Warren Kumari | 28 Nov 02:26 2014

Re: Tropical/resort meetings in germany

On Thursday, November 27, 2014, John C Klensin <john-ietf <at> jck.com> wrote:

--On Thursday, 27 November, 2014 15:07 -0500 Warren Kumari
<warren <at> kumari.net> wrote:

> What may be feasible would be to host in a ship that remains
> in port, tied to the dock. Connectivity, travel, etc all get
> better, and some liners have issues filling all year round...

I would encourage anyone whose IETF work is supported by a
US-based company and who is taking this seriously to check with
your organizational legal and accounting departments about the
special rules that apply to meetings on cruise ships.  After
they get through explaining to you how much they are enchanted
with the idea, you might summarize their reactions to the rest
of us.

Those subject to the taxation rules of other countries may or
may not discover that similar rules apply to them.

On the other hand, if the purpose of this discussion is to waste
the time of everyone on this list, 

I believe that that is at least 98% of the purpose, yes.
my apologies for interrupting
your entertainment.

Apology accepted,


I don't think the execution is relevant when it was obviously a bad idea in the first place.
This is like putting rabid weasels in your pants, and later expressing regret at having chosen those particular rabid weasels and that pair of pants.
Cristina Alcaraz | 27 Nov 16:15 2014

CFP: The 11th Information Security Practice and Experience Conference (ISPEC 2015)

*** Apologies for multiple copies ***

C a l l     F o r     P a p e r s

The 11th Information Security Practice and Experience Conference (ISPEC 

5-8 May 2015, Beijing, China


Conference Outline:

ISPEC is an annual conference that brings together researchers and 
practitioners to provide a confluence of new information security 
technologies, their applications and their integration with IT systems 
in various vertical sectors. The previous ISPEC conference series were 
successfully held in Singapore, Hangzhou, Hong Kong, Sydney, Xi’an, 
Seoul, Guangzhou, Hangzhou, Lanzhou and Fuzhou. The eleventh ISPEC will 
be held in Beijing, China, 5-8 May 2015. ISPEC 2015 will be hosted by 
Beihang University, China.

Conference Topics:

	• Access control
	• Network security
	• Applied cryptography
	• Privacy and anonymity
	• Availability, resilience, and usability
	• Risk evaluation and security certification
	• Big data and  Cloud security
	• Security for cyber-physical systems
	• Cryptanalysis
	• Security of smart cards and RFID systems
	• Embedded system security
	• Security policy
	• Database security
	• Security protocols
	• Digital Forensics
	• Security systems
	• Digital rights management
	• Smart Grid Security
	• Information security in vertical applications
	• Smartphone Security
	• Intrusion detection
	• Trust model and management
	• Multimedia security
	• Trusted computing

Instructions for authors:

Authors are invited to submit original papers which are not previously 
published nor submitted in parallel for publication to any other 
conference, workshop or journal. All submitted papers must be anonymous, 
with no author names, affiliations, acknowledgements, or obvious 
references. Submissions must be in English and in PDF format. The final 
camera ready version of an accepted paper will be at most 15 pages in 
the LNCS style. The manuscript submitted should correspond to what the 
authors expect to be published without modification. We therefore 
strongly recommend that authors check whether their paper will fit 
within the above LNCS space constraints. Submitted papers may risk being 
rejected directly without consideration of their merits if they do not 
follow the above submission instructions.

The proceedings will be published by Springer in their Lecture Notes in 
Computer Science series, and will be available at the conference. At 
least one author of each accepted paper should register and give 
presentation at the conference.

The URL for online submission is available  <at> 

Important Dates:

Submission Due: 14 December 2014
Notification to Authors:  8 February 2015
Camera-ready Copy Due: 23 February 2015
Conference dates: 5-8 May 2015

Conference Organization:

Honorary Chairs

	• Feng Bao (Huawei, Singapore)
	• Weifeng LV (Beihang University, China)

General Chairs

	• Qinghua Cao (Beihang University, China)
	• Robert Deng (Singapore Management Univ., Singapore)

Program Chairs

	• Zhoujun Li (Beihang University, China)
	• Javier Lopez (University of Malaga, Spain)
	• Yongdong Wu (Inst. for Infocomm Research, Singapore)

Publicity Chairs:

	• Cristina Alcaraz (University of Malaga, Spain)

Program Committee:

Joonsang Baek, KUSTAR, UAE
Zhenfu Cao, Shanghai Jiao Tong University, China
David Chadwick, University of Kent, UK
Aldar Chun-fai Chan, Applied Science and Technology Research Institute, 
Binbin Chen, ADSC, Singapore
Liqun Chen, HP Labs, UK
Cheng-Kang Chu, Huawei, Singapore
Xuhua Ding, SMU, Singapore
Roberto Di Pietro, Università di Roma Tre, Italy
Haixin Duan, Tsinghua University, China
Juan Estevez-Tapiador, UC3M, Spain
Sara Foresti, University of Milan, Italy
Dieter Gollmann, Hamburg University of Technology, Germany
Felix Gomez Marmol, NEC Labs, Germany
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of Aegean, Greece
Hua Guo,  Beihang University, China
Xinyi Huang, Fujian Normal University, China
Alejandro Hevia, University of Chile, Chile
Lucas Hui, Hong Kong University, HK
Sokratis Katsikas, University of Piraeus, Greece
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Jiguo Li, Hohai University, China
Jinming Li, Huawei, China
Tieyan Li, Huawei, Singapore
Yingjiu Li, SMU, Singapore
Joseph Kai Sui Liu, I2R, Singapore
Di Ma, University of Michigan-Dearborn, USA
Jianfeng Ma, Xidian University, China
Masahiro Mambo, Kanazawa University, Japan
Kostas Markantonakis, Royal Holloway, UK
Gregorio Martinez, University of Murcia, Spain
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, NRL, USA
David Nacacche, ENS, France
Eiji Okamoto, University of Tsukuba, Japan
Rene Peralta, NIST, USA
Pedro Peris, UC3M, Spain
Raphael C.-W. Phan, Multimedia University, Malaysia
Mark Ryan,  University of Birmingham, UK
Rei Safavi-Naini, University of Calgary
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, University of Milan, Italy
Wenchang Shi, Renmin University of China, China
Miguel  Soriano, UPC, Spain
Chunhua Su, JAIST, Japan
Vivy Suhendra, I2R, Singapore
Hung-Min Sun,  National Tsing Hua University, Taiwan
Shaohua Tang, South China University of Technology, China
Cong Wang, City University of Hong Kong, HK
Lingyu Wang, Concordia University, Canada
Guilin Wang, Huawei, Singapore
Huaxiong Wang, NTU, Singapore
Jian Weng, Jinan University, China
Zhuo Wei, SMU, Singapore
Qianhong Wu, Beijing University of Aeronautics & Astronautics, China
Yang Xiang, Deakin University, Australia
Rui Xue, CAS, China
Jeff Yan, Newcastle University, UK
Yanjiang Yang, Institute for Infocomm Research, Singapore
Futai Zhang, Nanjing Normal University, China
Rui Zhang, Chinese Academy of Sciences, China
Yan Zhu,  University of Science and Technology Beijing, China

Contact Information:

For further information regarding to the conference, please send email 
to ispec2015 <at> easychair.org or contact the chairs directly.

Cristina Alcaraz | 27 Nov 15:35 2014

CFP: 1st Cyber-Physical System Security Workshop (CPSS 2015)


1st Cyber-Physical System Security Workshop (CPSS 2015)
Singapore -- April 14, 2015

*** in conjunction with ACM AsiaCCS'15 ***

Submission due: Dec 28, 2014
Notification: Jan 31, 2015
Camera-ready due: Feb 10, 2015

CPSS 2015 is organized by Institute for Infocomm Research (I2R) and
Advanced Digital Sciences Center (ADSC), supported by National Research
Foundation (NRF) and Energy Market Authority (EMA).

Cyber-Physical Systems (CPS) consist of large-scale interconnected
systems of heterogeneous components interacting with their physical
environments. There are a multitude of CPS devices and applications
being deployed to serve critical functions in our lives. The security
of CPS becomes extremely important. This workshop will provide a
platform for professionals from academia, government, and industry
to discuss how to address the increasing security challenges facing
CPS. Besides invited talks, we also seek novel submissions describing
theoretical and practical security solutions to CPS. Papers that are
pertinent to the security of embedded systems, SCADA, smart grid, and
critical infrastructure networks are all welcome, especially in the
domains of energy and transportation. Topics of interest include, but
are not limited to:

- Adaptive attack mitigation for CPS
- Authentication and access control for CPS
- Availability, recovery and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security
- EV charging system security
- Intrusion detection for CPS
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- SCADA security
- Security of industrial control systems
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security

Program Chairs:
Jianying Zhou (I2R, Singapore)
Douglas Jones (ADSC, Singapore)

Publicity Chairs:
Eng Keong Lua (SingTel, Singapore)
Cristina Alcaraz (University of Malaga, Spain)

Program Committee:
Cristina Alcaraz (University of Malaga, Spain)
Basel Alomair (KACST, Saudi Arabia)
Man Ho Au (Hong Kong Polytechnic University, HK)
Levente Buttyan (BME, Hungary)
Alvaro Cardenas (UT Dallas, USA)
Aldar Chan (ASTRI, HK)
Sang-Yoon Chang (ADSC, Singapore)
Songqing Chen (George Mason University, USA)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Mauro Conti (University of Padua, Italy)
Aurelien Francillon (EURECOM, France)
Dieter Gollmann (Hamburg University of Technology, Germany)
Felix Gomez-Marmol (NEC Labs, Germany)
Huaqun Guo (I2R, Singapore)
Ravishankar Iyer (UIUC, USA)
Zbigniew Kalbarczyk (UIUC, USA)
Aniket Kate (Saarland University, Germany)
Shinsaku Kiyomoto (KDDI, Japan)
Karl Koscher (UCSD, USA)
Marina Krotofil (Hamburg University of Technology, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Corrado Leita (Lastline, UK)
Albert Levi (Sabanci University, Turkey)
Joseph Liu (I2R, Singapore)
Javier Lopez (University of Malaga, Spain)
Eng Keong Lua (SingTel, Singapore)
Masahiro Mambo (Kanazawa University, Japan)
Chris Mitchell (RHUL, UK)
David Naccache (ENS, France)
Michael Papay (Northrop Grumman, USA)
Radha Poovendran (University of Washington, USA)
Gokay Saldamli (Samsung, USA)
Pierangela Samarati (Universita` degli Studi di Milano, Italy)
Hung-Min Sun (National Tsing Hua University, Taiwan)
Tsuyoshi Takagi (Kyushu University, Japan)
Rui Tan (ADSC, Singapore)
Juan Tapiador (Universidad Carlos III de Madrid, Spain)
William Temple (ADSC, Singapore)
Nils Ole Tippenhauer (SUTD, Singapore)
Lingyu Wang (Concordia University, Canada)
Weiguo Wang (Thales, Singapore)
Jian Weng (Jinan University, China)
Yongdong Wu (I2R, Singapore)
Yang Xiang (Deakin University, Australia)
Qiang Yan (Google, Switzerland)
David Yau (SUTD, Singapore)
Peng Zhou (NTU, Singapore)

Submission Instructions:
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or 
or obvious citations). Submissions must be in double-column ACM SIG
Proceedings format, and should not exceed 12 pages. Position papers and
short papers of 5 pages describing the work in progress are also 
Only pdf files will be accepted. Authors of accepted papers must 
that their papers will be presented at the workshop. At least one author
of the paper must be registered at the appropriate full conference rate.
Accepted papers will be published by ACM Press as the conference
proceedings in USB thumb drives and in the ACM Digital Library. There
will also be a best paper award.

Benoit Claise | 27 Nov 12:31 2014

Blog: YANG Really Takes Off in the Industry

Dear all,

[netmod WG list is bcc'ed]

Enjoy http://www.ietf.org/blog/2014/11/yang-really-takes-off-in-the-industry/

Regards, Benoit

<!-- /* Font Definitions */ <at> font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-520092929 1073786111 9 0 415 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin-top:0cm; margin-right:0cm; margin-bottom:10.0pt; margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi; mso-ansi-language:FR-BE; mso-fareast-language:EN-US;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi; mso-ansi-language:FR-BE; mso-fareast-language:EN-US;} .MsoPapDefault {mso-style-type:export-only; margin-bottom:10.0pt; line-height:115%;} <at> page WordSection1 {size:612.0pt 792.0pt; margin:72.0pt 72.0pt 72.0pt 72.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.WordSection1 {page:WordSection1;} -->
Abdussalam Baryun | 27 Nov 02:43 2014

Thanks for the change in discussions

I would like to thank IESG to include the WG into the discussions.
Before, I was never understanding what happens between authors and
IESG, and the editors don't feedback much info to the WG. Now I am
getting some info into my WG, and I can comment and monitor our
editor. Thanks IESG, well done,


Michael Richardson | 26 Nov 15:19 2014

Tropical/resort meetings in germany

This seems like an ideal place to hold ietf meeting plenaries!

