| LC-2090
   Luca Passani <passani@eunet.no>(archived comment) | Hi, I think that CTG should mention the fact that, in case of transcoding, no extra content should be injected without the consent of
 the original content owner. The idea is to avoid that W3C
 protocols/guidelines implicitly endorse the attempt by  those who
 manage the transcoder to monetize on the effort/investment of other
 people. Of course, there is also a point that injecting extra content
 will invariably affect usability negatively and as such should be avoided.
 
 I suggest the following addition:
 
 "4.3.6.3 Injection of external content
 In its effort to optimise the user experience of non-mobile optimised
 sites, a proxy *should not* inject extra content into the transcoded
 pages, where the term 'extra content' refers to text, links, banners
 and other multimedia content which is not available on the original
 untranscoded page. Addition of links aimed at implementing pagination
 and navigational shortcuts is admissible.
 
 Note: For clarity, it is emphasised that W3C does not endorse injection
 of third-party content into a transcoded page without the explicit
 consent of the content owner"
 
 Can this comment be added to the tracking system?
 
 Thank you
 
 Luca Passani
 | The goals of this specification is to provide guidance to Content Transformation proxies and Content Providers as to how inter-work when delivering Web content. In other words, the guidelines are focused on defining means for the various actors of the delivery chain to communicate their intent and expectations. 
 The details of how a Content Transformation proxy performs restructuring operations is out of scope of this specification. The notion of user experience is by essence vague, and one design may be regarded as providing a better user experience by some and a lesser one by someone else.
 
 The Working Group notes that alteration and thus injection of extra content is forbidden in responses served with a Cache-Control: no-transform.
 
 Content Providers who do not want their content to be altered in any way should use this directive.
 | no | 
|---|
| LC-2034
   Mark Baker <distobj@acm.org>(archived comment) | 4.1.1 Applicable HTTP Methods
 "Proxies should not intervene in methods other than GET, POST, HEAD and PUT."
 
 I can't think of any good reason for that.  If a request using an
 extension method wants to avoid transformation, it can always include
 the no-transform directive.
 | This "should not" note shows the scope of Content Transformation as discussed in the Guidelines Recommendation. It is not envisaged that a content transformation proxy will intervene in a HTTP CONNECT for example. Or that a content transformation proxy will transform anything in any WebDAV methods. In fact we don't envisage any intervention in PUT either, so we will drop this to clarify that the scope of the document is limited to web browsing, using GET, POST & HEAD requests and their responses. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-applicable-HTTP-methods
 | no | 
|---|
| LC-2036
   Mark Baker <distobj@acm.org>(archived comment) | 4.1.5 Alteration of HTTP Header Values
 RFC 2616 already says a lot about this. See sec 13.5.2 for example.
 
 "The theoretical idempotency of GET requests is not always respected
 by servers. In order, as far as possible, to avoid mis-operation of
 such content, proxies should avoid issuing duplicate requests and
 specifically should not issue duplicate requests for comparison
 purposes."
 
 First of all, do you mean "safe" or "idempotent"?  That you refer only
 to GET suggests safety, but the second sentence suggests you are
 referring to idempotency.  So please straighten that out.  Oh, and
 there's nothing "theoretical" about GET's safety or idempotency; it's
 by definition, in fact.
 
 Secondly, if the server changes something important because it
 received a GET request, then that's its problem.  Likewise, if it
 changes something non-idempotently because it received a PUT request,
 that's also something it has to deal with.  In both cases though, the
 request itself is idempotent (and safe with GET), so I see no merit to
 that advice that you offer ... unless of course the problem you refer
 to is pervasive which clearly isn't the case.
 
 I also wonder if most of 4.1.5 shouldn't just defer to 2616.  As is,
 large chunks of this section (as well as others) specify a protocol
 which is a subset of HTTP 1.1.  (see also the RFC 2119 comment above)
 | Based on our experience and feedback from servers whose operators take strong exception to the practice of repeating GETs, we think it is reasonable to advise content transformation proxies operators of this situation. We're not prohibiting reissuing requests, we're just observing that content providers don't like it. | no | 
|---|
| LC-2071
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.5 Bullet points one and 3 are get-out-of-jail-free cards  for non-transparent proxies to ignore no-transform and do other anti-
 social things. They should either be tightened up considerably, or
 removed.
 | What is now section 4.2.3 makes it clear that no-transform must be respected: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-cache-control-no-transform
 
 Bullets 1 and 3 only refer to alteration of the User-Agent and Accept-* headers and not to transformation of the response.
 | no | 
|---|
| LC-2073
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.5 "proxies should use heuristics including comparisons  of domain name to assess whether resources form part of the same "Web
 site."  I don't think the W3C should be encouraging vendors to
 implement yet more undefined heuristics for this task; there are
 several approaches already in use (e.g., in cookies, HTTP, security
 context, etc.); please pick one and refer to it specifically.
 | We are not aware of any satisfactory heuristics. We acknowledge the fact that Transformation Deployments will need to adopt heuristics of some kind, and that this must be left open. | no | 
|---|
| LC-2074
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.5.1 Proxies (and other clients) are allowed to and do  reissue requests; by disallowing it, you're profiling HTTP, not
 providing guidelines.
 | Based on our experience and feedback from servers whose operators take strong exception to this practice, we think it's reasonable to advise operators of CT-proxies of this situation. We're not prohibiting reissuing requests, we're just observing that content providers don't like it. | no | 
|---|
| LC-2075
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.5.2 Again, not specifying the heuristics is going to  lead to differences in behaviour, which will cause content authors to
 have to account for this as well.
 
 * Section 4.1.5.2 "A proxy must not re-issue a POST/PUT request..." Is
 this specific to POST and PUT, or all requests with bodies, or...?
 | We now limit the scope to HEAD GET and POST. We observe that duplicate POSTS are seen "in the wild" and think it important to point out to operators of content transformation proxies that this is problematical. 
 We acknowledge that not specifiying heuristics will lead to differences in behaviour. However, this is something that content transformation providers will need to do to provide the service they set out to provide.
 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-avoiding-request-unacceptable
 | no | 
|---|
| LC-2077
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.5.5 This is specifying new protocol elements; this is  becoming a protocol, not guidelines.
 | We are reflecting current practice as implemented by content transformation proxies. It is not our intention to create a new protocol, just to try to reduce the chaos that is currently perceived to be out there. 
 The newly introduced HTTP Header Fields have been provisionally registered with IANA:
 http://www.iana.org/assignments/message-headers/prov-headers.html
 | no | 
|---|
| LC-2083
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.3.3 Sniffing content for error messages is dangerous, and  also unlikely to work. E.g., will you sniff for all languages and all
 possible phrases? How will you avoid false positives? Remove this
 section and require content providers to get it right. People may
 still do this in their products, but there's no reason to codify it.
 | Sniffing content is an important part of the mechanism described in 4.1.5 so has to be mentioned here in some form. But we don't mean to propose this as a fail safe mechanism, we merely mean to indicate that Content Transformation proxies may need to employ heuristics to provide an improved service for their users. Therefore we have removed any reference to conforming servers. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-unacceptable-response
 | no | 
|---|
| LC-2067
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 3.4 / 3.5 "A [Content|Transformation] Deployment conforms to  these guidelines if it follows the statements..."  What does "follows"
 mean here -- if they conform to all MUST level requirements? SHOULD
 and MUST?
 | We agree that this is unclear. The guidelines now state that conformance applies to SHOULD statements as well and that a justification is required for each circumstance in which a SHOULD statement is not followed. Transformation Deployments willing to claim conformance to the spec must make available a conformance statement available as a separate document and referenced from the guidelines. 
 Check the updated version of the text:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-transformation-deployment-conformance
 | no | 
|---|
| LC-2069
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.3 "Proxies must act as though a no-transform directive  is present (see 4.1.2 no-transform directive in Request) unless they
 are able positively to determine that the user agent is a Web
 browser."  How do they positively" determine this? Using heuristics is
 far from a guaranteed mechanism. Moreover, what is the reasoning
 behind this? If the intent is to only allow transformation of content
 intended for presentation to humans, it would be better to say that.
 In any case, putting a MUST-level requirement on this seems strange.
 | We agree that there is no applicable mechanism to determine that the user agent is a Web browser, and have removed any normative statement from the section. 
 The section was substantially reworded and now refers to the notion of "Traditional Browsing".
 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-non-web-browsers
 | no | 
|---|
| LC-2072
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.5 What is a "restructured desktop experience"?
 | We agree and have added a term reference to the definition of "restructuring" and a cross reference to the section that describes the user selection of restructured experience. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-altering-header-values
 | no | 
|---|
| LC-2076
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.5.4 Use of the term 'representation' is confusing here;  please pick another one.
 
 * Section 4.1.5.4 Using the same headers is often not a good idea.
 More specific, per-header advice would be more helpful.
 | Ref 'representation', we agree and have used the term "included resources", as defined in the W3C mobileOK Basic Tests standard: http://www.w3.org/TR/mobileOK-basic10-tests/#included_resources
 
 Ref per-header advice, we agree and have clarified that we are only talking about keeping the User-Agent HTTP header field consistent.
 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-sequence-of-requests
 | no | 
|---|
| LC-2078
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.6.1 When a proxy inserts the URI to make a claim of  conformance, exactly what are they claiming -- all must-level
 requirements are met? Should-level? What is the use case for this
 information?
 | We agree and have clarified that inclusion of a Via comment of the form indicated is not a conformance claim, but is an indication that the proxy may restructure or otherwise modify content. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-via-headers
 | no | 
|---|
| LC-2079
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.2.1 Requiring servers to respond with 406 is profiling  HTTP; HTTP currently allows the server to send a 'default'
 representation even when the headers say that the client doesn't
 prefer it.
 | We agree and have moved server behavior into an "Informative Guidance for Origin Servers" non-normative appendix where we point out that servers should consider using an HTTP 406 Status if a request cannot be satisfied. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-server-use-of-406
 | no | 
|---|
| LC-2080
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.2.2 "Servers must include a Cache-Control: no-transform  directive if one is received in the HTTP request." Why?
 | We agree and have moved server behavior into an "Informative Guidance for Origin Servers" non-normative appendix where we point out that servers should consider including a Cache-Control: no-transform directive if one is received as it may be an indication that the client does not wish to receive a transformed response. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-cache-control-no-transform
 | no | 
|---|
| LC-2082
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.3.2 Why can't proxies transform something that has already  been transformed?
 | We agree and have replaced the section with a section that notes that intermediate proxies may add a Cache-Control: no-transform directive if they want to inhibit further transformation. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-proxy-use-of-no-transform
 | no | 
|---|
| LC-2084
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.3.4 What's the purpose behind this behaviour?
 | This section is part of the fail safe mechanism described in 4.1.5.2 Avoiding "Request Unacceptable" Responses. The reference to 4.1.5.2 was moved to the beginning of this section and the wording simplified. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-vary-header
 | no | 
|---|
| LC-2066
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 2.1 - "Alteration of HTTP requests and responses is not  prohibited by HTTP other than in the circumstances referred to in
 [RFC2616 HTTP] Section 13.5.2."  This isn't true; section 14.9.5 needs
 to be referenced here as well.
 | We agree that section 14.9.5 refers to this and have changed the reference accordingly. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-types-of-proxy
 | no | 
|---|
| LC-2068
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.2 "If the request contains a Cache-Control: no-transform  directive proxies must forward the request unaltered to the server,
 other than to comply with transparent HTTP behaviour and as noted
 below."  I'm not sure what this sentence means.
 | We agree and have added references to the revelant sections of RFC2616, as well as to the section of the guidelines that points out the HTTP header fields proxies should add. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-request-no-transform
 | no | 
|---|
| LC-2070
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.1.4 "Proxies should follow standard HTTP procedures in  respect to caching..."  This seems a strange way to phrase it, and I
 don't think it's useful to use RF2616 language here.
 | We agreed and have reworded the section to remove the weird use of normative terms to refer to RFC2616. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-serving-cached-responses
 | no | 
|---|
| LC-2081
   Mark Nottingham <mnot@mnot.net>(archived comment) | * Section 4.2.3.1 "Serves may base their actions on knowledge... but  should not choose an Internet content type for a response based on an
 assumption or heuristics about behaiour of any intermediaries." Why not?
 | Guidelines for origin servers were switched to an informative appendix. The text was clarified to point out that the Internet content type for a response should be correct for the actual content, and not chosen on the basis that the server suspects the proxy will not transform the content if it receives such an Internet media type. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-use-of-vary-header
 | no | 
|---|
| LC-2020
   casays <casays@yahoo.com>(archived comment) | 2) Section 4.3
 Following item to be added to the guidelines:
 
 A Content Transformation Proxy receiving a response that contains a
 non-empty meta-tag "Copyright" MUST NOT restructure or recode the
 content, nor dependent resources (such as pictures or videos, or other
 textual content).
 
 Rationale: The following content alterations may constitute willful
 copyright violations:
 a) Insertion of additional links, advertisements, navigation elements
 (e.g. scroll bars), or extraneous content.
 b) Modification of the look and feel (e.g. through reorganization of
 the page, filtering out elements such as pictograms).
 
 The following alterations may also constitute defacement of trade
 marks and other registered elements:
 c) Changing the representation of trademarks, logos and other
 registered design elements, as a change in the representation may
 affect its legibility, the colours or the colour palette.
 
 The following alterations may also constitute disactivation of or
 bypassing IPR protections:
 d) Re-encoding images or videos which embed steganographic IPR
 protection information may eliminate or render ineffective these
 mechanisms.
 
 A copyright meta-tag, in the absence of any other indication, is
 enough to signal that the content must not be transformed. This
 meta-tag is widely used in the WWW, and its inclusion in content as a
 meta-tag (invisible to end-users) is precisely intended to control
 automatic processing in the delivery chain.
 | We think that the presence or absence of a Copyright is not a clear indication of the rights associated with a Web page. | tocheck | 
|---|
| LC-2047
   casays <casays@yahoo.com>(archived comment) | 3) Cascaded proxies.
 a. Section 4.1.3
 
 Statement to be inserted:
 
 "Whenever the requester is another transformation proxy, the
 receiving proxy MUST treat it as a non-browser agent. The
 receiving proxy SHOULD rely upon the presence of alternative
 X-Device- HTTP fields and the values in the via HTTP field as
 per 4.1.6.1 to detect that it is placed downstream from a
 chain of proxies."
 
 
 
 b. Section 4.3.2
 
 Statement to be inserted:
 
 "As per section 14.46 of RFC2616, 214 Transformation applied
 MUST be added by an intermediate cache or proxy if it applies
 any transformation changing the content-coding (as specified
 in the Content-Encoding header) or media-type (as specified in
 the Content-Type header) of the response, or the entity-body
 of the response, unless this Warning code already appears in
 the response.
 
 A proxy receiving a 214 code MUST NOT change it."
 
 
 c. Section D.4
 
 Eliminate entirely.
 
 Rationale: together with 4.3.1, 4.3.2, 4.1.2, 4.1.5.5, 4.1.6.1,
 4.3.6.1, these changed sections entirely solve the issue of cascading
 proxies in a standards-compliant way.
 | Ref part a, we do not view the content transformation proxy as being a user agent in its own right, it is a proxy like any other. Knowing that it is upstream of other proxies doesn't alter its prescribed behaviour according to this document 
 Ref part b, we think that this is defined in HTTP and that we don't need to elaborate on it unless there are specific examples of mis-operation that we can refer to
 
 Ref part c, we disagree and think that this is very complex and requires a substantial use case analysis to achieve a complete understanding. We think that a more complex HTTP vocabulary for inter proxy operation is likely to be required to achieve useful results, and we are not chartered to create technology of that kind
 | tocheck | 
|---|
| LC-2049
   casays <casays@yahoo.com>(archived comment) | 5) Section 4.1.5.
 Statement to be added:
 
 "The request MUST NOT be altered Whenever the URI of the
 request indicates that the resource being accessed is able
 to provide mobile-optimized content, e.g. the domain is
 *.mobi, wap.*, m.*, mobile.*, pda.*, imode.*, iphone.*,
 or the leading portion of the path is /m/ or /mobile/."
 
 Rationale: The guidelines make the assumption that all
 requests may first undergo a transformation before possibly
 falling back on a transformationless mode of operation.
 This is unwarranted, and does not correspond to the way
 many deployed proxies operate.
 
 Obviously, it is rather pointless to go all the way to
 send a request to the server and wait for its response
 in order to detect whether the resources accessed are for
 mobile use, when it is already possible to do this by
 inspecting the request of the client. The addition to the
 guidelines covers this situation, and corresponds to the
 state of the art in transformation proxies. It is also
 consistent with the heuristic serving to determine whether
 a response is already mobile-optimized. Following this
 new guideline improves the performance of the entire
 content delivery chain without loss of functionality,
 and is congruent with the stated objective of the
 guidelines of not disturbing mobile-optimized content.
 | The decision to transform requests does not depend on the URI pattern as discussed under 4.1.5: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-altering-header-values
 | tocheck | 
|---|
| LC-2051
   casays <casays@yahoo.com>(archived comment) | 2) Sections A and D
 Since 2005, the Open Mobile Alliance has been working on a
 Standard Transcoding Interface, and has published specifications
 for it. The usage scenario is different: the STI is meant for
 servers offering transformation services on demand via a Web
 services interface, whereas the usage scenario of the CTG is
 for proxies that intercept all HTTP flows between clients and
 servers. However, there are several aspects that may overlap
 -- in the requirements or the definition of the acceptable
 limits during transcoding (e.g. content size). A reference
 to this standard, and a discussion of the relation between
 the CTG and the OMA specification is in order.
 | We have reviewed the specification and think there is insufficient overlap with this work. | tocheck | 
|---|
| LC-2054
   casays <casays@yahoo.com>(archived comment) | I posted the following message in the WMLProgramming mailing list.People have suggested that I publish it as a formal comment to the CTG
 draft, so here it is, under the heading "Allowing modifications of the
 HTTP header field user-agent: rationale missing".
 
 Eduardo Casais
 areppim AG
 Bern Switzerland
 ------------------
 
 I would like to review (a last time) an issue that reoccurs in all
 discussions about transcoders.
 
 > Changing User Agent or other headers is not prohibited by HTTP
 
 The first thing to stress is that the user-agent is essential to drive
 content selection and generation processes, both in the mobile Web and
 in the desktop Web.
 
 a) In the mobile Web, the user-agent is directly associated to the
 actual device, and hence serves as a key to characteristics such as
 screen dimensions, preferred content types, etc. The advent of
 uaprof/ccpp was supposed to make this mapping unncessary, but it is
 not the case: uaprof descriptions are often missing, point to invalid
 URL, omit important information, or are just plain unreliable. Device
 databases like WURFL, based on user-agent mappings, thus remain
 indispensible.
 b) In the desktop (non-mobile) Web, developers have long relied upon
 the user-agent to identify the browsers issuing requests in order to
 tailor content to their "quirks". This has been going on at least
 since the times of the Netscape / IE wars.
 
 Let us now examine the use cases of a mobile Web browser accessing the
 Internet, and evaluate the relevance of the user-agent -- assuming
 that transcoders systematically substitue the original value with a
 new one.
 
 1.a User-agent-switcher.
 The Web server is able, based on the user-agent, to
 provide a mobile-optimized or a full-web service.
 It therefore needs the original user-agent; modifying
 it is unhelpful.
 2.a Mobile Web only.
 2.a.1 Generic content.
 The server returns generic mobile content, without
 customizing it for any specific user-agent.
 This kind of applications is rare, and often
 corresponds to surviving examples of text-only
 services developed for older PDA and WAP 1 devices.
 Since the server does not use the original user
 agent, modifying it is useless.
 2.a.2 Mobile with default.
 The server returns mobile-optimized content. When
 not recognizing the user-agent, it returns a default,
 best-effort representation, perhaps with a message
 suggesting that the content is tailored for mobile
 devices.
 Since the server relies upon the user-agent, and is
 able to return a default representation, modifying it
 is unhelpful.
 2.a.3 No default.
 The server returns mobile-optimized content, but will
 return an error (page with "unsupported browser" warning
 or return code "request not acceptable") whenever it
 does not recognize the user-agent. In this case, modifying
 the original user-agent is most unhelpful, as it guarantees
 that the server will not recognize it as a valid
 mobile one. If the server does not, for whatever reason
 (e.g. incomplete device database), recognize a mobile
 user-agent, then there might be a case for modifying it
 towards an acceptable mobile one -- but transcoders
 precisely do the reverse: they change a mobile user-agent
 to an exotic full-Web one. Hence, a modification of the
 original user-agent is unhelpful all situations.
 3.a Full Web only.
 3.a.1 Generic content.
 The Web server serves generic full-Web content, without
 looking at the user-agent. In this case, modification of
 the original user-agent is useless.
 3.a.2 Tailored full-web with default.
 The server returns full-web content customized for specific
 full-web user-agents (e.g. IE 6.0, IE 7.0 and Firefox 2.0),
 and serves a default representation, perhaps with a warning
 ("This site is best viewed with the following browsers:...")
 for other user-agents. In this case, modification of the
 original user-agent is either useless (in any case a default
 representation will be returned), or unhelpful (the default
 representation is probably better downgradable than one
 specifically customized for a very specific full-Web browser).
 3.a.3 Tailored with no default.
 The server returns content tailored for specific full-Web
 browsers, and an error for other unrecognized or unsupported
 user-agents.
 Here there is a case to substitute the original user-agent to
 force retrieval of content. However, this works only if the
 "fake" user-agent precisely corresponds to one of those
 accepted by the server -- but transcoders do not tailor their
 substitute user-agents with respect to the application server:
 the include only general hints (like Mozilla/x.y) in the hope
 this is enough to determine content generation.
 Hence, the generic substitution of user-agents performed by
 transcoders is not appropriate here.
 
 Conclusion: in two cases, modification of the user-agent is useless,
 in three it is detrimental, in one it is either useless or
 detrimental, and in one it could be helpful, but it is currently done
 inappropriately.
 
 Let us consider the interesting symetric use-cases: a full-Web mobile
 device accessing the Internet.
 
 1.b User-Agent switcher
 Following the same reasoning as in 1.a, we find that
 modification of the original user-agent is unhelpful.
 2.b Mobile Web only.
 2.b.1 Generic content.
 Whatever user-agent, the server returns generic mobile-optimized
 content. A modification of the original user-agent is useless.
 2.b.2 Tailored with default.
 The server returns mobile-optimized content, and a default
 representation for unrecognized user-agent. Modifying it is
 therefore useless -- the default representation will be returned
 whether the original (full-Web) or the substitute (pseudo-full
 Web) agent appears in the request.
 2.b.3 Tailored, no default.
 Following the same reasoning as in 2.a.3, the substitution of
 original (full-Web) user-agent by a fake (full-Web) one is
 useless, as it will anyway return an error.
 3.b Full Web only
 3.b.1 Generic content.
 If the server returns generic full-Web content whatever the user
 agent, then modifications of the user-agent are useless.
 3.b.2 Tailored with default.
 Following the reasoning in 3.a.2, modifying the original
 full-Web user agent is either unhelpful (because the server
 could have recognized the mobile device's agent), or useless
 (the same default representation would be returned).
 3.b.3 Tailored, no default.
 Here the server may recognize the full-Web user-agent of the
 mobile device; it is therefore unhelpful to modify it. Or it
 might not support that specific user-agent, in which case it
 would be sensible to substitute one that is effectively
 supported by the server; however, this is not what transcoders
 do: they provide a generic, not a real user-agent instead --
 this is inappropriate.
 
 So one situation where it is detrimental, four where it is useless,
 one  where it is either useless or detrimental, and one where it is
 either useless or inappropriately done. It is also an acid test: do
 transcoders modify requests from full-Web capable mobile browsers? If
 so, something seriously weird is going on, as the excuse has generally
 been to make full-Web content available to non-full-Web capable devices.
 
 >From this examination, one can only conclude that proponents of the
 preservation of the original user-agent do not have to justify their
 position and established practice. Rather, the onus is on the
 proponents of the substitution of the user-agent to argue in favour of
 their approach, which disrupts established practice. There is
 basically only one use case where changing the mobile user agent to a
 desktop user agent might help, but it remains to demonstrate:
 
 a) The relevance of the scenario. Perhaps people at Google could let
 one of their crawlers roam over a few tens of thousands of WWW sites
 to gather statistics on the relative frequency of each aforementioned
 scenario.
 b) The benefits resulting from handling that specific scenario.
 c) That (a) and (b), taken together, are so overwhelming that they
 more than compensate the disruptions caused in all other use-cases.
 
 If another use case outside the framework I have presented here pops
 up, this does not reduce the need for an assessment based on (a), (b),
 (c).
 
 As a final remark, I would like to note that transcoders have been
 operating in the mobile Web for a long time. It started with
 adaptation of HTML for PDA (Web clipping) and HTML to HDML conversion,
 continued with HTML to WML, before arriving at the current crop of
 content adaptation. In the old times, developers of content adaptation
 software were wary of modifying the user-agent: turning generic WWW
 content into a form suitable for mobile devices is so fraught with
 difficulties that one would take every chance to let a server return
 mobile optimized content (based on the user-agent) if it could. It is
 only fairly recently that, without much justification, transcoders
 have started in a
 systematic way to overwrite the user-agent field.
 
 I think I have said everything I wanted regarding the CTG. The
 document  requires quite some rework -- nothing exceptional, since it
 is a draft. I will lean back and wait for the results of this round of
 revisions. Till then, readers of the WMLprogramming and W3C BPWG lists
 can rejoice in the knowledge that my long-winded posts are abating at
 last.
 
 
 E. Casais
 | Section 4.1.5 on alteration of HTTP Header Field Values remains substantially as in the previous version of the document, but has been reinforced by saying that proxies must not delete headers and that is must be possible for the server to reconstruct the original User Agent originated headers by using the X-Device-* HTTP header fields: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-altering-header-values
 
 We have strengthened section 4.2.6 Receipt of Vary HTTP Header Field:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-vary-header
 
 We have also introduce new guidelines in section 4.2.2 User Preferences to force proxies to provide a means for users to express their preferences for inhibiting content transformation:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-administrative-arrangements
 
 In addition, we have updated the conformance section to state that Transformation Deployments that choose to claim conformance with these guidelines need to spell out the circumstances in which they deviate from "should" clauses by providing a conformance statement that comes as a separate document referenced by the guidelines:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-transformation-deployment-conformance
 | tocheck | 
|---|
| LC-2005
   EdPimentl <edpimentl@gmail.com>(archived comment) | The styleguide should spell out very clearly "The Transcoder is NOTallowed to change the User-Agent String".
 | Section 4.1.5 on alteration of HTTP Header Field Values remains substantially as in the previous version of the document, but has been reinforced by saying that proxies must not delete headers and that is must be possible for the server to reconstruct the original User Agent originated headers by using the X-Device-* HTTP header fields: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-altering-header-values
 
 We have strengthened section 4.2.6 Receipt of Vary HTTP Header Field:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-vary-header
 
 We have also introduced new guidelines in section 4.2.2 User Preferences that forces proxies to provide a means for users to express their preferences for inhibiting content transformation:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-administrative-arrangements
 
 In addition, we have updated the conformance section to state that Transformation Deployments that choose to claim conformance with these guidelines need to spell out the circumstances in which they deviate from "should" clauses by providing a conformance statement that comes as a separate document referenced by the guidelines:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-transformation-deployment-conformance
 | tocheck | 
|---|
| LC-2006
   EdPimentl <edpimentl@gmail.com>(archived comment) | Original headers MUST not be changed (User-Agent string has a specialplace, but also the UAProf x-wap-profile is very very relevant).
 | The text surrounding which HTTP request headers can be altered and under what circumstances has been tightened up in another part of 4.1.5. However, section 4.1.5.5 remains - because if request headers have been altered, for whatever reason, it is useful for website technicians to be able to see the complete and original information from the device so that they can find out what is happening. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-original-headers
 | tocheck | 
|---|
| LC-2089
   Heiko Gerlach <heiko.gerlach@vodafone.com> | Old textRequest resource with original headers
 
 If the response is a 406 response:
 
 If the response contains Cache-Control: no-transform, forward it
 
 Otherwise re-request with altered headers
 
 If the response is a 200 response:
 
 If the response contains Vary: User-Agent, an appropriate link element or header, or Cache-Control: no-transform, forward it
 
 Otherwise assess whether the 200 response is a form of "Request Unacceptable"
 
 If it is not, forward it
 
 If it is, re-request with altered headers
 
 BUT WHERE IS THE TRANSCODING?
 New Text:
 
 Request resource with original headers
 
 If the response is a 406 response:
 
 If the response contains Cache-Control: no-transform, forward it
 
 Otherwise re-request with altered headers
 
 If the response is a 200 response:
 
 If the response contains Vary: User-Agent, an appropriate link element or header, or Cache-Control: no-transform, forward it
 
 Otherwise assess whether the 200 response is a form of "Request Unacceptable"
 
 If it is not, TRANSCODE it
 
 If it is, re-request with altered headers
 | We don't specify that Transcoding must take place so we have not adopted this amendment. | tocheck | 
|---|
| LC-1996
   Luca Passani <passani@eunet.no>(archived comment) | - the styleguide should spell out very clearly "The Transcoder is NOT allowed to change the User-Agent String".
 I understand that the current document says "do not change headers", but at the same time, there are clauses ("the user has specifically requested a restructured desktop experience") which would allow abusive transcoders to find an excuse and keep being abusive of the rights of content owners. Preventing transcoders from changing the UA string is an effective way to avoid this abuse.
 | Section 4.1.5 on alteration of HTTP Header Field Values remains substantially as in the previous version of the document, but has been reinforced by saying that proxies must not delete headers and that is must be possible for the server to reconstruct the original User Agent originated headers by using the X-Device-* HTTP header fields: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-altering-header-values
 
 We have strengthened section 4.2.6 Receipt of Vary HTTP Header Field:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-vary-header
 
 We have also introduces new guidelines in section 4.2.2 User Preferences that forces proxies to provide a means for users to express their preferences for inhibiting content transformation:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-administrative-arrangements
 
 In addition, we have updated the conformance section to state that Transformation Deployments that choose to claim conformance with these guidelines need to spell out the circumstances in which they deviate from "should" clauses by providing a conformance statement that comes as a separate document referenced by the guidelines:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-transformation-deployment-conformance
 | tocheck | 
|---|
| LC-1997
   Luca Passani <passani@eunet.no>(archived comment) | - original headers MUST not be changed (User-Agent string has a special place, but also the UAProf x-wap-profile is very very relevant). This makes it unnecessary to explain how original header values are recast to different headers (this is not supposed to happen in any case). In short, 4.1.5.5 should be removed.
 | The text surrounding which HTTP request headers can be altered and under what circumstances has been tightened up in another part of 4.1.5. However, section 4.1.5.5 remains - because if request headers have been altered, for whatever reason, it is useful for website technicians to be able to see the complete and original information from the device so that they can find out what is happening. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-original-headers
 | tocheck | 
|---|
| LC-1998
   Luca Passani <passani@eunet.no>(archived comment) | - the "|application/xhtml+xml" MIME type should be the basis for an heuristics that informs transcoders that no transcoding must be applied.
 The rationale for this is obvious: this MIME type is being used for
 mobile content virtually exclusively these days
 | A list of content type heuristics has been added to Appendix C, which is where the example content types associated with mobile content delivery have been moved. 
 The application/xhtml+xml is not among the content types listed in this Appendix, because although it is true that this content type has primarily been used to serve mobile content as of today, its meaning is broader than that and encompasses any kind of XHTML content.
 
 It should also be noted that transformation proxies need to be careful when employing these heuristics. For example, the application/xhtml+xml content type is the recommended content type for all XHTML and not just for mobile content (see http://www.w3.org/TR/xhtml-media-types/). Although it may only be used for mobile content as of today, there is no way to predict the future and no reason to restrict its meaning.
 
 The appendix is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-Mobile-Content-Types
 | tocheck | 
|---|
| LC-1999
   Luca Passani <passani@eunet.no>(archived comment) | - There should be restrictions over how short a  page transcoders are allowed to reformat.  In no case should a page smaller than 10kb be
 reformatted (ideally this threshold should be higher, but 10kb will make
 it consistent with BT, so it would be a step in the right direction)
 | Size of page on its own is not a safe indicator that a page is designed for mobile, so this heuristic has not been added to the working draft.  Some examples of pages where page size is not a good indicator of mobile friendliness include:  pages that consist of one large Flash animation, small pages linked off the main page (e.g., login pages), google.com, etc. | tocheck | 
|---|
| LC-2000
   Luca Passani <passani@eunet.no>(archived comment) | - Navigation bars: this is something that I would like to introduce in the Manifesto too. In no event should a transcoder add extra footers or
 headers (logos, extra navbars, advertisement and similar) without the
 consent of the content owner.
 | This restriction is not necessary. Content providers can use the Cache-Control: no-transform HTTP header if they want to make sure that additional content is not added to their pages. Proxies are forbidden from adding content to pages when this header is present. | tocheck | 
|---|
| LC-2003
   Luca Passani <passani@eunet.no>(archived comment) | Also, I see that CTG does not mention "whitelists". I think it should, since many transcoders manage that. The rule (consistently with the concept that transcoders must err on the side of not transcoding) should be that whitelists can only specify which potentially mobile sites can be forced to be trascoded (and not the other way around as happens to be common today, thus potentially forcing mobile developers to ask operators in different countries to whitelist their service, which is of course unacceptable).
 | We have had considerable discussion about "allow" and "disallow" lists and came to the conclusion that it was preferable to discuss a proxy's behavior rather than its (presumed) internal method of operation. Instead we refer to a notion that includes allow and disallow lists under 4.1.5 and 4.2.6. 
 This approach allows us to specify that servers have a way of overcoming mis-configuration without recourse to administrative contact with any operator of a proxy and without specifying the exact configuration mechanism, which is usually not open to public inspection or evaluation.
 
 See updated sections 4.1.5:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-altering-header-values
 ... and 4.2.6:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-vary-header
 | tocheck | 
|---|
| LC-2091
   Luca Passani <passani@eunet.no>(archived comment) | Consistently with my other comment that no extra content should be added to transcoded web sites, I think that this should apply even more
 strongly to mobile-optimised sites. Unfortunately, I see a lot of
 transcoder deployments where operators and/or transcoder vendors feel
 entitled to add advertisement and extra navigation bars to existing
 mobile optimisec ontent. Because of this, I suggest the following
 addition as a note to "4.3.1":
 
 "Note: It should be stressed that, in case of a |Cache-Control:
 no-transform| directive,  adding  any extra content (such as banners,
 navigation bars and links not available in the original application) is
 not admissable"
 
 Thank you
 
 Luca Passani
 | The Working Group agrees that adding any extra content to HTTP responses served with a Cache-Control: no-transform directive is not admissible. 
 The Working Group notes that injection of extra content is an alteration of the response, and that alteration of an HTTP response served with a Cache-Contol: no-transform is explicitly forbidden:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-cache-control-no-transform
 | tocheck | 
|---|
| LC-2017
   Terren Suydam <terren@singleclicksystems.com>(archived comment) | Hello,
 As the technical lead for SingleClick Systems mobile development, I'm
 writing to protest the W3C's failure to provide a clear rule against the
 modification of the User-Agent header.
 
 As mobile developers, my team spends a lot of time creating the mobile
 experience *we* want our users to see. If our users are subjected to the
 confusing experience of transcoding, we lose money.
 
 I urge the W3C to adopt the standards set forth by Luca Passani's
 Manifesto, of which I'm sure you're aware.
 
 Sincerely,
 Terren Suydam
 | Section 4.1.5 on alteration of HTTP Header Field Values remains substantially as in the previous version of the document, but has been reinforced by saying that proxies must not delete headers and that is must be possible for the server to reconstruct the original User Agent originated headers by using the X-Device-* HTTP header fields: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-altering-header-values
 
 We have strengthened section 4.2.6 Receipt of Vary HTTP Header Field:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-vary-header
 
 We have also introduce new guidelines in section 4.2.2 User Preferences to force proxies to provide a means for users to express their preferences for inhibiting content transformation:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-administrative-arrangements
 
 In addition, we have updated the conformance section to state that Transformation Deployments that choose to claim conformance with these guidelines need to spell out the circumstances in which they deviate from "should" clauses by providing a conformance statement that comes as a separate document referenced by the guidelines:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-transformation-deployment-conformance
 | tocheck | 
|---|
| LC-2064
   Elliotte Harold <elharo@metalab.unc.edu>(archived comment) | A purely editorial note: your markup is reusing the ID sec-purpose (perhaps others) more than once. This makes the document invalid:
 
 <a name="sec-purpose" id="sec-purpose">From the point of view of this
 document, Content Transformation is the
 manipulation in various ways, by proxies, of
 requests made to and content
 delivered by an origin server with a view to making
 it more suitable for mobile
 presentation.</a></p><p><a name="sec-purpose"
 id="sec-purpose">The W3C Mobile Web Best Practices Working Group neither
 approves nor disapproves of Content Transformation, but
 recognizes that is being deployed widely across
 mobile data access networks. The
 deployments are widely divergent to each other,
 with many non-standard HTTP
 implications, and no well-understood means either
 of identifying the presence of
 such transforming proxies, nor of controlling their
 actions. This document
 establishes a framework to allow that to
 happen.</a></p><p><a name="sec-purpose" id="sec-purpose">The overall
 objective of this document is to provide a means, as far as is
 practical, for users to be provided with at least a
 </a><a
 href="http://www.w3.org/TR/di-gloss/#def-functional-user-experience">"functional
 user experience"</a>
 <a href="#ref-DIGLOSS">[Device Independence
 Glossary]</a> of the Web, when mobile, taking into account the
 fact that an increasing number of content providers
 create experiences specially
 tailored to the mobile context which they do not
 wish to be altered by third
 parties. Equally it takes into account the fact
 that there remain a very large
 number of Web sites that do not provide a
 <em>functional user
 experience</em> when perceived on many mobile
 devices.</p>
 | We understand that the comment was triggered because of some misleading "View Selection Source" option in your browser. 
 The document was thoroughly checked and does not contain any duplicated ID.
 | tocheck | 
|---|
| LC-2018
   C. M. Sperberg-McQueen <cmsmcq@acm.org>(archived comment) | Would it perhaps be better to give this specification a more informativetitle, or at least some sort of informative subtitle?
 
 The phrase "Content Transformation" sounds to an uninitiated reader
 as if it could apply to anything from the use of the data manipulation
 language (e.g. SQL) in a database management system, to the use of
 XSLT, or the SAX or DOM interfaces, to transform XML documents, to
 the use of dynamic HTML techniques to transform data in the browser.
 
 Perhaps "Mobile Web Content Transformation"?  Or "Content Transformation
 for Mobile Presentation"?  Surely there are ways of making it easier
 for potential readers to see whether the document is relevant to their
 concerns or not.
 
 This isn't the first W3C spec to have such a generic title; the
 experience
 of the XML Schema specification, however, leads me to commend to you
 urgently the wisdom of have a more specific, more informative, less
 generic title for your document.
 
 --Michael Sperberg-McQueen
 W3C XML Activity
 | We agree and have changed the title of the document to "Guidelines for Web Content Transformation Proxies" | yes | 
|---|
| LC-2019
   casays <casays@yahoo.com>(archived comment) | 1) Section 4.1.1
 Add to the section:
 
 Proxies MUST NOT convert POST methods into GET ones, or vice-versa.
 
