<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 3.1.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-04" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title>Centralization, Decentralization, and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-04"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <t>Despite being designed and operated as a decentralized network-of-networks, the Internet is continuously subjected to forces that encourage centralization.</t>
      <t>This document offers a definition of centralization, explains why it is undesirable, identifies different types of it, catalogues limitations of common approaches to decentralization, and explores what Internet standards efforts can do to address it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. Originating in a desire to prevent a single technical failure from having a wide impact <xref target="RAND"/>, this stance has also enabled the Internet's rapid adoption and broad spread. The Internet can accommodate a spectrum of requirements and is now positioned as a global public good because joining, deploying an application on, or using the Internet does not require permission from or ceding control to another entity.</t>
      <t>While avoiding centralization of the Internet remains a widely shared goal, achieving it consistently has proven difficult. Today, many successful protocols and applications on the Internet operate in a centralized fashion -- to the point where some proprietary, centralized services have become so well-known that they are commonly mistaken for the Internet itself. Even when protocols incorporate techniques intended to prevent centralization, economic and social factors can drive users to prefer centralized solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural regulation -- in particular, that performed by open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling Internet centralization. This document discusses aspects of centralization that relate to Internet standards efforts, and argues that while the IETF may not be able to prevent centralization, there are still meaningful steps we can take to counteract it.</t>
      <t><xref target="centralization"/> defines centralization, explains why it is undesirable, and surveys some kinds of centralization seen on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant techniques, along with their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding centralization and mitigating its effects.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. However, designers of proprietary protocols can benefit from considering aspects of centralization, especially if they intend their protocol to be considered for eventual standardisation. Likewise, policymakers can use this document to help identify and remedy inappropriately centralized protocols and applications.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization</name>
      <t>This document defines "centralization" as the ability of a single entity or a small group of them to exclusively observe, capture, control, or extract rent from the operation or use of an Internet function.</t>
      <t>Here, "entity" could be a single person, a corporation, or a government. It does not include an organisation that operates in a manner that effectively mitigates centralisation (see, e.g., <xref target="multi"/>).</t>
      <t>"Internet function" is defined broadly. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>However, the Internet's functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to centralization -- for example, social networking, file sharing, financial services, and news dissemination. Likewise,  networking equipment, hardware, operating systems, and software act as enabling technologies that can exhibit centralization. The supply of Internet connectivity itself can also be subject to the forces of centralization.</t>
      <t>Centralization is not a binary condition; it is a continuum. At one extreme, a function completely controlled by a single entity (see <xref target="direct"/>) represents complete centralization; at the other extreme, a hypothetical Internet where any two parties can realize that function's value without the possibility of any external interference or influence represents completely decentralization.</t>
      <t>While both ends of this spectrum might already be occupied by selected functions, most reside somewhere between the extremes. Therefore, it is often useful to consider the <em>centralization risk</em> associated with a function, depending on the scale, scope, and nature of the influences on it. Note that a function might have more than one source of centralization risk.</t>
      <t>Centralization risk is strongest when it affects the entire Internet. However, it can also be present when a substantial portion of the Internet's users lack options for a function. For example, if there is only one provider for a function in a region or legal jurisdiction, that function is effectively centralized for those users.</t>
      <t>Centralization risk is also present when there is friction against switching to a substitute provider of a function, because it is conducive to concentration (see <xref target="indirect"/>). For example, if switching requires a significant amount of time, resources, expertise, coordination, loss of functionality, or effort, centralization risk is indicated. Conversely, a function based on a well-defined, open specification designed to minimize switching costs might be considered to have less centralization risk even when there are only a few large providers.</t>
      <t>Note that availability is related to but distinct from centralization. For example, a large variety of Web sites might depend upon a cloud hosting provider or content delivery network; if it were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted. Likewise, a mobile Internet access provider might have an outage that affects hundreds, thousands, or more of its users. In both cases, centralization is not engaged by the loss of availability or its scale, but it well might be if the parties relying on the function don't have reasonable options to switch to if they are unhappy with the availability of the service provided, or if friction against switching to an alternative is too great.</t>
