-
Notifications
You must be signed in to change notification settings - Fork 280
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
mention connection coalescing #69
Comments
+1 |
They coalesce based on the server cert and IP address used. Simply put: if you have multiple sites covered by overlapping IP address and they share SANs in the cert, they may be coalesced... |
Tnx! And this is true for H2 and related http extensions including Alt Svc 2016-04-11 22:37 GMT+02:00 Daniel Stenberg notifications@github.com:
|
Correct.
Correct again! That's also how HTTP/2 capable browsers can "unshard" sharded sites. (But don't add QUIC to the mix that easily, as that's UDP based so it doesn't have connections in the same way and I've not kept up with the specifics in that protocol so I can't vouch for exactly how coalescing works (or not) there.) |
For completeness, it is probably worth mentioning an edge case when there is a transparent TLS proxy between the client and the server (e.g sniproxy), whereby H2 requests may get proxied to the wrong host under the above circumstances. |
I'm not convinced mentioning transparent middle-things ruining traffic actually helps anyone. I blogged about how browsers do HTTP/2 coalescing back in 2016 but I never turned that into contents for this book. |
Since it may have an impact and reduce connections even more than just the single TCP connection per host.
The text was updated successfully, but these errors were encountered: