<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.29 (Ruby 3.1.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-m-ten-workshop-01" category="info" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="M-TEN workshop report">Report from the IAB workshop on Management Techniques in Encrypted Networks (M-TEN)</title>
    <seriesInfo name="Internet-Draft" value="draft-iab-m-ten-workshop-01"/>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization/>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization/>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <date year="2023" month="April" day="29"/>
    <keyword>encryption</keyword>
    <keyword>network management</keyword>
    <abstract>
      <t>The “Management Techniques in Encrypted Networks (M-TEN)” workshop was convened by the Internet Architecture Board (IAB) from 17 October 2022 to 19 October 2022 as a three-day online meeting. The workshop was organized in three parts to discuss ways to improve network management techniques in support of even broader adoption of encryption on the Internet. This report summarizes the workshop's discussion and identifies topics that warrant future work and consideration.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://intarchboard.github.io/m-ten-workshop-public/draft-iab-m-ten-workshop.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-iab-m-ten-workshop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/intarchboard/m-ten-workshop-public"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>User privacy and security are constantly being improved by increasingly strong and more widely deployed encryption. This workshop aims to discuss ways to improve network management techniques in support of even broader adoption of encryption on the Internet.</t>
      <t>Network management techniques need to evolve to work effectively and reliably in the presence of ubiquitous traffic encryption and support techniques that enhance user privacy. In an all-encrypted network, it is not viable to rely on unencrypted metadata for network monitoring and security functions, troubleshooting devices, and passive traffic measurements. New approaches are needed to track network behaviors, e.g., by directly cooperating with endpoints and applications, increasing use of in-band telemetry, increasing use of active measurement approaches, and privacy-preserving inference techniques.</t>
      <t>The aim of this IAB online workshop from October 17-19, 2022, has been to provide a platform to explore the interaction between network management and traffic encryption and initiate new work on collaborative approaches that promote security and user privacy while supporting operational requirements. As such the workshop addressed the following questions:</t>
      <ul spacing="normal">
        <li>What are actionable network management requirements?</li>
        <li>Who is willing to work on collaborative solutions?</li>
        <li>What are the starting points for collaborative solutions?</li>
      </ul>
    </section>
    <section anchor="workshop-scope-and-discussion">
      <name>Workshop Scope and Discussion</name>
      <t>The workshop was organized across three days with all-group discussion slots, one per day. The following topic areas were identified and the program committee organized paper submissions into three main themes for each of the three discussion slots. During each discussion, those papers were presented sequentially with open discussion held at the end of each day.</t>
      <section anchor="day1">
        <name>"Where we are" - Requirements and Passive Observations</name>
        <t>The first day of the workshop agenda focused on the existing state of the relationship between network management and encrypted traffic from various angles. Presentations ranged from discussing classifiers using machine-learning to recognize traffic, to advanced techniques for evading traffic analysis, to user privacy considerations.</t>
        <t>After an introduction that covered the goals of the workshop and the starting questions (as described in <xref target="intro"/>), there were four presentations, followed by open discussion.</t>
        <section anchor="traffic-classification-and-network-management">
          <name>Traffic classification and network management</name>
          <t>Many existing network management techiques are passive in nature: they don't rely on an explicit signals from end hosts to negotiate with network middleboxes, but instead rely on inspecting packets to recognize traffic and apply various policies. Traffic classification, as a passive technique, is being challenged by increasing encryption.</t>
          <t>Traffic classification is commonly performed by networks to infer what applications and services are being used. This information is in turn used for capacity and resource planning, Quality-of-Service (QoS) monitoring, traffic prioritization, network access control, identity management, and malware detection. However, since classification traditionally relies on recognizing unencrypted properties of packets in a flow, increasing encryption of traffic can decrease the effectiveness of classification.</t>
          <t>The amount of classification that can be performed on traffic also provides a useful insight onto how "leaky" the protocols used by applications are, and points to areas where information is visible to any observer, which may be malicious or not.</t>
