Re: [dnssd] Draft minutes of IETF 101 WG meeting

Tim Chown <Tim.Chown@jisc.ac.uk> Wed, 04 April 2018 08:07 UTC

Return-Path: <tim.chown@jisc.ac.uk>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57376124205 for <dnssd@ietfa.amsl.com>; Wed, 4 Apr 2018 01:07:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jisc.ac.uk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0bn41ZRmE9AX for <dnssd@ietfa.amsl.com>; Wed, 4 Apr 2018 01:07:16 -0700 (PDT)
Received: from eu-smtp-delivery-189.mimecast.com (eu-smtp-delivery-189.mimecast.com [146.101.78.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C762120047 for <dnssd@ietf.org>; Wed, 4 Apr 2018 01:07:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jisc.ac.uk; s=mimecast20170213; t=1522829234; h=from:subject:date:message-id:to:mime-version:content-type:content-transfer-encoding:in-reply-to:references; bh=jvztTaj0KlEpUolAIBGyeohRgBhn900TJNXgIqMbxzo=; b=BG5soT2cHCPyUi2TX9/paaGxbv7r1AwDnprTxzktYbN0dB999MoqtHFd0SRFQhTiQDcGtjzrlEZ+55dvu5TSpHzVibak+jJvkep/NWJPxt/XaJX419MTsq0OG4UPtlEuNGYe4km2Q6GT1TFKw1lyYH3qHXT1n+Yb/7qSsv6pCVk=
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01lp0243.outbound.protection.outlook.com [213.199.154.243]) (Using TLS) by eu-smtp-1.mimecast.com with ESMTP id uk-mta-15-eaQB7W4cPOC0WR3NOhzKQw-1; Wed, 04 Apr 2018 09:07:11 +0100
Received: from VI1PR07MB0879.eurprd07.prod.outlook.com (10.161.108.21) by VI1PR07MB0862.eurprd07.prod.outlook.com (10.161.108.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.653.4; Wed, 4 Apr 2018 08:07:07 +0000
Received: from VI1PR07MB0879.eurprd07.prod.outlook.com ([fe80::4011:38b1:3ecf:4201]) by VI1PR07MB0879.eurprd07.prod.outlook.com ([fe80::4011:38b1:3ecf:4201%6]) with mapi id 15.20.0653.011; Wed, 4 Apr 2018 08:07:06 +0000
From: Tim Chown <Tim.Chown@jisc.ac.uk>
To: "dnssd@ietf.org" <dnssd@ietf.org>
Thread-Topic: Draft minutes of IETF 101 WG meeting
Thread-Index: AQHTwg01yHsLD/ys+k66vG7X79nQcaPwU7yA
Date: Wed, 04 Apr 2018 08:07:05 +0000
Message-ID: <0D729041-C6A4-40A5-9B14-16D7EB3B1E85@jisc.ac.uk>
References: <1541B199-D8CD-412F-89E7-A96BB2D8B680@jisc.ac.uk>
In-Reply-To: <1541B199-D8CD-412F-89E7-A96BB2D8B680@jisc.ac.uk>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.6.18)
x-originating-ip: [194.82.140.195]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB0862; 7:o0vTg1mwAUyhxv5ku5nOKG9xSrN8KIlDHGNmd0McdqmLX/nWp+3IkkTRqParVDCGqUaWDA/iJM0jWg8jIlodE7PbIzfM2iRKp1X+U63qc2d5az4+7jLcCeHV8rOZtRRfpWyc46UnZ2D0PL0kfk16R0MgWTIaDHTZ4t3JdNVlQauYYScJUpfDxkM6ITozRIpey0wKOl9GC3WviaAETr3cKhc87cl4RmArpWNm5Vickf6WAE5D03QXnrsW0PSfG7yF; 20:c8E8XMFEnhHhoo4gKF5MjZY1tWP0IVxVsRG2mWN0LD+cC/y9g+xDJ/TPAYeIxPRVfH+Ya71euLJevZnlDswltAg6vnz9ywsHZRqb0MNbGHuqspwo5P4MXB1rRH2aVjgxy6QRz0EIeMhpE3FwNCbBCy1nktBjcF3kwRGQBgCxawY=
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 8fb7f699-6454-4346-05b4-08d59a030e84
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:VI1PR07MB0862;
x-ms-traffictypediagnostic: VI1PR07MB0862:
x-microsoft-antispam-prvs: <VI1PR07MB086225E43A02F9E610F23D51D6A40@VI1PR07MB0862.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(274715658323672)(20558992708506)(120809045254105)(192374486261705)(131327999870524);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3231221)(944501327)(52105095)(10201501046)(93006095)(93001095)(3002001)(6041310)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123562045)(20161123564045)(6072148)(201708071742011); SRVR:VI1PR07MB0862; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB0862;
x-forefront-prvs: 0632519F33
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39380400002)(396003)(366004)(346002)(39850400004)(376002)(57704003)(189003)(199004)(2906002)(33656002)(82746002)(7736002)(5660300001)(478600001)(305945005)(3280700002)(11346002)(446003)(3660700001)(36756003)(53546011)(6506007)(68736007)(66066001)(76176011)(486006)(59450400001)(6916009)(57306001)(476003)(2351001)(105586002)(2616005)(50226002)(53936002)(966005)(106356001)(81156014)(2900100001)(3846002)(8936002)(86362001)(97736004)(5250100002)(26005)(81166006)(5890100001)(6246003)(1730700003)(2501003)(102836004)(14454004)(74482002)(83716003)(8676002)(6486002)(6306002)(6436002)(6512007)(99286004)(5640700003)(186003)(316002)(229853002)(25786009)(72206003)(6116002)(786003); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB0862; H:VI1PR07MB0879.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
x-microsoft-antispam-message-info: Z3KxYkrPO67vGum/9MHsSLv5epGdpG6wOskc80ikOV/k9+gHHxEah910HfN80GPkBBVAGd9FU2fOWV0gH7D8R8BKLu3Nruceu/kYmcq0G6BXvO9E1vQ2GoKuLxZcguhTq/T2NwotOvMsjyeTYg+qqZjHUZIl7DuMfXMDAmbPN0R/tM+mHeIHl3m8H0UmM5CJU/p+OANraNN/wllpxDpQ2DDcP1JfCxlm6yQCMU5Lymb263jKS0+qUCjXs8AMt/N/Won5KT1qRGUdpsHEgC1S09at8GO03szLpxRE/lh/CLCKnmAK+J8GP7jQ1grMxBaabNOzAzKDJYfb772ec09LNnBxpSkPI79Ft+ThuDC9BsvCH0KoGshGwX80XeKjKoFyGqGUbnp1hsgZ6aCnJ8D1fcdYoTJd+hljZT0BC3Rwh0Q=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-ID: <BAACEBDE2AB39F4BA4EC3D0C752FC89A@eurprd07.prod.outlook.com>
MIME-Version: 1.0
X-OriginatorOrg: jisc.ac.uk
X-MS-Exchange-CrossTenant-Network-Message-Id: 8fb7f699-6454-4346-05b4-08d59a030e84
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Apr 2018 08:07:06.0875 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 48f9394d-8a14-4d27-82a6-f35f12361205
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB0862
X-MC-Unique: eaQB7W4cPOC0WR3NOhzKQw-1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/Rsm-RXiCXdUJ6GGzfp48HgNpAqg>
Subject: Re: [dnssd] Draft minutes of IETF 101 WG meeting
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Apr 2018 08:07:19 -0000

Hi,

These minutes are now uploaded as final.

Best wishes,
Tim 

> On 22 Mar 2018, at 18:40, Tim Chown <Tim.Chown@jisc.ac.uk> wrote:
> 
> Hi,
> 
> Please review the draft minutes by Thursday 29th March.
> 
> See: https://datatracker.ietf.org/meeting/101/materials/minutes-101-dnssd-00
> 
> Also attached below.
> 
> Many thanks again to Barbara for taking minutes, and Mikael for Jabber scribing.
> 
> Tim 
> 
> 
> 
> DNSSD WG Minutes
> 
> IETF101, London
> Thursday, 22nd March 2018
> Buckingham Room 09:30 - 12:00 local time
> 
> Chairs: David Schinazi, Tim Chown
> Notes: Barbara Stark
> Jabber: Mikael Abrahamsson
> 
> -------
> Chairs Introduction
> Tim Chown presented the Chairs' slides
> https://datatracker.ietf.org/meeting/101/materials/slides-101-dnssd-chairs-slides-04
> There was no bashing of the agenda.
> ------------------------
> Status Reports
> Stuart Cheshire presented DNSSD Document Status Update
> https://datatracker.ietf.org/meeting/101/materials/slides-101-dnssd-dns-stateful-operations-push-and-discovery-broker-update-00
> 
> Tim: any questions on DNS push?
> Thumbs up from Andrew Sullivan
> Tim: Any comments? <There were no comments.>
> Tim: Is there any reason to hold the documents up? Do we need more implementation experience?
