Sunday, March 16, 2025
Starting Time: An hour after the Welcome Reception starts (18:00)
Room: Chitlada 3
Organizers: Heather Flanagan, Bron Gondwana, Liz Flynn
Email: hotrfc@ietf.org
Call for Participation - Spots are still available!
SESSION AGENDA
ABSTRACTS
Presenter, Affiliation: Phillip Hallam-Baker, Threshold Secrets LLC
Datatracker slides TK
Abstract: The DNS is the naming infrastructure for the Internet. The DNS is used to identify hosts and services, why not people? Blue Sky have made use of the DNS as a naming infrastructure for their federated social media platform, the ATmosphere and are currently supporting 32 million users, demolishing claims that the approach can't work.
Now that we know the approach does work, what else can we apply it to? This presentation will cover three systems currently running in my lab: @nywhere which generalizes the OAUTH profile used in the ATmosphere to make use of a DNS persona to log into any internet service and provides a path to moving beyond OAUTH authentication, @nyone which makes use of a JSContact bound to a DNS name to enable end-to-end secure communication via existing (OpenPGP, SSH, Signal, etc.) services and new ones (e.g. MOQ) and @nything which manages IoT devices through a DNS persona.
Users can maintain multiple personas by registering multiple handles which may or may not be explicitly linked. The growth of systems of this sort would give rise to the need for a 'Handle Service Provider' a role that is likely to be met by DNS Registrars but might well be met by other parties as well.
Looking for: Collaborators, implementers, see if there are more groups I should be talking to.
Coordinates: Phillip Hallam-Baker, phill@hallambaker.com
Demo site might be available at MPlace2.social
https://www.ietf.org/archive/id/draft-hallambaker-any-01.html
Presenter, Affiliation: Katerega Micheal, Chazah Group Ltd, in person
Datatracker slides TK
Abstract: The SW103k protocol introduces a lightweight compression and decompression layer to optimize bandwidth utilization, improve data transfer speeds, and ensure data integrity over constrained networks. Designed to function alongside existing transport protocols (TCP, QUIC, SCTP), SW103k leverages hybrid compression algorithms (markel + Huffman encoding) and error-checking mechanisms (CRC32) to enhance reliability in IoT networks, satellite communications, and mobile data transfers. This talk will outline SW103k's architecture, security considerations, and potential use cases within IETF and IRTF research areas.
Looking for:
- Collaborators for protocol refinement and optimization
- Implementers interested in deploying SW103k in real-world applications
- Feedback on security implications and integration with existing protocols
- Engagement from research groups on transport-layer efficiency and data integrity
Coordinates: Katerega Micheal, chief3@chazahgroup.org
Presenter, Affiliation: Manu Fontaine, Hushmesh Inc., in person
Datatracker slides TK
Abstract: Process isolation is a universally accepted CS concept. But even a perfectly isolated process leaks information to the system it runs on if it cannot encrypt/decrypt it with its own keys, generated and managed exclusively within its own isolation boundary. We need "process-level information isolation" to stop "leaky computing". We will hold a side meeting about this, as an update about our work on the Universal Name System (UNS) and Universal Certificate Authority (UCA). We'd like to introduce this work to those who have not heard about it yet, and provide an update to those who have.
Looking for: We're looking for partners and collaborators, for continued guidance as to how to bring this evolving work to the IETF community, and to continue discussions about a global and neutral governance model for such an infrastructure.
Coordinates: Manu Fontaine, manu@hushmesh.com
Side meeting: Stop Leaky Computing, Meeting Room 2, Tuesday March 18, 17:00-18:30
Presenter, Affiliation: Lun Li, Huawei, in person
Datatracker slides TK
Abstract: Future networks are shifting to the in-route computing. The traditional security often focuses on the data storage and transmission security. Nowadays, the data processing and its usage has attracted new security, trust and privacy requirements.
We are inviting people to join the side meeting, which is to discuss how to address the potential trust and privacy issues of data usage, processing, and sharing in telecom network. In particular, we would like to discuss the AI inference and training in telecom network with potential usage of emerging cryptography applications, such as homomorphic encryption and the distributed ledger.
Looking for: Collaborators to join our side meeting at 13:15-14:15 in 18 Mar.
Coordinates: Lun Li, lilun20@huawei.com
- https://trello.com/c/JwtMkJzN/56-1315-1445-enabling-data-security-trust-and-privacy-for-ai-in-future-network
- https://datatracker.ietf.org/doc/draft-li-ppm-homomorphic-encryption/
- https://datatracker.ietf.org/doc/draft-wang-spice-public-key-service-provider/
Presenter, Affiliation: Mingzhe Xing, Beijing Zhongguancun Laboratory, in person
Datatracker slides TK
Abstract: This presentation discusses an interoperable framework that facilitates collaborative network management between Large Language Models (LLMs) and human operators. The proposed framework introduces enhanced telemetry module, LLM decision module and standardized interaction data models between human operators and LLM-driven systems, and workflows to enforce human oversight. The approach ensures compatibility with existing network management systems and protocols while improving automation and decision-making capabilities in network operations.
Looking for: We are looking for collaborators to engage in ongoing discussions and further refine the draft.
Coordinates: Mingzhe Xing, xingmz@zgclab.edu.cn
- Relevant drafts
A Framework for LLM-Assisted Network Management with Human-in-the-Loop (https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/)
Presenter, Affiliation: Stuart Cheshire, Apple, in-person
Datatracker slides TK
Abstract: In the past decade there has been growing awareness about the harmful effects of bufferbloat in the network, and there has been good work on developments like L4S to address that problem. However, bufferbloat on the sender itself remains a significant additional problem, which has not received similar attention. This work effort aims to develop techniques and guidance for host networking software to avoid network traffic suffering unnecessary delays caused by excessive buffering at the sender. These improvements are expected to be broadly applicable across all datagram and transport protocols (UDP, TCP, QUIC, etc.) on all operating systems.
Looking for: We’re looking for implementers of TCP and QUIC (and other transport protocols, across all operating systems, across all implementations) to get together to agree the right API mechanisms to minimize delays due to source buffering inside the network stack.
Coordinates: Stuart Cheshire, cheshire@apple.com
Mailing List: https://mailman3.ietf.org/mailman3/lists/sbm.ietf.org/
Presentation in TSVWG: 15:30 Wednesday, Sala Thai Ballroom
Draft: https://datatracker.ietf.org/doc/html/draft-cheshire-sbm
Presenter, Affiliation: Daniel King, Lancaster University, in person
Datatracker slides TK
Abstract: Object-based media (OBM) transforms content delivery by enabling dynamic composition, personalisation, and adaptive streaming. However, traditional network architectures may not efficiently support the real-time compute demands of OBM at scale, particularly when rendering and processing must occur closer to the user or require multi-stage on-path computing. This talk introduces the technical components of OBM workflows and their compute and network requirements. We will highlight relevant IETF technologies, identify gaps in current approaches, and explore opportunities for collaboration.
Looking for: Discuss the technical challenges with other content creators and service providers that deliver connectivity services and compute resources.
Coordinates: Daniel King, dking@lancaster.ac.uk
The plan is to organise a bar/coffee meeting for discussion during IETF week, and the meeting location/time will be determined.
Relevant drafts: https://datatracker.ietf.org/doc/draft-rrk-object-based-media-usecase/
Presenter, Affiliation: Houda Chihi, in person
Abstract: The presentation is about an overview of the submitted draft by Neotec group defining a YANG data model for implementing Zero Trust Network Access (ZTNA) principles at the network-cloud interface. It addresses security gaps in traditional network architectures by enforcing identity-based access control, least privilege enforcement, secure exposure of resources, and continuous monitoring. The model enables real-time policy enforcement between Cloud-Aware Service Orchestrators and Network Controllers, ensuring that only authorized entities have access to specific network and cloud telemetry.
Looking for:
Coordinates:
Presenter, Affiliation: Muhammad Usama Sardar, in person
Datatracker slides TK
Abstract: Remote attestation is increasingly being composed with different protocols to provide endpoint security. Transport Layer Security (TLS) is the most widely used among those protocols and the composition is known as attested TLS. Attested TLS protocols are used in security-critical applications, e.g., they serve as the backbone of an emerging computing paradigm, Confidential Computing (CC). We present the current state of the identity crisis, which results from ambiguous notions of identity for attested TLS in CC.
Looking for: To seek collaborators knowledgeable in TLS, remote attestation, formal methods or confidential computing
Coordinates: Muhammad Usama Sardar, muhammad_usama.sardar@tu-dresden.de
Slack: #attested-tls on IETF slack
Meetings:
WIMSE WG meeting on Tuesday
TLS WG meeting on Thursday
Side-meetings: 1. Attested TLS (Fundamentals): Monday 15:00-17:00, Meeting Room 3
2. Attested TLS (Deep dive): Wednesday 15:00-17:00, Meeting Room 3
Any relevant drafts or helpful resources you’d like collaborators to look at: