<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cooper-policy-interactions-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title>IETF Policy Interactions</title>
    <seriesInfo name="Internet-Draft" value="draft-cooper-policy-interactions-00"/>
    <author fullname="Mark Nottingham">
      <organization>Cloudflare</organization>
      <address>
        <email>mnot@mnot.net</email>
      </address>
    </author>
    <author fullname="Alissa Cooper">
      <organization>Cisco</organization>
      <address>
        <email>alcoop@cisco.com</email>
      </address>
    </author>
    <date/>
    <abstract>
      <?line 30?>

<t>This document captures a list of interactions between IETF efforts and policy efforts.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://coopdanger.github.io/draft-ietf-policy-interactions/draft-cooper-policy-interactions.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-cooper-policy-interactions/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/coopdanger/draft-ietf-policy-interactions"/>.</t>
    </note>
  </front>
  <middle>
    <?line 35?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document captures a list of interactions between IETF standards-related efforts and external policy efforts (e.g., regulation or legislation) around the world, past or present. The objective of this document is merely to catalogue these interactions in a single location.</t>
      <t>Comments and additional suggestions of policy interactions not listed here should be submitted via the issue tracker at <eref target="https://github.com/coopdanger/draft-ietf-policy-interactions">https://github.com/coopdanger/draft-ietf-policy-interactions</eref>.</t>
    </section>
    <section anchor="policy-interactions">
      <name>Policy Interactions</name>
      <section anchor="encryption-and-access-to-communications">
        <name>Encryption and Access to Communications</name>
        <t>THE IETF has a history of publishing documents that respond to policy developments surrounding the use of encryption, and more generally regarding access to communications.</t>
        <t><xref target="RFC1984"/> stated the IESG and IAB's position regarding legal constraints on encryption in 1996, with a focus on the effects on the Internet. The publication of the document was prompted in part by the controversy surrounding the US government's promotion of the Clipper Chip. The document was elevated to Best Current Practice (which requires IETF-wide consensus) in 2015.</t>
        <t><xref target="RFC2804"/> articulates why the IESG and IAB believed that it was not appropriate to accommodate wiretapping requirements from law enforcement, circa 2000.</t>
        <t><xref target="RFC3365"/> set a requirement for IETF standard protocols to use 'appropriate strong security mechanisms', including encryption. It was published as Best Current Practice in 2002.</t>
        <t><xref target="RFC7258"/> documents IETF consensus that pervasive monitoring is an attack, and thus should be mitigated in IETF protocols (often, using encryption). It was a response to the Snowden revelations, and followed the Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT) <eref target="https://www.w3.org/2014/strint/">https://www.w3.org/2014/strint/</eref>, held jointly by the W3C and IAB. Follow-on work to implement <xref target="RFC7258"/> includes opportunistic encryption <xref target="RFC7435"/> <xref target="RFC8110"/> <xref target="RFC8164"/>, data minimization <xref target="RFC7816"/> <xref target="RFC9156"/>, improvements to the encryption ecosystem such as <xref target="ACME"/>, and discussion of mandatory encryption in <xref target="HTTP2"/>, <xref target="TLS13"/>, and <xref target="QUIC"/>.</t>
      </section>
      <section anchor="dns-over-https-doh">
        <name>DNS-over-HTTPS (DOH)</name>
        <t><xref target="DOH"/> was a technical response to pervasive monitoring attacks on DNS.</t>
        <t>Some related news reporting:
* <eref target="https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/">Proposal to regulate in Russia</eref>
* <eref target="https://www.telegraph.co.uk/news/2019/05/31/gchq-warns-google-mozilla-plans-encrypted-browsers/">GCHQ sends 'warning' to Google and Mozilla over DoH</eref>
* <eref target="https://hub.packtpub.com/googles-dns-over-https-encryption-plan-faces-scrutiny-from-isps-and-the-congress/">Congressional scrutiny of DoH</eref></t>
      </section>
      <section anchor="tls-encrypted-client-hello-ech">
        <name>TLS Encrypted Client Hello (ECH)</name>
        <t><xref target="ECH"/> is a work-in-progress effort to respond to pervasive monitoring attacks on TLS SNI, which exposes the hostname =being connected to, even when several hostnames are served by the same IP address.</t>
        <t>Some related news reporting:
* <eref target="https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/">Proposal to regulate in Russia</eref>
* <eref target="https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/">ESNI blocked in China</eref></t>
      </section>
      <section anchor="voice-over-ip">
        <name>Voice over IP</name>
        <t>The development of the Session Initiation Protocol (SIP) in the early 2000s had involvement from regulators and their proxies. There is a very significant amount of PSTN interop built into SIP. See <xref target="RFC3261"/> and the rest of the SIP document suite.</t>
      </section>
      <section anchor="emergency-services">
        <name>Emergency services</name>
