Re: [hrpc] Thoughts on the end-to-end principle and Human Rights

Fred Baker <fredbaker.ietf@gmail.com> Wed, 29 March 2017 15:13 UTC

Return-Path: <fredbaker.ietf@gmail.com>
X-Original-To: hrpc@ietfa.amsl.com
Delivered-To: hrpc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7B09127599 for <hrpc@ietfa.amsl.com>; Wed, 29 Mar 2017 08:13:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yh07girXmEGm for <hrpc@ietfa.amsl.com>; Wed, 29 Mar 2017 08:13:53 -0700 (PDT)
Received: from mail-it0-x244.google.com (mail-it0-x244.google.com [IPv6:2607:f8b0:4001:c0b::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AC6F129411 for <hrpc@irtf.org>; Wed, 29 Mar 2017 08:13:52 -0700 (PDT)
Received: by mail-it0-x244.google.com with SMTP id y18so10214344itc.2 for <hrpc@irtf.org>; Wed, 29 Mar 2017 08:13:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=LENOjGMoU6msAfrWHYBR0CV6nigN4kA5+bRtxxAFr5A=; b=KGAjZLUTImfVAg7cIioz3RE/h7aqbAoapoBC9Q227L8fM3a7nNHY7puACTV7Z3kePO CXlarwpgL85YHa3dDfCtF4KywkrUCqCFvY1ctISxtwMsYmXNpIP/3LjOJFGUBU7NtK94 Ud3WZCPEuPq8KamDhdeA/dUe7lz+3ZEP8i8qqoale9EJZeRbHIVi9g1wnS5w1jNgeSGE vNwoO2TXNbMsDL1FC0Z9HlBhUmXqy281p1c6hW5Lcx7uXgNdIcxLHpaaxdD2RV56pyVn UOV8lWKd6GMBsg5fTvB9AvqXG12/tkeM8QpWv++FAQyh6BYklKN/HCCxd5DvCza6rakw dfSg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=LENOjGMoU6msAfrWHYBR0CV6nigN4kA5+bRtxxAFr5A=; b=Nq3TEIY5+cgH0ix/fguCUbyg78R7L0Co4mbQPFHAv9B4XLGpe6Q2QfxWxHJBzJiAbw OCKqnGVfiAyOcYX3+AQ+Ltx+ozyZBihqQjppoKKzth5YInYRuvK6bmVOEfZBN2jJpyph SO1H5+eWgXbhKOyYY1xyXRh5eAgMuOzp9UB2bVrRDFb0VbWFANpjljScaT4G2RPiWsLB ndJtuWW63s090RIhQiM6pLalKHhedbCNQZTy5CYWy/QABYavxMn/XPpn13QxxGkHE1QV T8z60EUm1MLPy5Z5Kp8+jvABzPQQyq53aly++eCUVZ9qCViTAPzth+p+3DLTIOMbqxI+ xHrg==
X-Gm-Message-State: AFeK/H3qqHDzK+IGYx6jBE5WJlSNEfMi5qu3aYXkqyyf1ayf2RP3q2cFsnK0jULakclcyg==
X-Received: by 10.36.60.3 with SMTP id m3mr1298140ita.62.1490800431375; Wed, 29 Mar 2017 08:13:51 -0700 (PDT)
Received: from t2001067c037001281d80e1ac039912cf.v6.meeting.ietf.org (t2001067c037001281d80e1ac039912cf.v6.meeting.ietf.org. [2001:67c:370:128:1d80:e1ac:399:12cf]) by smtp.gmail.com with ESMTPSA id e191sm3448317ita.9.2017.03.29.08.13.50 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 29 Mar 2017 08:13:50 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
From: Fred Baker <fredbaker.ietf@gmail.com>
In-Reply-To: <f3b5d1a6-6b5f-bb60-ef4f-22f98b064387@kit.edu>
Date: Wed, 29 Mar 2017 10:13:49 -0500
Cc: draft-irtf-hrpc-research.all@ietf.org, hrpc@irtf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <16D3E756-64EE-405B-AB1F-035BD0FD4579@gmail.com>
References: <81A10909-149C-4054-958E-76779D941C3B@gmail.com> <f3b5d1a6-6b5f-bb60-ef4f-22f98b064387@kit.edu>
To: "Bless, Roland (TM)" <roland.bless@kit.edu>
X-Mailer: Apple Mail (2.3259)
Archived-At: <https://mailarchive.ietf.org/arch/msg/hrpc/bwn7q5wk6PbBoeiLdhdfP0mrDv8>
Subject: Re: [hrpc] Thoughts on the end-to-end principle and Human Rights
X-BeenThere: hrpc@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "niels@article19.org" <hrpc.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/hrpc>, <mailto:hrpc-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hrpc/>
List-Post: <mailto:hrpc@irtf.org>
List-Help: <mailto:hrpc-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hrpc>, <mailto:hrpc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Mar 2017 15:13:55 -0000

