Subscribe to CIO Magazine »

IETF plays Hide-and-Go-Seek with April Fools privacy protocol

  • (Network World)
  • 03 April, 2012 08:12

IETF pranksters this weekend revealed their latest April Fools' Day requests for comments, including one that outlines use of Hide-and-Go-Seek techniques to encourage network privacy.

RFC 6593, titled "Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System (DPS)," was submitted by three co-authors from Cisco.

ARCHIVES: 2011 IETF April Fools' Day RFCs

HA HA: Google's 2012 April Fools' Day pranks

The abstract reads: "With the ubiquitous success of service discovery techniques, curious clients are faced with an increasing overload of service instances and options listed when they browse for services. A typical domain may contain web servers, remote desktop servers, printers, file servers, video content servers, automatons, Points of Presence using artificial intelligence, etc., all advertising their presence. Unsurprisingly, it is expected that some protocols and services will choose the comfort of anonymity and avoid discovery. This memo describes a new experimental protocol for this purpose utilizing the Domain Pseudonym System (DPS), and discusses strategies for its successful implementation and deployment."

As you dive deeper into the RFC, the authors weave in various Hide-and-Go-Seek references such as counting and identifying a client as being "it." Other jokey references include the Silence-as-a-Service method of keeping hidden and the various levels of finding it, ranging from "absolute zero" to "warm" to "burning-up."

As for the other April Fools' Day RFC, No. 6592, there's nothing to see here: It's about The Null Packet. Our translator explains: "a null packet does not exist (it is zero length). The RFC is written as if a zero length packet can be encrypted, transmitted, etc."

Wikipedia includes a list of the foolish RFCs, which it shows began in 1978 though have been regularly pumped out since 1998.

Bob Brown tracks network research in his Alpha Doggs blog and Facebook page, as well on Twitter and Google +.

Read more about lan and wan in Network World's LAN & WAN section.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Alpha, Cisco, etwork, Facebook, Google, IETF, LAN, Request DSL, Wikipedia
References show all
Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Latest Blog Posts
  • The Three Essential Steps to Successful Cloud Migration
    Businesses and enterprises have quickly realised the power and efficiency of cloud computing, but migrating to the cloud can be a challenging process. This guide leads you through the three key steps you should take to assess your workload, select the most appropriate cloud model and ensure your cloud provider’s migration methodology stacks up.
    Learn more »
  • Guide: 10 Essential Questions about Mobile App Containers
    Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring significant security risks. How do you navigate the challenge and emerge with both? With a comprehensive approach to security.Learn the key areas to focus on as you build a mobile app security strategy.
    Learn more »
  • Transform IT, Transform the Enterprise
    Existing IT operational models and an ageing infrastructure are CIOs back from their full potential. This paper reveals the three IT imperatives for a CIO-led transformation, and details how CIOs are adopting strategies to change IT and assert their organisations as business leaders and innovators.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments