[IPsec] IPsecME WG Agenda for IETF 117

Tero Kivinen <kivinen@iki.fi> Wed, 19 July 2023 14:15 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D75BC151535 for <ipsec@ietfa.amsl.com>; Wed, 19 Jul 2023 07:15:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=iki.fi
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o9PsT0kHugz6 for <ipsec@ietfa.amsl.com>; Wed, 19 Jul 2023 07:15:17 -0700 (PDT)
Received: from lahtoruutu.iki.fi (lahtoruutu.iki.fi [185.185.170.37]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86CE7C151520 for <ipsec@ietf.org>; Wed, 19 Jul 2023 07:15:17 -0700 (PDT)
Received: from fireball.acr.fi (fireball.kivinen.iki.fi [IPv6:2001:1bc8:100d::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: kivinen@iki.fi) by lahtoruutu.iki.fi (Postfix) with ESMTPSA id 4R5dBW4Bx9z49Py8 for <ipsec@ietf.org>; Wed, 19 Jul 2023 17:15:15 +0300 (EEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=lahtoruutu; t=1689776115; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=R4R50SaQv71cN/F6phjZiHCvM8Wt+Obw12TB+GUrMC4=; b=QD+0HmCLOfFhPCoMBddgrJesm+GloA08yCpHvok+eevx5VAbOrpovbW3p8o4qE5rfwaDAZ YTsiMPqQ58KEIIQBDhgumcYKBeVihdIEpvOYS317lCunrw9WaVfy/MO6Alg5oiMhMSrTna TK0d9JWwbIk/lQJ8C18QNIyvNEJCuy23w3kti2su9TYaPbBz2V0ZAV+eF9DdWsDW1Be6fi c48giZ1eLRjBn4lo5QLHcl0WXLj9loACVlzszZBXmA7oriU/oy6nlIhM7SysNcNRzy9ktz j0I9mI6gwG4QU6bOp3d2FQbYJrkwqSm4k8oAQv4/rmZnF45ry0hTXcpfeeMj+A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=lahtoruutu; t=1689776115; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=R4R50SaQv71cN/F6phjZiHCvM8Wt+Obw12TB+GUrMC4=; b=etaEi2xUHthx8VbE1Q3iOGUgDqr/NDiWIqMeKyMlrSM22H3amX/LxiL4XI3HzlJGPggTrg EqGJiz/jOEbORlIIMFPxDInZQhyWkZ7TvhFWZuP6VUapzJh1fJCe9Auq+T0mWSkYwYu+zs AbLMOBTe5zxW1pRQLKkPvBGjVPr5PWbO7OJYHueJBOSzohdfqomCprOb8ucAPpnJq9OLhz UJ0kzF3BdmePvJiu2XJgxeokPPvKDPMl8nJONxtSnvQ62/t0x1gdXuHOK8gKLrSs59E6hF 1Wf6k+QTU1/o/ubnHJiZHyYAWJIjSi/aEl0CLTwzuKXLNPwCPH0VTqBskLluZA==
ARC-Authentication-Results: i=1; ORIGINATING; auth=pass smtp.auth=kivinen@iki.fi smtp.mailfrom=kivinen@iki.fi
ARC-Seal: i=1; s=lahtoruutu; d=iki.fi; t=1689776115; a=rsa-sha256; cv=none; b=aXq4RLRWOQ3T5yiN2ig5o1cqITl2lwXo3ORYLLHFoVq5tU8ZPXbqXr+LjIviyjOnD/8OcW 1XkyWG7/Qu+bc870HCwR+j/jNrQrrT2hD27VELhZ0YDZ0N05+Wi2yV9xOLCbSzMD0AvfrP mPEOhFzZc/AAa8ZdB/PX0XkQOSwmWN4KdqU4CoeZpvulgTAXv3OrsVCBRpPmMkpjiCXOUA DF3cvnYmb8GNEtQ334zYMHvV/UwWNtBRjmJRShwZqohqh1KcYBLs1MOMITyY6fLMXar6jf 9guFR7+scKYYnV9xwYytsTRkW1bdSLN6l9Wvk7C7qOiEk3vIBoqUST44Iy8P3A==
Received: by fireball.acr.fi (Postfix, from userid 15204) id 2CDC025C1310; Wed, 19 Jul 2023 17:15:15 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <25783.61427.151853.262720@fireball.acr.fi>
Date: Wed, 19 Jul 2023 17:15:15 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: ipsec@ietf.org
In-Reply-To: <25777.15788.919953.653615@fireball.acr.fi>
References: <25777.15788.919953.653615@fireball.acr.fi>
X-Mailer: VM 8.2.0b under 26.3 (x86_64--netbsd)
X-Edit-Time: 1 min
X-Total-Time: 0 min
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/bStBIcg_x8_LM_Rf51vhj-vIov4>
Subject: [IPsec] IPsecME WG Agenda for IETF 117
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2023 14:15:24 -0000

Tero Kivinen writes:
> It seems our agenda is already full. I would like to get slides for
> all presentation during next week, i.e. before the 14th Friday
> evening.

Updated version of the agenda, with some presentator changed:
----------------------------------------------------------------------
IP Security Maintenance and Extensions (IPsecME) WG.

IETF 117 - Wednesday July 28th, 2023 15:30-17:00 PDT
https://meetings.conf.meetecho.com/ietf117/?group=ipsecme&short=&item=1

Agenda

- Note Well, technical difficulties and agenda bashing - 
  Chairs (5 min)
- Document Status -
  Chairs (10 min)
- Other items
  - IKEv2 Optional SA&TS Payloads in Child Exchange (15 min)
    Paul Wouters <paul@nohats.ca>
    draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt
  - An RPKI and IPsec-based AS-to-AS Approach for
    Source Address Validation (10 min)
    Ben Schwartz <bemasc@meta.com>
    draft-xu-ipsecme-risav
  - Traffic Selector for IKEv2 to add support DSCP (5 min)
    Daniel Migault <daniel.migault@ericsson.com>
    draft-mglt-ipsecme-ts-dscp
  - IKEv2 Link Maximum Atomic Packet and Packet Too Big
    Notification Extension (5 min)
    Daniel Migault <daniel.migault@ericsson.com>
    draft-liu-ipsecme-ikev2-mtu-detect
  - Diet ESP: ESP Header compression, IKEv2 EHC (5 min)
    Daniel Migault <daniel.migault@ericsson.com>
    draft-mglt-ipsecme-ikev2-diet-esp-extension
    draft-mglt-ipsecme-diet-esp
  - Anti-replay sequence number subspaces for traffic-engineered
    paths and multi-core processing (10 min)
    Mohsin Shaikh <mohsisha@cisco.com>
    draft-ponchon-ipsecme-anti-replay-subspaces
  - Use of Reliable Transport in the IKEv2 (10 min)
    Valery Smyslov <smyslov.ietf@gmail.com>
    draft-smyslov-ipsecme-ikev2-reliable-transport
  - Problem statements and uses cases for lightweight Child Security
    Associations (10 min)
    Steffen Klassert <steffen.klassert@secunet.com>
    draft-mrossberg-ipsecme-multiple-sequence-counters
- Adoption calls (5 min)
  - draft-smslov-ipsecme-ikev2-qr-alt
  - draft-mglt-ipsecme-ts-dscp
  - draft-liu-ipsecme-ikev2-mtu-dect
  - draft-mglt-ipsecme-diet-esp
  - draft-mglt-ipsecme-ikev2-diet-esp-extension
  - draft-smyslov-ipsecme-ikev2-cookie-revised
- AOB + Open Mic (0 min)
-- 
kivinen@iki.fi