Originally Posted by
https://tools.ietf.org/html/rfc6108
11. Debating the Necessity of Such a Critical Notification System
Some members of the community may question whether it is ever, under
any circumstances, acceptable to modify Internet content in order to
provide critical service notification concerning malware infection -
even in the smallest of ways, even if openly and transparently
documented, even if thoroughly tested, and even if for the best of
motivations. It is important that anyone with such concerns
recognize that this document is by no means the first to propose
this, particularly as a tactic to combat a security problem, and in
fact simply leverages previous work in the IETF, such as [RFC3507].
Such concerned parties should also study the many organizations using
ICAP and the many software systems that have implemented ICAP.
In addition, concerned members of the community should review
Section 1, which describes the fact that this is a common feature of
DPI systems, made by DPI vendors and many, if not most, major
networking equipment vendors. As described herein, the authors of
this document are motivated to AVOID the need for widespread,
ubiquitous deployment of DPI, via the use of both open source
software and open protocols, and are
further motivated to
transparently describe the details of how such a system functions,
what it IS intended to do, what it IS NOT intended to do, and
purposes for which it WILL NOT be used.