=========================================================================== Paper #1: Limited Domains and Internet Protocols --------------------------------------------------------------------------- Authors: Brian Carpenter (The University of Auckland) Sheng Jiang (Huawei) Topics: General, Internet --------------------------------------------------------------------------- There is a noticeable trend towards network requirements, behaviours and semantics that are specific to a limited region of the Internet and a particular set of requirements. Policies, default parameters, the options supported, the style of network management and security requirements may vary. draft-carpenter-limited-domains reviews examples of limited domains and emerging solutions. It shows the needs for a precise definition of a limited domain boundary and for a protocol to discover the boundary. We're looking for informal discussion of this at IETF102. =========================================================================== Paper #2: EAT, General Purpose Device Attestation based on CBOR and COSE --------------------------------------------------------------------------- Authors: Laurence Lundblade Giri Mandyam Topics: Security --------------------------------------------------------------------------- EAT is a proposed general purpose format for endpoint device attestation. Its purpose is to securely convey information about an endpoint device (an entity) to a relying party (server / service). The relying party uses this to decide if they trust the device and/or transactions from it. =========================================================================== Paper #11: On the Different Kinds of Rodents in the IETF Ecosystem --------------------------------------------------------------------------- Authors: Henk Birkholz --------------------------------------------------------------------------- Remote Attestation Procedures (RATS) help to create evidence about entity characteristics that can be conveyed to other entities and thereby enable the secure conveyance of proof that the evidence-creating entity is a trustworthy system and a trusted system, respectively. Currently, Remote Attestation work is scattered all over the IETF and RATS try to consolidate that a bit and create more synergy (and of course standardized terminology). =========================================================================== Paper #4: An Architecture for a Public Identity Infrastructure Based on DNS and OpenID Connect --------------------------------------------------------------------------- Authors: Vittorio Bertola (Open-Xchange) Marcos Sanz (Denic) Topics: Applications & Real Time, Internet --------------------------------------------------------------------------- We will very briefly introduce our idea of a "public identity infrastructure" that would allow any Internet user to use an identity managed by any identity provider they like to sign into any online service or website: like "login with Facebook", but public, open and federated. We use the DNS as a directory for identities and OpenID Connect/OAuth for sign on and identity management. See https://datatracker.ietf.org/doc/draft-bertola-dns-openid-pidi-architecture/?include_text=1 for details. Efforts are ongoing in several places (see id4me.org) but we would like to see whether there are people interested on working on this at the IETF. =========================================================================== Paper #5: IETF and Sustainable Development --------------------------------------------------------------------------- Authors: Marie-Jose Montpetit (TriangleVideo) Topics: IETF Culture --------------------------------------------------------------------------- The client-server model, the move to cloud networking and the use of AI datasets and blockchain in the Internet seem to consider electrical power is infinite and will stay so for ever. With the combination of global warming and the reach of the internet in areas poorly served by traditional solution it may be time to consider how Internet innovation can diminish it's impact on the environment and contribute to sustainable information development including solutions that reduce power consumption or use more energy friendly protocols. =========================================================================== Paper #6: EveryRFC --------------------------------------------------------------------------- Authors: Mark Nottinghasm (Fastly) Topics: General --------------------------------------------------------------------------- Introduce and solicit feedback / contributions. =========================================================================== Paper #7: DARE Container - A format for encrypted logs. --------------------------------------------------------------------------- Authors: Phillip Hallam-Baker (Comodo Group Inc.) Topics: Security --------------------------------------------------------------------------- IETF has a lot of formats designed for encrypting messages but thus far, no format purpose designed for encrypting logs. DARE Container is a general purpose data container format designed to meet a wide range of needs (encrypted archives, persistence store and database logs) that is particularly well suited for encrypting log files. Encrypting your log files will not make your organization GDPR compliant but limiting the number of people who can access log file data with PII is a pretty good way to start to get a handle on the problem. DARE Container applies JSON Web Encryption and JSON Web Signature in ways that allow a public key operation to apply to individual records or to groups of records. This avoids the need for a server to perform a public key operation for every entry appended. Containers may provide blockchain style chained digests or Merkle tree digests for additional integrity protections. =========================================================================== Paper #8: Privacy issues with tunneling alternatives in next generation systems --------------------------------------------------------------------------- Authors: Dirk v. Hugo (Deutsche Telekom AG) Topics: Not Sure --------------------------------------------------------------------------- Identifier-Locator (Id-Loc) split approaches for routing data packets efficiently between moving devices has been proposed as alternative to traditional tunneling and encapsulation - especially since not all packets need same treatment. These approaches need some kind of mapping or look-up between (fixed) Identity and (dynamic) Locator. Such mapping systems hold sensitive privacy information and could pose new risks and vulnerabilty to attacks. Planned new work shall discuss and progress on privacy-enabled mapping systems required in general Id-Loc separated approaches – starting with problem statement, gaps in existing solutions, and requirements – being abstracted from specific protocols (LISP, ILNP, ILA) as much as possible. A correspondingly BoF was applied for but not approved. We look for interest and/or advice ... =========================================================================== Paper #9: Resource Sharing for Stateless Packet-Switched Networks --------------------------------------------------------------------------- Authors: Sandor Laki (ELTE Eötvös Loránd University, Budapest, Hungary) Topics: Operations & Management, Transport --------------------------------------------------------------------------- Future mobile networks will consist of many small cells that can provide large bandwidth connections to end users. This makes appropriate overprovisioning of the backhaul networks difficult and costly. Similar problems arise in multi-tenant data center networks and Internet service providers' access networks where a large number of applications generate unknown traffic patterns. Modern applications also pose a number of new challenges against the communication network since different requiremenents (e.g. high bandwidth, low latency, low loss or the combination of these) should be satisfied for achieving high quality of user experience. In such scenarios, scalable and quality of service (QoS) aware bandwidth sharing and queuing delay management are needed. Accordingly, network nodes should remain simple, not require per-user states and provide means for a rich set of resource sharing policies. In this lightning talk, we propose Per Packet Value (PPV) resource sharing framework as a flexible and simple solution for the above problem. =========================================================================== Paper #10: Autonomous Asynchronous Management Policy and Protocols (AMP) --------------------------------------------------------------------------- Authors: Ed Birrane (Johns Hopkins, APL) Rick Taylor (Airbus) Topics: General, Operations & Management --------------------------------------------------------------------------- Devices that are separated from their upstream management by delayed or disrupted links are notoriously difficult to manage. Some of the problems involved could be overcome by imbuing the end device with more autonomy. The DTN working group has a number of individual drafts and working group documents describing the complexities of managing devices over links that may be heavily delayed or disrupted, as well as proposed protocols to address these difficulties. Please note: Although the work is currently beginning in the DTN working group, we believe the subject has applicability beyond Delay Tolerant Networking.