draft-arkko-arch-dedr-report-00.txt | draft-arkko-arch-dedr-report.txt | |||
---|---|---|---|---|
Network Working Group J. Arkko | Network Working Group J. Arkko | |||
Internet-Draft Ericsson | Internet-Draft Ericsson | |||
Intended status: Informational T. Hardie | Intended status: Informational T. Hardie | |||
Expires: May 7, 2020 Google | Expires: September 11, 2020 Google | |||
November 04, 2019 | March 10, 2020 | |||
Report from the IAB workshop on Design Expectations vs. Deployment | Report from the IAB workshop on Design Expectations vs. Deployment | |||
Reality in Protocol Development | Reality in Protocol Development | |||
draft-arkko-arch-dedr-report-00 | draft-iab-dedr-report-00 | |||
Abstract | Abstract | |||
The Design Expectations vs. Deployment Reality in Protocol | The Design Expectations vs. Deployment Reality in Protocol | |||
Development Workshop was convened by the Internet Architecture Board | Development Workshop was convened by the Internet Architecture Board | |||
(IAB) in June 2019. This report summarizes its significant points of | (IAB) in June 2019. This report summarizes its significant points of | |||
discussion and identifies topics that may warrant further | discussion and identifies topics that may warrant further | |||
consideration. | consideration. | |||
Status of This Memo | Status of This Memo | |||
skipping to change at page 1, line 36 | skipping to change at page 1, line 36 | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on May 7, 2020. | This Internet-Draft will expire on September 11, 2020. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
2. Workshop Agenda . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Workshop Agenda . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
3. Position Papers . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Position Papers . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
4. Discussions . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 4. Discussions . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
4.1. Past experiences . . . . . . . . . . . . . . . . . . . . 6 | 4.1. Past experiences . . . . . . . . . . . . . . . . . . . . 6 | |||
4.2. Principles . . . . . . . . . . . . . . . . . . . . . . . 6 | 4.2. Principles . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
4.3. Centralised deployment models . . . . . . . . . . . . . . 7 | 4.3. Centralised deployment models . . . . . . . . . . . . . . 8 | |||
4.4. Security . . . . . . . . . . . . . . . . . . . . . . . . 8 | 4.4. Security . . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
4.5. Future . . . . . . . . . . . . . . . . . . . . . . . . . 8 | 4.5. Future . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 9 | 5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
5.1. Summary of discussions . . . . . . . . . . . . . . . . . 9 | 5.1. Summary of discussions . . . . . . . . . . . . . . . . . 11 | |||
5.2. Actions . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 5.2. Actions . . . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
5.2.1. Potential architecture actions and outputs . . . . . 11 | 5.2.1. Potential architecture actions and outputs . . . . . 12 | |||
5.2.2. Potential other actions . . . . . . . . . . . . . . . 11 | 5.2.2. Potential other actions . . . . . . . . . . . . . . . 13 | |||
5.3. Other publications . . . . . . . . . . . . . . . . . . . 11 | 5.3. Other publications . . . . . . . . . . . . . . . . . . . 13 | |||
5.4. Feedback . . . . . . . . . . . . . . . . . . . . . . . . 11 | 5.4. Feedback . . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
6. Informative References . . . . . . . . . . . . . . . . . . . 11 | 6. Informative References . . . . . . . . . . . . . . . . . . . 13 | |||
Appendix A. Particant List . . . . . . . . . . . . . . . . . . . 14 | Appendix A. Particant List . . . . . . . . . . . . . . . . . . . 16 | |||
Appendix B. Acknowledgements . . . . . . . . . . . . . . . . . . 15 | Appendix B. Acknowledgements . . . . . . . . . . . . . . . . . . 17 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 | |||
1. Introduction | 1. Introduction | |||
The Design Expectations vs. Deployment Reality in Protocol | The Design Expectations vs. Deployment Reality in Protocol | |||
Development Workshop was convened by the Internet Architecture Board | Development Workshop was convened by the Internet Architecture Board | |||
(IAB) in June 2019. This report summarizes its significant points of | (IAB) in June 2019. This report summarizes its significant points of | |||
discussion and identifies topics that may warrant further | discussion and identifies topics that may warrant further | |||
consideration. | consideration. | |||
Note: While late in being submitted, this report is still an early | Note: While late in being submitted, this report is still an early | |||
skipping to change at page 6, line 17 | skipping to change at page 6, line 17 | |||
