<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc RFCedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-knodel-e2ee-definition-06" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="e2ee">Definition of End-to-end Encryption</title>

    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="F." surname="Baker" fullname="Fred Baker">
      <organization></organization>
      <address>
        <email>fredbaker.IETF@gmail.com</email>
      </address>
    </author>
    <author initials="O." surname="Kolkman" fullname="Olaf Kolkman">
      <organization>ISOC</organization>
      <address>
        <email>kolkman@isoc.org</email>
      </address>
    </author>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <organization>Centre for Internet and Society</organization>
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>

    <date year="2022" month="September" day="07"/>

    <area>sec</area>
    <workgroup>sec</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>End-to-end encryption is an application of cryptography mechanisms and properties in communication systems between endpoints. End-to-end encrypted systems are exceptional in providing both security and privacy properties through confidentiality, integrity and authenticity features for users. Improvements to end-to-end encryption strive to maximise the user's security and privacy while balancing usability and availability. Users of end-to-end encrypted communications expect trustworthy providers of secure implementations to respect and protect them.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document uses three different dimensions that define end-to-end encryption, which can be applied in a variety of contexts.</t>

<t>The first is a formal definition that draws on the basic understanding of end points and cryptography, where it is comprised of necessary constituent parts but considered as a system. The second looks at end-to-end encrypted implementations from a design perspective, both its fundamental features and proposed improvements on those features. Lastly this document considers the expectations of the user of end-to-end encryption.</t>

<t>These dimensions taken as a whole comprise a generally comprehensible picture of consensus at the IETF as to what is end-to-end encryption, irrespective of application, from messaging to video conferencing, and between any number of end points. It it worth noting that while the word "encryption" often refers to confidentiality (security) properties, we argue that end-to-end encryption should provide both security and privacy properties. We aim to provide a definition of end-to-end encryption that states which specific security and privacy properties it should provide.</t>

</section>
<section anchor="formal-definition-of-end-to-end-encryption"><name>Formal definition of end-to-end encryption</name>

<t>End-to-end encryption, irrespective of the content or the specific methods employed, relies on two important and rigorous technical concepts: the end-to-end principle according to the IETF; and encryption, an application of cryptographic mechanisms and the primary means employed by the IETF to secure and maintain privacy of internet protocols. Where end-to-end encryption is comprised of thes necessary constituent parts, a systems approach also defines their interplay. In the field of cryptography it is also possible to achieve a concise definition of end-to-end encrypted security.</t>

<section anchor="end-point"><name>End point</name>

<t>Intuitively, an "end" either sends messages or receives them, usually both; other systems on the path are just that - other systems.</t>

<t>It is, however, not trivial to establish the definition of an end point in isolation, because its existence inherently depends on at least one other entity in a communications system. Instead the end-to-end principle, which is well established <xref target="RFC3724"/> in internet standards and introduces nuance, is described in the following sub-section.</t>

<t>However despite the nuance for engineers, it is now widely accepted that the communication system itself begins and ends with the user <xref target="RFC8890"/>. Imagine people (through an application's user interface, or user agent) as components in a subsystem's design. An important distinction to this in end-to-end encrypted systems might be configuration channels, such as the use of public key infrastructure where a third party is often used in the authentication phase to enhance the larger system's trust model. Responsible use of of public key infrastructure is required in such cases, such that the end-to-end encrypted system does not admit third parties under the user's identity.</t>

<t>User agent and user cannot be equated, yet they cannot be fully separated. As user-agent computing becomes more complex and often more proprietary, the user agent becomes less of an "advocate" for the best interests of the user. This is why this document introduces a later section on the end-to-end encrypted system being able to fulfill user expectations.</t>

</section>
<section anchor="end-to-end-principle"><name>End-to-end principle</name>

<t>In order to describe what the "end-to-end" principle means, we need first to answer "What constitutes an end?", which is an important question in any review of the End-to-End Principle <xref target="RFC3724"/>. However the notion of an end point is more fully defined within the principle of end-to-end communications.</t>

