Re: WPD and Multiple Proxies

Roland Zink <roland@zinks.de> Mon, 03 November 2014 17:06 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AA501A1A62 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 3 Nov 2014 09:06:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.596
X-Spam-Level:
X-Spam-Status: No, score=-7.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.594, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VxI1HgbE08ij for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 3 Nov 2014 09:06:12 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C3091A1A76 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 3 Nov 2014 09:06:10 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1XlL29-0007Q6-8A for ietf-http-wg-dist@listhub.w3.org; Mon, 03 Nov 2014 17:03:13 +0000
Resent-Date: Mon, 03 Nov 2014 17:03:13 +0000
Resent-Message-Id: <E1XlL29-0007Q6-8A@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <roland@zinks.de>) id 1XlL24-0007P2-2A for ietf-http-wg@listhub.w3.org; Mon, 03 Nov 2014 17:03:08 +0000
Received: from mo4-p00-ob.smtp.rzone.de ([81.169.146.163]) by maggie.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <roland@zinks.de>) id 1XlL1z-0008P2-R2 for ietf-http-wg@w3.org; Mon, 03 Nov 2014 17:03:08 +0000
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; t=1415034161; l=1027; s=domk; d=zinks.de; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References: Subject:To:MIME-Version:From:Date; bh=7xgAlc7OgKLR46erfZbIiiqA5X8=; b=yMEkB4Ixd4hxyNuFW9X0AC5zzIuh7Zly8r47lmNmzLsFx41a3nKlfd4VRZiBkLy2tIZ IIMi07Q9CM0IwHo3fvyXm0xgX3c8XLZC0rwOr5LzDD27P2v5Et3PenjOB+Qe7J63Yt68p /AbQB8jTpxQ/3mX+f5OD0VjmIXask4zvFeI=
X-RZG-AUTH: :PmMIdE6sW+WWP9q/oR3Lt+I+9KAK33vRJaCwLQNJU2mlIkBC0t1G+0bSVECAiLyAhMhvRUp7mTTd6dh8Jfr+yZSQYA==
X-RZG-CLASS-ID: mo00
Received: from [IPv6:2001:4dd0:ff67:0:1cef:c2f3:c346:13ee] ([2001:4dd0:ff67:0:1cef:c2f3:c346:13ee]) by smtp.strato.de (RZmta 35.10 AUTH) with ESMTPSA id y07cd0qA3H2fWaB (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) for <ietf-http-wg@w3.org>; Mon, 3 Nov 2014 18:02:41 +0100 (CET)
Message-ID: <5457B533.6040904@zinks.de>
Date: Mon, 03 Nov 2014 18:02:43 +0100
From: Roland Zink <roland@zinks.de>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: ietf-http-wg@w3.org
References: <82929B11-6CBB-40D4-94FE-A0169552C707@ericsson.com>
In-Reply-To: <82929B11-6CBB-40D4-94FE-A0169552C707@ericsson.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Received-SPF: none client-ip=81.169.146.163; envelope-from=roland@zinks.de; helo=mo4-p00-ob.smtp.rzone.de
X-W3C-Hub-Spam-Status: No, score=-3.5
X-W3C-Hub-Spam-Report: AWL=-3.445, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001
X-W3C-Scan-Sig: maggie.w3.org 1XlL1z-0008P2-R2 988b5d74fdd7f09dc723933aa49d6fc6
X-Original-To: ietf-http-wg@w3.org
Subject: Re: WPD and Multiple Proxies
Archived-At: <http://www.w3.org/mid/5457B533.6040904@zinks.de>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/27841
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 03.11.2014 14:26, Salvatore Loreto wrote:
> Users that select a proxy for optimization might still be required to accept the use of a proxy at their workplace or captive network of choice.
Do you suggest to create dynamic proxy chains? E.g. the proxy at the 
workplace go out to the optimization proxy to fulfill user requests.
> The trick here is balancing the requirements of different use cases.
>    
> Proxies that provide privacy features need to be used exclusively, otherwise they could risk packet sniffing or pervasive monitoring by other nodes and risk the same sort of exposure that brought down the Silk Road.  That's at odds with this scenario and we'd obviously need measures to ensure that this doesn't fail catastrophically.
For a workplace proxy it may not be an option to allow privacy features, 
so I guess there are conflicting requirements.
> Any thoughts from the group would be great.
>
> br
> Salvatore
>
> [1] http://tools.ietf.org/html/draft-nottingham-web-proxy-desc-01
Regards,
Roland