Network Working Group

Independent Submission                                     M. Nottingham

Intended status:
Request for Comments: 8674                                 December 2019
Category: Informational
Expires: February 3, 2020
ISSN: 2070-1721

                       The "safe" HTTP Preference
                     draft-nottingham-safe-hint-11

Abstract

   This specification defines a "safe" preference for HTTP requests that
   expresses a desire to avoid objectionable content, according to the
   definition of that term by the origin server.

   This specification does not define a precise semantic for "safe".
   Rather, the term is interpreted by the server and within the scope of
   each Web web site that chooses to act upon this information.

   Support for this preference by clients and servers is optional.

Status of This Memo

   This Internet-Draft document is submitted in full conformance with not an Internet Standards Track specification; it is
   published for informational purposes.

   This is a contribution to the
   provisions RFC Series, independently of BCP 78 any other
   RFC stream.  The RFC Editor has chosen to publish this document at
   its discretion and BCP 79.

   Internet-Drafts makes no statement about its value for
   implementation or deployment.  Documents approved for publication by
   the RFC Editor are working documents not candidates for any level of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list Standard;
   see Section 2 of RFC 7841.

   Information about the current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum status of six months this document, any errata,
   and how to provide feedback on it may be updated, replaced, or obsoleted by other documents obtained at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on February 3, 2020.
   https://www.rfc-editor.org/info/rfc8674.

Copyright Notice

   Copyright (c) 2019 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Notational Conventions
   2.  The "safe" Preference . . . . . . . . . . . . . . . . . . . .   4
   3.  Implementation Status . . . . . . . . . . . . . . . . . . . .   5
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   6
   5.
   4.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   6
   6.
   5.  References
     5.1.  Normative References
     5.2.  Informative References  . . . . . . . . . . . . . . . . . . . . . . . . .   7
   Appendix A.  Acknowledgements . . . . . . . . . . . . . . . . . .   8
   Appendix B.  Sending the "safe" Preference from Web Browsers . . . . . . . . . .   8
   Appendix C. B.  Supporting the "safe" Preference on Web Sites . . . . . . . . . . .   8
   Acknowledgements
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   9

1.  Introduction

   Many Web web sites have a "safe" mode, mode to assist those who don't want to
   be exposed (or have their children exposed) to content to which they
   might object.

   However, that goal is often difficult to achieve, achieve because of the need
   to go to every Web web site that might be used, used and navigate to the
   appropriate page (possibly creating an account along the way) to get
   a cookie [RFC6265] set in the browser, for each browser on every
   device used.

   A more manageable approach is for the browser to proactively indicate
   a preference for safe content.  A user agent that supports doing so
   (whether it be an individual browser, browser or through an Operating System operating system
   HTTP library) need only be configured once to assure ensure that the
   preference is advertised to a set of sites, or even all sites.

   This specification defines how to declare this desire in requests as
   a
   an HTTP Preference [RFC7240].

   Note that this specification does not define what content might be
   considered objectionable, and so the concept of "safe" is also not precisely
   defined.  Rather, the term is interpreted by the server and within
   the scope of each Web web site that chooses to act upon this information.

   That said, the intent of "safe" is to allow end users (or those acting on their
   behalf) to express a desire to avoid content that is considered
   objectionable within the cultural context of that site; usually (but
   not always) always), the objectionable content that is content unsuitable for
   minors.  The
   "safe" safe preference is not intended to be used for other
   purposes.

   Furthermore, sending "safe" the preference does not guarantee that the Web web
   site will use it, nor it or that it will apply a concept of "objectionable"
   that is consistent with the requester's views.  As such, its effect
   can be described as "best effort," effort" and not to be relied upon.  In
   other words, sending the preference is no more reliable than going to
   each
   Web web site and manually selecting a "safe" safe mode, but it is
   considerably easier.

   It is also important to note that the "safe" safe preference is not a
   reliable indicator that the end user is a child; other users might
   have a desire for unobjectionable content, and some children might
   browse without the preference being set.

   Note also that the cultural context applies to the hosting location
   of a site, the content provider, and the source of the content.  It
   cannot be guaranteed that a user-agent user agent and origin server will have
   the same view of the concept of what is objectionable.

   Simply put, it is a statement by (or on behalf of) the end user to
   the effect "If
   indicating that "if your site has a 'safe' safe setting, this user is hereby
   opting into that, according to your definition of the term."

   The mechanism described in this document does not have IETF consensus
   and is not a standard.  It is a widely deployed approach that has
   turned out to be useful, useful and is presented here so that server and
   browser implementations can have a common understanding of how it
   operates.

   This mechanism was presented for publication as an IETF Proposed
   Standard,
   Standard but was not approved for publication by the IESG because of
   concerns that included the vagueness of the meaning of "safe", the
   ability of a proxy to insert the hint outside of a user's control,
   the fact that there was no way to know whether the hint was or was
   not applied to the response returned by the server, and how the
   possibility that the use of this preference may incentivize increased
   censorship and/or targeting of minors.

   The specification has been was updated to address those concerns, but the IESG has
   did not approved approve progressing this document as an IETF Proposed
   Standard.  As a result, it is has been published in the Independent
   Stream.

1.1.  Notational Conventions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  The "safe" Preference

   When present in a request, the "safe" safe preference indicates that the
   user prefers that the origin server to not respond with content which that is
   designated as objectionable, according to the origin server's
   definition of the concept.

   For example, this is a request that includes the "safe" safe preference:

   GET /foo.html HTTP/1.1
   Host: www.example.org
   User-Agent: ExampleBrowser/1.0
   Prefer: safe

   Typically, user agents that emit the "safe" safe preference will include it
   in all requests with the "https" URI scheme, although some might
   expose finer-grained controls over when it is sent; this ensures that
   the preference is available to the applicable resources.  User agents
   MUST NOT emit the "safe" safe preference on requests with the "http" URI
   scheme (see Section 4). 3).  See Appendix B A for more information about
   configuring the set of resources "safe" the safe preference is sent to.

   Safe

   The safe preference MAY be implemented in common HTTP libraries
   (e.g., an operating system might choose to insert the preference in
   requests based upon system-wide configuration).

   Origin servers that utilize the "safe" safe preference ought to document
   that they do so, along with the criteria that they use to denote
   objectionable content.  If a server has more fine-grained degrees of
   "safety",
   safety, it SHOULD select a reasonable default to use, use and document
   that; it MAY use additional mechanisms (e.g., cookies [RFC6265]) to
   fine-tune.

   A response corresponding to the request above might have headers that
   look like this:

   HTTP/1.1 200 OK
   Transfer-Encoding: chunked
   Content-Type: text/html
   Preference-Applied: safe
   Server: ExampleServer/2.0
   Vary: Prefer

   Here, the Preference-Applied response header ([RFC7240]) [RFC7240] indicates that
   the site has applied the preference.  Servers are not required to
   send Preference-Applied (even when they have applied the
   preference), preference)
   but are encouraged to where possible.

   Note that the Vary response header needs to be sent if the response
   is cacheable and might change depending on the value of the "Prefer" Prefer
   header.  This is not only true for those responses that are "safe", safe but
   also the default "unsafe" unsafe response.

   See [RFC7234] Section 4.1 of [RFC7234] for more information about the
   interaction between the Vary header field and Web web caching.

   See Appendix C B for additional advice specific to Web web servers wishing
   to use "safe".

3.  Implementation Status

   _Note to RFC Editor: Please remove this section before publication._

   This section records the status of known implementations of the
   protocol defined by this specification at the time of posting of this
   Internet-Draft.  Please note that the listing of any individual
   implementation here does not imply endorsement by the IETF.
   Furthermore, no effort has been spent to verify the information
   presented here that was supplied by IETF contributors.  This is not
   intended as, and must not be construed to be, a catalog of available
   implementations or their features.  Readers are advised to note that
   other implementations may exist.

   o  Microsoft Internet Explorer - see https://support.microsoft.com/
      en-hk/help/2980016/

   o  Microsoft Bing - see https://developer.microsoft.com/en-us/
      microsoft-edge/testdrive/demos/familysearch/

   o  Mozilla Firefox - see https://support.mozilla.org/en-US/kb/block-
      and-unblock-websites-parental-controls-firef

   o  Cisco - see http://blogs.cisco.com/security/filtering-explicit-
      content

4. safe preference.

3.  Security Considerations

   The "safe" safe preference is not a secure mechanism; it can be inserted or
   removed by intermediaries with access to the request stream (e.g. (e.g.,
   for "http" URLs).  Therefore, it is prohibited from being included in
   requests with the "http" scheme.

   Its presence reveals information about the user, which may be of
   assistance in "fingerprinting" fingerprinting the user by sites and other entities in
   the network.  This information which provides insight into the preferences
   of the user, user and might be used to make assumptions about the
   user and so user; thus,
   it could be used to target identify categories of user users for purposes such as
   targeting (including advertising and identification of minors).
   Therefore, user agents SHOULD NOT include it in requests when the
   user has expressed a desire to avoid such attacks (e.g., some forms
   of "private mode" private mode browsing).

   By its nature, including "safe" the safe preference in requests does not assure
   ensure that all content will actually be safe; it content is safe only
   when servers elect to honor
   it that content might be "safe". it.

