HotRFC Lightning Talks at IETF-115

Sunday, November 6, 2022

Starting Time: An hour after the Welcome Reception starts

Room: Next to the Welcome Reception
Organizers: Spencer Dawkins, Liz Flynn

Email: hotrfc@ietf.org 

Call for Participation


MEETING AGENDA


1. Computerate Specifying: The Five Levels of I-D Writing - Marc will not be with us

2. The Mesh, the Multiverse and Everything

3. KIRA – A Scalable ID-based Routing Architecture for Control Planes

4. Mobile User Plane Evolution – Integrating AN and UPf

5. Supercharging Traceroute

6. Encrypted Client Hello Deployment Considerations

7. The JSON format for vCon - Conversation Data Container

8. Encrypted Transport over Satellite (EToSat) Side Meeting Advertisement

9. Can formal specifications help?

10. The problem of mass unauthorized security scans/tests

11. SIP-over-QUIC

12. Analysing and improving standard setting processes

13. TMP: Time Modulation Protocol

14. Is Privacy Preserving Web Filtering Possible?

15. Matrix+MIMI


ABSTRACTS

1. Computerate Specifying: The Five Levels of I-D Writing - Marc will not be with us

Presenter and affiliation: Marc Petit-Huguenin, Impedance Mismatch LLC

Datatracker slides here

Abstract: Computerate Specifying integrates code and markdown to generate Internet-Drafts.

Looking for: Interest and discussion via email

Coordinates: Marc Petit-Huguenin <marc@petit-huguenin.org>


2. The Mesh, the Multiverse and Everything

Presenter, Affiliation: Phillip Hallam-Baker, Threshold Secrets LLC

Datatracker slides here

Abstract: "Everything" is a document format, notification structure and protocols that provide a consistent and coherent infrastructure for human interaction through the Internet.

Everything is a document format, notification structure and protocols that provide a consistent and coherent infrastructure for human interaction through the Internet.

All existing modalities of human Interaction addressed by existing Internet protocols are supported, including:

Despite the wide scope of Everything’s capabilities, the adoption of a consistent approach to all forms of messaging with end-to-end security built in allows a considerable reduction in client complexity.

Everything builds on existing approaches. Where possible, existing protocols and infrastructure are adopted without modification (e.g. use of WebRTC for voice and video interaction). In other cases, existing formats are adapted.

Everything is an Open Infrastructure in which there are no gatekeepers determining who is allowed to provide service, any user may use the service provider of their choice and change their choice of service provider without switching costs.

Looking for:

Coordinates: Mathematical Mesh 3.0 Part X: Everything (ietf.org)

https://www.ietf.org/archive/id/draft-hallambaker-everything-00.html

https://mathmesh.com/


3. KIRA – A Scalable ID-based Routing Architecture for Control Planes

*Presenter*: Roland Bless, KIT

Datatracker slides here

Abstract: KIRA is a new, highly scalable routing architecture that was specifically designed for being used in (autonomous) control planes (in-band and/or out-of-band). It aims at providing highly robust connectivity, it is ID-based, zero-touch and scales to large networks consisting of 100,000s of nodes. It performs well in various different topologies (sparse, dense, random, regular etc.), supports link weights and multi-path routing as well and shows fast convergence even in drastic failure scenarios.

Moreover, it is loop-free and uses an approach similar to label switching to forward the control plane packets efficiently. Furthermore, it optionally provides a built-in DHT (key-value store) and a highly efficient topology discovery mechanism. A prototype (using OpenVSwitches) provides IPv6 connectivity between all KIRA nodes, so that IPv6-capable (control) applications may directly use KIRA's provided connectivity. KIRA could be used as a routing protocol for ANIMA's ACP and similar environments.

Looking for: Collaboration, discussion on the approach, get feedback on readiness for and interest in standardization (e.g., BarBOF as followup).

