<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.24 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-m-ten-workshop-00" category="info" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="M-TEN workshop report">Report from the IAB workshop on Management Techniques in Encrypted Networks (M-TEN)</title>
    <seriesInfo name="Internet-Draft" value="draft-iab-m-ten-workshop-00"/>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization/>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization/>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="23"/>
    <keyword>encryption</keyword>
    <keyword>network management</keyword>
    <abstract>
      <t>The “Management Techniques in Encrypted Networks (M-TEN)” workshop was convened by the Internet Architecture Board (IAB) from 17 October 2022 to 19 October 2022 as a three-day online meeting. The workshop was organized in three parts to discuss ways to improve network management techniques in support of even broader adoption of encryption on the Internet. This report summarizes the workshop's discussion and identifies topics that warrant future work and consideration.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://intarchboard.github.io/m-ten-workshop-public/draft-iab-m-ten-workshop.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-iab-m-ten-workshop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/intarchboard/m-ten-workshop-public"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>User privacy and security are constantly being improved by increasingly strong and more widely deployed encryption. This workshop aims to discuss ways to improve network management techniques in support of even broader adoption of encryption on the Internet.</t>
      <t>Network management techniques need to evolve to work effectively and reliably in the presence of ubiquitous traffic encryption and support techniques that enhance user privacy. In an all-encrypted network, it is not viable to rely on unencrypted metadata for network monitoring and security functions, troubleshooting devices, and passive traffic measurements. New approaches are needed to track network behaviors, e.g., by directly cooperating with endpoints and applications, increasing use of in-band telemetry, increasing use of active measurement approaches, and privacy-preserving inference techniques.</t>
      <t>The aim of this IAB online workshop from October 17-19, 2022, has been to provide a platform to explore the interaction between network management and traffic encryption and initiate new work on collaborative approaches that promote security and user privacy while supporting operational requirements. As such the workshop addressed the following questions:</t>
      <ul spacing="normal">
        <li>What are actionable network management requirements?</li>
        <li>Who is willing to work on collaborative solutions?</li>
        <li>What are the starting points for collaborative solutions?</li>
      </ul>
    </section>
    <section anchor="workshop-scope-and-discussion">
      <name>Workshop Scope and Discussion</name>
      <t>The workshop was organized across three, all-group discussion slots, one per day. The following topic areas were identified and the program committee organized paper submissions into three main themes for each of the three discussion slots. During each discussion, those papers were presented sequentially with open discussion held at the end of each day.</t>
      <section anchor="day1">
        <name>"Where we are" - Requirements and Passive Observations</name>
        <t>The first day of the workshop agenda focused on the existing state of the relationship between network management and encrypted traffic from various angles. Presentations ranged from discussing classifiers using machine-learning to recognize traffic, to advanced techniques for evading traffic analysis, to user privacy considerations.</t>
        <t>After an introduction that covered the goals of the workshop and the starting questions (as described in <xref target="intro"/>), there were four presentations, followed by open discussion.</t>
        <section anchor="traffic-classification-and-network-management">
          <name>Traffic classification and network management</name>
          <t>Many existing network management techiques are passive in nature: they don't rely on an explicit signals from end hosts to negotiate with network middleboxes, but instead rely on inspecting packets to recognize traffic and apply various policies. Traffic classification, as a passive technique, is being challenged by increasing encryption.</t>
          <t>Traffic classification is commonly performed by networks to infer what applications and services are being used. This information is in turn used for capacity and resource planning, Quality-of-Service (QoS) monitoring, traffic prioritization, network access control, identity management, and malware detection. However, since classification traditionally relies on recognizing unencrypted properties of packets in a flow, increasing encryption of traffic can decrease the effectiveness of classification.</t>
          <t>The amount of classification that can be performed on traffic also provides a useful insight onto how "leaky" the protocols used by applications are, and points to areas where information is visible to any observer, which may be malicious or not.</t>
          <t>Traditionally, classification has been based on experts crafting specific rules, but there is also a move toward using maching learning to recognize patterns. "Deep learning" machine learning models generally rely on analyzing a large set of traffic over time, and have trouble reacting quickly to changes in traffic patterns.</t>
          <t>Models that are based on closed-world data sets also become less useful over time, as traffic changes. <xref target="JIANG"/> describes experiments that showed that a model that performs with high accuracy on an initial data set became severely degraded when running on a newer data set that contained traffic from the same applications. Even in as little time as one week, the traffic classification would become degraded. However, the set of features in packets and flows that were useful for models stayed mostly consistent, even if the models themselves needed to be updated. Models where the feature space is reduced to fewer features showed better resiliency, and could be retrained more quickly. Based on this, <xref target="JIANG"/> recommends more work and research on determining which set of features in IP packets are most useful for focused machine learning analysis. <xref target="WU"/> also recommends further research investment in Artificial Intelligent (AI) analysis for network management.</t>
        </section>
        <section anchor="preventing-traffic-analysis">
          <name>Preventing traffic analysis</name>
          <t>Just as traffic classification is continually adapting, techniques to prevent traffic analysis and obfuscate application and user traffic are continually evolving. An invited talk from the authors of <xref target="DITTO"/> shared a novel approach with the workshop for how to build a very robust system to prevent unwanted traffic analysis.</t>
          <t>Usually traffic obfuscation is performed by changing the timing of packets or adding padding data. The practices can be costly and negatively impact performance. DITTO demonstrated the feasibility of applying traffic obfuscation on aggregated traffic in the network with minimal overhead and in line speed.</t>
          <t>While traffic obfuscation techniques are today not widely deployed, this study underlines, together with the need for continuous effort to keep traffic models updated over time, the challenges of classification of encrypted traffic as well as opportunities to further enhance user privacy.</t>
        </section>
        <section anchor="users-and-privacy">
          <name>Users and privacy</name>
          <t>The Privacy Enhancements and Assessments Research Group is working on a document to discuss guidelines for how to measure traffic on the Internet in a safe and privacy-friendly way (<xref target="I-D.irtf-pearg-safe-internet-measurement"/>). These guidelines and principles provide another angle onto the discussion of passive classification and analysis of traffic.</t>
          <t>Consent for collection and measurement of metadata is an important consideration in deploying network measurement techniques. This consent can be explicitly given as informed consent, or can be given by proxy or be only implied. For example, a user of a network might need to consent to certain measurement and traffic treatment when joining a network.</t>
          <t>Various techniques for data collection can also improve user privacy, such as discarding data after a short period of time, masking out aspects of data that contain user-identifying information, reducing the accuracy of collected data, and aggregating data.</t>
        </section>
        <section anchor="discussion">
          <name>Discussion</name>
          <t>The intents and goals of users, application developers, and network operators align in some cases, but not others. One of the recurring challenges that came up was not having a clear way to understand or communicate intents and requirements. Both traffic classification and traffic obfuscation attempt to change the visibility of traffic without cooperation of other parties: traffic classification is a network attempting to inspect application traffic without coordination from applications, and traffic obfuscation is an attempt to hide that same traffic as it transits a network.</t>
          <t>Traffic adaptation and prioritization is one dimension in which the incentives for cooperation seem most clear. Even if an application is trying to prevent leaking metadata, it could benefit from signals from network about sudden capacity changes that can help it adapt its application quality, such as bitrates and codecs. Such signalling may not be appropriate for the most privacy-sensitive applications, like Tor, but could be applicable for many others. There are existing protocols that involve explicit signaling between applications and networks, such as ECN <xref target="RFC3168"/>, but that has yet to see wide adoption.</t>
          <t>Managed networks (such a private corporate networks) was brought up in several comments as a particularly challenging area for being able to meet management requirements while maintaining encryption and privacy. These networks can have legal and regulated requirements for detection of specific fraudulent or malicious traffic.</t>
          <t>Personal networks that enable managed parental controls have similar complications with encrypted traffic and user privacy. In these scenarios, the parental controls being operated by the network may be as simple as a DNS filter, an can be made ineffective by a device routing traffic to an alternate DNS resolver.</t>
        </section>
      </section>
      <section anchor="day2">
        <name>"Where we want to go" - Collaboration Principles</name>
        <t>The second day of the workshop agenda focused on the emerging techniques for analysing, managing or monitoring encrypted traffic. Presentations ranged from discussing advanced classification and identification, including machine-learning techniques, for the purposes of manging network flows, monitoring or monetising usage.</t>
        <t>After an introduction that covered the goals of the workshop and the starting questions (as described in <xref target="intro"/>), there were three presentations, followed by open discussion.</t>
        <section anchor="first-party-collaboration-for-network-management">
          <name>First party collaboration for network management</name>
          <t>It is the intention of encryption to create a barrier between entities inside the communication and everyone else, including network operators when we are talking about end-to-end encryption of traffic. Any attempt, therefore, to overcome that intentional barrier requires an intent to collaborate between the inside and outside entities. Those entities must, at a minimum, agree on the benefits to overcoming the barrier (or solving the problem), that costs are proportional to the beenfits, and to additional limitations, or safeguards, against bad behaviour by collaborators including the inclusion of other non-insiders <xref target="BARNES"/>.</t>
          <t>The internet is designed interoperably, which means an outside entity wishing to collaborate with the inside might be any number of intermediaries and not, say, a specific person that can be trusted in the human sense. Additionally the use of encryption, especially network or transport encryption, introduces dynamic or opportunitistic or perfunctory discoverability. These realities both point to a need to interrogate the reason why any outside entity might make an engineering case to collaborate with the user of an encrypted network, and whether the tradeoffs and potential risks are worth it to the user.</t>
          <t>However the answers cannot be specific and the determinations or guidance need to be general as the encryption boundary is inevitably an application used by many people. Tradeoffs must make sense to users who are unlikely to be thinking about network management considerations. Harms need to be preemptively reduced because in general terms few users would choose network management benefits over their own privacy if given the choice.</t>
          <t>Additionally there appear to be little if any actual evidence that encryption is causing user-meaningful network problems. Since alignment on problem solving is a prerequisite to collaboration on a solution it does not seem that collaboration across the encryption boundary is called for.</t>
        </section>
        <section anchor="second-and-third-party-collaboration-for-network-management">
          <name>Second and third party collaboration for network management</name>
          <t>Even with the wide-scale deployment of encryption in new protocols and techniques that prevent passive observers of network traffic from knowing the content of exchanged communications, important information such as which parties communicate and sometimes even which services have been requested may still be able to be deduced. The future is to conceal more data and metadata from passive observers and also to minimize information exposure to second parties (were the user is the first party) by, maybe counterintuitively, introducing third-party relay services to intermediate communications. As discussed in <xref target="KUEHLEWIND"/>, the relay is a mechanism to separate, using additional levels of encryption, two important pieces of information: knowledge of the identity of the person accessing a service is separated from knowledge about the service being accessed. By contrast a VPN uses only one level of encryption and does not separate identity (first party) and service (second party) metadata.</t>
          <t>Relay mechanisms are termed "oblivious", there is a future for specifications in privacy-preserving measurement (PPM), and protocols like Multiplexed Application Substrate over QUIC Encryption (MASQUE) are discussed in the IETF. In various schemes users are ideally able to share their identity only with the entity they have identified as a trusted one. That data is not shared with the service provider. However this is more complicated for network management, but there may be opportunities for better collaboration between the network and, say, the application or service at the endpoint.</t>
          <t>A queriable relay mechanism could preserve network management functions that are disrupted by encryption, such as TCP optimisation, quality of service, zero-rating, parental controls, access control, redirection, content enhancement, analytics and fraud prevention. Instead of encrypted communication between only two between the ends and passive observation by all on-path elements, intermediate relays could be trusted parties with limited information for the purposes of collaboration between in-network intermediary services' support.</t>
        </section>
        <section anchor="visible-optional-network-management">
          <name>Visible, optional network management</name>
          <t>In encrypted communications, out of all of the possible network management functions that might be ameliorated by proxying the ability to control congestion has been researched in depth. These techniques are realized based on TCP performance enhancing proxies (PEP) that either entirely intercept a TCP connection or interfere with the transport information in the TCP header. However, beside the challenge that new encrypted protocol limited any such in-network interference, these techniques can also have negative impact on the evolvability of these protocols. Therefore, instead on manipulating existing information, a new approaches was presented  where additional information is send using a so-called side-car protocol independent of the main transport protocol that is used end-to-end <xref target="WELZL"/>. E.g. side car information can contain additional acknowledgements to enable in-network local retransmission faster end-to-end retransmission by reducing the signaling round trip time.</t>
          <t>Taking user privacy benefits for granted, there is a need to investigate the comparable performance outputs of various encrypted traffic configurations such as use of an additional "side-car" protocol, or explicit encrypted and trusted network communication using MASQUE in relation to existing techniques based TCP performance enhancing proxies (PEP), etc.</t>
        </section>
        <section anchor="discussion-1">
          <name>Discussion</name>
          <t>One size fits all? On the issue of trust, different networks or devices are going to have different requirements for the level of trust that they have in devices, users or each other, and vice versa. For example, imagine networks with really different security requirements, like protecting children in a home versus a national security institution. How could one network architecture solve the needs of all use cases?</t>
          <t>Does our destination have consequences? It seems sometimes that there may be consequences many years down the line of ubiquitous, strong encryption of network traffic because it will cause a reaction by intermediaries to find ways to poke holes in what are supposed to be long-term solutions for user privacy and security.</t>
          <t>Can we bring the user along? While there has been a focus on the good reasons for why people might collaborate across the encryption barrier, there will always be others who want to disrupt that because they are motivated to exploit the data for their own gain, and sometimes this is called innovation. What high-level policy mitigations hvae done is to expose how powerless end users are to corporate practices of data harvesting. And yet interfaces to help users understand these lower layer traffic flows to protect their financial transactions or privacy haven't been achieved yet. That means that engineers are having to make inferences about what users want. Instead we should be making these relationships and tradeoffs more visible.</t>
        </section>
      </section>
      <section anchor="day3">
        <name>"How we get there" - Collaboration Use cases</name>
        <t>The third day focused on techniques that could actually be used to
improve management of encrypted networks.  A central theme of all of
the presentations about potential proposed paths forward included some
element of collaboration between networks and subscribing clients that
simultaneously want both privacy and protection.  Thus, the central
theme in the third day became negotiation and collaboration.</t>
        <section anchor="establishing-expected-contracts-to-enable-security-management">
          <name>Establishing expected contracts to enable security management</name>
          <t>When thinking about enterprise networks where client behavior is
potentially managed, <xref target="COLLINS"/> proposes "Improving network
monitoring through contracts", where contracts describe different
states of network behavior.</t>
          <t>Because network operators have a limited amount of time to focus on
problems and process alerts, contracts and states let the operator
focus on a particular aspect of a current situation or problem.  The
current estimate for the number of events an SOC operator can handle
is about 10 per hour.  Operators must work within the limits imposed
by their organization, and must pick between options that frequently
only frustrate attackers -- entirely preventing attacks is potentially
impossible. Finally, operators must prioritize and manage the most
events possible.</t>
          <t>Validating which alerts are true positives is challenging because lots
of weird traffic creates many anomalies and not all anomalies are
malicious events.  Identifying what anomalous traffic is rooted in
malicious activity with any level of certainty is extremely
challenging.  Unfortunately, applying the latest machine learning
techniques has only produced mixed results.  To make matters worse,
the large amounts of Internet-wide scanning has resulted in endless
traffic that is technically malicious but only creates an information
overload and challenges event prioritization.  Any path forward must
succeed in freeing up analyst time to concentrate on the more
challenging events.</t>
          <t>The proposed contract solution is to define a collection of acceptable
behaviors categorized into a envelope of different states that might
include IP addresses, domain names, and indicators of compromise.
Deviation from a contract might indicate that a system is acting
outside a normal mode of behavior, or even that a normal mode of
behavior is suddenly missing.  An example contracts might be "this
system is expected to update its base OS once a day", and if this
doesn't occur then this expectation has not been met and the system
should be checked as it failed to call home to look for (potentially
security related) updates.</t>
          <t>Within the IETF, the Manufacturer Usage Description Specification
(MUDD) {?RFC8520} specification is one subset of contracts.  Note that
contracts are likely to only succeed in a constrained, expected
environment maintained by operational staff, and may not work in an
open internet environment where end users are driving all network
connections.</t>
        </section>
        <section anchor="zero-knowledge-middleboxes">
          <name>Zero Knowledge Middleboxes</name>
          <t>The world is not only shifting to increased encrypted traffic, but is
also encrypting more and more of the metadata (e.g. DNS queries and
responses).  This makes network policy enforcement by middleboxes
significantly more challenging.  The result is the creation of a
significant tension between security enforcement and privacy
protection.</t>
          <t>A goal for solving this problem should include not weakening
encryption, should enable networks to enforce their policies, and
should ideally not require newly deployed server software.  Existing
solutions fail with at least one of these points.</t>
          <t>A cryptographic principle of a "zero knowledge proof" (ZKP) <xref target="GRUBBS"/>
may be one path forward to consider.  A ZKP allows a third party to
verify that a statement is true, without revealing what the statement
actually is.  Applying this to network traffic has been shown to allow
a middlebox to verify that traffic to a web server is actually
compliant with a policy without revealing the actual contents.  This
solution meets the above three criteria.  Using ZKP within TLS 1.3
traffic turns out to be plausible.</t>
          <t>An example engine was built to test ZKP using encrypted DNS.  Clients
were able to create DNS requests that were not listed within a DNS
block list.  Middleboxes could verify, without knowing the exact
request, that the client's DNS request was not in the prohibited list.
Although the result was functional, the computational overhead was
still too slow and future work will be needed to decrease the ZKP
imposed latencies.</t>
        </section>
        <section anchor="red-rover-a-collaborative-approach-to-content-filtering">
          <name>Red Rover - A collaborative approach to content filtering</name>
          <t>The principle challenge being studied is how to deal with the inherit
conflict between filtering and privacy.  Network operators need to
implement policies and regulations that can originate from many
locations (e.g. security, governmental, parental, etc).  Conversely,
clients need to protect user's privacy and user security.</t>
          <t>Safe browsing, originally created by Google, is one example of a
mechanism that tries to meet both sides of this conflict.  It would be
beneficial to standardize this and other similar mechanisms.
Operating systems could continually protect their users by ensuring
that malicious destinations are not being reached.  This would require
some coordination between cooperating clients and servers offering
protection services.  These collaborative solutions may be the best
compromise between the tension of privacy vs protection based services
<xref target="PAULY"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>Looking forward, the workshop participants identified that solving the
entire problem space with a single approach will be challenging for a
number of reasons. First, scalability of many solutions will likely
be an issue as some solutions are expensive in implementation.
Collaboration between multiple parties will be required for many
mechanisms to function. Finally, there is an unanswered question
of whether or not network operators be willing to participate and
allow technologies into their environment requirements in exchange
for technologies that prove their clients are being good net-citizens.
If so, some of these solutions might be required to exist before
networks allow certain type of increased encryption; consider the
example of TLS Encrypted Client Hello being blocked by some network
operators.</t>
      <t>The breadth of the problem space itself is another complicating
factor.  A wide variety of networks architectures exist that have
different requirements for both data encryption and network
management.  Each problem space will have different encumbrances of
multiple types; for example, technical, legal, data ownership,
adn regulatory concerns.  New network architectures might be needed to
solve this problem at a larger scope, which would in turn require
interoperability support from network product vendors.  In the
end, we should recognize that one solution will not solve all these
cases and it is more likely that different use cases will require
different solutions.  Education about various solutions will be
required in order to ensure regulation and policy organizations can
understand and thus support the deployment of developed solutions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="BARNES" target="https://github.com/intarchboard/m-ten-workshop/blob/main/papers/Barnes-Whats-In-It-For-Me-Revisiting-the-reasons-people-collaborate.pdf">
        <front>
          <title>What’s In It For Me? Revisiting the reasons people collaborate</title>
          <author initials="R." surname="Barnes" fullname="Richard L. Barnes">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="CASAS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Casas-AI-driven-real-time-QoE-monitoring-encrypted-traffic.pdf">
        <front>
          <title>Monitoring User-Perceived Quality in an Encrypted Internet</title>
          <author initials="P." surname="Casas" fullname="Pedro Casas">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="COLLINS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Collins-Improving-Network-Monitoring-Through-Contracts.pdf">
        <front>
          <title>Improving Network Monitoring Through Contracts</title>
          <author initials="M." surname="Collins" fullname="Michael Collins">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="DERI" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Deri-nDPI-Research-Proposal.pdf">
        <front>
          <title>nDPI Research Proposal</title>
          <author initials="L." surname="Deri" fullname="Luca Deri">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="ELKINS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Elkins-Performance-Monitoring-in-Encrypted-Networks-PDMv2.pdf">
        <front>
          <title>Performance Monitoring in Encrypted Networks</title>
          <author initials="N." surname="Elkins" fullname="Luca Deri">
            <organization/>
          </author>
          <author initials="M." surname="Ackermann" fullname="Mike Ackermann">
            <organization/>
          </author>
          <author initials="M." surname="Tahiliani" fullname="Mohit P. Tahiliani">
            <organization/>
          </author>
          <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
            <organization/>
          </author>
          <author initials="T." surname="Pecorella" fullname="Prof. Tommaso Pecorella">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="GRUBBS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Grubbs-Zero-Knowledge%20Middleboxes.pdf">
        <front>
          <title>Zero-Knowledge Middleboxes</title>
          <author initials="P." surname="Grubbs" fullname="Paul Grubbs">
            <organization/>
          </author>
          <author initials="A." surname="Arun" fullname="Arasu Arun">
            <organization/>
          </author>
          <author initials="Y." surname="Zhang" fullname="Ye Zhang">
            <organization/>
          </author>
          <author initials="J." surname="Bonneau" fullname="Joseph Bonneau">
            <organization/>
          </author>
          <author initials="M." surname="Walfish" fullname="Michael Walfish">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="JIANG" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Jiang-Towards-Designing-Robust-and-Efficient-Classifiers-for-Encrypted-Traffic-in-the-Modern-Internet.pdf">
        <front>
          <title>Towards Designing Robust and Efficient Classifiers for Encrypted Traffic in the Modern Internet</title>
          <author initials="X." surname="Jiang" fullname="Xi Jiang">
            <organization/>
          </author>
          <author initials="S." surname="Liu" fullname="Shinan Liu">
            <organization/>
          </author>
          <author initials="S." surname="Naama" fullname="Saloua Naama">
            <organization/>
          </author>
          <author initials="F." surname="Bronzino" fullname="Francesco Bronzino">
            <organization/>
          </author>
          <author initials="P." surname="Schmitt" fullname="Paul Schmitt">
            <organization/>
          </author>
          <author initials="N." surname="Feamster" fullname="Nick Feamster">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="KNODEL" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Knodel-Guidelines-for-Performing-Safe-Measurement-on-the-Internet.pdf">
        <front>
          <title>Guidelines for Performing Safe Measurement on the Internet</title>
          <author initials="M." surname="Knodel" fullname="Mallory Knodel">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="KUEHLEWIND" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Kuehlewind-Relying-on-Relays.pdf">
        <front>
          <title>Relying on Relays</title>
          <author initials="M." surname="Kühlewind" fullname="Mirja Kühlewind">
            <organization/>
          </author>
          <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
            <organization/>
          </author>
          <author initials="Z." surname="Sarker" fullname="Zaheduzzaman Sarker">
            <organization/>
          </author>
          <author initials="M." surname="Ihlar" fullname="Marcus Ihlar">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="LEI" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Lei-Encrypted-Traffic-Classification-Through-Deep-Learning.pdf">
        <front>
          <title>Encrypted Traffic Classification Through Deep Learning</title>
          <author initials="Y." surname="Lei" fullname="Yupeng Lei">
            <organization/>
          </author>
          <author initials="J." surname="Wu" fullname="Jun Wu">
            <organization/>
          </author>
          <author initials="X." surname="Sun" fullname="Xudong Sun">
            <organization/>
          </author>
          <author initials="L." surname="Zhang" fullname="Liang Zhang">
            <organization/>
          </author>
          <author initials="Q." surname="Wu" fullname="Qin Wu">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="PAULY" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Pauly-Red-Rover-A-collaborative-approach-to-content-filtering.pdf">
        <front>
          <title>Red Rover</title>
          <author initials="T." surname="Pauly" fullname="Tommy Pauly">
            <organization/>
          </author>
          <author initials="R." surname="Barnes" fullname="Richard Barnes">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="WELZL" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Welzl-The-Sidecar-Opting-in-to-PEP-Functions.pdf">
        <front>
          <title>The Sidecar</title>
          <author initials="M." surname="Welzl" fullname="Michael Welzl">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="WU" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Wu-mten-taxonomy.pdf">
        <front>
          <title>Network Management of Encrypted Traffic</title>
          <author initials="Q." surname="Wu" fullname="Qin Wu">
            <organization/>
          </author>
          <author initials="J." surname="Wu" fullname="Jun Wu">
            <organization/>
          </author>
          <author initials="Q." surname="Ma" fullname="Qiufang Ma">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="DITTO" target="https://nsg.ee.ethz.ch/fileadmin/user_upload/publications/ditto_final_ndss22.pdf">
        <front>
          <title>Ditto - WAN Traffic Obfuscation at Line Rate</title>
          <author initials="R." surname="Meier" fullname="Roland Meier">
            <organization/>
          </author>
          <author initials="V." surname="Lenders" fullname="Vincent Lenders">
            <organization/>
          </author>
          <author initials="L." surname="Vanbever" fullname="Laurent Vanbever">
            <organization/>
          </author>
          <date year="2022" month="April"/>
        </front>
      </reference>
      <reference anchor="I-D.irtf-pearg-safe-internet-measurement">
        <front>
          <title>Guidelines for Performing Safe Measurement on the Internet</title>
          <author fullname="Iain R. Learmonth" initials="I. R." surname="Learmonth">
            <organization>HamBSD</organization>
          </author>
          <author fullname="Gurshabad Grover" initials="G." surname="Grover">
            <organization>Centre for Internet and Society</organization>
          </author>
          <author fullname="Mallory Knodel" initials="M." surname="Knodel">
            <organization>Center for Democracy and Technology</organization>
          </author>
          <date day="19" month="August" year="2022"/>
          <abstract>
            <t>   Researchers from industry and academia often use Internet
   measurements as part of their work.  While these measurements can
   give insight into the functioning and usage of the Internet, they can
   come at the cost of user privacy.  This document describes guidelines
   for ensuring that such measurements can be carried out safely.

Note

   Comments are solicited and should be addressed to the research
   group's mailing list at pearg@irtf.org and/or the author(s).

   The sources for this draft are at:

   https://github.com/irl/draft-safe-internet-measurement

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-safe-internet-measurement-06"/>
      </reference>
      <reference anchor="RFC3168">
        <front>
          <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
          <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan">
            <organization/>
          </author>
          <author fullname="S. Floyd" initials="S." surname="Floyd">
            <organization/>
          </author>
          <author fullname="D. Black" initials="D." surname="Black">
            <organization/>
          </author>
          <date month="September" year="2001"/>
          <abstract>
            <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3168"/>
        <seriesInfo name="DOI" value="10.17487/RFC3168"/>
      </reference>
    </references>
    <section anchor="positionpapers">
      <name>Position Papers</name>
      <t>Interested participants were openly invited to submit position papers on the workshop topics, including Internet-Drafts, relevant academic papers, or short abstracts explaining their interest. The papers below constitute the inputs that were considered relevant for workshop attendees and that focused the discussions themselves. The program committee grouped the papers by theme as such.</t>
      <section anchor="motivations-and-principles">
        <name>Motivations and principles</name>
        <t>Richard Barnes. “What’s In It For Me? Revisiting the reasons people collaborate.” <xref target="BARNES"/></t>
        <t>Iain R. Learmonth, Gurshabad Grover, Mallory Knodel. “Guidelines for Performing Safe Measurement on the Internet.” (Additional rationale) <xref target="KNODEL"/></t>
        <t>Qin Wu, Jun Wu, Qiufang Ma. “Network Management of Encrypted Traffic: Detect it don’t decrypt it.” <xref target="WU"/></t>
      </section>
      <section anchor="classification-and-identification-of-encrypted-traffic">
        <name>Classification and identification of encrypted traffic</name>
        <t>Luca Deri. “nDPI Research Proposal.” <xref target="DERI"/></t>
        <t>Wes Hardaker. “Network Flow Management by Probability.”</t>
        <t>Xi Jiang, Shinan Liu, Saloua Naama, Francesco Bronzino, Paul Schmitt, Nick Feamster. “Towards Designing Robust and Efficient Classifiers for Encrypted Traffic in the Modern Internet.” <xref target="JIANG"/></t>
        <t>Yupeng Lei, Jun Wu, Xudong Sun, Liang Zhang, Qin Wu. “Encrypted Traffic Classification Through Deep Learning.” <xref target="LEI"/></t>
      </section>
      <section anchor="ideas-for-collaboration-and-coordination-between-devices-and-networks">
        <name>Ideas for collaboration and coordination between devices and networks</name>
        <t>Michael Collins. “Improving Network Monitoring Through Contracts.” <xref target="COLLINS"/></t>
        <t>Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish. “Zero-Knowledge Middleboxes.” <xref target="GRUBBS"/></t>
        <t>Mirja Kühlewind, Magnus Westerlund, Zaheduzzaman Sarker, Marcus Ihlar. “Relying on Relays: The future of secure communication.” <xref target="KUEHLEWIND"/></t>
        <t>Tommy Pauly, Richard Barnes. “Red Rover: A collaborative approach to content filtering.” <xref target="PAULY"/></t>
        <t>Michael Welzl. “The Sidecar: ‘Opting in’ to PEP Functions.“ <xref target="WELZL"/></t>
      </section>
      <section anchor="other-background-material">
        <name>Other background material</name>
        <t>Pedro Casas. “Monitoring User-Perceived Quality in an Encrypted Internet – AI to the Rescue.” <xref target="CASAS"/></t>
        <t>Nalini Elkins, Mike Ackermann, Mohit P. Tahiliani, Dhruv Dhody, Prof. Tommaso Pecorella. “Performance Monitoring in Encrypted Networks: PDMv2.” <xref target="ELKINS"/></t>
      </section>
    </section>
    <section anchor="participants">
      <name>Workshop participants</name>
      <t>The workshop participants were Cindy Morgan, Colin Perkins, Cullen Jennings, Deborah Brungard, Dhruv Dhody, Eric Vyncke, Georg Carle, Ivan Nardi, Jari Arkko, Jason Livingood, Jiankang Yao, Karen O'Donoghue, Keith Winstein, Lars Eggert, Laurent Vanbever, Luca Deri, Mallory Knodel, Marcus Ihlar, Matteo, Michael Ackermann, Michael Collins, Michael Richardson, Michael Welzl, Mike Ackermann, Mirja Kühlewind, Mohit P. Tahiliani, Nalini Elkins, Patrick Tarpey, paul grubbs, Pedro Casas, Qin Wu, Qiufang, Richard Barnes, Rob Wilton, Russ White, Saloua Naama, Shinan Liu, Srinivas C, Toerless Eckert, Tommy Pauly, Wes Hardaker, Xi Chase Jiang, Zaheduzzaman Sarker, Zhenbin Li.</t>
    </section>
    <section anchor="program-committee">
      <name>Program Committee</name>
      <t>The workshop program committee members were Wes Hardaker (IAB, USC/ISI), Mallory Knodel (IAB, Center for Democracy and Technology), Mirja Kühlewind (IAB, Ericsson), Tommy Pauly (IAB, Apple), Russ White (IAB, Juniper), Qin Wu (IAB, Huawei).</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
