Internet DRAFT - draft-cooper-policy-interactions
draft-cooper-policy-interactions
Network Working Group M. Nottingham
Internet-Draft Cloudflare
Intended status: Informational A. Cooper
Expires: 8 January 2024 Cisco
7 July 2023
IETF Policy Interactions
draft-cooper-policy-interactions-00
Abstract
This document captures a list of interactions between IETF efforts
and policy efforts.
About This Document
This note is to be removed before publishing as an RFC.
The latest revision of this draft can be found at
https://coopdanger.github.io/draft-ietf-policy-interactions/draft-
cooper-policy-interactions.html. Status information for this
document may be found at https://datatracker.ietf.org/doc/draft-
cooper-policy-interactions/.
Source for this draft and an issue tracker can be found at
https://github.com/coopdanger/draft-ietf-policy-interactions.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 8 January 2024.
Nottingham & Cooper Expires 8 January 2024 [Page 1]
Internet-Draft IETF Policy Interactions July 2023
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Policy Interactions . . . . . . . . . . . . . . . . . . . . . 3
2.1. Encryption and Access to Communications . . . . . . . . . 3
2.2. DNS-over-HTTPS (DOH) . . . . . . . . . . . . . . . . . . 3
2.3. TLS Encrypted Client Hello (ECH) . . . . . . . . . . . . 4
2.4. Voice over IP . . . . . . . . . . . . . . . . . . . . . . 4
2.5. Emergency services . . . . . . . . . . . . . . . . . . . 4
2.6. Caller identity authentication . . . . . . . . . . . . . 4
2.7. Messaging interoperability . . . . . . . . . . . . . . . 4
2.8. TV whitespaces database protocol . . . . . . . . . . . . 5
2.9. Broadband measurement . . . . . . . . . . . . . . . . . . 5
2.10. Incident response . . . . . . . . . . . . . . . . . . . . 5
2.11. P2P congestion control . . . . . . . . . . . . . . . . . 5
2.12. Internet Architecture Board (IAB) . . . . . . . . . . . . 5
3. Security Considerations . . . . . . . . . . . . . . . . . . . 6
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
5. Informative References . . . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8
1. Introduction
This document captures a list of interactions between IETF standards-
related efforts and external policy efforts (e.g., regulation or
legislation) around the world, past or present. The objective of
this document is merely to catalogue these interactions in a single
location.
Comments and additional suggestions of policy interactions not listed
here should be submitted via the issue tracker at
https://github.com/coopdanger/draft-ietf-policy-interactions
(https://github.com/coopdanger/draft-ietf-policy-interactions).
Nottingham & Cooper Expires 8 January 2024 [Page 2]
Internet-Draft IETF Policy Interactions July 2023
2. Policy Interactions
2.1. Encryption and Access to Communications
THE IETF has a history of publishing documents that respond to policy
developments surrounding the use of encryption, and more generally
regarding access to communications.
[RFC1984] stated the IESG and IAB's position regarding legal
constraints on encryption in 1996, with a focus on the effects on the
Internet. The publication of the document was prompted in part by
the controversy surrounding the US government's promotion of the
Clipper Chip. The document was elevated to Best Current Practice
(which requires IETF-wide consensus) in 2015.
[RFC2804] articulates why the IESG and IAB believed that it was not
appropriate to accommodate wiretapping requirements from law
enforcement, circa 2000.
[RFC3365] set a requirement for IETF standard protocols to use
'appropriate strong security mechanisms', including encryption. It
was published as Best Current Practice in 2002.
[RFC7258] documents IETF consensus that pervasive monitoring is an
attack, and thus should be mitigated in IETF protocols (often, using
encryption). It was a response to the Snowden revelations, and
followed the Workshop on Strengthening the Internet Against Pervasive
Monitoring (STRINT) https://www.w3.org/2014/strint/
(https://www.w3.org/2014/strint/), held jointly by the W3C and IAB.
Follow-on work to implement [RFC7258] includes opportunistic
encryption [RFC7435] [RFC8110] [RFC8164], data minimization [RFC7816]
[RFC9156], improvements to the encryption ecosystem such as [ACME],
and discussion of mandatory encryption in [HTTP2], [TLS13], and
[QUIC].
2.2. DNS-over-HTTPS (DOH)
[DOH] was a technical response to pervasive monitoring attacks on
DNS.
Some related news reporting: * Proposal to regulate in Russia
(https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-
protocols-such-as-tls-1-3-doh-dot-esni/) * GCHQ sends 'warning' to
Google and Mozilla over DoH
(https://www.telegraph.co.uk/news/2019/05/31/gchq-warns-google-
mozilla-plans-encrypted-browsers/) * Congressional scrutiny of DoH
(https://hub.packtpub.com/googles-dns-over-https-encryption-plan-
faces-scrutiny-from-isps-and-the-congress/)
Nottingham & Cooper Expires 8 January 2024 [Page 3]
Internet-Draft IETF Policy Interactions July 2023
2.3. TLS Encrypted Client Hello (ECH)
[ECH] is a work-in-progress effort to respond to pervasive monitoring
attacks on TLS SNI, which exposes the hostname =being connected to,
even when several hostnames are served by the same IP address.
Some related news reporting: * Proposal to regulate in Russia
(https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-
protocols-such-as-tls-1-3-doh-dot-esni/) * ESNI blocked in China
(https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-
https-traffic-using-tls-1-3-and-esni/)
2.4. Voice over IP
The development of the Session Initiation Protocol (SIP) in the early
2000s had involvement from regulators and their proxies. There is a
very significant amount of PSTN interop built into SIP. See
[RFC3261] and the rest of the SIP document suite.
2.5. Emergency services
The Emergency Context Resolution with Internet Technologies (ECRIT)
working group, which began in the starting mid-2000s, had extensive
involvement from people working for/with Public Safety Answering
Points (PSAPs) as well as some input from telecom regulators such as
the US Federal Communications Commission (FCC). See [RFC5222] and
the rest of the document suite.
2.6. Caller identity authentication
Secure Telephone Identity Revisited (STIR) and the related SHAKEN
initiative are designed to combat caller ID spoofing that uses VoIP.
See [RFC8224], [RFC8225], [RFC8226], and [RFC8588].
Regulatory mandates to use STIR exist in the US, Canada, and France
thus far.
2.7. Messaging interoperability
The More Instant Messaging Interoperability (MIMI) working group is
chartered to work on interoperability for encrypted messaging. This
work was instigated based on requirements in the EU Digital Markets
Act (DMA). Several of the key participants have met with European
Commission (EC) staff and participated in an EC workshop on the
topic. The area director and co-chairs are staying in touch with the
EC staff focused on messaging interoperability.
Nottingham & Cooper Expires 8 January 2024 [Page 4]
Internet-Draft IETF Policy Interactions July 2023
2.8. TV whitespaces database protocol
The Protocol to Access Whitespaces (PAWS) working group was created
based on requirements received from the FCC after they allocated TV
whitespaces spectrum for unlicensed use.
2.9. Broadband measurement
The Large-Scale Measurement of Broadband Performance (LMAP) working
group was created as a result of disparate efforts by Ofcom in the
UK, the FCC, and the Body of European Regulators of Electronic
Communications (BEREC), who were all running their own jurisdiction-
specific broadband speed measurement efforts (several of them using a
vendor which had its own proprietary measurement protocol). There
were regulator participants involved in the protocol development
effort.
2.10. Incident response
There has been long-term involvement (including people in area
director roles) from those involved with various CERTs and national
cybersecurity authorities in several of the IETF's working groups
focused on incident response and exchange of incident/vulnerability
information: Managed Incident Lightweight Exchange (MILE), Security
Automation and Continuous Monitoring (SACM), and DDoS Open Threat
Signaling (DOTS).
2.11. P2P congestion control
In 2008, the IETF hosted a workshop that was spurred by an FCC action
regarding P2P traffic throttling. See [RFC5594]. Related challenges
associated with multiplexing flows with different characteristics
were addressed in the Active Queue Management working group (see,
e.g., [RFC7567]) and in the Congestion Exposure working group (see,
e.g., [RFC7713]).
2.12. Internet Architecture Board (IAB)
In addition to the IAB's coordination with the Internet Society on
policy matters, the IAB also frequently contributes to policy and
regulatory proceedings around the world. Some recent examples:
* 2022: FTC commercial surveillance proceeding, European Commission
eIDAS comments
* 2018: NTIA comments on national privacy priorities, comments on
Australian exceptional access bill
Nottingham & Cooper Expires 8 January 2024 [Page 5]
Internet-Draft IETF Policy Interactions July 2023
IAB workshops also frequently include regulatory or policy
perspectives, for example, the unwanted traffic workshop and the
CARIS workshop.
3. Security Considerations
A number of the policy interactions above relate to security,
encryption, and law enforcement access.
4. IANA Considerations
This document has no IANA actions.
5. Informative References
[ACME] Barnes, R., Hoffman-Andrews, J., McCarney, D., and J.
Kasten, "Automatic Certificate Management Environment
(ACME)", RFC 8555, DOI 10.17487/RFC8555, March 2019,
<https://www.rfc-editor.org/rfc/rfc8555>.
[DOH] Hoffman, P. and P. McManus, "DNS Queries over HTTPS
(DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018,
<https://www.rfc-editor.org/rfc/rfc8484>.
[ECH] Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS
Encrypted Client Hello", Work in Progress, Internet-Draft,
draft-ietf-tls-esni-16, 6 April 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-tls-
esni-16>.
[HTTP2] Belshe, M., Peon, R., and M. Thomson, Ed., "Hypertext
Transfer Protocol Version 2 (HTTP/2)", RFC 7540,
DOI 10.17487/RFC7540, May 2015,
<https://www.rfc-editor.org/rfc/rfc7540>.
[QUIC] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
Ed., "HTTP Semantics", STD 97, RFC 9110,
DOI 10.17487/RFC9110, June 2022,
<https://www.rfc-editor.org/rfc/rfc9110>.
[RFC1984] IAB and IESG, "IAB and IESG Statement on Cryptographic
Technology and the Internet", BCP 200, RFC 1984,
DOI 10.17487/RFC1984, August 1996,
<https://www.rfc-editor.org/rfc/rfc1984>.
[RFC2804] IAB and IESG, "IETF Policy on Wiretapping", RFC 2804,
DOI 10.17487/RFC2804, May 2000,
<https://www.rfc-editor.org/rfc/rfc2804>.
Nottingham & Cooper Expires 8 January 2024 [Page 6]
Internet-Draft IETF Policy Interactions July 2023
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261,
DOI 10.17487/RFC3261, June 2002,
<https://www.rfc-editor.org/rfc/rfc3261>.
[RFC3365] Schiller, J., "Strong Security Requirements for Internet
Engineering Task Force Standard Protocols", BCP 61,
RFC 3365, DOI 10.17487/RFC3365, August 2002,
<https://www.rfc-editor.org/rfc/rfc3365>.
[RFC5222] Hardie, T., Newton, A., Schulzrinne, H., and H.
Tschofenig, "LoST: A Location-to-Service Translation
Protocol", RFC 5222, DOI 10.17487/RFC5222, August 2008,
<https://www.rfc-editor.org/rfc/rfc5222>.
[RFC5594] Peterson, J. and A. Cooper, "Report from the IETF Workshop
on Peer-to-Peer (P2P) Infrastructure, May 28, 2008",
RFC 5594, DOI 10.17487/RFC5594, July 2009,
<https://www.rfc-editor.org/rfc/rfc5594>.
[RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an
Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May
2014, <https://www.rfc-editor.org/rfc/rfc7258>.
[RFC7435] Dukhovni, V., "Opportunistic Security: Some Protection
Most of the Time", RFC 7435, DOI 10.17487/RFC7435,
December 2014, <https://www.rfc-editor.org/rfc/rfc7435>.
[RFC7567] Baker, F., Ed. and G. Fairhurst, Ed., "IETF
Recommendations Regarding Active Queue Management",
BCP 197, RFC 7567, DOI 10.17487/RFC7567, July 2015,
<https://www.rfc-editor.org/rfc/rfc7567>.
[RFC7713] Mathis, M. and B. Briscoe, "Congestion Exposure (ConEx)
Concepts, Abstract Mechanism, and Requirements", RFC 7713,
DOI 10.17487/RFC7713, December 2015,
<https://www.rfc-editor.org/rfc/rfc7713>.
[RFC7816] Bortzmeyer, S., "DNS Query Name Minimisation to Improve
Privacy", RFC 7816, DOI 10.17487/RFC7816, March 2016,
<https://www.rfc-editor.org/rfc/rfc7816>.
[RFC8110] Harkins, D., Ed. and W. Kumari, Ed., "Opportunistic
Wireless Encryption", RFC 8110, DOI 10.17487/RFC8110,
March 2017, <https://www.rfc-editor.org/rfc/rfc8110>.
Nottingham & Cooper Expires 8 January 2024 [Page 7]
Internet-Draft IETF Policy Interactions July 2023
[RFC8164] Nottingham, M. and M. Thomson, "Opportunistic Security for
HTTP/2", RFC 8164, DOI 10.17487/RFC8164, May 2017,
<https://www.rfc-editor.org/rfc/rfc8164>.
[RFC8224] Peterson, J., Jennings, C., Rescorla, E., and C. Wendt,
"Authenticated Identity Management in the Session
Initiation Protocol (SIP)", RFC 8224,
DOI 10.17487/RFC8224, February 2018,
<https://www.rfc-editor.org/rfc/rfc8224>.
[RFC8225] Wendt, C. and J. Peterson, "PASSporT: Personal Assertion
Token", RFC 8225, DOI 10.17487/RFC8225, February 2018,
<https://www.rfc-editor.org/rfc/rfc8225>.
[RFC8226] Peterson, J. and S. Turner, "Secure Telephone Identity
Credentials: Certificates", RFC 8226,
DOI 10.17487/RFC8226, February 2018,
<https://www.rfc-editor.org/rfc/rfc8226>.
[RFC8588] Wendt, C. and M. Barnes, "Personal Assertion Token
(PaSSporT) Extension for Signature-based Handling of
Asserted information using toKENs (SHAKEN)", RFC 8588,
DOI 10.17487/RFC8588, May 2019,
<https://www.rfc-editor.org/rfc/rfc8588>.
[RFC9156] Bortzmeyer, S., Dolmans, R., and P. Hoffman, "DNS Query
Name Minimisation to Improve Privacy", RFC 9156,
DOI 10.17487/RFC9156, November 2021,
<https://www.rfc-editor.org/rfc/rfc9156>.
[TLS13] Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
<https://www.rfc-editor.org/rfc/rfc8446>.
Authors' Addresses
Mark Nottingham
Cloudflare
Email: mnot@mnot.net
Alissa Cooper
Cisco
Email: alcoop@cisco.com
Nottingham & Cooper Expires 8 January 2024 [Page 8]