- From: Roberto Peon <grmocg@gmail.com>
- Date: Mon, 25 Nov 2013 16:55:22 -0800
- To: James M Snell <jasnell@gmail.com>
- Cc: Martin Thomson <martin.thomson@gmail.com>, HTTP Working Group <ietf-http-wg@w3.org>
- Message-ID: <CAP+FsNea-7gGHSGxw+Zgq_q2kgExdq8820BDMvL205Lf_sTqPQ@mail.gmail.com>
Here is the GOALS section from: http://tools.ietf.org/html/draft-vidya-httpbis-explicit-proxy-ps-00. I do think breaking down the conversation in this way is interesting. 6.2 <http://tools.ietf.org/html/draft-vidya-httpbis-explicit-proxy-ps-00#section-6.2>. Goals These are the goals of a solution aimed at making proxying explicit in HTTP. o In the presence of a proxy, users' communications SHOULD at least use a channel that is point-to-point encrypted. o Users MUST be able to opt-out of communicating sensitive information over a channel which is not end-to-end private. o Content-providers MAY serve certain content only in an end-to-end confidential fashion. o Interception proxies MUST be precluded from intercepting secure communications between the user and the content-provider. o User-agents and servers MUST know when a transforming proxy is interposed in the communications channel. o User-agents MUST be able to detect when content requested with an https scheme has been modified by any intermediate entity. o Entities other than the server or user-agent SHOULD still be able to provide caching services. o User agents MUST be able to verify that the content is in fact served by the content provider. o A set of signaling semantics should exist which allows the content-provider and the user to have the appropriate level of security or privacy signaled per resource. o Ideally, HTTP URI semantics SHOULD NOT change, but if it does, it must remain backwards-compatible. o Configuration and deployment of proxies should be as easy as currently used solutions. o Introduction of explicit proxying MUST NOT require a flag day upgrade - in other words, it should work with existing client and content provider implementations during the transition. On Mon, Nov 25, 2013 at 4:43 PM, James M Snell <jasnell@gmail.com> wrote: > On Mon, Nov 25, 2013 at 4:10 PM, Martin Thomson > <martin.thomson@gmail.com> wrote: > > On 25 November 2013 15:53, David Morris <dwm@xpasc.com> wrote: > >> Powers need to be negotiated and not an absolute feature of the > protocol. > > > > That's a nice blanket statement. Let's assume that this is true for > > all combinations of powers (a point that seems suspect); who are the > > parties at the negotiation table? > > > > Great question that does not have a great answer. Part of the problem > with this conversation is that we don't really have a great vocabulary > developed yet to really discuss it.. we just keep saying "trusted > proxy" and "untrusted proxy" without really breaking down what those > really are. We need to if we're going to make any progress in this > discussion. Also, without any clear shared notion about what kind of > good behaviors a "trusted" intermediary ought to implement, it's going > to be very difficult to really nail this down. > > So let's take a first stab at this: > > 1. A Trusted Intermediary exists in the path for the benefit of either > the requesting agent, responding origin, or both. > 2. A Trusted Intermediary ALWAYS makes it's presence on the path known > to both the requesting agent and the origin. > 3. A Trusted Intermediary ALWAYS ensures that any modification it > makes to either the request or response are detectable by the > receiving peer. > 4. A Trusted Intermediary NEVER utilizes request or response data in a > manner not authorized by the requesting agent or responding origin. > 5. A Trusted Intermediary that exists for the benefit of the > requesting agent ALWAYS provides proof to the responding origin that > it has been authorized and trusted by the requesting agent. > 6. A Trusted Intermediary that exists for the benefit of the > responding agent ALWAYS provides proof to the requesting agent that it > has been authorized and trusted by the responding origin. > 7. A Trusted Intermediary NEVER attempts to subvert or compromise the > integrity communication between the requesting agent and responding > origin. > 8. A Trusted Intermediary ALWAYS limits it's actions to those > explicitly granted to it by the requesting agent or responding origin > or both. > 9. A Trusted Intermediary ALWAYS asks for permission before it > performs any action (see #2) > > I'm sure these could use some massaging and refinement, but what this > basically describes in a delegation model: A trusted intermediary is > one that has been delegated some form of verifiable permission to act > by either the origin or the agent. The key questions, then, become how > exactly do we reliably enable this kind of delegated authorization > model. > > Is breaking the conversation down this way helpful? > > - James > >
Received on Tuesday, 26 November 2013 00:55:52 UTC