
This note defines the significance of the d, a and b values
optionally sent in the Accept: field of the HTTP protocol request
message.
It is assumed that there is a certain value of the presentation of
the document, optimally rendered using all the information
available in its original source.
It is further assumed that one can allocate a number between 0 and
1 to represent the loss of value which occurs when a document is
rendered intop a represenmtation with loss of information. Whilst
this is a very subjective measurement, and in fact largely a
function of the document in question, the approximation is made
that one can define this "degradation" figure as a function of
merely the representation involved.
The next assumption is that there the other cost to the user of
viewing the doument is a function of the time taken for
presentation. We first assume that the cost is linear in time, and
then assume that the time is linear in the size of the message.
The final net value to the user can therefore be written
presented_value = initial_value * total-degradation - a - b *
size
for a document in a given incoming represenattion. Suppose we
normalize the initial value of the document to be 1. The total
degradation is the product of any degradation due to conversions
internal to the server, and the degradation "d" sent in the Accept
field. The values of a and b are also sent by the protocol. If not
sent, they default to no cost (d=1, a=b=0).
The server may optimize the presented value for the user when
deciding what to return. The hope is that fine decisions will not
have to be made, as in most cases the results for different formats
will be very different, and there will be a clear winner.
See also: Design issues discussions around this point.
Tim BL
Note: The cost of retrieval time
The assumption that the cost to the user associated with a certain
retrieval time is linear in that time is wildly innaccurate. The
real function could be very dependent on circumstances (like go to
infinity at a deadline).
A better general approximation might be logarithmic for large time
delays, and linear for small ones, like a*log(b*t-1) which has two
parameters.
REGISTRATION AUTHORITY
The HTTP Registration Authority is responsible for maintaining
lists of:
Charge account name spaces (see ChargeTo: field above)
Authorization schemes (see Authorization: field above)
Data format names (as MIME Content-Types)
Data encoding names (as MIME Content-Encoding))
It is proposed that the Internet Assigned Numbers Authority or
their successors take this role.
Unregistered values may be used for experimental purposes if they
are start with "X-".
SECURITY CONSIDERATIONS
The HTTP protocol allows requests to communication to a remote
server machine, and all the expetant security considerations for
client-server systems apply, including
Authentication of requests
Authenticationtion of servers
Privacy of request and response
Abuse of server features
Abuse of servers by exploiting server bugs
Unwitting actions on the net
Abuse of log information
The bulk of these are well known problems, tackled in part by some
featured of this protocol. Some aspects particular to HTTP are
mentioned below.
Unwitting actions on the net
The writers of client software should be aware that the software
represents the user in his interactions over the net, and should be
careful to allow the user to be aware of any actions he may take
which may be taken as having an unexpected significance by others.
TCP PORT NUMBERS
Clients should prompt a user before allowing HTTP access to
reserved ports other than the port resrverd for HTTP (port 80).
Otherwise, the user may unwittingly cause a transaction to occur in
some other (present or future) protocol.
IDEMPOTENT METHODS
The convention should be established that the GET and HEAD methods
never have the significance of taking an action. The link "click
here to subscribe" causing the reading of a special "magic"
document is open to abuse by others making a link "click here to
see a pretty picture". These methods should be considered "safe"
and should not have side effects. This allows the client software
to represent other, methods (such as POST) in a special way, so
that the use is aware of the fact that an action is being
requested.
Abuse of log information
A server is in the position to save large amount of personal data
about information requested by different readers. This information
is clearly confidential in nature, and its handling may be
constrained by law in certain countries. Server providers shall
ensure that such material is not distributed without the
permission of any people or groups of people mentioned in the
results published.
A feature which increases the amount of personal data transferred
is the Referer: field. This allow reading patters to be studied,
reverse links drawn, and so is very useful. Its power can be
abused of course if user details are not separated from the
Referee-Referer pairs. Even when the personal information has been
removed, the Referer field may in fact be a secure document's URI,
whose revelation itself is breach of security. A method of
suppressing the Referer information in such cases may be the
subject of further study.
REFERENCES
RFC 822 "Standard for ARPA Internet Text Messages".
David H. Crocker, describes Internet mail
message fromat.
RFC850 "Standard for Interchange of USENET
Messages" This RFC uses some field names in
common with this specification, and is
relevant reading.
RFC977 "Network News Transfer Protocol", Kantor and
Lampsley.
RFC 1341 Multipurpose Internet Mail Extensions
(MIME), Nathaniel Borenstien and Ned Freed,
Internet RFC 1341, 1992. Now obsoleted by
RFC1521:
RFC 1521 MIME. Not available in hypertext form yet.
RFC 1522 K Moore. "MIME: Part Two: Message Header
Extensions for Non-ASCII Text".
RFC1523 MIME text/enriched.
RFC 1524 MIME...
URL Universal Resource Locators. RFCxxx.
Currently available by anonymous FTP from
info.cern.ch as /pub/ietf/url3.{ps,txt}.
MIME and PEM Internet Draft only
OBJECT CONTENTS
The data (if any) sent with an HTTP request or reply is in a format
and encoding defined by the object header fields, the default being
"plain/text" type with "8bit" encoding. Note that while all the
other information in the request (just as in the reply) is in ISO
Latin1 with lines delimited by Carriage Return/Line Feed pairs, the
data may contain 8-bit binary data.
Termination
The delimiting of the message is determined by the Content-Length:
field. If this is present, then the message contains the specified
number of bytes.
Failing that, the content-type filed may contain a "bounday"
attribute which gives the boundary string with exacly the same
syntax as for a MIME multipart message.
Failing either of the above conditions, the data is terminated by
the closing of the connection by the sending party. Note that this
method can not be used for data sent with the request.
See also: note on server tolerance for back-compatibility, etc.
Last-modified: Sun, 14 Nov 1999 22:01:55 GMT