Re: Request-Off-The-Record Mode header

Caleb Queern <cqueern@gmail.com> Mon, 12 June 2023 13:35 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13E13C1595E5 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 12 Jun 2023 06:35:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.744
X-Spam-Level:
X-Spam-Status: No, score=-2.744 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YDhfV9tcne9t for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 12 Jun 2023 06:35:20 -0700 (PDT)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0931C157B45 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 12 Jun 2023 06:35:19 -0700 (PDT)
Received: from lists by lyra.w3.org with local (Exim 4.94.2) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1q8hhM-00EyIw-Kt for ietf-http-wg-dist@listhub.w3.org; Mon, 12 Jun 2023 13:35:08 +0000
Resent-Date: Mon, 12 Jun 2023 13:35:08 +0000
Resent-Message-Id: <E1q8hhM-00EyIw-Kt@lyra.w3.org>
Received: from mimas.w3.org ([128.30.52.79]) by lyra.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <cqueern@gmail.com>) id 1q8hhJ-00EyEt-Qv; Mon, 12 Jun 2023 13:35:05 +0000
Received: from mail-ed1-x534.google.com ([2a00:1450:4864:20::534]) by mimas.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <cqueern@gmail.com>) id 1q8hhH-009acl-Sx; Mon, 12 Jun 2023 13:35:05 +0000
Received: by mail-ed1-x534.google.com with SMTP id 4fb4d7f45d1cf-5147e8972a1so7699479a12.0; Mon, 12 Jun 2023 06:35:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686576899; x=1689168899; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=PIoZ7WrseZgkGDoHth3M+QOHM4+pc4KwzUfEmozRJZs=; b=ajedKPbPAfNcZNDXmR2do8z3jax8SoLyMMjgJ7sHeQadGg1yD4qZAfunumWLU0XiTg rG+18LeIiUkRmWtg60G61WS+ED4dCBi7UXNzjwoxlsDkclOAFiwZswqzGBnfKg28Wa5s vm0yEat/2nNshPjvdE14adMQ64vi1z7Tw9wAYlx+JeahBP/7KcC84QW3JH5LTOnWzZhv qW0SFLHGPY+pPphazY+179SGkqWakhcNEAa2kUPcIlmvPXkFP7tz2LYzaqcBfTFxRj7+ 1ByTv2jpAjxM8y33RNfOnxgVjsrAjTgN/GqdVaqd99nhct9OXuEVRk0VF9buly09nlaF foDw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686576899; x=1689168899; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=PIoZ7WrseZgkGDoHth3M+QOHM4+pc4KwzUfEmozRJZs=; b=WSqDiqbx7VheDcyTVZO16cdzWzeyWZE6qx8qcKh4CEgUVdO1UQobMybRy0ppSmbtLW eQqXPFg5SaEwVRQqKKB98iqnf3yjS41J7C8kiA3afb/V/2bF5YivdCuGJPpuWEQ/yRLW ZXGZaazktzSST7R1kMUkI+mzRnKETfGUrGbErZzrwPxI0Y7W9595IamDmT7Fc0lhKYnf wzKykT7vZMQZQ3bRb94IDZoi7e/zxr0x4h7IijYwJVsa7WkKuePcvMimxSlTuq+AC5EA bRiKGYTeRsW+oftft/Ss2/sgyAAMyXca8OcuL1bwISRSGOqHUJzgMa3Xfrxl4EMS11cb YmKg==
X-Gm-Message-State: AC+VfDyF7DxPctMCe6g3SEg8mRTpfVoF74tyXo3BatCNr8qbJ25UxDNQ wf3la3C9TIT1lBtucyPRedKUkmZzk5xkSoYxeyQ=
X-Google-Smtp-Source: ACHHUZ7s0EMwLmtUKNbtyo8IqS0mB5IbypQwwOVIjsLI9Ul3uQUswH9ZYYTBQfQJOz7SWQhT8B2V1q1bv7sEkuIbeC0=
X-Received: by 2002:a50:ed06:0:b0:516:3261:17d with SMTP id j6-20020a50ed06000000b005163261017dmr4464991eds.20.1686576899093; Mon, 12 Jun 2023 06:34:59 -0700 (PDT)
MIME-Version: 1.0
