<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ohai-ohttp-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title>Oblivious HTTP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-01"/>
    <author initials="M." surname="Thomson" fullname="Martin Thomson">
      <organization>Mozilla</organization>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <author initials="C.A." surname="Wood" fullname="Christopher A. Wood">
      <organization>Cloudflare</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2022" month="February" day="15"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <abstract>
      <t>This document describes a system for the forwarding of encrypted HTTP messages.
This allows a client to make multiple requests of a server without the server being able
to link those requests to the client or to identify the requests as having come
from the same client.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-ohai.github.io/oblivious-http/draft-ietf-ohai-ohttp.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ohai-ohttp/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ohai/oblivious-http"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The act of making a request using HTTP reveals information about the client
identity to a server. Though the content of requests might reveal information,
that is information under the control of the client. In comparison, the source
address on the connection reveals information that a client has only limited
control over.</t>
      <t>Even where an IP address is not directly attributed to an individual, the use
of an address over time can be used to correlate requests. Servers are able to
use this information to assemble profiles of client behavior, from which they
can make inferences about the people involved. The use of persistent
connections to make multiple requests improves performance, but provides
servers with additional certainty about the identity of clients in a similar
fashion.</t>
      <t>Use of an HTTP proxy can provide a degree of protection against servers
correlating requests. Systems like virtual private networks or the Tor network
<xref target="Dingledine2004" format="default"/>, provide other options for clients.</t>
      <t>Though the overhead imposed by these methods varies, the cost for each request
is significant. Preventing request linkability requires that each request
use a completely new TLS connection to the server. At a minimum,
this requires an additional round trip to the server in addition to that
required by the request. In addition to having high latency, there are
significant secondary costs, both in terms of the number of additional bytes
exchanged and the CPU cost of cryptographic computations.</t>
      <t>This document describes a method of encapsulation for binary HTTP messages
<xref target="BINARY" format="default"/> using Hybrid Public Key Encryption (HPKE;
<xref target="HPKE" format="default"/>). This protects the content of both requests and
responses and enables a deployment architecture that can separate the identity
of a requester from the request.</t>
      <t>Though this scheme requires that servers and proxies explicitly support it,
this design represents a performance improvement over options that perform just
one request in each connection. With limited trust placed in the proxy (see
<xref target="security" format="default"/>), clients are assured that requests are not uniquely attributed to
them or linked to other requests.</t>
    </section>
    <section anchor="conventions-and-definitions" numbered="true" toc="default">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <dl>
        <dt>
Encapsulated Request:  </dt>
        <dd>
          <t>An HTTP request that is encapsulated in an HPKE-encrypted message; see
<xref target="request" format="default"/>.</t>
        </dd>
        <dt>
Encapsulated Response:  </dt>
        <dd>
          <t>An HTTP response that is encapsulated in an HPKE-encrypted message; see
<xref target="response" format="default"/>.</t>
        </dd>
        <dt>
Oblivious Proxy Resource:  </dt>
        <dd>
          <t>An intermediary that forwards requests and responses between clients and a
single oblivious request resource.</t>
        </dd>
        <dt>
Oblivious Request Resource:  </dt>
        <dd>
          <t>A resource that can receive an encapsulated request, extract the contents of
that request, forward it to an oblivious target resource, receive a response,
encapsulate that response, then return that response.</t>
        </dd>
        <dt>
Oblivious Target Resource:  </dt>
        <dd>
          <t>The resource that is the target of an encapsulated request.  This resource
logically handles only regular HTTP requests and responses and so might be
ignorant of the use of oblivious HTTP to reach it.</t>
        </dd>
      </dl>
      <t>This draft includes pseudocode that uses the functions and conventions defined
in <xref target="HPKE" format="default"/>.</t>
      <t>Encoding an integer to a sequence of bytes in network byte order is described
using the function <tt>encode(n, v)</tt>, where <tt>n</tt> is the number of bytes and <tt>v</tt> is
the integer value. The function <tt>len()</tt> returns the length of a sequence of
bytes.</t>
      <t>Formats are described using notation from <xref section="1.3" sectionFormat="of" target="QUIC" format="default"/>.</t>
    </section>
    <section anchor="overview" numbered="true" toc="default">
      <name>Overview</name>
      <t>A client learns the following:</t>
      <ul spacing="normal">
        <li>The identity of an oblivious request resource.  This might include some
information about oblivious target resources that the oblivious request
resource supports.</li>
        <li>The details of an HPKE public key that the oblivious request resource accepts,
including an identifier for that key and the HPKE algorithms that are used
with that key.</li>
        <li>The identity of an oblivious proxy resource that will forward encapsulated
requests and responses to a single oblivious request resource. See <xref target="proxy-state" format="default"/>
for more information about the mapping between oblivious proxy and oblivious
request resources.</li>
      </ul>
      <t>This information allows the client to make a request of an oblivious target
resource without that resource having only a limited ability to correlate that
request with the client IP or other requests that the client might make to that
server.</t>
      <figure anchor="fig-overview">
        <name>Overview of Oblivious HTTP</name>
        <artset>
          <artwork type="svg" name="" align="left" alt=""><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="528" viewBox="0 0 528 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
              <path d="M 48,80 L 48,320" fill="none" stroke="black"/>
              <path d="M 88,32 L 88,80" fill="none" stroke="black"/>
              <path d="M 152,32 L 152,80" fill="none" stroke="black"/>
              <path d="M 192,80 L 192,320" fill="none" stroke="black"/>
              <path d="M 240,32 L 240,80" fill="none" stroke="black"/>
              <path d="M 304,32 L 304,80" fill="none" stroke="black"/>
              <path d="M 344,80 L 344,320" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,80" fill="none" stroke="black"/>
              <path d="M 432,32 L 432,80" fill="none" stroke="black"/>
              <path d="M 472,80 L 472,320" fill="none" stroke="black"/>
              <path d="M 520,32 L 520,80" fill="none" stroke="black"/>
              <path d="M 8,32 L 88,32" fill="none" stroke="black"/>
              <path d="M 152,32 L 240,32" fill="none" stroke="black"/>
              <path d="M 304,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 432,32 L 520,32" fill="none" stroke="black"/>
              <path d="M 8,80 L 88,80" fill="none" stroke="black"/>
              <path d="M 152,80 L 240,80" fill="none" stroke="black"/>
              <path d="M 304,80 L 392,80" fill="none" stroke="black"/>
              <path d="M 432,80 L 520,80" fill="none" stroke="black"/>
              <path d="M 48,144 L 184,144" fill="none" stroke="black"/>
              <path d="M 192,176 L 336,176" fill="none" stroke="black"/>
              <path d="M 344,192 L 464,192" fill="none" stroke="black"/>
              <path d="M 352,240 L 472,240" fill="none" stroke="black"/>
              <path d="M 200,272 L 344,272" fill="none" stroke="black"/>
              <path d="M 56,304 L 192,304" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="472,192 460,186.4 460,197.6 " fill="black" transform="rotate(0,464,192)"/>
              <polygon class="arrowhead" points="360,240 348,234.4 348,245.6 " fill="black" transform="rotate(180,352,240)"/>
              <polygon class="arrowhead" points="344,176 332,170.4 332,181.6 " fill="black" transform="rotate(0,336,176)"/>
              <polygon class="arrowhead" points="208,272 196,266.4 196,277.6 " fill="black" transform="rotate(180,200,272)"/>
              <polygon class="arrowhead" points="192,144 180,138.4 180,149.6 " fill="black" transform="rotate(0,184,144)"/>
              <polygon class="arrowhead" points="64,304 52,298.4 52,309.6 " fill="black" transform="rotate(180,56,304)"/>
              <g class="text">
                <text x="44" y="52">Client</text>
                <text x="184" y="52">Proxy</text>
                <text x="344" y="52">Request</text>
                <text x="468" y="52">Target</text>
                <text x="196" y="68">Resource</text>
                <text x="348" y="68">Resource</text>
                <text x="476" y="68">Resource</text>
                <text x="108" y="116">Encapsulated</text>
                <text x="88" y="132">Request</text>
                <text x="252" y="148">Encapsulated</text>
                <text x="232" y="164">Request</text>
                <text x="384" y="180">Request</text>
                <text x="428" y="228">Response</text>
                <text x="284" y="244">Encapsulated</text>
                <text x="300" y="260">Response</text>
                <text x="132" y="276">Encapsulated</text>
                <text x="148" y="292">Response</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" name="" align="left" alt=""><![CDATA[
+---------+       +----------+       +----------+    +----------+
| Client  |       | Proxy    |       | Request  |    | Target   |
|         |       | Resource |       | Resource |    | Resource |
+----+----+       +----+-----+       +----+-----+    +----+-----+
     |                 |                  |               |
     | Encapsulated    |                  |               |
     | Request         |                  |               |
     +---------------->| Encapsulated     |               |
     |                 | Request          |               |
     |                 +----------------->| Request       |
     |                 |                  +-------------->|
     |                 |                  |               |
     |                 |                  |      Response |
     |                 |     Encapsulated |<--------------+
     |                 |         Response |               |
     |    Encapsulated |<-----------------+               |
     |        Response |                  |               |
     |<----------------+                  |               |
     |                 |                  |               |
]]></artwork>
        </artset>
      </figure>
      <t>In order to make a request to an oblivious target resource, the following steps
occur, as shown in <xref target="fig-overview" format="default"/>:</t>
      <ol spacing="normal" type="1"><li>The client constructs an HTTP request for an oblivious target resource.</li>
        <li>The client encodes the HTTP request in a binary HTTP message and then
encapsulates that message using HPKE and the process from <xref target="request" format="default"/>.</li>
        <li>The client sends a POST request to the oblivious proxy resource with the
encapsulated request as the content of that message.</li>
        <li>The oblivious proxy resource forwards this request to the oblivious request
resource.</li>
        <li>The oblivious request resource receives this request and removes
the HPKE protection to obtain an HTTP request.</li>
        <li>The oblivious request resource makes an HTTP request that includes the target
URI, method, fields, and content of the request it acquires.</li>
        <li>The oblivious target resource answers this HTTP request with an HTTP
response.</li>
        <li>The oblivious request resource encapsulates the HTTP response following the
process in <xref target="response" format="default"/> and sends this in response to the request from the
oblivious proxy resource.</li>
        <li>The oblivious proxy resource forwards this response to the client.</li>
        <li>The client removes the encapsulation to obtain the response to the original
request.</li>
      </ol>
      <section anchor="applicability" numbered="true" toc="default">
        <name>Applicability</name>
        <t>Oblivious HTTP has limited applicability.  Many uses of HTTP benefit from being
able to carry state between requests, such as with cookies (<xref target="RFC6265" format="default"/>),
authentication (<xref section="11" sectionFormat="of" target="HTTP" format="default"/>), or even alternative services
(<xref target="RFC7838" format="default"/>).  Oblivious HTTP seeks to prevent this sort of linkage, which
requires that applications not carry state between requests.</t>
        <t>Oblivious HTTP is primarily useful where privacy risks associated with possible
stateful treatment of requests are sufficiently negative that the cost of
deploying this protocol can be justified.  Oblivious HTTP is simpler and less
costly than more robust systems, like Prio (<xref target="PRIO" format="default"/>) or Tor
(<xref target="Dingledine2004" format="default"/>), which can provide stronger guarantees at higher
operational costs.</t>
        <t>Oblivious HTTP is more costly than a direct connection to a server.  Some costs,
like those involved with connection setup, can be amortized, but there are
several ways in which oblivious HTTP is more expensive than a direct request:</t>
        <ul spacing="normal">
          <li>Each oblivious request requires at least two regular HTTP requests, which adds
latency.</li>
          <li>Each request is expanded in size with additional HTTP fields,
encryption-related metadata, and AEAD expansion.</li>
          <li>Deriving cryptographic keys and applying them for request and
response protection takes non-negligible computational resources.</li>
        </ul>
        <t>Examples of where preventing the linking of requests might justify these costs
include:</t>
        <ul spacing="normal">
          <li>DNS queries.  DNS queries made to a recursive resolver reveal information
about the requester, particularly if linked to other queries.</li>
          <li>Telemetry submission.  Applications that submit reports about their usage to
their developers might use oblivious HTTP for some types of moderately
sensitive data.</li>
        </ul>
        <t>These are examples of requests where there is information in a request that - if
it were connected to the identity of the user - might allow a server to learn
something about that user even if the identity of the user is pseudonymous.
Other examples include the submission of anonymous surveys, making search
queries, or requesting location-specific content (such as retrieving tiles of a
map display).</t>
      </section>
    </section>
    <section anchor="key-configuration" numbered="true" toc="default">
      <name>Key Configuration</name>
      <t>A client needs to acquire information about the key configuration of the
oblivious request resource in order to send encapsulated requests.</t>
      <t>In order to ensure that clients do not encapsulate messages that other entities
can intercept, the key configuration MUST be authenticated and have integrity
protection.</t>
      <t>This document describes the "application/ohttp-keys" media type; see
<xref target="ohttp-keys" format="default"/>.  This media type might be used, for example with HTTPS, as part
of a system for configuring or discovering key configurations.  Note however
that such a system needs to consider the potential for key configuration to be
used to compromise client privacy; see <xref target="privacy" format="default"/>.</t>
      <t>Specifying a format for expressing the information a client needs to construct
an encapsulated request ensures that different client implementations can be
configured in the same way. This also enables advertising key configurations in
a consistent format.</t>
      <t>A client might have multiple key configurations to select from when
encapsulating a request. Clients are responsible for selecting a preferred key
configuration from those it supports. Clients need to consider both the key
encapsulation method (KEM) and the combinations of key derivation function
(KDF) and authenticated encryption with associated data (AEAD) in this
decision.</t>
      <t>Evolution of the key configuration format is supported through the definition
of new formats that are identified by new media types.</t>
      <section anchor="key-config" numbered="true" toc="default">
        <name>Key Configuration Encoding</name>
        <t>A single key configuration consists of a key identifier, a public key, an
identifier for the KEM that the public key uses, and a set HPKE symmetric
algorithms. Each symmetric algorithm consists of an identifier for a KDF and an
identifier for an AEAD.</t>
        <t><xref target="format-key-config" format="default"/> shows a single key configuration, KeyConfig, that is
expressed using the TLS syntax; see <xref section="3" sectionFormat="of" target="TLS" format="default"/>.</t>
        <figure anchor="format-key-config">
          <name>A Single Key Configuration</name>
          <sourcecode type="tls-syntax"><![CDATA[
opaque HpkePublicKey[Npk];
uint16 HpkeKemId;
uint16 HpkeKdfId;
uint16 HpkeAeadId;

struct {
  HpkeKdfId kdf_id;
  HpkeAeadId aead_id;
} HpkeSymmetricAlgorithms;

struct {
  uint8 key_id;
  HpkeKemId kem_id;
  HpkePublicKey public_key;
  HpkeSymmetricAlgorithms cipher_suites<4..2^16-4>;
} KeyConfig;
]]></sourcecode>
        </figure>
        <t>The types HpkeKemId, HpkeKdfId, and HpkeAeadId identify a KEM, KDF, and AEAD
respectively. The definitions for these identifiers and the semantics of the
algorithms they identify can be found in <xref target="HPKE" format="default"/>. The Npk parameter
corresponding to the HpkeKdfId can be found in <xref target="HPKE" format="default"/>.</t>
      </section>
      <section anchor="ohttp-keys" numbered="true" toc="default">
        <name>Key Configuration Media Type</name>
        <t>The "application/ohttp-keys" format is a media type that identifies a
serialized collection of key configurations. The content of this media type
comprises one or more key configuration encodings (see <xref target="key-config" format="default"/>) that are
concatenated.</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>ohttp-keys</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>only "8bit" or "binary" is permitted</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>see <xref target="security" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>this specification</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>Magic number(s):</dt>
              <dd>N/A</dd>
              <dt>Deprecated alias names for this type:</dt>
              <dd>N/A</dd>
              <dt>File extension(s):</dt>
              <dd>N/A</dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>N/A</dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IESG</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="hpke-encapsulation" numbered="true" toc="default">
      <name>HPKE Encapsulation</name>
      <t>HTTP message encapsulation uses HPKE for request and response encryption.</t>
      <t>An encapsulated HTTP request contains a binary-encoded HTTP message <xref target="BINARY" format="default"/>
and no other fields; see <xref target="fig-req-pt" format="default"/>.</t>
      <figure anchor="fig-req-pt">
        <name>Plaintext Request Content</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Request {
  Binary HTTP Message (..),
}
]]></artwork>
      </figure>
      <t>An Encapsulated Request is comprised of a length-prefixed key identifier and a
HPKE-protected request message. HPKE protection includes an encapsulated KEM
shared secret (or <tt>enc</tt>), plus the AEAD-protected request message. An
Encapsulated Request is shown in <xref target="fig-enc-request" format="default"/>. <xref target="request" format="default"/> describes the
process for constructing and processing an Encapsulated Request.</t>
      <figure anchor="fig-enc-request">
        <name>Encapsulated Request</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Encapsulated Request {
  Key Identifier (8),
  KEM Identifier (16),
  KDF Identifier (16),
  AEAD Identifier (16),
  Encapsulated KEM Shared Secret (8*Nenc),
  AEAD-Protected Request (..),
}
]]></artwork>
      </figure>
      <t>The Nenc parameter corresponding to the HpkeKdfId can be found in <xref section="7.1" sectionFormat="of" target="HPKE" format="default"/>.</t>
      <t>An encapsulated HTTP response includes a binary-encoded HTTP message <xref target="BINARY" format="default"/>
and no other content; see <xref target="fig-res-pt" format="default"/>.</t>
      <figure anchor="fig-res-pt">
        <name>Plaintext Response Content</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Response {
  Binary HTTP Message (..),
}
]]></artwork>
      </figure>
      <t>Responses are bound to responses and so consist only of AEAD-protected content.
<xref target="response" format="default"/> describes the process for constructing and processing an
Encapsulated Response.</t>
      <figure anchor="fig-enc-response">
        <name>Encapsulated Response</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Encapsulated Response {
  Nonce (Nk),
  AEAD-Protected Response (..),
}
]]></artwork>
      </figure>
      <t>The Nenc and Nk parameters corresponding to the HpkeKdfId can be found in
<xref target="HPKE" format="default"/>.  Nenc refers to the size of the encapsulated KEM shared secret, in
bytes; Nk refers to the size of the AEAD key for the HPKE ciphersuite, in bits.</t>
      <section anchor="request" numbered="true" toc="default">
        <name>Encapsulation of Requests</name>
        <t>Clients encapsulate a request <tt>request</tt> using values from a key configuration:</t>
        <ul spacing="normal">
          <li>the key identifier from the configuration, <tt>keyID</tt>, with the corresponding KEM
identified by <tt>kemID</tt>,</li>
          <li>the public key from the configuration, <tt>pkR</tt>, and</li>
          <li>a selected combination of KDF, identified by <tt>kdfID</tt>, and AEAD, identified by
<tt>aeadID</tt>.</li>
        </ul>
        <t>The client then constructs an encapsulated request, <tt>enc_request</tt>, from a binary
encoded HTTP request, <tt>request</tt>, as follows:</t>
        <ol spacing="normal" type="1"><li>Compute an HPKE context using <tt>pkR</tt> and a label of "message/bhttp request",
yielding <tt>context</tt> and encapsulation key <tt>enc</tt>.</li>
          <li>Construct associated data, <tt>aad</tt>, by concatenating the values of <tt>keyID</tt>,
<tt>kemID</tt>, <tt>kdfID</tt>, and <tt>aeadID</tt>, as one 8-bit integer and three 16-bit
integers, respectively, each in network byte order.</li>
          <li>Encrypt (seal) <tt>request</tt> with <tt>aad</tt> as associated data using <tt>context</tt>,
yielding ciphertext <tt>ct</tt>.</li>
          <li>Concatenate the values of <tt>aad</tt>, <tt>enc</tt>, and <tt>ct</tt>, yielding an Encapsulated
Request <tt>enc_request</tt>.</li>
        </ol>
        <t>Note that <tt>enc</tt> is of fixed-length, so there is no ambiguity in parsing this
structure.</t>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
enc, context = SetupBaseS(pkR, "message/bhttp request")
aad = concat(encode(1, keyID),
             encode(2, kemID),
             encode(2, kdfID),
             encode(2, aeadID))
ct = context.Seal(aad, request)
enc_request = concat(aad, enc, ct)
]]></artwork>
        <t>Servers decrypt an Encapsulated Request by reversing this process. Given an
Encapsulated Request <tt>enc_request</tt>, a server:</t>
        <ol spacing="normal" type="1"><li>
            <t>Parses <tt>enc_request</tt> into <tt>keyID</tt>, <tt>kemID</tt>, <tt>kdfID</tt>, <tt>aeadID</tt>, <tt>enc</tt>, and
<tt>ct</tt> (indicated using the function <tt>parse()</tt> in pseudocode). The server is
then able to find the HPKE private key, <tt>skR</tt>, corresponding to <tt>keyID</tt>.  </t>
            <t>
a. If <tt>keyID</tt> does not identify a key matching the type of <tt>kemID</tt>, the
   server returns an error.  </t>
            <t>
b. If <tt>kdfID</tt> and <tt>aeadID</tt> identify a combination of KDF and AEAD that the
   server is unwilling to use with <tt>skR</tt>, the server returns an error.</t>
          </li>
          <li>Compute an HPKE context using <tt>skR</tt>, a label of "message/bhttp request", and
the encapsulated key <tt>enc</tt>, yielding <tt>context</tt>.</li>
          <li>Construct additional associated data, <tt>aad</tt>, from <tt>keyID</tt>, <tt>kemID</tt>, <tt>kdfID</tt>,
and <tt>aeadID</tt> or as the first seven bytes of <tt>enc_request</tt>.</li>
          <li>Decrypt <tt>ct</tt> using <tt>aad</tt> as associated data, yielding <tt>request</tt> or an error
on failure. If decryption fails, the server returns an error.</li>
        </ol>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
keyID, kemID, kdfID, aeadID, enc, ct = parse(enc_request)
aad = concat(encode(1, keyID),
             encode(2, kemID),
             encode(2, kdfID),
             encode(2, aeadID))
context = SetupBaseR(enc, skR, "message/bhttp request")
request, error = context.Open(aad, ct)
]]></artwork>
      </section>
      <section anchor="response" numbered="true" toc="default">
        <name>Encapsulation of Responses</name>
        <t>Given an HPKE context <tt>context</tt>, a request message <tt>request</tt>, and a response
<tt>response</tt>, servers generate an Encapsulated Response <tt>enc_response</tt> as
follows:</t>
        <ol spacing="normal" type="1"><li>Export a secret <tt>secret</tt> from <tt>context</tt>, using the string "message/bhttp
response" as context.  The length of this secret is <tt>max(Nn, Nk)</tt>, where <tt>Nn</tt>
and <tt>Nk</tt> are the length of AEAD key and nonce associated with <tt>context</tt>.</li>
          <li>Generate a random value of length <tt>max(Nn, Nk)</tt> bytes, called
<tt>response_nonce</tt>.</li>
          <li>Extract a pseudorandom key <tt>prk</tt> using the <tt>Extract</tt> function provided by
the KDF algorithm associated with <tt>context</tt>. The <tt>ikm</tt> input to this
function is <tt>secret</tt>; the <tt>salt</tt> input is the concatenation of <tt>enc</tt> (from
<tt>enc_request</tt>) and <tt>response_nonce</tt></li>
          <li>Use the <tt>Expand</tt> function provided by the same KDF to extract an AEAD key
<tt>key</tt>, of length <tt>Nk</tt> - the length of the keys used by the AEAD associated
with <tt>context</tt>. Generating <tt>key</tt> uses a label of "key".</li>
          <li>Use the same <tt>Expand</tt> function to extract a nonce <tt>nonce</tt> of length <tt>Nn</tt> -
the length of the nonce used by the AEAD. Generating <tt>nonce</tt> uses a label of
"nonce".</li>
          <li>Encrypt <tt>response</tt>, passing the AEAD function Seal the values of <tt>key</tt>,
<tt>nonce</tt>, empty <tt>aad</tt>, and a <tt>pt</tt> input of <tt>request</tt>, which yields <tt>ct</tt>.</li>
          <li>Concatenate <tt>response_nonce</tt> and <tt>ct</tt>, yielding an Encapsulated Response
<tt>enc_response</tt>. Note that <tt>response_nonce</tt> is of fixed-length, so there is no
ambiguity in parsing either <tt>response_nonce</tt> or <tt>ct</tt>.</li>
        </ol>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
secret = context.Export("message/bhttp response", Nk)
response_nonce = random(max(Nn, Nk))
salt = concat(enc, response_nonce)
prk = Extract(salt, secret)
aead_key = Expand(prk, "key", Nk)
aead_nonce = Expand(prk, "nonce", Nn)
ct = Seal(aead_key, aead_nonce, "", response)
enc_response = concat(response_nonce, ct)
]]></artwork>
        <t>Clients decrypt an Encapsulated Request by reversing this process. That is,
they first parse <tt>enc_response</tt> into <tt>response_nonce</tt> and <tt>ct</tt>. They then
follow the same process to derive values for <tt>aead_key</tt> and <tt>aead_nonce</tt>.</t>
        <t>The client uses these values to decrypt <tt>ct</tt> using the Open function provided by
the AEAD. Decrypting might produce an error, as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
reponse, error = Open(aead_key, aead_nonce, "", ct)
]]></artwork>
      </section>
    </section>
    <section anchor="http-usage" numbered="true" toc="default">
      <name>HTTP Usage</name>
      <t>A client interacts with the oblivious proxy resource by constructing an
encapsulated request.  This encapsulated request is included as the content of a
POST request to the oblivious proxy resource.  This request MUST only contain
those fields necessary to carry the encapsulated request: a method of POST, a
target URI of the oblivious proxy resource, a header field containing
the content type (see (<xref target="media-types" format="default"/>), and the encapsulated request as the
request content.  Clients MAY include fields that do not reveal information
about the content of the request, such as Alt-Used <xref target="ALT-SVC" format="default"/>, or
information that it trusts the oblivious proxy resource to remove, such as
fields that are listed in the Connection header field.</t>
      <t>The oblivious proxy resource interacts with the oblivious request resource by
constructing a request using the same restrictions as the client request, except
that the target URI is the oblivious request resource.  The content of this
request is copied from the client.  The oblivious proxy resource MUST NOT add
information about the client to this request.</t>
      <t>When a response is received from the oblivious request resource, the oblivious
proxy resource forwards the response according to the rules of an HTTP proxy;
see <xref section="7.6" sectionFormat="of" target="HTTP" format="default"/>.</t>
      <t>An oblivious request resource, if it receives any response from the oblivious
target resource, sends a single 200 response containing the encapsulated
response.  Like the request from the client, this response MUST only contain
those fields necessary to carry the encapsulated response: a 200 status code, a
header field indicating the content type, and the encapsulated response as the
response content.  As with requests, additional fields MAY be used to convey
information that does not reveal information about the encapsulated response.</t>
      <t>An oblivious request resource acts as a gateway for requests to the oblivious
target resource (see <xref section="7.6" sectionFormat="of" target="HTTP" format="default"/>).  The one exception is that any
information it might forward in a response MUST be encapsulated, unless it is
responding to errors it detects before removing encapsulation of the request;
see <xref target="errors" format="default"/>.</t>
      <section anchor="informational-responses" numbered="true" toc="default">
        <name>Informational Responses</name>
        <t>This encapsulation does not permit progressive processing of responses.  Though
the binary HTTP response format does support the inclusion of informational
(1xx) status codes, the AEAD encapsulation cannot be removed until the entire
message is received.</t>
        <t>In particular, the Expect header field with 100-continue (see Section 10.1.1 of
<xref target="HTTP" format="default"/>) cannot be used.  Clients MUST NOT
construct a request that includes a 100-continue expectation; the oblivious
request resource MUST generate an error if a 100-continue expectation is
received.</t>
      </section>
      <section anchor="errors" numbered="true" toc="default">
        <name>Errors</name>
        <t>A server that receives an invalid message for any reason MUST generate an HTTP
response with a 4xx status code.</t>
        <t>Errors detected by the oblivious proxy resource and errors detected by the
oblivious request resource before removing protection (including being unable to
remove encapsulation for any reason) result in the status code being sent
without protection in response to the POST request made to that resource.</t>
        <t>Errors detected by the oblivious request resource after successfully removing
encapsulation and errors detected by the oblivious target resource MUST be sent
in an encapsulated response.</t>
      </section>
    </section>
    <section anchor="media-types" numbered="true" toc="default">
      <name>Media Types</name>
      <t>Media types are used to identify encapsulated requests and responses.</t>
      <t>Evolution of the format of encapsulated requests and responses is supported
through the definition of new formats that are identified by new media types.</t>
      <section anchor="messageohttp-req-media-type" numbered="true" toc="default">
        <name>message/ohttp-req Media Type</name>
        <t>The "message/ohttp-req" identifies an encapsulated binary HTTP request.  This
is a binary format that is defined in <xref target="request" format="default"/>.</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>message</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>ohttp-req</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>only "8bit" or "binary" is permitted</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>see <xref target="security" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>this specification</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>Magic number(s):</dt>
              <dd>N/A</dd>
              <dt>Deprecated alias names for this type:</dt>
              <dd>N/A</dd>
              <dt>File extension(s):</dt>
              <dd>N/A</dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>N/A</dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IESG</t>
          </dd>
        </dl>
      </section>
      <section anchor="messageohttp-res-media-type" numbered="true" toc="default">
        <name>message/ohttp-res Media Type</name>
        <t>The "message/ohttp-res" identifies an encapsulated binary HTTP response. This
is a binary format that is defined in <xref target="response" format="default"/>.</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>message</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>ohttp-res</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>only "8bit" or "binary" is permitted</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>see <xref target="security" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>this specification</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>Magic number(s):</dt>
              <dd>N/A</dd>
              <dt>Deprecated alias names for this type:</dt>
              <dd>N/A</dd>
              <dt>File extension(s):</dt>
              <dd>N/A</dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>N/A</dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IESG</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>In this design, a client wishes to make a request of a server that is
authoritative for the oblivious target resource. The client wishes to make this
request without linking that request with either:</t>
      <ol spacing="normal" type="1"><li>The identity at the network and transport layer of the client (that is, the
client IP address and TCP or UDP port number the client uses to create a
connection).</li>
        <li>Any other request the client might have made in the past or might make in
the future.</li>
      </ol>
      <t>In order to ensure this, the client selects a proxy (that serves the oblivious
proxy resource) that it trusts will protect this information by forwarding the
encapsulated request and response without passing the server (that serves the
oblivious request resource).</t>
      <t>In this section, a deployment where there are three entities is considered:</t>
      <ul spacing="normal">
        <li>A client makes requests and receives responses</li>
        <li>A proxy operates the oblivious proxy resource</li>
        <li>A server operates both the oblivious request resource and the oblivious
target resource</li>
      </ul>
      <t>To achieve the stated privacy goals, the oblivious proxy resource cannot be
operated by the same entity as the oblivious request resource. However,
colocation of the oblivious request resource and oblivious target resource
simplifies the interactions between those resources without affecting client
privacy.</t>
      <t>As a consequence of this configuration, Oblivious HTTP prevents linkability
described above. Informally, this means:</t>
      <ol spacing="normal" type="1"><li>Requests and responses are known only to clients and targets in possession
of the corresponding response encapsulation key and HPKE keying material.
