rfc9707.original | rfc9707.txt | |||
---|---|---|---|---|
Network Working Group M. Kühlewind | Internet Architecture Board (IAB) M. Kühlewind | |||
Internet-Draft | Request for Comments: 9707 | |||
Intended status: Informational D. Dhody | Category: Informational D. Dhody | |||
Expires: 22 December 2024 | ISSN: 2070-1721 | |||
M. Knodel | M. Knodel | |||
20 June 2024 | December 2024 | |||
IAB Barriers to Internet Access of Services (BIAS) Workshop Report | Report from the IAB Workshop on Barriers to Internet Access of Services | |||
draft-iab-bias-workshop-report-02 | (BIAS) | |||
Abstract | Abstract | |||
The "Barriers for Internet Access of Services (BIAS)" workshop was | The "Barriers to Internet Access of Services (BIAS)" workshop was | |||
convened by the Internet Architecture Board (IAB) from January 15-17, | convened by the Internet Architecture Board (IAB) from January 15-17, | |||
2024 as a three-day online meeting. Based on the submitted position | 2024 as a three-day online meeting. Based on the submitted position | |||
papers, the workshop covered three areas of interest: the role of | papers, the workshop covered three areas of interest: the role of | |||
community networks in Internet Access of Services; reports and | Community Networks in Internet access of services, reports and | |||
comments on the observed digital divide; and measurements of | comments on the observed digital divide, and measurements of | |||
censorship and censorship circumvention. This report summarizes the | censorship and censorship circumvention. This report summarizes the | |||
workshop's discussion and serves as a reference for reports on the | workshop's discussions and serves as a reference for reports on the | |||
current barriers to Internet Access. | current barriers to Internet access. | |||
Note that this document is a report on the proceedings of the | Note that this document is a report on the proceedings of the | |||
workshop. The views and positions documented in this report were | workshop. The views and positions documented in this report were | |||
expressed during the workshop by participants and do not necessarily | expressed during the workshop by participants and do not necessarily | |||
reflect IAB's views and positions. | reflect the IAB's views and positions. | |||
About This Document | ||||
This note is to be removed before publishing as an RFC. | ||||
The latest revision of this draft can be found at | ||||
https://intarchboard.github.io/draft-iab-bias-workshop-report/draft- | ||||
iab-bias-workshop-report.html. Status information for this document | ||||
may be found at https://datatracker.ietf.org/doc/draft-iab-bias- | ||||
workshop-report/. | ||||
Source for this draft and an issue tracker can be found at | ||||
https://github.com/intarchboard/draft-iab-bias-workshop-report. | ||||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Architecture Board (IAB) | |||
and may be updated, replaced, or obsoleted by other documents at any | and represents information that the IAB has deemed valuable to | |||
time. It is inappropriate to use Internet-Drafts as reference | provide for permanent record. It represents the consensus of the | |||
material or to cite them other than as "work in progress." | Internet Architecture Board (IAB). Documents approved for | |||
publication by the IAB are not candidates for any level of Internet | ||||
Standard; see Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on 22 December 2024. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9707. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2024 IETF Trust and the persons identified as the | Copyright (c) 2024 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. | carefully, as they describe your rights and restrictions with respect | |||
to this document. | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
1.1. About this workshop report content . . . . . . . . . . . 3 | 1.1. About the Content of This Workshop Report | |||
2. Workshop Scope and Discussion . . . . . . . . . . . . . . . . 4 | 2. Workshop Scope and Discussion | |||
2.1. Session 1: Community Networks - Their Role in Internet | 2.1. Session 1: Community Networks - Their Role in Internet | |||
Access of Services . . . . . . . . . . . . . . . . . . . 4 | Access of Services | |||
2.1.1. The Quality of Community Networks . . . . . . . . . . 4 | 2.1.1. The Quality of Community Networks | |||
2.1.2. Strengthening Community Networks . . . . . . . . . . 5 | 2.1.2. Strengthening Community Networks | |||
2.1.3. Discussion . . . . . . . . . . . . . . . . . . . . . 5 | 2.1.3. Discussion | |||
2.2. Session 2: Digital Divide - Reports and Comments . . . . 6 | 2.2. Session 2: Digital Divide - Reports and Comments | |||
2.2.1. Disparities in service provision . . . . . . . . . . 6 | 2.2.1. Disparities in Service Provisioning | |||
2.2.2. Lack of consistent acceptance of language scripts . . 7 | 2.2.2. Lack of Consistent Acceptance of Language Scripts | |||
2.2.3. Web Affordability and Inclusiveness . . . . . . . . . 7 | 2.2.3. Web Affordability and Inclusiveness | |||
2.2.4. Discussion . . . . . . . . . . . . . . . . . . . . . 7 | 2.2.4. Discussion | |||
2.3. Session 3: Censorship - Reports and Circumvention . . . . 8 | 2.3. Session 3: Censorship - Reports and Circumvention | |||
2.3.1. Censorship Orders, Measurements, and Device | 2.3.1. Censorship Orders, Measurements, and Device Analysis | |||
Analysis . . . . . . . . . . . . . . . . . . . . . . 8 | 2.3.2. Use of VPNs for Censorship Circumventions and User | |||
2.3.2. Use of VPNs for Censorship Circumvents and User | Expectations | |||
Expectations . . . . . . . . . . . . . . . . . . . . 10 | 2.3.3. Discussion | |||
2.3.3. Discussion . . . . . . . . . . . . . . . . . . . . . 10 | 2.4. Key Takeaways | |||
2.4. Key Take Aways . . . . . . . . . . . . . . . . . . . . . 10 | 3. IANA Considerations | |||
3. Informative References . . . . . . . . . . . . . . . . . . . 11 | 4. Security Considerations | |||
Appendix A. Position Papers . . . . . . . . . . . . . . . . . . 13 | 5. Informative References | |||
Appendix B. Workshop Participants . . . . . . . . . . . . . . . 15 | Appendix A. Position Papers | |||
Appendix C. Workshop Program Committee . . . . . . . . . . . . . 15 | Appendix B. Workshop Participants | |||
IAB Members at the Time of Approval . . . . . . . . . . . . . . . 15 | Appendix C. Workshop Program Committee | |||
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 15 | IAB Members at the Time of Approval | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15 | Acknowledgments | |||
Authors' Addresses | ||||
1. Introduction | 1. Introduction | |||
The Internet Architecture Board (IAB) holds occasional workshops | ||||
designed to consider long-term issues and strategies for the | ||||
Internet, and to suggest future directions for the Internet | ||||
architecture. This long-term planning function of the IAB is | ||||
complementary to the ongoing engineering efforts performed by working | ||||
groups of the Internet Engineering Task Force (IETF). | ||||
The Internet as part of the critical infrastructure affects many | The Internet as part of the critical infrastructure affects many | |||
aspects of our society significantly, although it impacts different | aspects of our society significantly, although it impacts different | |||
parts of society differently. The Internet is an important tool to | parts of society differently. The Internet is an important tool for | |||
reach the Sustainable Development Goals (SDG) [SDG] and to globally | reaching the Sustainable Development Goals (SDGs) listed in [SDGs] | |||
support human rights. Consequently, the lack of meaningful access to | and for globally supporting human rights. Consequently, the lack of | |||
digital infrastructure and services is also a form of | meaningful access to digital infrastructure and services is also a | |||
disenfranchisement. | form of disenfranchisement. | |||
Solely having Internet access is not enough. At the same time as we | Solely having Internet access is not enough. At the same time as we | |||
work to connect the next billion people and reduce the digital | work to connect the next billion people and reduce the digital | |||
divide, it is also important to understand persistent and novel | divide, it is also important to understand persistent and novel | |||
inequalities in the digital age when accessing content and services. | inequalities in the digital age when accessing content and services. | |||
There are more and more barriers to meaningful access to the services | There are more and more barriers to meaningful access to the services | |||
and applications that run on the Internet. Even if Internet | and applications that run on the Internet. Even if Internet | |||
connectivity is available, information and service access may remain | connectivity is available, information and service access may remain | |||
challenged and unequal. | challenged and unequal. | |||
This IAB workshop has aimed | This IAB workshop aimed to | |||
* to collect reports about barriers to accessing content and | * collect reports about barriers to accessing content and services | |||
services on the Internet, e.g. based on filtering, and blocking as | on the Internet. For example: | |||
well as due to general inequality of technological capabilities, | ||||
like device or protocol limitations. | ||||
* to help the Internet community get a better understanding of how | - based on filtering. | |||
the Internet functions in different parts of the world and which | ||||
- based on blocking. | ||||
- due to general inequality of technological capabilities, e.g., | ||||
device or protocol limitations. | ||||
* help the Internet community get a better understanding of how the | ||||
Internet functions in different parts of the world and which | ||||
technology or techniques need to be used to gain access to | technology or techniques need to be used to gain access to | |||
content. | content. | |||
* to build an understanding of what “being connected” to the | * build an understanding of what "being connected" to the Internet | |||
Internet means: What is the Internet to users? What is needed to | means: What is the Internet to users? What is needed to be | |||
be meaningfully connected? What are the minimum requirements to | meaningfully connected? What are the minimum requirements to be | |||
be able to access certain parts of the content and services | able to access certain parts of the content and services provided | |||
provided over the Internet? | over the Internet? | |||
1.1. About this workshop report content | 1.1. About the Content of This Workshop Report | |||
This document is a report on the proceedings of the workshop. The | This document is a report on the proceedings of the workshop. The | |||
views and positions documented in this report are expressed during | views and positions documented in this report were expressed during | |||
the workshop by participants and do not necessarily reflect IAB's | the workshop by participants and do not necessarily reflect the IAB's | |||
views and positions. | views and positions. | |||
Furthermore, the content of the report comes from presentations given | Furthermore, the content of the report comes from presentations given | |||
by workshop participants and notes taken during the discussions, | by workshop participants and notes taken during the discussions, | |||
without interpretation or validation. Thus, the content of this | without interpretation or validation. Thus, the content of this | |||
report follows the flow and dialogue of the workshop but does not | report follows the flow and dialogue of the workshop but does not | |||
attempt to capture a consensus. | attempt to capture a consensus. | |||
2. Workshop Scope and Discussion | 2. Workshop Scope and Discussion | |||
The workshop was organized across three days with all-group | The workshop was organized across three days with all-group | |||
discussion slots, one per day. The following topic areas were | discussion slots, one per day. The following topic areas were | |||
identified and the program committee organized paper submissions into | identified, and the program committee organized paper submissions | |||
three main themes for each of the three discussion slots. During | into three main themes for each of the three discussion slots. | |||
each discussion, those papers were presented sequentially with open | During each discussion, those papers were presented sequentially with | |||
discussion held at the end of each day. | open discussion held at the end of each day. | |||
2.1. Session 1: Community Networks - Their Role in Internet Access of | 2.1. Session 1: Community Networks - Their Role in Internet Access of | |||
Services | Services | |||
The first day of the workshop focused on the role of Community | The first day of the workshop focused on the role of Community | |||
Networks [RFC7962] as a way to overcome the barriers to Internet | Networks [RFC7962] as a way to overcome the barriers to Internet | |||
Access. Community Networks are self-organized networks wholly owned | access. Community Networks are self-organized networks wholly owned | |||
by the community and thus provide an alternative mechanism to bring | by the community and thus provide an alternative mechanism to bring | |||
connectivity and internet services to those places that lack | connectivity and Internet services to those places that lack | |||
commercial interest. | commercial interest. | |||
Presentations ranged from highlighting the need for measuring Quality | Presentations ranged from highlighting the need for measuring Quality | |||
of Experience (QoE) for Community Networks, to the potential role the | of Experience (QoE) for Community Networks, to the potential role the | |||
Content Delivery Network (CDN) can play in Community Networks, to the | Content Delivery Network (CDN) can play in Community Networks, to the | |||
role of Satellite Networks, and finally, to the vital role of the | role of Satellite Networks, and finally, to the vital role of the | |||
spectrum in this space. | spectrum in this space. | |||
2.1.1. The Quality of Community Networks | 2.1.1. The Quality of Community Networks | |||
[MARTINEZ] highlighted the need to address Quality of Experience | [MARTINEZ] highlighted the need to address QoE in discussions around | |||
(QoE) in discussions around Community Networks. As a community- | Community Networks. As a community-driven deployment, the knowledge | |||
driven deployment, the knowledge and involvement of individuals can | and involvement of individuals can vary; therefore, there are no | |||
vary; therefore, there are no guarantees of connectivity or quality | guarantees of connectivity or quality of service. There is a need to | |||
of service. There is a need to focus on user expectations and how | focus on user expectations and how they translate to measurable | |||
they translate to measurable performance indicators. Further, it | performance indicators. Further, it asks for better documentation of | |||
asks for better documenting best practices in deploying community | best practices in deploying Community Networks as well as careful | |||
networks as well as considering manageability considerations for | thought regarding manageability considerations for Community Networks | |||
community networks in protocol development. [GUIFI] as an example | in protocol development. [GUIFI] as an example Community Network was | |||
Community Network was discussed and some existing resources for | discussed, and some existing resources for Community Networks [APC] | |||
Community Networks ([APC], [ISOC], and [TBB]) were shared by the | [ISOC] [TBB] were shared by the participants. | |||
participants. | ||||
The inconsistent quality and performance of Satellite Internet is a | The inconsistent quality and performance of Satellite Internet result | |||
gap for community networks that rely on non-terrestrial networks | in a connectivity gap for Community Networks that rely on non- | |||
(NTNs) for internet access [HU]. | terrestrial networks (NTNs) for Internet access [HU]. | |||
2.1.2. Strengthening Community Networks | 2.1.2. Strengthening Community Networks | |||
[BENSON] focused on the prohibitive cost of the transit and Internet | [BENSON] focused on the prohibitive cost of transit and Internet | |||
service for Community Networks and argued for Content Delivery | services for Community Networks and argued for CDNs to provide | |||
Networks (CDNs) to provide transit-like and Internet services at no | transit-like and Internet services, at no more than at-cost, in a | |||
more than at-cost in a mutually beneficial way. Community networks | mutually beneficial way. Community Networks still need backhaul to | |||
still need backhaul to and from the CDN’s point of presence and | and from the CDN's point of presence, and models for community- | |||
models for community-backhaul and open-source CDNs were highlighted. | backhaul and open-source CDNs were highlighted. Discussion included | |||
