Re: [hiaps] BOF scheduling Call update.

<Dirk.von-Hugo@telekom.de> Mon, 27 January 2014 17:00 UTC

Return-Path: <Dirk.von-Hugo@telekom.de>
X-Original-To: hiaps@ietfa.amsl.com
Delivered-To: hiaps@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A68A81A0345 for <hiaps@ietfa.amsl.com>; Mon, 27 Jan 2014 09:00:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.785
X-Spam-Level:
X-Spam-Status: No, score=-2.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.535] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gnRSSpc1mcMX for <hiaps@ietfa.amsl.com>; Mon, 27 Jan 2014 09:00:16 -0800 (PST)
Received: from tcmail13.telekom.de (tcmail13.telekom.de [80.149.113.165]) by ietfa.amsl.com (Postfix) with ESMTP id 9B16A1A037F for <hiaps@ietf.org>; Mon, 27 Jan 2014 09:00:12 -0800 (PST)
Received: from he113472.emea1.cds.t-internal.com ([10.134.93.130]) by tcmail11.telekom.de with ESMTP/TLS/AES128-SHA; 27 Jan 2014 18:00:09 +0100
Received: from HE113484.emea1.cds.t-internal.com ([10.134.93.124]) by HE113472.emea1.cds.t-internal.com ([::1]) with mapi; Mon, 27 Jan 2014 18:00:09 +0100
From: <Dirk.von-Hugo@telekom.de>
To: <joelja@bogus.com>, <hiaps@ietf.org>
Date: Mon, 27 Jan 2014 18:00:08 +0100
Thread-Topic: [hiaps] BOF scheduling Call update.
Thread-Index: Ac8X32E8yQHFOX9AR3aCoRobS9Gd1QDoDY9Q
Message-ID: <05C81A773E48DD49B181B04BA21A342A2DA62C274C@HE113484.emea1.cds.t-internal.com>
References: <52E0787C.1050605@bogus.com>
In-Reply-To: <52E0787C.1050605@bogus.com>
Accept-Language: de-DE
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: de-DE
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: rlb@ipv.sx, brian@innovationslab.net
Subject: Re: [hiaps] BOF scheduling Call update.
X-BeenThere: hiaps@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Host Identification, Address and Prefix Sharing in Wi-Fi Access \(hiaps\)" <hiaps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hiaps>, <mailto:hiaps-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hiaps/>
List-Post: <mailto:hiaps@ietf.org>
List-Help: <mailto:hiaps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hiaps>, <mailto:hiaps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2014 17:00:18 -0000

Dear all,
As explained by Joel below we will have no BoF at London but should use the opportunity to discuss potential next steps.
As further details to understand the current situation we may take into account the discussion on the concerns of pervasive monitoring which has obvious relations to our Host identity we wanted to find a solution for in the emergency use case scenario in Hiaps BoF. 
What help to understand the current situation is the have a look at http://datatracker.ietf.org/doc/draft-farrell-perpass-attack/ where you find there will be an IESG telechat next week. 
Beside other issues we might say it's just bad timing for ETSI and our planned activity.

What is your opinion?

Thanks and best regards
Dirk

-----Original Message-----
From: hiaps [mailto:hiaps-bounces@ietf.org] On Behalf Of joel jaeggli
Sent: Donnerstag, 23. Januar 2014 03:04
To: hiaps@ietf.org
Cc: Richard Barnes; Brian Haberman
Subject: [hiaps] BOF scheduling Call update.

Hi,

The BOF scheduling call was held this morning.

The feedback received was fairly unfavorable with respect to our prospects, It has been decided not to include it in the schedule for IETF 89 on that basis.

Some observations.

* With respect to emergency services use case Richard Barnes has expressed an interest in socializing that with ecrit. There may also be overlap with geopriv where useful work can be done.

* There is very active disinterest with respect to exposing additional identifiers in a fashion that is visible to on-path observers. Evolving sentiments regarding exposure to pervasive monitoring play into this. In this respect the historical effort in this space e.g. RFC 6967  RFC 6269 is helpful insofar as it highlights the problems with some of the potential approaches.

* Consent is another question when it comes to notionally signaling on behalf of users. either for all packets/flows, some of them, or on the basis of DPI, e.g. application awareness through inspection, there is some assumption that applications should be resistant to the later for a variety of reasons.

* The existing documents don't point in the direction that I feel can get support from the current IESG and IAB, myself included.

* There does not at this time appear to be a critical-mass associated with the proposed working-group and working group items.

Thank you for your forbearance.

joel