<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-webbotauth-use-cases-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="webbotauth usecases">Use Cases for Cryptographic Authentication of Web Bots</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-webbotauth-use-cases-00"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Melbourne</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 33?>

<t>This draft outlines use cases for cryptographic authentication for bot clients on the Web.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-webbotauth-use-cases/"/>.
      </t>
      <t>
         information can be found at <eref target="https://mnot.github.io/I-D/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/I-D/labels/webbotauth-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 37?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Web Bot Auth (WebBotAuth) Working Group has been chartered to "standardize methods for cryptographically authenticating automated clients and providing additional information about their operators to Web sites."</t>
      <t>Initial discussions in the group have revealed some disagreement about the scope and intent of the work. <xref target="site-usecase"/> explores the use cases for cryptographic authentication of non-browser clients, to help inform those discussions. <xref target="next"/> suggests some further questions for consideration.</t>
    </section>
    <section anchor="site-usecase">
      <name>Web Site Use Cases</name>
      <t>This section explores use cases that Web sites might have for authenticating bots, including a discussion of any current mechanisms that they use to meet the use case and how cryptographic authentication might help.</t>
      <t>Because there is some question about the "additional information" facility in the charter, each use case also assesses whether it's necessary to identify a real-world entity associated with the bot to meet the use case (since that is the most common use of such a facility).</t>
      <t>Each use case also summarises how controversial addressing it is perceived to be.</t>
      <t>This draft does not take a position on whether all of the use cases should be addressed by the group. Potential alternative solutions to the implied requirements are also not considered here.</t>
      <section anchor="abuse">
        <name>Mitigating Volumetric Abuse by Bots</name>
        <t>Some bots make requests at rates that cause operational issues for Web sites. This may be intentional (e.g., traffic from "botnets" and other attacks) or unintentional (due to overly simple or inconsiderate implementation). It appears that both the number of such bots and the rate at which they make requests are increasing.</t>
        <t>While sites can take measures to mitigate the impact of this traffic (e.g., caching), these are only partially effective; some resources are uncacheable, and generating representations of some HTTP resources can incur much higher costs. In general, serving such great volumes of traffic can consume significant resources, in terms of both infrastructure and bandwidth.</t>
        <t>Currently, a site that experiences such traffic most often blocks unwelcome clients by IP address. This has the effect of blocking other uses of that IP address, both at that time and into the indefinite future. It also offers little recourse for incorrectly blocked clients, since they have no information about why they were blocked or what they should do about it.</t>
        <t>Cryptographic authentication of bots could allow a site that experiences abusive traffic to allow those automated clients that are authenticated and well-behaved, blocking any from the remaining who make more requests than a Web browser conceivably could. Unlike IP-based blocking, cryptographic authentication is specific to the bot itself, limiting harmful effects to other users of the IP address (either concurrently or in the future). Because it is performed at the application layer, it gives the opportunity to convey additional information to the client (e.g., in a HTTP 403 or 429 response).</t>
        <t>This use case does not require identifying a specific bot or associating it with a real-world entity, provided that the site considers abusiveness a feature of behaviour, not identity. It also does not require discriminating between bots and non-bot users; only the problematic behaviour is targeted.</t>
        <t>Addressing this use case does not appear to be overly controversial, because it is widely recognised that a site needs to operate with reasonable efficiency to provide both its operators and its users a benefit.</t>
      </section>
      <section anchor="access">
        <name>Controlling Access by Bots</name>
        <t>Some sites wish to make access by bots to the resources they provided to browsers conditional upon the identity or features of the bot. This might be for a variety of reasons; they may wish to:</t>
        <ul spacing="normal">
          <li>
            <t>Only allow access by bots on an allow list;</t>
          </li>
          <li>
            <t>Disallow access to bots on an explicit deny list;</t>
          </li>
          <li>
            <t>Condition access upon meeting some criteria (e.g., non-profit, certification by a third party);</t>
          </li>
          <li>
            <t>Condition access upon participation in some scheme or protocol (e.g., payment for access);</t>
          </li>
        </ul>
        <t>Note that the first two imply some notion of bots being tied to a real-world identity, whereas the remaining do not necessarily require it.</t>
        <t>Currently, sites most often use a combination of the Robots Exclusion Protocol (including robots.txt) and IP address blocking to control access by bots.</t>
        <t>The Robots Exclusion Protocol provides a means for sites to communicate preferences to bots about their behaviour. Although this is a useful and sometimes necessary function, it does not allow for enforcement of those preferences.</t>
        <t>Enforcement is achieved primarily through blocking non-conforming clients. The limitations of IP address blocking are discussed in <xref target="abuse"/>.</t>
        <t>Cryptographic authentication of bots could allow for greater certainty in access control than is possible using IP addresses. It would also allow for more definite tying of roles to actors in protocols (e.g., in the Robots Exclusion Protocol and in any potential payment protocol).</t>
        <t>This use case has been disputed. While blocking certain bots by IP address is widespread in practice, concerns have been expressed that standardising an authentication mechanism for bots might result in a Web where all bots might need to authenticate, leading to increased difficulty in introducing new bots. In some markets, this outcome could create pressure towards centralisation, due to heightened barriers to entry.</t>
        <t>Another controversy is that giving sites a more fine-grained capability to block bots is a change in the balance of power on the Web. Some perceive that as justified, given factors like the introduction of AI and what they perceive as an onslaught of bot traffic. Others see it as an overreach that may impinge upon users' ability to consume content as they desire -- for example, using accessibility or agentic tools.</t>
        <t>Finally, some see bots as a way of keeping powerful sites in check, and therefore measures to curtail their activity is portrayed as concentrating that power. However, it should be noted that there are also powerful bots that can be seen to have disproportionate power over sites, and so there is not necessarily a clear bias here.</t>
      </section>
      <section anchor="content">
        <name>Providing Different Content to Bots</name>
        <t>Somes sites may wish to tailor the content they serve to bots (either selectively or overall), as compared to that they serve to browsers. In some cases, a site might wish to augment the information that they provide to a trusted bot. Conversely, a site might wish to reduce or modify the information that they provide to a bot that they do not trust.</t>
        <t>Current practice is difficult to ascertain, but anecdotal evidence suggests that the latter case is more common than the former. For example, some sites do not wish for information that they consider to be commercially sensitive -- e.g., prices -- to be available to bots. In both cases, IP addresses and similar heuristics are used.</t>
        <t>Cryptographic authentication of bots could enable such discrimination in a manner much more reliable than using other techniques (such as IP addresses), provided that it also allowed identification of individual bots.</t>
        <t>In most cases, this use requires identifying a specific bot and associating it with a real-world entity (although there are exceptions, such as sites which want to treat all bots equally, or cases where it's possible to group bots without identifying specific ones).</t>
        <t>This use case is likely to be controversial in cases where the modifications are not consensual. Some espouse a site's right to control its own speech depending upon the audience it is speaking to, whereas others are concerned by the lack of transparency that might result -- particularly from powerful sites. Note, however, that a bot that cannot be distinguished from a typical browser is still likely to be able to operate for such purposes.</t>
      </section>
      <section anchor="audit">
        <name>Auditing Bot Behaviour</name>
        <t>Some sites may wish to understand how bots use them in detail. In particular, they might want to verify that a particular bot adheres to the preferences stated in robots.txt, or that they conform to some other protocol. They might also wish to have reliable metrics for how a bot behaves in terms of number of requests, timing of requests, and so forth to ascertain the bot's behaviour; this information might feed into other use cases, or be used independently.</t>
        <t>Currently, this use case is met through use of heuristics of information like IP address.</t>
        <t>Cryptographic authentication of bots could allow more accurate and reliable auditing of bot behaviour, due to the greater confidence it provides. It does not necessarily require identifying a specific bot or associating it with a real-world entity, but some (many?) of the downstream uses of the audit data may.</t>
        <t>This use case does not appear controversial, because bots being accountable for their behaviour is broadly seen as a reasonable goal.</t>
      </section>
      <section anchor="classify">
        <name>Classifying Traffic</name>
        <t>Many sites make efforts to understand how browsers interact with them, so as to improve their services. This might be at the connection level (e.g., HTTP, TCP, and QUIC statistics), or it might be gathered in-browser (Real User Monitoring or RUM).</t>
        <t>When doing so, it is important for them to be able to distinguish between their target audience (people using browsers) and bots; if they cannot, the bot traffic will make the insights they gain less useful (or even useless).</t>
        <t>Currently, sites that perform such tasks use a variety of heuristics to identify and exclude bots from such measures. This is only partially effective; bots are increasingly difficult to classify, particularly as using 'headless browsers' becomes a norm for crawlers.</t>
        <t>Cryptographic authentication could be an aid to classification if it becomes a norm for bots to use it. It does not require identifying specific bots or associating them with real-world entities unless finer granularity of classification than "bot vs not" is desired. However, sites that wish to exclude non-human clients from their measurements would still need to use heuristics for bots that do not comply with the norm.</t>
        <t>Addressing this use case does not appear to be controversial, because an understanding of the nature of traffic that a site receives is important to its operation (provided that no personal information is involved and no tracking capability is introduced).</t>
      </section>
      <section anchor="services">
        <name>Site Services</name>
        <t>Many sites use third-party tools to analyse, monitor, and provide their services. For example, health check services allow sites to understand their uptimes and receive notifications when there is a problem. Content Delivery Networks need to identify themselves to back-end origin servers.</t>
        <t>Currently, such services use a variety of means of authentication, including IP address allow lists, "magic" header fields, and ad hoc use of existing cryptographic mechanisms.</t>
        <t>Site services often have higher requirements for reliability and security. A site might not wish to grant access to a vulnerability scanner solely based upon its IP address, for example. Likewise, a health check needs to reliably bypass Web Application Firewalls to perform its function.</t>
        <t>A standard cryptographic authentication mechanism for bots could improve security and reliability, and provide greater certainty in the face of operational changes (e.g., changes to the bot's IP addresses). This use case requires bot identity to be tied to authentication.</t>
        <t>Addressing this use case does not appear to be controversial. However, it is not clear whether these use cases are within the scope of the Working Group's charter.</t>
      </section>
    </section>
    <section anchor="next">
      <name>Next Steps</name>
      <t>This section suggests questions for further investigation and discussion.</t>
      <ol spacing="normal" type="1"><li>
          <t>What are the qualitative differences between current practice (e.g. ad hoc blocking by IP address) and cryptographic authentication of bots?</t>
        </li>
        <li>
          <t>User authentication is widespread and standards-supported on the Web; what makes bot authentication different?</t>
        </li>
        <li>
          <t>What levers do we have to mitigate the harms associated with an emerging default of requiring authentication for bots? Does cryptographic authentication enhance or confound such efforts (as opposed to IP address blocking)?</t>
        </li>
        <li>
          <t>Would a cryptographic authentication scheme that does not allow association with real-world entities provide enough value to meet interesting use cases? If so, would the charter prohibition on "[t]racking or assigning reputation to particular bots" need to change?</t>
        </li>
        <li>
          <t>What is the threshold for being considered a bot? E.g., is request rate important? Associating with a specific human user in time and/or space?</t>
        </li>
        <li>
          <t>Are the resource requirements for cryptographic authentication reasonable for these use cases for all types of sites? At the meeting, it was asserted that it would disproportionately advantage already well-resourced entities.</t>
        </li>
        <li>
          <t>What use cases should the group address and not address? Why?</t>
        </li>
        <li>
          <t>Are there alternative approaches to addressing some or all of these use cases? What properties do they have?</t>
        </li>
      </ol>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no actions for IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Undoubtedly there are security considerations to a cryptographic authentication protocol, but they will be encountered and dealt with later than what's in scope for this draft.</t>
    </section>
  </middle>
  <back>
    <?line 171?>

<section anchor="bots">
      <name>Bot Differences</name>
      <t>This section enumerates some of the ways that bots can differ.</t>
      <section anchor="scope">
        <name>Scope</name>
        <t>Bots have different scopes of activity:</t>
        <ul spacing="normal">
          <li>
            <t>Some crawl the entire Web</t>
          </li>
          <li>
            <t>Some target a specific subset of the Web (e.g., by geography, language, industry)</t>
          </li>
          <li>
            <t>Some target specific sites or resources on sites (e.g., link checkers, linters)</t>
          </li>
        </ul>
      </section>
      <section anchor="relationship">
        <name>Relationship</name>
        <t>Bots have different relationships with sites:</t>
        <ul spacing="normal">
          <li>
            <t>Some actively attempt to appear as Web browsers, so as to have the same relationship as an end user</t>
          </li>
          <li>
            <t>Some do not hide their nature as bots but do not have any pre-existing relationship with the site</t>
          </li>
          <li>
            <t>Some are implicitly or explicitly authorised by the site (e.g., through an advertised API)</t>
          </li>
          <li>
            <t>Some have a pre-existing relationship with the site (e.g., monitoring and other site services)</t>
          </li>
        </ul>
      </section>
      <section anchor="reputation">
        <name>Reputation</name>
        <t>Bots have different reputations in the larger community, which can change how they are perceived by sites:</t>
        <ul spacing="normal">
          <li>
            <t>Some are well and widely-known (e.g., search engine crawlers, archivers)</t>
          </li>
          <li>
            <t>Some are relatively unknown (e.g., due to low traffic or recent introduction)</t>
          </li>
          <li>
            <t>Some are purposefully anonymous (e.g., price checkers, most malicious bots)</t>
          </li>
        </ul>
      </section>
      <section anchor="agency">
        <name>Agency</name>
        <t>Bots act with different relationships to their operator(s):</t>
        <ul spacing="normal">
          <li>
            <t>Some are explicitly and exclusively associated with an end user (e.g., "agentic" bots)</t>
          </li>
          <li>
            <t>Some are acting on behalf of a group of end users</t>
          </li>
          <li>
            <t>Some are acting on behalf of another entity (e.g., corporation, government, civil society organisation)</t>
          </li>
          <li>
            <t>Some serve multiple constituencies</t>
          </li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
