
From nobody Thu Jun  1 01:34:03 2017
Return-Path: <liubingyang@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02982127136 for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 01:34:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level: 
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8KDnNW8ySkGv for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 01:33:59 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2478712706D for <ideas@ietf.org>; Thu,  1 Jun 2017 01:33:58 -0700 (PDT)
Received: from 172.18.7.190 (EHLO LHREML714-CAH.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DHR87667; Thu, 01 Jun 2017 08:33:56 +0000 (GMT)
Received: from SZXEMI415-HUB.china.huawei.com (10.86.210.48) by LHREML714-CAH.china.huawei.com (10.201.108.37) with Microsoft SMTP Server (TLS) id 14.3.301.0; Thu, 1 Jun 2017 09:33:54 +0100
Received: from SZXEMI508-MBS.china.huawei.com ([169.254.10.154]) by SZXEMI415-HUB.china.huawei.com ([10.86.210.48]) with mapi id 14.03.0235.001; Thu, 1 Jun 2017 16:33:46 +0800
From: "Liubingyang (Bryan)" <liubingyang@huawei.com>
To: Padma Pillay-Esnault <padma.ietf@gmail.com>, Uma Chunduri <uma.chunduri@huawei.com>
CC: "ideas@ietf.org" <ideas@ietf.org>
Thread-Topic: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
Thread-Index: AQHS2jZ2e/PNFODRoUWJ3h66M6A23qIOP72AgAASxgCAAVm9IA==
Date: Thu, 1 Jun 2017 08:33:46 +0000
Message-ID: <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com>
References: <CAG-CQxpZeoEUE7bprXODdKTEMFc5pqTJ5_HO8SZ3OiBc=QOpbg@mail.gmail.com> <25B4902B1192E84696414485F5726854018BC2AF@SJCEML701-CHM.china.huawei.com> <CAG-CQxoDrC_9BtqqvWeK6bn=HNBrDCkqmy9or6-Jk3RbYeYEiA@mail.gmail.com>
In-Reply-To: <CAG-CQxoDrC_9BtqqvWeK6bn=HNBrDCkqmy9or6-Jk3RbYeYEiA@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.130.168.116]
Content-Type: multipart/alternative; boundary="_000_C1CE72EE84AF224E94DA21AE134209EE0104F6C8SZXEMI508MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020202.592FD174.0114, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.10.154, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 370d666a4272636a82bd0ea4cd42a1a8
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/aDu11vuDgwUUSbH9HzATh8tuYNg>
Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jun 2017 08:34:02 -0000

--_000_C1CE72EE84AF224E94DA21AE134209EE0104F6C8SZXEMI508MBSchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_C1CE72EE84AF224E94DA21AE134209EE0104F6C8SZXEMI508MBSchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_C1CE72EE84AF224E94DA21AE134209EE0104F6C8SZXEMI508MBSchi_--



From nobody Thu Jun  1 08:29:31 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A53B412940D for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 08:29:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ABIfpqAgPiMI for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 08:29:28 -0700 (PDT)
Received: from mail-wm0-x22f.google.com (mail-wm0-x22f.google.com [IPv6:2a00:1450:400c:c09::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21AE4128961 for <ideas@ietf.org>; Thu,  1 Jun 2017 08:29:28 -0700 (PDT)
Received: by mail-wm0-x22f.google.com with SMTP id 7so162247661wmo.1 for <ideas@ietf.org>; Thu, 01 Jun 2017 08:29:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=sJhjFGBWbYIrR4NvI1S2zY4nhSzqjaR85HL68V/bP0o=; b=aWghUK2BBOY61LfSVOEIz+QrvXkLXVLAPyqnLFazkdnQeR5qMaeiH4jXiV8iZ5QYod S7labLrcAS/J0GyKo7zZOqeo7VdheLob++YT/3LTK/J67Mq80oGzn40pLYL+X3EiriTy sKlfpxEGPXDi78L5w+sEs1lDJbsLpdRNJ99vso9KEvSOLshAchBIFI+JdYzzLmiqTWeU AGpGs9bI0Ps+gjLXii+hUbQrhsR+yCw1xtf43VwhhlD9AcmYf+novSSpLQqWV5J1tiY9 BUQw0a+wMe9Toi4sA7YDFdHMBW2NCtDOPjx3OMbNv+ivs5mo8UcZv0NhtMPaTlWFRW97 TS7g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=sJhjFGBWbYIrR4NvI1S2zY4nhSzqjaR85HL68V/bP0o=; b=kheQ58zpRENwjt6tbduo6SUd7skhZgYZW7LBmOFSljNGLUcIs9WgwLmV+WMwVeF4D8 b86OKTPyaF4jDxJDXk+0roMh19JhAFB0oSzIfL4fDouhFQmtF0qsugmQtznduhI6krDb ckhCK4iCbh1vssIdscnDcoP4zsQW/JjXjZlzduglBItyeimtzG9zHhTrmco6i9sbg2C+ KWkjaNykrSmnXNrW55w2Nsf4WjKZCbCZlTq1PqZ5NeYVFQfoKupk98n3M8J6LPx+1GDY fD+ih5FMl4WULhogRGqdEDgukQQFsktXF2iJ4DIheTJQPtaSXE0Tih6/BtSgzCv5Oa3/ VACw==
X-Gm-Message-State: AODbwcBnYVdq3V7qHWBD5UCVk4NY0U5REwca5s9NVCm+VtZW7DdVIENB Cs9zd4O1NLzhJET4LRAhCDQYkgxerA==
X-Received: by 10.223.175.11 with SMTP id z11mr1698557wrc.11.1496330966259; Thu, 01 Jun 2017 08:29:26 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.170.73 with HTTP; Thu, 1 Jun 2017 08:29:25 -0700 (PDT)
In-Reply-To: <644DA50AFA8C314EA9BDDAC83BD38A2E0DFAE47B@SJCEML701-CHM.china.huawei.com>
References: <CAG-CQxq1LQJPLLGbWxaQZPgomLyTuS_pjRGdqh8CY83cwgQhjg@mail.gmail.com> <644DA50AFA8C314EA9BDDAC83BD38A2E0DFAE47B@SJCEML701-CHM.china.huawei.com>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Thu, 1 Jun 2017 08:29:25 -0700
Message-ID: <CAG-CQxqR5CU6JSRFvhmjGKD6PJSsZ6Rm7FMQmnAmH6PB_UddZA@mail.gmail.com>
To: Alexander Clemm <alexander.clemm@huawei.com>
Cc: "ideas@ietf.org" <ideas@ietf.org>
Content-Type: multipart/alternative; boundary="f403045f562eb5dcd80550e7b316"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/S1ZGZknm4FYwDXBzkYy7n8n9r30>
Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jun 2017 15:29:31 -0000

--f403045f562eb5dcd80550e7b316
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Alex

Note taken.

Padma

On Tue, May 16, 2017 at 12:50 PM, Alexander Clemm <
alexander.clemm@huawei.com> wrote:

> Overall this looks fine to me.  However, the deliverables section should
> probably be a bit more specific, in particular given the scope of the
> charter.  In addition to =E2=80=9Coverall architecture=E2=80=9D, there wi=
ll need to be
> deliverables for the other points as well, specifically interfaces for ea=
ch
> of the distinct services that are taken into the charter and the data
> exchanged across these interfaces.
>
>
>
> --- Alex
>
>
>
> *From:* Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
> Pillay-Esnault
> *Sent:* Saturday, May 13, 2017 5:08 PM
> *To:* ideas@ietf.org
> *Subject:* [Ideas] Prep for BOF in July - Your input Needed on a Charter
> Proposal
>
>
>
> Hello IDEAS
>
>
>
> The deadline for a request for a BOF for IETF99 in July is 6/02/2017 and
> just a few weeks away.
>
>
>
> Please see below a tentative charter proposal. We would like to have inpu=
t
> from the list regarding the charter. We would like to hear from you
> regarding the scope of work and your interests.
>
>
>
> Proposed Charter
>
>
>
> The Identity Enabled Networks (IDEAS) working group focuses on the
> framework  to implement a common control plane for identifier=E2=80=93loc=
ation
> separation protocols.
>
>
>
> The identifier-enabled solutions and applications are increasingly being
> considered to support mobility solutions across heterogeneous access
> networks, Internet of Things, Machine to Machine (M2M), context aware
> applications and security.  Due to the diverse nature of devices and
> applications, it may not be possible to deploy a single protocol end to
> end. A common control plane will address siloes in discovery and
> communications.  Moreover, a common control plane will address the
> technical and operational hurdle to deployment and interoperability of
> solutions.
>
>
>
> The working group will specify an overall architecture for  a common
> control plane and services for identity-enabled technology.  More
> specifically these services will include:
>
> =C2=B7      registration and lifecycle management of identities and assoc=
iated
> identifiers
>
> =C2=B7      identifier binding to location(s),
>
> =C2=B7      support for grouping,
>
> =C2=B7      definition and enforcement of policies
>
> =C2=B7      support for metadata.
>
> Additionally, the control plane interface and protocol extensions that
> allow clients to communicate with that infrastructure will be covered.
>
>
>
> The abstraction provided by a secured identity will give a new level of
> control for confidentiality, accountability, security and access-control.
> The working group will cover these aspects and balance them with the
> minimized storage of data and privacy considerations.
>
>
>
> Specifically, the IDEAS WG is chartered to work on these areas:
>
>
>
> Overall architecture: This work covers the control plane, management,
> policy control, and security aspects.
>
>
>
> Manageability of the architecture: The working group will cover the
> management aspects of IDEAS architectural components and the services tha=
t
> they provide.
>
>
>
> Interface to the architecture: This work will cover interface interaction=
s
> between the framework and identifier-enabled protocol.
>
>
>
> Where appropriate, the IDEAS WG will collaborate with other Working Group=
s
> to ensure interoperability with LISP, HIP, ILA and other relevant work.
>
>
>
> WG deliverables include:
>
> Overall architecture
>
>
>
> WG sustaining/informational documents may include:
>
>
>
> These documents may not necessarily be published, but may be
>
> maintained in a draft form or on a collaborative Working Group wiki
>
> to support the efforts of the Working Group and help new comers:
>
> -Problem statement
>
> -Use cases
>
> -Requirements
>
> .....
>
>
>
>
>
> Milestones
>
> TBD
>

--f403045f562eb5dcd80550e7b316
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Alex<div><br></div><div>Note taken.</div><div><br></div=
><div>Padma</div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_q=
uote">On Tue, May 16, 2017 at 12:50 PM, Alexander Clemm <span dir=3D"ltr">&=
lt;<a href=3D"mailto:alexander.clemm@huawei.com" target=3D"_blank">alexande=
r.clemm@huawei.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"m_-1868529221197046058WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1f497d">Overall this looks fine to me.=C2=A0 =
However, the deliverables section should probably be a bit more specific, i=
n particular given the scope of the charter.=C2=A0 In addition
 to =E2=80=9Coverall architecture=E2=80=9D, there will need to be deliverab=
les for the other points as well, specifically interfaces for each of the d=
istinct services that are taken into the charter and the data exchanged acr=
oss these interfaces.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1f497d"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1f497d">--- Alex<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1f497d"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> Ideas [mailto:<a href=3D"mailt=
o:ideas-bounces@ietf.org" target=3D"_blank">ideas-bounces@ietf.org</a><wbr>=
]
<b>On Behalf Of </b>Padma Pillay-Esnault<br>
<b>Sent:</b> Saturday, May 13, 2017 5:08 PM<span class=3D""><br>
<b>To:</b> <a href=3D"mailto:ideas@ietf.org" target=3D"_blank">ideas@ietf.o=
rg</a><br>
<b>Subject:</b> [Ideas] Prep for BOF in July - Your input Needed on a Chart=
er Proposal<u></u><u></u></span></span></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">Hello IDEAS<u></u><u></u></p><div><div class=3D"h5">
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The deadline for a request for a BOF for IETF99 in J=
uly is 6/02/2017 and just a few weeks away.=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Please see below a tentative charter proposal. We wo=
uld like to have input from the list regarding the charter. We would like t=
o hear from you regarding the scope of work and your interests.<u></u><u></=
u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Proposed Charter<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">The Identity Enabled Networks (IDEAS) working group =
focuses on the framework =C2=A0to implement a common control plane for iden=
tifier=E2=80=93location separation protocols.
<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">The identifier-enabled solutions and applications ar=
e increasingly being considered to support mobility solutions across hetero=
geneous access networks, Internet of Things, Machine
 to Machine (M2M), context aware applications and security.=C2=A0 Due to th=
e diverse nature of devices and applications, it may not be possible to dep=
loy a single protocol end to end. A common control plane will address siloe=
s in discovery and communications.=C2=A0 Moreover,
 a common control plane will address the technical and operational hurdle t=
o deployment and interoperability of solutions.<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">The working group will specify an overall architectu=
re for=C2=A0 a common control plane and services for identity-enabled techn=
ology.=C2=A0 More specifically these services will include:<u></u><u></u></=
p>
<p class=3D"MsoNormal"><span style=3D"font-family:Symbol">=C2=B7</span><spa=
n style=3D"font-size:7.0pt">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span>registration and lifecycle management of identities and associated i=
dentifiers<u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-family:Symbol">=C2=B7</span><spa=
n style=3D"font-size:7.0pt">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span>identifier binding to location(s),<u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-family:Symbol">=C2=B7</span><spa=
n style=3D"font-size:7.0pt">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span>support for grouping,<u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-family:Symbol">=C2=B7</span><spa=
n style=3D"font-size:7.0pt">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span>definition and enforcement of policies<u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-family:Symbol">=C2=B7</span><spa=
n style=3D"font-size:7.0pt">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
</span>support for metadata.=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Additionally, the control plane interface and protoc=
ol extensions that allow clients to communicate with that infrastructure wi=
ll be covered.<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">The abstraction provided by a secured identity will =
give a new level of control for confidentiality, accountability, security a=
nd access-control. The working group will cover these
 aspects and balance them with the minimized storage of data and privacy co=
nsiderations.<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Specifically, the IDEAS WG is chartered to work on t=
hese areas:<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Overall architecture: This work covers the control p=
lane, management, policy control, and security aspects.<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Manageability of the architecture: The working group=
 will cover the management aspects of IDEAS architectural components and th=
e services that they provide.
<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Interface to the architecture: This work will cover =
interface interactions between the framework and identifier-enabled protoco=
l.
<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Where appropriate, the IDEAS WG will collaborate wit=
h other Working Groups to ensure interoperability with LISP, HIP, ILA and o=
ther relevant work.
<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">WG deliverables include:<u></u><u></u></p>
<p class=3D"MsoNormal">Overall architecture<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">WG sustaining/informational documents may include:<u=
></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">These documents may not necessarily be published, bu=
t may be<u></u><u></u></p>
<p class=3D"MsoNormal">maintained in a draft form or on a collaborative Wor=
king Group wiki<u></u><u></u></p>
<p class=3D"MsoNormal">to support the efforts of the Working Group and help=
 new comers:<u></u><u></u></p>
<p class=3D"MsoNormal">-Problem statement
<u></u><u></u></p>
<p class=3D"MsoNormal">-Use cases<u></u><u></u></p>
<p class=3D"MsoNormal">-Requirements<u></u><u></u></p>
<p class=3D"MsoNormal">.....<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Milestones=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">TBD<u></u><u></u></p>
</div>
</div></div></div>
</div>
</div>

</blockquote></div><br></div>

--f403045f562eb5dcd80550e7b316--


From nobody Thu Jun  1 08:30:12 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B236A1294FF for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 08:30:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UVy46YswbD9g for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 08:30:07 -0700 (PDT)
Received: from mail-wm0-x230.google.com (mail-wm0-x230.google.com [IPv6:2a00:1450:400c:c09::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D04212953F for <ideas@ietf.org>; Thu,  1 Jun 2017 08:30:06 -0700 (PDT)
Received: by mail-wm0-x230.google.com with SMTP id b84so163210141wmh.0 for <ideas@ietf.org>; Thu, 01 Jun 2017 08:30:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=VPeuMC562yk8D/D0KycYp/C1YqHdd3bk8fE/+f228lc=; b=YSOpYUaV3Mm1PNqJx6FTUpiB+7YEJ2t96Nbi890ITZJj4UWuUJWy0/KPfXtp718G+9 wx/giGchPs696nfP0D59m65Di7ZP9fEmgNll/J/DbPAZ1MaGaR0cTqtE0CJf8Nw+g+X8 IKf92OXDxeHMvaa9n1ETKxhevFsB4r/QkFDubRp9zfbvkAPhWWkJTVH48xcGWX0DxRzW cXqffgd+P3K5dmUmigBdU84yXm4a7JlPUGfSWRsi3cdljLOy7PFyPfLpPd2xnGowTAmh egchXt05dx5yC6v3cD3E0C7DMFJiSFiTe7INwUulTQBOphqchsg+RW2kHtaezsEIqWQS Tbcg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=VPeuMC562yk8D/D0KycYp/C1YqHdd3bk8fE/+f228lc=; b=MCRrQENA+9oUtl/pDwyUQl256QMFAgfi9XpgFr7iyvYiH2X6OaETUNkbi7PM0PFxTO CUafQbKd8F5Q/UxoyyFoPqZDhPpdqWQhJKvvVpb7RThvDTTDmdCRd08DKc9FXxPpfSvs QdBvqbn661YjDsCbQBZX5M7m9/IXOp5JKNUO3HH4KhdLaowFCXql+c9GEZBb1kI9YQqt H1kOE8YOdrLTllVbHK9cKd0WN7oajK3YRiTkiC0pQX/hEBBHsMlfP8/N+cKejTsy9waa OhXxciAFaroStcBE5kwKd+2pS/kFuLTPC8r6xUJ1wNibZunzSmNXmQJ6mQVqitz6ebCP aNxw==
X-Gm-Message-State: AODbwcAySIiwc5V6+gnrwG1ixdbLtWOtWSDwfo3T1eB8vBO/a8a7TWH8 8xNM9GyJYxdMShUmkUrs45AZMI0g0w==
X-Received: by 10.223.139.81 with SMTP id v17mr2005211wra.70.1496331004434; Thu, 01 Jun 2017 08:30:04 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.170.73 with HTTP; Thu, 1 Jun 2017 08:30:03 -0700 (PDT)
In-Reply-To: <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com>
References: <CAG-CQxpZeoEUE7bprXODdKTEMFc5pqTJ5_HO8SZ3OiBc=QOpbg@mail.gmail.com> <25B4902B1192E84696414485F5726854018BC2AF@SJCEML701-CHM.china.huawei.com> <CAG-CQxoDrC_9BtqqvWeK6bn=HNBrDCkqmy9or6-Jk3RbYeYEiA@mail.gmail.com> <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Thu, 1 Jun 2017 08:30:03 -0700
Message-ID: <CAG-CQxo24yo6xPwhK_yOfwMoTZpwrs6RfiOtSwHRhpvnNxDLuA@mail.gmail.com>
To: "Liubingyang (Bryan)" <liubingyang@huawei.com>
Cc: Uma Chunduri <uma.chunduri@huawei.com>, "ideas@ietf.org" <ideas@ietf.org>
Content-Type: multipart/alternative; boundary="f403045e982afc66450550e7b578"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/v9mFKmnkep2aKEBFnpCu3vcYxCw>
Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jun 2017 15:30:11 -0000

--f403045e982afc66450550e7b578
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Bingyang



On Thu, Jun 1, 2017 at 1:33 AM, Liubingyang (Bryan) <liubingyang@huawei.com=
>
wrote:

> Hi Padma,
>
>
>
> Thanks for the well edited draft. I have a problem with the following
> sentence:
>
> >> The Identity Enabled Networks (IDEAS) working group is chartered to
> develop a framework that provides services that can be used to address
> those requirements and that can be used with *any* identity-based protoco=
l
> .
>
>
>
> Does it mean that the IDEAS framework can be used by ALL EXISTING ID-base=
d
> protocols, as well as ALL FUTURE ID-base protocols? If anybody designs a
> new ID protocol in IETF in the future, the protocol should follow the
> framework? Maybe IDEAS should have a more conservative goal than that.
>
>
>
> Bingyang (Bryan)
>
>
>
> *From:* Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
> Pillay-Esnault
> *Sent:* Thursday, June 01, 2017 3:46 AM
> *To:* Uma Chunduri <uma.chunduri@huawei.com>
> *Cc:* ideas@ietf.org; Padma Pillay-Esnault <padma.ietf@gmail.com>
>
> *Subject:* Re: [Ideas] Prep for BOF in July - Your input Needed on a
> Charter Proposal
>
>
>
> Hi Uma
>
>
>
> Thanks for your review!
>
>
>
> Agree with your comments - will update
>
>
>
> Thanks
>
> Padma
>
>
>
> On Wed, May 31, 2017 at 11:38 AM, Uma Chunduri <uma.chunduri@huawei.com>
> wrote:
>
> Thanks for more refined version, which does reflect lot of discussion in
> the mailing-list on the charter.
>
> Have few comments in-line below [Uma]:
>
>
>
> --
>
> Uma C.
>
>
>
> *From:* Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
> Pillay-Esnault
> *Sent:* Wednesday, May 31, 2017 10:51 AM
> *To:* ideas@ietf.org
> *Cc:* Padma Pillay-Esnault <padma.ietf@gmail.com>
> *Subject:* Re: [Ideas] Prep for BOF in July - Your input Needed on a
> Charter Proposal
>
>
>
> Hello IDEAS
>
>
>
> Thank you for the feedback and comments on the first Charter Proposal.
>
> This version aims to capture your suggestions and comments.
>
> Please note that the document went through editorial changes for
> consistency, clarity and balance.
>
>
>
> I have also posted a version of it on GITHUB
>
> https://github.com/IETF-IDEAS/Charter-Proposal/blob/master/
> IDEAS%20Charter%20Proposal
>
>
>
> Your comments and feedback welcome.
>
>
>
> Thanks
>
> Padma
>
>
>
>
>
>
>
> Proposed Charter
>
>
>
> Identity-enabled solutions and applications are increasingly being
> considered to support mobility solutions and multi-homing across
> heterogeneous access networks. Likewise, Internet of Things (IOT),
> Machine-to-Machine (M2M) and 5G services, as well as context aware
> applications all can take advantage of discovery, stricter privacy and
> security functions.
>
>
>
> Identifier-locator separation protocols are examples of technology that
> require infrastructure that allows nodes to discover the network
> topological location(s) of its peer(s) for packet delivery.  However,
> additional infrastructure is needed to address new requirements that go
> well beyond the traditional discovery service and mapping of
> identifier-to-location for packet delivery.
>
>
>
> Examples of such requirements are:
>
> -   Privacy:  The use of long-lived and public identifiers may be
> desirable for looking up a peer, however it causes privacy issues as well=
.
> Indeed, the identifier-location pairs can be looked up without restrictio=
n
> and flows can be pinned by anybody to specific end systems.
>
> [Uma]: The above depicts the gap in current identifier-location protocols
> rather than requirement. May be you might want to add  something similar
> to=E2=80=93 =E2=80=9CPrivacy aspect is needed for looking up public ident=
ifiers and also
> for anonymizing the communication without being pinned by
> man-in-the-middle=E2=80=9D.
>
> -   Security: An identifier may reveal information to which the end-users
> may not want to be associated with. Therefore, users and network elements
> may wish to have a certain degree of control over this information to
> define who can read, write and delete it. The endpoint communications
> should be able to change their identifier while retaining their identity
> and associated policies. This indirection should help discourage
> unsolicited traffic or conceal their sensitive information to
> eavesdroppers.
>
> -  Interoperability across id-locator infrastructures:
>
> [Uma]: id-locator =C3=A8 identifier-locator (as =E2=80=99id=E2=80=99 can =
be used for both
> Identity and Identifier at this point)
>
> In IoT, often technology specific solutions drive different naming and
> addressing scheme leading to deploying disjoint systems. However, several
> IoT and 5G scenarios require that identifier-locator infrastructures are
> able to interoperate and exchange information when deployed over differen=
t
> administrative domains.
>
>  -   Low Latency: The infrastructures must strive to minimize the latency
> for mission critical applications as well as quality user experience
>
>
>
> The Identity Enabled Networks (IDEAS) working group is chartered to
> develop a framework that provides services that can be used to address
> those requirements and that can be used with any identity-based protocol.
>
> [Uma]: identity-based protocol =C3=A8 Identifier-based protocol??
>
> The framework includes the identifier-locator infrastructure and a common
> control plane for identifier related services and identifier=E2=80=93loca=
tion
> separation protocols. A common control plane is required to facilitate th=
e
> dynamic discovery of the various naming/addressing schemes and the
> communication between these heterogeneous environments
>
> Such communication may also imply some negotiation capabilities, e.g.,
> when several Mapping Systems are managed by different entities.
>
>
>
> Specifically, the IDEAS WG is chartered to work on these areas for the
> framework:
>
>
>
> Features and properties:
>
> - Registration and lifecycle management of identities associated
> identifiers.
>
> - Definition of policies related to identities (e.g. access control to
> discovery)
>
> - Anonymization support (e.g. identifier anonymity to eavesdroppers)
>
> - Authenticated identity (access to framework, update of information for
> identifiers)
>
> - Definition and enforcement of policies (e.g. ability to look up an
> identifier-locator pair, permit forwarding traffic, =E2=80=A6)
>
> - Identifier/locator mapping and resolution (e.g. discovery, pub/sub,
> multihoming..)
>
> - Metadata support (e.g. entity or endpoint attributes and properties).
>
> - Endpoint grouping support (e.g. negotiation to join, leave and
> communicate)
>
> - Robustness of the system against DDoS attacks (e.g. policies for access=
,
> rate limiting)
>
>
>
> The scope of system should be flexible and allow for different scopes suc=
h
> as local(private) or global(public). The scope of the mappings and their
> relevance within the scope will be taken into consideration for leaking o=
f
> information. The negotiation of leaking of information from the private t=
o
> global systems will be covered with the aim of minimal disruption and
> minimizing latency.
>
>
>
> The working group will balance the requirements for performance of the
> framework to provide secured, trustworthy, and robust communication
> services with the minimized storage of data and privacy considerations.
>
> The method for updating, caching and dissemination or leaking of
> information will be covered to ensure that state consistency and efficien=
cy.
>
> [Uma]: =E2=80=9CThe method for ..=E2=80=9D =C3=A8 =E2=80=9CA new Protocol=
 or an existing
> Protocol extensions for =E2=80=A6=E2=80=9D
>
> The working group will cover the management aspects of IDEAS architectura=
l
> components and the services that they provide. The working group will
> identify gaps and make recommendations on changes needed for interface
> interactions between the framework and identifier-enabled protocols
>
>
>
> The IDEAS WG will collaborate with other Working Groups to ensure
> interoperability with LISP, HIP, ILA and other relevant work . Furthermor=
e,
> it will try to reuse technologies already developed when appropriate.
>
>
>
> WG deliverables include:
>
> Overall Identity Services Framework
>
>
>
> WG sustaining/informational documents may include:
>
>
>
> These documents may not necessarily be published, but may be
>
> maintained in a draft form or on a collaborative Working Group wiki
>
> to support the efforts of the Working Group and help new comers:
>
> -Problem statement
>
> -Use cases
>
> -Requirements
>
> - Applications of the architecture for use cases
>
>
>
> Milestones
>
> Dec 2017 Adopt WG draft for the Identity Services framework
>
> May 2018 WGLC for the Identity Services framework
>
> Aug 2018 Send Identity Services framework draft to the IESG
>
>
>
>
>
>
>

--f403045e982afc66450550e7b578
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Bingyang<div><br></div><div><br></div></div><div class=
=3D"gmail_extra"><br><div class=3D"gmail_quote">On Thu, Jun 1, 2017 at 1:33=
 AM, Liubingyang (Bryan) <span dir=3D"ltr">&lt;<a href=3D"mailto:liubingyan=
g@huawei.com" target=3D"_blank">liubingyang@huawei.com</a>&gt;</span> wrote=
:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-le=
ft:1px #ccc solid;padding-left:1ex">





<div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"m_5443073686081885489WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Hi Padma,
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Thanks for the well edited draft. I =
have a problem with the following sentence:
<u></u><u></u></span></p><span class=3D"">
<p class=3D"MsoNormal" style=3D"margin-left:21.0pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif">&gt;&gt=
; The Identity Enabled Networks (IDEAS) working group is chartered to devel=
op a framework that provides services that can be used to
 address those requirements and that can be used with <b><span style=3D"col=
or:red">any</span></b><span style=3D"color:red"> identity-based protocol</s=
pan>.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
</span><p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5p=
t;font-family:&quot;Calibri&quot;,sans-serif">Does it mean that the IDEAS f=
ramework can be used by ALL EXISTING ID-based protocols, as well as ALL FUT=
URE ID-base protocols? If anybody designs a new ID protocol
 in IETF in the future, the protocol should follow the framework? Maybe IDE=
AS should have a more conservative goal than that.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Bingyang (Bryan)<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Ideas [mailto:<a href=3D"mailto:ideas-bounces@ietf.org" target=3D"_blank">i=
deas-bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Padma Pillay-Esnault<br>
<b>Sent:</b> Thursday, June 01, 2017 3:46 AM<br>
<b>To:</b> Uma Chunduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com" targ=
et=3D"_blank">uma.chunduri@huawei.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:ideas@ietf.org" target=3D"_blank">ideas@ietf.o=
rg</a>; Padma Pillay-Esnault &lt;<a href=3D"mailto:padma.ietf@gmail.com" ta=
rget=3D"_blank">padma.ietf@gmail.com</a>&gt;</span></p><div><div class=3D"h=
5"><br>
<b>Subject:</b> Re: [Ideas] Prep for BOF in July - Your input Needed on a C=
harter Proposal<u></u><u></u></div></div><p></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi Uma<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thanks for your review!<u></u><=
u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Agree with your comments - will=
 update<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thanks<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Padma<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">On Wed, May 31, 2017 at 11:38 A=
M, Uma Chunduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com" target=3D"_b=
lank">uma.chunduri@huawei.com</a>&gt; wrote:<u></u><u></u></span></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal"><a name=3D"m_5443073686081885489_m_65007996705994558=
35_m_-129160008141911"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Thanks for more refine=
d version, which
 does reflect lot of discussion in the mailing-list on the charter.</span><=
/a><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Have few comments in-l=
ine below
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:&quot;Cal=
ibri&quot;,sans-serif;color:#1f497d">[Uma]:</span><span lang=3D"EN-US"><u><=
/u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">=C2=A0</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">--</span><span lang=3D=
"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Uma C.</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">=C2=A0</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Ideas
 [mailto:<a href=3D"mailto:ideas-bounces@ietf.org" target=3D"_blank">ideas-=
bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Padma Pillay-Esnault<br>
<b>Sent:</b> Wednesday, May 31, 2017 10:51 AM<br>
<b>To:</b> <a href=3D"mailto:ideas@ietf.org" target=3D"_blank">ideas@ietf.o=
rg</a><br>
<b>Cc:</b> Padma Pillay-Esnault &lt;<a href=3D"mailto:padma.ietf@gmail.com"=
 target=3D"_blank">padma.ietf@gmail.com</a>&gt;<br>
<b>Subject:</b> Re: [Ideas] Prep for BOF in July - Your input Needed on a C=
harter Proposal</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Hello=
 IDEAS</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Thank=
 you for the feedback and comments on the first Charter Proposal.</span><sp=
an lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">This =
version aims to capture your suggestions and comments.</span><span lang=3D"=
EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Pleas=
e note that the document went through editorial changes for consistency, cl=
arity and balance.</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">I hav=
e also posted a version of it on GITHUB =C2=A0</span><span lang=3D"EN-US"><=
u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><a href=3D"https://github.com/I=
ETF-IDEAS/Charter-Proposal/blob/master/IDEAS%20Charter%20Proposal" target=
=3D"_blank"><span style=3D"font-size:9.5pt">https://github.com/IETF-IDEAS/<=
wbr>Charter-Proposal/blob/master/<wbr>IDEAS%20Charter%20Proposal</span></a>=
<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Your =
comments and feedback welcome.</span><span lang=3D"EN-US"><u></u><u></u></s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Thank=
s</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Padma=
</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Propo=
sed Charter=C2=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identity-enabled solutions and =
applications are increasingly being considered to support mobility solution=
s and multi-homing across heterogeneous access networks.
 Likewise, Internet of Things (IOT), Machine-to-Machine (M2M) and 5G servic=
es, as well as context aware applications all can take advantage of discove=
ry, stricter privacy and security functions.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identifier-locator separation p=
rotocols are examples of technology that require infrastructure that allows=
 nodes to discover the network topological location(s)
 of its peer(s) for packet delivery.=C2=A0 However, additional infrastructu=
re is needed to address new requirements that go well beyond the traditiona=
l discovery service and mapping of identifier-to-location for packet delive=
ry.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Examples of such requirements a=
re:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-=C2=A0=C2=A0 Privacy: =C2=A0Th=
e use of long-lived and public identifiers may be desirable for looking up =
a peer, however it causes privacy issues as well. Indeed, the identifier-lo=
cation
 pairs can be looked up without restriction and flows can be pinned by anyb=
ody to specific end systems.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: The above depic=
ts the gap in current identifier-location protocols rather than
 requirement. May be you might want to add =C2=A0something similar to=E2=80=
=93 =E2=80=9CPrivacy aspect is needed for looking up public identifiers and=
 also for anonymizing the communication without being pinned by man-in-the-=
middle=E2=80=9D.</span><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">-</span><span lang=3D"=
EN-US">=C2=A0=C2=A0 Security: An identifier may reveal information to which
 the end-users may not want to be associated with. Therefore, users and net=
work elements may wish to have a certain degree of control over this inform=
ation to define who can read, write and delete it. The endpoint communicati=
ons should be able to change their
 identifier while retaining their identity and associated policies. This in=
direction should help discourage unsolicited traffic or conceal their sensi=
tive information to eavesdroppers.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-=C2=A0 Interoperability across=
 id-locator infrastructures:
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: id-locator
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> identifier-loca=
tor (as =E2=80=99id=E2=80=99 can be used for both Identity and Identifier
 at this point)</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In IoT, often technology specif=
ic solutions drive different naming and addressing scheme leading to deploy=
ing disjoint systems. However, several IoT and 5G scenarios
 require that identifier-locator infrastructures are able to interoperate a=
nd exchange information when deployed over different administrative domains=
.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0-=C2=A0=C2=A0 Low Latency=
: The infrastructures must strive to minimize the latency for mission criti=
cal applications as well as quality user experience
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The Identity Enabled Networks (=
IDEAS) working group is chartered to develop a framework that provides serv=
ices that can be used to address those requirements
 and that can be used with any identity-based protocol. <u></u><u></u></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: identity-based =
protocol
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> Identifier-base=
d protocol??</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The framework includes the iden=
tifier-locator infrastructure and a common control plane for identifier rel=
ated services and identifier=E2=80=93location separation protocols.
 A common control plane is required to facilitate the dynamic discovery of =
the various naming/addressing schemes and the communication between these h=
eterogeneous environments<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Such communication may also imp=
ly some negotiation capabilities, e.g., when several Mapping Systems are ma=
naged by different entities.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Specifically, the IDEAS WG is c=
hartered to work on these areas for the framework:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Features and properties:<u></u>=
<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Registration and lifecycle ma=
nagement of identities associated identifiers.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Definition of policies relate=
d to identities (e.g. access control to discovery)=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Anonymization support (e.g. i=
dentifier anonymity to eavesdroppers)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Authenticated identity (acces=
s to framework, update of information for identifiers)
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Definition and enforcement of=
 policies (e.g. ability to look up an identifier-locator pair, permit forwa=
rding traffic, =E2=80=A6)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Identifier/locator mapping an=
d resolution (e.g. discovery, pub/sub, multihoming..)<u></u><u></u></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Metadata support (e.g. entity=
 or endpoint attributes and properties).
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Endpoint grouping support (e.=
g. negotiation to join, leave and communicate)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Robustness of the system agai=
nst DDoS attacks (e.g. policies for access, rate limiting)<u></u><u></u></s=
pan></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The scope of system should be f=
lexible and allow for different scopes such as local(private) or global(pub=
lic). The scope of the mappings and their relevance
 within the scope will be taken into consideration for leaking of informati=
on. The negotiation of leaking of information from the private to global sy=
stems will be covered with the aim of minimal disruption and minimizing lat=
ency.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The working group will balance =
the requirements for performance of the framework to provide secured, trust=
worthy, and robust communication services with the minimized
 storage of data and privacy considerations. <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The method for updating, cachin=
g and dissemination or leaking of information will be covered to ensure tha=
t state consistency and efficiency.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: =E2=80=9CThe me=
thod for ..=E2=80=9D
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> =E2=80=9CA new =
Protocol or an existing Protocol=C2=A0extensions for =E2=80=A6=E2=80=9D</sp=
an><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The working group will cover th=
e management aspects of IDEAS architectural components and the services tha=
t they provide. The working group will identify gaps
 and make recommendations on changes needed for interface interactions betw=
een the framework and identifier-enabled protocols<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The IDEAS WG will collaborate w=
ith other Working Groups to ensure interoperability with LISP, HIP, ILA and=
 other relevant work . Furthermore, it will try to reuse
 technologies already developed when appropriate.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">WG deliverables include:<u></u>=
<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Overall Identity Services Frame=
work
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">WG sustaining/informational doc=
uments may include:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">These documents may not necessa=
rily be published, but may be<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">maintained in a draft form or o=
n a collaborative Working Group wiki<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">to support the efforts of the W=
orking Group and help new comers:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Problem statement
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Use cases<u></u><u></u></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Requirements<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Applications of the architect=
ure for use cases<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Milestones
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Dec 2017 Adopt WG draft for the=
 Identity Services framework<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">May 2018 WGLC for the Identity =
Services framework<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Aug 2018 Send Identity Services=
 framework draft to the IESG<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Camb=
ria&quot;,serif">=C2=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
</div>
</div>
</div></div></div>
</div>

</blockquote></div><br></div>

--f403045e982afc66450550e7b578--


From nobody Thu Jun  1 08:32:31 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B720C12ECC3 for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 08:32:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AXammpLYEIPD for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 08:32:27 -0700 (PDT)
Received: from mail-wm0-x22a.google.com (mail-wm0-x22a.google.com [IPv6:2a00:1450:400c:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DB2F129549 for <ideas@ietf.org>; Thu,  1 Jun 2017 08:32:26 -0700 (PDT)
Received: by mail-wm0-x22a.google.com with SMTP id n195so37219363wmg.1 for <ideas@ietf.org>; Thu, 01 Jun 2017 08:32:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=T2tfdGi9l95wuz7hW1NvHUo8EY8pPTX1FEBDvj7gOM0=; b=Rpvmq0YbzDcsKLw/jEEgCIyavZuf3HhFzWGk9yPjl2YoqkgnTl2wBoXOTx5Piw+smG 0OQIRHjzfX3KpNY2FgHkRi5BfZCKvFmqAcdPo52Th9heNUfUY10ChYl1PrXXP4TkhiGV 6PqweV1yLcRW4m/m8J491v2ZkBsaqh5jN/OOaQukAj5kI4Rj5yop1sLxP+Os+lFgmCYV 6wAQ/7mlGKx9eKMCoNVmm4xYP+A5mgJ9WL7eZa3sb5/qlmMP536N9aqz4MKKVvTXEaqY lS8UmcCzypHK5dml/rqJAegbEr4c0hyDqczfWdOJIdsgazeAjUuSOIIJsaEhKEIbCIek Apug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=T2tfdGi9l95wuz7hW1NvHUo8EY8pPTX1FEBDvj7gOM0=; b=DZHHBM+bd5nVWXRZFVOo1ACUkP0Zf2cTeg5jzcWLNWr30SjaHNBsOoS1YU6IEmSiTB Ta+VhOElD8D4mLzgfQZTj1oArNK4qQSKix+Pi+5dpP9lNDoABkm/8xcZfDMhk2q+fEOj 1AUjTbTcN9GHF/n8HivMz3MpnbBi6vv6JL764ufTGsQ+QWVPjkjFYbN3QGtXCkgZa7h6 rsgUFBU+wd+qEDi5KGZgCUaqPdTuNweE/od0dcj2SzLuGK/rk+9DRB6DxDSoLOqpQEEB H3NX3OJE9Fa8wV1UBHN0BAJ4r/1NPG1iH+Dae29Xj8D5uRKrsV1ZZF+Zerj/pkjqHW8N E7PA==
X-Gm-Message-State: AODbwcBlTmEic2vzCjXSY64q/7oaCDYKtahrEKia3DpPeHMLgZTtgMhL ZrIHjfMSX5nl70em3O5aBwyf6KCddQ==
X-Received: by 10.28.38.68 with SMTP id m65mr2326569wmm.25.1496331144047; Thu, 01 Jun 2017 08:32:24 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.170.73 with HTTP; Thu, 1 Jun 2017 08:32:23 -0700 (PDT)
In-Reply-To: <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com>
References: <CAG-CQxpZeoEUE7bprXODdKTEMFc5pqTJ5_HO8SZ3OiBc=QOpbg@mail.gmail.com> <25B4902B1192E84696414485F5726854018BC2AF@SJCEML701-CHM.china.huawei.com> <CAG-CQxoDrC_9BtqqvWeK6bn=HNBrDCkqmy9or6-Jk3RbYeYEiA@mail.gmail.com> <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Thu, 1 Jun 2017 08:32:23 -0700
Message-ID: <CAG-CQxpTyYLG0NpZqp-bsPn=D7a-4crGnq6jO3pj0SD_DHN3QA@mail.gmail.com>
To: "Liubingyang (Bryan)" <liubingyang@huawei.com>
Cc: Uma Chunduri <uma.chunduri@huawei.com>, "ideas@ietf.org" <ideas@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c03fc364eb6b80550e7be14"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/OEYCZSxCXxCeAc6Yv7-_7q_b9GM>
Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jun 2017 15:32:30 -0000

--94eb2c03fc364eb6b80550e7be14
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Bingyang

On Thu, Jun 1, 2017 at 1:33 AM, Liubingyang (Bryan) <liubingyang@huawei.com=
>
wrote:

> Hi Padma,
>
>
>
> Thanks for the well edited draft. I have a problem with the following
> sentence:
>
> >> The Identity Enabled Networks (IDEAS) working group is chartered to
> develop a framework that provides services that can be used to address
> those requirements and that can be used with *any* identity-based protoco=
l
> .
>
>
>
> Does it mean that the IDEAS framework can be used by ALL EXISTING ID-base=
d
> protocols, as well as ALL FUTURE ID-base protocols? If anybody designs a
> new ID protocol in IETF in the future, the protocol should follow the
> framework? Maybe IDEAS should have a more conservative goal than that.
>
>
>

How about change "with any" to "by"?
I think this should clarify that protocols could use this framework should
they wish to do so.

