Re: [homenet] [Int-area] Evaluate impact of MAC address randomization to IP applications

"Lee, Yiu" <Yiu_Lee@comcast.com> Tue, 22 September 2020 21:09 UTC

Return-Path: <Yiu_Lee@comcast.com>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAB953A19FA for <homenet@ietfa.amsl.com>; Tue, 22 Sep 2020 14:09:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.com header.b=Py6KlCfO; dkim=pass (2048-bit key) header.d=comcast.com header.b=mMaOJE62; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=comcastcorp.onmicrosoft.com header.b=oBFJ0Xmg
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fsQ0Cr4nQDMx for <homenet@ietfa.amsl.com>; Tue, 22 Sep 2020 14:09:09 -0700 (PDT)
Received: from mx0a-00143702.pphosted.com (mx0a-00143702.pphosted.com [148.163.145.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72CCE3A19D6 for <homenet@ietf.org>; Tue, 22 Sep 2020 14:09:09 -0700 (PDT)
Received: from pps.filterd (m0156891.ppops.net [127.0.0.1]) by mx0a-00143702.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 08ML4g8b017034 for <homenet@ietf.org>; Tue, 22 Sep 2020 17:09:09 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=20190412; bh=4qGiUQCdUW+CTwjA6dCO2y/T+uRl2YvL82HxBnH3IlE=; b=Py6KlCfOAN6VypgjfT0w2bZVvjxQ0ECr7HTDv7BWw9XOmTd+IrZcPfJyqHxPH9Hoo2DZ ZBUKnsgo/7EIlkriodY7kbGmuBZpe4yOI34AJtRiXRQ6l+MeyHHNaFRiyHnKBOmFIBka yhOhXcS/TM5UZvByfwcnSrSJ7SjPqaMzN2LP9XRjWcjyFxbjwSlsL6Gkzr4Ulym3ORhf kn3vBlaKPUpbAPO+3bOU1B2nwX6BLwiCC/bWw4dppfkU7PXRcGA4u6zA2XMAXWc2WQOP W/Dn8zhcT+gbyVXSPn7W2UTmyosSjXo0JhRJ3HMwweP5CTQLcE9swYGei3kCJiGvzTez VQ==
Received: from pacdcmhout02.cable.comcast.com (pacdcmhout02.cable.comcast.com [68.87.96.15]) by mx0a-00143702.pphosted.com with ESMTP id 33netv457t-17 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <homenet@ietf.org>; Tue, 22 Sep 2020 17:09:09 -0400
DKIM-Signature: v=1; a=rsa-sha256; d=comcast.com; s=20190412; c=relaxed/simple; q=dns/txt; i=@comcast.com; t=1600808946; x=2464722546; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=4qGiUQCdUW+CTwjA6dCO2y/T+uRl2YvL82HxBnH3IlE=; b=mMaOJE62lf3jLTfbZbtWFr2WJOS6arj3mHJDAnzO+OKB2AqGUpiRzfqyYYREDa01 9i+yUR28d2QI/VigN1A9iRQSFUfb5auCIvXdK1URl2fRcyOoNo054HtwRdSsLEAa YsJkjs+pXiR7j1sK0V6Wx3B1ozhu45m7eOdNQ/si6xI8fSEbNJ7Xit0x0fGTnmJZ KfcoKuQMqg9KyG3M/7DnZQXe/8dAK8ROq8eFsmPP3+0PrJbZ40JyaWoa+Pk4v17J 5CdJeUogYmIieTEEr1RtbTkgZHAmG83J6eeQpcT4ypY5gnEgCel6XPqgXKOOu0EL ZYgSD1kYRjQDRQiuRUuCvQ==;
