<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.16 (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc RFCedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-knodel-e2ee-definition-07" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="e2ee">Definition of End-to-end Encryption</title>

    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="F." surname="Baker" fullname="Fred Baker">
      <organization></organization>
      <address>
        <email>fredbaker.IETF@gmail.com</email>
      </address>
    </author>
    <author initials="O." surname="Kolkman" fullname="Olaf Kolkman">
      <organization>ISOC</organization>
      <address>
        <email>kolkman@isoc.org</email>
      </address>
    </author>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <organization>Centre for Internet and Society</organization>
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>

    <date year="2022" month="September" day="28"/>

    <area>sec</area>
    <workgroup>sec</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>End-to-end encryption is an application of cryptography mechanisms and properties in communication systems between endpoints. End-to-end encrypted systems are exceptional in providing both security and privacy properties through confidentiality, integrity and authenticity features for users. Improvements to end-to-end encryption strive to maximize the user's security and privacy while balancing usability and availability. Users of end-to-end encrypted communications expect trustworthy providers of secure implementations to respect and protect them.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document uses three different dimensions that define end-to-end encryption, which can be applied in a variety of contexts.</t>

<t>The first is a formal definition that draws on the basic understanding of end points and cryptography, where it is comprised of necessary constituent parts but considered as a system. The second looks at end-to-end encrypted implementations from a design perspective, both its fundamental features and proposed improvements on those features. Lastly this document considers the expectations of the user of end-to-end encryption.</t>

<t>These dimensions taken as a whole comprise a generally comprehensible picture of consensus at the IETF as to what is end-to-end encryption, irrespective of application, from messaging to video conferencing, and between any number of end points. It it worth noting that while the word "encryption" often refers to confidentiality (security) properties, this document shows that end-to-end encryption MUST provide both security and privacy properties. And it provides a definition of which specific security and privacy properties end-to-end encryption should provide.</t>

</section>
<section anchor="formal-definition-of-end-to-end-encryption"><name>Formal definition of end-to-end encryption</name>

<t>End-to-end encryption, irrespective of the content or the specific methods employed, relies on two important and rigorous technical concepts: the end-to-end principle as defined in the IETF; and encryption, an application of cryptographic mechanisms and the primary means employed by the IETF to secure internet protocols and maintain the privacy of content delivered via these internet protocols. Where end-to-end encryption is comprised of these necessary constituent parts, a systems approach also defines their interplay. In the field of cryptography it is also possible to achieve a concise definition of end-to-end encrypted security.</t>

<section anchor="end-point"><name>End point</name>

<t>Intuitively, an "end" either sends messages or receives them, usually both; other systems on the path are just that - other systems. Other systems MAY be used to facilitate the sending of messages between both "ends", but are not themselves "ends”."</t>

<t>It is, however, not trivial to establish the definition of an end point in isolation, because its existence inherently depends on at least one other entity in a communications system. Instead the end-to-end principle, which is well established <xref target="RFC3724"/> in internet standards and introduces nuance, is described in the following sub-section.</t>

<t>However despite the nuance for engineers, it is now widely accepted that the communication system itself begins and ends with the user <xref target="RFC8890"/>. Imagine people (through an application's user interface, or user agent) as components in a subsystem's design. An important distinction to this in end-to-end encrypted systems might be configuration channels, such as the use of public key infrastructure where a third party is often used in the authentication phase to enhance the larger system's trust model. Responsible use of public key infrastructure is required in such cases, such that the end-to-end encrypted system does not admit third parties under the user's identity.</t>

<t>User agent and user cannot be equated, nor can they be fully separated. As user-agent computing becomes more complex and often more proprietary, the user agent becomes less of an "advocate" for the best interests of the user. This is why this document introduces a later section on the end-to-end encrypted system being able to fulfill user expectations and serving only the user's interests.</t>

</section>
<section anchor="end-to-end-principle"><name>End-to-end principle</name>

<t>In order to describe what the "end-to-end" principle means, we need first to answer "What constitutes an end?", which is an important question in any review of the End-to-End Principle <xref target="RFC3724"/>. However the notion of an end point is more fully defined within the principle of end-to-end communications.</t>

<t>In 1984 the "end-to-end argument" was introduced <xref target="saltzer"/> as a design principle that helps guide placement of functions among the modules of a distributed computer system. It suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level. It is used to design around questions about which parts of the system should make which decisions, and as such the identity of the actual "speaker" or "end" may be less obvious than it appears. The communication described by Saltzer is between communicating processes, which may or may not be on the same physical machine, and may be implemented in various ways. For example, a Border Gateway Protocol (BGP) speaker is often implemented as a process that manages the Routing Information Base (RIB) and communicates with other BGP speakers using an operating system service that implements TCP. The RIB manager might find itself searching the RIB for prefixes that should be advertised to a peer, and performing "writes" to TCP for each one. TCP in this context often implements a variant of the algorithm described in RFC 868 (the "Nagle algorithm"), which accumulates writes in a buffer until there is no data in flight between the communicants, and then sends it - which might happen several times during a single search by the RIB manager. In that sense, the RIB manager might be thought of as the "end", because it decides what should be communicated, or TCP might be the "end", because it actually sends the TCP Segment, detects errors if they occur, retransmits it if necessary, and ultimately decides that the segment has been successfully transferred.</t>

<t>Another important question is "what statement exactly summarizes the end-to-end principle?". Saltzer answered this in two ways, the first of which is that the service implementing the transaction is most correct if it implements the intent of the application that sent it, which would be to move the message toward the destination address in the relevant IP header. Salzer's more thorough treatment, however, deals with end cases that come up in implementation: "Examples discussed in the paper", according to the abstract, "include bit error recovery, security using encryption, duplicate message suppression, recovery from system crashes, and delivery acknowledgement." It also notes that there is occasionally a rationale for ignoring the end-to-end arguments for the purposes of optimization. There may be other user expectations or design features, some explained below, which need to be balanced with the end-to-end argument.</t>

<t>More concisely, suppose that an end user is the end identity. An end-to-end encrypted system may run between potential end points at different network layers within the end identity's possession. These end points may then be considered acceptable sub-identities provided that no path between the end identity and sub-identity is accessible by any outside third party. There are quite a number of examples of common situations where tunnels are used and this does not apply. For instance, the examples below all provide encryption by which data is turned into clear text in locations that are not under control of the end user:</t>

<t><list style="symbols">
  <t>The common VPN business model whereby a TLS or an IPsec tunnel terminates at the service provider's server and is subsequently forwarded to its destination elsewhere in unencrypted form;</t>
  <t>Email transport whereby an unencrypted message traverses from sending mail user agent, between various mail transfer agents, and finally to a receiving mail user agent, all over TLS protected connections;</t>
  <t>The encrypted connection of last mile connections such as those in 4G LTE;</t>
</list></t>

<t>This definition of end points accounts for potentially several devices owned by a user, and various application-specific forwarding or delivery options among them. It also accounts for end-to-end encrypted systems running at different network layers. Regardless of the sub-identities allowed, the definition is contingent on that all end sub-identities are under the end identity's control and no third party (or their sub-identities, e.g. system components under third-party control) can access the end sub-identities nor links between the sub-identity and end identity.
This creates a tree hierarchy with the end user as the root at the top, and all potential end points being under their direct control, without third party access.
As an example, decryption at organizational network router before message forwarding (encrypted or unencrypted) to the end identity does not constitute end-to-end encryption. However, end-to-end encryption to a user's personal device and subsequent end-to-end encrypted message forwarding to another one of the user's personal devices (without access available to any third party at any link or on device) maintains end-to-end encrypted data possession for the user.</t>

</section>
<section anchor="encryption"><name>Encryption</name>

<t>Encryption is fundamental to the end-to-end principle. "End-to-End: The principal of extending characteristics of a protocol or system as far as possible within the system. For example, end-to-end instant message encryption would conceal communication content from one user's instant messaging application through any intermediate devices and servers all the way to the recipient's instant messaging application. If the message was decrypted at any intermediate point--for example at a service provider--then the property of end-to-end encryption would not be present."<xref target="dkg"/> Note that this only talks about the encrypted contents of the communication and not the metadata (often in plaintext) generated from it.</t>

<t>The way to achieve a truly end-to-end encrypted communication system (with required security and privacy properties) is indeed to encrypt, authenticate and provide integrity of the content of the data exchanged between the endpoints, e.g. sender(s) and receiver(s). The more common end-to-end technique achieve this through the use of the double-ratchet algorithm with an authenticated encryption scheme and of an Authenticated Key Exchange (AKE). The usage of these algorithms (or variants of these) is present in many modern messenger applications such as those considered in the IETF Messaging Layer Security working group, whose charter is to create a document that satisfies the need for several internet applications for group key establishment and message protection protocols <xref target="mls"/>. OpenPGP, mostly used for email, uses a different technique to achieve security and privacy. It is also chartered in the IETF to create a specification that covers object encryption, object signing, and identity certification <xref target="openpgp"/>. Both protocols rely on the use of asymmetric and symmetric encryption, and exchange long-term identity public keys amongst end points. The IETF has a clear mandate and demonstrated expertise in defining the specifics of secure and private communications of the internet.</t>

<t>While encryption is fundamental to the end-to-end principle, it does not stand alone. As in the history of all security, authentication and data integrity properties are also linked, and contributed to the end-to-end nature of end-to-end encryption. Permission of data manipulation or creation of pseudo-identities for third parties to allow access under the user's identity are against the intention of end-to-end encryption. In other words, the application functions only for the end user and does not perform functions for any other entity coverly, nor overtly, say even if that entity claims to have obtained the consent of the end user. Thus, end point authenticity MUST be established as (sub-)identities of the end user, and end-to-end integrity MUST also be maintained by the system. There is considerable system design flexibility available in entity authentication mechanisms and data authentication that still meet this requirement.</t>

</section>
<section anchor="concise-definition-of-end-to-end-security"><name>Concise definition of end-to-end security</name>

<t>A concise definition for end-to-end security can describe the security of the system by the probability of an adversary's success in breaking the system. Example snippet:</t>

<t>The adversary successfully subverts an end-to-end encrypted system if it can succeed in either of the following: 1) the adversary can produce the participant's local state (meaning the adversary has learned the decrypted contents of participant's messages), or 2) the states of conversation participants do not match (meaning that the adversary has influenced their communication in some way). To prevent the adversary from trivially winning, the adversary is not allowed to compromise the participants' local state.</t>

<t>We can say that a system is end-to-end secure if the adversary has negligible probability of success in either of these two scenarios <xref target="komlo"/>.</t>

</section>
</section>
<section anchor="end-to-end-encryption-implementations"><name>End-to-end encryption implementations</name>

<t>When looking at implementations of end-to-end encryption from a design perspective, the first consideration is the list of fundamental features that distinguish an end-to-end encrypted system from one that does not employ end-to-end encryption. Secondly, one must consider the development goals for improving the features of end-to-end encryption, in other words, the challenges defined by the designers, developers and implementers of end-to-end encryption.</t>

<t>The features and challenges listed below are framed comprehensively rather than from the perspective of their design, development, implementation or use.</t>

<section anchor="features"><name>Features</name>

<t>Defining a system can also be done by inspecting what it does, or is meant to do, in the form of features. The features of end-to-end encryption from an implementation perspective can be inspected across several important categories: 1) the necessary features of end-to-end encrypted for the properties of authenticity, confidentiality, and integrity, whereas features of 2) availability, deniability, forward secrecy, and post-compromise security are enhancements to end-to-end encryption.</t>

<section anchor="necessary-features"><name>Necessary features</name>

<dl>
  <dt>Authenticity</dt>
  <dd>
    <t>A system provides message authenticity if the recipient and sender attest to each other's identities in relation to the contents of their communications.</t>
  </dd>
  <dt>Confidentiality</dt>
  <dd>
    <t>A system provides message confidentiality if only the sender and intended recipient(s) can read the message plaintext, i.e. message sent between participants can only be read by the agreed upon participants in the group and all participants share the identical group member list.</t>
  </dd>
  <dt>Integrity</dt>
  <dd>
    <t>A system provides message integrity when it guarantees that messages that have been modified in transit. If they have been modified, it must be detected in a reliable way such that a recipient is assured that a message cannot be undetectably modified in any way.</t>
  </dd>
</dl>

</section>
<section anchor="optionaldesirable-features"><name>Optional/desirable features</name>

<dl>
  <dt>Availability</dt>
  <dd>
    <t>A system provides high availability if the user is able to access the contents of the message (decrypt them) when they so desire and potentially from more than one device, i.e. a message arrives to a recipient even if they have been offline for a long time. Note that applications that use this feature often implement a threshold for this property: number or aggregate size of messages; or messages from a month ago can be read by a user that has been offline, but not messages from a year ago.</t>
  </dd>
  <dt>Loss Resilience</dt>
  <dd>
    <t>If a message is permanently lost by the network, sender(s) and/or recipient(s) should still be able to communicate.</t>
  </dd>
  <dt>Deniability</dt>
  <dd>
    <t>Deniability ensures that anyone able to decrypt a record of the transcript, including message recipients, cannot cryptographically prove to others that a particular participant of a communication authored a specific message. As demonstrated by widely implemented protocols, this optional property must exist in conjunction with the necessary property of message authenticity, i.e. participants in a communication must be assured that they are communicating with the intended parties but this assurance cannot be transmitted to any other parties.</t>
  </dd>
  <dt>Forward secrecy</dt>
  <dd>
    <t>Forward secrecy is a security property that prevents attackers from decrypting encrypted data they have previously captured over a communication channel before the time of compromise, even if they have compromised one of the endpoints. Forward secrecy is usually achieved by deriving new encryption/decryption keys, and old keys no longer required to encrypt or decrypt any new messages are immediately destroyed.</t>
  </dd>
  <dt>Post-compromise security</dt>
  <dd>
    <t>Post-compromise security is a security property that seeks to guarantee future confidentiality and integrity even in the face of an end-point compromise (and consequently that communication sent post-compromise is protected with the same security properties that existed before the compromise). It is usually achieved by adding new ephemeral key exchanges (new randomness) to the derivation of encryption/decryption keys every 'x' amount of time or after 'n' messages sent. Note that post-compromise security is not met in the face of active attackers.</t>
  </dd>
  <dt>Metadata obfuscation</dt>
  <dd>
    <t>Digital communication inevitably generates data other than the content of the communication itself, such as IP addresses, group memberships, date and time of messages. To enhance the privacy and security of end-to-end encryption, steps should be taken to minimize metadata leakage such as users hiding IP addresses, reducing non-routing metadata, and avoiding extraneous message headers.</t>
  </dd>
  <dt>Disappearing messages</dt>
  <dd>
    <t>For truly confidential conversations, deleting one-by-one sensitive messages typically depends on a level of client-side security that is unsustainable. Features like "delete for me" or "delete for everyone" helps with individual messages. What is better is the automatic deletion of whole conversations after an agreed upon timeframe by all parties, eg disappearing messages. In any case, whenever a user has deleted content for all, the provider must ensure complete removal of the content and even then a certain level of trust among users of the system is needed.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="challenges"><name>Challenges</name>

<t>Earlier in this document end-to-end encryption was defined using formal definitions assumed by internet protocol implementations. Also because the IETF is the place for "producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet" <xref target="RFC3935"/> the reader can be confident that current deployments of end-to-end encrypted technologies in the IETF indicate the cutting edge of their developments, which is yet another way to define what is, or ideally should be, a particular kind of technology.</t>

<t>Below is best effort list of the challenges currently faced by protocol designers of end-to-end encrypted systems. Problems that fall outside of this list are likely 1) unnecessary feature requests that negligibly, or do nothing to, achieve the aims of end-to-end encrypted systems, or are 2) in some way antithetical to the goals of end-to-end encrypted systems.</t>

<t><list style="symbols">
  <t>Making messaging applications interoperable is an important goal for a healthy and user centric internet ecosystem, however it requires careful design of protocols and systems, such as content type negotiation; provisions of global services, such as discovery; and a great deal of cooperation amongst implementers.</t>
  <t>Public key verification is very difficult for users to manage. Authentication of the two ends is required for secure and private conversations. Therefore, solving the problem of verification of public keys is a major concern for any end-to-end encrypted system design. Some applications bind together the account identity and the key, and leave users to establish a trust relationship between them, assisted by public key fingerprint information.</t>
  <t>Users want to smoothly switch application use between devices, but this comes at a cost to the security and privacy of the communication. Thus, there is a problem of availability in end-to-end encrypted systems because the account identity's private key is generated by and stored on the end-user's original device and to move the private key to another device can compromise the security of one of the end-points of the system (by opening the door to key-impersonation attacks, for example).</t>
  <t>Existing protocols are vulnerable to metadata analysis, even though metadata is often much more sensitive than content. Metadata is plaintext information that travels across the wire and includes delivery-relevant details that central servers need such as the account identity of end-points, timestamps, message size or more. Metadata is difficult to eliminate or obfuscate entirely.</t>
  <t>Users need to communicate in groups, but this presents problems of scale for end-to-end encryption systems.</t>
  <t>The whole communication should remain secure if only one message is compromised. However, for encrypted communication, in some schemes, you must currently choose between forward secrecy or the ability to fully communicate asynchronously. This presents a problem for application design that uses end-to-end encryption for asynchronous messaging over email, RCS, etc.</t>
  <t>Users of end-to-end encrypted systems should be able to communicate with any medium of their choice, from text to large files. However, there is often a resource problem because there are no open protocols to allow users to securely share the same resource in an end-to-end encrypted system.</t>
  <t>Usability, accessibility and internationalisation features often need careful design and implementation with respect to security and privacy, such as message read status, typing indicators, URL/link previews, third-party input/output applications.</t>
  <t>End user security tools like anti-virus plugins, spam filters, fraud protections are in conflict with the security and privacy considerations of the end-to-end application.</t>
  <t>Deployment is notoriously challenging for any software application where maintenance and updates can be particularly disastrous for obsolete cryptographic libraries.</t>
</list></t>

</section>
</section>
<section anchor="end-user-expectations"><name>End-user expectations</name>

<t>While the formal definition and properties of an end-to-end encrypted system relate to communication security and privacy, they do not draw from a comprehensive threat model or speak to what users expect from end-to-end encrypted communication. It is in this context that some designs and architectures of end-to-end encryption may ultimately run contrary to user expectations of end-to-end encrypted systems <xref target="GEC-EU"/>. Although some system designs do not directly violate "the math" of encryption algorithms, they do so by implicating and weakening other important aspects of an end-to-end encrypted <em>system</em>.</t>

<section anchor="a-conversation-is-confidential"><name>A conversation is confidential</name>

<t>Users talking to one another in an end-to-end encrypted system should be the only ones that know what they are talking about <xref target="RFC7624"/>. People have the right to data privacy as defined in international human rights law, and within the right to free expression and to hold opinions is inferred the right to whisper, whether or not they are using digital communications or walking through a field.</t>

</section>
<section anchor="providers-are-trustworthy"><name>Providers are trustworthy</name>

<t>While "trustworthy" can be rigorously defined from an engineering perspective, for the purposes of this document a definition inspired by an internal workshop for Internet Society staff is sufficient:</t>

<dl>
  <dt>Trustworthy</dt>
  <dd>
    <t>A system is completely trustworthy if and only if it is completely resilient, reliable, accountable, and secure in a way that consistently meets users’ expectations. The opposite of trustworthy is untrustworthy.</t>
  </dd>
</dl>

<t>This definition is complete in its positive and negative aspects: what it is, e.g. "Worthy of confidence" and what it is not, e.g. in RFC 7258: "behavior that subverts the intent of communicating parties without the agreement of those parties" <xref target="RFC7258"/>.</t>

<t>Therefore, a trustworthy end-to-end encrypted communication system is the provider of the set of functions needed by two or more parties to communicate among each other in a confidential, authenticated and integrity-preserving fashion without any third party having access to the content of that communication where the functions that offer the confidentiality, authenticity and integrity-preservation are providing these services to only the participants whom all know who are in the conversation.</t>

</section>
<section anchor="access-by-a-third-party-is-impossible"><name>Access by a third-party is impossible</name>

<t>No matter the specifics, any methods used to access to the content of the messages by a third party would violate a user's expectations of end-to-end encrypted messaging. "[T]hese access methods scan message contents on the user’s [device]", which are then "scanned for matches against a database of prohibited content before, and sometimes after, the message is sent to the recipient" <xref target="GEC-EU"/>. Third party access also covers cases without scanning -- namely, it should not be possible for any third-party end point, even those under the user's identity as per Section 2.1, to access the data regardless of reason.</t>

<t>If a method makes secure and private communication, intended to be sent over an encrypted channel between end points, available to parties other than the sender and intended recipient(s), without formally interfering with channel confidentiality, that method violates the understood expectation of that security property.</t>

</section>
<section anchor="the-software-of-the-end-to-end-encrypted-system-can-be-trusted"><name>The software of the end-to-end encrypted system can be trusted</name>

<t>A way by which users can check that a system does not have a "backdoor" or is performing in accordance to cryptographic protocols' specifications is by making them opensource. Opensource allows users to openly analyse the system and be assured of it. However, while some users might be able to do so, many users lack the technological knowledge needed to analyse source code. It is vital that systems provide public security analyses of their source code enabling reproducible audits and investigations that can be published and peer reviewed.</t>

</section>
<section anchor="pattern-inference-is-minimised"><name>Pattern inference is minimised</name>

<t>Analyses such as traffic fingerprinting or other (encrypted or unencrypted) data analysis techniques, outside of or as part of end-to-end encrypted system design, allow third parties to draw inferences from communication that was intended to be confidential. "By allowing private user data to be scanned via direct access by servers and their providers," the use of these methods should be considered an affront to "the privacy expectations of users of end-to-end encrypted communication systems" <xref target="GEC-EU"/>.</t>

<t>Not only should an end-to-end encrypted system value user data privacy by not explicitly enabling pattern inference, it should actively be attempting to solve issues of metadata and traceability (enhanced metadata) through further innovation that stays ahead of advances in these techniques.</t>

</section>
<section anchor="the-end-to-end-encryption-is-not-compromised"><name>The end-to-end encryption is not compromised</name>

<t>RFC 3552 talks about the Internet Threat model such as the assumption that the user can expect any communications systems, but perhaps especially end-to-end encrypted systems, to not be intentionally compromised <xref target="RFC3552"/>. Intentional compromises of end-to-end encryption are usually referred to as "backdoors" but are often presented as additional design features under terms like "key escrow". Users of end-to-end encryption would not expect a front, back or side door entrance into their confidential conversations and would expect a provider to actively resist -- technically and legally -- compromise through these means.</t>

</section>
</section>
<section anchor="conclusions"><name>Conclusions</name>

<t>From messaging to video conferencing, there are many competing features in an end-to-end encrypted implementation that is secure, private and usable. The most well designed system cannot meet the expectations of every user, nor does an ideal system exist from any dimension. End-to-end encryption is a technology that is constantly improving to achieve the ideal as defined in this document.</t>

<t>Features and functionalities of end-to-end encryption should be developed and improved in service of end user expectations for privacy preserving communications.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Fred Baker, Stephen Farrell, Richard Barnes, Olaf Kolkman all contributed to the early strategic thinking of this document and whether it would be useful to the IETF community.</t>

<t>The folks at Riseup and the LEAP Encryption Access Project have articulated brilliantly the hardest parts of end-to-end encryption systems that serve the end users' right to whisper.</t>

<t>Ryan Polk at the Internet Society has energy to spare when it comes to organising meaningful contributions, like this one, for the technical advisors of the Global Encryption Coalition.</t>

<t>Adrian Farrel, Eric Rescorla and Paul Wouters are acknowleded for their review, comments, or questions that lead to improvement of this document.</t>

<t>Chelsea Komlo and Britta Hale have contributed their deep expertise and consice and rigourous writing to this draft.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document does not specify new protocols and therefore does not bring up technical security considerations.</t>

<t>Because some policy decicions may affect the security of the internet, a clear and shared definition of end to end encrypted communication is important in policy related discussions.  This document aims to provide that clarity.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no actions for IANA.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>





<reference anchor='RFC3724' target='https://www.rfc-editor.org/info/rfc3724'>
<front>
<title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
<author fullname='J. Kempf' initials='J.' role='editor' surname='Kempf'><organization/></author>
<author fullname='R. Austein' initials='R.' role='editor' surname='Austein'><organization/></author>
<author><organization>IAB</organization></author>
<date month='March' year='2004'/>
<abstract><t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3724'/>
<seriesInfo name='DOI' value='10.17487/RFC3724'/>
</reference>



<reference anchor='RFC3552' target='https://www.rfc-editor.org/info/rfc3552'>
<front>
<title>Guidelines for Writing RFC Text on Security Considerations</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='B. Korver' initials='B.' surname='Korver'><organization/></author>
<date month='July' year='2003'/>
<abstract><t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='72'/>
<seriesInfo name='RFC' value='3552'/>
<seriesInfo name='DOI' value='10.17487/RFC3552'/>
</reference>



<reference anchor='RFC7258' target='https://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='May' year='2014'/>
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>



<reference anchor='RFC7624' target='https://www.rfc-editor.org/info/rfc7624'>
<front>
<title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
<author fullname='R. Barnes' initials='R.' surname='Barnes'><organization/></author>
<author fullname='B. Schneier' initials='B.' surname='Schneier'><organization/></author>
<author fullname='C. Jennings' initials='C.' surname='Jennings'><organization/></author>
<author fullname='T. Hardie' initials='T.' surname='Hardie'><organization/></author>
<author fullname='B. Trammell' initials='B.' surname='Trammell'><organization/></author>
<author fullname='C. Huitema' initials='C.' surname='Huitema'><organization/></author>
<author fullname='D. Borkmann' initials='D.' surname='Borkmann'><organization/></author>
<date month='August' year='2015'/>
<abstract><t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t></abstract>
</front>
<seriesInfo name='RFC' value='7624'/>
<seriesInfo name='DOI' value='10.17487/RFC7624'/>
</reference>



<reference anchor='RFC8890' target='https://www.rfc-editor.org/info/rfc8890'>
<front>
<title>The Internet is for End Users</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='August' year='2020'/>
<abstract><t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t></abstract>
</front>
<seriesInfo name='RFC' value='8890'/>
<seriesInfo name='DOI' value='10.17487/RFC8890'/>
</reference>



<reference anchor='RFC3935' target='https://www.rfc-editor.org/info/rfc3935'>
<front>
<title>A Mission Statement for the IETF</title>
<author fullname='H. Alvestrand' initials='H.' surname='Alvestrand'><organization/></author>
<date month='October' year='2004'/>
<abstract><t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='95'/>
<seriesInfo name='RFC' value='3935'/>
<seriesInfo name='DOI' value='10.17487/RFC3935'/>
</reference>


<reference anchor="saltzer" target="https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">
  <front>
    <title>End-to-end arguments in system design</title>
    <author initials="J. H." surname="Saltzer, et al">
      <organization></organization>
    </author>
    <date year="1984"/>
  </front>
</reference>
<reference anchor="dkg" target="https://tools.ietf.org/html/draft-dkg-hrpc-glossary-00">
  <front>
    <title>Human Rights Protocol Considerations Glossary</title>
    <author initials="D." surname="Gillmor">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="mls" target="https://datatracker.ietf.org/doc/charter-ietf-mls">
  <front>
    <title>Messaging Layer Security</title>
    <author initials="" surname="IETF">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="openpgp" target="https://datatracker.ietf.org/doc/charter-ietf-openpgp">
  <front>
    <title>Open Specification for Pretty Good Privacy</title>
    <author initials="" surname="IETF">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="GEC-EU" target="https://www.globalencryption.org/2020/11/breaking-encryption-myths/">
  <front>
    <title>Breaking encryption myths: What the European Commission’s leaked report got wrong about online security</title>
    <author initials="" surname="Global Encryption Coaliation">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="komlo" target="https://github.com/chelseakomlo/e2ee/blob/master/e2ee_definition.pdf">
  <front>
    <title>Defining end-to-end security</title>
    <author initials="" surname="Chelsea Komlo">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