 Rationale: This kind of transformation may make exchanges between
 clients and servers inoperative. In particular, this kind of
 substitution has been known to cause problems for content downloading
 applications in the mobile Web.
 | Final resolution: - re. LC-2019, amend text on conversion between HEAD and GET to say that other conversions are not allowed, and resolve partial to LC-2019
 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-applicable-HTTP-methods
 | tocheck | 
|---|
| LC-2021
   casays <casays@yahoo.com>(archived comment) | 3) Section 4.3.6
 Under "Examples of mobile specific DOCTYPEs:", add:
 
 -//WAPFORUM//DTD WML 1.3//EN
 -//WAPFORUM//DTD WML 1.1//EN
 
 Rationale: WML is still in use in the mobile Web. Responses of this
 type are precisely the kind that should not be transformed, as WML is
 intrinsically targeted at mobile devices only. WML can also be
 delivered over HTTP, so the draft applies to this content as well.
 | The list of doctypes associated with mobile content was moved to Appendix D referenced by the second bullet in section 4.2.9 Proxy Decision to Transform. It contains the requested doctypes: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-Mobile-DOCTYPES
 | tocheck | 
|---|
| LC-2022
   casays <casays@yahoo.com>(archived comment) | 4) Section 4.3.6
 The proposed heuristics seem to fail completely for i-mode sites, because:
 a) i-Mode sites often do not have peculiar URL distinguishing them
 from (non-mobile) sites, and in any case the prefix imode.* is not
 included in the list of URI patterns to check for.
 b) i-Mode sites return mostly their content as text/html.
 c) i-Mode sites do not include a DOCTYPE.
 d) The markup for i-Mode does not cater for the utilization of the
 link element as proposed in the draft, which is therefore not included
 in i-Mode content.
 e) i-Mode servers do not have much use for the "no-transform"
 directive, and hence do not necessarily implement it.
 | i-Mode DOCTYPEs were added to the list of DOCTYPEs associated with mobile Content: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-Mobile-DOCTYPES
 | tocheck | 
|---|
| LC-2023
   casays <casays@yahoo.com>(archived comment) | 5) Section 4.3.6.1
 I miss any discussion or reference in the document about the issue of
 character encodings.
 
 Transforming content across different charsets is a mine-field and
 affects a number of aspects:
 a) Content may rely upon widely different character encodings,
 depending on the targetted devices and markets. In particular, the
 trio China -   Japan - Korea (CJK) continues to rely on a number of
 encodings (such as Shift_JIS, BIG5, etc) whose handling is a complex
 matter; for instance, there are not necessarily bijective mappings
 between these encodings and others, including UTF-8.
 b) Documents may have multi-encoding representations. Different
 encodings may be associated with external entities through the charset
 attribute (see HTML 4.0.1). How transformation proxies deal with such
 a situation is left undefined.
 c) Similarly, the draft does not explain what happens when a server
 associates an attribute accept-charset to a form, and whether proxies
 respect or manipulate such information.
 d) In i-Mode, and at least in the Softbank environment (Japan),
 unreserved character points in the character encoding space are used
 to represent pictograms. Any attempt to convert these characters
 directly will fail; they should therefore not be transformed, but
 preserved, taking into account the fact that the character points thus
 referred to differ between Unicode and Shift_JIS, and that DoCoMo and
 Softbank do not use the same code points for the same pictograms.
 
 A consequence of all this is that if a proxy does not operate natively
 with the character encoding of the content returned by the server, or
 is not able to ensure a bijective mapping between this encoding and
 other encodings it deals with, recurrent and irrecoverable problems
 will creep.
 A simple way that could go some way towards alleviating this risk
 would be to forbid any transformation if the server announces (either
 via the HTTP field Content-type: charset=..., the XML declaration, or
 a meta-tag) an encoding different from ASCII or perhaps UTF-8.
 | Character encoding alterations are out of scope of these guidelines. A note was added in 4.2.9.1 Alteration of Response: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-alteration-of-response
 | tocheck | 
|---|
| LC-2024
   casays <casays@yahoo.com>(archived comment) | 6) Section 4.3.6.2
 The possibility to break the end-to-end security of an HTTPS
 connection is unacceptable and must be forbidden. This jeopardizes the
 set-up of mobile e-commerce, which had difficulties to get established
 in part because of the point-to-point, hop-wise secure connection with
 WTLS, and makes a sham of security for other applications that require it.
 
 Besides, there is no guarantee that transformations performed by a
 proxy preserve the content being exchanged between client and server
 to a point that does not further disturb the secure exchange. As an
 example, there is no explicit prohibition in the draft against turning
 POST requests into GET ones, the resizing of images may make visual
 captchas unreadable, and reordering elements may make forms or
 security information difficult to figure out at the client side.
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2028
   casays <casays@yahoo.com>(archived comment) | c) Similary, the guidelines leave completely open the way of howto "provide the option to avoid decryption...", and do not
 require it to be an OSTENSIBLE one. If the users miss the
 alternate (or rather, the original) link, they may unwillingly
 and unconsciously access the server without the expected
 security.
 
 As an example, a small icon (perhaps representing a key) in a
 corner of the first page accessed via HTTPS, and linking to the
 end-to-end HTTPS link, fully conforms to the guidelines. How
 many users would notice it and understand its significance?
 | We have added text to this section that goes some way to addressing your concern | tocheck | 
|---|
| LC-2029
   casays <casays@yahoo.com>(archived comment) | d) Informing the user that there are security implications in the way he chooses to access the server, and providing him with
 an alternative link to it risks causing the following reactions:
 i. WWW-beginners may simply not bother reading the advice and
 always take the default action, which according to the
 guidelines seems to correspond to taking the less safe,
 point-to-point HTTPS connection.
 ii. Somewhat WWW-knowledgeable users, aware of the existence of
 Trojan horses and phishing, may reel at the invitation to try
 alternative links. If they are curious and examine the URI of
 the current page, they may further suspect foul play, as the
 rewritten URI may not match the one they accessed originally.
 iii. Expert WWW-users will understand the implications of the
 proxy set-up, but may be wary at using its services for HTTPS
 links -- after all, what is the guarantee that the proxy will
 not misuse or unintentionally disclose private information in
 a point-to-point connection? And if there is a proxy acting as
 middle-man, what is the guarantee that the end-to-end HTTPS
 link is actually an end-to-end one and the proxy is not just
 performing some other tricky manipulations?
 
 Overall, fiddling with HTTPS connections risks reducing, rather
 than increasing, the willingness of end-users to access the
 mobile Web. A relevant point is that these end-users may
 actually assign the fault with the untrustworthy connections
 to the content or application provider, rather than to the
 operator of the proxy.
 | We have added text to this section that goes some way to addressing your concern | tocheck | 
|---|
| LC-2030
   casays <casays@yahoo.com>(archived comment) | e) The guidelines allow the client to go through a firstpoint-to-point session establishment with the proxy, and if so
 desired, through a second end-to-end session establishment with the
 server.
 
 Establishing an HTTPS connection is a somewhat heavy process for
 wireless devices, requiring the delivery and possibly acceptance of
 certificates. A double initiation procedure reduces, rather than
 increases, usability at session start.
 | We have added text to this section that goes some way to addressing your concern | tocheck | 
|---|
| LC-2031
   casays <casays@yahoo.com>(archived comment) | f) In the absence of any requirements regarding the reliabilityof proxies and their operating environment, one can only
 wonder why anybody would choose a point-to-point connection
 through an uncontrollable middle-man over an end-to-end one
 if the intent is to access private information safely over
 the mobile Web. The experience of WTLS taught some hard lessons
 there.
 | We have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2032
   casays <casays@yahoo.com>(archived comment) | g) The guidelines rely upon a fundamentally flawed assumption:in the HTTPS connection, the client is the only party concerned
 with security, and which must take a decision as to whether to
 access resources over a point-to-point or end-to-end link.
 
 This is incorrect: there are actually two parties to the secure
 connection, client and server, both with legitimate security
 concerns. The server has thus as much a right to determine whether
 it wants to provide services over a point-to-point connection
 as the client. I can very well imagine that for instance
 banking, electronic commerce or social networking application
 servers may decide to sever point-to-point connections rather
 than providing services over them, and inform the end-user
 about the reasons.
 
 Unfortunately, because of the flawed assumption of the guidelines,
 there is strictly no way a server may reliably detect whether
 it is communicating over a point-to-point link or not.
 
 Consider:
 i. The proxy rewrites links but the replacement links must have
 HTTPS; hence for the server communication obviously takes place
 over HTTPS.
 ii. If the proxy preserves the HTTP header fields (such as
 user-agent, accept, accept-charset, etc), which is actually
 encouraged by the guidelines, then the proxy cannot detect
 that transformations may be taking place.
 iii. Further, the "via" HTTP header field does not constitute
 a proper mechanism to detect the presence of a transformation
 proxy, and whether HTTPS is point-to-point or end-to-end.
 First, the comment "http://www.w3.org/ns/ct" indicating the
 presence of a transformation proxy is not mandatory, as per
 the guidelines. Secondly, RFC2616 authorizes proxies to use
 a pseudonym instead of a domain name for the "received-by"
 part of their hop, which does not necessarily have a meaning
 for servers.
 
 The server is therefore not in a position to take educated
 decisions as to its secure communications with clients through
 a transformation proxy.
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2033
   casays <casays@yahoo.com>(archived comment) | Overall, the guidelines follow the rule that accessing theWWW is the prime intent of the end-user, and that security
 comes only second. Hence the approach of defaulting to the
 transformation chain, with the possibility of opting out of
 it. This is a questionable assumption precisely in the
 context of secure transactions. There, secure access is the
 paramount requirement, and must therefore be fulfilled by
 any proxy set-up, with the possibility to opt-in to the
 unsecure transformation chain.
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2045
   casays <casays@yahoo.com>(archived comment) | 1) Section 4.2.2:
 Statement to be inserted:
 
 "As per sections 13.5.2 and 14.9.5 of RFC2616, proxies MUST
 NOT modify neither the header fields Content-Encoding,
 Content-Range and Content-Type, nor the body originating
 from a server that includes a no-transform directive in
 its response. Proxies that do not follow this rule do not
 conform to the HTTP protocol."
 
 Rationale: there actually are transcoders which, despite
 no-transform directives, modify the body of the responses
 from server. The statement reminds the users of such proxies
 that they must be configured so as not to violate IETF
 standards.
 | The comment applies to section 4.2.3 in the latest draft, where it is emphasize that proxies must not alter content other than to comply with transparent HTTP behavior as described in RFC2616. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-receipt-of-cache-control-no-transform
 | tocheck | 
|---|
| LC-2046
   casays <casays@yahoo.com>(archived comment) | 2) Section 4.1.5.5
 Statement to be inserted:
 
 "Except when explicitly provided for by RFC2616 to comply
 with HTTP operations, a proxy MUST NOT delete HTTP header
 fields received upstream from the client or downstream
 from the server."
 
 Rationale: deployed transcoders have been known to filter
 out entire HTTP fields, preventing servers from performing
 adequate content delivery. In some environments, this
 behaviour seems to have affected x-wap-profile in particular.
 The statement makes it clear that deleting HTTP header fields
 is in violation of the Web standards.
 | We agree and have added a "proxies MUST NOT delete header fields" guideline to the section. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-original-headers
 | tocheck | 
|---|
| LC-2048
   casays <casays@yahoo.com>(archived comment) | 4) Section 4.3.6.
 Complete the statement:
 
 "the URI of the response (following redirection
 or as indicated by the Content-Location HTTP header)
 indicates that the resource is intended for mobile
 use (e.g. the domain is *.mobi, wap.*, m.*, mobile.*"
 
 ADD: 	, pda.*, imode.*, iphone.*,
 
 "or the leading portion of the path is /m/ or /mobile/);"
 
 Rationale: URL with pattern imode.* and pda.* have been in
 use for many years, and unambiguously indicate sites that
 are optimized for i-Mode devices or for PDA (Palm, PPC,
 IEMobile). URL of the form iphone.* have started to appear,
 providing experience specifically tailored to i-Phones; they
 do not need, and should not be transformed either.
 | On LC-2048, As discussed, the sole remaining URI Pattern is listed in Appendix E | tocheck | 
|---|
| LC-2050
   casays <casays@yahoo.com>(archived comment) | 1) Section 2.2.1:
 The CTG distinguishes between retructuring, recoding and
 optimization. This is a useful approach, and the distinction
 could be used more systematically across the document. However,
 without a formal definition of these terms, various parties
 are left with too much leeway when classifying some operations
 one or the other of the categories. This may entail inconsistencies
 regarding the interpretation of the guidelines.
 
 The guidelines should:
 a) Define formally each of the three categories, possibly on
 the basis of language theory. As an example, optimization seems
 to be related to equivalent token streams (for textual content),
 whereas recoding seems to deal with equivalent parse trees. Some
 operations are reversible, others are not. The W3C is home to
 technologies such as XSLT, so there should be competence there
 to help ground definitions on solid formal concepts. Basing such
 definitions on formal language theory is a suggestion, not a
 requirement; other formally grounded definitions are possible.
 b) Define exactly how to classify an operation that spans several
 categories. As an example, converting HTML to XHTML while at the
 same time eliminating comments and redundant white space should
 amount to a recoding.
 | Final resolutions: - Re LC-2050 move definitions to scope to clarify that we are talking only about restructuring
 - re LC-2050 we don't intend to define these concepts any more formally than we do now
 | tocheck | 
|---|
| LC-2052
   casays <casays@yahoo.com>(archived comment) | 3) Section 4.3.6
 The third bullet under "examples of heuristics" is to be split
 into two points:
 
 "the Content-Type of the response are known to be specific to the
 device or class of device. At a minimum, the following MIME types
 intended for mobile Web browsers MUST represent mobile-optimized
 content:
 
 Browsing XHTML-related
 application/vnd.wap.xhtml+xml
 application/xhtml+xml
 Browsing WML-related
 text/vnd.wap.wml
 application/vnd.wap.wmlc
 text/vnd.wap.wml+xml
 text/vnd.wap.wmlscript
 application/vnd.wap.wmlscriptc
 image/vnd.wap.wbmp
 application/vnd.wap.wbxml
 Browsing and downloading
 application/vnd.wap.multipart.mixed
 application/vnd.wap.multipart.related
 application/vnd.wap.multipart.alternative
 application/vnd.wap.multipart.form-data
 
 In addition, the following MIME types of the form */x-up-*
 SHOULD be considered as representing mobile-optimized
 content, at a minimum:
 
 Legacy Openwave
 image/x-up-wpng
 image/x-up-bmp
 
 The range of MIME types is intended to cover typical mobile
 browsing applications.
 
 Transformations specified by the relevant standards are allowed
 (WAP-236 WAE specifications 19.12.2001, WAP-192 WBXML specifications
 25.7.2001, WAP-191 WML specifications 19.2.2000 and predecessors,
 WAP-193 WMLScript specifications 25.10.2000).
 
 In accordance with Internet standards and practices, a proxy
 SHOULD determine whether a content is mobile-optimized FIRST by
 examining the HTTP header field content-type, before inspecting
 the XML declaration and its associated DOCTYPE."
 
 Rationale: Inspection of the HTTP field Content-type is an
 usual mode of operation amongst transcoders. It is also simpler
 and safer than applying heuristics on DOCTYPE, because inspecting
 the content of a body requires one to deal with character encoding
 issues (see RFC3023, XML 1.1 sections 4.3.3 and E), or parsing
 multipart-structured content; these are unnecessary when handling
 HTTP fields. Finally, specifying a minimum set of required MIME
 types to take into account helps ensure that proxies will exhibit a
 standard behaviour, and that non-textual content types for which
 there is no DOCTYPE (notably mobile-specific image formats) are
 properly dealt with. A normative document cannot leave full freedom
 to implementors to select whichever subset of content types are to
 be considered mobile-optimized or not.
 
 4) Section 4.3.6
 
 The second part of the bullet split as described in (b) is to contain
 the following:
 
 "other aspects of the response such as the DOCTYPE are known to be
 specific to the device or class of device.
 
 At a minimum, the following DOCTYPEs MUST be considered as
 mobile-specific:
 
 XHTML mobile profile
 -//OMA//DTD XHTML Mobile 1.2//EN
 -//WAPFORUM//DTD XHTML Mobile 1.1//EN
 -//WAPFORUM//DTD XHTML Mobile 1.0//EN
 XHTML basic
 -//W3C//DTD XHTML Basic 1.1//EN
 -//W3C//DTD XHTML Basic 1.0//EN
 -//OPENWAVE//DTD XHTML 1.0//EN
 -//OPENWAVE//DTD XHTML Mobile 1.0//EN
 XHTML i-Mode
 -//i-mode group (ja)//DTD XHTML i-XHTML (Locale/Ver.=ja/1.0) 1.0//EN
 -//i-mode group (ja)//DTD XHTML i-XHTML (Locale/Ver.=ja/1.1) 1.0//EN
 -//i-mode group (ja)//DTD XHTML i-XHTML (Locale/Ver.=ja/2.0) 1.0//EN
 -//i-mode group (ja)//DTD XHTML i-XHTML (Locale/Ver.=ja/2.1) 1.0//EN
 -//i-mode group (ja)//DTD XHTML i-XHTML (Locale/Ver.=ja/2.2) 1.0//EN
 [list completed in http://lists.w3.org/Archives/Public/public-bpwg-comments/2008JulSep/0150.html with:
 -//i-mode group (ja)//DTD XHTML i-XHTML (Locale/Ver.=ja/2.3)
 1.0//EN]
 Compact HTML
 -//W3C//DTD Compact HTML 1.0 Draft//EN
 -//BBSW//DTD Compact HTML 2.0//EN
 
 The following DOCTYPEs MUST be considered as mobile-specific.
 Transformations explicitly provided for by the relevant standards
 are allowed (WAP-192 WBXML specifications 25.7.2001, WAP-236 WAE
 specifications 19.12.2001, WAP-191 WML specifications 19.2.2000
 and predecessors, WAP-193 WMLScript specifications 25.10.2000).
 
 WML
 -//WAPFORUM//DTD WML 1.0//EN
 -//WAPFORUM//DTD WML 1.1//EN
 -//WAPFORUM//DTD WML 1.2//EN
 -//WAPFORUM//DTD WML 1.3//EN
 -//WAPFORUM//DTD WML 2.0//EN
 -//PHONE.COM//DTD WML 1.1//EN
 -//OPENWAVE.COM//DTD WML 1.3//EN
 
 The range of MIME types is intended to cover typical mobile
 browsing applications."
 
 Rationale: A normative document cannot leave full freedom to
 implementors to select whichever subset of DOCTYPEs are
 considered mobile-optimized or not. This helps ensure that
 transformation proxies exhibit a standard behaviour.
 | The list of Internet content types associated with mobile content is to be found in Appendix C, referenced by the third bullet in 4.2.9 Proxy Decision to Transform. It contains all the requested content types, except "application/xhtml+xml" as this content type cannot be unambiguously associated with mobile content. 
 The appendix is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-Mobile-Content-Types
 | tocheck | 
|---|
| LC-2053
   casays <casays@yahoo.com>(archived comment) | 5) Section 4.1.5.
 Statement to be added:
 
 "In so far as the transformation carried out by the proxies is
 to make content intended for a certain class A of devices
 available to devices of another class B, then requests MUST NOT
 be modified whenever a client of a certain class is accessing
 content intended for its class.
 
 If the class of request (either mobile-optimized or full-Web) is
 not unambiguously determined from the URI pattern, the proxy
 MUST take into account the original user-agent to avoid
 unnecessary transformations."
 
 Rationale: It is obviously pointless to transform full-Web
 content accessed by full-Web capable devices (or vice-versa,
 transforming mobile-optimized content for devices with mobile
 browsers). Two cases illustrate the situation.
 a) When full-Web devices such as advanced HTC PDAs, iPhones
 or tablets access the Web, there is no guarantee that an
 established server will include a no-transform directive; in
 fact, it might explicitly leave it out to allow transformation
 to cater for non-full-Web capable devices. Further, the
 proposed heuristics will not work: the MIME types of returned
 content will indicate full-Web content (e.g. text/html), as
 well as the DOCTYPE (e.g. -//W3C//DTD HTML 4.01//EN).
 b) When i-Mode terminal accessing i-Mode applications, there is
 no guarantee that the corresponding servers return a no-transform
 directive (since it is irrelevant for i-Mode applications).
 Heuristics may not work either, since content is largely returned
 as text/html, and without any DOCTYPE declaration.
 | Ref LC-2053, resolve partial and respond that we hope the current version of the document addresses this | tocheck | 
|---|
| LC-2065
   Dennis Bournique <db@wapreview.com>(archived comment) | My name is Dennis Bournique. I write about mobile browsing, primarily from a user perspective, at http://wapreview.com.  I've done a little web development, mostly mobile specific sites, but I'm by no means an expert on the technical side of this issue.
 Putting on my user hat, I'd like to make a request that the Content Transformation Guidelines include a requirement that content transformation proxies "must" provide end users (consumers of web content) with a way to turn off transformation both globally and on a site by site basis.
 
