<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7687 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7687.xml">
<!ENTITY RFC7258 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY I-D.ietf-tls-esni SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-esni.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC7540 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7540.xml">
<!ENTITY RFC9000 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
<!ENTITY I-D.farrelll-mpls-opportunistic-encrypt SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.farrelll-mpls-opportunistic-encrypt.xml">
<!ENTITY RFC8461 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8461.xml">
<!ENTITY RFC7217 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7217.xml">
<!ENTITY RFC8064 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8064.xml">
<!ENTITY RFC8981 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8981.xml">
<!ENTITY RFC1984 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1984.xml">
<!ENTITY RFC6462 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6462.xml">
<!ENTITY RFC7480 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7480.xml">
<!ENTITY RFC7481 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7481.xml">
<!ENTITY RFC9082 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9082.xml">
<!ENTITY RFC9083 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9083.xml">
<!ENTITY RFC7484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7484.xml">
<!ENTITY RFC8056 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8056.xml">
<!ENTITY RFC8280 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8280.xml">
<!ENTITY DOI.10.5325_jinfopoli.11.2021.0376 SYSTEM "https://bib.ietf.org/public/rfc/bibxml7/reference.DOI.10.5325/jinfopoli.11.2021.0376.xml?anchor=Badii2021">
<!ENTITY RFC3365 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3365.xml">
]>


<rfc ipr="trust200902" docName="draft-farrell-tenyearsafter-02" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Ten Years After">Reflections on Ten Years Past The Snowden Revelations</title>

    <author initials="S." surname="Farrell" fullname="Stephen Farrell">
      <organization>Trinity College, Dublin</organization>
      <address>
        <postal>
          <country>Ireland</country>
        </postal>
        <email>stephen.farrell@cs.tcd.ie</email>
      </address>
    </author>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization>Digital Medusa</organization>
      <address>
        <email>farzaneh.badii@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Schneier" fullname="Bruce Schneier">
      <organization>Harvard University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>schneier@schneier.com</email>
      </address>
    </author>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization>Columbia University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>smb@cs.columbia.edu</email>
      </address>
    </author>

    <date year="2023" month="June" day="13"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo contains the thoughts and recountings of events that
transpired during and after the release of information about the NSA
by Edward Snowden in 2013.  There are four perspectives: that of someone
who was involved with sifting through the information to responsibly
inform the public, that of a security area director of the IETF, that of a human
rights expert, and that of a computer science and law professor.  The purpose
of this memo is to provide some historical perspective, while at the
same time offering a view as to what security and privacy challenges
the technical community should consider.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>On June 6th, 2013, an article appeared in <em>The Guardian</em> <xref target="guard2013"/>
that was the beginning of a series of what have come to be known as
the Snowden Revelations, describing certain activities of the United
States National Security Agency (NSA).  These activities included,
amongst others; secret court orders; secret agreements for the receipt
of so-called "meta-information" that includes source, destination, and
timing of communications; and tapping of communications lines.  The
breathtaking scope of the operations shocked the Internet technical
community that was reflected in a sea change within the IETF, IAB,
and other standards organizations.</t>

<t>Now that some years have past, it seems appropriate to reflect on that
period of time, to consider what effect the community's actions had,
where security has improved, how the threat surface has evolved, what
areas haven't improved, and where the community might invest future
efforts.</t>

<t>Bruce Schneier begins this compendium of individual essays by bringing
us back to 2013, recalling how it was for him and others to report
what was happening, and the mindset of those involved.  Next, Stephen
Farrell reviews the technical community's reactions and in particular
the reactions of the IETF community, technical advances, and where
threats remain.  Then Farzaneh Badii discusses the impact of those
advances – or lack thereof – on human rights.  Finally Steven
M. Bellovin puts the Snowden revelations into an ever-evolving
historical context of secrets and secret stealing that spans
centuries, closing with some suggestions for IETF.</t>

<t>Readers are invited to consider what impact we as a community have
had, what challenges remain, and what positive contribution the
technical community can and should make to address security and
privacy of citizens of the world.</t>

<t>-- Eliot Lear, Independent Submissions Editor for the RFC Series</t>

</section>
<section anchor="bruce-schneier-snowden-ten-years-later"><name>Bruce Schneier: Snowden Ten Years Later</name>

<t>In 2013 and 2014, I wrote extensively about new revelations regarding
NSA surveillance based on the documents provided by Edward
Snowden. But I had a more personal involvement as well.</t>

<t>I wrote the essay below in September 2013. The <em>New Yorker</em> agreed to
publish it, but the <em>Guardian</em> asked me not to. It was
scared of UK law enforcement, and worried that this essay would
reflect badly on it. And given that the UK police would raid its
offices in July 2014, it had legitimate cause to be worried.</t>

<t>Now, ten years later, I offer this as a time capsule of what those
early months of Snowden were like.</t>

<t>**********</t>

<t>It’s a surreal experience, paging through hundreds of top-secret NSA
documents. You’re peering into a forbidden world: strange, confusing,
and fascinating all at the same time.</t>

<t>I had flown down to Rio de Janeiro in late August at the request of
Glenn Greenwald. He had been working on the Edward Snowden archive for
a couple of months, and had a pile of more technical documents that he
wanted help interpreting. According to Greenwald, Snowden also thought
that bringing me down was a good idea.</t>

<t>It made sense. I didn't know either of them, but I have been writing
about cryptography, security, and privacy for decades. I could
decipher some of the technical language that Greenwald had difficulty
with, and understand the context and importance of various
document. And I have long been publicly critical of the NSA’s
eavesdropping capabilities. My knowledge and expertise could help
figure out which stories needed to be reported.</t>

<t>I thought about it a lot before agreeing. This was before David
Miranda, Greenwald’s partner, was detained at Heathrow airport by the
UK authorities; but even without that, I knew there was a risk. I fly
a lot—a quarter of a million miles per year—and being put on a TSA
list, or being detained at the US border and having my electronics
confiscated, would be a major problem. So would the FBI breaking into my
home and seizing my personal electronics. But in the end, that made me
more determined to do it.</t>

<t>I did spend some time on the phone with the attorneys recommended to
me by the ACLU and the EFF. And I talked about it with my partner,
especially when Miranda was detained three days before my departure.
Both Greenwald and his employer, the <em>Guardian</em>, are careful about whom
they show the documents to. They publish only those portions essential
to getting the story out. It was important to them that I be a
co-author, not a source. I didn’t follow the legal reasoning, but the
point is that the <em>Guardian</em> doesn’t want to leak the documents to
random people. It will, however, write stories in the public interest,
and I would be allowed to review the documents as part of that
process. So after a Skype conversation with someone at the <em>Guardian</em>, I
signed a letter of engagement.</t>

<t>And then I flew to Brazil.</t>

<t>I saw only a tiny slice of the documents, and most of what I saw was
surprisingly banal. The concerns of the top-secret world are largely
tactical: system upgrades, operational problems owing to weather,
delays because of work backlogs, and so on. I paged through weekly
reports, presentation slides from status meetings, and general
briefings to educate visitors. Management is management, even inside
the NSA Reading the documents, I felt as though I were sitting through
some of those endless meetings.</t>

<t>The meeting presenters try to spice things up. Presentations regularly
include intelligence success stories. There were details—what had been
found, and how, and where it helped—and sometimes there were attaboys
from “customers” who used the intelligence. I’m sure these are
intended to remind NSA employees that they’re doing good. It
definitely had an effect on me. Those were all things I want the NSA
to be doing.</t>

<t>There were so many code names. Everything has one: every program,
every piece of equipment, every piece of software. Sometimes code
names had their own code names. The biggest secrets seem to be the
underlying real-world information: which particular company
MONEYROCKET is; what software vulnerability EGOTISTICALGIRAFFE—really,
I am not making that one up—is; how TURBINE works. Those secrets
collectively have a code name—ECI, for exceptionally compartmented
information—and almost never appear in the documents. Chatting with
Snowden on an encrypted IM connection, I joked that the NSA cafeteria
menu probably has code names for menu items. His response: “Trust me
when I say you have no idea.”</t>

<t>Those code names all come with logos, most of them amateurish and a
lot of them dumb. Note to the NSA: take some of that more than
ten-billion-dollar annual budget and hire yourself a design
firm. Really; it’ll pay off in morale.</t>

<t>Once in a while, though, I would see something that made me stop,
stand up, and pace around in circles. It wasn’t that what I read was
particularly exciting, or important. It was just that it was
startling. It changed—ever so slightly—how I thought about the world.</t>

<t>Greenwald said that that reaction was normal when people started
reading through the documents.</t>

<t>Intelligence professionals talk about how disorienting it is living on
the inside. You read so much classified information about the world’s
geopolitical events that you start seeing the world differently. You
become convinced that only the insiders know what’s really going on,
because the news media is so often wrong. Your family is
ignorant. Your friends are ignorant. The world is ignorant. The only
thing keeping you from ignorance is that constant stream of classified
knowledge. It’s hard not to feel superior, not to say things like “If
you only knew what we know” all the time. I can understand how General
Keith Alexander, the director of the NSA, comes across as so
supercilious; I only saw a minute fraction of that secret world, and I
started feeling it.</t>

<t>It turned out to be a terrible week to visit Greenwald, as he was
still dealing with the fallout from Miranda’s detention. Two other
journalists, one from the Nation and the other from the <em>Hindu</em>, were
also in town working with him. A lot of my week involved Greenwald
rushing into my hotel room, giving me a thumb drive of new stuff to
look through, and rushing out again.</t>