These papers are available from the IAB website [CFP] [POS]. | These papers are available from the IAB website [CFP] [POS]. | |||
4. Discussions | 4. Discussions | |||
4.1. Past experiences | 4.1. Past experiences | |||
The workshop investigated deployment cases from WebPKI to DNSSEC, | The workshop investigated deployment cases from WebPKI to DNSSEC, | |||
from BGP to NATs, from DNS resolvers to CDNs, and from IOT to instant | from BGP to NATs, from DNS resolvers to CDNs, and from IOT to instant | |||
messaging and social media applications. | messaging and social media applications. | |||
In many cases there was either a surprise in how technology was | ||||
deployed, lack of sufficient adoption, or the business models | ||||
associated with chosen technologies were not in favor of broader | ||||
interoperability. | ||||
In general, the protocol designers cannot affect market forces but | ||||
must work within them. But it is possible to choose, for instance, | ||||
whether to work to support the markets with standards that an | ||||
established business clearly needs, or to enable competition and | ||||
disruption through more speculative new technology. | ||||
Themes on lessons learned include: | ||||
o Feedback from those who deploy often comes too late. | ||||
o Building blocks get re-purposed in unexpected ways | ||||
o User communities come in too late. | ||||
o The web is getting more centralised. Counteracting this trend is | ||||
difficult. Even when there's a clear goal, such as supporting de- | ||||
centralised market models, it is not necessarily clear what | ||||
technical path leads to such goals. There are also many forces | ||||
that make it easier to pursue centralised models, deployment is | ||||
often easier in such a model, the technologists and regulators | ||||
find more easily which parties to talk to about the topic, and so | ||||
on. | ||||
o It is important but hard to determine how useful new protocols | ||||
are. | ||||
o It is difficult for the IETF community to interact with others, | ||||
e.g., specific business sectors that need new technology (such as | ||||
aviation or healthcare) or regulators. | ||||
4.2. Principles | 4.2. Principles | |||
Several underlying principles can be observed in the example cases | Several underlying principles can be observed in the example cases | |||
that were discussed. Deployment failures tend to be associated with | that were discussed. Deployment failures tend to be associated with | |||
cases where interdependencies make progress difficult and there's no | cases where interdependencies make progress difficult and there's no | |||
major advantage for early deployment. Despite persistent problems in | major advantage for early deployment. Despite persistent problems in | |||
the currently used technology, it becomes difficult for the ecosystem | the currently used technology, it becomes difficult for the ecosystem | |||
to switch to better technology. For instance, there are a number of | to switch to better technology. For instance, there are a number of | |||
areas where the Internet routing protocol, BGP, is lacking, but | areas where the Internet routing protocol, BGP, is lacking, but | |||
success in deploying significant improvements has been lacking, for | success in deploying significant improvements has been lacking, for | |||
skipping to change at page 6, line 41 | skipping to change at page 7, line 29 | |||
depending whether there was an earlier system that provided most of | depending whether there was an earlier system that provided most of | |||
the benefits of the new system. Again, despite potential problems in | the benefits of the new system. Again, despite potential problems in | |||
an already deployed technology, it becomes difficult to deploy | an already deployed technology, it becomes difficult to deploy | |||
improvements due to lack of immediate incentives and due to the | improvements due to lack of immediate incentives and due to the | |||
competing and already deployed alternative that is proceeding forward | competing and already deployed alternative that is proceeding forward | |||
in the ecosystem. For instance, WebPKI is very widely deployed and | in the ecosystem. For instance, WebPKI is very widely deployed and | |||
used, but DNSSEC is not. Is this because the earlier commercial | used, but DNSSEC is not. Is this because the earlier commercial | |||
adoption of WebPKI, and the initially more complex interdependencies | adoption of WebPKI, and the initially more complex interdependencies | |||
between systems that wished to deploy DNSSEC. | between systems that wished to deploy DNSSEC. | |||
The definition of success in [RFC5218] appears to a part of the | ||||
problem. The only way to control deployments up front is to prevent | ||||
wild success, but wild successes are actually what we want. And it | ||||
seems very difficult to predict these successes anyway. The workshop | ||||
also discussed the extent to which protocol work should be controlled | ||||
by the IETF, or the IESG. It seems unproductive to attempt to | ||||
constrain deployment models, as one can only offer possibilities but | ||||
not force anyone to use a particular possibility. | ||||
The workshop also discussed different types of deployment patterns on | The workshop also discussed different types of deployment patterns on | |||
the Internet: | the Internet: | |||
o Delivering functionality over Internet as a web service. The | o Delivering functionality over Internet as a web service. The | |||
Internet is an open and standardised system, but the service on | Internet is an open and standardised system, but the service on | |||
top may be closed, essentially running two components of the | top may be closed, essentially running two components of the same | |||
service provider's software against each other over the browser | service provider's software against each other over the browser | |||
and Internet infrastructure. Several large application systems | and Internet infrastructure. Several large application systems | |||
have grown in the Internet in this manner, encompassing large | have grown in the Internet in this manner, encompassing large | |||
amounts of functionality and a large fraction of Internet users. | amounts of functionality and a large fraction of Internet users. | |||
This makes it easier for web applications to grow by themselves | ||||
without cross-fertilisation or interoperability. | ||||
o Delivering concentrated network services that offer the standard | o Delivering concentrated network services that offer the standard | |||
capabilities of the Internet. Examples in this category include | capabilities of the Internet. Examples in this category include | |||
the provisioning of DNS resolution, some mail services, and so on. | the provisioning of some mail services, DNS resolution, and so on. | |||
The second case is more interesting for an Internet architecture | The second case is more interesting for an Internet architecture | |||
discussion. There can, however, be different underlying situations | discussion. There can, however, be different underlying situations | |||
in that case. The service may be simply a concentrated way to | even in that case. The service may be simply a concentrated way to | |||
provide a commodity service. The market should find a natural | provide a commodity service. The market should find a natural | |||
equilibrium for such situations. This may be fine, particularly, | equilibrium for such situations. This may be fine, particularly, | |||
where the service does not provide any new underlying advantage to | where the service does not provide any new underlying advantage to | |||
whoever is providing it (in the form of user data that can be | whoever is providing it (in the form of user data that can be | |||
commercialized, for instance, or as training data for an important | commercialized, for instance, or as training data for an important | |||
machine learning service). | machine learning service). | |||
Secondly, the service may be an extension beyond standard protocols, | Secondly, the service may be an extension beyond standard protocols, | |||
leading to some questions about how well standards and user | leading to some questions about how well standards and user | |||
expectations match. But those questions could be addressed by better | expectations match. But those questions could be addressed by better | |||
or newer standards. But the third situation is more troubling: the | or newer standards. But the third situation is more troubling: the | |||
service are provided in this concentrated manner due to business | service are provided in this concentrated manner due to business | |||
patterns that make it easier for particular entities to deploy such | patterns that make it easier for particular entities to deploy such | |||
services. | services. | |||
The group also discussed monocultures, and their negative effect on | ||||
the Internet and its stability. | ||||
Regulation may affect the Internet businesses as well. Regulation | ||||
can exist in multiple forms, based on economic rationale (e.g., | ||||
competition law) or other factors. For instance, user privacy is a | ||||
common regulatory topic. | ||||
4.3. Centralised deployment models | 4.3. Centralised deployment models | |||
Many of the participants have struggled with these trends and their | Many of the participants have struggled with these trends and their | |||
effect on desirable characteristics of Internet systems, such as | effect on desirable characteristics of Internet systems, such as | |||
distributed, end-to-end architecture or privacy. Yet, there are many | distributed, end-to-end architecture or privacy. Yet, there are many | |||
business and technical drivers causing the Internet architecture to | business and technical drivers causing the Internet architecture to | |||