Discussion included [PANGEA] project status as well as legal and | the status of Project PANGEA [PANGEA] as well as legal and commercial | |||
commercial considerations in such use of CDNs. | considerations related to such use of CDNs. | |||
[HU] highlighted that Satellite Internet provided by advanced LEO | [HU] highlighted that Satellite Internet provided by advanced low- | |||
satellite constellations can play a pivotal role in closing the | Earth orbit (LEO) Satellite constellations can play a pivotal role in | |||
connectivity gap in the urban-rural digital divide via Satellite- | closing the connectivity gap in the urban-rural digital divide via | |||
dependent community networks. These existing known performance and | Satellite-dependent Community Networks. These existing known | |||
management gaps need focus to enable Satellite Internet to resolve | performance and management gaps need to be focused on, to enable | |||
the divide. Further, research directions such as multi-layer | Satellite Internet to resolve the divide. Further, research | |||
satellite networking, autonomous maintenance, and integration between | directions such as multi-layer Satellite networking, autonomous | |||
Terrestrial and Non-Terrestrial networks were suggested. | maintenance, and integration between terrestrial networks and NTNs | |||
were suggested. | ||||
[RENNO] called attention to the coveted 6GHz (part of the C-band with | [RENNO] called attention to the coveted 6 GHz (part of the C-band | |||
a desirable mix of coverage and capacity) as a prime choice for | with a desirable mix of coverage and capacity) as a prime choice for | |||
International Mobile Telecommunication (IMT) for 5G technology while | International Mobile Telecommunication (IMT) for 5G technology while | |||
it is in common unlicensed use in the community networks (and small | it is in common unlicensed use in Community Networks (and small | |||
ISPs). Spectrum allocations directly impact industries and market | ISPs). Spectrum allocations directly impact industries and market | |||
access with ramifications for community networks. Further, there was | access with ramifications for Community Networks. Further, there was | |||
a discussion on the geopolitical tension because of it. | a discussion on geopolitical tensions because of these allocations. | |||
2.1.3. Discussion | 2.1.3. Discussion | |||
How can the technical community address the management gap and | How can the technical community address the management gaps and | |||
improve best practices for Community Networks? Is the increasing | improve best practices for Community Networks? Is the increasing | |||
complexity of the Internet making it more challenging to establish | complexity of the Internet making it more challenging to establish | |||
secure connections, and should this be taken into account in the | secure connections, and should this be taken into account in the | |||
design of the Internet? What steps need to be taken to make sure | design of the Internet? What steps need to be taken to make sure | |||
Community Networks are secure? Should the manageability | Community Networks are secure? Should manageability considerations | |||
consideration be expanded to explicitly consider Community Networks? | be expanded to explicitly consider Community Networks? The Global | |||
Global Access to the Internet for All (GAIA) [GAIA] research group | Access to the Internet for All (GAIA) Research Group [GAIA] could be | |||
could be a venue for further discussion and research. Further | a venue for further discussion and research. Further discussion | |||
discussion highlighted the need for readily available knowledge and | highlighted the need for readily available knowledge and tools for | |||
tools for community networks as well as the tussle with market forces | Community Networks as well as the tussle with market forces when | |||
when commercial networks compete with community networks. Also, | commercial networks compete with Community Networks. Also, there is | |||
there is a lack of operational inputs from community network | a lack of operational inputs from Community Network operators in the | |||
operators in the IETF/IRTF. | IETF/IRTF. | |||
2.2. Session 2: Digital Divide - Reports and Comments | 2.2. Session 2: Digital Divide - Reports and Comments | |||
Critical internet infrastructure affects many aspects of our society | Critical Internet infrastructure affects many aspects of our society | |||
significantly, although differently, the inequitable aspects of which | significantly, although it impacts different parts of society | |||
are typically referred to as "digital inclusion" signifying that in | differently. The inequitable aspects are typically referred to as | |||
efforts to digitalise society, there are those left out due to what | "digital inclusion"; these aspects signify that in efforts to | |||
is typically called the "digital divide", a related term specific to | digitalize society, there are those left out due to what is typically | |||
access to the Internet. These concepts together demonstrate that | called the "digital divide", a related term specific to access to the | |||
even if Internet connectivity is available, for some there will | Internet. These concepts together demonstrate that even if Internet | |||
remain challenges towards achieving equality. This becomes | connectivity is available, for some there will remain challenges | |||
especially significant as governments view the Internet as an | towards achieving equality. This becomes especially significant as | |||
important tool to help them reach the Sustainable Development Goals | governments view the Internet as an important tool for helping them | |||
(SDG) [SDG] and to globally support human rights. | reach the SDGs listed in [SDGs] and for globally supporting human | |||
rights. | ||||
The second day of workshops was essential to understanding the nature | The second day of workshops was essential to understanding the nature | |||
of the digital divide. Presentations of reports interrogated at | of the digital divide. Presentations of reports interrogated at | |||
least three key aspects of the digital divide, though there is | least three key aspects of the digital divide, though it is | |||
recognition that there may be more technical aspects of the digital | recognized that there may be more technical aspects of the digital | |||
divide that were not present. Those were: differences between | divide that were not addressed. Three of those aspects were: | |||
population demographics in the provision of online resources by | ||||
governments, inequality in the use of multilingualized domains and | ||||
email addresses, and increased costs for end-user downloads of | ||||
contemporary websites' sizes. | ||||
2.2.1. Disparities in service provision | * differences between population demographics in the provision of | |||
online resources by governments. | ||||
* inequality in the use of multilingualized domains and email | ||||
addresses. | ||||
* increased costs for end-user downloads from websites of | ||||
contemporary sizes. | ||||
2.2.1. Disparities in Service Provisioning | ||||
Ralph Holz presented research that exposes the more limited DNS- | Ralph Holz presented research that exposes the more limited DNS- | |||
mediated access to government websites by Indigenous communities in | mediated access to government websites by Indigenous communities in | |||
Australia as compared to less disadvantaged users in the same | Australia as compared to less disadvantaged users in the same | |||
population in "Evidence for a digital divide? Measuring DNS | population in "Evidence for a digital divide? Measuring DNS | |||
dependencies in the context of the Indigenous population of | dependencies in the context of the indigenous population of | |||
Australia". [HOLZ] DNS dependency trends were analysed between two | Australia" [HOLZ]. DNS dependency trends were analyzed between two | |||
lists of domains serving Australian government sites for Indigenous | lists of domains serving Australian government sites for Indigenous | |||
users and the general population. Researchers found, "evidence that | users and the general population. Researchers found "evidence that | |||
dependencies for the Indigenous population are indeed differently | dependencies for the indigenous population are indeed differently | |||
configured," indicative of a difference in service provisioning. | configured," indicative of a difference in service provisioning. | |||
However qualitative follow-up research is needed to interrogate both | However, qualitative follow-up research is needed to interrogate both | |||
the potential reasons for these differences and whether the | the potential reasons for these differences and whether the | |||
differences contribute to a "digital divide" that is tangible for | differences contribute to a digital divide that is tangible for | |||
Indigenous users. | Indigenous users. | |||
2.2.2. Lack of consistent acceptance of language scripts | 2.2.2. Lack of Consistent Acceptance of Language Scripts | |||
On the topic of availability of Internet services and content in | On the topic of availability of Internet services and content in | |||
multiple languages "Universal Acceptance of Domain Names and Email | multiple languages, "Universal Acceptance of Domain Names and Email | |||
Addresses: A Key to Digital Inclusion" was presented by Sarmad | Addresses: A Key to Digital Inclusion" was presented by Sarmad | |||
Hussain of ICANN. [HUSSAIN] The ICANN community has increased the | Hussain of ICANN [HUSSAIN]. The ICANN community has increased the | |||
options for multilingual identifiers through the expansion of the | options for multilingual identifiers through the expansion of the | |||
Internet’s DNS for use in domains and email addresses. However, | Internet's DNS for use in domains and email addresses. However, | |||
while the work of technical specification and policy recommendations | while the work of technical specifications and policy recommendations | |||
is complete, much work remains to deploy a multiligualized internet. | is complete, much work remains to deploy a multilingualized Internet. | |||
Today there are around 150 internationalised domain names (IDNs) but | Today, there are around 150 internationalized domain names (IDNs), | |||
the barriers to equal rollout of these scripts at the domain level | but equal rollout of these scripts at the domain level is hindered | |||
are hindered primarily by software and applications that do not yet | primarily by software and applications that do not yet recognize | |||
recognise these new scripts. "Universal Acceptance" is a programme | these new scripts. "Universal Acceptance" is a program of action for | |||
of action for the internet community at large that can ensure IDNs | the Internet community at large that can ensure that IDNs are | |||
are accepted and treated consistently. | accepted and treated consistently. | |||
2.2.3. Web Affordability and Inclusiveness | 2.2.3. Web Affordability and Inclusiveness | |||
In "A Framework for Improving Web Affordability and Inclusiveness" | In "A Framework for Improving Web Affordability and Inclusiveness", | |||
Rumaisa Habib presented research on the connection between website | Rumaisa Habib presented research on the connection between website | |||
size and cost to end users. [HABIB] This critical inquiry presents | size and cost to end users [HABIB]. This critical inquiry presents | |||
access in terms of affordability and through measurement demonstrates | access in terms of affordability and through measurement demonstrates | |||
that the material costs to end users who pay for their connection | that the material costs to end users who pay for their connection | |||
based on the volume of data they download and upload have risen as | based on the volume of data they download and upload have risen as | |||
the complexity of the web grows. Their research provides a framework | the complexity of the Web grows. Their research provides a framework | |||
for optimisation based on end-user affordability. This framework is | for optimization based on end-user affordability. This framework is | |||
anchored to reality: it proposes a fairness metric and suggests | anchored in reality: [HABIB] proposes a fairness metric and suggests | |||
systematic adaptations to Web complexity based on "geographic | systematic adaptations to complexity of the Web based on "geographic | |||
variations in mobile broadband prices and income levels." | variations in mobile broadband prices and income levels." | |||
2.2.4. Discussion | 2.2.4. Discussion | |||
These three reports discuss very different aspects of current | These three reports discuss very different aspects of current | |||
inequalities in Internet access in various parts of the world: | inequalities in Internet access in various parts of the world: | |||
service provision, availability, and economic costs. Notably, the | service provisioning, availability, and economic costs. Notably, the | |||
reports discuss trends that exacerbate the digital divide beyond the | reports discuss trends that exacerbate the digital divide beyond the | |||
question of connectivity or whether users have access to the | question of connectivity or whether users have access to the | |||
Internet, potentially bringing concrete ways that the IETF community | Internet, potentially yielding concrete ways that the IETF community | |||
can address digital inclusion within its remit. | can address digital inclusion within its remit. | |||
Discussants noted that while there are some interesting aspects to | Discussants noted that while there are some interesting aspects to | |||
the problem of the digital divide, such as measurements and | the problem of the digital divide, such as measurements and | |||
frameworks, most of the work is getting this work to the right people | frameworks, most of the work involves getting this work to the | |||
at the policy layer so there is an importance of communicating this | appropriate people at the policy level; therefore, it is important to | |||
technical evidence to the right people. The IETF's role could be to | communicate this technical evidence to the appropriate people. The | |||
build consensus on the proper solutions presented to decision-makers | IETF's role could be to build consensus on the proper solutions | |||
that put research and measurement not only in context but also in a | presented to decision-makers that put research and measurement not | |||
consensus-driven solution space. Another method to better | only in context but also in a consensus-driven solution space. | |||
communicate this research is by telling stories of end users in more | Another method to better communicate this research is by telling | |||
relatable and relevant terms, which is often a challenge for the | stories of end users in more relatable and relevant terms; this is | |||
technical level and a role for more diverse stakeholders at the more | often a challenge at the technical level and a role for more diverse | |||
local level. | stakeholders at the more local level. | |||
2.3. Session 3: Censorship - Reports and Circumvention | 2.3. Session 3: Censorship - Reports and Circumvention | |||
This session focused on reports of censorship as observed during | This session focused on reports of censorship as observed in recent | |||
recent years in different parts of the world, as well as on the use | years in different parts of the world; it also focused on the use of, | |||
of and expectation on censorship circumvention tools, mainly the use | and expectations for, censorship circumvention tools, mainly the use | |||
of secure VPN services. | of secure VPN services. | |||
The censorship reports, with a focus on Asia, and specifically India, | The censorship reports highlighted legal frameworks and court actions | |||
as well as Russia, as an example where censorship has changed | ||||
significantly recently, discussed the legal frameworks and court acts | ||||
that put legal obligations on regional network providers to block | that put legal obligations on regional network providers to block | |||
traffic. Further, measurements to validate the blocking as well as | traffic. The discussion focused on Asia, specifically India, and | |||
analyses of how blocking is implemented were discussed, i.e. which | included Russia as an example where censorship practices have | |||
protocols are used but also which kind of devices are used to | recently undergone significant changes. Further, measurements to | |||
configure the blocking rules and where are they deployed. | validate the blocking as well as analyses of how blocking is | |||
implemented were discussed, i.e., which protocols are used but also | ||||
which kinds of devices are used to configure the blocking rules and | ||||
where they are deployed. | ||||
2.3.1. Censorship Orders, Measurements, and Device Analysis | 2.3.1. Censorship Orders, Measurements, and Device Analysis | |||
[SAMSUDIN] reported on confirmed blocking from 10 countries | [SAMSUDIN] reported on confirmed blocking from 10 countries | |||
(Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, | (Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, | |||
Philippines, Thailand, Timor-Leste, Vietnam) in the period from 1 | Philippines, Thailand, Timor-Leste, and Vietnam) in the period from 1 | |||
July 2022 to 30 June 2023. The blocking was either confirmed by OONI | July 2022 to 30 June 2023. The blocking was confirmed by either | |||
measurements for existing blocking fingerprints, heuristics, i.e. for | (1) Open Observatory of Network Interference (OONI) measurements for | |||
new blocking fingerprints as well as news reports of blocking orders, | existing blocking fingerprints or heuristics (i.e., for new blocking | |||
or user experiences. Most of these countries block specific content | fingerprints as well as news reports of blocking orders) or (2) user | |||
such as porn, gambling, or certain news pages. Interestingly the | experiences. Most of these countries block specific content such as | |||
blocking in Hong Kong and Myanmar is focused on the military and | porn, gambling, or certain news pages. Interestingly, the blocking | |||
governmental pages of foreign countries. Blocking is often realized | in Hong Kong and Myanmar is focused on the military and governmental | |||
by either DNS tampering or HTTP tampering. For DNS, either a decided | pages of foreign countries. Blocking is often realized by either DNS | |||
IP address, a bogon IP address (127.0.0.1), or an empty domain | tampering or HTTP tampering. For DNS, either a chosen IP address, a | |||
(nxdomain) is used. In case of DNS tampering using a decided IP | bogon IP address (e.g., 127.0.0.1), or an empty domain (NXDOMAIN) is | |||
address or HTTP tampering some countries provide a block page that | used. In the case of DNS tampering using a chosen IP address or HTTP | |||
exposes the blocking, however, more transparency about blocking is | tampering, some countries provide a block page that exposes the | |||
requested by civil society organizations and the iMAP project. | blocking; however, more transparency related to blocking is requested | |||
by civil society organizations and the Internet Monitoring Action | ||||
Project (iMAP). | ||||
[GROVER] further focused the discussion on online censorship in | [GROVER] further focused the discussion on online censorship in | |||
India, Pakistan, and Indonesia. In India, where providers are | India, Pakistan, and Indonesia. | |||
As discussed in [Singh2020], in India, where providers are | ||||
responsible for implementing the blocking but no method is mandated, | responsible for implementing the blocking but no method is mandated, | |||
the six major ISPs (covering 98.82% of all subscribers) were tested | the six major ISPs (covering 98.82% of all subscribers) were tested | |||
on 4379 blocked websites (based on court orders, user reports, and | on a total of 4379 blocked websites (based on court orders, user | |||
publicly available or leaked government orders) on DNS poisoning/ | reports, and publicly available or leaked government orders) by using | |||
injection or HTTP/SNI-based censorship. Used censorship techniques | DNS poisoning/injection or using censorship based on HTTP or the | |||
and websites blocked were different across ISPs. Multiple ISPs used | Server Name Indication (SNI). The censorship techniques used and | |||
two different techniques (depending on the website), and all but one | websites blocked were different across ISPs. Multiple ISPs used two | |||
provided censorship notices. Providers blocked between 1892 to 3721 | different techniques (depending on the website), and all but one | |||
(of 4379) pages with only 1115 (27.64%) of pages blocked by all ISPs. | provided censorship notices. A list of 4379 potentially blocked | |||
[Singh2020] In contrast, in Pakistan, the government can also order | websites was tested; 4033 of those websites appeared in at least one | |||
the IPSs to perform blocking and blocking has even been observed in | ISP's blocklist. Providers blocked between 1892 and 3721 of the 4033 | |||
the past on the IXP level. Since 2020, there has also been a central | websites, with only 1115 websites (27.64%) blocked by all six ISPs. | |||
Web Monitoring System deployed at lines of international | ||||
connectivity. In Indonesia, initially, the government guided ISPs in | ||||
how to perform the blocking. The regulations were updated in 2020 to | ||||
allow Indonesian ISPs to block websites at their discretion. In | ||||
2022, there was a proposal by internet service providers to | ||||
centralise DNS. In Indonesia, a partial block list is publicly | ||||
available, but without any indication of why something is blocked. | ||||
[Grover2023] | ||||
[BASSO] reported that for Russia a high increase in additions to the | In contrast, in Pakistan, the government can also order the ISPs to | |||
Roskomnadzor’s block list was observed in March 2022 as well as in | perform blocking, and blocking has even been observed in the past at | |||
the Internet Exchange Point (IXP) level. Since 2020, there has also | ||||
been a central Web Monitoring System deployed at lines of | ||||
international connectivity. In Indonesia, initially, the government | ||||
guided ISPs in how to perform the blocking. The regulations were | ||||
updated in 2020 to allow Indonesian ISPs to block websites at their | ||||
discretion. In 2022, there was a proposal by ISPs to centralize DNS. | ||||
In Indonesia, a partial blocklist is publicly available, but without | ||||
any indication of why something is blocked [Grover2023]. | ||||
[BASSO] reported that for Russia a large increase in additions to | ||||
Roskomnadzor's blocklist was observed in March 2022 as well as in | ||||
December 2022, foremost covering news pages but also covering human | December 2022, foremost covering news pages but also covering human | |||
rights organizations and social media, where more than 3500 blocking | rights organizations and social media, where more than 3500 blocking | |||
orders were added to the list by an "Unknown body". Further, | orders were added to the list by an "Unknown body". Further, | |||
blocking of domains that are not in the official Roskomnadzor’s list | blocking of domains that are not in the official Roskomnadzor | |||
has been observed as well. | blocklist has been observed as well. | |||
An invited talk presented the work in [WANG] on locating censorship | An invited talk included a presentation of the work in [WANG] on | |||
devices by using HTTP and TLS traceroutes, identifying device vendors | locating censorship devices by using HTTP and TLS traceroutes, | |||
through fingerprinting, and reverse-engineering censorship triggers | identifying device vendors through fingerprinting, and reverse- | |||
by the use of fuzzing. E.g. for the case of Azerbaijan and | engineering censorship triggers by the use of fuzzing. For example, | |||
Kazakhstan, they showed that a significant portion of measurements | in the case of Azerbaijan and Kazakhstan, they showed that a | |||
from remote countries are blocked at the endpoint, indicating local | significant portion of measurements from remote countries is blocked | |||
policies but connection resets are also happening in Belarus and | at the endpoint, indicating local policies, but showed that | |||
Russia. Further, they could identify a set of commercial network | connection resets are also happening in Belarus and Russia. Further, | |||
devices (with filtering techniques such as firewalls) that are used | they could identify a set of commercial network devices (with | |||
in these countries for censorship and show how fuzzing can be used to | filtering techniques such as firewalls) that are used in these | |||
fingerprint and cluster behaviours as well as potentially circumvent | countries for censorship and show how fuzzing can be used to | |||
fingerprint and cluster behaviors as well as potentially circumvent | ||||
the deployed methods. | the deployed methods. | |||
All speakers called for more transparency by requiring blocking | All speakers called for more transparency by requiring blocking | |||
messages as well as publication and auditing of blocklists. | messages as well as publication and auditing of blocklists. | |||
