<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 3.0.4) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-03" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title>Centralization and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-03"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>regulation</keyword>
    <abstract>
      <t>Despite being designed and operated as a decentralized network-of-networks, the Internet is continuously subjected to forces that encourage centralization.</t>
      <t>This document offers a definition of centralization, explains why it is undesirable, identifies different types of centralization, catalogues limitations of common approaches to controlling it, and explores what Internet standards efforts can do to address it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. While this approach may reflect a desire to prevent a single technical failure from having wide impact <xref target="RAND"/>, it has also enabled the Internet's rapid adoption and broad spread. Because internetworking does not require a network to get permission from or cede control to another entity, it accommodates a spectrum of requirements and is positioned as a public good.</t>
      <t>While avoiding centralization of control over the Internet remains a widely shared goal, achieving it consistently has proven difficult. Many successful protocols and applications on the Internet today work in a centralized fashion -- to the point where some proprietary, centralized services have become so well-known that they are commonly mistaken for the Internet itself. Even when protocols incorporate techniques intended to prevent centralization, economic and social factors can drive users to prefer centralized solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural regulation -- in particular, that in open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling Internet centralization.</t>
      <t>This document discusses aspects of centralization that relate to Internet standards efforts. <xref target="what"/> provides a definition of centralization. <xref target="why"/> explains when and why centralization of the Internet's core functions is undesirable. <xref target="kinds"/> surveys the different kinds of centralization that might surface on the Internet. <xref target="decentralization"/> then catalogues high-level approaches to mitigating centralization and discusses their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding centralization and mitigating its effects.</t>
      <t>Engineers who design and standardize Internet protocols are the primary audience for this document. However, designers of proprietary protocols can benefit from considering aspects of centralization, especially if they intend their protocol to be considered for eventual standardisation. Likewise, policymakers can use this document to help identify and remedy inappropriately centralized protocols and applications.</t>
    </section>
    <section anchor="what">
      <name>What is Centralization?</name>
      <t>This document defines "centralization" as the ability of a single entity or a small group of them to exclusively observe, capture, control, or extract rent from the operation or use of a Internet function.</t>
      <t>Here, "entity" could be a single person, a corporation, or a government. It does not include an organisation that operates in a manner that effectively mitigates centralisation (see <xref target="multi"/>).</t>
      <t>"Internet function" is defined broadly. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>However, the Internet's functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to centralization -- for example, social networking, file sharing, financial services, and news dissemination. Likewise,  networking equipment, hardware, operating systems, and software act as enabling technologies that can exhibit centralization risk. The supply of Internet connectivity itself can also be subject to the forces of centralization.</t>
      <t>Centralization risk is strongest when it affects the entire Internet. However, it can also be present when a substantial portion of the Internet's users lack options for a function. For example, if there is only one provider for a function in a region or legal jurisdiction, that function is effectively centralized for those users.</t>
      <t>Likewise, if there is a single entity providing a function, it is obviously centralized. However, centralization risk can also be present when there is friction against switching to a substitute, because external factors can more easily promote concentration (see <xref target="indirect"/>). For example, if switching requires a significant amount of time, resources, expertise, coordination, loss of functionality, or effort, centralization risk is indicated.</t>
      <t>Note that availability is related to but distinct from centralization. For example, if my e-mail provider uses only one server, that server might go down and thus block my access to that function. However, this alone is not a cause of centralization risk.</t>
      <t>"Decentralization" is the process of identifying centralization risk related to a function, followed by the application of techniques used to prevent or mitigate that risk.</t>
      <t>Decentralization does not require that provision of a function need be so widely distributed that other important factors are sacrificed. Because centralization can have beneficial effects (see <xref target="direct"/>), the techniques used to decentralize a given function might vary, with the optimal balance being determined by many factors. Notably, a function that is only available through a relatively small number of providers can still be effectively decentralized (see, for example, the Domain Name System <xref target="RFC1035"/>).</t>
      <t>Therefore, discussions of centralization and architectural efforts at decentralization need to be made on a case-by-base basis, depending on the function in question, surrounding circumstances, and other regulatory mechanisms.</t>
      <t>Note that it is important to distinguish centralization from anti-competitive concerns (also known as "anti-trust"). While there are many interactions between these concepts and making provision of the Internet's functions more competitive may be a motivation for avoiding centralization, only courts are authoritative in determining what is and is not anti-competitive in a market, not standards bodies and other technical fora.</t>
