Re: [Add] [EXTERNAL] Re: ADD Requirements Draft
Tommy Jensen <Jensen.Thomas@microsoft.com> Thu, 03 September 2020 02:53 UTC
Return-Path: <Jensen.Thomas@microsoft.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B60513A0DD9 for <add@ietfa.amsl.com>; Wed, 2 Sep 2020 19:53:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KULoHhc2HQmm for <add@ietfa.amsl.com>; Wed, 2 Sep 2020 19:53:55 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-eopbgr650120.outbound.protection.outlook.com [40.107.65.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52BC93A0DD6 for <add@ietf.org>; Wed, 2 Sep 2020 19:53:55 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JUlktnJCz2ARiR8QX1GScR8in7fy+NPbyng/T9LnPn11EIse+09l6Jw/KZhPr6lzfHmTkac161Z+NDS6dBhqh30AkkrY1mmu8/qZcPOKqUnghnDZBMlKOjUgpW617BXev1hzc4IaZvU1wico8cxQBGnLyFAx88KnL7Ezcnp53wSgNue+pgmD2P0c8+rGW5uovo5m/OdLMT0s2ALhY00lIdvvRiiTFB0hBohGHyFvpYJygWIk5RVFJCklsRlky7UByT566XTEZR2HtQoO3Ed+l+2QGM5KO5QO0628gs00bAkwePbFKeqAejROvrS0/x3wIGnWfc+0TGG+2dVk1lCDZw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NVdyI9jv09ir7LmaMnas7LQ31tsjzWhNXKzg0tlJYws=; b=VbV2K0zDH1L2nMRDyKfuZ9ugBRNzlKemCvUx8a2ZbZMmcgUyopeS1JejMDzQ1L56Qm1M5uMVKMgkNedN5u/tVvE04qj4FR0Tuo/PPMZlchbCMMu19EN4HMia9iObBfRGZhtUt0q9dooPRxOtoRiiBAU1C8h0KUCxvl9D258uWj8phTxIlbc0u29bXDSFbOWaFw2yUslGaNascAZtxCwZBntCoMVIIpqUjDam5AZI9AYM2ZDu+8MXKNhhNhO1e54jJ0CbdTUFSDnnGEMU/XyrQo+DZHFkAlzYx52x4iGmoqCIQfKOSFEHyDTdgkFAIC5CRwILZtzNJnp4kyEi3GV4Ag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NVdyI9jv09ir7LmaMnas7LQ31tsjzWhNXKzg0tlJYws=; b=EIAkJw3gQUnTNmSHpTth8gtKnaJZU3xAdWof3+b5JM6oSczrQT+PRWUA6b2C2I9+0V8H4mWfyhCo92bgERWLKeM9D71Up+hHjaLSv8nCRg9rPz/Y8WU6TNbbcL3yOwvja4AvPoJeFefcVP0UoGW04o7EblUvF79kCRfO6I4Pu6c=
Received: from (2603:10b6:208:1ca::24) by MN2PR00MB0893.namprd00.prod.outlook.com (2603:10b6:208:fd::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3381.0; Thu, 3 Sep 2020 02:53:45 +0000
Received: from BL0PR00MB0772.namprd00.prod.outlook.com ([fe80::410a:12e5:6faa:d2b7]) by BL0PR00MB0772.namprd00.prod.outlook.com ([fe80::410a:12e5:6faa:d2b7%8]) with mapi id 15.20.3387.000; Thu, 3 Sep 2020 02:53:45 +0000
From: Tommy Jensen <Jensen.Thomas@microsoft.com>
To: Andrew Campling <andrew.campling@419.consulting>, Tommy Pauly <tpauly@apple.com>
CC: Eric Rescorla <ekr@rtfm.com>, tirumal reddy <kondtir@gmail.com>, ADD Mailing list <add@ietf.org>, Christopher Wood <caw@heapingbits.net>
Thread-Topic: [Add] [EXTERNAL] Re: ADD Requirements Draft
Thread-Index: AQHWgJpbkr+WjTYN00+8xTnF2ioQoKlUVYwAgAHeMo8=
Date: Thu, 03 Sep 2020 02:53:45 +0000
Message-ID: <BL0PR00MB07729669ED0FBB747FF3F302FA2C1@BL0PR00MB0772.namprd00.prod.outlook.com>
References: <31194C90-6C0B-470C-8B14-79C12D2C5C0D@comcast.com> <CACJ6M14gXmEHc_fX8=GpKwRDn6C=R7LR06JG_Qg-cWR5agU9Hw@mail.gmail.com> <391E15D2-9208-4BA9-B01E-3673982DA6CE@apple.com> <CABcZeBMXvcF6PJWE+EkGVx1c9RXzO1XuB3xhrVKUJvUb=aus8A@mail.gmail.com> <4cd8a8c6-3516-4ad6-877c-9460d8096773@www.fastmail.com> <CAFpG3gfkrKGiuPRH1QvH+-w2H=N1ijtDpk5Oh=D2JOp-L4Q1+w@mail.gmail.com> <CABcZeBNhHcNAkVm=PNUvV8_vGVvDvJbaMVHB_w9zu63+ebQwpQ@mail.gmail.com> <CAFpG3gcAjHkh7boDwLq+sHpGtfB2WT0NbuuFqqBQs2M6BZkAOQ@mail.gmail.com> <CABcZeBMi-B7LKB6ipt6vLSZcF9OMLga8f+qydpZVOhOGQrttuQ@mail.gmail.com> <CAFpG3geQefT0=fN-6UFwDqLLqbb1XthHA=np4HPS2NfSO77csA@mail.gmail.com> <CABcZeBPmfe8Um38xFHoxw+26-YQxFUPN+p4aW9uzbPKGy1xz4g@mail.gmail.com> <CAFpG3gefyTcibzfQ-dzXKv5fKE=vwUktux0dz25wNL7_+tf7MA@mail.gmail.com> <CABcZeBMVcH74RYXZrLRNtHLi-xZgGxRHA2CsH6nbiz+5uGM32g@mail.gmail.com> <DM6PR00MB0783D4A658BE3BA8EBD6533BFA2E1@DM6PR00MB0783.namprd00.prod.outlook.com> <07B4108E-07BC-4755-96FB-31D43DCDC19C@apple.com>, <LO2P265MB057382DA9985ABF17940B41EC22E0@LO2P265MB0573.GBRP265.PROD.OUTLOOK.COM>
In-Reply-To: <LO2P265MB057382DA9985ABF17940B41EC22E0@LO2P265MB0573.GBRP265.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-09-03T02:53:45.251Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;
authentication-results: 419.consulting; dkim=none (message not signed) header.d=none;419.consulting; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [50.35.64.46]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: ac2844a2-d5a1-4061-5c8e-08d84fb49368
x-ms-traffictypediagnostic: MN2PR00MB0893:
