Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Eliot Lear <lear@cisco.com> Wed, 27 May 2020 09:47 UTC

Return-Path: <lear@cisco.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7653C3A0C3D for <pearg@ietfa.amsl.com>; Wed, 27 May 2020 02:47:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level:
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WnhEWEIL_WB3 for <pearg@ietfa.amsl.com>; Wed, 27 May 2020 02:47:24 -0700 (PDT)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8D383A0C3C for <pearg@irtf.org>; Wed, 27 May 2020 02:47:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10617; q=dns/txt; s=iport; t=1590572843; x=1591782443; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=XeNhtmaUrBPUN65EKLMg/sd5YQIjoDxgBMXhXwTjWRg=; b=YPgGG6fhpnkLZur/q43Gun4kTzqbEY9kVACAHKVTqQM6PLWsDMsM1JKr eO6ZdtCVMwNjnosq5pbzHhepTgRZIzT3xVPbg5VbhralPkdXls99HDUw6 Xgwmvy5YvcEwXhZ00BX5UsN7ynkEUcZG7ieDWDy4WBH7xroUzh4AwFSS1 g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DOAAA9Ns5e/xbLJq1jAxwBAQEBAQEHAQESAQEEBAEBgXkEAQELAYEggXdUASASLIQliQGIBYMQkEuIEQsBAQEMAQEYAQwKBAEBhEQCghMlNwYOAgMBAQsBAQUBAQECAQYEbYVWDIVzAQEBAQEBAQEWBQZLCwULCz8DAgInHxEGE4MmAYJcIA+tHXaBMoRPQEKFFYE4AYYVgjOBL4JmggCBESccgh8uPoJnAQKBTDkmgk0zgi0EmC2bAoJegnWFNYYPhGWFQh2DGF6MVI0+mkKQMINJAgQGBQIVgWkjgVYzGggbFTsqAYI+CTUSGA2QTBcViE6FRD8DMAI1AgYBBwEBAwmNQAEB
X-IronPort-AV: E=Sophos; i="5.73,440,1583193600"; d="scan'208,217"; a="26554464"
Received: from aer-iport-nat.cisco.com (HELO aer-core-1.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 27 May 2020 09:47:19 +0000
Received: from [10.61.225.84] ([10.61.225.84]) by aer-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 04R9lH52029115 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 27 May 2020 09:47:19 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <35B3B2B9-B1E7-41EF-B082-5F5EEF101B0D@cisco.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_BBF114DE-63B2-4C07-A354-42E4FDED2053"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Date: Wed, 27 May 2020 11:47:17 +0200
In-Reply-To: <434A7CA0-DCE1-42A1-89B0-E9B8959B9343@isoc.org>
Cc: Christopher Wood <caw@heapingbits.net>, "pearg@irtf.org" <pearg@irtf.org>
To: Joseph Lorenzo Hall <hall@isoc.org>
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com> <434A7CA0-DCE1-42A1-89B0-E9B8959B9343@isoc.org>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
X-Outbound-SMTP-Client: 10.61.225.84, [10.61.225.84]
X-Outbound-Node: aer-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/HF0s5yyOj1HkdGNR_3hAj13m7rc>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 May 2020 09:47:25 -0000

Hi Joe,

> I want to emphasize what Mallory just said in a message to this thread: entities adversarially messing with information flows is censorship (that is perhaps too pithy for our purposes!).

To me at least, “information flows” immediately improves the situation.  No one can claim that a DOS attack, or a cyberattack of any kind, is an information flow.  One can reasonably argue that spam is not an information flow.  Moreover, the term seems to fit your draft well.

> 
>> Also, it seems to me that a reference check is in order.  If we look at Sections 6.2 and 6.3 the authors are discussing various forms of takedowns, and a reference is made to [Anderson-2011].  To begin with, as a nit, the first person on that work is Murdoch, not Anderson.  Second, the chapter referenced doesn’t go into any detail about take downs.  There are better more specific references such as Moore and Clayton, and specifically “The Impact of Incentives on Notice and Take-down”, WEIS 2008, although I would imagine that there is even later work available.
> 
> Ah, will fix to get the order of authors right and you’re right that it doesn’t go into any detail. Here we were looking for something that actually went into physical seizure of server hardware or seizure of entire logical entities (instead of notice and takedown, the next section, which is often directed at individual pieces of content or a single domain on a webserver). I’ll check out the citation above and citations since and see if we can’t get better pointers in there (this section is obviously to be complete and quite svelte).


Ok.  That sounds like a classic asset seizure.  It may be worth expanding on how and when physical asset seizure is effective, especially in a cloud-based world.

> 
>> Finally, did I miss the part where one discusses domain name takedowns by registry, or has that not been used as a form of censorship?
>> 
> 
> We can add it if you have citations. Would love a PR of course or suggested text.

I guess I would suggest starting with the references in guidance-domain-seizures-07mar12-en.pdf <https://www.icann.org/en/system/files/files/guidance-domain-seizures-07mar12-en.pdf>.

Eliot

> 
>> Eliot
>> 
>> -- 
>> Pearg mailing list
>> Pearg@irtf.org <mailto:Pearg@irtf.org>
>> https://www.irtf.org/mailman/listinfo/pearg <https://www.irtf.org/mailman/listinfo/pearg>
> 
> -- 
> Joseph Lorenzo Hall, Senior Vice President, Strong Internet
> hall@isoc.org <mailto:hall@isoc.org> | +1-703-483-9504
> internetsociety.org <http://internetsociety.org/> | @internetsociety
> pgp: https://josephhall.org/gpg-key <https://josephhall.org/gpg-key>
> 3CA28D7B9F6DDBD34B1016075F86698740A9A871