Re: [Ideas] Your Input requested: Charter Proposal New Version

Michael Menth <menth@uni-tuebingen.de> Mon, 07 August 2017 08:19 UTC

Return-Path: <menth@uni-tuebingen.de>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B900120227 for <ideas@ietfa.amsl.com>; Mon, 7 Aug 2017 01:19:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cfKCE045Ob2K for <ideas@ietfa.amsl.com>; Mon, 7 Aug 2017 01:19:33 -0700 (PDT)
Received: from mx04.uni-tuebingen.de (mx04.uni-tuebingen.de [134.2.5.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A785C1288B8 for <ideas@ietf.org>; Mon, 7 Aug 2017 01:19:31 -0700 (PDT)
Received: from [192.168.1.104] (hsi-kbw-078-043-213-241.hsi4.kabel-badenwuerttemberg.de [78.43.213.241]) by mx04.uni-tuebingen.de (Postfix) with ESMTPSA id 56DA337EBA; Mon, 7 Aug 2017 10:19:29 +0200 (CEST)
To: Padma Pillay-Esnault <padma.ietf@gmail.com>, ideas@ietf.org
References: <CAG-CQxpxDXxLXdu0a2GdBRfTFLM_C+jqCz58HoNim52C7Yzr8g@mail.gmail.com>
From: Michael Menth <menth@uni-tuebingen.de>
Message-ID: <7771f455-8372-aae5-e04f-2991a5fa03d8@uni-tuebingen.de>
Date: Mon, 07 Aug 2017 10:19:48 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CAG-CQxpxDXxLXdu0a2GdBRfTFLM_C+jqCz58HoNim52C7Yzr8g@mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/1k_wJER7ouTNyS8jeI-swcRuhFY>
Subject: Re: [Ideas] Your Input requested: Charter Proposal New Version
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Aug 2017 08:19:35 -0000

Hi Padma,

clarity has improved.

Thanks!

