<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-masque-connect-udp-listen-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="CONNECT-UDP Bind">Proxying Bound UDP in HTTP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-masque-connect-udp-listen-11"/>
    <author initials="D." surname="Schinazi" fullname="David Schinazi">
      <organization>Google LLC</organization>
      <address>
        <email>dschinazi.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="A." surname="Singh" fullname="Abhi Singh">
      <organization>Google LLC</organization>
      <address>
        <email>abhisinghietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="15"/>
    <area>Transport</area>
    <workgroup>MASQUE</workgroup>
    <keyword>quic</keyword>
    <keyword>http</keyword>
    <keyword>datagram</keyword>
    <keyword>udp</keyword>
    <keyword>proxy</keyword>
    <keyword>tunnels</keyword>
    <keyword>quic in quic</keyword>
    <keyword>turtles all the way down</keyword>
    <keyword>masque</keyword>
    <keyword>http-ng</keyword>
    <keyword>listen</keyword>
    <keyword>bind</keyword>
    <abstract>
      <?line 53?>

<t>The mechanism to proxy UDP in HTTP only allows each UDP proxying request to
transmit to a specific host and port. This is well suited for UDP
client-server protocols such as HTTP/3, but is not sufficient for some UDP
peer-to-peer protocols like WebRTC. This document proposes an extension to
UDP proxying in HTTP that enables such use-cases.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-masque.github.io/draft-ietf-masque-connect-udp-listen/draft-ietf-masque-connect-udp-listen.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-masque-connect-udp-listen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MASQUE Working Group mailing list (<eref target="mailto:masque@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/masque/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/masque/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-masque/draft-ietf-masque-connect-udp-listen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The mechanism to proxy UDP in HTTP <xref target="CONNECT-UDP"/> allows creating
tunnels for communicating UDP payloads <xref target="UDP"/> to a fixed host and
port; this enables proxying of HTTP/3 connections, since they run over UDP.
Similarly, the HTTP CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>)
allows proxying HTTP/1.x and HTTP/2, which run over TCP. Combining both
allows proxying the majority of a Web Browser's HTTP traffic. However WebRTC
<xref target="WebRTC"/> relies on ICE <xref target="ICE"/> to provide connectivity between
two Web browsers, and ICE relies on the ability to send and receive UDP
packets to multiple hosts. While in theory it might be possible to
accomplish this using multiple UDP proxying HTTP requests, HTTP semantics
<xref target="HTTP"/> do not guarantee that distinct requests will be handled by the same
server. This can lead to the UDP packets being sent from distinct IP
addresses, thereby preventing ICE from operating correctly. Consequently,
UDP proxying requests cannot enable WebRTC connectivity between peers.</t>
      <t>This document describes an extension to UDP Proxying in HTTP that allows
sending and receiving UDP payloads to multiple hosts within the scope of a
single UDP proxying HTTP request.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document uses terminology from <xref target="CONNECT-UDP"/> and notational
conventions from <xref target="QUIC"/>. This document uses the terms Boolean,
List, and String from <xref section="3" sectionFormat="of" target="STRUCTURED-FIELDS"/> to specify
syntax and parsing. This document uses Augmented Backus-Naur Form and
parsing/serialization behaviors from <xref target="ABNF"/>.</t>
      </section>
    </section>
    <section anchor="mechanism">
      <name>Bound UDP Proxying Mechanism</name>
      <t>In unextended UDP proxying requests, the target host is encoded in the HTTP
request path or query. For bound UDP proxying, the target is either conveyed
in each HTTP Datagram (see <xref target="fmt-dgram-uncomp"/>), or registered via capsules
and then compressed (see <xref target="fmt-capsule-assign"/>).</t>
      <t>When performing URI Template Expansion of the UDP proxying template (see
<xref section="3" sectionFormat="of" target="CONNECT-UDP"/>), the client follows the same template as
unextended UDP proxying and sets the "target_host" and the "target_port"
variables to one of its targets. It adds the Connect-UDP-Bind header field
as specified in <xref target="hdr"/> to request bind. If the proxy supports bound UDP
proxying, it returns the Connect-UDP-Bind response header field value set to
true.</t>
      <t>When "target_host" and "target_port" are set to a valid target, the client
is requesting bound UDP proxying but would accept fallback to unextended UDP
