
From nobody Wed Jan  7 09:18:57 2015
Return-Path: <amitavabiswas0@gmail.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B53B1A005F for <nmrg@ietfa.amsl.com>; Wed,  7 Jan 2015 08:36:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.149
X-Spam-Level: 
X-Spam-Status: No, score=-1.149 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_62=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NyDFGpqOGge8 for <nmrg@ietfa.amsl.com>; Wed,  7 Jan 2015 08:36:38 -0800 (PST)
Received: from mail-pa0-x22a.google.com (mail-pa0-x22a.google.com [IPv6:2607:f8b0:400e:c03::22a]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 022EA1A006E for <nmrg@irtf.org>; Wed,  7 Jan 2015 08:36:34 -0800 (PST)
Received: by mail-pa0-f42.google.com with SMTP id et14so5856345pad.1 for <nmrg@irtf.org>; Wed, 07 Jan 2015 08:36:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:content-type; bh=IfPGmjZ4JMTRNMX7E/Z3PS4ZSmUbfzU4V4DcriyWmJM=; b=Fe89y8qLppXQCiDVXlIFN3RZz5/gTRIDwv3bdHaKnJS2BLMkXv3WrI1cSIURNLh60J K/DYLQY5ZlYBHJX3Pjdl3SpRI9NOJNe/Bk7Xb3Z8Nk2pqnoD9lDd8qzw20mVvHFTPMH+ Cg+RYd0+JmN9ysi5/Z6qMZ5YPe66ygeBmS8Pzba+GKlnZDRHxn4h8WQDNDbtVn9zzrJZ MgHMAlhUiigWmsLAq28pFP+WNB2b1fvHJ1jixmCsMi+xdzMvuEqplbB6w4XhHXOZV1Aq RuAwiCupi/771npqOQNzyH/aykfzT2s/3HiXp2iK1gNZXQNh7Y5bgW3Fnaadytje4ZW0 rnaQ==
MIME-Version: 1.0
X-Received: by 10.68.220.201 with SMTP id py9mr6861588pbc.33.1420648594027; Wed, 07 Jan 2015 08:36:34 -0800 (PST)
Received: by 10.70.80.73 with HTTP; Wed, 7 Jan 2015 08:36:33 -0800 (PST)
Date: Wed, 7 Jan 2015 08:36:33 -0800
Message-ID: <CANiKq6P1BxJm+0K55KVwa0dqhGHX0TbQooM4ycqbq+Wd8mvMPw@mail.gmail.com>
From: Amitava Biswas <amitavabiswas0@gmail.com>
To: undisclosed-recipients:;
Content-Type: multipart/alternative; boundary=047d7b2ed951cc3a22050c1286b4
Archived-At: http://mailarchive.ietf.org/arch/msg/nmrg/C6IRryEcbOgkajuZWcBsOuQCjko
X-Mailman-Approved-At: Wed, 07 Jan 2015 09:18:56 -0800
Subject: [nmrg] Cal for papers: IEEE Workshops on SDN, NFV, under NetSoft 2015, London, 13-17 Apr.
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Jan 2015 16:36:43 -0000

--047d7b2ed951cc3a22050c1286b4
Content-Type: text/plain; charset=UTF-8

Hi All,

This is a call for papers for IEEE Workshops on SDN, NFV under NetSoft 2015
IEEE conference, in London, UK, on 13-17 Apr.
The submission deadline for all workshops are Jan 31, 2015. Details are
below.

CALL FOR PAPERS
=================================================================
        IEEE NetSoft 2015 Workshops

    1st IEEE Conference on Network Softwarization
        April 13-17, 2015 - London, UK

        http://sites.ieee.org/netsoft/workshop/

    Workshop Paper Submission Deadline: January 31, 2015
=================================================================

NetSoft 2015 will be the first of a series of annual events established as
part of the IEEE Software-Defined Networks initiative of the IEEE Future
Directions Committee in order to build an IEEE-wide community in this area
across multiple IEEE societies and councils (http://sdn.ieee.org/about.html).
Software-Defined Networking (SDN), Network Function Virtualization (NFV),
and Software-Defined Clouds could be seen as different expressions of an
overall transformation trend, which is deeply impacting and Telecom and IT
industries. This trend is also transforming several other Industries, in
using "softwarization" to optimize costs and processes
and in bringing new values in infrastructures. In particular, SDN, NFV and
network programmability are creating the conditions to reinvent network and
cloud
architectures, accelerate service deployment and facilitate infrastructure
management.

NetSoft 2015 will feature 3 workshops, aiming at bringing together
researchers and practitioners to discuss issues, current state and future
trends in SDN and NFV related areas on manageability, security and 5G.

NetSoft 2015 workshops will be held on April 13 and April 17, 2015. All
workshops are currently accepting submissions of
original/position/work-in-progress/experience
papers at respective links as below. Submissions must be in IEEE 2-column
style with a length limitation of 6 pages (including title, abstract, all
figures, tables, and references). Submission instructions, important dates
and further details are available on the workshops websites as below.

Accepted and presented papers will be published in the workshop proceedings
and submitted to IEEE Xplore.

-IEEE MISSION 2015
 IEEE Workshop on Management Issues in SDN, SDI and NFV
 Website: http://sites.ieee.org/netsoft/workshop/mission/
 Submission: http://edas.info/19315
 Organizers:     Kashinath Basu, Oxford Brookes University, UK; Chen Liu,
Microsoft, US

-IEEE Soft5G 2015
 IEEE Workshop on Software Defined 5G Networks
 Website: http://www.fokus.fraunhofer.de/go/Soft5G_Workshop_2014
 Submission: http://edas.info/N19311
 Organizers:     Thomas Magedanz, TU Berlin/Fraunhofer Institute FOKUS,
Germany;    Roberto Riggio, CREATE-NET, Italy

-IEEE SEC-SDN 2015
 IEEE Workshop on Security issues in SDN
 Website: http://sites.ieee.org/netsoft/workshop/sec-sdn/
 Submission: https://edas.info/19419
 Organizers:     Olivier Festor, Telecom-Nancy, France; Radu State, SnT,
Luxembourg

Important dates:
Paper Submission: January 31, 2015
Notification of Acceptance: February 28, 2015
Camera Ready Papers: March 13, 2015

We are looking forward to your paper submission as well as you
participation at the NetSoft 2015 workshops in April 2015.

NETSOFT WORKSHOP CO-CHAIRS
Amitava Biswas, Cisco Systems, US
Noura Limam, University of Waterloo, Canada

NETSOFT GENERAL CO-CHAIRS
Prosper Chemouil, Orange Labs,
France George Pavlou, University College London,UK

IEEE SDN Initiative Chair
Antonio Manzalini, Telecom Italia, Italy

--047d7b2ed951cc3a22050c1286b4
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>Hi All,<br><br></div>This is a call for papers f=
or IEEE Workshops on SDN, NFV under NetSoft 2015 IEEE conference, in London=
, UK, on 13-17 Apr.<br></div>The submission deadline for all workshops are =
Jan 31, 2015. Details are below.<br><div><div><div><br>CALL FOR PAPERS <br>=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>=C2=A0=C2=A0=C2=A0 =C2=A0=
=C2=A0=C2=A0 IEEE NetSoft 2015 Workshops <br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=
=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 <br>=C2=A0=C2=A0=C2=A0 1st =
IEEE Conference on Network Softwarization <br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=
=A0=C2=A0 April 13-17, 2015 - London, UK<br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=
=C2=A0 <br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 <a href=3D"http://sites.ie=
ee.org/netsoft/workshop/">http://sites.ieee.org/netsoft/workshop/</a><br>=
=C2=A0<br>=C2=A0=C2=A0=C2=A0 Workshop Paper Submission Deadline:=C2=A0Janua=
ry 31, 2015<br>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D <br><br>NetSof=
t 2015 will be the first of a series of annual events established as part o=
f the IEEE Software-Defined Networks initiative of the IEEE Future Directio=
ns Committee in order to build an IEEE-wide community in this area across m=
ultiple IEEE societies and councils (<a href=3D"http://sdn.ieee.org/about.h=
tml">http://sdn.ieee.org/about.html</a>). Software-Defined Networking (SDN)=
, Network Function Virtualization (NFV), and Software-Defined Clouds could =
be seen as different expressions of an overall transformation trend, which =
is deeply impacting and Telecom and IT industries. This trend is also trans=
forming several other Industries, in using &quot;softwarization&quot; to op=
timize costs and processes <br>and in bringing new values in infrastructure=
s. In particular, SDN, NFV and network programmability are creating the con=
ditions to reinvent network and cloud <br>architectures, accelerate service=
 deployment and facilitate infrastructure management. <br><br>NetSoft 2015 =
will feature 3 workshops, aiming at bringing together researchers and pract=
itioners to discuss issues, current state and future trends in SDN and NFV =
related areas on manageability, security and 5G.<br><br>NetSoft 2015 worksh=
ops will be held on April 13 and April 17, 2015. All workshops are currentl=
y accepting submissions of original/position/work-in-progress/experience <b=
r>papers at respective links as below. Submissions must be in IEEE 2-column=
 style with a length limitation of 6 pages (including title, abstract, all =
figures, tables, and references). Submission instructions, important dates =
and further details are available on the workshops websites as below.<br><b=
r>Accepted and presented papers will be published in the workshop proceedin=
gs and submitted to IEEE Xplore.<br><br>-IEEE MISSION 2015<br>=C2=A0IEEE Wo=
rkshop on Management Issues in SDN, SDI and NFV<br>=C2=A0Website:=C2=A0<a h=
ref=3D"http://sites.ieee.org/netsoft/workshop/mission/">http://sites.ieee.o=
rg/netsoft/workshop/mission/</a><br>=C2=A0Submission: <a href=3D"http://eda=
s.info/19315">http://edas.info/19315</a><br>=C2=A0Organizers: =C2=A0=C2=A0=
=C2=A0 Kashinath Basu, Oxford Brookes University, UK; Chen Liu, Microsoft, =
US<br><br>-IEEE Soft5G 2015<br>=C2=A0IEEE Workshop on Software Defined 5G N=
etworks<br>=C2=A0Website:=C2=A0<a href=3D"http://www.fokus.fraunhofer.de/go=
/Soft5G_Workshop_2014">http://www.fokus.fraunhofer.de/go/Soft5G_Workshop_20=
14</a><br>=C2=A0Submission: <a href=3D"http://edas.info/N19311">http://edas=
.info/N19311</a><br>=C2=A0Organizers: =C2=A0=C2=A0=C2=A0 Thomas Magedanz, T=
U Berlin/Fraunhofer Institute FOKUS, Germany;=C2=A0=C2=A0=C2=A0 Roberto Rig=
gio, CREATE-NET, Italy<br><br>-IEEE SEC-SDN 2015<br>=C2=A0IEEE Workshop on =
Security issues in SDN<br>=C2=A0Website:=C2=A0<a href=3D"http://sites.ieee.=
org/netsoft/workshop/sec-sdn/">http://sites.ieee.org/netsoft/workshop/sec-s=
dn/</a><br>=C2=A0Submission: <a href=3D"https://edas.info/19419">https://ed=
as.info/19419</a><br>=C2=A0Organizers: =C2=A0=C2=A0=C2=A0 Olivier Festor, T=
elecom-Nancy, France; Radu State, SnT, Luxembourg<br><br>Important dates:=
=C2=A0 <br>Paper Submission: January 31, 2015 <br>Notification of Acceptanc=
e: February 28, 2015<br>Camera Ready Papers: March 13, 2015<br><br>We are l=
ooking forward to your paper submission as well as you participation at the=
 NetSoft 2015 workshops in April 2015.<br><br>NETSOFT WORKSHOP CO-CHAIRS<br=
>Amitava Biswas, Cisco Systems, US<br>Noura Limam, University of Waterloo, =
Canada <br><br>NETSOFT GENERAL CO-CHAIRS <br>Prosper Chemouil, Orange Labs,=
 <br>France George Pavlou, University College London,UK <br><br>IEEE SDN In=
itiative Chair<br>Antonio Manzalini, Telecom Italia, Italy=C2=A0 <br></div>=
</div></div></div>

--047d7b2ed951cc3a22050c1286b4--


From nobody Fri Jan  9 12:05:52 2015
Return-Path: <granville@inf.ufrgs.br>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 975C11A9250 for <nmrg@ietfa.amsl.com>; Fri,  9 Jan 2015 12:05:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.062
X-Spam-Level: 
X-Spam-Status: No, score=-0.062 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HELO_EQ_BR=0.955, HOST_EQ_BR=1.295, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mMcdBaLBOwDJ for <nmrg@ietfa.amsl.com>; Fri,  9 Jan 2015 12:05:44 -0800 (PST)
Received: from delivery1.ufrgs.br (delivery1.ufrgs.br [143.54.2.211]) by ietfa.amsl.com (Postfix) with ESMTP id 7F2D61A9109 for <nmrg@irtf.org>; Fri,  9 Jan 2015 12:05:41 -0800 (PST)
Received: from delivery1.ufrgs.br (localhost [127.0.0.1]) by delivery1.ufrgs.br (Postfix) with ESMTP id 3AA87301F4B for <nmrg@irtf.org>; Fri,  9 Jan 2015 18:05:38 -0200 (BRST)
Received: from msa1.ufrgs.br (msa1.ufrgs.br [143.54.2.208]) by delivery1.ufrgs.br (Postfix) with ESMTP id BA47F3D847 for <nmrg@irtf.org>; Fri,  9 Jan 2015 18:05:37 -0200 (BRST)
From: Lisandro Zambenedetti Granville <granville@inf.ufrgs.br>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Message-Id: <D19A8D24-68F8-47E9-B326-13D4779B4A88@inf.ufrgs.br>
Date: Fri, 9 Jan 2015 15:38:46 -0200
To: nmrg@irtf.org
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
X-Mailer: Apple Mail (2.1993)
X-AV-Checked: ClamAV using ClamSMTP
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/kU_nV-Jw_0ZK4Da65IKVGaRA8Ww>
Subject: [nmrg] Proposed NMRG meeting for 2015
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jan 2015 20:05:48 -0000

Dear NMRG subscribers,

In a previous message, we requested the subscribers of this NMRG mailing =
list to inform about topics of interest to be discussed in future NMRG =
meetings. Thanks for those that replied that message!=20

In this message, we would like to share with you a draft plan for NMRG =
meeting in 2015. The goal here is to have an initial base for discussion =
about the upcoming meetings. Please, take a look at this draft plan and =
provide your feedback to allow us improving it.

As in previous years, we would like to organize 4 meetings: 3 during =
IETFs and 1 interim meeting together with a conference. Because it seems =
that the respondents prefer to organize the interim meeting together =
with NOMS/IM instead of CNSM, we=E2=80=99ll try this year to move the =
interim meeting from Oct./Nov. (when CNSM usually happens) to May =
(because of IM 2015). We don=E2=80=99t know yet whether that would be =
possible because logistics for IM is advanced already, but we=E2=80=99ll =
keep you informed. Still, in the plan below, we are taking an optimistic =
perspective regarding that.

The planned meetings are:

NMRG meeting during IETF 92, Dallas, Mar. 2015
- Topic: Security management
- As suggested by Aiko, security has been less frequently addressed. =
NMRG can contribute with that, for example, discussing questions such as =
(from Aiko=E2=80=99s message too):
  . how well is BCP38 (IP spoofing) implemented?
  . how much worse is the amplification of DNSSEC?
  . what is the behavior of botnets / DGAs?
  . what privacy sensitive data is leaked from various protocols, =
without users awareness?

NMRG meeting during IETF 93, Prague, Jul. 2015
- Topic: Flow-based measurement (workshop series)
- NMRG has been running a series of workshops on flow-based =
measurements. The last workshop in this series happened in Berlim Aug. =
2013. Because of the success of the previous editions, we believe that =
Jul. 2015 would be a good moment for another meeting on the topic.

NMRG meeting during IETF 94, Yokohama, Nov. 2015
- Topic: Management of/using ICN
- Dimitri and Kostas properly argued and suggested to exploit the =
opportunity of addressed ICN and management. The observation is twofold. =
=46rom one perspective, it=E2=80=99s important to understand what =
management challenges ICN presents; form another perspective ICN itself =
can be a management technology that could improve the solutions =
available.

NMRG (interim) meeting, occasionally together with IM 2015 (May 2015, =
Ottawa) or CNSM 2015 (possibly Oct./Nov. 2015, TBD)
- Topic: Open, suggestions are welcomed!

As we mentioned above, please provide your feedback and ideas about this =
plan. We want to improve the participation of all on the NMRG decisions. =
Your opinion is extremely important.

Best regards,

Olivier and Lisandro=


From nobody Mon Jan 12 01:53:30 2015
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0A261A8A8E for <nmrg@ietfa.amsl.com>; Mon, 12 Jan 2015 01:53:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.56
X-Spam-Level: 
X-Spam-Status: No, score=-1.56 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GoKClmq-jTNl for <nmrg@ietfa.amsl.com>; Mon, 12 Jan 2015 01:53:25 -0800 (PST)
Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE4BF1A8A8C for <nmrg@irtf.org>; Mon, 12 Jan 2015 01:53:24 -0800 (PST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 970CB71E; Mon, 12 Jan 2015 10:53:23 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id cGVWdvkzzSGW; Mon, 12 Jan 2015 10:53:21 +0100 (CET)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 12 Jan 2015 10:53:22 +0100 (CET)
Received: from localhost (demetrius4.jacobs-university.de [212.201.44.49]) by hermes.jacobs-university.de (Postfix) with ESMTP id 73F892002C; Mon, 12 Jan 2015 10:53:22 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius4.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id rWzOjlwxOLwT; Mon, 12 Jan 2015 10:53:21 +0100 (CET)
Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id E03C420017; Mon, 12 Jan 2015 10:53:20 +0100 (CET)
Received: by elstar.local (Postfix, from userid 501) id CF9C430B8641; Mon, 12 Jan 2015 10:53:18 +0100 (CET)
Date: Mon, 12 Jan 2015 10:53:18 +0100
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Lisandro Zambenedetti Granville <granville@inf.ufrgs.br>
Message-ID: <20150112095316.GA76910@elstar.local>
Mail-Followup-To: Lisandro Zambenedetti Granville <granville@inf.ufrgs.br>, nmrg@irtf.org
References: <D19A8D24-68F8-47E9-B326-13D4779B4A88@inf.ufrgs.br>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <D19A8D24-68F8-47E9-B326-13D4779B4A88@inf.ufrgs.br>
User-Agent: Mutt/1.4.2.3i
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/vIMjoOWkkDG0iK3OBUaVKLbnrbk>
Cc: nmrg@irtf.org
Subject: Re: [nmrg] Proposed NMRG meeting for 2015
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jan 2015 09:53:27 -0000

On Fri, Jan 09, 2015 at 03:38:46PM -0200, Lisandro Zambenedetti Granville wrote:
> Dear NMRG subscribers,
> 
> In a previous message, we requested the subscribers of this NMRG mailing list to inform about topics of interest to be discussed in future NMRG meetings. Thanks for those that replied that message! 
> 
> In this message, we would like to share with you a draft plan for NMRG meeting in 2015. The goal here is to have an initial base for discussion about the upcoming meetings. Please, take a look at this draft plan and provide your feedback to allow us improving it.
> 
> As in previous years, we would like to organize 4 meetings: 3 during IETFs and 1 interim meeting together with a conference. Because it seems that the respondents prefer to organize the interim meeting together with NOMS/IM instead of CNSM, we’ll try this year to move the interim meeting from Oct./Nov. (when CNSM usually happens) to May (because of IM 2015). We don’t know yet whether that would be possible because logistics for IM is advanced already, but we’ll keep you informed. Still, in the plan below, we are taking an optimistic perspective regarding that.
> 
> The planned meetings are:
> 
> NMRG meeting during IETF 92, Dallas, Mar. 2015
> - Topic: Security management
> - As suggested by Aiko, security has been less frequently addressed. NMRG can contribute with that, for example, discussing questions such as (from Aiko’s message too):
>   . how well is BCP38 (IP spoofing) implemented?
>   . how much worse is the amplification of DNSSEC?
>   . what is the behavior of botnets / DGAs?
>   . what privacy sensitive data is leaked from various protocols, without users awareness?

Makes sense to me and if we get the right people involved, this could be
interesting.
 
> NMRG meeting during IETF 93, Prague, Jul. 2015
> - Topic: Flow-based measurement (workshop series)
> - NMRG has been running a series of workshops on flow-based measurements. The last workshop in this series happened in Berlim Aug. 2013. Because of the success of the previous editions, we believe that Jul. 2015 would be a good moment for another meeting on the topic.

Makes sense to continue, although it could perhaps be changed a bit to
flow-based management instead of limiting this to measurement.

> NMRG meeting during IETF 94, Yokohama, Nov. 2015
> - Topic: Management of/using ICN
> - Dimitri and Kostas properly argued and suggested to exploit the opportunity of addressed ICN and management. The observation is twofold. From one perspective, it’s important to understand what management challenges ICN presents; form another perspective ICN itself can be a management technology that could improve the solutions available.

How does this relate to ICNRG - should this be jointly organized? Is
this limited to research ICN ideas or does it also include de-facto
real-world content-delivery networks and how they impact the
management of today's network?

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1, 28759 Bremen, Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>


From nobody Mon Jan 12 05:52:57 2015
Return-Path: <granville@inf.ufrgs.br>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CA701A9109 for <nmrg@ietfa.amsl.com>; Mon, 12 Jan 2015 05:52:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.961
X-Spam-Level: 
X-Spam-Status: No, score=-1.961 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_BR=0.955, HOST_EQ_BR=1.295, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pX5KL04oMN7F for <nmrg@ietfa.amsl.com>; Mon, 12 Jan 2015 05:52:51 -0800 (PST)
Received: from delivery2.ufrgs.br (delivery2.ufrgs.br [143.54.2.212]) by ietfa.amsl.com (Postfix) with ESMTP id 578C91A9108 for <nmrg@irtf.org>; Mon, 12 Jan 2015 05:52:45 -0800 (PST)
Received: from delivery2.ufrgs.br (localhost [127.0.0.1]) by delivery2.ufrgs.br (Postfix) with ESMTP id 3EBF420A0A7; Mon, 12 Jan 2015 11:52:41 -0200 (BRST)
Received: from msa1.ufrgs.br (msa1.ufrgs.br [143.54.2.208]) by delivery2.ufrgs.br (Postfix) with ESMTP id 5020A300B6B; Mon, 12 Jan 2015 11:52:41 -0200 (BRST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Lisandro Zambenedetti Granville <granville@inf.ufrgs.br>
In-Reply-To: <20150112095316.GA76910@elstar.local>
Date: Mon, 12 Jan 2015 11:52:40 -0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <BF33DFAA-8C63-4C4C-A9A2-82EAC8CC5244@inf.ufrgs.br>
References: <D19A8D24-68F8-47E9-B326-13D4779B4A88@inf.ufrgs.br> <20150112095316.GA76910@elstar.local>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
X-Mailer: Apple Mail (2.1993)
X-AV-Checked: ClamAV using ClamSMTP
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/6ldzLtfiKH7CrHcVC1dkZz79A_E>
Cc: nmrg@irtf.org
Subject: Re: [nmrg] Proposed NMRG meeting for 2015
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jan 2015 13:52:54 -0000

Hello Juergen

Comments below:

>> NMRG meeting during IETF 93, Prague, Jul. 2015
>> - Topic: Flow-based measurement (workshop series)
>> - NMRG has been running a series of workshops on flow-based =
measurements. The last workshop in this series happened in Berlim Aug. =
2013. Because of the success of the previous editions, we believe that =
Jul. 2015 would be a good moment for another meeting on the topic.
>=20
> Makes sense to continue, although it could perhaps be changed a bit to
> flow-based management instead of limiting this to measurement.

Interesting observation. Ramin, who will be in charge of this next =
edition, can take this into account and, in the call for contributions, =
emphasize the management aspects.

>> NMRG meeting during IETF 94, Yokohama, Nov. 2015
>> - Topic: Management of/using ICN
>> - Dimitri and Kostas properly argued and suggested to exploit the =
opportunity of addressed ICN and management. The observation is twofold. =
=46rom one perspective, it=E2=80=99s important to understand what =
management challenges ICN presents; form another perspective ICN itself =
can be a management technology that could improve the solutions =
available.
>=20
> How does this relate to ICNRG - should this be jointly organized? Is
> this limited to research ICN ideas or does it also include de-facto
> real-world content-delivery networks and how they impact the
> management of today's network?

I like the idea of joint meetings with related RGs. In fact, we already =
tried to do it once (with SDNRG) but at that time it was not feasible. I =
believe having ICNRG onboard would be beneficial, helping to tackle the =
questions you mentioned. They will be able to pose management challenges =
from the ICN domain that are not clear or obvious to the network =
management community.

Best regards,

Lisandro=


From nobody Fri Jan 23 10:26:36 2015
Return-Path: <amitavabiswas0@gmail.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C68371A86DE for <nmrg@ietfa.amsl.com>; Fri, 23 Jan 2015 10:20:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.251
X-Spam-Level: 
X-Spam-Status: No, score=0.251 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_62=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7trkkPQsw_rX for <nmrg@ietfa.amsl.com>; Fri, 23 Jan 2015 10:20:21 -0800 (PST)
Received: from mail-pd0-x236.google.com (mail-pd0-x236.google.com [IPv6:2607:f8b0:400e:c02::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 607171ACD28 for <nmrg@irtf.org>; Fri, 23 Jan 2015 10:20:20 -0800 (PST)
Received: by mail-pd0-f182.google.com with SMTP id z10so7566128pdj.13 for <nmrg@irtf.org>; Fri, 23 Jan 2015 10:20:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=/OU5hyQivJabC3rSSF0R+09roGI5/9YpQFHSX7UhZX0=; b=QEM2eHEhdqcF0J+fWnP1U4l7U07Pi5uO4XsTtbXAqEwHiF+j+/aa0DiIWRxjg/36Vj HznipG6mRUWGwIs4oDM5tGkwR/cI1NAi6g/OcpJI2e9wMsStfU8aLZqwU2UymGNffqnr HxM9w0G/x99OQ4AnqLzTWrqWlxzCZ3r4aQtieFEM2wzDdDzwSlxTMBZGVk5p2aiDLa3m K6YJb1xccB9Vw/8oSSibOJCKH140lAIq88108CDBb/u9f+CK5yQT+UNvP6YC6XIwprX1 gc6laRWG/E9ffBtJTewB+BxG54pBQiBwRT74Bf7qhy+zbCa5ZImkNyH9KPop8AbvWhA6 X5Cg==
MIME-Version: 1.0
X-Received: by 10.66.235.200 with SMTP id uo8mr13288501pac.108.1422037218633;  Fri, 23 Jan 2015 10:20:18 -0800 (PST)
Received: by 10.70.80.73 with HTTP; Fri, 23 Jan 2015 10:20:18 -0800 (PST)
In-Reply-To: <CANiKq6P1BxJm+0K55KVwa0dqhGHX0TbQooM4ycqbq+Wd8mvMPw@mail.gmail.com>
References: <CANiKq6P1BxJm+0K55KVwa0dqhGHX0TbQooM4ycqbq+Wd8mvMPw@mail.gmail.com>
Date: Fri, 23 Jan 2015 10:20:18 -0800
Message-ID: <CANiKq6PDN4ncOwEowVedNt9jgKofsSE6ZzaqqXt590gOYPvmRw@mail.gmail.com>
From: Amitava Biswas <amitavabiswas0@gmail.com>
To: undisclosed-recipients:;
Content-Type: multipart/alternative; boundary=001a1136d022462e29050d55d713
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/jYqhHK9md3d84Yoi6VJFbsmNDKk>
X-Mailman-Approved-At: Fri, 23 Jan 2015 10:26:17 -0800
Subject: [nmrg] Fwd: Cal for papers: IEEE Workshops on SDN, NFV, under NetSoft 2015, London, 13-17 Apr.
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Jan 2015 18:20:27 -0000

--001a1136d022462e29050d55d713
Content-Type: text/plain; charset=UTF-8

Hi All,

This is a 2nd call for papers for IEEE Workshops on SDN, NFV under NetSoft
2015 IEEE conference, in London, UK, on 13-17 Apr.
The submission deadline for all workshops are Jan 31, 2015. Details are
below.

CALL FOR PAPERS
=================================================================
        IEEE NetSoft 2015 Workshops

    1st IEEE Conference on Network Softwarization
        April 13-17, 2015 - London, UK

        http://sites.ieee.org/netsoft/workshop/

    Workshop Paper Submission Deadline: January 31, 2015
=================================================================

NetSoft 2015 will be the first of a series of annual events established as
part of the IEEE Software-Defined Networks initiative of the IEEE Future
Directions Committee in order to build an IEEE-wide community in this area
across multiple IEEE societies and councils (http://sdn.ieee.org/about.html).
Software-Defined Networking (SDN), Network Function Virtualization (NFV),
and Software-Defined Clouds could be seen as different expressions of an
overall transformation trend, which is deeply impacting and Telecom and IT
industries. This trend is also transforming several other Industries, in
using "softwarization" to optimize costs and processes
and in bringing new values in infrastructures. In particular, SDN, NFV and
network programmability are creating the conditions to reinvent network and
cloud
architectures, accelerate service deployment and facilitate infrastructure
management.

NetSoft 2015 will feature 3 workshops, aiming at bringing together
researchers and practitioners to discuss issues, current state and future
trends in SDN and NFV related areas on manageability, security and 5G.

NetSoft 2015 workshops will be held on April 13 and April 17, 2015. All
workshops are currently accepting submissions of
original/position/work-in-progress/experience
papers at respective links as below. Submissions must be in IEEE 2-column
style with a length limitation of 6 pages (including title, abstract, all
figures, tables, and references). Submission instructions, important dates
and further details are available on the workshops websites as below.

Accepted and presented papers will be published in the workshop proceedings
and submitted to IEEE Xplore.

-IEEE MISSION 2015
 IEEE Workshop on Management Issues in SDN, SDI and NFV
 Website: http://sites.ieee.org/netsoft/workshop/mission/
 Submission: http://edas.info/19315
 Organizers:     Kashinath Basu, Oxford Brookes University, UK; Chen Liu,
Microsoft, US

-IEEE Soft5G 2015
 IEEE Workshop on Software Defined 5G Networks
 Website: http://www.fokus.fraunhofer.de/go/Soft5G_Workshop_2014
 Submission: http://edas.info/N19311
 Organizers:     Thomas Magedanz, TU Berlin/Fraunhofer Institute FOKUS,
Germany;    Roberto Riggio, CREATE-NET, Italy

-IEEE SEC-SDN 2015
 IEEE Workshop on Security issues in SDN
 Website: http://sites.ieee.org/netsoft/workshop/sec-sdn/
 Submission: https://edas.info/19419
 Organizers:     Olivier Festor, Telecom-Nancy, France; Radu State, SnT,
Luxembourg

Important dates:
Paper Submission: January 31, 2015
Notification of Acceptance: February 28, 2015
Camera Ready Papers: March 13, 2015

We are looking forward to your paper submission as well as you
participation at the NetSoft 2015 workshops in April 2015.

NETSOFT WORKSHOP CO-CHAIRS
Amitava Biswas, Cisco Systems, US
Noura Limam, University of Waterloo, Canada

NETSOFT GENERAL CO-CHAIRS
Prosper Chemouil, Orange Labs,
France George Pavlou, University College London,UK

IEEE SDN Initiative Chair
Antonio Manzalini, Telecom Italia, Italy

--001a1136d022462e29050d55d713
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_quote"><div dir=3D"ltr"><div><div>=
Hi All,<br><br></div>This is a 2nd call for papers for IEEE Workshops on SD=
N, NFV under NetSoft 2015 IEEE conference, in London, UK, on 13-17 Apr.<br>=
</div>The submission deadline for all workshops are Jan 31, 2015. Details a=
re below.<br><div><div><div><br>CALL FOR PAPERS <br>=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D<br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 IEEE NetS=
oft 2015 Workshops <br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=
=C2=A0 =C2=A0=C2=A0=C2=A0 <br>=C2=A0=C2=A0=C2=A0 1st IEEE Conference on Net=
work Softwarization <br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 April 13-17, =
2015 - London, UK<br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 <br>=C2=A0=C2=A0=
=C2=A0 =C2=A0=C2=A0=C2=A0 <a href=3D"http://sites.ieee.org/netsoft/workshop=
/" target=3D"_blank">http://sites.ieee.org/netsoft/workshop/</a><br>=C2=A0<=
br>=C2=A0=C2=A0=C2=A0 Workshop Paper Submission Deadline:=C2=A0January 31, =
2015<br>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D <br><br>NetSoft 2015=
 will be the first of a series of annual events established as part of the =
IEEE Software-Defined Networks initiative of the IEEE Future Directions Com=
mittee in order to build an IEEE-wide community in this area across multipl=
e IEEE societies and councils (<a href=3D"http://sdn.ieee.org/about.html" t=
arget=3D"_blank">http://sdn.ieee.org/about.html</a>). Software-Defined Netw=
orking (SDN), Network Function Virtualization (NFV), and Software-Defined C=
louds could be seen as different expressions of an overall transformation t=
rend, which is deeply impacting and Telecom and IT industries. This trend i=
s also transforming several other Industries, in using &quot;softwarization=
&quot; to optimize costs and processes <br>and in bringing new values in in=
frastructures. In particular, SDN, NFV and network programmability are crea=
ting the conditions to reinvent network and cloud <br>architectures, accele=
rate service deployment and facilitate infrastructure management. <br><br>N=
etSoft 2015 will feature 3 workshops, aiming at bringing together researche=
rs and practitioners to discuss issues, current state and future trends in =
SDN and NFV related areas on manageability, security and 5G.<br><br>NetSoft=
 2015 workshops will be held on April 13 and April 17, 2015. All workshops =
are currently accepting submissions of original/position/work-in-progress/e=
xperience <br>papers at respective links as below. Submissions must be in I=
EEE 2-column style with a length limitation of 6 pages (including title, ab=
stract, all figures, tables, and references). Submission instructions, impo=
rtant dates and further details are available on the workshops websites as =
below.<br><br>Accepted and presented papers will be published in the worksh=
op proceedings and submitted to IEEE Xplore.<br><br>-IEEE MISSION 2015<br>=
=C2=A0IEEE Workshop on Management Issues in SDN, SDI and NFV<br>=C2=A0Websi=
te:=C2=A0<a href=3D"http://sites.ieee.org/netsoft/workshop/mission/" target=
=3D"_blank">http://sites.ieee.org/netsoft/workshop/mission/</a><br>=C2=A0Su=
bmission: <a href=3D"http://edas.info/19315" target=3D"_blank">http://edas.=
info/19315</a><br>=C2=A0Organizers: =C2=A0=C2=A0=C2=A0 Kashinath Basu, Oxfo=
rd Brookes University, UK; Chen Liu, Microsoft, US<br><br>-IEEE Soft5G 2015=
<br>=C2=A0IEEE Workshop on Software Defined 5G Networks<br>=C2=A0Website:=
=C2=A0<a href=3D"http://www.fokus.fraunhofer.de/go/Soft5G_Workshop_2014" ta=
rget=3D"_blank">http://www.fokus.fraunhofer.de/go/Soft5G_Workshop_2014</a><=
br>=C2=A0Submission: <a href=3D"http://edas.info/N19311" target=3D"_blank">=
http://edas.info/N19311</a><br>=C2=A0Organizers: =C2=A0=C2=A0=C2=A0 Thomas =
Magedanz, TU Berlin/Fraunhofer Institute FOKUS, Germany;=C2=A0=C2=A0=C2=A0 =
Roberto Riggio, CREATE-NET, Italy<br><br>-IEEE SEC-SDN 2015<br>=C2=A0IEEE W=
orkshop on Security issues in SDN<br>=C2=A0Website:=C2=A0<a href=3D"http://=
sites.ieee.org/netsoft/workshop/sec-sdn/" target=3D"_blank">http://sites.ie=
ee.org/netsoft/workshop/sec-sdn/</a><br>=C2=A0Submission: <a href=3D"https:=
//edas.info/19419" target=3D"_blank">https://edas.info/19419</a><br>=C2=A0O=
rganizers: =C2=A0=C2=A0=C2=A0 Olivier Festor, Telecom-Nancy, France; Radu S=
tate, SnT, Luxembourg<br><br>Important dates:=C2=A0 <br>Paper Submission: J=
anuary 31, 2015 <br>Notification of Acceptance: February 28, 2015<br>Camera=
 Ready Papers: March 13, 2015<br><br>We are looking forward to your paper s=
ubmission as well as you participation at the NetSoft 2015 workshops in Apr=
il 2015.<br><br>NETSOFT WORKSHOP CO-CHAIRS<br>Amitava Biswas, Cisco Systems=
, US<br>Noura Limam, University of Waterloo, Canada <br><br>NETSOFT GENERAL=
 CO-CHAIRS <br>Prosper Chemouil, Orange Labs, <br>France George Pavlou, Uni=
versity College London,UK <br><br>IEEE SDN Initiative Chair<br>Antonio Manz=
alini, Telecom Italia, Italy=C2=A0 <br></div></div></div></div>
</div><br></div>

--001a1136d022462e29050d55d713--


From nobody Tue Jan 27 08:10:16 2015
Return-Path: <william.atwood@concordia.ca>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 625041A8837 for <nmrg@ietfa.amsl.com>; Tue, 27 Jan 2015 08:10:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.845
X-Spam-Level: 
X-Spam-Status: No, score=-0.845 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_MED=-2.3, SPF_SOFTFAIL=0.665, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5qkhaa8e6gW9 for <nmrg@ietfa.amsl.com>; Tue, 27 Jan 2015 08:09:59 -0800 (PST)
Received: from oldperseverance.encs.concordia.ca (oldperseverance.encs.concordia.ca [132.205.96.92]) by ietfa.amsl.com (Postfix) with ESMTP id 5D7D01A1A60 for <nmrg@irtf.org>; Tue, 27 Jan 2015 08:09:46 -0800 (PST)
Received: from [IPv6:::1] (bill@poise.encs.concordia.ca [132.205.2.209]) by oldperseverance.encs.concordia.ca (envelope-from william.atwood@concordia.ca) (8.13.7/8.13.7) with ESMTP id t0RG9dxs001618;  Tue, 27 Jan 2015 11:09:40 -0500
Message-ID: <54C7B846.60102@concordia.ca>
Date: Tue, 27 Jan 2015 11:09:42 -0500
From: William Atwood <william.atwood@concordia.ca>
Organization: Concordia University, Montreal
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Network Management Research Group <nmrg@irtf.org>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.58 on oldperseverance.encs.concordia.ca at 2015-01-27 11:09:42 EST
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/8dxXILjn8P3rsKfy8brvJq50oTQ>
Cc: Ron Brash <ron.brash@gmail.com>, Nitin Prajapati <prajapatinitin@hotmail.com>, "Revathi B.S." <revathi.bs@gmail.com>
Subject: [nmrg] Managing Routing Protocol Security
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jan 2015 16:10:02 -0000

Dear participants in NMRG,

As part of an ongoing project on managing security for routing
protocols, my students and I have been developing ways of automating the
management of keys and other security parameters for routers, with an
emphasis on the policies for doing the management, rather than the
actual key-distribution protocols.

We have posted draft-atwood-rtgwg-secure-rtg, and presented it briefly
in Hawaii to rtgwg.  However, it seems likely to us that NMRG is the
right place for this work at this time.  This email is to introduce the
work to the NMRG participants, and to solicit their comments.

So far, we have considered routing from the perspective of four levels:
1 Routing Protocol
      (exchange of routing packets)
2 Keys and Security Protocol
      (how to provide authentication and integrity)
3 Key and Security Association Management
      (how to negotiate the keys that will be used)
4 Configuration Management
      (how to push the parameters for Layer 3 onto the router)

Many routing protocols are defined (level 1).
Many routing protocols have a security option defined in their
specification (level 2).
Some key negotiation protocols have been proposed for the routing
protocol security problem, but no method for conveniently managing them
has been put forth (level 3).
No work has been done (to our knowledge) outside of our group
specifically on configuring security for routing protocols (general
configuration approaches clearly exist) (level 4).

We suspect that there is one more level above this: mapping from
corporate policies to configurations (i.e., going from something that a
middle to senior executive can understand, to an actual security
configuration on a router).

We have outlined an overall framework for security management and for
the interactions among the central controller and the individual
routers.  We have shown the proposed interactions to be secure, using
formal modeling.  Part of this work puts forth the idea of "keying
groups", which encompasses the idea of the scope of a key and,
therefore, the extent of the potential damage if a key is compromised.

We have used the Crypto-Key-Table (CKT) from the KARP Working Group,
defined in RFC 7210.  Based on an idea that was first proposed in a KARP
document, we have defined two additional databases, the Router Security
Parameter Database (RSPD) and the Router Peer Authorization Database
(RPAD).  Together these three databases form our Routing Protocol
Security (RPsec) framework.  While the CKT, RSPD and RPAD have obvious
parallels in the SAD, SPD and PAD of IPsec, the environment in which
RPsec operates is quite different from the environment in which IPsec
operates.

We have defined YANG modules to correspond to the contents of the CKT,
the RSPD and the RPAD.  Version -00 of our draft contains most of the
motivation.  We expect that version -01 will contain details of the
proposed RSPD and RPAD contents, along with the YANG models.

We have outlined (NETCONF-based) procedures for distributing the
configuration data from a central point to the individual routers.
These procedures are intended to be aware of "permitted adjacencies" for
a particular router, although we have not yet worked through the details
of the management of this aspect.

We believe that the use of RPsec will enable no-hands-on management
(after initial configuration of router identities) of routing protocol
security, with configurable key hygiene, independence of a router from
the central controller when re-booting, and centralized control over
permitted adjacencies.

Comments from the community will be most welcome.

Bill Atwood
Nitin Prajapati
Ron Brash
Revathi Bangalore Somanatha


-- 
Dr. J.W. Atwood, Eng.             tel:   +1 (514) 848-2424 x3046
Distinguished Professor Emeritus  fax:   +1 (514) 848-2830
Department of Computer Science
   and Software Engineering
Concordia University EV 3.185     email:william.atwood@concordia.ca
1455 de Maisonneuve Blvd. West    http://users.encs.concordia.ca/~bill
Montreal, Quebec Canada H3G 1M8

