Re: [dispatch] New I-D - SPIN - on voice/video interop between app providers

Eric Rescorla <ekr@rtfm.com> Thu, 04 August 2022 17:46 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BB90C15A722 for <dispatch@ietfa.amsl.com>; Thu, 4 Aug 2022 10:46:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8iOkZvqNTCrZ for <dispatch@ietfa.amsl.com>; Thu, 4 Aug 2022 10:46:30 -0700 (PDT)
Received: from mail-il1-x12b.google.com (mail-il1-x12b.google.com [IPv6:2607:f8b0:4864:20::12b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF6A6C14F74C for <dispatch@ietf.org>; Thu, 4 Aug 2022 10:46:29 -0700 (PDT)
Received: by mail-il1-x12b.google.com with SMTP id j20so280142ila.6 for <dispatch@ietf.org>; Thu, 04 Aug 2022 10:46:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=qN+p8nPVpcUKGQnhVJTYQubN/0jqYUnYlc98kX4VveY=; b=HDVqEHAWlLi8/WeHqYSaBQNyTv6p0hZllFgULPK7orU312U3qvpOCkoTCCahUQtKrg M50CqCHY4MgShwusGUy5m6tW1k8nwzK7KLtfnCIaZP/0GUybDdl4NO0Mn91xid0/10Y/ 3tNWZXcCo4rEBXY5ojbniKeh1Fyv3WKwNKQPdciGlCy/ljnFfmg3bbPwKdXHN2agKzip yLkgTaEkwMEvSWGCXA4ABJensv2qtnupVaRAewNkVGzX/tVJItkd9jQmieBM85lbNspd BqNZnjIPI994JL1TrA3Z7gfcTa5JYZxAP6GZ7fzQ0nNxqu8eJoCdKPgeJ+7gH1UC2QJN 5dCQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=qN+p8nPVpcUKGQnhVJTYQubN/0jqYUnYlc98kX4VveY=; b=eLkEAkZhSqUDyr7dExpn80w1ioyXr8gnHW/zFVhNrwQzb4cKqcoyIWS55GHcMAITjy JxPxAN/RrJxEJYneSj4mJ04KynCkqdHmi/RUOTT9xSaIRaC2VyFhuhB3I6QLXGCN2sw7 b7f98Vwmgnr8wM/fBySzk2MCOmr2nJIS26G9/dYhvxdSbrBzkp68iAhLAtH2Eeq9zw2U F5MbjavtdCw8j4lgHg+hmfN9/ye1ABPNhUPqAffw1UBDPS3H9HlTQJHjlI8sQWaLOaJm 7LaaP7pM8aUyrR5c/veLcVqsDixGmb+pU1guZxoXGabVMsYay2No68ymZoblIy0KzQbo codg==
X-Gm-Message-State: ACgBeo1oScCVL6KAh4e2nUDna671dMd+cUl2yPJCKlwuEHEp4VQHxNsk izFAjSLxTtM/hRhLsWFY+Aau4a/5Su0XgBNcGKYFqw==
X-Google-Smtp-Source: AA6agR6ipIsxRs96YLpI2McdoPPkeI0oh5fnjJfl1Igpg7u+Ll6B2ZPXTZ+e7ieH1FHZgTbd6IHC4VUAX0JgAqKaG7M=
X-Received: by 2002:a92:d08c:0:b0:2de:3356:4ef3 with SMTP id h12-20020a92d08c000000b002de33564ef3mr1332977ilh.224.1659635189031; Thu, 04 Aug 2022 10:46:29 -0700 (PDT)
MIME-Version: 1.0
References: <CA+23+fFReP7fi2XmhGoxmeUph8F7HcABsFwriXPzBvuBPBXLMg@mail.gmail.com> <CABcZeBME68imZqnOqc3hE7OOHWsTgRz+c1y9NKTT6vUHfSCLsQ@mail.gmail.com> <CA+23+fECuFKC9KPiJD0rugw4TWwDEsJr6MtGPVdLmsr4iopAjQ@mail.gmail.com> <CABcZeBNWqY3z4TCwpg6f0hTdDwc_rD+ReJ0M8Nyz_v5EUcUmow@mail.gmail.com> <BD6088D2-5C18-49F6-BB01-694102749E8B@shockey.us> <BL0PR06MB44991E3E2770B267EA8433E2FB939@BL0PR06MB4499.namprd06.prod.outlook.com> <CACW8--PYfbJ7DjZy1yby65e9BYY576R1wk0imZ+C5D7FSqz2xA@mail.gmail.com>
In-Reply-To: <CACW8--PYfbJ7DjZy1yby65e9BYY576R1wk0imZ+C5D7FSqz2xA@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 04 Aug 2022 10:45:53 -0700
Message-ID: <CABcZeBOHqxKOaT=VBrpaKvwmtzyWdd725+Atd2D=+tCecNyTgA@mail.gmail.com>
To: Rohan Mahy <rohan.mahy@wire.com>
Cc: Jonathan Rosenberg <jdrosen@five9.com>, Richard Shockey <richard@shockey.us>, Jonathan Rosenberg <jdrosen@jdrosen.net>, DISPATCH <dispatch@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e63d0905e56dedac"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/-TayO2Ig9ywi68bBzE6ZfVZYdG8>
Subject: Re: [dispatch] New I-D - SPIN - on voice/video interop between app providers
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Aug 2022 17:46:34 -0000

In case people are interested, I wrote up an overview of the discovery
situation (SPIN, etc.).

https://educatedguesswork.org/posts/messaging-discovery/

This also includes some ideas about how to address the privacy issues
around centralized discovery.

-Ekr


On Sun, Jul 24, 2022 at 2:25 PM Rohan Mahy <rohan.mahy@wire.com> wrote:

> Re: discussing SPIN in MIMI
>
> The MIMI bar bof is only an hour. I also have two drafts I would love to
> talk about, but we likely won't have time to discuss any specific drafts.
> We should figure out scope/requirements and do some BoF proposal bashing.
>
> Thanks,
> -rohan
>
> On Sat, Jul 23, 2022, 18:18 Jonathan Rosenberg <jdrosen@five9.com> wrote:
>
>> Not currently on dispatch agenda. I was planning to discuss it at the
>> mimi bof on Monday.
>>
>> Get Outlook for iOS <https://aka.ms/o0ukef>
>> ------------------------------
>> *From:* dispatch <dispatch-bounces@ietf.org> on behalf of Richard
>> Shockey <richard@shockey.us>
>> *Sent:* Saturday, July 23, 2022 3:30:47 PM
>> *To:* Eric Rescorla <ekr@rtfm.com>; Jonathan Rosenberg <
>> jdrosen@jdrosen.net>
>> *Cc:* DISPATCH <dispatch@ietf.org>
>> *Subject:* Re: [dispatch] New I-D - SPIN - on voice/video interop
>> between app providers
>>
>>
>>
>>
>> This is part of dispatch on Monday right? Ok this should be fun and
>> Jonathan I did find my Dynamicsoft cap.
>>
>>
>>
>> Ok but I do want to make abundantly clear that I have no objections for
>> this work to go forward.  I do have some experience in the issues involving
>> discovery <cough cough> … BTW I’ve been anxious for Brother Peterson to
>> chime in here. ☺
>>
>>
>>
>> Its just I’m enough of an old curmudgeon to understand the very very
>> significant headwinds you are going to run into.
>>
>>
>>
>> It is a great discussion BTW.
