- From: Caleb Queern <cqueern@gmail.com>
- Date: Mon, 12 Jun 2023 08:34:48 -0500
- To: Mike West <mkwst@google.com>
- Cc: HTTP Working Group <ietf-http-wg@w3.org>, Shivan Kaul Sahib <shivankaulsahib@gmail.com>, "public-webappsec@w3.org" <public-webappsec@w3.org>
- Message-ID: <CAEnXMMox4hfR0W_xxmaqFGiRuyC-J1_7otx4NNic3Cb7G2u=MA@mail.gmail.com>
ha, thanks Mike. Makes sense now. Thanks all. On Mon, Jun 12, 2023 at 8:29 AM Mike West <mkwst@google.com> wrote: > On Mon 12. Jun 2023 at 15:22 Caleb Queern <cqueern@gmail.com> wrote: > >> Thanks Shivan, >> >> I think one big difference between Off-The-Record and Clear-Site-Data is >>> that Off-The-Record is preventative, while Clear-Site-Data is sent after >>> the fact >>> >> >> If I'm not mistaken Clear-Site-Data can be sent "along the way" from the >> first navigation so that user agents don't store anything in storage or >> record the site visit in history etc. as well. >> > > A small not: Clear-Site-Data does not offer developers the ability to > clear browser history. It offers the ability to clear already web-visible > storage, as well as cache. > > My concern is that these seem to have overlapping functionality and after >> more than a decade of adding new security headers for developers to think >> about, there's only so much we can reasonably expect them to consider (and >> leading to compensatory efforts like Mike's Baseline Header >> https://github.com/mikewest/baseline-header ). >> >> Our options might be: >> a) agree on Off-The-Record header, have browsers implement it, educate >> devs on OTR usage >> b) educate devs on CSD usage >> >> I'll defer to the broader group of course. >> >> On Mon, Jun 12, 2023 at 1:55 AM Shivan Kaul Sahib < >> shivankaulsahib@gmail.com> wrote: >> >>> Hey Caleb, >>> >>> On Thu, 8 Jun 2023 at 14:58, Caleb Queern <cqueern@gmail.com> wrote: >>> >>>> This feels very similar to what <ahem> some have said about the >>>> Clear-Site-Data header both in its utility and risks. >>>> >>> >>> I think one big difference between Off-The-Record and Clear-Site-Data is >>> that Off-The-Record is preventative, while Clear-Site-Data is sent after >>> the fact. Also, in the case of Clear-Site-Data, the website specifies >>> what to clear, while with Off-The-Record the website leaves it up to the >>> user agent. >>> >>>> >>>> On Thu, Jun 8, 2023 at 4:52 PM David Schinazi <dschinazi.ietf@gmail.com> >>>> wrote: >>>> >>>>> This sounds very useful for the domestic violence resources use case, >>>>> but at the same time I could imagine malware websites abusing it to erase >>>>> traces of how a machine got infected. Would it be possible to get user >>>>> consent per origin for this? >>>>> David >>>>> >>>>> On Thu, Jun 8, 2023 at 2:42 PM Eric Lawrence < >>>>> Eric.Lawrence@microsoft.com> wrote: >>>>> >>>>>> This generally seems useful. >>>>>> >>>>>> >>>>>> >>>>>> I can foresee some user confusion if a user encountered the >>>>>> interstitial page when visiting the target site in InPrivate/Incognito >>>>>> mode, but I also wouldn’t want to skip the interstitial page in those >>>>>> privacy modes (because it could be abused as an oracle that would reveal to >>>>>> the site whether a visitor is using a Private Mode already). >>>>>> >>>>>> In Chromium-based browsers, browser extensions are disabled by >>>>>> default while in Private Mode. It does not look like you propose to disable >>>>>> extensions from interacting with “Off-the-record” sites? >>>>>> >>>>>> >>>>>> >>>>>> *From:* Shivan Kaul Sahib <shivankaulsahib@gmail.com> >>>>>> *Sent:* Thursday, June 8, 2023 2:14 PM >>>>>> *To:* public-webappsec@w3.org; HTTP Working Group < >>>>>> ietf-http-wg@w3.org> >>>>>> *Subject:* Request-Off-The-Record Mode header >>>>>> >>>>>> >>>>>> >>>>>> You don't often get email from shivankaulsahib@gmail.com. Learn why >>>>>> this is important <https://aka.ms/LearnAboutSenderIdentification> >>>>>> >>>>>> Hi folks, this is a head's up and early request for feedback: >>>>>> >>>>>> >>>>>> >>>>>> Brave is shipping support for an HTTP response header sent by a >>>>>> website that wants the client to treat the website as "off-the-record" i.e. >>>>>> not store anything in storage, not record the site visit in history etc. >>>>>> Kind of like incognito/private browsing mode but site-initiated and only >>>>>> for a specific website. The header is simple: it would look like >>>>>> `Request-OTR: 1`. Some details here: >>>>>> https://brave.com/privacy-updates/26-request-off-the-record/#request-otr-header. Currently >>>>>> we bootstrap for websites that have expressed interest in this (mainly >>>>>> websites that have help resources for domestic violence victims, which was >>>>>> the driving use-case) by preloading a list of websites into the browser, >>>>>> but it would be nice to standardize the header. We're considering doing the >>>>>> work in the HTTP WG at IETF: it's envisioned to be a simple header. >>>>>> >>>>>> I see that this idea was previously discussed in W3C WebAppSec: >>>>>> https://lists.w3.org/Archives/Public/public-webappsec/2015Sep/0016.html, >>>>>> and there was a draft Mozilla spec: >>>>>> https://wiki.mozilla.org/Security/Automatic_Private_Browsing_Upgrades, >>>>>> though as a CSP directive. >>>>>> >>>>>> >>>>>> >>>>>> Happy to hear what people think. >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>> -- > -mike >
Received on Monday, 12 June 2023 13:35:05 UTC