"Let's put the future behind us" - http://www.antipope.org/charlie/blog-static/2014/11/lets-put-the-future-behind-us-1.html

Adrian Farrel | 24 Nov 20:27 2014

Last Call Comment draft-ietf-l3vpn-end-system-04.txt

This document contains a worked example using IP addresses from the 10/8 and
192.168/16 Private Use spaces.

It would be far better if the document used addresses from the three
documentation/test spaces 192.0.2/24 198.51.100/24 and 203.0.113/24

Unless you can provide a strong reason not to make this change (which looks to
me like it would be a simple matter), please do so in a new revision after IETF
last call.


> -----Original Message-----
> From: IETF-Announce [mailto:ietf-announce-bounces <at> ietf.org] On Behalf Of The
> Sent: 24 November 2014 15:57
> To: IETF-Announce
> Cc: bess <at> ietf.org
> Subject: Last Call: <draft-ietf-l3vpn-end-system-04.txt> (BGP-signaled end-
> system IP/VPNs.) to Proposed Standard
> The IESG has received a request from the BGP Enabled Services WG (bess)
> to consider the following document:
> - 'BGP-signaled end-system IP/VPNs.'
>   <draft-ietf-l3vpn-end-system-04.txt> as Proposed Standard
> The IESG plans to make a decision in the next few weeks, and solicits
> final comments on this action. Please send substantive comments to the
> ietf <at> ietf.org mailing lists by 2014-12-08. Exceptionally, comments may be
> sent to iesg <at> ietf.org instead. In either case, please retain the
> beginning of the Subject line to allow automated sorting.
> This document contains a normative Downref to RFC 1027
> Abstract
>    This document describes a solution in which the control plane
>    protocol specified in BGP/MPLS IP VPNs is used to provide a Virtual
>    Network service to end-systems.  These end-systems may be used to
>    provide network services or may directly host end-to-end
>    applications.
> The file can be obtained via
> http://datatracker.ietf.org/doc/draft-ietf-l3vpn-end-system/
> IESG discussion can be tracked via
> http://datatracker.ietf.org/doc/draft-ietf-l3vpn-end-system/ballot/
> No IPR declarations have been submitted directly on this I-D.

Adrian Farrel | 24 Nov 20:00 2014

Two minor last call comments on draft-ietf-l3vpn-acceptown-community-08.txt


Thanks for this work.

In a new revision after last call, please:

- Check whether you really need the pre-RFC5378 boilerplate and remove it if

- Change the word "proposes" to "defines"


Robert Sparks | 21 Nov 22:55 2014

Gen-art LC review: draft-mcdonald-ipps-uri-scheme-16

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at


Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-mcdonald-ipps-uri-scheme-16
Reviewer: Robert Sparks
Review Date: 21-Nov-2014
IETF LC End Date: 25-Nov-2014
IESG Telechat date: 4-Dec-2014

Summary: Almost ready, but has nits that should be addressed before publication as a Proposed Standard

Nits/editorial comments:

First: (For Barry as sponsoring AD and shepherd):

I think you might want to say more about how this and the related PWG documents are being handled cross-organization.

An RFC that normatively updates a document under some other organization's change control is an unusual thing. Usually there are parallel documents coordinating this. Is there such a parallel PWG doc this time?

Why aren't there RFC variants of the PWG docs (we've republished other organization's documents in the RFC series before...)

Second: The 6 step construction in section 3 is a little odd. Why aren't steps 3-5 collapsed into one step that says "go do what https: says to do"? Split this way, especially with the repeated guidance in the security considerations section pointing somewhat loosely to 7320 and 5246 for things that "can be used to address this threat" looks like an opportunity for someone to get creative with how they check the certificate supplied by the server against the name in the URI. If you don't want anything but what happens in https to happen, I think it needs to be more clearly stated. Otherwise, doesn't this go off into RFC 6125 territory?