become further and further centralised. | become further and further centralised. | |||
Some observations that were made: | ||||
o When standardising new technology, the parties involved in the | ||||
effort may think they agree on what the goals are, but often in | ||||
reality are surprised in the end. For instance, with DNS-over- | ||||
HTTPS there were very different aspirations, some around | ||||
improvements in confidentiality of the queries, some around | ||||
operational and latency improvements to DNS operations, and some | ||||
about shifting business and deployment models. The full picture | ||||
was not clear before the work was completed. | ||||
o In DNS, UDP-based DDOS is practical reality, and only a handful of | ||||
providers can handle the traffic load in these attacks. | ||||
The hopeful side of this issue is that there are some potential | The hopeful side of this issue is that there are some potential | |||
answers: | answers: | |||
o DDOS defenses do not have to come through large entities, as | o DDOS defenses do not have to come through large entities, as | |||
layered defenses and federation also helps similarly. | layered defenses and federation also helps similarly. | |||
o Surveillance state data capture can be fought with data object | o Surveillance state data capture can be fought with data object | |||
encryption, and not storing all of the datal in one place. | encryption, and not storing all of the data in one place. | |||
o Open interface help guard against the bundling of services in one | o Web tracking can be combatted by browsers choosing to avoid the | |||
techniques sensitive to tracking. Competition in the browser | ||||
market may help drive some of these changes. | ||||
o Open interfaces help guard against the bundling of services in one | ||||
large entity; as long as there are open, well-defined interface to | large entity; as long as there are open, well-defined interface to | |||
specific functions these functions can also be performed by other | specific functions these functions can also be performed by other | |||
parties. | parties. | |||
o Commercial surveillance does not seem to curbed by current means. | o Commercial surveillance does not seem to be curbed by current | |||
But there are still possibilities, such as stronger regulation, | means. But there are still possibilities, such as stronger | |||
data minimisation, or browsers acting on behalf of users. There | regulation, data minimisation, or browsers acting on behalf of | |||
are hopeful signs that at least some browsers are becoming more | users. There are hopeful signs that at least some browsers are | |||
aggressive in this regard. But more is needed. | becoming more aggressive in this regard. But more is needed. | |||
One comment made in the workshop that the Internet community needs to | One comment made in the workshop that the Internet community needs to | |||
move back from regulation to trying to curb the architectural trend | curb the architectural trend of centralization. Another comment was | |||
of centralization instead. Another comment was that discussing this | that discussing this in the abstract is not as useful as more | |||
in the abstract is not as useful as more concrete, practical actions. | concrete, practical actions. For instance, one might imagine | |||
For instance, one might imagine DOH deployments with larger number of | different DOH deployments with widely different implications for | |||
trusted resolvers. | privacy or tolerance of failures. Getting to the specifics of how a | |||
particular service can be made better is important. | ||||
4.4. Security | 4.4. Security | |||
This part of the discussed focused on whether in the current state of | This part of the discussed focused on whether in the current state of | |||
the Internet we actually need a new threat model. | the Internet we actually need a new threat model. | |||
Many of the communications security concerns have been addressed in | Many of the communications security concerns have been addressed in | |||
the past few years, with increasing encryption. However, issues with | the past few years, with increasing encryption. However, issues with | |||
trusting endpoints on the other side of the communication have not | trusting endpoints on the other side of the communication have not | |||
been addressed, and are becoming more urgent with the advent or | been addressed, and are becoming more urgent with the advent or | |||
centralised service architectures. | centralised service architectures. | |||
Further effort may be needed to minimise centralisation, as having | ||||
only few places to tap increases the likelihood of surveillance. | ||||
There may be a need to update [RFC3552] and [RFC7258]. | ||||
The participants in the workshop agreed that a new threat model is | The participants in the workshop agreed that a new threat model is | |||