X-AuditID: 4457600f-f0fff70000005543-c2-5f6a67f110fa
Received: from PACDCEX54.cable.comcast.com (cas-umc02.ndceast.pa.bo.comcast.net [68.87.34.28]) (using TLS with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client did not present a certificate) by pacdcmhout02.cable.comcast.com (SMTP Gateway) with SMTP id 7E.B6.21827.1F76A6F5; Tue, 22 Sep 2020 17:09:06 -0400 (EDT)
Received: from PACDCEX09.cable.comcast.com (24.40.1.132) by PACDCEX54.cable.comcast.com (24.40.2.153) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 22 Sep 2020 17:09:05 -0400
Received: from PACDCEXEDGE01.cable.comcast.com (76.96.78.71) by PACDCEX09.cable.comcast.com (24.40.1.132) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 22 Sep 2020 17:09:05 -0400
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.176) by webmail.comcast.com (76.96.78.71) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 22 Sep 2020 17:08:56 -0400
Received: from MN2PR11MB3582.namprd11.prod.outlook.com (2603:10b6:208:ec::28) by MN2PR11MB3583.namprd11.prod.outlook.com (2603:10b6:208:ea::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3391.19; Tue, 22 Sep 2020 21:08:55 +0000
Received: from MN2PR11MB3582.namprd11.prod.outlook.com ([fe80::7d38:9ff4:1394:57bb]) by MN2PR11MB3582.namprd11.prod.outlook.com ([fe80::7d38:9ff4:1394:57bb%7]) with mapi id 15.20.3391.026; Tue, 22 Sep 2020 21:08:55 +0000
From: "Lee, Yiu" <Yiu_Lee@comcast.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Michael Richardson <mcr+ietf@sandelman.ca>, "captive-portals@ietf.org" <captive-portals@ietf.org>, "homenet@ietf.org" <homenet@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>
Thread-Topic: [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications
Thread-Index: AQHWkSSUMeRF7XDjM0KNsHB8/6GD7g==
Date: Tue, 22 Sep 2020 21:08:55 +0000
Message-ID: <D81695FF-973F-472D-BC0A-9B0F57278B21@comcast.com>
References: <20200922201317.097C3389D4@tuna.sandelman.ca> <15660.1600807202@localhost> <902400f2-9172-9581-25ab-59ad08e67bee@cs.tcd.ie>
In-Reply-To: <902400f2-9172-9581-25ab-59ad08e67bee@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.41.20091302
authentication-results: cs.tcd.ie; dkim=none (message not signed) header.d=none;cs.tcd.ie; dmarc=none action=none header.from=Cable.Comcast.com;
x-originating-ip: [2601:42:1:8220:64e9:5707:4fba:b091]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 41c05306-95b0-466e-5c50-08d85f3bb749
x-ms-traffictypediagnostic: MN2PR11MB3583:
