Re: Link-local connectivity in Web browsers

David Schinazi <dschinazi.ietf@gmail.com> Tue, 27 February 2024 05:20 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=ietf.org@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23539C15155C for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 Feb 2024 21:20:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.856
X-Spam-Level:
X-Spam-Status: No, score=-2.856 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=w3.org header.b="ZW1A/BQo"; dkim=pass (2048-bit key) header.d=w3.org header.b="MqkFlwh8"; dkim=pass (2048-bit key) header.d=gmail.com header.b="M4g7TQmF"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c9LdPQkQjLE7 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 Feb 2024 21:20:21 -0800 (PST)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4E4AC14F6FE for <httpbisa-archive-bis2Juki@ietf.org>; Mon, 26 Feb 2024 21:20:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=w3.org; s=s1; h=Subject:Content-Type:Cc:To:Message-ID:Date:From:In-Reply-To: References:MIME-Version:Reply-To; bh=BUQWk6AqiMr8UNqO5aPuRFF8G5bdbzy2yYDN3Rp/DQg=; b=ZW1A/BQoGJAnUHHJfyQzK5puHv Wl4+jLbordeKb5a8xDdiqVz/28rQhUuaHXGoXizJoLo5FsacqX2HeGduN0VVH6A6pjDyKJl6GhhPW BHg4HWBB6jDztchG8NcuNpWQwcZhPJo+IOyDZGl4qcvYeyAWIfW6hJ7mLgMj0YMRUEV1wc/25h/r6 Wz2yrcwdfcfEf5vFlcJlWBZ/V+Hxw+X0Lc66fyvThE6+JDVf4GL7aEhmn5m1dF0HZUxpWO2H+ch2R 0WXmC1vZxiD1nauxiFe6QFHWNUVf77L79YGSNEo7rZXvcGAZmZMneSgR2cpf1/pdclOurY0IL4iV5 ftUGzwhA==;
Received: from lists by lyra.w3.org with local (Exim 4.94.2) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1repsu-001K2T-6s for ietf-http-wg-dist@listhub.w3.org; Tue, 27 Feb 2024 05:20:08 +0000
Resent-Date: Tue, 27 Feb 2024 05:20:08 +0000
Resent-Message-Id: <E1repsu-001K2T-6s@lyra.w3.org>
Received: from puck.w3.org ([34.196.82.207]) by lyra.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <dschinazi.ietf@gmail.com>) id 1repsr-001K1S-Sn for ietf-http-wg@listhub.w3.org; Tue, 27 Feb 2024 05:20:05 +0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=w3.org; s=s1; h=Content-Type:Cc:To:Subject:Message-ID:Date:From:In-Reply-To: References:MIME-Version:Reply-To; bh=BUQWk6AqiMr8UNqO5aPuRFF8G5bdbzy2yYDN3Rp/DQg=; t=1709011205; x=1709875205; b=MqkFlwh8O/spP8nnbOuz2AC3pJmVOes3U67XQaAWT17yjlyxJfeYiBTWmDXv61ZCYr4zWQJS7Se 6ZI8bnVQw3gfQa1gu5b9/64fxPNDpLiEAnAGBgGfgcWZEYYhuI0YI/RZOBZ/oX2jxJcJaDe8ovqAh CfQsbBLxcbDip31IP/0qjnoHS60Z+15L9CaimS/Ln+LxRVc1OncFhO8FHEKhtWUQ7C0zpURaOIR8x hagdMPj8shL74svjCZOVf8TqGUC4QYfkVXqu1BZ1YrFn7lnhhznPoeixQENqTsxDoe2Mki/NWnZh5 zd0zE4JpIMILK6DQGqMu6Dn2ntrjqT0ALteQ==;
Received-SPF: pass (puck.w3.org: domain of gmail.com designates 2a00:1450:4864:20::12f as permitted sender) client-ip=2a00:1450:4864:20::12f; envelope-from=dschinazi.ietf@gmail.com; helo=mail-lf1-x12f.google.com;
Received: from mail-lf1-x12f.google.com ([2a00:1450:4864:20::12f]) by puck.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.96) (envelope-from <dschinazi.ietf@gmail.com>) id 1repsq-002KS1-2E for ietf-http-wg@w3.org; Tue, 27 Feb 2024 05:20:05 +0000
Received: by mail-lf1-x12f.google.com with SMTP id 2adb3069b0e04-5101cd91017so5696494e87.2 for <ietf-http-wg@w3.org>; Mon, 26 Feb 2024 21:20:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1709011200; x=1709616000; darn=w3.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=BUQWk6AqiMr8UNqO5aPuRFF8G5bdbzy2yYDN3Rp/DQg=; b=M4g7TQmF3+AxaxhKkfsf3lUSD7YYx7bx5JOZpZpv2guWKN5VXHNSnWcPrfyknzd8rp er0FyG/JDFkW+5NEDmpfgEBxdC5+UQ/R4WKSinw2c5crYKP1VM70UHK6YLP9+YvpeOyP wdZXeEnHWHRcMoLcShgj79CGfxThlsKDfunm64Q1L6MR8MdJdMCVVPKNYKCvsTxE0qXG B0RdkCSS1fzDr5OdyNAVLL6sda8Zfv/KAuhzObqy+gmblxBmzgswuIHEEbXnetytcvjM gHCEk+0TzapVPjVjLCCtEsbW0VvRtQEhKgGrOqLO3deQs0nlAO88caLROiMd0MDp+54D 5Dvg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709011200; x=1709616000; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=BUQWk6AqiMr8UNqO5aPuRFF8G5bdbzy2yYDN3Rp/DQg=; b=BOHxv6tNrWSA+Erre/zhJRGm0Tnr7PX0gLlSWIOFk3eOd/mg+sGnJQwxjY2cGOiqNn /FILwELsgYbWo2qeiKiMGCwAawAgtd2qSFgleKbtlQfTGDKGXa2WZ1t5DU6GX5YBLvuY aD1Uj0rfBUKLvr6MDtsPSyrwECAfuHNdxwFN8jz0ODl0kAJQFK2YoQmmHwGwBdy3lhYn iBtQPe3t8cufnSZ/vH9ocAbZ7QTkda5GEH+QkUF0gfuXNZgHufXA8I6pdYr9kAuLaVp2 XgF6aw5C7MPhGLb91Ev4QvhPvLW3eDhxFWdvVXrkIjZO9afY5obndWitsWbUHgbnIIob ctPw==
X-Forwarded-Encrypted: i=1; AJvYcCVxQ/xQR2k1Cp4H4ww25EHAkBILHhRB0c01TavnYpd04eKFKsUKafaqvyCYk+20JyRVClqUmsu1ho10cCzmUvn8KB6n
X-Gm-Message-State: AOJu0YxFbdGK1TgESuPquyZstcSpocou2J3uWV/0IYOjYq2vpevxetac lUJl3Oy+ra7ue8q5JxyT7/yd8c/zk/vuslJJJR0+vwn4NFke0n7RWfWQsnor8UMjfk+4T6HyHBz YR7oCXE5ZaFTJJldCiG0ITmeTgzwEYctvxhc=
X-Google-Smtp-Source: AGHT+IGk3EFkfdn43+DdDRdk6x9Viz1oZKNiA0EQam+kWhUik38itfeKiHtwvVxBQdjwC5aycu0PjVd+l+GyL9inLPo=
X-Received: by 2002:ac2:4c0b:0:b0:513:116b:2348 with SMTP id t11-20020ac24c0b000000b00513116b2348mr37947lfq.59.1709011199758; Mon, 26 Feb 2024 21:19:59 -0800 (PST)
MIME-Version: 1.0
References: <CAPDSy+7h3SSeKyA2CUazyWWsUi6+xhn2i91zNW1uz4NhgOGkug@mail.gmail.com> <AA46BAE0-EEC9-4985-AEFC-DF2423C9E582@msweet.org> <Zdamt16camKdi-z8@faui48e.informatik.uni-erlangen.de> <22C7EB50-FA1F-4DD5-9A92-ACAF54DD5B3C@msweet.org> <ZdfHM64RdHLHXQ4H@faui48e.informatik.uni-erlangen.de> <SA1PR15MB4370D9A3CB02716FB228D59EB35A2@SA1PR15MB4370.namprd15.prod.outlook.com> <Zd01iJLSs4qWnjEj@faui48e.informatik.uni-erlangen.de> <CAPDSy+5qHB0ih19aC=R5gM2j1z01x9goa=EXV=kYOj-1TaGE9g@mail.gmail.com> <Zd1IlafNogGHtaWK@faui48e.informatik.uni-erlangen.de> <CAPDSy+6B+07vm_cZbhDvWo=AOkyP-jMLC-Jx9bbEEVv4yBV5sA@mail.gmail.com> <Zd1RKPqsHcH9i_Yo@faui48e.informatik.uni-erlangen.de>
In-Reply-To: <Zd1RKPqsHcH9i_Yo@faui48e.informatik.uni-erlangen.de>
From: David Schinazi <dschinazi.ietf@gmail.com>
Date: Mon, 26 Feb 2024 21:19:48 -0800
Message-ID: <CAPDSy+61FKTrmRef2mHZiYBL_-fFPaaAmYuRcN+ao-HSMLSErw@mail.gmail.com>
To: Toerless Eckert <tte@cs.fau.de>
Cc: Ben Schwartz <bemasc@meta.com>, Michael Sweet <msweet@msweet.org>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="0000000000007a96670612562d80"
X-W3C-Hub-DKIM-Status: validation passed: (address=dschinazi.ietf@gmail.com domain=gmail.com), signature is good
X-W3C-Hub-Spam-Status: No, score=-9.1
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DMARC_PASS=-0.001, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_IRR=-3, W3C_WL=-1
X-W3C-Scan-Sig: puck.w3.org 1repsq-002KS1-2E 34f53f3adb4c6c5de07336bcfc6bd47b
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Link-local connectivity in Web browsers
Archived-At: <https://www.w3.org/mid/CAPDSy+61FKTrmRef2mHZiYBL_-fFPaaAmYuRcN+ao-HSMLSErw@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/51840
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/email/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Mon, Feb 26, 2024 at 7:04 PM Toerless Eckert <tte@cs.fau.de> wrote:

