Internet-Draft HTTP Problem Types for Digest Fields April 2025
Kleidl, et al. Expires 27 October 2025 [Page]
Workgroup:
Building Blocks for HTTP APIs
Internet-Draft:
draft-ietf-httpapi-digest-fields-problem-types-01
Published:
Intended Status:
Informational
Expires:
Authors:
M. Kleidl
Transloadit
L. Pardue
Cloudflare
R. Polli
Par-Tec

HTTP Problem Types for Digest Fields

Abstract

This document specifies problem types that servers can use in responses to problems encountered while dealing with a request carrying integrity fields and integrity preference fields.

About This Document

This note is to be removed before publishing as an RFC.

The latest revision of this draft can be found at https://ietf-wg-httpapi.github.io/digest-fields-problem-types/draft-ietf-httpapi-digest-fields-problem-types.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-ietf-httpapi-digest-fields-problem-types/.

Discussion of this document takes place on the Building Blocks for HTTP APIs Working Group mailing list (mailto:httpapi@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/httpapi/. Subscribe at https://www.ietf.org/mailman/listinfo/httpapi/.

Source for this draft and an issue tracker can be found at https://github.com/ietf-wg-httpapi/digest-fields-problem-types.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 27 October 2025.

Table of Contents

1. Introduction

[DIGEST] defines HTTP fields for exchanging integrity digests and preferences, but does not specify, require or recommend any specific behavior for error handling relating to integrity by design. The responsibility is instead delegated to applications. This draft defines a set of problem types ([PROBLEM]) that can be used by server applications to indicate that a problem was encountered while dealing with a request carrying integrity fields and integrity preference fields.

For example, a request message may include content alongside Content-Digest and Repr-Digest fields that use a digest algorithm the server does not support. An application could decide to reject this request because it cannot validate the integrity. Using a problem type, the server can provide machine-readable error details to aid debugging or error reporting, as shown in the following example.

# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 400 Bad Request
Content-Type: application/problem+json
Want-Content-Digest: sha-512=3, sha-256=10

{
  "type": "https://iana.org/assignments/http-problem-types#\
    digest-unsupported-algorithm",
  "title": "hashing algorithm is not supported",
  "unsupported-algorithm": "foo",
  "header": "Wand-Content-Digest"
}

2. Conventions and Definitions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

Some examples in this document contain long lines that may be folded, as described in [RFC8792].

The terms "integrity fields" and "integrity preference fields" in this document are to be interpreted as described in [DIGEST].

The term "problem type" in this document is to be interpreted as described in [PROBLEM].

The terms "request", "response", "intermediary", "sender", and "server" are from [HTTP].

3. Problem Types

The following section defines three problem types to express common problems that occur when handling integrity or integrity preference fields on the server. These problem types use the digest- prefix in their type URI. Other problem types that are defined outside this document, yet specific to digest related problems, may reuse this prefix.

3.1. Unsupported Hashing Algorithm

This section defines the "https://iana.org/assignments/http-problem-types#digest-unsupported-algorithm" problem type. A server MAY use this problem type if it wants to communicate to the client that one of the hashing algorithms referenced in the integrity or integrity preference fields present in the request is not supported.

Two problem type extension members are defined, which SHOULD be populated for all responses using this problem type:

  • The unsupported-algorithm extension member identifies the unsupported algorithm from the request. Its value is the corresponding algorithm key.

  • The header extension member as defined in Section 4.

The response can include the corresponding integrity preference field to indicate the server's algorithm support and preference.

This problem type is a hint to the client about algorithm support, which the client could use to retry the request with a different, supported, algorithm.

Example:

POST /books HTTP/1.1
Host: foo.example
Content-Type: application/json
Accept: application/json
Accept-Encoding: identity
Repr-Digest: sha-256=:mEkdbO7Srd9LIOegftO0aBX+VPTVz7/CSHes2Z27gc4=:

{"title": "New Title"}
Figure 1: A request with a sha-256 integrity field, which is not supported by the server
# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 400 Bad Request
Content-Type: application/problem+json
Want-Repr-Digest: sha-512=10, sha-256=0

{
  "type": "https://iana.org/assignments/http-problem-types#\
    digest-unsupported-algorithm",
  "title": "Unsupported hashing algorithm",
  "unsupported-algorithm": "sha-256",
  "header": "Repr-Digest"
}
Figure 2: Response indicating the problem and advertising the supported algorithms

This problem type can also be used when a request contains an integrity preference field with an unsupported algorithm. For example:

GET /items/123 HTTP/1.1
Host: foo.example
Want-Repr-Digest: sha=10

Figure 3: A request with a sha-256 integrity preference field, which is not supported by the server
# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 400 Bad Request
Content-Type: application/problem+json

{
  "type": "https://iana.org/assignments/http-problem-types#\
    digest-unsupported-algorithm",
  "title": "Unsupported hashing algorithm",
  "unsupported-algorithm": "sha",
  "header": "Want-Repr-Digest"
}
Figure 4: Response indicating the problem and advertising the supported algorithms

3.2. Invalid Digest Value

This section defines the "https://iana.org/assignments/http-problem-types#digest-invalid-value" problem type. A server MAY use this problem type when responding to a request, whose integrity fields include a digest value, that cannot be generated by the corresponding hashing algorithm. For example, if the digest value of the sha-512 hashing algorithm is not 64 bytes long, it cannot be a valid SHA-512 digest value and the server can skip computing the digest value. This problem type MUST NOT be used if the server is not able to parse the integrity fields according to Section 4.5 of [STRUCTURED-FIELDS], for example because of a syntax error in the field value.

One problem type extension member is defined, which SHOULD be populated for all responses using this problem type:

  • The header extension member as defined in Section 4.

The server SHOULD include a human-readable description why the value is considered invalid in the title member.

This problem type indicates a fault in the sender's calculation or encoding of the digest value. A retry of the same request without modification will likely not yield a successful response.

The following example shows a request with the content {"hello": "world"} (plus LF), but the digest has been truncated. The subsequent response indicates the invalid SHA-512 digest.

PUT /items/123 HTTP/1.1
Host: foo.example
Content-Type: application/json
Repr-Digest: sha-512=:YMAam51Jz/jOATT6/zvHrLVgOYTGFy1d6GJiOHTohq4:

{"hello": "world"}
Figure 5: A request with a sha-512 integrity field, whose digest has been truncated to 32 bytes
# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 400 Bad Request
Content-Type: application/problem+json

{
  "type": "https://iana.org/assignments/http-problem-types#\
    digest-invalid-value",
  "title": "digest value for sha-512 is not 64 bytes long",
  "header": "Repr-Digest"
}
Figure 6: Response indicating that the provided digest is too short

3.3. Mismatching Digest Value

This section defines the "https://iana.org/assignments/http-problem-types#digest-mismatching-value" problem type. A server MAY use this problem type when responding to a request, whose integrity fields include a digest value that does not match the digest value that the server calculated for the request content or representation.

Three problem type extension members are defined, which SHOULD be populated for all responses using this problem type:

  • The algorithm extension member is the algorithm key of the used hashing algorithm.

  • The provided-digest extension member is the digest value taken from the request's integrity fields. The digest value is serialized as a byte sequence as described in Section 4.1.8 of [STRUCTURED-FIELDS].

  • The header extension member as defined in Section 4.

The problem type intentionally does not include the digest value calculated by the server to avoid attackers abusing this information for oracle attacks.

If the sender receives this problem type, the request might be modified unintentionally by an intermediary. The sender could use this information to retry the request without modification to address temporary transmission issues.

The following example shows a request with the content {"hello": "woXYZ"} (plus LF), but the representation digest for {"hello": "world"} (plus LF). The subsequent response indicates the mismatching SHA-256 digest values.

PUT /items/123 HTTP/1.1
Host: foo.example
Content-Type: application/json
Repr-Digest: sha-256=:RK/0qy18MlBSVnWgjwz6lZEWjP/lF5HF9bvEF8FabDg=:

{"hello": "woXYZ"}
Figure 7: A request with a sha-256 integrity field, which does not belong to the representation
# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 400 Bad Request
Content-Type: application/problem+json

{
  "type": "https://iana.org/assignments/http-problem-types#\
    digest-mismatching-value",
  "title": "digest value from request does not match expected value",
  "algorithm": "sha-256",
  "provided-digest": ":RK/0qy18MlBSVnWgjwz6lZEWjP/lF5HF9bvEF8FabDg=:",
  "header": "Repr-Digest"
}
Figure 8: Response indicating the mismatching digests

4. Identifying Problem Causing Headers

Requests can include multiple integrity or integrity preference fields. For example, they may use the Content-Digest and Repr-Digest fields simultaneously or express preferences for content and representation digests at the same time. To aid troubleshooting, it's useful to identify the header field, whose value caused the problem detailed in the response. For this reason, the header extension member is defined, which SHOULD be populated for all responses using the problem types defined in this document.

The header extension member's value is the header field name that caused the problem. Since HTTP header field names are case-insensitive and not all HTTP versions preserve their casing, the casing of extension member's value might not match the request header field name's casing.

5. Security Considerations

Disclosing error details could leak information such as the presence of intermediaries or the server's implementation details. Moreover, they can be used to fingerprint the server.

To mitigate these risks, a server could assess the risk of disclosing error details and prefer a general problem type over a more specific one.

When a server informs the client about mismatching digest values, it should not expose the calculated digest to avoid exposing information that can be abused for oracle attacks.

6. IANA Considerations

IANA is asked to register the following entries in the "HTTP Problem Types" registry at https://www.iana.org/assignments/http-problem-types.

6.1. Registration of "digest-unsupported-algorithm" Problem Type

Type URI:

https://iana.org/assignments/http-problem-types#digest-unsupported-algorithm

Title:

Unsupported Hashing Algorithm

Recommended HTTP status code:

400

Reference:

Section 3.1 of this document

6.2. Registration of "digest-invalid-value" Problem Type

Type URI:

https://iana.org/assignments/http-problem-types#digest-invalid-value

Title:

Invalid Digest Value

Recommended HTTP status code:

400

Reference:

Section 3.2 of this document

6.3. Registration of "digest-mismatching-value" Problem Type

Type URI:

https://iana.org/assignments/http-problem-types#digest-mismatching-value

Title:

Mismatching Digest Value

Recommended HTTP status code:

400

Reference:

Section 3.3 of this document

7. Normative References

[DIGEST]
Polli, R. and L. Pardue, "Digest Fields", RFC 9530, DOI 10.17487/RFC9530, , <https://www.rfc-editor.org/rfc/rfc9530>.
[HTTP]
Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, Ed., "HTTP Semantics", STD 97, RFC 9110, DOI 10.17487/RFC9110, , <https://www.rfc-editor.org/rfc/rfc9110>.
[PROBLEM]
Nottingham, M., Wilde, E., and S. Dalal, "Problem Details for HTTP APIs", RFC 9457, DOI 10.17487/RFC9457, , <https://www.rfc-editor.org/rfc/rfc9457>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/rfc/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/rfc/rfc8174>.
[RFC8792]
Watsen, K., Auerswald, E., Farrel, A., and Q. Wu, "Handling Long Lines in Content of Internet-Drafts and RFCs", RFC 8792, DOI 10.17487/RFC8792, , <https://www.rfc-editor.org/rfc/rfc8792>.
[STRUCTURED-FIELDS]
Nottingham, M. and P. Kamp, "Structured Field Values for HTTP", RFC 9651, DOI 10.17487/RFC9651, , <https://www.rfc-editor.org/rfc/rfc9651>.

Authors' Addresses

Marius Kleidl
Transloadit
Lucas Pardue
Cloudflare
Roberto Polli
Par-Tec
Italy