2014-09-29: Minutes
slides-interim-2021-ietfieee-03-sessa-2014-09-29-minutes-00
Meeting Slides | IETF-IEEE (ietfieee) IAB ASG | |
---|---|---|
Date and time | 2021-12-31 19:00 | |
Title | 2014-09-29: Minutes | |
State | Active | |
Other versions | plain text | |
Last updated | 2022-06-10 |
slides-interim-2021-ietfieee-03-sessa-2014-09-29-minutes-00
IAB, IESG and IEEE 802 Executive Committee Minutes of the 29 September 2014 Meeting, Newark, NJ, USA Reported by: Cindy Morgan (IAB Executive Administrative Manager), Jon Rosdahl (IEEE 802 Executive Secretary), and Dan Romascanu ATTENDEES ------------------- - Jari Arkko - Richard Barnes - Kathryn Bennett - Benoit Claise - Alissa Cooper - Subir Das - Spencer Dawkins - Donald Eastlake - Adrian Farrel - Norman Finn - Eric Gray - Brian Haberman - Bob Heile - Joe Hildebrand - Russ Housley - Konstantinos Karachalios - Barry Leiba - Ted Lemon - Kathleen Moriarty - Cindy Morgan - Paul Nikolich (present from item 7 on) - Glenn Parsons - Pete Resnick - Dan Romascanu - Jon Rosdahl - Dorothy Stanley - Andrew Sullivan - Pat Thaler - Juan Carlos Zuniga MINUTES ------------------- 1. Introductions and Goals of the Meeting Dan Romascanu welcomed everyone to the meeting and led a round of introductions (see list of attendees, above). Dan Romascanu noted that these joint sessions began as a way for the leadership from the IETF and the IEEE 802 to interact and provide early warning about the projects being discussed within each group; the communication between the two groups is much better now. This is the first face-to-face meeting since the IETF and the IEEE 802 went through their leadership changeovers in March 2014. 2. Changes in the Routing Area Slides: http://www.iab.org/wp-content/IAB-uploads/2013/01/Routing- Area-Working-Group-Reshuffle.pptx Adrian Farrel outlined upcoming changes in the IETF Routing Area. He noted that no work is being removed or added, it is just being reorganized internally. He noted that some changes will happen before IETF 91 in November, with the rest to follow in early 2015. The Routing Area Working Group (RTGWG) is currently rechartering to improve clarity and become a venue for discussing new work. IETF work on VPNs, data centers, pseudowires, and BGP-enabled services is currently split into 4 Working Groups: PWE3, L2VPN, L3VPN, and NVO3. Under the new plan, this work will be split into 3 Working Groups: PALS (Pseudowire and LDP-enabled Services), BESS (BGP-enabled Services) and NVO3 (Network Virtualization Overlays). IETF work on traddic engineering, optical networking, and RSVP-TE is currently split into 3 Working Groups: PCE, CCAMP, and MPLS. Under the new plan, this work will be split into 4 Working Groups: PCE (Path Computation Element), CCAMP (Common Control and Measurement Plan), TEAS (TE Architecture and Signaling) and MPLS (Multiprotocol Label Switching). Adrian Farrel noted that the NVO3 Working Groups is currently rechartering; since this is an area of shared interest with IEEE 802, Adrian asked that people look out for the message to new-work about this effort. NVo3 will continue working on architecture and requirements for data center VPNs, centrally controlled data center VPNs, and new encapsulations. Work on the BGP-based control plane is out of scope for NVO3 and will be moved into the new BESS Working Group. Dan Romascanu asked whether the old NVO3 work being moved into BESS will be an area of shared interest with 802.3. Adrian Farrel replied that the BGP part is not a specific area of interaction with IEEE 802; that interaction will remain in NVO3. 3. Status of the Shared Areas Work Coordination Doc: http://www.iab.org/wp-content/IAB-uploads/2013/01/ coordination-14.pdf Dan Romascanu and Pat Thaler reviewed the list of shared work items. The coordination document (see above) has the current status of each item. Ted Hardie and Juan Carlos Zuniga agreed to put together a detailed description for item 23 on the shared areas work list, on naming in Layer 2 networks. Adrian Farrel and Glenn Parsons agreed to provide a description for item 25 on the shared areas work list, on 802.1. and PCE. 4. New Work: Proposed BOFs and PARs at the November Meetings The group reviewed the expected IEEE 802 PARs and IETF BOFs under consideration for their respective November meetings. IEEE 802 will consider the following: - 802c, Amendment: Local Media Access Control (MAC) Addressing - 802.1AS-rev - Timing and Synchronization for Time-Sensitive Applications - 802.1Qch- Amendment: Cyclic Queuing and Forwarding - 802.3bv- Amendment, 1000 Mb/s Operation Over Plastic Optical Fiber - 802.3by- Amendment: Media Access Control Parameters, Physical Layers and Management Parameters for 25 Gb/s Operation - 802.15.7a- Amendment for a Physical Layer Supporting Optical Camera Communications For the current status and more information, please see: http://www.ieee802.org/PARs.shtml