[icnrg] Fwd: IAB Workshop Call for Papers: Design Expectations vs. Deployment Reality

"Dirk Kutscher" <ietf@dkutscher.net> Sat, 13 April 2019 13:40 UTC

Return-Path: <ietf@dkutscher.net>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86113120182 for <icnrg@ietfa.amsl.com>; Sat, 13 Apr 2019 06:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level:
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DW0SZjEkdIrM for <icnrg@ietfa.amsl.com>; Sat, 13 Apr 2019 06:40:29 -0700 (PDT)
Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.17.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B6D9120013 for <icnrg@irtf.org>; Sat, 13 Apr 2019 06:40:28 -0700 (PDT)
Received: from [192.168.56.1] ([77.21.39.17]) by mrelayeu.kundenserver.de (mreue109 [212.227.15.183]) with ESMTPSA (Nemesis) id 1N2m7O-1gry5d3U6O-0136Pa for <icnrg@irtf.org>; Sat, 13 Apr 2019 15:40:25 +0200
From: Dirk Kutscher <ietf@dkutscher.net>
To: icnrg <icnrg@irtf.org>
Date: Sat, 13 Apr 2019 15:40:23 +0200
X-Mailer: MailMate (1.12.4r5594)
Message-ID: <2CEDA66A-D3B6-4CDC-8733-3DF7DE93CB32@dkutscher.net>
References: <7fe7b482-62c6-f998-e3de-034b0d7bcd90@iab.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_8B419F14-1268-4BF1-BD98-EF5167D35561_="
Content-Transfer-Encoding: 8bit
Embedded-HTML: [{"HTML":[2260, 17156], "plain":[264, 4598], "uuid":"B18484A5-EF4E-4EF5-965C-AEA453A3085F"}]
X-Provags-ID: V03:K1:czgLj7pEg7+bBS0whq1knrJw+wdWErGcSEf2RKecWOEsN72PSlf w7ABlRj/9GsII9bSFArjhAh7MHlwzF1pdtkUf3RfbaPWoal6L4RAXiaLZp4xv4ZQffcyD5w b1koSklcfcBPegqX5vqK1ePELDE4etiG0yaPVv/9EeplAe+AlDQVFTh1QufvLWvCKBC3gZX FK4bFWJzO6qekLJrVAqUw==
X-UI-Out-Filterresults: notjunk:1;V03:K0:nFB7eGO7ElY=:ij58eto/C5j/qNKvzQ3UHE Lahub/BmK4zQAD7zAov8uqAgOnA3eKCWnWYy+n+wMdTxDN57VXvPKK1W1ERRPqcTeAbF85HAQ 23M4ic6ifY3ZZB0N5o+IEebeVkjFkKSbcO/4fqGCoZiJDOnOZyXaF4qqNa2CAIHtMj6jf0fBT hYhIGZ/p62XdFNyNQN6PF3BnOSFADCRlYOcqesq/FCahWxC/3h5kSqSuw6qgXFYuR6SsvNrqc s1yzU+xSwlfi1no5UX8b4dV+9J+ZN1M/J/uvEruA6ZRXnpxQFx3B3WVvilsTHv/eyZo5yG9Zy 2/1564CBsvT0+UnTxPJu8d4P+wRITcUmcWyR3ETHfwahift4n0+U7NwoC4ojE42d3H6QFk5a8 a8uetJDCClU+ETwLHtOAkgb/E8OeOIIpGx2J6xpjDn3x850z6KqKX/pKySysrBemdtmtISejx 8iGgMF5VrLC+1PdbpT9kI7uouoGfmZZxch7eWZAV2OgxWXulKWd6/c5wotgxXAKzV3zM148Ko dqkSxhsfUau6m+1nM4mSPUawPAfAvp7b7IOOdBb09DbgeonNs3+KN38tdTB5F1pSh2i4jind8 mJu5ZFe2Ddc+6N7mUw3P/2VPVBP3AMSIy2uaNKZsoxrIwmZHswPeCj4B2N5qKp20Yoj+MJpUE ghk1tJxDEgTnS1tzHApwKT10ZEkIPuJjkRRLqZZKpraR9p3lUsnKHE7aTHPx7BFbaWi4uigJ2 xIl0cCT1Pt2j7LLIHL8F2fuGW21+cmLBVSLHSEIGOEwgEpc+oU7RB4uGybM=
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/-EZLd9vKmxesKCgJEaPZlDDPBOo>
Subject: [icnrg] Fwd: IAB Workshop Call for Papers: Design Expectations vs. Deployment Reality
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Apr 2019 13:40:33 -0000

FYI, ICNRG.

Dirk

Forwarded message:

> From: IAB Chair <iab-chair@iab.org>
> To: ietf@ietf.org, ietf-announce@ietf.org, execd@iab.org
> Subject: IAB Workshop Call for Papers: Design Expectations vs. 
> Deployment Reality
> Date: Fri, 12 Apr 2019 11:28:40 -0700
>
> Design Expectations vs. Deployment Reality in Protocol Development
>
>
> A number of protocols have presumed specific deployment models during 
> the development or early elaboration of the protocol.  Actual 
> deployments have sometimes run contrary to these early expectations 
> when economies of scale, DDoS resilience, market consolidation, or 
> other factors have come into play. These factors can result in the 
> deployed reality being highly concentrated.
>
>
> This is a serious issue for the Internet, as concentrated, centralized 
> deployment models present risks to user choice, privacy, and future 
> protocol evolution.
>
>
> On occasion, the differences to expectations were almost immediate, 
> but they also occur after a significant time has passed from the 
> protocol’s initial development.
>
>
> Examples include:
>
>
> Email standards, which presumed many providers running in a largely 
> uncoordinated fashion, but which has seen both significant market 
> consolidation and a need for coordination to defend against spam and 
> other attacks. The coordination and centralized defense mechanisms 
> scale better for large entities, which has fueled additional 
> consolidation.
>
>
> The DNS, which presumed deep hierarchies but has often been deployed 
> in large, flat zones, leading to the nameservers for those zones 
> becoming critical infrastructure. Future developments in DNS may see 
> concentration through the use of globally available common resolver 
> services, which evolve rapidly and can offer better security. 
> Paradoxically, concentration of these queries into few services 
> creates new security and privacy concerns.
>
>
> The Web, which is built on a fundamentally decentralized design, but 
> which is now often delivered with the aid of Content Delivery 
> Networks.  Their services provide scaling, distribution, and Denial 
> of Service prevention in ways that new entrants and smaller systems 
> operators would find difficult to replicate.  While truly small 
> services and truly large ones may operate using only their own 
> infrastructure, many others are left with the only practical choice 
> being the use of a globally available commercial service.
>
>
> Similar developments may happen with future technologies and services. 
> For instance, the growing use of Machine Learning technology presents 
> challenges for distributing effective implementation of a service 
> throughout a pool of many different providers.
>
>
> In RFC 5218 <https://tools.ietf.org/html/rfc5218>the IAB tackled what 
> made for a successful protocol.  In RFC 8170 
> <https://tools.ietf.org/html/rfc8170>, the IAB described how to handle 
> protocol transitions.  This workshop will explore cases where the 
> initial system design assumptions turned out to be wrong, looking for 
> patterns in what caused those assumptions to fail (e.g., concentration 
> due to DDoS resilience) and in how those failures impact the security, 
> privacy, and manageability of the resulting deployments.
>
>
> While the eventual goals might include proposing common remediations 
> for specific cases of confounded protocol expectations, the IAB is 
> currently inviting papers which:
>
>
>  *
>
>    Describe specific cases where systems assumptions during protocol
>    development were confounded by later deployment conditions.
>
>  *
>
>    Survey a set of cases to identify common factors in these 
> confounded
>    expectations.
>
>  *
>
>    Explore remediations which foster user privacy, security and
>    provider diversity in the face of these changes.
>
>
> Important Dates
>
>
> The workshop will be held June 4-5 in Helsinki, Finland.
>
>
> Position papers must be submitted by May 3rd at the latest. The 
> program committee will review submitted position papers and send an 
> invitation to the workshop to one of the paper authors. Invitations 
> will be distributed by May 9 at the latest.
>
>
> Position Paper Requirements
>
>
> Interested parties must submit a brief document of one to four pages, 
> formatted as HTML, PDF, or plain text. We welcome papers that describe 
> existing work, answers to the questions listed above, new questions, 
> write-ups of deployment experience, lessons-learned from successful or 
> failed attempts, and ideally a vision towards taking deployment 
> considerations better in account when designing new Internet 
> technology. Re-submissions from work presented elsewhere are allowed.
>
>
> Program Committee
>
>
> The following persons are IAB contacts for this workshop:
>
>
> Jari Arkko
>
> Stephen Farrell
>
> Ted Hardie
>
> Christian Huitema
>
> Melinda Shore
>
> Brian Trammell
>
>
> Position papers should be sent by email to dedr-pc@iab.org.