<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.0.2) -->
<?rfc RFCedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-knodel-e2ee-definition-08" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="e2ee">Definition of End-to-end Encryption</title>
    <seriesInfo name="Internet-Draft" value="draft-knodel-e2ee-definition-08"/>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="O." surname="Kolkman" fullname="Olaf Kolkman">
      <organization>Internet Society</organization>
      <address>
        <email>kolkman@isoc.org</email>
      </address>
    </author>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <organization/>
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>
    <date year="2023" month="February" day="06"/>
    <area>sec</area>
    <workgroup>sec</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>End-to-end encryption is an application of cryptography mechanisms and properties in communication systems between endpoints. End-to-end encrypted systems are exceptional in providing both security and privacy properties through confidentiality, integrity and authenticity features for users. Improvements to end-to-end encryption strive to maximize the user's security and privacy while balancing usability and availability. Users of end-to-end encrypted communications expect trustworthy providers of secure implementations to respect and protect them.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document uses three different dimensions that define end-to-end encryption, which can be applied in a variety of contexts.</t>
      <t>The first is a formal definition that draws on the basic understanding of end points and cryptography, where it is comprised of necessary constituent parts but considered as a system. The second looks at end-to-end encrypted implementations from a design perspective, both its fundamental features and proposed improvements on those features. Lastly, this document considers the expectations of the user of end-to-end encryption.</t>
      <t>These dimensions taken as a whole comprise a generally comprehensible picture of consensus at the IETF as to what is end-to-end encryption, irrespective of application, from messaging to video conferencing, and between any number of end points. It it worth noting that while the word "encryption" often refers to confidentiality (security) properties, this document shows that end-to-end encryption MUST provide both security and privacy properties. And it provides a definition of which specific security and privacy properties end-to-end encryption should provide.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> {RFC8174}} when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="formal-definition-of-end-to-end-encryption">
      <name>Formal definition of end-to-end encryption</name>
      <t>End-to-end encryption, irrespective of the content or the specific methods employed, relies on two important and rigorous technical concepts: the end-to-end principle as defined in the IETF; and encryption, an application of cryptographic mechanisms and the primary means employed by the IETF to secure internet protocols and maintain the confidentiality of content delivered via these internet protocols. Where end-to-end encryption is comprised of these necessary constituent parts, a systems approach also defines their interplay. In the field of cryptography it is also possible to achieve a concise definition of end-to-end encrypted security.</t>
      <section anchor="end-point">
        <name>End point</name>
        <t>An "end" either sends messages or receives them, usually both. Other systems on the path are just that: other systems. Other systems MAY be used to facilitate the sending of messages between both "ends", but are not "ends" themselves.</t>
        <t>It is, however, not trivial to establish the definition of an end point in isolation. <xref target="hale"/> Depending on the context, an "end" may be a user; a device colocated with the user; or a set of devices controlled by a user that want to simultaneously participate in the conversation.</t>
      </section>
      <section anchor="end-to-end-principle">
        <name>End-to-end principle</name>
        <t>The end-to-end principle is a core architectural guideline of the Internet. <xref target="RFC3724"/></t>
        <t>In 1984, the "end-to-end argument" was introduced as a design principle to guide placement of functions among the parts of a communication system. <xref target="saltzer"/> Specifically, it suggested that functions that require the knowledge and help of the application (at the endpoints) should not be implemented as part of the communication system itself.</t>
        <t>Over the years, the principle has evolved to an understanding that the "network's job is to transmit datagrams as efficiently and flexibly as possible", and the rest should be done at the ends. <xref target="RFC1958"/> This principle can also be extended to the design of applications itself. <xref target="saltzer"/>{RFC3724}}<xref target="RFC3238"/></t>
      </section>
      <section anchor="encryption">
        <name>Encryption</name>
        <t>Encryption is the process of using cryptographic methods to convert plaintext to ciphertext that is decipherable only by authorized parties. Encryption can help extend the end-to-end principle in application design, where now (as before) the function of the network is limited to efficiently transporting messages, but additionally the network cannot access any part of the message itself.</t>
        <t>Encryption can be applied in an end-to-end context in many ways. For example, applications may use the double-ratchet algorithm (which uses an authenticated encryption scheme) and of an Authenticated Key Exchange (AKE). The usage of these algorithms (or variants of these) is present in many modern messenger applications such as those considered in the IETF Messaging Layer Security working group, whose charter is to create a document that satisfies the need for several internet applications for group key establishment and message protection protocols <xref target="mls"/>. OpenPGP, mostly used for email, uses a different technique to achieve security and privacy. It is also chartered in the IETF to create a specification that covers object encryption, object signing, and identity certification <xref target="openpgp"/>. Both protocols rely on the use of asymmetric and symmetric encryption, and exchange long-term identity public keys amongst end points.</t>
      </section>
      <section anchor="concise-definition-of-end-to-end-encryption">
        <name>Concise definition of end-to-end encryption</name>
        <t>An end-to-end-encryption service provides confidentiality, integrity, and authenticity between ends. Another concise definition already exists for messaging: "End-to-end instant message encryption would conceal communications between one user's instant messaging application through any intermediate devices and servers all the way to the recipient's instant messaging application." <xref target="dkg"/></t>
        <t>Confidentiality is broken if content can be decrypted at any intermediate point.</t>
        <t>As for integrity and authenticity, permission of data manipulation or creation of pseudo-identities for third parties to allow access under the user's identity also violate end-to-end encryption. In other words, the application functions only for the end user and does not perform functions for any other entity coverly, nor overtly, say even if that entity claims to have obtained the consent of the end user. Thus, end point authenticity MUST be established as (sub-)identities of the end user, and end-to-end integrity MUST also be maintained by the system. There is considerable system design flexibility available in the mechanisms for authentication and integrity, specifically data authentication, that still meet this requirement.</t>
      </section>
    </section>
    <section anchor="end-to-end-encryption-implementations">
      <name>End-to-end encryption implementations</name>
      <t>When looking at implementations of end-to-end encryption from a design perspective, the first consideration is the list of fundamental features that distinguish an end-to-end encrypted system from one that does not employ end-to-end encryption. Secondly, one must consider the development goals for improving the features of end-to-end encryption, in other words, the challenges defined by the designers, developers and implementers of end-to-end encryption.</t>
      <t>The features and challenges listed below are framed comprehensively rather than from the perspective of their design, development, implementation or use.</t>
      <section anchor="properties">
        <name>Properties</name>
        <t>This section aims to define the security properties of an end-to-end encrypted system. The properties of end-to-end encryption from an implementation perspective can be split into two categories: 1) the necessary properties of confidentiality, integrity and authenticity whereas the properties of 2) properties such as availability, deniability, forward secrecy, and post-compromise security, which are desirable enhancements.</t>
        <section anchor="necessary-properties">
          <name>Necessary properties</name>
          <dl>
            <dt>Confidentiality</dt>
            <dd>
              <t>A system provides message confidentiality if only the sender and intended recipient(s) can read the message plaintext, i.e. message sent between participants can only be read by the agreed upon participants in the group and all participants share the identical group member list.</t>
            </dd>
            <dt>Integrity</dt>
            <dd>
              <t>A system provides message integrity when it guarantees that messages have not been modified in transit. If a message has been modified, it must be detected in a reliable way by the recipient.</t>
            </dd>
            <dt>Authentication</dt>
            <dd>
              <t>A system provides authentication if the recipient and sender attest to each other's identities in relation to the contents of their communications.</t>
            </dd>
          </dl>
        </section>
        <section anchor="optionaldesirable-properties-and-features">
          <name>Optional/desirable properties and features</name>
          <t>There is a set of optional/desirable features that a end-to-end system can provide. These properties can be related to the network, to the user interface or specialized variants of the previous features.</t>
