HotRFC Lightning Talks at IETF 124

Sunday, November 2, 2025
Starting Time: An hour after the Welcome Reception starts (18:00)
Room: Viger
Organizers: Heather Flanagan, Liz Flynn
Email: hotrfc@ietf.org

Call for Participation


SESSION AGENDA

  1. Gaps in Confidential Computing
  2. Automatic IETF Minutes
  3. Multi-model Knowledge Graph for Network Management
  4. Enhancing the Efficiency of Classic Flows with ABE and L4S
  5. TOTP Secure Enrollment
  6. Semantic Inference Routing Protocol (SIRP)
  7. Problem Statements and Requirements of Real-Virtual Agent Protocol (RVP)
  8. Real-World Cyber Security Risks and Defences
  9. AI-Agent Communication Gateway: A Scalable and Secure Interoperability Layer for Heterogeneous Multi-Agent Systems
  10. Open Cloud Mesh
  11. A New Theory on Post-quantum Migration
  12. ARMOR: Adaptive Resilience & Measurement for Operational Robustness mailing list
  13. Wi-Fi CSI-Based Contactless Biometric Authentication for Access Systems
  14. HTTP-Based AI Agent Discovery and Invocation Protocol
  15. Still routing like it's the 90's
  16. KIRA – Scalable Zero-Touch Routing
  17. PARCEP, a network protocol for parental controls

ABSTRACTS

1. Gaps in Confidential Computing

Presenter, Affiliation: Muhammad Usama Sardar, TU Dresden, in person

Datatracker slides here

Confidential Computing is a topic of increasing interest in the IETF, e.g., there are related drafts in the RATS, TLS, WIMSE and SEAT working groups, where it is often presented by the industry almost as a silver bullet. However, there are several practical gaps in the technology. We will present a very quick overview of a couple of such gaps.

Looking for:
- Seek guidance on how to bring this work to the IRTF/IETF
- Seek collaborators knowledgeable in TLS, remote attestation, formal methods or confidential computing

Coordinates: Muhammad Usama Sardar, muhammad_usama.sardar@tu-dresden.de

Side meetings
1. Attestation in Confidential Computing, Monday, 14:45-16:45, McGill
2. Identity Crisis in Confidential Computing, Tuesday, 14:45-16:15, McGill

Any relevant drafts or helpful resources you’d like collaborators to look at:

Wiki page: https://github.com/EuroProofNet/ProgramVerification/wiki/AttestedTLS

Latest pre-prints

Technical concepts: https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts
Validation of TLS 1.3 Key Schedule: https://www.researchgate.net/publication/396245726_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Validation_of_TLS_13_Key_Schedule
General Approach: https://www.researchgate.net/publication/396593308_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_General_Approach

Papers

Pre-handshake attestation: https://www.researchgate.net/publication/385384309_Towards_Validation_of_TLS_13_Formal_Model_and_Vulnerabilities_in_Intel's_RA-TLS_Protocol
Intra-handshake attestation: https://www.usenix.org/conference/atc25/presentation/weinhold
Attestation in Arm CCA and Intel TDX: https://www.researchgate.net/publication/375592777_Formal_Specification_and_Verification_of_Architecturally-defined_Attestation_Mechanisms_in_Arm_CCA_and_Intel_TDX

Code

Repo for attestation: https://github.com/CCC-Attestation/formal-spec-TEE

Internet-Drafts

Intra-handshake attestation: https://datatracker.ietf.org/doc/draft-fossati-tls-attestation/
Post-handshake attestation: https://datatracker.ietf.org/doc/draft-fossati-seat-expat/

Security considerations of remote attestation

https://datatracker.ietf.org/doc/draft-rats-sardar-sec-cons/

Slides and other material

Some recent slides and videos at https://github.com/CCC-Attestation/formal-spec-KBS
Slides from side-meeting at IETF 120: https://www.researchgate.net/publication/382489639_Presentation_Interactive_Tutorial_Attested_TLS_and_Formalization
Slides from side-meetings at IETF 121: https://www.researchgate.net/publication/385587687_Presentation_Interactive_Tutorial_Attested_TLS_and_Formalization
Slides from side-meetings at IETF 122: https://www.researchgate.net/publication/390121641_Presentation_Attested_TLS_Fundamentals


2. Automatic IETF Minutes

Presenter, Affiliation: Eric Rescorla, Knight-Georgetown Institute, presenting remotely

Datatracker slides here

Abstract: Like many of you, I've long been unsatisfied with the situation around
IETF minute taking, in which we conscript someone into taking minutes,
thus preventing them from fully participating, and often with mediocre
results.

In an attempt to partly address this situation, I've put together an
automatic minutes generator at (https://ietfminutes.org/). The site
takes as input the Meetecho transcript and produces AI-generated
minutes. I've gone back and made minutes through IETF 112 (November
2021) and I plan to produce minutes for IETF 124 (Montreal) once
transcripts are available, shortly after the meeting.

Looking for: mostly this is a PSA, but also contributions welcome.

Coordinates:

https://github.com/ekr/auto-minutes


3. Multi-model Knowledge Graph for Network Management

Presenter, Affiliation: Mingzhe Xing, Beijing Zhongguancun Laboratory (In person)

[Datatracker slides here]

Abstract: The heterogeneity of network data (e.g., PCAPs, textual reports, images, KPI series) poses a significant challenge for unified analysis. To address this, we present a framework that leverages a multi-modal model to learn the semantics of such data, automatically extracting entities and relations to build a unified knowledge graph. This graph serves as a structured foundation for various downstream networking tasks. We evaluate our framework in a network security use case, with experiments confirming its practical effectiveness.

Looking for: We are looking for collaborators to engage in ongoing discussions and code implementation.

Relevant drafts:
- A Framework for LLM Agent-Assisted Network Management with Human-in-the-Loop (https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/)

Coordinates: Mingzhe Xing, xingmz=40zgclab.edu.cn@dmarc.ietf.org


4. Enhancing the Efficiency of Classic Flows with ABE and L4S

Presenter, Affiliation: Mohit P. Tahiliani, National Institute of Technology Karnataka, Surathkal, India (presenting remotely)

Datatracker slides here

Abstract: Low Latency, Low Loss, and Scalable Throughput (L4S), as outlined in RFC 9330, is designed to enhance the performance of scalable congestion control algorithms (e.g., DCTCP and Prague). The goal of L4S is to optimize network efficiency by enabling these algorithms to dynamically adjust their congestion window based on changing network conditions. However, traditional congestion control algorithms like CUBIC are unable to take full advantage of L4S's benefits because they employ a fixed window increase/decrease policy. To address this issue, we propose the use of the Alternative Backoff with ECN (ABE) mechanism, as specified in RFC 8511, to improve the performance of classic flows in environments where they share a common bottleneck with scalable flows. ABE is a sender-side mechanism that can be deployed at the end hosts, providing a more flexible approach to congestion window adjustments. It allows classic flow senders to adaptively adjust their congestion windows based on the network conditions, which improves overall network efficiency. In this work, we have implemented the ABE mechanism in both Linux and ns-3 environments. Both implementations are publicly available, and we have tested the functionality of ABE within the context of the L4S framework to demonstrate its effectiveness in improving the performance of classic flows in mixed flow environments.

Looking for: We are looking for people interested in working in this area, and can help us test and validate this idea in real deployments.

Relevant drafts: tahiliani@nitk.edu.in

Coordinates:


5. TOTP Secure Enrollment

Presenter, Affiliation: Brian Contario, Silent Sector, presenting remotely

Datatracker slides here

Abstract: A security enhancement to the Time-Based One-Time Password enrollment that currently uses QR codes containing non-expiring secret keys.

Looking for: Looking for reviewers, collaborators, implementers

Relevant drafts:
https://datatracker.ietf.org/doc/draft-contario-totp-secure-enrollment/

Coordinates: now: bcontario@silentsector.com
later: probably saag@ietf.org (Security Area Advisory Group)


6. Semantic Inference Routing Protocol (SIRP)

Presenter, Affiliation: Nabeel Cocker, Global Telco Consulting Practice

Datatracker slides here

Abstract: This document specifies the Semantic Inference Routing Protocol (SIRP), a framework for content-level classification and semantic routing in AI inference systems. By analyzing the content of inference requests—rather than relying solely on client-supplied metadata—SIRP enables routing decisions that are more robust, consistent, and extensible. SIRP also defines optional value-added routing (VAR) extensions for cost optimization, urgency prioritization, domain specialization, and privacy-aware handling.

Looking for:

Relevant drafts:

Coordinates: Nabeel Cocker, Ncocker@Redhat.com


7. Problem Statements and Requirements of Real-Virtual Agent Protocol (RVP): Communication Protocol for Embodied Intelligence in Physical- Digital Continuum

Presenter, Affiliation: Yunfei Zhang, China Telecom, presenting remotely

Datatracker slides here

Abstract: The Real-Virtual Agent Protocol (RVP) enables seamless coordination between physical entities (robots, IoT devices, manufacturing systems and agents) and digital agents (AI systems, software agents, virtual twins) through unified composite identity management, physical/social/production relations graph-based coordination, and physical constraint integration. Unlike existing protocols that assume peer-to-peer digital relationships (A2A for agents, MCP for AI tools, ANP for agent networks), RVP unifies physical and digital agents communication and achieves physical data loop for online learning for embodied agents considering both hierarchical physical/social/production relations and physical world constraints. RVP is designed for immediate deployment in modern manufacturing, smart cities, autonomous mobility systems, and human-AI collaborative environments

Looking for: collaborators for moving forard the protocol.

Relevant drafts:

Coordinates: You can reach me at hishigh@sina.com
The draft can be found at https://datatracker.ietf.org/doc/draft-zhang-rvp-problem-statement/ and has been sent to the Agent2agent, DISPATCH and ARTAREA mailing list for discussion.


8. Real-World Cyber Security Risks and Defences

Presenter, Affiliation: Michael P, UK NCSC

Datatracker slides here

Abstract: Cyber attacks are increasing in frequency, sophistication and impact, posing significant threat to the security of networks, the privacy of data and the availability of services. These attacks target all systems, from critical infrastructure to enterprise networks to individuals. This talk will introduce a side meeting to discuss the current active malicious threats the cyber security community is combatting, increase understanding of how to defend against them, and explore the challenges and changes that people and enterprise are seeing.

Looking for: We are looking for collaboration. The side meeting will focus on a broad range of cyber security threats and how to defend against them, so seeking a wide range of views to collaboratively share and upskill on different threats and mitigations.

Coordinates: Michael.p1@ncsc.gov.uk
Side meeting link: https://trello.com/c/KxGqY8tK/35-1145-1245-real-world-cyber-security-risks-and-defences


9. AI-Native Network Operations: Scenarios, Protocol Gaps & Extensions

Presenter, Affiliation: Guanming Zeng, Huawei

Datatracker slides here

Abstract: Network infrastructures are fast becoming AI-driven: operators now speak in natural-language intents, expect multi-agent consensus, and demand week-scale DevOps cycles. These emerging scenarios require protocols that are semantic-rich, conversation-friendly, multi-device aware, and artifact-streaming capable—traits never designed into CLI, SNMP, or even NETCONF.
We first map the new capability demands: AI semantic translation, long-lived cross-domain orchestration, multi-agent negotiation, rapid model iteration, and bulk-artifact delivery. We show why NETCONF’s XML-centric, single-controller, transaction-only model fails on all fronts, and motivate the complementary use of Model Context Protocol (MCP) and Agent-to-Agent (A2A).
However, dropping MCP/A2A straight into network gear reveals fresh gaps: no network-level transactions, no YANG auto-discovery, no multi-device context, no rollback/audit hooks, and no bandwidth-efficient streaming. We conclude with a minimal, backward-compatible extension set that equips MCP with network-native capabilities—turning AI intent into safe, traceable, and efficient device action.

Looking for: collaborators

Relevant drafts:

Coordinates: Guanming Zeng, zengguanming@huawei.com


10. Open Cloud Mesh

Presenter, Affiliation: Micke Nordin

Datatracker slides here

Abstract: Open Cloud Mesh (OCM) is a server federation protocol that is used to notify a Receiving Party that they have been granted access to some Resource. It has similarities with authorization flows such as OAuth, as well as with social internet protocols such as ActivityPub and email.

A core use case of OCM is when a user (e.g., Alice on System A) wishes to share a resource (e.g., a file) with another user (e.g., Bob on System B) without transferring the resource itself or requiring Bob to log in to System A.

We are now forming a Working Group and would like you to join us in that effort, or maybe even implement the standard in your project.
Looking for: encourage people to join the standardization effort, and our mailing-list
Relevant drafts:
draft-lopresti-open-cloud-mesh
Coordinates: Micke Nordin, kano@sunet.se


11. A New Theory on Post-quantum Migration

Presenter, Affiliation: Dr. Guilin Wang, Huawei International Pte Ltd (in person)

Datatracker slides here

Abstract: This talks offers a new viewpoint for the value of hybrid post-quantum (PQ) migration. It is a quantitative analysis on different migration policies, with simple probability reasoning. Not complex, understandable to everyone. The context is based on recent discussions in Pquip, Jose/Cose, and Lamps WGs on the value and complexity of hybrid signatures. The purpose is to invoke further thoughts on PQ migration policies.

Looking for: Enlightenment or sharing of thoughts.

