Re: [ipwave] RFC8902 - TLS with ITS Certificates, EXPERIMENTAL, and the one PKI and one Internet
Mounira MSAHLI <msahli1717@gmail.com> Thu, 22 April 2021 17:16 UTC
Return-Path: <msahli1717@gmail.com>
X-Original-To: its@ietfa.amsl.com
Delivered-To: its@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C985A3A0CBE for <its@ietfa.amsl.com>; Thu, 22 Apr 2021 10:16:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.846
X-Spam-Level:
X-Spam-Status: No, score=-1.846 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2K1DbUW8NU8W for <its@ietfa.amsl.com>; Thu, 22 Apr 2021 10:16:35 -0700 (PDT)
Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 748ED3A0B9D for <its@ietf.org>; Thu, 22 Apr 2021 10:16:35 -0700 (PDT)
Received: by mail-qt1-x835.google.com with SMTP id d6so16128853qtx.13 for <its@ietf.org>; Thu, 22 Apr 2021 10:16:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=aeg/u7b6bMzrF8BLvd9a4ShXwOy6QpJniDFcoM/8iDI=; b=cNO70NiJ22/PY5zWwpjXnR7kHxCkS1yrHqjxKO+bC6MXFbgvTRPGd8V9APojv5ebM3 C/t9tA3GUpzzgRDTL0rQK8gMVc5+dkUd8Y93UgNMWoeAnmz59nokkPYJ99kpezDhcUIU JEp9Xzzdhs/T6XKcAgQKLNyXOJX0p4Ju7ZAbebbMPcjpKReHa8g2l1B+/bhAIKA4Gn9a LL/1PM8Zu9HzrFYGnYY+1/UtOzQAiAvR/kWMvYZGF8LaKFhOTVKZQBnRCQxdpN7D1ZUQ VqFaqCJyTD6m9gxifT+AwUduZVgvQC42YCT3B6LbX+cI0tJpgIs+lS6f4OCF1lZtTd1F nGvQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=aeg/u7b6bMzrF8BLvd9a4ShXwOy6QpJniDFcoM/8iDI=; b=bQdP8lZy2YaF42jKnl4mN737Ex22QZz4OchiArNMJI1Ya/2orATXEeTLTgHC2z6Qpi ri2G0FTTvg6Z6i5AcSwNsAM3TVkjIgsKvGtm+B+SE93ouj/dW4w+K5h/nwqiz5Zffo4e RCICvsKVtbD8z7kkaqQeqrdLeWa41/bqO+nftQBA2KwuXiDsCgKEqwO8Chy6R1d8spi2 nUpS910QsQ9RehaShpX/dJpc7q9sfEkqF2NPgJn3mc2fw7Wn4YqxsyUpAdD92doSSkKk qUGGXDZt2EiDcOBHj5CFZSDmS3hseSxMG3Fdx5vIvOTtp22aOtF6Sv0RWn2yp/mP09O+ MLYA==
X-Gm-Message-State: AOAM533KqFqzr46c4jpqVg9T8AHAJJCtP+ABBXOrivPnU3lDl+OD1Bq1 tmlvrfgQSp/EtwcM2G8L4NZp0E+kX49yTyKEM38=
X-Google-Smtp-Source: ABdhPJxfAf43gmkgEbbHJ4uo+5UE/cIVwAc9KS2KH4xo/Skvj9rM1LE8FLIq70KGwuw/Zo6fq9WjV7keqzrEmTGKV5Y=
X-Received: by 2002:a05:622a:446:: with SMTP id o6mr4151472qtx.257.1619111793272; Thu, 22 Apr 2021 10:16:33 -0700 (PDT)
MIME-Version: 1.0
References: <acc0f475-7f7b-bfbe-1099-913f0cef4de6@gmail.com> <01d601d731e3$140e2ed0$3c2a8c70$@eurecom.fr> <0600020f-b6ca-4d6d-2499-817586bc3548@gmail.com> <CAMEeBw9eaPBRT26BqqmXdEpqFzSTGt8w46wmexfg7ax4aRP-pQ@mail.gmail.com> <CAA2OGZCntE+FUtzKwxrsH7i_q70jjZuPoUjRG7cYmEVRHFJU8g@mail.gmail.com> <19dce5f5-8dca-55c2-4d46-bb83046562ab@gmail.com> <CAA2OGZDzWjQkSkn7W3bNC-w8ANk3Do-OdUwpZn9SK3na9afRpA@mail.gmail.com> <CAA2OGZAt+8araN_X_hMdZSpEaNmEZbrXUag8uhR5HALDgUqP4w@mail.gmail.com>
In-Reply-To: <CAA2OGZAt+8araN_X_hMdZSpEaNmEZbrXUag8uhR5HALDgUqP4w@mail.gmail.com>
From: Mounira MSAHLI <msahli1717@gmail.com>
Date: Thu, 22 Apr 2021 19:16:22 +0200
Message-ID: <CAA2OGZDFogwmhn6HEq7qd6Wxv9ZignYRBk55Ga6kJij2_NwPKw@mail.gmail.com>
To: Alexandre Petrescu <alexandre.petrescu@gmail.com>, its@ietf.org
Content-Type: multipart/alternative; boundary="0000000000004a2d1205c092d76e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/its/WFcupkfwTe_fTXHtHgPycKsC5ns>
Subject: Re: [ipwave] RFC8902 - TLS with ITS Certificates, EXPERIMENTAL, and the one PKI and one Internet
X-BeenThere: its@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IPWAVE - IP Wireless Access in Vehicular Environments WG at IETF <its.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/its>, <mailto:its-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/its/>
List-Post: <mailto:its@ietf.org>
