1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
|
Internet Architecture Board (IAB) N. Rooney
Request for Comments: 8462 S. Dawkins, Ed.
Category: Informational October 2018
ISSN: 2070-1721
Report from the IAB Workshop on
Managing Radio Networks in an Encrypted World (MaRNEW)
Abstract
The Internet Architecture Board (IAB) and GSM Association (GSMA) held
a joint workshop on Managing Radio Networks in an Encrypted World
(MaRNEW), on September 24-25, 2015. This workshop aimed to discuss
solutions for bandwidth optimization on mobile networks for encrypted
content, as current solutions rely on unencrypted content, which is
not indicative of the security needs of today's Internet users. The
workshop gathered IETF attendees, IAB members, and participants from
various organizations involved in the telecommunications industry
including original equipment manufacturers, content providers, and
mobile network operators.
The group discussed Internet encryption trends and deployment issues
identified within the IETF and the privacy needs of users that should
be adhered to. Solutions designed around sharing data from the
network to the endpoints and vice versa were then discussed; in
addition, issues experienced when using current transport-layer
protocols were also discussed. Content providers and Content
Delivery Networks (CDNs) gave their own views of their experiences
delivering their content with mobile network operators. Finally,
technical responses to regulation were discussed to help the
regulated industries relay the issues of impossible-to-implement or
bad-for-privacy technologies back to regulators.
A group of suggested solutions were devised, which will be discussed
in various IETF groups moving forward.
Rooney & Dawkins Informational [Page 1]
^L
RFC 8462 MaRNEW October 2018
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Architecture Board (IAB)
and represents information that the IAB has deemed valuable to
provide for permanent record. It represents the consensus of the
Internet Architecture Board (IAB). Documents approved for
publication by the IAB are not candidates for any level of Internet
Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc8462.
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Rooney & Dawkins Informational [Page 2]
^L
RFC 8462 MaRNEW October 2018
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1. Understanding "Bandwidth Optimization" . . . . . . . . . 4
1.2. Topics . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3. Organization of This Report . . . . . . . . . . . . . . . 5
1.4. Use of Note Well and the Chatham House Rule . . . . . . . 6
1.5. IETF and GSMA . . . . . . . . . . . . . . . . . . . . . . 6
2. Scene-Setting Sessions . . . . . . . . . . . . . . . . . . . 7
2.1. Scene Setting . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1. Scope . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.2. Encryption Statistics and Radio Access Network
Differences . . . . . . . . . . . . . . . . . . . . . 8
2.2. Encryption Deployment Considerations . . . . . . . . . . 9
2.3. Awareness of User Choice (Privacy) . . . . . . . . . . . 10
3. Network or Transport Solution Sessions . . . . . . . . . . . 11
3.1. Sending Data Up/Down for Network Management Benefits . . 11
3.1.1. Competition, Cooperation, and Mobile Network
Complexities . . . . . . . . . . . . . . . . . . . . 12
4. Transport Layer: Issues, Optimization, and Solutions . . . . 13
5. Application-Layer Optimization, Caching, and CDNs . . . . . . 14
6. Technical Analysis and Response to Potential Regulatory
Reaction . . . . . . . . . . . . . . . . . . . . . . . . . . 15
7. Suggested Principles and Solutions . . . . . . . . . . . . . 16
7.1. Better Collaboration . . . . . . . . . . . . . . . . . . 19
8. Since MaRNEW . . . . . . . . . . . . . . . . . . . . . . . . 19
9. Security Considerations . . . . . . . . . . . . . . . . . . . 20
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 20
11. Informative References . . . . . . . . . . . . . . . . . . . 20
Appendix A. Workshop Attendees . . . . . . . . . . . . . . . . . 24
Appendix B. Workshop Position Papers . . . . . . . . . . . . . . 26
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 28
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 28
Rooney & Dawkins Informational [Page 3]
^L
RFC 8462 MaRNEW October 2018
1. Introduction
The Internet Architecture Board (IAB) and GSM Association (GSMA) held
a joint workshop on Managing Radio Networks in an Encrypted World
(MaRNEW), on September 24-25, 2015. This workshop aimed to discuss
solutions for bandwidth optimization on mobile networks for encrypted
content, as current solutions rely on unencrypted content, which is
not indicative of the security needs of today's Internet users.
Mobile networks have a set of properties that place a large emphasis
on sophisticated bandwidth optimization. The use of encryption is
increasing on the Internet, which is positive for consumer and
business privacy and security. Many existing solutions for mobile
bandwidth optimization primarily operate on non-encrypted
communications; this can lead to performance issues being amplified
on mobile networks. The use of encryption on networks will continue
to increase; with this understanding, the workshop aimed to
understand how we can solve the issues of bandwidth optimization and
performance on radio networks in this encrypted world.
1.1. Understanding "Bandwidth Optimization"
For the purposes of this workshop, bandwidth optimization encompasses
a variety of technical topics related to traffic engineering,
prioritization, optimization, and efficiency enhancements. It also
encompasses user-related topics such as specific subscription or
billing models, and it may touch upon regulatory aspects or other
issues relating to government-initiated regulatory concerns.
The first category of bandwidth optimization includes the following:
o Caching
o Prioritization of interactive traffic over background traffic
o Per-user bandwidth limits
The second category of bandwidth optimization may depend on one or
more of the first category optimization strategies, but may, in
particular, also encompass business-related topics such as content
delivery arrangements with content providers.
Finally, while not strictly speaking of traffic management, some
networks employ policy-based filtering (e.g., requested parental
controls), and many networks support some form of legal interception
functionality per applicable laws.
Rooney & Dawkins Informational [Page 4]
^L
RFC 8462 MaRNEW October 2018
Many of these functions can continue as they are performed today,
even with increased use of encryption. Others are using methods that
inspect parts of the communication that are not encrypted today, but
will be encrypted, and these functions will have to be done
differently in an increasingly encrypted Internet.