Further Information:

A first paper has been published here:

https://ieeexplore.ieee.org/document/9829816

or if you don't have access, you can also use the preprint version here:

https://publikationen.bibliothek.kit.edu/1000148953

Planned Presentations@IETF115:

RTGWG Thursday (Nov 10th), 13.45h

ANIMA WG Thursday (Nov 10th), 14.30h


4. Mobile User Plane Evolution – Integrating AN and UPf

Presenter and affiliation: :Jeffrey Zhang, Juniper

Datatracker slides here

Abstract: draft-zzhang-dmm-mup-evolution-02 discusses potentially integrating UPF and Access Node (AN) in a future generation (xG) of mobile network.

Purpose: This document is not an attempt to do 3GPP work in IETF.  Rather, it discusses potential integration of IETF/wireline and 3GPP/wireless technologies - first among parties who are familiar with both areas and friendly with IETF/wireline technologies.  If the ideas in this document are deemed reasonable, feasible and desired among these parties, they can then be brought to 3GPP for further discussions.

Coordinates: draft-zzhang-dmm-mup-evolution-02


5. Supercharging Traceroute

Presenter: Rolf Winter, University of Applied Sciences Augsburg, (remotely)

Datatracker slides here

Abstract: The IETF has been working on OAM for a long time and knows

how important OAM is for operators, enterprises and users, too. It

provides elaborate mechanisms for anyone in control of their network

such as Netconf and YANG, or more recently things like IOAM. And those

mechanisms work well when indeed the network is under one's control. On

the public internet, these mechanisms won't help you and today, all you

have left in those cases is ping and traceroute. Let's supercharge

traceroute and help those internet citizens troubleshooting problems

that are outside their own network.

Looking for: Discussion on the proposal, implementers are always welcome

and people who would host our own reverse traceroute implementation or

use our client to perform reverse traceroute against our own server.

Coordinates: The draft can be found here

https://datatracker.ietf.org/doc/html/draft-heiwin-intarea-reverse-traceroute-00,

discussion please on the INTArea WG mailing list.

Website: https://net.hs-augsburg.de/en/project/reverse-traceroute/

Github:        https://github.com/HSAnet/reverse-traceroute

Contact: rolf.winter@hs-augsburg.de 


6. Encrypted Client Hello Deployment Considerations

 Presenter, Affiliation: Andrew Campling, 419 Consulting (possibly joined by Arnaud Taddei, Broadcom – travel times permitting)

Datatracker slides here

 

Abstract:

The ECH Deployment Considerations I-D is intended to highlight the operational consequences of deploying the Encrypted Client Hello extension to TLS 1.3, helping developers, end-users and others.  The text of the current draft is being updated by additional contributors as well as input from related documents such as draft-taddei-ech4ent-introduction-00. The objective of this HotRFC is to inform interested parties about the forthcoming side meeting on the topic to gather further input and broaden participation in the development of the draft.

Looking for:

 

Coordinates to learn more: ECH Deployment Considerations side meeting, Monday 7th November, 19:00-20:00 UTC in Richmond 6 or Zoom

Email: Andrew.Campling@419.Consulting or Arnaud.Taddei@Broadcom.com

An updated I-D, draft-campling-ech-deployment-considerations-03, will be released when submissions reopen on 7th November 2022.


7. The JSON format for vCon - Conversation Data Container

Presenter, Affiliation:Daniel Petrie, SIPez LLC

Datatracker slides here 

Abstract:

A vCon is the container for data and information relating to a real- time, human conversation. It is analogous to a [vCard] which enables the definition, interchange and storage of an individual's various points of contact. The data contained in a vCon may be derived from any multimedia session, traditional phone call, video conference, SMS or MMS message exchange, webchat or email thread. The data in the container relating to the conversation may include Call Detail Records (CDR), call metadata, participant identity information (e.g. STIR PASSporT), the actual conversational data exchanged (e.g. audio, video, text), realtime or post conversational analysis and attachments of files exchanged during the conversation. A standardized conversation container enables many applications, establishes a common method of storage and interchange, and supports identity, privacy and security efforts (see [vCon-white-paper])

