<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.34 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-10" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Internet Centralization and Standards">Centralization, Decentralization, and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-10"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <?line 244?>

<t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that while standards bodies have little ability to prevent many forms of centralization, they can still make contributions that improve the Internet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 249?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>One of the Internet's defining features is its purposeful avoidance of any single controlling entity. While originating in a desire to prevent a single technical failure from having a wide impact,<xref target="RAND"/> the Internet's early avoidance of economic and political centralization arguably enabled its rapid adoption and broad reach: permission is not required to connect to, deploy an application on, or use the Internet for a particular purpose.</t>
      <t>Although maintaining this property remains a widely shared goal, consistently preserving it across the range of services and applications that people see as "the Internet" has proven elusive. Today, many successful services operate in a centralized fashion -- to the point where some proprietary applications have become so well-known that they are commonly mistaken for the Internet itself.<xref target="FB-INTERNET"/></t>
      <t>These difficulties call into question what role architectural design -- in particular, that overseen by open standards bodies such as the IETF -- can and should play in controlling centralization on the Internet.</t>
      <t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that while standards bodies have little ability to prevent many forms of centralization, there are still contributions they can make.</t>
      <t><xref target="centralization"/> defines centralization, explains why it is often undesirable but sometimes beneficial, and surveys how it occurs on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant strategies, along with their limitations. Then, <xref target="considerations"/> makes recommendations about the role that Internet standards can play in controlling centralization. <xref target="conclude"/> concludes by identifying areas for future work.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. However, designers of proprietary protocols and applications can benefit from considering these issues, especially if they intend their work to be considered for eventual standardization. Likewise, policymakers can use this document to help characterise abuses that involve centralized protocols and applications and evaluate proposed remedies for them.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization</name>
      <t>In this document, "centralization" is the state of affairs where a single entity or a small group of them can observe, capture, control, or extract rent from the operation or use of an Internet function exclusively.</t>
      <t>Here, "entity" could be a person, group, corporation, or government. An organization might be subject to governance that mitigates centralization risk (see <xref target="multi"/>), but that organisation is still a centralized entity.</t>
      <t>"Internet function" is used broadly in this document. Most directly, it might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>However, because people's experience is not limited to standards-defined protocols, this document also considers centralization in applications built on top of standard protocols -- for example, social networking, file sharing, financial services, and news dissemination. Likewise, the networking equipment, hardware, operating systems, and software that act as enabling technologies can also impact centralization. The supply of Internet connectivity to end users in a particular area or situation can likewise exhibit centralization, as can the supply of transit between networks (so called "Tier 1" networks).</t>
      <t>Centralization is not a binary condition: a function might be vulnerable to it to various degrees. For example, a function that effectively uses federation (<xref target="federation"/>) to enable easy switching between instances might have still have risk of centralization, but not as great as one that had a single, proprietary provider. Some functions' centralization risk is mitigated so effectively that they are not commonly perceived as being centralized at all.</t>
      <t>Centralization also has many potential sources. A single function might be subject to many forms of centralization, due to technical, political, economic, social, and even cognitive factors.</t>
      <t>The forms of centralization that this document discusses are primarily economic and political -- for example, one company (or a cartel of them) capturing a function, or a country being able to control how a function is supplied in another jurisdiction. While legal constraints on the Internet within a single jurisdiction are of natural concern to the Internet community, they are not considered as centralization by this document.</t>
      <t>These forms of centralization can be driven by many factors, such as the strategies of Internet-focused businesses, government policies and regulation, Intellectual Property, and inherent forces like network effects.</t>
      <t>Centralization can also be technical; for example, a machine or network link being a single point of failure for the provision of a function. While an important factor in protocol design, this form of centralization is relatively well-understood by the technical community and therefore is not addressed by this document. A failure because of a cut cable, power outage, or failed server is qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
      <section anchor="why">
        <name>Centralization Can Be Harmful</name>