1.2. Topics
The workshop aimed to answer questions that focused on:
o understanding the bandwidth optimization use cases particular to
radio networks;
o understanding existing approaches and how these do not work with
encrypted traffic;
o understanding reasons why the Internet has not standardized
support for lawful intercept and why mobile networks have;
o determining how to match traffic types with bandwidth optimization
methods
o discussing minimal information to be shared to manage networks but
ensure user security and privacy;
o developing new bandwidth optimization techniques and protocols
within these new constraints;
o discussing the appropriate network layer(s) for each management
function; and
o cooperative methods of bandwidth optimization and issues
associated with these.
The further aim was to gather architectural and engineering guidance
on future work in the bandwidth optimization area based on the
discussions around the proposed approaches. The workshop also
explored possible areas for standardization, e.g., new protocols that
can aid bandwidth optimization whilst ensuring that user security is
in line with new work in transport-layer protocols.
1.3. Organization of This Report
This workshop report summarizes the contributions to and discussions
at the workshop, organized by topic. The workshop began with scene-
setting topics that covered the issues around deploying encryption,
the increased need for privacy on the Internet, and setting a clear
understanding that ciphertext should remain unbroken. Later sessions
Rooney & Dawkins Informational [Page 5]
^L
RFC 8462 MaRNEW October 2018
focused on key solution areas; these included evolution on the
transport layer and sending data up or down the path. A session on
application layers and CDNs aimed to highlight both issues and
solutions experienced on the application layer. The workshop ended
with a session dedicated to discussing a technical response to
regulation with regards to encryption. The contributing documents
identified the issues experienced with encryption on radio networks
and suggested solutions. Of the solutions suggested, some focused on
transport evolution, some on trusted middleboxes, and others on
collaborative data exchange. Solutions were discussed within the
sessions. All accepted position papers and detailed transcripts of
discussion are available at [MARNEW].
The outcomes of the workshop are discussed in Sections 7 and 8; they
discuss the progress made since the workshop toward each of the
identified work items through the time this document was approved for
publication.
Report readers should be reminded that this workshop did not aim to
discuss regulation or legislation, although policy topics were
mentioned in discussions from time to time.
1.4. Use of Note Well and the Chatham House Rule
The workshop was conducted under the IETF [NOTE_WELL] with the
exception of the "Technical Analysis and Response to Potential
Regulatory Reaction" session, which was conducted under the
[CHATHAM_HOUSE_RULE].
1.5. IETF and GSMA
The IETF and GSMA [GSMA] have different working practices, standards,
and processes. IETF is an open organization with community-driven
standards, with the key aim of functionality and security for the
Internet's users, while the GSMA is membership based and serves the
needs of its membership base, most of whom are mobile network
operators.
Unlike IETF, GSMA makes few standards. Within the telecommunications
industry, standards are set in various divergent groups depending on
their purpose. Perhaps of most relevance to the bandwidth
optimization topic here is the work of the 3rd Generation Partnership
Project (3GPP) [SDO_3GPP], which works on radio network and core
network standards. 3GPP members include mobile operators and
original equipment manufacturers.
Rooney & Dawkins Informational [Page 6]
^L
RFC 8462 MaRNEW October 2018
One of the 3GPP standards relevant to this workshop is Policy and
Charging Control QoS [PCC-QOS]. Traditionally, mobile networks have
managed different applications and services based on the resources
available and priorities given; for instance, emergency services have
a top priority, data has a lower priority, and voice services are
somewhere in-between. 3GPP defined the PCC-QoS mechanism to support
this functionality, and this depends on unencrypted communications
[EffectEncrypt].
2. Scene-Setting Sessions
Scene-setting sessions aimed to bring all attendees up to a basic
understanding of the problem and the scope of the workshop.
There were three scene-setting sessions:
o Section 2.1: Scene Setting
o Section 2.2: Encryption Deployment Considerations
o Section 2.3: Awareness of User Choice (Privacy)
2.1. Scene Setting
The telecommunications industry and Internet standards community are
extremely different in terms of ethos and practices. Both groups
drive technical standards in their domain and build technical
solutions with some policy-driven use cases. These technologies, use
cases, and technical implementations are different, and the
motivators between the two industries are also diverse.
To ensure all attendees were aligned with contributing to discussions
and driving solutions, this "Scene Setting" session worked on
generating a clear scope with all attendees involved. In short, it
was agreed that 1) ciphertext encrypted by one party and intended to
be decrypted by a second party should not be decrypted by a third
party in any solution, 2) the Radio Access Network (RAN) does
experience issues with increased encrypted traffic, 3) the RAN issues
need to be understood precisely, and 4) the goal is to improve user
experience on the Internet. Proposing new technical solutions based
on presumed future regulation was not in scope. The full scope is
given below.
Rooney & Dawkins Informational [Page 7]
^L
RFC 8462 MaRNEW October 2018
2.1.1. Scope
The attendees identified and agreed to the scope described here.
We should do the following:
o in discussion, assume that there is no broken crypto; ciphertext
is increasingly common; congestion does need to be controlled (as
do other transport issues); and network management, including
efficient use of resources in RAN and elsewhere, has to work;
o identify how/why RAN is different for transport, and attempt to
understand the complexities of RAN (i.e., how hard it is to
manage) and why those complexities matter;
o identify the precise problems caused by increased use of
encryption;
o identify players (in addition to end users), the resulting
tensions, and how ciphertext changes those tensions;
o discuss how some solutions will be radically changed by ciphertext
(it's ok to talk about that)
o assume that the best possible quality of experience for the end
user is a goal; and lastly,
o for the next two days, aim to analyze the situation and identify
specific achievable tasks that could be tackled in the IETF or
GSMA (or elsewhere) and that improve the Internet given the
assumptions above.
We should not delve into the following:
o ways of doing interception, legal or not, for the reasons
described in [RFC2804]; and,
o unpredictable political actions.
2.1.2. Encryption Statistics and Radio Access Network Differences
According to then-current statistics, attendees were shown that
encrypted content reaches around 50% [STATE_BROWSER] [STATE_SERVER].
The IAB is encouraging all IETF working groups to consider the effect
encryption being "on by default" will have on new protocol work. The
IETF is also working on encryption at lower layers. One recent
Rooney & Dawkins Informational [Page 8]
^L
RFC 8462 MaRNEW October 2018
example of this work is opportunistic TCP encryption within the TCP
Increased Security [TCPINC] Working Group. The aims of these work
items are greater security and privacy for end users and their data.
Telecommunications networks often contain middleboxes that operators
have previously considered to be trusted, but qualifying trust is
difficult and should not be assumed. Some interesting use cases
exist with these middleboxes, such as anti-spam and malware
detection, but these need to be balanced against their ability to
open up cracks in the network for attacks such as pervasive
monitoring.
When operators increase the number of radio access network cells
(base stations), this can improve the radio access network quality of
service; however, it also adds to radio pollution. This is one
example of the balancing act required when devising radio access
network architecture.
2.2. Encryption Deployment Considerations
Encryption across the Internet is on the rise. However, some
organizations and individuals that are mainly driven by commercial
perspectives come across a common set of operational issues when
deploying encryption. [RFC8404] explains these network management
function impacts, detailing areas around incident monitoring, access
control management, and regulation on mobile networks. The data was
collected from various Internet players, including system and network
administrators across enterprise, governmental organizations, and
personal use. The aim of the document is to gain an understanding of
what is needed for technical solutions to these issues while
maintaining security and privacy for users. Attendees commented that
worthwhile additions would be different business environments (e.g.,
cloud environments) and service chaining. Incident monitoring in
particular was noted as a difficult issue to solve given the use of
URLs in today's incident monitoring middleware.
Some of these impacts to mobile networks can be resolved using
different methods, and the [NETWORK_MANAGEMENT] document details
these methods. The document focuses heavily on methods to manage
network traffic without breaching user privacy and security.
By reviewing encryption deployment issues and the alternative methods
of network management, MaRNEW attendees were made aware of the issues
that affect radio networks, the deployment issues that are solvable
and require no further action, and those issues that have not yet
been solved but should be addressed within the workshop.
Rooney & Dawkins Informational [Page 9]
^L
RFC 8462 MaRNEW October 2018
2.3. Awareness of User Choice (Privacy)
Some solutions intended to improve delivery of encrypted content
could affect some or all of the privacy benefits that encryption
provides. Understanding user needs and desires for privacy is
therefore important when designing these solutions.
From a then-current study [Pew2014], 64% of users said concerns over
privacy have increased, and 67% of mobile Internet users would like
to do more to protect their privacy. The World Wide Web Consortium
(W3C) and IETF have both responded to user desires for better privacy
by recommending encryption for new protocols and web technologies.
Within the W3C, new security standards are emerging, and the design
principles for HTML maintain that users are the stakeholders with the
highest priority, followed by implementors and other stakeholders,
which further enforces the "user first" principle. Users also have
certain security expectations from particular contexts and sometimes
use new technologies to further protect their privacy, even if those
technologies weren't initially developed for that purpose.
Operators may deploy technologies that can either impact user privacy
without being aware of those privacy implications or incorrectly
assume that the benefits users gain from the new technology outweigh
the loss of privacy. If these technologies are necessary, they
should be opt in.
Internet stakeholders should understand the priority of other
stakeholders. Users should be considered the first priority. Other
stakeholders include implementors, developers, advertisers,
operators, and other ISPs. Some technologies, such as cookie use and
JavaScript injection, have been abused by these parties. This has
caused some developers to encrypt content to circumvent these
technologies that are seen as intrusive or bad for user privacy.
If users and content providers are to opt in to network management
services with negative privacy impacts, they should see clear value
from using these services and understand the impacts of using these
services. Users should also have easy abilities to opt out. Some
users will always automatically click through consent requests, so
any model relying on explicit consent is flawed for these users.
Understanding the extent of "auto click-through" may improve
decisions about the use of consent requests in the future. One model
(Cooperative Traffic Management) works as an agent of the user; by
opting in, metadata can be shared. Issues with this involve trust
only being applied at endpoints.
Rooney & Dawkins Informational [Page 10]
^L
RFC 8462 MaRNEW October 2018
3. Network or Transport Solution Sessions
Network or Transport Solution Sessions discussed proposed solutions
for managing encrypted traffic on radio access networks. Most
solutions focus on metadata sharing, whether this sharing takes place
from the endpoint to the network, from the network to the endpoint,
or cooperatively in both directions. Transport-layer protocol
evolution could be another approach to solve some of the issues radio
access networks experience, which cause them to rely on network
management middleboxes. By removing problems at the transport layer,
reliance on expensive and complex middleboxes could decrease.
3.1. Sending Data Up/Down for Network Management Benefits
Collaboration between network elements and endpoints could bring
about better content distribution. A number of suggestions were
given; these included the following:
o Mobile Throughput Guidance [MTG]: exchanges metadata between
network elements and endpoints via TCP options. It also allows
for better understanding of how the transport protocol behaves and
further improves the user experience, although additional work on
MTG is still required.
o Session Protocol for User Datagrams [SPUD]: a UDP-based
encapsulation protocol to allow explicit cooperation with
middleboxes while using, new encrypted transport protocols.
o Network Status API: an API for operators to share congestion
status or the state of a cell before an application starts sending
data that could allow applications to change their behavior.
o Traffic Classification: classifying traffic and adding these
classifications as metadata for analysis throughout the network.
This idea has trust and privacy implications.
o Congestion Exposure [CONEX]: a mechanism where senders inform the
network about the congestion encountered by previous packets on
the same flow, in-band at the IP layer.
o Latency versus Bandwidth: a bit that allows the content provider
to indicate whether higher bandwidth or lower latency is of
greater priority and allows the network to react based on that
indication. Where this bit resides in the protocol stack and how
it is authenticated would need to be decided.
Rooney & Dawkins Informational [Page 11]
^L
RFC 8462 MaRNEW October 2018
o No Network Management Tools: disabling all network management
tools from the network and relying only on end-to-end protocols to
manage congestion.
o Flow Queue Controlled Delay (FQ-CoDel) [FLOWQUEUE]: a hybrid
packet scheduler / Active Queue Management (AQM) [RFC7567]
algorithm aiming to reduce bufferbloat and latency. FQ-CoDel
manages packets from multiple flows and reduces the impact of
head-of-line blocking from bursty traffic.
Some of these suggestions rely on signaling from network elements to
endpoints. Others aim to create "hop-by-hop" solutions, which could
be more aligned with how congestion is managed today but with greater
privacy implications.
Still others rely on signaling from endpoints to network elements.
Some of these rely on implicit signaling and others on explicit
signaling. Some workshop attendees agreed that relying on
applications to explicitly declare the quality of service they
require was not a good path forward given the lack of success with
this model in the past.
3.1.1. Competition, Cooperation, and Mobile Network Complexities
One of the larger issues in sharing data about the problems
encountered with encrypted traffic in wireless networks is the matter
of competition; network operators are reluctant to relinquish data
about their own networks because it contains information that is
valuable to competitors, and application providers wish to protect
their users and reveal as little information as possible to the
network. Some people think that if middleboxes were authenticated
and invoked explicitly, this would be an improvement over current
transparent middleboxes that intercept traffic without endpoint
consent. Some workshop attendees suggested any exchange of
information should be bidirectional in an effort to improve
cooperation between the elements. A robust incentive framework could
provide a solution to these issues or at least help mitigate them.
The radio access network is complex because it must deal with a
number of conflicting demands. Base stations reflect this
environment, and information within these base stations can be of
value to other entities on the path. Some workshop participants
thought solutions for managing congestion on radio networks should
involve the base station if possible. For instance, understanding
how the radio resource controller and AQM [RFC7567] interact (or
don't interact) could provide valuable information for solving
Rooney & Dawkins Informational [Page 12]
^L
RFC 8462 MaRNEW October 2018
issues. Although many workshop attendees agreed that even though
there is a need to understand the base station, not all agreed that
the base station should be part of a future solution.
Some suggested solutions were based on network categorization and on
providing this information to the protocols or endpoints. Completely
categorizing radio networks could be impossible due to their
complexity, but categorizing essential network properties could be
possible and valuable.
4. Transport Layer: Issues, Optimization, and Solutions
TCP has been the dominant transport protocol since TCP/IP replaced
the Network Control Protocol (NCP) on the ARPANET in March 1983. TCP
was originally devised to work on a specific network model that did
not anticipate the high error rates and highly variable available
bandwidth scenarios experienced on modern radio access networks.
Furthermore, new network elements have been introduced (NATs and
network devices with large buffers creating bufferbloat), and
considerable peer-to-peer traffic is competing with traditional
client-server traffic. Consequently, the transport layer today has
requirements beyond what TCP was designed to meet. TCP has other
issues as well; too many services rely on TCP and only TCP, blocking
deployment of new transport protocols like the Stream Control
Transmission Protocol (SCTP) and Datagram Congestion Control Protocol
(DCCP). This means that true innovation on the transport layer
becomes difficult because deployment issues are more complicated than
just building a new protocol.
The IETF is trying to solve these issues through the IAB's IP Stack
Evolution program, and the first step in this program is to collect
data. Network and content providers can provide data including: the
cost of encryption, the advantages of network management tools, the
deployment of protocols, and the effects when network management
tools are disabled. For mostly competitive reasons, network
operators do not tend to reveal network information and so are
unlikely to donate this information freely to the IETF. The GSMA is
in a position to try to collect this data and anonymize it before
bringing it to IETF, which should alleviate the network operator
worries but still provide IETF with some usable data.
Although congestion is only detected when packet loss is encountered
and better methods based on detecting congestion would be beneficial,
a considerable amount of work has already been done on TCP,
especially innovation in bandwidth management and congestion control.
Rooney & Dawkins Informational [Page 13]
^L
RFC 8462 MaRNEW October 2018
Furthermore, although the deficiencies of TCP are often considered
key issues in the evolution of the Internet protocol stack, the main
route to resolve these issues may not be a new TCP, but an evolved
stack. Some workshop participants suggested that SPUD [SPUD] and
Information-Centric Networking (ICN) [RFC7476] may help here. Quick
UDP Internet Connection [QUIC] engineers stated that the problems
solved by QUIC are general problems, rather than TCP issues. This
view was not shared by all attendees of the workshop. Moreover, TCP
has had some improvements in the last few years, which may mean some
of the network lower layers should be investigated to see whether
improvements can be made.
5. Application-Layer Optimization, Caching, and CDNs
Many discussions on the effects of encrypted traffic on radio access
networks happen between implementers and the network operators. This
session aimed to gather the opinions of the content and caching
providers regarding their experiences running over mobile networks,
the quality of experience their users expect, and the content and
caching that providers would like to achieve by working with or using
the mobile network.
Content providers explained how even though this workshop cited
encrypted data over radio access networks as the main issue, the real
issue is network management generally, and all actors (applications
providers, networks, and devices) need to work together to overcome
these general network management issues. Content providers explained
how they assume the mobile networks are standards compliant. When
the network is not standards compliant (e.g., using non-standards-
compliant intermediaries), content providers can experience real
costs as users contact their support centers to report issues that
are difficult to test for and resolve.
Content providers cited other common issues concerning data traffic
over mobile networks. Data subscription limits (known as "caps")
cause issues for users; users are confused about how data caps work
or are unsure how expensive media is and how much data it consumes.
Developers build products on networks not indicative of the networks
their customers are using, and not every organization has the
finances to build a caching infrastructure.
Strongly related to content providers, content owners consider CDNs
to be trusted deliverers of content, and CDNs have shown great
success in fixed networks. Now that more traffic is moving to mobile
networks, there is a need to place caches near the user at the edge
of the mobile network. Placing caches at the edge of the mobile
network is a solution, but it requires standards developed by content
providers and mobile network operators. The IETF's CDN
Rooney & Dawkins Informational [Page 14]
^L
RFC 8462 MaRNEW October 2018
Interconnection [CDNI] Working Group aims to allow global CDNs to
interoperate with mobile CDNs, but this causes huge issues for the
caching of encrypted data between these CDNs. Some CDNs are
experimenting with approaches like "Keyless SSL" [KeylessSSL] to
enable safer storage of content without passing private keys to the
CDN. Blind Caching [BLIND_CACHING] is another proposal aimed at
caching encrypted content closer to the user and managing the
authentication at the original content provider servers.