Looking for:

Learn more at:

* mailing list: https://www.ietf.org/mailman/listinfo/Vcon

* I-D: https://datatracker.ietf.org/doc/draft-petrie-vcon/

* Open Source: https://github.com/vcon-dev/vcon

* vCon-white-paper: https://bit.ly/vcon-wp

IETF 115:

* Hackathon Saturday and Sunday

* HotRFC: 18:00 Sunday

* ART dispatch WG meeting Mon 9:30

* vCon Bar BoF: Thurs. 15:30-16:30 Richmond 6


8. Encrypted Transport over Satellite (EToSat) Side Meeting Advertisement

Presenter, Affiliation: John Border, Hughes, in person

Datatracker slides here

Abstract: Brief outline of what we plan to present and discuss at the side meeting.  Specifically, this EToSat meeting is focused on GEO topics related to TCP and QUIC.

Looking for: Looking to get interested parties educated and generate some energy in collaborating on some potential solutions.

Coordinates:

Side meeting - Wednesday, November 9, 11:45 GMT, Richmond 6, 1 hour

Contact John Border (John.Border@Hughes.com) or the EToSat mailing list (etosat@ietf.org) for more information.


9. Can formal specifications help?

Presenter (in person): Ken McMillan (UT Austin)

Datatracker slides here

Abstract:

A formal specification of a protocol gives an unambiguous mathematical description that is useful in many ways, formal proof being only one.

We'll discuss some other ways in which the IETF process could benefit from formal specifications, using the QUIC protocol as an example.

What we’re looking for: collaborators

Contacts:

Ken McMillan: kenmcm@cs.utexas.edu, Lenore Zuck: zuck@uic.edu 

IETF side meeting: IRTF Usable Formal Methods Research Group


10. The problem of mass unauthorized security scans/tests

Presenter: Rich Kulawiec, Fire on the Mountain (remote)

Datatracker slides are here

Abstract:

An increasing number of operations are conducting mass security scanning/testing of as many systems as they can. This trips alarms, fills logs, consumes human time, is being done without permission, builds datasets that are highly useful to attackers who can't build their own, and won't scale.

Do we concur that this is a problem, and if so, do we think it's a problem we can/should address, and if so, then what can we do (RFC? BCP?) to address it? I suggest a temporary mailing list to ask/answer these questions.

What I'm looking for: Discussion

Contact: rsk@firemountain.net so Rick can judge interest and request a mailing list if warranted


11. SIP-over-QUIC

Presenter: Sam Hurst (in person). Affiliation: BBC Research & Development

Abstract:

I would like to present a mapping of Session Initiation Protocol (SIP) semantics over QUIC Transport, inspired by HTTP/3. It allows the creation, modification and termination of media sessions with one or more participants, possibly carried over the same QUIC transport connection, using RTP/AVP directly, or some mixture of both.

Datatracker slides are here

What I'm looking for: Mainly feedback on whether this is something worth pursuing further, and whether this is a topic for AVTcore, SIPcore or MoQ.

Learn more: The working draft is available here: https://bbc.github.io/draft-hurst-sip-quic/draft-hurst-sip-quic.html 


12. Analysing and improving standard setting processes

Speaker: Ignacio Castro (Queen Mary University of London).

Datatracker slides are here

 

Abstract:

We are studying decision making in the IETF using a combination of natural language processing and social network analysis with the goal of identifying lessons for other organisations, bottlenecks and potential solutions to the latter.

We have published several papers with evidence pointing to increasing challenges in publishing RFCs. We are running an IETF hackathon, will present some of our findings at Maprg and will have a side meeting to start planning for a Research Group to bring together related efforts (Researching Internet Standards Processes Research Group –RASP RG).

What we're looking for: We are looking for participants interested in the topic and for participants who can help us to ground-truth our analysis and develop tools that can help the community.

We are also seeking the support of the community to help us develop tools and analysis that can better support the IETF and its participants. We are building a reviewer recommendation engine for the IETF. This is intended to support Working Group chairs by automatically suggesting available reviewers for given drafts based on a composition of interests and expertise.

(Please, help us in this last task by filling in this IETF Draft-Reviewer Matching Survey:: https://ietf-annotation.eecs.qmul.ac.uk/html/index.html)

 

Coordinates:

Our findings have been published in the proceedings of:

AAAI Conference on Web and Social Media (ICWSM), 2022: https://ojs.aaai.org/index.php/ICWSM/article/view/19310

ACM Internet Measurement Conference (IMC), 2021: https://dl.acm.org/doi/abs/10.1145/3487552.3487821

To contact me:

via a email (i.castro@qmul.ac.uk)

In maprg: Thurs-10th 1pm-3pm

In the RASP RG side meeting: Thurs-10th 3.30pm

After HotRFC (in Liberty B room or the bar)


13. TMP: Time Modulation Protocol

Presenter: Hans-Dieter Hiep

Affiliations: Leiden Institute of Advanced Computer Science (LIACS), Centrum Wiskunde & Informatica (CWI)

Datatracker slides are here

Abstract:

During our EU-supported Next Generation Internet research project, we discovered a novel technique for increasing the effective capacity or increasing the end-to-end privacy of communication channels using high-resolution clocks such as atomic clocks. We investigated under which specific conditions more data may be sent on channels than is traditionally the case. We also investigated under which conditions we may increase the confidentiality of data transfer over channels when compared with existing classical encryption techniques. Our research work has potential application for network operators who purchase transit to connect with remote networks, and for end-users who wish to increase their privacy, both without adapting the underlying networks.

Datatracker slides here

Looking for: collaborators and implementers

More information:

Website: https://reowolf.net/time-modulation-protocol-a-killer-app-for-reowolf/

Contact: hdh@cwi.nl


14. Is Privacy Preserving Web Filtering Possible?

Presenter: Dan Sexton, CTO at the Internet Watch Foundation (https://www.iwf.org.uk/) (remote)

Abstract: The IWF has long provided data to ISPs and industry partners to filter and block URLS that are being used or abused to host child sexual abuse imagery. As internet standards have developed and use of encryption has grown, the methods that organisations used to perform legitimate filtering of harmful content have become less and less effective. Can legitimate, legal web filtering co-exists with a secure and private internet? Can advances in encryption and privacy enhancing technologies be leveraged to filter harmful web content without compromising user privacy?

Presentation is here

What I'm looking for: I will be holding a side meeting on Tuesday the 8th at 15:30 to pose this question and I am interested in encouraging participation from the IETF community, particularly those that can offer potential technical solutions which can help break the challenge of privacy preserving web filtering.

Coordinates: Side meeting in Room: Richmond 6 - Tuesday 15:30


15. Matrix+MIMI

Presenter, affiliation: Travis Ralston, The Matrix.org Foundation C.I.C.

Venue: In-person

Abstract: The EU Digital Markets Act (DMA) brings a requirement for messaging "gatekeepers" to interoperate with everyone else, while still maintaining the same level of encryption. The More Instant Message Interoperability (MIMI) working group, expected to be formed here at IETF 115, aims to create a set of standards that allow for easy interoperability and secure communication. Matrix, meanwhile, is an existing open standard for secure, decentralized, communication with a natural focus on interoperability: a seemingly perfect fit for MIMI.

We'll talk briefly about how DMA affects today's world, how Matrix is fit for purpose, and what would need to change in Matrix's open standards process to be brought into the IETF processes and domain.

Looking for: Thoughts, opinions, and general discussion around this concept.

Coordinates: MIMI mailing list, MIMI BoF at IETF 115, or Travis Ralston <travisr@matrix.org> as the speaker

Helpful material: The meeting materials for the MIMI BoF cover much of this space, and a bit more: https://datatracker.ietf.org/meeting/115/materials/agenda-115-mimi-03