        <t>Engineers who participate in Internet standards efforts often have a natural inclination to prevent and counteract centralization because they see the Internet's history and architecture as incompatible with it. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks" who relate as peers that agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action is prevalent in the Internet's design -- for example, in the concept of an "autonomous system".</t>
        <t>This reluctance to countenance centralization is also rooted in the many potentially damaging effects that have been associated with economic and political centralization, including:</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power (whether that be economic or political) not be consolidated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: A party with the ability to control communication can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a centralized service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which facilitates abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large centralized provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a centralized provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in functions' implementation leads to a more robust outcome when viewed systemically, because "progress is the outcome of a trial-and-error evolutionary process of many agents interacting freely." <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>The relationship between these harms and centralization is often complex; it is not always the case that centralization will lead to them, and when it does, there is not always a direct and simple tradeoff. This makes it important to critically evaluate claims of centralization before allowing them to influence protocol design.</t>
        <t>For example, while centralization can impact availability, many other factors also influence it, and any relationship between them cannot be assumed without careful analysis of where and how centralization occurs. A system operated in a central fashion might be more available because of factors like the resources available to a larger operator, but also have greater impact when a fault is encountered; decentralized systems might be more resilient in the face of local failures, but less able to react to systemic issues.</t>
        <t>Consider a large variety of Web sites might depend upon a cloud hosting provider; if it were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted. Likewise, a mobile Internet access provider might have an outage that affects hundreds, thousands, or more of its users. In both cases, centralization is not indicated by the loss of availability or its scale, but it well might be if the parties relying on the function don't have reasonable options to switch to if they are unhappy with the availability of the service provided, or if friction against switching to an alternative is too great.</t>
        <t>Competitive constraints provide another example of a need for nuance. While making the Internet more competitive may be a motivation for many engineers, only courts (and sometimes, regulators) have the authority to define a relevant market and determine that a behavior is anti-competitive. What might be considered undesirable centralization by the technical community might not attract competition regulation. Conversely, what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
      </section>
      <section anchor="necessary">
        <name>Centralization Can Be Helpful</name>
        <t>The potential harms of centralization listed above are widely appreciated. Less widely explored is the reliance on centralization by some protocols and applications to deliver their functionality.</t>
        <t>Often, centralization is present due to technical necessity. For example, a single, globally coordinated “source of truth” is by nature centralized -- such as in the root zone of the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
        <t>Or, consider IP address allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company were to capture the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the Web's trust model requires a Certificate Authority to serve as the root of trust for communication between browsers and servers, bringing centralization risk that needs to be considered in the design of that system.</t>
        <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also require centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function is centralized.</t>
        <t>Even when not strictly necessary, centralization can be deployed to beneficial ends. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries – including governments, corporations, and nonprofit organizations – have done so in no small part because of the intentional design that went into those structures."</t>
        <t>This can be seen when a function requires governance to realize common goals and protect minority interests. For example, content moderation functions impose community values, but can also be viewed as a choke point. Likewise, complex and risky functions like financial services (e.g., credit card processing) can be seen as beneficially centralized into relatively few, specialized organizations, where they can receive the focused attention that they require.</t>
        <t>When centralization is purposefully used like this, Internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) or governance structures (see <xref target="multi"/>). Protocols that successfully do so are often reused to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, incorporating the Domain Name System is usually preferable to establishing a new system.</t>
        <t>Ultimately, deciding when centralization is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient.</t>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, Baran gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required." <xref target="RAND"/></t>