> Stuart: Ted and I are working on implementation. We expect to have code running at the Montreal hackathon.
> Tim: Anyone else implementing? <some hands were raised>
> Stuart: There is a team at Cisco that have an implementation. And Marcus Steinberg has been working on an implementation.
> Tim: OK, so implementations can proceed in parallel with IETF process
> 
> Tim: How many are in favor of adopting the roadmap document as a WG text? <all hums were in favor>
> 
> ----------------------
> Update to Multicast DNS Discovery Relay, 
> and Simple Homenet Naming and SD Architecture
> 
> Ted Lemon presented DNS-SD Discovery Relay
> https://datatracker.ietf.org/meeting/101/materials/slides-101-dnssd-dns-sd-discovery-relay-01
> 
> Tim: Has anyone read it? <not many hands>
> Tim: Will anyone read it? <some hands were raised>
> Stuart: I think it's a fairly new document so people haven't had much of a chance to read it yet. But I think it's good. I appreciate efforts from people in Cisco to do implementations. I think it makes a lot of sense and that may be why we haven't received much feedback. It fits naturally.
> Mikael: Do you know what version of OpenWRT you'll be working in?
> Ted: It's easy to integrate into anything.
> Mikael: Good to make it stable separate from OpenWRT.
> Ted: Good feedback.
> 
> Tim: All in facor of adopting as WG item? <all hums were in favor, none against>
> 
> Simple Homenet Naming Architecture
> Ted Lemon presented Simple Homenet Naming Architecture
> https://datatracker.ietf.org/meeting/101/materials/slides-101-dnssd-simple-homenet-naming-architecture-01
> 
> Tim: Note this is already a homenet WG item. Going back to slide "Our ask for DNSSD WG". Any thoughts on these? Unicast/multicast position?
> Stuart: I wanted to expand on something Ted mentioned. Home automation, IoT are increasingly popular in homes. When you have a mesh it gets really hard to multicast. Personally, this is an area I think is important and will be working on. We will need this.
> Mikael: Yes we should move away from multicast. There are multicast issues with radios.
> Stuart: You make a good point. We will have cases where there is old and new, and mesh with all new. We need to have a solution ready.
> 
> Tim: Maybe it's time to renew our charter and and some items on this?
> Terry Manderson: <as AD> I'm willing to listen to the WG members and add this.
> Mikael: We need to make sure we're not reducing or impacting the experience others are trying to create.
> Tim: This can complement work in CoRE, etc.
> Stuart: <to Tim> Please send email to list with link to Charlie Perkins work.
> 
> Tim: We will take work on charter to the list. As for this draft, how many have read? <not many hands> It may be early for adoption? But it would be good for people to review?
> 
> Stuart: I agree it's not time for adoption but discussion on charter is good.
> Ted: I didn't want to get too deep into adoption discussion. DNS-SD has done a good job at addressing machinery of how to get interconnected devices to just work. Especially for EDUCAUSE case.
> Tim: It would be good to have equivalent viewpoint to what you are doing in homenet for enterprise.
> 
> Tim: Agreement was to work on update to charter. After that we will see which document we need to adopt.
> 
> --------------------
> CoRE Resource Discovery: DNS-SD mapping
> Kerry Lynn remotely presented CoRE RD and DNS-SD mapping
> https://datatracker.ietf.org/meeting/101/materials/slides-101-dnssd-core-rd-and-dns-sd-mapping-01
> 
> Kerry: <speaking to the title slide> This is to harmonize work being done in CoRE with DNS-SD.
> 
> Dave Thaler: How do you derive structure from info in OIC?
> Kerry: I don't know. We're just starting. If we could have federated name scheme it could help us avoid having to document separately.
> Dave: I don't know why you would need that.
> Ted: Have you considered advertising CoRE as a DNS-SD service? -- if I were thinking  about how to get CoRE and DNS-SD together, I would do it another way.
> Kerry: It's clear it would be good to have more interaction. We will have interop.
> Christian Amsüss: Interop plans are not yet set in stone, but it will be virtual, in April
> Kerry: Just to advertise something as being CoRE or CoAP capable may not help.
> Stuart: Yes we could help with communication. Key challenge is the mapping of services, need common vocabulary to describe services.
> Christian A: one use case we're considering is a group of resource types that are offered over HTTP - advertise them over DNSSD to allow non-core devices to interoperate
> Barbara: We have something at Broadband forum that uses CoAP but doesn't do DNS-SD this way. It does have specific DNS-SD naming scheme. I will send you link to info.
> 
> --------------------
> DNS-SD Privacy requirements and scoping discussion
> Christian Huitema presented DNS-SD Privacy Scenarios
> https://datatracker.ietf.org/meeting/101/materials/slides-101-dnssd-dns-sd-privacy-scenarios-00
> 
> Stuart: You can't assume devices in Scenario 2 were set up by same people.
> Christian H: You are right. Same requirement but not same scenario.
> 
> Christian Huitema presented DNS-SD Privacy Scaling
> https://datatracker.ietf.org/meeting/101/materials/slides-101-dnssd-dns-sd-privacy-scaling-00
> 
> Dave Thaler: It would be useful to state comparative CPU requirements / speeds of solutions.
> Christian H: Yes
> 
> David S: Thank you. I'd like to now see if we can figure out requirements. What do we want to solve. What don't we want to solve. There are many compromises and options here.
> Chris Wood: There are newer flavors of cryptography that could be applicable here. Maybe we should mention that.
> David S: That's something we should consider. Please <to Chris> send info to list.
> Stuart: We do not wish to rule anything out just yet. I think this is a relatively new area.
> Kerry: I tried to understand what metadata is exposed by roaming client. You can't cloak the IP address. Will this be about cloaking what the client wants and what it gets back? And do we want to address that the client should only be doing what the user wants.
> Christian H: <described what header elements should be in the clear> Trying to protect metadata in DNS-SD protocol.
> Chris Wood: There will be new things that have not gone through this process.
> Tim: We have had a security review of Christian's initial pairing doc, but not a broader view on the topic as a whole from them
> Christian: We are protecting the metadata
> David: Yes 
> Dave Thaler: Discovery is only half the problem. I can discover you and open a channel, but are both sides private?  This topic, as secret handshaking protocol research, aka affiliate hiding authentication, has been around for years, but no standardised protocols. Need to make sure we preserve the identity of both sides. I have info I can send pointers to.
> David S: Yes please send.
> Tim: Need to answer some of the questions in Christian's slide deck.
> Christian H: There is a deeper thought that I have not brought here.
> David S: Do we have a requirement that private discovery can lead to bootstrap?
> Christian H: We have added solution to protect handshake.
> David S: On first one <item in dash list on DNS-SD Privacy Discussion slide> does anyone have an opinion on the topic?
> Stuart: On first one, my answer is probably yes. On 2nd the answer may be no.
> Tom Pusateri: Christian seems to be working independently of what you describe. It might be okay to have a subset of the privacy rules.
> David S: Yes, that might be possible.
> Mikael: What trusts what?
> David S: If I trust you I allow you to discover me. But who are you? Person? Device?
> Mikael: Yes.
> Dave Robin: What's the point in having this secret application that is clearly identified by the identity of the device? Problem is with device that has multiple independent applications.
> David S: It depends on what you mean by hiding. <provided an example of printer talking to medical device>
> Dave R: I can tell by behavior who you are talking to.
> Stuart: Imagine every application has its own IP address. Windows has good MAC address randomization. We need additional rule changes by regulators on using these tools. 
> Christian: This will evolve (IP and MAC 'randomisation')
> Daniel Kaiser <relayed from jabber>: Should a medical device really join a public WiFi network for communicating with, e.g., a phone?
> Mikael: When I come here I sometimes see my printer at home. Why does it do that? Is this privacy or policy? It needs to be granular. I want to share some things and not others.
> David S: We need to nail down some of this so we can define solution.
> 
> Tim: There are various drafts. How should we capture these issues going forward? Put into one draft drawing from these 3 sources? Who would be willing to help write? <Chris Wood, Ted Lemon and Stuart Cheshire raised hands>
> 
> Normen Kowalewski described 'personal cloud' device privacy based on some EU project work
> Christian H: I am concerned with this scenario.
> Normen: Other concepts should be looked at.
> 
> David S: Are there preferences as to start from one of the existing docs or start new? TBD.
> 
> ----------------------
> Wrapup
> 
> Tim: Actions:
> 1. Adopted roadmap -- check with list. 
> 2. Adopted discovery relay -- check with list; Barbara to review
> 3. Continue work on sleep proxy and discovery broker
> 4. WG to review charter with a view to update -- discuss on list to see what goes in and out of charter; e.g., privacy, unicast/multicast, CoAP interop
> 5. Continue to harmonize with other groups on CoRE work; seek to have WG presence at April CoRE RD interop
> 6. Need volunteers to produce guidance on naming architecture for enterprise like work done in homenet.
> 7. Need to pull together a new privacy requirements draft
> 
>