SlideShare a Scribd company logo
1 of 51
Download to read offline
www.internetsociety.org
I speak about
the IETF, not
for the IETF
The IETF
Open Standards for an Open Internet
Olaf M. Kolkman
Kolkman@isoc.org
Working in
the IETF
On the
Publication
Process and
RFCs
Potential
Topics of
Interest
Context
IETF
Organization
Context
About the IETF | March 20164
The Internetis a
Network of
Independent
Networks
That exchange
IP traffic
Picture by NLnet Labs, Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
About the IETF | March 20165
Image Source: http://en.wikipedia.org/wiki/File:House_Plans_(Blueprints).pdf (CC License)
About the IETF | March 20166
Technical
Building Blocks
Image Source: NLnet Labs Blender model based on http://en.wikipedia.org/wiki/File:House_Plans_(Blueprints).pdf (CC License)
(design)principles
About the IETF | March 20167
The mission of the IETF is to make the Internet work better by producing
high quality, relevant technical documents that influence the way people
design, use, and manage the Internet.
1. Cooperation
Respectful cooperation between standards organizations, whereby each respects the autonomy, integrity, processes, and
intellectual property rules of the others.

2. Adherence to Principles
Adherence to the five fundamental principles of standards development:

• Due process. Decisions are made with equity and fairness among participants. No one party dominates or guides
standards development. Standards processes are transparent and opportunities exist to appeal decisions.
Processes for periodic standards review and updating are well defined.

• Broad consensus. Processes allow for all views to be considered and addressed, such that agreement can be
found across a range of interests.

• Transparency. Standards organizations provide advance public notice of proposed standards development
activities, the scope of work to be undertaken, and conditions for participation. Easily accessible records of
decisions and the materials used in reaching those decisions are provided. Public comment periods are provided
before final standards approval and adoption.

• Balance. Standards activities are not exclusively dominated by any particular person, company or interest group.

• Openness. Standards processes are open to all interested and informed parties.

3. Collective Empowerment
Commitment by affirming standards organizations and their participants to collective empowerment by striving for
standards that:

• are chosen and defined based on technical merit, as judged by the contributed expertise of each participant;

• provide global interoperability, scalability, stability, and resiliency;

• enable global competition;

• serve as building blocks for further innovation; and

• contribute to the creation of global communities, benefiting humanity.

4. Availability
Standards specifications are made accessible to all for implementation and deployment. Affirming standards
organizations have defined procedures to develop specifications that can be implemented under fair terms. Given market
diversity, fair terms may vary from royalty-free to fair, reasonable, and non-discriminatory terms (FRAND).

5. Voluntary Adoption
Standards are voluntarily adopted and success is determined by the market.

RespectfulCooperationBetweenStandards
Adherence to the
Fundamental
Parameters of
Standards DevelopmentCollective Empowerment
to Strive to Develop
Standards that are Chosen
and Defined Based on
Technical Merit
Availability ofStandards
Voluntary Adoption
by the StandardsMarket
IETF Organization
About the IETF | 23 June 2015
IETF Trust
IETF Universe
10
RFC Editor
IASA
IAD IAOC
IESG
Area Area Area Area Area Area
working
group
working
group
working
group
working
group
working
group
working
working
group
working
group
working
group
working
group
working
group
working
working
group
working
group
working
group
working
group
working
group
working
working
group
working
group
working
group
working
group
working
group
working
working
group
working
group
working
group
working
group
working
group
working
working
group
working
group
working
group
working
group
working
group
working
IETF Secretariat
About the IETF | 23 June 201511
About the IETF | 23 June 201512
INT
RTG
TSV
OPS
About Packets
About creating
the paths for the
packets
About managing
the networks
About the use of
the paths to
provide the end-to-
end experience
ART About Application Protocols used
on the Internet and Real Time
Applications
SEC
About
Security
Protocols
(cross area)
siprec
slim
stir
stox
straw
urnbis
uta
webpush
xrblock
ice
insipid
jsonbis
justfont
lager
mmusic
modern
netvc
p2psip
payload
perc
precis
regex
rtcweb
scim
sipcore
IESG
Art
area
B. Leiba,A.Cooper, B. Campbell
Transport

Area
M. Stiemerling
S. Dawkins
Security

Area
K. Moriarty
S. Farrell
Routing

Area
A. Retana

A.Atlas, 

D. Brungard
O&M

Area
B. Claise

J. Jaeggli
Internet

Area
B. Haberman
T. Manderson
GENERAL
AREA

J.Arko
appsawg alto
aqm
abfab anima
bmwg
dime
dnsop
grow
avtcore
avtext
bfcpbis
6lo
6man
6tish
dhc
dmm
dnssd
caltext
dprive
hip
homenet
intarea
lwig
ntp
pcp
savi
softwire
sunset4
tictoc
l3sm
lime
lmap
mboned
netconf
netmod
opsawg
opsec
radext
supa
bess
bfd
bier
ccamp
ace
dtn
ippm
mptcp
nsfv4
rmcat
taps
tcpinc
LastUpdateJune102016
IANAplan
v6ops
detnet
i2rs
idr
isis
l2tpext
lisp
manet
mpls
nvo3
ospf
acme
cose
cdni
tcpm
tram
tsvwg
curdle
dane
dots
httpauth
i2nsf
ipsecme
jose
kitten
mile
oauth
openpgp
sacm
tls
tokbind
trans
pals
pce
pim
roll
rtgwg
sfc
sidr
spring
teas
trill
capport
cellar
clue
codec
core
dbound
dispatch
dmarc
drinks
ecrit
geojson
httpbis
18
IETF 95 Participants!
l  1002 people onsite"
l  171 newcomers"
l  IETF 92 had 1176 people onsite
midweek"
"
l  55 countries "
l  140 here from South America"
l  IETF 92 was 57 countries"
!
IETF 92 was held in

Dallas, Texas!
IETF 95
Buenos
Aires
Source:http://www.arkko.com/tools/docstats.html
On the PublicationProcess and RFCs
About the IETF | 23 June 2015
IETF standards are published as RFCs
• Standards track
• Best Current Practices (operational)
• Informational and Experimental
RFC series also includes
• IRTF (Internet Research Task Force)
• IAB (Internet Architecture Board)
• Independent contributions
Standards Track documents are
maintained by the IETF
• IESG approval: based on consensus
process
17
draft
full
proposed
Not al RFCs are IETFstandards
Internet-Drafts
Internet Standard
IETF
Standards and
RFCs
Proposed Standard
IESG Approval
IESG Approval
old 3 stepnew 2 step
About the IETF | 23 June 2015
Standard Track
18
About the IETF | 23 June 2015
BCP
19
About the IETF | 23 June 2015
Informational (IETF)
20
About the IETF | 23 June 2015
Informational (IAB)
21
BAR
BOF
ListWG
IETF
Individual
IESG
IESG
IESG
IESG
RFC
IESG
Different Flow for IETF stream documents
Working in the IETF
How I got involved in the IETF….
(by contributing)
(by contributing)
How do you get involved in the IETF
datatracker.ietf.org
tools.ietf.org
Potential Topics of
Interest
MODERN
Managing, Ordering, Distributing, Exposing, & Registering telephone Numbers
Drinks
Data for Reachability of Inter/tra-NetworK SIP
Emergency Context Resolution with Internet Technologies
Ecrit
Photo credit: Glen Edelson - https://www.flickr.com/photos/glenirah/
Stir
Secure Telephone Identity Revisited
IESG
Art
area
B. Leiba,A.Cooper, B. Campbell
Transport

Area
M. Stiemerling
S. Dawkins
Security

Area
K. Moriarty
S. Farrell
Routing

Area
A. Retana

A.Atlas, 

D. Brungard
O&M

Area
B. Claise

J. Jaeggli
Internet

Area
B. Haberman
T. Manderson
GENERAL
AREA

J.Arko
appsawg alto
aqm
abfab anima
bmwg
dime
dnsop
grow
avtcore
avtext
bfcpbis
6lo
6man
6tish
dhc
dmm
dnssd
caltext
dprive
hip
homenet
intarea
lwig
mif
netext
ntp
pcp
savi
softwire
sunset4
tictoc
l3sm
lime
lmap
mboned
netconf
netmod
opsawg
opsec
radext
supa
bess
bfd
bier
ccamp
ace
dtn
ippm
mptcp
nsfv4
rmcat
storm
taps
tcpinc
LastUpdateFeb16,2016
IANAplan
v6ops
detnet
i2rs
idr
isis
l2tpext
lisp
manet
mpls
nvo3
ospf
acme
cose
cdni
cellar
clue
codec
core
dbound
dispatch
dmarc
drinks
ecrit
eppext
geojson
httpbis
ice
imapapnd
insipid
jsonbis
justfont
lager
mmusic
modern
netvc
p2psip
payload
perc
precis
rtcweb
scim
sipcore
siprec
slim
stir
stox
straw
tzdist
urnbis
uta
webpush
xrblock
tcpm
tram
tsvwg
curdle
dane
dice
dots
httpauth
i2nsf
ipsecme
jose
kitten
mile
oauth
openpgp
sacm
tls
tokbind
trans
pals
pce
pim
roll
rtwg
sfc
sidr
spring
teas
trill
DOTS DoS Open Threat Signaling
“The DOTS protocols are therefore not concerned with
the form of response, but rather with communicating
the need for a response, supplementing the call for
help with pertinent details about the detected
attack.”
DPRIVE
DNS PRIVate Exchange
IESG
Art
area
B. Leiba,A.Cooper, B. Campbell
Transport

Area
M. Stiemerling
S. Dawkins
Security

Area
K. Moriarty
S. Farrell
Routing

Area
A. Retana

A.Atlas, 

D. Brungard
O&M

Area
B. Claise

J. Jaeggli
Internet

Area
B. Haberman
T. Manderson
GENERAL
AREA

J.Arko
appsawg alto
aqm
abfab anima
bmwg
dime
dnsop
grow
avtcore
avtext
bfcpbis
6lo
6man
6tish
dhc
dmm
dnssd
caltext
dprive
hip
homenet
intarea
lwig
mif
netext
ntp
pcp
savi
softwire
sunset4
tictoc
l3sm
lime
lmap
mboned
netconf
netmod
opsawg
opsec
radext
supa
bess
bfd
bier
ccamp
ace
dtn
ippm
mptcp
nsfv4
rmcat
storm
taps
tcpinc
LastUpdateFeb16,2016
IANAplan
v6ops
detnet
i2rs
idr
isis
l2tpext
lisp
manet
mpls
nvo3
ospf
acme
cose
cdni
cellar
clue
codec
core
dbound
dispatch
dmarc
drinks
ecrit
eppext
geojson
httpbis
ice
imapapnd
insipid
jsonbis
justfont
lager
mmusic
modern
netvc
p2psip
payload
perc
precis
rtcweb
scim
sipcore
siprec
slim
stir
stox
straw
tzdist
urnbis
uta
webpush
xrblock
tcpm
tram
tsvwg
curdle
dane
dice
dots
httpauth
i2nsf
ipsecme
jose
kitten
mile
oauth
openpgp
sacm
tls
tokbind
trans
pals
pce
pim
roll
rtwg
sfc
sidr
spring
teas
trill
ACCORD BOF
Alternatives to Content Classification for
Operator Resource Deployment
BA-BOFShttps://trac.tools.ietf.org/bof/trac/wiki
Alternative Resolution Contexts for Internet NamingARCING
LURK Limited Use of Remote Keys
IEPG
APPSAWG
http://www.iepg.org
The IEPG is an informal gathering that meets on the Sunday prior to IETF meetings. The intended theme of
these meetings is essentially one of operational relevance in some form or fashion - although the chair will
readily admit that he will run with an agenda of whatever is on offer at the time!
OPSAWG
And individual Area meetings
Encryption and the
IETF
www.internetsociety.org
Context
We are talking about more than encryption. Encryption is just a tool for
enhancing privacy and trust
Encryption | 23 September 2015
June 2013 - Snowden revelation
37
• Undermined User
trust;
• Generated awareness
• Invoked strong
community and
industry action
• Greater dialogue and
cooperation on key
issues
Review of privacy of data
relative to a pervasive
monitoring:
• Uptake in Encryption
• New Atlantic cables
• etc
• etc
Encryption | 23 September 2015
RFC 7258: Pervasive Monitoring is an Attack
38
Encryption | 23 September 201539
The term "attack" is used here in a technical
sense that differs somewhat from common English
usage. In common English usage, an attack is an
aggressive action perpetrated by an opponent,
intended to enforce the opponent's will on the
attacked party. The term is used here to refer to
behavior that subverts the intent of
communicating parties without the agreement of
those parties. An attack may change the content
of the communication, record the content or
external characteristics of the communication, or
through correlation with other communication
events, reveal information the parties did not
intend to be revealed.
www.internetsociety.org
Statistics
Transport security is being deployed!
Encryption | 23 September 201541
http://httparchive.org/trends.php?s=Top1000&minlabel=Jan+1+2013&maxlabel=Sep+1+2015#perHttps
Fraction of HTTPS links on Alexa top 1000 pages Jan 2013-Sep 2015
Source HTTPARCHIVE
Encryption | 23 September 201542
Hosts responding to HTTPS and found certificates (full IPv4 scan)
Source:University of Michigan
Encryption | 23 September 201543
From the a network perspective HTTPS traffic grew from 4%(2008) to 17% (2015)
Source known to author
Encryption | 23 September 201544
A CDN now sees 35+% of ‘hits’ over HTTPS
Source known to author
Encryption | 23 September 201545
https://www.google.com/transparencyreport/saferemail/
Googles traffic from and towards other mail providers
(between jan 2014 and oct 2015 incoming traffic doubled)
Encryption | 23 September 2015
Developments in the past few years….
46
Google’s
SPDY,
which
contains
TLS
IAB: Turn
on
Encryption
by default
RFC7540
HTTP2.0
Firefox
and
Chrome
default to
encrypted
HTTP2
Windows
and Apple
move
http2 to
desktop
and
mobile
OSes
Encryption | 23 September 201547
Transport Encryption is not the Only tool to increase trust and privacy
Encryption | 23 September 201548
dprive
HTTP2
RFC7435: defining
opportunistic
encryption
RFC7465:deprecating RC4
TLS 1.3
DNS qnameminimizationqnameminimization
IRTF CFRG new
curves
ACME
Encryption | 23 September 2015
• Leads to
reassessment of the
role of intelligence in
the network and the
role of the end-users.
Ubiquitous Encryption may have a profound effect
49
• Caching
• DPI to filter web
content (malevolent
and benevolent)
• Traffic management
• Media optimization
Example:
Filtering of
Wikipedia
Article
Example: feeding
movie content to
mobile handset
Example: fall-
back to upstream
provider
Encryption | 23 September 2015
The realities….
“Everything is in the clear” approach is clearly unworkable
Encryption will reduce the number of parties that see traffic
But not eliminate them — content provider, browser vendor,
CAs, proxy provider, corporate IT department, …
World still moves ahead on a voluntary basis on what
technology is chosen and on what technology a particular
party can adopt
Surveillance shifts, not eliminated
Useful technical things done in different ways, not eliminated
Some potential bad outcomes to avoid —- MITMs, regulation
limiting security, fragmentation, device control, …
50
Encryption | 23 September 201551
When we look at the increased encryption, we
should not prepare ourselves to merely deal with
its effects. We need to prepare for