>>
>>
>>
>> —
>>
>> Richard Shockey
>>
>> Shockey Consulting LLC
>>
>> Chairman of the Board SIP Forum
>>
>> www.shockey.us
>> <https://protect-us.mimecast.com/s/6uh-C5yVlksMp4LYTzsKYN?domain=shockey.us>
>>
>> www.sipforum.org
>> <https://protect-us.mimecast.com/s/V4MECjR5vjtYGPQ1hxn_5N?domain=sipforum.org>
>>
>> www.sipnoc.org
>> <https://protect-us.mimecast.com/s/EiuSCkRBwktkX1z3F0Wymz?domain=sipnoc.org>
>>  (2022)
>>
>> richard<at>shockey.us
>> <https://protect-us.mimecast.com/s/RsxEC82WonSXPLp8UM6_rg?domain=shockey.us>
>>
>> Skype-Linkedin-Facebook –Twitter  rshockey101
>>
>> PSTN +1 703-593-2683
>>
>>
>>
>>
>>
>> *From: *dispatch <dispatch-bounces@ietf.org> on behalf of Eric Rescorla <
>> ekr@rtfm.com>
>> *Date: *Saturday, July 23, 2022 at 11:30 AM
>> *To: *Jonathan Rosenberg <jdrosen@jdrosen.net>
>> *Cc: *DISPATCH <dispatch@ietf.org>
>> *Subject: *Re: [dispatch] New I-D - SPIN - on voice/video interop
>> between app providers
>>
>>
>>
>> > Lots of good thoughts in here. I'll start with two initial reactions
>> > to your comments (and hoping we can discuss further at mimi on
>> > Monday):
>> >
>> > You are correct that the current SPIN protocol design does require
>> > both parties to be concurrently online. Since the originating party is
>> > the one initiating communications, this means they'll be online
>> > anyway. So the issue is that of the receiving party. Practically
>> > speaking, since this is targeted at mobile, the amount of time these
>> > devices are on and connected to the Internet is very high.
>>
>> This rather to be fitting the problem statement to the solution
>> rather than the solution to the problem statement. AFAICT the
>> DMA doesn't limit interop requirements to mobile and there are
>> plenty of people connected to messengers on desktop. Similar
>> comments apply to the limitation to E.164 numbers and not e-mail
>> addresses, as sftcd observed.
>>
>>
>> > And that is my second comment - that it requires some kind of central
>> > authority (the RS or "Richard SHockey" ;) in your proposal). This
>> > central authority will have a full catalog of phone numbers for all
>> > users globally along with their communications applications. That is
>> > worrisome from a privacy perspective, but also a practical perspective
>> > of - who would be willing to run such a service, how does it monetize
>> > to justify costs, etc? With SPIN, there is no new actor that needs to
>> > be introduced. SPIN also doenst require the user's contact information
>> > to ever be stored in the cloud by Apple or Google; the real-time
>> > nature of the address resolution means it can be stored locally
>> > on-device. I think this provides a higher degree of privacy and doesnt
>> > require the OS vendors to do something they arent already doing,
>> > reducing the barrier to deployment. Apple/Google dont need to run a
>> > new cloud service, they just need to add another preference stored
>> > on-device.
>>
>> I would make several points here.
>>
>> First, it's a mistake to think that Google and Apple don't need to run
>> a new cloud service. In SPIN the originator has a credential from the
>> OS vendor, which effectively makes the OS vendor a CA. CAs need high
>> availability to handle new issuance, revocation, etc. I suppose you
>> could redesign the system to have two-way online SMS verification,
>> but that's not how it looks now, and that would come with some
>> new potential problems.
>>
>> Second, as I observed in my email, if we're willing to deal with a
>> very small number of mobile device vendors--which is inherent in the
>> current SPIN design--then each device vendor can just run its own
>> database and callers can try both. Note that by assumption the device
>> vendor already knows your number and as a practical matter they at
>> least know which messaging apps you have installed, even if not which
>> ones you have accounts on (via the app store).
>>
>> WRT the overhead of the service, I think you're rather overestimating
>> the investent here: we have a sense of what it costs to run something
>> of about this scale in the form of Let's Encrypt and we're talking on
>> the order of 10 million/year. If it's the OS vendors who do it, it's
>> not like they don't have much larger services already. It's true that
>> it isn't necessarily in their interest to do so, but the whole premise
>> of this work is that they are subject to a regulatory mandate, so I
>> don't think that's really dispositive. Even if it's to be third party
>> service, it doesn't seem like it need be that hard to fund, given
>> that, again, this is the result of a government mandate. One could
>> also imagine user fees paid by messenger apps, etc.
>>
>> I do think the privacy point is a very real concern, especially if
>> it's not run by the device vendors, who, as I say, largely have this
>> information already. There are really two concerns here:
>>
>> 1. The existence of the database.
>> 2. The ability of entities to query it.
>>
>> The existence seems like it's addressable in a number of ways.  For
>> example, you could have a central service which you query which only
>> knows which vendor is associated with which device, and then queries
>> the vendor on your behalf (insert crypto handwaving here).
>>
>> The existence of a query interface at all seems somewhat more
>> challenging.  However, I would note that many of these systems already
>> effectively have such an interface (for instance if you can try to add
>> someone to your buddy list and it behaves differently if they exist or
>> not), and need to have rate limiting and other anti-scraping measures.
>> We might be able to repurpose these techniques here. Finally, I
>> would note that SPIN actually provides the same interface in
>> the form of the phone and so will need its own anti-probing
>> mechanisms, except that those have to be distributed, whereas
>> these can be decentralized.
>>
>> Anyway, looking forward to the discussion next week.
>>
>> -Ekr
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> On Sat, Jul 23, 2022 at 7:26 AM Jonathan Rosenberg <jdrosen@jdrosen.net>
>> wrote:
>>
>> Lots of good thoughts in here. I'll start with two initial reactions to
>> your comments (and hoping we can discuss further at mimi on Monday):
>>
>>
>>
>> You are correct that the current SPIN protocol design does require both
>> parties to be concurrently online. Since the originating party is the one
>> initiating communications, this means they'll be online anyway. So the
>> issue is that of the receiving party. Practically speaking, since this is
>> targeted at mobile, the amount of time these devices are on and connected
>> to the Internet is very high. As such, I dont know that its worth
>> optimizing for the remaining small percentage when they are not. If this
>> didnt come with tradeoffs, it certainly is a limitation worth addressing.
>> But, I do worry about the tradeoff.
>>
>>
>>
>> And that is my second comment - that it requires some kind of central
>> authority (the RS or "Richard SHockey" ;) in your proposal). This central
>> authority will have a full catalog of phone numbers for all users globally
>> along with their communications applications. That is worrisome from a
>> privacy perspective, but also a practical perspective of - who would be
>> willing to run such a service, how does it monetize to justify costs, etc?
>> With SPIN, there is no new actor that needs to be introduced. SPIN also
>> doenst require the user's contact information to ever be stored in the
>> cloud by Apple or Google; the real-time nature of the address resolution
>> means it can be stored locally on-device. I think this provides a higher
>> degree of privacy and doesnt require the OS vendors to do something they
>> arent already doing, reducing the barrier to deployment. Apple/Google dont
>> need to run a new cloud service, they just need to add another preference
>> stored on-device.
>>
>>
>>
>> Thx,
>>
>> Jonathan R.
>>
>>
>>
>>
>>
>> On Fri, Jul 22, 2022 at 11:22 AM Eric Rescorla <ekr@rtfm.com> wrote:
>>
>> Thanks for starting this conversation.
>>
>> I agree with a number of the the assumptions underlying
>> this proposal, specifically:
>>
>> - What makes this potentially possible where previous efforts have
>>   failed is the force of regulation, specifically the DMA.
>>
>> - Forward message routing is the most practical way
>>   to establish who is entitled to a specific number.
>>
>> However, it seems to me that the specific design you describe
>> has a number of suboptimal properties. In particular:
>>
>> - It requires the sending and receiving endpoints to be jointly
>>   online. This is not unreasonable for voice calling but is
>>   undesirable for messaging.
>>
>> - It makes the OS vendors certificate authorities, which (a) they may
>>   not to be (b) gives users no real choices in their trust decisions
>>   (specifically, even if I am an Apple user, I need to trust Android!)
>>   and (c) is incompatible with purely open source systems.
>>
>> - It requires each individual relying party (caller) to make their own
>>   verification, which makes the kinds of transparency mechanisms we
>>   ordinarily use to detect impersonation or misissuance/misrouting
>>   much more difficult, if not impossible [0].
