| draft-iab-dedr-report-00.txt | draft-iab-dedr-report.txt | |||
|---|---|---|---|---|
| Network Working Group J. Arkko | Network Working Group J. Arkko | |||
| Internet-Draft Ericsson | Internet-Draft Ericsson | |||
| Intended status: Informational T. Hardie | Intended status: Informational T. Hardie | |||
| Expires: September 11, 2020 Google | Expires: May 6, 2021 Google | |||
| March 10, 2020 | November 2, 2020 | |||
| Report from the IAB workshop on Design Expectations vs. Deployment | Report from the IAB workshop on Design Expectations vs. Deployment | |||
| Reality in Protocol Development | Reality in Protocol Development | |||
| draft-iab-dedr-report-00 | draft-iab-dedr-report-01 | |||
| Abstract | Abstract | |||
| The Design Expectations vs. Deployment Reality in Protocol | The Design Expectations vs. Deployment Reality in Protocol | |||
| Development Workshop was convened by the Internet Architecture Board | Development Workshop was convened by the Internet Architecture Board | |||
| (IAB) in June 2019. This report summarizes its significant points of | (IAB) in June 2019. This report summarizes its significant points of | |||
| discussion and identifies topics that may warrant further | discussion and identifies topics that may warrant further | |||
| consideration. | consideration. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 36 | skipping to change at page 1, line 36 | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on September 11, 2020. | This Internet-Draft will expire on May 6, 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2020 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 16 | skipping to change at page 2, line 16 | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Workshop Agenda . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Workshop Agenda . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Position Papers . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Position Papers . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. Discussions . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 4. Discussions . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 4.1. Past experiences . . . . . . . . . . . . . . . . . . . . 6 | 4.1. Past experiences . . . . . . . . . . . . . . . . . . . . 6 | |||
| 4.2. Principles . . . . . . . . . . . . . . . . . . . . . . . 7 | 4.2. Principles . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 4.3. Centralised deployment models . . . . . . . . . . . . . . 8 | 4.3. Centralised deployment models . . . . . . . . . . . . . . 8 | |||
| 4.4. Security . . . . . . . . . . . . . . . . . . . . . . . . 9 | 4.4. Security . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 4.5. Future . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 4.5. Future . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 11 | 5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 5.1. Summary of discussions . . . . . . . . . . . . . . . . . 11 | 5.1. Summary of discussions . . . . . . . . . . . . . . . . . 11 | |||
| 5.2. Actions . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 5.2. Actions . . . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 5.2.1. Potential architecture actions and outputs . . . . . 12 | 5.2.1. Potential architecture actions and outputs . . . . . 13 | |||
| 5.2.2. Potential other actions . . . . . . . . . . . . . . . 13 | 5.2.2. Potential other actions . . . . . . . . . . . . . . . 13 | |||
| 5.3. Other publications . . . . . . . . . . . . . . . . . . . 13 | 5.3. Other publications . . . . . . . . . . . . . . . . . . . 13 | |||
| 5.4. Feedback . . . . . . . . . . . . . . . . . . . . . . . . 13 | 5.4. Feedback . . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
| 6. Informative References . . . . . . . . . . . . . . . . . . . 13 | 6. Informative References . . . . . . . . . . . . . . . . . . . 13 | |||
| Appendix A. Particant List . . . . . . . . . . . . . . . . . . . 16 | Appendix A. Particant List . . . . . . . . . . . . . . . . . . . 17 | |||
| Appendix B. Acknowledgements . . . . . . . . . . . . . . . . . . 17 | Appendix B. Acknowledgements . . . . . . . . . . . . . . . . . . 18 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18 | |||
| 1. Introduction | 1. Introduction | |||
| The Design Expectations vs. Deployment Reality in Protocol | The Design Expectations vs. Deployment Reality in Protocol | |||
| Development Workshop was convened by the Internet Architecture Board | Development Workshop was convened by the Internet Architecture Board | |||
| (IAB) in June 2019. This report summarizes its significant points of | (IAB) in June 2019. This report summarizes its significant points of | |||
| discussion and identifies topics that may warrant further | discussion and identifies topics that may warrant further | |||
| consideration. | consideration. | |||
| Note: While late in being submitted, this report is still an early | The background for the workshop was that during the development and | |||
| version. Comments and contributions are appreciated. We expect to | early elaboration phase for a number of protocols, there was a | |||
| call for review of the -01 version. | presumption of specific deployment models. Actual deployments have, | |||
| however, often run contrary to these early expectations when | ||||
| The background for the workshop was that a number of protocols have | economies of scale, Distributed Denial-of-Service (DDoS) attack | |||
| presumed specific deployment models during the development or early | resilience, market consolidation, or other factors have come into | |||
| elaboration of the protocol. Actual deployments have, however, often | play. These factors can result in the deployed reality being highly | |||
| run contrary to these early expectations when economies of scale, | concentrated. | |||
| DDoS resilience, market consolidation, or other factors have come | ||||
| into play. These factors can result in the deployed reality being | ||||
| highly concentrated. | ||||
| This is a serious issue for the Internet, as concentrated, | This is a serious issue for the Internet, as concentrated, | |||
| centralized deployment models present risks to user choice, privacy, | centralized deployment models present risks to user choice, privacy, | |||
| and future protocol evolution. | and future protocol evolution. | |||
| On occasion, the differences to expectations were almost immediate, | On occasion, the differences to expectations were almost immediate, | |||
| but they also occur after a significant time has passed from the | but they also occur after a significant time has passed from the | |||
| protocol's initial development. | protocol's initial development. | |||
| Examples include: | Examples include: | |||
| skipping to change at page 4, line 44 | skipping to change at page 4, line 41 | |||
| centralisation. Can centralisation be avoided? How? | centralisation. Can centralisation be avoided? How? | |||
| o Security. Are we addressing the right threats? What should we | o Security. Are we addressing the right threats? What should we | |||
| prepare ourselves for? | prepare ourselves for? | |||
| o Future. What can we do? Should we get better at predicting, or | o Future. What can we do? Should we get better at predicting, or | |||
| should we do different things? | should we do different things? | |||
| 3. Position Papers | 3. Position Papers | |||
| The following position papers were submitted to the workshop: | The following position papers were submitted to the workshop (in | |||
| alphabetical order): | ||||
| o Jari Arkko. "Changes in the Internet Threat Model" [Arkko2019] | o Jari Arkko. "Changes in the Internet Threat Model" [Arkko2019] | |||
| o Vittorio Bertola. "How the Internet Was Won and Where It Got Us" | o Vittorio Bertola. "How the Internet Was Won and Where It Got Us" | |||
| [Bertola2019] | [Bertola2019] | |||
| o Carsten Bormann. "WiFi authentication: Some deployment | o Carsten Bormann. "WiFi authentication: Some deployment | |||
| observations from eduroam" [Bormann2019] | observations from eduroam" [Bormann2019] | |||
| o Stephane Bortzmeyer. "Encouraging better deployments" | o Stephane Bortzmeyer. "Encouraging better deployments" | |||
| [Bortzmeyer2019] | [Bortzmeyer2019] | |||
| skipping to change at page 6, line 13 | skipping to change at page 6, line 13 | |||
| [Sethi2019] | [Sethi2019] | |||
| o Andrew Sullivan. "Three kinds of concentration in open protocols" | o Andrew Sullivan. "Three kinds of concentration in open protocols" | |||
| [Sullivan2019] | [Sullivan2019] | |||
| These papers are available from the IAB website [CFP] [POS]. | These papers are available from the IAB website [CFP] [POS]. | |||
| 4. Discussions | 4. Discussions | |||
| 4.1. Past experiences | 4.1. Past experiences | |||
| The workshop investigated deployment cases from WebPKI to DNSSEC, | The workshop investigated deployment cases from certificate | |||
| from BGP to NATs, from DNS resolvers to CDNs, and from IOT to instant | authorities for web connections (WebPKI) to DNS Security (DNSSEC), | |||
| from Border Gateway Protocol (BGP) to Network Address Translators | ||||
| (NATs), from Domain Name System (DNS) resolvers to Content Data | ||||
| Networks (CDNs), and from Internet of Things (IoT) systems to instant | ||||
| messaging and social media applications. | messaging and social media applications. | |||
| In many cases there was either a surprise in how technology was | In many cases there was either a surprise in how technology was | |||
| deployed, lack of sufficient adoption, or the business models | deployed, lack of sufficient adoption, or the business models | |||
| associated with chosen technologies were not in favor of broader | associated with chosen technologies were not in favor of broader | |||
| interoperability. | interoperability. | |||
| In general, the protocol designers cannot affect market forces but | In general, the protocol designers cannot affect market forces but | |||
| must work within them. But it is possible to choose, for instance, | must work within them. But there are often competing technical | |||
| whether to work to support the markets with standards that an | approaches or features that are tailored for a particular deployment | |||
| established business clearly needs, or to enable competition and | pattern. In some cases it is possible to choose whether to support, | |||
| disruption through more speculative new technology. | for instance, a clear need for an established business, a feature | |||
| designed to support collaboration among smaller players, or some kind | ||||
| of disruption through a more speculative new feature or technology. | ||||
| Themes on lessons learned include: | Lessons learned include: | |||
| o Feedback from those who deploy often comes too late. | o Feedback from those who deploy often comes too late. | |||
| o Building blocks get re-purposed in unexpected ways | o Building blocks get re-purposed in unexpected ways | |||
| o User communities come in too late. | o User communities come in too late. | |||
| o The web is getting more centralised. Counteracting this trend is | o The web is getting more centralised, and counteracting this trend | |||
| difficult. Even when there's a clear goal, such as supporting de- | is difficult. It is not necessarily clear what technical path | |||
| centralised market models, it is not necessarily clear what | leads to distributed markets and de-centralized architectures, for | |||
| technical path leads to such goals. There are also many forces | instance. | |||
| that make it easier to pursue centralised models, deployment is | ||||
| often easier in such a model, the technologists and regulators | o There are also many forces that make it easier to pursue | |||
| find more easily which parties to talk to about the topic, and so | centralised models than other ones. For instance, deployment is | |||
| on. | often easier in a centralised model. And various business and | |||
| regulatory processes work best within a small, well-defined set of | ||||
| entities that can interact with each other. This can lead to, for | ||||
| instance, regulators preferring a situation with a small number of | ||||
| entities that they can talk to, rather than a diverse set of | ||||
| providers. | ||||
| o It is important but hard to determine how useful new protocols | o It is important but hard to determine how useful new protocols | |||
| are. | are. | |||
| o It is difficult for the IETF community to interact with others, | o It is difficult for the IETF community to interact with others, | |||
| e.g., specific business sectors that need new technology (such as | e.g., specific business sectors that need new technology (such as | |||
| aviation or healthcare) or regulators. | aviation or healthcare) or regulators. | |||
| 4.2. Principles | 4.2. Principles | |||
| Several underlying principles can be observed in the example cases | Several underlying principles can be observed in the example cases | |||
| that were discussed. Deployment failures tend to be associated with | that were discussed. Deployment failures tend to be associated with | |||
| cases where interdependencies make progress difficult and there's no | cases where interdependencies make progress difficult and there's no | |||
| major advantage for early deployment. Despite persistent problems in | major advantage for early deployment. Despite persistent problems in | |||
| the currently used technology, it becomes difficult for the ecosystem | the currently used technology, it becomes difficult for the ecosystem | |||
| to switch to better technology. For instance, there are a number of | to switch to better technology. For instance, there are a number of | |||
| areas where the Internet routing protocol, BGP, is lacking, but | areas where the Internet routing protocol, BGP [RFC4271], is lacking, | |||
| success in deploying significant improvements has been lacking, for | but there has been only limited success in deploying significant | |||
| instance in the area of security. | improvements, for instance in the area of security. | |||
| Another principle appears to be first mover advantage. Several | Another principle appears to be first mover advantage. Several | |||
| equally interesting technologies have fared in very different ways, | equally interesting technologies have fared in very different ways, | |||
| depending whether there was an earlier system that provided most of | depending whether there was an earlier system that provided most of | |||
| the benefits of the new system. Again, despite potential problems in | the benefits of the new system. Again, despite potential problems in | |||
| an already deployed technology, it becomes difficult to deploy | an already deployed technology, it becomes difficult to deploy | |||
| improvements due to lack of immediate incentives and due to the | improvements due to lack of immediate incentives and due to the | |||
| competing and already deployed alternative that is proceeding forward | competing and already deployed alternative that is proceeding forward | |||
| in the ecosystem. For instance, WebPKI is very widely deployed and | in the ecosystem. For instance, WebPKI is very widely deployed and | |||
| used, but DNSSEC is not. Is this because the earlier commercial | used, but DNSSEC ([RFC4033]) is not. Is this because the earlier | |||
| adoption of WebPKI, and the initially more complex interdependencies | commercial adoption of WebPKI, the more complex interdependencies | |||
| between systems that wished to deploy DNSSEC. | between systems that wished to deploy DNSSEC, or some other reason? | |||
| The definition of success in [RFC5218] appears to a part of the | The definition of success in [RFC5218] appears to a part of the | |||
| problem. The only way to control deployments up front is to prevent | problem. The only way to control deployments up front is to prevent | |||
| wild success, but wild successes are actually what we want. And it | wild success, but wild successes are actually what we want. And it | |||
| seems very difficult to predict these successes anyway. The workshop | seems very difficult to predict these successes. | |||
| also discussed the extent to which protocol work should be controlled | ||||
| by the IETF, or the IESG. It seems unproductive to attempt to | The workshop also discussed the extent to which protocol work even | |||
| constrain deployment models, as one can only offer possibilities but | should be controlled by the IETF, or the IESG. It seems unproductive | |||
| not force anyone to use a particular possibility. | to attempt to constrain deployment models, as one can only offer | |||
| possibilities but not force anyone to use a particular possibility. | ||||
| The workshop also discussed different types of deployment patterns on | The workshop also discussed different types of deployment patterns on | |||
| the Internet: | the Internet: | |||
| o Delivering functionality over Internet as a web service. The | o Delivering functionality over Internet as a web service. The | |||
| Internet is an open and standardised system, but the service on | Internet is an open and standardised system, but the service on | |||
| top may be closed, essentially running two components of the same | top may be closed, essentially running two components of the same | |||
| service provider's software against each other over the browser | service provider's software against each other over the browser | |||
| and Internet infrastructure. Several large application systems | and Internet infrastructure. Several large application systems | |||
| have grown in the Internet in this manner, encompassing large | have grown in the Internet in this manner, encompassing large | |||
| skipping to change at page 8, line 28 | skipping to change at page 8, line 38 | |||
| Secondly, the service may be an extension beyond standard protocols, | Secondly, the service may be an extension beyond standard protocols, | |||
| leading to some questions about how well standards and user | leading to some questions about how well standards and user | |||
| expectations match. But those questions could be addressed by better | expectations match. But those questions could be addressed by better | |||
| or newer standards. But the third situation is more troubling: the | or newer standards. But the third situation is more troubling: the | |||
| service are provided in this concentrated manner due to business | service are provided in this concentrated manner due to business | |||
| patterns that make it easier for particular entities to deploy such | patterns that make it easier for particular entities to deploy such | |||
| services. | services. | |||
| The group also discussed monocultures, and their negative effect on | The group also discussed monocultures, and their negative effect on | |||
| the Internet and its stability. | the Internet and its stability and resistance to various problems and | |||
| attacks. | ||||
| Regulation may affect the Internet businesses as well. Regulation | Regulation may affect the Internet businesses as well. Regulation | |||
| can exist in multiple forms, based on economic rationale (e.g., | can exist in multiple forms, based on economic rationale (e.g., | |||
| competition law) or other factors. For instance, user privacy is a | competition law) or other factors. For instance, user privacy is a | |||
| common regulatory topic. | common regulatory topic. | |||
| 4.3. Centralised deployment models | 4.3. Centralised deployment models | |||
| Many of the participants have struggled with these trends and their | Many of the participants have struggled with these trends and their | |||
| effect on desirable characteristics of Internet systems, such as | effect on desirable characteristics of Internet systems, such as | |||
| distributed, end-to-end architecture or privacy. Yet, there are many | distributed, end-to-end architecture or privacy. Yet, there are many | |||
| business and technical drivers causing the Internet architecture to | business and technical drivers causing the Internet architecture to | |||
| become further and further centralised. | become further and further centralised. | |||
| Some observations that were made: | Some observations that were made: | |||
| o When standardising new technology, the parties involved in the | o When standardising new technology, the parties involved in the | |||
| effort may think they agree on what the goals are, but often in | effort may think they agree on what the goals are, but often in | |||
| reality are surprised in the end. For instance, with DNS-over- | reality are surprised in the end. For instance, with DNS-over- | |||
| HTTPS there were very different aspirations, some around | HTTPS (DoH, [RFC8484]) there were very different aspirations, some | |||
| improvements in confidentiality of the queries, some around | around improvements in confidentiality of the queries, some around | |||
| operational and latency improvements to DNS operations, and some | operational and latency improvements to DNS operations, and some | |||
| about shifting business and deployment models. The full picture | about shifting business and deployment models. The full picture | |||
| was not clear before the work was completed. | was not clear before the work was completed. | |||
| o In DNS, UDP-based DDOS is practical reality, and only a handful of | o In DNS, DDoS is practical reality, and only a handful of providers | |||
| providers can handle the traffic load in these attacks. | can handle the traffic load in these attacks. | |||
| The hopeful side of this issue is that there are some potential | The hopeful side of this issue is that there are some potential | |||
| answers: | answers: | |||
| o DDOS defenses do not have to come through large entities, as | o DDoS defenses do not have to come through large entities, as | |||
| layered defenses and federation also helps similarly. | layered defenses and federation also helps similarly. | |||
| o Surveillance state data capture can be fought with data object | o Surveillance state data capture can be fought with data object | |||
| encryption, and not storing all of the data in one place. | encryption, and not storing all of the data in one place. | |||
| o Web tracking can be combatted by browsers choosing to avoid the | o Web tracking can be combatted by browsers choosing to avoid the | |||
| techniques sensitive to tracking. Competition in the browser | techniques sensitive to tracking. Competition in the browser | |||
| market may help drive some of these changes. | market may help drive some of these changes. | |||
| o Open interfaces help guard against the bundling of services in one | o Open interfaces help guard against the bundling of services in one | |||
| skipping to change at page 9, line 36 | skipping to change at page 9, line 47 | |||
| o Commercial surveillance does not seem to be curbed by current | o Commercial surveillance does not seem to be curbed by current | |||
| means. But there are still possibilities, such as stronger | means. But there are still possibilities, such as stronger | |||
| regulation, data minimisation, or browsers acting on behalf of | regulation, data minimisation, or browsers acting on behalf of | |||
| users. There are hopeful signs that at least some browsers are | users. There are hopeful signs that at least some browsers are | |||
| becoming more aggressive in this regard. But more is needed. | becoming more aggressive in this regard. But more is needed. | |||
| One comment made in the workshop that the Internet community needs to | One comment made in the workshop that the Internet community needs to | |||
| curb the architectural trend of centralization. Another comment was | curb the architectural trend of centralization. Another comment was | |||
| that discussing this in the abstract is not as useful as more | that discussing this in the abstract is not as useful as more | |||
| concrete, practical actions. For instance, one might imagine | concrete, practical actions. For instance, one might imagine | |||
| different DOH deployments with widely different implications for | different DoH deployments with widely different implications for | |||
| privacy or tolerance of failures. Getting to the specifics of how a | privacy or tolerance of failures. Getting to the specifics of how a | |||
| particular service can be made better is important. | particular service can be made better is important. | |||
| 4.4. Security | 4.4. Security | |||
| This part of the discussed focused on whether in the current state of | This part of the discussed focused on whether in the current state of | |||
| the Internet we actually need a new threat model. | the Internet we actually need a new threat model. | |||
| Many of the communications security concerns have been addressed in | Many of the communications security concerns have been addressed in | |||
| the past few years, with increasing encryption. However, issues with | the past few years, with increasing encryption. However, issues with | |||
| skipping to change at page 10, line 27 | skipping to change at page 10, line 41 | |||
| assumptions. Security is often poorly understood, and the | assumptions. Security is often poorly understood, and the | |||
| assumptions about who the system defends against and not are not | assumptions about who the system defends against and not are not | |||
| clear. | clear. | |||
| 4.5. Future | 4.5. Future | |||
| The workshop turned into a discussion of what actions we can take: | The workshop turned into a discussion of what actions we can take: | |||
| o Documenting our experiences? | o Documenting our experiences? | |||
| o Providing advice (to IETF, to others) | o Providing advice (to IETF or to others) | |||
| o Waiting for the catastrophe that will make people agree to | o Waiting for the catastrophe that will make people agree to | |||
| changes? (hopefully not this) | changes? The participants of course did not wish for this. | |||
| o Work at the IETF? | o Work at the IETF? | |||
| o Technical solutions/choices? | o Technical solutions/choices? | |||
| The best way for the IETF to do things is through standards; | The best way for the IETF to do things is through standards; | |||
| convincing people through other requests is difficult. The IETF | convincing people through other requests is difficult. The IETF | |||
| needs to: | needs to: | |||
| o Pick pieces that it is responsible for. | o Pick pieces that it is responsible for. | |||
| skipping to change at page 11, line 6 | skipping to change at page 11, line 20 | |||
| One key question is what other parties need to be involved in any | One key question is what other parties need to be involved in any | |||
| discussions. Platform developers (mobile platforms, cloud systems, | discussions. Platform developers (mobile platforms, cloud systems, | |||
| etc.) is one such group. Specific technology or business groups | etc.) is one such group. Specific technology or business groups | |||
| (such as email provider or certificate authority forums) are another. | (such as email provider or certificate authority forums) are another. | |||
| The workshop also discussed specific technology issues, for instance | The workshop also discussed specific technology issues, for instance | |||
| around IOT systems. One observation in those systems is that there | around IOT systems. One observation in those systems is that there | |||
| is no single model for applications, they vary. There are a lot of | is no single model for applications, they vary. There are a lot of | |||
| different constraints in different systems and different control | different constraints in different systems and different control | |||
| points. What is needed perhaps most today is user control and | points. What is needed perhaps most today is user control and | |||
| transparency (for instance, via MUD descriptions). Another issue is | transparency (for instance, via Manufacturer Usage Descriptions | |||
| management, particularly for devices that could be operational for | (MUDs, [RFC8520])). Another issue is management, particularly for | |||
| decades. Given the diversity of IOT systems, it may also make more | devices that could be operational for decades. Given the diversity | |||
| sense to build support systems for the broader solutions that | of IOT systems, it may also make more sense to build support systems | |||
| specific solutions or specific protocols. | for the broader solutions that specific solutions or specific | |||
| protocols. | ||||
| There are also many security issues. While some of them are trivial | There are also many security issues. While some of them are trivial | |||
| (such as default passwords), one should also look forward and be | (such as default passwords), one should also look forward and be | |||
| prepared to have solutions for, say, trust management for long time | prepared to have solutions for, say, trust management for long time | |||
| scales, or be able to provide data minimization to cut down on | scales, or be able to provide data minimization to cut down on | |||
| potential for leakages. And the difficulty of establishing peer-to- | potential for leakages. And the difficulty of establishing peer-to- | |||
| peer security strengthens the need for a central point, which may | peer security strengthens the need for a central point, which may | |||
| also be harmful from a long-term privacy perspective. | also be harmful from a long-term privacy perspective. | |||
| 5. Conclusions | 5. Conclusions | |||
| skipping to change at page 12, line 35 | skipping to change at page 13, line 5 | |||
| DNS, and regulatory reactions and their possible consequences. | DNS, and regulatory reactions and their possible consequences. | |||
| 5.2. Actions | 5.2. Actions | |||
| The prime conclusion from the workshop was that the topic is not | The prime conclusion from the workshop was that the topic is not | |||
| completed in the workshop. Much more work is needed. The best way | completed in the workshop. Much more work is needed. The best way | |||
| for the IETF to make an impact is through standards. The IETF should | for the IETF to make an impact is through standards. The IETF should | |||
| focus on the parts that it is responsible for, and be available as an | focus on the parts that it is responsible for, and be available as an | |||
| expert on other discussions. | expert on other discussions. | |||
| 5.2.1. Potential architecture actions and outputs | ||||
| The documents/outputs and actions described in the following were | The documents/outputs and actions described in the following were | |||
| deemed relevant by the participants. | deemed relevant by the participants. | |||
| 5.2.1. Potential architecture actions and outputs | o Develop and document a modern threat model. | |||
| o Develop and document a modern threat model | ||||
| o Continue discussion of consolidation/centralisation issues | o Continue discussion of consolidation/centralisation issues. | |||
| o Document architectural principles, e.g., (re-)application of the | o Document architectural principles, e.g., (re-)application of the | |||
| end-to-end principle | end-to-end principle. | |||
| The first receiver of these thoughts is the IETF and protocol | The first receiver of these thoughts is the IETF and protocol | |||
| community, but combined with some evangelising & validation elsewhere | community, but combined with some evangelising & validation | |||
| elsewhere. | ||||
| 5.2.2. Potential other actions | 5.2.2. Potential other actions | |||
| o Pursue specific IETF topics, e.g., work on taking into account | o Pursue specific IETF topics, e.g., work on taking into account | |||
| reputation systems in IETF work, working to ensuring certificate | reputation systems in IETF work, working to ensuring certificate | |||
| scoping can be appropriately limited, building end-to-end | scoping can be appropriately limited, building end-to-end | |||
| encryption tools for applications, etc. | encryption tools for applications, etc. | |||
| o General deployment experiences/advice, and documenting deployment | o General deployment experiences/advice, and documenting deployment | |||
| assumptions possibly already in WG charters | assumptions possibly already in WG charters | |||
| skipping to change at page 15, line 41 | skipping to change at page 16, line 14 | |||
| [Reid2019] | [Reid2019] | |||
| Reid, J., "Where/Why has DNS gone wrong?", Position paper | Reid, J., "Where/Why has DNS gone wrong?", Position paper | |||
| submitted for the IAB DEDR workshop , June 2019. | submitted for the IAB DEDR workshop , June 2019. | |||
| [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC | [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC | |||
| Text on Security Considerations", BCP 72, RFC 3552, | Text on Security Considerations", BCP 72, RFC 3552, | |||
| DOI 10.17487/RFC3552, July 2003, | DOI 10.17487/RFC3552, July 2003, | |||
| <https://www.rfc-editor.org/info/rfc3552>. | <https://www.rfc-editor.org/info/rfc3552>. | |||
| [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. | ||||
| Rose, "DNS Security Introduction and Requirements", | ||||
| RFC 4033, DOI 10.17487/RFC4033, March 2005, | ||||
| <https://www.rfc-editor.org/info/rfc4033>. | ||||
| [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A | ||||
| Border Gateway Protocol 4 (BGP-4)", RFC 4271, | ||||
| DOI 10.17487/RFC4271, January 2006, | ||||
| <https://www.rfc-editor.org/info/rfc4271>. | ||||
| [RFC5218] Thaler, D. and B. Aboba, "What Makes for a Successful | [RFC5218] Thaler, D. and B. Aboba, "What Makes for a Successful | |||
| Protocol?", RFC 5218, DOI 10.17487/RFC5218, July 2008, | Protocol?", RFC 5218, DOI 10.17487/RFC5218, July 2008, | |||
| <https://www.rfc-editor.org/info/rfc5218>. | <https://www.rfc-editor.org/info/rfc5218>. | |||
| [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | |||
| Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | |||
| 2014, <https://www.rfc-editor.org/info/rfc7258>. | 2014, <https://www.rfc-editor.org/info/rfc7258>. | |||
| [RFC8170] Thaler, D., Ed., "Planning for Protocol Adoption and | [RFC8170] Thaler, D., Ed., "Planning for Protocol Adoption and | |||
| Subsequent Transitions", RFC 8170, DOI 10.17487/RFC8170, | Subsequent Transitions", RFC 8170, DOI 10.17487/RFC8170, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8170>. | May 2017, <https://www.rfc-editor.org/info/rfc8170>. | |||
| [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | ||||
| (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, | ||||
| <https://www.rfc-editor.org/info/rfc8484>. | ||||
| [RFC8520] Lear, E., Droms, R., and D. Romascanu, "Manufacturer Usage | ||||
| Description Specification", RFC 8520, | ||||
| DOI 10.17487/RFC8520, March 2019, | ||||
| <https://www.rfc-editor.org/info/rfc8520>. | ||||
| [Sethi2019] | [Sethi2019] | |||
| Sethi, M. and T. Aura, "IoT Security and the role of | Sethi, M. and T. Aura, "IoT Security and the role of | |||
| Manufacturers: A Story of Unrealistic Design | Manufacturers: A Story of Unrealistic Design | |||
| Expectations", Position paper submitted for the IAB DEDR | Expectations", Position paper submitted for the IAB DEDR | |||
| workshop , June 2019. | workshop , June 2019. | |||
| [Sullivan2019] | [Sullivan2019] | |||
| Sullivan, A., "Three kinds of concentration in open | Sullivan, A., "Three kinds of concentration in open | |||
| protocols", Position paper submitted for the IAB DEDR | protocols", Position paper submitted for the IAB DEDR | |||
| workshop , June 2019. | workshop , June 2019. | |||
| End of changes. 30 change blocks. | ||||
| 67 lines changed or deleted | 98 lines changed or added | |||
This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||