Thanks
Padma


> Bingyang (Bryan)
>
>
>
> *From:* Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
> Pillay-Esnault
> *Sent:* Thursday, June 01, 2017 3:46 AM
> *To:* Uma Chunduri <uma.chunduri@huawei.com>
> *Cc:* ideas@ietf.org; Padma Pillay-Esnault <padma.ietf@gmail.com>
>
> *Subject:* Re: [Ideas] Prep for BOF in July - Your input Needed on a
> Charter Proposal
>
>
>
> Hi Uma
>
>
>
> Thanks for your review!
>
>
>
> Agree with your comments - will update
>
>
>
> Thanks
>
> Padma
>
>
>
> On Wed, May 31, 2017 at 11:38 AM, Uma Chunduri <uma.chunduri@huawei.com>
> wrote:
>
> Thanks for more refined version, which does reflect lot of discussion in
> the mailing-list on the charter.
>
> Have few comments in-line below [Uma]:
>
>
>
> --
>
> Uma C.
>
>
>
> *From:* Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
> Pillay-Esnault
> *Sent:* Wednesday, May 31, 2017 10:51 AM
> *To:* ideas@ietf.org
> *Cc:* Padma Pillay-Esnault <padma.ietf@gmail.com>
> *Subject:* Re: [Ideas] Prep for BOF in July - Your input Needed on a
> Charter Proposal
>
>
>
> Hello IDEAS
>
>
>
> Thank you for the feedback and comments on the first Charter Proposal.
>
> This version aims to capture your suggestions and comments.
>
> Please note that the document went through editorial changes for
> consistency, clarity and balance.
>
>
>
> I have also posted a version of it on GITHUB
>
> https://github.com/IETF-IDEAS/Charter-Proposal/blob/master/
> IDEAS%20Charter%20Proposal
>
>
>
> Your comments and feedback welcome.
>
>
>
> Thanks
>
> Padma
>
>
>
>
>
>
>
> Proposed Charter
>
>
>
> Identity-enabled solutions and applications are increasingly being
> considered to support mobility solutions and multi-homing across
> heterogeneous access networks. Likewise, Internet of Things (IOT),
> Machine-to-Machine (M2M) and 5G services, as well as context aware
> applications all can take advantage of discovery, stricter privacy and
> security functions.
>
>
>
> Identifier-locator separation protocols are examples of technology that
> require infrastructure that allows nodes to discover the network
> topological location(s) of its peer(s) for packet delivery.  However,
> additional infrastructure is needed to address new requirements that go
> well beyond the traditional discovery service and mapping of
> identifier-to-location for packet delivery.
>
>
>
> Examples of such requirements are:
>
> -   Privacy:  The use of long-lived and public identifiers may be
> desirable for looking up a peer, however it causes privacy issues as well=
.
> Indeed, the identifier-location pairs can be looked up without restrictio=
n
> and flows can be pinned by anybody to specific end systems.
>
> [Uma]: The above depicts the gap in current identifier-location protocols
> rather than requirement. May be you might want to add  something similar
> to=E2=80=93 =E2=80=9CPrivacy aspect is needed for looking up public ident=
ifiers and also
> for anonymizing the communication without being pinned by
> man-in-the-middle=E2=80=9D.
>
> -   Security: An identifier may reveal information to which the end-users
> may not want to be associated with. Therefore, users and network elements
> may wish to have a certain degree of control over this information to
> define who can read, write and delete it. The endpoint communications
> should be able to change their identifier while retaining their identity
> and associated policies. This indirection should help discourage
> unsolicited traffic or conceal their sensitive information to
> eavesdroppers.
>
> -  Interoperability across id-locator infrastructures:
>
> [Uma]: id-locator =C3=A8 identifier-locator (as =E2=80=99id=E2=80=99 can =
be used for both
> Identity and Identifier at this point)
>
> In IoT, often technology specific solutions drive different naming and
> addressing scheme leading to deploying disjoint systems. However, several
> IoT and 5G scenarios require that identifier-locator infrastructures are
> able to interoperate and exchange information when deployed over differen=
t
> administrative domains.
>
>  -   Low Latency: The infrastructures must strive to minimize the latency
> for mission critical applications as well as quality user experience
>
>
>
> The Identity Enabled Networks (IDEAS) working group is chartered to
> develop a framework that provides services that can be used to address
> those requirements and that can be used with any identity-based protocol.
>
> [Uma]: identity-based protocol =C3=A8 Identifier-based protocol??
>
> The framework includes the identifier-locator infrastructure and a common
> control plane for identifier related services and identifier=E2=80=93loca=
tion
> separation protocols. A common control plane is required to facilitate th=
e
> dynamic discovery of the various naming/addressing schemes and the
> communication between these heterogeneous environments
>
> Such communication may also imply some negotiation capabilities, e.g.,
> when several Mapping Systems are managed by different entities.
>
>
>
> Specifically, the IDEAS WG is chartered to work on these areas for the
> framework:
>
>
>
> Features and properties:
>
> - Registration and lifecycle management of identities associated
> identifiers.
>
> - Definition of policies related to identities (e.g. access control to
> discovery)
>
> - Anonymization support (e.g. identifier anonymity to eavesdroppers)
>
> - Authenticated identity (access to framework, update of information for
> identifiers)
>
> - Definition and enforcement of policies (e.g. ability to look up an
> identifier-locator pair, permit forwarding traffic, =E2=80=A6)
>
> - Identifier/locator mapping and resolution (e.g. discovery, pub/sub,
> multihoming..)
>
> - Metadata support (e.g. entity or endpoint attributes and properties).
>
> - Endpoint grouping support (e.g. negotiation to join, leave and
> communicate)
>
> - Robustness of the system against DDoS attacks (e.g. policies for access=
,
> rate limiting)
>
>
>
> The scope of system should be flexible and allow for different scopes suc=
h
> as local(private) or global(public). The scope of the mappings and their
> relevance within the scope will be taken into consideration for leaking o=
f
> information. The negotiation of leaking of information from the private t=
o
> global systems will be covered with the aim of minimal disruption and
> minimizing latency.
>
>
>
> The working group will balance the requirements for performance of the
> framework to provide secured, trustworthy, and robust communication
> services with the minimized storage of data and privacy considerations.
>
> The method for updating, caching and dissemination or leaking of
> information will be covered to ensure that state consistency and efficien=
cy.
>
> [Uma]: =E2=80=9CThe method for ..=E2=80=9D =C3=A8 =E2=80=9CA new Protocol=
 or an existing
> Protocol extensions for =E2=80=A6=E2=80=9D
>
> The working group will cover the management aspects of IDEAS architectura=
l
> components and the services that they provide. The working group will
> identify gaps and make recommendations on changes needed for interface
> interactions between the framework and identifier-enabled protocols
>
>
>
> The IDEAS WG will collaborate with other Working Groups to ensure
> interoperability with LISP, HIP, ILA and other relevant work . Furthermor=
e,
> it will try to reuse technologies already developed when appropriate.
>
>
>
> WG deliverables include:
>
> Overall Identity Services Framework
>
>
>
> WG sustaining/informational documents may include:
>
>
>
> These documents may not necessarily be published, but may be
>
> maintained in a draft form or on a collaborative Working Group wiki
>
> to support the efforts of the Working Group and help new comers:
>
> -Problem statement
>
> -Use cases
>
> -Requirements
>
> - Applications of the architecture for use cases
>
>
>
> Milestones
>
> Dec 2017 Adopt WG draft for the Identity Services framework
>
> May 2018 WGLC for the Identity Services framework
>
> Aug 2018 Send Identity Services framework draft to the IESG
>
>
>
>
>
>
>

--94eb2c03fc364eb6b80550e7be14
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Bingyang<div class=3D"gmail_extra"><br><div class=3D"gm=
ail_quote">On Thu, Jun 1, 2017 at 1:33 AM, Liubingyang (Bryan) <span dir=3D=
"ltr">&lt;<a href=3D"mailto:liubingyang@huawei.com" target=3D"_blank">liubi=
ngyang@huawei.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote=
" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"m_5443073686081885489WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Hi Padma,
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Thanks for the well edited draft. I =
have a problem with the following sentence:
<u></u><u></u></span></p><span class=3D"">
<p class=3D"MsoNormal" style=3D"margin-left:21.0pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif">&gt;&gt=
; The Identity Enabled Networks (IDEAS) working group is chartered to devel=
op a framework that provides services that can be used to
 address those requirements and that can be used with <b><span style=3D"col=
or:red">any</span></b><span style=3D"color:red"> identity-based protocol</s=
pan>.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
</span><p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5p=
t;font-family:&quot;Calibri&quot;,sans-serif">Does it mean that the IDEAS f=
ramework can be used by ALL EXISTING ID-based protocols, as well as ALL FUT=
URE ID-base protocols? If anybody designs a new ID protocol
 in IETF in the future, the protocol should follow the framework? Maybe IDE=
AS should have a more conservative goal than that.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0</span></p></div></div>=
</blockquote><div><br></div><div>How about change &quot;with any&quot; to &=
quot;by&quot;?</div><div>I think this should clarify that protocols could u=
se this framework should they wish to do so.</div><div><br></div><div>Thank=
s</div><div>Padma</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div=
 lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple"><div class=3D"m_544307368608=
1885489WordSection1"><p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"f=
ont-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif"><u></u></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Bingyang (Bryan)<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Ideas [mailto:<a href=3D"mailto:ideas-bounces@ietf.org" target=3D"_blank">i=
deas-bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Padma Pillay-Esnault<br>
<b>Sent:</b> Thursday, June 01, 2017 3:46 AM<br>
<b>To:</b> Uma Chunduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com" targ=
et=3D"_blank">uma.chunduri@huawei.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:ideas@ietf.org" target=3D"_blank">ideas@ietf.o=
rg</a>; Padma Pillay-Esnault &lt;<a href=3D"mailto:padma.ietf@gmail.com" ta=
rget=3D"_blank">padma.ietf@gmail.com</a>&gt;</span></p><div><div class=3D"h=
5"><br>
<b>Subject:</b> Re: [Ideas] Prep for BOF in July - Your input Needed on a C=
harter Proposal<u></u><u></u></div></div><p></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi Uma<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thanks for your review!<u></u><=
u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Agree with your comments - will=
 update<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thanks<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Padma<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">On Wed, May 31, 2017 at 11:38 A=
M, Uma Chunduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com" target=3D"_b=
lank">uma.chunduri@huawei.com</a>&gt; wrote:<u></u><u></u></span></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal"><a name=3D"m_5443073686081885489_m_65007996705994558=
35_m_-129160008141911"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Thanks for more refine=
d version, which
 does reflect lot of discussion in the mailing-list on the charter.</span><=
/a><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Have few comments in-l=
ine below
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:&quot;Cal=
ibri&quot;,sans-serif;color:#1f497d">[Uma]:</span><span lang=3D"EN-US"><u><=
/u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">=C2=A0</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">--</span><span lang=3D=
"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Uma C.</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">=C2=A0</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Ideas
 [mailto:<a href=3D"mailto:ideas-bounces@ietf.org" target=3D"_blank">ideas-=
bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Padma Pillay-Esnault<br>
<b>Sent:</b> Wednesday, May 31, 2017 10:51 AM<br>
<b>To:</b> <a href=3D"mailto:ideas@ietf.org" target=3D"_blank">ideas@ietf.o=
rg</a><br>
<b>Cc:</b> Padma Pillay-Esnault &lt;<a href=3D"mailto:padma.ietf@gmail.com"=
 target=3D"_blank">padma.ietf@gmail.com</a>&gt;<br>
<b>Subject:</b> Re: [Ideas] Prep for BOF in July - Your input Needed on a C=
harter Proposal</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Hello=
 IDEAS</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Thank=
 you for the feedback and comments on the first Charter Proposal.</span><sp=
an lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">This =
version aims to capture your suggestions and comments.</span><span lang=3D"=
EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Pleas=
e note that the document went through editorial changes for consistency, cl=
arity and balance.</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">I hav=
e also posted a version of it on GITHUB =C2=A0</span><span lang=3D"EN-US"><=
u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><a href=3D"https://github.com/I=
ETF-IDEAS/Charter-Proposal/blob/master/IDEAS%20Charter%20Proposal" target=
=3D"_blank"><span style=3D"font-size:9.5pt">https://github.com/IETF-IDEAS/<=
wbr>Charter-Proposal/blob/master/<wbr>IDEAS%20Charter%20Proposal</span></a>=
<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Your =
comments and feedback welcome.</span><span lang=3D"EN-US"><u></u><u></u></s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Thank=
s</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Padma=
</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Propo=
sed Charter=C2=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identity-enabled solutions and =
applications are increasingly being considered to support mobility solution=
s and multi-homing across heterogeneous access networks.
 Likewise, Internet of Things (IOT), Machine-to-Machine (M2M) and 5G servic=
es, as well as context aware applications all can take advantage of discove=
ry, stricter privacy and security functions.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identifier-locator separation p=
rotocols are examples of technology that require infrastructure that allows=
 nodes to discover the network topological location(s)
 of its peer(s) for packet delivery.=C2=A0 However, additional infrastructu=
re is needed to address new requirements that go well beyond the traditiona=
l discovery service and mapping of identifier-to-location for packet delive=
ry.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Examples of such requirements a=
re:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-=C2=A0=C2=A0 Privacy: =C2=A0Th=
e use of long-lived and public identifiers may be desirable for looking up =
a peer, however it causes privacy issues as well. Indeed, the identifier-lo=
cation
 pairs can be looked up without restriction and flows can be pinned by anyb=
ody to specific end systems.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: The above depic=
ts the gap in current identifier-location protocols rather than
 requirement. May be you might want to add =C2=A0something similar to=E2=80=
=93 =E2=80=9CPrivacy aspect is needed for looking up public identifiers and=
 also for anonymizing the communication without being pinned by man-in-the-=
middle=E2=80=9D.</span><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">-</span><span lang=3D"=
EN-US">=C2=A0=C2=A0 Security: An identifier may reveal information to which
 the end-users may not want to be associated with. Therefore, users and net=
work elements may wish to have a certain degree of control over this inform=
ation to define who can read, write and delete it. The endpoint communicati=
ons should be able to change their
 identifier while retaining their identity and associated policies. This in=
direction should help discourage unsolicited traffic or conceal their sensi=
tive information to eavesdroppers.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-=C2=A0 Interoperability across=
 id-locator infrastructures:
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: id-locator
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> identifier-loca=
tor (as =E2=80=99id=E2=80=99 can be used for both Identity and Identifier
 at this point)</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In IoT, often technology specif=
ic solutions drive different naming and addressing scheme leading to deploy=
ing disjoint systems. However, several IoT and 5G scenarios
 require that identifier-locator infrastructures are able to interoperate a=
nd exchange information when deployed over different administrative domains=
.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0-=C2=A0=C2=A0 Low Latency=
: The infrastructures must strive to minimize the latency for mission criti=
cal applications as well as quality user experience
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The Identity Enabled Networks (=
IDEAS) working group is chartered to develop a framework that provides serv=
ices that can be used to address those requirements
 and that can be used with any identity-based protocol. <u></u><u></u></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: identity-based =
protocol
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> Identifier-base=
d protocol??</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The framework includes the iden=
tifier-locator infrastructure and a common control plane for identifier rel=
ated services and identifier=E2=80=93location separation protocols.
 A common control plane is required to facilitate the dynamic discovery of =
the various naming/addressing schemes and the communication between these h=
eterogeneous environments<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Such communication may also imp=
ly some negotiation capabilities, e.g., when several Mapping Systems are ma=
naged by different entities.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Specifically, the IDEAS WG is c=
hartered to work on these areas for the framework:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Features and properties:<u></u>=
<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Registration and lifecycle ma=
nagement of identities associated identifiers.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Definition of policies relate=
d to identities (e.g. access control to discovery)=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Anonymization support (e.g. i=
dentifier anonymity to eavesdroppers)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Authenticated identity (acces=
s to framework, update of information for identifiers)
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Definition and enforcement of=
 policies (e.g. ability to look up an identifier-locator pair, permit forwa=
rding traffic, =E2=80=A6)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Identifier/locator mapping an=
d resolution (e.g. discovery, pub/sub, multihoming..)<u></u><u></u></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Metadata support (e.g. entity=
 or endpoint attributes and properties).
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Endpoint grouping support (e.=
g. negotiation to join, leave and communicate)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Robustness of the system agai=
nst DDoS attacks (e.g. policies for access, rate limiting)<u></u><u></u></s=
pan></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The scope of system should be f=
lexible and allow for different scopes such as local(private) or global(pub=
lic). The scope of the mappings and their relevance
 within the scope will be taken into consideration for leaking of informati=
on. The negotiation of leaking of information from the private to global sy=
stems will be covered with the aim of minimal disruption and minimizing lat=
ency.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The working group will balance =
the requirements for performance of the framework to provide secured, trust=
worthy, and robust communication services with the minimized
 storage of data and privacy considerations. <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The method for updating, cachin=
g and dissemination or leaking of information will be covered to ensure tha=
t state consistency and efficiency.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: =E2=80=9CThe me=
thod for ..=E2=80=9D
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> =E2=80=9CA new =
Protocol or an existing Protocol=C2=A0extensions for =E2=80=A6=E2=80=9D</sp=
an><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The working group will cover th=
e management aspects of IDEAS architectural components and the services tha=
t they provide. The working group will identify gaps
 and make recommendations on changes needed for interface interactions betw=
een the framework and identifier-enabled protocols<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The IDEAS WG will collaborate w=
ith other Working Groups to ensure interoperability with LISP, HIP, ILA and=
 other relevant work . Furthermore, it will try to reuse
 technologies already developed when appropriate.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">WG deliverables include:<u></u>=
<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Overall Identity Services Frame=
work
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">WG sustaining/informational doc=
uments may include:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">These documents may not necessa=
rily be published, but may be<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">maintained in a draft form or o=
n a collaborative Working Group wiki<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">to support the efforts of the W=
orking Group and help new comers:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Problem statement
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Use cases<u></u><u></u></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Requirements<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Applications of the architect=
ure for use cases<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Milestones
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Dec 2017 Adopt WG draft for the=
 Identity Services framework<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">May 2018 WGLC for the Identity =
Services framework<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Aug 2018 Send Identity Services=
 framework draft to the IESG<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Camb=
ria&quot;,serif">=C2=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
</div>
</div>
</div></div></div>
</div>

</blockquote></div><br></div></div>

--94eb2c03fc364eb6b80550e7be14--


From nobody Thu Jun  1 18:17:13 2017
Return-Path: <liubingyang@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38CD7129B91 for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 18:17:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level: 
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S8uNc2ADJ0vI for <ideas@ietfa.amsl.com>; Thu,  1 Jun 2017 18:17:09 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D724B129B7A for <ideas@ietf.org>; Thu,  1 Jun 2017 18:17:08 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DHT06566; Fri, 02 Jun 2017 01:17:06 +0000 (GMT)
Received: from SZXEMI414-HUB.china.huawei.com (10.86.210.49) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.301.0; Fri, 2 Jun 2017 02:17:04 +0100
Received: from SZXEMI508-MBS.china.huawei.com ([169.254.10.154]) by SZXEMI414-HUB.china.huawei.com ([10.86.210.49]) with mapi id 14.03.0235.001; Fri, 2 Jun 2017 09:16:52 +0800
From: "Liubingyang (Bryan)" <liubingyang@huawei.com>
To: Padma Pillay-Esnault <padma.ietf@gmail.com>
CC: Uma Chunduri <uma.chunduri@huawei.com>, "ideas@ietf.org" <ideas@ietf.org>
Thread-Topic: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
Thread-Index: AQHS2jZ2e/PNFODRoUWJ3h66M6A23qIOP72AgAASxgCAAVm9IP//8b6AgAEnnwA=
Date: Fri, 2 Jun 2017 01:16:52 +0000
Message-ID: <C1CE72EE84AF224E94DA21AE134209EE0104F82A@SZXEMI508-MBS.china.huawei.com>
References: <CAG-CQxpZeoEUE7bprXODdKTEMFc5pqTJ5_HO8SZ3OiBc=QOpbg@mail.gmail.com> <25B4902B1192E84696414485F5726854018BC2AF@SJCEML701-CHM.china.huawei.com> <CAG-CQxoDrC_9BtqqvWeK6bn=HNBrDCkqmy9or6-Jk3RbYeYEiA@mail.gmail.com> <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com> <CAG-CQxpTyYLG0NpZqp-bsPn=D7a-4crGnq6jO3pj0SD_DHN3QA@mail.gmail.com>
In-Reply-To: <CAG-CQxpTyYLG0NpZqp-bsPn=D7a-4crGnq6jO3pj0SD_DHN3QA@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.130.168.116]
Content-Type: multipart/alternative; boundary="_000_C1CE72EE84AF224E94DA21AE134209EE0104F82ASZXEMI508MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090206.5930BC92.01C7, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.10.154, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 370d666a4272636a82bd0ea4cd42a1a8
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/V56e6Uy2gHFjtuE--1tTQmBptLI>
Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Jun 2017 01:17:12 -0000

--_000_C1CE72EE84AF224E94DA21AE134209EE0104F82ASZXEMI508MBSchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

WWVzLCBJIGFsc28gdGhpbmsgdGhlIHByb3RvY29scyBzaG91bGQgdXNlIHRoZSBmcmFtZXdvcmsg
YXMgdGhlaXIgd2lsbC4NCkFub3RoZXIgcXVlc3Rpb24gaXMgd2hldGhlciBmdXR1cmUgSUQgcHJv
dG9jb2xzIG11c3QgYmUgY29tcGF0aWJsZSB3aXRoIHRoZSBmcmFtZXdvcmssIGJ1dCBJIHRoaW5r
IHdlIGNhbiBkZWZlciBhbnN3ZXJpbmcgdGhlIHF1ZXN0aW9uIHRvIHRoZSBmcmFtZXdvcmsgUkZD
Lg0KDQpCaW5neWFuZw0KDQpGcm9tOiBQYWRtYSBQaWxsYXktRXNuYXVsdCBbbWFpbHRvOnBhZG1h
LmlldGZAZ21haWwuY29tXQ0KU2VudDogVGh1cnNkYXksIEp1bmUgMDEsIDIwMTcgMTE6MzIgUE0N
ClRvOiBMaXViaW5neWFuZyAoQnJ5YW4pIDxsaXViaW5neWFuZ0BodWF3ZWkuY29tPg0KQ2M6IFVt
YSBDaHVuZHVyaSA8dW1hLmNodW5kdXJpQGh1YXdlaS5jb20+OyBpZGVhc0BpZXRmLm9yZw0KU3Vi
amVjdDogUmU6IFtJZGVhc10gUHJlcCBmb3IgQk9GIGluIEp1bHkgLSBZb3VyIGlucHV0IE5lZWRl
ZCBvbiBhIENoYXJ0ZXIgUHJvcG9zYWwNCg0KSGkgQmluZ3lhbmcNCg0KT24gVGh1LCBKdW4gMSwg
MjAxNyBhdCAxOjMzIEFNLCBMaXViaW5neWFuZyAoQnJ5YW4pIDxsaXViaW5neWFuZ0BodWF3ZWku
Y29tPG1haWx0bzpsaXViaW5neWFuZ0BodWF3ZWkuY29tPj4gd3JvdGU6DQpIaSBQYWRtYSwNCg0K
VGhhbmtzIGZvciB0aGUgd2VsbCBlZGl0ZWQgZHJhZnQuIEkgaGF2ZSBhIHByb2JsZW0gd2l0aCB0
aGUgZm9sbG93aW5nIHNlbnRlbmNlOg0KPj4gVGhlIElkZW50aXR5IEVuYWJsZWQgTmV0d29ya3Mg
KElERUFTKSB3b3JraW5nIGdyb3VwIGlzIGNoYXJ0ZXJlZCB0byBkZXZlbG9wIGEgZnJhbWV3b3Jr
IHRoYXQgcHJvdmlkZXMgc2VydmljZXMgdGhhdCBjYW4gYmUgdXNlZCB0byBhZGRyZXNzIHRob3Nl
IHJlcXVpcmVtZW50cyBhbmQgdGhhdCBjYW4gYmUgdXNlZCB3aXRoIGFueSBpZGVudGl0eS1iYXNl
ZCBwcm90b2NvbC4NCg0KRG9lcyBpdCBtZWFuIHRoYXQgdGhlIElERUFTIGZyYW1ld29yayBjYW4g
YmUgdXNlZCBieSBBTEwgRVhJU1RJTkcgSUQtYmFzZWQgcHJvdG9jb2xzLCBhcyB3ZWxsIGFzIEFM
TCBGVVRVUkUgSUQtYmFzZSBwcm90b2NvbHM/IElmIGFueWJvZHkgZGVzaWducyBhIG5ldyBJRCBw
cm90b2NvbCBpbiBJRVRGIGluIHRoZSBmdXR1cmUsIHRoZSBwcm90b2NvbCBzaG91bGQgZm9sbG93
IHRoZSBmcmFtZXdvcms/IE1heWJlIElERUFTIHNob3VsZCBoYXZlIGEgbW9yZSBjb25zZXJ2YXRp
dmUgZ29hbCB0aGFuIHRoYXQuDQoNCg0KSG93IGFib3V0IGNoYW5nZSAid2l0aCBhbnkiIHRvICJi
eSI/DQpJIHRoaW5rIHRoaXMgc2hvdWxkIGNsYXJpZnkgdGhhdCBwcm90b2NvbHMgY291bGQgdXNl
IHRoaXMgZnJhbWV3b3JrIHNob3VsZCB0aGV5IHdpc2ggdG8gZG8gc28uDQoNClRoYW5rcw0KUGFk
bWENCg0KQmluZ3lhbmcgKEJyeWFuKQ0KDQpGcm9tOiBJZGVhcyBbbWFpbHRvOmlkZWFzLWJvdW5j
ZXNAaWV0Zi5vcmc8bWFpbHRvOmlkZWFzLWJvdW5jZXNAaWV0Zi5vcmc+XSBPbiBCZWhhbGYgT2Yg
UGFkbWEgUGlsbGF5LUVzbmF1bHQNClNlbnQ6IFRodXJzZGF5LCBKdW5lIDAxLCAyMDE3IDM6NDYg
QU0NClRvOiBVbWEgQ2h1bmR1cmkgPHVtYS5jaHVuZHVyaUBodWF3ZWkuY29tPG1haWx0bzp1bWEu
Y2h1bmR1cmlAaHVhd2VpLmNvbT4+DQpDYzogaWRlYXNAaWV0Zi5vcmc8bWFpbHRvOmlkZWFzQGll
dGYub3JnPjsgUGFkbWEgUGlsbGF5LUVzbmF1bHQgPHBhZG1hLmlldGZAZ21haWwuY29tPG1haWx0
bzpwYWRtYS5pZXRmQGdtYWlsLmNvbT4+DQoNClN1YmplY3Q6IFJlOiBbSWRlYXNdIFByZXAgZm9y
IEJPRiBpbiBKdWx5IC0gWW91ciBpbnB1dCBOZWVkZWQgb24gYSBDaGFydGVyIFByb3Bvc2FsDQoN
CkhpIFVtYQ0KDQpUaGFua3MgZm9yIHlvdXIgcmV2aWV3IQ0KDQpBZ3JlZSB3aXRoIHlvdXIgY29t
bWVudHMgLSB3aWxsIHVwZGF0ZQ0KDQpUaGFua3MNClBhZG1hDQoNCk9uIFdlZCwgTWF5IDMxLCAy
MDE3IGF0IDExOjM4IEFNLCBVbWEgQ2h1bmR1cmkgPHVtYS5jaHVuZHVyaUBodWF3ZWkuY29tPG1h
aWx0bzp1bWEuY2h1bmR1cmlAaHVhd2VpLmNvbT4+IHdyb3RlOg0KVGhhbmtzIGZvciBtb3JlIHJl
ZmluZWQgdmVyc2lvbiwgd2hpY2ggZG9lcyByZWZsZWN0IGxvdCBvZiBkaXNjdXNzaW9uIGluIHRo
ZSBtYWlsaW5nLWxpc3Qgb24gdGhlIGNoYXJ0ZXIuDQpIYXZlIGZldyBjb21tZW50cyBpbi1saW5l
IGJlbG93IFtVbWFdOg0KDQotLQ0KVW1hIEMuDQoNCkZyb206IElkZWFzIFttYWlsdG86aWRlYXMt
Ym91bmNlc0BpZXRmLm9yZzxtYWlsdG86aWRlYXMtYm91bmNlc0BpZXRmLm9yZz5dIE9uIEJlaGFs
ZiBPZiBQYWRtYSBQaWxsYXktRXNuYXVsdA0KU2VudDogV2VkbmVzZGF5LCBNYXkgMzEsIDIwMTcg
MTA6NTEgQU0NClRvOiBpZGVhc0BpZXRmLm9yZzxtYWlsdG86aWRlYXNAaWV0Zi5vcmc+DQpDYzog
UGFkbWEgUGlsbGF5LUVzbmF1bHQgPHBhZG1hLmlldGZAZ21haWwuY29tPG1haWx0bzpwYWRtYS5p
ZXRmQGdtYWlsLmNvbT4+DQpTdWJqZWN0OiBSZTogW0lkZWFzXSBQcmVwIGZvciBCT0YgaW4gSnVs
eSAtIFlvdXIgaW5wdXQgTmVlZGVkIG9uIGEgQ2hhcnRlciBQcm9wb3NhbA0KDQpIZWxsbyBJREVB
Uw0KDQpUaGFuayB5b3UgZm9yIHRoZSBmZWVkYmFjayBhbmQgY29tbWVudHMgb24gdGhlIGZpcnN0
IENoYXJ0ZXIgUHJvcG9zYWwuDQpUaGlzIHZlcnNpb24gYWltcyB0byBjYXB0dXJlIHlvdXIgc3Vn
Z2VzdGlvbnMgYW5kIGNvbW1lbnRzLg0KUGxlYXNlIG5vdGUgdGhhdCB0aGUgZG9jdW1lbnQgd2Vu
dCB0aHJvdWdoIGVkaXRvcmlhbCBjaGFuZ2VzIGZvciBjb25zaXN0ZW5jeSwgY2xhcml0eSBhbmQg
YmFsYW5jZS4NCg0KSSBoYXZlIGFsc28gcG9zdGVkIGEgdmVyc2lvbiBvZiBpdCBvbiBHSVRIVUIN
Cmh0dHBzOi8vZ2l0aHViLmNvbS9JRVRGLUlERUFTL0NoYXJ0ZXItUHJvcG9zYWwvYmxvYi9tYXN0
ZXIvSURFQVMlMjBDaGFydGVyJTIwUHJvcG9zYWwNCg0KWW91ciBjb21tZW50cyBhbmQgZmVlZGJh
Y2sgd2VsY29tZS4NCg0KVGhhbmtzDQpQYWRtYQ0KDQoNCg0KUHJvcG9zZWQgQ2hhcnRlcg0KDQpJ
ZGVudGl0eS1lbmFibGVkIHNvbHV0aW9ucyBhbmQgYXBwbGljYXRpb25zIGFyZSBpbmNyZWFzaW5n
bHkgYmVpbmcgY29uc2lkZXJlZCB0byBzdXBwb3J0IG1vYmlsaXR5IHNvbHV0aW9ucyBhbmQgbXVs
dGktaG9taW5nIGFjcm9zcyBoZXRlcm9nZW5lb3VzIGFjY2VzcyBuZXR3b3Jrcy4gTGlrZXdpc2Us
IEludGVybmV0IG9mIFRoaW5ncyAoSU9UKSwgTWFjaGluZS10by1NYWNoaW5lIChNMk0pIGFuZCA1
RyBzZXJ2aWNlcywgYXMgd2VsbCBhcyBjb250ZXh0IGF3YXJlIGFwcGxpY2F0aW9ucyBhbGwgY2Fu
IHRha2UgYWR2YW50YWdlIG9mIGRpc2NvdmVyeSwgc3RyaWN0ZXIgcHJpdmFjeSBhbmQgc2VjdXJp
dHkgZnVuY3Rpb25zLg0KDQpJZGVudGlmaWVyLWxvY2F0b3Igc2VwYXJhdGlvbiBwcm90b2NvbHMg
YXJlIGV4YW1wbGVzIG9mIHRlY2hub2xvZ3kgdGhhdCByZXF1aXJlIGluZnJhc3RydWN0dXJlIHRo
YXQgYWxsb3dzIG5vZGVzIHRvIGRpc2NvdmVyIHRoZSBuZXR3b3JrIHRvcG9sb2dpY2FsIGxvY2F0
aW9uKHMpIG9mIGl0cyBwZWVyKHMpIGZvciBwYWNrZXQgZGVsaXZlcnkuICBIb3dldmVyLCBhZGRp
dGlvbmFsIGluZnJhc3RydWN0dXJlIGlzIG5lZWRlZCB0byBhZGRyZXNzIG5ldyByZXF1aXJlbWVu
dHMgdGhhdCBnbyB3ZWxsIGJleW9uZCB0aGUgdHJhZGl0aW9uYWwgZGlzY292ZXJ5IHNlcnZpY2Ug
YW5kIG1hcHBpbmcgb2YgaWRlbnRpZmllci10by1sb2NhdGlvbiBmb3IgcGFja2V0IGRlbGl2ZXJ5
Lg0KDQpFeGFtcGxlcyBvZiBzdWNoIHJlcXVpcmVtZW50cyBhcmU6DQotICAgUHJpdmFjeTogIFRo
ZSB1c2Ugb2YgbG9uZy1saXZlZCBhbmQgcHVibGljIGlkZW50aWZpZXJzIG1heSBiZSBkZXNpcmFi
bGUgZm9yIGxvb2tpbmcgdXAgYSBwZWVyLCBob3dldmVyIGl0IGNhdXNlcyBwcml2YWN5IGlzc3Vl
cyBhcyB3ZWxsLiBJbmRlZWQsIHRoZSBpZGVudGlmaWVyLWxvY2F0aW9uIHBhaXJzIGNhbiBiZSBs
b29rZWQgdXAgd2l0aG91dCByZXN0cmljdGlvbiBhbmQgZmxvd3MgY2FuIGJlIHBpbm5lZCBieSBh
bnlib2R5IHRvIHNwZWNpZmljIGVuZCBzeXN0ZW1zLg0KW1VtYV06IFRoZSBhYm92ZSBkZXBpY3Rz
IHRoZSBnYXAgaW4gY3VycmVudCBpZGVudGlmaWVyLWxvY2F0aW9uIHByb3RvY29scyByYXRoZXIg
dGhhbiByZXF1aXJlbWVudC4gTWF5IGJlIHlvdSBtaWdodCB3YW50IHRvIGFkZCAgc29tZXRoaW5n
IHNpbWlsYXIgdG/igJMg4oCcUHJpdmFjeSBhc3BlY3QgaXMgbmVlZGVkIGZvciBsb29raW5nIHVw
IHB1YmxpYyBpZGVudGlmaWVycyBhbmQgYWxzbyBmb3IgYW5vbnltaXppbmcgdGhlIGNvbW11bmlj
YXRpb24gd2l0aG91dCBiZWluZyBwaW5uZWQgYnkgbWFuLWluLXRoZS1taWRkbGXigJ0uDQotICAg
U2VjdXJpdHk6IEFuIGlkZW50aWZpZXIgbWF5IHJldmVhbCBpbmZvcm1hdGlvbiB0byB3aGljaCB0
aGUgZW5kLXVzZXJzIG1heSBub3Qgd2FudCB0byBiZSBhc3NvY2lhdGVkIHdpdGguIFRoZXJlZm9y
ZSwgdXNlcnMgYW5kIG5ldHdvcmsgZWxlbWVudHMgbWF5IHdpc2ggdG8gaGF2ZSBhIGNlcnRhaW4g
ZGVncmVlIG9mIGNvbnRyb2wgb3ZlciB0aGlzIGluZm9ybWF0aW9uIHRvIGRlZmluZSB3aG8gY2Fu
IHJlYWQsIHdyaXRlIGFuZCBkZWxldGUgaXQuIFRoZSBlbmRwb2ludCBjb21tdW5pY2F0aW9ucyBz
aG91bGQgYmUgYWJsZSB0byBjaGFuZ2UgdGhlaXIgaWRlbnRpZmllciB3aGlsZSByZXRhaW5pbmcg
dGhlaXIgaWRlbnRpdHkgYW5kIGFzc29jaWF0ZWQgcG9saWNpZXMuIFRoaXMgaW5kaXJlY3Rpb24g
c2hvdWxkIGhlbHAgZGlzY291cmFnZSB1bnNvbGljaXRlZCB0cmFmZmljIG9yIGNvbmNlYWwgdGhl
aXIgc2Vuc2l0aXZlIGluZm9ybWF0aW9uIHRvIGVhdmVzZHJvcHBlcnMuDQotICBJbnRlcm9wZXJh
YmlsaXR5IGFjcm9zcyBpZC1sb2NhdG9yIGluZnJhc3RydWN0dXJlczoNCltVbWFdOiBpZC1sb2Nh
dG9yID09PiBpZGVudGlmaWVyLWxvY2F0b3IgKGFzIOKAmWlk4oCZIGNhbiBiZSB1c2VkIGZvciBi
b3RoIElkZW50aXR5IGFuZCBJZGVudGlmaWVyIGF0IHRoaXMgcG9pbnQpDQpJbiBJb1QsIG9mdGVu
IHRlY2hub2xvZ3kgc3BlY2lmaWMgc29sdXRpb25zIGRyaXZlIGRpZmZlcmVudCBuYW1pbmcgYW5k
IGFkZHJlc3Npbmcgc2NoZW1lIGxlYWRpbmcgdG8gZGVwbG95aW5nIGRpc2pvaW50IHN5c3RlbXMu
IEhvd2V2ZXIsIHNldmVyYWwgSW9UIGFuZCA1RyBzY2VuYXJpb3MgcmVxdWlyZSB0aGF0IGlkZW50
aWZpZXItbG9jYXRvciBpbmZyYXN0cnVjdHVyZXMgYXJlIGFibGUgdG8gaW50ZXJvcGVyYXRlIGFu
ZCBleGNoYW5nZSBpbmZvcm1hdGlvbiB3aGVuIGRlcGxveWVkIG92ZXIgZGlmZmVyZW50IGFkbWlu
aXN0cmF0aXZlIGRvbWFpbnMuDQogLSAgIExvdyBMYXRlbmN5OiBUaGUgaW5mcmFzdHJ1Y3R1cmVz
IG11c3Qgc3RyaXZlIHRvIG1pbmltaXplIHRoZSBsYXRlbmN5IGZvciBtaXNzaW9uIGNyaXRpY2Fs
IGFwcGxpY2F0aW9ucyBhcyB3ZWxsIGFzIHF1YWxpdHkgdXNlciBleHBlcmllbmNlDQoNClRoZSBJ
ZGVudGl0eSBFbmFibGVkIE5ldHdvcmtzIChJREVBUykgd29ya2luZyBncm91cCBpcyBjaGFydGVy
ZWQgdG8gZGV2ZWxvcCBhIGZyYW1ld29yayB0aGF0IHByb3ZpZGVzIHNlcnZpY2VzIHRoYXQgY2Fu
IGJlIHVzZWQgdG8gYWRkcmVzcyB0aG9zZSByZXF1aXJlbWVudHMgYW5kIHRoYXQgY2FuIGJlIHVz
ZWQgd2l0aCBhbnkgaWRlbnRpdHktYmFzZWQgcHJvdG9jb2wuDQpbVW1hXTogaWRlbnRpdHktYmFz
ZWQgcHJvdG9jb2wgPT0+IElkZW50aWZpZXItYmFzZWQgcHJvdG9jb2w/Pw0KVGhlIGZyYW1ld29y
ayBpbmNsdWRlcyB0aGUgaWRlbnRpZmllci1sb2NhdG9yIGluZnJhc3RydWN0dXJlIGFuZCBhIGNv
bW1vbiBjb250cm9sIHBsYW5lIGZvciBpZGVudGlmaWVyIHJlbGF0ZWQgc2VydmljZXMgYW5kIGlk
ZW50aWZpZXLigJNsb2NhdGlvbiBzZXBhcmF0aW9uIHByb3RvY29scy4gQSBjb21tb24gY29udHJv
bCBwbGFuZSBpcyByZXF1aXJlZCB0byBmYWNpbGl0YXRlIHRoZSBkeW5hbWljIGRpc2NvdmVyeSBv
ZiB0aGUgdmFyaW91cyBuYW1pbmcvYWRkcmVzc2luZyBzY2hlbWVzIGFuZCB0aGUgY29tbXVuaWNh
dGlvbiBiZXR3ZWVuIHRoZXNlIGhldGVyb2dlbmVvdXMgZW52aXJvbm1lbnRzDQpTdWNoIGNvbW11
bmljYXRpb24gbWF5IGFsc28gaW1wbHkgc29tZSBuZWdvdGlhdGlvbiBjYXBhYmlsaXRpZXMsIGUu
Zy4sIHdoZW4gc2V2ZXJhbCBNYXBwaW5nIFN5c3RlbXMgYXJlIG1hbmFnZWQgYnkgZGlmZmVyZW50
IGVudGl0aWVzLg0KDQpTcGVjaWZpY2FsbHksIHRoZSBJREVBUyBXRyBpcyBjaGFydGVyZWQgdG8g
d29yayBvbiB0aGVzZSBhcmVhcyBmb3IgdGhlIGZyYW1ld29yazoNCg0KRmVhdHVyZXMgYW5kIHBy
b3BlcnRpZXM6DQotIFJlZ2lzdHJhdGlvbiBhbmQgbGlmZWN5Y2xlIG1hbmFnZW1lbnQgb2YgaWRl
bnRpdGllcyBhc3NvY2lhdGVkIGlkZW50aWZpZXJzLg0KLSBEZWZpbml0aW9uIG9mIHBvbGljaWVz
IHJlbGF0ZWQgdG8gaWRlbnRpdGllcyAoZS5nLiBhY2Nlc3MgY29udHJvbCB0byBkaXNjb3Zlcnkp
DQotIEFub255bWl6YXRpb24gc3VwcG9ydCAoZS5nLiBpZGVudGlmaWVyIGFub255bWl0eSB0byBl
YXZlc2Ryb3BwZXJzKQ0KLSBBdXRoZW50aWNhdGVkIGlkZW50aXR5IChhY2Nlc3MgdG8gZnJhbWV3
b3JrLCB1cGRhdGUgb2YgaW5mb3JtYXRpb24gZm9yIGlkZW50aWZpZXJzKQ0KLSBEZWZpbml0aW9u
IGFuZCBlbmZvcmNlbWVudCBvZiBwb2xpY2llcyAoZS5nLiBhYmlsaXR5IHRvIGxvb2sgdXAgYW4g
aWRlbnRpZmllci1sb2NhdG9yIHBhaXIsIHBlcm1pdCBmb3J3YXJkaW5nIHRyYWZmaWMsIOKApikN
Ci0gSWRlbnRpZmllci9sb2NhdG9yIG1hcHBpbmcgYW5kIHJlc29sdXRpb24gKGUuZy4gZGlzY292
ZXJ5LCBwdWIvc3ViLCBtdWx0aWhvbWluZy4uKQ0KLSBNZXRhZGF0YSBzdXBwb3J0IChlLmcuIGVu
dGl0eSBvciBlbmRwb2ludCBhdHRyaWJ1dGVzIGFuZCBwcm9wZXJ0aWVzKS4NCi0gRW5kcG9pbnQg
Z3JvdXBpbmcgc3VwcG9ydCAoZS5nLiBuZWdvdGlhdGlvbiB0byBqb2luLCBsZWF2ZSBhbmQgY29t
bXVuaWNhdGUpDQotIFJvYnVzdG5lc3Mgb2YgdGhlIHN5c3RlbSBhZ2FpbnN0IEREb1MgYXR0YWNr
cyAoZS5nLiBwb2xpY2llcyBmb3IgYWNjZXNzLCByYXRlIGxpbWl0aW5nKQ0KDQpUaGUgc2NvcGUg
b2Ygc3lzdGVtIHNob3VsZCBiZSBmbGV4aWJsZSBhbmQgYWxsb3cgZm9yIGRpZmZlcmVudCBzY29w
ZXMgc3VjaCBhcyBsb2NhbChwcml2YXRlKSBvciBnbG9iYWwocHVibGljKS4gVGhlIHNjb3BlIG9m
IHRoZSBtYXBwaW5ncyBhbmQgdGhlaXIgcmVsZXZhbmNlIHdpdGhpbiB0aGUgc2NvcGUgd2lsbCBi
ZSB0YWtlbiBpbnRvIGNvbnNpZGVyYXRpb24gZm9yIGxlYWtpbmcgb2YgaW5mb3JtYXRpb24uIFRo
ZSBuZWdvdGlhdGlvbiBvZiBsZWFraW5nIG9mIGluZm9ybWF0aW9uIGZyb20gdGhlIHByaXZhdGUg
dG8gZ2xvYmFsIHN5c3RlbXMgd2lsbCBiZSBjb3ZlcmVkIHdpdGggdGhlIGFpbSBvZiBtaW5pbWFs
IGRpc3J1cHRpb24gYW5kIG1pbmltaXppbmcgbGF0ZW5jeS4NCg0KVGhlIHdvcmtpbmcgZ3JvdXAg
d2lsbCBiYWxhbmNlIHRoZSByZXF1aXJlbWVudHMgZm9yIHBlcmZvcm1hbmNlIG9mIHRoZSBmcmFt
ZXdvcmsgdG8gcHJvdmlkZSBzZWN1cmVkLCB0cnVzdHdvcnRoeSwgYW5kIHJvYnVzdCBjb21tdW5p
Y2F0aW9uIHNlcnZpY2VzIHdpdGggdGhlIG1pbmltaXplZCBzdG9yYWdlIG9mIGRhdGEgYW5kIHBy
aXZhY3kgY29uc2lkZXJhdGlvbnMuDQpUaGUgbWV0aG9kIGZvciB1cGRhdGluZywgY2FjaGluZyBh
bmQgZGlzc2VtaW5hdGlvbiBvciBsZWFraW5nIG9mIGluZm9ybWF0aW9uIHdpbGwgYmUgY292ZXJl
ZCB0byBlbnN1cmUgdGhhdCBzdGF0ZSBjb25zaXN0ZW5jeSBhbmQgZWZmaWNpZW5jeS4NCltVbWFd
OiDigJxUaGUgbWV0aG9kIGZvciAuLuKAnSA9PT4g4oCcQSBuZXcgUHJvdG9jb2wgb3IgYW4gZXhp
c3RpbmcgUHJvdG9jb2wgZXh0ZW5zaW9ucyBmb3Ig4oCm4oCdDQpUaGUgd29ya2luZyBncm91cCB3
aWxsIGNvdmVyIHRoZSBtYW5hZ2VtZW50IGFzcGVjdHMgb2YgSURFQVMgYXJjaGl0ZWN0dXJhbCBj
b21wb25lbnRzIGFuZCB0aGUgc2VydmljZXMgdGhhdCB0aGV5IHByb3ZpZGUuIFRoZSB3b3JraW5n
IGdyb3VwIHdpbGwgaWRlbnRpZnkgZ2FwcyBhbmQgbWFrZSByZWNvbW1lbmRhdGlvbnMgb24gY2hh
bmdlcyBuZWVkZWQgZm9yIGludGVyZmFjZSBpbnRlcmFjdGlvbnMgYmV0d2VlbiB0aGUgZnJhbWV3
b3JrIGFuZCBpZGVudGlmaWVyLWVuYWJsZWQgcHJvdG9jb2xzDQoNClRoZSBJREVBUyBXRyB3aWxs
IGNvbGxhYm9yYXRlIHdpdGggb3RoZXIgV29ya2luZyBHcm91cHMgdG8gZW5zdXJlIGludGVyb3Bl
cmFiaWxpdHkgd2l0aCBMSVNQLCBISVAsIElMQSBhbmQgb3RoZXIgcmVsZXZhbnQgd29yayAuIEZ1
cnRoZXJtb3JlLCBpdCB3aWxsIHRyeSB0byByZXVzZSB0ZWNobm9sb2dpZXMgYWxyZWFkeSBkZXZl
bG9wZWQgd2hlbiBhcHByb3ByaWF0ZS4NCg0KV0cgZGVsaXZlcmFibGVzIGluY2x1ZGU6DQpPdmVy
YWxsIElkZW50aXR5IFNlcnZpY2VzIEZyYW1ld29yaw0KDQpXRyBzdXN0YWluaW5nL2luZm9ybWF0
aW9uYWwgZG9jdW1lbnRzIG1heSBpbmNsdWRlOg0KDQpUaGVzZSBkb2N1bWVudHMgbWF5IG5vdCBu
ZWNlc3NhcmlseSBiZSBwdWJsaXNoZWQsIGJ1dCBtYXkgYmUNCm1haW50YWluZWQgaW4gYSBkcmFm
dCBmb3JtIG9yIG9uIGEgY29sbGFib3JhdGl2ZSBXb3JraW5nIEdyb3VwIHdpa2kNCnRvIHN1cHBv
cnQgdGhlIGVmZm9ydHMgb2YgdGhlIFdvcmtpbmcgR3JvdXAgYW5kIGhlbHAgbmV3IGNvbWVyczoN
Ci1Qcm9ibGVtIHN0YXRlbWVudA0KLVVzZSBjYXNlcw0KLVJlcXVpcmVtZW50cw0KLSBBcHBsaWNh
dGlvbnMgb2YgdGhlIGFyY2hpdGVjdHVyZSBmb3IgdXNlIGNhc2VzDQoNCk1pbGVzdG9uZXMNCkRl
YyAyMDE3IEFkb3B0IFdHIGRyYWZ0IGZvciB0aGUgSWRlbnRpdHkgU2VydmljZXMgZnJhbWV3b3Jr
DQpNYXkgMjAxOCBXR0xDIGZvciB0aGUgSWRlbnRpdHkgU2VydmljZXMgZnJhbWV3b3JrDQpBdWcg
MjAxOCBTZW5kIElkZW50aXR5IFNlcnZpY2VzIGZyYW1ld29yayBkcmFmdCB0byB0aGUgSUVTRw0K
DQoNCg0KDQo=

--_000_C1CE72EE84AF224E94DA21AE134209EE0104F82ASZXEMI508MBSchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_C1CE72EE84AF224E94DA21AE134209EE0104F82ASZXEMI508MBSchi_--


From nobody Fri Jun  2 09:42:46 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C909E128D44 for <ideas@ietfa.amsl.com>; Fri,  2 Jun 2017 09:42:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0DSL-5cu0zLg for <ideas@ietfa.amsl.com>; Fri,  2 Jun 2017 09:42:41 -0700 (PDT)
Received: from mail-wr0-x22d.google.com (mail-wr0-x22d.google.com [IPv6:2a00:1450:400c:c0c::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4E481289B0 for <ideas@ietf.org>; Fri,  2 Jun 2017 09:42:35 -0700 (PDT)
Received: by mail-wr0-x22d.google.com with SMTP id v104so9786558wrb.0 for <ideas@ietf.org>; Fri, 02 Jun 2017 09:42:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=wY+ZMFnmTxM/A/OEtO92pavFFWF52Q3+3X/oY5zRuCY=; b=W4gtRu0f91fVdRnWs62N2flCSLzHLlyWPQqGUuUflUNdsmvrw6kdHgY9qjekw9MSV7 0Nu5wMQ6m4f90d7FWLkozuhP0VaufWCwTxO5cfQvHwzO1QrC0oHGALOM4a0t+ZwJW9y5 1UP18yLzusrEnJuCO+zahRLzRH3zwb4R7jN1ewnzuswGu3R9AI+ujuhWx9T8GNoY6B8q gmKpBChITBt+otf9gR8Uo0lxix7NQMJnn2l45NS/YX7rfFROm2jmZ7D7qDbr5cLkLPCz llOhjv/Kcp1fxIzWzm2bRFgT/t3gIxsMBSyeVv6WAXTMfpdfyR51r0RyE544Kr2I8JKR LVcw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=wY+ZMFnmTxM/A/OEtO92pavFFWF52Q3+3X/oY5zRuCY=; b=XZ/fdABrxLHp8I/e1B/IV0M3moLGSsm0ATri42E1MGuyqZUEEFjeWfjTCyxlok7HvL 6B1tzM2qAqnGsMDoP5bx3Hq2zfSnU0ZO8SkOVQIjEveiXYQ947jcw+xwcJQFmKA+ZX7f /XeQcHKb4rRGphxPiX/rxG8K4V/lk+QS6f1oSjzJ2RtgKDNOs2DlDz13cvBFUmYz1JT6 zTYGKdYtoLsDxD0iF7cHHCe2Vlti3VNIMVt4ammxfqYtvX9PREiYRYdbpi/7fMO2M2LB oKXfuvGh9Tz1BZvMRU1wP4MXNN76lRooh5L42yOpVJq8tv/gvbR+aYVVakB2L6YhhtMS NO9w==
X-Gm-Message-State: AODbwcBM68cBvXtFFfkiyLeuhZnEE6KdNEeMxTSejaZfqY6sDvyTvpwL fU8FdqkXwEJAfUbrO5niWTt48isPCQ==
X-Received: by 10.223.139.81 with SMTP id v17mr6520889wra.70.1496421754266; Fri, 02 Jun 2017 09:42:34 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.170.73 with HTTP; Fri, 2 Jun 2017 09:42:33 -0700 (PDT)
In-Reply-To: <C1CE72EE84AF224E94DA21AE134209EE0104F82A@SZXEMI508-MBS.china.huawei.com>
References: <CAG-CQxpZeoEUE7bprXODdKTEMFc5pqTJ5_HO8SZ3OiBc=QOpbg@mail.gmail.com> <25B4902B1192E84696414485F5726854018BC2AF@SJCEML701-CHM.china.huawei.com> <CAG-CQxoDrC_9BtqqvWeK6bn=HNBrDCkqmy9or6-Jk3RbYeYEiA@mail.gmail.com> <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com> <CAG-CQxpTyYLG0NpZqp-bsPn=D7a-4crGnq6jO3pj0SD_DHN3QA@mail.gmail.com> <C1CE72EE84AF224E94DA21AE134209EE0104F82A@SZXEMI508-MBS.china.huawei.com>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Fri, 2 Jun 2017 09:42:33 -0700
Message-ID: <CAG-CQxrt1AoVkxWEhWLUZw0s_E3rdj-iUXLOXGYxnNOT30-FAQ@mail.gmail.com>
To: "Liubingyang (Bryan)" <liubingyang@huawei.com>
Cc: "ideas@ietf.org" <ideas@ietf.org>, Uma Chunduri <uma.chunduri@huawei.com>,  Padma Pillay-Esnault <padma.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="f403045e982a18f16c0550fcd738"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/B22O2L78m5sjxL8H4OGL_cTzmzA>
Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Jun 2017 16:42:45 -0000

--f403045e982a18f16c0550fcd738
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Bingyang


On Thu, Jun 1, 2017 at 6:16 PM, Liubingyang (Bryan) <liubingyang@huawei.com=
>
wrote:

> Yes, I also think the protocols should use the framework as their will.
>

Absolutely.


