Re: [core] šŸ”” WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Esko Dijk <esko.dijk@philips.com> Mon, 19 March 2018 10:45 UTC

Return-Path: <esko.dijk@philips.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EDEE7128D2E for <core@ietfa.amsl.com>; Mon, 19 Mar 2018 03:45:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vGgkZDdkm1sG for <core@ietfa.amsl.com>; Mon, 19 Mar 2018 03:45:24 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0135.outbound.protection.outlook.com [104.47.2.135]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5276B126DEE for <core@ietf.org>; Mon, 19 Mar 2018 03:45:23 -0700 (PDT)
Received: from AM4P121CA0001.EURP121.PROD.OUTLOOK.COM (129.75.24.15) by AM5P121MB0036.EURP121.PROD.OUTLOOK.COM (129.75.189.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.588.16; Mon, 19 Mar 2018 10:45:20 +0000
Received: from HE1EUR02FT048.eop-EUR02.prod.protection.outlook.com (2a01:111:f400:7e05::203) by AM4P121CA0001.outlook.office365.com (2a01:111:e400:e2b1::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.588.16 via Frontend Transport; Mon, 19 Mar 2018 10:45:19 +0000
Authentication-Results: spf=neutral (sender IP is 13.80.155.198) smtp.mailfrom=philips.com; ericsson.com; dkim=none (message not signed) header.d=none;ericsson.com; dmarc=fail action=none header.from=philips.com;
Received-SPF: Neutral (protection.outlook.com: 13.80.155.198 is neither permitted nor denied by domain of philips.com)
Received: from EDGE-VM-002.westeurope.cloudapp.azure.com (13.80.155.198) by HE1EUR02FT048.mail.protection.outlook.com (10.152.10.243) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.567.18 via Frontend Transport; Mon, 19 Mar 2018 10:45:19 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (213.199.180.145) by autodiscover.lighting.com (192.168.0.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.1.1034.26; Mon, 19 Mar 2018 10:45:16 +0000
Received: from VI1P121MB0014.EURP121.PROD.OUTLOOK.COM (129.75.24.213) by VI1P121MB0063.EURP121.PROD.OUTLOOK.COM (129.75.190.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.588.16; Mon, 19 Mar 2018 10:45:14 +0000
Received: from VI1P121MB0014.EURP121.PROD.OUTLOOK.COM ([fe80::481b:1c16:5798:8142]) by VI1P121MB0014.EURP121.PROD.OUTLOOK.COM ([fe80::481b:1c16:5798:8142%14]) with mapi id 15.20.0588.017; Mon, 19 Mar 2018 10:45:14 +0000
From: Esko Dijk <esko.dijk@philips.com>
To: Gƶran Selander <goran.selander@ericsson.com>
CC: Marco Tiloca <marco.tiloca@ri.se>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Thread-Topic: [core] šŸ”” WG Call for Adoption on draft-tiloca-core-multicast-oscoap
Thread-Index: AQHTurAvC8oUuZ4/xEaXKwtNH9s4nKPXaKRw
