[Network-tokens] New Non-WG Mailing List: network-tokens

IETF Secretariat <ietf-secretariat@ietf.org> Tue, 23 June 2020 17:24 UTC

Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: network-tokens@ietf.org
Delivered-To: network-tokens@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C7263A0873; Tue, 23 Jun 2020 10:24:11 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: IETF Announcement List <ietf-announce@ietf.org>
Cc: tom.herbert@intel.com, network-tokens@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.4.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: ietf@ietf.org
Message-ID: <159293305063.23419.16790868691684987754@ietfa.amsl.com>
Date: Tue, 23 Jun 2020 10:24:11 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/network-tokens/JKfZmwKrMizx035z_FuZ4myxtjc>
Subject: [Network-tokens] New Non-WG Mailing List: network-tokens
X-BeenThere: network-tokens@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Discussion list for network tokens <network-tokens.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/network-tokens>, <mailto:network-tokens-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/network-tokens/>
List-Post: <mailto:network-tokens@ietf.org>
List-Help: <mailto:network-tokens-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/network-tokens>, <mailto:network-tokens-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jun 2020 17:24:11 -0000

A new IETF non-working group email list has been created.

List address: network-tokens@ietf.org
Archive: https://mailarchive.ietf.org/arch/browse/network-tokens/
To subscribe: https://www.ietf.org/mailman/listinfo/network-tokens

Purpose:
Network tokens is a method for endpoints to explicitly and securely coordinate with networks about how their traffic is treated. They are inserted by endpoints in existing protocols, interpreted by trusted networks, and may be signed or encrypted to meet security and privacy requirements. Network tokens provide a means for network operators to expose datapath services (such as a zero-rating service, a user-driven QoS service, or a firewall whitelist), and for end users and application providers to access such services. Network tokens are inspired and derived by existing security tokens (like JWT and CWT), borrowing several of their security and privacy properties, and adjusting them for use in a networking context.


The goal of this list is to discuss network tokens, interact with other working groups, and decide next steps (e.g., BoF proposal). 
An I-D exists here: https://datatracker.ietf.org/doc/draft-yiakoumis-network-tokens/
a WebRTC/Jitsi client implementation for network tokens is available here: https://github.com/network-tokens/webrtc
A network implementation of network tokens is available here: https://github.com/network-tokens/ntf

This list belongs to IETF area: TSV

For additional information, please contact the list administrators.