Skip to main content

The "safe" HTTP Preference
draft-nottingham-safe-hint-03

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft that was ultimately published as RFC 8674.
Author Mark Nottingham
Last updated 2014-08-05
RFC stream Internet Engineering Task Force (IETF)
Formats
Reviews
IETF conflict review conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint, conflict-review-nottingham-safe-hint
Additional resources Mailing list discussion
Stream WG state Call For Adoption By WG Issued
Document shepherd (None)
IESG IESG state Became RFC 8674 (Informational)
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Barry Leiba
Send notices to draft-nottingham-safe-hint@tools.ietf.org
draft-nottingham-safe-hint-03
quot; within the cultural context of that site;
   usually (but not always) content that is unsuitable for minors.  The
   "safe" preference ought not be used for other purposes.

Nottingham              Expires February 7, 2015                [Page 2]
Internet-Draft        Preference for Safe Browsing           August 2014

   It is also important to note that the "safe" preference is not a
   reliable indicator that the end user is a child; other users might
   have a desire for unobjectionable content, and some children might
   browse without the preference being set.

   Simply put, it is a statement by (or on behalf of) the end user to
   the effect "If your site has a 'safe' setting, this user is hereby
   opting into that, according to your definition of the term."

1.1.  Notational Conventions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.  The "safe" Preference

   When present in a request, the "safe" preference indicates that the
   content which is not objectionable is preferred, according to the
   server's definition of the concept.

   For example, a request that includes the "safe" preference:

   GET /foo.html HTTP/1.1
   Host: www.example.org
   User-Agent: ExampleBrowser/1.0
   Prefer: safe

   When configured to do so, user agents SHOULD include the "safe"
   preference in every request, to ensure that the preference is
   available to all requested resources.

   See Appendix B for advice specific to Web browsers wishing to support
   "safe".

   Additionally, other clients MAY insert it; e.g., an operating system
   might choose to insert the preference in requests based upon system-
   wide configuration, or a proxy might do so based upon its
   configuration.

   Origin servers that utilize the "safe" preference SHOULD document
   that they do so, along with the criteria that they use to denote
   objectionable content.  If a server has more fine-grained degrees of
   "safety", it SHOULD select a reasonable default to use, and document
   that; it MAY use additional mechanisms (e.g., cookies [RFC6265]) to
   fine-tune.

Nottingham              Expires February 7, 2015                [Page 3]
Internet-Draft        Preference for Safe Browsing           August 2014

   A response corresponding to the request above might have headers that
   look like this:

   HTTP/1.1 200 OK
   Transfer-Encoding: chunked
   Content-Type: text/html
   Server: ExampleServer/2.0
   Vary: Prefer

   Note that the Vary response header needs to be sent if cacheable
   responses associated with the resource might change depending on the
   value of the "Prefer" header.  This is not only true for those
   responses that are "safe", but also the default "unsafe" response.

   See [RFC7234] Section 4.1 for more information the interaction
   between Vary and Web caching.

   See Appendix C for additional advice specific to Web servers wishing
   to use "safe".

3.  Implementation Status

   _Note to RFC Editor: Please remove this section before publication._

   This section records the status of known implementations of the
   protocol defined by this specification at the time of posting of this
   Internet-Draft.  The description of implementations in this section
   is intended to assist the IETF in its decision processes in
   progressing drafts to RFCs.  Please note that the listing of any
   individual implementation here does not imply endorsement by the
   IETF.  Furthermore, no effort has been spent to verify the
   information presented here that was supplied by IETF contributors.
   This is not intended as, and must not be construed to be, a catalog
   of available implementations or their features.  Readers are advised
   to note that other implementations may exist.

   o  Microsoft Internet Explorer - see http://support.microsoft.com/
      kb/2980016

   o  Microsoft Bing

   o  Mozilla Firefox - see https://bugzilla.mozilla.org/
      show_bug.cgi?id=995070

Nottingham              Expires February 7, 2015                [Page 4]
Internet-Draft        Preference for Safe Browsing           August 2014

4.  Security Considerations

   The "safe" preference is not a secure mechanism; it can be inserted
   or removed by intermediaries with access to the request stream.  Its
   presence reveals limited information about the user, which may be of
   small assistance in "fingerprinting" the user.

   By its nature, including "safe" in requests does not assure that all
   content will actually be safe; it is only when servers elect to honor
   it that content might be "safe".

   Even then, a malicious server might adapt content so that it is even
   less "safe" (by some definition of the word).  As such, this
   mechanism on its own is not enough to assure that only "safe" content
   is seen; those who wish to ensure that will need to combine its use
   with other techniques (e.g., content filtering).

   Furthermore, the server and user may have differing ideas regarding
   the semantics of "safe."  As such, the "safety" of the user's
   experience when browsing from site to site might (and probably will)
   change.

5.  IANA Considerations

   This specification registers the "safe" preference [RFC7240]:

   o  Preference: safe

   o  Value: (no value)

   o  Description: Indicates that "safe" / "unobjectionable" content is
      preferred.

   o  Reference: (this document)

   o  Notes:

6.  References

6.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC7240]  Snell, J., "Prefer Header for HTTP", RFC 7240, June 2014.

Nottingham              Expires February 7, 2015                [Page 5]
Internet-Draft        Preference for Safe Browsing           August 2014

6.2.  Informative References

   [RFC6265]  Barth, A., "HTTP State Management Mechanism", RFC 6265,
              April 2011.

   [RFC7234]  Fielding, R., Nottingham, M., and J. Reschke, "Hypertext
              Transfer Protocol (HTTP/1.1): Caching", RFC 7234, June
              2014.

Nottingham              Expires February 7, 2015                [Page 6]
Internet-Draft        Preference for Safe Browsing           August 2014

Appendix A.  Acknowledgements

   Thanks to Alissa Cooper, Ilya Grigorik, Emma Llanso, Jeff Hughes,
   Lorrie Cranor, Doug Turner and Dave Crocker for their comments.

Appendix B.  Setting "safe" from Web Browsers

   As discussed in Section 2, there are many possible ways for the
   "safe" preference to be generated.  One possibility is for a Web
   browser to allow its users to configure the preference to be sent.

   When doing so, it is important not to misrepresent the preference as
   binding to Web sites.  For example, an appropriate setting might be a
   checkbox with wording such as:

     [] Request "safe" content from Web sites

   ... along with further information available upon request (e.g., from
   a "help" system).

   Browsers might also allow the "safe" preference to be "locked" - that
   is, prevent modification without administrative access, or a
   passcode.

Appendix C.  Supporting "safe" on Web Sites

   Web sites that allow configuration of a "safe" mode (for example,
   using a cookie) can add support for the "safe" preference
   incrementally; since the preference will not be supported by all
   clients immediately, it is necessary to have another way to configure
   it.

   When honoring the safe preference, it is important that it not be
   possible to disable it through the Web interface, since "safe" may be
   inserted by an intermediary (e.g., at a school) or configured and
   locked down by an administrator (e.g., a parent).  If per-site
   configuration is present and the safe preference is received, the
   safer interpretation is always used.

   The safe preference is designed to make as much of the Web a "safe"
   experience as possible; it is not intended to be configured site-by-
   site.  Therefore, if the user expresses a wish to disable "safe"
   mode, the site should remind them that the safe preference is being
   sent, and ask them to consult their administrator (since "safe" might
   be set by an intermediary or locked-down Operating System
   configuration).

Nottingham              Expires February 7, 2015                [Page 7]
Internet-Draft        Preference for Safe Browsing           August 2014

   As explained in Section 2, responses that change based upon the
   presence of the "safe" preference need to either carry the "Vary:
   Prefer" response header field, or be uncacheable by shared caches
   (e.g., with a "Cache-Control: private" response header field).  This
   is to avoid an unsafe cached response being served to a client that
   prefers safe content (or vice versa).

Author's Address

   Mark Nottingham

   EMail: mnot@mnot.net
   URI:   http://www.mnot.net/

Nottingham              Expires February 7, 2015                [Page 8]