<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rescorla-anonymous-network-00" category="bcp" consensus="true" submissionType="IETF" updates="rfc8718" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IETF Network Security">Security Requirements for the IETF Network</title>
    <seriesInfo name="Internet-Draft" value="draft-rescorla-anonymous-network-00"/>
    <author fullname="Eric Rescorla">
      <organization/>
      <address>
        <email>ekr@rtfm.com</email>
      </address>
    </author>
    <author fullname="Richard Barnes">
      <organization/>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <author fullname="David Schinazi">
      <organization/>
      <address>
        <email>dschinazi.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Tommy Pauly">
      <organization/>
      <address>
        <email>tpauly.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <abstract>
      <?line 45?>

<t>This document requires the network at the IETF plenary meeting
to protect the security and privacy of its users.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ekr.github.io/draft-rescorla-anonymous-network/draft-rescorla-anonymous-network.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rescorla-anonymous-network/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ekr/draft-rescorla-anonymous-network"/>.</t>
    </note>
  </front>
  <middle>
    <?line 51?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IETF meeting participants depend heavily on Internet access
during the IETF plenary meeting. The venue selection process
defined in <xref target="RFC8718"/> makes a functional network a mandatory
criterion:</t>
      <ul empty="true">
        <li>
          <artwork><![CDATA[
It MUST be possible to provision Internet Access to the Facility
and IETF Hotels that allows those attending in person to utilize
the Internet for all their IETF, business, and day-to-day needs;
in addition, there must be sufficient bandwidth and access for
remote attendees.  Provisions include, but are not limited to,
native and unmodified IPv4 and IPv6 connectivity, and global
reachability; there may be no additional limitation that would
materially impact their Internet use.  To ensure availability, it
MUST be possible to provision redundant paths to the Internet.
]]></artwork>
        </li>
      </ul>
      <t>A critical, but implicit requirement in this paragraph is that IETF participants
need to be secure in their use of the Internet.  It will clearly have a material
impact on participants' Internet use if they cannot use the security
technologies they require, or if accessing the IETF network requires them to
reduce their security or privacy posture (e.g., by revealing sensitive information).</t>
      <t>As expressed in <xref target="RFC7258"/>, the IETF considers pervasive monitoring an attack,
The IETF has a long history of developing protocols to protect the
confidentiality and authenticity of Internet communications, such as IPsec,
DNSSEC, TLS, and SSH.  More recently, there has been a focus on protecting the
identities of the endpoints to communication, e.g., MASQUE, OHAI, and ECH.  The
security properties of the IETF network should be aligned with these principles.</t>
      <t>For example:</t>
      <ul spacing="normal">
        <li>
          <t>IETF attendees often employ mechanisms such as IPsec, HTTPS, Oblivious HTTP, and TLS ECH
to protect the security and privacy of their business and day-to-day Internet
usage. If these security features cannot be used, attendees will not be able
to use the Internet as they need to.</t>
        </li>
        <li>
          <t>IETF attendees typically expect that the IETF network will not collect more
information about their usage of it than is technically necessary to operate
the network.  If IETF users need to authenticate in a way that their Internet
traffic can be attributed to them by local or upstream network operators, this
expectation would be violated, and attendees might not be willing or able to use the
Internet under such circumstances.</t>
        </li>
      </ul>
      <t>This document updates the requirements of <xref target="RFC8718"/> to make these security
requirements explicit.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>This document extends the mandatory criteria as follows:</t>
      <ul empty="true">
        <li>
          <t>The IETF network <bcp14>MUST</bcp14> be compatible with widely-used Internet security
technologies, and <bcp14>MUST NOT</bcp14> interfere with their usage.  These properties <bcp14>MUST</bcp14>
also hold for upstream networks.  In other words, in addition to global
reachability at the IP layer, the network must provide secure global
reachability, in the sense of being able to securely connect to any other
endpoint on the Internet using any widely-used security protocol.</t>
        </li>
      </ul>
      <t>This text is intended to ensure that IETF participants can continue to get the
level of security that they require when they use the IETF network.</t>
      <ul empty="true">
        <li>
          <t>The IETF network <bcp14>MUST NOT</bcp14> collect information about IETF participants'
Internet usage beyond what is technically required to operate the network. If
user-linked information needs to be collected, then it <bcp14>MUST NOT</bcp14> be
disseminated beyond the immediate IETF network operational team, and <bcp14>MUST</bcp14> be
deleted at the end of an IETF meeting.</t>
          <t>The IETF network <bcp14>MUST</bcp14> be accessible by any IETF participant without providing
authentication information that is tied to their identity. If user-specific
authentication is required, it <bcp14>MUST</bcp14> be possible for users to anonymously
obtain an arbitrary number of credentials which are not linkable to their
identity. The network <bcp14>SHOULD</bcp14> provide unauthenticated access or access via a
shared credential if practicable.</t>
        </li>
      </ul>
      <t>This text is intended to maximize user privacy and forbid any
authentication mechanisms which would make it possible to
attribute traffic to a specific identifiable user.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The requirement in this document enhances user security and privacy by
reducing a network observer's ability to track user behavior.
The requirement may make it more difficult to manage abusive behavior
by network users, however, the IETF network currently routinely operates in
a mode without any user-level authentication, so this requirement
does not create a security regression.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8718">
          <front>
            <title>IETF Plenary Meeting Venue Selection Process</title>
            <author fullname="E. Lear" initials="E." role="editor" surname="Lear"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>The IETF Administration Support Activity (IASA) is responsible for arranging the selection and operation of the IETF plenary meeting venue. This memo specifies IETF community requirements for meeting venues, including hotels and meeting space. It also directs the IASA to make available additional process documents that describe the current meeting selection process.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="226"/>
          <seriesInfo name="RFC" value="8718"/>
          <seriesInfo name="DOI" value="10.17487/RFC8718"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
      </references>
    </references>
    <?line 169?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA41Y25LbuBF9x1cg8oOTlCTvbJzY0W7GlueyoyrPZUdybW2l
8gCSoIQaEmAAULLs8r/kW/JlOQ2QFDkj26lyeSRQaHSf7j59wMlkwrzyhZzx
0VKmtVV+z+/lv2tlZSm1dzw3lvuN5IuL1SW/kX5n7MOIiSSxcotN/WXeWhix
VHi5NnY/40laMVZXGRbcjNs8ff3q5DXLTKpFiVMzK3I/sdKlxhZiIrTR+9LU
bqKjzckPPzBXJ6VyThnt9xX2hDP5My4KZ+CC0pmsJP7TfjTmI5kpb6wSBX1Z
zN/hD0IYLe5XlyOm6zKRdsbInRlLjXZSuxqOeVtLhoD+wpwXnlbIcZxhpZjx
+f3FHF/IobU1dTXjv/3Cf8M3pdf8F1phD3KPx9mMbaWuYfsZ591P6Ut0fbgH
y6VQBf3krfwoyqqQ09SUtC5supnxjfeVm7140Xv4AuZgWvlNnSB4+WBffA/D
ETYUhL/Hhs7kg51GK1Nlvmviuz+YbnxZjBgTtd8YAMwnOJTzvC6KmOjRhVUp
SisaGIWnMkZPQby1Pi8pvtGRrfcq3Qib8XfCaumGe22RvFXVduo+Htt5LrYq
48t0o7T4pIY7M9csT5X0+ds1LX/Ng5Upyz2/E3WxHxrxFa09scC0saXwaotK
YErnvW/T6ZSxyWTCReK8FalnbLVRjqMlamo5bmP7udB2Dbxc+EMXohK0sHte
SulRTMwbXlnjZRp/49o+FjrDA7UV6Z6bnCt0c+2kdTg/OFCqLCskQ7kttLcm
q1OPHmMsHNIY55WwXqWqEkQGsdH4RgLWAkY17ZRIiuciTaVzLMPR2PU1X6d8
hSehReBnIcOJ5H3cLHOlZcaV5p8//+H+8oy44ssXNMkD4BBIiA4bRHHABQ81
uhlcw1JELS2eA+VTShJfeH79YbniieSVAYMkheQRra0iPjm4Pw/u00Ny/VKk
qgCEjRkCMkRzBZQLSgzSIYrC7OizcRLp8QCGIofvFTCGbdiqPcx8ko2ZAEp7
IPEqTNCissH6mCe1Q/zOjcOJmdhPvJngD6KVmfupMYMTRAaSg/9j2m4lL2vn
KUhX5zmSRVWUwMROZX4TbMXs0KGNEdA7Ymn8ltJNOb9rUXE4Ii3qTJJHniiQ
a+N5oUrgmyGucWNEh5oOB9S6NJnKFZ4v7rYvI2R3279xcKymNG8BZ4xrXZhE
FJ0fAr2dBLR/aqNBxAmd2cWJhIfTRSiXAP/O1EXWGEFvSWJ8lKQqKxH7gFBt
wUbZI8CV4cT2OEFs0anNqWM0RmPn27ViZVaj1IBtJfymq5X2EHTVnFMJqlQU
ETk4UyAdXUuH9lYUAPodjSXWVlQbrpqKig3T6zdGeadzkqarZdxNsSEkauqB
B6HgdwpVlRZSWMCxEZSfDiDWwEM91zvn+QAproLZPU+FprzTUp9XGJhmo01h
1iqS1L6NL0xa7I7VNuCBtl/75FYiNEaoprIJqqMu2GmZC8nwFPkf5XQ9Ba50
2laKgszT9FahBjuONfpPlAnH5ccK57iWTt6ATl79+FfQyfjgFQkAlaFdqWe3
wpGl0uggIGBeaGoQkT6M2ardshHERIXBY2SReIfSkMGlwlSBMEHFJjWF40Ne
JrWRK1IpSERLzzQuaSUNQeeHPGCKlLVGKVFEIARXp+hkh54CRmN2frNcXpyN
+er9MjbVcnmF9F8bAGVlCpPFviUH8jiRUhOBYsY4HhmX/GpSxKJbnvLZ1BRY
oTKKOB9RDJwZ85iI6/ny1w8XY357NV9EHy7OyAcgxbo84hwg2zc8qAa3oS6m
8gYka6L+HSQJ/Q41hwLQKNBC0sC6REU0Kgjs/udopmMvGMcnDOWqMDRrQCla
udI9go1frVZ3AOw2KcBHUC9hIToPJCkADPf/c5zGim0p+zFjt4mEvdqJNehn
kTdxdQZzKaiyXdtogAG9lo17cYVmbp4JMFJ0r+3Iw/Bt+rDhi+kRhKA/iZjA
CWiMGFtfU7QZ6Q5EBdN4RjtYOrXXX3DE1L6jIQQX1QVZ1IHMiB+aw8D9QIcU
APymWgATMd6XNsRaeXQiqJM2iENvYEsYenwHYFu3e/RO9iBPMfkIyQCV91aB
gaOhQDXgjcLAJ6KWuoLykqLsoo6OGevGgZthMIIU4921RYqaIR2dxYo5YFuq
9ca3aSIEqa9ovjczpMkXzB54FjttLM9UWSg/XDt0Gkp9qAabq1NAzPYvZsB8
IJJwDumkR0XGBnsQVRhIOOXZM35m9JYApolPAZ2T/Arz1rFAeLjT0J0nc3xE
o5EuVGFE3tyGz/cXv35Y3F+c0+fl1fz9++4Da36xvLr98P788Omw8+z2+vri
5jxuxiofLLHR9fz3UYR5dHu3WtzezN+PutHZgUPSJI5HRcCC8CnlgpSkwyhO
Ivm/O7v7739OXjZw/Xhy8nfA1WB38uolvuxQaPE0o1G08St1FBNVhUkayo/G
qqggQgoSaI7Ia6c5USz12z8JmX/N+M+4N568PG0WKODBYovZYDFg9nTlyeYI
4pGlI8d0aA7WHyE99Hf+++B7i3tv8ec3KG3JJyev35ziEoGbQ/9dwePSlR+p
QWLpdiqdNypdEIS5CSI66PXVYypq1RimDwRX0GNhOkDVymI/Iao89FNX76e8
L09iUttMxCrJaSi2c6alsDi4wtTpJhZtgz16zcA3BhSQH+EOUs4LzQ3N2tgs
475Cp/LsBG9f7HY3ujvczffSjgfXvSDog/TMOul31My4UYRBCgUiTmSQLg31
xL2o6UaHB2LV++gvbLVznhs9HCm1iwpoP8C7P9iDymn5yiPZxP2EMKgt8G4j
to9r20DVcAoapA6ermWUSQVJKQqkO6ul/E5nhgaNK90o7FXO9OvlREXQTran
I+2Jk89hqIcIjbpE7g1Kakc+PZp1jXdZb9QNB90ihz0achO00UMgp4ML4Y7X
sFnjIk0amoE0XDv3E7pOZgrKtlSaplHrEh2lylJmig4exB69iRcpj+LttUU0
h6t4YE7fij9KABLUfxUwZaffatNG9FPdJftQOI/hDE1HOMfCplcXp/0pTyj0
EfEtxqqb42jXRqvug6IKYDqMalw90yPWXJeUcQdi/4IXOjqojtAXzUutgmjE
JF5QI+OfTRQEBrgrvj4kbFKYjFIeIm2jSGV212T90HZf8Bi2Dj6vek3ecHfb
5rXuK57uzk46In7aEmnCmtsIqrKDC3TnquhVEnbi5G/1ZCk+4iL9KSjNwx2L
qgFQJCqjxLFHKPb0dAw1CqKgNgBq77bMOuHVKTLClbcZaoDIVQCIXCAl0r03
JkUS7mOiJ0KO3Z0PI0ZvgmyK4RyV6sk+3jEDnR06IsGGrbTPIX0aQqZ8AcSH
aCuRuDsrAwcfO0GvJ9rYSR2jGSnSuvARYE00IehisJWdGZbsu7NDwY0xUnag
Ojt+wl8cUdhwheMW7YKJS+/aIqFQNhku9CaTXTtRr0VWCdQ5zB6ujiaC1ouB
ZQaWgszHMKH3QAfsrFzTvRlbp2HCL+Y38yOJ6WeBbpjaxF+K8Iaue8eYAFCy
Mk8ftNkVMltHqfB5FntJZv8Y5WgiOfoCq7fntzDQ/hKF/D/CLmPeoBgAAA==

-->

</rfc>