Relevant drafts: None

Coordinates: Guilin Wang, Wang.Guilin@huawei.com


12. ARMOR: Adaptive Resilience & Measurement for Operational Robustness mailing list

Presenter, Affiliation: Nick Sullivan, CDT, in person

Datatracker slides here

Abstract: Introducing an effort to form an interdisciplinary mailing list for exploring technical strategies to measure, analyze, and improve Internet protocol robustness in the face of adversarial or disrupted network conditions. In this talk I will outline the core problem space, focusing on overlay network resilience, deployment studies for emerging protocols like ECH and MASQUE, and empirical resilience metrics.

Looking for: I am seeking collaborators from the IETF and IRTF communities (network operators, implementers, measurement experts, and protocol researchers) to join the side meeting on Monday evening to discuss this initiative.

Relevant drafts:

Coordinates: Nick Sullivan, nicholas.sullivan@gmail.com


13. Wi-Fi CSI-Based Contactless Biometric Authentication for Access Systems

Presenter, Affiliation: Lourenço Alves Pereira Jr, Assistant Professor at Aeronautics Institute of Technology, Brazil

Datatracker slides here

Abstract: Previously in our research, we developed HandPass which demonstrates contactless user authentication based on Wi-Fi Channel State Information (CSI) and a low-cost edge collector. We present experimental results on a COTS platform, a reproducible dataset and a processing pipeline that yields high accuracy in palm-driven authentication. We propose a sensor-agnostic view of proximity evidence that can be represented as EAT claims and bound to session tokens (OAuth/DPoP or TLS channel binding). The goal is to discuss a minimal, interoperable claim/profile for proximity attestation and privacy-aware verification suitable for RATS/OAuth work.

Looking for: (any combination of)


14. HTTP-Based AI Agent Discovery and Invocation Protocol

Presenter, Affiliation: Yihan Chao, affiliation

[Datatracker slides here]

Abstract: This draft proposes an HTTP-based protocol for discovering and invoking AI agents across the Internet. It defines standardized metadata and invocation interfaces to enable interoperable, secure, and efficient agent-to-agent communication. The authors welcome interested participants to continue the discussion via the mailing list or by contacting the presenter after the meeting.

Looking for:

Relevant drafts:

Coordinates:


15. Still routing like it's the 90's

Presenter, Affiliation: Giulio Berra, ProcioNet APS / Osservatorio Nessuno OdV, remote

Datatracker slides here

Abstract: While many areas of the Internet have evolved toward stronger privacy and security, the architecture of fixed ISPs has remained largely unchanged. Even if we redeployed everything today, we would likely rebuild it with the same assumptions as decades ago.
In many countries, and especially in Italy, ISPs are required to perform DNS and IP-based blocking, maintain long-term logging, and comply with the new ""Piracy Shield"" system, which enforces IP blocking within 30 minutes of notification without judicial oversight. As far as we know, there are no standard mechanisms to make these infrastructures more resilient or transparent about what is being blocked and why, their design is inherently functional to these controls.
As we deploy a research-oriented nonprofit ISP, we're exploring whether architectures like SCION could help address these gaps. This area appears under-researched, and we'd like to connect with others interested in rethinking network topology or anyone curious about building and experimenting with it.
Looking for: collaborators, education
Relevant drafts:
Coordinates:
giulio@procio.network
signal: @giulio.99


16. KIRA – Scalable Zero-Touch Routing

Presenter, Affiliation: Roland Bless, KIT (Karlsruhe Institute of Technology), Germany, in person

Datatracker slides here

Abstract: KIRA is a scalable, zero-touch routing architecture that offers resilient IPv6 connectivity without any configuration. It uses ID-based addressing and scales to hundreds of thousands of nodes in a single network. KIRA works well in various network topologies (even mobile ad-hoc networks or LEO Satellite networks) and was designed to offer resilient control plane connectivity that does not depend on configuration nor any other services. A built-in DHT offers support for service registration and discovery, thereby helping to realize autonomic network management and control and zero-touch deployments.

Looking for: collaborators, early implementers, BOF support

Resources:
Side Meeting: Thursday, November 6th, 14:45–15:45h, Room: McGill
More info: https://s.kit.edu/KIRA
Internet-Draft: https://datatracker.ietf.org/doc/draft-bless-rtgwg-kira/
Mailing-List: rtgwg


17. PARCEP, a network protocol for parental controls

Presenter, Affiliation: Andrew Campling, 419 Consulting, in person

Datatracker slides here

Abstract: The lack of standardisation of parental control software is hindering its ability to protect children. The authors believe that effective parental controls are a better option than banning children from accessing the benefits of the Internet. We propose developing a new protocol to aid interworking between the many options that are currently on the market.

Looking for: collaborators

Resources: side meeting, Tuesday 4th November, Duluth, 19:00-20:00
https://datatracker.ietf.org/doc/slides-agews-paper-parcep-a-network-protocol-for-parental-controls/