| rfc8890xml2.original.xml | rfc8890.xml | |||
|---|---|---|---|---|
| <?xml version="1.0" encoding="UTF-8"?> | <?xml version='1.0' encoding='utf-8'?> | |||
| <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 --> | <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 --> | |||
| <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | |||
| <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" | |||
| docName="draft-iab-for-the-users-04" number="0000" submissionType="IAB" | docName="draft-iab-for-the-users-04" number="8890" submissionType="IAB" | |||
| category="info" consensus="true" obsoletes="" updates="" xml:lang="en" | category="info" consensus="true" obsoletes="" updates="" xml:lang="en" | |||
| tocInclude="true" sortRefs="true" symRefs="true" version="3"> | tocInclude="true" sortRefs="true" symRefs="true" version="3"> | |||
| <!-- xml2rfc v2v3 conversion 2.34.0 --> | <!-- xml2rfc v2v3 conversion 2.34.0 --> | |||
| <front> | <front> | |||
| <title>The Internet is for End Users</title> | <title>The Internet is for End Users</title> | |||
| <seriesInfo name="RFC" value="0000"/> | <seriesInfo name="RFC" value="8890"/> | |||
| <author initials="M." surname="Nottingham" fullname="Mark Nottingham"> | <author initials="M." surname="Nottingham" fullname="Mark Nottingham"> | |||
| <organization/> | <organization/> | |||
| <address> | <address> | |||
| <postal> | ||||
| <city>Prahran</city><region>VIC</region> | ||||
| <country>Australia</country> | ||||
| </postal> | ||||
| <email>mnot@mnot.net</email> | <email>mnot@mnot.net</email> | |||
| <uri>https://www.mnot.net/</uri> | <uri>https://www.mnot.net/</uri> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date year="2020" month="May"/> | ||||
| <workgroup>Internet Architecture Board (IAB)</workgroup> | <date year="2020" month="August"/> | |||
| <keyword>stakeholder</keyword> | <keyword>stakeholder</keyword> | |||
| <abstract> | <abstract> | |||
| <t>This document explains why the IAB believes that, when there is a | <t>This document explains why the IAB believes that, when there is a | |||
| conflict between the interests of end users of the Internet and other | conflict between the interests of end users of the Internet and other | |||
| parties, IETF decisions should favour end users. It also explores how | parties, IETF decisions should favor end users. It also explores how | |||
| this can more effectively be achieved.</t> | the IETF can more effectively achieve this.</t> | |||
| </abstract> | </abstract> | |||
| <note> | ||||
| <name>Note to Readers</name> | ||||
| <t>The issues list for this draft can be found at <eref | ||||
| target="https://github.com/intarchboard/for-the-users/issues">https://gith | ||||
| ub.com/intarchboard/for-the-users/issues</eref>.</t> | ||||
| <t>The most recent (often, unpublished) draft is at <eref | ||||
| target="https://intarchboard.github.io/for-the-users/">https://intarchboar | ||||
| d.github.io/for-the-users/</eref>.</t> | ||||
| <t>Recent changes are listed at <eref | ||||
| target="https://github.com/intarchboard/for-the-users/commits/master">http | ||||
| s://github.com/intarchboard/for-the-users/commits/master</eref>.</t> | ||||
| <t>See also the draft's current status in the IETF datatracker, at | ||||
| <eref | ||||
| target="https://datatracker.ietf.org/doc/draft-iab-for-the-users/">https://d | ||||
| atatracker.ietf.org/doc/draft-iab-for-the-users/</eref>.</t> | ||||
| </note> | ||||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <section anchor="introduction" numbered="true" toc="default"> | <section anchor="introduction" numbered="true" toc="default"> | |||
| <name>Introduction</name> | <name>Introduction</name> | |||
| <t>Many who participate in the IETF are most comfortable making what we | <t>Many who participate in the IETF are most comfortable making what we | |||
| believe to be purely technical decisions; our process is defined to | believe to be purely technical decisions; our process | |||
| favor technical merit, through our well-known mantra of "rough consensus | favors technical merit through our well-known mantra of "rough consensus | |||
| and running code."</t> | and running code."</t> | |||
| <t>Nevertheless, the running code that results from our process (when | <t>Nevertheless, the running code that results from our process (when | |||
| things work well) inevitably has an impact beyond technical | things work well) inevitably has an impact beyond technical | |||
| considerations, because the underlying decisions afford some uses while | considerations, because the underlying decisions afford some uses while | |||
| discouraging others. While we believe we are making only technical | discouraging others. While we believe we are making only technical | |||
| decisions, in reality, we are defining (in some degree) what is possible | decisions, in reality, we are defining (in some degree) what is possible | |||
| on the Internet itself.</t> | on the Internet itself.</t> | |||
| <t>This impact has become significant. As the Internet increasingly | <t>This impact has become significant. As the Internet increasingly | |||
| mediates essential functions in societies, it has unavoidably become | mediates essential functions in societies, it has unavoidably become | |||
| profoundly political; it has helped people overthrow governments and | profoundly political; it has helped people overthrow governments, | |||
| revolutionize social orders, swing elections, control populations, | revolutionize social orders, swing elections, control populations, | |||
| collect data about individuals, and reveal secrets. It has created | collect data about individuals, and reveal secrets. It has created | |||
| wealth for some individuals and companies while destroying others'.</t> | wealth for some individuals and companies while destroying that of others. </t> | |||
| <t>All of this raises the question: For whom do we go through the pain | <t>All of this raises the question: For whom do we go through the pain | |||
| of gathering rough consensus and writing running code?</t> | of gathering rough consensus and writing running code?</t> | |||
| <t>After all, there are a variety of parties that standards can benefit, s | <t>After all, there are a variety of parties that standards can benefit, | |||
| uch as (but not limited to) end users, network operators, schools, equipment ven | such as (but not limited to) end users, network operators, schools, | |||
| dors, specification authors, specification implementers, content owners, governm | equipment vendors, specification authors, specification implementers, | |||
| ents, non-governmental organisations, social movements, employers, and parents.< | content owners, governments, nongovernmental organizations, social | |||
| /t> | movements, employers, and parents.</t> | |||
| <t>Successful specifications will provide some benefit to all of the relev | <t>Successful specifications will provide some benefit to all the | |||
| ant parties because standards do not represent a zero-sum game. However, there a | relevant parties because standards do not represent a zero-sum | |||
| re sometimes situations where there is a conflict between the needs of two (or m | game. However, there are sometimes situations where there is a conflict | |||
| ore) parties.</t> | between the needs of two (or more) parties.</t> | |||
| <t>In these situations, when one of those parties is an "end user" of the | <t>In these situations, when one of those parties is an "end user" of | |||