    </section>
    <section anchor="why">
      <name>When Centralization is Undesirable</name>
      <t>Centralization is not always problematic, and is sometimes even desirable. If a function is specific to a given entity -- for example, a person's web site, or a government service -- it is expected that it be controlled by them alone. Emerging applications are often significantly less complex and more efficient to deploy as proprietary rather than decentralized functions. Some functions (such as the Internet standards process itself) even require central control to assure interoperability and application of shared goals and architectural principles.</t>
      <t>However, when any function becomes widespread enough in use and especially when it becomes a platform for other functions to be built upon, it deserves more scrutiny for centralization risk. Centralization of these functions is problematic when there are not effective mitigations in place (see <xref target="decentralization"/>), for a variety of reasons.</t>
      <t>First, the Internet's very nature is incompatible with centralization of its functions. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
      <t>Second, when a third party has unavoidable access to communications, the "informational and positional advantages" <xref target="INTERMEDIARY-INFLUENCE"/> gained can be used to observe behavior (the "panopticon effect") and shape or even deny behaviour (the "chokepoint effect") -- which can be used by those parties (or the states that have authority over them) for coercive ends <xref target="WEAPONIZED-INTERDEPENDENCE"/> or to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be concentrated in one place.</t>
      <t>Finally, centralization of an important function can have deleterious effects on the Internet itself, including:</t>
      <ul spacing="normal">
        <li>
          <em>Limiting Innovation</em>: Centralization can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
        <li>
          <em>Constraining Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When functions form dependencies on a centralized service or platform because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
        <li>
          <em>Reducing Availability</em>: The Internet's availability (as well as applications and services built upon it) improves when there are many ways to obtain access. While centralized services typically benefit from the focused attention that their elevated role requires, when they fail, the resulting loss of availability can have a disproportionate impact.</li>
        <li>
          <em>Creating Monoculture</em>: The scale available to a centralized service or application can magnify minor flaws in features such as recommendation algorithms to a degree that can have broad (even societal) consequences. Diversity in these functions' implementation is significantly more robust when viewed systemically. <xref target="POLYCENTRIC"/></li>
        <li>
          <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized service's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
      </ul>
      <t>See also <xref target="TECH-SUCCESS-FACTORS"/> for further exploration of how centralization can affect the Internet.</t>
      <t>To summarize, centralization of a function allows it to be captured, effectively becoming a "walled garden" that cannot be a full part of the Internet because it does not meet the Internet's architectural design goals or users' expectations.</t>
    </section>
    <section anchor="kinds">
      <name>Kinds of Centralization</name>
      <t>Centralization on the Internet is not uniform; it presents in a variety of ways, depending on its relationship to the function in question and underlying causes. The subsections below describe different aspects of Internet centralization.</t>
      <section anchor="direct">
        <name>Proprietary Centralization</name>
        <t>Creating of a protocol or application with a fixed role for a specific party is the most straightforward kind of centralization. Currently, many widely used messaging, videoconferencing, chat, and similar protocols operate in this fashion.</t>
        <t>While some argue that such protocols are simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, proprietary centralization most often reflects commercial goals -- in particular, a strong desire to capture the protocols' financial benefits by "locking in" users to a proprietary service.</t>
        <t>Proprietary protocols and applications are not considered to be part of the Internet per se; instead, they are more properly characterized as being built on top of the Internet. As such, the Internet architecture and associated standards do not regulate them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
      </section>
      <section anchor="necessary">
        <name>Beneficial Centralization</name>
        <t>Some protocols introduce centralization risk that is unavoidable, because the protocol's goals requires a centralized function.</t>
        <t>For example, when there is a need for a single, globally coordinated "source of truth", that function is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
        <t>IP addresses allocation is another example of a function having this kind of centralization risk. Internet routing requires addresses to be allocated uniquely, but if a single government or company captured the addressing function, the entire Internet would be at risk of abuse by that entity.</t>
        <t>Similarly, the need for coordination in the Web's trust model brings centralization risk, because of the Certificate Authority's role in communication between clients and servers.</t>
        <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also suffer from this kind of centralization risk. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party.</t>
        <t>By nature, what is or is not "beneficial" is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. Such judgments should be made in light of established architectural principles and how benefits accrue to end users.</t>
        <t>When beneficial centralization is present, internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) and multi-stakeholder administration (see <xref target="multi"/>). Protocols that successfully mitigate beneficial centralization are often reused, to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
