<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 3.0.3) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-thomson-tmi-03" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="Too Much Intermediation">Principles for the Involvement of Intermediaries in Internet Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-03"/>
    <author initials="M." surname="Thomson" fullname="Martin Thomson">
      <organization>Mozilla</organization>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <abstract>
      <t>This document proposes a set of principles for designing protocols with rules
for intermediaries.  The goal of these principles is to limit the ways in which
intermediaries can produce undesirable effects and to protect the useful
functions that intermediaries legitimately provide.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  IAB Model-T list (modelt@iab.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/model-t/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/martinthomson/tmi"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet owes much of its success to its application of the end-to-end
principle <xref target="E2E"/>.  The realization that efficiency
is best served by moving higher-level functions to endpoints is a key insight
in system design, but also a key element of the success of the Internet.</t>
      <t>This does not mean that the Internet avoids a relying on functions provided by
entities in the network.  While the principle establishes that some functions
are best provided by endsystems, this does not exclude all intermediary
functions.  Some level of function in the network is necessary, or else there
would be no network.  The ways in which intermediaries can assist protocol
endpoints are numerous and constantly evolving.</t>
      <t>This document explores some of the ways in which intermediaries make both
essential and valuable contributions to the function of the system.  Problems
arise when the interests of intermediaries are poorly aligned with those of
endpoints.  This can result in systemic costs and tension.  Addressing those
issues can be difficult.</t>
      <t>This document proposes the following design principles for the protocols that
might involve the participation of intermediaries:</t>
      <ul spacing="normal">
        <li>Avoid intermediation (<xref target="prefer-services"/>)</li>
        <li>Limit the entities that can intermediate (<xref target="limit-participants"/>)</li>
        <li>Limit what intermediaries can do (<xref target="limit-capabilities"/>)</li>
      </ul>
      <t>These principles aim to provide clarity about the roles and responsibilities of
protocol participants.  These principles produce more robust protocols with
better privacy and security properties.  These also limit the secondary costs
associated with intermediation.</t>
    </section>
    <section anchor="what-is-meant-by-intermediary">
      <name>What is Meant by Intermediary</name>
      <t>An intermediary is an element that participates in a protocol exchange.  An
intermediary receives protocol units, such as packets or messages, and forwards
the protocol units to other protocol participants.  An intermediary might
make changes to protocol units or leave the content of the unit unchanged.</t>
      <t>An intermediary often does not directly benefit from the protocol exchange, but
instead acts to facilitate the exchange.  An intermediary often participates at
the request of another participant in the protocol, which might be an endpoint
or an intermediary.</t>
      <t>Intermediaries exist at all layers of the stack.  A router is an intermediary
that acts at the network layer to forward packets.  A TURN relay <xref target="RFC8155"/>
provides similar forwarding capability for UDP in the presence of a network
address translator (NAT) - a different type of intermediary that provides the
ability to share a limited supply of addresses.  At higher layers of the stack,
group messaging servers intermediate the exchange of messages within groups of
people; a conference focus aids the sending of media group real-time
communications; and a social network intermediates communication and
information sharing through the exchange of messages and formation of groups.</t>
      <t>A person uses a networked computer as an intermediary for their communications
with other people and computers.  This intermediation is essential, for users
are unable to directly interact with a network.  Much of the guidance in this
document does not apply to the relationship between users and user agents; see
<xref target="RFC8890"/>, Section <xref section="4.2" sectionFormat="bare" target="RFC8890"/> in
particular, for an examination of this topic.</t>
      <t>An intermediary at one layer of the stack is often an endpoint for communication
at a lower layer.  A Diameter peer <xref target="DIAMETER"/> acts as an intermediary
when it forwards requests to other peers.  However, a Diameter peer establishes
connections to neighboring peers using TLS/TCP or DTLS/SCTP and acts as a
endpoint for all of those protocols.</t>
      <t>It is possible to facilitate communication without being an intermediary.  The
DNS provides information that is critical to locating and communicating with
other Internet hosts, but it does so without intermediating those
communications.  Thus, this definition of intermediary does not necessarily
include a service like the DNS.  Of course, the use of the DNS could involve
engaging with intermediaries such as recursive resolvers.</t>
    </section>
    <section anchor="intermediation-is-essential">
      <name>Intermediation Is Essential</name>
      <t>Intermediaries are essential to scalable communications.  The service an
intermediary provides usually involves access to resources that would not
otherwise be available.  For instance, the Internet does not function without
routers that enable packets to reach other networks.</t>
      <t>There is some level of intermediation that is essential for the proper
functioning of the Internet.</t>
      <t>Scalable solutions to the introduction problem often depend on services that
provide access to information and capabilities.  As it is with the network layer
of the Internet, the use of an intermediary can be absolutely essential.  For
example, a social networking application acts as an intermediary that provides a
communications medium, content discovery and publication, and related services.
Video conferencing applications often depend on an intermediary that mixes audio
and selectively forwards video so that bandwidth requirements don't increase
beyond what is available for participants as conferences grow in size.</t>
    </section>
    <section anchor="intermediation-is-useful">
      <name>Intermediation Is Useful</name>
      <t>That intermediaries provide access to valuable resources does not imply that
all intermediaries have exclusive control over access to resources.  A router
might provide access to other networks, but similar access might be obtained
via a different route.  The same web content might be provided by multiple CDNs.
Multiple DNS resolvers can provide answers to the same queries.  The ability to
access the same capabilities from multiple entities contributes greatly to the
robustness of a system.</t>
      <t>Intermediaries often provide capabilities that benefit from economies of scale
by providing a service that aggregates demand from multiple individuals.  For
instance, individuals are unlikely to be in a position to negotiate connections
to multiple networks, but an ISP can.  Similarly, an individual might find it
difficult to acquire the capacity necessary to withstand a DDoS attack, but the
scale at which a CDN operates means that this capacity is likely available to
it.  Or the value of a social network is in part due to the existing
participation of other people.</t>
      <t>Aggregation also provides other potential benefits.  For instance, caching of
shared information can allow for performance advantages.  From an efficiency
perspective, the use of shared resources might allow load to be more evenly
distributed over time.  For privacy, individual activity might be mixed with the
activity of many others, thereby making it difficult to isolate that activity.</t>
      <t>The ability of an intermediary to operate at scale can therefore provide a
number of different benefits to performance, scalability, privacy, and other
areas.</t>
    </section>
    <section anchor="scale">
      <name>Intermediation Enables Scaling Of Control</name>
      <t>An action by an intermediary can affect all who communicate using that
intermediary.  For an intermediary that operates at scale, this means it can be
seen as an effective control point.</t>
      <t>In addition to facilitating communications, some intermediary deployments aim to
effect a policy. This relies on the ability of a well-placed intermediary to
affect multiple protocol interactions and participants.</t>
      <t>The ability of an intermediary to affect a large number of network users can be
an advantage or vulnerability, depending on perspective.  For instance, network
intermediaries have been used to distribute warnings of impending natural
disasters like fire, flood, or earthquake, which save lives and property.  In
contrast, control over large-scale communications can enable censorship
<xref target="RFC7754"/>, misinformation <xref target="PARADOX"/>, or
pervasive monitoring <xref target="RFC7258"/>.</t>
      <t>Intermediaries that can affect many people can therefore be powerful agents for
control.  While the morality of actions taken can be subjective, network users
have to consider the potential for the power they vest in intermediaries to be
abused or subverted.</t>
    </section>
    <section anchor="incentives">
      <name>Incentive Misalignment at Scale</name>
      <t>A dependency on an intermediary represents a risk to those that take the
dependency.  The incentives and motives of intermediaries can be important to
consider when choosing to use an intermediary.</t>
      <t>For instance, the information necessary for an intermediary to performs its
function can often be used (or abused) for other purposes.  Even the simple
function of forwarding necessarily involves information about who was
communicating, when, and the size of messages.  This can reveal more than is
obvious <xref target="CLINIC"/>.</t>
      <t>As uses of networks become more diverse, the extent that incentives for
intermediaries and network users align reduce.  In particular, acceptance of
the costs and risks associated with intermediation by a majority of network
users does not mean that all users have the same expectations and requirements.
This can be a significant problem if it becomes difficult to avoid or refuse
participation by a particular intermediary.</t>
      <t>A dependency on an intermediary, particularly a technically or operationally
challenging dependency, can reduce the number of viable choices of intermediary
operators.  Reduced choice can lead to dependence on specific intermediaries,
which reduces resilience and exposes endpoints to greater potential for abuse.</t>
    </section>
    <section anchor="forced-and-unwanted-intermediation">
      <name>Forced and Unwanted Intermediation</name>
      <t>The ability to act as intermediary can offer more options than a service that is
called upon to provide information.  Sometimes those advantages are enough to
justify the use of intermediation over alternative designs.  However, the use of
an intermediary also introduces costs.</t>
      <t>The use of transparent or interception proxies in HTTP
<xref target="HTTP"/> is an example of a practice that has
fallen out of common usage due to increased use of HTTPS.  Use of transparent
proxies was once widespread with a wide variety of reasons for their
deployment.  However, transparent proxies were involved in many abuses, such as
unwanted transcoding of content and insertion of identifiers to the detriment
of individual privacy.</t>
      <t>Introducing intermediaries is often done with the intent of avoiding disruption
to protocols that operate a higher layer of the stack.  However, network
layering abstractions often leak, meaning that the effects of the intermediation
can be observed.  Where those effects cause problems, it can be difficult to
detect and fix those problems.</t>
      <t>The insertion of an intermediary in a protocol imposes other costs on other
protocol participants; see <xref target="EROSION"/> or
<xref target="MIDDLEBOX"/>.  In particular, poor implementations of intermediaries
can adversely affect protocol operation.</t>
      <t>As an intermediary is another participant in a protocol, they can make
interactions less robust.  Intermediaries can also be responsible for
ossification, or the inability to deploy new protocol mechanisms; see <xref section="2.3" sectionFormat="of" target="USE-IT"/>.  For example, measurement of TCP showed that the
protocol has poor prospects for extensibility due to widespread use - and poor
implementation - of intermediaries <xref target="TCP-EXTEND"/>.</t>
    </section>
    <section anchor="contention-over-intermediation">
      <name>Contention over Intermediation</name>
      <t>The IETF has a long history of dealing with different forms of intermediation
poorly.</t>
      <t>A debate about the intent and purpose of IPv6 extension headers
<xref target="IPv6"/> occurred prior to the publication of RFC 8986
<xref target="SRv6"/> and it's PSP (Penultimate Segment Pop) mode.  Here, the use of
extension headers by entities other than the communication endpoints -- that is,
intermediaries -- was contested.  As the purpose of this feature is to
communicate routing information between intermediaries, this could be seen as a
form of tunneling between the communicating routers that uses the ability of
IPv6 intermediaries (or routers) to add or remove extension headers.</t>
      <t>Like HTTP, SIP <xref target="RFC3261"/> defines a role for a proxy, which is a form of
intermediary with limited ability to interact with the session that it
facilitates.  In practice, many deployments instead choose to deploy some form
of Back-to-Back UA (B2BUA; <xref target="RFC7092"/>) for reasons that effectively reduce to
greater ability to implement control functions.</t>
      <t>There are several ongoing debates in the IETF that are rooted in disagreement
about the rule of intermediaries.  The interests of network-based devices --
which sometimes act as TLS intermediaries -- is fiercely debated in the context
of TLS 1.3 <xref target="TLS"/>, where the design renders certain practices
obsolete.</t>
      <t>It could be that the circumstances in each of these debates is different enough
that there is no singular outcome.  The complications resulting from large-scale
deployments of great diversity might render a single clear outcome impossible
for an established protocol.</t>
    </section>
    <section anchor="principles">
      <name>Proposed Principles</name>
      <t>Many problems caused by intermediation are the result of intermediaries that
are introduced without the involvement of protocol endpoints.  Limiting the
extent to which protocol designs depend on intermediaries makes the resulting
system more robust.</t>
      <t>These principles are set out in three stages:</t>
      <ol spacing="normal" type="1"><li>Prefer designs without intermediaries (<xref target="prefer-services"/>);</li>
        <li>Failing that, control which entities can intermediate the protocol
(<xref target="limit-participants"/>); and</li>
        <li>Limit actions and information that are available to intermediaries
(<xref target="limit-capabilities"/>).</li>
      </ol>
      <t>The use of technical mechanisms to ensure that these principles are enforced is
necessary.  It is expected that protocols will need to use cryptography for
this.</t>
      <t>New protocol designs therefore need to identify what intermediation is possible
and what is desired.  Technical mechanisms to guarantee conformance, where
possible, are highly recommended.</t>
      <t>Modifying existing protocols to follow these principles could be difficult, but
worthwhile.</t>
      <section anchor="prefer-services">
        <name>Prefer Services to Intermediaries</name>
        <t>Protocols should prefer designs that do not involve additional participants,
such as intermediaries.</t>
        <t>Designing protocols to use services rather than intermediaries ensures that
responsibilities of protocol participants are clearly defined.  Where functions
can provided by means other than intermediation, the design should prefer that
alternative.</t>
        <t>If there is a need for information, defining a means for querying a service for
that information is preferable to adding an intermediary.  Similarly, direct
invocation of service to perform an action is better than involving that
service as a participant in the protocol.</t>
        <t>Involving an entity as an intermediary can greatly increase the degree to which
that entity becomes a dependency.  For example, it might be necessary to
negotiate the use of new capabilities with all protocol participants, including
the intermediary, even when the functions for which the intermediary was added
are not affected.  It is also more difficult to limit the extent to which a
protocol participant can be involved than a service that is invoked for a
specific task.</t>
        <t>Using discrete services is not always the most performant architecture as
additional network interactions can add to overheads.  The cost of these
overheads need to be weighed against the recurrent costs from involving
intermediaries.</t>
        <t>The contribution of an intermediary to performance and efficiency can involve
trade-offs, such as those discussed in Section 2.3 of <xref target="E2E"/>.  One
consideration is the potential need for critical functions to be replicated in
both intermediaries and endpoints, reducing efficiency.  Another is the
possibility that an intermediary optimized for one application could degrade
performance in other applications.</t>
        <t>Preferring services is analogous to the software design principle that
recommends a preference for composition over inheritance <xref target="PATTERNS"/>.</t>
      </section>
      <section anchor="limit-participants">
        <name>Deliberately Select Protocol Participants</name>
        <t>Protocol participants should know what other participants they might be
interacting with, including intermediaries.</t>
        <t>Protocols that permit the involvement of an intermediary need to do so
intentionally and provide measures that prevent the addition of unwanted
intermediaries.  Ideally, all protocol participants are identified and known to
other protocol participants.</t>
        <t>The addition of an unwanted protocol participant is an attack on the protocol.</t>
        <t>This is an extension of the conclusion of <xref target="PATH-SIGNALS"/>, which:</t>
        <ul empty="true">
          <li>
            <t>recommends that implicit signals should be avoided and that an implicit signal
should be replaced with an explicit signal only when the signal's originator
intends that it be used by the network elements on the path.</t>
          </li>
        </ul>
        <t>Applying this principle likely requires the use of authentication and
encryption.</t>
      </section>
      <section anchor="limit-capabilities">
        <name>Limit Capabilities of Intermediaries</name>
        <t>Protocol participants should be able to limit the capabilities conferred to
other protocol participants.</t>
        <t>Where the potential for intermediation already exists, or intermediaries
provide essential functions, protocol designs should limit the capabilities and
information that protocol participants are required to grant others.</t>
        <t>Limiting the information that participants are required to provide to other
participants has benefits for privacy or to limit the potential for misuse of
information; see <xref target="limit-info"/>.  Where confidentiality is impossible or
impractical, integrity protection can be used to ensure that data origin
authentication is preserved; see <xref target="limit-changes"/>.</t>
        <section anchor="limit-info">
          <name>Limit Information Exposure</name>
          <t>Protocol participants should only have access to the information they need to
perform their designated function.</t>
          <t>Protocol designs based on a principle of providing the minimum information
necessary have several benefits.  In addition to requiring smaller messages, or
fewer exchanges, reducing information provides greater control over exposure of
information.  This has privacy benefits.</t>
          <t>Where an intermediary needs to carry information that it has no need to access,
protocols should use encryption to ensure that the intermediary cannot access
that information.</t>
          <t>Providing information for intermediaries using signals that are separate from
other protocol signaling is preferable <xref target="PATH-SIGNALS"/>.  In addition,
integrity protection should be applied to these signals to prevent modification.</t>
        </section>
        <section anchor="limit-changes">
          <name>Limit Permitted Interactions</name>
          <t>An action should only be taken based on signals from protocol participants that
are authorized to request that action.</t>
          <t>Where an intermediary needs to communicate with other protocol participants,
ensure that these signals are attributed to an intermediary.  Authentication is
the best means of ensuring signals generated by protocol participants are
correctly attributed.  Authentication informs decisions protocol participants
make about actions they take.</t>
          <t>In some cases, particularly protocols that are primarily two-party protocols,
it might be sufficient to allow the signal to be attributed to any
intermediary.  This is the case in QUIC <xref target="QUIC"/> for
ECN <xref target="ECN"/> and ICMP <xref target="ICMP"/>, both of which are assumed to
be provided by elements on the network path.  Limited mechanisms exist to
authenticate these as signals that originate from path elements, informing
actions taken by endpoints.  Consequently, the actions taken in response to
these signals is limited.</t>
        </section>
        <section anchor="costs-of-technical-constraints">
          <name>Costs of Technical Constraints</name>
          <t>Moving from a protocol in which there are two participants (such as
<xref target="TLS"/>) to more than two participants can be more complex and
expensive to implement and deploy.</t>
          <t>More generally, the application of technical measures to control how
intermediaries participate in a protocol incur costs that manifest in several
ways.  Protocols are more difficult to design; implementations are larger and
more complex; and deployments might suffer from added operational costs, higher
computation loads, and more bandwidth consumption.  These costs are reflective
of the true cost of involving additional entities in protocols.  In protocols
without technical measures to limit participation, these costs have
historically been borne by other protocol participants.</t>
          <t>In general however, most protocols are able to reuse existing mechanisms for
cryptographic protection, such as TLS <xref target="TLS"/>.  Adopting something like TLS
provides security properties that are well understood and analyzed.  Using a
standardized solution enables use of well-tested implementations that include
optimizations and other mitigations for these costs.</t>
        </section>
      </section>
    </section>
    <section anchor="applying-non-technical-constraints">
      <name>Applying Non-Technical Constraints</name>
      <t>Not all intermediary functions can be tightly constrained.  For instance, as
described in <xref target="incentives"/>, some functions involve granting intermediaries
access to information that can be used for more than its intended purpose.
Applying strong technical constraints on how that information is used might be
infeasible or impossible.</t>
      <t>The use of authentication allows for other forms of control on intermediaries.
Auditing systems or other mechanisms for ensuring accountability can use
authentication information.  Authentication can also enable the use of legal,
social, or other types of control that might cover any shortfall in technical
measures.</t>
    </section>
    <section anchor="the-effect-on-existing-practices">
      <name>The Effect on Existing Practices</name>
      <t>The application of these principles can have an effect on existing operational
practices, particularly where they rely on protocols not limiting intermediary
access.  Several documents have explored aspects of this in detail:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC8404"/> describes effects of encryption on practices performed by
intermediaries;</li>
        <li>
          <xref target="RFC8517"/> describes a broader set of practices;</li>
        <li>
          <xref target="RFC9065"/> explores the effect on transport-layer intermediaries in more
detail; and</li>
        <li>
          <xref target="NS-IMPACT"/> examines the effect of TLS on
operational network security practices.</li>
      </ul>
      <t>In all these documents, the defining characteristic is the move from a system
that lacked controls on participation to one in which technical controls are
deployed.  In each case the protocols in question provided no technical controls
or only limited technical controls that prevent the addition of intermediaries.