      <t>Also, it is important to distinguish centralization from anti-competitive concerns (also known as "anti-trust"). While there are many interactions between these concepts and making the Internet more competitive may be a motivation for avoiding centralization, only courts have the authority to define a relevant market and determine that behaviour is anti-competitive. That said, successful mitigation or avoidance of centralization can help forestall the need for regulator action, which is better for the Internet, not least because competition regulation is applied on a jurisdiction-by-jurisdiction basis, not globally.</t>
      <section anchor="why">
        <name>Why Centralization is Undesirable</name>
        <t>At a high level, there are three major reasons why centralization of Internet functions is concerning.</t>
        <t>First, the Internet's very nature is incompatible with centralization. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
        <t>Second, when a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behaviour (the "panopticon effect") and shaping or even denial of behaviour (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="WEAPONIZED-INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be concentrated in one place.</t>
        <t>Finally, centralization of a function can have deleterious effects on the Internet itself, including:</t>
        <ul spacing="normal">
          <li>
            <em>Limiting Innovation</em>: Centralization can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraining Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a centralized service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
          <li>
            <em>Reducing Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While centralized services' availability can benefit from the focused attention that their elevated role requires, failure of a large, centralized provider can have a disproportionate impact on availability.</li>
          <li>
            <em>Creating Monoculture</em>: The scale available to a centralized service or application can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in these functions' implementation leads to a more robust outcome when viewed systemically. <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized service's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>See also <xref target="TECH-SUCCESS-FACTORS"/> for further exploration of how centralization can affect the Internet.</t>
      </section>
      <section anchor="kinds">
        <name>Kinds of Centralization</name>
        <t>Centralization on the Internet is not uniform; it presents in a variety of ways, depending on its relationship to the function in question and underlying causes. The subsections below describe different aspects of Internet centralization.</t>
        <section anchor="direct">
          <name>Proprietary Centralization</name>
          <t>Creating of a protocol or application with a fixed role for a specific party is the most straightforward kind of centralization. Currently, many messaging, videoconferencing, chat, social networking, and similar applications operate in this fashion.</t>
          <t>Because they allow control by a single entity, proprietary protocols are often considered simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, compared to decentralized alternatives. However, they have corresponding centralization risk -- if the function has no alternative providers, or switching to those providers is too difficult, its users are "locked in."</t>
          <t>Proprietary protocols and applications are not considered as being part of the Internet per se; instead, they are more properly characterized as being built on top of the Internet. The Internet architecture and associated standards do not regulate them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
        </section>
        <section anchor="necessary">
          <name>Beneficial Centralization</name>
          <t>Some protocols and applications have goals that require the introduction of a centralized function. In doing so, they are explicitly relying on centralization to deliver a particular benefit.</t>
          <t>For example, a function that needs a single, globally coordinated "source of truth" is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
          <t>Another function exhibiting beneficial centralization is IP addresses allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company captured the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the need for coordination in the Web's trust model brings centralization risk, because of the Certificate Authority's role in communication between clients and servers.</t>
          <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also suffer from this kind of centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function has centralization risk.</t>
          <t>Likewise, when a function requires governance to realize common goals and protect minority interests, a "choke point" is naturally formed by the chosen governance mechanism, increasing centralization risk. For example, defining and applying a content moderation policy both have centralization risk.</t>
          <t>Deciding what is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. Such judgments should be made in light of established architectural principles and how benefits accrue to end users.</t>
          <t>When beneficial centralization is present, Internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) and multi-stakeholder governance (see <xref target="multi"/>). Protocols that successfully mitigate beneficial centralization are often reused, to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
        </section>
        <section anchor="indirect">
          <name>Concentrated Centralization</name>
          <t>Even when a function avoids proprietary centralization and any beneficial centralization has been mitigated, it might become centralized in practice when external factors influence its deployment, so that few or even just one entity provides the function. This is often referred to as "concentration." Economic, legal, and social factors that encourage use of a central function despite the absence of such a requirement in the protocol itself can cause concentration.</t>
          <t>Often, the factors driving concentration are related to the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks,<xref target="SCALE-FREE"/> network effects award asymmetric power to nodes that act as intermediaries to communication.</t>
          <t>For example, social networking is an application that is currently supplied by a few proprietary platforms despite standardization efforts (see, e.g., <xref target="ACTIVITYSTREAMS"/>), because of the powerful network effects associated. While there has been some competition in social networking, a group of people who wish to communicate are often locked in by the choices that their peers make, because of the coordination required to move to a new service.</t>
          <t>Concentration is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
        </section>
        <section anchor="network">
          <name>Inherited Centralization</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" protocols and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, the network between endpoints can introduce centralization risk to application-layer protocols, because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, creating pressure to use other services, which can cause their centralization.</t>
          <t>Likewise, having only a single implementation of a protocol is an inherited centralization risk, because applications that use it are vulnerable to the control it has over their operation. Even if it is Open Source, there might be inherited centralization if there are factors that make forking difficult (for example, the cost of maintaining that fork).</t>
          <t>Inherited centralization is often present when network effects restrict choices, but can also be created by legal mandates and incentives that restrict the options for a function (such as Internet access), its provision, or the range of implementations available.</t>
          <t>Some kinds of inherited centralization can be prevented by enforcing layer boundaries through use of techniques like encryption. When the number of parties who have access to content of communication are limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other traffic.</t>
          <t>Note that the prohibitive effect of encryption on inherited centralization is most pronounced when most (if not all) traffic is encrypted. See also <xref target="RFC7258"/>.</t>
        </section>
        <section anchor="platform">
          <name>Platform Centralization</name>
          <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate centralization in the applications it supports.</t>
          <t>For example, HTTP <xref target="HTTP"/> is not considered a centralized protocol; interoperable servers are  easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above.</t>
          <t>However, applications built on top of HTTP (as well as the rest of the "Web Platform") often exhibit centralization (for example, social networking). HTTP is therefore an example of a platform for centralization -- while the protocol itself is not centralized, it facilitates the creation of centralized services and applications.</t>
          <t>Like concentration, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, often in a way that it becomes attractive to form a dependency on one party's operation.</t>
        </section>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>"Decentralization" is the process of identifying the centralization risk associated with a function, followed by the application of techniques to reduce or mitigate it.</t>
      <t>Assessing centralization risk is a case-by-base exercise that depends on the specifics of the function, surrounding circumstances, and the nature of the centralization risk.</t>
      <t>Choosing the appropriate techniques for decentralization requires balancing the goals of the function against centralization risk, because completely precluding all forms of centralization through technical means is rarely achievable.</t>
      <t>Notably, decentralization does not require that provision of a function need be distributed in a particular fashion, or to a particular degree. For example, the Domain Name System <xref target="RFC1035"/> is widely agreed to have acceptable centralization risk, despite it being provided by a limited set of entities.</t>
      <t>When performed properly, decentralization might produce an outcome that still has centralization risk, but that risk should be understood, acceptable, and, where possible and appropriate, mitigated.</t>
      <section anchor="techniques">
        <name>Decentralization Techniques</name>
        <t>Over time, the Internet community has developed various techniques to avoid concentration of power in protocols, or to bring accountability when it is unavoidable.</t>
        <t>While using these techniques can reduce centralization risk or make a function less amenable to some kinds of centralization, they are not adequate to avoid centralization completely. They are also not indicators of whether a protocol is centralized without further analysis.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>A widely known technique for managing centralization in Internet protocols is federation -- designing them in such a way that new instances of any centralized function are easy to create and can maintain interoperability and connectivity with other instances.</t>
          <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that have centralization risk:</t>
          <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
            <li>Routing messages to the user, even when they change network locations or become disconnected for long periods of time.</li>
          </ol>
          <t>E-mail reuses DNS to help mitigate the first risk. To mitigate the second, it defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
          <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, running your own mail server has become difficult, because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, concentrating the protocol's operation (see <xref target="indirect"/>).</t>
          <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
          <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can be a useful technique to avoid proprietary centralization and manage beneficial centralization, it does not prevent concentration or platform centralization. If a single entity can capture the value provided by a protocol, they may use the protocol as a platform to get a "winner take all" outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally "tilt the table" towards a few operators.</t>
        </section>
        <section anchor="multi">
          <name>Multi-Stakeholder Governance</name>
          <t>Protocol designers sometime mitigate the risks associated with a beneficial centralized function (see <xref target="necessary"/>) by delegating that function's governance to a multi-stakeholder body -- an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS, which as a "single source of truth" exhibits beneficial centralization in its naming function, as well as the operation of the system overall. To mitigate operational centralization, multiple root servers that are administered by separate operators (themselves diverse in geography) and a selection of corporate entities, non-profits, and government bodies from many jurisdictions and affiliations carry this task out.The name space itself is administered by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To assure that all parties meet the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>Yet another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
          <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="LEGITIMACY-MULTI"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to centralization issues. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalise about their properties.</t>
          <t>These techniques attempt to avoid centralization risk by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Use of these techniques can create barriers to proprietary and inherited centralization. However, depending upon the application in question, both concentration and platform centralization are still possible.</t>
          <t>Furthermore, distributed consensus technologies have several potential shortcomings that may make them inappropriate -- or at least difficult to use -- for many Internet applications, because their use conflicts with other important goals:</t>
          <ol spacing="normal" type="1"><li>Distributed consensus has significant implications for privacy. Because user activity (such as queries or transactions) is shared with many unknown parties (and often publicly visible due to the nature of the blockchain) they have very different privacy properties than traditional client/server protocols. Potential mitigations (e.g., Private Information Retrieval; see, e.g., <xref target="PIR"/>) are still not suitable for broad deployment.</li>
            <li>Their complexity and "chattiness" typically result in significantly less efficient use of the network (often, to several orders of magnitude). When distributed consensus protocols use proof-of-work, energy consumption can become significant (to the point where some jurisdictions have banned its use).</li>
            <li>Distributed consensus protocols are still not proven to scale to the degree expected of successful Internet protocols. In particular, relying on unknown third parties to deliver functionality can introduce significant variability in latency, availability, and throughput. This is a marked change for applications with high expectations for these properties (e.g., consumer-oriented Web sites).</li>
            <li>By design, distributed consensus protocols diffuse responsibility for a function among several difficult-to-identify parties. While this may be an effective way to prevent some kinds of centralization, it also means that making someone accountable for how the function is performed is difficult, and often impossible. While the protocol might use cryptographic techniques to assure correct operation, they may not capture all requirements, and may not be correctly used by the protocol designers.</li>
            <li>Distributed consensus protocols typically rely on cryptography for identity, rather than trusting a third party's assertions about identity. When a participant loses their keys, the process of recovering their identity exposes additional centralization risk.</li>
          </ol>
          <t>It is also important to recognise that a protocol or an application can use distributed consensus for some functions, but still have centralization risk elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents centralization risk, just at a different layer (inherited or platform).</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against uncritically relying upon these technologies to avoid centralization.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Because permissionless innovation is a core value for the Internet, and yet much of the centralization seen on the Internet is performed by proprietary platforms that take advantage of this nature, the controls available to standards efforts are very limited.</t>
      <t>While standards bodies on their own cannot prevent centralization, there are meaningful steps that can be taken to prevent some functions from exhibiting centralization. There are also valuable contributions that standards efforts can make to other relevant forms of regulation.</t>
      <section anchor="target">
        <name>Be Realistic</name>
        <t>Some kinds of centralization risk are easy to manage in standards efforts. For example, if a proprietary protocol were to be proposed to the IETF, it would be rejected out of hand. There is a growing body of knowledge and experience with beneficial centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization, and has become the norm in standard protocols. These responses are appropriate ways for Internet standards to manage centralization risk.</t>
        <t>However, mitigating concentration and platform centralization is much more difficult in standards efforts. Because we have no "protocol police", it's not possible to demand that someone stop building a proprietary service using a purportedly federated protocol. We also cannot stop someone from building centralized services "on top" of standard protocols without abandoning architectural goals like permissionless innovation.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent centralization risk -- especially for concentration and platform risks -- is unlikely to be effective in preventing Internet centralization. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- exhibit concentration or platform centralization. Refusing to standardize a newer protocol because it faces similar risks would not be equitable, proportionate, or effective.</t>
        <t>When we find centralization risk, we should consider its relationship with other architectural goals as we consider how to address it. In particular, attention should be paid to how effective standards (as a form of architectural regulation) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some kinds of centralization are likely better addressed through legal regulation. Thus, as a first order concern, a standards effort balancing these concerns might focus primarily on privacy. However, often these are not completely separable goals -- concentration can result in one or a few entities having greater volume and variety of data available exclusively to them, raising significant privacy and security concerns.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>It is worthwhile to create specifications for functions that are currently only satisfied by proprietary providers. By building open specifications on top of already established standards, an alternative to a centralized function can be created.</t>
        <t>A common objection to such efforts is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) have been available for some time without broad adoption by social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and regulators around the globe are now focusing their efforts on the Internet. In particular, legal mandates for interoperability are increasingly discussed as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, emerging regulation presents an opportunity to create new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>.</t>
        <t>Successfully creating standards that work in concert with legal regulation is new ground for the IETF, presents many potential pitfalls, and will require new capabilities (especially liaison, likely originating in the IAB) and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet's architectural goals.</t>
      </section>
      <section anchor="new">
        <name>Evaluate New Decentralization Techniques</name>
        <t>The decentralization techniques listed in <xref target="techniques"/> are not a closed set; wide interest has spurred development of new approaches, both in general and as solutions to specific problems.</t>
        <t>For example, secure multi-party computation techniques (see, e.g., <xref target="YAO"/>) can be composed to allow parties to compute over private inputs without revealing them. Protocols like <xref target="ENPA"/> and <xref target="PRIO"/> use them to limit the information available to participants in protocols to realise privacy goals; as discussed in <xref target="intermediation"/> doing so might also counteract some kinds of centralization. However, such systems often still require trust, even if it is limited. That might cause other forms of centralization.</t>
        <t>Whether use of these techniques (or others) can meaningfully counteract centralization is still uncertain. Standards bodies (including the IETF) can serve an important function by incubating them, applying (and, where necessary, developing) architectural guidelines for privacy, security, operability, and other goals, and assuring interoperability. When appropriate, publication on the standards track or as experimental can signal implementers, users, and regulators about their fitness.</t>
      </section>
      <section anchor="balance">
        <name>Build Robust Ecosystems</name>
        <t>To minimize inherited centralization risk, standards-defined functions should have an explicit goal of broad, diverse implementation and deployment so that users have as many choices as possible.</t>
        <t><xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>This goal can also be furthered by ensuring that the cost of switching to a different implementation or deployment is as low as possible to facilitate subsequent substitution. This implies that the standard is functionally complete and specified precisely enough to result in meaningful interoperability.</t>
        <t>The goals of completeness and diversity are sometimes in tension. If a standard is extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not offer enough functionality to be complete, and the resulting proprietary extensions may make switching difficult (see <xref target="evolution"/>).</t>
        <t>Also worthy of attention are the underlying incentives for implementation. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
        <t>Balancing these factors to build robust ecosystems is difficult, but is often helped by community building and good design -- in particular, appropriate use of layering. It also requires continuing maintenance and evolution of protocols, to assure that they are still relevant and appropriate to their use.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are performed by a third party in communication. When used well, adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a Content Delivery Network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing a new party to communication adds concentration and platform centralization risk to Internet protocols, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control these types of centralization, designing protocols with thoughtful constraints on third party functions can prevent at least the most egregious outcomes.</t>
