[saag] draft-smith-encrypted-traffic-management

"Smith, Kevin, (R&D) Vodafone Group" <Kevin.Smith@vodafone.com> Fri, 08 May 2015 15:35 UTC

Return-Path: <Kevin.Smith@vodafone.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25FE31A9034 for <saag@ietfa.amsl.com>; Fri, 8 May 2015 08:35:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EODijL7qvGEz for <saag@ietfa.amsl.com>; Fri, 8 May 2015 08:35:19 -0700 (PDT)
Received: from mail1.bemta14.messagelabs.com (mail1.bemta14.messagelabs.com [193.109.254.112]) (using TLSv1.2 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DA051A9037 for <saag@ietf.org>; Fri, 8 May 2015 08:35:18 -0700 (PDT)
Received: from [193.109.255.99] by server-8.bemta-14.messagelabs.com id 93/04-03204-5B7DC455; Fri, 08 May 2015 15:35:17 +0000
X-Env-Sender: Kevin.Smith@vodafone.com
X-Msg-Ref: server-7.tower-48.messagelabs.com!1431099316!9227264!1
X-Originating-IP: [195.232.244.134]
X-StarScan-Received:
X-StarScan-Version: 6.13.14; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 2653 invoked from network); 8 May 2015 15:35:17 -0000
Received: from mailout02.vodafone.com (HELO mailout02.vodafone.com) (195.232.244.134) by server-7.tower-48.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 8 May 2015 15:35:17 -0000
Received: from mailint01.vodafone.com (mailint01.vodafone.com [195.232.244.198]) by mailout02.vodafone.com (Postfix) with ESMTP id 3ljwhh5jNmzbdNS for <saag@ietf.org>; Fri, 8 May 2015 17:35:16 +0200 (CEST)
Received: from mailint01.vodafone.com (localhost [127.0.0.1]) by mailint01.vodafone.com (Postfix) with ESMTP id 3ljwhh4JvDzxP4y for <saag@ietf.org>; Fri, 8 May 2015 17:35:16 +0200 (CEST)
Received: from VOEXC04W.internal.vodafone.com (voexc04w.dc-ratingen.de [145.230.101.24]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mailint01.vodafone.com (Postfix) with ESMTPS id 3ljwhh4GBDzxPtN for <saag@ietf.org>; Fri, 8 May 2015 17:35:16 +0200 (CEST)
Received: from VOEXC21W.internal.vodafone.com (145.230.103.126) by VOEXC04W.internal.vodafone.com (145.230.101.24) with Microsoft SMTP Server (TLS) id 14.3.224.2; Fri, 8 May 2015 17:35:16 +0200
Received: from VOEXM17W.internal.vodafone.com ([169.254.1.66]) by VOEXC21W.internal.vodafone.com ([145.230.103.126]) with mapi id 14.03.0224.002; Fri, 8 May 2015 17:35:15 +0200
From: "Smith, Kevin, (R&D) Vodafone Group" <Kevin.Smith@vodafone.com>
To: "saag@ietf.org" <saag@ietf.org>
Thread-Topic: [saag] draft-smith-encrypted-traffic-management
Thread-Index: AdCJn5fS+Xrq26bHQVW9BI8AtxFFEw==
Date: Fri, 08 May 2015 15:35:15 +0000
Message-ID: <A4BAAB326B17CE40B45830B745F70F108E0051CB@VOEXM17W.internal.vodafone.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/kTaPmmFErCcm7s2nMJGRgB-Qf0Q>
Subject: [saag] draft-smith-encrypted-traffic-management
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 May 2015 15:35:21 -0000

Dear all,

I've posted a draft on 'Network management of encrypted traffic' [1]. This follows up from the acknowledgement in both the 'Pervasive Monitoring is an attack' BCP [2] and the  IAB statement on Internet confidentiality [3] to strike a balance that allows non-intrusive network management to continue to operate. The aim of the draft is to list ways to enable this, including new work (such as SPUD) looking into the problem. As such it intends to provide privacy-aware solutions to the effects of encryption raised in [2].

All comments and feedback very welcome. Thanks for your time!

Kevin

Kevin Smith, Vodafone R&D

[1] https://datatracker.ietf.org/doc/draft-smith-encrypted-traffic-management/ 
[2] https://tools.ietf.org/html/rfc7258 
[3] https://www.iab.org/2014/11/14/iab-statement-on-internet-confidentiality/ 
[4] https://datatracker.ietf.org/doc/draft-mm-wg-effect-encrypt/