<t>A technician from the <em>Guardian</em> got a search capability working while I
was there, and I spent some time with it. Question: when you’re given
the capability to search through a database of NSA secrets, what’s the
first thing you look for? Answer: your name.</t>

<t>It wasn’t there. Neither were any of the algorithm names I knew, not
even algorithms I knew that the US government used.</t>

<t>I tried to talk to Greenwald about his own operational security. It
had been incredibly stupid for Miranda to be traveling with NSA
documents on the thumb drive. Transferring files electronically is
what encryption is for. I told Greenwald that he and Laura Poitras
should be sending large encrypted files of dummy documents back and
forth every day.</t>

<t>Once, at Greenwald’s home, I walked into the backyard and looked for
TEMPEST receivers hiding in the trees. I didn’t find any, but that
doesn’t mean they weren’t there. Greenwald has a lot of dogs, but I
don’t think that would hinder professionals. I’m sure that a bunch of
major governments have a complete copy of everything Greenwald
has. Maybe the black bag teams bumped into each other in those early
weeks.</t>

<t>I started doubting my own security procedures. Reading about the NSA’s
hacking abilities will do that to you. Can it break the encryption on
my hard drive? Probably not. Has the company that makes my encryption
software deliberately weakened the implementation for it?
Probably. Are NSA agents listening in on my calls back to the US? Very
probably. Could agents take control of my computer over the Internet
if they wanted to? Definitely. In the end, I decided to do my best and
stop worrying about it. It was the agency’s documents, after all. And
what I was working on would become public in a few weeks.</t>

<t>I wasn't sleeping well, either. A lot of it was the sheer magnitude of
what I saw. It's not that any of it was a real surprise. Those of us
in the information security community had long assumed that the NSA
was doing things like this. But we never really sat down and figured
out the details, and to have the details confirmed made a big
difference. Maybe I can make it clearer with an analogy. Everyone
knows that death is inevitable; there's absolutely no surprise about
that. Yet it arrives as a surprise, because we spend most of our lives
refusing to think about it. The NSA documents were a bit like
that. Knowing that it is surely true that the NSA is eavesdropping on
the world, and doing it in such a methodical and robust manner, is
very different from coming face-to-face with the reality that it is
and the details of how it is doing it.</t>

<t>I also found it incredibly difficult to keep the secrets. The
<em>Guardian</em>’s process is slow and methodical. I move much faster. I
drafted stories based on what I found. Then I wrote essays about those
stories, and essays about the essays. Writing was therapy; I would
wake up in the wee hours of the morning, and write an essay. But that
put me at least three levels beyond what was published.</t>

<t>Now that my involvement is out, and my first essays are out, I feel a
lot better. I'm sure it will get worse again when I find another
monumental revelation; there are still more documents to go through.</t>

<t>I’ve heard it said that Snowden wants to damage America. I can say
with certainty that he does not. So far, everyone involved in this
incident has been incredibly careful about what is released to the
public. There are many documents that could be immensely harmful to
the US, and no one has any intention of releasing them. The documents
the reporters release are carefully redacted. Greenwald and I
repeatedly debated with <em>Guardian</em> editors the newsworthiness of story
ideas, stressing that we would not expose government secrets simply
because they’re interesting.</t>

<t>The NSA got incredibly lucky; this could have ended with a massive
public dump like Chelsea Manning’s State Department cables. I suppose
it still could. Despite that, I can imagine how this feels to the NSA.
It’s used to keeping this stuff behind multiple levels of security:
gates with alarms, armed guards, safe doors, and military-grade
cryptography. It’s not supposed to be on a bunch of thumb drives in
Brazil, Germany, the UK, the US, and who knows where else, protected
largely by some random people’s opinions about what should or should
not remain secret. This is easily the greatest intelligence failure in
the history of ever. It’s amazing that one person could have had so
much access with so little accountability, and could sneak all of this
data out without raising any alarms. The odds are close to zero that
Snowden is the first person to do this; he’s just the first person to
make public that he did. It’s a testament to General Alexander’s power
that he hasn’t been forced to resign.</t>

<t>It’s not that we weren’t being careful about security, it’s that our
standards of care are so different. From the NSA’s point of view,
we’re all major security risks, myself included. I was taking notes
about classified material, crumpling them up, and throwing them into
the wastebasket. I was printing documents marked “TOP
SECRET/COMINT/NOFORN” in a hotel lobby. And once, I took the wrong
thumb drive with me to dinner, accidentally leaving the unencrypted
one filled with top-secret documents in my hotel room. It was an
honest mistake; they were both blue.</t>

<t>If I were an NSA employee, the policy would be to fire me for that alone.</t>

<t>Many have written about how being under constant surveillance changes
a person. When you know you’re being watched, you censor yourself. You
become less open, less spontaneous. You look at what you write on your
computer and dwell on what you’ve said on the telephone, wonder how it
would sound taken out of context, from the perspective of a
hypothetical observer. You’re more likely to conform. You suppress
your individuality. Even though I have worked in privacy for decades,
and already knew a lot about the NSA and what it does, the change was
palpable. That feeling hasn’t faded. I am now more careful about what
I say and write. I am less trusting of communications technology. I am
less trusting of the computer industry.</t>

<t>After much discussion, Greenwald and I agreed to write three stories
together to start. All of those are still in progress. In addition, I
wrote two commentaries on the Snowden documents that were recently
made public. There’s a lot more to come; even Greenwald hasn’t looked
through everything.</t>

<t>Since my trip to Brazil [one month before], I’ve flown back to the US
once and domestically seven times—all without incident. I’m not on any
list yet. At least, none that I know about.</t>

<t>**********</t>

<t>As it happened, I didn’t write much more with Greenwald or the
<em>Guardian</em>. Those two had a falling out, and by the time everything
settled and both began writing about the documents
independently—Greenwald at the newly formed website the <em>Intercept</em>—I
got cut out of the process somehow. I remember hearing that Greenwald
was annoyed with me, but I never learned the reason. We haven’t spoken
since.</t>

<t>Still, I was happy with the one story I was part of: how the NSA hacks
Tor. I consider it a personal success that I pushed the <em>Guardian</em> to
publish NSA documents detailing QUANTUM. I don’t think that would have
gotten out any other way. And I still use those pages today when I
teach cybersecurity to policymakers at the Harvard Kennedy School.</t>

<t>Other people wrote about the Snowden files, and wrote a lot. It was a
slow trickle at first, and then a more consistent flow. Between
Greenwald, Bart Gellman, and the <em>Guardian</em> reporters, there ended up
being steady stream of news. (Bart brought in Ashkan Soltani to help
him with the technical aspects, which was a great move on his part,
even if it cost Ashkan a government job later.) More stories were
covered by other publications.</t>

<t>It started getting weird. Both Greenwald and Gellman held documents
back so they could publish them in their books. Jake Appelbaum, who
had not yet been accused of sexual assault by multiple women, was
working with Poitras. He partnered with Spiegel to release an
implant catalog from the NSA’s Tailored Access Operations group. To
this day, I am convinced that that document was not in the Snowden
archives: that Jake got it somehow, and it was released under the
cover of Edward Snowden. I thought it was important enough that I
started writing about each item in that document in my blog: ”NSA
Exploit of the Week.” That got my website blocked by the DoD: I keep a
framed print of the censor’s message on my wall.</t>

<t>Perhaps the most surreal document disclosures were when artists
started writing fiction based on the documents. This was in 2016, when
Laura Poitras built a secure room in New York to house the
documents. By then, the documents were years out of date.  And now
they’re over a decade out of date. (They were leaked in 2013, but most
of them were from 2012 or before.)</t>

<t>I ended up being something of a public ambassador for the
documents. When I got back from Rio, I gave talks at a private
conference in Woods Hole, the Berkman Center at Harvard, something
called the Congress and Privacy and Surveillance in Geneva, events at
both CATO and New America in DC, an event at the University of
Pennsylvania, an event at EPIC and a “Stop Watching Us” rally in DC,
the RISCS conference in London, the ISF in Paris, and...then...at the
IETF meeting in Vancouver in November 2013. (I remember little of
this; I am reconstructing it all from my calendar.)</t>

<t>What struck me at the IETF was the indignation in the room, and the
calls to action. And there was action, across many fronts. We
technologists did a lot to help secure the Internet, for example.</t>

<t>The government didn’t do its part, though. Despite the public outcry,
investigations by Congress, pronouncements by President Obama, and
federal court rulings. I don’t think much has changed. The NSA
canceled a program here and a program there, and it is now more public
about defense. But I don’t think it is any less aggressive about
either bulk or targeted surveillance. Certainly its government
authorities haven’t been restricted in any way. And surveillance
capitalism is still the business model of the Internet.</t>

<t>And Edward Snowden? We were in contact for a while on Signal. I
visited him once in Moscow, in 2016. And I had him do an guest
lecture to my class at Harvard for a few years, remotely by
Jitsi. Afterwards, I would hold a session where I promised to answer
every question he would evade or not answer, explain every response he
did give, and be candid in a way that someone with an outstanding
arrest warrant simply cannot. Sometimes I thought I could channel
Snowden better than he could.</t>