In particular, the oblivious proxy knows the origin and destination of an
encapsulated request and response, yet does not know the decapsulated
contents. Likewise, targets know only the oblivious request origin, i.e.,
the proxy, and the decapsulated request. Only the client knows both the
plaintext request and response.</li>
        <li>Targets cannot link requests from the same client in the absence of unique
per-client keys.</li>
      </ol>
      <t>Traffic analysis that might affect these properties are outside the scope of
this document; see <xref target="ta" format="default"/>.</t>
      <t>A formal analysis of Oblivious HTTP is in <xref target="OHTTP-ANALYSIS" format="default"/>.</t>
      <section anchor="client-responsibilities" numbered="true" toc="default">
        <name>Client Responsibilities</name>
        <t>Clients MUST ensure that the key configuration they select for generating
encapsulated requests is integrity protected and authenticated so that it can
be attributed to the oblivious request resource; see <xref target="key-configuration" format="default"/>.</t>
        <t>Since clients connect directly to the proxy instead of the target, application
configurations wherein clients make policy decisions about target connections,
e.g., to apply certificate pinning, are incompatible with Oblivious HTTP.  In
such cases, alternative technologies such as HTTP CONNECT
(<xref section="9.3.6" sectionFormat="of" target="HTTP" format="default"/>) can be used. Applications could implement related
policies on key configurations and proxy connections, though these might not
provide the same properties as policies enforced directly on target
connections. When this difference is relevant, applications can instead connect
directly to the target at the cost of either privacy or performance.</t>
        <t>Clients MUST NOT include identifying information in the request that is
encapsulated. Identifying information includes cookies <xref target="COOKIES" format="default"/>,
authentication credentials or tokens, and any information that might reveal
client-specific information such as account credentials.</t>
        <t>Clients cannot carry connection-level state between requests as they only
establish direct connections to the proxy responsible for the oblivious proxy
resource. However, clients need to ensure that they construct requests without
any information gained from previous requests. Otherwise, the server might be
able to use that information to link requests. Cookies <xref target="COOKIES" format="default"/> are
the most obvious feature that MUST NOT be used by clients. However, clients
need to include all information learned from requests, which could include the
identity of resources.</t>
        <t>Clients MUST generate a new HPKE context for every request, using a good source
of entropy (<xref target="RANDOM" format="default"/>) for generating keys. Key reuse not only risks
requests being linked, reuse could expose request and response contents to the
proxy.</t>
        <t>The request the client sends to the oblivious proxy resource only requires
minimal information; see <xref target="http-usage" format="default"/>. The request that carries the
encapsulated request and is sent to the oblivious proxy resource MUST NOT
include identifying information unless the client ensures that this information
is removed by the proxy. A client MAY include information only for the
oblivious proxy resource in header fields identified by the Connection header
field if it trusts the proxy to remove these as required by Section 7.6.1 of
<xref target="HTTP" format="default"/>. The client needs to trust that the proxy does not replicate the
source addressing information in the request it forwards.</t>
        <t>Clients rely on the oblivious proxy resource to forward encapsulated requests
and responses. However, the proxy can only refuse to forward messages, it
cannot inspect or modify the contents of encapsulated requests or responses.</t>
      </section>
      <section anchor="proxy-responsibilities" numbered="true" toc="default">
        <name>Proxy Responsibilities</name>
        <t>The proxy that serves the oblivious proxy resource has a very simple function
to perform. For each request it receives, it makes a request of the oblivious
request resource that includes the same content. When it receives a response,
it sends a response to the client that includes the content of the response
from the oblivious request resource. When generating a request, the proxy MUST
follow the forwarding rules in <xref section="7.6" sectionFormat="of" target="HTTP" format="default"/>.</t>
        <t>A proxy can also generate responses, though it assumed to not be able to
examine the content of a request (other than to observe the choice of key
identifier, KDF, and AEAD), so it is also assumed that it cannot generate an
encapsulated response.</t>
        <t>A proxy MUST NOT add information about the client identity when forwarding
requests. This includes the Via field, the Forwarded field
<xref target="FORWARDED" format="default"/>, and any similar information.  A client does not depend
on the proxy using an authenticated and encrypted connection to the oblivious
request resource, only that information about the client not be attached to
forwarded requests.</t>
        <section anchor="dos" numbered="true" toc="default">
          <name>Denial of Service</name>
          <t>As there are privacy benefits from having a large rate of requests forwarded by
the same proxy (see <xref target="ta" format="default"/>), servers that operate the oblivious request
resource might need an arrangement with proxies. This arrangement might be
necessary to prevent having the large volume of requests being classified as an
attack by the server.</t>
          <t>If a server accepts a larger volume of requests from a proxy, it needs to
trust that the proxy does not allow abusive levels of request volumes from
clients. That is, if a server allows requests from the proxy to be exempt from
rate limits, the server might want to ensure that the proxy applies a rate
limiting policy that is acceptable to the server.</t>
          <t>Servers that enter into an agreement with a proxy that enables a higher request
rate might choose to authenticate the proxy to enable the higher rate.</t>
        </section>
        <section anchor="ta" numbered="true" toc="default">
          <name>Linkability Through Traffic Analysis</name>
          <t>As the time at which encapsulated request or response messages are sent can
reveal information to a network observer. Though messages exchanged between the
oblivious proxy resource and the oblivious request resource might be sent in a
single connection, traffic analysis could be used to match messages that are
forwarded by the proxy.</t>
          <t>A proxy could, as part of its function, add delays in order to increase the
anonymity set into which each message is attributed. This could latency to the
overall time clients take to receive a response, which might not be what some
clients want.</t>
          <t>A proxy can use padding to reduce the effectiveness of traffic analysis.
Padding is a capability provided by binary HTTP messages; see <xref section="3.8" sectionFormat="of" target="BINARY" format="default"/>.</t>
          <t>A proxy that forwards large volumes of exchanges can provide better privacy by
providing larger sets of messages that need to be matched.</t>
        </section>
      </section>
      <section anchor="server-responsibilities" numbered="true" toc="default">
        <name>Server Responsibilities</name>
        <t>A server that operates both oblivious request and oblivious target resources is
responsible for removing request encapsulation, generating a response the
encapsulated request, and encapsulating the response.</t>
        <t>Servers should account for traffic analysis based on response size or generation
time.  Techniques such as padding or timing delays can help protect against such
attacks; see <xref target="ta" format="default"/>.</t>
        <t>If separate entities provide the oblivious request resource and oblivious target
resource, these entities might need an arrangement similar to that between
server and proxy for managing denial of service; see <xref target="dos" format="default"/>. It is also
necessary to provide confidentiality protection for the unprotected requests and
responses, plus protections for traffic analysis; see <xref target="ta" format="default"/>.</t>
        <t>An oblivious request resource needs to have a plan for replacing keys. This
might include regular replacement of keys, which can be assigned new key
identifiers. If an oblivious request resource receives a request that contains a
key identifier that it does not understand or that corresponds to a key that has
been replaced, the server can respond with an HTTP 422 (Unprocessable Content)
status code.</t>
        <t>A server can also use a 422 status code if the server has a key that corresponds
to the key identifier, but the encapsulated request cannot be successfully
decrypted using the key.</t>
        <t>A server MUST ensure that the HPKE keys it uses are not valid for any other
protocol that uses HPKE with the "message/bhttp request" label.  Designers of
protocols that reuse this encapsulation format, especially new versions of this
protocol, can ensure key diversity by choosing a different label in their use of
HPKE.  The "message/bhttp response" label was chosen for symmetry only as it
provides key diversity only within the HPKE context created using the
"message/bhttp request" label; see <xref target="repurposing-the-encapsulation-format" format="default"/>.</t>
        <t>A server is responsible for either rejecting replayed requests or ensuring that
the effect of replays does not adversely affect clients or resources; see
<xref target="replay" format="default"/>.</t>
      </section>
      <section anchor="replay" numbered="true" toc="default">
        <name>Replay Attacks</name>
        <t>Encapsulated requests can be copied and replayed by the oblivious proxy
resource. The design of oblivious HTTP does not assume that the oblivious proxy
resource will not replay requests. In addition, if a client sends an
encapsulated request in TLS early data (see <xref section="8" sectionFormat="of" target="TLS" format="default"/> and
<xref target="RFC8470" format="default"/>), a network-based adversary might be able to cause the request to
be replayed. In both cases, the effect of a replay attack and the mitigations
that might be employed are similar to TLS early data.</t>
        <t>A client or oblivious proxy resource MUST NOT automatically attempt to retry a
failed request unless it receives a positive signal indicating that the request
was not processed or forwarded. The HTTP/2 REFUSED_STREAM error code (Section
8.1.4 of <xref target="RFC7540" format="default"/>), the HTTP/3 H3_REQUEST_REJECTED error code (Section 8.1
of <xref target="QUIC-HTTP" format="default"/>), or a GOAWAY frame with a low enough
identifier (in either protocol version) are all sufficient signals that no
processing occurred. Connection failures or interruptions are not sufficient
signals that no processing occurred.</t>
        <t>The anti-replay mechanisms described in <xref section="8" sectionFormat="of" target="TLS" format="default"/> are generally
applicable to oblivious HTTP requests. The encapsulated keying material (or
<tt>enc</tt>) can be used in place of a nonce to uniquely identify a request.  This
value is a high-entropy value that is freshly generated for every request, so
two valid requests will have different values with overwhelming probability.</t>
        <t>The mechanism used in TLS for managing differences in client and server clocks
cannot be used as it depends on being able to observe previous interactions.
Oblivious HTTP explicitly prevents such linkability.</t>
        <t>The considerations in <xref target="RFC8470" format="default"/> as they relate to managing the risk of
replay also apply, though there is no option to delay the processing of a
request.</t>
        <t>Limiting requests to those with safe methods might not be satisfactory for some
applications, particularly those that involve the submission of data to a
server. The use of idempotent methods might be of some use in managing replay
risk, though it is important to recognize that different idempotent requests
can be combined to be not idempotent.</t>
        <t>Even without replay prevention, the server-chosen <tt>response_nonce</tt> field
ensures that responses have unique AEAD keys and nonces even when requests are
replayed.</t>
        <section anchor="use-of-date-for-anti-replay" numbered="true" toc="default">
          <name>Use of Date for Anti-Replay</name>
          <t>Clients SHOULD include a <tt>Date</tt> header field in encapsulated requests.  Though
HTTP requests often do not include a <tt>Date</tt> header field, the value of this
field might be used by a server to limit the amount of requests it needs to
track when preventing replays.</t>
          <t>A server can maintain state for requests for a small window of time over which
it wishes to accept requests.  The server then rejects requests if the request
is the same as one that was previously answered within that time window.
Servers can reject requests outside of this window and signal that clients might
retry with a different <tt>Date</tt> header field; see <xref section="4" sectionFormat="of" target="REQUEST-DATE" format="default"/>.
Servers can identify duplicate requests using the encapsulation (<tt>enc</tt>) value.</t>
          <t>Servers SHOULD allow for the time it takes requests to arrive from the client,
with a time window that is large enough to allow for differences in the clock of
clients and servers.  How large a time window is needed could depend on the
population of clients that the server needs to serve.</t>
          <t>Servers MUST NOT treat the time window as secret information. An attacker can
actively probe the server with specially crafted request timestamps to determine
the time window over which the server will accept responses.</t>
          <t><xref target="REQUEST-DATE" format="default"/> contains further
considerations for the use of the <tt>Date</tt> request header field.  This includes
the way in which clients might correct for clock skew and the privacy
considerations arising from that usage.  Servers that reject requests on the
basis of the <tt>Date</tt> request header field SHOULD implement the feedback mechanism
in <xref section="4" sectionFormat="of" target="REQUEST-DATE" format="default"/> to support clock correction by clients.</t>
        </section>
      </section>
      <section anchor="post-compromise-security" numbered="true" toc="default">
        <name>Post-Compromise Security</name>
        <t>This design does not provide post-compromise security for responses.</t>
        <t>A client only needs to retain keying material that might be used compromise the
confidentiality and integrity of a response until that response is consumed, so
there is negligible risk associated with a client compromise.</t>
        <t>A server retains a secret key that might be used to remove protection from
messages over much longer periods. A server compromise that provided access to
the oblivious request resource secret key could allow an attacker to recover the
plaintext of all requests sent toward affected keys and all of the responses
that were generated.</t>
        <t>Even if server keys are compromised, an adversary cannot access messages
exchanged by the client with the oblivious proxy resource as messages are
protected by TLS.  Use of a compromised key also requires that the oblivious
proxy resource cooperate with the attacker or that the attacker is able to
compromise these TLS connections.</t>
        <t>The total number of affected messages affected by server key compromise can be
limited by regular rotation of server keys.</t>
      </section>
    </section>
    <section anchor="privacy" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>One goal of this design is that independent client requests are only linkable by
the chosen key configuration. The oblivious proxy and request resources can link
requests using the same key configuration by matching KeyConfig.key_id, or, if
the oblivious target resource is willing to use trial decryption, a limited set
of key configurations that share an identifier. An oblivious proxy can link
requests using the public key corresponding to KeyConfig.key_id.</t>
      <t>Request resources are capable of linking requests depending on how KeyConfigs
are produced by servers and discovered by clients. Specifically, servers can
maliciously construct key configurations to track individual clients. A specific
method for a client to acquire key configurations is not included in this
specification. Clients need to consider these tracking vectors when choosing a
discovery method.  Applications using this design should provide accommodations
to mitigate tracking using key configurations.
<xref target="CONSISTENCY" format="default"/> provides an analysis of the options
for ensuring the key configurations are consistent between different clients.</t>
    </section>
    <section anchor="deployment" numbered="true" toc="default">
      <name>Operational and Deployment Considerations</name>
      <t>This section discusses various operational and deployment considerations.</t>
      <section anchor="performance-overhead" numbered="true" toc="default">
        <name>Performance Overhead</name>
        <t>Using Oblivious HTTP adds both cryptographic and latency to requests relative to
a simple HTTP request-response exchange.  Deploying proxy services that are on
path between clients and servers avoids adding significant additional delay due
to network topology.  A study of a similar system <xref target="ODoH" format="default"/> found that deploying
proxies close to servers was most effective in minimizing additional latency.</t>
      </section>
      <section anchor="proxy-state" numbered="true" toc="default">
        <name>Resource Mappings</name>
        <t>This protocol assumes a fixed, one-to-one mapping between the Oblivious Proxy 
Resource and the Oblivious Request Resource. This means that any encapsulated 
request sent to the Oblivious Proxy Resource will always be forwarded to the 
Oblivious Request Resource. This constraint was imposed to simplify proxy 
configuration and mitigate against the Oblivious Proxy Resource being used as 
a generic proxy for unknown Oblivious Request Resources. The proxy will only 
forward for Oblivious Request Resources that it has explicitly configured and 
allowed.</t>
        <t>It is possible for a server to be configured with multiple Oblivious
Proxy Resources, each for a different Oblivious Request Resource as needed.</t>
      </section>
      <section anchor="network-management" numbered="true" toc="default">
        <name>Network Management</name>
        <t>Oblivious HTTP might be incompatible with network interception regimes, such as
those that rely on configuring clients with trust anchors and intercepting TLS
connections.  While TLS might be intercepted successfully, interception
middleboxes devices might not receive updates that would allow Oblivious HTTP to
be correctly identified using the media types defined in <xref target="media-types" format="default"/>.</t>
        <t>Oblivious HTTP has a simple key management design that is not trivially altered
to enable interception by intermediaries.  Clients that are configured to enable
interception might choose to disable Oblivious HTTP in order to ensure that
content is accessible to middleboxes.</t>
      </section>
    </section>
    <section anchor="repurposing-the-encapsulation-format" numbered="true" toc="default">
      <name>Repurposing the Encapsulation Format</name>
      <t>The encapsulated payload of an OHTTP request and response is a binary HTTP
message <xref target="BINARY" format="default"/>. Client and target agree on this encapsulated payload type by
specifying the media type "message/bhttp" in the HPKE encapsulation info string
and HPKE export context string for request and response encapsulation,
respectively.</t>
      <t>Future specifications may repurpose the encapsulation mechanism described in
<xref target="hpke-encapsulation" format="default"/>, provided that the content type of the encapsulated
payload is appropriately reflected in the HPKE info and context strings. For
example, if a future specification were to use the encapsulation mechanism in
this specification for DNS messages, identified by the "application/dns-message"
media type, then the HPKE info string SHOULD be "application/dns-message
request" for request encapsulation, and the HPKE export context string should be
"application/dns-message response" for response encapsulation.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>Please update the "Media Types" registry at
<eref target="https://www.iana.org/assignments/media-types">https://www.iana.org/assignments/media-types</eref> with the registration information
in <xref target="media-types" format="default"/> for the media types "message/ohttp-req", "message/ohttp-res",
and "application/ohttp-keys".</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BINARY">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="February" year="2022"/>
            <abstract>
              <t>   This document defines a binary format for representing HTTP messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-binary-message-01"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="Roy T. Fielding">
              <organization>Adobe</organization>
            </author>
            <author fullname="Mark Nottingham">
              <organization>Fastly</organization>
            </author>
            <author fullname="Julian Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <date day="12" month="September" year="2021"/>
            <abstract>
              <t>   The Hypertext Transfer Protocol (HTTP) is a stateless application-
   level protocol for distributed, collaborative, hypertext information
   systems.  This document describes the overall architecture of HTTP,
   establishes common terminology, and defines aspects of the protocol
   that are shared by all versions.  In this definition are core
   protocol elements, extensibility mechanisms, and the "http" and
   "https" Uniform Resource Identifier (URI) schemes.

   This document updates RFC 3864 and obsoletes RFC 2818, RFC 7231, RFC
   7232, RFC 7233, RFC 7235, RFC 7538, RFC 7615, RFC 7694, and portions
   of RFC 7230.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
        </reference>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="TLS">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="HPKE">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard L. Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthik Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="September" year="2021"/>
            <abstract>
              <t>   This document describes a scheme for hybrid public-key encryption
   (HPKE).  This scheme provides a variant of public-key encryption of
   arbitrary-sized plaintexts for a recipient public key.  It also
   includes three authenticated variants, including one which
   authenticates possession of a pre-shared key, and two optional ones
   which authenticate possession of a KEM private key.  HPKE works for
   any combination of an asymmetric key encapsulation mechanism (KEM),
   key derivation function (KDF), and authenticated encryption with
   additional data (AEAD) encryption function.  Some authenticated
   variants may not be supported by all KEMs.  We provide instantiations
   of the scheme using widely used and efficient primitives, such as
   Elliptic Curve Diffie-Hellman key agreement, HKDF, and SHA2.

   This document is a product of the Crypto Forum Research Group (CFRG)
   in the IRTF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hpke-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8470">
          <front>
            <title>Using Early Data in HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="W. Tarreau" initials="W." surname="Tarreau">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>Using TLS early data creates an exposure to the possibility of a replay attack.  This document defines mechanisms that allow clients to communicate with servers about HTTP requests that are sent in early data.  Techniques are described that use these mechanisms to mitigate the risk of replay.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8470"/>
          <seriesInfo name="DOI" value="10.17487/RFC8470"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe">
              <organization/>
            </author>
            <author fullname="R. Peon" initials="R." surname="Peon">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="QUIC-HTTP">
          <front>
            <title>Hypertext Transfer Protocol Version 3 (HTTP/3)</title>
            <author fullname="Mike Bishop">
              <organization>Akamai</organization>
            </author>
            <date day="2" month="February" year="2021"/>
            <abstract>
              <t>   The QUIC transport protocol has several features that are desirable
   in a transport for HTTP, such as stream multiplexing, per-stream flow
   control, and low-latency connection establishment.  This document
   describes a mapping of HTTP semantics over QUIC.  This document also
   identifies HTTP/2 features that are subsumed by QUIC, and describes
   how HTTP/2 extensions can be ported to HTTP/3.

DO NOT DEPLOY THIS VERSION OF HTTP

   DO NOT DEPLOY THIS VERSION OF HTTP/3 UNTIL IT IS IN AN RFC.  This
   version is still a work in progress.  For trial deployments, please
   use earlier versions.

Note to Readers

   Discussion of this draft takes place on the QUIC working group
   mailing list (quic@ietf.org), which is archived at
   https://mailarchive.ietf.org/arch/search/?email_list=quic.

   Working Group information can be found at https://github.com/quicwg;
   source code and issues list for this draft can be found at
   https://github.com/quicwg/base-drafts/labels/-http.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-quic-http-34"/>
        </reference>
        <reference anchor="REQUEST-DATE">
          <front>
            <title>Using The Date Header Field In HTTP Requests</title>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="8" month="February" year="2022"/>
            <abstract>
              <t>   HTTP clients rarely make use of the Date header field when making
   requests.  This document describes considerations for using the Date
   header field in requests.  A method is described for correcting
   erroneous in Date request header fields that might arise from
   differences in client and server clocks.  The risks of applying that
   correction technique are discussed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-thomson-httpapi-date-requests-00"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Dingledine2004" target="https://svn.torproject.org/svn/projects/design-paper/tor-design.html">
          <front>
            <title>Tor: The Second-Generation Onion Router</title>
            <author initials="R." surname="Dingledine">
              <organization/>
            </author>
            <author initials="N." surname="Mathewson">
              <organization/>
            </author>
            <author initials="P." surname="Syverson">
              <organization/>
            </author>
            <date year="2004" month="August"/>
          </front>
        </reference>
        <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
          <front>
            <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
            <author initials="H." surname="Corrigan-Gibbs">
              <organization/>
            </author>
            <author initials="D." surname="Boneh">
              <organization/>
            </author>
            <date year="2017" month="March" day="14"/>
          </front>
        </reference>
        <reference anchor="ODoH" target="https://www.petsymposium.org/2021/files/papers/issue4/popets-2021-0085.pdf">
          <front>
            <title>Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS</title>
            <author fullname="Sudheesh Singanamalla">
              <organization/>
            </author>
            <author fullname="Suphanat Chunhapanya">
              <organization/>
            </author>
            <author fullname="Marek Vavrusa">
              <organization/>
            </author>
            <author fullname="Tanya Verma">
              <organization/>
            </author>
            <author fullname="Peter Wu">
              <organization/>
            </author>
            <author fullname="Marwan Fayed">
              <organization/>
            </author>
            <author fullname="Kurtis Heimerl">
              <organization/>
            </author>
            <author fullname="Nick Sullivan">
              <organization/>
            </author>
            <author fullname="Christopher A. Wood">
              <organization/>
            </author>
            <date year="2021" month="January" day="07"/>
          </front>
        </reference>
        <reference anchor="OHTTP-ANALYSIS" target="https://github.com/cloudflare/ohttp-analysis">
          <front>
            <title>Tamarin Model of Oblivious HTTP</title>
            <author fullname="Jonathan Hoyland">
              <organization/>
            </author>
            <date year="2021" month="August" day="23"/>
          </front>
        </reference>
        <reference anchor="RFC6265">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol.  Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet.  This document obsoletes RFC 2965.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="ALT-SVC">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="COOKIES">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol.  Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet.  This document obsoletes RFC 2965.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
        <reference anchor="RANDOM">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
              <organization/>
            </author>
            <author fullname="J. Schiller" initials="J." surname="Schiller">
              <organization/>
            </author>
            <author fullname="S. Crocker" initials="S." surname="Crocker">
              <organization/>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="FORWARDED">
          <front>
            <title>Forwarded HTTP Extension</title>
            <author fullname="A. Petersson" initials="A." surname="Petersson">
              <organization/>
            </author>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document defines an HTTP extension header field that allows proxy components to disclose information lost in the proxying process, for example, the originating IP address of a request or IP address of the proxy on the user-agent-facing interface.  In a path of proxying components, this makes it possible to arrange it so that each subsequent component will have access to, for example, all IP addresses used in the chain of proxied HTTP requests.</t>
              <t>This document also specifies guidelines for a proxy administrator to anonymize the origin of a request.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7239"/>
          <seriesInfo name="DOI" value="10.17487/RFC7239"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="19" month="August" year="2021"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-key-consistency-01"/>
        </reference>
        <reference anchor="X25519">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="ODOH">
          <front>
            <title>Oblivious DNS Over HTTPS</title>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tanya Verma">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="31" month="January" year="2022"/>
            <abstract>
              <t>   This document describes a protocol that allows clients to hide their
   IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS
   (DoH) messages.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

   This experimental protocol is developed outside the IETF and is
   published here to guide implementation, ensure interoperability among
   implementations, and enable wide-scale experimentation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-10"/>
        </reference>
      </references>
    </references>
    <section anchor="complete-example-of-a-request-and-response" numbered="true" toc="default">
      <name>Complete Example of a Request and Response</name>
      <!-- Generated using ohttp (https://github.com/martinthomson/ohttp):
RUST_LOG=ohttp cargo test -\-features rust-hpke,client,server -\-no-default-features -p ohttp -\-lib -\- -\-nocapture request_response
-->

<t>A single request and response exchange is shown here. Binary values (key
configuration, secret keys, the content of messages, and intermediate values)
are shown in hexadecimal. The request and response here are absolutely minimal;
the purpose of this example is to show the cryptographic operations.</t>
      <t>The oblivious request resource generates a key pair. In this example the server
chooses DHKEM(X25519, HKDF-SHA256) and generates an X25519 key pair
<xref target="X25519" format="default"/>. The X25519 secret key is:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
b8f3cea0da634e6b8271f5b8f931d266decdd04c8e09b80cb9878ea90086ed4a
]]></artwork>
      <t>The oblivious request resource constructs a key configuration that includes the
corresponding public key as follows:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
01002076eae6d5a6c1549a3343d31c0b9b9582470c72ca11607d47f005f8c16b
e3304a00080001000100010003
]]></artwork>
      <t>This key configuration is somehow obtained by the client. Then when a client
wishes to send an HTTP request of a GET request to <tt>https://example.com</tt>, it
constructs the following binary HTTP message:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
00034745540568747470730b6578616d706c652e636f6d012f
]]></artwork>
      <t>The client then reads the oblivious request resource key configuration and
selects a mutually supported KDF and AEAD. In this example, the client selects
HKDF-SHA256 and AES-128-GCM. The client then generates an HPKE context that
uses the server public key. This context is constructed from the following
ephemeral public key:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
25845c6ed6802abfd09628b5c677842b10dd53a3aad5775aa3c20cbae1c0cb65
]]></artwork>
      <t>The corresponding private key is:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
88894d1fb4e76e215d9d9c87c44d9e0a6053c1c84c836a4106ea547344504658
]]></artwork>
      <t>Applying the Seal operation from the HPKE context produces an encrypted
message, allowing the client to construct the following encapsulated request:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
010020000100012485c2eee03135aac82e572d51639b2e141102c431d544e346
0a0784a908b41b676943ae0b3ed8eff581ee8be5f47303a314de092e2e27e3f0
2a03b9357de1d414cadacabaa1621cf9
]]></artwork>
      <t>The client then sends this to the oblivious proxy resource in a POST request,
which might look like the following HTTP/1.1 request:</t>
      <sourcecode type="http-message"><![CDATA[
POST /request.example.net/proxy HTTP/1.1
Host: proxy.example.org
Content-Type: message/ohttp-req
Content-Length: 78

<content is the encapsulated request above>
]]></sourcecode>
      <t>The oblivious proxy resource receives this request and forwards it to the
oblivious request resource, which might look like:</t>
      <sourcecode type="http-message"><![CDATA[
POST /oblivious/request HTTP/1.1
Host: example.com
Content-Type: message/ohttp-req
Content-Length: 78

<content is the encapsulated request above>
]]></sourcecode>
      <t>The oblivous request resource receives this request, selects the key it
generated previously using the key identifier from the message, and decrypts
the message. As this request is directed to the same server, the oblivious
request resource does not need to initiate an HTTP request to the oblivious
target resource. The request can be served directly by the oblivious target
resource, which generates a minimal response (consisting of just a 200 status
code) as follows:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
0140c8
]]></artwork>
      <t>The response is constructed by extracting a secret from the HPKE context:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
50030a0eacaa9c020e60390c573c4f80
]]></artwork>
      <t>The key derivation for the encapsulated response uses both the encapsulated KEM
key from the request and a randomly selected nonce. This produces a salt of:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
2485c2eee03135aac82e572d51639b2e141102c431d544e3460a0784a908b41b
e29f9834fd61ffa27f494dfea94d9ed5
]]></artwork>
      <t>The salt and secret are both passed to the Extract function of the selected KDF
(HKDF-SHA256) to produce a pseudorandom key of:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
4fd8939221446411c785dc9dc51a196df43646a7791919248d0c7624c9410e5b
]]></artwork>
      <t>The pseudorandom key is used with the Expand function of the KDF and an info
field of "key" to produce a 16-byte key for the selected AEAD (AES-128-GCM):</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
a0cd40e2e68cd500bfd14275b290f337
]]></artwork>
      <t>With the same KDF and pseudorandom key, an info field of "nonce" is used to
generate a 12-byte nonce:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
86883bbe97a380ec2fa656f7
]]></artwork>
      <t>The AEAD Seal function is then used to encrypt the response, which is added
to the randomized nonce value to produce the encapsulated response:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
e29f9834fd61ffa27f494dfea94d9ed543d89abe34977e7d6d5e1d8051e7b3ba
4ff234
]]></artwork>
      <t>The oblivious request resource then constructs a response:</t>
      <sourcecode type="http-message"><![CDATA[
HTTP/1.1 200 OK
Date: Wed, 27 Jan 2021 04:45:07 GMT
Cache-Control: private, no-store
Content-Type: message/ohttp-res
Content-Length: 38

<content is the encapsulated response>
]]></sourcecode>
      <t>The same response might then be generated by the oblivious proxy resource which
might change as little as the Date header. The client is then able to use the
HPKE context it created and the nonce from the encapsulated response to
construct the AEAD key and nonce and decrypt the response.</t>
    </section>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>This design is based on a design for oblivious DoH, described in
<xref target="ODOH" format="default"/>. David Benjamin and Eric Rescorla made
technical contributions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