List-Help: <mailto:its-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/its>, <mailto:its-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Apr 2021 17:16:41 -0000
But how you can sign with a certificate retrieved from the browser without the private key ? Regards Mounira Le jeu. 22 avr. 2021 à 17:52, Mounira MSAHLI <msahli1717@gmail.com> a écrit : > >> >> Hi Alex, >> >> >> >> But there are also other projects funded by the EU in the same domain >> (connected automated mobility with self-driving cars) and where more open >> certificates are being used, with more open source software. >> >> >> We are 19 member states in C-ROADS Platform. I did co-chair of TF1 >> C-Roads platform in 2018, dealing with security aspects and its >> interoperability in C-ITS. The common certificate data structure standard >> is ETSI TS 103 097 ( version 1.3.1 which is a profile of 1609.2). >> >> >> >> >> Yes, but has that been done? HAs someone put CAM messages on IP on a >> 4G >> >> link and signed with 1609.2 certificates? I think not. >> >> >> Why not? I did not get the point of the common browsers but it was tested >> on hybrid communication ITS-G5 and 5G >> >> >> >> >> Yes, but what CA would be put in the server of that log? Would that >> CA >> >> be a self-made CA with openssl (or other open source software), or would >> >> it be a widely known CA like the CAs present in firefox, for example? >> >> >> My guess is that you assume a self-made CAs, and I agree with it for >> >> experimentation. >> >> >> >> But for deployment there would be a need for the existing CAs in the >> >> browsers to implement these 1609.2 certs. And they are paying. I doubt >> >> it could work. >> >> >> The case of TLS Client Using the ITS Certificate and TLS Server Uses the >> X.509 Certificate is already covered by the RFC 8902. >> >> >> >> Recently I worked with Microsec and they might also propose >> certificates >> >> for cheaper (free), if it is for evaluation, or for academia, or >> >> similar. And Microsec CA _is_ present in the browsers. But can >> >> Microsec sign these 1609.2 certificates and still not ask me (end user) >> >> to pay for the certificates? >> >> >> I find that Microsec cert are compliant to standards below: >> >> IEEE Std 1609.2 (IEEE Standard for Wireless Access in Vehicular >> Environments); >> >> • ETSI TS 102 940 (ITS-S security (PKI) architecture and application >> groups); >> >> • ETSI TS 102 941 (Trust and Privacy Management) >> >> ETSI TS 103 097 (Certificate and message structure definitions for >> C2CPKI). >> >> >> So if you have end user micros cert, you can use it to sign C-ITS >> messages. >> >> >> >> And Microsec CA _is_ present in the browsers >> >> >> You mean the certificate authority. You want to sign CAM with certificate >> authority ? >> >> >> I did not get the point could you clarify more please. >> >> >> >> >> http://www.scoop.developpement-durable.gouv.fr/> : >> >> >> >> This is not reachable on IPv6. >> >> >> You mean the web page of the project or the PKI of the project ? >> >> Scoop + Intercor projects are already finished in December 2019. >> >> >> >> Any way the business model of C-ITS PKI, in all mentioned project is >> SaaS. If you want to get access to this service via IPv6, you can ask the >> PKI. >> >> >> >> Best Regards >> >> Mounira >> >> Le mar. 20 avr. 2021 à 11:51, Alexandre Petrescu < >> alexandre.petrescu@gmail.com> a écrit : >> >>> Hi, Mounira, >>> >>> Le 16/04/2021 à 14:13, Mounira MSAHLI a écrit : >>> > >>> > Dear all, Dear Russ, Dear Jerome, Dear Alex, >>> > >>> > >>> > >>> > I’m sorry for the delay. I would like to provide some >>> > clarificationsconcerning: >>> > >>> > >>> > >>> >>> This discrepancy is the following: in a few trials I >>> >>> participated, and >>> > >>> > some about I heard of, people use normal PKI with openssl and normal >>> > >>> > certificates in cars, over IP, on cellular links like 4G. They work >>> > >>> > fine. >>> > >>> > >>> > But, I want to highlight that the European commission are funding >>> > several Cooperative ITS (C-ITS) deployment projects such as: >>> > >>> > >>> > - Scoop@F http://www.scoop.developpement-durable.gouv.fr/ >>> > <http://www.scoop.developpement-durable.gouv.fr/> : >>> > >>> > >>> > which is about deploying 3000 cars + 2000 km of roads >>> > >>> > >>> > - InterCor https://intercor-project.eu/ >>> > <https://intercor-project.eu/>, >>> > >>> > - C-Roads Platform https://www.c-roads.eu/platform.html >>> > <https://www.c-roads.eu/platform.html> >>> > >>> > >>> > InterCor and C-Roads are about harmonising C-ITS specifications in >>> > Europe >>> > >>> > >>> > - INDID >>> > >>> https://www.c-roads.eu/pilots/core-members/france/Partner/project/show/indid.html >>> > >>> > < >>> https://www.c-roads.eu/pilots/core-members/france/Partner/project/show/indid.html >>> >. >>> > >>> > >>> > >>> > >>> > All these projects are using ETSI TS 103 097 certificates, which is a >>> > profile of 1609.2 to secure C-ITS messages: >>> >>> But there are also other projects funded by the EU in the same domain >>> (connected automated mobility with self-driving cars) and where more >>> open certificates are being used, with more open source software. >>> >>> > >>> > >>> https://ec.europa.eu/transport/sites/transport/files/c-its_certificate_policy_release_1.pdf >>> > >>> > < >>> https://ec.europa.eu/transport/sites/transport/files/c-its_certificate_policy_release_1.pdf >>> > >>> > >>> > >>> > >>> > As mentioned by Jerome, one use case of the RFC 8902 could be to sign >>> > CAM and DENM messages on facilities layer and not geonet as >>> > specified in ETSI. >>> >>> Yes, but has that been done? HAs someone put CAM messages on IP on a 4G >>> link and signed with 1609.2 certificates? I think not. >>> >>> It would be good if it worked, but it would need the CAs to know these >>> certifiicate formats, and the CAs would need to be known in common >>> browsers. >>> >>> > Yes, in projects dealing with C-ITS security >>> > interoperability, we use MQTT to exchange C-ITS messages between many >>> > countries to ensure continuity of service when vehicle is crossing >>> > borders. >>> >>> Ok, good to know. >>> >>> > >>> > >>> > We could also use the RFC for Vehicle-To-Internet simply to upload >>> > log of vehicle for example etc… >>> >>> Yes, but what CA would be put in the server of that log? Would that CA >>> be a self-made CA with openssl (or other open source software), or would >>> it be a widely known CA like the CAs present in firefox, for example? >>> >>> My guess is that you assume a self-made CAs, and I agree with it for >>> experimentation. >>> >>> But for deployment there would be a need for the existing CAs in the >>> browsers to implement these 1609.2 certs. And they are paying. I doubt >>> it could work. >>> >>> > >>> > >>> > >>> >>> The reason is because the former is all open source software and >>> >>> freely accessible standards, whereas 1609.2 are closed documents >>> >>> and ETSI ITS certificate software is not integrated in mainline >>> >>> software like openssl. >>> > >>> > >>> > There's a java implementation of 1609.2/103 097 here: >>> > https://github.com/pvendil/c2c-common >>> > <https://github.com/pvendil/c2c-common>. I already used it. >>> >>> Yes, but the spec is paying. That does inspire seriousness but might >>> inspire risk for the confidence. >>> >>> > >>> > >>> >>> ITS-specific CAs are closed, hard to access and the certificate >>> >>> are >>> > >>> > expensive. hard to access and the certificate are expensive. >>> > >>> > >>> > you can get certificates from >>> > https://www.ghsiss.com/v2x-certificates/ >>> > <https://www.ghsiss.com/v2x-certificates/> >>> >>> Thanks for the pointer, I did not know ghsiss. Are they paying >>> certificates? >>> >>> Recently I worked with Microsec and they might also propose certificates >>> for cheaper (free), if it is for evaluation, or for academia, or >>> similar. And Microsec CA _is_ present in the browsers. But can >>> Microsec sign these 1609.2 certificates and still not ask me (end user) >>> to pay for the certificates? >>> >>> Another thing to consider is whether or not ghsiss (and Microsec for >>> that matter) are reachable on IPv6. That is also a make kor break >>> condition of use. It is worth trying. >>> >>> Thanks for the message. >>> >>> Alex >>> >>> > >>> > >>> > >>> >>> In my personal opinion, it remains good if IPWAVE provides a >>> >>> guideline on how to secure IP vehicular communication, including >>> >>> interoperability between systems (although I have at that time >>> >>> limited resources to actively contribute to this), as several >>> >>> options are on the table and we need to guarantee the trust >>> >>> chain, even considering different protocol or standards being >>> >>> used. >>> > >>> > >>> > I’m also interested to work on security interoperability in C-ITS and >>> > we could add: >>> > >>> > >>> > - Misbehaving in vehicular network >>> > >>> > - Revocation management >>> > >>> > - Pseudonym management/change to avoid tracking and to ensure >>> > privacy >>> > >>> > >>> > Thank you Russ for your time on this RFC and for your valuable >>> > review. >>> > >>> > >>> > >>> > Kind regards >>> > >>> > Mounira >>> > >>> > >>> > >>> > >>> > >>> > >>> > >>> > >>> > ---------- Forwarded message --------- De : *Alexandre Petrescu* >>> > <alexandre.petrescu@gmail.com <mailto:alexandre.petrescu@gmail.com>> >>> > Date: jeu. 15 avr. 2021 à 22:44 Subject: Re: [ipwave] RFC8902 - TLS >>> > with ITS Certificates, EXPERIMENTAL, and the one PKI and one >>> > Internet To: Jérôme Härri <Jerome.Haerri@eurecom.fr >>> > <mailto:Jerome.Haerri@eurecom.fr>>, IPWAVE WG <its@ietf.org >>> > <mailto:its@ietf.org>> >>> > >>> > >>> > >>> > >>> > Le 15/04/2021 à 12:35, Jérôme Härri a écrit : >>> >> Dear Alex, >>> >> >>> >> Thanks. Indeed such discrepancies is particularly an issue when it >>> >> comes to merging wireless and wired (V2I). For example, you send a >>> >> DENM over 5G reaching a MEC. It will remove the ETSI KPI and do >>> >> something on its own (not fully sure what exactly), or if you use >>> >> MQTT type of interaction, where it is even less clear (what a >>> >> broker will do on a DENM sent over JSON is not fully clear to keep >>> >> track of any kind of security/data integrity... >>> >> >>> >> For that matter, there was one effort from C-ROAD to develop >>> >> something called 'Facilities' PKI, saying that the ITS KPI are at >>> >> facilities layer and no longer at geonet. The advantage is that at >>> >> least now, you do not need to remove the KPI when moving and >>> >> exchanging DENM (or else) in backend. But I am not sure of the >>> >> current status or even if this WI is actually active. >>> >> >>> >> Now, I do not fully agree with you with the equivalence of the >>> >> internet KPI and ITS KPI. Indeed, the principle is the same, but >>> >> in the test you mention, the trust chain is not guaranteed (you >>> >> edit your own root-CA for the purpose of the tests, but for example >>> >> in one of our cross-border deployment (e.g. DE-FR), this solution >>> >> does not work, as a German car will not recognize the CA from a >>> >> French root-CA. So, the key issue I see is not really (or only) on >>> >> security but on Trust. The ITS KPI is one option, there might be >>> >> others, but 'open ssl' strategies still face the trust-chain >>> >> issue. >>> > >>> > Jérôme, >>> > >>> > I agree with you. >>> > >>> > In the discussion above I think you meant 'PKI' throughout (Public >>> > Key Infrastructure), and not 'KPI' (Key Performance Indicator). >>> > >>> > That said, the question you formulate about how a car-to-server MQTT >>> > interaction on IP would be authenticated by certificates that are >>> > verified by CAs that are absent from normal browsers, or how the CAs >>> > that are present in normal browsers would help authenticating CAM >>> > messages sent on IP - is a very relevant question. >>> > >>> > Alex >>> >> >>> >> Best Regards, >>> >> >>> >> Jérôme >>> >> >>> >> -----Original Message----- From: its <its-bounces@ietf.org >>> > <mailto:its-bounces@ietf.org>> On Behalf >>> >> Of Alexandre Petrescu Sent: Thursday, 15 April 2021 12:20 To: >>> >> IPWAVE WG <its@ietf.org <mailto:its@ietf.org>> Subject: [ipwave] >>> >> RFC8902 >>> > - TLS with ITS >>> >> Certificates, EXPERIMENTAL, and the one PKI and one Internet >>> >> >>> >> Hi, IPWAVErs, >>> >> >>> >> A colleague pointed me to this recently issued RFC 8902 about TLS >>> >> with ITS Certificates. >>> >> >>> >> This RFC is of an EXPERIMENTAL Category. >>> >> >>> >> It might be in agreement with other IEEE standards such as 1609.2. >>> >> >>> >> But I must say that I think it further deepens the discrepancy >>> >> between what is PKI in the Internet and what is the closed PKI for >>> >> ITS. That is a discrepancy that exists for a long time, and I >>> >> must share that - IMHO - I am surprised that the IETF issues an RFC >>> >> that further promotes such a discrepancy. >>> >> >>> >> This discrepancy is the following: in a few trials I participated, >>> >> and some about I heard of, people use normal PKI with openssl and >>> >> normal certificates in cars, over IP, on cellular links like 4G. >>> >> They work fine. The CA is a local CA (not a commercial CA), but >>> >> the concept _is_ compatible with normal CAs. These dont use the >>> >> ETSI ITS-specific certificates, neither the 1609.2 certificates. >>> >> >>> >> I think there are more such trial deployments using local (but >>> >> standard, openssl PKIs and certificates) than there are trials >>> >> using ETSI ITS certificates or 1609.2 certificates. The reason is >>> >> because the former is all open source software and freely >>> >> accessible standards, whereas 1609.2 are closed documents and ETSI >>> >> ITS certificate software is not integrated in mainline software >>> >> like openssl. >>> >> >>> >> There are many easily accessible CAs (Certificate Authorities) >>> >> that are integrated in the Internet and in main web browsers, >>> >> whereas the ITS-specific CAs are closed, hard to access and the >>> >> certificate are expensive. Many strong oppinions maintain that it >>> >> should stay that way: cars PKI different than Internet PKI. >>> >> >>> >> There should be one Internet, and that means one trust, and one >>> >> PKI. >>> >> >>> >> Everything else should not be done at IETF, I think; hence my >>> >> comment about this particular RFC. >>> >> >>> >> That is my humble oppinion. >>> >> >>> >> I would like to hear other oppinions? Maybe I miss something... >>> >> >>> >> Alex >>> >> >>> >> _______________________________________________ its mailing list >>> >> its@ietf.org <mailto:its@ietf.org> >>> > https://www.ietf.org/mailman/listinfo/its >>> > <https://www.ietf.org/mailman/listinfo/its> >>> >> >>> >> _______________________________________________ its mailing list >>> >> its@ietf.org <mailto:its@ietf.org> >>> > https://www.ietf.org/mailman/listinfo/its >>> > <https://www.ietf.org/mailman/listinfo/its> >>> >> >>> > >>> > _______________________________________________ its mailing list >>> > its@ietf.org <mailto:its@ietf.org> >>> > https://www.ietf.org/mailman/listinfo/its >>> > <https://www.ietf.org/mailman/listinfo/its> >>> > >>> > >>> > _______________________________________________ its mailing list >>> > its@ietf.org https://www.ietf.org/mailman/listinfo/its >>> > >>> >>> _______________________________________________ >>> its mailing list >>> its@ietf.org >>> https://www.ietf.org/mailman/listinfo/its >>> >>
- [ipwave] RFC8902 - TLS with ITS Certificates, EXP… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Jérôme Härri
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Russ Housley
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Jérôme Härri
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Russ Housley
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Mounira MSAHLI
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] requirements for CAs for vehicular n… Alexandre Petrescu
- Re: [ipwave] wish list for CAs for vehicular netw… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Mounira MSAHLI
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Mounira MSAHLI
- Re: [ipwave] wish list for CAs for vehicular netw… Mounira MSAHLI
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] wish list for CAs for vehicular netw… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Mounira MSAHLI
- Re: [ipwave] wish list for CAs for vehicular netw… Mounira MSAHLI
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] wish list for CAs for vehicular netw… Alexandre Petrescu
- Re: [ipwave] wish list for CAs for vehicular netw… Mounira MSAHLI
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Mounira MSAHLI
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… William Whyte
- Re: [ipwave] wish list for CAs for vehicular netw… William Whyte
- Re: [ipwave] wish list for CAs for vehicular netw… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] wish list for CAs for vehicular netw… William Whyte
- Re: [ipwave] wish list for CAs for vehicular netw… Alexandre Petrescu
- Re: [ipwave] RFC8902 - TLS with ITS Certificates,… Alexandre Petrescu
- Re: [ipwave] permission Alexandre Petrescu
- Re: [ipwave] permission Jérôme Härri
- Re: [ipwave] permission Alexandre Petrescu