SlideShare ist ein Scribd-Unternehmen logo
1 von 103
Downloaden Sie, um offline zu lesen
Mohit Batra
20th Jan 2018
OWASP/NULL Delhi Chapter Meetup
 Organization - National Internet Exchange of India (NIXI)
http://www.nixi.in
 Email - mohit4677@gmail.com
 LinkedIn - https://www.linkedin.com/in/mohitbatra80/
 Twitter - @mohitbatra80
Internet Governance (IG) Primer
I-* Organizations
IANA function - Names, Numbers and Protocol Parameters
IANA Transition
WHOIS for names and numbers
 Need for Standardization and Standardization Bodies
 How IETF Works
 TLS Protocol
 Increasing Indian participation in global Internet Governance activities
and structures
Today’s Basic necessities: Roti, Kapda, Makaan, Internet and
Smartphone with Internet
We take Internet for granted and use it in daily life.
A large no. of businesses run completely over Internet/Cloud, and
Internet outages are costly.
Ever wondered what is going on behind the scenes that
makes Internet work seamlessly 24*7*365 on our laptops,
desktops, mobiles…?
Do you know that there was a significant overhaul in how
Internet is governed in 2016, but most Internet users didn’t
notice? (IANA Transition)
Threats/attacks are constantly evolving:
 On Internet’s core infrastructure
 That use Internet as a medium
It is our duty as Security Pro’s to protect the Internet.
Knowledge of Internet Governance is critical for a global IT (and
Security) professional.
 No billionaire person, company or government (not even US) owns or runs the
Internet.
 It is a globally distributed internetwork, comprising of many voluntarily
interconnected autonomous networks.
 It operates without a central governing body, with each participating network
setting and enforcing its own policies.
 However, to ensure interoperability, several key technical and policy
aspects of the underlying core infrastructure and the principal
namespaces need to be administered centrally.
 The I* (I-star) group of organizations is a loose term to describe core Internet
organizations that share responsibilities for:
 Coordinating Internet’s unique identifiers at the topmost level
 Designing robust, scalable and interoperable Internet protocols.
 Conducting research into future Internet technologies
 Supervising architecture, evolution and growth of Internet
 Developing policies for smooth allocation/maintenance/de-allocation of critical Internet
resources like domain names, IPv4/v6 addresses, ASN’s
 Sharing best practices and discuss most pressing issues related to Internet
 IETF, ISOC, IAB, IRTF, ICANN, IGF, IEEE, RIR’s, W3C
Formed in 1986
When you think of Layer 1-7 (actually 2-7), TCP/IP,
internetworking protocols, VoIP, YouTube streaming, Web
browsing, SSH, NetBanking, TLS, Routing protocols, picture
IETF.
A unique organization that falls simultaneously amongst 2
select groups of:
 Core Internet (I-star) organizations
 Global Standards Developing Organizations (SDO’s)
Physical
Link
Internet
Transport
Application
IETF develops standards above the wire and below the
application, but boundaries are blurring.
The mission of the IETF is to make the Internet work better
by producing high quality, relevant technical documents that
influence the way people design, use, and manage the
Internet.
RFC3935 defines IETF's mission.
IETF is led by its chair, currently Alissa Cooper from Cisco.
 IETF develops and promotes voluntary open Internet standards.
 Internet protocol standards produced by IETF are not binding in nature
for Networking and Application software, Networking Hardware,
Operating System vendors.
However, IETF protocols’ standards adoption is a natural
choice for everyone using Internet:
 due to their high quality
 wide coverage of use cases
 for the sake of maintaining interoperability on Internet
 absence of any other competing Internet standardization forum
All aspects related to IETF are documented as RFC/BCP
documents.
 Internet Draft (I-D)
Request for Comments (RFC) series contains technical and
organizational documents about the Internet, including
specifications and policy documents produced by four
streams: IETF, IRTF, IAB and independent submissions.
RFCs are never changed – A new RFC can supersede older
ones
Not all RFCs are standards: informational, experimental, best
current practice.
RFC2026 documents:
 the process used by the Internet community for standardization of
protocols
 stages in the standardization process
 requirements for moving a document between stages
 types of documents used during this process
Who utilizes and conforms to Internet protocol standards
produced by IETF:
 Routers and Switches
 Firewalls, IDS/IPS and Proxies
 IPSEC, SSL and MPLS VPNs
 TCP/IP internetworking stacks inside modern Desktop Operating
Systems (Windows, Unix) and Smartphones (Android, iOS)
 IoT sensors
 All modern internetworking software e.g. Web Browsers (Chrome,
Firefox), Emailing softwares (MS Outlook, GMail), DNS Servers
(BIND)
 Handy utilities like PuTTy, ping, traceroute, ftp, dig, wireshark
 I-* and SDO’s do not work in isolation, and have liaising mechanisms in place.
 IETF has liaison relationships with other organizations.
 The primary contact for IETF liaison negotiation and representation with outside organizations is IAB.
 Establishing a liaison relationship can:
 prevent duplication of effort, without obstructing either organization from pursuing its own mandate; and
 provide authoritative information of one organization's dependence on other’s work.
 IETF and 3GPP collaboration for 5G
 ICANN TLG – IETF (via IAB), ETSI, ITU-T and W3C
 Non-profit organization founded in 1992 to provide leadership in Internet-related
standards, education, and policy
 Dedicated to ensuring the open development, evolution and use of the Internet and its
architecture for the benefit of people throughout the world.
 IETF (1986) was formed before ISOC (1992)
 ISOC was formed by a number of people with long-term involvement in the IETF.
 Provide an institutional home, organization structure, legal umbrella and
financial support (e.g. for meetings) for the IETF, and to promote Internet
Standardization process in general.
 ISOC Chapters are communities of like-minded people who work together to run a
variety of programmes and activities related to Internet, such as educational events,
community and public policy programmes and networking events.
 Chapters are formed by individual members of the Internet Society who share an
interest and belief in ISOC’s principles and mission, and who are committed to
furthering ISOC’s goals and objectives within a particular geographic area.
 ISOC chapters have their presence throughout world.
 India currently has following ISOC chapters:
 Delhi Bangalore Kolkata
 Chennai Trivendrum Mumbai*
 The IAB provides long-range technical direction for Internet
development, ensuring the Internet continues to grow and evolve as a
platform for global communication and innovation.
 Ensure that the Internet is a trusted medium of communication that
provides a solid technical foundation for privacy and security, especially
in light of pervasive surveillance
 Establish the technical direction for Internet that will enable billions
more people to connect, support the vision for an Internet of Things,
and allow mobile networks to flourish, while keeping the core
capabilities that have been a foundation of the Internet’s success
 RFC4440 documents the relationship between IRTF, IAB and IETF.
 The primary contact for IETF liaison negotiation and representation with
outside organizations is IAB
 The ICANN’s Technical Liaison Group (TLG) consists of 4 SDO’s – ETSI, ITU-
T, W3C and IAB.
 The purpose of the TLG is to connect the ICANN Board with appropriate
sources of technical advice on specific matters pertinent to ICANN's activities.
 ICANN bylaws ask these organisations to each provide 2 technical experts.
 On behalf of the IETF, the IAB names two technical experts to the ICANN
TLG.
While IETF focuses on short-term issues of engineering /
standardization, its research counterpart IRTF focuses on
long-term research issues related to the Internet.
IRTF investigates Internet related topics considered to be too
uncertain/advanced or insufficiently understood.
But once IRTF research generates a specification that is
considered stable for Internet standardization, the
specification is processed through IETF.
For example, research on decentralized Internet
infrastructure / distributed ledger technologies (DLTs),
which forms the basis of evolving disruptive
technologies like Blockchain is underway at IRTF.
After research is completed, corresponding standardization
activities for DLTs and Blockchain will take place through
IETF.
IRTF is led by its chair, currently Allison Mankin from
SalesForce.
 Decentralized Internet Infrastructure Proposed Research Group
 Human Rights Protocol Considerations Research Group
 Thing-to-Thing Research Group
 Crypto Forum Research Group
 Global Access to the Internet for All Research Group
 Internet Congestion Control Research Group
 Information-Centric Networking Research Group
 Measurement and Analysis for Protocols Research Group
 Network Function Virtualization Research Group
 Network Management Research Group
 Network Coding for Efficient Network Communications Research Group
 Path Aware Networking Proposed Research Group
There is now an emphasis to design Internet protocols
keeping in mind human aspects and rights.
The The Human Rights Protocol Considerations (HRPC)
Research Group is chartered to research whether standards
and protocols can enable, strengthen or threaten human
rights.
 HRPC RG has recently come out with RFC8280: Research
into Human Rights Protocol Considerations
[1]Research on Delay-Tolerant Networking Research Group
(DTNRG) concluded in 2016.
Expectedly, corresponding Engineering / Standardization
work is currently been done in Delay/Disruption Tolerant
Networking (dtn) Working Group under Transport Area of
IETF.
[2] Research on Interplanetary Internet Research Group
(IPNRG) is also concluded.
 Internet Corporation for Assigned Names and Numbers (ICANN) was
founded in 1998, and is headquartered at Los Angeles, California.
 Core Internet (I-*) organization responsible for coordinating the
assignment of globally unique identifiers at the top level on the
Internet, including Names (domain names), Numbers (IPv4/v6
Addresses, ASN numbers), and Protocol Parameters
 ICANN performs above overseer/coordination responsibility via its
IANA function (department).
 Without unique assignment of these critical Internet identifiers at the
top level, Internet can’t work properly.
 Internet DNS Root Zone Management is one of core ICANN functions
 There are 13 root DNS server clusters (A-M), but actual DNS root
server instances is large (650+) due to Anycast Routing technique.
 IANA (a department of ICANN) maintains DNS Root Zone file
 Top level domains (TLDs) come in 2 flavours:
 Generic (gTLDs) - .com, .tech
 Country-code (ccTLDs) - .in, .de, .au
 Root Zone file consists of pointers (NS records) to DNS servers for Top
Level Domains (TLDs) – gTLDs as well as ccTLDs
 Management, policy development and technical operation of gTLD
Domain Names is the most basic function of ICANN.
 ICANN uses multistakeholder approach of Policy Development for gTLDs
 Management, policy development and technical operation of ccTLD
Domain Names is left to respective countries.
---
 Assignment/Allocation of unique Numbers and Protocol parameters
are done in close coordination with RIRs and IETF respectively via
SLAs, MoUs and agreements.
 ICANN has 7 SO/ACs representing all Internet communities
 Supporting Organizations (SO’s) (can do Policy Development)
 Address Supporting Organization (ASO)
 Country Codes Name Supporting Organization (ccNSO)
 Generic Name Supporting Organization (GNSO)
 Advisory Committees (AC’s) (can only advise ICANN Board)
 Governmental Advisory Committee (GAC)
 Root Server System Advisory Committee (RSSAC)
 Security and Stability Advisory Committee (SSAC)
 [ICANN ASO] == [NRO] via MoU
 ICANN’s new gTLD program (.amazon, .tech, .bank, .pharmacy) after
2012
ICANN meetings: 3 times an year across globe
 India: 2 ICANN meetings - in 2008 (New Delhi) and 2016
(Hyderabad)
Domain names are registered by Registrants via
intermediaries like Registrars (e.g. GoDaddy)
WHOIS is used to check availability of domain name before
purchasing.
IGF is a multi-stakeholder forum for policy dialogue on
issues of Internet governance.
It brings together all stakeholders (governments, private
sector, civil society, technical, academic community, LEAs)
in the Internet governance debate, on an equal basis and
through an open and inclusive process.
The establishment of the IGF was formally announced by
the United Nations Secretary-General in July 2006.
Internet related Best Practices are also shared at
IGF meetings
IGF meeting is being held on an yearly basis from
2006 onwards (2008: Hyderabad)
Outcomes of IGF are not binding.
 RIRs distribute and manage Internet number resources (IPv4 and IPv6 addresses and
Autonomous System Numbers) within their respective regions.
 There are five RIRs: AFRINIC, APNIC, ARIN, LACNIC, and RIPE NCC
 The Number Resource Organization (NRO) is a coordinating body for the 5 RIRs
 Internet unique identifiers are coordinated globally (by ICANN, via its IANA
function), so that each identifier is uniquely assigned to only one party – thus
enabling successful and reliable communication among parties on the
Internet.
 For Internet numbers (which include, IPv4/v6 addresses and ASN numbers), a
global registration system is facilitated by the coordinated activities of five
Regional Internet Registries (RIRs).
 Hierarchy of distribution of numbering resources– RIRs -> NIRs -> LIRs / ISPs
 India’s NIR is IRINN, operated by NIXI
 One of just 7 NIRs within APAC region
 Works directly beneath APNIC
 W3C is a SDO for the web, which forms a major portion on Internet.
 It was founded by Tim Berners-Lee after he left the European
Organization for Nuclear Research (CERN)
 W3C develops interoperable standards and technologies (specifications,
guidelines, software, tools) to lead the Web to its full potential.
 Members include businesses, nonprofit organizations, universities,
governmental entities.
 Currently 460+ members
Some notable web standards produced by W3C are:
HTML CSS XHTML
DOM CGI XML Schema
XML SOAP XForms
WSDL Xpath MathML
Xquery XSLT VoiceXML
 Someone (I-* org.) needed to coordinate the assignment of globally
unique identifiers at the top level on the Internet, including:
 Names (domain names)
 Numbers (IPv4/v6 Addresses, ASN numbers)
 Protocol Parameters (port numbers, IP protocol numbers etc.)
 Without unique assignment of these critical Internet identifiers, Internet
can’t work properly.
 ICANN since 1998 is performing this overseer/coordination
responsibility, via its IANA function as per a contract with US Govt.
Department of Commerce’s NTIA.
Domain Names at the top level (TLDs) come in 2 flavours:
1) gTLDS like .com, .org, .net, .amazon, .tech, .bank etc.
Can be further classified into Legacy and new gTLDs
2) ccTLDs like .in, .de, .au
Countries treat ccTLDs as their sovereign function
Countries formulate own policies for respective ccTLDs
IANA maintains DNS Root Zone file
13 root DNS server clusters (A-M) host Root Zone
File for queries by DNS Resolvers (ISPs)
Additions, Deletions and modifications to DNS Root
zone file are propagated from IANA to Root Servers
across the world.
Root Zone file consists of pointers (NS records) to
DNS servers for Top Level Domains (TLDs) – gTLDs
as well as ccTLDs
 IANA is responsible for distribution/allocation of pools of numbering
resources at the top level i.e.
 IPv4/v6 addresses
 Autonomous System Numbers used for routing Internet traffic.
 When an RIR requires more IP addresses/ASNs for allocation or
assignment within its region, IANA makes an additional allocation (pool)
to the RIR.
 IANA also coordinates policies for inter-RIR transfer, as well as de-
allocation/recovery of numbering resources at top level.
 IANA performs these functions as per its global policy
 IANA does not make allocations directly to ISPs or end users except in
specific circumstances, such as allocations of multicast addresses or
other protocol specific needs.
 Both IPv4 and IPv6 addresses are generally assigned in a hierarchical
manner.
 Users are assigned IP addresses by Internet service providers (ISPs).
 ISPs obtain allocations of IP addresses from a local Internet registry
(LIR) or National Internet Registry (NIR), or from their appropriate
Regional Internet Registry (RIR).
 It can be observed in IPv4 IANA Registry that /8 blocks have been
allocated to entities other than RIRs also.
TCP/IP protocol suite specifications include numbers,
keywords and other parameters that must be uniquely
assigned for correct, stable and interoperable operation of
Internet devices.
Examples include assignment of port numbers and protocol
numbers.
IANA is responsible for assigning values of these protocol
parameters.
Wireshark Example
 ICANN since 1998 was performing the overseer/coordination responsibility of
Internet’s unique identifiers, via its IANA function as per a renewable
contract with US Govt. Department of Commerce’s NTIA.
 NTIA announced in March 2014 that it was planning to end its contract with
ICANN, paving the way for relinquishing US Govt.’s control (stewardship) of
Internet’s core functions.
 ICANN launched a multi-stakeholder process to gather community inputs on
principles and mechanisms for transitioning NTIA's stewardship of IANA
functions.
 Subsequently, ICANN constituted the IANA Stewardship Transition
Coordination Group (ICG), with representation from three communities.
 ICG released a request for proposal to communities
interested in and/or affected by the IANA transition.
IETF created an IANAPLAN Working Group to formulate
its proposal on behalf of the protocol parameters
community.
 IETF (RFC 7979) and two other communities developed
proposals/replies after consultations with their respective
stakeholder communities, and submitted them to ICG.
 ICG then transmitted the consolidated proposal to ICANN Board.
 ICANN Board approved and sent the consolidated proposal, along with
the CCWG Accountability WS1 proposal to US Government’s NTIA for
approval.
 NTIA approved the consolidated proposal, and IANA transition came
into effect in October 2016.
 IANA transition transferred the control of IANA function from US Govt.
oversight (stewardship) to a global multistakeholder community (a non
governmental / non inter governmental setup).
ICANN
gTLD Registrar (Godaddy,
BigRock)
gTLD Registry
Operator
(.com – Verisign
.info – Afilias)
gTLD Registrant
• ICANN is global domain name overseer
• Develops policies for gTLDs
• Coordinates policy development for
ccTLDs via ccNSO
• Enters into an agreement with Registrars
and Registry Operators
• The final client (end-user / organization)
who wishes to register the domain
name
• For example Google Inc. is the
Registrant if it wishes to register the
domain name google.com
• A (domain name) Registry is the
authoritative database of all domain names
registered under a certain top level domain
(TLD) eg .com and .in
• .in Registry has 2.2 million domain
names at Second Level
• It is an organization that manages the domain name
Registry w.r.t. policies of domain name allocation,
technical operation etc.
• There is a dedicated Registry Operator to manage each
domain name Registry.
• Registry Agreement is the contract that governs the
relationship between ICANN and a Registry Operator.
• Some well known examples of Registry Operators are
Verisign, Afilias etc.
• NIXI is Registry Operator for .in ccTLD Registry
• It is an organization that acts as an
intermediary between a Registry Operator
and the Registrants.
• A Registrar is the entity that directly
interacts with (and allots domains to)
Registrants.
• Some well known examples of Registrars
are GoDaddy, MarkMonitor, BigRock etc.
Types of WHOIS:
For domain names, Domain name Registration Data (DNRD)
popularly called WHOIS is collected by Registrars at the time
Registrants register for a new domain name
Domain name WHOIS data has 4 sections – Registrant /
Administrative / Technical / Billing Contact
For numbering resources also, WHOIS database is
maintained.
• Just like DNS, WHOIS is not a single, centrally
managed (i.e. it is a distributed) database
• Rather, registration data is held in disparate
locations and administered by multiple registries
and registrars.
• Determine whether a domain is available for registration
• Contact domain/web administrators regarding technical
issues related to a domain or website
• Obtain the real world identity, business location and
contact information of an online merchant or business
• Security professionals and LEA’s use WHOIS to
identify points of contact for a domain name
 Problems in legacy WHOIS protocol needed to be fixed
 IETF Web Extensible Internet Registration Data Service (weirds) Working Group
designed Registration Directory Access Protocol (RDAP) that will be WHOIS
successor.
 RDAP caters to WHOIS for both names and numbers
 Utilizes RESTFUL Web Services for WHOIS request/response
 Utilizes JSON as the format for data
• Policy work – ICANN Generic Names Supporting Organization (GNSO)
• Technical / Protocol work – IETF Web Extensible Internet Registration
Data Service (WEIRDS) Working Group
RFC 7480 - HTTP Usage in the Registration Data Access Protocol (RDAP)
RFC 7481 - Security Services for the Registration Data Access Protocol
(RDAP)
RFC 7482 – Registration Data Access Protocol (RDAP) Query Format
RFC 7483 – JSON Responses for the Registration Data Access Protocol
(RDAP)
RFC 7484 – Finding the Authoritative Registration Data (RDAP) Service
RFC 7485 - Inventory and Analysis of WHOIS Registration Objects
WHOIS for domain names
WHOIS for numbers
 A standard is a set of rules that a group agrees to follow for compatibility and
interoperability
 Is English language a standard? YES.
 Examples of standards for the Internet:
 Protocols: HTTP, TCP, IP, TLS
 Data representation: ASCII, UTF-8
 Languages: HTML5, JavaScript, CSS
 Standards adoption can be Mandatory to implement or Voluntary
 ANSI standards are mandatory, IETF standards are voluntary.
My pen drive works across Desktops, Laptops, TV, Smartphones coz it
follows USB standards
You send files from Samsung smartphone to iPhone coz they both follow
Bluetooth standards
Emoji’s sent from one smartphone to other render correctly coz they
follow Unicode standards
Physical
Link
Network
Transport
Application
 “We reject kings, presidents and voting. We believe in rough consensus and running code.” – David Clark
 “Rough Consensus” - Rough consensus is achieved when all issues are addressed, but not necessarily
accommodated
 You are identified as individual and not your org. affiliation
 Selection of Area directors, Chair and other roles done by NOMCOM (nominating committee)
 Nomcom formed from selected volunteers
 Anyone who has attended 3 IETFs (out of last 5) can volunteer
 https://www.youtube.com/watch?v=ADQmECtl0L4
 Held 3 times an year across the world
 6 days per meeting
 One can participate physically or remotely
 BoF sessions
 Hackathons and code sprints
 One can participate in IETF’s standardization work by joining Working
Group mailing lists.
 There are 130+ WG’s for 7 IETF Areas
 IETF chair
 Areas - Area directors (AD)
 IETF Areas
General
Applications/
Real Time
Transport
Internet Routing
Operations
and
Management
Security
 There is an emphasis to design Internet protocols keeping in mind human aspects
and rights.
 The HRPC Research Group is chartered to research whether standards and protocols
can enable, strengthen or threaten human rights.
 HRPC RG has recently come out with RFC8280: Research into Human Rights Protocol
Considerations
 Encryption and authentication measures are the focus of attention across all IETF working
groups.
 The IAB statement and documentation in RFC1984 promotes strong, ubiquitous and
opportunistic encryption and authentication mechanisms, which are turned on by default
 These concerns are particularly relevant after Snowden revelations
 RFC7258 declares pervasive monitoring as an attack.
 DNS Privacy project and DPRIVE WG aim to cryptographically secure DNS, one of oldest and
critical Internet protocols.
 Dedicated IRTF Crypto Forum Research Group.
 Additionally, work is underway at various stages of protocols’ design and
development for emerging technologies and modern Internet protocols like
 TLS 1.3 Internet of Things
 QUIC Multipath TCP
 Captive Portals YANG model
 DANE Home Networking
 IPWAVE SIDR
 TLS provides cryptographic security in the communication between two
hosts over Internet.
 It provides Confidentiality, Integrity, Authentication.
 TLS Supports both Server and Client Authentication, but mostly Server
authentication is used (e.g. using Secure NetBanking).
 TLS is used most commonly in web browsers (e.g. for NetBanking).
 HTTP+TLS=HTTPS
 However, it can be used with any application layer protocol that uses
TCP as the transport layer. e.g. POP3S.
 SSL was originally a Netscape project realized in association with
MasterCard, Bank of America, MDI & Silicon Graphics.
 The first version, SSLv1, wasn't released.
 SSLv2 was replaced by SSLv3 in 1999 because of security problems.
 At this time, SSL became a standard so IETF bought a patent and
created TLS in 2001 (standard actually used a derivation of SSLv3).
 TLS 1.0 -> RFC2246 (1999)
 TLS 1.1 -> RFC4346 (2006)
 TLS 1.2 -> RFC5246 (2008)
 TLS 1.3 -> 2018?
 TLS Extensions: Extension Definitions -> RFC 6066
 Prohibiting Secure Sockets Layer (SSL) Version 2.0 –> RFC 6176
 TLS 1.2 is mostly in the wild (most used) out of SSL / TLS protocols
 Datagram Transport Layer Security (DTLS) is a communications protocol that provides security for
datagram-based applications.
 TLS was designed for TCP-based applications only
 DTLS 1.0 -> RFC4347
 There is no DTLS 1.1; that version number was skipped in order to harmonize version numbers with
TLS.
 DTLS 1.2 -> RFC6347
 DTLS 1.3 under development
 Biggest TLS overhaul in 10+ years
 Reduces handshake protocol time from 2 RTT (TLS 1.2) to 1 RTT (TLS 1.3)
 Support for following insecure protocols/algorithms is being removed in TLS 1.3:
 RC4 Steam Cipher
 RSA Key Transport
 SHA-1 Hash Function
 CBC Mode Ciphers
 MD5 Algorithm
 Various Diffie-Hellman groups
 EXPORT-strength ciphers
 DES
 3DES
 TLS – Transport Layer Security
 UTA – Using TLS in Applications
 OpenSSL
 WolfSSL
 BoringSSL
 GNUTLS
 LibreSSL
 Organizations dominant in Internet standardization process:
 Ericsson, Cisco, Juniper, Huawei, SalesForce
 Negligible presence of homegrown Indian organizations
 Indians are followers of standards and technologies, long after
inventions are done by Western world
 TCS Indigenous RFC on IoT:
 RFC 7967 (Constrained Application Protocol (CoAP) Option for No Server
Response)
 Reliance Jio boosts India past 25% IPv6 capability
 Attend IETF meetings physically and remotely (Remote hubs,
meetecho)
 Join ISOC chapters (6) in India and participate
 Attend MeitY / NIXI roundtables
 Submit new Internet drafts
 Join WGs and participate in mailing lists
IETF's Role and Mandate in Internet Governance by Mohit Batra