        <t>The Emergency Context Resolution with Internet Technologies (ECRIT) working group, which began in the starting mid-2000s, had extensive involvement from people working for/with Public Safety Answering Points (PSAPs) as well as some input from telecom regulators such as the US Federal Communications Commission (FCC). See <xref target="RFC5222"/> and the rest of the document suite.</t>
      </section>
      <section anchor="caller-identity-authentication">
        <name>Caller identity authentication</name>
        <t>Secure Telephone Identity Revisited (STIR) and the related SHAKEN initiative are designed to combat caller ID spoofing that uses VoIP.</t>
        <t>See <xref target="RFC8224"/>, <xref target="RFC8225"/>, <xref target="RFC8226"/>, and <xref target="RFC8588"/>.</t>
        <t>Regulatory mandates to use STIR exist in the US, Canada, and France thus far.</t>
      </section>
      <section anchor="messaging-interoperability">
        <name>Messaging interoperability</name>
        <t>The More Instant Messaging Interoperability (MIMI) working group is chartered to work on interoperability for encrypted messaging. This work was instigated based on requirements in the EU Digital Markets Act (DMA). Several of the key participants have met with European Commission (EC) staff and participated in an EC workshop on the topic. The area director and co-chairs are staying in touch with the EC staff focused on messaging interoperability.</t>
      </section>
      <section anchor="tv-whitespaces-database-protocol">
        <name>TV whitespaces database protocol</name>
        <t>The Protocol to Access Whitespaces (PAWS) working group was created based on requirements received from the FCC after they allocated TV whitespaces spectrum for unlicensed use.</t>
      </section>
      <section anchor="broadband-measurement">
        <name>Broadband measurement</name>
        <t>The Large-Scale Measurement of Broadband Performance (LMAP) working group was created as a result of disparate efforts by Ofcom in the UK, the FCC, and the Body of European Regulators of Electronic Communications (BEREC), who were all running their own jurisdiction-specific broadband speed measurement efforts (several of them using a vendor which had its own proprietary measurement protocol). There were regulator participants involved in the protocol development effort.</t>
      </section>
      <section anchor="incident-response">
        <name>Incident response</name>
        <t>There has been long-term involvement (including people in area director roles) from those involved with various CERTs and national cybersecurity authorities in several of the IETF's working groups focused on incident response and exchange of incident/vulnerability information: Managed Incident Lightweight Exchange (MILE), Security Automation and Continuous Monitoring (SACM), and DDoS Open Threat Signaling (DOTS).</t>
      </section>
      <section anchor="p2p-congestion-control">
        <name>P2P congestion control</name>
        <t>In 2008, the IETF hosted a workshop that was spurred by an FCC action regarding P2P traffic throttling. See <xref target="RFC5594"/>. Related challenges associated with multiplexing flows with different characteristics were addressed in the Active Queue Management working group (see, e.g., <xref target="RFC7567"/>) and in the Congestion Exposure working group (see, e.g., <xref target="RFC7713"/>).</t>
      </section>
      <section anchor="internet-architecture-board-iab">
        <name>Internet Architecture Board (IAB)</name>
        <t>In addition to the IAB's coordination with the Internet Society on policy matters, the IAB also frequently contributes to policy and regulatory proceedings around the world. Some recent examples:</t>
        <ul spacing="normal">
          <li>2022: FTC commercial surveillance proceeding, European Commission eIDAS comments</li>
          <li>2018: NTIA comments on national privacy priorities, comments on Australian exceptional access bill</li>
        </ul>
        <t>IAB workshops also frequently include regulatory or policy perspectives, for example, the unwanted traffic workshop and the CARIS workshop.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A number of the policy interactions above relate to security, encryption, and law enforcement access.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC1984">
        <front>
          <title>IAB and IESG Statement on Cryptographic Technology and the Internet</title>
          <author>
            <organization abbrev="IAB">Internet Architecture Board</organization>
          </author>
          <author>
            <organization abbrev="IESG">Internet Engineering Steering Group</organization>
          </author>
          <date month="August" year="1996"/>
          <abstract>
            <t>The Internet Architecture Board (IAB) and the Internet Engineering Steering Group (IESG), the bodies which oversee architecture and standards for the Internet, are concerned by the need for increased protection of international commercial transactions on the Internet, and by the need to offer all Internet users an adequate degree of privacy.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="200"/>
        <seriesInfo name="RFC" value="1984"/>
        <seriesInfo name="DOI" value="10.17487/RFC1984"/>
      </reference>
      <reference anchor="RFC2804">
        <front>
          <title>IETF Policy on Wiretapping</title>
          <author>
            <organization abbrev="IAB">Internet Architecture Board</organization>
          </author>
          <author>
            <organization abbrev="IESG">Internet Engineering Steering Group</organization>
          </author>
          <date month="May" year="2000"/>
          <abstract>