 As an end user, I’ve experienced both the joys and the frustrations of using content transformation proxies.
 
 In general, I believe in content transformation as a valuable tool to make web content, which would otherwise be difficult or impossible to use, available through the limited browsers of many mobile phones.
 
 I have also been frustrated when a carrier or content provider unilaterally imposes content transformation with no way for me to disable it. I've been unable to access content through content transformation proxies that was previously available on the same device using a direct connection. This has happened both with installable content such as midlets and ringtones and also with pure html and xhtml pages, including mobile optimized pages and those that are not.  I have also seen my secure end to end HTTPS traffic being forced through content transformation proxies, exposing it to the potential for a "man in the middle" attack.
 
 I understand that the Guidelines are intended to prevent these sorts of problems by specifying when content transformation proxies must allow content to flow directly between server and user agent without modification. This is good, but no technical solution can ever be perfect.  There will always be edge cases where content transformation does more harm than good. For this reason it is important that end users have the option to opt-out of content transformation.
 
 I propose that the Guidelines be amended to include the following or similar language.
 
 "...1. Content transformation proxies, if they are modifying traffic between a server and a user agent in any way, MUST provide a mechanism allowing the end user to resubmit the request and disable content transformation for the duration of the current session."
 
 "...2. Content transformation proxies, must provide a means for end users of that proxy to disable all content transformation until they take explicit action to re-enable it."
 | We agree and have modified the wording, and have added an appendix that spells out where the various user preference clauses are to be found in the document. 
 The appendix is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-Summary-User-Preference-Handling
 | tocheck | 
|---|
| LC-2004
   EdPimentl <edpimentl@gmail.com>(archived comment) | I am the founder of Goowallet a Mobile Banking / Payment private labelservice provider
 
 After reading the Last Call comments we are very concern that many of these recommendations will seriously impact security, privacy and trust.
 
 We are therefore 100% oppose to allowing Disrupting HTTPS they way transcoder do today is probably illegal and certainly unethical. HTTPS is built to guarantee end2end security.
 Breaking end2end security is probably illegal.
 Men in the Middle/Interfering with HTTPS should not be permissible under any circumstances.
 Making(allowing) it possible for an Operator to now attempt to dismantle the security of the internet in favor of transcoding, will seriously and significantly and negatively impact the banking and financial industry.
 Data protection rules and regulations. If allow, this will also impact the national security of all law abiding nations.
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2007
   EdPimentl <edpimentl@gmail.com>(archived comment) | The use of MUST on the CTG when referring to the role of the servershould not be allow, since irresponsible transcoding companies will use this to disrupt service and destroy the user experience set us back many years.
 We can accept RECOMMENDED, and only RECOMMENDED.
 | We agree and have removed the "Content Deployment" class of product. All normative statements that previously applied to content deployments are now listed in an "Informative Guidance for Origin Servers" non-normative appendix at the end of the document. 
 The updated definition of classes of product is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-classes-of-product
 
 The non-normative appendix for origin servers is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#d2e1536
 | tocheck | 
|---|
| LC-2044
   Jim Jewett <jimjjewett@gmail.com>(archived comment) | http://www.w3.org/TR/2008/WD-ct-guidelines-20080801/
 
 Section 4.1.3 ...
 
 ""'
 The mechanism by which a proxy recognizes the user agent as a Web
 browser should use evidence from the HTTP request, in particular the
 User-Agent and Accept headers.
 """
 
 Please clarify -- is this just the *existence* of those headers, or
 the specific values?  If it is the specific values, then please
 provide some guidance (or a normative alternative) that new user
 agents can use, before their names propagate to various whitelists.
 
 -jJ
 | We agree that there was no existing mechanism by which proxies may positively determine that the requesting agent is a Web browser and have replaced the normative statement by an informative warning. As a consequence, the text does not mention "use of evidence" anymore. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-non-web-browsers
 | tocheck | 
|---|
| LC-2009
   JOSE MANUEL CANTERA FONSECA <jmcf@tid.es>(archived comment) | 4.2.3.2
 " In HTML content it should indicate the medium for which the representation is intended by including a link element identifying in its media attribute the target presentation media types of this representation and setting the href attribute to a valid local reference (i.e. use the fragment identifier (see [RFC 3986]<http://www.w3.org/TR/2008/WD-ct-guidelines-20080801/#ref-rfc-3986> section 3.5<http://www.tools.ietf.org/html/rfc3986.html#section-3.5>) added to the URI of the document being served to point to a valid target within the document)."
 
 Why it has to be a fragment identifier within the page? If you do so, strictly speaking you are saying that an specific fragment of the current page is an alternative representation for the media handheld for the current page. That's not true, as the whole page is such representation.
 
 Proposed Amendment:
 
 
 As per RFC 3986 section 4.4 [Amended: was RFC 1808 initially] an empty relative URI href="" resolves to complete base URL, so it is suggested to use this mechanism to point to the current resource
 
 <link rel="alternate" media="handheld" type="text/html" href="" />
 
 (another option is to suggest the usage of the URI that points to the current resource. )
 
 Best Regards
 | We agree and have reworded this section (now to be found in Appendix H.1.4.2) substantially based on your comment. We now refer to the "Same-Document Reference" definition in RFC3986. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-use-of-link-element
 | tocheck | 
|---|
| LC-2010
   JOSE MANUEL CANTERA FONSECA <jmcf@tid.es>on behalf of 4 (archived comment) | 4.2.3.2
 "In addition it should include link elements identifying the target presentation media types of other available representations by setting the media attribute to indicate those representations and the href attribute to a URI without a fragment identifier."
 
 This is totally wrong as I may  have other representations of the current resource (for example in RDF or as text) in specific sections of my page and in that case I could use a fragment identifier.
 
 Proposed Amendment: Avoid the suggestions about fragment identifiers as they are misleading
 
 Best Regards
 | This comment is reasonable but does not apply to the latest version of the guidelines: we do not propose to use fragment identifiers as a method to achieve identification of the target anymore. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-use-of-link-element
 | tocheck | 
|---|
| LC-2011
   JOSE MANUEL CANTERA FONSECA <jmcf@tid.es>(archived comment) | 4.2.3.2
 Note:
 
 "The presence of link elements which do not contain a valid local reference does not indicate one way or another whether this representation is formatted for the presentation media types listed."
 This note is useless, it says nothing.
 
 Proposed Amendment:
 
 As per my previous comments on this, the note should be dropped.
 
 Best Regards
 | We agree and have reworded the section (now to be found in Appendix H.1.4.2) substantially. The section now points out that use of a Vary HTTP header field should be preferred when more than one presentation media type is served from the same URI. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-use-of-link-element
 | tocheck | 
|---|
| LC-2001
   Luca Passani <passani@eunet.no>(archived comment) | - Messing with HTTPS should not be permissible under any circumstances. Disrupting HTTPS they way transcoder do today is probably illegal and
 certainly unethical. HTTPS is built to guarantee end2end security.
 Breaking end2end security is probably illegal and certainly not an
 activity that W3C should endorse in any way.
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2002
   Luca Passani <passani@eunet.no>(archived comment) | - The list of "safe" URL patterns should be improved to support iphone.* and  */iphone/
 | After considerable discussion the group decided not to recommend any URI patterns other than those listed in Appendix E. | tocheck | 
|---|
| LC-2016
   Luca Passani <passani@eunet.no>(archived comment) | Having look at the conversation you are having here, I think there are conflicting information about how HTTPS is handled by transcoding
 servers. I understand that not all transcoders work the same, but some
 do perform a man-in-the-middle-attack, and IMO this should not be
 endorsed by the W3C guidelines.
 
 The way many transcoders work is that they run instances of real web
 browsers (talking about tens or hundreds of Internet Explorer instances
 running in the memory of the server here). This means that there is no
 way for content owners to protect against transcoders simply because the
 server is talking to a legitimate web browser, exchanging real
 certificates, logging-in with real passwords, establishing secure SSL
 connetions and all the rest.
 
 The point of the Content Transformation Guidelines seems to be "some users may want to continue using the service at the cost of degrading
 security". Well, this is not up to the user to decide, I am afraid.
 HTTPS is also about non-repudiation and the fact that users must not be able to say "I did not do it" at a later stage. The fact that
 transcoders have found a technical way to by-pass HTTPS security does not mean that they have the right to do it. Nor does it mean that
 end-users can take advantage of it.
 
