Donate
Deploy360 at IETF 100, Day 3: SIDR, TLS & Crypto Thumbnail
‹ Back
Deploy360 14 November 2017

Deploy360 at IETF 100, Day 3: SIDR, TLS & Crypto

Kevin Meynell
By Kevin MeynellContent and Resource Manager

This week is IETF 100 in Singapore, and we’re bringing you daily blog posts highlighting some of the topics that Deploy360 is interested in. After the focus on IPv6 & IoT during the first couple of days, we’re switching tack today with a focus on routing and crypto matters.

We’re having to wait until after lunch, but then there’s a choice of UTA, SIDROPS or ROLL at 13.30 SGT/UTC+8.

UTA will be focusing on resolving the final IESG comments on the use of TLS for email submission and access which outlines current recommendations for using TLS to provide confidentiality of email traffic between a mail user agent and a mail access server. Next up for discussion are the open issues on a draft related to Strict Transport Security (STS) for mail (SMTP) transfer agents and mail user agents, before consideration of  a draft on an option to require TLS for SMTP.


NOTE: If you are unable to attend IETF 100 in person, there are multiple ways to participate remotely.


Over in SIDROPS, there will be a review of the status of BGP Origin Validation deployment in RENATA: the Columbia National Research and Education Network. This represents the first wide-scale deployment in the world, so the results should be quite interesting. There will also be a review of the status of RPKI deployment with IXPs, and the problems of ROAs issued with Multiple Prefixes is expected to be discussed. That just leaves a draft on Extending RFC8208 by adding Experimental/Documentation algorithm IDs, which has yet to be published.

Meanwhile, ROLL will focus on routing protocols for constrained-node networks, and has 3 working group drafts up for discussion, along with 3 new drafts.

Concluding our topics for the day is CFRG at 15.20 SGT/UTC+8. This will discuss four drafts including Re-keying Mechanisms for Symmetric Keys, The Transition from Classical to Post-Quantum Cryptography, SPAKE2, a secure, efficient password based key exchange protocol, and PKEX: Public Key Exchange.

For more background, please read the Rough Guide to IETF 100 from Olaf, Dan, Andrei, Steve, Karen and myself.

Relevant Working Groups

‹ Back

Related articles

Deploy360@IETF98, Day 2: IoT, IPv6, TLS & SIDR
Deploy36027 March 2017

Deploy360@IETF98, Day 2: IoT, IPv6, TLS & SIDR

[caption id="attachment_25557" align="alignright" width="249"] Chicago Skyline aerial view with road by the beach[/caption] Tuesday is another busy day at IETF 98 in...

Rough Guide to IETF 100: Identity, Privacy, and Encryption
Rough Guide to IETF 100: Identity, Privacy, and Encryption
IETF10 November 2017

Rough Guide to IETF 100: Identity, Privacy, and Encryption

Identity, privacy, and encryption continue to be active topics for the Internet Society and the IETF community impacting a broad...

Rough Guide to IETF 99: A Sampling of Encryption-Related Activities
Rough Guide to IETF 99: A Sampling of Encryption-Related Activities
Encryption17 July 2017

Rough Guide to IETF 99: A Sampling of Encryption-Related Activities

Encryption is once again a hot topic, and there’s much to discuss at IETF 99 this week in Prague. This...

Join the conversation with Internet Society members around the world