Re: [Taps] Prague agenda planning

"Aaron Falk" <aaron.falk@gmail.com> Thu, 06 July 2017 14:56 UTC

Return-Path: <aaron.falk@gmail.com>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 501CF1317A2 for <taps@ietfa.amsl.com>; Thu, 6 Jul 2017 07:56:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X7y_o80VZpk2 for <taps@ietfa.amsl.com>; Thu, 6 Jul 2017 07:56:44 -0700 (PDT)
Received: from mail-qk0-x234.google.com (mail-qk0-x234.google.com [IPv6:2607:f8b0:400d:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DC0313154C for <taps@ietf.org>; Thu, 6 Jul 2017 07:56:44 -0700 (PDT)
Received: by mail-qk0-x234.google.com with SMTP id p21so4309732qke.3 for <taps@ietf.org>; Thu, 06 Jul 2017 07:56:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=/0Cv85Jt9rgN+JmnyF0jT6lfG1fqcIleoJTs9dIj62s=; b=MXt/uTypNbWJzuVf0TD1/NcJFaICzCRILvahevOFcE3z1ckMutcq/fVrkTtxNRG88M iXYmJivo2lK3kMLy/ZUq7lQ0JUbFVCyDMPZZWPM6HOTtjiE4z4BJn2GZFrKOdw/VOMGk Bh+j1nwGVeb4lccAV3dil2VpakL+qundIbihXJODfklSLfxksaQKLN1BBuYC9GhXQgqc dtUih+jCVeOdXAwaTNu1kvO7W1s4nPrEdVPoTxjC9EAVWmePc+gv85+uxJoyxn9w0h/e tj1Q5NsFmpOh/E8Vu7jIY58c9xHHy5ob+C04d0sFx+vwKKW3wo0TVL+hJXagroyLta+q Ir0w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=/0Cv85Jt9rgN+JmnyF0jT6lfG1fqcIleoJTs9dIj62s=; b=aShjd6iH8z79gxXGuFFiiJituWH6KXv8QTDqGrEpPeyOF5/dRTcZ2HV8JDLcGhP9L3 5alWBMspWG0nLuYGDGrwZoPHmTxKdj62dSz27L+uHvMWXoo1Hdg0EKgakqXIT4Tf3M75 8cCCeJElbHppES4sidelFhX9yWiX7/0bZZ7O1lNrAele3/0+0H7PQ0bnM/Z/6ThcihrD DPUf0SSMOtG2UH9YuJ4slXqcSBH+fkjxvrs5SdhxLHqR+xq0+Izd52zoaKAFzC8Tu64H KRwTjbYsv6Z/bU7w2KZg4v+9jbipqiZJ6Y7nCdLxge7+KUGwAh0LksLidGCvaOi8zQJj rkkA==
X-Gm-Message-State: AKS2vOwwurZgXa3iyDhIpD7bk4rGvDKPoTwCcghDHhmqlBV8axGlcDC6 MTxPemc0mRUTdweKyAE=
X-Received: by 10.55.190.134 with SMTP id o128mr55357589qkf.58.1499353003412; Thu, 06 Jul 2017 07:56:43 -0700 (PDT)
Received: from [172.19.35.226] ([72.246.0.14]) by smtp.gmail.com with ESMTPSA id g25sm299491qte.57.2017.07.06.07.56.42 for <taps@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Jul 2017 07:56:42 -0700 (PDT)
From: Aaron Falk <aaron.falk@gmail.com>
To: taps@ietf.org
Date: Thu, 06 Jul 2017 10:56:42 -0400
Message-ID: <83292426-F72C-4B29-BF39-3567BCDBFF4C@gmail.com>
In-Reply-To: <A9D4A0BD-CFA1-471D-A2C4-9E2AED925448@gmail.com>
References: <C582EEC8-8762-4CB6-9CA3-4E5AF92C5A68@gmail.com> <3A3686B5-FF60-448E-9E13-4B493B472C6D@gmail.com> <77C2BA95-F95B-4597-9159-7D5FC4068860@gmail.com> <c28912d7-79a0-273b-8bc4-3206eb5a8bd8@kau.se> <A9D4A0BD-CFA1-471D-A2C4-9E2AED925448@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_D82C024A-1554-4210-BF91-C9EE4F6B01D6_="
Content-Transfer-Encoding: 8bit
X-Mailer: MailMate (1.9.6r5356)
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/vSXFw4zUJVBa_czOholWtlfKPT4>
Subject: Re: [Taps] Prague agenda planning
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions on Transport Services <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2017 14:56:46 -0000

Updated.  Still need a policy framing preso (#4) and timing.

1. **Minimal Set of Transport Services for TAPS Systems**, Naeem Khademi 
(presenting for authors)
   * `draft-gjessing-taps-minset-05.txt`
   *  What’s new: the abstract API

2. **Transport Security Protocol Survey**, Tommy Pauly
   * At the meeting in Chicago, the question of how security protocols 
should be handled was brought up, and we suggested writing a draft to do 
a survey of Transport Security protocols, similar to the work done in 
RFC 8095 and the transport usage drafts. This document goes over several 
common transport security protocols and analyzes their features and 
interfaces, particularly with regards to how they interact with their 
associated transport protocols and applications.  For consideration as a 
TAPS working group doc.
   * `draft-pauly-taps-transport-security-00.txt`: The common 
features/interface presented by various security protocols
   * `draft-kuehlewind-taps-crypto-sep-00.txt`: The ability to separate 
security handshakes from data encryption


4. **Application- & System-Specified Policy & TAPS**, [[XX someone needs 
to frame this topic.  who?  Brian? Tommy?  XX]]


3. **Socket Intents, Concepts & Communication Granularity**, Phillipp 
Tiesel
   * Socket Intents allow applications to share their knowledge about 
upcoming
communication and express their performance preferences in an API 
independent way.
Therefore, thy can be used by an OS/API to gain enough knowledge to 
perform access
as well as transport protocol selection and tuning.
   * `draft-tiesel-taps-socketintents-00.txt`: concepts
   * `draft-tiesel-taps-communitgrany-00.txt`: endpoint and path 
selection
   * `draft-tiesel-taps-socketintents-bsdsockets-00.txt`: prototype

5. **Happy Eyeballs update**, Anna Brunstrom
   * `draft-grinnemo-taps-he-03.txt`
   * The interface between the HE algorithm and the policy management
   * What should be detailed in the specification of the HE algorithm 
and what should be left open for implementation?