needed, and that non-communications-security issues need to be | needed, and that non-communications-security issues need to be | |||
treated. | treated. | |||
Other security discussions were focused on IOT systems, algorithm | Other security discussions were focused on IOT systems, algorithm | |||
agility issues, and experiences from difficult security upgrades such | agility issues, experiences from difficult security upgrades such as | |||
as the DNSSEC key rollover. | the DNSSEC key rollover, and routing security. | |||
The participants cautioned against relying too much on device | The participants cautioned against relying too much on device | |||
manufacturers for security, and being clear on security models and | manufacturers for security, and being clear on security models and | |||
assumptions. Security is often poorly understood, and the | assumptions. Security is often poorly understood, and the | |||
assumptions about who the system defends against and not are not | assumptions about who the system defends against and not are not | |||
clear. | clear. | |||
4.5. Future | 4.5. Future | |||
The workshop turned into a discussion of what actions we can take: | The workshop turned into a discussion of what actions we can take: | |||
skipping to change at page 9, line 4 | skipping to change at page 10, line 33 | |||
The workshop turned into a discussion of what actions we can take: | The workshop turned into a discussion of what actions we can take: | |||
o Documenting our experiences? | o Documenting our experiences? | |||
o Providing advice (to IETF, to others) | o Providing advice (to IETF, to others) | |||
o Waiting for the catastrophe that will make people agree to | o Waiting for the catastrophe that will make people agree to | |||
changes? (hopefully not this) | changes? (hopefully not this) | |||
o Work at the IETF? | o Work at the IETF? | |||
o Technical solutions/choices? | o Technical solutions/choices? | |||
The best way for ietf to do things is through standards; convinging | The best way for the IETF to do things is through standards; | |||
people through other requests is difficult. The IETF needs to: | convincing people through other requests is difficult. The IETF | |||
needs to: | ||||
o pick pieces that it is responsible for | o Pick pieces that it is responsible for. | |||
o being reactive for the rest, be available as an expert in other | o Be reactive for the rest, be available as an expert in other | |||
discussions, provide Internet technology clue where needed, etc. | discussions, provide Internet technology clue where needed, etc. | |||
One key question is what other parties need to be involved in any | One key question is what other parties need to be involved in any | |||
discussions. Platform developers (mobile platforms, cloud systems, | discussions. Platform developers (mobile platforms, cloud systems, | |||
etc) is one such group. Specific technology or business groups (such | etc.) is one such group. Specific technology or business groups | |||
as email provider or certificate authority forums) are another. | (such as email provider or certificate authority forums) are another. | |||
The workshop also discussed specific technology issues, for instance | The workshop also discussed specific technology issues, for instance | |||
around IOT systems. One observation in those systems is that there | around IOT systems. One observation in those systems is that there | |||
is no single model for applications, they vary. There are a lot of | is no single model for applications, they vary. There are a lot of | |||
different constraints in different systems and different control | different constraints in different systems and different control | |||
points. What is needed perhaps most today is user control and | points. What is needed perhaps most today is user control and | |||
transparency (for instance, via MUD descriptions). Another issue is | transparency (for instance, via MUD descriptions). Another issue is | |||
management, particularly for devices that could be operational for | management, particularly for devices that could be operational for | |||
decades. Given the diversity of IOT systems, it may also make more | decades. Given the diversity of IOT systems, it may also make more | |||
sense to build support systems for the broader solutions that | sense to build support systems for the broader solutions that | |||
skipping to change at page 9, line 43 | skipping to change at page 11, line 25 | |||
scales, or be able to provide data minimization to cut down on | scales, or be able to provide data minimization to cut down on | |||
potential for leakages. And the difficulty of establishing peer-to- | potential for leakages. And the difficulty of establishing peer-to- | |||
peer security strengthens the need for a central point, which may | peer security strengthens the need for a central point, which may | |||
also be harmful from a long-term privacy perspective. | also be harmful from a long-term privacy perspective. | |||
