[Chapter-delegates] A Follow-Up to the Rough Guide to ISOC's IETF73 Hot Topics

Anne Lord lord at isoc.org
Thu Mar 12 19:39:09 PDT 2009


Dear Colleagues,

You may recall that Leslie Daigle and her team in 'Standards and  
Technology' offered a “rough guide” to hot topics being discussed  
at the 73rd IETF.  They have now produced a follow up to that guide  
where they offer highlights of the events from the 73rd IETF. A "rough  
guide" to the hot topics for the 74th IETF will be available soon.

On behalf of Leslie's group we hope you find this document useful.

Best wishes
Anne
--

Introduction

This is a follow up to the rough guide for the 73rd IETF. The text is  
mostly from the “rough guide” with embedded text for the areas  
being reported.  Four topics were focussed on:

1. Bandwidth Management
2. IPv4/IPv6 Coexistence
3. DNSSEC
4. Trust and Identity

Post meeting comments are indicated by ">>" at the beginning of the  
text and "<<" at the end.

1. Bandwidth Management

As P2P and VoIP technologies become more prevalent, and network usage  
patterns sometimes deviate from their architects' expectations,  
management of bandwidth to allow best use for customers becomes an  
increasingly important topic.

 >>Mat Ford of the Internet Society Standards and Technology  
department and Kevin Chege of the Kenya Education Network produced an  
article on bandwidth management for the IETF Journal that can be  
reached here: http://www.isoc.org/tools/blogs/ietfjournal/?cat=18#post-586 
. <<

Key meetings at IETF73:

ALTO WG -- application techniques for identifying and using bandwidth  
parameters.

Designing and specifying a service that will provide applications with  
information to perform better-than-random initial peer selection based  
on factors including maximum bandwidth, minimum cross-domain traffic,  
lowest cost to the user, etc.

 >>Slides and meeting minutes are here:
http://www.ietf.org/proceedings/08nov/alto.html

Meeting concluded with disagreement about how to handle requirements,  
and continuing lack of clarity about what the requirements are.  
Several solution-space proposals were presented, but it is still too  
early for convergence here. <<

WG page: http://www.ietf.org/html.charters/alto-charter.html

LEDBAT WG -- alternative transport congestion management techniques  
Chartered to standardize a congestion control mechanism that should  
saturate the bottleneck, maintain low delay, and yield to standard  
TCP.   What this means in practice - applications that do large  
background transfers (e.g. P2P apps) could use this mechanism and  
would then automatically yield in the presence of bursty web traffic,  
or other TCP- using apps. Particularly useful for P2P uploads on thin  
home uplinks.

 >>Meeting minutes and slides are here:
http://www.ietf.org/proceedings/08nov/ledbat.html <<

 >>Lots of good technical discussion in the meeting. Since the meeting  
there has been little traffic on the mailing list.  The WG chair has  
just published an I-D describing the BitTorrent approach to congestion  
control:
http://www.ietf.org/internet-drafts/draft-shalunov-ledbat-congestion-00.txt 
. <<

WG page: http://www.ietf.org/html.charters/ledbat-charter.html


2. IPv4/IPv6 Coexistence

As there is increasing momentum to deploy IPv6, as well as recognition  
that IPv4 and IPv6 network realities must coexist, work is being done  
to develop specifications to allow interoperable behaviour between  
networked realities.

 >>Fred Baker produced an article for the IETF Journal describing the  
some of the issues that are being addressed in the BEHAVE and  
SOFTWIRES.  This article can be reached here:
http://www.isoc.org/tools/blogs/ietfjournal/?cat=18#post-580. <<

BEHAVE WG -- NAT standardization WG
Carrier Grade NAT (CGNAT), alternatives to CGNAT, new approaches to v4/ 
v6 translation, IPv6 NAT

 >>Work continues in all of the identified areas.  Mat Ford and Phil  
Roberts of the Internet Standards and Technology department have  
produced  an internet- draft with Alain Durand of Comcast describing  
some of the limitations of approaches to shared addressing that are  
being discussed as transition steps between the completion of IPv4  
address allocation and the deployment of IPv6: draft-ford-shared- 
addressing-issues-00.txt.  It will be discussed in the shared  
addressing BOF at IETF 74 which is described in the IETF 74 rough guide.

