Research into Human Rights Protocol Considerations
draft-tenoever-hrpc-research-02

The information below is for an old version of the document
Document Type Active Internet-Draft (hrpc RG)
Last updated 2016-06-02 (latest revision 2016-05-13)
Replaces draft-varon-hrpc-methodology, draft-dkg-hrpc-glossary
Replaced by rfc8280, draft-irtf-hrpc-research
Stream IRTF
Intended RFC status Informational
Formats plain text pdf html bibtex
Stream IRTF state (None)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to irsg@irtf.org
Human Rights Protocol Considerations Research Group         N. ten Oever
Internet-Draft                                                 Article19
Intended status: Informational                                   C. Cath
Expires: November 14, 2016                     Oxford Internet Institute
                                                            May 13, 2016

           Research into Human Rights Protocol Considerations
                    draft-tenoever-hrpc-research-02

Abstract

   The increaseing convolution of Internet and society increases the
   impact of the Internet on the lives of individuals.  Because of this,
   the design and development of the architecture of the Internet also
   has an increasing impact on society.  This has led to an increasing
   recognition that human rights [UDHR] [ICCPR] [ICESCR] have a role in
   the development and management of the Internet [HRC2012] [UNGA2013]
   [NETmundial].  It has also been argued that the Internet should be
   strengthened as a human rights enabling environment [Brown].

   This document provides a proposal for a vocabulary to discuss the
   relation between human rights and Internet protocols, an overview of
   the discussion in technical and academic literature and communities,
   a proposal for the mapping of the relation between human rights and
   technical concepts, and a proposal for guidelines for human rights
   considerations, similar to the work done on the guidelines for
   privacy considerations [RFC6973].

   Discussion of this draft at: hrpc@irtf.org //
   https://www.irtf.org/mailman/listinfo/hrpc

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 14, 2016.

ten Oever & Cath        Expires November 14, 2016               [Page 1]
Internet-Draft                    hrpcr                         May 2016

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Vocabulary used . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  Research Questions  . . . . . . . . . . . . . . . . . . . . .   9
   4.  Literature and Discussion Review  . . . . . . . . . . . . . .  10
   5.  Methodology . . . . . . . . . . . . . . . . . . . . . . . . .  12
     5.1.  Data Sources  . . . . . . . . . . . . . . . . . . . . . .  13
       5.1.1.  Discourse analysis of RFCs  . . . . . . . . . . . . .  13
       5.1.2.  Interviews with members of the IETF community during
               IETF92 in Dallas  . . . . . . . . . . . . . . . . . .  13
       5.1.3.  Participant observation in Working Groups . . . . . .  14
     5.2.  Data analysis strategies  . . . . . . . . . . . . . . . .  14
       5.2.1.  Identifying qualities of technical concepts that
               relate to human rights  . . . . . . . . . . . . . . .  14
       5.2.2.  Translation human rights to technical terms . . . . .  16
       5.2.3.  IPv4  . . . . . . . . . . . . . . . . . . . . . . . .  18
       5.2.4.  DNS . . . . . . . . . . . . . . . . . . . . . . . . .  20
       5.2.5.  HTTP  . . . . . . . . . . . . . . . . . . . . . . . .  23
       5.2.6.  XMPP  . . . . . . . . . . . . . . . . . . . . . . . .  26
       5.2.7.  Peer to Peer  . . . . . . . . . . . . . . . . . . . .  28
       5.2.8.  Virtual Private Network . . . . . . . . . . . . . . .  30
       5.2.9.  HTTP Status Code 451  . . . . . . . . . . . . . . . .  33
       5.2.10. Middleboxes . . . . . . . . . . . . . . . . . . . . .  35
       5.2.11. DDOS attacks  . . . . . . . . . . . . . . . . . . . .  35
     5.3.  Model for developing human rights protocol considerations  38
       5.3.1.  Human rights threats  . . . . . . . . . . . . . . . .  39
Show full document text