      </section>
      <section anchor="indirect">
        <name>Concentrated Centralization</name>
        <t>Even when a protocol avoids proprietary centralization and does not require any beneficial centralization, it might become centralized in practice when external factors influence its deployment, so that relatively few or even just one entity provides the function. This is often referred to as "concentration." Economic, legal, and social factors that encourage use of a central function despite the absence of such a requirement in the protocol itself can cause concentration.</t>
        <t>Often, the factors driving concentration are related to the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks,<xref target="SCALE-FREE"/> network effects award asymmetric power to nodes that act as intermediaries to communication.</t>
        <t>Left unchecked, these factors can cause a potentially decentralized application to become effectively controlled by one party, because the central function has leverage to "lock in" users. For example, social networking is an application that is currently supplied by a few proprietary platforms despite standardization efforts (see, e.g., <xref target="ACTIVITYSTREAMS"/>), because of the powerful network effects associated.</t>
        <t>By its nature, concentration is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
      </section>
      <section anchor="network">
        <name>Inherited Centralization</name>
        <t>Most Internet protocols and applications depend on other, "lower-layer" protocols and their implementations. The features, deployment, and operation of these dependencies can surface centralization risk into functions and applications build "on top" of them.</t>
        <t>For example, the network between endpoints can introduce centralization risk to application-layer protocols, because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, thereby creating pressure to use other services, which can result in centralization of them.</t>
        <t>Likewise, having only a single implementation of a protocol is an inherited centralization risk, because applications that use it are vulnerable to the control it has over their operation. Even if it is Open Source, there might be inherited centralization risk if there are factors that make forking difficult (for example, the cost of maintaining that fork).</t>
        <t>Inherited centralization risk is often present when users cannot find a substitute because network effects reduce the choices available to them. This kind of centralization can also be created by legal mandates and incentives that restrict the options for Internet access, the provision of a given function, or the range of implementations available.</t>
        <t>Some kinds of inherited centralization can be prevented by enforcing layer boundaries through use of techniques like encryption. When the number of parties who have access to content of communication are limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still be able to prevent communication, encryption also makes it more difficult to discriminate a target from other traffic.</t>
        <t>Note that the prohibitive effect of encryption on inherited centralization is most pronounced when most (if not all) traffic is encrypted. See also <xref target="RFC7258"/>.</t>
      </section>
      <section anchor="platform">
        <name>Platform Centralization</name>
        <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate centralization in the applications it supports.</t>
        <t>For example, HTTP <xref target="HTTP"/> is not considered a centralized protocol; interoperable servers are relatively easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above.</t>
        <t>However, applications built on top of HTTP (as well as the rest of the "Web Platform") often exhibit centralization. As such, HTTP is an example of a platform for centralization -- while the protocol itself is not centralized, it facilitates the creation of centralized services and applications.</t>
        <t>Like concentration, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, often in a way that it becomes attractive to form a dependency on one party's operation.</t>
      </section>
    </section>
    <section anchor="decentralization">
      <name>The Limits of Decentralization</name>
      <t>Centralization's relationship to Internet standardization is undeniably about power -- a protocol is an agreed-to set of rules and conventions, and those rules can impact how power accrues. Over time, various techniques have been developed that attempt to avoid concentration of power as a result of protocol design, or to bring accountability when it is unavoidable.</t>
      <t>While use of these techniques can result in a function which is less centralized or less amenable to some kinds of centralization, they are not adequate to avoid centralization completely. They are also not indicators of whether a protocol is centralized without further analysis.</t>
      <section anchor="federation">
        <name>Federation isn't Enough</name>
        <t>A widely known technique for managing centralization in Internet protocols is federation -- designing them in such a way that new instances of any centralized function are relatively easy to create and can maintain interoperability and connectivity with other instances.</t>
        <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that have centralization risk:</t>
        <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
          <li>Routing messages to the user, even when they change network locations or are disconnected for long periods of time.</li>
        </ol>
        <t>E-mail reuses DNS to help mitigate the first risk. To mitigate the second, it defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
        <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, running your own mail server has become difficult, because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, concentrating the protocol's operation (see <xref target="indirect"/>).</t>
        <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
        <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, rather than provide the benefits of global interoperability.</t>
