rfc8890v1.txt | rfc8890.txt | |||
---|---|---|---|---|
skipping to change at line 14 ¶ | skipping to change at line 14 ¶ | |||
Category: Informational | Category: Informational | |||
ISSN: 2070-1721 | ISSN: 2070-1721 | |||
The Internet is for End Users | The Internet is for End Users | |||
Abstract | Abstract | |||
This document explains why the IAB believes that, when there is a | This document explains why the IAB believes that, when there is a | |||
conflict between the interests of end users of the Internet and other | conflict between the interests of end users of the Internet and other | |||
parties, IETF decisions should favor end users. It also explores how | parties, IETF decisions should favor end users. It also explores how | |||
this can more effectively be achieved. | the IETF can more effectively achieve this. | |||
Status of This Memo | Status of This Memo | |||
This document is not an Internet Standards Track specification; it is | This document is not an Internet Standards Track specification; it is | |||
published for informational purposes. | published for informational purposes. | |||
This document is a product of the Internet Architecture Board (IAB) | This document is a product of the Internet Architecture Board (IAB) | |||
and represents information that the IAB has deemed valuable to | and represents information that the IAB has deemed valuable to | |||
provide for permanent record. It represents the consensus of the | provide for permanent record. It represents the consensus of the | |||
Internet Architecture Board (IAB). Documents approved for | Internet Architecture Board (IAB). Documents approved for | |||
skipping to change at line 58 ¶ | skipping to change at line 58 ¶ | |||
3. Why the IETF Should Prioritize End Users | 3. Why the IETF Should Prioritize End Users | |||
4. How the IETF Can Prioritize End Users | 4. How the IETF Can Prioritize End Users | |||
4.1. Engaging the Internet Community | 4.1. Engaging the Internet Community | |||
4.2. Creating User-Focused Systems | 4.2. Creating User-Focused Systems | |||
4.3. Identifying Negative End-User Impact | 4.3. Identifying Negative End-User Impact | |||
4.4. Handling Conflicting End-User Needs | 4.4. Handling Conflicting End-User Needs | |||
4.5. Deprioritizing Internal Needs | 4.5. Deprioritizing Internal Needs | |||
5. IANA Considerations | 5. IANA Considerations | |||
6. Security Considerations | 6. Security Considerations | |||
7. Informative References | 7. Informative References | |||
IAB Members at the Time of Approval | ||||
Acknowledgements | Acknowledgements | |||
Author's Address | Author's Address | |||
1. Introduction | 1. Introduction | |||
Many who participate in the IETF are most comfortable making what we | Many who participate in the IETF are most comfortable making what we | |||
believe to be purely technical decisions; our process is defined to | believe to be purely technical decisions; our process favors | |||
favor technical merit through our well-known mantra of "rough | technical merit through our well-known mantra of "rough consensus and | |||
consensus and running code." | running code." | |||
Nevertheless, the running code that results from our process (when | Nevertheless, the running code that results from our process (when | |||
things work well) inevitably has an impact beyond technical | things work well) inevitably has an impact beyond technical | |||
considerations, because the underlying decisions afford some uses | considerations, because the underlying decisions afford some uses | |||
while discouraging others. While we believe we are making only | while discouraging others. While we believe we are making only | |||
technical decisions, in reality, we are defining (in some degree) | technical decisions, in reality, we are defining (in some degree) | |||
what is possible on the Internet itself. | what is possible on the Internet itself. | |||
This impact has become significant. As the Internet increasingly | This impact has become significant. As the Internet increasingly | |||
mediates essential functions in societies, it has unavoidably become | mediates essential functions in societies, it has unavoidably become | |||
skipping to change at line 92 ¶ | skipping to change at line 93 ¶ | |||
All of this raises the question: For whom do we go through the pain | All of this raises the question: For whom do we go through the pain | |||
of gathering rough consensus and writing running code? | of gathering rough consensus and writing running code? | |||
After all, there are a variety of parties that standards can benefit, | After all, there are a variety of parties that standards can benefit, | |||
such as (but not limited to) end users, network operators, schools, | such as (but not limited to) end users, network operators, schools, | |||
equipment vendors, specification authors, specification implementers, | equipment vendors, specification authors, specification implementers, | |||
content owners, governments, nongovernmental organizations, social | content owners, governments, nongovernmental organizations, social | |||
