Acknowledgments The CONNECT method was originally described in a Work in Progress titled, "Tunneling TCP based protocols through Web proxy servers", by Ari Luotonen of Netscape Communications Corporation. It was widely implemented by HTTP proxies, but was never made a part of any IETF Standards Track document.

May 01, 2020 Upgrading to TLS Within HTTP/1.1 - Stanford University The CONNECT method was originally described in an Internet-Draft titled Tunneling TCP based protocols through Web proxy servers[8] by Ari Luotonen of Netscape Communications Corporation. It was widely implemented by HTTP proxies, but was never made a part of any IETF Standards Track document. HTTP/1.1: References - World Wide Web Consortium part of Hypertext Transfer Protocol -- HTTP/1.1 RFC 2616 Fielding, et al. 17 References Alvestrand, H., Tags for the Identification of Languages, RFC 1766, March 1995

Net::HTTPTunnel - Create sockets that are tunnels through

Tunneling TCP traffic through HTTP proxy It is not obvious but possible to use HTTP proxy to tunnel arbitrary TCP traffic for applications and protocols other than HTTP. Most http proxies support CONNECT command that is used to establish secure https connections. Some servers may wish to simply refuse the connection. The server, while acting as a gateway or proxy, did not receive a timely response from the upstream server specified by the URI (e.g. HTTP, FTP, LDAP) or some other auxiliary server (e.g. DNS) it needed to access in attempting to complete the request. Acknowledgments The CONNECT method was originally described in a Work in Progress titled, "Tunneling TCP based protocols through Web proxy servers", by Ari Luotonen of Netscape Communications Corporation. It was widely implemented by HTTP proxies, but was never made a part of any IETF Standards Track document.

Tunneling TCP based protocols through Web proxy servers draft-luotonen-web-proxy-tunneling-01. Status; IESG evaluation record; IESG writeups; Email expansions; History; Recipient expansions. Mail trigger To Cc; ballot_deferred: The IESG , draft-luotonen-web-proxy-tunneling@ietf.org, iesg-secretary@ietf.org: doc_added_comment

Network Load Balancing, a clustering technology included in the Microsoft Windows 2000 Advanced Server and Datacenter Server operating systems, ENHANCES THE STABILITY AND AVAILABILITY OF MISSION-CRITICAL, TCP/IP-BASED SERVICES, SUCH AS WEB, TERMINAL SERVICES, VIRTUAL PRIVATE NETWORKING, AND STREAMING MEDIA SERVERS. An Evaluation of TCP Splice Benefits in Web Proxy Servers A Web proxy cache can exploit the basic TCP Splice service to handle SSL tunnels and HTTP/1.0 requests for content determined to be non-cacheable based on the request message. Figure 2 presents the pseudo-code for sample procedures for handling CONNECT and GET requests; both procedures are invoked after the proxy accepts the client connection Understanding Proxy Server Clients can be set up for Internet access in minutes. Proxy Server is compatible with most Internet protocols and Windows Sockets–based applications. On your internal network, Proxy Server supports both Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX) and Transport Control Protocol/Internet Protocol (TCP/IP).