Routing Area Open Meeting (rtgarea) IETF 102 (Montreal, Canada) =============================================================================== Area Directors: Deborah Brungard (db3546@att.com) Alvaro Retana (aretana@cisco.com) Martin Vigoureux (martin.vigoureux@nokia.com) Area Secretary: Jonathan Hardwick (jonathan.hardwick@metaswitch.com) Wiki: https://trac.tools.ietf.org/area/rtg/trac/wiki/WikiStart Scribe: Jonathan Hardwick (jonathan.hardwick@metaswitch.com) Location: Laurier, Fairmont The Queen Elizabeth, Montreal, Canada Time: July 17, 2018, 1330-1530 (1:30pm-3:30pm) ------------------------------------------------------------------------------- 1. Administrivia ------------- Alvaro Retana: We have skipped the usual WG status round-up this time. Instead, we have 4 presentations for the area. ------------------------------------------------------------------------------- 2. Those Who Do Not Learn History Are Doomed To Repeat It ------------------------------------------------------ Ross Callon & John Scudder See slides and recording for content. No questions. ------------------------------------------------------------------------------- 3. Authors Don'ts and Dos ---------------------- Deborah Brungard See slides and recording for content. No questions. ------------------------------------------------------------------------------- 4. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies ------------------------------------------------------ Maria Apostolaki, ETHZ See slides and recording for content. Dino Farinacci: Regarding slide 109: which fields are modified in the GET_DATA? Maria Apostolaki: Just the hash, so you are requesting an older block. Brian Smith: You do also need to modify the timestamp in the block header if you are generating a new hash. Khalid Samara: Are there more details about your SABRE design? Maria Apostolaki: SABRE suite keeps most recent block, and advertises it to all clients. Can keep up at line rate. Can also apply whitelist, blacklist, spoofing detection to mitigate DDoS. Khalid Samara: Is your device in-line, to stop DDoS attacks? Maria Apostolaki: What I mean is, in a DDoS attack, the attacker also attacks the relays e.g. using a Hello flood. The SABRE switch deals with it because not all requests have to go through the whole stack. Brian Smith: One attack vector is when a mining pool is centralized and shuts out all smaller miners by preventing those miners from having a connection to their pool. Maria Apostolaki: A partition attack is not used by one mining pool against another. But the reason these attacks work is that mining power is centralized. If we assume mining pools are benign then it might be easier to persuade them to deploy a better network rather than redesign the Internet to solve these problems. ------------------------------------------------------------------------------- 5. SECMACE:Scalable and Robust Identity and Credential Infrastructure in --------------------------------------------------------------------- Vehicular Communication ----------------------- Panos Papadimitratos, KTH Royal Institute of Technology See slides and recording for content. No questions. ------------------------------------------------------------------------------- The following agenda items were dropped for lack of time. o Cross Working Group Discussions o Open Discussion / Any other business Meeting closed at 1530. ===============================================================================