rfc9707.original   rfc9707.txt 
Network Working Group M. Kühlewind Internet Architecture Board (IAB) M. Kühlewind
Internet-Draft Request for Comments: 9707
Intended status: Informational D. Dhody Category: Informational D. Dhody
Expires: 22 December 2024 ISSN: 2070-1721
M. Knodel M. Knodel
20 June 2024 December 2024
IAB Barriers to Internet Access of Services (BIAS) Workshop Report Report from the IAB Workshop on Barriers to Internet Access of Services
draft-iab-bias-workshop-report-02 (BIAS)
Abstract Abstract
The "Barriers for Internet Access of Services (BIAS)" workshop was The "Barriers to Internet Access of Services (BIAS)" workshop was
convened by the Internet Architecture Board (IAB) from January 15-17, convened by the Internet Architecture Board (IAB) from January 15-17,
2024 as a three-day online meeting. Based on the submitted position 2024 as a three-day online meeting. Based on the submitted position
papers, the workshop covered three areas of interest: the role of papers, the workshop covered three areas of interest: the role of
community networks in Internet Access of Services; reports and Community Networks in Internet access of services, reports and
comments on the observed digital divide; and measurements of comments on the observed digital divide, and measurements of
censorship and censorship circumvention. This report summarizes the censorship and censorship circumvention. This report summarizes the
workshop's discussion and serves as a reference for reports on the workshop's discussions and serves as a reference for reports on the
current barriers to Internet Access. current barriers to Internet access.
Note that this document is a report on the proceedings of the Note that this document is a report on the proceedings of the
workshop. The views and positions documented in this report were workshop. The views and positions documented in this report were
expressed during the workshop by participants and do not necessarily expressed during the workshop by participants and do not necessarily
reflect IAB's views and positions. reflect the IAB's views and positions.
About This Document
This note is to be removed before publishing as an RFC.
The latest revision of this draft can be found at
https://intarchboard.github.io/draft-iab-bias-workshop-report/draft-
iab-bias-workshop-report.html. Status information for this document
may be found at https://datatracker.ietf.org/doc/draft-iab-bias-
workshop-report/.
Source for this draft and an issue tracker can be found at
https://github.com/intarchboard/draft-iab-bias-workshop-report.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This document is not an Internet Standards Track specification; it is
provisions of BCP 78 and BCP 79. published for informational purposes.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months This document is a product of the Internet Architecture Board (IAB)
and may be updated, replaced, or obsoleted by other documents at any and represents information that the IAB has deemed valuable to
time. It is inappropriate to use Internet-Drafts as reference provide for permanent record. It represents the consensus of the
material or to cite them other than as "work in progress." Internet Architecture Board (IAB). Documents approved for
publication by the IAB are not candidates for any level of Internet
Standard; see Section 2 of RFC 7841.
This Internet-Draft will expire on 22 December 2024. Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9707.
Copyright Notice Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents
license-info) in effect on the date of publication of this document. (https://trustee.ietf.org/license-info) in effect on the date of
Please review these documents carefully, as they describe your rights publication of this document. Please review these documents
and restrictions with respect to this document. carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction
1.1. About this workshop report content . . . . . . . . . . . 3 1.1. About the Content of This Workshop Report
2. Workshop Scope and Discussion . . . . . . . . . . . . . . . . 4 2. Workshop Scope and Discussion
2.1. Session 1: Community Networks - Their Role in Internet 2.1. Session 1: Community Networks - Their Role in Internet
Access of Services . . . . . . . . . . . . . . . . . . . 4 Access of Services
2.1.1. The Quality of Community Networks . . . . . . . . . . 4 2.1.1. The Quality of Community Networks
2.1.2. Strengthening Community Networks . . . . . . . . . . 5 2.1.2. Strengthening Community Networks
2.1.3. Discussion . . . . . . . . . . . . . . . . . . . . . 5 2.1.3. Discussion
2.2. Session 2: Digital Divide - Reports and Comments . . . . 6 2.2. Session 2: Digital Divide - Reports and Comments
2.2.1. Disparities in service provision . . . . . . . . . . 6 2.2.1. Disparities in Service Provisioning
2.2.2. Lack of consistent acceptance of language scripts . . 7 2.2.2. Lack of Consistent Acceptance of Language Scripts
2.2.3. Web Affordability and Inclusiveness . . . . . . . . . 7 2.2.3. Web Affordability and Inclusiveness
2.2.4. Discussion . . . . . . . . . . . . . . . . . . . . . 7 2.2.4. Discussion
2.3. Session 3: Censorship - Reports and Circumvention . . . . 8 2.3. Session 3: Censorship - Reports and Circumvention
2.3.1. Censorship Orders, Measurements, and Device 2.3.1. Censorship Orders, Measurements, and Device Analysis
Analysis . . . . . . . . . . . . . . . . . . . . . . 8 2.3.2. Use of VPNs for Censorship Circumventions and User
2.3.2. Use of VPNs for Censorship Circumvents and User Expectations
Expectations . . . . . . . . . . . . . . . . . . . . 10 2.3.3. Discussion
2.3.3. Discussion . . . . . . . . . . . . . . . . . . . . . 10 2.4. Key Takeaways
2.4. Key Take Aways . . . . . . . . . . . . . . . . . . . . . 10 3. IANA Considerations
3. Informative References . . . . . . . . . . . . . . . . . . . 11 4. Security Considerations
Appendix A. Position Papers . . . . . . . . . . . . . . . . . . 13 5. Informative References
Appendix B. Workshop Participants . . . . . . . . . . . . . . . 15 Appendix A. Position Papers
Appendix C. Workshop Program Committee . . . . . . . . . . . . . 15 Appendix B. Workshop Participants
IAB Members at the Time of Approval . . . . . . . . . . . . . . . 15 Appendix C. Workshop Program Committee
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 15 IAB Members at the Time of Approval
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15 Acknowledgments
Authors' Addresses
1. Introduction 1. Introduction
The Internet Architecture Board (IAB) holds occasional workshops
designed to consider long-term issues and strategies for the
Internet, and to suggest future directions for the Internet
architecture. This long-term planning function of the IAB is
complementary to the ongoing engineering efforts performed by working
groups of the Internet Engineering Task Force (IETF).
The Internet as part of the critical infrastructure affects many The Internet as part of the critical infrastructure affects many
aspects of our society significantly, although it impacts different aspects of our society significantly, although it impacts different
parts of society differently. The Internet is an important tool to parts of society differently. The Internet is an important tool for
reach the Sustainable Development Goals (SDG) [SDG] and to globally reaching the Sustainable Development Goals (SDGs) listed in [SDGs]
support human rights. Consequently, the lack of meaningful access to and for globally supporting human rights. Consequently, the lack of
digital infrastructure and services is also a form of meaningful access to digital infrastructure and services is also a
disenfranchisement. form of disenfranchisement.
Solely having Internet access is not enough. At the same time as we Solely having Internet access is not enough. At the same time as we
work to connect the next billion people and reduce the digital work to connect the next billion people and reduce the digital
divide, it is also important to understand persistent and novel divide, it is also important to understand persistent and novel
inequalities in the digital age when accessing content and services. inequalities in the digital age when accessing content and services.
There are more and more barriers to meaningful access to the services There are more and more barriers to meaningful access to the services
and applications that run on the Internet. Even if Internet and applications that run on the Internet. Even if Internet
connectivity is available, information and service access may remain connectivity is available, information and service access may remain
challenged and unequal. challenged and unequal.
This IAB workshop has aimed This IAB workshop aimed to
* to collect reports about barriers to accessing content and * collect reports about barriers to accessing content and services
services on the Internet, e.g. based on filtering, and blocking as on the Internet. For example:
well as due to general inequality of technological capabilities,
like device or protocol limitations.
* to help the Internet community get a better understanding of how - based on filtering.
the Internet functions in different parts of the world and which
- based on blocking.
- due to general inequality of technological capabilities, e.g.,
device or protocol limitations.
* help the Internet community get a better understanding of how the
Internet functions in different parts of the world and which
technology or techniques need to be used to gain access to technology or techniques need to be used to gain access to
content. content.
* to build an understanding of what “being connected” to the * build an understanding of what "being connected" to the Internet
Internet means: What is the Internet to users? What is needed to means: What is the Internet to users? What is needed to be
be meaningfully connected? What are the minimum requirements to meaningfully connected? What are the minimum requirements to be
be able to access certain parts of the content and services able to access certain parts of the content and services provided
provided over the Internet? over the Internet?
1.1. About this workshop report content 1.1. About the Content of This Workshop Report
This document is a report on the proceedings of the workshop. The This document is a report on the proceedings of the workshop. The
views and positions documented in this report are expressed during views and positions documented in this report were expressed during
the workshop by participants and do not necessarily reflect IAB's the workshop by participants and do not necessarily reflect the IAB's
views and positions. views and positions.
Furthermore, the content of the report comes from presentations given Furthermore, the content of the report comes from presentations given
by workshop participants and notes taken during the discussions, by workshop participants and notes taken during the discussions,
without interpretation or validation. Thus, the content of this without interpretation or validation. Thus, the content of this
report follows the flow and dialogue of the workshop but does not report follows the flow and dialogue of the workshop but does not
attempt to capture a consensus. attempt to capture a consensus.
2. Workshop Scope and Discussion 2. Workshop Scope and Discussion
The workshop was organized across three days with all-group The workshop was organized across three days with all-group
discussion slots, one per day. The following topic areas were discussion slots, one per day. The following topic areas were
identified and the program committee organized paper submissions into identified, and the program committee organized paper submissions
three main themes for each of the three discussion slots. During into three main themes for each of the three discussion slots.
each discussion, those papers were presented sequentially with open During each discussion, those papers were presented sequentially with
discussion held at the end of each day. open discussion held at the end of each day.
2.1. Session 1: Community Networks - Their Role in Internet Access of 2.1. Session 1: Community Networks - Their Role in Internet Access of
Services Services
The first day of the workshop focused on the role of Community The first day of the workshop focused on the role of Community
Networks [RFC7962] as a way to overcome the barriers to Internet Networks [RFC7962] as a way to overcome the barriers to Internet
Access. Community Networks are self-organized networks wholly owned access. Community Networks are self-organized networks wholly owned
by the community and thus provide an alternative mechanism to bring by the community and thus provide an alternative mechanism to bring
connectivity and internet services to those places that lack connectivity and Internet services to those places that lack
commercial interest. commercial interest.
Presentations ranged from highlighting the need for measuring Quality Presentations ranged from highlighting the need for measuring Quality
of Experience (QoE) for Community Networks, to the potential role the of Experience (QoE) for Community Networks, to the potential role the
Content Delivery Network (CDN) can play in Community Networks, to the Content Delivery Network (CDN) can play in Community Networks, to the
role of Satellite Networks, and finally, to the vital role of the role of Satellite Networks, and finally, to the vital role of the
spectrum in this space. spectrum in this space.
2.1.1. The Quality of Community Networks 2.1.1. The Quality of Community Networks
[MARTINEZ] highlighted the need to address Quality of Experience [MARTINEZ] highlighted the need to address QoE in discussions around
(QoE) in discussions around Community Networks. As a community- Community Networks. As a community-driven deployment, the knowledge
driven deployment, the knowledge and involvement of individuals can and involvement of individuals can vary; therefore, there are no
vary; therefore, there are no guarantees of connectivity or quality guarantees of connectivity or quality of service. There is a need to
of service. There is a need to focus on user expectations and how focus on user expectations and how they translate to measurable
they translate to measurable performance indicators. Further, it performance indicators. Further, it asks for better documentation of
asks for better documenting best practices in deploying community best practices in deploying Community Networks as well as careful
networks as well as considering manageability considerations for thought regarding manageability considerations for Community Networks
community networks in protocol development. [GUIFI] as an example in protocol development. [GUIFI] as an example Community Network was
Community Network was discussed and some existing resources for discussed, and some existing resources for Community Networks [APC]
Community Networks ([APC], [ISOC], and [TBB]) were shared by the [ISOC] [TBB] were shared by the participants.
participants.
The inconsistent quality and performance of Satellite Internet is a The inconsistent quality and performance of Satellite Internet result
gap for community networks that rely on non-terrestrial networks in a connectivity gap for Community Networks that rely on non-
(NTNs) for internet access [HU]. terrestrial networks (NTNs) for Internet access [HU].
2.1.2. Strengthening Community Networks 2.1.2. Strengthening Community Networks
[BENSON] focused on the prohibitive cost of the transit and Internet [BENSON] focused on the prohibitive cost of transit and Internet
service for Community Networks and argued for Content Delivery services for Community Networks and argued for CDNs to provide
Networks (CDNs) to provide transit-like and Internet services at no transit-like and Internet services, at no more than at-cost, in a
more than at-cost in a mutually beneficial way. Community networks mutually beneficial way. Community Networks still need backhaul to
still need backhaul to and from the CDN’s point of presence and and from the CDN's point of presence, and models for community-
models for community-backhaul and open-source CDNs were highlighted. backhaul and open-source CDNs were highlighted. Discussion included
Discussion included [PANGEA] project status as well as legal and the status of Project PANGEA [PANGEA] as well as legal and commercial
commercial considerations in such use of CDNs. considerations related to such use of CDNs.
[HU] highlighted that Satellite Internet provided by advanced LEO [HU] highlighted that Satellite Internet provided by advanced low-
satellite constellations can play a pivotal role in closing the Earth orbit (LEO) Satellite constellations can play a pivotal role in
connectivity gap in the urban-rural digital divide via Satellite- closing the connectivity gap in the urban-rural digital divide via
dependent community networks. These existing known performance and Satellite-dependent Community Networks. These existing known
management gaps need focus to enable Satellite Internet to resolve performance and management gaps need to be focused on, to enable
the divide. Further, research directions such as multi-layer Satellite Internet to resolve the divide. Further, research
satellite networking, autonomous maintenance, and integration between directions such as multi-layer Satellite networking, autonomous
Terrestrial and Non-Terrestrial networks were suggested. maintenance, and integration between terrestrial networks and NTNs
were suggested.
[RENNO] called attention to the coveted 6GHz (part of the C-band with [RENNO] called attention to the coveted 6 GHz (part of the C-band
a desirable mix of coverage and capacity) as a prime choice for with a desirable mix of coverage and capacity) as a prime choice for
International Mobile Telecommunication (IMT) for 5G technology while International Mobile Telecommunication (IMT) for 5G technology while
it is in common unlicensed use in the community networks (and small it is in common unlicensed use in Community Networks (and small
ISPs). Spectrum allocations directly impact industries and market ISPs). Spectrum allocations directly impact industries and market
access with ramifications for community networks. Further, there was access with ramifications for Community Networks. Further, there was
a discussion on the geopolitical tension because of it. a discussion on geopolitical tensions because of these allocations.
2.1.3. Discussion 2.1.3. Discussion
How can the technical community address the management gap and How can the technical community address the management gaps and
improve best practices for Community Networks? Is the increasing improve best practices for Community Networks? Is the increasing
complexity of the Internet making it more challenging to establish complexity of the Internet making it more challenging to establish
secure connections, and should this be taken into account in the secure connections, and should this be taken into account in the
design of the Internet? What steps need to be taken to make sure design of the Internet? What steps need to be taken to make sure
Community Networks are secure? Should the manageability Community Networks are secure? Should manageability considerations
consideration be expanded to explicitly consider Community Networks? be expanded to explicitly consider Community Networks? The Global
Global Access to the Internet for All (GAIA) [GAIA] research group Access to the Internet for All (GAIA) Research Group [GAIA] could be
could be a venue for further discussion and research. Further a venue for further discussion and research. Further discussion
discussion highlighted the need for readily available knowledge and highlighted the need for readily available knowledge and tools for
tools for community networks as well as the tussle with market forces Community Networks as well as the tussle with market forces when
when commercial networks compete with community networks. Also, commercial networks compete with Community Networks. Also, there is
there is a lack of operational inputs from community network a lack of operational inputs from Community Network operators in the
operators in the IETF/IRTF. IETF/IRTF.
2.2. Session 2: Digital Divide - Reports and Comments 2.2. Session 2: Digital Divide - Reports and Comments
Critical internet infrastructure affects many aspects of our society Critical Internet infrastructure affects many aspects of our society
significantly, although differently, the inequitable aspects of which significantly, although it impacts different parts of society
are typically referred to as "digital inclusion" signifying that in differently. The inequitable aspects are typically referred to as
efforts to digitalise society, there are those left out due to what "digital inclusion"; these aspects signify that in efforts to
is typically called the "digital divide", a related term specific to digitalize society, there are those left out due to what is typically
access to the Internet. These concepts together demonstrate that called the "digital divide", a related term specific to access to the
even if Internet connectivity is available, for some there will Internet. These concepts together demonstrate that even if Internet
remain challenges towards achieving equality. This becomes connectivity is available, for some there will remain challenges
especially significant as governments view the Internet as an towards achieving equality. This becomes especially significant as
important tool to help them reach the Sustainable Development Goals governments view the Internet as an important tool for helping them
(SDG) [SDG] and to globally support human rights. reach the SDGs listed in [SDGs] and for globally supporting human
rights.
The second day of workshops was essential to understanding the nature The second day of workshops was essential to understanding the nature
of the digital divide. Presentations of reports interrogated at of the digital divide. Presentations of reports interrogated at
least three key aspects of the digital divide, though there is least three key aspects of the digital divide, though it is
recognition that there may be more technical aspects of the digital recognized that there may be more technical aspects of the digital
divide that were not present. Those were: differences between divide that were not addressed. Three of those aspects were:
population demographics in the provision of online resources by
governments, inequality in the use of multilingualized domains and
email addresses, and increased costs for end-user downloads of
contemporary websites' sizes.
2.2.1. Disparities in service provision * differences between population demographics in the provision of
online resources by governments.
* inequality in the use of multilingualized domains and email
addresses.
* increased costs for end-user downloads from websites of
contemporary sizes.
2.2.1. Disparities in Service Provisioning
Ralph Holz presented research that exposes the more limited DNS- Ralph Holz presented research that exposes the more limited DNS-
mediated access to government websites by Indigenous communities in mediated access to government websites by Indigenous communities in
Australia as compared to less disadvantaged users in the same Australia as compared to less disadvantaged users in the same
population in "Evidence for a digital divide? Measuring DNS population in "Evidence for a digital divide? Measuring DNS
dependencies in the context of the Indigenous population of dependencies in the context of the indigenous population of
Australia". [HOLZ] DNS dependency trends were analysed between two Australia" [HOLZ]. DNS dependency trends were analyzed between two
lists of domains serving Australian government sites for Indigenous lists of domains serving Australian government sites for Indigenous
users and the general population. Researchers found, "evidence that users and the general population. Researchers found "evidence that
dependencies for the Indigenous population are indeed differently dependencies for the indigenous population are indeed differently
configured," indicative of a difference in service provisioning. configured," indicative of a difference in service provisioning.
However qualitative follow-up research is needed to interrogate both However, qualitative follow-up research is needed to interrogate both
the potential reasons for these differences and whether the the potential reasons for these differences and whether the
differences contribute to a "digital divide" that is tangible for differences contribute to a digital divide that is tangible for
Indigenous users. Indigenous users.
2.2.2. Lack of consistent acceptance of language scripts 2.2.2. Lack of Consistent Acceptance of Language Scripts
On the topic of availability of Internet services and content in On the topic of availability of Internet services and content in
multiple languages "Universal Acceptance of Domain Names and Email multiple languages, "Universal Acceptance of Domain Names and Email
Addresses: A Key to Digital Inclusion" was presented by Sarmad Addresses: A Key to Digital Inclusion" was presented by Sarmad
Hussain of ICANN. [HUSSAIN] The ICANN community has increased the Hussain of ICANN [HUSSAIN]. The ICANN community has increased the
options for multilingual identifiers through the expansion of the options for multilingual identifiers through the expansion of the
Internet’s DNS for use in domains and email addresses. However, Internet's DNS for use in domains and email addresses. However,
while the work of technical specification and policy recommendations while the work of technical specifications and policy recommendations
is complete, much work remains to deploy a multiligualized internet. is complete, much work remains to deploy a multilingualized Internet.
Today there are around 150 internationalised domain names (IDNs) but Today, there are around 150 internationalized domain names (IDNs),
the barriers to equal rollout of these scripts at the domain level but equal rollout of these scripts at the domain level is hindered
are hindered primarily by software and applications that do not yet primarily by software and applications that do not yet recognize
recognise these new scripts. "Universal Acceptance" is a programme these new scripts. "Universal Acceptance" is a program of action for
of action for the internet community at large that can ensure IDNs the Internet community at large that can ensure that IDNs are
are accepted and treated consistently. accepted and treated consistently.
