Re: Last Call: <draft-nottingham-safe-hint-05.txt> (The "safe" HTTP Preference) to Proposed Standard

Doug Barton <dougb@dougbarton.us> Sun, 16 November 2014 22:03 UTC

Return-Path: <dougb@dougbarton.us>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 578481A1B5F for <ietf@ietfa.amsl.com>; Sun, 16 Nov 2014 14:03:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.596
X-Spam-Level:
X-Spam-Status: No, score=-2.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.594, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KDmQrmg_QGZx for <ietf@ietfa.amsl.com>; Sun, 16 Nov 2014 14:03:40 -0800 (PST)
Received: from dougbarton.us (dougbarton.us [208.79.90.218]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F3691A1B5C for <ietf@ietf.org>; Sun, 16 Nov 2014 14:03:40 -0800 (PST)
Received: from bcn-dbarton.lan (unknown [IPv6:2001:470:d:92:2054:a23a:ad2:ab8]) by dougbarton.us (Postfix) with ESMTPSA id 76DA622B0D for <ietf@ietf.org>; Sun, 16 Nov 2014 22:03:39 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=dougbarton.us; s=dkim; t=1416175419; bh=tj60dDb10PX2CLftxxTUVyBKNiWjaphek7oPpjAC8cc=; h=Date:From:To:Subject:References:In-Reply-To; b=p+wPuzYZEnokdEAoBUOKlT+zP4hSed9CDvVWNBs5fjg/HpWThOGQdgCS6U0iMpD1y UCfK6WQXXwckJb7kl8TpQqTkWp07CExoH6rZC7UspRUdPuBFxRhtkPAnlt52Oc8lyU Lk9Y/alaI9NwCOq6u9yXEHJb14A8hrVLoNjd2JFY=
Message-ID: <54691F38.2090101@dougbarton.us>
Date: Sun, 16 Nov 2014 14:03:36 -0800
From: Doug Barton <dougb@dougbarton.us>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: ietf@ietf.org
Subject: Re: Last Call: <draft-nottingham-safe-hint-05.txt> (The "safe" HTTP Preference) to Proposed Standard
References: <20141023140635.10188.qmail@ary.lan> <028201cfef81$44eaec60$4001a8c0@gateway.2wire.net> <01PE4IK2ZVO20028JO@mauve.mrochek.com> <CAL0qLwbtCFefW82-676CsPuS7NX-Q6dE_=_qXAB7-T419VGzzA@mail.gmail.com> <546830E3.5090800@dcrocker.net> <a271429152ce4c97b48aed93a658b854@DM2PR0301MB0655.namprd03.prod.outlook.com>
In-Reply-To: <a271429152ce4c97b48aed93a658b854@DM2PR0301MB0655.namprd03.prod.outlook.com>
OpenPGP: id=1A1ABC84
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/pGo-5B_svqs4ftbK3sqoBBQJcL8
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Nov 2014 22:03:41 -0000

On 11/16/14 10:58 AM, Christian Huitema wrote:

> By creating a standard, we would be creating a social norm. It would not take long for regulators to mandate "safe" behavior for web sites, or to enforce the safe bit in various kinds of "great firewalls." It will all be in the name of protecting the children, but we all know that the real target will be dissent and free speech. By offering this setting as a standard, the IETF would become an accomplice of repressive regimes and other religious dictarures.

The Internet routes around damage. Let's say you're in one of those 
repressive regimes. The web sites in your country are already heavily 
regulated, so this feature is of no consequence. Any sites that express 
dissent about your regime are going to be in regulatory domains where 
free speech is permitted, and are free to ignore the safe option.

The only thing I see wrong with this is the one bit. I would prefer to 
see one byte, with a standard meaning developed for the bitmask. 
Something like:

1	Filter pornographic images and language
2	Filter violent images and language
4	Filter offensive language
8	Filter everything

I'm not married to this scheme, but I think it's a good start.

> Some features do not need to be standardized.

Interesting.  I use this same argument in the DNS protocol world for 
things like identifying the requesting client's subnet, and negative 
trust anchors. I'm regularly shouted down and told that since there is 
already running code we MUST document it for interoperability purposes. 
Can I quote you? :)

Doug