Re: [CDNi] FW: New Version Notification for draft-fieau-interfaces-https-delegation-subcerts-01.txt

Kevin Ma <kevin.j.ma.ietf@gmail.com> Sat, 09 July 2022 15:12 UTC

Return-Path: <kevin.j.ma.ietf@gmail.com>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26E8AC157B4C for <cdni@ietfa.amsl.com>; Sat, 9 Jul 2022 08:12:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.005
X-Spam-Level:
X-Spam-Status: No, score=-7.005 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QKykg4vQqirl for <cdni@ietfa.amsl.com>; Sat, 9 Jul 2022 08:12:06 -0700 (PDT)
Received: from mail-pl1-x62f.google.com (mail-pl1-x62f.google.com [IPv6:2607:f8b0:4864:20::62f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6BA44C157B42 for <cdni@ietf.org>; Sat, 9 Jul 2022 08:12:06 -0700 (PDT)
Received: by mail-pl1-x62f.google.com with SMTP id p16so1131135plo.0 for <cdni@ietf.org>; Sat, 09 Jul 2022 08:12:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=RCgXHiOg+1KuVKGbL4zuEnybmCH5rH4eDobFiPjws+E=; b=nlUzoPtEegLKFI3fm5B/khksSsI7NZ+cX7MJ4iCLJh7z0glkI6UY64o5L3Te8LD/96 yfYaCD908Vmm9qoJwF2a7wtEHN/LJAmAgFiHmpVXCJ22Oy+aJz9d9UNbUIOaRWu2RnPU IOd4CDdv3Z5Yo9IzMapfTeWVOVoviH+HX32d0J49wUyknwi0wVM5u4tdv7KeXLTtPwzv xOsHvVGG/KodcJGILta9jaxy1BGIqco/QxwmZsK0pdWeKwONN1wEKE6ZS7JNus3MCovb GxWzgkU5rmdyS6IA5yRTIhr9hSjieRGQuSewTGVaQrRERQEbOEJKPFSi4gjyrs6BxDl7 EHMA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=RCgXHiOg+1KuVKGbL4zuEnybmCH5rH4eDobFiPjws+E=; b=2cg91nhzt6XGhdvGCU6FZT0ptBfgjTVSFkllqRxPN1fQasfVfzSrx9da6r/3+/2AUl WajIXFRgBE/5e98JSwFCBbFhEOoFpCAmX/xffhMUemxRyvKTibndd1E8XkPj2b8BUeBo Gisu7J65xPjSk0UlsghOvMSqRQ31tNUCvsoTlZX0EsZRJkGeV+ab/VRZ+pY5ko2Spviy gPeh0+HZAXuFpdBNwwt/9+163zF0P4KNEzZH8zwFYTcgD9tBa0rhCCVbzUPvX9kr1EU4 hO/FRdIp7w4g4po8mGhUFFx1IPJ+BdJu6R2/0m8Q/xpCMwucuFLGIZD/SEOXUjzuZQvb 5jXg==
X-Gm-Message-State: AJIora/A88KsFGKbnqzQXAkbb+FVyqBlhge7fdgfJzbZEkN+0qoxRWhc E+y7n+HBdnyF5erUrjrRf1hb+RCTVeXEMcn1OHJiFwmItwg=
X-Google-Smtp-Source: AGRyM1uZWNBH/Qw/aUul0K1UYOB960QA4tcnYGMzY0OWFiuTUdB8zKdB1DKqfJB+LQTQ21OygediqgJZMIkoR2Cbdyk=
X-Received: by 2002:a17:903:124e:b0:16b:e975:232f with SMTP id u14-20020a170903124e00b0016be975232fmr9053182plh.165.1657379525748; Sat, 09 Jul 2022 08:12:05 -0700 (PDT)
MIME-Version: 1.0
References: <164321280803.8419.9611477208216008922@ietfa.amsl.com> <PRAPR10MB5273E44C9F88EBE2882AEBC08F209@PRAPR10MB5273.EURPRD10.PROD.OUTLOOK.COM> <CAMrHYE0TaHxBD7PH7Gc36T6zJWHo4kWQxHCDR4s_mWw0C2Ss1A@mail.gmail.com> <PRAPR10MB5273B098872588130F6A47E08F349@PRAPR10MB5273.EURPRD10.PROD.OUTLOOK.COM> <CAMrHYE0bXS4qvGwD49t_2QrCwRt4f9T+fPbFi-w-n69xfkYtUQ@mail.gmail.com> <AM9PR10MB41529F2F26BC09DCDD646FD98F819@AM9PR10MB4152.EURPRD10.PROD.OUTLOOK.COM>
In-Reply-To: <AM9PR10MB41529F2F26BC09DCDD646FD98F819@AM9PR10MB4152.EURPRD10.PROD.OUTLOOK.COM>
From: Kevin Ma <kevin.j.ma.ietf@gmail.com>
Date: Sat, 09 Jul 2022 11:11:54 -0400
Message-ID: <CAMrHYE26KaOBZ14PoemreXXoRhCNjmyf3EMx8e9hwwsFaJgvVg@mail.gmail.com>
To: Christoph Neumann <Christoph.Neumann@broadpeak.tv>
Cc: "cdni@ietf.org" <cdni@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e3eebd05e360bdb5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/cdni/UZl1kDNln0tOuZDoANta-il2d0k>
Subject: Re: [CDNi] FW: New Version Notification for draft-fieau-interfaces-https-delegation-subcerts-01.txt
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2022 15:12:10 -0000

