the internet standards process ian brown. overview what standards need setting? protocols – the...

25
The Internet standards process Ian Brown

Upload: brandon-warren

Post on 28-Mar-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

The Internet standards process

Ian Brown

Page 2: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Overview

• What standards need setting?• Protocols – the IETF and the ITU• Approaches to wiretapping• Approaches to patents• Domain names and addresses

Page 3: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Ideal of open standards

• Many different client and server applications give user choice, competition on features and price, and resistance to catastrophic attacks

Page 4: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Communications protocols

• Define the format and sequence of messages that pass between two or more communicating processes on one or more processors

• Can be closed (many proprietary systems), open (standards-based) or open with proprietary extensions

Page 5: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

What does a protocol look like?

HELO machinename

MAIL FROM: I.Brown

RCPT TO: I.Brown

DATA

250 Looks good to me

250 OK

354 Enter Mail, end by a line with only '.'

250 OK

250 Submitted & queued (0/msg.28043-0)

Message text

Page 6: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Competition implications

• Closed protocols can be used to leverage a monopoly in one area (e.g. desktop operating system) into another (e.g. server software)

• Protocol analysers and reverse engineering can be used to discover details of protocols – arms race

Page 7: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Internet Engineering Task Force

• First met in San Diego in 1986 with 21 attendees

• Forthcoming meeting in Minneapolis is 73rd in series

• Attendance peaked at 3,000 in 2000 and is still around 2,000, 3 times a year

Page 8: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

IETF working groups

• All IETF protocols developed in ~120 working groups in one of 8 areas

• Groups make decisions by “rough consensus and running code”

• Consensus must be found on mailing lists rather than at physical meetings

Page 9: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Example IETF working groups

• avt Audio/Video Transport• behave Behavior Engineering for Hindrance Avoidance• dccp Datagram Congestion Control Protocol• enum Telephone Number Mapping• ieprep Internet Emergency Preparedness• ippm IP Performance Metrics• ips IP Storage• iptel IP Telephony• megaco Media Gateway Control• midcom Middlebox Communication

Page 10: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

IETF process

• Protocol documents begin life as “Internet drafts” (currently over 1,000)

• Successful drafts become Requests for Comments (RFCs)

• RFCs can be standards-track (proposed, draft or full), Informational, Experimental or Best Current Practice

Page 11: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

ITU-T

• International Telecommunications Union (Telecoms sector)

• Part of United Nations system where governments and companies coordinate telecoms networks and services

• Work done in “study groups” mostly by corporate staff but needs to be agreed by government representatives

Page 12: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

ITU process

• Much lower volume communication than IETF• Work tends to progress more slowly and mainly at

Geneva meetings

Page 13: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Example ITU study groups

• Study Group 13 Multi-protocol and IP-based networks and their internetworkingLead Study Group for IP related matters, B-ISDN, Global Information Infrastructure and satellite matters.

• Study Group 16 Multimedia services, systems and terminalsLead Study Group on multimedia services, systems and terminals, e-business and e-commerce.

• Study Group 17 Data Networks and Telecommunication SoftwareLead Study Group on frame relay, communication system security, languages and description techniques.

Page 14: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Other relevant bodies

• W3C – World Wide Web Consortium• ETSI – European Telecommunications Standards

Institute• IEEE – Institute for Electrical and Electronics

Engineering• ISO – International Standards Organisation

Page 15: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Approaches to “lawful access”

• Wiretapping requirements imposed by legislation (e.g. Communications Assistance to Law Enforcement Act of 1994 in US, Regulation of Investigatory Powers Act 2000 in UK)

• Requirements placed on manufacturers in US, ISPs and phone companies in both countries

Page 16: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Lawful access requirements

• Undetectable to subject• Invisible to unauthorised personnel and other

interceptors• Any available decryption keys should be provided• Only authorised information should be provided

Page 17: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

IETF approach

• FBI requested wiretapping capability in Megaco protocol

• IETF created mailing list to debate; 500 participants

• Plenary debate at Washington DC meeting; very few in favour, many against, majority silent

Page 18: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

IETF decision

• “The IETF has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards”

• 1. Inappropriate in global standards – different legal and privacy requirements

• 2. Would increase protocol complexity and decrease security

• 3. End-to-end security makes unworkable• 4. Otherwise, many facilities already available

Page 19: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Ongoing IETF debate

• “the IETF believes that mechanisms designed to facilitate or enable wiretapping, or methods of using other facilities for such purposes, should be openly described, so as to ensure the maximum review of the mechanisms and ensure that they adhere as closely as possible to their design constraints.”

• Cisco Architecture for Lawful Intercept in IP Networks (RFC 3924)

Page 20: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

ETSI approach

• “The Technical Committee on Lawful Interception (TC LI) is the leading body for lawful interception standardization within ETSI. Lawful interception standards have also been developed by ETSI technical bodies AT, TISPAN (/SPAN and TIPHON™), TETRA, and by 3GPP™”

Page 21: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

ETSI standards

• ES 201 671 Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic (revised version).

• ES 201 158 Telecommunications Security; Lawful Interception (LI); Requirements for Network Functions

• TS 102 234 Telecommunications Security; Lawful Interception (LI); Service-specific details for internet access services;

• TS 102 233 Telecommunications Security; Lawful interception (LI); Service-specific details for e-mail services

• TS 102 232 Telecommunications Security; Lawful Interception (LI); Handover Specification for IP Delivery

• TS 101 671 Telecommunications Security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic.

• TS 101 331 Telecommunications Security; Lawful Interception (LI); Requirements of Law Enforcement Agencies

• TR 102 053 Telecommunications Security; Lawful Interception (LI); Notes on ISDN lawful interception functionality.

• TR 101 944 Telecommunications Security; Lawful Interception (LI); Issues on IP Interception.

• TR 101 943 Telecommunications Security; Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture.

Page 22: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Patent issues

• Open standards of limited use if they require patent-protected technology

• Very popular with patent owners!• Standards bodies now addressing issue to a

greater or lesser extent

Page 23: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

IETF IPR policy

• “This page provides a mechanism for filing Disclosures about intellectual property rights (IPR) and for finding out what IPR Disclosures have been filed.” https://datatracker.ietf.org/public/ipr_disclosure.cgi

• “The IETF takes no position regarding the validity or scope of any intellectual property rights or other rights that might be claimed to pertain to the implementation or use of the technology described in any IETF documents or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights.”

• “The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at [email protected]."

Page 24: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

W3C IPR policy

• “Whenever possible, technical decisions should be made unencumbered by intellectual property right (IPR) claims. To this end, W3C discloses to the entire Membership which organizations have made IPR claims about a particular technology, as well as the details of those claims where they have been provided. Individuals should immediately disclose any IPR claims they know may be essential to implementing a Recommendation track technical report.”

• Goes further than IETF RAND target

Page 25: The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches

Domain names

• Domain Name System maps IP addresses (128.16.64.182) to Fully-Qualified Domain Names (happy.cs.ucl.ac.uk)

• Overseen by ICANN, managed by registrars and registrants

• International controversy (US control of process and root servers)

• Trouble with trademarks