Lastly (and much smaller nits):

There are several callouts from the text that look like references that are not represented in the references section.
ID nits complains about all of these, and should make them easy to find and fix.
For example (from section 1.2):
2) Some existing IPP Client and IPP Printer implementations of HTTP Upgrade [RFC 2717] do not perform upgrade at the beginning of
This reference is oddly constructed - please check early with the RFC Editor on whether they
will take this, or want something a little different.
[HTTP1.1] HTTP/1.1. See [RFC7230], [RFC7231], [RFC7232], [RFC7233], [RFC7234], and [RFC7235].
This line is wrong, and is causing idnits to complain once where it shouldn't.
(The thing in the [] should be RFC7235, not 4):
[RFC7234] Fielding, R., and J. Reschke, "Hypertext Transfer Protocol (HTTP/1.1): Authentication", RFC 7235, June 2014.

Thomas Narten | 21 Nov 06:53 2014

Weekly posting summary for ietf <at> ietf.org

Total of 67 messages in the last 7 days.

script run at: Fri Nov 21 00:53:01 EST 2014

    Messages   |      Bytes        | Who
  8.96% |    6 | 22.19% |   141067 | ynir.ietf <at> gmail.com
 11.94% |    8 |  7.46% |    47449 | johnl <at> taugh.com
  7.46% |    5 |  6.97% |    44295 | joe <at> cdt.org
  5.97% |    4 |  4.83% |    30697 | superuser <at> gmail.com
  4.48% |    3 |  3.72% |    23662 | lear <at> cisco.com
  4.48% |    3 |  3.36% |    21375 | dougb <at> dougbarton.us
  4.48% |    3 |  2.95% |    18739 | ted.lemon <at> nominum.com
  2.99% |    2 |  3.61% |    22967 | lloyd.wood <at> yahoo.co.uk
  2.99% |    2 |  2.84% |    18080 | mnot <at> mnot.net
  2.99% |    2 |  2.70% |    17140 | lee <at> asgard.org
  2.99% |    2 |  2.40% |    15272 | huitema <at> microsoft.com
  2.99% |    2 |  2.25% |    14314 | mcr+ietf <at> sandelman.ca
  2.99% |    2 |  2.24% |    14233 | joelja <at> bogus.com
  2.99% |    2 |  2.19% |    13954 | iab-chair <at> iab.org
  2.99% |    2 |  2.13% |    13511 | dhc <at> dcrocker.net
  1.49% |    1 |  3.39% |    21527 | huseyin.abaci <at> adu.edu.tr
  2.99% |    2 |  1.80% |    11473 | iad <at> ietf.org
  1.49% |    1 |  2.30% |    14629 | donald.smith <at> centurylink.com
  1.49% |    1 |  2.07% |    13161 | ietf <at> trammell.ch
  1.49% |    1 |  1.87% |    11864 | eburger <at> standardstrack.com
  1.49% |    1 |  1.82% |    11580 | amanambrish <at> gmail.com
  1.49% |    1 |  1.67% |    10636 | barryleiba <at> computer.org
  1.49% |    1 |  1.58% |    10035 | narten <at> us.ibm.com
  1.49% |    1 |  1.35% |     8608 | brian.e.carpenter <at> gmail.com
  1.49% |    1 |  1.35% |     8599 | arjuna.sathiaseelan <at> cl.cam.ac.uk
  1.49% |    1 |  1.21% |     7670 | cyrus <at> daboo.name
  1.49% |    1 |  1.20% |     7618 | matthew <at> kerwin.net.au
  1.49% |    1 |  1.19% |     7597 | stephen.farrell <at> cs.tcd.ie
  1.49% |    1 |  1.19% |     7594 | inacio <at> cert.org
  1.49% |    1 |  1.16% |     7399 | ajaharuddin.mohammad <at> magnaquest.com
  1.49% |    1 |  1.10% |     6994 | abdussalambaryun <at> gmail.com
  1.49% |    1 |  1.01% |     6400 | phill <at> hallambaker.com
  1.49% |    1 |  0.89% |     5633 | housley <at> vigilsec.com
100.00% |   67 |100.00% |   635772 | Total

Ajaharuddin Mohammad | 19 Nov 10:22 2014

Changes to the text

As per the comments made by joseph and others.


I think some text must be unchanged on the site.


Correct if I am wrong.