Re: [DNSOP] draft-hsyu-message-fragments replacement status updated by Cindy Morgan

Mukund Sivaraman <muks@mukund.org> Thu, 28 April 2022 19:05 UTC

Return-Path: <muks@mukund.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AF13C1594A9; Thu, 28 Apr 2022 12:05:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.1
X-Spam-Level:
X-Spam-Status: No, score=-7.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mukund.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FhFTpFGWZKzL; Thu, 28 Apr 2022 12:05:09 -0700 (PDT)
Received: from mx.mukund.org (mx.mukund.org [IPv6:2a01:4f8:252:2ade:1::78]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2C3BC14F6E6; Thu, 28 Apr 2022 12:05:08 -0700 (PDT)
Date: Fri, 29 Apr 2022 00:35:02 +0530
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mukund.org; s=mail; t=1651172705; bh=FTSVIcxMN0igef3MkXDhPaSDRgVXzI2ahTTgCFaCQ5I=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=bnbfAhQf/SuZnFw2Z9Pnn98eUvdnuIZoRxxRmAPQGW5PXuPs3cvnQonGGeN9/cKu4 7w1DXvXTXCbo9EgMAaQIHysddwJLv7APVLoHgNBMYZnBwJW1DvZurSxVyAwJ8atw+p 3dPH7b2LimQu5oa/GS6i3OQnnATUUlCcYnjau3Dw=
From: Mukund Sivaraman <muks@mukund.org>
To: Donald Eastlake <d3e3e3@gmail.com>
Cc: shane@time-travellers.org, IETF Discussion <ietf@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, yliu@cfiec.net, hsyu@cfiec.net, hsyu@biigroup.cn, Cindy Morgan <cmorgan@amsl.com>
Message-ID: <YmrlXv1/L6Ina504@d1>
References: <165116358815.5877.9244565954759130167@ietfa.amsl.com> <YmrKSN5OSQh2/SQf@d1> <CAF4+nEE0AJSjUfYXLjxUE94k544k_cK2v7HxNRS1XmSVOnQRPg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="XF2EUswaz9ySqwPY"
Content-Disposition: inline
In-Reply-To: <CAF4+nEE0AJSjUfYXLjxUE94k544k_cK2v7HxNRS1XmSVOnQRPg@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/Dj8mcdzc3kKSGQifQhYkcE1aZ-s>
Subject: Re: [DNSOP] draft-hsyu-message-fragments replacement status updated by Cindy Morgan
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2022 19:05:13 -0000

Hi Donald

On Thu, Apr 28, 2022 at 02:16:16PM -0400, Donald Eastlake wrote:
> What you describe is completely improper but I'm not sure it's exactly
> accurate. When you said you were "removed" as an author, I assumed that a
> new revision of a draft was posted where you were a first page author for
> version N but not listed as an author for version N+1. That would also be
> improper if there was no effort to consult with you.
> 
> But what seems to have happened is that a new draft was created with you
> omitted from the author list and (given the reference to Cindy Morgan in
> the Subject line), the Secretariat was asked to record this new draft as
> replacing the previous draft where you were an author (indeed, the first
> listed author). I think this sort of thing is extremely rare. You could
> certainly ask the Secretariat to reverse the database update so your draft (
> https://datatracker.ietf.org/doc/draft-muks-dnsop-message-fragments/) is no
> longer shown as being replaced by any other draft.

A new draft has been created, the contents of which are:

https://www.ietf.org/archive/id/draft-hsyu-message-fragments-00.txt

which is largely identical to the original [see diff below], but mainly
authorship has been modified:

https://www.ietf.org/archive/id/draft-muks-dns-message-fragments-00.txt

The commit history of the contribution to the original draft is here:

https://github.com/muks/dnsfragments/commits/master

The draft appears to have gone from:

[2015-07-20] https://datatracker.ietf.org/doc/draft-muks-dns-message-fragments/

(original draft)

to:

[2022-04-20] https://datatracker.ietf.org/doc/draft-muks-dnsop-message-fragments/

(which included the new author " haisheng yu ", but kept the previous
authors, but with no intimation to us)

to:

[2022-04-28] https://datatracker.ietf.org/doc/draft-hsyu-message-fragments/

(which deleted the original authors)

It's not the mechanics, what the new name of the draft is, or what URI
it is at. I am just disappointed we worked on making something and have
disappeared from it, even if it is a copy of the text. It seems
unreasonable, but all things considered (this is not the first time),
I'll shake my head and move on.

I don't know if my expectation that authorship should be preserved is
misplaced - maybe it is. We already co-assign copyright to the IETF.

		Mukund

----

The following is a diff between the two drafts to this email, to
illustrate that mainly the authorship information has changed and the
authors who wrote most of it have been removed.