            <t>This document describes the position that the Internet Engineering Task Force (IETF) has taken regarding the inclusion into IETF standards-track documents of functionality designed to facilitate wiretapping.  This memo explains what the IETF thinks the question means, why its answer is "no", and what that answer means.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2804"/>
        <seriesInfo name="DOI" value="10.17487/RFC2804"/>
      </reference>
      <reference anchor="RFC3365">
        <front>
          <title>Strong Security Requirements for Internet Engineering Task Force Standard Protocols</title>
          <author fullname="J. Schiller" initials="J." surname="Schiller"/>
          <date month="August" year="2002"/>
        </front>
        <seriesInfo name="BCP" value="61"/>
        <seriesInfo name="RFC" value="3365"/>
        <seriesInfo name="DOI" value="10.17487/RFC3365"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC7435">
        <front>
          <title>Opportunistic Security: Some Protection Most of the Time</title>
          <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
          <date month="December" year="2014"/>
          <abstract>
            <t>This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7435"/>
        <seriesInfo name="DOI" value="10.17487/RFC7435"/>
      </reference>
      <reference anchor="RFC8110">
        <front>
          <title>Opportunistic Wireless Encryption</title>
          <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
          <author fullname="W. Kumari" initials="W." role="editor" surname="Kumari"/>
          <date month="March" year="2017"/>
          <abstract>
            <t>This memo specifies an extension to IEEE Std 802.11 to provide for opportunistic (unauthenticated) encryption to the wireless media.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8110"/>
        <seriesInfo name="DOI" value="10.17487/RFC8110"/>
      </reference>
      <reference anchor="RFC8164">
        <front>
          <title>Opportunistic Security for HTTP/2</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <author fullname="M. Thomson" initials="M." surname="Thomson"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>This document describes how "http" URIs can be accessed using Transport Layer Security (TLS) and HTTP/2 to mitigate pervasive monitoring attacks. This mechanism not a replacement for "https" URIs; it is vulnerable to active attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8164"/>
        <seriesInfo name="DOI" value="10.17487/RFC8164"/>
      </reference>
      <reference anchor="RFC7816">
        <front>
          <title>DNS Query Name Minimisation to Improve Privacy</title>
          <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
          <date month="March" year="2016"/>
          <abstract>
            <t>This document describes a technique to improve DNS privacy, a technique called "QNAME minimisation", where the DNS resolver no longer sends the full original QNAME to the upstream name server.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7816"/>
        <seriesInfo name="DOI" value="10.17487/RFC7816"/>
      </reference>
      <reference anchor="RFC9156">
        <front>
          <title>DNS Query Name Minimisation to Improve Privacy</title>
          <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
          <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="November" year="2021"/>
          <abstract>
            <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9156"/>
        <seriesInfo name="DOI" value="10.17487/RFC9156"/>
      </reference>
      <reference anchor="ACME">
        <front>
          <title>Automatic Certificate Management Environment (ACME)</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <author fullname="D. McCarney" initials="D." surname="McCarney"/>
          <author fullname="J. Kasten" initials="J." surname="Kasten"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8555"/>
        <seriesInfo name="DOI" value="10.17487/RFC8555"/>
      </reference>
      <reference anchor="HTTP2">
        <front>
          <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
          <author fullname="M. Belshe" initials="M." surname="Belshe"/>
          <author fullname="R. Peon" initials="R." surname="Peon"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
            <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7540"/>
        <seriesInfo name="DOI" value="10.17487/RFC7540"/>
      </reference>
      <reference anchor="TLS13">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="QUIC">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="DOH">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="6" month="April" year="2023"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-16"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC5222">
        <front>
          <title>LoST: A Location-to-Service Translation Protocol</title>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="A. Newton" initials="A." surname="Newton"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document describes an XML-based protocol for mapping service identifiers and geodetic or civic location information to service contact URIs.  In particular, it can be used to determine the location-appropriate Public Safety Answering Point (PSAP) for emergency services. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5222"/>
        <seriesInfo name="DOI" value="10.17487/RFC5222"/>
      </reference>
      <reference anchor="RFC8224">
        <front>
          <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
            <t>This document obsoletes RFC 4474.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8224"/>
        <seriesInfo name="DOI" value="10.17487/RFC8224"/>