proxying to that target. If the client doesn't have a specific target, or if
it wants bound UDP proxying without fallback, it sets both the "target_host"
and the "target_port" variables to the '<tt>*</tt>' character (ASCII character
0x2A). Note that the '<tt>*</tt>' character <bcp14>MUST</bcp14> be percent-encoded before sending,
per <xref section="3.2.2" sectionFormat="of" target="TEMPLATE"/>.</t>
    </section>
    <section anchor="contextid">
      <name>Context Identifiers</name>
      <t>As with unextended UDP proxying, the semantics of HTTP Datagrams are
conveyed by Context IDs (see <xref section="4" sectionFormat="of" target="CONNECT-UDP"/>). Endpoints first
allocate a new Context ID (per <xref target="CONNECT-UDP"/>, clients allocate even
Context IDs while proxies allocate odd ones), and then use the
COMPRESSION_ASSIGN capsule (see <xref target="capsule-assign"/>) to convey the semantics
of the new Context ID to their peer. This process is known as registering
the Context ID.</t>
      <t>Each Context ID can have either compressed or uncompressed semantics. The
uncompressed variant encodes the target IP and port into each HTTP Datagram.
Conversely, the compressed variant exchanges the target IP and port once in
the capsule during registration, and then relies on shared state to map from
the Context ID to the IP and port.</t>
      <t>Context ID 0 was reserved by unextended UDP proxying to represent UDP
payloads sent to and from the "target_host" and "target_port" from the URI
template. When the mechanism from this document is in use:</t>
      <ul spacing="normal">
        <li>
          <t>if the "target_host" and "target_port" variables are set to '<tt>*</tt>', then
context ID 0 <bcp14>MUST NOT</bcp14> be used in HTTP Datagrams.</t>
        </li>
        <li>
          <t>otherwise, HTTP Datagrams with context ID 0 have the same semantics as in
unextended UDP proxying.</t>
        </li>
      </ul>
      <section anchor="capsule-assign">
        <name>The COMPRESSION_ASSIGN capsule</name>
        <t>The Compression Assign capsule (capsule type 0x11) is used to register the
semantics of a Context ID. It has the following format:</t>
        <figure anchor="fmt-capsule-assign">
          <name>Compression Assign Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_ASSIGN Capsule {
  Type (i) = 0x11,
  Length (i),
  Context ID (i),
  IP Version (8),
  [IP Address (32..128)],
  [UDP Port (16)],
}
]]></artwork>
        </figure>
        <t>It contains the following fields:</t>
        <dl>
          <dt>IP Version:</dt>
          <dd>
            <t>The IP Version of the following IP Address field. <bcp14>MUST</bcp14> be 0, 4 or 6.
Setting this to zero indicates that this capsule registers an uncompressed
context. Otherwise, the capsule registers a compressed context for the IP
address and UDP port it carries.</t>
          </dd>
          <dt>IP Address:</dt>
          <dd>
            <t>The IP Address of this context. This field is omitted if the IP Version
field is set to 0. Otherwise, it has a length of 32 bits when the
corresponding IP Version field value is 4, and 128 when the IP Version is 6.</t>
          </dd>
          <dt>UDP Port:</dt>
          <dd>
            <t>The UDP Port of this context, in network byte order. This field is omitted
if the IP Version field is set to 0.</t>
          </dd>
        </dl>
        <t>When an endpoint receives a COMPRESSION_ASSIGN capsule, it <bcp14>MUST</bcp14> either
accept or reject the corresponding registration:</t>
        <ul spacing="normal">
          <li>
            <t>if it accepts the registration, first the receiver <bcp14>MUST</bcp14> save the mapping
from Context ID to address and port (or save the fact that this context ID
is uncompressed). Second, the receiver <bcp14>MUST</bcp14> return a COMPRESSION_ACK
capsule with the Context ID set to the one from the received
COMPRESSION_ASSIGN capsule back to its peer, indicating it has accepted
the registration.</t>
          </li>
          <li>
            <t>if it rejects the registration, the receiver <bcp14>MUST</bcp14> respond by sending a
COMPRESSION_CLOSE capsule with the Context ID set to the one from the
received COMPRESSION_ASSIGN capsule.</t>
          </li>
        </ul>
        <t>As mandated in <xref section="4" sectionFormat="of" target="CONNECT-UDP"/>, clients can only allocate even
Context IDs, while proxies can only allocate odd ones. Since the value 0 was
reserved by unextended UDP proxying, the Context ID value of
COMPRESSION_ASSIGN can never be zero.</t>
        <t>Endpoints <bcp14>MUST NOT</bcp14> send two COMPRESSION_ASSIGN capsules with the same
Context ID. If a recipient detects a repeated Context ID, it <bcp14>MUST</bcp14> treat the
capsule as malformed. Receipt of a malformed capsule <bcp14>MUST</bcp14> be treated as an
error processing the Capsule Protocol, as defined in <xref section="3.3" sectionFormat="of" target="HTTP-DGRAM"/>.</t>
        <t>If the uncompressed context is closed, the proxy <bcp14>MUST NOT</bcp14> open new
compressed contexts. In such a case, the proxy opening contexts results in
tuples not desired by the client reaching it thereby nullifying the IP
restriction property of uncompressed compression close as described in
<xref target="restricting-ips"/>.</t>
        <t>Only one Context ID can be used per IP-port tuple. If an endpoint detects
that both it and its peer have opened a Context ID for the same tuple, the
endpoint <bcp14>MUST</bcp14> close the Context ID that was opened by the proxy. If an
endpoint receives a COMPRESSION_ASSIGN capsule whose tuple matches another
open Context ID, it <bcp14>MUST</bcp14> treat the capsule as malformed.</t>
        <t>Endpoints <bcp14>MAY</bcp14> pre-emptively use Context IDs not yet acknowledged by the peer
via COMPRESSION_ACK, knowing that those HTTP Datagrams can be dropped if
they arrive before the corresponding COMPRESSION_ASSIGN capsule, or if the
peer rejects the registration.</t>
      </section>
      <section anchor="capsule-ack">
        <name>The COMPRESSION_ACK capsule</name>
        <t>The Compression Acknowledgment capsule (capsule type 0x12) serves to confirm
registration of a context ID that was received via a COMPRESSION_ASSIGN
capsule.</t>
        <figure anchor="fmt-capsule-ack">
          <name>Compression Acknowledgment Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_ACK Capsule {
  Type (i) = 0x12,
  Length (i),
  Context ID (i),
}
]]></artwork>
        </figure>
        <t>An endpoint can only send a COMPRESSION_ACK capsule if it received a
COMPRESSION_ASSIGN capsule with the same Context ID. If an endpoint receives
COMPRESSION_ACK capsule for a context ID it did not attempt to register via
COMPRESSION_ASSIGN, that capsule is considered malformed.</t>
      </section>
      <section anchor="capsule-close">
        <name>The COMPRESSION_CLOSE capsule</name>
        <t>The Compression Close capsule (capsule type 0x13) serves two purposes. It
can be sent as a direct response to a received COMPRESSION_ASSIGN capsule,
to indicate that the registration was rejected. It can also be sent later to
indicate the closure of a previously assigned registration.</t>
        <figure anchor="fmt-capsule-close">
          <name>Compression Close Capsule Format</name>
          <artwork><![CDATA[
COMPRESSION_CLOSE Capsule {
  Type (i) = 0x13,
  Length (i),
  Context ID (i),
}
]]></artwork>
        </figure>
        <t>Once an endpoint has either sent or received a COMPRESSION_CLOSE for a given
Context ID, it <bcp14>MUST NOT</bcp14> send any further datagrams with that Context ID.
Since the value 0 was reserved by unextended UDP proxying, a
COMPRESSION_CLOSE capsule with Context ID set to zero is malformed.</t>
        <t>Endpoints <bcp14>MAY</bcp14> close any context regardless of which endpoint registered it.
This is useful for example, when a mapping is unused for a long time.
Another potential use is restricting some targets (see <xref target="restricting-ips"/>).</t>
        <t>Once a registration is closed, endpoints can instead use an uncompressed
Context ID to exchange UDP payloads for the given target, if such a context
has been registered (see <xref target="uncompressed"/>).</t>
      </section>
    </section>
    <section anchor="uncompressed">
      <name>Uncompressed Operation</name>
      <t>If the client wishes to send or receive uncompressed datagrams, it <bcp14>MUST</bcp14>
first send a COMPRESSION_ASSIGN capsule (see <xref target="fmt-capsule-assign"/>) to the
proxy with the IP Version set to zero. This registers the Context ID as
being uncompressed semantics: all HTTP Datagrams with this Context ID have
the following format:</t>
      <figure anchor="fmt-dgram-uncomp">
        <name>Uncompressed Bound UDP Proxying HTTP Datagram Format</name>
        <artwork><![CDATA[
Uncompressed Bound UDP Proxying Payload {
  IP Version (8),
  IP Address (32..128),
  UDP Port (16),
  UDP Payload (..),
}
]]></artwork>
      </figure>
      <t>It contains the following fields:</t>
      <dl>
        <dt>IP Version:</dt>
        <dd>
          <t>The IP Version of the following IP Address field. <bcp14>MUST</bcp14> be 4 or 6.</t>
        </dd>
        <dt>IP Address:</dt>
        <dd>
          <t>The IP Address of this proxied UDP packet. When sent from client to proxy,
this is the target host to which the proxy will send this UDP payload. When
sent from proxy to client, this represents the source IP address of the UDP
packet received by the proxy. This field has a length of 32 bits when the
corresponding IP Version field value is 4, and 128 when the IP Version is 6.</t>
        </dd>
        <dt>UDP Port:</dt>
        <dd>
