<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7687 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7687.xml">
<!ENTITY RFC7258 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY I-D.ietf-tls-esni SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-esni.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC7540 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7540.xml">
<!ENTITY RFC9000 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
<!ENTITY I-D.farrelll-mpls-opportunistic-encrypt SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.farrelll-mpls-opportunistic-encrypt.xml">
<!ENTITY RFC8461 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8461.xml">
<!ENTITY RFC7217 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7217.xml">
<!ENTITY RFC8064 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8064.xml">
<!ENTITY RFC8981 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8981.xml">
<!ENTITY RFC1984 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1984.xml">
<!ENTITY RFC6462 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6462.xml">
<!ENTITY RFC7480 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7480.xml">
<!ENTITY RFC7481 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7481.xml">
<!ENTITY RFC9082 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9082.xml">
<!ENTITY RFC9083 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9083.xml">
<!ENTITY RFC7484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7484.xml">
<!ENTITY RFC8056 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8056.xml">
<!ENTITY RFC8280 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8280.xml">
<!ENTITY DOI.10.5325_jinfopoli.11.2021.0376 SYSTEM "https://bib.ietf.org/public/rfc/bibxml7/reference.DOI.10.5325/jinfopoli.11.2021.0376.xml?anchor=Badii2021">
<!ENTITY RFC3365 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3365.xml">
]>


<rfc ipr="trust200902" docName="draft-farrell-tenyearsafter-03" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Ten Years After">Reflections on Ten Years Past The Snowden Revelations</title>

    <author initials="S." surname="Farrell" fullname="Stephen Farrell">
      <organization>Trinity College, Dublin</organization>
      <address>
        <postal>
          <country>Ireland</country>
        </postal>
        <email>stephen.farrell@cs.tcd.ie</email>
      </address>
    </author>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization>Digital Medusa</organization>
      <address>
        <email>farzaneh.badii@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Schneier" fullname="Bruce Schneier">
      <organization>Harvard University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>schneier@schneier.com</email>
      </address>
    </author>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization>Columbia University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>smb@cs.columbia.edu</email>
      </address>
    </author>

    <date year="2023" month="June" day="19"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo contains the thoughts and recountings of events that
transpired during and after the release of information about the NSA
by Edward Snowden in 2013.  There are four perspectives: that of someone
who was involved with sifting through the information to responsibly
inform the public, that of a security area director of the IETF, that of a human
rights expert, and that of a computer science and law professor.  The purpose
of this memo is to provide some historical perspective, while at the
same time offering a view as to what security and privacy challenges
the technical community should consider.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>On June 6th, 2013, an article appeared in <em>The Guardian</em> <xref target="guard2013"/>
that was the beginning of a series of what have come to be known as
the Snowden Revelations, describing certain activities of the United
States National Security Agency (NSA).  These activities included,
amongst others; secret court orders; secret agreements for the receipt
of so-called "meta-information" that includes source, destination, and
timing of communications; and tapping of communications lines.  The
breathtaking scope of the operations shocked the Internet technical
community that was reflected in a sea change within the IETF, IAB,
and other standards organizations.</t>

<t>Now that some years have passed, it seems appropriate to reflect on that
period of time, to consider what effect the community's actions had,
where security has improved, how the threat surface has evolved, what
areas haven't improved, and where the community might invest future
efforts.</t>

<t>Bruce Schneier begins this compendium of individual essays by bringing
us back to 2013, recalling how it was for him and others to report
what was happening, and the mindset of those involved.  Next, Stephen
Farrell reviews the technical community's reactions and in particular
the reactions of the IETF community, technical advances, and where
threats remain.  Then Farzaneh Badii discusses the impact of those
advances – or lack thereof – on human rights.  Finally Steven
M. Bellovin puts the Snowden revelations into an ever-evolving
historical context of secrets and secret stealing that spans
centuries, closing with some suggestions for IETF.</t>

<t>Readers are invited to consider what impact we as a community have
had, what challenges remain, and what positive contribution the
technical community can and should make to address security and
privacy of citizens of the world.</t>

<t>-- Eliot Lear, Independent Submissions Editor for the RFC Series</t>

</section>
<section anchor="bruce-schneier-snowden-ten-years-later"><name>Bruce Schneier: Snowden Ten Years Later</name>

<t>In 2013 and 2014, I wrote extensively about new revelations regarding
NSA surveillance based on the documents provided by Edward
Snowden. But I had a more personal involvement as well.</t>

<t>I wrote the essay below in September 2013. The <em>New Yorker</em> agreed to
publish it, but the <em>Guardian</em> asked me not to. It was
scared of UK law enforcement, and worried that this essay would
reflect badly on it. And given that the UK police would raid its
offices in July 2014, it had legitimate cause to be worried.</t>

<t>Now, ten years later, I offer this as a time capsule of what those
early months of Snowden were like.</t>

<t>**********</t>

<t>It’s a surreal experience, paging through hundreds of top-secret NSA
documents. You’re peering into a forbidden world: strange, confusing,
and fascinating all at the same time.</t>

<t>I had flown down to Rio de Janeiro in late August at the request of
Glenn Greenwald. He had been working on the Edward Snowden archive for
a couple of months, and had a pile of more technical documents that he
wanted help interpreting. According to Greenwald, Snowden also thought
that bringing me down was a good idea.</t>

<t>It made sense. I didn't know either of them, but I have been writing
about cryptography, security, and privacy for decades. I could
decipher some of the technical language that Greenwald had difficulty
with, and understand the context and importance of various
document. And I have long been publicly critical of the NSA’s
eavesdropping capabilities. My knowledge and expertise could help
figure out which stories needed to be reported.</t>

<t>I thought about it a lot before agreeing. This was before David
Miranda, Greenwald’s partner, was detained at Heathrow airport by the
UK authorities; but even without that, I knew there was a risk. I fly
a lot—a quarter of a million miles per year—and being put on a TSA
list, or being detained at the US border and having my electronics
confiscated, would be a major problem. So would the FBI breaking into my
home and seizing my personal electronics. But in the end, that made me
more determined to do it.</t>

<t>I did spend some time on the phone with the attorneys recommended to
me by the ACLU and the EFF. And I talked about it with my partner,
especially when Miranda was detained three days before my departure.
Both Greenwald and his employer, the <em>Guardian</em>, are careful about whom
they show the documents to. They publish only those portions essential
to getting the story out. It was important to them that I be a
co-author, not a source. I didn’t follow the legal reasoning, but the
point is that the <em>Guardian</em> doesn’t want to leak the documents to
random people. It will, however, write stories in the public interest,
and I would be allowed to review the documents as part of that
process. So after a Skype conversation with someone at the <em>Guardian</em>, I
signed a letter of engagement.</t>

<t>And then I flew to Brazil.</t>

<t>I saw only a tiny slice of the documents, and most of what I saw was
surprisingly banal. The concerns of the top-secret world are largely
tactical: system upgrades, operational problems owing to weather,
delays because of work backlogs, and so on. I paged through weekly
reports, presentation slides from status meetings, and general
briefings to educate visitors. Management is management, even inside
the NSA Reading the documents, I felt as though I were sitting through
some of those endless meetings.</t>

<t>The meeting presenters try to spice things up. Presentations regularly
include intelligence success stories. There were details—what had been
found, and how, and where it helped—and sometimes there were attaboys
from “customers” who used the intelligence. I’m sure these are
intended to remind NSA employees that they’re doing good. It
definitely had an effect on me. Those were all things I want the NSA
to be doing.</t>

<t>There were so many code names. Everything has one: every program,
every piece of equipment, every piece of software. Sometimes code
names had their own code names. The biggest secrets seem to be the
underlying real-world information: which particular company
MONEYROCKET is; what software vulnerability EGOTISTICALGIRAFFE—really,
I am not making that one up—is; how TURBINE works. Those secrets
collectively have a code name—ECI, for exceptionally compartmented
information—and almost never appear in the documents. Chatting with
Snowden on an encrypted IM connection, I joked that the NSA cafeteria
menu probably has code names for menu items. His response: “Trust me
when I say you have no idea.”</t>

<t>Those code names all come with logos, most of them amateurish and a
lot of them dumb. Note to the NSA: take some of that more than
ten-billion-dollar annual budget and hire yourself a design
firm. Really; it’ll pay off in morale.</t>

<t>Once in a while, though, I would see something that made me stop,
stand up, and pace around in circles. It wasn’t that what I read was
particularly exciting, or important. It was just that it was
startling. It changed—ever so slightly—how I thought about the world.</t>

<t>Greenwald said that that reaction was normal when people started
reading through the documents.</t>

<t>Intelligence professionals talk about how disorienting it is living on
the inside. You read so much classified information about the world’s
geopolitical events that you start seeing the world differently. You
become convinced that only the insiders know what’s really going on,
because the news media is so often wrong. Your family is
ignorant. Your friends are ignorant. The world is ignorant. The only
thing keeping you from ignorance is that constant stream of classified
knowledge. It’s hard not to feel superior, not to say things like “If
you only knew what we know” all the time. I can understand how General
Keith Alexander, the director of the NSA, comes across as so
supercilious; I only saw a minute fraction of that secret world, and I
started feeling it.</t>

<t>It turned out to be a terrible week to visit Greenwald, as he was
still dealing with the fallout from Miranda’s detention. Two other
journalists, one from the Nation and the other from the <em>Hindu</em>, were
also in town working with him. A lot of my week involved Greenwald
rushing into my hotel room, giving me a thumb drive of new stuff to
look through, and rushing out again.</t>

<t>A technician from the <em>Guardian</em> got a search capability working while I
was there, and I spent some time with it. Question: when you’re given
the capability to search through a database of NSA secrets, what’s the
first thing you look for? Answer: your name.</t>

<t>It wasn’t there. Neither were any of the algorithm names I knew, not
even algorithms I knew that the US government used.</t>

<t>I tried to talk to Greenwald about his own operational security. It
had been incredibly stupid for Miranda to be traveling with NSA
documents on the thumb drive. Transferring files electronically is
what encryption is for. I told Greenwald that he and Laura Poitras
should be sending large encrypted files of dummy documents back and
forth every day.</t>

<t>Once, at Greenwald’s home, I walked into the backyard and looked for
TEMPEST receivers hiding in the trees. I didn’t find any, but that
doesn’t mean they weren’t there. Greenwald has a lot of dogs, but I
don’t think that would hinder professionals. I’m sure that a bunch of
major governments have a complete copy of everything Greenwald
has. Maybe the black bag teams bumped into each other in those early
weeks.</t>

<t>I started doubting my own security procedures. Reading about the NSA’s
hacking abilities will do that to you. Can it break the encryption on
my hard drive? Probably not. Has the company that makes my encryption
software deliberately weakened the implementation for it?
Probably. Are NSA agents listening in on my calls back to the US? Very
probably. Could agents take control of my computer over the Internet
if they wanted to? Definitely. In the end, I decided to do my best and
stop worrying about it. It was the agency’s documents, after all. And
what I was working on would become public in a few weeks.</t>

<t>I wasn't sleeping well, either. A lot of it was the sheer magnitude of
what I saw. It's not that any of it was a real surprise. Those of us
in the information security community had long assumed that the NSA
was doing things like this. But we never really sat down and figured
out the details, and to have the details confirmed made a big
difference. Maybe I can make it clearer with an analogy. Everyone
knows that death is inevitable; there's absolutely no surprise about
that. Yet it arrives as a surprise, because we spend most of our lives
refusing to think about it. The NSA documents were a bit like
that. Knowing that it is surely true that the NSA is eavesdropping on
the world, and doing it in such a methodical and robust manner, is
very different from coming face-to-face with the reality that it is
and the details of how it is doing it.</t>

<t>I also found it incredibly difficult to keep the secrets. The
<em>Guardian</em>’s process is slow and methodical. I move much faster. I
drafted stories based on what I found. Then I wrote essays about those
stories, and essays about the essays. Writing was therapy; I would
wake up in the wee hours of the morning, and write an essay. But that
put me at least three levels beyond what was published.</t>

<t>Now that my involvement is out, and my first essays are out, I feel a
lot better. I'm sure it will get worse again when I find another
monumental revelation; there are still more documents to go through.</t>

<t>I’ve heard it said that Snowden wants to damage America. I can say
with certainty that he does not. So far, everyone involved in this
incident has been incredibly careful about what is released to the
public. There are many documents that could be immensely harmful to
the US, and no one has any intention of releasing them. The documents
the reporters release are carefully redacted. Greenwald and I
repeatedly debated with <em>Guardian</em> editors the newsworthiness of story
ideas, stressing that we would not expose government secrets simply
because they’re interesting.</t>

<t>The NSA got incredibly lucky; this could have ended with a massive
public dump like Chelsea Manning’s State Department cables. I suppose
it still could. Despite that, I can imagine how this feels to the NSA.
It’s used to keeping this stuff behind multiple levels of security:
gates with alarms, armed guards, safe doors, and military-grade
cryptography. It’s not supposed to be on a bunch of thumb drives in
Brazil, Germany, the UK, the US, and who knows where else, protected
largely by some random people’s opinions about what should or should
not remain secret. This is easily the greatest intelligence failure in
the history of ever. It’s amazing that one person could have had so
much access with so little accountability, and could sneak all of this
data out without raising any alarms. The odds are close to zero that
Snowden is the first person to do this; he’s just the first person to
make public that he did. It’s a testament to General Alexander’s power
that he hasn’t been forced to resign.</t>

<t>It’s not that we weren’t being careful about security, it’s that our
standards of care are so different. From the NSA’s point of view,
we’re all major security risks, myself included. I was taking notes
about classified material, crumpling them up, and throwing them into
the wastebasket. I was printing documents marked “TOP
SECRET/COMINT/NOFORN” in a hotel lobby. And once, I took the wrong
thumb drive with me to dinner, accidentally leaving the unencrypted
one filled with top-secret documents in my hotel room. It was an
honest mistake; they were both blue.</t>

<t>If I were an NSA employee, the policy would be to fire me for that alone.</t>

<t>Many have written about how being under constant surveillance changes
a person. When you know you’re being watched, you censor yourself. You
become less open, less spontaneous. You look at what you write on your
computer and dwell on what you’ve said on the telephone, wonder how it
would sound taken out of context, from the perspective of a
hypothetical observer. You’re more likely to conform. You suppress
your individuality. Even though I have worked in privacy for decades,
and already knew a lot about the NSA and what it does, the change was
palpable. That feeling hasn’t faded. I am now more careful about what
I say and write. I am less trusting of communications technology. I am
less trusting of the computer industry.</t>

<t>After much discussion, Greenwald and I agreed to write three stories
together to start. All of those are still in progress. In addition, I
wrote two commentaries on the Snowden documents that were recently
made public. There’s a lot more to come; even Greenwald hasn’t looked
through everything.</t>

<t>Since my trip to Brazil [one month before], I’ve flown back to the US
once and domestically seven times—all without incident. I’m not on any
list yet. At least, none that I know about.</t>

<t>**********</t>

<t>As it happened, I didn’t write much more with Greenwald or the
<em>Guardian</em>. Those two had a falling out, and by the time everything
settled and both began writing about the documents
independently—Greenwald at the newly formed website the <em>Intercept</em>—I
got cut out of the process somehow. I remember hearing that Greenwald
was annoyed with me, but I never learned the reason. We haven’t spoken
since.</t>

<t>Still, I was happy with the one story I was part of: how the NSA hacks
Tor. I consider it a personal success that I pushed the <em>Guardian</em> to
publish NSA documents detailing QUANTUM. I don’t think that would have
gotten out any other way. And I still use those pages today when I
teach cybersecurity to policymakers at the Harvard Kennedy School.</t>

<t>Other people wrote about the Snowden files, and wrote a lot. It was a
slow trickle at first, and then a more consistent flow. Between
Greenwald, Bart Gellman, and the <em>Guardian</em> reporters, there ended up
being steady stream of news. (Bart brought in Ashkan Soltani to help
him with the technical aspects, which was a great move on his part,
even if it cost Ashkan a government job later.) More stories were
covered by other publications.</t>

<t>It started getting weird. Both Greenwald and Gellman held documents
back so they could publish them in their books. Jake Appelbaum, who
had not yet been accused of sexual assault by multiple women, was
working with Poitras. He partnered with Spiegel to release an implant
catalog from the NSA’s Tailored Access Operations group. To this day,
I am convinced that that document was not in the Snowden archives:
that Jake got it somehow, and it was released with the implication
that it was from Edward Snowden. I thought it was important enough
that I started writing about each item in that document in my blog:
”NSA Exploit of the Week.” That got my website blocked by the DoD: I
keep a framed print of the censor’s message on my wall.</t>

<t>Perhaps the most surreal document disclosures were when artists
started writing fiction based on the documents. This was in 2016, when
Laura Poitras built a secure room in New York to house the
documents. By then, the documents were years out of date.  And now
they’re over a decade out of date. (They were leaked in 2013, but most
of them were from 2012 or before.)</t>

<t>I ended up being something of a public ambassador for the
documents. When I got back from Rio, I gave talks at a private
conference in Woods Hole, the Berkman Center at Harvard, something
called the Congress and Privacy and Surveillance in Geneva, events at
both CATO and New America in DC, an event at the University of
Pennsylvania, an event at EPIC and a “Stop Watching Us” rally in DC,
the RISCS conference in London, the ISF in Paris, and...then...at the
IETF meeting in Vancouver in November 2013. (I remember little of
this; I am reconstructing it all from my calendar.)</t>

<t>What struck me at the IETF was the indignation in the room, and the
calls to action. And there was action, across many fronts. We
technologists did a lot to help secure the Internet, for example.</t>

<t>The government didn’t do its part, though. Despite the public outcry,
investigations by Congress, pronouncements by President Obama, and
federal court rulings, I don’t think much has changed. The NSA
canceled a program here and a program there, and it is now more public
about defense. But I don’t think it is any less aggressive about
either bulk or targeted surveillance. Certainly its government
authorities haven’t been restricted in any way. And surveillance
capitalism is still the business model of the Internet.</t>

<t>And Edward Snowden? We were in contact for a while on Signal. I
visited him once in Moscow, in 2016. And I had him do an guest
lecture to my class at Harvard for a few years, remotely by
Jitsi. Afterwards, I would hold a session where I promised to answer
every question he would evade or not answer, explain every response he
did give, and be candid in a way that someone with an outstanding
arrest warrant simply cannot. Sometimes I thought I could channel
Snowden better than he could.</t>

<t>But now it’s been a decade. Everything he knows is old and out of
date. Everything we know is old and out of date. The NSA suffered an
even worse leak of its secrets by the Russians, under the guise of the
Shadow Brokers, in 2016 and 2017. The NSA has rebuilt. It again has
capabilities we can only surmise.</t>

</section>
<section anchor="stephen-farrell-ietf-and-internet-technical-community-reaction"><name>Stephen Farrell: IETF and Internet Technical community reaction</name>

<t>In 2013, the IETF and, more broadly, the Internet technical, security and
privacy research communities, were surprised by the surveillance and attack
efforts exposed by the Snowden revelations.  <xref target="timeline"/> While the
potential for such was known, it was the scale and pervasiveness of the
activities disclosed that was alarming and, I think it fair to say, quite
annoying, for very many Internet engineers.</t>

<t>As for the IETF's reaction, informal meetings during the July 2013 IETF meeting
in Berlin indicated that IETF participants considered that these revelations
showed that we needed to do more to improve the security and privacy properties
of IETF protocols, and to help ensure deployments made better use of the
security and privacy mechanisms that already existed. In August, the IETF set up
a new mailing list <xref target="perpass"/> that ended up being a useful venue for triaging
proposals for work on these topics. At the November 2013 IETF meeting, there
was a lively and very well attended plenary session <xref target="plenary-video"/> on
"hardening the Internet" against such attacks, followed by a "birds of a
feather" <xref target="Perpass-BoF"/> devoted to more detailed discussion of possible
actions in terms of new working groups, protocols and best-current-practice
(BCP) documents that could help improve matters.  This was followed in
February/March 2014 by a joint IAB/W3C workshop on "strengthening the Internet
against pervasive monitoring" <xref target="STRINT"/> held in London and attended by 150
engineers (still the only IAB workshop in my experience where we needed a
wait-list for people after capacity for the venue was reached!). The STRINT
workshop report was eventually published as <xref target="RFC7687"/> in 2015, but in the
meantime work proceeded on a Best Current Practice (BCP) document codifying
that the IETF community considered that "pervasive monitoring is an attack"
<xref target="RFC7258"/> (aka BCP188). The IETF last-call discussion for that short
document included more than 1000 emails - while there was broad agreement on
the overall message, a number of IETF participants considered enshrining that
message in the RFC series and IETF processes was controversial. In any case the
BCP was published in May 2014. The key statement on which rough consensus was
reached is in the abstract of RFC7258 and says "Pervasive monitoring is a
technical attack that should be mitigated in the design of IETF protocols,
where possible." That document has since been referenced <xref target="refs-to-7258"/> by
many IETF working groups and RFCs as justifying additional work on security and
privacy. Throughout that period and beyond, the repercussions of the Snowden
revelations remained a major and ongoing agenda item for both of the IETF's
main technical management bodies - the IAB and the IESG (on which I served at
the time).</t>

<t>So far, I've really only described the processes with which the IETF dealt with
the attacks, but there was of course also much technical work started by IETF
participants that was at least partly motivated by the Snowden revelations.</t>

<t>In November 2013 a working group was established to document better practices
for using TLS in applications <xref target="UTA"/> so that deployments would be less at risk
in the face of some of the attacks related to stripping TLS or having
applications mis-use TLS APIs or parameters.  Similar work was done to update
recommendations for use of cryptography in other protocols in the <xref target="CURDLE"/>
working group later.  The CURDLE working group was to an extent created to
enable use of a set of new elliptic curves that had been documented by the IRTF
crypto forum research group. <xref target="CFRG"/> That work in turn had been partly
motivated by (perhaps ultimately unfounded) concerns about elliptic curves
defined in NIST standards, following the DUAL_EC_DRBG debacle <xref target="dual-ec"/> 
(described further below) where a
NIST random number generator had been deliberately engineered to produce output
that could be vulnerable to NSA attack.</t>

<t>Work to develop a new version of TLS was started in 2014, mainly due to
concerns that TLSv1.2 and earlier version implementations had been shown to be
vulnerable to a range of attacks over the years. The work to develop TLSv1.3
<xref target="RFC8446"/> also however aimed to encrypt more of the handshake so as to
expose less information to network observers - a fairly direct result of the
Snowden revelations.  Work to further improve TLS in this respect continues
today using the so-called encrypted client hello (ECH) <xref target="I-D.ietf-tls-esni"/>
mechanism to remove one of the last privacy leaks present in current TLS.</t>

<t>Work on ECH was enabled by significant developments to encrypt DNS traffic,
using DNS over TLS (DoT) <xref target="RFC7858"/> or DNS over HTTPS (DoH) <xref target="RFC8484"/> which also started as a result of
the Snowden revelations. Prior to that, privacy hadn't really been considered
when it came to DNS data or (more importantly) the act of accessing DNS data.
The trend towards encrypting DNS traffic represents a significant change for
the Internet, both in terms of reducing cleartext, but also in terms of moving
points-of-control. The latter aspect was, and remains, controversial, but the
IETF did its job of defining new protocols that can enable better DNS privacy.
Work on HTTP version 2 <xref target="RFC7540"/> and QUIC <xref target="RFC9000"/> further demonstrates
the trend in the IETF towards always-encrypting protocols as the new norm, at
least at and above the transport layer.</t>

<t>Of course, not all such initiatives bore fruit, for example attempts to define
a new MPLS encryption mechanism <xref target="I-D.farrelll-mpls-opportunistic-encrypt"/>
foundered due to a lack of interest and the existence of the already deployed
IEEE MACSEC scheme. But there has been a fairly clear trend towards trying to
remove cleartext from the Internet as a precursor to provide improved privacy
when considering network observers as attackers.</t>

<t>The IETF, of course, forms only one part of the broader Internet technical
community, and there were many non-IETF activities triggered by the Snowden
revelations, a number of which also eventually resulted in new IETF work to
standardise better security and privacy mechanisms developed elsewhere.</t>

<t>In 2013, the web was largely unencrypted despite HTTPS being relatively
usable and that was partly due to problems using the WebPKI at scale. The
Let's Encrypt <xref target="LE"/> initiative issued its first certificates in 2015 as
part of its aim to try to move the web
towards being fully encrypted, and has been extremely successful in helping
achieve that goal.  Subsequently, the automation protocols developed for
Let's Encrypt were standardised in the IETF's ACME <xref target="ACME"/> working group.</t>

<t>In 2013, most email transport between mail servers was cleartext,
directly enabling some of the attacks documented in the Snowden documents.
Significant effort by major mail services and MTA software developers since
then have resulted in more than 90% of email being encrypted between mail
servers and various IETF protocols have been defined in order to improve that
situation, e.g., SMTP MTA Strict Transport Security (MTA-STS). <xref target="RFC8461"/></t>

<t>Lastly, MAC addresses have historically been long-term fixed values visible to
local networks (and beyond), which enabled some tracking attacks that were
documented in the Snowden documents. <xref target="Toronto"/> 
Implementers/vendors and the IEEE 802
standards group recognised this weakness and started work on MAC address
randomisation that in turn lead to the IETF's <xref target="MADINAS"/> working group that
aims to ensure randomised MAC addresses can be used on the Internet without
causing unintentional harm.
There is also a history of IETF work on deprecating MAC-address based IPv6 interface identifiers,
advocating pseudo-random identifiers and temporary addresses, some of
which pre-dates Snowden. <xref target="RFC7217"/> <xref target="RFC8064"/> <xref target="RFC8981"/></t>

<t>In summary, the significantly large volume of technical work pursued in the
IETF and elsewhere as a result of the Snowden revelations has focussed on two
main things: decreasing the amount of plaintext that remains visible to network
observers and secondly reducing the number of long-term identifiers that enable
unexpected identification or re-identification of devices or users. This work
is not by any means complete, nor is deployment universal, but significant
progress has been made and the work continues even if the level of annoyance
at the attack has faded somewhat over time.</t>

<t>One should also note that there has been push-back against these improvements
in security and privacy and the changes they cause for deployments. That has
come from more or less two camps - those on whom these improvements force
change tend to react badly, but later figure out how to adjust. The second camp
being those who seemingly prefer not to strengthen security so as to for
example continue to achieve what they call "visibility" even in the face of the
many engineers who correctly argue that such an anti-encryption approach
inevitably leads to worse security overall. The recurring nature of this kind
of push-back is nicely illustrated by <xref target="RFC1984"/>. That informational document
was published in 1996 as an IETF response to an early iteration of the
perennial "encryption is bad" argument. In 2015, the unmodified 1996 text was
upgraded to a Best Current Practice (BCP200) as the underlying arguments have
not changed, and will not change.</t>

<t>Looking back on all the above from a 2023 vantage point, I think that, as a
community of Internet engineers, we got a lot right, but that today there's way
more that needs to be done to better protect the security and privacy of people
who use the Internet. In particular, we (the technical community) haven't done
nearly as good a job at countering surveillance capitalism <xref target="zubhoff2019"/> which has exploded
in the last decade. In part, that's because many of the problems are outside of
the scope of bodies such as the IETF. For example, intrusive back-end sharing
of people's data for advertising purposes can't really be mitigated via
Internet protocols.</t>

<t>However, I also think that the real annoyance felt with respect to the Snowden
revelations is (in general) not felt nearly as much when it comes to the legal
but hugely privacy-invasive activities of major employers of Internet
engineers.</t>

<t>It's noteworthy that RFC7258 doesn't consider that bad actors are limited to
governments, and personally, I think many advertising industry schemes for
collecting data are egregious examples of pervasive monitoring and hence ought
also be considered an attack on the Internet that ought be mitigated where
possible.  However, the Internet technical community clearly hasn't acted in
that way over the last decade.</t>

<t>Perhaps that indicates that Internet engineers and the bodies in which they
congregate need to place much more emphasis on standards for ethical behaviour
than has been the case for the first half-century of the Internet.  And while
it would be good to see the current leaders of Internet bodies work to make
progress in that regard, at the time of writing, it sadly seems more likely that
government regulators will be the ones to try force better behaviour. That of
course comes with a significant risk of having regulations that stymie the kind
of permissionless innovation that characterised many earlier Internet
successes.</t>

<t>So while we got a lot right in our reaction to Snowden's revelations,
currently, we have a "worse" Internet.  Nonetheless, I do still hope to see a
sea-change there, as the importance of real Internet security and privacy for
people becomes utterly obvious to all, even the most hard core capitalists and
government signals intelligence agencies.  That may seem naive, but I remain
optimistic that as a fact-based community we (and eventually our employers)
will recognise that the lesser risk is to honestly aim to provide the best
security and privacy practically possible.</t>

</section>
<section anchor="farzaneh-badii-did-snowdens-revelations-help-with-protecting-human-rights-on-the-internet"><name>Farzaneh Badii: Did Snowden’s revelations help with protecting human rights on the Internet?</name>

<t>It is very difficult to scientifically measure the effect of Snowden's
revelations on human rights and the Internet. Anecdotally, we have
been witnessing dominant regulatory and policy approaches that impact
technologies and services that are at the core of protecting human
rights on the Internet. (A range of European Union laws that aims to
address online safety or concentration of data. There are many more
regulations that have an impact on the Internet.<xref target="Masnick2023"/>) There
has been little progress in fixing technical and policy issues that
help enable human rights. Snowden revelations did not have a
revolutionary effect on our approach towards not using policies and
technical means that have an effect on human rights, such as freedom
of expression, freedom of association and assembly and privacy. It did
not decrease the number of Internet shutdowns, nor the eagerness of
authoritarian (and even to some extent democratic countries) to
territorialize the Internet. Perhaps the revelations helped with the
evolution of some technical and policy aspects.</t>

<t>After Snowden’s revelations 10 years ago, engineers and advocates at
the Internet Engineering Task Force (IETF) responded in a few
ways. One prominent response was the issuance of a Best Current
Practice document, “Pervasive Monitoring Is an Attack” <xref target="RFC7258"/> by
Farrell and Tschofenig. The responses to Snowden revelations did not
mean that IETF had lost sight of issues such as privacy and
surveillance. There were instances of resistance to surveillance in
the past by engineers (we do not delve into how successful that was in
protecting human rights). But historically, many engineers believed
that widespread and habitual surveillance was too expensive to be
practical. The revelations proved them wrong.</t>

<t>Rights-centered activists were also involved with the IETF before the
revelations. For example, staff from Center for Democracy and
Technology (CDT) was undertaking work at the IETF (and was a member of
the Internet Architecture Board) and held workshops about the
challenges of creating privacy protective protocols and systems. The
technical shortcomings that were exploited by the National Security
Agency to carry out mass-scale surveillance were recognized by the
IETF before the Snowden revelations <xref target="Garfinkel1995"/>,<xref target="RFC6462"/>. In
2012, Joy Liddicoat and Avri Doria wrote a report at Internet Society
which extensively discussed the processes and principles of human
rights and Internet protocols <xref target="Doria2012"/>.</t>

<t>Perhaps the Snowden revelations brought more attention to the IETF and
its work as it related to important issues, such as privacy and
freedom of expression. It might have also expedited and helped with
more easily convening the Human Rights Protocol Considerations
research group in the Internet Research Task Force (IRTF). Co-chaired
by Niels ten Oever (who worked at Article 19 at the time) and Internet
governance activist Avri Doria, the Internet Research Task Force in
July 2015 chartered a Research Group on “Human Rights Protocol
Considerations” (the HRPC RG). The charter of the HRPC RG stated that
the group was established: “to research whether standards and
protocols can enable, strengthen or threaten human rights, as defined
in the UDHR and the International Covenant on Civil and Political
Rights (ICCPR).”</t>

<t>During the past decades, a few successful strides were made to create
protocols that, when and if implemented, aim at protecting privacy of
the users, as well as help with reducing pervasive surveillance. These
efforts were in keeping with the consensus of the IETF found in RFC
7258.  Sometimes these protocols have anti-censorship qualities as
well. A few examples immediately come to mind: 1) Encryption of DNS
queries (for example DNS over HTTPS); 2) ACME protocol underpinning
the Lets Encrypt initiative and 3) Registration Data Access Protocol
(RDAP)<xref target="RFC7480"/>,<xref target="RFC7481"/>,<xref target="RFC9082"/>,<xref target="RFC9083"/>,<xref target="RFC7484"/>,
<xref target="RFC8056"/>. (It is debatable that RDAP had anything to do with
Snowden revelations but it is still a good example and is finally
being implemented.)</t>

<t>DNS Queries over HTTPS protocol aimed to encrypt DNS queries. Four
years after RFC 7258, DoH was developed to tackle both active and
passive monitoring of DNS queries. It is also a tool that can help
with combatting censorship. Let's Encrypt was not an Internet protocol,
but it was an initiative that aimed to encrypt the web and later on
some of the automation protocols were standardized in the IETF ACME
working group. The Registration Data Access Protocol could solve a
long term problem: redacting the domain name registrants (and IP
address holders) sensitive, personal data but at the same time
enabling legitimate access to the information. As to the work of HRPC
research group, it has so far issued <xref target="RFC8280"/> by ten Oever and
Cath) and a number of informational Internet Drafts.</t>

<t>While we cannot really argue that all the movements and privacy
preserving protocols and initiatives that enable protecting human
rights at the infrastructure layer directly result from Snowden
revelations, I think it is safe to say that the revelations helped
with expediting the resolution of some of the “technical” hesitations
that had an effect on fixing Internet protocols that enabled
protection of human rights.</t>

<t>Unfortunately, the Snowden revelations have not yet helped us
meaningfully with adopting a human rights approach. We can’t agree on
prioritizing human rights in our Internet communities for a host of
reasons. This could be due to: 1) human rights are sometimes in
conflict with each other 2) it is simply not possible to mitigate the
human right violation through the Internet protocol 3) it is not
obvious for the engineers before the fact how the Internet protocol
contributes to enabling protection of human rights and how they can
fix the problem 4) the protocol is already there but market, law and a
host of other societal and political issues do not allow for
widespread implementation.</t>

<t>IETF did not purposefully take a long time to adopt and implement protocols that
enabled human rights. There were technical and political issues that
created barriers. For example, the IETF community attempted a few
times before to create a protocol that would disclose the necessary
information of IP holders and domain name registrants while at the
same time protecting their data (CRIPS and IRIS are two
examples). However, it was not until RDAP was developed and the
General Data Protection Regulation (GDPR) was enacted that Internet
Corporation for Assigned Names and Numbers had to consider instructing
registries and registrars to implement RDAP and its community had to
come up with a privacy compliant policy.  Overall, a host of
regulatory and market incentives can halt or slow down the
implementation of human rights enabling protocols and implementation
could depend on other organizations with their own political and
stakeholder conflicts.</t>

<t>Sometimes the protocol is available, but the regulatory framework and
the market do not allow for implementation. One curious example of
this is sanctions and their effect on IP addresses of sanctioned
nations. Imagine if we argue that registration of IPv4 is affected by
sanctions because it is deemed as an economic resource and because of
scarcity and monetization. In theory, if we move to IPv6, we can solve
the problem of access to the resources because IPv6 is not a scarce
resource. However, as we know, adoption of IPv6 depends not only on
technical availability. Adoption of IPv6 won’t be the complete
solution either and depends on laws and policies and the market.</t>

<t>Sometimes there are arguments over implementation of a protocol
because as it is perceived, while it can protect freedom of expression
and reduce surveillance, it can hamper other human rights. For
instance, we still have doubts about implementing DNS over HTTPS
without seriously considering its contributions to fight with
censorship and bring encryption to DNS queries. The arguments against
implementation of DoH include protection of children online and lack
of law enforcement access to data.</t>

<t>We must acknowledge that sometimes the technical solutions that we use
that protect one right (for example encryption to protect the right to
privacy or prevent surveillance) could potentially affect technical
and policy solutions that try to protect other human rights (for
example encryption could prevent financial institutions from
monitoring employees' network activities to detect fraudulent
behavior). Acknowledging and identifying these conflicts can help us
come up with alternative techniques that could protect human rights
while not hampering other technical solutions such as
encryption. Where such alternative techniques are not possible,
acknowledging the shortcoming could clarify and bring to light the
trade-offs that we have accepted in our Internet system.</t>

<t>Ironically, we advocate for connectivity and believe expressing
oneself on the Internet is a human right, but when a war erupts, we
resort to tools that impact that very concept. For example, some
believe via imposing sanctions on critical properties of the Internet,
we can punish the perpetrators of a war. The Regional Internet
Registries that are in charge of registration of IP addresses have
shown resilience to these requests.  However, some tech-companies, for
example Cogent <xref target="Roth2022"/>, decided not to serve sanctioned countries
and over-comply with sanctions. Over-compliance with sanctions could
hamper ordinary people's access to the Internet. <xref target="Badii2023"/></t>

<t>Perhaps we can solve some of these problems by undertaking a thorough
impact assessment and contextualization to reveal how and why Internet
protocols affect human rights (something Fidler and I argued
for <xref target="Badii2021"/>). Contextualization and
impact assessment can reveal how each Internet protocol or each line
of code, in which systems, have an impact on which and whose human
rights.</t>

<t>The HRPC RG (which I am a part of) and the larger human rights and
policy analyst communities are still struggling to analyze legal,
social and market factors alongside the protocols to have a good
understanding of what has an impact and what has to be changed. It is
hard, but it is not impossible. If we thoroughly document and research
the lifecycle of an Internet protocol and contextualize it, we might
have a better understanding of how and if we can actually fix which
parts of the protocol in order to protect human rights.</t>

<t>Overall, the revelations did, to some extent, contribute to the
evolution of our ideas and perspectives. Our next step should be to
undertake research on the impact of Internet systems (including
Internet protocols) on human rights, promote the implementation of
protocols good for human rights through policy and advocacy and focus
on which technical parts we can standardize to help with more
widespread implementation of human rights enabling Internet protocols.</t>

</section>
<section anchor="steven-m-bellovin-governments-and-cryptography-the-crypto-wars"><name>Steven M. Bellovin: Governments and Cryptography: The Crypto Wars</name>

<section anchor="historical-background"><name>Historical Background</name>

<t>It’s not a secret: many governments in the world don’t like it when
people encrypt their traffic. More precisely, they like strong
cryptography for themselves but not for others, whether those others
are private citizens or other countries. But the history is longer and
more complex than that.</t>

<t>For much of written history, both governments and individuals used
cryptography to protect their messages. To cite just one famous
example, Julius Caesar is said to have encrypted messages by shifting
letters in the alphabet by 3 <xref target="Kahn1996"/>. In modern parlance, 3 was
the key, and each letter was encrypted with</t>

<ul empty="true"><li>
  <t>C[i] = (P[i] + 3) mod 23</t>
</li></ul>

<t>(The Latin alphabet of his time had only 23 letters.)
Known
Arabic writings on cryptanalysis go back to at least the 8th century;
their sophistication shows that encryption was reasonably commonly
used. In the 9th century, Abu Yusuf Ya’qub ibn ‘Ishaq aṣ-Ṣabbah
al-Kindh developed and wrote about frequency analysis as a way to
crack ciphers <xref target="Borda2011"/>,<xref target="Kahn1996"/>.</t>

<t>In an era of minimal literacy, though, there wasn’t that much use of
encryption, simply because most people could neither read nor
write. Governments used encryption for diplomatic messages, and
cryptanalysts followed close behind. The famed Black Chambers of the
Renaissance era read messages from many different governments, while
early cryptographers devised stronger and stronger ciphers
<xref target="Kahn1996"/>. In Elizabethan times in England, Sir Francis Walsingham’s
intelligence agency intercepted and decrypted messages from Mary,
Queen of Scots; these messages formed some of the strongest evidence
against her and eventually led to her execution <xref target="Kahn1996"/>.</t>

<t>This pattern continued for centuries. In the United States, Thomas
Jefferson invented the so-called wheel cipher in the late 18th
century; it was reinvented about 100 years later by Etienne Bazeries
and used as a standard American military cipher well into World War II
<xref target="Kahn1996"/>. Jefferson and other statesmen of that era regularly used
cryptography when communicating with each other. An encrypted message
was even part of the evidence introduced in Aaron Burr’s 1807 trial
for treason <xref target="Kerr2020"/>,<xref target="Kahn1996"/>. Edgar Allan Poe claimed that he
could cryptanalyze any message sent to him <xref target="Kahn1996"/>.</t>

<t>The telegraph era upped the ante. In the U.S., just a year after
Samuel Morse deployed his first telegraph line between Baltimore and
Washington, his business partner, Francis Smith, published a codebook
to help customers protect their traffic from prying eyes
<xref target="Smith1845"/>.  In 1870, Britain nationalized its domestic telegraph network;
in response, Robert Slater published a more sophisticated codebook
<xref target="Slater1870"/>. On the government side, Britain took advantage of its
position as the central node in the world’s international telegraphic
networks to read a great deal of traffic passing through the country
<xref target="Headrick1991"/>,<xref target="Kennedy1971"/>. They used this ability strategically,
too—when war broke out in 1914, the British Navy cut Germany’s
undersea telegraph cables, forcing them to use radio; an intercept of
the so-called Zimmermann telegram, when cryptanalyzed, arguably led to
American entry into the war and thence to Germany’s defeat. Once the
U.S. entered the war, it required users of international telegraph
lines to deposit copies of the codebooks they used for compression, so
that censors could check messages for prohibited content <xref target="Kahn1996"/>.</t>

<t>In Victorian Britain, private citizens, often lovers, used encryption
in newspapers’ Personal columns to communicate without their parents’
knowledge. Charles Wheatstone and Charles Babbage used to solve these
elementary ciphers routinely, for their own amusement <xref target="Kahn1996"/>.</t>

<t>This pattern continued for many years. Governments regularly used
ciphers and codes, while other countries tried to break them; private
individuals would sometimes use encryption but not often, and rarely
well. But the two world wars marked a sea change, one that would soon
reverberate into the civilian world.</t>

<t>The first World War featured vast troop movements by all parties; this
in turn required a lot of encrypted communications, often by telegraph
or radio. These messages were often easily intercepted in
bulk. Furthermore, the difficulty of encrypting large volumes of
plaintext led to the development of a variety of mechanical encryption
devices, including Germany’s famed Enigma machine. World War II
amplified both trends. It also gave rise to machine-assisted
cryptanalysis, such as the United Kingdom’s bombes (derived from an
earlier Polish design) and Colossus machine, and the American’s device
for cracking Japan’s PURPLE system. The U.S. also used punch
card-based tabulators to assist in breaking other Japanese codes, such
as the Japanese Imperial Navy’s JN-25 <xref target="Kahn1996"/>,<xref target="Rowlett1998"/>.</t>

<t>These developments set the stage for the postwar SIGINT—Signals
Intelligence—environment. Many intra-government messages were sent by
radio, making them easy to intercept; advanced cryptanalytic machines
made cryptanalysis easier. Ciphers were getting stronger, though, and
government SIGINT agencies did not want to give up their access to
data. While there were undoubtedly many developments, two are well
known.</t>

<t>The first involved CryptoAG, a Swedish (and later Swiss) manufacturer
of encryption devices. The head of that company, Boris Hagelin, was a
friend of William F. Friedman, a pioneering American
cryptologist. During the 1950s, CryptoAG sold its devices to other
governments; apparently at Friedman’s behest, Hagelin weakened the
encryption in a way that let the NSA read the traffic <xref target="Miller2020"/>.</t>

<t>The story involving the British is less well-documented and less
clear. When some of Britain’s former colonies gained their
independence, the British government gave them captured, war surplus
Enigma machines to protect their own traffic. Some authors contend
that this was deceptive, in that these former colonies did not realize
that the British could read Enigma-protected traffic; others claim
that this was obvious but that these countries didn’t care: Britain
was no longer their enemy; it was neighboring countries they were
worried about. Again, though, this concerned governmental use of
encryption <xref target="Kahn1996"/>,<xref target="Baldwin2022"/>. There was still little private
use.</t>

</section>
<section anchor="the-crypto-wars-begin"><name>The Crypto Wars Begin</name>

<t>The modern era of conflict between individual’s desire for privacy and
government desires to read traffic began around 1972. The grain
harvest in the U.S.S.R. had failed; since relations between the Soviet
Union and the United States were temporarily comparatively warm, the
Soviet grain company— an arm of the Soviet government, of
course— entered into negotiations with private American
companies. Unknown to Americans at the time, Soviet intelligence was
intercepting the phone calls of the American negotiating teams. In
other words, private companies had to deal with state actors as a
threat. Eventually, U.S. intelligence learned of this, and came to a
realization: the private sector needed strong cryptography, too, to
protect American national interests <xref target="Broad1982"/>,<xref target="Johnson1998"/>). This
underscored the need for strong cryptography to protect American
civilian traffic—but the SIGINT people were unhappy at the thought of
more encryption that they couldn’t break.</t>

<t>Meanwhile, the U.S. was concerned about protecting 
unclassified data <xref target="Landau2014"/>. In 1973 and again in 1974, the
National Bureau of Standards (NBS) put out a call for a strong, modern
encryption algorithm. IBM submitted Lucifer, an internally developed
algorithm based on what has become known as a 16-round Feistel network. The
original version used a long key.
It seemed quite strong, so NBS sent it off to the NSA to
get their take. The eventual design, which was adopted in 1976 as the
Data Encryption Standard (DES), differed in some important ways from
Lucifer. 
First, the so-called S-boxes, the source of the cryptologic
strength of DES, were changed, and were now demonstrably not composed of
random integers. Many researchers alleged that the S-boxes contained
an NSA back door. It took 20 years for the truth to come out: the
S-boxes were in fact strengthened, not weakened. Most likely, IBM
independently discovered the attack now known as differential
cryptanalysis, though some scholars suspect that the NSA told them
about it. The non-random S-boxes protected against this attack. The
second change, though, was clearly insisted on by the NSA: the key size
was shortened, from Lucifer’s 112 bits to DES’s 56 bits. We now know
that the NSA wanted a 48-bit key size, while IBM wanted 64 bits; they
compromised at 56 bits.</t>

