<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7687 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7687.xml">
<!ENTITY RFC7258 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY I-D.ietf-tls-esni SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-esni.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC7540 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7540.xml">
<!ENTITY RFC9000 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
<!ENTITY I-D.farrelll-mpls-opportunistic-encrypt SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.farrelll-mpls-opportunistic-encrypt.xml">
<!ENTITY RFC8461 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8461.xml">
<!ENTITY RFC7217 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7217.xml">
<!ENTITY RFC8064 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8064.xml">
<!ENTITY RFC8981 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8981.xml">
<!ENTITY RFC1984 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1984.xml">
<!ENTITY RFC6462 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6462.xml">
<!ENTITY RFC7480 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7480.xml">
<!ENTITY RFC7481 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7481.xml">
<!ENTITY RFC9082 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9082.xml">
<!ENTITY RFC9083 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9083.xml">
<!ENTITY RFC7484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7484.xml">
<!ENTITY RFC8056 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8056.xml">
<!ENTITY RFC8280 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8280.xml">
<!ENTITY DOI.10.5325_jinfopoli.11.2021.0376 SYSTEM "https://bib.ietf.org/public/rfc/bibxml7/reference.DOI.10.5325/jinfopoli.11.2021.0376.xml?anchor=Badii2021">
<!ENTITY RFC3365 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3365.xml">
]>


<rfc ipr="trust200902" docName="draft-farrell-tenyearsafter-04" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Ten Years After">Reflections on Ten Years Past The Snowden Revelations</title>

    <author initials="S." surname="Farrell" fullname="Stephen Farrell">
      <organization>Trinity College, Dublin</organization>
      <address>
        <postal>
          <country>Ireland</country>
        </postal>
        <email>stephen.farrell@cs.tcd.ie</email>
      </address>
    </author>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization>Digital Medusa</organization>
      <address>
        <email>farzaneh.badii@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Schneier" fullname="Bruce Schneier">
      <organization>Harvard University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>schneier@schneier.com</email>
      </address>
    </author>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization>Columbia University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>smb@cs.columbia.edu</email>
      </address>
    </author>

    <date year="2023" month="June" day="20"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo contains the thoughts and recountings of events that
transpired during and after the release of information about the NSA
by Edward Snowden in 2013.  There are four perspectives: that of someone
who was involved with sifting through the information to responsibly
inform the public, that of a security area director of the IETF, that of a human
rights expert, and that of a computer science and law professor.  The purpose
of this memo is to provide some historical perspective, while at the
same time offering a view as to what security and privacy challenges
the technical community should consider.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>On June 6th, 2013, an article appeared in <em>The Guardian</em> <xref target="guard2013"/>
that was the beginning of a series of what have come to be known as
the Snowden Revelations, describing certain activities of the United
States National Security Agency (NSA).  These activities included,
amongst others; secret court orders; secret agreements for the receipt
of so-called "meta-information" that includes source, destination, and
timing of communications; and tapping of communications lines.  The
breathtaking scope of the operations shocked the Internet technical
community that was reflected in a sea change within the IETF, IAB,
and other standards organizations.</t>

<t>Now that some years have passed, it seems appropriate to reflect on that
period of time, to consider what effect the community's actions had,
where security has improved, how the threat surface has evolved, what
areas haven't improved, and where the community might invest future
efforts.</t>

<t>Bruce Schneier begins this compendium of individual essays by bringing
us back to 2013, recalling how it was for him and others to report
what was happening, and the mindset of those involved.  Next, Stephen
Farrell reviews the technical community's reactions and in particular
the reactions of the IETF community, technical advances, and where
threats remain.  Then Farzaneh Badii discusses the impact of those
advances – or lack thereof – on human rights.  Finally Steven
M. Bellovin puts the Snowden revelations into an ever-evolving
historical context of secrets and secret stealing that spans
centuries, closing with some suggestions for IETF.</t>

<t>Readers are invited to consider what impact we as a community have
had, what challenges remain, and what positive contribution the
technical community can and should make to address security and
privacy of citizens of the world.</t>

<t>-- Eliot Lear, Independent Submissions Editor for the RFC Series</t>

</section>
<section anchor="bruce-schneier-snowden-ten-years-later"><name>Bruce Schneier: Snowden Ten Years Later</name>

<t>In 2013 and 2014, I wrote extensively about new revelations regarding
NSA surveillance based on the documents provided by Edward
Snowden. But I had a more personal involvement as well.</t>

<t>I wrote the essay below in September 2013. The <em>New Yorker</em> agreed to
publish it, but the <em>Guardian</em> asked me not to. It was
scared of UK law enforcement, and worried that this essay would
reflect badly on it. And given that the UK police would raid its
offices in July 2014, it had legitimate cause to be worried.</t>

<t>Now, ten years later, I offer this as a time capsule of what those
early months of Snowden were like.</t>

<t>**********</t>

<t>It’s a surreal experience, paging through hundreds of top-secret NSA
documents. You’re peering into a forbidden world: strange, confusing,
and fascinating all at the same time.</t>

<t>I had flown down to Rio de Janeiro in late August at the request of
Glenn Greenwald. He had been working on the Edward Snowden archive for
a couple of months, and had a pile of more technical documents that he
wanted help interpreting. According to Greenwald, Snowden also thought
that bringing me down was a good idea.</t>

<t>It made sense. I didn't know either of them, but I have been writing
about cryptography, security, and privacy for decades. I could
decipher some of the technical language that Greenwald had difficulty
with, and understand the context and importance of various
document. And I have long been publicly critical of the NSA’s
eavesdropping capabilities. My knowledge and expertise could help
figure out which stories needed to be reported.</t>

<t>I thought about it a lot before agreeing. This was before David
Miranda, Greenwald’s partner, was detained at Heathrow airport by the
UK authorities; but even without that, I knew there was a risk. I fly
a lot—a quarter of a million miles per year—and being put on a TSA
list, or being detained at the US border and having my electronics
confiscated, would be a major problem. So would the FBI breaking into my
home and seizing my personal electronics. But in the end, that made me
more determined to do it.</t>

<t>I did spend some time on the phone with the attorneys recommended to
me by the ACLU and the EFF. And I talked about it with my partner,
especially when Miranda was detained three days before my departure.
Both Greenwald and his employer, the <em>Guardian</em>, are careful about whom
they show the documents to. They publish only those portions essential
to getting the story out. It was important to them that I be a
co-author, not a source. I didn’t follow the legal reasoning, but the
point is that the <em>Guardian</em> doesn’t want to leak the documents to
random people. It will, however, write stories in the public interest,
and I would be allowed to review the documents as part of that
process. So after a Skype conversation with someone at the <em>Guardian</em>, I
signed a letter of engagement.</t>

<t>And then I flew to Brazil.</t>

<t>I saw only a tiny slice of the documents, and most of what I saw was
surprisingly banal. The concerns of the top-secret world are largely
tactical: system upgrades, operational problems owing to weather,
delays because of work backlogs, and so on. I paged through weekly
reports, presentation slides from status meetings, and general
briefings to educate visitors. Management is management, even inside
the NSA Reading the documents, I felt as though I were sitting through
some of those endless meetings.</t>

<t>The meeting presenters try to spice things up. Presentations regularly
include intelligence success stories. There were details—what had been
found, and how, and where it helped—and sometimes there were attaboys
from “customers” who used the intelligence. I’m sure these are
intended to remind NSA employees that they’re doing good. It
definitely had an effect on me. Those were all things I want the NSA
to be doing.</t>

<t>There were so many code names. Everything has one: every program,
every piece of equipment, every piece of software. Sometimes code
names had their own code names. The biggest secrets seem to be the
underlying real-world information: which particular company
MONEYROCKET is; what software vulnerability EGOTISTICALGIRAFFE—really,
I am not making that one up—is; how TURBINE works. Those secrets
collectively have a code name—ECI, for exceptionally compartmented
information—and almost never appear in the documents. Chatting with
Snowden on an encrypted IM connection, I joked that the NSA cafeteria
menu probably has code names for menu items. His response: “Trust me
when I say you have no idea.”</t>

<t>Those code names all come with logos, most of them amateurish and a
lot of them dumb. Note to the NSA: take some of that more than
ten-billion-dollar annual budget and hire yourself a design
firm. Really; it’ll pay off in morale.</t>

<t>Once in a while, though, I would see something that made me stop,
stand up, and pace around in circles. It wasn’t that what I read was
particularly exciting, or important. It was just that it was
startling. It changed—ever so slightly—how I thought about the world.</t>

<t>Greenwald said that that reaction was normal when people started
reading through the documents.</t>

<t>Intelligence professionals talk about how disorienting it is living on
the inside. You read so much classified information about the world’s
geopolitical events that you start seeing the world differently. You
become convinced that only the insiders know what’s really going on,
because the news media is so often wrong. Your family is
ignorant. Your friends are ignorant. The world is ignorant. The only
thing keeping you from ignorance is that constant stream of classified
knowledge. It’s hard not to feel superior, not to say things like “If
you only knew what we know” all the time. I can understand how General
Keith Alexander, the director of the NSA, comes across as so
supercilious; I only saw a minute fraction of that secret world, and I
started feeling it.</t>

<t>It turned out to be a terrible week to visit Greenwald, as he was
still dealing with the fallout from Miranda’s detention. Two other
journalists, one from the Nation and the other from the <em>Hindu</em>, were
also in town working with him. A lot of my week involved Greenwald
rushing into my hotel room, giving me a thumb drive of new stuff to
look through, and rushing out again.</t>