5,10c5,8
< Internet Engineering Task Force                             M. Sivaraman
< Internet-Draft                               Internet Systems Consortium
< Intended status: Experimental                                    S. Kerr
< Expires: January 21, 2016                                        L. Song
<                                               Beijing Internet Institute
<                                                            July 20, 2015
---
> Internet Engineering Task Force                                    H. Yu
> Internet-Draft                                                    Y. Liu
> Intended status: Experimental                          Guangzhou Genlian
> Expires: 29 October 2022                                   27 April 2022
14c12
<                   draft-muks-dns-message-fragments-00
---
>                     draft-hsyu-message-fragments-00
32c30
<    Drafts is at http://datatracker.ietf.org/drafts/current/.
---
>    Drafts is at https://datatracker.ietf.org/drafts/current/.
39c37
<    This Internet-Draft will expire on January 21, 2016.
---
>    This Internet-Draft will expire on 29 October 2022.
43c41
<    Copyright (c) 2015 IETF Trust and the persons identified as the
---
>    Copyright (c) 2022 IETF Trust and the persons identified as the
47,52c45,51
<    Provisions Relating to IETF Documents
<    (http://trustee.ietf.org/license-info) in effect on the date of
<    publication of this document.  Please review these documents
<    carefully, as they describe your rights and restrictions with respect
<    to this document.  Code Components extracted from this document must
<    include Simplified BSD License text as described in Section 4.e of
---
>    Provisions Relating to IETF Documents (https://trustee.ietf.org/
>    license-info) in effect on the date of publication of this document.
>    Please review these documents carefully, as they describe your rights
>    and restrictions with respect to this document.  Code Components
>    extracted from this document must include Revised BSD License text as
>    described in Section 4.e of the Trust Legal Provisions and are
>    provided without warranty as described in the Revised BSD License.
56,58d54
< Sivaraman, et al.       Expires January 21, 2016                [Page 1]
< 
< Internet-Draft            DNS message fragments                July 2015
59a56,58
> Yu & Liu                 Expires 29 October 2022                [Page 1]
> 
> Internet-Draft            DNS message fragments               April 2022
61,62d59
<    the Trust Legal Provisions and are provided without warranty as
<    described in the Simplified BSD License.
81c78
<        4.2.1.  Fragment Identifier . . . . . . . . . . . . . . . . .   7
---
>        4.2.1.  Fragment Identifier . . . . . . . . . . . . . . . . .   8
92,93c89
<    Appendix A.  Change History (to be removed before publication)  .  12
<    Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  13
---
>    Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  12
109a106,108
>    As a UDP datagram is transmitted in a single IP, in theory the size
>    of a UDP datagram (including various lower internet layer headers)
>    can be as large as 64 KiB.  But practically, if the datagram size
112c111,112
< Sivaraman, et al.       Expires January 21, 2016                [Page 2]
---
> 
> Yu & Liu                 Expires 29 October 2022                [Page 2]
114c114
< Internet-Draft            DNS message fragments                July 2015
---
> Internet-Draft            DNS message fragments               April 2022
117,127c117,127
<    As a UDP datagram is transmitted in a single IP PDU, in theory the
<    size of a UDP datagram (including various lower internet layer
<    headers) can be as large as 64 KiB.  But practically, if the datagram
<    size exceeds the path MTU, then the datagram will either be
<    fragmented at the IP layer, or worse dropped, by a forwarder.  In the
<    case of IPv6, DNS packets are fragmented by the sender only.  If a
<    packet's size exceeds the path MTU, a Packet Too Big (PTB) ICMP
<    message will be received by sender without any clue to the sender to
<    reply again with a smaller sized message, due to the stateless
<    feature of DNS.  In addition, IP-level fragmentation caused by large
<    DNS response packet will introduce risk of cache poisoning
---
>    exceeds the path MTU, then the datagram will either be fragmented at
>    the IP layer, or worse dropped, by a forwarder.  In the case of IPv6,
>    DNS packets are fragmented by the sender only.  If a packet's size
>    exceeds the path MTU, it must be fragmented.  Except for the first
>    fragmented package, other fragmented packages do not include a UDP or
>    TCP header, and do not know the port number of the IP package, and
>    the subsequent IP slice pack is filtered off.  A Packet Too Big (PTB)
>    ICMP message will be received by sender without any clue to the