movements, employers, and parents. | movements, employers, and parents. | |||
Successful specifications will provide some benefit to all of the | Successful specifications will provide some benefit to all the | |||
relevant parties because standards do not represent a zero-sum game. | relevant parties because standards do not represent a zero-sum game. | |||
However, there are sometimes situations where there is a conflict | However, there are sometimes situations where there is a conflict | |||
between the needs of two (or more) parties. | between the needs of two (or more) parties. | |||
In these situations, when one of those parties is an "end user" of | In these situations, when one of those parties is an "end user" of | |||
the Internet -- for example, a person using a web browser, mail | the Internet -- for example, a person using a web browser, mail | |||
client, or another agent that connects to the Internet -- the | client, or another agent that connects to the Internet -- the | |||
Internet Architecture Board argues that the IETF should favor their | Internet Architecture Board argues that the IETF should favor their | |||
interests over those of other parties. | interests over those of other parties. | |||
Section 2 explains what is meant by "end users", Section 3 outlines | Section 2 explains what is meant by "end users", Section 3 outlines | |||
why IETF work should prioritize them, and Section 4 describes how we | why IETF work should prioritize them, and Section 4 describes how we | |||
can do that. | can do that. | |||
2. Who Are "End Users"? | 2. Who Are "End Users"? | |||
In this document, "end users" means human users whose activities IETF | In this document, "end users" means human users whose activities IETF | |||
standards as a whole are designed to support, sometimes indirectly. | standards support, sometimes indirectly. Thus, the end user of a | |||
Thus, the end user of a protocol to manage routers is not a router | protocol to manage routers is not a router administrator; it is the | |||
administrator; it is the people using the network that the router | people using the network that the router operates within. | |||
operates within. | ||||
End users are not necessarily a homogenous group; they might have | End users are not necessarily a homogenous group; they might have | |||
different views of how the Internet should work and might occupy | different views of how the Internet should work and might occupy | |||
several roles, such as a seller, buyer, publisher, reader, service | several roles, such as a seller, buyer, publisher, reader, service | |||
provider, and consumer. An end user might be browsing the Web, | provider, and consumer. An end user might browse the Web, monitor | |||
monitoring remote equipment, playing a game, videoconferencing with | remote equipment, play a game, videoconference with colleagues, send | |||
colleagues, sending messages to friends, or performing an operation | messages to friends, or perform an operation in a remote surgery | |||
in a remote surgery theater. They might be "at the keyboard" or | theater. They might be "at the keyboard" or represented by software | |||
represented by software indirectly (e.g., as a daemon). | indirectly (e.g., as a daemon). | |||
Likewise, an individual end user might have many interests (e.g., | Likewise, an individual end user might have many interests (e.g., | |||
privacy, security, flexibility, reachability) that are sometimes in | privacy, security, flexibility, reachability) that are sometimes in | |||
tension. | tension. | |||
A person whose interests we need to consider might not directly be | A person whose interests we need to consider might not directly be | |||
using a specific system connected to the Internet. For example, if a | using a specific system connected to the Internet. For example, if a | |||
child is using a browser, the interests of that child's parents or | child is using a browser, the interests of that child's parents or | |||
guardians may be relevant. A person pictured in a photograph may | guardians may be relevant. A person pictured in a photograph may | |||
have an interest in systems that process that photograph; a person | have an interest in systems that process that photograph; a person | |||
skipping to change at line 170 ¶ | skipping to change at line 170 ¶ | |||
| The Internet isn't value-neutral, and neither is the IETF. We | | The Internet isn't value-neutral, and neither is the IETF. We | |||
| want the Internet to be useful for communities that share our | | want the Internet to be useful for communities that share our | |||
| commitment to openness and fairness. We embrace technical | | commitment to openness and fairness. We embrace technical | |||
| concepts such as decentralized control, edge-user empowerment and | | concepts such as decentralized control, edge-user empowerment and | |||
| sharing of resources, because those concepts resonate with the | | sharing of resources, because those concepts resonate with the | |||
| core values of the IETF community. These concepts have little to | | core values of the IETF community. These concepts have little to | |||
| do with the technology that's possible, and much to do with the | | do with the technology that's possible, and much to do with the | |||
| technology that we choose to create. | | technology that we choose to create. | |||
In other words, the IETF is concerned with developing and maintaining | In other words, the IETF develops and maintains the Internet to | |||
the Internet to promote the social good. The society that the IETF | promote the social good. The society that the IETF is attempting to | |||
is attempting to enhance is composed of end users, along with groups | enhance is composed of end users, along with groups of them forming | |||
of them forming businesses, governments, clubs, civil society | businesses, governments, clubs, civil society organizations, and | |||
organizations, and other institutions. | other institutions. | |||
Merely advancing the measurable success of the Internet (e.g., | Merely advancing the measurable success of the Internet (e.g., | |||
deployment size, bandwidth, latency, number of users) is not an | deployment size, bandwidth, latency, number of users) is not an | |||
adequate goal; doing so ignores how technology is so often used as a | adequate goal; doing so ignores how technology is so often used as a | |||
lever to assert power over users, rather than empower them. | lever to assert power over users, rather than empower them. | |||
Beyond fulfilling the IETF's mission, prioritizing end users can also | Beyond fulfilling the IETF's mission, prioritizing end users can also | |||
help to ensure the long-term health of the Internet and the IETF's | help to ensure the long-term health of the Internet and the IETF's | |||
relevance to it. Perceptions of capture by vendors or other | relevance to it. Perceptions of capture by vendors or other | |||
providers harm both; the IETF's work will (deservedly) lose end | providers harm both; the IETF's work will (deservedly) lose end | |||
skipping to change at line 196 ¶ | skipping to change at line 196 ¶ | |||
others' interests over them. | others' interests over them. | |||
Ultimately, the Internet will succeed or fail based upon the actions | Ultimately, the Internet will succeed or fail based upon the actions | |||
of its end users, because they are the driving force behind its | of its end users, because they are the driving force behind its | |||
growth to date. Not prioritizing them jeopardizes the network effect | growth to date. Not prioritizing them jeopardizes the network effect | |||
that the Internet relies upon to provide so much value. | that the Internet relies upon to provide so much value. | |||
4. How the IETF Can Prioritize End Users | 4. How the IETF Can Prioritize End Users | |||
There are a few ways that the IAB believes the IETF community can | There are a few ways that the IAB believes the IETF community can | |||
prioritize end users, based upon our observations. By its nature, | prioritize end users, based upon our observations. This is not a | |||
this is not a complete list. | complete list. | |||
4.1. Engaging the Internet Community | 4.1. Engaging the Internet Community | |||
The IETF community does not have any unique insight into what is | The IETF community does not have any unique insight into what is | |||
"good for end users", and it is not uncommon for us to be at a | "good for end users", and it is not uncommon for us to be at a | |||
further disadvantage because of our close understanding of some -- | further disadvantage because of our close understanding of some -- | |||
but not all -- aspects of the Internet. | but not all -- aspects of the Internet. | |||
At the same time, we do have a culture of considerable deference to a | At the same time, we have a culture of considerable deference to a | |||
broader "Internet community" -- roughly what this document calls end | broader "Internet community" -- roughly what this document calls end | |||
users -- in our decision-making processes. Mere deference, however, | users -- in our decision-making processes. Mere deference, however, | |||
is not adequate; even with the best intentions, we cannot assume that | is not adequate; even with the best intentions, we cannot assume that | |||
our experiences of the Internet are those of all of its end users or | our experiences of the Internet are those of all of its end users or | |||
that our decisions have a positive impact upon them. | that our decisions have a positive impact upon them. | |||
Therefore, we have not only a responsibility to analyze and consider | Therefore, we have not only a responsibility to analyze and consider | |||
the impacts of the IETF's work but also a responsibility to consult | the impacts of the IETF's work, but also a responsibility to consult | |||
with that greater Internet community. In particular, we should do so | with that greater Internet community. In particular, we should do so | |||
when one of our decisions has potential impact upon end users. | when one of our decisions has a potential impact upon end users. | |||