This allowed the deployment of techniques that involved the insertion of
intermediaries into sessions without permission or knowledge of other protocol
participants.  By adding controls like encryption, these practices are
disrupted. Overall, the advantages derived from having greater control and
knowledge of other protocol participants outweighs these costs.</t>
      <t>The process of identifying critical functions for intermediaries is ongoing.
There are three potential classes of outcome of these discussion:</t>
      <ul spacing="normal">
        <li>Practices might be deemed valuable and methods that allow limited
participation by intermediaries will be added to protocols.</li>
        <li>The use case supported by the practice might be deemed valuable, but
alternative methods that address the use case without the use of an
intermediary will be sought.</li>
        <li>Practices might be deemed harmful and no replacement mechanism will be
sought.</li>
      </ul>
      <t>Many factors could influence the outcome of this analysis.  For instance,
deployment of alternative methods or limited roles for intermediaries could be
relatively simple for new protocol deployments; whereas it might be challenging
to retrofit controls on existing protocol deployments.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Controlling the level of participation and access intermediaries have is a
security question.  The principles in <xref target="principles"/> are fundamentally an
application of a security principle: namely the principle of least privilege
<xref target="LEAST-PRIVILEGE"/>.</t>
      <t>Lack of proper controls on intermediaries protocols has been the source of
significant security problems.  One key example is where protocols allow an
intermediary to consume, modify, or generate protocol units in ways that are
contrary to the interests of other protocol participants.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="PATTERNS">
        <front>
          <title>Design Patterns: Elements of Reusable Object-Oriented Software</title>
          <author initials="E." surname="Gamma" fullname="Erich Gamma">
            <organization/>
          </author>
          <author initials="R." surname="Helm" fullname="Richard Helm">
            <organization/>
          </author>
          <author initials="R." surname="Johnson" fullname="Ralph Johnson">
            <organization/>
          </author>
          <author initials="J." surname="Vlissides" fullname="John Vlissides">
            <organization/>
          </author>
          <date year="1994"/>
        </front>
      </reference>
      <reference anchor="E2E">
        <front>
          <title>End-to-end arguments in system design</title>
          <author fullname="J. H. Saltzer" initials="J." surname="Saltzer">
            <organization/>
          </author>
          <author fullname="D. P. Reed" initials="D." surname="Reed">
            <organization/>
          </author>
          <author fullname="D. D. Clark" initials="D." surname="Clark">
            <organization/>
          </author>
          <date month="November" year="1984"/>
        </front>
        <seriesInfo name="ACM Transactions on Computer Systems" value="Vol. 2, pp. 277-288"/>
        <seriesInfo name="DOI" value="10.1145/357401.357402"/>
      </reference>
      <reference anchor="RFC8155">
        <front>
          <title>Traversal Using Relays around NAT (TURN) Server Auto Discovery</title>
          <author fullname="P. Patil" initials="P." surname="Patil">
            <organization/>
          </author>
          <author fullname="T. Reddy" initials="T." surname="Reddy">
            <organization/>
          </author>
          <author fullname="D. Wing" initials="D." surname="Wing">
            <organization/>
          </author>
          <date month="April" year="2017"/>
          <abstract>
            <t>Current Traversal Using Relays around NAT (TURN) server discovery mechanisms are relatively static and limited to explicit configuration.  These are usually under the administrative control of the application or TURN service provider, and not the enterprise, ISP, or the network in which the client is located.  Enterprises and ISPs wishing to provide their own TURN servers need auto-discovery mechanisms that a TURN client could use with minimal or no configuration.  This document describes three such mechanisms for TURN server discovery.</t>
            <t>This document updates RFC 5766 to relax the requirement for mutual authentication in certain cases.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8155"/>
        <seriesInfo name="DOI" value="10.17487/RFC8155"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="DIAMETER">
        <front>
          <title>Diameter Base Protocol</title>
          <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo">
            <organization/>
          </author>
          <author fullname="J. Arkko" initials="J." surname="Arkko">
            <organization/>
          </author>
          <author fullname="J. Loughney" initials="J." surname="Loughney">
            <organization/>
          </author>
          <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn">
            <organization/>
          </author>
          <date month="October" year="2012"/>
          <abstract>
            <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations.  This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications.  The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6733"/>
        <seriesInfo name="DOI" value="10.17487/RFC6733"/>
      </reference>
      <reference anchor="RFC7754">
        <front>
          <title>Technical Considerations for Internet Service Blocking and Filtering</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="A. Cooper" initials="A." surname="Cooper">
            <organization/>
          </author>
          <author fullname="O. Kolkman" initials="O." surname="Kolkman">
            <organization/>
          </author>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="E. Nordmark" initials="E." surname="Nordmark">
            <organization/>
          </author>
          <date month="March" year="2016"/>
          <abstract>
            <t>The Internet is structured to be an open communications medium.  This openness is one of the key underpinnings of Internet innovation, but it can also allow communications that may be viewed as undesirable by certain parties.  Thus, as the Internet has grown, so have mechanisms to limit the extent and impact of abusive or objectionable communications.  Recently, there has been an increasing emphasis on "blocking" and "filtering", the active prevention of such communications.  This document examines several technical approaches to Internet blocking and filtering in terms of their alignment with the overall Internet architecture.  When it is possible to do so, the approach to blocking and filtering that is most coherent with the Internet architecture is to inform endpoints about potentially undesirable services, so that the communicants can avoid engaging in abusive or objectionable communications.  We observe that certain filtering and blocking approaches can cause unintended consequences to third parties, and we discuss the limits of efficacy of various approaches.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7754"/>
        <seriesInfo name="DOI" value="10.17487/RFC7754"/>
      </reference>
      <reference anchor="PARADOX">
        <front>
          <title>The Paradox of Participation Versus Misinformation: Social Media, Political Engagement, and the Spread of Misinformation</title>
          <author fullname="Sebastián Valenzuela" initials="S." surname="Valenzuela">
            <organization/>
          </author>
          <author fullname="Daniel Halpern" initials="D." surname="Halpern">
            <organization/>
          </author>
          <author fullname="James E. Katz" initials="J." surname="Katz">
            <organization/>
          </author>
          <author fullname="Juan Pablo Miranda" initials="J." surname="Miranda">
            <organization/>
          </author>
          <date month="June" year="2019"/>
        </front>
        <seriesInfo name="Digital Journalism" value="Vol. 7, pp. 802-823"/>
        <seriesInfo name="DOI" value="10.1080/21670811.2019.1623701"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="CLINIC">
        <front>
          <title>I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis</title>
          <author fullname="Brad Miller" initials="B." surname="Miller">
            <organization/>
          </author>
          <author fullname="Ling Huang" initials="L." surname="Huang">
            <organization/>
          </author>
          <author fullname="A. D. Joseph" initials="A." surname="Joseph">
            <organization/>
          </author>
          <author fullname="J. D. Tygar" initials="J." surname="Tygar">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Privacy Enhancing Technologies" value="pp. 143-163"/>
        <seriesInfo name="DOI" value="10.1007/978-3-319-08506-7_8"/>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="Roy T. Fielding">
            <organization>Adobe</organization>
          </author>
          <author fullname="Mark Nottingham">
            <organization>Fastly</organization>
          </author>
          <author fullname="Julian Reschke">
            <organization>greenbytes GmbH</organization>
          </author>
          <date day="12" month="September" year="2021"/>
          <abstract>
            <t>   The Hypertext Transfer Protocol (HTTP) is a stateless application-
   level protocol for distributed, collaborative, hypertext information
   systems.  This document describes the overall architecture of HTTP,
   establishes common terminology, and defines aspects of the protocol
   that are shared by all versions.  In this definition are core
   protocol elements, extensibility mechanisms, and the "http" and
   "https" Uniform Resource Identifier (URI) schemes.

   This document updates RFC 3864 and obsoletes RFC 2818, RFC 7231, RFC
   7232, RFC 7233, RFC 7235, RFC 7538, RFC 7615, RFC 7694, and portions
   of RFC 7230.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
      </reference>
      <reference anchor="EROSION">
        <front>
          <title>Erosion of the moral authority of transparent middleboxes</title>
          <author fullname="Joe Hildebrand">
	 </author>
          <author fullname="Patrick McManus">
	 </author>
          <date day="10" month="November" year="2014"/>
          <abstract>
            <t>   Many middleboxes on the Internet attempt to add value to the
   connections that traverse that point on the network.  Problems in
   their implementations erode the moral authority that otherwise might
   accrue to the legitimate value that they add.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-hildebrand-middlebox-erosion-01"/>
      </reference>
      <reference anchor="MIDDLEBOX">
        <front>
          <title>Middleboxes: Taxonomy and Issues</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter">
            <organization/>
          </author>
          <author fullname="S. Brim" initials="S." surname="Brim">
            <organization/>
          </author>
          <date month="February" year="2002"/>
          <abstract>
            <t>This document is intended as part of an IETF discussion about "middleboxes" - defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host.  This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify some preliminary conclusions.  It does not, however, claim to be definitive.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3234"/>
        <seriesInfo name="DOI" value="10.17487/RFC3234"/>
      </reference>
      <reference anchor="USE-IT">
        <front>
          <title>Long-Term Viability of Protocol Extension Mechanisms</title>
          <author fullname="M. Thomson" initials="M." surname="Thomson">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <date month="December" year="2021"/>
          <abstract>
            <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change.  This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9170"/>
        <seriesInfo name="DOI" value="10.17487/RFC9170"/>
      </reference>
      <reference anchor="TCP-EXTEND">
        <front>
          <title>Is it still possible to extend TCP?</title>
          <author fullname="Michio Honda" initials="M." surname="Honda">
            <organization/>
          </author>
          <author fullname="Yoshifumi Nishida" initials="Y." surname="Nishida">
            <organization/>
          </author>
          <author fullname="Costin Raiciu" initials="C." surname="Raiciu">
            <organization/>
          </author>
          <author fullname="Adam Greenhalgh" initials="A." surname="Greenhalgh">
            <organization/>
          </author>