> Another question is whether future ID protocols must be compatible with
> the framework, but I think we can defer answering the question to the
> framework RFC.
>
>
>
IMHO it is premature at this point to discuss this.

Padma

> Bingyang
>
>
>
> *From:* Padma Pillay-Esnault [mailto:padma.ietf@gmail.com]
> *Sent:* Thursday, June 01, 2017 11:32 PM
> *To:* Liubingyang (Bryan) <liubingyang@huawei.com>
> *Cc:* Uma Chunduri <uma.chunduri@huawei.com>; ideas@ietf.org
>
> *Subject:* Re: [Ideas] Prep for BOF in July - Your input Needed on a
> Charter Proposal
>
>
>
> Hi Bingyang
>
>
>
> On Thu, Jun 1, 2017 at 1:33 AM, Liubingyang (Bryan) <
> liubingyang@huawei.com> wrote:
>
> Hi Padma,
>
>
>
> Thanks for the well edited draft. I have a problem with the following
> sentence:
>
> >> The Identity Enabled Networks (IDEAS) working group is chartered to
> develop a framework that provides services that can be used to address
> those requirements and that can be used with *any* identity-based protoco=
l
> .
>
>
>
> Does it mean that the IDEAS framework can be used by ALL EXISTING ID-base=
d
> protocols, as well as ALL FUTURE ID-base protocols? If anybody designs a
> new ID protocol in IETF in the future, the protocol should follow the
> framework? Maybe IDEAS should have a more conservative goal than that.
>
>
>
>
>
> How about change "with any" to "by"?
>
> I think this should clarify that protocols could use this framework shoul=
d
> they wish to do so.
>
>
>
> Thanks
>
> Padma
>
>
>
> Bingyang (Bryan)
>
>
>
> *From:* Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
> Pillay-Esnault
> *Sent:* Thursday, June 01, 2017 3:46 AM
> *To:* Uma Chunduri <uma.chunduri@huawei.com>
> *Cc:* ideas@ietf.org; Padma Pillay-Esnault <padma.ietf@gmail.com>
>
>
> *Subject:* Re: [Ideas] Prep for BOF in July - Your input Needed on a
> Charter Proposal
>
>
>
> Hi Uma
>
>
>
> Thanks for your review!
>
>
>
> Agree with your comments - will update
>
>
>
> Thanks
>
> Padma
>
>
>
> On Wed, May 31, 2017 at 11:38 AM, Uma Chunduri <uma.chunduri@huawei.com>
> wrote:
>
> Thanks for more refined version, which does reflect lot of discussion in
> the mailing-list on the charter.
>
> Have few comments in-line below [Uma]:
>
>
>
> --
>
> Uma C.
>
>
>
> *From:* Ideas [mailto:ideas-bounces@ietf.org] *On Behalf Of *Padma
> Pillay-Esnault
> *Sent:* Wednesday, May 31, 2017 10:51 AM
> *To:* ideas@ietf.org
> *Cc:* Padma Pillay-Esnault <padma.ietf@gmail.com>
> *Subject:* Re: [Ideas] Prep for BOF in July - Your input Needed on a
> Charter Proposal
>
>
>
> Hello IDEAS
>
>
>
> Thank you for the feedback and comments on the first Charter Proposal.
>
> This version aims to capture your suggestions and comments.
>
> Please note that the document went through editorial changes for
> consistency, clarity and balance.
>
>
>
> I have also posted a version of it on GITHUB
>
> https://github.com/IETF-IDEAS/Charter-Proposal/blob/master/
> IDEAS%20Charter%20Proposal
>
>
>
> Your comments and feedback welcome.
>
>
>
> Thanks
>
> Padma
>
>
>
>
>
>
>
> Proposed Charter
>
>
>
> Identity-enabled solutions and applications are increasingly being
> considered to support mobility solutions and multi-homing across
> heterogeneous access networks. Likewise, Internet of Things (IOT),
> Machine-to-Machine (M2M) and 5G services, as well as context aware
> applications all can take advantage of discovery, stricter privacy and
> security functions.
>
>
>
> Identifier-locator separation protocols are examples of technology that
> require infrastructure that allows nodes to discover the network
> topological location(s) of its peer(s) for packet delivery.  However,
> additional infrastructure is needed to address new requirements that go
> well beyond the traditional discovery service and mapping of
> identifier-to-location for packet delivery.
>
>
>
> Examples of such requirements are:
>
> -   Privacy:  The use of long-lived and public identifiers may be
> desirable for looking up a peer, however it causes privacy issues as well=
.
> Indeed, the identifier-location pairs can be looked up without restrictio=
n
> and flows can be pinned by anybody to specific end systems.
>
> [Uma]: The above depicts the gap in current identifier-location protocols
> rather than requirement. May be you might want to add  something similar
> to=E2=80=93 =E2=80=9CPrivacy aspect is needed for looking up public ident=
ifiers and also
> for anonymizing the communication without being pinned by
> man-in-the-middle=E2=80=9D.
>
> -   Security: An identifier may reveal information to which the end-users
> may not want to be associated with. Therefore, users and network elements
> may wish to have a certain degree of control over this information to
> define who can read, write and delete it. The endpoint communications
> should be able to change their identifier while retaining their identity
> and associated policies. This indirection should help discourage
> unsolicited traffic or conceal their sensitive information to
> eavesdroppers.
>
> -  Interoperability across id-locator infrastructures:
>
> [Uma]: id-locator =C3=A8 identifier-locator (as =E2=80=99id=E2=80=99 can =
be used for both
> Identity and Identifier at this point)
>
> In IoT, often technology specific solutions drive different naming and
> addressing scheme leading to deploying disjoint systems. However, several
> IoT and 5G scenarios require that identifier-locator infrastructures are
> able to interoperate and exchange information when deployed over differen=
t
> administrative domains.
>
>  -   Low Latency: The infrastructures must strive to minimize the latency
> for mission critical applications as well as quality user experience
>
>
>
> The Identity Enabled Networks (IDEAS) working group is chartered to
> develop a framework that provides services that can be used to address
> those requirements and that can be used with any identity-based protocol.
>
> [Uma]: identity-based protocol =C3=A8 Identifier-based protocol??
>
> The framework includes the identifier-locator infrastructure and a common
> control plane for identifier related services and identifier=E2=80=93loca=
tion
> separation protocols. A common control plane is required to facilitate th=
e
> dynamic discovery of the various naming/addressing schemes and the
> communication between these heterogeneous environments
>
> Such communication may also imply some negotiation capabilities, e.g.,
> when several Mapping Systems are managed by different entities.
>
>
>
> Specifically, the IDEAS WG is chartered to work on these areas for the
> framework:
>
>
>
> Features and properties:
>
> - Registration and lifecycle management of identities associated
> identifiers.
>
> - Definition of policies related to identities (e.g. access control to
> discovery)
>
> - Anonymization support (e.g. identifier anonymity to eavesdroppers)
>
> - Authenticated identity (access to framework, update of information for
> identifiers)
>
> - Definition and enforcement of policies (e.g. ability to look up an
> identifier-locator pair, permit forwarding traffic, =E2=80=A6)
>
> - Identifier/locator mapping and resolution (e.g. discovery, pub/sub,
> multihoming..)
>
> - Metadata support (e.g. entity or endpoint attributes and properties).
>
> - Endpoint grouping support (e.g. negotiation to join, leave and
> communicate)
>
> - Robustness of the system against DDoS attacks (e.g. policies for access=
,
> rate limiting)
>
>
>
> The scope of system should be flexible and allow for different scopes suc=
h
> as local(private) or global(public). The scope of the mappings and their
> relevance within the scope will be taken into consideration for leaking o=
f
> information. The negotiation of leaking of information from the private t=
o
> global systems will be covered with the aim of minimal disruption and
> minimizing latency.
>
>
>
> The working group will balance the requirements for performance of the
> framework to provide secured, trustworthy, and robust communication
> services with the minimized storage of data and privacy considerations.
>
> The method for updating, caching and dissemination or leaking of
> information will be covered to ensure that state consistency and efficien=
cy.
>
> [Uma]: =E2=80=9CThe method for ..=E2=80=9D =C3=A8 =E2=80=9CA new Protocol=
 or an existing
> Protocol extensions for =E2=80=A6=E2=80=9D
>
> The working group will cover the management aspects of IDEAS architectura=
l
> components and the services that they provide. The working group will
> identify gaps and make recommendations on changes needed for interface
> interactions between the framework and identifier-enabled protocols
>
>
>
> The IDEAS WG will collaborate with other Working Groups to ensure
> interoperability with LISP, HIP, ILA and other relevant work . Furthermor=
e,
> it will try to reuse technologies already developed when appropriate.
>
>
>
> WG deliverables include:
>
> Overall Identity Services Framework
>
>
>
> WG sustaining/informational documents may include:
>
>
>
> These documents may not necessarily be published, but may be
>
> maintained in a draft form or on a collaborative Working Group wiki
>
> to support the efforts of the Working Group and help new comers:
>
> -Problem statement
>
> -Use cases
>
> -Requirements
>
> - Applications of the architecture for use cases
>
>
>
> Milestones
>
> Dec 2017 Adopt WG draft for the Identity Services framework
>
> May 2018 WGLC for the Identity Services framework
>
> Aug 2018 Send Identity Services framework draft to the IESG
>
>
>
>
>
>
>
>
>
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas
>
>

--f403045e982a18f16c0550fcd738
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Bingyang<div><br></div><div class=3D"gmail_extra"><br><=
div class=3D"gmail_quote">On Thu, Jun 1, 2017 at 6:16 PM, Liubingyang (Brya=
n) <span dir=3D"ltr">&lt;<a href=3D"mailto:liubingyang@huawei.com" target=
=3D"_blank">liubingyang@huawei.com</a>&gt;</span> wrote:<br><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex">





<div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"m_-3277149325738007197WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Yes, I also think the protocols shou=
ld use the framework as their will.</span></p></div></div></blockquote><div=
><br></div><div>Absolutely.</div><div>=C2=A0</div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex"><div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple"><div class=3D"m_-3=
277149325738007197WordSection1"><p class=3D"MsoNormal"><span lang=3D"EN-US"=
 style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif">
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Another question is whether future I=
D protocols must be compatible with the framework, but I think we can defer=
 answering the question to the framework RFC.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0</span></p></div></div>=
</blockquote><div>IMHO it is premature at this point to discuss this.</div>=
<div><br></div><div>Padma=C2=A0</div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div la=
ng=3D"ZH-CN" link=3D"blue" vlink=3D"purple"><div class=3D"m_-32771493257380=
07197WordSection1"><p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"fon=
t-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif"><u></u></span></p=
>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Bingyang<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Padma Pillay-Esnault [mailto:<a href=3D"mailto:padma.ietf@gmail.com" target=
=3D"_blank">padma.ietf@gmail.com</a>]
<br>
<b>Sent:</b> Thursday, June 01, 2017 11:32 PM<br>
<b>To:</b> Liubingyang (Bryan) &lt;<a href=3D"mailto:liubingyang@huawei.com=
" target=3D"_blank">liubingyang@huawei.com</a>&gt;<br>
<b>Cc:</b> Uma Chunduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com" targ=
et=3D"_blank">uma.chunduri@huawei.com</a>&gt;; <a href=3D"mailto:ideas@ietf=
.org" target=3D"_blank">ideas@ietf.org</a></span></p><div><div class=3D"h5"=
><br>
<b>Subject:</b> Re: [Ideas] Prep for BOF in July - Your input Needed on a C=
harter Proposal<u></u><u></u></div></div><p></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi Bingyang<u></u><u></u></span=
></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">On Thu, Jun 1, 2017 at 1:33 AM,=
 Liubingyang (Bryan) &lt;<a href=3D"mailto:liubingyang@huawei.com" target=
=3D"_blank">liubingyang@huawei.com</a>&gt; wrote:<u></u><u></u></span></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Hi Padma,
</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">=C2=A0</span><span lang=3D"EN-US"><u=
></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Thanks for the well edited draft. I =
have a problem with the following sentence:
</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:21.0pt">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,sans-serif">&gt;&gt; The Identity Enabled Networks (IDEAS) working grou=
p is chartered to develop a framework that provides services that can be us=
ed to address those requirements and that can be used
 with <b><span style=3D"color:red">any</span></b><span style=3D"color:red">=
 identity-based protocol</span>.</span><span lang=3D"EN-US"><u></u><u></u><=
/span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">=C2=A0</span><span lang=3D"EN-US"><u=
></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Does it mean that the IDEAS framewor=
k can be used by ALL EXISTING ID-based protocols, as well as ALL
 FUTURE ID-base protocols? If anybody designs a new ID protocol in IETF in =
the future, the protocol should follow the framework? Maybe IDEAS should ha=
ve a more conservative goal than that.</span><span lang=3D"EN-US"><u></u><u=
></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">=C2=A0</span><span lang=3D"EN-US"><u=
></u><u></u></span></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">How about change &quot;with any=
&quot; to &quot;by&quot;?<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I think this should clarify tha=
t protocols could use this framework should they wish to do so.<u></u><u></=
u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thanks<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Padma<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">Bingyang (Bryan)</span><span lang=3D=
"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif">=C2=A0</span><span lang=3D"EN-US"><u=
></u><u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Ideas
 [mailto:<a href=3D"mailto:ideas-bounces@ietf.org" target=3D"_blank">ideas-=
bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Padma Pillay-Esnault<br>
<b>Sent:</b> Thursday, June 01, 2017 3:46 AM<br>
<b>To:</b> Uma Chunduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com" targ=
et=3D"_blank">uma.chunduri@huawei.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:ideas@ietf.org" target=3D"_blank">ideas@ietf.o=
rg</a>; Padma Pillay-Esnault &lt;<a href=3D"mailto:padma.ietf@gmail.com" ta=
rget=3D"_blank">padma.ietf@gmail.com</a>&gt;</span><span lang=3D"EN-US"><u>=
</u><u></u></span></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><br>
<b>Subject:</b> Re: [Ideas] Prep for BOF in July - Your input Needed on a C=
harter Proposal<u></u><u></u></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi Uma<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thanks for your review!<u></u><=
u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Agree with your comments - will=
 update<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thanks<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Padma<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">On Wed, May 31, 2017 at 11:38 A=
M, Uma Chunduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com" target=3D"_b=
lank">uma.chunduri@huawei.com</a>&gt; wrote:<u></u><u></u></span></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-=
bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><a name=3D"m_-3277149325738007197_m_5443073686081885=
489_m_6500799670599455"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font=
-family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Thanks for more refin=
ed version, which
 does reflect lot of discussion in the mailing-list on the charter.</span><=
/a><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Have few comments in-l=
ine below
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:&quot;Cal=
ibri&quot;,sans-serif;color:#1f497d">[Uma]:</span><span lang=3D"EN-US"><u><=
/u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">=C2=A0</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">--</span><span lang=3D=
"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">Uma C.</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">=C2=A0</span><span lan=
g=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Ideas
 [mailto:<a href=3D"mailto:ideas-bounces@ietf.org" target=3D"_blank">ideas-=
bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Padma Pillay-Esnault<br>
<b>Sent:</b> Wednesday, May 31, 2017 10:51 AM<br>
<b>To:</b> <a href=3D"mailto:ideas@ietf.org" target=3D"_blank">ideas@ietf.o=
rg</a><br>
<b>Cc:</b> Padma Pillay-Esnault &lt;<a href=3D"mailto:padma.ietf@gmail.com"=
 target=3D"_blank">padma.ietf@gmail.com</a>&gt;<br>
<b>Subject:</b> Re: [Ideas] Prep for BOF in July - Your input Needed on a C=
harter Proposal</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Hello=
 IDEAS</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Thank=
 you for the feedback and comments on the first Charter Proposal.</span><sp=
an lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">This =
version aims to capture your suggestions and comments.</span><span lang=3D"=
EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Pleas=
e note that the document went through editorial changes for consistency, cl=
arity and balance.</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">I hav=
e also posted a version of it on GITHUB =C2=A0</span><span lang=3D"EN-US"><=
u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><a href=3D"https://github.com/I=
ETF-IDEAS/Charter-Proposal/blob/master/IDEAS%20Charter%20Proposal" target=
=3D"_blank"><span style=3D"font-size:9.5pt">https://github.com/IETF-IDEAS/<=
wbr>Charter-Proposal/blob/master/<wbr>IDEAS%20Charter%20Proposal</span></a>=
<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Your =
comments and feedback welcome.</span><span lang=3D"EN-US"><u></u><u></u></s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Thank=
s</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Padma=
</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">Propo=
sed Charter=C2=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:9.5pt">=C2=
=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identity-enabled solutions and =
applications are increasingly being considered to support mobility solution=
s and multi-homing across heterogeneous access networks.
 Likewise, Internet of Things (IOT), Machine-to-Machine (M2M) and 5G servic=
es, as well as context aware applications all can take advantage of discove=
ry, stricter privacy and security functions.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identifier-locator separation p=
rotocols are examples of technology that require infrastructure that allows=
 nodes to discover the network topological location(s)
 of its peer(s) for packet delivery.=C2=A0 However, additional infrastructu=
re is needed to address new requirements that go well beyond the traditiona=
l discovery service and mapping of identifier-to-location for packet delive=
ry.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Examples of such requirements a=
re:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-=C2=A0=C2=A0 Privacy: =C2=A0Th=
e use of long-lived and public identifiers may be desirable for looking up =
a peer, however it causes privacy issues as well. Indeed, the identifier-lo=
cation
 pairs can be looked up without restriction and flows can be pinned by anyb=
ody to specific end systems.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: The above depic=
ts the gap in current identifier-location protocols rather than
 requirement. May be you might want to add =C2=A0something similar to=E2=80=
=93 =E2=80=9CPrivacy aspect is needed for looking up public identifiers and=
 also for anonymizing the communication without being pinned by man-in-the-=
middle=E2=80=9D.</span><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-=
bottom:5.0pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">-</span><span lang=3D"=
EN-US">=C2=A0=C2=A0 Security: An identifier may reveal information to which
 the end-users may not want to be associated with. Therefore, users and net=
work elements may wish to have a certain degree of control over this inform=
ation to define who can read, write and delete it. The endpoint communicati=
ons should be able to change their
 identifier while retaining their identity and associated policies. This in=
direction should help discourage unsolicited traffic or conceal their sensi=
tive information to eavesdroppers.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-=C2=A0 Interoperability across=
 id-locator infrastructures:
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: id-locator
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> identifier-loca=
tor (as =E2=80=99id=E2=80=99 can be used for both Identity and Identifier
 at this point)</span><span lang=3D"EN-US"><u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-=
bottom:5.0pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In IoT, often technology specif=
ic solutions drive different naming and addressing scheme leading to deploy=
ing disjoint systems. However, several IoT and 5G scenarios
 require that identifier-locator infrastructures are able to interoperate a=
nd exchange information when deployed over different administrative domains=
.=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0-=C2=A0=C2=A0 Low Latency=
: The infrastructures must strive to minimize the latency for mission criti=
cal applications as well as quality user experience
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The Identity Enabled Networks (=
IDEAS) working group is chartered to develop a framework that provides serv=
ices that can be used to address those requirements
 and that can be used with any identity-based protocol. <u></u><u></u></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: identity-based =
protocol
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> Identifier-base=
d protocol??</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The framework includes the iden=
tifier-locator infrastructure and a common control plane for identifier rel=
ated services and identifier=E2=80=93location separation protocols.
 A common control plane is required to facilitate the dynamic discovery of =
the various naming/addressing schemes and the communication between these h=
eterogeneous environments<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Such communication may also imp=
ly some negotiation capabilities, e.g., when several Mapping Systems are ma=
naged by different entities.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Specifically, the IDEAS WG is c=
hartered to work on these areas for the framework:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Features and properties:<u></u>=
<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Registration and lifecycle ma=
nagement of identities associated identifiers.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Definition of policies relate=
d to identities (e.g. access control to discovery)=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Anonymization support (e.g. i=
dentifier anonymity to eavesdroppers)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Authenticated identity (acces=
s to framework, update of information for identifiers)
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Definition and enforcement of=
 policies (e.g. ability to look up an identifier-locator pair, permit forwa=
rding traffic, =E2=80=A6)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Identifier/locator mapping an=
d resolution (e.g. discovery, pub/sub, multihoming..)<u></u><u></u></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Metadata support (e.g. entity=
 or endpoint attributes and properties).
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Endpoint grouping support (e.=
g. negotiation to join, leave and communicate)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Robustness of the system agai=
nst DDoS attacks (e.g. policies for access, rate limiting)<u></u><u></u></s=
pan></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The scope of system should be f=
lexible and allow for different scopes such as local(private) or global(pub=
lic). The scope of the mappings and their relevance
 within the scope will be taken into consideration for leaking of informati=
on. The negotiation of leaking of information from the private to global sy=
stems will be covered with the aim of minimal disruption and minimizing lat=
ency.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The working group will balance =
the requirements for performance of the framework to provide secured, trust=
worthy, and robust communication services with the minimized
 storage of data and privacy considerations. <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The method for updating, cachin=
g and dissemination or leaking of information will be covered to ensure tha=
t state consistency and efficiency.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1f497d">[Uma]: =E2=80=9CThe me=
thod for ..=E2=80=9D
</span><span lang=3D"EN-US" style=3D"font-size:13.0pt;font-family:Wingdings=
;color:#1f497d">=C3=A8</span><span lang=3D"EN-US" style=3D"font-size:13.0pt=
;font-family:&quot;Calibri&quot;,sans-serif;color:#1f497d"> =E2=80=9CA new =
Protocol or an existing Protocol=C2=A0extensions for =E2=80=A6=E2=80=9D</sp=
an><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The working group will cover th=
e management aspects of IDEAS architectural components and the services tha=
t they provide. The working group will identify gaps
 and make recommendations on changes needed for interface interactions betw=
een the framework and identifier-enabled protocols<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The IDEAS WG will collaborate w=
ith other Working Groups to ensure interoperability with LISP, HIP, ILA and=
 other relevant work . Furthermore, it will try to reuse
 technologies already developed when appropriate.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">WG deliverables include:<u></u>=
<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Overall Identity Services Frame=
work
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">WG sustaining/informational doc=
uments may include:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">These documents may not necessa=
rily be published, but may be<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">maintained in a draft form or o=
n a collaborative Working Group wiki<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">to support the efforts of the W=
orking Group and help new comers:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Problem statement
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Use cases<u></u><u></u></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Requirements<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Applications of the architect=
ure for use cases<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Milestones
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Dec 2017 Adopt WG draft for the=
 Identity Services framework<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">May 2018 WGLC for the Identity =
Services framework<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Aug 2018 Send Identity Services=
 framework draft to the IESG<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Camb=
ria&quot;,serif">=C2=A0</span><span lang=3D"EN-US"><u></u><u></u></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
</div>
</div></div></div>
</div>

<br>______________________________<wbr>_________________<br>
Ideas mailing list<br>
<a href=3D"mailto:Ideas@ietf.org">Ideas@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ideas" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/ideas</a><br>
<br></blockquote></div><br></div></div>

--f403045e982a18f16c0550fcd738--


From nobody Fri Jun  2 09:58:27 2017
Return-Path: <tom@herbertland.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 975501289B0 for <ideas@ietfa.amsl.com>; Fri,  2 Jun 2017 09:58:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y7sEMxtXi8xx for <ideas@ietfa.amsl.com>; Fri,  2 Jun 2017 09:58:22 -0700 (PDT)
Received: from mail-wr0-x235.google.com (mail-wr0-x235.google.com [IPv6:2a00:1450:400c:c0c::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F11B1286B2 for <ideas@ietf.org>; Fri,  2 Jun 2017 09:58:22 -0700 (PDT)
Received: by mail-wr0-x235.google.com with SMTP id g76so9969512wrd.1 for <ideas@ietf.org>; Fri, 02 Jun 2017 09:58:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=+dXB0p4qO566jJQBeNiwOJhuXQL4YnkvwIrXCBH5SAo=; b=NyGXHdZYly/uhmjWrcrgKdfuMH/PcHmCOFIDTQjJmoQxGgx8G5fFdpLE11SaXURXF+ Ko1MTIxiIWWNFelY9nlSMxb+iI3bcZvX1x4b2BPcpXMGJ+LY2jjaEqknF7c71uyVeuUp lVCI2kDoUTJ5v9GiBYkG7cq0TLtJWuRHQkF/Vasl9WuZRnobEkAtEV017ZJA+WiucCZD sJnaqgHb2+k19rP+SHbxco/U7hWldZLKjsCjDSBDGGf0R8G6wxYX45EDEwg+XYG1zuWu NETJcaW3fey6mtFCR0p1M1H0FoMUwgQoe7VQsSbkX++fwnpW5G7GAkKQ5gqvD1wElJGP ijLg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=+dXB0p4qO566jJQBeNiwOJhuXQL4YnkvwIrXCBH5SAo=; b=ASMM3DperfL6u61JXL0g03ZgfgwRWSbfyq8jnSRy7hpD+ZKbgmq+L4eRktmYkzg2Dl UwOcrozENqd6sOk9YXUp07hDbSlj/7C9mOlU0swmor6o0wGrtVya6jLhaUpi2OTpb3l5 m7Gb03qzkq9XtoDfLvDQ7RXZRKeQkZSyKSwdlkvuBuz67Dx/2kxzxrWwAmTrXvEtNl/G nqJpkGgeNGO/CPiOS6FtfAa20VgpDxtvslMwFDAdPR72Lg+faBnFH0n3wrW2qKHQ1lgT m4VIUPNhMz8ffIiNONNZ6Drjm81iB5VBNrE4tdtNBaLVnyX3ggTM46c9jK5PIeJUoKN8 TmeA==
X-Gm-Message-State: AODbwcCxtWJKwULdHlmG72SCoRiD+BEgSuoiCnK6QZAxmRaz5Gl9tpjQ yKsXen+mmgOCZZ5dzDSh3dJZbyqcZkJb
X-Received: by 10.223.166.196 with SMTP id t62mr5425288wrc.52.1496422700731; Fri, 02 Jun 2017 09:58:20 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.132.135 with HTTP; Fri, 2 Jun 2017 09:58:19 -0700 (PDT)
Received: by 10.223.132.135 with HTTP; Fri, 2 Jun 2017 09:58:19 -0700 (PDT)
In-Reply-To: <C1CE72EE84AF224E94DA21AE134209EE0104F82A@SZXEMI508-MBS.china.huawei.com>
References: <CAG-CQxpZeoEUE7bprXODdKTEMFc5pqTJ5_HO8SZ3OiBc=QOpbg@mail.gmail.com> <25B4902B1192E84696414485F5726854018BC2AF@SJCEML701-CHM.china.huawei.com> <CAG-CQxoDrC_9BtqqvWeK6bn=HNBrDCkqmy9or6-Jk3RbYeYEiA@mail.gmail.com> <C1CE72EE84AF224E94DA21AE134209EE0104F6C8@SZXEMI508-MBS.china.huawei.com> <CAG-CQxpTyYLG0NpZqp-bsPn=D7a-4crGnq6jO3pj0SD_DHN3QA@mail.gmail.com> <C1CE72EE84AF224E94DA21AE134209EE0104F82A@SZXEMI508-MBS.china.huawei.com>
From: Tom Herbert <tom@herbertland.com>
Date: Fri, 2 Jun 2017 09:58:19 -0700
Message-ID: <CALx6S372bz2NOF1c1pxNzsxo4-EeBO7M-kZrpFXiGwT0475=kA@mail.gmail.com>
To: "Liubingyang (Bryan)" <liubingyang@huawei.com>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>, ideas@ietf.org,  Uma Chunduri <uma.chunduri@huawei.com>
Content-Type: multipart/alternative; boundary="001a1147705082e60e0550fd0ff1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/gCB_utPM4rTXMXH6quIeIk7lZkg>
Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter Proposal
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Jun 2017 16:58:25 -0000

--001a1147705082e60e0550fd0ff1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Jun 1, 2017 at 6:16 PM, Liubingyang (Bryan) <liubingyang@huawei.com=
>
wrote:
> Yes, I also think the protocols should use the framework as their will.
>
It sounds like a nice to have but I don't think it can be a requirement.
That would be the equivalent of saying that future versions of IP should be
compatible with RIP.

> Another question is whether future ID protocols must be compatible with
the
> framework, but I think we can defer answering the question to the
framework
> RFC.

I think we should make sure its compatible with all know ID and
virtualization protocols if possible. Probably enough there to get some
confidence IDEAS is future proof.

Tom

>
>
>
> Bingyang
>
>
>
> From: Padma Pillay-Esnault [mailto:padma.ietf@gmail.com]
> Sent: Thursday, June 01, 2017 11:32 PM
> To: Liubingyang (Bryan) <liubingyang@huawei.com>
> Cc: Uma Chunduri <uma.chunduri@huawei.com>; ideas@ietf.org
>
>
> Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charte=
r
> Proposal
>
>
>
> Hi Bingyang
>
>
>
> On Thu, Jun 1, 2017 at 1:33 AM, Liubingyang (Bryan) <
liubingyang@huawei.com>
> wrote:
>
> Hi Padma,
>
>
>
> Thanks for the well edited draft. I have a problem with the following
> sentence:
>
>>> The Identity Enabled Networks (IDEAS) working group is chartered to
>>> develop a framework that provides services that can be used to address
those
>>> requirements and that can be used with any identity-based protocol.
>
>
>
> Does it mean that the IDEAS framework can be used by ALL EXISTING ID-base=
d
> protocols, as well as ALL FUTURE ID-base protocols? If anybody designs a
new
> ID protocol in IETF in the future, the protocol should follow the
framework?
> Maybe IDEAS should have a more conservative goal than that.
>
>
>
>
>
> How about change "with any" to "by"?
>
> I think this should clarify that protocols could use this framework shoul=
d
> they wish to do so.
>
>
>
> Thanks
>
> Padma
>
>
>
> Bingyang (Bryan)
>
>
>
> From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Padma
> Pillay-Esnault
> Sent: Thursday, June 01, 2017 3:46 AM
> To: Uma Chunduri <uma.chunduri@huawei.com>
> Cc: ideas@ietf.org; Padma Pillay-Esnault <padma.ietf@gmail.com>
>
>
> Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charte=
r
> Proposal
>
>
>
> Hi Uma
>
>
>
> Thanks for your review!
>
>
>
> Agree with your comments - will update
>
>
>
> Thanks
>
> Padma
>
>
>
> On Wed, May 31, 2017 at 11:38 AM, Uma Chunduri <uma.chunduri@huawei.com>
> wrote:
>
> Thanks for more refined version, which does reflect lot of discussion in
the
> mailing-list on the charter.
>
> Have few comments in-line below [Uma]:
>
>
>
> --
>
> Uma C.
>
>
>
> From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Padma
> Pillay-Esnault
> Sent: Wednesday, May 31, 2017 10:51 AM
> To: ideas@ietf.org
> Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>
> Subject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charte=
r
> Proposal
>
>
>
> Hello IDEAS
>
>
>
> Thank you for the feedback and comments on the first Charter Proposal.
>
> This version aims to capture your suggestions and comments.
>
> Please note that the document went through editorial changes for
> consistency, clarity and balance.
>
>
>
> I have also posted a version of it on GITHUB
>
>
https://github.com/IETF-IDEAS/Charter-Proposal/blob/master/IDEAS%20Charter%=
20Proposal
>
>
>
> Your comments and feedback welcome.
>
>
>
> Thanks
>
> Padma
>
>
>
>
>
>
>
> Proposed Charter
>
>
>
> Identity-enabled solutions and applications are increasingly being
> considered to support mobility solutions and multi-homing across
> heterogeneous access networks. Likewise, Internet of Things (IOT),
> Machine-to-Machine (M2M) and 5G services, as well as context aware
> applications all can take advantage of discovery, stricter privacy and
> security functions.
>
>
>
> Identifier-locator separation protocols are examples of technology that
> require infrastructure that allows nodes to discover the network
topological
> location(s) of its peer(s) for packet delivery. However, additional
> infrastructure is needed to address new requirements that go well beyond
the
> traditional discovery service and mapping of identifier-to-location for
> packet delivery.
>
>
>
> Examples of such requirements are:
>
> - Privacy: The use of long-lived and public identifiers may be desirable
> for looking up a peer, however it causes privacy issues as well. Indeed,
the
> identifier-location pairs can be looked up without restriction and flows
can
> be pinned by anybody to specific end systems.
>
> [Uma]: The above depicts the gap in current identifier-location protocols
> rather than requirement. May be you might want to add something similar
to=E2=80=93
> =E2=80=9CPrivacy aspect is needed for looking up public identifiers and a=
lso for
> anonymizing the communication without being pinned by man-in-the-middle=
=E2=80=9D.
>
> - Security: An identifier may reveal information to which the end-users
> may not want to be associated with. Therefore, users and network elements
> may wish to have a certain degree of control over this information to
define
> who can read, write and delete it. The endpoint communications should be
> able to change their identifier while retaining their identity and
> associated policies. This indirection should help discourage unsolicited
> traffic or conceal their sensitive information to eavesdroppers.
>
> - Interoperability across id-locator infrastructures:
>
> [Uma]: id-locator =C3=A8 identifier-locator (as =E2=80=99id=E2=80=99 can =
be used for both
> Identity and Identifier at this point)
>
> In IoT, often technology specific solutions drive different naming and
> addressing scheme leading to deploying disjoint systems. However, several
> IoT and 5G scenarios require that identifier-locator infrastructures are
> able to interoperate and exchange information when deployed over differen=
t
> administrative domains.
>
> - Low Latency: The infrastructures must strive to minimize the latency
> for mission critical applications as well as quality user experience
>
>
>
> The Identity Enabled Networks (IDEAS) working group is chartered to
develop
> a framework that provides services that can be used to address those
> requirements and that can be used with any identity-based protocol.
>
> [Uma]: identity-based protocol =C3=A8 Identifier-based protocol??
>
> The framework includes the identifier-locator infrastructure and a common
> control plane for identifier related services and identifier=E2=80=93loca=
tion
> separation protocols. A common control plane is required to facilitate th=
e
> dynamic discovery of the various naming/addressing schemes and the
> communication between these heterogeneous environments
>
> Such communication may also imply some negotiation capabilities, e.g.,
when
> several Mapping Systems are managed by different entities.
>
>
>
> Specifically, the IDEAS WG is chartered to work on these areas for the
> framework:
>
>
>
> Features and properties:
>
> - Registration and lifecycle management of identities associated
> identifiers.
>
> - Definition of policies related to identities (e.g. access control to
> discovery)
>
> - Anonymization support (e.g. identifier anonymity to eavesdroppers)
>
> - Authenticated identity (access to framework, update of information for
> identifiers)
>
> - Definition and enforcement of policies (e.g. ability to look up an
> identifier-locator pair, permit forwarding traffic, =E2=80=A6)
>
> - Identifier/locator mapping and resolution (e.g. discovery, pub/sub,
> multihoming..)
>
> - Metadata support (e.g. entity or endpoint attributes and properties).
>
> - Endpoint grouping support (e.g. negotiation to join, leave and
> communicate)
>
> - Robustness of the system against DDoS attacks (e.g. policies for access=
,
> rate limiting)
>
>
>
> The scope of system should be flexible and allow for different scopes suc=
h
> as local(private) or global(public). The scope of the mappings and their
> relevance within the scope will be taken into consideration for leaking o=
f
> information. The negotiation of leaking of information from the private t=
o
> global systems will be covered with the aim of minimal disruption and
> minimizing latency.
>
>
>
> The working group will balance the requirements for performance of the
> framework to provide secured, trustworthy, and robust communication
services
> with the minimized storage of data and privacy considerations.
>
> The method for updating, caching and dissemination or leaking of
information
> will be covered to ensure that state consistency and efficiency.
>
> [Uma]: =E2=80=9CThe method for ..=E2=80=9D =C3=A8 =E2=80=9CA new Protocol=
 or an existing Protocol
> extensions for =E2=80=A6=E2=80=9D
>
> The working group will cover the management aspects of IDEAS architectura=
l
> components and the services that they provide. The working group will
> identify gaps and make recommendations on changes needed for interface
> interactions between the framework and identifier-enabled protocols
>
>
>
> The IDEAS WG will collaborate with other Working Groups to ensure
> interoperability with LISP, HIP, ILA and other relevant work .
Furthermore,
> it will try to reuse technologies already developed when appropriate.
>
>
>
> WG deliverables include:
>
> Overall Identity Services Framework
>
>
>
> WG sustaining/informational documents may include:
>
>
>
> These documents may not necessarily be published, but may be
>
> maintained in a draft form or on a collaborative Working Group wiki
>
> to support the efforts of the Working Group and help new comers:
>
> -Problem statement
>
> -Use cases
>
> -Requirements
>
> - Applications of the architecture for use cases
>
>
>
> Milestones
>
> Dec 2017 Adopt WG draft for the Identity Services framework
>
> May 2018 WGLC for the Identity Services framework
>
> Aug 2018 Send Identity Services framework draft to the IESG
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas
>

--001a1147705082e60e0550fd0ff1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><br><br>On Thu, Jun 1, 2017 at 6:16 PM, Liubingyang (Brya=
n) &lt;<a href=3D"mailto:liubingyang@huawei.com">liubingyang@huawei.com</a>=
&gt; wrote:<br>&gt; Yes, I also think the protocols should use the framewor=
k as their will.<br>&gt;<br>It sounds like a nice to have but I don&#39;t t=
hink it can be a requirement. That would be the equivalent of saying that f=
uture versions of IP should be compatible with RIP.<br><br>&gt; Another que=
stion is whether future ID protocols must be compatible with the<br>&gt; fr=
amework, but I think we can defer answering the question to the framework<b=
r>&gt; RFC.<div dir=3D"auto"><br></div><div dir=3D"auto">I think we should =
make sure its compatible with all know ID and virtualization protocols if p=
ossible. Probably enough there to get some confidence IDEAS is future proof=
.</div><div dir=3D"auto"><br></div><div dir=3D"auto">Tom</div><div dir=3D"a=
uto"><br>&gt;<br>&gt;  <br>&gt;<br>&gt; Bingyang<br>&gt;<br>&gt;  <br>&gt;<=
br>&gt; From: Padma Pillay-Esnault [mailto:<a href=3D"mailto:padma.ietf@gma=
il.com">padma.ietf@gmail.com</a>]<br>&gt; Sent: Thursday, June 01, 2017 11:=
32 PM<br>&gt; To: Liubingyang (Bryan) &lt;<a href=3D"mailto:liubingyang@hua=
wei.com">liubingyang@huawei.com</a>&gt;<br>&gt; Cc: Uma Chunduri &lt;<a hre=
f=3D"mailto:uma.chunduri@huawei.com">uma.chunduri@huawei.com</a>&gt;; <a hr=
ef=3D"mailto:ideas@ietf.org">ideas@ietf.org</a><br>&gt;<br>&gt;<br>&gt; Sub=
ject: Re: [Ideas] Prep for BOF in July - Your input Needed on a Charter<br>=
&gt; Proposal<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Hi Bingyang<br>&gt;<br>&gt;=
  <br>&gt;<br>&gt; On Thu, Jun 1, 2017 at 1:33 AM, Liubingyang (Bryan) &lt;=
<a href=3D"mailto:liubingyang@huawei.com">liubingyang@huawei.com</a>&gt;<br=
>&gt; wrote:<br>&gt;<br>&gt; Hi Padma,<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Th=
anks for the well edited draft. I have a problem with the following<br>&gt;=
 sentence:<br>&gt;<br>&gt;&gt;&gt; The Identity Enabled Networks (IDEAS) wo=
rking group is chartered to<br>&gt;&gt;&gt; develop a framework that provid=
es services that can be used to address those<br>&gt;&gt;&gt; requirements =
and that can be used with any identity-based protocol.<br>&gt;<br>&gt;  <br=
>&gt;<br>&gt; Does it mean that the IDEAS framework can be used by ALL EXIS=
TING ID-based<br>&gt; protocols, as well as ALL FUTURE ID-base protocols? I=
f anybody designs a new<br>&gt; ID protocol in IETF in the future, the prot=
ocol should follow the framework?<br>&gt; Maybe IDEAS should have a more co=
nservative goal than that.<br>&gt;<br>&gt;  <br>&gt;<br>&gt;  <br>&gt;<br>&=
gt; How about change &quot;with any&quot; to &quot;by&quot;?<br>&gt;<br>&gt=
; I think this should clarify that protocols could use this framework shoul=
d<br>&gt; they wish to do so.<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Thanks<br>&=
gt;<br>&gt; Padma<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Bingyang (Bryan)<br>&gt=
;<br>&gt;  <br>&gt;<br>&gt; From: Ideas [mailto:<a href=3D"mailto:ideas-bou=
nces@ietf.org">ideas-bounces@ietf.org</a>] On Behalf Of Padma<br>&gt; Pilla=
y-Esnault<br>&gt; Sent: Thursday, June 01, 2017 3:46 AM<br>&gt; To: Uma Chu=
nduri &lt;<a href=3D"mailto:uma.chunduri@huawei.com">uma.chunduri@huawei.co=
m</a>&gt;<br>&gt; Cc: <a href=3D"mailto:ideas@ietf.org">ideas@ietf.org</a>;=
 Padma Pillay-Esnault &lt;<a href=3D"mailto:padma.ietf@gmail.com">padma.iet=
f@gmail.com</a>&gt;<br>&gt;<br>&gt;<br>&gt; Subject: Re: [Ideas] Prep for B=
OF in July - Your input Needed on a Charter<br>&gt; Proposal<br>&gt;<br>&gt=
;  <br>&gt;<br>&gt; Hi Uma<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Thanks for you=
r review!<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Agree with your comments - will=
 update<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Thanks<br>&gt;<br>&gt; Padma<br>&=
gt;<br>&gt;  <br>&gt;<br>&gt; On Wed, May 31, 2017 at 11:38 AM, Uma Chundur=
i &lt;<a href=3D"mailto:uma.chunduri@huawei.com">uma.chunduri@huawei.com</a=
>&gt;<br>&gt; wrote:<br>&gt;<br>&gt; Thanks for more refined version, which=
 does reflect lot of discussion in the<br>&gt; mailing-list on the charter.=
<br>&gt;<br>&gt; Have few comments in-line below [Uma]:<br>&gt;<br>&gt;  <b=
r>&gt;<br>&gt; --<br>&gt;<br>&gt; Uma C.<br>&gt;<br>&gt;  <br>&gt;<br>&gt; =
From: Ideas [mailto:<a href=3D"mailto:ideas-bounces@ietf.org">ideas-bounces=
@ietf.org</a>] On Behalf Of Padma<br>&gt; Pillay-Esnault<br>&gt; Sent: Wedn=
esday, May 31, 2017 10:51 AM<br>&gt; To: <a href=3D"mailto:ideas@ietf.org">=
ideas@ietf.org</a><br>&gt; Cc: Padma Pillay-Esnault &lt;<a href=3D"mailto:p=
adma.ietf@gmail.com">padma.ietf@gmail.com</a>&gt;<br>&gt; Subject: Re: [Ide=
as] Prep for BOF in July - Your input Needed on a Charter<br>&gt; Proposal<=
br>&gt;<br>&gt;  <br>&gt;<br>&gt; Hello IDEAS<br>&gt;<br>&gt;  <br>&gt;<br>=
&gt; Thank you for the feedback and comments on the first Charter Proposal.=
<br>&gt;<br>&gt; This version aims to capture your suggestions and comments=
.<br>&gt;<br>&gt; Please note that the document went through editorial chan=
ges for<br>&gt; consistency, clarity and balance.<br>&gt;<br>&gt;  <br>&gt;=
<br>&gt; I have also posted a version of it on GITHUB  <br>&gt;<br>&gt; <a =
href=3D"https://github.com/IETF-IDEAS/Charter-Proposal/blob/master/IDEAS%20=
Charter%20Proposal">https://github.com/IETF-IDEAS/Charter-Proposal/blob/mas=
ter/IDEAS%20Charter%20Proposal</a><br>&gt;<br>&gt;  <br>&gt;<br>&gt; Your c=
omments and feedback welcome.<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Thanks<br>&=
gt;<br>&gt; Padma<br>&gt;<br>&gt;  <br>&gt;<br>&gt;  <br>&gt;<br>&gt;  <br>=
&gt;<br>&gt; Proposed Charter<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Identity-en=
abled solutions and applications are increasingly being<br>&gt; considered =
to support mobility solutions and multi-homing across<br>&gt; heterogeneous=
 access networks. Likewise, Internet of Things (IOT),<br>&gt; Machine-to-Ma=
chine (M2M) and 5G services, as well as context aware<br>&gt; applications =
all can take advantage of discovery, stricter privacy and<br>&gt; security =
functions.<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Identifier-locator separation =
protocols are examples of technology that<br>&gt; require infrastructure th=
at allows nodes to discover the network topological<br>&gt; location(s) of =
its peer(s) for packet delivery.  However, additional<br>&gt; infrastructur=
e is needed to address new requirements that go well beyond the<br>&gt; tra=
ditional discovery service and mapping of identifier-to-location for<br>&gt=
; packet delivery.<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Examples of such requi=
rements are:<br>&gt;<br>&gt; -   Privacy:  The use of long-lived and public=
 identifiers may be desirable<br>&gt; for looking up a peer, however it cau=
ses privacy issues as well. Indeed, the<br>&gt; identifier-location pairs c=
an be looked up without restriction and flows can<br>&gt; be pinned by anyb=
ody to specific end systems.<br>&gt;<br>&gt; [Uma]: The above depicts the g=
ap in current identifier-location protocols<br>&gt; rather than requirement=
. May be you might want to add  something similar to=E2=80=93<br>&gt; =E2=
=80=9CPrivacy aspect is needed for looking up public identifiers and also f=
or<br>&gt; anonymizing the communication without being pinned by man-in-the=
-middle=E2=80=9D.<br>&gt;<br>&gt; -   Security: An identifier may reveal in=
formation to which the end-users<br>&gt; may not want to be associated with=
. Therefore, users and network elements<br>&gt; may wish to have a certain =
degree of control over this information to define<br>&gt; who can read, wri=
te and delete it. The endpoint communications should be<br>&gt; able to cha=
nge their identifier while retaining their identity and<br>&gt; associated =
policies. This indirection should help discourage unsolicited<br>&gt; traff=
ic or conceal their sensitive information to eavesdroppers.<br>&gt;<br>&gt;=
 -  Interoperability across id-locator infrastructures:<br>&gt;<br>&gt; [Um=
a]: id-locator =C3=A8 identifier-locator (as =E2=80=99id=E2=80=99 can be us=
ed for both<br>&gt; Identity and Identifier at this point)<br>&gt;<br>&gt; =
In IoT, often technology specific solutions drive different naming and<br>&=
gt; addressing scheme leading to deploying disjoint systems. However, sever=
al<br>&gt; IoT and 5G scenarios require that identifier-locator infrastruct=
ures are<br>&gt; able to interoperate and exchange information when deploye=
d over different<br>&gt; administrative domains.<br>&gt;<br>&gt;  -   Low L=
atency: The infrastructures must strive to minimize the latency<br>&gt; for=
 mission critical applications as well as quality user experience<br>&gt;<b=
r>&gt;  <br>&gt;<br>&gt; The Identity Enabled Networks (IDEAS) working grou=
p is chartered to develop<br>&gt; a framework that provides services that c=
an be used to address those<br>&gt; requirements and that can be used with =
any identity-based protocol.<br>&gt;<br>&gt; [Uma]: identity-based protocol=
 =C3=A8 Identifier-based protocol??<br>&gt;<br>&gt; The framework includes =
the identifier-locator infrastructure and a common<br>&gt; control plane fo=
r identifier related services and identifier=E2=80=93location<br>&gt; separ=
ation protocols. A common control plane is required to facilitate the<br>&g=
t; dynamic discovery of the various naming/addressing schemes and the<br>&g=
t; communication between these heterogeneous environments<br>&gt;<br>&gt; S=
uch communication may also imply some negotiation capabilities, e.g., when<=
br>&gt; several Mapping Systems are managed by different entities.<br>&gt;<=
br>&gt;  <br>&gt;<br>&gt; Specifically, the IDEAS WG is chartered to work o=
n these areas for the<br>&gt; framework:<br>&gt;<br>&gt;  <br>&gt;<br>&gt; =
Features and properties:<br>&gt;<br>&gt; - Registration and lifecycle manag=
ement of identities associated<br>&gt; identifiers.<br>&gt;<br>&gt; - Defin=
ition of policies related to identities (e.g. access control to<br>&gt; dis=
covery)      <br>&gt;<br>&gt; - Anonymization support (e.g. identifier anon=
ymity to eavesdroppers)<br>&gt;<br>&gt; - Authenticated identity (access to=
 framework, update of information for<br>&gt; identifiers)<br>&gt;<br>&gt; =
- Definition and enforcement of policies (e.g. ability to look up an<br>&gt=
; identifier-locator pair, permit forwarding traffic, =E2=80=A6)<br>&gt;<br=
>&gt; - Identifier/locator mapping and resolution (e.g. discovery, pub/sub,=
<br>&gt; multihoming..)<br>&gt;<br>&gt; - Metadata support (e.g. entity or =
endpoint attributes and properties).<br>&gt;<br>&gt; - Endpoint grouping su=
pport (e.g. negotiation to join, leave and<br>&gt; communicate)<br>&gt;<br>=
&gt; - Robustness of the system against DDoS attacks (e.g. policies for acc=
ess,<br>&gt; rate limiting)<br>&gt;<br>&gt;  <br>&gt;<br>&gt; The scope of =
system should be flexible and allow for different scopes such<br>&gt; as lo=
cal(private) or global(public). The scope of the mappings and their<br>&gt;=
 relevance within the scope will be taken into consideration for leaking of=
<br>&gt; information. The negotiation of leaking of information from the pr=
ivate to<br>&gt; global systems will be covered with the aim of minimal dis=
ruption and<br>&gt; minimizing latency.<br>&gt;<br>&gt;  <br>&gt;<br>&gt; T=
he working group will balance the requirements for performance of the<br>&g=
t; framework to provide secured, trustworthy, and robust communication serv=
ices<br>&gt; with the minimized storage of data and privacy considerations.=
<br>&gt;<br>&gt; The method for updating, caching and dissemination or leak=
ing of information<br>&gt; will be covered to ensure that state consistency=
 and efficiency.<br>&gt;<br>&gt; [Uma]: =E2=80=9CThe method for ..=E2=80=9D=
 =C3=A8 =E2=80=9CA new Protocol or an existing Protocol<br>&gt; extensions =
for =E2=80=A6=E2=80=9D<br>&gt;<br>&gt; The working group will cover the man=
agement aspects of IDEAS architectural<br>&gt; components and the services =
that they provide. The working group will<br>&gt; identify gaps and make re=
commendations on changes needed for interface<br>&gt; interactions between =
the framework and identifier-enabled protocols<br>&gt;<br>&gt;  <br>&gt;<br=
>&gt; The IDEAS WG will collaborate with other Working Groups to ensure<br>=
&gt; interoperability with LISP, HIP, ILA and other relevant work . Further=
more,<br>&gt; it will try to reuse technologies already developed when appr=
opriate.<br>&gt;<br>&gt;  <br>&gt;<br>&gt; WG deliverables include:<br>&gt;=
<br>&gt; Overall Identity Services Framework<br>&gt;<br>&gt;  <br>&gt;<br>&=
gt; WG sustaining/informational documents may include:<br>&gt;<br>&gt;  <br=
>&gt;<br>&gt; These documents may not necessarily be published, but may be<=
br>&gt;<br>&gt; maintained in a draft form or on a collaborative Working Gr=
oup wiki<br>&gt;<br>&gt; to support the efforts of the Working Group and he=
lp new comers:<br>&gt;<br>&gt; -Problem statement<br>&gt;<br>&gt; -Use case=
s<br>&gt;<br>&gt; -Requirements<br>&gt;<br>&gt; - Applications of the archi=
tecture for use cases<br>&gt;<br>&gt;  <br>&gt;<br>&gt; Milestones<br>&gt;<=
br>&gt; Dec 2017 Adopt WG draft for the Identity Services framework<br>&gt;=
<br>&gt; May 2018 WGLC for the Identity Services framework<br>&gt;<br>&gt; =
Aug 2018 Send Identity Services framework draft to the IESG<br>&gt;<br>&gt;=
  <br>&gt;<br>&gt;  <br>&gt;<br>&gt;  <br>&gt;<br>&gt;  <br>&gt;<br>&gt;<br=
>&gt; _______________________________________________<br>&gt; Ideas mailing=
 list<br>&gt; <a href=3D"mailto:Ideas@ietf.org">Ideas@ietf.org</a><br>&gt; =
<a href=3D"https://www.ietf.org/mailman/listinfo/ideas">https://www.ietf.or=
g/mailman/listinfo/ideas</a><br>&gt;</div></div>

--001a1147705082e60e0550fd0ff1--


From nobody Wed Jun  7 08:41:27 2017
Return-Path: <session-request@ietf.org>
X-Original-To: ideas@ietf.org
Delivered-To: ideas@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 35503129456; Wed,  7 Jun 2017 08:41:25 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: aretana@cisco.com, ideas@ietf.org, cmorgan@amsl.com, ideas-chairs@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.53.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149685008512.2571.10414949927868896280.idtracker@ietfa.amsl.com>
Date: Wed, 07 Jun 2017 08:41:25 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/JVcQUKElJ_veccE7cFgXqd9YVVo>
Subject: [Ideas] ideas - New Meeting Session Request for IETF 99
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Jun 2017 15:41:25 -0000

A new meeting session request has just been submitted by Cindy Morgan, on behalf of the ideas working group.


