[6tisch-security] beacon discussion based on confusion between w/HART and 802.15.4e-2012? (Re: agenda for 2014-05-27 6tisch security call)

Rene Struik <rstruik.ext@gmail.com> Thu, 29 May 2014 01:39 UTC

Return-Path: <rstruik.ext@gmail.com>
X-Original-To: 6tisch-security@ietfa.amsl.com
Delivered-To: 6tisch-security@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31CAE1A081E for <6tisch-security@ietfa.amsl.com>; Wed, 28 May 2014 18:39:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.591
X-Spam-Level:
X-Spam-Status: No, score=0.591 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, J_CHICKENPOX_28=0.6, SPF_PASS=-0.001, WEIRD_PORT=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a4CmKk2a11n6 for <6tisch-security@ietfa.amsl.com>; Wed, 28 May 2014 18:39:54 -0700 (PDT)
Received: from mail-ig0-x22e.google.com (mail-ig0-x22e.google.com [IPv6:2607:f8b0:4001:c05::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C00891A6F32 for <6tisch-security@ietf.org>; Wed, 28 May 2014 18:39:53 -0700 (PDT)
Received: by mail-ig0-f174.google.com with SMTP id h3so3231120igd.7 for <6tisch-security@ietf.org>; Wed, 28 May 2014 18:39:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type; bh=X0VF/xCbzDiwUPehX3tq3xC6oVV7wyFj1azHupOqqAI=; b=uyoV2t+GwKB0eStM0OSqk/AW/kgAqXRAmBdRBh8KjK6Srwm7UN/7ETLON9PC7x0nkt PdeeGZ4NC2cJXwCRCfPnV59mzTgl3mq/uBVdiv21ZyzxJLXfBmVxs1nAcJaOhdSIwg1k 1qM8dMpf0+KJk9LIGDf44NBR7Tw0w/UiU4aRs3SY63Ama6dGzpwvzfPz5CUKw4YIKNiG MdtlNYxY+nhYmAkR+ZyFNNTe3FvgG0441+HlJXYR4XzUe/Fafnz44FX2eqpg6c+2eBdw 8wVKoEZPQKIY2MUo9CpjJMdYrKTewA/FHlpiLHy/96AOdV9Hh2/WL/fc9ho9HDbumust ONzQ==
X-Received: by 10.50.128.162 with SMTP id np2mr49119607igb.22.1401327589773; Wed, 28 May 2014 18:39:49 -0700 (PDT)
Received: from [192.168.1.105] (CPE0013100e2c51-CM001cea35caa6.cpe.net.cable.rogers.com. [99.231.3.110]) by mx.google.com with ESMTPSA id ie20sm20107965igb.10.2014.05.28.18.39.47 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 28 May 2014 18:39:49 -0700 (PDT)
Message-ID: <53868FE0.1020602@gmail.com>
Date: Wed, 28 May 2014 21:39:44 -0400
From: Rene Struik <rstruik.ext@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
To: yoshihiro.ohba@toshiba.co.jp, jsimon@linear.com
References: <E045AECD98228444A58C61C200AE1BD8416F3AF4@xmb-rcd-x01.cisco.com> <531DD632.2060009@cox.net> <531DDB20.5050600@gmail.com> <10925.1394631496@sandelman.ca> <532069C8.2050005@gmail.com> <23590.1394999032@sandelman.ca> <18106.1395625035@sandelman.ca> <19609.1396839403@sandelman.ca> <11557.1397444260@sandelman.ca> <28192.1398644294@sandelman.ca> <29064.1399255587@sandelman.ca> <19475.1400588783@sandelman.ca> <4903.1401158997@sandelman.ca> <53840205.2070103@gmail.com> <CAJeFcoS3PNFX2obx3uNDJDtH=QvNLmaPhw2R468sNaeqpo8QBQ@mail.gmail.com> <674F70E5F2BE564CB06B6901FD3DD78B2723B576@TGXML210.toshiba.local> <CAJeFcoQBp1A7pwZHWoesvrjSySW0UZ0k11-s3-MFAozSuR0Yrw@mail.gmail.com> <674F70E5F2BE564CB06B6901FD3DD78B2723B85A@TGXML210.toshiba.local> <1315B075-A0A5-4008-8CC9-4918F54CBED1@linear.com> <674F70E5F2BE564CB06B6901FD3DD78B2723BA32@TGXML210.toshiba.local> <B9D502BD-C500-41E0-BA31-5BCD72090432@linear.com> <674F70E5F2BE564CB06B6901FD3DD78B2723BA70@TGXML210.toshiba.local>
In-Reply-To: <674F70E5F2BE564CB06B6901FD3DD78B2723BA70@TGXML210.toshiba.local>
Content-Type: multipart/alternative; boundary="------------070609060701030807080703"
Archived-At: http://mailarchive.ietf.org/arch/msg/6tisch-security/ZnMz2GOFFvR8FkM3OhDeLtef6Jo
Cc: mcr+ietf@sandelman.ca, 6tisch-security@ietf.org
Subject: [6tisch-security] beacon discussion based on confusion between w/HART and 802.15.4e-2012? (Re: agenda for 2014-05-27 6tisch security call)
X-BeenThere: 6tisch-security@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Extended Design Team for 6TiSCH security architecture <6tisch-security.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tisch-security/>
List-Post: <mailto:6tisch-security@ietf.org>
List-Help: <mailto:6tisch-security-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 May 2014 01:39:58 -0000

Dear colleagues:

I may have missed something here, but this email thread seems to confuse 
what w/HART provides with what 6TiSCH could specify. Since 6TiSCH is to 
be defined on top of 802.15.4e-2012, it can secure frame types using 
policy-defined combinations of encryption and authenticity (including 
authentication-only). In particular, a newbee device, just out of the 
wrapping paper and with no network-specific keying material yet, may 
still be able to see most of an authenticated, but not secured frame, 
even if it cannot check authenticity.

So, no need to kill off functionality, come up with nested security 
constructs, two beacon types, etc; one should simply look at the correct 
standard one builds on {caveat: this assessment is modulo some errors in 
the 802.15.4e-2012 spec.}

BTW - As an interesting aside, this seems to illustrate that looking at 
specific details *does* matter...

Best regards, Rene


On 5/28/2014 7:43 PM, yoshihiro.ohba@toshiba.co.jp wrote:
>
> Yes.
>
> Yoshihiro Ohba
>
> *From:*Jonathan Simon [mailto:jsimon@linear.com]
> *Sent:* Thursday, May 29, 2014 8:42 AM
> *To:* ohba yoshihiro(大場義洋○RDC□NSL)
> *Cc:* mcr+ietf@sandelman.ca; rstruik.ext@gmail.com; 
> 6tisch-security@ietf.org
> *Subject:* Re: [6tisch-security] agenda for 2014-05-27 6tisch security 
> call
>
> Then as long as either
>
> a) Beacons are only used for advertising a network to unsychronized 
> devices, or
>
> b) Devices only take timing information (time of arrival) from beacons 
> coming from time parents and authenticated with the run-time key
>
> you are good.
>
> -- 
> Jonathan Simon, Ph. D
> Director of Systems Engineering
> Linear Technology, Dust Networks product group
> 30695 Huntwood Ave
> Hayward, CA 94544-7021
> (510) 400-2936
> (510) 489-3799 FAX
> jsimon@linear.com <mailto:jsimon@linear.com>
>
> **LINEAR TECHNOLOGY CORPORATION**
> *****Internet Email Confidentiality Notice*****
>  This e-mail transmission, and any documents, files or previous 
> e-mail messages attached to it may contain confidential information 
> that is legally privileged. If you are not the intended recipient, or 
> a person responsible for delivering it to the intended recipient, you 
> are hereby notified that any disclosure, copying, distribution or use 
> of any of the information contained in or attached to this 
> transmission is STRICTLY PROHIBITED. If you have received 
> this transmission in error, please immediately notify me by reply 
> e-mail, or by telephone at (510) 400-2936, and destroy the 
> original transmission and its attachments without reading or saving in 
> any manner. Thank you.
>
> On May 28, 2014, at 4:19 PM, <yoshihiro.ohba@toshiba.co.jp 
> <mailto:yoshihiro.ohba@toshiba.co.jp>> <yoshihiro.ohba@toshiba.co.jp 
> <mailto:yoshihiro.ohba@toshiba.co.jp>> wrote:
>
>
>
>     Hi Jonathan,
>
>     I am not caring about an attacker to inject joining traffic, but
>     what I care is an attacker attempting to destruct basic TSCH
>     operation in the network by sending forged beacons protected with
>     the well-known key.
>
>     Yoshihiro Ohba
>
>     *From:*6tisch-security
>     [mailto:6tisch-security-bounces@ietf.org]*On Behalf Of*Jonathan Simon
>     *Sent:*Thursday, May 29, 2014 12:47 AM
>     *To:*ohba yoshihiro(大場義洋○RDC□NSL)
>     *Cc:*mcr+ietf@sandelman.ca
>     <mailto:mcr+ietf@sandelman.ca>;rstruik.ext@gmail.com
>     <mailto:rstruik.ext@gmail.com>;6tisch-security@ietf.org
>     <mailto:6tisch-security@ietf.org>
>     *Subject:*Re: [6tisch-security] agenda for 2014-05-27 6tisch
>     security call
>
>     Yoshihiro -
>
>     I don’t think this is a problem.  Nodes that are in the network
>     reject incoming frames secured with the well-known key. The
>     well-known key is only used to authenticate beacons, and
>     authenticate join requests (which don’t carry synchronization
>     information).  There is a DoS vector, in that an attacker can
>     inject joining traffic (destined for the network mananager) that
>     will ultimately be discarded, possibly preventing other nodes from
>     joining, and increasing the traffic in the network.
>
>     Jonathan Simon, Ph. D
>     Director of Systems Engineering
>     Linear Technology, Dust Networks product group
>     30695 Huntwood Ave
>     Hayward, CA 94544-7021
>     (510) 400-2936
>     (510) 489-3799 FAX
>     jsimon@linear.com <mailto:jsimon@linear.com>
>
>     **LINEAR TECHNOLOGY CORPORATION**
>     *****Internet Email Confidentiality Notice*****
>      This e-mail transmission, and any documents, files or previous
>     e-mail messages attached to it may contain confidential
>     information that is legally privileged. If you are not
>     the intended recipient, or a person responsible for delivering it
>     to the intended recipient, you are hereby notified that any
>     disclosure, copying, distribution or use of any of the information
>     contained in or attached to this transmission is
>     STRICTLY PROHIBITED. If you have received this transmission in
>     error, please immediately notify me by reply e-mail, or by
>     telephone at (510) 400-2936, and destroy the original transmission
>     and its attachments without reading or saving in any manner. Thank
>     you.
>
>     On May 28, 2014, at 8:01 AM, <yoshihiro.ohba@toshiba.co.jp
>     <mailto:yoshihiro.ohba@toshiba.co.jp>>
>     <yoshihiro.ohba@toshiba.co.jp
>     <mailto:yoshihiro.ohba@toshiba.co.jp>> wrote:
>
>
>
>
>         Hi Jonathan,
>
>         Thank you for your answer.
>
>         I think this can be an issue if already joined nodes also use
>         the beacons protected with the well-known key for maintaining
>         synchronization and slot allocations, as an attacker can send
>         forged beacons protected with the well-known key.
