Workshop Details
Workshop Report: RFC 8462: Report from the IAB Workshop on Managing Radio Networks in an Encrypted World (MaRNEW)
Title: Managing Radio Networks in an Encrypted World (MaRNEW)
Date: Thursday 24th – Friday 25th September, 2015
Place: AT&T Atlanta, Atlanta, GA (see “Venue” below for more details)
Time: 9am – 6pm both days
Please sign up to the mailing list to receive up to date information about the workshop. To post a message to all the list members, send email to marnew@iab.org.
Workshop Bio
Mobile networks have a set of requirements and properties which places a large emphasis on sophisticated bandwidth optimization. Encryption is increasing on the internet which is a good thing for consumer and business privacy and security. Many existing mobile bandwidth optimization solutions primarily operate on non-encrypted communications; this can lead to performance issues being amplified on mobile networks. Encryption on networks will continue to increase; and with this understanding the workshop aims to understand how we can solve the issues of bandwidth optimization and performance on radio networks in this encrypted world.
Understanding “Bandwidth Optimization”
For the purposes of this workshop, bandwidth optimization encompasses a variety of technical topics related to traffic engineering, prioritisation, optimisation, efficiency enhancements, as well as user-related topics such as specific subscription or billing models. These can include:
- Caching
- Prioritisation of interactive traffic over background traffic,
- Per-user bandwidth limits
- Business-related topics such as content delivery arrangements with specific content providers.
Many of these functions can continue as they’re performed today, even with more encryption. Others traditionally inspect parts of the communication that are encrypted, and will have to be done differently in a more-encrypted Internet.
Finally, while not strictly speaking traffic management, some networks employ policy-based filtering (e.g., requested parental controls) and all networks support some form of legal interception functionality per applicable laws.
Topics
For this workshop we would like to consider topics that speak to these questions, including the following:
- Understanding the bandwidth optimization use cases particular to radio networks
- Understanding existing approaches and how these do not work with encrypted traffic
- Understanding reasons why the Internet has not standardised support for LI and why mobile networks have
- Determining how to match traffic types with bandwidth optimization methods
- Discussing minimal information to be shared to manage networks but ensure user security and privacy
- Developing new bandwidth optimization techniques and protocols within these new constraints
- Discussing the appropriate network layer(s) for each management function
- Cooperative methods of bandwidth optimization and issues associated with these
The outcome of the workshop will be architectural and engineering guidance on future work in the area, published as an IAB workshop report, based on discussion of proposed approaches. We will also explore possible areas for standardization, e.g. new protocols that can aid bandwidth optimization whilst ensuring user security inline with new work in the transport layer.
Position Papers
- Mohammed Dadas, Emile Stephan, Mathilde Cayla, Iuniana Oprescu, Cooperation Framework between Application layer and Lower Layers
- Julien Maisonneuve, Thomas Fossati and Vijay Gurbani, The security pendulum and the network
- Martin Peylo, Position Paper “Enabling Secure QoE Measures for Internet Applications over Radio Networks is a MUST”
- Vijay Devarapalli, The bandwidth balancing act: Managing QoE as encrypted services change the traffic optimization game
- Humberto La Roche, Use Cases for Communicating End-Points in Mobile Network Middle-Boxes
- Richard Barnes and Patrick McManus, User Consent and Security as a Public Good
- Iuniana Oprescu, Jon Peterson and Natasha Rooney, A Framework for Consent and Permissions in Mediating TLS
- Jari Arkko and Göran Eriksson, Characteristics of Traffic Type Changes and Their Architectural Implications
- Szilveszter Nadas and Attila Mihaly, Traffic Management for Encrypted Traffic focusing on Cellular Networks
- Gianpaolo Scassellati, Vimpelcom Position Paper for MaRNEW Meeting
- Mirja Kuehlewind, Dirk Kutscher and Brian Trammell, Enabling Traffic Management without DPI
- Andreas Terzis and Chris Bentzel, Sharing network state with application endpoints
- Marcus Ihlar, Robert Skog and Salvatore Loreto, The needed existence of Performance Enhancing Proxies in an Encrypted World
- John Mattsson, Network Operation in an All-Encrypted World
- Dirk Kutscher, Giovanna Carofiglio, Luca Muscariello and Paul Polakos, Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking
- Chunshan Xiong and Milan Patel, The effect of encrypted traffic on the QoS mechanisms in cellular networks
- Thomas Anderson, Peter Bosch and Alessandro Duminuco, Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms
- Karen O’Donoghue and Phil Roberts, Barriers to Deployment: Probing the Potential Differences in Developed and Developing Infrastructure
- Wendy Seltzer, Performance, Security, and Privacy Considerations for the Mobile Web
- Jianjie You, Hanyu Wei and Huaru Yang, Use Case Analysis and Potential Bandwidth Optimization Methods for Encrypted Traffic
- Mangesh Kasbekar and Vinay Kanitkar, CDNs, Network Services and Encrypted Traffic
- Claude Rocray, Mark Santelli and Yves Hupe, Providing Optimization of Encrypted HTTP Traffic
- Zubair Shafiq, Tracking Mobile Video QoE in the Encrypted Internet
- Kevin Smith, Encryption and government regulation: what happens now?
Workshop Slides
Workshop sessions were run as panels with minimal slides. These slides were either presented or just discussed throughout the sessions.
MarNEW Main Slide Deck, Natasha Rooney
Scene Setting, Stephen Farrell
GSMA Process Background, Natasha Rooney
Security, Privacy, and the Effects of Ubiquitous Encryption, Kathleen Moriarty
Concept for Cooperative Traffic Management, Szilveszter Nadas, Attila Mihaly
Security, Privacy, and Performance Considerations for the Mobile Web, Wendy Seltzer
Mobile Use Cases for Encrypted Traffic, Chunshan Xiong
Enabling Traffic Management without DPI, Mirja Kuhlewind, Dirk Kutscher, Brian Trammell
Optimizing TCP for Radio, Marcus Ihlar
Transport Layer Issues, Optimizations, and Solutions, Spencer Dawkins
Workshop Transcription
A Workshop Transcription will be created after the workshop has finished.
Additional Reading
- Network Management of Encrypted Traffic, GSMA, Feb 2015
- IAB Statement on Internet Confidentiality, IAB, Nov 2014
- Securing the Web, W3C TAG Finding, January 2015
- Pervasive Monitoring is an Attack, IETF RFC 7258/BCP188, May 2014
- IETF Policy on Wiretapping, IETF RFC 2804, May 2000
Agenda
Date | Time | Description |
---|---|---|
Thur 24 | 09:00 – 09:20 | Introduction: welcome, introductions and announcements |
09:20 – 10:00 | Scene Setting: defining goals, layouts and key in and out of cope topics. | |
10:00 – 11:15 | Session 1: Encryption Deployment Considerations | |
11:15 – 11:45 | Coffee Break | |
11:45 – 13:00 | Session 2: Trust Models and User Choice (Privacy) | |
13:00 – 14:00 | Lunch | |
14:00 – 15:45 | Session 3: Sending Data Up for Network Management Benefits | |
15:45 – 16:15 | Break | |
16:15 – 17:30 | Session 4: Sending Data Down for Network Management Benefits | |
17:30 – 18:00 | Day 1 Wrap Up | |
18:30 | Social Dinner, SunDial Restaurant, 210 Peachtree St NW, Atlanta, GA 30303 | |
Fri 25 | 09:00 – 10:30 | Session 5: Application Layer Optimisation, Caching and CDNs |
10:30 – 11:00 | Break | |
11:00 – 12:30 | Session 6: Transport Layer: Issues, Optimisation and Solutions | |
12:30 – 13:30 | Lunch | |
13:30 – 14:30 | Session 7: Technical Analysis and Response to Potential Regulatory Reaction | |
14:30 – 15:30 | Parking Lot: time to review open questions from the last two days | |
15:30 – 16:00 | Break | |
16:00 – 17:00 | Roundup |
Attendees
Rich Salz, Akamai
Aaron Falk, Akamai
Vinay Kanitkar, Akamai
Julien Maisonneuve, Alcatel Lucent
Dan Druta, AT&T
Humberto La Roche, Cisco
Thomas Anderson, Cisco
Paul Polakos, Cisco
Marcus Ihlar, Ericsson
Szilveszter Nadas, Ericsson
John Mattsson, Ericsson
Salvatore Loreto, Ericsson
Blake Matheny, Facebook
Andreas Terzis, Google
Jana Iyengar, Google
Natasha Rooney, GSMA
Istvan Lajtos, GSMA
Emma Wood, GSMA
Jianjie You, Huawei
Chunshan Xiong, Huawei
Russ Housley, IAB
Mary Barnes, IAB
Joe Hildebrand, IAB / Cisco
Ted Hardie, IAB / Google
Robert Sparks, IAB / Oracle
Spencer Dawkins, IETF AD
Benoit Claise, IETF AD / Cisco
Kathleen Moriarty, IETF AD / EMC
Barry Leiba, IETF AD / Huawei
Ben Campbell, IETF AD / Oracle
Stephen Farrell, IETF AD / Trinity College Dublin
Jari Arkko, IETF Chair / Ericsson
Karen O’Donoghue, ISOC
Phil Roberts, ISOC
Olaf Kolkman, ISOC
Christian Huitema, Microsoft
Patrick McManus, Mozilla
Mark Watson, Netflix
Martin Peylo, Nokia
Mohammed Dadas, Orange
Diego Lopez, Telefonica
Matteo Varvello, Telefonica
Zubair Shafiq, The University of Iowa
Vijay Devarapalli, Vasona Networks
Sanjay Mishra, Verizon
Gianpaolo Scassellati, Vimplecom
Kevin Smith, Vodafone
Wendy Seltzer, W3C
Dirk Kutscher, NEC Europe Network Laboratories
Technical Program Committee
- Joe Hildebrand, IAB / Cisco, USA
- Stephen Farrell, IETF AD / Trinity College Dublin, Ireland
- Jari Arkko, IETF Chair / Ericsson, Finland
- Natasha Rooney, GSMA, UK
- Spencer Dawkins, IETF AD / Huawei, USA
- Kathleen Moriarty, IETF AD / EMC, USA
- Barry Leiba, IETF AD / Huawei, USA
- Alia Atlas, IETF AD / Juniper Networks, USA
- Ben Campbell, IETF AD / Oracle, USA
- Karen O’Donoghue, ISOC, USA
- Phil Roberts, ISOC, USA
- Kevin Smith, Vodafone, UK
- Sanjay Mishra, Verizon, USA
- Istvan Lajtos, GSMA, UK
- Salvatore Loreto, Ericsson, Finland
- Diego Lopez, Telefonica, Spain
- Dan Druta, AT&T, USA
- Brian Trammell, ETH Zurich, Switzerland
Sponsored by the Internet Architecture Board, ISOC, AT&T and GSM Association.