[Ohttp] Updated proposal for a charter

Martin Thomson <mt@lowentropy.net> Wed, 04 August 2021 04:50 UTC

Return-Path: <mt@lowentropy.net>
X-Original-To: ohttp@ietfa.amsl.com
Delivered-To: ohttp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 247CD3A0A7D for <ohttp@ietfa.amsl.com>; Tue, 3 Aug 2021 21:50:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.801
X-Spam-Level:
X-Spam-Status: No, score=-2.801 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lowentropy.net header.b=rkrg1jy4; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=dE2UH+C7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZsXTQEGNLCVo for <ohttp@ietfa.amsl.com>; Tue, 3 Aug 2021 21:50:43 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B26443A0A74 for <ohttp@ietf.org>; Tue, 3 Aug 2021 21:50:43 -0700 (PDT)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 778205C00B4 for <ohttp@ietf.org>; Wed, 4 Aug 2021 00:50:41 -0400 (EDT)
Received: from imap41 ([10.202.2.91]) by compute5.internal (MEProxy); Wed, 04 Aug 2021 00:50:41 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net; h=mime-version:message-id:date:from:to:subject:content-type; s= fm2; bh=ji9iqmY21XkcSjfFvyPDgfQfBnB8z7agOKTVOA0FA4E=; b=rkrg1jy4 xLCglGKgrSs2nxEMXOVwjiftig36QPeyVPlI5F2zQTNOJT8z9xMOqGiQQKwb9LPZ JCrg7LEJUYa2fjXUd7g/E5NoG04t9OuLpWwRlXQahA0UIGvkiMs8Vnxc0XrSaYDQ 73OrKa17uyu4bF2xF9257pk5ha8gm1+unof5Nrgb+Xtc5c+t6cgaK7lVxW5RZxoF 54EUrKCjNiVB4tSHVewZeo1A0dvWGdTa9C9sFBJFtOwFAeucv4IhbhI2uUqNdlZU 0axmXPsvXtCFuJZCWmtNHLWn9aBrDW18bVL/n7xFNYcn7yurCdt5BerYopaFQDLr ML1R/InA5FQ5yw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=ji9iqmY21XkcSjfFvyPDgfQfBnB8z 7agOKTVOA0FA4E=; b=dE2UH+C7e/zVoKF1YnbBI509ta/ux9aWaPhRbmlHxXywV fGhiqubCz80NspdobUo9KcsRj+kIS1m41a67kXKdOmRwOyS8nyGRN8C2G4liAiD1 6Wjk5r3qdn8vrvb3+v+mqESCB/x3/vbxdv1Xi9KfxfK39UY7aErE5j+GI6p1jWDU c7YWGrUdjM9iET+RCSZRxa1QdxNbXObycd0FnWFqrmOcg0q/x+GTrTA00N0Zokvx 8g2W8uS1jReZ1FHqn74NXwF/ym/s/ChowNfJ9xB9NElhsdE0DAMVW9FkFmRoHWIa adWGHp7whfYbxAjJvYpiOK26u50DRM1YD5z0djEdg==
X-ME-Sender: <xms:oBwKYWC_-MpulPVWPrJMjcijjaMH2kzEWg-z6CaeDJIJHZF-GNh4ng> <xme:oBwKYQjYT9xaHyObWAlmwW9fGqa7hBhrBryAy0oJeYSuY4agmOs6Z51ssyp9syi5o UGS00D9_MBG2JBha-U>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvtddrieehgdekfecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkfffhvffutgesthdtredtre ertdenucfhrhhomhepfdforghrthhinhcuvfhhohhmshhonhdfuceomhhtsehlohifvghn thhrohhphidrnhgvtheqnecuggftrfgrthhtvghrnhepgeeuheeujedvieevffehvdekge ffkefggfdtteelfeekfeeftdejhfdtuddvuddtnecuffhomhgrihhnpehgihhthhhusgdr tghomhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpe hmtheslhhofigvnhhtrhhophihrdhnvght
X-ME-Proxy: <xmx:oBwKYZmD1pjDMFY7NO4cbtIN43Mkk_qPfrp1tQUXwWXCiKtmNsvpCw> <xmx:oBwKYUzqgBFAPWH01y7ixZa458G5gGMRSYD_HgzOT7d0aHFjpiQz3w> <xmx:oBwKYbTOt2hJvlG4jNuI_6K35e-hiKnXzS2irAqVwzNOYNTHTdGiiA> <xmx:oRwKYSe2HX6i4XV2JH0Zgz0UBd2gBXcc5rq33wW4M7zMqnPV4llOSw>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id A8BA23C0449; Wed, 4 Aug 2021 00:50:40 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.5.0-alpha0-548-g3a0b1fef7b-fm-20210802.001-g3a0b1fef
Mime-Version: 1.0
Message-Id: <8e72839b-554f-4f89-9957-6206a0471d68@www.fastmail.com>
Date: Wed, 04 Aug 2021 14:50:20 +1000
From: Martin Thomson <mt@lowentropy.net>
To: ohttp@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/ohttp/hfaJ99pYV4q3u6LvH8x4T4rUubo>
Subject: [Ohttp] Updated proposal for a charter
X-BeenThere: ohttp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Oblivious HTTP <ohttp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ohttp>, <mailto:ohttp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ohttp/>
List-Post: <mailto:ohttp@ietf.org>
List-Help: <mailto:ohttp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ohttp>, <mailto:ohttp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 04:50:49 -0000

Thanks everyone for a good discussion at the BoF.  We heard a few things:

* A need for greater clarity about use cases
* Some examples of those use cases
* Paired with that, make it clearer that general purpose HTTP was not in scope, and why

Thanks to those who contributed pull requests to the charter to address these points (and others).  The updated (proposed) charter is below.

The biggest changes are that the first three paragraphs are now four paragraphs, with more detail.

The repository at https://github.com/unicorn-wg/ohttp-charter is still open for commentary and improvements.

---
# Oblivious HTTP Working Group (OHTTP) Charter

In a number of different settings, interactions between clients and servers
involve information that could be sensitive when associated with client
identity.  Client-server applications built on HTTP reveal aspects of client
identity to servers through these interactions, especially source addresses.
Even without client identity, a server might be able to build a profile of
client activity by correlating requests from the same client over time.

In HTTP-based applications where the information included in requests does not
need to be correlated, the Oblivious HTTP protocol allows a supporting server to
accept requests via a proxy.  The proxy ensures that the server cannot see
source addressing information for clients, which prevents servers linking
requests to the same client using such information.  Encryption ensures that the
proxy is unable to read requests or responses.  However, if the proxy and server
collude, then neither of these privacy properties hold.

Applications and use cases best suited for the Oblivious HTTP protocol are those
that have discrete, transactional queries that might reveal small amounts of information over
time.  Examples include DNS queries, data or telemetry submission, and
certificate revocation checking. In some of these application deployments, the
relationship between client, server, and cooperating proxy is typically
configured out-of-band.

General purpose HTTP applications such as web browsing are not in scope for the
Oblivious HTTP protocol. Broad applicability is limited by multiple factors,
including the need for explicit server support of the protocol. In contrast,
transport-level proxies such as HTTP CONNECT or MASQUE are a more appropriate
mechanism for those use cases, as they allow connecting to unmodified servers.

The OHTTP working group will define the Oblivious HTTP protocol, a method of
encapsulating HTTP requests and responses that provides protected, low-latency
exchanges.  The working group will define any encryption scheme necessary and
supporting data formats for carrying encapsulated requests and responses, plus
any key configuration that might be needed to use the protocol.

The OHTTP working group will include an applicability statement that documents
the limitations of this design and any usage constraints that are necessary to
ensure that the protocol is secure.  The working group will consider the
operational impact as part of the protocol design and document operational
considerations.

The working group will prioritize work on the core protocol elements as
identified.  In addition, the working group may work on other use cases and
deployment models, including those that involve discovery of OHTTP proxies or
servers and their key configurations.

The OHTTP working group will work closely with other groups that develop the
tools that Oblivious HTTP depends on (HTTPbis for HTTP, CFRG for HPKE) or that
might use Oblivious HTTP (DPRIVE for DNS over HTTPS).

The working group will use draft-thomson-http-oblivious as input.