<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 3.0.3) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-02" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title>Centralization and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-02"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Despite being designed and operated as a decentralized network-of-networks, the Internet is continuously subjected to forces that encourage centralization.</t>
      <t>This document offers a definition of centralization, explains why it is undesirable, identifies different types of centralization, catalogues limitations of common approaches to controlling it, and explores what Internet standards efforts can do to address it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. While this approach may reflect a desire to prevent a single technical failure from having wide impact <xref target="RAND"/>. it has also enabled the Internet's rapid adoption and broad spread, because internetworking did not require networks to get permission from or cede control to another entity -- thereby accommodating a spectrum of requirements and positioning the Internet as a public good.</t>
      <t>While avoiding centralization is a widely shared goal for the Internet, achieving it has proven difficult. Many successful protocols and applications on the Internet today work in a centralized fashion -- to the point where some proprietary, centralized services have become so well-known that they are commonly mistaken for the Internet itself. Even when protocols incorporate techniques intended to prevent centralization, economic and social factors can drive users to prefer centralized solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural regulation -- in particular, open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling Internet centralization.</t>
      <t>This document discusses aspects of centralization that relate to Internet standards efforts. <xref target="what"/> provides a definition of centralization. <xref target="why"/> explains why centralization of the Internet's functions is undesirable. <xref target="kinds"/> surveys the different kinds of centralization that might surface on the Internet. <xref target="decentralization"/> then catalogues high-level approaches to mitigating centralization and discusses their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding centralization and mitigating its effects.</t>
      <t>Engineers who design and standardize Internet protocols are the primary audience for this document. However, designers of proprietary protocols can benefit from considering aspects of centralization, especially if they intend their protocol to be considered for eventual standardisation. Likewise, policymakers can use this document to help identify and remedy inappropriately centralized protocols and applications.</t>
    </section>
    <section anchor="what">
      <name>What is Centralization</name>
      <t>This document defines "centralization" as the ability of a single entity (e.g., a person, company, or government) -- or a small group of them -- to exclusively observe, capture, control, or extract rent from the operation or use of a Internet function.</t>
      <t>Here, "Internet function" is defined broadly. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>However, the Internet's functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to centralization -- for example, social networking, file sharing, financial services, and news dissemination. Likewise, the supply of underlying networking equipment, hardware, operating systems, and software can exhibit centralization that affects the Internet.</t>
      <t>Centralization risk is strongest when it affects the entire Internet. However, it can also be present when a substantial portion of the Internet's users lack options for a function. For example, if there is only one provider for a function in a region or legal jurisdiction, that function is effectively centralized for those users.</t>
      <t>"Decentralization" is the process of identifying centralization risk in the functions of a protocol or application, followed by the application of techniques used to prevent or mitigate centralization.</t>
      <t>Decentralization does not require that a function need be so widely distributed that other important factors are sacrificed. Because the same network effects that cause centralization can also deliver benefits (such as improvements in efficiency, resiliency, latency, and availability; see <xref target="intermediation"/> for further discussion), the appropriate amount of decentralization for a function might vary, with the optimal balance being determined by many factors. A function that is only available through a relatively small number of providers can still be effectively decentralized (see, for example, the Domain Name System <xref target="RFC1035"/>).</t>
      <t>Therefore, discussions of centralization and architectural efforts at decentralization need to be made on a case-by-base basis, depending on the function in question, surrounding circumstances, and other regulatory mechanisms.</t>
      <t>Note that it is important to distinguish centralization from anti-competitive concerns (also known as "anti-trust"). While there are many interactions between them and making the Internet more competitive may be a motivation for avoiding centralization, only courts are authoritative in determining what is and is not anti-competitive in a defined market, not standards bodies and other technical fora.</t>
    </section>
    <section anchor="why">
      <name>Why Avoid Centralization</name>
      <t>Centralization is undesirable because it is counter to the Internet's nature, because it violates the end users' expectations, and because of the many negative effects it can have on the network's operation and evolution.</t>
      <t>First, the Internet's very nature is incompatible with centralization of its functions. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