          <t>Traditionally, classification has been based on experts crafting specific rules, but there is also a move toward using maching learning to recognize patterns. "Deep learning" machine learning models generally rely on analyzing a large set of traffic over time, and have trouble reacting quickly to changes in traffic patterns.</t>
          <t>Models that are based on closed-world data sets also become less useful over time, as traffic changes. <xref target="JIANG"/> describes experiments that showed that a model that performs with high accuracy on an initial data set became severely degraded when running on a newer data set that contained traffic from the same applications. Even in as little time as one week, the traffic classification would become degraded. However, the set of features in packets and flows that were useful for models stayed mostly consistent, even if the models themselves needed to be updated. Models where the feature space is reduced to fewer features showed better resiliency, and could be retrained more quickly. Based on this, <xref target="JIANG"/> recommends more work and research on determining which set of features in IP packets are most useful for focused machine learning analysis. <xref target="WU"/> also recommends further research investment in Artificial Intelligent (AI) analysis for network management.</t>
        </section>
        <section anchor="preventing-traffic-analysis">
          <name>Preventing traffic analysis</name>
          <t>Just as traffic classification is continually adapting, techniques to prevent traffic analysis and obfuscate application and user traffic are continually evolving. An invited talk from the authors of <xref target="DITTO"/> shared a novel approach with the workshop for how to build a very robust system to prevent unwanted traffic analysis.</t>
          <t>Usually traffic obfuscation is performed by changing the timing of packets or adding padding data. The practices can be costly and negatively impact performance. DITTO demonstrated the feasibility of applying traffic obfuscation on aggregated traffic in the network with minimal overhead and in line speed.</t>
          <t>While traffic obfuscation techniques are today not widely deployed, this study underlines, together with the need for continuous effort to keep traffic models updated over time, the challenges of classification of encrypted traffic as well as opportunities to further enhance user privacy.</t>
        </section>
        <section anchor="users-and-privacy">
          <name>Users and privacy</name>
          <t>The Privacy Enhancements and Assessments Research Group is working on a document to discuss guidelines for how to measure traffic on the Internet in a safe and privacy-friendly way (<xref target="I-D.irtf-pearg-safe-internet-measurement"/>). These guidelines and principles provide another angle onto the discussion of passive classification and analysis of traffic.</t>
          <t>Consent for collection and measurement of metadata is an important consideration in deploying network measurement techniques. This consent can be explicitly given as informed consent, or can be given by proxy or be only implied. For example, a user of a network might need to consent to certain measurement and traffic treatment when joining a network.</t>
          <t>Various techniques for data collection can also improve user privacy, such as discarding data after a short period of time, masking out aspects of data that contain user-identifying information, reducing the accuracy of collected data, and aggregating data.</t>
        </section>
        <section anchor="discussion">
          <name>Discussion</name>
          <t>The intents and goals of users, application developers, and network operators align in some cases, but not others. One of the recurring challenges that came up was not having a clear way to understand or communicate intents and requirements. Both traffic classification and traffic obfuscation attempt to change the visibility of traffic without cooperation of other parties: traffic classification is a network attempting to inspect application traffic without coordination from applications, and traffic obfuscation is an attempt to hide that same traffic as it transits a network.</t>
          <t>Traffic adaptation and prioritization is one dimension in which the incentives for cooperation seem most clear. Even if an application is trying to prevent leaking metadata, it could benefit from signals from network about sudden capacity changes that can help it adapt its application quality, such as bitrates and codecs. Such signalling may not be appropriate for the most privacy-sensitive applications, like Tor, but could be applicable for many others. There are existing protocols that involve explicit signaling between applications and networks, such as Explicit Congestion Notification (ECN) <xref target="RFC3168"/>, but that has yet to see wide adoption.</t>
          <t>Managed networks (such a private corporate networks) was brought up in several comments as a particularly challenging area for being able to meet management requirements while maintaining encryption and privacy. These networks can have legal and regulated requirements for detection of specific fraudulent or malicious traffic.</t>
          <t>Personal networks that enable managed parental controls have similar complications with encrypted traffic and user privacy. In these scenarios, the parental controls being operated by the network may be as simple as a DNS filter, and can be made ineffective by a device routing traffic to an alternate DNS resolver.</t>
        </section>
      </section>
      <section anchor="day2">
        <name>"Where we want to go" - Collaboration Principles</name>
        <t>The second day of the workshop agenda focused on the emerging techniques for analysing, managing or monitoring encrypted traffic. Presentations ranged from discussing advanced classification and identification, including machine-learning techniques, for the purposes of manging network flows, monitoring or monetising usage.</t>
        <t>After an introduction that covered the goals of the workshop and the starting questions (as described in <xref target="intro"/>), there were three presentations, followed by open discussion.</t>
        <section anchor="first-party-collaboration-for-network-management">
          <name>First party collaboration for network management</name>
          <t>It is the intention of encryption to create a barrier between entities inside the communication channel and everyone else, including network operators, considering end-to-end encryption of traffic. Any attempt, therefore, to overcome that intentional barrier requires an intent to collaborate between the inside and outside entities. Those entities must, at a minimum, agree on the benefits to overcoming the barrier (or solving the problem), that costs are proportional to the benefits, and to additional limitations, or safeguards, against bad behaviour by collaborators including the inclusion of other non-insiders <xref target="BARNES"/>.</t>
          <t>The Internet is designed interoperably, which means an outside entity wishing to collaborate with the inside might be any number of intermediaries and not, say, a specific person that can be trusted in the human sense. Additionally the use of encryption, especially network-layer or transport-layer encryption, introduces dynamic or opportunitistic or perfunctory discoverability. These realities both point to a need to interrogate the reason why any outside entity might make an engineering case to collaborate with the user of a network with encrypted traffic, and whether the tradeoffs and potential risks are worth it to the user.</t>
          <t>However, the answers cannot be specific and the determinations or guidance need to be general as the encryption boundary is inevitably an application used by many people. Tradeoffs must make sense to users who are unlikely to be thinking about network management considerations. Harms need to be preemptively reduced because in general terms few users would choose network management benefits over their own privacy if given the choice.</t>
          <t>Additionally, there appears to be little if any actual evidence that encryption is causing user-meaningful network problems. Since alignment on problem-solving is a prerequisite to collaboration on a solution it does not seem that collaboration across the encryption boundary is called for.</t>
        </section>
        <section anchor="second-and-third-party-collaboration-for-network-management">
          <name>Second and third party collaboration for network management</name>
          <t>Even with the wide-scale deployment of encryption in new protocols and techniques that prevent passive observers of network traffic from knowing the content of exchanged communications, important information such as which parties communicate and sometimes even which services have been requested may still be able to be deduced. The future is to conceal more data and metadata from passive observers and also to minimize information exposure to second parties (where the user is the first party) by, maybe counterintuitively, introducing third-party relay services to intermediate communications. As discussed in <xref target="KUEHLEWIND"/>, the relay is a mechanism to separate (using additional levels of encryption) two important pieces of information: knowledge of the identity of the person accessing a service is separated from knowledge about the service being accessed. By contrast a VPN uses only one level of encryption and does not separate identity (first party) and service (second party) metadata.</t>
          <t>Relay mechanisms are termed "oblivious", there is a future for specifications in privacy-preserving measurement (PPM), and protocols like Multiplexed Application Substrate over QUIC Encryption (MASQUE) are discussed in the IETF. In various schemes, users are ideally able to share their identity only with the entity they have identified as a trusted one. That data is not shared with the service provider. However this is more complicated for network management, but there may be opportunities for better collaboration between the network and, say, the application or service at the endpoint.</t>
          <t>A queriable relay mechanism could preserve network management functions that are disrupted by encryption, such as TCP optimisation, quality of service, zero-rating, parental controls, access control, redirection, content enhancement, analytics and fraud prevention. Instead of encrypted communication between only two ends and passive observation by all on-path elements, intermediate relays could be trusted parties with limited information for the purposes of collaboration between in-network intermediary services' support.</t>
        </section>
        <section anchor="visible-optional-network-management">
          <name>Visible, optional network management</name>