          <t>The UDP Port of this proxied UDP packet in network byte order. When sent
from client to proxy, this is the target port to which the proxy will send
this UDP payload. When sent from proxy to client, this represents the source
UDP port of the UDP packet received by the proxy.</t>
        </dd>
        <dt>UDP Payload:</dt>
        <dd>
          <t>The unmodified UDP Payload of this proxied UDP packet (referred to as
"data octets" in <xref target="UDP"/>).</t>
        </dd>
      </dl>
      <t>A client <bcp14>MUST NOT</bcp14> open an uncompressed Context ID if one is already open. If
a server receives a request to open an uncompressed Context ID and it
already has one open, then the server <bcp14>MUST</bcp14> treat the second capsule as
malformed. Note that it's possible for the client to close the uncompressed
context and reopen it later with a different Context ID, as long as there
aren't two uncompressed contexts open at the same time. Only the client can
request uncompressed contexts. If a client receives a COMPRESSION_ASSIGN
capsule with the IP Version set to 0, it <bcp14>MUST</bcp14> treat it as malformed.</t>
    </section>
    <section anchor="compressed-operation">
      <name>Compressed Operation</name>
      <t>Endpoints <bcp14>MAY</bcp14> choose to compress the IP and port information per datagram
for a given target using Context IDs. This is accomplished by registering a
compressed Context ID using the COMPRESSION_ASSIGN capsule (see
<xref target="fmt-capsule-assign"/>).</t>
      <t>If the Context ID in an HTTP Datagram matches one previously registered for
compressed operation, the rest of the HTTP Datagram represents the UDP
payload:</t>
      <figure anchor="fmt-dgram-comp">
        <name>Compressed Bound UDP Proxying HTTP Datagram Format</name>
        <artwork><![CDATA[
Compressed Bound UDP Proxying Payload {
  UDP Payload (..),
}
]]></artwork>
      </figure>
      <t>It contains the following field:</t>
      <dl>
        <dt>UDP Payload:</dt>
        <dd>
          <t>The unmodified UDP Payload of this proxied UDP packet (referred to as
"data octets" in <xref target="UDP"/>).</t>
        </dd>
      </dl>
    </section>
    <section anchor="hdr">
      <name>The Connect-UDP-Bind Header Field</name>
      <t>The "Connect-UDP-Bind" header field’s value is a Boolean Structured Field
set to true. Clients and proxy both indicate support for this extension by
sending the Connect-UDP-Bind header field with a value of <tt>?1</tt>. Once an
endpoint has both sent and received the Connect-UDP-Bind header field set to
true, this extension is enabled. Any other value type <bcp14>MUST</bcp14> be handled as if
the field were not present by the recipients (for example, if this field is
defined multiple times, its type becomes a List and therefore is to be
ignored). This document does not define any parameters for the
Connect-UDP-Bind header field value, but future documents might define
parameters. Receivers <bcp14>MUST</bcp14> ignore unknown parameters.</t>
    </section>
    <section anchor="addr-hdr">
      <name>The Proxy-Public-Address Response Header Field</name>
      <t>Upon accepting the request, the proxy <bcp14>MUST</bcp14> select at least one public IP
address to bind. The proxy <bcp14>MAY</bcp14> assign more addresses. For each selected
address, it <bcp14>MUST</bcp14> select an open port to bind to this request. From then and
until the tunnel is closed, the proxy <bcp14>SHALL</bcp14> send packets received on these
IP-port tuples to the client. The proxy <bcp14>MUST</bcp14> communicate the selected
addresses and ports to the client using the "Proxy-Public-Address" header
field. The header field is a List. Each member of the List is a String,
comprised of the ip-port tuple. The format of the String is defined using
IP-literal, IPv4address, and port from <xref section="3.2" sectionFormat="of" target="URI"/>.</t>
      <figure anchor="target-format">
        <name>Proxy Address Format</name>
        <artwork><![CDATA[
ip-port-tuple = DQUOTE ( IP-literal / IPv4address ) ":" port DQUOTE
]]></artwork>
      </figure>
      <t>When a single IP-Port tuple is provided in the Proxy-Public-Address field,
the proxy <bcp14>MUST</bcp14> use the same public IP and Port for the remainder of the
connection. When multiple tuples are provided, maintaining address stability
per address family is <bcp14>RECOMMENDED</bcp14>.</t>
      <t>Note that since the addresses are conveyed in HTTP response headers, a
subsequent change of addresses on the proxy cannot be conveyed to the client.</t>
      <t>If the proxy only shares IP addresses from a single address family, that
indicates that the proxy only supports that family. The client <bcp14>SHOULD NOT</bcp14>
attempt to register compressed contexts or send uncompressed datagrams
intended for targets whose IP address families were not indicated via the IP
