The 89th meeting of the Internet Engineering Task Force was hosted by the Internet Corporation for Assigned Names and Numbers (ICANN). Our cover article in this issue highlights the challenges of making Internet connectivity available to all people around the globe.
You are here
The IETF Journal is an Internet Society publication produced in cooperation with the Internet Engineering Task Force.
For me and many others, IETF 89 started during the previous week with a workshop organised by the Internet Architecture Board (IAB) and the Word Wide Web Consortium (W3C) on improving privacy on the Internet. Similarly, as the IETF meeting was ending, several design team meetings and workshops were just getting started. It never ceases to amaze me how much energy our community has.
This is my third contribution to The IETF Journal as chair of the Internet Architecture Board (IAB). Pervasive monitoring and Internet governance were discussed in many sessions.
On 4 March, concurrent with the IETF 89 meeting in London, the Internet Society held a panel discussion about the Internet’s underlying end-to-end principle—and whether it’s worth retaining.
Most people have heard of, or perhaps even attended, the tutorials that take place the Sunday before each IETF meeting. But few know that it is the all-volunteer IETF Edu Team that decides which tutorials are provided and how they are organised. Following is a sneak peek at the team behind the tutorials.
The goals of the IETF Edu Team are stated in its charter:
In response to an increase in the number of financial transactions being conducted over the Internet, the Internet Architecture Board held a technical plenary discussion about the challenges facing Internet-scale payment systems such as Bitcoin at the IETF 89 meeting in London.
The past year has brought a series of revelations that have focused the entire Internet community on the topics of privacy and pervasive monitoring. Although some of the vulnerabilities have been known and some of the capabilities suspected, the depth and scale has come as a shock to many.
The first Applied Networking Research Prize for 2014 was presented to Kenny Paterson for finding and documenting new attacks against key Internet security protocols. In their paper, “Lucky Thirteen: Breaking the TLS and DTLS Record Protocols” (Proc. IEEE Symposium on Security and Privacy, pp. 526-540, San Francisco, CA, USA, May 2013), Paterson and his coauthor, Nadhem Al Fardan, demonstrate practical attacks against Transport Layer Security, a fundamental security building block for much of today's online activity.
The Internet Society continued to engage regulators in discussions about the technical underpinnings of the Internet and the challenges facing this global network-of-networks by sponsoring policymakers to attend IETF 89.
ISOC’s IETF Policy Programme facilitates exchange between government policymakers and IETF leaders by providing visiting policymakers with an overview of how the IETF works and key issues affecting the Internet’s continued growth. Since 2012, the ISOC programme has hosted 69 regulators from 53 countries to attend IETF meetings.
The Stream Control Transmission Protocol (SCTP), Datagram Congestion Control Protocol (DCCP), MultiPath Transmission Control Protocol (MPTCP), and User Datagram Protocol-Lite (UDP-Lite) protocols and the Low Extra Delay Background Transport (LEDBAT) congestion control mechanism offer a large number of services to applications, in addition to the long-standing two services provided by TCP and UDP. For example:
During IETF 89 in London, seven out of the nine then-chartered Internet Research Task Force (IRTF) research groups (RGs) held meetings—the highest number of meetings in recent years:
In March 2012, I attended my first IETF meeting as RFC Series Editor. It was my first opportunity to meet directly with the community and learn what they wanted from the RFC Series. The feedback was quite clear: the old ASCII-only format was no longer sufficiently meeting the needs and expectations of the community.
Getting new work started in the IETF usually requires a birds-of-a-feather (BoF) meeting to discuss goals for the work, the suitability of the IETF as a venue for pursuing the work, and the level of interest in and support for the work. In this article, we’ll review the BoFs that took place during IETF 89, including their intentions and outcomes. If you’re inspired to arrange a BoF meeting, please be sure to read RFC 5434: Considerations for Having a Successful Birds-of-a-Feather (BoF) Session.
On-site attendance: 1,364
Number of countries: 60
IETF Activity since IETF 88 (November 2013–March 2014)
New WGs: 7
WGs closed: 0
WG currently chartered: 120
New and revised Internet-Drafts (I-Ds): 1707
IETF Last Calls: 96
Internet-Drafts submitted: 132
RFCs published: 91