Re: [Dlt-networking] updated draft-mcbride-rtgwg-bgp-blockchain

Michael McBride <michael.mcbride@futurewei.com> Thu, 17 November 2022 00:52 UTC

Return-Path: <michael.mcbride@futurewei.com>
X-Original-To: dlt-networking@ietfa.amsl.com
Delivered-To: dlt-networking@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10693C14F74D; Wed, 16 Nov 2022 16:52:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RWhRESPXuvG5; Wed, 16 Nov 2022 16:52:45 -0800 (PST)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on20719.outbound.protection.outlook.com [IPv6:2a01:111:f400:7ea9::719]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF85BC14F725; Wed, 16 Nov 2022 16:52:45 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=as4xe0Ssoy1GuDXKy7RZWhW3vDC8yoop00Bc5Mto4SwmWMLhZOwGr9OUFVFEHmjv2vovn6lDdmFVHQh7zXKg4FD/E2dV3MDDDBdeRACG4DvgWBpoDpVsfnBrsCMbvDVbbHY7LDifGoyak29bjKVrC8eITI8bX9kxoyFXrUPE4U9iMjTuYa2+bVk6yM5FhP1qT1DB54ZJ6qgvCwY0RBBM6Onln2KMtC8HGtQFBj2KKTMvJ6pbPWaAav4zdk5lwDdvc+VHDM2gMfMSejj1lnP0TRXuJoJzpv/LI5YdlIQKrszG3LkzXEj9MWMC1BFTHdhUiTYEgj7MoZSTVAfQBnoZrw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=p+BA7vvUEIWSVyrzq4sESDRxD0f3GbTMJMmxMG/2uUs=; b=eTlrK9h5d3o2L1Fj9TXmJJSTDANCVaXWF/KWKlThGwGTPADBvBw7CB+NYcrexexedULifQojAG8PkWO3fLUg/CzbEf+zaYRIRioFK8mIdU7wTOvofzoDnUj3qg3mr3JT3W8nyx01+OyCvjvaqfXlpPI4M5LXoiXjbhoEA5GBXUEAR1gO168LkDYE2iy081wtUOC2uqk9JenTgJ10/e6ZikoTncCB7MXXCaA8jyyWnJgWe9612RhsULWmULTiC7PT95QaZKAwLa8gt6UCKZhD5UoWk4wfPWuBh/wVbj2eE2FIMxeYrZvOT3p8seb5+Kq6vrQQG/C2mrHtWzIcm5DEFQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=p+BA7vvUEIWSVyrzq4sESDRxD0f3GbTMJMmxMG/2uUs=; b=a/KPU9bF3+T0ZwYRCyuBk1HuWB76Wnxv/FvQrNjbmA25CCfyhTDuOXlxE1Vso7mhRXb+3EBOdkf/LZyVltJDo4PNSI0G6+n834GbNzbtU2f9WHZOnxDNcMHY/L2u0sCb4GO7APw/tbf9s2mNtulryLBJn80KQR0ucFUyXGWjmcc=
Received: from BYAPR13MB2582.namprd13.prod.outlook.com (2603:10b6:a03:b2::19) by SN4PR13MB5809.namprd13.prod.outlook.com (2603:10b6:806:219::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.18; Thu, 17 Nov 2022 00:52:39 +0000
Received: from BYAPR13MB2582.namprd13.prod.outlook.com ([fe80::af57:5913:d486:db3c]) by BYAPR13MB2582.namprd13.prod.outlook.com ([fe80::af57:5913:d486:db3c%4]) with mapi id 15.20.5813.017; Thu, 17 Nov 2022 00:52:39 +0000
From: Michael McBride <michael.mcbride@futurewei.com>
To: Dirk Trossen <dirk.trossen@huawei.com>, Thomas Martin <T.Martin@mmu.ac.uk>, "dlt-networking@ietf.org" <dlt-networking@ietf.org>
CC: "rtgwg@ietf.org" <rtgwg@ietf.org>
Thread-Topic: updated draft-mcbride-rtgwg-bgp-blockchain
Thread-Index: AdiNizfOC7i/Q97wSFOEKWD/+VkxcxsJHYSVAALTD3AAGAEUYA==
Date: Thu, 17 Nov 2022 00:52:38 +0000
Message-ID: <BYAPR13MB2582C7C2937E280BDF86D930F4069@BYAPR13MB2582.namprd13.prod.outlook.com>
References: <BYAPR13MB2582A778C609AE79B203B972F4BD9@BYAPR13MB2582.namprd13.prod.outlook.com> <DB9PR01MB9566BE9C585622CAE4D6AAB5C4079@DB9PR01MB9566.eurprd01.prod.exchangelabs.com> <a8b21371b835403fbca314b27c6d8de4@huawei.com>
In-Reply-To: <a8b21371b835403fbca314b27c6d8de4@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BYAPR13MB2582:EE_|SN4PR13MB5809:EE_