      </reference>
      <reference anchor="RFC8225">
        <front>
          <title>PASSporT: Personal Assertion Token</title>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8225"/>
        <seriesInfo name="DOI" value="10.17487/RFC8225"/>
      </reference>
      <reference anchor="RFC8226">
        <front>
          <title>Secure Telephone Identity Credentials: Certificates</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8226"/>
        <seriesInfo name="DOI" value="10.17487/RFC8226"/>
      </reference>
      <reference anchor="RFC8588">
        <front>
          <title>Personal Assertion Token (PaSSporT) Extension for Signature-based Handling of Asserted information using toKENs (SHAKEN)</title>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <author fullname="M. Barnes" initials="M." surname="Barnes"/>
          <date month="May" year="2019"/>
          <abstract>
            <t>This document extends the Personal Assertion Token (PASSporT), which is a token object that conveys cryptographically signed information about the participants involved in communications.  The extension is defined based on the "Signature-based Handling of Asserted information using toKENs (SHAKEN)" specification by the ATIS/SIP Forum IP-NNI Task Group.  It provides both (1) a specific set of levels of confidence in the correctness of the originating identity of a call originated in a SIP-based telephone network as well as (2) an identifier that allows the Service Provider (SP) to uniquely identify the origin of the call within its network.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8588"/>
        <seriesInfo name="DOI" value="10.17487/RFC8588"/>
      </reference>
      <reference anchor="RFC5594">
        <front>
          <title>Report from the IETF Workshop on Peer-to-Peer (P2P) Infrastructure, May 28, 2008</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <date month="July" year="2009"/>
          <abstract>
            <t>This document reports the outcome of a workshop organized by the Real-time Applications and Infrastructure Area Directors of the IETF to discuss network delay and congestion issues resulting from increased Peer-to-Peer (P2P) traffic volumes.  The workshop was held on May 28, 2008 at MIT in Cambridge, MA, USA.  The goals of the workshop were twofold: to understand the technical problems that ISPs and end users are experiencing as a result of high volumes of P2P traffic, and to begin to understand how the IETF may be helpful in addressing these problems.  Gaining an understanding of where in the IETF this work might be pursued and how to extract feasible work items were highlighted as important tasks in pursuit of the latter goal.  The workshop was very well attended and produced several work items that have since been taken up by members of the IETF community.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5594"/>
        <seriesInfo name="DOI" value="10.17487/RFC5594"/>
      </reference>
      <reference anchor="RFC7567">
        <front>
          <title>IETF Recommendations Regarding Active Queue Management</title>
          <author fullname="F. Baker" initials="F." role="editor" surname="Baker"/>
          <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
          <date month="July" year="2015"/>
          <abstract>
            <t>This memo presents recommendations to the Internet community concerning measures to improve and preserve Internet performance. It presents a strong recommendation for testing, standardization, and widespread deployment of active queue management (AQM) in network devices to improve the performance of today's Internet. It also urges a concerted effort of research, measurement, and ultimate deployment of AQM mechanisms to protect the Internet from flows that are not sufficiently responsive to congestion notification.</t>
            <t>Based on 15 years of experience and new research, this document replaces the recommendations of RFC 2309.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="197"/>
        <seriesInfo name="RFC" value="7567"/>
        <seriesInfo name="DOI" value="10.17487/RFC7567"/>
      </reference>
      <reference anchor="RFC7713">
        <front>
          <title>Congestion Exposure (ConEx) Concepts, Abstract Mechanism, and Requirements</title>
          <author fullname="M. Mathis" initials="M." surname="Mathis"/>
          <author fullname="B. Briscoe" initials="B." surname="Briscoe"/>
          <date month="December" year="2015"/>
          <abstract>
            <t>This document describes an abstract mechanism by which senders inform the network about the congestion recently encountered by packets in the same flow. Today, network elements at any layer may signal congestion to the receiver by dropping packets or by Explicit Congestion Notification (ECN) markings, and the receiver passes this information back to the sender in transport-layer feedback. The mechanism described here enables the sender to also relay this congestion information back into the network in-band at the IP layer, such that the total amount of congestion from all elements on the path is revealed to all IP elements along the path, where it could, for example, be used to provide input to traffic management. This mechanism is called Congestion Exposure, or ConEx. The companion document, "Congestion Exposure (ConEx) Concepts and Use Cases" (RFC 6789), provides the entry point to the set of ConEx documentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7713"/>
        <seriesInfo name="DOI" value="10.17487/RFC7713"/>
      </reference>
    </references>
    <?line 130?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
