From 338228af62e049cf5d1ecd0aa59818e746563248 Mon Sep 17 00:00:00 2001
From: Christophe Jaillet
The HTTP/2 protocol is implemented by its own httpd module, aptly named
- mod_http2. It implements the complete set
+ mod_http2 uses the library of nghttp2
- as its implementation base. In order to build When you While that should do the trick for most, they are people who might prefer a statically
linked h2c
',
the secure one 'h2
'. For h2c
it allows the direct
@@ -74,8 +74,8 @@
mod_http2
you need at least version 1.2.1 of
+ libnghttp2
installed on your system../configure
you Apache httpd source tree, you need to give it
'--enable-http2
' as additional argument to trigger the build of the module.
@@ -84,7 +84,7 @@
to configure
.nghttp2
in this module. For those, the option --enable-nghttp2-staticlib-deps
- exists. It works quite similar to how one statically links openssl to mod_ssl.
Speaking of SSL, you need to be aware that most browsers will speak HTTP/2 only on When you have a When you have a This allows only HTTP/1 on connections, except SSL connections to The The The order of protocols mentioned is also relevant. By default, the first one is the
most preferred protocol. When a client offers multiple choices, the one most to the
@@ -148,12 +154,32 @@ ProtocolsHonorOrder Off
ordering will decide. A last thing: the protocols you configure are not checked for correctness
or spelling. You can mention protocols that do not exist, so there is no need
- to guard https:
URLs, so you need a server with SSL support. But not only that, you will need a SSL library
that supports the ALPN
extension. If OpenSSL is the library you use, you need
@@ -94,7 +94,7 @@
httpd
built with mod_http2
you need some
+ httpd
built with test.example.org
which offer HTTP/2.h2
enabled server with a inappropriate cipher suite will force it to simply refuse and fall back to HTTP 1.1. This is a common mistake that is done while configuring httpd for HTTP/2 the first time, so please keep it in mind to avoid long debugging sessions! If you want to be sure about the cipher suite to choose please avoid the ones listed in the HTTP/2 TLS blacklist.h2
enabled server with a inappropriate
+ cipher suite will force it to simply refuse and fall back to HTTP 1.1. This is a common mistake
+ that is done while configuring httpd for HTTP/2 the first time, so please keep it in mind to avoid
+ long debugging sessions! If you want to be sure about the cipher suite to choose please avoid
+ the ones listed in the HTTP/2 TLS blacklist.Protocols
with any IfModule
checks.
For more advanced tips on configuration, see the modules section about dimensioning and how to manage multiple hosts with the same certificate.
HTTP/2 is supported in all multi-processing modules that come with httpd. However, if
+ you use the
In
If your setup can handle it, configuring
If you are really stuck with
Almost all modern browsers support HTTP/2, but only over SSL connections: Firefox (v43), @@ -187,7 +213,10 @@ ProtocolsHonorOrder Off
Chrome offers detailed HTTP/2 logs on its connections via the - special net-internals page. There is also an interesting extension for Chrome and Firefox to visualize when your browser is using HTTP/2.
+ special net-internals page. There is also an + interesting extension for Chrome + and Firefox + to visualize when your browser is using HTTP/2.To summarize: there is no one good strategy on how to make best use of this feature of HTTP/2 and everyone is still experimenting. So, how do you experiment with it in Apache httpd?
-mod_http2
inspect response header for Link
headers
+
Link
headers
in a certain format:
There are people thinking about how a client can tell a server what it already has, so PUSHes for those things can be avoided, but this is all highly experimental right now.
-Another experimental draft that has been implemented in mod_http2
+
Another experimental draft that has been implemented in
+ PUSH might not always trigger the request/response/performance that one expects or + hopes for. There are various studies on this topic to be found on the web that explain + benefits and weaknesses and how different features of client and network influence + the outcome. For example: just because the server PUSHes a resource does not mean + a browser will actually use the data.
+The major thing that influences the response being PUSHed is the request that was
+ simulated. The request URL for a PUSH is given by the application, but where do the
+ request headers come from? For example, will the PUSH request a accept-language
+ header and if yes with what value?
Apache will look at the original request (the one that triggered the PUSH) and copy the
+ following headers over to PUSH requests: user-agent
, accept
,
+ accept-encoding
, accept-language
, cache-control
.
All other headers are ignored. Cookies will also not be copied over. PUSHing resources + that require a cookie to be present will not work. This can be a matter of debate. But + unless this is more clearly discussed with browser, let's err on the side of caution and + not expose cookie where they might oridinarily not be visible.
+An alternative to PUSHing resources is to send Link
headers to the
+ client before the response is even ready. This uses the HTTP feature called "Early Hints" and
+ is described in RFC 8297.
In order to use this, you need to explicitly enable it on the server via
+(It is not enabled by default since some older browser tripped on such responses.)
+If this feature is on, you can use the directive
This will send out a "103 Early Hints"
response to a client as soon
+ as the server starts processing the request. This may be much early than
+ the time the first response headers have been determined, depending on your web
+ application.
If