addresses listed in the Proxy-Public-Address header field, as the proxy will
drop those datagrams and reject those registrations.</t>
    </section>
    <section anchor="behavior">
      <name>Proxy Behavior</name>
      <t>After accepting the bound UDP proxying request, the proxy uses an assigned
IP address and port to transmit UDP payloads received from the client to the
target IP Address and UDP Port specified in each HTTP Datagram received from
the client. The proxy uses the same ports to listen for UDP packets from any
authorized target and forwards them to the client by encapsulating them in
HTTP Datagrams, using the corresponding Context ID.</t>
      <t>If the proxy receives UDP payloads that don't correspond to any registration
(i.e., no compression for the given target was ever established and there is
no uncompressed registration), the proxy will either drop the datagram or
temporarily buffer it (see <xref section="5" sectionFormat="of" target="CONNECT-UDP"/>).</t>
      <section anchor="restricting-ips">
        <name>Restricting IPs</name>
        <t>If a client does not wish to receive datagrams from unknown senders, it can
close the uncompressed registration (or not open it in the first place). In
that scenario, the proxy effectively acts as a firewall against unwanted or
unknown IPs.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref section="7" sectionFormat="of" target="CONNECT-UDP"/> also
apply here. Since TURN can be run over this mechanism, implementors will
benefit from reviewing the security considerations in <xref section="21" sectionFormat="of" target="TURN"/>.</t>
      <t>Since unextended UDP proxying requests carry the target as part of the
request, the proxy can protect unauthorized targets by rejecting requests
before creating the tunnel, and communicate the rejection reason in response
header fields. The uncompressed context allows transporting datagrams to and
from any target. Clients that keep the uncompressed context open need to be
able to receive from all targets. If the UDP proxy would reject unextended
UDP proxying requests to some targets (as recommended in <xref section="7" sectionFormat="of" target="CONNECT-UDP"/>), then for bound UDP proxying requests where the uncompressed
context is open, the UDP proxy needs to perform checks on the target of each
uncompressed context datagram it receives.</t>
      <t>Note that if the compression response (COMPRESSION_ACK OR COMPRESSION_CLOSE)
cannot be immediately sent due to flow or congestion control, an upper limit
on how many compression responses the endpoint is willing to buffer <bcp14>MUST</bcp14> be
set to prevent memory exhaustion. The proxy <bcp14>MUST</bcp14> abort the request stream if
this limit is reached.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>When moving traffic between uncompressed and compressed contexts, the
effective MTU will change. This can hinder Datagram Packetization Layer PMTU
Discovery (DPLPMTUD) between the client and the target
<xref target="DPLPMTUD"/>. To avoid that, if an endpoint intends to use
compression, it <bcp14>SHOULD</bcp14> request it as early as possible.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="iana-fields">
        <name>HTTP Fields</name>
        <t>This document will request IANA to register the following new items in the
"HTTP Field Name" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/http-fields"/>&gt;:</t>
        <table anchor="iana-fields-table">
          <name>New Fields</name>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Structured Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Connect-UDP-Bind</td>
              <td align="left">Item</td>
            </tr>
            <tr>
              <td align="left">Proxy-Public-Address</td>
              <td align="left">List</td>
            </tr>
          </tbody>
        </table>
        <t>All of these new entries use the following values for these fields:</t>
        <dl spacing="compact">
          <dt>Status:</dt>
          <dd>
            <t>provisional (permanent if this document is approved)</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Comments:</dt>
          <dd>
            <t>None</t>
          </dd>
        </dl>
      </section>
      <section anchor="iana-capsules">
        <name>Capsules</name>
        <t>This document will request IANA to register the following new items to the
"HTTP Capsule Types" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/masque"/>&gt;:</t>
        <table anchor="iana-capsules-table">
          <name>New Capsules</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Capsule Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x11</td>
              <td align="left">COMPRESSION_ASSIGN</td>
            </tr>
            <tr>
              <td align="left">0x12</td>
              <td align="left">COMPRESSION_ACK</td>
            </tr>
            <tr>
              <td align="left">0x13</td>
              <td align="left">COMPRESSION_CLOSE</td>
            </tr>
          </tbody>
        </table>
        <t>All of these new entries use the following values for these fields:</t>
        <dl spacing="compact">
          <dt>Status:</dt>
          <dd>
            <t>provisional (permanent if this document is approved)</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Change Controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Contact:</dt>
          <dd>
            <t>MASQUE Working Group <eref target="mailto:masque@ietf.org">masque@ietf.org</eref></t>
          </dd>
          <dt>Notes:</dt>
          <dd>
            <t>None</t>
          </dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="UDP">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="STRUCTURED-FIELDS">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P-H. Kamp" surname="P-H. Kamp"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields.</t>
              <t>This document obsoletes RFC 8941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9651"/>
          <seriesInfo name="DOI" value="10.17487/RFC9651"/>
        </reference>
        <reference anchor="ABNF">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="TEMPLATE">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="HTTP-DGRAM">
          <front>
            <title>HTTP Datagrams and the Capsule Protocol</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="L. Pardue" initials="L." surname="Pardue"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection.</t>
              <t>In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.</t>
              <t>HTTP Datagrams and the Capsule Protocol are intended for use by HTTP extensions, not applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9297"/>
          <seriesInfo name="DOI" value="10.17487/RFC9297"/>
        </reference>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="WebRTC" target="https://www.w3.org/TR/webrtc/">
          <front>
            <title>WebRTC</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January" day="26"/>
          </front>
          <seriesInfo name="W3C" value="Recommendation"/>
        </reference>
        <reference anchor="ICE">
          <front>
            <title>Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal</title>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>This document describes a protocol for Network Address Translator (NAT) traversal for UDP-based communication. This protocol is called Interactive Connectivity Establishment (ICE). ICE makes use of the Session Traversal Utilities for NAT (STUN) protocol and its extension, Traversal Using Relay NAT (TURN).</t>
              <t>This document obsoletes RFC 5245.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8445"/>
          <seriesInfo name="DOI" value="10.17487/RFC8445"/>
        </reference>
        <reference anchor="TURN">
          <front>
            <title>Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)</title>
            <author fullname="T. Reddy" initials="T." role="editor" surname="Reddy"/>
            <author fullname="A. Johnston" initials="A." role="editor" surname="Johnston"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>If a host is located behind a NAT, it can be impossible for that host to communicate directly with other hosts (peers) in certain situations. In these situations, it is necessary for the host to use the services of an intermediate node that acts as a communication relay. This specification defines a protocol, called "Traversal Using Relays around NAT" (TURN), that allows the host to control the operation of the relay and to exchange packets with its peers using the relay. TURN differs from other relay control protocols in that it allows a client to communicate with multiple peers using a single relay address.</t>
              <t>The TURN protocol was designed to be used as part of the Interactive Connectivity Establishment (ICE) approach to NAT traversal, though it can also be used without ICE.</t>
              <t>This document obsoletes RFCs 5766 and 6156.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8656"/>
          <seriesInfo name="DOI" value="10.17487/RFC8656"/>
        </reference>
        <reference anchor="DPLPMTUD">
          <front>
            <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
            <author fullname="T. Völker" initials="T." surname="Völker"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
              <t>The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
              <t>This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8899"/>
          <seriesInfo name="DOI" value="10.17487/RFC8899"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
      </references>
    </references>
    <?line 524?>

<section anchor="example">
      <name>Example</name>
      <t>In the example below, the client is configured with URI Template
"https://example.org/.well-known/masque/udp/{target_host}/{target_port}/"
and listens for traffic on the proxy, eventually decides that it no longer
wants to listen for connections from new targets, and limits its
communication with only 203.0.113.11:4321 and no other UDP target.</t>
      <artwork><![CDATA[
 Client                                             Server

 STREAM(44): HEADERS            -------->
   :method = CONNECT
   :protocol = connect-udp
   :scheme = https
   :path = /.well-known/masque/udp/%2A/%2A/
   :authority = proxy.example.org
   connect-udp-bind = ?1
   capsule-protocol = ?1

            <--------  STREAM(44): HEADERS
                         :status = 200
                         connect-udp-bind = ?1
                         capsule-protocol = ?1
                         proxy-public-address = "192.0.2.45:54321",  \
                                            "[2001:db8::1234]:54321"

// Register Context ID 2 to be used for uncompressed UDP payloads
// to/from any target.

 CAPSULE                       -------->
   Type = COMPRESSION_ASSIGN
   Context ID = 2
   IP Version = 0

// Proxy confirms registration.

            <-------- CAPSULE
                        Type = COMPRESSION_ACK
                        Context ID = 2

// Target talks to Client using the uncompressed context.

            <--------  DATAGRAM
                         Quarter Stream ID = 11
                         Context ID = 2
                         IP Version = 4
                         IP Address = 192.0.2.42
                         UDP Port = 1234
                         UDP Payload = Encapsulated UDP Payload

// Client responds on the same uncompressed context.

 DATAGRAM                       -------->
   Quarter Stream ID = 11
   Context ID = 2
   IP Version = 4
   IP Address = 192.0.2.42
   UDP Port = 1234
   UDP Payload = Encapsulated UDP Payload

// Another target talks to Client using the uncompressed context.

            <--------  DATAGRAM
                         Quarter Stream ID = 11
                         Context ID = 2
                         IP Version = 4
                         IP Address = 203.0.113.11
                         UDP Port = 4321
                         UDP Payload = Encapsulated UDP Payload

// Client responds on the same uncompressed context.

 DATAGRAM                       -------->
   Quarter Stream ID = 11
   Context ID = 2
   IP Version = 4
   IP Address = 203.0.113.11
   UDP Port = 4321
   UDP Payload = Encapsulated UDP Payload

// Register 203.0.113.11:4321 to compress it in the future.

 CAPSULE                       -------->
   Type = COMPRESSION_ASSIGN
   Context ID = 4
   IP Version = 4
   IP Address = 203.0.113.11
   UDP Port = 4321


// Proxy confirms registration.

            <-------- CAPSULE
                        Type = COMPRESSION_ACK
                        Context ID = 4

// Omit IP and Port for future packets intended for
// 203.0.113.11:4321 hereon.

 DATAGRAM                       -------->
   Context ID = 4
   UDP Payload = Encapsulated UDP Payload

            <--------  DATAGRAM
                        Context ID = 4
                        UDP Payload = Encapsulated UDP Payload

// Request packets without a corresponding compressed Context
// to be dropped by closing the uncompressed Context.

 CAPSULE                       -------->
   Type = COMPRESSION_CLOSE
   Context ID = 2

// Context ID 4 = 203.0.113.11:4321 traffic is accepted,
// and other traffic is dropped at the proxy.
]]></artwork>
    </section>
    <section anchor="comparison-with-connect-ip">
      <name>Comparison with CONNECT-IP</name>
      <t>While the use-cases described in <xref target="intro"/> could be supported using IP
proxying in HTTP <xref target="CONNECT-IP"/>, it would require that every HTTP
Datagram carries a complete IP header. This would lead to both
inefficiencies in the wire encoding and reduction in available Maximum
Transmission Unit (MTU). Furthermore, Web browsers would need to support
IPv4 and IPv6 header generation, parsing, validation and error handling.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This proposal is the result of many conversations with MASQUE working group
participants. In particular, the authors would like to thank <contact fullname="Alejandro Sedeño"/>, <contact fullname="Ben Schwartz"/>, <contact fullname="Lucas Pardue"/>, <contact fullname="Magnus Westerlund"/>,
<contact fullname="Marius Kleidl"/>, <contact fullname="Mark Nottingham"/>, <contact fullname="Marten Seemann"/>, and
<contact fullname="Tommy Pauly"/> for their reviews.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
