**Session Date/Time:** 16 Mar 2025 11:00 # Hot RFC Lightning Talks ## Summary This session featured a series of lightning talks on various hot topics of interest to the IETF community, including DNS for identity, confidential computing, AI network security, LLM-assisted network management, source buffer management, object-based media, zero-trust network access, confidential computing limitations, diagramming RFCs, and trust contexts in attested TLS environments. The speakers presented their work, identified challenges, and sought collaboration with other experts. ## Key Discussion Points * **DNS for Identity (Philip Hallam-Baker):** * Proposed using DNS service discovery and OAuth 2 for identity management. * Suggested that DNS can scale for identity purposes, despite previous concerns. * Mentioned a draft "Helen Baker any" and a prototype website mplace2.social using this technology. * **Leaky Computing and Confidential Computing (Manu Fontaine):** * Discussed the problem of information leakage with non-cryptographic identifiers. * Proposed STEM identifiers (random 256-bit identifiers/symmetric keys) for process-level information isolation. * Presented a side meeting on Tuesday to discuss the universal name system and Universal Certificate Authority (UCA). * **Enabling Data Security Processing for AI (Lonely):** * Highlighted the need for data processing security in AI-driven telecom networks. * Introduced homomorphic encryption as a potential solution for privacy-preserving AI inference and training. * Announced a side meeting on Tuesday to discuss trust and privacy issues in data usage and processing for AI. * **LLM Assisted Network Management with Human Loop (Ming Zheing):** * Presented a draft on using Large Language Models (LLMs) for network management while keeping a human operator in the loop. * Described a framework with components including telemetry models and large decision models, including configuration validation and access control modules. * Sought collaborators for developing this framework. * **Source Buffer Management (Dan):** * Explained the problem of excessive source buffering causing latency issues. * Proposed a TCP "not sent low watermark" socket option to minimize excess buffering. * Highlighted the importance of fixing source buffer bloat to achieve low latency and responsive performance. * Reference to a draft and mailing list (spm@ietf.org). * **Object-Based Media (Dan):** * Discussed moving away from linear distribution of television to object-based media. * Identified scaling challenges for serving object-based media to hundreds of thousands of users. * Exploring Computer-Aware Traffic Steering (CAPS) and application content above it, as well as video media distribution protocols such as Quick. * Sought collaboration with operators working on similar projects. * **Zero Trust Network Access for Network Clouds (Wadashih):** * Presented a draft on zero-trust network access for interfaces between cloud and network in telecom clouds. * Proposed integrating zero-trust principles with a YANG data model. * Mentioned a side meeting on Wednesday morning to discuss use cases and applications. * **Confidential Computing Limitations (Osama):** * Critiqued confidential computing, claiming attestation key exfiltration breaks the entire security model. * Questioned how the identity and long-term key get into the VM. * Sought collaborators in TLS, remote attestation, formal methods, and confidential computing. * Several side meetings were proposed to discuss the identified attacks and formalization of the results. * **Diagramming RFCs (name unclear):** * Raised the issue of understanding RFCs and their impact across different layers. * Proposed a framework for diagramming documents to better understand their relationships to the overall infrastructure stack. * Sought collaborators to discuss the concept and potential solutions. * **Exploring Trust Contexts in Attested TLS Environments (Pavel Nikonorov):** * Discussed trust models and assessment of trustworthiness in confidential workloads. * Proposed a trust anchor specification or a registry for audited software and configuration files. * Seeks collaborators that have knowledge in formal security analysis, trust models and relevant specification. ## Decisions and Action Items * **Action Item:** Attendees interested in specific topics (DNS for identity, confidential computing, AI network security, LLM-assisted network management, source buffer management, object-based media, zero-trust network access, diagramming RFCs, and trust contexts in attested TLS environments) should contact the speakers directly to collaborate. * **Action Item:** Attendees were encouraged to review the slides available on the Datatracker. ## Next Steps * Attendees should attend the side meetings mentioned by the speakers to further discuss the topics. * Follow-up discussions may occur on the mailing lists provided (e.g., spm@ietf.org for source buffer management). * Independent submissions and working group adoption may be considered based on community interest.