Chairs: Nancy Cam-Winget, Luigi Iannone
Minute Taker: Antoine Fressancourt
Note: Similar points as reported in these minutes have been
discussed on the chat. The complete log can be found at HERE.
Change from presented agenda: decision to have open technical discussion
before charter discussion. Agenda agreed by the room.
Leman Lake use case related to banking regulation constraints in
Switzerland:
What is the interaction with end-to-end principle and encryption?
Why is not end-to-end protection sufficient and why should we care
about where the traffic goes through?
Would be good to have actual concrete examples of existing
regulations.
Trusted Path work in RATS WG provides some guarantees of the path
taken in the network, but here there is a tighter scope, which is
what needs to be clarified. 3GPP may be an example who would benefit
of NASR.
Level of Compliance - LoC: Customers to verify some properties.
Proof of transit does not imply that the packet didn't exit the
path. Maybe path compliance is not the right term to be used.
There is work about proof of transit that has been done in SFC, what
is needed to highlight what is not there (in routing, RATS, SFC PoT)
which NASR will provide.
What about lawful interceptions?
Sensitive Data Routing and Healthcare IoT Routing use cases have
been just briefly presented in the sake of time.
Why NASR Now?
Goal to provide visibility and verifiability
There is work from RATS, like RFC 9684, that can be used in NASR.
Why an independent effort? Why not putting this work in an existing
WG?
What is exactly the definition of a path in NASR? BGP session?
Tunnel? physical links?
Trustworthiness and traffic engineering are already addressed in
different places, so what is new in NASR?
Candidate solutions from problems exist in other venues (Routing
security / SFC)
Proposed work may result in fragmentation of the Internet, including
and excluding poeople?
Clarification of requirements whether the requirement is to detect
nodes along the path that do not support NASR?
Bringing the work to RATS would not work. RATS is already bloated
and bringing all this work there is not possible.
PoT has cryptographic cost.
Remark about the scope of implementation: Internet or limited
domain?
Architecture at a glimpse
Need to verify every configuration (binary / configuration files /
routers) in order to determine the properties of the path?
Why not doing this in the SFC WG?
For reliability, what about having multiple paths? Can it be a
scalability issue?
Clarifying question about confusion on use cases requirements,
whether or not to attest everything along a path.
Remark from SCION: there is a problem and use case to address, SCION
proposes another solution to the problem. PoT has been evaluated as
an experimental extension. SCION is willing to open up NASR work
between domain to propose technical elements to the problem.
Question? Yes / No / No Opinion
Do you agree with the current proposed charter to form NASR as a WG?
34 / 57 / 14
AD suggested that NASR get as much work as possible in RATS before
attempting to form a WG because of lack of strong consensus.
Concerns about tractability need to be clarified (What can be
proved? Is RATS sufficient to verify attestation codes?) Also
important to answer the question who will implment this.