2.2.3. Web Affordability and Inclusiveness 2.2.3. Web Affordability and Inclusiveness
In "A Framework for Improving Web Affordability and Inclusiveness" In "A Framework for Improving Web Affordability and Inclusiveness",
Rumaisa Habib presented research on the connection between website Rumaisa Habib presented research on the connection between website
size and cost to end users. [HABIB] This critical inquiry presents size and cost to end users [HABIB]. This critical inquiry presents
access in terms of affordability and through measurement demonstrates access in terms of affordability and through measurement demonstrates
that the material costs to end users who pay for their connection that the material costs to end users who pay for their connection
based on the volume of data they download and upload have risen as based on the volume of data they download and upload have risen as
the complexity of the web grows. Their research provides a framework the complexity of the Web grows. Their research provides a framework
for optimisation based on end-user affordability. This framework is for optimization based on end-user affordability. This framework is
anchored to reality: it proposes a fairness metric and suggests anchored in reality: [HABIB] proposes a fairness metric and suggests
systematic adaptations to Web complexity based on "geographic systematic adaptations to complexity of the Web based on "geographic
variations in mobile broadband prices and income levels." variations in mobile broadband prices and income levels."
2.2.4. Discussion 2.2.4. Discussion
These three reports discuss very different aspects of current These three reports discuss very different aspects of current
inequalities in Internet access in various parts of the world: inequalities in Internet access in various parts of the world:
service provision, availability, and economic costs. Notably, the service provisioning, availability, and economic costs. Notably, the
reports discuss trends that exacerbate the digital divide beyond the reports discuss trends that exacerbate the digital divide beyond the
question of connectivity or whether users have access to the question of connectivity or whether users have access to the
Internet, potentially bringing concrete ways that the IETF community Internet, potentially yielding concrete ways that the IETF community
can address digital inclusion within its remit. can address digital inclusion within its remit.
Discussants noted that while there are some interesting aspects to Discussants noted that while there are some interesting aspects to
the problem of the digital divide, such as measurements and the problem of the digital divide, such as measurements and
frameworks, most of the work is getting this work to the right people frameworks, most of the work involves getting this work to the
at the policy layer so there is an importance of communicating this appropriate people at the policy level; therefore, it is important to
technical evidence to the right people. The IETF's role could be to communicate this technical evidence to the appropriate people. The
build consensus on the proper solutions presented to decision-makers IETF's role could be to build consensus on the proper solutions
that put research and measurement not only in context but also in a presented to decision-makers that put research and measurement not
consensus-driven solution space. Another method to better only in context but also in a consensus-driven solution space.
communicate this research is by telling stories of end users in more Another method to better communicate this research is by telling
relatable and relevant terms, which is often a challenge for the stories of end users in more relatable and relevant terms; this is
technical level and a role for more diverse stakeholders at the more often a challenge at the technical level and a role for more diverse
local level. stakeholders at the more local level.
2.3. Session 3: Censorship - Reports and Circumvention 2.3. Session 3: Censorship - Reports and Circumvention
This session focused on reports of censorship as observed during This session focused on reports of censorship as observed in recent
recent years in different parts of the world, as well as on the use years in different parts of the world; it also focused on the use of,
of and expectation on censorship circumvention tools, mainly the use and expectations for, censorship circumvention tools, mainly the use
of secure VPN services. of secure VPN services.
The censorship reports, with a focus on Asia, and specifically India, The censorship reports highlighted legal frameworks and court actions
as well as Russia, as an example where censorship has changed
significantly recently, discussed the legal frameworks and court acts
that put legal obligations on regional network providers to block that put legal obligations on regional network providers to block
traffic. Further, measurements to validate the blocking as well as traffic. The discussion focused on Asia, specifically India, and
analyses of how blocking is implemented were discussed, i.e. which included Russia as an example where censorship practices have
protocols are used but also which kind of devices are used to recently undergone significant changes. Further, measurements to
configure the blocking rules and where are they deployed. validate the blocking as well as analyses of how blocking is
implemented were discussed, i.e., which protocols are used but also
which kinds of devices are used to configure the blocking rules and
where they are deployed.
2.3.1. Censorship Orders, Measurements, and Device Analysis 2.3.1. Censorship Orders, Measurements, and Device Analysis
[SAMSUDIN] reported on confirmed blocking from 10 countries [SAMSUDIN] reported on confirmed blocking from 10 countries
(Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, (Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar,
Philippines, Thailand, Timor-Leste, Vietnam) in the period from 1 Philippines, Thailand, Timor-Leste, and Vietnam) in the period from 1
July 2022 to 30 June 2023. The blocking was either confirmed by OONI July 2022 to 30 June 2023. The blocking was confirmed by either
measurements for existing blocking fingerprints, heuristics, i.e. for (1) Open Observatory of Network Interference (OONI) measurements for
new blocking fingerprints as well as news reports of blocking orders, existing blocking fingerprints or heuristics (i.e., for new blocking
or user experiences. Most of these countries block specific content fingerprints as well as news reports of blocking orders) or (2) user
such as porn, gambling, or certain news pages. Interestingly the experiences. Most of these countries block specific content such as
blocking in Hong Kong and Myanmar is focused on the military and porn, gambling, or certain news pages. Interestingly, the blocking
governmental pages of foreign countries. Blocking is often realized in Hong Kong and Myanmar is focused on the military and governmental
by either DNS tampering or HTTP tampering. For DNS, either a decided pages of foreign countries. Blocking is often realized by either DNS
IP address, a bogon IP address (127.0.0.1), or an empty domain tampering or HTTP tampering. For DNS, either a chosen IP address, a
(nxdomain) is used. In case of DNS tampering using a decided IP bogon IP address (e.g., 127.0.0.1), or an empty domain (NXDOMAIN) is
address or HTTP tampering some countries provide a block page that used. In the case of DNS tampering using a chosen IP address or HTTP
exposes the blocking, however, more transparency about blocking is tampering, some countries provide a block page that exposes the
requested by civil society organizations and the iMAP project. blocking; however, more transparency related to blocking is requested
by civil society organizations and the Internet Monitoring Action
Project (iMAP).
[GROVER] further focused the discussion on online censorship in [GROVER] further focused the discussion on online censorship in
India, Pakistan, and Indonesia. In India, where providers are India, Pakistan, and Indonesia.
As discussed in [Singh2020], in India, where providers are
responsible for implementing the blocking but no method is mandated, responsible for implementing the blocking but no method is mandated,
the six major ISPs (covering 98.82% of all subscribers) were tested the six major ISPs (covering 98.82% of all subscribers) were tested
on 4379 blocked websites (based on court orders, user reports, and on a total of 4379 blocked websites (based on court orders, user
publicly available or leaked government orders) on DNS poisoning/ reports, and publicly available or leaked government orders) by using
injection or HTTP/SNI-based censorship. Used censorship techniques DNS poisoning/injection or using censorship based on HTTP or the
and websites blocked were different across ISPs. Multiple ISPs used Server Name Indication (SNI). The censorship techniques used and
two different techniques (depending on the website), and all but one websites blocked were different across ISPs. Multiple ISPs used two
provided censorship notices. Providers blocked between 1892 to 3721 different techniques (depending on the website), and all but one
(of 4379) pages with only 1115 (27.64%) of pages blocked by all ISPs. provided censorship notices. A list of 4379 potentially blocked
[Singh2020] In contrast, in Pakistan, the government can also order websites was tested; 4033 of those websites appeared in at least one
the IPSs to perform blocking and blocking has even been observed in ISP's blocklist. Providers blocked between 1892 and 3721 of the 4033
the past on the IXP level. Since 2020, there has also been a central websites, with only 1115 websites (27.64%) blocked by all six ISPs.
Web Monitoring System deployed at lines of international
connectivity. In Indonesia, initially, the government guided ISPs in
how to perform the blocking. The regulations were updated in 2020 to
allow Indonesian ISPs to block websites at their discretion. In
2022, there was a proposal by internet service providers to
centralise DNS. In Indonesia, a partial block list is publicly
available, but without any indication of why something is blocked.
[Grover2023]
[BASSO] reported that for Russia a high increase in additions to the In contrast, in Pakistan, the government can also order the ISPs to
Roskomnadzor’s block list was observed in March 2022 as well as in perform blocking, and blocking has even been observed in the past at
the Internet Exchange Point (IXP) level. Since 2020, there has also
been a central Web Monitoring System deployed at lines of
international connectivity. In Indonesia, initially, the government
guided ISPs in how to perform the blocking. The regulations were
updated in 2020 to allow Indonesian ISPs to block websites at their
discretion. In 2022, there was a proposal by ISPs to centralize DNS.
In Indonesia, a partial blocklist is publicly available, but without
any indication of why something is blocked [Grover2023].
[BASSO] reported that for Russia a large increase in additions to
Roskomnadzor's blocklist was observed in March 2022 as well as in
December 2022, foremost covering news pages but also covering human December 2022, foremost covering news pages but also covering human
rights organizations and social media, where more than 3500 blocking rights organizations and social media, where more than 3500 blocking
orders were added to the list by an "Unknown body". Further, orders were added to the list by an "Unknown body". Further,
blocking of domains that are not in the official Roskomnadzor’s list blocking of domains that are not in the official Roskomnadzor
has been observed as well. blocklist has been observed as well.
An invited talk presented the work in [WANG] on locating censorship An invited talk included a presentation of the work in [WANG] on
devices by using HTTP and TLS traceroutes, identifying device vendors locating censorship devices by using HTTP and TLS traceroutes,
through fingerprinting, and reverse-engineering censorship triggers identifying device vendors through fingerprinting, and reverse-
by the use of fuzzing. E.g. for the case of Azerbaijan and engineering censorship triggers by the use of fuzzing. For example,
Kazakhstan, they showed that a significant portion of measurements in the case of Azerbaijan and Kazakhstan, they showed that a
from remote countries are blocked at the endpoint, indicating local significant portion of measurements from remote countries is blocked
policies but connection resets are also happening in Belarus and at the endpoint, indicating local policies, but showed that
Russia. Further, they could identify a set of commercial network connection resets are also happening in Belarus and Russia. Further,
devices (with filtering techniques such as firewalls) that are used they could identify a set of commercial network devices (with
in these countries for censorship and show how fuzzing can be used to filtering techniques such as firewalls) that are used in these
fingerprint and cluster behaviours as well as potentially circumvent countries for censorship and show how fuzzing can be used to
fingerprint and cluster behaviors as well as potentially circumvent
the deployed methods. the deployed methods.
All speakers called for more transparency by requiring blocking All speakers called for more transparency by requiring blocking
messages as well as publication and auditing of blocklists. messages as well as publication and auditing of blocklists.
Potentially even standardization could help. Potentially, even standardization could help.
2.3.2. Use of VPNs for Censorship Circumvents and User Expectations 2.3.2. Use of VPNs for Censorship Circumventions and User Expectations
Further on in the session, the possibility and prevalence of using Further on in the session, the possibility and prevalence of using
VPNs for circumvention has been discussed including user expectations VPNs for circumvention were discussed, including user expectations
and an analysis of security shortcomings of commercial VPN services. and an analysis of security shortcomings of commercial VPN services.
The analysis presented in [RAMESH] has shown various problems that The analysis presented in [RAMESH-1] has shown various problems that
lead to data leaks such as leakage of IPv6 traffic, non-browser lead to data leaks, such as (1) leakage of IPv6 traffic, (2) non-
traffic, or tunnel failure, not upholding user expectations, browser traffic, or (3) tunnel failure, in addition to failing to
especially when used in authoritarian regimes for censorship uphold user expectations, especially when used in authoritarian
circumvention or private communication. regimes for censorship circumvention or private communication.
The question of how common the use of VPNs for circumvention is and The question of how common the use of VPNs for circumvention is and
its legal implications, as VPNs are illegal in a few countries, has its legal implications, as VPNs are illegal in a few countries, was
been discussed. E.g. VPNs are not officially banned in India but discussed. For example, VPNs are not officially banned in India, but
VPN providers need to store log data and those, who haven’t complied, VPN providers need to store log data and those who haven't complied
stopped serving India. However, more data on VPN use and blocking stopped serving India. However, more data on VPN use and blocking
might be needed. might be needed.
2.3.3. Discussion 2.3.3. Discussion
After all, there is a cat-and-mouse game between censors and After all, there is a cat-and-mouse game between censorship and
circumvents, however, continued work on protocol enhancements that circumvention; however, continued work on protocol enhancements that
protect user privacy is essential. protect user privacy is essential.
2.4. Key Take Aways 2.4. Key Takeaways
Some key takeaways from the workshop are - Some key takeaways from the workshop are as follows:
* There is a need for the technical community to address the * There is a need for the technical community to address the
management gaps in operating Community Networks. management gaps in operating Community Networks.
* Work should be done in documenting best practices for operating * Work should be done to document best practices for operating
Community Networks. Community Networks.
* During the development of protocols, explicit manageability * During the development of protocols, explicit manageability
considerations related to Community Networks should be considered. considerations related to Community Networks should be carefully
thought out.
* Build consensus on solutions that have the most significant impact * Build consensus on solutions that have the most significant impact
in fostering digital inclusion. Further, promoting these in fostering digital inclusion. Further, promoting these
solutions ensures that efforts to bridge the digital divide are solutions ensures that efforts to bridge the digital divide are
effective and inclusive. effective and inclusive.
* Further work to enhance protocols ensuring user privacy should * Further work should be done to enhance protocols, ensuring that
continue. user privacy is preserved.
* Develop further protocols (or extensions to existing protocols) * Develop further protocols (or extensions to existing protocols)
that enable more transparency on filtering and promote their use that enable more transparency on filtering, and promote their use
and deployment. and deployment.
* Develop new VPN-like services and potentially support measurements * Develop new VPN-like services and potentially support measurements
to understand their deployment and use. to understand their deployment and use.
* Further discussion of these topics could happen in GAIA, HRPC, * Further discussion of these topics could happen in the GAIA
PEARG, and MAPRG based on the relevance to the research group. Research Group, the Human Rights Protocol Considerations (HRPC)
The management and operations-related discussion can be taken to Research Group, the Privacy Enhancements and Assessments Research
OPSAWG. The community could also explore if a censorship (and its Group (PEARG), and the Measurement and Analysis for Protocols
circumvention) focused group could be created. Research Group (MAPRG), based on relevance to the research group.
Management-related and operations-related discussions can be taken
to the IETF Operations and Management Area Working Group (OPSAWG).
The community could also explore whether a group focused on
censorship (and its circumvention) could be created.
3. Informative References 3. IANA Considerations
This document has no IANA actions.
4. Security Considerations
This document has no security considerations.
5. Informative References
[APC] "The Association for Progressive Communications (APC)", [APC] "The Association for Progressive Communications (APC)",
n.d., <https://www.apc.org/>. <https://www.apc.org/>.
[BASSO] Basso, S., "How Internet censorship changed in Russia [BASSO] Basso, S., "How Internet censorship changed in Russia
during the 1st year of military conflict in Ukraine", during the 1st year of military conflict in Ukraine",
January 2024, <https://datatracker.ietf.org/meeting/ January 2024, <https://datatracker.ietf.org/meeting/
interim-2024-biasws-03/materials/slides-interim-2024- interim-2024-biasws-03/materials/slides-interim-2024-
biasws-03-sessa-online-censorship-in-india-pakistan-and- biasws-03-sessa-slide-how-internet-censorship-changed-in-
indonesia-00>. russia-during-the-1st-year-of-military-conflict-in-
ukraine-00.pdf>.
[BENSON] Benson, T. A. and M. Fayed, "A ‘C’ in CDN - Access service [BENSON] Benson, T. A. and M. Fayed, "A 'C' in CDN: Access service
to and from the Internet at cost for community networks", to and from the Internet at cost for community networks",
January 2024, <https://www.ietf.org/slides/slides-biasws- January 2024, <https://www.ietf.org/slides/slides-biasws-
a-c-in-cdn-access-service-to-and-from-the-internet-at- a-c-in-cdn-access-service-to-and-from-the-internet-at-
cost-for-community-networks-00.pdf>. cost-for-community-networks-00.pdf>.
[GAIA] "Global Access to the Internet for All Research Group", [GAIA] "Global Access to the Internet for All Research Group
n.d., <https://www.irtf.org/gaia.html>. (GAIA)", <https://www.irtf.org/gaia.html>.
[GROVER] Grover, G., "Online censorship in India, Pakistan and [GROVER] Grover, G., "Online censorship in India, Pakistan and
Indonesia", January 2024, Indonesia", January 2024,
<https://datatracker.ietf.org/meeting/interim-2024-biasws- <https://datatracker.ietf.org/meeting/interim-2024-biasws-
03/materials/slides-interim-2024-biasws-03-sessa-online- 03/materials/slides-interim-2024-biasws-03-sessa-online-
censorship-in-india-pakistan-and-indonesia-00>. censorship-in-india-pakistan-and-indonesia-00>.
[Grover2023] [Grover2023]
Grover, G. and C. Cath, "The infrastructure of censorship Grover, G., "The infrastructure of censorship in Asia", in
in Asia", October 2023, "Eaten by the Internet", ed. Corinne Cath, pp. 75-81,
Internet Archive, Meatspace Press, October 2023,
<https://archive.org/details/eaten-by-the-internet/>. <https://archive.org/details/eaten-by-the-internet/>.
[GUIFI] "Guifi.net", n.d., <https://guifi.net/en>. [GUIFI] "guifi.net", <https://guifi.net/en>.
[HABIB] Habib, R., Tanveer, S., Inam, A., Ahmed, H., and A. Ali, [HABIB] Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A.,
"A Framework for Improving Web Affordability and Uzmi, Z. A., Qazi, Z. A., and I. A. Qazi, "A Framework for
Inclusiveness", September 2023, Improving Web Affordability and Inclusiveness", ACM
<https://www.ietf.org/slides/slides-biasws-a-framework- SIGCOMM '23, pp. 592-607, DOI 10.1145/3603269.3604872,
for-improving-web-affordability-and-inclusiveness-00.pdf>. September 2023, <https://www.ietf.org/slides/slides-
biasws-a-framework-for-improving-web-affordability-and-
inclusiveness-00.pdf>.
[HOLZ] Holz, R., Nazemi, N., Tavallaie, O., and A. Y. Zomaya, [HOLZ] Holz, R., Nazemi, N., Tavallaie, O., and A. Y. Zomaya,
"Evidence for a digital divide? Measuring DNS dependencies "Evidence for a digital divide? Measuring DNS dependencies
in the context of the indigenous population of Australia", in the context of the indigenous population of Australia",
2023, <https://www.ietf.org/slides/slides-biasws-evidence- 2023, <https://www.ietf.org/slides/slides-biasws-evidence-
for-a-digital-divide-measuring-dns-dependencies-in-the- for-a-digital-divide-measuring-dns-dependencies-in-the-
context-of-the-indigenous-population-of-australia-00.pdf>. context-of-the-indigenous-population-of-australia-00.pdf>.
[HU] Hu, P., "Closing the Performance and Management Gaps with [HU] Hu, P., "Closing the Performance and Management Gaps with
Satellite Internet - Challenges, Approaches, and Future Satellite Internet: Challenges, Approaches, and Future
Directions", January 2024, <https://www.ietf.org/slides/ Directions", January 2024, <https://www.ietf.org/slides/
slides-biasws-closing-the-performance-and-management-gaps- slides-biasws-closing-the-performance-and-management-gaps-
with-satellite-internet-challenges-approaches-and-future- with-satellite-internet-challenges-approaches-and-future-
directions-01.pdf>. directions-01.pdf>.
[HUSSAIN] Hussain, S., "Universal Acceptance of Domain Names and [HUSSAIN] Hussain, S., "Universal Acceptance of Domain Names and
Email Addresses - A Key to Digital Inclusion", 2023, Email Addresses: A Key to Digital Inclusion", 2023,
<https://www.ietf.org/slides/slides-biasws-universal- <https://www.ietf.org/slides/slides-biasws-universal-
acceptance-of-domain-names-and-email-addresses-a-key-to- acceptance-of-domain-names-and-email-addresses-a-key-to-
digital-inclusion-01.pdf>. digital-inclusion-01.pdf>.
[ISOC] "Community networks help bridge the connectivity gap", [ISOC] Internet Society, "Connecting the Unconnected: Community
n.d., <https://www.internetsociety.org/action-plan/ networks help bridge the connectivity gap",
community-networks/>. <https://www.internetsociety.org/action-plan/community-
networks/>.
[MARTINEZ] Martínez-Cervantes, L. M. and R. Guevara-Martínez, [MARTINEZ] Martínez-Cervantes, L. M. and R. Guevara-Martínez,
"Community Networks and the Quest for Quality", January "Community Networks and the Quest for Quality", January
2024, <https://www.ietf.org/slides/slides-biasws- 2024, <https://www.ietf.org/slides/slides-biasws-
community-networks-and-the-quest-for-quality-00.pdf>. community-networks-and-the-quest-for-quality-00.pdf>.
[PANGEA] "Project Pangea from Cloudflare", n.d., [OHLSEN] Ohlsen, L.Y., "BIAS workshop - M-Lab Position Paper
submission", December 2024, <https://www.ietf.org/slides/
slides-biasws-m-lab-position-paper-01.pdf>.
[OTT] Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M.,
Guzman, D., Kärkkäinen, L., Kosek, M., Mohan, N., Trossen,
D., Welzl, M., and L. Vogel, "The Internet: Only for the
Fast?", January 2024, <https://www.ietf.org/slides/slides-
biasws-the-internet-only-for-the-fast-00.pdf>.
[PANGEA] Cloudflare, "Project Pangea: Helping underserved
communities expand access to the Internet for free",
<https://www.cloudflare.com/en-gb/pangea/>. <https://www.cloudflare.com/en-gb/pangea/>.
[RAMESH] Ramesh, R., "Investigating the VPN Ecosystem through the [RAMESH-1] Ramesh, R., "Investigating the VPN Ecosystem through the
lens of Security, Privacy, and Usability", January 2024, lens of Security, Privacy, and Usability", January 2024,
<https://datatracker.ietf.org/meeting/interim-2024-biasws- <https://datatracker.ietf.org/meeting/interim-2024-biasws-
03/materials/slides-interim-2024-biasws-03-sessa- 03/materials/slides-interim-2024-biasws-03-sessa-
investigating-the-vpn-ecosystem-through-the-lens-of- investigating-the-vpn-ecosystem-through-the-lens-of-
security-privacy-and-usability-00>. security-privacy-and-usability-00>.
[RENNO] Rennó, R., "Maximising Connectivity - The Spectrum's Vital [RAMESH-2] Ramesh, R., Vyas, A., and R. Ensafi, ""All of them claim
to be the best": Multi-perspective study of VPN users and
VPN providers", 32nd USENIX Security Symposium (USENIX
Security '23, August 2023,
<https://www.usenix.org/conference/usenixsecurity23/
presentation/ramesh-vpn>.
[RENNO] Rennó, R., "Maximising Connectivity: The Spectrum's Vital
Role in Technology Access", January 2024, Role in Technology Access", January 2024,
<https://www.ietf.org/slides/slides-biasws-position-paper- <https://www.ietf.org/slides/slides-biasws-position-paper-
by-raquel-renno-01.pdf>. by-raquel-renno-01.pdf>.
[RFC7962] Saldana, J., Ed., Arcia-Moret, A., Braem, B., [RFC7962] Saldana, J., Ed., Arcia-Moret, A., Braem, B.,
Pietrosemoli, E., Sathiaseelan, A., and M. Zennaro, Pietrosemoli, E., Sathiaseelan, A., and M. Zennaro,
"Alternative Network Deployments: Taxonomy, "Alternative Network Deployments: Taxonomy,
Characterization, Technologies, and Architectures", Characterization, Technologies, and Architectures",
RFC 7962, DOI 10.17487/RFC7962, August 2016, RFC 7962, DOI 10.17487/RFC7962, August 2016,
<https://www.rfc-editor.org/rfc/rfc7962>. <https://www.rfc-editor.org/info/rfc7962>.
[SAMSUDIN] Samsudin, S., "iMAP (Internet Monitoring Action Project) [SAMSUDIN] Samsudin, S., "iMAP (Internet Monitoring Action Project)
2023 Internet Censorship Report", January 2024, 2023 Internet Censorship Report", January 2024,
<https://www.ietf.org/slides/slides-biasws-position-paper- <https://www.ietf.org/slides/slides-biasws-imap-internet-
by-raquel-renno-01.pdf>. monitoring-action-project-internet-censorship-report-
02.pdf>.
[SDG] "Sustainable Development Goals", n.d., [SDGs] United Nations Department of Economic and Social Affairs -
Sustainable Development, "The 17 Goals",
<https://sdgs.un.org/goals>. <https://sdgs.un.org/goals>.
[Singh2020] [Singh2020]
Singh, K., Grover, G., and V. Bansal, "How India Censors Singh, K., Grover, G., and V. Bansal, "How India Censors
the Web", July 2020, the Web", WebSci '20: Proceedings of the 12th ACM
<https://dl.acm.org/doi/abs/10.1145/3394231.3397891>. Conference on Web Science, pp. 21-28,
DOI 10.1145/3394231.3397891, July 2020,
<https://arxiv.org/pdf/1912.08590>.
[TBB] "Tribal Broadband Bootcamp", n.d., [TBB] "Tribal Broadband Bootcamp",
<https://tribalbroadbandbootcamp.org/>. <https://tribalbroadbandbootcamp.org/>.
[WANG] Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. [WANG] Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R.
Ensafi, "Network Measurement Methods for Locating and Ensafi, "Network Measurement Methods for Locating and
Examining Censorship Devices", November 2023, Examining Censorship Devices", November 2023,
<https://datatracker.ietf.org/meeting/interim-2024-biasws- <https://datatracker.ietf.org/meeting/interim-2024-biasws-
03/materials/slides-interim-2024-biasws-03-sessa-online- 03/materials/slides-interim-2024-biasws-03-sessa-network-
censorship-in-india-pakistan-and-indonesia-00>. measurement-methods-for-locating-and-examining-censorship-
devices-00.pdf>.
Appendix A. Position Papers Appendix A. Position Papers
19 position papers were submitted to the workshop call for papers. 11 Nineteen position papers were submitted to the workshop call for
were selected for publication. Papers that were not published either papers. Twelve were selected for publication. Papers that were not
(1) only provided a very prelimited analysis of an idea that was felt published either (1) only provided a very prelimited analysis of an
to be incomprehensive for discussion at the workshop, or (2) idea that was felt to be incomprehensive for discussion at the
addressed problems that were beyond the scope as dedicated for the workshop or (2) addressed problems that were considered beyond the
workshop discussion e.g. discussing cyber security threads as a scope of the workshop discussions, e.g., discussing cybersecurity
barrier for participation or implication of technology in regulation threats as a barrier to participation or implication of technology in
that imposes blocking. Both of these topics pose a potentially a regulation that imposes blocking. Both of these scenarios pose a
severe risk on the open Internet, however, these risks might provide potentially severe risk for the open Internet; however, they might
a high risk for all Internet users but do not necessarily imply an pose a high risk for all Internet users but do not necessarily imply
unbalance. an unbalance.
All accepted papers are available at: All accepted papers are available at
https://datatracker.ietf.org/group/biasws/materials/ <https://datatracker.ietf.org/group/biasws/materials/>.
This is the list of all published papers: This is the list of all published papers:
Community Networks: Community Networks:
* L. M. Martínez-Cervantes, R. Guevara-Martínez: Community * Martínez-Cervantes, L. M. and R. Guevara-Martínez: Community
Networks and the Quest for Quality [MARTINEZ] Networks and the Quest for Quality [MARTINEZ]
* T. Benson, M. Fayed: A ‘C’ in CDN: Access service to and from * Benson, T. A. and M. Fayed: A 'C' in CDN: Access service to and
the Internet for community networks at-cost [BENSON] from the Internet at cost for community networks [BENSON]
* P. Hu: Closing the Performance and Management Gaps with Satellite * Hu, P.: Closing the Performance and Management Gaps with Satellite
Internet: Challenges, Approaches, and Future Directions [HU] Internet: Challenges, Approaches, and Future Directions [HU]
* R. Rennó: Maximising Connectivity: The Spectrum's Vital Role in * Rennó, R.: Maximising Connectivity: The Spectrum's Vital Role in
Technology Access [RENNO] Technology Access [RENNO]
Digital Divide: Digital Divide:
* R. Holz, N. Nazemi, O. Tavallaie, A.Y. Zomaya: Evidence for a * Holz, R., Nazemi, N., Tavallaie, O., and A. Y. Zomaya: Evidence
digital divide? Measuring DNS dependencies in the context of the for a digital divide? Measuring DNS dependencies in the context
indigenous population of Australia [HOLZ] of the indigenous population of Australia [HOLZ]
* S. Hussain: Universal Acceptance of Domain Names and Email * Hussain, S.: Universal Acceptance of Domain Names and Email
Addresses: A Key to Digital Inclusion [HUSSAIN] Addresses: A Key to Digital Inclusion [HUSSAIN]
* R. Habib, S. Tanveer, A. Inam, H. Ahmed, A. Ali, Z.A. Uzmi, * Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A., Uzmi, Z. A.,
Z.A. Qazi, I.A. Qazi: A Framework for Improving Web Qazi, Z. A., and I. A. Qazi: A Framework for Improving Web
Affordability and Inclusiveness [HABIB] Affordability and Inclusiveness [HABIB]
* J. Ott, G. Bartolomeo, M.M. Bese, R. Bose, M. Bosk, D. * Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman,
Guzman, L. Kärkkäinen, M. Kosek, N. Mohan: The Internet: Only D., Kärkkäinen, L., Kosek, M., Mohan, N., Trossen, D., Welzl, M.,
for the Fast (and Furious)? and L. Vogel: The Internet: Only for the Fast? [OTT]
* L.Y. Ohlsen: BIAS workshop - M-Lab Position Paper submission * Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission
[OHLSEN]
Censorship: Censorship:
* S. Nurliza Samsudin: iMAP (Internet Monitoring Action Project) * Samsudin, S.: iMAP (Internet Monitoring Action Project) 2023
2023 Internet Censorship Report [SAMSUDIN] Internet Censorship Report [SAMSUDIN]
* G. Grover: The infrastructure of censorship in Asia [Grover2023] * Grover, G.: The infrastructure of censorship in Asia [Grover2023]
* S. Basso: How Internet censorship changed in Russia during the * Basso, S.: How Internet censorship changed in Russia during the
1st year of military conflict in Ukraine [BASSO] 1st year of military conflict in Ukraine [BASSO]
In addition to the submitted paper two invited talks were presented In addition to the submitted papers, two invited talks were included,
based on published papers: based on published papers:
* R. Sundara Raman, M. Wang, J. Dalek, J. Mayer, R. Ensafi: * Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. Ensafi:
Network Measurement Methods for Locating and Examining Censorship Network Measurement Methods for Locating and Examining Censorship
Devices [WANG] Devices [WANG]
* R. Ramesh, A. Vyas, R. Ensafi: “All of them claim to be the * Ramesh, R., Vyas, A., and R. Ensafi: "All of them claim to be the
best”: A multi-perspective study of VPN users and VPN providers best": Multi-perspective study of VPN users and VPN providers
[RAMESH-2]
Appendix B. Workshop Participants Appendix B. Workshop Participants
The workshop participants were Arnaud Taddei, Carlos Pignataro, The workshop participants were Arnaud Taddei, Carlos Pignataro,
Carsten Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton, Carsten Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton,
David Guzman, David Millman, David Schinazi, Dhruv Dhody, Gurshabad David Guzman, David Millman, David Schinazi, Dhruv Dhody, Gurshabad
Grover, Hanna Kreitem, Jane Coffin, Jiankang Yao, Jörg Ott, Juan Grover, Hanna Kreitem, Jane Coffin, Jiankang Yao, Jörg Ott, Juan
Peirano, Lai Yi Ohlsen, Luis Martinez, Mallory Knodel, Marwan Fayed, Peirano, Lai Yi Ohlsen, Luis Martinez, Mallory Knodel, Marwan Fayed,
Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Kühlewind, Mona Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Kühlewind, Mona
Wang, Peng Hu, Ralph Holz, Raquel Renno, Reethika Ramesh, Rumaisa Wang, Peng Hu, Ralph Holz, Raquel Rennó, Reethika Ramesh, Rumaisa
Habib, Sarmad Hussain, Simone Basso, Siti Nurliza Samsudin, Suresh Habib, Sarmad Hussain, Simone Basso, Siti Nurliza Samsudin, Suresh
Krishnan, Theophilus Benson, Tirumaleswar Reddy, Tommy Pauly, Vesna Krishnan, Theophilus Benson, Tirumaleswar Reddy.K, Tommy Pauly, Vesna
Manojlovic, and Wes Hardaker. Manojlovic, and Wes Hardaker.
Appendix C. Workshop Program Committee Appendix C. Workshop Program Committee
The workshop program committee members were Christopher Wood (IAB, The workshop program committee members were Christopher Wood (IAB,
Cloudflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, Center Cloudflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, NYU),
for Democracy and Technology), Mirja Kühlewind (IAB, Ericsson), and Mirja Kühlewind (IAB, Ericsson), and Tommy Pauly (IAB, Apple).
Tommy Pauly (IAB, Apple).
IAB Members at the Time of Approval IAB Members at the Time of Approval
Internet Architecture Board members at the time this document was Internet Architecture Board members at the time this document was
approved for publication were: TODO approved for publication were:
Matthew Bocci
Alissa Cooper
Roman Danyliw
Dhruv Dhody
Wes Hardaker
Cullen Jennings
Suresh Krishnan
Mirja Kühlewind
Tommy Pauly
Alvaro Retana
David Schinazi
Christopher Wood
Qin Wu
Acknowledgments Acknowledgments
Thanks to Arnaud Taddei for helpful suggestions to improve this Thanks to Arnaud Taddei for helpful suggestions to improve this
report. report.
Authors' Addresses Authors' Addresses
Mirja Kühlewind Mirja Kühlewind
Email: ietf@kuehlewind.net Email: ietf@kuehlewind.net
Dhruv Dhody Dhruv Dhody
Email: dd@dhruvdhody.com Email: dd@dhruvdhody.com
Mallory Knodel Mallory Knodel
Email: mknodel@cdt.org Email: Mallory.knodel@nyu.edu
 End of changes. 114 change blocks. 
352 lines changed or deleted 423 lines changed or added

This html diff was produced by rfcdiff 1.48.