<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rosomakho-httpbis-outdated-proxy-config-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title>Detecting Outdated Proxy Configuration</title>
    <seriesInfo name="Internet-Draft" value="draft-rosomakho-httpbis-outdated-proxy-config-00"/>
    <author fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="29"/>
    <area>Web and Internet Transport</area>
    <workgroup>HTTP</workgroup>
    <keyword>PAC</keyword>
    <keyword>PvD</keyword>
    <keyword>outdated</keyword>
    <abstract>
      <?line 42?>

<t>This document defines a lightweight mechanism that allows explicit HTTP proxies to inform clients when their proxy configuration, such as a Proxy Auto-Configuration (PAC) file or Provisioning Domain (PvD) proxy configuration, is outdated. Clients signal to the proxy the configuration URL and the timestamp of when it was last fetched. In response, the proxy may indicate that a newer version of the configuration is available. This enables clients to refresh their configuration without relying on frequent polling or short expiration intervals. The mechanism is designed to be compatible with existing proxy deployment models and supports both PAC-based and PvD-based configurations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://yaroslavros.github.io/httpbis-outdated-proxy-config/draft-rosomakho-httpbis-outdated-proxy-config.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rosomakho-httpbis-outdated-proxy-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP Working Group mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaroslavros/httpbis-outdated-proxy-config"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Explicit HTTP proxies are widely deployed in enterprise and managed network environments to enforce routing policies, enable traffic inspection, or implement access control. Clients relying on such proxies typically obtain configuration through a Proxy Auto-Configuration (PAC) file <xref target="PAC-FILE"/> or a Provisioning Domain (PvD) <xref target="PROXY-PVD"/>. In many deployments, it is necessary to update these configurations in response to operational changes such as service onboarding, emergency routing adjustments, or policy corrections.</t>
      <t>Currently, clients have limited mechanisms to detect whether the proxy configuration they are using is stale. As a result, PAC files are often polled at short intervals, and PvD expiration times are configured with low values to accelerate refreshes. These approaches are inefficient and may introduce unnecessary network traffic or delay the application of important updates.</t>
      <t>This document defines a simple mechanism that enables a proxy to inform a client that its current configuration is outdated. The client includes in its request a structured field indicating the URL of the PAC file or PvD and the timestamp of when it last fetched the configuration. If the proxy recognizes the configuration and determines that a newer version is available, it may respond with a boolean indicator prompting the client to refresh the configuration.</t>
      <t>This mechanism applies to all forms of explicit proxying over HTTP, including:</t>
      <ul spacing="normal">
        <li>
          <t>HTTP CONNECT as defined <xref section="9.3.6" sectionFormat="of" target="HTTP"/></t>
        </li>
        <li>
          <t><xref target="CONNECT-UDP"/></t>
        </li>
        <li>
          <t><xref target="CONNECT-IP"/></t>
        </li>
        <li>
          <t>Templated <xref target="CONNECT-TCP"/></t>
        </li>
      </ul>
      <t>The mechanism is optional, compatible with existing protocols, and requires no persistent state. It allows clients to discover configuration updates proactively while preserving the existing operational model.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>To enable detection of stale proxy configuration, clients may include a <tt>Proxy-Config</tt> HTTP header field in requests sent to an explicit proxy. This header communicates the URL of the proxy configuration (such as a PAC file or PvD) and the timestamp of when the client last fetched it.</t>
      <t>Upon receiving a request containing the <tt>Proxy-Config</tt> header, a proxy that supports this mechanism compares the provided timestamp with the most recent update time of the corresponding configuration. If the proxy determines that the client configuration is outdated, it can signal this condition using the <tt>Proxy-Config-Stale</tt> response header.</t>
      <t>This mechanism is optional and advisory. Proxies are not required to track or respond to client configuration metadata, and clients are not required to act immediately upon receiving a staleness indication. The mechanism is designed to supplement, not replace, existing configuration refresh behaviors.</t>
    </section>
    <section anchor="proxy-config-header">
      <name>Proxy-Config Header</name>