<t>A technician from the <em>Guardian</em> got a search capability working while I
was there, and I spent some time with it. Question: when you’re given
the capability to search through a database of NSA secrets, what’s the
first thing you look for? Answer: your name.</t>

<t>It wasn’t there. Neither were any of the algorithm names I knew, not
even algorithms I knew that the US government used.</t>

<t>I tried to talk to Greenwald about his own operational security. It
had been incredibly stupid for Miranda to be traveling with NSA
documents on the thumb drive. Transferring files electronically is
what encryption is for. I told Greenwald that he and Laura Poitras
should be sending large encrypted files of dummy documents back and
forth every day.</t>

<t>Once, at Greenwald’s home, I walked into the backyard and looked for
TEMPEST receivers hiding in the trees. I didn’t find any, but that
doesn’t mean they weren’t there. Greenwald has a lot of dogs, but I
don’t think that would hinder professionals. I’m sure that a bunch of
major governments have a complete copy of everything Greenwald
has. Maybe the black bag teams bumped into each other in those early
weeks.</t>

<t>I started doubting my own security procedures. Reading about the NSA’s
hacking abilities will do that to you. Can it break the encryption on
my hard drive? Probably not. Has the company that makes my encryption
software deliberately weakened the implementation for it?
Probably. Are NSA agents listening in on my calls back to the US? Very
probably. Could agents take control of my computer over the Internet
if they wanted to? Definitely. In the end, I decided to do my best and
stop worrying about it. It was the agency’s documents, after all. And
what I was working on would become public in a few weeks.</t>

<t>I wasn't sleeping well, either. A lot of it was the sheer magnitude of
what I saw. It's not that any of it was a real surprise. Those of us
in the information security community had long assumed that the NSA
was doing things like this. But we never really sat down and figured
out the details, and to have the details confirmed made a big
difference. Maybe I can make it clearer with an analogy. Everyone
knows that death is inevitable; there's absolutely no surprise about
that. Yet it arrives as a surprise, because we spend most of our lives
refusing to think about it. The NSA documents were a bit like
that. Knowing that it is surely true that the NSA is eavesdropping on
the world, and doing it in such a methodical and robust manner, is
very different from coming face-to-face with the reality that it is
and the details of how it is doing it.</t>

<t>I also found it incredibly difficult to keep the secrets. The
<em>Guardian</em>’s process is slow and methodical. I move much faster. I
drafted stories based on what I found. Then I wrote essays about those
stories, and essays about the essays. Writing was therapy; I would
wake up in the wee hours of the morning, and write an essay. But that
put me at least three levels beyond what was published.</t>

<t>Now that my involvement is out, and my first essays are out, I feel a
lot better. I'm sure it will get worse again when I find another
monumental revelation; there are still more documents to go through.</t>

<t>I’ve heard it said that Snowden wants to damage America. I can say
with certainty that he does not. So far, everyone involved in this
incident has been incredibly careful about what is released to the
public. There are many documents that could be immensely harmful to
the US, and no one has any intention of releasing them. The documents
the reporters release are carefully redacted. Greenwald and I
repeatedly debated with <em>Guardian</em> editors the newsworthiness of story
ideas, stressing that we would not expose government secrets simply
because they’re interesting.</t>

<t>The NSA got incredibly lucky; this could have ended with a massive
public dump like Chelsea Manning’s State Department cables. I suppose
it still could. Despite that, I can imagine how this feels to the NSA.
It’s used to keeping this stuff behind multiple levels of security:
gates with alarms, armed guards, safe doors, and military-grade
cryptography. It’s not supposed to be on a bunch of thumb drives in
Brazil, Germany, the UK, the US, and who knows where else, protected
largely by some random people’s opinions about what should or should
not remain secret. This is easily the greatest intelligence failure in
the history of ever. It’s amazing that one person could have had so
much access with so little accountability, and could sneak all of this
data out without raising any alarms. The odds are close to zero that
Snowden is the first person to do this; he’s just the first person to
make public that he did. It’s a testament to General Alexander’s power
that he hasn’t been forced to resign.</t>

<t>It’s not that we weren’t being careful about security, it’s that our
standards of care are so different. From the NSA’s point of view,
we’re all major security risks, myself included. I was taking notes
about classified material, crumpling them up, and throwing them into
the wastebasket. I was printing documents marked “TOP
SECRET/COMINT/NOFORN” in a hotel lobby. And once, I took the wrong
thumb drive with me to dinner, accidentally leaving the unencrypted
one filled with top-secret documents in my hotel room. It was an
honest mistake; they were both blue.</t>

<t>If I were an NSA employee, the policy would be to fire me for that alone.</t>

<t>Many have written about how being under constant surveillance changes
a person. When you know you’re being watched, you censor yourself. You
become less open, less spontaneous. You look at what you write on your
computer and dwell on what you’ve said on the telephone, wonder how it
would sound taken out of context, from the perspective of a
hypothetical observer. You’re more likely to conform. You suppress
your individuality. Even though I have worked in privacy for decades,
and already knew a lot about the NSA and what it does, the change was
palpable. That feeling hasn’t faded. I am now more careful about what
I say and write. I am less trusting of communications technology. I am
less trusting of the computer industry.</t>

<t>After much discussion, Greenwald and I agreed to write three stories
together to start. All of those are still in progress. In addition, I
wrote two commentaries on the Snowden documents that were recently
made public. There’s a lot more to come; even Greenwald hasn’t looked
through everything.</t>

<t>Since my trip to Brazil [one month before], I’ve flown back to the US
once and domestically seven times—all without incident. I’m not on any
list yet. At least, none that I know about.</t>

<t>**********</t>

<t>As it happened, I didn’t write much more with Greenwald or the
<em>Guardian</em>. Those two had a falling out, and by the time everything
settled and both began writing about the documents
independently—Greenwald at the newly formed website the <em>Intercept</em>—I
got cut out of the process somehow. I remember hearing that Greenwald
was annoyed with me, but I never learned the reason. We haven’t spoken
since.</t>

<t>Still, I was happy with the one story I was part of: how the NSA hacks
Tor. I consider it a personal success that I pushed the <em>Guardian</em> to
publish NSA documents detailing QUANTUM. I don’t think that would have
gotten out any other way. And I still use those pages today when I
teach cybersecurity to policymakers at the Harvard Kennedy School.</t>

<t>Other people wrote about the Snowden files, and wrote a lot. It was a
slow trickle at first, and then a more consistent flow. Between
Greenwald, Bart Gellman, and the <em>Guardian</em> reporters, there ended up
being steady stream of news. (Bart brought in Ashkan Soltani to help
him with the technical aspects, which was a great move on his part,
even if it cost Ashkan a government job later.) More stories were
covered by other publications.</t>

<t>It started getting weird. Both Greenwald and Gellman held documents
back so they could publish them in their books. Jake Appelbaum, who
had not yet been accused of sexual assault by multiple women, was
working with Poitras. He partnered with Spiegel to release an implant
catalog from the NSA’s Tailored Access Operations group. To this day,
I am convinced that that document was not in the Snowden archives:
that Jake got it somehow, and it was released with the implication
that it was from Edward Snowden. I thought it was important enough
that I started writing about each item in that document in my blog:
”NSA Exploit of the Week.” That got my website blocked by the DoD: I
keep a framed print of the censor’s message on my wall.</t>

<t>Perhaps the most surreal document disclosures were when artists
started writing fiction based on the documents. This was in 2016, when
Laura Poitras built a secure room in New York to house the
documents. By then, the documents were years out of date.  And now
they’re over a decade out of date. (They were leaked in 2013, but most
of them were from 2012 or before.)</t>

<t>I ended up being something of a public ambassador for the
documents. When I got back from Rio, I gave talks at a private
conference in Woods Hole, the Berkman Center at Harvard, something
called the Congress and Privacy and Surveillance in Geneva, events at
both CATO and New America in DC, an event at the University of
Pennsylvania, an event at EPIC and a “Stop Watching Us” rally in DC,
the RISCS conference in London, the ISF in Paris, and...then...at the
IETF meeting in Vancouver in November 2013. (I remember little of
this; I am reconstructing it all from my calendar.)</t>

<t>What struck me at the IETF was the indignation in the room, and the
calls to action. And there was action, across many fronts. We
technologists did a lot to help secure the Internet, for example.</t>

<t>The government didn’t do its part, though. Despite the public outcry,
investigations by Congress, pronouncements by President Obama, and
federal court rulings, I don’t think much has changed. The NSA
canceled a program here and a program there, and it is now more public
about defense. But I don’t think it is any less aggressive about
either bulk or targeted surveillance. Certainly its government
authorities haven’t been restricted in any way. And surveillance
capitalism is still the business model of the Internet.</t>

<t>And Edward Snowden? We were in contact for a while on Signal. I
visited him once in Moscow, in 2016. And I had him do an guest
lecture to my class at Harvard for a few years, remotely by
Jitsi. Afterwards, I would hold a session where I promised to answer
every question he would evade or not answer, explain every response he
did give, and be candid in a way that someone with an outstanding
arrest warrant simply cannot. Sometimes I thought I could channel
Snowden better than he could.</t>

<t>But now it’s been a decade. Everything he knows is old and out of
date. Everything we know is old and out of date. The NSA suffered an
even worse leak of its secrets by the Russians, under the guise of the
Shadow Brokers, in 2016 and 2017. The NSA has rebuilt. It again has
capabilities we can only surmise.</t>

</section>
<section anchor="stephen-farrell-ietf-and-internet-technical-community-reaction"><name>Stephen Farrell: IETF and Internet Technical community reaction</name>

<t>In 2013, the IETF and, more broadly, the Internet technical, security and
privacy research communities, were surprised by the surveillance and attack
efforts exposed by the Snowden revelations.  <xref target="timeline"/> While the
potential for such was known, it was the scale and pervasiveness of the
activities disclosed that was alarming and, I think it fair to say, quite
annoying, for very many Internet engineers.</t>

<t>As for the IETF's reaction, informal meetings during the July 2013 IETF meeting
in Berlin indicated that IETF participants considered that these revelations
showed that we needed to do more to improve the security and privacy properties
of IETF protocols, and to help ensure deployments made better use of the
security and privacy mechanisms that already existed. In August, the IETF set up
a new mailing list <xref target="perpass"/> that ended up being a useful venue for triaging
proposals for work on these topics. At the November 2013 IETF meeting, there
was a lively and very well attended plenary session <xref target="plenary-video"/> on
"hardening the Internet" against such attacks, followed by a "birds of a
feather" <xref target="Perpass-BoF"/> devoted to more detailed discussion of possible
actions in terms of new working groups, protocols and best-current-practice
(BCP) documents that could help improve matters.  This was followed in
February/March 2014 by a joint IAB/W3C workshop on "strengthening the Internet
against pervasive monitoring" <xref target="STRINT"/> held in London and attended by 150
engineers (still the only IAB workshop in my experience where we needed a
wait-list for people after capacity for the venue was reached!). The STRINT
workshop report was eventually published as <xref target="RFC7687"/> in 2015, but in the
meantime work proceeded on a Best Current Practice (BCP) document codifying
that the IETF community considered that "pervasive monitoring is an attack"
<xref target="RFC7258"/> (aka BCP188). The IETF last-call discussion for that short
document included more than 1000 emails - while there was broad agreement on
the overall message, a number of IETF participants considered enshrining that
message in the RFC series and IETF processes was controversial. In any case the
BCP was published in May 2014. The key statement on which rough consensus was
reached is in the abstract of RFC7258 and says "Pervasive monitoring is a
technical attack that should be mitigated in the design of IETF protocols,
where possible." That document has since been referenced <xref target="refs-to-7258"/> by
many IETF working groups and RFCs as justifying additional work on security and
privacy. Throughout that period and beyond, the repercussions of the Snowden
revelations remained a major and ongoing agenda item for both of the IETF's
main technical management bodies - the IAB and the IESG (on which I served at
the time).</t>

<t>So far, I've really only described the processes with which the IETF dealt with
the attacks, but there was of course also much technical work started by IETF
participants that was at least partly motivated by the Snowden revelations.</t>

<t>In November 2013 a working group was established to document better practices
for using TLS in applications <xref target="UTA"/> so that deployments would be less at risk
in the face of some of the attacks related to stripping TLS or having
applications mis-use TLS APIs or parameters.  Similar work was done to update
recommendations for use of cryptography in other protocols in the <xref target="CURDLE"/>
working group later.  The CURDLE working group was to an extent created to
enable use of a set of new elliptic curves that had been documented by the IRTF
crypto forum research group. <xref target="CFRG"/> That work in turn had been partly
motivated by (perhaps ultimately unfounded) concerns about elliptic curves
defined in NIST standards, following the DUAL_EC_DRBG debacle <xref target="dual-ec"/> 
(described further below) where a
NIST random number generator had been deliberately engineered to produce output
that could be vulnerable to NSA attack.</t>

<t>Work to develop a new version of TLS was started in 2014, mainly due to
concerns that TLSv1.2 and earlier version implementations had been shown to be
vulnerable to a range of attacks over the years. The work to develop TLSv1.3
<xref target="RFC8446"/> also however aimed to encrypt more of the handshake so as to
expose less information to network observers - a fairly direct result of the
Snowden revelations.  Work to further improve TLS in this respect continues
today using the so-called encrypted client hello (ECH) <xref target="I-D.ietf-tls-esni"/>
mechanism to remove one of the last privacy leaks present in current TLS.</t>

<t>Work on ECH was enabled by significant developments to encrypt DNS traffic,
using DNS over TLS (DoT) <xref target="RFC7858"/> or DNS over HTTPS (DoH) <xref target="RFC8484"/> which also started as a result of
the Snowden revelations. Prior to that, privacy hadn't really been considered
when it came to DNS data or (more importantly) the act of accessing DNS data.
The trend towards encrypting DNS traffic represents a significant change for
the Internet, both in terms of reducing cleartext, but also in terms of moving
points-of-control. The latter aspect was, and remains, controversial, but the
IETF did its job of defining new protocols that can enable better DNS privacy.
Work on HTTP version 2 <xref target="RFC7540"/> and QUIC <xref target="RFC9000"/> further demonstrates
the trend in the IETF towards always-encrypting protocols as the new norm, at
least at and above the transport layer.</t>

<t>Of course, not all such initiatives bore fruit, for example attempts to define
a new MPLS encryption mechanism <xref target="I-D.farrelll-mpls-opportunistic-encrypt"/>
foundered due to a lack of interest and the existence of the already deployed
IEEE MACSEC scheme. But there has been a fairly clear trend towards trying to
remove cleartext from the Internet as a precursor to provide improved privacy
when considering network observers as attackers.</t>

<t>The IETF, of course, forms only one part of the broader Internet technical
community, and there were many non-IETF activities triggered by the Snowden
revelations, a number of which also eventually resulted in new IETF work to
standardise better security and privacy mechanisms developed elsewhere.</t>

<t>In 2013, the web was largely unencrypted despite HTTPS being relatively
usable and that was partly due to problems using the WebPKI at scale. The
Let's Encrypt <xref target="LE"/> initiative issued its first certificates in 2015 as
part of its aim to try to move the web
towards being fully encrypted, and has been extremely successful in helping
achieve that goal.  Subsequently, the automation protocols developed for
Let's Encrypt were standardised in the IETF's ACME <xref target="ACME"/> working group.</t>

<t>In 2013, most email transport between mail servers was cleartext,
directly enabling some of the attacks documented in the Snowden documents.
Significant effort by major mail services and MTA software developers since
then have resulted in more than 90% of email being encrypted between mail
servers and various IETF protocols have been defined in order to improve that
situation, e.g., SMTP MTA Strict Transport Security (MTA-STS). <xref target="RFC8461"/></t>

<t>Lastly, MAC addresses have historically been long-term fixed values visible to
local networks (and beyond), which enabled some tracking attacks that were
documented in the Snowden documents. <xref target="Toronto"/> 
Implementers/vendors and the IEEE 802
standards group recognised this weakness and started work on MAC address
randomisation that in turn lead to the IETF's <xref target="MADINAS"/> working group that
aims to ensure randomised MAC addresses can be used on the Internet without
causing unintentional harm.
There is also a history of IETF work on deprecating MAC-address based IPv6 interface identifiers,
advocating pseudo-random identifiers and temporary addresses, some of
which pre-dates Snowden. <xref target="RFC7217"/> <xref target="RFC8064"/> <xref target="RFC8981"/></t>

<t>In summary, the significantly large volume of technical work pursued in the
IETF and elsewhere as a result of the Snowden revelations has focussed on two
main things: decreasing the amount of plaintext that remains visible to network
observers and secondly reducing the number of long-term identifiers that enable
unexpected identification or re-identification of devices or users. This work
is not by any means complete, nor is deployment universal, but significant
progress has been made and the work continues even if the level of annoyance
at the attack has faded somewhat over time.</t>

<t>One should also note that there has been push-back against these improvements
in security and privacy and the changes they cause for deployments. That has
come from more or less two camps - those on whom these improvements force
change tend to react badly, but later figure out how to adjust. The second camp
being those who seemingly prefer not to strengthen security so as to for
example continue to achieve what they call "visibility" even in the face of the
many engineers who correctly argue that such an anti-encryption approach
inevitably leads to worse security overall. The recurring nature of this kind
of push-back is nicely illustrated by <xref target="RFC1984"/>. That informational document
was published in 1996 as an IETF response to an early iteration of the
perennial "encryption is bad" argument. In 2015, the unmodified 1996 text was
upgraded to a Best Current Practice (BCP200) as the underlying arguments have
not changed, and will not change.</t>

<t>Looking back on all the above from a 2023 vantage point, I think that, as a
community of Internet engineers, we got a lot right, but that today there's way
more that needs to be done to better protect the security and privacy of people
who use the Internet. In particular, we (the technical community) haven't done
nearly as good a job at countering surveillance capitalism <xref target="zubhoff2019"/> which has exploded
in the last decade. In part, that's because many of the problems are outside of
the scope of bodies such as the IETF. For example, intrusive back-end sharing
of people's data for advertising purposes can't really be mitigated via
Internet protocols.</t>

<t>However, I also think that the real annoyance felt with respect to the Snowden
revelations is (in general) not felt nearly as much when it comes to the legal
but hugely privacy-invasive activities of major employers of Internet
engineers.</t>

<t>It's noteworthy that RFC7258 doesn't consider that bad actors are limited to
governments, and personally, I think many advertising industry schemes for
collecting data are egregious examples of pervasive monitoring and hence ought
also be considered an attack on the Internet that ought be mitigated where
possible.  However, the Internet technical community clearly hasn't acted in
that way over the last decade.</t>

<t>Perhaps that indicates that Internet engineers and the bodies in which they
congregate need to place much more emphasis on standards for ethical behaviour
than has been the case for the first half-century of the Internet.  And while
it would be good to see the current leaders of Internet bodies work to make
progress in that regard, at the time of writing, it sadly seems more likely that
government regulators will be the ones to try force better behaviour. That of
course comes with a significant risk of having regulations that stymie the kind
of permissionless innovation that characterised many earlier Internet
successes.</t>

<t>So while we got a lot right in our reaction to Snowden's revelations,
currently, we have a "worse" Internet.  Nonetheless, I do still hope to see a
sea-change there, as the importance of real Internet security and privacy for
people becomes utterly obvious to all, even the most hard core capitalists and
government signals intelligence agencies.  That may seem naive, but I remain
optimistic that as a fact-based community we (and eventually our employers)
will recognise that the lesser risk is to honestly aim to provide the best
security and privacy practically possible.</t>

</section>
<section anchor="farzaneh-badii-did-snowdens-revelations-help-with-protecting-human-rights-on-the-internet"><name>Farzaneh Badii: Did Snowden’s revelations help with protecting human rights on the Internet?</name>

<t>It is very difficult to empirically measure the effect of Snowden's
revelations on human rights and the Internet. Anecdotally, we have
been witnessing dominant regulatory and policy approaches that impact
technologies and services that are at the core of protecting human
rights on the Internet. (A range of European Union laws that aims to
address online safety or concentration of data. There are many more
regulations that have an impact on the Internet.<xref target="Masnick2023"/>) There
has been little progress in fixing technical and policy issues that
help enable human rights. Snowden revelations did not have a
revolutionary effect on our approach towards not using policies and
technical means that have an effect on human rights, such as freedom
of expression, freedom of association and assembly and privacy. It did not decrease the number of 
Internet shutdowns, nor the eagerness of authoritarian (and even to some extent democratic) countries to territorialize the Internet. 
In some cases, the governments argued that they should have more data sovereignty or Internet sovereignty. Perhaps the revelations helped with the evolution of some technical and policy aspects.</t>

<t>After Snowden’s revelations 10 years ago, engineers and advocates at
the Internet Engineering Task Force (IETF) responded in a few
ways. One prominent response was the issuance of a Best Current
Practice document, “Pervasive Monitoring Is an Attack” <xref target="RFC7258"/> by
Farrell and Tschofenig. The responses to Snowden revelations did not
mean that IETF had lost sight of issues such as privacy and
surveillance. There were instances of resistance to surveillance in
the past by engineers (we do not delve into how successful that was in
protecting human rights). But historically, many engineers believed
that widespread and habitual surveillance was too expensive to be
practical. The revelations proved them wrong.</t>

<t>Rights-centered activists were also involved with the IETF before the
revelations. For example, staff from Center for Democracy and
Technology (CDT) was undertaking work at the IETF (and was a member of
the Internet Architecture Board) and held workshops about the
challenges of creating privacy protective protocols and systems. The
technical shortcomings that were exploited by the National Security
Agency to carry out mass-scale surveillance were recognized by the
IETF before the Snowden revelations <xref target="Garfinkel1995"/>,<xref target="RFC6462"/>. In
2012, Joy Liddicoat and Avri Doria wrote a report at Internet Society
which extensively discussed the processes and principles of human
rights and Internet protocols <xref target="Doria2012"/>.</t>

<t>Perhaps the Snowden revelations brought more attention to the IETF and
its work as it related to important issues, such as privacy and
freedom of expression. It might have also expedited and helped with
more easily convening the Human Rights Protocol Considerations
research group in the Internet Research Task Force (IRTF). Co-chaired
by Niels ten Oever (who worked at Article 19 at the time) and Internet
governance activist Avri Doria, the Internet Research Task Force in
July 2015 chartered a Research Group on “Human Rights Protocol
Considerations” (the HRPC RG). The charter of the HRPC RG stated that
the group was established: “to research whether standards and
protocols can enable, strengthen or threaten human rights, as defined
in the UDHR and the International Covenant on Civil and Political
Rights (ICCPR).”</t>

<t>During the past decades, a few successful strides were made to create
protocols that, when and if implemented, aim at protecting privacy of
the users, as well as help with reducing pervasive surveillance. These
efforts were in keeping with the consensus of the IETF found in RFC
7258.  Sometimes these protocols have anti-censorship qualities as
well. A few examples immediately come to mind: 1) Encryption of DNS
queries (for example DNS over HTTPS); 2) ACME protocol underpinning
the Let's Encrypt initiative and 3) Registration Data Access Protocol
(RDAP)<xref target="RFC7480"/>,<xref target="RFC7481"/>,<xref target="RFC9082"/>,<xref target="RFC9083"/>,<xref target="RFC7484"/>,
<xref target="RFC8056"/>. (It is debatable that RDAP had anything to do with
Snowden revelations but it is still a good example and is finally
being implemented.)</t>

<t>DNS Queries over HTTPS protocol aimed to encrypt DNS queries. Four
years after RFC 7258, DoH was developed to tackle both active and
passive monitoring of DNS queries. It is also a tool that can help
with combatting censorship. Before the revelations, DNS query privacy
would have been controversial due to being expensive or unnecessary but the 
Snowden revelations made it more plausible. 
Let's Encrypt was not an Internet protocol, but it was an initiative that aimed to encrypt the web and later on
some of the automation protocols were standardized in the IETF ACME
working group. The Registration Data Access Protocol could solve a
long term problem: redacting the domain name registrants (and IP
address holders) sensitive, personal data but at the same time
enabling legitimate access to the information. As to the work of HRPC
research group, it has so far issued <xref target="RFC8280"/> by ten Oever and
Cath) and a number of informational Internet-Drafts.</t>

<t>While we cannot really argue that all the movements and privacy
preserving protocols and initiatives that enable protecting human
rights at the infrastructure layer solely or directly result from Snowden
revelations, I think it is safe to say that the revelations helped
with expediting the resolution of some of the “technical” hesitations
that had an effect on fixing Internet protocols that enabled
protection of human rights.</t>

<t>Unfortunately, the Snowden revelations have not yet helped us
meaningfully with adopting a human rights approach. We can’t agree on
prioritizing human rights in our Internet communities for a host of
reasons. This could be due to: 1) human rights are sometimes in
conflict with each other 2) it is simply not possible to mitigate the
human right violation through the Internet protocol 3) it is not
obvious for the engineers before-the-fact how the Internet protocol
contributes to enabling human rights protections, or precisely what they ought to do 
 4) the protocol is already there but market, law and a
host of other societal and political issues do not allow for
widespread implementation.</t>

<t>IETF did not purposefully take a long time to adopt and implement protocols that
enabled human rights. There were technical and political issues that
created barriers. For example, as WHOIS was not capable of accommodating a tiered access option, 
the IETF community attempted a few times before to create a protocol that would disclose the necessary
information of IP holders and domain name registrants while at the
same time protecting their data (CRISP and later on IRIS are the
examples). However, IRIS was technically very difficult to implement. It was not until RDAP was developed and the
General Data Protection Regulation (GDPR) was enacted that Internet
Corporation for Assigned Names and Numbers had to consider instructing
registries and registrars to implement RDAP and its community had to
come up with a privacy compliant policy.  Overall, a host of
regulatory and market incentives can halt or slow down the
implementation of human rights enabling protocols and implementation
could depend on other organizations with their own political and
stakeholder conflicts. Sometimes the protocol is available, but the regulatory framework and
the market do not allow for implementation. 
Sometimes the surrounding context includes 
practical dimensions that are easy to overlook in a purely engineering-focused argument.<br />
A curious example of this is sanctions regimes that target transactions involving
economically-valuable assets.  As a result, sanctions might limit
sanctioned nations' and entities' access to IPv4 resources (because the existence of
a resale market for these addresses causes acquiring them to be
interpreted as buying something of value), though the same consideration
may not apply to IPv6 address resources.  But IPv6 adoption itself
depends on a host of complex factors that are by no means limited to
technical comparisons of the properties of IPv4 and IPv6.  Someone
focused only on technical features of protocols may devise an elegant
solution but be surprised both by deployment challenges and unintended
downstream effects.
Sometimes there are arguments over implementation of a protocol
because as it is perceived, while it can protect freedom of expression
and reduce surveillance, it can hamper other human rights. For
instance, we still have doubts about implementing DNS over HTTPS
without seriously considering its contributions to fight with
censorship and bring encryption to DNS queries. The arguments against
implementation of DoH include protection of children online and lack
of law enforcement access to data.</t>

<t>We must acknowledge that sometimes the technical solutions that we use
that protect one right (for example encryption to protect the right to
privacy or prevent surveillance) could potentially affect technical
and policy solutions that try to protect other human rights (for
example encryption could prevent financial institutions from
monitoring employees' network activities to detect fraudulent
behavior). Acknowledging and identifying these conflicts can help us
come up with alternative techniques that could protect human rights
while not hampering other technical solutions such as
encryption. Where such alternative techniques are not possible,
acknowledging the shortcoming could clarify and bring to light the
trade-offs that we have accepted in our Internet system.</t>

<t>Ironically, we advocate for connectivity and believe expressing
oneself on the Internet is a human right, but when a war erupts, we
resort to tools that impact that very concept. For example, some
believe via imposing sanctions on critical properties of the Internet,
we can punish the perpetrators of a war. The Regional Internet
Registries that are in charge of registration of IP addresses have
shown resilience to these requests.  However, some tech-companies, for
example Cogent <xref target="Roth2022"/>, decided not to serve sanctioned countries
and over-comply with sanctions. Over-compliance with sanctions could
hamper ordinary people's access to the Internet. <xref target="Badii2023"/></t>

<t>Perhaps we can solve some of these problems by undertaking a thorough
impact assessment and contextualization to reveal how and why Internet
protocols affect human rights (something Fidler and I argued
for <xref target="Badii2021"/>). Contextualization and
impact assessment can reveal how each Internet protocol or each line
of code, in which systems, have an impact on which and whose human
rights.</t>

<t>The HRPC RG (which I am a part of) and the larger human rights and
policy analyst communities are still struggling to analyze legal,
social and market factors alongside the protocols to have a good
understanding of what has an impact and what has to be changed. It is
hard, but it is not impossible. If we thoroughly document and research
the lifecycle of an Internet protocol and contextualize it, we might
have a better understanding of how and if we can actually fix which
parts of the protocol in order to protect human rights.</t>

<t>Overall, the revelations did, to some extent, contribute to the
evolution of our ideas and perspectives. Our next step should be to
undertake research on the impact of Internet systems (including
Internet protocols) on human rights, promote the implementation of
protocols good for human rights through policy and advocacy and focus
on which technical parts we can standardize to help with more
widespread implementation of human rights enabling Internet protocols.</t>

</section>
<section anchor="steven-m-bellovin-governments-and-cryptography-the-crypto-wars"><name>Steven M. Bellovin: Governments and Cryptography: The Crypto Wars</name>

<section anchor="historical-background"><name>Historical Background</name>

<t>It’s not a secret: many governments in the world don’t like it when
people encrypt their traffic. More precisely, they like strong
cryptography for themselves but not for others, whether those others
are private citizens or other countries. But the history is longer and
more complex than that.</t>

<t>For much of written history, both governments and individuals used
cryptography to protect their messages. To cite just one famous
example, Julius Caesar is said to have encrypted messages by shifting
letters in the alphabet by 3 <xref target="Kahn1996"/>. In modern parlance, 3 was
the key, and each letter was encrypted with</t>

<ul empty="true"><li>
  <t>C[i] = (P[i] + 3) mod 23</t>
</li></ul>

<t>(The Latin alphabet of his time had only 23 letters.)
Known
Arabic writings on cryptanalysis go back to at least the 8th century;
their sophistication shows that encryption was reasonably commonly
used. In the 9th century, Abu Yusuf Ya’qub ibn ‘Ishaq aṣ-Ṣabbah
al-Kindh developed and wrote about frequency analysis as a way to
crack ciphers <xref target="Borda2011"/>,<xref target="Kahn1996"/>.</t>

<t>In an era of minimal literacy, though, there wasn’t that much use of
encryption, simply because most people could neither read nor
write. Governments used encryption for diplomatic messages, and
cryptanalysts followed close behind. The famed Black Chambers of the
Renaissance era read messages from many different governments, while
early cryptographers devised stronger and stronger ciphers
<xref target="Kahn1996"/>. In Elizabethan times in England, Sir Francis Walsingham’s
intelligence agency intercepted and decrypted messages from Mary,
Queen of Scots; these messages formed some of the strongest evidence
against her and eventually led to her execution <xref target="Kahn1996"/>.</t>

<t>This pattern continued for centuries. In the United States, Thomas
Jefferson invented the so-called wheel cipher in the late 18th
century; it was reinvented about 100 years later by Etienne Bazeries
and used as a standard American military cipher well into World War II
<xref target="Kahn1996"/>. Jefferson and other statesmen of that era regularly used
cryptography when communicating with each other. An encrypted message
was even part of the evidence introduced in Aaron Burr’s 1807 trial
for treason <xref target="Kerr2020"/>,<xref target="Kahn1996"/>. Edgar Allan Poe claimed that he
could cryptanalyze any message sent to him <xref target="Kahn1996"/>.</t>

<t>The telegraph era upped the ante. In the U.S., just a year after
Samuel Morse deployed his first telegraph line between Baltimore and
Washington, his business partner, Francis Smith, published a codebook
to help customers protect their traffic from prying eyes
<xref target="Smith1845"/>.  In 1870, Britain nationalized its domestic telegraph network;
in response, Robert Slater published a more sophisticated codebook
<xref target="Slater1870"/>. On the government side, Britain took advantage of its
position as the central node in the world’s international telegraphic
networks to read a great deal of traffic passing through the country
<xref target="Headrick1991"/>,<xref target="Kennedy1971"/>. They used this ability strategically,
too—when war broke out in 1914, the British Navy cut Germany’s
undersea telegraph cables, forcing them to use radio; an intercept of
the so-called Zimmermann telegram, when cryptanalyzed, arguably led to
American entry into the war and thence to Germany’s defeat. Once the
U.S. entered the war, it required users of international telegraph
lines to deposit copies of the codebooks they used for compression, so
that censors could check messages for prohibited content <xref target="Kahn1996"/>.</t>

<t>In Victorian Britain, private citizens, often lovers, used encryption
in newspapers’ Personal columns to communicate without their parents’
knowledge. Charles Wheatstone and Charles Babbage used to solve these
elementary ciphers routinely, for their own amusement <xref target="Kahn1996"/>.</t>

<t>This pattern continued for many years. Governments regularly used
ciphers and codes, while other countries tried to break them; private
individuals would sometimes use encryption but not often, and rarely
well. But the two world wars marked a sea change, one that would soon
reverberate into the civilian world.</t>

<t>The first World War featured vast troop movements by all parties; this
in turn required a lot of encrypted communications, often by telegraph
or radio. These messages were often easily intercepted in
bulk. Furthermore, the difficulty of encrypting large volumes of
plaintext led to the development of a variety of mechanical encryption
devices, including Germany’s famed Enigma machine. World War II
amplified both trends. It also gave rise to machine-assisted
cryptanalysis, such as the United Kingdom’s bombes (derived from an
earlier Polish design) and Colossus machine, and the American’s device
for cracking Japan’s PURPLE system. The U.S. also used punch
card-based tabulators to assist in breaking other Japanese codes, such
as the Japanese Imperial Navy’s JN-25 <xref target="Kahn1996"/>,<xref target="Rowlett1998"/>.</t>

<t>These developments set the stage for the postwar SIGINT—Signals
Intelligence—environment. Many intra-government messages were sent by
radio, making them easy to intercept; advanced cryptanalytic machines
made cryptanalysis easier. Ciphers were getting stronger, though, and
government SIGINT agencies did not want to give up their access to
data. While there were undoubtedly many developments, two are well
known.</t>

<t>The first involved CryptoAG, a Swedish (and later Swiss) manufacturer
of encryption devices. The head of that company, Boris Hagelin, was a
friend of William F. Friedman, a pioneering American
cryptologist. During the 1950s, CryptoAG sold its devices to other
governments; apparently at Friedman’s behest, Hagelin weakened the
encryption in a way that let the NSA read the traffic <xref target="Miller2020"/>.</t>

<t>The story involving the British is less well-documented and less
clear. When some of Britain’s former colonies gained their
independence, the British government gave them captured, war surplus
Enigma machines to protect their own traffic. Some authors contend
that this was deceptive, in that these former colonies did not realize
that the British could read Enigma-protected traffic; others claim
that this was obvious but that these countries didn’t care: Britain
was no longer their enemy; it was neighboring countries they were
worried about. Again, though, this concerned governmental use of
encryption <xref target="Kahn1996"/>,<xref target="Baldwin2022"/>. There was still little private
use.</t>

</section>
<section anchor="the-crypto-wars-begin"><name>The Crypto Wars Begin</name>

<t>The modern era of conflict between individual’s desire for privacy and
government desires to read traffic began around 1972. The grain
harvest in the U.S.S.R. had failed; since relations between the Soviet
Union and the United States were temporarily comparatively warm, the
Soviet grain company— an arm of the Soviet government, of
course— entered into negotiations with private American
companies. Unknown to Americans at the time, Soviet intelligence was
intercepting the phone calls of the American negotiating teams. In
other words, private companies had to deal with state actors as a
threat. Eventually, U.S. intelligence learned of this, and came to a
realization: the private sector needed strong cryptography, too, to
protect American national interests <xref target="Broad1982"/>,<xref target="Johnson1998"/>). This
underscored the need for strong cryptography to protect American
civilian traffic—but the SIGINT people were unhappy at the thought of
more encryption that they couldn’t break.</t>

<t>Meanwhile, the U.S. was concerned about protecting 
unclassified data <xref target="Landau2014"/>. In 1973 and again in 1974, the
National Bureau of Standards (NBS) put out a call for a strong, modern
encryption algorithm. IBM submitted Lucifer, an internally developed
algorithm based on what has become known as a 16-round Feistel network. The
original version used a long key.
It seemed quite strong, so NBS sent it off to the NSA to
get their take. The eventual design, which was adopted in 1976 as the
Data Encryption Standard (DES), differed in some important ways from
Lucifer. 
First, the so-called S-boxes, the source of the cryptologic
strength of DES, were changed, and were now demonstrably not composed of
random integers. Many researchers alleged that the S-boxes contained
an NSA back door. It took 20 years for the truth to come out: the
S-boxes were in fact strengthened, not weakened. Most likely, IBM
independently discovered the attack now known as differential
cryptanalysis, though some scholars suspect that the NSA told them
about it. The non-random S-boxes protected against this attack. The
second change, though, was clearly insisted on by the NSA: the key size
was shortened, from Lucifer’s 112 bits to DES’s 56 bits. We now know
that the NSA wanted a 48-bit key size, while IBM wanted 64 bits; they
compromised at 56 bits.</t>

<t>Whitfield Diffie and Martin Hellman, at Stanford University, wondered
about the 56-bit keys. In 1979, they published a paper demonstrating
that the U.S. government, but few others, could afford to build a
brute-force cracking machine, one that could try all 2<sup>56</sup> possible
keys to crack a message. NSA denied tampering with the design; a
Senate investigating committee found that that was correct, but did
not discuss the shortened key length issue.</t>

<t>This, however, was not Diffie and Hellman’s greatest contribution to
cryptology. A few years earlier, they published a paper inventing what
is now known as public key cryptography. In 1978, Ronald Rivest, Adi
Shamir, and Leonard Adleman devised the RSA algorithm, which made it
usable. (An NSA employee, acting on his own, sent a letter warning
that academic conferences on cryptology might violate U.S. export
laws.)</t>

<t>Around the same time, George Davida at the University of Wisconsin
applied for a patent on a stream cipher; the NSA slapped a secrecy
order on the application. This barred him from even talking about his
invention. The publicity was devastating; the NSA had to back down.</t>

<t>The Crypto Wars had thus begun: civilians were inventing strong
encryption systems, and the NSA was tampering with them or trying to
suppress them. Bobby Inman, the then-director of the NSA, tried
creating a voluntary review process for academic papers, but very few
researchers were interested in participating <xref target="Landau1988"/>.</t>

<t>There were few major public battles during the 1980s, because there
were few new major use cases for civilian cryptography during that
time. There was one notable incident, though: Shamir, Amos Fiat, and
Uriel Feige invented zero-knowledge proofs and applied for a US
patent. In response, the US Army slapped a secrecy order on the
patent. After a great deal of public outrage and intervention by, of
all organizations, the NSA, the order was lifted on very narrow
grounds: the inventors were not American, and had been discussing
their work all over the world <xref target="Landau1988"/>.</t>

<t>In the 1990s, though, everything changed.</t>

</section>
<section anchor="the-battle-is-joined"><name>The Battle is Joined</name>

<t>There were three major developments in cryptography in the early
1990s. First, Phil Zimmermann released PGP (Pretty Good Privacy), a
package to encrypt email messages. In 1993, AT&amp;T planned to release
the TSD-3600, an easy-to-use phone encryptor aimed at business
travelers. Shortly after that, the Netscape Corporation released SSL
(Secure Socket Layer) as a way to enable web-based commerce using
their browser and web server. All of these were seen as threats by the
NSA and the FBI.</t>

<t>PGP was, at least arguably, covered by what was known as ITAR, the
International Trafficking in Arms Regulations—under American law,
encryption software was regarded as a weapon, so exports required a
license. It was also alleged to infringe the patents on the RSA
algorithm. Needless to say, both issues were problematic for what was
intended to be open source software. Eventually, the criminal
investigation into Zimmermann’s role in the spread of PGP overseas was
dropped, but the threat of such investigations remained to deter
others<xref target="Levy2001"/>.</t>

<t>The TSD-3600 was another matter. AT&amp;T was a major corporation that did
not want to pick a fight with the U.S. government, but international
business travelers were seen as a major market for the device. At the
government’s “request”, the DES chip was replaced with what was known
as the Clipper Chip. The Clipper chip used Skipjack, a cipher with
80-bit keys; it was thus much stronger against brute force attacks
than DES. However, it provided “key escrow”. Without going into any
details, the key escrow mechanism allowed U.S. government
eavesdroppers to consult a pair of (presumably secure) internal
databases and decrypt all communications protected by the chip. The
Clipper chip proved to be extremely unpopular with industry; that AT&amp;T
Bell Labs’ Matt Blaze found a weakness in the design<xref target="Blaze1994"/>, one
that let you use Skipjack without the key escrow feature, didn’t help
its reputation.</t>

<t>The third major development, SSL, was even trickier. SSL was aimed at
e-commerce, and of course Netscape wanted to be able to sell its
products outside the US. That would require an export license, so they
made a deal with the government: non-American users would receive a
version that used 40-bit keys, a key length far shorter than what the
NSA had agreed to 20 years earlier. (To get ahead of the story: there
was a compromise mode of operation, wherein an export-grade browser
could use strong encryption when talking to a financial
institution. This hybrid mode led to cryptographic weaknesses
discovered some 20 years later<xref target="Adrian2015"/>.)</t>

<t>Technologists and American industry pushed back. The IETF adopted the
Danvers Doctrine, described in <xref target="RFC3365"/>:</t>

<ul empty="true"><li>
  <t>At the 32nd IETF held in Danvers, Massachusetts during April of 1995
the IESG asked the plenary for a consensus on the strength of security
that should be provided by IETF standards.  Although the immediate
issue before the IETF was whether or not to support “export” grade
security (which is to say weak security) in standards, the question
raised the generic issue of security in general.</t>
</li></ul>

<ul empty="true"><li>
  <t>The overwhelming consensus was that the IETF should standardize on the
use of the best security available, regardless of national policies.
This consensus is often referred to as the “Danvers Doctrine”.</t>
</li></ul>

<t>Then American companies started losing business to their overseas
competitors, who did not have to comply with U.S. export laws. All of
this led to what seemed like a happy conclusion: the U.S. government
drastically loosened its export rules for cryptographic software. All
was well—or so it seemed…</t>

</section>
<section anchor="the-hidden-battle"><name>The Hidden Battle</name>

<t>Strong cryptography was here to stay, and it was no longer an American
monopoly, if indeed it ever was. The Information Assurance Directorate
of the NSA, the part of the agency that is supposed to protect
U.S. data, was pleased by the spread of strong cryptography. When the
Advanced Encryption Standard (AES) competition was held, there were no
allegations of malign NSA interference; in fact, the winning entry was
devised by two Europeans, Joan Daemen and Vincent Rijmen. But the NSA
and its SIGINT needs did not go away—the agency merely adopted other
techniques.</t>

<t>I have often noted that one doesn’t go through strong security, one
goes around it. When strong encryption became more common and much
more necessary, the NSA started going around it, by targeting
computers and the software that they run. And it seems clear that they
believe that AES is quite strong; they’ve even endorsed its use for
protecting TOP SECRET information. But there was an asterisk attached
to that endorsement: AES is suitable if and only if properly used and
implemented. Therein lies the rub.</t>

<t>The first apparent attempt to tamper with outside cryptographic
mechanisms was discovered in 2007, when two Microsoft researchers, Dan
Shumow and Niels Ferguson, noted an odd property of a
NIST-standardized random number generator, DUAL_EC_DRBG. (The NBS
had been renamed to NIST, the National Institute of Standards and
Technology.) Random numbers are vital for
cryptography, but Shumow and Ferguson showed that if certain constants
in DUAL_EC_DRBG were chosen in a particular way with a
known-but-hidden other number, whoever knew that number could predict
all future random numbers from a system given a few sample bytes to
start from <xref target="Kostyuk2022"/>. These sample bytes could come from
known keys, nonces, or anything else. Where did the constants in
DUAL_EC_DRBG come from and how were they chosen or generated? No one
who knows is talking. But although cryptographers and security
specialists were very suspicious—Bruce Schneier wrote in 2007, before
more facts came out, that “both NIST and the NSA have some explaining
to do”; I assigned my students reading on the topic—the issue didn’t
really get any traction until six years later, when among the papers
that Edward Snowden disclosed was the information that the NSA had
indeed tampered with a major cryptographic standard, though published
reports did not specifically name DUAL_EC_DRBG or explain what the
purpose was.</t>

<t>The revelations didn’t stop there. There have been allegations that
the NSA paid some companies to use DUAL_EC_DRBG in their
products. Some people have claimed that there were attempts to modify
some IETF standards to make enough random bytes visible, to aid in
exploiting the random number generator. A major vendor of networking
gear, Juniper, did use DUAL_EC_DRBG in some of its products, but with
different constants<xref target="Checkoway2016"/>. Where did these come from? Were
they from the NSA or some other government? Could their source tree
have been hacked by an intelligence agency? There was a different hack
of their code at around the same time<xref target="Moore2015"/>. No one is talking.</t>

<t>The Snowden revelations also included data suggesting that the NSA had
a worldwide eavesdropping network and a group that tried very
specific, targeted hacks on very specific targets’ systems. In
retrospect, neither is surprising: “spies gonna spy”. The NSA’s
business is signals intelligence; of course they’re going to try to
intercept traffic. Indeed, the DUAL_EC_DRBG tampering is useless to
anyone who has not collected messages to decrypt. And targeted hacks
are a natural way around strong encryption: collect the data before it
is encrypted or after it is decrypted, and don’t worry about the
strength of the algorithms.</t>

<t>The privacy community, worldwide, was appalled, though perhaps they
shouldn’t have been. It calls to mind the line that Claude Rains'
character uttered in the movie
Casablanca <xref target="Curtiz"/>: “I’m shocked, shocked to find that gambling is going on in
here.” The immediate and continuing reaction was to deploy more
encryption. The standards have long existed; what was missing was
adoption. One barrier was the difficulty and expense of getting
certificates to use with TLS, the
successor to SSL; that void was filled by Let's Encrypt <xref target="LE"/>,
which made free certificates easy to get online. Today, most HTTP
traffic is encrypted, so much so that Google’s search engine
down-ranks sites that do not use it. Major email providers uniformly
use TLS to protect all traffic. WiFi, though a local area issue, now
uses much stronger encryption. (It's important to remember that
security and insecurity have economic components. Security doesn't have
to be perfect to be very useful, if it raises the attackers' costs
by enough.)</t>

<t>The news on the software side is less good. Not a day goes by when one
does not read of organizations being hit by ransomware. It goes
without saying that any threat actor capable of encrypting disks is
also capable of stealing the information on them; indeed, that is a
frequent accompanying activity, since the threat of disclosure is
another incentive to pay for those sites that do have good enough
backups. Major vendors have put a lot of effort into securing their
software, but bugs and operational errors by end-user sites persist.</t>

</section>
<section anchor="whither-the-ietf"><name>Whither the IETF?</name>
<t>Signal intelligence agencies, not just the NSA, but its peers around
the globe—most major countries have their own—are not going to go
away. The challenges that have beset the NSA are common to all such
agencies, and their solutions are likely the same. The question is
what should be done to protect individual privacy. A number of strong
democracies, such as Australia and the United Kingdom, are, in
a resumption of the Crypto Wars,
moving to restrict encryption. Spurred on by complaints from the FBI
and other law enforcement agencies, the US Congress frequently
considers bills to do the same.</t>

<t>The IETF has long had a commitment to strong, ubiquitous
encryption. This is a good thing. It needs to continue, with
cryptography and other security features designed into protocols from
the beginning. But there is also a need for maintenance. Parameters
such as key lengths and modulus sizes age; a value that is acceptable
today may not be 10 years hence. (We’ve already seen apparent problems
from 1024-bit moduli specified in an RFC, an RFC that was not modified
when technology improved enough that attacking encryption based on
them had become feasible.<xref target="Adrian2015"/>) The IETF can do nothing about
the code that vendors ship or that sites use, but it can alert the
world that it thinks things have changed.</t>

<t>Cryptoagility is of increasing importance. In the next very few years,
we will have so-called post-quantum algorithms. Both protocols and key
lengths will need to change, perhaps drastically. Is the IETF ready?
What will happen to, say, DNSSEC if key lengths become drastically
longer? Backwards compatibility will remain important, but that, of
course, opens the door to other attacks. We’ve long thought about
them; we need to be sure that our mechanisms work—we've
been surprised in the past.<xref target="BellovinRescorla2006"/></t>

<t>We also need to worry more about metadata. General Michael Hayden,
former director of both the NSA and the CIA, once remarked, “We kill
people based on metadata” <xref target="Ferran2014"/>. But caution is necessary;
attempts to hide metadata can have side-effects. To give a trivial
example, Tor is quite strong, but if your exit node is in a different
country than you are in, web sites that use IP geolocation may present
their content in a language foreign to you.
Some sites even block connections from known Tor exit nodes.
More generally, many
attempts to hide metadata involve trusting a different party; that
party may turn out to be untrustworthy or it may itself become a
target of attack. As another prominent IETFer has remarked,
“Insecurity is like entropy; you can’t destroy it but you can move it
around.” The IETF has done a lot; it needs to do more. And remember
that the risk here is not just governments acting directly, it's also
private companies that collect the data and sell it to all comers.</t>

<t>Finally, the IETF must remember that its middle name is
“Engineering”. To me, one of the attributes of engineering is the art
of picking the right solution in an over-constrained
environment. Intelligence agencies won’t go away, nor will national
restrictions on cryptography. We have to pick the right path while
staying true to our principles.</t>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>Susan Landau added many valuable comments to Steve Bellovin's essay.</t>

<t>We thank Carsten Bormann, Brian Carpenter, Wendy Grossman, Kathleen Moriarty,
Jan Schaumann, Seth David Schoen, and Paul Wouters for comments and review of this text, though
that of course doesn't mean that they necessrily agree with the text.</t>

<t>This document was created at the behest of Eliot Lear, who also 
cat herded and did some editing.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Each or any of the authors may have forgotten or omitted things
or gotten things wrong. We're sorry if that's the case, but that's
in the nature of a look-back such as this. Such flaws almost 
certainly won't worsen security or privacy though.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>No changes to IANA processes are made by this memo.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>

<reference anchor="guard2013" >
  <front>
    <title>NSA collecting phone records of millions of Verizon customers daily</title>
    <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
      <organization>The Guardian</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="ACME" target="https://datatracker.ietf.org/wg/acme/">
  <front>
    <title>Automated Certificate Management Environment (ACME)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Perpass-BoF" target="https://www.ietf.org/proceedings/88/perpass.html">
  <front>
    <title>IETF 88 Perpass BoF session</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="CFRG" target="https://datatracker.ietf.org/rg/cfrg/">
  <front>
    <title>IRTF Crypto Forum (CFRG)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="CURDLE" target="https://datatracker.ietf.org/wg/curdle/">
  <front>
    <title>curdle WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Curtiz" >
  <front>
    <title>Casablanca</title>
    <author initials="M." surname="Curtiz" fullname="Michael Curtiz">
      <organization></organization>
    </author>
    <author initials="J. J." surname="Epstein" fullname="Julius J. Epstein">
      <organization></organization>
    </author>
    <author initials="P. G." surname="Epstein" fullname="Philip G. Epstein">
      <organization></organization>
    </author>
    <author initials="H." surname="Koch" fullname="Howard Koch">
      <organization></organization>
    </author>
    <date year="1942"/>
  </front>
</reference>
<reference anchor="dual-ec" target="https://eprint.iacr.org/2015/767.pdf">
  <front>
    <title>Dual EC, A standardized back door</title>
    <author initials="D." surname="Bernstein" fullname="Daniel Bernstein">
      <organization></organization>
    </author>
    <author initials="T." surname="Lange" fullname="Tanja Lange">
      <organization></organization>
    </author>
    <author initials="R." surname="Niederhagen" fullname="Ruben Niederhagen">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="LE" target="https://dl.acm.org/doi/pdf/10.1145/3319535.3363192">
  <front>
    <title>Let's Encrypt - an automated certificate authority to encrypt the entire web</title>
    <author initials="J." surname="Aas" fullname="Josh Aas">
      <organization></organization>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization></organization>
    </author>
    <author initials="B." surname="Case" fullname="Benton Case">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Eckersley" fullname="Peter Eckersley">
      <organization></organization>
    </author>
    <author initials="A." surname="Flores-López" fullname="Alan Flores-López">
      <organization></organization>
    </author>
    <author initials="A." surname="Halderman" fullname="Alex Halderman">
      <organization></organization>
    </author>
    <author initials="J." surname="Hoffman-Andrews" fullname="Jacob Hoffman-Andrews">
      <organization></organization>
    </author>
    <author initials="J." surname="Kasten" fullname="James Kasten">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="S. D." surname="Schoen" fullname="Seth David Schoen">
      <organization></organization>
    </author>
    <author initials="B." surname="Warren" fullname="Brad Warren">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="MADINAS" target="https://datatracker.ietf.org/wg/madinas/">
  <front>
    <title>MADINAS WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="perpass" target="https://mailarchive.ietf.org/arch/browse/perpass/">
  <front>
    <title>perpass mailing list</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="plenary-video" target="https://www.youtube.com/watch?v=oV71hhEpQ20&amp;pp=ygUQaWV0ZiA4OCBwbGVuYXJ5IA%3D%3D">
  <front>
    <title>IETF 88 Technical Plenary: Hardening The Internet</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="refs-to-7258" target="https://datatracker.ietf.org/doc/rfc7258/referencedby/">
  <front>
    <title>References to RFC7258</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="timeline" target="https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)">
  <front>
    <title>Global surveillance disclosures (2013–present)</title>
    <author >
      <organization>Wikimedia foundation</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="STRINT" target="https://www.w3.org/2014/strint/">
  <front>
    <title>A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="Toronto" target="https://www.npr.org/sections/thetwo-way/2014/01/31/269418375/airport-wi-fi-used-to-track-travelers-snowden-leak-alleges">
  <front>
    <title>Canada Used Airport Wi-Fi To Track Travelers, Snowden Leak Alleges</title>
    <author >
      <organization>National Public Radio</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="UTA" target="https://datatracker.ietf.org/wg/uta/">
  <front>
    <title>Using TLS in Applications working group (UTA) working group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Kahn1996" >
  <front>
    <title>The Code Breakers, 2nd Edition</title>
    <author initials="D." surname="Kahn" fullname="David Kahn">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
<refcontent>Scribner</refcontent></reference>
<reference anchor="Borda2011" >
  <front>
    <title>Fundamentals in Information Theory and Coding. Berlin</title>
    <author initials="M." surname="Borda" fullname="Monica Borda">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<refcontent>Springer</refcontent></reference>
<reference anchor="Kerr2020" >
  <front>
    <title>Decryption Originalism: The Lessons of Burr.</title>
    <author initials="O. S." surname="Kerr" fullname="Orin Kerr">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="Harvard Law Review" value="134:905"/>
</reference>
<reference anchor="Smith1845" target="http://books.google.com/books?id=Z45clCxsF7EC">
  <front>
    <title>The Secret Corresponding Vocabulary, Adapted for Use to Morse’s Electro-Magnetic Telegraph: And Also in Conducting Written Correspondence, Transmitted by the Mails, or Otherwise</title>
    <author initials="F. O." surname="Smith" fullname="Francis O. Smith">
      <organization></organization>
    </author>
    <date year="1845"/>
  </front>
<refcontent>Thurston, Isley &amp; Co</refcontent></reference>
<reference anchor="Slater1870" target="http://books.google.com/books?id=MJYBAAAAQAAJ">
  <front>
    <title>Telegraphic Code, to Ensure Secresy in the Transmission of Telegrams, First Edition.</title>
    <author initials="R." surname="Slater" fullname="Robert Slater">
      <organization></organization>
    </author>
    <date year="1870"/>
  </front>
<refcontent>W.R. Gray</refcontent></reference>
<reference anchor="Headrick1991" >
  <front>
    <title>The Invisible Weapon: Telecommunications and International Politics, 1851–1945</title>
    <author initials="D. R." surname="Headrick" fullname="Daniel R. Headrick">
      <organization></organization>
    </author>
    <date year="1991"/>
  </front>
<refcontent>Oxford University Press</refcontent></reference>
<reference anchor="Kennedy1971" target="http://www.jstor.org/stable/563928">
  <front>
    <title>Imperial Cable Communications and Strategy, 1870-1914</title>
    <author initials="P. M." surname="Kennedy" fullname="Paul M. Kennedy">
      <organization></organization>
    </author>
    <date year="1971"/>
  </front>
  <seriesInfo name="English Historical Review" value="86 (341): 728–52"/>
</reference>
<reference anchor="Rowlett1998" >
  <front>
    <title>The Story of MAGIC: Memoirs of an American Cryptologic Pioneer</title>
    <author initials="F. B." surname="Rowlett" fullname="Frank B. Rowlett">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
<refcontent>Aegean Park Press</refcontent></reference>
<reference anchor="Miller2020" target="https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/">
  <front>
    <title>The Intelligence Coup of the Century</title>
    <author initials="G." surname="Miller" fullname="Greg Miller">
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
<refcontent>The Washington Post</refcontent></reference>
<reference anchor="Baldwin2022" target="https://drenigma.org/2022/03/02/did-britain-sell-enigmas-postwar/">
  <front>
    <title>Did Britain Sell Enigmas Postwar?</title>
    <author initials="M." surname="Baldwin" fullname="Mark Baldwin">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<refcontent>Dr. Enigma (blog)</refcontent></reference>
<reference anchor="Broad1982" >
  <front>
    <title>Evading the Soviet Ear at Glen Cove</title>
    <author initials="W. J." surname="Broad" fullname="William J. Broad">
      <organization></organization>
    </author>
    <date year="1982"/>
  </front>
  <seriesInfo name="Science" value="217 (3): 910–11"/>
</reference>
<reference anchor="Landau1988" >
  <front>
    <title>Zero Knowledge and the Department of Defense</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Notices of the American Mathematical Society [Special Article Series]" value="35 (1): 5–12"/>
</reference>
<reference anchor="Landau2014" >
  <front>
    <title>Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Journal of National Security Law &amp; Policy" value="Vol 7, No. 3"/>
</reference>
<reference anchor="Johnson1998" target="https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/cryptologic-histories/cold_war_iii.pdf">
  <front>
    <title>American Cryptology During the Cold War, 1945-1989; Book III: Retrenchment and Reform</title>
    <author initials="T. R." surname="Johnson" fullname="Thomas R. Johnson">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
<refcontent>NSA</refcontent></reference>
<reference anchor="Kostyuk2022" target="https://www.harvardnsj.org/wp-content/uploads/sites/13/2022/06/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf">
  <front>
    <title>Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process</title>
    <author initials="N." surname="Kostyuk" fullname="Nadyia Kostyuk">
      <organization></organization>
    </author>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Harvard National Security Journal" value="13 (2): 224–84"/>
</reference>
<reference anchor="Ferran2014" target="https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-based-on-metadata">
  <front>
    <title>Ex-NSA Chief: "We Kill People Based on Metadata"</title>
    <author initials="L." surname="Ferran" fullname="Lee Ferran">
      <organization></organization>
    </author>
    <date year="2014" month="May"/>
  </front>
<refcontent>ABC News</refcontent></reference>
<reference anchor="Adrian2015" target="https://weakdh.org/imperfect-forward-secrecy.pdf">
  <front>
    <title>Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.</title>
    <author initials="D." surname="Adrian" fullname="David Adrian">
      <organization></organization>
    </author>
    <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Gaudry" fullname="Pierrick Gaudry">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<refcontent>Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS)</refcontent></reference>
<reference anchor="BellovinRescorla2006" target="https://www.cs.columbia.edu/~smb/papers/new-hash.pdf">
  <front>
    <title>Deploying a New Hash Algorithm</title>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization></organization>
    </author>
    <author initials="E. K." surname="Rescorla" fullname="Eric K. Rescorla">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<refcontent>Proceedings of NDSS '06</refcontent></reference>
<reference anchor="Blaze1994" target="http://www.mattblaze.org/papers/eesproto.pdf">
  <front>
    <title>Protocol Failures in the Escrowed Encryption Standard</title>
    <author initials="M." surname="Blaze" fullname="Matt Blaze">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
<refcontent>Proceedings of Second ACM Conference on Computer and Communications Security</refcontent></reference>
<reference anchor="Checkoway2016" target="https://dl.acm.org/citation.cfm?id=2978395">
  <front>
    <title>A Systematic Analysis of the Juniper Dual EC Incident</title>
    <author initials="S." surname="Checkoway" fullname="Stephen Checkoway">
      <organization></organization>
    </author>
    <author initials="J." surname="Maskiewicz" fullname="Jacob Maskiewicz">
      <organization></organization>
    </author>
    <author initials="C." surname="Garman" fullname="Christina Garman">
      <organization></organization>
    </author>
    <author initials="J." surname="Fried" fullname="Joshua Fried">
      <organization></organization>
    </author>
    <author initials="S." surname="Cohney" fullname="Shaanan Cohney">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <author initials="R. P." surname="Weinmann" fullname="Ralf-Philipp Weinmann">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="" surname="Hovav Shacham" fullname="Hovav Shacham">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security" value="468–79"/>
</reference>
<reference anchor="Levy2001" >
  <front>
    <title>Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age</title>
    <author initials="S." surname="Levy" fullname="Steven Levy">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
<refcontent>Viking</refcontent></reference>
<reference anchor="Moore2015" target="https://www.rapid7.com/blog/post/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor/">
  <front>
    <title>CVE-2015-7755: Juniper ScreenOS Authentication Backdoor</title>
    <author initials="H. D." surname="Moore" fullname="H.D. Moore">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<refcontent>Rapid7 Blog</refcontent></reference>
<reference anchor="Doria2012" target="https://www.internetsociety.org/resources/doc/2012/human-rights-and-internet-protocols-comparing-processes-and-principles/">
  <front>
    <title>Human Rights and Internet Protocols: Comparing Processes and Principles</title>
    <author initials="A." surname="Doria" fullname="Avri Doria">
      <organization></organization>
    </author>
    <author initials="J." surname="Liddicoat" fullname="Joy Liddicoat">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
<refcontent>The Internet Society</refcontent></reference>
<reference anchor="Garfinkel1995" >
  <front>
    <title>GPG: Pretty Good Privacy</title>
    <author initials="S." surname="Garfinkel" fullname="Simson Garfinkel">
      <organization></organization>
    </author>
    <date year="1995"/>
  </front>
<refcontent>O'Reilly and Associates</refcontent></reference>
<reference anchor="Masnick2023" target="https://copia.is/library/unintended-consequences/">
  <front>
    <title>The Unintended Consequences of Internet Regulation</title>
    <author initials="M." surname="Masnick" fullname="Mike Masnick">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Roth2022" target="https://www.theverge.com/2022/3/5/22962822/internet-backbone-provider-cogent-shuts-off-service-russia">
  <front>
    <title>Internet backbone provider shuts off service in Russia</title>
    <author initials="E." surname="Roth" fullname="Emma Roth">
      <organization></organization>
    </author>
    <date year="2022" month="March"/>
  </front>
<refcontent>The Verge</refcontent></reference>
<reference anchor="zubhoff2019" >
  <front>
    <title>The age of surveillance capitalism, The fight for a human future at the new frontier of power</title>
    <author initials="S." surname="Zuboff" fullname="Shoshana Zuboff">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="ISBN" value="9781781256855"/>
<refcontent>Profile Books</refcontent></reference>
<reference anchor="Badii2023" target="https://digitalmedusa.org/wp-content/uploads/2023/05/SanctionsandtheInternet-DigitalMedusa.pdf">
  <front>
    <title>Sanctions and the Internet</title>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
&RFC7687;
&RFC7258;
&RFC8446;
&I-D.ietf-tls-esni;
&RFC7858;
&RFC8484;
&RFC7540;
&RFC9000;
&I-D.farrelll-mpls-opportunistic-encrypt;
&RFC8461;
&RFC7217;
&RFC8064;
&RFC8981;
&RFC1984;
&RFC6462;
&RFC7480;
&RFC7481;
&RFC9082;
&RFC9083;
&RFC7484;
&RFC8056;
&RFC8280;
&DOI.10.5325_jinfopoli.11.2021.0376;
&RFC3365;


    </references>


<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>RFC editor: please remove this section.</t>

<t>Drafts -03 and -04:</t>

<t><list style="symbols">
  <t>(mostly) Changes based on Schoen review</t>
</list></t>

<t>Draft -02:</t>

<t><list style="symbols">
  <t>A bunch of typo fixes and added acks.</t>
</list></t>

<t>Draft -01:</t>

<t><list style="symbols">
  <t>Changes based on ISE review</t>
</list></t>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

