-
Notifications
You must be signed in to change notification settings - Fork 565
Proxy User Stories
This is a list of user stories for HTTP proxies. Feel free to elaborate or add new stories.
Alex's employer gives him a laptop computer, and when it's connected to their network, it should automatically use their proxy. Because the laptop is owned by his employer, they've installed a CA in its trust store, so that they can intercept traffic from it (as per his terms of employment).
It would be nice if Alex were reminded that this was happening while he was browsing the Web, but really he should know this anyway.
Also, Alex's browser would like some indication of the quality of encryption on the "other side" of the proxy.
Bobbie-Sue's employer allows her to use her own devices (laptop and phone) at work. However, to access some company assets, she needs to install a CA in her device trust store(s).
Bobbie-Sue trusts her employer, but doesn't want to let them intercept traffic to other sites; she should be able to either limit the ability of the CA to her company's sites, not allow it to be used for interception at all, or detect when it's in use for interception.
Charlie runs a coffee shop that provides wifi to its customers. Before they use the network, however, he needs to show them a "terms and conditions" page, and perhaps get login details from them.
Charlie doesn't want to intercept his customers' traffic after that, but he does need a way to show them the network login page, even when the browser tries to go to a HTTPS site.
Currently, this user story's requirements are met by OS probing for captive portals on port 80.
Darlene is an executive at a mobile provider, and is responsible for building out their network. If Darlene's customers use too much bandwidth, she needs to deploy very expensive cell towers to provide capacity, which in turn means she needs to raise prices, potentially making her company less competitive.
Therefore, Darlene has a strong incentive to save bandwidth or downgrade QoS for a category of traffic. By intercepting Web traffic, she can increase the capacity and responsiveness of her network by transcoding or downgrading QoS for content -- e.g. images and especially videos -- often (but not always) without the end user noticing (since they tend to be using smaller screens than the original video was intended for).
While Darlene used to apply these optimisations across the board, recently she has been using products that adapt to load and "hot spots" in her network, so that she only optimises when she needs to.
Eliot lives in a remote village where Internet connectivity is quite poor, both in terms of bandwidth and latency. His co-villagers spend a lot of time browsing the Web, and so would benefit from a shared caching proxy.
More encryption of HTTP makes it difficult for the village to deploy a proxy; while CDNs help "big" sites, it doesn't help the rest of their Web traffic, and doesn't even help the "big" sites unless the CDN has a node deployed on their side of the bottleneck.
Francine's network or Francine's computer has a virus scanner that needs to inspect all traffic -- encrypted or not -- as it goes by, and potentially modify responses ("cleaning" them), or rejecting them outright.
Currently, this user story's requirements are met by inserting a CA into Francene's trust store and performing TLS MITM on it.
Grant uses a proxy to debug his application, and needs "raw" access to the data stream.
Currently, this user story's requirements are met by inserting a CA into his trust store and MITM'ing the stream.
Henrietta runs an educational institution inside a house of incarceration (since they share so many attributes). While her student inmates are allowed to surf the Web, they are not allowed to access prohibited resources -- indicated by URL as well as content.
As a result, Henrietta needs to see all traffic that goes by.
Currently, this user story's requirements can be met by inserting a CA into the trust store and performing TLS MITM on it, and/or by IP-level blocking.
Ian is an executive in a fictional ethical banking institution. He needs to ensure that his employees are complying with various legal requirements as they use the Web. In particular, he wants to assure that proprietary and sensitive information is not leaving via upload forms, etc.
As a result, he needs access to all outgoing content.
Currently, this user story's requirements are met by inserting a CA into the trust store and performing TLS MITM on it.
Jane has a new Internet of Things device of some sort in her house, but she also has an access gateway that proxies all HTTP to the outside world. As such, she needs to easily configure it to use the proxy.
Currently, this user story's requirements are met by proxy.pac.
Kirk's kids use all kinds of internet-connected devices in his family home, such as laptops, desktops and phones. He wants to maintain a proxy that limits access to certain Web sites from any of these devices attached to his home network to keep his kids on the safer side of the Web.
Currently, this user story's requirements can be met by inserting a CA into the trust store and performing TLS MITM on it, and/or by IP-level blocking.
Liam runs a Mobile Identity Proxy in a Mobile Network and needs to add the real/anonymous mobile identity of the user as HTTP header, to facilitate the seamless authentication of the user by the service provider.
This user story introduces serious privacy concerns.
Mike manages a very popular Rock music web site based on individual subscription and per month fee. To develop his business he partnered with a mobile operator who wants to provide rock music as bonus to his premium data subscribers.
Alice is fond of Rock music. Thanks to her premium data subscription plan, Alice has an unlimited access to a Rock music web site. Thanks to service augmentation Alice has a seamless access to its favorite streaming music. Alice loves this seamless approach which protects her privacy and avoids her to remember yet another login and password couple.
This user story's requirements are currently met by IP-level access controls.
*IP-level access controls are impractical due to large amount of IPs being used by music services, dynamic nature of IP allocation and use of the same IPs to serve other content such as Video, which may require a different subscription or charging scheme.
Nancy's kids use mobile devices such as phones and tablets outside home. Nancy wants to sign up those devices with mobile operator's parental control service which is set up through a proxy to limit access from those devices to certain web sites to keep her kids browsing safely also limit certain contents like video streaming when close to the data plan quota in order to keep the data usage under control and no surprise bill.
Currently, this user story's requirements can be met by inserting a CA into the trust store and performing TLS MITM on it, and/or by IP-level blocking.
Omid Kosari uses an ISP for internet connection which redirects users to a reasonable web page when clients credit or data cap limit finished . With everything encrypted , it will be nearly impossible.
Oscar runs an on-site education testing and professional certification company. His clients are students that need to take the online tests like TOEFEL, SAT as well as individuals required by their profession to getting/renewing their certification.
Due to the nature of the business and in order to prevent cheating, Oscar has restricted access to only the online sites offering the tests during the testing hours. In order to maintain his credibility with the certification organizations he needs to make sure that employee authenticate and their access to the testing sites is monitored for audit purposes.
Currently, this user story's requirements can be met by inserting a CA into the trust store and performing TLS MITM on it, and/or by IP-level blocking.
Peter owns a flower delivery company and he just started taking orders online. He got feedback that while some of his customers are frequently ordering from their mobile phones, others call in because they don’t want to pay for the data. In order to grow the business and reduce costs associated with the dedicated phone order representatives, he partnered with several mobile operators to cover and pay for the data usage associated with his customers’ access to his website.
Quincy runs successful business allowing his customers to download movies for rent or to buy. His customers are increasingly using their smartphones to view the movies on the go but a common complaint was that with the increased size of the downloads; they had no way to intuitively determine if they reached their data plan limits and incurred significant overcharges.
Quincy had partnered with several mobile operators and his developers are able to receive in real-time (in a form of a custom header) the remaining data value for the current billing cycle. With this enhancement, Quincy was able to preemptively and accurately notify his customers when they were close to reaching their limits without the need for his users to disclose their phone numbers and therefore minimize the information he collected from them.
This user story's requirements are not currently met, but it is debatable whether attaching this data to existing HTTP flows is the right approach.
Rick provides high-bandwidth Wifi in-flight via a satellite network. The high latency of satellite means that HTTP prefetching, caching, and compression are needed to provide the snappy web performance users have come to expect from broadband networks. Like Darlene above, Rick also wants to save bandwidth usage via caching and compression. Rick's users are airline travelers who will temporarily opt-in to trust the proxy and/or only trust the proxy for specific sites.
Bob and Alice are 2 university students in a developing country. The university forward proxy has a large cache and a limited international connection in order to reduce its network bill. Bob and Alice study network and IT. The students of their section frequently download the same RFCs from the IETF site. In practice, when the proxy downloads a file from the IETF, it saves the document 2 weeks in its cache as far as there is available storage. Students are very happy with this situation as they access the documents very quickly.
Tom lives far enough from town that telcos are not able to make the economics work to lay wire to his home. He therefore relies on satellite for his broadband Internet. The high latency of satellite means that HTTP prefetching, caching, and compression are needed to provide the snappy web performance Tom's friends get in town. Tom is willing to trust his service provider to decrypt his https traffic for most sites in exchange for page load time acceleration but would also like the ability to disable this decryption for activities like online banking.
This user story's requirements could be met by browsers, browser extensions, or TLS MITM to a box that Tom owns.
Ulrich is keeping up a collection of proxy servers to help internet users in Elbonia bypass internet censorship in their country. The proxies are set up in jurisdictions outside the censorship regime and control of Elbonian authorities. To thwart deep packet inspection, all connections between the clients and the proxy look to an on-the-wire observer like opaque TLS-encrypted HTTP connections with no discernible features to detect proxy usage. To save network traffic and reduce possibility of detection, the proxies only serve resources that are actually banned, the rest to be retrieved directly by the clients. To this end, proxy auto-configuration scripts are provided for the clients allowing selective proxy usage. "HTTPS" PAC directive could be used as currently implemented by Chrome.
Vicky is a student who brings her own device to use the Internet at school and when she visits the library. The library and school are required by law to filter inappropriate content in order to receive funds that support Internet access and are required to certify that they have these filters in place. In order to continue to be able to provide Vicky with Internet access, schools and libraries need to be able to see either the URLs or the DNS requests for those URLs.
Wallace works for the same mobile network as Darlene (above). Wallace must ensure that the radio towers do not get so congested that data cannot be delivered, or is delivered with an unacceptable latency. Therefore Wallace has configured the radio towers to detect the data content type to distinguish Web browsing, email, VoIP call, video call, streaming video, online gaming messages, chat, etc.. These content types have distinct needs regarding latency and bandwidth, and are queued accordingly and without discrimination to customers or content providers. Wallace utilises a proxy to read the ports and headers which indicate a particular content type.
Xavier has a smartphone and subscribes to a data plan that charges him whenever he goes over a limit. Due to his increasing use of apps and videos, he is finding that his monthly data usage bill is constantly increasing. So, Xavier has found an application in the app store that reduces his data usage, as well as providing him a tool to view and manage his data usage. This allows Xavier to use his apps more, view more videos and even find out which apps are using most of his data plan.
Yani is a content provider. She would like to prevent MITM proxies from decrypting the content she serves to her users. She uses a pinned certificate to achieve this but web browsers do not enforce pinned certificates today. Web browsers do not enforce pinned certificates because it would mean those browsers would essentially prevent access to pinned certificate sites from within networks with MITM proxies.
In a family home there are quite a number of Internet connected devices sharing a common (W)LAN and Internet connection. With parents and kids having PCs, Laptops, Gameboys, Games Consoles, Smart TVs, Tablets, Blue Ray Players and more there could easily more than 20 devices. For many devices the vendor restricts what software can be installed. For safety and privacy reasons the home owners may want to prevent amongst others
- malware being downloaded
- use parental control
- prevent unwanted information being leaked
- prevent unwanted ads
- prevent phishing
- being informed when someone maliciously turn on microphones or cameras
- introduce proxies and or VPNs to increase privacy (hiding IP and other IDs)
- introduce proxies to allow access to geo fenced services This should be possible in a centralized way without manually configure all devices which may not even be possible for some of them.
NOTE: All contributions are made under these terms.