Weitere ähnliche Inhalte

Was ist angesagt?

Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTREAdvantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTREjatin batra
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnTony DeGonia (LION)
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
The Domain Name Industry: Ecosystem
The Domain Name Industry: EcosystemThe Domain Name Industry: Ecosystem
The Domain Name Industry: EcosystemICANN
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityDr. Mohamed Torky
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bwBridgetteWilliams15
 
Chapter 1Into the Internet
Chapter 1Into the InternetChapter 1Into the Internet
Chapter 1Into the InternetPatty Ramsey
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 

Was ist angesagt? (20)

Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Class module 4- itm
Class module 4- itmClass module 4- itm
Class module 4- itm
 
Internet as media
Internet as mediaInternet as media
Internet as media
 
ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTREAdvantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
The Domain Name Industry: Ecosystem
The Domain Name Industry: EcosystemThe Domain Name Industry: Ecosystem
The Domain Name Industry: Ecosystem
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
 
Internet
InternetInternet
Internet
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
Chapter 1Into the Internet
Chapter 1Into the InternetChapter 1Into the Internet
Chapter 1Into the Internet
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 

Ähnlich wie IETF's Role and Mandate in Internet Governance by Mohit Batra

Introduction to the web systems and technologies.pptx
Introduction to the web systems and technologies.pptxIntroduction to the web systems and technologies.pptx
Introduction to the web systems and technologies.pptxherrykobs01
 
What's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get InvolvedWhat's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get InvolvedBangladesh Network Operators Group
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsEdwin A. Opare
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Internet Society
 
International Telecom Standardization Bodies
International Telecom Standardization BodiesInternational Telecom Standardization Bodies
International Telecom Standardization BodiesSantanu Mukhopadhyay
 
IETF Outreach in Bangladesh
IETF Outreach in BangladeshIETF Outreach in Bangladesh
IETF Outreach in BangladeshMd. Abdul Awal
 
Who Runs the Internet?
Who Runs the Internet?Who Runs the Internet?
Who Runs the Internet?ICANN
 
Internet as the network infrastructure
Internet as the  network infrastructureInternet as the  network infrastructure
Internet as the network infrastructuremohanapragashkec
 
新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代Charles Mok
 
All About The Internet
All About The InternetAll About The Internet
All About The InternetDavid Ricker
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsIRJET Journal
 

Ähnlich wie IETF's Role and Mandate in Internet Governance by Mohit Batra (20)

Introduction to the web systems and technologies.pptx
Introduction to the web systems and technologies.pptxIntroduction to the web systems and technologies.pptx
Introduction to the web systems and technologies.pptx
 
What's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get InvolvedWhat's Happening at the IETF? Internet Standards and How to Get Involved
What's Happening at the IETF? Internet Standards and How to Get Involved
 
Internet ecosystem
Internet ecosystemInternet ecosystem
Internet ecosystem
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & Concepts
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6
 
ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?
 
International Telecom Standardization Bodies
International Telecom Standardization BodiesInternational Telecom Standardization Bodies
International Telecom Standardization Bodies
 
IETF Outreach Program
IETF Outreach ProgramIETF Outreach Program
IETF Outreach Program
 
IETF Outreach in Bangladesh
IETF Outreach in BangladeshIETF Outreach in Bangladesh
IETF Outreach in Bangladesh
 
Who Runs the Internet?
Who Runs the Internet?Who Runs the Internet?
Who Runs the Internet?
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 
Internet as the network infrastructure
Internet as the  network infrastructureInternet as the  network infrastructure
Internet as the network infrastructure
 
ION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris GrundemannION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris Grundemann
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
 
Ptsi
PtsiPtsi
Ptsi
 
ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
All About The Internet
All About The InternetAll About The Internet
All About The Internet
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
 

Mehr von OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using TerraformOWASP Delhi
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOWASP Delhi
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriOWASP Delhi
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash GoelOWASP Delhi
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarOWASP Delhi
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraOWASP Delhi
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraOWASP Delhi
 
Hostile Subdomain Takeover by Ankit Prateek
Hostile Subdomain Takeover by Ankit PrateekHostile Subdomain Takeover by Ankit Prateek
Hostile Subdomain Takeover by Ankit PrateekOWASP Delhi
 

Mehr von OWASP Delhi (20)

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeover
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report Writing
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air Gap
 
UDP Hunter
UDP HunterUDP Hunter
UDP Hunter
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container Escapes
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using Terraform
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash Goel
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang Bhatnagar
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
 
Hostile Subdomain Takeover by Ankit Prateek
Hostile Subdomain Takeover by Ankit PrateekHostile Subdomain Takeover by Ankit Prateek
Hostile Subdomain Takeover by Ankit Prateek
 

Kürzlich hochgeladen

Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 

Kürzlich hochgeladen (20)

Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 

IETF's Role and Mandate in Internet Governance by Mohit Batra

  • 1. Mohit Batra 20th Jan 2018 OWASP/NULL Delhi Chapter Meetup
  • 2.  Organization - National Internet Exchange of India (NIXI) http://www.nixi.in  Email - mohit4677@gmail.com  LinkedIn - https://www.linkedin.com/in/mohitbatra80/  Twitter - @mohitbatra80
  • 3. Internet Governance (IG) Primer I-* Organizations IANA function - Names, Numbers and Protocol Parameters IANA Transition WHOIS for names and numbers
  • 4.  Need for Standardization and Standardization Bodies  How IETF Works  TLS Protocol  Increasing Indian participation in global Internet Governance activities and structures
  • 5.
  • 6. Today’s Basic necessities: Roti, Kapda, Makaan, Internet and Smartphone with Internet We take Internet for granted and use it in daily life. A large no. of businesses run completely over Internet/Cloud, and Internet outages are costly. Ever wondered what is going on behind the scenes that makes Internet work seamlessly 24*7*365 on our laptops, desktops, mobiles…?
  • 7. Do you know that there was a significant overhaul in how Internet is governed in 2016, but most Internet users didn’t notice? (IANA Transition) Threats/attacks are constantly evolving:  On Internet’s core infrastructure  That use Internet as a medium It is our duty as Security Pro’s to protect the Internet. Knowledge of Internet Governance is critical for a global IT (and Security) professional.
  • 8.  No billionaire person, company or government (not even US) owns or runs the Internet.  It is a globally distributed internetwork, comprising of many voluntarily interconnected autonomous networks.  It operates without a central governing body, with each participating network setting and enforcing its own policies.  However, to ensure interoperability, several key technical and policy aspects of the underlying core infrastructure and the principal namespaces need to be administered centrally.
  • 9.
  • 10.  The I* (I-star) group of organizations is a loose term to describe core Internet organizations that share responsibilities for:  Coordinating Internet’s unique identifiers at the topmost level  Designing robust, scalable and interoperable Internet protocols.  Conducting research into future Internet technologies  Supervising architecture, evolution and growth of Internet  Developing policies for smooth allocation/maintenance/de-allocation of critical Internet resources like domain names, IPv4/v6 addresses, ASN’s  Sharing best practices and discuss most pressing issues related to Internet  IETF, ISOC, IAB, IRTF, ICANN, IGF, IEEE, RIR’s, W3C
  • 11. Formed in 1986 When you think of Layer 1-7 (actually 2-7), TCP/IP, internetworking protocols, VoIP, YouTube streaming, Web browsing, SSH, NetBanking, TLS, Routing protocols, picture IETF. A unique organization that falls simultaneously amongst 2 select groups of:  Core Internet (I-star) organizations  Global Standards Developing Organizations (SDO’s)
  • 12.
  • 14. IETF develops standards above the wire and below the application, but boundaries are blurring. The mission of the IETF is to make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet. RFC3935 defines IETF's mission. IETF is led by its chair, currently Alissa Cooper from Cisco.
  • 15.  IETF develops and promotes voluntary open Internet standards.  Internet protocol standards produced by IETF are not binding in nature for Networking and Application software, Networking Hardware, Operating System vendors. However, IETF protocols’ standards adoption is a natural choice for everyone using Internet:  due to their high quality  wide coverage of use cases  for the sake of maintaining interoperability on Internet  absence of any other competing Internet standardization forum
  • 16. All aspects related to IETF are documented as RFC/BCP documents.  Internet Draft (I-D) Request for Comments (RFC) series contains technical and organizational documents about the Internet, including specifications and policy documents produced by four streams: IETF, IRTF, IAB and independent submissions. RFCs are never changed – A new RFC can supersede older ones
  • 17. Not all RFCs are standards: informational, experimental, best current practice. RFC2026 documents:  the process used by the Internet community for standardization of protocols  stages in the standardization process  requirements for moving a document between stages  types of documents used during this process
  • 18. Who utilizes and conforms to Internet protocol standards produced by IETF:  Routers and Switches  Firewalls, IDS/IPS and Proxies  IPSEC, SSL and MPLS VPNs  TCP/IP internetworking stacks inside modern Desktop Operating Systems (Windows, Unix) and Smartphones (Android, iOS)  IoT sensors  All modern internetworking software e.g. Web Browsers (Chrome, Firefox), Emailing softwares (MS Outlook, GMail), DNS Servers (BIND)  Handy utilities like PuTTy, ping, traceroute, ftp, dig, wireshark
  • 19.  I-* and SDO’s do not work in isolation, and have liaising mechanisms in place.  IETF has liaison relationships with other organizations.  The primary contact for IETF liaison negotiation and representation with outside organizations is IAB.  Establishing a liaison relationship can:  prevent duplication of effort, without obstructing either organization from pursuing its own mandate; and  provide authoritative information of one organization's dependence on other’s work.  IETF and 3GPP collaboration for 5G  ICANN TLG – IETF (via IAB), ETSI, ITU-T and W3C
  • 20.  Non-profit organization founded in 1992 to provide leadership in Internet-related standards, education, and policy  Dedicated to ensuring the open development, evolution and use of the Internet and its architecture for the benefit of people throughout the world.  IETF (1986) was formed before ISOC (1992)  ISOC was formed by a number of people with long-term involvement in the IETF.  Provide an institutional home, organization structure, legal umbrella and financial support (e.g. for meetings) for the IETF, and to promote Internet Standardization process in general.
  • 21.  ISOC Chapters are communities of like-minded people who work together to run a variety of programmes and activities related to Internet, such as educational events, community and public policy programmes and networking events.  Chapters are formed by individual members of the Internet Society who share an interest and belief in ISOC’s principles and mission, and who are committed to furthering ISOC’s goals and objectives within a particular geographic area.  ISOC chapters have their presence throughout world.  India currently has following ISOC chapters:  Delhi Bangalore Kolkata  Chennai Trivendrum Mumbai*
  • 22.  The IAB provides long-range technical direction for Internet development, ensuring the Internet continues to grow and evolve as a platform for global communication and innovation.  Ensure that the Internet is a trusted medium of communication that provides a solid technical foundation for privacy and security, especially in light of pervasive surveillance  Establish the technical direction for Internet that will enable billions more people to connect, support the vision for an Internet of Things, and allow mobile networks to flourish, while keeping the core capabilities that have been a foundation of the Internet’s success  RFC4440 documents the relationship between IRTF, IAB and IETF.
  • 23.  The primary contact for IETF liaison negotiation and representation with outside organizations is IAB  The ICANN’s Technical Liaison Group (TLG) consists of 4 SDO’s – ETSI, ITU- T, W3C and IAB.  The purpose of the TLG is to connect the ICANN Board with appropriate sources of technical advice on specific matters pertinent to ICANN's activities.  ICANN bylaws ask these organisations to each provide 2 technical experts.  On behalf of the IETF, the IAB names two technical experts to the ICANN TLG.
  • 24. While IETF focuses on short-term issues of engineering / standardization, its research counterpart IRTF focuses on long-term research issues related to the Internet. IRTF investigates Internet related topics considered to be too uncertain/advanced or insufficiently understood. But once IRTF research generates a specification that is considered stable for Internet standardization, the specification is processed through IETF.
  • 25. For example, research on decentralized Internet infrastructure / distributed ledger technologies (DLTs), which forms the basis of evolving disruptive technologies like Blockchain is underway at IRTF. After research is completed, corresponding standardization activities for DLTs and Blockchain will take place through IETF. IRTF is led by its chair, currently Allison Mankin from SalesForce.
  • 26.  Decentralized Internet Infrastructure Proposed Research Group  Human Rights Protocol Considerations Research Group  Thing-to-Thing Research Group  Crypto Forum Research Group  Global Access to the Internet for All Research Group  Internet Congestion Control Research Group
  • 27.  Information-Centric Networking Research Group  Measurement and Analysis for Protocols Research Group  Network Function Virtualization Research Group  Network Management Research Group  Network Coding for Efficient Network Communications Research Group  Path Aware Networking Proposed Research Group
  • 28. There is now an emphasis to design Internet protocols keeping in mind human aspects and rights. The The Human Rights Protocol Considerations (HRPC) Research Group is chartered to research whether standards and protocols can enable, strengthen or threaten human rights.  HRPC RG has recently come out with RFC8280: Research into Human Rights Protocol Considerations
  • 29. [1]Research on Delay-Tolerant Networking Research Group (DTNRG) concluded in 2016. Expectedly, corresponding Engineering / Standardization work is currently been done in Delay/Disruption Tolerant Networking (dtn) Working Group under Transport Area of IETF. [2] Research on Interplanetary Internet Research Group (IPNRG) is also concluded.
  • 30.  Internet Corporation for Assigned Names and Numbers (ICANN) was founded in 1998, and is headquartered at Los Angeles, California.  Core Internet (I-*) organization responsible for coordinating the assignment of globally unique identifiers at the top level on the Internet, including Names (domain names), Numbers (IPv4/v6 Addresses, ASN numbers), and Protocol Parameters  ICANN performs above overseer/coordination responsibility via its IANA function (department).  Without unique assignment of these critical Internet identifiers at the top level, Internet can’t work properly.
  • 31.
  • 32.
  • 33.  Internet DNS Root Zone Management is one of core ICANN functions  There are 13 root DNS server clusters (A-M), but actual DNS root server instances is large (650+) due to Anycast Routing technique.  IANA (a department of ICANN) maintains DNS Root Zone file  Top level domains (TLDs) come in 2 flavours:  Generic (gTLDs) - .com, .tech  Country-code (ccTLDs) - .in, .de, .au  Root Zone file consists of pointers (NS records) to DNS servers for Top Level Domains (TLDs) – gTLDs as well as ccTLDs
  • 34.  Management, policy development and technical operation of gTLD Domain Names is the most basic function of ICANN.  ICANN uses multistakeholder approach of Policy Development for gTLDs  Management, policy development and technical operation of ccTLD Domain Names is left to respective countries. ---  Assignment/Allocation of unique Numbers and Protocol parameters are done in close coordination with RIRs and IETF respectively via SLAs, MoUs and agreements.
  • 35.  ICANN has 7 SO/ACs representing all Internet communities  Supporting Organizations (SO’s) (can do Policy Development)  Address Supporting Organization (ASO)  Country Codes Name Supporting Organization (ccNSO)  Generic Name Supporting Organization (GNSO)  Advisory Committees (AC’s) (can only advise ICANN Board)  Governmental Advisory Committee (GAC)  Root Server System Advisory Committee (RSSAC)  Security and Stability Advisory Committee (SSAC)  [ICANN ASO] == [NRO] via MoU
  • 36.  ICANN’s new gTLD program (.amazon, .tech, .bank, .pharmacy) after 2012 ICANN meetings: 3 times an year across globe  India: 2 ICANN meetings - in 2008 (New Delhi) and 2016 (Hyderabad) Domain names are registered by Registrants via intermediaries like Registrars (e.g. GoDaddy) WHOIS is used to check availability of domain name before purchasing.
  • 37. IGF is a multi-stakeholder forum for policy dialogue on issues of Internet governance. It brings together all stakeholders (governments, private sector, civil society, technical, academic community, LEAs) in the Internet governance debate, on an equal basis and through an open and inclusive process. The establishment of the IGF was formally announced by the United Nations Secretary-General in July 2006.
  • 38. Internet related Best Practices are also shared at IGF meetings IGF meeting is being held on an yearly basis from 2006 onwards (2008: Hyderabad) Outcomes of IGF are not binding.
  • 39.  RIRs distribute and manage Internet number resources (IPv4 and IPv6 addresses and Autonomous System Numbers) within their respective regions.  There are five RIRs: AFRINIC, APNIC, ARIN, LACNIC, and RIPE NCC  The Number Resource Organization (NRO) is a coordinating body for the 5 RIRs
  • 40.  Internet unique identifiers are coordinated globally (by ICANN, via its IANA function), so that each identifier is uniquely assigned to only one party – thus enabling successful and reliable communication among parties on the Internet.  For Internet numbers (which include, IPv4/v6 addresses and ASN numbers), a global registration system is facilitated by the coordinated activities of five Regional Internet Registries (RIRs).  Hierarchy of distribution of numbering resources– RIRs -> NIRs -> LIRs / ISPs  India’s NIR is IRINN, operated by NIXI  One of just 7 NIRs within APAC region  Works directly beneath APNIC
  • 41.  W3C is a SDO for the web, which forms a major portion on Internet.  It was founded by Tim Berners-Lee after he left the European Organization for Nuclear Research (CERN)  W3C develops interoperable standards and technologies (specifications, guidelines, software, tools) to lead the Web to its full potential.  Members include businesses, nonprofit organizations, universities, governmental entities.  Currently 460+ members
  • 42. Some notable web standards produced by W3C are: HTML CSS XHTML DOM CGI XML Schema XML SOAP XForms WSDL Xpath MathML Xquery XSLT VoiceXML
  • 43.
  • 44.  Someone (I-* org.) needed to coordinate the assignment of globally unique identifiers at the top level on the Internet, including:  Names (domain names)  Numbers (IPv4/v6 Addresses, ASN numbers)  Protocol Parameters (port numbers, IP protocol numbers etc.)  Without unique assignment of these critical Internet identifiers, Internet can’t work properly.  ICANN since 1998 is performing this overseer/coordination responsibility, via its IANA function as per a contract with US Govt. Department of Commerce’s NTIA.
  • 45. Domain Names at the top level (TLDs) come in 2 flavours: 1) gTLDS like .com, .org, .net, .amazon, .tech, .bank etc. Can be further classified into Legacy and new gTLDs 2) ccTLDs like .in, .de, .au Countries treat ccTLDs as their sovereign function Countries formulate own policies for respective ccTLDs IANA maintains DNS Root Zone file
  • 46. 13 root DNS server clusters (A-M) host Root Zone File for queries by DNS Resolvers (ISPs) Additions, Deletions and modifications to DNS Root zone file are propagated from IANA to Root Servers across the world. Root Zone file consists of pointers (NS records) to DNS servers for Top Level Domains (TLDs) – gTLDs as well as ccTLDs
  • 47.  IANA is responsible for distribution/allocation of pools of numbering resources at the top level i.e.  IPv4/v6 addresses  Autonomous System Numbers used for routing Internet traffic.  When an RIR requires more IP addresses/ASNs for allocation or assignment within its region, IANA makes an additional allocation (pool) to the RIR.  IANA also coordinates policies for inter-RIR transfer, as well as de- allocation/recovery of numbering resources at top level.  IANA performs these functions as per its global policy
  • 48.  IANA does not make allocations directly to ISPs or end users except in specific circumstances, such as allocations of multicast addresses or other protocol specific needs.  Both IPv4 and IPv6 addresses are generally assigned in a hierarchical manner.  Users are assigned IP addresses by Internet service providers (ISPs).  ISPs obtain allocations of IP addresses from a local Internet registry (LIR) or National Internet Registry (NIR), or from their appropriate Regional Internet Registry (RIR).  It can be observed in IPv4 IANA Registry that /8 blocks have been allocated to entities other than RIRs also.
  • 49. TCP/IP protocol suite specifications include numbers, keywords and other parameters that must be uniquely assigned for correct, stable and interoperable operation of Internet devices. Examples include assignment of port numbers and protocol numbers. IANA is responsible for assigning values of these protocol parameters. Wireshark Example
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.  ICANN since 1998 was performing the overseer/coordination responsibility of Internet’s unique identifiers, via its IANA function as per a renewable contract with US Govt. Department of Commerce’s NTIA.  NTIA announced in March 2014 that it was planning to end its contract with ICANN, paving the way for relinquishing US Govt.’s control (stewardship) of Internet’s core functions.  ICANN launched a multi-stakeholder process to gather community inputs on principles and mechanisms for transitioning NTIA's stewardship of IANA functions.  Subsequently, ICANN constituted the IANA Stewardship Transition Coordination Group (ICG), with representation from three communities.
  • 56.  ICG released a request for proposal to communities interested in and/or affected by the IANA transition. IETF created an IANAPLAN Working Group to formulate its proposal on behalf of the protocol parameters community.  IETF (RFC 7979) and two other communities developed proposals/replies after consultations with their respective stakeholder communities, and submitted them to ICG.
  • 57.  ICG then transmitted the consolidated proposal to ICANN Board.  ICANN Board approved and sent the consolidated proposal, along with the CCWG Accountability WS1 proposal to US Government’s NTIA for approval.  NTIA approved the consolidated proposal, and IANA transition came into effect in October 2016.  IANA transition transferred the control of IANA function from US Govt. oversight (stewardship) to a global multistakeholder community (a non governmental / non inter governmental setup).
  • 58.
  • 59.
  • 60. ICANN gTLD Registrar (Godaddy, BigRock) gTLD Registry Operator (.com – Verisign .info – Afilias) gTLD Registrant
  • 61. • ICANN is global domain name overseer • Develops policies for gTLDs • Coordinates policy development for ccTLDs via ccNSO • Enters into an agreement with Registrars and Registry Operators
  • 62. • The final client (end-user / organization) who wishes to register the domain name • For example Google Inc. is the Registrant if it wishes to register the domain name google.com
  • 63. • A (domain name) Registry is the authoritative database of all domain names registered under a certain top level domain (TLD) eg .com and .in • .in Registry has 2.2 million domain names at Second Level
  • 64. • It is an organization that manages the domain name Registry w.r.t. policies of domain name allocation, technical operation etc. • There is a dedicated Registry Operator to manage each domain name Registry. • Registry Agreement is the contract that governs the relationship between ICANN and a Registry Operator. • Some well known examples of Registry Operators are Verisign, Afilias etc. • NIXI is Registry Operator for .in ccTLD Registry
  • 65. • It is an organization that acts as an intermediary between a Registry Operator and the Registrants. • A Registrar is the entity that directly interacts with (and allots domains to) Registrants. • Some well known examples of Registrars are GoDaddy, MarkMonitor, BigRock etc.
  • 66. Types of WHOIS: For domain names, Domain name Registration Data (DNRD) popularly called WHOIS is collected by Registrars at the time Registrants register for a new domain name Domain name WHOIS data has 4 sections – Registrant / Administrative / Technical / Billing Contact For numbering resources also, WHOIS database is maintained.
  • 67. • Just like DNS, WHOIS is not a single, centrally managed (i.e. it is a distributed) database • Rather, registration data is held in disparate locations and administered by multiple registries and registrars.
  • 68. • Determine whether a domain is available for registration • Contact domain/web administrators regarding technical issues related to a domain or website • Obtain the real world identity, business location and contact information of an online merchant or business • Security professionals and LEA’s use WHOIS to identify points of contact for a domain name
  • 69.
  • 70.  Problems in legacy WHOIS protocol needed to be fixed  IETF Web Extensible Internet Registration Data Service (weirds) Working Group designed Registration Directory Access Protocol (RDAP) that will be WHOIS successor.  RDAP caters to WHOIS for both names and numbers  Utilizes RESTFUL Web Services for WHOIS request/response  Utilizes JSON as the format for data
  • 71. • Policy work – ICANN Generic Names Supporting Organization (GNSO) • Technical / Protocol work – IETF Web Extensible Internet Registration Data Service (WEIRDS) Working Group RFC 7480 - HTTP Usage in the Registration Data Access Protocol (RDAP) RFC 7481 - Security Services for the Registration Data Access Protocol (RDAP) RFC 7482 – Registration Data Access Protocol (RDAP) Query Format RFC 7483 – JSON Responses for the Registration Data Access Protocol (RDAP) RFC 7484 – Finding the Authoritative Registration Data (RDAP) Service RFC 7485 - Inventory and Analysis of WHOIS Registration Objects
  • 72. WHOIS for domain names WHOIS for numbers
  • 73.
  • 74.  A standard is a set of rules that a group agrees to follow for compatibility and interoperability  Is English language a standard? YES.  Examples of standards for the Internet:  Protocols: HTTP, TCP, IP, TLS  Data representation: ASCII, UTF-8  Languages: HTML5, JavaScript, CSS  Standards adoption can be Mandatory to implement or Voluntary  ANSI standards are mandatory, IETF standards are voluntary.
  • 75. My pen drive works across Desktops, Laptops, TV, Smartphones coz it follows USB standards You send files from Samsung smartphone to iPhone coz they both follow Bluetooth standards Emoji’s sent from one smartphone to other render correctly coz they follow Unicode standards
  • 76.
  • 78.
  • 79.
  • 80.  “We reject kings, presidents and voting. We believe in rough consensus and running code.” – David Clark  “Rough Consensus” - Rough consensus is achieved when all issues are addressed, but not necessarily accommodated  You are identified as individual and not your org. affiliation  Selection of Area directors, Chair and other roles done by NOMCOM (nominating committee)  Nomcom formed from selected volunteers  Anyone who has attended 3 IETFs (out of last 5) can volunteer
  • 81.
  • 82.
  • 84.
  • 85.  Held 3 times an year across the world  6 days per meeting  One can participate physically or remotely  BoF sessions  Hackathons and code sprints
  • 86.  One can participate in IETF’s standardization work by joining Working Group mailing lists.  There are 130+ WG’s for 7 IETF Areas
  • 87.  IETF chair  Areas - Area directors (AD)  IETF Areas General Applications/ Real Time Transport Internet Routing Operations and Management Security
  • 88.
  • 89.  There is an emphasis to design Internet protocols keeping in mind human aspects and rights.  The HRPC Research Group is chartered to research whether standards and protocols can enable, strengthen or threaten human rights.  HRPC RG has recently come out with RFC8280: Research into Human Rights Protocol Considerations
  • 90.  Encryption and authentication measures are the focus of attention across all IETF working groups.  The IAB statement and documentation in RFC1984 promotes strong, ubiquitous and opportunistic encryption and authentication mechanisms, which are turned on by default  These concerns are particularly relevant after Snowden revelations  RFC7258 declares pervasive monitoring as an attack.  DNS Privacy project and DPRIVE WG aim to cryptographically secure DNS, one of oldest and critical Internet protocols.  Dedicated IRTF Crypto Forum Research Group.
  • 91.  Additionally, work is underway at various stages of protocols’ design and development for emerging technologies and modern Internet protocols like  TLS 1.3 Internet of Things  QUIC Multipath TCP  Captive Portals YANG model  DANE Home Networking  IPWAVE SIDR
  • 92.
  • 93.  TLS provides cryptographic security in the communication between two hosts over Internet.  It provides Confidentiality, Integrity, Authentication.  TLS Supports both Server and Client Authentication, but mostly Server authentication is used (e.g. using Secure NetBanking).  TLS is used most commonly in web browsers (e.g. for NetBanking).  HTTP+TLS=HTTPS  However, it can be used with any application layer protocol that uses TCP as the transport layer. e.g. POP3S.
  • 94.  SSL was originally a Netscape project realized in association with MasterCard, Bank of America, MDI & Silicon Graphics.  The first version, SSLv1, wasn't released.  SSLv2 was replaced by SSLv3 in 1999 because of security problems.  At this time, SSL became a standard so IETF bought a patent and created TLS in 2001 (standard actually used a derivation of SSLv3).
  • 95.  TLS 1.0 -> RFC2246 (1999)  TLS 1.1 -> RFC4346 (2006)  TLS 1.2 -> RFC5246 (2008)  TLS 1.3 -> 2018?  TLS Extensions: Extension Definitions -> RFC 6066  Prohibiting Secure Sockets Layer (SSL) Version 2.0 –> RFC 6176  TLS 1.2 is mostly in the wild (most used) out of SSL / TLS protocols
  • 96.  Datagram Transport Layer Security (DTLS) is a communications protocol that provides security for datagram-based applications.  TLS was designed for TCP-based applications only  DTLS 1.0 -> RFC4347  There is no DTLS 1.1; that version number was skipped in order to harmonize version numbers with TLS.  DTLS 1.2 -> RFC6347  DTLS 1.3 under development
  • 97.  Biggest TLS overhaul in 10+ years  Reduces handshake protocol time from 2 RTT (TLS 1.2) to 1 RTT (TLS 1.3)  Support for following insecure protocols/algorithms is being removed in TLS 1.3:  RC4 Steam Cipher  RSA Key Transport  SHA-1 Hash Function  CBC Mode Ciphers  MD5 Algorithm  Various Diffie-Hellman groups  EXPORT-strength ciphers  DES  3DES
  • 98.  TLS – Transport Layer Security  UTA – Using TLS in Applications
  • 99.  OpenSSL  WolfSSL  BoringSSL  GNUTLS  LibreSSL
  • 100.
  • 101.  Organizations dominant in Internet standardization process:  Ericsson, Cisco, Juniper, Huawei, SalesForce  Negligible presence of homegrown Indian organizations  Indians are followers of standards and technologies, long after inventions are done by Western world  TCS Indigenous RFC on IoT:  RFC 7967 (Constrained Application Protocol (CoAP) Option for No Server Response)  Reliance Jio boosts India past 25% IPv6 capability
  • 102.  Attend IETF meetings physically and remotely (Remote hubs, meetecho)  Join ISOC chapters (6) in India and participate  Attend MeitY / NIXI roundtables  Submit new Internet drafts  Join WGs and participate in mailing lists