**Session Date/Time:** 24 Jul 2022 22:00 # Hot RFC Lightning Talks ## Summary This session featured a series of lightning talks on a diverse range of current and emerging technical topics relevant to the IETF community. Speakers presented on green networking and sustainability, post-quantum cryptography challenges, the Internet of Secure Elements, attestation in TLS, LEO satellite networking, secure WebRTC, operations and control networks, enterprise security implications of ECH, data-driven network optimization, Multicast QUIC, and network latency. Each presentation highlighted technical problems, proposed solutions, existing work, and called for community engagement and collaboration. ## Key Discussion Points * **What Has the IETF Ever Done for Energy? (Torsten)** * Presented a document surveying IETF's contributions to energy saving, both incidental (e.g., efficiency from digitized solutions, internet scale) and specific (e.g., low-power networks, smart grids, E-MAN working group). * Aimed to educate the community, foster interest in new work, and broaden technology adoption. * Invited community feedback and contributions to the document. * **Challenges and Opportunities in Green Networking (Alexander)** * Built on the previous talk, emphasizing sustainability as a grand challenge and the network's role. * Identified opportunities and challenges at four levels: * **Device/Equipment**: Need for proper instrumentation and visibility into energy metrics. * **Protocol**: Traffic adaptation, energy-friendly traffic characteristics, fast discovery for dynamic resource management, efficient network addressing. * **Network**: Energy-aware routing, control protocol extensions for sustainable path configuration. * **Architecture**: Energy-conscious placement of content and computation. * Introduced two drafts: a problem statement and a specific draft on metrics and instrumentation. * **Challenges and Opportunities of Post-Quantum Cryptography (Sophia)** * Highlighted NIST's selection of post-quantum algorithms for key exchange and digital signatures, marking a critical milestone. * Noted that PQ algorithms often have larger parameter sizes and/or higher computational times, impacting network latency and protocols. * Discussed the lack of traditional Diffie-Hellman properties in many PQ algorithms and the challenges for protocols like TLS, WireGuard, and Signal. * Mentioned the IETF PPQM (Post-Quantum Messaging) group and the need for generic designs and potential protocol changes. * **Internet of Security Elements (IoSE) (Pascal)** * Focused on connecting secure elements (e.g., smart cards, SIMs, e-passports) to the internet as online cryptographic resources identifiable by URIs. * Identified challenges including the lack of a TCP/IP stack in secure elements, requiring additional processors. * Outlined the need for defined protocols to access secure element resources, naming conventions, and attestation procedures. * Presented three IETF drafts: ROX (Global Platform over TLS), TLS-SC (TLS PSK in secure element), and IoSE (attestation procedures). * Mentioned open-source software implementations available for these concepts. * **Attestation within TLS (Hannes)** * Addressed the need for device attestation (e.g., genuineness, configuration, running software) in IoT device enrollment with cloud services, as explored by the RATS (Remote ATtestation procedures) working group. * Proposed integrating attestation with TLS by augmenting the TLS exchange with attestation information and providing proof of possession. * Described a software solution combining embedTLS (TLS 1.3), a platform-agnostic security hardware library (BASIC), and a cloud verification service (Veriza). * **LEO Satellite Networking: Flying Infrastructure for Future Internet (Lynn Hahn)** * Emphasized LEO satellites as key components of Non-Terrestrial Networks (NTN) due to low latency, high bandwidth, and global coverage. * Detailed unique challenges: high-speed satellite movement causing interleaved mesh networks, rapid link flipping with ground stations, and dynamic inter-satellite distances. * Argued for IP networking in LEO for scalability, internet interworking, and alignment with 3GPP expectations, despite existing non-IP solutions. * Highlighted current IP technology limitations in addressing, routing, traffic engineering, multipath, and mobility for LEO. * **Secure Open Standards for WebRTC (Phil)** * Critiqued the current state of WebRTC where open standards are often hidden behind proprietary "walled gardens." * Advocated for user control over communication (provider choice, address portability, not using phone numbers for messaging). * Stressed the need for security beyond basic end-to-end packet encryption, addressing vulnerabilities in contacts directories and single-vendor applications that can be exploited by hostile entities. * Proposed completing the messaging stack by integrating a Threshold Key Infrastructure (TKI) with WebRTC, allowing users to control contacts and choose application providers. * **Challenges and Opportunities in Operations and Control Networks (OCN) (Lee Jindong)** * Presented the rising need for sophisticated, flexible, and interoperable controllers in automated factories and remote driving scenarios, often involving cloud-based virtualization. * Defined OCN as the interconnection of devices and controllers for data exchange, monitoring, and causing changes to end equipment, requiring guaranteed end-to-end latency and urgent packet prioritization. * Identified key issues: using IP for controller-to-field device interconnection, high-precision communication, granular QoS, media diversity (5G, Ethernet), field bus protocol conversion, addressing (auto-configuration, header compression), message types, and security. * **ECH for Enterprises: Operational Security Concerns (Arnaud)** * Discussed the impact of Encrypted Client Hello (ECH) on enterprise operational security, particularly the removal of SNI access, which pushes security to the endpoint. * Raised concerns about the trustworthiness of client devices and browsers for security controls (e.g., data loss prevention, attack detection), as they cannot be both "judge and party." * Questioned whether ECH shifts the security model to cloud-facing servers, potentially reintroducing a "middlebox" problem. * Called for clarification on client-facing server protocols and methods for integrating third-party security components. * **Data-Driven Approach to Tackle Network Diversity with Heterogeneous Protocol Configurations (Gusama)** * Highlighted that Content Delivery Networks (CDNs) typically use homogeneous protocol configurations (e.g., TCP, HTTP) for all users, despite significant user and network diversity. * Presented measurements showing up to 70% improvement in page load times by using optimal, connection-specific configurations. * Proposed a system with two components: a data path (modified networking stack at the server for flexible, per-connection reconfiguration) and a global control path (using algorithms and machine learning to predict optimal configurations). * Advocated for investing in flexible networking stack architectures that dynamically adapt to user conditions. * **Multicast QUIC (Jake)** * Addressed the problem of unicast for certain applications and proposed using IP multicast with QUIC. * Described the basic idea: a single unicast connection, server tells client to join multicast channels, client sends ACKs, and multicast is server-to-client only, aligning with SECDISPATCH 112 security considerations. * Seeking to develop a prototype and gather feedback on the draft. * **Network Latency: Why it Matters, How to Measure it, What to Do About it (Stuart)** * Argued that latency, not just throughput, is crucial for most user experiences (e.g., apps, gaming, video seeking). * Introduced new measurement tools: Apple's in-app diagnostics showing "round trips per minute," Waveform's bufferbloat test, and Ookla Speedtest's new "working latency" metric (how the network performs under load, not just idle). * Proposed L4S (Low Latency Low Loss Scalable Throughput) as a solution, a congestion control method that keeps queues short at bottleneck links using ECN marks to reduce round-trip delay. * Referenced hackathon work and resources like the IETF BITAG report on latency. ## Decisions and Action Items * **Torsten (Energy document)**: Feedback requested, contact authors for contributions. * **Alexander (Green Networking)**: Feedback requested on drafts, seeking collaborators. Informal side meeting planned for Tuesday from 1 PM to 2 PM in Salon 9. * **Sophia (Post-Quantum Cryptography)**: Participation invited for a workshop collocated with NIST in November. Join the IETF SPQC (Secure Protocol for Quantum Cryptography) group for continued discussion. * **Pascal (IoSE)**: Call for research and collaboration on IoSE drafts and implementations. * **Hannes (Attestation in TLS)**: Seeking collaborators for those with similar attestation systems. * **Lynn Hahn (LEO Satellite Networking)**: Contact Lynn for interest in contributing or presenting at a planned side meeting at the *next* IETF. * **Phil (Secure WebRTC)**: Seeking help on choosing the best path through WebRTC and identifying best-of-breed components for a prototype. Contact Phil for interest. * **Lee Jindong (OCN)**: Participation requested for an OCN side meeting on Tuesday lunchtime at the rooftop level. * **Arnaud (ECH for Enterprises)**: Join an informal side meeting on Tuesday at 12:30 PM (noon 30) if interested in finding a way forward for enterprise security with ECH. * **Gusama (Data-Driven Networking)**: Seeking interest and collaboration on flexible networking stack architectures. Gusama will be available in Philadelphia for discussions. * **Jake (Multicast QUIC)**: Feedback requested on the draft, seeking reviewers. Contributions to the W3C Multicast Community Group implementation are welcome. Discussion in the QUIC WG on Thursday. * **Stuart (Network Latency)**: Attend L4S side meeting on Monday and a measurement discussion on Friday. ## Next Steps * **Green Networking**: Informal side meeting on Tuesday (1-2 PM, Salon 9) to discuss challenges, opportunities, and drafts. * **Post-Quantum Cryptography**: Workshop in November (collocated with NIST) and ongoing discussions within the IETF SPQC group. * **LEO Satellite Networking**: Side meeting planned for the *next* IETF to discuss challenges and potential IP solutions. * **Operations and Control Networks**: Side meeting on Tuesday lunchtime (rooftop level) to explore issues and opportunities in OCN. * **ECH for Enterprises**: Informal side meeting on Tuesday (12:30 PM) to discuss forward paths for operational security. * **Multicast QUIC**: Further discussion planned in the QUIC working group on Thursday; continued work on prototype implementation with the W3C Multicast Community Group. * **Network Latency (L4S)**: L4S side meeting on Monday; measurement discussion on Friday.