[icnrg] Fwd: IAB Workshop Call for Papers: Design Expectations vs. Deployment Reality
"Dirk Kutscher" <ietf@dkutscher.net> Sat, 13 April 2019 13:40 UTC
Return-Path: <ietf@dkutscher.net>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86113120182 for <icnrg@ietfa.amsl.com>; Sat, 13 Apr 2019 06:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level:
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DW0SZjEkdIrM for <icnrg@ietfa.amsl.com>; Sat, 13 Apr 2019 06:40:29 -0700 (PDT)
Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.17.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B6D9120013 for <icnrg@irtf.org>; Sat, 13 Apr 2019 06:40:28 -0700 (PDT)
Received: from [192.168.56.1] ([77.21.39.17]) by mrelayeu.kundenserver.de (mreue109 [212.227.15.183]) with ESMTPSA (Nemesis) id 1N2m7O-1gry5d3U6O-0136Pa for <icnrg@irtf.org>; Sat, 13 Apr 2019 15:40:25 +0200
From: Dirk Kutscher <ietf@dkutscher.net>
To: icnrg <icnrg@irtf.org>
Date: Sat, 13 Apr 2019 15:40:23 +0200
X-Mailer: MailMate (1.12.4r5594)
Message-ID: <2CEDA66A-D3B6-4CDC-8733-3DF7DE93CB32@dkutscher.net>
References: <7fe7b482-62c6-f998-e3de-034b0d7bcd90@iab.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_8B419F14-1268-4BF1-BD98-EF5167D35561_="
Content-Transfer-Encoding: 8bit
Embedded-HTML: [{"HTML":[2260, 17156], "plain":[264, 4598], "uuid":"B18484A5-EF4E-4EF5-965C-AEA453A3085F"}]
X-Provags-ID: V03:K1:czgLj7pEg7+bBS0whq1knrJw+wdWErGcSEf2RKecWOEsN72PSlf w7ABlRj/9GsII9bSFArjhAh7MHlwzF1pdtkUf3RfbaPWoal6L4RAXiaLZp4xv4ZQffcyD5w b1koSklcfcBPegqX5vqK1ePELDE4etiG0yaPVv/9EeplAe+AlDQVFTh1QufvLWvCKBC3gZX FK4bFWJzO6qekLJrVAqUw==
X-UI-Out-Filterresults: notjunk:1;V03:K0:nFB7eGO7ElY=:ij58eto/C5j/qNKvzQ3UHE Lahub/BmK4zQAD7zAov8uqAgOnA3eKCWnWYy+n+wMdTxDN57VXvPKK1W1ERRPqcTeAbF85HAQ 23M4ic6ifY3ZZB0N5o+IEebeVkjFkKSbcO/4fqGCoZiJDOnOZyXaF4qqNa2CAIHtMj6jf0fBT hYhIGZ/p62XdFNyNQN6PF3BnOSFADCRlYOcqesq/FCahWxC/3h5kSqSuw6qgXFYuR6SsvNrqc s1yzU+xSwlfi1no5UX8b4dV+9J+ZN1M/J/uvEruA6ZRXnpxQFx3B3WVvilsTHv/eyZo5yG9Zy 2/1564CBsvT0+UnTxPJu8d4P+wRITcUmcWyR3ETHfwahift4n0+U7NwoC4ojE42d3H6QFk5a8 a8uetJDCClU+ETwLHtOAkgb/E8OeOIIpGx2J6xpjDn3x850z6KqKX/pKySysrBemdtmtISejx 8iGgMF5VrLC+1PdbpT9kI7uouoGfmZZxch7eWZAV2OgxWXulKWd6/c5wotgxXAKzV3zM148Ko dqkSxhsfUau6m+1nM4mSPUawPAfAvp7b7IOOdBb09DbgeonNs3+KN38tdTB5F1pSh2i4jind8 mJu5ZFe2Ddc+6N7mUw3P/2VPVBP3AMSIy2uaNKZsoxrIwmZHswPeCj4B2N5qKp20Yoj+MJpUE ghk1tJxDEgTnS1tzHApwKT10ZEkIPuJjkRRLqZZKpraR9p3lUsnKHE7aTHPx7BFbaWi4uigJ2 xIl0cCT1Pt2j7LLIHL8F2fuGW21+cmLBVSLHSEIGOEwgEpc+oU7RB4uGybM=
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/-EZLd9vKmxesKCgJEaPZlDDPBOo>
Subject: [icnrg] Fwd: IAB Workshop Call for Papers: Design Expectations vs. Deployment Reality
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Apr 2019 13:40:33 -0000
FYI, ICNRG. Dirk Forwarded message: > From: IAB Chair <iab-chair@iab.org> > To: ietf@ietf.org, ietf-announce@ietf.org, execd@iab.org > Subject: IAB Workshop Call for Papers: Design Expectations vs. > Deployment Reality > Date: Fri, 12 Apr 2019 11:28:40 -0700 > > Design Expectations vs. Deployment Reality in Protocol Development > > > A number of protocols have presumed specific deployment models during > the development or early elaboration of the protocol. Actual > deployments have sometimes run contrary to these early expectations > when economies of scale, DDoS resilience, market consolidation, or > other factors have come into play. These factors can result in the > deployed reality being highly concentrated. > > > This is a serious issue for the Internet, as concentrated, centralized > deployment models present risks to user choice, privacy, and future > protocol evolution. > > > On occasion, the differences to expectations were almost immediate, > but they also occur after a significant time has passed from the > protocol’s initial development. > > > Examples include: > > > Email standards, which presumed many providers running in a largely > uncoordinated fashion, but which has seen both significant market > consolidation and a need for coordination to defend against spam and > other attacks. The coordination and centralized defense mechanisms > scale better for large entities, which has fueled additional > consolidation. > > > The DNS, which presumed deep hierarchies but has often been deployed > in large, flat zones, leading to the nameservers for those zones > becoming critical infrastructure. Future developments in DNS may see > concentration through the use of globally available common resolver > services, which evolve rapidly and can offer better security. > Paradoxically, concentration of these queries into few services > creates new security and privacy concerns. > > > The Web, which is built on a fundamentally decentralized design, but > which is now often delivered with the aid of Content Delivery > Networks. Their services provide scaling, distribution, and Denial > of Service prevention in ways that new entrants and smaller systems > operators would find difficult to replicate. While truly small > services and truly large ones may operate using only their own > infrastructure, many others are left with the only practical choice > being the use of a globally available commercial service. > > > Similar developments may happen with future technologies and services. > For instance, the growing use of Machine Learning technology presents > challenges for distributing effective implementation of a service > throughout a pool of many different providers. > > > In RFC 5218 <https://tools.ietf.org/html/rfc5218>the IAB tackled what > made for a successful protocol. In RFC 8170 > <https://tools.ietf.org/html/rfc8170>, the IAB described how to handle > protocol transitions. This workshop will explore cases where the > initial system design assumptions turned out to be wrong, looking for > patterns in what caused those assumptions to fail (e.g., concentration > due to DDoS resilience) and in how those failures impact the security, > privacy, and manageability of the resulting deployments. > > > While the eventual goals might include proposing common remediations > for specific cases of confounded protocol expectations, the IAB is > currently inviting papers which: > > > * > > Describe specific cases where systems assumptions during protocol > development were confounded by later deployment conditions. > > * > > Survey a set of cases to identify common factors in these > confounded > expectations. > > * > > Explore remediations which foster user privacy, security and > provider diversity in the face of these changes. > > > Important Dates > > > The workshop will be held June 4-5 in Helsinki, Finland. > > > Position papers must be submitted by May 3rd at the latest. The > program committee will review submitted position papers and send an > invitation to the workshop to one of the paper authors. Invitations > will be distributed by May 9 at the latest. > > > Position Paper Requirements > > > Interested parties must submit a brief document of one to four pages, > formatted as HTML, PDF, or plain text. We welcome papers that describe > existing work, answers to the questions listed above, new questions, > write-ups of deployment experience, lessons-learned from successful or > failed attempts, and ideally a vision towards taking deployment > considerations better in account when designing new Internet > technology. Re-submissions from work presented elsewhere are allowed. > > > Program Committee > > > The following persons are IAB contacts for this workshop: > > > Jari Arkko > > Stephen Farrell > > Ted Hardie > > Christian Huitema > > Melinda Shore > > Brian Trammell > > > Position papers should be sent by email to dedr-pc@iab.org.
- [icnrg] Fwd: IAB Workshop Call for Papers: Design… Dirk Kutscher