Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Joseph Lorenzo Hall <hall@isoc.org> Tue, 26 May 2020 23:56 UTC

Return-Path: <hall@isoc.org>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 641463A0C3C for <pearg@ietfa.amsl.com>; Tue, 26 May 2020 16:56:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isoc.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c9BoBud6hVQP for <pearg@ietfa.amsl.com>; Tue, 26 May 2020 16:56:56 -0700 (PDT)
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (mail-eopbgr680061.outbound.protection.outlook.com [40.107.68.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE9483A0BF3 for <pearg@irtf.org>; Tue, 26 May 2020 16:56:55 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cqphg/l/e7/Tjm+bADzJTTteaOocjBiF/8qRLl1/18XViOzJKoB9IjID0z8DMgGAh0k/+3yzcj4sGH9pLwU8uSM4XsRV6fKAbJl9JdqJgkMIOkjfEzaE/6pBHmsFbRbzYjpuqKXIA3qZBu93vq0LPltEEEpPn+S4iB5GADaxfDR+lHSdjsxoLnKLS+Q64td0qGODHOLL7Y9vIznhn7whIrFiGLzDuW+yGvnczcplTMnQSHYq5auXz0ZZ+Pg9/lfQz/zcmgzQpW5n1F13qaBL5PGOagOHafuA89kT0J0xBkdaEFo2rsh7kjcwTXFHoGs7gBFLNq1K9xRMsiRkOmcONg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ru+aHDxijl8euom+hm18jtv1Wp7kUd+9vrs5pg2Dbb8=; b=KyLSd/TBQRYWO4nxcJyFy8Ub6qUncZGWK/tuGfSlyBk2HJIpttDOMrwbvYgvSlrFw4tXfcuXggD7CQdT5ctAF5/lS1jWRaltTHQXaAwPqA58Z5gybvy4HZwQVHmlZAZ3mJv/XKkoS9PwLGr0RhWNTUqevaOlX8lbKAvUZtPWHWheHOTn5qmHaKLF+5vdna4MOImxv5FhuUKN/7esLcYFQZaOQj1oyZliHWppaighPbHXKOmc9k3tS8VPWLKMDCif6ape4el2mWBxA1zkmz9mLk0ykdIXNV3usI1c70ZhdE0N8Ji0ktzvOLVk84YbvVydaHHwAfOK9NaLIuW69jbWMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=isoc.org; dmarc=pass action=none header.from=isoc.org; dkim=pass header.d=isoc.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isoc.org; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ru+aHDxijl8euom+hm18jtv1Wp7kUd+9vrs5pg2Dbb8=; b=SX5DwJGXsuoW+VCJfPJOIc/o8AHBXXzUqRGWhb1BnXmQaW+f7ypDeKqSYuwAnK6EjLuyO5KEGZHQP2GNSH8eMLcSyVwGwRLCr3ylmGpoOWp+tvDYd+0pEg5vEOq8hAEQTsP4owVst+a4b6CxzAPSdpyb7x+CAEbBLKGRIurlHY8=
Received: from BY5PR06MB6451.namprd06.prod.outlook.com (2603:10b6:a03:21e::20) by BY5PR06MB6689.namprd06.prod.outlook.com (2603:10b6:a03:23a::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23; Tue, 26 May 2020 23:56:53 +0000
Received: from BY5PR06MB6451.namprd06.prod.outlook.com ([fe80::b9b7:f0a7:b076:d5d5]) by BY5PR06MB6451.namprd06.prod.outlook.com ([fe80::b9b7:f0a7:b076:d5d5%5]) with mapi id 15.20.3045.016; Tue, 26 May 2020 23:56:53 +0000
From: Joseph Lorenzo Hall <hall@isoc.org>
To: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>
CC: Christopher Wood <caw@heapingbits.net>, "pearg@irtf.org" <pearg@irtf.org>
Thread-Topic: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
Thread-Index: AQHWLsgqnBPhO5w6N0yNNHBtsaHVYqi6K/EAgADpJgA=
Date: Tue, 26 May 2020 23:56:53 +0000
Message-ID: <434A7CA0-DCE1-42A1-89B0-E9B8959B9343@isoc.org>
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com>
In-Reply-To: <F466D238-BCC9-476B-A876-1A72E5B1EEFD@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.80.23.2.2)
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=isoc.org;
x-originating-ip: [108.28.51.147]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0917a294-b18d-4aa0-1ec1-08d801d076ed
x-ms-traffictypediagnostic: BY5PR06MB6689:
x-microsoft-antispam-prvs: <BY5PR06MB6689B96E804CF47CEA89AB9EB1B00@BY5PR06MB6689.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 041517DFAB
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: kC0trUrq3dL02JVlfm7MtlNSKDpKTlVr2ugmT1nEv9IeoXa8jDL2i9/KVcIP18/lSmYPjUD56eEdpEetEzQ2QOq8xuAK0PvGz4Hd6mspxzNDGQD+tiahsjOBhkKmH+lXT23PN6S9nGiO3iVbPu6KmVmxRo+/cPFrX/3HQyL0v336sFe0dA0WoOKGCk6ILt5gULUM9hu1jjN41pjeR2qG3PgWIjwYb+eQr0vgmYGALcXiXezmaxo4wHd1tGW783BPlMIgTQLLD1H05bv0MmgfcpT6OF/mmFEXAn0usjAUTHtlfRZo/1wOTN752blRFtLZlPJdJyZViCzRvY6/nZMlBQc+bL/V41ylDj0mYyCdXFTdg23C80ZKh4y5VwTMGzhJvvZPTmKWVb0NiIc/vbFTlA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR06MB6451.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(136003)(376002)(366004)(39830400003)(396003)(346002)(33656002)(26005)(66556008)(186003)(83080400001)(71200400001)(64756008)(91956017)(76116006)(66446008)(66476007)(2616005)(66946007)(5660300002)(166002)(6506007)(478600001)(316002)(36756003)(8676002)(6486002)(86362001)(966005)(4326008)(54906003)(2906002)(6512007)(66574014)(53546011)(8936002)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_434A7CA0DCE142A189B0E9B8959B9343isocorg_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-Network-Message-Id: 0917a294-b18d-4aa0-1ec1-08d801d076ed
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 May 2020 23:56:53.1179 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /3pZK8Mb5GniRVQk+uWswEHRycGQeazpw5YbwCJ5EIShIb78vvBub96enfoQmxSX
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR06MB6689
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/y3UvEOGeA-AVsw5N6SI0qeHq478>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2020 23:57:05 -0000

(I work for the Internet Society but here represent only myself.)

On May 26, 2020, at 6:02 AM, Eliot Lear <lear=40cisco.com@dmarc.ietf.org<mailto:lear=40cisco.com@dmarc.ietf.org>> wrote:

Hi Chris,

Several points.


Thanks, Eliot, I appreciate your review and feedback.

I have a concern about the use of the term “censorship”.  Is removal of fraudulent material censorship?  How about taking down a system that part of a DOS attack?  Is taking down a system that is attacking critical infrastructure censorship?  Is botnet disruption censorship?  Are FCC frequency rules against harmful interference censorship?  By the sweeping definition given, they are.  This  immediately diminishes the credibility of the work because it flies in the face of what normal people think censorship is.

I would propose a narrower definition, and at least some discussion to make clear that we are all handling double-edged swords.  I don’t think doing this invalidates the content that follows.  Even better would be for you to find a more value-neutral term that acknowledges the nature of the problem, although I would concede that I have no great suggestion.

This draft has been through this discussion a few times now. This is a reference document meant to help protocol designers and implementers understand how features of other protocols have been used to block or impair traffic by entities in positions of power — regardless of what the entity is or what the traffic is — so that these designers and implementers can at least design/implement a protocol knowing what they can expect in the wild. The definition of censorship here is pretty generic and I haven’t seen much of an appetite to adopt something different. I want to emphasize what Mallory just said in a message to this thread: entities adversarially messing with information flows is censorship (that is perhaps too pithy for our purposes!).

Also, it seems to me that a reference check is in order.  If we look at Sections 6.2 and 6.3 the authors are discussing various forms of takedowns, and a reference is made to [Anderson-2011].  To begin with, as a nit, the first person on that work is Murdoch, not Anderson.  Second, the chapter referenced doesn’t go into any detail about take downs.  There are better more specific references such as Moore and Clayton, and specifically “The Impact of Incentives on Notice and Take-down”, WEIS 2008, although I would imagine that there is even later work available.

Ah, will fix to get the order of authors right and you’re right that it doesn’t go into any detail. Here we were looking for something that actually went into physical seizure of server hardware or seizure of entire logical entities (instead of notice and takedown, the next section, which is often directed at individual pieces of content or a single domain on a webserver). I’ll check out the citation above and citations since and see if we can’t get better pointers in there (this section is obviously to be complete and quite svelte).

Finally, did I miss the part where one discusses domain name takedowns by registry, or has that not been used as a form of censorship?


We can add it if you have citations. Would love a PR of course or suggested text.

Eliot

--
Pearg mailing list
Pearg@irtf.org<mailto:Pearg@irtf.org>
https://www.irtf.org/mailman/listinfo/pearg

--
Joseph Lorenzo Hall, Senior Vice President, Strong Internet
hall@isoc.org<mailto:hall@isoc.org> | +1-703-483-9504
internetsociety.org<http://internetsociety.org> | @internetsociety
pgp: https://josephhall.org/gpg-key
3CA28D7B9F6DDBD34B1016075F86698740A9A871