Live Streaming of the IETF 88 Technical Plenary
IAB Chair <iab-chair@iab.org> Tue, 29 October 2013 13:10 UTC
Return-Path: <iab-chair@iab.org>
X-Original-To: ietf-announce@ietfa.amsl.com
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5216721E80CA for <ietf-announce@ietfa.amsl.com>; Tue, 29 Oct 2013 06:10:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hn+Bg+Tok1Ks for <ietf-announce@ietfa.amsl.com>; Tue, 29 Oct 2013 06:10:23 -0700 (PDT)
Received: from mail.amsl.com (mail.amsl.com [64.170.98.21]) by ietfa.amsl.com (Postfix) with ESMTP id EE38921E80B4 for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:10:22 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c9a.amsl.com (Postfix) with ESMTP id D85B9A61A7 for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:08:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c9a.amsl.com ([127.0.0.1]) by localhost (c9a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gWoJAPbdd-Ze for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:08:23 -0700 (PDT)
Received: from [192.168.253.214] (209-252-239-2.ip.mcleodusa.net [209.252.239.2]) by c9a.amsl.com (Postfix) with ESMTPSA id E28D1A619F for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:08:21 -0700 (PDT)
From: IAB Chair <iab-chair@iab.org>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Subject: Live Streaming of the IETF 88 Technical Plenary
Date: Tue, 29 Oct 2013 09:10:08 -0400
Message-Id: <87879E7D-A55B-4A88-80B8-B503C89E52CB@iab.org>
To: IETF Announce <ietf-announce@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ietf@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Oct 2013 13:10:44 -0000
The Technical Plenary session is expected to be popular. It will be held on Wednesday, 6 Nov 2013 at 0900 PST, and the agenda is below. Reporting will be kept to a minimum so that the bulk of the session can be dedicated to the technical topic. We have arranged three speakers, but we expect a very lively open mic discussion to follow. To help make this session available to everyone, even people that cannot be in Vancouver, we have decided to live stream the plenary session. You can watch the technical plenary at: www.ietf.org/live On behalf of the IAB, Russ Housley IAB Chair = = = = = = = = = = 1. IAB Chair Report 2. IRTF Chair Report 3. RSE and RSOC Chair Report 4. Technical Topic: Internet Hardening New reports of large-scale Internet traffic monitoring appear almost every day. We were all aware that targeted interception was taking place, but the scale and scope in the recent reports is surprising. Such scale was not envisaged during the design of many Internet protocols; the threat is quite different than expected. Now, the Internet community must consider the consequences. While details of these attack techniques remain largely unknown, we can talk about possible ways to harden the Internet in light of pervasive Internet monitoring. We can take a closer look at our protocols and the security properties that they provide. A panel will summarize recent discussions and suggest potential IETF actions to make large-scale monitoring more difficult. a. Introduction (Bruce Schneier) What we know and what we do not know. b. Earlier IETF Debates (Brian Carpenter) The IETF has several cornerstone documents about Internet security and privacy, including RFCs 1984, 3365, 2804, and 6973. c. Potential IETF Activities (Stephen Farrell) Summary of the discussion on the perpass mailing list. 5. Open Mic