Date: Mon, 19 Mar 2018 10:45:13 +0000
Message-ID: <VI1P121MB0014D688CCED02667AA3E38B9BD40@VI1P121MB0014.EURP121.PROD.OUTLOOK.COM>
References: <DE46411C-EFE7-4D30-B0EC-6FBF6311D1D7@ericsson.com> <DB6P121MB0038392B7975FF42A646FDCC9B3C0@DB6P121MB0038.EURP121.PROD.OUTLOOK.COM> <ae50e98d-bfba-c07c-10d2-69c92e1aef33@ri.se> <VI1P121MB001470B4EE2FE2E26E5E19DB9BD80@VI1P121MB0014.EURP121.PROD.OUTLOOK.COM> <D6C5CECE.A1342%goran.selander@ericsson.com>
In-Reply-To: <D6C5CECE.A1342%goran.selander@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: spf=none (sender IP is ) smtp.mailfrom=esko.dijk@lighting.com;
x-originating-ip: [80.246.199.210]
x-ms-publictraffictype: Email
X-Microsoft-Exchange-Diagnostics-untrusted: 1; VI1P121MB0063; 7:zLBY06vmD7s/tv5GmK+UzOrGrqbuo8Op/Bc0B5fNvu0mK+CjpvDXpL4N+XmvLwdxcGyNvH5IFeb6fYbAbkN+QXqGWgm93iVHvgvziLZihDdZaM7pWvImLs57UO51z4gJQcrpgzARWEdJgrc3yOgaEn+xBorFdmAYAs/VhyB0OBXzpN3kJvtkYqIWSw92gfTpcOK0/6cympbS9oHV/3Xfu6MxcJhVjDcekDi2gzpwoTeEUp8RTdGdrqsaZxR6pHId
x-ms-exchange-antispam-srfa-diagnostics: SOS;
X-MS-Office365-Filtering-Correlation-Id: 41eb0853-4c0c-41d0-5d1c-08d58d868271
X-Microsoft-Antispam-Untrusted: UriScan:(260087099026482); BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020); SRVR:VI1P121MB0063;
X-MS-TrafficTypeDiagnostic: VI1P121MB0063:|AM5P121MB0036:
X-Microsoft-Antispam-PRVS: <AM5P121MB00369911291916EC5F8468C2F2D40@AM5P121MB0036.EURP121.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(37575265505322)(28532068793085)(278428928389397)(192374486261705)(100405760836317)(21748063052155)(260087099026482); UriScan:(37575265505322)(28532068793085)(278428928389397)(192374486261705)(100405760836317)(21748063052155)(260087099026482);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3231221)(944501300)(52105095)(3002001)(6055026)(6041310)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(6072148)(201708071742011); SRVR:VI1P121MB0063; BCL:0; PCL:0; RULEID:; SRVR:VI1P121MB0063; BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93003095)(3002001)(3231221)(944501300)(52105095)(10201501046)(6055026)(6041310)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061750153)(20161123562045)(20161123558120)(6072148)(201708071742011); SRVR:AM5P121MB0036; BCL:0; PCL:0; RULEID:; SRVR:AM5P121MB0036;
x-forefront-prvs: 06167FAD59
X-Forefront-Antispam-Report-Untrusted: SFV:NSPM; SFS:(10019020)(376002)(346002)(39860400002)(366004)(396003)(39380400002)(199004)(189003)(377424004)(5250100002)(4326008)(55016002)(33656002)(9686003)(26005)(316002)(54906003)(6246003)(81156014)(53936002)(53546011)(236005)(25786009)(8936002)(81166006)(105586002)(478600001)(3846002)(7696005)(6116002)(6506007)(186003)(76176011)(99286004)(6916009)(6306002)(2950100002)(106356001)(68736007)(102836004)(93886005)(229383001)(54896002)(59450400001)(66066001)(2906002)(7736002)(966005)(229853002)(606006)(2900100001)(74316002)(86362001)(3280700002)(19609705001)(3660700001)(575784001)(790700001)(53946003)(14454004)(6436002)(97736004)(5660300001)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1P121MB0063; H:VI1P121MB0014.EURP121.PROD.OUTLOOK.COM; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: lighting.com does not designate permitted sender hosts)
X-Microsoft-Antispam-Message-Info-Original: uWJ8t0Bk4cS7uYVqp/FM2niWe68f+ubNQsDurv7zayvMeXA5qGJFREOhkgOwblbs7zFe9jPV0/BHMDBsnvt4p2D+3s0yvKDnPuxhAMNnQjM4SPMbAE0d2nW4ujASlxFbIDbSatDyMxC/w29eA+koxwN+i3MORmcZ+LFW8Lil7LCW7Y7lCqlNO+rlsHxv0uS3WZZporhz0mjIuDqrcOgjlg9yKbkhWMp/24FQE/a8NtFArMd8cRldG6rxtvjz3h7s7cCi6dYW5kIZQ74qp4EMHJuWqMC5iJOUz2YqcZTUz20tuJeZQ3461hJgmPR3Lo50VHViZgnj5pLhBvgKhc5SXA==
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1P121MB0014D688CCED02667AA3E38B9BD40VI1P121MB0014EURP_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1P121MB0063
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: HE1EUR02FT048.eop-EUR02.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:13.80.155.198; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(39380400002)(346002)(39860400002)(396003)(376002)(2980300002)(199004)(189003)(377424004)(16586007)(6506007)(59450400001)(6246003)(606006)(5660300001)(9686003)(68736007)(53946003)(99286004)(316002)(26005)(55016002)(33964004)(81166006)(8936002)(61614004)(81156014)(14454004)(6306002)(53936002)(2906002)(86362001)(575784001)(229853002)(356003)(54896002)(336012)(236005)(53546011)(2950100002)(102836004)(84326002)(6916009)(106466001)(93886005)(33656002)(25786009)(5250100002)(229383001)(966005)(6116002)(105586002)(790700001)(2900100001)(3846002)(54906003)(22756006)(76176011)(4326008)(7736002)(66066001)(74316002)(498600001)(26826003)(97736004)(7696005)(579004)(559001); DIR:OUT; SFP:1102; SCL:1; SRVR:AM5P121MB0036; H:EDGE-VM-002.westeurope.cloudapp.azure.com; FPR:; SPF:Neutral; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; HE1EUR02FT048; 1:94ADSaM646eu2kFRsYW3wZyOPmh/H1B1dvkj557JGtw3v3RdgvtPvDP/jDoZzt8VkrXV5hG/gCPBcaX99u7Bn2nLAjkA/tIisZStjdwPoCcsVLOft57i59647kjITfws
X-Microsoft-Antispam: UriScan:(260087099026482); BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989060)(5600026)(4604075)(4534165)(4627221)(201703031133081)(8559017)(8990040)(2017052603328)(7193020); SRVR:AM5P121MB0036;
X-Microsoft-Exchange-Diagnostics: 1; AM5P121MB0036; 3:TV0pOPpLt4DFZJfVFNI8iQgn+lC3+vJktJhapZjqCzjFkBXKNc/wFDTQ6awL5sXZNxm+ekq0uHwkEBFIn20v752IiYOKBRdPunxyQGYNOh8erlw9irC6hVSSQq18cwzrCv1D1WM2w7/QUA7inUwOH63KEmAi6L40CSeg7Ld04MiW7DGS56jR4BVaswXt64U5GbpY1FpM8DBDMSPb4eSsQha59/iaOtqQ2yNZp5g/rKY3zdp6Pj6aP+wXziKP9hd/LfCfQemstkY6aTewm53/cV7nuzNLqiwnR77eNUjfOx7/Y881r0O3CfQKxLM/MrXV4Jr2vGVM1CgZS3mKz1WOrM0ymTJ8RLaxP9XrXJupFfGwyKzNG8AhWvYHbY1QweAeVejZD9KyE7DlCifZh9wuNA==; 25:gz/z/cPNn3MHIKWkZJo841tOwwnGpZ4zqNmssrl+THNcnjwSdhplCL+mzMt1vR8THSfgmcfyYWvKQZttFgUlrirlvnoaqzTMYr9hrC2iPoq7KB423HP8iQTVF8krJxn98P3U34JWmzZfM9UYCyVT+/uTVIU6+Zfp77lv+z7hbzQ3fA4H9yaYxjSzCb5JO/xWUJJpZUf1koCXD53P6R2maouhOoWDN4zfTXEryCoexgsU14NPDsfGxw6sGm4jxAqFGTRCDTiPZV58MNrMBqYoRS5ntO3pZ7fRLmNdK9nuMHY2kyEuaKVHtFX82yMWrWVbp1cEEsWP6/xnNjEmBiz9eg==
X-Microsoft-Exchange-Diagnostics: 1; AM5P121MB0036; 31:kMVLzVM5SrdMiHriJG/2UNCYoGqodyskM3L+gBymObnpxn54XhAICtOHud18GMmLAfYnNdHTqEELKaKP6DCwtcQ9RhaByh0kp+Nlv7HNdB8GrJ74abQoljqZn6USCL/StPDAdW+z/nfJaZ8W59rnwLpwb/Zcs57PlS3j//AFPU8tZLYk5Anntfw8VrM4HDyKSwkbG/mSRkX9Yvcj+bZFCW8gxG50BnVJS/IBUSgdTWs=; 20:DcL0+eMmtSezgMB5iJX9/1jW07Vwc0memmkG0lTMXH9lRHuZwAA7FOMyp9VGkLiLVTvcKJ/sgyQv0zV1sb4TBoyrvmcS2XOJSsGw/wmDK6XA+x84NEhv2MgsWHgHFRgJa7mb+ljvgDkVxSpQNht99llQts9HJEdy9xKY8NXysdQZa8kuId8AgYZpUQPHnMeeD5eZicRV/szxCo3XXSqpiyIWqT/6Uoxeu//b3+yXOHvANyfCnqqXh4nh4hJrnq5CxOHtQnJnVBkWqKHQG3oH/avE6Z6eJMJuwA2AJ+LYfYQaIX8Qqp+ql0B07S22yjs7T4GDPM6BX+PnhSkqLGWSSS0sD3ezHRCJiRswlCJj8W3UpTigdQ1ZXhi7vKmr1ITVyJjnxGQtdrRgsJBsrLGvFDcx7F66IN42I5uv4XQYs+e+FxDUToh2I/yD18/Fr4Hz+ig6wToopHkGZbvGe9X977iEExvnDfFiBVhokFikJJNec27I/IBnwxVQxyva47R/
X-Microsoft-Exchange-Diagnostics: 1; AM5P121MB0036; 4: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
X-Forefront-PRVS: 06167FAD59
X-Microsoft-Exchange-Diagnostics: 1; AM5P121MB0036; 23:f0GzntKmOJziyyisAdawDIxkUl3lATxCz9rkocY/4e/dg9/vmJiJrmFWszZyDYuczPobxySKTFTyM8lK8MaKXLc3clIYiCHQmmyQAXJPZlmcycoVmoD67feqNr6vdsCJpfzSXb0DvJXJSDfXygiksfHSkSdKoEfJ/Oqj2p/zElGgHEeaDUR7TQnSS3PFQSOLfMkGhYmj26lEoiszk1P3UBu2Vq3DUJqS1axlpOeh4WGUmnP6wtwwFXQNH2IrRjtpwuBAQ9YBBYPCrR7tgt6F2KYT4nBMpbNtS1URUesUtdgTWEJxw8vkv9r4EdXkIBxO0GRj7xheFGaTp9WNPuIiVoZjbc7NV2+WTe8MNIhz1I6HSTcXwuqZiI+X7Tw/bKfTtRz3KTaQitUp3Gnmy3p42Pvt+GDE6fH99yafMTz3jdG2LQW2kLBuauGO/2xDo+2Ayjj0RvajW+bTrjVCn2jP72HpeUZYri73rl+Nk+FtYxfTYgLsnBWUe/u0Sj8LyuF77Fi7MIjN80OIwUCQOul+c470m4/tdGrunqPhOa31GUfQefkpiexaDeDHzYqI4RHlPzJUUOSpxicVW4saQbvFUcU2b8Ui4jiSOorDKh0AHRbw79V3YlZSWGoXP1f0kHMr9Bgj3GpEw6guF5gT+kems/4IBN5qjGSi0NBqFEjfmOMA3cVOOQx4dEhlRepPPBf6vH/wEPUFu18SGvLunHvGjEjS88gUCMrGEJGTi4RyMxuSH53JWNbXBoheXoPx8C9q91EA+GdiOxjdNtAyPwVHxmsSssXnGcV4C2zeuBXfYkVUMBdhN2IZYzBCtjLiuhWMskAoZEJHIt/2P3oXYM1GMHO5xmZqjVL5cWWzrlKvgTJzOcbyapCGz1/wCqr//0G1XvaSdl0TgsR8IDHF8EBTV/PkoPOaR/wjC18mgL2NFeMXF6NCbRF6WptT8QLwN1O2paxaDxB/joq37BhcfQOvR1m2lIb84UHnzLj5sdPk4z5IjrZ58WkSQrecPxsBgPr067cSXGZFxNcWh7KnBOhEIucQXPxERM4aDD1Mbjee2pYIFwfXIxMMWNA5wVz5ALpuhEfwfstSssZYSf39cQt/KU1joIgvP1MYXcBWUu6L6hXKCoz1lMiknCPwNrWAFvHgkh91cRZHqWectljae0DbS/qSj2eKgmWMiQIs2wznvlA0dWOL/RrDbiV4fIdeeD+hUEVknuppQDu1Mi4C2EPN+MwQn3L3J7QHCB0Y1LWH+GghGMkVr+Qqy4CJ4QV/pN5nszXZwSq4oZlqDj0HIv0pBW9QLrSYKxBjjWi+fSp9IiuHNQo7HpF3wCsag8oRIirg7HcKCRGTMsI2uscFoI+dI5voR5mjFDSwV40yuP3PhwIuPok6g/s0w6Kfy5+upAV5WF8kLAwgK9OgldTJzBLFT1s8ry0cCvVfId0ba1jiSctrQP7pGAigXpIzFdB1jZsGRycItviubEtMjZUPbM/IlQ4YpKkhjQFpiGaGZEYL7LPK8/UguB6Dx5LKPiWguTfU
X-Microsoft-Antispam-Message-Info: PkqZyu25BkxuU7Z+0hP1pBOAxqMTdSuFySpwb+5A9dtVYBRNBYgnFYYl7hgnB/rMGo5xda+8qbAkx52aEcft1wSH8VS+VuVNQy5DcGmnWG5xaEvqT/N4zMbVfKVNI/Ziqfo+f8BnbK3+dHVgD3BPkaSZxnpZ4p5alZFvLqmX8zdTGcmbxcwLqgIjPEHzuoIL3Oo7K7e6K8aTQ2QO3t0n5sG6Hrklh4AxOUEJvxQoNPtXbYA7DHMAYa82z2rlcH/Obn0P0ssLx1sN4OCleCInhcgMJLQ0N269p0KjXdsaJPAD6LD9GQHOlqqQgs4ObK0YXQ3aC0hx7aLQ70MNp7MHig==
X-Microsoft-Exchange-Diagnostics: 1; AM5P121MB0036; 6:H/NMYKBNZzDug7XvOTY9OtyA6h9/4n/Xtx+yxVXlElfqS4gv5VgReN4XIjXk2Ora6aPGQDnFCryqTDPqjmYMx8x74L3tDQumBpMFC8WVsF+FdvJLwhJKjFOC4KgrzUYL0UJSQqNam1ZI7QSCDYsDxz1WcuPr7Dzw5eimma684S9VpySaP0q4/eBtSx+GqHZ/877L1cjZMMzbfJYu97A7/PG73sCLqi3nhkAmsVP54y0CCy5p4YBL/Op7JIlgOYW+mSCWmkd+x0uHinsasOESw3XP1zzx6OZfXf/q10LblGd+E3kjOwJw1x9wyQF5rlHvr3yPoBB54/gwMuibz6yVqOYP5i6Xh6vvGj8R0cAdlf2J9dcIR3jjC1jo8K2/dff+SMIsFxFgpe7bgYY57P7VHQ==; 5:LwW6FdSvGdQ+Z0oXCU+kbMPOeIrOP4xnhbQ+EyunVu4Yt2mVbUcco49hXA0GBu8vkJEbtrCULbQkSpadnGeTNGsXT06c1F7n8T12UBTEGIdKsXyHDnDTCT8NgZPYoXP3XAdEdcG0UyO0mawdXB92B/WKZbCeMKOQf71WGo8Jbok=; 24:APgFHwAe+aT1VX3qBgMEEQhzyAv1oNuq064y8TjN81dAW1mptxCXFhWdvNXNIVzdGVtNSKhqlZLrqO7HNzDPX5yU0+/n4m0+wYFiVf3wfrc=
X-Microsoft-Exchange-Diagnostics: 1; AM5P121MB0036; 7:Opeugo/Q70Axq6DiS9ylXNcrAfJKvcDP2oNHIlBorVUIJ1JWWs9MAyknCPsUxqAIxIid+ywSJsHCCEzZewJ3iSOioC1AYOwy+cyPpojbf0fGKz8R0UriB2qmmR3PGug4yqdOqaoWBx34f7NAg1tG8BT0i3nwApAgil4H7QPahjybqjHoi5NjNTM2Tfd2lJUTjCnEbXxVYm5cocVAwfOtUiurhRrmTrL0Z7pYUPb2p2U8snrKpUSRsKjTQcugakl2
X-OriginatorOrg: lightingaad.onmicrosoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Mar 2018 10:45:19.4207 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 41eb0853-4c0c-41d0-5d1c-08d58d868271
X-MS-Exchange-CrossTenant-Id: 75b2f54b-feff-400d-8e0b-67102edb9a23
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=75b2f54b-feff-400d-8e0b-67102edb9a23; Ip=[13.80.155.198]; Helo=[EDGE-VM-002.westeurope.cloudapp.azure.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5P121MB0036
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/HMDJM3zX16Om7b2XwazEktgUBm4>
Subject: Re: [core] šŸ”” WG Call for Adoption on draft-tiloca-core-multicast-oscoap
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Mar 2018 10:45:28 -0000

Thanks, that is clear now. So rephrasing the term ā€œnegligible probabilityā€ in Section 2 and Appendix C could help in this respect. How small this probability should be is up to the system designer in this case.

Esko

From: Gƶran Selander <goran.selander@ericsson.com>
Sent: Tuesday, March 13, 2018 10:47
To: Esko Dijk <esko.dijk@philips.com>; core@ietf.org WG (core@ietf.org) <core@ietf.org>
Cc: Marco Tiloca <marco.tiloca@ri.se>
Subject: Re: [core] šŸ”” WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Hi Esko,

Thanks for good comments!

Letā€™s recap the setting: The sender and recipient of a group OSCORE message needs to retrieve/derive the right security context for sending and receiving requests and responses, and the amount of data sent for this purpose should be as small as possible. This should apply to all phases of communication; first time, normal operation, after member has been excluded, etc.



The OSCORE message format includes the 'kid' and the 'kid context'. For the group setting:

* the kid contains the ID of the sending group member (Sender ID), unique in the group, assigned by the group manager (which could be just a short byte string).

* The kid context contains the group identifier, also assigned by the group manager and unique for this group manager. The kid context is a "context hintā€ helping the recipient endpoint find the security context. If endpoints are deployed with multiple uncoordinated group managers then they need to be able to handle coinciding group identifiers, e.g. by trying multiple security contexts to see if if any verifies. As long as the Master Secret is different for different groups (and different epochs of a group) and the Sender IDs within the group are unique, that is sufficient to make AEAD key and nonce different.



So there is no need for negligable probabilty of coinciding group identifiers as long as the recipient can find its way to the right security context. But in the case of an endpoint being in multiple groups managed by different group managers, it is of course favourable if the group identifiers are different. So we should rephrase this accordingly.



Further comments inline.