The IETF community faces significant hurdles in doing so. Our work | The IETF community faces significant hurdles in doing so. Our work | |||
is specialized and often esoteric, and processes for developing | is specialized and often esoteric, and processes for developing | |||
standards often involve very long timescales. Affected parties are | standards often involve very long timescales. Affected parties are | |||
rarely technical experts, and their experience of the Internet is | rarely technical experts, and they often base their understanding of | |||
often based upon incomplete (and sometimes inaccurate) models. | the Internet upon incomplete (and sometimes inaccurate) models. | |||
Often, even when we try to engage a broader audience, their | Often, even when we try to engage a broader audience, their | |||
participation is minimal -- until a change affects someone in a way | participation is minimal -- until a change affects someone in a way | |||
they don't like. Surprising the Internet community is rarely a good | they don't like. Surprising the Internet community is rarely a good | |||
outcome. | outcome. | |||
Government-sponsored individuals sometimes participate in the IETF | Government-sponsored individuals sometimes participate in the IETF | |||
community. While this is welcome, it should not be taken as | community. While this is welcome, it should not be taken as | |||
automatically representative of end users elsewhere, or even all end | automatically representative of end users elsewhere, or even all end | |||
users in the relevant jurisdiction. Furthermore, what is desirable | users in the relevant jurisdiction. Furthermore, what is desirable | |||
in one jurisdiction (or at least to its administrators) might be | in one jurisdiction (or at least to its administrators) might be | |||
detrimental in others (see Section 4.4). | detrimental in others (see Section 4.4). | |||
While some civil society organizations specialize in technology and | While some civil society organizations specialize in technology and | |||
Internet policy, they typically do not have the capacity to | Internet policy, they rarely can participate broadly, nor are they | |||
participate broadly, nor are they necessarily representative of the | necessarily representative of the larger Internet community. | |||
larger Internet community. Nevertheless, their understanding of end- | Nevertheless, their understanding of end-user needs is often | |||
user needs is often profound, and they are in many ways the best- | profound, and they are in many ways the best-informed advocates for | |||
informed advocates for end-user concerns; they should be considered a | end-user concerns; they should be considered a primary channel for | |||
primary channel for engaging the broader Internet community. | engaging the broader Internet community. | |||
A promising approach to help fill these gaps is to identify and | A promising approach to help fill these gaps is to identify and | |||
engage with specifically affected communities when making decisions | engage with specifically affected communities when making decisions | |||
that might affect them, for example, one or more industry | that might affect them, for example, one or more industry | |||
associations, user groups, or a set of individuals, though we can't | associations, user groups, or a set of individuals, though we can't | |||
of course formally ensure that they are appropriately representative. | formally ensure that they are appropriately representative. | |||
In doing so, we should not require them to "come to us"; unless a | In doing so, we should not require them to "come to us"; unless a | |||
stakeholder community is already engaged in the IETF process | stakeholder community is already engaged in the IETF process | |||
effectively, the IETF community should explore how to meet with them | effectively, the IETF community should explore how to meet with them | |||
on their terms -- take the initiative to contact them, explain our | on their terms -- take the initiative to contact them, explain our | |||
work, and solicit their feedback. | work, and solicit their feedback. | |||
In particular, while IAB workshops, BOFs, and Bar BOFs can be an | In particular, while IAB workshops, BOFs, and Bar BOFs can be an | |||
effective mechanism to gather input within our community, they often | effective mechanism to gather input within our community, they rarely | |||
do not have the visibility in other communities that is required to | have the visibility into other communities that is required to | |||
solicit input, much less effective participation. | solicit input, much less effective participation. | |||
Instead, an event like a workshop may be more effective if co-located | Instead, an event like a workshop may be more effective if co-located | |||
with -- and ideally hosted or co-hosted by -- a forum that's familiar | with -- and ideally hosted or co-hosted by -- a forum that's familiar | |||