One of the most contentious discussions was the discussion of NAT  
specification for IPv6.  During IETF 74 there will be a BOF session to  
discuss whether and how to specify NAT translation for IPv6 to IPv6.   
There will be more detail about this in the IETF 74 rough guide. <<

 >>Meeting minutes and slides are at:
http://www.ietf.org/proceedings/08nov/behave.html <<

WG Page is here: http://www.ietf.org/html.charters/behave-charter.html


SOFTWIRE WG -- DSlite dual stack
Tunneling IPv6 over IPv4 to enable incremental IPv6 deployment and to  
address the imminent IPv4 address shortage for large providers.

 >>Slides are here, minutes appear to be unavailable:
http://www.ietf.org/proceedings/08nov/softwire.html

It is understood that a merger of the ds-lite and a+p proposals is  
underway, but no draft has been published to date. <<

WG Page is here: http://www.ietf.org/html.charters/softwire-charter.html


3. DNSSEC

While the US Department of Commerce is calling for input on the  
question of signing the DNS root (using DNSSEC), IETF working group  
discussions will be focused on refinements of the technology, and  
consideration of implications of IPv6 NATing (for coexistence with  
IPv4) and DNSSEC.

DNSEXT WG -- DNS extensions

Meeting minutes are here:
  http://www.ietf.org/proceedings/08nov/minutes/dnsext.txt

 >>The public attention Kaminsky brought to DNS cache poisoning in  
July highlighted the urgency of deploying DNSSEC, which DNSEXT had  
specified.  Most of the meeting focussed on discussion of different  
techniques that could improve the security of DNS.  Most of the  
comments were that these other techniques were interim measures only,  
and that effort should be concentrated on deploying DNSSEC. <<

WG page: http://www.ietf.org/html.charters/dnsext-charter.html


4. Issues of Trust and Identity

As concerns increase about security of infrastructure, privacy, trust  
and identity on the Internet, these themes are appearing in several  
working group discussions.

DKIM WG -- e-mail infrastructure
WG page:  http://www.ietf.org/html.charters/dkim-charter.html

Meeting minutes from IETF 73 are here:
https://www.ietf.org/proceedings/08nov/minutes/dkim.txt

Slides from IETF 73 are here:
https://www.ietf.org/proceedings/08nov/index.html

  >>The two major items under discussion at IETF 73 were the draft  
deployment and operations guide and a possible re-chartering to take  
on standards for domain reputation services. <<

 >>The group provided feedback and the draft guidelines were revised:
http://tools.ietf.org/wg/dkim/draft-ietf-dkim-deployment/ <<

 >>The revised text includes a substantive discussion of a Systems  
View of Email Trust Assessment (Sec. 2.1) that is particularly  
relevant to the overall question of network trust.

The reputation services discussion did not find enough support within  
the DKIM group to further either re-chartering or additional  
examination of the topic at this time. The group agreed the this was  
an interesting and hard problem but felt that there was not yet  
interest nor clarity to support a standards effort (yet). <<

GEOPRIV WG -- privacy issues
WG page:  http://www.ietf.org/html.charters/geopriv-charter.html
Meeting minutes from IETF 73 are here:
https://www.ietf.org/proceedings/08nov/minutes/geopriv.txt
Slides from IETF 73 are here:
https://www.ietf.org/proceedings/08nov/index.html

 >>The GEOPRIV working group had a packed agenda at IETF 73 and  
reviewed a number of active drafts. Issues concerning discovery  
mechanisms and the use of URIs were common across several drafts. The  
group also discussed third party access to location data. A cross-area  
discussion on the use of identifiers was moved to lists due to lack of  
time and broader apps area participation at the face to face meeting.

Several of the active drafts have now been extensively revised and a  
number of individual author drafts are also in process. Interesting  
topics include civic addressing (which includes elements of regional  
policy), privacy as a property of the target device (NOT the device  
holder), and on-going work on discovery. <<

http://tools.ietf.org/id/draft-*-geopriv-?maxhits=100&key=date&dir=desc


SIDR WG -- resource certification

 >>Meeting minutes are at:
http://www.ietf.org/proceedings/08nov/minutes/sidr.txt

Most of the meeting involved discussion of specific details of the  
format and signatures of Route Origin Authorizations (ROAs).  Revision  
details for the architecture document on a public key infrastructure  
(PKI) for Internet number resources (RPKI), and representing policy in  
certificates were also discussed. <<

WG page:  http://www.ietf.org/html.charters/sidr-charter.html




More information about the Chapter-delegates mailing list