<t>But now it’s been a decade. Everything he knows is old and out of
date. Everything we know is old and out of date. The NSA suffered an
even worse leak of its secrets by the Russians, under the guise of the
Shadow Brokers, in 2016 and 2017. The NSA has rebuilt. It again has
capabilities we can only surmise.</t>

</section>
<section anchor="stephen-farrell-ietf-and-internet-technical-community-reaction"><name>Stephen Farrell: IETF and Internet Technical community reaction</name>

<t>In 2013, the IETF and, more broadly, the Internet technical, security and
privacy research communities, were surprised by the surveillance and attack
efforts exposed by the Snowden revelations.  <xref target="timeline"/> While the
potential for such was known, it was the scale and pervasiveness of the
activities disclosed that was alarming and, I think it fair to say, quite
annoying, for very many Internet engineers.</t>

<t>As for the IETF's reaction, informal meetings during the July 2013 IETF meeting
in Berlin indicated that IETF participants considered that these revelations
showed that we needed to do more to improve the security and privacy properties
of IETF protocols, and to help ensure deployments made better use of the
security and privacy mechanisms that already existed. In August, the IETF set up
a new mailing list <xref target="perpass"/> that ended up being a useful venue for triaging
proposals for work on these topics. At the November 2013 IETF meeting, there
was a lively and very well attended plenary session <xref target="plenary-video"/> on
"hardening the Internet" against such attacks, followed by a "birds of a
feather" <xref target="Perpass-BoF"/> devoted to more detailed discussion of possible
actions in terms of new working groups, protocols and best-current-practice
(BCP) documents that could help improve matters.  This was followed in
February/March 2014 by a joint IAB/W3C workshop on "strengthening the Internet
against pervasive monitoring" <xref target="STRINT"/> held in London and attended by 150
engineers (still the only IAB workshop in my experience where we needed a
wait-list for people after capacity for the venue was reached!). The STRINT
workshop report was eventually published as <xref target="RFC7687"/> in 2015, but in the
meantime work proceeded on a Best Current Practice (BCP) document codifying
that the IETF community considered that "pervasive monitoring is an attack"
<xref target="RFC7258"/> (aka BCP188). The IETF last-call discussion for that short
document included more than 1000 emails - while there was broad agreement on
the overall message, a number of IETF participants considered enshrining that
message in the RFC series and IETF processes was controversial. In any case the
BCP was published in May 2014. The key statement on which rough consensus was
reached is in the abstract of RFC7258 and says "Pervasive monitoring is a
technical attack that should be mitigated in the design of IETF protocols,
where possible." That document has since been referenced <xref target="refs-to-7258"/> by
many IETF working groups and RFCs as justifying additional work on security and
privacy. Throughout that period and beyond, the repercussions of the Snowden
revelations remained a major and ongoing agenda item for both of the IETF's
main technical management bodies - the IAB and the IESG (on which I served at
the time).</t>

<t>So far, I've really only described the processes with which the IETF dealt with
the attacks, but there was of course also much technical work started by IETF
participants that was at least partly motivated by the Snowden revelations.</t>

<t>In November 2013 a working group was established to document better practices
for using TLS in applications <xref target="UTA"/> so that deployments would be less at risk
in the face of some of the attacks related to stripping TLS or having
applications mis-use TLS APIs or parameters.  Similar work was done to update
recommendations for use of cryptography in other protocols in the <xref target="CURDLE"/>
working group later.  The CURDLE working group was to an extent created to
enable use of a set of new elliptic curves that had been documented by the IRTF
crypto forum research group. <xref target="CFRG"/> That work in turn had been partly
motivated by (perhaps ultimately unfounded) concerns about elliptic curves
defined in NIST standards, following the DUAL_EC_DRBG debacle <xref target="dual-ec"/> 
(described further below) where a
NIST random number generator had been deliberately engineered to produce output
that could be vulnerable to NSA attack.</t>

<t>Work to develop a new version of TLS was started in 2014, mainly due to
concerns that TLSv1.2 and earlier version implementations had been shown to be
vulnerable to a range of attacks over the years. The work to develop TLSv1.3
<xref target="RFC8446"/> also however aimed to encrypt more of the handshake so as to
expose less information to network observers - a fairly direct result of the
Snowden revelations.  Work to further improve TLS in this respect continues
today using the so-called encrypted client hello (ECH) <xref target="I-D.ietf-tls-esni"/>
mechanism to remove one of the last privacy leaks present in current TLS.</t>

<t>Work on ECH was enabled by significant developments to encrypt DNS traffic,
using DNS over TLS (DoT) <xref target="RFC7858"/> or DNS over HTTPS (DoH) <xref target="RFC8484"/> which also started as a result of
the Snowden revelations. Prior to that, privacy hadn't really been considered
when it came to DNS data or (more importantly) the act of accessing DNS data.
The trend towards encrypting DNS traffic represents a significant change for
the Internet, both in terms of reducing cleartext, but also in terms of moving
points-of-control. The latter aspect was, and remains, controversial, but the
IETF did its job of defining new protocols that can enable better DNS privacy.
Work on HTTP version 2 <xref target="RFC7540"/> and QUIC <xref target="RFC9000"/> further demonstrates
the trend in the IETF towards always-encrypting protocols as the new norm, at
least at and above the transport layer.</t>

<t>Of course, not all such initiatives bore fruit, for example attempts to define
a new MPLS encryption mechanism <xref target="I-D.farrelll-mpls-opportunistic-encrypt"/>
foundered due to a lack of interest and the existence of the already deployed
IEEE MACSEC scheme. But there has been a fairly clear trend towards trying to
remove cleartext from the Internet as a precursor to provide improved privacy
when considering network observers as attackers.</t>

<t>The IETF of course, forms only one part of the broader Internet technical
community, and there were many non-IETF activities triggered by the Snowden
revelations, a number of which also eventually resulted in new IETF work to
standardise better security and privacy mechanisms developed elsewhere.</t>

<t>In 2013, the web was largely unencrypted despite HTTPS being relatively
usable and that was partly due to problems using the WebPKI at scale. The
Let's Encrypt <xref target="LE"/> initiative issued its first certificates in 2015 as
part of its aim to try to move the web
towards being fully encrypted and has been extremely successful in helping
achieve that goal.  Subsequently, the automation protocols developed for
Let's Encrypt were standardised in the IETF's ACME <xref target="ACME"/> working group.</t>

<t>In 2013, most email transport between mail servers was cleartext,
directly enabling some of the attacks documented in the Snowden documents.
Significant effort by major mail services and MTA software developers since
then have resulted in more than 90% of email being encrypted between mail
servers and various IETF protocols have been defined in order to improve that
situation, e.g., SMTP MTA Strict Transport Security (MTA-STS). <xref target="RFC8461"/></t>

<t>Lastly, MAC addresses have historically been long-term fixed values visible to
local networks (and beyond), which enabled some tracking attacks that were
documented in the Snowden documents. <xref target="Toronto"/> 
Implementers/vendors and the IEEE 802
standards group recognised this weakness and started work on MAC address
randomisation that in turn lead to the IETF's <xref target="MADINAS"/> working group that
aims to ensure randomised MAC addresses can be used on the Internet without
causing unintentional harm.
There is also a history of IETF work on deprecating MAC-address based IPv6 interface identifiers,
advocating pseudo-random identifiers and temporary addresses, some of
which pre-dates Snowden. <xref target="RFC7217"/> <xref target="RFC8064"/> <xref target="RFC8981"/></t>

<t>In summary, the significantly large volume of technical work pursued in the
IETF and elsewhere as a result of the Snowden revelations has focussed on two
main things: decreasing the amount of plaintext that remains visible to network
observers and secondly reducing the number of long-term identifiers that enable
unexpected identification or re-identification of devices or users. This work
is not by any means complete, nor is deployment universal, but significant
progress has been made and the work continues even if the level of annoyance
at the attack has faded somewhat over time.</t>

<t>One should also note that there has been push-back against these improvements
in security and privacy and the changes they cause for deployments. That has
come from more or less two camps - those on whom these improvements force
change tend to react badly, but later figure out how to adjust. The second camp
being those who seemingly prefer not to strengthen security so as to for
example continue to achieve what they call "visibility" even in the face of the
many engineers who correctly argue that such an anti-encryption approach
inevitably leads to worse security overall. The recurring nature of this kind
of push-back is nicely illustrated by <xref target="RFC1984"/>. That informational document
was published in 1996 as an IETF response to an early iteration of the
perennial "encryption is bad" argument. In 2015, the unmodified 1996 text was
upgraded to a Best Current Practice (BCP200) as the underlying arguments have
not, and will not, change.</t>

<t>Looking back on all the above from a 2023 vantage point, I think that, as a
community of Internet engineers, we got a lot right, but that today there's way
more that needs to be done to better protect the security and privacy of people
who use the Internet. In particular, we (the technical community) haven't done
nearly as good a job at countering surveillance capitalism <xref target="zubhoff2019"/> which has exploded
in the last decade. In part, that's because many of the problems are outside of
the scope of bodies such as the IETF. For example, intrusive back-end sharing
of people's data for advertising purposes can't really be mitigated via
Internet protocols.</t>

<t>However, I also think that the real annoyance felt with respect to the Snowden
revelations is (in general) not felt nearly as much when it comes to the legal
but hugely privacy-invasive activities of major employers of Internet
engineers.</t>

<t>It's noteworthy that RFC7258 doesn't consider that bad actors are limited to
governments; and personally, I think many advertising industry schemes for
collecting data are egregious examples of pervasive monitoring and hence ought
also be considered an attack on the Internet that ought be mitigated where
possible.  However, the Internet technical community clearly hasn't acted in
that way over the last decade.</t>

<t>Perhaps that indicates that Internet engineers and the bodies in which they
congregate need to place much more emphasis on standards for ethical behaviour
than has been the case for the first half-century of the Internet.  And while
it would be good to see the current leaders of Internet bodies work to make
progress in that regard, at the time of writing, it sadly seems more likely that
government regulators will be the ones to try force better behaviour. That of
course comes with a significant risk of having regulations that stymie the kind
of permissionless innovation that characterised many earlier Internet
successes.</t>

<t>So while we got a lot right in our reaction to Snowden's revelations,
currently, we have a "worse" Internet.  Nonetheless, I do still hope to see a
sea-change there, as the importance of real Internet security and privacy for
people becomes utterly obvious to all, even the most hard core capitalists and
government signals intelligence agencies.  That may seem naive, but I remain
optimistic that as a fact-based community we (and eventually our employers)
will recognise that the lesser risk is to honestly aim to provide the best
security and privacy practically possible.</t>

</section>
<section anchor="farzaneh-badii-did-snowdens-revelations-help-with-protecting-human-rights-on-the-internet"><name>Farzaneh Badii: Did Snowden’s revelations help with protecting human rights on the Internet?</name>

<t>It is very difficult to scientifically measure the effect of Snowden's
revelations on human rights and the Internet. Anecdotally, we have
been witnessing dominant regulatory and policy approaches that impact
technologies and services that are at the core of protecting human
rights on the Internet. (A range of European Union laws that aims to
address online safety or concentration of data. There are many more
regulations that have an impact on the Internet.<xref target="Masnick2023"/>) There
has been little progress in fixing technical and policy issues that
help enable human rights. Snowden revelations did not have a
revolutionary effect on our approach towards not using policies and
technical means that have an effect on human rights, such as freedom
of expression, freedom of association and assembly and privacy. It did
not decrease the number of Internet shutdowns, nor the eagerness of
authoritarian (and even to some extent democratic countries) to
territorialize the Internet. Perhaps the revelations helped with the
evolution of some technical and policy aspects.</t>

<t>After Snowden’s revelations 10 years ago, engineers and advocates at
the Internet Engineering Task Force (IETF) responded in a few
ways. One prominent response was the issuance of a Best Current
Practice document, “Pervasive Monitoring Is an Attack” <xref target="RFC7258"/> by
Farrell and Tschofenig. The responses to Snowden revelations did not
mean that IETF had lost sight of issues such as privacy and
surveillance. There were instances of resistance to surveillance in
the past by engineers (we do not delve into how successful that was in
protecting human rights). But historically, many engineers believed
that widespread and habitual surveillance was too expensive to be
practical. The revelations proved them wrong.</t>

<t>Rights-centered activists were also involved with the IETF before the
revelations. For example, staff from Center for Democracy and
Technology (CDT) was undertaking work at the IETF (and was a member of
the Internet Architecture Board) and held workshops about the
challenges of creating privacy protective protocols and systems. The
technical shortcomings that were exploited by the National Security
Agency to carry out mass-scale surveillance were recognized by the
IETF before the Snowden revelations <xref target="Garfinkel1995"/>,<xref target="RFC6462"/>. In
2012, Joy Liddicoat and Avri Doria wrote a report at Internet Society
which extensively discussed the processes and principles of human
rights and Internet protocols <xref target="Doria2012"/>.</t>

<t>Perhaps the Snowden revelations brought more attention to the IETF and
its work as it related to important issues, such as privacy and
freedom of expression. It might have also expedited and helped with
more easily convening the Human Rights Protocol Considerations
research group in the Internet Research Task Force (IRTF). Co-chaired
by Niels ten Oever (who worked at Article 19 at the time) and Internet
governance activist Avri Doria, the Internet Research Task Force in
July 2015 chartered a Research Group on “Human Rights Protocol
Considerations” (the HRPC RG). The charter of the HRPC RG stated that
the group was established: “to research whether standards and
protocols can enable, strengthen or threaten human rights, as defined
in the UDHR and the International Covenant on Civil and Political
Rights (ICCPR).”</t>

<t>During the past decades, a few successful strides were made to create
protocols that, when and if implemented, aim at protecting privacy of
the users, as well as help with reducing pervasive surveillance. These
efforts were in keeping with the consensus of the IETF found in RFC
7258.  Sometimes these protocols have anti-censorship qualities as
well. A few examples immediately come to mind: 1) Encryption of DNS
queries (for example DNS over HTTPS); 2) ACME protocol underpinning
the Lets Encrypt initiative and 3) Registration Data Access Protocol
(RDAP)<xref target="RFC7480"/>,<xref target="RFC7481"/>,<xref target="RFC9082"/>,<xref target="RFC9083"/>,<xref target="RFC7484"/>,
<xref target="RFC8056"/>. (It is debatable that RDAP had anything to do with
Snowden revelations but it is still a good example and is finally
being implemented.)</t>

<t>DNS Queries over HTTPS protocol aimed to encrypt DNS queries. Four
years after RFC 7258, DoH was developed to tackle both active and
passive monitoring of DNS queries. It is also a tool that can help
with combatting censorship. Let's Encrypt was not an Internet protocol,
but it was an initiative that aimed to encrypt the web and later on
some of the automation protocols were standardized in the IETF ACME
working group. The Registration Data Access Protocol could solve a
long term problem: redacting the domain name registrants (and IP
address holders) sensitive, personal data but at the same time
enabling legitimate access to the information. As to the work of HRPC
research group, it has so far issued <xref target="RFC8280"/> by ten Oever and
Cath) and a number of informational Internet Drafts.</t>

<t>While we cannot really argue that all the movements and privacy
preserving protocols and initiatives that enable protecting human
rights at the infrastructure layer directly result from Snowden
revelations, I think it is safe to say that the revelations helped
with expediting the resolution of some of the “technical” hesitations
that had an effect on fixing Internet protocols that enabled
protection of human rights.</t>

<t>Unfortunately, the Snowden revelations have not yet helped us
meaningfully with adopting a human rights approach. We can’t agree on
prioritizing human rights in our Internet communities for a host of
reasons. This could be due to: 1) human rights are sometimes in
conflict with each other 2) it is simply not possible to mitigate the
human right violation through the Internet protocol 3) it is not
obvious for the engineers before the fact how the Internet protocol
contributes to enabling protection of human rights and how they can
fix the problem 4) the protocol is already there but market, law and a
host of other societal and political issues do not allow for
widespread implementation.</t>

<t>IETF did not purposefully take a long time to adopt and implement protocols that
enabled human rights. There were technical and political issues that
created barriers. For example, the IETF community attempted a few
times before to create a protocol that would disclose the necessary
information of IP holders and domain name registrants while at the
same time protecting their data (CRIPS and IRIS are two
examples). However, it was not until RDAP was developed and the
General Data Protection Regulation (GDPR) was enacted that Internet
Corporation for Assigned Names and Numbers had to consider instructing
registries and registrars to implement RDAP and its community had to
come up with a privacy compliant policy.  Overall, a host of
regulatory and market incentives can halt or slow down the
implementation of human rights enabling protocols and implementation
could depend on other organizations with their own political and
stakeholder conflicts.</t>

<t>Sometimes the protocol is available, but the regulatory framework and
the market do not allow for implementation. One curious example of
this is sanctions and their effect on IP addresses of sanctioned
nations. Imagine if we argue that registration of IPv4 is affected by
sanctions because it is deemed as an economic resource and because of
scarcity and monetization. In theory, if we move to IPv6, we can solve
the problem of access to the resources because IPv6 is not a scarce
resource. However, as we know, adoption of IPv6 depends not only on
technical availability. Adoption of IPv6 won’t be the complete
solution either and depends on laws and policies and the market.</t>

<t>Sometimes there are arguments over implementation of a protocol
because as it is perceived, while it can protect freedom of expression
and reduce surveillance, it can hamper other human rights. For
instance, we still have doubts about implementing DNS over HTTPS
without seriously considering its contributions to fight with
censorship and bring encryption to DNS queries. The arguments against
implementation of DoH include protection of children online and lack
of law enforcement access to data.</t>

<t>We must acknowledge that sometimes the technical solutions that we use
that protect one right (for example encryption to protect the right to
privacy or prevent surveillance) could potentially affect technical
and policy solutions that try to protect other human rights (for
example encryption could prevent financial institutions from
monitoring employees' network activities to detect fraudulent
behavior). Acknowledging and identifying these conflicts can help us
come up with alternative techniques that could protect human rights
while not hampering other technical solutions such as
encryption. Where such alternative techniques are not possible,
acknowledging the shortcoming could clarify and bring to light the
trade-offs that we have accepted in our Internet system.</t>

<t>Ironically, we advocate for connectivity and believe expressing
oneself on the Internet is a human right, but when a war erupts, we
resort to tools that impact that very concept. For example, some
believe via imposing sanctions on critical properties of the Internet,
we can punish the perpetrators of a war. The Regional Internet
Registries that are in charge of registration of IP addresses have
shown resilience to these requests.  However, some tech-companies, for
example Cogent <xref target="Roth2022"/>, decided not to serve sanctioned countries
and over-comply with sanctions. Over-compliance with sanctions could
hamper ordinary people's access to the Internet. <xref target="Badii2023"/></t>

<t>Perhaps we can solve some of these problems by undertaking a thorough
impact assessment and contextualization to reveal how and why Internet
protocols affect human rights (something Fidler and I argued
for <xref target="Badii2021"/>). Contextualization and
impact assessment can reveal how each Internet protocol or each line
of code, in which systems, have an impact on which and whose human
rights.</t>

<t>The HRPC RG (which I am a part of) and the larger human rights and
policy analyst communities are still struggling to analyze legal,
social and market factors alongside the protocols to have a good
understanding of what has an impact and what has to be changed. It is
hard, but it is not impossible. If we thoroughly document and research
the lifecycle of an Internet protocol and contextualize it, we might
have a better understanding of how and if we can actually fix which
parts of the protocol in order to protect human rights.</t>

<t>Overall, the revelations did, to some extent, contribute to the
evolution of our ideas and perspectives. Our next step should be to
undertake research on the impact of Internet systems (including
Internet protocols) on human rights, promote the implementation of
protocols good for human rights through policy and advocacy and focus
on which technical parts we can standardize to help with more
widespread implementation of human rights enabling Internet protocols.</t>

</section>
<section anchor="steven-m-bellovin-governments-and-cryptography-the-crypto-wars"><name>Steven M. Bellovin: Governments and Cryptography: The Crypto Wars</name>

<section anchor="historical-background"><name>Historical Background</name>

<t>It’s not a secret: many governments in the world don’t like it when
people encrypt their traffic. More precisely, they like strong
cryptography for themselves but not for others, whether those others
are private citizens or other countries. But the history is longer and
more complex than that.</t>

<t>For much of written history, both governments and individuals used
cryptography to protect their messages. To cite just one famous
example, Julius Caesar is said to have encrypted messages by shifting
letters in the alphabet by 3 <xref target="Kahn1996"/>. In modern parlance, 3 was
the key, and each letter was encrypted with</t>

<ul empty="true"><li>
  <t>C[i] = (P[i] + 3) mod 23</t>
</li></ul>

<t>(In his day, J, U, and W did not exist in the Latin alphabet.) Known
Arabic writings on cryptanalysis go back to at least the 8th century;
their sophistication shows that encryption was reasonably commonly
used. In the 9th century, Abu Yusuf Ya’qub ibn ‘Ishaq aṣ-Ṣabbah
al-Kindh developed and wrote about frequency analysis as a way to
crack ciphers <xref target="Borda2011"/>,<xref target="Kahn1996"/>.</t>

<t>In an era of minimal literacy, though, there wasn’t that much use of
encryption, simply because most people could neither read nor
write. Governments used encryption for diplomatic messages, and
cryptanalysts followed close behind. The famed Black Chambers of the
Renaissance era read messages from many different governments, while
early cryptographers devised stronger and stronger ciphers
<xref target="Kahn1996"/>. In Elizabethan times in England, Sir Francis Walsingham’s
intelligence agency intercepted and decrypted messages from Mary,
Queen of Scots; these messages formed some of the strongest evidence
against her and eventually led to her execution <xref target="Kahn1996"/>.</t>

<t>This pattern continued for centuries. In the United States, Thomas
Jefferson invented the so-called wheel cipher in the late 18th
century; it was reinvented about 100 years later by Etienne Bazeries
and used as a standard American military cipher well into World War II
<xref target="Kahn1996"/>. Jefferson and other statesmen of that era regularly used
cryptography when communicating with each other. An encrypted message
was even part of the evidence introduced in Aaron Burr’s 1807 trial
for treason <xref target="Kerr2020"/>,<xref target="Kahn1996"/>. Edgar Allan Poe claimed that he
could cryptanalyze any message sent to him <xref target="Kahn1996"/>.</t>

<t>The telegraph era upped the ante. In the U.S., just a year after
Samuel Morse deployed his first telegraph line between Baltimore and
Washington, his business partner, Francis Smith, published a codebook
to help customers protect their traffic from prying eyes
<xref target="Smith1845"/>.  In 1870, Britain nationalized its domestic telegraph network;
in response, Robert Slater published a more sophisticated codebook
<xref target="Slater1870"/>. On the government side, Britain took advantage of its
position as the central node in the world’s international telegraphic
networks to read a great deal of traffic passing through the country
<xref target="Headrick1991"/>,<xref target="Kennedy1971"/>. They used this ability strategically,
too—when war broke out in 1914, the British Navy cut Germany’s
undersea telegraph cables, forcing them to use radio; an intercept of
the so-called Zimmermann telegram, when cryptanalyzed, arguably led to
American entry into the war and thence to Germany’s defeat. Once the
U.S. entered the war, it required users of international telegraph
lines to deposit copies of the codebooks they used for compression, so
that censors could check messages for prohibited content <xref target="Kahn1996"/>.</t>

<t>In Victorian Britain, private citizens, often lovers, used encryption
in newspapers’ Personal columns to communicate without their parents’
knowledge. Charles Wheatstone and Charles Babbage used to solve these
elementary ciphers routinely, for their own amusement <xref target="Kahn1996"/>.</t>

<t>This pattern continued for many years. Governments regularly used
ciphers and codes, while other countries tried to break them; private
individuals would sometimes use encryption but not often, and rarely
well. But the two world wars marked a sea change, one that would soon
reverberate into the civilian world.</t>

<t>The first World War featured vast troop movements by all parties; this
in turn required a lot of encrypted communications, often by telegraph
or radio. These messages were often easily intercepted in
bulk. Furthermore, the difficulty of encrypting large volumes of
plaintext led to the development of a variety of mechanical encryption
devices, including Germany’s famed Enigma machine. World War II
amplified both trends. It also gave rise to machine-assisted
cryptanalysis, such as the United Kingdom’s bombes (derived from an
earlier Polish design) and Colossus machine, and the American’s device
for cracking Japan’s PURPLE system. The U.S. also used punch
card-based tabulators to assist in breaking other Japanese codes, such
as the Japanese Imperial Navy’s JN-25 <xref target="Kahn1996"/>,<xref target="Rowlett1998"/>.</t>

<t>These developments set the stage for the postwar SIGINT—Signals
Intelligence—environment. Many intra-government messages were sent by
radio, making them easy to intercept; advanced cryptanalytic machines
made cryptanalysis easier. Ciphers were getting stronger, though, and
government SIGINT agencies did not want to give up their access to
data. While there were undoubtedly many developments, two are well
known.</t>

<t>The first involved CryptoAG, a Swedish (and later Swiss) manufacturer
of encryption devices. The head of that company, Boris Hagelin, was a
friend of William F. Friedman, a pioneering American
cryptologist. During the 1950s, CryptoAG sold its devices to other
governments; apparently at Friedman’s behest, Hagelin weakened the
encryption in a way that let the NSA read the traffic <xref target="Miller2020"/>.</t>

<t>The story involving the British is less well-documented and less
clear. When some of Britain’s former colonies gained their
independence, the British government gave them captured, war surplus
Enigma machines to protect their own traffic. Some authors contend
that this was deceptive, in that these former colonies did not realize
that the British could read Enigma-protected traffic; others claim
that this was obvious but that these countries didn’t care: Britain
was no longer their enemy; it was neighboring countries they were
worried about. Again, though, this concerned governmental use of
encryption <xref target="Kahn1996"/>,<xref target="Baldwin2022"/>. There was still little private
use.</t>

</section>
<section anchor="the-crypto-wars-begin"><name>The Crypto Wars Begin</name>

<t>The modern era of conflict between individual’s desire for privacy and
government desires to read traffic began around 1972. The grain
harvest in the U.S.S.R. had failed; since relations between the Soviet
Union and the United States were temporarily comparatively warm, the
Soviet grain company— an arm of the Soviet government, of
course— entered into negotiations with private American
companies. Unknown to Americans at the time, Soviet intelligence was
intercepting the phone calls of the American negotiating teams. In
other words, private companies had to deal with state actors as a
threat. Eventually, U.S. intelligence learned of this, and came to a
realization: the private sector needed strong cryptography, too, to
protect American national interests <xref target="Broad1982"/>,<xref target="Johnson1998"/>). This
underscored the need for strong cryptography to protect American
civilian traffic—but the SIGINT people were unhappy at the thought of
more encryption that they couldn’t break.</t>

<t>Meanwhile, the U.S. was concerned about protecting 
unclassified data <xref target="Landau2014"/>. In 1973 and again in 1974, the
National Bureau of Standards (NBS) put out a call for a strong, modern
encryption algorithm. IBM submitted Lucifer, an internally developed
algorithm based on what has become known as a 16-round Feistel network. The
original version used a long key.
It seemed quite strong, so NBS sent it off to the NSA to
get their take. The eventual design, which was adopted in 1976 as the
Data Encryption Standard (DES), differed in some important ways from
Lucifer. 
First, the so-called S-boxes, the source of the cryptologic
strength of DES, were changed, and were now demonstrably not composed of
random integers. Many researchers alleged that the S-boxes contained
an NSA back door. It took 20 years for the truth to come out: the
S-boxes were in fact strengthened, not weakened. Most likely, IBM
independently discovered the attack now known as differential
cryptanalysis, though some scholars suspect that the NSA told them
about it. The non-random S-boxes protected against this attack. The
second change, though, was clearly insisted on by the NSA: the key size
was shortened, from Lucifer’s 112 bits to DES’s 56 bits. We now know
that the NSA wanted a 48-bit key size, while IBM wanted 64 bits; they
compromised at 56 bits.</t>