<t>Whitfield Diffie and Martin Hellman, at Stanford University, wondered
about the 56-bit keys. In 1979, they published a paper demonstrating
that the U.S. government, but few others, could afford to build a
brute-force cracking machine, one that could try all 2<sup>56</sup> possible
keys to crack a message. NSA denied tampering with the design; a
Senate investigating committee found that that was correct, but did
not discuss the shortened key length issue.</t>

<t>This, however, was not Diffie and Hellman’s greatest contribution to
cryptology. A few years earlier, they published a paper inventing what
is now known as public key cryptography. In 1978, Ronald Rivest, Adi
Shamir, and Leonard Adleman devised the RSA algorithm, which made it
usable. (An NSA employee, acting on his own, sent a letter warning
that academic conferences on cryptology might violate U.S. export
laws.)</t>

<t>Around the same time, George Davida at the University of Wisconsin
applied for a patent on a stream cipher; the NSA slapped a secrecy
order on the application. This barred him from even talking about his
invention. The publicity was devastating; the NSA had to back down.</t>

<t>The Crypto Wars had thus begun: civilians were inventing strong
encryption systems, and the NSA was tampering with them or trying to
suppress them. Bobby Inman, the then-director of the NSA, tried
creating a voluntary review process for academic papers, but very few
researchers were interested in participating <xref target="Landau1988"/>.</t>

<t>There were few major public battles during the 1980s, because there
were few new major use cases for civilian cryptography during that
time. There was one notable incident, though: Shamir, Amos Fiat, and
Uriel Feige invented zero-knowledge proofs and applied for a US
patent. In response, the US Army slapped a secrecy order on the
patent. After a great deal of public outrage and intervention by, of
all organizations, the NSA, the order was lifted on very narrow
grounds: the inventors were not American, and had been discussing
their work all over the world <xref target="Landau1988"/>.</t>

<t>In the 1990s, though, everything changed.</t>

</section>
<section anchor="the-battle-is-joined"><name>The Battle is Joined</name>

<t>There were three major developments in cryptography in the early
1990s. First, Phil Zimmermann released PGP (Pretty Good Privacy), a
package to encrypt email messages. In 1993, AT&amp;T planned to release
the TSD-3600, an easy-to-use phone encryptor aimed at business
travelers. Shortly after that, the Netscape Corporation released SSL
(Secure Socket Layer) as a way to enable web-based commerce using
their browser and web server. All of these were seen as threats by the
NSA and the FBI.</t>

<t>PGP was, at least arguably, covered by what was known as ITAR, the
International Trafficking in Arms Regulations—under American law,
encryption software was regarded as a weapon, so exports required a
license. It was also alleged to infringe the patents on the RSA
algorithm. Needless to say, both issues were problematic for what was
intended to be open source software. Eventually, the criminal
investigation into Zimmermann’s role in the spread of PGP overseas was
dropped, but the threat of such investigations remained to deter
others<xref target="Levy2001"/>.</t>

<t>The TSD-3600 was another matter. AT&amp;T was a major corporation that did
not want to pick a fight with the U.S. government, but international
business travelers were seen as a major market for the device. At the
government’s “request”, the DES chip was replaced with what was known
as the Clipper Chip. The Clipper chip used Skipjack, a cipher with
80-bit keys; it was thus much stronger against brute force attacks
than DES. However, it provided “key escrow”. Without going into any
details, the key escrow mechanism allowed U.S. government
eavesdroppers to consult a pair of (presumably secure) internal
databases and decrypt all communications protected by the chip. The
Clipper chip proved to be extremely unpopular with industry; that AT&amp;T
Bell Labs’ Matt Blaze found a weakness in the design<xref target="Blaze1994"/>, one
that let you use Skipjack without the key escrow feature, didn’t help
its reputation.</t>

<t>The third major development, SSL, was even trickier. SSL was aimed at
e-commerce, and of course Netscape wanted to be able to sell its
products outside the US. That would require an export license, so they
made a deal with the government: non-American users would receive a
version that used 40-bit keys, a key length far shorter than what the
NSA had agreed to 20 years earlier. (To get ahead of the story: there
was a compromise mode of operation, wherein an export-grade browser
could use strong encryption when talking to a financial
institution. This hybrid mode led to cryptographic weaknesses
discovered some 20 years later<xref target="Adrian2015"/>.)</t>

<t>Technologists and American industry pushed back. The IETF adopted the
Danvers Doctrine, described in <xref target="RFC3365"/>:</t>

<ul empty="true"><li>
  <t>At the 32nd IETF held in Danvers, Massachusetts during April of 1995
the IESG asked the plenary for a consensus on the strength of security
that should be provided by IETF standards.  Although the immediate
issue before the IETF was whether or not to support “export” grade
security (which is to say weak security) in standards, the question
raised the generic issue of security in general.</t>
</li></ul>

<ul empty="true"><li>
  <t>The overwhelming consensus was that the IETF should standardize on the
use of the best security available, regardless of national policies.
This consensus is often referred to as the “Danvers Doctrine”.</t>
</li></ul>

<t>Then American companies started losing business to their overseas
competitors, who did not have to comply with U.S. export laws. All of
this led to what seemed like a happy conclusion: the U.S. government
drastically loosened its export rules for cryptographic software. All
was well—or so it seemed…</t>

</section>
<section anchor="the-hidden-battle"><name>The Hidden Battle</name>

<t>Strong cryptography was here to stay, and it was no longer an American
monopoly, if indeed it ever was. The Information Assurance Directorate
of the NSA, the part of the agency that is supposed to protect
U.S. data, was pleased by the spread of strong cryptography. When the
Advanced Encryption Standard (AES) competition was held, there were no
allegations of malign NSA interference; in fact, the winning entry was
devised by two Europeans, Joan Daemen and Vincent Rijmen. But the NSA
and its SIGINT needs did not go away—the agency merely adopted other
techniques.</t>

<t>I have often noted that one doesn’t go through strong security, one
goes around it. When strong encryption became more common and much
more necessary, the NSA started going around it, by targeting
computers and the software that they run. And it seems clear that they
believe that AES is quite strong; they’ve even endorsed its use for
protecting TOP SECRET information. But there was an asterisk attached
to that endorsement: AES is suitable if and only if properly used and
implemented. Therein lies the rub.</t>

<t>The first apparent attempt to tamper with outside cryptographic
mechanisms was discovered in 2007, when two Microsoft researchers, Dan
Shumow and Niels Ferguson, noted an odd property of a
NIST-standardized random number generator, DUAL_EC_DRBG. (The NBS
had been renamed to NIST, the National Institute of Standards and
Technology.) Random numbers are vital for
cryptography, but Shumow and Ferguson showed that if certain constants
in DUAL_EC_DRBG were chosen in a particular way with a
known-but-hidden other number, whoever knew that number could predict
all future random numbers from a system given a few sample bytes to
start from <xref target="Kostyuk2022"/>. These sample bytes could come from
known keys, nonces, or anything else. Where did the constants in
DUAL_EC_DRBG come from and how were they chosen or generated? No one
who knows is talking. But although cryptographers and security
specialists were very suspicious—Bruce Schneier wrote in 2007, before
more facts came out, that “both NIST and the NSA have some explaining
to do”; I assigned my students reading on the topic—the issue didn’t
really get any traction until six years later, when among the papers
that Edward Snowden disclosed was the information that the NSA had
indeed tampered with a major cryptographic standard, though published
reports did not specifically name DUAL_EC_DRBG or explain what the
purpose was.</t>

<t>The revelations didn’t stop there. There have been allegations that
the NSA paid some companies to use DUAL_EC_DRBG in their
products. Some people have claimed that there were attempts to modify
some IETF standards to make enough random bytes visible, to aid in
exploiting the random number generator. A major vendor of networking
gear, Juniper, did use DUAL_EC_DRBG in some of its products, but with
different constants<xref target="Checkoway2016"/>. Where did these come from? Were
they from the NSA or some other government? Could their source tree
have been hacked by an intelligence agency? There was a different hack
of their code at around the same time<xref target="Moore2015"/>. No one is talking.</t>

<t>The Snowden revelations also included data suggesting that the NSA had
a worldwide eavesdropping network and a group that tried very
specific, targeted hacks on very specific targets’ systems. In
retrospect, neither is surprising: “spies gonna spy”. The NSA’s
business is signals intelligence; of course they’re going to try to
intercept traffic. Indeed, the DUAL_EC_DRBG tampering is useless to
anyone who has not collected messages to decrypt. And targeted hacks
are a natural way around strong encryption: collect the data before it
is encrypted or after it is decrypted, and don’t worry about the
strength of the algorithms.</t>

<t>The privacy community, worldwide, was appalled, though perhaps they
shouldn’t have been. It calls to mind the line that Claude Rains'
character uttered in the movie
Casablanca <xref target="Curtiz"/>: “I’m shocked, shocked to find that gambling is going on in
here.” The immediate and continuing reaction was to deploy more
encryption. The standards have long existed; what was missing was
adoption. One barrier was the difficulty and expense of getting
certificates to use with TLS, the
successor to SSL; that void was filled by Let's Encrypt <xref target="LE"/>,
which made free certificates easy to get online. Today, most HTTP
traffic is encrypted, so much so that Google’s search engine
down-ranks sites that do not use it. Major email providers uniformly
use TLS to protect all traffic. WiFi, though a local area issue, now
uses much stronger encryption. (It's important to remember that
security and insecurity have economic components. Security doesn't have
to be perfect to be very useful, if it raises the attackers' costs
by enough.)</t>

<t>The news on the software side is less good. Not a day goes by when one
does not read of organizations being hit by ransomware. It goes
without saying that any threat actor capable of encrypting disks is
also capable of stealing the information on them; indeed, that is a
frequent accompanying activity, since the threat of disclosure is
another incentive to pay for those sites that do have good enough
backups. Major vendors have put a lot of effort into securing their
software, but bugs and operational errors by end-user sites persist.</t>

</section>
<section anchor="whither-the-ietf"><name>Whither the IETF?</name>
<t>Signal intelligence agencies, not just the NSA, but its peers around
the globe—most major countries have their own—are not going to go
away. The challenges that have beset the NSA are common to all such
agencies, and their solutions are likely the same. The question is
what should be done to protect individual privacy. A number of strong
democracies, such as Australia and the United Kingdom, are, in
a resumption of the Crypto Wars,
moving to restrict encryption. Spurred on by complaints from the FBI
and other law enforcement agencies, the US Congress frequently
considers bills to do the same.</t>

<t>The IETF has long had a commitment to strong, ubiquitous
encryption. This is a good thing. It needs to continue, with
cryptography and other security features designed into protocols from
the beginning. But there is also a need for maintenance. Parameters
such as key lengths and modulus sizes age; a value that is acceptable
today may not be 10 years hence. (We’ve already seen apparent problems
from 1024-bit moduli specified in an RFC, an RFC that was not modified
when technology improved enough that attacking encryption based on
them had become feasible.<xref target="Adrian2015"/>) The IETF can do nothing about
the code that vendors ship or that sites use, but it can alert the
world that it thinks things have changed.</t>

<t>Cryptoagility is of increasing importance. In the next very few years,
we will have so-called post-quantum algorithms. Both protocols and key
lengths will need to change, perhaps drastically. Is the IETF ready?
What will happen to, say, DNSSEC if key lengths become drastically
longer? Backwards compatibility will remain important, but that, of
course, opens the door to other attacks. We’ve long thought about
them; we need to be sure that our mechanisms work—we've
been surprised in the past.<xref target="BellovinRescorla2006"/></t>

<t>We also need to worry more about metadata. General Michael Hayden,
former director of both the NSA and the CIA, once remarked, “We kill
people based on metadata” <xref target="Ferran2014"/>. But caution is necessary;
attempts to hide metadata can have side-effects. To give a trivial
example, Tor is quite strong, but if your exit node is in a different
country than you are in, web sites that use IP geolocation may present
their content in a language foreign to you.
Some sites even block connections from known Tor exit nodes.
More generally, many
attempts to hide metadata involve trusting a different party; that
party may turn out to be untrustworthy or it may itself become a
target of attack. As another prominent IETFer has remarked,
“Insecurity is like entropy; you can’t destroy it but you can move it
around.” The IETF has done a lot; it needs to do more. And remember
that the risk here is not just governments acting directly, it's also
private companies that collect the data and sell it to all comers.</t>

<t>Finally, the IETF must remember that its middle name is
“Engineering”. To me, one of the attributes of engineering is the art
of picking the right solution in an over-constrained
environment. Intelligence agencies won’t go away, nor will national
restrictions on cryptography. We have to pick the right path while
staying true to our principles.</t>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>Susan Landau added many valuable comments to Steve Bellovin's essay.</t>

<t>We thank Carsten Bormann, Brian Carpenter, Wendy Grossman, Kathleen Moriarty,
Jan Schaumann, Seth David Schoen, and Paul Wouters for comments and review of this text, though
that of course doesn't mean that they necessrily agree with the text.</t>

<t>This document was created at the behest of Eliot Lear, who also 
cat herded and did some editing.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Each or any of the authors may have forgotten or omitted things
or gotten things wrong. We're sorry if that's the case, but that's
in the nature of a look-back such as this. Such flaws almost 
certainly won't worsen security or privacy though.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>No changes to IANA processes are made by this memo.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>

<reference anchor="guard2013" >
  <front>
    <title>NSA collecting phone records of millions of Verizon customers daily</title>
    <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
      <organization>The Guardian</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="ACME" target="https://datatracker.ietf.org/wg/acme/">
  <front>
    <title>Automated Certificate Management Environment (ACME)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Perpass-BoF" target="https://www.ietf.org/proceedings/88/perpass.html">
  <front>
    <title>IETF 88 Perpass BoF session</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="CFRG" target="https://datatracker.ietf.org/rg/cfrg/">
  <front>
    <title>IRTF Crypto Forum (CFRG)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="CURDLE" target="https://datatracker.ietf.org/wg/curdle/">
  <front>
    <title>curdle WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Curtiz" >
  <front>
    <title>Casablanca</title>
    <author initials="M." surname="Curtiz" fullname="Michael Curtiz">
      <organization></organization>
    </author>
    <author initials="J. J." surname="Epstein" fullname="Julius J. Epstein">
      <organization></organization>
    </author>
    <author initials="P. G." surname="Epstein" fullname="Philip G. Epstein">
      <organization></organization>
    </author>
    <author initials="H." surname="Koch" fullname="Howard Koch">
      <organization></organization>
    </author>
    <date year="1942"/>
  </front>
</reference>
<reference anchor="dual-ec" target="https://eprint.iacr.org/2015/767.pdf">
  <front>
    <title>Dual EC, A standardized back door</title>
    <author initials="D." surname="Bernstein" fullname="Daniel Bernstein">
      <organization></organization>
    </author>
    <author initials="T." surname="Lange" fullname="Tanja Lange">
      <organization></organization>
    </author>
    <author initials="R." surname="Niederhagen" fullname="Ruben Niederhagen">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="LE" target="https://dl.acm.org/doi/pdf/10.1145/3319535.3363192">
  <front>
    <title>Let's Encrypt - an automated certificate authority to encrypt the entire web</title>
    <author initials="J." surname="Aas" fullname="Josh Aas">
      <organization></organization>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization></organization>
    </author>
    <author initials="B." surname="Case" fullname="Benton Case">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Eckersley" fullname="Peter Eckersley">
      <organization></organization>
    </author>
    <author initials="A." surname="Flores-López" fullname="Alan Flores-López">
      <organization></organization>
    </author>
    <author initials="A." surname="Halderman" fullname="Alex Halderman">
      <organization></organization>
    </author>
    <author initials="J." surname="Hoffman-Andrews" fullname="Jacob Hoffman-Andrews">
      <organization></organization>
    </author>
    <author initials="J." surname="Kasten" fullname="James Kasten">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="S. D." surname="Schoen" fullname="Seth David Schoen">
      <organization></organization>
    </author>
    <author initials="B." surname="Warren" fullname="Brad Warren">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="MADINAS" target="https://datatracker.ietf.org/wg/madinas/">
  <front>
    <title>MADINAS WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="perpass" target="https://mailarchive.ietf.org/arch/browse/perpass/">
  <front>
    <title>perpass mailing list</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="plenary-video" target="https://www.youtube.com/watch?v=oV71hhEpQ20&amp;pp=ygUQaWV0ZiA4OCBwbGVuYXJ5IA%3D%3D">
  <front>
    <title>IETF 88 Technical Plenary: Hardening The Internet</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="refs-to-7258" target="https://datatracker.ietf.org/doc/rfc7258/referencedby/">
  <front>
    <title>References to RFC7258</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="timeline" target="https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)">
  <front>
    <title>Global surveillance disclosures (2013–present)</title>
    <author >
      <organization>Wikimedia foundation</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="STRINT" target="https://www.w3.org/2014/strint/">
  <front>
    <title>A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="Toronto" target="https://www.npr.org/sections/thetwo-way/2014/01/31/269418375/airport-wi-fi-used-to-track-travelers-snowden-leak-alleges">
  <front>
    <title>Canada Used Airport Wi-Fi To Track Travelers, Snowden Leak Alleges</title>
    <author >
      <organization>National Public Radio</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="UTA" target="https://datatracker.ietf.org/wg/uta/">
  <front>
    <title>Using TLS in Applications working group (UTA) working group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Kahn1996" >
  <front>
    <title>The Code Breakers, 2nd Edition</title>
    <author initials="D." surname="Kahn" fullname="David Kahn">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
<refcontent>Scribner</refcontent></reference>
<reference anchor="Borda2011" >
  <front>
    <title>Fundamentals in Information Theory and Coding. Berlin</title>
    <author initials="M." surname="Borda" fullname="Monica Borda">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<refcontent>Springer</refcontent></reference>
<reference anchor="Kerr2020" >
  <front>
    <title>Decryption Originalism: The Lessons of Burr.</title>
    <author initials="O. S." surname="Kerr" fullname="Orin Kerr">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="Harvard Law Review" value="134:905"/>
</reference>
<reference anchor="Smith1845" target="http://books.google.com/books?id=Z45clCxsF7EC">
  <front>
    <title>The Secret Corresponding Vocabulary, Adapted for Use to Morse’s Electro-Magnetic Telegraph: And Also in Conducting Written Correspondence, Transmitted by the Mails, or Otherwise</title>
    <author initials="F. O." surname="Smith" fullname="Francis O. Smith">
      <organization></organization>
    </author>
    <date year="1845"/>
  </front>
<refcontent>Thurston, Isley &amp; Co</refcontent></reference>
<reference anchor="Slater1870" target="http://books.google.com/books?id=MJYBAAAAQAAJ">
  <front>
    <title>Telegraphic Code, to Ensure Secresy in the Transmission of Telegrams, First Edition.</title>
    <author initials="R." surname="Slater" fullname="Robert Slater">
      <organization></organization>
    </author>
    <date year="1870"/>
  </front>
<refcontent>W.R. Gray</refcontent></reference>
<reference anchor="Headrick1991" >
  <front>
    <title>The Invisible Weapon: Telecommunications and International Politics, 1851–1945</title>
    <author initials="D. R." surname="Headrick" fullname="Daniel R. Headrick">
      <organization></organization>
    </author>
    <date year="1991"/>
  </front>
<refcontent>Oxford University Press</refcontent></reference>
<reference anchor="Kennedy1971" target="http://www.jstor.org/stable/563928">
  <front>
    <title>Imperial Cable Communications and Strategy, 1870-1914</title>
    <author initials="P. M." surname="Kennedy" fullname="Paul M. Kennedy">
      <organization></organization>
    </author>
    <date year="1971"/>
  </front>
  <seriesInfo name="English Historical Review" value="86 (341): 728–52"/>
</reference>
<reference anchor="Rowlett1998" >
  <front>
    <title>The Story of MAGIC: Memoirs of an American Cryptologic Pioneer</title>
    <author initials="F. B." surname="Rowlett" fullname="Frank B. Rowlett">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
<refcontent>Aegean Park Press</refcontent></reference>
<reference anchor="Miller2020" target="https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/">
  <front>
    <title>The Intelligence Coup of the Century</title>
    <author initials="G." surname="Miller" fullname="Greg Miller">
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
<refcontent>The Washington Post</refcontent></reference>
<reference anchor="Baldwin2022" target="https://drenigma.org/2022/03/02/did-britain-sell-enigmas-postwar/">
  <front>
    <title>Did Britain Sell Enigmas Postwar?</title>
    <author initials="M." surname="Baldwin" fullname="Mark Baldwin">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<refcontent>Dr. Enigma (blog)</refcontent></reference>
<reference anchor="Broad1982" >
  <front>
    <title>Evading the Soviet Ear at Glen Cove</title>
    <author initials="W. J." surname="Broad" fullname="William J. Broad">
      <organization></organization>
    </author>
    <date year="1982"/>
  </front>
  <seriesInfo name="Science" value="217 (3): 910–11"/>
</reference>
<reference anchor="Landau1988" >
  <front>
    <title>Zero Knowledge and the Department of Defense</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Notices of the American Mathematical Society [Special Article Series]" value="35 (1): 5–12"/>
</reference>
<reference anchor="Landau2014" >
  <front>
    <title>Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Journal of National Security Law &amp; Policy" value="Vol 7, No. 3"/>
</reference>
<reference anchor="Johnson1998" target="https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/cryptologic-histories/cold_war_iii.pdf">
  <front>
    <title>American Cryptology During the Cold War, 1945-1989; Book III: Retrenchment and Reform</title>
    <author initials="T. R." surname="Johnson" fullname="Thomas R. Johnson">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
<refcontent>NSA</refcontent></reference>
<reference anchor="Kostyuk2022" target="https://www.harvardnsj.org/wp-content/uploads/sites/13/2022/06/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf">
  <front>
    <title>Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process</title>
    <author initials="N." surname="Kostyuk" fullname="Nadyia Kostyuk">
      <organization></organization>
    </author>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Harvard National Security Journal" value="13 (2): 224–84"/>
</reference>
<reference anchor="Ferran2014" target="https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-based-on-metadata">
  <front>
    <title>Ex-NSA Chief: "We Kill People Based on Metadata"</title>
    <author initials="L." surname="Ferran" fullname="Lee Ferran">
      <organization></organization>
    </author>
    <date year="2014" month="May"/>
  </front>
<refcontent>ABC News</refcontent></reference>
<reference anchor="Adrian2015" target="https://weakdh.org/imperfect-forward-secrecy.pdf">
  <front>
    <title>Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.</title>
    <author initials="D." surname="Adrian" fullname="David Adrian">
      <organization></organization>
    </author>
    <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Gaudry" fullname="Pierrick Gaudry">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<refcontent>Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS)</refcontent></reference>
<reference anchor="BellovinRescorla2006" target="https://www.cs.columbia.edu/~smb/papers/new-hash.pdf">
  <front>
    <title>Deploying a New Hash Algorithm</title>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization></organization>
    </author>
    <author initials="E. K." surname="Rescorla" fullname="Eric K. Rescorla">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<refcontent>Proceedings of NDSS '06</refcontent></reference>
<reference anchor="Blaze1994" target="http://www.mattblaze.org/papers/eesproto.pdf">
  <front>
    <title>Protocol Failures in the Escrowed Encryption Standard</title>
    <author initials="M." surname="Blaze" fullname="Matt Blaze">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
<refcontent>Proceedings of Second ACM Conference on Computer and Communications Security</refcontent></reference>
<reference anchor="Checkoway2016" target="https://dl.acm.org/citation.cfm?id=2978395">
  <front>
    <title>A Systematic Analysis of the Juniper Dual EC Incident</title>
    <author initials="S." surname="Checkoway" fullname="Stephen Checkoway">
      <organization></organization>
    </author>
    <author initials="J." surname="Maskiewicz" fullname="Jacob Maskiewicz">
      <organization></organization>
    </author>
    <author initials="C." surname="Garman" fullname="Christina Garman">
      <organization></organization>
    </author>
    <author initials="J." surname="Fried" fullname="Joshua Fried">
      <organization></organization>
    </author>
    <author initials="S." surname="Cohney" fullname="Shaanan Cohney">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <author initials="R. P." surname="Weinmann" fullname="Ralf-Philipp Weinmann">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="" surname="Hovav Shacham" fullname="Hovav Shacham">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security" value="468–79"/>
</reference>
<reference anchor="Levy2001" >
  <front>
    <title>Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age</title>
    <author initials="S." surname="Levy" fullname="Steven Levy">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
<refcontent>Viking</refcontent></reference>
<reference anchor="Moore2015" target="https://www.rapid7.com/blog/post/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor/">
  <front>
    <title>CVE-2015-7755: Juniper ScreenOS Authentication Backdoor</title>
    <author initials="H. D." surname="Moore" fullname="H.D. Moore">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<refcontent>Rapid7 Blog</refcontent></reference>
<reference anchor="Doria2012" target="https://www.internetsociety.org/resources/doc/2012/human-rights-and-internet-protocols-comparing-processes-and-principles/">
  <front>
    <title>Human Rights and Internet Protocols: Comparing Processes and Principles</title>
    <author initials="A." surname="Doria" fullname="Avri Doria">
      <organization></organization>
    </author>
    <author initials="J." surname="Liddicoat" fullname="Joy Liddicoat">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
<refcontent>The Internet Society</refcontent></reference>
<reference anchor="Garfinkel1995" >
  <front>
    <title>GPG: Pretty Good Privacy</title>
    <author initials="S." surname="Garfinkel" fullname="Simson Garfinkel">
      <organization></organization>
    </author>
    <date year="1995"/>
  </front>
<refcontent>O'Reilly and Associates</refcontent></reference>
<reference anchor="Masnick2023" target="https://copia.is/library/unintended-consequences/">
  <front>
    <title>The Unintended Consequences of Internet Regulation</title>
    <author initials="M." surname="Masnick" fullname="Mike Masnick">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Roth2022" target="https://www.theverge.com/2022/3/5/22962822/internet-backbone-provider-cogent-shuts-off-service-russia">
  <front>
    <title>Internet backbone provider shuts off service in Russia</title>
    <author initials="E." surname="Roth" fullname="Emma Roth">
      <organization></organization>
    </author>
    <date year="2022" month="March"/>
  </front>
<refcontent>The Verge</refcontent></reference>
<reference anchor="zubhoff2019" >
  <front>
    <title>The age of surveillance capitalism, The fight for a human future at the new frontier of power</title>
    <author initials="S." surname="Zuboff" fullname="Shoshana Zuboff">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="ISBN" value="9781781256855"/>
<refcontent>Profile Books</refcontent></reference>
<reference anchor="Badii2023" target="https://digitalmedusa.org/wp-content/uploads/2023/05/SanctionsandtheInternet-DigitalMedusa.pdf">
  <front>
    <title>Sanctions and the Internet</title>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
&RFC7687;
&RFC7258;
&RFC8446;
&I-D.ietf-tls-esni;
&RFC7858;
&RFC8484;
&RFC7540;
&RFC9000;
&I-D.farrelll-mpls-opportunistic-encrypt;
&RFC8461;
&RFC7217;
&RFC8064;
&RFC8981;
&RFC1984;
&RFC6462;
&RFC7480;
&RFC7481;
&RFC9082;
&RFC9083;
&RFC7484;
&RFC8056;
&RFC8280;
&DOI.10.5325_jinfopoli.11.2021.0376;
&RFC3365;


    </references>


<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>RFC editor: please remove this section.</t>

<t>Draft -02:</t>

<t><list style="symbols">
  <t>A bunch of typo fixes and added acks.</t>
</list></t>

<t>Draft -01:</t>

<t><list style="symbols">
  <t>Changes based on ISE review</t>
</list></t>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

