https://bz.apache.org/bugzilla/show_bug.cgi?id=65802

--- Comment #7 from Nils R <renaud.n...@gmail.com> ---
To add to that point, I found out another reason to push this issue forward.

The HTTP/2.0 RFC (https://datatracker.ietf.org/doc/html/rfc7540#section-10.3)
says in the "Intermediary Encapsulation Attack" section : 

> The HTTP/2 header field encoding allows the expression of names that
> are not valid field names in the Internet Message Syntax used by
> HTTP/1.1.  Requests or responses containing invalid header field
> names MUST be treated as malformed (Section 8.1.2.6).  An
> intermediary therefore cannot translate an HTTP/2 request or response
> containing an invalid field name into an HTTP/1.1 message.

So it seems, that there is a security consideration to reject such header
names.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to