[liberationtech] IETF 88 Technical Plenary is addressing monitoring of communications
Jason Castonguay
jason.castonguay at gmail.com
Wed Oct 9 13:01:23 PDT 2013
Hi Libtech,
I think this fares well for the IETF that addressing traffic
monitoring is being addressed as a major issue for the technical
plenary. It is not a working group, but a main presentation designed
as something of a keynote. I'm sorry that I'm going to miss this one,
if anyone here does attend please report back.
--
Jason
88th IETF Meeting
Vancouver, BC, Canada
November 3-8, 2013
Host: Huawei
Meeting venue: Hyatt Regency Vancouver:
http://vancouver.hyatt.com/en/hotel/home.html
Register online at: http://www.ietf.org/meeting/88/
1. Technical Plenary and Administrative Plenary Information
2. Registration
3. Visas & Letters of Invitation
4. Accommodations
5. Companion Program
6. Social Event - there will not be a social event at IETF 88
1. Technical Plenary and Administrative Plenary Information
Please note that both the Technical Plenary and Administrative Plenary
will be held on Wednesday, 6 November. The Technical Plenary will be
held from 0900-1130 and the Operations and Administrative Plenary will
be held from 1740-1940. More information on the Preliminary Agenda can
be found at:
https://datatracker.ietf.org/meeting/88/agenda.html
The topic for the technical plenary will be: Internet Hardening
New reports of large-scale Internet traffic monitoring appear almost
every day. We were all aware that targeted interception was taking
place, but the scale and scope in the recent reports is surprising.
Such scale was not envisaged during the design of many Internet
protocols; the threat is quite different than expected. Now, the
Internet community must consider the consequences.
While details of these attack techniques remain largely unknown, we
can talk about possible ways to harden the Internet in light of
pervasive Internet monitoring. We can take a closer look at our
protocols and the security properties that they provide.
A panel will summarize recent discussions and suggest potential IETF
actions to make large-scale monitoring more difficult.
a. Introduction (Bruce Schneier)
What we know and what we do not know.
b. Earlier IETF Debates (Brian Carpenter)
The IETF has several cornerstone documents about Internet
security and privacy, including RFCs 1984, 3365, 2804, and 6973.
c. Potential IETF Activities (Stephen Farrell)
Summary of the discussion on the perpass mailing list.
--
Jason Castonguay
More information about the liberationtech
mailing list