SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Alvaro Retana (aretana@cisco.com) 
Distinguished Engineer, Cisco Systems, Inc. 
Chair IETF-LAC Task Force, LACNOG 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
• ...activities focused on supporting, updating and maintaining the IETF standards 
General Area (gen) development process. 
• ubiquitous application protocols (e.g., email, HTTP, FTP) and protocols used for 
Applications (app) Internet infrastructure 
• ...IP layer (both IPv4 and IPv6), DNS, mobility, VPNs and pseudowires..., and various 
Internet (int) link layer technologies. 
• Network Management, AAA, and various operational issues facing the Internet such 
Operations & Management (ops) as DNS operations, IPv6 operations, operational security and Routing operations. 
• ...develops protocols and architectures for delay-sensitive interpersonal 
communications... 
Real-time Applications and Infrastructure 
(rai) 
Routing (rtg) • ...responsible for ensuring continuous operation of the Internet routing system... 
• ...focused on security protocols...services: integrity, authentication, non-repudiation, 
Security (sec) confidentiality, and access control...key management is also vital. 
Transport Services (tsv) • ...works on mechanisms related to end-to-end data transport... 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
http://www.arkko.com/tools/allstats/areawgdistr.html 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
http://www.arkko.com/tools/stats/areadistr.html 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
• Routing Resiliency 
• Domain Name System Security 
• IPv6 Deployment 
Technical Plenary (IAB Programs) 
IP Stack Evolution 
Privacy and Security 
ISOC@IETF91 Briefing Panel 
Is Identity an Internet Building Block? 
ISOC CITO Olaf Kolkman 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
• Related WGs 
dnsop (DNS Operations) WG 
dane (DNS-based Authentication of Named Entities) WG 
dnssd (Extensions for Scalable DNS Service Discovery) WG 
dprive (DNS Private Exchange) 
• Reading List 
DNS Security Introduction and Requirements (rfc4033) 
DNSSEC Operational Practices, Version 2 (rfc6781) 
DNSSEC Roadblock Avoidance (draft-ietf-dnsop-dnssec-roadblock-avoidance) 
Use Cases and Requirements for DNS-Based Authentication of Named Entities (rfc6394) 
The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA 
(rfc6698) 
Updates to and Operational Guidance for the DANE Protocol (draft-ietf-dane-ops) 
DNS privacy considerations (draft-ietf-dprive-problem-statement) 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
10.0.0.0/22 
Origin AS 
AS x 
10.0.0.0/22 
Hijacker AS 
Six worst Internet routing attacks : 
http://www.networkworld.com/news/2009/011509-bgp-attacks.html 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
http://tools.ietf.org/html/draft-fmejia-opsec-origin-a-country / http://rpki.surfnet.nl/perrir.html 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
• Related WGs 
sidr (Secure Inter-Domain Routing) WG 
grow (Global Routing Operations) WG 
idr (Inter-Domain Routing) WG 
opsec (Operational Security) WG 
• Reading List 
An Infrastructure to Support Secure Internet Routing (rfc6480) 
The Resource Public Key Infrastructure (RPKI) to Router Protocol (rfc6810) 
BGP Prefix Origin Validation (rfc6811) 
An Overview of BGPSEC (draft-ietf-sidr-bgpsec-overview) 
Route-Leaks & MITM Attacks Against BGPSEC (draft-ietf-grow-simple-leak-attack-bgpsec-no-help) 
BGP operations and security (draft-ietf-opsec-bgp-security) 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
http://www.potaroo.net/tools/ipv4/ 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
• Related WGs 
v6ops (IPv6 Operations) WG 
6man (IPv6 Maintenance) WG 
dhc (Dynamic Host Configuration) WG 
sunset4 (Sunsetting IPv4) WG 
homenet (Home Networking) WG 
spring (Source Packet Routing in Networking) WG 
• Reading List 
Happy Eyeballs: Success with Dual-Stack Hosts (rfc6555) 
IPv6 Guidance for Internet Content Providers and Application Service Providers (rfc6883) 
Enterprise IPv6 Deployment Guidelines (rfc7381) 
IPv6 Home Networking Architecture Principles (rfc7368) 
IPv6 SPRING Use Cases (draft-ietf-spring-ipv6-use-cases) 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
• New WGs (from IETF 90 BoFs) 
Planning for the IANA/NTIA Transition (ianaplan) 
“…produce an IETF consensus document that describes the expected interaction between the IETF and 
the operator of IETF protocol parameters registries.” 
TCP Increased Security (tcpinc) 
“…develop the TCP extensions to provide unauthenticated encryption and integrity protection of TCP streams.” 
Transport Services (taps) 
“…help application and network stack programmers by describing an (abstract) interface for applications to make use 
of Transport Services.” 
Autonomic Networking Integrated Model and Approach (anima) 
“…refers to the self-managing characteristics (configuration, protection, healing, and optimization) of distributed 
