<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.0.2) -->
<?rfc RFCedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-knodel-e2ee-definition-10" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="e2ee">Definition of End-to-end Encryption</title>
    <seriesInfo name="Internet-Draft" value="draft-knodel-e2ee-definition-10"/>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="O." surname="Kolkman" fullname="Olaf Kolkman">
      <organization>Internet Society</organization>
      <address>
        <email>kolkman@isoc.org</email>
      </address>
    </author>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <organization/>
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>
    <date year="2023" month="April" day="20"/>
    <area>sec</area>
    <workgroup>sec</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document provides a definition of end-to-end encryption (E2EE) from both the perspective of a regular internet user as well as from the perspective of required properties for implementers.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>End-to-end encryption is an application of cryptography mechanisms and properties in communication systems between endpoints.  End-to- end encrypted systems are exceptional in providing both security and privacy properties through confidentiality, integrity and authenticity features for users.  Improvements to end-to-end encryption strive to maximize the user's security and privacy while balancing usability and availability.  Users of end-to-end encrypted communications expect trustworthy providers of secure implementations to respect and protect them.</t>
      <t>This document describes that end-to-end encryption MUST provide both security and privacy properties.  It provides a definition of which specific security and privacy properties end-to-end encryption should provide.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="formal-definition-of-end-to-end-encryption">
      <name>Formal definition of end-to-end encryption</name>
      <t>End-to-end encryption, irrespective of the content or the specific methods employed, relies on two important and rigorous technical concepts: the end-to-end principle as defined in the IETF; and encryption, an application of cryptographic mechanisms and the primary means employed by the IETF to secure internet protocols and maintain the confidentiality of content delivered via these internet protocols. Where end-to-end encryption is comprised of these necessary constituent parts, a systems approach also defines their interplay. In the field of cryptography it is also possible to achieve a concise definition of end-to-end encrypted security.</t>
      <section anchor="end-point">
        <name>End point</name>
        <t>An "end" either sends messages or receives them, usually both. Other systems on the path are just that: other systems. Other systems MAY be used to facilitate the sending of messages between both "ends", but are not "ends" themselves.</t>
        <t>It is, however, not trivial to establish the definition of an end point in isolation. <xref target="hale"/> Depending on the context, an "end" may be a user; a device colocated with the user; or a set of devices controlled by a user that want to simultaneously participate in the conversation.</t>
      </section>
      <section anchor="end-to-end-principle">
        <name>End-to-end principle</name>
        <t>The end-to-end principle is a core architectural guideline of the Internet. <xref target="RFC3724"/></t>
        <t>The principle has evolved to an understanding that the "network's job is to transmit datagrams as efficiently and flexibly as possible", and the rest should be done at the ends.  <xref target="RFC1958"/> This principle can also be extended to the design of applications itself. <xref target="saltzer"/><xref target="RFC3724"/><xref target="RFC3238"/></t>
      </section>
      <section anchor="encryption">
        <name>Encryption</name>
        <t>Encryption is the process of using cryptographic methods to convert plaintext to ciphertext that is decipherable only by authorized parties. Encryption can help extend the end-to-end principle in application design, where now (as before) the function of the network is limited to efficiently transporting messages, but additionally the network cannot access any part of the message itself.</t>
        <t>Encryption can be applied in an end-to-end context in many ways. For example, applications may use the double-ratchet algorithm (which uses an authenticated encryption scheme) and of an Authenticated Key Exchange (AKE). The usage of these algorithms (or variants of these) is present in many modern messenger applications such as those adopted in the IETF Messaging Layer Security working group, whose charter is to create a document that satisfies the need for several internet applications for group key establishment and message protection protocols <xref target="mls"/>. OpenPGP, mostly used for email, uses a different technique to achieve security and privacy. It is also chartered in the IETF to create a specification that covers object encryption, object signing, and identity certification <xref target="openpgp"/>. Both protocols rely on the use of asymmetric and symmetric encryption, and exchange long-term identity public keys amongst end points.</t>
      </section>
      <section anchor="concise-definition-of-end-to-end-encryption">
        <name>Concise definition of end-to-end encryption</name>
        <t>An end-to-end-encryption service provides confidentiality, integrity, and authenticity between ends. Another concise definition already exists for messaging: "End-to-end instant message encryption would conceal communications between one user's instant messaging application through any intermediate devices and servers all the way to the recipient's instant messaging application." <xref target="dkg"/></t>
        <t>Confidentiality is broken if content can be decrypted at any intermediate point.</t>
        <t>As for integrity and authenticity, permission of data manipulation or creation of pseudo-identities for third parties to allow access under the user's identity also violate end-to-end encryption. In other words, the application functions only for the end user and does not perform functions for any other entity coverly, nor overtly, say even if that entity claims to have obtained the consent of the end user. Thus, end point authenticity MUST be established as (sub-)identities of the end user, and end-to-end integrity MUST also be maintained by the system. There is considerable system design flexibility available in the mechanisms for authentication and integrity, specifically data authentication, that still meet this requirement.</t>
      </section>
    </section>
    <section anchor="end-to-end-encryption-implementations">
      <name>End-to-end encryption implementations</name>
      <t>When looking at implementations of end-to-end encryption from a design perspective, the first consideration is the list of fundamental features that distinguish an end-to-end encrypted system from one that does not employ end-to-end encryption. Secondly, one must consider the development goals for improving the features of end-to-end encryption, in other words, the challenges defined by the designers, developers and implementers of end-to-end encryption.</t>
      <t>The features and challenges listed below are framed comprehensively rather than from the perspective of their design, development, implementation or use.</t>
      <section anchor="properties">
        <name>Properties</name>
        <t>This section defines the security properties of an end-to-end encrypted system. The properties of end-to-end encryption from an implementation perspective can be split into two categories: 1) the required core properties of confidentiality, integrity and authenticity and 2) recommended additional properties for improved security, such as availability, deniability, forward secrecy, and post-compromise security, which are desirable enhancements.</t>
        <section anchor="necessary-properties">
          <name>Necessary properties</name>
          <dl>
            <dt>Confidentiality</dt>
            <dd>
              <t>A system provides message confidentiality if only the sender and intended recipient(s) can read the message plaintext, i.e. messages sent between participants can only be read by the agreed upon participants in the group and all participants share the identical group member list.</t>
            </dd>
            <dt>Integrity</dt>
            <dd>
              <t>A system provides message integrity when it guarantees that messages have not been modified in transit. If a message has been modified, it must be detected in a reliable way by the recipient.</t>
            </dd>
            <dt>Authentication</dt>
            <dd>
              <t>A system provides authentication if the recipient and sender attest to each other's identities in relation to the contents of their communications.</t>
            </dd>
          </dl>
        </section>
        <section anchor="optionaldesirable-properties-and-features">
          <name>Optional/desirable properties and features</name>
          <t>There is a set of optional/desirable features that a end-to-end system can provide. These properties can be related to the network, to the user interface or specialized variants of the previous features.</t>
          <dl>
            <dt>Availability</dt>
            <dd>
              <t>A system provides high availability if the user is able to access the contents of the message (decrypt them) when they so desire and potentially from more than one device. For example, a message can arrive to a recipient even after they have been offline for a long time. Note that applications that use this feature often implement a threshold for this property: number or aggregate size of messages; or messages from a month ago can be read by a user that has been offline, but not messages from a year ago.</t>
            </dd>
            <dt>Loss Resilience</dt>
            <dd>
              <t>If a message is permanently lost by the network, sender(s) and/or recipient(s) should still be able to communicate.</t>
            </dd>
            <dt>Deniability</dt>
            <dd>
              <t>Deniability ensures that anyone able to decrypt a record of the transcript, including message recipients, cannot cryptographically prove to others that a particular participant of a communication authored a specific message. As demonstrated by widely implemented protocols, this optional property must exist in conjunction with the necessary property of authentication, i.e. participants in a communication must be assured that they are communicating with the intended parties but this assurance cannot be transmitted to any other parties.</t>
            </dd>
            <dt>Forward secrecy</dt>
            <dd>
              <t>Forward secrecy is a security property that prevents attackers from decrypting encrypted data they have previously captured over a communication channel before the time of compromise, if the attacker compromises one of the endpoints. Forward secrecy is usually achieved by regularly deriving new encryption/decryption keys, and destroying old keys that are no longer required to encrypt or decrypt messages.</t>
            </dd>
            <dt>Post-compromise security</dt>
            <dd>
              <t>Post-compromise security is a security property that seeks to guarantee future confidentiality and integrity in the face of a passive end-point compromise (and consequently that communication sent post-compromise is protected with the same security properties that existed before the compromise). It is usually achieved by adding new ephemeral key exchanges (new randomness) to the derivation of encryption/decryption keys every 'x' amount of time or after 'n' messages sent. Note that post-compromise security is not met in the face of active attackers that compromise an end-point. This property can add a level of complexity to a protocol as deriving new key material can be expensive, and, therefore, it has to be carefully evaluated as part of a system's design.</t>
            </dd>
            <dt>Metadata obfuscation</dt>
            <dd>
              <t>Digital communication inevitably generates data other than the content of the communication itself, such as IP addresses, group memberships, and date and time of messages. To enhance the privacy and security of end-to-end encryption, steps should be taken to minimize metadata. Additional steps should be taken to prevent leakage such as hiding users' IP addresses, reducing non-routing metadata, and avoiding extraneous message headers.</t>
            </dd>
            <dt>Disappearing messages</dt>
            <dd>
              <t>For confidential conversations, deleting one-by-one sensitive messages typically depends on a level of client-side security that is unsustainable. For example, endusers can still copy text or screenshot images outside the secured client application.  A certain level of trust among users of the system is required.  That said, features like "delete for me", "delete for everyone" or "disppearing messages" which is time based automated deletion of content do still provide a valuable defense amongst trusted parties in the event of a compromise of a device of one of the participants.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="challenges">
        <name>Challenges</name>
        <t>Below is a best effort list of the challenges currently faced by protocol designers of end-to-end encrypted systems. Problems that fall outside of this list are likely 1) unnecessary feature requests that negligibly, or do nothing to, achieve the aims of end-to-end encrypted systems, or are 2) in some way antithetical to the goals of end-to-end encrypted systems.</t>
        <ul spacing="normal">
          <li>Making messaging applications interoperable is an important goal for a healthy and user-centric internet ecosystem, however it requires careful design of protocols and systems, such as content type negotiation; provisions of global services, such as discovery; and a great deal of cooperation amongst implementers.</li>
          <li>Public key verification is very difficult for users to manage. Authentication of the two ends is required for secure and private conversations. Therefore, solving the problem of verification of public keys is a major concern for any end-to-end encrypted system design. Some applications bind together the account identity and the key, and leave users to establish a trust relationship between them, assisted by public key fingerprint information.</li>
          <li>Users want to smoothly switch application use between devices, but this comes at a cost to the security and privacy of the communication. Thus, there is a problem of availability in end-to-end encrypted systems because the account identity's private key is generated by and stored on the end-user's original device and to move the private key to another device can compromise the security of one of the end-points of the system (by opening the door to key-impersonation attacks, for example).</li>
          <li>Existing protocols are vulnerable to metadata analysis, even though metadata is often as sensitive as message content. Metadata is unencrypted (and often unencryptable) information that travels through the network and includes delivery-relevant details that servers require such as the account identity of end-points, timestamps, message size or more. Metadata is difficult to eliminate or obfuscate entirely.</li>
          <li>Confidential and secure communications systems should also maintain the privacy of users but this is necessarily balanced with authentication and is related to the metadata problem for account identity.</li>
          <li>Users need to communicate in groups, but this presents scalability problems for traditional end-to-end encryption systems. Message Layer Security protocol <xref target="mls"/> is a modern end-to-end encrypted message protocol that addresses this scalability concern.</li>
          <li>The whole communication should remain secure if only one message is compromised. However, for encrypted communication, in some schemes, you must currently choose between forward secrecy or the ability to fully communicate asynchronously. This presents a problem for application design that uses end-to-end encryption for asynchronous messaging over email, RCS, etc.</li>
          <li>Users of end-to-end encrypted systems should be able to communicate with any medium of their choice, such as text, audio, video, or miscellaneous files. However, there is often a resource problem because there are no open protocols to allow users to securely share the same resource in an end-to-end encrypted system.</li>
          <li>Usability, accessibility and internationalisation features often need careful design and implementation with respect to security and privacy, such as message read status, typing indicators, URL/link previews, third-party input/output applications.</li>
          <li>End user security tools like anti-virus plugins, spam filters, fraud protections are in conflict with the security and privacy considerations of the end-to-end application.</li>
          <li>Deployment is notoriously challenging for any software application where maintenance and updates can be particularly disastrous for obsolete cryptographic libraries.</li>
        </ul>
      </section>
    </section>
    <section anchor="end-user-expectations">
      <name>End-user expectations</name>
      <t>While the formal definition and properties of an end-to-end encrypted system relate to communication security and privacy, they do not draw from a comprehensive threat model or speak to what users expect from end-to-end encrypted communication. It is in this context that some designs and architectures of end-to-end encryption may ultimately run contrary to user expectations of end-to-end encrypted systems <xref target="GEC-EU"/>. Although some system designs do not directly violate "the math" of encryption algorithms, they do so by implicating and weakening other important aspects of an end-to-end encrypted <em>system</em>.</t>
      <section anchor="a-conversation-is-confidential">
        <name>A conversation is confidential</name>
        <t>Users talking to one another in an end-to-end encrypted system should be the only ones that know what they are talking about <xref target="RFC7624"/>. People have the right to data privacy as defined in international human rights law, and within the right to free expression and to hold opinions is inferred the right to whisper, whether or not they are using digital communications or walking through a field.</t>
      </section>
      <section anchor="providers-are-trustworthy">
        <name>Providers are trustworthy</name>
        <dl>
          <dt>Trustworthy</dt>
          <dd>
            <t>A system is completely trustworthy if and only if it is completely resilient, reliable, accountable, and secure in a way that consistently meets users’ expectations.</t>
          </dd>
        </dl>
        <t>This definition is complete in its positive and negative aspects: what it is, e.g. "Worthy of confidence" and what it is not, e.g. in RFC 7258: "behavior that subverts the intent of communicating parties without the agreement of those parties" <xref target="RFC7258"/>.</t>
        <t>Therefore, a trustworthy end-to-end encrypted communication system is the provider of the set of functions needed by two or more parties to communicate among each other in a confidential, authenticated and integrity-preserving fashion without any third party having access to the content of that communication where the functions that offer the confidentiality, integrity and authenticity-preservation are providing these services to only the participants whom all know who are in the conversation.</t>
      </section>
      <section anchor="access-by-a-third-party-is-impossible">
        <name>Access by a third-party is impossible</name>
        <t>No matter the specifics, any methods used to access to the content of the messages by a third party would violate a user's expectations of end-to-end encrypted messaging. "[T]hese access methods scan message contents on the user’s [device]", which are then "scanned for matches against a database of prohibited content before, and sometimes after, the message is sent to the recipient" <xref target="GEC-EU"/>. Third party access also covers cases without scanning -- namely, it should not be possible for any third-party end point, even those under the user's identity as per Section 2.1, to access the data regardless of reason.</t>
        <t>If a method makes secure and private communication, intended to be sent over an encrypted channel between end points, available to parties other than the sender and intended recipient(s), that method violates the understood expectation of that security property.</t>
      </section>
      <section anchor="the-software-of-the-end-to-end-encrypted-system-can-be-trusted">
        <name>The software of the end-to-end encrypted system can be trusted</name>
        <t>A way by which users can reduce the risk of their system containing a "backdoor" and confirm their system is performing in accordance to cryptographic protocols' specifications is using systems that are releasing their software as open source.  Open source software allows technical users to analyse the system and be assured of its functioning.  While most users will not be able to do so, as typical users lack the technological knowledge needed to analyse source code, technilogical communities can do so.  It is vital that systems provide public security analyses of their source code enabling reproducible builds and audits and investigations that can be published and peer reviewed.</t>
      </section>
      <section anchor="pattern-inference-is-minimised">
        <name>Pattern inference is minimised</name>
        <t>Analyses such as traffic fingerprinting or other (encrypted or unencrypted) data analysis techniques, outside of or as part of end-to-end encrypted system design, allow third parties to draw inferences from communication that was intended to be confidential. "By allowing private user data to be scanned via direct access by servers and their providers," the use of these methods should be considered an affront to "the privacy expectations of users of end-to-end encrypted communication systems" <xref target="GEC-EU"/>.</t>
        <t>Not only should an end-to-end encrypted system value user data privacy by not explicitly enabling pattern inference, it should actively be attempting to solve issues of metadata and traceability (enhanced metadata) through further innovation that stays ahead of advances in these techniques.</t>
      </section>
      <section anchor="the-end-to-end-encryption-is-not-compromised">
        <name>The end-to-end encryption is not compromised</name>
        <t>RFC 3552 talks about the Internet Threat model such as the assumption that the user can expect any communications systems, but perhaps especially end-to-end encrypted systems, to not be intentionally compromised <xref target="RFC3552"/>. Intentional compromises of end-to-end encryption are usually referred to as "backdoors" but are often presented as additional design features under terms like "key escrow" or "exceptional access". Users of end-to-end encryption would not expect a front, back or side door entrance into their confidential conversations and would expect a provider to actively resist -- technically and legally -- compromise through these means.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>From messaging to video conferencing, there are many competing features in an end-to-end encrypted implementation that is secure, private and usable. The most well designed system cannot meet the expectations of every user, nor does an ideal system exist from any dimension. End-to-end encryption is a technology that is constantly improving to achieve the ideal as defined in this document.</t>
      <t>Features and functionalities of end-to-end encryption should be developed and improved in service of end user expectations for privacy preserving communications.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Fred Baker, Stephen Farrell, Richard Barnes all contributed to the early strategic thinking of this document and whether it would be useful to the IETF community.</t>
