Re: [Taps] Prague agenda planning

"Aaron Falk" <aaron.falk@gmail.com> Thu, 06 July 2017 16:06 UTC

Return-Path: <aaron.falk@gmail.com>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65F9D12EC2D for <taps@ietfa.amsl.com>; Thu, 6 Jul 2017 09:06:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cwhEppsOUSxc for <taps@ietfa.amsl.com>; Thu, 6 Jul 2017 09:06:38 -0700 (PDT)
Received: from mail-qt0-x230.google.com (mail-qt0-x230.google.com [IPv6:2607:f8b0:400d:c0d::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46D48127444 for <taps@ietf.org>; Thu, 6 Jul 2017 09:06:38 -0700 (PDT)
Received: by mail-qt0-x230.google.com with SMTP id r30so6238661qtc.0 for <taps@ietf.org>; Thu, 06 Jul 2017 09:06:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=rvRLez7MLIALGmUMdfpd67os+5sYzKxyzfKt8Iz9yLk=; b=Omx+I3PB9tH6TL6XO//+SEqpPTeSFlxH/+ddYIX0j3r57dG4WuWLWOcjsm/OtLrlP0 yrPIjMUEnJ8Cjf1qvRkPMb7ec0vjQxk5UoGRcQYYcKENhZ1RtkaXIFHNgmP6/gyOPemp oyz4lRaQaER34NHgIoqam7FsJPlMON9HDH9upEYFjONw5aXvuF3GkpvnHkbRgOEP4anC i+R4TBfLXNOzLcEYdQBzPQUqme+oMZS2v8Q9kzumlO10+AejBq0qi9SxuywIeK8lj1gj JjW+lHRILNU4KH0U+gTi6WlvRsnVqVE8rU290iojneMBomUz6ZNehX2Pg0Ykre+bVx9J VOgg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=rvRLez7MLIALGmUMdfpd67os+5sYzKxyzfKt8Iz9yLk=; b=SMbuucyixQNo/zyYwWfOXWT7fYzJwIZh2MKqhZ25eTmiCiPruZ1PP33fuBWqAfWCwg r7Ke2b74eo4a+stCRjMmdyQvD0wXaELphn578lZ67KJiK26CwqhjbiKcDsscx0fuUU70 s2pz/VS0D9uCAJ4314vrEmnbMDB9rSWukS4JsK3CQUQPx598GDN2vG3PcXxhMUAPwH4X UJgvxueuO6mzHx3u0M83UEqgQITZy9mkaSLfirbqTEjAQ7j7Ko8JFrDgwSMTD1zTdWIA dJYVtmYhfgXDSZvYCY5tUfXxc+KaJEqkrPzXvGOYhVBWK9JsJMwNmajATw0zh4QFB51k awjQ==
X-Gm-Message-State: AKS2vOx/8/UkPgvtkJ7XTZZjdy3IKykN0F6asA5Z0nu8+zQqZ1JgUwZf CAsC8WJ0ChNj/FEtifs=
X-Received: by 10.200.36.70 with SMTP id d6mr54958953qtd.42.1499357197117; Thu, 06 Jul 2017 09:06:37 -0700 (PDT)
Received: from [172.19.35.226] ([72.246.0.14]) by smtp.gmail.com with ESMTPSA id f203sm405565qkb.33.2017.07.06.09.06.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Jul 2017 09:06:36 -0700 (PDT)
From: Aaron Falk <aaron.falk@gmail.com>
To: Brian Trammell <ietf@trammell.ch>
Cc: Mirja Kühlewind <mirja.kuehlewind@tik.ee.ethz.ch>, taps@ietf.org
Date: Thu, 06 Jul 2017 12:06:35 -0400
Message-ID: <B58DBE9C-1C80-45E9-9D7A-2A14EE44695B@gmail.com>
In-Reply-To: <8A83CE10-C5BC-428B-B463-EEF2C4686EE8@trammell.ch>
References: <C582EEC8-8762-4CB6-9CA3-4E5AF92C5A68@gmail.com> <3A3686B5-FF60-448E-9E13-4B493B472C6D@gmail.com> <77C2BA95-F95B-4597-9159-7D5FC4068860@gmail.com> <c28912d7-79a0-273b-8bc4-3206eb5a8bd8@kau.se> <A9D4A0BD-CFA1-471D-A2C4-9E2AED925448@gmail.com> <83292426-F72C-4B29-BF39-3567BCDBFF4C@gmail.com> <6181D4C3-5CD9-4380-BEF6-0869F2F0CF30@tik.ee.ethz.ch> <8A83CE10-C5BC-428B-B463-EEF2C4686EE8@trammell.ch>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_B5201EED-0E03-47D1-A017-BC0C0799667A_="
Content-Transfer-Encoding: 8bit
X-Mailer: MailMate (1.9.6r5356)
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/GolSzwBtBMOVNt4S9OFm-wP29gk>
Subject: Re: [Taps] Prague agenda planning
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions on Transport Services <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 16:06:40 -0000

I don’t have a preference.  I was assuming

1. frame the topic
2. look at a few applications / use cases
3. discuss / wrestle / free-for-all

but I’m also ok with

1. example 1, 2, 3
2. abstract / summarize some questions
3. discuss / wrestle / free-for-all

I’ll leave whoever wants to take the framing talk to tell me where 
they want it.  Sounds like it’ll be Brian and have it after socket 
intents & HE.  Yes?

--aaron

On 6 Jul 2017, at 11:51, Brian Trammell (IETF) wrote:

> As did I. But if we want to separate the discussions more explicitly, 
> I'm happy to throw together five minutes of slides to frame the 
> discussion in a proposal-neutral way; I think we'll need at least 
> twenty for the discussion though.
>
> Cheers,
>
> Brian
>
>> On 06 Jul 2017, at 17:20, Mirja Kühlewind 
>> <mirja.kuehlewind@tik.ee.ethz.ch> wrote:
>>
>> I believe the idea was actually to have the policy after the socket 
>> intents talk; maybe even after HE?
>>
>> Mirja
>>
>>
>>> Am 06.07.2017 um 16:56 schrieb Aaron Falk <aaron.falk@gmail.com>:
>>>
>>> Updated. Still need a policy framing preso (#4) and timing.
>>>
>>> 	• Minimal Set of Transport Services for TAPS Systems, Naeem 
>>> Khademi (presenting for authors)
>>>
>>> 		• draft-gjessing-taps-minset-05.txt
>>> 		• What’s new: the abstract API
>>> 	• Transport Security Protocol Survey, Tommy Pauly
>>>
>>> 		• At the meeting in Chicago, the question of how security 
>>> protocols should be handled was brought up, and we suggested writing 
>>> a draft to do a survey of Transport Security protocols, similar to 
>>> the work done in RFC 8095 and the transport usage drafts. This 
>>> document goes over several common transport security protocols and 
>>> analyzes their features and interfaces, particularly with regards to 
>>> how they interact with their associated transport protocols and 
>>> applications. For consideration as a TAPS working group doc.
>>> 		• draft-pauly-taps-transport-security-00.txt: The common 
>>> features/interface presented by various security protocols
>>> 		• draft-kuehlewind-taps-crypto-sep-00.txt: The ability to 
>>> separate security handshakes from data encryption
>>> 	• Application- & System-Specified Policy & TAPS, [[XX someone 
>>> needs to frame this topic. who? Brian? Tommy? XX]]
>>>
>>> 	• Socket Intents, Concepts & Communication Granularity, Phillipp 
>>> Tiesel
>>>
>>> 		• Socket Intents allow applications to share their knowledge 
>>> about upcoming communication and express their performance 
>>> preferences in an API independent way. Therefore, thy can be used by 
>>> an OS/API to gain enough knowledge to perform access as well as 
>>> transport protocol selection and tuning.
>>> 		• draft-tiesel-taps-socketintents-00.txt: concepts
>>> 		• draft-tiesel-taps-communitgrany-00.txt: endpoint and path 
>>> selection
>>> 		• draft-tiesel-taps-socketintents-bsdsockets-00.txt: prototype
>>> 	• Happy Eyeballs update, Anna Brunstrom
>>>
>>> 		• draft-grinnemo-taps-he-03.txt
>>> 		• The interface between the HE algorithm and the policy 
>>> management
>>> 		• What should be detailed in the specification of the HE 
>>> algorithm and what should be left open for implementation?
>>> _______________________________________________
>>> Taps mailing list
>>> Taps@ietf.org
>>> https://www.ietf.org/mailman/listinfo/taps
>>
>> _______________________________________________
>> Taps mailing list
>> Taps@ietf.org
>> https://www.ietf.org/mailman/listinfo/taps