<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-11" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="Internet Centralization and Standards">Centralization, Decentralization, and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-11"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <?line 276?>

<t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that while standards bodies have little ability to prevent many forms of centralization, they can still make contributions that improve the Internet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 281?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>One of the Internet's defining features is its lack of any single point of technical, political, or economic control. Arguably, that property assisted the Internet's early adoption and broad reach: because permission is not required to connect to, deploy an application on, or use the Internet for a particular purpose, it can meet diverse needs and be deployed in many different environments.</t>
      <t>Although maintaining that state of affairs remains a widely shared goal, consistently preserving it across the range of services and applications that people see as "the Internet" has proven elusive. Whereas early services like NNTP and email had multiple, interoperable operators, most contemporary platforms for content and services are operated by single, commercial entities -- to the point where some have become so well-known and important to people's experiences that they are commonly mistaken for the Internet itself.<xref target="FB-INTERNET"/></t>
      <t>These difficulties call into question what role architectural design -- in particular, that overseen by open standards bodies such as the IETF -- can and should play in controlling centralization on the Internet.</t>
      <t>This document argues that while decentralized technical standards may be necessary to avoid centralization of Internet functions, they are not sufficient to achieve that goal because centralization is often caused by non-technical factors outside their control. That said, there are still meaningful contributions that standards bodies can make, such as assisting those who have similar goals and greater ability to control those factors.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. Designers of proprietary protocols and applications can benefit from considering these issues, especially if they intend their work to be considered for eventual standardization. Policymakers can use this document to help characterise abuses that involve centralized protocols and applications and evaluate proposed remedies for them.</t>
      <t><xref target="centralization"/> defines centralization, explains why it is often undesirable but sometimes beneficial, and surveys how it occurs on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant strategies, along with their limitations. Then, <xref target="considerations"/> makes recommendations about the role that Internet standards can play in controlling centralization. <xref target="conclude"/> concludes by identifying areas for future work.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization</name>
      <t>For the purposes of this document, "centralization" is the state of affairs where a single entity or a small group of them can observe, capture, control, or extract rent from the operation or use of an Internet function exclusively.</t>
      <t>Here, "entity" could be a person, group, or corporation. An organization might be subject to governance that mitigates centralization risk (see <xref target="multi"/>), but that organisation is still a centralizing entity.</t>
      <t>"Internet function" is used broadly in this document. Most directly, it might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>Because people's experiences are not limited to standards-defined protocols and applications, this document also considers centralization in functions built on top of standards -- for example, social networking, file sharing, financial services, and news dissemination. Likewise, the networking equipment, hardware, operating systems, and software that act as enabling technologies can also impact centralization. The supply of Internet connectivity to end users in a particular area or situation can exhibit centralization, as can the supply of transit between networks (so called "Tier 1" networks).</t>
      <t>This definition does not capture all types of centralization. Notably, technical centralization (where, for example, a machine or network link is a single point of failure) is relatively well-understood by engineers, and can be mitigated by designing a design that distributes a function across multiple components. As we will see, these techniques might address that type of centralization while failing to prevent control of the function falling into few hands. A failure because of a cut cable, power outage, or failed server is well-understood by the technical community, but qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
      <t>Likewise, political centralization (where a country is able to control how a function is supplied across the whole Internet) is equally concerning, but not considered in depth here.</t>
      <t>Even when centralization is not currently present in a function, some conditions make it more likely that centralization will emerge in the future. This document uses "centralization risk" to characterise that possibility.</t>
      <section anchor="why">
        <name>Centralization Can Be Harmful</name>
        <t>Many engineers who participate in Internet standards efforts have an inclination to prevent and counteract centralization because they see the Internet's history and architecture as incompatible with it. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks" who relate as peers who agree to facilitate communication, rather than experiencing coercion or requiring subservience to others' requirements. This focus on independence of action is prevalent in the Internet's design -- for example, in the concept of an "autonomous system".</t>
        <t>This reluctance to countenance centralization is also rooted in the many potentially damaging effects that have been associated with centralization, including:</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power (whether that be economic or political) not be consolidated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: A party with the ability to control communication can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a centralized service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which facilitates abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large centralized provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a centralized provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in functions' implementation leads to a more robust outcome when viewed systemically, because "progress is the outcome of a trial-and-error evolutionary process of many agents interacting freely." <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>The relationship between these harms and centralization is often complex; it is not always the case that centralization will lead to them, and when it does, there is not always a direct and simple tradeoff.</t>
        <t>For example, consider the impact of centralization upon availability. A centrally operated system might be more available because of factors like the resources available to a larger operator, but also have greater impact when a fault is encountered; decentralized systems might be more resilient in the face of local failures, but less able to react to systemic issues.</t>
        <t>This tension can be seen in areas like the cloud and mobile Internet access. If a popular cloud hosting provider were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted (especially due to the multiple dependencies that a modern Web site often has; see <xref target="DEPENDENCIES"/>). Likewise, a large mobile Internet access provider might have an outage that affects hundreds of thousands of its users, or more -- just as previous issues at large telephone companies precipitated widespread outages. <xref target="PHONE"/></t>
        <t>In both cases, the services are not technically centralized; these operators have strong incentives to have multiple redundancies in place and use various techniques to mitigate the risk of any one component failing. However, they generally do rely upon a single codebase, a limited selection of hardware, a unified control plane, and a uniform administrative practice -- each of which might precipitate a widespread failure.</t>
        <t>If there were only one provider for these services (like the telephone networks of old), they would easily be considered as centralized. However, many cloud providers offer similar services, and in most places there are multiple mobile operators available. That weakens the argument that there is a strong link between centralization and their availability, because the function's users can switch to other providers, or use more than one provider simultaneously.</t>
        <t>These circumstances suggest one area of inquiry when considering the relationship between centralization and availability of a given function: what barriers are there to switching to other providers (thereby making any disruptions temporary and manageable) or to using multiple providers simultaneously (to mask the failure of a single operator)?</t>
        <t>Another example of the need for nuance can be seen when evaluating competitive constraints. While making the Internet more competitive may be a motivation for many engineers, only courts (and sometimes, regulators) have the authority to define a relevant market and determine that a behavior is anti-competitive. What might be considered undesirable centralization by the technical community might not attract competition regulation. Conversely, what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
      </section>
      <section anchor="necessary">
        <name>Centralization Can Be Helpful</name>
        <t>The potential harms of centralization listed above are widely appreciated. Less widely explored is the reliance on centralization by some protocols and applications to deliver their functionality.</t>
        <t>Often, centralization is present due to technical necessity. For example, a single, globally coordinated “source of truth” is by nature centralized -- such as in the root zone of the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
        <t>Or, consider IP address allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company were to capture the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the Web's trust model requires a Certificate Authority to serve as the root of trust for communication between browsers and servers, bringing centralization risk that needs to be considered in the design of that system.</t>
        <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also require centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function is centralized.</t>
        <t>Even when not strictly necessary, centralization can be deployed to beneficial ends. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries – including governments, corporations, and nonprofit organizations – have done so in no small part because of the intentional design that went into those structures."</t>
        <t>This can be seen when a function requires governance to realize common goals and protect minority interests. For example, content moderation functions impose community values, but can also be viewed as a choke point. Likewise, complex and risky functions like financial services (e.g., credit card processing) can be seen as beneficially centralized into relatively few, specialized organizations, where they can receive the focused attention that they require.</t>
        <t>When centralization is purposefully used like this, Internet protocol designers often attempt to mitigate the associated risks using technical measures such as federation (see <xref target="federation"/>) and governance structures (see <xref target="multi"/>). Protocols that successfully do so are often reused to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, incorporating the Domain Name System is usually preferable to establishing a new system.</t>
        <t>Ultimately, deciding when centralization is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient.</t>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, Baran gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required." <xref target="RAND"/></t>
      <t>Avoiding technical centralization -- while not a trivial topic -- is relatively well understood. Avoiding all forms of centralization using only technical tools (like protocol design) is considerably more difficult. Several issues are encountered.</t>
      <t>First and most critically, technical decentralization measures have at best limited effects on non-technical forms of centralization. As explored below in <xref target="techniques"/>, technical measures are better characterised as necessary but insufficient to achieve full decentralization of a function.</t>