      <t>The folks at Riseup and the LEAP Encryption Access Project have articulated brilliantly the hardest parts of end-to-end encryption systems that serve the end users' right to whisper.</t>
      <t>Ryan Polk at the Internet Society has energy to spare when it comes to organising meaningful contributions, like this one, for the technical advisors of the Global Encryption Coalition.</t>
      <t>Adrian Farrel, Eric Rescorla and Paul Wouters are acknowleded for their review, comments, or questions that lead to improvement of this document.</t>
      <t>Chelsea Komlo and Britta Hale have contributed their deep expertise and consice and rigourous writing to this draft.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not specify new protocols and therefore does not bring up technical security considerations.</t>
      <t>Because some policy decisions may affect the security of the internet, a clear and shared definition of end-to-end encryption is important in policy related discussions. This document aims to provide that clarity.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter">
            <organization/>
          </author>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3238">
        <front>
          <title>IAB Architectural and Policy Considerations for Open Pluggable Edge Services</title>
          <author fullname="S. Floyd" initials="S." surname="Floyd">
            <organization/>
          </author>
          <author fullname="L. Daigle" initials="L." surname="Daigle">
            <organization/>
          </author>
          <date month="January" year="2002"/>
          <abstract>
            <t>This document includes comments and recommendations by the IAB on some architectural and policy issues related to the chartering of Open Pluggable Edge Services (OPES) in the IETF.  OPES are services that would be deployed at application-level intermediaries in the network, for example, at a web proxy cache between the origin server and the client.  These intermediaries would transform or filter content, with the explicit consent of either the content provider or the end user. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3238"/>
        <seriesInfo name="DOI" value="10.17487/RFC3238"/>
      </reference>
      <reference anchor="RFC3724">
        <front>
          <title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
          <author fullname="J. Kempf" initials="J." role="editor" surname="Kempf">
            <organization/>
          </author>
          <author fullname="R. Austein" initials="R." role="editor" surname="Austein">
            <organization/>
          </author>
          <author>
            <organization>IAB</organization>
          </author>
          <date month="March" year="2004"/>
          <abstract>
            <t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3724"/>
        <seriesInfo name="DOI" value="10.17487/RFC3724"/>
      </reference>
      <reference anchor="RFC3552">
        <front>
          <title>Guidelines for Writing RFC Text on Security Considerations</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <author fullname="B. Korver" initials="B." surname="Korver">
            <organization/>
          </author>
          <date month="July" year="2003"/>
          <abstract>
            <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="72"/>
        <seriesInfo name="RFC" value="3552"/>
        <seriesInfo name="DOI" value="10.17487/RFC3552"/>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey">
            <organization/>
          </author>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="B. Schneier" initials="B." surname="Schneier">
            <organization/>
          </author>
          <author fullname="C. Jennings" initials="C." surname="Jennings">
            <organization/>
          </author>
          <author fullname="T. Hardie" initials="T." surname="Hardie">
            <organization/>
          </author>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <author fullname="C. Huitema" initials="C." surname="Huitema">
            <organization/>
          </author>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann">
            <organization/>
          </author>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3935">
        <front>
          <title>A Mission Statement for the IETF</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
            <organization/>
          </author>
          <date month="October" year="2004"/>
          <abstract>
            <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="95"/>
        <seriesInfo name="RFC" value="3935"/>
        <seriesInfo name="DOI" value="10.17487/RFC3935"/>
      </reference>
      <reference anchor="saltzer" target="https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">
        <front>
          <title>End-to-end arguments in system design</title>
          <author initials="J. H." surname="Saltzer, et al">
            <organization/>
          </author>
          <date year="1984"/>
        </front>
      </reference>
      <reference anchor="dkg" target="https://tools.ietf.org/html/draft-dkg-hrpc-glossary-00">
        <front>
          <title>Human Rights Protocol Considerations Glossary</title>
          <author initials="D." surname="Gillmor">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="mls" target="https://datatracker.ietf.org/doc/charter-ietf-mls">
        <front>
          <title>Messaging Layer Security</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="openpgp" target="https://datatracker.ietf.org/doc/charter-ietf-openpgp">
        <front>
          <title>Open Specification for Pretty Good Privacy</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="GEC-EU" target="https://www.globalencryption.org/2020/11/breaking-encryption-myths/">
        <front>
          <title>Breaking encryption myths: What the European Commission’s leaked report got wrong about online security</title>
          <author initials="" surname="Global Encryption Coaliation">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="hale">
        <front>
          <title>On End-to-End Encryption</title>
          <author>
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
