[OPSEC] Fwd: Reminder: Call for Papers: IAB workshop on Management Techniques in Encrypted Networks (M-TEN)

Warren Kumari <warren@kumari.net> Wed, 17 August 2022 16:37 UTC

Return-Path: <warren@kumari.net>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F2E3C1522BE for <opsec@ietfa.amsl.com>; Wed, 17 Aug 2022 09:37:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OOQMaQq0ilKY for <opsec@ietfa.amsl.com>; Wed, 17 Aug 2022 09:37:20 -0700 (PDT)
Received: from mail-io1-xd33.google.com (mail-io1-xd33.google.com [IPv6:2607:f8b0:4864:20::d33]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13AD6C1522B2 for <opsec@ietf.org>; Wed, 17 Aug 2022 09:37:19 -0700 (PDT)
Received: by mail-io1-xd33.google.com with SMTP id b142so8098058iof.10 for <opsec@ietf.org>; Wed, 17 Aug 2022 09:37:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari.net; s=google; h=to:subject:message-id:date:references:from:in-reply-to:mime-version :from:to:cc; bh=QYxyllJ3vatjTYau4T9kVwFVbD6Mize2kWfnczV/R+Y=; b=TgzZlNHXXm6FKc9pBqwHe4Ps7SfUzWC7vAQDCIHycREZ06H/mSLBBrl5c0mNZAzRVW 5wHVXQfAI+9x/e1A5Xog84tLZX+WXDMGEvbBL1ag8l696rt91ITVM5MjbAb7N+kiOZ0U 8/sJ8JvB1m6ds8KQA7/ixqg1IMnqFQE+BJFWucboishD0/PiwVYgWO4O+Gi8GsNNueeN 3jJRNukRJ4BBgPsVFT9I7RIstE/HZZmwZ4GyR/bgaAJmGSZAcLPtifN1JmLJEFMwdmEF C9qK6E6Q1aUVPh2OoIclaKaQKL6c4UFaB/chub4UcDE4LrtnwjJ8KIWEwx5NA3GD+938 HB0g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:subject:message-id:date:references:from:in-reply-to:mime-version :x-gm-message-state:from:to:cc; bh=QYxyllJ3vatjTYau4T9kVwFVbD6Mize2kWfnczV/R+Y=; b=JSgFEMBPZyuti4rBVdf3EqSeuCn5GOSeRhNShXuijWDS9bFpoHYAYvZ/YmJUvhorF1 E8Xe/xFWFSrGcvUQSlKO755BT1e7BO59o+asS8y1+WetBS2S4Q+czaJjN/yw04jjL6th 6pA0QGEGcmH0B0j4AE/MYYRmCJLJ8aDCFUSAPpkcnT0SGheFp7Skhi8f1U5lAJIl6GmR LWrXQT5HIN9soy7al5ZiMoehx5vJ+IhRvtlSSyFp3D6pZdonhB/W3VPXSIjJAMuxWDyV f6+xhO7WvAAkhza5ybzPFxYGU2kPVW4BZ5Vr254fbJ/iUSo6ZUS26H5i8DAnL0hiZYfL T3MA==
X-Gm-Message-State: ACgBeo1DeHpUGSu2o+IkHo/FWvkvl/X/BTSt4ZJlri3Sd3iskkF649UN ZvE8cyur1i4Tfy85kP2+NVepX6/6+ihVXOsTgERI3L/H8Ms=
X-Google-Smtp-Source: AA6agR4Nw+2CKoRvUOD2x9nkHHSiPSZjPNVQJRvXLTBkbpicJ4+8gZuAW5E7tw85bRV0fvJI7yV14EkZLbcfhDNQodg=
X-Received: by 2002:a5e:a70f:0:b0:684:d596:b7e7 with SMTP id b15-20020a5ea70f000000b00684d596b7e7mr10792515iod.84.1660754238619; Wed, 17 Aug 2022 09:37:18 -0700 (PDT)
Received: from 649336022844 named unknown by gmailapi.google.com with HTTPREST; Wed, 17 Aug 2022 18:37:18 +0200
Mime-Version: 1.0
X-Mailer: Superhuman Desktop (2022-08-16T23:05:51Z)
X-Superhuman-ID: l6xu6ihg.81a037a6-eeb9-420e-bc47-78192d2c4e25
X-Superhuman-Draft-ID: draft006de65f0fa088ad
In-Reply-To: <166057803959.4960.3317582921952857750@ietfa.amsl.com>
From: Warren Kumari <warren@kumari.net>
References: <166057803959.4960.3317582921952857750@ietfa.amsl.com>
Date: Wed, 17 Aug 2022 18:37:18 +0200
Message-ID: <CAHw9_iLNXKdsYXHVuoeZyaqNnoj7472ovio=1HNsfEnmOhp1Bg@mail.gmail.com>
To: opsec wg mailing list <opsec@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000073eb0205e6727a11"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/JTjZ9LSAGpDEQBhB3rsZ-Q19BYI>
Subject: [OPSEC] Fwd: Reminder: Call for Papers: IAB workshop on Management Techniques in Encrypted Networks (M-TEN)
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2022 16:37:24 -0000

Hi there all,

The IAB is organizing a workshop on Management Techniques in Encrypted
Networks (M-TEN), and I figured that this might be interesting and relevant
to many people in this WG.

Please see below for details,
W



---------- Forwarded message ----------
From: IAB Executive Administrative Manager <execd@iab.org>
Date: Monday, August 15 2022 at 11:40 AM EDT
Subject: Reminder: Call for Papers: IAB workshop on Management Techniques
in Encrypted Networks (M-TEN)
To: IETF Announcement List <ietf-announce@ietf.org>
Cc: architecture-discuss@ietf.org

IAB workshop on Management Techniques in Encrypted Networks (M-TEN)

Web page: https://www.iab.org/activities/workshops/m-ten/

User privacy and security are constantly being improved by increasingly
strong and more widely deployed encryption. This workshop aims to discuss
ways to improve network management techniques in support of even broader
adoption of encryption on the Internet.

Network management techniques need to evolve to work effectively and
reliably in the presence of ubiquitous traffic encryption and support
techniques that enhance user privacy. In an all-encrypted network, it is
not viable to rely on unencrypted metadata for network monitoring and
security functions, troubleshooting devices, and passive traffic
measurements. New approaches are needed to track network behaviors,
e.g., by directly cooperating with endpoints and applications, increasing
use of in-band telemetry, increasing use of active measurement approaches,
and privacy-preserving inference techniques.

The aim of this workshop is to provide a platform to explore the
interaction between network management and traffic encryption and initiate
new work on collaborative approaches that promote security and user privacy
while supporting operational requirements. As such the workshop aims to
address the following questions:

• What are actionable network management requirements?
• Who is willing to work on collaborative solutions?
• What are the starting points for collaborative solutions?

The following topics are considered in-scope; however, this list is non-
exhaustive:

• Actionable requirements for network management, including:
- Troubleshooting needs
- Metrics for network performance measurements
- Requirements for security functions
• Proposals or reports on improvements to network management
- Ways to support evolving, encrypted traffic better
- Measurement techniques for encrypted traffic
- New privacy-preserving active measurement methods
- Direct communication with endpoints or applications
- Secure and privacy-preserving data collection, storage, and sharing
- Adoption of encryption for the management functions themselves

Interested participants are invited to submit position papers on the
workshop topics; it may take the form of an Internet-Draft. Paper size is
not limited, but brevity is encouraged. Interested participants who have
published relevant academic papers may submit these as a position paper,
optionally with a short abstract explaining their interest and the paper’s
relevance to the workshop. The workshop itself will be focused on
discussions based on the position paper topics received.

All inputs submitted and considered relevant will be published on the
workshop website. The organizers will issue invitations based on the
submissions received. Sessions will be organized according to content, and
not every accepted submission or invited attendee will have an opportunity
to present; the intent is to foster an active discussion and not simply to
have a sequence of presentations. A workshop report covering all
submissions and the workshop discussion will be published afterwards.

The workshop will be by invitation only. Those wishing to attend should
submit a position paper to the address above topics and questions. Position
papers from those not planning to attend the workshop themselves are also
encouraged.

Please indicate your interest by submitting a research proposal by August
19, 2022 to mten-workshop-pc@iab.org

The Program Committee members are Wes Hardaker (IAB, USC/ISI), Mallory
Knodel (IAB, Center for Democracy and Technology), Mirja Kühlewind (IAB,
Ericsson), Tommy Pauly (IAB, Apple), Russ White (IAB, Juniper), Qin Wu
(IAB, Huawei).

Feel free to contact the program committee with any further questions:
mten-workshop-pc@iab.org

This workshop will be held remotely during the week of Oct 17-21, 2022,
likely supporting three 2-3h sessions spread over the week based on
submissions and the availability of the invited participants. Additionally,
an in-person wrap-up or dissemination session may be organized in
co-location with RIPE85 (Belgrade, Serbia) on Monday Oct 24 if there is
sufficient interest by the participants. Please indicate with your
submission if you are interested in this option.

Logistics

• Submissions Due: Aug 19, 2022
• Invitations Issued by: Sep 2, 2022
• Workshop Date: Oct 17-21, 2022, optionally Oct 24
• Location: Online, optionally one day Belgrade, Serbia

_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce