Skip to main content

Agenda IETF102: hotrfc
agenda-102-hotrfc-02

Meeting Agenda Hot RFC Lightning Talks (hotrfc) Team
Date and time 2018-07-15 22:00
Title Agenda IETF102: hotrfc
State Active
Other versions plain text
Last updated 2018-07-15

agenda-102-hotrfc-02
===========================================================================
             Paper #1: Limited Domains and Internet Protocols
---------------------------------------------------------------------------
     Authors: Brian Carpenter (The University of Auckland)
              Sheng Jiang (Huawei)
      Topics: General, Internet
---------------------------------------------------------------------------
There is a noticeable trend towards network requirements, behaviours and
semantics that are specific to a limited region of the Internet and a
particular set of requirements.  Policies, default parameters, the options
supported, the style of network management and security requirements may vary. 
draft-carpenter-limited-domains reviews examples of limited domains and
emerging solutions.  It shows the needs for a precise definition of a limited
domain boundary and for a protocol to discover the boundary. We're looking for
informal discussion of this at IETF102.

===========================================================================
    Paper #2: EAT, General Purpose Device Attestation based on CBOR and
              COSE
---------------------------------------------------------------------------
     Authors: Laurence Lundblade
              Giri Mandyam
      Topics: Security
---------------------------------------------------------------------------
EAT is a proposed general purpose format for endpoint device attestation. Its
purpose is to securely convey information about an endpoint device (an entity)
to a relying party (server / service). The relying party uses this to decide if
they trust the device and/or transactions from it.

===========================================================================
    Paper #11: On the Different Kinds of Rodents in the IETF Ecosystem
---------------------------------------------------------------------------
     Authors: Henk Birkholz
---------------------------------------------------------------------------
Remote Attestation Procedures (RATS) help to create evidence about entity
characteristics that can be conveyed to other entities and thereby enable the
secure conveyance of proof that the evidence-creating entity is a trustworthy
system and a trusted system, respectively. Currently, Remote Attestation work
is scattered all over the IETF and RATS try to consolidate that a bit and
create more synergy (and of course standardized terminology).

===========================================================================
    Paper #4: An Architecture for a Public Identity Infrastructure Based on
              DNS and OpenID Connect
---------------------------------------------------------------------------
     Authors: Vittorio Bertola (Open-Xchange)
              Marcos Sanz (Denic)
      Topics: Applications & Real Time, Internet
---------------------------------------------------------------------------
We will very briefly introduce our idea of a "public identity infrastructure"
that would allow any Internet user to use an identity managed by any identity
provider they like to sign into any online service or website: like "login with
Facebook", but public, open and federated. We use the DNS as a directory for
identities and OpenID Connect/OAuth for sign on and identity management. See
https://datatracker.ietf.org/doc/draft-bertola-dns-openid-pidi-architecture/?include_text=1
for details. Efforts are ongoing in several places (see id4me.org) but we would
like to see whether there are people interested on working on this at the IETF.

===========================================================================
                Paper #5: IETF and Sustainable Development
---------------------------------------------------------------------------
     Authors: Marie-Jose Montpetit (TriangleVideo)
      Topics: IETF Culture
---------------------------------------------------------------------------
The client-server model, the move to cloud networking and the use of AI
datasets and blockchain in the Internet seem to consider electrical power is
infinite and will stay so for ever. With the combination of global warming and
the reach of the internet in areas poorly served by traditional solution it may
be time to consider how Internet innovation can diminish it's impact on the
environment and contribute to sustainable information development including
solutions that reduce power consumption or use more energy friendly protocols.

===========================================================================
                            Paper #6: EveryRFC
---------------------------------------------------------------------------
     Authors: Mark Nottinghasm (Fastly)
      Topics: General
---------------------------------------------------------------------------
Introduce <https://everyrfc.org/> and solicit feedback / contributions.

===========================================================================
          Paper #7: DARE Container - A format for encrypted logs.
---------------------------------------------------------------------------
     Authors: Phillip Hallam-Baker (Comodo Group Inc.)
      Topics: Security
---------------------------------------------------------------------------
IETF has a lot of formats designed for encrypting messages but thus far, no
format purpose designed for encrypting logs. DARE Container is a general
purpose data container format designed to meet a wide range of needs (encrypted
archives, persistence store and database logs) that is particularly well suited
for encrypting log files.

Encrypting your log files will not make your organization GDPR compliant but
limiting the number of people who can access log file data with PII is a pretty
good way to start to get a handle on the problem.

DARE Container applies JSON Web Encryption and JSON Web Signature in ways that
allow a public key operation to apply to individual records or to groups of
records. This avoids the need for a server to perform a public key operation
for every entry appended. Containers may provide blockchain style chained
digests or Merkle tree digests for additional integrity protections.

===========================================================================
    Paper #8: Privacy issues with tunneling alternatives in next generation
              systems
---------------------------------------------------------------------------
     Authors: Dirk v. Hugo (Deutsche Telekom AG)
      Topics: Not Sure
---------------------------------------------------------------------------
Identifier-Locator (Id-Loc) split approaches for routing data packets
efficiently between moving devices has been proposed as alternative to
traditional tunneling and encapsulation - especially since not all packets need
same treatment.

These approaches need some kind of mapping or look-up between (fixed) Identity
and (dynamic) Locator. Such mapping systems hold sensitive privacy information
and could pose new risks and vulnerabilty to attacks.

Planned new work shall discuss and progress on privacy-enabled mapping systems
required in general Id-Loc separated approaches – starting with problem
statement, gaps in existing solutions, and requirements – being abstracted from
specific protocols (LISP, ILNP, ILA) as much as possible.

A correspondingly BoF was applied for but not approved. We look for interest
and/or advice ...

===========================================================================
     Paper #9: Resource Sharing for Stateless Packet-Switched Networks
---------------------------------------------------------------------------
     Authors: Sandor Laki (ELTE Eötvös Loránd University, Budapest,
              Hungary)
      Topics: Operations & Management, Transport
---------------------------------------------------------------------------
Future mobile networks will consist of many small cells that can provide large
bandwidth connections to end users. This makes appropriate overprovisioning of
the backhaul networks difficult and costly. Similar problems arise in
multi-tenant data center networks and Internet service providers' access
networks where a large number of applications generate unknown traffic
patterns. Modern applications also pose a number of new challenges against the
communication network since different requiremenents (e.g. high bandwidth, low
latency, low loss or the combination of these) should be satisfied for
achieving high quality of user experience. In such scenarios, scalable and
quality of service (QoS) aware bandwidth sharing and queuing delay management
are needed. Accordingly, network nodes should remain simple, not require
per-user states and provide means for a rich set of resource sharing policies.
In this lightning talk, we propose Per Packet Value (PPV) resource sharing
framework as a flexible and simple solution for the above problem.

===========================================================================
   Paper #10: Autonomous Asynchronous Management Policy and Protocols (AMP)
---------------------------------------------------------------------------
     Authors: Ed Birrane (Johns Hopkins, APL)
              Rick Taylor (Airbus)
      Topics: General, Operations & Management
---------------------------------------------------------------------------
Devices that are separated from their upstream management by delayed or
disrupted links are notoriously difficult to manage. Some of the problems
involved could be overcome by imbuing the end device with more autonomy.

The DTN working group has a number of individual drafts and working group
documents describing the complexities of managing devices over links that may
be heavily delayed or disrupted, as well as proposed protocols to address these
difficulties.

Please note: Although the work is currently beginning in the DTN working group,
we believe the subject has applicability beyond Delay Tolerant Networking.