<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc RFCedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-knodel-e2ee-definition-05" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="e2ee">Definition of End-to-end Encryption</title>

    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="F." surname="Baker" fullname="Fred Baker">
      <organization></organization>
      <address>
        <email>fredbaker.IETF@gmail.com</email>
      </address>
    </author>
    <author initials="O." surname="Kolkman" fullname="Olaf Kolkman">
      <organization>ISOC</organization>
      <address>
        <email>kolkman@isoc.org</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <organization>Centre for Internet and Society</organization>
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>

    <date year="2022" month="July" day="27"/>

    <area>sec</area>
    <workgroup>sec</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>End-to-end encryption is an application of cryptography in communication systems between endpoints. End-to-end encrypted systems are unique in providing features of confidentiality, integrity and authenticity for users. Improvements to end-to-end encryption strive to maximise the system's security while balancing usability and availability. Users of end-to-end encrypted communications expect trustworthy providers of secure implementations to respect and protect their right to whisper.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document defines end-to-end encryption using three different dimensions that together comprise a full definition of end-to-end encryption, which can be applied in a variety of contexts.</t>

<t>The first is a formal definition that draws on the basic understanding of end points and cryptography. The second looks at end-to-end encrypted systems from a design perspective, both its fundamental features and proposed improvements on those features. Lastly this document considers the expectations of the user of end-to-end encrypted systems.</t>

<t>These dimensions taken as a whole comprise a generally comprehensible picture of consensus at the IETF as to what is end-to-end encryption, irrespective of application, from messaging to video conferencing, and between any number of end points.</t>

</section>
<section anchor="formal-definition-of-end-to-end-encryption"><name>Formal definition of end-to-end encryption</name>

<t>An end-to-end encrypted communications system, irrespective of the content or the specific methods employed, relies on two important and rigorous technical concepts: The end-to-end principle and what defines an end, according to the IETF because of its importance to internet protocols; and encryption, an application of cryptography and the primary means employed by the IETF to secure internet protocols. In the field of cryptography it is also possible to achieve a concise definition of end-to-end encrypted security.</t>

<section anchor="end-point"><name>End point</name>

<t>Intuitively, an "end" either sends messages or receives them, usually both; other systems on the path are just that - other systems.</t>

<t>It is, however, not trivial to establish the definition of an end point in isolation, because its existence inherently depends on at least one other entity in a communications system. Instead the end-to-end principle, which is well established in internet standards and introduces nuance, is described in the following sub-section.</t>

<t>However despite the nuance for engineers, it is now widely accepted that the communication system itself begins and ends with the user <xref target="RFC8890"/>. Imagine people (through an application's user interface, or user agent) as components in a subsystem's design. An important exception to this in end-to-end encrypted systems might be the use of public key infrastructure where a third party is often used in the authentication phase to enhance the larger system's trust model. Responsible use of of public key infrastructure is required in such cases, such that the end-to-end encrypted system does not admit third parties under the user's identity.</t>

<t>User agent and user cannot be equated, yet they cannot be fully separated. As user-agent computing becomes more complex and often more proprietary, the user agent becomes less of an "advocate" for the best interests of the user. This is why this document introduces a later section on the end-to-end encrypted system being able to fulfill user expectations.</t>

</section>
<section anchor="end-to-end-principle"><name>End-to-end principle</name>

<t>We need first to answer "What constitutes an end?", which is an important question in any review of the End-to-End Principle <xref target="RFC3724"/>. However the notion of an end point is more fully defined within the principle of end-to-end communications.</t>

<t>In 1984 the "end-to-end argument" was introduced <xref target="saltzer"/> as a design principle that helps guide placement of functions among the modules of a distributed computer system. It suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level. It is used to design around questions about which parts of the system should make which decisions, and as such the identity of the actual "speaker" or "end" may be less obvious than it appears. The communication described by Saltzer is between communicating processes, which may or may not be on the same physical machine, and may be implemented in various ways. For example, a Border Gateway Protocol (BGP) speaker is often implemented as a process that manages the Routing Information Base (RIB) and communicates with other BGP speakers using an operating system service that implements TCP. The RIB manager might find itself searching the RIB for prefixes that should be advertised to a peer, and performing "writes" to TCP for each one. TCP in this context often implements a variant of the algorithm described in RFC 868 (the "Nagle algorithm"), which accumulates writes in a buffer until there is no data in flight between the communicants, and then sends it - which might happen several times during a single search by the RIB manager. In that sense, the RIB manager might be thought of as the "end", because it decides what should be communicated, or TCP might be the "end", because it actually sends the TCP Segment, detects errors if they occur, retransmits it if necessary, and ultimately decides that the segment has been successfully transferred.</t>

<t>Another important question is "what statement exactly summarizes the end-to-end principle?". Saltzer answered this in two ways, the first of which is that the service implementing the transaction is most correct if it implements the intent of the application that sent it, which would be to move the message toward the destination address in the relevant IP header. Salzer's more thorough treatment, however, deals with end cases that come up in implementation: "Examples discussed in the paper", according to the abstract, "include bit error recovery, security using encryption, duplicate message suppression, recovery from system crashes, and delivery acknowledgement." It also notes that there is occasionally a rationale for ignoring the end-to-end arguments for the purposes of optimization. There may be other user expectations or design features, some explained below, which need to be balanced with the end-to-end argument.</t>

<t>More concisely, suppose that an end user is the end identity. An end-to-end encrypted system may run between potential end points at different network layers within the end identity's possession. These end points may then be considered acceptable sub-identities provided that no path between the end identity and sub-identity is accessible by any third party. There are quite a number of examples of common situations where tunnels are used and this does not apply. For instance, the examples below all provide encryption by which data is turned into clear text in locations that are not under control of the end user:</t>

<t><list style="symbols">
  <t>The common VPN business model whereby a TLS or an IPsec tunnel terminates at the service provider's server and is subsequently forwarded to its destination elsewhere in unencrypted form;</t>
  <t>Email transport whereby an unencrypted message traverses from sending mail user agent, between various mail transfer agents, and finally to a receiving mail user agent, all over TLS protected connections;</t>
  <t>The encrypted connection of last mile connections such as those in 4G LTE;</t>
</list></t>

<t>This definition of end points accounts for potentially several devices owned by a user, and various application-specific forwarding or delivery options among them. It also accounts for end-to-end encrypted systems running at different network layers. Regardless of the sub-identities allowed, the definition is contingent on that all end sub-identities are under the end identity's control and no third party (or their sub-identities, e.g. system components under third-party control) can access the end sub-identities nor links between the sub-identity and end identity.
This creates a tree hierarchy with the end user as the root at the top, and all potential end points being under their direct control, without third party access.
As an example, decryption at organizational network router before message forwarding (encrypted or unencrypted) to the end identity does not constitute end-to-end encryption. However, end-to-end encryption to a user's personal device and subsequent end-to-end encrypted message forwarding to another one of the user's personal devices (without access available to any third party at any link or on device) maintains end-to-end encrypted data possession for the user.</t>

</section>
<section anchor="encryption"><name>Encryption</name>

<t>From draft-dkg-hrpc-glossary-00, encryption is fundamental to the end-to-end principle. "End-to-End: The principal of extending characteristics of a protocol or system as far as possible within the system. For example, end-to-end instant message encryption would conceal communication content from one user's instant messaging application through any intermediate devices and servers all the way to the recipient's instant messaging application. If the message was decrypted at any intermediate point--for example at a service provider--then the property of end-to-end encryption would not be present."<xref target="dkg"/> Note that this only talks about the contents of the communication and not the metadata generated from it.</t>

<t>The way to achieve a truly end-to-end communications system is indeed to encrypt the content of the data exchanged between the endpoints, e.g. sender(s) and receiver(s). The more common end-to-end technique for encrypting uses the double-ratchet algorithm with an authenticated encryption scheme, present in many modern messenger applications such as those considered in the IETF Messaging Layer Security working group, whose charter is to create a document that satisfies the need for several Internet applications for group key establishment and message protection protocols <xref target="mls"/>. OpenPGP, mostly used for email, uses a different technique to achieve encryption. It is also chartered in the IETF to create a specification that covers object encryption, object signing, and identity certification <xref target="openpgp"/>. Both protocols rely on the use of asymmetric and symmetric encryption, and exchange public keys amongst end points.</t>

<t>There are dozens of documents in the RFC Series that fundamentally and technically define encryption schemes. Perhaps interesting work to be done would be to survey all existing documents of this kind to define, in aggregate, their common features. The point is, the IETF has clear mandate and demonstrated expertise in defining the specifics of encrypted communications of the internet.</t>

<t>While encryption is fundamental to the end-to-end principle, it does not stand alone. As in the history of all security, authentication and data integrity properties are also linked, and contributed to the end-to-end nature of end-to-end encryption. Permission of data manipulation or pseudo-identities for third parties to allow access under the user's identity are against the intention of end-to-end encryption. Thus, end point authenticity must be established as (sub-)identities of the end user, and end-to-end integrity must also be maintained by the system. There is considerable system design flexibility available in entity authentication mechanisms and data authentication that still meet this requirement.</t>

</section>
<section anchor="concise-definition-of-end-to-end-security"><name>Concise definition of end-to-end security</name>

<t>A concise definition for end-to-end security can describe the security of the system by the probability of an adversary's success in breaking the system. Example snippet:</t>

<t>The adversary successfully subverts an end-to-end encrypted system if it can succeed in either of the following: 1) the adversary can produce the participant's local state (meaning the adversary has learned the contents of participant's messages), or 2) the states of conversation participants do not match (meaning that the adversary has influenced their communication in some way). To prevent the adversary from trivially winning, the adversary is not allowed to compromise the participants' local state.</t>

<t>We can say that a system is end-to-end secure if the adversary has negligible probability of success in either of these two scenarios <xref target="komlo"/>.</t>

</section>
</section>
<section anchor="end-to-end-encrypted-systems-design"><name>End-to-end encrypted systems design</name>

<t>When looking at end-to-end encrypted systems from a design perspective, the first consideration is the list of fundamental features that distinguish an end-to-end encrypted system from one that does not employ end-to-end encryption. Secondly one must consider the development goals for improving the features of end-to-end encrypted systems, in other words, the challenges defined by the designers, developers and implementers of end-to-end encrypted systems.</t>

<t>The features and challenges listed below are framed comprehensively rather than from the perspective of their design, development, implementation or use.</t>

<section anchor="features"><name>Features</name>

<t>Defining a technology can also be done by inspecting what it does, or is meant to do, in the form of features. The features of end-to-end encryption from an implementation perspective can be inspected across several important categories: 1) the necessary features of end-to-end encrypted of authenticity, confidentiality, and integrity, whereas features of 2) availability, deniability, forward secrecy, and post-compromise security are enhancements to end-to-end encrypted systems.</t>

<section anchor="necessary-features"><name>Necessary features</name>

<dl>
  <dt>Authenticity</dt>
  <dd>
    <t>A system provides message authenticity if the recipient and sender attest to each other's identities in relation to the contents of their communications.</t>
  </dd>
  <dt>Confidentiality</dt>
  <dd>
    <t>A system provides message confidentiality if only the sender and intended recipient(s) can read the message plaintext, i.e. messages are encrypted by the sender such that only the recipient(s) shared and agreed by all recipients can decrypt them.</t>
  </dd>
  <dt>Integrity</dt>
  <dd>
    <t>A system provides message integrity when it guarantees that messages that have been modified in transit can be detected reliably, i.e. a recipient is assured that a message cannot be undetectably modified in any way.</t>
  </dd>
</dl>

</section>
<section anchor="optionaldesirable-features"><name>Optional/desirable features</name>

<dl>
  <dt>Availability</dt>
  <dd>
    <t>A system provides high availability if the user is able to get to the message when they so desire and potentially from more than one device, i.e. a message arrives to a recipient even if they have been offline for a long time.</t>
  </dd>
  <dt>Deniability</dt>
  <dd>
    <t>Deniability ensures that anyone able to decrypt a record of the transcript, including message recipients, cannot cryptographically prove to others that a particular participant of a communication authored the message. As demonstrated by widely implemented protocols, this optional property must exist in conjunction with the necessary property of message authenticity, i.e. participants in a communication must be assured that they are communicating with the intended parties but this assurance cannot be transmitted to any other parties.</t>
  </dd>
  <dt>Forward secrecy</dt>
  <dd>
    <t>Forward secrecy is a security property that prevents attackers from decrypting encrypted data they have previously captured over a communication channel before the time of compromise, even if they have compromised one of the endpoints. Forward secrecy is usually achieved by deriving new encryption/decryption keys, and old keys no longer required to encrypt or decrypt any new messages are immediately destroyed.</t>
  </dd>
  <dt>Post-compromise security</dt>
  <dd>
    <t>Post-compromise security is a security property that seeks to guarantee future confidentiality and integrity even on the face of an end-point compromise (and consequently that communication sent post-compromise is protected with the same security properties that existed before the compromise). It is usually achieved by adding new ephemeral key exchanges to the derivation of encryption/decryption keys.</t>
  </dd>
  <dt>Metadata obfuscation</dt>
  <dd>
    <t>Digital communication inevitably generates data other than the content of the communication itself, such as IP addresses, date and time. To enhance the confidentiality and security of end-to-end encrypted systems, steps should be taken to minimize metadata leakage such as user obfuscating IP addresses, reducing non-routing metadata, and avoiding extraneous message headers.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="challenges"><name>Challenges</name>

<t>Earlier in this document end-to-end encryption was defined using formal definitions assumed by internet protocol implementations. Also because the IETF is the place for "producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet" <xref target="RFC3935"/> the reader can be confident that current deployments of end-to-end encrypted technologies in the IETF indicate the cutting edge of their developments, which is yet another way to define what is, or ideally should be, a particular kind of technology.</t>

<t>Below is best effort list of the challenges currently faced by protocol designers of end-to-end encrypted systems. Problems that fall outside of this list are likely 1) unnecessary feature requests that negligibly, or do nothing to, achieve the aims of end-to-end encrypted systems or are 2) in some way antithetical to the goals of end-to-end encrypted systems.</t>

<t><list style="symbols">
  <t>Public key verification is very difficult for users to manage. Authentication of the two ends is required for confidential conversations. Therefore solving the problem of verification of public keys is a major concern for any end-to-end encrypted system design. Some applications bind together the account identity and the key, and leave users to establish a trust relationship between them, assisted by public key fingerprint information.</t>
  <t>Users want to smoothly switch application use between devices, but this comes at a cost to the security of user data. Thus, there is a problem of availability in end-to-end encrypted systems because the account identity's private key is generated by and stored on the end-user's original device and to move the private key to another device compromises the security of one of the end-points of the system.</t>
  <t>Existing protocols are vulnerable to meta-data analysis, even though meta-data is often much more sensitive than content. Meta-data is plaintext information that travels across the wire and includes delivery-relevant details that central servers need such as the account identity of end-points, timestamps, message size. Meta-data is difficult to eliminate or obfuscate entirely.</t>
  <t>Users need to communicate in groups, but this presents problems of scale for end-to-end encryption systems that rely on public key cryptography.</t>
  <t>The whole of a user's data should remain secure if only one message is compromised. However, for encrypted communication, you must currently choose between forward secrecy or the ability to communicate asynchronously. This presents a problem for application design that uses end-to-end encryption for asynchronous messaging over email, RCS, etc.</t>
  <t>Users of end-to-end encrypted systems should be able to communicate with any medium of their choice, from text to large files, however there is often a resource problem because there are no open protocols to allow users to securely share the same resource in an end-to-end encrypted system.</t>
  <t>Usability considerations are sometimes in conflict with security considerations, such as message read status, typing indicators, URL/link previews.</t>
  <t>Deployment is notoriously challenging for any software application where maintenance and updates can be particularly disastrous for obsolete cryptographic libraries.</t>
</list></t>

</section>
</section>
<section anchor="end-user-expectations"><name>End-user expectations</name>

<t>While the formal definition and properties of an end-to-end encrypted system relate to communication security, they do not draw from a comprehensive threat model or speak to what users expect from end-to-end encrypted communication. It is in this context that some designs and architectures of end-to-end encryption may ultimately run contrary to user expectations of end-to-end encrypted systems <xref target="GEC-EU"/>. Although some system designs do not directly violate "the math" of encryption algorithms, they do so by implicating and weakening other important aspects of an end-to-end encrypted <em>system</em>.</t>

<section anchor="a-conversation-is-confidential"><name>A conversation is confidential</name>

<t>Users talking to one another in an end-to-end encrypted system should be the only ones that know what they are talking about <xref target="RFC7624"/>. People have the right to data privacy as defined in international human rights law and within the right to free expression and to hold opinions is inferred the right to whisper, whether or not they are using digital communications or walking through a field.</t>

</section>
<section anchor="providers-are-trustworthy"><name>Providers are trustworthy</name>

<t>While "trustworthy" can be rigourously defined from an engineering perspective, for the purposes of this document a definition inspired by an internal workshop for Internet Society staff is sufficient:</t>

<dl>
  <dt>Trustworthy</dt>
  <dd>
    <t>A system is completely trustworthy if and only if it is completely resilient, reliable, accountable, and secure in a way that consistently meets users’ expectations. The opposite of trustworthy is untrustworthy.</t>
  </dd>
</dl>

<t>This definition is complete in its positive and negative aspects: what it is, e.g. "Worthy of confidence" and what it is not, e.g. in RFC 7258: "behavior that subverts the intent of  communicating parties without the agreement of those parties" <xref target="RFC7258"/>.</t>

<t>Therefore, a trustworthy end-to-end encrypted communication system is the provider of the set of functions needed by two or more parties to communicate among each other in a confidential and authenticated fashion without any third party having access to the content of that communication where the functions that offer the confidentiality and authenticity are trustworthy.</t>

</section>
<section anchor="access-by-a-third-party-is-impossible"><name>Access by a third-party is impossible</name>

<t>No matter the specifics, any methods used to access to the content of the messages by a third party would violate a user's expectations of end-to-end encrypted messaging. "[T]hese access methods scan message contents on the user’s [device]", which are then "scanned for matches against a database of prohibited content before, and sometimes after, the message is sent to the recipient" <xref target="GEC-EU"/>. Third party access also covers cases without scanning -- namely, it should not be possible for any third-party end point to access the data regardless of reason.</t>

<t>If a method makes private communication, intended to be sent over an encrypted channel between end points, available to parties other than the sender and intended recipient(s), without formally interfering with channel confidentiality, that method violates the understood expectation of that security property.</t>

</section>
<section anchor="pattern-inference-is-minimised"><name>Pattern inference is minimised</name>

<t>Analyses such as traffic fingerprinting or other (encrypted or unencrypted) data analysis techniques should be considered outside the scope of an end-to-end encrypted system's goals of providing secure communications to end users.</t>

<t>Such methods of analyses, outside of or as part of end-to-end encrypted system design, allow third parties to draw inferences from communication that was intended to be confidential. "By allowing private user data to be scanned via direct access by servers and their providers," the use of these methods should be considered an affront to "the privacy expectations of users of end-to-end encrypted communication systems" <xref target="GEC-EU"/>.</t>

<t>Not only should an end-to-end encrypted system value user data privacy by not enabling pattern inference, it should actively be attempting to solve issues of metadata and traceability (enhanced metadata) through further innovation that stays ahead of advances in these techniques.</t>

</section>
<section anchor="the-end-to-end-encrypted-system-is-not-compromised"><name>The end-to-end encrypted system is not compromised</name>

<t>RFC 3552 talks about the Internet Threat model such as the assumption that the user can expect any communications systems, but perhaps especially end-to-end encrypted systems, to not be intentionally compromised <xref target="RFC3552"/>. Intentional compromises of end-to-end encrypted systems are often referred to as "backdoors" but are often presented as additional design features under terms like "key escrow." Users of end-to-end encrypted systems would not expect a front, back or side door entrance into their confidential conversations and would expect a provider to actively resist -- technically and legally -- compromise through these means.</t>

</section>
</section>
<section anchor="conclusions"><name>Conclusions</name>

<t>From messaging to video conferencing, there are many competing features in an end-to-end encrypted system that is secure and usable. The most well designed system cannot meet the expectations of every user, nor does an ideal system exist from any dimension. End-to-end encryption is a technology that is constantly improving to achieve the ideal as defined in this document.</t>

<t>Features and functionalities of end-to-end encrypted systems should be developed and improved in service of end user expectations for privacy preserving communications.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Fred Baker, Stephen Farrell, Richard Barnes, Olaf Kolkman all contributed to the early strategic thinking of this document and whether it would be useful to the IETF community.</t>

<t>The folks at Riseup and the LEAP Encryption Access Project have articulated brilliantly the hardest parts of end-to-end encryption systems that serve the end users' right to whisper.</t>

<t>Ryan Polk at the Internet Society has energy to spare when it comes to organising meaningful contributions, like this one, for the technical advisors of the Global Encryption Coalition.</t>

<t>Adrian Farrel, Paul Wouters, __ are acknowleded for their review, comments, or questions that lead to improvement of this document.</t>

<t>Chelsea Komlo and Britta Hale have contributed their deep expertise and consice and rigourous writing to this draft.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document does not specify new protocols and therefore does not bring up technical security considerations.</t>

<t>Because some policy decicions may affect the security of the Internet, a clear and shared definition of end to end encrypted communication is important in policy related discussions.  This document aims to provide that clarity.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no actions for IANA.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>





<reference anchor='RFC3724' target='https://www.rfc-editor.org/info/rfc3724'>
<front>
<title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
<author fullname='J. Kempf' initials='J.' role='editor' surname='Kempf'><organization/></author>
<author fullname='R. Austein' initials='R.' role='editor' surname='Austein'><organization/></author>
<author><organization>IAB</organization></author>
<date month='March' year='2004'/>
<abstract><t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3724'/>
<seriesInfo name='DOI' value='10.17487/RFC3724'/>
</reference>



<reference anchor='RFC3552' target='https://www.rfc-editor.org/info/rfc3552'>
<front>
<title>Guidelines for Writing RFC Text on Security Considerations</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='B. Korver' initials='B.' surname='Korver'><organization/></author>
<date month='July' year='2003'/>
<abstract><t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='72'/>
<seriesInfo name='RFC' value='3552'/>
<seriesInfo name='DOI' value='10.17487/RFC3552'/>
</reference>



<reference anchor='RFC7258' target='https://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='May' year='2014'/>
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>



<reference anchor='RFC7624' target='https://www.rfc-editor.org/info/rfc7624'>
<front>
<title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
<author fullname='R. Barnes' initials='R.' surname='Barnes'><organization/></author>
<author fullname='B. Schneier' initials='B.' surname='Schneier'><organization/></author>
<author fullname='C. Jennings' initials='C.' surname='Jennings'><organization/></author>
<author fullname='T. Hardie' initials='T.' surname='Hardie'><organization/></author>
<author fullname='B. Trammell' initials='B.' surname='Trammell'><organization/></author>
<author fullname='C. Huitema' initials='C.' surname='Huitema'><organization/></author>
<author fullname='D. Borkmann' initials='D.' surname='Borkmann'><organization/></author>
<date month='August' year='2015'/>
<abstract><t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t></abstract>
</front>
<seriesInfo name='RFC' value='7624'/>
<seriesInfo name='DOI' value='10.17487/RFC7624'/>
</reference>



<reference anchor='RFC8890' target='https://www.rfc-editor.org/info/rfc8890'>
<front>
<title>The Internet is for End Users</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='August' year='2020'/>
<abstract><t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t></abstract>
</front>
<seriesInfo name='RFC' value='8890'/>
<seriesInfo name='DOI' value='10.17487/RFC8890'/>
</reference>



<reference anchor='RFC3935' target='https://www.rfc-editor.org/info/rfc3935'>
<front>
<title>A Mission Statement for the IETF</title>
<author fullname='H. Alvestrand' initials='H.' surname='Alvestrand'><organization/></author>
<date month='October' year='2004'/>
<abstract><t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='95'/>
<seriesInfo name='RFC' value='3935'/>
<seriesInfo name='DOI' value='10.17487/RFC3935'/>
</reference>


<reference anchor="saltzer" target="https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">
  <front>
    <title>End-to-end arguments in system design</title>
    <author initials="J. H." surname="Saltzer, et al">
      <organization></organization>
    </author>
    <date year="1984"/>
  </front>
</reference>
<reference anchor="dkg" target="https://tools.ietf.org/html/draft-dkg-hrpc-glossary-00">
  <front>
    <title>Human Rights Protocol Considerations Glossary</title>
    <author initials="D." surname="Gillmor">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="mls" target="https://datatracker.ietf.org/doc/charter-ietf-mls">
  <front>
    <title>Messaging Layer Security</title>
    <author initials="" surname="IETF">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="openpgp" target="https://datatracker.ietf.org/doc/charter-ietf-openpgp">
  <front>
    <title>Open Specification for Pretty Good Privacy</title>
    <author initials="" surname="IETF">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="GEC-EU" target="https://www.globalencryption.org/2020/11/breaking-encryption-myths/">
  <front>
    <title>Breaking encryption myths: What the European Commission’s leaked report got wrong about online security</title>
    <author initials="" surname="Global Encryption Coaliation">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="komlo" target="https://github.com/chelseakomlo/e2ee/blob/master/e2ee_definition.pdf">
  <front>
    <title>Defining end-to-end security</title>
    <author initials="" surname="Chelsea Komlo">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