          <t>In encrypted communications, out of all of the possible network management functions that might be ameliorated by proxying, the ability to control congestion has been researched in depth. These techniques are realized based on TCP performance enhancing proxies (PEP) that either entirely intercept a TCP connection or interfere with the transport information in the TCP header. However, despite the challenge that the new encrypted protocol will limit any such in-network interference, these techniques can also have a negative impact on the evolvability of these protocols. Therefore, instead of manipulating existing information, a new approach was presented  where additional information is send using a so-called side-car protocol independent of the main transport protocol that is used end-to-end <xref target="WELZL"/>. E.g. side car information can contain additional acknowledgements to enable in-network local retransmission faster end-to-end retransmission by reducing the signaling round trip time.</t>
          <t>Taking user privacy benefits for granted, there is a need to investigate the comparable performance outputs of various encrypted traffic configurations such as use of an additional "side-car" protocol, or explicit encrypted and trusted network communication using MASQUE in relation to existing techniques such as TCP performance enhancing proxies (PEP), etc.</t>
        </section>
        <section anchor="discussion-1">
          <name>Discussion</name>
          <t>One size fits all? On the issue of trust, different networks or devices are going to have different requirements for the level of trust that they have in devices, users or each other, and vice versa. For example, imagine networks with really different security requirements, like protecting children in a home versus a national security institution. How could one network architecture solve the needs of all use cases?</t>
          <t>Does our destination have consequences? It seems sometimes that there may be consequences many years down the line of ubiquitous, strong encryption of network traffic because it will cause a reaction by intermediaries to find ways to poke holes in what are supposed to be long-term solutions for user privacy and security.</t>
          <t>Can we bring the user along? While there has been a focus on the good reasons for why people might collaborate across the encryption barrier, there will always be others who want to disrupt that because they are motivated to exploit the data for their own gain, and sometimes this is called innovation. What high-level policy mitigations have done is to expose how powerless end users are to corporate practices of data harvesting. And yet interfaces to help users understand these lower layer traffic flows to protect their financial transactions or privacy haven't been achieved yet. That means that engineers are having to make inferences about what users want. Instead we should be making these relationships and tradeoffs more visible.</t>
        </section>
      </section>
      <section anchor="day3">
        <name>"How we get there" - Collaboration Use cases</name>
        <t>The third day focused on techniques that could actually be used to
improve management of encrypted networks.  A central theme of all of
the presentations about potential proposed paths forward included some
element of collaboration between networks and subscribing clients that
simultaneously want both privacy and protection.  Thus, the central
theme in the third day became negotiation and collaboration.</t>
        <section anchor="establishing-expected-contracts-to-enable-security-management">
          <name>Establishing expected contracts to enable security management</name>
          <t>When thinking about enterprise networks where client behavior is
potentially managed, <xref target="COLLINS"/> proposes "Improving network
monitoring through contracts", where contracts describe different
states of network behavior.</t>
          <t>Because network operators have a limited amount of time to focus on
problems and process alerts, contracts and states let the operator
focus on a particular aspect of a current situation or problem.  The
current estimate for the number of events a Security Operations Center (SOC) operator can handle
is about 10 per hour.  Operators must work within the limits imposed
by their organization, and must pick between options that frequently
only frustrate attackers -- entirely preventing attacks is potentially
impossible. Finally, operators must prioritize and manage the most
events possible.</t>
          <t>Validating which alerts are true positives is challenging because lots
of weird traffic creates many anomalies and not all anomalies are
malicious events.  Identifying what anomalous traffic is rooted in
malicious activity with any level of certainty is extremely
challenging.  Unfortunately, applying the latest machine learning
techniques has only produced mixed results.  To make matters worse,
the large amounts of Internet-wide scanning has resulted in endless
traffic that is technically malicious but only creates an information
overload and challenges event prioritization.  Any path forward must
succeed in freeing up analyst time to concentrate on the more
challenging events.</t>
          <t>The proposed contract solution is to define a collection of acceptable
behaviors categorized into an envelope of different states that might
include IP addresses, domain names, and indicators of compromise.
Deviation from a contract might indicate that a system is acting
outside a normal mode of behavior, or even a normal mode of
behavior is suddenly missing.  An example contract might be "this
system is expected to update its base OS once a day", and if this
doesn't occur then this expectation has not been met and the system
should be checked as it failed to call home to look for (potentially
security related) updates.</t>
          <t>Within the IETF, the Manufacturer Usage Description Specification
(MUDD) {?RFC8520} specification is one subset of contracts.  Note that
contracts are likely to only succeed in a constrained, expected
environment maintained by operational staff, and may not work in an
open internet environment where end users are driving all network
connections.</t>
        </section>
        <section anchor="zero-knowledge-middleboxes">
          <name>Zero Knowledge Middleboxes</name>
          <t>The world is not only shifting to increased encrypted traffic but is
also encrypting more and more of the metadata (e.g. DNS queries and
responses).  This makes network policy enforcement by middleboxes
significantly more challenging.  The result is the creation of a
significant tension between security enforcement and privacy
protection.</t>
          <t>A goal for solving this problem should include not weakening
encryption, should enable networks to enforce their policies, and
should ideally not require newly deployed server software.  Existing
solutions fail with at least one of these points.</t>
          <t>A cryptographic principle of a "zero-knowledge proof" (ZKP) <xref target="GRUBBS"/>
maybe one path forward to consider.  A ZKP allows a third party to
verify that a statement is true, without revealing what the statement
actually is.  Applying this to network traffic has been shown to allow
a middlebox to verify that traffic to a web server is actually
compliant with a policy without revealing the actual contents.  This
solution meets the above three criteria.  Using ZKP within TLS 1.3
traffic turns out to be plausible.</t>
          <t>An example engine was built to test ZKP using encrypted DNS.  Clients
were able to create DNS requests that were not listed within a DNS
block list.  Middleboxes could verify, without knowing the exact
request, that the client's DNS request was not in the prohibited list.
Although the result was functional, the computational overhead was
still too slow and future work will be needed to decrease the ZKP
imposed latencies.</t>
        </section>
        <section anchor="red-rover-a-collaborative-approach-to-content-filtering">
          <name>Red Rover - A collaborative approach to content filtering</name>
          <t>The principle challenge being studied is how to deal with the inherit
conflict between filtering and privacy.  Network operators need to
implement policies and regulations that can originate from many
locations (e.g. security, governmental, parental, etc).  Conversely,
clients need to protect user's privacy and user security.</t>
          <t>Safe browsing, originally created by Google, is one example of a
mechanism that tries to meet both sides of this conflict.  It would be
beneficial to standardize this and other similar mechanisms.
Operating systems could continually protect their users by ensuring
that malicious destinations are not being reached.  This would require
some coordination between cooperating clients and servers offering
protection services.  These collaborative solutions may be the best
compromise between the tension of privacy vs protection based services
<xref target="PAULY"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>Looking forward, the workshop participants identified that solving the
entire problem space with a single approach will be challenging for
several reasons:</t>
      <ul spacing="normal">
        <li>The scalability of many solutions will likely be an issue as some
solutions are complex or expensive to implement.</li>
        <li>Collaboration between multiple parties will be required for many
mechanisms to function, and the sets of parties required for different
use cases might be disjoint.</li>
        <li>There is an unanswered question of whether or not network operators
be willing to participate and allow technologies into their environment
requirements in exchange for technologies that prove their clients are
being good net-citizens. If so, some of these solutions might be required
to exist before networks allow a certain type of increased encryption;
consider the example of TLS Encrypted Client Hello being blocked by
some network operators.</li>
      </ul>
      <t>The breadth of the problem space itself is another complicating
factor.  There is a wide variety of network architectures, and each
has different requirements for both data encryption and network
management.  Each problem space will have different encumbrances of
multiple types; for example, technical, legal, data ownership,
and regulatory concerns.  New network architectures might be needed to
solve this problem at a larger scope, which would in turn require
interoperability support from network product vendors.  Education about
various solutions will be required in order to ensure regulation and
policy organizations can understand and thus support the deployment of
developed solutions.</t>
      <t>After new technologies and related standards are developed and deployed,
unintended consequences can emerge that weren't considered during the
design of the protocol. These lead to effects in multiple directions:
on one hand, exposed protocol values not intended for network management
might be used by networks to differentiate traffic; on the other hand,
changes to a protocol might have impact on private network deployments
that break existing use cases. While making decisions on technology
direction and protocol design, it is important to consider the impact on
various kinds of network deployments and their unique requirements.
When protocols change to make different network management functions
easier or harder, the impact on various deployment models ought to be
considered and documented.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="BARNES" target="https://github.com/intarchboard/m-ten-workshop/blob/main/papers/Barnes-Whats-In-It-For-Me-Revisiting-the-reasons-people-collaborate.pdf">
        <front>
          <title>What’s In It For Me? Revisiting the reasons people collaborate</title>
          <author initials="R." surname="Barnes" fullname="Richard L. Barnes">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="CASAS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Casas-AI-driven-real-time-QoE-monitoring-encrypted-traffic.pdf">
        <front>
          <title>Monitoring User-Perceived Quality in an Encrypted Internet</title>
          <author initials="P." surname="Casas" fullname="Pedro Casas">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="COLLINS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Collins-Improving-Network-Monitoring-Through-Contracts.pdf">
        <front>
          <title>Improving Network Monitoring Through Contracts</title>
          <author initials="M." surname="Collins" fullname="Michael Collins">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="DERI" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Deri-nDPI-Research-Proposal.pdf">
        <front>
          <title>nDPI Research Proposal</title>
          <author initials="L." surname="Deri" fullname="Luca Deri">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="ELKINS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Elkins-Performance-Monitoring-in-Encrypted-Networks-PDMv2.pdf">
        <front>
          <title>Performance Monitoring in Encrypted Networks</title>
          <author initials="N." surname="Elkins" fullname="Nalini Elkins">
            <organization/>
          </author>
          <author initials="M." surname="Ackermann" fullname="Mike Ackermann">
            <organization/>
          </author>
          <author initials="M." surname="Tahiliani" fullname="Mohit P. Tahiliani">
            <organization/>
          </author>
          <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
            <organization/>
          </author>
          <author initials="T." surname="Pecorella" fullname="Prof. Tommaso Pecorella">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="GRUBBS" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Grubbs-Zero-Knowledge%20Middleboxes.pdf">
        <front>
          <title>Zero-Knowledge Middleboxes</title>
          <author initials="P." surname="Grubbs" fullname="Paul Grubbs">
            <organization/>
          </author>
          <author initials="A." surname="Arun" fullname="Arasu Arun">
            <organization/>
          </author>
          <author initials="Y." surname="Zhang" fullname="Ye Zhang">
            <organization/>
          </author>
          <author initials="J." surname="Bonneau" fullname="Joseph Bonneau">
            <organization/>
          </author>
          <author initials="M." surname="Walfish" fullname="Michael Walfish">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="JIANG" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Jiang-Towards-Designing-Robust-and-Efficient-Classifiers-for-Encrypted-Traffic-in-the-Modern-Internet.pdf">
        <front>
          <title>Towards Designing Robust and Efficient Classifiers for Encrypted Traffic in the Modern Internet</title>
          <author initials="X." surname="Jiang" fullname="Xi Jiang">
            <organization/>
          </author>
          <author initials="S." surname="Liu" fullname="Shinan Liu">
            <organization/>
          </author>
          <author initials="S." surname="Naama" fullname="Saloua Naama">
            <organization/>
          </author>
          <author initials="F." surname="Bronzino" fullname="Francesco Bronzino">
            <organization/>
          </author>
          <author initials="P." surname="Schmitt" fullname="Paul Schmitt">
            <organization/>
          </author>
          <author initials="N." surname="Feamster" fullname="Nick Feamster">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="KNODEL" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Knodel-Guidelines-for-Performing-Safe-Measurement-on-the-Internet.pdf">
        <front>
          <title>Guidelines for Performing Safe Measurement on the Internet</title>
          <author initials="M." surname="Knodel" fullname="Mallory Knodel">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="KUEHLEWIND" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Kuehlewind-Relying-on-Relays.pdf">
