rfc9707v1.txt   rfc9707.txt 
Internet Architecture Board (IAB) M. Kühlewind Internet Architecture Board (IAB) M. Kühlewind
Request for Comments: 9707 Request for Comments: 9707
Category: Informational D. Dhody Category: Informational D. Dhody
ISSN: 2070-1721 ISSN: 2070-1721
M. Knodel M. Knodel
December 2024 January 2025
IAB Barriers to Internet Access of Services (BIAS) Workshop Report Report from the IAB Workshop on Barriers to Internet Access of Services
(BIAS)
Abstract Abstract
The "Barriers to Internet Access of Services (BIAS)" workshop was The "Barriers to Internet Access of Services (BIAS)" workshop was
convened by the Internet Architecture Board (IAB) from January 15-17, convened by the Internet Architecture Board (IAB) from January 15-17,
2024 as a three-day online meeting. Based on the submitted position 2024 as a three-day online meeting. Based on the submitted position
papers, the workshop covered three areas of interest: the role of papers, the workshop covered three areas of interest: the role of
Community Networks in Internet Access of Services, reports and Community Networks in Internet access of services, reports and
comments on the observed digital divide, and measurements of comments on the observed digital divide, and measurements of
censorship and censorship circumvention. This report summarizes the censorship and censorship circumvention. This report summarizes the
workshop's discussions and serves as a reference for reports on the workshop's discussions and serves as a reference for reports on the
current barriers to Internet Access. current barriers to Internet access.
Note that this document is a report on the proceedings of the Note that this document is a report on the proceedings of the
workshop. The views and positions documented in this report were workshop. The views and positions documented in this report were
expressed during the workshop by participants and do not necessarily expressed during the workshop by participants and do not necessarily
reflect the IAB's views and positions. reflect the IAB's views and positions.
Status of This Memo Status of This Memo
This document is not an Internet Standards Track specification; it is This document is not an Internet Standards Track specification; it is
published for informational purposes. published for informational purposes.
skipping to change at line 46 skipping to change at line 47
Internet Architecture Board (IAB). Documents approved for Internet Architecture Board (IAB). Documents approved for
publication by the IAB are not candidates for any level of Internet publication by the IAB are not candidates for any level of Internet
Standard; see Section 2 of RFC 7841. Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata, Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9707. https://www.rfc-editor.org/info/rfc9707.
Copyright Notice Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the Copyright (c) 2025 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. to this document.
Table of Contents Table of Contents
skipping to change at line 73 skipping to change at line 74
2.1.1. The Quality of Community Networks 2.1.1. The Quality of Community Networks
2.1.2. Strengthening Community Networks 2.1.2. Strengthening Community Networks
2.1.3. Discussion 2.1.3. Discussion
2.2. Session 2: Digital Divide - Reports and Comments 2.2. Session 2: Digital Divide - Reports and Comments
2.2.1. Disparities in Service Provisioning 2.2.1. Disparities in Service Provisioning
2.2.2. Lack of Consistent Acceptance of Language Scripts 2.2.2. Lack of Consistent Acceptance of Language Scripts
2.2.3. Web Affordability and Inclusiveness 2.2.3. Web Affordability and Inclusiveness
2.2.4. Discussion 2.2.4. Discussion
2.3. Session 3: Censorship - Reports and Circumvention 2.3. Session 3: Censorship - Reports and Circumvention
2.3.1. Censorship Orders, Measurements, and Device Analysis 2.3.1. Censorship Orders, Measurements, and Device Analysis
2.3.2. Use of VPNs for Censorship Circumvents and User 2.3.2. Use of VPNs for Censorship Circumventions and User
Expectations Expectations
2.3.3. Discussion 2.3.3. Discussion
2.4. Key Takeaways 2.4. Key Takeaways
3. IANA Considerations 3. IANA Considerations
4. Informative References 4. Security Considerations
5. Informative References
Appendix A. Position Papers Appendix A. Position Papers
Appendix B. Workshop Participants Appendix B. Workshop Participants
Appendix C. Workshop Program Committee Appendix C. Workshop Program Committee
IAB Members at the Time of Approval IAB Members at the Time of Approval
Acknowledgments Acknowledgments
Authors' Addresses Authors' Addresses
1. Introduction 1. Introduction
The Internet Architecture Board (IAB) holds occasional workshops
designed to consider long-term issues and strategies for the
Internet, and to suggest future directions for the Internet
architecture. This long-term planning function of the IAB is
complementary to the ongoing engineering efforts performed by working
groups of the Internet Engineering Task Force (IETF).
The Internet as part of the critical infrastructure affects many The Internet as part of the critical infrastructure affects many
aspects of our society significantly, although it impacts different aspects of our society significantly, although it impacts different
parts of society differently. The Internet is an important tool for parts of society differently. The Internet is an important tool for
reaching the Sustainable Development Goals (SDGs) listed in [SDGs] reaching the Sustainable Development Goals (SDGs) listed in [SDGs]
and for globally supporting human rights. Consequently, the lack of and for globally supporting human rights. Consequently, the lack of
meaningful access to digital infrastructure and services is also a meaningful access to digital infrastructure and services is also a
form of disenfranchisement. form of disenfranchisement.
Solely having Internet access is not enough. At the same time as we Solely having Internet access is not enough. At the same time as we
work to connect the next billion people and reduce the digital work to connect the next billion people and reduce the digital
divide, it is also important to understand persistent and novel divide, it is also important to understand persistent and novel
inequalities in the digital age when accessing content and services. inequalities in the digital age when accessing content and services.
