Re: [Id-event] "aud" vs. receiver issue raised in WGLC

Mike Jones <Michael.Jones@microsoft.com> Tue, 24 October 2017 18:54 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: id-event@ietfa.amsl.com
Delivered-To: id-event@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C5681397FA for <id-event@ietfa.amsl.com>; Tue, 24 Oct 2017 11:54:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.029
X-Spam-Level:
X-Spam-Status: No, score=-0.029 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3n65AodsIKZw for <id-event@ietfa.amsl.com>; Tue, 24 Oct 2017 11:54:42 -0700 (PDT)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0120.outbound.protection.outlook.com [104.47.38.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92C771397EF for <id-event@ietf.org>; Tue, 24 Oct 2017 11:54:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=BitMZisk3tGW9QFaWgjvoW3pR3rvNaeF0V4nAAxrMPk=; b=H31LcD8TBotN77SlilvU+Qe0VC2ha9bsp3BjcxeOFpozcf3Mx7pLRJW+8fSKjVqQyjL9WsCRyJrHsw9uAGhLn0RhTLOE9fkLvDcMwF4mfNpicrx6+q+cCM0siVp6uKaY9wEilAXjP/DRrIbvuw+mzWFkB7PoNpFzj9kfUiEb2r4=
Received: from CY4PR21MB0504.namprd21.prod.outlook.com (10.172.122.14) by CY4PR21MB0119.namprd21.prod.outlook.com (10.173.189.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.197.0; Tue, 24 Oct 2017 18:54:39 +0000
Received: from CY4PR21MB0504.namprd21.prod.outlook.com ([10.172.122.14]) by CY4PR21MB0504.namprd21.prod.outlook.com ([10.172.122.14]) with mapi id 15.20.0197.001; Tue, 24 Oct 2017 18:54:39 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Phil Hunt <phil.hunt@oracle.com>
CC: Marius Scurtescu <mscurtescu@google.com>, ID Events Mailing List <id-event@ietf.org>
Thread-Topic: [Id-event] "aud" vs. receiver issue raised in WGLC
Thread-Index: AQHTTCh6o4xBjT/YGEGMZ+isMbHIYaLx9juAgAAVi4CAAADJAIAABKyAgAAZxYCAAAChAIAAAOGAgAAOtACAABcoVoAADp+AgAD4AhA=
Date: Tue, 24 Oct 2017 18:54:39 +0000
Message-ID: <CY4PR21MB0504D9B25F3D52539D5322EBF5470@CY4PR21MB0504.namprd21.prod.outlook.com>
References: <e6649728-f94a-93f5-9885-c948a5b0ed49@gmail.com> <CAGdjJpJtfV9q2iaL-uao1b7XpQjx5uJrX=fnoM36POXLFYrqow@mail.gmail.com> <fa06137b-516f-4a57-8ed5-08cd2cc63af6@sit.fraunhofer.de> <71FA69AE-F8F6-45AB-9550-36BC9395DE32@gmail.com> <684D9C6F-C59A-4850-9A1B-24A026278A62@oracle.com> <CAGdjJpLYxzUqOGxZ9oTLiCzZAwffTEqjxBYNtZO09nF6RnzOAA@mail.gmail.com> <7DAF5B83-F6DB-4015-A011-AB6E13C46B81@oracle.com> <CAGdjJpJtP7w-wL3Pj=QODOjc9m15z0Ssd+8bwxX684c-t1bbiQ@mail.gmail.com> <5FF78162-D0FF-4742-90BF-9A12BA299D06@oracle.com> <CAGdjJpLVKveRGp3RSnxjUgqjv2bmgxZWTNcajRDNG0C2wKG1iw@mail.gmail.com> <73EA53D2-55F8-46EB-99BA-41516D844559@oracle.com> <CAGdjJpJGh0DAMT-ZUGZ8dYy7cqcS8L8NfSbtthUuYhLQCJJzvg@mail.gmail.com> <9D836134-3DD2-4444-92B4-07C7DA49D51A@oracle.com> <CY4PR21MB05043612734A19D3720D68D5F5470@CY4PR21MB0504.namprd21.prod.outlook.com> <FCC05106-D7D1-4F63-9223-96477BC3C6C5@oracle.com>
In-Reply-To: <FCC05106-D7D1-4F63-9223-96477BC3C6C5@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Ref=https://api.informationprotection.azure.com/api/72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=mbj@microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2017-10-24T11:54:35.8402840-07:00; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic; Sensitivity=General
x-originating-ip: [2001:4898:80e8:b::19a]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR21MB0119; 6:EaoINQnjSWoHsVbFe2HHJC44tClUMHnNWAOn3WDwlKgwpdCTOnOvBbjExA2Cx2u8lPmooqY+mtlu5cqJH1+gFByiV1To8oKK85Y/ZgP/wRxG9z8zBh6FV+xIzB7JXhcw3W888obAsZKXPOw3QHwVOYCsX4Qti/Cq91XZtyQOxhtUpN3+W6RyXxeQP0rK9rBHKToqQ7p4yXQ7WoF9GesPNij6bmR4ELtx+7jgSLFPG9N+/yUzIbPw6JpD1ohvfXzbE4eHZkLOrI6msmtT0E4ffiV6ypkPifrJ/bSTwSGk01nukImARClPSIP56a0z9iyj2vNVRDAT+aOTR6gSzksIS6ZQOCpHH1L4maI6m3X3KtU=; 5:E1UEh3XTJQga5H6iQlpgnhYlHwC3kMz2CvYiq3UkA/0CC3IoDkiL7AfL90Dx33Ip5qgv8Ag8YG9LyzW9P3jneqFU0c023TlgAy///WHoNMgTM9h0O4NSuecPGg5vNPyAOqd6ZpCM7vGvDXjXhJQQrY3PuFbP9e0e9vG+Z2J1LuY=; 24:kyW9lr3Jb7Jkkp8hmn6Cl4dTrjsVIguK30oVgEJed/G36HTNkJBBVVx4ujWm1Up2KD6Q7U1fvnmiwl/HSWdUGP2kVfDqHNmmmDFv5JWJKfc=; 7:d3bn6c8cZ+Qn+TY6UJxBvdzCvQL2ROfPGMP8ZTd3gNp5bQhiSq7jfYMYk2FDUc12+ITtg8aCXIb9rQgcrwwQzAa9fuBhdh51UYF1PbtIgFLLxoTgmygknFQDCByFFMyLv3I3TIHMKvHoYqDMFDdJGc+iQMLmk8gyII6MqHf79Bf3pcwidIFzsFGgimYYorqWk7YNVrcmTmxvY8CxH2pkwrHAbeXJKG4r7ku1d46XbVwvbHAPr55tKmbOX/ldXt6J
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: bc1afeb5-6f7e-48c8-6e21-08d51b10ade7
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081)(4534020)(4602075)(4627075)(201703031133081)(201702281549075)(2017052603231); SRVR:CY4PR21MB0119;
x-ms-traffictypediagnostic: CY4PR21MB0119:
x-exchange-antispam-report-test: UriScan:(158342451672863)(10436049006162)(89211679590171)(192374486261705)(788757137089)(211936372134217)(153496737603132)(21748063052155)(146099531331640);
x-microsoft-antispam-prvs: <CY4PR21MB01191C4E3D368F81A4D3EE50F5470@CY4PR21MB0119.namprd21.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(61425038)(6040450)(2401047)(8121501046)(5005006)(10201501046)(100000703101)(100105400095)(93006095)(93001095)(3002001)(3231020)(920507026)(6055026)(61426038)(61427038)(6041248)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123555025)(20161123558100)(20161123564025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY4PR21MB0119; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY4PR21MB0119;
x-forefront-prvs: 047001DADA
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(39860400002)(376002)(47760400005)(189002)(199003)(24454002)(54906003)(25786009)(34040400001)(189998001)(72206003)(77096006)(6436002)(6506006)(106356001)(966005)(105586002)(53546010)(74316002)(575784001)(7736002)(6916009)(86612001)(790700001)(93886005)(229853002)(2950100002)(102836003)(19609705001)(86362001)(97736004)(6116002)(14454004)(50986999)(76176999)(316002)(53946003)(8676002)(8936002)(54896002)(8990500004)(55016002)(236005)(6306002)(9686003)(2900100001)(22452003)(478600001)(99286003)(54356999)(7696004)(101416001)(10090500001)(561944003)(68736007)(3280700002)(81166006)(4326008)(6246003)(81156014)(53386004)(3660700001)(5660300001)(33656002)(53936002)(2906002)(1680700002)(606006)(10290500003)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR21MB0119; H:CY4PR21MB0504.namprd21.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_CY4PR21MB0504D9B25F3D52539D5322EBF5470CY4PR21MB0504namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bc1afeb5-6f7e-48c8-6e21-08d51b10ade7
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Oct 2017 18:54:39.2284 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR21MB0119
Archived-At: <https://mailarchive.ietf.org/arch/msg/id-event/qF2pUlEoqjElq2aHBWCG_i0NFsw>
Subject: Re: [Id-event] "aud" vs. receiver issue raised in WGLC
X-BeenThere: id-event@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "A mailing list to discuss the potential solution for a common identity event messaging format and distribution system." <id-event.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/id-event>, <mailto:id-event-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/id-event/>
List-Post: <mailto:id-event@ietf.org>
List-Help: <mailto:id-event-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/id-event>, <mailto:id-event-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Oct 2017 18:54:46 -0000

https://tools.ietf.org/html/rfc7519#section-4.1.3:

4.1.3<https://tools.ietf.org/html/rfc7519#section-4.1.3>.  "aud" (Audience) Claim
   The "aud" (audience) claim identifies the recipients that the JWT is
   intended for.

There’s a bunch of other places where the term “recipient” occurs.  Previous inconsistences in JWT were pointed out during late WG reviews and addressed using the current terminology, which is part of why I remember this at all.

My point of view is that reviewers noticed inconsistent usage of terminology during WGLC, so we should try to address that.  SET doesn’t exist in a vacuum – it’s a profile of JWT, so to the extent that SET uses concepts that JWT already has names for, we should use the same names unless there are compelling reasons not to.

It may be bike-shedding, but in my experience, if we don’t address inconsistencies now, they will be pointed out to us again during IETF-wide review – possibly by Gen-Art, possibly by Sec-Dir, possibly by our AD, or possibly by individual reviewers – and if not then, by the RFC Editor.  Better to fix these things now, rather than let them linger and generate more objections and delays.

                                                                -- Mike

From: Phil Hunt [mailto:phil.hunt@oracle.com]
Sent: Monday, October 23, 2017 9:01 PM
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: Marius Scurtescu <mscurtescu@google.com>; ID Events Mailing List <id-event@ietf.org>
Subject: Re: [Id-event] "aud" vs. receiver issue raised in WGLC

Mike,

The group originally requested change from publisher/subscriber to Event Transmitter and Event Receiver.

Regarding “consistency” between specs, I can’t find any definitive use of the term recipient in RFC7159, 7515, or 7523.  Am I missing something? I only found this paragraph:

Note:  No "charset" parameter is defined for this registration.

      Adding one really has no effect on compliant recipients.


Are we bike-shedding here?

Phil

Oracle Corporation, Identity Cloud Services Architect
@independentid
www.independentid.com<http://www.independentid.com>
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>

On Oct 23, 2017, at 8:08 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>> wrote:

See one of my other my other replies. The term should be “recipient” for JWT/JWS, etc. consistency.


From: Phil Hunt (IDM)<mailto:phil.hunt@oracle.com>
Sent: Monday, October 23, 2017 6:45 PM
To: Marius Scurtescu<mailto:mscurtescu@google.com>
Cc: ID Events Mailing List<mailto:id-event@ietf.org>
Subject: Re: [Id-event] "aud" vs. receiver issue raised in WGLC

Ok. I will do search replace on subscriber as they should all be receiver.

Thks

Phil

On Oct 23, 2017, at 5:52 PM, Marius Scurtescu <mscurtescu@google.com<mailto:mscurtescu@google.com>> wrote:
I raised a wording issue, not sure if it still applies:

"The abstract mentions "issuer" and "receiver" in the last sentence. "receiver" does not sound right (that should be used in the context of a transmitter), but I don't have a better suggestion. Audience?
The last paragraph of section 1 mentions "subscriber". I think it should be either "receiver" or "audience"."



Marius

On Mon, Oct 23, 2017 at 5:49 PM, Phil Hunt (IDM) <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>> wrote:
Ok. But you raised the concern. Are you withdrawing it?

Phil

On Oct 23, 2017, at 5:47 PM, Marius Scurtescu <mscurtescu@google.com<mailto:mscurtescu@google.com>> wrote:
On Mon, Oct 23, 2017 at 4:15 PM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>> wrote:
It’s quite relevant to those with distributed architectures.

If an Event Stream requires that SETs need to be encrypted (using JWE), the SETs needs to be encrypted so the “receiver" can read it.  Regardless, “aud” should be interpreted by the traditional JWT method which suggests the security domain the event is for.  For example, a web site relying party does not have the capability to process (or issue) events itself (eg. because of a distributed architecture). The relying party assigns another entity the role of Event Receiver (or Transmitter).

The problem being that If the “set” is encrypted for “aud” then only the “aud” entity can read the SET which will make it impossible to for another server to handle or worse, it would require sharing of private keys.

The RP controls the configuration of the stream, so they can specify an endpoint that belongs to the outsourced receiver and they can also specify an encryption key that is controlled by the outsourced receiver. The RP does not need access to the private key at all.

I still think it is irrelevant to the transmitter, or to this spec. I agree it is totally relevant for the RP,



Phil

Oracle Corporation, Identity Cloud Services Architect
@independentid
www.independentid.com<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.independentid.com&d=DwMFaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=CB-Hkcxglh-YNhXysOrrok_4zCGDYpxX49Xsuqtk5xM&s=yLs1cTxnvZUXAqt72qLGSJmz0X3EKVE6yNBJ0nsVUgo&e=>
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>

On Oct 23, 2017, at 3:58 PM, Marius Scurtescu <mscurtescu@google.com<mailto:mscurtescu@google.com>> wrote:

I think "aud" should point to the Receiver, the outsourcing is irrelevant.

Nothing needs to change here IMO.

Marius

On Mon, Oct 23, 2017 at 3:55 PM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>> wrote:
It seems reasonable to further clarify that the definition of a receiver could be improved.

I propose to change from:

   Event Receiver

      An Event Receiver is an entity that receives SETs through some

      distribution method.

To:

   Event Receiver

      An Event Receiver is an entity that receives SETs through some

      distribution method. An Event Receiver MAY be a different

      entity than that described by the “aud” claim.

Phil

Oracle Corporation, Identity Cloud Services Architect
@independentid
www.independentid.com<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.independentid.com&d=DwMFaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=fDB9pNmWNg5BPXoRtaXXB1Iz_tq5wICJLi5itJHRai0&s=Ee7RsPFKzheWNvOz1Ut9gCvs_2bw0DE6GEeg-S0KMyE&e=>
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>

On Oct 23, 2017, at 2:38 PM, Marius Scurtescu <mscurtescu@google.com<mailto:mscurtescu@google.com>> wrote:

I think "aud" is perfectly fine.

IMO it should make no difference for the Transmitter that the event is actually handled by an outsourced entity, the RP trusts that entity and the event is generated and targeted to the RP and not to the current outsourced processor.

Marius

On Mon, Oct 23, 2017 at 10:57 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>> wrote:

All,

I am reviewing the previous feedback from WGLC and will be bringing up any unresolved issues for quick discussion/confirmation…

Following up on Marius and Henk’s comment, I am concerned that “aud” has a very specific meaning and is often tied to a security domain definition. We should not necessarily say this is the receiver though it often turns out to be. For example a RP (“aud”) has outsourced events processing to a third party (the so called receiver).

I am happy with the current claim set, but maybe some text explaining that a receiver does not have to be the aud is appropriate?  I don’t see any benefit to having a receiver claim as this could complicate processing more than its worth.

There are a few other comments in this thread, but this one seemed the most unresolved.

Phil


On Aug 3, 2017, at 8:03 AM, Henk Birkholz <henk.birkholz@sit.fraunhofer.de<mailto:henk.birkholz@sit.fraunhofer.de>> wrote:

Hello,

to me, the "audience" claim seems to be a good choice here.

Viele Grüße,

Henk

On 08/02/2017 11:45 PM, Marius Scurtescu wrote:

The abstract mentions "issuer" and "receiver" in the last sentence. "receiver" does not sound right (that should be used in the context of a transmitter), but I don't have a better suggestion. Audience?
The last paragraph of section 1 mentions "subscriber". I think it should be either "receiver" or "audience".
The explanation for figure 1 states that the issuer denotes the transmitter. If the issuer and the transmitter are assumed to be the same entity, then the transmitter definition in section 1.2 should make that clear.
Figure 3, I think the "sub" claim should be nested in the event, next to the issuer that provides the correct context. The "iss" and "sub" definitions in 2.1 also touch on this, providing conflicting advice.
Section 2,1, definition of "nbf". The definition says that this is the event time. I see two problems:
- the name suggest "not before", not exactly the same as event time
- there can be multiple events
maybe this claim should be dropped?
Section 2.1, definition of "exp". Omitting this claim is the short term solution to the confusion issue. Why not mention that and that it SHOULD NOT be used?
Section 2.1, definition of "events". It states that all events must refer to the same logical event. Lately in discussions we reached the conclusion that all events in a SET should be defined in the same profile, which is a stronger requirement. I think this definition should mention that.
Regarding events and profiles. There was a proposal to add a new claim to uniquely identify the profile. I think we need to discuss that.
Figure 5. Maybe a signed example would be better, especially that the next paragraph mentions that signatures or encryption should be used.
Section 4.5, second paragraph. Mentions that "nonce" is also required, but that is not actually true. Id Tokens issued at the token endpoint for example will not have it. I suggest we drop the whole paragraph.
Marius
On Mon, Jul 31, 2017 at 1:40 PM, Yaron Sheffer <yaronf.ietf@gmail.com<mailto:yaronf.ietf@gmail.com> <mailto:yaronf.ietf@gmail.com>> wrote:
   This is to announce working group last call on this draft
   (https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dsecevent-2Dtoken_&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=UUydIFEV9SQ_lw_LNE4lvS7pQLXEZEWA2F1i7bfAuUY&s=9SIT98RlAb1C9Md1W54IRl6cxjlKfjqT99u5-Ojw4Fw&e=     <https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dsecevent-2Dtoken_&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=UUydIFEV9SQ_lw_LNE4lvS7pQLXEZEWA2F1i7bfAuUY&s=9SIT98RlAb1C9Md1W54IRl6cxjlKfjqT99u5-Ojw4Fw&e= >).
   Please send your comments to the list. Even if you are perfectly
   happy with the draft, please let us know that you support its
   publication as-is by posting to the list.
   Because of the summer holidays, this last call is open for 3 weeks,
   until Aug. 21.
   Thanks,
        Dick and Yaron
   _______________________________________________
   Id-event mailing list
   Id-event@ietf.org<mailto:Id-event@ietf.org> <mailto:Id-event@ietf.org>
   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_id-2Devent&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=UUydIFEV9SQ_lw_LNE4lvS7pQLXEZEWA2F1i7bfAuUY&s=jX1QgcFI8umtt8pEkthXa3uL_TsJINLVTXORUpSDnvA&e=     <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_id-2Devent&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=UUydIFEV9SQ_lw_LNE4lvS7pQLXEZEWA2F1i7bfAuUY&s=jX1QgcFI8umtt8pEkthXa3uL_TsJINLVTXORUpSDnvA&e= >
_______________________________________________
Id-event mailing list
Id-event@ietf.org<mailto:Id-event@ietf.org>
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_id-2Devent&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=UUydIFEV9SQ_lw_LNE4lvS7pQLXEZEWA2F1i7bfAuUY&s=jX1QgcFI8umtt8pEkthXa3uL_TsJINLVTXORUpSDnvA&e=

_______________________________________________
Id-event mailing list
Id-event@ietf.org<mailto:Id-event@ietf.org>
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_id-2Devent&d=DwIGaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=UUydIFEV9SQ_lw_LNE4lvS7pQLXEZEWA2F1i7bfAuUY&s=jX1QgcFI8umtt8pEkthXa3uL_TsJINLVTXORUpSDnvA&e=



_______________________________________________
Id-event mailing list
Id-event@ietf.org<mailto:Id-event@ietf.org>
https://www.ietf.org/mailman/listinfo/id-event<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_id-2Devent&d=DwMFaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=qgzi6hIQUdXUCZu3X2lrQFAdGZO2O9szzwPah2M8LX0&s=kr9e2Ob_q0g5BinjBOLJAjrZeWIcrCNx9O1jax-Bs8o&e=>



_______________________________________________
Id-event mailing list
Id-event@ietf.org<mailto:Id-event@ietf.org>
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_id-2Devent&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=fDB9pNmWNg5BPXoRtaXXB1Iz_tq5wICJLi5itJHRai0&s=7M0OleTd4BpCbNMHkA9Vif8ucznK2XkdYp7wB0zI3N0&e=