[hrpc] New draft glossary

Niels ten Oever <niels@article19.org> Thu, 17 September 2015 21:51 UTC

Return-Path: <niels@article19.org>
X-Original-To: hrpc@ietfa.amsl.com
Delivered-To: hrpc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67F451A87E2 for <hrpc@ietfa.amsl.com>; Thu, 17 Sep 2015 14:51:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.323
X-Spam-Level: **
X-Spam-Status: No, score=2.323 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, HOST_EQ_NL=1.545, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ClVHtECcLEZo for <hrpc@ietfa.amsl.com>; Thu, 17 Sep 2015 14:51:29 -0700 (PDT)
Received: from mail.article19.io (vps784.greenhost.nl [213.108.108.114]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 287531A87C0 for <hrpc@irtf.org>; Thu, 17 Sep 2015 14:51:29 -0700 (PDT)
Received: from mail.article19.io (localhost [127.0.0.1]) by mail.article19.io (Postfix) with ESMTPS id 026B119C00B for <hrpc@irtf.org>; Thu, 17 Sep 2015 21:51:28 +0000 (UTC)
Received: from mail.article19.io (localhost [127.0.0.1]) by mail.article19.io (Postfix) with ESMTPS id E33AD19C00A for <hrpc@irtf.org>; Thu, 17 Sep 2015 21:51:27 +0000 (UTC)
Received: from [192.168.1.65] (sd5112335.adsl.online.nl [213.17.35.53]) by mail.article19.io (Postfix) with ESMTPSA id D016719C000 for <hrpc@irtf.org>; Thu, 17 Sep 2015 21:51:27 +0000 (UTC)
Message-ID: <55FB35DF.2010903@article19.org>
Date: Thu, 17 Sep 2015 23:51:27 +0200
From: Niels ten Oever <niels@article19.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.8.0
MIME-Version: 1.0
To: "hrpc@irtf.org" <hrpc@irtf.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/hrpc/nIFDcjPNdo2Fp69wJaiIZX7LpIs>
Subject: [hrpc] New draft glossary
X-BeenThere: hrpc@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "niels@article19.org" <hrpc.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/hrpc>, <mailto:hrpc-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hrpc/>
List-Post: <mailto:hrpc@irtf.org>
List-Help: <mailto:hrpc-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hrpc>, <mailto:hrpc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Sep 2015 21:51:32 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Looking forward to the discussion! For a more readable format, check
here: http://digitaldissidents.org/draft-glossary.html

For changes I also accept pull requests at
https://github.com/nllz/IRTF-HRPC/blob/master/draft-glossary.md but
let's have the discussion on the list instead of on Github.

- ---
title: Human Rights Protocol Considerations Glossary
abbrev: hrpcg
docname: draft-dkg-hrpc-glossary-01
category: info

ipr: trust200902
area: General
workgroup: Human Rights Protocol Considerations Research Group
keyword: Internet-Draft
stand_alone: yes
pi:
  rfcedstyle: yes
  toc: yes
  tocindent: yes
  sortrefs: yes
  symrefs: yes
  strict: yes
  comments: yes
  inline: yes
  text-list-symbols: -o*+

author:
- -
       ins: D. K. Gillmor
       name: Daniel Kahn Gillmor
       organization: ACLU
       email: dkg@fifthhorseman.net
- -
       ins: N. ten Oever
       name: Niels ten Oever
       organization: Article19
       email: niels@article19.org
- -
       ins: A. Doria
       name: Avri Doria
       organization: APC
       email: avri@apc.org


normative:

informative:
   RFC0760:
   RFC0791:
   RFC0793:
   RFC1122:
   RFC1958:
   RFC2606:	
   RFC2775:
   RFC3724:
   RFC4084:
   RFC4949:
   RFC6973:


   UDHR:
     title: The Universal Declaration of Human Rights
     date: 1948
     author:
        org: United Nations General Assembly
     target:  http://www.un.org/en/documents/udhr/

   ICCPR:
     title: International Covenant on Civil and Political Rights
     date: 1976
     author:
        org: United Nations General Assembly
     target: http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.asp
x