> On Mar 29, 2017, at 6:50 AM, Bless, Roland (TM) <roland.bless@kit.edu> wrote:
> 
> Hi Fred,
> 
> I think you made a very good point about rights, responsibilities,
> and an Internet of Things without humans in the loop. I'd like to
> expand a bit on the potential role of the end-to-end argument in this
> context.
> 
> If I understood you correctly, you are interpreting the "end-to-end
> principle" more in the direction of transport "Transparency" (see also
> https://tools.ietf.org/rfc/rfc2775.txt) and I'm not sure that I can
> derive it from the actual paper here:
> http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf

I'm keying off the abstract ("The principle, called the end-to-end argument, suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level."). The other statement in the document is in the introductory text, and is quoted in RFC 1958: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible. (Sometimes an incomplete version of the function provided by the communication system may be useful as a performance enhancement.)" I observe that Internet Routing, both IGP and BGP, operate within the network at the network layer rather than finding help from the application, which it calls the "host", and therefore is not consistent with that version of the argument.

If one agrees with the common statement that network address translation or filtering of routes and traffic violate the end-to-end principle, then transparency is critical to the end-to-end principle.

> To me it's a minimality principle that suggests to avoid putting
> application-dependent functions into the network (the paper also
> speaks of a "kind of Occam's Razor" in the conclusion). Otherwise
> the network would become unnecessarily complex and in the end, the
> network may not have enough knowledge to make the correct decision
> anyway. Consequences are higher robustness, broader application support
> and easier innovation, because you don't need to change the network in
> case of new applications.

I would suggest that you read a couple of books like Russ White's "The Art of Network Architecture: Business-Driven Design (Networking Technology)" or Bill Norton's "The Internet Peering Playbook: Connecting to the Core of the Internet", and then comment on how simple the Internet is...

> I think that the draft - among others - tries to point out that some
> human rights may be affected adversely depending on how protocols are
> designed and networks are operated. One suggestion is to use a
> (protocol) design that minimizes such potential interference. IMHO
> finding potential impacts is difficult and the draft wants to provide
> some guidance.

I'm not sure that I disagree with that. However, it's fairly easy to say "Firewall X prevents free speech" or "Route filtering in BGP Routing can be used to prevent connectivity, and is commonly used for that purpose with low reputation networks". It is also largely vacuous from the perspective of someone writing a protocol. Yes, things can be abused - anything can be abused. One RFC that I co-authored, https://www.rfc-editor.org/rfc/rfc3924.txt, was explicitly written because of that - it required an audit trail when lawful intercept technology is in use, because once it exists (and governments worldwide mandate its existence) the tool can be used by anyone - and there are known cases in which it has been used by organized crime and state actors (RFC 7528). That said, how might that consideration apply to RFC 3315 (MIB for Frame Relay) or the interconnect architecture (RFC 2427)? RFC 6018 (Greynets)? When I talk about "60 RFCs", one of those is RFC 3924; the rest are pretty deeply technical, along the lines of RFCs 2427 or 6018.

As I said, I am pretty comfortable talking about responsibilities. In the RFC 6018 context, if I have traffic in my network that acts like attack traffic, I could argue that the network (its technology and its administration) have a responsibility to protect users and equipment, and the network element implementing the Greynet technology has the responsibility to *only* interdict that traffic. I might go so far as to say that a low reputation link or route usually has a low reputation because that responsibility has been abrogated, and the argument for restoring its reputation has to do with an inaccurate verdict or a change in behavior. Stating that in terms of the UNDP - I could probably twist something until it resembled a relevant statement, but it would not be a straightforward application of those concepts. 

Responding to a previous comment, yes, rights probably imply duties, but I'm not at all sure that duties imply rights. The argument that has to be made is that responsibilities imply rights worded in ways found in the UNDP. Contracts, in this case, imply duties, and business imperatives imply duties. But I'm not convinced that they imply rights, or are driven by rights.