a period of increasingly fast evolution in the
Internet traffic patterns and technology. Such
evolution may include new transport solutions,
HTTP version 3 and beyond, the introduction of new
parties (such as caching, CDN, or P2P entities),
new types of security (such as content-based
security), and other things that we cannot foresee
at this point
Jari Arkko & Göran Eriksson
in their contribution to the Manrew Workshop
https://www.iab.org/activities/workshops/marnew/
“making networks unmanageable to mitigate PM (Pervasive
Monitoring) is not an acceptable outcome”
RFC 7258

More Related Content

What's hot

About the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of BotswanaAbout the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of BotswanaInternet Society
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsEdwin A. Opare
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationColorado Internet Society (CO ISOC)
 

What's hot (20)

ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
ION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & AccountabilityION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & Accountability
 
IETF Talk
IETF TalkIETF Talk
IETF Talk
 
About the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of BotswanaAbout the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of Botswana
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
ION Bangladesh - ISOC Dhaka Chapter Welcome
ION Bangladesh - ISOC Dhaka Chapter WelcomeION Bangladesh - ISOC Dhaka Chapter Welcome
ION Bangladesh - ISOC Dhaka Chapter Welcome
 
ION Hangzhou - Closing Remarks
ION Hangzhou - Closing RemarksION Hangzhou - Closing Remarks
ION Hangzhou - Closing Remarks
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & Concepts
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
Mind Your MANRS - Mutually Agreed Norms for Routing Security
Mind Your MANRS - Mutually Agreed Norms for Routing SecurityMind Your MANRS - Mutually Agreed Norms for Routing Security
Mind Your MANRS - Mutually Agreed Norms for Routing Security
 
ION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: FinlandION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: Finland
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & Operationalization
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
IPv6 and Telecom: IPv4 Is FInally Running Out. Now What?
IPv6 and Telecom: IPv4 Is FInally Running Out. Now What?IPv6 and Telecom: IPv4 Is FInally Running Out. Now What?
IPv6 and Telecom: IPv4 Is FInally Running Out. Now What?
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
ION Islamabad - Opening Remarks
ION Islamabad - Opening RemarksION Islamabad - Opening Remarks
ION Islamabad - Opening Remarks
 
ION Durban - Closing Slides
ION Durban - Closing SlidesION Durban - Closing Slides
ION Durban - Closing Slides
 

Viewers also liked

APNIC Update: ARIN 37
APNIC Update: ARIN 37APNIC Update: ARIN 37
APNIC Update: ARIN 37APNIC
 
Appunti di Diritto Privato: Saggi
Appunti di Diritto Privato: SaggiAppunti di Diritto Privato: Saggi
Appunti di Diritto Privato: Saggiprofman
 
evaluating software development team
evaluating software development teamevaluating software development team
evaluating software development teamsruthy lekshmanan
 
State Support of Youth Initiatives The Experience of Regional Application
State Support of Youth Initiatives The Experience of Regional ApplicationState Support of Youth Initiatives The Experience of Regional Application
State Support of Youth Initiatives The Experience of Regional ApplicationDmitry Nortsev
 
TamiamiTrailBrwnflds11-10-14
TamiamiTrailBrwnflds11-10-14TamiamiTrailBrwnflds11-10-14
TamiamiTrailBrwnflds11-10-14Barbara L. Nelson
 
Icann idn program se asia 0.2
Icann idn program se asia 0.2Icann idn program se asia 0.2
Icann idn program se asia 0.2Ranadaya Sa
 
CHIEF SALES & MARKETING OFFICER
CHIEF SALES & MARKETING OFFICERCHIEF SALES & MARKETING OFFICER
CHIEF SALES & MARKETING OFFICERTram Duong
 
Universal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readinessUniversal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readinessAPNIC
 
Identifying market segments and targets
Identifying market segments and targetsIdentifying market segments and targets
Identifying market segments and targetsFedrian Putra
 

Viewers also liked (13)

2 warning
2 warning2 warning
2 warning
 
APNIC Update: ARIN 37
APNIC Update: ARIN 37APNIC Update: ARIN 37
APNIC Update: ARIN 37
 
Appunti di Diritto Privato: Saggi
Appunti di Diritto Privato: SaggiAppunti di Diritto Privato: Saggi
Appunti di Diritto Privato: Saggi
 
eBrochure
eBrochureeBrochure
eBrochure
 
evaluating software development team
evaluating software development teamevaluating software development team
evaluating software development team
 
State Support of Youth Initiatives The Experience of Regional Application
State Support of Youth Initiatives The Experience of Regional ApplicationState Support of Youth Initiatives The Experience of Regional Application
State Support of Youth Initiatives The Experience of Regional Application
 
TamiamiTrailBrwnflds11-10-14
TamiamiTrailBrwnflds11-10-14TamiamiTrailBrwnflds11-10-14
TamiamiTrailBrwnflds11-10-14
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
Icann idn program se asia 0.2
Icann idn program se asia 0.2Icann idn program se asia 0.2
Icann idn program se asia 0.2
 
CHIEF SALES & MARKETING OFFICER
CHIEF SALES & MARKETING OFFICERCHIEF SALES & MARKETING OFFICER
CHIEF SALES & MARKETING OFFICER
 
Universal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readinessUniversal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readiness
 
Tank sluice with tower head
Tank sluice with tower headTank sluice with tower head
Tank sluice with tower head
 
Identifying market segments and targets
Identifying market segments and targetsIdentifying market segments and targets
Identifying market segments and targets
 

Similar to ION Hangzhou - About IETF

Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Internet Society
 
Combining Open Source and Standards
Combining Open Source and StandardsCombining Open Source and Standards
Combining Open Source and StandardsCharles Eckel
 
Open Source and Standards Communities Coming Together to Solve Real World Pro...
Open Source and Standards Communities Coming Together to Solve Real World Pro...Open Source and Standards Communities Coming Together to Solve Real World Pro...
Open Source and Standards Communities Coming Together to Solve Real World Pro...All Things Open
 
Mission and Work of the OIF
Mission and Work of the OIFMission and Work of the OIF
Mission and Work of the OIFLeah Wilkinson
 
What's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get InvolvedWhat's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get InvolvedBangladesh Network Operators Group
 
Activity 1 ece 583L Data Comm
Activity 1 ece 583L Data CommActivity 1 ece 583L Data Comm
Activity 1 ece 583L Data Commmoodymind
 
APAN 54: Introducing the IETF
APAN 54: Introducing the IETFAPAN 54: Introducing the IETF
APAN 54: Introducing the IETFAPNIC
 
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17Shane Coughlan
 
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Gilbert Verdian
 
Standardization in W3C
Standardization in W3CStandardization in W3C
Standardization in W3CJonathan Jeon
 
OpenChain at EOLE 2017
OpenChain at EOLE 2017OpenChain at EOLE 2017
OpenChain at EOLE 2017Shane Coughlan
 

Similar to ION Hangzhou - About IETF (20)

Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6
 
Combining Open Source and Standards
Combining Open Source and StandardsCombining Open Source and Standards
Combining Open Source and Standards
 
ION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris GrundemannION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris Grundemann
 
ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?
 
Open Source and Standards Communities Coming Together to Solve Real World Pro...
Open Source and Standards Communities Coming Together to Solve Real World Pro...Open Source and Standards Communities Coming Together to Solve Real World Pro...
Open Source and Standards Communities Coming Together to Solve Real World Pro...
 
Mission and Work of the OIF
Mission and Work of the OIFMission and Work of the OIF
Mission and Work of the OIF
 
What's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get InvolvedWhat's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get Involved
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
 
26531 reilly
26531 reilly26531 reilly
26531 reilly
 
Orchestration, Automation and Virtualisation (OAV) in GÉANT
Orchestration, Automation and Virtualisation (OAV) in GÉANTOrchestration, Automation and Virtualisation (OAV) in GÉANT
Orchestration, Automation and Virtualisation (OAV) in GÉANT
 
Activity 1 ece 583L Data Comm
Activity 1 ece 583L Data CommActivity 1 ece 583L Data Comm
Activity 1 ece 583L Data Comm
 
APAN 54: Introducing the IETF
APAN 54: Introducing the IETFAPAN 54: Introducing the IETF
APAN 54: Introducing the IETF
 
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
OpenChain Webinar #10 - Joint Development Foundation - 2020-08-17
 
Why we need oa infrastructure - STM Association Beyond Open Access Seminar
Why we need oa infrastructure - STM Association Beyond Open Access SeminarWhy we need oa infrastructure - STM Association Beyond Open Access Seminar
Why we need oa infrastructure - STM Association Beyond Open Access Seminar
 
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
 
ION Bucharest - ISOC & Deploy360 overview
ION Bucharest - ISOC & Deploy360 overviewION Bucharest - ISOC & Deploy360 overview
ION Bucharest - ISOC & Deploy360 overview
 
W3C-כיצד פועל ה
W3C-כיצד פועל הW3C-כיצד פועל ה
W3C-כיצד פועל ה
 
Standardization in W3C
Standardization in W3CStandardization in W3C
Standardization in W3C
 
OpenChain at EOLE 2017
OpenChain at EOLE 2017OpenChain at EOLE 2017
OpenChain at EOLE 2017
 
Network Automation e-Academy
Network Automation e-AcademyNetwork Automation e-Academy
Network Automation e-Academy
 

More from Deploy360 Programme (Internet Society)

ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...Deploy360 Programme (Internet Society)
 

More from Deploy360 Programme (Internet Society) (18)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check ToolION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
 
ION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid ItION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid It
 
ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)
 
ION Durban - Opening Slides
ION Durban - Opening SlidesION Durban - Opening Slides
ION Durban - Opening Slides
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
 
ION Costa Rica - Closing Slides
ION Costa Rica - Closing SlidesION Costa Rica - Closing Slides
ION Costa Rica - Closing Slides
 
ION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origenION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origen
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

ION Hangzhou - About IETF

  • 1. www.internetsociety.org I speak about the IETF, not for the IETF The IETF Open Standards for an Open Internet Olaf M. Kolkman Kolkman@isoc.org
  • 2. Working in the IETF On the Publication Process and RFCs Potential Topics of Interest Context IETF Organization
  • 4. About the IETF | March 20164 The Internetis a Network of Independent Networks That exchange IP traffic Picture by NLnet Labs, Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
  • 5. About the IETF | March 20165 Image Source: http://en.wikipedia.org/wiki/File:House_Plans_(Blueprints).pdf (CC License)
  • 6. About the IETF | March 20166 Technical Building Blocks Image Source: NLnet Labs Blender model based on http://en.wikipedia.org/wiki/File:House_Plans_(Blueprints).pdf (CC License) (design)principles
  • 7. About the IETF | March 20167 The mission of the IETF is to make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.
  • 8. 1. Cooperation Respectful cooperation between standards organizations, whereby each respects the autonomy, integrity, processes, and intellectual property rules of the others. 2. Adherence to Principles Adherence to the five fundamental principles of standards development: • Due process. Decisions are made with equity and fairness among participants. No one party dominates or guides standards development. Standards processes are transparent and opportunities exist to appeal decisions. Processes for periodic standards review and updating are well defined. • Broad consensus. Processes allow for all views to be considered and addressed, such that agreement can be found across a range of interests. • Transparency. Standards organizations provide advance public notice of proposed standards development activities, the scope of work to be undertaken, and conditions for participation. Easily accessible records of decisions and the materials used in reaching those decisions are provided. Public comment periods are provided before final standards approval and adoption. • Balance. Standards activities are not exclusively dominated by any particular person, company or interest group. • Openness. Standards processes are open to all interested and informed parties. 3. Collective Empowerment Commitment by affirming standards organizations and their participants to collective empowerment by striving for standards that: • are chosen and defined based on technical merit, as judged by the contributed expertise of each participant; • provide global interoperability, scalability, stability, and resiliency; • enable global competition; • serve as building blocks for further innovation; and • contribute to the creation of global communities, benefiting humanity. 4. Availability Standards specifications are made accessible to all for implementation and deployment. Affirming standards organizations have defined procedures to develop specifications that can be implemented under fair terms. Given market diversity, fair terms may vary from royalty-free to fair, reasonable, and non-discriminatory terms (FRAND). 5. Voluntary Adoption Standards are voluntarily adopted and success is determined by the market. RespectfulCooperationBetweenStandards Adherence to the Fundamental Parameters of Standards DevelopmentCollective Empowerment to Strive to Develop Standards that are Chosen and Defined Based on Technical Merit Availability ofStandards Voluntary Adoption by the StandardsMarket
  • 10. About the IETF | 23 June 2015 IETF Trust IETF Universe 10 RFC Editor IASA IAD IAOC IESG Area Area Area Area Area Area working group working group working group working group working group working working group working group working group working group working group working working group working group working group working group working group working working group working group working group working group working group working working group working group working group working group working group working working group working group working group working group working group working IETF Secretariat
  • 11. About the IETF | 23 June 201511
  • 12. About the IETF | 23 June 201512 INT RTG TSV OPS About Packets About creating the paths for the packets About managing the networks About the use of the paths to provide the end-to- end experience ART About Application Protocols used on the Internet and Real Time Applications SEC About Security Protocols (cross area)
  • 13. siprec slim stir stox straw urnbis uta webpush xrblock ice insipid jsonbis justfont lager mmusic modern netvc p2psip payload perc precis regex rtcweb scim sipcore IESG Art area B. Leiba,A.Cooper, B. Campbell Transport
 Area M. Stiemerling S. Dawkins Security
 Area K. Moriarty S. Farrell Routing
 Area A. Retana
 A.Atlas, 
 D. Brungard O&M
 Area B. Claise
 J. Jaeggli Internet
 Area B. Haberman T. Manderson GENERAL AREA
 J.Arko appsawg alto aqm abfab anima bmwg dime dnsop grow avtcore avtext bfcpbis 6lo 6man 6tish dhc dmm dnssd caltext dprive hip homenet intarea lwig ntp pcp savi softwire sunset4 tictoc l3sm lime lmap mboned netconf netmod opsawg opsec radext supa bess bfd bier ccamp ace dtn ippm mptcp nsfv4 rmcat taps tcpinc LastUpdateJune102016 IANAplan v6ops detnet i2rs idr isis l2tpext lisp manet mpls nvo3 ospf acme cose cdni tcpm tram tsvwg curdle dane dots httpauth i2nsf ipsecme jose kitten mile oauth openpgp sacm tls tokbind trans pals pce pim roll rtgwg sfc sidr spring teas trill capport cellar clue codec core dbound dispatch dmarc drinks ecrit geojson httpbis
  • 14. 18 IETF 95 Participants! l  1002 people onsite" l  171 newcomers" l  IETF 92 had 1176 people onsite midweek" " l  55 countries " l  140 here from South America" l  IETF 92 was 57 countries" ! IETF 92 was held in
 Dallas, Texas! IETF 95 Buenos Aires
  • 17. About the IETF | 23 June 2015 IETF standards are published as RFCs • Standards track • Best Current Practices (operational) • Informational and Experimental RFC series also includes • IRTF (Internet Research Task Force) • IAB (Internet Architecture Board) • Independent contributions Standards Track documents are maintained by the IETF • IESG approval: based on consensus process 17 draft full proposed Not al RFCs are IETFstandards Internet-Drafts Internet Standard IETF Standards and RFCs Proposed Standard IESG Approval IESG Approval old 3 stepnew 2 step
  • 18. About the IETF | 23 June 2015 Standard Track 18
  • 19. About the IETF | 23 June 2015 BCP 19
  • 20. About the IETF | 23 June 2015 Informational (IETF) 20
  • 21. About the IETF | 23 June 2015 Informational (IAB) 21
  • 24. How I got involved in the IETF…. (by contributing) (by contributing) How do you get involved in the IETF
  • 25.
  • 29. MODERN Managing, Ordering, Distributing, Exposing, & Registering telephone Numbers Drinks Data for Reachability of Inter/tra-NetworK SIP Emergency Context Resolution with Internet Technologies Ecrit Photo credit: Glen Edelson - https://www.flickr.com/photos/glenirah/ Stir Secure Telephone Identity Revisited
  • 30. IESG Art area B. Leiba,A.Cooper, B. Campbell Transport
 Area M. Stiemerling S. Dawkins Security
 Area K. Moriarty S. Farrell Routing
 Area A. Retana
 A.Atlas, 
 D. Brungard O&M
 Area B. Claise
 J. Jaeggli Internet
 Area B. Haberman T. Manderson GENERAL AREA
 J.Arko appsawg alto aqm abfab anima bmwg dime dnsop grow avtcore avtext bfcpbis 6lo 6man 6tish dhc dmm dnssd caltext dprive hip homenet intarea lwig mif netext ntp pcp savi softwire sunset4 tictoc l3sm lime lmap mboned netconf netmod opsawg opsec radext supa bess bfd bier ccamp ace dtn ippm mptcp nsfv4 rmcat storm taps tcpinc LastUpdateFeb16,2016 IANAplan v6ops detnet i2rs idr isis l2tpext lisp manet mpls nvo3 ospf acme cose cdni cellar clue codec core dbound dispatch dmarc drinks ecrit eppext geojson httpbis ice imapapnd insipid jsonbis justfont lager mmusic modern netvc p2psip payload perc precis rtcweb scim sipcore siprec slim stir stox straw tzdist urnbis uta webpush xrblock tcpm tram tsvwg curdle dane dice dots httpauth i2nsf ipsecme jose kitten mile oauth openpgp sacm tls tokbind trans pals pce pim roll rtwg sfc sidr spring teas trill
  • 31. DOTS DoS Open Threat Signaling “The DOTS protocols are therefore not concerned with the form of response, but rather with communicating the need for a response, supplementing the call for help with pertinent details about the detected attack.” DPRIVE DNS PRIVate Exchange
  • 32. IESG Art area B. Leiba,A.Cooper, B. Campbell Transport
 Area M. Stiemerling S. Dawkins Security
 Area K. Moriarty S. Farrell Routing
 Area A. Retana
 A.Atlas, 
 D. Brungard O&M
 Area B. Claise
 J. Jaeggli Internet
 Area B. Haberman T. Manderson GENERAL AREA
 J.Arko appsawg alto aqm abfab anima bmwg dime dnsop grow avtcore avtext bfcpbis 6lo 6man 6tish dhc dmm dnssd caltext dprive hip homenet intarea lwig mif netext ntp pcp savi softwire sunset4 tictoc l3sm lime lmap mboned netconf netmod opsawg opsec radext supa bess bfd bier ccamp ace dtn ippm mptcp nsfv4 rmcat storm taps tcpinc LastUpdateFeb16,2016 IANAplan v6ops detnet i2rs idr isis l2tpext lisp manet mpls nvo3 ospf acme cose cdni cellar clue codec core dbound dispatch dmarc drinks ecrit eppext geojson httpbis ice imapapnd insipid jsonbis justfont lager mmusic modern netvc p2psip payload perc precis rtcweb scim sipcore siprec slim stir stox straw tzdist urnbis uta webpush xrblock tcpm tram tsvwg curdle dane dice dots httpauth i2nsf ipsecme jose kitten mile oauth openpgp sacm tls tokbind trans pals pce pim roll rtwg sfc sidr spring teas trill
