Skip to content

Conversation

@jwustrack
Copy link

@jwustrack jwustrack commented Jan 9, 2026

This PR adds a gRFC for HTTPS proxy support where the connection to the proxy itself is TLS-encrypted. This ensures that proxy authentication credentials (such as BasicAuth username and password) are transmitted securely rather than in plaintext.

The C implementation is provided in this PR: grpc/grpc#41377

This adresses issue grpc/grpc#30347

@linux-foundation-easycla
Copy link

CLA Not Signed

@markdroth
Copy link
Member

We can't look at this until you sign the CLA.

Copy link
Contributor

@atollena atollena left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is something that datadog would benefit from for some internal use cases that currently use double proxying with a sidecar, so I'm supportive of it. Happy to help with the Go API, although you can probably focus on a single language (c-core).

Many proxy deployments support HTTPS connections, where the client establishes a TLS connection to the proxy before sending the HTTP CONNECT request. This ensures that:
1. Proxy authentication credentials are encrypted
2. The target hostname in the CONNECT request is not visible to network observers
3. The proxy can be authenticated via its TLS certificate
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The proxy can also identify the client from its client TLS certificate, if provided. The identity can then be used the same way as basic proxy auth, and replace it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants