Connections 2024: Internet Technology & Governance

Date: February 5, 2024
Time: 15:00 UTC - 17:00 UTC
Slides: Slides
Recording: Recording
Register: ZOOM

India Internet Engineering Society (IIESoc) & Industry Network Technology Council (INTC) will be organizing the 6th iteration of Connections as a joint fully online event on Feb 5-8 2024.

Internet Technology and Governance with talks from Amrita Choudhury and Simone Basso

Intersection of Tech and Policy from Indian Perspective

We are living in a digital age where technology has become an integral part of our lives. While technology has transformed our lives by ushering in new opportunities, we are also witnessing new challenges, which regulators are grappling to address. To keep up with the times, even in India, we are witnessing several new regulations that have been brought in (such as the Digital Personal Data Protection Act. The Telecommunications Bill 2023) and discussions underway to overhaul or bring in new regulations (such as the Digital India Act, Digital Competition Bill, Broadcasting Services Bill 2023, Cybersecurity Strategy, etc.). Additionally, there are ongoing discourses to address the challenge of misinformation and fake news (deep fakes), governance of AI,  discussions on network usage fees, encryption, etc.

The talk would highlight these regulatory changes and trends and why all stakeholders especially the technical community must participate in such discourses so that India can come up with nuanced, implementable robust, forward-looking regulations. The talk would also discuss how the technical community can engage meaningfully in these discourses.

How Internet censorship changed in Russia during the 1st year of military conflict in Ukraine

As of today, last year, Russia started its military operation in Ukraine. This was followed by increased levels of internet censorship, as Internet Service Providers (ISPs) in Russia started blocking access to several news media websites. In early March 2022, OONI published a report documenting these blocks, as well as the blocking of a site (200rf.com) that shares information about captured and killed Russian soldiers in Ukraine. OONI also reported that Russian ISPs started throttling access to Twitter on 26th February 2022, and switched to blocking it by 4th March 2022 – at which point, they also started blocking access to Facebook. Information controls are known to occur during conflicts, and the increased censorship events in Russia suggest an attempt to control the narrative surrounding the conflict in Ukraine. But has internet censorship changed in Russia over the last year? In this report, we attempt to answer this question through the analysis of OONI measurements collected from Russia between January 2022 to February 2023. We supplement our findings with information from relevant legal analysis and desk research provided by Roskomsvoboda.

 

 

 

IPv6 + CDN

Date: November 30, 2023
Time: 16:00 UTC - 17:00 UTC
Register: Register
This session will discuss the role of a Content Delivery Network (CDN) and its role in modern network infrastructure as it impacts IPv6 and IPv6 Extension Headers. 
CDNs play a crucial role in optimizing web content delivery by reducing latency and improving performance. Here’s a breakdown of the key components
1. Edge Servers (or Cache Servers):
   – These are servers distributed across various geographical locations, strategically placed closer to end-users.
   – Edge servers store cached copies of web content, such as images, videos, stylesheets, scripts, and other resources, from the origin server.
   – When a user requests content from a website, the CDN’s edge server closest to the user responds to the request if it has the requested content in its cache.
   – Edge servers help reduce latency and improve load times because they are physically closer to users, minimizing the distance data needs to travel.
2. Origin Server:
   – The origin server is the original web server where the website’s content is hosted and managed by the website owner (in your example, Facebook’s servers).
   – While edge servers cache and serve content, the origin server is the authoritative source for the website’s content.
   – CDNs periodically fetch or update content from the origin server to keep their caches up to date.
3. IPv6 Extension Headers:
   – IPv6 Extension Headers are additional headers used in IPv6 packets to provide extra information or services. These headers are added to the standard IPv6 header to support various features or optimizations.
In this session, we will discuss the process as well as potential problems with IPv6 implementations as well as IPv6 Extension Headers.

Introduction to MLS

Date: October 12, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register
Messaging applications are widely used to send text messages, multimedia messages, or other forms of communication between individuals or groups. These applications are typically designed for instant messaging and real-time communication.  Some sample messaging applications include: WhatsApp, Facebook Messenger, Telegram, Signal, iMessage, Slack, Microsoft Teams, Skype and others.  These are just a few examples of messaging applications, and there are many others available, each with its own unique features and focus. The choice of messaging app often depends on individual preferences, security concerns, and the specific needs of the user or organization.

Several widely-deployed messaging applications have developed their own protocols. While these protocols are similar, no two are close enough to interoperate. As a result, each application vendor has had to maintain their own protocol stack and independently build trust in the quality of the protocol. The goal of the 

MLS

working group is to develop a standard messaging security protocol for human-to-human(s) communication with the above security and deployment properties so that applications can share code, and so that there can be shared validation of the protocol (as there has been with TLS 1.3).

This effort is likely to have a major impact on enterprises who use messaging application.  This session will explain the major components of MLS and some of the new security architecture.

Enhancements for Neighbour Discovery

Date: August 24, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

Neighbour Discovery for IPv6 forms the cornerstone of efficient network communication in the IPv6 realm. It facilitates address resolution, duplicate address detection, and router discovery, making it indispensable for seamless communication across IPv6 networks. However, as enterprises migrate to IPv6, the conventional ND6  protocol may face challenges in terms of scalability and performance.

To address these limitations, our research focuses on incorporating the enhancements proposed for 6lowpan in RFC 6775 and 8505 into the mainstream ND6 protocol. These RFCs present innovative solutions that improve the speed and accuracy of neighbour discovery while optimizing the use of multicast messages.

In particular, RFC 6775 outlines mechanisms for optimizing ND6 for low-power and lossy networks (6Lowpan). By bringing these optimizations into the mainstream ND6, we aim to enhance its performance and adaptability, especially in enterprise settings.

Additionally, RFC 8505 proposes solutions to reduce unnecessary traffic and processing overhead in ND6, further optimizing its performance in larger networks. This reduction in overhead is critical for scaling ND6 to meet the demands of modern enterprise environments.

In this presentation, NITK students Sudesh, Advaith, and Kavya will elaborate on our hypothesis, the advanced packet modifications, and their efforts in implementing these upgrades in FreeRtr – an open-source IPv6 routing software. They have been actively involved in the implementation of these enhancement.

Priyanka Sinha was most recently the IoT Analytics lead at Zenatix. She previously worked on Redback Networks’ SmartEdge 800, Itaas’ interactive TV, and TCS Research’s social IoT. She received her BTech in CSE from IIT Guwahati in 2004, her MS in Computer Engineering from Auburn University in 2007, and her PhD in CSE from IIT Kharagpur in 2022. She was a Vodafone fellow at Auburn, where she worked on autoconfiguration in multi-hop mobile adhoc networks.

How does TLS 1.3 work?

Date: August 10, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

TLS 1.3, the latest version of the Transport Layer Security protocol, brings forth significant advancements and improvements over its predecessors. In this discussion, we will delve into some of the key changes introduced by TLS 1.3, namely the increased encryption in the handshake process, deprecation of specific key exchange algorithms, and the introduction of new extensions. Additionally, we will explore the implications of TLS 1.3 on network management within enterprises.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which IBM and other software companies later marketed.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Extension Headers testing in Cloud

Date: July 6, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

The goal of this session is to understand the state of the art in Extension Header testing and support in the Internet. Using PDM, we conduct measurement experiments in different scenarios on the internet, such as how various CDNs and Cloud platforms support Extension Headers.

Understanding TLS and the Handshake

Date: June 15, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

In this one-hour webinar, we will delve into the world of Transport Layer Security (TLS) and focus on one of its fundamental components, the handshake. TLS is a cryptographic protocol widely used to secure communication over computer networks. By analyzing packet traces, we will demystify the TLS handshake process, step by step, and gain a comprehensive understanding of how it establishes secure connections.

Webinar Agenda:
  • The importance of TLS and secure communication
  • Overview of the TLS protocol
  • Explanation of its role in securing network communications
  • Discussion on the importance of the handshake process
  • A step-by-step breakdown of the TLS handshake process
  • Highlighting key TLS handshake message types and their significance
By the end of this webinar, participants will have a solid understanding of the TLS protocol, its handshake mechanism, and the role of packet traces in analyzing and troubleshooting TLS connections. Armed with this knowledge, attendees will be better equipped to secure their network communications and diagnose potential issues in TLS implementations.

Nalini Elkins is the President of the Industry Network Technology Council.   She is also the CEO and Founder of Inside Products, Inc.  Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Fundamentals of Cryptography

Date: May 18, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

This webinar is a part of the Cryptography webinar series.

Extension Headers-PDM results

Date: May 4, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

The goal of this session is to understand the state of the art in Extension Header testing and support in the Internet. Using PDM we conduct measurement experiments in different scenarios in the internet such as how various CDNs support Extension Headers. 

As part of our ongoing collaboration with academia in India, NITK Surathkal students Balajinaidu V., Chinmaya Sharma, Amogh Umesh and Anirudh Munnur Achal shall also be presenting their experiments with eBPF and EH Testing.

The webinar series will be composed of 6 more sessions of one hour:

  1. Extension Headers-PDM results: May 4
  2. VPNs: June 1
  3. Extension Headers testing in Cloud: July 6
  4. Enhancements for Neighbour Discovery: August 24
  5. TBD: September 28
  6. IPv6 + CDN: November 30

Fundamentals of Cryptography – II

Date: April 20, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

The goal for the second security session is to understand some of the terms which are crucial to cryptography.  The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:

  • DES

  • 3DES

  • Asymmetric encryption / symmetric encryption

  • Elliptic curve cryptography

  • Certificate authorities

  • Diffie-Hellman key exchange

  • Diffie-Hellman groups

  • Hashed message authentication code (HMAC)

  • Message authentication code (MAC)

  • Message digest algorithm 5 (MD5)

  • Rivest Shamir Adleman (RSA)

  • Secure hash algorithm (SHA)

  • X.500 distinguished name

  • X.509 digital certificates

Nalini Elkins is the President of the Industry Network Technology Council.   She is also the CEO and Founder of Inside Products, Inc.  Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).