          <dl>
            <dt>Availability</dt>
            <dd>
              <t>A system provides high availability if the user is able to access the contents of the message (decrypt them) when they so desire and potentially from more than one device. For example, a message can arrive to a recipient even after they have been offline for a long time. Note that applications that use this feature often implement a threshold for this property: number or aggregate size of messages; or messages from a month ago can be read by a user that has been offline, but not messages from a year ago.</t>
            </dd>
            <dt>Loss Resilience</dt>
            <dd>
              <t>If a message is permanently lost by the network, sender(s) and/or recipient(s) should still be able to communicate.</t>
            </dd>
            <dt>Deniability</dt>
            <dd>
              <t>Deniability ensures that anyone able to decrypt a record of the transcript, including message recipients, cannot cryptographically prove to others that a particular participant of a communication authored a specific message. As demonstrated by widely implemented protocols, this optional property must exist in conjunction with the necessary property of authentication, i.e. participants in a communication must be assured that they are communicating with the intended parties but this assurance cannot be transmitted to any other parties.</t>
            </dd>
            <dt>Forward secrecy</dt>
            <dd>
              <t>Forward secrecy is a security property that prevents attackers from decrypting encrypted data they have previously captured over a communication channel before the time of compromise, if the attacker compromises one of the endpoints. Forward secrecy is usually achieved by regularly deriving new encryption/decryption keys, and destroying old keys that are no longer required to encrypt or decrypt messages.</t>
            </dd>
          </dl>
          <t>Post-compromise security
:Post-compromise security is a security property that seeks to guarantee future confidentiality and integrity in the face of a passive end-point compromise (and consequently that communication sent post-compromise is protected with the same security properties that existed before the compromise). It is usually achieved by adding new ephemeral key exchanges (new randomness) to the derivation of encryption/decryption keys every 'x' amount of time or after 'n' messages sent. Note that post-compromise security is not met in the face of active attackers that compromise an end-point. This property can add a level of complexity to a protocol as deriving new key material can be expensive, and, therefore, it has to be carefully evaluated as part of a system's design.</t>
          <dl>
            <dt>Metadata obfuscation</dt>
            <dd>
              <t>Digital communication inevitably generates data other than the content of the communication itself, such as IP addresses, group memberships, and date and time of messages. To enhance the privacy and security of end-to-end encryption, steps should be taken to minimize metadata. Additional steps should be taken to prevent leakage such as hiding users' IP addresses, reducing non-routing metadata, and avoiding extraneous message headers.</t>
            </dd>
            <dt>Disappearing messages</dt>
            <dd>
              <t>For confidential conversations, deleting one-by-one sensitive messages typically depends on a level of client-side security that is unsustainable. Features like "delete for me" or "delete for everyone" helps with individual messages. What is better is the automatic deletion of whole conversations after an agreed upon timeframe by all parties, e.g. disappearing messages. In any case, whenever a user has deleted content for all, the provider must ensure complete removal of the content and even then a certain level of trust among users of the system is needed.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="challenges">
        <name>Challenges</name>
        <t>Below is a best effort list of the challenges currently faced by protocol designers of end-to-end encrypted systems. Problems that fall outside of this list are likely 1) unnecessary feature requests that negligibly, or do nothing to, achieve the aims of end-to-end encrypted systems, or are 2) in some way antithetical to the goals of end-to-end encrypted systems.</t>
        <ul spacing="normal">
          <li>Making messaging applications interoperable is an important goal for a healthy and user-centric internet ecosystem, however it requires careful design of protocols and systems, such as content type negotiation; provisions of global services, such as discovery; and a great deal of cooperation amongst implementers.</li>
          <li>Public key verification is very difficult for users to manage. Authentication of the two ends is required for secure and private conversations. Therefore, solving the problem of verification of public keys is a major concern for any end-to-end encrypted system design. Some applications bind together the account identity and the key, and leave users to establish a trust relationship between them, assisted by public key fingerprint information.</li>
          <li>Users want to smoothly switch application use between devices, but this comes at a cost to the security and privacy of the communication. Thus, there is a problem of availability in end-to-end encrypted systems because the account identity's private key is generated by and stored on the end-user's original device and to move the private key to another device can compromise the security of one of the end-points of the system (by opening the door to key-impersonation attacks, for example).</li>
          <li>Existing protocols are vulnerable to metadata analysis, even though metadata is often as sensitive than message content. Metadata is plaintext information that travels across the wire and includes delivery-relevant details that central servers need such as the account identity of end-points, timestamps, message size or more. Metadata is difficult to eliminate or obfuscate entirely.</li>
          <li>Confidential and secure communications systems should also maintain the privacy of users but this is necessarily balanced with authentication and is related to the metadata problem for account identity.</li>
          <li>Users need to communicate in groups, but this presents scalability problems for end-to-end encryption systems.</li>
          <li>The whole communication should remain secure if only one message is compromised. However, for encrypted communication, in some schemes, you must currently choose between forward secrecy or the ability to fully communicate asynchronously. This presents a problem for application design that uses end-to-end encryption for asynchronous messaging over email, RCS, etc.</li>
          <li>Users of end-to-end encrypted systems should be able to communicate with any medium of their choice, such as text, audio, video, or miscellaneous files. However, there is often a resource problem because there are no open protocols to allow users to securely share the same resource in an end-to-end encrypted system.</li>
          <li>Usability, accessibility and internationalisation features often need careful design and implementation with respect to security and privacy, such as message read status, typing indicators, URL/link previews, third-party input/output applications.</li>
          <li>End user security tools like anti-virus plugins, spam filters, fraud protections are in conflict with the security and privacy considerations of the end-to-end application.</li>
          <li>Deployment is notoriously challenging for any software application where maintenance and updates can be particularly disastrous for obsolete cryptographic libraries.</li>
        </ul>
      </section>
    </section>
    <section anchor="end-user-expectations">
      <name>End-user expectations</name>
      <t>While the formal definition and properties of an end-to-end encrypted system relate to communication security and privacy, they do not draw from a comprehensive threat model or speak to what users expect from end-to-end encrypted communication. It is in this context that some designs and architectures of end-to-end encryption may ultimately run contrary to user expectations of end-to-end encrypted systems <xref target="GEC-EU"/>. Although some system designs do not directly violate "the math" of encryption algorithms, they do so by implicating and weakening other important aspects of an end-to-end encrypted <em>system</em>.</t>
      <section anchor="a-conversation-is-confidential">
        <name>A conversation is confidential</name>
        <t>Users talking to one another in an end-to-end encrypted system should be the only ones that know what they are talking about <xref target="RFC7624"/>. People have the right to data privacy as defined in international human rights law, and within the right to free expression and to hold opinions is inferred the right to whisper, whether or not they are using digital communications or walking through a field.</t>
      </section>
      <section anchor="providers-are-trustworthy">
        <name>Providers are trustworthy</name>
        <dl>
          <dt>Trustworthy</dt>
          <dd>
            <t>A system is completely trustworthy if and only if it is completely resilient, reliable, accountable, and secure in a way that consistently meets users’ expectations. The opposite of trustworthy is untrustworthy.</t>
          </dd>
        </dl>
        <t>This definition is complete in its positive and negative aspects: what it is, e.g. "Worthy of confidence" and what it is not, e.g. in RFC 7258: "behavior that subverts the intent of communicating parties without the agreement of those parties" <xref target="RFC7258"/>.</t>
        <t>Therefore, a trustworthy end-to-end encrypted communication system is the provider of the set of functions needed by two or more parties to communicate among each other in a confidential, authenticated and integrity-preserving fashion without any third party having access to the content of that communication where the functions that offer the confidentiality, integrity and authenticity-preservation are providing these services to only the participants whom all know who are in the conversation.</t>
      </section>
      <section anchor="access-by-a-third-party-is-impossible">
        <name>Access by a third-party is impossible</name>
        <t>No matter the specifics, any methods used to access to the content of the messages by a third party would violate a user's expectations of end-to-end encrypted messaging. "[T]hese access methods scan message contents on the user’s [device]", which are then "scanned for matches against a database of prohibited content before, and sometimes after, the message is sent to the recipient" <xref target="GEC-EU"/>. Third party access also covers cases without scanning -- namely, it should not be possible for any third-party end point, even those under the user's identity as per Section 2.1, to access the data regardless of reason.</t>
        <t>If a method makes secure and private communication, intended to be sent over an encrypted channel between end points, available to parties other than the sender and intended recipient(s), without formally interfering with channel confidentiality, that method violates the understood expectation of that security property.</t>
      </section>
      <section anchor="the-software-of-the-end-to-end-encrypted-system-can-be-trusted">
        <name>The software of the end-to-end encrypted system can be trusted</name>
        <t>A way by which users can check that a system does not have a "backdoor" or is performing in accordance to cryptographic protocols' specifications is by making them open source. Open source allows users to freely analyse the system and be assured of it. However, while some users might be able to do so, many users lack the technological knowledge needed to analyse source code. It is vital that systems provide public security analyses of their source code enabling reproducible audits and investigations that can be published and peer reviewed.</t>
      </section>
      <section anchor="pattern-inference-is-minimised">
        <name>Pattern inference is minimised</name>
        <t>Analyses such as traffic fingerprinting or other (encrypted or unencrypted) data analysis techniques, outside of or as part of end-to-end encrypted system design, allow third parties to draw inferences from communication that was intended to be confidential. "By allowing private user data to be scanned via direct access by servers and their providers," the use of these methods should be considered an affront to "the privacy expectations of users of end-to-end encrypted communication systems" <xref target="GEC-EU"/>.</t>
        <t>Not only should an end-to-end encrypted system value user data privacy by not explicitly enabling pattern inference, it should actively be attempting to solve issues of metadata and traceability (enhanced metadata) through further innovation that stays ahead of advances in these techniques.</t>
      </section>
      <section anchor="the-end-to-end-encryption-is-not-compromised">
        <name>The end-to-end encryption is not compromised</name>
        <t>RFC 3552 talks about the Internet Threat model such as the assumption that the user can expect any communications systems, but perhaps especially end-to-end encrypted systems, to not be intentionally compromised <xref target="RFC3552"/>. Intentional compromises of end-to-end encryption are usually referred to as "backdoors" but are often presented as additional design features under terms like "key escrow". Users of end-to-end encryption would not expect a front, back or side door entrance into their confidential conversations and would expect a provider to actively resist -- technically and legally -- compromise through these means.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>From messaging to video conferencing, there are many competing features in an end-to-end encrypted implementation that is secure, private and usable. The most well designed system cannot meet the expectations of every user, nor does an ideal system exist from any dimension. End-to-end encryption is a technology that is constantly improving to achieve the ideal as defined in this document.</t>
      <t>Features and functionalities of end-to-end encryption should be developed and improved in service of end user expectations for privacy preserving communications.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Fred Baker, Stephen Farrell, Richard Barnes all contributed to the early strategic thinking of this document and whether it would be useful to the IETF community.</t>
      <t>The folks at Riseup and the LEAP Encryption Access Project have articulated brilliantly the hardest parts of end-to-end encryption systems that serve the end users' right to whisper.</t>
      <t>Ryan Polk at the Internet Society has energy to spare when it comes to organising meaningful contributions, like this one, for the technical advisors of the Global Encryption Coalition.</t>
      <t>Adrian Farrel, Eric Rescorla and Paul Wouters are acknowleded for their review, comments, or questions that lead to improvement of this document.</t>
      <t>Chelsea Komlo and Britta Hale have contributed their deep expertise and consice and rigourous writing to this draft.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not specify new protocols and therefore does not bring up technical security considerations.</t>
      <t>Because some policy decisions may affect the security of the internet, a clear and shared definition of end-to-end encryption is important in policy related discussions. This document aims to provide that clarity.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter">