From: core <core-bounces@ietf.org<mailto:core-bounces@ietf.org>> on behalf of Esko Dijk <esko.dijk@philips.com<mailto:esko.dijk@philips.com>>
Date: Wednesday 7 March 2018 at 09:29
To: Marco Tiloca <marco.tiloca@ri.se<mailto:marco.tiloca@ri.se>>, Jaime JimƩnez <jaime.jimenez@ericsson.com<mailto:jaime.jimenez@ericsson.com>>, "core@ietf.org<mailto:core@ietf.org> WG (core@ietf.org<mailto:core@ietf.org>)" <core@ietf.org<mailto:core@ietf.org>>
Subject: Re: [core] šŸ”” WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Thanks Marco,

This update solves the issues I think and answers my questions, except for the randomness in the Gid:  ā€œA Gid MUST have a random component and be long enough, in order to achieve a negligible probability of collisions between Group Identifiers from different Group Managersā€; and Appendix C.

The example Appendix C uses a single random byte.  Most people would think the collision probability is quite high in this case; so how can this choice satisfy the requirement?

See above.

Maybe in this example the Group Managers pick a random value and then mutually verify that there are no collissions?


Yes, if there is coordination between group managers, but this is not necessary for the scheme to work as noted above.

The name ā€œGroup Epochā€ could be slightly confusing here ā€“ Appendix C states the epoch applies to a single group. However the example there shows the epoch applies to all groups from the same Group Manager, or in other words the epoch *is* the group. (Because there is no thing like ā€œGroup IDā€ in the example, only GM random byte and Group Epoch bytes.)  Was it intended to add a byte or so for ā€œGroup IDā€ ? So that each group can have its own epoch counter.


The intent was that the Group ID consists of a Group Prefix and a Group Epoch. The need for a group prefix is to allow a constant identifier of the group. The need for group epoch is to allow endpoints to find the right Master Keys used in the group at a certain time.

 Group identifiers may be constructed in other ways that makes the recipient find the right security context.

Hope that helps.

Thanks,
Gƶran


Esko



From: Marco Tiloca <marco.tiloca@ri.se<mailto:marco.tiloca@ri.se>>
Sent: Monday, March 5, 2018 23:18
To: Esko Dijk <esko.dijk@philips.com<mailto:esko.dijk@philips.com>>; Jaime JimƩnez <jaime.jimenez@ericsson.com<mailto:jaime.jimenez@ericsson.com>>; core@ietf.org<mailto:core@ietf.org> WG (core@ietf.org<mailto:core@ietf.org>) <core@ietf.org<mailto:core@ietf.org>>
Subject: Re: [core] šŸ”” WG Call for Adoption on draft-tiloca-core-multicast-oscoap


Hello Esko,



Thanks for your support and comments, we have considered them when producing the latest version of the  draft [1].



Please, find in line some answers to your comments.



Best,

/Marco



[1] https://tools.ietf.org/html/draft-ietf-core-oscore-groupcomm-01

On 2017-12-04 14:35, Esko Dijk wrote:
I also support the adoption of this draft as a work item for CoRE. Below are the results of a quick review, also.

Best regards
Esko Dijk


Overall comments ā€“ or work that the WG could take up next
Ā·         Detailed example with message sizes would be useful. Since itā€™s important for multicast over 6lowpan performance that the IPv6 packets stay small enough (one 802.15.4 frame). At this moment, I canā€™t judge that yet easily based on the draft.


[MT] We have now included detailed examples in Sections 3.1 (Request) and Section 3.2 (Response).



Ā·         Normally, for applications (e.g. Building automation and lighting) groups do need a stable and non-random group ID, that identifies the group over time even as changes occur, e.g. members added/removed. The ā€œGidā€ in the draft however changes. There could be some text added to explain how Gid is linked to a stable ID. E.g., this could be configured by the Group Manager. The stable group ID is then not used over-the-wire for multicast OSCORE.


[MT] It is true that the Gid in this draft changes over time, especially upon renewing the group keying material, and the Group Manager is the only responsible for managing its value update. However, this Gid has to be intended as the identifier of the OSCORE ā€œsecurity groupā€, including as members the endpoints that share the same Common Security Context.

[MT] As you say, applications do rely on a stable and non-random group ID, which is not used over-the-wire for group OSCORE, and instead identifies an ā€œapplication groupā€ having as members the endpoints that participate in a same group application. There is no relation between this application-level group ID and the OSCORE Gid defined in this draft. However, one may possibly map multiple ā€œapplication groupsā€ to the same ā€œsecurity groupā€.

[MT] In order to clarify this point, we included also a definition of ā€œGroupā€ and ā€œGroup IDā€ in Section 1.1.


Ā·         There is normative text in the Appendices; it could be clarified what the status of this is. E.g. only normative if one chooses to implement the optional element described in the Appendix?I have a preference for avoiding normative text in the Appendices, but Iā€™m curious to hear what others think.

[MT] We relaxed the text in Appendices to avoid normative references, with the exception of a ā€œNOT RECOMMENDEDā€ in current Appendix F ā€œNo Verification of Signaturesā€.



Ā·         The text sometimes suggests that a secure group context is linked to one and only one multicast IP address. In practice, there may be more variety ā€“ e.g. one multicast IP address plus one or more unicast IP addresses to which the group message is subsequently delivered. E.g. repeat of the group message to members which did not get it yet. The proposed solution could be reviewed with that view in mind, that there may be multiple (multicast/unicast) IP destination addresses to which a group message will be sent. I did not do that yet; can do so in a future in-depth review.


[MT] Thanks, thatā€™s a very good comment. Weā€™ll think more on the possible view you propose. It should be fine as long as a recipient is able to retrieve the right group Security Context, by using the Gid.




Section 2.1
Some things here are listed as out of scope, but they do come back later in the doc ā€“ such as forward security and backward security , which are addressed I think ā€“ certainly not out of scope.


[MT] Group OSCORE does not ensure forward security and backward security itself. Instead, they are entrusted to the specifying group rekeying protocol enforced by the Group Manager. The specific rekeying protocol if out of scope for Group OSCORE, which however recommends the use of one able to ensure backward and forward security in the group.




Section 3
" Gid MUST be random " -> seems to contradict Appendix B which uses an Epoch counter in the Gid.  Should it say ā€œMUST have a random componentā€ ?


[MT] Right, now fixed (in current Appendix C).




Appendices

  *   Appendix B, a concrete example instance is missing. E.g. ā€œw3fj90f0a_0042ā€ or its bstr equivalent  (just guessing here to the format)


[MT] We added an example, in current Appendix C.




  *
  *   Appendix C, is this an example blueprint of how to do it ā€“ fully optional to follow or not follow this?


[MT] We relaxed the text in current Appendix D, as for the time being it is intended to be a guideline example.




  *

Minor

  *   ligthing -> lighting
  *   enpoint  -> endpoint
  *   Pg 25 , [I-D.ietf-ace-dtls-authorize] reference breaks across line and as such becomes non-searchable in the browser. And I like these refs to be searchable šŸ˜‰





From: core [mailto:core-bounces@ietf.org] On Behalf Of Jaime JimƩnez
Sent: Thursday, November 23, 2017 17:59
To: core@ietf.org<mailto:core@ietf.org> WG (core@ietf.org<mailto:core@ietf.org>) <core@ietf.org><mailto:core@ietf.org>
Cc: ji-ye.park@uni-due.de<mailto:ji-ye.park@uni-due.de>
Subject: [core] šŸ”” WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Dear all,

The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap<https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.

Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.

Target to end the WGA is 14th of December.

Ciao,
- - Jaime JimƩnez


________________________________
The information contained in this email may be confidential and/or legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this email is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original email.





_______________________________________________

core mailing list

core@ietf.org<mailto:core@ietf.org>

https://www.ietf.org/mailman/listinfo/core




--

Marco Tiloca, PhD

Research Institutes of Sweden

RISE ICT/SICS

Isafjordsgatan 22 / KistagƄngen 16

SE-164 40 Kista (Sweden)

Phone: +46 (0)70 60 46 501

https://www.sics.se



The RISE institutes Innventia, SP and Swedish ICT

have merged in order to become a stronger research

and innovation partner for businesses and society.



SICS Swedish ICT AB, has now changed name to RISE SICS AB.