      <t>The <tt>Proxy-Config</tt> request header field is used by a client to inform an explicit proxy about the proxy configuration it is currently using. The field conveys a dictionary structured field as defined in <xref section="3.2" sectionFormat="of" target="STRUCTURED-FIELD"/> with the following keys:</t>
      <ul spacing="normal">
        <li>
          <t><tt>url</tt> (optional): A string identifying the URL from which the client fetched the configuration. This may point to a PAC file or a PvD configuration. If omitted, the proxy is expected to infer the default PvD URI based on its own hostname and ".well-known/pvd" path as defined in <xref section="4.1" sectionFormat="of" target="PVDDATA"/>.</t>
        </li>
        <li>
          <t><tt>fetched</tt> (required): A date value indicating when the client last fetched the configuration. The value <bcp14>MUST</bcp14> use the Date format defined in <xref section="3.3.7" sectionFormat="of" target="STRUCTURED-FIELD"/>.</t>
        </li>
      </ul>
      <section anchor="handling-unknown-or-sensitive-urls">
        <name>Handling Unknown or Sensitive URLs</name>
        <t>Clients <bcp14>MUST NOT</bcp14> include URLs that expose local system information (e.g., <tt>file://</tt> URLs). Clients <bcp14>SHOULD</bcp14> limit use of the Proxy-Config header to contexts where it does not introduce privacy or security risks, such as trusted or encrypted proxy connections.</t>
      </section>
      <section anchor="examples">
        <name>Examples</name>
        <t>A client using a PAC file retrieved from <tt>https://config.example.net/proxy.pac</tt> at 2025-06-01T00:00:00Z <bcp14>MAY</bcp14> include the following header:</t>
        <figure>
          <name>Example of Proxy-Config header with url field</name>
          <artwork type="ascii-art"><![CDATA[
Proxy-Config: url="https://config.example.net/proxy.pac", fetched=@1748736000
]]></artwork>
        </figure>
        <t>If the client is using the default PvD URI associated with the proxy hostname, it may omit the <tt>url</tt> key:</t>
        <figure>
          <name>Example of Proxy-Config header without url field</name>
          <artwork type="ascii-art"><![CDATA[
Proxy-Config: fetched=@1748736000
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="proxy-config-stale-header">
      <name><tt>Proxy-Config-Stale</tt> Header</name>
      <t>The <tt>Proxy-Config-Stale</tt> response header field is used by a proxy to inform the client whether its current proxy configuration is considered outdated. This allows the client to make informed decisions about whether to refresh the configuration.</t>
      <t>The field is a boolean as defined in <xref section="3.3.6" sectionFormat="of" target="STRUCTURED-FIELD"/>, where:</t>
      <ul spacing="normal">
        <li>
          <t><tt>?1</tt> indicates that the configuration used by the client is stale and a newer version is available.</t>
        </li>
        <li>
          <t><tt>?0</tt> indicates that the configuration used by the client is current.</t>
        </li>
      </ul>
      <t>The proxy <bcp14>MUST</bcp14> only include this header if it has received a valid <tt>Proxy-Config</tt> header from the client and is able to recognize and evaluate the configuration URL. If the proxy does not recognize the provided configuration URL, does not track updates for it, or does not support this mechanism, it <bcp14>MUST</bcp14> omit the <tt>Proxy-Config-Stale</tt> header.</t>
      <t>The <tt>Proxy-Config-Stale</tt> header <bcp14>MAY</bcp14> appear in both successful and error responses, except for responses related to client authentication (e.g., <tt>407 Proxy Authentication Required</tt>). Including the header in such authentication-related responses could result in unintended exposure of configuration metadata and may interfere with authentication workflows.</t>
      <t>The <tt>Proxy-Config-Stale</tt> field is advisory. Its presence does not affect the processing of the current request or response. Clients <bcp14>MAY</bcp14> choose how and when to act upon the information, including deferring configuration refresh until convenient.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Clients using the <tt>Proxy-Config</tt> header field must take care to avoid disclosing sensitive information in the URL or metadata they send to the proxy.</t>
      <section anchor="avoiding-sensitive-urls">
        <name>Avoiding Sensitive URLs</name>
        <t>Clients <bcp14>MUST NOT</bcp14> include configuration URLs that reveal local system details, such as <tt>file:// URIs</tt> or paths containing user-specific or internal directory structures. To reduce exposure, clients <bcp14>SHOULD</bcp14> only use this mechanism when proxy configuration is relevant to the proxy (e.g., hosted on the proxy or a part of the same enterprise domain).</t>
      </section>
      <section anchor="trusted-communication-channels">
        <name>Trusted Communication Channels</name>
        <t>The <tt>Proxy-Config</tt> header is intended for use over secure and trusted communication channels. Clients <bcp14>SHOULD</bcp14> send this header only when using TLS or when otherwise confident that the request is not observable or modifiable by unauthorized intermediaries.</t>
      </section>
      <section anchor="authentication-related-responses">
        <name>Authentication-related Responses</name>
        <t>Proxies <bcp14>MUST NOT</bcp14> include the <tt>Proxy-Config-Stale</tt> header in responses related to client authentication (e.g., <tt>407 Proxy Authentication Required</tt>). This avoids potential leakage of client configuration metadata during authentication flows that may be visible to other components or exposed through logging or error handling.</t>
      </section>
      <section anchor="denial-of-service-considerations">
        <name>Denial-of-Service Considerations</name>
        <t>A misconfigured or malicious proxy could include <tt>Proxy-Config-Stale: ?1</tt> in every response, causing the client to repeatedly refetch proxy configuration. This behavior can lead to excessive network traffic, CPU usage, or degraded performance on the client, particularly in environments where configuration retrieval is resource-intensive.</t>
        <t>To mitigate this risk, clients <bcp14>MUST</bcp14> implement appropriate rate limiting or throttling mechanisms when acting on stale configuration indications. For example, a client may choose to ignore repeated <tt>?1</tt> responses within a minimum refresh interval or apply exponential backoff when encountering multiple stale signals in quick succession.</t>
        <t>Clients <bcp14>SHOULD</bcp14> validate the authenticity and integrity of any fetched configuration before applying it, and ensure that configuration refreshes do not interfere with ongoing connection or session state.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the following HTTP header fields in the "Hypertext Transfer Protocol (HTTP) Field Name Registry":</t>
      <t>Proxy-Config</t>
      <ul spacing="normal">
        <li>
          <t>Field Name: Proxy-Config</t>
        </li>
        <li>
          <t>Status: permanent</t>
        </li>
        <li>
          <t>Reference: this document</t>
        </li>
      </ul>
      <t>Proxy-Config-Stale</t>
      <ul spacing="normal">
        <li>
          <t>Field Name: Proxy-Config-Stale</t>
        </li>
        <li>
          <t>Status: permanent</t>
        </li>
        <li>
          <t>Reference: this document</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="STRUCTURED-FIELD">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P-H. Kamp" surname="P-H. Kamp"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields.</t>
              <t>This document obsoletes RFC 8941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9651"/>
          <seriesInfo name="DOI" value="10.17487/RFC9651"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PAC-FILE" target="https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Proxy_servers_and_tunneling/Proxy_Auto-Configuration_PAC_file">
          <front>
            <title>Proxy Auto-Configuration (PAC) file</title>
            <author>
              <organization>Mozilla</organization>
            </author>
            <date year="2025" month="May"/>
          </front>
        </reference>
        <reference anchor="PROXY-PVD">
          <front>
            <title>Communicating Proxy Configurations in Provisioning Domains</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="Dragana Damjanovic" initials="D." surname="Damjanovic">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="26" month="June" year="2025"/>
            <abstract>
              <t>   This document defines a mechanism for accessing provisioning domain
   information associated with a proxy, such as other proxy URIs that
   support different protocols and information about which destinations
   are accessible using a proxy.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tfpauly/privacy-proxy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-proxy-config-06"/>
        </reference>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
        <reference anchor="CONNECT-TCP">
          <front>
            <title>Template-Driven HTTP CONNECT Proxying for TCP</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="11" month="June" year="2025"/>
            <abstract>
              <t>   TCP proxying using HTTP CONNECT has long been part of the core HTTP
   specification.  However, this proxying functionality has several
   important deficiencies in modern HTTP environments.  This
   specification defines an alternative HTTP proxy service configuration
   for TCP connections.  This configuration is described by a URI
   Template, similar to the CONNECT-UDP and CONNECT-IP protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-connect-tcp-08"/>
        </reference>
        <reference anchor="PVDDATA">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
      </references>
    </references>
    <?line 177?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Tommy Pauly and Dragana Damjanovic for reviewing the concept and providing initial feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