| Internet - for example, a person using a Web browser, mail client, or another ag | the Internet -- for example, a person using a web browser, mail client, | |||
| ent that connects to the Internet - the Internet Architecture Board argues that | or another agent that connects to the Internet -- the Internet | |||
| the IETF should favor their interests over those of other parties.</t> | Architecture Board argues that the IETF should favor their interests | |||
| <t><xref target="who" format="default"/> explains what is meant by "end us | over those of other parties.</t> | |||
| ers"; <xref target="why" format="default"/> outlines why IETF work should priori | <t><xref target="who" format="default"/> explains what is meant by "end | |||
| tise them, and <xref target="how" format="default"/> describes how we can do tha | users", <xref target="why" format="default"/> outlines why IETF work | |||
| t.</t> | should prioritize them, and <xref target="how" format="default"/> | |||
| describes how we can do that.</t> | ||||
| </section> | </section> | |||
| <section anchor="who" numbered="true" toc="default"> | <section anchor="who" numbered="true" toc="default"> | |||
| <name>Who Are "End Users"?</name> | <name>Who Are "End Users"?</name> | |||
| <t>In this document, "end users," means human users whose activities IETF | <t>In this document, "end users" means human users whose activities | |||
| standards as a whole are designed to support, sometimes indirectly. Thus, the en | IETF standards support, sometimes | |||
| d user of a protocol to manage routers is not a router administrator; it is the | indirectly. Thus, the end user of a protocol to manage routers is not a | |||
| people using the network that the router operates within.</t> | router administrator; it is the people using the network that the router | |||
| <t>End users are not necessarily a homogenous group; they might have diffe | operates within.</t> | |||
| rent views of how the Internet should work, and might occupy several roles, such | <t>End users are not necessarily a homogenous group; they might have | |||
| as a seller, buyer, publisher, reader, service provider and consumer. An end us | different views of how the Internet should work and might occupy | |||
| er might be browsing the Web, monitoring remote equipment, playing a game, video | several roles, such as a seller, buyer, publisher, reader, service | |||
| conferencing with colleagues, sending messages to friends, or performing an ope | provider, and consumer. An end user might browse the Web, monitor | |||
| ration in a remote surgery theatre. They might be "at the keyboard", or represen | remote equipment, play a game, videoconference with colleagues, | |||
| ted by software indirectly (e.g., as a daemon).</t> | send messages to friends, or perform an operation in a remote | |||
| <t>Likewise, an individual end user might have many interests (e.g., priva | surgery theater. They might be "at the keyboard" or represented by | |||
| cy, security, flexibility, reachability) that are sometimes in tension.</t> | software indirectly (e.g., as a daemon).</t> | |||
| <t>A person whose interests we need to consider might not directly be usin | <t>Likewise, an individual end user might have many interests (e.g., | |||
| g a specific system connected to the Internet. For example, if a child is using | privacy, security, flexibility, reachability) that are sometimes in | |||
| a browser, the interests of that child's parents or guardians may be relevant. A | tension.</t> | |||
| person pictured in a photograph may have an interest in systems that process th | <t>A person whose interests we need to consider might not directly be | |||
| at photograph; a person entering a room with sensors that send data to the Inter | using a specific system connected to the Internet. For example, if a | |||
| net has interests that may be involved in our deliberations about how those sens | child is using a browser, the interests of that child's parents or | |||
| or readings are handled.</t> | guardians may be relevant. A person pictured in a photograph may have an | |||
| <t>While such less-direct interactions between people and the Internet may | interest in systems that process that photograph; a person entering a | |||
| be harder to evaluate, this document's concept of end-user nonetheless includes | room with sensors that send data to the Internet may have interests that m | |||
| such people.</t> | ay | |||
| be involved in our deliberations about how those sensor readings are | ||||
| handled.</t> | ||||
| <t>While such less-direct interactions between people and the Internet | ||||
| may be harder to evaluate, this document's concept of "end user" | ||||
| nonetheless includes such people.</t> | ||||
| </section> | </section> | |||
| <section anchor="why" numbered="true" toc="default"> | <section anchor="why" numbered="true" toc="default"> | |||
| <name>Why The IETF Should Prioritise End Users</name> | <name>Why the IETF Should Prioritize End Users</name> | |||
| <t>Even before the IETF was established, the Internet technical community | <t>Even before the IETF was established, the Internet technical | |||
| has focused on user needs since at least <xref target="RFC0001" format="default" | community has focused on user needs since at least <xref | |||
| />, which stated that "One of our goals must be to stimulate the immediate and e | target="RFC0001" format="default"/>, which stated that "One of our goals | |||
| asy use by a wide class of users."</t> | must be to stimulate the immediate and easy use by a wide class of | |||
| <t>And, while we specialise in technical matters, the IETF is not | users."</t> | |||
| <t>And, while we specialize in technical matters, the IETF is not | ||||
| neutral about the purpose of its work in developing the Internet; in "A | neutral about the purpose of its work in developing the Internet; in "A | |||
| Mission Statement for the IETF" <xref target="RFC3935" | Mission Statement for the IETF" <xref target="RFC3935" | |||
| format="default"/>, the definitions include:</t> | format="default"/>, the definitions include:</t> | |||
| <blockquote>The IETF community wants the Internet to succeed because we | <blockquote>The IETF community wants the Internet to succeed because we | |||
| believe that the existence of the Internet, and its influence on economics, | believe that the existence of the Internet, and its influence on economics, | |||
| communication, and education, will help us to build a better human | communication, and education, will help us to build a better human | |||
| society.</blockquote> | society.</blockquote> | |||
| <t>Later in <xref target="RFC3935" sectionFormat="of" section="2.1"/>, | <t>Later, in "The Scope of the Internet" (<xref target="RFC3935" sectionFo | |||
| "The Scope of the Internet" it says:</t> | rmat="of" section="4.1"/>), | |||
| it says:</t> | ||||
| <blockquote>The Internet isn't value-neutral, and neither is the IETF. We want | <blockquote>The Internet isn't value-neutral, and neither is the IETF. We want | |||
| the Internet to be useful for communities that share our commitment to | the Internet to be useful for communities that share our commitment to | |||
| openness and fairness. We embrace technical concepts such as decentralized | openness and fairness. We embrace technical concepts such as decentralized | |||
| control, edge-user empowerment and sharing of resources, because those | control, edge-user empowerment and sharing of resources, because those | |||
| concepts resonate with the core values of the IETF community. These concepts | concepts resonate with the core values of the IETF community. These concepts | |||
| have little to do with the technology that's possible, and much to do with the | have little to do with the technology that's possible, and much to do with the | |||
| technology that we choose to create.</blockquote> | technology that we choose to create.</blockquote> | |||
| <t>In other words, the IETF develops and maintains | ||||
| <t>In other words, the IETF is concerned with developing and maintaining t | the Internet to promote the social good. The society that the IETF | |||
| he Internet to promote the social good, and the society that the IETF is attempt | is attempting to enhance is composed of end users, along with groups of | |||
| ing to enhance is composed of end users, along with groups of them forming busin | them forming businesses, governments, clubs, civil society | |||
| esses, governments, clubs, civil society organizations, and other institutions.< | organizations, and other institutions.</t> | |||
| /t> | <t>Merely advancing the measurable success of the Internet (e.g., | |||
| <t>Merely advancing the measurable success of the Internet (e.g., deployme | deployment size, bandwidth, latency, number of users) is not an adequate | |||
| nt size, bandwidth, latency, number of users) is not an adequate goal; doing so | goal; doing so ignores how technology is so often used as a lever to | |||
| ignores how technology is so often used as a lever to assert power over users, r | assert power over users, rather than empower them.</t> | |||
| ather than empower them.</t> | <t>Beyond fulfilling the IETF's mission, prioritizing end users can also | |||
| <t>Beyond fulfilling the IETF's mission, prioritising end users can also h | help to ensure the long-term health of the Internet and the IETF's | |||
| elp to ensure the long-term health of the Internet and the IETF's relevance to i | relevance to it. Perceptions of capture by vendors or other providers | |||
| t. Perceptions of capture by vendors or other providers harm both; the IETF's wo | harm both; the IETF's work will (deservedly) lose end users' trust if it | |||
| rk will (deservedly) lose end users' trust if it prioritises (or is perceived to | prioritizes (or is perceived to prioritize) others' interests over | |||
| prioritise) others' interests over them.</t> | them.</t> | |||
| <t>Ultimately, the Internet will succeed or fail based upon the actions of | <t>Ultimately, the Internet will succeed or fail based upon the actions | |||
| its end users, because they are the driving force behind its growth to date. No | of its end users, because they are the driving force behind its growth | |||
| t prioritising them jeopardizes the network effect which the Internet relies upo | to date. Not prioritizing them jeopardizes the network effect that the | |||
| n to provide so much value.</t> | Internet relies upon to provide so much value.</t> | |||
| </section> | </section> | |||
| <section anchor="how" numbered="true" toc="default"> | <section anchor="how" numbered="true" toc="default"> | |||
| <name>How The IETF Can Prioritise End Users</name> | <name>How the IETF Can Prioritize End Users</name> | |||
| <t>There are a few ways that the IAB believes the IETF community can prior | <t>There are a few ways that the IAB believes the IETF community can | |||
| itise end users, based upon our observations. By its nature, this is not a compl | prioritize end users, based upon our observations. This | |||
| ete list.</t> | is not a complete list.</t> | |||
| <section anchor="engaging-the-internet-community" numbered="true" toc="def ault"> | <section anchor="engaging-the-internet-community" numbered="true" toc="def ault"> | |||
| <name>Engaging the Internet Community</name> | <name>Engaging the Internet Community</name> | |||
| <t>The IETF community does not have any unique insight into what is "goo | <t>The IETF community does not have any unique insight into what is | |||
| d for end users," and it is not uncommon for us to be at a further disadvantage | "good for end users", and it is not uncommon for us to be at a further | |||
| because of our close understanding of some - but not all - aspects of the Intern | disadvantage because of our close understanding of some -- but not all | |||
| et.</t> | -- aspects of the Internet.</t> | |||
| <t>At the same time, we do have a culture of considerable deference to a | <t>At the same time, we have a culture of considerable deference to | |||
| broader "Internet community" - roughly, what this document calls end users - in | a broader "Internet community" -- roughly what this document calls end | |||
| our decision-making processes. Mere deference, however, is not adequate; even w | users -- in our decision-making processes. Mere deference, however, is | |||
| ith the best intentions, we cannot assume that our experiences of the Internet a | not adequate; even with the best intentions, we cannot assume that our | |||
| re those of all of its end users, or that our decisions have a positive impact u | experiences of the Internet are those of all of its end users or that | |||
| pon them.</t> | our decisions have a positive impact upon them.</t> | |||
| <t>Therefore, we have not only a responsibility to analyse and consider | <t>Therefore, we have not only a responsibility to analyze and | |||
| the impacts of the IETF's work, but also a responsibility to consult with that g | consider the impacts of the IETF's work, but also a responsibility to | |||
| reater Internet community. In particular, we should do so when one of our decisi | consult with that greater Internet community. In particular, we should | |||
| ons has potential impact upon end users.</t> | do so when one of our decisions has a potential impact upon end | |||
| <t>The IETF community faces significant hurdles in doing so. Our work is | users.</t> | |||
| specialised and often esoteric, and processes for developing standards often in | <t>The IETF community faces significant hurdles in doing so. Our work | |||
| volve very long timescales. Affected parties are rarely technical experts, and t | is specialized and often esoteric, and processes for developing | |||
| heir experience of the Internet is often based upon incomplete (and sometimes in | standards often involve very long timescales. Affected parties are | |||
| accurate) models. Often, even when we try to engage a broader audience, their pa | rarely technical experts, and they often base their understanding of the | |||
| rticipation is minimal - until a change affects someone in a way they don't like | Internet | |||
| . Surprising the Internet community is rarely a good outcome.</t> | upon incomplete (and sometimes inaccurate) models. Often, | |||
| <t>Government-sponsored individuals sometimes participate in the IETF co | even when we try to engage a broader audience, their participation is | |||
| mmunity. While this is welcome, it should not be taken as automatically represen | minimal -- until a change affects someone in a way they don't | |||
| tative of end users elsewhere, or even all end users in the relevant jurisdictio | like. Surprising the Internet community is rarely a good outcome.</t> | |||
| n. Furthermore, what is desirable in one jurisdiction (or at least to its admini | <t>Government-sponsored individuals sometimes participate in the IETF | |||
| strators) might be detrimental in others (see <xref target="conflict" format="de | community. While this is welcome, it should not be taken as | |||
| fault"/>).</t> | automatically representative of end users elsewhere, or even all end | |||
| <t>While some civil society organisations specialise in technology and I | users in the relevant jurisdiction. Furthermore, what is desirable in | |||
| nternet policy, they typically do not have the capacity to participate broadly, | one jurisdiction (or at least to its administrators) might be | |||
| nor are they necessarily representative of the larger Internet community. Nevert | detrimental in others (see <xref target="conflict" | |||
| heless, their understanding of end user needs is often profound, and they are in | format="default"/>).</t> | |||
| many ways the best informed advocates for end user concerns; they should be con | <t>While some civil society organizations specialize in technology and | |||
| sidered a primary channel for engaging the broader Internet community.</t> | Internet policy, they rarely can | |||
| <t>A promising approach to help fill these gaps is to identify and engag | participate broadly, nor are they necessarily representative of the | |||
| e with specifically affected communities when making decisions that might affect | larger Internet community. Nevertheless, their understanding of | |||
| them; for example, one or more industry associations, user groups, or a set of | end-user needs is often profound, and they are in many ways the | |||
| individuals, though we can't of course formally ensure that they are appropriate | best-informed advocates for end-user concerns; they should be | |||
| ly representative.</t> | considered a primary channel for engaging the broader Internet | |||
| <t>In doing so, we should not require them to "come to us"; unless a st | community.</t> | |||
| akeholder community is already engaged in the IETF process effectively, the IETF | <t>A promising approach to help fill these gaps is to identify and | |||
| community should explore how to meet with them on their terms - taking the init | engage with specifically affected communities when making decisions | |||
| iative to contact them, explain our work, and solicit their feedback.</t> | that might affect them, for example, one or more industry | |||
| <t>In particular, while IAB workshops, BoFs and Bar BoFs can be an effec | associations, user groups, or a set of individuals, though we can't | |||
| tive mechanism to gather input within our community, they often do not have the | formally ensure that they are appropriately representative.</t> | |||
| visibility in other communities that is required to solicit input, much less eff | <t>In doing so, we should not require them to "come to us"; unless a | |||
| ective participation.</t> | stakeholder community is already engaged in the IETF process | |||
| <t>Instead, an event like a workshop may be more effective if co-located | effectively, the IETF community should explore how to meet with them | |||
| with - and ideally hosted or co-hosted by - a forum that's familiar to that sta | on their terms -- take the initiative to contact them, explain our | |||
| keholder community. We should also take the opportunity to raise the visibility | work, and solicit their feedback.</t> | |||
| of IETF work (or potential IETF work) in such fora through conference talks, pan | <t>In particular, while IAB workshops, BOFs, and Bar BOFs can be an | |||
| els, newsletter articles, etc.</t> | effective mechanism to gather input within our community, they rarely | |||
| <t>For example, the IAB held the ESCAPE workshop <xref target="RFC8752" | have the visibility into other communities that is required to | |||
| format="default"/> to solicit input from Internet publishers and advertisers tha | solicit input, much less effective participation.</t> | |||
| t might be affected by a proposal for new work in the IETF. While the workshop w | <t>Instead, an event like a workshop may be more effective if | |||
| as considered successful, participation might have been improved by identifying | co-located with -- and ideally hosted or co-hosted by -- a forum that's | |||
| an appropriate industry forum and working with them to host the event.</t> | familiar to that stakeholder community. We should also | |||
| <t>When we engage with the Internet community, we should also clearly id | raise the visibility of IETF work (or potential IETF | |||
| entify tailored feedback mechanisms (e.g., subscribing to a mailing list may not | work) in such fora through conference talks, panels, newsletter | |||
| be appropriate), and assure that they are well-known in those communities.</t> | articles, etc.</t> | |||
| <t>The Internet Society can be an invaluable partner in these efforts; t | <t>For example, the IAB ESCAPE workshop <xref | |||
| heir focus on the Internet community, policy expertise and resources can help to | target="RFC8752" format="default"/> solicited input from Internet | |||
| facilitate discussions with the appropriate parties.</t> | publishers and advertisers about a proposal that might affect them. | |||
| <t>Finally, we should remember that the RFC series are Requests For Comm | While the workshop was considered successful, | |||
| ents; if there are serious implications of our work, we should document them and | participation might have been improved by identifying an appropriate | |||
| ask for feedback from the Internet Community.</t> | industry forum and working with them to host the event.</t> | |||
| <t>When we engage with the Internet community, we should also clearly | ||||
| identify tailored feedback mechanisms (e.g., subscribing to a mailing | ||||
| list may not be appropriate) and assure that they are well known in | ||||
| those communities.</t> | ||||
| <t>The Internet Society can be an invaluable partner in these efforts; | ||||
| their focus on the Internet community, policy expertise, and resources | ||||
| can help to facilitate discussions with the appropriate parties.</t> | ||||
| <t>Finally, we should remember that the RFC Series contains Requests For | ||||
| Comments; if there are serious implications of our work, we should | ||||
| document them and ask for feedback from the Internet community.</t> | ||||
| </section> | </section> | |||
| <section anchor="creating-user-focused-systems" numbered="true" toc="defau lt"> | <section anchor="creating-user-focused-systems" numbered="true" toc="defau lt"> | |||
| <name>Creating User-Focused Systems</name> | <name>Creating User-Focused Systems</name> | |||
| <t>We should pay particular attention to the kinds of architectures we c | <t>We should pay particular attention to the kinds of architectures we | |||
| reate, and whether they encourage or discourage an Internet that works for end u | create and whether they encourage or discourage an Internet that | |||
| sers.</t> | works for end users.</t> | |||
| <t>For example, one of the most successful Internet applications is the | <t>For example, one of the most successful Internet applications is | |||
| Web, which uses the HTTP application protocol. One of HTTP's key implementation | the Web, which uses the HTTP application protocol. One of HTTP's key | |||