Hi Christoph,

  Thanks for the response.  Some additional thoughts:

> The maximum expiration time of a delegated credential is 7 days. If we
stay in this order of magnitude (i.e.  a credential lasts a few days), FCI
could do the job
> So bottom line: FCI could work, but it we will not be very dynamic (e.g.,
if credentials that last a few hours).

Do we have any data on whether implementers would want really short
durations?  It would be nice to be data driven here, if possible.  I can
certainly see the perceived value of rotating as quickly as possible as it
reduces the potential for criminal enterprise; I could also see using the
cert expiration in a lazy customer managed key revocation scheme.  Are
there specific use cases you have in mind?

> My proposal: Maybe we could start with the FCI based mechanism, knowing
that it will have limitations in terms of dynamicity, and in the meantime
work on how to specify/tackle more dynamic delegated credential fetching
mechanisms

(As an individual) If we think we need higher dynamicity than FCI can
provide, then I would just skip to just trying to figure that out.

(As a chair) I would be interested in hearing what others in the WG think.

thanx!

--  Kevin J. Ma


On Tue, Jul 5, 2022 at 4:42 AM Christoph Neumann <
Christoph.Neumann@broadpeak.tv> wrote:

> Hi Kevin,
>
>
>
> The interface we are proposing to fetch the delegated credentials is
> indeed very simple. Only a req/resp on an URL.
>
> If I understand you correctly you think this is still outside the scope of
> CDNI.
>
> But I’m not quite sure where to define it elsewhere (also because the
> mechanism is quite simple).
>
> I could not find any other existing standard our mechanism that would
> allow us to fetch the delegated credentials.
>
>
>
> Regarding FCI:
>
> The maximum expiration time of a delegated credential is 7 days. If we
> stay in this order of magnitude (i.e.  a credential lasts a few days), FCI
> could do the job: the dCDN monitors the number of credentials that expires
> in the next day, and ask for new ones by announcing this number of required
> delegated credentials via an FCI object (the uCDN will very probably query
> the FCI within the next day).
>
> However, before the first configuration of the dCDN from the uCDN the dCDN
> does not really know how many servers will be used for the uCDN services
> and contents and consequently does not really know how many delegated
> credentials may be needed. I.e., the “first” FCI announcement will be
> something like the number of caching servers available by the dCDN (or the
> number of servers per footprint).
>
>
>
> So bottom line: FCI could work, but it we will not be very dynamic (e.g.,
> if credentials that last a few hours). If we go for FCI, the only MI object
> that would stay is the MI.DelegatedCredentials.
>
> If we want a more dynamic mechanism, we need a simple req/resp interface.
>
> My proposal: Maybe we could start with the FCI based mechanism, knowing
> that it will have limitations in terms of dynamicity, and in the meantime
> work on how to specify/tackle more dynamic delegated credential fetching
> mechanisms (and try to figure out where the right place is to specify
> these).
>
>
>
> Christoph
>
>
>
>
>
> *From:* Kevin Ma <kevin.j.ma.ietf@gmail.com>
> *Sent:* lundi 4 juillet 2022 16:38
> *To:* Christoph Neumann <Christoph.Neumann@broadpeak.tv>
> *Cc:* cdni@ietf.org
> *Subject:* Re: [CDNi] FW: New Version Notification for
> draft-fieau-interfaces-https-delegation-subcerts-01.txt
>
>
>
> Hi Christoph,
>
>
>
>   Adding a new interface to CDNI is definitely out of scope of the current
> charter, and I'm not sure that it really makes sense as part of CDNI.  It
> would be a fairly basic req/resp, so from that perspective, I understand
> why the proposal went with metadata as opposed to an interface.
>
>
>
>   The FCI proposal for advertising how many certs are required is
> interesting.  My one concern (other than security) would be about the