        <t>The examples above illustrate that federation can be a useful technique to avoid proprietary centralization and manage beneficial centralization, but on its own does not avoid concentration and platform centralization. If a single entity can capture the value provided by a protocol, they may use the protocol as a platform to get a "winner take all" outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally "tilt the table" towards a few operators.</t>
      </section>
      <section anchor="multi">
        <name>Multi-Stakeholder Administration is Hard</name>
        <t>The risks associated with a beneficial centralized function (see <xref target="necessary"/>) are sometimes mitigated by delegating that function's administration to a multi-stakeholder body -- an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
        <t>The most widely-studied example of this technique is the administration of the DNS, which as a "single source of truth" exhibits beneficial centralization in its naming function, as well as the operation of the system overall. To mitigate operational centralization, multiple root servers that are administered by separate operators (themselves diverse in geography) and a selection of corporate entities, non-profits, and government bodies from many jurisdictions and affiliations carry this task out. Administration of the name space itself is overseen by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
        <t>Another example is the administration of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To assure that all parties meet the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both of those parties as stakeholders.</t>
        <t>Yet another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification effectively controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
        <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="LEGITIMACY-MULTI"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
      </section>
      <section anchor="distributed">
        <name>Blockchains Are Not Magical</name>
        <t>Increasingly, distributed consensus technologies (such as blockchain) are touted as a solution to centralization issues. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalise about their properties.</t>
        <t>These techniques attempt to avoid centralization risk by distributing potentially centralized functions to members of a sometimes large pool of protocol participants. Proper performance of a function is typically guaranteed using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
        <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. Diversity in the pool of participants is encouraged using indirect techniques such as proof-of-work (where each participant has to demonstrate significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
        <t>Use of these techniques can create barriers to proprietary and inherited centralization. However, depending upon the application in question, concentration and platform centralization can still be possible.</t>
        <t>Furthermore, distributed consensus technologies have several potential shortcomings that may make them inappropriate -- or at least difficult to use -- for many Internet applications, because their use conflicts with other important goals:</t>
        <ol spacing="normal" type="1"><li>Distributed consensus has significant implications for privacy. Because activity (such as queries or transactions) are shared with many unknown parties (and often publicly visible due to the nature of the blockchain) they have very different privacy properties than traditional client/server protocols. Potential mitigations (e.g., Private Information Retrieval; see, e.g., <xref target="PIR"/>) are still not suitable for broad deployment.</li>
          <li>Their complexity and "chattiness" typically result in significantly less efficient use of the network (often, to several orders of magnitude). When distributed consensus protocols use proof-of-work, energy consumption can become significant (to the point where some jurisdictions have banned its use).</li>
          <li>Distributed consensus protocols are still not proven to scale to the degree expected of successful Internet protocols. In particular, relying on unknown third parties to deliver functionality can introduce significant variability in latency, availability, and throughput. This is a marked change for applications with high expectations for these properties (e.g., consumer-oriented Web sites).</li>
          <li>By design, distributed consensus protocols diffuse responsibility for a function among several difficult-to-identify parties. While this may be an effective way to prevent some kinds of centralization, it also means that making someone accountable for how the function is performed difficult, and often impossible. While the protocol might use cryptographic techniques to assure correct operation, they may not capture all requirements, and may not be correctly used by the protocol designers.</li>
          <li>Distributed consensus protocols typically rely on cryptography for identity, rather than trusting a third party's assertions about identity. When a participant loses their keys, recovering their identity is not possible -- an unacceptable usability impact for many applications.</li>
        </ol>
        <t>It is also important to recognise that a protocol or an application can use distributed consensus for some functions, but still have centralization risk elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the service provider has chosen not to because of the associated costs and lost opportunities.</t>
        <t>Even when distributed consensus is used exclusively for all technical functions of a service, some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents centralization risk, just at a different layer (inherited or platform).</t>
        <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against relying upon these technologies to avoid centralization uncritically.</t>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Because permissionless innovation is a core value for the Internet, and yet much of the centralization seen on the Internet is performed by proprietary platforms that take advantage of this nature, the controls available to standards efforts are very limited.</t>
      <t>While standards bodies on their own cannot prevent centralization, there are meaningful steps that can be taken to prevent some functions from exhibiting centralization. There are also valuable contributions that standards efforts can make to other relevant forms of regulation.</t>
      <section anchor="target">
        <name>Be Realistic</name>
        <t>Some kinds of centralization risk are relatively easy to manage in standards efforts. For example, if a proprietary protocol were to be proposed to the IETF, it would be rejected out of hand. There is a growing body of knowledge and experience with beneficial centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization, and has become the norm in standard protocols. These responses are appropriate ways for Internet standards to manage centralization risk.</t>
        <t>However, preventing concentration and platform centralization is much more difficult in standards efforts. Because we have no "protocol police", it's not possible to demand that someone stop building a proprietary service using a purportedly federated protocol. We also cannot stop someone from building centralized services "on top" of standard protocols without abandoning architectural goals like permissionless innovation.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent centralization risk -- especially for concentration and platform risks -- is unlikely to be effective in preventing Internet centralization. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- suffer some form of concentration or platform centralization. Refusing to standardize a newer protocol because it faces similar risks would not be equitable, proportionate, or effective.</t>
        <t>When we do find centralization risk, we should consider its relationship with other architectural goals as we consider how to address it. In particular, attention should be paid to how effective standards (as a form of architectural regulation) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some kinds of centralization are likely better addressed through legal regulation. Thus, as a first order concern, a standards effort balancing these concerns might focus primarily on privacy. However it is often the case that these are not completely separable goals -- concentration can result in one or a few entities having greater volume and variety of data available exclusively to them, raising significant privacy and security concerns.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>It is worthwhile to create specifications for functions that are currently only satisfied by proprietary providers. By building open specifications on top of already established standards, an alternative to a centralized function can be created.</t>
        <t>A common objection to such efforts is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) have been available for some time without broad adoption by social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and regulators around the globe are now focusing their efforts on the Internet. In particular, legal mandates for interoperability are increasingly discussed as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, emerging regulation presents an opportunity to create new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>.</t>
        <t>Successfully creating standards that work in concert with legal regulation is new ground for the IETF, presents many potential pitfalls, and will require new capabilities (especially liaison, likely originating in the IAB) and considerable effort. If the Internet community does not make that effort, it is likely that regulators' needs will be filled by other means -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet's architectural goals.</t>
      </section>
      <section anchor="balance">
        <name>Build Robust Ecosystems</name>
        <t>To minimize inherited centralization risk, standards-defined functions should have an explicit goal of broad, diverse implementation and deployment so that users have as many choices as possible.</t>
        <t><xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>This goal can also be furthered by ensuring that the cost of switching to a different implementation or deployment is as low as possible to facilitate subsequent substitution. This implies that the standard is functionally complete and specified precisely enough to result in meaningful interoperability.</t>
        <t>The goals of completeness and diversity are sometimes in tension. If a standard is extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not offer enough functionality to be complete, and the resulting proprietary extensions may make switching difficult (see <xref target="evolution"/>).</t>
        <t>Also worthy of attention are the underlying incentives for implementation. While a completely commoditized protocol might not allow implementations to differentiate themselves, they do provide opportunties for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
        <t>Balancing these factors to build robust ecosystems is difficult, but is often helped by community building and good design -- in particular, appropriate use of layering. It also requires continuing maintenance and evolution of protocols, to assure that they are still relevant and appropriate to their use.</t>
      </section>
      <section anchor="intermediation">
        <name>Limit Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are performed by a third party in communication. When used well, adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are significantly more efficient when performed at a higher scale. For example, a Content Delivery Network can offer services at a fraction of the financial and environmental cost that would otherwise be paid by someone serving content themselves, because of the scale they operate at.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into relatively few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="I-D.pauly-dprive-oblivious-doh"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing an new party to communication adds concentration and platform centralization risk to Internet protocols, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control these types of centralization, designing protocols with constraints on third party functions can prevent at least the most egregious outcomes.</t>
        <t>Most often, third parties are added to protocols as "intermediaries" or in designated "agent" roles. In general, they should only be interposed as a result of the positive action of at least one endpoint, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization risk associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Avoid Over-Extensibility</name>
        <t>An important feature of Internet protocols is their ability to evolve, so that they can meet new requirements and adapt to new conditions without requiring a "flag day" to upgrade implementations. Typically, protocols accommodate evolution through extension mechanisms, which allow optional features to be added over time in an interoperable fashion.</t>
        <t>Extensibility can be viewed as a mechanism for decentralization as well -- by allowing uncoordinated evolution, it promotes autonomy and adaption of a function for local needs. However, protocol extensions can also increase the risk of platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard protocol. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favouring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a "framework" where interoperability is not immediately available.  Internet protocols should not make every aspect of their operation extensible; extension points should be reasoned, appropriate boundaries for flexibility and control. When a protocol defines extension points, they should not allow an extension to declare itself to be mandatory-to-interoperate, as that pattern invites abuse.</t>
        <t>Where extensions are allowed, attention should be paid to those that emerge; where appropriate, widely adopted extensions should be put through a standards process to assure that the result adheres to architectural principles and shared goals (see also <xref target="up"/>).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have direct security impact on Internet protocols. However, failure to consider centralization risks might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization/>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="Roy T. Fielding">
            <organization>Adobe</organization>
          </author>
          <author fullname="Mark Nottingham">
            <organization>Fastly</organization>
          </author>
          <author fullname="Julian Reschke">
            <organization>greenbytes GmbH</organization>
          </author>
          <date day="12" month="September" year="2021"/>
          <abstract>
            <t>   The Hypertext Transfer Protocol (HTTP) is a stateless application-
   level protocol for distributed, collaborative, hypertext information
   systems.  This document describes the overall architecture of HTTP,
   establishes common terminology, and defines aspects of the protocol
   that are shared by all versions.  In this definition are core
   protocol elements, extensibility mechanisms, and the "http" and
   "https" Uniform Resource Identifier (URI) schemes.

   This document updates RFC 3864 and obsoletes RFC 2818, RFC 7231, RFC
   7232, RFC 7233, RFC 7235, RFC 7538, RFC 7615, RFC 7694, and portions
   of RFC 7230.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" initials="N." surname="Mitra">
            <organization/>
          </author>
          <author fullname="Yves Lafon" initials="Y." surname="Lafon">
            <organization/>
          </author>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="World Wide Web Consortium Recommendation" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="WEAPONIZED-INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="LEGITIMACY-MULTI">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
      </reference>
      <reference anchor="POLYCENTRIC">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
      </reference>
      <reference anchor="PIR">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://wayback.archive-it.org/12090/20191129202059/https://ec.europa.eu/commission/commissioners/2014-2019/vestager/announcements/defending-competition-digitised-world_en">
        <front>
          <title>Defending Competition in a Digitised World, Address at the European Consumer and Competition Day</title>
          <author initials="M." surname="Vestager" fullname="Margrethe Vestager">
            <organization/>
          </author>
          <date year="2019" month="April"/>
        </front>
      </reference>
      <reference anchor="TECH-SUCCESS-FACTORS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="James Snell" initials="J." surname="Snell">
            <organization/>
          </author>
          <author fullname="Evan Prodromou" initials="E." surname="Prodromou">
            <organization/>
          </author>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="World Wide Web Consortium CR" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="7"/>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <referencegroup anchor="BCP95" target="https://www.rfc-editor.org/info/bcp95">
        <!-- reference.RFC.3935.xml -->
<reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
              <organization/>
            </author>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="I-D.pauly-dprive-oblivious-doh">
        <front>
          <title>Oblivious DNS Over HTTPS</title>
          <author fullname="Eric Kinnear">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Patrick McManus">
            <organization>Fastly</organization>
          </author>
          <author fullname="Tommy Pauly">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Tanya Verma">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="17" month="February" year="2022"/>
          <abstract>
            <t>   This document describes a protocol that allows clients to hide their
   IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS
   (DoH) messages.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

   This experimental protocol is developed outside the IETF and is
   published here to guide implementation, ensure interoperability among
   implementations, and enable wide-scale experimentation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-11"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="7" month="March" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-03"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Thanks to Jari Arkko, Christian Huitema, and Eliot Lear for their comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
