Re: Last Call: <draft-nottingham-safe-hint-05.txt> (The "safe" HTTP Preference) to Proposed Standard

Joseph Lorenzo Hall <joe@cdt.org> Tue, 18 November 2014 17:21 UTC

Return-Path: <joe@cdt.org>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B03B51A1AFC for <ietf@ietfa.amsl.com>; Tue, 18 Nov 2014 09:21:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qdmasWrNFNW1 for <ietf@ietfa.amsl.com>; Tue, 18 Nov 2014 09:21:31 -0800 (PST)
Received: from mail.maclaboratory.net (mail.maclaboratory.net [209.190.215.232]) (using TLSv1.1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DA601A1B7F for <ietf@ietf.org>; Tue, 18 Nov 2014 09:21:11 -0800 (PST)
X-Footer: Y2R0Lm9yZw==
Received: from hypochilid-2.local ([199.119.118.21]) (authenticated user jhall@cdt.org) by mail.maclaboratory.net (using TLSv1 with cipher DHE-RSA-AES256-SHA (256 bits)); Tue, 18 Nov 2014 12:21:10 -0500
Message-ID: <546B8005.3090806@cdt.org>
Date: Tue, 18 Nov 2014 12:21:09 -0500
From: Joseph Lorenzo Hall <joe@cdt.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Mark Nottingham <mnot@mnot.net>
Subject: Re: Last Call: <draft-nottingham-safe-hint-05.txt> (The "safe" HTTP Preference) to Proposed Standard
References: <20141021213356.16262.50640.idtracker@ietfa.amsl.com> <54494E98.4070002@cs.tcd.ie> <5464E809.2080507@cdt.org> <E1F171E9-A1A5-4161-9974-AA4077802B9C@mnot.net>
In-Reply-To: <E1F171E9-A1A5-4161-9974-AA4077802B9C@mnot.net>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/5EKmbdto662RlrZw_8Pr37TiOv0
Cc: ietf@ietf.org, draft-nottingham-safe-hint@tools.ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Nov 2014 17:21:35 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256



On 11/16/14, 7:12 PM, Mark Nottingham wrote:
> Hi Joe,
> 
> Thanks for the substantive comments. Responses (hopefully equal in
> substance) inline.
> 
>> On 14 Nov 2014, at 4:19 am, Joseph Lorenzo Hall <joe@cdt.org>
>> wrote:
>> 
>> Signed PGP part
>> 
>> Hi, mnot has already heard the following concerns from us at CDT
>> about this spec, but we want to make sure that these are part of
>> the IETF last call comment record.
>> 
>> * The "Safe" preference is not only a preference but a signal.
>> It signals user vulnerability; when activated, the header would
>> signal a user's potentially vulnerable status not only to site
>> operators who intend to reply in good faith, but to those that
>> will operate in bad faith and also to every intermediary on-path
>> that could read the preference request.
>> 
>> Details about an Internet user's vulnerabilities should be
>> treated as sensitive information.  A broadcast signal that
>> advertises a user's content preferences or restrictions can
>> signal her youth, cognitive ability, relative media illiteracy,
>> technological inexperience, or another potential vulnerable
>> status.  Because of the risk that this information could be used
>> to exploit immature or inexperienced users, CDT generally
>> cautions against widespread identification of user vulnerability.
>> Obviously, sending such a preference inside an encrypted
>> connection removes concerns about on-path observers, but not the
>> more general concern with bad faith endpoints or other embedded
>> endpoints that may have other interests (e.g., advertisers on a
>> service may use this signal to profile vulnerable populations).
> 
> This is definitely a concern, and one of the big reasons that it's
> restricted to one bit.
> 
> However, as pointed out, while it could indicate a vulnerable user,
> "safe" is also usable by others; anecdotally, many people turn
> "safe" mode on in search engines out of personal preference, not
> because they're children or otherwise vulnerable.

I think any intentional use of this signals some level of
vulnerability. It could almost in part be flippantly called the
"troll-me" bit, as sending unsafe content conditioned on this flag
would almost always give rise to an emotional response on the part of
the user.

(Incidentally, if something outside the browser inserts this header it
may be very difficult for the user to actually turn off, as well. I'm
not sure if that's something you've thought about. In DNT, there are
applications you can install that will insert that header for you on
each request (AVG does this).)

