{"id":66496,"date":"2017-11-14T12:00:16","date_gmt":"2017-11-14T12:00:16","guid":{"rendered":"https:\/\/www.internetsociety.org\/?p=66496"},"modified":"2025-06-06T20:30:38","modified_gmt":"2025-06-06T20:30:38","slug":"deploy360ietf-100-day-3-sidr-tls-crypto","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2017\/11\/deploy360ietf-100-day-3-sidr-tls-crypto\/","title":{"rendered":"Deploy360 at IETF 100, Day 3: SIDR, TLS &#038; Crypto"},"content":{"rendered":"<p>This week is\u00a0<a href=\"https:\/\/www.ietf.org\/meeting\/100\/\">IETF 100<\/a>\u00a0in Singapore, and\u00a0we&#8217;re bringing you daily blog posts highlighting some of the topics that <a href=\"https:\/\/www.internetsociety.org\/deploy360\/\">Deploy360<\/a>\u00a0is interested in. After the focus on IPv6 &amp; IoT during the first couple of days, we&#8217;re switching tack today with a focus on routing and crypto matters.<\/p>\n<p>We&#8217;re having to wait until after lunch, but then there&#8217;s a choice of UTA, SIDROPS or ROLL\u00a0at 13.30\u00a0SGT\/UTC+8.<\/p>\n<p><a href=\"https:\/\/datatracker.ietf.org\/group\/uta\/about\/\">UTA<\/a> will be focusing on resolving the final IESG comments on the <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-uta-email-deep\/\">use of TLS for email submission and access<\/a>\u00a0which outlines current recommendations for using TLS to provide confidentiality of email traffic between a mail user agent and a mail access server. Next up for discussion are the open issues on a draft related to <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-uta-mta-sts\/\">Strict Transport Security (STS) for mail (SMTP) transfer agents and mail user agents<\/a>, before consideration of \u00a0a draft on an <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-uta-smtp-require-tls\/\">option to require TLS for SMTP<\/a>.<\/p>\n<hr \/>\n<p><strong>NOTE:<\/strong>\u00a0If you are unable to attend IETF 100 in person,\u00a0<a href=\"http:\/\/www.ietf.org\/live\/\">there are multiple ways to participate remotely<\/a>.<\/p>\n<hr \/>\n<p>Over in <a href=\"https:\/\/datatracker.ietf.org\/group\/sidrops\/about\/\">SIDROPS<\/a>, there will be a review of the status of BGP Origin Validation deployment in RENATA: the Columbia National Research and Education Network. This represents the first wide-scale deployment in the world, so the results should be quite interesting. There will also be a review of the status of RPKI deployment with IXPs, and the\u00a0problems of ROAs issued with Multiple Prefixes is expected to be discussed. That just leaves a draft on\u00a0Extending RFC8208 by adding Experimental\/Documentation algorithm IDs, which has yet to be published.<\/p>\n<p>Meanwhile,\u00a0<a href=\"https:\/\/datatracker.ietf.org\/group\/roll\/about\/\">ROLL<\/a>\u00a0will focus on routing protocols for constrained-node networks, and has 3 working group drafts up for discussion, along with 3 new drafts.<\/p>\n<p>Concluding our topics for the day is CFRG at 15.20 SGT\/UTC+8. This will discuss four drafts including <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-re-keying\">Re-keying Mechanisms for Symmetric Keys<\/a>, <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-hoffman=c2pq-02.txt\">The Transition from Classical to Post-Quantum Cryptography<\/a>, <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-spake2\/\">SPAKE2<\/a>, a secure, efficient password based key exchange protocol, and <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-harkins-pkex\/\">PKEX: Public Key Exchange<\/a>.<\/p>\n<p>For more background, please read the\u00a0<a href=\"https:\/\/www.internetsociety.org\/events\/ietf\/ietf-100\/\">Rough Guide to IETF 100<\/a>\u00a0from Olaf, Dan, Andrei, Steve, Karen and myself.<\/p>\n<h3>Relevant Working Groups<\/h3>\n<ul>\n<li><a href=\"https:\/\/datatracker.ietf.org\/meeting\/100\/materials\/agenda-100-uta\/\">Using TLS in Applications<\/a> &#8211; Bras Basah @ 13.30-15.00 UTC+8<\/li>\n<li><a href=\"https:\/\/datatracker.ietf.org\/meeting\/100\/materials\/agenda-100-sidrops\/\">SIDR Operations<\/a> &#8211; Sophia @ 13.30-15.00 UTC+8<\/li>\n<li><a href=\"https:\/\/datatracker.ietf.org\/meeting\/100\/materials\/agenda-100-roll\/\">Routing Over Low power and Lossy networks<\/a> &#8211; VIP A\u00a0@ 13.30-15.00 UTC+8<\/li>\n<li><a href=\"https:\/\/datatracker.ietf.org\/meeting\/100\/materials\/agenda-100-cfrg\/\">Crypto Forum<\/a> &#8211; VIP A @ 15.20-16.50 UTC+8<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This week is\u00a0IETF 100\u00a0in Singapore, and\u00a0we&#8217;re bringing you daily blog posts highlighting some of the topics that Deploy360\u00a0is interested in. After the focus on IPv6 &amp; IoT during the first couple of days, we&#8217;re switching tack today with a focus on routing and crypto matters. We&#8217;re having to wait until after lunch, but then there&#8217;s [&hellip;]<\/p>\n","protected":false},"author":1411,"featured_media":65482,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[40,100,95,92,89,2005,102],"tags":[6055],"region_news_regions":[21],"content_category":[6102],"ppma_author":[4605],"class_list":["post-66496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-encryption","category-ietf","category-iot","category-deploy360","category-ipv6","category-securing-bgp","category-tls","tag-ietf-meetings-es","region_news_regions-asia-pacific","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg",1281,851,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg",1281,851,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg",1281,851,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-e1521226784185.jpg",600,399,false]},"uagb_author_info":{"display_name":"Kevin Meynell","author_link":"https:\/\/www.internetsociety.org\/es\/author\/meynell2\/"},"uagb_comment_info":0,"uagb_excerpt":"This week is\u00a0IETF 100\u00a0in Singapore, and\u00a0we&#8217;re bringing you daily blog posts highlighting some of the topics that Deploy360\u00a0is interested in. After the focus on IPv6 &amp; IoT during the first couple of days, we&#8217;re switching tack today with a focus on routing and crypto matters. We&#8217;re having to wait until after lunch, but then there&#8217;s&hellip;","authors":[{"term_id":4605,"user_id":1411,"is_guest":0,"slug":"meynell2","display_name":"Kevin Meynell","avatar_url":{"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url2x":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g2x"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/66496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1411"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=66496"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/66496\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/65482"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=66496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=66496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=66496"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=66496"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=66496"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=66496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}