   Berners-Lee:
     title: Weaving the Web,
     author:
       - ins: T. Berners-Lee
       - ins: M. Fischetti
     seriesinfo:
       HarperCollins: p 208
     date: 1999

   Saltzer:
     title: End-to-End Arguments in System Design
     author:
       - ins: J.H. Saltzer
       - ins: D.P. Reed
       - ins: D.D. Clark
     seriesinfo: ACM TOCS, Vol 2, Number 4, November
        1984, pp 277-288.
     date: 1984

   Clark:
     title: The Design Philosophy of the DARPA Internet Protocols
     author:
       - ins: D. Clark
     seriesinfo: Proc SIGCOMM 88, ACM CCR Vol 18, Number 4, August
        1988, pp. 106-114.
     date: 1988

   Blumenthal:
     title: "Rethinking the design of the Internet: The end-to-end
arguments vs. the brave new world"
     author:
       - ins: M. Blumenthal
       - ins: D.D. Clark
     seriesinfo: ACM Transactions on Internet Technology, Vol. 1, No.
1, August 2001, pp 70-109.
     date: 2001

   WP-Stateless:
     title: Stateless protocol
     target: https://en.wikipedia.org/wiki/Stateless_protocol

   WP-Debugging:
     title: Debugging
     target: https://en.wikipedia.org/wiki/Debugging

   ID:
     title: Proposal for research on human rights protocol consideration
s
     date: 2015
     author:
        - ins: N. ten Oever
        - ins: A. Doria
        - ins: J. Varon
     target: http://tools.ietf.org/html/draft-doria-hrpc-proposal

   FIArch:
     title: Future Internet Design Principles
     date: January 2012
     target:
http://www.future-internet.eu/uploads/media/FIArch_Design_Principles_V1.
0.pdf

   Elahi:
     title: "CORDON - A taxonomy of Internet Censorship Resistance
Strategies"
     author:
       - ins: T. Elahi
       - ins: I. Goldberg
     target: http://cacr.uwaterloo.ca/techreports/2012/cacr2012-33.pdf
     date: 2012

- --- abstract

This document presents a glossary of terms used to map between
concepts common in human rights discussions and engineering
discussions.  It is intended to facilitate work by the proposed Human
Rights Protocol Considerations research group, as well as other
authors within the IETF.

- --- middle


Introduction
============

    "There's a freedom about the Internet: As long as we accept the
       rules of sending packets around, we can send packets containing
       anything to anywhere."

{{Berners-Lee}}

The Human Rights Protocol Consideration Proposed Research Group aims
to research whether standards and protocols can enable, strengthen or
threaten human rights, as defined in the Universal Declaration of
Human Rights {{UDHR}} and the International Covenant ons Civil and
Political Rights {{ICCPR}}, specifically, but not limited to the
right to freedom of expression and the right to freedom of assembly.

Comunications between people working on human rights and engineers
working on Internet protocols can be improved with a shared vocabulary.

This document aims to provide a shared vocabulary to facilitate
understanding of the intersection between human rights and Internet
protocol design.

Discussion on this draft at: hrpc@irtf.org //
https://www.irtf.org/mailman/admindb/hrpc

This document builds on the previous IDs published within the
framework of the proposed hrpc research group {{ID}}

Glossary
========

In the analysis of existing RFCs central design and technical concepts
have been found which impact human rights.  This is an initial
glossary of concepts that could bridge human rights discourse and
technical vocabulary. These definitions should be improved and further
aligned with existing RFCs.

Accessibility
: Full Internet Connectivity as described in {{RFC4084}} to provide
unfettered access to the Internet

: The design of protocols, services or implementation that provide an
enabling environment for people with disabilities.

: The ability to receive information available on the Internet

Anonymity
: The condition of an identity being unknown or concealed. {{RFC4949}}

Anonymous
: A state of an individual in which an observer or attacker cannot
identify the individual within a set of other  individuals (the
anonymity set). {{RFC6973}}

Authenticity
: The act of confirming the truth of an attribute of a single piece of
data or entity.

Censorship resistance
: Methods and measures to prevent Internet censorship.

Confidentiality
: The non-disclosure of information to any unintended person or host
or party

Connectivity
: The extent to which a device or network is able to reach other
devices or networks to exchange data. The Internet is the tool for
providing global connectivity {{RFC1958}}.