x-microsoft-antispam-prvs: <MN2PR00MB0893630EF9D6B2F49262D6DBFA2C1@MN2PR00MB0893.namprd00.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: tvLeLTyBrsLzO1hz94c73PfpUriBEa8SQyMmGn4VF/wqrcM6dcJLcIrVH/t5EVPRqqWbJzt0eht4i8apyzdNIoQ+sLtcWET1wgg6+wWtOWzFivUsjNVaJWoBNdiGXZ8ZNEUIIG8rSPUejtQ9SB8dxy0z7/+6mYwfyQwBp00ZiUaFlOCedvHNAzjFICNlK1R3QUt0rOCVoR7sTkz4WU1CmiFgBnVX2MNithz7ElAoCK68qpn/NlGDRn8+pWlXj2AoSoIBt3K1q4ntqxmaOM7WZjoVbiHeJujhXDqwFqshmlNpTrqA9ZOLOop3OpTJkCBBmcc0AR/izdqayoZJGtdKr7AJS4RyDsD1Na1fElyXD1Y8YROuj+CX68PgiPCvkQYamYB8itFuBcnLLqPWMpAQuQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BL0PR00MB0772.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(366004)(376002)(39860400002)(136003)(396003)(66476007)(82960400001)(86362001)(4326008)(186003)(7696005)(71200400001)(66446008)(66946007)(55016002)(91956017)(76116006)(66574015)(26005)(166002)(66556008)(82950400001)(2906002)(52536014)(83380400001)(53546011)(64756008)(316002)(5660300002)(6506007)(966005)(8990500004)(54906003)(33656002)(8676002)(478600001)(9686003)(19627405001)(110136005)(8936002)(19627235002)(10290500003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BL0PR00MB07729669ED0FBB747FF3F302FA2C1BL0PR00MB0772namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BL0PR00MB0772.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ac2844a2-d5a1-4061-5c8e-08d84fb49368
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Sep 2020 02:53:45.7836 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tJr+yqHwUr/WzyVNIJQs7R1jaNlPjuDbwMaGRLDHQv1dg0RVXnh/aKLtYnLCYPN9zzOl3KRJwxUzGn7aIFjT+g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR00MB0893
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/Iaw6Dt5eUNNRn0wnmzcK30AVBic>
Subject: Re: [Add] [EXTERNAL] Re: ADD Requirements Draft
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Sep 2020 02:53:58 -0000
Hey Andrew, Wrong Tommy, but I'll point out he specifically said "entity" and not "DNS server" most likely on purpose. While we do propose an auto-upgrade approach where we can attempt a TLS-confirmed upgrade from an IP address, the designated DoH server approach can also honor the same entity control, namely the designated server is the same entity as the domain names it resolves. I'm not convinced clients require per-server policy to be communicated as part of discovery to power DNS server selection or configuration UX. Thanks, Tommy ================================================ The latest in Windows Internet Protocols: Native gRPC support: https://aka.ms/grpcblogpost DNS over HTTPS: https://aka.ms/dohblogpost ________________________________ From: Andrew Campling <andrew.campling@419.consulting> Sent: Tuesday, September 1, 2020 3:01 PM To: Tommy Pauly <tpauly@apple.com>; Tommy Jensen <Jensen.Thomas@microsoft.com> Cc: Eric Rescorla <ekr@rtfm.com>; tirumal reddy <kondtir@gmail.com>; ADD Mailing list <add@ietf.org>; Christopher Wood <caw@heapingbits.net> Subject: RE: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Pauly That seems reasonable for a same provider auto upgrade-type scenario. To look at it from the other perspective, if the client wants to change the DNS from the one that the client already has a relationship with then an explanation of policy is required together with user assent (possibly even indirect user assent in some cases, eg enterprise, parent etc, to borrow terminology from RFC 8890). Andrew From: Tommy Pauly <tpauly@apple.com> Sent: 01 September 2020 20:57 To: Tommy Jensen <Jensen.Thomas=40microsoft.com@dmarc.ietf.org> Cc: Eric Rescorla <ekr@rtfm.com>; tirumal reddy <kondtir@gmail.com>; ADD Mailing list <add@ietf.org>; Christopher Wood <caw@heapingbits.net> Subject: Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Agreed. From my perspective as a client vendor, I don’t see a likely path to consuming this kind of policy. This is one of the reasons I’ve argued that we should have in our requirements a limitation that the entity that provides DNS should be one that the client already has a relationship with—we don’t need any new explanation of policy, we’re relying on existing relationships. Thanks, Tommy (Pauly) On Sep 1, 2020, at 10:11 AM, Tommy Jensen <Jensen.Thomas=40microsoft.com@dmarc.ietf.org<mailto:Jensen.Thomas=40microsoft.com@dmarc.ietf.org>> wrote: ekr> Taking a step back here: is there any client with significant usage that would be interested in consuming this kind of policy when published by a resolver? Speaking for myself: no. The user either understands the implications and has pre-configured a resolver of their choice, or they don't and expect DNS to just work. Until DNS server choice is an everyday user concept akin to music streaming app choice (or at least wireless network choice), that will continue to be the case. Thanks, Tommy ________________________________ From: Add <add-bounces@ietf.org<mailto:add-bounces@ietf.org>> on behalf of Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> Sent: Tuesday, September 1, 2020 9:46 AM To: tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>> Cc: ADD Mailing list <add@ietf.org<mailto:add@ietf.org>>; Christopher Wood <caw@heapingbits.net<mailto:caw@heapingbits.net>> Subject: [EXTERNAL] Re: [Add] ADD Requirements Draft On Tue, Sep 1, 2020 at 4:10 AM tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>> wrote: Hi Eric, Please see inline On Fri, 28 Aug 2020 at 19:08, Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> wrote: On Fri, Aug 28, 2020 at 12:35 AM tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>> wrote: On Thu, 27 Aug 2020 at 18:46, Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> wrote: On Wed, Aug 26, 2020 at 10:15 PM tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>> wrote: Hi Eric, Please see inline On Wed, 26 Aug 2020 at 16:50, Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> wrote: As I said when you first proposed this in an ADD meeting, I do not believe that anything of this kind is viable. 1. Certificates tied to a legal entity have not been effective, which is why browsers are removing EV. The draft does not propose using EV certificates for encrypted DNS servers, please see https://tools.ietf.org/html/draft-reddy-add-server-policy-selection-05#section-4<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-reddy-add-server-policy-selection-05%23section-4&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C01875924c4144966755c08d84ec2883b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345945642599005&sdata=21UUejEVCqdnvjvYuJPKKuUeEvlboJ%2FNfU6r1Xkggsg%3D&reserved=0> for more details. It proposes something similar, which I expect to have the same drawbacks. 2. There is ample evidence that users do not read privacy policies. The DNS server privacy statement is much more simpler compared to a typical privacy statement by a content service provider (see https://tools.ietf.org/html/draft-ietf-dprive-bcp-op-14#section-6<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-dprive-bcp-op-14%23section-6&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C01875924c4144966755c08d84ec2883b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345945642609001&sdata=lePsGAUDQmK2FvUC9CfEkzIUDxAdTgYfPaxV9koxhdg%3D&reserved=0>). I don't think that makes it significantly more likely that people will read it. Further, automated analysis of a privacy statement is possible using deep learning (https://pribot.org/files/Polisis_USENIX_Security_Paper.pdf<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpribot.org%2Ffiles%2FPolisis_USENIX_Security_Paper.pdf&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C01875924c4144966755c08d84ec2883b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345945642609001&sdata=DjEJhUbWRSF6o%2FhiJCKUhkrhMvBatLlMpTHUYKw2mh0%3D&reserved=0>). You can explore polisis and pritbot at https://pribot.org<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpribot.org%2F&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C01875924c4144966755c08d84ec2883b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345945642618991&sdata=dw0kcx9WdgyjNwyKIUrpZRPJp8m3Aw%2B9jI7vaQWLupM%3D&reserved=0> to explore the analysis of privacy statements by several organizations.. I took a quick look at this tool and while it appears to be interesting work, it does not produce output which I think is likely for users to actually assimilate. For instance here is what it does with McAfee's policy: https://pribot.org/polisis/?company_url=mcafee.com&_id=59d8f9c4e3dd0c4e24555c1d&category=first-party-collection-use<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpribot.org%2Fpolisis%2F%3Fcompany_url%3Dmcafee.com%26_id%3D59d8f9c4e3dd0c4e24555c1d%26category%3Dfirst-party-collection-use&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C01875924c4144966755c08d84ec2883b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345945642618991&sdata=xLlQi%2BhQFiFxRhnoEMSVBIOjg6D0FKBMtHy2ewr%2F2YQ%3D&reserved=0> We've already run this experiment of machine readable privacy policies once with P3P and I don't see a reason to think this will be any different Taking a step back here: is there any client with significant usage that would be interested in consuming this kind of policy when published by a resolver? If so, I'd like to hear from them about their needs. If not, it doesn't seem worth discussing further. -Ekr -- Add mailing list Add@ietf.org<mailto:Add@ietf.org> https://www.ietf.org/mailman/listinfo/add<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fadd&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C01875924c4144966755c08d84ec2883b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345945642628987&sdata=FkyePIlYLclN%2BC5DVhNqUVYfhQsLXENMCaF4BrOl9gk%3D&reserved=0>
- Re: [Add] ADD Requirements Draft Eric Rescorla
- [Add] ADD WG Github Deen, Glenn
- Re: [Add] ADD WG Github Chris Box (BT)
- [Add] ADD Requirements Draft Tommy Pauly
- Re: [Add] ADD Requirements Draft Daniel Migault
- Re: [Add] ADD Requirements Draft Chris Box (BT)
- Re: [Add] ADD Requirements Draft Daniel Migault
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] ADD Requirements Draft Chris Box (BT)
- Re: [Add] ADD Requirements Draft Christopher Wood
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] ADD Requirements Draft tirumal reddy
- Re: [Add] ADD Requirements Draft tirumal reddy
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] ADD Requirements Draft Christopher Wood
- Re: [Add] ADD Requirements Draft tirumal reddy
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] ADD WG Github Vittorio Bertola
- Re: [Add] ADD WG Github Chris Box (BT)
- Re: [Add] ADD Requirements Draft tirumal reddy
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Pauly
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Eric Rescorla
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Andrew Campling
- Re: [Add] ADD Requirements Draft tirumal reddy
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] ADD Requirements Draft Michael Richardson
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] ADD Requirements Draft tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Pauly
- Re: [Add] ADD Requirements Draft Tommy Pauly
- Re: [Add] ADD Requirements Draft Michael Richardson
- Re: [Add] ADD Requirements Draft Michael Richardson
- Re: [Add] ADD Requirements Draft Eric Rescorla
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Paul Vixie
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Pauly
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Paul Vixie
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Andrew Campling
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Andrew Campling
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Ted Hardie
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Rob Sayre
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft tirumal reddy
- Re: [Add] ADD Requirements Draft tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Steffen Nurpmeso
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- [Add] discovery of DNS server privacy policy Jim Reid
- Re: [Add] discovery of DNS server privacy policy Paul Wouters
- Re: [Add] [EXTERNAL] Re: discovery of DNS server … Tommy Jensen
- Re: [Add] [EXTERNAL] Re: discovery of DNS server … Dan Wing
- Re: [Add] [EXTERNAL] Re: discovery of DNS server … Martin Thomson
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Michael Richardson
- Re: [Add] discovery of DNS server privacy policy tirumal reddy
- Re: [Add] [EXTERNAL] Re: discovery of DNS server … tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Andrew Campling
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Deen, Glenn
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Eric Orth
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Ted Lemon
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Eric Orth
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Vinny Parla (vparla)
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Rob Sayre
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Vinny Parla (vparla)
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Steffen Nurpmeso
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Michael Richardson
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Steffen Nurpmeso
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft tirumal reddy
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft Tommy Jensen
- Re: [Add] [EXTERNAL] Re: ADD Requirements Draft tirumal reddy