Potentially even standardization could help. | Potentially, even standardization could help. | |||
2.3.2. Use of VPNs for Censorship Circumvents and User Expectations | 2.3.2. Use of VPNs for Censorship Circumventions and User Expectations | |||
Further on in the session, the possibility and prevalence of using | Further on in the session, the possibility and prevalence of using | |||
VPNs for circumvention has been discussed including user expectations | VPNs for circumvention were discussed, including user expectations | |||
and an analysis of security shortcomings of commercial VPN services. | and an analysis of security shortcomings of commercial VPN services. | |||
The analysis presented in [RAMESH] has shown various problems that | The analysis presented in [RAMESH-1] has shown various problems that | |||
lead to data leaks such as leakage of IPv6 traffic, non-browser | lead to data leaks, such as (1) leakage of IPv6 traffic, (2) non- | |||
traffic, or tunnel failure, not upholding user expectations, | browser traffic, or (3) tunnel failure, in addition to failing to | |||
especially when used in authoritarian regimes for censorship | uphold user expectations, especially when used in authoritarian | |||
circumvention or private communication. | regimes for censorship circumvention or private communication. | |||
The question of how common the use of VPNs for circumvention is and | The question of how common the use of VPNs for circumvention is and | |||
its legal implications, as VPNs are illegal in a few countries, has | its legal implications, as VPNs are illegal in a few countries, was | |||
been discussed. E.g. VPNs are not officially banned in India but | discussed. For example, VPNs are not officially banned in India, but | |||
VPN providers need to store log data and those, who haven’t complied, | VPN providers need to store log data and those who haven't complied | |||
stopped serving India. However, more data on VPN use and blocking | stopped serving India. However, more data on VPN use and blocking | |||
might be needed. | might be needed. | |||
2.3.3. Discussion | 2.3.3. Discussion | |||
After all, there is a cat-and-mouse game between censors and | After all, there is a cat-and-mouse game between censorship and | |||
circumvents, however, continued work on protocol enhancements that | circumvention; however, continued work on protocol enhancements that | |||
protect user privacy is essential. | protect user privacy is essential. | |||
2.4. Key Take Aways | 2.4. Key Takeaways | |||
Some key takeaways from the workshop are - | Some key takeaways from the workshop are as follows: | |||
* There is a need for the technical community to address the | * There is a need for the technical community to address the | |||
management gaps in operating Community Networks. | management gaps in operating Community Networks. | |||
* Work should be done in documenting best practices for operating | * Work should be done to document best practices for operating | |||
Community Networks. | Community Networks. | |||
* During the development of protocols, explicit manageability | * During the development of protocols, explicit manageability | |||
considerations related to Community Networks should be considered. | considerations related to Community Networks should be carefully | |||
thought out. | ||||
* Build consensus on solutions that have the most significant impact | * Build consensus on solutions that have the most significant impact | |||
in fostering digital inclusion. Further, promoting these | in fostering digital inclusion. Further, promoting these | |||
solutions ensures that efforts to bridge the digital divide are | solutions ensures that efforts to bridge the digital divide are | |||
effective and inclusive. | effective and inclusive. | |||
* Further work to enhance protocols ensuring user privacy should | * Further work should be done to enhance protocols, ensuring that | |||
continue. | user privacy is preserved. | |||
* Develop further protocols (or extensions to existing protocols) | * Develop further protocols (or extensions to existing protocols) | |||
that enable more transparency on filtering and promote their use | that enable more transparency on filtering, and promote their use | |||
and deployment. | and deployment. | |||
* Develop new VPN-like services and potentially support measurements | * Develop new VPN-like services and potentially support measurements | |||
to understand their deployment and use. | to understand their deployment and use. | |||
* Further discussion of these topics could happen in GAIA, HRPC, | * Further discussion of these topics could happen in the GAIA | |||
PEARG, and MAPRG based on the relevance to the research group. | Research Group, the Human Rights Protocol Considerations (HRPC) | |||
The management and operations-related discussion can be taken to | Research Group, the Privacy Enhancements and Assessments Research | |||
OPSAWG. The community could also explore if a censorship (and its | Group (PEARG), and the Measurement and Analysis for Protocols | |||
circumvention) focused group could be created. | Research Group (MAPRG), based on relevance to the research group. | |||
Management-related and operations-related discussions can be taken | ||||
to the IETF Operations and Management Area Working Group (OPSAWG). | ||||
The community could also explore whether a group focused on | ||||
censorship (and its circumvention) could be created. | ||||
3. Informative References | 3. IANA Considerations | |||
This document has no IANA actions. | ||||
4. Security Considerations | ||||
This document has no security considerations. | ||||
5. Informative References | ||||
[APC] "The Association for Progressive Communications (APC)", | [APC] "The Association for Progressive Communications (APC)", | |||
n.d., <https://www.apc.org/>. | <https://www.apc.org/>. | |||
[BASSO] Basso, S., "How Internet censorship changed in Russia | [BASSO] Basso, S., "How Internet censorship changed in Russia | |||
during the 1st year of military conflict in Ukraine", | during the 1st year of military conflict in Ukraine", | |||
January 2024, <https://datatracker.ietf.org/meeting/ | January 2024, <https://datatracker.ietf.org/meeting/ | |||
interim-2024-biasws-03/materials/slides-interim-2024- | interim-2024-biasws-03/materials/slides-interim-2024- | |||
biasws-03-sessa-online-censorship-in-india-pakistan-and- | biasws-03-sessa-slide-how-internet-censorship-changed-in- | |||
indonesia-00>. | russia-during-the-1st-year-of-military-conflict-in- | |||
ukraine-00.pdf>. | ||||
[BENSON] Benson, T. A. and M. Fayed, "A ‘C’ in CDN - Access service | [BENSON] Benson, T. A. and M. Fayed, "A 'C' in CDN: Access service | |||
to and from the Internet at cost for community networks", | to and from the Internet at cost for community networks", | |||
January 2024, <https://www.ietf.org/slides/slides-biasws- | January 2024, <https://www.ietf.org/slides/slides-biasws- | |||
a-c-in-cdn-access-service-to-and-from-the-internet-at- | a-c-in-cdn-access-service-to-and-from-the-internet-at- | |||
cost-for-community-networks-00.pdf>. | cost-for-community-networks-00.pdf>. | |||
[GAIA] "Global Access to the Internet for All Research Group", | [GAIA] "Global Access to the Internet for All Research Group | |||
n.d., <https://www.irtf.org/gaia.html>. | (GAIA)", <https://www.irtf.org/gaia.html>. | |||
[GROVER] Grover, G., "Online censorship in India, Pakistan and | [GROVER] Grover, G., "Online censorship in India, Pakistan and | |||
Indonesia", January 2024, | Indonesia", January 2024, | |||
<https://datatracker.ietf.org/meeting/interim-2024-biasws- | <https://datatracker.ietf.org/meeting/interim-2024-biasws- | |||
03/materials/slides-interim-2024-biasws-03-sessa-online- | 03/materials/slides-interim-2024-biasws-03-sessa-online- | |||
censorship-in-india-pakistan-and-indonesia-00>. | censorship-in-india-pakistan-and-indonesia-00>. | |||
[Grover2023] | [Grover2023] | |||
Grover, G. and C. Cath, "The infrastructure of censorship | Grover, G., "The infrastructure of censorship in Asia", in | |||
in Asia", October 2023, | "Eaten by the Internet", ed. Corinne Cath, pp. 75-81, | |||
Internet Archive, Meatspace Press, October 2023, | ||||
<https://archive.org/details/eaten-by-the-internet/>. | <https://archive.org/details/eaten-by-the-internet/>. | |||
[GUIFI] "Guifi.net", n.d., <https://guifi.net/en>. | [GUIFI] "guifi.net", <https://guifi.net/en>. | |||
[HABIB] Habib, R., Tanveer, S., Inam, A., Ahmed, H., and A. Ali, | [HABIB] Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A., | |||
"A Framework for Improving Web Affordability and | Uzmi, Z. A., Qazi, Z. A., and I. A. Qazi, "A Framework for | |||
Inclusiveness", September 2023, | Improving Web Affordability and Inclusiveness", ACM | |||
<https://www.ietf.org/slides/slides-biasws-a-framework- | SIGCOMM '23, pp. 592-607, DOI 10.1145/3603269.3604872, | |||
for-improving-web-affordability-and-inclusiveness-00.pdf>. | September 2023, <https://www.ietf.org/slides/slides- | |||
biasws-a-framework-for-improving-web-affordability-and- | ||||
inclusiveness-00.pdf>. | ||||
[HOLZ] Holz, R., Nazemi, N., Tavallaie, O., and A. Y. Zomaya, | [HOLZ] Holz, R., Nazemi, N., Tavallaie, O., and A. Y. Zomaya, | |||
"Evidence for a digital divide? Measuring DNS dependencies | "Evidence for a digital divide? Measuring DNS dependencies | |||
in the context of the indigenous population of Australia", | in the context of the indigenous population of Australia", | |||
2023, <https://www.ietf.org/slides/slides-biasws-evidence- | 2023, <https://www.ietf.org/slides/slides-biasws-evidence- | |||
for-a-digital-divide-measuring-dns-dependencies-in-the- | for-a-digital-divide-measuring-dns-dependencies-in-the- | |||
context-of-the-indigenous-population-of-australia-00.pdf>. | context-of-the-indigenous-population-of-australia-00.pdf>. | |||
[HU] Hu, P., "Closing the Performance and Management Gaps with | [HU] Hu, P., "Closing the Performance and Management Gaps with | |||
Satellite Internet - Challenges, Approaches, and Future | Satellite Internet: Challenges, Approaches, and Future | |||
Directions", January 2024, <https://www.ietf.org/slides/ | Directions", January 2024, <https://www.ietf.org/slides/ | |||
slides-biasws-closing-the-performance-and-management-gaps- | slides-biasws-closing-the-performance-and-management-gaps- | |||
with-satellite-internet-challenges-approaches-and-future- | with-satellite-internet-challenges-approaches-and-future- | |||
directions-01.pdf>. | directions-01.pdf>. | |||
[HUSSAIN] Hussain, S., "Universal Acceptance of Domain Names and | [HUSSAIN] Hussain, S., "Universal Acceptance of Domain Names and | |||
Email Addresses - A Key to Digital Inclusion", 2023, | Email Addresses: A Key to Digital Inclusion", 2023, | |||
<https://www.ietf.org/slides/slides-biasws-universal- | <https://www.ietf.org/slides/slides-biasws-universal- | |||
acceptance-of-domain-names-and-email-addresses-a-key-to- | acceptance-of-domain-names-and-email-addresses-a-key-to- | |||
digital-inclusion-01.pdf>. | digital-inclusion-01.pdf>. | |||
[ISOC] "Community networks help bridge the connectivity gap", | [ISOC] Internet Society, "Connecting the Unconnected: Community | |||
n.d., <https://www.internetsociety.org/action-plan/ | networks help bridge the connectivity gap", | |||
community-networks/>. | <https://www.internetsociety.org/action-plan/community- | |||
networks/>. | ||||
[MARTINEZ] Martínez-Cervantes, L. M. and R. Guevara-Martínez, | [MARTINEZ] Martínez-Cervantes, L. M. and R. Guevara-Martínez, | |||
"Community Networks and the Quest for Quality", January | "Community Networks and the Quest for Quality", January | |||
2024, <https://www.ietf.org/slides/slides-biasws- | 2024, <https://www.ietf.org/slides/slides-biasws- | |||
community-networks-and-the-quest-for-quality-00.pdf>. | community-networks-and-the-quest-for-quality-00.pdf>. | |||
[PANGEA] "Project Pangea from Cloudflare", n.d., | [OHLSEN] Ohlsen, L.Y., "BIAS workshop - M-Lab Position Paper | |||
submission", December 2024, <https://www.ietf.org/slides/ | ||||
slides-biasws-m-lab-position-paper-01.pdf>. | ||||
[OTT] Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., | ||||
Guzman, D., Kärkkäinen, L., Kosek, M., Mohan, N., Trossen, | ||||
D., Welzl, M., and L. Vogel, "The Internet: Only for the | ||||
Fast?", January 2024, <https://www.ietf.org/slides/slides- | ||||
biasws-the-internet-only-for-the-fast-00.pdf>. | ||||
[PANGEA] Cloudflare, "Project Pangea: Helping underserved | ||||
communities expand access to the Internet for free", | ||||
<https://www.cloudflare.com/en-gb/pangea/>. | <https://www.cloudflare.com/en-gb/pangea/>. | |||
[RAMESH] Ramesh, R., "Investigating the VPN Ecosystem through the | [RAMESH-1] Ramesh, R., "Investigating the VPN Ecosystem through the | |||
lens of Security, Privacy, and Usability", January 2024, | lens of Security, Privacy, and Usability", January 2024, | |||
<https://datatracker.ietf.org/meeting/interim-2024-biasws- | <https://datatracker.ietf.org/meeting/interim-2024-biasws- | |||
03/materials/slides-interim-2024-biasws-03-sessa- | 03/materials/slides-interim-2024-biasws-03-sessa- | |||
investigating-the-vpn-ecosystem-through-the-lens-of- | investigating-the-vpn-ecosystem-through-the-lens-of- | |||
security-privacy-and-usability-00>. | security-privacy-and-usability-00>. | |||
[RENNO] Rennó, R., "Maximising Connectivity - The Spectrum's Vital | [RAMESH-2] Ramesh, R., Vyas, A., and R. Ensafi, ""All of them claim | |||
to be the best": Multi-perspective study of VPN users and | ||||
VPN providers", 32nd USENIX Security Symposium (USENIX | ||||
Security '23, August 2023, | ||||
<https://www.usenix.org/conference/usenixsecurity23/ | ||||
presentation/ramesh-vpn>. | ||||
[RENNO] Rennó, R., "Maximising Connectivity: The Spectrum's Vital | ||||
Role in Technology Access", January 2024, | Role in Technology Access", January 2024, | |||
<https://www.ietf.org/slides/slides-biasws-position-paper- | <https://www.ietf.org/slides/slides-biasws-position-paper- | |||
by-raquel-renno-01.pdf>. | by-raquel-renno-01.pdf>. | |||
[RFC7962] Saldana, J., Ed., Arcia-Moret, A., Braem, B., | [RFC7962] Saldana, J., Ed., Arcia-Moret, A., Braem, B., | |||
Pietrosemoli, E., Sathiaseelan, A., and M. Zennaro, | Pietrosemoli, E., Sathiaseelan, A., and M. Zennaro, | |||
"Alternative Network Deployments: Taxonomy, | "Alternative Network Deployments: Taxonomy, | |||
Characterization, Technologies, and Architectures", | Characterization, Technologies, and Architectures", | |||
RFC 7962, DOI 10.17487/RFC7962, August 2016, | RFC 7962, DOI 10.17487/RFC7962, August 2016, | |||
<https://www.rfc-editor.org/rfc/rfc7962>. | <https://www.rfc-editor.org/info/rfc7962>. | |||
[SAMSUDIN] Samsudin, S., "iMAP (Internet Monitoring Action Project) | [SAMSUDIN] Samsudin, S., "iMAP (Internet Monitoring Action Project) | |||
2023 Internet Censorship Report", January 2024, | 2023 Internet Censorship Report", January 2024, | |||
<https://www.ietf.org/slides/slides-biasws-position-paper- | <https://www.ietf.org/slides/slides-biasws-imap-internet- | |||
by-raquel-renno-01.pdf>. | monitoring-action-project-internet-censorship-report- | |||
02.pdf>. | ||||
[SDG] "Sustainable Development Goals", n.d., | [SDGs] United Nations Department of Economic and Social Affairs - | |||
Sustainable Development, "The 17 Goals", | ||||
<https://sdgs.un.org/goals>. | <https://sdgs.un.org/goals>. | |||
[Singh2020] | [Singh2020] | |||
Singh, K., Grover, G., and V. Bansal, "How India Censors | Singh, K., Grover, G., and V. Bansal, "How India Censors | |||
the Web", July 2020, | the Web", WebSci '20: Proceedings of the 12th ACM | |||
<https://dl.acm.org/doi/abs/10.1145/3394231.3397891>. | Conference on Web Science, pp. 21-28, | |||
DOI 10.1145/3394231.3397891, July 2020, | ||||
<https://arxiv.org/pdf/1912.08590>. | ||||
[TBB] "Tribal Broadband Bootcamp", n.d., | [TBB] "Tribal Broadband Bootcamp", | |||
<https://tribalbroadbandbootcamp.org/>. | <https://tribalbroadbandbootcamp.org/>. | |||
[WANG] Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. | [WANG] Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. | |||
Ensafi, "Network Measurement Methods for Locating and | Ensafi, "Network Measurement Methods for Locating and | |||
Examining Censorship Devices", November 2023, | Examining Censorship Devices", November 2023, | |||
<https://datatracker.ietf.org/meeting/interim-2024-biasws- | <https://datatracker.ietf.org/meeting/interim-2024-biasws- | |||
03/materials/slides-interim-2024-biasws-03-sessa-online- | 03/materials/slides-interim-2024-biasws-03-sessa-network- | |||
censorship-in-india-pakistan-and-indonesia-00>. | measurement-methods-for-locating-and-examining-censorship- | |||
devices-00.pdf>. | ||||
Appendix A. Position Papers | Appendix A. Position Papers | |||
19 position papers were submitted to the workshop call for papers. 11 | Nineteen position papers were submitted to the workshop call for | |||
were selected for publication. Papers that were not published either | papers. Twelve were selected for publication. Papers that were not | |||
(1) only provided a very prelimited analysis of an idea that was felt | published either (1) only provided a very prelimited analysis of an | |||
to be incomprehensive for discussion at the workshop, or (2) | idea that was felt to be incomprehensive for discussion at the | |||
addressed problems that were beyond the scope as dedicated for the | workshop or (2) addressed problems that were considered beyond the | |||
workshop discussion e.g. discussing cyber security threads as a | scope of the workshop discussions, e.g., discussing cybersecurity | |||
barrier for participation or implication of technology in regulation | threats as a barrier to participation or implication of technology in | |||
that imposes blocking. Both of these topics pose a potentially | a regulation that imposes blocking. Both of these scenarios pose a | |||
severe risk on the open Internet, however, these risks might provide | potentially severe risk for the open Internet; however, they might | |||
a high risk for all Internet users but do not necessarily imply an | pose a high risk for all Internet users but do not necessarily imply | |||
unbalance. | an unbalance. | |||
All accepted papers are available at: | All accepted papers are available at | |||
https://datatracker.ietf.org/group/biasws/materials/ | <https://datatracker.ietf.org/group/biasws/materials/>. | |||
This is the list of all published papers: | This is the list of all published papers: | |||
Community Networks: | Community Networks: | |||
* L. M. Martínez-Cervantes, R. Guevara-Martínez: Community | * Martínez-Cervantes, L. M. and R. Guevara-Martínez: Community | |||
Networks and the Quest for Quality [MARTINEZ] | Networks and the Quest for Quality [MARTINEZ] | |||
* T. Benson, M. Fayed: A ‘C’ in CDN: Access service to and from | * Benson, T. A. and M. Fayed: A 'C' in CDN: Access service to and | |||
the Internet for community networks at-cost [BENSON] | from the Internet at cost for community networks [BENSON] | |||
* P. Hu: Closing the Performance and Management Gaps with Satellite | * Hu, P.: Closing the Performance and Management Gaps with Satellite | |||
Internet: Challenges, Approaches, and Future Directions [HU] | Internet: Challenges, Approaches, and Future Directions [HU] | |||
* R. Rennó: Maximising Connectivity: The Spectrum's Vital Role in | * Rennó, R.: Maximising Connectivity: The Spectrum's Vital Role in | |||
Technology Access [RENNO] | Technology Access [RENNO] | |||
Digital Divide: | Digital Divide: | |||
* R. Holz, N. Nazemi, O. Tavallaie, A.Y. Zomaya: Evidence for a | * Holz, R., Nazemi, N., Tavallaie, O., and A. Y. Zomaya: Evidence | |||
digital divide? Measuring DNS dependencies in the context of the | for a digital divide? Measuring DNS dependencies in the context | |||
indigenous population of Australia [HOLZ] | of the indigenous population of Australia [HOLZ] | |||
* S. Hussain: Universal Acceptance of Domain Names and Email | * Hussain, S.: Universal Acceptance of Domain Names and Email | |||
Addresses: A Key to Digital Inclusion [HUSSAIN] | Addresses: A Key to Digital Inclusion [HUSSAIN] | |||
* R. Habib, S. Tanveer, A. Inam, H. Ahmed, A. Ali, Z.A. Uzmi, | * Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A., Uzmi, Z. A., | |||
Z.A. Qazi, I.A. Qazi: A Framework for Improving Web | Qazi, Z. A., and I. A. Qazi: A Framework for Improving Web | |||
Affordability and Inclusiveness [HABIB] | Affordability and Inclusiveness [HABIB] | |||
* J. Ott, G. Bartolomeo, M.M. Bese, R. Bose, M. Bosk, D. | * Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman, | |||
Guzman, L. Kärkkäinen, M. Kosek, N. Mohan: The Internet: Only | D., Kärkkäinen, L., Kosek, M., Mohan, N., Trossen, D., Welzl, M., | |||
for the Fast (and Furious)? | and L. Vogel: The Internet: Only for the Fast? [OTT] | |||
* L.Y. Ohlsen: BIAS workshop - M-Lab Position Paper submission | * Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission | |||
[OHLSEN] | ||||
Censorship: | Censorship: | |||
* S. Nurliza Samsudin: iMAP (Internet Monitoring Action Project) | * Samsudin, S.: iMAP (Internet Monitoring Action Project) 2023 | |||
2023 Internet Censorship Report [SAMSUDIN] | Internet Censorship Report [SAMSUDIN] | |||
* G. Grover: The infrastructure of censorship in Asia [Grover2023] | * Grover, G.: The infrastructure of censorship in Asia [Grover2023] | |||
* S. Basso: How Internet censorship changed in Russia during the | * Basso, S.: How Internet censorship changed in Russia during the | |||
1st year of military conflict in Ukraine [BASSO] | 1st year of military conflict in Ukraine [BASSO] | |||
In addition to the submitted paper two invited talks were presented | In addition to the submitted papers, two invited talks were included, | |||
based on published papers: | based on published papers: | |||
* R. Sundara Raman, M. Wang, J. Dalek, J. Mayer, R. Ensafi: | * Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. Ensafi: | |||
Network Measurement Methods for Locating and Examining Censorship | Network Measurement Methods for Locating and Examining Censorship | |||
Devices [WANG] | Devices [WANG] | |||
* R. Ramesh, A. Vyas, R. Ensafi: “All of them claim to be the | * Ramesh, R., Vyas, A., and R. Ensafi: "All of them claim to be the | |||
best”: A multi-perspective study of VPN users and VPN providers | best": Multi-perspective study of VPN users and VPN providers | |||
[RAMESH-2] | ||||
Appendix B. Workshop Participants | Appendix B. Workshop Participants | |||
The workshop participants were Arnaud Taddei, Carlos Pignataro, | The workshop participants were Arnaud Taddei, Carlos Pignataro, | |||
Carsten Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton, | Carsten Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton, | |||
David Guzman, David Millman, David Schinazi, Dhruv Dhody, Gurshabad | David Guzman, David Millman, David Schinazi, Dhruv Dhody, Gurshabad | |||
Grover, Hanna Kreitem, Jane Coffin, Jiankang Yao, Jörg Ott, Juan | Grover, Hanna Kreitem, Jane Coffin, Jiankang Yao, Jörg Ott, Juan | |||
Peirano, Lai Yi Ohlsen, Luis Martinez, Mallory Knodel, Marwan Fayed, | Peirano, Lai Yi Ohlsen, Luis Martinez, Mallory Knodel, Marwan Fayed, | |||
Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Kühlewind, Mona | Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Kühlewind, Mona | |||
Wang, Peng Hu, Ralph Holz, Raquel Renno, Reethika Ramesh, Rumaisa | Wang, Peng Hu, Ralph Holz, Raquel Rennó, Reethika Ramesh, Rumaisa | |||
Habib, Sarmad Hussain, Simone Basso, Siti Nurliza Samsudin, Suresh | Habib, Sarmad Hussain, Simone Basso, Siti Nurliza Samsudin, Suresh | |||
Krishnan, Theophilus Benson, Tirumaleswar Reddy, Tommy Pauly, Vesna | Krishnan, Theophilus Benson, Tirumaleswar Reddy.K, Tommy Pauly, Vesna | |||
Manojlovic, and Wes Hardaker. | Manojlovic, and Wes Hardaker. | |||
Appendix C. Workshop Program Committee | Appendix C. Workshop Program Committee | |||
The workshop program committee members were Christopher Wood (IAB, | The workshop program committee members were Christopher Wood (IAB, | |||
Cloudflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, Center | Cloudflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, NYU), | |||
for Democracy and Technology), Mirja Kühlewind (IAB, Ericsson), and | Mirja Kühlewind (IAB, Ericsson), and Tommy Pauly (IAB, Apple). | |||
Tommy Pauly (IAB, Apple). | ||||
IAB Members at the Time of Approval | IAB Members at the Time of Approval | |||
Internet Architecture Board members at the time this document was | Internet Architecture Board members at the time this document was | |||
approved for publication were: TODO | approved for publication were: | |||
Matthew Bocci | ||||
Alissa Cooper | ||||
Roman Danyliw | ||||
Dhruv Dhody | ||||
Wes Hardaker | ||||
Cullen Jennings | ||||
Suresh Krishnan | ||||
Mirja Kühlewind | ||||
Tommy Pauly | ||||
Alvaro Retana | ||||
David Schinazi | ||||
Christopher Wood | ||||
Qin Wu | ||||
Acknowledgments | Acknowledgments | |||
Thanks to Arnaud Taddei for helpful suggestions to improve this | Thanks to Arnaud Taddei for helpful suggestions to improve this | |||
report. | report. | |||
Authors' Addresses | Authors' Addresses | |||
Mirja Kühlewind | Mirja Kühlewind | |||
Email: ietf@kuehlewind.net | Email: ietf@kuehlewind.net | |||
Dhruv Dhody | Dhruv Dhody | |||
Email: dd@dhruvdhody.com | Email: dd@dhruvdhody.com | |||
Mallory Knodel | Mallory Knodel | |||
Email: mknodel@cdt.org | Email: Mallory.knodel@nyu.edu | |||
End of changes. 114 change blocks. | ||||
352 lines changed or deleted | 423 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |