Re: Request-Off-The-Record Mode header

David Schinazi <dschinazi.ietf@gmail.com> Thu, 08 June 2023 21:52 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C677EC15106E for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 8 Jun 2023 14:52:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.044
X-Spam-Level:
X-Spam-Status: No, score=-5.044 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hdz-pbdvpl2r for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 8 Jun 2023 14:52:13 -0700 (PDT)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A7245C14CE5F for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 8 Jun 2023 14:52:13 -0700 (PDT)
Received: from lists by lyra.w3.org with local (Exim 4.94.2) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1q7NXz-0078he-MC for ietf-http-wg-dist@listhub.w3.org; Thu, 08 Jun 2023 21:51:59 +0000
Resent-Date: Thu, 08 Jun 2023 21:51:59 +0000
Resent-Message-Id: <E1q7NXz-0078he-MC@lyra.w3.org>
Received: from mimas.w3.org ([128.30.52.79]) by lyra.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <dschinazi.ietf@gmail.com>) id 1q7NXx-0078gC-LX; Thu, 08 Jun 2023 21:51:57 +0000
Received: from mail-ej1-x62c.google.com ([2a00:1450:4864:20::62c]) by mimas.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <dschinazi.ietf@gmail.com>) id 1q7NXw-0086x6-1P; Thu, 08 Jun 2023 21:51:57 +0000
Received: by mail-ej1-x62c.google.com with SMTP id a640c23a62f3a-977c88c9021so186516366b.3; Thu, 08 Jun 2023 14:51:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686261111; x=1688853111; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Q5xy0wpnMRgMopVwV+y96BfpLwEJX75iWn1dGeoqa3A=; b=CllKPlNIG5UWEwJMcJgH4LF3uyw3IZc8XMUEuh0231ALTADXMk+QNOIXgWAO1Ys5ae IrMa+uibnfUf3syYM9ucmYIfvz4H9i1rgxDyMCYbC2kHoJR/eD179Dyp2l1KWziUW/8y i/xm66NkVHKrSPVSw1nehKcw+sjizSScYiuPeTgor1cxyxdIujf8USV9GD/peWFeAkQQ 3+0eCo5qZDzVz+6fGvM2sAjyyn2or6MPf+v6iRAs8x/ckJdryR+ZTTpBE3u/DFYq4xVS /jlWqICPFNBihFhTy6U0LlRG1sg++iLx+3Xca2U3x2v9UBI4DE9QLfX9JlROSawlWzpA EFVA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686261111; x=1688853111; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Q5xy0wpnMRgMopVwV+y96BfpLwEJX75iWn1dGeoqa3A=; b=k5/jmSpCF2qQK7a07vtTXqtn1BWcg6bpj5CgSc+6mkgo/iWvRJfU37+nxp5dTMQsHV FI3xw7tiWPGD/EtgalYEHiv8brvooLcSbE2gq5RK+dp0sNJUeg3zCm913Yx/d47IHskx yr45wKS/cmeo0M2Mjkgsw3YEyDZ+nVxlmJrXAsK0A+9VBr+S86Obk2nsrQUrNKUVragK wZ9gxFoK9+dGh53yL/3NBWG+Av53YFTXPofZ5k+HhbvdbnrUJNyfL3XPuPlI1QWn8zvG vhJWjLV/Y2yjPsXdMzdYZ3dqlRzPgRiI5eP23UX4+QAxgtArpvlVHuyYObb7upVxw12e cTTg==
X-Gm-Message-State: AC+VfDzKEGPaw5Dc0Gsc0XoTJsRbPBnwcwghBrRgCq4I7MQMhzLv7ibm xwHaHED8ibZHJxN5mTITCUDOZTHxXNP0eGMRDNg=
X-Google-Smtp-Source: ACHHUZ7+ec0/Gy0me+SkxsCoD7cb/zZeff1ve6HVQB1IpfPvjG2XGBkzpxAk3QYLSbNELU3ViKz1rRvEfy50m2lS/WM=
X-Received: by 2002:a17:907:9711:b0:973:a30d:b264 with SMTP id jg17-20020a170907971100b00973a30db264mr352527ejc.46.1686261111236; Thu, 08 Jun 2023 14:51:51 -0700 (PDT)
MIME-Version: 1.0
References: <CAG3f7Mi=QVLNdxL5LWxzf-2uAT8KO9B-NWFoaM_HHOvpiPzbRA@mail.gmail.com> <SA1PR00MB1461642051E1C9091088F2D8F750A@SA1PR00MB1461.namprd00.prod.outlook.com>
In-Reply-To: <SA1PR00MB1461642051E1C9091088F2D8F750A@SA1PR00MB1461.namprd00.prod.outlook.com>
From: David Schinazi <dschinazi.ietf@gmail.com>
Date: Thu, 08 Jun 2023 14:51:39 -0700
Message-ID: <CAPDSy+4dXuF1YTWAC+v0dAVF5E=+D45v35vL69od718KzAWKqQ@mail.gmail.com>
To: Eric Lawrence <Eric.Lawrence@microsoft.com>
Cc: Shivan Kaul Sahib <shivankaulsahib@gmail.com>, "public-webappsec@w3.org" <public-webappsec@w3.org>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="00000000000088ade305fda542d4"
Received-SPF: pass client-ip=2a00:1450:4864:20::62c; envelope-from=dschinazi.ietf@gmail.com; helo=mail-ej1-x62c.google.com
X-W3C-Hub-DKIM-Status: validation passed: (address=dschinazi.ietf@gmail.com domain=gmail.com), signature is good
X-W3C-Hub-Spam-Status: No, score=-5.1
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1q7NXw-0086x6-1P 62ca38e77f00e13e42ce1a2c0e45a206
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Request-Off-The-Record Mode header
Archived-At: <https://www.w3.org/mid/CAPDSy+4dXuF1YTWAC+v0dAVF5E=+D45v35vL69od718KzAWKqQ@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/51143
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

This sounds very useful for the domestic violence resources use case, but
at the same time I could imagine malware websites abusing it to erase
traces of how a machine got infected. Would it be possible to get user
consent per origin for this?
David

On Thu, Jun 8, 2023 at 2:42 PM Eric Lawrence <Eric.Lawrence@microsoft.com>
wrote:

> This generally seems useful.
>
>
>
> I can foresee some user confusion if a user encountered the interstitial
> page when visiting the target site in InPrivate/Incognito mode, but I also
> wouldn’t want to skip the interstitial page in those privacy modes (because
> it could be abused as an oracle that would reveal to the site whether a
> visitor is using a Private Mode already).
>
> In Chromium-based browsers, browser extensions are disabled by default
> while in Private Mode. It does not look like you propose to disable
> extensions from interacting with “Off-the-record” sites?
>
>
>
> *From:* Shivan Kaul Sahib <shivankaulsahib@gmail.com>
> *Sent:* Thursday, June 8, 2023 2:14 PM
> *To:* public-webappsec@w3.org; HTTP Working Group <ietf-http-wg@w3.org>
> *Subject:* Request-Off-The-Record Mode header
>
>
>
> You don't often get email from shivankaulsahib@gmail.com. Learn why this
> is important <https://aka.ms/LearnAboutSenderIdentification>
>
> Hi folks, this is a head's up and early request for feedback:
>
>
>
> Brave is shipping support for an HTTP response header sent by a website
> that wants the client to treat the website as "off-the-record" i.e. not
> store anything in storage, not record the site visit in history etc. Kind
> of like incognito/private browsing mode but site-initiated and only for a
> specific website. The header is simple: it would look like `Request-OTR:
> 1`. Some details here:
> https://brave.com/privacy-updates/26-request-off-the-record/#request-otr-header. Currently
> we bootstrap for websites that have expressed interest in this (mainly
> websites that have help resources for domestic violence victims, which was
> the driving use-case) by preloading a list of websites into the browser,
> but it would be nice to standardize the header. We're considering doing the
> work in the HTTP WG at IETF: it's envisioned to be a simple header.
>
> I see that this idea was previously discussed in W3C WebAppSec:
> https://lists.w3.org/Archives/Public/public-webappsec/2015Sep/0016.html,
> and there was a draft Mozilla spec:
> https://wiki.mozilla.org/Security/Automatic_Private_Browsing_Upgrades,
> though as a CSP directive.
>
>
>
> Happy to hear what people think.
>
>
>
>
>