References: <CAG3f7Mi=QVLNdxL5LWxzf-2uAT8KO9B-NWFoaM_HHOvpiPzbRA@mail.gmail.com> <SA1PR00MB1461642051E1C9091088F2D8F750A@SA1PR00MB1461.namprd00.prod.outlook.com> <CAPDSy+4dXuF1YTWAC+v0dAVF5E=+D45v35vL69od718KzAWKqQ@mail.gmail.com> <CAEnXMMp-jQSqJx6kc9rxUJCVQ5LFxLu6RPWcLCpnKcc8p2iF6g@mail.gmail.com> <CAG3f7MhOFfhsW_86fS8dgipMDZ8B8Ft7bD6kZ_ftK9ny0iea0w@mail.gmail.com> <CAEnXMMr409TgrPtf+mSwbK1A6+Ezz=P7X7sth=+8ujgWDNsbUA@mail.gmail.com> <CAKXHy=cqrL3TCd3Z-5twXzRYUdFQS2gg5MCtz6jCd+T+pM_Mog@mail.gmail.com>
In-Reply-To: <CAKXHy=cqrL3TCd3Z-5twXzRYUdFQS2gg5MCtz6jCd+T+pM_Mog@mail.gmail.com>
From: Caleb Queern <cqueern@gmail.com>
Date: Mon, 12 Jun 2023 08:34:48 -0500
Message-ID: <CAEnXMMox4hfR0W_xxmaqFGiRuyC-J1_7otx4NNic3Cb7G2u=MA@mail.gmail.com>
To: Mike West <mkwst@google.com>
Cc: HTTP Working Group <ietf-http-wg@w3.org>, Shivan Kaul Sahib <shivankaulsahib@gmail.com>, "public-webappsec@w3.org" <public-webappsec@w3.org>
Content-Type: multipart/alternative; boundary="000000000000f4fa5805fdeec876"
Received-SPF: pass client-ip=2a00:1450:4864:20::534; envelope-from=cqueern@gmail.com; helo=mail-ed1-x534.google.com
X-W3C-Hub-DKIM-Status: validation passed: (address=cqueern@gmail.com domain=gmail.com), signature is good
X-W3C-Hub-Spam-Status: No, score=-3.1
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1q8hhH-009acl-Sx 6a90cf6b496e7ae476a15567dd796b42
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Request-Off-The-Record Mode header
Archived-At: <https://www.w3.org/mid/CAEnXMMox4hfR0W_xxmaqFGiRuyC-J1_7otx4NNic3Cb7G2u=MA@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/51165
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

ha, thanks Mike. Makes sense now. Thanks all.

On Mon, Jun 12, 2023 at 8:29 AM Mike West <mkwst@google.com> wrote:

> On Mon 12. Jun 2023 at 15:22 Caleb Queern <cqueern@gmail.com> wrote:
>
>> Thanks Shivan,
>>
>> I think one big difference between Off-The-Record and Clear-Site-Data is
>>> that Off-The-Record is preventative, while Clear-Site-Data is sent after
>>> the fact
>>>
>>
>> If I'm not mistaken Clear-Site-Data can be sent "along the way" from the
>> first navigation so that user agents don't store anything in storage or
>> record the site visit in history etc.  as well.
>>
>
> A small not: Clear-Site-Data does not offer developers the ability to
> clear browser history. It offers the ability to clear already web-visible
> storage, as well as cache.
>
> My concern is that these seem to have overlapping functionality and after
>> more than a decade of adding new security headers for developers to think
>> about, there's only so much we can reasonably expect them to consider (and
>> leading to compensatory efforts like Mike's Baseline Header
>> https://github.com/mikewest/baseline-header ).
>>
>> Our options might be:
>> a) agree on Off-The-Record header, have browsers implement it, educate
>> devs on OTR usage
>> b) educate devs on CSD usage
>>
>> I'll defer to the broader group of course.
>>
>> On Mon, Jun 12, 2023 at 1:55 AM Shivan Kaul Sahib <
>> shivankaulsahib@gmail.com> wrote:
>>
>>> Hey Caleb,
>>>
>>> On Thu, 8 Jun 2023 at 14:58, Caleb Queern <cqueern@gmail.com> wrote:
>>>
>>>> This feels very similar to what <ahem> some have said about the
>>>> Clear-Site-Data header both in its utility and risks.
>>>>
>>>
>>> I think one big difference between Off-The-Record and Clear-Site-Data is
>>> that Off-The-Record is preventative, while Clear-Site-Data is sent after
>>> the fact. Also, in the case of Clear-Site-Data, the website specifies
>>> what to clear, while with Off-The-Record the website leaves it up to the
>>> user agent.
>>>
>>>>
>>>> On Thu, Jun 8, 2023 at 4:52 PM David Schinazi <dschinazi.ietf@gmail.com>
>>>> wrote:
>>>>
>>>>> This sounds very useful for the domestic violence resources use case,
>>>>> but at the same time I could imagine malware websites abusing it to erase
>>>>> traces of how a machine got infected. Would it be possible to get user
>>>>> consent per origin for this?
>>>>> David
>>>>>
>>>>> On Thu, Jun 8, 2023 at 2:42 PM Eric Lawrence <
>>>>> Eric.Lawrence@microsoft.com> wrote:
>>>>>
>>>>>> This generally seems useful.
>>>>>>
>>>>>>
>>>>>>
>>>>>> I can foresee some user confusion if a user encountered the
>>>>>> interstitial page when visiting the target site in InPrivate/Incognito
>>>>>> mode, but I also wouldn’t want to skip the interstitial page in those
>>>>>> privacy modes (because it could be abused as an oracle that would reveal to
>>>>>> the site whether a visitor is using a Private Mode already).
>>>>>>
>>>>>> In Chromium-based browsers, browser extensions are disabled by
>>>>>> default while in Private Mode. It does not look like you propose to disable
>>>>>> extensions from interacting with “Off-the-record” sites?
>>>>>>
>>>>>>
>>>>>>
>>>>>> *From:* Shivan Kaul Sahib <shivankaulsahib@gmail.com>
>>>>>> *Sent:* Thursday, June 8, 2023 2:14 PM
>>>>>> *To:* public-webappsec@w3.org; HTTP Working Group <
>>>>>> ietf-http-wg@w3.org>
>>>>>> *Subject:* Request-Off-The-Record Mode header
>>>>>>
>>>>>>
>>>>>>
>>>>>> You don't often get email from shivankaulsahib@gmail.com. Learn why
>>>>>> this is important <https://aka.ms/LearnAboutSenderIdentification>
>>>>>>
>>>>>> Hi folks, this is a head's up and early request for feedback:
>>>>>>
>>>>>>
>>>>>>
>>>>>> Brave is shipping support for an HTTP response header sent by a
>>>>>> website that wants the client to treat the website as "off-the-record" i.e.
>>>>>> not store anything in storage, not record the site visit in history etc.
>>>>>> Kind of like incognito/private browsing mode but site-initiated and only
>>>>>> for a specific website. The header is simple: it would look like
>>>>>> `Request-OTR: 1`. Some details here:
>>>>>> https://brave.com/privacy-updates/26-request-off-the-record/#request-otr-header. Currently
>>>>>> we bootstrap for websites that have expressed interest in this (mainly
>>>>>> websites that have help resources for domestic violence victims, which was
>>>>>> the driving use-case) by preloading a list of websites into the browser,
>>>>>> but it would be nice to standardize the header. We're considering doing the
>>>>>> work in the HTTP WG at IETF: it's envisioned to be a simple header.
>>>>>>
>>>>>> I see that this idea was previously discussed in W3C WebAppSec:
>>>>>> https://lists.w3.org/Archives/Public/public-webappsec/2015Sep/0016.html,
>>>>>> and there was a draft Mozilla spec:
>>>>>> https://wiki.mozilla.org/Security/Automatic_Private_Browsing_Upgrades,
>>>>>> though as a CSP directive.
>>>>>>
>>>>>>
>>>>>>
>>>>>> Happy to hear what people think.
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>> --
> -mike
>