Re: [Idr] recap my questions and issues raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-12

John Scudder <jgs@juniper.net> Wed, 12 June 2019 01:06 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BB281200B5; Tue, 11 Jun 2019 18:06:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.709
X-Spam-Level:
X-Spam-Status: No, score=-2.709 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ViOyIBPQcpaW; Tue, 11 Jun 2019 18:06:30 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F05E12001E; Tue, 11 Jun 2019 18:06:30 -0700 (PDT)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x5C15Kxk003044; Tue, 11 Jun 2019 18:06:26 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=7g7BTAoeB87Iilt2G/6aEo2koMstp/8QC3UUkoSFJFc=; b=JxIVolOHeLRgkX2GP1q/D68VL4J6RFp9cl0MVApbeO+9Rsrr4xxMplCcipc3vpJ3L1sm 3Cj5LA2fdzc7WeRB/PJBZfkgjv8Q/pKbmBHse9OvEIYyXrmEGKIzH1a5/loplk0vWtcz XCKOHFHQxuDMPMRbCl/JfJuob2qkObG57X6HRWEgAnpZhe44dGCA0/gfLekGHWNKJ2NZ rkPJUGXsLpvR65GCS2rXIyXIQPQV/sy1X10jy+HtGTaaxhfxf93i99Oo8nb0L+S3M6TY 06UvSANEkHlIInYPmdFVIOvbx86tWYxWknA4Th/G5JdnO+95V9IhsEeGnmnTiYkfkcM/ nw==
Received: from nam05-dm3-obe.outbound.protection.outlook.com (mail-dm3nam05lp2055.outbound.protection.outlook.com [104.47.49.55]) by mx0a-00273201.pphosted.com with ESMTP id 2t2gsk8pty-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 11 Jun 2019 18:06:25 -0700
Received: from DM6PR05MB4714.namprd05.prod.outlook.com (20.176.109.215) by DM6PR05MB6346.namprd05.prod.outlook.com (20.178.224.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1987.9; Wed, 12 Jun 2019 01:06:22 +0000
Received: from DM6PR05MB4714.namprd05.prod.outlook.com ([fe80::1549:ffd0:8373:4593]) by DM6PR05MB4714.namprd05.prod.outlook.com ([fe80::1549:ffd0:8373:4593%3]) with mapi id 15.20.1987.008; Wed, 12 Jun 2019 01:06:22 +0000
From: John Scudder <jgs@juniper.net>
To: Linda Dunbar <ldunbar@futurewei.com>
CC: Keyur Patel <keyur@arrcus.com>, "draft-ietf-idr-tunnel-encaps@ietf.org" <draft-ietf-idr-tunnel-encaps@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Thread-Topic: [Idr] recap my questions and issues raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-12
Thread-Index: AdUfzDTwk+JWx4NrTbCw24feqIEcxQADfhQAAABU8AAALY6XEAAB/DuAAADUtIAAB4M7gA==
Date: Wed, 12 Jun 2019 01:06:22 +0000
Message-ID: <A0BFA680-AAF8-4FF6-A003-06467AF56120@juniper.net>
References: <MN2PR13MB358247036D97F6620E2CB987A9130@MN2PR13MB3582.namprd13.prod.outlook.com> <234E41A5-F754-4630-B73C-8A9D52E44198@juniper.net> <6691B6FF-E9F5-4E9B-8D91-E8371993EDB5@juniper.net> <MN2PR13MB35826173FB5AC8D019497438A9ED0@MN2PR13MB3582.namprd13.prod.outlook.com> <5E89EE56-8852-4A1C-B072-EFE15ADA2618@juniper.net> <MN2PR13MB3582BDF6E0798D755EC10E4DA9ED0@MN2PR13MB3582.namprd13.prod.outlook.com>
In-Reply-To: <MN2PR13MB3582BDF6E0798D755EC10E4DA9ED0@MN2PR13MB3582.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: af81d141-fdbf-44a9-abaa-08d6eed22f73
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:DM6PR05MB6346;
x-ms-traffictypediagnostic: DM6PR05MB6346:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <DM6PR05MB6346AA411090BF86FE51AF51AAEC0@DM6PR05MB6346.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0066D63CE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(136003)(366004)(39860400002)(346002)(376002)(199004)(189003)(86362001)(66446008)(71200400001)(66946007)(53936002)(64756008)(66556008)(76116006)(71190400001)(478600001)(36756003)(53946003)(66476007)(486006)(73956011)(76176011)(2906002)(6436002)(186003)(33656002)(446003)(2616005)(11346002)(91956017)(7736002)(30864003)(26005)(66574012)(14454004)(966005)(229853002)(476003)(6306002)(606006)(8676002)(6116002)(99286004)(81156014)(3846002)(8936002)(316002)(4326008)(6506007)(81166006)(53546011)(66066001)(25786009)(68736007)(5024004)(14444005)(5660300002)(54896002)(6246003)(6486002)(256004)(54906003)(236005)(6512007)(6916009)(102836004)(579004)(559001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB6346; H:DM6PR05MB4714.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Uy0dTT6sbRI9qYEB2FuFHylADsw8O3ziWq+8UHdoHAw4F/mw5Dny+V2bEk4zGQw1CcmtMoSaqx6/i49KG0vfATrrRk27o7Cu8H4pnVnZSLp4cU7yUPR7wzevRAm6Lg9weMDp4/E3haOZ0TLsl4Ec/7eXq4f07ORr9VBx8WKDgHKc/8rffY2LWyo8I63wu6G5yJFOgD63kOsJsWtN1BemJkTOW745EoCQrhLjmFqI9IN7QSYp5f0yYCGDp+6g+5gT46/f5Nvi/cmDmUQS5m8eIP9sUYKNu5EOAFG+kLIyhvGwrB98tuyH/Q/lByrw7Mmwo745lztTVmMmX5YnTJCDVQjO2pVj2HRDG1ll/YtvV/JRBMIugXxeQBER1VgLtSrc2eKkHUfvDJ9hSDnrF+x8mqtnKc0waH21qUY+EgPcRmc=
Content-Type: multipart/alternative; boundary="_000_A0BFA680AAF84FF6A00306467AF56120junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: af81d141-fdbf-44a9-abaa-08d6eed22f73
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Jun 2019 01:06:22.5406 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jgs@juniper.net
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB6346
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-06-11_12:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1906120005
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/bIGabsMQHiUWcg2dl2gUVl4OZ1M>
Subject: Re: [Idr] recap my questions and issues raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-12
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jun 2019 01:06:35 -0000

(Still as a WG contributor, except where indicated.)

On Jun 11, 2019, at 5:50 PM, Linda Dunbar <ldunbar@futurewei.com<mailto:ldunbar@futurewei.com>> wrote:

John,

Thank you very much for the explanation, especially the analysis on “Remote Endpoint” not constrained to the BGP speaker that originates the Tunnel-Encap Update. Just wish the authors can add the explicit description to the document, to avoid confusion to many people.

(This part is with my co-chair hat on.)
Considering the document is past WGLC with decent support and engagement, my working assumption is that this comment (that the document is confusing) is what the IETF process calls “in the rough” — that is to say, not wrong (how could it be wrong for you to say you found it confusing? It’s a statement about your own personal reaction, after all), but not an opinion shared by others.
(End of co-chair comments, back to “WG contributor.)

Is my following understanding correct?

When a node R sends the Tunnel-Encap with “remote endpoint” address being A, does it mean that any node (which can be many nodes) receiving the Update can assume that node A has the capability described by the Tunnel-encap (such as supporting the specific encap)?  If a receiving node, say B, doesn’t support the capability being advertised by this Tunnel-Encap, the Node B basically ignore the Tunnel-Encap Update?

That matches my understanding.

If the node R encodes wrong Encap capability for remote endpoint A, i.e. wrongfully advertises remote endpoint A supporting VxLAN Encap (but Node A actually doesn’t),  Node B will send VxLan encapsulated data frames to A upon receiving the Update.

Again, that is my understanding.

How does RFC6811 handle this issue?

I think you can break this down into two cases: misconfiguration, and attack. RFC6811 doesn’t do anything to prevent someone who genuinely does administer both node R and remote endpoint A from configuring things wrong. However, RFC6811 can provide some better-than-nothing level of checking against an attack, as outlined in section 13, essentially by checking that R and A are under a common administration. As section 13 goes on to say, you shouldn’t rely too much on this, because the security assurances provided by RFC6811 are not strong — it’s rather easy to forge a source AS if you are a genuinely malicious attacker, for example. However, these are issues that exist in the base BGP protocol and as we discussed earlier also exist in RFC5512 and basically, every use of BGP other than those within walled gardens, or BGPSEC. So, I think we can say tunnel-encaps is not worse than RFC5512 in this respect, though it may not be better or at least much better, either.

Regards,

—John


Linda



From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, June 11, 2019 4:07 PM
To: Linda Dunbar <ldunbar@futurewei.com<mailto:ldunbar@futurewei.com>>
Cc: Keyur Patel <keyur@arrcus.com<mailto:keyur@arrcus.com>>; draft-ietf-idr-tunnel-encaps@ietf.org<mailto:draft-ietf-idr-tunnel-encaps@ietf.org>; idr@ietf.org<mailto:idr@ietf.org>
Subject: Re: [Idr] recap my questions and issues raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-12

(Still as a WG contributor…)

Hi Linda,


On Jun 11, 2019, at 4:41 PM, Linda Dunbar <ldunbar@futurewei.com<mailto:ldunbar@futurewei.com>> wrote:

John,

Before I elaborate for more scenarios, I would like to get the answer to the following question:


  *   Does the “Remote Endpoint” in draft-ietf-idr-tunnel-encaps-12 represent the BGP speaker that originates the update? Or the remote end point that the “Tunnel” is established to?

     *   I have been told two different versions of the answers. I need confirmation from the authors.


I’m not an author of course but I’ll provide my own reading for the sake of continuing the discussion. I just reviewed section 3.1 of the draft, and based on that review it’s my opinion that the Remote Endpoint is clearly not constrained to represent only the BGP speaker that originates the update. Reasons for thinking this include:

- There is no text stating that it’s so constrained. “Everything is permitted except that which is forbidden.”
- There is a detailed set of validation procedures. If the authors had wanted this constraint, it seems unlikely they would have just forgotten to put it in the set of procedures.
- There is special case text that says if the AF subfield is 0, the remote endpoint is inferred from the NH. “The exception proves the rule."

Furthermore, the first two paragraphs of section 9, while they don’t explicitly say a third-party route is being used, only make sense in that context, so that’s yet more evidence that this is the correct reading. Finally, the first paragraph of the Security section has the same implication.


     *

Can a node R send Tunnel-Encap update with “remote endpoint” being A?

Based on the above, my answer would be “yes”. (Subject to the various validation procedures listed in the draft, of course.)


The Section 13 suggests “BGP Origin Validation [RFC6811] can be used”.  But “BGP Origin Validation” is only to validate the Speaker, correct?

No. The TL;DR of RFC 6811 is that

- There’s a database (the RPKI) that lists (in a cryptographically secure way) what ASes are allowed to originate what prefixes
- A router can check a route against that database, considering the prefix and origin AS:
- If they’re found in the RPKI, the route is considered valid
- If no assertion about the prefix is found in the RPKI, the route is considered not found.
- If an assertion is found in the RPKI but it doesn’t match what was found in the update, the route is considered invalid.

You will note this has nothing to do with the speaker that provided the update, it relates only to the contents of the route.

Naturally this is only a quick summary, from memory. If you want authoritative detail you should refer to RFC 6811 itself. It's short and (IMHO :-) readable.


doesn’t seem to address the security scenario being described.

Maybe my description of RFC 6811 helps?

Regards,

—John



Linda

From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Monday, June 10, 2019 5:26 PM
To: Linda Dunbar <ldunbar@futurewei.com<mailto:ldunbar@futurewei.com>>
Cc: Keyur Patel <keyur@arrcus.com<mailto:keyur@arrcus.com>>; draft-ietf-idr-tunnel-encaps@ietf.org<mailto:draft-ietf-idr-tunnel-encaps@ietf.org>; idr@ietf.org<mailto:idr@ietf.org>
Subject: Re: [Idr] recap my questions and issues raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-12

(Still as a WG contributor)

A little bit more on this.

Your comments led me to go look back at the draft’s Security section again. The first paragraph reads


   The Tunnel Encapsulation attribute can cause traffic to be diverted

   from its normal path, especially when the Remote Endpoint sub-TLV is

   used.  This can have serious consequences if the attribute is added

   or modified illegitimately, as it enables traffic to be "hijacked".


This seems like an explicit acknowledgement of the general class of attack you describe.

It might be helpful if you provide a worked example of a specific attack that would succeed against a tunnel-encaps implementation, but would not succeed against a 5512 implementation. I can’t think of one off the top of my head, but you clearly have something in mind.

Thanks,

—John




On Jun 10, 2019, at 6:16 PM, John Scudder <jgs=40juniper.net@dmarc.ietf.org<mailto:jgs=40juniper.net@dmarc.ietf.org>> wrote:

(As a WG contributor)

Hi Linda,

I have a question for you — when you say RFC5512 doesn’t allow a third party to inject routes on behalf of a legitimate router, what do you think would prevent it? You mention the endpoint address in the NLRI, but what would prevent the malicious entity you mention for from falsifying it?

Thanks,

—John



On Jun 10, 2019, at 4:47 PM, Linda Dunbar <ldunbar@futurewei.com<mailto:ldunbar@futurewei.com>> wrote:

Keyur,

Thank for the email.
One more question:

  *   Does the “Remote Endpoint” in draft-ietf-idr-tunnel-encaps-12 represent the BGP speaker that originates the update? Or the remote end point that the “Tunnel” is established to?

     *   I have been told two different versions of the answers. I need confirmation from the authors.



Reading through the Section 13 Security Consideration, I don’t think the following questions have been addressed:


  1.  In RFC5512, the BGP speaker indicates the originating Interface address in the NLRI (section 3):


<image001.png>

Questions:


  *   draft-ietf-idr-tunnel-encaps-12  no longer has the BGP speaker originating the update. Is it intended?



If Yes, does it mean that it allows a third party (which could be malicious entity) to inject routes on behalf of a legitimate router (but RFC5512 doesn’t)?


  *   Why add this scenario? If it is a conscious decision, should have some text to explain why and how to mitigate the security threats introduced.



  *   Section 13 suggests using BGP Origin Validation to obtain the additional assurances of the origin AS is valid. But being valid origin AS doesn’t mean the specific flow is supposed to go/come from there.



#Keyur: Section 13 of the draft version 12 describes Security Considerations that should address your security questions. The option is to provide flexibility.


Thank you,

Linda Dunbar

From: Keyur Patel <keyur@arrcus.com<mailto:keyur@arrcus.com>>
Sent: Saturday, June 08, 2019 3:45 AM
To: Linda Dunbar <ldunbar@futurewei.com<mailto:ldunbar@futurewei.com>>; draft-ietf-idr-tunnel-encaps@ietf.org<mailto:draft-ietf-idr-tunnel-encaps@ietf.org>; idr@ietf.org<mailto:idr@ietf.org>
Cc: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Subject: Re: recap my questions and issues raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-11

Hi Linda,

Apologies for the delayed response. Responses are inline. #Keyur

From: Linda Dunbar <linda.dunbar@huawei.com<mailto:linda.dunbar@huawei.com>>
Date: Thursday, March 28, 2019 at 6:52 AM
To: idr wg <idr@ietf.org<mailto:idr@ietf.org>>, "draft-ietf-idr-tunnel-encaps@ietf.org<mailto:draft-ietf-idr-tunnel-encaps@ietf.org>" <draft-ietf-idr-tunnel-encaps@ietf.org<mailto:draft-ietf-idr-tunnel-encaps@ietf.org>>
Subject: recap my questions and issues raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-11
Resent-From: <keyur@arrcus.com<mailto:keyur@arrcus.com>>
Resent-To: <erosen52@gmail.com<mailto:erosen52@gmail.com>>, <keyur@arrcus.com<mailto:keyur@arrcus.com>>, <gunter.van_de_velde@nokia.com<mailto:gunter.van_de_velde@nokia.com>>
Resent-Date: Thursday, March 28, 2019 at 6:52 AM

Just want to reiterate my questions and issues I raised during IDR Thurs session for draft-ietf-idr-tunnel-encaps-11, to make it easier for the authors to address them in the next revision (I have sent the questions multiple times on the IDR mailing list, but no one responded):


  1.  When a client route can egress multiple egress ports (each with different IP addresses), does the Tunnel-Encap allow multiple “Remote-endpoint” SubTLV to be attached one UPDATE?


#Keyur: Yes. Section 5 of the draft version 12 has a following  text:

<snip>
A Tunnel Encapsulation attribute may contain several TLVs that all
   specify the same tunnel type.  Each TLV should be considered as
   specifying a different tunnel.  Two tunnels of the same type may have
   different Remote Endpoint sub-TLVs, different Encapsulation sub-TLVs,
   etc.  Choosing between two such tunnels is a matter of local policy.
</snip>



  1.  Section 3.1 Page 10: The last paragraph states that if “Remote-Endpoint sub-TLV contains address is valid but not reachable, and the containing TLV is NOT be malformed ..”. Why a address not reachable is considered as “Not Malformed”?


#Keyur: That is because the Remote-Endpoint could become reachable at the later time. Making it malformed would mean that the Remote-Endpoint has to be dropped upon a receipt of the update message (and could never be used).



  1.  In RFC5512, the BGP speaker indicates the originating Interface address in the NLRI (section 3):


<image001.png>

draft-ietf-idr-tunnel-encaps-11  no longer has the BGP speaker originating the update. Is it intended? If Yes, does it mean that it allows a third party (which could be malicious entity) to inject routes on behalf of a legitimate router (but RFC5512 doesn’t)?  Why add this scenario? How to address the security threats introduced? If it is a conscious decision, should have some text to explain why and how to mitigate the security threats introduced.

#Keyur: Section 13 of the draft version 12 describes Security Considerations that should address your security questions. The option is to provide flexibility.

Regards,
Keyur



Thanks, Linda Dunbar

_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_idr&d=DwICAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=hLt5iDJpw7ukqICc0hoT7A&m=ss5r9k8Dew3MPUscEO1GEzNXkyfGpMlZLZUarUnS3Ys&s=_MC-6zg-U8xFzoGxuXaXYA3GVjY7anTiHQ-cuyr9Pfw&e=<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Furldefense.proofpoint.com-252Fv2-252Furl-253Fu-253Dhttps-2D3A-5F-5Fwww.ietf.org-5Fmailman-5Flistinfo-5Fidr-2526d-253DDwICAg-2526c-253DHAkYuh63rsuhr6Scbfh0UjBXeMK-2Dndb3voDTXcWzoCI-2526r-253DhLt5iDJpw7ukqICc0hoT7A-2526m-253Dss5r9k8Dew3MPUscEO1GEzNXkyfGpMlZLZUarUnS3Ys-2526s-253D-5FMC-2D6zg-2DU8xFzoGxuXaXYA3GVjY7anTiHQ-2Dcuyr9Pfw-2526e-253D-26data-3D02-257C01-257Cldunbar-2540futurewei.com-257C558cd9ab20274720b23f08d6eeb0d3a3-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C0-257C636958840584510820-26sdata-3D9GNDbc02bhbw8UOfAse8BqRvrod7iWKB9YUEeV14Puk-253D-26reserved-3D0&d=DwMGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=hLt5iDJpw7ukqICc0hoT7A&m=1AyoXaxQ9o5lOxtLcCzBDq3kTaurT7x6ysyIoZtY1EU&s=RjpYAaXfR7_XMRuB5AEEoylIyZhm98UlCZMrArLUm_c&e=>