 Luca
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2037
   Mark Baker <distobj@acm.org>(archived comment) | I don't understand the need for 4.1.5.2.  The second paragraph inparticular seems overly specific, as proxies should obviously not be
 retrying POST requests unless an error - any error - was received.
 PUT messages can be retried because they're idempotent.
 | We agree and have removed all references to PUT. We also agree that it should not be necessary to point out that proxies should not be retrying POST requests, but also acknowledge that it has been done in existing transformation deployments and think the emphasis is needed.
 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-avoiding-request-unacceptable
 | yes | 
|---|
| LC-2038
   Mark Baker <distobj@acm.org>(archived comment) | The rest of the 4.1.5.* sections all seem to be basically "Here's somethings that some proxies do".  By listing them, are you saying these
 are good and useful things, i.e. best practices?  If so, perhaps that
 should be made explicit.
 | The document is not a set of best practices but a set of guidelines. | yes | 
|---|
| LC-2039
   Mark Baker <distobj@acm.org>(archived comment) | >From 4.1.5.4, "When requesting resources that form part of therepresentation of a resource (e.g. style sheets, images), proxies
 should  make the request for such resources with the same headers as
 the request for the resource from which they are referenced.".  Why?
 There may be lots of reasons for using different headers on these
 requests.  For example, I'd expect the Accept header to be different
 for a stylesheet than for an image.  What are you trying to accomplish
 with this restriction?
 | We agree and have clarified that we are only talking about keeping the User-Agent HTTP header field consistent across requests. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-sequence-of-requests
 | yes | 
|---|
| LC-2040
   Mark Baker <distobj@acm.org>(archived comment) | 4.1.5.5 defines a protocol.  This should be in an Internet Draft, notin a guidelines document.
 | We have requested provisional registration of the HTTP header fields specified in this section with IANA: http://www.iana.org/assignments/message-headers/prov-headers.html
 | yes | 
|---|
| LC-2041
   Mark Baker <distobj@acm.org>(archived comment) | 4.2.2 "Servers must include a Cache-Control: no-transform directive ifone is received in the HTTP request."  Why?  What does the
 transformability of a request body have to do with the
 transformability of the associated response body?
 | We agree and have moved server behavior into an "Informative Guidance for Origin Servers" non-normative appendix where we point out that servers should consider including a Cache-Control: no-transform directive if one is received as it may be an indication that the client does not wish to receive a transformed response. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-cache-control-no-transform
 | yes | 
|---|
| LC-2042
   Mark Baker <distobj@acm.org>(archived comment) | 4.3.2 "If the response includes a Warning: 214 Transformation AppliedHTTP header, proxies must not apply further transformation. "  Why?
 The transformation indicated by the warning may have been the result
 of a server-side transformation which a client-side proxy may deem
 suboptimal, and so want to retransform.  I see no problem with that.
 | We agree and have replaced the section with a guideline noting that intermediate proxies may add a Cache-Control: no-transform directive if they wish to inhibit further transformation by other proxies. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-proxy-use-of-no-transform
 | yes | 
|---|
| LC-2014
   Sean Owen <srowen@google.com>(archived comment) | 4.1.5.5 Since User-Agent has been the topic of some controversy incomments, just wanted to voice support for the recommendation as
 written here. While it is vital to preserve information about the
 mobile device, this does not imply that User-Agent cannot be changed
 if that information is otherwise preserved. Preserving the User-Agent
 through a transforming proxy is misleading; the request is *not*
 coming from a mobile device, but through a proxy. The origin server
 should be aware of this.
 | Thanks. The group notes that he does not view the combination of a User Agent and a content transformation proxy as a new User Agent when the client software is not inherently linked to the network component. When it is, the communication between the client and the network is out of scope of this document, as explained in: http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-applicability
 | tocheck | 
|---|
| LC-2015
   Sean Owen <srowen@google.com>(archived comment) | 4.3.6.2 I think the Note here is a good one, but may be worthexpanding, since it is apparently already unclear to some how HTTPS
 works here. The very purpose of HTTPS is to ensure that content is not
 modified or read by third parties in transit, which means a
 transforming proxy cannot jump into an HTTPS conversation between
 mobile device and origin server. So there's not actually a question of
 whether it's illegal or unethical -- it's simply not possible (unless
 you have cracked SSL). It can only create a secure connection between
 the mobile device and itself, and between itself and the origin
 server. This is indeed a situation that the end user needs to
 understand:
 
 I suggest wording along these lines, take it or leave it as you see fit --
 
 URIs which begin with the https scheme, when accessed, are secured
 against eavesdropping and modification by third parties by the SSL
 protocol. It is therefore not possible for a third-party transforming
 proxy to participate directly in such a connection between mobile
 device and origin server. Transforming proxies may still transform
 content of https resources, but at best, it involves creating a
 separate secure connection between device and proxy, and between proxy
 and origin server. These communications are secure but the secured
 content is of course visible to the transforming proxy. This may of
 course be undesirable to an end user.
 
 Therefore if a proxy rewrites https links, replacements links MUST at
 least use the https scheme as well, and the proxy MUST use https to
 communicate with the origin server. In addition the proxy MUST clearly
 advise the user that the potentially sensitive contents of the
 communication will be visible to the proxy, and must give the user an
 option to opt out.
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2085
   Thomas Roessler <tlr@w3.org>(archived comment) | Dom,
 thanks for your request for review.
 
 With respect to the guidelines regarding the rewriting of HTTPS
 URIs, we notice that any such rewriting will break any use of TLS
 for authenticating the client to the server (e.g., use of TLS client
 certificates). Similarly, any applications on top of HTTPS that rely
 on TLS channel bindings would detect the proxy's intervention as an
 attack, and lead to a broken user experience; see RFC 5056 for more
 details about channel bindings.
 
 We recommend that you discuss this aspect with the IETF TLS Working
 Group.
 
 Regards,
 | We agree and have added text that reflects your concerns and discussed with the IETF TLS Working Group: http://www.ietf.org/mail-archive/web/tls/current/msg02968.html
 | yes | 
|---|
| LC-2097
   Barry Leiba <leiba@watson.ibm.com>on behalf of IAB (archived comment) | To the W3C Mobile Web Best Practices Working Group:
 The Internet Architecture Board has reviewed the subject document, and notes that
 it has previously reviewed related work done in the IETF in the Open Pluggable
 Edge Services (OPES) Working Group.  In its preview and review of OPES work, the
 IAB expressed its concerns about privacy, control, monitoring, and accountability
 of such services in RFC 3238 [ http://tools.ietf.org/html/rfc3238 ].
 
 We have no specific architectural concerns with the "Content Transformation
 Guidelines" document as written; it does seem to take into account the questions
 raised during the OPES discussions.  We would like, though, to make that explicit
 by specifically documenting that you reviewed and considered the issues in RFC
 3238.
 
 Barry Leiba, for the Internet Architecture Board ( http://iab.org )
 | Thanks very much for your comment. We make specific reference to OPES work in the new revision. | tocheck | 
|---|
| LC-2025
   casays <casays@yahoo.com>(archived comment) | In general, I must state unequivocally that our experience withcurrent transformation proxies deployed throughout the world has
 always been negative, since all proxies seem to transform original
 mobile content regardless, with results ranging from passable to
 outrageously unusable.  The draft, while an interesting attempt to
 bring some order in the wild practices that abound in the mobile Web,
 is still vague and incomplete in several points, and thus, in its
 present form, may not stem some of the more egregious forms of
 transcoding we have witnessed so far.
 | We have attended to the main thrust of the comments here and the document reflects the commenters points more than it did at least | tocheck | 
|---|
| LC-2026
   casays <casays@yahoo.com>(archived comment) | a) Tthe guidelines state: "[...] and must provide theoption to avoid decryption and transformation of the
 resources the links refer to."
 
 This stipulation theoretically allows manipulations of the
 HTTPS stream that are not strictly related to decryption and
 transformation of the content.
 
 What is required is that the client may establish an HTTPS
 connection with the server in the exact, undisturbed context
 as if the proxy were a transparent one, performing no
 transformations whatsoever.
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2027
   casays <casays@yahoo.com>(archived comment) | b) The guidelines do not state that the users "must be advisedof the security implications of rewriting HTTPS links" BEFORE
 they have a chance to perform any operation with the target site.
 If the advice takes place after an operation, then users may
 unknowingly access the server through the point-to-point HTTPS
 connection instead of the end-to-end one.
 
 As an example, a small icon (perhaps representing a question
 mark) in a corner of the first page accessed via HTTPS, and
 pointing to a description of the consequences of the rewritten
 HTTPS links, fully conforms to the guidelines. How many users
 would notice it? How many would click on it, take the time to
 read its content fully (and understand it), before performing
 any further action?
 | We agree and have added text to this section that goes some way to addressing your concern. | tocheck | 
|---|
| LC-2008
   JOSE MANUEL CANTERA FONSECA <jmcf@tid.es>(archived comment) | 4.2.3.1
 If a server varies its representation according to examination of received HTTP headers then it must include a Vary HTTP header indicating this to be the case. If, in addition to, or instead of HTTP headers, a server varies its representation based on other factors (e.g. source IP Address) then it must, in accordance with [RFC 2616 HTTP]<http://www.w3.org/TR/2008/WD-ct-guidelines-20080801/#ref-HTTP>, include a Vary header containing the value '*'.
 
 What should contain the Vary HTTP Header when a server varies its representation according to examination of received HTTP headers?
 
 Best Regards
 | Text, now to be found in a non-normative Appendix H.1.4.1, updated to defer to RFC2616. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-use-of-vary-header
 | tocheck | 
|---|
| LC-2012
   JOSE MANUEL CANTERA FONSECA <jmcf@tid.es>(archived comment) | Introduction
 "From the point of view of this document, Content Transformation is the manipulation in various ways, by proxies, of requests made to and content delivered by an origin server with a view to making it more suitable for mobile presentation."
 
 It took me three times to read the sentence in order to understand it. I think the sentence can be simplified
 
 Proposed Amendment
 
 Convert the sentence in something clearer.
 | The introduction was reworded in terms of user experience. | tocheck | 
|---|
| LC-2013
   JOSE MANUEL CANTERA FONSECA <jmcf@tid.es>(archived comment) | On section 4.3.6 it is mentioned the possibility of also checking the existence of meta HTTP-Equiv directives on the HTML response in addition to standard HTTP headers. However, this should be explicitly clarified and if so should apply to any server-generated header.
 Proposed Amendment:
 
 Clarify explictly if  proxies should check standard HTTP headers or meta HTTP-Equiv headers or both.
 
 Best Regards
 | We agree. Section 4.2. Proxy Forwarding of Response to User Agent now starts with a guideline that points out the equivalence between meta element and the relevant HTTP header field when the relevant HTTP header field is not present. 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#sec-Proxy-Response
 | tocheck | 
|---|
| LC-1995
   Julian Reschke <julian.reschke@gmx.de>(archived comment) | "D.2 link HTTP Header
 The BPWG believes that the link HTTP header which was removed from
 recent drafts of HTTP, and which is under discussion for
 re-introduction, would represent a more general and flexible mechanism
 than use of the HTML link element, as discussed in this recommendation."
 
 This is totally misleading.
 
 The link header was removed in RFC2616 (RFC, not a draft), and that was
 in 1999 (so, not "recent").
 
 BR, Julian
 | We agree and replaced the reference to "recent drafts of HTTP" by "HTTP/1.1" 
 The updated text is available at:
 http://www.w3.org/TR/2009/WD-ct-guidelines-20091006/Overview.html#d2e1677
 | tocheck | 
|---|
| LC-2043
   Mark Baker <distobj@acm.org>(archived comment) | Here's my comments.  In summary, the group really needs to decidewhether this is a guidelines document, or a protocol.  It can't be
 both.  A lot of work remains.
 | Thanks for your comment. We have tried hard in the new revision to make sure that it is a guidelines document. | yes | 
|---|