x-microsoft-antispam-prvs: <MN2PR11MB3583E84FC4C89AE713E75B53C03B0@MN2PR11MB3583.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 2cMFzF/zk7LdATtxkSupmu9n9Q8MLdBDVOoot6q3k3KaPNNkKmDCLGKSUXEbHPQSKs5D5k1JEbnCUFW2LrDZsbo0NoCKgH42VRWkd+L760PLIXCBHQswx/2wp1mMw9SgREDFnYgBEVKvZgBpdbw8dfCNuJ0fCnz+CK9yB/n2lXL1PPlV6uvGBtBj1NoSE7ZN+Ovy1qR8KB3tmavZVZ85YC1MK2b9zVwcW5xJivJr+2DECWvvt2QHQfRNySnD1nuNJOW8KknDhJ68QE5G8xKzmEUUPty0TybTVZLrGg3VVzYzGp9O47UXHnNbrkOEf7eiwg11qgq9ZfhUfAD7y4CkZiC7oRj9yzFro3oD0qlxt+5UlPquC9UBHOU3QTPjReBtjkLf8twTRDW0sr8BoLAR72MCOZfno4DI1pz5nQuR227M/7nThwNE0+VMfbN7ZowKAJ/Q99OX2Mgge5DyNkyUhg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB3582.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(136003)(376002)(346002)(39860400002)(366004)(36756003)(966005)(76116006)(64756008)(53546011)(478600001)(33656002)(66946007)(8676002)(83380400001)(66476007)(8936002)(66574015)(66446008)(66556008)(6512007)(6486002)(110136005)(9686003)(86362001)(6506007)(5660300002)(186003)(2906002)(71200400001)(296002)(316002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B11p3HWqOq/GqEvBOrqiI1hxoEJfd1v9vVDTv5gqnE2etWAKkAk1Nedk0oqkwTBVmTy3IxXyN6fXLATt4sJGn8QrN/SeBk52r8ZDTItykDCZVPpiduWByGshUzmSEP6aMvR/gI6GXxZNVjICmM0H1wVbPuF3RlWCr7jDptDHW9HzhhCvJdzdZtvwm8DwM73yy7/fEWACHUxA2WrGe+Eak1J4PxlKqmXu/J6vguECdGaewhNu2ImPvkc4QL2CM+HkMsDrcLU0wrHE++9sRBGjJNMMJI1m4/DTkwdQ5js3LbtwXW/K36T4Cg++4tLEANJ+Wlxa8eEPS4M3DiGILy8d1g==
arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZYEi1kzd77A3X98giW8XBFNbsipasgmMT3P5lEF2EEU=; b=meukhFxYjbbFr9OsIR1bCbP/xyI7K9hWo7Izfnp4bFci4NpbKnvwjY0uPjt/iytKctfYX+c5RASP/MadUIDBcr6IQCBSvo2mVrw8/gZt81b+4xX5+WxvcFjIoQ9bUHNH9mlzWGimcUb7/L5KvCYkD4P4f1T7Ha7nxXc83Uw/BCm9+sYSzJjwUWHGkSDKnh1YCiq3Y/zbluiCoCMxbpAESuRy3H0TdjRmmNviUAX9xdkZmXB2qT6g9qNc7n0gzxTOV0ZlxKSWiXn/jKptEk4Jh+jDsV0uSUGbBXMQhvoD9Ir5ytr2jkwsCPmD912qrZP/yWxCHW9HTq5hmUjvtkSCTQ==
arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cable.comcast.com; dmarc=pass action=none header.from=cable.comcast.com; dkim=pass header.d=cable.comcast.com; arc=none
dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastcorp.onmicrosoft.com; s=selector1-comcastcorp-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZYEi1kzd77A3X98giW8XBFNbsipasgmMT3P5lEF2EEU=; b=oBFJ0XmgBpfBBByRR0yDZvhv1oeVL897uxvMOFAo8MB6hm5pCuL1j7xaeUFY4s4rwZySy5nzAu+wk8YgEIzNY9SYbIX/auVGn2E6wxNMCMeyvjkf6nB3l236VsKB/kaQn1acVq+cx8TxpPDiaq9YVAF+rM5Xefw5ylC3ZszZWek=
