[hrpc] Thanks and new resources to look at (ISOC principles && RFC3935)

Niels ten Oever <niels@article19.org> Sun, 29 March 2015 17:05 UTC

Received: from mx1.lan ([10.10.12.44] helo=mx1.greenhost.nl) by mailman.lan with esmtp (Exim 4.72) (envelope-from <niels@article19.org>) id 1YcGeQ-0004Sy-16 for hrpc@article19.io; Sun, 29 Mar 2015 19:05:30 +0200
Received: from vps784.greenhost.nl ([213.108.108.114] helo=mail.article19.io) by mx1.greenhost.nl with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <niels@article19.org>) id 1YcGeP-0002gp-Bm for hrpc@article19.io; Sun, 29 Mar 2015 19:05:29 +0200
Received: from localhost (localhost [127.0.0.1]) by mail.article19.io (Postfix) with ESMTP id 3EE388176 for <hrpc@article19.io>; Sun, 29 Mar 2015 17:08:16 +0000 (UTC)
X-Spam-Flag: NO
X-Spam-Score: -2.899
X-Spam-Level:
X-Spam-Status: No, score=-2.899 tagged_above=-10 required=6.6 tests=[ALL_TRUSTED=-1, BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.article19.io ([127.0.0.1]) by localhost (mail.article19.io [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id BhsWzIaZaJG1 for <hrpc@article19.io>; Sun, 29 Mar 2015 17:08:14 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by mail.article19.io (Postfix) with ESMTP id B261113002A for <hrpc@article19.io>; Sun, 29 Mar 2015 17:08:14 +0000 (UTC)
X-Virus-Scanned: amavisd-new at mail.article19.io
Received: from mail.article19.io ([127.0.0.1]) by localhost (mail.article19.io [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id d9DczuKoFijQ for <hrpc@article19.io>; Sun, 29 Mar 2015 17:08:14 +0000 (UTC)
Received: from [192.168.0.14] (d109201.upc-d.chello.nl [213.46.109.201]) by mail.article19.io (Postfix) with ESMTPSA id 76210E802A for <hrpc@article19.io>; Sun, 29 Mar 2015 17:08:14 +0000 (UTC)
Message-ID: <551830D5.2070103@article19.org>
Date: Sun, 29 Mar 2015 19:05:25 +0200
From: Niels ten Oever <niels@article19.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.5.0
MIME-Version: 1.0
To: "hrpc@article19.io" <hrpc@article19.io>
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="EMR4JOSOP9P7KsGAWkN0l2g3oE55m6o4h"
X-Spam-Level: +
X-Spam-Status: No, score=1.6 required=5.0 tests=BAYES_50, SPF_NEUTRAL, URIBL_BLOCKED autolearn=disabled version=3.3.2
X-Spam-Score: 1.6
X-Virus-Scanned: by Greenhost Virus Scanner
X-Scan-Signature: 2ae1bbb14e1c8ca2e946fb353a4804e1
Subject: [hrpc] Thanks and new resources to look at (ISOC principles && RFC3935)
X-BeenThere: hrpc@article19.io
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Human Rights Protocol Consideration Discussion list <hrpc.article19.io>
List-Unsubscribe: <https://lists.ghserv.net/mailman/options/hrpc>, <mailto:hrpc-request@article19.io?subject=unsubscribe>
List-Archive: <http://lists.ghserv.net/pipermail/hrpc>
List-Post: <mailto:hrpc@article19.io>
List-Help: <mailto:hrpc-request@article19.io?subject=help>
List-Subscribe: <https://lists.ghserv.net/mailman/listinfo/hrpc>, <mailto:hrpc-request@article19.io?subject=subscribe>
X-List-Received-Date: Sun, 29 Mar 2015 17:05:30 -0000

Hello all (and a special welcome to new list members),

Thank you very much for working with us this week, whether it was by
participating in interviews, joining the session or sharing your views
and knowledge. We're slowly starting to process all the input, but to
keep the dialogue going we'll keep releasing our notes and thoughts
here early and often.

If you want to review some of the work please find here the link to the
ID
https://tools.ietf.org/html/draft-doria-hrpc-proposal

Audio of the presentation (starts after 4:04)
http://www.ietf.org/audio/ietf92/ietf92-royal-20150327-1150-am2.mp3

Presentation slides
https://www.ietf.org/proceedings/92/slides/slides-92-hrpc-0.pdf

Here some great leads for relevant resources:

Thanks Fred for pointing out the principles of ISOC [0] which could
for a guidance for framing this work:

The Ability to Connect. The edge-dominant end-to-end architecture of
the Internet is essential to its utility as a platform for innovation,
creativity, and economic opportunity. To preserve this quality, we
will oppose efforts to establish standards or practices that would
make it difficult or impossible for some users of the Internet to use
the full range of Internet applications of all kinds.

The Ability to Speak. The Internet is a powerful mass medium for
self-expression which depends on the ability of its users to speak
freely. We believe that the Internet must support private—and, where
appropriate, anonymous—means of communication and collaboration among
individuals and groups, and will oppose efforts to restrict the type
or content of information exchanged on the Internet.

The Ability to Innovate. The remarkable growth of the Internet and the
limitless variety of Internet applications follow directly from the
open model of Internet connectivity and standards development. Any
individual, organization, or company can develop and distribute a new
Internet application that can be used by anyone. We recognize the
enormous value of this innovation, and oppose governmental or
nongovernmental restrictions on the evolution and use of Internet
technology.

The Ability to Share. The many-to-many architecture of the Internet
makes it a powerful tool for sharing, education, and collaboration. It
has enabled the global open source community to develop and enhance
many of the key components of the Internet, such as the Domain Name
System and the World-Wide Web, and has made the vision of digital
libraries a reality. To preserve these benefits we will oppose
technologies and legislation that would inhibit the freedom to develop
and use open source software or limit the well-established concept of
fair use, which is essential to scholarship, education, and collaboration.

The Ability to Choose. Government regulation and the economic power of
incumbent telecommunication monopolies can delay or prevent the growth
of the Internet by limiting the ability of competitors to provide new,
better, cheaper, or more innovative Internet-related services. We
advocate policies that promote competition in telecommunications,
Internet services, Internet-related software, and e-commerce applications.

The Ability to Trust. Everyone’s ability to connect, speak, innovate,
share, and choose depends on the Internet’s ability to support
trustworthy internetworking—ensuring the security, reliability, and
stability of increasingly critical and pervasive applications and
services.

Thanks Corinne for pointing out RFC3935 [1], there are some great
pointers in here!

[quote]

   The Internet: A large, heterogeneous collection of interconnected
      systems that can be used for communication of many different types
      between any interested parties connected to it.  The term includes
      both the "core Internet" (ISP networks) and "edge Internet"
      (corporate and private networks, often connected via firewalls,
      NAT boxes, application layer gateways and similar devices).  The
      Internet is a truly global network, reaching into just about every
      country in the world.
      The IETF community wants the Internet to succeed because we
      believe that the existence of the Internet, and its influence on
      economics, communication, and education, will help us to build a
      better human society.

[/quote]

[quote]

4.1.  The Scope of the Internet

   A very difficult issue in discussing the IETF's mission has been the
   scope of the term "for the Internet".  The Internet is used for many
   things, many of which the IETF community has neither interest nor
   competence in making standards for.

   The Internet isn't value-neutral, and neither is the IETF.  We want
   the Internet to be useful for communities that share our commitment
   to openness and fairness.  We embrace technical concepts such as
   decentralized control, edge-user empowerment and sharing of
   resources, because those concepts resonate with the core values of
   the IETF community.  These concepts have little to do with the
   technology that's possible, and much to do with the technology that
   we choose to create.

   At the same time, it is clear that many of the IETF-defined
   technologies are useful not only for the Internet, but also for
   networks that have no direct relation to the Internet itself.

   In attempting to resolve the question of the IETF's scope, perhaps
   the fairest balance is struck by this formulation: "protocols and
   practices for which secure and scalable implementations are expected
   to have wide deployment and interoperation on the Internet, or to
   form part of the infrastructure of the Internet."

   In addition to this constraint, we are also constrained by the
   principle of competence: Where we do not have, and cannot gather, the
   competence needed to make technically sound standards, we should not
   attempt to take the leadership.

[/quote]

And as always, your questions, suggestions, comments and critiques are
very welcome.

Best,

Niels

[0]
http://www.internetsociety.org/who-we-are/mission/values-and-principles
[1] https://www.ietf.org/rfc/rfc3935.txt




-- 
Niels ten Oever
Head of Digital

Article 19
www.article19.org

PGP fingerprint    8D9F C567 BEE4 A431 56C4
                   678B 08B5 A0F2 636D 68E9