> On Mon, Feb 26, 2024 at 06:37:19PM -0800, David Schinazi wrote:
> > Hi Toerless,
> >
> > As discussed in previous email in the quite lengthy threads about
> > draft-schinazi-httpbis-link-local-uri-bcp, draft-carpenter-6man-zone-ui,
> > and draft-ietf-6man-rfc6874bis, you can't magically change how the origin
> > is used without considering all of the numerous places where the origin
> is
> > used, especially for security decisions. That means significant
> > standardization work, and also significant implementation work.
> > Implementers of HTTP have indicated their disinterest in performing that
> > work.
>
> Correct me if i am wrong, but is it not true, that this discussion took
> only place in the context of browsers, but not the broader set of software
> that is using HTTP(S) even programmatically such as in REST APIs ?
>

No, that discussion happened in the context of HTTP and URIs. It was not
specific to browsers. You can search for curl and wget in these threads to
get examples of non-browser software. For example:
https://mailarchive.ietf.org/arch/msg/ipv6/lLWV1WVmUxqN42fYQ-dlnI2d70U/

Is it not also true, that we have with browser a particularily difficult
> industry because it has convered to very few browser cores, namely
> chrome and firefox, which are re-used by a much larger number of
> significantly
> used browser in the industry, so effectively only two implementers have a
> real
> say when it comes down to implementation ?
>

I'm sure the folks over at Apple would have opinions about that statement,
but yes there is a small number of browsers today. That is a reality.

In addition: I have heard from one implementation attempt, and i can
> agree that these two browser cores are very complex. However, i am
> not persuaded, that this necessarily equals complexity in the standards
> process modelling that you claim to exist. After all, i think that
> was some good amount of examples here on the thread that the existing
> origin model does already carry security issues with it, that are simply
> being ignored because they are seemingly not significantly exploited.
>
> Aka: Given how the IETF has all of networking based on IPv6 at the
> network layer, and we can not change that to eliminate link-local
> addresses, and we also can not expect all use-cases to use (m)DNS
> (which also has other issues as we discussed), i think it is quite
> important to at least outline the standardization/security implications
> first and independent of the likely implementation effort so that
> we can judge them.
>

I think thinking through such security implications and writing them down
is always a good idea. I look forward to reading your draft! I'm also
curious to hear about these use-cases that cannot be solved by mDNS.

We have a lot of smaller areas in the industry, where smaller use-cases
> have resulted in custom setups of browsers, so i do not even agree
> to the assesment you and Murray do that WHATWG is the only relevant
> candidate implementers circle.
>

I don't understand what you mean. I only mention WHATWG in that they own
the URL spec used by browsers.

But at this point I think we've reached the limits of email back-and-forth,
and might benefit from verbal communication, I'll ask for some agenda time
to present this draft in Brisbane and we can pick this up there.

David

Cheers
>     Toerless
>
> > David
> >
> >
> > On Mon, Feb 26, 2024 at 6:27 PM Toerless Eckert <tte@cs.fau.de> wrote:
> >
> > > Thanks, David.
> > >
> > > Neverthless i do not see a technical issue to extend what rfc9110 says
> > > about transmitting origin by e.g. not including local context (such as
> > > zone_id).
> > >
> > > The examples i think show that if we want to support the whole
> IPv4/IPv6
> > > addressing architecture as well as also ambiguous domain names, that
> > > origin is not necessarily 1:1 between client and server except for
> > > the simple case
> > >
> > >   - the client may need to distinguish zone_id
> > >   - the server may need to distinguish client-source-ip-address (source
> > > country).
> > >
> > > And the problems aren't related only to IPv6 link-local.
> > >
> > > Cheers
> > >     Toerless
> > >
> > > On Mon, Feb 26, 2024 at 05:14:12PM -0800, David Schinazi wrote:
> > > > Hi Toerless,
> > > > The IP address is sent in the Host header.
> > > > David
> > > >
> > > > On Mon, Feb 26, 2024 at 5:06 PM Toerless Eckert <tte@cs.fau.de>
> wrote:
> > > >
> > > > > On Mon, Feb 26, 2024 at 03:10:35PM +0000, Ben Schwartz wrote:
> > > > > > I think it would help if this draft discussed scoping of cookies
> (and
> > > > > other HTTP client state).  In particular, I shouldn't be able to
> > > vacuum up
> > > > > your home "printer-123.local"'s cookies just by naming myself
> > > > > "printer-123.local" on the coffee-shop network.  Client state for
> > > .local
> > > > > domains needs to be partitioned by network to avoid these attacks.
> > > > >
> > > > > Not sure how to actually trigger the attack unless the user
> actively
> > > > > connects to
> > > > > that attacker in the coffee-shop explicitly, but architecturally
> you
> > > are
> > > > > of course
> > > > > putting the finger on the problem.
> > > > >
> > > > > Not sure if this problem has an existing technial term, but i would
> > > call
> > > > > it "ambiguous name/addresses".
> > > > >
> > > > > My last experience with this was when i set up a second Internet
> > > > > connection at home for
> > > > > reliability and other reasons, both Internet connections then had
> the
> > > same
> > > > > vendors type of
> > > > > router (Germany, AVM "Fritzbox"), both using the same IP address
> > > > > 192.168.178.1 and mDNS
> > > > > name fritz.box (*).
> > > > >
> > > > > So, oviously, when i connect my notebook from the SSID for one
> internet
> > > > > connection to the
> > > > > SSID of the other internet connection i do get all type of crappy
> > > > > web-browser results, because
> > > > > there are all type of incompatible cached web pages from the prior
> > > SSID's
> > > > > routers web interface.
> > > > >
> > > > > The same of course is happening, when i am streaming content from
> some
> > > > > web-page,
> > > > > and then i am changing my network path to come in via another
> country,
> > > > > because those domain name
> > > > > are actually offering differnt services depending how i arrive at
> them,
> > > > > and hence cached
> > > > > web-page information is really incorrect after such a change.
> Again, it
> > > > > does not depend
> > > > > on whether i am using an anycast address or a domain name, i am
> just
> > > > > running into use-cases
> > > > > that show the fact that even supposedly global names/addresses are
> not
> > > > > really global, but
> > > > > will also depend on the routing path.
> > > > >
> > > > > So, if i was to generalize this problem, i end up with:
> > > > >
> > > > >     https://<dnsname>%<network-context>/..
> > > > >     https://<ipaddress>%<network-context>/..
> > > > >
> > > > > Aka: IMHO i can pefecty well disambiguate these cases by adding
> > > > > network-context to the origin
> > > > > which is only evaluated by te local host. David Schinazi is
> pointing
> > > out
> > > > > that RFC9110 says that
> > > > > all part of the origin need to be sent to the remote system, and
> that
> > > may
> > > > > be a problem for
> > > > > ambiguous DNS names, but AFAIK it would not be a problem for
> > > IP-addresses,
> > > > > becasue they
> > > > > are not sent in server_name in TLS nor AFAIK in the Host: header.
> So
> > > even
> > > > > without a %zone_id,
> > > > > i think the RFC9110 statement is correct - i may be wrong.
> > > > >
> > > > > In any case, that's what i was trying to get bck from David, but
> have
> > > not
> > > > > seen a reply to my
> > > > > repeated asks to him about it.
> > > > >
> > > > > Cheers
> > > > >     Toerless
> > > > >
> > > > > (*) I think AVM came up with their .box pseudo TLS before they
> > > understood
> > > > > .local, and some time
> > > > > ago there was a reall .box TLD allocation happening, so now they
> have
> > > > > another fun problem to
> > > > > solve with their pseudo TLD. Talk about ambiguous domain names...
> > > > >
> > > > > >
> > > > > > I also think opportunistic encryption (RFC 8164) should be
> considered
> > > > > seriously in this context.  The security properties of local
> networks
> > > are
> > > > > different from the public internet, and opportunistic encryption
> seems
> > > to
> > > > > provide more value in this context.
> > > > > >
> > > > > > --Ben Schwartz
> > > > > > ________________________________
> > > > > > From: Toerless Eckert <tte@cs.fau.de>
> > > > > > Sent: Thursday, February 22, 2024 5:14 PM
> > > > > > To: Michael Sweet <msweet@msweet.org>
> > > > > > Cc: David Schinazi <dschinazi.ietf@gmail.com>; HTTP Working
> Group <
> > > > > ietf-http-wg@w3.org>
> > > > > > Subject: Re: Link-local connectivity in Web browsers
> > > > > >
> > > > > > On Thu, Feb 22, 2024 at 07:04:33AM -0500, Michael Sweet wrote:
> > > > > > > >> 2. Locally-Unique Addresses (ULAs) can be assigned
> automatically
> > > > > and are better supported by the various client OS's than the RFC
> 4007
> > > > > default scope for link-local addresses.
> > > > > > > >
> > > > > > > > I am not aware of schemes that would automatically assign
> ULAs,
> > > > > would love a reference.
> > > > > > > > I have written a scheme based on network wide
> > > > > configuration/autoprovisioning (RFC8994), but
> > > > > > > > i am not aware of any similar solutions like that widely
> used.
> > > > > > >
> > > > > > > Enterprise networks often make use of ULAs, and that is where I
> > > would
> > > > > expect them to be used most often since 'normal users' don't
> typically
> > > have
> > > > > the expertise to set those things up.
> > > > > >
> > > > > > Sure, but there is no "assigned automatically" the way i
> understand
> > > it.
> > > > > YOu may have
> > > > > > meant something different, so maybe its not a sufficiently well
> > > defined
> > > > > term.
> > > > > >
> > > > > > But in any case, ULA like global addresses do require additional
> > > address
> > > > > allocation/management
> > > > > > operations which may not have happened and/or which may not be
> > > desirable
> > > > > to be required,
> > > > > > so the underlying interest at least IMHO from the IPv6 networking
> > > world
> > > > > is to figure out
> > > > > > what the sanest way is to support LLA across all representations
> > > where
> > > > > they may be needed
> > > > > > including browsers. That's nonwithstanding that we wuold want to
> > > > > minimize the need
> > > > > > for having to use any IPv6 address by normal users under normal
> > > > > circumstances.
> > > > > >
> > > > > > Cheers
> > > > > >     toerless
> > > > > >
> > > > > > > ________________________
> > > > > > > Michael Sweet
> > > > > >
> > > > >
> > > > > --
> > > > > ---
> > > > > tte@cs.fau.de
> > > > >
> > >
> > > --
> > > ---
> > > tte@cs.fau.de
> > >
>
> --
> ---
> tte@cs.fau.de
>