<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-thomson-tmi-04" category="info" submissionType="IAB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.2 -->
  <front>
    <title abbrev="Too Much Intermediation">Principles for the Involvement of Intermediaries in Internet Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
    <author initials="M." surname="Thomson" fullname="Martin Thomson">
      <organization>Mozilla</organization>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <date year="2022" month="September" day="08"/>
    <abstract>
      <t>This document proposes a set of principles for designing protocols with rules
for intermediaries.  The goal of these principles is to limit the ways in which
intermediaries can produce undesirable effects and to protect the useful
functions that intermediaries legitimately provide.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  IAB Model-T list (modelt@iab.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/model-t/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/martinthomson/tmi"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet owes much of its success to its application of the end-to-end
principle <xref target="E2E"/>.  The realization that efficiency
is best served by moving higher-level functions to endpoints is a key insight
in system design, but also a key element of the success of the Internet.</t>
      <t>This does not mean that the Internet avoids a relying on functions provided by
entities in the network.  While the principle establishes that some functions
are best provided by endsystems, this does not exclude all intermediary
functions.  Some level of function in the network is necessary, or else there
would be no network.  The ways in which intermediaries can assist protocol
endpoints are numerous and constantly evolving.</t>
      <t>This document explores some of the ways in which intermediaries make both
essential and valuable contributions to the function of the system.  Problems
arise when the interests of intermediaries are poorly aligned with those of
endpoints.  This can result in systemic costs and tension.  Addressing those
issues can be difficult.</t>
      <t>This document proposes the following design principles for the protocols that
might involve the participation of intermediaries:</t>
      <ul spacing="normal">
        <li>Avoid intermediation (<xref target="prefer-services"/>)</li>
        <li>Limit the entities that can intermediate (<xref target="limit-participants"/>)</li>
        <li>Limit what intermediaries can do (<xref target="limit-capabilities"/>)</li>
      </ul>
      <t>These principles aim to provide clarity about the roles and responsibilities of
protocol participants.  These principles produce more robust protocols with
better privacy and security properties.  These also limit the secondary costs
associated with intermediation.</t>
    </section>
    <section anchor="what-is-meant-by-intermediary">
      <name>What is Meant by Intermediary</name>
      <t>An intermediary is an element that participates in a protocol exchange.  An
intermediary receives protocol units, such as packets or messages, and forwards
the protocol units to other protocol participants.  An intermediary might
make changes to protocol units or leave the content of the unit unchanged.</t>
      <t>An intermediary often does not directly benefit from the protocol exchange, but
instead acts to facilitate the exchange.  An intermediary often participates at
the request of another participant in the protocol, which might be an endpoint
or an intermediary.</t>
      <t>Intermediaries exist at all layers of the stack.  A router is an intermediary
that acts at the network layer to forward packets.  A TURN relay <xref target="RFC8155"/>
provides similar forwarding capability for UDP in the presence of a network
address translator (NAT) -- a different type of intermediary that provides the
ability to share a limited supply of addresses.  At higher layers of the stack,
group messaging servers intermediate the exchange of messages within groups of
people; a conference focus aids the sending of media group real-time
communications; and a social network intermediates communication and
information sharing through the exchange of messages and formation of groups.</t>
      <t>A person uses a networked computer as an intermediary for their communications
with other people and computers.  This intermediation is essential, for users
are unable to directly interact with a network.  Much of the guidance in this
document does not apply to the relationship between users and user agents; see
<xref target="RFC8890"/>, Section <xref section="4.2" sectionFormat="bare" target="RFC8890"/> in
particular, for an examination of this topic.</t>
      <t>An intermediary at one layer of the stack is often an endpoint for communication
at a lower layer.  A Diameter peer <xref target="DIAMETER"/> acts as an intermediary
when it forwards requests to other peers.  However, a Diameter peer establishes
connections to neighboring peers using TLS/TCP or DTLS/SCTP and acts as a
endpoint for all of those protocols.</t>
      <t>It is possible to facilitate communication without being an intermediary.  The
DNS provides information that is critical to locating and communicating with
other Internet hosts, but it does so without intermediating those
communications.  Thus, this definition of intermediary does not necessarily
include a service like the DNS.  Of course, the use of the DNS could involve
engaging with intermediaries such as recursive resolvers.</t>
    </section>
    <section anchor="intermediation-is-essential">
      <name>Intermediation Is Essential</name>
      <t>Intermediaries are essential to scalable communications.  The service an
intermediary provides usually involves access to resources that would not
otherwise be available.  For instance, the Internet does not function without
routers that enable packets to reach other networks.</t>
      <t>There is some level of intermediation that is essential for the proper
functioning of the Internet.</t>
      <t>Scalable solutions to the introduction problem often depend on services that
provide access to information and capabilities.  As it is with the network layer
of the Internet, the use of an intermediary can be absolutely essential.  For
example, a social networking application acts as an intermediary that provides a
communications medium, content discovery and publication, and related services.
Video conferencing applications often depend on an intermediary that mixes audio
and selectively forwards video so that bandwidth requirements don't increase
beyond what is available for participants as conferences grow in size.</t>
    </section>
    <section anchor="intermediation-is-useful">
      <name>Intermediation Is Useful</name>
      <t>Not all intermediaries have exclusive control access to the resources they
provide access to.  A router might facilitate access to other networks, but
similar access might be obtained via a different route.  The same web content
might be provided by multiple CDNs.  Multiple DNS resolvers can provide answers
to the same queries.  The ability to access the same capabilities from multiple
entities contributes greatly to the robustness of a system.</t>
      <t>Intermediaries often provide capabilities that benefit from economies of scale
by providing a service that serves multiple individuals.  For instance,
individuals are unlikely to be in a position to negotiate connections to
multiple networks, but an ISP can.  Similarly, an individual might find it
difficult to acquire the capacity necessary to withstand a DDoS attack, but the
scale at which a CDN operates means that this capacity is likely available to
it.  Or the value of a social network is in part due to the existing
participation of other people.</t>
      <t>Aggregation also provides other potential benefits.  For instance, caching of
shared information can allow for performance advantages.  From an efficiency
perspective, the use of shared resources might allow load to be more evenly
distributed over time.  Or, for privacy, individual activity might be mixed with
the activity of many others, thereby making it difficult to isolate that
activity.</t>
      <t>The ability of an intermediary to operate at scale can therefore provide a
number of different benefits to performance, scalability, privacy, and other
areas.</t>
    </section>
    <section anchor="scale">
      <name>Intermediation Enables Scaling Of Control</name>
      <t>An action by an intermediary can affect all who communicate using that
intermediary.  For an intermediary that operates at scale, this means it can be
seen as an effective control point.</t>
      <t>In addition to facilitating communications, some intermediary deployments aim to
effect a policy.  This relies on the ability of a well-placed intermediary to
affect multiple protocol interactions and participants.</t>
      <t>The ability of an intermediary to affect a large number of network users can be
an advantage or vulnerability, depending on perspective.  For instance, network
intermediaries have been used to distribute warnings of impending natural
disasters like fire, flood, or earthquake, which save lives and property.  In
contrast, control over large-scale communications can enable censorship
<xref target="RFC7754"/>, misinformation <xref target="PARADOX"/>, or
pervasive monitoring <xref target="RFC7258"/>.</t>
      <t>Intermediaries that can affect many people can therefore be powerful agents for
control.  While the morality of actions taken can be subjective, network users
have to consider the potential for the power they vest in intermediaries to be
abused or subverted.</t>
    </section>
    <section anchor="incentives">
      <name>Incentive Misalignment at Scale</name>
      <t>A dependency on an intermediary represents a risk to those that take the
dependency.  The incentives and motives of intermediaries can be important to
consider when choosing to use an intermediary.</t>
      <t>For instance, the information an intermediary needs to perform its function
might be used (or abused) for other purposes.  Even the simple function of
forwarding necessarily involves information about who was communicating, when,
and the size of messages.  This can reveal more than is trivially apparent
<xref target="CLINIC"/>.</t>
      <t>As uses of networks become more diverse, the extent that incentives for
intermediaries and network users align reduce.  In particular, acceptance of
the costs and risks associated with intermediation by a majority of network
users does not mean that all users have the same expectations and requirements.
This can be a significant problem if it becomes difficult to avoid or refuse
participation by a particular intermediary.</t>
      <t>A dependency on an intermediary, particularly a technically or operationally
challenging dependency, can reduce the number of viable choices of intermediary
operators.  Reduced choice can lead to dependence on specific intermediaries,
which reduces resilience and exposes endpoints to greater potential for abuse.</t>
    </section>
    <section anchor="forced-and-unwanted-intermediation">
      <name>Forced and Unwanted Intermediation</name>
      <t>The ability to act as intermediary can offer more options than a service that is
called upon to provide information or services as needed.  Sometimes those
advantages are enough to justify the use of intermediation over alternative
designs.  However, the use of an intermediary also introduces costs.</t>
      <t>The use of transparent or interception proxies in HTTP <xref target="HTTP"/> is an
example of a practice that has fallen out of common usage due to increased use
of HTTPS.  Use of transparent proxies was once widespread with a wide variety of
reasons for their deployment.  However, transparent proxies were involved in
many abuses, such as unwanted transcoding of content and insertion of
identifiers to the detriment of individual privacy <xref target="X-UIDH"/>.</t>
      <t>Introducing intermediaries is often done with the intent of avoiding disruption
to protocols that operate a higher layer of the stack.  However, network
layering abstractions often leak, meaning that the effects of the intermediation
can be observed.  Where those effects cause problems, it can be difficult to
detect and fix those problems.</t>
      <t>The insertion of an intermediary in a protocol imposes other costs on other
protocol participants; see <xref target="EROSION"/> or
<xref target="MIDDLEBOX"/>.  In particular, poor implementations of intermediaries
can adversely affect protocol operation.</t>
      <t>As an intermediary is another participant in a protocol, they can make
interactions less robust.  Intermediaries can also be responsible for
ossification, or the inability to deploy new protocol mechanisms; see <xref section="2.3" sectionFormat="of" target="USE-IT"/>.  For example, measurement of TCP showed that the
protocol has poor prospects for extensibility due to widespread use -- and poor
implementation -- of intermediaries <xref target="TCP-EXTEND"/>.</t>
      <t>Some forms of intermediation have been deployed without consulting the endpoints
involved in the protocol.  As protocols evolve or a more diverse set of
deployments are encountered, assumptions that might have been valid at the time
the intermediary was deployed might not hold.  For example, some intermediaries
identified a very early version of QUIC <xref target="RFC9000"/> by checking that the first
byte of the UDP payload was to to a value of 0x07.  As this version used the
different bits in this byte to signal different protocol options, when endpoints
started to exercise the options represented by other values the classification
failed.</t>
    </section>
    <section anchor="contention-over-intermediation">
      <name>Contention over Intermediation</name>
      <t>The IETF has a long history of dealing with different forms of intermediation.</t>
      <t>A debate about the intent and purpose of IPv6 extension headers
<xref target="IPv6"/> occurred prior to the publication of RFC 8986
<xref target="SRv6"/>, in particular, it's PSP (Penultimate Segment Pop) mode.
Here, the use of extension headers by entities other than the communication
endpoints -- that is, intermediaries -- was contested.  As the purpose of this
feature is to communicate routing information between intermediaries, this could
be seen as a form of tunneling between the communicating routers that uses the
ability of IPv6 intermediaries (or routers) to add or remove extension headers.</t>
      <t>Like HTTP, SIP <xref target="RFC3261"/> defines a role for a proxy, which is a form of
intermediary with limited ability to interact with the session that it
facilitates.  In practice, many deployments instead choose to deploy some form
of Back-to-Back UA (B2BUA; <xref target="RFC7092"/>) for reasons that effectively reduce to
greater ability to implement control functions.</t>
      <t>There are several ongoing debates in the IETF that are rooted in disagreement
about the rule of intermediaries.  The interests of network-based devices --
which sometimes act as TLS intermediaries -- is fiercely debated in the context
of TLS 1.3 <xref target="TLS"/>, where the design renders certain practices
obsolete.</t>
      <t>The functions provided by intermediaries in different protocols can be
dramatically different. Even within the one protocol, the same protocol might be
deployed to address many different needs.  For an existing protocol with wide
deployment, there might not be a single, easy method for managing the
integration of the functions that intermediaries provide.</t>
    </section>
    <section anchor="principles">
      <name>Proposed Principles</name>
      <t>Many problems caused by intermediation are the result of intermediaries that
are introduced without the involvement of protocol endpoints.  Limiting the
extent to which protocol designs depend on intermediaries makes the resulting
system more robust.</t>
      <t>These principles are progressive, with three stages:</t>
      <ol spacing="normal" type="1"><li>Prefer designs without intermediaries (<xref target="prefer-services"/>);</li>
        <li>Failing that, control which entities can intermediate the protocol
(<xref target="limit-participants"/>); and</li>
        <li>Limit actions and information that are available to intermediaries
(<xref target="limit-capabilities"/>).</li>
      </ol>
      <t>The use of technical mechanisms to ensure that these principles are enforced is
encouraged.  It is expected that protocols will need to use cryptography for
this.</t>
      <t>New protocol designs therefore need to identify what intermediation is possible
and what is desired.  Technical mechanisms to guarantee conformance, where
possible, are highly recommended.</t>
      <t>Modifying existing protocols to follow these principles could be difficult, but
worthwhile.</t>
      <section anchor="prefer-services">
        <name>Prefer Services to Intermediaries</name>
        <t>Where protocol functions can provided by a service or a means other than
intermediation, the design should prefer that alternative.</t>
        <t>Designing protocols to use services rather than intermediaries ensures that
responsibilities of protocol participants are clearly defined.</t>
        <t>If there is a need for information, defining a means for querying a service for
that information is preferable to allowing an intermediary to add information
during an exchange.  Similarly, direct invocation of service to perform an
action is better than involving that service as a participant in the protocol.</t>
        <t>Involving an intermediary in a protocol means depending on that intermediary for
every aspect of protocol functioning.  For example, it might be necessary to
negotiate the use of new capabilities with all protocol participants, including
the intermediary, even when the functions for which the intermediary was added
are not affected.  It is also more difficult to limit the extent to which a
protocol participant can be involved than a service that is invoked for a
specific task.</t>
        <t>Using discrete services is not always the most performant architecture as
additional network interactions can add latency or other overheads.  The cost of
these overheads need to be weighed against the recurrent costs from the
involvement of intermediaries.</t>
        <t>The contribution of an intermediary to performance and efficiency can involve
trade-offs, such as those discussed in Section 2.3 of <xref target="E2E"/>.  One
consideration is the potential need for critical functions to be replicated in
both intermediaries and endpoints, reducing efficiency.  Another is the
possibility that an intermediary optimized for one application could degrade
performance in other applications.</t>
        <t>Preferring services is analogous to the software design principle that
recommends a preference for composition over inheritance <xref target="PATTERNS"/>.</t>
      </section>
      <section anchor="limit-participants">
        <name>Deliberately Select Protocol Participants</name>
        <t>Protocol participants should know what other participants they might be
interacting with, including intermediaries.</t>
        <t>Protocols that permit the involvement of an intermediary need to do so
intentionally and provide measures that prevent the addition of unwanted
intermediaries.  Ideally, all protocol participants are identified and known to
other protocol participants.</t>
        <t>The addition of an unwanted protocol participant is an attack on the protocol.</t>
        <t>This is an extension of the conclusion of <xref target="PATH-SIGNALS"/>, which:</t>
        <blockquote>
          <t>recommends that implicit signals should be avoided and that an implicit signal
should be replaced with an explicit signal only when the signal's originator
intends that it be used by the network elements on the path.</t>
        </blockquote>
        <t>Applying this principle likely requires the use of authentication and
encryption.</t>
      </section>
      <section anchor="limit-capabilities">
        <name>Limit Capabilities of Intermediaries</name>
        <t>Protocol participants should be able to limit the capabilities conferred to
other protocol participants.  Though this applies to all participants,
intermediaries often have narrowly-defined roles.</t>
        <t>Where the potential for intermediation already exists, or intermediaries
provide essential functions, protocol designs should limit the capabilities and
information that protocol participants are required to grant others.</t>
        <t>Limiting the information that participants are required to provide to other
participants has benefits for privacy or to limit the potential for misuse of
information; see <xref target="limit-info"/>.  Where confidentiality is impossible or
impractical, integrity protection can be used to ensure that data origin
authentication is preserved; see <xref target="limit-changes"/>.</t>
        <section anchor="limit-info">
          <name>Limit Information Exposure</name>
          <t>Protocol participants should only have access to the information they need to
perform their designated function.</t>
          <t>Protocol designs based on a principle of providing the minimum information
necessary have several benefits.  In addition to simplicity, requiring smaller
messages, or fewer exchanges, reducing information provides greater control over
exposure of information.  This has privacy benefits.</t>
          <t>Where an intermediary needs to carry information that it has no need to access,
protocols should use encryption to ensure that the intermediary cannot access
that information.</t>
          <t>Providing information for intermediaries using signals that are separate from
other protocol signaling is preferable <xref target="PATH-SIGNALS"/>.  In addition,
integrity protection should be applied to these signals to prevent modification.</t>
        </section>
        <section anchor="limit-changes">
          <name>Limit Permitted Interactions</name>
          <t>An action should only be taken based on signals from protocol participants that
are authorized to request that action.</t>
          <t>Where an intermediary needs to communicate with other protocol participants,
ensure that these signals are attributed to an intermediary.  Authentication is
the best means of ensuring signals generated by protocol participants are
correctly attributed.  Authentication informs decisions protocol participants
make about actions they take.</t>
          <t>In some cases, particularly protocols that are primarily two-party protocols, it
might be sufficient to allow the signal to be attributed to any intermediary.
This is the case in QUIC <xref target="RFC9000"/> where ECN <xref target="ECN"/> and ICMP
<xref target="ICMP"/> signals are assumed to be provided by elements on the network
path.  Limited mechanisms exist to authenticate these as signals that originate
from path elements, informing actions taken by endpoints.  Consequently, the
actions that can be taken in response to these signals is limited.</t>
        </section>
        <section anchor="costs-of-technical-constraints">
          <name>Costs of Technical Constraints</name>
          <t>Moving from a protocol in which there are two participants (such as
<xref target="TLS"/>) to more than two participants can be more complex and
expensive to implement and deploy.</t>
          <t>More generally, the application of technical measures to control how
intermediaries participate in a protocol incur costs that manifest in several
ways.  Protocols are more difficult to design; implementations are larger and
more complex; and deployments might suffer from added operational costs, higher
computation loads, and more bandwidth consumption.  These costs are reflective
of the true cost of involving additional entities in protocols.  In protocols
without technical measures to limit participation, these costs have
historically been borne by other protocol participants.</t>
          <t>In general however, most protocols are able to reuse existing mechanisms for
cryptographic protection, such as TLS <xref target="TLS"/>.  Adopting something like TLS
provides security properties that are well understood and analyzed.  Using a
standardized solution enables use of well-tested implementations that include
optimizations and other mitigations for these costs.</t>
        </section>
      </section>
    </section>
    <section anchor="applying-non-technical-constraints">
      <name>Applying Non-Technical Constraints</name>
      <t>Not all intermediary functions can be tightly constrained.  For instance, as
described in <xref target="incentives"/>, some functions involve granting intermediaries
access to information that can be used for more than its intended purpose.
Applying strong technical constraints on how that information is used might be
infeasible or impossible.</t>
      <t>Systems that audit the involvement in protocols can use authentication to
improve accountability.  Authentication can enable the use of legal,
social, or other types of control that might cover any shortfall in technical
measures.</t>
    </section>
    <section anchor="the-effect-on-existing-practices">
      <name>The Effect on Existing Practices</name>
      <t>The application of these principles can have an effect on existing operational
practices, particularly where they rely on protocols not limiting intermediary
access.  Several documents have explored aspects of this in detail:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC8404"/> describes effects of encryption on practices performed by
intermediaries;</li>
        <li>
          <xref target="RFC8517"/> describes a broader set of practices;</li>
        <li>
          <xref target="RFC9065"/> explores the effect on transport-layer intermediaries in more
detail; and</li>
        <li>
          <xref target="NS-IMPACT"/> examines the effect of TLS on
operational network security practices.</li>
      </ul>
      <t>In all these documents, the defining characteristic is the move from a system
that lacked controls on participation to one in which technical controls are
employed.  In each case, the protocols in question provided little or no
technical controls that prevented the addition of intermediaries.  This allowed
for the insertion of intermediaries into sessions without permission or
knowledge of other protocol participants.  Adding controls like encryption
and authentication disrupts these practices.</t>
      <t>Overall, the advantages derived from having greater control over or knowledge of
other protocol participants outweighs these costs.</t>
      <t>In these settings, finding ways for intermediaries to contribute is an ongoing
process.  When looking at how intermediaries contributed to protocols operation
prior to the introduction of technical controls there are three potential
classes of outcome of these discussion:</t>
      <ul spacing="normal">
        <li>Practices might be deemed valuable.  Facilities might be added to protocols to
allow or encourage those practices.</li>
        <li>The use case supported by the practice might be deemed valuable, but the
existence of a superior alternative approach could make further effort
unnecessary.</li>
        <li>Practices might be deemed harmful, such that no replacement mechanism is
needed.</li>
      </ul>
      <t>Many factors could influence the outcome of this analysis.  For instance,
deployment of alternative methods or limited roles for intermediaries could be
relatively simple for new protocol deployments; whereas it might be challenging
to retrofit controls on existing protocol deployments.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Understanding how intermediaries participate is highly relevant to the security
of a protocol.  The principles in <xref target="principles"/> are fundamentally an
application of a security principle: namely the principle of least privilege
<xref target="LEAST-PRIVILEGE"/>.</t>
      <t>Lack of proper controls on intermediaries in protocols has been the source of
significant security problems.  A protocol is not secure if it fails to prevent
an intermediary from consuming, modifying, or generating protocol units in ways
that are contrary to the interests of other protocol participants.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="PATTERNS">
        <front>
          <title>Design Patterns: Elements of Reusable Object-Oriented Software</title>
          <author initials="E." surname="Gamma" fullname="Erich Gamma">
            <organization/>
          </author>
          <author initials="R." surname="Helm" fullname="Richard Helm">
            <organization/>
          </author>
          <author initials="R." surname="Johnson" fullname="Ralph Johnson">
            <organization/>
          </author>
          <author initials="J." surname="Vlissides" fullname="John Vlissides">
            <organization/>
          </author>
          <date year="1994"/>
        </front>
      </reference>
      <reference anchor="X-UIDH" target="https://www.verizon.com/about/news/vzw/2012/10/verizon-wireless-privacy-policy">
        <front>
          <title>Verizon Wireless’ use of a Unique Identifier Header (UIDH)</title>
          <author>
            <organization/>
          </author>
          <date year="2012" month="October" day="19"/>
        </front>
      </reference>
      <reference anchor="E2E">
        <front>
          <title>End-to-end arguments in system design</title>
          <author fullname="J. H. Saltzer" initials="J." surname="Saltzer">
            <organization>M.I.T. Laboratory for Computer Science, 545 Technology Square, Cambridge, MA</organization>
          </author>
          <author fullname="D. P. Reed" initials="D." surname="Reed">
            <organization>Software Arts, Inc., 27 Mica Lane, Wellesley, MA</organization>
          </author>
          <author fullname="D. D. Clark" initials="D." surname="Clark">
            <organization>M.I.T. Laboratory for Computer Science, 545 Technology Square, Cambridge, MA</organization>
          </author>
          <date month="November" year="1984"/>
        </front>
        <seriesInfo name="ACM Transactions on Computer Systems" value="vol. 2, no. 4, pp. 277-288"/>
        <seriesInfo name="DOI" value="10.1145/357401.357402"/>
      </reference>
      <reference anchor="RFC8155">
        <front>
          <title>Traversal Using Relays around NAT (TURN) Server Auto Discovery</title>
          <author fullname="P. Patil" initials="P." surname="Patil">
            <organization/>
          </author>
          <author fullname="T. Reddy" initials="T." surname="Reddy">
            <organization/>
          </author>
          <author fullname="D. Wing" initials="D." surname="Wing">
            <organization/>
          </author>
          <date month="April" year="2017"/>
          <abstract>
            <t>Current Traversal Using Relays around NAT (TURN) server discovery mechanisms are relatively static and limited to explicit configuration.  These are usually under the administrative control of the application or TURN service provider, and not the enterprise, ISP, or the network in which the client is located.  Enterprises and ISPs wishing to provide their own TURN servers need auto-discovery mechanisms that a TURN client could use with minimal or no configuration.  This document describes three such mechanisms for TURN server discovery.</t>
            <t>This document updates RFC 5766 to relax the requirement for mutual authentication in certain cases.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8155"/>
        <seriesInfo name="DOI" value="10.17487/RFC8155"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="DIAMETER">
        <front>
          <title>Diameter Base Protocol</title>
          <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo">
            <organization/>
          </author>
          <author fullname="J. Arkko" initials="J." surname="Arkko">
            <organization/>
          </author>
          <author fullname="J. Loughney" initials="J." surname="Loughney">
            <organization/>
          </author>
          <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn">
            <organization/>
          </author>
          <date month="October" year="2012"/>
          <abstract>
            <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations.  This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications.  The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6733"/>
        <seriesInfo name="DOI" value="10.17487/RFC6733"/>
      </reference>
      <reference anchor="RFC7754">
        <front>
          <title>Technical Considerations for Internet Service Blocking and Filtering</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="A. Cooper" initials="A." surname="Cooper">
            <organization/>
          </author>
          <author fullname="O. Kolkman" initials="O." surname="Kolkman">
            <organization/>
          </author>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="E. Nordmark" initials="E." surname="Nordmark">
            <organization/>
          </author>
          <date month="March" year="2016"/>
          <abstract>
            <t>The Internet is structured to be an open communications medium.  This openness is one of the key underpinnings of Internet innovation, but it can also allow communications that may be viewed as undesirable by certain parties.  Thus, as the Internet has grown, so have mechanisms to limit the extent and impact of abusive or objectionable communications.  Recently, there has been an increasing emphasis on "blocking" and "filtering", the active prevention of such communications.  This document examines several technical approaches to Internet blocking and filtering in terms of their alignment with the overall Internet architecture.  When it is possible to do so, the approach to blocking and filtering that is most coherent with the Internet architecture is to inform endpoints about potentially undesirable services, so that the communicants can avoid engaging in abusive or objectionable communications.  We observe that certain filtering and blocking approaches can cause unintended consequences to third parties, and we discuss the limits of efficacy of various approaches.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7754"/>
        <seriesInfo name="DOI" value="10.17487/RFC7754"/>
      </reference>
      <reference anchor="PARADOX">
        <front>
          <title>The Paradox of Participation Versus Misinformation: Social Media, Political Engagement, and the Spread of Misinformation</title>
          <author fullname="Sebastián Valenzuela" initials="S." surname="Valenzuela">
            <organization>School of Communications, Research Center for Integrated Disaster Risk Management (CIGIDEN), Pontificia Universidad Católica de Chile, Santiago, Chile;; Millennium Institute for Foundational Research on Data (IMFD), Pontificia Universidad Católica de Chile, Santiago, Chile;</organization>
          </author>
          <author fullname="Daniel Halpern" initials="D." surname="Halpern">
            <organization>School of Communications, Research Center for Integrated Disaster Risk Management (CIGIDEN), Pontificia Universidad Católica de Chile, Santiago, Chile;</organization>
          </author>
          <author fullname="James E. Katz" initials="J." surname="Katz">
            <organization>Division of Emerging Media Studies, Boston University, Boston, MA, USA</organization>
          </author>
          <author fullname="Juan Pablo Miranda" initials="J." surname="Miranda">
            <organization>School of Communications, Research Center for Integrated Disaster Risk Management (CIGIDEN), Pontificia Universidad Católica de Chile, Santiago, Chile;</organization>
          </author>
          <date month="June" year="2019"/>
        </front>
        <seriesInfo name="Digital Journalism" value="vol. 7, no. 6, pp. 802-823"/>
        <seriesInfo name="DOI" value="10.1080/21670811.2019.1623701"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="CLINIC">
        <front>
          <title>I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis</title>
          <author fullname="Brad Miller" initials="B." surname="Miller">
            <organization/>
          </author>
          <author fullname="Ling Huang" initials="L." surname="Huang">
            <organization/>
          </author>
          <author fullname="A. D. Joseph" initials="A." surname="Joseph">
            <organization/>
          </author>
          <author fullname="J. D. Tygar" initials="J." surname="Tygar">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Privacy Enhancing Technologies" value="pp. 143-163"/>
        <seriesInfo name="DOI" value="10.1007/978-3-319-08506-7_8"/>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
            <organization/>
          </author>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
            <organization/>
          </author>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="EROSION">
        <front>
          <title>Erosion of the moral authority of transparent middleboxes</title>
          <author fullname="Joe Hildebrand">
	 </author>
          <author fullname="Patrick McManus">
	 </author>
          <date day="10" month="November" year="2014"/>
          <abstract>
            <t>   Many middleboxes on the Internet attempt to add value to the
   connections that traverse that point on the network.  Problems in
   their implementations erode the moral authority that otherwise might
   accrue to the legitimate value that they add.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-hildebrand-middlebox-erosion-01"/>
      </reference>
      <reference anchor="MIDDLEBOX">
        <front>
          <title>Middleboxes: Taxonomy and Issues</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter">
            <organization/>
          </author>
          <author fullname="S. Brim" initials="S." surname="Brim">
            <organization/>
          </author>
          <date month="February" year="2002"/>
          <abstract>
            <t>This document is intended as part of an IETF discussion about "middleboxes" - defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host.  This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify some preliminary conclusions.  It does not, however, claim to be definitive.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3234"/>
        <seriesInfo name="DOI" value="10.17487/RFC3234"/>
      </reference>
      <reference anchor="USE-IT">
        <front>
          <title>Long-Term Viability of Protocol Extension Mechanisms</title>
          <author fullname="M. Thomson" initials="M." surname="Thomson">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <date month="December" year="2021"/>
          <abstract>
            <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change.  This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9170"/>
        <seriesInfo name="DOI" value="10.17487/RFC9170"/>
      </reference>
      <reference anchor="TCP-EXTEND">
        <front>
          <title>Is it still possible to extend TCP?</title>
          <author fullname="Michio Honda" initials="M." surname="Honda">
            <organization/>
          </author>
          <author fullname="Yoshifumi Nishida" initials="Y." surname="Nishida">
            <organization/>
          </author>
          <author fullname="Costin Raiciu" initials="C." surname="Raiciu">
            <organization/>
          </author>
          <author fullname="Adam Greenhalgh" initials="A." surname="Greenhalgh">
            <organization/>
          </author>
          <author fullname="Mark Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="Hideyuki Tokuda" initials="H." surname="Tokuda">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
        <seriesInfo name="Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC" value="'11"/>
        <seriesInfo name="DOI" value="10.1145/2068816.2068834"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
            <organization/>
          </author>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
            <organization/>
          </author>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="IPv6">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering">
            <organization/>
          </author>
          <author fullname="R. Hinden" initials="R." surname="Hinden">
            <organization/>
          </author>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="SRv6">
        <front>
          <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
            <organization/>
          </author>
          <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo">
            <organization/>
          </author>
          <author fullname="J. Leddy" initials="J." surname="Leddy">
            <organization/>
          </author>
          <author fullname="D. Voyer" initials="D." surname="Voyer">
            <organization/>
          </author>
          <author fullname="S. Matsushima" initials="S." surname="Matsushima">
            <organization/>
          </author>
          <author fullname="Z. Li" initials="Z." surname="Li">
            <organization/>
          </author>
          <date month="February" year="2021"/>
          <abstract>
            <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
            <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
            <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8986"/>
        <seriesInfo name="DOI" value="10.17487/RFC8986"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg">
            <organization/>
          </author>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
            <organization/>
          </author>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo">
            <organization/>
          </author>
          <author fullname="A. Johnston" initials="A." surname="Johnston">
            <organization/>
          </author>
          <author fullname="J. Peterson" initials="J." surname="Peterson">
            <organization/>
          </author>
          <author fullname="R. Sparks" initials="R." surname="Sparks">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="E. Schooler" initials="E." surname="Schooler">
            <organization/>
          </author>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC7092">
        <front>
          <title>A Taxonomy of Session Initiation Protocol (SIP) Back-to-Back User Agents</title>
          <author fullname="H. Kaplan" initials="H." surname="Kaplan">
            <organization/>
          </author>
          <author fullname="V. Pascual" initials="V." surname="Pascual">
            <organization/>
          </author>
          <date month="December" year="2013"/>
          <abstract>
            <t>In many SIP deployments, SIP entities exist in the SIP signaling path between the originating and final terminating endpoints, which go beyond the definition of a SIP proxy, performing functions not defined in Standards Track RFCs.  The only term for such devices provided in RFC 3261 is for a Back-to-Back User Agent (B2BUA), which is defined as the logical concatenation of a SIP User Agent Server (UAS) and User Agent Client (UAC).</t>
            <t>There are numerous types of SIP B2BUAs performing different roles in different ways; for example, IP Private Branch Exchanges (IPBXs), Session Border Controllers (SBCs), and Application Servers (ASs). This document identifies several common B2BUA roles in order to provide taxonomy other documents can use and reference.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7092"/>
        <seriesInfo name="DOI" value="10.17487/RFC7092"/>
      </reference>
      <reference anchor="TLS">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="PATH-SIGNALS">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie">
            <organization/>
          </author>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals.  For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear.  Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements.  In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels.  Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="ECN">
        <front>
          <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
          <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan">
            <organization/>
          </author>
          <author fullname="S. Floyd" initials="S." surname="Floyd">
            <organization/>
          </author>
          <author fullname="D. Black" initials="D." surname="Black">
            <organization/>
          </author>
          <date month="September" year="2001"/>
          <abstract>
            <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3168"/>
        <seriesInfo name="DOI" value="10.17487/RFC3168"/>
      </reference>
      <reference anchor="ICMP">
        <front>
          <title>Internet Control Message Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="792"/>
        <seriesInfo name="DOI" value="10.17487/RFC0792"/>
      </reference>
      <reference anchor="RFC8404">
        <front>
          <title>Effects of Pervasive Encryption on Operators</title>
          <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
            <organization/>
          </author>
          <date month="July" year="2018"/>
          <abstract>
            <t>Pervasive monitoring attacks on the privacy of Internet users are of serious concern to both user and operator communities.  RFC 7258 discusses the critical need to protect users' privacy when developing IETF specifications and also recognizes that making networks unmanageable to mitigate pervasive monitoring is not an acceptable outcome: an appropriate balance is needed.  This document discusses current security and network operations as well as management practices that may be impacted by the shift to increased use of encryption to help guide protocol development in support of manageable and secure networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8404"/>
        <seriesInfo name="DOI" value="10.17487/RFC8404"/>
      </reference>
      <reference anchor="RFC8517">
        <front>
          <title>An Inventory of Transport-Centric Functions Provided by Middleboxes: An Operator Perspective</title>
          <author fullname="D. Dolson" initials="D." role="editor" surname="Dolson">
            <organization/>
          </author>
          <author fullname="J. Snellman" initials="J." surname="Snellman">
            <organization/>
          </author>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
            <organization/>
          </author>
          <author fullname="C. Jacquenet" initials="C." surname="Jacquenet">
            <organization/>
          </author>
          <date month="February" year="2019"/>
          <abstract>
            <t>This document summarizes an operator's perception of the benefits that may be provided by intermediary devices that execute functions beyond normal IP forwarding.  Such intermediary devices are often called "middleboxes".</t>
            <t>RFC 3234 defines a taxonomy of middleboxes and issues in the Internet.  Most of those middleboxes utilize or modify application- layer data.  This document primarily focuses on devices that observe and act on information carried in the transport layer, and especially information carried in TCP packets.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8517"/>
        <seriesInfo name="DOI" value="10.17487/RFC8517"/>
      </reference>
      <reference anchor="RFC9065">
        <front>
          <title>Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols</title>
          <author fullname="G. Fairhurst" initials="G." surname="Fairhurst">
            <organization/>
          </author>
          <author fullname="C. Perkins" initials="C." surname="Perkins">
            <organization/>
          </author>
          <date month="July" year="2021"/>
          <abstract>
            <t>To protect user data and privacy, Internet transport protocols have supported payload encryption and authentication for some time. Such encryption and authentication are now also starting to be applied to the transport protocol headers. This helps avoid transport protocol ossification by middleboxes, mitigate attacks against the transport protocol, and protect metadata about the communication. Current operational practice in some networks inspect transport header information within the network, but this is no longer possible when those transport headers are encrypted.</t>
            <t>This document discusses the possible impact when network traffic uses a protocol with an encrypted transport header. It suggests issues to consider when designing new transport protocols or features.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9065"/>
        <seriesInfo name="DOI" value="10.17487/RFC9065"/>
      </reference>
      <reference anchor="NS-IMPACT">
        <front>
          <title>Impact of TLS 1.3 to Operational Network Security Practices</title>
          <author fullname="Nancy Cam-Winget">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Eric Wang">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Roman Danyliw">
            <organization>Software Engineering Institute</organization>
          </author>
          <author fullname="Roelof DuToit">
            <organization>Broadcom</organization>
          </author>
          <date day="26" month="January" year="2021"/>
          <abstract>
            <t>   Network-based security solutions are used by enterprises, the public
   sector, internet-service providers, and cloud-service providers to
   both complement and enhance host-based security solutions.  As TLS is
   a widely deployed protocol to secure communication, these network-
   based security solutions must necessarily interact with it.  This
   document describes this interaction for current operational security
   practices and notes the impact of TLS 1.3 on them.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-ns-impact-04"/>
      </reference>
      <reference anchor="LEAST-PRIVILEGE">
        <front>
          <title>Protection and the control of information sharing in multics</title>
          <author fullname="Jerome H. Saltzer" initials="J." surname="Saltzer">
            <organization>Massachusetts Institute of Technology, Cambridge</organization>
          </author>
          <date month="July" year="1974"/>
        </front>
        <seriesInfo name="Communications of the ACM" value="vol. 17, no. 7, pp. 388-402"/>
        <seriesInfo name="DOI" value="10.1145/361011.361067"/>
      </reference>
      <reference anchor="RFC3552">
        <front>
          <title>Guidelines for Writing RFC Text on Security Considerations</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <author fullname="B. Korver" initials="B." surname="Korver">
            <organization/>
          </author>
          <date month="July" year="2003"/>
          <abstract>
            <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="72"/>
        <seriesInfo name="RFC" value="3552"/>
        <seriesInfo name="DOI" value="10.17487/RFC3552"/>
      </reference>
      <reference anchor="RFC3724">
        <front>
          <title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
          <author fullname="J. Kempf" initials="J." role="editor" surname="Kempf">
            <organization/>
          </author>
          <author fullname="R. Austein" initials="R." role="editor" surname="Austein">
            <organization/>
          </author>
          <author>
            <organization>IAB</organization>
          </author>
          <date month="March" year="2004"/>
          <abstract>
            <t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3724"/>
        <seriesInfo name="DOI" value="10.17487/RFC3724"/>
      </reference>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is merely an attempt to codify existing practice.  Practice that
is inspired, at least in part, by prior work, including <xref target="RFC3552"/> and
<xref target="RFC3724"/> which both advocate for clearer articulation of trust boundaries.</t>
      <t><contact fullname="Jari Arkko"/>, <contact fullname="Eric Rescorla"/>, and <contact fullname="David Schinazi"/> are acknowledged
for their contributions of thought, review, and text.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