      <t>Avoiding technical centralization -- while not a trivial topic -- is relatively well understood. Doing so for political and economic centralization is considerably more challenge, especially when using only technical tools (like protocol design). Several issues are encountered.</t>
      <t>First, identifying which aspects of a function to decentralize and how to do so can be difficult, both because there are often many interactions between different types and sources of centralization, and because centralization sometimes only becomes clear after the function is deployed at scale.</t>
      <t>Indeed, efforts to decentralize often have the effect of merely shifting centralization to a different place -- for example, in its governance, implementation, deployment, or in ancillary functions. In other words, "decentralized technology alone does not guarantee decentralized outcomes." <xref target="SCHNEIDER"/></t>
      <t>For example, a cloud storage function might be implemented using a distributed consensus protocol, assuring that the failure of any single node will not affect the system's operation or availability. In that sense, it is technically decentralized. However, if it is operated by a single legal entity, that brings the aspect of economic and latent political centralization, especially if there are few other options available, or if there is friction against choosing other options.</t>
      <t>Another example is the Web, which was envisioned and widely held to be a decentralizing force in its early life. Its potential for centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Second, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as centralization is a continuum, so is decentralization, and not everyone agrees one what the "right" level or type is, how to weigh different forms of centralization against each other, or how to weigh potential centralization against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While much of the system is decentralized through the distribution of the lookup function to local servers that users have the option to override, the DNS is also a name space -- a single, global "source of truth" with inherent (if beneficial) centralization in its management. ICANN mitigates the associated risk through multi-stakeholder governance (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than human governance. <xref target="MUSIANI"/></t>
      <t>Third, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when it opens up the possibility of centralization elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, more bluntly, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets." <xref target="PERSPECTIVE"/></t>
      <t>For example, while blockchain-based cryptocurrencies purport to address the political and economic centralization inherent in traditional currencies through technical means, many exhibit considerable concentration of power due to voting/mining power, distribution of funds, and diversity of codebase causes many to question how decentralized they actually are. <xref target="AREWEDECENTRALIZEDYET"/> Over-reliance on technical measures brings an opportunity for latent, informal power structures that have their own risks -- including centralization. <xref target="STRUCTURELESS"/></t>
      <t>In practice, this means that decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. In particular, if one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Strategies</name>
        <t>Despite the inherent issues in achieving political and economic decentralization through solely technical means, a few technical strategies are sometimes promoted as addressing not only technical centralization but also political and economic centralization. This section examines some, along with their limitations.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>Protocol designers often attempt to address political and economic centralization with federation: designing a function in a way that uses independent instances who maintain connectivity and interoperability to provide a single, cohesive service. Federation promises to allow users to choose the instance they associate with and accommodates substitution of one instance for another, lowering switching costs.</t>
          <t>However, federation alone is insufficient to prevent or mitigate centralization of a function, because non-technical factors can create pressure to use a central solution.</t>
          <t>For example, the e-mail suite of protocols needs to route messages to a user even when that user changes network locations or becomes disconnected for a long period. To facilitate this, SMTP <xref target="RFC5321"/> defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol avoids the use of a single, central server. Users can (and often do) choose to delegate that role to someone else, or can run their own MTA.</t>
          <t>Despite this design, e-mail exhibits a degree of centralization. Part of the reason is a side effect of spam controls; many now consider running a personal MTA to be impractical because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such -- creating pressure towards centralization.</t>
          <t>XMPP <xref target="RFC6120"/> is a chat protocol that demonstrates another issue with federation: the voluntary nature of technical standards. Like e-mail, XMPP is federated to facilitate rendezvous of users from different systems - if they allow it.</t>
          <t>While some XMPP deployments do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can create the conditions necessary for a function to be decentralized, it does not guarantee that outcome.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to political and economic centralization. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid centralization by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show a significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that is through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That suggests a path for centralization, just of an indirect nature. For example, the Ethereum "merge" demonstrated that the blockchain could address environmental concerns, but only through coordinated community effort and governance. <xref target="ETHEREUM"/></t>
          <t>Furthermore, a protocol or an application can use distributed consensus for some functions, but still be centralized elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against uncritically relying upon these technologies to avoid or mitigate centralization.</t>
        </section>
        <section anchor="multi">
          <name>Operational Governance</name>
          <t>Sometimes technologists attempt to mitigate centralization by incorporating a governance mechanism into a protocol's operation. Often, this is through the establishment of a multi-stakeholder body: an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a “single source of truth” exhibits centralization. The associated risk is managed through administration by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To promote the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>These examples are notable in that the governance mechanism is not specified in the protocol documents directly; rather, they are layered on operationally, but in a manner that takes advantage of protocol design features that enable the imposition of governance.</t>
          <t>Governance in this manner is best suited to very limited functions, like the examples above. Even then, setup and ongoing operation of a governance mechanism is not trivial, and their legitimacy may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>); by their nature, they are vulnerable to capture by the interests that are being governed.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Can Internet Standards Do?</name>
      <t>Given the limits of decentralization techniques like federation and distributed consensus, the voluntary nature of standards compliance, and the powerful forces that can drive centralization, it is reasonable to ask what stanards efforts like those at the IETF can do to accommodate helpful centralization while avoiding the associated harms -- while acknowledging that the distinction itself is a judgement call, and inherently political.</t>
      <t>The subsections below suggest a few concrete, meaningful steps that standards bodies can take.</t>
      <section anchor="legitimate">
        <name>Bolster Legitimacy</name>
        <t>While technical standards have only limited ability to control political and economic centralization of the Internet, legal standards (whether regulation or legislation) show more promise. However, regulating the Internet is risky without a firm grounding in the effects on the architecture, informed by a technical viewpoint.</t>
        <t>That viewpoint can and should be provided by the Internet standards community. To effectively do so, its institutions must be seen as legitimate by the relevant parties -- for example, by competition regulators. In particular, if the IETF is perceived as representing or being controlled by "big tech" concerns, its ability to guide decisions that affect the Internet will be diminished considerably.</t>
        <t>The IETF already has features that arguably provide considerable legitimacy; for example, open participation and representation by individuals rather than companies both enhance input legitimacy; a well-defined process with multiple layers of appeals and transparency contributes to throughput legitimacy, and a long history of successful Internet standards provides perhaps the strongest source of legitimacy for the IETF -- its output.</t>
        <t>However, it is also widely recognized the considerable costs (not just financial) involved in successfully participating in the IETF have a tendency to favour larger companies over smaller concerns. Likewise, the specialised and highly technical nature of the work creates barriers to entry for non-technical stakeholders. These factors have the potential to reduce the legitimacy of the IETF's decisions, at least in some eyes.</t>
        <t>Efforts to address these shortcomings are ongoing; see, for example, <xref target="RFC8890"/>. Overall, bolstering the legitimacy of the organization should be seen as a continuous effort.</t>
        <t>When engaging in external efforts, the IETF community (in particular, its leadership) should keep firmly in mind that it is most authoritative when focused on technical and architectural impact. Straying from these topics will likely result in a loss of legitimacy that would likely be difficult to recover from.</t>
      </section>
      <section anchor="target">
        <name>Focus Discussion of Centralization</name>
        <t>Centralization and decentralization are increasingly being raised in technical standards discussions. Any claims needs to be critically evaluated; as discussed in <xref target="centralization"/>, not all centralization is automatically harmful, and per <xref target="decentralization"/>, decentralization techniques do not automatically address all centralization harms -- and they may bring their own risks.</t>
        <t>In particular, claims of centralization can be proxies for power struggles between actors with competing interests. A protocol that is deployed by a large, centralized service does not necessarily cause that centralization, but a competitor might use a claim of centralization to deny them the benefit of standardization.</t>
        <t>Therefore, approaches like requiring a "Centralization Considerations" section in drafts, gatekeeping publication on a centralization review, or committing significant resources to searching for centralization in protocols are unlikely to improve the Internet.</t>
        <t>Likewise, refusing to standardize a protocol because it does not actively prevent all forms of centralization ignores the very limited power that standards efforts have to do so. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- fail to do so. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these sources of centralization.</t>
        <t>When claims are made that a given proposal is "centralized" or "decentralized", the context of those statements should be examined for presuppositions, assumptions, and omissions. One framework for critical interrogations is offered by <xref target="BACCHI"/>, which can be adapted for centralization-related discussions:</t>
        <ol spacing="normal" type="1"><li>What is the nature of the (de)centralization that is represented as being problematic?</li>
          <li>What deep-seated presuppositions or assumptions (conceptual logics) underlie this representation of the "problem"?</li>
          <li>How has this representation of the problem come about?</li>
          <li>What is left unproblematic in this problem representation? Where are the silences? Can the "problem" be conceptualized differently?</li>
          <li>What effects are produced by this representation of the "problem"?</li>
          <li>How and where has this representation of the "problem" been produced, disseminated, and defended? How has it been and/or how can it be disrupted and replaced?</li>
        </ol>
        <t>Discussions should focus on whether claimed centralization is harmful or, if helpful, whether it is justified. Centralization is concerning when it is not broadly held to be necessary, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens the architectural features that make the Internet successful.</t>
        <t><xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When centralization is found, standards efforts should consider its relationship with architectural goals as they consider how and if it should be mitigated (if possible). In particular, attention should be paid to how effective standards (as a form of architectural control) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some centralization may be more effectively addressed through legal regulation. Thus, a standards effort balancing these concerns might bias towards privacy, after informed discussion.</t>
      </section>
      <section anchor="up">
        <name>Target Proprietary Functions</name>
        <t>Functions that are currently only available from proprietary providers are ripe for standardisation efforts. That might include large-scale protocols for existing proprietary functions (e.g., chat) as well as smaller efforts to improve interoperability and portability of specific features that are often used to users into a platform; for example, a format for lists of contacts in a social network.</t>
        <t>A common objection to this approach is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) were available for some time without being used in a federated manner by commercial social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and legal mandates for interoperability are increasingly discussed by policymakers as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, appetite for regulation presents an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>. That opportunity also presents a risk, however, if the resulting legal regulation is at odds with the Internet architecture.</t>
        <t>Successfully creating standards that work in concert with legal regulation presents many potential pitfalls, and will require improved and new capabilities (especially liaison), and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet’s architectural goals.</t>
      </section>
      <section anchor="balance">
        <name>Enable Switching</name>
        <t>To minimize centralization, specifications should have an explicit goal of facilitating users' switching between implementations and deployments of the functions they define or enable.</t>
        <t>One necessary condition for switching is the availability of alternatives; breadth and diversity of implementation and deployment are required. For example, if there is only a single implementation of a protocol, applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can be an issue in this regard if there are factors that make forking difficult (for example, the cost of maintaining that fork). <xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage diversity of implementation.</t>
        <t>The cost of substituting an alternative implementation or deployment by users is another important factor to consider. This includes minimizing the amount of time, resources, expertise, coordination, loss of functionality, and effort required to use a different provider or implementation -- with the implication that the standard needs to be functionally complete and specified precisely enough to allow substitution.</t>
        <t>These goals of completeness and diversity are sometimes in tension. If a standard becomes extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not enable easy switching, especially if proprietary extensions are necessary to complete it (see <xref target="evolution"/>).</t>
        <t>One objection to protocols that enable easy switching is that they reduce the incentives for implementation by commercial vendors. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are provided by a third party in communication. Adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function consolidated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by consolidating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, if that new party is able to make their participation "sticky" -- for example, by leveraging their position in the network to require use of an intermediary, by exploiting their access to data, or by making it difficult to switch to another provider of the function -- there is a risk of centralization.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. Designing such functions with thoughtful constraints on these roles can prevent at least the most egregious abuses of such power.</t>
        <t>When adding new parties to communication into a protocol, two techniques have proven useful: first, third parties should only be interposed into communication when at least one of the primary parties takes a positive action to do so. Second, these parties should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint, and they only have access to basic routing information.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