  • 33. ACCORD BOF Alternatives to Content Classification for Operator Resource Deployment BA-BOFShttps://trac.tools.ietf.org/bof/trac/wiki Alternative Resolution Contexts for Internet NamingARCING LURK Limited Use of Remote Keys
  • 34. IEPG APPSAWG http://www.iepg.org The IEPG is an informal gathering that meets on the Sunday prior to IETF meetings. The intended theme of these meetings is essentially one of operational relevance in some form or fashion - although the chair will readily admit that he will run with an agenda of whatever is on offer at the time! OPSAWG And individual Area meetings
  • 36. www.internetsociety.org Context We are talking about more than encryption. Encryption is just a tool for enhancing privacy and trust
  • 37. Encryption | 23 September 2015 June 2013 - Snowden revelation 37 • Undermined User trust; • Generated awareness • Invoked strong community and industry action • Greater dialogue and cooperation on key issues Review of privacy of data relative to a pervasive monitoring: • Uptake in Encryption • New Atlantic cables • etc • etc
  • 38. Encryption | 23 September 2015 RFC 7258: Pervasive Monitoring is an Attack 38
  • 39. Encryption | 23 September 201539 The term "attack" is used here in a technical sense that differs somewhat from common English usage. In common English usage, an attack is an aggressive action perpetrated by an opponent, intended to enforce the opponent's will on the attacked party. The term is used here to refer to behavior that subverts the intent of communicating parties without the agreement of those parties. An attack may change the content of the communication, record the content or external characteristics of the communication, or through correlation with other communication events, reveal information the parties did not intend to be revealed.
  • 41. Encryption | 23 September 201541 http://httparchive.org/trends.php?s=Top1000&minlabel=Jan+1+2013&maxlabel=Sep+1+2015#perHttps Fraction of HTTPS links on Alexa top 1000 pages Jan 2013-Sep 2015 Source HTTPARCHIVE
  • 42. Encryption | 23 September 201542 Hosts responding to HTTPS and found certificates (full IPv4 scan) Source:University of Michigan
  • 43. Encryption | 23 September 201543 From the a network perspective HTTPS traffic grew from 4%(2008) to 17% (2015) Source known to author
  • 44. Encryption | 23 September 201544 A CDN now sees 35+% of ‘hits’ over HTTPS Source known to author
  • 45. Encryption | 23 September 201545 https://www.google.com/transparencyreport/saferemail/ Googles traffic from and towards other mail providers (between jan 2014 and oct 2015 incoming traffic doubled)
  • 46. Encryption | 23 September 2015 Developments in the past few years…. 46 Google’s SPDY, which contains TLS IAB: Turn on Encryption by default RFC7540 HTTP2.0 Firefox and Chrome default to encrypted HTTP2 Windows and Apple move http2 to desktop and mobile OSes
  • 47. Encryption | 23 September 201547 Transport Encryption is not the Only tool to increase trust and privacy
  • 48. Encryption | 23 September 201548 dprive HTTP2 RFC7435: defining opportunistic encryption RFC7465:deprecating RC4 TLS 1.3 DNS qnameminimizationqnameminimization IRTF CFRG new curves ACME
  • 49. Encryption | 23 September 2015 • Leads to reassessment of the role of intelligence in the network and the role of the end-users. Ubiquitous Encryption may have a profound effect 49 • Caching • DPI to filter web content (malevolent and benevolent) • Traffic management • Media optimization Example: Filtering of Wikipedia Article Example: feeding movie content to mobile handset Example: fall- back to upstream provider
  • 50. Encryption | 23 September 2015 The realities…. “Everything is in the clear” approach is clearly unworkable Encryption will reduce the number of parties that see traffic But not eliminate them — content provider, browser vendor, CAs, proxy provider, corporate IT department, … World still moves ahead on a voluntary basis on what technology is chosen and on what technology a particular party can adopt Surveillance shifts, not eliminated Useful technical things done in different ways, not eliminated Some potential bad outcomes to avoid —- MITMs, regulation limiting security, fragmentation, device control, … 50
  • 51. Encryption | 23 September 201551 When we look at the increased encryption, we should not prepare ourselves to merely deal with its effects. We need to prepare for
 a period of increasingly fast evolution in the Internet traffic patterns and technology. Such evolution may include new transport solutions, HTTP version 3 and beyond, the introduction of new parties (such as caching, CDN, or P2P entities), new types of security (such as content-based security), and other things that we cannot foresee at this point Jari Arkko & Göran Eriksson in their contribution to the Manrew Workshop https://www.iab.org/activities/workshops/marnew/ “making networks unmanageable to mitigate PM (Pervasive Monitoring) is not an acceptable outcome” RFC 7258