<t>Whitfield Diffie and Martin Hellman, at Stanford University, wondered
about the 56-bit keys. In 1979, they published a paper demonstrating
that the U.S. government, but few others, could afford to build a
brute-force cracking machine, one that could try all 2<sup>56</sup> possible
keys to crack a message. NSA denied tampering with the design; a
Senate investigating committee found that that was correct, but did
not discuss the shortened key length issue.</t>

<t>This, however, was not Diffie and Hellman’s greatest contribution to
cryptology. A few years earlier, they published a paper inventing what
is now known as public key cryptography. In 1978, Ronald Rivest, Adi
Shamir, and Leonard Adelman devised the RSA algorithm, which made it
usable. (An NSA employee, acting on his own, sent a letter warning
that academic conferences on cryptology might violate U.S. export
laws.)</t>

<t>Around the same time, George Davida at the University of Wisconsin
applied for a patent on a stream cipher; the NSA slapped a secrecy
order on the application. This barred him from even talking about his
invention. The publicity was devastating; the NSA had to back down.</t>

<t>The Crypto Wars had thus begun: civilians were inventing strong
encryption systems, and the NSA was tampering with them or trying to
suppress them. Bobby Inman, the then-director of the NSA, tried
creating a voluntary review process for academic papers, but very few
researchers were interested in participating <xref target="Landau1988"/>.</t>

<t>There were few major public battles during the 1980s, because there
were few new major use cases for civilian cryptography during that
time. There was one notable incident, though: Shamir, Amos Fiat, and
Uriel Feige invented zero-knowledge proofs and applied for a US
patent. In response, the US Army slapped a secrecy order on the
patent. After a great deal of public outrage and intervention by, of
all organizations, the NSA, the order was lifted on very narrow
grounds: the inventors were not American, and had been discussing
their work all over the world <xref target="Landau1988"/>.</t>

<t>In the 1990s, though, everything changed.</t>

</section>
<section anchor="the-battle-is-joined"><name>The Battle is Joined</name>

<t>There were three major developments in cryptography in the early
1990s. First, Phil Zimmermann released PGP (Pretty Good Privacy), a
package to encrypt email messages. In 1993, AT&amp;T planned to release
the TSD-3600, an easy-to-use phone encryptor aimed at business
travelers. Shortly after that, the Netscape Corporation released SSL
(Secure Socket Layer) as a way to enable web-based commerce using
their browser and web server. All of these were seen as threats by the
NSA and the FBI.</t>

<t>PGP was, at least arguably, covered by what was known as ITAR, the
International Trafficking in Arms Regulations—under American law,
encryption software was regarded as a weapon, so exports required a
license. It was also alleged to infringe the patents on the RSA
algorithm. Needless to say, both issues were problematic for what was
intended to be open source software. Eventually, the criminal
investigation into Zimmermann’s role in the spread of PGP overseas was
dropped, but the threat of such investigations remained to deter
others<xref target="Levy2001"/>.</t>

<t>The TSD-3600 was another matter. AT&amp;T was a major corporation that did
not want to pick a fight with the U.S. government, but international
business travelers were seen as a major market for the device. At the
government’s “request”, the DES chip was replaced with what was known
as the Clipper Chip. The Clipper chip used Skipjack, a cipher with
80-bit keys; it was thus much stronger against brute force attacks
than DES. However, it provided “key escrow”. Without going into any
details, the key escrow mechanism allowed U.S. government
eavesdroppers to consult a pair of (presumably secure) internal
databases and decrypt all communications protected by the chip. The
Clipper chip proved to be extremely unpopular with industry; that AT&amp;T
Bell Labs’ Matt Blaze found a weakness in the design<xref target="Blaze1994"/>, one
that let you use Skipjack without the key escrow feature, didn’t help
its reputation.</t>

<t>The third major development, SSL, was even trickier. SSL was aimed at
e-commerce, and of course Netscape wanted to be able to sell its
products outside the US. That would require an export license, so they
made a deal with the government: non-American users would receive a
version that used 40-bit keys, a key length far shorter than what the
NSA had agreed to 20 years earlier. (To get ahead of the story: there
was a compromise mode of operation, wherein an export-grade browser
could use strong encryption when talking to a financial
institution. This hybrid mode led to cryptographic weaknesses
discovered some 20 years later<xref target="Adrian2015"/>.)</t>

<t>Technologists and American industry pushed back. The IETF adopted the
Danvers Doctrine, described in <xref target="RFC3365"/>:</t>

<ul empty="true"><li>
  <t>At the 32nd IETF held in Danvers, Massachusetts during April of 1995
the IESG asked the plenary for a consensus on the strength of security
that should be provided by IETF standards.  Although the immediate
issue before the IETF was whether or not to support “export” grade
security (which is to say weak security) in standards, the question
raised the generic issue of security in general.</t>
</li></ul>

<ul empty="true"><li>
  <t>The overwhelming consensus was that the IETF should standardize on the
use of the best security available, regardless of national policies.
This consensus is often referred to as the “Danvers Doctrine”.</t>
</li></ul>

<t>Then American companies started losing business to their overseas
competitors, who did not have to comply with U.S. export laws. All of
this led to what seemed like a happy conclusion: the U.S. government
drastically loosened its export rules for cryptographic software. All
was well—or so it seemed…</t>

</section>
<section anchor="the-hidden-battle"><name>The Hidden Battle</name>

<t>Strong cryptography was here to stay, and it was no longer an American
monopoly, if indeed it ever was. The Information Assurance Directorate
of the NSA, the part of the agency that is supposed to protect
U.S. data, was pleased by the spread of strong cryptography. When the
Advanced Encryption Standard (AES) competition was held, there were no
allegations of malign NSA interference; in fact, the winning entry was
devised by two Europeans, Joan Daemen and Vincent Rijmen. But the NSA
and its SIGINT needs did not go away—the agency merely adopted other
techniques.</t>

<t>I have often noted that one doesn’t go through strong security, one
goes around it. When strong encryption became more common and much
more necessary, the NSA started going around it, by targeting
computers and the software that they run. And it seems clear that they
believe that AES is quite strong; they’ve even endorsed its use for
protecting TOP SECRET information. But there was an asterisk attached
to that endorsement: AES is suitable if and only if properly used and
implemented. Therein lies the rub.</t>

<t>The first known attempt to tamper with outside cryptographic
mechanisms was discovered in 2007, when two Microsoft researchers, Dan
Shumow and Niels Ferguson, noted an odd property of a
NIST-standardized random number generator, DUAL_EC_DRBG. (The NBS
renamed itself to NIST, the National Institute of Standards and
Technology.) Random numbers, unpredictable numbers are vital for
cryptography, but Shumow and Ferguson showed that if certain constants
in DUAL_EC_DRBG were chosen in a particular way with a
known-but-hidden other number, whoever knew that number could predict
all future random numbers from a system given a few sample bytes to
start from <xref target="Kostyuk2022"/>. These sample bytes could come from
known keys, nonces, or anything else. Where did the constants in
DUAL_EC_DRBG come from and how were they chosen or generated? No one
who knows is talking. But although cryptographers and security
specialists were very suspicious—Bruce Schneier wrote in 2007, before
more facts came out, that “both NIST and the NSA have some explaining
to do”; I assigned my students reading on the topic—the issue didn’t
really get any traction until six years later, when among the papers
that Edward Snowden disclosed was the information that the NSA had
indeed tampered with a major cryptographic standard.</t>

<t>The revelations didn’t stop there. There have been allegations that
the NSA paid some companies to use DUAL_EC_DRBG in their
products. Some people have claimed that there were attempts to modify
some IETF standards to make enough random bytes visible, to aid in
exploiting the random number generator. A major vendor of networking
gear, Juniper, did use DUAL_EC_DRBG in some of its products, but with
different constants<xref target="Checkoway2016"/>. Where did these come from? Were
they from the NSA or some other government? Could their source tree
have been hacked by an intelligence agency? There was a different hack
of their code at around the same time<xref target="Moore2015"/>. No one is talking.</t>

<t>The Snowden revelations also included data suggesting that the NSA had
a worldwide eavesdropping network and a group that tried very
specific, targeted hacks on very specific targets’ systems. In
retrospect, neither is surprising: “spies gonna spy”. The NSA’s
business is signals intelligence; of course they’re going to try to
intercept traffic. Indeed, the DUAL_EC_DRBG tampering is useless to
anyone who has not collected messages to decrypt. And targeted hacks
are a natural way around strong encryption: collect the data before it
is encrypted or after it is decrypted, and don’t worry about the
strength of the algorithms.</t>

<t>The privacy community, worldwide, was appalled, though perhaps they
shouldn’t have been. It calls to mind the line that Claude Rains'
character uttered in the movie
Casablanca <xref target="Curtiz"/>: “I’m shocked, shocked to find that gambling is going on in
here.” The immediate and continuing reaction was to deploy more
encryption. The standards have long existed; what was missing was
adoption. One barrier was the difficulty and expense of getting
certificates to use with TLS; that void was filled by Let's Encrypt <xref target="LE"/>,
which made free certificates easy to get online. Today, most HTTP
traffic is encrypted, so much so that Google’s search engine
down-ranks sites that do not use it. Major email providers uniformly
use TLS to protect all traffic. WiFi, though a local area issue, now
uses much stronger encryption. (It's important to remember that
security and insecurity have economic components. Security doesn't have
to be perfect to be very useful, if it raises the attackers' costs
by enough.)</t>

<t>The news on the software side is less good. Not a day goes by when one
does not read of organizations being hit by ransomware. It goes
without saying that any threat actor capable of encrypting disks is
also capable of stealing the information on them; indeed, that is a
frequent accompanying activity, since the threat of disclosure is
another incentive to pay for those sites that do have good enough
backups. Major vendors have put a lot of effort into securing their
software, bugs and operational errors by end-user sites persist.</t>

</section>
<section anchor="whither-the-ietf"><name>Whither the IETF?</name>
<t>Signal intelligence agencies, not just the NSA, but its peers around
the globe—most major countries have their own—are not going to go
away. The challenges that have beset the NSA are common to all such
agencies, and their solutions are likely the same. The question is
what should be done to protect individual privacy. A number of strong
democracies, such as Australia and the United Kingdom, are already
moving to restrict encryption. Spurred on by complaints from the FBI
and other law enforcement agencies, the US Congress frequently
considers bills to do the same.</t>

<t>The IETF has long had a commitment to strong, ubiquitous
encryption. This is a good thing. It needs to continue, with
cryptography and other security features designed into protocols from
the beginning. But there is also a need for maintenance. Parameters
such as key lengths and modulus sizes age; a value that is acceptable
today may not be 10 years hence. (We’ve already seen apparent problems
from 1024-bit moduli specified in an RFC, an RFC that was not modified
when technology improved enough that attacking encryption based on
them had become feasible.<xref target="Adrian2015"/>) The IETF can do nothing about
the code that vendors ship or that sites use, but it can alert the
world that it thinks things have changed.</t>

<t>Cryptoagility is of increasing importance. In the next very few years,
we will have so-called post-quantum algorithms. Both protocols and key
lengths will need to change, perhaps drastically. Is the IETF ready?
What will happen to, say, DNSSEC if key lengths become drastically
longer? Backwards compatibility will remain important, but that, of
course, opens the door to other attacks. We’ve long thought about
them; we need to be sure that our mechanisms work—we've
been surprised in the past.<xref target="BellovinRescorla2006"/></t>

<t>We also need to worry more about metadata. General Michael Hayden,
former director of both the NSA and the CIA, once remarked, “We kill
people based on metadata” <xref target="Ferran2014"/>. But caution is necessary;
attempts to hide metadata can have side-effects. To give a trivial
example, Tor is quite strong, but if your exit node is in a different
country than you are in, web sites that use IP geolocation may present
their content in a language foreign to you. More generally, many
attempts to hide metadata involve trusting a different party; that
party may turn out to be untrustworthy or it may itself become a
target of attack. As another prominent IETFer has remarked,
“Insecurity is like entropy; you can’t destroy it but you can move it
around.” The IETF has done a lot; it needs to do more. And remember
that the risk here is not just governments acting directly, it's also
private companies that collect the data and sell it to all comers.</t>

<t>Finally, the IETF must remember that its middle name is
“Engineering”. To me, one of the attributes of engineering is the art
of picking the right solution in an over-constrained
environment. Intelligence agencies won’t go away, nor will national
restrictions on cryptography. We have to pick the right path while
staying true to our principles.</t>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>Susan Landau added many valuable comments to Steve Bellovin's essay.</t>

<t>We thank Carsten Bormann, Brian Carpenter, Wendy Grossman, Kathleen Moriarty,
Jan Schaumann and Paul Wouters for comments and review of this text, though
that of course doesn't mean that they necessrily agree with the text.</t>

<t>This document was created at the behest of Eliot Lear, who also 
cat herded and did some editing.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Each or any of the authors may have forgotten or omitted things
or gotten things wrong. We're sorry if that's the case, but that's
in the nature of a look-back such as this. Such flaws almost 
certainly won't worsen security or privacy though.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>No changes to IANA processes are made by this memo.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>

<reference anchor="guard2013" >
  <front>
    <title>NSA collecting phone records of millions of Verizon customers daily</title>
    <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
      <organization>The Guardian</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="ACME" target="https://datatracker.ietf.org/wg/acme/">
  <front>
    <title>Automated Certificate Management Environment (ACME)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Perpass-BoF" target="https://www.ietf.org/proceedings/88/perpass.html">
  <front>
    <title>IETF 88 Perpass BoF session</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="CFRG" target="https://datatracker.ietf.org/rg/cfrg/">
  <front>
    <title>IRTF Crypto Forum (CFRG)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="CURDLE" target="https://datatracker.ietf.org/wg/curdle/">
  <front>
    <title>curdle WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Curtiz" >
  <front>
    <title>Casablanca</title>
    <author initials="M." surname="Curtiz" fullname="Michael Curtiz">
      <organization></organization>
    </author>
    <author initials="J. J." surname="Epstein" fullname="Julius J. Epstein">
      <organization></organization>
    </author>
    <author initials="P. G." surname="Epstein" fullname="Philip G. Epstein">
      <organization></organization>
    </author>
    <author initials="H." surname="Koch" fullname="Howard Koch">
      <organization></organization>
    </author>
    <date year="1942"/>
  </front>
</reference>
<reference anchor="dual-ec" target="https://eprint.iacr.org/2015/767.pdf">
  <front>
    <title>Dual EC, A standardized back door</title>
    <author initials="D." surname="Bernstein" fullname="Daniel Bernstein">
      <organization></organization>
    </author>
    <author initials="T." surname="Lange" fullname="Tanja Lange">
      <organization></organization>
    </author>
    <author initials="R." surname="Niederhagen" fullname="Ruben Niederhagen">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="LE" target="https://dl.acm.org/doi/pdf/10.1145/3319535.3363192">
  <front>
    <title>Let's Encrypt - an automated certificate authority to encrypt the entire web</title>
    <author initials="J." surname="Aas" fullname="Josh Aas">
      <organization></organization>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization></organization>
    </author>
    <author initials="B." surname="Case" fullname="Benton Case">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Eckersley" fullname="Peter Eckersley">
      <organization></organization>
    </author>
    <author initials="A." surname="Flores-L{\'o}pez" fullname="Alan Flores-L{\'o}pez">
      <organization></organization>
    </author>
    <author initials="A." surname="Halderman" fullname="Alex Halderman">
      <organization></organization>
    </author>
    <author initials="J." surname="Hoffman-Andrews" fullname="Jacob Hoffman-Andrews">
      <organization></organization>
    </author>
    <author initials="J." surname="Kasten" fullname="James Kasten">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="S." surname="Schoen" fullname="Seth Schoen">
      <organization></organization>
    </author>
    <author initials="B." surname="Warren" fullname="Brad Warren">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="MADINAS" target="https://datatracker.ietf.org/wg/madinas/)">
  <front>
    <title>MADINAS WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="perpass" target="https://mailarchive.ietf.org/arch/browse/perpass/">
  <front>
    <title>perpass mailing list</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="plenary-video" target="https://www.youtube.com/watch?v=oV71hhEpQ20&amp;pp=ygUQaWV0ZiA4OCBwbGVuYXJ5IA%3D%3D">
  <front>
    <title>IETF 88 Pleary video</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="refs-to-7258" target="https://datatracker.ietf.org/doc/rfc7258/referencedby/">
  <front>
    <title>References to RFC7258</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="timeline" target="https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)">
  <front>
    <title>Global surveillance disclosures (2013–present)</title>
    <author >
      <organization>Wikimedia foundation</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="STRINT" target="https://www.w3.org/2014/strint/">
  <front>
    <title>A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="Toronto" target="https://www.npr.org/sections/thetwo-way/2014/01/31/269418375/airport-wi-fi-used-to-track-travelers-snowden-leak-alleges">
  <front>
    <title>Canada Used Airport Wi-Fi To Track Travelers, Snowden Leak Alleges</title>
    <author >
      <organization>National Public Radio</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="UTA" target="https://datatracker.ietf.org/wg/uta/">
  <front>
    <title>Using TLS in Applications working group (UTA) working group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Kahn1996" >
  <front>
    <title>The Code Breakers, 2nd Edition</title>
    <author initials="D." surname="Kahn" fullname="David Kahn">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
  <seriesInfo name="Scribner" value=""/>
</reference>
<reference anchor="Borda2011" >
  <front>
    <title>Fundamentals in Information Theory and Coding. Berlin</title>
    <author initials="M." surname="Borda" fullname="Monica Borda">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
  <seriesInfo name="Springer" value=""/>
</reference>
<reference anchor="Kerr2020" >
  <front>
    <title>Decryption Originalism: The Lessons of Burr.</title>
    <author initials="O. S." surname="Kerr" fullname="Orin Kerr">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="Harvard Law Review" value="134:905"/>
</reference>
<reference anchor="Smith1845" target="http://books.google.com/books?id=Z45clCxsF7EC">
  <front>
    <title>The Secret Corresponding Vocabulary, Adapted for Use to Morse’s Electro-Magnetic Telegraph: And Also in Conducting Written Correspondence, Transmitted by the Mails, or Otherwise</title>
    <author initials="F. O." surname="Smith" fullname="Francis O. Smith">
      <organization></organization>
    </author>
    <date year="1845"/>
  </front>
  <seriesInfo name="Thurston, Isley &amp; Co" value=""/>
</reference>
<reference anchor="Slater1870" target="http://books.google.com/books?id=MJYBAAAAQAAJ">
  <front>
    <title>Telegraphic Code, to Ensure Secresy in the Transmission of Telegrams, First Edition.</title>
    <author initials="R." surname="Slater" fullname="Robert Slater">
      <organization></organization>
    </author>
    <date year="1870"/>
  </front>
  <seriesInfo name="W.R. Gray" value=""/>
</reference>
<reference anchor="Headrick1991" >
  <front>
    <title>The Invisible Weapon: Telecommunications and International Politics, 1851–1945</title>
    <author initials="D. R." surname="Headrick" fullname="Daniel R. Headrick">
      <organization></organization>
    </author>
    <date year="1991"/>
  </front>
  <seriesInfo name="Oxford University Press" value=""/>
</reference>
<reference anchor="Kennedy1971" target="http://www.jstor.org/stable/563928">
  <front>
    <title>Imperial Cable Communications and Strategy, 1870-1914</title>
    <author initials="P. M." surname="Kennedy" fullname="Paul M. Kennedy">
      <organization></organization>
    </author>
    <date year="1971"/>
  </front>
  <seriesInfo name="English Historical Review" value="86 (341): 728–52"/>
</reference>
<reference anchor="Rowlett1998" >
  <front>
    <title>The Story of MAGIC: Memoirs of an American Cryptologic Pioneer</title>
    <author initials="F. B." surname="Rowlett" fullname="Frank B. Rowlett">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Aegean Park Press" value=""/>
</reference>
<reference anchor="Miller2020" target="https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/">
  <front>
    <title>The Intelligence Coup of the Century</title>
    <author initials="G." surname="Miller" fullname="Greg Miller">
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
  <seriesInfo name="The Washington Post" value=""/>
</reference>
<reference anchor="Baldwin2022" target="https://drenigma.org/2022/03/02/did-britain-sell-enigmas-postwar/">
  <front>
    <title>Did Britain Sell Enigmas Postwar?</title>
    <author initials="M." surname="Baldwin" fullname="Mark Baldwin">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Dr. Enigma (blog)" value=""/>
</reference>
<reference anchor="Broad1982" >
  <front>
    <title>Evading the Soviet Ear at Glen Cove</title>
    <author initials="W. J." surname="Broad" fullname="William J. Broad">
      <organization></organization>
    </author>
    <date year="1982"/>
  </front>
  <seriesInfo name="Science" value="217 (3): 910–11"/>
</reference>
<reference anchor="Landau1988" >
  <front>
    <title>Zero Knowledge and the Department of Defense</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Notices of the American Mathematical Society [Special Article Series]" value="35 (1): 5–12"/>
</reference>
<reference anchor="Landau2014" >
  <front>
    <title>Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Journal of National Security Law &amp; Policy" value="Vol 7, No. 3"/>
</reference>
<reference anchor="Johnson1998" target="https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/cryptologic-histories/cold_war_iii.pdf">
  <front>
    <title>American Cryptology During the Cold War, 1945-1989; Book III: Retrenchment and Reform</title>
    <author initials="T. R." surname="Johnson" fullname="Thomas R. Johnson">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="NSA" value=""/>
</reference>
<reference anchor="Kostyuk2022" target="https://www.harvardnsj.org/wp-content/uploads/sites/13/2022/06/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf">
  <front>
    <title>Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process</title>
    <author initials="N." surname="Kostyuk" fullname="Nadyia Kostyuk">
      <organization></organization>
    </author>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Harvard National Security Journal" value="13 (2): 224–84"/>
</reference>
<reference anchor="Ferran2014" target="https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-based-on-metadata">
  <front>
    <title>Ex-NSA Chief: "We Kill People Based on Metadata"</title>
    <author initials="L." surname="Ferran" fullname="Lee Ferran">
      <organization></organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="ABC News" value=""/>
</reference>
<reference anchor="Adrian2015" target="https://weakdh.org/imperfect-forward-secrecy.pdf">
  <front>
    <title>Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.</title>
    <author initials="D." surname="Adrian" fullname="David Adrian">
      <organization></organization>
    </author>
    <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Gaudry" fullname="Pierrick Gaudry">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS)" value=""/>
</reference>
<reference anchor="BellovinRescorla2006" target="https://www.cs.columbia.edu/~smb/papers/new-hash.pdf">
  <front>
    <title>Deploying a New Hash Algorithm</title>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization></organization>
    </author>
    <author initials="E. K." surname="Rescorla" fullname="Eric K. rescorla">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="Proceedings of NDSS '06" value=""/>
</reference>
<reference anchor="Blaze1994" target="http://www.mattblaze.org/papers/eesproto.pdf">
  <front>
    <title>Protocol Failures in the Escrowed Encryption Standard</title>
    <author initials="M." surname="Blaze" fullname="Matt Blaze">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="Proceedings of Second ACM Conference on Computer and Communications Security" value=""/>
</reference>
<reference anchor="Checkoway2016" target="https://dl.acm.org/citation.cfm?id=2978395">
  <front>
    <title>A Systematic Analysis of the Juniper Dual EC Incident</title>
    <author initials="S." surname="Checkoway" fullname="Stephen Checkoway">
      <organization></organization>
    </author>
    <author initials="J." surname="Maskiewicz" fullname="Jacob Maskiewicz">
      <organization></organization>
    </author>
    <author initials="C." surname="Garman" fullname="Christina Garman">
      <organization></organization>
    </author>
    <author initials="J." surname="Fried" fullname="Joshua Fried">
      <organization></organization>
    </author>
    <author initials="S." surname="Cohney" fullname="Shaanan Cohney">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <author initials="R. P." surname="Weinmann" fullname="Ralf-Philipp Weinmann">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="" surname="Hovav Shacham" fullname="Hovav Shacham">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security" value="468–79"/>
</reference>
<reference anchor="Levy2001" >
  <front>
    <title>Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age</title>
    <author initials="S." surname="Levy" fullname="Steven Levy">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Viking" value=""/>
</reference>
<reference anchor="Moore2015" target="https://www.rapid7.com/blog/post/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor/">
  <front>
    <title>CVE-2015-7755: Juniper ScreenOS Authentication Backdoor</title>
    <author initials="H. D." surname="Moore" fullname="H.D. Moore">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="Rapid7 Blog" value=""/>
</reference>
<reference anchor="Doria2012" target="https://www.internetsociety.org/resources/doc/2012/human-rights-and-internet-protocols-comparing-processes-and-principles/">
  <front>
    <title>Human Rights and Internet Protocols: Comparing Processes and Principles</title>
    <author initials="A." surname="Doria" fullname="Avri Doria">
      <organization></organization>
    </author>
    <author initials="J." surname="Liddicoat" fullname="Joy Liddicoat">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="The Internet Society" value=""/>
</reference>
<reference anchor="Garfinkel1995" >
  <front>
    <title>GPG: Pretty Good Privacy</title>
    <author initials="S." surname="Garfinkel" fullname="Simson Garfinkel">
      <organization></organization>
    </author>
    <date year="1995"/>
  </front>
  <seriesInfo name="O'Reilly and Associates" value=""/>
</reference>
<reference anchor="Masnick2023" target="https://copia.is/library/unintended-consequences/">
  <front>
    <title>The Unintended Consequences of Internet Regulation</title>
    <author initials="M." surname="Masnick" fullname="Mike Masnick">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Roth2022" target="https://www.theverge.com/2022/3/5/22962822/internet-backbone-provider-cogent-shuts-off-service-russia">
  <front>
    <title>Internet backbone provider shuts off service in Russia</title>
    <author initials="E." surname="Roth" fullname="Emma Roth">
      <organization></organization>
    </author>
    <date year="2022" month="March"/>
  </front>
  <seriesInfo name="The Verge" value=""/>
</reference>
<reference anchor="zubhoff2019" >
  <front>
    <title>The age of surveillance capitalism, The fight for a human future at the new frontier of power</title>
    <author initials="S." surname="Zuboff" fullname="Shoshana Zuboff">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Profile Books, ISBN 9781781256855" value=""/>
</reference>
<reference anchor="Badii2023" target="https://digitalmedusa.org/wp-content/uploads/2023/05/SanctionsandtheInternet-DigitalMedusa.pdf">
  <front>
    <title>Sanctions and the Internet</title>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
&RFC7687;
&RFC7258;
&RFC8446;
&I-D.ietf-tls-esni;
&RFC7858;
&RFC8484;
&RFC7540;
&RFC9000;
&I-D.farrelll-mpls-opportunistic-encrypt;
&RFC8461;
&RFC7217;
&RFC8064;
&RFC8981;
&RFC1984;
&RFC6462;
&RFC7480;
&RFC7481;
&RFC9082;
&RFC9083;
&RFC7484;
&RFC8056;
&RFC8280;
&DOI.10.5325_jinfopoli.11.2021.0376;
&RFC3365;


    </references>


<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>RFC editor: please remove this section.</t>

<t>Draft -02:</t>

<t><list style="symbols">
  <t>A bunch of typo fixes and added acks.</t>
</list></t>

<t>Draft -01:</t>

<t><list style="symbols">
  <t>Changes based on ISE review</t>
</list></t>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

