From 4bfd864f10b68b71482b35c818559068ef8d5797 Mon Sep 17 00:00:00 2001 From: Thomas Voss Date: Wed, 27 Nov 2024 20:54:24 +0100 Subject: doc: Add RFC documents --- doc/rfc/rfc9620.txt | 1682 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 1682 insertions(+) create mode 100644 doc/rfc/rfc9620.txt (limited to 'doc/rfc/rfc9620.txt') diff --git a/doc/rfc/rfc9620.txt b/doc/rfc/rfc9620.txt new file mode 100644 index 0000000..096877e --- /dev/null +++ b/doc/rfc/rfc9620.txt @@ -0,0 +1,1682 @@ + + + + +Internet Research Task Force (IRTF) G. Grover +Request for Comments: 9620 +Updates: 8280 N. ten Oever +Category: Informational University of Amsterdam +ISSN: 2070-1721 September 2024 + + + Guidelines for Human Rights Protocol and Architecture Considerations + +Abstract + + This document sets guidelines for human rights considerations for + developers working on network protocols and architectures, similar to + the work done on the guidelines for privacy considerations (RFC + 6973). This is an updated version of the guidelines for human rights + considerations in RFC 8280. + + This document is a product of the Human Right Protocol Considerations + (HRPC) Research Group in the IRTF. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Research Task Force + (IRTF). The IRTF publishes the results of Internet-related research + and development activities. These results might not be suitable for + deployment. This RFC represents the consensus of the Human Rights + Protocol Considerations Research Group of the Internet Research Task + Force (IRTF). Documents approved for publication by the IRSG are not + candidates for any level of Internet Standard; see Section 2 of RFC + 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9620. + +Copyright Notice + + Copyright (c) 2024 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction + 2. Human Rights Threats + 3. Conducting Human Rights Reviews + 3.1. Analyzing Internet-Drafts Based on Guidelines for Human + Rights Considerations Model + 3.2. Analyzing Internet-Drafts Based on Their Perceived or + Speculated Impact + 3.3. Expert Interviews + 3.4. Interviews with Impacted Persons and Communities + 3.5. Tracing Impacts of Implementations + 4. Guidelines for Human Rights Considerations + 4.1. Intermediaries + 4.2. Connectivity + 4.3. Reliability + 4.4. Content Signals + 4.5. Internationalization + 4.6. Localization + 4.7. Open Standards + 4.8. Heterogeneity Support + 4.9. Adaptability + 4.10. Integrity + 4.11. Authenticity + 4.12. Confidentiality + 4.13. Security + 4.14. Privacy + 4.15. Anonymity and Pseudonymity + 4.15.1. Pseudonymity + 4.15.2. Unlinkability + 4.16. Censorship Resistance + 4.17. Outcome Transparency + 4.18. Accessibility + 4.19. Decentralization + 4.20. Remedy + 4.21. Miscellaneous Considerations + 5. Document Status + 6. Security Considerations + 7. IANA Considerations + 8. Research Group Information + 9. Informative References + Acknowledgements + Authors' Addresses + +1. Introduction + + This document outlines a set of human rights protocol considerations + for protocol developers. It provides questions that engineers should + ask themselves when developing or improving protocols if they want to + understand how their decisions can potentially influence the exercise + of human rights on the Internet. It should be noted that the impact + of a protocol cannot solely be deduced from its design, but its usage + and implementation should also be studied to form a full human rights + impact assessment. + + The questions are based on the research performed by the Human Rights + Protocol Considerations (HRPC) Research Group, which has been + documented before these considerations. The research establishes + that human rights relate to standards and protocols and offers a + common vocabulary of technical concepts that influence human rights + and how these technical concepts can be combined to ensure that the + Internet remains an enabling environment for human rights. With + this, the contours of a model for developing human rights protocol + considerations has taken shape. + + This document is an iteration of the guidelines that can be found in + [RFC8280]. The methods for conducting human rights reviews + (Section 3.2) and the guidelines for human rights considerations + (Section 3.3) in this document are being tested for relevance, + accuracy, and validity [HR-RT]. The understanding of what human + rights are is based on the "Universal Declaration of Human Rights" + [UDHR] and subsequent treaties that jointly form the body of + international human rights law [UNHR]. + + This document does not provide a detailed taxonomy of the nature of + (potential) human rights violations, whether direct or indirect / + long-term or short-term, that certain protocol choices might present. + In part, it is because this is highly context-dependent and also + because this document aims to provide a practical set of guidelines. + However, further research in this field would definitely benefit + developers and implementers. + + This informational document has consensus for publication from the + Internet Research Task Force (IRTF) Human Right Protocol + Considerations (HRPC) Research Group. It has been reviewed, tried, + and tested by both the research group as well as researchers and + practitioners from outside the research group. The research group + acknowledges that the understanding of the impact of Internet + protocols and architecture on society is a developing practice and is + a body of research that is still ongoing. This document is not an + IETF product and is not a standard. + +2. Human Rights Threats + + Threats to the exercise of human rights on the Internet come in many + forms. Protocols and standards may harm or enable the right to + freedom of expression; right to freedom of information; right to non- + discrimination; right to equal protection; right to participate in + cultural life, arts, and science; right to freedom of assembly and + association; right to privacy; and right to security. An end user + who is denied access to certain services or content may be unable to + disclose vital information about the malpractices of a government or + other authority. A person whose communications are monitored may be + prevented or dissuaded from exercising their right to freedom of + association or participate in political processes [Penney]. In a + worst-case scenario, protocols that leak information can lead to + physical danger. A realistic example to consider is when individuals + perceived as threats to the state are subjected to torture, extra- + judicial killing, or detention on the basis of information gathered + by state agencies through the monitoring of network traffic. + + This document presents several examples of how threats to human + rights materialize on the Internet. This threat modeling is inspired + by "Privacy Considerations for Internet Protocols" [RFC6973], which + is based on security threat analysis. This method is a work in + progress and by no means a perfect solution for assessing human + rights risks in Internet protocols and systems. Certain specific + human rights threats are indirectly considered in Internet protocols + as part of the security considerations [RFC3552]; however, privacy + considerations [RFC6973] or reviews, let alone human rights impact + assessments of protocols, are neither standardized nor implemented. + + Many threats, enablers, and risks are linked to different rights. + This is not surprising if one takes into account that human rights + are interrelated, interdependent, and indivisible. However, here + we're not discussing all human rights because not all human rights + are relevant to Information and Communication Technologies (ICTs) in + general and to protocols and standards in particular [Orwat]: + + | The main source of the values of human rights is the + | _International Bill of Human Rights_ that is composed of the + | _Universal Declaration of Human Rights_ (UDHR) [UDHR] along with + | the _International Covenant on Civil and Political Rights_ (ICCPR) + | [ICCPR] and the _International Covenant on Economic, Social and + | Cultural Rights_ (ICESCR) [ICESCR]. In the light of several cases + | of Internet censorship, the UN Human Rights Council Resolution + | 20/8 was adopted in 2012, affirming that "...the same rights that + | people have offline must also be protected online..." [UNHRC2016]. + | In 2015, the _Charter of Human Rights and Principles for the + | Internet_ [IRP] was developed and released [Jorgensen]. According + | to these documents, some examples of human rights relevant for ICT + | systems are _human dignity_ (Art. 1 UDHR), _non-discrimination_ + | (Art. 2), _rights to life, liberty and security_ (Art. 3), + | _freedom of opinion and expression_ (Art. 19), _freedom of + | assembly and association_ (Art. 20), _rights to equal protection, + | legal remedy, fair trial, due process, presumed innocent_ (Art. + | 7-11), _appropriate social and international order_ (Art. 28), + | _participation in public affairs_ (Art. 21), _participation in + | cultural life, protection of intellectual property_ (Art. 27), and + | _privacy_ (Art. 12). + + A partial catalog of human rights related to ICTs, including economic + rights, can be found in [Hill]. + + This is by no means an attempt to exclude specific rights or + prioritize some rights over others. + +3. Conducting Human Rights Reviews + + Ideally, protocol developers and collaborators should incorporate + human rights considerations into the design process itself (see + Section 3.1 ("Analyzing Internet-Drafts Based on Guidelines for Human + Rights Considerations Model")). This section provides guidance on + how to conduct a human rights review, i.e., gauge the impact or + potential impact of a protocol or standard on human rights. + + Human rights reviews can be done by any participant and can take + place at different stages of the development process of an Internet- + Draft. Generally speaking, it is easier to influence the development + of a technology at earlier stages than at later stages. This does + not mean that reviews at Last Call are not relevant, but they are + less likely to result in significant changes in the reviewed + document. + + Human rights reviews can be done by document authors, document + shepherds, members of review teams, advocates, or impacted + communities to influence the standards development process. IETF + documents can benefit from people with different knowledge, + perspectives, and backgrounds, especially since their implementations + can impact many different communities as well. + + Methods for analyzing technology for specific human rights impacts + are still quite nascent. Currently, five methods have been explored + by the human rights review team, often in conjunction with each + other. + +3.1. Analyzing Internet-Drafts Based on Guidelines for Human Rights + Considerations Model + + This analysis of Internet-Drafts uses the model as described in + Section 4. The outlined categories and questions can be used to + review an Internet-Draft. The advantage of this is that it provides + a known overview, and document authors can go back to this document + as well as [RFC8280] to understand the background and the context. + +3.2. Analyzing Internet-Drafts Based on Their Perceived or Speculated + Impact + + When reviewing an Internet-Draft, specific human rights impacts can + become apparent by doing a close reading of the draft and seeking to + understand how it might affect networks or society. While less + structured than the straight use of the human rights considerations + model, this analysis may lead to new speculative understandings of + links between human rights and protocols. + +3.3. Expert Interviews + + Interviews with document authors, active members of the working + group, or experts in the field can help explore the characteristics + of the protocol and its effects. There are two main advantages to + this approach: + + 1. It allows the reviewer to gain a deeper understanding of the + (intended) workings of the protocol. + + 2. It allows for the reviewer to start a discussion with experts or + even document authors, which can help the review gain traction + when it is published. + +3.4. Interviews with Impacted Persons and Communities + + Protocols impact users of the Internet. Interviews can help the + reviewer understand how protocols affect the people that use the + protocols. Since human rights are best understood from the + perspective of the rights-holder, this approach will improve the + understanding of the real-world effects of the technology. At the + same time, it can be hard to attribute specific changes to a + particular protocol; this is of course even harder when a protocol + has not been widely deployed. + +3.5. Tracing Impacts of Implementations + + The reality of deployed protocols can be at odds with the + expectations during the protocol design and development phase + [RFC8980]. When a specification already has associated running code, + the code can be analyzed either in an experimental setting or on the + Internet where its impact can be observed. In contrast to reviewing + the draft text, this approach can allow the reviewer to understand + how the specifications work in practice and potentially what unknown + or unexpected effects the technology has. + +4. Guidelines for Human Rights Considerations + + This section provides guidance for document authors in the form of a + questionnaire about protocols and how technical decisions can shape + the exercise of human rights. The questionnaire may be useful at any + point in the design process, particularly after the document authors + have developed a high-level protocol model as described in [RFC4101]. + These guidelines do not seek to replace any existing referenced + specifications but, rather, contribute to them and look at the design + process from a human rights perspective. + + Protocols and Internet Standards might benefit from a documented + discussion of potential human rights risks arising from potential + misapplications of the protocol or technology described in the + Request for Comments (RFC). This might be coupled with an + Applicability Statement for that RFC. + + Note that the guidance provided in this section does not recommend + specific practices. The range of protocols developed in the IETF is + too broad to make recommendations about particular uses of data or + how human rights might be balanced against other design goals. + However, by carefully considering the answers to the following + questions, document authors should be able to produce a comprehensive + analysis that can serve as the basis for discussion on whether the + protocol adequately takes specific human rights threats into account. + This guidance is meant to help the thought process of a human rights + analysis; it does not provide specific directions for how to write a + human rights considerations section (following the example set in + [RFC6973]). + + In considering these questions, authors will need to be aware of the + potential of technical advances or the passage of time to undermine + protections. In general, considerations of rights are likely to be + more effective if they have a purpose and specific use cases rather + than abstract, absolute goals. + + Also note that while the section uses the word "protocol", the + principles identified in these questions may be applicable to other + types of solutions (extensions to existing protocols, architecture + for solutions to specific problems, etc.). + +4.1. Intermediaries + + Question(s): Does your protocol depend on or allow for protocol- + specific functions at intermediary nodes? + + Explanation: The end-to-end principle [Saltzer] holds that certain + functions can and should be performed at "ends" of the network. + [RFC1958] states that "in very general terms, the community believes + that the goal is connectivity ... and the intelligence is end to end + rather than hidden in the network". There are new opportunities for + failure when a protocol exchange includes both endpoints and an + intermediary, especially when the intermediary is not under control + of either endpoint, or is even largely invisible to it, for instance, + as with intercepting HTTPS proxies [HTTPS-interception]. This + pattern also contributes to ossification because the intermediaries + may impose protocol restrictions -- sometimes in violation of the + specification -- that prevent the endpoints from using more modern + protocols, as described in Section 9.3 of [RFC8446]. + + Note that intermediaries are distinct from services. In the former + case, the third-party element is part of the protocol exchange; + whereas in the latter, the endpoints communicate explicitly with the + service. The client/server pattern provides clearer separation of + responsibilities between elements than having an intermediary. + However, even in client/server systems, it is often good practice to + provide for end-to-end encryption between endpoints for protocol + elements that are outside of the scope of the service, as in the + design of Messaging Layer Security (MLS) [RFC9420]. + + Example: Encryption between the endpoints can be used to protect the + protocol from interference by intermediaries. The encryption of + transport layer information in QUIC [RFC9000] and of the TLS Server + Name Indication (SNI) field [TLS-ESNI] are examples of this practice. + One consequence of this is to limit the extent to which network + operators can inspect traffic, requiring them to have control of the + endpoints in order to monitor their behavior. + + Impacts: + + * Right to freedom of expression + + * Right to freedom of assembly and association + +4.2. Connectivity + + Questions(s): Is your protocol optimized for low-bandwidth and high- + latency connections? Could your protocol also be developed in a + stateless manner? + + Considering the fact that network quality and conditions vary across + geography and time, it is also important to design protocols such + that they are reliable even on low-bandwidth and high-latency + connections. + + Impacts: + + * Right to freedom of expression + + * Right to freedom of assembly and association + +4.3. Reliability + + Question(s): Is your protocol fault tolerant? Does it downgrade + gracefully, i.e., with mechanisms for fallback and/or notice? Can + your protocol resist malicious degradation attempts? Do you have a + documented way to announce degradation? Do you have measures in + place for recovery or partial healing from failure? Can your + protocol maintain dependability and performance in the face of + unanticipated changes or circumstances? + + Explanation: Reliability and resiliency ensures that a protocol will + execute its function consistently and resistant to error, as + described, and will function without unexpected results. Measures + for reliability in protocols assure users that their intended + communication was successfully executed. + + A system that is reliable degrades gracefully and will have a + documented way to announce degradation. It will also have mechanisms + to recover from failure gracefully and, if applicable, will allow for + partial healing. + + It is important here to draw a distinction between random degradation + and malicious degradation. Some attacks against previous versions of + TLS, for example, exploited TLS' ability to gracefully downgrade to + non-secure cipher suites [FREAK] [Logjam]; from a functional + perspective, this is useful, but from a security perspective, this + can be disastrous. + + For reliability, it is necessary that services notify the users if a + delivery fails. In the case of real-time systems, in addition to the + reliable delivery, the protocol needs to safeguard timeliness. + + Example: In the modern IP stack structure, a reliable transport layer + requires an indication that transport processing has successfully + completed, such as given by TCP's ACK message [RFC9293]. Similarly, + an application-layer protocol may require an application-specific + acknowledgement that contains, among other things, a status code + indicating the disposition of the request (see [RFC3724]). + + Impacts: + + * Right to freedom of expression + + * Right to security + +4.4. Content Signals + + Question(s): Does your protocol include explicit or implicit + plaintext elements, in either the payload or the headers, that can be + used for differential treatment? Is there a way to minimize leaking + such data to network intermediaries? If not, is there a way for + deployments of the protocol to make the differential treatment + (including prioritization of certain traffic), if any, auditable for + negative impacts on net neutrality? + + Example: When network intermediaries are able to determine the type + of content that a packet is carrying, then they can use that + information to discriminate in favor of one type of content and + against another. This impacts users' ability to send and receive the + content of their choice. + + As recommended in [RFC8558], protocol designers should avoid the + construction of implicit signals of their content. In general, + protocol designers should avoid adding explicit signals for + intermediaries. In certain cases, it may be necessary to add such + explicit signals, but designers should only do so when they provide + clear benefit to end users (see [RFC8890] for more on the priority of + constituencies). In these cases, the implications of those signals + for human rights should be documented. + + Note that many protocols provide signals that are intended for + endpoints that can be used as implicit signals by intermediaries for + traffic discrimination, based on either the content (e.g., TCP port + numbers) or the sender/receiver (IP addresses). Where possible, + these should be protected from intermediaries by encryption. In many + cases (e.g., IP addresses), these signals are difficult to remove; + but in other cases, such as TLS Application Layer Protocol + Negotiation [RFC7301], there are active efforts to protect this data + [TLS-ESNI]. + + Impacts: + + * Right to freedom of expression + + * Right to non-discrimination + + * Right to equal protection + +4.5. Internationalization + + Question(s): Does your protocol or specification define text string + elements, in the payload or headers, that have to be understood or + entered by humans? Does your specification allow Unicode? If so, do + you accept texts in one character set (which must be UTF-8) or + several (which is dangerous for interoperability)? If charsets or + encodings other than UTF-8 are allowed, does your specification + mandate a proper tagging of the charset? Did you have a look at + [RFC6365]? + + Explanation: Internationalization refers to the practice of making + protocols, standards, and implementations usable in different + languages and scripts (see Section 4.6 ("Localization")). In the + IETF, internationalization means to add or improve the handling of + non-ASCII text in a protocol [RFC6365]. A different perspective, + more appropriate to protocols that are designed for global use from + the beginning, is the definition used by the World Wide Web + Consortium (W3C) [W3Ci18nDef]: + + | Internationalization is the design and development of a product, + | application or document content that enables easy localization for + | target audiences that vary in culture, region, or language. + + Many protocols that handle text only handle one charset (US-ASCII) or + leave the question of what coded charset and encoding are used up to + local guesswork (which leads, of course, to interoperability + problems). If multiple charsets are permitted, they must be + explicitly identified [RFC2277]. Adding non-ASCII text to a protocol + allows the protocol to handle more scripts, hopefully representing + users across the world. In today's world, that is normally best + accomplished by allowing only Unicode encoded in UTF-8. + + In current IETF practice [RFC2277], internationalization is aimed at + user-facing strings, not protocol elements, such as the verbs used by + some text-based protocols. (Do note that some strings are both + content and protocol elements, such as identifiers.) Although this + is reasonable practice for non-user visible elements, developers + should provide full and equal support for all scripts and charsets in + the user-facing features of protocols and for any content they carry. + + Example: See Section 4.6 ("Localization"). + + Impacts: + + * Right to freedom of expression + + * Right to political participation + + * Right to participate in cultural life, arts, and science + +4.6. Localization + + Question(s): Does your protocol uphold the standards of + internationalization? Have you made any concrete steps towards + localizing your protocol for relevant audiences? + + Explanation: "Localization refers to the adaptation of a product, + application or document content to meet the language, cultural and + other requirements of a specific target market (a 'locale')" + [W3Ci18nDef]. For our purposes, it can be described as the practice + of translating an implementation to make it functional in a specific + language or for users in a specific locale (see Section 4.5 + ("Internationalization")). Internationalization is related to + localization, but they are not the same. Internationalization is a + necessary precondition for localization. + + Example: The Internet is a global medium, but many of its protocols + and products are developed with certain audiences in mind that often + share particular characteristics like knowing how to read and write + in American Standard Code for Information Interchange (ASCII) and + knowing English. This limits the ability of a large part of the + world's online population from using the Internet in a way that is + culturally and linguistically accessible. An example of a standard + that has taken into account the view that individuals like to have + access to data in their preferred language can be found in [RFC5646]. + The document describes a way to label information with an identifier + for the language in which it is written. And this allows information + to be presented and accessed in more than one language. + + Impacts: + + * Right to non-discrimination + + * Right to participate in cultural life, arts, and science + + * Right to freedom of expression + +4.7. Open Standards + + Question(s): Is your protocol fully documented in a way that it could + be easily implemented, improved, built upon, and/or further + developed? Do you depend on proprietary code for the implementation, + running, or further development of your protocol? Does your protocol + favor a particular proprietary specification over technically + equivalent competing specification(s), for instance, by making any + incorporated vendor specification "required" or "recommended" + [RFC2026]? Do you normatively reference another standard that is + behind a paywall (and could you do without it)? Are you aware of any + patents that would prevent your standard from being fully implemented + [RFC8179] [RFC6701]? + + Explanation: The Internet was able to be developed into the global + network of networks because of the existence of open, non-proprietary + standards [Zittrain]. They are crucial for enabling + interoperability. Yet, open standards are not explicitly defined + within the IETF. On the subject, [RFC2026] states: + + | Various national and international standards bodies, such as ANSI, + | ISO, IEEE, and ITU-T, develop a variety of protocol and service + | specifications that are similar to Technical Specifications + | defined here [at the IETF]. National and international groups + | also publish "implementors' agreements" that are analogous to + | Applicability Statements, capturing a body of implementation- + | specific detail concerned with the practical application of their + | standards. All of these are considered to be "open external + | standards" for the purposes of the Internet Standards Process. + + Similarly, [RFC3935] does not define open standards but does + emphasize the importance of an "open process", i.e.: + + | ... any interested person can participate in the work, know what + | is being decided, and make [their] voice heard on the issue. + + Open standards (and open source software) allow users to glean + information about how the tools they are using work, including the + tools' security and privacy properties. They additionally allow for + permissionless innovation, which is important to maintain the freedom + and ability to freely create and deploy new protocols on top of the + communications constructs that currently exist. It is at the heart + of the Internet as we know it, and to maintain its fundamentally open + nature, we need to be mindful of the need for developing open + standards. + + All standards that need to be normatively implemented should be + freely available and with reasonable protection for patent + infringement claims so that they can also be implemented in open + source or free software. Patents have often held back open + standardization or been used against those deploying open standards, + particularly in the domain of cryptography [Newegg]. An exemption of + this is sometimes made when a standardized protocol normatively + relies on specifications produced by others Standards Development + Organizations (SDOs) that are not freely available. Patents in open + standards or in normative references to other standards should have a + patent disclosure [Note-well], royalty-free licensing + [Patent-policy], or some other form of fair, reasonable, and non- + discriminatory terms. + + Example: [RFC6108] describes a system for providing critical end-user + notifications to web browsers, which has been deployed by Comcast, an + Internet Service Provider (ISP). Such a notification system is being + used to provide near-immediate notifications to customers, such as to + warn them that their traffic exhibits patterns that are indicative of + malware or virus infection. There are other proprietary systems that + can perform such notifications, but those systems utilize Deep Packet + Inspection (DPI) technology. In contrast, that document describes a + system that does not rely upon DPI and is instead based on open IETF + standards and open source applications. + + Impacts: + + * Right to freedom of expression + + * Right to participate in cultural life, arts, and science + +4.8. Heterogeneity Support + + Question(s): Does your protocol support heterogeneity by design? + Does your protocol allow for multiple types of hardware? Does your + protocol allow for multiple types of application protocols? Is your + protocol liberal in what it receives and handles? Will it remain + usable and open if the context changes? + + Explanation: The Internet is characterized by heterogeneity on many + levels: devices, nodes, router scheduling algorithms, queue + management mechanisms, routing protocols, levels of multiplexing, + protocol versions and implementations, and underlying link layers + (e.g., point-to-point, multi-access links, wireless, Fiber + Distributed Data Interface (FDDI), etc.) in the traffic mix and in + the levels of congestion at different times and places. Moreover, as + the Internet is composed of autonomous organizations and ISPs, each + with their own separate policy concerns, there is a large + heterogeneity of administrative domains and pricing structures. As a + result, the heterogeneity principle proposed in [RFC1958] needs to be + supported by design [FIArch]. + + Heterogeneity support in protocols can, thus, enable a wide range of + devices and (by extension) users to participate on the network. + + Example: Heterogeneity significantly contributed to the success of + the Internet architecture [Zittrain]. There is a famous quote often + attributed to Niels Bohr: "Prediction is very difficult, especially + if it's about the future." This also holds true for future uses of + the Internet architecture and infrastructure. Therefore, as a rule + of thumb, it is important to -- as far as possible -- design your + protocol for different devices and uses, especially at lower layers + of the stack. However, if you choose not to do this, it could be + relevant to document the reasoning for that. + + Impacts: + + * Right to freedom of expression + + * Right to political participation + +4.9. Adaptability + + Question(s): Is your protocol written in a modular fashion, and does + it facilitate or hamper extensibility? In this sense, does your + protocol impact permissionless innovation? (See Section 4.7 ("Open + Standards").) + + Explanation: Adaptability is closely interrelated with permissionless + innovation: both maintain the freedom and ability to create and + deploy new protocols on top of the communications constructs that + currently exist. It is at the heart of the Internet as we know it, + and to maintain its fundamentally open nature, we need to be mindful + of the impact of protocols on maintaining or reducing permissionless + innovation to ensure that the Internet can continue to develop. + + Adaptability and permissionless innovation can be used to shape + information networks as groups of users prefer. Furthermore, a + precondition of adaptability is the ability of the people who can + adapt the network to be able to know and understand the network. + This is why adaptability and permissionless innovation are inherently + connected to the right to education and the right to science as well + as the right to freedom of assembly and association and the right to + freedom of expression, since it allows the users of the network to + determine how to assemble, collaborate, and express themselves. + + Example: WebRTC generates audio and/or video data. WebRTC can be + used in different locations by different parties; WebRTC's standard + Application Programming Interfaces (APIs) are developed to support + applications from different voice service providers. Multiple + parties will have similar capabilities. In order to ensure that all + parties can build upon existing standards, these need to be adaptable + and allow for permissionless innovation. + + Impacts: + + * Right to education + + * Right to science + + * Right to freedom of expression + + * Right to freedom of assembly and association + +4.10. Integrity + + Question(s): Does your protocol maintain, assure, and/or verify the + accuracy of payload data? Does your protocol maintain and assure the + consistency of data? Does your protocol in any way allow for the + data to be (intentionally or unintentionally) altered? + + Explanation: Integrity refers to the maintenance and assurance of the + accuracy and consistency of data to ensure it has not been + (intentionally or unintentionally) altered. + + Example: Integrity verification of data is important to prevent + vulnerabilities and attacks from on-path attackers. These attacks + happen when a third party (often for malicious reasons) intercepts a + communication between two parties, inserting themselves in the middle + and changing the content of the data. In practice, this looks as + follows: + + Alice wants to communicate with Bob. Alice sends a message to Bob, + which Corinne intercepts and modifies. Bob cannot see that the data + from Alice was altered by Corinne. Corinne intercepts and alters the + communication as it is sent between Alice and Bob. Corinne is able + to control the communication content. + + Impacts: + + * Right to freedom of expression + + * Right to security + +4.11. Authenticity + + Question(s): Do you have sufficient measures to confirm the truth of + an attribute of a single piece of data or entity? Can the attributes + get garbled along the way (see Section 4.13 ("Security"))? If + relevant, have you implemented IPsec, DNS Security (DNSSEC), HTTPS, + and other standard security best practices? + + Explanation: Authenticity ensures that data does indeed come from the + source it claims to come from. This is important to prevent certain + attacks or unauthorized access and use of data. + + At the same time, authentication should not be used as a way to + prevent heterogeneity support, as is often done for vendor lock-in or + digital rights management. + + Example: Authentication of data is important to prevent + vulnerabilities and attacks from on-path attackers. These attacks + happen when a third party (often for malicious reasons) intercepts a + communication between two parties, inserting themselves in the middle + and posing as both parties. In practice, this looks as follows: + + Alice wants to communicate with Bob. Alice sends data to Bob. + Corinne intercepts the data sent to Bob. Corinne reads (and + potentially alters) the message to Bob. Bob cannot see that the data + did not come from Alice but from Corinne. + + With proper authentication, the scenario would be as follows: + + Alice wants to communicate with Bob. Alice sends data to Bob. + Corinne intercepts the data sent to Bob. Corinne reads and alters + the message to Bob. Bob is unable to verify whether that the data + came from Alice. + + Impacts: + + * Right to privacy + + * Right to freedom of expression + + * Right to security + +4.12. Confidentiality + + Question(s): Does the protocol expose the transmitted data over the + wire? Does the protocol expose information related to identifiers or + data? If so, what does it reveal to each protocol entity (i.e., + recipients, intermediaries, and enablers) [RFC6973]? What options + exist for protocol implementers to choose to limit the information + shared with each entity? What operational controls are available to + limit the information shared with each entity? + + What controls or consent mechanisms does the protocol define or + require before personal data or identifiers are shared or exposed via + the protocol? If no such mechanisms or controls are specified, is it + expected that control and consent will be handled outside of the + protocol? + + Does the protocol provide ways for initiators to share different + pieces of information with different recipients? If not, are there + mechanisms that exist outside of the protocol to provide initiators + with such control? + + Does the protocol provide ways for initiators to limit the sharing or + expressing of individuals' preferences to recipients or + intermediaries with regard to the collection, use, or disclosure of + their personal data? If not, are there mechanisms that exist outside + of the protocol to provide users with such control? Is it expected + that users will have relationships that govern the use of the + information (contractual or otherwise) with those who operate these + intermediaries? Does the protocol prefer encryption over cleartext + operation? + + Explanation: Confidentiality refers to keeping your data secret from + unintended listeners [RFC3552]. The growth of the Internet depends + on users having confidence that the network protects their personal + data [RFC1984]. The possibility of pervasive monitoring and + surveillance undermines users' trust and can be mitigated by ensuring + confidentiality, i.e., passive attackers should gain little or no + information from observation or inference of protocol activity + [RFC7258] [RFC7624]. + + Example: Protocols that do not encrypt their payload make the entire + content of the communication available to the idealized attacker + along their path. Following the advice in [RFC3365], most such + protocols have a secure variant that encrypts the payload for + confidentiality, and these secure variants are seeing ever-wider + deployment. A noteworthy exception is DNS [RFC1035], as DNSSEC + [RFC4033] does not have confidentiality as a requirement. This + implies that, in the absence of the use of more recent standards like + DNS over TLS [RFC7858] or DNS over HTTPS [RFC8484], all DNS queries + and answers generated by the activities of any protocol are available + to the attacker. When store-and-forward protocols are used (e.g., + SMTP [RFC5321]), intermediaries leave this data subject to + observation by an attacker that has compromised these intermediaries, + unless the data is encrypted end-to-end by the application-layer + protocol or the implementation uses an encrypted store for this data + [RFC7624]. + + Impacts: + + * Right to privacy + + * Right to security + +4.13. Security + + Question(s): Did you have a look at "Guidelines for Writing RFC Text + on Security Considerations" [RFC3552]? Have you found any attacks + that are somewhat related to your protocol/specification yet + considered out of scope of your document? Would these attacks be + pertinent to the human-rights-enabling features of the Internet (as + described throughout this document)? + + Explanation: Security is not a single monolithic property of a + protocol or system but rather a series of related yet somewhat + independent properties. Not all of these properties are required for + every application. Since communications are carried out by systems + and access to systems is through communications channels, security + goals obviously interlock, but they can also be independently + provided [RFC3552]. + + Typically, any protocol operating on the Internet can be the target + of passive attacks (when the attacker can access and read packets on + the network) and active attacks (when an attacker is capable of + writing information to the network packets) [RFC3552]. + + Example: See [RFC3552]. + + Impacts: + + * Right to freedom of expression + + * Right to freedom of assembly and association + + * Right to non-discrimination + + * Right to security + +4.14. Privacy + + Question(s): Did you have a look at the guidelines described in + Section 7 of "Privacy Considerations for Internet Protocols" + [RFC6973]? Does your protocol maintain the confidentiality of + metadata? Could your protocol counter traffic analysis? Does your + protocol adhere to data minimization principles? Does your document + identify potentially sensitive data logged by your protocol and/or + for how long that needs to be retained for technical reasons? + + Explanation: Privacy refers to the right of an entity (normally a + person), acting on its own behalf, to determine the degree to which + it will interact with its environment, including the degree to which + the entity is willing to share its personal information with others + [RFC4949]. If a protocol provides insufficient privacy protection, + it may have a negative impact on freedom of expression as users self- + censor for fear of surveillance or find that they are unable to + express themselves freely. + + Example: See [RFC6973]. + + Impacts: + + * Right to freedom of expression + + * Right to privacy + + * Right to non-discrimination + +4.15. Anonymity and Pseudonymity + + Question(s): Does your protocol make use of identifiers? Are these + identifiers persistent? Are they used across multiple contexts? Is + it possible for the user to reset or rotate them without negatively + impacting the operation of the protocol? Are they visible to others + besides the protocol endpoints? Are they tied to real-world + identities? Have you considered "Privacy Considerations for Internet + Protocols" [RFC6973], especially Section 6.1.2? + + Explanation: Most protocols depend on the use of some kind of + identifier in order to correlate activity over time and space. For + instance: + + * IP addresses are used as an identity for the source and + destination for IP datagrams. + + * QUIC connection identifiers are used to correlate packets + belonging to the same connection. + + * HTTP uses cookies to correlate multiple HTTP requests from the + same client. + + * Email uses email addresses of the form example@example.com to + identify senders and receivers. + + In general, these identifiers serve a necessary function for protocol + operations by allowing them to maintain continuity. However, they + can also create privacy risks. There are two major ways in which + those risks manifest: + + * The identifier may itself reveal the user's identity in some way + or be tied to an identifier that does, as is the case when E.164 + (telephone) numbers are used as identifiers for instant messaging + systems. + + * While the identifier may not reveal the user's identity, it may + make it possible to link enough of a user's behavior to threaten + their privacy, as is the case with HTTP cookies. + + Because identifiers are necessary for protocol operation, true + anonymity is very difficult to achieve, but there are practices that + promote user privacy even when identifiers are used. + + Impacts: + + * Right to non-discrimination + + * Right to freedom of expression + + * Right to political participation + + * Right to freedom of assembly and association + +4.15.1. Pseudonymity + + In general, user privacy is better preserved when identifiers are + pseudonymous (not tied to a user's real-world identity). + + Example: In the development of the IPv6 protocol, it was discussed to + embed a Media Access Control (MAC) address into unique IP addresses. + This would make it possible for eavesdroppers and other information + collectors to identify when different addresses used in different + transactions actually correspond to the same node. This is why + standardization efforts like "Temporary Address Extensions for + Stateless Address Autoconfiguration in IPv6" [RFC8981] and MAC + address randomization [MAC-ADDRESS-RANDOMIZATION] have been pursued. + + Note that it is often attractive to try to create a pseudonym from a + persistent identifier. This can be very difficult to do correctly in + a way that does not allow for recovering the persistent identifiers. + + Example: A common practice in web tracking is to "encrypt" email + addresses by hashing them, thus allegedly making them "non-personally + identifying". However, because hash functions are public operations, + it is possible to do a dictionary search for candidate email + addresses and recover the original address [Email-hashing]. + +4.15.2. Unlinkability + + Even true pseudonymous identifiers can present a privacy risk if they + are used across a wide enough scope. User privacy is better + preserved if identifiers have limited scope both in time and space. + + Example: An example is the Dynamic Host Configuration Protocol (DHCP) + where sending a persistent identifier as the client name was not + mandatory but, in practice, done by many implementations before DHCP + [RFC7844]. + + Example: Third-party cookies in HTTP allow trackers to correlate HTTP + traffic across sites. This is the foundation of a whole ecosystem of + web tracking. Increasingly, web browsers are restricting the use of + third-party cookies in order to protect user privacy. + +4.16. Censorship Resistance + + Question(s): Does your protocol architecture facilitate censorship? + Does it include "choke points" that are easy to use for censorship? + Does it expose identifiers that can be used to selectively block + certain kinds of traffic? Could it be designed to be more censorship + resistant? Does your protocol make it apparent or transparent when + access to a resource is restricted and why it is restricted? + + Explanation: Governments and service providers block or filter + content or traffic, often without the knowledge of end users + [RFC7754]. For a survey of censorship techniques employed across the + world, see [RFC9505], which lays out protocol properties that have + been exploited to censor access to information. Censorship + resistance refers to the methods and measures to prevent Internet + censorship. + + Example: The current design of the Web has a number of architectural + choke points where it is possible for censors to intervene. These + include obtaining the control of the domain name itself, DNS blocking + either at the protocol layer or at the resolver, IP address blocking, + and blocking at the web server. There has been extensive work on + content distribution systems, which are intended to be more + censorship resistant; and some, such as BitTorrent, are in wide use. + However, these systems may have inferior reliability and performance + compared to the Web (e.g., they do not support active content on the + server). + + Example: Identifiers of content exposed within a protocol might be + used to facilitate censorship by allowing the censor to determine + which traffic to block. DNS queries, the "host" request header in an + HTTP request, and the Server Name Indication (SNI) in a Transport + Layer Security (TLS) ClientHello are all examples of protocol + elements that can travel in plaintext and be used by censors to + identify what content a user is trying to access [RFC9505]. Protocol + mechanisms such as Encrypted ClientHello [TLS-ESNI] or DNS over HTTPS + [RFC8484] that encrypt metadata provide some level of resistance to + this type of protocol inspection. Full traffic encryption systems, + such as Tor , can also be used by people to + access otherwise censored resources. + + Example: As noted above, one way to censor web traffic is to require + the server to block it or require ISPs to block requests to the + server. In HTTP, denial or restriction of access can be made + apparent by the use of status code 451, which allows server operators + and intermediaries to operate with greater transparency in + circumstances where issues of law or public policy affect their + operation [RFC7725]. If a protocol potentially enables censorship, + protocol designers should strive towards creating error codes that + capture different scenarios (e.g., blocked due to administrative + policy, unavailable because of legal requirements, etc.) to minimize + ambiguity for end users. + + Impacts: + + * Right to freedom of expression + + * Right to political participation + + * Right to participate in cultural life, arts, and science + + * Right to freedom of assembly and association + +4.17. Outcome Transparency + + Question(s): Are the intended and foreseen effects of your protocol + documented and easily comprehensible? Have you described the central + use case(s) for your protocol with a clear description of expected + behavior and how it may, or may not, impact other protocols, + implementations, user expectations, or behavior? Have you reviewed + other protocols that solve similar problems, or made use of similar + mechanisms, to see if there are lessons that can be learned from + their use and misuse? + + Explanation: Certain technical choices may have unintended + consequences. + + Example: Lack of authenticity may lead to lack of integrity and + negative externalities; of which, spam is an example. Lack of data + that could be used for billing and accounting can lead to so-called + "free" arrangements that obscure the actual costs and distribution of + the costs, for example, the barter arrangements that are commonly + used for Internet interconnection, and the commercial exploitation of + personal data for targeted advertising, which is the most common + funding model for the so-called "free" services such as search + engines and social networks. Unexpected outcomes might not be + technical but rather architectural, social, or economic. Therefore, + it is of importance to document the intended outcomes and other + possible outcomes that have been considered. + + Impacts: + + * Right to freedom of expression + + * Right to privacy + + * Right to freedom of assembly and association + + * Right to access to information + +4.18. Accessibility + + Question(s): Is your protocol designed to provide an enabling + environment for all? Have you looked at the W3C Web Accessibility + Initiative for examples and guidance [W3CAccessibility]? + + Explanation: Sometimes in the design of protocols, websites, web + technologies, or web tools, barriers are created that exclude people + from using the Web. The Internet should be designed to work for all + people, whatever their hardware, software, language, culture, + location, or physical or mental ability. When the Internet + technologies meet this goal, it will be accessible to people with a + diverse range of hearing, movement, sight, and cognitive ability + [W3CAccessibility]. + + Example: The HTML protocol as defined in [HTML] specifically requires + that every image must have an alt attribute (with a few exceptions) + to ensure images are accessible for people who cannot themselves + decipher non-text content in web pages. + + Another example is the work done in the AVT and AVTCORE Working + Groups in the IETF that enables text conversation in multimedia, text + telephony, wireless multimedia, and video communications for sign + language and lipreading (i.e., [RFC9071]). + + Impacts: + + * Right to non-discrimination + + * Right to freedom of assembly and association + + * Right to education + + * Right to political participation + +4.19. Decentralization + + Question(s): Can your protocol be implemented without a single point + of control? If applicable, can your protocol be deployed in a + federated manner? Does your protocol create