x-ms-exchange-crosstenant-authas: Internal
x-ms-exchange-crosstenant-authsource: MN2PR11MB3582.namprd11.prod.outlook.com
x-ms-exchange-crosstenant-network-message-id: 41c05306-95b0-466e-5c50-08d85f3bb749
x-ms-exchange-crosstenant-originalarrivaltime: 22 Sep 2020 21:08:55.4063 (UTC)
x-ms-exchange-crosstenant-fromentityheader: Hosted
x-ms-exchange-crosstenant-id: 906aefe9-76a7-4f65-b82d-5ec20775d5aa
x-ms-exchange-crosstenant-mailboxtype: HOSTED
x-ms-exchange-crosstenant-userprincipalname: X+J7svAJCm+Sc4uYDnKVPgK1foHmRjsjpfb3BNkr6MIZ/mNuVXMCGQfq/uE6vRxI5hJUX+uPP88UfCapv9b0ZyDVX222acl2dLfeEm0HdiY=
x-ms-exchange-transport-crosstenantheadersstamped: MN2PR11MB3583
x-originatororg: cable.comcast.com
Content-Type: text/plain; charset="utf-8"
Content-ID: <A62647AB151529469B2D00B627B32E1A@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Forward
X-Brightmail-Tracker: H4sIAAAAAAAAA02Se0hTcRTH++3eu01t9XOlHdYqvdBLmDZ1eietSQ+agT0oegi1XfSm+djG ppLVHxaRmdmD2cNRVmovLcqil2h/jBWYhTGxtDQ1DVTySWA+kna9C/rv8z2PL+ccjpSQD1EK 6SFzNmczs5m02J/cuIdWqsZS041rzrch5rozn2KGy10k0+psI5mzrvMS5kr9J0k8ZXhY1CI2 VFZOiAwnr9UR24mkDWvTODaFs4Vw5mRLyiFzqo5O2LlNxTAarUpNh5jZLE5H71XtTNys2mQ+ aLElc3RILpuZ441azFYbl0VHrDNtSPs21k9ZJ+MOPx/X56OX2jPITwo4Gu6MvBefQf5SOXaL YHhi2idqEbw7VSESRAuCB/UjlCDeIrhVMEAIokIEfdOXSUF8R1DjaaR4ZzFeAdWPG2bNFuI+ BI/OtYr5xAKcDJdm+rzGUm8iBX78NgkYDs2Tx/gKEi+HgYkBxIdleB3cb7IL9oUIihudJF/j h3XgeNpC8IxwMIy/eyDimcCL4EvvDZGwHIbKuiZC4CDo75mZHS0IR8Doha8S3hThEgSDBZ0S oSgG3B+e+RqWgOdGERI4ETw3O33xMPh8q83HGXBiatpXsxJOjpZRAi+FquJuUmAldLW+mL0D 4CkCOnrKJYIYIeDsvRLyAtI4/5vc6d2awKvhUW2EEDbAr9JBQuBQKCnqlvAsw4HQUNpL3kRU FQqIYcKZ2HBtTLha8wTN/ppp/kv05orBhbAU0XNl6r3pRjnF5trzslwIpAS9ULYiMtUol6Ww eUc4m8Voy8nk7C6k8V7/IqEISrZ4P9ecbVRrtNrYaEarjlTHrqEXyfRdJqMcp7LZXAbHWTnb vz6R1E+RjwK2OkzHe923F19Ujm4bTdAZaoOHR+JU1a/CAmW3m9qiVjX+jFq6L1uZ5HKn/yzc kevw6Gccoa/rCpcp2pfneZIcjfvXdybIDijI6prmu3/im0vnXA3eHfl0tb796OmOywfDPnZ/ 0c8/3p+4i9tn7VWWDUztv1c15C7YLVJu2THPqqNJexqrDiNsdvYvRYusNIEDAAA=
X-SMG-Enforce: onprem
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235, 18.0.687 definitions=2020-09-22_18:2020-09-21, 2020-09-22 signatures=0
X-Proofpoint-Spam-Reason: safe
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/o3bHNtQ0jTOUDBQnUsyFmDlDUyM>
Subject: Re: [homenet] [Int-area] Evaluate impact of MAC address randomization to IP applications
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Sep 2020 21:09:19 -0000

Hi Stephen,

Thanks for the notes. Actually, we believe that there are good privacy reasons to randomize mac-address. This BoF isn't trying to "fix" randomized mac-address. On the contrary, we want the community to embrace it. In order to ease the anxiety for transitioning, we want to document what may break and propose best practice to transition to dynamic mac-address.

Thanks,
Yiu


On 9/22/20, 4:51 PM, "Int-area on behalf of Stephen Farrell" <int-area-bounces@ietf.org on behalf of stephen.farrell@cs.tcd.ie> wrote:


    That agenda and draft seem to make the seemingly common
    enough mistake of only focusing on what a new privacy or
    security mechanism breaks and glossing over the good
    reasons why people introduce these mechanisms. I hope the
    BoF proponents fix that because otherwise they may end up
    giving the impression that they would prefer to not see
    the privacy benefits (which I'd guess is not their goal
    at all). One reason those good reasons need to be included
    is that they constrain the kinds of additions that might
    make sense to better handle the new mechanism.

    We've seen a number of these kinds of reactions and I
    figure it'd really be better if the reaction were not to
    appear purely reactionary;-)

    If that were fixed, then there may be a better discussion
    of what, if any, additional things need doing. If that is
    not fixed, I'd not be surprised if the putative BoF were
    to devolve into a "it's bad" vs. "no, it's good" bun fight
    that won't really take us further.

    Cheers,
    S.

    On 22/09/2020 21:40, Michael Richardson wrote:
    >
    > Damn. Spelt captive-portal without the s again.  Reposting, sorry for duplicates.
    > I hate when WG names and list names do not match, and that we can't have aliases.
    > And I think that reply-to gets filtered.
    >
    > Archived-At: <https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/int-area/14Skgm84GslPZ9UcGoWY3uzmK6I__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6uWBNU-xJadaznxWvwmDk2-ARoR0DYYq_eprXSEjo$ >
    > To: int-area@ietf.org, captive-portal@ietf.org, homenet@ietf.org
    > From: Michael Richardson <mcr+ietf@sandelman.ca>
    > Date: Tue, 22 Sep 2020 16:34:33 -0400
    >
    > This thread was started today on the INTAREA WG ML.
    >
    > While I don't object to a BOF, I don't know where it goes.
    > What I see is that much of this problem needs to be resolved through
    > increased use of 802.1X: making WPA-Enterprise easier to use and setup, this
    > changing core identity from MAC Address to IDevID.
    >
    > My understanding is that Apple intends to randomize MAC every 12 hours, even
    > on the same "LAN" (ESSID), and that they will just repeat the WPA
    > authentication afterwards to get back on the network.   If the per-device
    > unique policy (including CAPPORT authorization) can be tied to the device
    > better, than the MAC address based "physical" exception can be updated.
    >
    > But, WPA-PSK doesn't work, because it does not, in general, distinguish
    > between different devices.
    >
    > It can be made to work if every device is given a unique PSK, and there are
    > some successful experiments doing exactly that.  Mostly it just works, but
    > the challenge is communicating the unique PSK through an unreliable human.
    > BRSKI can certainly do this, and it can leverage that unencrypted ESSID
    > present at most hospitality locations to get onto the encrypted
    > WPA-Enterprise.  Or BRSKI-TEEP, or some other BRSKI-EAP method.  The
    > unencrypted SSID is not going away at those locations.
    >
    > Thus QR-code based methods are best, yet those do not work for many IoT
    > devices.   EMU's EAP-NOOB can help in certain cases, but we, as a community
    > need be clear on what direction we want to go.  One answer is that IoT
    > devices have little reason to randomize their MAC if they are not generally
    > ported.
    >
    >
    > On 2020-09-22 3:49 p.m., Lee, Yiu wrote:
    >> Hi team,
    >>
    >> We proposed a BoF. The agenda is in
    >> https://urldefense.com/v3/__https://github.com/jlivingood/IETF109BoF/blob/master/109-Agenda.md__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6uWBNU-xJadaznxWvwmDk2-ARoR0DYYq_e7alyc8U$  and the
    >> proposal is in
    >> https://urldefense.com/v3/__https://github.com/jlivingood/IETF109BoF/blob/master/BoF-Proposal-20200918.md__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6uWBNU-xJadaznxWvwmDk2-ARoR0DYYq_eNfKGqkE$ . You
    >> can also find the draft here
    >> https://urldefense.com/v3/__https://tools.ietf.org/html/draft-lee-randomized-macaddr-ps-01__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6uWBNU-xJadaznxWvwmDk2-ARoR0DYYq_erhCF3-A$ .
    >>
    >> At this stage, we are looking for inputs for more use cases and interests
    >> of working together in this domain. Please post your comments in the
    >> mailing list.
    >>
    >> Thanks
    >>
    >
    >
    > --
    > Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
    >            Sandelman Software Works Inc, Ottawa and Worldwide
    >
    >
    > _______________________________________________
    > homenet mailing list
    > homenet@ietf.org
    > https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/homenet__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6uWBNU-xJadaznxWvwmDk2-ARoR0DYYq_epVo5mQQ$
    >