>    sender to reply again with a smaller sized message, due to the
>    stateless feature of DNS.  In addition, IP-level fragmentation caused
>    by large DNS response packet will introduce risk of cache poisoning
168c168
< Sivaraman, et al.       Expires January 21, 2016                [Page 3]
---
> Yu & Liu                 Expires 29 October 2022                [Page 3]
170c170
< Internet-Draft            DNS message fragments                July 2015
---
> Internet-Draft            DNS message fragments               April 2022
224c224
< Sivaraman, et al.       Expires January 21, 2016                [Page 4]
---
> Yu & Liu                 Expires 29 October 2022                [Page 4]
226c226
< Internet-Draft            DNS message fragments                July 2015
---
> Internet-Draft            DNS message fragments               April 2022
255,256c255,256
<     The server should use the following sizes for each fragment in the
<                              sequence in IPv4:
---
>    The server should use the following sizes for each fragment in the
>    sequence in IPv4:
258c258
<              +-------------+---------------------------------+
---
>              +=============+=================================+
260c260
<              +-------------+---------------------------------+
---
>              +=============+=================================+
261a262
>              +-------------+---------------------------------+
262a264
>              +-------------+---------------------------------+
263a266
>              +-------------+---------------------------------+
267,275c270
<    The rationale is that the first packet will always get through, since
<      if a 512 octet packet doesn't work, DNS cannot function.  We then
<     increase to sizes that are likely to get through. 1460 is the 1500
<     octet Ethernet packet size, minus the IP header overhead and enough
<     space to support tunneled traffic. 1480 is the 1500 octet Ethernet
<     packet size, minus the IP header overhead. [**FIXME**] Why not add
<    1240 here?  Shane answers: 1280 is not any kind of limit in IPv4, as
<                               far as I know.
< 
---
>                                   Table 1
276a272,276
>    The rationale is that the first packet will always get through, since
>    if a 512 octet packet doesn't work, DNS cannot function.  We then
>    increase to sizes that are likely to get through. 1460 is the 1500
>    octet Ethernet packet size, minus the IP header overhead and enough
>    space to support tunneled traffic. 1480 is the 1500 octet Ethernet
280c280
< Sivaraman, et al.       Expires January 21, 2016                [Page 5]
---
> Yu & Liu                 Expires 29 October 2022                [Page 5]
282c282
< Internet-Draft            DNS message fragments                July 2015
---
> Internet-Draft            DNS message fragments               April 2022
285,286c285,287
<      The server should use the following sizes for each packet in the
<                              sequence in IPv6:
---
>    packet size, minus the IP header overhead. [**FIXME**] Why not add
>    1240 here?  Shane answers: 1280 is not any kind of limit in IPv4, as
>    far as I know.
288c289,292
<              +-------------+---------------------------------+
---
>    The server should use the following sizes for each packet in the
>    sequence in IPv6:
> 
>              +=============+=================================+
290c294
<              +-------------+---------------------------------+
---
>              +=============+=================================+
291a296
>              +-------------+---------------------------------+
292a298
>              +-------------+---------------------------------+
293a300
>              +-------------+---------------------------------+
297,298c304,307
<      Like with IPv4, the idea is that the first packet will always get
<     through.  In this case we use the IPv6-mandated 1280 octets, minus
---
>                                   Table 2
> 
>    Like with IPv4, the idea is that the first packet will always get
>    through.  In this case we use the IPv6-mandated 1280 octets, minus
300,302c309,311
<     octet Ethernet packet size, minus the IP header overhead and enough
<     space to support tunneled traffic. 1460 is the 1500 octet Ethernet
<                 packet size, minus the IP header overhead.
---
>    octet Ethernet packet size, minus the IP header overhead and enough
>    space to support tunneled traffic. 1460 is the 1500 octet Ethernet
>    packet size, minus the IP header overhead.
306c315
<    o  The FRAGMENT option MUST NOT be present in DNS query messages,
---
>    *  The FRAGMENT option MUST NOT be present in DNS query messages,
310c319
<    o  In DNS reply messages, the FRAGMENT option MUST NOT be present in
---
>    *  In DNS reply messages, the FRAGMENT option MUST NOT be present in