---------------------------------------------------------
Working Group Name: IDentity Enabled Networks
Area Name: Routing Area
Session Requester: Cindy Morgan

Number of Sessions: 1
Length of Session(s):  1.5 Hours
Number of Attendees: 100
Conflicts to Avoid: 
 First Priority:  rtgarea opsarea nvo3 hip netconf i2rs nmrg sfc anima




People who must be present:
  Erik Nordmark
  Alvaro Retana

Resources Requested:

Special Requests:
  
---------------------------------------------------------


From nobody Wed Jun  7 14:46:15 2017
Return-Path: <aretana@cisco.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10ADB127867 for <ideas@ietfa.amsl.com>; Wed,  7 Jun 2017 14:46:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level: 
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gZDQ16O3xw9V for <ideas@ietfa.amsl.com>; Wed,  7 Jun 2017 14:46:12 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC8DB127180 for <ideas@ietf.org>; Wed,  7 Jun 2017 14:46:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13944; q=dns/txt; s=iport; t=1496871971; x=1498081571; h=from:to:cc:subject:date:message-id:mime-version; bh=L2ZfbSWL6nIi0Iy3B8pP/HwNNdNDvH/eiVc38UKfkA8=; b=BXboBtVX7NHp5yZA7bsy0L485gwStD06umbtQAenNggIOiCbzClRjJyb pY4JWwD0Z0qNz4cafi+XbSQ/VStLQudwA0jrp1eZuLQDfwhxC15aGfyQh 5d8yv2mrRcYH3UUMSyR3GqzmIQTb1hWtvFYzCtb97bOpcEOMnxNbmq5ru s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0C8AgCrczhZ/5NdJa1UChoBAQEBAgEBA?= =?us-ascii?q?QEIAQEBAYJvaWKBFINsrEiFOYIQhiQcgltBFgECAQEBAQEBAWsdC4VCTAoSAUo?= =?us-ascii?q?CBDAnBA4ZiTNkryeCJiuLVAEBAQEBAQEBAQEBAQEBAQEBAQEBAR2GYYFgK4Fph?= =?us-ascii?q?U6DOjCCMQWXB4cyAopbiFuCBoU+ijyUZgElATGBCnQVRhIBhnWJaoENAQEB?=
X-IronPort-AV: E=Sophos;i="5.39,311,1493683200";  d="scan'208,217";a="437236661"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Jun 2017 21:46:10 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id v57LkAnh029934 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 7 Jun 2017 21:46:10 GMT
Received: from xch-aln-002.cisco.com (173.36.7.12) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Wed, 7 Jun 2017 16:46:10 -0500
Received: from xch-aln-002.cisco.com ([173.36.7.12]) by XCH-ALN-002.cisco.com ([173.36.7.12]) with mapi id 15.00.1210.000; Wed, 7 Jun 2017 16:46:10 -0500
From: "Alvaro Retana (aretana)" <aretana@cisco.com>
To: "ideas@ietf.org" <ideas@ietf.org>
CC: Erik Nordmark <nordmark@sonic.net>
Thread-Topic: IDEAS BoF at IETF 99
Thread-Index: AQHS39d501yV03+L3U+9TQOEunhjgg==
Date: Wed, 7 Jun 2017 21:46:10 +0000
Message-ID: <888CBBFE-F20A-4DC8-AD0B-019C8E6400FD@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.20.0.170309
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.15.4]
Content-Type: multipart/alternative; boundary="_000_888CBBFEF20A4DC8AD0B019C8E6400FDciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/WGakcFaMF65H11AW_HOu1vfow5Q>
Subject: [Ideas] IDEAS BoF at IETF 99
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Jun 2017 21:46:14 -0000

--_000_888CBBFEF20A4DC8AD0B019C8E6400FDciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

RGVhciBJREVBUyBsaXN0Og0KDQpUaGUgSUFCL0lFU0cgaGVsZCBvdXIgQm9GIENvb3JkaW5hdGlv
biBDYWxsIHRvZGF5LCBhbmQgaXQgd2FzIGRlY2lkZWQgdG8gZ28gZm9yd2FyZCB3aXRoIGFuIElE
RUFTIEJvRiBhdCBJRVRGIDk5LiAgQ29uZ3JhdHVsYXRpb25zIQ0KVGhlcmUgYXJlIGhvd2V2ZXIg
c29tZSBjb25jZXJucyB0aGF0IHdlIG5lZWQgeW91IChwcm9wb25lbnRzL3BhcnRpY2lwYW50cy9h
dXRob3JzKSB0byBhZGRyZXNzIGF0IHRoZSBCb0YuICBCYXNlZCBvbiB0aGF0LCB3ZSBzaG91bGQg
aWRlYWxseSBiZSBhYmxlIHRvIHRha2Ugc29tZSBhY3Rpb24sIHdoaWNoIGNvdWxkIGluY2x1ZGUg
Y2hhcnRlcmluZyBhIFdHKHMpLCBkZWNpZGluZyB0aGF0IHRoZSB3b3JrIGJlbG9uZ3MgaW4gZXhp
c3RpbmcgV0dzLCBhIGNvbWJpbmF0aW9uLCBvciBldmVuIHRoZSBkZWNpc2lvbiBvZiBub3QgZG9p
bmcgYW55dGhpbmcuICBGcm9tIG15IHBvaW50IG9mIHZpZXcsIHRoZSBzdWNjZXNzIG9mIHRoZSBC
b0Ygc2hvdWxkIGJlIG1lYXN1cmVkIGJ5IHdoZXRoZXIgd2UgaGF2ZSB0aGUgbmVjZXNzYXJ5IGlu
Zm9ybWF0aW9uIHRvIG1ha2UgdGhlIGNvcnJlY3QgZGVjaXNpb24uDQpJbiBzdW1tYXJ5LCB0aGUg
Z2VuZXJhbCBjb25jZXJucyBhcmUgKGluIG5vIHBhcnRpY3VsYXIgb3JkZXIpOg0KLSBQb3J0aW9u
cyBvZiB0aGUgZXhpc3RpbmcgZHJhZnRzLCBhbmQgZXZlbiB0aGUgcHJvcG9zZWQgQ2hhcnRlciwg
c291bmQgbGlrZSBtYXJrZXRpbmcgbWF0ZXJpYWxzLiAgVGhlIElFVEYsIGFuZCB0aGlzIHByb2Nl
c3MgaW4gcGFydGljdWxhciwgYXJlIG5vdCB0aGUgcGxhY2UgdG8gZG8gbWFya2V0aW5nIOKAkyB3
ZSBuZWVkIHlvdSB0aGVuIHRvIGNsZWFuIHVwIHRoZSBleGlzdGluZyBkb2N1bWVudGF0aW9uIGFu
ZCBzaW1wbHkgZ2V0IHRvIHRoZSB0ZWNobmljYWwgcG9pbnQgeW914oCZcmUgdHJ5aW5nIHRvIG1h
a2UuDQotIEl0IGlzIG5vdCBjb21wbGV0ZWx5IGNsZWFyIGZyb20gdGhlIGN1cnJlbnQgZG9jdW1l
bnRzIGV4YWN0bHkgd2hhdCB0aGUgSUVURiBjYW4vc2hvdWxkIHdvcmsgb24uICBXZSBuZWVkIGEg
Z2FwIGFuYWx5c2lzIHRoYXQgY2xlYXJseSBhbmQgZXhwbGljaXRseSBzcGVsbHMgb3V0IHdoYXQg
aXMgbmVlZGVkIGFuZCBhIGRpc2N1c3Npb24gb2Ygd2h5IGN1cnJlbnQgcHJvdG9jb2xzIG1heSBu
b3QgYmUgYXBwcm9wcmlhdGUgKGlmIGEgbmV3IHByb3RvY29sIGlzIHJlcXVpcmVkLCBmb3IgZXhh
bXBsZSkuDQotIEEgcXVlc3Rpb24gd2FzIGJyb3VnaHQgdXAgYWJvdXQgY3VycmVudCBkZXBsb3lt
ZW50IG9mIGV4aXN0aW5nIElEL0xvYyBwcm90b2NvbHMgKGxpc3AsIGlsYSwgZXRjLikgYW5kIHdo
ZXRoZXIgYSBjb21tb24gZnJhbWV3b3JrIGlzIG5lZWRlZCAoYXMgcHJvcG9zZWQpIG9yIGlmIHRo
ZSBjb21tdW5pdHkgd291bGQgYmUgYmV0dGVyIHNlcnZlZCBieSBhIG5ldyBwcm90b2NvbOKApm9y
IG1heWJlIGJvdGguICBJT1csIHdlIHdvdWxkIGxpa2UgdG8gc2VlIHRoaXMgZGlzY3Vzc2lvbiBh
cyBwYXJ0IG9mIHRoZSBwcm9ibGVtIGRlc2NyaXB0aW9uIGFuZCBqdXN0aWZpY2F0aW9uIGZvciB0
aGUgd29yay4NCi0gV2hhdCBhYm91dCBvdmVybGFwIHdpdGggb3RoZXIgU0RPcz8gV2h5IGlzIHRo
ZSBJRVRGIHRoZSByaWdodCBwbGFjZT8NCg0KV2Ugd291bGQgb2YgY291cnNlIG5vdCBvbmx5IHdh
bnQgdG8gc2VlIHRoZXNlIHBvaW50cyBjb3ZlcmVkIGR1cmluZyB0aGUgQm9GLCBidXQgYWxzbyBk
b2N1bWVudGVkIGluIHRoZSBhcHByb3ByaWF0ZSBkcmFmdHMuICBQbGVhc2Uga2VlcCB0aGUgSUQg
c3VibWlzc2lvbiBjdXQtb2ZmIGRhdGUgaW4gbWluZCAoSnVseS8zKS4NCg0KRXJpayBOb3JkbWFy
ayAoY2PigJlkKSBoYXMgc3RlcHBlZCB1cCB0byBhY3QgYXMgSUFCIFNoZXBoZXJkLiAgSGUgd2ls
bCB3b3JrIHdpdGggeW91ICh0aGUgcHJvcG9uZW50cy9saXN0KSB3aXRoIGFuIGFyY2hpdGVjdHVy
YWwgcG9pbnQgb2YgdmlldyBpbiBtaW5kLiAgSSB3aWxsIGNvbnRpbnVlIHRvIGJlIHRoZSBSZXNw
b25zaWJsZSBBRCB0aHJvdWdoIHRoZSBwcm9jZXNzLg0KT25lIG9mIHRoZSBwcm9jZXNzIGl0ZW1z
IHdlIG5lZWQgdG8gd29yayBvbiBpcyB0aGUgYXNzaWdubWVudCBvZiBCb0YgQ2hhaXJzLiAgSWRl
YWxseSwgdGhlIEJvRiBDaGFpcnMgYXJlIG5vdCBvbmUgb2YgdGhlIHByb3BvbmVudHMgb3IgYXV0
aG9ycy4gIEF0IHRoaXMgcG9pbnQgd2UgbmVlZCBzb21lb25lIHRvIGRyaXZlIHRocm91Z2ggdGhl
IHByb2Nlc3MgbW9yZSB0aGFuIGFueXRoaW5nIGVsc2Ug4oCTIHJlbWluZGVyOiBiZWluZyBhIEJv
RiBDaGFpciBkb2VzbuKAmXQgbmVjZXNzYXJpbHkgdHJhbnNsYXRlIGludG8gV0cgQ2hhaXIgKGlm
IG9uZSB3YXMgdG8gYmUgY2hhcnRlcmVkKS4gIElmIGFueW9uZSBoYXMgYSBzdWdnZXN0aW9uLCBw
bGVhc2Ugc2VuZCBtZSBhIHByaXZhdGUgbm90ZS4NCk9uY2Ugd2UgaWRlbnRpZnkgQm9GIENoYWly
cywgSSB3aWxsIHdvcmsgd2l0aCB0aGVtIGluIGRlZmluaW5nIHRoZSBBZ2VuZGEuICBJbiBnZW5l
cmFsLCB3ZSB3YW50IHRvIGJlIGFibGUgdG8gYW5zd2VyIHRoZSBmb2xsb3dpbmcgcXVlc3Rpb25z
ICh3ZeKAmWxsIHJlZmluZSB0aGVtIGFzIHdlIGdvKToNCi0gQXJlIHRoZSBQcm9ibGVtIFN0YXRl
bWVudCBhbmQgVXNlIENhc2VzIGNsZWFyPyAgSXMgdGhlIHNjb3BlIG9mIHRoZSBwcm9ibGVtIHdl
bGwgZGVmaW5lZCBhbmQgdW5kZXJzdG9vZD8NCi0gRG9lcyB0aGUgR2FwIEFuYWx5c2lzIHJlZmxl
Y3QgdGhlIHJlcXVpcmVtZW50cyBnbGVhbmVkIGZyb20gdGhlIFByb2JsZW0gU3RhdGVtZW50L1Vz
ZSBDYXNlcz8gIEFyZSB0aGVzZSB0aGUgcmlnaHQgZGVsaXZlcmFibGVzPw0KLSBJcyB0aGUgQ2hh
cnRlciB0ZXh0IGNsZWFyIGFuZCB1bmRlcnN0YW5kYWJsZT8gIERvZXMgaXQgcmVmbGVjdCB0aGUg
R2FwIEFuYWx5c2lzPyAgWypdDQotIFNob3VsZCB0aGUgSUVURiBkbyB0aGlzIHdvcms/DQotIFdo
byBpcyB3aWxsaW5nIHRvIGNvbnRyaWJ1dGUgKHdyaXRlLCByZXZpZXcsIGNvbW1lbnQsIGV0Yy4p
Pw0KDQpbKl0gTm90ZTogZGVwZW5kaW5nIG9uIHdoYXQgdGhlIEdhcCBBbmFseXNpcyBzaG93cywg
d2UgbWlnaHQgbm90IGhhdmUgYSBDaGFydGVyIGRpc2N1c3Npb24g4oCTIG1heWJlIGp1c3QgYSBk
aXNjdXNzaW9uIGFib3V0IHBvdGVudGlhbCB3b3JrIGl0ZW1zICh3aGljaCBtYXkgYmVsb25nIHRv
IGV4aXN0aW5nIFdHcywgZm9yIGV4YW1wbGUpLiAgQWxzbywgZXZlbiBpZiBhIENoYXJ0ZXIgaXMg
bm90IGRpc2N1c3NlZCBhdCB0aGUgQm9GLCBmb3JtYXRpb24gb2YgYSBuZXcgV0cgKGFzIG5lZWRl
ZCkgaXMgbm90IHByZWNsdWRlZC4NCg0KVGhhbmtzIQ0KQWx2YXJvLg0K

--_000_888CBBFEF20A4DC8AD0B019C8E6400FDciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <B73D706CDBF441488001BFD624B1A23E@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_888CBBFEF20A4DC8AD0B019C8E6400FDciscocom_--


From nobody Wed Jun  7 22:37:54 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 173E31274D2 for <ideas@ietfa.amsl.com>; Wed,  7 Jun 2017 22:37:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hk5Nw9i69ua7 for <ideas@ietfa.amsl.com>; Wed,  7 Jun 2017 22:37:49 -0700 (PDT)
Received: from mail-wm0-x229.google.com (mail-wm0-x229.google.com [IPv6:2a00:1450:400c:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D22C9126C25 for <ideas@ietf.org>; Wed,  7 Jun 2017 22:37:48 -0700 (PDT)
Received: by mail-wm0-x229.google.com with SMTP id 7so130457996wmo.1 for <ideas@ietf.org>; Wed, 07 Jun 2017 22:37:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=KSTQddysKmoib/F+Lxo7yENy6FojIbdQyhP5DmfhWVo=; b=AAqoolNIS+uveNgaVXzGanZOvAr9882Q796Q83aRnEfxDku1m1L4ndI4d2AIpCs4ZT z433AHubJnhDfZ8bvM6IyO7ZYkbbk3yC5jyapctnt9KuCLJq1APbaluqHvMZyPlduGna w+LoUF+gPAk7Ni0hgJFWtLsym5TuioxRsA1PX2R99C4IWSo8ur32iKjBcYOkiIq7OqPn phCQyZq9XV4ASYI9ubJ6eyzMhKmec28FQU4rtpN6k8ystA49RUh+mvOzO10GDKBnGlzC Nxv4R5+Ke2OF08W02l5/Rib2wo2mgofBycXMLVDz4Kh5UdPVB0vXGkC8L08YeOz4aKii O+Jg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=KSTQddysKmoib/F+Lxo7yENy6FojIbdQyhP5DmfhWVo=; b=boURqkLUeRvNiP8FrZtmbkP9LTrM3IlLqbHLhw6ZMd2EHjjH5bK9E+UYlp3DoQwqum afG8xh1eg9J2aVUgsbSpNSvUaEokjJK57s5QaWIrMGnNOuHUrY1GSNj0CH4M1QAzZzBx DbCN7vnxYM06IRGXRyWT+ylW6RP/EkBbnjN8w8KnUHGT4ETfkOA/4eisg0O6UXB1RTqU r8RIsa+Ygia/5phD4NwbzXJvlwbbMX90ReIO0J1vVgnZyOm/ZnQD5RHBAnRJomgTzGXu UVbnU5HLQ6SA5u4zYHI96khW4cltYmIleIDdS8c11EAASWuJEMz1ec8aZE8mGKyDiNFZ JOZA==
X-Gm-Message-State: AODbwcCC3/6G6nHBzFde0V9KlMGj/woCtrbbRf2GT+nxWo0hwF8FfIm4 NX+afqiPapf/+72rIlASYTc87G05hw==
X-Received: by 10.28.103.193 with SMTP id b184mr2112344wmc.25.1496900267400; Wed, 07 Jun 2017 22:37:47 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.167.2 with HTTP; Wed, 7 Jun 2017 22:37:46 -0700 (PDT)
In-Reply-To: <888CBBFE-F20A-4DC8-AD0B-019C8E6400FD@cisco.com>
References: <888CBBFE-F20A-4DC8-AD0B-019C8E6400FD@cisco.com>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Wed, 7 Jun 2017 22:37:46 -0700
Message-ID: <CAG-CQxpTDG0-c_4VdUrMuNh9fgMn0EYA-oXDJ1zjT2bqsrVeVg@mail.gmail.com>
To: "Alvaro Retana (aretana)" <aretana@cisco.com>
Cc: "ideas@ietf.org" <ideas@ietf.org>, Erik Nordmark <nordmark@sonic.net>,  Padma Pillay-Esnault <padma.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="001a114b0598b3e5c805516c4004"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/x7nRcilmymfZUOEYg9nHl0uz3s8>
Subject: Re: [Ideas] IDEAS BoF at IETF 99
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Jun 2017 05:37:52 -0000

--001a114b0598b3e5c805516c4004
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Dear Alvaro and Erik

On Wed, Jun 7, 2017 at 2:46 PM, Alvaro Retana (aretana) <aretana@cisco.com>
wrote:

> Dear IDEAS list:
>
>
>
> The IAB/IESG held our BoF Coordination Call today, and it was decided to
> go forward with an IDEAS BoF at IETF 99.  Congratulations!
>
There are however some concerns that we need you
> (proponents/participants/authors) to address at the BoF.  Based on that,
> we should ideally be able to take some action, which could include
> chartering a WG(s), deciding that the work belongs in existing WGs, a
> combination, or even the decision of not doing anything.  From my point o=
f
> view, the success of the BoF should be measured by whether we have the
> necessary information to make the correct decision.
>

<PPE> Noted. Will work towards this goal with everyone.


> In summary, the general concerns are (in no particular order):
>
> - Portions of the existing drafts, and even the proposed Charter, sound
> like marketing materials.  The IETF, and this process in particular, are
> not the place to do marketing =E2=80=93 we need you then to clean up the =
existing
> documentation and simply get to the technical point you=E2=80=99re trying=
 to make.
>
> - It is not completely clear from the current documents exactly what the
> IETF can/should work on.  We need a gap analysis that clearly and
> explicitly spells out what is needed and a discussion of why current
> protocols may not be appropriate (if a new protocol is required, for
> example).
>
> - A question was brought up about current deployment of existing ID/Loc
> protocols (lisp, ila, etc.) and whether a common framework is needed (as
> proposed) or if the community would be better served by a new protocol=E2=
=80=A6or
> maybe both.  IOW, we would like to see this discussion as part of the
> problem description and justification for the work.
>
> - What about overlap with other SDOs? Why is the IETF the right place?
>
>
>
> We would of course not only want to see these points covered during the
> BoF, but also documented in the appropriate drafts.  Please keep the ID
> submission cut-off date in mind (July/3).
>
>
>
<PPE> Understood. Will work with everyone to address these concerns.


> Erik Nordmark (cc=E2=80=99d) has stepped up to act as IAB Shepherd.  He w=
ill work
> with you (the proponents/list) with an architectural point of view in
> mind.  I will continue to be the Responsible AD through the process.
>

<PPE> Looking forward to working with Erik.


> One of the process items we need to work on is the assignment of BoF
> Chairs.  Ideally, the BoF Chairs are not one of the proponents or authors=
.
> At this point we need someone to drive through the process more than
> anything else =E2=80=93 reminder: being a BoF Chair doesn=E2=80=99t neces=
sarily translate
> into WG Chair (if one was to be chartered).  If anyone has a suggestion,
> please send me a private note.
>
> Once we identify BoF Chairs, I will work with them in defining the
> Agenda.  In general, we want to be able to answer the following questions
> (we=E2=80=99ll refine them as we go):
>
> - Are the Problem Statement and Use Cases clear?  Is the scope of the
> problem well defined and understood?
>
> - Does the Gap Analysis reflect the requirements gleaned from the Problem
> Statement/Use Cases?  Are these the right deliverables?
>
> - Is the Charter text clear and understandable?  Does it reflect the Gap
> Analysis?  [*]
>
> - Should the IETF do this work?
>
> - Who is willing to contribute (write, review, comment, etc.)?
>
>
>
> [*] Note: depending on what the Gap Analysis shows, we might not have a
> Charter discussion =E2=80=93 maybe just a discussion about potential work=
 items
> (which may belong to existing WGs, for example).  Also, even if a Charter
> is not discussed at the BoF, formation of a new WG (as needed) is not
> precluded.
>

<PPE>
Thanks in advance Alvaro, Erik for your guidance.
Will work with the list and proponents to address the above and prepare for
the BOF.

Regards
Padma

>
>
> Thanks!
>
> Alvaro.
>
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas
>
>

--001a114b0598b3e5c805516c4004
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear Alvaro and Erik<div class=3D"gmail_extra"><br><div cl=
ass=3D"gmail_quote">On Wed, Jun 7, 2017 at 2:46 PM, Alvaro Retana (aretana)=
 <span dir=3D"ltr">&lt;<a href=3D"mailto:aretana@cisco.com" target=3D"_blan=
k">aretana@cisco.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-st=
yle:solid;border-left-color:rgb(204,204,204);padding-left:1ex">







<div bgcolor=3D"white" lang=3D"EN-US">
<div class=3D"gmail-m_-2492291796139723709m_-8142247036163115872WordSection=
1">
<p class=3D"MsoNormal">Dear IDEAS list:</p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">The IAB/IESG held our BoF Coordination Call today, a=
nd it was decided to go forward with an IDEAS BoF at IETF 99.=C2=A0 Congrat=
ulations! =C2=A0 =C2=A0</p></div></div></blockquote><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;border-l=
eft-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex"><div b=
gcolor=3D"white" lang=3D"EN-US"><div class=3D"gmail-m_-2492291796139723709m=
_-8142247036163115872WordSection1"><p class=3D"MsoNormal"><u></u><u></u></p=
>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">There are however some concerns that we need you (pr=
oponents/participants/autho<wbr>rs) to address at the BoF.=C2=A0 Based on t=
hat, we should ideally be able to take some action, which could include cha=
rtering a WG(s), deciding that the work belongs
 in existing WGs, a combination, or even the decision of not doing anything=
.=C2=A0 From my point of view, the success of the BoF should be measured by=
 whether we have the necessary information to make the correct decision.</p=
></div></div></blockquote><div><br></div><span style=3D"font-size:12.800000=
190734863px">&lt;PPE&gt; Noted. Will work towards this goal with everyone.<=
/span><span class=3D"gmail-im" style=3D"font-size:12.800000190734863px"></s=
pan><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-col=
or:rgb(204,204,204);padding-left:1ex"><div bgcolor=3D"white" lang=3D"EN-US"=
><div class=3D"gmail-m_-2492291796139723709m_-8142247036163115872WordSectio=
n1"><p class=3D"MsoNormal"><u></u><u></u></p><span>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">In summary, the general concerns are (in no particul=
ar order):<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">- Portions of the existing drafts, and even the prop=
osed Charter, sound like marketing materials.=C2=A0 The IETF, and this proc=
ess in particular, are not the place to do marketing =E2=80=93 we need you =
then to clean up the existing documentation and
 simply get to the technical point you=E2=80=99re trying to make.<u></u><u>=
</u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">- It is not completely clear from the current docume=
nts exactly what the IETF can/should work on.=C2=A0 We need a gap analysis =
that clearly and explicitly spells out what is needed and a discussion of w=
hy current protocols may not be appropriate
 (if a new protocol is required, for example).<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">- A question was brought up about current deployment=
 of existing ID/Loc protocols (lisp, ila, etc.) and whether a common framew=
ork is needed (as proposed) or if the community would be better served by a=
 new protocol=E2=80=A6or maybe both.=C2=A0 IOW,
 we would like to see this discussion as part of the problem description an=
d justification for the work.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
</span><p class=3D"MsoNormal">- What about overlap with other SDOs? Why is =
the IETF the right place?<u></u><u></u></p><span>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">We would of course not only want to see these points=
 covered during the BoF, but also documented in the appropriate drafts.=C2=
=A0 Please keep the ID submission cut-off date in mind (July/3).<u></u><u><=
/u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0</p></span></div></div></blockquote><div><span=
 style=3D"font-size:12.800000190734863px">&lt;PPE&gt; Understood. Will work=
 with everyone to address these concerns.</span></div><div><span style=3D"f=
ont-size:12.800000190734863px"></span>=C2=A0</div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;border-lef=
t-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex"><div bgc=
olor=3D"white" lang=3D"EN-US"><div class=3D"gmail-m_-2492291796139723709m_-=
8142247036163115872WordSection1"><span><p class=3D"MsoNormal"><u></u><u></u=
></p>
<p class=3D"MsoNormal">Erik Nordmark (cc=E2=80=99d) has stepped up to act a=
s IAB Shepherd.=C2=A0 He will work with you (the proponents/list) with an a=
rchitectural point of view in mind.=C2=A0 I will continue to be the Respons=
ible AD through the process.=C2=A0</p></span></div></div></blockquote><div>=
<br></div><div>&lt;PPE&gt; Looking forward to working with Erik.</div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(20=
4,204,204);padding-left:1ex"><div bgcolor=3D"white" lang=3D"EN-US"><div cla=
ss=3D"gmail-m_-2492291796139723709m_-8142247036163115872WordSection1"><span=
><p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
</span><p class=3D"MsoNormal">One of the process items we need to work on i=
s the assignment of BoF Chairs.=C2=A0 Ideally, the BoF Chairs are not one o=
f the proponents or authors.=C2=A0 At this point we need someone to drive t=
hrough the process more than anything else =E2=80=93 reminder:
 being a BoF Chair doesn=E2=80=99t necessarily translate into WG Chair (if =
one was to be chartered).=C2=A0 If anyone has a suggestion, please send me =
a private note.<u></u><u></u></p><span>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">Once we identify BoF Chairs, I will work with them i=
n defining the Agenda.=C2=A0 In general, we want to be able to answer the f=
ollowing questions (we=E2=80=99ll refine them as we go):<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">- Are the Problem Statement and Use Cases clear?=C2=
=A0 Is the scope of the problem well defined and understood?<u></u><u></u><=
/p>
<p class=3D"MsoNormal">- Does the Gap Analysis reflect the requirements gle=
aned from the Problem Statement/Use Cases?=C2=A0 Are these the right delive=
rables?<u></u><u></u></p>
<p class=3D"MsoNormal">- Is the Charter text clear and understandable?=C2=
=A0 Does it reflect the Gap Analysis?=C2=A0 [*]<u></u><u></u></p>
<p class=3D"MsoNormal">- Should the IETF do this work?<u></u><u></u></p>
<p class=3D"MsoNormal">- Who is willing to contribute (write, review, comme=
nt, etc.)?<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</span><p class=3D"MsoNormal">[*] Note: depending on what the Gap Analysis =
shows, we might not have a Charter discussion =E2=80=93 maybe just a discus=
sion about potential work items (which may belong to existing WGs, for exam=
ple).=C2=A0 Also, even if a Charter is not discussed at
 the BoF, formation of a new WG (as needed) is not precluded.</p></div></di=
v></blockquote><div><br></div><div>&lt;PPE&gt;=C2=A0</div><div>Thanks<span =
style=3D"font-size:12.800000190734863px">=C2=A0in advance Alvaro, Erik for =
your guidance.=C2=A0</span></div><div>Will work with the list and proponent=
s to address the above and prepare for the BOF.<br></div><div><br></div><di=
v>Regards</div><div>Padma=C2=A0</div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid=
;border-left-color:rgb(204,204,204);padding-left:1ex"><div bgcolor=3D"white=
" lang=3D"EN-US"><div class=3D"gmail-m_-2492291796139723709m_-8142247036163=
115872WordSection1"><p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Thanks!<span class=3D"gmail-m_-2492291796139723709HO=
EnZb"><font color=3D"#888888"><u></u><u></u></font></span></p><span class=
=3D"gmail-m_-2492291796139723709HOEnZb"><font color=3D"#888888">
<p class=3D"MsoNormal"><u></u><u></u></p>
<p class=3D"MsoNormal">Alvaro.<u></u><u></u></p>
</font></span></div>
</div>

<br>______________________________<wbr>_________________<br>
Ideas mailing list<br>
<a href=3D"mailto:Ideas@ietf.org" target=3D"_blank">Ideas@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ideas" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/ideas</a><br>
<br></blockquote></div><br></div></div>

--001a114b0598b3e5c805516c4004--


From nobody Fri Jun  9 17:00:54 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 056D0126557 for <ideas@ietfa.amsl.com>; Fri,  9 Jun 2017 17:00:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ALHRWYZKOF3x for <ideas@ietfa.amsl.com>; Fri,  9 Jun 2017 17:00:51 -0700 (PDT)
Received: from mail-wr0-x22d.google.com (mail-wr0-x22d.google.com [IPv6:2a00:1450:400c:c0c::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1AB21200FC for <ideas@ietf.org>; Fri,  9 Jun 2017 17:00:50 -0700 (PDT)
Received: by mail-wr0-x22d.google.com with SMTP id q97so47230278wrb.2 for <ideas@ietf.org>; Fri, 09 Jun 2017 17:00:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=ZOuV1QS0CW+mfU42GCM/WXNuPtmC8hTKoFOyq0VmAWM=; b=lwOoX5uLcuwwcLCwL4HJNVHo94CvW/UUfmAjmtl9N0Lgzmg6Asabj7sKyC6kiNk6oA SUnOJwRbFBLuSNXpK4R47JJYphyJdlNRFs4z5simGPxMdQRjNT+PcnE9TneB+Sfl3mVy X3cI2o3Q3/Xzf2Czg+NZMYr9/wB3Ig+uoFry4VjEtpy8ZoFpoFLSnoDrHX+137fvkB6T cukBoiBUbZUHbJc/3hJA8EBAZag3aUlszDBqcPuNSJ+APuBH5+rbTDiOshxbMHFmjgmw ibnruGtQfwkcBM1LtMDOKMMCRChjBPwwcE+JBSQv8Um9f9vn3wRVxBMGqNw2lbPhJyGm R3OQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=ZOuV1QS0CW+mfU42GCM/WXNuPtmC8hTKoFOyq0VmAWM=; b=fA6qusGGWsgygoEpAwgEwhq5vVk+V46LclqeYaWuf7TOZO0FviSwFTjEPBi6jXJRwN oB6g8bASQYStaJCByZaU4K7c+zD9FIFLFBT5OXSeghP8aS6HxdjnLBLdnK+L0VvO7uxp C+7t9iVO6VgPTMGrttfYdb//WQFzsTrDCDvttwmUNn1LvRxixJvdoGLGsOQLbLOSsVtL m7B8DOzUjUAk92vkT5VhUuxkOLzkfU77xOOPQ8ePRirlQICqest6sTCiNwwaiobQX3uo xoAAo0adg+iMS4Yc8HJIhNIfY7rAYuBhHoIfoMfr9Pnoqiid3yjcylJzwprATewIcOl7 Alow==
X-Gm-Message-State: AKS2vOympGYY7aPM03oLPqi5k408pfjb1fUpPZe1RBTttIiRigza/zcv d9VwwzCxjMW3nNkPaBxk5S0QTFtCjnoP
X-Received: by 10.28.175.84 with SMTP id y81mr1478730wme.25.1497052849068; Fri, 09 Jun 2017 17:00:49 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.167.2 with HTTP; Fri, 9 Jun 2017 17:00:48 -0700 (PDT)
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Fri, 9 Jun 2017 17:00:48 -0700
Message-ID: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com>
To: ideas@ietf.org
Content-Type: multipart/alternative; boundary="001a114450da47625a05518fc7df"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/y0HNoBJwtRFcIKbBcSuOWrWkxOA>
Subject: [Ideas] BOF @IETF 99 Preparation
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 00:00:53 -0000

--001a114450da47625a05518fc7df
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Dear IDEAS


Thank you all for your input and feedback!


In order to prepare for our BOF, we have a lot of work ahead as highlighted
by Alvaro's email. Therefore, we really need everyone to dedicate some time
on their schedule.

The *deadline for submission is July 3rd *for drafts.



We have several documents that need to be Updated/Created specifically to
address the concerns:

-        Charter

-        Problem Statement

-        Use Cases

-        Gap Analysis

-        Requirements



 1.      A complete review of all existing document to ensure we purge the
documents and streamline them. We need volunteers for that.


a.     * Charter =E2=80=93 Padma, Suggest Michael M, Christian J + Please v=
olunteer
or ack on suggestion*


b.      *Problem Statement  - Padma ,  Suggest Christian J, Axel, Guiseppe,
Yingzhen, Kiran + Please volunteer or ack on suggestion*

In particular we need to take this feedback in consideration.

A question was brought up about current deployment of existing ID/Loc
protocols (lisp, ila, etc.) and whether a common framework is needed (as
proposed) or if the community would be better served by a new protocol=E2=
=80=A6or
maybe both.  IOW, we would like to see this discussion as part of the
problem description and justification for the work.

What about overlap with other SDOs? Why is the IETF the right place?


c.      *Use Cases: Suggest Tom H.,  David L., Alex, Uma=E2=80=A6 + Please
volunteer or ack on suggestion*

Need to add use cases for Identity and reorder the use case to answer the
general concerns.


d.
*New document =E2=80=93 Need volunteers on thisGap Analysis: Suggest Bingya=
ng,
Michael M., Albert C., Uma, Yingzhen + Please volunteer or ack on
suggestion *

The gap analysis that clearly and explicitly spells out what is needed and
a discussion of why current protocols may not be appropriate (if a new
protocol is required, for example). We have much of this material but this
need to be concise and to the point for clarity.


e.      *Requirements =E2=80=93 Suggest Alex, Bingyang + Please Volunteer o=
r ack on
suggestion*

Ensure we tie the Requirements document to the gap analysis and use case.



2.      Logistics for planning meetings and offshoot meetings to close AIs
if needed

a.     *USA  and Overall if needed* =E2=80=93 *Pa**dma, Yingzhen*

b.      *Europe =E2=80=93** Please volunteer*
c.    *China =E2=80=93 Bingyang*


3.      IETF Meeting Attendance
a.      Some folks have asked me for specific dates as they will join IETF
later in the week. I have included this as a special request.
b.      *Please see the overlap with conflicting groups and please let me
know so that we can add this asap to the request of the BOF meeting*



*We need to be ready by June 30th to ensure we make the deadlines for the
docs.*





Looking forward to hearing from you and working towards a successful BOF.



Thanks

Padma

--001a114450da47625a05518fc7df
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><p class=3D"MsoNormal" style=3D"font-size:12.8000001907348=
63px">Dear IDEAS</p><p class=3D"MsoNormal" style=3D"font-size:12.8000001907=
34863px"><br></p><p class=3D"MsoNormal" style=3D"font-size:12.8000001907348=
63px">Thank you all for your input and feedback!</p><p class=3D"MsoNormal" =
style=3D"font-size:12.800000190734863px"><br></p><p class=3D"MsoNormal" sty=
le=3D"font-size:12.800000190734863px">In order to prepare for our BOF, we h=
ave a lot of work ahead as highlighted by Alvaro&#39;s email. Therefore, we=
 really need everyone to dedicate some time on their schedule.<u></u><u></u=
></p><p class=3D"MsoNormal" style=3D"font-size:12.800000190734863px">The=C2=
=A0<b><font color=3D"#000000">deadline for submission is July 3<sup>rd</sup=
>=C2=A0</font></b>for drafts.<u></u><u></u></p><p class=3D"MsoNormal" style=
=3D"font-size:12.800000190734863px"><u></u>=C2=A0</p><p class=3D"MsoNormal"=
 style=3D"font-size:12.800000190734863px">We have several documents that ne=
ed to be Updated/Created specifically to address the concerns:</p><p class=
=3D"MsoNormal" style=3D"font-size:12.800000190734863px"><span style=3D"font=
-family:Calibri,sans-serif;font-size:11pt">-</span><span style=3D"font-size=
:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0</span><u style=3D"font-family:Calibri,=
sans-serif;font-size:11pt"></u><span style=3D"font-family:Calibri,sans-seri=
f;font-size:11pt">Charter=C2=A0</span></p><p class=3D"MsoNormal" style=3D"f=
ont-size:12.800000190734863px"><span style=3D"font-family:Calibri,sans-seri=
f;font-size:11pt">-</span><span style=3D"font-size:7pt;line-height:normal;f=
ont-family:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0</span><u style=3D"font-family:Calibri,sans-serif;font-size:11p=
t"></u><span style=3D"font-family:Calibri,sans-serif;font-size:11pt">Proble=
m Statement=C2=A0</span></p><p class=3D"MsoNormal" style=3D"font-size:12.80=
0000190734863px"><span style=3D"font-family:Calibri,sans-serif;font-size:11=
pt">-</span><span style=3D"font-size:7pt;line-height:normal;font-family:&#3=
9;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0</s=
pan><u style=3D"font-family:Calibri,sans-serif;font-size:11pt"></u><span st=
yle=3D"font-family:Calibri,sans-serif;font-size:11pt">Use Cases</span></p><=
p class=3D"MsoNormal" style=3D"font-size:12.800000190734863px"><span style=
=3D"font-family:Calibri,sans-serif;font-size:11pt">-</span><span style=3D"f=
ont-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0</span><u style=3D"font-family=
:Calibri,sans-serif;font-size:11pt"></u><span style=3D"font-family:Calibri,=
sans-serif;font-size:11pt">Gap Analysis</span></p><p class=3D"MsoNormal" st=
yle=3D"font-size:12.800000190734863px"><span style=3D"font-family:Calibri,s=
ans-serif;font-size:11pt">-</span><span style=3D"font-size:7pt;line-height:=
normal;font-family:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0</span><u style=3D"font-family:Calibri,sans-serif;font=
-size:11pt"></u><span style=3D"font-family:Calibri,sans-serif;font-size:11p=
t">Requirements</span>=C2=A0</p><p class=3D"MsoNormal" style=3D"font-size:1=
2.800000190734863px"><u></u></p><p class=3D"MsoNormal" style=3D"font-size:1=
2.800000190734863px"><u></u>=C2=A0</p><p class=3D"MsoNormal" style=3D"font-=
size:12.800000190734863px"><u></u>=C2=A0<span style=3D"font-family:Calibri,=
sans-serif;font-size:11pt">1.</span><span style=3D"font-size:7pt;line-heigh=
t:normal;font-family:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0</span><u style=3D"font-family:Calibri,sans-serif;font-size:11pt">=
</u><span style=3D"font-family:Calibri,sans-serif;font-size:11pt">A complet=
e review of all existing document to ensure we purge the documents and stre=
amline them. We need volunteers for that.</span></p><p class=3D"MsoNormal" =
style=3D"font-size:12.800000190734863px"><span style=3D"font-family:Calibri=
,sans-serif;font-size:11pt;color:rgb(192,0,0)"><br></span></p>a. =C2=A0 =C2=
=A0 <b>=C2=A0Charter =E2=80=93 Padma, Suggest Michael M, Christian J + Plea=
se volunteer or ack on suggestion</b><p class=3D"MsoNormal" style=3D"font-s=
ize:12.800000190734863px"><span style=3D"font-family:Calibri,sans-serif;fon=
t-size:11pt;color:rgb(192,0,0)"><br></span></p>b. =C2=A0 =C2=A0 =C2=A0<b>Pr=
oblem Statement =C2=A0- Padma , =C2=A0Suggest Christian J, Axel, Guiseppe, =
Yingzhen, Kiran + Please volunteer or ack on suggestion</b><p class=3D"MsoN=
ormal" style=3D"font-size:12.800000190734863px">In particular we need to ta=
ke this feedback in consideration.</p><p class=3D"MsoNormal" style=3D"font-=
size:12.800000190734863px">A question was brought up about current deployme=
nt of existing ID/Loc protocols (lisp, ila, etc.) and whether a common fram=
ework is needed (as proposed) or if the community would be better served by=
 a new protocol=E2=80=A6or maybe both.=C2=A0 IOW, we would like to see this=
 discussion as part of the problem description and justification for the wo=
rk.<u></u><u></u></p><p class=3D"MsoNormal" style=3D"font-size:12.800000190=
734863px">What about overlap with other SDOs? Why is the IETF the right pla=
ce?=C2=A0</p><p class=3D"MsoNormal" style=3D"font-size:12.800000190734863px=
"><span style=3D"font-family:Calibri,sans-serif;font-size:11pt;color:rgb(19=
2,0,0)"><br></span></p>c. =C2=A0 =C2=A0 =C2=A0<b>Use Cases: Suggest Tom H.,=
 =C2=A0David L., Alex, Uma=E2=80=A6 + Please volunteer or ack on suggestion=
</b><p class=3D"MsoNormal" style=3D"font-size:12.800000190734863px"><span s=
tyle=3D"font-size:11pt;font-family:Calibri,sans-serif">Need to add use case=
s for Identity and reorder the use case to answer the general concerns.</sp=
an></p><p class=3D"MsoNormal" style=3D"font-size:12.800000190734863px"><spa=
n style=3D"font-family:Calibri,sans-serif;font-size:11pt;color:rgb(192,0,0)=
"><br></span></p><p class=3D"MsoNormal">d. =C2=A0 =C2=A0 =C2=A0<b>New docum=
ent =E2=80=93 Need volunteers on this<br>Gap Analysis: Suggest Bingyang, Mi=
chael M., Albert C., Uma, Yingzhen + Please volunteer or ack on suggestion<=
span style=3D"font-size:11pt;color:rgb(192,0,0);font-family:Calibri,sans-se=
rif">=C2=A0</span></b><br></p><p class=3D"MsoNormal">The g<span style=3D"te=
xt-indent:0.5in"><span style=3D"font-size:12.800000190734863px">ap analysis=
 that clearly and explicitly spells out what is needed and a discussion of =
why current protocols may not be appropriate (if a new protocol is required=
, for example). We have much of this material but this need to be concise a=
nd to the point for clarity.</span></span></p><p class=3D"MsoNormal" style=
=3D"font-size:12.800000190734863px;text-indent:0.5in"><br></p>e. =C2=A0 =C2=
=A0 =C2=A0<b>Requirements =E2=80=93 Suggest Alex, Bingyang + Please Volunte=
er or ack on suggestion</b><p class=3D"MsoNormal" style=3D"font-size:12.800=
000190734863px">Ensure we tie the Requirements document to the gap analysis=
 and use case.</p><p class=3D"MsoNormal" style=3D"font-size:12.800000190734=
863px"><u></u>=C2=A0</p><p class=3D"MsoNormal" style=3D"font-size:12.800000=
190734863px"><span style=3D"font-family:Calibri,sans-serif;font-size:11pt">=
2.</span><span style=3D"font-size:7pt;line-height:normal;font-family:&#39;T=
imes New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0</span><u style=3D=
"font-family:Calibri,sans-serif;font-size:11pt"></u><span style=3D"font-fam=
ily:Calibri,sans-serif;font-size:11pt">Logistics for planning meetings and =
offshoot meetings to close AIs if needed</span></p><p class=3D"MsoNormal" s=
tyle=3D"font-size:12.800000190734863px"><span style=3D"font-family:Calibri,=
sans-serif;font-size:11pt">a. =C2=A0 =C2=A0</span><span style=3D"font-famil=
y:Calibri,sans-serif;font-size:11pt;color:rgb(192,0,0)"><span style=3D"font=
-size:7pt;line-height:normal;font-family:&#39;Times New Roman&#39;">=C2=A0<=
/span></span><b><span style=3D"font-family:Calibri,sans-serif;font-size:11p=
t">USA =C2=A0and Overall if needed</span></b>=C2=A0=E2=80=93 <b>Pa</b><span=
 style=3D"font-family:Calibri,sans-serif;font-size:11pt"><font color=3D"#00=
0000"><b>dma, Yingzhen</b></font></span></p><p class=3D"MsoNormal" style=3D=
"font-size:12.800000190734863px"><span style=3D"font-family:Calibri,sans-se=
rif;font-size:11pt">b.</span><span style=3D"font-size:7pt;line-height:norma=
l;font-family:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0</span><u style=3D"font-family:Calibri,sans-serif;font-size:11pt"></u><s=
pan style=3D"font-family:Calibri,sans-serif;font-size:11pt"><b>Europe =E2=
=80=93</b></span><b>=C2=A0Please volunteer</b><br>c. =C2=A0 =C2=A0<b>China =
=E2=80=93 Bingyang</b></p><p class=3D"gmail-m_8285891454263817887MsoListPar=
agraph" style=3D"margin:0in 0in 0.0001pt 1in;font-size:11pt;font-family:Cal=
ibri,sans-serif">=C2=A0</p>3. =C2=A0 =C2=A0 =C2=A0IETF Meeting Attendance<b=
r>a. =C2=A0 =C2=A0 =C2=A0Some folks have asked me for specific dates as the=
y will join IETF later in the week. I have included this as a special reque=
st.<br><div>b. =C2=A0 =C2=A0 =C2=A0<b>Please see the overlap with conflicti=
ng groups and please let me know so that we can add this asap to the reques=
t of the BOF meeting</b><p class=3D"MsoNormal" style=3D"font-size:12.800000=
190734863px"><u></u>=C2=A0<u></u></p><p class=3D"MsoNormal" style=3D"font-s=
ize:12.800000190734863px"><b><font color=3D"#000000">We need to be ready by=
 June 30<sup>th</sup>=C2=A0to ensure we make the deadlines for the docs.<u>=
</u><u></u></font></b></p><p class=3D"MsoNormal" style=3D"font-size:12.8000=
00190734863px"><font color=3D"#000000"><u></u>=C2=A0</font></p><p class=3D"=
MsoNormal" style=3D"font-size:12.800000190734863px"><u></u>=C2=A0<u></u></p=
><p class=3D"MsoNormal" style=3D"font-size:12.800000190734863px">Looking fo=
rward to hearing from you and working towards a successful BOF.<u></u><u></=
u></p><p class=3D"MsoNormal" style=3D"font-size:12.800000190734863px"><u></=
u>=C2=A0<u></u></p><p class=3D"MsoNormal" style=3D"font-size:12.80000019073=
4863px">Thanks<u></u><u></u></p><p class=3D"MsoNormal" style=3D"font-size:1=
2.800000190734863px">Padma<u></u><u></u></p><p class=3D"MsoNormal" style=3D=
"font-size:12.800000190734863px"><u></u>=C2=A0</p></div></div>

--001a114450da47625a05518fc7df--


From nobody Sat Jun 10 01:31:59 2017
Return-Path: <menth@uni-tuebingen.de>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BDCD127201 for <ideas@ietfa.amsl.com>; Sat, 10 Jun 2017 01:31:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kVBtLgx7jcUZ for <ideas@ietfa.amsl.com>; Sat, 10 Jun 2017 01:31:55 -0700 (PDT)
Received: from mx04.uni-tuebingen.de (mx04.uni-tuebingen.de [134.2.5.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1D2B127077 for <ideas@ietf.org>; Sat, 10 Jun 2017 01:31:53 -0700 (PDT)
Received: from [192.168.1.101] (hsi-kbw-5-56-217-255.hsi17.kabel-badenwuerttemberg.de [5.56.217.255]) by mx04.uni-tuebingen.de (Postfix) with ESMTPSA id 9A39227A1A; Sat, 10 Jun 2017 10:31:51 +0200 (CEST)
To: Padma Pillay-Esnault <padma.ietf@gmail.com>, ideas@ietf.org
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com>
From: Michael Menth <menth@uni-tuebingen.de>
Message-ID: <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de>
Date: Sat, 10 Jun 2017 10:31:55 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/RPAVBWtNPJhX7_RE4ocQwZD8Cvs>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 08:31:57 -0000

Dear Padma, all,

I've tried to condense the essence of what I perceived from multiple
IDEAS brainstormings, documents, and email discussions. This may be a
base for a problem statement. Please add missing aspects!

IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),
identifiers (Idfs), and locators may be used for future communication
using existing protocols. Missing features are identified and added.

An Idy is a permanent ID (PID) to uniquely identify an entity. To
protect its privacy, an entity may choose additional temporary IDs
(TIDs) for communications, so-called Idfs. A mapping system maps these
Idfs to their Idy so that communication partners may look up an Idf's
Idy. To preserve its privacy, the entity controls the mapping system and
may restrict access to it for certain Idfs or Idys.

Both Idys and preferentially Idfs may be used for communication. They
identify the communication partner but not her location on the Internet.
To denote the location of an entity, one or more locators are needed
that describe how the Idy/Idf can be reached. A mapping system allows to
look up the locators so that traffic can be sent to the Idy/Idf. This is
the well-known Loc/ID split providing benefits such as improved mobility
(e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic
engineering and other flexibility aspects.

The advantage of that system is that entities may use Idfs for
communication to better protect their Idy. Only authorized communication
partners can find out the corresponding Idys behind. Entities can avoid
being tracked on the Internet by using multiple Idfs or by regularly
changing Idfs. The control of the Idy/Idf mappings can restrict access
to selected requesting Idys/Idfs and also limit that access over time to
implement a right to be forgotten.

The concept improves the current LISP protocol by adding privacy in
communication in a similar way as IPv6 privacy extension avoid being
tracked by a stable MAC address. To that end, access restriction is
needed for mapping system requests which also need to be encrypted to
avoid eavesdropping. Therefore, a major protocol definition effort is
needed for the mapping system that provides the Idf/Idy mapping. Other
aspects of this concept can be assembled from existing pieces but should
be brought together in a recommended fashion.

Michael

-- 
Prof. Dr. habil. Michael Menth
University of Tuebingen
Faculty of Science
Department of Computer Science
Chair of Communication Networks
Sand 13, 72076 Tuebingen, Germany
phone: (+49)-7071/29-70505
fax: (+49)-7071/29-5220
mailto:menth@uni-tuebingen.de
http://kn.inf.uni-tuebingen.de


From nobody Sat Jun 10 12:47:39 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF9081270AC for <ideas@ietfa.amsl.com>; Sat, 10 Jun 2017 12:47:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id acmxD2ThYHKe for <ideas@ietfa.amsl.com>; Sat, 10 Jun 2017 12:47:35 -0700 (PDT)
Received: from mail-wr0-x229.google.com (mail-wr0-x229.google.com [IPv6:2a00:1450:400c:c0c::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08DBC1267BB for <ideas@ietf.org>; Sat, 10 Jun 2017 12:47:35 -0700 (PDT)
Received: by mail-wr0-x229.google.com with SMTP id v111so61197080wrc.3 for <ideas@ietf.org>; Sat, 10 Jun 2017 12:47:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=LhL4cNUf8IV5/a8XGJ0G/UbJ5B+PlIKc8Fn/rDFt/Qw=; b=t0qwG1fAbfjnwutAdjHUyNSryhgpB/TDcYyn7MG0ig70grlAZtNrXlRIu2EEdzUq7G LxUkTpBjhN90v4bl+U/EuHmym6Gj0o95UZeneO9k09xBLzl4DB3x3G/KuURIu9Ojz9qJ 1+mfmiNE9/bfAJDrfqcm+crfZH9mQk3wWt7tqoTgJm6bV4WThCLPf0xRMxXfhtRupWXg Ed95wEeIPQp897vxwuKkr5/dmNCKJIqrAofoROy0VutOkHTOsURDH5HmLh1CI/04f4xO GmdtAW1yVVKKwNQY9BhcexXU0O9z5cZ0heHlm9uvLAMI1n3V65jku5R9JktyZa48shyq z75w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=LhL4cNUf8IV5/a8XGJ0G/UbJ5B+PlIKc8Fn/rDFt/Qw=; b=S1kp9dy49NPAIOJEs9bs6r5r6r2kZUBTjJU0wsRMDYI3W+SJUKCMneeofxGLlA5SII En6dorE8V03ywixEjdulV75qqyFd33XSPJJaI7tFNjX138NTMFsAGunuEluzF6QnO7qp vCx18OsRWguB5GS4gi08ZEQo03bNzJpu2O89wxqP/t6o51zCqarCx+4zjNMQuYm6DOHk oIyG4PKANJ1T/1iV2btmQ4WCWqiw63ZErOw1OiBPeGPYZS8/Gf0F1mRTZRAV3a2otmrb JlxxJWa/f7n14EDhG1SWnsNwJ+8+CpGG1yUPeShImhsUjFwbqfI9GqGD3+HzOanZF3uU 9X+g==
X-Gm-Message-State: AKS2vOyitBcE3mh+7545cIN4OuNxWHC9ZB/pGP1ETPu2rjdggsNYHPh/ 23yHDz6CpNqOiifHQwA2OPyzNEj2lw==
X-Received: by 10.28.211.203 with SMTP id k194mr3582072wmg.0.1497124053519; Sat, 10 Jun 2017 12:47:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.167.2 with HTTP; Sat, 10 Jun 2017 12:47:33 -0700 (PDT)
In-Reply-To: <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Sat, 10 Jun 2017 12:47:33 -0700
Message-ID: <CAG-CQxquisNOGCCgKCmTiHuPMU67q6Ni_=V2J4TS7KmHZRwf3g@mail.gmail.com>
To: Michael Menth <menth@uni-tuebingen.de>
Cc: ideas@ietf.org, Padma Pillay-Esnault <padma.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="001a1146d994651aa00551a05be7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/zdSx7FoBNIcKzFw7ZIPXePbfy34>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 19:47:38 -0000

--001a1146d994651aa00551a05be7
Content-Type: text/plain; charset="UTF-8"

Dear Michael


On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de>
wrote:

> Dear Padma, all,
>
> I've tried to condense the essence of what I perceived from multiple
> IDEAS brainstormings, documents, and email discussions. This may be a
> base for a problem statement. Please add missing aspects!
>

Thanks for this write up

I think this is a good base
Agree, we should be integrate the identity aspect in the problem statement,
but also the use case and gap analysis documents more clearly.


IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),
> identifiers (Idfs), and locators may be used for future communication
> using existing protocols. Missing features are identified and added.



> An Idy is a permanent ID (PID) to uniquely identify an entity. To
> protect its privacy, an entity may choose additional temporary IDs
> (TIDs) for communications, so-called Idfs. A mapping system maps these
> Idfs to their Idy so that communication partners may look up an Idf's
> Idy. To preserve its privacy, the entity controls the mapping system and
> may restrict access to it for certain Idfs or Idys.
>
> On the call yesterday we had a discussion about the clear definition of
identity in the PB
and this looks concise and to the point.


> Both Idys and preferentially Idfs may be used for communication. They
> identify the communication partner but not her location on the Internet.
> To denote the location of an entity, one or more locators are needed
> that describe how the Idy/Idf can be reached. A mapping system allows to
> look up the locators so that traffic can be sent to the Idy/Idf. This is
> the well-known Loc/ID split providing benefits such as improved mobility
> (e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic
> engineering and other flexibility aspects.
>
> The advantage of that system is that entities may use Idfs for
> communication to better protect their Idy. Only authorized communication
> partners can find out the corresponding Idys behind. Entities can avoid
> being tracked on the Internet by using multiple Idfs or by regularly
> changing Idfs. The control of the Idy/Idf mappings can restrict access
> to selected requesting Idys/Idfs and also limit that access over time to
> implement a right to be forgotten.
>
> The concept improves the current LISP protocol by adding privacy in
> communication in a similar way as IPv6 privacy extension avoid being
> tracked by a stable MAC address. To that end, access restriction is
> needed for mapping system requests which also need to be encrypted to
> avoid eavesdropping. Therefore, a major protocol definition effort is
> needed for the mapping system that provides the Idf/Idy mapping. Other
> aspects of this concept can be assembled from existing pieces but should
> be brought together in a recommended fashion.
>
>
Do you want to give a stab on the PB doc to integrate this.

I think part of this would work well also in the charter.

Thoughts?

Padma


> Michael
>
> --
> Prof. Dr. habil. Michael Menth
> University of Tuebingen
> Faculty of Science
> Department of Computer Science
> Chair of Communication Networks
> Sand 13, 72076 Tuebingen, Germany
> phone: (+49)-7071/29-70505
> fax: (+49)-7071/29-5220
> mailto:menth@uni-tuebingen.de
> http://kn.inf.uni-tuebingen.de
>

--001a1146d994651aa00551a05be7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear Michael<div><br></div><div class=3D"gmail_extra"><br>=
<div class=3D"gmail_quote">On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <=
span dir=3D"ltr">&lt;<a href=3D"mailto:menth@uni-tuebingen.de" target=3D"_b=
lank">menth@uni-tuebingen.de</a>&gt;</span> wrote:<br><blockquote class=3D"=
gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex">Dear Padma, all,<br>
<br>
I&#39;ve tried to condense the essence of what I perceived from multiple<br=
>
IDEAS brainstormings, documents, and email discussions. This may be a<br>
base for a problem statement. Please add missing aspects!<br></blockquote><=
div>=C2=A0</div><div>Thanks for this write up</div><div><br></div><div>I th=
ink this is a good base</div><div>Agree, we should be integrate the identit=
y aspect in the problem statement, but also the use case and gap analysis d=
ocuments more clearly.</div><div><br></div><div><br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),<br>
identifiers (Idfs), and locators may be used for future communication<br>
using existing protocols. Missing features are identified and added.</block=
quote><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
An Idy is a permanent ID (PID) to uniquely identify an entity. To<br>
protect its privacy, an entity may choose additional temporary IDs<br>
(TIDs) for communications, so-called Idfs. A mapping system maps these<br>
Idfs to their Idy so that communication partners may look up an Idf&#39;s<b=
r>
Idy. To preserve its privacy, the entity controls the mapping system and<br=
>
may restrict access to it for certain Idfs or Idys.<br>
<br></blockquote><div>On the call yesterday we had a discussion about the c=
lear definition of identity in the PB</div><div>and this looks concise and =
to the point.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Both Idys and preferentially Idfs may be used for communication. They<br>
identify the communication partner but not her location on the Internet.<br=
>
To denote the location of an entity, one or more locators are needed<br>
that describe how the Idy/Idf can be reached. A mapping system allows to<br=
>
look up the locators so that traffic can be sent to the Idy/Idf. This is<br=
>
the well-known Loc/ID split providing benefits such as improved mobility<br=
>
(e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic<br>
engineering and other flexibility aspects.<br>
<br>
The advantage of that system is that entities may use Idfs for<br>
communication to better protect their Idy. Only authorized communication<br=
>
partners can find out the corresponding Idys behind. Entities can avoid<br>
being tracked on the Internet by using multiple Idfs or by regularly<br>
changing Idfs. The control of the Idy/Idf mappings can restrict access<br>
to selected requesting Idys/Idfs and also limit that access over time to<br=
>
implement a right to be forgotten.<br>
<br>
The concept improves the current LISP protocol by adding privacy in<br>
communication in a similar way as IPv6 privacy extension avoid being<br>
tracked by a stable MAC address. To that end, access restriction is<br>
needed for mapping system requests which also need to be encrypted to<br>
avoid eavesdropping. Therefore, a major protocol definition effort is<br>
needed for the mapping system that provides the Idf/Idy mapping. Other<br>
aspects of this concept can be assembled from existing pieces but should<br=
>
be brought together in a recommended fashion.<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br></font></span></blockquo=
te><div><br></div><div>Do you want to give a stab on the PB doc to integrat=
e this.</div><div><br></div><div>I think part of this would work well also =
in the charter.</div><div><br></div><div>Thoughts?</div><div><br></div><div=
>Padma</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class=3D"=
HOEnZb"><font color=3D"#888888">
Michael<br>
<br>
--<br>
Prof. Dr. habil. Michael Menth<br>
University of Tuebingen<br>
Faculty of Science<br>
Department of Computer Science<br>
Chair of Communication Networks<br>
Sand 13, 72076 Tuebingen, Germany<br>
phone: <a href=3D"tel:%28%2B49%29-7071%2F29-70505" value=3D"+4970712970505"=
>(+49)-7071/29-70505</a><br>
fax: <a href=3D"tel:%28%2B49%29-7071%2F29-5220" value=3D"+497071295220">(+4=
9)-7071/29-5220</a><br>
mailto:<a href=3D"mailto:menth@uni-tuebingen.de">menth@uni-tuebingen.de</a>=
<br>
<a href=3D"http://kn.inf.uni-tuebingen.de" rel=3D"noreferrer" target=3D"_bl=
ank">http://kn.inf.uni-tuebingen.de</a><br>
</font></span></blockquote></div><br></div></div>

--001a1146d994651aa00551a05be7--


From nobody Sat Jun 10 16:31:49 2017
Return-Path: <tom@herbertland.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 879551275AB for <ideas@ietfa.amsl.com>; Sat, 10 Jun 2017 16:31:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id woPqQVymhXxB for <ideas@ietfa.amsl.com>; Sat, 10 Jun 2017 16:31:45 -0700 (PDT)
Received: from mail-wr0-x22d.google.com (mail-wr0-x22d.google.com [IPv6:2a00:1450:400c:c0c::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A8B91286CA for <ideas@ietf.org>; Sat, 10 Jun 2017 16:31:45 -0700 (PDT)
Received: by mail-wr0-x22d.google.com with SMTP id v104so63186193wrb.0 for <ideas@ietf.org>; Sat, 10 Jun 2017 16:31:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=O9sVsZYpB03VgVwIpdD3jLjkZqGr4CS2y1T5c6cP4Nw=; b=mnXC+PlAmTQnEj5XGNRu9yQ47ITCCiKClSk/BwlFiWr75mv7SEiR4HIPQPhzjlAOQW 8cCjV2Cxgr2bBnkOJZCppxIE23xOe9ruaK4y8p6xd2LK7GLiwZTL872PyocZVmeogJ1i s3l0yU5lWbHx9OxPgMxHV9TOQcOZoSUlNItrNLVJ1O3WWmRCKOqV/+HCdMVr47PXe0yE +JRcGHzvIanzeDYM5Isng3ZpCZTICIGj6rbdh3EUEZtPuaJOKPuSMlk/pOpVRU+VZCMe xmvGYtVVgEtzK/nyAbdyQ+CRwecuq61Tv/jhAcWYPo9abnq5IXk9qJbESBFy4AGG38LQ qDSg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=O9sVsZYpB03VgVwIpdD3jLjkZqGr4CS2y1T5c6cP4Nw=; b=ZuEWsnHPBpJbsc601LRLtFylK+1NPOGTR0pIQdPplXzt4uai6JA8KHEqF1nBvkf5AO p+roIeLIOIeLWwFq4PeOUPtpQqsPZMOTmsmUbQtJoGLog+T8OBoW0YyKEnh7aaP8brPx 6XOGubVVoNjJ5bKLlQVx/AlguPptqSwZAnvLsC4T8RvhRKoTzSGURNrbiBj+8+DV5Pd0 RwcJucheGQ+c5go9U5fGDXlBdsMhS5a4Ivu0z1aLBXGBEU44F6RY8qyUcr2FaliNjNKi aU9LjSUselAYulosduNfrYBeWMdXGJhJ0KvV8XMAHLoGfNejT1xWb4B+62SS8CIYoMff 947Q==
X-Gm-Message-State: AKS2vOxnrWqcXF4vSntiLAPOuQlyICVRh9ObNnMapRQcOdde2Q273wJk EsQtbdYVxXuMnQKjOkHzJV0CcpZaHB03
X-Received: by 10.28.229.144 with SMTP id c138mr3423107wmh.60.1497137503492; Sat, 10 Jun 2017 16:31:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.128.2 with HTTP; Sat, 10 Jun 2017 16:31:42 -0700 (PDT)
In-Reply-To: <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de>
From: Tom Herbert <tom@herbertland.com>
Date: Sat, 10 Jun 2017 16:31:42 -0700
Message-ID: <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com>
To: Michael Menth <menth@uni-tuebingen.de>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>, ideas@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/DD_w8CBlSHyKWCFC_4_ssD9Sx3o>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 23:31:48 -0000

On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de> wrote:
> Dear Padma, all,
>
> I've tried to condense the essence of what I perceived from multiple
> IDEAS brainstormings, documents, and email discussions. This may be a
> base for a problem statement. Please add missing aspects!
>
> IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),
> identifiers (Idfs), and locators may be used for future communication
> using existing protocols. Missing features are identified and added.
>
> An Idy is a permanent ID (PID) to uniquely identify an entity. To
> protect its privacy, an entity may choose additional temporary IDs
> (TIDs) for communications, so-called Idfs. A mapping system maps these
> Idfs to their Idy so that communication partners may look up an Idf's
> Idy. To preserve its privacy, the entity controls the mapping system and
> may restrict access to it for certain Idfs or Idys.
>
Hi Michael,

I'm not following we need to have both identities and identifiers nor
what the operational difference would be. This seems like a lot of
complexity to me.

In ILA for instance, there are just identifiers and locators. The
management plane creates identifiers on request (every task gets a
unique identifier for instance). The mapping system maps identifiers
to locators. Identifiers identify something but we really don't care
what they identify. The same object could be assigned multiple
identifiers for privacy as you describe below, but the mapping system
shouldn't care about that. Identifiers can be registered in the
mapping system, and then unregistered when they are no longer used--
so there's no concept of permanent or temporary identifiers.
Uniqueness of identifiers is a key attribute. For security, we need
tight control over who can modify the mappings and who's allowed to
query.

Can you maybe elaborate on how identities would make things better in
the scenario I described?

Tom

> Both Idys and preferentially Idfs may be used for communication. They
> identify the communication partner but not her location on the Internet.
> To denote the location of an entity, one or more locators are needed
> that describe how the Idy/Idf can be reached. A mapping system allows to
> look up the locators so that traffic can be sent to the Idy/Idf. This is
> the well-known Loc/ID split providing benefits such as improved mobility
> (e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic
> engineering and other flexibility aspects.
>
> The advantage of that system is that entities may use Idfs for
> communication to better protect their Idy. Only authorized communication
> partners can find out the corresponding Idys behind. Entities can avoid
> being tracked on the Internet by using multiple Idfs or by regularly
> changing Idfs. The control of the Idy/Idf mappings can restrict access
> to selected requesting Idys/Idfs and also limit that access over time to
> implement a right to be forgotten.
>
> The concept improves the current LISP protocol by adding privacy in
> communication in a similar way as IPv6 privacy extension avoid being
> tracked by a stable MAC address. To that end, access restriction is
> needed for mapping system requests which also need to be encrypted to
> avoid eavesdropping. Therefore, a major protocol definition effort is
> needed for the mapping system that provides the Idf/Idy mapping. Other
> aspects of this concept can be assembled from existing pieces but should
> be brought together in a recommended fashion.
>

> Michael
>
> --
> Prof. Dr. habil. Michael Menth
> University of Tuebingen
> Faculty of Science
> Department of Computer Science
> Chair of Communication Networks
> Sand 13, 72076 Tuebingen, Germany
> phone: (+49)-7071/29-70505
> fax: (+49)-7071/29-5220
> mailto:menth@uni-tuebingen.de
> http://kn.inf.uni-tuebingen.de
>
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas


From nobody Sun Jun 11 02:19:30 2017
Return-Path: <menth@uni-tuebingen.de>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 107AC127286 for <ideas@ietfa.amsl.com>; Sun, 11 Jun 2017 02:19:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oYJf90enyFcn for <ideas@ietfa.amsl.com>; Sun, 11 Jun 2017 02:19:25 -0700 (PDT)
Received: from mx03.uni-tuebingen.de (mx03.uni-tuebingen.de [134.2.5.213]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D55DC120725 for <ideas@ietf.org>; Sun, 11 Jun 2017 02:19:24 -0700 (PDT)
Received: from [192.168.1.101] (hsi-kbw-5-56-217-255.hsi17.kabel-badenwuerttemberg.de [5.56.217.255]) by mx03.uni-tuebingen.de (Postfix) with ESMTPSA id DC75782A0A; Sun, 11 Jun 2017 11:19:22 +0200 (CEST)
To: Tom Herbert <tom@herbertland.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>, ideas@ietf.org
From: Michael Menth <menth@uni-tuebingen.de>
Message-ID: <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de>
Date: Sun, 11 Jun 2017 11:19:27 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/--JSk0F5rWwHPKiQep0IoUHp77c>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Jun 2017 09:19:28 -0000

Hi Tom,

we have alreaday LISP, ILA, and ILNP for implentation of Loc/ID split.
We have DNS and DDT as mapping systems used in these contexts.
So, there is already quite some support for basic Loc/ID split.

What's missing is an adequate protection of IDs in the above mentioned
context. When communicating with a unique ID, communication becomes
trackable like in the early days of IPv6. IPv6 privacy extensions solved
that problem. But with IPv6 we don't know whom we are talking to. So
what's desirable is a permanent ID for an identity which can be mapped
to various temporary IDs that are used for communication. A mapping
system associates identities and identifiers but can be queried only by
authorized identifiers. That means, communication becomes transparent to
authorized users while protecting privacy against others. However, we
need to explore how these objectives can be achieved with current
protocols and what pieces and extensions are missing.

That mechanism may be an enabler for true Loc/ID split as it allows to
use a permanent ID for identity (think of user contract) and a temporary
ID for each communication, for certain time spans, or devices. Permanent
IDs are not acceptable for privacy concerns in many use cases, e.g.,
automotive. As the temporary ID may be looked up by a provider, it may
be possible to apply per-identiy policies to traffic. If an identifier
is corrupt or gets attacked, of if a device gets lost or is exchanged,
the corresponding identifier may be substituted by another.

This is the filtered result of several telcos with proponents of IDEAS.
It requires some effort to clearly outline the potential of IDEAS in
various use cases as we're looking really beyond Loc/ID split.

Best wishes,

Michael


Am 11.06.2017 um 01:31 schrieb Tom Herbert:
> On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de> wrote:
>> Dear Padma, all,
>>
>> I've tried to condense the essence of what I perceived from multiple
>> IDEAS brainstormings, documents, and email discussions. This may be a
>> base for a problem statement. Please add missing aspects!
>>
>> IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),
>> identifiers (Idfs), and locators may be used for future communication
>> using existing protocols. Missing features are identified and added.
>>
>> An Idy is a permanent ID (PID) to uniquely identify an entity. To
>> protect its privacy, an entity may choose additional temporary IDs
>> (TIDs) for communications, so-called Idfs. A mapping system maps these
>> Idfs to their Idy so that communication partners may look up an Idf's
>> Idy. To preserve its privacy, the entity controls the mapping system and
>> may restrict access to it for certain Idfs or Idys.
>>
> Hi Michael,
> 
> I'm not following we need to have both identities and identifiers nor
> what the operational difference would be. This seems like a lot of
> complexity to me.
> 
> In ILA for instance, there are just identifiers and locators. The
> management plane creates identifiers on request (every task gets a
> unique identifier for instance). The mapping system maps identifiers
> to locators. Identifiers identify something but we really don't care
> what they identify. The same object could be assigned multiple
> identifiers for privacy as you describe below, but the mapping system
> shouldn't care about that. Identifiers can be registered in the
> mapping system, and then unregistered when they are no longer used--
> so there's no concept of permanent or temporary identifiers.
> Uniqueness of identifiers is a key attribute. For security, we need
> tight control over who can modify the mappings and who's allowed to
> query.
> 
> Can you maybe elaborate on how identities would make things better in
> the scenario I described?
> 
> Tom
> 
>> Both Idys and preferentially Idfs may be used for communication. They
>> identify the communication partner but not her location on the Internet.
>> To denote the location of an entity, one or more locators are needed
>> that describe how the Idy/Idf can be reached. A mapping system allows to
>> look up the locators so that traffic can be sent to the Idy/Idf. This is
>> the well-known Loc/ID split providing benefits such as improved mobility
>> (e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic
>> engineering and other flexibility aspects.
>>
>> The advantage of that system is that entities may use Idfs for
>> communication to better protect their Idy. Only authorized communication
>> partners can find out the corresponding Idys behind. Entities can avoid
>> being tracked on the Internet by using multiple Idfs or by regularly
>> changing Idfs. The control of the Idy/Idf mappings can restrict access
>> to selected requesting Idys/Idfs and also limit that access over time to
>> implement a right to be forgotten.
>>
>> The concept improves the current LISP protocol by adding privacy in
>> communication in a similar way as IPv6 privacy extension avoid being
>> tracked by a stable MAC address. To that end, access restriction is
>> needed for mapping system requests which also need to be encrypted to
>> avoid eavesdropping. Therefore, a major protocol definition effort is
>> needed for the mapping system that provides the Idf/Idy mapping. Other
>> aspects of this concept can be assembled from existing pieces but should
>> be brought together in a recommended fashion.
>>
> 
>> Michael
>>
>> --
>> Prof. Dr. habil. Michael Menth
>> University of Tuebingen
>> Faculty of Science
>> Department of Computer Science
>> Chair of Communication Networks
>> Sand 13, 72076 Tuebingen, Germany
>> phone: (+49)-7071/29-70505
>> fax: (+49)-7071/29-5220
>> mailto:menth@uni-tuebingen.de
>> http://kn.inf.uni-tuebingen.de
>>
>> _______________________________________________
>> Ideas mailing list
>> Ideas@ietf.org
>> https://www.ietf.org/mailman/listinfo/ideas
> 
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas
> 

-- 
Prof. Dr. habil. Michael Menth
University of Tuebingen
Faculty of Science
Department of Computer Science
Chair of Communication Networks
Sand 13, 72076 Tuebingen, Germany
phone: (+49)-7071/29-70505
fax: (+49)-7071/29-5220
mailto:menth@uni-tuebingen.de
http://kn.inf.uni-tuebingen.de


From nobody Sun Jun 11 09:59:41 2017
Return-Path: <tom@herbertland.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1102C129544 for <ideas@ietfa.amsl.com>; Sun, 11 Jun 2017 09:59:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wR0XqyJNZmr5 for <ideas@ietfa.amsl.com>; Sun, 11 Jun 2017 09:59:38 -0700 (PDT)
Received: from mail-wr0-x232.google.com (mail-wr0-x232.google.com [IPv6:2a00:1450:400c:c0c::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3003129541 for <ideas@ietf.org>; Sun, 11 Jun 2017 09:59:37 -0700 (PDT)
Received: by mail-wr0-x232.google.com with SMTP id g76so74199749wrd.1 for <ideas@ietf.org>; Sun, 11 Jun 2017 09:59:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=D7Lg1Kq5iW4JTQJhufmSMZDA6munCyFJNuSwZQ/ely8=; b=jNdxH7BRyTYZbqkX54oDbU0YTzGA3+//lgtZWMQGaP2Fal9WWsQxjMwhVCNQyKSJ4u bNoJV0lKy1+nhO4uiYpLANNK5ffaPbCB0U80x0mgglAiXWeq+JcY4LMYRUchSPdAcMwM zUFLXt4ENY2Um6gR5ijmeOLuqGNp5Isnd0RKslQgh3xAw8BaQdWYQ1MHSTImjpuY/p9k Heu0AgoGIvqy4PlgnEh8abSdFubmRtIJspuFRZqSFTAhyDAMo2hL89Tofitsogx78/Ji OcJ5noBjmZqucQpYlizPqN70EY/lirK2kAKCshagRMeyD8hIrNcJsfYKlXixcRndy5lN lOPw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=D7Lg1Kq5iW4JTQJhufmSMZDA6munCyFJNuSwZQ/ely8=; b=JDaEF3swbg5KjrrZnK4XgBX1HehBQRwNmpWzv36y7AHuDsldAUsPPxq1wPDw6PZEH0 I6IEZUNx0hggh6TGMXzK2FgYPjkNxILH3VwnrMg8NYI4/RQbja+lU3h9dyasVP6dP+dN ZYih+l+MGaX9FVG/5ac9flpwF6xsuip2EZQ6GMcopjON/c/fKZJx680EHeQWmvkRoey0 vO90WgkI+Qew8IXetrsfeJYuZaE86rRXmJi854wdekf7aYCtUQ9Gzf237s2lhqQZsL8A BoBtPBmZh+/wWaf/A3KSf3/4OihJmDKPNfOl9lY1OI2Pwv1ugQjpnhiC+A2dNhC+hXaW HjAw==
X-Gm-Message-State: AKS2vOxmLy5ePguQjK1bS/fDdB0ngM1pEETqbWk4SIXYZaucd/QmGnoC 97Dw8n57E8DEtqOUx5QZCVrfYf1kxz9L
X-Received: by 10.28.54.154 with SMTP id y26mr5484903wmh.53.1497200375914; Sun, 11 Jun 2017 09:59:35 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.128.2 with HTTP; Sun, 11 Jun 2017 09:59:35 -0700 (PDT)
In-Reply-To: <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de>
From: Tom Herbert <tom@herbertland.com>
Date: Sun, 11 Jun 2017 09:59:35 -0700
Message-ID: <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com>
To: Michael Menth <menth@uni-tuebingen.de>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>, ideas@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/D3UMPzoTrcinSLqYB3o1c984i6U>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Jun 2017 16:59:40 -0000

On Sun, Jun 11, 2017 at 2:19 AM, Michael Menth <menth@uni-tuebingen.de> wrote:
> Hi Tom,
>
> we have alreaday LISP, ILA, and ILNP for implentation of Loc/ID split.
> We have DNS and DDT as mapping systems used in these contexts.
> So, there is already quite some support for basic Loc/ID split.
>
> What's missing is an adequate protection of IDs in the above mentioned
> context. When communicating with a unique ID, communication becomes
> trackable like in the early days of IPv6. IPv6 privacy extensions solved
> that problem. But with IPv6 we don't know whom we are talking to. So
> what's desirable is a permanent ID for an identity which can be mapped
> to various temporary IDs that are used for communication. A mapping
> system associates identities and identifiers but can be queried only by
> authorized identifiers. That means, communication becomes transparent to
> authorized users while protecting privacy against others. However, we
> need to explore how these objectives can be achieved with current
> protocols and what pieces and extensions are missing.
>

Michael,

I think what you're describing is more address obfuscation than ID/loc
split, or in this case it's the identifier being obfuscated. This is
being implemented in IPwave for instance to mitigate the tracking
problem. The need for obfuscation is independent of the ID/loc.

Address obfuscation only works to the extent that there aren't other
means to track nodes. For instance, even if we were to use different
addresses for each packet of a TCP connection, the connection is
trivial to track but just correlating port numbers, sequence and ack
numbers sent in the clear. The only way to ensure privacy is encrypt
everything possible.

In ILA deployment, the intent is that protocol is not visible to
public networks. For instance, in a carrier network ILA would only be
used in the core (like GTP is only in the core today). The carrier
network already knows location anyway, so we don't address obfuscation
there. For packets going to the UE (over radio for instance) we do
need address obfuscation there like IPwave is doing, but again that
can be independent of id/loc.

Anyway, if this is really needed, I suggest that it is defined to be
an obfuscation layer separate from id/loc. And it should be optional
and usable outside of id/loc as well.

Tom

> That mechanism may be an enabler for true Loc/ID split as it allows to
> use a permanent ID for identity (think of user contract) and a temporary
> ID for each communication, for certain time spans, or devices. Permanent
> IDs are not acceptable for privacy concerns in many use cases, e.g.,
> automotive. As the temporary ID may be looked up by a provider, it may
> be possible to apply per-identiy policies to traffic. If an identifier
> is corrupt or gets attacked, of if a device gets lost or is exchanged,
> the corresponding identifier may be substituted by another.
>
> This is the filtered result of several telcos with proponents of IDEAS.
> It requires some effort to clearly outline the potential of IDEAS in
> various use cases as we're looking really beyond Loc/ID split.
>
> Best wishes,
>
> Michael
>
>
> Am 11.06.2017 um 01:31 schrieb Tom Herbert:
>> On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de> wrote:
>>> Dear Padma, all,
>>>
>>> I've tried to condense the essence of what I perceived from multiple
>>> IDEAS brainstormings, documents, and email discussions. This may be a
>>> base for a problem statement. Please add missing aspects!
>>>
>>> IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),
>>> identifiers (Idfs), and locators may be used for future communication
>>> using existing protocols. Missing features are identified and added.
>>>
>>> An Idy is a permanent ID (PID) to uniquely identify an entity. To
>>> protect its privacy, an entity may choose additional temporary IDs
>>> (TIDs) for communications, so-called Idfs. A mapping system maps these
>>> Idfs to their Idy so that communication partners may look up an Idf's
>>> Idy. To preserve its privacy, the entity controls the mapping system and
>>> may restrict access to it for certain Idfs or Idys.
>>>
>> Hi Michael,
>>
>> I'm not following we need to have both identities and identifiers nor
>> what the operational difference would be. This seems like a lot of
>> complexity to me.
>>
>> In ILA for instance, there are just identifiers and locators. The
>> management plane creates identifiers on request (every task gets a
>> unique identifier for instance). The mapping system maps identifiers
>> to locators. Identifiers identify something but we really don't care
>> what they identify. The same object could be assigned multiple
>> identifiers for privacy as you describe below, but the mapping system
>> shouldn't care about that. Identifiers can be registered in the
>> mapping system, and then unregistered when they are no longer used--
>> so there's no concept of permanent or temporary identifiers.
>> Uniqueness of identifiers is a key attribute. For security, we need
>> tight control over who can modify the mappings and who's allowed to
>> query.
>>
>> Can you maybe elaborate on how identities would make things better in
>> the scenario I described?
>>
>> Tom
>>
>>> Both Idys and preferentially Idfs may be used for communication. They
>>> identify the communication partner but not her location on the Internet.
>>> To denote the location of an entity, one or more locators are needed
>>> that describe how the Idy/Idf can be reached. A mapping system allows to
>>> look up the locators so that traffic can be sent to the Idy/Idf. This is
>>> the well-known Loc/ID split providing benefits such as improved mobility
>>> (e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic
>>> engineering and other flexibility aspects.
>>>
>>> The advantage of that system is that entities may use Idfs for
>>> communication to better protect their Idy. Only authorized communication
>>> partners can find out the corresponding Idys behind. Entities can avoid
>>> being tracked on the Internet by using multiple Idfs or by regularly
>>> changing Idfs. The control of the Idy/Idf mappings can restrict access
>>> to selected requesting Idys/Idfs and also limit that access over time to
>>> implement a right to be forgotten.
>>>
>>> The concept improves the current LISP protocol by adding privacy in
>>> communication in a similar way as IPv6 privacy extension avoid being
>>> tracked by a stable MAC address. To that end, access restriction is
>>> needed for mapping system requests which also need to be encrypted to
>>> avoid eavesdropping. Therefore, a major protocol definition effort is
>>> needed for the mapping system that provides the Idf/Idy mapping. Other
>>> aspects of this concept can be assembled from existing pieces but should
>>> be brought together in a recommended fashion.
>>>
>>
>>> Michael
>>>
>>> --
>>> Prof. Dr. habil. Michael Menth
>>> University of Tuebingen
>>> Faculty of Science
>>> Department of Computer Science
>>> Chair of Communication Networks
>>> Sand 13, 72076 Tuebingen, Germany
>>> phone: (+49)-7071/29-70505
>>> fax: (+49)-7071/29-5220
>>> mailto:menth@uni-tuebingen.de
>>> http://kn.inf.uni-tuebingen.de
>>>
>>> _______________________________________________
>>> Ideas mailing list
>>> Ideas@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ideas
>>
>> _______________________________________________
>> Ideas mailing list
>> Ideas@ietf.org
>> https://www.ietf.org/mailman/listinfo/ideas
>>
>
> --
> Prof. Dr. habil. Michael Menth
> University of Tuebingen
> Faculty of Science
> Department of Computer Science
> Chair of Communication Networks
> Sand 13, 72076 Tuebingen, Germany
> phone: (+49)-7071/29-70505
> fax: (+49)-7071/29-5220
> mailto:menth@uni-tuebingen.de
> http://kn.inf.uni-tuebingen.de


From nobody Sun Jun 11 20:38:28 2017
Return-Path: <padma.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67FC6129B8C for <ideas@ietfa.amsl.com>; Sun, 11 Jun 2017 20:38:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oMaPgpaUOfxx for <ideas@ietfa.amsl.com>; Sun, 11 Jun 2017 20:38:22 -0700 (PDT)
Received: from mail-wr0-x229.google.com (mail-wr0-x229.google.com [IPv6:2a00:1450:400c:c0c::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A64A129B89 for <ideas@ietf.org>; Sun, 11 Jun 2017 20:38:22 -0700 (PDT)
Received: by mail-wr0-x229.google.com with SMTP id g76so81533072wrd.1 for <ideas@ietf.org>; Sun, 11 Jun 2017 20:38:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=lnHcf7AplL0FMWlTo9Atxsf0Vc/Rsi+NGGcDcLo8LW4=; b=DbANb6mt+Yo6eZsnhG43ZzWCrA2dxzhqHyI+wk+Obh2oaKkuWk5GqlwIXHdiBsJbos 7CqpO488RgYKJmTZO080T4nqpKHshpinUGlK9F3ofLbJccX+uhfH7ousQMtHZ6K3biB7 RcrqJxpKUPs/r9nVDmrxtd8hhF3hgKGgUm2jhfvSF5F7Ivg1jK/yotxCoTlaazwct/b2 E0VU7MG0VAhjU4Lb8Lk0L70d+avFUzCyowCowwx9lSB2F8QOplmWMObMRkJ9LbD4m0W6 /0vpVBmSSjGIGYC/Q4B9DS2jyY1y8wX/RZPyL0OirNCZog3cx3V7MMQTyF97y0797vAY Shew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=lnHcf7AplL0FMWlTo9Atxsf0Vc/Rsi+NGGcDcLo8LW4=; b=b5rxNNtqhHH/i85R9fH/AbY9TfRgr2MoQFpUxZh24NUbbqgg1rEiSZ7n75p5Za9qdZ ccbze1OEW+zAELG9E/bTaQYXcpXoCqIKiDJKGmLRmrolI7+2cCOYGRldUu/O7mUbpPF/ BHCTB6PSzYgW86Ey7dg0CQrcbiGXsoJI3zYZ84CW6kNDeGnZw0PpDxVnDQ9vRGjnBaTj 3+0p/V4YTYb9rvq6dbbDi1Yl2rmIf/BaYsMpGc8cNTxNU3f6kMRD/mqN5fuIRhUXtqQx GoicJqBMfVrgJ9PtMSzoWidJiZmVLC9NvXpMtoXQsqtoXfagmaq4Su+N5qVC9AaXg/Ag UAbw==
X-Gm-Message-State: AODbwcDzc2FVrO+tZZagjgljNLuOc9DQpotY4pDv85AersrUfncPKMEd Acu4IaFLQzEYSRAlZf0qG+pWpTcvAw==
X-Received: by 10.28.103.193 with SMTP id b184mr6389650wmc.25.1497238700596; Sun, 11 Jun 2017 20:38:20 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.167.2 with HTTP; Sun, 11 Jun 2017 20:38:20 -0700 (PDT)
In-Reply-To: <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Sun, 11 Jun 2017 20:38:20 -0700
Message-ID: <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
Cc: Michael Menth <menth@uni-tuebingen.de>, ideas@ietf.org
Content-Type: multipart/alternative; boundary="001a114b0598e4a3330551bb0c10"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/Hfh-aevv4rR7Gd6taxKLWOrATsM>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 03:38:26 -0000

--001a114b0598e4a3330551bb0c10
Content-Type: text/plain; charset="UTF-8"

Hi Tom

See Below for my comments

On Sun, Jun 11, 2017 at 9:59 AM, Tom Herbert <tom@herbertland.com> wrote:

> On Sun, Jun 11, 2017 at 2:19 AM, Michael Menth <menth@uni-tuebingen.de>
> wrote:
> > Hi Tom,
> >
> > we have alreaday LISP, ILA, and ILNP for implentation of Loc/ID split.
> > We have DNS and DDT as mapping systems used in these contexts.
> > So, there is already quite some support for basic Loc/ID split.
> >
> > What's missing is an adequate protection of IDs in the above mentioned
> > context. When communicating with a unique ID, communication becomes
> > trackable like in the early days of IPv6. IPv6 privacy extensions solved
> > that problem. But with IPv6 we don't know whom we are talking to. So
> > what's desirable is a permanent ID for an identity which can be mapped
> > to various temporary IDs that are used for communication. A mapping
> > system associates identities and identifiers but can be queried only by
> > authorized identifiers. That means, communication becomes transparent to
> > authorized users while protecting privacy against others. However, we
> > need to explore how these objectives can be achieved with current
> > protocols and what pieces and extensions are missing.
> >
>
> Michael,
>
> I think what you're describing is more address obfuscation than ID/loc
> split, or in this case it's the identifier being obfuscated. This is
> being implemented in IPwave for instance to mitigate the tracking
> problem. The need for obfuscation is independent of the ID/loc.
>
> Hi Tom

Obfuscation is just an aspect of this. This is a bit different from the
vehicular case.

Address obfuscation only works to the extent that there aren't other
> means to track nodes. For instance, even if we were to use different
> addresses for each packet of a TCP connection, the connection is
> trivial to track but just correlating port numbers, sequence and ack
> numbers sent in the clear. The only way to ensure privacy is encrypt
> everything possible.
>
>
Yes this is true but you will need to do DPI in you want to act not his
packet.
I am specifically thinking of the case when you have packets in flight and
you need to change the locator.
If you want to avoid anchoring mechanism to do this and all is encrypted
then you will need to decrypt to be able to do any processing.
Another example would be ID context awareness which is difficult to achieve
today as is and even more so if we start using anon identifiers that change
all the time ...


> In ILA deployment, the intent is that protocol is not visible to
> public networks. For instance, in a carrier network ILA would only be
> used in the core (like GTP is only in the core today). The carrier
> network already knows location anyway, so we don't address obfuscation
> there. For packets going to the UE (over radio for instance) we do
> need address obfuscation there like IPwave is doing, but again that
> can be independent of id/loc.
>
>
I think we are talking of two different things here.

You are right address obfuscation can be achieved by many ways.
However, if you want to have an anonymous ID and yet have someone to
discover you and initiate communication with you then there has to be some
relationship between on what you can be looked up and the actual id you use.

On the other hand there are other possible functionalities tied the
identity that we do not have today such as access control or even policies.


> Anyway, if this is really needed, I suggest that it is defined to be
> an obfuscation layer separate from id/loc. And it should be optional
> and usable outside of id/loc as well.
>
>
Absolutely.
The Identity Services in the framework are in separate modules from mapping
resolution services.
As per the requirements document, for interoperability the identity service
module is not mandatory.

Hope this clarifies.

Padma

Tom
>
> > That mechanism may be an enabler for true Loc/ID split as it allows to
> > use a permanent ID for identity (think of user contract) and a temporary
> > ID for each communication, for certain time spans, or devices. Permanent
> > IDs are not acceptable for privacy concerns in many use cases, e.g.,
> > automotive. As the temporary ID may be looked up by a provider, it may
> > be possible to apply per-identiy policies to traffic. If an identifier
> > is corrupt or gets attacked, of if a device gets lost or is exchanged,
> > the corresponding identifier may be substituted by another.
> >
> > This is the filtered result of several telcos with proponents of IDEAS.
> > It requires some effort to clearly outline the potential of IDEAS in
> > various use cases as we're looking really beyond Loc/ID split.
> >
> > Best wishes,
> >
> > Michael
> >
> >
> > Am 11.06.2017 um 01:31 schrieb Tom Herbert:
> >> On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de>
> wrote:
> >>> Dear Padma, all,
> >>>
> >>> I've tried to condense the essence of what I perceived from multiple
> >>> IDEAS brainstormings, documents, and email discussions. This may be a
> >>> base for a problem statement. Please add missing aspects!
> >>>
> >>> IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),
> >>> identifiers (Idfs), and locators may be used for future communication
> >>> using existing protocols. Missing features are identified and added.
> >>>
> >>> An Idy is a permanent ID (PID) to uniquely identify an entity. To
> >>> protect its privacy, an entity may choose additional temporary IDs
> >>> (TIDs) for communications, so-called Idfs. A mapping system maps these
> >>> Idfs to their Idy so that communication partners may look up an Idf's
> >>> Idy. To preserve its privacy, the entity controls the mapping system
> and
> >>> may restrict access to it for certain Idfs or Idys.
> >>>
> >> Hi Michael,
> >>
> >> I'm not following we need to have both identities and identifiers nor
> >> what the operational difference would be. This seems like a lot of
> >> complexity to me.
> >>
> >> In ILA for instance, there are just identifiers and locators. The
> >> management plane creates identifiers on request (every task gets a
> >> unique identifier for instance). The mapping system maps identifiers
> >> to locators. Identifiers identify something but we really don't care
> >> what they identify. The same object could be assigned multiple
> >> identifiers for privacy as you describe below, but the mapping system
> >> shouldn't care about that. Identifiers can be registered in the
> >> mapping system, and then unregistered when they are no longer used--
> >> so there's no concept of permanent or temporary identifiers.
> >> Uniqueness of identifiers is a key attribute. For security, we need
> >> tight control over who can modify the mappings and who's allowed to
> >> query.
> >>
> >> Can you maybe elaborate on how identities would make things better in
> >> the scenario I described?
> >>
> >> Tom
> >>
> >>> Both Idys and preferentially Idfs may be used for communication. They
> >>> identify the communication partner but not her location on the
> Internet.
> >>> To denote the location of an entity, one or more locators are needed
> >>> that describe how the Idy/Idf can be reached. A mapping system allows
> to
> >>> look up the locators so that traffic can be sent to the Idy/Idf. This
> is
> >>> the well-known Loc/ID split providing benefits such as improved
> mobility
> >>> (e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic
> >>> engineering and other flexibility aspects.
> >>>
> >>> The advantage of that system is that entities may use Idfs for
> >>> communication to better protect their Idy. Only authorized
> communication
> >>> partners can find out the corresponding Idys behind. Entities can avoid
> >>> being tracked on the Internet by using multiple Idfs or by regularly
> >>> changing Idfs. The control of the Idy/Idf mappings can restrict access
> >>> to selected requesting Idys/Idfs and also limit that access over time
> to
> >>> implement a right to be forgotten.
> >>>
> >>> The concept improves the current LISP protocol by adding privacy in
> >>> communication in a similar way as IPv6 privacy extension avoid being
> >>> tracked by a stable MAC address. To that end, access restriction is
> >>> needed for mapping system requests which also need to be encrypted to
> >>> avoid eavesdropping. Therefore, a major protocol definition effort is
> >>> needed for the mapping system that provides the Idf/Idy mapping. Other
> >>> aspects of this concept can be assembled from existing pieces but
> should
> >>> be brought together in a recommended fashion.
> >>>
> >>
> >>> Michael
> >>>
> >>> --
> >>> Prof. Dr. habil. Michael Menth
> >>> University of Tuebingen
> >>> Faculty of Science
> >>> Department of Computer Science
> >>> Chair of Communication Networks
> >>> Sand 13, 72076 Tuebingen, Germany
> >>> phone: (+49)-7071/29-70505
> >>> fax: (+49)-7071/29-5220
> >>> mailto:menth@uni-tuebingen.de
> >>> http://kn.inf.uni-tuebingen.de
> >>>
> >>> _______________________________________________
> >>> Ideas mailing list
> >>> Ideas@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/ideas
> >>
> >> _______________________________________________
> >> Ideas mailing list
> >> Ideas@ietf.org
> >> https://www.ietf.org/mailman/listinfo/ideas
> >>
> >
> > --
> > Prof. Dr. habil. Michael Menth
> > University of Tuebingen
> > Faculty of Science
> > Department of Computer Science
> > Chair of Communication Networks
> > Sand 13, 72076 Tuebingen, Germany
> > phone: (+49)-7071/29-70505
> > fax: (+49)-7071/29-5220
> > mailto:menth@uni-tuebingen.de
> > http://kn.inf.uni-tuebingen.de
>

--001a114b0598e4a3330551bb0c10
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra">Hi Tom=C2=A0</div><div clas=
s=3D"gmail_extra"><br></div><div class=3D"gmail_extra">See Below for my com=
ments</div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Sun=
, Jun 11, 2017 at 9:59 AM, Tom Herbert <span dir=3D"ltr">&lt;<a href=3D"mai=
lto:tom@herbertland.com" target=3D"_blank">tom@herbertland.com</a>&gt;</spa=
n> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex"><span class=3D"">On Sun, Jun 11=
, 2017 at 2:19 AM, Michael Menth &lt;<a href=3D"mailto:menth@uni-tuebingen.=
de">menth@uni-tuebingen.de</a>&gt; wrote:<br>
&gt; Hi Tom,<br>
&gt;<br>
&gt; we have alreaday LISP, ILA, and ILNP for implentation of Loc/ID split.=
<br>
&gt; We have DNS and DDT as mapping systems used in these contexts.<br>
&gt; So, there is already quite some support for basic Loc/ID split.<br>
&gt;<br>
&gt; What&#39;s missing is an adequate protection of IDs in the above menti=
oned<br>
&gt; context. When communicating with a unique ID, communication becomes<br=
>
&gt; trackable like in the early days of IPv6. IPv6 privacy extensions solv=
ed<br>
&gt; that problem. But with IPv6 we don&#39;t know whom we are talking to. =
So<br>
&gt; what&#39;s desirable is a permanent ID for an identity which can be ma=
pped<br>
&gt; to various temporary IDs that are used for communication. A mapping<br=
>
&gt; system associates identities and identifiers but can be queried only b=
y<br>
&gt; authorized identifiers. That means, communication becomes transparent =
to<br>
&gt; authorized users while protecting privacy against others. However, we<=
br>
&gt; need to explore how these objectives can be achieved with current<br>
&gt; protocols and what pieces and extensions are missing.<br>
&gt;<br>
<br>
</span>Michael,<br>
<br>
I think what you&#39;re describing is more address obfuscation than ID/loc<=
br>
split, or in this case it&#39;s the identifier being obfuscated. This is<br=
>
being implemented in IPwave for instance to mitigate the tracking<br>
problem. The need for obfuscation is independent of the ID/loc.<br>
<br></blockquote><div>Hi Tom</div><div><br></div><div>Obfuscation is just a=
n aspect of this. This is a bit different from the vehicular case.=C2=A0</d=
iv><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
Address obfuscation only works to the extent that there aren&#39;t other<br=
>
means to track nodes. For instance, even if we were to use different<br>
addresses for each packet of a TCP connection, the connection is<br>
trivial to track but just correlating port numbers, sequence and ack<br>
numbers sent in the clear. The only way to ensure privacy is encrypt<br>
everything possible.<br>
<br></blockquote><div><br></div><div>Yes this is true but you will need to =
do DPI in you want to act not his packet.</div><div>I am specifically think=
ing of the case when you have packets in flight and you need to change the =
locator.</div><div>If you want to avoid anchoring mechanism to do this and =
all is encrypted then you will need to decrypt to be able to do any process=
ing.</div><div>Another example would be ID context awareness which is diffi=
cult to achieve today as is and even more so if we start using anon identif=
iers that change all the time ...</div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
In ILA deployment, the intent is that protocol is not visible to<br>
public networks. For instance, in a carrier network ILA would only be<br>
used in the core (like GTP is only in the core today). The carrier<br>
network already knows location anyway, so we don&#39;t address obfuscation<=
br>
there. For packets going to the UE (over radio for instance) we do<br>
need address obfuscation there like IPwave is doing, but again that<br>
can be independent of id/loc.<br>
<br></blockquote><div><br></div><div>I think we are talking of two differen=
t things here.</div><div><br></div><div>You are right address obfuscation c=
an be achieved by many ways.</div><div>However, if you want to have an anon=
ymous ID and yet have someone to discover you and initiate communication wi=
th you then there has to be some relationship between on what you can be lo=
oked up and the actual id you use.</div><div><br></div><div>On the other ha=
nd there are other possible functionalities tied the identity that we do no=
t have today such as access control or even policies.</div><div>=C2=A0</div=
><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1=
px #ccc solid;padding-left:1ex">
Anyway, if this is really needed, I suggest that it is defined to be<br>
an obfuscation layer separate from id/loc. And it should be optional<br>
and usable outside of id/loc as well.<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br></font></span></blockquo=
te><div><br></div><div>Absolutely.=C2=A0</div><div>The Identity Services in=
 the framework are in separate modules from mapping resolution services.</d=
iv><div>As per the requirements document, for interoperability the identity=
 service module is not mandatory.</div><div><br></div><div>Hope this clarif=
ies.</div><div><br></div><div>Padma</div><div><br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><span class=3D"HOEnZb"><font color=3D"#888888">
Tom<br>
</font></span><div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; That mechanism may be an enabler for true Loc/ID split as it allows to=
<br>
&gt; use a permanent ID for identity (think of user contract) and a tempora=
ry<br>
&gt; ID for each communication, for certain time spans, or devices. Permane=
nt<br>
&gt; IDs are not acceptable for privacy concerns in many use cases, e.g.,<b=
r>
&gt; automotive. As the temporary ID may be looked up by a provider, it may=
<br>
&gt; be possible to apply per-identiy policies to traffic. If an identifier=
<br>
&gt; is corrupt or gets attacked, of if a device gets lost or is exchanged,=
<br>
&gt; the corresponding identifier may be substituted by another.<br>
&gt;<br>
&gt; This is the filtered result of several telcos with proponents of IDEAS=
.<br>
&gt; It requires some effort to clearly outline the potential of IDEAS in<b=
r>
&gt; various use cases as we&#39;re looking really beyond Loc/ID split.<br>
&gt;<br>
&gt; Best wishes,<br>
&gt;<br>
&gt; Michael<br>
&gt;<br>
&gt;<br>
&gt; Am 11.06.2017 um 01:31 schrieb Tom Herbert:<br>
&gt;&gt; On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth &lt;<a href=3D"mail=
to:menth@uni-tuebingen.de">menth@uni-tuebingen.de</a>&gt; wrote:<br>
&gt;&gt;&gt; Dear Padma, all,<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; I&#39;ve tried to condense the essence of what I perceived fro=
m multiple<br>
&gt;&gt;&gt; IDEAS brainstormings, documents, and email discussions. This m=
ay be a<br>
&gt;&gt;&gt; base for a problem statement. Please add missing aspects!<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; IDentity-EnAbled networkS (IDEAS) describes how identities (Id=
ys),<br>
&gt;&gt;&gt; identifiers (Idfs), and locators may be used for future commun=
ication<br>
&gt;&gt;&gt; using existing protocols. Missing features are identified and =
added.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; An Idy is a permanent ID (PID) to uniquely identify an entity.=
 To<br>
&gt;&gt;&gt; protect its privacy, an entity may choose additional temporary=
 IDs<br>
&gt;&gt;&gt; (TIDs) for communications, so-called Idfs. A mapping system ma=
ps these<br>
&gt;&gt;&gt; Idfs to their Idy so that communication partners may look up a=
n Idf&#39;s<br>
&gt;&gt;&gt; Idy. To preserve its privacy, the entity controls the mapping =
system and<br>
&gt;&gt;&gt; may restrict access to it for certain Idfs or Idys.<br>
&gt;&gt;&gt;<br>
&gt;&gt; Hi Michael,<br>
&gt;&gt;<br>
&gt;&gt; I&#39;m not following we need to have both identities and identifi=
ers nor<br>
&gt;&gt; what the operational difference would be. This seems like a lot of=
<br>
&gt;&gt; complexity to me.<br>
&gt;&gt;<br>
&gt;&gt; In ILA for instance, there are just identifiers and locators. The<=
br>
&gt;&gt; management plane creates identifiers on request (every task gets a=
<br>
&gt;&gt; unique identifier for instance). The mapping system maps identifie=
rs<br>
&gt;&gt; to locators. Identifiers identify something but we really don&#39;=
t care<br>
&gt;&gt; what they identify. The same object could be assigned multiple<br>
&gt;&gt; identifiers for privacy as you describe below, but the mapping sys=
tem<br>
&gt;&gt; shouldn&#39;t care about that. Identifiers can be registered in th=
e<br>
&gt;&gt; mapping system, and then unregistered when they are no longer used=
--<br>
&gt;&gt; so there&#39;s no concept of permanent or temporary identifiers.<b=
r>
&gt;&gt; Uniqueness of identifiers is a key attribute. For security, we nee=
d<br>
&gt;&gt; tight control over who can modify the mappings and who&#39;s allow=
ed to<br>
&gt;&gt; query.<br>
&gt;&gt;<br>
&gt;&gt; Can you maybe elaborate on how identities would make things better=
 in<br>
&gt;&gt; the scenario I described?<br>
&gt;&gt;<br>
&gt;&gt; Tom<br>
&gt;&gt;<br>
&gt;&gt;&gt; Both Idys and preferentially Idfs may be used for communicatio=
n. They<br>
&gt;&gt;&gt; identify the communication partner but not her location on the=
 Internet.<br>
&gt;&gt;&gt; To denote the location of an entity, one or more locators are =
needed<br>
&gt;&gt;&gt; that describe how the Idy/Idf can be reached. A mapping system=
 allows to<br>
&gt;&gt;&gt; look up the locators so that traffic can be sent to the Idy/Id=
f. This is<br>
&gt;&gt;&gt; the well-known Loc/ID split providing benefits such as improve=
d mobility<br>
&gt;&gt;&gt; (e.g. for VMs in a datacenter), Internet-scale SDN, improved t=
raffic<br>
&gt;&gt;&gt; engineering and other flexibility aspects.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; The advantage of that system is that entities may use Idfs for=
<br>
&gt;&gt;&gt; communication to better protect their Idy. Only authorized com=
munication<br>
&gt;&gt;&gt; partners can find out the corresponding Idys behind. Entities =
can avoid<br>
&gt;&gt;&gt; being tracked on the Internet by using multiple Idfs or by reg=
ularly<br>
&gt;&gt;&gt; changing Idfs. The control of the Idy/Idf mappings can restric=
t access<br>
&gt;&gt;&gt; to selected requesting Idys/Idfs and also limit that access ov=
er time to<br>
&gt;&gt;&gt; implement a right to be forgotten.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; The concept improves the current LISP protocol by adding priva=
cy in<br>
&gt;&gt;&gt; communication in a similar way as IPv6 privacy extension avoid=
 being<br>
&gt;&gt;&gt; tracked by a stable MAC address. To that end, access restricti=
on is<br>
&gt;&gt;&gt; needed for mapping system requests which also need to be encry=
pted to<br>
&gt;&gt;&gt; avoid eavesdropping. Therefore, a major protocol definition ef=
fort is<br>
&gt;&gt;&gt; needed for the mapping system that provides the Idf/Idy mappin=
g. Other<br>
&gt;&gt;&gt; aspects of this concept can be assembled from existing pieces =
but should<br>
&gt;&gt;&gt; be brought together in a recommended fashion.<br>
&gt;&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;&gt; Michael<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; --<br>
&gt;&gt;&gt; Prof. Dr. habil. Michael Menth<br>
&gt;&gt;&gt; University of Tuebingen<br>
&gt;&gt;&gt; Faculty of Science<br>
&gt;&gt;&gt; Department of Computer Science<br>
&gt;&gt;&gt; Chair of Communication Networks<br>
&gt;&gt;&gt; Sand 13, 72076 Tuebingen, Germany<br>
&gt;&gt;&gt; phone: <a href=3D"tel:%28%2B49%29-7071%2F29-70505" value=3D"+4=
970712970505">(+49)-7071/29-70505</a><br>
&gt;&gt;&gt; fax: <a href=3D"tel:%28%2B49%29-7071%2F29-5220" value=3D"+4970=
71295220">(+49)-7071/29-5220</a><br>
&gt;&gt;&gt; mailto:<a href=3D"mailto:menth@uni-tuebingen.de">menth@uni-tue=
bingen.de</a><br>
&gt;&gt;&gt; <a href=3D"http://kn.inf.uni-tuebingen.de" rel=3D"noreferrer" =
target=3D"_blank">http://kn.inf.uni-tuebingen.de</a><br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt;&gt; Ideas mailing list<br>
&gt;&gt;&gt; <a href=3D"mailto:Ideas@ietf.org">Ideas@ietf.org</a><br>
&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/ideas" rel=3D=
"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/i=
deas</a><br>
&gt;&gt;<br>
&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt; Ideas mailing list<br>
&gt;&gt; <a href=3D"mailto:Ideas@ietf.org">Ideas@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/ideas" rel=3D"nor=
eferrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/ideas=
</a><br>
&gt;&gt;<br>
&gt;<br>
&gt; --<br>
&gt; Prof. Dr. habil. Michael Menth<br>
&gt; University of Tuebingen<br>
&gt; Faculty of Science<br>
&gt; Department of Computer Science<br>
&gt; Chair of Communication Networks<br>
&gt; Sand 13, 72076 Tuebingen, Germany<br>
&gt; phone: <a href=3D"tel:%28%2B49%29-7071%2F29-70505" value=3D"+497071297=
0505">(+49)-7071/29-70505</a><br>
&gt; fax: <a href=3D"tel:%28%2B49%29-7071%2F29-5220" value=3D"+497071295220=
">(+49)-7071/29-5220</a><br>
&gt; mailto:<a href=3D"mailto:menth@uni-tuebingen.de">menth@uni-tuebingen.d=
e</a><br>
&gt; <a href=3D"http://kn.inf.uni-tuebingen.de" rel=3D"noreferrer" target=
=3D"_blank">http://kn.inf.uni-tuebingen.de</a><br>
</div></div></blockquote></div><br></div></div>

--001a114b0598e4a3330551bb0c10--


From nobody Mon Jun 12 12:20:58 2017
Return-Path: <uma.chunduri@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7FE11296C9 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 12:20:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level: 
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RbW6Sa674QhQ for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 12:20:54 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 031451296B0 for <ideas@ietf.org>; Mon, 12 Jun 2017 12:20:53 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml705-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DOY68612; Mon, 12 Jun 2017 19:20:52 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.208.112.38) by lhreml705-cah.china.huawei.com (10.201.108.46) with Microsoft SMTP Server (TLS) id 14.3.301.0; Mon, 12 Jun 2017 20:20:51 +0100
Received: from SJCEML703-CHM.china.huawei.com ([169.254.5.102]) by SJCEML702-CHM.china.huawei.com ([169.254.4.136]) with mapi id 14.03.0301.000;  Mon, 12 Jun 2017 12:20:42 -0700
From: Uma Chunduri <uma.chunduri@huawei.com>
To: Michael Menth <menth@uni-tuebingen.de>, Tom Herbert <tom@herbertland.com>
CC: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>
Thread-Topic: [Ideas] BOF @IETF 99 Preparation - problem statement
Thread-Index: AQHS4cQUtWuhlPu7rEKIIO+qUnKjRKIfNT4AgACkN4CAAb4wMA==
Date: Mon, 12 Jun 2017 19:20:41 +0000
Message-ID: <25B4902B1192E84696414485F5726854018CEBB7@SJCEML703-CHM.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de>
In-Reply-To: <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.213.49.152]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.593EE994.0195, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.5.102, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 030c5a3a23b831f56d4878662200075f
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/y3RUBWBdDTWmQRMeNRP9KGFN030>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 19:20:57 -0000

Hi Michael,

Very good and crisp summary. I agree with most of it and would add identity=
 would also provide benefits providers with various value added services yo=
u hinted below.
--
Uma C.

-----Original Message-----
From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Michael Menth
Sent: Sunday, June 11, 2017 2:19 AM
To: Tom Herbert <tom@herbertland.com>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>; ideas@ietf.org
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement

Hi Tom,

we have alreaday LISP, ILA, and ILNP for implentation of Loc/ID split.
We have DNS and DDT as mapping systems used in these contexts.
So, there is already quite some support for basic Loc/ID split.

What's missing is an adequate protection of IDs in the above mentioned cont=
ext. When communicating with a unique ID, communication becomes trackable l=
ike in the early days of IPv6. IPv6 privacy extensions solved that problem.=
 But with IPv6 we don't know whom we are talking to. So what's desirable is=
 a permanent ID for an identity which can be mapped to various temporary ID=
s that are used for communication. A mapping system associates identities a=
nd identifiers but can be queried only by authorized identifiers. That mean=
s, communication becomes transparent to authorized users while protecting p=
rivacy against others. However, we need to explore how these objectives can=
 be achieved with current protocols and what pieces and extensions are miss=
ing.

That mechanism may be an enabler for true Loc/ID split as it allows to use =
a permanent ID for identity (think of user contract) and a temporary ID for=
 each communication, for certain time spans, or devices. Permanent IDs are =
not acceptable for privacy concerns in many use cases, e.g., automotive. As=
 the temporary ID may be looked up by a provider, it may be possible to app=
ly per-identiy policies to traffic. If an identifier is corrupt or gets att=
acked, of if a device gets lost or is exchanged, the corresponding identifi=
er may be substituted by another.

This is the filtered result of several telcos with proponents of IDEAS.
It requires some effort to clearly outline the potential of IDEAS in variou=
s use cases as we're looking really beyond Loc/ID split.

Best wishes,

Michael


Am 11.06.2017 um 01:31 schrieb Tom Herbert:
> On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de> w=
rote:
>> Dear Padma, all,
>>
>> I've tried to condense the essence of what I perceived from multiple=20
>> IDEAS brainstormings, documents, and email discussions. This may be a=20
>> base for a problem statement. Please add missing aspects!
>>
>> IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),=20
>> identifiers (Idfs), and locators may be used for future communication=20
>> using existing protocols. Missing features are identified and added.
>>
>> An Idy is a permanent ID (PID) to uniquely identify an entity. To=20
>> protect its privacy, an entity may choose additional temporary IDs
>> (TIDs) for communications, so-called Idfs. A mapping system maps=20
>> these Idfs to their Idy so that communication partners may look up an=20
>> Idf's Idy. To preserve its privacy, the entity controls the mapping=20
>> system and may restrict access to it for certain Idfs or Idys.
>>
> Hi Michael,
>=20
> I'm not following we need to have both identities and identifiers nor=20
> what the operational difference would be. This seems like a lot of=20
> complexity to me.
>=20
> In ILA for instance, there are just identifiers and locators. The=20
> management plane creates identifiers on request (every task gets a=20
> unique identifier for instance). The mapping system maps identifiers=20
> to locators. Identifiers identify something but we really don't care=20
> what they identify. The same object could be assigned multiple=20
> identifiers for privacy as you describe below, but the mapping system=20
> shouldn't care about that. Identifiers can be registered in the=20
> mapping system, and then unregistered when they are no longer used--=20
> so there's no concept of permanent or temporary identifiers.
> Uniqueness of identifiers is a key attribute. For security, we need=20
> tight control over who can modify the mappings and who's allowed to=20
> query.
>=20
> Can you maybe elaborate on how identities would make things better in=20
> the scenario I described?
>=20
> Tom
>=20
>> Both Idys and preferentially Idfs may be used for communication. They=20
>> identify the communication partner but not her location on the Internet.
>> To denote the location of an entity, one or more locators are needed=20
>> that describe how the Idy/Idf can be reached. A mapping system allows=20
>> to look up the locators so that traffic can be sent to the Idy/Idf.=20
>> This is the well-known Loc/ID split providing benefits such as=20
>> improved mobility (e.g. for VMs in a datacenter), Internet-scale SDN,=20
>> improved traffic engineering and other flexibility aspects.
>>
>> The advantage of that system is that entities may use Idfs for=20
>> communication to better protect their Idy. Only authorized=20
>> communication partners can find out the corresponding Idys behind.=20
>> Entities can avoid being tracked on the Internet by using multiple=20
>> Idfs or by regularly changing Idfs. The control of the Idy/Idf=20
>> mappings can restrict access to selected requesting Idys/Idfs and=20
>> also limit that access over time to implement a right to be forgotten.
>>
>> The concept improves the current LISP protocol by adding privacy in=20
>> communication in a similar way as IPv6 privacy extension avoid being=20
>> tracked by a stable MAC address. To that end, access restriction is=20
>> needed for mapping system requests which also need to be encrypted to=20
>> avoid eavesdropping. Therefore, a major protocol definition effort is=20
>> needed for the mapping system that provides the Idf/Idy mapping.=20
>> Other aspects of this concept can be assembled from existing pieces=20
>> but should be brought together in a recommended fashion.
>>
>=20
>> Michael
>>
>> --
>> Prof. Dr. habil. Michael Menth
>> University of Tuebingen
>> Faculty of Science
>> Department of Computer Science
>> Chair of Communication Networks
>> Sand 13, 72076 Tuebingen, Germany
>> phone: (+49)-7071/29-70505
>> fax: (+49)-7071/29-5220
>> mailto:menth@uni-tuebingen.de
>> http://kn.inf.uni-tuebingen.de
>>
>> _______________________________________________
>> Ideas mailing list
>> Ideas@ietf.org
>> https://www.ietf.org/mailman/listinfo/ideas
>=20
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas
>=20

--
Prof. Dr. habil. Michael Menth
University of Tuebingen
Faculty of Science
Department of Computer Science
Chair of Communication Networks
Sand 13, 72076 Tuebingen, Germany
phone: (+49)-7071/29-70505
fax: (+49)-7071/29-5220
mailto:menth@uni-tuebingen.de
http://kn.inf.uni-tuebingen.de

_______________________________________________
Ideas mailing list
Ideas@ietf.org
https://www.ietf.org/mailman/listinfo/ideas


From nobody Mon Jun 12 12:26:14 2017
Return-Path: <uma.chunduri@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DD36128DF6 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 12:25:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level: 
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3VBvrDQP-hsn for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 12:25:53 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3EB4128C81 for <ideas@ietf.org>; Mon, 12 Jun 2017 12:25:50 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DOY68483; Mon, 12 Jun 2017 19:19:19 +0000 (GMT)
Received: from SJCEML701-CHM.china.huawei.com (10.208.112.40) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.301.0; Mon, 12 Jun 2017 20:19:17 +0100
Received: from SJCEML703-CHM.china.huawei.com ([169.254.5.102]) by SJCEML701-CHM.china.huawei.com ([169.254.3.162]) with mapi id 14.03.0301.000;  Mon, 12 Jun 2017 12:19:14 -0700
From: Uma Chunduri <uma.chunduri@huawei.com>
To: Padma Pillay-Esnault <padma.ietf@gmail.com>, Tom Herbert <tom@herbertland.com>
CC: "ideas@ietf.org" <ideas@ietf.org>, Michael Menth <menth@uni-tuebingen.de>
Thread-Topic: [Ideas] BOF @IETF 99 Preparation - problem statement
Thread-Index: AQHS4cQUtWuhlPu7rEKIIO+qUnKjRKIfNT4AgACkN4CAAICQgIAAsncAgACKwtA=
Date: Mon, 12 Jun 2017 19:19:13 +0000
Message-ID: <25B4902B1192E84696414485F5726854018CEBAA@SJCEML703-CHM.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com> <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com>
In-Reply-To: <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.213.49.152]
Content-Type: multipart/alternative; boundary="_000_25B4902B1192E84696414485F5726854018CEBAASJCEML703CHMchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.593EE938.003C, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.5.102, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 030c5a3a23b831f56d4878662200075f
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/_2MPV70G-yOeaPEr1faO95luJ3k>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 19:25:57 -0000

--_000_25B4902B1192E84696414485F5726854018CEBAASJCEML703CHMchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGkgVG9tLA0KDQoNCg0KSnVzdCB3YW50IHRvIGFkZCAyIHNwZWNpZmljIHBvaW50cyBvbiB0b3Ag
b2Ygd2hhdCBQYWRtYSBzYWlkIGJlbG93IOKAkw0KDQoNCg0KPkkgdGhpbmsgd2hhdCB5b3UncmUg
ZGVzY3JpYmluZyBpcyBtb3JlIGFkZHJlc3Mgb2JmdXNjYXRpb24gdGhhbiBJRC9sb2Mgc3BsaXQs
IG9yIGluIHRoaXMgY2FzZSBpdCdzIHRoZSBpZGVudGlmaWVyIGJlaW5nIG9iZnVzY2F0ZWQuIFRo
aXMgaXMgYmVpbmcgaW1wbGVtZW50ZWQgaW4gSVB3YXZlIGZvciBpbnN0YW5jZSB0byBtaXRpZ2F0
ZSB0aGUgdHJhY2tpbmcgcHJvYmxlbS4gVGhlIG5lZWQgZm9yIG9iZnVzY2F0aW9uIGlzIGluZGVw
ZW5kZW50IG9mIHRoZSBJRC9sb2MuDQoNCj5BZGRyZXNzIG9iZnVzY2F0aW9uIG9ubHkgd29ya3Mg
dG8gdGhlIGV4dGVudCB0aGF0IHRoZXJlIGFyZW4ndCBvdGhlciBtZWFucyB0byB0cmFjayBub2Rl
cy4gRm9yIGluc3RhbmNlLCBldmVuIGlmIHdlIHdlcmUgdG8gdXNlIGRpZmZlcmVudCBhZGRyZXNz
ZXMgZm9yIGVhY2ggcGFja2V0IG9mIGEgVENQIGNvbm5lY3Rpb24sIHRoZSBjb25uZWN0aW9uIGlz
IHRyaXZpYWwgdG8gdHJhY2sgYnV0IGp1c3QgY29ycmVsYXRpbmcgcG9ydCBudW1iZXJzLA0KDQo+
c2VxdWVuY2UgYW5kIGFjayBudW1iZXJzIHNlbnQgaW4gdGhlIGNsZWFyLiBUaGUgb25seSB3YXkg
dG8gZW5zdXJlIHByaXZhY3kgaXMgZW5jcnlwdCBldmVyeXRoaW5nIHBvc3NpYmxlLg0KDQoNCg0K
RW5jcnlwdGlvbiBmb3Igb2JmdXNjYXRpb24gb2YgaWRlbnRpZmllcnMgaXMgYSB0b28gbXVjaCBv
ZiBhIHN0cmV0Y2guIEVuY3J5cHRpb24gaGFzIGl0cyBvd24gcGxhY2UgYW5kIEkgc2VlIGl0IGlz
IG9ydGhvZ29uYWwgdG8gSWRlbnRpZmllciBvYmZ1c2NhdGlvbi4gV2hpbGUgaW4gYW4gdW5lbmNy
eXB0ZWQgYW5kICBvYmZ1c2NhdGVkIGlkZW50aWZpZXJzLCBvbmUgY2FuIHNlZSBzb21lIGFzcGVj
dHMgb2YgVENQIGNvbm5lY3Rpb24sIHdoYXQgY2Fubm90IGJlIGRvbmUgYnkgdGhlIGVhdmVzZHJv
cHBlciBpcyBpZGVudGlmeWluZyAyIGluZGVwZW5kZW50ICBjb21tdW5pY2F0aW9ucyByZWxhdGVk
IHRvIGEgcGFydGljdWxhciBlbnRpdHkuIEkgc2VlIHRoaXMgaXMgdHJ1bHkgIG5ldHdvcmsgbGF5
ZXIgYW5vbnltb3VzIGNvbW11bmljYXRpb24sIGlmIHdlIGhhdmUgdGhlIGFiaWxpdHkgdG8gY2hh
bmdlIGNvbW11bmljYXRpb24gaWRlbnRpZmllcnMgYXQgd2lsbCAod2hpbGUgbWFpbnRhaW5pbmcg
dGhlIHNhbWUgaWRlbnRpZmllciBmb3IgZW50aXJlIHNlc3Npb24gZm9yIG1vYmlsaXR5IHJlYXNv
bnMpLg0KDQpUbyBhY2hpZXZlIHRoaXMgYSBtYW5hZ2VhYmxlIGVudGl0eSBjYWxsZWQg4oCYSWRl
bnRpdHnigJkgZm9yIGFuIGVudGl0eSBhdCBhIGNlbnRyYWwgcGxhY2UgaXMgbmVlZGVkLCAgd2hl
cmUgbWFwcGluZyBhbmQgb3RoZXIgaWRlbnRpdHkgcmVsYXRlZCBzZXJ2aWNlcyBjYW4gYmUgcHJv
dmlkZWQgIGFzIGhpbnRlZCBpbiBHUklEUy1SRVFzIGRvY3VtZW50Lg0KDQoNCg0KDQoNCj5JbiBJ
TEEgZGVwbG95bWVudCwgdGhlIGludGVudCBpcyB0aGF0IHByb3RvY29sIGlzIG5vdCB2aXNpYmxl
IHRvIHB1YmxpYyBuZXR3b3Jrcy4gRm9yIGluc3RhbmNlLCBpbiBhIGNhcnJpZXIgbmV0d29yayBJ
TEEgd291bGQgb25seSBiZSB1c2VkIGluIHRoZSBjb3JlIChsaWtlIEdUUCBpcyBvbmx5IGluIHRo
ZSBjb3JlIHRvZGF5KS4gVGhlIGNhcnJpZXIgbmV0d29yayBhbHJlYWR5IGtub3dzIGxvY2F0aW9u
IGFueXdheSwgc28gd2UgZG9uJ3QgYWRkcmVzcyBvYmZ1c2NhdGlvbiB0aGVyZS4gRm9yIHBhY2tl
dHMgZ29pbmcgdG8gdGhlIFVFIChvdmVyIHJhZGlvIGZvcg0KDQo+aW5zdGFuY2UpIHdlIGRvIG5l
ZWQgYWRkcmVzcyBvYmZ1c2NhdGlvbiB0aGVyZSBsaWtlIElQd2F2ZSBpcyBkb2luZywgYnV0IGFn
YWluIHRoYXQgY2FuIGJlIGluZGVwZW5kZW50IG9mIGlkL2xvYy4NCg0KDQoNCk9iZnVzY2F0aW9u
IGF0IHJhZGlvIGxheWVyIGlzIG5vdCBpbiBvdXIgc2NvcGUgKGl04oCZcyAzR1BQIHN0dWZmKSBh
bmQgdGhleSBkZWZpbmVkIOKAmHNvbWUgcHJvdmlzaW9uc+KAmSBhcyB5b3Ugc3RhdGVkIGFib3Zl
LiBCdXQgd2UgYXJlIHRhbGtpbmcgYWJvdXQgb2JmdXNjYXRpb24gZ2VuZXJpY2FsbHkgdGhvdWdo
IHZhcmlvdXMgSUQvTE9DIHByb3RvY29scyBpbiB0aGUgaW50ZXJuZXQgYW5kIGJleW9uZCBtYW5h
Z2VkIHRyYW5zcG9ydCBuZXR3b3JrIGluIDNHUFAuDQoNCg0KDQo+QW55d2F5LCBpZiB0aGlzIGlz
IHJlYWxseSBuZWVkZWQsIEkgc3VnZ2VzdCB0aGF0IGl0IGlzIGRlZmluZWQgdG8gYmUgYW4gb2Jm
dXNjYXRpb24gbGF5ZXIgc2VwYXJhdGUgZnJvbSBpZC9sb2MuIEFuZCBpdCBzaG91bGQgYmUgb3B0
aW9uYWwgYW5kIHVzYWJsZSBvdXRzaWRlIG9mIGlkL2xvYyBhcyB3ZWxsLg0KDQoNCg0KSSBzZWUg
b2JmdXNjYXRpb24gcHJvdmlkZWQgdGhyb3VnaCBJZGVudGl0eSBhbmQgdGhpcyBpcyBpbmRlZWQg
c2VwYXJhdGUgbGF5ZXIgKGFib3ZlIElkZW50aWZpZXItbG9jYXRpb24gbWFwcGluZykgIGF0IHRo
ZSBtYXBwaW5nIHN5c3RlbSwgd2hlcmUgSWRlbnRpdHkgdG8gSWRlbnRpZmllcnMgY2FuIGJlIG1h
cHBlZCB3aXRoIGNlcnRhaW4gcG9saWNpZXMgYXNzb2NpYXRlZCB0byBJZGVudGl0eS4NCg0KSU1P
LCB0aGlzIGhhcyBsb3Qgb2YgcG90ZW50aWFsIGZvciBwcm92aWRlcnMgdG8gYnJpbmcgaW4gbmV3
IHJldmVudWVzIChvZiBjb3Vyc2UgaWYgaXQgaXMgZG9uZSBjb3JyZWN0KS4NCg0KLS0NCg0KVW1h
IEMuDQoNCkZyb206IElkZWFzIFttYWlsdG86aWRlYXMtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVo
YWxmIE9mIFBhZG1hIFBpbGxheS1Fc25hdWx0DQpTZW50OiBTdW5kYXksIEp1bmUgMTEsIDIwMTcg
ODozOCBQTQ0KVG86IFRvbSBIZXJiZXJ0IDx0b21AaGVyYmVydGxhbmQuY29tPg0KQ2M6IGlkZWFz
QGlldGYub3JnOyBNaWNoYWVsIE1lbnRoIDxtZW50aEB1bmktdHVlYmluZ2VuLmRlPg0KU3ViamVj
dDogUmU6IFtJZGVhc10gQk9GIEBJRVRGIDk5IFByZXBhcmF0aW9uIC0gcHJvYmxlbSBzdGF0ZW1l
bnQNCg0KDQpIaSBUb20NCg0KU2VlIEJlbG93IGZvciBteSBjb21tZW50cw0KDQpPbiBTdW4sIEp1
biAxMSwgMjAxNyBhdCA5OjU5IEFNLCBUb20gSGVyYmVydCA8dG9tQGhlcmJlcnRsYW5kLmNvbTxt
YWlsdG86dG9tQGhlcmJlcnRsYW5kLmNvbT4+IHdyb3RlOg0KT24gU3VuLCBKdW4gMTEsIDIwMTcg
YXQgMjoxOSBBTSwgTWljaGFlbCBNZW50aCA8bWVudGhAdW5pLXR1ZWJpbmdlbi5kZTxtYWlsdG86
bWVudGhAdW5pLXR1ZWJpbmdlbi5kZT4+IHdyb3RlOg0KPiBIaSBUb20sDQo+DQo+IHdlIGhhdmUg
YWxyZWFkYXkgTElTUCwgSUxBLCBhbmQgSUxOUCBmb3IgaW1wbGVudGF0aW9uIG9mIExvYy9JRCBz
cGxpdC4NCj4gV2UgaGF2ZSBETlMgYW5kIEREVCBhcyBtYXBwaW5nIHN5c3RlbXMgdXNlZCBpbiB0
aGVzZSBjb250ZXh0cy4NCj4gU28sIHRoZXJlIGlzIGFscmVhZHkgcXVpdGUgc29tZSBzdXBwb3J0
IGZvciBiYXNpYyBMb2MvSUQgc3BsaXQuDQo+DQo+IFdoYXQncyBtaXNzaW5nIGlzIGFuIGFkZXF1
YXRlIHByb3RlY3Rpb24gb2YgSURzIGluIHRoZSBhYm92ZSBtZW50aW9uZWQNCj4gY29udGV4dC4g
V2hlbiBjb21tdW5pY2F0aW5nIHdpdGggYSB1bmlxdWUgSUQsIGNvbW11bmljYXRpb24gYmVjb21l
cw0KPiB0cmFja2FibGUgbGlrZSBpbiB0aGUgZWFybHkgZGF5cyBvZiBJUHY2LiBJUHY2IHByaXZh
Y3kgZXh0ZW5zaW9ucyBzb2x2ZWQNCj4gdGhhdCBwcm9ibGVtLiBCdXQgd2l0aCBJUHY2IHdlIGRv
bid0IGtub3cgd2hvbSB3ZSBhcmUgdGFsa2luZyB0by4gU28NCj4gd2hhdCdzIGRlc2lyYWJsZSBp
cyBhIHBlcm1hbmVudCBJRCBmb3IgYW4gaWRlbnRpdHkgd2hpY2ggY2FuIGJlIG1hcHBlZA0KPiB0
byB2YXJpb3VzIHRlbXBvcmFyeSBJRHMgdGhhdCBhcmUgdXNlZCBmb3IgY29tbXVuaWNhdGlvbi4g
QSBtYXBwaW5nDQo+IHN5c3RlbSBhc3NvY2lhdGVzIGlkZW50aXRpZXMgYW5kIGlkZW50aWZpZXJz
IGJ1dCBjYW4gYmUgcXVlcmllZCBvbmx5IGJ5DQo+IGF1dGhvcml6ZWQgaWRlbnRpZmllcnMuIFRo
YXQgbWVhbnMsIGNvbW11bmljYXRpb24gYmVjb21lcyB0cmFuc3BhcmVudCB0bw0KPiBhdXRob3Jp
emVkIHVzZXJzIHdoaWxlIHByb3RlY3RpbmcgcHJpdmFjeSBhZ2FpbnN0IG90aGVycy4gSG93ZXZl
ciwgd2UNCj4gbmVlZCB0byBleHBsb3JlIGhvdyB0aGVzZSBvYmplY3RpdmVzIGNhbiBiZSBhY2hp
ZXZlZCB3aXRoIGN1cnJlbnQNCj4gcHJvdG9jb2xzIGFuZCB3aGF0IHBpZWNlcyBhbmQgZXh0ZW5z
aW9ucyBhcmUgbWlzc2luZy4NCj4NCg0KTWljaGFlbCwNCg0KSSB0aGluayB3aGF0IHlvdSdyZSBk
ZXNjcmliaW5nIGlzIG1vcmUgYWRkcmVzcyBvYmZ1c2NhdGlvbiB0aGFuIElEL2xvYw0Kc3BsaXQs
IG9yIGluIHRoaXMgY2FzZSBpdCdzIHRoZSBpZGVudGlmaWVyIGJlaW5nIG9iZnVzY2F0ZWQuIFRo
aXMgaXMNCmJlaW5nIGltcGxlbWVudGVkIGluIElQd2F2ZSBmb3IgaW5zdGFuY2UgdG8gbWl0aWdh
dGUgdGhlIHRyYWNraW5nDQpwcm9ibGVtLiBUaGUgbmVlZCBmb3Igb2JmdXNjYXRpb24gaXMgaW5k
ZXBlbmRlbnQgb2YgdGhlIElEL2xvYy4NCkhpIFRvbQ0KDQpPYmZ1c2NhdGlvbiBpcyBqdXN0IGFu
IGFzcGVjdCBvZiB0aGlzLiBUaGlzIGlzIGEgYml0IGRpZmZlcmVudCBmcm9tIHRoZSB2ZWhpY3Vs
YXIgY2FzZS4NCg0KQWRkcmVzcyBvYmZ1c2NhdGlvbiBvbmx5IHdvcmtzIHRvIHRoZSBleHRlbnQg
dGhhdCB0aGVyZSBhcmVuJ3Qgb3RoZXINCm1lYW5zIHRvIHRyYWNrIG5vZGVzLiBGb3IgaW5zdGFu
Y2UsIGV2ZW4gaWYgd2Ugd2VyZSB0byB1c2UgZGlmZmVyZW50DQphZGRyZXNzZXMgZm9yIGVhY2gg
cGFja2V0IG9mIGEgVENQIGNvbm5lY3Rpb24sIHRoZSBjb25uZWN0aW9uIGlzDQp0cml2aWFsIHRv
IHRyYWNrIGJ1dCBqdXN0IGNvcnJlbGF0aW5nIHBvcnQgbnVtYmVycywgc2VxdWVuY2UgYW5kIGFj
aw0KbnVtYmVycyBzZW50IGluIHRoZSBjbGVhci4gVGhlIG9ubHkgd2F5IHRvIGVuc3VyZSBwcml2
YWN5IGlzIGVuY3J5cHQNCmV2ZXJ5dGhpbmcgcG9zc2libGUuDQoNClllcyB0aGlzIGlzIHRydWUg
YnV0IHlvdSB3aWxsIG5lZWQgdG8gZG8gRFBJIGluIHlvdSB3YW50IHRvIGFjdCBub3QgaGlzIHBh
Y2tldC4NCkkgYW0gc3BlY2lmaWNhbGx5IHRoaW5raW5nIG9mIHRoZSBjYXNlIHdoZW4geW91IGhh
dmUgcGFja2V0cyBpbiBmbGlnaHQgYW5kIHlvdSBuZWVkIHRvIGNoYW5nZSB0aGUgbG9jYXRvci4N
CklmIHlvdSB3YW50IHRvIGF2b2lkIGFuY2hvcmluZyBtZWNoYW5pc20gdG8gZG8gdGhpcyBhbmQg
YWxsIGlzIGVuY3J5cHRlZCB0aGVuIHlvdSB3aWxsIG5lZWQgdG8gZGVjcnlwdCB0byBiZSBhYmxl
IHRvIGRvIGFueSBwcm9jZXNzaW5nLg0KQW5vdGhlciBleGFtcGxlIHdvdWxkIGJlIElEIGNvbnRl
eHQgYXdhcmVuZXNzIHdoaWNoIGlzIGRpZmZpY3VsdCB0byBhY2hpZXZlIHRvZGF5IGFzIGlzIGFu
ZCBldmVuIG1vcmUgc28gaWYgd2Ugc3RhcnQgdXNpbmcgYW5vbiBpZGVudGlmaWVycyB0aGF0IGNo
YW5nZSBhbGwgdGhlIHRpbWUgLi4uDQoNCkluIElMQSBkZXBsb3ltZW50LCB0aGUgaW50ZW50IGlz
IHRoYXQgcHJvdG9jb2wgaXMgbm90IHZpc2libGUgdG8NCnB1YmxpYyBuZXR3b3Jrcy4gRm9yIGlu
c3RhbmNlLCBpbiBhIGNhcnJpZXIgbmV0d29yayBJTEEgd291bGQgb25seSBiZQ0KdXNlZCBpbiB0
aGUgY29yZSAobGlrZSBHVFAgaXMgb25seSBpbiB0aGUgY29yZSB0b2RheSkuIFRoZSBjYXJyaWVy
DQpuZXR3b3JrIGFscmVhZHkga25vd3MgbG9jYXRpb24gYW55d2F5LCBzbyB3ZSBkb24ndCBhZGRy
ZXNzIG9iZnVzY2F0aW9uDQp0aGVyZS4gRm9yIHBhY2tldHMgZ29pbmcgdG8gdGhlIFVFIChvdmVy
IHJhZGlvIGZvciBpbnN0YW5jZSkgd2UgZG8NCm5lZWQgYWRkcmVzcyBvYmZ1c2NhdGlvbiB0aGVy
ZSBsaWtlIElQd2F2ZSBpcyBkb2luZywgYnV0IGFnYWluIHRoYXQNCmNhbiBiZSBpbmRlcGVuZGVu
dCBvZiBpZC9sb2MuDQoNCkkgdGhpbmsgd2UgYXJlIHRhbGtpbmcgb2YgdHdvIGRpZmZlcmVudCB0
aGluZ3MgaGVyZS4NCg0KWW91IGFyZSByaWdodCBhZGRyZXNzIG9iZnVzY2F0aW9uIGNhbiBiZSBh
Y2hpZXZlZCBieSBtYW55IHdheXMuDQpIb3dldmVyLCBpZiB5b3Ugd2FudCB0byBoYXZlIGFuIGFu
b255bW91cyBJRCBhbmQgeWV0IGhhdmUgc29tZW9uZSB0byBkaXNjb3ZlciB5b3UgYW5kIGluaXRp
YXRlIGNvbW11bmljYXRpb24gd2l0aCB5b3UgdGhlbiB0aGVyZSBoYXMgdG8gYmUgc29tZSByZWxh
dGlvbnNoaXAgYmV0d2VlbiBvbiB3aGF0IHlvdSBjYW4gYmUgbG9va2VkIHVwIGFuZCB0aGUgYWN0
dWFsIGlkIHlvdSB1c2UuDQoNCk9uIHRoZSBvdGhlciBoYW5kIHRoZXJlIGFyZSBvdGhlciBwb3Nz
aWJsZSBmdW5jdGlvbmFsaXRpZXMgdGllZCB0aGUgaWRlbnRpdHkgdGhhdCB3ZSBkbyBub3QgaGF2
ZSB0b2RheSBzdWNoIGFzIGFjY2VzcyBjb250cm9sIG9yIGV2ZW4gcG9saWNpZXMuDQoNCkFueXdh
eSwgaWYgdGhpcyBpcyByZWFsbHkgbmVlZGVkLCBJIHN1Z2dlc3QgdGhhdCBpdCBpcyBkZWZpbmVk
IHRvIGJlDQphbiBvYmZ1c2NhdGlvbiBsYXllciBzZXBhcmF0ZSBmcm9tIGlkL2xvYy4gQW5kIGl0
IHNob3VsZCBiZSBvcHRpb25hbA0KYW5kIHVzYWJsZSBvdXRzaWRlIG9mIGlkL2xvYyBhcyB3ZWxs
Lg0KDQpBYnNvbHV0ZWx5Lg0KVGhlIElkZW50aXR5IFNlcnZpY2VzIGluIHRoZSBmcmFtZXdvcmsg
YXJlIGluIHNlcGFyYXRlIG1vZHVsZXMgZnJvbSBtYXBwaW5nIHJlc29sdXRpb24gc2VydmljZXMu
DQpBcyBwZXIgdGhlIHJlcXVpcmVtZW50cyBkb2N1bWVudCwgZm9yIGludGVyb3BlcmFiaWxpdHkg
dGhlIGlkZW50aXR5IHNlcnZpY2UgbW9kdWxlIGlzIG5vdCBtYW5kYXRvcnkuDQoNCkhvcGUgdGhp
cyBjbGFyaWZpZXMuDQoNClBhZG1hDQoNClRvbQ0KDQo+IFRoYXQgbWVjaGFuaXNtIG1heSBiZSBh
biBlbmFibGVyIGZvciB0cnVlIExvYy9JRCBzcGxpdCBhcyBpdCBhbGxvd3MgdG8NCj4gdXNlIGEg
cGVybWFuZW50IElEIGZvciBpZGVudGl0eSAodGhpbmsgb2YgdXNlciBjb250cmFjdCkgYW5kIGEg
dGVtcG9yYXJ5DQo+IElEIGZvciBlYWNoIGNvbW11bmljYXRpb24sIGZvciBjZXJ0YWluIHRpbWUg
c3BhbnMsIG9yIGRldmljZXMuIFBlcm1hbmVudA0KPiBJRHMgYXJlIG5vdCBhY2NlcHRhYmxlIGZv
ciBwcml2YWN5IGNvbmNlcm5zIGluIG1hbnkgdXNlIGNhc2VzLCBlLmcuLA0KPiBhdXRvbW90aXZl
LiBBcyB0aGUgdGVtcG9yYXJ5IElEIG1heSBiZSBsb29rZWQgdXAgYnkgYSBwcm92aWRlciwgaXQg
bWF5DQo+IGJlIHBvc3NpYmxlIHRvIGFwcGx5IHBlci1pZGVudGl5IHBvbGljaWVzIHRvIHRyYWZm
aWMuIElmIGFuIGlkZW50aWZpZXINCj4gaXMgY29ycnVwdCBvciBnZXRzIGF0dGFja2VkLCBvZiBp
ZiBhIGRldmljZSBnZXRzIGxvc3Qgb3IgaXMgZXhjaGFuZ2VkLA0KPiB0aGUgY29ycmVzcG9uZGlu
ZyBpZGVudGlmaWVyIG1heSBiZSBzdWJzdGl0dXRlZCBieSBhbm90aGVyLg0KPg0KPiBUaGlzIGlz
IHRoZSBmaWx0ZXJlZCByZXN1bHQgb2Ygc2V2ZXJhbCB0ZWxjb3Mgd2l0aCBwcm9wb25lbnRzIG9m
IElERUFTLg0KPiBJdCByZXF1aXJlcyBzb21lIGVmZm9ydCB0byBjbGVhcmx5IG91dGxpbmUgdGhl
IHBvdGVudGlhbCBvZiBJREVBUyBpbg0KPiB2YXJpb3VzIHVzZSBjYXNlcyBhcyB3ZSdyZSBsb29r
aW5nIHJlYWxseSBiZXlvbmQgTG9jL0lEIHNwbGl0Lg0KPg0KPiBCZXN0IHdpc2hlcywNCj4NCj4g
TWljaGFlbA0KPg0KPg0KPiBBbSAxMS4wNi4yMDE3IHVtIDAxOjMxIHNjaHJpZWIgVG9tIEhlcmJl
cnQ6DQo+PiBPbiBTYXQsIEp1biAxMCwgMjAxNyBhdCAxOjMxIEFNLCBNaWNoYWVsIE1lbnRoIDxt
ZW50aEB1bmktdHVlYmluZ2VuLmRlPG1haWx0bzptZW50aEB1bmktdHVlYmluZ2VuLmRlPj4gd3Jv
dGU6DQo+Pj4gRGVhciBQYWRtYSwgYWxsLA0KPj4+DQo+Pj4gSSd2ZSB0cmllZCB0byBjb25kZW5z
ZSB0aGUgZXNzZW5jZSBvZiB3aGF0IEkgcGVyY2VpdmVkIGZyb20gbXVsdGlwbGUNCj4+PiBJREVB
UyBicmFpbnN0b3JtaW5ncywgZG9jdW1lbnRzLCBhbmQgZW1haWwgZGlzY3Vzc2lvbnMuIFRoaXMg
bWF5IGJlIGENCj4+PiBiYXNlIGZvciBhIHByb2JsZW0gc3RhdGVtZW50LiBQbGVhc2UgYWRkIG1p
c3NpbmcgYXNwZWN0cyENCj4+Pg0KPj4+IElEZW50aXR5LUVuQWJsZWQgbmV0d29ya1MgKElERUFT
KSBkZXNjcmliZXMgaG93IGlkZW50aXRpZXMgKElkeXMpLA0KPj4+IGlkZW50aWZpZXJzIChJZGZz
KSwgYW5kIGxvY2F0b3JzIG1heSBiZSB1c2VkIGZvciBmdXR1cmUgY29tbXVuaWNhdGlvbg0KPj4+
IHVzaW5nIGV4aXN0aW5nIHByb3RvY29scy4gTWlzc2luZyBmZWF0dXJlcyBhcmUgaWRlbnRpZmll
ZCBhbmQgYWRkZWQuDQo+Pj4NCj4+PiBBbiBJZHkgaXMgYSBwZXJtYW5lbnQgSUQgKFBJRCkgdG8g
dW5pcXVlbHkgaWRlbnRpZnkgYW4gZW50aXR5LiBUbw0KPj4+IHByb3RlY3QgaXRzIHByaXZhY3ks
IGFuIGVudGl0eSBtYXkgY2hvb3NlIGFkZGl0aW9uYWwgdGVtcG9yYXJ5IElEcw0KPj4+IChUSURz
KSBmb3IgY29tbXVuaWNhdGlvbnMsIHNvLWNhbGxlZCBJZGZzLiBBIG1hcHBpbmcgc3lzdGVtIG1h
cHMgdGhlc2UNCj4+PiBJZGZzIHRvIHRoZWlyIElkeSBzbyB0aGF0IGNvbW11bmljYXRpb24gcGFy
dG5lcnMgbWF5IGxvb2sgdXAgYW4gSWRmJ3MNCj4+PiBJZHkuIFRvIHByZXNlcnZlIGl0cyBwcml2
YWN5LCB0aGUgZW50aXR5IGNvbnRyb2xzIHRoZSBtYXBwaW5nIHN5c3RlbSBhbmQNCj4+PiBtYXkg
cmVzdHJpY3QgYWNjZXNzIHRvIGl0IGZvciBjZXJ0YWluIElkZnMgb3IgSWR5cy4NCj4+Pg0KPj4g
SGkgTWljaGFlbCwNCj4+DQo+PiBJJ20gbm90IGZvbGxvd2luZyB3ZSBuZWVkIHRvIGhhdmUgYm90
aCBpZGVudGl0aWVzIGFuZCBpZGVudGlmaWVycyBub3INCj4+IHdoYXQgdGhlIG9wZXJhdGlvbmFs
IGRpZmZlcmVuY2Ugd291bGQgYmUuIFRoaXMgc2VlbXMgbGlrZSBhIGxvdCBvZg0KPj4gY29tcGxl
eGl0eSB0byBtZS4NCj4+DQo+PiBJbiBJTEEgZm9yIGluc3RhbmNlLCB0aGVyZSBhcmUganVzdCBp
ZGVudGlmaWVycyBhbmQgbG9jYXRvcnMuIFRoZQ0KPj4gbWFuYWdlbWVudCBwbGFuZSBjcmVhdGVz
IGlkZW50aWZpZXJzIG9uIHJlcXVlc3QgKGV2ZXJ5IHRhc2sgZ2V0cyBhDQo+PiB1bmlxdWUgaWRl
bnRpZmllciBmb3IgaW5zdGFuY2UpLiBUaGUgbWFwcGluZyBzeXN0ZW0gbWFwcyBpZGVudGlmaWVy
cw0KPj4gdG8gbG9jYXRvcnMuIElkZW50aWZpZXJzIGlkZW50aWZ5IHNvbWV0aGluZyBidXQgd2Ug
cmVhbGx5IGRvbid0IGNhcmUNCj4+IHdoYXQgdGhleSBpZGVudGlmeS4gVGhlIHNhbWUgb2JqZWN0
IGNvdWxkIGJlIGFzc2lnbmVkIG11bHRpcGxlDQo+PiBpZGVudGlmaWVycyBmb3IgcHJpdmFjeSBh
cyB5b3UgZGVzY3JpYmUgYmVsb3csIGJ1dCB0aGUgbWFwcGluZyBzeXN0ZW0NCj4+IHNob3VsZG4n
dCBjYXJlIGFib3V0IHRoYXQuIElkZW50aWZpZXJzIGNhbiBiZSByZWdpc3RlcmVkIGluIHRoZQ0K
Pj4gbWFwcGluZyBzeXN0ZW0sIGFuZCB0aGVuIHVucmVnaXN0ZXJlZCB3aGVuIHRoZXkgYXJlIG5v
IGxvbmdlciB1c2VkLS0NCj4+IHNvIHRoZXJlJ3Mgbm8gY29uY2VwdCBvZiBwZXJtYW5lbnQgb3Ig
dGVtcG9yYXJ5IGlkZW50aWZpZXJzLg0KPj4gVW5pcXVlbmVzcyBvZiBpZGVudGlmaWVycyBpcyBh
IGtleSBhdHRyaWJ1dGUuIEZvciBzZWN1cml0eSwgd2UgbmVlZA0KPj4gdGlnaHQgY29udHJvbCBv
dmVyIHdobyBjYW4gbW9kaWZ5IHRoZSBtYXBwaW5ncyBhbmQgd2hvJ3MgYWxsb3dlZCB0bw0KPj4g
cXVlcnkuDQo+Pg0KPj4gQ2FuIHlvdSBtYXliZSBlbGFib3JhdGUgb24gaG93IGlkZW50aXRpZXMg
d291bGQgbWFrZSB0aGluZ3MgYmV0dGVyIGluDQo+PiB0aGUgc2NlbmFyaW8gSSBkZXNjcmliZWQ/
DQo+Pg0KPj4gVG9tDQo+Pg0KPj4+IEJvdGggSWR5cyBhbmQgcHJlZmVyZW50aWFsbHkgSWRmcyBt
YXkgYmUgdXNlZCBmb3IgY29tbXVuaWNhdGlvbi4gVGhleQ0KPj4+IGlkZW50aWZ5IHRoZSBjb21t
dW5pY2F0aW9uIHBhcnRuZXIgYnV0IG5vdCBoZXIgbG9jYXRpb24gb24gdGhlIEludGVybmV0Lg0K
Pj4+IFRvIGRlbm90ZSB0aGUgbG9jYXRpb24gb2YgYW4gZW50aXR5LCBvbmUgb3IgbW9yZSBsb2Nh
dG9ycyBhcmUgbmVlZGVkDQo+Pj4gdGhhdCBkZXNjcmliZSBob3cgdGhlIElkeS9JZGYgY2FuIGJl
IHJlYWNoZWQuIEEgbWFwcGluZyBzeXN0ZW0gYWxsb3dzIHRvDQo+Pj4gbG9vayB1cCB0aGUgbG9j
YXRvcnMgc28gdGhhdCB0cmFmZmljIGNhbiBiZSBzZW50IHRvIHRoZSBJZHkvSWRmLiBUaGlzIGlz
DQo+Pj4gdGhlIHdlbGwta25vd24gTG9jL0lEIHNwbGl0IHByb3ZpZGluZyBiZW5lZml0cyBzdWNo
IGFzIGltcHJvdmVkIG1vYmlsaXR5DQo+Pj4gKGUuZy4gZm9yIFZNcyBpbiBhIGRhdGFjZW50ZXIp
LCBJbnRlcm5ldC1zY2FsZSBTRE4sIGltcHJvdmVkIHRyYWZmaWMNCj4+PiBlbmdpbmVlcmluZyBh
bmQgb3RoZXIgZmxleGliaWxpdHkgYXNwZWN0cy4NCj4+Pg0KPj4+IFRoZSBhZHZhbnRhZ2Ugb2Yg
dGhhdCBzeXN0ZW0gaXMgdGhhdCBlbnRpdGllcyBtYXkgdXNlIElkZnMgZm9yDQo+Pj4gY29tbXVu
aWNhdGlvbiB0byBiZXR0ZXIgcHJvdGVjdCB0aGVpciBJZHkuIE9ubHkgYXV0aG9yaXplZCBjb21t
dW5pY2F0aW9uDQo+Pj4gcGFydG5lcnMgY2FuIGZpbmQgb3V0IHRoZSBjb3JyZXNwb25kaW5nIElk
eXMgYmVoaW5kLiBFbnRpdGllcyBjYW4gYXZvaWQNCj4+PiBiZWluZyB0cmFja2VkIG9uIHRoZSBJ
bnRlcm5ldCBieSB1c2luZyBtdWx0aXBsZSBJZGZzIG9yIGJ5IHJlZ3VsYXJseQ0KPj4+IGNoYW5n
aW5nIElkZnMuIFRoZSBjb250cm9sIG9mIHRoZSBJZHkvSWRmIG1hcHBpbmdzIGNhbiByZXN0cmlj
dCBhY2Nlc3MNCj4+PiB0byBzZWxlY3RlZCByZXF1ZXN0aW5nIElkeXMvSWRmcyBhbmQgYWxzbyBs
aW1pdCB0aGF0IGFjY2VzcyBvdmVyIHRpbWUgdG8NCj4+PiBpbXBsZW1lbnQgYSByaWdodCB0byBi
ZSBmb3Jnb3R0ZW4uDQo+Pj4NCj4+PiBUaGUgY29uY2VwdCBpbXByb3ZlcyB0aGUgY3VycmVudCBM
SVNQIHByb3RvY29sIGJ5IGFkZGluZyBwcml2YWN5IGluDQo+Pj4gY29tbXVuaWNhdGlvbiBpbiBh
IHNpbWlsYXIgd2F5IGFzIElQdjYgcHJpdmFjeSBleHRlbnNpb24gYXZvaWQgYmVpbmcNCj4+PiB0
cmFja2VkIGJ5IGEgc3RhYmxlIE1BQyBhZGRyZXNzLiBUbyB0aGF0IGVuZCwgYWNjZXNzIHJlc3Ry
aWN0aW9uIGlzDQo+Pj4gbmVlZGVkIGZvciBtYXBwaW5nIHN5c3RlbSByZXF1ZXN0cyB3aGljaCBh
bHNvIG5lZWQgdG8gYmUgZW5jcnlwdGVkIHRvDQo+Pj4gYXZvaWQgZWF2ZXNkcm9wcGluZy4gVGhl
cmVmb3JlLCBhIG1ham9yIHByb3RvY29sIGRlZmluaXRpb24gZWZmb3J0IGlzDQo+Pj4gbmVlZGVk
IGZvciB0aGUgbWFwcGluZyBzeXN0ZW0gdGhhdCBwcm92aWRlcyB0aGUgSWRmL0lkeSBtYXBwaW5n
LiBPdGhlcg0KPj4+IGFzcGVjdHMgb2YgdGhpcyBjb25jZXB0IGNhbiBiZSBhc3NlbWJsZWQgZnJv
bSBleGlzdGluZyBwaWVjZXMgYnV0IHNob3VsZA0KPj4+IGJlIGJyb3VnaHQgdG9nZXRoZXIgaW4g
YSByZWNvbW1lbmRlZCBmYXNoaW9uLg0KPj4+DQo+Pg0KPj4+IE1pY2hhZWwNCj4+Pg0KPj4+IC0t
DQo+Pj4gUHJvZi4gRHIuIGhhYmlsLiBNaWNoYWVsIE1lbnRoDQo+Pj4gVW5pdmVyc2l0eSBvZiBU
dWViaW5nZW4NCj4+PiBGYWN1bHR5IG9mIFNjaWVuY2UNCj4+PiBEZXBhcnRtZW50IG9mIENvbXB1
dGVyIFNjaWVuY2UNCj4+PiBDaGFpciBvZiBDb21tdW5pY2F0aW9uIE5ldHdvcmtzDQo+Pj4gU2Fu
ZCAxMywgNzIwNzYgVHVlYmluZ2VuLCBHZXJtYW55DQo+Pj4gcGhvbmU6ICgrNDkpLTcwNzEvMjkt
NzA1MDU8dGVsOiUyOCUyQjQ5JTI5LTcwNzElMkYyOS03MDUwNT4NCj4+PiBmYXg6ICgrNDkpLTcw
NzEvMjktNTIyMDx0ZWw6JTI4JTJCNDklMjktNzA3MSUyRjI5LTUyMjA+DQo+Pj4gbWFpbHRvOm1l
bnRoQHVuaS10dWViaW5nZW4uZGU8bWFpbHRvOm1lbnRoQHVuaS10dWViaW5nZW4uZGU+DQo+Pj4g
aHR0cDovL2tuLmluZi51bmktdHVlYmluZ2VuLmRlDQo+Pj4NCj4+PiBfX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPj4+IElkZWFzIG1haWxpbmcgbGlzdA0K
Pj4+IElkZWFzQGlldGYub3JnPG1haWx0bzpJZGVhc0BpZXRmLm9yZz4NCj4+PiBodHRwczovL3d3
dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2lkZWFzDQo+Pg0KPj4gX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4+IElkZWFzIG1haWxpbmcgbGlzdA0K
Pj4gSWRlYXNAaWV0Zi5vcmc8bWFpbHRvOklkZWFzQGlldGYub3JnPg0KPj4gaHR0cHM6Ly93d3cu
aWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9pZGVhcw0KPj4NCj4NCj4gLS0NCj4gUHJvZi4gRHIu
IGhhYmlsLiBNaWNoYWVsIE1lbnRoDQo+IFVuaXZlcnNpdHkgb2YgVHVlYmluZ2VuDQo+IEZhY3Vs
dHkgb2YgU2NpZW5jZQ0KPiBEZXBhcnRtZW50IG9mIENvbXB1dGVyIFNjaWVuY2UNCj4gQ2hhaXIg
b2YgQ29tbXVuaWNhdGlvbiBOZXR3b3Jrcw0KPiBTYW5kIDEzLCA3MjA3NiBUdWViaW5nZW4sIEdl
cm1hbnkNCj4gcGhvbmU6ICgrNDkpLTcwNzEvMjktNzA1MDU8dGVsOiUyOCUyQjQ5JTI5LTcwNzEl
MkYyOS03MDUwNT4NCj4gZmF4OiAoKzQ5KS03MDcxLzI5LTUyMjA8dGVsOiUyOCUyQjQ5JTI5LTcw
NzElMkYyOS01MjIwPg0KPiBtYWlsdG86bWVudGhAdW5pLXR1ZWJpbmdlbi5kZTxtYWlsdG86bWVu
dGhAdW5pLXR1ZWJpbmdlbi5kZT4NCj4gaHR0cDovL2tuLmluZi51bmktdHVlYmluZ2VuLmRlDQoN
Cg==

--_000_25B4902B1192E84696414485F5726854018CEBAASJCEML703CHMchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_25B4902B1192E84696414485F5726854018CEBAASJCEML703CHMchi_--



From nobody Mon Jun 12 12:28:12 2017
Return-Path: <alexander.clemm@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCA821270A3 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 12:28:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level: 
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2nirMOXMSjPg for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 12:28:07 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B21D126E3A for <ideas@ietf.org>; Mon, 12 Jun 2017 12:28:06 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml708-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DIJ50500; Mon, 12 Jun 2017 19:28:02 +0000 (GMT)
Received: from SJCEML701-CHM.china.huawei.com (10.208.112.40) by lhreml708-cah.china.huawei.com (10.201.108.49) with Microsoft SMTP Server (TLS) id 14.3.301.0; Mon, 12 Jun 2017 20:28:00 +0100
Received: from SJCEML703-CHM.china.huawei.com ([169.254.5.102]) by SJCEML701-CHM.china.huawei.com ([169.254.3.162]) with mapi id 14.03.0301.000;  Mon, 12 Jun 2017 12:27:56 -0700
From: Alexander Clemm <alexander.clemm@huawei.com>
To: Tom Herbert <tom@herbertland.com>, Michael Menth <menth@uni-tuebingen.de>
CC: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>
Thread-Topic: [Ideas] BOF @IETF 99 Preparation - problem statement
Thread-Index: AQHS4cQUMK5vDu+/jkOVvgl6VpgKwqIfNT4AgACkN4CAAICQgIABRPZg
Date: Mon, 12 Jun 2017 19:27:55 +0000
Message-ID: <644DA50AFA8C314EA9BDDAC83BD38A2E0DFBD09B@SJCEML703-CHM.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com>
In-Reply-To: <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.213.48.96]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.593EEB44.00FF, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.5.102, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 06ed1da8402859dd023d3530cbaf7c4a
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/a6x6YQTOfWFshpq5rTDJ_vQvwOo>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 19:28:10 -0000

Hi Michael, I agree with your summary, which I think is very crisp. =20

Hi Tom, obfuscation is one aspect, but I do think there is a little more th=
an that because you don't want to just obfuscate, you also want aspects lik=
e metadata and policy to still work.  In other words, the overall picture i=
s more differentiated - while you want to obfuscate identifiers to the outs=
ide, but you don't necessarily want your identity to be obfuscated.  With p=
ure obfuscation of identifiers, you would lose all that.  =20

--- Alex

-----Original Message-----
From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Tom Herbert
Sent: Sunday, June 11, 2017 10:00 AM
To: Michael Menth <menth@uni-tuebingen.de>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>; ideas@ietf.org
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement

On Sun, Jun 11, 2017 at 2:19 AM, Michael Menth <menth@uni-tuebingen.de> wro=
te:
> Hi Tom,
>
> we have alreaday LISP, ILA, and ILNP for implentation of Loc/ID split.
> We have DNS and DDT as mapping systems used in these contexts.
> So, there is already quite some support for basic Loc/ID split.
>
> What's missing is an adequate protection of IDs in the above mentioned=20
> context. When communicating with a unique ID, communication becomes=20
> trackable like in the early days of IPv6. IPv6 privacy extensions=20
> solved that problem. But with IPv6 we don't know whom we are talking=20
> to. So what's desirable is a permanent ID for an identity which can be=20
> mapped to various temporary IDs that are used for communication. A=20
> mapping system associates identities and identifiers but can be=20
> queried only by authorized identifiers. That means, communication=20
> becomes transparent to authorized users while protecting privacy=20
> against others. However, we need to explore how these objectives can=20
> be achieved with current protocols and what pieces and extensions are mis=
sing.
>

Michael,

I think what you're describing is more address obfuscation than ID/loc spli=
t, or in this case it's the identifier being obfuscated. This is being impl=
emented in IPwave for instance to mitigate the tracking problem. The need f=
or obfuscation is independent of the ID/loc.

Address obfuscation only works to the extent that there aren't other means =
to track nodes. For instance, even if we were to use different addresses fo=
r each packet of a TCP connection, the connection is trivial to track but j=
ust correlating port numbers, sequence and ack numbers sent in the clear. T=
he only way to ensure privacy is encrypt everything possible.

In ILA deployment, the intent is that protocol is not visible to public net=
works. For instance, in a carrier network ILA would only be used in the cor=
e (like GTP is only in the core today). The carrier network already knows l=
ocation anyway, so we don't address obfuscation there. For packets going to=
 the UE (over radio for instance) we do need address obfuscation there like=
 IPwave is doing, but again that can be independent of id/loc.

Anyway, if this is really needed, I suggest that it is defined to be an obf=
uscation layer separate from id/loc. And it should be optional and usable o=
utside of id/loc as well.

Tom

> That mechanism may be an enabler for true Loc/ID split as it allows to=20
> use a permanent ID for identity (think of user contract) and a=20
> temporary ID for each communication, for certain time spans, or=20
> devices. Permanent IDs are not acceptable for privacy concerns in many=20
> use cases, e.g., automotive. As the temporary ID may be looked up by a=20
> provider, it may be possible to apply per-identiy policies to traffic.=20
> If an identifier is corrupt or gets attacked, of if a device gets lost=20
> or is exchanged, the corresponding identifier may be substituted by anoth=
er.
>
> This is the filtered result of several telcos with proponents of IDEAS.
> It requires some effort to clearly outline the potential of IDEAS in=20
> various use cases as we're looking really beyond Loc/ID split.
>
> Best wishes,
>
> Michael
>
>
> Am 11.06.2017 um 01:31 schrieb Tom Herbert:
>> On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de> =
wrote:
>>> Dear Padma, all,
>>>
>>> I've tried to condense the essence of what I perceived from multiple=20
>>> IDEAS brainstormings, documents, and email discussions. This may be=20
>>> a base for a problem statement. Please add missing aspects!
>>>
>>> IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),=20
>>> identifiers (Idfs), and locators may be used for future=20
>>> communication using existing protocols. Missing features are identified=
 and added.
>>>
>>> An Idy is a permanent ID (PID) to uniquely identify an entity. To=20
>>> protect its privacy, an entity may choose additional temporary IDs
>>> (TIDs) for communications, so-called Idfs. A mapping system maps=20
>>> these Idfs to their Idy so that communication partners may look up=20
>>> an Idf's Idy. To preserve its privacy, the entity controls the=20
>>> mapping system and may restrict access to it for certain Idfs or Idys.
>>>
>> Hi Michael,
>>
>> I'm not following we need to have both identities and identifiers nor=20
>> what the operational difference would be. This seems like a lot of=20
>> complexity to me.
>>
>> In ILA for instance, there are just identifiers and locators. The=20
>> management plane creates identifiers on request (every task gets a=20
>> unique identifier for instance). The mapping system maps identifiers=20
>> to locators. Identifiers identify something but we really don't care=20
>> what they identify. The same object could be assigned multiple=20
>> identifiers for privacy as you describe below, but the mapping system=20
>> shouldn't care about that. Identifiers can be registered in the=20
>> mapping system, and then unregistered when they are no longer used--=20
>> so there's no concept of permanent or temporary identifiers.
>> Uniqueness of identifiers is a key attribute. For security, we need=20
>> tight control over who can modify the mappings and who's allowed to=20
>> query.
>>
>> Can you maybe elaborate on how identities would make things better in=20
>> the scenario I described?
>>
>> Tom
>>
>>> Both Idys and preferentially Idfs may be used for communication.=20
>>> They identify the communication partner but not her location on the Int=
ernet.
>>> To denote the location of an entity, one or more locators are needed=20
>>> that describe how the Idy/Idf can be reached. A mapping system=20
>>> allows to look up the locators so that traffic can be sent to the=20
>>> Idy/Idf. This is the well-known Loc/ID split providing benefits such=20
>>> as improved mobility (e.g. for VMs in a datacenter), Internet-scale=20
>>> SDN, improved traffic engineering and other flexibility aspects.
>>>
>>> The advantage of that system is that entities may use Idfs for=20
>>> communication to better protect their Idy. Only authorized=20
>>> communication partners can find out the corresponding Idys behind.=20
>>> Entities can avoid being tracked on the Internet by using multiple=20
>>> Idfs or by regularly changing Idfs. The control of the Idy/Idf=20
>>> mappings can restrict access to selected requesting Idys/Idfs and=20
>>> also limit that access over time to implement a right to be forgotten.
>>>
>>> The concept improves the current LISP protocol by adding privacy in=20
>>> communication in a similar way as IPv6 privacy extension avoid being=20
>>> tracked by a stable MAC address. To that end, access restriction is=20
>>> needed for mapping system requests which also need to be encrypted=20
>>> to avoid eavesdropping. Therefore, a major protocol definition=20
>>> effort is needed for the mapping system that provides the Idf/Idy=20
>>> mapping. Other aspects of this concept can be assembled from=20
>>> existing pieces but should be brought together in a recommended fashion=
.
>>>
>>
>>> Michael
>>>
>>> --
>>> Prof. Dr. habil. Michael Menth
>>> University of Tuebingen
>>> Faculty of Science
>>> Department of Computer Science
>>> Chair of Communication Networks
>>> Sand 13, 72076 Tuebingen, Germany
>>> phone: (+49)-7071/29-70505
>>> fax: (+49)-7071/29-5220
>>> mailto:menth@uni-tuebingen.de
>>> http://kn.inf.uni-tuebingen.de
>>>
>>> _______________________________________________
>>> Ideas mailing list
>>> Ideas@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ideas
>>
>> _______________________________________________
>> Ideas mailing list
>> Ideas@ietf.org
>> https://www.ietf.org/mailman/listinfo/ideas
>>
>
> --
> Prof. Dr. habil. Michael Menth
> University of Tuebingen
> Faculty of Science
> Department of Computer Science
> Chair of Communication Networks
> Sand 13, 72076 Tuebingen, Germany
> phone: (+49)-7071/29-70505
> fax: (+49)-7071/29-5220
> mailto:menth@uni-tuebingen.de
> http://kn.inf.uni-tuebingen.de

_______________________________________________
Ideas mailing list
Ideas@ietf.org
https://www.ietf.org/mailman/listinfo/ideas


From nobody Mon Jun 12 13:40:05 2017
Return-Path: <tom@herbertland.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8F13129AA0 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 13:40:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mtOvsMnY3ojy for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 13:40:00 -0700 (PDT)
Received: from mail-wr0-x242.google.com (mail-wr0-x242.google.com [IPv6:2a00:1450:400c:c0c::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED7F31293E8 for <ideas@ietf.org>; Mon, 12 Jun 2017 13:39:59 -0700 (PDT)
Received: by mail-wr0-x242.google.com with SMTP id g76so24662018wrd.2 for <ideas@ietf.org>; Mon, 12 Jun 2017 13:39:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=yZPyjr6M2N3KqO+1W0xic6LInAX/YFv16hGVJEVpzlI=; b=wVlgADQ+74TQSCczkkXxFTTewDNIi5k1ZsxZ8vZMfuagI7qK8scA2tLm+apFwrvtBN vNRHIMRndeXpioHmCPyzbccW5AyhhPs67xZAVMCYIzan4+jnQ7KAolIEElSMiW33WvTr 8m+gfnUhPLElW/PwCJQTDU5ii1a/3deGDrQoXoJKk2b5iFv65txIswzN1Vxxk6exCEBs jfeGA5HYLVAiD7NzX0ZOVkKD+gEX+A0z2nsfIiIe+Sk0O/Dlfxp0NhpWkAE/4ZCsXUkQ OnJ93qD9lqWQJoJKAC+tHuKkAXxoMvanUIap24Eh8jxteePiLz/A+QT6/bg3RAsjjJOO ZQNQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=yZPyjr6M2N3KqO+1W0xic6LInAX/YFv16hGVJEVpzlI=; b=TUvLkreWcrhtu7wCgwjsfGLBY301Hfdz7cr7lUEJVO9t9kjO1X0OvUA6O3a8QufDkb u7smWuAkmfi3s5hFi20oWouA9qaeZUJHHS4pDJqlxwTKyEiazGvBQB1mNy6CxdT2J5Dx NVJE/d1ZP/asF5gbne/TO4/PgDUtiCVVnHRtNKizLs0oFVInmF2STOux/rXnXAISLisA uMvpV7IsqXV5KIy4MwDauqOrBVRlIji/MlX25xDLDNN+p3rUkJ81/pHvsPHXCuzjs/mH Doweuo89UhlZoNTuvbSSlTJx2MFmFUXyk/7w661I5R+lDEtuPhp+GS9BHqkYLFCR/+w6 9nZA==
X-Gm-Message-State: AKS2vOyIjKz4Nymuz3kvJkNfFGy+7pU+zikwbfh6a/AkKMYZ/8XNxD1d doec+BYOH2BAGUx03wU9MyUVW04ypae+
X-Received: by 10.223.183.32 with SMTP id l32mr427671wre.115.1497299998022; Mon, 12 Jun 2017 13:39:58 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.128.2 with HTTP; Mon, 12 Jun 2017 13:39:57 -0700 (PDT)
In-Reply-To: <25B4902B1192E84696414485F5726854018CEBAA@SJCEML703-CHM.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com> <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEBAA@SJCEML703-CHM.china.huawei.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 12 Jun 2017 13:39:57 -0700
Message-ID: <CALx6S37eXXCXCBgTJVvNaJW-BmSNAkaez_S2+zFzB3qtuuyydg@mail.gmail.com>
To: Uma Chunduri <uma.chunduri@huawei.com>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>, Michael Menth <menth@uni-tuebingen.de>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/NKsUOklJRaNWEaTe-ZfSpcFhdag>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 20:40:04 -0000

On Mon, Jun 12, 2017 at 12:19 PM, Uma Chunduri <uma.chunduri@huawei.com> wr=
ote:
> Hi Tom,
>
>
>
> Just want to add 2 specific points on top of what Padma said below =E2=80=
=93
>
>
>
>>I think what you're describing is more address obfuscation than ID/loc
>> split, or in this case it's the identifier being obfuscated. This is bei=
ng
>> implemented in IPwave for instance to mitigate the tracking problem. The
>> need for obfuscation is independent of the ID/loc.
>
>>Address obfuscation only works to the extent that there aren't other mean=
s
>> to track nodes. For instance, even if we were to use different addresses=
 for
>> each packet of a TCP connection, the connection is trivial to track but =
just
>> correlating port numbers,
>
>>sequence and ack numbers sent in the clear. The only way to ensure privac=
y
>> is encrypt everything possible.
>
>
>
> Encryption for obfuscation of identifiers is a too much of a stretch.
> Encryption has its own place and I see it is orthogonal to Identifier
> obfuscation. While in an unencrypted and  obfuscated identifiers, one can
> see some aspects of TCP connection, what cannot be done by the eavesdropp=
er
> is identifying 2 independent  communications related to a particular enti=
ty.
> I see this is truly  network layer anonymous communication, if we have th=
e
> ability to change communication identifiers at will (while maintaining th=
e
> same identifier for entire session for mobility reasons).
>
> To achieve this a manageable entity called =E2=80=98Identity=E2=80=99 for=
 an entity at a
> central place is needed,  where mapping and other identity related servic=
es
> can be provided  as hinted in GRIDS-REQs document.
>
Uma,

I understand the intent, but I am still dubious 'Identity' is actually
required and should be in the core architecture for IDEAS. This is not
a concept in any of the identifier locator protocols. Also, a host can
obfuscate addresses today just by choosing a different address from
the block they are assigned for each communication. In id/loc the same
affect could accomplished by the host getting however many identifiers
it needs to use.

>
>
>
>
>>In ILA deployment, the intent is that protocol is not visible to public
>> networks. For instance, in a carrier network ILA would only be used in t=
he
>> core (like GTP is only in the core today). The carrier network already k=
nows
>> location anyway, so we don't address obfuscation there. For packets goin=
g to
>> the UE (over radio for
>
>>instance) we do need address obfuscation there like IPwave is doing, but
>> again that can be independent of id/loc.
>
>
>
> Obfuscation at radio layer is not in our scope (it=E2=80=99s 3GPP stuff) =
and they
> defined =E2=80=98some provisions=E2=80=99 as you stated above. But we are=
 talking about
> obfuscation generically though various ID/LOC protocols in the internet a=
nd
> beyond managed transport network in 3GPP.
>
>
>
>>Anyway, if this is really needed, I suggest that it is defined to be an
>> obfuscation layer separate from id/loc. And it should be optional and us=
able
>> outside of id/loc as well.
>
>
>
> I see obfuscation provided through Identity and this is indeed separate
> layer (above Identifier-location mapping)  at the mapping system, where
> Identity to Identifiers can be mapped with certain policies associated to
> Identity.
>
> IMO, this has lot of potential for providers to bring in new revenues (of
> course if it is done correct).
>
That's a poor rationalization for creating a new complex protocol.

Tom

> --
>
> Uma C.
>
>
>
> From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Padma
> Pillay-Esnault
> Sent: Sunday, June 11, 2017 8:38 PM
> To: Tom Herbert <tom@herbertland.com>
> Cc: ideas@ietf.org; Michael Menth <menth@uni-tuebingen.de>
> Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
>
>
>
>
>
> Hi Tom
>
>
>
> See Below for my comments
>
>
>
> On Sun, Jun 11, 2017 at 9:59 AM, Tom Herbert <tom@herbertland.com> wrote:
>
> On Sun, Jun 11, 2017 at 2:19 AM, Michael Menth <menth@uni-tuebingen.de>
> wrote:
>> Hi Tom,
>>
>> we have alreaday LISP, ILA, and ILNP for implentation of Loc/ID split.
>> We have DNS and DDT as mapping systems used in these contexts.
>> So, there is already quite some support for basic Loc/ID split.
>>
>> What's missing is an adequate protection of IDs in the above mentioned
>> context. When communicating with a unique ID, communication becomes
>> trackable like in the early days of IPv6. IPv6 privacy extensions solved
>> that problem. But with IPv6 we don't know whom we are talking to. So
>> what's desirable is a permanent ID for an identity which can be mapped
>> to various temporary IDs that are used for communication. A mapping
>> system associates identities and identifiers but can be queried only by
>> authorized identifiers. That means, communication becomes transparent to
>> authorized users while protecting privacy against others. However, we
>> need to explore how these objectives can be achieved with current
>> protocols and what pieces and extensions are missing.
>>
>
> Michael,
>
> I think what you're describing is more address obfuscation than ID/loc
> split, or in this case it's the identifier being obfuscated. This is
> being implemented in IPwave for instance to mitigate the tracking
> problem. The need for obfuscation is independent of the ID/loc.
>
> Hi Tom
>
>
>
> Obfuscation is just an aspect of this. This is a bit different from the
> vehicular case.
>
>
>
> Address obfuscation only works to the extent that there aren't other
> means to track nodes. For instance, even if we were to use different
> addresses for each packet of a TCP connection, the connection is
> trivial to track but just correlating port numbers, sequence and ack
> numbers sent in the clear. The only way to ensure privacy is encrypt
> everything possible.
>
>
>
> Yes this is true but you will need to do DPI in you want to act not his
> packet.
>
> I am specifically thinking of the case when you have packets in flight an=
d
> you need to change the locator.
>
> If you want to avoid anchoring mechanism to do this and all is encrypted
> then you will need to decrypt to be able to do any processing.
>
> Another example would be ID context awareness which is difficult to achie=
ve
> today as is and even more so if we start using anon identifiers that chan=
ge
> all the time ...
>
>
>
> In ILA deployment, the intent is that protocol is not visible to
> public networks. For instance, in a carrier network ILA would only be
> used in the core (like GTP is only in the core today). The carrier
> network already knows location anyway, so we don't address obfuscation
> there. For packets going to the UE (over radio for instance) we do
> need address obfuscation there like IPwave is doing, but again that
> can be independent of id/loc.
>
>
>
> I think we are talking of two different things here.
>
>
>
> You are right address obfuscation can be achieved by many ways.
>
> However, if you want to have an anonymous ID and yet have someone to
> discover you and initiate communication with you then there has to be som=
e
> relationship between on what you can be looked up and the actual id you u=
se.
>
>
>
> On the other hand there are other possible functionalities tied the ident=
ity
> that we do not have today such as access control or even policies.
>
>
>
> Anyway, if this is really needed, I suggest that it is defined to be
> an obfuscation layer separate from id/loc. And it should be optional
> and usable outside of id/loc as well.
>
>
>
> Absolutely.
>
> The Identity Services in the framework are in separate modules from mappi=
ng
> resolution services.
>
> As per the requirements document, for interoperability the identity servi=
ce
> module is not mandatory.
>
>
>
> Hope this clarifies.
>
>
>
> Padma
>
>
>
> Tom
>
>
>> That mechanism may be an enabler for true Loc/ID split as it allows to
>> use a permanent ID for identity (think of user contract) and a temporary
>> ID for each communication, for certain time spans, or devices. Permanent
>> IDs are not acceptable for privacy concerns in many use cases, e.g.,
>> automotive. As the temporary ID may be looked up by a provider, it may
>> be possible to apply per-identiy policies to traffic. If an identifier
>> is corrupt or gets attacked, of if a device gets lost or is exchanged,
>> the corresponding identifier may be substituted by another.
>>
>> This is the filtered result of several telcos with proponents of IDEAS.
>> It requires some effort to clearly outline the potential of IDEAS in
>> various use cases as we're looking really beyond Loc/ID split.
>>
>> Best wishes,
>>
>> Michael
>>
>>
>> Am 11.06.2017 um 01:31 schrieb Tom Herbert:
>>> On Sat, Jun 10, 2017 at 1:31 AM, Michael Menth <menth@uni-tuebingen.de>
>>> wrote:
>>>> Dear Padma, all,
>>>>
>>>> I've tried to condense the essence of what I perceived from multiple
>>>> IDEAS brainstormings, documents, and email discussions. This may be a
>>>> base for a problem statement. Please add missing aspects!
>>>>
>>>> IDentity-EnAbled networkS (IDEAS) describes how identities (Idys),
>>>> identifiers (Idfs), and locators may be used for future communication
>>>> using existing protocols. Missing features are identified and added.
>>>>
>>>> An Idy is a permanent ID (PID) to uniquely identify an entity. To
>>>> protect its privacy, an entity may choose additional temporary IDs
>>>> (TIDs) for communications, so-called Idfs. A mapping system maps these
>>>> Idfs to their Idy so that communication partners may look up an Idf's
>>>> Idy. To preserve its privacy, the entity controls the mapping system a=
nd
>>>> may restrict access to it for certain Idfs or Idys.
>>>>
>>> Hi Michael,
>>>
>>> I'm not following we need to have both identities and identifiers nor
>>> what the operational difference would be. This seems like a lot of
>>> complexity to me.
>>>
>>> In ILA for instance, there are just identifiers and locators. The
>>> management plane creates identifiers on request (every task gets a
>>> unique identifier for instance). The mapping system maps identifiers
>>> to locators. Identifiers identify something but we really don't care
>>> what they identify. The same object could be assigned multiple
>>> identifiers for privacy as you describe below, but the mapping system
>>> shouldn't care about that. Identifiers can be registered in the
>>> mapping system, and then unregistered when they are no longer used--
>>> so there's no concept of permanent or temporary identifiers.
>>> Uniqueness of identifiers is a key attribute. For security, we need
>>> tight control over who can modify the mappings and who's allowed to
>>> query.
>>>
>>> Can you maybe elaborate on how identities would make things better in
>>> the scenario I described?
>>>
>>> Tom
>>>
>>>> Both Idys and preferentially Idfs may be used for communication. They
>>>> identify the communication partner but not her location on the Interne=
t.
>>>> To denote the location of an entity, one or more locators are needed
>>>> that describe how the Idy/Idf can be reached. A mapping system allows =
to
>>>> look up the locators so that traffic can be sent to the Idy/Idf. This =
is
>>>> the well-known Loc/ID split providing benefits such as improved mobili=
ty
>>>> (e.g. for VMs in a datacenter), Internet-scale SDN, improved traffic
>>>> engineering and other flexibility aspects.
>>>>
>>>> The advantage of that system is that entities may use Idfs for
>>>> communication to better protect their Idy. Only authorized communicati=
on
>>>> partners can find out the corresponding Idys behind. Entities can avoi=
d
>>>> being tracked on the Internet by using multiple Idfs or by regularly
>>>> changing Idfs. The control of the Idy/Idf mappings can restrict access
>>>> to selected requesting Idys/Idfs and also limit that access over time =
to
>>>> implement a right to be forgotten.
>>>>
>>>> The concept improves the current LISP protocol by adding privacy in
>>>> communication in a similar way as IPv6 privacy extension avoid being
>>>> tracked by a stable MAC address. To that end, access restriction is
>>>> needed for mapping system requests which also need to be encrypted to
>>>> avoid eavesdropping. Therefore, a major protocol definition effort is
>>>> needed for the mapping system that provides the Idf/Idy mapping. Other
>>>> aspects of this concept can be assembled from existing pieces but shou=
ld
>>>> be brought together in a recommended fashion.
>>>>
>>>
>>>> Michael
>>>>
>>>> --
>>>> Prof. Dr. habil. Michael Menth
>>>> University of Tuebingen
>>>> Faculty of Science
>>>> Department of Computer Science
>>>> Chair of Communication Networks
>>>> Sand 13, 72076 Tuebingen, Germany
>>>> phone: (+49)-7071/29-70505
>>>> fax: (+49)-7071/29-5220
>>>> mailto:menth@uni-tuebingen.de
>>>> http://kn.inf.uni-tuebingen.de
>>>>
>>>> _______________________________________________
>>>> Ideas mailing list
>>>> Ideas@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/ideas
>>>
>>> _______________________________________________
>>> Ideas mailing list
>>> Ideas@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ideas
>>>
>>
>> --
>> Prof. Dr. habil. Michael Menth
>> University of Tuebingen
>> Faculty of Science
>> Department of Computer Science
>> Chair of Communication Networks
>> Sand 13, 72076 Tuebingen, Germany
>> phone: (+49)-7071/29-70505
>> fax: (+49)-7071/29-5220
>> mailto:menth@uni-tuebingen.de
>> http://kn.inf.uni-tuebingen.de
>
>