            <organization/>
          </author>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3238">
        <front>
          <title>IAB Architectural and Policy Considerations for Open Pluggable Edge Services</title>
          <author fullname="S. Floyd" initials="S." surname="Floyd">
            <organization/>
          </author>
          <author fullname="L. Daigle" initials="L." surname="Daigle">
            <organization/>
          </author>
          <date month="January" year="2002"/>
          <abstract>
            <t>This document includes comments and recommendations by the IAB on some architectural and policy issues related to the chartering of Open Pluggable Edge Services (OPES) in the IETF.  OPES are services that would be deployed at application-level intermediaries in the network, for example, at a web proxy cache between the origin server and the client.  These intermediaries would transform or filter content, with the explicit consent of either the content provider or the end user. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3238"/>
        <seriesInfo name="DOI" value="10.17487/RFC3238"/>
      </reference>
      <reference anchor="RFC3724">
        <front>
          <title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
          <author fullname="J. Kempf" initials="J." role="editor" surname="Kempf">
            <organization/>
          </author>
          <author fullname="R. Austein" initials="R." role="editor" surname="Austein">
            <organization/>
          </author>
          <author>
            <organization>IAB</organization>
          </author>
          <date month="March" year="2004"/>
          <abstract>
            <t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3724"/>
        <seriesInfo name="DOI" value="10.17487/RFC3724"/>
      </reference>
      <reference anchor="RFC3552">
        <front>
          <title>Guidelines for Writing RFC Text on Security Considerations</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla">
            <organization/>
          </author>
          <author fullname="B. Korver" initials="B." surname="Korver">
            <organization/>
          </author>
          <date month="July" year="2003"/>
          <abstract>
            <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="72"/>
        <seriesInfo name="RFC" value="3552"/>
        <seriesInfo name="DOI" value="10.17487/RFC3552"/>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey">
            <organization/>
          </author>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="B. Schneier" initials="B." surname="Schneier">
            <organization/>
          </author>
          <author fullname="C. Jennings" initials="C." surname="Jennings">
            <organization/>
          </author>
          <author fullname="T. Hardie" initials="T." surname="Hardie">
            <organization/>
          </author>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <author fullname="C. Huitema" initials="C." surname="Huitema">
            <organization/>
          </author>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann">
            <organization/>
          </author>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3935">
        <front>
          <title>A Mission Statement for the IETF</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
            <organization/>
          </author>
          <date month="October" year="2004"/>
          <abstract>
            <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="95"/>
        <seriesInfo name="RFC" value="3935"/>
        <seriesInfo name="DOI" value="10.17487/RFC3935"/>
      </reference>
      <reference anchor="saltzer" target="https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">
        <front>
          <title>End-to-end arguments in system design</title>
          <author initials="J. H." surname="Saltzer, et al">
            <organization/>
          </author>
          <date year="1984"/>
        </front>
      </reference>
      <reference anchor="dkg" target="https://tools.ietf.org/html/draft-dkg-hrpc-glossary-00">
        <front>
          <title>Human Rights Protocol Considerations Glossary</title>
          <author initials="D." surname="Gillmor">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="mls" target="https://datatracker.ietf.org/doc/charter-ietf-mls">
        <front>
          <title>Messaging Layer Security</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="openpgp" target="https://datatracker.ietf.org/doc/charter-ietf-openpgp">
        <front>
          <title>Open Specification for Pretty Good Privacy</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="GEC-EU" target="https://www.globalencryption.org/2020/11/breaking-encryption-myths/">
        <front>
          <title>Breaking encryption myths: What the European Commission’s leaked report got wrong about online security</title>
          <author initials="" surname="Global Encryption Coaliation">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="hale">
        <front>
          <title>On End-to-End Encryption</title>
          <author>
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