321c330
<    o  More than one FRAGMENT option MUST NOT be present in a DNS reply
---
>    *  More than one FRAGMENT option MUST NOT be present in a DNS reply
323a333,340
> 
> 
> 
> Yu & Liu                 Expires 29 October 2022                [Page 6]
> 
> Internet-Draft            DNS message fragments               April 2022
> 
> 
331,340d347
< 
< 
< 
< 
< 
< Sivaraman, et al.       Expires January 21, 2016                [Page 6]
< 
< Internet-Draft            DNS message fragments                July 2015
< 
< 
382d388
< 4.2.1.  Fragment Identifier
384,387d389
<    The Fragment Identifier field is represented as an unsigned 8-bit
<    integer.  The first fragment is identified as 1.  Values in the range
<    [1,255] can be used to identify the various fragments.  Value 0 is
<    used for signalling purposes.
389a392,394
> Yu & Liu                 Expires 29 October 2022                [Page 7]
> 
> Internet-Draft            DNS message fragments               April 2022
392,394c397
< Sivaraman, et al.       Expires January 21, 2016                [Page 7]
< 
< Internet-Draft            DNS message fragments                July 2015
---
> 4.2.1.  Fragment Identifier
395a399,402
>    The Fragment Identifier field is represented as an unsigned 8-bit
>    integer.  The first fragment is identified as 1.  Values in the range
>    [1,255] can be used to identify the various fragments.  Value 0 is
>    used for signalling purposes.
438,444d444
<    networks where a rate of datagrams can continually be lost due to
<    interference and other environmental factors.  With larger numbers of
<    message fragments, the probability of fragment loss increases.
< 
< 
< 
< 
448c448
< Sivaraman, et al.       Expires January 21, 2016                [Page 8]
---
> Yu & Liu                 Expires 29 October 2022                [Page 8]
450c450
< Internet-Draft            DNS message fragments                July 2015
---
> Internet-Draft            DNS message fragments               April 2022
452a453,456
>    networks where a rate of datagrams can continually be lost due to
>    interference and other environmental factors.  With larger numbers of
>    message fragments, the probability of fragment loss increases.
> 
476,477d479
< 
< 
486,487d487
< 
< 
495,496d494
< 
< 
500a499
>    6.   EDNS buffer sizes vs. maximum fragmentation sizes
504,509d502
< Sivaraman, et al.       Expires January 21, 2016                [Page 9]
< 
< Internet-Draft            DNS message fragments                July 2015
< 
< 
<    6.   EDNS buffer sizes vs. maximum fragmentation sizes
511,525c504,506
<         Mukund: We need further discussion about the sizes; also an
<         upper limit for each *fragment* has to be the client's UDP
<         payload size as it is the driver and it alone knows the ultimate
<         success/failure of message delivery.  So if it sets a maximum
<         payload size of 1200, there's no point in trying 1460.  Clients
<         that support DNS message fragments (and signal support using the
<         EDNS option) should adapt their UDP payload size discovery
<         algorithm to work with this feature, as the following splits on
<         sizes will assist PMTU discovery.
< 
<         Shane: I think we need to separate the EDNS maximum UDP payload
<         size from the maximum fragment size.  I think that it is quite
<         likely that (for example) we will want to restrict each fragment
<         to 1480 bytes, but that the EDNS buffer size might remain at 4
<         kibibytes.
---
> Yu & Liu                 Expires 29 October 2022                [Page 9]
> 
> Internet-Draft            DNS message fragments               April 2022
527a509,523
>         Mukund Sivaraman: We need further discussion about the sizes;
>         also an upper limit for each *fragment* has to be the client's
>         UDP payload size as it is the driver and it alone knows the
>         ultimate success/failure of message delivery.  So if it sets a
>         maximum payload size of 1200, there's no point in trying 1460.
>         Clients that support DNS message fragments (and signal support
>         using the EDNS option) should adapt their UDP payload size
>         discovery algorithm to work with this feature, as the following
>         splits on sizes will assist PMTU discovery.
> 
>         Shane Kerr: I think we need to separate the EDNS maximum UDP
>         payload size from the maximum fragment size.  I think that it is
>         quite likely that (for example) we will want to restrict each
>         fragment to 1480 bytes, but that the EDNS buffer size might
>         remain at 4 kibibytes.
536,537d531
< 
< 
545,546d538
< 
< 
554,555d545
< 
< 
558,564d547
< 
< 
< Sivaraman, et al.       Expires January 21, 2016               [Page 10]
< 
< Internet-Draft            DNS message fragments                July 2015
< 
< 
568,569d550
< 
< 
574a556
>    12.  OPT-RR
577c559,563
<    12.  OPT-RR
---
> 
> Yu & Liu                 Expires 29 October 2022               [Page 10]
> 
> Internet-Draft            DNS message fragments               April 2022
> 
582,586c568,570
<         conflicting options (Mukund thinks that we can copy the approach
<         in the EDNS specification and use the same rules about
<         conflicting OPT-RR that it uses.)
< 
< 
---
>         conflicting options (Mukund Sivaraman thinks that we can copy
>         the approach in the EDNS specification and use the same rules
>         about conflicting OPT-RR that it uses.)
614,620d597
< 
< 
< Sivaraman, et al.       Expires January 21, 2016               [Page 11]
< 
< Internet-Draft            DNS message fragments                July 2015
< 
< 
623,624c600,602
<               Cookies", draft-ietf-dnsop-cookies-04 (work in progress),
<               July 2015.
---
>               Cookies", Work in Progress, Internet-Draft, draft-ietf-
>               dnsop-cookies-04, 1 July 2015, <http://www.ietf.org/
>               internet-drafts/draft-ietf-dnsop-cookies-04.txt>.
628,629c606,619
<               Size Issues", draft-ietf-dnsop-respsize-15 (work in
<               progress), February 2014.
---
>               Size Issues", Work in Progress, Internet-Draft, draft-
>               ietf-dnsop-respsize-15, 14 February 2014,
>               <http://www.ietf.org/internet-drafts/draft-ietf-dnsop-
>               respsize-15.txt>.
> 
> 
> 
> 
> 
> 
> Yu & Liu                 Expires 29 October 2022               [Page 11]
> 
> Internet-Draft            DNS message fragments               April 2022
> 
632c622,623
<               specification", STD 13, RFC 1035, November 1987.
---
>               specification", STD 13, RFC 1035, DOI 10.17487/RFC1035,
>               November 1987, <https://www.rfc-editor.org/info/rfc1035>.
634,635c625,628
<    [RFC1123]  Braden, R., "Requirements for Internet Hosts - Application
<               and Support", STD 3, RFC 1123, October 1989.
---
>    [RFC1123]  Braden, R., Ed., "Requirements for Internet Hosts -
>               Application and Support", STD 3, RFC 1123,
>               DOI 10.17487/RFC1123, October 1989,
>               <https://www.rfc-editor.org/info/rfc1123>.
639c632,633
<               IPv6", RFC 3542, May 2003.
---
>               IPv6", RFC 3542, DOI 10.17487/RFC3542, May 2003,
>               <https://www.rfc-editor.org/info/rfc3542>.
642c636,638
<               Resilient against Forged Answers", RFC 5452, January 2009.
---
>               Resilient against Forged Answers", RFC 5452,
>               DOI 10.17487/RFC5452, January 2009,
>               <https://www.rfc-editor.org/info/rfc5452>.
645c641,642
<               Control", RFC 5681, September 2009.
---
>               Control", RFC 5681, DOI 10.17487/RFC5681, September 2009,
>               <https://www.rfc-editor.org/info/rfc5681>.
648c645,647
<               for DNS (EDNS(0))", STD 75, RFC 6891, April 2013.
---
>               for DNS (EDNS(0))", STD 75, RFC 6891,
>               DOI 10.17487/RFC6891, April 2013,
>               <https://www.rfc-editor.org/info/rfc6891>.
660c659,687
< Appendix A.  Change History (to be removed before publication)
---
> Authors' Addresses
> 
>    Haisheng Yu
>    Guangzhou Genlian
>    Xiangjiang International Technology Innovation Center, 41 Jinlong Road, Nansha District, Guangzhou
>    Guangzhou
>    China
>    Email: hsyu@cfiec.net
> 
> 
> 
> 
> 
> Yu & Liu                 Expires 29 October 2022               [Page 12]
> 
> Internet-Draft            DNS message fragments               April 2022
> 
> 
>    Yan Liu
>    Guangzhou Genlian
>    Xiangjiang International Technology Innovation Center, 41 Jinlong Road, Nansha District, Guangzhou
>    Guangzhou
>    China
>    Email: yliu@cfiec.net
> 
> 
> 
> 
> 
662,663d688
<    o  draft-muks-dns-message-fragments-00
<       Initial draft.
672,674d696
< Sivaraman, et al.       Expires January 21, 2016               [Page 12]
< 
< Internet-Draft            DNS message fragments                July 2015
677d698
< Authors' Addresses
679,683d699
<    Mukund Sivaraman
<    Internet Systems Consortium
<    950 Charter Street
<    Redwood City, CA  94063
<    US
685,686d700
<    Email: muks@isc.org
<    URI:   http://www.isc.org/
689,693d702
<    Shane Kerr
<    Beijing Internet Institute
<    2/F, Building 5, No.58 Jinghai Road, BDA
<    Beijing  100176
<    CN
695,696d703
<    Email: shane@biigroup.cn
<    URI:   http://www.biigroup.com/
699,703d705
<    Linjian Song
<    Beijing Internet Institute
<    2/F, Building 5, No.58 Jinghai Road, BDA
<    Beijing  100176
<    CN
705,706d706
<    Email: songlinjian@gmail.com
<    URI:   http://www.biigroup.com/
728c728
< Sivaraman, et al.       Expires January 21, 2016               [Page 13]
---
> Yu & Liu                 Expires 29 October 2022               [Page 13]