Content Transformation Guidelines 1k 1m (Rev 13)

Group Working W3C Editor's Draft 06 June 22 July 2008

This version:
http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/080606 http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/080722
Latest version:
http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/latest
Previous version: versions:
http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/080410 Draft 1l ( diff ) http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/080712
Draft 1k ( diff ) http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/080606
Editor:
Jo Rabin, mTLD Top Level Domain (dotMobi)

Abstract

This document provides guidance to content transformation proxies and content providers as to how inter-work when delivering Web content.

Status of this Document

This document is an editors' copy that has no official standing.

This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current W3C publications and the latest revision of this technical report can be found in the W3C technical reports index at http://www.w3.org/TR/.

Publication as a Group Working Draft of a proposed normative Recommendation does not imply endorsement by the W3C Membership. This is a draft document and may be updated, replaced or obsoleted by other documents at any time. It is inappropriate to cite this document as other than work in progress.

This document has been produced by the Content Transformation Task Force of the Mobile Web Best Practices Working Group as part of the Mobile Web Initiative . Please send comments on this document to the Working Group's public email list public-bpwg-ct@w3.org , a publicly archived mailing list .

This document was produced under the 5 February 2004 W3C Patent Policy . . W3C maintains a public list of patent disclosures made in connection with this document; that page also includes instructions for disclosing a patent. An individual who has actual knowledge of a patent which the individual believes contains Essential Claim(s) with respect to this specification must disclose the information in accordance with section 6 of the W3C Patent Policy .

Revision Description

Table of Contents

1 Introduction
    1.1 Purpose
    1.2 Audience
    1.3 Scope
    1.4 Summary of Requirements
2 Terminology
    2.1 Types of Proxy
    2.2 Types of Transformation
    2.3 Interpretation of RFC 2119 Key Words
3 Requirements Behavior of Components
    3.1 Summary Proxy Forwarding of Requirements Request
    3.2 Control         3.1.1 Applicable HTTP Methods
        3.1.2 no-transform directive in Request
        3.1.3 Treatment of the Behavior Requesters that are not Web browsers
        3.1.4 Serving Cached Responses
        3.1.5 Alteration of the HTTP Header Values
            3.1.5.1 Content Tasting
            3.1.5.2 Avoiding "Request Unacceptable" Responses
            3.1.5.3 User Selection of Restructured Experience
            3.1.5.4 Sequence of Requests
            3.1.5.5 Original Headers
        3.1.6 Additional HTTP Headers
            3.1.6.1 Proxy Treatment of Via Header
    3.2 Server Response to Proxy
        3.2.1 Control by the User Use of HTTP 406 Status
        3.2.2 Control by Server Origination of Cache-Control: no-transform
        3.2.3 Control by Administrative or Other Arrangements. Varying Representations
        3.2.4 Resolving Conflicting Instructions             3.2.3.1 Use of Vary HTTP Header
4 Behavior             3.2.3.2 Indication of Components Intended Presentation Media Type of Representation
    4.1     3.3 Proxy Treatment Forwarding of Request Response to User Agent
        4.1.1         3.3.1 Receipt of Cache-Control: no-transform directive in Request
        4.1.2 Proxy Decision to Transform         3.3.2 Receipt of Warning: 214 Transformation Applied
        4.1.3 Proxy Indication of its Presence to         3.3.3 Server Rejection of HTTP Request
        4.1.4 Altering         3.3.4 Receipt of Vary HTTP Header Values
    4.2 Server Response         3.3.5 Link to Proxy "handheld" Representation
    4.3         3.3.6 Proxy Receipt and Forwarding Decision to Transform
            3.3.6.1 Alteration of Response from Server
    4.4 Proxy Response to User Agent             3.3.6.2 HTTPS Link Re-writing
5 4 Testing

Appendices

A References
B Example Transformation Interactions (Non-Normative)
    B.1 Basic Operation
    B.2 Optimization based on Previous Server Interaction
    B.3 Optimization based on Previous Server Interaction, Server has Changed its Operation
    B.4 Server Response Indicating that this Representation is Intended for the Target Device
    B.5 Server Response Indicating that another Representation is Intended for the Target Device
C Applicability to Transforming Solutions which are Out of Scope (Non-Normative)
D Scope for Future Work (Non-Normative)
    B.1     D.1 POWDER
    B.2     D.2 link HTTP Header
    B.3 Amendments to HTTP     D.3 Sources of Device Information
    B.4     D.4 Inter Proxy Communication
C Acknowledgments     D.5 Amendment to and Refinement of HTTP
E Administrative Arrangements (Non-Normative)
F Acknowledgments (Non-Normative)


1 Introduction

1.1 Purpose

From the point of view of this document, Content Transformation is the manipulation in various ways, by proxies, of requests made to and content delivered by an origin server with a view to making it more suitable for mobile presentation.

