<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-webbotauth-use-cases-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="webbotauth usecases">Use Cases for Authentication of Web Bots</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-webbotauth-use-cases-02"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Melbourne</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 33?>

<t>This draft outlines use cases for authentication for bot clients on the Web, to help inform discussions regarding the scope and intent of the WebBotAuth Working Group.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-webbotauth-use-cases/"/>.
      </t>
      <t>
         information can be found at <eref target="https://mnot.github.io/I-D/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/I-D/labels/webbotauth-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 37?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Web Bot Auth (WebBotAuth) Working Group has been chartered to "standardize methods for cryptographically authenticating automated clients and providing additional information about their operators to Web sites."</t>
      <t>Initial discussions have revealed some disagreement about the group's scope. <xref target="site-usecase"/> explores the use cases for authentication of non-browser clients, to help inform those discussions. <xref target="next"/> suggests some further questions for consideration.</t>
    </section>
    <section anchor="site-usecase">
      <name>Web Site Use Cases</name>
      <t>This section explores use cases that Web sites might have for authenticating bots, including a discussion of any current mechanisms that they use to meet the use case.</t>
      <t>Because there is some question about the "additional information" facility in the charter, each use case also assesses whether it's necessary to identify a real-world entity associated with the bot to meet the use case (since that is the most common use of such a facility).</t>
      <t>Each use case also summarises how controversial addressing it is perceived to be.</t>
      <t>This draft does not take a position on whether all of the use cases should be addressed by the group. Potential alternative solutions to the implied requirements are also not considered here.</t>
      <section anchor="abuse">
        <name>Mitigating Volumetric Abuse by Bots</name>
        <t>Some bots make requests at rates that cause operational issues for Web sites. This may be intentional (e.g., traffic from "botnets" and other attacks) or unintentional (due to overly simple or inconsiderate implementation). It appears that both the number of such bots and the rate at which they make requests are increasing.</t>
        <t>While sites can take measures to mitigate the impact of this traffic (e.g., caching), these are only partially effective; some resources are uncacheable, and generating representations of some HTTP resources can incur much higher costs -- both in terms of computation and economics. In general, serving such great volumes of traffic can consume significant resources, in terms of both infrastructure and bandwidth.</t>
        <t>Currently, a site that experiences such traffic most often blocks unwelcome clients by IP address. This has the effect of blocking other uses of that IP address, both at that time and into the indefinite future. It also offers little recourse for incorrectly blocked clients, since they have no information about why they were blocked or what they should do about it.</t>
        <t>This use case does not require identifying a specific bot or associating it with a real-world entity, provided that the site considers abusiveness a feature of behaviour, not identity. It also does not require discriminating between bots and non-bot users; only the problematic behaviour is targeted.</t>
        <t>Addressing this use case does not appear to be overly controversial, because it is widely recognised that a site needs to operate with reasonable efficiency to provide both its operators and its users a benefit.</t>
      </section>
      <section anchor="access">
        <name>Controlling Access by Bots</name>
        <t>Some sites wish to make access by bots to the resources they provided to browsers conditional upon the identity or features of the bot. This might be for a variety of reasons; they may wish to:</t>
        <ul spacing="normal">
          <li>
            <t>Only allow access by bots on an allow list;</t>
          </li>
          <li>
            <t>Disallow access to bots on an explicit deny list;</t>
          </li>
          <li>
            <t>Condition access upon meeting some criteria (e.g., non-profit, certification by a third party);</t>
          </li>
          <li>
            <t>Condition access upon participation in some scheme or protocol (e.g., payment for access);</t>
          </li>
        </ul>
        <t>Note that the first two imply some notion of bots being tied to a real-world identity, whereas the remaining do not necessarily require it.</t>
        <t>Currently, sites most often use a combination of the Robots Exclusion Protocol (including robots.txt) and IP address blocking to control access by bots.</t>
        <t>The Robots Exclusion Protocol provides a means for sites to communicate preferences to bots about their behaviour. Although this is a useful and sometimes necessary function, it does not allow for enforcement of those preferences.</t>
        <t>Enforcement is achieved primarily through blocking non-conforming clients. The limitations of IP address blocking are discussed in <xref target="abuse"/>.</t>
        <t>This use case has been disputed. While blocking certain bots by IP address is widespread in practice, concerns have been expressed that standardising an authentication mechanism for bots might result in a Web where all bots might need to authenticate, leading to increased difficulty in introducing new bots. In some markets, this outcome could create pressure towards centralisation, due to heightened barriers to entry.</t>
        <t>Another controversy is that giving sites a more fine-grained capability to block bots is a change in the balance of power on the Web. Some perceive that as justified, given factors like the introduction of AI and what they perceive as an onslaught of bot traffic. Others see it as an overreach that may impinge upon users' ability to consume content as they desire -- for example, using accessibility tools or autonomous agents.</t>
        <t>Finally, some see bots as a way of keeping powerful sites in check, and therefore measures to curtail their activity is portrayed as concentrating that power. However, it should be noted that there are also powerful bots that can be seen to have disproportionate power over sites, and so there is not necessarily a clear bias here.</t>
      </section>
      <section anchor="content">
        <name>Providing Different Content to Bots</name>
        <t>Some sites may wish to tailor the content they serve to bots (either selectively or overall), as compared to that they serve to browsers. In some cases, a site might wish to augment the information that they provide to a trusted bot. Conversely, a site might wish to reduce or modify the information that they provide to a bot that they do not trust.</t>
        <t>Current practice is difficult to ascertain, but anecdotal evidence suggests that the latter case is more common than the former. For example, some sites do not wish for information that they consider to be commercially sensitive -- e.g., prices -- to be available to bots. In both cases, IP addresses and similar heuristics are used.</t>
        <t>In most cases, this use requires identifying a specific bot and associating it with a real-world entity (although there are exceptions, such as sites which want to treat all bots equally, or cases where it's possible to group bots without identifying specific ones).</t>
        <t>This use case is likely to be controversial in cases where the modifications are not consensual. Some espouse a site's right to control its own speech depending upon the audience it is speaking to, whereas others are concerned by the lack of transparency that might result -- particularly from powerful sites. Note, however, that a bot that cannot be distinguished from a typical browser is still likely to be able to operate for such purposes.</t>
      </section>
      <section anchor="audit">
        <name>Auditing Bot Behaviour</name>
        <t>Some sites may wish to understand how bots use them in detail. In particular, they might want to verify that a bot adheres to the preferences stated in robots.txt, or that they conform to some other protocol. They might also wish to have reliable metrics for how a bot behaves in terms of number of requests, timing of requests, and so forth to ascertain the bot's behaviour; this information might feed into other use cases, or be used independently.</t>
        <t>Currently, this use case is met through use of heuristics of information like IP address. It does not necessarily require identifying a specific bot or associating it with a real-world entity, but some (many?) of the downstream uses of the audit data may.</t>
        <t>This use case does not appear controversial, because bots being accountable for their behaviour is broadly seen as a reasonable goal.</t>
      </section>
      <section anchor="classify">
        <name>Classifying Traffic</name>
        <t>Many sites make efforts to understand how browsers interact with them, so as to improve their services. This might be at the connection level (e.g., HTTP, TCP, and QUIC statistics), or it might be gathered in-browser (Real User Monitoring or RUM).</t>
        <t>When doing so, it is important for them to be able to distinguish between their target audience (people using browsers) and bots; if they cannot, the bot traffic will make the insights they gain less useful (or even useless).</t>
        <t>Currently, sites that perform such tasks use a variety of heuristics to identify and exclude bots from such measures. This is only partially effective; bots are increasingly difficult to classify, particularly as using 'headless browsers' becomes a norm for crawlers.</t>
        <t>This use case does not require identifying specific bots or associating them with real-world entities unless finer granularity of classification than "bot vs not" is desired. However, sites that wish to exclude non-human clients from their measurements would still need to use heuristics for bots that do not comply with the norm.</t>
        <t>Addressing this use case does not appear to be controversial, because an understanding of the nature of traffic that a site receives is important to its operation (provided that no personal information is involved and no tracking capability is introduced).</t>
      </section>
      <section anchor="services">
        <name>Authenticating Site Services</name>
        <t>Many sites use third-party tools to analyse, monitor, and provide their services. For example, health check services allow sites to understand their uptimes and receive notifications when there is a problem. Content Delivery Networks need to identify themselves to back-end origin servers.</t>
        <t>Currently, such services use a variety of means of authentication, including IP address allow lists, "magic" header fields, and ad hoc use of other existing mechanisms.</t>
        <t>Site services often have higher requirements for reliability and security. A site might not wish to grant access to a vulnerability scanner solely based upon its IP address, for example. Likewise, a health check needs to reliably bypass Web Application Firewalls to perform its function.</t>
        <t>This use case requires bot identity to be tied to authentication.</t>
        <t>Addressing this use case does not appear to be controversial. However, it is not clear whether these use cases are within the scope of the Working Group's charter.</t>
      </section>
    </section>
    <section anchor="bot">
      <name>Bot Use Cases</name>
      <t>This section explores use cases that Bots might have for being authenticated by sites, focusing on improvements over current mechanisms that sites use.</t>
      <section anchor="ip-address-mobility">
        <name>IP Address Mobility</name>
        <t>User-Agent headers can be descriptive, but are also trivially spoofed. As a result, most bots are associated most strongly with the IP addresses they use.</t>
        <t>Bots that do not fully control the IP addresses they use (e.g., those using cloud or other hosting infrastructure) are disadvantaged: if they need to change the addresses they use (e.g., due to operational issues, economic incentives, or changes by their provider), they lose any reputation built and effectively start from scratch.</t>
        <t>As a result, long-term stability of the IP address is necessary to build a reputation for that IP address. Sites often use static allow and block lists of IP addresses, so updating them is painful.</t>
        <t>Identifying a bot using a factor other than IP address would decouple its reputation from the infrastructure identifier -- its IP address -- and allow greater mobility, levelling the playing field for bots that do not fully control their infrastructure.</t>
      </section>
      <section anchor="sharing-ip-addresses">
        <name>Sharing IP Addresses</name>
        <t>Similarly, bots that share an IP address with other processes -- either simultaneously or over time -- are disadvantaged because their reputation with sites might be affected by other uses of the IP address. Unless they have rigid control of all requests emitted from that IP address over a long period of time, that identifier might be added to block lists.</t>
        <t>Identifying a bot using a factor other than IP address would allow sites to discriminate between different uses of that identifier. This would allow bots to operate without a dedicated IP address, further levelling the playing field for small bots.</t>
      </section>
      <section anchor="robotstxt-alignment">
        <name>Robots.txt Alignment</name>
        <t>The robots.txt format identifies bots by their User-Agent string, but this is easily spoofable on the wire. As a result, a bot might be punished by sites that block that identifier based upon fraudulent use.</t>
        <t>Identifying a bot in a more reliable fashion in robots.txt would avoid this misattribution.</t>
      </section>
      <section anchor="conveying-contextual-information">
        <name>Conveying Contextual Information</name>
        <t>Bots have an incentive to be transparent about their operation, so as to encourage sites to allow their operation. Although there are ad hoc mechanisms for doing this (e.g., a link to HTML in the User-Agent string), a standard, machine-readable means of conveying authenticated information about a bot's operation could lower barriers to conveying this information.</t>
      </section>
    </section>
    <section anchor="next">
      <name>Next Steps</name>
      <t>This section suggests questions for further investigation and discussion.</t>
      <ol spacing="normal" type="1"><li>
          <t>What are the qualitative differences between current practice (e.g. ad hoc blocking by IP address) and proposals for authentication of bots?</t>
        </li>
        <li>
          <t>User authentication is widespread and standards-supported on the Web; what makes bot authentication different?</t>
        </li>
        <li>
          <t>What levers do we have to mitigate the harms associated with an emerging default of requiring authentication for bots? Does authentication enhance or confound such efforts (as opposed to IP address blocking)?</t>
        </li>
        <li>
          <t>Would an authentication scheme that does not allow association with real-world entities provide enough value to meet interesting use cases? If so, would the charter prohibition on "[t]racking or assigning reputation to particular bots" need to change?</t>
        </li>
        <li>
          <t>What is the threshold for being considered a bot? E.g., is request rate important? Associating with a specific human user in time and/or space?</t>
        </li>
        <li>
          <t>Are the resource requirements for authentication proposals reasonable for these use cases for all types of sites? At IETF 124, it was asserted that it would disproportionately advantage already well-resourced entities.</t>
        </li>
        <li>
          <t>What use cases should the group address and not address? Why?</t>
        </li>
        <li>
          <t>Are there alternative approaches to addressing some or all of these use cases? What properties do they have?</t>
        </li>
      </ol>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no actions for IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Undoubtedly there are security considerations to any authentication protocol, but they will be encountered and dealt with later than what's in scope for this draft.</t>
    </section>
  </middle>
  <back>
    <?line 194?>

<section anchor="bots">
      <name>Bot Differences</name>
      <t>This section enumerates some of the ways that bots can differ.</t>
      <section anchor="scope">
        <name>Scope</name>
        <t>Bots have different scopes of activity:</t>
        <ul spacing="normal">
          <li>
            <t>Some crawl the entire Web</t>
          </li>
          <li>
            <t>Some target a specific subset of the Web (e.g., by geography, language, industry)</t>
          </li>
          <li>
            <t>Some target specific sites or resources on sites (e.g., link checkers, linters)</t>
          </li>
        </ul>
      </section>
      <section anchor="relationship">
        <name>Relationship</name>
        <t>Bots have different relationships with sites:</t>
        <ul spacing="normal">
          <li>
            <t>Some actively attempt to appear as Web browsers, so as to have the same relationship as an end user</t>
          </li>
          <li>
            <t>Some do not hide their nature as bots but do not have any pre-existing relationship with the site</t>
          </li>
          <li>
            <t>Some are implicitly or explicitly authorised by the site (e.g., through an advertised API)</t>
          </li>
          <li>
            <t>Some have a pre-existing relationship with the site (e.g., monitoring and other site services)</t>
          </li>
        </ul>
      </section>
      <section anchor="reputation">
        <name>Reputation</name>
        <t>Bots have different reputations in the larger community, which can change how they are perceived by sites:</t>
        <ul spacing="normal">
          <li>
            <t>Some are well and widely-known (e.g., search engine crawlers, archivers)</t>
          </li>
          <li>
            <t>Some are relatively unknown (e.g., due to low traffic or recent introduction)</t>
          </li>
          <li>
            <t>Some are purposefully anonymous (e.g., price checkers, most malicious bots)</t>
          </li>
        </ul>
      </section>
      <section anchor="agency">
        <name>Agency</name>
        <t>Bots act with different relationships to their operator(s):</t>
        <ul spacing="normal">
          <li>
            <t>Some are explicitly and exclusively associated with an end user (e.g., "agentic" bots)</t>
          </li>
          <li>
            <t>Some are acting on behalf of a group of end users</t>
          </li>
          <li>
            <t>Some are acting on behalf of another entity (e.g., corporation, government, civil society organisation)</t>
          </li>
          <li>
            <t>Some serve multiple constituencies</t>
          </li>
        </ul>
        <t>Portraying "bot vs. human" is likely an unhelpful binary.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