        <section anchor="network">
          <name>Enforce Layer Boundaries</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" functions and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, application-layer protocols require a network to function, and therefore a degree of power over communication is available to the network provider. They might block access to, slow down, or change the content of a specific service for financial, political, operational, or criminal reasons, creating a disincentive (or even removing the ability) to use a specific provider of a function. By selectively hindering the use of some services but not others, network interventions can be composed to create pressure to use those other services -- intentionally or not.</t>
          <t>Techniques like encryption can discourage such centralization by enforcing layer boundaries. When the number of parties who have access to the content of communication is limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other users' traffic.</t>
        </section>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility Carefully</name>
        <t>The Internet's ability to evolve is critical, allowing it to meet new requirements and adapt to new conditions without requiring a “flag day” to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be leveraged by a powerful entity if they can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a “framework” where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
      <section anchor="conclude">
        <name>Future Work</name>
        <t>This document has argued that while standards bodies have little means of effectively controlling or preventing centralization on the Internet, there are still concrete and useful steps they can take to improve the Internet in this regard.</t>
        <t>Those steps might be elaborated upon and extended in future work; doubtless there is more that can be done. New decentralization techniques might be identified and examined; what we learn from relationships with other, more effective regulators in this space can be documented.</t>
        <t>Some have suggested creating a how-to guide or checklist for dealing with centralization. Because centralization is so contextual and so varied in how it manifests, this might best be attempted within very limited areas; for example, for a particular type of function, or a function at a particular layer.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. However, failure to consider centralization might cause a myriad of security issues; see <xref target="why"/> for a preliminary discussion.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="BARAN"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="JUDGE"/>
    <displayreference target="INTERDEPENDENCE" to="FARRELL"/>
    <displayreference target="MULTISTAKEHOLDER" to="PALLADINO"/>
    <displayreference target="NEW-CHICAGO" to="LESSIG"/>
    <displayreference target="POLYCENTRIC" to="ALIGIA"/>
    <displayreference target="ACCESS" to="ABRAHAMSON"/>
    <displayreference target="MIX" to="CHAUM"/>
    <displayreference target="FEDERALIST-51" to="MADISON"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="CHRISTENSEN"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="SPULBER"/>
    <displayreference target="AMBITION" to="SCHNEIDERb"/>
    <displayreference target="PERSPECTIVE" to="BODO"/>
    <displayreference target="STRUCTURELESS" to="FREEMAN"/>
    <displayreference target="SCHNEIDER" to="SCHNEIDERa"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
            <organization/>
          </author>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
            <organization/>
          </author>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-0491.2011.01550.x">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="ACCESS" target="https://www.yalelawjournal.org/comment/essential-data">
        <front>
          <title>Essential Data</title>
          <author initials="Z." surname="Abrahamson" fullname="Zachary Abrahamson">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>Yale Law Journal, Vol. 124, No. 3</refcontent>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="AREWEDECENTRALIZEDYET" target="https://bitcoinera.app/arewedecentralizedyet/">
        <front>
          <title>Are We Decentralized Yet?</title>
          <author>
            <organization>bitcoinera</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="ETHEREUM" target="https://ethereum.org/en/upgrades/merge/">
        <front>
          <title>The Merge</title>
          <author>
            <organization>Ethereum</organization>
          </author>
          <date year="2023" month="February"/>
        </front>
      </reference>
      <reference anchor="FB-INTERNET" target="https://slate.com/technology/2021/08/facebook-internet-regulation.html">
        <front>
          <title>Regulators Seem to Think That Facebook Is the Internet</title>
          <author initials="K." surname="Komaitis" fullname="Konstantinos Komaitis">
            <organization/>
          </author>
          <date year="2021" month="August"/>
        </front>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <author fullname="T. Verma" initials="T." surname="Verma">
            <organization/>
          </author>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <?line 547?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document was born out of early discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Special thanks to Geoff Huston and Milton Mueller for their well-considered, thoughtful, and helpful comments.</t>
      <t>Thanks also to Jari Arkko, Kristin Berdan, Christian Huitema, Mallory Knodel, Eliot Lear, John Levine, Tommy Pauly, and Martin Thomson for their comments and suggestions.</t>
      <t>No large language models were used in the production of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
