Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Joseph Lorenzo Hall <hall@isoc.org> Thu, 28 May 2020 16:12 UTC

Return-Path: <hall@isoc.org>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B57F23A0EEC for <pearg@ietfa.amsl.com>; Thu, 28 May 2020 09:12:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isoc.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MKyzLSA_QovD for <pearg@ietfa.amsl.com>; Thu, 28 May 2020 09:11:58 -0700 (PDT)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2085.outbound.protection.outlook.com [40.107.220.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AFAF03A0EEB for <pearg@irtf.org>; Thu, 28 May 2020 09:11:58 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fSSvki/5/tjZqR0wOblL4O2RkCsMEghfX/PvBTeaw3lNAbv+xSZCpi637U/bYHaUs/Lt5bk6TKhPhmR7gVA40vX5uoza4I5aEKxAPzOqzyHGXj4nncf6WU1blCO+BfgwVxiAS6jd8wRL00k3tW+oyCIvCJ7eqbYO2xRPyUJ1bhF3ZoIAuyLYTVrxZAXoYLqb4uXbJzXsq2SPGMQyDa/fS5SpZhJG38IGd9sd7v59mF8ZVh8alf17agEw/r8L+oZYyIE2aNA+wsA52zBhrJXobT3oPDRZe3u7NXnXjqhGamj+4kZBKwLO6DB8VeT54P2WphCLkt7EKgKxZhw/YTmc/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PqGy+rmVb1j6e66HDvQh3EDlZRIa2J2XjwWV/DIORXA=; b=LJcexM1nZyvjtgAYlx9zpBOTyQoUEQf0/GX+2WxeB0CoNaTOzeojoUFQrTrFRCABZ541nJk2kSXcETRQ2FSF2gYtPGzrxCvcXgJOPt9gFpNtzS1R2L50om3WAftA/racm5bLwyqYlqw4SBNTiR7Y3kiDHPO+llgM3gQ5cl/d/DZc16f+4hWiqSyJ6fRUN91tibBzGOv6dA4f0LAyk6DfaKZhqxqsupmpY526QK9cuFjI4HeojKKfCc/qXZ5pWrMt/Ue2qs9ystXVHBzrZ/lkYyqBzzcQLMG63e1173nejdBpTUZCH/yMW1ETMfVAKqOzdJJRH73FjRKIrAHgfcaJjw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=isoc.org; dmarc=pass action=none header.from=isoc.org; dkim=pass header.d=isoc.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isoc.org; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PqGy+rmVb1j6e66HDvQh3EDlZRIa2J2XjwWV/DIORXA=; b=NZINMIKvyu46SVS/mWORaZXT0qFrNie5sXTjsjjpYYLyXEVbohnZ7ErZau24lRiIqIzv9X8x/77DlQn0jIY0cVXm5ybdu2d8qorhhl35vHQkCcbwNoAj3wD8Xyb6TkbthT9Nn4LbAR1L8GLZqshDaKLK2pU2WOKSHMae4pUBFmI=
Received: from BY5PR06MB6451.namprd06.prod.outlook.com (2603:10b6:a03:21e::20) by BY5PR06MB6514.namprd06.prod.outlook.com (2603:10b6:a03:235::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3045.19; Thu, 28 May 2020 16:11:57 +0000
Received: from BY5PR06MB6451.namprd06.prod.outlook.com ([fe80::b9b7:f0a7:b076:d5d5]) by BY5PR06MB6451.namprd06.prod.outlook.com ([fe80::b9b7:f0a7:b076:d5d5%5]) with mapi id 15.20.3045.018; Thu, 28 May 2020 16:11:56 +0000
From: Joseph Lorenzo Hall <hall@isoc.org>
To: Eliot Lear <lear@cisco.com>
CC: Christopher Wood <caw@heapingbits.net>, "pearg@irtf.org" <pearg@irtf.org>
Thread-Topic: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
Thread-Index: AQHWLsgqnBPhO5w6N0yNNHBtsaHVYqi6K/EAgADpJgCAAKT1gIAB/c4A
Date: Thu, 28 May 2020 16:11:56 +0000
Message-ID: <A05941FD-A44A-41DC-90ED-E79E6213700D@isoc.org>
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com> <434A7CA0-DCE1-42A1-89B0-E9B8959B9343@isoc.org> <35B3B2B9-B1E7-41EF-B082-5F5EEF101B0D@cisco.com>
In-Reply-To: <35B3B2B9-B1E7-41EF-B082-5F5EEF101B0D@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.80.23.2.2)
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=isoc.org;
x-originating-ip: [108.28.51.147]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 734711b5-171f-4946-6f1a-08d80321d832
x-ms-traffictypediagnostic: BY5PR06MB6514:
x-microsoft-antispam-prvs: <BY5PR06MB65145CDD9A5884727E2063E0B18E0@BY5PR06MB6514.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0417A3FFD2
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 7WrPo9Uaap8UFoDv8Yp1yPgErEtrl9U1yO/FYxoi9/UPfy+coAicCmLh2WUA8J2/Am3ZgwlJzp9Gh6PoonaR0HWqAFemXHLhodJhc8Ez3X6mfDhuzoPcGIhhHkqbi+4nt179KdV4XObALG4vyS7yOAVhTrCHmjCmrH2Bb9b+rbpjpIueq5els341dpGMLoxvYMPgTWj9iPzxSm+B843MQj3XT3sUPbd+PZW6n+ekscWedw0nO15wFbNdZim0fkUH0qAjjS4w+QFrVnhwWP4gld+L650xitwleQwkYH5O06zgdLwvt1LrjUBUPPAPgJ1s6mKEC0IjX8pjVxWbkEdGo5o07mTpexTrR69++zY1/pkC3uke6KPlRMH6/d3+bdIhlDeo9+8nDNapEwe1OV382+UjAdWcH9tzbYkBTjv1/hhLyoyI5TXYbDx0Rx0ZxWsbfjjn6evSynk+HoFZHO9npF1qHHy+drziXxZylzC5mqQ=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR06MB6451.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(39850400004)(136003)(396003)(376002)(366004)(346002)(186003)(83380400001)(33656002)(66574014)(53546011)(166002)(6506007)(8676002)(8936002)(86362001)(6486002)(316002)(6512007)(2906002)(6916009)(4326008)(966005)(478600001)(71200400001)(26005)(54906003)(5660300002)(36756003)(66946007)(66446008)(66476007)(66556008)(2616005)(91956017)(76116006)(64756008)(486264002)(2614002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_A05941FDA44A41DC90EDE79E6213700Disocorg_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-Network-Message-Id: 734711b5-171f-4946-6f1a-08d80321d832
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2020 16:11:56.7021 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /DmTMlbKUKpVW6W1SfeQheu5lxW84Yncggx069QLXxEKRJSNs/1Bs6wL/C/5Z/Bj
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR06MB6514
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/OXUh-bXvd6l9WPUEy_E0ZUKzkKA>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 May 2020 16:12:01 -0000


