ssastry@scandium:~$ curl -L -x scandium.eqiad.wmnet:80 "http://en.wikipedia.org/w/rest.php/en.wikipedia.org/v3/page/html/G.729d" <!DOCTYPE html> <html><head><title>Forbidden</title></head> <body><h1>Forbidden</h1><p>Invalid file extension found in the path info or query string.</p></body></html> ssastry@scandium:~$ time curl -L -x scandium.eqiad.wmnet:80 "http://en.wikipedia.org/w/rest.php/en.wikipedia.org/v3/page/html/G.729d/" <!DOCTYPE html> <html prefix="dc: http://purl.org/dc/terms/ mw: http://mediawiki.org/rdf/"><head prefix="mwr: http:////en.wikipedia.org/wiki/Special:Redirect/"><meta charset="utf-8"/><meta property="mw:html:version" content="2.1.0"/><link rel="dc:isVersionOf" href="//en.wikipedia.org/wiki/G.729d"/><title>G.729d</title><base href="//en.wikipedia.org/wiki/"/><link rel="stylesheet" href="/w/load.php?modules=mediawiki.legacy.commonPrint%2Cshared%7Cmediawiki.skinning.content.parsoid%7Cmediawiki.skinning.interface%7Cskins.vector.styles%7Csite.styles%7Cext.cite.style%7Cext.cite.styles%7Cmediawiki.page.gallery.styles&only=styles&skin=vector"/><!--[if lt IE 9]><script src="/w/load.php?modules=html5shiv&only=scripts&skin=vector&sync=1"></script><script>html5.addElements('figure-inline');</script><![endif]--></head><body data-parsoid='{"dsr":[0,19,0,0]}' class="mw-content-ltr sitedir-ltr ltr mw-body-content parsoid-body mediawiki mw-parser-output" dir="ltr"><section data-mw-section-id="0" data-parsoid="{}"><link rel="mw:PageProp/redirect" href="./G.729" data-parsoid='{"src":"#REDIRECT ","a":{"href":"./G.729"},"sa":{"href":"G.729"},"dsr":[0,19,null,null]}'/></section></body></html>
So, if RESTBase and Flow need to make any request to fetch Parsoid HTML for a title without the oldid, and the title contains ., you will have to use a workaround by appending a / to the request so it doesn't trigger the IE6/IE7 protection in MediaWiki core (which is slated to be dropped as per the approved RFC T232563). Given the Parsoid/PHP deployment timeline, it makes sense for this workaround to be implemented in RESTBase & Flow since it seems unlikely that the core code triggering the 403 will be dropped before the deployment.