Michael


Am 07.08.2017 um 07:20 schrieb Padma Pillay-Esnault:
> Dear IDEAS,
> 
> Thanks to everyone who sent their comments and feedback both on the list
> and off the list.
> 
> This new version should address comments from:
> -  Michael Menth. Michael, please let us know if this revision address
> some of your comments on clarity.
> - Alex Clemm. Alex , please chime on the revision regarding your addition. 
> - Tom Herbert. Tom, Some of your suggestions are incorporated in this
> version.
> -Tom and Alex, this version include specific working that the framework
> is modular. The set of areas to be covered has been reordered to put the
> basic identifier protocol common infrastructure first and then the new
> identity concept and functionalities.
> - Georgios Karagiannis, Uma Chundhuri. Georgios, Uma, there is still an
> ongoing discussion about the framework. This version is flexible enough
> to accommodate the work to be done on defining the framework. 
> - Uma Chundhuri. Uma, the pub/sub reference should cover the inter-grids
> aspect if needed.
> 
> Please find the new version below:
> 
> IDEAS: “IDentity EnAbled networkS”
> 
>   
> 
> Proposed Charter
> 
>                  
> 
> Network solutions based on the concept of Identifier-Locator separation
> are increasingly considered to support mobility and multi-homing across
> heterogeneous access networks. Identifier-locator separation protocols
> require infrastructure that allows nodes to discover the network
> topological location(s) of its peer(s) for packet delivery. A common
> infrastructure and protocol could be used by identifier/locator
> protocols as well as network virtualization. However, additional
> infrastructure and new protocol extensions are needed to address new
> requirements that go well beyond the traditional discovery service and
> mapping of identifier-to-location for packet delivery. 
> 
>  
> 
> At the same time, end users require greater privacy for their networking
> information and protection from outside threats, while operators demand
> greater operational efficiency. Identity-enabled networks aim to enable
> networking applications and services that provide a high degree of
> privacy and control of end points over their networking data, coupled
> with greater inherent security than provided by today’s networks.  
> 
>  
> 
> To this end, the working group shall:
> 
> - define a framework for the development of an identifier/locator
> mapping system that provides a common solution for all
> identifier/locator mapping protocols and network virtualization.
> 
>  
> 
> - in addition, introduce the concept of identity-identifier split and
> new mechanisms that let endpoints dynamically change identifiers. These
> new functionalities may, for example, facilitate anonymity through
> obscurity while preventing security issues that might result from abuse,
> ensuring that information about actual endpoints and their location is
> revealed only on a need-to-know basis.
> 
>  
> 
> Some examples of the problem space are:
> 
> - Common infrastructure and primitives: The lack of a common
> infrastructure is a barrier for the application of common and consistent
> basic networking policies. Likewise, mapping services and infrastructure
> that apply to identity-identifier as well as identifier-locator mappings
> reduces operational and deployment complexity.
> 
>  
> 
> - Access control: Unrestricted look up on an identifier may reveal
> information such as the locator to eavesdroppers. Today, there is no way
> to prevent the look up of an identifier with some user defined policy or
> finer grain rules.
> 
>  
> 
> - Privacy:  The use of long-lived and public identifiers may be
> desirable for looking up a peer, however it causes privacy issues as
> well. Indeed, when identifier-location pairs can be looked up without
> restriction, flows can be pinned by anybody to specific end systems. 
> The endpoint communications should be able to change their identifier
> while retaining their identity and associated policies. The use of
> temporary identifiers and access control on lookups should help
> discourage undesired traffic and conceal sensitive network information
> of end devices to eavesdroppers.
> 
>  
> 
> The Identity Enabled Networks (IDEAS) working group is chartered to
> develop a common framework that can be used by identifier-based
> protocols and provides services to address their requirements. We refer
> to the common framework providing the set of services as Generic
> Identity Services (GRIDS).
> 
>  
> 
> The working group will identify gaps and make recommendations on changes
> needed for interactions between the framework and identifier-enabled
> protocols.
> 
>  
> 
> Specifically, the IDEAS WG is chartered to work on these areas for the
> modular framework:
> 
>                  
> 
> - Definition of primitives for interworking with identifier-location
> split protocols
> 
> - Identifier/locator mapping and resolution (e.g. discovery, pub/sub,
> multihoming, ...)
> 
> - Registration and lifecycle management of identities and their
> associated identifiers.
> 
> - Identity authentication and authorization (e.g. access to framework,
> update of information for identifiers..)
> 
> - Definition and enforcement of basic networking policies (e.g. ability
> to look up an identifier-locator pair, permit forwarding traffic for
> particular endpoints on a per-identity basis…)
> 
> - Identity and Identifier Metadata (fixed or slow changing)
> 
> - Management aspects and Data Models where appropriate.
> 
>  
> 
> The IDEAS WG will collaborate with other Working Groups to ensure
> interoperability with LISP, HIP, ILA and other relevant work.
> Furthermore, it will try to reuse technologies already developed when
> appropriate.
> 
>                  
> 
> WG deliverables include the definition:
> 
> Generic Identity Services Framework
> 
>  
> 
> WG sustaining/informational documents may include:
> 
> These documents may not necessarily be published, but may be maintained
> in a draft form or on a collaborative Working Group wiki to support the
> efforts of the Working Group and help new comers:
> 
> - Problem statement
> 
> - Use cases
> 
> - Requirements
> 
> - Applications of the architecture for use cases
> 
>  
> 
> Milestones
> 
> March 2018 Adopt WG draft for the Generic Identity Services framework
> 
> August 2018 WGLC for the Generic Identity Services framework
> 
> December 2018 Send Generic Identity Services framework draft to the IESG
> 
> 
> 
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas
> 

-- 
Prof. Dr. habil. Michael Menth
University of Tuebingen
Faculty of Science
Department of Computer Science
Chair of Communication Networks
Sand 13, 72076 Tuebingen, Germany
phone: (+49)-7071/29-70505
fax: (+49)-7071/29-5220
mailto:menth@uni-tuebingen.de
http://kn.inf.uni-tuebingen.de