Content-agnosticism
: Treating network traffic identically regardless of content.

Debugging
: Debugging is a methodical process of finding and reducing the number
of bugs, or defects, or malfunctions in a protocol or its
implementation, thus making it behave as expected and analyse the
consequences that might have emanated from the error. Debugging tends
to be harder when various subsystems are tightly coupled, as changes
in one may cause bugs to emerge in another. {{WP-Debugging}}

: The process through which people troubleshoot a technical issue,
which may include inspection of program source code or device
configurations. Can also include tracing or monitoring packet flow.

Decentralized
: Opportunity for implementation or deployment of standards, protocols
or systems without a single point of control.

End-to-End
: The principal of extending characteristics of a protocol or system
as far as possible within the system. For example, end-to-end instant
message encryption would conceal communications from one user's
instant messaging application through any intermediate devices and
servers all the way to the recipient's instant messaging application.
If the message was decrypted at any intermediate point--for example at
a service provider--then the property of end-to-end encryption would
not be present.

: One of the key architectural guidelines of the Internet is the
end-to-end principle in the papers by Saltzer, Reed, and Clark
{{Saltzer}} {{Clark}}. The end-to-end principle was originally
articulated as a question of where best not to put functions in a
communication system. Yet, in the ensuing years, it has evolved to
address concerns of maintaining openness, increasing reliability and
robustness, and preserving the properties of user choice and ease of
new service development as discussed by Blumenthal and Clark in
{{Blumenthal}}; concerns that were not part of the original
articulation of the end-to-end principle. {{RFC3724}}

: communication that takes place between communication end-points of
the same physical or logical functional level

Federation
: The possibility of connecting autonomous systems into a single
distributed system.

Heterogenity
:  The Internet is characterized by heterogeneity on many levels:
devices and nodes, router scheduling algorithms and queue management
mechanisms, routing protocols, levels of multiplexing, protocol
versions and implementations, underlying link layers (e.g.,
point-to-point, multi-access links, wireless, FDDI, etc.), in the
traffic mix and in the levels of congestion at different times and
places. Moreover, as the Internet is composed of autonomous
organizations and internet service providers, each with their own
separate policy concerns,
there is a large heterogeneity of administrative domains and pricing
structures.
As a result, heterogeneity principle is proposed in {{RFC1958}} to be
supported by design. {{FIArch}}

Integrity
: Maintenance and assurance of the accuracy and consistency of data to
ensure it has not been (intentionally or unintentionally) altered

Internet censorship
:  Internet censorship is the intentional suppression of information
originating, flowing
or stored on systems connected to the Internet where that information
is relevant for decision making to some entity. {{Elahi}}

Inter-operable
: A property of a documented standard or protocol which allows
different independent implementations to work with each other without
any restricted negotiation, access or functionality.

Internationalization
: The practice of the adaptation and facilitation of protocols,
standards, and implementation to different languages and scripts.

Open standards
: Conform  {{RFC2606}}: Various national and international standards
bodies, such as ANSI,
      ISO, IEEE, and ITU-T, develop a variety of protocol and service
      specifications that are similar to Technical Specifications
      defined here.  National and international groups also publish
      "implementors' agreements" that are analogous to Applicability
      Statements, capturing a body of implementation-specific detail
      concerned with the practical application of their standards.  All
      of these are considered to be "open external standards" for the
      purposes of the Internet Standards Process.

Openness
: The quality of the unfiltered Internet that allows for free access
to other hosts

Permissionless innovation
: The freedom and ability of to freely create and deploy new protocols
on top of the communications constructs that currently exist

Privacy
: The right of an entity (normally a person), acting in its own
behalf, to determine the degree to which it will interact with its
environment, including the degree to which the entity is willing to
share its personal information with others. {{RFC4949}}

: The right of individuals to control or influence what information
related to them may be collected and stored and by whom and to whom
that information may be disclosed.

: Privacy is a broad concept relating to the protection of individual
autonomy and the relationship between an individual and society,
including government, companies and private individuals. It is often
summarized as “the right to be left alone” but it encompasses a wide
range of rights including protections from intrusions into family and
home life, control of sexual and reproductive rights, and
communications secrecy.  It is commonly recognized as a core right
that underpins human dignity and other values such as freedom of
association and freedom of speech.

