Re: [Ideas] Your Input requested: Charter Proposal New Version

Sam Sun <sam.sun.ietf@gmail.com> Wed, 09 August 2017 05:55 UTC

Return-Path: <sam.sun.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FCDC131DA2 for <ideas@ietfa.amsl.com>; Tue, 8 Aug 2017 22:55:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y6-ocewkLo8o for <ideas@ietfa.amsl.com>; Tue, 8 Aug 2017 22:55:29 -0700 (PDT)
Received: from mail-oi0-x243.google.com (mail-oi0-x243.google.com [IPv6:2607:f8b0:4003:c06::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88A441320CC for <ideas@ietf.org>; Tue, 8 Aug 2017 22:55:29 -0700 (PDT)
Received: by mail-oi0-x243.google.com with SMTP id j194so4841434oib.4 for <ideas@ietf.org>; Tue, 08 Aug 2017 22:55:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language; bh=GtaH2+GtsIjf47Ua4izrX8ETJRPjr/zbwc2f3RaU8MM=; b=Jx6G8jL8BhZoJJ+P4MoXjZ++neM4G3VUDPqS9OFmM3hE1utlOw2B2DXRmp5Q2D9P1F C0sx7jK0jaok5De09zu41N20P9B+WEGkSABTEQMooBk5lCZulDlA1Tp9gfD2Mhdtqjnv DiO62vSno9KFgTN8cjyIkA9n/nDrad5p8oJYzMQ4MIQGy/AX6Z/cG1TTwM55ozry/9ZU 5bMx2V6M3ETRwaitJ2RS0UCbg3AcsxZOhA/Rc5PVBErC6FFP2aJ+Jhumarp0A10TEx7F mfDYQrihdicLkjCwsCdqVZU/fZ9DfoG1VtSQsxfYYlExrgoWoSP8k3Vyzrwylvi6kONk DYyw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=GtaH2+GtsIjf47Ua4izrX8ETJRPjr/zbwc2f3RaU8MM=; b=n0p6QajNFCa3lwLcFCRzo2t37XoDJ4niDEveNuB1UXtDDrrMHp1U2WPOqwUXbhuAek MdfVbok1+eqHAxF6YiZEjL6zq+9zjGnzwBAneZ5jPXPNzM7EwQEcenYo7p0WxcNzKNlD rd8sF5tRCL1HcIW9NXzaK/p1VZmh4hl9fEKtGn9iOu11endsselh4kV2FHcIgCouigNm CoJreB4qVQFuprPdgajqeTneZUYCiRYMnjp81n0MDn1lMhdoMqvaIcs1vfUY6cBxlfrn V/g/E7d/llInjXSlzX/ii0sjezfIFou9qZxo+i0q5tZhg7ND3O9Fh0nmCIfwpTAG2hKb vvOQ==
X-Gm-Message-State: AHYfb5h7zzDXXEtb+6OPFbBiZqSBKUgf1r1lYLNnNyLUa7N6sPK+npAN YCeWKKj2kO7R/NfVPx8=
X-Received: by 10.202.55.7 with SMTP id e7mr7546875oia.220.1502258128790; Tue, 08 Aug 2017 22:55:28 -0700 (PDT)
Received: from ssmac.local (ip68-100-96-187.dc.dc.cox.net. [68.100.96.187]) by smtp.gmail.com with ESMTPSA id w134sm3477596oif.32.2017.08.08.22.55.27 for <ideas@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 08 Aug 2017 22:55:28 -0700 (PDT)
To: ideas@ietf.org
References: <CAG-CQxpxDXxLXdu0a2GdBRfTFLM_C+jqCz58HoNim52C7Yzr8g@mail.gmail.com> <CALx6S35qzym9quRRdv-TFDJW-hRXe+iGi8Db5T16JD8mExbr4w@mail.gmail.com> <CAG-CQxoWTrhhTD7gOyceDn+WEKqDfa11rqv2810Hdg028z4Ygg@mail.gmail.com> <644DA50AFA8C314EA9BDDAC83BD38A2E0E0ED16F@SJCEML703-CHM.china.huawei.com> <EC7A99B9A59C1B4695037EEB5036666B026FED52@SJCEML702-CHM.china.huawei.com> <644DA50AFA8C314EA9BDDAC83BD38A2E0E0ED3A0@SJCEML703-CHM.china.huawei.com> <EC7A99B9A59C1B4695037EEB5036666B026FF77B@SJCEML702-CHM.china.huawei.com> <CAG-CQxovAnF9Y4HWMFRndPvayTUQJZVxgZo49WWTJUEpjMm-Lw@mail.gmail.com>
From: Sam Sun <sam.sun.ietf@gmail.com>
Message-ID: <fb035b6e-9992-9b12-f0a8-7470909595da@gmail.com>
Date: Wed, 09 Aug 2017 01:55:27 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <CAG-CQxovAnF9Y4HWMFRndPvayTUQJZVxgZo49WWTJUEpjMm-Lw@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------227D57DD9FD45ED147E1378B"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/jNaF05xo3M3F0WPXY66Rn5RAICo>
Subject: Re: [Ideas] Your Input requested: Charter Proposal New Version
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Aug 2017 05:56:35 -0000

Padma,

The latest version looks good! Thanks for putting it all together.

