AGENDA 1. Data Discovery Michael McBride If data is the new oil of the 21st century, then we need a standardized way of locating, capturing, classifying and transforming this raw data to generate insights and recommendations. Data, like oil, needs to be discovered and captured in order to be refined and valuable. While the topic of data discovery can be far reaching, a set of documents focuses on the problem of actually locating data, throughout a network of data servers, including edge and mobile, in a standardized way. This topic is being discussed in the COIN RG where you can participate in the discussion. Or you can email the authors at draft-mcbride-edge-data-discovery-overview@ietf.org. ---- 2. Generic Ciphertext Format Yaron Sheffer NIST standards define the basic format of encrypted data, such as raw binary data encrypted with AES. But many organizations need to manage encrypted data at scale, and to enable that, the bare ciphertext must be augmented with metadata. The extra metadata typically appears as a header. It may include the identity of the key that encrypted the data, the key’s version, and possibly other information. This format needs to be standardized in order to allow multiple crypto libraries and multiple key management systems to interoperate. I present a simple format that addresses this need. My goal is to team up with others who are interested in this space, hopefully leading to a BoF. Draft format: https://docs.google.com/document/d/1U_zUdz__MxvlOo09Z1l-Y8PX8RKpF2sMr3VAMN-lKvY/edit?usp=sharing Follow up directly with me: yaronf.ietf@gmail.com. ---- 3. Updates on Blockchain Governance Initiative Network (BGIN) Shigeya Suzuki In IETF107, we provided a short presentation on our activity on governance on blockchain technology -- Blockchain Governance Initiative Network, BGIN[1]. I will provide a short update on the activity at the BGIN community. If you are interested, please send me an email [2] for more info, or join the community directly [3]. We may have ad-hoc meetings if there is enough interest in the IETF community. [1] https://bgin-global.org/ [2] shigeya@wide.ad.jp [3] https://bgin-global.org/join/ ---- 4. Your App Every-Where – Any Time – Under your Control Some sensitive applications may require being on-line, but under user control. For example a blockchain key-store, used to sign transactions, is on-line and can be accessed anytime from anywhere. Is it possible to deploy such infrastructures?. In our vision secure elements are the best way to deploy services under user control. Two IETF drafts describe implementation of TLS1.3 server in secure element (TLS-SE) and client credentials security (TLS-IM). Open implementation of these IETF drafts can be downloaded on github. Scalability is a key issue. Is there a future for such an idea?. Can we build this Internet?. This is an open initiative. You can contact me at pascal.urien@gmail.com More info https://tools.ietf.org/html/draft-urien-tls-se-01 https://tools.ietf.org/html/draft-urien-tls-im-03 https://github.com/purien/TLS-SE ---- 5. Dyncast (Dynamic anycast) in CFN Liyizhou Service providers are exploring the edge computing to achieve better response time by moving the computing services towards the edge of the network from central cloud. The number of edges can be huge and each has limited computing resources. How to optimally route service demands, especially for computationally intensive service, based on computing and network metrics to the best edge becomes a problem. Dyncast (dynamic anycast) tries to focus on network based mechanisms to solve it, including the following features, - Anycast based service addressing methodology - Flow Affinity - Computing Aware Routing There will be a virtual side meeting to discuss this topic. Time: Wed (Nov 18), start 5 min after IETF plenary ends, 75-min session - UTC 10:45 - 12:00 - CET (UTC+1) 11:45 - 13:00 - CST (UTC+8) 18:45 - 20:00 - PST (UTC-8) 02:45 - 04:00 Information also available on side meeting wiki: https://trac.ietf.org/trac/ietf/meeting/wiki/109sidemeetings Webex: cfn-dyncast --- 6. Make Private Enterprise Numbers much easier to understand and to use Zidago Sako How to seamlessly and securely implement Private Enterprise Numbers networks in both private and public internet contexts? The current operational guidelines in RFC 1918 do not address the matter with enough simplicity. Would it be not possible to design (no longer with the DHCP - ALG method) a technology that solve the complexity of combining private and public internets while keeping the flexibility that private internet give? I would welcome contributions in any IETF forum or group and I will elaborate on this further if the idea gets your interest. --- 7. Android Explicit Monitoring App Massimo Nilo Our goal is to provide a mobile tool for traffic performance monitoring in the era of encrypted transport also using Explicit Flow Measurements (EFM). Explicit Flow Measurements employ few marking bits, inside the header of each packet, for loss and delay measurement (protocol independent and valuable for encrypted header protocols: e.g. QUIC). Here useful information about the follow up of HotRFC presentation: - Involved Drafts Explicit Flow Measurements (draft-mdt-ippm-explicit-flow-measurements) User Devices Explicit Monitoring (draft-cnbf-ippm-user-devices-explicit-monitoring) - Drafts presentation IETF 109 IPPM WG meeting, 12:00-14:00, Monday Session I, Room 8 - Hackathon IETF 109 – QUIC Measurements Project. - Contact persons Mauro Cociglio (mauro.cociglio@telecomitalia.it) Massimo Nilo (massimo.nilo@telecomitalia.it) Fabio Bulgarella (fabio.bulgarella@guest.telecomitalia.it) ---