The right to privacy is also recognized in nearly every national
constitution  and in most international human rights treaties.  It has
been adjudicated upon both by international and regional bodies.  The
right to privacy is also legally protected at the national level
through provisions in civil and/or criminal codes.

Reliable
: Reliability ensures that a protocol will execute its function
consistently and error resistant as described and function without
unexpected result. A system that is reliable degenerates gracefully
and will have a documented way to announce degradation.  It also has
mechanisms to recover from failure gracefully, and if applicable,
allow for partial healing.

Resilience
: The maintaining of dependability and performance in the face of
unanticipated changes and circumstances.

Robustness
: The resistance of protocols and their implementations to errors, and
to involuntary, legal or malicious attempts to disrupt its mode of
operations. {{RFC0760}} {{RFC0791}} {{RFC0793}} {{RFC1122}}

Scalable
: The ability to handle increased or decreased workloads predictably
within defined expectations. There should be a clear definition of its
scope and applicability.  The limits of a systems scalability should
be defined.

Stateless / stateful
: In computing, a stateless protocol is a communications protocol that
treats each request as an independent transaction that is unrelated to
any previous request so that the communication consists of independent
pairs of request and response. A stateless protocol does not require
the server to retain session information or status about each
communications partner for the duration of multiple requests. In
contrast, a protocol which requires keeping of the internal state on
the server is known as a stateful protocol. {{WP-Stateless}}

Strong encryption / cryptography
: Used to describe a cryptographic algorithm that would require a
large amount of computational power to defeat it. {{RFC4949}}

Transparent:
: "transparency" refers to the original Internet concept of a single
universal logical addressing scheme, and the mechanisms by which
packets may flow from source to destination essentially unaltered.
{{RFC2775}}


The combination of reliability, confidentiality, integrity, anonymity,
and authenticity is what makes up security on the Internet

	 ( Reliability    )
	(  Confidentiality )
	(  Integrity       ) =  communication and information security
(technical)
	(  Authenticity    )
	 ( Anonymity      )


The combination of End-to-End, Interoperability, resilience,
reliability and robustness is what makes us connectivity on the Internet


                         ( End-to-End      )
     connectivity =     (  Interoperability )
                       (   Resilience        )
                       (   Reliability       )
                       (   Robustness        )
                        (  Autonomy         )
                         ( Simplicity      )

Security Considerations
========================

As this draft concerns a research document, there are no security
considerations.


IANA Considerations
==========================

This document has no actions for IANA.


Research Group Information
==========================

The discussion list for the IRTF Human Rights Protocol Considerations
proposed working group is located at the e-mail address
<hrpc@ietf.org>. Information on the group and information on how to
subscribe to the list is at
<https://www.irtf.org/mailman/listinfo/hrpc>

Archives of the list can be found at:
<https://www.irtf.org/mail-archive/web/hrpc/current/index.html>

- -- 
Niels ten Oever
Head of Digital

Article 19
www.article19.org

PGP fingerprint    8D9F C567 BEE4 A431 56C4
                   678B 08B5 A0F2 636D 68E9
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJV+zXfAAoJEAi1oPJjbWjpUywIAKhidMg/OiQymb1PoMrLWNbt
NK56U/BMGHgf1i/vjK47figFi824+GmuLbbQhtkzc2K5BOomMOHne98UU3aZi8ai
uomlECVvWD4St3vyYQNA2Z7+Qu2lXDki0+DKHLCBL1/dfkNvzMA0ZL2LLysjiaz/
iS/tRLFjaLT3YnGaK/98sGUB504kqQeJcvQIPhl6Yqv3Ro+yeNodDiB55X9zakBY
lx2LP1eQYiL/kTcL8lLlNRAUMNSzBkJshc7fNgww56UU31dWeRA0vAW1SOtDEDe8
ffrZqpp9RNfZDKKYag0oyd3s3khMnFUs8Y9YrkwSVJ7F+v/LJWYkA28NTvEvHS0=
=ZxLG
-----END PGP SIGNATURE-----