to that stakeholder community. We should also take the opportunity | to that stakeholder community. We should also raise the visibility | |||
to raise the visibility of IETF work (or potential IETF work) in such | of IETF work (or potential IETF work) in such fora through conference | |||
fora through conference talks, panels, newsletter articles, etc. | talks, panels, newsletter articles, etc. | |||
For example, the IAB held the ESCAPE workshop [RFC8752] to solicit | For example, the IAB ESCAPE workshop [RFC8752] solicited input from | |||
input from Internet publishers and advertisers that might be affected | Internet publishers and advertisers about a proposal that might | |||
by a proposal for new work in the IETF. While the workshop was | affect them. While the workshop was considered successful, | |||
considered successful, participation might have been improved by | participation might have been improved by identifying an appropriate | |||
identifying an appropriate industry forum and working with them to | industry forum and working with them to host the event. | |||
host the event. | ||||
When we engage with the Internet community, we should also clearly | When we engage with the Internet community, we should also clearly | |||
identify tailored feedback mechanisms (e.g., subscribing to a mailing | identify tailored feedback mechanisms (e.g., subscribing to a mailing | |||
list may not be appropriate) and assure that they are well known in | list may not be appropriate) and assure that they are well known in | |||
those communities. | those communities. | |||
The Internet Society can be an invaluable partner in these efforts; | The Internet Society can be an invaluable partner in these efforts; | |||
their focus on the Internet community, policy expertise, and | their focus on the Internet community, policy expertise, and | |||
resources can help to facilitate discussions with the appropriate | resources can help to facilitate discussions with the appropriate | |||
parties. | parties. | |||
Finally, we should remember that the RFC Series are Requests For | Finally, we should remember that the RFC Series contains Requests For | |||
Comments; if there are serious implications of our work, we should | Comments; if there are serious implications of our work, we should | |||
document them and ask for feedback from the Internet community. | document them and ask for feedback from the Internet community. | |||
4.2. Creating User-Focused Systems | 4.2. Creating User-Focused Systems | |||
We should pay particular attention to the kinds of architectures we | We should pay particular attention to the kinds of architectures we | |||
create and whether they encourage or discourage an Internet that | create and whether they encourage or discourage an Internet that | |||
works for end users. | works for end users. | |||
For example, one of the most successful Internet applications is the | For example, one of the most successful Internet applications is the | |||
Web, which uses the HTTP application protocol. One of HTTP's key | Web, which uses the HTTP application protocol. One of HTTP's key | |||
implementation roles is that of the web browser -- called the "user | implementation roles is that of the web browser -- called the "user | |||
agent" in [RFC7230] and other specifications. | agent" in [RFC7230] and other specifications. | |||
User agents act as intermediaries between a service and the end user; | User agents act as intermediaries between a service and the end user; | |||
rather than downloading an executable program from a service that has | rather than downloading an executable program from a service that has | |||
arbitrary access into the users' system, the user agent only allows | arbitrary access into the users' system, the user agent only allows | |||
limited access to display content and run code in a sandboxed | limited access to display content and run code in a sandboxed | |||
environment. Of course, end users are diverse and the ability of a | environment. End users are diverse and the ability of a few user | |||
limited number of user agents to properly represent individual | agents to represent individual interests properly is imperfect, but | |||
interests is imperfect, but this arrangement is an improvement over | this arrangement is an improvement over the alternative -- the need | |||
the alternative -- the need to completely trust a website with all | to trust a website completely with all information on your system to | |||
information on your system to browse it. | browse it. | |||
Defining the user agent role in standards also creates a virtuous | Defining the user agent role in standards also creates a virtuous | |||
cycle; it allows multiple implementations, thereby allowing end users | cycle; it allows multiple implementations, allowing end users to | |||
to switch between them with relatively low costs (although there are | switch between them with relatively low costs (although there are | |||
concerns about the complexity of the Web creating barriers to entry | concerns about the complexity of the Web creating barriers to entry | |||
for new implementations). This creates an incentive for implementers | for new implementations). This creates an incentive for implementers | |||
to carefully consider the users' needs, which often are reflected | to consider the users' needs carefully, which are often reflected | |||
back into the defining standards. The resulting ecosystem has many | into the defining standards. The resulting ecosystem has many | |||
remaining problems, but a distinguished user agent role provides an | remaining problems, but a distinguished user agent role provides an | |||
opportunity to improve it. | opportunity to improve it. | |||
In contrast, the Internet of Things (IoT) has not yet seen the broad | In contrast, the Internet of Things (IoT) has not yet seen the broad | |||
adoption of a similar role; many current systems require opaque, | adoption of a similar role; many current systems require opaque, | |||
vendor-specific software or hardware for the user-facing component. | vendor-specific software or hardware for the user-facing component. | |||
Perhaps as a result of this, that ecosystem and its end users face | Perhaps as a result of this, that ecosystem and its end users face | |||
serious challenges. | serious challenges. | |||
4.3. Identifying Negative End-User Impact | 4.3. Identifying Negative End-User Impact | |||
At its best, our work will unambiguously build a better human | At its best, our work will unambiguously build a better human | |||
society. In some cases, we will consciously decide to be neutral and | society. Sometimes, we will consciously be neutral and open-ended, | |||
open-ended, allowing the "tussle" among stakeholders to produce a | allowing the "tussle" among stakeholders to produce a range of | |||
range of results (see [TUSSLE] for further discussion). | results (see [TUSSLE] for further discussion). | |||
At the very least, however, we must examine our work for negative | At the very least, however, we must examine our work for negative | |||
impact on end users and take steps to mitigate it where encountered. | impact on end users and take steps to mitigate it where encountered. | |||
In particular, when we've identified a conflict between the interests | In particular, when we've identified a conflict between the interests | |||
of end users and other stakeholders, we should err on the side of | of end users and other stakeholders, we should err on the side of | |||
protecting end users. | protecting end users. | |||
Note that "negative impact on end users" is not defined in this | Note that "negative impact on end users" is not defined in this | |||
document; that is something that the relevant body (e.g., working | document; that is something that the relevant body (e.g., working | |||
group) needs to discuss and come to consensus on. Merely asserting | group) needs to discuss and come to consensus on. Merely asserting | |||
that something is harmful is not adequate. The converse is also | that something is harmful is not adequate. The converse is also | |||
true, though; it's not good practice to avoid identifying harms nor | true, though; it's not good practice to avoid identifying harms, nor | |||
is it acceptable to ignore them when brought to our attention. | is it acceptable to ignore them when brought to our attention. | |||
The IAB and IETF have already established a body of guidance for | The IAB and IETF have already established a body of guidance for | |||
situations where this sort of conflict is common, including (but not | situations where this conflict is common, including (but not limited | |||
limited to) [RFC7754] on filtering, [RFC7258] and [RFC7624] on | to) [RFC7754] on filtering, [RFC7258] and [RFC7624] on pervasive | |||
pervasive surveillance, [RFC7288] on host firewalls, and [RFC6973] | surveillance, [RFC7288] on host firewalls, and [RFC6973] regarding | |||
regarding privacy considerations. | privacy considerations. | |||
Much of that advice has focused on maintaining the end-to-end | Much of that advice has focused on maintaining the end-to-end | |||
properties of a connection [RFC3724]. This does not mean that our | properties of a connection [RFC3724]. This does not mean that our | |||
responsibility to end users stops there; decisions might affect them | responsibility to end users stops there; decisions might affect them | |||
in other ways. For example, data collection by various applications | in other ways. For example, data collection by various applications | |||
even inside otherwise secure connections is a major problem on the | even inside otherwise secure connections is a major problem on the | |||
Internet today. Also, inappropriate concentration of power on the | Internet today. Also, inappropriate concentration of power on the | |||
Internet has become a concerning phenomenon -- one that protocol | Internet has become a concerning phenomenon -- one that protocol | |||
design might have some influence upon. | design might have some influence upon. | |||
4.4. Handling Conflicting End-User Needs | 4.4. Handling Conflicting End-User Needs | |||
When the needs of different end users conflict (for example, two sets | When the needs of different end users conflict (for example, two sets | |||
of end users both have reasonable desires), we again should try to | of end users both have reasonable desires), we again should try to | |||
minimize negative impact. | minimize negative impact. | |||
For example, when a decision improves the Internet for end users in | For example, when a decision improves the Internet for end users in | |||
one jurisdiction, but at the cost of potential harm to others | one jurisdiction, but at the cost of potential harm to others | |||
elsewhere, that is not a good trade-off. As such, we effectively | elsewhere, that is not a good trade-off. As such, we design the | |||
design the Internet for the pessimal environment; if a user can be | Internet for the pessimal environment; if a user can be harmed, they | |||
harmed, they probably will be, somewhere. | probably will be, somewhere. | |||
There may be cases where genuine technical need requires compromise. | There may be cases where genuine technical need requires compromise. | |||
However, such trade-offs are carefully examined and avoided when | However, such trade-offs are carefully examined and avoided when | |||
there are alternate means of achieving the desired goals. If they | there are alternate means of achieving the desired goals. If they | |||
cannot be, these choices and reasoning ought to be thoroughly | cannot be, these choices and reasoning ought to be thoroughly | |||
documented. | documented. | |||
4.5. Deprioritizing Internal Needs | 4.5. Deprioritizing Internal Needs | |||
There are a number of needs that are very visible to us as | There are several needs that are very visible to us as specification | |||
specification authors but should explicitly not be prioritized over | authors but should explicitly not be prioritized over the needs of | |||
the needs of end users. | end users. | |||
These include convenience for document editors, IETF process matters, | These include convenience for document editors, IETF process matters, | |||
and "architectural purity" for its own sake. | and "architectural purity" for its own sake. | |||
5. IANA Considerations | 5. IANA Considerations | |||
This document has no IANA actions. | This document has no IANA actions. | |||
6. Security Considerations | 6. Security Considerations | |||
skipping to change at line 454 ¶ | skipping to change at line 453 ¶ | |||
and the Publisher Ecosystem (ESCAPE)", RFC 8752, | and the Publisher Ecosystem (ESCAPE)", RFC 8752, | |||
DOI 10.17487/RFC8752, March 2020, | DOI 10.17487/RFC8752, March 2020, | |||
<https://www.rfc-editor.org/info/rfc8752>. | <https://www.rfc-editor.org/info/rfc8752>. | |||
[TUSSLE] Clark, D., Sollins, K., Wroclawski, J., and R. Braden, | [TUSSLE] Clark, D., Sollins, K., Wroclawski, J., and R. Braden, | |||
"Tussle in Cyberspace: Defining Tomorrow's Internet", | "Tussle in Cyberspace: Defining Tomorrow's Internet", | |||
DOI 10.1145/633025.633059, August 2002, | DOI 10.1145/633025.633059, August 2002, | |||
<https://groups.csail.mit.edu/ana/Publications/PubPDFs/ | <https://groups.csail.mit.edu/ana/Publications/PubPDFs/ | |||
Tussle2002.pdf>. | Tussle2002.pdf>. | |||
IAB Members at the Time of Approval | ||||
Internet Architecture Board members at the time this document was | ||||
approved for publication were: | ||||
Jari Arkko | ||||
Alissa Cooper | ||||
Stephen Farrell | ||||
Wes Hardaker | ||||
Ted Hardie | ||||
Christian Huitema | ||||
Zhenbin Li | ||||
Erik Nordmark | ||||
Mark Nottingham | ||||
Melinda Shore | ||||
Jeff Tantsura | ||||
Martin Thomson | ||||
Brian Trammell | ||||
Acknowledgements | Acknowledgements | |||
This document was influenced by many discussions, both inside and | Many discussions influenced this document, both inside and outside of | |||
outside of the IETF and IAB. In particular, Edward Snowden's | the IETF and IAB. In particular, Edward Snowden's comments regarding | |||
comments regarding the priority of end users at IETF 93 and the HTML5 | the priority of end users at IETF 93 and the HTML5 Priority of | |||
Priority of Constituencies were both influential. | Constituencies were both influential. | |||
Many people gave feedback and input, including Harald Alvestrand, | Many people gave feedback and input, including Harald Alvestrand, | |||
Mohamed Boucadair, Stephen Farrell, Joe Hildebrand, Lee Howard, Russ | Mohamed Boucadair, Joe Hildebrand, Lee Howard, Russ Housley, Niels | |||
Housley, Niels ten Oever, Mando Rachovitsa, Martin Thomson, Brian | ten Oever, Mando Rachovitsa, John Klensin, and Eliot Lear. | |||
Trammell, John Klensin, Eliot Lear, Ted Hardie, and Jari Arkko. | ||||
Author's Address | Author's Address | |||
Mark Nottingham | Mark Nottingham | |||
Prahran VIC | ||||
Australia | ||||
Email: mnot@mnot.net | Email: mnot@mnot.net | |||
URI: https://www.mnot.net/ | URI: https://www.mnot.net/ | |||
End of changes. 30 change blocks. | ||||
75 lines changed or deleted | 94 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |