@@ -456,31 +456,45 @@ compromise between the tension of privacy vs protection based services
456456
457457Looking forward, the workshop participants identified that solving the
458458entire problem space with a single approach will be challenging for
459- several reasons. First, the scalability of many solutions will likely
460- be an issue as some solutions are expensive to implement.
461- Collaboration between multiple parties will be required for many
462- mechanisms to function. Finally, there is an unanswered question
463- of whether or not network operators be willing to participate and
464- allow technologies into their environment requirements in exchange
465- for technologies that prove their clients are being good net-citizens.
466- If so, some of these solutions might be required to exist before
467- networks allow a certain type of increased encryption; consider the
468- example of TLS Encrypted Client Hello being blocked by some network
469- operators.
459+ several reasons :
460+
461+ - The scalability of many solutions will likely be an issue as some
462+ solutions are complex or expensive to implement.
463+ - Collaboration between multiple parties will be required for many
464+ mechanisms to function, and the sets of parties required for different
465+ use cases might be disjoint.
466+ - There is an unanswered question of whether or not network operators
467+ be willing to participate and allow technologies into their environment
468+ requirements in exchange for technologies that prove their clients are
469+ being good net-citizens. If so, some of these solutions might be required
470+ to exist before networks allow a certain type of increased encryption;
471+ consider the example of TLS Encrypted Client Hello being blocked by
472+ some network operators.
470473
471474The breadth of the problem space itself is another complicating
472- factor. A wide variety of network architectures exist that have
473- different requirements for both data encryption and network
475+ factor. There is a wide variety of network architectures, and each
476+ has different requirements for both data encryption and network
474477management. Each problem space will have different encumbrances of
475478multiple types; for example, technical, legal, data ownership,
476479and regulatory concerns. New network architectures might be needed to
477480solve this problem at a larger scope, which would in turn require
478- interoperability support from network product vendors. In the
479- end, we should recognize that one solution will not solve all these
480- cases and it is more likely that different use cases will require
481- different solutions. Education about various solutions will be
482- required in order to ensure regulation and policy organizations can
483- understand and thus support the deployment of developed solutions.
481+ interoperability support from network product vendors. Education about
482+ various solutions will be required in order to ensure regulation and
483+ policy organizations can understand and thus support the deployment of
484+ developed solutions.
485+
486+ After new technologies and related standards are developed and deployed,
487+ unintended consequences can emerge that weren't considered during the
488+ design of the protocol. These lead to effects in multiple directions :
489+ on one hand, exposed protocol values not intended for network management
490+ might be used by networks to differentiate traffic; on the other hand,
491+ changes to a protocol might have impact on private network deployments
492+ that break existing use cases. While making decisions on technology
493+ direction and protocol design, it is important to consider the impact on
494+ various kinds of network deployments and their unique requirements.
495+ When protocols change to make different network management functions
496+ easier or harder, the impact on various deployment models ought to be
497+ considered and documented.
484498
485499--- back
486500
0 commit comments