      <t>Second, identifying which aspects of a function to decentralize can be difficult, both because there are often many interactions between different types and sources of centralization, and because centralization sometimes only becomes clear after the function is deployed at scale.</t>
      <t>Indeed, efforts to decentralize often have the effect of merely shifting centralization to a different place -- for example, in its governance, implementation, deployment, or in ancillary functions. In other words, "decentralized technology alone does not guarantee decentralized outcomes." <xref target="SCHNEIDER"/></t>
      <t>For example, the Web was envisioned and widely held to be a decentralizing force in its early life. Its potential as an enabler of centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Third, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as centralization is a continuum, so is decentralization, and not everyone agrees what the "right" level or type is, how to weigh different forms of centralization against each other, or how to weigh potential centralization against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While much of the system is decentralized through the distribution of the lookup function to local servers that users have the option to override, the DNS is also a name space -- a single, global "source of truth" with inherent (if beneficial) centralization in its management. ICANN mitigates the associated risk through multi-stakeholder governance (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than human governance. <xref target="MUSIANI"/></t>
      <t>Fourth, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when it opens up the possibility of centralization elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, more bluntly, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets." <xref target="PERSPECTIVE"/></t>
      <t>For example, while blockchain-based cryptocurrencies purport to address the centralization inherent in traditional currencies through technical means, many exhibit considerable concentration of power due to voting/mining power, distribution of funds, and diversity of codebase. <xref target="BITCOIN"/> Over-reliance on technical measures also brings an opportunity for latent, informal power structures that have their own risks -- including centralization. <xref target="STRUCTURELESS"/></t>
      <t>Fifth, a decentralized function can be more difficult to adapt to user needs (for example, introducing new features, or experimenting with user interface), because doing so often requires coordination between many different actors. In some caes, it also can reduce the economic incentives for service providers, which creates adoption challenges. <xref target="MOXIE"/></t>
      <t>Overall, decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. If one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Strategies</name>
        <t>Despite the inherent issues in achieving decentralization through solely technical means, a few technical strategies are sometimes promoted as addressing other forms of centralization. This section examines some, along with their limitations.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>Protocol designers often attempt to address centralization through federation: designing a function in a way that uses independent instances who maintain connectivity and interoperability to provide a single, cohesive service. Federation promises to allow users to choose the instance they associate with and accommodates substitution of one instance for another, lowering switching costs.</t>
          <t>However, federation alone is insufficient to prevent or mitigate centralization of a function, because non-technical factors can create pressure to use a central solution.</t>
          <t>For example, the e-mail suite of protocols needs to route messages to a user even when that user changes network locations or becomes disconnected for a long period. To facilitate this, SMTP <xref target="RFC5321"/> defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol avoids the use of a single, central server. Users can (and often do) choose to delegate that role to someone else, or can run their own MTA.</t>
          <t>Despite this design, e-mail exhibits a degree of centralization. Part of the reason is a side effect of spam controls; many now consider running a personal MTA to be impractical because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such -- creating pressure towards centralization.</t>
          <t>XMPP <xref target="RFC6120"/> is a chat protocol that demonstrates another issue with federation: the voluntary nature of technical standards. Like e-mail, XMPP is federated to facilitate rendezvous of users from different systems - if they allow it.</t>
          <t>While some XMPP deployments do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can create the conditions necessary for a function to be decentralized, it does not guarantee that outcome.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to centralization. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid centralization by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show a significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that is through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That suggests a path for centralization, just of an indirect nature. For example, the Ethereum "merge" demonstrated that the blockchain could address environmental concerns, but only through coordinated community effort and governance. <xref target="ETHEREUM"/></t>
          <t>Furthermore, a protocol or an application can use distributed consensus for some functions, but still be centralized elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance, but they do merit caution against uncritically relying upon these technologies to avoid or mitigate centralization.</t>
        </section>
        <section anchor="multi">
          <name>Operational Governance</name>
          <t>Sometimes technologists attempt to mitigate centralization by incorporating a governance mechanism into a protocol's operation. Often, this is through the establishment of a multi-stakeholder body: an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a “single source of truth” exhibits centralization. The associated risk is managed through administration by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To promote the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>These examples are notable in that the governance mechanism is not specified in the protocol documents directly; rather, they are layered on operationally, but in a manner that takes advantage of protocol features that enable the imposition of governance.</t>
          <t>Governance in this manner is best suited to very limited functions, like the examples above. Even then, setup and ongoing operation of a governance mechanism is not trivial, and their legitimacy may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>); by their nature, they are vulnerable to capture by the interests that are being governed.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Can Internet Standards Do?</name>
      <t>Given the limits of decentralization techniques like federation and distributed consensus, the voluntary nature of standards compliance, and the powerful forces that can drive centralization, it is reasonable to ask what standards efforts like those at the IETF can do to accommodate helpful centralization while avoiding the associated harms -- while acknowledging that the distinction itself is a judgment call, and inherently political.</t>
      <t>The subsections below suggest a few concrete, meaningful steps that standards bodies can take.</t>
      <section anchor="legitimate">
        <name>Bolster Legitimacy</name>
        <t>Where technical standards have only limited ability to control centralization of the Internet, legal standards (whether regulation, legislation, or case law) show more promise, and are actively being considered and implemented in various jurisdictions. However, regulating the Internet is risky without a firm grounding in the effects on the architecture, informed by a technical viewpoint.</t>
        <t>That viewpoint can and should be provided by the Internet standards community. To effectively do so, its institutions must be seen as legitimate by the relevant parties -- for example, competition regulators. If the IETF is perceived as representing or being controlled by "big tech" concerns, its ability to guide decisions that affect the Internet will be diminished considerably.</t>
        <t>The IETF already has features that arguably provide considerable legitimacy; for example, open participation and representation by individuals rather than companies both enhance input legitimacy; a well-defined process with multiple layers of appeals and transparency contributes to throughput legitimacy, and a long history of successful Internet standards provides perhaps the strongest source of legitimacy for the IETF -- its output.</t>
        <t>However, it is also widely recognized the considerable costs (not just financial) involved in successfully participating in the IETF have a tendency to favour larger companies over smaller concerns. Additionally, the specialised and highly technical nature of the work creates barriers to entry for non-technical stakeholders. These factors have the potential to reduce the legitimacy of the IETF's decisions, at least in some eyes.</t>
        <t>Efforts to address these shortcomings are ongoing; see, for example, <xref target="RFC8890"/>. Overall, bolstering the legitimacy of the organization should be seen as a continuous effort.</t>
        <t>When engaging in external efforts, the IETF community (especially, its leadership) should keep firmly in mind that it is most authoritative when focused on technical and architectural impact. Straying from these topics will likely result in a loss of legitimacy that would likely be difficult to recover from.</t>
      </section>
      <section anchor="target">
        <name>Focus Discussion of Centralization</name>
        <t>Centralization and decentralization are increasingly being raised in technical standards discussions. Any claims needs to be critically evaluated; as discussed in <xref target="centralization"/>, not all centralization is automatically harmful, and per <xref target="decentralization"/>, decentralization techniques do not automatically address all centralization harms -- and they may bring their own risks.</t>
        <t>Claims of centralization can be proxies for power struggles between actors with competing interests. A protocol that is deployed by a large, centralized service does not necessarily cause that centralization, but a competitor might use a claim of centralization to deny them the benefit of standardization.</t>
        <t>Therefore, approaches like requiring a "Centralization Considerations" section in drafts, gatekeeping publication on a centralization review, or committing significant resources to searching for centralization in protocols are unlikely to improve the Internet.</t>
        <t>Refusing to standardize a protocol because it does not actively prevent all forms of centralization ignores the very limited power that standards efforts have to do so. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- fail to do so. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these sources of centralization.</t>
        <t>When claims are made that a given proposal is "centralized" or "decentralized", the context of those statements should be examined for presuppositions, assumptions, and omissions. One framework for critical interrogations is offered by <xref target="BACCHI"/>, which can be adapted for centralization-related discussions:</t>
        <ol spacing="normal" type="1"><li>What is the nature of the (de)centralization that is represented as being problematic?</li>
          <li>What deep-seated presuppositions or assumptions (conceptual logics) underlie this representation of the "problem"?</li>
          <li>How has this representation of the problem come about?</li>
          <li>What is left unproblematic in this problem representation? Where are the silences? Can the "problem" be conceptualized differently?</li>
          <li>What effects are produced by this representation of the "problem"?</li>
          <li>How and where has this representation of the "problem" been produced, disseminated, and defended? How has it been and/or how can it be disrupted and replaced?</li>
        </ol>
        <t>Discussions should focus on whether claimed centralization is harmful or, if helpful, whether it is justified. Centralization is most concerning when it is not broadly held to be necessary, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens the architectural features that make the Internet successful.</t>
        <t><xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When centralization is found, standards efforts should consider its relationship with architectural goals as they consider how and if it should be mitigated (if possible). In particular, attention should be paid to how effective standards (as a form of architectural control) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely, some centralization may be more effectively addressed through legal regulation. Thus, a standards effort balancing these concerns might bias towards privacy, after informed discussion.</t>
      </section>
      <section anchor="up">
        <name>Target Proprietary Functions</name>
        <t>Functions that are currently only available from proprietary providers are ripe for standardisation efforts. That might include large-scale protocols for existing proprietary functions (e.g., chat) as well as smaller efforts to improve interoperability and portability of specific features that are often used to users into a platform; for example, a format for lists of contacts in a social network.</t>
        <t>A common objection to this approach is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) were available for some time without being used in a federated manner by commercial social networking providers.</t>
        <t>That objection ignores that while standards aren't mandatory, legal regulation is, and legal mandates for interoperability are increasingly discussed by policymakers as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, appetite for regulation presents an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>. That opportunity also presents a risk, if the resulting legal regulation is at odds with the Internet architecture.</t>
        <t>Successfully creating standards that work in concert with legal regulation presents many potential pitfalls, and will require improved and new capabilities (especially liaison), and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet’s architectural goals.</t>
      </section>
      <section anchor="balance">
        <name>Enable Switching</name>
        <t>To minimize centralization, specifications should have an explicit goal of facilitating users' switching between implementations and deployments of the functions they define or enable.</t>
        <t>One necessary condition for switching is the availability of alternatives; breadth and diversity of implementation and deployment are required. For example, if there is only a single implementation of a protocol, applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can be an issue in this regard if there are factors that make forking difficult (for example, the cost of maintaining that fork). <xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage diversity of implementation.</t>
        <t>The cost of substituting an alternative implementation or deployment by users is another important factor to consider. This includes minimizing the amount of time, resources, expertise, coordination, loss of functionality, and effort required to use a different provider or implementation -- with the implication that the standard needs to be functionally complete and specified precisely enough to allow substitution.</t>
        <t>These goals of completeness and diversity are sometimes in tension. If a standard becomes extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not enable easy switching, especially if proprietary extensions are necessary to complete it (see <xref target="evolution"/>).</t>
        <t>One objection to protocols that enable easy switching is that they reduce the incentives for implementation by commercial vendors. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are provided by a third party in communication. Adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function consolidated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by consolidating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, if that new party is able to make their participation "sticky" -- for example, by leveraging their position in the network to require use of an intermediary, by exploiting their access to data, or by making it difficult to switch to another provider of the function -- there is a risk of centralization.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. Designing such functions with thoughtful constraints on these roles can prevent at least the most egregious abuses of such power.</t>
        <t>When adding new parties to communication into a protocol, two guidelines have proven useful: first, third parties should only be interposed into communication when at least one of the primary parties takes a positive action to do so. Second, these parties should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint, and they only have access to basic routing information.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
        <section anchor="network">
          <name>Enforce Layer Boundaries</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" functions and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, application-layer protocols require a network to function, and therefore a degree of power over communication is available to the network provider. They might block access to, slow down, or change the content of a specific service for financial, political, operational, or criminal reasons, creating a disincentive (or even removing the ability) to use a specific provider of a function. By selectively hindering the use of some services but not others, network interventions can be composed to create pressure to use those other services -- intentionally or not.</t>
          <t>Techniques like encryption can discourage such centralization by enforcing layer boundaries. When the number of parties who have access to the content of communication is limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other users' traffic.</t>
        </section>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility Carefully</name>
        <t>The Internet's ability to evolve is critical, allowing it to meet new requirements and adapt to new conditions without requiring a “flag day” to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be leveraged by a powerful entity if they can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a “framework” where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
    </section>
    <section anchor="conclude">
      <name>Future Work</name>
      <t>This document has argued that while standards bodies have little means of effectively controlling or preventing centralization on the Internet through protocol design, there are still concrete and useful steps they can take to improve the Internet.</t>
      <t>Those steps might be elaborated upon and extended in future work; doubtless there is more that can be done. New decentralization techniques might be identified and examined; what we learn from relationships with other, more effective regulators in this space can be documented.</t>
      <t>Some have suggested creating a how-to guide or checklist for dealing with centralization. Because centralization is so contextual and so varied in how it manifests, this might best be attempted within very limited areas; for example, for a particular type of function, or a function at a particular layer.</t>
      <t>The nature of centralization also deserves further study; in particular, its causes. While there is much commentary on factors like network effects and switching costs, other aspects such as behavioural, cognitive, and social factors have received comparatively little attention, although that is changing (e.g., <xref target="BEHAVIOUR"/>).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. That said, failure to consider centralization might cause a myriad of security issues; see <xref target="why"/> for a preliminary discussion.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="BARAN"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="JUDGE"/>
    <displayreference target="INTERDEPENDENCE" to="FARRELL"/>
    <displayreference target="MULTISTAKEHOLDER" to="PALLADINO"/>
    <displayreference target="NEW-CHICAGO" to="LESSIG"/>
    <displayreference target="POLYCENTRIC" to="ALIGIA"/>
    <displayreference target="ACCESS" to="ABRAHAMSON"/>
    <displayreference target="MIX" to="CHAUM"/>
    <displayreference target="FEDERALIST-51" to="MADISON"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="CHRISTENSEN"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="SPULBER"/>
    <displayreference target="AMBITION" to="SCHNEIDERb"/>
    <displayreference target="BITCOIN" to="Makarov"/>
    <displayreference target="PERSPECTIVE" to="BODO"/>
    <displayreference target="STRUCTURELESS" to="FREEMAN"/>
    <displayreference target="SCHNEIDER" to="SCHNEIDERa"/>
    <displayreference target="DEPENDENCIES" to="Kashaf"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-0491.2011.01550.x">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="ACCESS" target="https://www.yalelawjournal.org/comment/essential-data">
        <front>
          <title>Essential Data</title>
          <author initials="Z." surname="Abrahamson" fullname="Zachary Abrahamson">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>Yale Law Journal, Vol. 124, No. 3</refcontent>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="BITCOIN" target="https://www.nber.org/papers/w29396">
        <front>
          <title>Blockchain Analysis of the Bitcoin Market</title>
          <author initials="I." surname="Makarov" fullname="Igor Makarov">
            <organization>London School of Economics</organization>
          </author>
          <author initials="A." surname="Schoar" fullname="Antoinette Schoar">
            <organization>MIT Sloan School of Management</organization>
          </author>
          <date year="2021" month="October"/>
        </front>
        <refcontent>National Bureau of Economic Research, Working Paper 29396</refcontent>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="ETHEREUM" target="https://ethereum.org/en/upgrades/merge/">
        <front>
          <title>The Merge</title>
          <author>
            <organization>Ethereum</organization>
          </author>
          <date year="2023" month="February"/>
        </front>
      </reference>
      <reference anchor="FB-INTERNET" target="https://slate.com/technology/2021/08/facebook-internet-regulation.html">
        <front>
          <title>Regulators Seem to Think That Facebook Is the Internet</title>
          <author initials="K." surname="Komaitis" fullname="Konstantinos Komaitis">
            <organization/>
          </author>
          <date year="2021" month="August"/>
        </front>
      </reference>
      <reference anchor="DEPENDENCIES" target="https://dl.acm.org/doi/pdf/10.1145/3419394.3423664">
        <front>
          <title>Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?</title>
          <author initials="A." surname="Kashaf" fullname="Aqsa Kashaf">
            <organization>Carnegie Mellon University</organization>
          </author>
          <author initials="V." surname="Sekar" fullname="Vyas Sekar">
            <organization>Carnegie Mellon University</organization>
          </author>
          <author initials="Y." surname="Agarwal" fullname="Yuvraj Agarwal">
            <organization>Carnegie Mellon University</organization>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="PHONE" target="https://www.washingtonpost.com/archive/politics/1991/06/27/computer-failure-paralyzes-regions-phone-service/0db94ac7-89f0-446e-ba33-c126c751b251/">
        <front>
          <title>Computer Failure Paralyzes Region's Phone Service</title>
          <author>
            <organization/>
          </author>
          <date year="1991" month="June"/>
        </front>
      </reference>
      <reference anchor="BEHAVIOUR" target="http://dx.doi.org/10.2139/ssrn.4389681">
        <front>
          <title>The Role of Behavioural Economics in Competition Policy</title>
          <author initials="A." surname="Fletcher" fullname="Amelia Fletcher">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel"/>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
          <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel"/>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users.  It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success.  Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="T. Verma" initials="T." surname="Verma"/>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <?line 586?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document was born out of early discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Special thanks to Geoff Huston and Milton Mueller for their well-considered, thoughtful, and helpful comments.</t>
      <t>Thanks also to Jari Arkko, Kristin Berdan, Christian Huitema, Mallory Knodel, Eliot Lear, John Levine, Tommy Pauly, and Martin Thomson for their comments and suggestions.</t>
      <t>No large language models were used in the production of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
