<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.29 (Ruby 3.0.2) -->
<?rfc RFCedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-knodel-e2ee-definition-09" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="e2ee">Definition of End-to-end Encryption</title>
    <seriesInfo name="Internet-Draft" value="draft-knodel-e2ee-definition-09"/>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="O." surname="Kolkman" fullname="Olaf Kolkman">
      <organization>Internet Society</organization>
      <address>
        <email>kolkman@isoc.org</email>
      </address>
    </author>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <organization/>
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>
    <date year="2023" month="April" day="18"/>
    <area>sec</area>
    <workgroup>sec</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document provides a definition of end-to-end encryption (E2EE) rom both the perspective of a regular internet user as well as from the perspective of required properties for implementers.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>End-to-end encryption is an application of cryptography mechanisms and properties in communication systems between endpoints.  End-to- end encrypted systems are exceptional in providing both security and privacy properties through confidentiality, integrity and authenticity features for users.  Improvements to end-to-end encryption strive to maximize the user's security and privacy while balancing usability and availability.  Users of end-to-end encrypted communications expect trustworthy providers of secure implementations to respect and protect them.</t>
      <t>This document describes that end-to-end encryption MUST provide both security and privacy properties.  It provides a definition of which specific security and privacy properties end-to-end encryption should provide.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> {RFC8174}} when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="formal-definition-of-end-to-end-encryption">
      <name>Formal definition of end-to-end encryption</name>
      <t>End-to-end encryption, irrespective of the content or the specific methods employed, relies on two important and rigorous technical concepts: the end-to-end principle as defined in the IETF; and encryption, an application of cryptographic mechanisms and the primary means employed by the IETF to secure internet protocols and maintain the confidentiality of content delivered via these internet protocols. Where end-to-end encryption is comprised of these necessary constituent parts, a systems approach also defines their interplay. In the field of cryptography it is also possible to achieve a concise definition of end-to-end encrypted security.</t>
      <section anchor="end-point">
        <name>End point</name>
        <t>An "end" either sends messages or receives them, usually both. Other systems on the path are just that: other systems. Other systems MAY be used to facilitate the sending of messages between both "ends", but are not "ends" themselves.</t>
        <t>It is, however, not trivial to establish the definition of an end point in isolation. <xref target="hale"/> Depending on the context, an "end" may be a user; a device colocated with the user; or a set of devices controlled by a user that want to simultaneously participate in the conversation.</t>
      </section>
      <section anchor="end-to-end-principle">
        <name>End-to-end principle</name>
        <t>The end-to-end principle is a core architectural guideline of the Internet. <xref target="RFC3724"/></t>
        <t>The principle has evolved to an understanding that the "network's job is to transmit datagrams as efficiently and flexibly as possible", and the rest should be done at the ends.  <xref target="RFC1958"/> This principle can also be extended to the design of applications itself. <xref target="saltzer"/>{RFC3724}}<xref target="RFC3238"/></t>
      </section>
      <section anchor="encryption">
        <name>Encryption</name>
        <t>Encryption is the process of using cryptographic methods to convert plaintext to ciphertext that is decipherable only by authorized parties. Encryption can help extend the end-to-end principle in application design, where now (as before) the function of the network is limited to efficiently transporting messages, but additionally the network cannot access any part of the message itself.</t>
        <t>Encryption can be applied in an end-to-end context in many ways. For example, applications may use the double-ratchet algorithm (which uses an authenticated encryption scheme) and of an Authenticated Key Exchange (AKE). The usage of these algorithms (or variants of these) is present in many modern messenger applications such as those adopted in the IETF Messaging Layer Security working group, whose charter is to create a document that satisfies the need for several internet applications for group key establishment and message protection protocols <xref target="mls"/>. OpenPGP, mostly used for email, uses a different technique to achieve security and privacy. It is also chartered in the IETF to create a specification that covers object encryption, object signing, and identity certification <xref target="openpgp"/>. Both protocols rely on the use of asymmetric and symmetric encryption, and exchange long-term identity public keys amongst end points.</t>
      </section>
      <section anchor="concise-definition-of-end-to-end-encryption">
        <name>Concise definition of end-to-end encryption</name>
        <t>An end-to-end-encryption service provides confidentiality, integrity, and authenticity between ends. Another concise definition already exists for messaging: "End-to-end instant message encryption would conceal communications between one user's instant messaging application through any intermediate devices and servers all the way to the recipient's instant messaging application." <xref target="dkg"/></t>
        <t>Confidentiality is broken if content can be decrypted at any intermediate point.</t>