<t>In 1984 the "end-to-end argument" was introduced <xref target="saltzer"/> as a design principle that helps guide placement of functions among the modules of a distributed computer system. It suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level. It is used to design around questions about which parts of the system should make which decisions, and as such the identity of the actual "speaker" or "end" may be less obvious than it appears. The communication described by Saltzer is between communicating processes, which may or may not be on the same physical machine, and may be implemented in various ways. For example, a Border Gateway Protocol (BGP) speaker is often implemented as a process that manages the Routing Information Base (RIB) and communicates with other BGP speakers using an operating system service that implements TCP. The RIB manager might find itself searching the RIB for prefixes that should be advertised to a peer, and performing "writes" to TCP for each one. TCP in this context often implements a variant of the algorithm described in RFC 868 (the "Nagle algorithm"), which accumulates writes in a buffer until there is no data in flight between the communicants, and then sends it - which might happen several times during a single search by the RIB manager. In that sense, the RIB manager might be thought of as the "end", because it decides what should be communicated, or TCP might be the "end", because it actually sends the TCP Segment, detects errors if they occur, retransmits it if necessary, and ultimately decides that the segment has been successfully transferred.</t>

<t>Another important question is "what statement exactly summarizes the end-to-end principle?". Saltzer answered this in two ways, the first of which is that the service implementing the transaction is most correct if it implements the intent of the application that sent it, which would be to move the message toward the destination address in the relevant IP header. Salzer's more thorough treatment, however, deals with end cases that come up in implementation: "Examples discussed in the paper", according to the abstract, "include bit error recovery, security using encryption, duplicate message suppression, recovery from system crashes, and delivery acknowledgement." It also notes that there is occasionally a rationale for ignoring the end-to-end arguments for the purposes of optimization. There may be other user expectations or design features, some explained below, which need to be balanced with the end-to-end argument.</t>

<t>More concisely, suppose that an end user is the end identity. An end-to-end encrypted system may run between potential end points at different network layers within the end identity's possession. These end points may then be considered acceptable sub-identities provided that no path between the end identity and sub-identity is accessible by any outside third party. There are quite a number of examples of common situations where tunnels are used and this does not apply. For instance, the examples below all provide encryption by which data is turned into clear text in locations that are not under control of the end user:</t>

<t><list style="symbols">
  <t>The common VPN business model whereby a TLS or an IPsec tunnel terminates at the service provider's server and is subsequently forwarded to its destination elsewhere in unencrypted form;</t>
  <t>Email transport whereby an unencrypted message traverses from sending mail user agent, between various mail transfer agents, and finally to a receiving mail user agent, all over TLS protected connections;</t>
  <t>The encrypted connection of last mile connections such as those in 4G LTE;</t>
</list></t>

<t>This definition of end points accounts for potentially several devices owned by a user, and various application-specific forwarding or delivery options among them. It also accounts for end-to-end encrypted systems running at different network layers. Regardless of the sub-identities allowed, the definition is contingent on that all end sub-identities are under the end identity's control and no third party (or their sub-identities, e.g. system components under third-party control) can access the end sub-identities nor links between the sub-identity and end identity.
This creates a tree hierarchy with the end user as the root at the top, and all potential end points being under their direct control, without third party access.
As an example, decryption at organizational network router before message forwarding (encrypted or unencrypted) to the end identity does not constitute end-to-end encryption. However, end-to-end encryption to a user's personal device and subsequent end-to-end encrypted message forwarding to another one of the user's personal devices (without access available to any third party at any link or on device) maintains end-to-end encrypted data possession for the user.</t>

</section>
<section anchor="encryption"><name>Encryption</name>

<t>From draft-dkg-hrpc-glossary-00, encryption is fundamental to the end-to-end principle. "End-to-End: The principal of extending characteristics of a protocol or system as far as possible within the system. For example, end-to-end instant message encryption would conceal communication content from one user's instant messaging application through any intermediate devices and servers all the way to the recipient's instant messaging application. If the message was decrypted at any intermediate point--for example at a service provider--then the property of end-to-end encryption would not be present."<xref target="dkg"/> Note that this only talks about the encrypted contents of the communication and not the metadata (often in plaintext) generated from it.</t>