IETF will consider: - Archive Top Level Media Type (ARCMEDIA, Applications Area) - DNS Private Exchange (DPRIVE, Internet Area) - Deterministic Networking (DETNET, Internet Area) - Autonomic Networking Integrated Model and Approach (ANIMA, Operations and Management Area) - Layer Independent OAM Management in the Multi-Layer Environment (LIME, Operations and Management Area) - Shared Unified Policy Automation (SUPA, Operations and Management Area) - Internet Video Codec (NETVC, Real-Time Applications and Infrastructure Area) - Bit Indexed Explicit Replication (BIER, Routing Area) o This work was noted as being of possible interest to the IEEE 802 Executive Committee - Abstraction and Control of Transport Networks (ACTN, Routing Area) - Interface to Network Security Functions (I2NSF, Security Area) - Delay Tolerant Networking (DTN, Transport Area) For the current status and more information, please see: http://trac.tools.ietf.org/bof/trac/wiki/WikiStart Pat Thaler reminded the group that the PARs and BOFs under consideration had not yet been approved as of 29 September 2014. 5. New OPS Area Work - LIME Benoit Claise reported that the IESG is considering a proposal for a new working group, Layer Independent OAM Management in the Multi-Layer Environment (LIME). The work is on the specific OAM extensions that will need to be defined. There will be three deliverables: - YANG data model(s) for generic layer-independent and technology- independent configuration, reporting and presentation for OAM mechanisms. - An architecture for OAM that can be used as guidance by other IETF working groups developing new OAM protocols or modifying existing OAM protocols, at any layer and for any technology. This guidance will cover both the management and data planes. Existing OAM architectures will be reviewed. - Applicability document: The YANG model(s) specified in this working group must be usable and extensible by the existing OAM technologies. This usability and extensibility must be demonstrated, for example with IP Ping, traceroute, BFD, and LSP Ping. Note the technology-specific data model extensions should ideally be worked on in the respective working groups. Glenn Parsons asked if this would be a catchall YANG model group, or if this is for a baseline YANG model. Benoit Claise replied that it was for a baseline YANG model that is OAM-specific. Glenn Parsons mentioned that there is a new volunteer in IEEE 802 that he is hoping will pick up writing some of the MIBs. He added that moving everything from MIB to YANG would be a lot of work. Dan Romascanu replied that IETF is not planning to translate all of the MIB models to YANG, and added that this could be discussed further in 802.1. For more information: http://datatracker.ietf.org/wg/lime/charter/ 6. Deterministic Networking Slides: http://www.iab.org/wp-content/IAB-uploads/2013/01/tsn-nfinn- Deterministic-Networking-BOF-0914-v1.pdf Norm Finn updated the group on the current work on Deterministic Networking. Deterministic networking includes time synchronization, resource reservation for critical data streams, extremely low packet loss rations an guaranteed end-to-end latency, and convergence of critical data streams an other QoS features. Two classes of users are driving the work: industrial users, and audio/video users. As audio/ visual services have moved from analog to digital, lost packets and latency have become larger concerns. Fortunately, these sorts of data streams are easily characterizable by schedule of bandwidth. Norm Finn reported that IEEE 802 is currently working on several standards relating to time synchronization. 802.1 Audio Video Bridging is now the Time-Sensitive Networking TG. 802 is working on low-level schedulers and shapers. They have completed an AVB Credit- based shaper, and work on transmission pre-emption, time scheduled synchronization, and synchronized queueing and forwarding is still in progress. The work involves a mix of Layer 2 and Layer 3, as both bridges and routers are important parts of these networks. This will require cooperation between IEEE 802 and IETF. Time synchronization will be left to other Working Groups and SDOs. Low-level (typically hardware) queuing, buffering, shaping, and scheduling mechanisms can be left to IEEE 802. The proposed Deterministic Networking BOF in the IETF can work on existing 802 protocols and determine their relevance to the DetNet problem. IETF had a side meeting on DetNet at IETF 90, and has started a mailing list. A draft problem statement is in progress as draft-finn-detnet-problem-statement, and several versions of a Working Group charter proposal are being circulated. A 2-hour BOF session has been requested at IETF 91. It was noted that this work will have significant challenges, especially with regards to security. The distinction between layers is not that clear, it looks like we need to build a form of traffic engineered path that crosses both L2 and L3. In some cases, this means being able to identify 2 paths. Part of the robustness is being able to nail down disjoint so that you can get the traffic through as much as possible. Norm Finn clarified that this works just like RSVP today. It's a soft path. One of the things we want to do is harden that. Security gets interesting. Right now there is not much on security; we are trying to add more. Spencer Dawkins mentioned that the presentation was very useful, this being something that can be done in the IEEE that is not in the IETF, which is to put something together at a system level. When talking to the IETF, it is helpful to say we have a system in mind and we're not here to talk about the system. The system level would fall more under the IAB authority. Norm Finn appreciated this, and said that they are trying to narrow the problem statement down to do that. Jari Arkko, echoing what Spencer Dawkins said, noted that this is an exciting topic. As noted, there are some challenges in the complexity and having to bind some of the layers together. We shouldn't run the BOF here, but instead talk about how we best address this--how to slice this into pieces so that it is approachable. Joe Hildebrand asked a different question: assuming this is successful, one will not want to want to run TCP on top of this. Norm Finn responded that UDP is a real common one in this space. There may be some new transport protocols that come out of this here. There are protocols that are better at TCP and are better if you don't drop anything. All these sources have a fixed data rate. There a number of protocols that have a time stamp on every packet. This is at what time you should turn the light switch off. There are a lot of home-grown protocols whose only use is UDP. Spencer Dawkins considered that it sounds like DCCP may be interesting. Richard Barnes asked to what degree is this something where the work is already done at layer 2? Norm Finn responded that what has been done so far is something that works a lot like RSVP. Whatever protocol you're using to run your topology, you send out your reservation and you follow that down, and when the talker gets the reservation he knows he can stream the data and nothing will get lost. And the reservation automatically gets remade along the new path. Going forward, we want to have the dual path, which requires nailing it down, and what that needs, how do you do that. At one level, we need a protocol to either enhance RSVP with layer 2 stuff so that we have a protocol that both bridges and routers deal with along the way. And this is why the PCE is of interest to us. We have the 3rd piece, which is the serial replicating and bringing it back together at the other end. You can imagine using pseudowires in the general sense. Looks attractive because it's on the outside of the packet. Richard Barnes replied that this can be explained as we have these Layer 2 things that have these properties, and we need those Layer 3 things to bridge them. 7. Inter-SDO relations Russ Housley reported that the IETF has a peer relationship with ISO/ IEC JTC1 SC6, and thus an agreement not to write competing standards. IETF is watching what is happening in the Chinese National Body, as well as tracking ITU Plenipotentiary activities. Pat Thaler reported that the IEEE 802 has a standing committee for ISO/IEC JTC1. Dorothy Stanley noted that IEEE 802.11 has used that relationship to get ISO standardization for their specifications; they are now working to do the same on standards out of 802.1, 802.3, 802.16, and 802.22. Paul Nikolich added that IEEE 802 also has an open dialogue with 3GPP on cellular and wireless standards. 802 also has good relationships with the Wi-Fi Alliance and the Ethernet Alliance. Jari Arkko noted that there is multi-stakeholder work on the IANA process, as well as larger discussions about Internet governance. Those discussions are not necessarily about inter-SDO relationships, but the SDOs will be affected by the final outcome. 8. IS-IS TLVs Glenn Parsons reported that IEEE 802.1 would like an IS-IS TLV assignment to control explicit trees, and asked what the process for that would be, and whether an RFC would be required. Dan Romascanu replied that the process for that registry is review by the expert reviewers. Adrian Farrel added that there would be no need for an RFC simply to get an assignment from an already-existing registry. Glenn Parsons will follow up with Adrian Farrel and the expert reviewers for the IS-IS TLV registry about getting that assignment for 802.1. Glenn will also send a detailed description of the issue to Dan Romascanu for addition in the shared work items list. 9. Local Address Management in IoT Environments Slides: http://www.iab.org/wp-content/IAB-uploads/2013/01/new- addresses-thaler-local-address-acquisition-0914-v1.pdf