      <t>Second, as the Internet's first duty is to the end user <xref target="RFC8890"/>, allowing such power to be concentrated into few hands is counter to the IETF's mission of creating an Internet that "will help us to build a better human society." <xref target="BCP95"/> When a third party has unavoidable access to communications, the "informational and positional advantages" <xref target="INTERMEDIARY-INFLUENCE"/> gained can be used to observe behavior (the "panopticon effect") and shape or even deny behaviour (the "chokepoint effect") -- which can be used by those parties (or the states that have authority over them) for coercive ends. <xref target="WEAPONIZED-INTERDEPENDENCE"/></t>
      <t>Finally, concentration of power has deleterious effects on the Internet itself, including:</t>
      <ul spacing="normal">
        <li>
          <em>Limiting Innovation</em>: Centralization can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
        <li>
          <em>Constraining Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When functions form dependencies on a centralized service or platform because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
        <li>
          <em>Reducing Availability</em>: The Internet's availability (as well as applications and services built upon it) improves when there are many ways to obtain access to it. While centralized services typically benefit from the focused attention that their elevated role requires, when they fail, the resulting loss of availability can have a disproportionate impact.</li>
        <li>
          <em>Creating Monoculture</em>: The scale available to a centralized service or application can magnify minor flaws in features such as recommendation algorithms to a degree that can have broad (even societal) consequences. Diversity in these functions' implementation is significantly more robust when viewed systemically. <xref target="POLYCENTRIC"/></li>
        <li>
          <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized service's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
      </ul>
      <t>See also <xref target="TECH-SUCCESS-FACTORS"/> for further exploration of how centralization can affect the Internet.</t>
      <t>To summarize, centralization would allow the Internet (or some part of it) to be captured, effectively turning it into a "walled garden" that cannot meet both architectural design goals and users' expectations, and endangering its ongoing viability at the same time.</t>
    </section>
    <section anchor="kinds">
      <name>Kinds of Centralization</name>
      <t>Centralization of the Internet is not uniform; it presents in a variety of ways, depending on its relationship to the function in question and underlying causes. The subsections below suggest a classification system for Internet centralization.</t>
      <section anchor="direct">
        <name>Direct Centralization</name>
        <t>Creation of a fixed role for a specific party is the most straightforward kind of centralization. For example, most proprietary messaging, videoconferencing, chat, and similar protocols operate in this fashion.</t>
        <t>While some argue that such protocols are simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, this approach most often reflects commercial goals -- in particular, a strong desire to capture the protocols' financial benefits by "locking in" users to a proprietary service.</t>
        <t>Directly centralised protocols and applications are not considered to be part of the Internet per se; instead, they are more properly characterized as proprietary protocols that are built on top of the Internet. As such, the Internet architecture and associated standards do not regulate them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
      </section>
      <section anchor="necessary">
        <name>Necessary Centralization</name>
        <t>Some protocols introduce centralization risk that is unavoidable by nature.</t>
        <t>For example, when there is a need for a single, globally coordinated "source of truth", that function is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
        <t>IP addresses allocation is another example of a necessary function having centralization risk. Internet routing requires addresses to be allocated uniquely, but if a single government or company captured the addressing function, the entire Internet would be at risk of abuse by that entity.</t>
        <t>Similarly, the need for coordination in the Web's trust model brings centralization risk, because of the Certificate Authority's role in communication between clients and servers.</t>
        <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties that are not in direct contact also suffer from this kind of centralization risk. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party.</t>
        <t>Internet protocols often attempt to mitigate necessary centralization risk using measures such as federation (see <xref target="federation"/>) and multi-stakeholder administration (see <xref target="multi"/>).</t>
        <t>Protocols that successfully mitigate necessary centralization are often reused, to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
      </section>
      <section anchor="indirect">
        <name>Indirect Centralization</name>
        <t>Even when a protocol avoids direct centralization and does not exhibit any necessary centralization, it might become centralized in practice when external factors influence its deployment. Factors that encourage use of a central function, despite the absence of such a requirement in the protocol itself, can cause indirect centralization. Such factors might be economic, social, or legal.</t>
        <t>Often, the factors driving indirect centralization are related to the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks,<xref target="SCALE-FREE"/> network effects award asymmetric power to nodes that act as intermediaries to communication.</t>
        <t>Left unchecked, these factors can cause a potentially decentralized application to become directly centralised, because the central function has leverage to "lock in" users. For example, social networking is an application that is currently supplied by a few directly centralized, proprietary platforms despite standardization efforts (see, e.g., <xref target="W3C.CR-activitystreams-core-20161215"/>), because of the powerful network effects associated.</t>
        <t>By its nature, indirect centralization is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
      </section>
      <section anchor="network">
        <name>Inherited Centralization</name>
        <t>Most Internet protocols and applications depend on other, "lower-layer" protocols. The features, deployment, and operation of these dependencies can surface centralization risk into functions and applications build "on top" of them.</t>
        <t>For example, the network between endpoints can introduce centralization risk to application-layer protocols, because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, thereby creating pressure to use other services, which can result in centralization of them.</t>
        <t>Inherited centralization risk is only present when users cannot use an alternative means of accessing the desired service. For example, users often have flexibility in choice of Internet access, so they could just "route around" a network that affects their chosen service. However, such choices are often not available at the moment, and the Internet's topology means that a choke point upstream could still affect their Internet access.</t>
        <t>When deployed at scale, encryption can be an effective technique to control many inherited centralization risks. By reducing the number of parties who have access to content of communication, the ability of lower-layer protocols and intermediaries at those layers to interfere with or observe is prevented. Even while they may still prevent communication, encryption makes it more difficult to discriminate the target from other traffic.</t>
        <t>Note that the prohibitive effect on inherited centralization is most pronounced when most (if not all) traffic is encrypted -- providing yet more motivation for that goal (see also <xref target="RFC7258"/>).</t>
      </section>
      <section anchor="platform">
        <name>Platform Centralization</name>
        <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate centralization in the applications it supports.</t>
        <t>For example, HTTP <xref target="HTTP"/> is not considered a centralized protocol; interoperable servers are relatively easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above.</t>
        <t>However, applications built on top of HTTP (as well as the rest of the "Web Platform") often exhibit centralization. As such, HTTP is an example of a platform for centralization -- while the protocol itself is not centralized, it facilitates the creation of centralized services and applications.</t>
        <t>Like indirect centralization, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, often in a way that it becomes attractive to form a dependency on one party's operation. Notably, this can happen even if the protocol does not accommodate intermediation explicitly.</t>
      </section>
    </section>
    <section anchor="decentralization">
      <name>The Limits of Decentralization</name>
      <t>Over time, various techniques have been developed to decentralize protocols and applications. While use of these approaches can result in a function which is less centralized or less amenable to some kinds of centralization, they are not adequate to avoid centralization completely. They are also not indicators of whether a protocol is centralized without further analysis.</t>
      <section anchor="federation">
        <name>Federation isn't Enough</name>
        <t>A widely known technique for managing centralization in Internet protocols is federation -- designing them in such a way that new instances of any intermediary or otherwise centralized function are relatively easy to create, and they can maintain interoperability and connectivity with other instances.</t>
        <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that are necessarily centralized:</t>
        <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
          <li>Routing messages to the user, even when they change network locations or are disconnected for long periods of time.</li>
        </ol>
        <t>E-mail reuses DNS to help mitigate the first risk. To mitigate the second, it defines an intermediary role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
        <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, running your own mail server has become difficult, because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, indirectly centralizing the protocol's operation (see <xref target="indirect"/>).</t>
        <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
        <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, rather than provide the benefits of global interoperability.</t>
        <t>The examples above illustrate that federation can be a useful technique to avoid direct centralization and manage necessary centralization, but on its own does not avoid indirect and platform centralization. If a single entity can capture the value provided by a protocol, they may use the protocol as a platform to get a "winner take all" outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally "tilt the table" towards a few operators.</t>
      </section>
      <section anchor="multi">
        <name>Multi-Stakeholder Administration is Hard</name>
        <t>The risks associated with a necessarily centralized function (see <xref target="necessary"/>) are sometimes mitigated by delegating that function's administration to a multi-stakeholder body.</t>
        <t>A multi-stakeholder body is an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, broadly agreed-to, and authoritative decisions.</t>
        <t>The most relevant example of this technique is the administration of the DNS, which as a "single source of truth" exhibits necessary centralization in its naming function, as well as the operation of the system overall. To mitigate operational centralization, multiple root servers that are administered by separate operators (themselves diverse in geography) and a selection of corporate entities, non-profits, and government bodies from many jurisdictions and affiliations carry this task out. The name space itself is <eref target="https://www.icann.org/resources/pages/governance/governance-en">regulated by the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, which is defined as a globally multi-stakeholder body with representation from end users, governments, operators, and others.</t>
        <t>Another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification effectively controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
        <t>Yet another example is the administration of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To assure that all parties meet the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both of those parties as stakeholders.</t>
        <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="LEGITIMACY-MULTI"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
      </section>
      <section anchor="distributed">
        <name>Blockchains Are Not Magical</name>
        <t>Increasingly, distributed consensus technologies, such as the blockchain, are touted as a solution to centralization issues. A complete survey of this rapidly changing area is beyond the scope of this document, but at a high level, we can generalise about their properties.</t>
        <t>These techniques attempt to avoid centralization risk by distributing intermediary or otherwise potentially centralized functions to members of a large pool of protocol participants. Proper performance of a function is typically guaranteed using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
        <t>Sybil attacks (where enough participants coordinate their activity to affect the protocol's operation) are a major concern for these protocols. Diversity in the pool of participants is encouraged using indirect techniques such as proof-of-work (where each participant has to demonstrate significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
        <t>Use of these techniques can create barriers to direct and inherited centralization. However, depending upon the application in question, indirect and platform centralization can still be possible.</t>
        <t>Furthermore, distributed consensus technologies have several potential shortcomings that may make them inappropriate -- or at least difficult to use -- for many Internet applications, because their use conflicts with other important goals:</t>
        <ol spacing="normal" type="1"><li>Distributed consensus has significant implications for privacy. Because activity (such as queries or transactions) are shared with many unknown parties (and often publicly visible due to the nature of the blockchain) they have very different privacy properties than traditional client/server protocols. Potential mitigations (e.g., Private Information Retrieval; see, e.g., <xref target="PIR"/>) are still not suitable for broad deployment.</li>
          <li>Their complexity and "chattiness" typically result in significantly less efficient use of the network (often, to several orders of magnitude). When distributed consensus protocols use proof-of-work, energy consumption can become significant (to the point where some jurisdictions have banned its use).</li>
          <li>Distributed consensus protocols are still not proven to scale to the degree expected of successful Internet protocols. In particular, relying on unknown third parties to deliver functionality can introduce variability in latency, availability, and throughput. This is a marked change for applications with high expectations for these properties (e.g., commercial Web services).</li>
          <li>By design, distributed consensus protocols diffuse responsibility for a function among several difficult-to-identify parties. While this may be an effective way to prevent some kinds of centralization, it also means that making someone accountable for how the function is performed is impossible, beyond the bounds of the protocol's design.</li>
        </ol>
        <t>It is also important to recognise that a protocol or an application can use distributed consensus for some functions, but still have centralization risk elsewhere. Even when distributed consensus is used exclusively for all functions (which is uncommon, because of the associated costs), some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents centralization risk, just at a different layer (inherited or platform).</t>
        <t>These potential shortcomings do not rule out the use of distributed consensus technologies for every use case. They do, however, caution against relying upon these technologies to avoid centralization uncritically.</t>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Because permissionless innovation is a core value for the Internet, and yet much of the centralization seen on the Internet is performed by proprietary platforms that take advantage of this nature, the controls available to standards efforts on their own are very limited.</t>
      <t>While standards bodies on their own cannot prevent centralization, there are meaningful steps that can be taken to prevent some functions from exhibiting some forms of centralization. There are also valuable contributions that standards efforts can make to other relevant forms of regulation.</t>
      <section anchor="target">
        <name>Be Realistic</name>
        <t>Some types of centralization risk are relatively easy to manage in standards efforts. For example, a directly centralized protocol, were it to be proposed, would be rejected out of hand by the IETF. There is a growing body of knowledge and experience with necessary centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization. These responses are appropriate ways for Internet standards to manage centralization risk.</t>
        <t>However, preventing indirect and platform centralization is much more difficult in standards efforts. Because we have no "protocol police", it's not possible to demand that someone stop building a proprietary service using a purportedly federated protocol. We also cannot stop someone from building centralized services "on top" of standard protocols without abandoning architectural goals like permissionless innovation.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent centralization risk -- especially for indirect and platform risks -- is unlikely to be effective in preventing Internet centralization. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- suffer some form of indirect or platform centralization. Refusing to standardize a newer protocol because it faces similar risks would not be equitable, proportionate, or effective.</t>
        <t>When we find centralization risk, we should consider its relationship with other goals, such as privacy. While there is rarely a pure tradeoff between two abstract goals such as these, when it surfaces attention should be paid to how effective architectural regulation (such as a standards effort) is in achieving each goal. In this example, a technical mechanism might be much more effective at improving privacy, whereas centralization might be better controlled by other regulators -- leading to the conclusion that the standards effort should focus on privacy.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>Standards efforts should particularly focus on creating specifications for functions that are currently only satisfied by proprietary, centralized applications and protocols. For example, if social networking is thought to be a centralized function, this might mean creating specifications that enable decentralized social networking, perhaps using some or all of the techniques described in <xref target="decentralization"/>.</t>
        <t>Keen readers will point out that social networking is effectively centralized despite the existence of such standards (see, e.g., <xref target="W3C.CR-activitystreams-core-20161215"/>), because the IETF and W3C create voluntary standards, not mandatory regulations.</t>
        <t>However, architecture is not the only form of regulation; legal mechanisms combined with changing norms and the resulting market forces have their own regulatory effects <xref target="NEW-CHICAGO"/>. While for much of its lifetime the Internet has only been subject to limited legal regulation, that period appears to be ending.</t>
        <t>It is far from certain that a legal mandate for interoperability based upon Internet standards will eventuate, but it is increasingly discussed as a remedy for competition issues (see, e.g., <xref target="OECD"/>). It is also uncertain that legally mandated interoperability will fully address centralization risks. However, if such specifications are not available from the Internet community, they may be created elsewhere without reference to the Internet's architectural goals.</t>
        <t>Even absent a legal mandate, changes in norms and the market -- because of increasing knowledge and distrust of centralized functions -- can create demand for such specifications and the corresponding implementations.</t>
      </section>
      <section anchor="balance">
        <name>Build Well-Balanced Standards</name>
        <t>To minimize centralization risk, standards-defined functions should have an explicit goal of broad, diverse implementation and deployment, so that users have as many choices as possible.</t>
        <t><xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>This goal can also be furthered by ensuring that the cost of switching to a different implementation or deployment is as low as possible to facilitate subsequent substitution. This implies that the standard is functionally complete and specified precisely enough to result in meaningful interoperability.</t>
        <t>These goals are sometimes in tension. For example, if a standard is extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not offer enough functionality to be complete, and the resulting proprietary extensions may make switching difficult (see <xref target="evolution"/>).</t>
        <t>Furthermore, if a new protocol is perceived as completely commoditized (so that no implementation can differentiate itself, and there is no barrier to switching), it may have difficulty achieving broad implementation -- at least by commercial entities.</t>
        <t>Balancing these factors is difficult, but is often helped by community building and good design -- in particular, appropriate use of layering.</t>
      </section>
      <section anchor="intermediation">
        <name>Limit Intermediary Power</name>
        <t>Some functions might see substantial benefits if intermediation -- i.e., adding a new party to communication to perform a function -- is introduced. When used well, intermediation can help improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are significantly more efficient when performed at a higher scale. For example, a Content Delivery Network can offer services at a fraction of the financial and environmental cost that would otherwise be paid by someone serving content themselves, because of the scale they operate at.</li>
          <li>
            <em>Complexity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into relatively few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Intermediation can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="I-D.pauly-dprive-oblivious-doh"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing an intermediary role adds indirect and platform centralization risk to Internet protocols, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control these types of centralization, constraints on intermediary functions can prevent at least the most egregious outcomes.</t>
        <t>As a result, intermediaries should only be interposed as a result of the positive action of at least one endpoint, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization risk associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Avoid Over-Extensibility</name>
        <t>An important feature of Internet protocols is their ability to evolve, so that they can meet new requirements and adapt to new conditions without requiring a "flag day" to upgrade implementations. Typically, protocols accommodate evolution through extension mechanisms, which allow optional features to be added over time in an interoperable fashion.</t>
        <t>However, protocol extensions can also increase the risk of platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard protocol. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favouring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a "framework" where interoperability is not immediately available.  Internet protocols should not make every aspect of their operation extensible; extension points should be reasoned, appropriate boundaries for flexibility and control. When a protocol defines extension points, they should not allow an extension to declare itself to be mandatory-to-interoperate, as that pattern invites abuse.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have direct security impact on Internet protocols. However, failure to consider centralization risks might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization/>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="Roy T. Fielding">
            <organization>Adobe</organization>
          </author>
          <author fullname="Mark Nottingham">
            <organization>Fastly</organization>
          </author>
          <author fullname="Julian Reschke">
            <organization>greenbytes GmbH</organization>
          </author>
          <date day="12" month="September" year="2021"/>
          <abstract>
            <t>   The Hypertext Transfer Protocol (HTTP) is a stateless application-
   level protocol for distributed, collaborative, hypertext information
   systems.  This document describes the overall architecture of HTTP,
   establishes common terminology, and defines aspects of the protocol
   that are shared by all versions.  In this definition are core
   protocol elements, extensibility mechanisms, and the "http" and
   "https" Uniform Resource Identifier (URI) schemes.

   This document updates RFC 3864 and obsoletes RFC 2818, RFC 7231, RFC
   7232, RFC 7233, RFC 7235, RFC 7538, RFC 7615, RFC 7694, and portions
   of RFC 7230.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" initials="N." surname="Mitra">
            <organization/>
          </author>
          <author fullname="Yves Lafon" initials="Y." surname="Lafon">
            <organization/>
          </author>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="World Wide Web Consortium Recommendation" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="WEAPONIZED-INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A.L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="LEGITIMACY-MULTI">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
      </reference>
      <reference anchor="POLYCENTRIC">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P.D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
      </reference>
      <reference anchor="PIR">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://wayback.archive-it.org/12090/20191129202059/https://ec.europa.eu/commission/commissioners/2014-2019/vestager/announcements/defending-competition-digitised-world_en">
        <front>
          <title>Defending Competition in a Digitised World, Address at the European Consumer and Competition Day</title>
          <author initials="M." surname="Vestager" fullname="Margrethe Vestager">
            <organization/>
          </author>
          <date year="2019" month="April"/>
        </front>
      </reference>
      <reference anchor="TECH-SUCCESS-FACTORS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D.L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="7"/>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <referencegroup anchor="BCP95" target="https://www.rfc-editor.org/info/bcp95">
        <!-- reference.RFC.3935.xml -->
<reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
              <organization/>
            </author>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="W3C.CR-activitystreams-core-20161215" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="James Snell" initials="J." surname="Snell">
            <organization/>
          </author>
          <author fullname="Evan Prodromou" initials="E." surname="Prodromou">
            <organization/>
          </author>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="World Wide Web Consortium CR" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="I-D.pauly-dprive-oblivious-doh">
        <front>
          <title>Oblivious DNS Over HTTPS</title>
          <author fullname="Eric Kinnear">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Patrick McManus">
            <organization>Fastly</organization>
          </author>
          <author fullname="Tommy Pauly">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Tanya Verma">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="31" month="January" year="2022"/>
          <abstract>
            <t>   This document describes a protocol that allows clients to hide their
   IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS
   (DoH) messages.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

   This experimental protocol is developed outside the IETF and is
   published here to guide implementation, ensure interoperability among
   implementations, and enable wide-scale experimentation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-10"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="6" month="July" year="2021"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-02"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
