MinutesICNRG Interim meeting @ IETF 94, Yokohama, Japan, November 1, 2015


Agenda

Proposed topics

Alex's Talk


Group works:


Group 1: (Notes: Dave Oran)

Group 2 (Notes: Dirk Kutscher)


named could really represent devices, physical objects -- it's application-specific


multiple publishers publishers under same prefix

publishers moving around



state explosion



how to move forward


- good requirements/assumptions on we use networks in different environments, larger networks

- document current assumptions

- more experiments with actual applications

- list key issues

- where does the binding of three naming aspects does not work

larger testbeds


deployment in limited contexts (IoT) currently more promising than large-scale, core-network type deployments


fresh data vs immutable vs. version numbers


Routing/forwading hints


- seems to impy another naming layer

- does not have to be part of the architecture

- more like a engineering solution

- analogy of DNS in IP: lookup in first router

- routing links & security. should be authorized by publisher etc.


concerns



Group 3: (Notes Börje Ohlman)


Just saying a name is immutable does not make it immutable. There must be some cryptographic means to guarantee it. One way to do that is obviously to use the hash of the name. How about if you need to change the hash scheme? You could use ni names.


What about dynamic data? For live video you can do some type of forward chaining.


About the x thing. X is what you give to the network to help it route to a location that might have the data object that you are requesting. X can be a set of x's, e.g. a bluetooth mac address, an ip-adress or another name to be resolved by some indirection service.


In the original CCN/NDN id and locator was the same. In current versions 


In CCN now they use named adress concept that can contain name, hash restriction and xxx, this is the identifier that needs to match to give you the object.


Every device that attach to the network need to have a name that serves as a locator. When publishing a data object it needs to be "attached" to the network.


Is there a NRS in CCN? There need to be a way to identify the signing key. A possibility is to have a key a resolution system that you trust. There definitely need to be a way to distribute trust anchors. You can submit a name to authorative source which can give you the x for the set of the replica servers, e.g. a set of signed links. Another way is to use a search service. Then when you use an untrusted such service there needs to be a chain of trust established.


If you gonna do signed updates  to the routing tables when things are moving it is going to be challaging. For privacy you want an encrypted name with a routing hint in the clear. Does a routing hint have to be signed? If so is that a privacy problem? Assuming self-certifying objects the requestor should not have to sign the routing hint as he can verify the object coming back. There might be other reasons why they need to be signed, e.g. to prevent denial of service attacks.


The name will include a part that is not globally routable.


Identfier name: Used for matching content, could/should be encrypted

Locator name: Used as input to the routing system to find replicas of the content object


Locator part cannot be encrypted.


Rewriting names is complicated and a heavy operation adding a forwarding label is more lightweigt.


Is x a suggestion to the network or a requirement. We probably need both a routing hint and a routing pin


Afternoon discussion:

----------------------------


Privacy Group (notes Mark Mosco)

------------------


Privacy vs Net Neutrality


What is net neutrality?

How does net neutrality apply to ICN?

AS anycast…

Caching encrypted content

Access Control

Encryption and Privacy

How to differentiate flows without revealing identities?

Ban the use of “priority”!  It’s envy and jealousy.


In ICN, you don’t know where its coming from

Need definitions;

Federated trust model

How the world has changed

How to support an advertising model?


Reference Implementation Group

----------------------------------------

Starting Point

Problem Statemet

Reference Implementation Benefits

IPR and Licensing

Reference Implementation Candidates

Discussion

Conclusion