On May 27, 2020, at 5:47 AM, Eliot Lear <lear@cisco.com<mailto:lear@cisco.com>> wrote:
Also, it seems to me that a reference check is in order.  If we look at Sections 6.2 and 6.3 the authors are discussing various forms of takedowns, and a reference is made to [Anderson-2011].  To begin with, as a nit, the first person on that work is Murdoch, not Anderson.  Second, the chapter referenced doesn’t go into any detail about take downs.  There are better more specific references such as Moore and Clayton, and specifically “The Impact of Incentives on Notice and Take-down”, WEIS 2008, although I would imagine that there is even later work available.

Ah, will fix to get the order of authors right and you’re right that it doesn’t go into any detail. Here we were looking for something that actually went into physical seizure of server hardware or seizure of entire logical entities (instead of notice and takedown, the next section, which is often directed at individual pieces of content or a single domain on a webserver). I’ll check out the citation above and citations since and see if we can’t get better pointers in there (this section is obviously to be complete and quite svelte).


Ok.  That sounds like a classic asset seizure.  It may be worth expanding on how and when physical asset seizure is effective, especially in a cloud-based world.


I’ve fixed the reference and made sure the text acknowledges it’s an in-passing mention and it now calls out cloud-like situations. See if this works or send edits?

https://github.com/IRTF-PEARG/rfc-censorship-tech/commit/61202f9346876ba8d311c178e632d9333b70ce3c


Finally, did I miss the part where one discusses domain name takedowns by registry, or has that not been used as a form of censorship?


We can add it if you have citations. Would love a PR of course or suggested text.

I guess I would suggest starting with the references in guidance-domain-seizures-07mar12-en.pdf<https://www.icann.org/en/system/files/files/guidance-domain-seizures-07mar12-en.pdf>.

Ok, that was quite a rabbit hole. I’ve been fascinating by domain seizures for a while now (ever since a legal case called, “The State of Kentucky vs. 141 domain names” where the US state of Kentucky used its own anti-gambling laws to seize the domains of 141 online gambling websites).

I agree that the draft should mention this. Here is my proposal and I’m interested in your (and others’) feedback:

* I’ll add domain registries and registrars as a “point of control” in Section 3.1.
* I’ll add a paragraph to Section 4.1.1 (on DNS Interference) pointing to domain seizures in malware/botnet/spam, anti-fraud, and intellectual property cases.

I wanted to summarize that before actually changing the text and see what folks think.

best, Joe

--
Joseph Lorenzo Hall, Senior Vice President, Strong Internet
hall@isoc.org<mailto:hall@isoc.org> | +1-703-483-9504
internetsociety.org<http://internetsociety.org> | @internetsociety
pgp: https://josephhall.org/gpg-key
3CA28D7B9F6DDBD34B1016075F86698740A9A871