   Even then, a malicious server might adapt content so that it is even
   less "safe" safe (by some definition of the word).  As such, this mechanism
   on its own is not enough to assure ensure that only "safe" safe content is seen;
   those who wish to ensure that will need to combine its use with other
   techniques (e.g., content filtering).

   Furthermore, the server and user may have differing ideas regarding
   the semantics of "safe." "safe".  As such, the "safety" safety of the user's
   experience when browsing from site to site site, as well as over time time,
   might (and probably will) change.

5.

4.  IANA Considerations

   This specification registers

   Per this specification, IANA has registered the following entry in
   the "HTTP Preferences" registry [RFC7240]:

   o

   *  Preference: safe

   o  Value: (no value)

   o

   *  Description: Indicates that "safe" / "unobjectionable" safe (i.e., unobjectionable) content
      is preferred.

   o

   *  Reference: (this document)

   o  Notes:

6. RFC 8674

5.  References

6.1.

5.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC7234]  Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
              Ed., "Hypertext Transfer Protocol (HTTP/1.1): Caching",
              RFC 7234, DOI 10.17487/RFC7234, June 2014,
              <https://www.rfc-editor.org/info/rfc7234>.

   [RFC7240]  Snell, J., "Prefer Header for HTTP", RFC 7240,
              DOI 10.17487/RFC7240, June 2014,
              <https://www.rfc-editor.org/info/rfc7240>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

6.2.

5.2.  Informative References

   [RFC6265]  Barth, A., "HTTP State Management Mechanism", RFC 6265,
              DOI 10.17487/RFC6265, April 2011,
              <https://www.rfc-editor.org/info/rfc6265>.

Appendix A.  Acknowledgements

   Thanks to Alissa Cooper, Ilya Grigorik, Emma Llanso, Jeff Hughes,
   Lorrie Cranor, Doug Turner and Dave Crocker for their comments.

Appendix B.  Sending the "safe" Preference from Web Browsers

   As discussed in Section 2, there are many possible ways for the
   "safe" safe
   preference to be generated.  One possibility is for a Web web browser to
   allow its users to configure the preference to be sent.

   When doing so, it is important not to misrepresent the preference as
   binding to Web web sites.  For example, an appropriate setting might be a
   checkbox with wording such as:

      [] Request "safe" safe content from Web web sites

   ...

   along with further information available upon request.

   Browsers might also allow the "safe" safe preference to be "locked" - that
   is, locked to prevent
   modification without administrative access, access or a passcode.

   Note that this specification does not require browsers to send "safe" the
   safe preference on all requests, although that is one possible
   implementation; e.g., alternate implementation strategies include
   blacklists and whitelists.

Appendix C. B.  Supporting the "safe" Preference on Web Sites

   Web sites that allow configuration of a "safe" safe mode (for example, using
   a cookie) can add support for the "safe" safe preference incrementally;
   since the preference will not be supported by all clients
   immediately, it is necessary to have another way to configure it.

   When honoring the safe preference, it is important that it not be
   possible to disable it through the Web web site's interface, since "safe" the
   safe preference may be configured and locked down by the browser or
   computer's administrator (e.g., a parent).  If the site has such a
   means of configuration (e.g., stored user preferences) and the safe
   preference is received in a request, the "safer" interpretation ought
   to be used.

   The appropriate level of "safety" safety is a site-specific decision.  When
   selecting it, sites ought to bear in mind that disabling the
   preference might be considerably more onerous than through using other means,
   especially if the preference is generated based upon Operating
   System the operating
   system configuration.

   Sites might offer different levels of "safeness" safety through Web
   configuration, web
   configuration; they will need to either inform their users of what
   level the "safe" safe hint corresponds to, to or provide them with some means of
   adjusting it.

   If the user expresses users express a wish to disable "safe" safe mode, the site can remind
   them that the safe preference is being sent, sent and ask them to consult
   their administrator (since "safe" the safe preference might be set by a locked-
   down Operating System
   locked-down operating system configuration).

   As explained in Section 2, responses that change based upon the
   presence of the "safe" safe preference need to either carry the "Vary:
   Prefer" response header field, field or be uncacheable by shared caches
   (e.g., with a "Cache-Control: private" response header field).  This
   is to avoid an unsafe cached response being served to a client that
   prefers safe content (or vice versa).

Acknowledgements

   Thanks to Alissa Cooper, Ilya Grigorik, Emma Llanso, Jeff Hughes,
   Lorrie Cranor, Doug Turner, and Dave Crocker for their comments.

Author's Address

   Mark Nottingham

   EMail:

   Email: mnot@mnot.net
   URI:   https://www.mnot.net/