Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <draft-ietf-tsvwg-ecn-l4s-id-29> for your review
Martin Duke <martin.h.duke@gmail.com> Wed, 11 January 2023 17:53 UTC
Return-Path: <martin.h.duke@gmail.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9587C15C526; Wed, 11 Jan 2023 09:53:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eh60TG39zo3K; Wed, 11 Jan 2023 09:53:43 -0800 (PST)
Received: from mail-vs1-xe2c.google.com (mail-vs1-xe2c.google.com [IPv6:2607:f8b0:4864:20::e2c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7232C153CC3; Wed, 11 Jan 2023 09:53:43 -0800 (PST)
Received: by mail-vs1-xe2c.google.com with SMTP id 186so11245443vsz.13; Wed, 11 Jan 2023 09:53:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=fOBpawdoLOK/7GxHqknXFtb/dtUOTD1ILpxzBY4qx14=; b=WrSStcZpyza68WyPVnoMh7AAKToQGCwU4FZbw6YExg/qBwhyKH4EO8VXgXnMU8zsGl Di2EbED6rsXQMrI5/FZLIqkcjWXPcbqbGJ91APjMTjNYrZWwj2gigjf49ZCSqf6mdNVI t7XZFUbW0KR55S6060VDbZw6j+TuOtu1NVwmvDXLxAgd71EXyKnYNcgBCNVCaiF41S9p EXzXgb1keMFmSdMom8KcnD/D7oYl/7vaFV8yunEjfG+ioSDqG71QU0+7ETrF182G4DKN PnLRm/YtOOQdQ5KaryvGD4x17c6wAxta5+PjbG8/7SS8DUnhhNF62BXDGIWMqWImW22C uBhA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=fOBpawdoLOK/7GxHqknXFtb/dtUOTD1ILpxzBY4qx14=; b=TsTmV8UvSmc4mBDRrTN36TgmucOQba2hkd5Rk7/cHpM3FW8/f7bHgYYWKjBooK/rH0 LDPybMCXmXhQ61bRenFabeCW6NIOkwaI9IY8cibOidIjBL0zVAGcN/2Vbq8uDIxq1NlY R7BgsVcUMR/nxSaV1i3Sbd9NKrowdmICGloQ+UbDR0xSoSqn/manDXtmVWZNabfq+8r3 3KMoex5ClEfP5XwaWACaC+zshNknN5vA24On41BvaeZL3zr3pUBYM31aCM0attJqL2Vk rhEd+GYOxfGyKMFO0si1qzJR77bFW0t1OuDc6m9Vl20CziRxqzUp5YtyVa7QL5pfWKeJ HGnQ==
X-Gm-Message-State: AFqh2krTH5wangeWphqYi4OPJdGi37Er+EQS0ZmkH4hSJaHm3Y/JmTjt 3G+OsP5kTdlgyZw5Bfl4on4V9lFjKxFH+QmewqQ=
X-Google-Smtp-Source: AMrXdXsQdWmN+ENA9GmXiNNe0Etlz3O9vIPvRwphK0iGgTFNayXqN0/a85jocFNPDWwWbdPUzeyZQ1NRdnBhFnpztFA=
X-Received: by 2002:a05:6102:a4b:b0:3b1:386d:9839 with SMTP id i11-20020a0561020a4b00b003b1386d9839mr11122866vss.64.1673459622559; Wed, 11 Jan 2023 09:53:42 -0800 (PST)
MIME-Version: 1.0
References: <20221118225755.C83CB1BA478D@rfcpa.amsl.com> <0017CE18-C8EB-4D03-8B37-A72725A76C08@amsl.com> <40606c92-0f6e-9839-1610-c29943fd257a@bobbriscoe.net> <B1CA1A45-E763-43B2-8A92-BA63FFCC532B@amsl.com> <40c20415-8d0c-9218-7993-eb152fa3f378@bobbriscoe.net> <486253F1-D6E4-48FA-AD27-3311F7F3B79F@amsl.com> <CAM4esxSq8D_=GGE1Wq3X-+fvGmz1uy6HXNi7fXbJvgzjFw89pg@mail.gmail.com> <7076c4f4-b5eb-3296-a29b-b98b80eabe81@bobbriscoe.net> <CAM4esxR_nPkNURxiRSCNuveqqEAYmoc-nCG-vOQ5J8V1V76_fg@mail.gmail.com> <9689a84d-3587-5ddc-b03b-fcb6aa8ee577@bobbriscoe.net> <b1a0e444-e287-4a14-5e75-7cdfa4cb3383@erg.abdn.ac.uk> <a961a71c-303a-2dc8-4060-72860b146e1a@bobbriscoe.net> <CAM4esxTDcNvYUqJCp-BRZBYPW_W9jnvUNO=EhtrWyVcsJ4Jm3Q@mail.gmail.com> <CAM4esxTLU7+BViiczKQoYnBEmxAjrsG4tELnq6D_u0txuw2Qgg@mail.gmail.com> <4b0b1352-5da8-ebfb-c954-794d74015b5d@bobbriscoe.net> <83c39fe2-6709-897e-5c4d-7267f834f484@bobbriscoe.net> <AM9PR07MB7313F3F9AE4A47155A2903D9B9F99@AM9PR07MB7313.eurprd07.prod.outlook.com> <4b102db1-0e6a-ed84-db33-6d8007664526@bobbriscoe.net> <849C9463-A1B8-4C8F-842D-B3C301F10BFE@amsl.com>
In-Reply-To: <849C9463-A1B8-4C8F-842D-B3C301F10BFE@amsl.com>
From: Martin Duke <martin.h.duke@gmail.com>
Date: Wed, 11 Jan 2023 09:53:31 -0800
Message-ID: <CAM4esxTJk3tOp8obknmue4RNrTCzxSEWJWZtDo3O2xKpSAarJw@mail.gmail.com>
To: Karen Moore <kmoore@amsl.com>
Cc: Bob Briscoe <ietf@bobbriscoe.net>, "Koen De Schepper (Nokia)" <koen.de_schepper@nokia-bell-labs.com>, RFC Editor <rfc-editor@rfc-editor.org>, "tsvwg-ads@ietf.org" <tsvwg-ads@ietf.org>, "tsvwg-chairs@ietf.org" <tsvwg-chairs@ietf.org>, Wesley Eddy <wes@mti-systems.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Content-Type: multipart/alternative; boundary="0000000000005945d805f200ae0b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/bhd3IqVkfSYvKlbNuRaXF3d-HjE>
Subject: Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <draft-ietf-tsvwg-ecn-l4s-id-29> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jan 2023 17:53:48 -0000
Approved. On Mon, Jan 9, 2023 at 12:08 PM Karen Moore <kmoore@amsl.com> wrote: > Hi Bob, Koen, and Martin (AD)*, > > Thank you for your replies. Our files have been updated to reflect Bob’s > changes, and we have removed the hyphen from one 1 instance of “mis-use” > per Koen’s suggestion. We have not made any further changes in regard to > “P12”; if you would like to, please let us know. We also noted Koen’s > approval of the document on the AUTH48 status page. > > *Martin, please review the expansions that were added in Sections 1, 1.1, > 1.3, 6.1, and 6.2 and let us know if you approve or if any further edits > are needed. You can view the changes here: > https://www.rfc-editor.org/authors/rfc9331-lastdiff.html. > > -------- > FILES > (Please refresh) > > The updated XML file is here: > https://www.rfc-editor.org/authors/rfc9331.xml > > The updated output files are here: > https://www.rfc-editor.org/authors/rfc9331.txt > https://www.rfc-editor.org/authors/rfc9331.pdf > https://www.rfc-editor.org/authors/rfc9331.html > > These diff files show all changes made during AUTH48: > https://www.rfc-editor.org/authors/rfc9331-auth48diff.html > https://www.rfc-editor.org/authors/rfc9331-rfcdiff.html (side by side) > > These diff files show only changes made during the last editing round: > https://www.rfc-editor.org/authors/rfc9331-lastdiff.html > https://www.rfc-editor.org/authors/rfc9331-lastrfcdiff.html (side by side) > > This diff file shows all changes made to date: > https://www.rfc-editor.org/authors/rfc9331-diff.html > > Please contact us with any further updates or with your approval of the > document in its current form. We will await approval from Martin prior to > moving forward in the publication process. > > For the AUTH48 status of this document, please see: > https://www.rfc-editor.org/auth48/rfc9331 > > Best regards, > > RFC Editor/kc > > > > On Jan 9, 2023, at 6:51 AM, Bob Briscoe <ietf@bobbriscoe.net> wrote: > > > > Koen, > > > > I agree with 'misuse', > > > > PI2 wasn't forgotten; it's more a question of whether it should be > included in a list of AQM methods that predated this draft. I didn't think > it should.... > > ...When looked at one way, it should, and I imagine you're wanting to > give PI2 the same status as the other AQMs. But the position of PI2 > relative to DualPI2 is probably a source of confusion for most people, so I > think it's best to rely on the explanation later in this draft, otherwise, > introducing PI2 here before the explanation will cause most readers to get > confused, or at minimum, to do a double-take. > > > > > > Bob > > > > On 08/01/2023 14:35, Koen De Schepper (Nokia) wrote: > >> Hi Bob, Karen, > >> > >> I just did a read throughout the whole document again and I saw only > following nits which could be added/changed: > >> > >> Didn’t we forgot to mention PI2 in this list? > >> More recent state-of-the-art AQM methods, such as Flow Queue CoDel > [RFC8290], > >> Proportional Integral controller Enhanced (PIE) [RFC8033], > Proportional Integral Improved with a square [PI2] or Adaptive RED > [ARED01], ... > >> > >> Mis-use -> misuse? Intentionally or was it a hyphen leftover from a > line-wrap? > >> Approaches to assure the integrity of signals using the new > >> identifier are introduced in Appendix C.1. See the security > >> considerations in the L4S architecture [RFC9330] for further > >> discussion of mis-use of the identifier, as well as extensive > >> discussion of policing rate and latency in regard to L4S. > >> > >> I’ll let you sort out the acronym expansion (as I don’t have a strong > preference). So independent of the acceptance of the above nits and acronym > settlement, I can already approve this document. > >> > >> Thanks, > >> Koen. > >> > >> From: Bob Briscoe <ietf@bobbriscoe.net> > >> Sent: Saturday, January 7, 2023 6:25 PM > >> To: Martin Duke <martin.h.duke@gmail.com>; Karen Moore <kmoore@amsl.com > > > >> Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>; Koen De Schepper (Nokia)< > koen.de_schepper@nokia-bell-labs.com>; RFC Editor < > rfc-editor@rfc-editor.org>; tsvwg-ads@ietf.org; tsvwg-chairs@ietf.org; > Wesley Eddy <wes@mti-systems.com>; auth48archive@rfc-editor.org > >> Subject: Re: [AD] [C350] AUTH48: RFC-to-be 9331 > <draft-ietf-tsvwg-ecn-l4s-id-29> for your review > >> > >> Martin and Karen, > >> > >> I've re-expanded the remaining abbreviations in the att'd XML, as I > said I would in my email below: > >> rfc9331j.xml > >> Also, I've att'd the diff from Karen's latest edit (which I've denoted > as "rfc9331i"): > >> rfc9331j-from-i.diff.html > >> > >> > >> Bob > >> > >> On 07/01/2023 16:35, Bob Briscoe wrote: > >> Martin (and Karen,) > >> > >> On 06/01/2023 18:47, Martin Duke wrote: > >> Bob, > >> > >> In case this was lost in the holiday shuffle, the ball is in your court. > >> > >> [BB3] Thanks. I had read all the emails, but it wasn't clear to me that > I had been given the edit token on ecn-l4s-id. > >> I will set to re-expanding some abbreviations in the XML now. This is > the approach I shall take: > >> > >> For the example list of transport protocols in the intro, I will go > back to the RFC Editor's first approach of expanding the "non-core" > protocol names, instead of including citations for DCCP and SCTP (which are > cited later when each protocol is actually discussed). > >> > >> 1. Intro. > >> > >> > >> CURRENT: > >> The transport wire protocol, e.g., TCP, > >> QUIC, SCTP [RFC4960], DCCP [RFC4340], or RTP/RTCP, is orthogonal > (and > >> therefore not suitable for distinguishing L4S from Classic packets). > >> > >> PROPOSED: > >> The transport wire protocol, e.g., TCP, > >> QUIC, the Stream Control Transmission Protocol (SCTP), the Datagram > >> Congestion Control Protocol (DCCP), and RTP/RTCP, is orthogonal (and > >> therefore not suitable for distinguishing L4S from Classic packets). > >> > >> 1.1. Latency, Loss, and Scaling Problems > >> > >> > >> For the list of AQMs, I'll take a similar approach to that you've just > approved for the DualQ draft, except RED has already been expanded at this > point. Specifically: > >> > >> CURRENT: > >> However, Random Early Detection (RED) and other algorithms from the > 1990s were sensitive... > >> ... > >> More recent state-of-the-art AQM methods, such as FQ-CoDel > [RFC8290], > >> PIE [RFC8033], or Adaptive RED [ARED01],... > >> ... > >> This was useful because per-flow queuing (FQ) .... > >> > >> PROPOSED: > >> However, Random Early Detection (RED) and other algorithms from the > 1990s were sensitive... > >> ... > >> More recent state-of-the-art AQM methods, such as Flow Queue CoDel > [RFC8290], > >> Proportional Integral controller Enhanced (PIE) [RFC8033], or > Adaptive RED [ARED01], ... > >> ... > >> This was useful because per-flow queuing (FQ) ... > >> > >> Deeper into the Document > >> > >> > >> I'll add back expansions of EH, ESP, TRILL etc. > >> > >> > >> Bob > >> > >> > >> > >> On Wed, Dec 28, 2022 at 10:24 AM Martin Duke <martin.h.duke@gmail.com> > wrote: > >> I'm sympathetic to the desire to keep sentences brisk, but I find the > idea that these acronyms are stashed in the references list to be > reader-hostile. Would it be too much to ask for a short glossary just after > the introduction to spell these out? > >> > >> On Thu, Dec 22, 2022 at 4:27 PM Bob Briscoe <ietf@bobbriscoe.net> > wrote: > >> Gorry, > >> > >> On 22/12/2022 09:20, Gorry Fairhurst wrote: > >> On 21/12/2022 21:46, Bob Briscoe wrote: > >> Martin, > >> > >> On 20/12/2022 19:24, Martin Duke wrote: > >> > >> > >> On Sat, Dec 17, 2022 at 7:16 AM Bob Briscoe <ietf@bobbriscoe.net> > wrote: > >> Martin, > >> > >> On 16/12/2022 23:22, Martin Duke wrote: > >> There is a lot of email about this; pardon me if it's been thoroughly > discussed: > >> > >> (1) I don't understand why we edited out introducing acronyms on first > use: > >> DCTCP, FQ-Codel, PIE, TRILL, EH, ESP > >> > >> [BB] We persuaded the RFC Editor to expand or not on a case-by-case > basis rather than following an "expand-on-first-use" rule too rigidly. > >> Before the RFC Editor process, we had judged that these particular ones > were: > >> * better known by their abbreviation than their expansion > >> * easily look-up-able for anyone interested in the expansion, via the > title of the reference cited beside them > >> * and they were within a sentence that was already long, so an > (unnecessary) expansion would make it overly long and complicated. > >> > >> In the case of DCTCP, it's expansion adds important context, but the > first use is in an already complex sentence. So, at the first use it says > "the DCTCP/DualQ solution described below", and it is expanded in the next > para. > >> > >> Also, FQ is expanded elsewhere 'cos it's meaning is important, but > CoDel is only expanded in the cited title of its reference. > >> > >> OK, you've clearly thought through the sequencing here. I'm not going > to insist on first-use, but I do think these acronym expansions should be > somewhere in the document, either in a glossary or in subsequent use, as > you've done with DCTCP. > >> > >> [BB2] Does "somewhere in the document" include in the title of a > reference cited where the abbreviation is first used (e.g. DCCP [RFC4340])? > >> I've tried to only do this where the expansion isn't central to > understanding the document, and expanding it on first use subtracts from > the sense of the sentence. > >> > >> > >> Bob > >> Before a draft leaves the TSVWG, we would normally check that all > acronyms are expanded on their first use within the body of the text (the > abstract is treated separately and needs to have its own definitions). I > still think this is an important, rather than requiring readers to consult > another document to understand if they have correctly interpreted an > acronym. > >> > >> > >> [BB] We're not saying anyone has to consult another document - just > consult the title of the reference cited in /this/ document. And this is > only for any abbreviation that: > >> 1. is known by it's abbreviation (by those familiar with it) > >> 2. would make a sentence in the intro hard to follow if all > abbreviations were expanded > >> 3. is only mentioned in passing so it isn't necessary for understanding > the document. > >> > >> > >> On this document, I leave it to Martin to decide whether there is > reason to do otherwise. > >> > >> > >> [BB] Yup. > >> Thanks > >> > >> > >> Bob > >> > >> > >> Gorry > >> > >> (TSVWG Co-Chair) > >> > >> > >> > >> > >> > >> (2) This edit in Sec 5.1 seems non-cosmetic. > >> In case unforeseen problems arise with the L4S experiment, it MUST be > >> possible to configure an L4S implementation to disable the L4S > >> treatment. Once disabled, all packets of all ECN codepoints will > >> receive Classic treatment, and ECT(1) packets MUST be treated as if > they > >> were Not-ECT. > >> I agree that the original text was ambiguously worded, but the > common-sense reading of the original (given that this is a section about > network nodes) is that ECT(1) would > >> go in the ECT(0) queue and be marked CE in accordance with the RFC 3168 > rules. The new text is different. I can see advantages to the new rule but > I wonder if we have > >> consensus for this change? > >> > >> [BB] Yes, but common sense might be in short supply. "Classic > treatment" could be incorrectly taken to mean "Classic ECN treatment". > >> This sentence went through an intermediate version, which you might > prefer because it stays closer to the original: > >> > >> In case unforeseen problems arise with the L4S experiment, it MUST be > >> possible to configure an L4S implementation to disable the L4S > >> treatment. Once disabled, all packets of all ECN codepoints will > >> receive Classic treatment, and ECT(1) packets MUST be treated as if > they > >> were Not-ECT, then all packets of all ECN codepoints will > >> receive treatment compatible with Classic congestion control. > >> > >> But, in the most recent edits, I asked the RFC Editor to take out the > final clause completely at the suggestion of my co-authors. > >> We can leave it in if you'd rather. > >> > >> I think I ave misinterpreted the diff. This is fine as-is. > >> > >> > >> -- > >> ________________________________________________________________ > >> Bob Briscoe http://bobbriscoe.net/ > >> > >> > >> > >> > >> -- > >> ________________________________________________________________ > >> Bob Briscoe http://bobbriscoe.net/ > >> > >> > >> -- > >> ________________________________________________________________ > >> Bob Briscoe http://bobbriscoe.net/ > >> > >> > >> -- > >> ________________________________________________________________ > >> Bob Briscoe http://bobbriscoe.net/ > > > > -- > > ________________________________________________________________ > > Bob Briscoe > > http://bobbriscoe.net/ > >
- [auth48] [C350] AUTH48: RFC-to-be 9331 <draft-iet… rfc-editor
- [auth48] [AD] Re: [C350] AUTH48: RFC-to-be 9331 <… rfc-editor
- Re: [auth48] [AD] Re: [C350] AUTH48: RFC-to-be 93… Bob Briscoe
- Re: [auth48] [AD] Re: [C350] AUTH48: RFC-to-be 93… Martin Duke
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Karen Moore
- Re: [auth48] [AD] Re: [C350] AUTH48: RFC-to-be 93… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Karen Moore
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Karen Moore
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Karen Moore
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <draf… Karen Moore
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Karen Moore
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <draf… Karen Moore
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Martin Duke
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Martin Duke
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Gorry Fairhurst
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Martin Duke
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Martin Duke
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Koen De Schepper (Nokia)
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Bob Briscoe
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Karen Moore
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Martin Duke
- Re: [auth48] [AD] [C350] AUTH48: RFC-to-be 9331 <… Karen Moore
- [auth48] [C350] AUTH48: RFC-to-be 9331 <draft-iet… Karen Moore
- Re: [auth48] [C350] AUTH48: RFC-to-be 9331 <draft… Bob Briscoe