| rfc9490.original | rfc9490.txt | |||
|---|---|---|---|---|
| Network Working Group M. Knodel | Internet Architecture Board (IAB) M. Knodel | |||
| Internet-Draft Center for Democracy & Technology | Request for Comments: 9490 | |||
| Intended status: Informational W. Hardaker | Category: Informational W. Hardaker | |||
| Expires: 15 February 2024 | ISSN: 2070-1721 | |||
| T. Pauly | T. Pauly | |||
| 14 August 2023 | January 2024 | |||
| Report from the IAB workshop on Management Techniques in Encrypted | Report from the IAB Workshop on Management Techniques in Encrypted | |||
| Networks (M-TEN) | Networks (M-TEN) | |||
| draft-iab-m-ten-workshop-02 | ||||
| Abstract | Abstract | |||
| The “Management Techniques in Encrypted Networks (M-TEN)” workshop | The "Management Techniques in Encrypted Networks (M-TEN)" workshop | |||
| was convened by the Internet Architecture Board (IAB) from 17 October | was convened by the Internet Architecture Board (IAB) from 17 October | |||
| 2022 to 19 October 2022 as a three-day online meeting. The workshop | 2022 to 19 October 2022 as a three-day online meeting. The workshop | |||
| was organized in three parts to discuss ways to improve network | was organized in three parts to discuss ways to improve network | |||
| management techniques in support of even broader adoption of | management techniques in support of even broader adoption of | |||
| encryption on the Internet. This report summarizes the workshop's | encryption on the Internet. This report summarizes the workshop's | |||
| discussion and identifies topics that warrant future work and | discussion and identifies topics that warrant future work and | |||
| consideration. | consideration. | |||
| Note that this document is a report on the proceedings of the | Note that this document is a report on the proceedings of the | |||
| workshop. The views and positions documented in this report are | workshop. The views and positions documented in this report are | |||
| those of the expressed during the workshop by participants and do not | those of the expressed during the workshop by participants and do not | |||
| necessarily reflect IAB views and positions. | necessarily reflect IAB views and positions. | |||
| About This Document | ||||
| This note is to be removed before publishing as an RFC. | ||||
| The latest revision of this draft can be found at | ||||
| https://intarchboard.github.io/m-ten-workshop-public/draft-iab-m-ten- | ||||
| workshop.html. Status information for this document may be found at | ||||
| https://datatracker.ietf.org/doc/draft-iab-m-ten-workshop/. | ||||
| Source for this draft and an issue tracker can be found at | ||||
| https://github.com/intarchboard/m-ten-workshop-public. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
| provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Architecture Board (IAB) | |||
| and may be updated, replaced, or obsoleted by other documents at any | and represents information that the IAB has deemed valuable to | |||
| time. It is inappropriate to use Internet-Drafts as reference | provide for permanent record. It represents the consensus of the | |||
| material or to cite them other than as "work in progress." | Internet Architecture Board (IAB). Documents approved for | |||
| publication by the IAB are not candidates for any level of Internet | ||||
| Standard; see Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 15 February 2024. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9490. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2023 IETF Trust and the persons identified as the | Copyright (c) 2024 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. | carefully, as they describe your rights and restrictions with respect | |||
| to this document. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
| 1.1. About this workshop report content . . . . . . . . . . . 3 | 1.1. About This Workshop Report Content | |||
| 2. Workshop Scope and Discussion . . . . . . . . . . . . . . . . 4 | 2. Workshop Scope and Discussion | |||
| 2.1. “Where we are” - Requirements and Passive Observations . 4 | 2.1. "Where We Are" - Requirements and Passive Observations | |||
| 2.1.1. Traffic classification and network management . . . . 4 | 2.1.1. Traffic Classification and Network Management | |||
| 2.1.2. Preventing traffic analysis . . . . . . . . . . . . . 5 | 2.1.2. Preventing Traffic Analysis | |||
| 2.1.3. Users and privacy . . . . . . . . . . . . . . . . . . 6 | 2.1.3. Users and Privacy | |||
| 2.1.4. Discussion . . . . . . . . . . . . . . . . . . . . . 6 | 2.1.4. Discussion | |||
| 2.2. “Where we want to go” - Collaboration Principles . . . . 7 | 2.2. "Where We Want to Go" - Collaboration Principles | |||
| 2.2.1. First party collaboration for network management . . 7 | 2.2.1. First-Party Collaboration for Network Management | |||
| 2.2.2. Second and third party collaboration for network | 2.2.2. Second- and Third-Party Collaboration for Network | |||
| management . . . . . . . . . . . . . . . . . . . . . 8 | Management | |||
| 2.2.3. Visible, optional network management . . . . . . . . 9 | 2.2.3. Visible, Optional Network Management | |||
| 2.2.4. Discussion . . . . . . . . . . . . . . . . . . . . . 9 | 2.2.4. Discussion | |||
| 2.3. “How we get there” - Collaboration Use cases . . . . . . 10 | 2.3. "How We Get There" - Collaboration Use Cases | |||
| 2.3.1. Establishing expected contracts to enable security | 2.3.1. Establishing Expected Contracts to Enable Security | |||
| management . . . . . . . . . . . . . . . . . . . . . 10 | Management | |||
| 2.3.2. Zero Knowledge Middleboxes . . . . . . . . . . . . . 11 | 2.3.2. Zero-Knowledge Middleboxes | |||
| 2.3.3. Red Rover - A collaborative approach to content | 2.3.3. Red Rover - a Collaborative Approach to Content | |||
| filtering . . . . . . . . . . . . . . . . . . . . . . 12 | Filtering | |||
| 3. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 3. Conclusions | |||
| 4. Informative References . . . . . . . . . . . . . . . . . . . 13 | 4. Informative References | |||
| Appendix A. Position Papers . . . . . . . . . . . . . . . . . . 15 | Appendix A. Position Papers | |||
| A.1. Motivations and principles . . . . . . . . . . . . . . . 15 | A.1. Motivations and Principles | |||
| A.2. Classification and identification of encrypted traffic . 16 | A.2. Classification and Identification of Encrypted Traffic | |||
| A.3. Ideas for collaboration and coordination between devices | A.3. Ideas for Collaboration and Coordination between Devices | |||
| and networks . . . . . . . . . . . . . . . . . . . . . . 16 | and Networks | |||
| A.4. Other background material . . . . . . . . . . . . . . . . 16 | A.4. Other Background Material | |||
| Appendix B. Workshop participants . . . . . . . . . . . . . . . 16 | Appendix B. Workshop Participants | |||
| Appendix C. Program Committee . . . . . . . . . . . . . . . . . 17 | Appendix C. Program Committee | |||
| Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 17 | IAB Members at the Time of Approval | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 | Acknowledgments | |||
| Authors' Addresses | ||||
| 1. Introduction | 1. Introduction | |||
| The Internet Architecture Board (IAB) holds occasional workshops | ||||
| designed to consider long-term issues and strategies for the | ||||
| Internet, and to suggest future directions for the Internet | ||||
| architecture. This long-term planning function of the IAB is | ||||
| complementary to the ongoing engineering efforts performed by working | ||||
| groups of the Internet Engineering Task Force (IETF). | ||||
| User privacy and security are constantly being improved by | User privacy and security are constantly being improved by | |||
| increasingly strong and more widely deployed encryption. This | increasingly strong and more widely deployed encryption. This | |||
| workshop aims to discuss ways to improve network management | workshop aims to discuss ways to improve network management | |||
| techniques in support of even broader adoption of encryption on the | techniques in support of even broader adoption of encryption on the | |||
| Internet. | Internet. | |||
| Network management techniques need to evolve to work effectively and | Network management techniques need to evolve to work effectively and | |||
| reliably in the presence of ubiquitous traffic encryption and support | reliably in the presence of ubiquitous traffic encryption and to | |||
| techniques that enhance user privacy. In an all-encrypted network, | support user privacy. In an all-encrypted network, it is not viable | |||
| it is not viable to rely on unencrypted metadata for network | to rely on unencrypted metadata for network monitoring and security | |||
| monitoring and security functions, troubleshooting devices, and | functions, troubleshooting devices, and passive traffic measurements. | |||
| passive traffic measurements. New approaches are needed to track | New approaches are needed to track network behaviors, e.g., by | |||
| network behaviors, e.g., by directly cooperating with endpoints and | directly cooperating with endpoints and applications, increasing use | |||
| applications, increasing use of in-band telemetry, increasing use of | of in-band telemetry, increasing use of active measurement | |||
| active measurement approaches, and privacy-preserving inference | approaches, and privacy-preserving inference techniques. | |||
| techniques. | ||||
| The aim of this IAB online workshop from October 17-19, 2022, has | The aim of this IAB online workshop from October 17-19, 2022, has | |||