        <t>Most often, third parties are added to protocols as "intermediaries" or in designated "agent" roles. In general, they should only be interposed because of the positive action of at least one endpoint, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization risk associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Target Extensibility</name>
        <t>An important feature of Internet protocols is their ability to evolve, so that they can meet new requirements and adapt to new conditions without requiring a "flag day" to upgrade implementations. Typically, protocols accommodate evolution through extension mechanisms, which allow optional features to be added over time in an interoperable fashion.</t>
        <t>Extensibility can be viewed as a mechanism for decentralization as well -- by allowing uncoordinated evolution, it promotes autonomy and adaption of a function for local needs. However, protocol extensions can also increase the risk of platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard protocol. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favouring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a "framework" where interoperability is not immediately available.  Internet protocols should not make every aspect of their operation extensible; extension points should be reasoned, appropriate boundaries for flexibility and control. When a protocol defines extension points, they should not allow an extension to declare itself to be mandatory-to-interoperate, as that pattern invites abuse.</t>
        <t>Where extensions are allowed, attention should be paid to those that emerge; where appropriate, widely adopted extensions should be put through a standards process to assure that the result adheres to architectural principles and shared goals (see also <xref target="up"/>).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. However, failure to consider centralization risks might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="Roy T. Fielding">
            <organization>Adobe</organization>
          </author>
          <author fullname="Mark Nottingham">
            <organization>Fastly</organization>
          </author>
          <author fullname="Julian Reschke">
            <organization>greenbytes GmbH</organization>
          </author>
          <date day="12" month="September" year="2021"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.

 This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" initials="N." surname="Mitra">
            <organization/>
          </author>
          <author fullname="Yves Lafon" initials="Y." surname="Lafon">
            <organization/>
          </author>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="World Wide Web Consortium Recommendation" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
        <refcontent>SCIENCE, Vol. 286, No. 15, p. 509</refcontent>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="WEAPONIZED-INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="LEGITIMACY-MULTI" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2149165">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="PIR" target="https://link.springer.com/chapter/10.1007/978-3-642-27576-0_13">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://wayback.archive-it.org/12090/20191129202059/https://ec.europa.eu/commission/commissioners/2014-2019/vestager/announcements/defending-competition-digitised-world_en">
        <front>
          <title>Defending Competition in a Digitised World, Address at the European Consumer and Competition Day</title>
          <author initials="M." surname="Vestager" fullname="Margrethe Vestager">
            <organization/>
          </author>
          <date year="2019" month="April"/>
        </front>
      </reference>
      <reference anchor="TECH-SUCCESS-FACTORS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="James Snell" initials="J." surname="Snell">
            <organization/>
          </author>
          <author fullname="Evan Prodromou" initials="E." surname="Prodromou">
            <organization/>
          </author>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="World Wide Web Consortium CR" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="YAO" target="https://dl.acm.org/doi/10.5555/1382436.1382751">
        <front>
          <title>Protocols for secure computations</title>
          <author initials="A. C." surname="Yao" fullname="Andrew C. Yao">
            <organization/>
          </author>
          <date year="1982" month="November"/>
        </front>
        <refcontent>SFCS '82</refcontent>
      </reference>
      <reference anchor="ENPA" target="https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ENPA_White_Paper.pdf">
        <front>
          <title>Exposure Notification Privacy-preserving Analytics (ENPA) White Paper</title>
          <author>
            <organization>Apple</organization>
          </author>
          <author>
            <organization>Google</organization>
          </author>
          <date year="2021" month="April"/>
        </front>
      </reference>
      <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
        <front>
          <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
          <author initials="H." surname="Corrigan-Gibbs" fullname="Henry Corrigan-Gibbs">
            <organization/>
          </author>
          <author initials="D." surname="Boneh" fullname="Dan Boneh">
            <organization/>
          </author>
          <date year="2017" month="March"/>
        </front>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="7"/>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95" target="https://www.rfc-editor.org/info/bcp95">
        <!-- reference.RFC.3935.xml -->
<reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
              <organization/>
            </author>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <author fullname="T. Verma" initials="T." surname="Verma">
            <organization/>
          </author>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="7" month="March" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-03"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Thanks to Jari Arkko, Christian Huitema, Eliot Lear, and Martin Thomson for their comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
