<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sahib-httpbis-off-the-record-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="OTR">The Off-The-Record Response Header Field</title>
    <seriesInfo name="Internet-Draft" value="draft-sahib-httpbis-off-the-record-00"/>
    <author fullname="Shivan Kaul Sahib">
      <organization>Brave Software</organization>
      <address>
        <email>shivankaulsahib@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="05"/>
    <area>Applications and Real-Time</area>
    <workgroup>HTTP</workgroup>
    <abstract>
      <?line 58?>

<t>This document specifies an HTTP response header field that enables a server to inform the client that the requested website should be treated as "off-the-record." The purpose is to indicate that the server considers the content sensitive in some way, and the client may choose not to retain any record of accessing it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://brave-experiments.github.io/draft-sahib-httpbis-off-the-record/#go.draft-sahib-httpbis-off-the-record.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sahib-httpbis-off-the-record/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP Working Group mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/brave-experiments/draft-sahib-httpbis-off-the-record"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Browsers record information about users' browsing behavior and interests, both explicitly (e.g. browsing history, DOM storage, cookies) and implicitly (e.g. cache state, saved credentials, URL auto-complete). In situations where an attacker has physical access to the victim's device, this information constitutes a privacy leak and can be used for surveillance. This kind of physical access is especially common in cases of intimate partner violence <xref target="IPV"/>. Client software currently provide some tools to help users hide their activity on sensitive sites, such as incognito/private mode or the ability to edit browsing history. However, these tools are insufficient to protect people whose safety depends on it: they either hide too much (thus inviting suspicion from abusers), too little (thus allowing abusers to recover browsing history), or are otherwise difficult to use successfully in a stressful situation.</t>
      <t>The <tt>Request-OTR</tt> HTTP response header described in this document allows websites to classify their own content as "sensitive" and request to be treated as "off-the-record." The client can then choose to not record the site visit and remove evidence of the site visit by preventing persistent storage of related data to disk (such as <xref target="COOKIES"/>). See <xref target="comparison"/> for a comparison with other approaches a client can take to remove evidence of accessing a sensitive website.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The following terminology is used throughout the document:</t>
      <ul spacing="normal">
        <li>
          <tt>UI-bound adversary</tt>: An attacker who has authenticated access to a victim's device via standard user interfaces <xref target="FREED_ET_AL"/>.</li>
        <li>
          <tt>registered domain</tt>: Also known as "effective top level domain + 1" or "eTLD+1", an origin's "registered domain" is the origin's host's public suffix plus the label to its left, with the term "public suffix" being defined in a note in <xref section="5.3" sectionFormat="comma" target="RFC6265"/> as "a domain that is controlled by a public registry" <xref target="PSL"/>.</li>
        <li>
          <tt>sensitive</tt>: This document uses "sensitive" content to mean anything that a website thinks is worth hiding from a UI-bound adversary. Websites self-report their content as sensitive.</li>
        <li>
          <tt>client</tt>: Software acting on behalf of users, typically a Web browser.</li>
        <li>
          <tt>Off-the-record (OTR)</tt>: Client operation mode where the client tries to not record or persist state or evidence of having visited a a particular site (see <xref target="otr-client-mode"/>).</li>
        <li>
          <tt>OTR session</tt>: A client is said to be in an OTR session for a site when it is treating interactions with the site as being off-the-record. The scope of an OTR session is the site's registered domain.</li>
      </ul>
      <t>This document uses the following terminology from Section 3 of <xref target="RFC8941"/> to specify syntax and parsing: Boolean.</t>
    </section>
    <section anchor="header">
      <name>Request-OTR Response Header</name>
      <section anchor="definition">
        <name>Definition</name>
        <t>Request-OTR is an Item Structured Header <xref target="RFC8941"/>. Its value <bcp14>MUST</bcp14> be a Boolean <xref section="3.3.6" sectionFormat="comma" target="RFC8941"/>. Its ABNF is:</t>
        <artwork><![CDATA[
Request-OTR: sf-boolean
]]></artwork>
        <t>For example:</t>
        <artwork><![CDATA[
Request-OTR: ?1
]]></artwork>
      </section>
      <section anchor="operation">
        <name>Operation</name>
        <t>The Request-OTR response header field is used to indicate that the client <bcp14>SHOULD</bcp14> treat the site as sensitive and not keep traces of the user having visited the site. See <xref target="otr-client-mode"/> for details on considerations and protections a client can use in an OTR session.</t>
        <t>The scope of the OTR session is defined as the requesting site's registered domain. Sites request an Off-The-Record session by including the <tt>Request-OTR</tt> header in the initial navigation request. On receiving this header, a client <bcp14>MAY</bcp14> ask for the user's consent before initiating an OTR session for the site (see <xref target="consent"/>).</t>
        <t>A header field value of <tt>?0</tt> i.e. false is treated as if the header was not present.</t>
        <!-- TODO: can a site opt-out of OTR mode? how does it stop being in OTR mode? -->

<!-- TODO: If the client is already in an OTR session for the site when it receives the `Request-OTR` header for the same site, the client SHOULD use the same session; optionally, a client MAY create a new OTR session for a site after a timeout.
 -->

</section>
    </section>
    <section anchor="otr-client-mode">
      <name>Off-The-Record Session</name>
      <t>The main purpose of an OTR session is to not persist the user's interactions with the site. A client can apply a number of protections and mitigations in order to achieve this:</t>
      <ol spacing="normal" type="1"><li>Construct a new, empty, temporary storage area for the site for explicit (cookies, localStorage) and implicit storage (caches, autocomplete) attached to the OTR session. Every site in OTR mode should get its own temporary storage.</li>
        <li>Prevent browser extensions from running in the OTR session.</li>
        <li>Users are notified before they navigate away from the site (and thus away from the OTR session).</li>
      </ol>
    </section>
    <section anchor="comparison">
      <name>Comparisons With Other Client-Side Approaches</name>
      <section anchor="private-browsing">
        <name>Private Browsing</name>
        <t>Many web browsers come with a private browsing mode, also known as incognito mode. Private windows enable users to browse the internet without their browsing activity being recorded locally. However, private browsing has limitations when it comes to protecting users from on-device surveillance. It is easy to forget to open a private window before visiting a site, especially when experiencing stress, resulting in the site visit being permanently recorded. Similarly, forgetting to close the private window may lead to unintended browsing in private mode beyond the target sensitive site. This can alert potential abusers to the use of private browsing, as the absence of browsing history may raise suspicion or put the victim at further risk.</t>
      </section>
      <section anchor="manual-editing">
        <name>Manual Editing</name>
        <t>Certain browsers provide advanced controls that allow users to manually delete browser storage for specific sites. This approach requires performing the deletion after visiting the site, rather than protecting the user during the visit. This can put the user at risk if the browser needs to be closed quickly. Furthermore, these controls are often challenging to locate and even more difficult for non-technical users to use correctly. Additionally, these browser controls typically only allow the user to delete specific stored data for the site, such as cookies or permissions, but do not provide the ability to remove other traces of the site, like browsing history or caches.</t>
      </section>
      <section anchor="clear-site-data">
        <name>Clear-Site-Data</name>
        <t><tt>Clear-Site-Data</tt> HTTP response header (<xref target="CLEAR_SITE_DATA"/>) lets websites ask a user agent to clear specific kinds of locally stored data. As noted in Section 6.1 of <xref target="CLEAR_SITE_DATA"/>, Clear-Site-Data acts after the fact, meaning the user agent retains data until the website requests its removal. In contrast, Request-OTR takes a preventative approach, where the client avoids storing data once it receives the header. Furthermore, with Clear-Site-Data, it is the website that defines which data should be cleared, not the client, which may leave the user exposed to identifying storage that the website may have overlooked. It's important to note that Clear-Site-Data does not provide a means to clear browser history; it only addresses web-visible storage.</t>
        <!-- # Deployment Considerations

## User Experience

## Proxies -->

</section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="navigation-history">
        <name>Navigation History</name>
        <t>OTR mode only applies to the specific site requesting OTR mode. Notably, a user might have taken certain actions before getting to the sensitive site which would reveal the identity of the website. For example: a user looking for reproductive health centers near them would search for "reproductive health centers" on a search engine before navigating to a website that requests OTR mode; the browsing history would reveal the user's intentions. Request-OTR would only conceal activity on the site, not the navigation history leading up to it.</t>
      </section>
      <section anchor="malicious-websites">
        <name>Malicious Websites</name>
        <t>Malicious websites could exacerbate harm by abusing this feature to hide traces of malicious activity. For instance, a malware website could use OTR mode as a means to conceal the download of malware onto the user's device.</t>
      </section>
      <section anchor="consent">
        <name>Consent</name>
        <t>To address the issue of malicious websites misusing OTR mode, one possible solution is to get the user's consent before enabling this mode. However, it's important to recognize that placing the responsibility of detecting and preventing abuse on clients can be challenging. Detecting malicious intent and ensuring appropriate consent can be complex tasks.</t>
      </section>
      <section anchor="doesnt-protect-against-the-website">
        <name>Doesn't Protect Against the Website</name>
        <t>OTR mode is not a privacy protection against the website operating in OTR mode. It simply treats the website as sensitive and prevents persistent storage of the site's contents on the client.</t>
      </section>
      <section anchor="third-parties-on-websites">
        <name>Third Parties on Websites</name>
        <t>Third-party trackers on websites services may still collect and retain data, even if the primary website is operating in OTR mode.</t>
      </section>
      <section anchor="only-applicable-for-ui-bound-attackers">
        <name>Only Applicable for UI-bound Attackers</name>
        <t>OTR mode is explicitly used to provide protection against UI-bound attackers who snoop local storage and browsing history. Sophisticated attackers could install local monitoring software on the device, or intercept and modify network traffic between the client and server, bypassing OTR mode's protections.</t>
      </section>
      <section anchor="fingerprinting">
        <name>Fingerprinting</name>
        <t>A site <bcp14>MUST NOT</bcp14> be able to tell that a client is in OTR mode.</t>
      </section>
      <section anchor="self-identification-as-sensitive">
        <name>Self-Identification as Sensitive</name>
        <t>A censor could leverage this feature to conduct measurement studies aimed at identifying and subsequently banning websites that respond with the Request-OTR header.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8941">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P-H. Kamp" surname="P-H. Kamp"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields that wish to use a common syntax that is more restrictive than traditional HTTP field values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8941"/>
          <seriesInfo name="DOI" value="10.17487/RFC8941"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="FREED_ET_AL" target="https://dl.acm.org/doi/pdf/10.1145/3173574.3174241">
          <front>
            <title>“A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology</title>
            <author initials="D." surname="Freed">
              <organization/>
            </author>
            <author initials="J." surname="Palmer">
              <organization/>
            </author>
            <author initials="D." surname="Minchala">
              <organization/>
            </author>
            <author initials="K." surname="Levy">
              <organization/>
            </author>
            <author initials="T." surname="Ristenpart">
              <organization/>
            </author>
            <author initials="N." surname="Dell">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="PSL" target="https://publicsuffix.org/">
          <front>
            <title>Public Suffix List</title>
            <author initials="" surname="Mozilla">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CLEAR_SITE_DATA" target="https://www.w3.org/TR/clear-site-data/">
          <front>
            <title>Clear Site Data - W3C Working Draft, 30 November 2017</title>
            <author initials="M." surname="West">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IPV">
          <front>
            <title>Intimate Partner Violence Digital Considerations</title>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave</organization>
            </author>
            <author fullname="Juliana Guerra" initials="J." surname="Guerra">
              <organization>Derechos Digitales</organization>
            </author>
            <author fullname="Mallory Knodel" initials="M." surname="Knodel">
              <organization>CDT</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   This document aims to inform how Internet protocols and their
   implementations might better mitigate technical attacks at the user
   endpoint by describing technology-based practices to perpetrate
   intimate partner violence (IPV).  IPV is a pervasive reality that is
   not limited to, but can be exacerbated with, the usage of technology.
   The IPV context enables the attacker to access one, some or all of:
   devices, local networks, authentication mechanisms, identity
   information, and accounts.  These kinds of technical compromise exist
   in addition to on-path attacks, both active and passive [RFC7624].
   In this document we describe the tactics the IPV attacker uses and
   what kind of counter-measures can be designed in IETF protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-celi-irtf-hrpc-ipvc-00"/>
        </reference>
        <reference anchor="COOKIES">
          <front>
            <title>Cookies: HTTP State Management Mechanism</title>
            <author fullname="Steven Bingler" initials="S." surname="Bingler">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Mike West" initials="M." surname="West">
              <organization>Google LLC</organization>
            </author>
            <author fullname="John Wilander" initials="J." surname="Wilander">
              <organization>Apple, Inc</organization>
            </author>
            <date day="10" month="May" year="2023"/>
            <abstract>
              <t>   This document defines the HTTP Cookie and Set-Cookie header fields.
   These header fields can be used by HTTP servers to store state
   (called cookies) at HTTP user agents, letting the servers maintain a
   stateful session over the mostly stateless HTTP protocol.  Although
   cookies have many historical infelicities that degrade their security
   and privacy, the Cookie and Set-Cookie header fields are widely used
   on the Internet.  This document obsoletes RFC 6265.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-rfc6265bis-12"/>
        </reference>
        <reference anchor="RFC6265">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
      </references>
    </references>
    <?line 213?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work done by Mark Pilgrim, Sofía Celi, Pete Snyder and Shivan Kaul Sahib.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
