2025-05-28 TAC Minutes
Attendees & Representation
TAC Members and Project representatives should mark their attendance below
Member Representatives
Representing | Member |
---|---|
China Mobile | vacant |
China Telecom | vacant |
Cisco | @Frank Brockners |
Deutsche Telekom | @Marc Fiedler |
Ericsson | @Christian Olrog |
Huawei | @Huijun Yu |
Infosys | @Girish Kumar |
Nokia | @Olaf Renner |
Red Hat | @Dave Tucker |
Tech Mahindra | vacant |
TELUS | @Sana Tariq |
Verizon | vacant |
Walmart | @Santhosh Fernandes |
LF Staff & Community
@Casey Cain @LJ Illuzzi @Ranny Haiby
@Richard Lopez
Community Representatives
Community | Representative | Lifecycle |
---|---|---|
ONAP | @N.K. Shankaranarayanan | Graduated |
OpenDaylight | @Robert Varga | Graduated |
Anuket | @Beth Cohen | Graduated |
Essedum | @Praveen Kumar Kalapatapu | Incubation |
FD.io | @Dave Wallace | Graduated |
Nephio | @Timo Perala | Graduated |
L3AF | @Santhosh Fernandes | Incubation |
5G SBP | vacant | Incubation |
CNTi | @Olivier Smith | sandbox |
Paraglider | vacant | sandbox |
Elected Representatives
Chairperson | @Olaf Renner |
---|---|
Vice-Chair | @Muddasar Ahmed |
Security | @Amy Zwarico |
AI | @Fatih Nar |
Committer Representative | @Shankar Malik |
Agenda
The project's Antitrust Policy is linked from the LF and project websites. The policy is important when multiple companies, including potential industry competitors, are participating in meetings. Please review it, and if you have any questions, please contact your company's legal counsel. Members of the LF may contact Andrew Updegrove at the firm Gesmer Updegrove LLP, which provides legal counsel to the LF.
Action Item Review (Backlog)
Network observability and security workgroup launch - @Ranny Haiby
https://lf-networking.atlassian.net/wiki/x/JwD5H - What do we want to do
Sign up to participate - Network Observability Workgroup | Workgroup members (Please sign up by adding your name)
TAC Meeting Improvements / Evolution
Post Quantum follow-up - refer to post quantum wiki pages
Should PQ hardening be part of the LFN project lifecycle requirements?
Vulnerability reporting - do we need an LFN-wide process? - @Casey Cain
Minutes
Network Observability & Security Workgroup - @Ranny Haiby
The mission of the workgroup is to advance use of open source technology for building observable and secure networks. It will create and disseminate clear, actionable blueprints and insightful white papers focused on network observability using the Linux Foundation Networking (LFN) and adjacent project ecosystems
Ranny is not sure how long the Workgroup will last, but encourages participation
Deliverables: White paper and potentially a 5G Super Blueprint
Focus: Concrete technical documentation rather than brainstorming sessions
Goal: Educate industry about open source project capabilities and drive project adoption
Fatih Nar suggested keeping scope focused on "network observability" rather than bundling with security:
Observability data can feed into security, AI Ops, lifecycle management
Avoids confusion with existing security working groups
Enables best practices for network-centric applications and infrastructure
Muddasar Ahmed emphasized starting with existing project capabilities rather than high-level requirements.
Frank Brockners raised concerns about achieving critical mass for participation, referencing challenges with previous working groups like the AI working group.
Action Items
TAC Meeting Improvements / Evolution
@Casey Cain introduced the topic and ask the community for feedback on improving the TAC Meeting
Muddasar Ahmed:
Prioritize binary decision items first in agenda
Separate discussion/brainstorming topics to allow partial attendance
Frank Brockners identified original TAC purposes:
Cross-project collaboration forum
Ensure projects have necessary resources with minimal process overhead
Technical perspective complement to board's financial/operational support
Praveen Kumar Kalapatapu suggested developing thematic views (e.g., autonomous networks) to identify:
Current project capabilities
Missing functionalities
Potential feature gaps
Challenges Identified
Inter-project collaboration hasn't materialized effectively in this forum
Need clearer value proposition for project attendance
Balance between project independence and common strategy
Action Items
Post Quantum Follow up
@Muddasar Ahmed
Current Status
Investigated tooling for crypto inventory across repositories
Identified two tool options:
Expensive option: $100-130K
Alternative option: $30-40K annually
Traditional software scanning tools (Nexus) don't provide crypto inventory
Key Drivers
January 1, 2027: US Government will not acquire non-quantum-safe capabilities
Expected ripple effect to companies and allied countries
18-month planning window critical for software vendors
Project Perspectives
@Robert Varga (OpenDaylight) noted:
Clear understanding of crypto usage locations
Challenge of maintaining compatibility with 5-year-old network elements
Already tracking upstream library updates
Java 24 post-quantum capabilities will be adopted in upcoming releases
Configuration flexibility needed for deployed field compatibility
Addtional Discussion
@Ranny Haiby emphasized need for project-driven motivation
Projects must commit resources and developers for execution
@Muddasar Ahmed clarified this is for planning purposes, not forced timelines
@Robert Varga confirmed active tracking of latest crypto libraries
Action Items
Vulnerability Reporting
@Casey Cain asked if there should be a central LFN vulnerability reporting.
@Muddasar Ahmed suggested that this is already baked into the quality & security goals that the community has been working on.
JIRA support desk (support.linuxfoundation.org) for broader vulnerability reporting
Status page: status.linuxfoundation.org for outage updates
Priority-based request handling
Discussion Focus
@Olaf Renner highlighted need for:
Cross-project notification during infrastructure attacks (e.g., GitLab denial of service)
Better information distribution during security incidents
Improved mitigation plan communication
Proposed Solutions
@Muddasar Ahmed recommended focusing on OpenSSF Gold/Silver badging at TAC level
Granular vulnerability reporting should remain with individual projects
Quality dashboards to identify projects needing support
Future Tooling
@Casey Cain mentioned IT team investigation of DataDog for:
Better change management for GitHub projects
Enhanced repository permissions management
Improved code submission rules
Upcoming TAC presentation planned