Live Streaming of the IETF 88 Technical Plenary

IAB Chair <iab-chair@iab.org> Tue, 29 October 2013 13:10 UTC

Return-Path: <iab-chair@iab.org>
X-Original-To: ietf-announce@ietfa.amsl.com
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5216721E80CA for <ietf-announce@ietfa.amsl.com>; Tue, 29 Oct 2013 06:10:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hn+Bg+Tok1Ks for <ietf-announce@ietfa.amsl.com>; Tue, 29 Oct 2013 06:10:23 -0700 (PDT)
Received: from mail.amsl.com (mail.amsl.com [64.170.98.21]) by ietfa.amsl.com (Postfix) with ESMTP id EE38921E80B4 for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:10:22 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c9a.amsl.com (Postfix) with ESMTP id D85B9A61A7 for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:08:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c9a.amsl.com ([127.0.0.1]) by localhost (c9a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gWoJAPbdd-Ze for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:08:23 -0700 (PDT)
Received: from [192.168.253.214] (209-252-239-2.ip.mcleodusa.net [209.252.239.2]) by c9a.amsl.com (Postfix) with ESMTPSA id E28D1A619F for <ietf-announce@ietf.org>; Tue, 29 Oct 2013 06:08:21 -0700 (PDT)
From: IAB Chair <iab-chair@iab.org>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Subject: Live Streaming of the IETF 88 Technical Plenary
Date: Tue, 29 Oct 2013 09:10:08 -0400
Message-Id: <87879E7D-A55B-4A88-80B8-B503C89E52CB@iab.org>
To: IETF Announce <ietf-announce@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ietf@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Oct 2013 13:10:44 -0000

The Technical Plenary session is expected to be popular.  It will be
held on Wednesday, 6 Nov 2013 at 0900 PST, and the agenda is below.
Reporting will be kept to a minimum so that the bulk of the session
can be dedicated to the technical topic.  We have arranged three
speakers, but we expect a very lively open mic discussion to follow.

To help make this session available to everyone, even people that
cannot be in Vancouver, we have decided to live stream the plenary
session.  You can watch the technical plenary at:

          www.ietf.org/live

On behalf of the IAB,
  Russ Housley
  IAB Chair

= = = = = = = = = =

1.  IAB Chair Report
2.  IRTF Chair Report
3.  RSE and RSOC Chair Report
4.  Technical Topic: Internet Hardening

    New reports of large-scale Internet traffic monitoring appear almost
    every day.  We were all aware that targeted interception was taking
    place, but the scale and scope in the recent reports is surprising.
    Such scale was not envisaged during the design of many Internet
    protocols; the threat is quite different than expected.  Now, the
    Internet community must consider the consequences.

    While details of these attack techniques remain largely unknown, we
    can talk about possible ways to harden the Internet in light of
    pervasive Internet monitoring.  We can take a closer look at our
    protocols and the security properties that they provide.

    A panel will summarize recent discussions and suggest potential IETF
    actions to make large-scale monitoring more difficult.

    a.  Introduction (Bruce Schneier)

        What we know and what we do not know.

    b.  Earlier IETF Debates (Brian Carpenter)

        The IETF has several cornerstone documents about Internet
        security and privacy, including RFCs 1984, 3365, 2804, and 6973.

    c.  Potential IETF Activities (Stephen Farrell)

        Summary of the discussion on the perpass mailing list.

5.  Open Mic