x-ms-office365-filtering-correlation-id: 8f98bda2-a288-4f9f-803b-08dac836067f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR13MB2582.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(346002)(376002)(39850400004)(396003)(366004)(136003)(451199015)(5660300002)(52536014)(71200400001)(41300700001)(8936002)(2906002)(966005)(478600001)(33656002)(15650500001)(38100700002)(83380400001)(166002)(122000001)(6506007)(9686003)(7696005)(86362001)(55016003)(66574015)(53546011)(38070700005)(186003)(316002)(66446008)(4326008)(64756008)(66476007)(66556008)(110136005)(8676002)(66899015)(66946007)(76116006); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: uNSbANcvSB3JsWmj2ISRjEr6EAQyi8DktrXmAlQEWF1U1xYdUpdM1dC/51qsnz5FmqgQ3pyQgTopNRVVvIWz6eOszHzI26636JlfqZ7eSOgc15msMdZhQ3V75CoXNOVIG8FYaEcQzAA0aEGmv5ApibfUxzJ2Hgp2/0MnReferOongZ0iMCz8gXNDTvDlyPv10p7w6dBdLssHtoQNgtTDe9rJWdpTTJ2XpqUefA1aiMdfFa6c3GDile1yNJ/Y71lEfsr64NNhj1nt4QOyGqTPxjte5pXkIz17ZEt+aZE87DIwKf7e3Gc9C1Ii/8vDOCll0sp3FC/wmu8TdLe+JTdfpfGHEYmONnMADoZDUvFGzPj8WKxBdb5NiMKHDBGNj1GTME5xJ6teOOSUtNsYd/rqvQPFw4pi8Tv3xVH0tGSN8mflTVpg18jq1zDRIPUzvXaK96WEMALDethxpx5HjdbSRn5gG2Xtlib04q0rrSYYVyL8tfchUOfvn7EwJ/XqC+79f8UwZS3v0t8kZuaanyo9PslorNywL7RehKRKdE40WnwBP1KOKXUVlZ4FRBzanU2Ll7K3WfS67eHjxNNFV40nWuZWJsn2NUe+kInuB30RUOGxlISujA+m22JFlcN+b7BPEXxA6A7fmSuXdeRE87BdroENclz1VP8pB94agrjeo1K+hWgS/AgRBPbVFl6IvZR+EfJHTbuX0P+5bvFpnTj3NFHAUHUFL8ELOfQrIgaCBwptuEuPWIFGP6/pY83tzaqVn7kc9YAuXhcJS8/iX1VZTFU1Y7bBO4GPQh6Uf6f2RKLvEjFAp8XYC2YobEezqOJT//9Habtz1TnhM3q+6g2s3KebILUiO3Gq0n2j5o+JOdity8IvekXy6H+hflx2lN1bvKMEgEKp7Dbo1xyxoe9Q6BTCdJvsCt77hIw16UwU+6iPavD2Ar2362+ZtUzAdmBTpvy7Tbqr65WUv2iPoiGMuEpBQx8HlCavBurKmr/IrHfZbyOeG5CJjx8XgViw8BOEkJlX10zmO5uKU1+LsWR6IXfejnTNTEDYJ9tEr6UAR7l77tpHlfSRKeL4qZwLvrq9FnmW8GF4gW36fM2DRx6m9mPdGmxNkKpiKGf0SnUp0r1EMWVmJGXjguH63xisH7SkP+Dt19jhRzvDZACB28bolLw+EPKUAsvpBoLj3YDBmY9cokoIgSbTiNxIoiJygYwWE+FyA71LFKk+m4QWpC03wfRO7XGK2vbOigrYxzdr4vX1Vc/7du1Nw2WOihZ1Gsawxl5hW2vCT3ynlrplXm0sdKTYzhGK78+n9+LmDtBMmVPQMmxZMlPt7+HkoojX/0ylsWbxbCy4xuoSwVIZscwR0jvYyWe73sLivRSBL0J8CKYuvpkuWzdr12xZNOfblHGFWQKVM4K+ih1Fk3fghf8Y5sl4W234qc/Y0beOKldcwq8Vj0AffavLF6OVed5wUXsozlvjcQ7sYm5BJuE6XUSj0l6F6EDSNHEh38osK68cUlHZj9kehYjogWgxRe9BaAYt0qANkcgDzgmEACW5ZsbzrBXwgqKrD2XkmqA1sP5y5dD4/jiBxceKXoKU1AtDkZDtCPn+vs+Z6xz+zddeG1vNXiyzgRAaJCRnptn6tuVHUoLwURSZHZMLbWtCYTEVWaqv
Content-Type: multipart/alternative; boundary="_000_BYAPR13MB2582C7C2937E280BDF86D930F4069BYAPR13MB2582namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR13MB2582.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8f98bda2-a288-4f9f-803b-08dac836067f
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Nov 2022 00:52:38.8842 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cEFx9UOEOmcWU2MA5uBBmJGrWxI6rfww9LQDm/CU4Oi6axgvoKfw0MqfYQrCm+aqtyHrKe+ZtelWv21syPDkIQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR13MB5809
Archived-At: <https://mailarchive.ietf.org/arch/msg/dlt-networking/9vD_WX0AY73Ih1jhKQw1booW5WE>
Subject: Re: [Dlt-networking] updated draft-mcbride-rtgwg-bgp-blockchain
X-BeenThere: dlt-networking@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DLT Networking <dlt-networking.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dlt-networking>, <mailto:dlt-networking-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dlt-networking/>
List-Post: <mailto:dlt-networking@ietf.org>
List-Help: <mailto:dlt-networking-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dlt-networking>, <mailto:dlt-networking-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Nov 2022 00:52:50 -0000

Good points Thomas and Dirk.

We will add some of that text to the draft, Thomas, thank you, you are welcome to join the draft as an author if interested. By group of users I was thinking of those devices (minors, validators) which actually create the blocks. Good point about smart contracts, we need to explain their role in greater detail.

Before our next IETF (Yokohama) I'd like to have a draft which proposes specifically how we think blockchain can help a routing protocol such as BGP. The current draft simply provides an overview of various possibilities. It'll probably be a good idea to have a side meeting as well to discuss this topic beyond 10 minutes in rtgwg.

Lastly, some of the comments during the rtgwg meeting (cc'd) included:

  1.  Having a blockchain as part of the bgp control loop is probably not a good thing due it's low transaction speed.
  2.  Only way this may be useful is to show proof of ownership of network assignments (addr, prefix, AS, etc).
  3.  BGP policy may be a good area of focus for blockchain: Address delegation contracts. Billing. ARIN/RIPE databases...

mike

From: Dirk Trossen <dirk.trossen@huawei.com>
Sent: Wednesday, November 16, 2022 5:09 AM
To: Thomas Martin <T.Martin@mmu.ac.uk>; Michael McBride <michael.mcbride@futurewei.com>; dlt-networking@ietf.org
Subject: RE: updated draft-mcbride-rtgwg-bgp-blockchain

Hi Thomas,

Many thanks for the feedback and comments. Good to see the discussion; I will leave it to Mike to decide whether we should reflect this discussion also on the RTG WG list (where the draft was presented). For now, I am quite fine here.

Best,

Dirk

From: Dlt-networking <dlt-networking-bounces@ietf.org<mailto:dlt-networking-bounces@ietf.org>> On Behalf Of Thomas Martin
Sent: 16 November 2022 12:40
To: Michael McBride <michael.mcbride@futurewei.com<mailto:michael.mcbride@futurewei.com>>; dlt-networking@ietf.org<mailto:dlt-networking@ietf.org>
Subject: Re: [Dlt-networking] updated draft-mcbride-rtgwg-bgp-blockchain

Hello,

I've read the draft and I have some comments (first time posting to a IETF mailing list, apologies if there's etiquette I'm not aware of). The proposal seems to be written with a view of putting BGP data in the blockchain and using smart contracts to control how the data is managed. This is creating a single source of truth, something that blockchains are particularly well suited for. However, reading some of the draft indicates to me that there is potential that has not been identified:

"In terms of trust assumptions, a DCS for BGP may require authentication to prevent fraudulent DCS transactions, such as fraudulent BGP announcements being made. For this, the existing RPKI system could be used to authorize any client before sending suitable smart contract transactions into the DCS."

"Furthermore, the DCS could be permissisoned, thereby restricting the nodes holding as well as accessing information to trusted members of the community."

Both of these quotes indicates that authentication/authorisation would need to be added-on to the DCS. Blockchains have inherent authentication through the use of public-private keys. Any action that changes the state of the blockchain ledger requires a signature, which authenticates the entity (only someone with the private key could have created the signature). If you need some method of relating a blockchain address to a real-world entity, then that is something that would need to be added-on. But any blockchain solution should take advantage of the inherent authentication provided by the use of public keys.
[DOT] Your reference to the pub/priv keys used is, in fact, similar to the use of the RPKI system for achieving the same objective. The BGP community is quite familiar with its objective and purpose, hence the mentioning on it rather than the pub/priv keys usually used in BC.

[DOT] When it comes to the permissioned aspect, it more relates to your issue below, I think.
The other implicit message I read from the above quotes (and the rest of the draft) was the idea of a group of authorised users. That there is some set of users who can make changes to the BGP data on the blockchain, and everyone else is prevented from changing anything/can only read the data. To me, this is not implementing the principle of least privilege.
[DOT] I am not entirely sure that this is the message that was intended here and I would argue that the possibly commissioned nature is not about that either (if anything, it is restricting the set of users per se, period, not just for write access).
If the smart contract is only checking membership in the authorised set, then the users would have the capability to perform many actions beyond what they should. Accidental errors (or compromised accounts) could lead to harm. A secure blockchain system will place as much of the logic controlling/restricting access in the code of the smart contract itself as possible as this is the least corruptible part of the system.
[DOT] I agree with that, if that was indeed the intended objective but see my last comment.

To apply this to BGP, it could be possible to use another thing that blockchains do very well: namely assigning individual owners to resources. NFTs gets a lot of deserved ridicule for the associated hype and unethical behaviour, but the technology allows a verifiable single source of ownership to be determined. This is something that a PKI cannot do. It is possible to have multiple conflicting chains of certificates signed (e.g., through error or attack). To me, the natural application of blockchains to BGP would be to consider prefixes as tokens assigned to AS blockchain addresses. The unique owner of any prefix could be determined with high confidence. This, plus the signing of peering relationships by the relevant ASes, could solve a lot of the problems with fraudulent announcements. If the smart contract is written correctly (big if, obviously), then it would be impossible for any entity to announce a route they were not authorised to.
[DOT] I think this is an excellent point and worthwhile capturing in the draft, i.e., using BC to assert ownership of a resource (like a prefix). If we positioned this (rightly) as the key issue for BGP operations, all else may just be 'bootstrapped' from it.

There are a lot of unanswered questions about how practical and scalable any of the above is.
[DOT] You may (or may not) have noticed a second draft in the IETF on "impact of DLTs on provider networks", now superseded by a more detailed publication and originating from some work done in the IIC (Industrial Internet Consortium) with a whitepaper released in Jan 2022. This work is looking at DCS (example there is Ethereum) and what it 'does' to a network, largely driven by the need for capability-based communication to realise the randomized diffusion broadcast/multicast that underlies the DLT operation. From a network perspective, it is quite painful but raises also interesting questions on how networks could improve on it or provide support (through network-level innovations).

It is an area of research I've put some thought into, but not yet had much of a chance to do any serious work on it. If any of the above may be applicable to the aim of this group, please let me know.
[DOT] It sure sounds like it and it would be good to get these thoughts into a revision of the draft and further discussed. We are still looking into the constituency within the IETF to have this conversation but it may well be this group, which will hopefully grow.

Kind Regards,

Thomas.



Dr Thomas Martin (he/him) | Senior Lecturer | Department of Computing and Mathematics | t.martin@mmu.ac.uk<mailto:t.martin@mmu.ac.uk>

0161 247 1501 | Room JD E120
Manchester Metropolitan University | John Dalton Building | Manchester | M1 5GD
Office Hours: Monday 3:00 - 4:30 pm and Wednesday 11:30 - 1:00 pm
Please note that I am on a flexible working schedule and will only be reading/answering MMU email on Monday/Tuesday/Wednesday
________________________________
From: Dlt-networking <dlt-networking-bounces@ietf.org<mailto:dlt-networking-bounces@ietf.org>> on behalf of Michael McBride <michael.mcbride@futurewei.com<mailto:michael.mcbride@futurewei.com>>
Sent: 01 July 2022 9:46 PM
To: dlt-networking@ietf.org<mailto:dlt-networking@ietf.org> <dlt-networking@ietf.org<mailto:dlt-networking@ietf.org>>
Subject: [Dlt-networking] updated draft-mcbride-rtgwg-bgp-blockchain

This email originated from outside of Manchester Met. Do not click links or open attachments unless you recognise the sender and believe the content to be safe. Please contact the IT Helpline if you have any concerns, https://www.mmu.ac.uk/isds/contact<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.mmu.ac.uk%2Fisds%2Fcontact&data=05%7C01%7Cmichael.mcbride%40futurewei.com%7C3c48c5a9deb648bd46e708dac7d3b518%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638042009342782431%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=SZxvPzLDwCZ7YkLp43K77bLq8NSaqUmJWHipD7Writg%3D&reserved=0>
________________________________

Hello,



A couple of new authors joined in and we've updated https://www.ietf.org/archive/id/draft-mcbride-rtgwg-bgp-blockchain-01.txt<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-mcbride-rtgwg-bgp-blockchain-01.txt&data=05%7C01%7Cmichael.mcbride%40futurewei.com%7C3c48c5a9deb648bd46e708dac7d3b518%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638042009342782431%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=FBDHIa9semYZv6DXO4UpUdG5HzOOBtSeYPict4JYK8w%3D&reserved=0> with a fair amount of new information including the use of smart contracts. Please give it a read and comment if you feel it's on the right track or not. We have time to update the draft again before the deadline. We will likely discuss this at the upcoming IETF 114 meeting in rtgwg if there is time. Hope to see many of you in Philly.



Thanks,

mike
"Before acting on this email or opening any attachments you should read the Manchester Metropolitan University email disclaimer available on its website http://www.mmu.ac.uk/emaildisclaimer<https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.mmu.ac.uk%2Femaildisclaimer&data=05%7C01%7Cmichael.mcbride%40futurewei.com%7C3c48c5a9deb648bd46e708dac7d3b518%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638042009342782431%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=sUy1w7ALgeupl84GVTwst2RUE1d90jCBQ7o5Voog78E%3D&reserved=0> "