<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pardue-httpbis-preconnect-hint-svc-param-00" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title>A Preconnect Hint for SVCB/HTTPS RR</title>
    <seriesInfo name="Internet-Draft" value="draft-pardue-httpbis-preconnect-hint-svc-param-00"/>
    <author fullname="Lucas Pardue">
      <organization/>
      <address>
        <email>lucaspardue.24.7@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="24"/>
    <area>Applications and Real-Time</area>
    <workgroup>HTTP</workgroup>
    <abstract>
      <t>HTTP resources from one origin often have relationships to resources on other
origins. This document outlines how a "preconnectHint" SvcParamKey for SVCB,
could be used to provide an early indication of origins that are related to the
current origin. Clients could use this information to opportunistically prepare
and open connections, with the expectation that they will be used to fetch
related resources. This mechanism provides information from a source that is not
the authenticated origin, which could cause the client to perform actions that
no other party would ask them to do; privacy considerations due to this are
visited.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://LPardue.github.io/draft-pardue-httpbis-preconnect-hint-svc-param/draft-pardue-httpbis-preconnect-hint-svc-param.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-pardue-httpbis-preconnect-hint-svc-param/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP Working Group mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/LPardue/draft-pardue-httpbis-related-origins"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP resources from one origin often have relationships to resources on other
origins. For example, when a user agent loads the main HTML document of a
webpage from one one origin, it can discover critical dependencies at additional
first-party or third-party origins. In order to fetch these resources,
additional connections might be required. The additional time required to
establish new connections can inflate the perceived latency of rendering or
using resources.</t>
      <t>In some cases, a server may be authoritative for several origins. HTTP/2
<xref target="RFC9113"/> and HTTP/3 <xref target="RFC9114"/> allow clients to coalesce different origins
onto the same connection when certain conditions are met. The ORIGIN frame
(<xref target="RFC8336"/> and <xref target="I-D.ietf-httpbis-origin-h3"/>) enhances this further. These
techniques can help minimize perceived latency by eliminating connection setup
time entirely, but they apply only for the subset of origins that can safely be
coalesced.</t>
      <t>The 103 (Early Hints) status code <xref target="RFC8297"/> can convey hints about resource
relationships. A server can emit interim responses to help the client start
making preparations, such as creating new connections. This is especially useful
when the origin might take time to generate the final response. Where related
resources reside on third-party origins, this technique helps minimize perceived
latency by providing the client with information as early as possible in the
HTTP message exchange. Thus it fills a capability gap left by coalescing.
However, the technique is dependent on the timing of message exchanges, which
might might make it difficult to achieve performance gains in practice.</t>
      <t>It is common for a web page to fetch resources from a fairly stable set of
additional origins, even if the specific resource paths are more volatile. For
example, a page may be designed to load scripts from third-party resource CDNs,
or images from content sub-domains under the same top-level origin. User agents
can only learn of these relationships once a resource has been fetched. This
"run-time learning" of stable relationships delays the time at which a client
discovers it might need to create additional connections. Between fetching a
resource and learning its dependencies, here is an opportunity to reduce
performance delays caused by the delayed run-time learning of these
relationships, even in light of the techniques described above.</t>
      <t>This document defines the "preconnectHint" SvcParamKey for SVCB
<xref target="I-D.ietf-dnsop-svcb-https"/>, to indicate origins that are related to the
current origin. Clients that query HTTPS RRs can use the information contained
in this parameter to opportunistically prepare and open connections, with the
expectation that they will be used to fetch related resources. This could
include chaining DNS queries for the hinted origins. Preconnect origins might
satisfy the conditions required for HTTP connection coalescing, in which case
the optimization could still reduce the delay before clients perform
coalescing-related checks; for example, certificate fetching or validation.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="preconnectHint-param">
      <name>The preconnectHint SvcParamKey</name>
      <t>SVCB and HTTPS Resource Records can include the <tt>preconnectHint</tt> SvcParamKey to
indicate related origins. Its presentation format value is a comma-separated
list of <tt>&lt;domain-name&gt;</tt> (<xref section="5.1" sectionFormat="of" target="RFC1035"/>).</t>
      <t>For example, consider the resource at <tt>https://example.org/index.html</tt> that has
the dependencies <tt>https://www.example.com/style.css</tt>, and
<tt>https://scripts.example.org/script.js</tt>. As an
HTTPS RR, the relationship between example.org and other origins could be
represented as:</t>
      <artwork><![CDATA[
example.org IN HTTPS 1 . alpn=h2,h3 preconnectHint=www.example.com,scripts.example.org
]]></artwork>
      <t>A common pattern in HTTP is to use 3xx redirect status codes to move from <tt>www</tt>
subdomains to domain apexes. Building on the previous example, if
<tt>www.example.com</tt> were intended to be redirected to <tt>example.com</tt>, this could be
represented in an additional RR as:</t>
      <artwork><![CDATA[
www.example.com IN HTTPS 1 . alpn=h2,h2 preconnectHint=example.com
]]></artwork>
      <t>Clients that learn about preconnect origins <bcp14>MAY</bcp14> use this information to make
whatever preparations they deem fit. For instance, they could use it to perform
the same connection coalescing authority checks (<xref target="RFC9113"/> and <xref target="RFC9114"/>)
that would otherwise happen later in a connection lifecycle. Similarly, they
could use this information to help maintain a connection pool and, where needed,
proactively create or keep open connections to those origins in anticipation of
being used.</t>
      <t>There are new privacy considerations to make when using any preconnect origin
information provided via the DNS. The records are presented by resolvers that
act on behalf of, but are not authoritative for, the origin. As such, the
resolvers could present unauthenticated information that could cause a client to
take actions that the authenticated origin would not. This could be abused to
leak information about the client. A malicious resolver could also abuse this
mechanism unbeknownst to the origin.</t>
      <t>The <tt>preconnectHint</tt> SvcParamKey is a hint and could contain stale, incorrect or
superfluous information. A client <bcp14>SHOULD</bcp14> implement checks and heuristics that
limit state or resource commitment based on this information. For example, a
client could track how often preconnect origins are matched to related
resources. Notably, the scope of relationships is at the origin level, not any
other component that might later comprise a URI that is to be fetched. As such,
constraining the set of values in the <tt>preconnectHint</tt> parameter, to those that
are most likely to be used by a client, can help avoid commitment of resources
that might subsequently go unused.</t>
      <t>Knowledge of HTTP resource relationships might be restricted to authorized
clients. Exposing those origins as a <tt>preconnectHint</tt> to unauthorised DNS
clients could leak confidential or sensitive information. Therefore, the
<tt>preconnectHint</tt> SvcParmKey <bcp14>SHOULD NOT</bcp14> contain origins that relate to
information that would otherwise only be accessible to authorized clients.</t>
    </section>
    <section anchor="security-and-privacy-considerations">
      <name>Security and Privacy Considerations</name>
      <t>Information about origin relationships is typically presented by the
authenticated origin itself. Delegating this information to an unauthenticated
and untrusted DNS resolver provides opportunities to manipulate client
behaviour, which could risk privacy problems; see <xref target="preconnectHint-param"/>.</t>
      <t>The preconnectHint parameter reveals information about the relationships
of resources hosted on a server. While this information is typically already
available to any client that visits the server, some resources may only be
discoverable by authorized clients. Guidance for managing this is given in
<xref target="preconnectHint-param"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-dnsop-svcb-https">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration and keys for encrypting the TLS ClientHello).
   They also enable aliasing of apex domains, which is not possible with
   CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP [HTTP].
   By providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-11"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9113">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="RFC9114">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment.  This document describes a mapping of HTTP semantics over QUIC.  This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="RFC8336">
          <front>
            <title>The ORIGIN HTTP/2 Frame</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="E. Nygren" initials="E." surname="Nygren">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies the ORIGIN frame for HTTP/2, to indicate what origins are available on a given connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8336"/>
          <seriesInfo name="DOI" value="10.17487/RFC8336"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-origin-h3">
          <front>
            <title>The ORIGIN Extension in HTTP/3</title>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai</organization>
            </author>
            <date day="5" month="October" year="2022"/>
            <abstract>
              <t>   The ORIGIN frame for HTTP/2 is equally applicable to HTTP/3, but
   needs to be separately registered.  This document describes the
   ORIGIN frame for HTTP/3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-origin-h3-01"/>
        </reference>
        <reference anchor="RFC8297">
          <front>
            <title>An HTTP Status Code for Indicating Hints</title>
            <author fullname="K. Oku" initials="K." surname="Oku">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>This memo introduces an informational HTTP status code that can be used to convey hints that help a client make preparations for processing the final response.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8297"/>
          <seriesInfo name="DOI" value="10.17487/RFC8297"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on one of the options described by Barry Pollard's <eref target="https://docs.google.com/document/d/1ApILvaFpZPGx6NkqhPvlqni6kTaWfcY6xSEuXg8XdiA/edit#heading=h.fxvrme9c9xpm">"Even
earlier connection
hints"</eref>
proposal presented to the Web Perf WG at TPAC 2022.</t>
      <t>Ben Schwartz suggested the name <tt>preconnectHint</tt>.</t>
      <t>Thanks to Chris Wood for a providing insight into the privacy implications of
this design.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
