IETF plays Hide-and-Go-Seek with April Fools privacy protocol
- 03 April, 2012 08:12
IETF pranksters this weekend revealed their latest April Fools' Day requests for comments, including one that outlines use of Hide-and-Go-Seek techniques to encourage network privacy.
RFC 6593, titled "Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System (DPS)," was submitted by three co-authors from Cisco.
ARCHIVES: 2011 IETF April Fools' Day RFCs
The abstract reads: "With the ubiquitous success of service discovery techniques, curious clients are faced with an increasing overload of service instances and options listed when they browse for services. A typical domain may contain web servers, remote desktop servers, printers, file servers, video content servers, automatons, Points of Presence using artificial intelligence, etc., all advertising their presence. Unsurprisingly, it is expected that some protocols and services will choose the comfort of anonymity and avoid discovery. This memo describes a new experimental protocol for this purpose utilizing the Domain Pseudonym System (DPS), and discusses strategies for its successful implementation and deployment."
As you dive deeper into the RFC, the authors weave in various Hide-and-Go-Seek references such as counting and identifying a client as being "it." Other jokey references include the Silence-as-a-Service method of keeping hidden and the various levels of finding it, ranging from "absolute zero" to "warm" to "burning-up."
As for the other April Fools' Day RFC, No. 6592, there's nothing to see here: It's about The Null Packet. Our translator explains: "a null packet does not exist (it is zero length). The RFC is written as if a zero length packet can be encrypted, transmitted, etc."
Wikipedia includes a list of the foolish RFCs, which it shows began in 1978 though have been regularly pumped out since 1998.
Read more about lan and wan in Network World's LAN & WAN section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- RFC 6593 - Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System (DPS)
- Cisco Subnet: An independent Cisco community
- IETF's April Fools' gags geekier than ever in 2011
- Google’s 2012 April Fools’ Day Pranks
- RFC 6592 - The Null Packet
- April Fools' Day Request for Comments - Wikipedia, the free encyclopedia
- Alpha Doggs
- Incompatible Browser : Facebook
- Bob Brown - Google+
- LAN & WAN Research Center - Network World
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
The SPARC Difference - Reduce Risks, Cut Costs, Power Innovation
Despite current economic factors, IT investment continues to be fueled by the need for better and more agile IT capabilities to support an enterprise’s business strategy, as well as to keep up with the rapidly changing demands of the ‘always-on’ user. However, budgets are squeezed and executives are under pressure to reduce capital expenditure and streamline administrative costs. A key strategy is to consolidate and refresh existing IT infrastructures. Download now to find out what technology can add value and enable you to change the shape of your IT budget and, to transform IT into a force for change and innovation.
Securing the Promise of Virtualisation
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the more recent set of risks that are associated with newly formed hybrid environments. Read more to find out how to keep pace with evolving threats, quicker provisioning and dynamically mobile workloads.
Hybrid IT Service Management: A Requirement for Virtualisation and Cloud Computing
When competition is tough and resources are limited, corporate leaders are depending on growing their existing capabilities in order to grow their business. Information technology can be a unique catalyst for business growth, delivering a competitive advantage when creatively applied to established and emerging problems. Read more on what trends are accelerating the value of IT.