<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-tenoever-hrpc-unrequested-00" category="info">

  <front>
    <title abbrev="hrpcurq">Unrequested Communications</title>

    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>ARTICLE 19</organization>
      <address>
        <email>niels@article19.org</email>
      </address>
    </author>
    <author initials="G." surname="Perez de Acha" fullname="Gisela Perez de Acha">
      <organization>Derechos Digitales</organization>
      <address>
        <email>gisela@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="C.J.N." surname="Cath" fullname="Corinne Cath">
      <organization>Oxford Internet Institute</organization>
      <address>
        <email>corinnecath@gmail.com</email>
      </address>
    </author>

    <date year="2017" month="October" day="16"/>

    <area>General</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document addresses the topic of unrequested traffic in the form of spam or DDoS attacks. Instead of solely discussing these topics from a mere technical angle, it also addresses human rights implications of unrequested traffic.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>While researching the human rights impact of the Internet infrastructure we came across several cases which called upon the need to balance rights. The balancing of human rights <xref target="UDHR"/> <xref target="ICCPR"/> is a process in which two conflicting rights, or two uses of the same right, need to be reconciled.</t>

<t>We will specifically look at Distributed Denial of Service (DDoS) attacks as well as unwanted messaging such as spam.</t>

</section>
<section anchor="glossary" title="Glossary">

</section>
<section anchor="research-questions" title="Research Questions">

<t>Overal question:</t>

<t><list style="symbols">
  <t>Should the IETF develop or change its position on unrequested messaging</t>
</list></t>

<t>Specific questions</t>

<t><list style="symbols">
  <t>Are Distributed Denial of Service (DDoS) attacks a legitimate form of online protest protected by the right to freedom of speech and association?</t>
  <t>Is spam a legitimate way of making use of the right to freedom of expression?</t>
</list></t>

</section>
<section anchor="analysis" title="Analysis">

<section anchor="ddos-attacks" title="DDOS Attacks">

<t>Are Distributed Denial of Service (DDoS) attacks a legitimate form of online protest protected by the right to freedom of speech and association? Can they be seen as the equivalent to ‘million-(wo)men marches’, or sit-ins? Or are they a threat to freedom of expression and access to information, by limiting access to websites and in certain cases the freedom of speech of others? These questions are crucial in our day and age, where political debates, civil disobedience and other forms of activism are increasingly moving online.</t>

<t>Many individuals, not excluding IETF engineers, have argued that DDoS attacks are fundamentally against freedom of speech. Technically DDoS attacks are when one or multiple host overload the bandwidth or resources of another host by flooding it with traffic, causing it to temporarily stop being available to users. One can roughly differentiate three types of DDoS attacks: Volume Based Attacked (This attack aims to make the host unreachable by using up all it’s bandwith, often used techniques are: UDP floods and ICMP floods), Protocol Attacks (This attacks aims to use up actual server resources, often used techniques are SYN floods, fragmented packet attacks, and Ping of Death <xref target="RFC4949"/>) and Application Layer Attacks (this attack aims to bring down a server, such as the webserver).</t>

<t>In their 2010 report Zuckerman et al argue that DDoS attacks are a bad thing because they are increasingly used by governments to attack and silence critics. Their research demonstrates that in many countries independent media outlets and human rights organizations are the victim of DDoS attacks, which are directly or indirectly linked to their governments. These types of attacks are particularly complicated because attribution is difficult, creating a situation in which governments can effectively censor content, while being able to deny involvement in the attacks <xref target="Zuckerman"/>. DDoS attacks can thus stifle freedom of expression, complicate the ability of independent media and human rights organizations to exercise their right to (online) freedom of association, while facilitating the ability of governments to censor dissent. When it comes to comparing DDoS attacks to protests in offline life, it is important to remember that only a limited number of DDoS attacks involved solely willing participants. In most cases, the clients are hacked computers of unrelated parties that have not consented to being part of a DDoS (for exceptions see Operation Abibil <xref target="Abibil"/> or the Iranian Green Movement DDoS <xref target="GreenMovement"/>).</t>

<t>In addition, DDoS attacks are increasingly used as an extortion tactic, with criminals flooding a website – rendering it inaccessible – until the owner pays them a certain amount of money to stop the attack. The costs of mitigating such attacks, either by improving security to prevent them or paying off the attackers, ends up being paid by the consumer.</t>

<t>All of these issues seem to suggest that the IETF should try to ensure that their protocols cannot be used for DDoS attacks. Decreasing the number of vulnerabilities in the network stacks of routers or computers, reducing flaws in HTTPS implementations, and depreciating non-secure HTTP protocols could address this issue. The IETF can clearly play a role in bringing about some of these changes, and has indicated in <xref target="RFC7258"/> its commitment to mitigating ‘pervasive monitoring (…) in the design of IETF protocols, where possible.’ This means the use of encryption should become standard. Effectively, for the web this means standardized use of HTTPS. The IETF could redirect its work such that HTPPS becomes part-and-parcel of its standards. However, next to the various technical trade-offs that this might lead to it is important to consider that DDoS attacks are sometimes seen as a method for exercising freedom of speech.</t>

<t>DDoS although disruptive, and silencing at times, can also enable as protest and speech. Or as Sauter <xref target="Sauter"/> argues: ‘though DDoS as a tactic is still relatively novel, it fits within a centuries-long tradition of breaking laws and disrupting business as usual to make a political point. These actions aren’t simply disruption for disruption’s sake. Rather they serve to help the activist or dissenter to direct the attention of the public through the interpolation of difference into routine.’ (30-31). An often heard argument against DDoS attacks is that you cannot construe it as a means to exercise your right to freedom of speech, when the means used effectively impede the right of the party on the receiving end of the attack to exercise that same right. The problem with this line of argumentation is that it conveniently ignores the fact that online DDoS attacks are often one of the few effective ways for activists to gain the attention of the media, the government or other parties of interest. Simply putting up a website for a cause won’t garner the same amount of attention as directly confronting the issue via the website of the individual or organization at the heart of the issue. The ability of activists to do so should be protected, especially considering the fact that as Sauter (2014:4) explains: ‘Collectively, we have allowed the construction of an entire public sphere, the Internet, which by accidents of evolution and design, has none of the inherent free speech guarantees we have come to expect. Dissenting voices are pushed out of the paths of potential audiences, effectively removing them from the public discourse. There is nowhere online for an activist to stand with her friends and her sign. She might set up a dedicated blog—which may or may not ever be read—but it is much harder for her to stand collectively with others against a corporate giant in the online space.’ Although the Internet is often compared to public space, it is not. Rather the opposite. The Internet is almost entirely owned by private entities. And the IETF plays a crucial role in developing this privatized commercialized Internet.</t>

<t>From a legal and political perspective, the IETF does not have the legitimacy to determine when a DDoS is legitimate (in legal or political terms). It does not have the capability to make this judgment as a matter of public policy and subsequently translate it to code. Nor should the IETF try to do so. From a technical perspective, the difference between a ‘legitimate’ and ‘illegitimate’ DDoS attack is meaningless because it would be extremely difficult for the IETF to engineer a way to detect that difference. In addition, there is a need for the IETF to be consistent in the face of attacks (an attack is an attack is an attack) to maintain the viability of the network. Arguing that some DDoS attacks should be allowed, based on the motivation of the attackers complicates the work of the IETF. Because it approaches PM regardless of the motivation of the attackers (see <xref target="RFC7258"/>) for reasoning), taking the motivation of the attackers into account for DDoS would indirectly undermine the ability of the IETF to protect the right to privacy because it introduces an element of inconsistency into how the IETF deals with attacks.</t>

<t>David Clark recently published a paper warning that the future of the Internet is in danger. He argues that the private sector control over the Internet is too strong, limiting the myriad of ways in which it can be used <xref target="Daedalus"/>, including for freedom of speech. But just because freedom of speech, dissent, and protest are human rights, and DDoS is a potential expression of those rights, doesn’t mean that DDoS in and of itself is a right. To widen the analogy, just because the Internet is a medium through which the right to freedom of expression can be exercised does not make access to the Internet or specific ICTs or NCTs a human right. Uses of DDoS might or might not be legitimate for political reasons, but the IETF has no means or methods to assess this, and in general enabling DDoS would mean a deterioration of the network and thus freedom of expression.</t>

<t>In summation, the IETF cannot be expected to take a moral stance on DDoS attacks, or create protocols to enable some attacks and inhibit others. But what it can do is critically reflect on its role in creating a commercialized Internet without a defacto public space or inherent protections for freedom of speech.</t>

</section>
<section anchor="spam-filter-bubbles-and-unrequested-messaging" title="Spam, filter bubbles, and unrequested messaging">

<t>In the 1990s as the internet became more and more commercial, spam came to be defined as irrelevant or unsolicited messages that were porsted many times to multiple news groups or mailing lists <xref target="Marcus"/>. Here the question of consent is crucial. In the 2000s a large part of the discussion revolved around the fact that certain corporations -protected by the right to freedom of association- considered spam to be a form of “comercial speech”, thus encompassed by free expression rights <xref target="Marcus"/>. Nonetheless, if we consider that the rights to assembly and association also mean that “no one may be compelled to belong to an association” <xref target="UDHR"/>, spam infringes both rights if an op-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not know.</t>

<t>This leaves us with an interesting case: spam is currently handled mostly by mailproviders on behalf of the user, next to that countries are increasingly adopting opt-in regimes for mailinglists and commercial e-mail, with a possibility of serious fines in case of violation.</t>

<t>While this protects the user from being confronted with unwanted messages, it also makes it legally and technically very difficult to communicate a message to someone who did not explicitly ask for this. In public offline spaces we regularly get exposed to flyers, invitations or demonstrations where our opinions get challenged, or we are invited to consider different viewpoints. There is no equivalent on the Internet with the technical and legal regime that currently operates in it. In other words, it is nearly impossible  to provide information, in a proportionate manner, that someone is not explicility expecting or asking for. This reinforces a concept that is regularly discussed on the application level, called ‘filter bubble’: “The proponents of personalization offer a vision of a custom-tailored world, every facet of which fits us perfectly. It’s a cozy place, populated by our favorite people and things and ideas.” <xref target="Pariser"/>. “The filter bubble’s costs are both personal and cultural. There are direct consequences for those of us who use personalized filters. And then there are societal consequences, which emerge when masses of people begin to live a filter bubbled-life (…). Left to their own devices, personalization filters serve up a kind of invisible autopropaganda, indoctrinating us with our own ideas, amplifying our desire for things that are familiar and leaving us oblivious to the dangers lurking in the dark territory of the uknown.” <xref target="Pariser"/>.</t>

<t>It seems that the ‘filter bubble’-effect can also be observed at the infrastructure level, which actually strenghtens the impact and thus hampers the effect of collective expression. This could be interpretated as an argument for the injection of unrequested messages, spam or other unrequested notifications. But the big difference between the proliferation of such messages offline and online is the investment that is needed. It is not hard for a single person to message a lot of people, whereas if that person needed to go house by house the scale and impact of their actions would be much smaller. Inversely if it were a common practice to expose people to unwanted messages online, users would be drowned in such messages, and no expression would be possible anymore.  Allowing illimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody listens.</t>

<t>Here the argument is very similar to DDoS attacks: whereas one could argue for legitimate uses in limited specific cases, these would be drowned out by a malicious use which constitutes an attack on the internet infrastructure and thus the assembly or association itself.</t>

</section>
</section>
<section anchor="conclusion" title="Conclusion">

<t>While there might be narrow individual cases in which DDoS attacks or spam could be used to rightfully excercise freedom of expression, overal DDoS and spam are a self-defeating practice which harms both the Internet infrastructure and freedom of expression.</t>

<t>The growing use of spam and DDoS attacks also leads to an increased dependency of website owners to rely on third party services for DDoS protection which leads to centralization and thus hampers the resilience of the Internet. Furthermore the increase in spam attacks makes it harder for individuals to run a mailserver because of risks for hijacking and blacklisting of the mailserver, as well as the difficulties in filtering spam from messages that are actually wanted.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>As this draft concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no actions for IANA.</t>

</section>
<section anchor="research-group-information" title="Research Group Information">

<t>The discussion list for the IRTF Human Rights Protocol Considerations Research Group is located at the e-mail address
<eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference  anchor="RFC7258" target='https://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='May' />
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>


<reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
  <front>
    <title>The Universal Declaration of Human Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1948"/>
  </front>
</reference>
<reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
  <front>
    <title>International Covenant on Civil and Political Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1976"/>
  </front>
</reference>
<reference anchor="Zuckerman" target="https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf">
  <front>
    <title>Report on Distributed Denial of Service (DDoS) Attacks</title>
    <author initials="E." surname="Zuckerman">
      <organization></organization>
    </author>
    <author initials="H." surname="Roberts">
      <organization></organization>
    </author>
    <author initials="R." surname="McGrady">
      <organization></organization>
    </author>
    <author initials="J." surname="York">
      <organization></organization>
    </author>
    <author initials="J." surname="Palfrey">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
  <seriesInfo name="The Berkman Center for Internet and Society at Harvard University" value=""/>
</reference>
<reference anchor="Sauter" >
  <front>
    <title>The Coming Swarm</title>
    <author initials="M." surname="Sauter">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Bloomsbury, London" value=""/>
</reference>
<reference anchor="Abibil" target="http://ddanchev.blogspot.be/2012/09/dissecting-operation-ababil-osint.html">
  <front>
    <title>Dissecting 'Operation Ababil' - an OSINT Analysis</title>
    <author initials="D." surname="Danchev">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="GreenMovement" target="https://www.nartv.org/2009/06/16/iran-ddos/">
  <front>
    <title>Iran DDoS</title>
    <author initials="N." surname="Villeneuve">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>
<reference anchor="Daedalus" target="http://www.mitpressjournals.org/toc/daed/current">
  <front>
    <title>The Contingent Internet</title>
    <author initials="D." surname="Clark">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Daedalus Winter 2016, Vol. 145, No. 1. p. 9–17" value=""/>
</reference>
<reference anchor="Pariser" >
  <front>
    <title>The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think</title>
    <author initials="E." surname="Pariser">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="Peguin Books, London." value=""/>
</reference>
<reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
  <front>
    <title>Commercial Speech on the Internet: Spam and the first amendment</title>
    <author initials="J.A." surname="Marcus">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