Pat Thaler explained that the focus is about local address management in IOT environments. They are discussing making it easier to use local addresses, largely for virtualization environments. When MAC addresses were created, they were used pretty slowly. It was fairly narrow and the address space seemed like it would last forever. But at the end of the last decade, more were used and commonly users own 3-5 devices. Now even more addresses are used per person across the world: cell phones, TVs, Blu-Ray, tablets, printers, media computers, laptops, etc. A lot of addresses appear per household. With IOT network ports are going into smaller and smaller devices, many ports can be seen per home, per car, per machine. All these things consume global address space; once it is used it's burned forever. There is an explosion of IOT addresses,;you can have a car, and by 2020 a car could have 50-100 ports per car. That is a lot of addresses. Why not use local addresses? It is desirable to avoid users having to become local address administrators, in the case of virtual things that have a physical address. Where it talks to the orchestration system, it has a physical address used and then uses the virtual address/local address for the machine. In order to enable virtual address space for IOT, there is a need to make it easier to use the local address space for users. Local address space is huge, but it lacks organization for anything other than a local administrator assigning stuff. So the first step is to provide some structure for that use. Where a local address keeps track of what is used in a portion of address blocks, and create a protocol to use that address block, and then they can assign out of that block and not conflict. If someone wants to deploy these protocols, they will need to migrate anything uses addresses in that part of the space out of there. Norm Finn found that people are confused by that. There are no reserved bits in MAC addresses. There is only the Global/Local bit that is reserved. Anyone who is using local addresses today could conflict with any of this. All the proposals are about dividing up the address space, and existing users will be affected. Pat Thaler agreed that something needs to be done, and it's a huge resource. If the transition happens now, the number affected would be smaller. The next step would be to define a standard generic protocol for address acquisition. The RAC has already started doing this. They have defined 24-bit value similar to an OUI and the new Company ID (CID) is that the global bit always says so. One use is for local address blocks for protocols where we define vendor extensions. It does not have to be an OUI; it could also be a CID. The RAC has defined these CIDs, but there is not a lot of information out there about how to use them. There is a need for an amendment to 802. A proposed PAR on this called IEEE 802c. Juan Carlos Zuniga explained that the CID and OUI are similar, but not the same. Pat Thaler added that the difference is that in the OUI, the global/local bit is set to global, and in a CID the global/local bit is set to local. Jari Arkko asked if one has an OUI, can they just change that bit and make it a CID? Pat Thaler answered no; you need to go get the CID, which may not be the same name. Jon Rosdahl added that to complicate things, there were some companies that were grandfathered in from before the global/local bit was set. But that address space was not duplicated for the CID space. Pat Thaler added that while they are on the record because they were assigned, it is unlikely anyone is using them. Juan Carlos Zuniga explained that the intent is to create a new PAR where companies can request to play in the local space. Pat Thaler reported that a PAR was proposed, and the quadrant is one of the upper quadrants where they're assigning CIDs from. They can use a protocol that assigns out of that block, and use it as a default block for their protocol. This would create some reserved bits; you should only be assigning out of this block if you have this CID. And this [other] block is for local addresses, in the old way. Juan Carlos Zuniga asked: When you mention protocol, you mentioned avoiding collision of addresses. Could it also be an internal algorithm in the device? Pat Thaler answered that they are not talking about the protocol yet. And if you worry about continuity, don't change the address for the device every minute. It might say something about duplicate addresses. They are just laying down a roadmap. The next part of the work is to define a protocol. Norm Finn stated that something he would be interested in is whether in order to get one of these addresses, you need an identity. Pat Thaler answered that currently one issue about getting a MAC address is there is no way to get an address unless you already have a MAC address. She added that she will propose that we have a null address that is only used as a source address, and then bridges can ignore it as needed. And then we can use group addresses, multicast addresses for the destinations. Identifying the right response, with a multicast destination address, how does the client know which reply PDUs are for it? You don't want to have the same random number as someone else. Need a random number generator big enough that it's unlikely that two people would choose the same number at the same time. Norm Finn observed that if it's a matter of including your EUI-64, one of the justifications for this is privacy; this blows away the privacy. Pat Thaler stated that if you have an EUI-64, it's easier to come up with a random number, but she is not proposing this for privacy. Privacy from whom? And still need to authenticate from someone, and we may not be able to be private from them. If this is done under some sort of authentication, only the guy you're authenticating to would be able to see your true identity. Juan Carlos Zuniga reported that in the privacy group, one of the discussions that came out of this was about how Bluetooth keeps privacy on a changing MAC address. Once they have a peer addresses they can broadcast what looks like a random address but still recognize the things you already paired with. Jari Arkko intervened at this point, noting that we could discuss the privacy implications at length. One thing is to think about who you are private to. The question in his mind is: are there impacts of the new scheme to IPv6 addresses? Pat Thaler answered that the primary driver isn't privacy, though privacy may leverage it. She thinks this is transparent and the impact is minimal to IETF protocols that assume MAC address identities. Brian Haberman observed that RFC 7136 says there is no significance to any bit in the MAC addresses being used. Jari Arkko observed that if it is a dynamically changing thing, that's an impact. Pat Thaler stated that for the purpose of this one, you would do this when you came up and then only redo it if there was a network that came up and there was a duplicate address. Who is the address server? There would be 2 address servers. You could do an address-claiming kind of thing and you send a probe packet to see if anyone else is using this value. We'd have to deal with it, and there are some networks where you can't see everything. Some pretty rough protocols about how to do that sort of thing. An address server might see the claim, and try and find out whether you can claim an address or not. Duplicate address protection protocols: There should be a check and prevent a duplicate address, and the servers can partition from the local address space. For specialized stable networks, you don't want to do this overtime; you turn the key. Those are not networks where you should be expecting changes. IOT addresses should be able to operate without a global MAC address and without configuration. Juan Carlos Zuniga asked for the 24 bits and the small network with 1000 nodes, is there a presentation or is there a rough estimate? Pat Thaler said that for 24 bits you could probably be a good bit larger. If everyone has a separate one and you're trying to get yours, when you're adding it's a bit lower. Birthday paradox, you try again and are very unlikely to get the same one again. For 16 bits and 1000 nodes, it was very unlikely you'd have to choose more than 2 times. For 1000 nodes and 24, it's much lower. Norm Finn asked a question about IPv6. Do people who use IPv6 addresses ever make the assumption that these two addresses are the same? Brian Haberman observed that this happens only if they are doing pervasive monitoring. Norm Finn observed that this will break that. Many people in the room replied that that would be a good thing. Dan Romascanu asked if there any action items here? Jari Arkko observed that everything here is similar to what we've been doing with DHCP and DNA and same scenarios. There has been some evolution in this space. You do mobility and you come back to the network and have to quickly confirm. Lots of cases. Norm Finn asked whether, given you're going the same thing twice in a row at L2 and L3, do you need to have two of these? Jari Arkko answered that concerning privacy, if you don't change thing all at once you're going to link things together. Subir Das stated that where there is some kind of delay requirements, that angle needs some work investigating. Pat Thaler answered that unless you're changing it because of privacy standard that says you change it periodically to try to obscure who you are, you don't assume that MAC addresses define identity, because for some there it is not, it assigned when they get on the network. 10. Pervasive Monitoring Slides: http://www.iab.org/wp-content/IAB-uploads/2013/01/Privacy- ECSG-update-IETF-IEEE-Exec-meeting.pptx Juan Carlos Zuniga noted that the slides are an update that some may have seen parts of before. This is to get people on the same page regarding the EC privacy study group recommendations. At the last plenary meeting, 802 did a privacy tutorial. This was an outcome of the STRINT workshop in March. Despite the good work and interest, there was still a missing part on lower layer protocols. The Tutorial provided an update on the recent concerns about Internet privacy, the actions that IETF is taking, and the guidelines that are being followed when developing new specifications (e.g. RFC 6973 - Privacy Considerations for Internet Protocols). - It highlighted privacy concerns applicable specifically to Link Layer technologies, and provided suggestions on how IEEE 802 can help addressing them - The idea of developing an IEEE 802 recommended practices document, similar to the one produced by IETF (e.g. RFC 6973) was suggested and supported by several IEEE 802 members from different WGs. Juan Carlos Zuniga recalled that the 802 EC Privacy Study Group was created in July; he chairs this. It is chartered to run through November 2014, with the expectation of renewal until March 2015. The scope is to study privacy issues related to IEEE 802 technologies and consider the need for a recommended practice applicable to IEEE 802 protocols. If such a need is identified, the SG will determine whether the IEEE 802 criteria for standards development (CSD) support the initiation of a project and, if so, it will prepare a PAR for consideration by the IEEE 802 Executive Committee. Current topics include: - Threat Model for Privacy at Link Layer, - Privacy Issues at Link Layer, - Proposals regarding functionalities in IEEE 802 protocols to improve Privacy, - Proposals regarding measuring levels of Privacy on Internet protocols, - Implications of MAC address changes. The group is planning an opt-in trial using IETF and IEEE meetings networks to assess performance and implications of users' MAC address randomization. This is currently under discussion with the IETF NOC team. They are discussing implications to DHCP pools, states in network switches, MAC address collisions, ARP/ND, IPv6 addressing, AAA servers. The guideline would be to use specific tools that have known behavior. We may also need some specific tools for the trial; need to keep track of the number of users. Keep logs, these are the details we are figuring out. The planning team will have more discussions later on this week. If they think we have a good set of tools, they will likely give it a go for the next IETF meeting. The planning team has had one teleconference so far, as well as presentations at 802 interim meetings in Ottawa and Athens. There will also be 2 teleconferences before the next 802 plenary. Some resources: - EC SG Web Page http://www.ieee802.org/PrivRecsg/ - Mailing list (reflector) stds-802-privacy@listserv.ieee.org - Mentor (document repository) https://mentor.ieee.org/privecsg/documents - RFC 6973 - Privacy Considerations for Internet Protocols http://tools.ietf.org/html/rfc6973 Juan Carlos asked how to enforce privacy recommendations on future protocol standards. Kathleen Moriarty answered that the IETF is trying to do a mix of things. The Security Directorate reviews drafts, and SEC ADs and Alissa Cooper (RAI) are also looking for privacy concerns as well. Alissa Cooper clarified that at one point IETF tried to have a Privacy Directorate separate from the SecDir, but couldn't get it off the ground. We are trying to make people think both about security and privacy. In general it's not as formal as it is for security considerations. They talked about a dedicated privacy considerations section when working on RFC 6973, but decided there was already enough angst about the required sections of documents. Paul Nikolich repeated a question asked during the tutorial because it's core to this issue: How do we quantify privacy? Without a metric, how do we know if we're improving or not? Do you agree that that is an important consideration? Richard Barnes answered that having a way to measure things is important, but in terms of quantification, it isn't super helpful. When you solve a security problem, you're not moving a number, you're changing a risk profile. Juan Carlos Zuniga added that it's a difficult question to answer, and can turn philosophical very quickly. Look at the way the RFC was written, look at the threat model, and then provide some way to identify the risk. Jari Arkko agreed with Richard Barnes; the analysis is important, but it is qualitative rather than quantitative. He think this is exciting stuff, thank you for doing it. Jari asked Juan Carlos Zuniga if he has a feeling on whether this is workable or doable; can a system run and not have a problem with those things? Juan Carlos replied that they are optimistic. Jim Martin had a thought that if things work out well, next step is to incorporate it in the regular IETF network. The idea is that it is feasible, but we need to see how it will behave. Barry Leiba stated about having a threat model and knowing the privacy things that are sensitive is good. And as Alissa Cooper and Kathleen Moriarty noted, review is important as well. * * * Kathleen Moriarty presented an overview of the IETF work on pervasive monitoring. Slides http://www.iab.org/wp-content/IAB-uploads/2013/01/IETF- SecAreaPMOverview-MoriartyFarrell-0914.ppt Kathleen Moriarty explained the theme of encryption without authentication. Authenticated encryption is difficult. Encryption without authentication might look the same as the plain text would. Discussions on this topic are ongoing on the perpass mailing list. Barry Leiba replied that HTTPS will get you TLS, but that you won't see the key symbol indicating that a page is encrypted if you just use HTTP. Jari Arkko asked how the IETF and 802 can benefit from the work the other is doing. Juan Carlos Zuniga replied that the earlier point about changing the timing when one changes identifiers is the sort of coordination that will be needed to be more effective. Paul Nikolich added that this whole privacy area is a really good opportunity for tight collaboration between the groups. Dan Romascanu proposed that this kind of status presentation (e.g. Kathleen Moriarty's presentation linked above) to be presented at one of the SG calls, providing a list of pointers. Kathleen Moriarty added that diversity in personal experience improves the effort; she sees this in the IETF SecDir reviews. Different people pick up on different things. Paul Nikolich suggested a possible collaboration area on the threat models. Juan Carlos Zuniga answered that he and Alissa Cooper have been discussing this, and that he asked for her help on the threat model. Alissa Cooper reiterated Jari Arkko's earlier point that there isn't much point in solving a problem at one layer when there are still problems at all of the other layers. She added that just because something is hard does not mean that is a reason not to do it. The IAB has been thinking about what has been accomplished in terms of privacy and security. Subir Das asked for whom are we trying to provide privacy? The user, the device, or both? Alissa Cooper answered that they have been focusing on the individual. A device generally doesn't have need for privacy unless there is an individual associated with it. In RFC 6973, the IAB decided to concentrate on when something can be associated with an individual person. Kathleen Moriarty added that the threat model guided them towards that decision; that was the deduction after working through the scenarios. Alissa Cooper observed that the challenge is that when developing an app for a single use, one doesn't know how it will be used. Barry Leiba observed that even if one can't associate a MAC address with him, if one can associate a MAC address with a pattern of behavior, then that can lead to him. Jari Arkko noted that the point about correlation at multiple layers was not meant as discouragement. Norm Finn asked whether ,given the amount of information collected about a user by his apps, and the degree to which the apps can talk to each other--are we wasting our time on MAC address privacy? Barry Leiba answered that it's not the whole picture, but it's not a waste of time. Alissa Cooper concluded that we are looking at ways to de-correlate some of these application identifiers, and that additional efforts in the MAC address space would be useful as well. 11. Action Items, Future Meetings, and Planning Work Ahead NEW ACTION ITEMS: - Ted Hardie and Juan Carlos Zuniga to put together a detailed description for item 23 on the shared areas work list, on naming in Layer 2 networks. - Adrian Farrel and Glenn Parsons to provide a description for item 25 on the shared areas work list, on 802.1. and PCE. - Glenn Parsons to follow up with Adrian Farrel and the expert reviewers for the IS-IS TLV registry about getting an assignment for 802.1. - Glenn Parsons to send a detailed description of the 802.1 IS-IS TLV issue to Dan Romascanu for addition in the shared work items list. - Juan Carlos Zuniga, Stephen Farrell, and Alissa Cooper to write up a description for the shared work items list on pervasive monitoring. The group discussed possible future meeting dates. Dan Romascanu noted that IETF and IEEE 802's meeting calendars will not have them on the same continent at the same time anytime in the next two years. The group discussed whether face-to-face meetings were still necessary, since there are also the interim conference calls. The group deferred making a decision on future face-to-face meetings until after the next conference call, tentatively scheduled for January 2015.