What’s Happening at the IETF & IRTF?

Slides:



Advertisements
Similar presentations
Russ Housley IETF Chair LACNOG 4 October 2011 Successful Internet Protocol Development.
Advertisements

Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Jabber and Extensible Messaging and Presence Protocol (XMPP) Presenter: Michael Smith Cisc 856 Dec. 6, 2005.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Russ Housley IETF Chair 23 July 2012 Introduction to the IETF Standards Process.
Enhanced Cooperation Grace Githaiga Kenya ICT Action Network
Chapter 1 1.  Introduction to Networking  Fundamental Network Characteristics  Type and Sizes of Networks  Network Performance issues and Concepts.
What’s Happening at the IETF? Internet Standards and How to Get Involved Chris Grundemann Internet Society MENOG 15.
Management of the Internet
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Intranet, Extranet, Firewall. Intranet and Extranet.
Internet Research Task Force Crypto Forum Research Group IETF 89 March 3, 2014 London List: Chairs:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
A’Lexus Williams CSC 104 Final Exam Part 1. Societal Topics Weeks 7 & 8 Internet Regulation-is basically restricting or controlling access to certain.
1 A short introduction to the IETF Harald Alvestrand IETF chair Harald Alvestrand IETF chair.
Chapter 1 1.  Introduction to Networking  Fundamental Network Characteristics  Type and Sizes of Networks  Network Performance issues and Concepts.
Update on the Internet Research Task Force Aaron Falk IRTF Chair IETF-72 – Dublin.
Data Protection Privacy in the Digital Age: the UN General Assembly Resolution Sophie Kwasny, 16 October th International Conference, Mauritius.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
NEA Requirements Update -06 version summary. Posture Transport Considerations Issue –Ability of existing protocols used for network access to meet requirements.
Jabber Technical Overview Presenter: Ming-Wei Lin.
Internet and Intranet Fundamentals Class 3 Session B.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
IS3220 Information Technology Infrastructure Security
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Why Civil Society should lobby and protect our right to use the Internet ISPA Internet Week, Thursday 12 September The Association for Progressive Communications.
Data Communications I & Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang.
Highlights on the UN Convention on the rights of persons with disabilities Simão Campos ITU Telecommunications Standardization Bureau ITU and WHO Regional.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
IETF: Why you should care
Privacy in the Digital Age: the UN General Assembly Resolution
Chairs Daniel King Kohei Shiomoto Secretary Will Liushucheng
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Chapter 7: Transport Layer
CompTIA Security+ Study Guide (SY0-401)
IP Telephony (VoIP).
United Nations Environment Programme
Instructor Materials Chapter 5 Providing Network Services
The IETF World of Standardisation Jon Crowcroft,
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
Secure Sockets Layer (SSL)
STRESS TESTS and TAIWAN PEER REVIEW PROCESS
Dr. Konstantinos Komaitis
Cryptography and Network Security Chapter 16
Understand the OSI Model Part 2
Gender statistics in Information and Communication Technology for Women’s Empowerment and Gender Equality Dorothy Okello, Annual.
GENDER STATISTICS IN INFORMATION AND COMMUNICATION
Working at a Small-to-Medium Business or ISP – Chapter 7
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 7
CSE 4095 Transport Layer Security TLS
Privacy Through Anonymous Connection and Browsing
Human rights in technical standards: our practical approach
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Working at a Small-to-Medium Business or ISP – Chapter 7
draft-ipdvb-sec-01.txt ULE Security Requirements
Whatever happened to rough consensus and running code?
IS4680 Security Auditing for Compliance
Human rights in technical standards: our practical approach
IP and NGN Projects in ITU-T Jean-Yves Cochennec France Telecom SG13 Vice Chair Workshop on Satellites in IP and Multimedia - Geneva, 9-11 December 2002.
E-commerce Infrastructure
Introduction to TCP/IP
BTEC level 3 Learning Aim D.
Experimental Internet Resource Allocations
Presentation transcript:

What’s Happening at the IETF & IRTF? 18 September 2017 What’s Happening at the IETF & IRTF? Human Rights Protocol Considerations and how to get involved Salam Yamout Middle East Bureau Director meynell@isoc.org Presentation title – Client name

Disclaimer Two important points: No-one really speaks for the IETF or IRTF I am speaking about the IETF or IRTF as an individual participant https://trac.tools.ietf.org/group/iesg/trac/wiki/SpeakingForIetf

IETF Standards make the Internet work TCP/IP IPv4 (RFC791) and IPv6 (RFC2460…) TCP (RFC675…) and UDP (RFC768) E-Mail SMTP (RFC5321), IMAP (RFC3501) Network and Routing BGP (RFC4271), OSPF (RFC2178…), MPLS (RFC3031) DNS DNS (RFCs 1034, 1035…) DNSSEC (RFCs 4033, 4034 & 4035) DANE (RFCs 6698, 7671…) Web HTTP (RFC2616…) Security TLS (RFCs 5246 & 6176)

IETF Areas - http://www.ietf.org/iesg/area.html Application protocols and architectures Real-time (and non-real-time) communication Applications and Real-Time (ART) Mechanisms related to data transport on the Internet Congestion control Transport (TSV) Routing and signalling protocols Routing (RTG) IPv4/IPv6, DNS, DHCP, VPNs, mobility Internet (INT) Network management Operations: IPv6, DNS, security, routing Operations and Management (OPS) Security protocols and mechanisms, including cryptography Security (SEC) Activities focused on supporting and updating IETF processes General (GEN)

Internet Research Task Force Considers long-term research issues related to the Internet IRTF Chair & Research Group Chairs form Internet Research Steering Group (IRSG) Publishes RFCs in IRTF Stream Current Research Groups: Crypto Forum (CFRG) Thing-to-Thing (T2TRG) Internet Congestion Control (ICCRG) Measurement & Analysis (MAPRG) Network Function Virtualisation (NFVRG) Network Management (NMRG) Information-Centric Networking (ICNRG) Network Coding (NWCRG) Global Access to the Internet for All (GAIA) – Jane Coffin (Chair) Human Rights Protocol Considerations (HRPC)

Participating in IETF & IRTF https://www.ietf.org/ and https://www.irtf.org Anyone can participate in the mailing lists and discussions Anyone can submit a ‘draft’ document (known as an Internet Draft or I-D) Working Groups and Research Groups debate and discuss drafts Documents progress through the standards process to become RFCs Primary venue for all communication is e-mail

Impact of Internet Protocols on Human Rights UN Human Rights Council 2012 – affirms rights defined in Article 19 of Universal Declaration of Human Rights and International Covenant on Civil and Political Rights must be protected online UN General Assembly 2013 – calls upon all States to respect the right to privacy in digital communication UN Special Rapporteur FoE 2015 - governments should promote use of strong encryption and protect anonymous expression online UN Special Rapporteur FoE 2016 – private entities should integrate commitments to freedom of expression into product engineering, policies and standards

IRTF Human Rights Protocol Considerations IRTF Human Rights Protocol Considerations Research Group established in Jan 2015 Researching whether standards and protocols can enable or threaten human rights Can the human rights characteristics of the Internet be degraded if not properly defined, described and sufficiently taken into account udring rotocol development. Open, secure and reliable connectivity is essential for rights such as freedom of expression and freedom of association.

RFC 6973: Privacy Considerations for Internet Protocols Entry point for this work Offers guidance for developing privacy considerations for inclusion in protocol specifications. Aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. Suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content. Builds on previous body of security analysis by recognizing the threats to privacy are security threats

Research into Human Rights Protocol Considerations draft-irtf-hrpc-research-14 Informational document with consensus from IRTF HRPC Research Group Aims to offers guidelines similar to RFC 6973 (privacy considerations) Outlines human rights threats on the Internet Consider how well-known Internet protocols (e.g. DNS, NAT and HTTP) can have human rights concerns Considers implications of traffic interception, manipulation, throttling, logging, tracking, and DDoS on human rights

Research into Human Rights Protocol Considerations draft-irtf-hrpc-research-14 Provides guidelines in 19 areas such as privacy and confidentality, but also: Connectivity: is end-to-end connectivity supported, do protocols support low bandwidth and high latency, can protocols operate in a stateless manner? Content agnosticism: is all network traffic delivered in a non-discriminatory way? Authenticity: can receiver be sure data comes from the source it claims to come from? Internationalisation: are protocols, standards, and implementations usable in different languages and scripts? Censorship resistance: do protocols introduce new identifiers that can be associated with persons or content? Open standards: are protocol specifications published, and their functioning known?

Other HRPC RG Drafts Freedom of Association on the Internet (draft-tenoever-hrpc-association-02) Scope the relationship between Internet protocols and the right to freedom of assembly and association On the Politics of Standards (draft-tenoever-hrpc-political-02) Outline different views on the relation between protocols and politics, and whether protocols are political Unrequested Communications (draft-tenoever-hrpc-unrequested-00) Addresses issue of unrequested traffic in the form of spam or DDoS attacks

Next Meeting: IETF 100 11-17 November 2017, Singapore https://www.ietf.org/meeting/100/ HRPC RG meeting Friday 17 Nov 2017 (0900-1130 UTC+8) Remote participation available: Audio streams Web conferencing systems Jabber chat rooms

IETF Fellowship Programme Fellowships available to enable people to attend IETF meetings http://www.internetsociety.org/what-we-do/education-and-leadership- programmes/ietf-and-ois-programmes/internet-society-fellowship

IETF Policy Programme Fellowships available for regulators to attend IETF meetings and learn about IETF standards and processes https://www.internetsociety.org/what-we-do/education-and-leadership- programmes/ietf-and-ois-programmes/internet-society-fellowship-5

Summary The IETF and IRTF makes the Internet work better It has a fundamental role in Internet administration It has international scope, but local relevance It has an open, inclusive and well-established structure Your participation is critical to the success More information: http://www.ietf.org/newcomers.html

http://www.internetsociety.org/deploy360/ deploy360@isoc.org