A couple of questions need a bit clarification:

1) in the first item in "the IDEAS WG is chartered to work on...", what 
it means by "... interworking with identifier-location split protocols"?

2) In the deliverables, could we include some of chartered tasks here? 
For example,

    Requirements for identifier/locator mapping and resolution

    Requirements for identity authentication and authorization service 
(for GRIDS).


All the best,
Sam


On 8/9/17 12:35 AM, Padma Pillay-Esnault wrote:
> Hello All
>
> Here is the latest version as of 08/08/17.
>
> Please send your comments and feedback on the list.
>
>
> IDEAS: “IDentity EnAbled networkS”
>
> Proposed Charter
>
> Network solutions based on the concept of Identifier-Locator 
> separation are increasingly considered to support mobility and 
> multi-homing across heterogeneous access networks. Identifier-locator 
> separation protocols require infrastructure that allows nodes to 
> discover the network topological location(s) of its peer(s) for packet 
> delivery. A common infrastructure and protocol could be used by 
> identifier/locator protocols as well as network virtualization. 
> However, additional infrastructure and new protocol extensions are 
> needed to address new requirements that go well beyond the traditional 
> discovery service and mapping of identifier-to-location for packet 
> delivery.
>
> At the same time, end users require greater privacy for their 
> networking information and protection from outside threats, while 
> operators demand greater operational efficiency. Identity-enabled 
> networks aim to enable networking applications and services that 
> provide a high degree of privacy and control of end points over their 
> networking data, coupled with greater inherent security than provided 
> by today’s networks.
>
> To this end, the working group shall:
>
> - define and develop a common mapping system, control plane, and 
> related protocol that provide a common solution for identifier/locator 
> protocols that map identifiers to locators as well other new mapping 
> combinations as needed, as well as network virtualization protocols 
> that map virtual to physical addresses
>
> - in addition, introduce the concept of identity-identifier split and 
> new mechanisms that let endpoints dynamically change identifiers. The 
> common mapping system will include identity to identifier mappings. 
> These new functionalities may, for example, facilitate anonymity 
> through obscurity while preventing security issues that might result 
> from abuse, ensuring that information about actual endpoints and their 
> location is revealed only on a need-to-know basis.
>
> Some examples of the problem space are:
>
> - Common infrastructure and primitives: The lack of a common 
> infrastructure is a barrier for the application of common and 
> consistent basic networking policies. Likewise, mapping services and 
> infrastructure that apply to identity-identifier as well as 
> identifier-locator mappings reduces operational and deployment complexity.
>
> - Access control: Unrestricted look up on an identifier may reveal 
> information such as the locator to eavesdroppers. Today, there is no 
> way to prevent the look up of an identifier with some user defined 
> policy or finer grain rules.
>
> - Privacy:  The use of long-lived and public identifiers may be 
> desirable for looking up a peer, however it causes privacy issues as 
> well. Indeed, when identifier-location pairs can be looked up without 
> restriction, flows can be pinned by anybody to specific end systems.  
> The endpoint communications should be able to change their identifier 
> while retaining their identity and associated policies. The use of 
> temporary identifiers and access control on lookups should help 
> discourage undesired traffic and conceal sensitive network information 
> of end devices to eavesdroppers.
>
> The Identity Enabled Networks (IDEAS) working group is chartered to 
> develop a common framework that can be used by identifier-based 
> protocols and provides services to address their requirements. We 
> refer to the common framework providing the set of services as Generic 
> Identity Services (GRIDS).
>
> The working group will identify gaps and make recommendations on 
> changes needed for interactions between the framework and 
> identifier-enabled protocols.
>
> Specifically, the IDEAS WG is chartered to work on these areas for the 
> modular framework:
>
> - Definition of primitives for interworking with identifier-location 
> split protocols
>
> - Identifier/locator mapping and resolution (e.g. discovery, pub/sub, 
> multihoming, ...)
>
> - Registration and lifecycle management of identities and their 
> associated identifiers.
>
> - Identity authentication and authorization (e.g. access to framework, 
> update of information for identifiers..)
>
> - Definition and enforcement of basic networking policies (e.g. 
> ability to look up an identifier-locator pair, permit forwarding 
> traffic for particular endpoints on a per-identity basis…)
>
> - Identity and Identifier Metadata (only fixed or slow changing, e.g. 
> type)
>
> - Management aspects and Data Models where appropriate.
>
> The IDEAS WG will collaborate with other Working Groups to ensure 
> interoperability with LISP, HIP, ILA and other relevant work. 
> Furthermore, it will try to reuse technologies already developed when 
> appropriate.
>
> WG deliverables include:
>
> Generic Identity Services Framework
>
> WG sustaining/informational documents may include:
>
> These documents may not necessarily be published, but may be 
> maintained in a draft form or on a collaborative Working Group wiki to 
> support the efforts of the Working Group and help new comers:
>
> - Problem statement
>
> - Use cases
>
> - Requirements
>
> - Applications of the architecture for use cases
>
> Milestones
>
> March 2018 Adopt WG draft for the Generic Identity Services framework
>
> August 2018 WGLC for the Generic Identity Services framework
>
> December 2018 Send Generic Identity Services framework draft to the IESG
>
>
> On Tue, Aug 8, 2017 at 1:16 PM, Padmadevi Pillay Esnault 
> <padma@huawei.com <mailto:padma@huawei.com>> wrote:
>
>     Sure
>
>     However, been wondering if it is best not to be so specific in the
>     charter.
>
>     Thoughts?
>
>     Padma
>
>     *From:*Alexander Clemm
>     *Sent:* Tuesday, August 08, 2017 10:42 AM
>     *To:* Padmadevi Pillay Esnault; Tom Herbert
>     *Cc:* ideas@ietf.org <mailto:ideas@ietf.org>; Padma Pillay-Esnault
>
>
>     *Subject:* RE: [Ideas] Your Input requested: Charter Proposal New
>     Version
>
>     OK.
>
>     If we want to have a more specific list of supported mappings, it
>     may be useful to mention some of those other mappings as well – by
>     means of example, mappings between identifiers.
>
>     Thanks
>
>     --- Alex
>
>     *From:*Padmadevi Pillay Esnault
>     *Sent:* Monday, August 07, 2017 2:52 PM
>     *To:* Alexander Clemm <alexander.clemm@huawei.com
>     <mailto:alexander.clemm@huawei.com>>; Tom Herbert
>     <tom@herbertland.com <mailto:tom@herbertland.com>>
>     *Cc:* ideas@ietf.org <mailto:ideas@ietf.org>; Padma Pillay-Esnault
>     <padma.ietf@gmail.com <mailto:padma.ietf@gmail.com>>
>     *Subject:* RE: [Ideas] Your Input requested: Charter Proposal New
>     Version
>
>     Alex
>
>     My understanding is that Tom did NOT ask for removing of identity
>     concept.
>
>     He asked to make the section on common infrastructure clearer with
>     this sentence.
>
>     I agree with you that the mappings should not be restricted to 1->n
>
>     Thanks
>
>     Padma
>
>     *From:*Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of
>     *Alexander Clemm
>     *Sent:* Monday, August 07, 2017 2:34 PM
>     *To:* Padma Pillay-Esnault; Tom Herbert
>     *Cc:* ideas@ietf.org <mailto:ideas@ietf.org>
>     *Subject:* Re: [Ideas] Your Input requested: Charter Proposal New
>     Version
>
>     I am not sure we should restrict ourselves to mapping between
>     identifiers and locators.
>
>     I would at a minimum want to include mappings between identifiers,
>     and between identifiers and (for lack of a better term) groupings
>     of identifiers.
>
>     If we take out the identity concept, we should also rename the WG.
>
>     --- Alex
>
>     *From:*Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
>     Pillay-Esnault
>     *Sent:* Monday, August 07, 2017 1:28 PM
>     *To:* Tom Herbert <tom@herbertland.com <mailto:tom@herbertland.com>>
>     *Cc:* ideas@ietf.org <mailto:ideas@ietf.org>
>     *Subject:* Re: [Ideas] Your Input requested: Charter Proposal New
>     Version
>
>     Hi Tom
>
>         >
>         > To this end, the working group shall:
>         >
>         > - define a framework for the development of an
>         identifier/locator mapping
>         > system that provides a common solution for all
>         identifier/locator mapping
>         > protocols and network virtualization.
>         >
>
>         Padma,
>
>         I think this statement could be stronger and express that the
>         common
>         mapping system and protocols are expected output from WG. How
>         about
>         something like: "Define and develop a common mapping system,
>         control
>         plane, and related protocol that provide a common solution for
>         identifier/locator protocols that map identifiers to locators,
>         as well
>         as network virtualization protocols that map virtual to physical
>         addresses"
>
>     Fine with me.
>
>     Let's poll the list for consensus on this.
>
>     Thanks
>
>     Padma
>
>         Tom
>
>
>
>
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas