Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] IETF 88 Technical Plenary is addressing monitoring of communications

Jason Castonguay jason.castonguay at gmail.com
Wed Oct 9 13:01:23 PDT 2013


Hi Libtech,

I think this fares well for the IETF that addressing traffic
monitoring is being addressed as a major issue for the technical
plenary.  It is not a working group, but a main presentation designed
as something of a keynote. I'm sorry that I'm going to miss this one,
if anyone here does attend please report back.

-- 
Jason


88th IETF Meeting
Vancouver, BC, Canada
November 3-8, 2013
Host: Huawei

Meeting venue:  Hyatt Regency Vancouver:
http://vancouver.hyatt.com/en/hotel/home.html

Register online at: http://www.ietf.org/meeting/88/

1.  Technical Plenary and Administrative Plenary Information
2.  Registration
3.  Visas & Letters of Invitation
4.  Accommodations
5.  Companion Program
6.  Social Event - there will not be a social event at IETF 88

1.  Technical Plenary and Administrative Plenary Information
Please note that both the Technical Plenary and Administrative Plenary
will be held on Wednesday, 6 November. The Technical Plenary will be
held from 0900-1130 and the Operations and Administrative Plenary will
be held from 1740-1940. More information on the Preliminary Agenda can
be found at:
https://datatracker.ietf.org/meeting/88/agenda.html

The topic for the technical plenary will be: Internet Hardening
    New reports of large-scale Internet traffic monitoring appear almost
    every day.  We were all aware that targeted interception was taking
    place, but the scale and scope in the recent reports is surprising.
    Such scale was not envisaged during the design of many Internet
    protocols; the threat is quite different than expected.  Now, the
    Internet community must consider the consequences.

    While details of these attack techniques remain largely unknown, we
    can talk about possible ways to harden the Internet in light of
    pervasive Internet monitoring.  We can take a closer look at our
    protocols and the security properties that they provide.

    A panel will summarize recent discussions and suggest potential IETF
    actions to make large-scale monitoring more difficult.

    a.  Introduction (Bruce Schneier)
         What we know and what we do not know.

    b.  Earlier IETF Debates (Brian Carpenter)
        The IETF has several cornerstone documents about Internet
        security and privacy, including RFCs 1984, 3365, 2804, and 6973.

    c.  Potential IETF Activities (Stephen Farrell)
        Summary of the discussion on the perpass mailing list.



-- 
Jason Castonguay



More information about the liberationtech mailing list