<t>The way to achieve a truly end-to-end encrypted communication system (with security and privacy properties) is indeed to encrypt, authenticate and provide integrity of the content of the data exchanged between the endpoints, e.g. sender(s) and receiver(s). The more common end-to-end technique used nowadays to achieve this makes use of the double-ratchet algorithm with an authenticated encryption scheme and of a Authenticated Key Exchange (AKE). The usage of this algorithms (or variants of them) is present in many modern messenger applications such as those considered in the IETF Messaging Layer Security working group, whose charter is to create a document that satisfies the need for several internet applications for group key establishment and message protection protocols <xref target="mls"/>. OpenPGP, mostly used for email, uses a different technique to achieve security and privacy. It is also chartered in the IETF to create a specification that covers object encryption, object signing, and identity certification <xref target="openpgp"/>. Both protocols rely on the use of asymmetric and symmetric encryption, and exchange long-term identity public keys amongst end points. The IETF has clear mandate and demonstrated expertise in defining the specifics of secure and private communications of the internet.</t>

<t>While encryption is fundamental to the end-to-end principle, it does not stand alone. As in the history of all security, authentication and data integrity properties are also linked, and contributed to the end-to-end nature of end-to-end encryption. Permission of data manipulation or creation of pseudo-identities for third parties to allow access under the user's identity are against the intention of end-to-end encryption. In other words, the application functions only for the end user and does not covertly perform functions for any other entity, even if that entity claims to have obtained the consent of the end user. Thus, end point authenticity must be established as (sub-)identities of the end user, and end-to-end integrity must also be maintained by the system. There is considerable system design flexibility available in entity authentication mechanisms and data authentication that still meet this requirement.</t>

</section>
<section anchor="concise-definition-of-end-to-end-security"><name>Concise definition of end-to-end security</name>

<t>A concise definition for end-to-end security can describe the security of the system by the probability of a malicious adversary's success in breaking the system. Example snippet:</t>

<t>The malicious adversary successfully subverts an end-to-end encrypted system if it can succeed in either of the following: 1) the adversary can produce the participant's local state (meaning the adversary has learned the decrypted contents of participant's messages), or 2) the states of conversation participants do not match (meaning that the adversary has influenced their communication in some way). To prevent the adversary from trivially winning, the adversary is not allowed to compromise the participants' local state.</t>

<t>We can say that a system is end-to-end secure if the adversary has negligible probability of success in either of these two scenarios <xref target="komlo"/>.</t>

</section>
</section>
<section anchor="end-to-end-encryption-implementations"><name>End-to-end encryption implementations</name>

<t>When looking at implementations of end-to-end encryption from a design perspective, the first consideration is the list of fundamental features that distinguish an end-to-end encrypted system from one that does not employ end-to-end encryption. Secondly, one must consider the development goals for improving the features of end-to-end encryption, in other words, the challenges defined by the designers, developers and implementers of end-to-end encryption.</t>

<t>The features and challenges listed below are framed comprehensively rather than from the perspective of their design, development, implementation or use.</t>

<section anchor="features"><name>Features</name>

<t>Defining a system can also be done by inspecting what it does, or is meant to do, in the form of features. The features of end-to-end encryption from an implementation perspective can be inspected across several important categories: 1) the necessary features of end-to-end encrypted for the properties of authenticity, confidentiality, and integrity, whereas features of 2) availability, deniability, forward secrecy, and post-compromise security are enhancements to end-to-end encryption.</t>

<section anchor="necessary-features"><name>Necessary features</name>

<dl>
  <dt>Authenticity</dt>
  <dd>
    <t>A system provides message authenticity if the recipient and sender attest to each other's identities in relation to the contents of their communications.</t>
  </dd>
  <dt>Confidentiality</dt>
  <dd>
    <t>A system provides message confidentiality if only the sender and intended recipient(s) can read the message plaintext, i.e. messages are encrypted by the sender such that only the recipient(s) shared and agreed by all sender(s) and/or recipients can decrypt them.</t>
  </dd>
  <dt>Integrity</dt>
  <dd>
    <t>A system provides message integrity when it guarantees that messages that have been modified in transit. If they have been modified, it must be detected in a reliable way such that a recipient is assured that a message cannot be undetectably modified in any way.</t>
  </dd>
</dl>

</section>
<section anchor="optionaldesirable-features"><name>Optional/desirable features</name>

<dl>
  <dt>Availability</dt>
  <dd>
    <t>A system provides high availability if the user is able to access the contents of the message (decrypt them) when they so desire and potentially from more than one device, i.e. a message arrives to a recipient even if they have been offline for a long time. Note that applications that use this feature often state a threshold until this property is met: messages from a month ago can be read by a user that has been offline, but not messages from a year ago.</t>
  </dd>
  <dt>Loss Resilience</dt>
  <dd>
    <t>If a message is permanently lost by the network, sender(s) and/or recipient(s) should still be able to communicate.</t>
  </dd>
  <dt>Deniability</dt>
  <dd>
    <t>Deniability ensures that anyone able to decrypt a record of the transcript, including message recipients, cannot cryptographically prove to others that a particular participant of a communication authored an specific message. As demonstrated by widely implemented protocols, this optional property must exist in conjunction with the necessary property of message authenticity, i.e. participants in a communication must be assured that they are communicating with the intended parties but this assurance cannot be transmitted to any other parties.</t>
  </dd>
  <dt>Forward secrecy</dt>
  <dd>
    <t>Forward secrecy is a security property that prevents attackers from decrypting encrypted data they have previously captured over a communication channel before the time of compromise, even if they have compromised one of the endpoints. Forward secrecy is usually achieved by deriving new encryption/decryption keys, and old keys no longer required to encrypt or decrypt any new messages are immediately destroyed.</t>
  </dd>
  <dt>Post-compromise security</dt>
  <dd>
    <t>Post-compromise security is a security property that seeks to guarantee future confidentiality and integrity even on the face of a passive end-point compromise (and consequently that communication sent post-compromise is protected with the same security properties that existed before the compromise). It is usually achieved by adding new ephemeral key exchanges (new randomness) to the derivation of encryption/decryption keys every 'x' amount of time or after 'n' messages sent. Note that post-compromise security is not met in the face of active attackers.</t>
  </dd>
  <dt>Metadata obfuscation</dt>
  <dd>
    <t>Digital communication inevitably generates data other than the content of the communication itself, such as IP addresses, date and time. To enhance the privacy and security of end-to-end encryption, steps should be taken to minimize metadata leakage such as user obfuscating IP addresses, reducing non-routing metadata, and avoiding extraneous message headers.</t>
  </dd>
  <dt>Disappearing messages</dt>
  <dd>
    <t>For truly confidential conversations, deleting one-by-one sensive messages typically depends on a level of client-side security that is unsustainable. Features like "delete for me" or "delete for everyone" helps with individual messages. What is better is the automatic deletion of whole conversations after an agreed upon timeframe by all parties, eg disappearing messages. In any case, whenever a user has deleted content for all, the provider must ensure complete removal of the content.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="challenges"><name>Challenges</name>

<t>Earlier in this document end-to-end encryption was defined using formal definitions assumed by internet protocol implementations. Also because the IETF is the place for "producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet" <xref target="RFC3935"/> the reader can be confident that current deployments of end-to-end encrypted technologies in the IETF indicate the cutting edge of their developments, which is yet another way to define what is, or ideally should be, a particular kind of technology.</t>

<t>Below is best effort list of the challenges currently faced by protocol designers of end-to-end encrypted systems. Problems that fall outside of this list are likely 1) unnecessary feature requests that negligibly, or do nothing to, achieve the aims of end-to-end encrypted systems, or are 2) in some way antithetical to the goals of end-to-end encrypted systems.</t>

<t><list style="symbols">
  <t>Making messaging applications interoperabile is an important goal for a healthy and user centric internet ecosysystem, however it requires careful design of protocols and systems, such as content negotiation; provisions of global services, such as discovery; and a great deal of cooperation amongst implementers.</t>
  <t>Public key verification is very difficult for users to manage. Authentication of the two ends is required for secure and private conversations. Therefore, solving the problem of verification of public keys is a major concern for any end-to-end encrypted system design. Some applications bind together the account identity and the key, and leave users to establish a trust relationship between them, assisted by public key fingerprint information.</t>
  <t>Users want to smoothly switch application use between devices, but this comes at a cost to the security and privacy of the communication. Thus, there is a problem of availability in end-to-end encrypted systems because the account identity's private key is generated by and stored on the end-user's original device and to move the private key to another device can compromise the security of one of the end-points of the system (by opening the door to key-impersonation attacks, for example).</t>
  <t>Existing protocols are vulnerable to meta-data analysis, even though meta-data is often much more sensitive than content. Meta-data is plaintext information that travels across the wire and includes delivery-relevant details that central servers need such as the account identity of end-points, timestamps, message size or more. Meta-data is difficult to eliminate or obfuscate entirely.</t>
  <t>Users need to communicate in groups, but this presents problems of scale for end-to-end encryption systems.</t>
  <t>The whole communication should remain secure if only one message is compromised. However, for encrypted communication, in some schemes, you must currently choose between forward secrecy or the ability to fully communicate asynchronously. This presents a problem for application design that uses end-to-end encryption for asynchronous messaging over email, RCS, etc.</t>
  <t>Users of end-to-end encrypted systems should be able to communicate with any medium of their choice, from text to large files. However, there is often a resource problem because there are no open protocols to allow users to securely share the same resource in an end-to-end encrypted system.</t>
  <t>Usability, accessibility and internationalisation considerations are sometimes in conflict with security and privacy considerations, such as message read status, typing indicators, URL/link previews, third-party input/output applications.</t>
  <t>Deployment is notoriously challenging for any software application where maintenance and updates can be particularly disastrous for obsolete cryptographic libraries.</t>
</list></t>

</section>
</section>
<section anchor="end-user-expectations"><name>End-user expectations</name>

<t>While the formal definition and properties of an end-to-end encrypted system relate to communication security and privacy, they do not draw from a comprehensive threat model or speak to what users expect from end-to-end encrypted communication. It is in this context that some designs and architectures of end-to-end encryption may ultimately run contrary to user expectations of end-to-end encrypted systems <xref target="GEC-EU"/>. Although some system designs do not directly violate "the math" of encryption algorithms, they do so by implicating and weakening other important aspects of an end-to-end encrypted <em>system</em>.</t>

<section anchor="a-conversation-is-confidential"><name>A conversation is confidential</name>

<t>Users talking to one another in an end-to-end encrypted system should be the only ones that know what they are talking about <xref target="RFC7624"/>. People have the right to data privacy as defined in international human rights law, and within the right to free expression and to hold opinions is inferred the right to whisper, whether or not they are using digital communications or walking through a field.</t>

</section>
<section anchor="providers-are-trustworthy"><name>Providers are trustworthy</name>

<t>While "trustworthy" can be rigorously defined from an engineering perspective, for the purposes of this document a definition inspired by an internal workshop for Internet Society staff is sufficient:</t>

<dl>
  <dt>Trustworthy</dt>
  <dd>
    <t>A system is completely trustworthy if and only if it is completely resilient, reliable, accountable, and secure in a way that consistently meets users’ expectations. The opposite of trustworthy is untrustworthy.</t>
  </dd>
</dl>

<t>This definition is complete in its positive and negative aspects: what it is, e.g. "Worthy of confidence" and what it is not, e.g. in RFC 7258: "behavior that subverts the intent of communicating parties without the agreement of those parties" <xref target="RFC7258"/>.</t>

<t>Therefore, a trustworthy end-to-end encrypted communication system is the provider of the set of functions needed by two or more parties to communicate among each other in a confidential, authenticated and integrity-preserving fashion without any third party having access to the content of that communication where the functions that offer the confidentiality, authenticity and integrity-preservation are trustworthy.</t>

</section>
<section anchor="access-by-a-third-party-is-impossible"><name>Access by a third-party is impossible</name>

<t>No matter the specifics, any methods used to access to the content of the messages by a third party would violate a user's expectations of end-to-end encrypted messaging. "[T]hese access methods scan message contents on the user’s [device]", which are then "scanned for matches against a database of prohibited content before, and sometimes after, the message is sent to the recipient" <xref target="GEC-EU"/>. Third party access also covers cases without scanning -- namely, it should not be possible for any third-party end point, even those under the user's identity as per Section 2.1, to access the data regardless of reason.</t>

<t>If a method makes secure and private communication, intended to be sent over an encrypted channel between end points, available to parties other than the sender and intended recipient(s), without formally interfering with channel confidentiality, that method violates the understood expectation of that security property.</t>

</section>
<section anchor="the-software-of-the-end-to-end-encrypted-system-can-be-trusted"><name>The software of the end-to-end encrypted system can be trusted</name>

<t>A way by which users can check that a system does not have a "backdoor" or is performing in accordance to cryptographic protocols' specifications is by making them opensource. Opensource allows users to openly analise the system and be assured of it. However, while many users might be able to do so, some users lack the technological knowledge needed to analyse source code. It is vital that systems provide public security analysis of their source code that can be vetted by any type of user.</t>

</section>
<section anchor="pattern-inference-is-minimised"><name>Pattern inference is minimised</name>

<t>Analyses such as traffic fingerprinting or other (encrypted or unencrypted) data analysis techniques, outside of or as part of end-to-end encrypted system design, allow third parties to draw inferences from communication that was intended to be confidential. "By allowing private user data to be scanned via direct access by servers and their providers," the use of these methods should be considered an affront to "the privacy expectations of users of end-to-end encrypted communication systems" <xref target="GEC-EU"/>.</t>

<t>Not only should an end-to-end encrypted system value user data privacy by not explicitly enabling pattern inference, it should actively be attempting to solve issues of metadata and traceability (enhanced metadata) through further innovation that stays ahead of advances in these techniques.</t>

</section>
<section anchor="the-end-to-end-encryption-is-not-compromised"><name>The end-to-end encryption is not compromised</name>

<t>RFC 3552 talks about the Internet Threat model such as the assumption that the user can expect any communications systems, but perhaps especially end-to-end encrypted systems, to not be intentionally compromised <xref target="RFC3552"/>. Intentional compromises of end-to-end encryption are usually referred to as "backdoors" but are often presented as additional design features under terms like "key escrow". Users of end-to-end encryption would not expect a front, back or side door entrance into their confidential conversations and would expect a provider to actively resist -- technically and legally -- compromise through these means.</t>

</section>
</section>
<section anchor="conclusions"><name>Conclusions</name>

<t>From messaging to video conferencing, there are many competing features in an end-to-end encrypted implementation that is secure, private and usable. The most well designed system cannot meet the expectations of every user, nor does an ideal system exist from any dimension. End-to-end encryption is a technology that is constantly improving to achieve the ideal as defined in this document.</t>

<t>Features and functionalities of end-to-end encryption should be developed and improved in service of end user expectations for privacy preserving communications.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Fred Baker, Stephen Farrell, Richard Barnes, Olaf Kolkman all contributed to the early strategic thinking of this document and whether it would be useful to the IETF community.</t>

<t>The folks at Riseup and the LEAP Encryption Access Project have articulated brilliantly the hardest parts of end-to-end encryption systems that serve the end users' right to whisper.</t>

<t>Ryan Polk at the Internet Society has energy to spare when it comes to organising meaningful contributions, like this one, for the technical advisors of the Global Encryption Coalition.</t>

<t>Adrian Farrel, Eric Rescorla and Paul Wouters are acknowleded for their review, comments, or questions that lead to improvement of this document.</t>

<t>Chelsea Komlo and Britta Hale have contributed their deep expertise and consice and rigourous writing to this draft.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document does not specify new protocols and therefore does not bring up technical security considerations.</t>

<t>Because some policy decicions may affect the security of the internet, a clear and shared definition of end to end encrypted communication is important in policy related discussions.  This document aims to provide that clarity.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no actions for IANA.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>





<reference anchor='RFC3724' target='https://www.rfc-editor.org/info/rfc3724'>
<front>
<title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
<author fullname='J. Kempf' initials='J.' role='editor' surname='Kempf'><organization/></author>
<author fullname='R. Austein' initials='R.' role='editor' surname='Austein'><organization/></author>
<author><organization>IAB</organization></author>
<date month='March' year='2004'/>
<abstract><t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3724'/>
<seriesInfo name='DOI' value='10.17487/RFC3724'/>
</reference>



<reference anchor='RFC3552' target='https://www.rfc-editor.org/info/rfc3552'>
<front>
<title>Guidelines for Writing RFC Text on Security Considerations</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='B. Korver' initials='B.' surname='Korver'><organization/></author>
<date month='July' year='2003'/>
<abstract><t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='72'/>
<seriesInfo name='RFC' value='3552'/>
<seriesInfo name='DOI' value='10.17487/RFC3552'/>
</reference>



<reference anchor='RFC7258' target='https://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='May' year='2014'/>
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>



<reference anchor='RFC7624' target='https://www.rfc-editor.org/info/rfc7624'>
<front>
<title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
<author fullname='R. Barnes' initials='R.' surname='Barnes'><organization/></author>
<author fullname='B. Schneier' initials='B.' surname='Schneier'><organization/></author>
<author fullname='C. Jennings' initials='C.' surname='Jennings'><organization/></author>
<author fullname='T. Hardie' initials='T.' surname='Hardie'><organization/></author>
<author fullname='B. Trammell' initials='B.' surname='Trammell'><organization/></author>
<author fullname='C. Huitema' initials='C.' surname='Huitema'><organization/></author>
<author fullname='D. Borkmann' initials='D.' surname='Borkmann'><organization/></author>
<date month='August' year='2015'/>
<abstract><t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t></abstract>
</front>
<seriesInfo name='RFC' value='7624'/>
<seriesInfo name='DOI' value='10.17487/RFC7624'/>
</reference>



<reference anchor='RFC8890' target='https://www.rfc-editor.org/info/rfc8890'>
<front>
<title>The Internet is for End Users</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='August' year='2020'/>
<abstract><t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t></abstract>
</front>
<seriesInfo name='RFC' value='8890'/>
<seriesInfo name='DOI' value='10.17487/RFC8890'/>
</reference>



<reference anchor='RFC3935' target='https://www.rfc-editor.org/info/rfc3935'>
<front>
<title>A Mission Statement for the IETF</title>
<author fullname='H. Alvestrand' initials='H.' surname='Alvestrand'><organization/></author>
<date month='October' year='2004'/>
<abstract><t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='95'/>
<seriesInfo name='RFC' value='3935'/>
<seriesInfo name='DOI' value='10.17487/RFC3935'/>
</reference>


<reference anchor="saltzer" target="https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">
  <front>
    <title>End-to-end arguments in system design</title>
    <author initials="J. H." surname="Saltzer, et al">
      <organization></organization>
    </author>
    <date year="1984"/>
  </front>
</reference>
<reference anchor="dkg" target="https://tools.ietf.org/html/draft-dkg-hrpc-glossary-00">
  <front>
    <title>Human Rights Protocol Considerations Glossary</title>
    <author initials="D." surname="Gillmor">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="mls" target="https://datatracker.ietf.org/doc/charter-ietf-mls">
  <front>
    <title>Messaging Layer Security</title>
    <author initials="" surname="IETF">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="openpgp" target="https://datatracker.ietf.org/doc/charter-ietf-openpgp">
  <front>
    <title>Open Specification for Pretty Good Privacy</title>
    <author initials="" surname="IETF">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="GEC-EU" target="https://www.globalencryption.org/2020/11/breaking-encryption-myths/">
  <front>
    <title>Breaking encryption myths: What the European Commission’s leaked report got wrong about online security</title>
    <author initials="" surname="Global Encryption Coaliation">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="komlo" target="https://github.com/chelseakomlo/e2ee/blob/master/e2ee_definition.pdf">
  <front>
    <title>Defining end-to-end security</title>
    <author initials="" surname="Chelsea Komlo">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

