Difference between revisions of "Related Website Sets"

From MgmtWiki
Jump to: navigation, search
(Current OIDC Front Channel Flow)
(Current OIDC Front Channel Flow)
Line 8: Line 8:
 
===Current OIDC Front Channel Flow===
 
===Current OIDC Front Channel Flow===
 
{|border="1" padding="2" width="799px"
 
{|border="1" padding="2" width="799px"
| Company || Location || Cat|| Recent News
+
| action || Location || Cat|| Cookie
 
|-
 
|-
|Direct Trust||US||Health|| association of 121 health IT orgs to support secure, inter-operable Health info exchange.
+
|user navigates to RP||US||Health|| RP creates session cookit
 
|-
 
|-
 
| [https://www.hon.ch/en/ Health Online]||WHO||Health|| seems to be focused on the quality of the information rather than privacy and security
 
| [https://www.hon.ch/en/ Health Online]||WHO||Health|| seems to be focused on the quality of the information rather than privacy and security

Revision as of 19:05, 12 March 2022

Full Title or Meme

The Trusted First Party is typically the human user of a User Agent such as a Browser. While it has been the practice up to 2021 to allow Cookies stored by one party in a session to be read by a Third Party, that has been explored but advertising and is scheduled to be shut down. The First-Party Set (FPS) is a proposal in W3C to retain some of the advantages of this practice while limiting user tracking.

Context

Current OIDC Front Channel Flow

action Location Cat Cookie
user navigates to RP US Health RP creates session cookit
Health Online WHO Health seems to be focused on the quality of the information rather than privacy and security
IDEF US Commerce Founded by NIST now part of Kantara
EPCS for Prescribers US Health terms for creating an X.509 cert for prescribers
NVLAP US Crypto Devices National Voluntary Laboratory Accreditation Program NIST - originally just crypto devices from FIPS 140 and now common criteria
Privo US U13 Child safe - Mark Anthony - Denise Tayloe
TRUSTED NETWORK US Health EP3 Foundation

Current Status

In identity protocols, a cross-site navigation resulting in a POST request is typically happens by the first site returning an HTML page that has a form that is auto-submitted via javascript to the second site. That's how SAML Post binding works. And so does the OIDC/OAuth form post response mode.

(As best I understand it anyway) a previously set cookie with SameSite=None will be sent by the browser on such a top-level cross-site POST request. Some folks have suggested that that will change with 3rd party cookies going away and that even a SameSite=None cookie will no longer be sent in that situation. But in my mental model of this stuff, the situation will be unchanged by 3rd party cookies going away - it's a cross-site request but because it is a top-level navigation the cookies are 1st party. SameSite enforcement is in place so SameSite=None cookies will be sent. But it's not 3rd party so is not impacted by disappearance or partitioning of 3rd party cookies.

Anyway, that's what I'm hoping Sam can provide clarification on. Mostly for the benefit of my own understanding but also for the benefit of the group here as recent discussions have suggested that folks have divergent understanding and expectations of things.

That behaviour changing would be problematic, for example and as others have pointed out, because OIDC RPs receiving an ID token via the form post response mode need the 'nonce cookie' value (which ties the ID token to the browser the SSO flow was initiated on) at that point in validating the token. Maybe further confusing things is that at least in Chrome there was a temporary(?) exception made for the nonce cookie case with the rollout of the SameSite default change to Lax - the "Lax + POST mitigation" section at https://www.chromium.org/updates/same-site/faq and it looks like there's an attempt to capture that in the coming update to RFC 6265 https://github.com/httpwg/http-extensions/pull/1435/files

User Experience

Part of this section was taken from Nick Doty <ndoty@cdt.org> on Mon, Feb 28 with Don, Aram, Ralph, Robin, Scott

Still trying to understand the potential benefits to the user from First-Party Sets and potential relaxation of browser privacy protections among members of those sets.

To summarize some proposed benefits could be:

  1. combining data across origins to provide personalization (preferences for shopping sites, or remembering past purchases)
  2. providing transparency to the user or to researchers/regulators about which domains are operated by the same company
  3. letting a user sign-in on one origin and be logged-in on other origins operated by that login provider
  4. accountability to a privacy policy because of the threat of losing first-party set benefits
    The issue is the user's mental resources -- how much cognitive energy and reputation processing they are being asked to invest in the set, and what they get for it. Making the "user-visible branding" the same across the entire set is how we keep that investment low, but the user still needs to get "paid for their time" somehow. The IEE's review of the FPS policy, and credible assertion that the member domains comply, is the service that is being offered to pay for the user's investment in the FPS.

This last one seems novel for us in the Web standards space, but if I understand Don's proposal correctly, the idea is that there would be a financial benefit to a company from having cookie scope combined within a first-party set, and that there could be a funding mechanism to provide external audits to receive that benefit, and that a user can get stronger commitment to a company's privacy policy if the company has the threat of losing access to the first-party set benefit. I'm not clear that browsers will want to be the enforcers of this kind of trade-off, or that we can easily set up the infrastructure for this auditing, or that users should give up some valuable privacy just in the hope that losing it later will be enough of a threat to get companies to keep their promises.

I have been encouraged by the transparency possibility when it's been raised in the past (this was a feature during both P3P and DNT efforts). But on using data for personalization and single sign-on, I'm not clear on why a set with combined cookies is necessary, compared to explicit user opt-in, consolidating domains or proposals specific to authentication (OAuth redirect flows, federated identity, etc.).

There also doesn't seem to be agreement on whether a first-party set should include only domains operated by the same company. Either because one use case is combining data for external service providers, or because a company will want to split its operations (perhaps to commit tax fraud?) but still combine data.

And there doesn't seem to be agreement on whether all the domains in a first-party set should have a common privacy policy, or if users should volunteer to combine data between domains with different privacy policies.

And there doesn't seem to be agreement on whether the number of domains in a set should be strictly limited, or include hundreds or thousands of domains (with a much wider scope of potential abuse). Or whether the sets should be mutually exclusive.

I'd consider myself one of the skeptics at this point. But if you are interested in working on First-Party Sets, I think clarity on these points would make the discussion more productive:

  • what is the direct user benefit (if any, and compared to alternatives)?
  • what use cases are definitely in and out of scope?
  • can enterprise use cases be satisfied while abuse of this feature is minimized?

I've tried to read the existing explainer and issues closely, and maybe it's just interest in expanding the scope beyond the current proposal that's leading to some of our general confusion. I see that https://github.com/privacycg/first-party-sets/issues/62 is one attempt to try to gain consensus on the purposes/use cases, and https://github.com/privacycg/first-party-sets/issues/53 on the user benefits, although many many of the open issues are touching on it.

Thanks all for the conversation and I hope it someday leads to more clarity for us. Cheers, Nick

On Fri, Jan 14, 2022 at 3:40 PM Don Marti <dmarti@cafemedia.com> wrote: On Fri, Jan 14, 2022 at 11:28 AM Nick Doty <ndoty@cdt.org> wrote: On Thu, Jan 13, 2022 at 2:31 PM Don Marti <dmarti@cafemedia.com> wrote:

On Thu, Jan 13, 2022 at 9:53 AM Zucker-Scharff, Aram <Aram.Zucker-Scharff@washpost.com> wrote:

But I don’t really see how any of this lands us on FPS anyway. There is no better way to have a clear shared indicator of shared context then operating on the same domain as far as I can see, and I’m not really clear on how FPS would give us the ability to enforce any clearer way than ‘operates on the same domain’ or would otherwise meet the minimum clarity required to make the affiliation visible to all users. Arguably, even that isn’t enough to make clear to users what is going on with their data, as it still leaves them with the mysteries of how these companies operate internally, but it still is significantly clearer than any other options I have heard or could conceive. It at least makes it unmistakable who the operator they have to object to is.

I’m open to hearing some clear articulation of why every business needs to run on multiple TLDs and that t/f requires FPS… but I haven’t even heard that yet.

I appreciate the work that has gone into trust.txt but I’m just not sure why we would want to shave a square peg to fit a round hole when we could have a round peg made for purpose. I know that in theory this means More Standards which can be undesirable, but in this case--especially with the idea that we’re going to have to build some theoretical user-manned regulatory body that will be reviewing FPSs, a presumably extensive and never-ending queue--it seems like a new standard for how to proclaim FPSs that is a best-possible fit is worth the time and effort.

It is possible for FPS to be a net win for users.

I'm interested to understand how this would be a benefit for users, so thanks for giving this example to work through.

For example, let's say that dobbsford.example and dobbstoyota.example are two car dealership sites, and users of both are aware of the common brand identity of the two sites. The Bob Dobbs who tells them "Bob Dobbs won't make you pay a lot for a Ford!" and the Bob Dobbs who tells them "Bob Dobbs won't make you pay a lot for a Toyota!" are the same recognizable advertising personality.

The two sites have the same design elements, shared copy, and privacy policy text. The two identical privacy policies state that the site will not allow your email address to be used for spam email if you provide it.

What was the user benefit here? As the user, did I want both dealerships to know what cars I was looking at on the other site without logging in?

As the user, I'm shopping for a car, and I want to get a notification when a car matching my preferences is available for a test drive. (I already filtered the inventory list on the dobbsford.example site down to the Ford Focus, and want to see what's similar on the Toyota lot without slogging through a bunch of unrelated vehicles)

Could be any kind of activity that stays within the same service and context ("getting a great deal on a car from Bob Dobbs") but spans multiple domains.

When the sites claim an FPS, the IEE gives them an incentive to adhere to their own published privacy policy. If the IEE makes an account with a spamtrap address on one of the two sites, and then receives spam, the FPS is invalid. The decision to claim an FPS and stick to it is a way for a single service with multiple domains to make a credible commitment to its own privacy policy. FPSs are asking the user for an exception to the normal rule, and offering to pay for the exception with the validation services provided by the IEE.

I'm not clear how in this proposal the FPS is a way for a company to commit to its own privacy policy. I'm not precisely sure what redress I would have if a company promised not to do something in their privacy policy and then did it anyway, but I would expect to reach out to a local consumer protection authority -- maybe this is a deceptive trade practice. That doesn't seem to rely on their being two different domains that claim in a machine-readable way to be owned by the same party. Is the commitment more credible because a browser might restrict the scope of cookies if a violation of the commitment comes to light and that penalty would be more meaningful than what local consumer protection would bring? Or would it be similar to a BBB or other trust seal?

Yes. Realistically, today a company is not taking much risk by violating its own privacy policy. (The budget for the entire California Privacy Protection Agency is $10 million and most US states don't have such an agency.) The risk of losing an FPS for a violation is a more credible deterrent -- especially since a violator would lose their FPS worldwide for a violation in one jurisdiction.

(I don't know if the two sites in this example actually have the same "ownership". The two dealerships are LLCs with overlapping member lists, and have issued convertible debt instruments to different parties. Bob Dobbs is one step ahead of the IRS, and at least one step ahead of any IEE that tried to figure out the same info.)

I believe you that companies may use complicated arrangements to defraud local tax authorities. As a user, I would be very confused if I granted special access to combine my data across domains because I thought it was the same entity and then it turned out that the data was actually being shared by two different companies. That the privacy policy (that I surely didn't read) was identical text for the two companies doesn't necessarily seem like a big advantage to the end user. Which company should I report to the local authority when my email address was shared by one of them for spam?

If there's no FPS in the picture, you have just as much leverage as you have with your existing spam. If you do believe that your address was misused by an FPS member, you forward the spam to the IEE, and they run a test.

Maybe an IEE would not be necessary if all users had access to regulators with the time and resources to investigate all violations.

Users are already dealing with a single service or context that spans multiple "companies" on paper. (Look at web ToS documents that say, if you're in these countries you have a contract with example.com USA, if you're in these other countries you have a contract with example.com Ltd. in Ireland, in these other countries, etc... Real-world company structures are interesting and probably not feasible for an IEE to analyze.)

Reference