5. Conclusions | 5. Conclusions | |||
5.1. Summary of discussions | 5.1. Summary of discussions | |||
The workshop met in sunny Finnish countryside and made the non- | The workshop met in sunny Finnish countryside and made the non- | |||
suprising observation that technologies sometimes get deployed in | surprising observation that technologies sometimes get deployed in | |||
surprising ways. But the consequences of deployment choices can have | surprising ways. But the consequences of deployment choices can have | |||
an impact on security, privacy, centralised vs. distributed models, | an impact on security, privacy, centralised vs. distributed models, | |||
competition, surveillance, and the IETF community cares deeply about | competition, surveillance. As the IETF community cares deeply about | |||
these aspects, so it is worthwhile to spend time in analysis of these | these aspects, it is worthwhile to spend time in analysis of these | |||
choices. | choices. | |||
The prime factor driving deployments is perceived needs; expecting | The prime factor driving deployments is perceived needs; expecting | |||
people to recognise obvious virtues and therefore deploy is not | people to recognise obvious virtues and therefore deploy is not | |||
likely to work. | likely to work. | |||
And the ecosystem is complex, including for instance many parties: | And the ecosystem is complex, including for instance many parties: | |||
different business roles, users, regulators, and so on, and | different business roles, users, regulators, and so on, and | |||
perceptions of needs and ability to act depends highly on what party | perceptions of needs and ability to act depends highly on what party | |||
one talks to. | one talks to. | |||
While the workshop discussed actions and advice, there is a critical | While the workshop discussed actions and advice, there is a critical | |||
question of who these are targeted towards. There is need to | question of who these are targeted towards. There is need to | |||
construct a map of what parties need to perform what actions. | construct a map of what parties need to perform what actions. | |||
The workshop also made some technical observations. One recent trend | The workshop also made some technical observations. One issue is | |||
is that technology is moving up the stack, e.g., in the areas of | that the workshop identified a set of hard issues that affect | |||
services, transport protocol functionality, security, naming, and so | deployment and for which have no good solutions. These issues | |||
on. This impacts how easy or hard changes are, and who is able to | include, for instance, dealing with distributed denial-of-service | |||
perform them. | attacks or how to handle spam. Similarly, lack of good solutions for | |||
micropayments is one factor behind a lot of the Internet economy | ||||
being based on advertisements. | ||||
One recent trend is that technology is moving up the stack, e.g., in | ||||
the areas of services, transport protocol functionality, security, | ||||
naming, and so on. This impacts how easy or hard changes are, and | ||||
who is able to perform them. | ||||
It was also noted that interoperability continues to be important, | It was also noted that interoperability continues to be important, | |||
and we need to explore what new interfaces need standardisation -- | and we need to explore what new interfaces need standardisation -- | |||
this will enable different deployment models & competition. Prime | this will enable different deployment models & competition. Prime | |||
factor driving deployments is actual needs; we cannot force anything | factor driving deployments is actual needs; we cannot force anything | |||
to others but can provide solutions for those that need them. Needs | to others but can provide solutions for those that need them. Needs | |||
and actions may fall on different parties. | and actions may fall on different parties. | |||
The workshop also considered the balancing of user non-involvement | The workshop also considered the balancing of user non-involvement | |||
and transparency and choice, relevant threats such as communicating | and transparency and choice, relevant threats such as communicating | |||
with malicious endpoints, the role and willigness of browsers in | with malicious endpoints, the role and willingness of browsers in | |||
increasing the ability to defending the users' privacy, and concerns | increasing the ability to defending the users' privacy, and concerns | |||
around centralised control or data storage points | around centralised control or data storage points | |||
The workshop also discussed specific issues around routing, denial- | The workshop also discussed specific issues around routing, denial- | |||
of-service attacks, IOT systems, role of device manufacturers, the | of-service attacks, IOT systems, role of device manufacturers, the | |||
DNS, and regulatory reactions and their possible consequences. | DNS, and regulatory reactions and their possible consequences. | |||
5.2. Actions | 5.2. Actions | |||
The prime conclusion from the workshop was that the topic is not | The prime conclusion from the workshop was that the topic is not | |||
completed in the workshop. Much more work is needed. The best way | completed in the workshop. Much more work is needed. The best way | |||
for ietf to do things is through standards. The IETF should focus on | for the IETF to make an impact is through standards. The IETF should | |||
the parts that it is responsible for, and be available as an expert | focus on the parts that it is responsible for, and be available as an | |||
on other discussions. | expert on other discussions. | |||
The documents/outputs and actions described in the following were | The documents/outputs and actions described in the following were | |||
deemed relevant by the participants. | deemed relevant by the participants. | |||
5.2.1. Potential architecture actions and outputs | 5.2.1. Potential architecture actions and outputs | |||
o Develop and document a modern threat model | o Develop and document a modern threat model | |||
o Continue discussion of consolidation/centralisation issues | o Continue discussion of consolidation/centralisation issues | |||
skipping to change at page 14, line 5 | skipping to change at page 15, line 36 | |||
workshop , June 2019. | workshop , June 2019. | |||
[POS] IAB, ., "Position Papers: DEDR Workshop", | [POS] IAB, ., "Position Papers: DEDR Workshop", | |||
https://www.iab.org/activities/workshops/dedr-workshop/ | https://www.iab.org/activities/workshops/dedr-workshop/ | |||
position-papers/ , June 2019. | position-papers/ , June 2019. | |||
[Reid2019] | [Reid2019] | |||
Reid, J., "Where/Why has DNS gone wrong?", Position paper | Reid, J., "Where/Why has DNS gone wrong?", Position paper | |||
submitted for the IAB DEDR workshop , June 2019. | submitted for the IAB DEDR workshop , June 2019. | |||
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC | ||||
Text on Security Considerations", BCP 72, RFC 3552, | ||||
DOI 10.17487/RFC3552, July 2003, | ||||
<https://www.rfc-editor.org/info/rfc3552>. | ||||
[RFC5218] Thaler, D. and B. Aboba, "What Makes for a Successful | [RFC5218] Thaler, D. and B. Aboba, "What Makes for a Successful | |||
Protocol?", RFC 5218, DOI 10.17487/RFC5218, July 2008, | Protocol?", RFC 5218, DOI 10.17487/RFC5218, July 2008, | |||
<https://www.rfc-editor.org/info/rfc5218>. | <https://www.rfc-editor.org/info/rfc5218>. | |||
[RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | ||||
Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | ||||
2014, <https://www.rfc-editor.org/info/rfc7258>. | ||||
[RFC8170] Thaler, D., Ed., "Planning for Protocol Adoption and | [RFC8170] Thaler, D., Ed., "Planning for Protocol Adoption and | |||
Subsequent Transitions", RFC 8170, DOI 10.17487/RFC8170, | Subsequent Transitions", RFC 8170, DOI 10.17487/RFC8170, | |||
May 2017, <https://www.rfc-editor.org/info/rfc8170>. | May 2017, <https://www.rfc-editor.org/info/rfc8170>. | |||
[Sethi2019] | [Sethi2019] | |||
Sethi, M. and T. Aura, "IoT Security and the role of | Sethi, M. and T. Aura, "IoT Security and the role of | |||
Manufacturers: A Story of Unrealistic Design | Manufacturers: A Story of Unrealistic Design | |||
Expectations", Position paper submitted for the IAB DEDR | Expectations", Position paper submitted for the IAB DEDR | |||
workshop , June 2019. | workshop , June 2019. | |||
skipping to change at page 15, line 44 | skipping to change at page 17, line 36 | |||
o Soininen, Jonne | o Soininen, Jonne | |||
o Sullivan, Andrew | o Sullivan, Andrew | |||
o Trammell, Brian | o Trammell, Brian | |||
Appendix B. Acknowledgements | Appendix B. Acknowledgements | |||
The authors would like to thank the workshop participants, the | The authors would like to thank the workshop participants, the | |||
members of the IAB, and the participants in the architecture | members of the IAB, and the participants in the architecture | |||
discussion list for interesting discussions. The workshop organizers | discussion list for interesting discussions. The notes from Jim Reid | |||
were instrumental in writing this report. The workshop organizers | ||||
would also like to thank Nokia for hosting the workshop in excellent | would also like to thank Nokia for hosting the workshop in excellent | |||
facilities in Kirkkonummi, Finland. | facilities in Kirkkonummi, Finland. | |||
Authors' Addresses | Authors' Addresses | |||
Jari Arkko | Jari Arkko | |||
Ericsson | Ericsson | |||
Email: jari.arkko@piuha.net | Email: jari.arkko@piuha.net | |||
Ted Hardie | Ted Hardie | |||
Email: ted.ietf@gmail.com | Email: ted.ietf@gmail.com | |||
End of changes. 33 change blocks. | ||||
57 lines changed or deleted | 153 lines changed or added | |||
This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |