Re: [Model-t] Meeting to discuss how (and if) to continue

Mallory Knodel <mknodel@cdt.org> Wed, 03 November 2021 14:46 UTC

Return-Path: <mknodel@cdt.org>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 618523A1575 for <model-t@ietfa.amsl.com>; Wed, 3 Nov 2021 07:46:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.428
X-Spam-Level:
X-Spam-Status: No, score=-5.428 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-3.33, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cdt.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s1bhM7vOu9DT for <model-t@ietfa.amsl.com>; Wed, 3 Nov 2021 07:46:21 -0700 (PDT)
Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08F983A1574 for <model-t@iab.org>; Wed, 3 Nov 2021 07:46:21 -0700 (PDT)
Received: by mail-qk1-x733.google.com with SMTP id bl12so2457428qkb.13 for <model-t@iab.org>; Wed, 03 Nov 2021 07:46:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cdt.org; s=google; h=message-id:date:mime-version:user-agent:content-language:to:cc :references:from:subject:in-reply-to; bh=ydL9RUfNXiPN8045gTY1kXBklDRP8tG3rTR1/RS001Y=; b=tA+9aqYPDDU/qvuQjQDpUA8dwnaXifyy9qUb3VK/ef3KDINElZE4HSolOaWvVBiA5C 0UXEZaUZVln3ZefHedTm03/J9zmA/kJxA5E3j7uIjboFSAAwBgPk3uG3Fmvmi2fSM3jn f8/RoiuJKTw8Ck9sMo/vKhP/oxhYYlFXEYGk4=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent :content-language:to:cc:references:from:subject:in-reply-to; bh=ydL9RUfNXiPN8045gTY1kXBklDRP8tG3rTR1/RS001Y=; b=wRMP7TG5wn+YVGZPKGNp7ACSBZpbQLwPwnVkRHvWhMuIVKTUInq81Q5i6CY7B8RBvJ MOILKRm3sFs1GcC9PDHEh7BRylmlGb56mRQ+V8ZTo3ORUQ4xo+pDzO4VDTiJkTzGX0De RsR2vSiN0J309Z06rJTX+Qy7yoi6E7gttVNwYh+7d1KlZO+gXn2CjAagQbJezTqWfEmB qi1gfuND3GwzzbetrCrhNUEBVPjWO28yI4Ex1o0zvtJgesZ/7Phc0T4Uy5onNqjZjZsc 2kTaXf5pBwWSrCmdufIPDrQom4gW0YXJLzqAcBd1A8e3i6kWOT61psTZIeiFRkKs86MV EAvA==
X-Gm-Message-State: AOAM530UCPrvf5kkpxyczK14YhPOhDMLP0HpXSanE1n0O10Tx+Pl+e0q 0Q0nlxmVKhwFA8PkQpzGHbF5NQ==
X-Google-Smtp-Source: ABdhPJyfsxJzD1ExL8MiPsDbkd2dcaJNTOZJ2kkB/nrr+CkbzKKEOqmwTH34YZCaChjABuCUvT1rcQ==
X-Received: by 2002:a05:620a:2686:: with SMTP id c6mr36607104qkp.223.1635950779149; Wed, 03 Nov 2021 07:46:19 -0700 (PDT)
Received: from ?IPV6:2601:14d:8300:c190:b817:cfd5:9c88:9cc4? ([2601:14d:8300:c190:b817:cfd5:9c88:9cc4]) by smtp.gmail.com with ESMTPSA id f10sm1685440qkp.135.2021.11.03.07.46.18 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 03 Nov 2021 07:46:18 -0700 (PDT)
Content-Type: multipart/alternative; boundary="------------Zs0f3xA91Pz0iw5SEysyvXRm"
Message-ID: <f9247a90-8cad-9f9f-b366-76c44a274d32@cdt.org>
Date: Wed, 03 Nov 2021 10:46:16 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:94.0) Gecko/20100101 Thunderbird/94.0
Content-Language: en-US
To: Jari Arkko <jari.arkko@piuha.net>, model-t@iab.org
Cc: Russ White <russ@riw.us>
References: <6F924A7E-2119-41EB-A9EE-12881CE94C60@piuha.net>
From: Mallory Knodel <mknodel@cdt.org>
In-Reply-To: <6F924A7E-2119-41EB-A9EE-12881CE94C60@piuha.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/X3cxlhCdmHkIW_NiT_8p6p0Op4E>
Subject: Re: [Model-t] Meeting to discuss how (and if) to continue
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Nov 2021 14:46:25 -0000

Hi Jari and all,

Thanks for starting this conversation. I agree that it's an important 
topic to keep open but that the options on how to proceed aren't clear. 
Maybe a synchronous session would be the best way to figure it out.

I'm available at the day/time you mention but am also open to exploring 
other options if not everyone is keen to hold it on a US holiday,

-Mallory

On 11/3/21 8:18 AM, Jari Arkko wrote:
> Hi,
>
> We’ve obviously not made much progress. This was discussed in previous IABOPEN session meeting in the summer, the IAB also discussed it subsequently.
>
> We could discuss why…. and have to some extent. Long story short, my opinion is that has been due to leadership problem (i.e., me) of not organising the group even to have meeting, despite fairly broad set of contributions. Secondly, in hindsight the original decision to focus on RFC 3552 updates may have been a mistake. IAB activities tend to do well on writing about architectural trends, principles to follow, etc, as we’ve seen with for instance RFCs 8546, 8558 or 8890. Thirdly, IAB activities other than one-time workshops are best done as something where there’s a strong drive and participation from IAB member(s), kind of as an extension of IAB helping to complete something, preferably something very specific.
>
> But we could also discuss what to do now, if anything. I personally still believe this is an important topic, perhaps one of the most important ones in the Internet, at least from my perspective. The question is perhaps how. The good things are that we do have plenty of contributions, we have interested people, we’ve also heard offers from volunteers to help with leading efforts, and so on. But what’s the best way to organise activities, and what activities make sense to begin with? And what to focus on?
>
> If we look at the different drafts, they can in my mind be classified into (1) general observations about attacks and trends with them, (2) architectural or security principles, and (3) updates of IETF guidance in RFCs 3552, 7258, etc. All of this is interesting, but have different nature. I think it is difficult for the program to get to a final result for the third category, for instance, simply because we don’t decide that in the end. And maybe the bar for that is too high anyway. The first category is very useful, but is also very dynamic in nature. And it is unclear to me to what extent there’s research in the academic world that would document some of that. Does someone know? I have a feeling that the drafts are more examples than comprehensive surveys, so more work would be needed.
>
> But perhaps there is some room for focused progress in the second category, documenting principles. For instance, Martin’s draft (draft-thomson-tmi) is an excellent contribution that addresses “intermediaries” and when/if they need to be involved. And what principles can be applied to ensure the involvement of intermediaries is done in reasonable manner. His concept is broader than middle boxes, by the way, covering even things like routers. I think this might be a potential direction for useful work, documenting principles such as those in Martin’s document. FWIW, I’m not suggesting that we must limit ourselves to that specific document — for instance, I think it would be useful to also discuss the role end-to-end services and how sharing of data with them can be done in a reasonable manner :-) But Martin’s document is certainly the one that in my mind is clearest and furthest ahead in this direction.
>
> Anyway, if we were to focus on more actionable architectural advice, then maybe it would be easier to see what we could do together. For instance, perhaps we could re-define model-t to work on 1-2 specific pieces of advice expressed as principles to follow. I’d personally be happy to work on that or help guide a document forward.
>
> But these are just my opinions. What do others think?
>
> Perhaps it would be useful to discuss this on a call, and also to review documents in light of the above. I’d tentative suggest the following time slot for the meeting: Thursday Nov 25th, 22:00 Paris time, for one hour. This is Thursday Nov 25th, 13:00 San Francisco and Friday Nov 26th, 08:00 Melbourne. Would this be a reasonable time, or do people see major conflicts? If I don’t hear loud objections in the next couple of days, I will set up the call and send a calendar invite.
>
> See below for a list of drafts related to the model-t discussions and my slide deck about the model-t situation from the summer IAB discussions.
>
> Jari
>
> ——
>
> draft-arkko-arch-internet-threat-model-guidance	
> draft-arkko-arch-internet-threat-model	
> draft-mcfadden-smart-endpoint-taxonomy-for-cless	
> draft-lazanski-smart-users-internet	
> draft-arkko-farrell-arch-model-t	
> draft-lazanski-users-threat-model-t	
> draft-lazanski-protocol-sec-design-model-t	
> draft-mcfadden-smart-threat-changes	
> draft-thomson-tmi	
> draft-arkko-farrell-arch-model-t-7258-additions	
> draft-arkko-farrell-arch-model-t-3552-additions	
> draft-arkko-farrell-arch-model-t-redux	
> draft-arkko-iab-data-minimization-principle
>
>
-- 
Mallory Knodel
CTO, Center for Democracy and Technology
gpg fingerprint :: E3EB 63E0 65A3 B240 BCD9 B071 0C32 A271 BD3C C780