ALTO Requirements draft-ietf-alto-reqs-04

Slides:



Advertisements
Similar presentations
Indication of support for keep- alive draft-holmberg-sip-keep-03 Christer Holmberg
Advertisements

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Health Insurance October 19, 2006 Insurance is defined as a means of protecting against risk. Risk is a state in which multiple outcomes are possible and.
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
1 Frameworks. 2 Framework Set of cooperating classes/interfaces –Structure essential mechanisms of a problem domain –Programmer can extend framework classes,
Policy-based Accounting Draft Update Tanja Zseby, Sebastian Zander Fraunhofer Institute FOKUS Competence Center for Global Networking (GloNe) [zseby,
Streaming Support for.NET Remoting over Peer-to-Peer Environments.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
TICTOC -Topology-Discovery and Clock-Discovery TICTOC BOF IETF70 Stewart Bryant
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
Worksheet: Mapping your authorization and consent use cases to the UMA architecture 17 Aug 2014 Questions? Send mail to
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Modification Proposals to Current TURN Spec Mikael Latvala.
1 Proposed Additional Use Cases for Congestion Exposure draft-mcdysan-conex-other-usecases-00.txt Dave McDysan.
TURN draft-ietf-behave-turn-07 Philip Matthews, Avaya Jonathan Rosenberg, Cisco Rohan Mahy, Plantronics.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
IETF 68 – SIMPLE WG SIMPLE Problem Statement draft-ietf-simple-interdomain-scaling-analysis-00 Avshalom Houri – IBM Tim Rang - Microsoft Edwin Aoki – AOL.
Database Systems Marcus Kaiser School of Computing Science Newcastle University.
ALTO Problem Statement draft-marocco-alto-problem-statement-03 Enrico Marocco Vijay Gurbani 73 rd IETF Meeting.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Concerns about designating the MAG as a Default Router James Kempf NETLMM Interim Sept. 27, 2006.
WebDAV Issues Munich IETF August 11, Property URL encoding At present, spec. allows encoding of the name of a property so it can be appended to.
Draft-khan-ip-serv-peer-arch-03.txt SPEERMINT Peering Architecture IETF-66, Montreal, Canada Sohel Khan, Ph.D. Technology Strategist.
Data Protection Act AS Module Heathcote Ch. 12.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
NAT traversal for GIST in 300 seconds A. Pashalidis; H. Tschofenig.
NAT64 Operational Experiences draft-chen-v6ops-nat64-experience-01 IETF 83- Paris, Mar 2012 Gang Chen, China Mobile Zhen Cao, China Mobile Cameron Byrne,
ALTO BOF Charter Discussion. Charter Iterated (twice) on the list  Several comments on the first version Terminology, caching  No complains on current.
Access and Query Task Force Status at F2F1 Simon Miles.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 18 – Multimedia Transport (Part 1) Klara Nahrstedt Spring 2014.
Privacy Considerations for Internet Protocols Alissa Cooper 1.
Third-party ALTO server discovery draft-kiesel-alto-3pdisc-02 Sebastian Kiesel Marco Tomsu Nico Schwan Michael Scharf IETF 77, March 2010.
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Long-term Archive Service Requirements November 9, 2004.
Draft-ietf-behave-nat-udp-00 NAT Behavioral Requirements for Unicast UDP draft-ietf-behave-nat-upd-00 François Audet - Cullen Jennings.
Globally Identifiable Number (GIN) Registration Adam Roach draft-martini-roach-gin-01 IETF 77 – Anaheim, CA, USA March 22, 2010.
Dario Dainelli, Article 14.4.c: SR proposal Business operators shall keep, for a period ending not before the expected shelf life of the material.
Carrier/Infrastructure ENUM Requirements draft-lind-infrastructure-enum-reqs-01.
TICTOC -Topology-Discovery and Clock-Discovery
Norm Suchar Director, Office of Special Needs Assistance Programs
draft-jounay-pwe3-dynamic-pw-update-00.txt IETF 70 PWE3 Working Group
VPN Extension Requirements for Private Clouds
The E-Rate Program CIPA Update Fall 2011 Applicant Trainings.
draft-ietf-behave-nat-behavior-discovery-01
IP Router-Alert Considerations and usage
European AFS & Kerberos Conference 2010
P2P Streaming for Mobile Nodes: Scenarios and Related Issues
Goals of soBGP Verify the origin of advertisements
ALTO VPN Service draft-scharf-alto-vpn-service-00
Les Ginsberg Stefano Previdi Peter Psenak Martin Pilka
69th IETF, 26 July 2007 Michael Behringer Francois Le Faucheur
Thomas Nadeau Yacine El Mghazli Kwok Ho Chan
draft-ietf-geopriv-lbyr-requirements-02 status update
draft-ietf-ecrit-rough-loc
Data Protection Legislation
I2RS Large Flow Use Case draft-krishnan-i2rs-large-flow-use-case-00
Internet Miscellany March 26, 2018.
Routing Proximity Services IETF 73 Minneapolis, November 2008
HIPAA PRIVACY RULE IMPLEMENTATION – WHAT’S UP AFTER 4/14/03?
IEEE 802 EC Privacy Recommendation SG Comments on 802c PAR and CSD
Coexistence of Legacy & RSN STAs in Public WLAN
draft-ipdvb-sec-01.txt ULE Security Requirements
Exploring the Power of EPDM Tasks - Working with and Developing Tasks in EPDM By: Marc Young XLM Solutions
An Update on Multihoming in IPv6 Report on IETF Activity
Charles Shen, Henning Schulzrinne, Arata Koike
Dissemination Working Group Luxembourg, May 2009
Caching.
WebDAV Collections Protocol
TAPI and RFC8345 Network Topology Analysis
Presentation transcript:

ALTO Requirements draft-ietf-alto-reqs-04 Sebastian Kiesel Rich Woundy IETF-77, Anaheim, U.S., March 2010

Changes since Hiroshima (-02 to -04) Non-normative classification of information disclosure (7.2) Based on mailing list thread http://www.ietf.org/mail-archive/web/alto/current/msg00536.html Disclosure of topology data vs. disclosure of user behavior Disclosure towards the other ALTO entity vs. to a third party One conclusion: we cannot prevent an ALTO client from redistributing the guiding information to another party (e.g. via gossip), unless we would use some kind of DRM – this is not what we want! Reflected in: New requirement: REQ. ARv04-49: The operator of an ALTO server MUST NOT assume that an ALTO client will implement mechanisms or comply with rules that limit the ALTO client's ability to redistribute information retrieved from the ALTO server to third parties.

Open issues / planned changes Add discussion of the “provisioned bandwidth” attribute. This attribute has been proposed many times Privacy concerns Useful? Dangerous? Causing disproportionately high load on high-bandwidth peers, i.e., penalizing premium customers? See thread on mailing list http://www.ietf.org/mail-archive/web/alto/current/msg00605.html So far unclear whether new normative requirements will occur Add discussion of special requirements caused by per-user attributes (as opposed to per-area / per-PID attributes), in particular in environments with highly dynamic address re-allocation. To say it in other words: document the limitations of map-based approaches, as discussed in Hiroshima