> load.  How often does the required number of subcerts change, and how often
> do the subcerts themselves change and need to be re-retrieved?
>
>
>
>   I think that if an existing interface was already specified for
> retrieving the subcert data, having the metadata convey just a pointer to
> that interface would be much cleaner.  But, the metadata is expected to be
> somewhat ephemeral, so I guess there isn't a reason the data couldn't be
> represented/conveyed as metadata.  My primary concern is still the fact
> that key material is being passed, and that potentially opens up a can of
> worms from a security perspective.
>
>
>
>   I think the discussion of these design choices could certainly be done
> as part of a working group document.  We can try to get a secdir opinion.
>
>
>
>   Are you leaning in a particular direction?
>
>
>
> thanx!
>
>
>
> --  Kevin J. Ma
>
>
>
>
>
>
>
> On Tue, Feb 15, 2022 at 12:12 PM Christoph Neumann <
> Christoph.Neumann@broadpeak.tv> wrote:
>
> Hi Kevin,
>
>
>
> Thanks for your comments.
>
>
>
> MI.DelegatedCredentials may or may not be part of the Metadata Interface
> (MI) described in RFC8006 (In theory, it should not part of it, I agree
> with you here, at least as it is in the current proposal) but it should be
> somehow part of CDNi .
>
>
>
> The way to retrieve MI.DelegatedCredentials as defined in the proposal is
> a bit particular. As only the dCDN knows how many delegated credentials
> (MI.DelegatedCredentials) it needs , it must fetch/request as many
> MI.DelegatedCredentials as required. On the other side, the uCDN may decide
> to respond with different or identical MI.DelegatedCredentials payloads.  I
> also note that there is an error in the current text which can be a bit
> confusing: page 4: second paragraph, we should read:
>
>
>
> “The MI.ConfDelegatedCredentials contains a URI (credentials-location-uri)
> that allows the dCDN to download delegated credentials. The expected
> behavior of this URI is that each time that the dCDN accesses this URI a
> *MI.DelegatedCredentials* object containing a delegated credential with
> its corresponding private key is delivered.”
>
>
>
> I reckon this workflow is not typical to RFC8006 which would favor a
> separate/new interface for describing that process. This drives to the
> possibility of only adding MI.ConfDelegatedCredentials to MI (RFC8006) .
> However, if we cannot describe the protocol to fetch the
> MI.DelegatedCredentials object and its payload structure (i.e. private key
> +  DelegatedCredential as defined in [I-D.ietf-tls-subcerts]) as part of
> CDNi, the MI.ConfDelegatedCredentials becomes pointless. Ideally, we should
> generate a new CDNi interface dedicated to subcert describing the
> MI.DelegatedCredentials payload and the protocol between the uCDN and dCDN.
>
>
>
> There is however a possible complementary solution to this. The dCDN may
> advertise about supporting the subcert capability through a dedicated new
> FCI object named e.g., FCI.delegatedCredentials. The latter would indicate
> the number of required [different] delegated credential objects. The uCDN
> when configuring the dCDN would then use an MI object (we can name it
> MI.ConfDelegatedCredentials) to communicate the delegated credentials (i.e.
> private key +  DelegatedCredential) via an array of MI objects. I.e,
> MI.ConfDelegatedCredentials would be defines as:
>
> Property: array of MI.DelegatedCredentials objects.
>
>
>
> The MI.ConfDelegatedCredentials object would have to be
> updated/communicated by the uCDN each time any or all of the delegated
> credential’s validity is going to expired and/or each time a new
> FCI.delegatedCredentials object is updated/created.  With that way to do we
> stay compatible with the RFC 8006 spirit, do not need an extra CDNi
> interface and provides a complete/coherent mechanism for configuring the
> dCDN with the delegated credentials.
>
>
>
> Any thoughts on this latter proposal?
>
>
>
> Christoph
>
>
>
>
>
> *From:* Kevin Ma <kevin.j.ma.ietf@gmail.com>
> *Sent:* vendredi 11 février 2022 07:04
> *To:* Christoph Neumann <Christoph.Neumann@broadpeak.tv>
> *Cc:* cdni@ietf.org
> *Subject:* Re: [CDNi] FW: New Version Notification for
> draft-fieau-interfaces-https-delegation-subcerts-01.txt
>
>
>
> Hi Christoph,
>
>
>
>   (As Chair) I think it is fair to call for adoption of the draft, since
> it was just a split, though I think it would be good to reaffirm that the
> WG has an appetite for this work, since it has been a while since we agreed
> to adopt the original draft.  If folks could please confirm on the list
> that they believe TLS subcerts are still useful to support in CDNI, that
> would be great.
>
>
>
>   (As an Individual) The actual requirements to support TLS subcerts seem
> pretty minimal (see my comments on the draft below).  Assuming the TLS
> subcerts draft is on track to be published (I see that the AD recently
> requested a revision), I am in favor of adopting the draft.
>
>
>
> thanx!
>
>
>
> --  Kevin J. Ma
>
>
>
> comments:
>
> ---------
>
>
>
> - does "MI.DelegatedCredentials" need to be defined in this draft?  It is
> not transferred via the MI?  is "MI.ConfDelegatedCredentials" sufficient
> for CDNI's purposes?
>
> - in the call flows, it looks like only steps 3 and 4
> for "MI.ConfDelegatedCredentials" are related to CDNI?  perhaps we could
> make that even more clear, so that there aren't a lot of questions about
> the security of what's being proposed?
>
> - the draft needs security and privacy sections (the security section gets
> easier if we are clear that the draft only really defines
> the "MI.ConfDelegatedCredentials" object which is a simple link and
> subcerts does all the heavy security lifting; the privacy section gets
> easier if we remove MI.DelegatedCredentials and let the subvert draft deal
> with passing around a "private key")
>
>
>
>
>
>
>
> On Wed, Jan 26, 2022 at 11:33 AM Christoph Neumann <
> Christoph.Neumann@broadpeak.tv> wrote:
>
> Dear all,
>
> I submitted a new version of the draft on CDNI Metadata for Delegated
> Credentials (see below).
>
> As discussed and agreed in the CDNi working group, this draft resulted
> from splitting the original CDNi extensions for HTTPS delegation draft
> (draft-ietf-cdni-interfaces-https-delegation) into two:
> - one that handles STAR/ACME type delegation, which remained in
> draft-ietf-cdni-interfaces-https-delegation
> - one that handles delegated credentials, described in
> draft-fieau-interfaces-https-delegation-subcerts
>
> The delegated credentials draft is currently handled as an individual
> submission, and I would like to ask for adoption of this draft in the CDNi
> working group.
>
> Further, feel free to comment the draft on the mailing list.
>
> Best regards,
> Christoph
>
> -----Original Message-----
> From: internet-drafts@ietf.org <internet-drafts@ietf.org>
> Sent: mercredi 26 janvier 2022 17:00
> To: Christoph Neumann <christoph.neumann@broadpeak.tv>; Emile Stephan <
> emile.stephan@orange.com>; Frederic Fieau <frederic.fieau@orange.com>;
> Guillaume Bichot <guillaume.bichot@broadpeak.tv>; Stephan Emile <
> emile.stephan@orange.com>
> Subject: New Version Notification for
> draft-fieau-interfaces-https-delegation-subcerts-01.txt
>
>
> A new version of I-D,
> draft-fieau-interfaces-https-delegation-subcerts-01.txt
> has been successfully submitted by Christoph Neumann and posted to the
> IETF repository.
>
> Name:           draft-fieau-interfaces-https-delegation-subcerts
> Revision:       01
> Title:          CDNI Metadata for Delegated Credentials
> Document date:  2022-01-26
> Group:          Individual Submission
> Pages:          9
> URL:
> https://www.ietf.org/archive/id/draft-fieau-interfaces-https-delegation-subcerts-01.txt
> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-fieau-interfaces-https-delegation-subcerts-01.txt&data=05%7C01%7CChristoph.Neumann%40broadpeak.tv%7C8b13163efecf4c81e0a708da5dcad7d5%7C0ebe44eac9c9438da0407e699f358ed4%7C0%7C0%7C637925423647998561%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RgRHcbvAH1wNsTG3WVxQYkKPBqQJyTLh0uWiBdj8j%2B4%3D&reserved=0>
> Status:
> https://datatracker.ietf.org/doc/draft-fieau-interfaces-https-delegation-subcerts/
> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-fieau-interfaces-https-delegation-subcerts%2F&data=05%7C01%7CChristoph.Neumann%40broadpeak.tv%7C8b13163efecf4c81e0a708da5dcad7d5%7C0ebe44eac9c9438da0407e699f358ed4%7C0%7C0%7C637925423647998561%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=BtLMbicItqAPo3gTHkTG20eVpu7LmnHLT3i5uYU5Vig%3D&reserved=0>
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-fieau-interfaces-https-delegation-subcerts
> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-fieau-interfaces-https-delegation-subcerts&data=05%7C01%7CChristoph.Neumann%40broadpeak.tv%7C8b13163efecf4c81e0a708da5dcad7d5%7C0ebe44eac9c9438da0407e699f358ed4%7C0%7C0%7C637925423647998561%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Cb9Za4AgjXJWj5wwiDTjQo6Vvq5Z%2Fd%2BXWqWvPpHdl%2Bk%3D&reserved=0>
> Diff:
> https://www.ietf.org/rfcdiff?url2=draft-fieau-interfaces-https-delegation-subcerts-01
> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-fieau-interfaces-https-delegation-subcerts-01&data=05%7C01%7CChristoph.Neumann%40broadpeak.tv%7C8b13163efecf4c81e0a708da5dcad7d5%7C0ebe44eac9c9438da0407e699f358ed4%7C0%7C0%7C637925423647998561%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=PntkcVDGoNnFsmaiGeG7zuuMAtCEjs8zja05F4HW5Mk%3D&reserved=0>
>
> Abstract:
>    The delivery of content over HTTPS involving multiple CDNs raises
>    credential management issues.  This document defines metadata in CDNI
>    Control and Metadata interface to setup HTTPS delegation using
>    Delegated Credentials from an Upstream CDN (uCDN) to a Downstream CDN
>    (dCDN).
>
>
>
>
>
> The IETF Secretariat
>
>
> _______________________________________________
> CDNi mailing list
> CDNi@ietf.org
> https://www.ietf.org/mailman/listinfo/cdni
> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fcdni&data=05%7C01%7CChristoph.Neumann%40broadpeak.tv%7C8b13163efecf4c81e0a708da5dcad7d5%7C0ebe44eac9c9438da0407e699f358ed4%7C0%7C0%7C637925423647998561%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=vl2YIYd2avXU%2FLCVOXSqVxJV%2BG4ByhH4e4p59R1ao48%3D&reserved=0>
>
> Broadpeak, S.A. Registered offices at 15 rue Claude Chappe, Zone des
> Champs Blancs, 35510 Cesson-Sévigné, France | Rennes
> Trade Register: 524 473 063
> This e-mail and its attachments contain confidential information from
> Broadpeak S.A. and/or its affiliates (Broadpeak), which is intended only
> for the person to whom it is addressed.
> If you are not the intended recipient of this email, please notify
> immediately the sender by phone or email and delete it. Any use of the
> information contained herein in any way, including, but not limited to,
> total or partial disclosure, reproduction, or dissemination, by persons
> other than the intended recipient(s) is prohibited, unless expressly
> authorized by Broadpeak. Broadpeak, S.A. and its affiliates respect privacy
> laws, and is committed to the protection of personal data. Emails and/or
> attachments thereof exchanged between us may include your personal data
> which may be processed by Broadpeak and/or its affiliates according to
> applicable privacy laws & regulations.
> In compliance with Regulation (EU) 2016/679 (GDPR) and applicable
> implementation in local legislations, you can exercise at any time your
> rights of access, rectification or erasure of your personal data, as well
> as your rights to restriction, portability or object to the processing.
> For such purpose, or to know more about how Broadpeak processes your
> personal data, you may contact Broadpeak by email privacy@broadpeak.tv.
> Local authority : Commission Nationale Informatique et Libertés (CNIL): 3
> Place de Fontenoy - TSA 80715 - 75334 PARIS CEDEX 07 or www.cnil.fr
>