Skip to content

Commit f06f299

Browse files
authored
Merge pull request #11 from intarchboard/tfpauly-patch-1
Add paragraph on unintended consequences
2 parents 4de9a94 + d943ba3 commit f06f299

File tree

1 file changed

+33
-19
lines changed

1 file changed

+33
-19
lines changed

draft-iab-m-ten-workshop.md

Lines changed: 33 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -456,31 +456,45 @@ compromise between the tension of privacy vs protection based services
456456

457457
Looking forward, the workshop participants identified that solving the
458458
entire problem space with a single approach will be challenging for
459-
several reasons. First, the scalability of many solutions will likely
460-
be an issue as some solutions are expensive to implement.
461-
Collaboration between multiple parties will be required for many
462-
mechanisms to function. Finally, there is an unanswered question
463-
of whether or not network operators be willing to participate and
464-
allow technologies into their environment requirements in exchange
465-
for technologies that prove their clients are being good net-citizens.
466-
If so, some of these solutions might be required to exist before
467-
networks allow a certain type of increased encryption; consider the
468-
example of TLS Encrypted Client Hello being blocked by some network
469-
operators.
459+
several reasons:
460+
461+
- The scalability of many solutions will likely be an issue as some
462+
solutions are complex or expensive to implement.
463+
- Collaboration between multiple parties will be required for many
464+
mechanisms to function, and the sets of parties required for different
465+
use cases might be disjoint.
466+
- There is an unanswered question of whether or not network operators
467+
be willing to participate and allow technologies into their environment
468+
requirements in exchange for technologies that prove their clients are
469+
being good net-citizens. If so, some of these solutions might be required
470+
to exist before networks allow a certain type of increased encryption;
471+
consider the example of TLS Encrypted Client Hello being blocked by
472+
some network operators.
470473

471474
The breadth of the problem space itself is another complicating
472-
factor. A wide variety of network architectures exist that have
473-
different requirements for both data encryption and network
475+
factor. There is a wide variety of network architectures, and each
476+
has different requirements for both data encryption and network
474477
management. Each problem space will have different encumbrances of
475478
multiple types; for example, technical, legal, data ownership,
476479
and regulatory concerns. New network architectures might be needed to
477480
solve this problem at a larger scope, which would in turn require
478-
interoperability support from network product vendors. In the
479-
end, we should recognize that one solution will not solve all these
480-
cases and it is more likely that different use cases will require
481-
different solutions. Education about various solutions will be
482-
required in order to ensure regulation and policy organizations can
483-
understand and thus support the deployment of developed solutions.
481+
interoperability support from network product vendors. Education about
482+
various solutions will be required in order to ensure regulation and
483+
policy organizations can understand and thus support the deployment of
484+
developed solutions.
485+
486+
After new technologies and related standards are developed and deployed,
487+
unintended consequences can emerge that weren't considered during the
488+
design of the protocol. These lead to effects in multiple directions:
489+
on one hand, exposed protocol values not intended for network management
490+
might be used by networks to differentiate traffic; on the other hand,
491+
changes to a protocol might have impact on private network deployments
492+
that break existing use cases. While making decisions on technology
493+
direction and protocol design, it is important to consider the impact on
494+
various kinds of network deployments and their unique requirements.
495+
When protocols change to make different network management functions
496+
easier or harder, the impact on various deployment models ought to be
497+
considered and documented.
484498

485499
--- back
486500

0 commit comments

Comments
 (0)