The Internet Engineering Task Force (IETF) is holding a hackathon to encourage developers and subject matter experts to discuss, collaborate, and develop utilities, ideas, sample code, and solutions that show practical implementations of IETF standards.
Sign up for the Hackathon
View the list of registered:
Keep up to date by subscribing to the IETF Hackathon email list.
The IETF Hackathon is free to attend and is open to everyone. It is a collaborative event, not a competition. Any competition is friendly and in the spirit of advancing the pace and relevance of new and evolving internet standards.
Subject to Change
Hackathon (all times are GMT+7)
Related activities before and after the Hackathon weekend
NOTE: You will need an IETF Datatracker account to login to the Hackathon Meetecho sessions.
When you register for the IETF Hackathon, you are sent a separate email to create an IETF Datatracker account if you don't already have one.
If you already have an IETF Datatracker account, please ensure that the email address with which you registered is associated with your Datatracker account.
If you received the email but the link to create an account has expired, please see the instructions below:
Access to the IETF network
The NOC team has an ongoing experiment that allows you to join the IETF network remotely as well as at an IETF meeting venue.
Requests for networking capabilities beyond wireless access to the IETF network (e.g., wired ports, L2 access, prefix delegation) can be sent to support@ietf.org.
All requests are addressed on a best effort basis. Advance notice is appreciated and improves the odds of your request being fulfilled.
Champions can request a Webex account they can use to schedule meetings for their team. These are similar to the Webex accounts allocated to working group chairs to be used for virtual interim meetings. An account can be requested by a team champion at any time. Accounts will remain active and available for the duration of the IETF meeting. Request your account HERE. In the request form, you can use your project name where it asks for "Working Group Name" ("Hackathon Project Name").
In addition to registering for the Hackathon and subscribing to the Hackathon list. It is recommended to monitor both the Hackathon wiki and the list as the Hackathon approaches, determine which project(s) are of interest to you, and reach out to the champions of those projects to determine how best to be involved and coordinate with the rest of the team working on each project.
Champions are welcome and encouraged to list times and mechanisms for collaborating with their team in the Team Schedule. Participants can use this page to determine how and when to reach other team members.
The Hackathon kickoff and the project results presentations can be joined via Meetecho. The Hackathon Zulip stream may be used for general and project specific communication.
All Hackathon participants are free to work on any code. The rules regarding that code are what each open source project and each participant's organization says they are. The code itself is not an IETF Contribution. However, discussions, presentations, demos, etc., during the Hackathon are IETF Contributions (similar to Contributions made in working group meetings). Thus, the usual IETF policies apply to these Contributions, including copyright, license, and IPR disclosure rules.
Champions
Project Info
Related documents
IPv6 Performance and Diagnostic Metrics (PDM) Destination Option, https://datatracker.ietf.org/doc/rfc8250
Champions
Project Info
Background on Attestation
Background on Attested TLS
Champion(s)
Thomas Graf (thomas.graf @ swisscom.com)
Yannick Buchs (yannick.buchs @ swisscom.com)
Daniel Voyer (danvoyerwork @ gmail.com)
Holger Keller (holger.keller @ telekom.de)
Rob Wilton (rwilton @ cisco.com)
Benoit Claise (benoit.claise@huawei.com)
Qiufang Ma (maqiufang1 @ huawei.com)
Jérémie Leska (jeremie.leska @ 6wind.com)
Samuel Gauthier (samuel.gauthier @ 6wind.com)
Draft Specifications
https://datatracker.ietf.org/doc/html/rfc8639
https://datatracker.ietf.org/doc/html/rfc8641
https://datatracker.ietf.org/doc/html/rfc9196
https://datatracker.ietf.org/doc/html/draft-netana-netconf-notif-envelope
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-yang-notifications-versioning
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-udp-notif
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-distributed-notif
https://datatracker.ietf.org/doc/html/draft-netana-netconf-yp-transport-capabilities
Project Info
Validates and verify 3 YANG-Push vendor implementations in the area of:
Subscription automation
Discover YANG-Push systems and notifications capabilities and configure periodical and on-change subscriptions with netconf.
Notification integration
Validate subscription state change and push-update and push-change-update notifications for draft-ietf-nmop-yang-message-broker-integration integration.
Configured subscription transport integration
Validate draft-ietf-netconf-udp-notif and draft-ietf-netconf-distributed-notif packet format on the wire.
Repository
https://github.com/network-analytics/ietf-network-analytics-document-status/tree/main/122/Hackathon
Champions
Jaykishan Mutkawoa jay@cyberstorm.mu
Kavish Nadan kn@cyberstorm.mu
Loganaden Velvindron logan@cyberstorm.mu
Poshan Peeroo
Atish Jootun
Project Info
Nmap & wireshark pending PRs for PQC.
zmap pending PRs for PQC.
GnuTLS pending PRs.
Champion(s)
John Gray (john.gray@entrust.com)
Mike Ounsworth (mike.ounsworth@entrust.com)
Massimiliano Pala (massimiliano.pala@wellsfargo.com)
Julien Prat (julien.prat@cryptonext-security.com)
Draft Specifications
https://datatracker.ietf.org/doc/draft-ietf-lamps-dilithium-certificates/
https://datatracker.ietf.org/doc/draft-ietf-lamps-kyber-certificates/
https://datatracker.ietf.org/doc/draft-ietf-lamps-pq-composite-sigs/
https://datatracker.ietf.org/doc/draft-ietf-lamps-pq-composite-kem/
https://datatracker.ietf.org/doc/rfc9629/
https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc4210bis/
https://datatracker.ietf.org/doc/draft-ietf-lamps-cert-binding-for-multi-auth/01/
https://www.ietf.org/id/draft-lamps-okubo-certdiscovery-00.html
https://datatracker.ietf.org/doc/draft-bonnell-lamps-chameleon-certs/
https://datatracker.ietf.org/doc/draft-gazdag-x509-hash-sigs/
Project Info
Test interoperability of Post Quantum algorithms in x.509 structures (Certificates, keys, CMS and other drafts). This project started in November 2022 and continues to evolve. We currently have some github automated actions to automaticlaly test submitted artifacts allowing implementations to get immedidate feedback on their compatibility. This allows us to test interoperability between different algorithm implementations, gain experience using these new algorithms, and provide feedback to the standards groups about practical usage.
A good starting place is our Github repository: https://github.com/IETF-Hackathon/pqc-certificates
For information on OIDs used to create interoperable structures, consult: https://github.com/IETF-Hackathon/pqc-certificates/blob/master/docs/oid_mapping.md
At IETF 122, we plan to add more automation, add interoperability testing for the private key formats (like ML-DSA and ML-KEM), and continue to update our implementations to support the FIPS 203, 204 and 205 algorithm standards. We are also looking for implementations of Composite Signatures, Composite KEM and other PQ transition mechanisms that are being standardized.
There is also interest in setup and testing the use of hybrid certificates for the TLSv1.3 protocol. The goal of the experiment is to explore different options for efficient use of hybrid certificates' and their multiple signature keys in the TLS protocol. We are looking for collaborations and ideas that can be then brought forward within the IETF and other standardization bodies (e.g., X9, ISO, etc.).
Champions
Project Info
Champions
Project Info
The Internet faces significant challenges related to legitimate MOAS (Multiple-Origin Autonomous System) conflicts and route origin hijacking, which often exhibit similar patterns. VRO addresses these issues through a decentralized cooperative system among ASes (Autonomous Systems) to enhance routing security.
Related documents
Champion(s)
Diego Lopez, diego.r.lopez@telefonica.com
Ignacio Dominguez, ignacio.dominguezmartinez@telefonica.com
Reference Specification
https://datatracker.ietf.org/doc/draft-lopez-opsawg-yang-provenance/
Project Info
The YANG provenance development team is working on a set of microservice to demonstrate the proposal and explore its integration with otrher YANG solutions.
These microservices provide interfaces for the generation and verification of provenance signatures using XML and JSON serialization in the four enclosing methods described in the reference draft:
Provenance leaf in a YANG element
Provenance signature in NETCONF event notifications and YANG-Push notifications
Provenance as metadata in YANG instance data
Provenance in YANG Annotations
Champions
Project Info
This project’s approach to realizing this analyzes requirements for ensuring and monitoring the security status of the network used under complex network environments such as hybrid cloud or mixed cloud settings.
Related documents
Champions
Project Info
Specifications
Hackathon Plan
Related Groups
Champions
Maarten Wullink maarten.wullink@sidn.nl
Pawel Kowalik pawel.kowalik@denic.de
Project Info
The newly formed RPP working group is focused on designing a new protocol via a series of specifications known collectively as the RESTful Provisioning Protocol (RPP).
Hackathon Plan
Discuss/Develop/Validate proposals for protocol architecture
Develop running code for:
Other interesting ideas
Related documents
Champions
David Plonka dave@plonka.us (MAPRG co-chair, WiscNet's Principal Research Scientist)
Project Info
The Measurement & Analysis for Protocols Research Group (MAPRG) and WiscNet (AS2381) will provide an open testing environment for participants to determine how well equipment and applications work in a variety of IPv6 network environments.
To accomplish this, we will provide access to the IPv6 Test Pod (https://ipv6-pod.info/): a wireless and wired access point specially configured for testing IPv6 compatibility and graciously provided by Internet2 and the ARIN Community Grant program.
The IPv6 Test Pod provides a variety of IPv6 test networks via Wifi SSIDs and optionally over Wired Ethernet connections. All you have to do is provide a wired internet connection to the WAN interface (IPv4-only is OK), power, and it will provide a series of networks to test devices and software with:
- Dual-Stack (IPv4 and IPv6)
- IPv6-only
- IPv6 only with NAT64+DNS64
- IPv6-only with NAT64+PREF64
- IPv6 only with NAT64+DNS64+PREF64
In addition to employing the IPv6 Test Pod, we'll do complementary testing with IPvFoo browser extension, the IETF network, etc.
Open Call for Participants
Anyone can drop by for ad hoc IPv6-compatibility testing of your wireless or wired user equipment, e.g., smartphone, or application(s) of interest, web-based or otherwise.
Please join the project, and stay a while, if you are an IPv6 or transition mechanism aficionado, or simply want to learn more about using IPv6 in a live environment. We could use help with testing and identifying the root causes of problems found.
Background:
Champions
Project Info
WG: vCon
I-D: vCon container
Repos:
py_vcon_server - vCon integration and AI enabled workflow server
One of the primary goals of vCon is to ease and standardize the integration and data transfer of conversational data between enterprise or contact center:
Communications systems (email, sms, web chate, voice and video calls)
Data consumer or customer data platform
AI, ML and algorithmic analysis services, model training and testing
CRM systems
Hackathon Objective
The goal for this hackathon is to implement and test portions of the vCon I-D that have not been well tested. The group and appended features of vCon have not been fully implemented or tested. The redacted feature has been implemented and tested mainly with text transcriptions. Further exploration of redacted audio and video dialogs had not been well tested.
Hackathon Work Items
Champions
Project Info
The Internet Control Message Protocol (ICMP) plays a crucial role in network diagnostics and error reporting. However, verifying the legitimacy of a received ICMP error message can be challenging, especially when the ICMP error message is embedded with stateless protocol data. In this project, we will demonstrate attacks constructed by exploiting ICMP vulnerabilities and a defense mechanism based on a challenge-confirm mechanism.
Related documents
Champions
Project Info
The proposed HSYNC DNS record allows zone owners to specify exactly what services they intend different DNS providers to provide and how to collaborate. The HSYNC RRset specifies the identity of all designated DNS providers, allowing them to identify and locate each other and establish secure communication. This allows automated collaboration to solve a number of provisioning issues like how to manage the DNSKEY RRset (when there are multiple signers), how to manage the NS RRset (when there are multiple authoritative DNS providers), how to deal with on-boarding and off-boarding of DNS providers and also who is responsible for interaction with the parent (for synchronization of delegation information).
The experimental name server TDNS has support for HSYNC and the identification and location of remote DNS providers (or
rather, their agents). The next steps are to implement support for initial processes:
Specifications
Repo and Docs
Champion
Stuart Cheshire <cheshire@apple.com>
Thread Overview
Thread is a specification for how to carry IPv6 datagrams over a mesh of low-power IEEE 802.15.4 wireless links. Stuart Cheshire gave a brief presentation about Thread at the IETF 119 IAB Open meeting in Brisbane. The Thread specification is developed and published by the Thread Group. There are several independent implementations of Thread, the main one being the OpenThread open source project.
For this Hackathon event, the goal is to introduce people to Thread and OpenThread programming. This Hackathon event is open to all — Thread Group membership is not required, though of course Thread Group members are also welcome to participate. If you plan to participate in the Thread work at the Hackathon (on-site or remotely), please add your name to the participant list. If you already have a Thread developer board and the OpenThread build environment on your laptop, please bring that. If not, we will have a few extra Thread developer boards available and we can help you get the build environment set up. For people totally new to Thread development, we have some recommendations from Allie Clifford and Ann Olivo.
We have a list of some project ideas. Other ideas are welcome and encouraged. Please feel free to add suggestions to the project list.
Participants and Project Info
Champions
Magnus Westerlund (magnus.westerlund@ericsson.com)
Project Info
Interop testing of Multipath QUIC implementations - see https://github.com/quicwg/multipath/wiki/Implementation-Draft-Interop
Champions
Martine Lenders (martine.lenders@tu-dresden.de)
Project Info
Students from TU Dresden provided implementations of DNS over CoAP (DoC) for various DNS implementations:
I would like to work with contributors from these projects to get them integrated. For digdoc
, the goal is to provide a package for the most common Linux distributions, e.g., Debian.
Specifications:
https://datatracker.ietf.org/doc/draft-ietf-core-dns-over-coap/13/
Repositories:
https://github.com/powerbuilder1/unbound/tree/vm_ubuntu_version
https://github.com/dig-doc/knot
https://github.com/dig-doc/digdoc
Champions
Joe Harvey (jsharvey@verisign.com)
Swapneel Sheth (ssheth@verisign.com
Project Info
Previous IETF Hackathons have demonstrated how MTL mode works including how to apply it to DNSSEC. With the release of our patch for LDNS (Library for DNS open-source from NLNet Labs) to allow for key generation, signing, and verifiying with MTL mode and PQC algorithms, we would like to now collect some metrics that focus on the general operation of PQC DNSSEC and the operational considerations of MTL mode on zone signing and query/responses. We would also like to collect further feedback from the resolver community and setup for additional proof-of-concept implementations in other code bases to further evaluate interoperability and to confirm our collected metrics. To help run some measurement tests, we have hosted an authoritative server with a sample zone signed with MTL Mode at mtlauthoritative.verisignlabs.com and a test script.
Specifications
[1] https://datatracker.ietf.org/doc/draft-harvey-cfrg-mtl-mode/
[2] https://datatracker.ietf.org/doc/draft-harvey-cfrg-mtl-mode-considerations/
[3] https://datatracker.ietf.org/doc/draft-fregly-dnsop-slh-dsa-mtl-dnssec/
Repositories
[1] https://github.com/verisign/MTL
[2] https://github.com/verisign/mtl-mode-ldns
[3] https://github.com/verisign/mtl-mode-unbound
Champions
Feng Hao (feng.hao@warwick.ac.uk)
Basil Thomas (BThomas@squire-technologies.com)
Steve Smith (stevesmith@truecall.co.uk)
Muhammad Ajmal Azad (Muhammadajmal.azad@bcu.ac.uk)
Project Info
Evaluating the feasibility of deploying Caller ID Verification (CIV) as part of the SIP servers in the Telecom cloud to prevent number spoofing attacks.
Related document
[1] https://www.ietf.org/archive/id/draft-hao-civ-00.html
Champions
Project Info
We aim to perform the first interop of something long wished-for: a mechanism for DNS clients to query for multiple RR types for the same name in a single message (since using question count > 1 never worked well and is now forbidden). Want to get A, AAAA, and HTTPS records with a single query? SRV and TXT? Everything email system related at once? Come join us!
Related document
[1] https://datatracker.ietf.org/doc/draft-ietf-dnssd-multi-qtypes/
Champions
Project Info
Specifications
Champions
Project Info
Specifications
Champions
Project Info
Our goal is to evaluate the throughput performance of JSON, XML, and CBOR encoding formats in the context of HTTPS-based YANG notifications, as specified in the https-notif-draft.
Related Document
Don’t see anything that interests you? Feel free to add a project to the list, sign up as its champion, and show up to work on it. Note: you must login to the wiki to add content. If you add a new project, we suggest you send an email to (hackathon@ietf.org) to let others know. You may generate interest in your project and find other people who want to contribute to it.
TEMPLATE: Copy/paste and update the following template to add your project to the list:
### Your Project
- **Champions**
name and email
- **Project Info**
project description
To edit the wiki, log in using your IETF Datatracker login credentials. If you don't yet have an IETF Datatracker account, you may get one by going here and requesting a new account.