*Summary*: Oblivious HTTP <https://datatracker.ietf.org/doc/draft-ietf-ohai-ohttp/>(OHTTP) increases user privacy by hiding users IP addresses from servers by leveraging an HTTP Proxy to connect to a target resource. The proxy will be aware of the client’s IP addresses but it will only see encrypted target messages. On the other hand the target resource will not see the user’s IP address, just the content of the request. OHTTP has limited applicability and can be used when applications do not need to carry state between requests. Examples of supported use cases are DNS queries and telemetry submission. For the purpose of this experiment we will focus on testing OHTTP with DNS over HTTPS(DoH) transactions only.
*Bug*: Bug: 1795940 [meta] Oblivious HTTP <https://bugzilla.mozilla.org/show_bug.cgi?id=1795940> *Specification*: https://datatracker.ietf.org/doc/html/draft-ietf-ohai-ohttp *Standards Body*: IETF - Oblivious HTTP Application Intermediation(workgroup) *Platform coverage*: Desktop *Preferences*: Testing Instructions <https://gist.github.com/valenting/987681242a0f1ca252f5dfef929ea3ae> *DevTools bug*: N/A *Link to standards-positions discussion*: N/A *Other browsers*: N/A *web-platform-tests*: N/A Other OHTTP Implementations: - Chrome: 2023-03-15 announced <https://developer.chrome.com/blog/oblivious-http-for-k-anon-server-with-fastly/>partnership with Fastly to operate an Oblivious HTTP relay (OHTTP relay) <https://github.com/WICG/turtledove/blob/main/FLEDGE_k_anonymity_server.md#oblivious-http> as part of FLEDGE’s 𝑘-anonymity server. - Cloudflare: OHTTP Gateway implementation <https://github.com/cloudflare/privacy-gateway-server-go> -- You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/CACQYfi%2BOdDz937Q_ApMFA0weu4d_2OXD3dHdN06Ss4Jw-VhxmA%40mail.gmail.com.