        <front>
          <title>Relying on Relays</title>
          <author initials="M." surname="Kühlewind" fullname="Mirja Kühlewind">
            <organization/>
          </author>
          <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
            <organization/>
          </author>
          <author initials="Z." surname="Sarker" fullname="Zaheduzzaman Sarker">
            <organization/>
          </author>
          <author initials="M." surname="Ihlar" fullname="Marcus Ihlar">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="LEI" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Lei-Encrypted-Traffic-Classification-Through-Deep-Learning.pdf">
        <front>
          <title>Encrypted Traffic Classification Through Deep Learning</title>
          <author initials="Y." surname="Lei" fullname="Yupeng Lei">
            <organization/>
          </author>
          <author initials="J." surname="Wu" fullname="Jun Wu">
            <organization/>
          </author>
          <author initials="X." surname="Sun" fullname="Xudong Sun">
            <organization/>
          </author>
          <author initials="L." surname="Zhang" fullname="Liang Zhang">
            <organization/>
          </author>
          <author initials="Q." surname="Wu" fullname="Qin Wu">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="PAULY" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Pauly-Red-Rover-A-collaborative-approach-to-content-filtering.pdf">
        <front>
          <title>Red Rover</title>
          <author initials="T." surname="Pauly" fullname="Tommy Pauly">
            <organization/>
          </author>
          <author initials="R." surname="Barnes" fullname="Richard Barnes">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="WELZL" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Welzl-The-Sidecar-Opting-in-to-PEP-Functions.pdf">
        <front>
          <title>The Sidecar</title>
          <author initials="M." surname="Welzl" fullname="Michael Welzl">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="WU" target="https://github.com/intarchboard/workshop-m-ten/blob/main/papers/Wu-mten-taxonomy.pdf">
        <front>
          <title>Network Management of Encrypted Traffic</title>
          <author initials="Q." surname="Wu" fullname="Qin Wu">
            <organization/>
          </author>
          <author initials="J." surname="Wu" fullname="Jun Wu">
            <organization/>
          </author>
          <author initials="Q." surname="Ma" fullname="Qiufang Ma">
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="DITTO" target="https://nsg.ee.ethz.ch/fileadmin/user_upload/publications/ditto_final_ndss22.pdf">
        <front>
          <title>Ditto - WAN Traffic Obfuscation at Line Rate</title>
          <author initials="R." surname="Meier" fullname="Roland Meier">
            <organization/>
          </author>
          <author initials="V." surname="Lenders" fullname="Vincent Lenders">
            <organization/>
          </author>
          <author initials="L." surname="Vanbever" fullname="Laurent Vanbever">
            <organization/>
          </author>
          <date year="2022" month="April"/>
        </front>
      </reference>
      <reference anchor="I-D.irtf-pearg-safe-internet-measurement">
        <front>
          <title>Guidelines for Performing Safe Measurement on the Internet</title>
          <author fullname="Iain R. Learmonth" initials="I. R." surname="Learmonth">
            <organization>HamBSD</organization>
          </author>
          <author fullname="Gurshabad Grover" initials="G." surname="Grover">
            <organization>Centre for Internet and Society</organization>
          </author>
          <author fullname="Mallory Knodel" initials="M." surname="Knodel">
            <organization>Center for Democracy and Technology</organization>
          </author>
          <date day="28" month="March" year="2023"/>
          <abstract>
            <t>   Internet measurement is important to researchers from industry,
   academia and civil society.  While measurement can give insight into
   the functioning and usage of the Internet, it can present risks to
   user privacy.  This document describes briefly those risks and
   proposes guidelines for ensuring that internet measurements can be
   carried out safely, with examples.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-safe-internet-measurement-07"/>
      </reference>
      <reference anchor="RFC3168">
        <front>
          <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
          <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan">
            <organization/>
          </author>
          <author fullname="S. Floyd" initials="S." surname="Floyd">
            <organization/>
          </author>
          <author fullname="D. Black" initials="D." surname="Black">
            <organization/>
          </author>
          <date month="September" year="2001"/>
          <abstract>
            <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3168"/>
        <seriesInfo name="DOI" value="10.17487/RFC3168"/>
      </reference>
    </references>
    <section anchor="positionpapers">
      <name>Position Papers</name>
      <t>Interested participants were openly invited to submit position papers on the workshop topics, including Internet-Drafts, relevant academic papers, or short abstracts explaining their interest. The papers below constitute the inputs that were considered relevant for workshop attendees and that focused the discussions themselves. The program committee grouped the papers by theme as such.</t>
      <section anchor="motivations-and-principles">
        <name>Motivations and principles</name>
        <t>Richard Barnes. “What’s In It For Me? Revisiting the reasons people collaborate.” <xref target="BARNES"/></t>
        <t>Iain R. Learmonth, Gurshabad Grover, Mallory Knodel. “Guidelines for Performing Safe Measurement on the Internet.” (Additional rationale) <xref target="KNODEL"/></t>
        <t>Qin Wu, Jun Wu, Qiufang Ma. “Network Management of Encrypted Traffic: Detect it don’t decrypt it.” <xref target="WU"/></t>
      </section>
      <section anchor="classification-and-identification-of-encrypted-traffic">
        <name>Classification and identification of encrypted traffic</name>
        <t>Luca Deri. “nDPI Research Proposal.” <xref target="DERI"/></t>
        <t>Wes Hardaker. “Network Flow Management by Probability.”</t>
        <t>Xi Jiang, Shinan Liu, Saloua Naama, Francesco Bronzino, Paul Schmitt, Nick Feamster. “Towards Designing Robust and Efficient Classifiers for Encrypted Traffic in the Modern Internet.” <xref target="JIANG"/></t>
        <t>Yupeng Lei, Jun Wu, Xudong Sun, Liang Zhang, Qin Wu. “Encrypted Traffic Classification Through Deep Learning.” <xref target="LEI"/></t>
      </section>
      <section anchor="ideas-for-collaboration-and-coordination-between-devices-and-networks">
        <name>Ideas for collaboration and coordination between devices and networks</name>
        <t>Michael Collins. “Improving Network Monitoring Through Contracts.” <xref target="COLLINS"/></t>
        <t>Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish. “Zero-Knowledge Middleboxes.” <xref target="GRUBBS"/></t>
        <t>Mirja Kühlewind, Magnus Westerlund, Zaheduzzaman Sarker, Marcus Ihlar. “Relying on Relays: The future of secure communication.” <xref target="KUEHLEWIND"/></t>
        <t>Tommy Pauly, Richard Barnes. “Red Rover: A collaborative approach to content filtering.” <xref target="PAULY"/></t>
        <t>Michael Welzl. “The Sidecar: ‘Opting in’ to PEP Functions.“ <xref target="WELZL"/></t>
      </section>
      <section anchor="other-background-material">
        <name>Other background material</name>
        <t>Pedro Casas. “Monitoring User-Perceived Quality in an Encrypted Internet – AI to the Rescue.” <xref target="CASAS"/></t>
        <t>Nalini Elkins, Mike Ackermann, Mohit P. Tahiliani, Dhruv Dhody, Prof. Tommaso Pecorella. “Performance Monitoring in Encrypted Networks: PDMv2.” <xref target="ELKINS"/></t>
      </section>
    </section>
    <section anchor="participants">
      <name>Workshop participants</name>
      <t>The workshop participants were Cindy Morgan, Colin Perkins, Cullen Jennings, Deborah Brungard, Dhruv Dhody, Eric Vyncke, Georg Carle, Ivan Nardi, Jari Arkko, Jason Livingood, Jiankang Yao, Karen O'Donoghue, Keith Winstein, Lars Eggert, Laurent Vanbever, Luca Deri, Mallory Knodel, Marcus Ihlar, Matteo, Michael Ackermann, Michael Collins, Michael Richardson, Michael Welzl, Mike Ackermann, Mirja Kühlewind, Mohit P. Tahiliani, Nalini Elkins, Patrick Tarpey, Paul Grubbs, Pedro Casas, Qin Wu, Qiufang, Richard Barnes, Rob Wilton, Russ White, Saloua Naama, Shinan Liu, Srinivas C, Toerless Eckert, Tommy Pauly, Wes Hardaker, Xi Chase Jiang, Zaheduzzaman Sarker, and Zhenbin Li.</t>
    </section>
    <section anchor="program-committee">
      <name>Program Committee</name>
      <t>The workshop program committee members were Wes Hardaker (IAB, USC/ISI), Mallory Knodel (IAB, Center for Democracy and Technology), Mirja Kühlewind (IAB, Ericsson), Tommy Pauly (IAB, Apple), Russ White (IAB, Juniper), Qin Wu (IAB, Huawei).</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