The W3C MWI BPWG neither approves nor disapproves of Content Transformation, but recognizes that is being deployed widely across mobile data access networks. The deployments are widely divergent to each other, with many non-standard HTTP implications, and no well-understood means either of identifying the presence of such transforming proxies, nor of controlling their actions. This document establishes a framework to allow that to happen.

The overall objective of this document is to provide a means, as far as is practical, for users to be provided with at least a "functional user experience" [Device Independence Glossary] of the Web, when mobile, taking into account the fact that an increasing number of content providers create experiences specially tailored to the mobile context which they do not wish to be altered by third parties. Equally it takes into account the fact that there remain a very large number of Web sites that do not provide a functional user experience when perceived on many mobile devices. The document describes how the origin server may request conforming transforming proxies not to alter HTTP requests and responses, as well as describing control options that a transforming proxy offers users. A more extensive discussion of the requirements for these guidelines can be found in "Content Transformation Landscape" [CT Landscape] .

1.4 Summary of Requirements

This section summarizes the communication requirements of actors (users, user agents, transforming proxies and origin servers) to communicate with each other. It is recognised that several transformation proxies may be present but their interactions are not discussed in detail. The relevant scenario is as follows:

The needs of these actors are as follows:

  1. The user agent needs to be able to tell the Content Transformation proxy and the origin server:

    1. what type of mobile device and which user agent is being used;

    2. that all Content Transformation should be avoided.

  2. The Content Transformation proxy needs to be able to tell the origin server:

    1. that some degree of Content Transformation ( restructuring and recoding ) can be performed;

    2. that content is being requested on behalf of something else and what that something else is;

    3. that the request headers have been altered and what the original ones were.

  3. The origin server needs to be able to tell the Content Transformation proxy:

    1. that it varies the representation of its responses according to device type and other factors;

    2. that it is not permissible to perform Content Transformation;

    3. that it has media-specific representations;

    4. that is unable or unwilling to deal with the request in its present form.

  4. The Content Transformation proxy needs to be able to tell the user agent:

    1. that it has applied transformations of various kinds to the content.

  5. The Content Transformation proxy needs to be able to interact with the user:

    1. to allow the user to disable its features;

    2. to alert the user to the fact that it has transformed content and to allow access to an untransformed representation of the content.

Note:

A more extensive discussion of the requirements for these guidelines can be found in "Content Transformation Landscape" [CT Landscape] .

2 Terminology

2.1 Types of Proxy

Alteration of HTTP requests and responses is not prohibited by HTTP other than in the circumstances referred to in [RFC 2616 HTTP] Section 13.5.2 .

HTTP defines two types of proxy: transparent proxies and non-transparent proxies. As discussed in [RFC 2616 HTTP] Section 1.3, Terminology :

[ Definition : "A transparent proxy is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification."] [ identification. . Definition : "A A non transparent non-transparent proxy is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering.] filtering. Except where either transparent or non-transparent behavior is explicitly stated, the HTTP proxy requirements apply to both types of proxies."

This document elaborates the behavior of non transparent non-transparent proxies, when used for Content Transformation in the context discussed in [CT Landscape] . Editorial Note: The BPWG requests feedback on the degree to which it is necessary to distinguish between Content Transformation proxies that interact with user agents using HTTP, and other types of arrangements where a (proprietary) client application interacts with an in-network component using other techniques.

3 Requirements Behavior of Components

3.1 Summary Proxy Forwarding of Requirements Request

The purpose of this section is to summarize the communication requirements of actors (transforming proxies, origin servers, and to some extent users) to communicate with each other. The relevant scenario involving a content transformation proxy is as follows: Note: The interactions of several transformation proxies are encompassed by this document, but only in a rudimentary form.
The needs of these actors are as follows:

The user agent needs to be able to tell the Content Transformation proxy and the origin server: what type of mobile device and what user agent is being used; 3.1.1 Applicable HTTP Methods

that all Content Transformation Proxies should be avoided. The Content Transformation proxy needs to be able to tell the origin server: that some degree of Content Transformation ( restructuring and recoding ) can be performed; that Content Transformation will be carried out unless requested not to; that content is being requested on behalf of something else and what that something else is; that the request headers have been altered (e.g. additional content types inserted). The origin server needs to be able to tell the Content Transformation proxy: that it varies its presentation according to device type and intervene in methods other factors; that it is permissible (or not) to perform Content Transformation of various kinds; than GET, POST, HEAD and PUT.

that it has media-specific representations; that is unable or unwilling to deal with the request User agents sometimes issue HTTP HEAD requests in its present form. The Content Transformation proxy needs to be able order to tell the user agent: that it has applied transformations determine if a resource is of various kinds to the content. The Content Transformation proxy needs to be able to interact with the user: to allow the user to disable its features; to alert the user to the fact a type and/or size that it has transformed content and to allow access to an untransformed representation of the content. 3.2 Control of the Behavior they are capable of the Proxy handling. A transforming proxy as described in this document must offer a level of control to users and to origin servers with which it communicates. 3.2.1 Control by the User Transforming proxies should provide to their users: an indication that the content being viewed has been transformed for mobile presentation; an option to view the original, unmodified content. They may also provide the ability for their users to make convert a persistent or semi-persistent expression of preferences. Examples of such settings are "Never transform", "Always HEAD request desktop presentation", "Transform only if necessary to avoid mis-operation" and "Compress where possible". Editorial Note: The BPWG is studying how to clarify the scope of "persistent" and "semi-persistent". 3.2.2 Control by Server Transforming proxies must allow origin servers into a GET request (in order to control the Content Transformation process. The control mechanisms include use of HTTP conventions as discussed in the following section ( 4 Behavior of Components ). 3.2.3 Control by Administrative or Other Arrangements. The preferences of users and of servers may be ascertained by means outside the scope of this document, for example: determine the use by transforming proxies characteristics of a disallow list of Web sites for which Content Transformation is known to diminish transformed response that it would return if the user experience of content or be ineffective; the use by transforming proxies of an allow list of Web sites agent subsequently issued a GET request for which Content Transformation is known to be necessary; terms and conditions of service, as agreed between the user and the Content Transformation service provider. Note: same resource.)

Allow and disallow lists generally cause intractable problems for content providers since there If the HTTP method is no mechanism for them altered from HEAD to establish which lists they GET, proxies should be on, nor any generic mechanism though which they can check or change their status. 3.2.4 Resolving Conflicting Instructions There (providing such action is in accordance with normal HTTP caching rules) cache the possibility for conflict between the desires of the content provider and the desires of users of response so that content. This document sets out to provide a framework within which, second GET request for matters of presentation, the desires of the same content provider are usually accommodated but, where necessary, the user may expressly override those desires with their preferences. 4 Behavior of Components is not required (see also 3.1.4 Serving Cached Responses 4.1 Proxy Treatment of Request ).

4.1.1 3.1.2 no-transform directive in Request

If the request contains a Cache-Control: no-transform directive the proxy proxies must forward the request unaltered to the server, other than to comply with transparent HTTP behavior and in particular to add a Via as noted below (see 3.1.6 Additional HTTP header. Headers ).

Note:

An example of the use of Cache-Control: no-transform is the issuing of asynchronous HTTP requests, perhaps by means of XMLHttpRequest XMLHTTPRequest [XHR] , which may include such a directive in order to prevent transformation of both the request and the response.

Irrespective of the presence

3.1.3 Treatment of a no-transform directive: Requesters that are not Web browsers

the proxy Proxies should must add the IP address of the initiator of the request to the end of act as though a comma separated list in an X-Forwarded-For no-transform HTTP header; directive is present (see the proxy must behave transparently 3.1.2 no-transform directive in Request ) unless it is they are able positively to determine that the user agent is a Web browser. The mechanism by which the a proxy recognizes the user agent as a Web browser should use evidence from the HTTP request, in particular the User-Agent and Accept headers.

the HTTP method

3.1.5 Alteration of the request. HTTP Header Values

Proxies Other than to comply with transparent HTTP operation, proxies should not alter HTTP requests modify request headers unless:

  1. unaltered headers the user would be prohibited from accessing content as a result in of the user's request being rejected by server responding that the origin server; an unaltered request body is not consistent with the origin server's requirements in respect "unacceptable" (see 3.3.3 Server Rejection of Internet content type or character encoding (as may happen, for example, if the proxy has transformed an HTML form that results in this request); HTTP Request );

  2. the user has specifically requested a restructured version desktop experience;

  3. the request is part of a desktop presentation. sequence of requests to the same Web site and either it is technically infeasible not to adjust the request because of earlier interaction, or because doing so preserves consistency of user experience.

Note: Rejection

In this section, the concept of a request by a server "Web site" is taken to mean both a HTTP 406 Status as well used (rather than "origin server") as HTTP 200 Status, with content indicating that some origin servers host many different Web sites. Since the request cannot be handled - e.g. "Your browser concept of "Web site" is not supported" strictly defined, proxies should use heuristics including comparisons of domain name to assess whether resources form part of the same "Web site".

Editorial Note:

These circumstances are detailed in the following sections.

3.1.5.2 Avoiding "Request Unacceptable" Responses

A transforming proxy may convert reissue a HEAD request into with altered HTTP header values if a GET previous request if it requires the response body to determine the characteristics of with unaltered values resulted in the transformed response that it would return were origin server rejecting the user agent subsequently to issue a GET request for that content. In this case, the as "unacceptable" (see 3.3.3 Server Rejection of HTTP Request ). A proxy should (providing such action is may apply heuristics of various kinds to assess, in accordance with normal HTTP caching rules) cache advance of sending unaltered header values, whether the response so that it is not required to send a second GET request is likely to the server. If, as cause a result of carrying out "request unacceptable" response. If it determines that this analysis the proxy remains unaware of the server's preferences and capabilities is likely then it should : Issue a request with may alter header values without sending unaltered headers and examine values in advance, providing that it subsequently assesses the response (see as described under 4.4 Proxy Response to User Agent 3.3.4 Receipt of Vary HTTP Header ); If it below, and is still in doubt, issue a prepared to reissue the request with altered unaltered headers, and alter its subsequent behavior in respect of the Web site so that unaltered headers are sent.

The A proxy must not issue re-issue a POST/PUT request with altered headers when the response to the unaltered POST/PUT request has HTTP status code 200 (in other words, it may only send the altered request for a POST/PUT request when the unaltered one was refused with a resulted in an HTTP 406 status). response, and not a "request unacceptable" response).

3.1.5.3 User Selection of Restructured Experience

The theoretical idempotency Proxies may offer users an option to choose to view a restructured experience even when a Web site offers a choice of GET requests is not always respected user experience. If a user has made such a choice then proxies may alter header values when requesting resources in order to reflect that choice, but must , on receipt of an indication from a Web site that it offers alternative representations (see 3.2.3.2 Indication of Intended Presentation Media Type of Representation ), inform the user of that and allow them to select an alternative representation.

Proxies should assume that by servers. In order, as far as possible, default users will wish to avoid mis-operation receive a representation prepared by the Web site. Proxies must assess whether a user's expressed preference for a restructured representation is still valid if a Web site changes its choice of such content, representations (see 3.3.4 Receipt of Vary HTTP Header ).

4.1.3 Proxy Indication 3.1.6 Additional HTTP Headers

Irrespective of its Presence the presence of a no-transform directive:

4.1.4 Altering Header Values If it has altered HTTP headers the proxy must include copies of the unaltered headers in the request in the form "X-Device-"<original header name> . For example, if it has altered the User-Agent header, an X-Device-User-Agent header must be added with the value of the received User-Agent header.

4.2 3.2 Server Response to Proxy

3.2.3 Varying Representations

Servers should take account of user agent capabilities and formulate an appropriate experience according to those criteria. capabilities. Servers should provide a means for users to select among available representations, should default to the last selected representation and should provide a means of changing the selection.

3.2.3.1 Use of Vary HTTP Header

If the a server varies its presentation representation according to examination of received HTTP headers then it must include a Vary HTTP header indicating this to be the case. If, in addition to, or instead of HTTP headers, the a server varies its presentation representation based on other factors (source (e.g. source IP Address ...) Address) then it must , in accordance with [RFC 2616 HTTP] , include a Vary header containing the value '*'.

If the server has distinct presentations that vary according to presentation media, then the medium for which the presentation is intended should be indicated. Editorial Note: The BPWG is studying the use of the link element of HTML which is used for this purpose. It is noted that the link element is not available in formats other than HTML, and it is noted that there is currently active discussion about the use of the Link HTTP header, which would serve this purpose well. If the server creates a specific user experience according to device characteristics or presentation media types it should inhibit transformation of the response by including a Cache-Control: no-transform directive. The server must include a Cache-Control: no-transform directive if one is received from the user agent. Note: Including a Cache-Control: no-transform directive can disrupt the behavior of WAP/WML proxies, because it can inhibit such proxies from converting WML to WMLC. Note: If the server is unable to add a Cache-Control HTTP headers, it may , in HTML documents, add a meta HTTP-Equiv element containing Cache-Control: no-transform . Servers may base their actions on knowledge of behavior of specific transforming proxies, as identified in a Via header, but should not choose a Content-Type an Internet content type for their a response based on their assumptions an assumption or heuristics about the heuristic behavior of any intermediaries. (e.g. a server should not choose content-type: Content-Type: application/vnd.wap.xhtml+xml solely on the basis that it suspects that proxies will not transform content of this type).

4.3 Proxy Receipt and Forwarding 3.2.3.2 Indication of Response from Server Intended Presentation Media Type of Representation

If HTTP header fields were altered in the request then a server has distinct representations that vary according to the proxy target presentation media type, it must should be prepared to re-issue the request in an unaltered form on receipt inhibit transformation of the response by including a Vary Cache-Control: no-transform header in directive (see 3.2.2 Server Origination of Cache-Control: no-transform ).

In HTML content it should indicate the response indicating that medium for which the server offers variants of its representation is intended by including a link element identifying the target presentation according to any media types of this representation by setting the HTTP header fields that have been modified. media attribute and set the href attribute to a valid local reference (i.e. use the fragment identifier (see [RFC 3986] Editorial Note: The BPWG is aware that more precision may be needed in section 3.5 ) added to the above statement. If URI of the document being served to point to a transforming proxy has followed valid target within the guidelines in this document, then document);

In addition it should not receive include link elements identifying the target presentation media types of other available representations by setting the media attribute to indicate those representations and set the href attribute to a response with URI without a Vary header if it has fragment identifier.

Note:

The presence of the link elements which do not already received such a response to contain a request with unaltered headers. valid local reference does not indicate one way or another whether this representation is formatted for the presentation media types listed.

Note:

Some examples of the use of the link element are included below in B Example Transformation Interactions .

4.4 3.3 Proxy Forwarding of Response to User Agent

3.3.1 Receipt of Cache-Control: no-transform

If the response includes a Cache-Control: no-transform directive then the response must remain unaltered other than to comply with transparent HTTP behavior and other than as follows.

If a proxy determines that the resource as currently represented is likely to cause serious mis-operation of the user agent then it may advise the user that this is the case and must provide the option for the user to continue with unaltered content.

3.3.3 Server Rejection of HTTP Request

For compatibility with servers that do not implement this Recommendation (see 3.2.1 Use of HTTP 406 Status ), a proxy may treat responses with an HTTP 200 Status as though they were responses with an HTTP 406 Status if it has determined that the content (e.g. "Your browser is not supported") is equivalent to a response with an HTTP 406 Status.

3.3.6 Proxy Decision to Transform

In the absence of a Vary or no-transform directive (or a meta HTTP-Equiv element containing Cache-Control: no-transform ) the proxy proxies should apply heuristics to the content response to determine whether it is appropriate to restructure or recode it (in the presence of such directives, heuristics should not be used.)

Examples of heuristics:

  • The server Web site (see note ) has previously shown that it is contextually aware, even if the present response does not indicate this;

  • a claim of mobileOK Basic [mobileOK Basic Tests] conformance is indicated;

  • the Content-Type or other aspects of the response are known to be specific to the device or class of device (e.g. for HTML documents the DOCTYPE is device;

    Examples of mobile specific DOCTYPEs

    • "-//OMA//DTD XHTML Mobile 1.2//EN", 1.2//EN"

    • "-//WAPFORUM//DTD XHTML Mobile 1.1//EN"

    • "-//WAPFORUM//DTD XHTML Mobile 1.0//EN"

    • "-//W3C//DTD XHTML Basic 1.1//EN" and

    • "-//W3C//DTD XHTML Basic 1.0//EN"); 1.0//EN")

  • the user agent has linearization or zoom capabilities or other features which allow it to present the content unaltered;

  • the URI of the response (following redirection or as indicated by the Content-Location HTTP header) indicates that the resource is intended for mobile use (e.g. the domain is *.mobi, wap.*, m.*, mobile.* or the leading portion of the path is /m/ or /mobile/);

  • the response contains client-side scripts that may mis-operate if the resource is restructured;

  • the response is an HTML response and it includes <link> elements specifying alternatives according to presentation media type.

5 4 Testing

Operators of transforming proxies should make available interfaces that facilitate testing of Web sites accessed through them and should make such interfaces available through normal Internet access paths.

A References

CT Landscape
Content Transformation Landscape 1.0, Jo Rabin, Andrew Swainston (eds), W3C Working Draft 25 October 2007 (See http://www.w3.org/TR/ct-landscape/ )
RFC 2119
Key words for use in RFCs to Indicate Requirement Levels, , Request for Comments: 2119, S. Bradner, March 1997 (See http://www.ietf.org/rfc/rfc2119.txt )
RFC 2616 HTTP
Hypertext Transfer Protocol -- HTTP/1.1 Request for Comments: 2616, R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, June 1999 (See http://tools.ietf.org/html/rfc2616 )
RFC 3986
Uniform Resource Identifier (URI): Generic Syntax, Request for Comments: 3986, T. Berners-Lee, R. Fielding, L. Masinter, January 2005 (See http://tools.ietf.org/html/rfc3986 )
Device Independence Glossary
W3C Glossary of Terms for Device Independence, Rhys Lewis (ed), W3C Working Draft 18 January 2005
Best Practices
Mobile Web Best Practices 1.0 Basic Guidelines, Jo Rabin, Charles McCathieNevile (eds), W3C Proposed Recommendation, 2 November 2006 1l: To update (See http://www.w3.org/TR/mobile-bp/ )
POWDER mobileOK Basic Tests
W3C mobileOK Basic Tests, Sean Owen, Jo Rabin (eds), W3C Protocol for Web Description Resources (POWDER) Working Group Home Page Draft, 10 June 2008 1l: To update (See http://www.w3.org/2007/powder/ http://www.w3.org/TR/mobileOK-basic10-tests/ )
XHR
The XMLHttpRequest Object, Anne van Kesteren (ed), W3C Working Draft, 15 April 2008 (See http://www.w3.org/TR/XMLHttpRequest/ )

B Example Transformation Interactions (Non-Normative)

Editorial Note1l: @@todo: some examples of common scenarios

C Applicability to Transforming Solutions which are Out of Scope (Non-Normative)

There are a number of well-known examples of solutions that seem to their users as though they are using a browser, but because the client software communicates with using proprietary protocols and techniques, it is the combination of the client and the in-network component that is regarded as the HTTP User Agent. The communication between the client and the in-network component is therefore out of scope of this document.

Additionally, where some kind of administrative arrangement exists between a transforming proxy and an origin server for the purposes of transforming content on the origin server's behalf, this is also out of scope of this document.

In both of the above cases, it is recommended that when forwarding requests to origin servers that proxies adhere to the provisions of this document in respect of providing information about the device and the original IP address.

D Scope for Future Work (Non-Normative)

B.1 D.1 POWDER

The BPWG believes that POWDER [POWDER] POWDER will represent a powerful mechanism by which a server may express transformation preferences. Future work in this area may recommend the use of POWDER. POWDER to provide a mechanism for origin servers to indicate more precisely which alternatives they have and what transformation they are willing to allow on them, and in addition to provide for Content Transformation proxies to indicate which services they are able to perform.

B.4 Inter Proxy Communication E Administrative Arrangements (Non-Normative)

There It is noted that there are means which fall outside of the scope for further work to define how multiple proxies may inter-operate. A common case of multiple proxies this document for establishing user preferences with content transformation proxies. It is where anticipated that proxies will maintain preferences on a network provider transforming proxy user by user and a search engine transforming proxy are both present. Web site by Web site basis, and will change their behavior in the light of changing circumstances as discussed under 3.3.4 Receipt of Vary HTTP Header .

C F Acknowledgments (Non-Normative)

The editors acknowledge editor acknowledges contributions of various kinds from members of the MWI BPWG Mobile Web Best Practices Working Group Content Transformation Task Force .

The editor acknowledges significant written contributions from:

Editorial Note1m: Needs final update