| roles is that of the Web browser - called the "user agent" in <xref target="RFC7 | implementation roles is that of the web browser -- called the "user | |||
| 230" format="default"/> and other specifications.</t> | agent" in <xref target="RFC7230" format="default"/> and other | |||
| <t>User agents act as intermediaries between a service and the end user; | specifications.</t> | |||
| rather than downloading an executable program from a service that has arbitrary | <t>User agents act as intermediaries between a service and the end | |||
| access into the users' system, the user agent only allows limited access to dis | user; rather than downloading an executable program from a service | |||
| play content and run code in a sandboxed environment. Of course, end users are d | that has arbitrary access into the users' system, the user agent only | |||
| iverse and the ability of a limited number of user agents to properly represent | allows limited access to display content and run code in a sandboxed | |||
| individual interests is imperfect, but this arrangement is an improvement over t | environment. End users are diverse and the ability of a few user | |||
| he alternative - the need to completely trust a Web site with all information on | agents to represent individual interests properly is imperfect, but | |||
| your system to browse it.</t> | this arrangement is an improvement over the alternative -- the need to | |||
| <t>Defining the user agent role in standards also creates a virtuous cyc | trust a website completely with all information on your system to | |||
| le; it allows multiple implementations, thereby allowing end users to switch bet | browse it.</t> | |||
| ween them with relatively low costs (although there are concerns about the compl | <t>Defining the user agent role in standards also creates a virtuous | |||
| exity of the Web creating barriers to entry for new implementations). This creat | cycle; it allows multiple implementations, allowing end users | |||
| es an incentive for implementers to carefully consider the users' needs, which o | to switch between them with relatively low costs (although there are | |||
| ften are reflected back into the defining standards. The resulting ecosystem has | concerns about the complexity of the Web creating barriers to entry | |||
| many remaining problems, but a distinguished user agent role provides an opport | for new implementations). This creates an incentive for implementers | |||
| unity to improve it.</t> | to consider the users' needs carefully, which are often reflected into | |||
| <t>In contrast, the Internet of Things (IoT) has not yet seen the broad | the defining standards. The resulting ecosystem has many | |||
| adoption of a similar role; many current systems require opaque, vendor-specific | remaining problems, but a distinguished user agent role provides an | |||
| software or hardware for the user-facing component. Perhaps as a result of this | opportunity to improve it.</t> | |||
| , that ecosystem and its end users face serious challenges.</t> | <t>In contrast, the Internet of Things (IoT) has not yet seen the | |||
| broad adoption of a similar role; many current systems require opaque, | ||||
| vendor-specific software or hardware for the user-facing | ||||
| component. Perhaps as a result of this, that ecosystem and its end | ||||
| users face serious challenges.</t> | ||||
| </section> | </section> | |||
| <section anchor="identifying-negative-end-user-impact" numbered="true" toc ="default"> | <section anchor="identifying-negative-end-user-impact" numbered="true" toc ="default"> | |||
| <name>Identifying Negative End User Impact</name> | <name>Identifying Negative End-User Impact</name> | |||
| <t>At its best, our work will unambiguously build a better human society | <t>At its best, our work will unambiguously build a better human | |||
| . In some cases, we will consciously decide to be neutral and open-ended, allowi | society. Sometimes, we will consciously be neutral and | |||
| ng the "tussle" among stakeholders to produce a range of results (see <xref targ | open-ended, allowing the "tussle" among stakeholders to produce a | |||
| et="TUSSLE" format="default"/> for further discussion).</t> | range of results (see <xref target="TUSSLE" format="default"/> for | |||
| <t>At the very least, however, we must examine our work for negative imp | further discussion).</t> | |||
| act on end users, and take steps to mitigate it where encountered. In particular | <t>At the very least, however, we must examine our work for negative | |||
| , when we've identified a conflict between the interests of end users and other | impact on end users and take steps to mitigate it where | |||
| stakeholders, we should err on the side of protecting end users.</t> | encountered. In particular, when we've identified a conflict between | |||
| <t>Note that "negative impact on end users" is not defined in this docum | the interests of end users and other stakeholders, we should err on | |||
| ent; that is something that the relevant body (e.g., Working Group) needs to dis | the side of protecting end users.</t> | |||
| cuss and come to consensus on. Merely asserting that something is harmful is not | <t>Note that "negative impact on end users" is not defined in this | |||
| adequate. The converse is also true, though; it's not good practice to avoid id | document; that is something that the relevant body (e.g., working | |||
| entifying harms, nor is it acceptable to ignore them when brought to our attenti | group) needs to discuss and come to consensus on. Merely asserting | |||
| on.</t> | that something is harmful is not adequate. The converse is also true, | |||
| <t>The IAB and IETF have already established a body of guidance for situ | though; it's not good practice to avoid identifying harms, nor is it | |||
| ations where this sort of conflict is common, including (but not limited to) <xr | acceptable to ignore them when brought to our attention.</t> | |||
| ef target="RFC7754" format="default"/> on filtering, <xref target="RFC7258" form | <t>The IAB and IETF have already established a body of guidance for | |||
| at="default"/> and <xref target="RFC7624" format="default"/> on pervasive survei | situations where this conflict is common, including (but not | |||
| llance, <xref target="RFC7288" format="default"/> on host firewalls, and <xref t | limited to) <xref target="RFC7754" format="default"/> on filtering, | |||
| arget="RFC6973" format="default"/> regarding privacy considerations.</t> | <xref target="RFC7258" format="default"/> and <xref target="RFC7624" | |||
| <t>Much of that advice has focused on maintaining the end-to-end propert | format="default"/> on pervasive surveillance, <xref target="RFC7288" | |||
| ies of a connection <xref target="RFC3724" format="default"/>. This does not mea | format="default"/> on host firewalls, and <xref target="RFC6973" | |||
| n that our responsibility to end users stops there; decisions might affect them | format="default"/> regarding privacy considerations.</t> | |||
| in other ways. For example, data collection by various applications even inside | <t>Much of that advice has focused on maintaining the end-to-end | |||
| otherwise secure connections is a major problem on the Internet today. Also, ina | properties of a connection <xref target="RFC3724" | |||
| ppropriate concentration of power on the Internet has become a concerning phenom | format="default"/>. This does not mean that our responsibility to end | |||
| enon - one that protocol design might have some influence upon.</t> | users stops there; decisions might affect them in other ways. For | |||
| example, data collection by various applications even inside otherwise | ||||
| secure connections is a major problem on the Internet today. Also, | ||||
| inappropriate concentration of power on the Internet has become a | ||||
| concerning phenomenon -- one that protocol design might have some | ||||
| influence upon.</t> | ||||
| </section> | </section> | |||
| <section anchor="conflict" numbered="true" toc="default"> | <section anchor="conflict" numbered="true" toc="default"> | |||
| <name>Handling Conflicting End User Needs</name> | <name>Handling Conflicting End-User Needs</name> | |||
| <t>When the needs of different end users conflict (for example, two sets | <t>When the needs of different end users conflict (for example, two | |||
| of end users both have reasonable desires) we again should try to minimise nega | sets of end users both have reasonable desires), we again should try to | |||
| tive impact.</t> | minimize negative impact.</t> | |||
| <t>For example, when a decision improves the Internet for end users in o | <t>For example, when a decision improves the Internet for end users in | |||
| ne jurisdiction, but at the cost of potential harm to others elsewhere, that is | one jurisdiction, but at the cost of potential harm to others | |||
| not a good tradeoff. As such, we effectively design the Internet for the pessima | elsewhere, that is not a good trade-off. As such, we design | |||
| l environment; if a user can be harmed, they probably will be, somewhere.</t> | the Internet for the pessimal environment; if a user can be harmed, | |||
| <t>There may be cases where genuine technical need requires compromise. | they probably will be, somewhere.</t> | |||
| However, such tradeoffs are carefully examined and avoided when there are altern | <t>There may be cases where genuine technical need requires | |||
| ate means of achieving the desired goals. If they cannot be, these choices and r | compromise. However, such trade-offs are carefully examined and avoided | |||
| easoning ought to be thoroughly documented.</t> | when there are alternate means of achieving the desired goals. If they | |||
| cannot be, these choices and reasoning ought to be thoroughly | ||||
| documented.</t> | ||||
| </section> | </section> | |||
| <section anchor="deprioritising-internal-needs" numbered="true" toc="defau lt"> | <section anchor="deprioritising-internal-needs" numbered="true" toc="defau lt"> | |||
| <name>Deprioritising Internal Needs</name> | <name>Deprioritizing Internal Needs</name> | |||
| <t>There are a number of needs that are very visible to us as specificat | <t>There are several needs that are very visible to us as | |||
| ion authors, but should explicitly not be prioritised over the needs of end user | specification authors but should explicitly not be prioritized over | |||
| s.</t> | the needs of end users.</t> | |||
| <t>These include: convenience for document editors, IETF process matters | <t>These include convenience for document editors, IETF process | |||
| , and "architectural purity" for its own sake.</t> | matters, and "architectural purity" for its own sake.</t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="iana-considerations" numbered="true" toc="default"> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
| <name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
| <t>This document does not require action by IANA.</t> | <t>This document has no IANA actions.</t> | |||
| </section> | </section> | |||
| <section anchor="security-considerations" numbered="true" toc="default"> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
| <name>Security Considerations</name> | <name>Security Considerations</name> | |||
| <t>This document does not have any direct security impact; however, failin | <t>This document does not have any direct security impact; however, | |||
| g to prioritise end users might well affect their security negatively in the lon | failing to prioritize end users might well affect their security | |||
| g term.</t> | negatively in the long term.</t> | |||
| </section> | </section> | |||
| </middle> | </middle> | |||
| <back> | <back> | |||
| <references> | <references> | |||
| <name>Informative References</name> | <name>Informative References</name> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.0001. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.0001. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3724. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3724. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3935. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3935. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6973. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6973. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7230. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7230. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7258. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7258. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7288. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7288. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7624. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7624. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7754. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7754. xml"/> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8752. xml"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8752. xml"/> | |||
| <!-- [rfced] [TUSSLE] The URL below is correct --> | <reference anchor="TUSSLE" target="https://groups.csail.mit.edu/ana/Public | |||
| ations/PubPDFs/Tussle2002.pdf"> | ||||
| <reference anchor="TUSSLE" target="http://groups.csail.mit.edu/ana/Publica | ||||
| tions/PubPDFs/Tussle2002.pdf"> | ||||
| <front> | <front> | |||
| <title>Tussle in Cyberspace: Defining Tomorrow's Internet</title> | <title>Tussle in Cyberspace: Defining Tomorrow's Internet</title> | |||
| <author initials="D." surname="Clark" fullname="David D. Clark"> | <author initials="D." surname="Clark" fullname="David D. Clark"> | |||
| <organization>MIT Lab for Computer Science</organization> | <organization>MIT Lab for Computer Science</organization> | |||
| </author> | </author> | |||
| <author initials="K." surname="Sollins" fullname="Karen R. Sollins"> | <author initials="K." surname="Sollins" fullname="Karen R. Sollins"> | |||
| <organization>MIT Lab for Computer Science</organization> | <organization>MIT Lab for Computer Science</organization> | |||
| </author> | </author> | |||
| <author initials="J." surname="Wroclawski" fullname="John Wroclawski"> | <author initials="J." surname="Wroclawski" fullname="John Wroclawski"> | |||
| <organization>MIT Lab for Computer Science</organization> | <organization>MIT Lab for Computer Science</organization> | |||
| </author> | </author> | |||
| <author initials="R." surname="Braden" fullname="Robert Braden"> | <author initials="R." surname="Braden" fullname="Robert Braden"> | |||
| <organization>USC Information Sciences Institute</organization> | <organization>USC Information Sciences Institute</organization> | |||
| </author> | </author> | |||
| <date year="2002"/> | <date month="August" year="2002"/> | |||
| </front> | </front> | |||
| <seriesInfo name="DOI" value="10.1145/633025.633059"/> | ||||
| </reference> | </reference> | |||
| </references> | </references> | |||
| <section numbered="false" toc="default"> | ||||
| <name>IAB Members at the Time of Approval</name> | ||||
| <t>Internet Architecture Board members at the time this document was approved | ||||
| for publication were:</t> | ||||
| <ul empty="true" spacing="compact"> | ||||
| <li><t><contact fullname="Jari Arkko"/></t></li> | ||||
| <li><t><contact fullname="Alissa Cooper"/></t></li> | ||||
| <li><t><contact fullname="Stephen Farrell"/></t></li> | ||||
| <li><t><contact fullname="Wes Hardaker"/></t></li> | ||||
| <li><t><contact fullname="Ted Hardie"/></t></li> | ||||
| <li><t><contact fullname="Christian Huitema"/></t></li> | ||||
| <li><t><contact fullname="Zhenbin Li"/></t></li> | ||||
| <li><t><contact fullname="Erik Nordmark"/></t></li> | ||||
| <li><t><contact fullname="Mark Nottingham"/></t></li> | ||||
| <li><t><contact fullname="Melinda Shore"/></t></li> | ||||
| <li><t><contact fullname="Jeff Tantsura"/></t></li> | ||||
| <li><t><contact fullname="Martin Thomson"/></t></li> | ||||
| <li><t><contact fullname="Brian Trammell"/></t></li> | ||||
| </ul> | ||||
| </section> | ||||
| <section numbered="false" anchor="acknowledgements" toc="default"> | <section numbered="false" anchor="acknowledgements" toc="default"> | |||
| <name>Acknowledgements</name> | <name>Acknowledgements</name> | |||
| <t>This document was influenced by many discussions, both inside and | <t>Many discussions influenced this document, both inside and | |||
| outside of the IETF and IAB. In particular, <contact fullname="Edward | outside of the IETF and IAB. In particular, <contact fullname="Edward | |||
| Snowden"/>'s comments regarding the priority of end users at IETF 93 and | Snowden"/>'s comments regarding the priority of end users at IETF 93 and | |||
| the HTML5 Priority of Constituencies were both influential.</t> | the HTML5 Priority of Constituencies were both influential.</t> | |||
| <t>Many people gave feedback and input, including <contact | <t>Many people gave feedback and input, including <contact | |||
| fullname="Harald Alvestrand"/>, <contact fullname="Mohamed Boucadair"/>, | fullname="Harald Alvestrand"/>, <contact fullname="Mohamed Boucadair"/>, | |||
| <contact fullname="Stephen Farrell"/>, <contact fullname="Joe | <contact fullname="Joe | |||
| Hildebrand"/>, <contact fullname="Lee Howard"/>, <contact fullname="Russ | Hildebrand"/>, <contact fullname="Lee Howard"/>, <contact fullname="Russ | |||
| Housley"/>, <contact fullname="Niels ten Oever"/>, <contact | Housley"/>, <contact fullname="Niels ten Oever"/>, <contact | |||
| fullname="Mando Rachovitsa"/>, <contact fullname="Martin Thomson"/>, | fullname="Mando Rachovitsa"/>, <contact fullname="John | |||
| <contact fullname="Brian Trammell"/>, <contact fullname="John | Klensin"/>, and <contact fullname="Eliot Lear"/>.</t> | |||
| Klensin"/>, <contact fullname="Eliot Lear"/>, <contact fullname="Ted | ||||
| Hardie"/>, and <contact fullname="Jari Arkko"/>.</t> | ||||
| </section> | </section> | |||
| </back> | </back> | |||
| <!-- ##markdown-source: | ||||
| H4sIABnEZl4AA6Vca5PbxpX9zl+BGn+QpoqkFDuOY81uvKNXJMeSXZpx+cPW | ||||
| VqoJNMnOAGgaDQxFq/Tf95x7uxsgOc4+kkrZQxJAd9/Huec+4MViMetdX9tn | ||||
| xe3WFm/b3nat7QsXirXvildtVfwcbBdmlS9b0+CyqjPrfuHMaoELFv3WLgZe | ||||
| sHj6x1llelzw6eX17avPsxIfNr47PCtcu/azve/uNp0fds/GRa67cut6W/ZD | ||||
| Z4vn3nRV8fjt9fPL2cztumdF3w2h//Lp02+ffjkLw6pxITjf3h52WASXze7s | ||||
| AU+tnhWlbwMOMdi2f+jL8jB+29na3pu2L3am650N4y8WR5WTHH2182760NCb | ||||
| O7v1dWW72Qwf2urvpvYtNnTAs3buWfGfvS/nBf7h2gr7mRfBd31n1wF/HZr4 | ||||
| R9+5Ej+VvtmZ+EeDi/GTa2vX2v+azczQb333bFYsZgX+59rwrHi3LN77vnft | ||||
| Zmsa+VpV8s50d6e/+G5jWveb6SGyZ/KNbYyrnxVN6/v/4D+WUIH8MHTY97bv | ||||
| d+HZkyf7/X6Zfn0CRUB3XYOn3Fs+5fbnm5sfXunzetNtbK934kZRbliWAass | ||||
| G9cvbTU8Ma158tOwql0pGwn88NPL1+HJ7RBCbaHcL5e7aq3PUzO80J9w4uLF | ||||
| YQV9QET4+qVduxbnK25947vO7x+FbEgXcn+WmPxvEf8dRfdyWbyoIab8rUru | ||||
| pbl31fmPR8Ir3r29LX4wK3GIF1DZgFWLm9LBsuzDq/1tWdz4GpoMJ+v9zXS2 | ||||
| LT6c//yvrvj9svil82Vt9uHOnSz6vd+2D/36r66JYzzvDKz8ZL0PHmrrT387 | ||||
| Xu3nmxdQX7Qt36aFqFPx2l7XVEShmcxms8ViUZgVnAc+M5vdboFRQKWBnlPY | ||||
| j7vaYFfFfnsoeiLZ9fNiZWtn7/HQfmvgZfstZI/fADa41RAh1rDMHtf1e6u/ | ||||
| 4WQ4tw19KPx6xAR+6Kf4CM8vPJ+VgGRevH11+7qobOmIUqEIWz/UVbE2937o | ||||
| xicti7e4uw5etuyxVLH1ezwcWypNW8C4bWHXa6AifK4+YHOFAUziHNUyCgHu | ||||
| af/+nv/o/d8/WIgZqDUjfgMiBzyxdqEXRcpjBbHl4XjW2g/YiumLf0sev3H9 | ||||
| dlgtgUFPcHgDTF4Rip8cwfsTffJflrpO47FAZ0uK/rFf97adF0O7o6eHra0u | ||||
| 45oU82Sl6eOXcVnnTxbiEh/0yeXWtBscB04jR7L/n40TW10fnjQGD+j49Btr | ||||
| VQPUqGwUWFIOXcc1Aer9EIg+om/RqcF3MLo7282xgVnewOSHpbP9egkbfwKT | ||||
| fPI7MVLORgU2rqpqO5t9QYPqfDWUdILZ7J1pDzBTr0ZVuh3M/2grlITIHqfC | ||||
| o3uzAlI25o7AuIeRF3ubrB4xiPreIbbCihBlty1QuB4t9KqgYe6ACzYEqqoi | ||||
| xELGuJFW201uamzn4EH9FiC/2cqNe1vXi7vW72GzCKidoY9c6O+MvbYNkCP9 | ||||
| pBtaQe7SV3Z5MZu9x+46HKnGunM52/QKcVbYVhhqOOG6883RPh9HL8blcHaQ | ||||
| CtnIJaRk7x3lcSi2husWToIrZHDw2MR4Fm7OwWU0Is1xQWmgHtkIfMN29YF7 | ||||
| GT3ZrCHqCoG8sfRhYoyD2CsXSuzMbHi1YAGc+xf5aaIF/ClKUx359mFdMPDj | ||||
| zKZ2/WGe7qlSyHuMH2X1ym46ay9V1dDYzoMS0QR8ewxPMHhbr5cRJaMkKBcc | ||||
| lg8KbtO6NfbQ9sviOpzc3JbYSsDK2GxjKwcrDAWED/9w2PV6aMVexUsCmI5V | ||||
| AHS6xNDCeFwlqojLQXmCO/hm53FGHv4qXQ9D2MHqdtbveBKxDcT3YsM/W+FF | ||||
| akb23tcDF3a/WVkXe4FiIHdQqj0FBZMqo1ahZXhWjfV2Q23ylzWvEI9GKPED | ||||
| D1s5cIABgDBPy0APRbAQQq9wzV1SJASgPX7stwKuopLJ/XK7cLrWjVaCWNL5 | ||||
| w2gjj6CV67rWiALldMYFqxr4FQir4fE1Hg8caBDgaA0bn12P1+0Q6Xj/xvCJ | ||||
| fPRDbreHy8pvE+f6DmuvGdhNXc9jLKSpmeLedNDjgY+NEU0dUUguUDXEANLC | ||||
| KMlqh3JbQCyPV5Ah4hHwGSgr4HE5Brt5AXsSJ/U7OpwXVZVb7ylt++vgdhK9 | ||||
| 73GH/raDR6wjW4yM7uxrmHNteZ+sQEXzGQAi+TwxGyzv28X4hdgLWUhIBhGt | ||||
| qMEl8Q6Lh/uDPIlC3JGwwQwQNYaSALQe6uPtQNEO6oSJwwysGkUUE5HUJFXb | ||||
| s9wjI88oY6ibwuzsDgDIU5niN9v5RRgaaLuxy+KN3xM+p8rjkr1r8MAA5pQ2 | ||||
| JT//T2yntbZScrP3COSd0I/LtEGc+q1cxz3mR0cihaxHD+aDzSdygrwXyQAu | ||||
| zngTgh9dx340VCJkDL/vApQ6EG/w8Re7KlZw/8AzMmMpSgApEyncZlrlXGZD | ||||
| 2Yh94lgtXDpQ1qcrHX1+INlEAjMkO88hdsLbyJ+s66acEKKPR8bJjggghPXp | ||||
| E3z28+cpGVWcbizVvjqMkgkXVwUvP+BywBCTPuWusgdxmbiRXec8PVkjVKNm | ||||
| +ekTSCNuBbqUnVtFEgmkoJNWXo5EtvgFApLH0W1xkVP5i++KT19wo1G7Exo9 | ||||
| n2xwfiHbxpMHxPdIg/dydENu6kThKrJsv4y8vKhOEYyBRilFGHY7MJb5xFyJ | ||||
| nSCRfX1YFrfbIZKBtANK2NCvkEwDyPEI7AOaJ9jR9SlYOouJXxSmahAvmR8A | ||||
| aCS8OMXVGFrUxNTsFZWy5uMTFKWoCUeGAQm+yhkAz8PlYG2AAaAlgpmB2BsP | ||||
| Y/TAXEmAr/g4RE232TJu3JMmgMwLtbx3di/OpoR/YptR1dyT6lfv92U57A4I | ||||
| RbA6oBTCGcNsgl6DHxDO4Car4cB/JfqNPztJCnCt7e5daRM6dTFEIUaA0SHy | ||||
| t6O0dUkwRvG+JCm4I9wQIRcilWBiG+QdI3Rj1doc1HUJUPOC63hBG566FGYK | ||||
| aWrsNXQ4bguaxw8NJUmGT8qJ+NNWQfwcamBqKI9to1YE+VtqW7cQhm5jO0n2 | ||||
| QMItLSgLHqe4iJq9swfJCi7kwRlYYZNwx4DUZU/FjpZYPLbLzXKuAq4M1mov | ||||
| YQc/uDu7hw/OhVnmmH8qPtF4QxY/YkZ8IPz43pQHHh65hvC8dW0/upVT0geV | ||||
| Id/RT5dqmcfgzjwA0R1yIINIuKkeOa62V1CnRBPRjXuj8eZTrmxG3BTNinBA | ||||
| htQkRNVnTM10KbQkQ7ejewJTYbjws/S0jN1nybTCNa9HuhXjKnWyGaAeR6Rp | ||||
| jGwsxUnYZzrlzgluV2oBuy0wYdOZ3VZuEaGLWnQ1oaVylojtKXfQD/nmqzH6 | ||||
| CJnQA3QetEssllwK9CPyIGpaeONpoCE7HA8qF8eDuBaM9V53zRymQk6wSolH | ||||
| 5J+KBdShLieuK8kNtY8EGIkiE39NLMT3mTctVJO6sIl0PEX2iHf09aOdxm1t | ||||
| DUkzzwEx14jqdn4cBpgO+7a0uz4WQSR9JZmyMW1jjlAPFSkHd6QLpoBz0FIy | ||||
| I8ONAttPYwzLYUiC0AFB6BXYH7a19spXYgQ0zDiYz0lBYX58kGky1zQD0Emz | ||||
| vjUOECBvr/Eq0htYJiAQagH+wDo+ffruw+sXT58+/cPnz+QyDgdg1k+Dp/Iu | ||||
| flRmQ41tPHl9MwTBFEYx+CLzCd2qa2J6JLLG0w9cl8iCKEg2WNYmiPFr7QfJ | ||||
| 73VbzWNqAFcV30PWFzTNH/Nt0yu7zQKJwa61Q89YoMYjwW3odpGPuD6mxHhW | ||||
| haBR+13C8SS6K/52cV2802J6ccODCwfXcpGudhGF9NW3X31NIUmhRLLRlPeJ | ||||
| 9p/NZn8ZdT2qYm/a/iSnFAIAAk3cjax3WqpIcRh4CL+luk6Io4ZFHtCBxg56 | ||||
| CfwWduobV4Z5Wl5JuV5uqyF9FI7OTBOakMrIQNwydBkGfuU4msseCPeG30JU | ||||
| N5pQFl8u/wByxLPelIhHp9u7INsI5hBGkYydlPYRYj8czS6i9nR3rXXCHyNJ | ||||
| oQyXiLcivTPhCV5bJh/UUxL1mKVtiRa0WC13iUZxG7YKMA+aEK6N6/hBVrHN | ||||
| Crhhj+sidPmQCUYlVTjsF/l2lRJqZEjVRutZzJWQjXSyGBfgLiTRXbN+g92U | ||||
| 9qi+QjPNq/CKlq4jWMvzlkQAEdRYbz0yLInx02cI8iNg9rU4J5Pl9DA5l6/9 | ||||
| 5iASejQWSyLD4iH/+T3Cp5GrBnm4FgA0JVLiz5bQiYvKzjoyXnnoxAllTcM6 | ||||
| pdZ0ThWMGCW0ht/HrHTjfTXPKB6N8yRbkQorPHgnqT4hvUXMKK1upiEyVEeV | ||||
| bDyw9omTac8mCrspEudaMZiz3nOaTsPrV/wX2E+dNzQt7MesWeXjYimf30Nu | ||||
| 76xUIk2F2F4mESDFAJGTMmbQBPssZYz8qbJMzMXWAgwSdoWVALL9dl4QkFty | ||||
| q3ZoVpo5yGEvc44A2lCBtNLeiOlX0Du3EHyBBGWswo8GgBvxo5S2C4kpQghr | ||||
| e6+RE7DOHofYv2aFUbqd1GSopTb5hwgXAniulUg48dqx+7PJaoR1xu7mfMz3 | ||||
| pKCV0w8mdlK0FhATRYchRkwqdAFpNfhRqlMPdSsma0WCVYpdO/Csn2xHhxJs | ||||
| x72l2UmWjDgWKzPkaTHbjZkEnQ8LrvDt1fTZWpIl2j4GPUD6YasafLamF+XT | ||||
| PNLeLimk6ycZbpAaBAub3JC7Vw46/n6ZamjnKblI+Oca4Rk6rg8nhEE2lAIQ | ||||
| llizsLAy1Ouwi8XTxKJiIJ14zKRCfBBapo0DeAFUBKcpGcmQL2qAglPte8UW | ||||
| AgYbs8dKFV/7BygTee9vsfaXUlJt/URacnSGjsEyxP36ScFJsUyAUynYG5hy | ||||
| DssvYDi/w79YQ5B+Tq4Cru0e8ecwrYkc99HOYj3tclKimEptFC8Dk1/RGhQl | ||||
| lsXzg8gKAQCGFulnzucJXLXttemDI33xBba90UL7kUhepG1oV+pka5W3+sSY | ||||
| IICcte7XgVQrSEYEI/K5RnNBuNXi1KQEoqwjbW1o+XQciJdFIiHMEpIbOvGP | ||||
| ygVBuJ6VimQ4kU2W4gXSY5CSSYyVUjJcLIpUSmXJkK1OksP+DA+Z/KlqAvLt | ||||
| grmhdAwQyPScRTnU4r705NTrWEkpWlNycXvJ1FgkKC6yOLPoLri+1JTpSXu1 | ||||
| hWm7FXyhnrgIL885jrY0FrHjEXMvC50zAIybmBNxtZSZFB8R+gp5CVA3h+WV | ||||
| 5nSs8sb6o9S55JbASoZaq7RZPwI5Yif5DAS7xEFYWNKy7ImjCwWOjxr7P1Gs | ||||
| iKWOPdnUTknA0SyjDzGDkc3JDdyetHtYsQg7KkKTe5F+a+pDsLkcI2m6ZhR8 | ||||
| 9hH/iaA6F/uQEPDQE6WoU/dJajjERghLV5yrd4nvYosRuUwne44lKFhR8EcF | ||||
| 3lNZkEj1sRM0lcTY4X7QGdemlAJ17juBc3fIbaWukYLxsvhx6GIKEybJUaWs | ||||
| QoIxaCNz9TLW55N5iUtO+NZYk9TbYi6OgNYdJGCK5wQYMk3zWlDXVrmQTWPp | ||||
| zEnrVKyrD5mTuanBndmbS0tPgNC1GdseC2OeVHdMWQ6sPl4Wja9sjV39qI11 | ||||
| 9QaqBHrqu4NG/w0BZvRiM1RO3Uo3NnaQpXBGgtEiNgqyDNBeLcUb9tfZ3xSg | ||||
| 4WaodKmxIApovKs885fa3SGU3SDX7HIQe8CyCmloKc8T/sriNluAMIq/Zia5 | ||||
| EOP1Ws8Z22ejMH6v/T2xYK2HpLixtzVXkR5ktGT6H3N2cwfBkbwNveewCaHr | ||||
| MBYCZbTpeNYDsrfSPhFAEOkTLsYL4pZyP+cfA4RSOeEPy+K1RoJG0SBGF1bC | ||||
| FYWdetb0HmE9uT4hnCwcV7PBZHNls7J952I7y8VcBMQpWIusPXV5Pn++HItG | ||||
| jC8PcfbYBnuoCqEkmCaalczObanECqZx2EVJxpaVYJ5kcQaYEEFpqkcxVIaT | ||||
| loftIpuaVtPPdSLklmNmD6PY2SAB7P4suuYKrRaDslemnnT2ZqV2rtX6bWRB | ||||
| OfowNyIOVfe+lBbBlCmkvC/E8n80wZXN4M5byZMaA/+l37W2jo+YEJvkzA8c | ||||
| Vkq+yBHV+8wOfxvNYCUhYEYRO3Ubs5Nj0o44gujWqsgIGVraTB1MatAk8JuW | ||||
| FQRvYgwf4V+rm2KJepcEwKvjnp4EDm0l0r9B9HFmRGpmtTGCi9A0+9TGXhGs | ||||
| FBuP2vGI1mxra7h/1CuhGbpgJVOVvecsSOmq6lCkA2FLJnBiVprAp4AzDX3a | ||||
| eP11cGqbDQVYXMj8Av4a2LEbWil+mukc6DH4mZr120MUdnWEXqkMPZnumj+A | ||||
| bWk/cT5ME1OQfGtzdMfmlHs4Dul0jRCwXpWldXcoUb1IqUFvoqrmqTmpMzy5 | ||||
| 4RTo3K6Pz1zDVVamvFNhHTEFQRQmBbwXO6UCn/vXWmF6bjr9EIfNmAOnw+IA | ||||
| tHsXRLA6uoCN7oY+dtty+UqkEHFGffUUY+5dpj4JAc9rYgxFqk7tP8YTypJz | ||||
| zZnqI3Ucx0w5e+ihTen5MAxoGGRwjGdPFfXjoT2mtaVf1AIUsRJEPs9UorJi | ||||
| tqChvWaiuDB+QLbNq2jbQ5OKVmvT4Jym066DzmOcW55U9KLZ6GQbLhJJeWm6 | ||||
| ql3hETJscipCuNXYdWYoGgle/v5SmiqUGbZnijSNktt8DLT1HWxhZ4BsMvix | ||||
| D7UWV0Wq0rq0fQmxHnWRUo4JFNMaxaubF9c/vRpF/OnTd28XL5ccpiNd29kF | ||||
| HBpn+vz5TKs6LTYGrNQPVeMEdCNaOIngExxb2REApXBP7PDBKDy3TIhjSX1S | ||||
| pY3kw47bZMNiAvYhT4vMT6jYpFG4YrMGHBqZvC6e8Do2Pic4NgKpmocM+GDt | ||||
| 3F5NiEVj0lI6DVY4gBLHKfw/TN6mYChWBKWZrh63BR27WmhbAojRqXOfMwwr | ||||
| mUmI9UgjQxz8IEOpdJjIzCanu1QQYjZ3BuaTOUPRgRaRs6+nbCOd5iYynBGB | ||||
| wPzZ5SL3oiZaLexrrLQc7es1bBP32D86G6abCEg5UEwEXEzgcq1bFk31OSQ8 | ||||
| dC/qjpOCQwhxWCjKf6rccYTkNfKAuj5SRWcbK1XNXJP58PoFO/spT/lgZXAs | ||||
| SHv2RXyV4Ioo1I8zQricQwqcncqDSzG70ygwzQFjli82pYq5E2/IahdHe7gU | ||||
| IyWoL4oXzD6pdhabFq9jY+5G27KwyrzaDhYxRhipZkuen/qsMHEdUTKTAR7p | ||||
| c2tFXk0HdCXWXS2Drw5mCg3JY5piDGPJXQr89N7jms8pPuUxpzh4Ozr2pLKw | ||||
| mwg1tnNkcEKreEOa73tze/vT9OI83IJUT5fhFUD9OxwiT7nppTL8oQ83fdrR | ||||
| ZFiKsYN0ziqKXgjDkjmpC5q79vO++fKrp8DNsUR/PMnGCmq+LbAgWqTetvQ5 | ||||
| Ox1a0yazycMlqbqcZHh1VASv4Lm1l562xNGPthx0bhmn33SmUWMaHycHlBne | ||||
| buWQ/pA8amdA6nVcKRaRtck/z1/FuTCtutQ15JLHEuMTWJR1gSMreW4wTijr | ||||
| 7LGkvgFfrfxHS8p87zovOSuz8cg+55NUUKacEPO7MMrBjHHV5A0cdyaSiLWO | ||||
| u+PM8WTobzJfMta5dY7XdgxVWguS5Nd0HZN48VeX5p67OM+Yi+MQB21VKWGc | ||||
| jBvHRLQiwVKHVOV1CC+41Jtj8usm72rg/wfiRpwXYRFUbJCthNksv6hzohUa | ||||
| sJCIcVhMYow4MTk1RN0PxKjygMAj81tRic1Q944TDcc+EeIQ5Cpq+7hhQnKA | ||||
| 7cP/JgOPcbIDmbuJr1fgPkhA5nTYOkkzthE2U1436beruD5GBScvLBPcraAQ | ||||
| F9dn9/SQacTJ5i/ZzXRhFIBUh4h995LfHI25ip6wIcBOfTiuGEZfkOw2IY6y | ||||
| Zqlh2XUduQ1xO3tQni3P6pDmapy7F0lCKqpg+qLkxB1fIWtjVRce3IRYlKRT | ||||
| 8aZBhjXOtB5bFUGHuY4IaTRWNZ23rXaZTehP+jeQ9K2O/D9+628vZUukEQcO | ||||
| z6VhVsmeQfP8Ts2U7hfgfgwr3MeVniK/6RFHhFLO53cGcXQeW16LcSwqDYlB | ||||
| Jxydkb/TtASPumColwHrZodw0WpDbcs0XJqGKtM08D1XgBvFmwYbRtNlrTRH | ||||
| bPAroDrfg4mR9e2EJL63G/Xp1NYp3kpJVnoEfCirF/Mc5bUPNrSmWbkNfY2T | ||||
| YP9sEoKFYi0fGekG760+ghZYOn0AqwNVet0kz6cwxOxsu8CpOL6THVSCUy+v | ||||
| +F0UpvFqgimlSYhYDYwrhUBbHCeQ10FilUtfQ0QkE1Iydl4iy7oceyRa7rVi | ||||
| UbnfgFPISA+DvGvtKB511SjSWNyelrZjrYjJFVS3k90C3t1GGHofh66Ffghu | ||||
| V+eVdmXjj/h81aOT0tD/5V20SfieSG7K4GzXJRZLoJChflANpqdTjISY3uvM | ||||
| Acee/tnBL1KPJr0j5E4mh69yzi1V3K2qOk3XpkLpyld5wPKXmL38lVWgy1id | ||||
| 0/hMNaaXKVIFI77YwAJrGiSQFnxeaFzXaW+aFO2ks6QYh6dpwHYxBiHs2VRt | ||||
| Ytx5pHdJ/Xon03WxZ8b3Wo6SNK4TtKTJ+NwLz9gpvenTbEEMPNT8StJmHc0Z | ||||
| JmQ3ZTFIhKXmyrRb206pnjTOwtFXKUe+ADK4Svr48jrK+fC/qKOLhbNoYDoY | ||||
| 0nDUQMe45A2jh17jiJzxm6//yCH1ljVGnZKcZzr59Z8jnYxf/OnLeO2Ovd5A | ||||
| a0JKd2+BGUaaE+nGP/9Zr5N0dQ343bOjOJ8860/ffvMVrulglV2lMUcGaE/e | ||||
| 3+JgyVBu84Apsnxq62Qa8HTyhjONvSc4Rf4lZSOJGHH8lREkDsF9w0PFaJ17 | ||||
| ypyNH5uF5/240V1D73dBOcXVpJR6VkUdS1msPZ8M28rkaXx9iVvjaIbRAHGU | ||||
| fUi3wrXq9XwYh5Z15NhOjqZvakAs//BdCuZneW/vK4MQcF2zToq8dJKwCi9i | ||||
| pE6RNg7CnDxh8saZSVxKVAlfwJctrgcZZYqV5nR11l/fG5iWSuK7Vmn0j820 | ||||
| GA7fcESWD30RLZx/53D4XmDl0xe5LxILIokAi9LHEf3JvE3yl8dHtW2+JxPs | ||||
| KSJzCkb3yRfnfBvb7QF2HS7ldb4NS64RnWMLTxpy1M4J8J5moAIcJltOokwn | ||||
| A5ZHSexDTaZI1RKJDb2qLVX6ZJqHsKTtpEkPLAG7zmYIKPZ8tduv1/LuIKuC | ||||
| Enymby1HDZ5tsZfXMRClGxmez+nVlY6TazNFSzfcUZz8PYiNyhuFQj9WVl8j | ||||
| kR2m9nsqxgpViRAIDjowwo89XMl6IuXTETlpqkzfrJIyZzqipngj946cQTvS | ||||
| EhBsNX2zXPoPMdmy8Q0a4oq8wp3gR02j0vFicIS1HjIONay0LBpk+tCVNr3+ | ||||
| SMuSplYKISsZaIhzGjkU63vi8IyX9mjsSPUAEYhPHM/9jNlpjMPp9QPhT1Ir | ||||
| rmMbhJz2d17To4FNmhcszNa53DcOCVVjWppd8GR6QDqROmOs4brVHrs0+fM7 | ||||
| /5XTNwqPuit5dJpCu5gUjXDynbx4caHpFZ14D6cEhdKxqbfX76+JIpPocvqf | ||||
| Gcjwn5IGk+GYd3NWiSPDssz/9lF5OimO9Kf3QyIcXI28dR0rqUczcROvV7xk | ||||
| wXQSV1w3PjEhTX1I9WydhLBdk/7bAkwTeYrrkjXXmsO+Uk+cfXqmRmKrf79Y | ||||
| w2ztxefTI+3NZDxbCtqNniuXP+cKlTFACZEd+kRRcytMKND18zPy/Iq5V1Xc | ||||
| YGPgYI9C/u+mTFiCAIwK53BCm3t9+rdf5UrNm9t3P3ydpuPk8hfjfzVGuqB0 | ||||
| kbhlORexchlf1I+vWWyov1wZlWxOW0wjvXpjYH0VIuk93wY2bDq/81vDhvJz | ||||
| P5SmMg7Hu0FKQSB5bZCg8v3c7z22iOzMrvSeH5D8AKVw0nnxgRz5DTMwe5gX | ||||
| 7x0Am68HFT+qqWCDlS8+AHaQevfB8BuSZbAY3wRGg+eI5PjYGYhQF9u2xd9q | ||||
| vmGEX1/VDqb5g6XYb7HNNxRvrLV+D+JRXHd3d345+2//Y85KQEgAAA== | ||||
| </rfc> | </rfc> | |||
| End of changes. 32 change blocks. | ||||
| 421 lines changed or deleted | 286 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||