<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-webbotauth-use-cases-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="webbotauth usecases">Use Cases for Authentication of Web Bots</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-webbotauth-use-cases-01"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Melbourne</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 33?>

<t>This draft outlines use cases for authentication for bot clients on the Web.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-webbotauth-use-cases/"/>.
      </t>
      <t>
         information can be found at <eref target="https://mnot.github.io/I-D/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/I-D/labels/webbotauth-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 37?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Web Bot Auth (WebBotAuth) Working Group has been chartered to "standardize methods for cryptographically authenticating automated clients and providing additional information about their operators to Web sites."</t>
      <t>Initial discussions in the group have revealed some disagreement about the scope and intent of the work. <xref target="site-usecase"/> explores the use cases for authentication of non-browser clients, to help inform those discussions. <xref target="next"/> suggests some further questions for consideration.</t>
    </section>
    <section anchor="site-usecase">
      <name>Web Site Use Cases</name>
      <t>This section explores use cases that Web sites might have for authenticating bots, including a discussion of any current mechanisms that they use to meet the use case.</t>
      <t>Because there is some question about the "additional information" facility in the charter, each use case also assesses whether it's necessary to identify a real-world entity associated with the bot to meet the use case (since that is the most common use of such a facility).</t>
      <t>Each use case also summarises how controversial addressing it is perceived to be.</t>
      <t>This draft does not take a position on whether all of the use cases should be addressed by the group. Potential alternative solutions to the implied requirements are also not considered here.</t>
      <section anchor="abuse">
        <name>Mitigating Volumetric Abuse by Bots</name>
        <t>Some bots make requests at rates that cause operational issues for Web sites. This may be intentional (e.g., traffic from "botnets" and other attacks) or unintentional (due to overly simple or inconsiderate implementation). It appears that both the number of such bots and the rate at which they make requests are increasing.</t>
        <t>While sites can take measures to mitigate the impact of this traffic (e.g., caching), these are only partially effective; some resources are uncacheable, and generating representations of some HTTP resources can incur much higher costs. In general, serving such great volumes of traffic can consume significant resources, in terms of both infrastructure and bandwidth.</t>
        <t>Currently, a site that experiences such traffic most often blocks unwelcome clients by IP address. This has the effect of blocking other uses of that IP address, both at that time and into the indefinite future. It also offers little recourse for incorrectly blocked clients, since they have no information about why they were blocked or what they should do about it.</t>
        <t>This use case does not require identifying a specific bot or associating it with a real-world entity, provided that the site considers abusiveness a feature of behaviour, not identity. It also does not require discriminating between bots and non-bot users; only the problematic behaviour is targeted.</t>
        <t>Addressing this use case does not appear to be overly controversial, because it is widely recognised that a site needs to operate with reasonable efficiency to provide both its operators and its users a benefit.</t>
      </section>
      <section anchor="access">
        <name>Controlling Access by Bots</name>
        <t>Some sites wish to make access by bots to the resources they provided to browsers conditional upon the identity or features of the bot. This might be for a variety of reasons; they may wish to:</t>
        <ul spacing="normal">
          <li>
            <t>Only allow access by bots on an allow list;</t>
          </li>
          <li>
            <t>Disallow access to bots on an explicit deny list;</t>
          </li>
          <li>
            <t>Condition access upon meeting some criteria (e.g., non-profit, certification by a third party);</t>
          </li>
          <li>
            <t>Condition access upon participation in some scheme or protocol (e.g., payment for access);</t>
          </li>
        </ul>
        <t>Note that the first two imply some notion of bots being tied to a real-world identity, whereas the remaining do not necessarily require it.</t>
        <t>Currently, sites most often use a combination of the Robots Exclusion Protocol (including robots.txt) and IP address blocking to control access by bots.</t>
        <t>The Robots Exclusion Protocol provides a means for sites to communicate preferences to bots about their behaviour. Although this is a useful and sometimes necessary function, it does not allow for enforcement of those preferences.</t>
        <t>Enforcement is achieved primarily through blocking non-conforming clients. The limitations of IP address blocking are discussed in <xref target="abuse"/>.</t>
        <t>This use case has been disputed. While blocking certain bots by IP address is widespread in practice, concerns have been expressed that standardising an authentication mechanism for bots might result in a Web where all bots might need to authenticate, leading to increased difficulty in introducing new bots. In some markets, this outcome could create pressure towards centralisation, due to heightened barriers to entry.</t>
        <t>Another controversy is that giving sites a more fine-grained capability to block bots is a change in the balance of power on the Web. Some perceive that as justified, given factors like the introduction of AI and what they perceive as an onslaught of bot traffic. Others see it as an overreach that may impinge upon users' ability to consume content as they desire -- for example, using accessibility or agentic tools.</t>
        <t>Finally, some see bots as a way of keeping powerful sites in check, and therefore measures to curtail their activity is portrayed as concentrating that power. However, it should be noted that there are also powerful bots that can be seen to have disproportionate power over sites, and so there is not necessarily a clear bias here.</t>
      </section>
      <section anchor="content">
        <name>Providing Different Content to Bots</name>
        <t>Somes sites may wish to tailor the content they serve to bots (either selectively or overall), as compared to that they serve to browsers. In some cases, a site might wish to augment the information that they provide to a trusted bot. Conversely, a site might wish to reduce or modify the information that they provide to a bot that they do not trust.</t>
        <t>Current practice is difficult to ascertain, but anecdotal evidence suggests that the latter case is more common than the former. For example, some sites do not wish for information that they consider to be commercially sensitive -- e.g., prices -- to be available to bots. In both cases, IP addresses and similar heuristics are used.</t>
        <t>In most cases, this use requires identifying a specific bot and associating it with a real-world entity (although there are exceptions, such as sites which want to treat all bots equally, or cases where it's possible to group bots without identifying specific ones).</t>
        <t>This use case is likely to be controversial in cases where the modifications are not consensual. Some espouse a site's right to control its own speech depending upon the audience it is speaking to, whereas others are concerned by the lack of transparency that might result -- particularly from powerful sites. Note, however, that a bot that cannot be distinguished from a typical browser is still likely to be able to operate for such purposes.</t>
      </section>
      <section anchor="audit">
        <name>Auditing Bot Behaviour</name>
        <t>Some sites may wish to understand how bots use them in detail. In particular, they might want to verify that a bot adheres to the preferences stated in robots.txt, or that they conform to some other protocol. They might also wish to have reliable metrics for how a bot behaves in terms of number of requests, timing of requests, and so forth to ascertain the bot's behaviour; this information might feed into other use cases, or be used independently.</t>
        <t>Currently, this use case is met through use of heuristics of information like IP address. It does not necessarily require identifying a specific bot or associating it with a real-world entity, but some (many?) of the downstream uses of the audit data may.</t>
        <t>This use case does not appear controversial, because bots being accountable for their behaviour is broadly seen as a reasonable goal.</t>
      </section>
      <section anchor="classify">
        <name>Classifying Traffic</name>
        <t>Many sites make efforts to understand how browsers interact with them, so as to improve their services. This might be at the connection level (e.g., HTTP, TCP, and QUIC statistics), or it might be gathered in-browser (Real User Monitoring or RUM).</t>
        <t>When doing so, it is important for them to be able to distinguish between their target audience (people using browsers) and bots; if they cannot, the bot traffic will make the insights they gain less useful (or even useless).</t>
        <t>Currently, sites that perform such tasks use a variety of heuristics to identify and exclude bots from such measures. This is only partially effective; bots are increasingly difficult to classify, particularly as using 'headless browsers' becomes a norm for crawlers.</t>
        <t>This use case does not require identifying specific bots or associating them with real-world entities unless finer granularity of classification than "bot vs not" is desired. However, sites that wish to exclude non-human clients from their measurements would still need to use heuristics for bots that do not comply with the norm.</t>
        <t>Addressing this use case does not appear to be controversial, because an understanding of the nature of traffic that a site receives is important to its operation (provided that no personal information is involved and no tracking capability is introduced).</t>
      </section>
      <section anchor="services">
        <name>Authenticating Site Services</name>
        <t>Many sites use third-party tools to analyse, monitor, and provide their services. For example, health check services allow sites to understand their uptimes and receive notifications when there is a problem. Content Delivery Networks need to identify themselves to back-end origin servers.</t>
        <t>Currently, such services use a variety of means of authentication, including IP address allow lists, "magic" header fields, and ad hoc use of other existing mechanisms.</t>
        <t>Site services often have higher requirements for reliability and security. A site might not wish to grant access to a vulnerability scanner solely based upon its IP address, for example. Likewise, a health check needs to reliably bypass Web Application Firewalls to perform its function.</t>
        <t>This use case requires bot identity to be tied to authentication.</t>
        <t>Addressing this use case does not appear to be controversial. However, it is not clear whether these use cases are within the scope of the Working Group's charter.</t>
      </section>
    </section>
    <section anchor="next">
      <name>Next Steps</name>
      <t>This section suggests questions for further investigation and discussion.</t>
      <ol spacing="normal" type="1"><li>
          <t>What are the qualitative differences between current practice (e.g. ad hoc blocking by IP address) and proposals for authentication of bots?</t>
        </li>
        <li>
          <t>User authentication is widespread and standards-supported on the Web; what makes bot authentication different?</t>
        </li>
        <li>
          <t>What levers do we have to mitigate the harms associated with an emerging default of requiring authentication for bots? Does authentication enhance or confound such efforts (as opposed to IP address blocking)?</t>
        </li>
        <li>
          <t>Would an authentication scheme that does not allow association with real-world entities provide enough value to meet interesting use cases? If so, would the charter prohibition on "[t]racking or assigning reputation to particular bots" need to change?</t>
        </li>
        <li>
          <t>What is the threshold for being considered a bot? E.g., is request rate important? Associating with a specific human user in time and/or space?</t>
        </li>
        <li>
          <t>Are the resource requirements for authentication proposals reasonable for these use cases for all types of sites? At the meeting, it was asserted that it would disproportionately advantage already well-resourced entities.</t>
        </li>
        <li>
          <t>What use cases should the group address and not address? Why?</t>
        </li>
        <li>
          <t>Are there alternative approaches to addressing some or all of these use cases? What properties do they have?</t>
        </li>
      </ol>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no actions for IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Undoubtedly there are security considerations to any authentication protocol, but they will be encountered and dealt with later than what's in scope for this draft.</t>
    </section>
  </middle>
  <back>
    <?line 163?>

<section anchor="bots">
      <name>Bot Differences</name>
      <t>This section enumerates some of the ways that bots can differ.</t>
      <section anchor="scope">
        <name>Scope</name>
        <t>Bots have different scopes of activity:</t>
        <ul spacing="normal">
          <li>
            <t>Some crawl the entire Web</t>
          </li>
          <li>
            <t>Some target a specific subset of the Web (e.g., by geography, language, industry)</t>
          </li>
          <li>
            <t>Some target specific sites or resources on sites (e.g., link checkers, linters)</t>
          </li>
        </ul>
      </section>
      <section anchor="relationship">
        <name>Relationship</name>
        <t>Bots have different relationships with sites:</t>
        <ul spacing="normal">
          <li>
            <t>Some actively attempt to appear as Web browsers, so as to have the same relationship as an end user</t>
          </li>
          <li>
            <t>Some do not hide their nature as bots but do not have any pre-existing relationship with the site</t>
          </li>
          <li>
            <t>Some are implicitly or explicitly authorised by the site (e.g., through an advertised API)</t>
          </li>
          <li>
            <t>Some have a pre-existing relationship with the site (e.g., monitoring and other site services)</t>
          </li>
        </ul>
      </section>
      <section anchor="reputation">
        <name>Reputation</name>
        <t>Bots have different reputations in the larger community, which can change how they are perceived by sites:</t>
        <ul spacing="normal">
          <li>
            <t>Some are well and widely-known (e.g., search engine crawlers, archivers)</t>
          </li>
          <li>
            <t>Some are relatively unknown (e.g., due to low traffic or recent introduction)</t>
          </li>
          <li>
            <t>Some are purposefully anonymous (e.g., price checkers, most malicious bots)</t>
          </li>
        </ul>
      </section>
      <section anchor="agency">
        <name>Agency</name>
        <t>Bots act with different relationships to their operator(s):</t>
        <ul spacing="normal">
          <li>
            <t>Some are explicitly and exclusively associated with an end user (e.g., "agentic" bots)</t>
          </li>
          <li>
            <t>Some are acting on behalf of a group of end users</t>
          </li>
          <li>
            <t>Some are acting on behalf of another entity (e.g., corporation, government, civil society organisation)</t>
          </li>
          <li>
            <t>Some serve multiple constituencies</t>
          </li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