There are more and more barriers to meaningful access to the services There are more and more barriers to meaningful access to the services
and applications that run on the Internet. Even if Internet and applications that run on the Internet. Even if Internet
connectivity is available, information and service access may remain connectivity is available, information and service access may remain
challenged and unequal. challenged and unequal.
This IAB workshop aimed to This IAB workshop aimed to
* collect reports about barriers to accessing content and services * collect reports about barriers to accessing content and services
on the Internet, e.g., based on filtering, and blocking as well as on the Internet -- for example, based on filtering or on blocking,
due to general inequality of technological capabilities, like or due to general inequality of technological capabilities, e.g.,
device or protocol limitations. device or protocol limitations.
* help the Internet community get a better understanding of how the * help the Internet community get a better understanding of how the
Internet functions in different parts of the world and which Internet functions in different parts of the world and which
technology or techniques need to be used to gain access to technology or techniques need to be used to gain access to
content. content.
* build an understanding of what "being connected" to the Internet * build an understanding of what "being connected" to the Internet
means: What is the Internet to users? What is needed to be means: What is the Internet to users? What is needed to be
meaningfully connected? What are the minimum requirements to be meaningfully connected? What are the minimum requirements to be
skipping to change at line 150 skipping to change at line 159
identified, and the program committee organized paper submissions identified, and the program committee organized paper submissions
into three main themes for each of the three discussion slots. into three main themes for each of the three discussion slots.
During each discussion, those papers were presented sequentially with During each discussion, those papers were presented sequentially with
open discussion held at the end of each day. open discussion held at the end of each day.
2.1. Session 1: Community Networks - Their Role in Internet Access of 2.1. Session 1: Community Networks - Their Role in Internet Access of
Services Services
The first day of the workshop focused on the role of Community The first day of the workshop focused on the role of Community
Networks [RFC7962] as a way to overcome the barriers to Internet Networks [RFC7962] as a way to overcome the barriers to Internet
Access. Community Networks are self-organized networks wholly owned access. Community Networks are self-organized networks wholly owned
by the community and thus provide an alternative mechanism to bring by the community and thus provide an alternative mechanism to bring
connectivity and internet services to those places that lack connectivity and Internet services to those places that lack
commercial interest. commercial interest.
Presentations ranged from highlighting the need for measuring Quality Presentations ranged from highlighting the need for measuring Quality
of Experience (QoE) for Community Networks, to the potential role the of Experience (QoE) for Community Networks, to the potential role the
Content Delivery Network (CDN) can play in Community Networks, to the Content Delivery Network (CDN) can play in Community Networks, to the
role of Satellite Networks, and finally, to the vital role of the role of satellite networks, and finally, to the vital role of the
spectrum in this space. spectrum in this space.
2.1.1. The Quality of Community Networks 2.1.1. The Quality of Community Networks
[MARTINEZ] highlighted the need to address QoE in discussions around [MARTINEZ] highlighted the need to address QoE in discussions around
Community Networks. As a community-driven deployment, the knowledge Community Networks. As a community-driven deployment, the knowledge
and involvement of individuals can vary; therefore, there are no and involvement of individuals can vary; therefore, there are no
guarantees of connectivity or quality of service. There is a need to guarantees of connectivity or quality of service. There is a need to
focus on user expectations and how they translate to measurable focus on user expectations and how they translate to measurable
performance indicators. Further, it asks for better documentation of performance indicators. Further, it asks for better documentation of
best practices in deploying Community Networks as well as careful best practices in deploying Community Networks as well as careful
thought regarding manageability considerations for Community Networks thought regarding manageability considerations for Community Networks
in protocol development. [GUIFI] as an example Community Network was in protocol development. [GUIFI] as an example Community Network was
discussed, and some existing resources for Community Networks [APC] discussed, and some existing resources for Community Networks [APC]
[ISOC] [TBB] were shared by the participants. [ISOC] [TBB] were shared by the participants.
The inconsistent quality and performance of Satellite Internet result The inconsistent quality and performance of satellite Internet result
in a connectivity gap for Community Networks that rely on non- in a connectivity gap for Community Networks that rely on non-
terrestrial networks (NTNs) for internet access [HU]. terrestrial networks (NTNs) for Internet access [HU].
2.1.2. Strengthening Community Networks 2.1.2. Strengthening Community Networks
[BENSON] focused on the prohibitive cost of transit and Internet [BENSON] focused on the prohibitive cost of transit and Internet
services for Community Networks and argued for CDNs to provide services for Community Networks and argued for CDNs to provide
transit-like and Internet services, at no more than at-cost, in a transit-like and Internet services, at no more than at-cost, in a
mutually beneficial way. Community Networks still need backhaul to mutually beneficial way. Community Networks still need backhaul to
and from the CDN's point of presence, and models for community- and from the CDN's point of presence, and models for community-
backhaul and open-source CDNs were highlighted. Discussion included backhaul and open-source CDNs were highlighted. Discussion included
the status of Project PANGEA [PANGEA] as well as legal and commercial the status of Project PANGEA [PANGEA] as well as legal and commercial
considerations related to such use of CDNs. considerations related to such use of CDNs.
[HU] highlighted that Satellite Internet provided by advanced low- [HU] highlighted that satellite Internet provided by advanced low-
Earth orbit (LEO) satellite constellations can play a pivotal role in Earth orbit (LEO) satellite constellations can play a pivotal role in
closing the connectivity gap in the urban-rural digital divide via closing the connectivity gap in the urban-rural digital divide via
Satellite-dependent Community Networks. These existing known satellite-dependent Community Networks. These existing known
performance and management gaps need to be focused on, to enable performance and management gaps need to be focused on, to enable
Satellite Internet to resolve the divide. Further, research satellite Internet to resolve the divide. Further, research
directions such as multi-layer satellite networking, autonomous directions such as multi-layer satellite networking, autonomous
maintenance, and integration between terrestrial networks and NTNs maintenance, and integration between terrestrial networks and NTNs
were suggested. were suggested.
[RENNO] called attention to the coveted 6 GHz (part of the C-band [RENNO] called attention to the coveted 6 GHz (part of the C-band
with a desirable mix of coverage and capacity) as a prime choice for with a desirable mix of coverage and capacity) as a prime choice for
International Mobile Telecommunication (IMT) for 5G technology while International Mobile Telecommunication (IMT) for 5G technology while
it is in common unlicensed use in Community Networks (and small it is in common unlicensed use in Community Networks (and small
ISPs). Spectrum allocations directly impact industries and market ISPs). Spectrum allocations directly impact industries and market
access with ramifications for Community Networks. Further, there was access with ramifications for Community Networks. Further, there was
a discussion on geopolitical tensions because of it. a discussion on geopolitical tensions regarding the use of unlicensed
spectrum and commercial interest in new spectrum usage.
2.1.3. Discussion 2.1.3. Discussion
How can the technical community address the management gaps and How can the technical community address the management gaps and
improve best practices for Community Networks? Is the increasing improve best practices for Community Networks? Is the increasing
complexity of the Internet making it more challenging to establish complexity of the Internet making it more challenging to establish
secure connections, and should this be taken into account in the secure connections, and should this be taken into account in the
design of the Internet? What steps need to be taken to make sure design of the Internet? What steps need to be taken to make sure
Community Networks are secure? Should manageability considerations Community Networks are secure? Should manageability considerations
be expanded to explicitly consider Community Networks? The Global be expanded to explicitly consider Community Networks? The Global
Access to the Internet for All (GAIA) Research Group [GAIA] could be Access to the Internet for All (GAIA) Research Group [GAIA] could be
a venue for further discussion and research. Further discussion a venue for further discussion and research. Further discussion
highlighted the need for readily available knowledge and tools for highlighted the need for readily available knowledge and tools for
Community Networks as well as the tussle with market forces when Community Networks as well as the tussle with market forces when
commercial networks compete with Community Networks. Also, there is commercial networks compete with Community Networks. Also, there is
a lack of operational inputs from Community Network operators in the a lack of operational inputs from Community Network operators in the
IETF/IRTF. IETF/IRTF.
2.2. Session 2: Digital Divide - Reports and Comments 2.2. Session 2: Digital Divide - Reports and Comments
Critical internet infrastructure affects many aspects of our society Critical Internet infrastructure affects many aspects of our society
significantly, although differently, the inequitable aspects of which significantly, although it impacts different parts of society
are typically referred to as "digital inclusion" signifying that in differently. The inequitable aspects are typically referred to as
efforts to digitalize society, there are those left out due to what "digital inclusion"; these aspects signify that in efforts to
is typically called the "digital divide", a related term specific to digitalize society, there are those left out due to what is typically
access to the Internet. These concepts together demonstrate that called the "digital divide", a related term specific to access to the
even if Internet connectivity is available, for some there will Internet. These concepts together demonstrate that even if Internet
remain challenges towards achieving equality. This becomes connectivity is available, for some there will remain challenges
especially significant as governments view the Internet as an towards achieving equality. This becomes especially significant as
important tool for helping them reach the SDGs listed in [SDGs] and governments view the Internet as an important tool for helping them
for globally supporting human rights. reach the SDGs listed in [SDGs] and for globally supporting human
rights.
The second day of workshops was essential to understanding the nature The second day of workshops was essential to understanding the nature
of the digital divide. Presentations of reports interrogated at of the digital divide. Presentations of reports interrogated at
least three key aspects of the digital divide, though it is least three key aspects of the digital divide, though it is
recognized that there may be more technical aspects of the digital recognized that there may be more technical aspects of the digital
divide that were not present. Those were differences between divide that were not addressed. The three aspects presented and
population demographics in the provision of online resources by discussed were differences between population demographics in the
governments, inequality in the use of multilingualized domains and provision of online resources by governments, inequality in the use
email addresses, and increased costs for end-user downloads of of multilingualized domains and email addresses, and increased costs
contemporary websites' sizes. for end-user downloads from websites of contemporary sizes.
2.2.1. Disparities in Service Provisioning 2.2.1. Disparities in Service Provisioning
Ralph Holz presented research that exposes the more limited DNS- Ralph Holz presented research that exposes the more limited DNS-
mediated access to government websites by Indigenous communities in mediated access to government websites by Indigenous communities in
Australia as compared to less disadvantaged users in the same Australia as compared to less disadvantaged users in the same
population in "Evidence for a digital divide? Measuring DNS population in "Evidence for a digital divide? Measuring DNS
dependencies in the context of the indigenous population of dependencies in the context of the indigenous population of
Australia" [HOLZ]. DNS dependency trends were analyzed between two Australia" [HOLZ]. DNS dependency trends were analyzed between two
lists of domains serving Australian government sites for Indigenous lists of domains serving Australian government sites for Indigenous
skipping to change at line 275 skipping to change at line 286
2.2.2. Lack of Consistent Acceptance of Language Scripts 2.2.2. Lack of Consistent Acceptance of Language Scripts
On the topic of availability of Internet services and content in On the topic of availability of Internet services and content in
multiple languages, "Universal Acceptance of Domain Names and Email multiple languages, "Universal Acceptance of Domain Names and Email
Addresses: A Key to Digital Inclusion" was presented by Sarmad Addresses: A Key to Digital Inclusion" was presented by Sarmad
Hussain of ICANN [HUSSAIN]. The ICANN community has increased the Hussain of ICANN [HUSSAIN]. The ICANN community has increased the
options for multilingual identifiers through the expansion of the options for multilingual identifiers through the expansion of the
Internet's DNS for use in domains and email addresses. However, Internet's DNS for use in domains and email addresses. However,
while the work of technical specifications and policy recommendations while the work of technical specifications and policy recommendations
is complete, much work remains to deploy a multilingualized internet. is complete, much work remains to deploy a multilingualized Internet.
Today, there are around 150 internationalized domain names (IDNs), Today, there are around 150 internationalized domain names (IDNs),
but equal rollout of these scripts at the domain level is hindered but equal rollout of these scripts at the domain level is hindered
primarily by software and applications that do not yet recognize primarily by software and applications that do not yet recognize
these new scripts. "Universal Acceptance" is a program of action for these new scripts. "Universal Acceptance" is a program of action for
the internet community at large that can ensure that IDNs are the Internet community at large that can ensure that IDNs are
accepted and treated consistently. accepted and treated consistently.
2.2.3. Web Affordability and Inclusiveness 2.2.3. Web Affordability and Inclusiveness
In "A Framework for Improving Web Affordability and Inclusiveness", In "A Framework for Improving Web Affordability and Inclusiveness",
Rumaisa Habib presented research on the connection between website Rumaisa Habib presented research on the connection between website
size and cost to end users [HABIB]. This critical inquiry presents size and cost to end users [HABIB]. This critical inquiry presents
access in terms of affordability and through measurement demonstrates access in terms of affordability and through measurement demonstrates
that the material costs to end users who pay for their connection that the material costs to end users who pay for their connection
based on the volume of data they download and upload have risen as based on the volume of data they download and upload have risen as
skipping to change at line 327 skipping to change at line 338
often a challenge at the technical level and a role for more diverse often a challenge at the technical level and a role for more diverse
stakeholders at the more local level. stakeholders at the more local level.
2.3. Session 3: Censorship - Reports and Circumvention 2.3. Session 3: Censorship - Reports and Circumvention
This session focused on reports of censorship as observed in recent This session focused on reports of censorship as observed in recent
years in different parts of the world; it also focused on the use of, years in different parts of the world; it also focused on the use of,
and expectations for, censorship circumvention tools, mainly the use and expectations for, censorship circumvention tools, mainly the use
of secure VPN services. of secure VPN services.
The censorship reports, with a focus on Asia, and specifically India, The censorship reports highlighted legal frameworks and court actions
as well as Russia, as an example where censorship has changed that put legal obligations on regional network providers to block
significantly recently, discussed the legal frameworks and court traffic. The discussion focused on Asia, specifically India, and
actions that put legal obligations on regional network providers to included Russia as an example where censorship practices have
block traffic. Further, measurements to validate the blocking as recently undergone significant changes. Further, measurements to
well as analyses of how blocking is implemented were discussed, i.e., validate the blocking as well as analyses of how blocking is
which protocols are used but also which kinds of devices are used to implemented were discussed, i.e., which protocols are used but also
configure the blocking rules and where they are deployed. which kinds of devices are used to configure the blocking rules and
where they are deployed.
2.3.1. Censorship Orders, Measurements, and Device Analysis 2.3.1. Censorship Orders, Measurements, and Device Analysis
[SAMSUDIN] reported on confirmed blocking from 10 countries [SAMSUDIN] reported on confirmed blocking from 10 countries
(Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar, (Cambodia, Hong Kong (China), India, Indonesia, Malaysia, Myanmar,
Philippines, Thailand, Timor-Leste, and Vietnam) in the period from 1 Philippines, Thailand, Timor-Leste, and Vietnam) in the period from 1
July 2022 to 30 June 2023. The blocking was either confirmed by Open July 2022 to 30 June 2023. The blocking was confirmed by (1) Open
Observatory of Network Interference (OONI) measurements for existing Observatory of Network Interference (OONI) measurements for existing
blocking fingerprints, heuristics, i.e., for new blocking blocking fingerprints, (2) heuristics (i.e., for new blocking
fingerprints as well as news reports of blocking orders, or user fingerprints as well as news reports of blocking orders), or (3) user
experiences. Most of these countries block specific content such as experiences. Most of these countries block specific content such as
porn, gambling, or certain news pages. Interestingly, the blocking porn, gambling, or certain news pages. Interestingly, the blocking
in Hong Kong and Myanmar is focused on the military and governmental in Hong Kong and Myanmar is focused on the military and governmental
pages of foreign countries. Blocking is often realized by either DNS pages of foreign countries. Blocking is often realized by either DNS
tampering or HTTP tampering. For DNS, either a chosen IP address, a tampering or HTTP tampering. For DNS, either a chosen IP address, a
bogon IP address (127.0.0.1), or an empty domain (NXDOMAIN) is used. bogon IP address (e.g., 127.0.0.1), or an empty domain (NXDOMAIN) is
In the case of DNS tampering using a chosen IP address or HTTP used. In the case of DNS tampering using a chosen IP address or HTTP
tampering, some countries provide a block page that exposes the tampering, some countries provide a block page that exposes the
blocking; however, more transparency related to blocking is requested blocking; however, more transparency related to blocking is requested
by civil society organizations and the Internet Monitoring Action by civil society organizations and the Internet Monitoring Action
Project (iMAP). Project (iMAP).
[GROVER] further focused the discussion on online censorship in [GROVER] further focused the discussion on online censorship in
India, Pakistan, and Indonesia. In India, where providers are India, Pakistan, and Indonesia. In India, where providers are
responsible for implementing the blocking but no method is mandated, responsible for implementing the blocking but no method is mandated,
the six major ISPs (covering 98.82% of all subscribers) were tested the six major ISPs (covering 98.82% of all subscribers) were tested
on 4379 blocked websites (based on court orders, user reports, and on 4379 blocked websites (based on court orders, user reports, and
publicly available or leaked government orders) on DNS poisoning/ publicly available or leaked government orders) by using DNS
injection or HTTP/SNI-based censorship. The censorship techniques poisoning/injection or using censorship based on HTTP or the Server
used and websites blocked were different across ISPs. Multiple ISPs Name Indication (SNI). The censorship techniques used and websites
used two different techniques (depending on the website), and all but blocked were different across ISPs. Multiple ISPs used two different
one provided censorship notices. Providers blocked between 1892 and techniques (depending on the website), and all but one provided
3721 (of 4379) pages with only 1115 pages (27.64%) blocked by all censorship notices. Providers blocked between 1892 and 3721 (of
ISPs [Singh2020]. In contrast, in Pakistan, the government can also 4379) pages with only 1115 pages (27.64%) blocked by all ISPs
order the ISPs to perform blocking, and blocking has even been [Singh2020].
observed in the past at the Internet Exchange Point (IXP) level.
Since 2020, there has also been a central Web Monitoring System In contrast, in Pakistan, the government can also order the ISPs to
deployed at lines of international connectivity. In Indonesia, perform blocking, and blocking has even been observed in the past at
initially, the government guided ISPs in how to perform the blocking. the Internet Exchange Point (IXP) level. Since 2020, there has also
The regulations were updated in 2020 to allow Indonesian ISPs to been a central Web Monitoring System deployed at lines of
block websites at their discretion. In 2022, there was a proposal by international connectivity. In Indonesia, initially, the government
ISPs to centralize DNS. In Indonesia, a partial blocklist is guided ISPs in how to perform the blocking. The regulations were
publicly available, but without any indication of why something is updated in 2020 to allow Indonesian ISPs to block websites at their
blocked [Grover2023]. discretion. In 2022, there was a proposal by ISPs to centralize DNS.
In Indonesia, a partial blocklist is publicly available, but without
any indication of why something is blocked [Grover2023].
[BASSO] reported that for Russia a large increase in additions to [BASSO] reported that for Russia a large increase in additions to
Roskomnadzor's blocklist was observed in March 2022 as well as in Roskomnadzor's blocklist was observed in March 2022 as well as in
December 2022, foremost covering news pages but also covering human December 2022, foremost covering news pages but also covering human
rights organizations and social media, where more than 3500 blocking rights organizations and social media, where more than 3500 blocking
orders were added to the list by an "Unknown body". Further, orders were added to the list by an "Unknown body". Further,
blocking of domains that are not in the official Roskomnadzor blocking of domains that are not in the official Roskomnadzor
blocklist has been observed as well. blocklist has been observed as well.
An invited talk included a presentation of the work in [WANG] on An invited talk included a presentation of the work in [WANG] on
skipping to change at line 406 skipping to change at line 420
they could identify a set of commercial network devices (with they could identify a set of commercial network devices (with
filtering techniques such as firewalls) that are used in these filtering techniques such as firewalls) that are used in these
countries for censorship and show how fuzzing can be used to countries for censorship and show how fuzzing can be used to
fingerprint and cluster behaviors as well as potentially circumvent fingerprint and cluster behaviors as well as potentially circumvent
the deployed methods. the deployed methods.
All speakers called for more transparency by requiring blocking All speakers called for more transparency by requiring blocking
messages as well as publication and auditing of blocklists. messages as well as publication and auditing of blocklists.
Potentially, even standardization could help. Potentially, even standardization could help.
2.3.2. Use of VPNs for Censorship Circumvents and User Expectations 2.3.2. Use of VPNs for Censorship Circumventions and User Expectations
Further on in the session, the possibility and prevalence of using Further on in the session, the possibility and prevalence of using
VPNs for circumvention were discussed, including user expectations VPNs for circumvention were discussed, including user expectations
and an analysis of security shortcomings of commercial VPN services. and an analysis of security shortcomings of commercial VPN services.
The analysis presented in [RAMESH] has shown various problems that The analysis presented in [RAMESH-1] highlights various issues that
lead to data leaks such as leakage of IPv6 traffic, non-browser lead to data leaks -- such as the leakage of IPv6 traffic, non-
traffic, or tunnel failure, not upholding user expectations, browser traffic, or failures in tunneling -- resulting in a failure
especially when used in authoritarian regimes for censorship to meet user expectations, particularly in scenarios involving
circumvention or private communication. censorship circumvention or private communication in authoritarian
regimes.
The question of how common the use of VPNs for circumvention is and The question of how common the use of VPNs for circumvention is and
its legal implications, as VPNs are illegal in a few countries, was its legal implications, as VPNs are illegal in a few countries, was
discussed. For example, VPNs are not officially banned in India, but discussed. For example, VPNs are not officially banned in India, but
VPN providers need to store log data and those who haven't complied VPN providers need to store log data and those who haven't complied
stopped serving India. However, more data on VPN use and blocking stopped serving India. However, more data on VPN use and blocking
might be needed. might be needed.
2.3.3. Discussion 2.3.3. Discussion
After all, there is a cat-and-mouse game between censors and After all, there is a cat-and-mouse game between censorship and
circumvents; however, continued work on protocol enhancements that circumvention; however, continued work on protocol enhancements that
protect user privacy is essential. protect user privacy is essential.
2.4. Key Takeaways 2.4. Key Takeaways
Some key takeaways from the workshop are as follows: Some key takeaways from the workshop are as follows:
* There is a need for the technical community to address the * There is a need for the technical community to address the
management gaps in operating Community Networks. management gaps in operating Community Networks.
* Work should be done to document best practices for operating * Work should be done to document best practices for operating
skipping to change at line 473 skipping to change at line 488
Research Group (MAPRG), based on relevance to the research group. Research Group (MAPRG), based on relevance to the research group.
Management-related and operations-related discussions can be taken Management-related and operations-related discussions can be taken
to the IETF Operations and Management Area Working Group (OPSAWG). to the IETF Operations and Management Area Working Group (OPSAWG).
The community could also explore whether a group focused on The community could also explore whether a group focused on
censorship (and its circumvention) could be created. censorship (and its circumvention) could be created.
3. IANA Considerations 3. IANA Considerations
This document has no IANA actions. This document has no IANA actions.
4. Informative References 4. Security Considerations
This document has no security considerations.
5. Informative References
[APC] "The Association for Progressive Communications (APC)", [APC] "The Association for Progressive Communications (APC)",
<https://www.apc.org/>. <https://www.apc.org/>.
[BASSO] Basso, S., "How Internet censorship changed in Russia [BASSO] Basso, S., "How Internet censorship changed in Russia
during the 1st year of military conflict in Ukraine", during the 1st year of military conflict in Ukraine",
January 2024, <https://datatracker.ietf.org/meeting/ January 2024, <https://datatracker.ietf.org/meeting/
interim-2024-biasws-03/materials/slides-interim-2024- interim-2024-biasws-03/materials/slides-interim-2024-
biasws-03-sessa-slide-how-internet-censorship-changed-in- biasws-03-sessa-slide-how-internet-censorship-changed-in-
russia-during-the-1st-year-of-military-conflict-in- russia-during-the-1st-year-of-military-conflict-in-
skipping to change at line 547 skipping to change at line 566
[ISOC] Internet Society, "Connecting the Unconnected: Community [ISOC] Internet Society, "Connecting the Unconnected: Community
networks help bridge the connectivity gap", networks help bridge the connectivity gap",
<https://www.internetsociety.org/action-plan/community- <https://www.internetsociety.org/action-plan/community-
networks/>. networks/>.
[MARTINEZ] Martínez-Cervantes, L. M. and R. Guevara-Martínez, [MARTINEZ] Martínez-Cervantes, L. M. and R. Guevara-Martínez,
"Community Networks and the Quest for Quality", January "Community Networks and the Quest for Quality", January
2024, <https://www.ietf.org/slides/slides-biasws- 2024, <https://www.ietf.org/slides/slides-biasws-
community-networks-and-the-quest-for-quality-00.pdf>. community-networks-and-the-quest-for-quality-00.pdf>.
[OHLSEN] Ohlsen, L.Y., "BIAS workshop - M-Lab Position Paper
submission", December 2024, <https://www.ietf.org/slides/
slides-biasws-m-lab-position-paper-01.pdf>.
[OTT] Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M.,
Guzman, D., Kärkkäinen, L., Kosek, M., Mohan, N., Trossen,
D., Welzl, M., and L. Vogel, "The Internet: Only for the
Fast?", January 2024, <https://www.ietf.org/slides/slides-
biasws-the-internet-only-for-the-fast-00.pdf>.
[PANGEA] Cloudflare, "Project Pangea: Helping underserved [PANGEA] Cloudflare, "Project Pangea: Helping underserved
communities expand access to the Internet for free", communities expand access to the Internet for free",
<https://www.cloudflare.com/en-gb/pangea/>. <https://www.cloudflare.com/en-gb/pangea/>.
[RAMESH] Ramesh, R., "Investigating the VPN Ecosystem through the [RAMESH-1] Ramesh, R., "Investigating the VPN Ecosystem through the
lens of Security, Privacy, and Usability", January 2024, lens of Security, Privacy, and Usability", January 2024,
<https://datatracker.ietf.org/meeting/interim-2024-biasws- <https://datatracker.ietf.org/meeting/interim-2024-biasws-
03/materials/slides-interim-2024-biasws-03-sessa- 03/materials/slides-interim-2024-biasws-03-sessa-
investigating-the-vpn-ecosystem-through-the-lens-of- investigating-the-vpn-ecosystem-through-the-lens-of-
security-privacy-and-usability-00>. security-privacy-and-usability-00>.
[RAMESH-2] Ramesh, R., Vyas, A., and R. Ensafi, ""All of them claim
to be the best": Multi-perspective study of VPN users and
VPN providers", 32nd USENIX Security Symposium (USENIX
Security '23, August 2023,
<https://www.usenix.org/conference/usenixsecurity23/
presentation/ramesh-vpn>.
[RENNO] Rennó, R., "Maximising Connectivity: The Spectrum's Vital [RENNO] Rennó, R., "Maximising Connectivity: The Spectrum's Vital
Role in Technology Access", January 2024, Role in Technology Access", January 2024,
<https://www.ietf.org/slides/slides-biasws-position-paper- <https://www.ietf.org/slides/slides-biasws-position-paper-
by-raquel-renno-01.pdf>. by-raquel-renno-01.pdf>.
[RFC7962] Saldana, J., Ed., Arcia-Moret, A., Braem, B., [RFC7962] Saldana, J., Ed., Arcia-Moret, A., Braem, B.,
Pietrosemoli, E., Sathiaseelan, A., and M. Zennaro, Pietrosemoli, E., Sathiaseelan, A., and M. Zennaro,
"Alternative Network Deployments: Taxonomy, "Alternative Network Deployments: Taxonomy,
Characterization, Technologies, and Architectures", Characterization, Technologies, and Architectures",
RFC 7962, DOI 10.17487/RFC7962, August 2016, RFC 7962, DOI 10.17487/RFC7962, August 2016,
skipping to change at line 585 skipping to change at line 621
[SDGs] United Nations Department of Economic and Social Affairs - [SDGs] United Nations Department of Economic and Social Affairs -
Sustainable Development, "The 17 Goals", Sustainable Development, "The 17 Goals",
<https://sdgs.un.org/goals>. <https://sdgs.un.org/goals>.
[Singh2020] [Singh2020]
Singh, K., Grover, G., and V. Bansal, "How India Censors Singh, K., Grover, G., and V. Bansal, "How India Censors
the Web", WebSci '20: Proceedings of the 12th ACM the Web", WebSci '20: Proceedings of the 12th ACM
Conference on Web Science, pp. 21-28, Conference on Web Science, pp. 21-28,
DOI 10.1145/3394231.3397891, July 2020, DOI 10.1145/3394231.3397891, July 2020,
<https://dl.acm.org/doi/abs/10.1145/3394231.3397891>. <https://arxiv.org/pdf/1912.08590>.
[TBB] "Tribal Broadband Bootcamp", [TBB] "Tribal Broadband Bootcamp",
<https://tribalbroadbandbootcamp.org/>. <https://tribalbroadbandbootcamp.org/>.
[WANG] Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. [WANG] Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R.
Ensafi, "Network Measurement Methods for Locating and Ensafi, "Network Measurement Methods for Locating and
Examining Censorship Devices", November 2023, Examining Censorship Devices", November 2023,
<https://datatracker.ietf.org/meeting/interim-2024-biasws- <https://datatracker.ietf.org/meeting/interim-2024-biasws-
03/materials/slides-interim-2024-biasws-03-sessa-network- 03/materials/slides-interim-2024-biasws-03-sessa-network-
measurement-methods-for-locating-and-examining-censorship- measurement-methods-for-locating-and-examining-censorship-
devices-00.pdf>. devices-00.pdf>.
Appendix A. Position Papers Appendix A. Position Papers
Nineteen position papers were submitted to the workshop call for Nineteen position papers were submitted to the workshop call for
papers. Eleven were selected for publication. Papers that were not papers. Twelve were selected for publication. Papers that were not
published either (1) only provided a very prelimited analysis of an published either (1) only provided a very prelimited analysis of an
idea that was felt to be incomprehensive for discussion at the idea that was felt to be incomprehensive for discussion at the
workshop or (2) addressed problems that were considered "beyond workshop or (2) addressed problems that were considered beyond the
scope" as dedicated for the workshop discussion, e.g., discussing scope as dedicated for the workshop discussion, e.g., discussing
cybersecurity threats as a barrier to participation or implication of cybersecurity threats as a barrier to participation or implication of
technology in a regulation that imposes blocking. Both of these technology in a regulation that imposes blocking. Both of these
topics pose a potentially severe risk for the open Internet; however, topics pose a potentially severe risk for the open Internet; however,
these risks might pose a high risk for all Internet users but do not they might pose a high risk for all Internet users but do not
necessarily imply an unbalance. necessarily imply an unbalance.
All accepted papers are available at All accepted papers are available at
<https://datatracker.ietf.org/group/biasws/materials/>. <https://datatracker.ietf.org/group/biasws/materials/>.
This is the list of all published papers: This is the list of all published papers:
Community Networks: Community Networks:
* Martínez-Cervantes, L. M. and R. Guevara-Martínez: Community * Martínez-Cervantes, L. M. and R. Guevara-Martínez: Community
skipping to change at line 645 skipping to change at line 681
of the indigenous population of Australia [HOLZ] of the indigenous population of Australia [HOLZ]
* Hussain, S.: Universal Acceptance of Domain Names and Email * Hussain, S.: Universal Acceptance of Domain Names and Email
Addresses: A Key to Digital Inclusion [HUSSAIN] Addresses: A Key to Digital Inclusion [HUSSAIN]
* Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A., Uzmi, Z. A., * Habib, R., Tanveer, S., Inam, A., Ahmed, H., Ali, A., Uzmi, Z. A.,
Qazi, Z. A., and I. A. Qazi: A Framework for Improving Web Qazi, Z. A., and I. A. Qazi: A Framework for Improving Web
Affordability and Inclusiveness [HABIB] Affordability and Inclusiveness [HABIB]
* Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman, * Ott, J., Bartolomeo, G., Bese, M.M., Bose, R., Bosk, M., Guzman,
D., Kärkkäinen, L., Kosek, M., and N. Mohan: The Internet: Only D., Kärkkäinen, L., Kosek, M., Mohan, N., Trossen, D., Welzl, M.,
for the Fast (and Furious)? and L. Vogel: The Internet: Only for the Fast? [OTT]
* Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission * Ohlsen, L.Y.: BIAS workshop - M-Lab Position Paper submission
[OHLSEN]
Censorship: Censorship:
* Samsudin, S.: iMAP (Internet Monitoring Action Project) 2023 * Samsudin, S.: iMAP (Internet Monitoring Action Project) 2023
Internet Censorship Report [SAMSUDIN] Internet Censorship Report [SAMSUDIN]
* Grover, G.: The infrastructure of censorship in Asia [Grover2023] * Grover, G.: The infrastructure of censorship in Asia [Grover2023]
* Basso, S.: How Internet censorship changed in Russia during the * Basso, S.: How Internet censorship changed in Russia during the
1st year of military conflict in Ukraine [BASSO] 1st year of military conflict in Ukraine [BASSO]
In addition to the submitted papers, two invited talks were included, In addition to the submitted papers, two invited talks were included,
based on published papers: based on published papers:
* Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. Ensafi: * Raman, R. S., Wang, M., Dalek, J., Mayer, J., and R. Ensafi:
Network Measurement Methods for Locating and Examining Censorship Network Measurement Methods for Locating and Examining Censorship
Devices [WANG] Devices [WANG]
* Ramesh, R., Vyas, A., and R. Ensafi: "All of them claim to be the * Ramesh, R., Vyas, A., and R. Ensafi: "All of them claim to be the
best": Multi-perspective study of VPN users and VPN providers best": Multi-perspective study of VPN users and VPN providers
[RAMESH-2]
Appendix B. Workshop Participants Appendix B. Workshop Participants
The workshop participants were Arnaud Taddei, Carlos Pignataro, The workshop participants were Arnaud Taddei, Carlos Pignataro,
Carsten Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton, Carsten Bormann, Cindy Morgan, Colin Perkins, Cory Myers, Dan Sexton,
David Guzman, David Millman, David Schinazi, Dhruv Dhody, Gurshabad David Guzman, David Millman, David Schinazi, Dhruv Dhody, Gurshabad
Grover, Hanna Kreitem, Jane Coffin, Jiankang Yao, Jörg Ott, Juan Grover, Hanna Kreitem, Jane Coffin, Jiankang Yao, Jörg Ott, Juan
Peirano, Lai Yi Ohlsen, Luis Martinez, Mallory Knodel, Marwan Fayed, Peirano, Lai Yi Ohlsen, Luis Martinez, Mallory Knodel, Marwan Fayed,
Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Kühlewind, Mona Matthew Bocci, Michael Welzl, Michuki Mwangi, Mirja Kühlewind, Mona
Wang, Peng Hu, Ralph Holz, Raquel Rennó, Reethika Ramesh, Rumaisa Wang, Peng Hu, Ralph Holz, Raquel Rennó, Reethika Ramesh, Rumaisa
skipping to change at line 693 skipping to change at line 731
Appendix C. Workshop Program Committee Appendix C. Workshop Program Committee
The workshop program committee members were Christopher Wood (IAB, The workshop program committee members were Christopher Wood (IAB,
Cloudflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, Center Cloudflare), Dhruv Dhody (IAB, Huawei), Mallory Knodel (IAB, Center
for Democracy and Technology), Mirja Kühlewind (IAB, Ericsson), and for Democracy and Technology), Mirja Kühlewind (IAB, Ericsson), and
Tommy Pauly (IAB, Apple). Tommy Pauly (IAB, Apple).
IAB Members at the Time of Approval IAB Members at the Time of Approval
Internet Architecture Board members at the time this document was Internet Architecture Board members at the time this document was
approved for publication were: TODO approved for publication were:
Matthew Bocci
Alissa Cooper
Roman Danyliw
Dhruv Dhody
Wes Hardaker
Cullen Jennings
Suresh Krishnan
Mirja Kühlewind
Tommy Pauly
Alvaro Retana
David Schinazi
Christopher Wood
Qin Wu
Acknowledgments Acknowledgments
Thanks to Arnaud Taddei for helpful suggestions to improve this Thanks to Arnaud Taddei for helpful suggestions to improve this
report. report.
Authors' Addresses Authors' Addresses
Mirja Kühlewind Mirja Kühlewind
Email: ietf@kuehlewind.net Email: ietf@kuehlewind.net
Dhruv Dhody Dhruv Dhody
Email: dd@dhruvdhody.com Email: dd@dhruvdhody.com
Mallory Knodel Mallory Knodel
Email: mknodel@cdt.org Email: Mallory.knodel@nyu.edu
 End of changes. 43 change blocks. 
84 lines changed or deleted 136 lines changed or added

This html diff was produced by rfcdiff 1.48.