additional centralized + points of control? + + Explanation: Decentralization is one of the central technical + concepts of the architecture of the Internet and is embraced as such + by the IETF [RFC3935]. It refers to the absence or minimization of + centralized points of control, a feature that is assumed to make it + easy for new users to join and new uses to unfold [Ziewitz]. It also + reduces issues surrounding single points of failure and distributes + the network such that it continues to function even if one or several + nodes are disabled. With the commercialization of the Internet in + the early 1990s, there has been a slow move away from + decentralization, to the detriment of the technical benefits of + having a decentralized Internet. For a more detailed discussion of + this topic, please see [Arkko]. + + Example: The bits traveling the Internet are increasingly susceptible + to monitoring and censorship from both governments and ISPs as well + as third (malicious) parties. The ability to monitor and censor is + further enabled by the increased centralization of the network that + creates central infrastructure points that can be tapped into. The + creation of peer-to-peer networks and the development of voice-over- + IP protocols using peer-to-peer technology in combination with + Distributed Hash Table (DHT) for scalability are examples of how + protocols can preserve decentralization [Pouwelse]. + + Impacts: + + * Right to freedom of expression + + * Right to freedom of assembly and association + +4.20. Remedy + + Question(s): Can your protocol facilitate a negatively impacted + party's right to remedy without disproportionately impacting other + parties' human rights, especially their right to privacy? + + Explanation: Providing access to remedy by states and corporations is + a part of the UN Guiding Principles on Business and Human Rights + [UNGP]. Access to remedy may help victims of human rights violations + in seeking justice or allow law enforcement agencies to identify a + possible violator. However, current mechanisms in protocols that try + to enable "attribution" to individuals impede the exercise of the + right to privacy. The former UN Special Rapporteur for Freedom of + Expression has also argued that anonymity is an inherent part of + freedom of expression [Kaye]. Considering the potential adverse + impact of attribution on the right to privacy and freedom of + expression, enabling attribution on an individual level is most + likely not consistent with human rights. + + Example: Adding personally identifiable information to data streams + as a means to enable the human right to remedy might help in + identifying a violator of human rights and provide access to remedy, + but this would disproportionately affect all users right to privacy, + anonymous expression, and association. Furthermore, there are some + recent advances in enabling abuse detection in end-to-end encrypted + messaging systems, which also carry some risk to users' privacy + [Messenger-franking] [Hecate]. + + Impacts: + + * Right to remedy + + * Right to security + + * Right to privacy + +4.21. Miscellaneous Considerations + + Question(s): Have you considered potential negative consequences + (individual or societal) that your protocol or document might have? + + Explanation: Publication of a particular RFC under a certain status + has consequences. Publication as an Internet Standard as part of the + Standards Track may signal to implementers that the specification has + a certain level of maturity, operational experience, and consensus. + Similarly, publication of a specification as an experimental document + not part of the Standards Track would signal to the community that + the document "may not be intended to be an Internet Standard, or it + may be intended for eventual standardization but not yet ready" for + wide deployment [RFC2026]. The extent of the deployment, and + consequently its overall impact on end users, may depend on the + document status presented in the RFC. See [RFC2026] and updates to + it for a fuller explanation. + +5. Document Status + + This research group document lays out best practices and guidelines + for human rights reviews of network protocols, architectures, and + other Internet-Drafts and RFCs. + +6. Security Considerations + + Article three of the "Universal Declaration of Human Rights" reads: + "Everyone has the right to life, liberty and security of person" + [UDHR]. This article underlines the importance of security and its + interrelation with human life and liberty; but since human rights are + indivisible, interrelated, and interdependent, security is also + closely linked to other human rights and freedoms. This document + seeks to strengthen human rights, freedoms, and security by relating + and translating these concepts to concepts and practices as they are + used in Internet protocol and architecture development. The aim of + this is to secure human rights and thereby improve the + sustainability, usability, and effectiveness of the network. The + document seeks to achieve this by providing guidelines as done in + Section 3 of this document. + +7. IANA Considerations + + This document has no IANA actions. + +8. Research Group Information + + The discussion list for the IRTF Human Rights Protocol Considerations + Research Group is located at the e-mail address: + . + + Information on the group and information on how to subscribe to the + list is at: . + + Archives of the list can be found at: + . + +9. Informative References + + [Arkko] Arkko, J., Trammell, B., Nottingham, M., Huitema, C., + Thomson, M., Tantsura, J., and N. ten Oever, + "Considerations on Internet Consolidation and the Internet + Architecture", Work in Progress, Internet-Draft, draft- + arkko-iab-internet-consolidation-02, 8 July 2019, + . + + [Email-hashing] + Acar, G., Englehardt, S., and A. Narayanan, "Four cents to + deanonymize: Companies reverse hashed email addresses", + April 2018, . + + [FIArch] Papadimitriou, D., Zahariadis, T., Martinez-Julia, P., + Papafili, I., Morreale, V., Torelli, F., Sales, B., and P. + Demeester, "Design Principles for the Future Internet + Architecture", The Future Internet, pp. 55-67, + DOI 10.1007/978-3-642-30241-1_6, January 2012, + . + + [FREAK] University of Michigan, "Tracking the FREAK Attack", + Wayback Machine archive, March 2015, + . + + [Hecate] Issa, R., Alhaddad, N., and M. Varia, "Hecate, Abuse + Reporting in Secure Messengers with Sealed Sender", 31st + USENIX Security Symposium (USENIX Security 22), pp + 2335-2352, August 2022, + . + + [Hill] Hill, R., "Partial Catalog of Human Rights Related to ICT + Activities", May 2014, + . + + [HR-RT] "IRTF-HRPC / reviews", commit 3f5fbff, December 2020, + . + + [HTML] WHATWG, "HTML Living Standard", August 2024, + . + + [HTTPS-interception] + Durumeric, Z., Ma, Z., Springall, D., Barnes, R., + Sullivan, N., Bursztein, E., Bailey, M., Halderman, J., + and V. Paxson, "The Security Impact of HTTPS + Interception", NDSS Symposium 2017, + DOI 10.14722/ndss.2017.23456, February 2017, + . + + [ICCPR] United Nations General Assembly, "International Covenant + on Civil and Political Rights", December 1966, + . + + [ICESCR] United Nations General Assembly, "International Covenant + on Economic, Social and Cultural Rights", December 1966, + . + + [IRP] Internet Rights and Principles Dynamic Coalition, "10 + Internet Rights & Principles", + . + + [Jorgensen] + Jørgensen, R. F., "An internet bill of rights", Research + Handbook on Governance of the Internet, edited by Ian + Brown. Cheltenham: Edward Elgar Publishing, + DOI 10.4337/9781849805025.00022, April 2013, + . + + [Kaye] Kaye, D., "Report of the Special Rapporteur on the + Promotion and Protection of the Right to Freedom of + Opinion and Expression, David Kaye", A/HRC/29/32, May + 2015, . + + [Logjam] Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., + Green, M., Halderman, J., Heninger, N., Springall, D., + Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., + Zanella-Béguelin, S., and P. Zimmerman, "Imperfect Forward + Secrecy: How Diffie-Hellman Fails in Practice", CCS '15: + Proceedings of the 22nd ACM SIGSAC Conference on Computer + and Communications Security, pp 5-17, + DOI 10.1145/2810103.2813707, October 2015, + . + + [MAC-ADDRESS-RANDOMIZATION] + Zúñiga, J. C., Bernardos, C. J., Ed., and A. Andersdotter, + "Randomized and Changing MAC Address State of Affairs", + Work in Progress, Internet-Draft, draft-ietf-madinas-mac- + address-randomization-15, 15 July 2024, + . + + [Messenger-franking] + Grubbs, P., Lu, J., and T. Ristenpart, "Message Franking + via Committing Authenticated Encryption", Cryptology + ePrint Archive, Paper 2017/664, July 2017, + . + + [Newegg] Mullin, J., "Newegg on trial: Mystery company TQP rewrites + the history of encryption", Ars Technica, November 2013, + . + + [Note-well] + IETF, "Note Well", + . + + [Orwat] Orwat, C. and R. Bless, "Values and Networks: Steps Toward + Exploring their Relationships", ACM SIGCOMM Computer + Communication Review, vol. 46, no. 2, pp 25-31, + DOI 10.1145/2935634.2935640, May 2016, + . + + [Patent-policy] + Weitzner, D., "W3C Patent Policy", W3C Recommendation, + February 2004, + . + + [Penney] Penney, J., "Chilling Effects: Online Surveillance and + Wikipedia Use", Berkeley Technology Law Journal, vol. 31, + no. 1, pp 117-182, DOI 10.15779/Z38SS13, September 2016, + . + + [Pouwelse] Pouwelse, J., Ed., "Media without censorship (CensorFree) + scenarios", Work in Progress, Internet-Draft, draft- + pouwelse-censorfree-scenarios-02, 22 October 2012, + . + + [RFC1035] Mockapetris, P., "Domain names - implementation and + specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, + November 1987, . + + [RFC1958] Carpenter, B., Ed., "Architectural Principles of the + Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, + . + + [RFC1984] IAB and IESG, "IAB and IESG Statement on Cryptographic + Technology and the Internet", BCP 200, RFC 1984, + DOI 10.17487/RFC1984, August 1996, + . + + [RFC2026] Bradner, S., "The Internet Standards Process -- Revision + 3", BCP 9, RFC 2026, DOI 10.17487/RFC2026, October 1996, + . + + [RFC2277] Alvestrand, H., "IETF Policy on Character Sets and + Languages", BCP 18, RFC 2277, DOI 10.17487/RFC2277, + January 1998, . + + [RFC3365] Schiller, J., "Strong Security Requirements for Internet + Engineering Task Force Standard Protocols", BCP 61, + RFC 3365, DOI 10.17487/RFC3365, August 2002, + . + + [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC + Text on Security Considerations", BCP 72, RFC 3552, + DOI 10.17487/RFC3552, July 2003, + . + + [RFC3724] Kempf, J., Ed., Austein, R., Ed., and IAB, "The Rise of + the Middle and the Future of End-to-End: Reflections on + the Evolution of the Internet Architecture", RFC 3724, + DOI 10.17487/RFC3724, March 2004, + . + + [RFC3935] Alvestrand, H., "A Mission Statement for the IETF", + BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004, + . + + [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. + Rose, "DNS Security Introduction and Requirements", + RFC 4033, DOI 10.17487/RFC4033, March 2005, + . + + [RFC4101] Rescorla, E. and IAB, "Writing Protocol Models", RFC 4101, + DOI 10.17487/RFC4101, June 2005, + . + + [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", + FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007, + . + + [RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, + DOI 10.17487/RFC5321, October 2008, + . + + [RFC5646] Phillips, A., Ed. and M. Davis, Ed., "Tags for Identifying + Languages", BCP 47, RFC 5646, DOI 10.17487/RFC5646, + September 2009, . + + [RFC6108] Chung, C., Kasyanov, A., Livingood, J., Mody, N., and B. + Van Lieu, "Comcast's Web Notification System Design", + RFC 6108, DOI 10.17487/RFC6108, February 2011, + . + + [RFC6365] Hoffman, P. and J. Klensin, "Terminology Used in + Internationalization in the IETF", BCP 166, RFC 6365, + DOI 10.17487/RFC6365, September 2011, + . + + [RFC6701] Farrel, A. and P. Resnick, "Sanctions Available for + Application to Violators of IETF IPR Policy", RFC 6701, + DOI 10.17487/RFC6701, August 2012, + . + + [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., + Morris, J., Hansen, M., and R. Smith, "Privacy + Considerations for Internet Protocols", RFC 6973, + DOI 10.17487/RFC6973, July 2013, + . + + [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an + Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May + 2014, . + + [RFC7301] Friedl, S., Popov, A., Langley, A., and E. Stephan, + "Transport Layer Security (TLS) Application-Layer Protocol + Negotiation Extension", RFC 7301, DOI 10.17487/RFC7301, + July 2014, . + + [RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T., + Trammell, B., Huitema, C., and D. Borkmann, + "Confidentiality in the Face of Pervasive Surveillance: A + Threat Model and Problem Statement", RFC 7624, + DOI 10.17487/RFC7624, August 2015, + . + + [RFC7725] Bray, T., "An HTTP Status Code to Report Legal Obstacles", + RFC 7725, DOI 10.17487/RFC7725, February 2016, + . + + [RFC7754] Barnes, R., Cooper, A., Kolkman, O., Thaler, D., and E. + Nordmark, "Technical Considerations for Internet Service + Blocking and Filtering", RFC 7754, DOI 10.17487/RFC7754, + March 2016, . + + [RFC7844] Huitema, C., Mrugalski, T., and S. Krishnan, "Anonymity + Profiles for DHCP Clients", RFC 7844, + DOI 10.17487/RFC7844, May 2016, + . + + [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., + and P. Hoffman, "Specification for DNS over Transport + Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May + 2016, . + + [RFC8179] Bradner, S. and J. Contreras, "Intellectual Property + Rights in IETF Technology", BCP 79, RFC 8179, + DOI 10.17487/RFC8179, May 2017, + . + + [RFC8280] ten Oever, N. and C. Cath, "Research into Human Rights + Protocol Considerations", RFC 8280, DOI 10.17487/RFC8280, + October 2017, . + + [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol + Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, + . + + [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS + (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, + . + + [RFC8558] Hardie, T., Ed., "Transport Protocol Path Signals", + RFC 8558, DOI 10.17487/RFC8558, April 2019, + . + + [RFC8890] Nottingham, M., "The Internet is for End Users", RFC 8890, + DOI 10.17487/RFC8890, August 2020, + . + + [RFC8980] Arkko, J. and T. Hardie, "Report from the IAB Workshop on + Design Expectations vs. Deployment Reality in Protocol + Development", RFC 8980, DOI 10.17487/RFC8980, February + 2021, . + + [RFC8981] Gont, F., Krishnan, S., Narten, T., and R. Draves, + "Temporary Address Extensions for Stateless Address + Autoconfiguration in IPv6", RFC 8981, + DOI 10.17487/RFC8981, February 2021, + . + + [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based + Multiplexed and Secure Transport", RFC 9000, + DOI 10.17487/RFC9000, May 2021, + . + + [RFC9071] Hellström, G., "RTP-Mixer Formatting of Multiparty Real- + Time Text", RFC 9071, DOI 10.17487/RFC9071, July 2021, + . + + [RFC9293] Eddy, W., Ed., "Transmission Control Protocol (TCP)", + STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022, + . + + [RFC9420] Barnes, R., Beurdouche, B., Robert, R., Millican, J., + Omara, E., and K. Cohn-Gordon, "The Messaging Layer + Security (MLS) Protocol", RFC 9420, DOI 10.17487/RFC9420, + July 2023, . + + [RFC9505] Hall, J. L., Aaron, M. D., Andersdotter, A., Jones, B., + Feamster, N., and M. Knodel, "A Survey of Worldwide + Censorship Techniques", RFC 9505, DOI 10.17487/RFC9505, + November 2023, . + + [Saltzer] Saltzer, J. H., Reed, D. P., and D. D. Clark, "End-to-end + arguments in system design", ACM Transactions on Computer + Systems, vol. 2, no. 4, pp 277-288, + DOI 10.1145/357401.357402, November 1984, + . + + [TLS-ESNI] Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS + Encrypted Client Hello", Work in Progress, Internet-Draft, + draft-ietf-tls-esni-20, 4 August 2024, + . + + [UDHR] United Nations General Assembly, "Universal Declaration of + Human Rights", December 1948, . + + [UNGP] United Nations, "Guiding Principles on Business and Human + Rights: Implementing the United Nations 'Protect, Respect + and Remedy' Framework", January 2012, + . + + [UNHR] United Nations, "The Core International Human Rights + Instruments and their monitoring bodies", + . + + [UNHRC2016] + United Nations Human Rights Council, "The promotion, + protection and enjoyment of human rights on the Internet", + A/HRC/32/L.20, June 2016, + . + + [W3CAccessibility] + W3C, "Accessibility", + . + + [W3Ci18nDef] + Ishida, R. and S. Miller, "Localization vs. + Internationalization", December 2005, + . + + [Ziewitz] Ziewitz, M. and I. Brown, "A Prehistory of Internet + Governance", Research Handbook on Governance of the + Internet, edited by Ian Brown. Cheltenham: Edward Elgar + Publishing, DOI 10.4337/9781849805025.00008, April 2013, + . + + [Zittrain] Zittrain, J., "The Future of the Internet and How to Stop + It", Yale University Press, 2008, + . + +Acknowledgements + + Thanks to: + + * Corinne Cath-Speth for work on [RFC8280]. + + * Reese Enghardt, Joe Hall, Avri Doria, Joey Salazar, Corinne Cath- + Speth, Farzaneh Badii, Sandra Braman, Colin Perkins, John Curran, + Eliot Lear, Mallory Knodel, Brian Trammell, Jane Coffin, Eric + Rescorla, Sofía Celi, and the hrpc list for reviews and + suggestions. + + * Individuals who conducted human rights reviews for their work and + feedback: Amelia Andersdotter, Shane Kerr, Beatrice Martini, Karan + Saini, and Shivan Kaul Sahib. + +Authors' Addresses + + Gurshabad Grover + Email: gurshabad@cis-india.org + + + Niels ten Oever + University of Amsterdam + Email: mail@nielstenoever.net -- cgit v1.2.3