Markdown Version | Session Recording
Session Date/Time: 17 Mar 2024 04:00
Hackathon Results Presentations
Summary
The session consisted of presentations of various projects completed during the IETF Hackathon. The projects spanned a wide range of topics including augmented YANG modules, deterministic encoding for seaborne serialization, multicast source routing, HTTP signature authentication, network attestation for secure routing, post-quantum cryptography in X.509 certificates, DDoS mitigation architecture, SDN-based open playgrounds, network anomaly detection, extensions to the YANG data model for DOTS, YANG push publisher validation, low latency crypto, RPKI/RTR improvements, fake conversation generation, DNS enhancements, and intent-based network management for mobile objects.
Key Discussion Points
- Augmented YANG Modules: Presented an implementation to provide an easy solution for getting dependencies of YANG modules, particularly for Kafka data mesh architectures. Testing showed improved execution times.
- Seaborne Serialization: Discussed deterministic encoding (CDE) and DC Board drafts and their implementation in QC War. Aim is to accommodate constrained use cases and unify number serialization.
- MSR6 Evaluation: Hardware evaluation of MSR6TE and MSR6TE with RLP using P4 language. Results indicated low resource usage and acceptable delay increase.
- HTTP Signature Authentication: First interoperability test of a draft providing authenticated HTTP resources without telegraphing. Success noted, with some practicalities remaining for existing protocol stacks.
- Network Attestation for Secure Routing (NASR): Proposed a new initiative for path-level trust based on remote attestation of network devices. Aim is to guarantee forwarding behavior of devices.
- Post Quantum X.509: Continued progress on post-quantum cryptography with focus on incorporating NIST primitives, testing composite implementations, and maintaining OID mapping tables.
- SAVI DDoS Mitigation: Presented a DDoS mitigation architecture focused on identifying forged source addresses and distributing security intelligence.
- SDN Open Playground: Implementation of objects for deploying inter-domain networks, focusing on information sharing.
- Anomaly Tagging on Historical Data (Antagonist): Described a project for structured exchange of network anomaly data and information, and discussed how this can improve AI-based network anomaly detection.
- Extended YANG Data Model for DOTS: Proposed extensions to the DOTS protocol to meet current collaborative mitigation needs, reporting a potential improvement in mitigation time from minutes to seconds.
- Validate YANG Push Publisher: Reported on validating YANG Push publisher against data collection with multiple vendor implementations, focusing on integration into Apache Kafka.
- Ultra-Low Latency Crypto: Described work on a new lightweight and secure encryption algorithm that is suitable for e-sports and remote surgery. Seeking volunteers to implement this.
- RPKI RTR and AS Path Validation: Presented both Perl and Rust-based implementations of RPKI-RTR functionality.
- Fake Conversation Generator: Presented a VCON related project to generate fake conversation data for testing PII redaction.
- DNS Kabar: Reported on work relating to compact denial of existence and delegated zone-signed child synchronization.
- Intent Based Network Management: Described an architecture for mobile network management, focusing on configuring network and security applications for SDVs and other mobile objects.
Decisions and Action Items
- The fake beacon generator will be put into the IETF GitHub
- Register on the Wiki to present results at the Hack Demo Happy Hour.
Next Steps
- Continue work on post-quantum cryptography, meeting monthly.
- Validate the Antagonist project with network operational data.
- Continue work on DNS Kabar implementation after the hackathon.
- Future meetings to be scheduled for network attestation initiative.