From nobody Mon Jun 12 14:12:30 2017
Return-Path: <uma.chunduri@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66AFB12025C for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 14:12:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level: 
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V5pi85vDtJ_5 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 14:12:28 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A79581296CF for <ideas@ietf.org>; Mon, 12 Jun 2017 14:12:27 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml704-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DIJ58754; Mon, 12 Jun 2017 21:06:03 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.208.112.38) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.301.0; Mon, 12 Jun 2017 22:06:02 +0100
Received: from SJCEML703-CHM.china.huawei.com ([169.254.5.102]) by SJCEML702-CHM.china.huawei.com ([169.254.4.136]) with mapi id 14.03.0301.000;  Mon, 12 Jun 2017 14:05:57 -0700
From: Uma Chunduri <uma.chunduri@huawei.com>
To: Tom Herbert <tom@herbertland.com>
CC: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>, Michael Menth <menth@uni-tuebingen.de>
Thread-Topic: [Ideas] BOF @IETF 99 Preparation - problem statement
Thread-Index: AQHS4cQUtWuhlPu7rEKIIO+qUnKjRKIfNT4AgACkN4CAAICQgIAAsncAgACKwtCAAJKtgP//jZ4A
Date: Mon, 12 Jun 2017 21:05:57 +0000
Message-ID: <25B4902B1192E84696414485F5726854018CEC59@SJCEML703-CHM.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com> <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEBAA@SJCEML703-CHM.china.huawei.com> <CALx6S37eXXCXCBgTJVvNaJW-BmSNAkaez_S2+zFzB3qtuuyydg@mail.gmail.com>
In-Reply-To: <CALx6S37eXXCXCBgTJVvNaJW-BmSNAkaez_S2+zFzB3qtuuyydg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.213.49.152]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.593F023D.0074, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.5.102, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 06ed1da8402859dd023d3530cbaf7c4a
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/Icz3LtwUT43HqZ9YSwlaS45myag>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 21:12:30 -0000
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From nobody Mon Jun 12 18:15:39 2017
Return-Path: <liubingyang@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFEBC129467 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 18:15:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level: 
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e6RLmvmH3dE6 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 18:15:36 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D198128B8D for <ideas@ietf.org>; Mon, 12 Jun 2017 18:15:35 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml709-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DIJ78934; Tue, 13 Jun 2017 01:15:34 +0000 (GMT)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.301.0; Tue, 13 Jun 2017 02:15:32 +0100
Received: from DGGEMI402-HUB.china.huawei.com (10.3.17.135) by NKGEML413-HUB.china.huawei.com (10.98.56.74) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 13 Jun 2017 09:15:18 +0800
Received: from DGGEMI506-MBX.china.huawei.com ([169.254.4.218]) by dggemi402-hub.china.huawei.com ([10.3.17.135]) with mapi id 14.03.0301.000; Tue, 13 Jun 2017 09:15:10 +0800
From: "Liubingyang (Bryan)" <liubingyang@huawei.com>
To: Uma Chunduri <uma.chunduri@huawei.com>, Tom Herbert <tom@herbertland.com>
CC: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>, Michael Menth <menth@uni-tuebingen.de>
Thread-Topic: [Ideas] BOF @IETF 99 Preparation - problem statement
Thread-Index: AQHS4cQR7noYz6KCuk2UPDHXAfzSE6IeOckAgACkN4CAAICQgIAAsncAgAEG4YCAABaOgIAAB0SAgADGNKA=
Date: Tue, 13 Jun 2017 01:15:09 +0000
Message-ID: <C1CE72EE84AF224E94DA21AE134209EE01A02C13@DGGEMI506-MBX.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com> <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEBAA@SJCEML703-CHM.china.huawei.com> <CALx6S37eXXCXCBgTJVvNaJW-BmSNAkaez_S2+zFzB3qtuuyydg@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEC59@SJCEML703-CHM.china.huawei.com>
In-Reply-To: <25B4902B1192E84696414485F5726854018CEC59@SJCEML703-CHM.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.130.168.116]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090203.593F3CB6.0037, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.4.218, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 06ed1da8402859dd023d3530cbaf7c4a
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/gzOyAI9aLNJjjznToYAydryNbY8>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jun 2017 01:15:39 -0000
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=


From nobody Mon Jun 12 22:23:29 2017
Return-Path: <uma.chunduri@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5037F129B33 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 22:23:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level: 
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eBSN0C_tRi61 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 22:23:24 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FD41126CD6 for <ideas@ietf.org>; Mon, 12 Jun 2017 22:23:24 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml704-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DIK03173; Tue, 13 Jun 2017 05:16:59 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.208.112.38) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.301.0; Tue, 13 Jun 2017 06:16:58 +0100
Received: from SJCEML703-CHM.china.huawei.com ([169.254.5.102]) by SJCEML702-CHM.china.huawei.com ([169.254.4.136]) with mapi id 14.03.0301.000;  Mon, 12 Jun 2017 22:16:45 -0700
From: Uma Chunduri <uma.chunduri@huawei.com>
To: "Liubingyang (Bryan)" <liubingyang@huawei.com>, Tom Herbert <tom@herbertland.com>
CC: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>, Michael Menth <menth@uni-tuebingen.de>
Thread-Topic: [Ideas] BOF @IETF 99 Preparation - problem statement
Thread-Index: AQHS4cQUtWuhlPu7rEKIIO+qUnKjRKIfNT4AgACkN4CAAICQgIAAsncAgACKwtCAAJKtgP//jZ4AgAC/RoD//8uv0A==
Date: Tue, 13 Jun 2017 05:16:44 +0000
Message-ID: <25B4902B1192E84696414485F5726854018CFD9B@SJCEML703-CHM.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com> <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEBAA@SJCEML703-CHM.china.huawei.com> <CALx6S37eXXCXCBgTJVvNaJW-BmSNAkaez_S2+zFzB3qtuuyydg@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEC59@SJCEML703-CHM.china.huawei.com> <C1CE72EE84AF224E94DA21AE134209EE01A02C13@DGGEMI506-MBX.china.huawei.com>
In-Reply-To: <C1CE72EE84AF224E94DA21AE134209EE01A02C13@DGGEMI506-MBX.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.212.247.156]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090205.593F754C.004E, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.5.102, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 06ed1da8402859dd023d3530cbaf7c4a
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/PhBMI4rgF2NSl-CzIT1LCGbEyaE>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jun 2017 05:23:27 -0000
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=


From nobody Mon Jun 12 23:10:57 2017
Return-Path: <liubingyang@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1006B129B47 for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 23:10:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level: 
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qZuxheuhELSH for <ideas@ietfa.amsl.com>; Mon, 12 Jun 2017 23:10:52 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0082E129541 for <ideas@ietf.org>; Mon, 12 Jun 2017 23:10:51 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DOZ31779; Tue, 13 Jun 2017 06:10:49 +0000 (GMT)
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.301.0; Tue, 13 Jun 2017 07:10:48 +0100
Received: from DGGEMI404-HUB.china.huawei.com (10.3.17.142) by nkgeml414-hub.china.huawei.com (10.98.56.75) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 13 Jun 2017 14:10:37 +0800
Received: from DGGEMI506-MBX.china.huawei.com ([169.254.4.218]) by dggemi404-hub.china.huawei.com ([10.3.17.142]) with mapi id 14.03.0301.000; Tue, 13 Jun 2017 14:10:29 +0800
From: "Liubingyang (Bryan)" <liubingyang@huawei.com>
To: Uma Chunduri <uma.chunduri@huawei.com>, Tom Herbert <tom@herbertland.com>
CC: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>, Michael Menth <menth@uni-tuebingen.de>
Thread-Topic: [Ideas] BOF @IETF 99 Preparation - problem statement
Thread-Index: AQHS4cQR7noYz6KCuk2UPDHXAfzSE6IeOckAgACkN4CAAICQgIAAsncAgAEG4YCAABaOgIAAB0SAgADGNKD//8LsAIAAlQGg
Date: Tue, 13 Jun 2017 06:10:29 +0000
Message-ID: <C1CE72EE84AF224E94DA21AE134209EE01A02DB9@DGGEMI506-MBX.china.huawei.com>
References: <CAG-CQxpeCVwmmYFVXTP_4rq9sB6ZMyDTo5H3DTbnCu4RPnR+sg@mail.gmail.com> <69375c9a-d184-03db-9b44-6be8de8a9b6f@uni-tuebingen.de> <CALx6S36i_eWv8teFtB4oMBd+vDpB1Hg7jJ7kqgPjS5eGVkJN0Q@mail.gmail.com> <a1e80707-b3e9-f7d5-d300-0a2c9d8130e9@uni-tuebingen.de> <CALx6S35K3TosOXMX5dNiz3BKJzXCC+gbpEz17GxNG5J=9yj6tw@mail.gmail.com> <CAG-CQxpTVQ-e6FqsLcu5+pCUarizmK-Yp-PEuuasORq6XF1r7A@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEBAA@SJCEML703-CHM.china.huawei.com> <CALx6S37eXXCXCBgTJVvNaJW-BmSNAkaez_S2+zFzB3qtuuyydg@mail.gmail.com> <25B4902B1192E84696414485F5726854018CEC59@SJCEML703-CHM.china.huawei.com> <C1CE72EE84AF224E94DA21AE134209EE01A02C13@DGGEMI506-MBX.china.huawei.com> <25B4902B1192E84696414485F5726854018CFD9B@SJCEML703-CHM.china.huawei.com>
In-Reply-To: <25B4902B1192E84696414485F5726854018CFD9B@SJCEML703-CHM.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.130.168.116]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.593F81EA.0005, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.4.218, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 030c5a3a23b831f56d4878662200075f
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/Gf92dbt2BcgLnDnb08wWmA-v9l8>
Subject: Re: [Ideas] BOF @IETF 99 Preparation - problem statement
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jun 2017 06:10:56 -0000

VmVyeSBjbGVhciwgdGhhbmsgeW91IFVtYS4gDQoNClRoYW5rcw0KQmluZ3lhbmcgKEJyeWFuKQ0K
DQotLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTogVW1hIENodW5kdXJpIA0KU2VudDog
VHVlc2RheSwgSnVuZSAxMywgMjAxNyAxOjE3IFBNDQpUbzogTGl1YmluZ3lhbmcgKEJyeWFuKSA8
bGl1YmluZ3lhbmdAaHVhd2VpLmNvbT47IFRvbSBIZXJiZXJ0IDx0b21AaGVyYmVydGxhbmQuY29t
Pg0KQ2M6IFBhZG1hIFBpbGxheS1Fc25hdWx0IDxwYWRtYS5pZXRmQGdtYWlsLmNvbT47IGlkZWFz
QGlldGYub3JnOyBNaWNoYWVsIE1lbnRoIDxtZW50aEB1bmktdHVlYmluZ2VuLmRlPg0KU3ViamVj
dDogUkU6IFtJZGVhc10gQk9GIEBJRVRGIDk5IFByZXBhcmF0aW9uIC0gcHJvYmxlbSBzdGF0ZW1l
bnQNCg0KSGkgQmluZ3lhbmcsDQoNClZlcnkgZ29vZCBzdW1tYXJ5LiANClNlZSBteSByZXBsaWVz
IGJlbG93IFtVbWFdOg0KDQotLQ0KVW1hIEMuDQoNCi0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0t
DQpGcm9tOiBMaXViaW5neWFuZyAoQnJ5YW4pDQpTZW50OiBNb25kYXksIEp1bmUgMTIsIDIwMTcg
NjoxNSBQTQ0KVG86IFVtYSBDaHVuZHVyaSA8dW1hLmNodW5kdXJpQGh1YXdlaS5jb20+OyBUb20g
SGVyYmVydCA8dG9tQGhlcmJlcnRsYW5kLmNvbT4NCkNjOiBQYWRtYSBQaWxsYXktRXNuYXVsdCA8
cGFkbWEuaWV0ZkBnbWFpbC5jb20+OyBpZGVhc0BpZXRmLm9yZzsgTWljaGFlbCBNZW50aCA8bWVu
dGhAdW5pLXR1ZWJpbmdlbi5kZT4NClN1YmplY3Q6IFJFOiBbSWRlYXNdIEJPRiBASUVURiA5OSBQ
cmVwYXJhdGlvbiAtIHByb2JsZW0gc3RhdGVtZW50DQoNCkhpIFVtYSwgDQoNCkkgZm9sbG93ZWQg
dGhpcyB0aHJlYWQuIE1vc3Qgb2YgdGhlIGRpc2N1c3Npb24gZm9jdXNlZCBvbiB3aGF0IHRoZSBp
ZGVudGl0eSBpcyB1c2VkIGZvci4gDQpCdXQgY2FuIGFueWJvZHkgZXhwbGFpbiB3aGF0IHRoZSBp
ZGVudGl0eSBpcz8gDQoNCltVbWFdOiBPbmUgd2F5IHRvIHNlZSAtIElkZW50aXR5ICd1bmlxdWVs
eScgaWRlbnRpZmllcyBhIGNvbW11bmljYXRpb24gZW50aXR5IChhbnkgZGV2aWNlIHdpdGggbW9i
aWxpdHkgZm9yIGV4YW1wbGUsIHZlaGljdWxhciwgSU9UIGV0Yy4uKSBhbmQgYW4gYWJzdHJhY3Rl
ZCBxdWFsaWZpZXIgZnVydGhlciBkaXNzb2NpYXRlZCBmcm9tIHRoZSBpZGVudGlmaWVyIGluIElE
L0xPQyBwcm90b2NvbHMuIA0KICAgICAgICAgICAgICANCg0KQnkgZm9sbG93aW5nIHRoZSB0aHJl
YWQsIGl0IHNlZW1zIHRoYXQNCjEpIGlkZW50aWZpZXIgaXMgdGVtcG9yYXJ5IGZvciBhbiBlbnRp
dHkgd2hpbGUgaWRlbnRpdHkgaXMgcGVybWFuZW50Ow0KMikgYW4gZW50aXR5IGNhbiBoYXZlIG11
bHRpcGxlIGlkZW50aWZpZXJzIGJ1dCBvbmx5IGEgdW5pcXVlIGlkZW50aXR5Ow0KMykgaWRlbnRp
ZmllciBpcyB1c2VkIGluIGRhdGEgY29tbXVuaWNhdGlvbiB3aGlsZSBpZGVudGlmeSBpcyBvbmx5
IHVzZWQgaW4gY29udHJvbCBhbmQgbWFuYWdlbWVudC4gDQpJcyBteSB1bmRlcnN0YW5kaW5nIGNv
cnJlY3QgYW5kIGNvbXBsZXRlPyANCg0KW1VtYV06IFlvdXIgdW5kZXJzdGFuZGluZyBpcyBjb3Jy
ZWN0ICBvZiBjb3Vyc2UuICdDb250cm9sIGFuZCBtYW5hZ2VtZW50JyBjYW4gYmUgZnVydGhlciBl
eHBhbmRlZCAuLi4NCg0KT25seSBoYXZpbmcga25vd24gd2hhdCBpdCBpcyBjYW4gcGVvcGxlIGJl
dHRlciB1bmRlcnN0YW5kIGhvdyBpdCBpcyB1c2VkLiBXZSBhbGwgdW5kZXJzdGFuZCB0aGUgZGlm
ZmVyZW5jZSBiZXR3ZWVuIExvYyBhbmQgaWRlbnRpZmllciwgd2hpbGUgTG9jIGlzIHRvcG9sb2d5
IGRlcGVuZGVudCwgaWRlbnRpZmllciBpcyB0b3BvbG9neSBpbmRlcGVuZGVudC4gDQoNCltVbWFd
OiBJZGVudGl0eSB0b28gaXMgdG9wb2xvZ3kgaW5kZXBlbmRlbnQgbGlrZSBpZGVudGlmaWVyIGFu
ZCBhcyBpdHMgYmVlbiBkaXNjdXNzZWQgaXRzIGFic3RyYWN0ZWQgZnJvbSBJZGVudGlmaWVyLg0K
DQpTbyB3ZSBoYXZlIGxpdHRsZSB0cm91YmxlIHVuZGVyc3RhbmRpbmcgSUQvTG9jIHVzZSBjYXNl
cy4gDQoNCltVbWFdOiBNaWNoYWVsICBNLiBhbmQgc29tZSBvZiB1cyBoYWQgYSBxdWljayBkaXNj
dXNzaW9uIGFuZCB0aGUgaWRlbnRpdHkgdXNlZnVsbmVzcyAgYXJlIGluIHRoZSBhcmVhIG9mIHNl
Y3VyaXR5LCBwb2xpY3kvbWV0YWRhdGEgc3BlY2lmaWMgdXNlIGNhc2VzIGFuZCBhbm9ueW1pemF0
aW9uICh3b3VsZCBiZSBlbGFib3JhdGVkIHNvb24gYXMgc3BlY2lmaWVkIGJlbG93KS4NCiAgICAg
ICAgICAgICAgIA0KDQoNCkJpbmd5YW5nIChCcnlhbikNCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdl
LS0tLS0NCkZyb206IElkZWFzIFttYWlsdG86aWRlYXMtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVo
YWxmIE9mIFVtYSBDaHVuZHVyaQ0KU2VudDogVHVlc2RheSwgSnVuZSAxMywgMjAxNyA1OjA2IEFN
DQpUbzogVG9tIEhlcmJlcnQgPHRvbUBoZXJiZXJ0bGFuZC5jb20+DQpDYzogUGFkbWEgUGlsbGF5
LUVzbmF1bHQgPHBhZG1hLmlldGZAZ21haWwuY29tPjsgaWRlYXNAaWV0Zi5vcmc7IE1pY2hhZWwg
TWVudGggPG1lbnRoQHVuaS10dWViaW5nZW4uZGU+DQpTdWJqZWN0OiBSZTogW0lkZWFzXSBCT0Yg
QElFVEYgOTkgUHJlcGFyYXRpb24gLSBwcm9ibGVtIHN0YXRlbWVudA0KDQpUb20sDQoNCkluLWxp
bmUgW1VtYTJdOg0KDQoNCi0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOiBUb20gSGVy
YmVydCBbbWFpbHRvOnRvbUBoZXJiZXJ0bGFuZC5jb21dDQpTZW50OiBNb25kYXksIEp1bmUgMTIs
IDIwMTcgMTo0MCBQTQ0KVG86IFVtYSBDaHVuZHVyaSA8dW1hLmNodW5kdXJpQGh1YXdlaS5jb20+
DQpDYzogUGFkbWEgUGlsbGF5LUVzbmF1bHQgPHBhZG1hLmlldGZAZ21haWwuY29tPjsgaWRlYXNA
aWV0Zi5vcmc7IE1pY2hhZWwgTWVudGggPG1lbnRoQHVuaS10dWViaW5nZW4uZGU+DQpTdWJqZWN0
OiBSZTogW0lkZWFzXSBCT0YgQElFVEYgOTkgUHJlcGFyYXRpb24gLSBwcm9ibGVtIHN0YXRlbWVu
dA0KDQpPbiBNb24sIEp1biAxMiwgMjAxNyBhdCAxMjoxOSBQTSwgVW1hIENodW5kdXJpIDx1bWEu
Y2h1bmR1cmlAaHVhd2VpLmNvbT4gd3JvdGU6DQo+IEhpIFRvbSwNCj4NCj4NCj4NCj4gSnVzdCB3
YW50IHRvIGFkZCAyIHNwZWNpZmljIHBvaW50cyBvbiB0b3Agb2Ygd2hhdCBQYWRtYSBzYWlkIGJl
bG93IOKAkw0KPg0KPg0KPg0KPj5JIHRoaW5rIHdoYXQgeW91J3JlIGRlc2NyaWJpbmcgaXMgbW9y
ZSBhZGRyZXNzIG9iZnVzY2F0aW9uIHRoYW4gSUQvbG9jIA0KPj5zcGxpdCwgb3IgaW4gdGhpcyBj
YXNlIGl0J3MgdGhlIGlkZW50aWZpZXIgYmVpbmcgb2JmdXNjYXRlZC4gVGhpcyBpcyANCj4+YmVp
bmcgIGltcGxlbWVudGVkIGluIElQd2F2ZSBmb3IgaW5zdGFuY2UgdG8gbWl0aWdhdGUgdGhlIHRy
YWNraW5nIA0KPj5wcm9ibGVtLiBUaGUgIG5lZWQgZm9yIG9iZnVzY2F0aW9uIGlzIGluZGVwZW5k
ZW50IG9mIHRoZSBJRC9sb2MuDQo+DQo+PkFkZHJlc3Mgb2JmdXNjYXRpb24gb25seSB3b3JrcyB0
byB0aGUgZXh0ZW50IHRoYXQgdGhlcmUgYXJlbid0IG90aGVyIA0KPj5tZWFucyAgdG8gdHJhY2sg
bm9kZXMuIEZvciBpbnN0YW5jZSwgZXZlbiBpZiB3ZSB3ZXJlIHRvIHVzZSBkaWZmZXJlbnQgDQo+
PmFkZHJlc3NlcyBmb3IgIGVhY2ggcGFja2V0IG9mIGEgVENQIGNvbm5lY3Rpb24sIHRoZSBjb25u
ZWN0aW9uIGlzIA0KPj50cml2aWFsIHRvIHRyYWNrIGJ1dCBqdXN0ICBjb3JyZWxhdGluZyBwb3J0
IG51bWJlcnMsDQo+DQo+PnNlcXVlbmNlIGFuZCBhY2sgbnVtYmVycyBzZW50IGluIHRoZSBjbGVh
ci4gVGhlIG9ubHkgd2F5IHRvIGVuc3VyZSANCj4+cHJpdmFjeSAgaXMgZW5jcnlwdCBldmVyeXRo
aW5nIHBvc3NpYmxlLg0KPg0KPg0KPg0KPiBFbmNyeXB0aW9uIGZvciBvYmZ1c2NhdGlvbiBvZiBp
ZGVudGlmaWVycyBpcyBhIHRvbyBtdWNoIG9mIGEgc3RyZXRjaC4NCj4gRW5jcnlwdGlvbiBoYXMg
aXRzIG93biBwbGFjZSBhbmQgSSBzZWUgaXQgaXMgb3J0aG9nb25hbCB0byBJZGVudGlmaWVyIA0K
PiBvYmZ1c2NhdGlvbi4gV2hpbGUgaW4gYW4gdW5lbmNyeXB0ZWQgYW5kICBvYmZ1c2NhdGVkIGlk
ZW50aWZpZXJzLCBvbmUgDQo+IGNhbiBzZWUgc29tZSBhc3BlY3RzIG9mIFRDUCBjb25uZWN0aW9u
LCB3aGF0IGNhbm5vdCBiZSBkb25lIGJ5IHRoZSANCj4gZWF2ZXNkcm9wcGVyIGlzIGlkZW50aWZ5
aW5nIDIgaW5kZXBlbmRlbnQgIGNvbW11bmljYXRpb25zIHJlbGF0ZWQgdG8gYSBwYXJ0aWN1bGFy
IGVudGl0eS4NCj4gSSBzZWUgdGhpcyBpcyB0cnVseSAgbmV0d29yayBsYXllciBhbm9ueW1vdXMg
Y29tbXVuaWNhdGlvbiwgaWYgd2UgaGF2ZSANCj4gdGhlIGFiaWxpdHkgdG8gY2hhbmdlIGNvbW11
bmljYXRpb24gaWRlbnRpZmllcnMgYXQgd2lsbCAod2hpbGUgDQo+IG1haW50YWluaW5nIHRoZSBz
YW1lIGlkZW50aWZpZXIgZm9yIGVudGlyZSBzZXNzaW9uIGZvciBtb2JpbGl0eSByZWFzb25zKS4N
Cj4NCj4gVG8gYWNoaWV2ZSB0aGlzIGEgbWFuYWdlYWJsZSBlbnRpdHkgY2FsbGVkIOKAmElkZW50
aXR54oCZIGZvciBhbiBlbnRpdHkgYXQgDQo+IGEgY2VudHJhbCBwbGFjZSBpcyBuZWVkZWQsICB3
aGVyZSBtYXBwaW5nIGFuZCBvdGhlciBpZGVudGl0eSByZWxhdGVkIA0KPiBzZXJ2aWNlcyBjYW4g
YmUgcHJvdmlkZWQgIGFzIGhpbnRlZCBpbiBHUklEUy1SRVFzIGRvY3VtZW50Lg0KPg0KVW1hLA0K
DQpJIHVuZGVyc3RhbmQgdGhlIGludGVudCwgDQoNCltVbWEyXTogIFByb2dyZXNzLi4NCg0KYnV0
IEkgYW0gc3RpbGwgZHViaW91cyAnSWRlbnRpdHknIGlzIGFjdHVhbGx5IHJlcXVpcmVkIGFuZCBz
aG91bGQgYmUgaW4gdGhlIGNvcmUgYXJjaGl0ZWN0dXJlIGZvciBJREVBUy4gDQoNCltVbWEyXTog
IEZhaXIgcXVlc3Rpb24uIFdlIHdvdWxkIGNvbWUgZm9ydGggd2l0aCBhICdzbWFsbCcgZG9jdW1l
bnQgdG8gYWRkcmVzcyB0aGlzICBxdWVzdGlvbiAoYXMgZGlzY3Vzc2VkIGluIGVhcmxpZXIgY2Fs
bCB0b28pIGFuZCBnaXZlIHRoZSBuZWVkZWQgYXR0ZW50aW9uIGl0IGRlc2VydmVzLg0KDQpUaGlz
IGlzIG5vdCBhIGNvbmNlcHQgaW4gYW55IG9mIHRoZSBpZGVudGlmaWVyIGxvY2F0b3IgcHJvdG9j
b2xzLiANCkFsc28sIGEgaG9zdCBjYW4gb2JmdXNjYXRlIGFkZHJlc3NlcyB0b2RheSBqdXN0IGJ5
IGNob29zaW5nIGEgZGlmZmVyZW50IGFkZHJlc3MgZnJvbSB0aGUgYmxvY2sgdGhleSBhcmUgYXNz
aWduZWQgZm9yIGVhY2ggY29tbXVuaWNhdGlvbi4gDQpJbiBpZC9sb2MgdGhlIHNhbWUgYWZmZWN0
IGNvdWxkIGFjY29tcGxpc2hlZCBieSB0aGUgaG9zdCBnZXR0aW5nIGhvd2V2ZXIgbWFueSBpZGVu
dGlmaWVycyBpdCBuZWVkcyB0byB1c2UuDQoNCg0KW1VtYTJdOiAgV2VsbCwgb25lIGNhbiBjZXJ0
YWlubHkgZG8gdGhhdC4gVGhpcyB3b3VsZCBnaXZlIHN1YnNldCBvZiBiZW5lZml0cyAoZXZlbiBm
cm9tIHRoaXMgYXNwZWN0IHRvbykgd2l0aCAgbW9yZSBtYW5hZ2VhYmlsaXR5IGNvbXBsZXhpdHkg
dG8gdW5pcXVlbHkgaWRlbnRpZnkgYSBjb21tdW5pY2F0aW9uIGVudGl0eSAod2l0aG91dCBhbnkg
YmVhcmluZyBvciBhYmlsaXR5IGZvciBhbnkgcG9saWN5KS4gDQogICAgICAgICAgICAgICAgICAg
QnV0IHdlIGRvbid0IG5lZWQgJ0lkZW50aXR5JyBqdXN0IGZvciBhbm9ueW1pemF0aW9uIG9mIGNv
bW11bmljYXRpb25zIGFuZCBzb21lIG9mIHRoZSAgYmVuZWZpdHMgYXJlIGlsbHVzdHJhdGVkIGJ5
IE1pY2hhZWwgd2VsbCBoZXJlIGVhcmxpZXIgaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbC1hcmNo
aXZlL3dlYi9pZGVhcy9jdXJyZW50L21zZzAwMjA0Lmh0bWwgDQogICAgICAgICAgICAgICAgICAg
QWxzbyBpZiBhbnkgbmV3IHByb3RvY29sL2NvbmNlcHQgaGFzIG9ubHkgcmVsZXZhbmNlIGF0IElF
VEYgYW5kIGVmZm9ydCBpcyB3b3J0aCAgaWYgaXQgaGFzIGFueSByZWxldmFuY2UgZm9yIG9wZXJh
dG9ycyBvYnZpb3VzbHkgKHRoYXQgd2FzIG15IGludGVudCBpbiBteSBlYXJsaWVyIGNvbW1lbnQg
YWJvdXQgbmV3IHJldmVudWVzLi4pLg0KDQotLQ0KVW1hIEMuDQoNCg0KX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCklkZWFzIG1haWxpbmcgbGlzdA0KSWRl
YXNAaWV0Zi5vcmcNCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vaWRlYXMN
Cg==


From nobody Tue Jun 13 08:26:13 2017
Return-Path: <session-request@ietf.org>
X-Original-To: ideas@ietf.org
Delivered-To: ideas@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DC5D1131BD4; Tue, 13 Jun 2017 08:26:11 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: aretana@cisco.com, ideas@ietf.org, ideas-chairs@ietf.org, smccammon@amsl.com
X-Test-IDTracker: no
X-IETF-IDTracker: 6.54.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149736757175.7611.13983885513248704906.idtracker@ietfa.amsl.com>
Date: Tue, 13 Jun 2017 08:26:11 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/gCZDfgEt-NoUgQCIEoLbd68PLCc>
Subject: [Ideas] ideas - Update to a Meeting Session Request for IETF 99
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jun 2017 15:26:12 -0000

An update to a meeting session request has just been submitted by Stephanie McCammon, on behalf of the ideas working group.


---------------------------------------------------------
Working Group Name: IDentity Enabled Networks
Area Name: Routing Area
Session Requester: Stephanie McCammon

Number of Sessions: 1
Length of Session(s):  1.5 Hours
Number of Attendees: 100
Conflicts to Avoid: 
 First Priority: rtgarea opsarea nvo3 hip netconf i2rs nmrg sfc anima lisp dprive intarea dnsop




People who must be present:
  Erik Nordmark
  Alvaro Retana

Resources Requested:

Special Requests:
  
---------------------------------------------------------


From nobody Thu Jun 15 08:37:17 2017
Return-Path: <aretana@cisco.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45D40129A99 for <ideas@ietfa.amsl.com>; Thu, 15 Jun 2017 08:37:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.521
X-Spam-Level: 
X-Spam-Status: No, score=-14.521 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YbDTSMVaqepw for <ideas@ietfa.amsl.com>; Thu, 15 Jun 2017 08:37:14 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46DF612EA24 for <ideas@ietf.org>; Thu, 15 Jun 2017 08:37:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5946; q=dns/txt; s=iport; t=1497541034; x=1498750634; h=from:to:cc:subject:date:message-id:mime-version; bh=8skW9kTW8g7O8HBYIfzCdvggfGnkwHGDSWgQgyEbSoY=; b=eht3Jk83IBxQgGJZuLuHUtHW6o2D5TUqtUMwvz0+0DxjNpbGhElxPvWc XzbqF1/CskWy6aageQtLnthtNBW9vK96tDT5kA2se4retMgK5/6Mn89RU e6Du4irZ7v/D6ls6y7JY5X4fhDZfN1TmhrKrbcpwPBH7X8o3Sh0ERWdEK U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0A4AQCNqEJZ/5ldJa1dGgEBAQECAQEBA?= =?us-ascii?q?QgBAQEBgm9pYoENB4NvihiRd4griCKFOoIRhiQcgkY/GAECAQEBAQEBAWsdC4U?= =?us-ascii?q?ZAQQBI1YFDQEIPwMCBB8RFBMEDgWJSEwDDQiqYoImK4cKDYQAAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBHYZigguCd4JYhSQwgjEFlw6HADsCjmyEZ5ILi1GJLQEfOIE?= =?us-ascii?q?KdBVbAYZ8dohFgQ0BAQE?=
X-IronPort-AV: E=Sophos;i="5.39,343,1493683200";  d="scan'208,217";a="256083912"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Jun 2017 15:37:13 +0000
Received: from XCH-RCD-005.cisco.com (xch-rcd-005.cisco.com [173.37.102.15]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id v5FFbDSf031420 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 15 Jun 2017 15:37:13 GMT
Received: from xch-aln-002.cisco.com (173.36.7.12) by XCH-RCD-005.cisco.com (173.37.102.15) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Thu, 15 Jun 2017 10:37:12 -0500
Received: from xch-aln-002.cisco.com ([173.36.7.12]) by XCH-ALN-002.cisco.com ([173.36.7.12]) with mapi id 15.00.1210.000; Thu, 15 Jun 2017 10:37:12 -0500
From: "Alvaro Retana (aretana)" <aretana@cisco.com>
To: "ideas@ietf.org" <ideas@ietf.org>
CC: Erik Nordmark <nordmark@sonic.net>, Tim Wicinski <tjw.ietf@gmail.com>, Brian Haberman <brian@innovationslab.net>
Thread-Topic: [Ideas] IDEAS BoF at IETF 99
Thread-Index: AQHS5e1Ct5EYLoKLCUaM9c2lP3LG4A==
Date: Thu, 15 Jun 2017 15:37:12 +0000
Message-ID: <484373A1-72C3-4B0E-8E4F-9A2DC64E8D3C@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.20.0.170309
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.61.66.78]
Content-Type: multipart/alternative; boundary="_000_484373A172C34B0E8E4F9A2DC64E8D3Cciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/PbdGaLujDk8B4hMueDetreUHboM>
Subject: Re: [Ideas] IDEAS BoF at IETF 99
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jun 2017 15:37:16 -0000

--_000_484373A172C34B0E8E4F9A2DC64E8D3Cciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_484373A172C34B0E8E4F9A2DC64E8D3Cciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <85241D85FF50254EA94F9068C6ACD5D4@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_484373A172C34B0E8E4F9A2DC64E8D3Cciscocom_--


From nobody Wed Jun 21 18:08:53 2017
Return-Path: <uma.chunduri@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A2D51293DF for <ideas@ietfa.amsl.com>; Wed, 21 Jun 2017 18:08:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level: 
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L7NUuW6LoyHp for <ideas@ietfa.amsl.com>; Wed, 21 Jun 2017 18:08:49 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1E32128D19 for <ideas@ietf.org>; Wed, 21 Jun 2017 18:08:48 -0700 (PDT)
Received: from 172.18.7.190 (EHLO LHREML711-CAH.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DPP12660; Thu, 22 Jun 2017 01:08:47 +0000 (GMT)
Received: from SJCEML701-CHM.china.huawei.com (10.208.112.40) by LHREML711-CAH.china.huawei.com (10.201.108.34) with Microsoft SMTP Server (TLS) id 14.3.301.0; Thu, 22 Jun 2017 02:08:46 +0100
Received: from SJCEML702-CHM.china.huawei.com ([169.254.4.142]) by SJCEML701-CHM.china.huawei.com ([169.254.3.186]) with mapi id 14.03.0301.000;  Wed, 21 Jun 2017 18:08:41 -0700
From: Uma Chunduri <uma.chunduri@huawei.com>
To: "ideas@ietf.org" <ideas@ietf.org>
Thread-Topic: New Version Notification for draft-ccm-ideas-identity-use-cases-00.txt
Thread-Index: AQHS6vD1hb1xDD1q9ky78pjKGKNmNqIwD/0w
Date: Thu, 22 Jun 2017 01:08:40 +0000
Message-ID: <25B4902B1192E84696414485F5726854019DBDA2@SJCEML702-CHM.china.huawei.com>
References: <149809237053.30481.18424723882241144704.idtracker@ietfa.amsl.com>
In-Reply-To: <149809237053.30481.18424723882241144704.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.213.49.101]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020202.594B189F.0105, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.4.142, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 0c626ab8357d2b57fd77ab0ea8301a30
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/L4yX5iad3j-tEWhECdHU8dU7JWw>
Subject: [Ideas] FW: New Version Notification for draft-ccm-ideas-identity-use-cases-00.txt
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Jun 2017 01:08:52 -0000

RGVhciBBbGwsDQoNCg0KQXMgaXQncyBiZWVuIGRpc2N1c3NlZCBtdWx0aXBsZSB0aW1lcyBpbiB0
aGUgbGlzdCAoaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbC1hcmNoaXZlL3dlYi9pZGVhcy9jdXJy
ZW50L21zZzAwMjExLmh0bWwsIGh0dHBzOi8vd3d3LmlldGYub3JnL21haWwtYXJjaGl2ZS93ZWIv
aWRlYXMvY3VycmVudC9tc2cwMDIwMS5odG1sICkgIA0Kb24gbmVlZCBmb3IgSWRlbnRpdHkgYW5k
IGl0J3MgdXNlcyBBbGV4LCBNaWNoYWVsIGFuZCBJIHB1dCB0b2dldGhlciBhIGJyaWVmIGRvY3Vt
ZW50IHdoaWNoIGNvdmVycyB0aGlzIGFzcGVjdC4NCg0KWW91ciBjb21tZW50cywgc3VnZ2VzdGlv
bnMgYW5kIGFjdGl2ZSBjb2xsYWJvcmF0aW9uICBvbiB0aGUgZHJhZnQgIGlzIHdlbGNvbWUuDQoN
Cg0KQlIsDQotLQ0KQWxleCBDbGVtbSwgTWljaGFlbCBNZW50aCAmIFVtYSBDaHVuZHVyaQ0KDQot
LS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTogaW50ZXJuZXQtZHJhZnRzQGlldGYub3Jn
IFttYWlsdG86aW50ZXJuZXQtZHJhZnRzQGlldGYub3JnXSANClNlbnQ6IFdlZG5lc2RheSwgSnVu
ZSAyMSwgMjAxNyA1OjQ2IFBNDQpUbzogTWljaGFlbCBNZW50aCA8bWVudGhAdW5pLXR1ZWJpbmdl
bi5kZT47IEFsZXhhbmRlciBDbGVtbSA8bHVkd2lnQGNsZW1tLm9yZz47IFVtYSBDaHVuZHVyaSA8
dW1hLmNodW5kdXJpQGh1YXdlaS5jb20+DQpTdWJqZWN0OiBOZXcgVmVyc2lvbiBOb3RpZmljYXRp
b24gZm9yIGRyYWZ0LWNjbS1pZGVhcy1pZGVudGl0eS11c2UtY2FzZXMtMDAudHh0DQoNCg0KQSBu
ZXcgdmVyc2lvbiBvZiBJLUQsIGRyYWZ0LWNjbS1pZGVhcy1pZGVudGl0eS11c2UtY2FzZXMtMDAu
dHh0DQpoYXMgYmVlbiBzdWNjZXNzZnVsbHkgc3VibWl0dGVkIGJ5IFVtYSBDaHVuZHVyaSBhbmQg
cG9zdGVkIHRvIHRoZSBJRVRGIHJlcG9zaXRvcnkuDQoNCk5hbWU6CQlkcmFmdC1jY20taWRlYXMt
aWRlbnRpdHktdXNlLWNhc2VzDQpSZXZpc2lvbjoJMDANClRpdGxlOgkJSWRlbnRpdHkgVXNlIENh
c2VzIGluIElERUFTDQpEb2N1bWVudCBkYXRlOgkyMDE3LTA2LTIxDQpHcm91cDoJCUluZGl2aWR1
YWwgU3VibWlzc2lvbg0KUGFnZXM6CQk4DQpVUkw6ICAgICAgICAgICAgaHR0cHM6Ly93d3cuaWV0
Zi5vcmcvaW50ZXJuZXQtZHJhZnRzL2RyYWZ0LWNjbS1pZGVhcy1pZGVudGl0eS11c2UtY2FzZXMt
MDAudHh0DQpTdGF0dXM6ICAgICAgICAgaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2Mv
ZHJhZnQtY2NtLWlkZWFzLWlkZW50aXR5LXVzZS1jYXNlcy8NCkh0bWxpemVkOiAgICAgICBodHRw
czovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQtY2NtLWlkZWFzLWlkZW50aXR5LXVzZS1jYXNl
cy0wMA0KSHRtbGl6ZWQ6ICAgICAgIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2h0
bWwvZHJhZnQtY2NtLWlkZWFzLWlkZW50aXR5LXVzZS1jYXNlcy0wMA0KDQoNCkFic3RyYWN0Og0K
ICAgSURlbnRpdHktRW5BYmxlZCBuZXR3b3JrUyAoSURFQVMpIGludHJvZHVjZSB0aGUgY29uY2Vw
dCBvZiBJZGVudGl0eQ0KICAgaW50byBuZXR3b3JraW5nLiAgVGhpcyBjb25jZXB0IGluY2x1ZGVz
IGFuIElkZW50aXR5L0lkZW50aWZpZXIgc3BsaXQsDQogICB3aGljaCBjb21wbGVtZW50cyBleGlz
dGluZyBMb2NhdG9yL0lkZW50aWZpZXIgc2VwYXJhdGlvbg0KICAgdGVjaG5vbG9naWVzLiAgVGhp
cyBkb2N1bWVudCBzdW1tYXJpemVzIHNvbWUgY29uY2VwdHVhbCB1c2UgY2FzZXMgdG8NCiAgIGls
bHVzdHJhdGUgdGhlIHVzZWZ1bG5lc3Mgb2YgSURFQVMuDQoNCg0KICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgIA0KDQoNClBsZWFzZSBub3RlIHRoYXQgaXQgbWF5IHRha2UgYSBjb3VwbGUgb2YgbWlu
dXRlcyBmcm9tIHRoZSB0aW1lIG9mIHN1Ym1pc3Npb24gdW50aWwgdGhlIGh0bWxpemVkIHZlcnNp
b24gYW5kIGRpZmYgYXJlIGF2YWlsYWJsZSBhdCB0b29scy5pZXRmLm9yZy4NCg0KVGhlIElFVEYg
U2VjcmV0YXJpYXQNCg0K


From nobody Fri Jun 23 17:10:48 2017
Return-Path: <agenda@ietf.org>
X-Original-To: ideas@ietf.org
Delivered-To: ideas@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 704FE129BA0; Fri, 23 Jun 2017 17:07:04 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Secretariat\"" <agenda@ietf.org>
To: <cmorgan@amsl.com>, <ideas-chairs@ietf.org>
Cc: aretana@cisco.com, ideas@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.55.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149826282445.7840.10692980199337443201.idtracker@ietfa.amsl.com>
Date: Fri, 23 Jun 2017 17:07:04 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/n1sOFF9gSaItG-NyybTb5wXuIyc>
Subject: [Ideas] ideas - Requested session has been scheduled for IETF 99
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Jun 2017 00:07:04 -0000

Dear Cindy Morgan,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 

ideas Session 1 (1:30:00)
    Wednesday, Afternoon Session I 1330-1500
    Room Name: Congress Hall II size: 350
    ---------------------------------------------
    


Request Information:


---------------------------------------------------------
Working Group Name: IDentity Enabled Networks
Area Name: Routing Area
Session Requester: Cindy Morgan

Number of Sessions: 1
Length of Session(s):  1.5 Hours
Number of Attendees: 100
Conflicts to Avoid: 
 First Priority: lisp anima sfc nmrg i2rs netconf hip nvo3 opsarea rtgarea dprive intarea dnsop




People who must be present:
  Erik Nordmark
  Alvaro Retana

Resources Requested:

Special Requests:
  
---------------------------------------------------------


From nobody Fri Jun 30 02:31:38 2017
Return-Path: <tjw.ietf@gmail.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7375B129B37; Fri, 30 Jun 2017 02:31:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZgDWhbbqmz_f; Fri, 30 Jun 2017 02:31:34 -0700 (PDT)
Received: from mail-wm0-x235.google.com (mail-wm0-x235.google.com [IPv6:2a00:1450:400c:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABBD6128B8E; Fri, 30 Jun 2017 02:31:34 -0700 (PDT)
Received: by mail-wm0-x235.google.com with SMTP id 70so4746267wmo.1; Fri, 30 Jun 2017 02:31:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to:cc; bh=dtN7AB+hZgqRIjqxc4SPhtIy0IIUq4VyY8biZCzImnw=; b=gBga46WXIy5NHzf+tdw3GjAYm199FdFbFmWiSk9gb8ogt0UyLTyng8d8COpPkeOhI5 ZFatf9zF4UGIIUx0hIs+hBcIJ83TBOR6XDakqTMmMvywUfkaNh3JabzkNFeGFWfXltCK ygN0MG8x7bucT3Bx+MNJ0jaBf195Y01MKDnRnZsjyP+R+7s/IlkOODOXX7dDcUxCFaK8 q88MjNiRLddBiwS6mrLNPY/Jdn8hSa1WMdUoFiTB/l7T8B+8ukXZBhbu4RB1vLZYL0LH 7rjDq/EvM1b1ZWjnNqDTU55+y5hoF/ohuSICRD3aPrlS1WJNEDBFdEx+fk3Ikarye+ad Zbag==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=dtN7AB+hZgqRIjqxc4SPhtIy0IIUq4VyY8biZCzImnw=; b=smxb0uUtxXPSNuCjOb/mxfKkdTnwtJI7tPBQGCnkpn/MXj6YaDni3MmhvlTsWyu3iN 6owr5nsyAHiqR6iiPAe8gtiPkqJY4VeTgbnkfiu0TlWR4Tbuvec1+UM+F5uoCZmBbwnT WvFtuwPD1hPyv/13KCd2Vgiae10zLfjGh+0joJtVVXRBM8VTJ1k1UmRrbTTSNkmPx+sm o9Z2P1DnBfSscG2dXpAYarKj7uQtQShUF/Y4lXctDPglrkNKNfd/1SYJUn7xSWdVMyNp I8mwsfy2dzAw/aKrzhHN5W/etqANi4H17ij9ZFNwWB6vVSo0CBPs6u1NMEfjUNilT61k lOwg==
X-Gm-Message-State: AKS2vOz/s38+/K+Lvtn0J2Ic04BFKQ7AwxYZ/UoNf8tADbaglUnwsivl qT+Ve0Se7GPfP3UPehUTCno7UDoCqg==
X-Received: by 10.28.35.201 with SMTP id j192mr5383409wmj.103.1498815093027; Fri, 30 Jun 2017 02:31:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.170.152 with HTTP; Fri, 30 Jun 2017 02:31:32 -0700 (PDT)
From: tjw ietf <tjw.ietf@gmail.com>
Date: Fri, 30 Jun 2017 11:31:32 +0200
Message-ID: <CADyWQ+HWNbXGBN+D8w0uRK4OwD_oV9EF_HsOYLbMcAKYL8c=2w@mail.gmail.com>
To: ideas@ietf.org
Cc: ideas-chairs@ietf.org
Content-Type: multipart/alternative; boundary="001a113eab42343ae705532a15bf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/miPSeul7jpbo03F8jWZNl-AgHns>
Subject: [Ideas] Call for Presentation for IDEAs BoF
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Jun 2017 09:31:36 -0000

--001a113eab42343ae705532a15bf
Content-Type: text/plain; charset="UTF-8"

Greetings,

As your co-chair, I wanted to say hello and if you are interested in
presenting in the BoF please drop the chairs an email.   Please also state
if you need to do a remote presentation.

The last portion of the meeting we're going to set aside for an open
discussion of if their is enough work to proceed into a group.

Thanks
tim

--001a113eab42343ae705532a15bf
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div>Greetings,</div><div><br></div><div>As your co-ch=
air, I wanted to say hello and if you are interested in presenting in the B=
oF please drop the chairs an email. =C2=A0 Please also state if you need to=
 do a remote presentation.</div><div><br></div><div>The last portion of the=
 meeting we&#39;re going to set aside for an open discussion of if their is=
 enough work to proceed into a group.=C2=A0</div><div><br></div><div>Thanks=
</div><div>tim</div><div><br></div></div>

--001a113eab42343ae705532a15bf--