At the end of the session, each panelist was asked to identify one
key collaborative work item. Work items named were: evolving to
cache encrypted content, using one bit for latency / bandwidth trade-
off (explained below), better collaboration between the network and
application, better metrics to aid troubleshooting and innovation,
and indications from the network to allow the application to adapt.
6. Technical Analysis and Response to Potential Regulatory Reaction
This session was conducted under the Chatham House Rule. The session
aimed to discuss regulatory and political issues, but not their worth
or need, and to understand the laws that exist and how technologists
can properly respond to them.
Mobile networks are regulated; compliance is mandatory and can incur
costs on the mobile network operator, while non-compliance can result
in service license revocation in some nations. Regulation does vary
geographically. Some regulations are court orders and others are
self-imposed regulations, for example, "block lists" of websites such
as the Internet Watch Foundation [IWF] list. Operators are not
expected to decrypt sites, so those encrypted sites will not be
blocked because of content.
Parental-control-type filters also exist on the network and are
easily bypassed today, vastly limiting their effectiveness. Better
solutions would allow for users to easily set these restrictions
themselves. Other regulations are also hard to meet, such as user
data patterns, or will become harder to collect, such as Internet of
Things (IoT) cases. Most attendees agreed that if a government
cannot get information it needs (and is legally entitled to have)
from network operators, they will approach content providers. Some
governments are aware of the impact of encryption and are working
with, or trying to work with, content providers. The IAB has
concluded that blocking and filtering can be done at the endpoints of
the communication.
Rooney & Dawkins Informational [Page 15]
^L
RFC 8462 MaRNEW October 2018
Not all of these regulations apply to the Internet, and the Internet
community is not always aware of their existence. Collectively, the
Internet community can work with GSMA and 3GPP and act together to
alleviate the risk imposed by encrypted traffic. Some participants
expressed concern that governments might require operators to provide
information that they no longer have the ability to provide because
previously unencrypted traffic is now being encrypted, and this might
expose operators to new liability, but no specific examples were
given during the workshop. A suggestion from some attendees was that
if any new technical solutions are necessary, they should easily be
"switched off".
Some mobile network operators are producing transparency reports
covering regulations including lawful intercept. Operators who have
done this already are encouraging others to do the same.
7. Suggested Principles and Solutions
Based on the talks and discussions throughout the workshop, a set of
suggested principles and solutions has been collected. This is not
an exhaustive list, and no attempt was made to come to consensus
during the workshop, so there are likely at least some participants
who would not agree with any particular principle listed below. The
list is a union of participant thinking, not an intersection.
o Encrypted Traffic: Any solution should encourage and support
encrypted traffic.
o Flexibility: Radio access network qualities vary vastly, and the
network needs of content can differ significantly, so any new
solution should be flexible across either the network type,
content type, or both.
o Privacy: New solutions should not introduce new ways for
information to be discovered and attributed to individual users.
o Minimum data only for collaborative work: User data, application
data, and network data all need protection, so new solutions
should use minimal information to make a working solution.
A collection of solutions suggested by various participants during
the workshop is given below. Inclusion in this list does not imply
that other workshop participants agreed. Again, the list is a union
of proposed solutions, not an intersection.
o Evolving TCP or evolution on the transport layer: This could take
a number of forms, and some of this work is already underway
within the IETF.
Rooney & Dawkins Informational [Page 16]
^L
RFC 8462 MaRNEW October 2018
o Congestion Control: Many attendees cited congestion control as a
key issue. Further analysis, investigation, and work could be
done in this space.
o Sprout [SPROUT]: Researched at MIT, Sprout is a transport protocol
for applications that desire high throughput and low delay.
o PCC [PCC]: Performance-oriented Congestion Control is a new
architecture that aims for consistent high performance, even in
challenging scenarios. PCC endpoints observe the connection
between their actions and their known performance, which allows
them to adapt their actions.
o CDNs and Caches: This suggests that placing caches closer to the
edge of the radio network, as close as possible to the mobile
user, or making more intelligent CDNs, would result in faster
content delivery and less strain on the network.
o Blind Caching [BLIND_CACHING]: This is a proposal for caching of
encrypted content.
o CDN Improvements: This includes Keyless SSL and better CDN
placement.
o Mobile Throughput Guidance [MTG]: This is a mechanism and protocol
elements that allow the cellular network to provide near real-time
information on capacity available to the TCP server.
o One Bit for Latency / Bandwidth Trade-Off: This suggests
determining whether using a single bit in an unencrypted transport
header to distinguish between traffic that the sender prefers to
be queued and traffic that the sender would prefer to drop rather
than delay provides additional benefits beyond what can be
achieved without this signaling.
o Base Station: Some suggestions involved using the base station,
but this was not defined in detail. The base station holds the
radio resource controller and scheduler, which could provide a
place to host solutions, or data from the base station could help
in devising new solutions.
o Identify Traffic Types via 5-Tuple: Information from the 5-tuple
could provide understanding of the traffic type, and network
management appropriate for that traffic type could then be
applied.
