Skip to content

Add gRFC for HTTPS proxy support.#530

Draft
jwustrack wants to merge 1 commit intogrpc:masterfrom
jwustrack:https-proxy
Draft

Add gRFC for HTTPS proxy support.#530
jwustrack wants to merge 1 commit intogrpc:masterfrom
jwustrack:https-proxy

Conversation

@jwustrack
Copy link

@jwustrack jwustrack commented Jan 9, 2026

This PR adds a gRFC for HTTPS proxy support where the connection to the proxy itself is TLS-encrypted. This ensures that proxy authentication credentials (such as BasicAuth username and password) are transmitted securely rather than in plaintext.

The C implementation is provided in this PR: grpc/grpc#41377

This adresses issue grpc/grpc#30347

@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Jan 9, 2026

CLA Signed

The committers listed above are authorized under a signed CLA.

  • ✅ login: jwustrack / name: Jonas Wustrack (c64e3c5)

@markdroth
Copy link
Member

We can't look at this until you sign the CLA.

Copy link
Contributor

@atollena atollena left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is something that datadog would benefit from for some internal use cases that currently use double proxying with a sidecar, so I'm supportive of it. Happy to help with the Go API, although you can probably focus on a single language (c-core).

Many proxy deployments support HTTPS connections, where the client establishes a TLS connection to the proxy before sending the HTTP CONNECT request. This ensures that:
1. Proxy authentication credentials are encrypted
2. The target hostname in the CONNECT request is not visible to network observers
3. The proxy can be authenticated via its TLS certificate
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The proxy can also identify the client from its client TLS certificate, if provided. The identity can then be used the same way as basic proxy auth, and replace it.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point. We currently don't have a need for this on our side as our proxy uses basic auth, but if agreed to on grpc side, I can include it in the proposal.

I should get the CLA signed soon by my employer at which point they can start looking at both PRs.

@markdroth
Copy link
Member

You still need to sign the CLA before we can look at this.

@jarias-lfx
Copy link

/easycla

@jwustrack
Copy link
Author

You still need to sign the CLA before we can look at this.

@jwustrack jwustrack closed this Feb 10, 2026
@jwustrack
Copy link
Author

You still need to sign the CLA before we can look at this.

It's finally signed now. Sorry for the delay, I was struggling with EasyCLA.

@markdroth markdroth reopened this Feb 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants