Re: Possible BofF question -- I18n (was: Re: Possible OBF question -- I18n)

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Fri, 01 June 2018 17:49 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AE9412D96A for <ietf@ietfa.amsl.com>; Fri, 1 Jun 2018 10:49:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cAcqMMskZWnL for <ietf@ietfa.amsl.com>; Fri, 1 Jun 2018 10:49:40 -0700 (PDT)
Received: from mail-yw0-x22e.google.com (mail-yw0-x22e.google.com [IPv6:2607:f8b0:4002:c05::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 349A712D958 for <ietf@ietf.org>; Fri, 1 Jun 2018 10:49:40 -0700 (PDT)
Received: by mail-yw0-x22e.google.com with SMTP id p14-v6so8542567ywm.11 for <ietf@ietf.org>; Fri, 01 Jun 2018 10:49:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dIn38ch62X304SXNly3mbqovLnppv8lTHyWWzgZWYhc=; b=seTxbddgRIeyBnXmeZXnaLhwzdoimbmWe/uEYBESMsBD/GCSAgl07OH6K29Pqb9jV9 l48iobakYI8RZI0BfO/rPpMP2QOOHXrwV6ZmjygaZHofW9UuECz5WMPgqd+2qqIzT4om FI25a1TV/EaxBjWRiIXVCaGNAOS+X4ttDLxcUh1LTWsVrQR0GpcS2lPZfiL7/cqkiXCX 35GjIIsjMdra6gUh3Lwb1MpjCYDe+mO+ajmC1GjDkbOpeYxE616KmYEeRVW/hWQXFYRD vBHQr2HfLNlleBZYh5uR2Isk0AnXNGEq7gbTk3CpdDq/Fxrmq0CHnWpG2r1zvdmRkyJa UfGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dIn38ch62X304SXNly3mbqovLnppv8lTHyWWzgZWYhc=; b=Q09V5v7wiEWu/uA/Sk8qEKbfhf+ansOsU5Kq2UazP/gHF0G4AYelmv2vxVnAi+INYK X27YrdnidBx77KwaMNXn1l+9QM5L06laLCjQ+tD580YTr6eBhe1eFEifTvbee73F0zEQ 4q3MQUytKq2X1VKO9UHXrDyAliRBIiF9w0QICnVDSBG71KDVy6GSUaZl7Lt1pjfYIEP8 2zErWjAXKfPq1qXk/bMteEp/3pIVFgughyHNS7u5LUZgix5a0KorhJ+YhSoBDyExrB+R 7xKUDPNk56uS6TCmFuDmWD406pB3v+z0eEQ7bsrsIAxmkkcnbiKPfBQADofwjf8Qt5bN fAQA==
X-Gm-Message-State: ALKqPwdSB2nWfEj8euzHW4s3EUfbNTJ7k5tfsS0b0ogsAFbRlUk6YY32 AxRncd3ZT9YB/8Of8nM0BEf7UgtavPpOnk3Ov1GQ/Q==
X-Google-Smtp-Source: ADUXVKIyszIojiydWsq8Dw5ELnFTpMDa86Pl6JDcDUn/bGgPxL1BOs2jhBIASbJk131ijHMoPXB3zvf3SL5i5kqIHLQ=
X-Received: by 2002:a0d:c745:: with SMTP id j66-v6mr4267601ywd.27.1527875379220; Fri, 01 Jun 2018 10:49:39 -0700 (PDT)
MIME-Version: 1.0
References: <20180530231127.17198276FEE3@ary.qy> <071E6235FE7B088A2B56A238@PSB> <0093E2CD-670E-47B6-A286-4FDEB140FAD9@frobbit.se> <20180531172228.GF14446@localhost> <383c2404-7beb-63e9-b2b2-e75fd1b174f1@mozilla.com> <20180601041949.GH14446@localhost> <A13FFF23-49BD-459D-8B5B-D3448154EEBC@frobbit.se> <20180601151053.GI14446@localhost> <2584adb9-1622-8b49-7236-ecc7dd374974@mozilla.com> <b640b23a-a392-536b-5386-b22891a00566@digitaldissidents.org>
In-Reply-To: <b640b23a-a392-536b-5386-b22891a00566@digitaldissidents.org>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Fri, 01 Jun 2018 12:49:26 -0500
Message-ID: <CAKKJt-cg_H3AvMDObTr2YGPKwCpWCLJTjJBVo6xNZrpQwGCgog@mail.gmail.com>
Subject: Re: Possible BofF question -- I18n (was: Re: Possible OBF question -- I18n)
To: lists@digitaldissidents.org
Cc: IETF list <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000003d56cc056d9835f6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/sUXH3E5SfacSpFhXddg8Nfw2woI>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jun 2018 17:49:44 -0000

What follows is semi-on topic ...

On Fri, Jun 1, 2018 at 11:16 AM Niels ten Oever <lists@digitaldissidents.org>
wrote:

>
> On 06/01/2018 06:00 PM, Peter Saint-Andre wrote:
> > On 6/1/18 9:10 AM, Nico Williams wrote:
> >
> >> Require that documents have I18N Considerations sections, require review
> >> by an I18N directorate, and you'll see how quickly participants who used
> >> to not give a damn about I18 will come around, learn what they have to,
> >> and get their I18N work done.  Suddenly the I18N directorate will be in
> >> demand.
> >
> > This is worth considering...
> >
> > Peter
> >
>
> l18n is part of the Human Rights Considerations
>
> https://tools.ietf.org/html/rfc8280#section-6.2.5
>
> so you might want to consider joining the Human Rights Review Team and
> scope for these issues in drafts:
>
> https://www.ietf.org/mailman/listinfo/Hr-rt
>
> Best,
>
> Niels
>

To provide background on my +1, I recently received the first HR-RT review
I'd ever seen for a doc I'm editing.

The thread starts at
https://mailarchive.ietf.org/arch/msg/hr-rt/byJOPkEXzGlHcYISVEQfk_zkbug.

In particular, if you check the review, you'll see this:

 Human Rights Considerations
===========================

*Upon consideration of the draft report, no implications for*
*internationalization ([RFC8280], sec. 6.2.5), heterogeneity support*
*([RFC8280], sec. 6.2.8), accessibility ([RFC8280], sec. 6.2.11) or*
*localization ([RFC8280], sec. 6.2.12) have been found. *We will further
suppose that issues relating to Anonymity ([RFC8280], sec. 6.2.9),
Pseudonymity ([RFC8280], sec. 6.2.10) and Confidentiality ([RFC8280], sec.
6.2.16) have been sufficiently addressed in the draft as is.

In the below text, Security ([RFC8280], sec. 6.2.4), Integrity ([RFC8280],
sec. 6.2.16) and Authenticity ([RFC8280], sec. 6.2.17) are further
considered to have been addressed, or as in progress of being addressed by
the specific endeavours pointed out in the report. As such, this assessment
hopes to serve as a complement to remaining Human Rights Considerations
Guidelines which were not addressed by the MaRNEW draft.

## Privacy ([RFC8280], sec. 6.2.2)

We laud the general emphasis on considering user privacy concerns paramount
[Section 2.1.1, 2.3 etc].

In Section 3.1.1, para 1, it would be useful to emphasize that middleboxes
that are "authenticated and invoked explicitly" might not be very effective
at conserving user privacy if they lead to auto-click through. In practice,
"opted-in" middleboxes might not be much better than transparent
middleboxes. Additionally, this poses the danger of making matters worse if
users assume that because they haven't been asked for middlebox permission,
they are not going through a middlebox. For users accessing the Internet on
a browser client: if the connection is MITMed by a middlebox, the browser
would somehow need to convey this effectively and actionably to the user.
Whatever effort is expended on this should involve browser vendors.

## Connectivity ([RFC8280], sec. 6.2.1)

It is a priori obvious that a discussion with mobile network operators
would touch upon connectivity. As a general comment, the HRPC RG is not
concerned that encrypted internet traffic could create topological problems
in network deployment with respect to density of base stations. It is more
sensible to imagine that the density of base stations is kept low by
deployers to save money on infrastructure roll-out.

In the MarNEW draft report, middleboxes are brought up frequently as an
example of infrastructure rendered less useful by the ubiquitous adoption
of encryption. Middleboxes may enhance access to content for individuals,
and may also interfere with their ability to enjoy content free of
surveillance, censorship or content manipulation. The focus of the workshop
of exploring ways in which encrypted materials can benefit from the same
speed of deliverance as un-encrypted materials is therefore welcome.

## Content Agnosticism

Traffic prioritisation, whether based on technical or commercial grounds,
risks interfering with an individual's right to freedom of expression or
opinion, by restricting access or enjoy content of their own choosing. As
such, prioritisation should be made explicit and obvious, and subject to
consent from the individual, whether the motivations for deployment are
commercial or technical.

It is clear that internet filtering and blocking of content of specific
types, whether motivated by network management or regulatory concerns, does
not fulfill a content agnosticism criterion. It is the observation of HRPC
that [RFC7725] (An HTTP Status Code to Report Legal Obstacles) may assist
communication of specific filtering and blocking operations in action.

It the the impetus of the Human Rights Guidelines in RFC8280 that content
agnosticism be respected by protocols developed in the IETF, and in general
an accepted view in the global human rights community that content
agnosticism is desirable at all levels of technical infrastructure. As
such, the HRPC RG is concerned about ideas that traffic be classified
through additional headers or metadata, identifying traffic via 5-tuples,
trust models and frameworks, or heuristics.


So, with that as background and speaking only for myself, +1.

If people should be thinking about i18n for their work, HR-RT is a resource
that they might not know about.

(and thanks, again, for your review of my doc!)

Spencer