Rooney & Dawkins Informational [Page 17]
^L
RFC 8462 MaRNEW October 2018
o Heuristics: Networks can sometimes identify traffic types by
observing characteristics, such as data flow rate, and then apply
network management to these identified flows. This is not
recommended, as categorizations can be incorrect.
o APIs: An API for operators to share congestion status or the state
of a cell before an application starts sending data could allow
applications to change their behavior. Alternatively, an API
could provide the network with information on the data type,
allowing appropriate network management for that data type;
however, this method exposes privacy issues.
o Standard approach for the operator to offer services to Content
Providers: Mobile network operators could provide caching services
or other services for content providers to use for faster and
smoother content delivery.
o AQM [RFC7567] and ECN [RFC3168] deployments: Queuing and
congestion management methods have existed for some time in the
form of AQM, ECN, and others, which can help the transport and
Internet protocol layers adapt to congestion faster.
o Trust Model or Trust Framework: Some solutions in this area (e.g.,
SPUD) have a reliance on trust when content providers or the
network are being asked to add classifiers to their traffic.
o Keyless SSL [KeylessSSL]: This allows content providers to
maintain their private keys on a key server and host the content
elsewhere (e.g., on a CDN). This could become standardized in the
IETF. [LURK]
o Meaningful capacity sharing: This includes the ConEx [CONEX] work,
which exposes information about congestion to the network nodes.
o Hop-by-hop: Some suggestions offer hop-by-hop methods that allow
nodes to adapt flow given the qualities of the networks around
them and the congestion they are experiencing.
o Metrics and metric standards: In order to evolve current protocols
to be best suited to today's networks, data is needed about
current network conditions, protocol deployments, packet traces,
and middlebox behavior. Beyond this, proper testing and debugging
on networks could provide great insight for stack evolution.
o 5G: Mobile operator standards bodies are in the process of setting
the requirements for 5G. Requirements for network management
could be added.
Rooney & Dawkins Informational [Page 18]
^L
RFC 8462 MaRNEW October 2018
In the workshop, attendees identified other areas where greater
understanding could help the standards process. These were
identified as:
o greater understanding of the RAN within the IETF;
o reviews and comments on 3GPP perspective; and,
o how to do congestion control in the RAN.
7.1. Better Collaboration
Throughout the workshop, attendees placed emphasis on the need for
better collaboration between the IETF and telecommunications bodies
and organizations. The workshop was one such way to achieve this,
but the good work and relationships built in the workshop should
continue so the two groups can work on solutions that are better for
both technologies and users.
8. Since MaRNEW
Since MaRNEW, a number of activities have taken place in various IETF
working groups and in groups external to IETF. The Alternatives to
Content Classification for Operator Resource Deployment (ACCORD) BoF
was held at IETF 95 in November 2015, which brought the workshop
discussion to the wider IETF audiences by providing an account of the
discussions that had taken place within the workshop and highlighting
key areas to progress on. Key areas to progress on and an update on
their current status are as follows:
o The collection of usable metrics and data were requested by a
number of MaRNEW attendees, especially for use within the IRTF
Measurement and Analysis for Protocols (MAP) Research Group; this
data has been difficult to collect due to the closed nature of
mobile network operators.
o Understanding impediments to protocol stack evolution has
continued within the IAB's IP Stack Evolution program and
throughout transport-related IETF working groups such as the
Transport Area Working Group (TSVWG).
o The Mobile Throughput Guidance document [MTG] has entered into a
testing and data collection phase, although further advancements
in transport technologies (QUIC, among others) may have stalled
efforts in TCP-related proposals.
Rooney & Dawkins Informational [Page 19]
^L
RFC 8462 MaRNEW October 2018
o Work on proposals for caching encrypted content continue, albeit
with some security flaws that proponents are working on further
proposals to fix. Most often, these are discussed within the IETF
HTTPbis Working Group.
o The Path Layer UDP Substrate (PLUS) BOF at IETF 96 in July 2016
did not result in the formation of a working group, as attendees
expressed concern on the privacy issues associated with the
proposed data-sharing possibilities of the shim layer.
o The Limited Use of Remote Keys (LURK) BOF at IETF 96 in July 2016
did not result in the formation of a working group because the BOF
identified more problems with the presumed approach than
anticipated.
The most rewarding output of MaRNEW is perhaps the most intangible.
MaRNEW gave two rather divergent industry groups the opportunity to
connect and discuss common technologies and issues affecting users
and operations. Mobile network providers and key Internet engineers
and experts have developed a greater collaborative relationship to
aid development of further standards that work across networks in a
secure manner.
9. Security Considerations
This document is an IAB report from a workshop on interactions
between network security, especially privacy, and network
performance.
It does not affect the security of the Internet, taken on its own.
10. IANA Considerations
This document has no IANA actions.
11. Informative References
[BLIND_CACHING]
Thomson, M., Eriksson, G., and C. Holmberg, "Caching
Secure HTTP Content using Blind Caches", Work in
Progress, draft-thomson-http-bc-01, October 2016.
[CDNI] IETF, "Content Delivery Networks Interconnection (cdni)",
<https://datatracker.ietf.org/wg/cdni/charter/>.
[CHATHAM_HOUSE_RULE]
Chatham House, "Chatham House Rule | Chatham House",
<https://www.chathamhouse.org/about/chatham-house-rule>.
Rooney & Dawkins Informational [Page 20]
^L
RFC 8462 MaRNEW October 2018
[CONEX] IETF, "Congestion Exposure (conex) - Documents",
<https://datatracker.ietf.org/wg/conex/documents/>.
[EffectEncrypt]
Xiong, C. and M. Patel, "The effect of encrypted traffic
on the QoS mechanisms in cellular networks", August 2015,
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_25.pdf>.
[FLOWQUEUE]
Hoeiland-Joergensen, T., McKenney, P., Taht, D., Gettys,
J., and E. Dumazet, "FlowQueue-Codel", Work in Progress,
draft-hoeiland-joergensen-aqm-fq-codel-01, November 2014.
[GSMA] GSMA, "GSMA Homepage", <http://gsma.com>.
[IWF] IWF, "Internet Watch Foundation Homepage",
<https://www.iwf.org.uk/>.
[KeylessSSL]
Sullivan, N., "Keyless SSL: The Nitty Gritty Technical
Details", September 2014, <https://blog.cloudflare.com/
keyless-ssl-the-nitty-gritty-technical-details/>.
[LURK] Migault, D., Ma, K., Salz, R., Mishra, S., and O. Dios,
"LURK TLS/DTLS Use Cases", Work in Progress,
draft-mglt-lurk-tls-use-cases-02, June 2016.
[MARNEW] IAB, "Managing Radio Networks in an Encrypted World
(MaRNEW) Workshop 2015",
<https://www.iab.org/activities/workshops/marnew/>.
[MTG] Jain, A., Terzis, A., Flinck, H., Sprecher, N.,
Arunachalam, S., Smith, K., Devarapalli, V., and R. Yanai,
"Mobile Throughput Guidance Inband Signaling Protocol",
Work in Progress, draft-flinck-mobile-throughput-guidance-
04, March 2017.
[NETWORK_MANAGEMENT]
Smith, K., "Network management of encrypted traffic", Work
in Progress, draft-smith-encrypted-traffic-management-05,
May 2016.
[NOTE_WELL]
IETF, "IETF Note Well",
<https://www.ietf.org/about/note-well.html>.
Rooney & Dawkins Informational [Page 21]
^L
RFC 8462 MaRNEW October 2018
[PCC] Dong, M., Li, Q., Zarchy, D., Brighten Godfrey, P., and M.
Schapira, "PCC: Re-architecting Congestion Control for
Consistent High Performance", Proceedings of the 12th
USENIX Symposium on Networked Systems Design and
Implementation (NSDI '15), USENIX Association, May 2015,
<https://www.usenix.org/system/files/conference/nsdi15/
nsdi15-paper-dong.pdf>.
[PCC-QOS] 3GPP, "Policy and charging control signalling flows and
Quality of Service (QoS) parameter mapping", 3GPP TS
29.213, version 15.3.0, Release 15, June 2018,
<http://www.3gpp.org/DynaReport/29213.htm>.
[Pew2014] Madden, M., "Public Perceptions of Privacy and Security in
the Post-Snowden Era", November 2014,
<http://www.pewinternet.org/2014/11/12/
public-privacy-perceptions/>.
[QUIC] Hamilton, R., Iyengar, J., Swett, I., and A. Wilk, "QUIC:
A UDP-Based Secure and Reliable Transport for HTTP/2",
Work in Progress, draft-tsvwg-quic-protocol-02, January
2016.
[RFC2804] IAB and IESG, "IETF Policy on Wiretapping", RFC 2804,
DOI 10.17487/RFC2804, May 2000,
<https://www.rfc-editor.org/info/rfc2804>.
[RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
of Explicit Congestion Notification (ECN) to IP",
RFC 3168, DOI 10.17487/RFC3168, September 2001,
<https://www.rfc-editor.org/info/rfc3168>.
[RFC7476] Pentikousis, K., Ed., Ohlman, B., Corujo, D., Boggia, G.,
Tyson, G., Davies, E., Molinaro, A., and S. Eum,
"Information-Centric Networking: Baseline Scenarios",
RFC 7476, DOI 10.17487/RFC7476, March 2015,
<https://www.rfc-editor.org/info/rfc7476>.
[RFC7567] Baker, F., Ed. and G. Fairhurst, Ed., "IETF
Recommendations Regarding Active Queue Management",
BCP 197, RFC 7567, DOI 10.17487/RFC7567, July 2015,
<https://www.rfc-editor.org/info/rfc7567>.
[RFC8404] Moriarty, K., Ed. and A. Morton, Ed., "Effects of
Pervasive Encryption on Operators", RFC 8404,
DOI 10.17487/RFC8404, July 2018,
<https://www.rfc-editor.org/info/rfc8404>.
Rooney & Dawkins Informational [Page 22]
^L
RFC 8462 MaRNEW October 2018
[SDO_3GPP] 3GPP, "3GPP Homepage", <http://www.3gpp.org/>.
[SPROUT] Winstein, K., Sivaraman, A., and H. Balakrishnan,
"Stochastic Forecasts Achieve High Throughput and Low
Delay over Cellular Networks", 10th USENIX Symposium on
Networked Systems Design and Implementation (NSDI
'13), USENIX Association, April 2013,
<https://www.usenix.org/system/files/conference/nsdi13/
nsdi13-final113.pdf>.
[SPUD] IETF, "Session Protocol for User Datagrams (spud)",
<https://datatracker.ietf.org/wg/spud/about/>.
[STATE_BROWSER]
Barnes, R., "Some observations of TLS in the web", July
2015, <https://www.ietf.org/proceedings/93/slides/
slides-93-saag-3.pdf>.
[STATE_SERVER]
Salz, R., "Some observations of TLS in the web", July
2015, <https://www.ietf.org/proceedings/93/slides/
slides-93-saag-4.pdf>.
[TCPINC] "TCP Increased Security (tcpinc)",
<https://datatracker.ietf.org/wg/tcpinc/charter/>.
Rooney & Dawkins Informational [Page 23]
^L
RFC 8462 MaRNEW October 2018
Appendix A. Workshop Attendees
o Rich Salz, Akamai
o Aaron Falk, Akamai
o Vinay Kanitkar, Akamai
o Julien Maisonneuve, Alcatel Lucent
o Dan Druta, AT&T
o Humberto La Roche, Cisco
o Thomas Anderson, Cisco
o Paul Polakos, Cisco
o Marcus Ihlar, Ericsson
o Szilveszter Nadas, Ericsson
o John Mattsson, Ericsson
o Salvatore Loreto, Ericsson
o Blake Matheny, Facebook
o Andreas Terzis, Google
o Jana Iyengar, Google
o Natasha Rooney, GSMA
o Istvan Lajtos, GSMA
o Emma Wood, GSMA
o Jianjie You, Huawei
o Chunshan Xiong, Huawei
o Russ Housley, IAB
o Mary Barnes, IAB
o Joe Hildebrand, IAB / Cisco
Rooney & Dawkins Informational [Page 24]
^L
RFC 8462 MaRNEW October 2018
o Ted Hardie, IAB / Google
o Robert Sparks, IAB / Oracle
o Spencer Dawkins, IETF AD
o Benoit Claise, IETF AD / Cisco
o Kathleen Moriarty, IETF AD / EMC
o Barry Leiba, IETF AD / Huawei
o Ben Campbell, IETF AD / Oracle
o Stephen Farrell, IETF AD / Trinity College Dublin
o Jari Arkko, IETF Chair / Ericsson
o Karen O'Donoghue, ISOC
o Phil Roberts, ISOC
o Olaf Kolkman, ISOC
o Christian Huitema, Microsoft
o Patrick McManus, Mozilla
o Dirk Kutscher, NEC Europe Network Laboratories
o Mark Watson, Netflix
o Martin Peylo, Nokia
o Mohammed Dadas, Orange
o Diego Lopez, Telefonica
o Matteo Varvello, Telefonica
o Zubair Shafiq, The University of Iowa
o Vijay Devarapalli, Vasona Networks
o Sanjay Mishra, Verizon
o Gianpaolo Scassellati, Vimplecom
Rooney & Dawkins Informational [Page 25]
^L
RFC 8462 MaRNEW October 2018
o Kevin Smith, Vodafone
o Wendy Seltzer, W3C
Appendix B. Workshop Position Papers
o Mohammed Dadas, Emile Stephan, Mathilde Cayla, Iuniana Oprescu,
"Cooperation Framework between Application layer and Lower Layers"
at <https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_33.pdf>
o Julien Maisonneuve, Vijay Gurbani, and Thomas Fossati, "The
security pendulum" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_4.pdf>
o Martin Peylo, "Enabling Secure QoE Measures for Internet
Applications over Radio Networks is a MUST" at
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_32.pdf>
o Vijay Devarapalli, "The Bandwidth Balancing Act: Managing QoE as
encrypted services change the traffic optimization game" at
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_10.pdf>
o Humberto J. La Roche, "Use Cases for Communicating End-Points in
Mobile Network Middleboxes" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_12.pdf>
o Patrick McManus and Richard Barnes, "User Consent and Security as
a Public Good" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_13.pdf>
o Iuniana Oprescu, Jon Peterson, and Natasha Rooney, "A Framework
for Consent and Permissions in Mediating TLS" at
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_31.pdf>
o Jari Arkko and Goran Eriksson, "Characteristics of Traffic Type
Changes and Their Architectural Implications" at
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_15.pdf>
o Szilveszter Nadas and Attila Mihaly, "Concept for Cooperative
Traffic Management" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_16.pdf>
Rooney & Dawkins Informational [Page 26]
^L
RFC 8462 MaRNEW October 2018
o Gianpaolo Scassellati, "Vimpelcom Position paper for MaRNEW
Workshop" at <https://www.iab.org/wp-content/IAB-uploads/2015/09/
MaRNEW_1_paper_17.pdf>
o Mirja Kuhlewind, Dirk Kutscher, and Brian Trammell, "Enabling
Traffic Management without DPI" at <https://www.iab.org/
wp-content/IAB-uploads/2015/08/MaRNEW_1_paper_18.pdf>
o Andreas Terzis and Chris Bentzel, "Sharing network state with
application endpoints" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_19.pdf>
o Marcus Ihlar, Salvatore Loreto, and Robert Skog, "The needed
existence of PEP in an encrypted world" at <https://www.iab.org/
wp-content/IAB-uploads/2015/08/MaRNEW_1_paper_20.pdf>
o John Mattsson, "Network Operation in an All-Encrypted World" at
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_21.pdf>
o Dirk Kutscher, Giovanna Carofiglio, Luca Muscariello, and Paul
Polakos, "Maintaining Efficiency and Privacy in Mobile Networks
through Information-Centric Networking" at <https://www.iab.org/
wp-content/IAB-uploads/2015/08/MaRNEW_1_paper_23.pdf>
o Chunshan Xiong and Milan Patel, "The effect of encrypted traffic
on the QoS mechanisms in cellular networks" at
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_25.pdf>
o Thomas Anderson, Peter Bosch, and Alessandro Duminuco, "Bandwidth
Control and Regulation in Mobile Networks via SDN/NFV-Based
Platforms" at <https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_26.pdf>
o Karen O'Donoghue and Phil Roberts, "Barriers to Deployment:
Probing the Potential Differences in Developed and Developing
Infrastructure" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_27.pdf>
o Wendy Seltzer, "Security, Privacy, and Performance Considerations
for the Mobile Web" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_28.pdf>
o Jianjie You, Hanyu Wei, and Huaru Yang, "Use Case Analysis and
Potential Bandwidth Optimization Methods for Encrypted Traffic" at
<https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_29.pdf>
Rooney & Dawkins Informational [Page 27]
^L
RFC 8462 MaRNEW October 2018
o Mangesh Kasbekar and Vinay Kanitkar, "CDNs, Network Services and
Encrypted Traffic" at <https://www.iab.org/wp-content/
IAB-uploads/2015/08/MaRNEW_1_paper_30.pdf>
o Yves Hupe, Claude Rocray, and Mark Santelli, "Providing
Optimization of Encrypted HTTP Traffic" at <https://www.iab.org/
wp-content/IAB-uploads/2015/08/MaRNEW_1_paper_341.pdf>
o M. Zubair Shafiq, "Tracking Mobile Video QoE in the Encrypted
Internet" at <https://www.iab.org/wp-content/IAB-uploads/2015/08/
MaRNEW_1_paper_35.pdf>
o Kevin Smith, "Encryption and government regulation: what happens
now?" at <https://www.iab.org/wp-content/IAB-uploads/2015/09/
MaRNEW_1_paper_1.pdf>
Acknowledgements
Stephen Farrell reviewed this report in draft form and provided
copious comments and suggestions.
Barry Leiba provided some clarifications on specific discussions
about Lawful Intercept that took place during the workshop.
Bob Hinden and Warren Kumari provided comments and suggestions during
the IAB Call for Comments.
Amelia Andersdotter and Shivan Kaul Sahib provided comments from the
Human Rights Review Team during the IAB Call for Comments.
Authors' Addresses
Natasha Rooney
GSMA
Email: nrooney@gsma.com
URI: https://gsma.com
Spencer Dawkins (editor)
Wonder Hamster
Email: spencerdawkins.ietf@gmail.com
Rooney & Dawkins Informational [Page 28]
^L
|