> Additionally, "safe" is by no means a complete solution; it is not
> designed to be a filtering technology, nor to protect users from
> tracking / targeting; to attempt that it needs to be used in
> conjunction with other technologies (e.g., filters, ad blockers,
> tracker blockers, DNT -- although there is much debate about the
> effectiveness of these technologies as well).

Hmmm, it is definitely a "filtering preference technology", and the
desperate interpretations of the other endpoint as to what "safe" will
mean seems to set up more opportunity for confusion... not the
characteristic of a good standard, IMO.

> The draft already mentions most of this, and I'm happy to
> strengthen that text if you think it will help.
> 
> 
>> * Further, the ability for other intermediaries with access to
>> the request stream to insert the preference, potentially without
>> notice to the user, means that users may not even be aware that
>> they are broadcasting potentially sensitive information about
>> themselves, thus limiting their ability to take self-protective
>> measures against potential abuse.
> 
> Yes, this is possible.
> 
> The question, to me, is whether this potential abuse is outweighed
> by the potential benefit, and whether there are ways to mitigate
> the abuse.

Unfortunately, the forums in which to counteract abuse of this kind of
thing are as varied as the interpretations of "safe". :/ We see the
potential for badness as not just being abuse but more importantly
sites responding very differently to a standardized semantic signal.

Anyway, sorry to go around in circles here.

> Side story - When I was in Istanbul for IGF in September, I had a
> chat about "safe" with a well-respected researcher/advocate for
> online child safety. He was excited about it, because he had
> advocated something similar but much more bold to browsers in the
> past -- broadcasting the child's age bracket in requests.
> 
> Needless to say, that didn't happen, and I was surprised that
> someone with his knowledge and experience would consider putting
> such specific information in requests. I didn't ask at the time,
> but afterwards I surmise that he was implicitly relying on
> regulatory or legislative relief to assure that it wouldn't be
> abused.

Wowza!

> "safe" is by nature much more conservative than this -- it only
> reveals one bit of information, and that bit is not specific to any
> one group of users. If someone is adding it to your requests (a
> situation that should becoming more uncommon, if numbers about
> HTTPS adoption are to be believed), that's happening within a legal
> context that can offer relief as appropriate.
> 
> 
>> * As many of the comments in Last Call have identified, "Safe"
>> content in this specification is undefined. Because the proposal 
>> (necessarily) lacks a definition of "safe", it is unlikely to be 
>> useful to parents/guardians/users.  The lack of definition will 
>> produce diverse and conflicting interpretations from content
>> hosts and providers, which can mislead users and their guardians,
>> and may invite abuse and confusion.
>> 
>> The absence of guidance to websites wishing to participate in
>> "safe" content delivery will lead to varied and sometimes
>> contradictory results.  This could sow confusion and potential
>> conflict among participating platforms and website operators, and
>> undermine the utility of the specification.
>> 
>> Moreover, users and their parents will have diverse expectations 
>> about "safe" content.  These expectations will vary considerably 
>> with users' age, as well as parent/guardians' cultural
>> backgrounds. Without a common understanding of what qualifies as
>> "safe" content, the expectations of users and their
>> parent/guardians are likely to be frustrated.  Of course, it is
>> far outside the scope of a technical specification to define a
>> content-label like "safe".  But because a standardized definition
>> of "safe" content is unattainable, the specification will have
>> limited use as a tool for empowering parents to regulate and
>> guide their children's Internet use.
> 
> Again, "safe" is not a filtering technology; it is only
> pre-configuring the site's 'safe' mode if it has one, by the rules
> of that site. Whether or not that site's definition of 'safe' is
> appropriate to the user is a separate decision, one that might be
> enforced by a filter or some other mechanism.
> 
> In common deployments, I think it's best to view it as an extension
> of a Web filter *into* the site.
> 
> As above, I'm happy to expand / strengthen text here if you think
> it will help.
> 
> BTW, if the utility of the specification is indeed undermined as
> you point out, I think that's a largely self-correcting situation;
> lack of utility certainly hasn't stopped the IETF from making
> something a standard in the past.
> 
> Thanks again,
> 
> -- Mark Nottingham   https://www.mnot.net/
> 

- -- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
joe@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (Darwin)
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=4uSF
-----END PGP SIGNATURE-----