        <t>As for integrity and authenticity, permission of data manipulation or creation of pseudo-identities for third parties to allow access under the user's identity also violate end-to-end encryption. In other words, the application functions only for the end user and does not perform functions for any other entity coverly, nor overtly, say even if that entity claims to have obtained the consent of the end user. Thus, end point authenticity MUST be established as (sub-)identities of the end user, and end-to-end integrity MUST also be maintained by the system. There is considerable system design flexibility available in the mechanisms for authentication and integrity, specifically data authentication, that still meet this requirement.</t>
      </section>
    </section>
    <section anchor="end-to-end-encryption-implementations">
      <name>End-to-end encryption implementations</name>
      <t>When looking at implementations of end-to-end encryption from a design perspective, the first consideration is the list of fundamental features that distinguish an end-to-end encrypted system from one that does not employ end-to-end encryption. Secondly, one must consider the development goals for improving the features of end-to-end encryption, in other words, the challenges defined by the designers, developers and implementers of end-to-end encryption.</t>
      <t>The features and challenges listed below are framed comprehensively rather than from the perspective of their design, development, implementation or use.</t>
      <section anchor="properties">
        <name>Properties</name>
        <t>This section defines the security properties of an end-to-end encrypted system. The properties of end-to-end encryption from an implementation perspective can be split into two categories: 1) the required core properties of confidentiality, integrity and authenticity and 2) recommended additional properties for improved security, such as availability, deniability, forward secrecy, and post-compromise security, which are desirable enhancements.</t>
        <section anchor="necessary-properties">
          <name>Necessary properties</name>
          <dl>
            <dt>Confidentiality</dt>
            <dd>
              <t>A system provides message confidentiality if only the sender and intended recipient(s) can read the message plaintext, i.e. messages sent between participants can only be read by the agreed upon participants in the group and all participants share the identical group member list.</t>
            </dd>
            <dt>Integrity</dt>
            <dd>
              <t>A system provides message integrity when it guarantees that messages have not been modified in transit. If a message has been modified, it must be detected in a reliable way by the recipient.</t>
            </dd>
            <dt>Authentication</dt>
            <dd>
              <t>A system provides authentication if the recipient and sender attest to each other's identities in relation to the contents of their communications.</t>
            </dd>
          </dl>
        </section>
        <section anchor="optionaldesirable-properties-and-features">
          <name>Optional/desirable properties and features</name>
          <t>There is a set of optional/desirable features that a end-to-end system can provide. These properties can be related to the network, to the user interface or specialized variants of the previous features.</t>
          <dl>
            <dt>Availability</dt>
            <dd>
              <t>A system provides high availability if the user is able to access the contents of the message (decrypt them) when they so desire and potentially from more than one device. For example, a message can arrive to a recipient even after they have been offline for a long time. Note that applications that use this feature often implement a threshold for this property: number or aggregate size of messages; or messages from a month ago can be read by a user that has been offline, but not messages from a year ago.</t>
            </dd>
            <dt>Loss Resilience</dt>
            <dd>
              <t>If a message is permanently lost by the network, sender(s) and/or recipient(s) should still be able to communicate.</t>
            </dd>
            <dt>Deniability</dt>
            <dd>
              <t>Deniability ensures that anyone able to decrypt a record of the transcript, including message recipients, cannot cryptographically prove to others that a particular participant of a communication authored a specific message. As demonstrated by widely implemented protocols, this optional property must exist in conjunction with the necessary property of authentication, i.e. participants in a communication must be assured that they are communicating with the intended parties but this assurance cannot be transmitted to any other parties.</t>
            </dd>
            <dt>Forward secrecy</dt>
            <dd>
              <t>Forward secrecy is a security property that prevents attackers from decrypting encrypted data they have previously captured over a communication channel before the time of compromise, if the attacker compromises one of the endpoints. Forward secrecy is usually achieved by regularly deriving new encryption/decryption keys, and destroying old keys that are no longer required to encrypt or decrypt messages.</t>
            </dd>
          </dl>
          <t>Post-compromise security
Post-compromise security is a security property that seeks to guarantee future confidentiality and integrity in the face of a passive end-point compromise (and consequently that communication sent post-compromise is protected with the same security properties that existed before the compromise). It is usually achieved by adding new ephemeral key exchanges (new randomness) to the derivation of encryption/decryption keys every 'x' amount of time or after 'n' messages sent. Note that post-compromise security is not met in the face of active attackers that compromise an end-point. This property can add a level of complexity to a protocol as deriving new key material can be expensive, and, therefore, it has to be carefully evaluated as part of a system's design.</t>
          <dl>
            <dt>Metadata obfuscation</dt>
            <dd>
              <t>Digital communication inevitably generates data other than the content of the communication itself, such as IP addresses, group memberships, and date and time of messages. To enhance the privacy and security of end-to-end encryption, steps should be taken to minimize metadata. Additional steps should be taken to prevent leakage such as hiding users' IP addresses, reducing non-routing metadata, and avoiding extraneous message headers.</t>
            </dd>
            <dt>Disappearing messages</dt>
            <dd>
              <t>For confidential conversations, deleting one-by-one sensitive messages typically depends on a level of client-side security that is unsustainable. For example, endusers can still copy text or screenshot images outside the secured client application.  A certain level of trust among users of the system is required.  That said, features like "delete for me", "delete for everyone" or "disppearing messages" which is time based automated deletion of content do still provide a valuable defense amongst trusted parties in the event of a compromise of a device of one of the participants.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="challenges">
        <name>Challenges</name>
        <t>Below is a best effort list of the challenges currently faced by protocol designers of end-to-end encrypted systems. Problems that fall outside of this list are likely 1) unnecessary feature requests that negligibly, or do nothing to, achieve the aims of end-to-end encrypted systems, or are 2) in some way antithetical to the goals of end-to-end encrypted systems.</t>
        <ul spacing="normal">
          <li>Making messaging applications interoperable is an important goal for a healthy and user-centric internet ecosystem, however it requires careful design of protocols and systems, such as content type negotiation; provisions of global services, such as discovery; and a great deal of cooperation amongst implementers.</li>
          <li>Public key verification is very difficult for users to manage. Authentication of the two ends is required for secure and private conversations. Therefore, solving the problem of verification of public keys is a major concern for any end-to-end encrypted system design. Some applications bind together the account identity and the key, and leave users to establish a trust relationship between them, assisted by public key fingerprint information.</li>
          <li>Users want to smoothly switch application use between devices, but this comes at a cost to the security and privacy of the communication. Thus, there is a problem of availability in end-to-end encrypted systems because the account identity's private key is generated by and stored on the end-user's original device and to move the private key to another device can compromise the security of one of the end-points of the system (by opening the door to key-impersonation attacks, for example).</li>
          <li>Existing protocols are vulnerable to metadata analysis, even though metadata is often as sensitive as message content. Metadata is unencrypted (and often unencryptable) information that travels through the network and includes delivery-relevant details that servers require such as the account identity of end-points, timestamps, message size or more. Metadata is difficult to eliminate or obfuscate entirely.</li>
          <li>Confidential and secure communications systems should also maintain the privacy of users but this is necessarily balanced with authentication and is related to the metadata problem for account identity.</li>
          <li>Users need to communicate in groups, but this presents scalability problems for traditional end-to-end encryption systems. Message Layer Security protocol <xref target="mls"/> is a modern end-to-end encrypted message protocol that addresses this scalability concern.</li>
          <li>The whole communication should remain secure if only one message is compromised. However, for encrypted communication, in some schemes, you must currently choose between forward secrecy or the ability to fully communicate asynchronously. This presents a problem for application design that uses end-to-end encryption for asynchronous messaging over email, RCS, etc.</li>
          <li>Users of end-to-end encrypted systems should be able to communicate with any medium of their choice, such as text, audio, video, or miscellaneous files. However, there is often a resource problem because there are no open protocols to allow users to securely share the same resource in an end-to-end encrypted system.</li>
          <li>Usability, accessibility and internationalisation features often need careful design and implementation with respect to security and privacy, such as message read status, typing indicators, URL/link previews, third-party input/output applications.</li>
          <li>End user security tools like anti-virus plugins, spam filters, fraud protections are in conflict with the security and privacy considerations of the end-to-end application.</li>
          <li>Deployment is notoriously challenging for any software application where maintenance and updates can be particularly disastrous for obsolete cryptographic libraries.</li>
        </ul>
      </section>
    </section>
    <section anchor="end-user-expectations">
      <name>End-user expectations</name>
      <t>While the formal definition and properties of an end-to-end encrypted system relate to communication security and privacy, they do not draw from a comprehensive threat model or speak to what users expect from end-to-end encrypted communication. It is in this context that some designs and architectures of end-to-end encryption may ultimately run contrary to user expectations of end-to-end encrypted systems <xref target="GEC-EU"/>. Although some system designs do not directly violate "the math" of encryption algorithms, they do so by implicating and weakening other important aspects of an end-to-end encrypted <em>system</em>.</t>
      <section anchor="a-conversation-is-confidential">
        <name>A conversation is confidential</name>
        <t>Users talking to one another in an end-to-end encrypted system should be the only ones that know what they are talking about <xref target="RFC7624"/>. People have the right to data privacy as defined in international human rights law, and within the right to free expression and to hold opinions is inferred the right to whisper, whether or not they are using digital communications or walking through a field.</t>
      </section>
      <section anchor="providers-are-trustworthy">
        <name>Providers are trustworthy</name>
        <dl>
          <dt>Trustworthy</dt>
          <dd>
            <t>A system is completely trustworthy if and only if it is completely resilient, reliable, accountable, and secure in a way that consistently meets users’ expectations.</t>
          </dd>
        </dl>
        <t>This definition is complete in its positive and negative aspects: what it is, e.g. "Worthy of confidence" and what it is not, e.g. in RFC 7258: "behavior that subverts the intent of communicating parties without the agreement of those parties" <xref target="RFC7258"/>.</t>
        <t>Therefore, a trustworthy end-to-end encrypted communication system is the provider of the set of functions needed by two or more parties to communicate among each other in a confidential, authenticated and integrity-preserving fashion without any third party having access to the content of that communication where the functions that offer the confidentiality, integrity and authenticity-preservation are providing these services to only the participants whom all know who are in the conversation.</t>
      </section>
      <section anchor="access-by-a-third-party-is-impossible">
        <name>Access by a third-party is impossible</name>
        <t>No matter the specifics, any methods used to access to the content of the messages by a third party would violate a user's expectations of end-to-end encrypted messaging. "[T]hese access methods scan message contents on the user’s [device]", which are then "scanned for matches against a database of prohibited content before, and sometimes after, the message is sent to the recipient" <xref target="GEC-EU"/>. Third party access also covers cases without scanning -- namely, it should not be possible for any third-party end point, even those under the user's identity as per Section 2.1, to access the data regardless of reason.</t>
        <t>If a method makes secure and private communication, intended to be sent over an encrypted channel between end points, available to parties other than the sender and intended recipient(s), that method violates the understood expectation of that security property.</t>
      </section>
      <section anchor="the-software-of-the-end-to-end-encrypted-system-can-be-trusted">
        <name>The software of the end-to-end encrypted system can be trusted</name>
        <t>A way by which users can reduce the risk of their system containing a "backdoor" and confirm their system is performing in accordance to cryptographic protocols' specifications is using systems that are releasing their software as open source.  Open source software allows technical users to analyse the system and be assured of its functioning.  While most users will not be able to do so, as typical users lack the technological knowledge needed to analyse source code, technilogical communities can do so.  It is vital that systems provide public security analyses of their source code enabling reproducible builds and audits and investigations that can be published and peer reviewed.</t>
      </section>
      <section anchor="pattern-inference-is-minimised">
        <name>Pattern inference is minimised</name>
        <t>Analyses such as traffic fingerprinting or other (encrypted or unencrypted) data analysis techniques, outside of or as part of end-to-end encrypted system design, allow third parties to draw inferences from communication that was intended to be confidential. "By allowing private user data to be scanned via direct access by servers and their providers," the use of these methods should be considered an affront to "the privacy expectations of users of end-to-end encrypted communication systems" <xref target="GEC-EU"/>.</t>
        <t>Not only should an end-to-end encrypted system value user data privacy by not explicitly enabling pattern inference, it should actively be attempting to solve issues of metadata and traceability (enhanced metadata) through further innovation that stays ahead of advances in these techniques.</t>
      </section>
      <section anchor="the-end-to-end-encryption-is-not-compromised">
        <name>The end-to-end encryption is not compromised</name>
        <t>RFC 3552 talks about the Internet Threat model such as the assumption that the user can expect any communications systems, but perhaps especially end-to-end encrypted systems, to not be intentionally compromised <xref target="RFC3552"/>. Intentional compromises of end-to-end encryption are usually referred to as "backdoors" but are often presented as additional design features under terms like "key escrow" or "exceptional access". Users of end-to-end encryption would not expect a front, back or side door entrance into their confidential conversations and would expect a provider to actively resist -- technically and legally -- compromise through these means.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>From messaging to video conferencing, there are many competing features in an end-to-end encrypted implementation that is secure, private and usable. The most well designed system cannot meet the expectations of every user, nor does an ideal system exist from any dimension. End-to-end encryption is a technology that is constantly improving to achieve the ideal as defined in this document.</t>
      <t>Features and functionalities of end-to-end encryption should be developed and improved in service of end user expectations for privacy preserving communications.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Fred Baker, Stephen Farrell, Richard Barnes all contributed to the early strategic thinking of this document and whether it would be useful to the IETF community.</t>
      <t>The folks at Riseup and the LEAP Encryption Access Project have articulated brilliantly the hardest parts of end-to-end encryption systems that serve the end users' right to whisper.</t>
      <t>Ryan Polk at the Internet Society has energy to spare when it comes to organising meaningful contributions, like this one, for the technical advisors of the Global Encryption Coalition.</t>
      <t>Adrian Farrel, Eric Rescorla and Paul Wouters are acknowleded for their review, comments, or questions that lead to improvement of this document.</t>
      <t>Chelsea Komlo and Britta Hale have contributed their deep expertise and consice and rigourous writing to this draft.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not specify new protocols and therefore does not bring up technical security considerations.</t>
      <t>Because some policy decisions may affect the security of the internet, a clear and shared definition of end-to-end encryption is important in policy related discussions. This document aims to provide that clarity.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter">
            <organization/>
          </author>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3238">
        <front>
          <title>IAB Architectural and Policy Considerations for Open Pluggable Edge Services</title>
          <author fullname="S. Floyd" initials="S." surname="Floyd">
            <organization/>
          </author>
          <author fullname="L. Daigle" initials="L." surname="Daigle">
            <organization/>
          </author>
          <date month="January" year="2002"/>
          <abstract>
            <t>This document includes comments and recommendations by the IAB on some architectural and policy issues related to the chartering of Open Pluggable Edge Services (OPES) in the IETF.  OPES are services that would be deployed at application-level intermediaries in the network, for example, at a web proxy cache between the origin server and the client.  These intermediaries would transform or filter content, with the explicit consent of either the content provider or the end user. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3238"/>
        <seriesInfo name="DOI" value="10.17487/RFC3238"/>
      </reference>
      <reference anchor="RFC3724">
        <front>
          <title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
          <author fullname="J. Kempf" initials="J." role="editor" surname="Kempf">
            <organization/>
          </author>
          <author fullname="R. Austein" initials="R." role="editor" surname="Austein">
            <organization/>
          </author>
          <author>
            <organization>IAB</organization>
          </author>
          <date month="March" year="2004"/>
          <abstract>
            <t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3724"/>
        <seriesInfo name="DOI" value="10.17487/RFC3724"/>
      </reference>
      <reference anchor="RFC3552">
        <front>
          <title>Guidelines for Writing RFC Text on Security Considerations</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <author fullname="B. Korver" initials="B." surname="Korver">
            <organization/>
          </author>
          <date month="July" year="2003"/>
          <abstract>
            <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="72"/>
        <seriesInfo name="RFC" value="3552"/>
        <seriesInfo name="DOI" value="10.17487/RFC3552"/>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey">
            <organization/>
          </author>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="B. Schneier" initials="B." surname="Schneier">
            <organization/>
          </author>
          <author fullname="C. Jennings" initials="C." surname="Jennings">
            <organization/>
          </author>
          <author fullname="T. Hardie" initials="T." surname="Hardie">
            <organization/>
          </author>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <author fullname="C. Huitema" initials="C." surname="Huitema">
            <organization/>
          </author>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann">
            <organization/>
          </author>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3935">
        <front>
          <title>A Mission Statement for the IETF</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
            <organization/>
          </author>
          <date month="October" year="2004"/>
          <abstract>
            <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="95"/>
        <seriesInfo name="RFC" value="3935"/>
        <seriesInfo name="DOI" value="10.17487/RFC3935"/>
      </reference>
      <reference anchor="saltzer" target="https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">
        <front>
          <title>End-to-end arguments in system design</title>
          <author initials="J. H." surname="Saltzer, et al">
            <organization/>
          </author>
          <date year="1984"/>
        </front>
      </reference>
      <reference anchor="dkg" target="https://tools.ietf.org/html/draft-dkg-hrpc-glossary-00">
        <front>
          <title>Human Rights Protocol Considerations Glossary</title>
          <author initials="D." surname="Gillmor">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="mls" target="https://datatracker.ietf.org/doc/charter-ietf-mls">
        <front>
          <title>Messaging Layer Security</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="openpgp" target="https://datatracker.ietf.org/doc/charter-ietf-openpgp">
        <front>
          <title>Open Specification for Pretty Good Privacy</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="GEC-EU" target="https://www.globalencryption.org/2020/11/breaking-encryption-myths/">
        <front>
          <title>Breaking encryption myths: What the European Commission’s leaked report got wrong about online security</title>
          <author initials="" surname="Global Encryption Coaliation">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="hale">
        <front>
          <title>On End-to-End Encryption</title>
          <author>
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
