[Sandbox-mailoutput] [Django development] WG Action: Formed Oblivious HTTP Application Intermediation (ohai)

IETF Secretariat <ietf-secretariat-reply@ietf.org> Thu, 07 October 2021 18:35 UTC

Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: sandbox-mailoutput@ietfa.amsl.com
Delivered-To: sandbox-mailoutput@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DDA53A0896 for <sandbox-mailoutput@ietfa.amsl.com>; Thu, 7 Oct 2021 11:35:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tXqrdEM73fa4 for <sandbox-mailoutput@ietfa.amsl.com>; Thu, 7 Oct 2021 11:35:19 -0700 (PDT)
Received: from sandbox.amsl.com (sandbox.amsl.com [IPv6:2001:1900:3001:11::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 7CD703A08FC for <sandbox-mailoutput@ietf.org>; Thu, 7 Oct 2021 11:35:19 -0700 (PDT)
Received: from sandbox.amsl.com (localhost [IPv6:::1]) by sandbox.amsl.com (Postfix) with ESMTP id 376B21029BD2A for <sandbox-mailoutput@ietf.org>; Thu, 7 Oct 2021 11:35:19 -0700 (PDT)
Content-Type: multipart/mixed; boundary="===============2041694522830728966=="
MIME-Version: 1.0
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
To: sandbox-mailoutput@ietf.org
Message-ID: <163363171922.18876.12982297522598826258@sandbox.amsl.com>
Date: Thu, 07 Oct 2021 11:35:19 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sandbox-mailoutput/0C2a3jQX-KuDyxNF-9JLASNeSgc>
Subject: [Sandbox-mailoutput] [Django development] WG Action: Formed Oblivious HTTP Application Intermediation (ohai)
X-BeenThere: sandbox-mailoutput@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <sandbox-mailoutput.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sandbox-mailoutput>, <mailto:sandbox-mailoutput-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sandbox-mailoutput/>
List-Post: <mailto:sandbox-mailoutput@ietf.org>
List-Help: <mailto:sandbox-mailoutput-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sandbox-mailoutput>, <mailto:sandbox-mailoutput-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Oct 2021 18:35:25 -0000

The attached message would have been sent, but the tracker is in development mode.
It was not sent to anybody.

--- Begin Message ---
A new IETF WG has been formed in the Security Area. For additional
information, please contact the Area Directors or the WG Chairs. EDITED TEXT HERE, LOREM IPSUM ETC.

Oblivious HTTP Application Intermediation (ohai)
-----------------------------------------------------------------------
Current status: Proposed WG

Chairs:
  TBD

Assigned Area Director:
  Francesca Palombini <francesca.palombini@ericsson.com>

Security Area Directors:
  Benjamin Kaduk <kaduk@mit.edu>
  Roman Danyliw <rdd@cert.org>

Mailing list:
  Address: ohai@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/ohai
  Archive: https://mailarchive.ietf.org/arch/browse/ohai/

Group page: https://datatracker.ietf.org/group/ohai/

Charter: https://datatracker.ietf.org/doc/charter-ietf-ohai/

In a number of different settings, interactions between clients and servers
involve information that could be sensitive when associated with client
identity.  Client-server applications built on HTTP reveal aspects of client
identity to servers through these interactions, especially source addresses.
Even without client identity, a server might be able to build a profile of
client activity by correlating requests from the same client over time.

In HTTP-based applications where the information included in requests does not
need to be correlated, the protocol this working group defines will allow a
supporting server to accept requests via a proxy.  The proxy ensures that the
server cannot see source addressing information for clients, which prevents
servers linking multiple requests from the same client.  Encryption ensures
that the proxy is unable to read requests or responses.  However, if the
proxy and server collude, then neither of these privacy properties hold.

Applications and use cases best suited for this protocol are those that have
discrete, transactional queries that might reveal small amounts of information
that accumulate over time.  Examples include DNS queries, telemetry
submission, and certificate revocation checking. In some of these application
deployments, the relationship between client, server, and cooperating proxy
might be configured out-of-band.

General purpose HTTP applications such as web browsing are not in scope for
the protocol that is to be defined. Broad applicability is limited by
multiple factors, including the need for explicit server support of the
protocol. In contrast, transport-level proxies such as HTTP CONNECT or MASQUE
are a more appropriate mechanism for those use cases, as they allow
connecting to unmodified servers.

The OHAI working group will define a protocol for anonymization of HTTP
requests using a partly-trusted intermediary, a method of encapsulating HTTP
requests and responses that provides protected, low-latency exchanges.  This
protocol will use existing cryptographic primitives to meet these goals.  The
working group will define any data formats necessary to carry encapsulated
requests and responses, plus formats for supplementary material, such as
server keying material, that might be needed to use the protocol.

The OHAI working group will include an applicability statement that documents
the limitations of this design and any usage constraints that are necessary to
ensure that the protocol is secure.  The working group will consider the
operational impact as part of the protocol design and document operational
considerations.

The working group will prioritize work on the core protocol elements as
identified.  In addition, the working group may work on other use cases and
deployment models, including those that involve discovery of proxies or
servers and their key configurations.

The OHAI working group will work closely with other groups that develop the
tools that the protocol depends on (HTTPbis for HTTP, CFRG for HPKE) or that
might use the protocol (DPRIVE and ADD for DNS over HTTPS).

The working group will use draft-thomson-http-oblivious as input.

Milestones:

  Jul 2022 - Submit the protocol draft to the IESG for publication


--- End Message ---