Markdown Version | Session Recording
Session Date/Time: 20 Jul 2025 16:00
HotRFC Lightning Talks
Summary
The HotRFC Lightning Talks session featured 15 four-minute presentations covering diverse technical topics ranging from AI/LLM applications in networking, transport protocols, security frameworks, to novel networking architectures. Each presenter had strictly enforced four-minute slots to introduce their ideas and seek collaboration opportunities. The session served as a forum for starting conversations and enabling hallway discussions throughout the week.
Key Discussion Points
AI/LLM Applications in Networking
- Framework for evaluating LM agents for network configuration: Comprehensive evaluation framework with task datasets, emulator environments, and metrics for reasoning ability, command accuracy, and functional correctness
- Grounding high-level intents to low-level network configurations: Using LLMs to convert threat intelligence into actionable network configurations, demonstrated with HTTP rapid reset DDoS attack example
- Automated network protocol testing with LLMs: Full pipeline automation from RFC specifications to executable test code, addressing time-intensive manual testing processes
- AI assistant for IPv6 deployment: Addressing IPv6 engineer shortage by creating AI system to answer questions, help with address planning, and generate configurations
Transport and Network Protocols
- Transport layer protocol optimization for satellite networks: Addressing challenges in LEO satellite networks including frequent handovers, weather impact, and RTT variations affecting TCP performance
- Kira scalable zero-touch routing: Autonomous control plane providing highly resilient connectivity supporting hundreds of thousands of nodes without configuration requirements
- Improving delay throughput trade-off with Codal++: Modified AQM algorithm addressing assumptions about TCP Reno senders, optimized for modern TCP variants like Cubic and BBR
Security and Trust
- TLS secure element for asynchronous communication: Trusted communication using secure elements as embedded TLS servers for email, messaging, and IoT applications
- Remote attestation with composite devices: Architecture for handling multiple verifiers in complex systems with hierarchical, cascade, and hybrid modes
- Security considerations for confidential computing: Analysis of threat models and trust boundaries in cloud service provider environments
- Secure hybrid network monitoring: Solutions for monitoring security properties in complex hybrid cloud/on-premise network configurations
Emerging Technologies
- Distributed inference network and Internet of Agents: Architecture for handling concurrent AI agent interactions with low latency requirements
- ICN Path to Africa: Information-centric networking vision for content caching and availability, particularly relevant for connectivity challenges
- Ultra low latency cryptography with Arrayon: Performance improvements over AES-256-GCM and SHA-256 for real-time applications like e-sports and remote surgery
Decisions and Action Items
- Multiple side meetings scheduled throughout the week for continued discussions:
- Kira routing: Wednesday 4 PM
- Distributed inference network: Wednesday early morning
- Confidential computing: Tuesday and Wednesday 11-13 hours
- Remote attestation: Various sessions scheduled
- Transport optimization for satellites: Tuesday morning
Next Steps
- Presenters actively seeking collaborators across multiple domains including operators, AI experts, security researchers, and implementers
- Several projects have open source implementations available for testing and contribution
- Draft submissions planned for various working groups including RATS, TLS, and potential new working groups
- Follow-up discussions to continue in hallway conversations and scheduled side meetings throughout IETF 123