Re: [CDNi] [E] Re: FW: New Version Notification for draft-fieau-interfaces-https-delegation-subcerts-01.txt

"Mishra, Sanjay" <sanjay.mishra@verizon.com> Thu, 24 February 2022 03:43 UTC

Return-Path: <sanjay.mishra@verizon.com>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFED23A0DCB for <cdni@ietfa.amsl.com>; Wed, 23 Feb 2022 19:43:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=verizon.com header.b=aC/qz8Nj; dkim=pass (2048-bit key) header.d=verizon-com.20210112.gappssmtp.com header.b=fU4UJjWz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zi75Lz79AMYT for <cdni@ietfa.amsl.com>; Wed, 23 Feb 2022 19:43:43 -0800 (PST)
Received: from mx0a-0024a201.pphosted.com (mx0a-0024a201.pphosted.com [148.163.149.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A2C83A0DF9 for <cdni@ietf.org>; Wed, 23 Feb 2022 19:43:43 -0800 (PST)
Received: from pps.filterd (m0098392.ppops.net [127.0.0.1]) by mx0a-0024a201.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 21NMRgX3025937 for <cdni@ietf.org>; Wed, 23 Feb 2022 22:43:42 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=verizon.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=corp; bh=oy9z2cWcZ7eeoxnyPdgd6c/go7Yv3z0+ArucZ+bBtmI=; b=aC/qz8NjdhVSau4yJR/1N4iwbDXdMWlXcP7jDox0FJ3o2q7bYek+stpKLyubd86Hznsx sXcl0d4UdMsMLT7/Y1BEz4Xh5CjErC5x7LrAuVKE5e0EMPYpBlGUM0enSsl4k23hWtv0 XA6UkOxE54NNoINpq98Mu0s9uocClf4NX34=
Received: from mail-qk1-f198.google.com (mail-qk1-f198.google.com [209.85.222.198]) by mx0a-0024a201.pphosted.com (PPS) with ESMTPS id 3ed7y7syvk-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <cdni@ietf.org>; Wed, 23 Feb 2022 22:43:42 -0500
Received: by mail-qk1-f198.google.com with SMTP id c19-20020a05620a0cf300b005f17891c015so1091204qkj.18 for <cdni@ietf.org>; Wed, 23 Feb 2022 19:43:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=verizon-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oy9z2cWcZ7eeoxnyPdgd6c/go7Yv3z0+ArucZ+bBtmI=; b=fU4UJjWzyjxkdsojvuhgScYIjEsK3aYtKqz/wJnYbUJzV7e9tyHQdDBQuGQ1Feehqe yx8rnESpEWDHAZkORs4SNHiuPFCvzuZGA7i+EUMKl3Ayc4AAH0NkF4f2aOirQoZdps9A maASMbhSPf10Tab8UvZ33DZYujaJnLLJK0CpuYoXW6T0SN9XAEKz2fHQdpGuDIjTp0Zu aoZCUVDsgmBTuolJJtHi5tHMfzh23sNKaN2ktw63I3YC2erh8g0HJPNP1ojcvDtn2pK+ mnx5Jv6YbA5ZZHb6Z3CjZLmhzmblX0bCilX5cIfLQezyBoAjzc3MlYew2a1AvdhLPmKj aEvw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oy9z2cWcZ7eeoxnyPdgd6c/go7Yv3z0+ArucZ+bBtmI=; b=Glpbmfhc7Prpx8KmvPQAPdSmseO96IElWFd6VjkoiUbb2J19oX81/C6WifozsS6Xfo NCUVe7eJK2pzd8XTaAQr27KbCkszxq6Q18wSNtma7M9L1k549oUnL8nD0ogQR6OeuXaM PcY009BdWasgGpaTtEOg1xEsoC9u5caaeL3Vid+uikoVpncE/IbOaVMSeTlwFuIEPSQy pf1/1tzgUsxOJd0ResMkw0mpNR/zaYNpI+p53o2Rnyi1FwSbGZS9STP4y3oibl+nKFVL bwxqtuN7pwOdpB5dqycCtH5XCtcmXCoDg28tZEVDgQ+cLgGy0jQwkOWurVhT05foaLim TFaQ==
X-Gm-Message-State: AOAM532JpaIP45Zjsck3Rycuml0J9J5ectRlhML46jxEM07Lb4fZVSTP aprk560rxXdMRQI6kDGctCfKL1ZpWD8ez8rrPzbxrKi2lHNuWkJOGOXx8Do2Ep2jH0ksan3YyZV XuYti+nFV/MwdN6QWU8c=
X-Received: by 2002:ad4:5442:0:b0:432:1429:21f6 with SMTP id h2-20020ad45442000000b00432142921f6mr482243qvt.72.1645674220372; Wed, 23 Feb 2022 19:43:40 -0800 (PST)
X-Google-Smtp-Source: ABdhPJyuonF8NA604JhBbOFSjeR/BC018IN/TDPwaciw5wGzjJFXb8f8KMgHAfgJ6ALaAX6H169ryjuX8CvbyQ4ahBM=
X-Received: by 2002:ad4:5442:0:b0:432:1429:21f6 with SMTP id h2-20020ad45442000000b00432142921f6mr482227qvt.72.1645674219810; Wed, 23 Feb 2022 19:43:39 -0800 (PST)
MIME-Version: 1.0
References: <164321280803.8419.9611477208216008922@ietfa.amsl.com> <PRAPR10MB5273E44C9F88EBE2882AEBC08F209@PRAPR10MB5273.EURPRD10.PROD.OUTLOOK.COM> <CAMrHYE0TaHxBD7PH7Gc36T6zJWHo4kWQxHCDR4s_mWw0C2Ss1A@mail.gmail.com> <PRAPR10MB5273B098872588130F6A47E08F349@PRAPR10MB5273.EURPRD10.PROD.OUTLOOK.COM>
In-Reply-To: <PRAPR10MB5273B098872588130F6A47E08F349@PRAPR10MB5273.EURPRD10.PROD.OUTLOOK.COM>
From: "Mishra, Sanjay" <sanjay.mishra@verizon.com>
Date: Wed, 23 Feb 2022 22:43:28 -0500
Message-ID: <CA+EbDtD7=0=_WEbrntiT2kjnt5_Pdu8p6Q2BJOdUr_JvbHZh5w@mail.gmail.com>
To: Christoph Neumann <Christoph.Neumann@broadpeak.tv>
Cc: Kevin Ma <kevin.j.ma.ietf@gmail.com>, "cdni@ietf.org" <cdni@ietf.org>, Guillaume Bichot <Guillaume.Bichot@broadpeak.tv>, FIEAU Frédéric INNOV/NET <frederic.fieau@orange.com>, STEPHAN Emile INNOV/NET <emile.stephan@orange.com>
Content-Type: multipart/alternative; boundary="00000000000049c54c05d8bb6309"
X-mailroute: internal
X-Proofpoint-GUID: 4M0guVYGup6-TF_qNuwv3dpapylg9VaO
X-Proofpoint-ORIG-GUID: 4M0guVYGup6-TF_qNuwv3dpapylg9VaO
Archived-At: <https://mailarchive.ietf.org/arch/msg/cdni/x_D0rL6g9_nk1S7U6jSXLWnU3CA>
Subject: Re: [CDNi] [E] Re: FW: New Version Notification for draft-fieau-interfaces-https-delegation-subcerts-01.txt
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Feb 2022 03:43:48 -0000

Hi Christoph - Thank you for submitting the updated draft. Speaking as an
individual, I do support this work and in favor of adopting this draft (and
assuming subcert draft -
https://datatracker.ietf.org/doc/draft-ietf-tls-subcerts/ - will progress
to an RFC)

The complimentary suggestion you outlined below might be workable from what
I see, that is,  dCDN advertise  MI.DelegatedCredentials through a
dedicated new FCI object named e.g., FCI.delegatedCredentials and the uCDN
when configuring the dCDN would then use an MI object (we can name it
MI.ConfDelegatedCredentials) to communicate the delegated credentials.

I do have some minor nits in the document:

sec 2.1: discribeq -> describes
sec 3: you can update reference to ACME drafts to RFC, namely RFC 8739 and
RFC 9115, specifically in the text
" There are currently Internet drafts within the TLS and ACME working
groups..."
sec 4: " With FCI the dCDN" -> "with FCI, the dCDN"

Thanks
Sanjay


On Tue, Feb 15, 2022 at 12:13 PM Christoph Neumann <
Christoph.Neumann@broadpeak.tv> wrote:

> Hi Kevin,
>
>
>
> Thanks for your comments.
>
>
>
> MI.DelegatedCredentials may or may not be part of the Metadata Interface
> (MI) described in RFC8006 (In theory, it should not part of it, I agree
> with you here, at least as it is in the current proposal) but it should be
> somehow part of CDNi .
>
>
>
> The way to retrieve MI.DelegatedCredentials as defined in the proposal is
> a bit particular. As only the dCDN knows how many delegated credentials
> (MI.DelegatedCredentials) it needs , it must fetch/request as many
> MI.DelegatedCredentials as required. On the other side, the uCDN may decide
> to respond with different or identical MI.DelegatedCredentials payloads.  I
> also note that there is an error in the current text which can be a bit
> confusing: page 4: second paragraph, we should read:
>
>
>
> “The MI.ConfDelegatedCredentials contains a URI (credentials-location-uri)
> that allows the dCDN to download delegated credentials. The expected
> behavior of this URI is that each time that the dCDN accesses this URI a
> *MI.DelegatedCredentials* object containing a delegated credential with
> its corresponding private key is delivered.”
>
>
>
> I reckon this workflow is not typical to RFC8006 which would favor a
> separate/new interface for describing that process. This drives to the
> possibility of only adding MI.ConfDelegatedCredentials to MI (RFC8006) .
> However, if we cannot describe the protocol to fetch the
> MI.DelegatedCredentials object and its payload structure (i.e. private key
> +  DelegatedCredential as defined in [I-D.ietf-tls-subcerts]) as part of
> CDNi, the MI.ConfDelegatedCredentials becomes pointless. Ideally, we should
> generate a new CDNi interface dedicated to subcert describing the
> MI.DelegatedCredentials payload and the protocol between the uCDN and dCDN.
>
>
>
> There is however a possible complementary solution to this. The dCDN may
> advertise about supporting the subcert capability through a dedicated new
> FCI object named e.g., FCI.delegatedCredentials. The latter would indicate
> the number of required [different] delegated credential objects. The uCDN
> when configuring the dCDN would then use an MI object (we can name it
> MI.ConfDelegatedCredentials) to communicate the delegated credentials (i.e.
> private key +  DelegatedCredential) via an array of MI objects. I.e,
> MI.ConfDelegatedCredentials would be defines as:
>
> Property: array of MI.DelegatedCredentials objects.
>
>
>
> The MI.ConfDelegatedCredentials object would have to be
> updated/communicated by the uCDN each time any or all of the delegated
> credential’s validity is going to expired and/or each time a new
> FCI.delegatedCredentials object is updated/created.  With that way to do we
> stay compatible with the RFC 8006 spirit, do not need an extra CDNi
> interface and provides a complete/coherent mechanism for configuring the
> dCDN with the delegated credentials.
>
>
>
> Any thoughts on this latter proposal?
>
>
>
> Christoph
>
>
>
>
>
> *From:* Kevin Ma <kevin.j.ma.ietf@gmail.com>
> *Sent:* vendredi 11 février 2022 07:04
> *To:* Christoph Neumann <Christoph.Neumann@broadpeak.tv>
> *Cc:* cdni@ietf.org
> *Subject:* Re: [CDNi] FW: New Version Notification for
> draft-fieau-interfaces-https-delegation-subcerts-01.txt
>
>
>
> Hi Christoph,
>
>
>
>   (As Chair) I think it is fair to call for adoption of the draft, since
> it was just a split, though I think it would be good to reaffirm that the
> WG has an appetite for this work, since it has been a while since we agreed
> to adopt the original draft.  If folks could please confirm on the list
> that they believe TLS subcerts are still useful to support in CDNI, that
> would be great.
>
>
>
>   (As an Individual) The actual requirements to support TLS subcerts seem
> pretty minimal (see my comments on the draft below).  Assuming the TLS
> subcerts draft is on track to be published (I see that the AD recently
> requested a revision), I am in favor of adopting the draft.
>
>
>
> thanx!
>
>
>
> --  Kevin J. Ma
>
>
>
> comments:
>
> ---------
>
>
>
> - does "MI.DelegatedCredentials" need to be defined in this draft?  It is
> not transferred via the MI?  is "MI.ConfDelegatedCredentials" sufficient
> for CDNI's purposes?
>
> - in the call flows, it looks like only steps 3 and 4
> for "MI.ConfDelegatedCredentials" are related to CDNI?  perhaps we could
> make that even more clear, so that there aren't a lot of questions about
> the security of what's being proposed?
>
> - the draft needs security and privacy sections (the security section gets
> easier if we are clear that the draft only really defines
> the "MI.ConfDelegatedCredentials" object which is a simple link and
> subcerts does all the heavy security lifting; the privacy section gets
> easier if we remove MI.DelegatedCredentials and let the subvert draft deal
> with passing around a "private key")
>
>
>
>
>
>
>
> On Wed, Jan 26, 2022 at 11:33 AM Christoph Neumann <
> Christoph.Neumann@broadpeak.tv> wrote:
>
> Dear all,
>
> I submitted a new version of the draft on CDNI Metadata for Delegated
> Credentials (see below).
>
> As discussed and agreed in the CDNi working group, this draft resulted
> from splitting the original CDNi extensions for HTTPS delegation draft
> (draft-ietf-cdni-interfaces-https-delegation) into two:
> - one that handles STAR/ACME type delegation, which remained in
> draft-ietf-cdni-interfaces-https-delegation
> - one that handles delegated credentials, described in
> draft-fieau-interfaces-https-delegation-subcerts
>
> The delegated credentials draft is currently handled as an individual
> submission, and I would like to ask for adoption of this draft in the CDNi
> working group.
>
> Further, feel free to comment the draft on the mailing list.
>
> Best regards,
> Christoph
>
> -----Original Message-----
> From: internet-drafts@ietf.org <internet-drafts@ietf.org>
> Sent: mercredi 26 janvier 2022 17:00
> To: Christoph Neumann <christoph.neumann@broadpeak.tv>; Emile Stephan <
> emile.stephan@orange.com>; Frederic Fieau <frederic.fieau@orange.com>;
> Guillaume Bichot <guillaume.bichot@broadpeak.tv>; Stephan Emile <
> emile.stephan@orange.com>
> Subject: New Version Notification for
> draft-fieau-interfaces-https-delegation-subcerts-01.txt
>
>
> A new version of I-D,
> draft-fieau-interfaces-https-delegation-subcerts-01.txt
> has been successfully submitted by Christoph Neumann and posted to the
> IETF repository.
>
> Name:           draft-fieau-interfaces-https-delegation-subcerts
> Revision:       01
> Title:          CDNI Metadata for Delegated Credentials
> Document date:  2022-01-26
> Group:          Individual Submission
> Pages:          9
> URL:
> https://www.ietf.org/archive/id/draft-fieau-interfaces-https-delegation-subcerts-01.txt
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__fra01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Farchive-252Fid-252Fdraft-2Dfieau-2Dinterfaces-2Dhttps-2Ddelegation-2Dsubcerts-2D01.txt-26data-3D04-257C01-257CChristoph.Neumann-2540broadpeak.tv-257C31b30e046460458449b208d9ed24543b-257C0ebe44eac9c9438da0407e699f358ed4-257C0-257C0-257C637801562557792088-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C2000-26sdata-3DQFaHDtkpfYfrjAYDDoIXmSdxmjt04eywDjttAdk4FLo-253D-26reserved-3D0&d=DwMFAw&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=QjjUn69il_VLl2_ZtkdTjiIbmyAzWXLQRqnJxCj0t0wC_wR6DWLnpOfaE8JHmcRv&s=s3f77k5Em7VVOqCwNr8SRn6X03iC9nzC8lDsgEujKQ4&e=>
> Status:
> https://datatracker.ietf.org/doc/draft-fieau-interfaces-https-delegation-subcerts/
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__fra01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fdatatracker.ietf.org-252Fdoc-252Fdraft-2Dfieau-2Dinterfaces-2Dhttps-2Ddelegation-2Dsubcerts-252F-26data-3D04-257C01-257CChristoph.Neumann-2540broadpeak.tv-257C31b30e046460458449b208d9ed24543b-257C0ebe44eac9c9438da0407e699f358ed4-257C0-257C0-257C637801562557792088-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C2000-26sdata-3D-252FPtgxFHH9o8Ze-252FwpdzoY-252FMRfUKqGhnA-252FcKNEmp7a5-252F4-253D-26reserved-3D0&d=DwMFAw&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=QjjUn69il_VLl2_ZtkdTjiIbmyAzWXLQRqnJxCj0t0wC_wR6DWLnpOfaE8JHmcRv&s=g1N8j2Rc3vHnqvRqPH0IAVdFwM8twr_KCwzIhN1s9qs&e=>
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-fieau-interfaces-https-delegation-subcerts
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__fra01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fdatatracker.ietf.org-252Fdoc-252Fhtml-252Fdraft-2Dfieau-2Dinterfaces-2Dhttps-2Ddelegation-2Dsubcerts-26data-3D04-257C01-257CChristoph.Neumann-2540broadpeak.tv-257C31b30e046460458449b208d9ed24543b-257C0ebe44eac9c9438da0407e699f358ed4-257C0-257C0-257C637801562557792088-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C2000-26sdata-3DWn1-252B4HCdvDzpfYTK3ZEyXnS3Rwi-252BKn6hvusuA02hkqA-253D-26reserved-3D0&d=DwMFAw&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=QjjUn69il_VLl2_ZtkdTjiIbmyAzWXLQRqnJxCj0t0wC_wR6DWLnpOfaE8JHmcRv&s=BsUD_gxsSYpcNVymSV9RKdwwHoB5Cdda0odiSfOf-K4&e=>
> Diff:
> https://www.ietf.org/rfcdiff?url2=draft-fieau-interfaces-https-delegation-subcerts-01
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__fra01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Frfcdiff-253Furl2-253Ddraft-2Dfieau-2Dinterfaces-2Dhttps-2Ddelegation-2Dsubcerts-2D01-26data-3D04-257C01-257CChristoph.Neumann-2540broadpeak.tv-257C31b30e046460458449b208d9ed24543b-257C0ebe44eac9c9438da0407e699f358ed4-257C0-257C0-257C637801562557792088-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C2000-26sdata-3DcG1nvUUcogl7El1rhkA14b1Lltcca-252FpDazw8JTSj6PA-253D-26reserved-3D0&d=DwMFAw&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=QjjUn69il_VLl2_ZtkdTjiIbmyAzWXLQRqnJxCj0t0wC_wR6DWLnpOfaE8JHmcRv&s=_h7Jzulev3K3_KSLtGrsLxdKZlZOwbIt0pkisosIldY&e=>
>
> Abstract:
>    The delivery of content over HTTPS involving multiple CDNs raises
>    credential management issues.  This document defines metadata in CDNI
>    Control and Metadata interface to setup HTTPS delegation using
>    Delegated Credentials from an Upstream CDN (uCDN) to a Downstream CDN
>    (dCDN).
>
>
>
>
>
> The IETF Secretariat
>
>
> _______________________________________________
> CDNi mailing list
> CDNi@ietf.org
> https://www.ietf.org/mailman/listinfo/cdni
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__fra01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Fmailman-252Flistinfo-252Fcdni-26data-3D04-257C01-257CChristoph.Neumann-2540broadpeak.tv-257C31b30e046460458449b208d9ed24543b-257C0ebe44eac9c9438da0407e699f358ed4-257C0-257C0-257C637801562557792088-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C2000-26sdata-3Db1aEa-252FVaj-252Fkyzf8zUJGCX8cUwfWKezIdQLWHA41uMlE-253D-26reserved-3D0&d=DwMFAw&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=QjjUn69il_VLl2_ZtkdTjiIbmyAzWXLQRqnJxCj0t0wC_wR6DWLnpOfaE8JHmcRv&s=6f-Vb6IwmHwLh63CJhtn2plNPPirspfcJO7akno7p70&e=>
>
> _______________________________________________
> CDNi mailing list
> CDNi@ietf.org
>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_cdni&d=DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=QjjUn69il_VLl2_ZtkdTjiIbmyAzWXLQRqnJxCj0t0wC_wR6DWLnpOfaE8JHmcRv&s=r5k5X_b-klPZtRJY_mFktNZ1ofc8eLRXweTh-GMMyBI&e=
>