>>
>> It seems to me that there are alternative designs which do not have
>> this problem.
>>
>> As an intuition pump, consider a system in which we have a single
>> central Resolution Service (RS).
>>
>> - When a user installs a communications application on their device,
>>   that application contacts the RS, demonstrates control of the relevant
>>   number via SMS answerback (i.e., the RS sends them a challenge via
>>   SMS) [1]. The application is then able to store a record at the
>>   RS with the relevant contact information. If there are multiple
>>   applications, there would be multiple records.
>>
>> - The RS issues Alice a credential (e.g., a certificate) which she can
>>   use to authenticate ownership of her number.
>>
>> - When Alice wants to call Bob, she (or rather the calling/messaging
>>   application) looks up Bob's phone number in the registration
>>   service, retrieves the appropriate records, and is able to select
>>   whichever one is appropriate to complete the communication.  Alice
>>   uses her credential to authenticate the call.
>>
>>
>> This system addresses most of my objections above. Specifically:
>>
>> - It doesn't require the endpoints to be jointly online.
>>
>> - It is fully compatible with open source because it doesn't
>>   require trusting the OS or OS vendor on the other end.
>>   It doesn't give the user choices about who to trust because
>>   they have to trust the RS (but see below).
>>
>> - It doesn't require online user verification, and so is
>>   compatible with Certificate Transparency type systems,
>>   audit of the RS, etc.
>>
>> I do want to flag one potential privacy issue with this class of
>> design, which is that it allows the calling party to determine which
>> messaging/calling applications a given user uses.  By contrast, a
>> design like the one in SPIN allows for filitering on the receiving
>> side (though that doesn't seem to be in the document). I'm not sure
>> how big an issue this is, given that you can often join each service
>> and then try to connect, but it's not ideal.  I do have some handwavy
>> ideas for how to address this (e.g., ACLs uploaded the RS), but
>> they're not fully fleshed out. I do think it's possible to address,
>> however.
>>
>> Obviously, one giant RS isn't that desirable (although as I understand
>> it, this is effectively how Local Number Portability works in the
>> NANP). With that said, one view of the current SPIN proposal is that
>> it has two big RSes, one run by Apple and one by Google: as described
>> in S 5, the originating party has already done effectively the
>> registration flow I describe above:
>>
>>    There are two ways in which the originating OS can obtain such a
>>    certificate.  In one approach, the mobile OS would perform SMS
>>    verification (again, invisibly, by absorbing the SMS it sends to
>>    itself), and add an additional check of comparing it agaisnt the
>>    mobile numnber the user claimed they owned during provisioning time
>>    of the device.  The mobile OS vendor would be a valid CA, and then
>>    generte a certificate valid for that individual phone number.  In an
>>    alternative model, the telco uses certificate delegation [RFC9060],
>>    and generates a certificate that is handed to the phone during device
>>    provisioning.  The latter approach is more secure in some ways (as it
>>    would no longer depend on SMS forward routability for authentication
>>    of a user), but is much harder to deploy.
>>
>> In fact, one could design something with roughly similar security
>> properties to the current draft by simply having Apple and Google
>> expose an RS API for the endpoints which had already registered as
>> above. The caller could then look up the target number in both Apple
>> and Google APIs and skip the forward SMS pieces entirely. This seems
>> less desirable than a single RS, but it would have a number of the
>> same advantages, such as not requiring both endpoints to be online
>> and being compatible with transparency mechanisms.
>>
>>
>> With that said, we can also do better than a single central RS.  I
>> don't have a complete design, but some thoughts are below.
>>
>> First, it seems like authentication and discovery are separate
>> services, so we could have multiple CAs for telephone numbers that
>> each do SMS verification (a similar structure to the WebPKI) but a
>> single directory service. This would allow users (or really client
>> applications) to make their own decisions about who to trust.
>>
>> One could also imagine having multiple RSes which stored phone number
>> records as long as there was some mechanism for determining which RS
>> had a given number. That mapping could then be on a single service or
>> just replicated to each application vendor (it's really not that
>> big). This would allow a diversity of RSs but with a single central
>> reference point so the originating party wouldn't need to poll all of
>> them.
>>
>> At any rate, I think this type of architecture is worth considering
>> as an alternative to the design in this specification.
>>
>> -Ekr
>>
>>
>> [0] As an example of this point, consider a nation-state attacker who
>> controls the PSTN and wishes to covertly intercept Alice and Bob's
>> communications: it reroutes the SMS messages from their communication
>> and then completes the call itself. In the analogous context in the
>> WebPKI, this creates a record in the CT log which can then be
>> detected, but that is not the case here.
>>
>> [1] This might require some OS affordances, but I don't think
>> they would be that hard to design.
>>
>>
>>
>>
>> On Tue, Jul 12, 2022 at 7:13 AM Jonathan Rosenberg <jdrosen@jdrosen.net>
>> wrote:
>>
>> Hi fellow dispatchers -
>>
>>
>>
>> I wanted to call attention to the following draft submitted yesterday:
>>
>> https://www.ietf.org/archive/id/draft-rosenberg-dispatch-spin-00.txt
>> <https://protect-us.mimecast.com/s/zrWFC9rGpoSzN9EVCPeIjN?domain=ietf.org>
>>
>>
>>
>> Abstract:
>>
>> This document introduces a framework and a protocol for facilitating
>>
>>    voice, video and messaging interoperability between application
>>
>>    providers.  This work is motivated by the recent passage of
>>
>>    regulation in the European Union - the Digital Markets Act (DMA) -
>>
>>    which, amongst many other provisions, requires that vendors of
>>
>>    applications with a large number of users enable interoperability
>>
>>    with applications made by other vendors.  While such interoperability
>>
>>    is broadly present within the public switched telephone network, it
>>
>>    is not yet commonplace between over-the-top applications, such as
>>
>>    Facetime, WhatsApp, and Facebook Messenger.  This document
>>
>>    specifically defines the Simple Protocol for Inviting Numbers (SPIN)
>>
>>    which is used to deliver invitations to mobile phone numbers that can
>>
>>    bootstrap subsequent communications over the Internet.
>>
>>
>>
>> Right now, we're looking to see if there is interest in working on this.
>> Comments welcome.
>>
>>
>>
>> Thx,
>>
>> Jonathan R.
>>
>>
>>
>> --
>>
>> Jonathan Rosenberg, Ph.D.
>> jdrosen@jdrosen.net
>> http://www.jdrosen.net
>> <https://protect-us.mimecast.com/s/Vbm-C0RE2NtkgZw0F3V7Le?domain=jdrosen.net/>
>>
>> _______________________________________________
>> dispatch mailing list
>> dispatch@ietf.org
>> https://www.ietf.org/mailman/listinfo/dispatch
>> <https://protect-us.mimecast.com/s/J12sCgJ8xOfqwpZ5cZUHyI?domain=ietf.org>
>>
>> _______________________________________________ dispatch mailing list
>> dispatch@ietf.org https://www.ietf.org/mailman/listinfo/dispatch
>> <https://protect-us.mimecast.com/s/J12sCgJ8xOfqwpZ5cZUHyI?domain=ietf.org>
>>
>> ------------------------------
>>
>> CONFIDENTIALITY NOTICE: This e-mail and any files attached may contain
>> confidential information of Five9 and/or its affiliated entities. Access by
>> the intended recipient only is authorized. Any liability arising from any
>> party acting, or refraining from acting, on any information contained in
>> this e-mail is hereby excluded. If you are not the intended recipient,
>> please notify the sender immediately, destroy the original transmission and
>> its attachments and do not disclose the contents to any other person, use
>> it for any purpose, or store or copy the information in any medium.
>> Copyright in this e-mail and any attachments belongs to Five9 and/or its
>> affiliated entities.
>> _______________________________________________
>> dispatch mailing list
>> dispatch@ietf.org
>> https://www.ietf.org/mailman/listinfo/dispatch
>>
>