          <author fullname="Mark Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="Hideyuki Tokuda" initials="H." surname="Tokuda">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
        <seriesInfo name="Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC" value="'11"/>
        <seriesInfo name="DOI" value="10.1145/2068816.2068834"/>
      </reference>
      <reference anchor="IPv6">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering">
            <organization/>
          </author>
          <author fullname="R. Hinden" initials="R." surname="Hinden">
            <organization/>
          </author>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="SRv6">
        <front>
          <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
            <organization/>
          </author>
          <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo">
            <organization/>
          </author>
          <author fullname="J. Leddy" initials="J." surname="Leddy">
            <organization/>
          </author>
          <author fullname="D. Voyer" initials="D." surname="Voyer">
            <organization/>
          </author>
          <author fullname="S. Matsushima" initials="S." surname="Matsushima">
            <organization/>
          </author>
          <author fullname="Z. Li" initials="Z." surname="Li">
            <organization/>
          </author>
          <date month="February" year="2021"/>
          <abstract>
            <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
            <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
            <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8986"/>
        <seriesInfo name="DOI" value="10.17487/RFC8986"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg">
            <organization/>
          </author>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
            <organization/>
          </author>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo">
            <organization/>
          </author>
          <author fullname="A. Johnston" initials="A." surname="Johnston">
            <organization/>
          </author>
          <author fullname="J. Peterson" initials="J." surname="Peterson">
            <organization/>
          </author>
          <author fullname="R. Sparks" initials="R." surname="Sparks">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="E. Schooler" initials="E." surname="Schooler">
            <organization/>
          </author>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC7092">
        <front>
          <title>A Taxonomy of Session Initiation Protocol (SIP) Back-to-Back User Agents</title>
          <author fullname="H. Kaplan" initials="H." surname="Kaplan">
            <organization/>
          </author>
          <author fullname="V. Pascual" initials="V." surname="Pascual">
            <organization/>
          </author>
          <date month="December" year="2013"/>
          <abstract>
            <t>In many SIP deployments, SIP entities exist in the SIP signaling path between the originating and final terminating endpoints, which go beyond the definition of a SIP proxy, performing functions not defined in Standards Track RFCs.  The only term for such devices provided in RFC 3261 is for a Back-to-Back User Agent (B2BUA), which is defined as the logical concatenation of a SIP User Agent Server (UAS) and User Agent Client (UAC).</t>
            <t>There are numerous types of SIP B2BUAs performing different roles in different ways; for example, IP Private Branch Exchanges (IPBXs), Session Border Controllers (SBCs), and Application Servers (ASs). This document identifies several common B2BUA roles in order to provide taxonomy other documents can use and reference.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7092"/>
        <seriesInfo name="DOI" value="10.17487/RFC7092"/>
      </reference>
      <reference anchor="TLS">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="PATH-SIGNALS">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie">
            <organization/>
          </author>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals.  For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear.  Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements.  In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels.  Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="QUIC">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="Jana Iyengar">
            <organization>Fastly</organization>
          </author>
          <author fullname="Martin Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="14" month="January" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration.  QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-quic-transport-34"/>
      </reference>
      <reference anchor="ECN">
        <front>
          <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
          <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan">
            <organization/>
          </author>
          <author fullname="S. Floyd" initials="S." surname="Floyd">
            <organization/>
          </author>
          <author fullname="D. Black" initials="D." surname="Black">
            <organization/>
          </author>
          <date month="September" year="2001"/>
          <abstract>
            <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3168"/>
        <seriesInfo name="DOI" value="10.17487/RFC3168"/>
      </reference>
      <reference anchor="ICMP">
        <front>
          <title>Internet Control Message Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="792"/>
        <seriesInfo name="DOI" value="10.17487/RFC0792"/>
      </reference>
      <reference anchor="RFC8404">
        <front>
          <title>Effects of Pervasive Encryption on Operators</title>
          <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
            <organization/>
          </author>
          <date month="July" year="2018"/>
          <abstract>
            <t>Pervasive monitoring attacks on the privacy of Internet users are of serious concern to both user and operator communities.  RFC 7258 discusses the critical need to protect users' privacy when developing IETF specifications and also recognizes that making networks unmanageable to mitigate pervasive monitoring is not an acceptable outcome: an appropriate balance is needed.  This document discusses current security and network operations as well as management practices that may be impacted by the shift to increased use of encryption to help guide protocol development in support of manageable and secure networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8404"/>
        <seriesInfo name="DOI" value="10.17487/RFC8404"/>
      </reference>
      <reference anchor="RFC8517">
        <front>
          <title>An Inventory of Transport-Centric Functions Provided by Middleboxes: An Operator Perspective</title>
          <author fullname="D. Dolson" initials="D." role="editor" surname="Dolson">
            <organization/>
          </author>
          <author fullname="J. Snellman" initials="J." surname="Snellman">
            <organization/>
          </author>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
            <organization/>
          </author>
          <author fullname="C. Jacquenet" initials="C." surname="Jacquenet">
            <organization/>
          </author>
          <date month="February" year="2019"/>
          <abstract>
            <t>This document summarizes an operator's perception of the benefits that may be provided by intermediary devices that execute functions beyond normal IP forwarding.  Such intermediary devices are often called "middleboxes".</t>
            <t>RFC 3234 defines a taxonomy of middleboxes and issues in the Internet.  Most of those middleboxes utilize or modify application- layer data.  This document primarily focuses on devices that observe and act on information carried in the transport layer, and especially information carried in TCP packets.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8517"/>
        <seriesInfo name="DOI" value="10.17487/RFC8517"/>
      </reference>
      <reference anchor="RFC9065">
        <front>
          <title>Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols</title>
          <author fullname="G. Fairhurst" initials="G." surname="Fairhurst">
            <organization/>
          </author>
          <author fullname="C. Perkins" initials="C." surname="Perkins">
            <organization/>
          </author>
          <date month="July" year="2021"/>
          <abstract>
            <t>To protect user data and privacy, Internet transport protocols have supported payload encryption and authentication for some time. Such encryption and authentication are now also starting to be applied to the transport protocol headers. This helps avoid transport protocol ossification by middleboxes, mitigate attacks against the transport protocol, and protect metadata about the communication. Current operational practice in some networks inspect transport header information within the network, but this is no longer possible when those transport headers are encrypted.</t>
            <t>This document discusses the possible impact when network traffic uses a protocol with an encrypted transport header. It suggests issues to consider when designing new transport protocols or features.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9065"/>
        <seriesInfo name="DOI" value="10.17487/RFC9065"/>
      </reference>
      <reference anchor="NS-IMPACT">
        <front>
          <title>Impact of TLS 1.3 to Operational Network Security Practices</title>
          <author fullname="Nancy Cam-Winget">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Eric Wang">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Roman Danyliw">
            <organization>Software Engineering Institute</organization>
          </author>
          <author fullname="Roelof DuToit">
            <organization>Broadcom</organization>
          </author>
          <date day="26" month="January" year="2021"/>
          <abstract>
            <t>   Network-based security solutions are used by enterprises, the public
   sector, internet-service providers, and cloud-service providers to
   both complement and enhance host-based security solutions.  As TLS is
   a widely deployed protocol to secure communication, these network-
   based security solutions must necessarily interact with it.  This
   document describes this interaction for current operational security
   practices and notes the impact of TLS 1.3 on them.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-ns-impact-04"/>
      </reference>
      <reference anchor="LEAST-PRIVILEGE">
        <front>
          <title>Protection and the control of information sharing in multics</title>
          <author fullname="Jerome H. Saltzer" initials="J." surname="Saltzer">
            <organization/>
          </author>
          <date month="July" year="1974"/>
        </front>
        <seriesInfo name="Communications of the ACM" value="Vol. 17, pp. 388-402"/>
        <seriesInfo name="DOI" value="10.1145/361011.361067"/>
      </reference>
      <reference anchor="RFC3552">
        <front>
          <title>Guidelines for Writing RFC Text on Security Considerations</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <author fullname="B. Korver" initials="B." surname="Korver">
            <organization/>
          </author>
          <date month="July" year="2003"/>
          <abstract>
            <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="72"/>
        <seriesInfo name="RFC" value="3552"/>
        <seriesInfo name="DOI" value="10.17487/RFC3552"/>
      </reference>
      <reference anchor="RFC3724">
        <front>
          <title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
          <author fullname="J. Kempf" initials="J." role="editor" surname="Kempf">
            <organization/>
          </author>
          <author fullname="R. Austein" initials="R." role="editor" surname="Austein">
            <organization/>
          </author>
          <author>
            <organization>IAB</organization>
          </author>
          <date month="March" year="2004"/>
          <abstract>
            <t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3724"/>
        <seriesInfo name="DOI" value="10.17487/RFC3724"/>
      </reference>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is merely an attempt to codify existing practice.  Practice that
is inspired, at least in part, by prior work, including <xref target="RFC3552"/> and
<xref target="RFC3724"/> which both advocate for clearer articulation of trust boundaries.</t>
      <t>Jari Arkko, Eric Rescorla, and David Schinazi are acknowledged for their
contributions of thought, review, and text.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