>
>         Yoshihiro Ohba
>
>         *From:*6tisch-security
>         [mailto:6tisch-security-bounces@ietf.org]*On Behalf
>         Of*Jonathan Simon
>         *Sent:*Wednesday, May 28, 2014 11:49 PM
>         *To:*ohba yoshihiro(大場義洋○RDC□NSL)
>         *Cc:*Michael Richardson; Rene Struik;6tisch-security@ietf.org
>         <mailto:6tisch-security@ietf.org>
>         *Subject:*Re: [6tisch-security] agenda for 2014-05-27 6tisch
>         security call
>
>         Yoshihiro -
>
>         Q.In w/HART, are all beacon frames authenticated with a
>         well-known key even after a joining node obtained the runtime
>         link layer key?
>
>         A. Yes. In WirelessHART the beacons (called "advertisements"
>         but they serve the same purpose and have similar content) are
>         intended for devices not yet in the network, so they always
>         use the well-known key.  To discover other nodes within the
>         network, they use frames secured with the runtime link-layer key.
>
>         Jonathan
>
>         On Tue, May 27, 2014 at 11:18 PM,
>         <yoshihiro.ohba@toshiba.co.jp
>         <mailto:yoshihiro.ohba@toshiba.co.jp>> wrote:
>
>             Hi Jonathan,
>
>             Thank you for sending the summary of w/HART joining.
>
>             I have question.
>
>             In w/HART, are all beacon frames authenticated with a
>             well-known key even after a joining node obtained the
>             runtime link layer key?
>
>             Regards,
>
>             Yoshihiro Ohba
>
>             *From:*6tisch-security
>             [mailto:6tisch-security-bounces@ietf.org
>             <mailto:6tisch-security-bounces@ietf.org>]*On Behalf
>             Of*Jonathan Simon
>             *Sent:*Tuesday, May 27, 2014 10:41 PM
>             *To:*Rene Struik
>             *Cc:*Michael Richardson;6tisch-security@ietf.org
>             <mailto:6tisch-security@ietf.org>
>             *Subject:*Re: [6tisch-security] agenda for 2014-05-27
>             6tisch security call
>
>             Rene had asked on a previous call for someone to summarize
>             WirelessHART joining - here you go.
>
>             * One or more devices are sending beacons to advertise the
>             presence of the network. In WirelessHART, this frame is
>             unencrypted, but authenticated with a well known key.  The
>             beacon contains the current ASN, which the joining device
>             uses to synchronize its clock.
>
>             * Once the joining node has heard a beacon, it continues
>             listening for additional beacons for a short specified
>             timeout.
>
>             * The joining node encrypts a frame containing some HART
>             specific content, including a list of beaconing neighbors
>             it heard in the previous steps. The size of the payload is
>             ~ 60 bytes.  The packet is routed by a "proxy" node - the
>             joining parent. The frame is authenticated using the
>             well-known key, and encrypted using a shared symmetric key
>             known only by the node and the manager.
>
>             * The manager responds with a frame containing the
>             run-time link-layer key, the node's new short address
>             (this takes the place of PAN coordinator association), and
>             a unicast session key and starting nonce for the manager.
>             This frame is encrypted with the symmetric key. The
>             payload is ~ 60 bytes, and is routed to the proxy for
>             delivery to the joining node - the proxy uses the
>             link-layer well known key on the frame.
>
>             * At this point the joining node transitions to using the
>             run-time link-layer key for all link-layer frames, and the
>             manager unicast session for end-to-end manager traffic.
>             This ends the initial security handshake.
>
>             * Over a number of additional frames, the manager assigns
>             additional sessions, including broadcast sessions, and a
>             unicast session to the Gateway (sink for all data
>             traffic), and additional communications resources, routing
>             information, etc.  There is no explicit transition from
>             joining to joined - the mote transitions when certain key
>             frames are received.
>
>             * Note that a WirelessHART link-layer frame contains and
>             additional frame type byte and a 4-byte link-layer MIC, on
>             top of the unsecured 15.4 frame.  A network frame contains
>             an additional 16-40 bytes of addressing, routing, security
>             and other information.
>
>             Hope this help!
>
>             Jonathan
>
>             On Mon, May 26, 2014 at 8:09 PM, Rene Struik
>             <rstruik.ext@gmail.com <mailto:rstruik.ext@gmail.com>> wrote:
>
>                 Hi Michael:
>
>                 I would like to discuss the outstanding issues I
>                 summarized in my email of Tue last week, May 20, 2014,
>                 9:45am EDT
>                 (seehttp://www.ietf.org/mail-archive/web/6tisch-security/current/msg00086.html
>                 <http://cp.mcafee.com/d/5fHCMUp41ESyNt55OWtSjtPqbwVBcSyUepvdEK3zhOyCOqejrzPPPz5XCN6ABqM1hYEvIundDOx-NVsTJQXIfcLZvC4TQTS6eLsKCO-PPXX3XUVzBHFShjlKepVkffGhBrwqrhdI6XYyMCY-ehojd79KVI05bVKY01MjbX6NehDY05zAVkIjbQ-PspjbppKcvxf5q4rTKYVMedKjBiNcLjXdNBcIn8lrxrW0GnPtU02rhhuhKr1vF6y0QJKjBiNcLjXdNBcIqnjh1F7U8qq87qNd42tQm2ZTOWoUQgejBiNcQgk-Pspjb6y2SDDCT63pO_o>).
>                 This was also one of the action items at the
>                 conclusion of last week's 6TiSCH security call.
>
>                 FYI - the w/HART communication flows were discussed
>                 during the 6TiSCH security conf call the week before,
>                 on Mon May 12, 2014. If one wishes to go over this
>                 again, that is fine, but I would prefer us giving
>                 preference to taking on already articulated issues
>                 (which were assigned as homework assignment to reflect
>                 upon) first (i.e., prior to item #4 of the proposed
>                 agenda).
>
>                 As another agenda point, I would like us to discuss
>                 the frequency of future calls (as part of EOB).
>
>                 Best regards, Rene
>
>
>                 On 5/26/2014 10:49 PM, Michael Richardson wrote:
>
>                     To remind, we moved the call from the 26th to the 27th at 10am EDT.
>
>                     That's 90 minutes from this email.
>
>                       
>
>                     1) notewell.
>
>                     2) intros
>
>                     3) recap of draft-piro-
>
>                     4) wirelesshart -way --- how does the communication work?
>
>                     5) how to summarize all of this to the working group
>
>                     6) how to close this process up?
>
>                       
>
>                     -- remember that the call is recorded, and the NoteWell applies.
>
>                       
>
>                     -- The URL to access the webex, which will we use for audio only:
>
>                        https://cisco.webex.com/cisco/j.php?MTID=m2fe139bf876cea3ec62750cd580b7908  <http://cp.mcafee.com/d/5fHCN0SyNt55OWtSjtPqbwVBcSyUepvdEK3zhOyCOqejrzPPPz5XCN6ABqM1hYEvIundDOx-NVsTJQXIfcLZvC4TQTS6eLsKCO-PPXX3XUVzBHFShjlKepVkffGhBrwqrjdI6XYyMCY-ehojd79KVIDeqR4IOQGmHM0L3-nOQGmHwzMh93o93gUVldTQmjhOgtu7em_mvIUCevLp1ZWV0sqerL6T9OFoCnFZCUOCmbAaJMJZ0lbVKY01dEEL8TdwLQzh0qmT9OFoCnFZCUOCmdbFEwQzY4dd43JoCy1eWb1uXVtcsq879OFoCq8avpKcFBzh1rjPPrz1LmTw7w17>
>
>                       
>
>                     -- we will resume with the etherpad at:
>
>                         http://etherpad.tools.ietf.org:9000/p/notes-ietf-89-6tisch-security  <http://cp.mcafee.com/d/2DRPow71NJ5yWabBQXICXCQn1PapJ5MsO-rhs76zB5dAQsCT7DDD6bTdyd9aRw2zVg_oYKrfB3ZzOVLrFToupvW_c9LFLIctuVtdBZDDTS7TNP7bnjIyCHssPOEuvkzaT0QSOrodTV5xdVYsyMCqejtPo0fVA_yJG7jHk-Di-rL00kzhPuZYmO5p_gLbVKBTzhOnsDaBypuDSrzapoSVelb4OZfIT6kONsxlK5LE2FvdTw09J55V6VI5-Aq83iSVelb4OZfIT6kONFtd46AvwxFEwtH4Qg9ThobTvbFzzh0Velb4Ph1jXdNBcIq8bquursodJiZvpmK6GwY>
>
>                       
>
>                     I'm at+1 613 276-6809  <tel:%2B1%20613%20276-6809>, IM:mcr@xmpp.credil.org  <mailto:mcr@xmpp.credil.org>  ormcharlesr@gmail.com  <mailto:mcharlesr@gmail.com>,
>
>                     if you need more than that to get in, or are having difficulties.
>
>                     Please make sure your audio works, and that you mute when not talking.
>
>                       
>
>                     --
>
>                     Michael Richardson<mcr+IETF@sandelman.ca>  <mailto:mcr+IETF@sandelman.ca>, Sandelman Software Works
>
>                       -= IPv6 IoT consulting =-
>
>                       
>
>                       
>
>                       
>
>                     _______________________________________________
>
>                     6tisch-security mailing list
>
>                     6tisch-security@ietf.org  <mailto:6tisch-security@ietf.org>
>
>                     https://www.ietf.org/mailman/listinfo/6tisch-security  <http://cp.mcafee.com/d/2DRPoO86QmbEEKnjKOrKrhs7cFCQn1PbVJ5MsqekkSjhOrsuuusoLsS8QAHm0afB3ZzOVI-kfSfbCZKDtxVB_HYMC-C-MNRXBQSnSuvvovv7csJteOaqJNPfaxVZicHs3jr1JwTvAm4TDNOb2pEVdTdAVPmEBC5eBYTu00U9GX33VkDa3JssDaBypuDSrzapoSVelb4OZfIT6kONsxlK5LE2FvdTw09J55V6VI5-Aq83iSVelb4OZfIT6kONFtd46AvwxFEwtH4Qg9ThobTvbFzzh0Velb4Ph1jXdNBcIq8bquursodLWbv>
>
>
>
>
>
>                 -- 
>
>                 email:rstruik.ext@gmail.com  <mailto:rstruik.ext@gmail.com>  | Skype: rstruik
>
>                 cell:+1 (647) 867-5658  <tel:%2B1%20%28647%29%20867-5658>  | US:+1 (415) 690-7363  <tel:%2B1%20%28415%29%20690-7363>
>
>
>                 _______________________________________________
>                 6tisch-security mailing list
>                 6tisch-security@ietf.org <mailto:6tisch-security@ietf.org>
>                 http://cp.mcafee.com/d/avndzgQ93gArhoKyyVteX9KVJ5MsOCrhs7cLCQn1NEVhjpd79JNVVVNyZPoziiJo0E-kfSfbCPVg_oYKrSWtS7Cn-LP2rWrX37nKnjpvpVZZxZYsNORQX8FGT7cYG7DR8OJMddECQjt-hojuv78I9CzATsSjDdqymokWnPtU03wCHIcfBisEeRNOsGm9BWvpKcFBzrAVkIjbQ-Pspjb5O5mUm-waBYTu00CQknArCMnWhEwdbrAVkIjbQ-Pspjb6BQQgqh-26Cy1SIjh0Dt5wLtYKCed43AVkIjd45fIT6kONEwJFVVJNwSeVhsrLe-Fkd
>
>
>
>
>             --
>
>             -- 
>             Jonathan Simon, Ph. D
>             Director of Systems Engineering
>             Dust Networks at Linear Technology
>             30695 Huntwood Ave
>             Hayward, CA 94544-7021
>             (510) 400-2936 <tel:%28510%29%20400-2936>
>             (510) 489-3799 <tel:%28510%29%20489-3799>FAX
>             jsimon@linear.com <mailto:jsimon@linear.com>
>
>             **LINEAR TECHNOLOGY CORPORATION**
>             *****Internet Email Confidentiality Notice*****
>              This e-mail transmission, and any documents, files or
>             previous e-mail messages attached to it may
>             contain confidential information that is legally
>             privileged. If you are not the intended recipient, or a
>             person responsible for delivering it to the intended
>             recipient, you are hereby notified that any disclosure,
>             copying, distribution or use of any of the information
>             contained in or attached to this transmission is
>             STRICTLY PROHIBITED. If you have received
>             this transmission in error, please immediately notify me
>             by reply e-mail, or by telephone at(510) 400-2936
>             <tel:%28510%29%20400-2936>, and destroy the
>             original transmission and its attachments without reading
>             or saving in any manner. Thank you.
>
>
>             _______________________________________________
>             6tisch-security mailing list
>             6tisch-security@ietf.org <mailto:6tisch-security@ietf.org>
>             http://cp.mcafee.com/d/2DRPow76QmbEFLzzhOM-rKrhs7cFCQn1PbVJ5MsqekkSjhOrsuuusoLsS8QAHm0afB3ZzOVI-kfSfbCTA7hPXPb_nVNZNBVxzHTbEzHIYYepd7bz8XBHEShhlKM_OEuvkzaT0QSyrhdTV5xdVYsyMCqejtPpesRG9pxjFvdTw0e2qKMM-l9OwXn79OFoCnFZCUOCmdKjBiNcLjXdNBcIn8lrxrW0GnPtU02rojhKUr1vF6y0QJKjBiNcLjXdNBcIqnjh1F7U8qq87qNd42tQm2ZTOWoUQgejBiNcQgk-Pspjb6y2SDDCT63rt_U2SVUlVB0
>
>
>
>
>         --
>
>         -- 
>         Jonathan Simon, Ph. D
>         Director of Systems Engineering
>         Dust Networks at Linear Technology
>         30695 Huntwood Ave
>         Hayward, CA 94544-7021
>         (510) 400-2936
>         (510) 489-3799 FAX
>         jsimon@linear.com <mailto:jsimon@linear.com>
>
>         **LINEAR TECHNOLOGY CORPORATION**
>         *****Internet Email Confidentiality Notice*****
>          This e-mail transmission, and any documents, files or
>         previous e-mail messages attached to it may
>         contain confidential information that is legally privileged.
>         If you are not the intended recipient, or a person responsible
>         for delivering it to the intended recipient, you are
>         hereby notified that any disclosure, copying, distribution or
>         use of any of the information contained in or attached to this
>         transmission is STRICTLY PROHIBITED. If you have received
>         this transmission in error, please immediately notify me by
>         reply e-mail, or by telephone at (510) 400-2936, and destroy
>         the original transmission and its attachments without reading
>         or saving in any manner. Thank you.
>
>         _______________________________________________
>         6tisch-security mailing list
>         6tisch-security@ietf.org <mailto:6tisch-security@ietf.org>
>         http://cp.mcafee.com/d/1jWVIe3zqb5QkTzhOMC-rKrhs7cFCQn1PbVJ5MsqekkSjhOrsuuusoLsS8QAHm0afB3ZzOVI-kfSfbCO5JtvupvW_8CzBdBBfHTbECzBdzATC7xNEVVqWtAklrCzB7BgY-F6lK1FJ4SyrLOb2rPUV5xcQsCXCOsVHkiP2Di-rL00s4RtxxYGjB1SKejBiNcLjXdNBcIrsDaBypuDSrzapoKgGT2TQ1kLCXM04S-qem7T3obZ8Qg6BJOsGm9BWvpKcFBziWq8d8_13jh0Xm9EwjKyMnK-nj76y1OsGm9Cy2DSrzapoQgmQYYSUMrDrkr2pAaTam
>


-- 
email: rstruik.ext@gmail.com | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363