network elements, adapting to unpredictable changes while hiding intrinsic complexity from operators and users.” 
Delay Tolerant Networking (dtn) 
“…specifies mechanisms for data communications in the presence of long delays and/or intermittent connectivity.” 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
• Approved BoFs for IETF 91 
Archive Top Level Media Type (arcmedia) 
“…discuss registering a top level media type for file archives, i.e., formats that package files and file metadata into a single data 
stream.” 
Deterministic Networking (detnet) 
“…work in conjunction with the IEEE802.1TSN Task Group and specify how to get QoS features into routers and how new and/or 
existing control protocols can be used…” 
Bit Indexed Explicit Replication (bier) 
“…discuss a new architecture for the forwarding of multicast data packets.” 
Abstraction and Control of Transport Networks (ACTN) 
“…facilitate centralized operation and construction of virtual networks based on multi-subnet, multi-technology, multi-vendor domain 
networks.” 
Interface to Network Security Functions (I2NSF) 
“…discuss interfaces for clients (especially enterprises) to request, negotiate, operate, and/or verify the network security functions that 
are not physically present at requesters’ premises.” 
Layer Independent OAM Management in the Multi-Layer Environment (lime) WG 
“…concentrate on the operational challenges in consistent handling of end-to-end OAM and coordination of OAM within underlying 
network layers.” 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
• Join a mailing list.. 
• ..start contributing!! 
Monitor 
List 
Participation 
Authorship 
Meeting 
Attendance 
Leadership 
Position 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Recent Meetings 
• 86th IETF 
March 10-15, 2013 
Orlando, FL, USA 
• 89th IETF 
March 2-7, 2014 
London, England 
• 90th IETF 
July 20-25, 2014 
Toronto, ON, Canada 
Upcoming Meetings 
• 91st IETF 
November 9-14, 2014 
Honolulu, HI, USA 
• 92nd IETF 
March 22-27, 2015 
Dallas, TX, USA 
• 93rd IETF 
July 19-24, 2015 
Prague, Czech Republic 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
• LACNOG creó el Grupo de Trabajo IETF LAC en Mayo del 2013 con el objetivo de 
fomentar la participación de personas de la región en las discusiones y procesos del 
IETF. 
• Algunas de las metas son: 
Ser un mecanismo para introducir nuevas personas en el IETF 
Facilitar la discusión de ideas en el idioma local (Español, Portugués, Inglés) 
Proveer un lugar en el cual los autores latinos puedan compartir sus drafts y recibir comentarios de sus 
colegas 
http://mail.lacnic.net/mailman/listinfo/ietf-lac 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• ietf-lac@lacnog.org 
~ 200 personas suscritas a la lista 
• Reuniones Pre-IETF 
Organizadas antes de las reuniones más recientes del IETF. 
I Taller Pre-IETF (CSBC 2014 / http://iwpietf.lacnog.org/) 
• Educación y Evangelización 
Presentaciones en conferencias regionales: Semana da Infraestructura en Brasil, Cisco Live (México), etc.. 
Internet Engineering Argentina 2014 y LANC 2014. 
• Publicación de Documentos 
Al menos 5 documentos publicados en el IETF... 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
• Reuniones Locales 
Replicar formato Pre-IETF, con temas de interés local. 
Planear en paralelo con reuniones de operadores u otros grupos interesados. 
• Grupos de Trabajo Locales 
Enfoque en problemas comunes de la comunidad. 
• Programa de Mentores 
Para dirigir discusiones y guiar hasta publicación el trabajo de Grupos de Trabajo locales. 
Para guiar y colaborar con participantes nuevos en temas específicos. 
• Becas para participar en IETF. 
Abrir oportunidades especificas al IETF. 
• Identificar organizaciones interesadas en colaborar. 
Becas, patrocinio de grupos de trabajo, educación y evangelización. 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
• Idea: "hub remoto" de participación en el próximo IETF 
grupo de personas locales 
participación en un grupo de trabajo específico 
sin tener que viajar a la reunión 
• Trabajo Previo: 
Actualización Técnica / Repaso del Proceso 
Sesiones en Español y Portugués (~100 asistentes!) 
• Grupo de Trabajo: 
Source Packet Routing in Networking (spring) es ideal porque Segment Routing parece de interés general 
y podemos pedir que lo programen a una hora "conveniente”. 
• Ya empezamos el proceso en Brasil, Chile, México, Uruguay, Argentina y Venezuela. 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
• Suscríbase a la lista de ietf-lac. 
http://mail.lacnic.net/mailman/listinfo/ietf-lac 
• Participar en los “hubs remotos”. 
• Suscribirse a las listas de correo 
es donde se realiza el trabajo 
Lee (y entiende) antes de escribir 
• Lee los drafts y contribuye 
• No seas tímido (pero tampoco te pases) 
• Habla con la gente 
• Busca posiciones comunes 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Muchas Gracias!

Más contenido relacionado

La actualidad más candente

KennethBaughResume_2015
KennethBaughResume_2015KennethBaughResume_2015
KennethBaughResume_2015
Ken Baugh
 

La actualidad más candente (9)

Abdul ghafoor
Abdul ghafoorAbdul ghafoor
Abdul ghafoor
 
wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013
 
CV
CVCV
CV
 
IETF Talk
IETF TalkIETF Talk
IETF Talk
 
100 ngn workshop-sdn-english-v4
100 ngn workshop-sdn-english-v4100 ngn workshop-sdn-english-v4
100 ngn workshop-sdn-english-v4
 
Presd1 09
Presd1 09Presd1 09
Presd1 09
 
2020 osi 7 layers for grade12
2020 osi 7 layers for grade122020 osi 7 layers for grade12
2020 osi 7 layers for grade12
 
About the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of BotswanaAbout the IETF: Presentation for the University of Botswana
About the IETF: Presentation for the University of Botswana
 
KennethBaughResume_2015
KennethBaughResume_2015KennethBaughResume_2015
KennethBaughResume_2015
 

Similar a ION Santiago: What's Happening at the IETF? Internet Standards and How to Get Involved (Alvaro Retana)

Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-update
Brandon Height
 

Similar a ION Santiago: What's Happening at the IETF? Internet Standards and How to Get Involved (Alvaro Retana) (20)

OAS SSIG 2016 - IETF-LAC & LACNOG - Alvaro Retana - Cisco
OAS SSIG 2016 - IETF-LAC & LACNOG - Alvaro Retana - CiscoOAS SSIG 2016 - IETF-LAC & LACNOG - Alvaro Retana - Cisco
OAS SSIG 2016 - IETF-LAC & LACNOG - Alvaro Retana - Cisco
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
 
SDN and metrics from the SDOs
SDN and metrics from the SDOsSDN and metrics from the SDOs
SDN and metrics from the SDOs
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)
 
Data models-and-automation-jp
Data models-and-automation-jpData models-and-automation-jp
Data models-and-automation-jp
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureRed Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
 
Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-update
 
OpenStackDay - XIFI Federation
OpenStackDay - XIFI FederationOpenStackDay - XIFI Federation
OpenStackDay - XIFI Federation
 
ION Cape Town - IETF Update and How to Get Involved
ION Cape Town - IETF Update and How to Get InvolvedION Cape Town - IETF Update and How to Get Involved
ION Cape Town - IETF Update and How to Get Involved
 
ION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNICION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNIC
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT Tutorial
 
G rpc talk with intel (3)
G rpc talk with intel (3)G rpc talk with intel (3)
G rpc talk with intel (3)
 
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław BorekPLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
 
ION Bangladesh - IETF Update
ION Bangladesh - IETF UpdateION Bangladesh - IETF Update
ION Bangladesh - IETF Update
 
2016 open-source-network-softwarization
2016 open-source-network-softwarization2016 open-source-network-softwarization
2016 open-source-network-softwarization
 
2016 open-source-network-softwarization
2016 open-source-network-softwarization2016 open-source-network-softwarization
2016 open-source-network-softwarization
 
OGF Introductory Overview - OGF 44 at EGI Conference 2015
OGF Introductory Overview - OGF 44 at EGI Conference 2015OGF Introductory Overview - OGF 44 at EGI Conference 2015
OGF Introductory Overview - OGF 44 at EGI Conference 2015
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdf
 

Más de Deploy360 Programme (Internet Society)

Más de Deploy360 Programme (Internet Society) (20)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
ION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & AccountabilityION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & Accountability
 
ION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: FinlandION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: Finland
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Malta - Opening Slides
ION Malta - Opening SlidesION Malta - Opening Slides
ION Malta - Opening Slides
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check ToolION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
ION Durban - Closing Slides
ION Durban - Closing SlidesION Durban - Closing Slides
ION Durban - Closing Slides
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

ION Santiago: What's Happening at the IETF? Internet Standards and How to Get Involved (Alvaro Retana)

  • 1. Alvaro Retana (aretana@cisco.com) Distinguished Engineer, Cisco Systems, Inc. Chair IETF-LAC Task Force, LACNOG © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. • ...activities focused on supporting, updating and maintaining the IETF standards General Area (gen) development process. • ubiquitous application protocols (e.g., email, HTTP, FTP) and protocols used for Applications (app) Internet infrastructure • ...IP layer (both IPv4 and IPv6), DNS, mobility, VPNs and pseudowires..., and various Internet (int) link layer technologies. • Network Management, AAA, and various operational issues facing the Internet such Operations & Management (ops) as DNS operations, IPv6 operations, operational security and Routing operations. • ...develops protocols and architectures for delay-sensitive interpersonal communications... Real-time Applications and Infrastructure (rai) Routing (rtg) • ...responsible for ensuring continuous operation of the Internet routing system... • ...focused on security protocols...services: integrity, authentication, non-repudiation, Security (sec) confidentiality, and access control...key management is also vital. Transport Services (tsv) • ...works on mechanisms related to end-to-end data transport... © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. http://www.arkko.com/tools/allstats/areawgdistr.html © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. http://www.arkko.com/tools/stats/areadistr.html © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. • Routing Resiliency • Domain Name System Security • IPv6 Deployment Technical Plenary (IAB Programs) IP Stack Evolution Privacy and Security ISOC@IETF91 Briefing Panel Is Identity an Internet Building Block? ISOC CITO Olaf Kolkman © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. • Related WGs dnsop (DNS Operations) WG dane (DNS-based Authentication of Named Entities) WG dnssd (Extensions for Scalable DNS Service Discovery) WG dprive (DNS Private Exchange) • Reading List DNS Security Introduction and Requirements (rfc4033) DNSSEC Operational Practices, Version 2 (rfc6781) DNSSEC Roadblock Avoidance (draft-ietf-dnsop-dnssec-roadblock-avoidance) Use Cases and Requirements for DNS-Based Authentication of Named Entities (rfc6394) The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA (rfc6698) Updates to and Operational Guidance for the DANE Protocol (draft-ietf-dane-ops) DNS privacy considerations (draft-ietf-dprive-problem-statement) © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. 10.0.0.0/22 Origin AS AS x 10.0.0.0/22 Hijacker AS Six worst Internet routing attacks : http://www.networkworld.com/news/2009/011509-bgp-attacks.html © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. http://tools.ietf.org/html/draft-fmejia-opsec-origin-a-country / http://rpki.surfnet.nl/perrir.html © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. • Related WGs sidr (Secure Inter-Domain Routing) WG grow (Global Routing Operations) WG idr (Inter-Domain Routing) WG opsec (Operational Security) WG • Reading List An Infrastructure to Support Secure Internet Routing (rfc6480) The Resource Public Key Infrastructure (RPKI) to Router Protocol (rfc6810) BGP Prefix Origin Validation (rfc6811) An Overview of BGPSEC (draft-ietf-sidr-bgpsec-overview) Route-Leaks & MITM Attacks Against BGPSEC (draft-ietf-grow-simple-leak-attack-bgpsec-no-help) BGP operations and security (draft-ietf-opsec-bgp-security) © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. http://www.potaroo.net/tools/ipv4/ © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. • Related WGs v6ops (IPv6 Operations) WG 6man (IPv6 Maintenance) WG dhc (Dynamic Host Configuration) WG sunset4 (Sunsetting IPv4) WG homenet (Home Networking) WG spring (Source Packet Routing in Networking) WG • Reading List Happy Eyeballs: Success with Dual-Stack Hosts (rfc6555) IPv6 Guidance for Internet Content Providers and Application Service Providers (rfc6883) Enterprise IPv6 Deployment Guidelines (rfc7381) IPv6 Home Networking Architecture Principles (rfc7368) IPv6 SPRING Use Cases (draft-ietf-spring-ipv6-use-cases) © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. • New WGs (from IETF 90 BoFs) Planning for the IANA/NTIA Transition (ianaplan) “…produce an IETF consensus document that describes the expected interaction between the IETF and the operator of IETF protocol parameters registries.” TCP Increased Security (tcpinc) “…develop the TCP extensions to provide unauthenticated encryption and integrity protection of TCP streams.” Transport Services (taps) “…help application and network stack programmers by describing an (abstract) interface for applications to make use of Transport Services.” Autonomic Networking Integrated Model and Approach (anima) “…refers to the self-managing characteristics (configuration, protection, healing, and optimization) of distributed network elements, adapting to unpredictable changes while hiding intrinsic complexity from operators and users.” Delay Tolerant Networking (dtn) “…specifies mechanisms for data communications in the presence of long delays and/or intermittent connectivity.” © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. • Approved BoFs for IETF 91 Archive Top Level Media Type (arcmedia) “…discuss registering a top level media type for file archives, i.e., formats that package files and file metadata into a single data stream.” Deterministic Networking (detnet) “…work in conjunction with the IEEE802.1TSN Task Group and specify how to get QoS features into routers and how new and/or existing control protocols can be used…” Bit Indexed Explicit Replication (bier) “…discuss a new architecture for the forwarding of multicast data packets.” Abstraction and Control of Transport Networks (ACTN) “…facilitate centralized operation and construction of virtual networks based on multi-subnet, multi-technology, multi-vendor domain networks.” Interface to Network Security Functions (I2NSF) “…discuss interfaces for clients (especially enterprises) to request, negotiate, operate, and/or verify the network security functions that are not physically present at requesters’ premises.” Layer Independent OAM Management in the Multi-Layer Environment (lime) WG “…concentrate on the operational challenges in consistent handling of end-to-end OAM and coordination of OAM within underlying network layers.” © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. • Join a mailing list.. • ..start contributing!! Monitor List Participation Authorship Meeting Attendance Leadership Position © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Recent Meetings • 86th IETF March 10-15, 2013 Orlando, FL, USA • 89th IETF March 2-7, 2014 London, England • 90th IETF July 20-25, 2014 Toronto, ON, Canada Upcoming Meetings • 91st IETF November 9-14, 2014 Honolulu, HI, USA • 92nd IETF March 22-27, 2015 Dallas, TX, USA • 93rd IETF July 19-24, 2015 Prague, Czech Republic © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. • LACNOG creó el Grupo de Trabajo IETF LAC en Mayo del 2013 con el objetivo de fomentar la participación de personas de la región en las discusiones y procesos del IETF. • Algunas de las metas son: Ser un mecanismo para introducir nuevas personas en el IETF Facilitar la discusión de ideas en el idioma local (Español, Portugués, Inglés) Proveer un lugar en el cual los autores latinos puedan compartir sus drafts y recibir comentarios de sus colegas http://mail.lacnic.net/mailman/listinfo/ietf-lac © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. • ietf-lac@lacnog.org ~ 200 personas suscritas a la lista • Reuniones Pre-IETF Organizadas antes de las reuniones más recientes del IETF. I Taller Pre-IETF (CSBC 2014 / http://iwpietf.lacnog.org/) • Educación y Evangelización Presentaciones en conferencias regionales: Semana da Infraestructura en Brasil, Cisco Live (México), etc.. Internet Engineering Argentina 2014 y LANC 2014. • Publicación de Documentos Al menos 5 documentos publicados en el IETF... © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. • Reuniones Locales Replicar formato Pre-IETF, con temas de interés local. Planear en paralelo con reuniones de operadores u otros grupos interesados. • Grupos de Trabajo Locales Enfoque en problemas comunes de la comunidad. • Programa de Mentores Para dirigir discusiones y guiar hasta publicación el trabajo de Grupos de Trabajo locales. Para guiar y colaborar con participantes nuevos en temas específicos. • Becas para participar en IETF. Abrir oportunidades especificas al IETF. • Identificar organizaciones interesadas en colaborar. Becas, patrocinio de grupos de trabajo, educación y evangelización. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. • Idea: "hub remoto" de participación en el próximo IETF grupo de personas locales participación en un grupo de trabajo específico sin tener que viajar a la reunión • Trabajo Previo: Actualización Técnica / Repaso del Proceso Sesiones en Español y Portugués (~100 asistentes!) • Grupo de Trabajo: Source Packet Routing in Networking (spring) es ideal porque Segment Routing parece de interés general y podemos pedir que lo programen a una hora "conveniente”. • Ya empezamos el proceso en Brasil, Chile, México, Uruguay, Argentina y Venezuela. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. • Suscríbase a la lista de ietf-lac. http://mail.lacnic.net/mailman/listinfo/ietf-lac • Participar en los “hubs remotos”. • Suscribirse a las listas de correo es donde se realiza el trabajo Lee (y entiende) antes de escribir • Lee los drafts y contribuye • No seas tímido (pero tampoco te pases) • Habla con la gente • Busca posiciones comunes © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23