| been to provide a platform to explore the interaction between network | been to provide a platform to explore the interaction between network | |||
| management and traffic encryption and initiate new work on | management and traffic encryption and to initiate work on | |||
| collaborative approaches that promote security and user privacy while | collaborative approaches that promote security and user privacy while | |||
| supporting operational requirements. As such the workshop addressed | supporting operational requirements. As such, the workshop addressed | |||
| the following questions: | the following questions: | |||
| * What are actionable network management requirements? | * What are actionable network management requirements? | |||
| * Who is willing to work on collaborative solutions? | * Who is willing to work on collaborative solutions? | |||
| * What are the starting points for collaborative solutions? | * What are the starting points for collaborative solutions? | |||
| 1.1. About this workshop report content | 1.1. About This Workshop Report Content | |||
| This document is a report on the proceedings of the workshop. The | This document is a report on the proceedings of the workshop. The | |||
| views and positions documented in this report are those of the | views and positions documented in this report are those of the | |||
| expressed during the workshop by participants and do not necessarily | workshop participants and do not necessarily reflect IAB views and | |||
| reflect IAB views and positions. | positions. | |||
| Furthermore, the content of the report comes from presentations given | Furthermore, the content of the report comes from presentations given | |||
| by workshop participants and notes taken during the discussions, | by workshop participants and notes taken during the discussions, | |||
| without interpretation or validation. Thus, the content of this | without interpretation or validation. Thus, the content of this | |||
| report follows the flow and dialog of the workshop but does not | report follows the flow and dialog of the workshop but does not | |||
| attempt to capture a consensus. | attempt to capture a consensus. | |||
| 2. Workshop Scope and Discussion | 2. Workshop Scope and Discussion | |||
| The workshop was organized across three days with all-group | The workshop was held across three days with all-group discussion | |||
| discussion slots, one per day. The following topic areas were | slots, one per day. The following topic areas were identified, and | |||
| identified and the program committee organized paper submissions into | the program committee organized paper submissions into three main | |||
| three main themes for each of the three discussion slots. During | themes for each of the three discussion slots. During each | |||
| each discussion, those papers were presented sequentially with open | discussion, those papers were presented sequentially with open | |||
| discussion held at the end of each day. | discussion held at the end of each day. | |||
| 2.1. “Where we are” - Requirements and Passive Observations | 2.1. "Where We Are" - Requirements and Passive Observations | |||
| The first day of the workshop agenda focused on the existing state of | The first day of the workshop focused on the existing state of the | |||
| the relationship between network management and encrypted traffic | relationship between network management and encrypted traffic from | |||
| from various angles. Presentations ranged from discussing | various angles. Presentations ranged from discussing classifiers | |||
| classifiers using machine-learning to recognize traffic, to advanced | using machine learning to recognize traffic, to advanced techniques | |||
| techniques for evading traffic analysis, to user privacy | for evading traffic analysis, to user privacy considerations. | |||
| considerations. | ||||
| After an introduction that covered the goals of the workshop and the | After an introduction that covered the goals of the workshop and the | |||
| starting questions (as described in Section 1), there were four | starting questions (as described in Section 1), there were four | |||
| presentations, followed by open discussion. | presentations followed by open discussion. | |||
| 2.1.1. Traffic classification and network management | 2.1.1. Traffic Classification and Network Management | |||
| Many existing network management techiques are passive in nature: | Many existing network management techniques are passive in nature: | |||
| they don't rely on an explicit signals from end hosts to negotiate | they don't rely on explicit signals from end hosts to negotiate with | |||
| with network middleboxes, but instead rely on inspecting packets to | network middleboxes but instead rely on inspecting packets to | |||
| recognize traffic and apply various policies. Traffic | recognize traffic and apply various policies. Traffic | |||
| classification, as a passive technique, is being challenged by | classification, as a passive technique, is being challenged by | |||
| increasing encryption. | increasing encryption. | |||
| Traffic classification is commonly performed by networks to infer | Traffic classification is commonly performed by networks to infer | |||
| what applications and services are being used. This information is | what applications and services are being used. This information is | |||
| in turn used for capacity and resource planning, Quality-of-Service | in turn used for capacity and resource planning, Quality-of-Service | |||
| (QoS) monitoring, traffic prioritization, network access control, | (QoS) monitoring, traffic prioritization, network access control, | |||
| identity management, and malware detection. However, since | identity management, and malware detection. However, since | |||
| classification traditionally relies on recognizing unencrypted | classification commonly relies on recognizing unencrypted properties | |||
| properties of packets in a flow, increasing encryption of traffic can | of packets in a flow, increasing encryption of traffic can decrease | |||
| decrease the effectiveness of classification. | the effectiveness of classification. | |||
| The amount of classification that can be performed on traffic also | The amount of classification that can be performed on traffic also | |||
| provides a useful insight onto how "leaky" the protocols used by | provides useful insight into how "leaky" the protocols used by | |||
| applications are, and points to areas where information is visible to | applications are and points to areas where information is visible to | |||
| any observer, which may be malicious or not. | any observer, who may or may not be malicious. | |||
| Traditionally, classification has been based on experts crafting | Frequently, classification has been based on specific rules crafted | |||
| specific rules, but there is also a move toward using maching | by experts, but there is also a move toward using machine learning to | |||
| learning to recognize patterns. "Deep learning" machine learning | recognize patterns. "Deep learning" machine-learning models | |||
| models generally rely on analyzing a large set of traffic over time, | generally rely on analyzing a large set of traffic over time and have | |||
| and have trouble reacting quickly to changes in traffic patterns. | trouble reacting quickly to changes in traffic patterns. | |||
| Models that are based on closed-world data sets also become less | Models that are based on closed-world data sets also become less | |||
| useful over time, as traffic changes. [JIANG] describes experiments | useful over time as traffic changes. [JIANG] describes experiments | |||
| that showed that a model that performs with high accuracy on an | that show that a model that performed with high accuracy on an | |||
| initial data set became severely degraded when running on a newer | initial data set becomes severely degraded when running on a newer | |||
| data set that contained traffic from the same applications. Even in | data set that contains traffic from the same applications. Even in | |||
| as little time as one week, the traffic classification would become | as little time as one week, the traffic classification would become | |||
| degraded. However, the set of features in packets and flows that | degraded. However, the set of features in packets and flows that | |||
| were useful for models stayed mostly consistent, even if the models | were useful for models stayed mostly consistent, even if the models | |||
| themselves needed to be updated. Models where the feature space is | themselves needed to be updated. Models where the feature space is | |||
| reduced to fewer features showed better resiliency, and could be | reduced to fewer features showed better resiliency and could be | |||
| retrained more quickly. Based on this, [JIANG] recommends more work | retrained more quickly. Based on this, [JIANG] recommends more work | |||
| and research on determining which set of features in IP packets are | and research to determine which set of features in IP packets are | |||
| most useful for focused machine learning analysis. [WU] also | most useful for focused machine-learning analysis. [WU] also | |||
| recommends further research investment in Artificial Intelligent (AI) | recommends further research investment in Artificial Intelligence | |||
| analysis for network management. | (AI) analysis for network management. | |||
| 2.1.2. Preventing traffic analysis | 2.1.2. Preventing Traffic Analysis | |||
| Just as traffic classification is continually adapting, techniques to | Just as traffic classification is continually adapting, techniques to | |||
| prevent traffic analysis and obfuscate application and user traffic | prevent traffic analysis and to obfuscate application and user | |||
| are continually evolving. An invited talk from the authors of | traffic are continually evolving. An invited talk from the authors | |||
| [DITTO] shared a novel approach with the workshop for how to build a | of [DITTO] shared a novel approach with the workshop for how to build | |||
| very robust system to prevent unwanted traffic analysis. | a very robust system to prevent unwanted traffic analysis. | |||
| Usually traffic obfuscation is performed by changing the timing of | Usually traffic obfuscation is performed by changing the timing of | |||
| packets or adding padding data. The practices can be costly and | packets or by adding padding to data. The practices can be costly | |||
| negatively impact performance. DITTO demonstrated the feasibility of | and negatively impact performance. [DITTO] demonstrated the | |||
| applying traffic obfuscation on aggregated traffic in the network | feasibility of applying traffic obfuscation on aggregated traffic in | |||
| with minimal overhead and in line speed. | the network with minimal overhead and inline speed. | |||
| While traffic obfuscation techniques are today not widely deployed, | While traffic obfuscation techniques are not widely deployed today, | |||
| this study underlines, together with the need for continuous effort | this study underlines the need for continuous effort to keep traffic | |||
| to keep traffic models updated over time, the challenges of | models updated over time, the challenges of the classification of | |||
| classification of encrypted traffic as well as opportunities to | encrypted traffic, as well as the opportunities to further enhance | |||
| further enhance user privacy. | user privacy. | |||
| 2.1.3. Users and privacy | 2.1.3. Users and Privacy | |||
| The Privacy Enhancements and Assessments Research Group is working on | The Privacy Enhancements and Assessments Research Group (PEARG) is | |||
| a document to discuss guidelines for how to measure traffic on the | working on a document to discuss guidelines for measuring traffic on | |||
| Internet in a safe and privacy-friendly way | the Internet in a safe and privacy-friendly way [LEARMONTH]. These | |||
| ([I-D.irtf-pearg-safe-internet-measurement]). These guidelines and | guidelines and principles provide another view on the discussion of | |||
| principles provide another angle onto the discussion of passive | passive classification and analysis of traffic. | |||
| classification and analysis of traffic. | ||||
| Consent for collection and measurement of metadata is an important | Consent for collection and measurement of metadata is an important | |||
| consideration in deploying network measurement techniques. This | consideration in deploying network measurement techniques. This | |||
| consent can be explicitly given as informed consent, or can be given | consent can be given explicitly as informed consent, given by proxy, | |||
| by proxy or be only implied. For example, a user of a network might | or may be only implied. For example, a user of a network might need | |||
| need to consent to certain measurement and traffic treatment when | to consent to certain measurement and traffic treatment when joining | |||
| joining a network. | a network. | |||
| Various techniques for data collection can also improve user privacy, | Various techniques for data collection can also improve user privacy, | |||
| such as discarding data after a short period of time, masking out | such as discarding data after a short period of time, masking aspects | |||
| aspects of data that contain user-identifying information, reducing | of data that contain user-identifying information, reducing the | |||
| the accuracy of collected data, and aggregating data. | accuracy of collected data, and aggregating data. | |||
| 2.1.4. Discussion | 2.1.4. Discussion | |||
| The intents and goals of users, application developers, and network | The intents and goals of users, application developers, and network | |||
| operators align in some cases, but not others. One of the recurring | operators align in some cases, but not in others. One of the | |||
| challenges that came up was not having a clear way to understand or | recurring challenges that was discussed was the lack of a clear way | |||
| communicate intents and requirements. Both traffic classification | to understand or to communicate intents and requirements. Both | |||
| and traffic obfuscation attempt to change the visibility of traffic | traffic classification and traffic obfuscation attempt to change the | |||
| without cooperation of other parties: traffic classification is a | visibility of traffic without cooperation of other parties: traffic | |||
| network attempting to inspect application traffic without | classification is an attempt by the network to inspect application | |||
| coordination from applications, and traffic obfuscation is an attempt | traffic without coordination from applications, and traffic | |||
| to hide that same traffic as it transits a network. | obfuscation is an attempt by the application to hide that same | |||
| traffic as it transits a network. | ||||
| Traffic adaptation and prioritization is one dimension in which the | Traffic adaptation and prioritization is one dimension in which the | |||
| incentives for cooperation seem most clear. Even if an application | incentives for cooperation seem most clear. Even if an application | |||
| is trying to prevent leaking metadata, it could benefit from signals | is trying to prevent the leaking of metadata, it could benefit from | |||
| from network about sudden capacity changes that can help it adapt its | signals from the network about sudden capacity changes that can help | |||
| application quality, such as bitrates and codecs. Such signalling | it adapt its application quality, such as bitrates and codecs. Such | |||
| may not be appropriate for the most privacy-sensitive applications, | signaling may not be appropriate for the most privacy-sensitive | |||
| like Tor, but could be applicable for many others. There are | applications, like Tor, but could be applicable for many others. | |||
| existing protocols that involve explicit signaling between | There are existing protocols that involve explicit signaling between | |||
| applications and networks, such as Explicit Congestion Notification | applications and networks, such as Explicit Congestion Notification | |||
| (ECN) [RFC3168], but that has yet to see wide adoption. | (ECN) [RFC3168], but that has yet to see wide adoption. | |||
| Managed networks (such a private corporate networks) was brought up | Managed networks (such as private corporate networks) were brought up | |||
| in several comments as a particularly challenging area for being able | in several comments as particularly challenging for meeting | |||
| to meet management requirements while maintaining encryption and | management requirements while maintaining encryption and privacy. | |||
| privacy. These networks can have legal and regulated requirements | These networks can have legal and regulated requirements for | |||
| for detection of specific fraudulent or malicious traffic. | detection of specific fraudulent or malicious traffic. | |||
| Personal networks that enable managed parental controls have similar | Personal networks that enable managed parental controls have similar | |||
| complications with encrypted traffic and user privacy. In these | complications with encrypted traffic and user privacy. In these | |||
| scenarios, the parental controls being operated by the network may be | scenarios, the parental controls that are operated by the network may | |||
| as simple as a DNS filter, and can be made ineffective by a device | be as simple as a DNS filter, which can be made ineffective by a | |||
| routing traffic to an alternate DNS resolver. | device routing traffic to an alternate DNS resolver. | |||
| 2.2. “Where we want to go” - Collaboration Principles | 2.2. "Where We Want to Go" - Collaboration Principles | |||
| The second day of the workshop agenda focused on the emerging | The second day of the workshop focused on the emerging techniques for | |||
| techniques for analysing, managing or monitoring encrypted traffic. | analyzing, managing, or monitoring encrypted traffic. Presentations | |||
| Presentations ranged from discussing advanced classification and | covered advanced classification and identification, including | |||
| identification, including machine-learning techniques, for the | machine-learning techniques, for the purposes of managing network | |||
| purposes of manging network flows, monitoring or monetising usage. | flows or monitoring or monetizing usage. | |||
| After an introduction that covered the goals of the workshop and the | After an introduction that covered the goals of the workshop and the | |||
| starting questions (as described in Section 1), there were three | starting questions (as described in Section 1), there were three | |||
| presentations, followed by open discussion. | presentations, followed by open discussion. | |||
| 2.2.1. First party collaboration for network management | 2.2.1. First-Party Collaboration for Network Management | |||
| It is the intention of encryption to create a barrier between | It is the intent of end-to-end encryption of traffic to create a | |||
| entities inside the communication channel and everyone else, | barrier between entities inside the communication channel and | |||
| including network operators, considering end-to-end encryption of | everyone else, including network operators. Therefore, any attempt | |||
| traffic. Any attempt, therefore, to overcome that intentional | to overcome that intentional barrier requires collaboration between | |||
| barrier requires an intent to collaborate between the inside and | the inside and outside entities. At a minimum, those entities must | |||
| outside entities. Those entities must, at a minimum, agree on the | agree on the benefits of overcoming the barrier (or solving the | |||
| benefits to overcoming the barrier (or solving the problem), that | problem), agree that costs are proportional to the benefits, and | |||
| costs are proportional to the benefits, and to additional | agree to additional limitations or safeguards against bad behavior by | |||
| limitations, or safeguards, against bad behaviour by collaborators | collaborators including other non-insiders [BARNES]. | |||
| including the inclusion of other non-insiders [BARNES]. | ||||
| The Internet is designed interoperably, which means an outside entity | The Internet is designed interoperably, which means an outside entity | |||
| wishing to collaborate with the inside might be any number of | wishing to collaborate with the inside might be any number of | |||
| intermediaries and not, say, a specific person that can be trusted in | intermediaries and not, say, a specific person that can be trusted in | |||
| the human sense. Additionally the use of encryption, especially | the human sense. Additionally, the use of encryption, especially | |||
| network-layer or transport-layer encryption, introduces dynamic or | network-layer or transport-layer encryption, introduces dynamic or | |||
| opportunitistic or perfunctory discoverability. These realities both | opportunistic or perfunctory discoverability. These realities point | |||
| point to a need to interrogate the reason why any outside entity | to a need to ask why an outside entity might make an engineering case | |||
| might make an engineering case to collaborate with the user of a | to collaborate with the user of a network with encrypted traffic and | |||
| network with encrypted traffic, and whether the tradeoffs and | to ask whether the trade-offs and potential risks are worth it to the | |||
| potential risks are worth it to the user. | user. | |||
| However, the answers cannot be specific and the determinations or | However, the answers cannot be specific, and the determinations or | |||
| guidance need to be general as the encryption boundary is inevitably | guidance need to be general as the encryption boundary is inevitably | |||
| an application used by many people. Tradeoffs must make sense to | an application used by many people. Trade-offs must make sense to | |||
| users who are unlikely to be thinking about network management | users who are unlikely to be thinking about network management | |||
| considerations. Harms need to be preemptively reduced because in | considerations. Harms need to be preemptively reduced because, in | |||
| general terms few users would choose network management benefits over | general terms, few users would choose network management benefits | |||
| their own privacy if given the choice. | over their own privacy if given the choice. | |||
| Some have found that there appears to be little if any actual | Some have found that there appears to be little, if any, evidence | |||
| evidence that encryption is causing user-meaningful network problems. | that encryption causes network problems that are meaningful to the | |||
| Since alignment on problem-solving is a prerequisite to collaboration | user. Since alignment on problem solving is a prerequisite to | |||
| on a solution it does not seem that collaboration across the | collaboration on a solution, it does not seem that collaboration | |||
| encryption boundary is called for. | across the encryption boundary is called for. | |||
| 2.2.2. Second and third party collaboration for network management | 2.2.2. Second- and Third-Party Collaboration for Network Management | |||
| Even with the wide-scale deployment of encryption in new protocols | Even with the wide-scale deployment of encryption in new protocols | |||
| and techniques that prevent passive observers of network traffic from | and of techniques that prevent passive observers of network traffic | |||
| knowing the content of exchanged communications, important | from knowing the content of exchanged communications, important | |||
| information such as which parties communicate and sometimes even | information, such as which parties communicate and sometimes even | |||
| which services have been requested may still be able to be deduced. | which services have been requested, may still be able to be deduced. | |||
| The future is to conceal more data and metadata from passive | The future is to conceal more data and metadata from passive | |||
| observers and also to minimize information exposure to second parties | observers and also to minimize information exposure to second parties | |||
| (where the user is the first party) by, maybe counterintuitively, | (where the user is the first party) by, maybe counterintuitively, | |||
| introducing third-party relay services to intermediate | introducing third-party relay services to intermediate | |||
| communications. As discussed in [KUEHLEWIND], the relay is a | communications. As discussed in [KUEHLEWIND], the relay is a | |||
| mechanism to separate (using additional levels of encryption) two | mechanism that uses additional levels of encryption to separate two | |||
| important pieces of information: knowledge of the identity of the | important pieces of information: knowledge of the identity of the | |||
| person accessing a service is separated from knowledge about the | person accessing a service is separated from knowledge about the | |||
| service being accessed. By contrast a VPN uses only one level of | service being accessed. By contrast, a VPN uses only one level of | |||
| encryption and does not separate identity (first party) and service | encryption and does not separate identity (first party) and service | |||
| (second party) metadata. | (second party) metadata. | |||
| Relay mechanisms are termed "oblivious", there is a future for | Relay mechanisms are termed "oblivious", there is a future for | |||
| specifications in privacy-preserving measurement (PPM), and protocols | specifications in privacy-preserving measurement (PPM), and protocols | |||
| like Multiplexed Application Substrate over QUIC Encryption (MASQUE) | like Multiplexed Application Substrate over QUIC Encryption (MASQUE) | |||
| are discussed in the IETF. In various schemes, users are ideally | are discussed in the IETF. In various schemes, users are ideally | |||
| able to share their identity only with the entity they have | able to share their identity only with the entity they have | |||
| identified as a trusted one. That data is not shared with the | identified as a trusted one. That data is not shared with the | |||
| service provider. However this is more complicated for network | service provider. However, this is more complicated for network | |||
| management, but there may be opportunities for better collaboration | management, but there may be opportunities for better collaboration | |||
| between the network and, say, the application or service at the | between the network and, say, the application or service at the | |||
| endpoint. | endpoint. | |||
| A queriable relay mechanism could preserve network management | A queriable relay mechanism could preserve network management | |||
| functions that are disrupted by encryption, such as TCP optimisation, | functions that are disrupted by encryption, such as TCP optimization, | |||
| quality of service, zero-rating, parental controls, access control, | quality of service, zero-rating, parental controls, access control, | |||
| redirection, content enhancement, analytics and fraud prevention. | redirection, content enhancement, analytics, and fraud prevention. | |||
| Instead of encrypting communication between only two ends with | ||||
| Instead of encrypted communication between only two ends and passive | passive observation by all on-path elements, intermediate relays | |||
| observation by all on-path elements, intermediate relays could be | could be introduced as trusted parties that get to see limited | |||
| trusted parties with limited information for the purposes of | information for the purpose of collaboration between in-network | |||
| collaboration between in-network intermediary services' support. | intermediary services. | |||
| 2.2.3. Visible, optional network management | 2.2.3. Visible, Optional Network Management | |||
| In encrypted communications, out of all of the possible network | Out of all of the possible network management functions that might be | |||
| management functions that might be ameliorated by proxying, the | ameliorated by proxying, the ability to control congestion in | |||
| ability to control congestion has been researched in depth. These | encrypted communications has been researched in depth. These | |||
| techniques are realized based on TCP performance enhancing proxies | techniques are realized based on TCP performance-enhancing proxies | |||
| (PEP) that either entirely intercept a TCP connection or interfere | (PEPs) that either entirely intercept a TCP connection or interfere | |||
| with the transport information in the TCP header. However, despite | with the transport information in the TCP header. However, despite | |||
| the challenge that the new encrypted protocol will limit any such in- | the challenge that the new encrypted protocol will limit any such in- | |||
| network interference, these techniques can also have a negative | network interference, these techniques can also have a negative | |||
| impact on the evolvability of these protocols. Therefore, instead of | impact on the evolvability of these protocols. Therefore, a new | |||
| manipulating existing information, a new approach was presented where | approach was presented where, instead of manipulating existing | |||
| additional information is send using a so-called side-car protocol | information, additional information is sent using a so-called sidecar | |||
| independent of the main transport protocol that is used end-to-end | protocol independent of the main transport protocol that is used end | |||
| [WELZL]. E.g. side car information can contain additional | to end [WELZL]. For example, sidecar information can contain | |||
| acknowledgements to enable in-network local retransmission faster | additional acknowledgments to enable in-network local retransmission | |||
| end-to-end retransmission by reducing the signaling round trip time. | or faster end-to-end retransmission by reducing the signaling round- | |||
| trip time. | ||||
| Taking user privacy benefits for granted, there is a need to | Taking user privacy benefits for granted, there is a need to | |||
| investigate the comparable performance outputs of various encrypted | investigate the comparable performance outputs of various encrypted | |||
| traffic configurations such as use of an additional "side-car" | traffic configurations such as the use of an additional sidecar | |||
| protocol, or explicit encrypted and trusted network communication | protocol, or explicit encrypted and trusted network communication | |||
| using MASQUE in relation to existing techniques such as TCP | using MASQUE in relation to existing techniques such as TCP PEPs, | |||
| performance enhancing proxies (PEP), etc. | etc. | |||
| 2.2.4. Discussion | 2.2.4. Discussion | |||
| One size fits all? On the issue of trust, different networks or | One size fits all? On the issue of trust, different networks or | |||
| devices are going to have different requirements for the level of | devices will have different trust requirements for devices, users, or | |||
| trust that they have in devices, users or each other, and vice versa. | each other, and vice versa. For example, imagine two networks with | |||
| For example, imagine networks with really different security | really different security requirements, like a home network with a | |||
| requirements, like protecting children in a home versus a national | requirement to protect its child users versus a national security | |||
| security institution. How could one network architecture solve the | institution's network. How could one network architecture solve the | |||
| needs of all use cases? | needs of all use cases? | |||
| Does our destination have consequences? It seems sometimes that | Does our destination have consequences? It seems sometimes that | |||
| there may be consequences many years down the line of ubiquitous, | there may be future consequences caused by the ubiquitous, strong | |||
| strong encryption of network traffic because it will cause a reaction | encryption of network traffic because it will cause intermediaries to | |||
| by intermediaries to find ways to poke holes in what are supposed to | poke holes in what are supposed to be long-term solutions for user | |||
| be long-term solutions for user privacy and security. | privacy and security. | |||
| Can we bring the user along? While there has been a focus on the | Can we bring the user along? While there has been a focus on the | |||
| good reasons for why people might collaborate across the encryption | good reasons why people might collaborate across the encryption | |||
| barrier, there will always be others who want to disrupt that because | barrier, there will always be others who want to disrupt that in | |||
| they are motivated to exploit the data for their own gain, and | order to exploit the data for their own gain, and sometimes | |||
| sometimes this is called innovation. What high-level policy | exploitation is called innovation. High-level policy mitigations | |||
| mitigations have done is to expose how powerless end users are to | have exposed how powerless end users are against corporate practices | |||
| corporate practices of data harvesting. And yet interfaces to help | of data harvesting. And yet interfaces to help users understand | |||
| users understand these lower layer traffic flows to protect their | these lower-layer traffic flows to protect their financial | |||
| financial transactions or privacy haven't been achieved yet. That | transactions or privacy haven't been achieved yet. That means that | |||
| means that engineers are having to make inferences about what users | engineers must make inferences about user wants. Instead, we should | |||
| want. Instead we should be making these relationships and tradeoffs | make these relationships and trade-offs more visible. | |||
| more visible. | ||||
| 2.3. “How we get there” - Collaboration Use cases | 2.3. "How We Get There" - Collaboration Use Cases | |||
| The third day focused on techniques that could actually be used to | The third day focused on techniques that could be used to improve the | |||
| improve management of encrypted networks. A central theme of all of | management of encrypted networks. | |||
| the presentations about potential proposed paths forward included | The potential paths forward described in the presentations included | |||
| some element of collaboration between networks and subscribing | some element of collaboration between the networks and the | |||
| clients that simultaneously want both privacy and protection. Thus, | subscribing clients that simultaneously want both privacy and | |||
| the central theme in the third day became negotiation and | protection. Thus, the central theme of the third day became | |||
| collaboration. | negotiation and collaboration. | |||
| 2.3.1. Establishing expected contracts to enable security management | 2.3.1. Establishing Expected Contracts to Enable Security Management | |||
| When thinking about enterprise networks where client behavior is | For enterprise networks where client behavior is potentially managed, | |||
| potentially managed, [COLLINS] proposes "Improving network monitoring | [COLLINS] proposes "Improving network monitoring through contracts", | |||
| through contracts", where contracts describe different states of | where contracts describe different states of network behavior. | |||
| network behavior. | ||||
| Because network operators have a limited amount of time to focus on | Because network operators have a limited amount of time to focus on | |||
| problems and process alerts, contracts and states let the operator | problems and process alerts, contracts and states let the operator | |||
| focus on a particular aspect of a current situation or problem. The | focus on a particular aspect of a current situation or problem. The | |||
| current estimate for the number of events a Security Operations | current estimate for the number of events a Security Operations | |||
| Center (SOC) operator can handle is about 10 per hour. Operators | Center (SOC) operator can handle is about 10 per hour. Operators | |||
| must work within the limits imposed by their organization, and must | must work within the limits imposed by their organization and must | |||
| pick between options that frequently only frustrate attackers -- | pick among options that frequently only frustrate attackers -- | |||
| entirely preventing attacks is potentially impossible. Finally, | preventing attacks entirely is potentially impossible. Finally, | |||
| operators must prioritize and manage the most events possible. | operators must prioritize and manage the most events possible. | |||
| Validating which alerts are true positives is challenging because | Validating which alerts are true positives is challenging because | |||
| lots of weird traffic creates many anomalies and not all anomalies | lots of weird traffic creates many anomalies, and not all anomalies | |||
| are malicious events. Identifying what anomalous traffic is rooted | are malicious events. Identifying which anomalous traffic is rooted | |||
| in malicious activity with any level of certainty is extremely | in malicious activity with any level of certainty is extremely | |||
| challenging. Unfortunately, applying the latest machine learning | challenging. Unfortunately, applying the latest machine-learning | |||
| techniques has only produced mixed results. To make matters worse, | techniques has produced mixed results. To make matters worse, the | |||
| the large amounts of Internet-wide scanning has resulted in endless | large amounts of Internet-wide scanning has resulted in endless | |||
| traffic that is technically malicious but only creates an information | traffic that is technically malicious but only creates an information | |||
| overload and challenges event prioritization. Any path forward must | overload and challenges event prioritization. Any path forward must | |||
| succeed in freeing up analyst time to concentrate on the more | free up analyst time to concentrate on the more challenging events. | |||
| challenging events. | ||||
| The proposed contract solution is to define a collection of | The proposed contract solution is to define a collection of | |||
| acceptable behaviors categorized into an envelope of different states | acceptable behaviors that comprises different states that might | |||
| that might include IP addresses, domain names, and indicators of | include IP addresses, domain names, and indicators of compromise. | |||
| compromise. Deviation from a contract might indicate that a system | Deviation from a contract might indicate that a system is acting | |||
| is acting outside a normal mode of behavior, or even a normal mode of | outside a normal mode of behavior or even that a normal mode of | |||
| behavior is suddenly missing. An example contract might be "this | behavior is suddenly missing. An example contract might be "this | |||
| system is expected to update its base OS once a day", and if this | system is expected to update its base OS once a day". If this | |||
| doesn't occur then this expectation has not been met and the system | doesn't occur, then this expectation has not been met, and the system | |||
| should be checked as it failed to call home to look for (potentially | should be checked as it failed to call home to look for (potentially | |||
| security related) updates. | security-related) updates. | |||
| Within the IETF, the Manufacturer Usage Description Specification | Within the IETF, the Manufacturer Usage Description Specification | |||
| (MUD) {?RFC8520} specification is one subset of contracts. Note that | (MUD) [RFC8520] is one subset of contracts. Note that contracts are | |||
| contracts are likely to only succeed in a constrained, expected | likely to succeed only in a constrained, expected environment | |||
| environment maintained by operational staff, and may not work in an | maintained by operational staff and may not work in an open Internet | |||
| open internet environment where end users are driving all network | environment where end users drive all network connections. | |||
| connections. | ||||
| 2.3.2. Zero Knowledge Middleboxes | 2.3.2. Zero-Knowledge Middleboxes | |||
| The world is not only shifting to increased encrypted traffic but is | The world is not only shifting to increased encrypted traffic but is | |||
| also encrypting more and more of the metadata (e.g. DNS queries and | also encrypting more and more of the metadata (e.g., DNS queries and | |||
| responses). This makes network policy enforcement by middleboxes | responses). This makes network policy enforcement by middleboxes | |||
| significantly more challenging. The result is the creation of a | significantly more challenging. The result is a significant tension | |||
| significant tension between security enforcement and privacy | between security enforcement and privacy protection. | |||
| protection. | ||||
| A goal for solving this problem should include not weakening | Goals for solving this problem should include enabling networks to | |||
| encryption, should enable networks to enforce their policies, and | enforce their policies, but should not include the weakening of | |||
| should ideally not require newly deployed server software. Existing | encryption nor the deployment of new server software. Existing | |||
| solutions fail with at least one of these points. | solutions fail to meet at least one of these points. | |||
| A cryptographic principle of a "zero-knowledge proof" (ZKP) [GRUBBS] | A cryptographic principle of a "zero-knowledge proof" (ZKP) [GRUBBS] | |||
| maybe one path forward to consider. A ZKP allows a third party to | may be one path forward to consider. A ZKP allows a third party to | |||
| verify that a statement is true, without revealing what the statement | verify that a statement is true without revealing what the statement | |||
| actually is. Applying this to network traffic has been shown to | actually is. Applying this to network traffic has been shown to | |||
| allow a middlebox to verify that traffic to a web server is actually | allow a middlebox to verify that traffic to a web server is compliant | |||
| compliant with a policy without revealing the actual contents. This | with a policy without revealing the actual contents. This solution | |||
| solution meets the above three criteria. Using ZKP within TLS 1.3 | meets the three criteria listed above. Using ZKP within TLS 1.3 | |||
| traffic turns out to be plausible. | traffic turns out to be plausible. | |||
| An example engine was built to test ZKP using encrypted DNS. Clients | An example engine using encrypted DNS was built to test ZKP. Clients | |||
| were able to create DNS requests that were not listed within a DNS | were able to create DNS requests that were not listed within a DNS | |||
| block list. Middleboxes could verify, without knowing the exact | block list. Middleboxes could verify, without knowing the exact | |||
| request, that the client's DNS request was not in the prohibited | request, that the client's DNS request was not on the prohibited | |||
| list. Although the result was functional, the computational overhead | list. Although the result was functional, the computational overhead | |||
| was still too slow and future work will be needed to decrease the ZKP | was still too slow, and future work will be needed to decrease the | |||
| imposed latencies. | ZKP-imposed latencies. | |||
| 2.3.3. Red Rover - A collaborative approach to content filtering | 2.3.3. Red Rover - a Collaborative Approach to Content Filtering | |||
| The principle challenge being studied is how to deal with the inherit | The principle challenge being studied is how to handle the inherent | |||
| conflict between filtering and privacy. Network operators need to | conflict between filtering and privacy. Network operators need to | |||
| implement policies and regulations that can originate from many | implement policies and regulations that can originate from many | |||
| locations (e.g. security, governmental, parental, etc). Conversely, | locations (e.g., security, governmental, parental, etc.). | |||
| clients need to protect user's privacy and user security. | Conversely, clients need to protect their users' privacy and | |||
| security. | ||||
| Safe browsing, originally created by Google, is one example of a | Safe browsing, originally created by Google, is one example of a | |||
| mechanism that tries to meet both sides of this conflict. It would | mechanism that tries to meet both sides of this conflict. It would | |||
| be beneficial to standardize this and other similar mechanisms. | be beneficial to standardize this and other similar mechanisms. | |||
| Operating systems could continually protect their users by ensuring | Operating systems could continually protect their users by ensuring | |||
| that malicious destinations are not being reached. This would | that malicious destinations are not being reached. This would | |||
| require some coordination between cooperating clients and servers | require some coordination between cooperating clients and servers | |||
| offering protection services. These collaborative solutions may be | offering protection services. These collaborative solutions may be | |||
| the best compromise between the tension of privacy vs protection | the best compromise to resolve the tension between privacy services | |||
| based services [PAULY]. | and protection services [PAULY]. | |||
| 3. Conclusions | 3. Conclusions | |||
| Looking forward, the workshop participants identified that solving | Looking forward, the workshop participants identified that solving | |||
| the entire problem space with a single approach will be challenging | the entire problem space with a single approach will be challenging | |||
| for several reasons: | for several reasons: | |||
| * The scalability of many solutions will likely be an issue as some | * The scalability of many solutions will likely be an issue as some | |||
| solutions are complex or expensive to implement. | solutions are complex or expensive to implement. | |||
| * Collaboration between multiple parties will be required for many | * Collaboration between multiple parties will be required for many | |||
| mechanisms to function, and the sets of parties required for | mechanisms to function, and the sets of parties required for | |||
| different use cases might be disjoint. | different use cases might be disjoint. | |||
| * There is an unanswered question of whether or not network | * There is an unanswered question of whether or not network | |||
| operators be willing to participate and allow technologies into | operators are willing to participate by allowing new encryption | |||
| their environment requirements in exchange for technologies that | technologies into their environment in exchange for technologies | |||
| prove their clients are being good net-citizens. If so, some of | that prove their clients are being good net-citizens. If so, some | |||
| these solutions might be required to exist before networks allow a | of these solutions might be required to exist before networks | |||
| certain type of increased encryption; consider the example of TLS | allow a certain type of increased encryption; consider the example | |||
| Encrypted Client Hello being blocked by some network operators. | of TLS Encrypted Client Hello being blocked by some network | |||
| operators. | ||||
| The breadth of the problem space itself is another complicating | The breadth of the problem space itself is another complicating | |||
| factor. There is a wide variety of network architectures, and each | factor. There is a wide variety of network architectures, and each | |||
| has different requirements for both data encryption and network | has different requirements for both data encryption and network | |||
| management. Each problem space will have different encumbrances of | management. Each problem space will have multiple, different | |||
| multiple types; for example, technical, legal, data ownership, and | encumbrances: for example, technical, legal, data ownership, and | |||
| regulatory concerns. New network architectures might be needed to | regulatory concerns. New network architectures might be needed to | |||
| solve this problem at a larger scope, which would in turn require | solve this problem at a larger scope, which would in turn require | |||
| interoperability support from network product vendors. Education | interoperability support from network product vendors. Education | |||
| about various solutions will be required in order to ensure | about various solutions will be required in order to ensure | |||
| regulation and policy organizations can understand and thus support | regulation and policy organizations can understand and thus support | |||
| the deployment of developed solutions. | the deployment of developed solutions. | |||
| After new technologies and related standards are developed and | After new technologies and related standards are developed and | |||
| deployed, unintended consequences can emerge that weren't considered | deployed, unintended consequences can emerge. These lead to effects | |||
| during the design of the protocol. These lead to effects in multiple | in multiple directions: on one hand, exposed protocol values not | |||
| directions: on one hand, exposed protocol values not intended for | intended for network management might be used by networks to | |||
| network management might be used by networks to differentiate | differentiate traffic; on the other hand, changes to a protocol that | |||
| traffic; on the other hand, changes to a protocol might have impact | break existing use cases might have an impact on private network | |||
| on private network deployments that break existing use cases. While | deployments. While making decisions on technology direction and | |||
| making decisions on technology direction and protocol design, it is | protocol design, it is important to consider the impact on various | |||
| important to consider the impact on various kinds of network | kinds of network deployments and their unique requirements. When | |||
| deployments and their unique requirements. When protocols change to | protocols change to make different network management functions | |||
| make different network management functions easier or harder, the | easier or harder, the impact on various deployment models ought to be | |||
| impact on various deployment models ought to be considered and | considered and documented. | |||
| documented. | ||||
| 4. Informative References | 4. Informative References | |||
| [BARNES] Barnes, R., "What’s In It For Me? Revisiting the reasons | [BARNES] Barnes, R., "What's In It For Me? Revisiting the reasons | |||
| people collaborate", August 2022, | people collaborate", August 2022, <https://www.iab.org/wp- | |||
| <https://github.com/intarchboard/m-ten- | content/IAB-uploads/2023/11/Barnes-Whats-In-It-For-Me- | |||
| workshop/blob/main/papers/Barnes-Whats-In-It-For-Me- | ||||
| Revisiting-the-reasons-people-collaborate.pdf>. | Revisiting-the-reasons-people-collaborate.pdf>. | |||
| [CASAS] Casas, P., "Monitoring User-Perceived Quality in an | [CASAS] Casas, P., "Monitoring User-Perceived Quality in an | |||
| Encrypted Internet", August 2022, | Encrypted Internet - AI to the Rescue", August 2022, | |||
| <https://github.com/intarchboard/workshop-m- | <https://www.iab.org/wp-content/IAB-uploads/2023/11/Casas- | |||
| ten/blob/main/papers/Casas-AI-driven-real-time-QoE- | AI-driven-real-time-QoE-monitoring-encrypted-traffic.pdf>. | |||
| monitoring-encrypted-traffic.pdf>. | ||||
| [COLLINS] Collins, M., "Improving Network Monitoring Through | [COLLINS] Collins, M., "Improving Network Monitoring Through | |||
| Contracts", August 2022, <https://github.com/intarchboard/ | Contracts", August 2022, <https://www.iab.org/wp-content/ | |||
| workshop-m-ten/blob/main/papers/Collins-Improving-Network- | IAB-uploads/2023/11/Collins-Improving-Network-Monitoring- | |||
| Monitoring-Through-Contracts.pdf>. | Through-Contracts.pdf>. | |||
| [DERI] Deri, L., "nDPI Research Proposal", August 2022, | [DERI] Deri, L., "nDPI Research Proposal", August 2022, | |||
| <https://github.com/intarchboard/workshop-m- | <https://www.iab.org/wp-content/IAB-uploads/2023/11/Deri- | |||
| ten/blob/main/papers/Deri-nDPI-Research-Proposal.pdf>. | nDPI-Research-Proposal.pdf>. | |||
| [DITTO] Meier, R., Lenders, V., and L. Vanbever, "Ditto - WAN | [DITTO] Meier, R., Lenders, V., and L. Vanbever, "ditto: WAN | |||
| Traffic Obfuscation at Line Rate", April 2022, | Traffic Obfuscation at Line Rate", Network and Distributed | |||
| <https://nsg.ee.ethz.ch/fileadmin/user_upload/ | Systems Security (NDSS) Symposium, | |||
| publications/ditto_final_ndss22.pdf>. | DOI 10.14722/ndss.2022.24056, April 2022, | |||
| <https://doi.org/10.14722/ndss.2022.24056>. | ||||
| [ELKINS] Elkins, N., Ackermann, M., Tahiliani, M., Dhody, D., and | [ELKINS] Elkins, N., Ackermann, M., Tahiliani, M., Dhody, D., and | |||
| T. Pecorella, "Performance Monitoring in Encrypted | T. Pecorella, "Performance Monitoring in Encrypted | |||
| Networks", August 2022, <https://github.com/intarchboard/ | Networks: PDMv2", August 2022, <https://www.iab.org/wp- | |||
| workshop-m-ten/blob/main/papers/Elkins-Performance- | content/IAB-uploads/2023/11/Elkins-Performance-Monitoring- | |||
| Monitoring-in-Encrypted-Networks-PDMv2.pdf>. | in-Encrypted-Networks-PDMv2.pdf>. | |||
| [GRUBBS] Grubbs, P., Arun, A., Zhang, Y., Bonneau, J., and M. | [GRUBBS] Grubbs, P., Arun, A., Zhang, Y., Bonneau, J., and M. | |||
| Walfish, "Zero-Knowledge Middleboxes", August 2022, | Walfish, "Zero-Knowledge Middleboxes", 31st USENIX | |||
| <https://github.com/intarchboard/workshop-m- | Security Symposium (USENIX Security 22), August 2022, | |||
| ten/blob/main/papers/Grubbs-Zero- | <https://www.usenix.org/conference/usenixsecurity22/ | |||
| Knowledge%20Middleboxes.pdf>. | presentation/grubbs>. | |||
| [I-D.irtf-pearg-safe-internet-measurement] | [HARDAKER] Hardaker, W., "Network Flow Management by Probability", | |||
| Learmonth, I. R., Grover, G., and M. Knodel, "Guidelines | August 2022, <https://www.iab.org/wp-content/IAB- | |||
| for Performing Safe Measurement on the Internet", Work in | uploads/2023/11/Hardaker-Encrypted-Traffic- | |||
| Progress, Internet-Draft, draft-irtf-pearg-safe-internet- | Estimation.pdf>. | |||
| measurement-08, 10 July 2023, | ||||
| <https://datatracker.ietf.org/doc/html/draft-irtf-pearg- | ||||
| safe-internet-measurement-08>. | ||||
| [JIANG] Jiang, X., Liu, S., Naama, S., Bronzino, F., Schmitt, P., | [JIANG] Jiang, X., Liu, S., Naama, S., Bronzino, F., Schmitt, P., | |||
| and N. Feamster, "Towards Designing Robust and Efficient | and N. Feamster, "Towards Designing Robust and Efficient | |||
| Classifiers for Encrypted Traffic in the Modern Internet", | Classifiers for Encrypted Traffic in the Modern Internet", | |||
| August 2022, <https://github.com/intarchboard/workshop-m- | August 2022, <https://www.iab.org/wp-content/IAB- | |||
| ten/blob/main/papers/Jiang-Towards-Designing-Robust-and- | uploads/2023/11/Jiang-Towards-Designing-Robust-and- | |||
| Efficient-Classifiers-for-Encrypted-Traffic-in-the-Modern- | Efficient-Classifiers-for-Encrypted-Traffic-in-the-Modern- | |||
| Internet.pdf>. | Internet.pdf>. | |||
| [KNODEL] Knodel, M., "Guidelines for Performing Safe Measurement on | [KNODEL] Knodel, M., "(Introduction) 'Guidelines for Performing | |||
| the Internet", August 2022, | Safe Measurement on the Internet'", August 2022, | |||
| <https://github.com/intarchboard/workshop-m- | <https://www.iab.org/wp-content/IAB-uploads/2023/11/ | |||
| ten/blob/main/papers/Knodel-Guidelines-for-Performing- | Knodel-Guidelines-for-Performing-Safe-Measurement-on-the- | |||
| Safe-Measurement-on-the-Internet.pdf>. | Internet.pdf>. | |||
| [KUEHLEWIND] | [KUEHLEWIND] | |||
| Kühlewind, M., Westerlund, M., Sarker, Z., and M. Ihlar, | Kuehlewind, M., Westerlund, M., Sarker, Z., and M. Ihlar, | |||
| "Relying on Relays", August 2022, | "Relying on Relays: The future of secure communication", | |||
| <https://github.com/intarchboard/workshop-m- | June 2022, <https://www.ericsson.com/en/blog/2022/6/ | |||
| ten/blob/main/papers/Kuehlewind-Relying-on-Relays.pdf>. | relays-and-online-user-privacy>. | |||
| [LEARMONTH] | ||||
| Learmonth, I. R., Grover, G., and M. Knodel, "Guidelines | ||||
| for Performing Safe Measurement on the Internet", Work in | ||||
| Progress, Internet-Draft, draft-irtf-pearg-safe-internet- | ||||
| measurement-08, 10 July 2023, | ||||
| <https://datatracker.ietf.org/doc/html/draft-irtf-pearg- | ||||
| safe-internet-measurement-08>. | ||||
| [LEI] Lei, Y., Wu, J., Sun, X., Zhang, L., and Q. Wu, "Encrypted | [LEI] Lei, Y., Wu, J., Sun, X., Zhang, L., and Q. Wu, "Encrypted | |||
| Traffic Classification Through Deep Learning", August | Traffic Classification Through Deep Learning", August | |||
| 2022, <https://github.com/intarchboard/workshop-m- | 2022, <https://www.iab.org/wp-content/IAB-uploads/2023/11/ | |||
| ten/blob/main/papers/Lei-Encrypted-Traffic-Classification- | Lei-Encrypted-Traffic-Classification-Through-Deep- | |||
| Through-Deep-Learning.pdf>. | Learning.pdf>. | |||
| [PAULY] Pauly, T. and R. Barnes, "Red Rover", August 2022, | [PAULY] Pauly, T. and R. Barnes, "Red Rover: A collaborative | |||
| <https://github.com/intarchboard/workshop-m- | approach to content filtering", August 2022, | |||
| ten/blob/main/papers/Pauly-Red-Rover-A-collaborative- | <https://www.iab.org/wp-content/IAB-uploads/2023/11/Pauly- | |||
| approach-to-content-filtering.pdf>. | Red-Rover-A-collaborative-approach-to-content- | |||
| filtering.pdf>. | ||||
| [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition | [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition | |||
| of Explicit Congestion Notification (ECN) to IP", | of Explicit Congestion Notification (ECN) to IP", | |||
| RFC 3168, DOI 10.17487/RFC3168, September 2001, | RFC 3168, DOI 10.17487/RFC3168, September 2001, | |||
| <https://www.rfc-editor.org/rfc/rfc3168>. | <https://www.rfc-editor.org/info/rfc3168>. | |||
| [WELZL] Welzl, M., "The Sidecar", August 2022, | [RFC8520] Lear, E., Droms, R., and D. Romascanu, "Manufacturer Usage | |||
| <https://github.com/intarchboard/workshop-m- | Description Specification", RFC 8520, | |||
| ten/blob/main/papers/Welzl-The-Sidecar-Opting-in-to-PEP- | DOI 10.17487/RFC8520, March 2019, | |||
| <https://www.rfc-editor.org/info/rfc8520>. | ||||
| [WELZL] Welzl, M., "The Sidecar: 'Opting in' to PEP Functions", | ||||
| August 2022, <https://www.iab.org/wp-content/IAB- | ||||
| uploads/2023/11/Welzl-The-Sidecar-Opting-in-to-PEP- | ||||
| Functions.pdf>. | Functions.pdf>. | |||
| [WU] Wu, Q., Wu, J., and Q. Ma, "Network Management of | [WU] Wu, Q., Wu, J., and Q. Ma, "Network Management of | |||
| Encrypted Traffic", August 2022, | Encrypted Traffic: Detect it don't decrypt it", August | |||
| <https://github.com/intarchboard/workshop-m- | 2022, <https://www.iab.org/wp-content/IAB-uploads/2023/11/ | |||
| ten/blob/main/papers/Wu-mten-taxonomy.pdf>. | Wu-mten-taxonomy.pdf>. | |||
| Appendix A. Position Papers | Appendix A. Position Papers | |||
| Interested participants were openly invited to submit position papers | Interested participants were openly invited to submit position papers | |||
| on the workshop topics, including Internet-Drafts, relevant academic | on the workshop topics, including Internet-Drafts, relevant academic | |||
| papers, or short abstracts explaining their interest. The papers | papers, or short abstracts explaining their interest. The papers | |||
| below constitute the inputs that were considered relevant for | below constitute the inputs that were considered relevant for | |||
| workshop attendees and that focused the discussions themselves. The | workshop attendees and that focused the discussions themselves. The | |||
| program committee grouped the papers by theme as such. | program committee grouped the papers by theme. | |||
| A.1. Motivations and principles | A.1. Motivations and Principles | |||
| Richard Barnes. “What’s In It For Me? Revisiting the reasons people | Richard Barnes. "What's In It For Me? Revisiting the reasons people | |||
| collaborate.” [BARNES] | collaborate." [BARNES] | |||
| Iain R. Learmonth, Gurshabad Grover, Mallory Knodel. “Guidelines for | Mallory Knodel. "(Introduction) 'Guidelines for Performing Safe | |||
| Performing Safe Measurement on the Internet.” (Additional rationale) | Measurement on the Internet'." (Additional rationale) [KNODEL] | |||
| [KNODEL] | ||||
| Qin Wu, Jun Wu, Qiufang Ma. “Network Management of Encrypted Traffic: | Qin Wu, Jun Wu, Qiufang Ma. "Network Management of Encrypted | |||
| Detect it don’t decrypt it.” [WU] | Traffic: Detect it don't decrypt it." [WU] | |||
| A.2. Classification and identification of encrypted traffic | A.2. Classification and Identification of Encrypted Traffic | |||
| Luca Deri. “nDPI Research Proposal.” [DERI] | Luca Deri. "nDPI Research Proposal." [DERI] | |||
| Wes Hardaker. “Network Flow Management by Probability.” | Wes Hardaker. "Network Flow Management by Probability." [HARDAKER] | |||
| Xi Jiang, Shinan Liu, Saloua Naama, Francesco Bronzino, Paul Schmitt, | Xi Jiang, Shinan Liu, Saloua Naama, Francesco Bronzino, Paul Schmitt, | |||
| Nick Feamster. “Towards Designing Robust and Efficient Classifiers | Nick Feamster. "Towards Designing Robust and Efficient Classifiers | |||
| for Encrypted Traffic in the Modern Internet.” [JIANG] | for Encrypted Traffic in the Modern Internet." [JIANG] | |||
| Yupeng Lei, Jun Wu, Xudong Sun, Liang Zhang, Qin Wu. “Encrypted | Yupeng Lei, Jun Wu, Xudong Sun, Liang Zhang, Qin Wu. "Encrypted | |||
| Traffic Classification Through Deep Learning.” [LEI] | Traffic Classification Through Deep Learning." [LEI] | |||
| A.3. Ideas for collaboration and coordination between devices and | A.3. Ideas for Collaboration and Coordination between Devices and | |||
| networks | Networks | |||
| Michael Collins. “Improving Network Monitoring Through Contracts.” | Michael Collins. "Improving Network Monitoring Through Contracts." | |||
| [COLLINS] | [COLLINS] | |||
| Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish. | Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish. | |||
| “Zero-Knowledge Middleboxes.” [GRUBBS] | "Zero-Knowledge Middleboxes." [GRUBBS] | |||
| Mirja Kühlewind, Magnus Westerlund, Zaheduzzaman Sarker, Marcus | Mirja Kuehlewind, Magnus Westerlund, Zaheduzzaman Sarker, Marcus | |||
| Ihlar. “Relying on Relays: The future of secure communication.” | Ihlar. "Relying on Relays: The future of secure communication." | |||
| [KUEHLEWIND] | [KUEHLEWIND] | |||
| Tommy Pauly, Richard Barnes. “Red Rover: A collaborative approach to | Tommy Pauly, Richard Barnes. "Red Rover: A collaborative approach to | |||
| content filtering.” [PAULY] | content filtering." [PAULY] | |||
| Michael Welzl. “The Sidecar: ‘Opting in’ to PEP Functions.“ [WELZL] | Michael Welzl. "The Sidecar: 'Opting in' to PEP Functions." [WELZL] | |||
| A.4. Other background material | A.4. Other Background Material | |||
| Pedro Casas. “Monitoring User-Perceived Quality in an Encrypted | Pedro Casas. "Monitoring User-Perceived Quality in an Encrypted | |||
| Internet – AI to the Rescue.” [CASAS] | Internet - AI to the Rescue." [CASAS] | |||
| Nalini Elkins, Mike Ackermann, Mohit P. Tahiliani, Dhruv Dhody, | Nalini Elkins, Mike Ackermann, Mohit P. Tahiliani, Dhruv Dhody, | |||
| Prof. Tommaso Pecorella. “Performance Monitoring in Encrypted | Prof. Tommaso Pecorella. "Performance Monitoring in Encrypted | |||
| Networks: PDMv2.” [ELKINS] | Networks: PDMv2." [ELKINS] | |||
| Appendix B. Workshop participants | Appendix B. Workshop Participants | |||
| The workshop participants were Cindy Morgan, Colin Perkins, Cullen | The workshop participants were Cindy Morgan, Colin Perkins, Cullen | |||
| Jennings, Deborah Brungard, Dhruv Dhody, Eric Vyncke, Georg Carle, | Jennings, Deborah Brungard, Dhruv Dhody, Éric Vyncke, Georg Carle, | |||
| Ivan Nardi, Jari Arkko, Jason Livingood, Jiankang Yao, Karen | Ivan Nardi, Jari Arkko, Jason Livingood, Jiankang Yao, Karen | |||
| O'Donoghue, Keith Winstein, Lars Eggert, Laurent Vanbever, Luca Deri, | O'Donoghue, Keith Winstein, Lars Eggert, Laurent Vanbever, Luca Deri, | |||
| Mallory Knodel, Marcus Ihlar, Matteo, Michael Ackermann, Michael | Mallory Knodel, Marcus Ihlar, Matteo, Michael Collins, Michael | |||
| Collins, Michael Richardson, Michael Welzl, Mike Ackermann, Mirja | Richardson, Michael Welzl, Mike Ackermann, Mirja Kühlewind, Mohit | |||
| Kühlewind, Mohit P. Tahiliani, Nalini Elkins, Patrick Tarpey, Paul | P. Tahiliani, Nalini Elkins, Patrick Tarpey, Paul Grubbs, Pedro | |||
| Grubbs, Pedro Casas, Qin Wu, Qiufang, Richard Barnes, Rob Wilton, | Casas, Qin Wu, Qiufang Ma, Richard Barnes, Rob Wilton, Russ White, | |||
| Russ White, Saloua Naama, Shinan Liu, Srinivas C, Toerless Eckert, | Saloua Naama, Shinan Liu, Srinivas C, Toerless Eckert, Tommy Pauly, | |||
| Tommy Pauly, Wes Hardaker, Xi Chase Jiang, Zaheduzzaman Sarker, and | Wes Hardaker, Xi Chase Jiang, Zaheduzzaman Sarker, and Zhenbin Li. | |||
| Zhenbin Li. | ||||
| Appendix C. Program Committee | Appendix C. Program Committee | |||
| The workshop program committee members were Wes Hardaker (IAB, USC/ | The workshop program committee members were Wes Hardaker (IAB, USC/ | |||
| ISI), Mallory Knodel (IAB, Center for Democracy and Technology), | ISI), Mallory Knodel (IAB, Center for Democracy and Technology), | |||
| Mirja Kühlewind (IAB, Ericsson), Tommy Pauly (IAB, Apple), Russ White | Mirja Kühlewind (IAB, Ericsson), Tommy Pauly (IAB, Apple), Russ White | |||
| (IAB, Juniper), Qin Wu (IAB, Huawei). | (IAB, Juniper), Qin Wu (IAB, Huawei). | |||
| IAB Members at the Time of Approval | ||||
| Internet Architecture Board members at the time this document was | ||||
| approved for publication were: | ||||
| Dhruv Dhody | ||||
| Lars Eggert | ||||
| Wes Hardaker | ||||
| Cullen Jennings | ||||
| Mallory Knodel | ||||
| Suresh Krishnan | ||||
| Mirja Kühlewind | ||||
| Tommy Pauly | ||||
| Alvaro Retana | ||||
| David Schinazi | ||||
| Christopher Wood | ||||
| Qin Wu | ||||
| Jiankang Yao | ||||
| Acknowledgments | Acknowledgments | |||
| TODO acknowledge. | We wish to acknowledge the comments and suggestions from Elliot Lear | |||
| and Arnaud Taddei for their comments and improvements to this | ||||
| document. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Mallory Knodel | Mallory Knodel | |||
| Center for Democracy & Technology | ||||
| Email: mknodel@cdt.org | Email: mknodel@cdt.org | |||
| Wes Hardaker | Wes Hardaker | |||
| Email: ietf@hardakers.net | Email: ietf@hardakers.net | |||
| Tommy Pauly | Tommy Pauly | |||
| Email: tpauly@apple.com | Email: tpauly@apple.com | |||
| End of changes. 136 change blocks. | ||||
| 430 lines changed or deleted | 447 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||