Re: [OPSAWG] [Technical Errata Reported] RFC8886 (6299)

"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 12 April 2021 18:06 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB1CB3A1047 for <opsawg@ietfa.amsl.com>; Mon, 12 Apr 2021 11:06:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.918
X-Spam-Level:
X-Spam-Status: No, score=-11.918 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=VLbGuvpA; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=IA2m6Pvu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KuW5-iI_31pw for <opsawg@ietfa.amsl.com>; Mon, 12 Apr 2021 11:06:22 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AA693A1043 for <opsawg@ietf.org>; Mon, 12 Apr 2021 11:06:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4398; q=dns/txt; s=iport; t=1618250782; x=1619460382; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=vLxnibqw9XnooIsjgkPl070Yr4FMyVEnHcXjehTKeLo=; b=VLbGuvpAdp49aypv67YCWROW1cmZHBcUyCmen5ngVXU9pm2vB3e4K5PX v5ozVku3YLSnwLrbfFuTWDkCjXy5/Kpy0z63Vys1u0OXc95IFHK9fIVy/ LCnrhb86cvDfxkegqC4HZj7lDAspQ5DHM69AQhdkDA2ag42GVUGtPfWqi U=;
X-IPAS-Result: A0AOAACYi3Rg/4sNJK1aGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBQIE/BAEBAQELAYFSUQd3WjYxCogAA4U5iFcDmTuBLoElA1QLAQEBDQEBKAoCBAEBgRYBgzkCgXkCJTUIDgIDAQEBAwIDAQEBAQEFAQEBAgEGBHEThVANhkQBAQEBA0ABATcBCwQCAQgRBAEBAS4yHQgCBAENBQgTgleCVQMvAQMLoVMCih91gTSBAYIEAQEGhRAYghMDBoE5AYJ1iTiBHwcgHIFJQoETQ4JfPoEEg0CDSoIrgkQFAWgUGyQgcAgHYgMOFDUIkGUpjEuBeph+ggsKgwudH4NNiniWLJUVnnCEOQICAgIEBQIOAQEGgVYDNYFZcBUagwpQFwIOjh+DcIUUhQkBO3MCNgIGAQkBAQMJfIsGAYEOAQE
IronPort-PHdr: A9a23:wKtluhD1YDIPEd29QFipUyQVnBdPi93PFgcI9poqja5Pea2//pPke VbS/uhpkEShdY7a8PlDzeHRtvOoVW8B5MOHt3YPONxJWgQegMob1wonHIaeCEL9IfKrCk5yH MlLWFJ/uX3uN09TFZX1ZkbZpTu56jtBUhn6PBB+c+LyHIOahs+r1ue0rpvUZQgAhDe0bb5oa husqgCEvcgNiowkIaE0mXP0
IronPort-HdrOrdr: A9a23:tF4Qla2g3IHaS6/crjKw3AqjBcN2eYIsi2QD101hICF9Wvez0+ izgfUW0gL1gj4NWHcm3euNIrWEXGm0z/9IyKErF/OHUBP9sGWlaLtj44zr3iH6F0TFmNJ1/Z xLN5JzANiYNzdHpO7x6gWgDpIEyN6I7KiniY7lvghQZCtBApsQiDtRIACdD0FwWU1iDZ02CJ KT6qN81kSdUF4Qadm2AWRAYvPKoMfFmImjTRkNARMm7wfmt0Lo1JfRFR+E0hACFw5e2LtKyx mKryXVxIWG98u6xBjVynPJ4/1t+OfJ59NfCKW3+7MoAxr2jALAXvUFZ5Sju3QPrPir+BIWlr D30msdFuBSz1+UQW2vuxvq3GDboXYTwlvv00WRj3emgeGRfkNBN+N7iYhUcgTU5iMb1bkWus 8mrgHp1aZ/Nh/OkD/w4NLFTXhR5zeJiEA/mu0ehWE3a/p5VJZtrJcS9E4QMJAMEDOS0vFeLM BSDdrR7PsTTFWCb3qxhBgX/PWQWB0Ib3O7a3lHnvbQ/yldnXh/wUdd7tcYhG08+JU0TIQBz/ jYM4xz/Ys+DfM+XOZYPqMsUMG3AmvCTVbnK2SJO2nqE6kBJjbkt4P32rMo/+unEaZ4jqcaqd Dkahd1pGQyc0XhBYmlx5tQ6C3AR227QHDLxtxB4YN6/pnxXqDiPyHGaF1Gqbrkn9wvRungH9 qjMpNfBPHuaUH0H5xS4gH4U55ObXYEVskYvcs6RkKOrsrHJpaCjJ2dTN/jYJ7WVRo0UGL2BX UOGBLpIt9b00ytUnjkxBjdMkmdPHDXzNZVKuz37uITwI8COslnqQ4Ok2m04cmNNHlHuqwyd0 1uPaP/nsqA1DCL1FeNy18sFgtWD05T7rmleWhNvxU2P0T9dqtGvc6ed2BU1H6OPQR+UMvSDQ 5aqz1MiOaKBq3V4RpnJ8OsM2qcgXdWjmmNVY0glqqK4tqgZok1FY88WKt6FRzCEht8nQoCkh YaVCY0AmvkUh/+g6Ssi5IZQNzFf95nmQGxPIp/snTEr3iRoskpW1oWVzOjStSsnA4rXjZY72 cBqJM3sf6lo3KPIXF6qPkkOFdMAV7ncY5uPUCgXsFovZzFPCt3VnyHgDSGjQpbQBuby2wiwk r7LSOVfvnXBEF6oX4w6NexzHpEMkOAYkl3dnd29ap6GGiugAcu7ca7IoyuzmCWdlwOhts4DQ iASz4TLgRyrurHiSK9kCqeFHkg25UlNvHcCrNmaL3IxnaxMuSz5NI7Nu4R85B/ON/0tOgXFe qZZg+ONTv9T/gkwgqPux8eSWVJgWhhlfPjwxv+6mekmHY5HPrJOVxjLotrae20/izhR/yS1o 9+gs9wteysMn/pYtrDza3MdTZMJlfSpmGxJttY5Kx8rOY3tLFpGYPcXiaN3HZb3A8mJMOxjV gAWs1Akfn8E54qe9ZXdzNS/1IvmtjKJEw3shbuCut7eV02lXfUM96A/rKgk8thPmSR4A/rfV WP+SxU+PnIGzGO0rMXEKo8K2VbYkpU0gUowMqSM4nLTAm6feBK+1S3dmKneLhGUa6fBPEeqA 1579zgpZ7gSwPonATL+T11LaJF/zz5HYe8AAeQFfVJ9NL/M1KWmaeu6NOyijCySTbTUTVtua RVMUgLKsJEgX0+iYdy1C64QKn+uFgknFtT+isPrC+k5qG2pGPAWVhbOgjYiIhMVTZdMnKUnd 3ImNLooUjV8XxAw93fD09ecdFFBsgIQoX2JyloL9IMvLTAxdtZvg1TJBE0D2A9jzjh3+Rpmb ehsc+iKdHfNQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,216,1613433600"; d="scan'208";a="679839998"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 12 Apr 2021 18:06:16 +0000
Received: from mail.cisco.com (xbe-rcd-006.cisco.com [173.37.102.21]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 13CI6BAq030623 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 12 Apr 2021 18:06:15 GMT
Received: from xfe-rcd-005.cisco.com (173.37.227.253) by xbe-rcd-006.cisco.com (173.37.102.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Mon, 12 Apr 2021 13:06:10 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xfe-rcd-005.cisco.com (173.37.227.253) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Mon, 12 Apr 2021 13:06:10 -0500
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Mon, 12 Apr 2021 14:06:10 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AVzG9jm6auTv9eBwqh3gs3N1pS7KEL2gAhDpKiEJ+UHpKb6Jdtf2jujLP+zipP5ESLNk1QpF1at+FQ+7ZHnFaQzeXUF3s5jmeej4I0MDMSUDHU/2e7HwjtehqL44QFN0yVon12IeFHJt8y9TdtyGU/fBuBK6Szr9c/EmslM5Yy6G3K4mVhybV8ArEVALL9efReaaDADw5q6nnrnGD+3ph/6US2ucNKFkh9YS/vr3MZAc5NA9eQnhR5YJq8aVLSmk/FQpbVgtTkSJ786VtSzZhiQ47mdYl4o/qXwjT9wGurEY+QCsXB/lREFzuSySkTcyEjkL3Ym+PCdJ3NAnd4942Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZKk5guBv1viGm98S1mDT3Hsm7UsbygxFTjQsNyMh4NQ=; b=cjFbze1gxjPtchpj0oUrb4D5cM2i+RC0+ZMVoiW/YjtzivskWqmFOpntdSuFDtGpVzk8bC7MSiJToYC8gkghJrpFQajk9TxU1wCaIDtukolXKv81djaKVhvuFN8IngJRL8rMzqprMgFq6BEmKlNcecXRyYDlXVzdq5Jp4zbYjGiB4lCigDe1WpNGXV0/kTMy1q+9e2wUThXyhDQ9llMiGMG2iPsst/1MG7czEwkz5MdBPBYFu0gyuHvfOUxAsSkDB+VoCNR8IYXSlhqWuRyiw4F+wnarheLNRSQaVjtEmhjtfMRHuHSmU/JuqHU+xMKnU9yHDm8u3ALWZwHg3B1tcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZKk5guBv1viGm98S1mDT3Hsm7UsbygxFTjQsNyMh4NQ=; b=IA2m6PvuCV4Ia4ZX2hzZVnw3gslVx2AlHr5YDGxbsdkafENQF5eecdASO2S9kJpzYlmWYDzPHIqHSx5ZCWa6g/cinrrqwDJVB8XiB8vPY0eOEgi4zDIkfdaeRe9FI0f2J4OBRqbQUdufvikPD8gLNn3K92rqB4TXfpfZcOPrvuo=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB4694.namprd11.prod.outlook.com (2603:10b6:208:266::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.20; Mon, 12 Apr 2021 18:06:09 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::24c4:4c09:f6f0:5510]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::24c4:4c09:f6f0:5510%2]) with mapi id 15.20.4020.022; Mon, 12 Apr 2021 18:06:09 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "Joe Clarke (jclarke)" <jclarke@cisco.com>, RFC Errata System <rfc-editor@rfc-editor.org>, "warren@kumari.net" <warren@kumari.net>, "cdoyle@juniper.net" <cdoyle@juniper.net>, "henk.birkholz@sit.fraunhofer.de" <henk.birkholz@sit.fraunhofer.de>, "zhoutianran@huawei.com" <zhoutianran@huawei.com>, "bortzmeyer+ietf@nic.fr" <bortzmeyer+ietf@nic.fr>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: [Technical Errata Reported] RFC8886 (6299)
Thread-Index: AQHWm01Ci94bmIKtl0yx8FL41bK7GaqyVBWQ
Date: Mon, 12 Apr 2021 18:06:09 +0000
Message-ID: <MN2PR11MB4366A200DDDDBCA78A3971A3B5709@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <20201005192449.5CC98F406D0@rfc-editor.org> <MN2PR11MB436697A1F966B91BC8A35C43B5709@MN2PR11MB4366.namprd11.prod.outlook.com> <BN6PR11MB16672778E922DCD780FBA5E6B8709@BN6PR11MB1667.namprd11.prod.outlook.com>
In-Reply-To: <BN6PR11MB16672778E922DCD780FBA5E6B8709@BN6PR11MB1667.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [82.12.233.180]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8b2c3cda-b268-41ba-92a2-08d8fddda65b
x-ms-traffictypediagnostic: MN2PR11MB4694:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR11MB46941BCE2DF0E76221D3EA0AB5709@MN2PR11MB4694.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB4366.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(346002)(136003)(39860400002)(376002)(366004)(8936002)(33656002)(186003)(316002)(478600001)(55016002)(26005)(66574015)(83380400001)(110136005)(9686003)(66946007)(66556008)(86362001)(64756008)(66446008)(53546011)(5660300002)(966005)(52536014)(4326008)(6506007)(76116006)(38100700002)(2906002)(8676002)(66476007)(7696005)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR11MB4366.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8b2c3cda-b268-41ba-92a2-08d8fddda65b
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Apr 2021 18:06:09.1735 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Vzb1QtWkuWJxkwSAJv+Uz236nYEcaG3ukX0f21ywh6LrL8DodZTFJdUlAwfLovt3N9BWR7ivfwt5Mv6AywK61g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4694
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.21, xbe-rcd-006.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/6b1o-SPX_P8Zu2W9YqieVyEV2Ws>
Subject: Re: [OPSAWG] [Technical Errata Reported] RFC8886 (6299)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Apr 2021 18:06:28 -0000

Stephane or Warren can probably can correct me as a butcher the explanation, but ...
... I think that the issue is that the appendix is given as sequence of steps to follow, and in Step 1 (A.1), the certificate is generated using an elliptical curve algorithm, which means that by the time that you get to the step in A 2.2 ,the openssl command fails because openssl doesn't allow you to S/MIME encrypt with the certificate generated in A.1 that is based on an elliptic curve algorithm.

The solution to fix this would be to change the type of algorithm used in Step 1 (A.1) to RSA, in which case this step would succeed.

Perhaps the explanation text needs a bit more clarity (that's presuming that my explanation is on the right track).

Thanks,
Rob


> -----Original Message-----
> From: Joe Clarke (jclarke) <jclarke@cisco.com>
> Sent: 12 April 2021 18:37
> To: Rob Wilton (rwilton) <rwilton@cisco.com>; RFC Errata System <rfc-
> editor@rfc-editor.org>; warren@kumari.net; cdoyle@juniper.net;
> henk.birkholz@sit.fraunhofer.de; zhoutianran@huawei.com
> Cc: bortzmeyer+ietf@nic.fr; opsawg@ietf.org
> Subject: Re: [Technical Errata Reported] RFC8886 (6299)
> 
> I'm confused here.  What is the the correction?  Seems like a fixed
> version of the command using RSA instead of EC is correct, but I'm not
> clear what the exact verification will be.
> 
> Joe
> 
> On 4/12/21 11:19, Rob Wilton (rwilton) wrote:
> > Hi,
> >
> > Speaking to Warren offline, he suggests (as an author) that this errata
> should be verified.
> >
> > Please let me know this week if anyone feels differently, otherwise I'll
> verify this at the end of the week.
> >
> > Thanks,
> > Rob
> >
> >
> >> -----Original Message-----
> >> From: RFC Errata System <rfc-editor@rfc-editor.org>
> >> Sent: 05 October 2020 20:25
> >> To: warren@kumari.net; cdoyle@juniper.net; warren@kumari.net; Rob
> Wilton
> >> (rwilton) <rwilton@cisco.com>; henk.birkholz@sit.fraunhofer.de; Joe
> Clarke
> >> (jclarke) <jclarke@cisco.com>; zhoutianran@huawei.com
> >> Cc: bortzmeyer+ietf@nic.fr; opsawg@ietf.org; rfc-editor@rfc-editor.org
> >> Subject: [Technical Errata Reported] RFC8886 (6299)
> >>
> >> The following errata report has been submitted for RFC8886,
> >> "Secure Device Install".
> >>
> >> --------------------------------------
> >> You may review the report below and at:
> >> https://www.rfc-editor.org/errata/eid6299
> >>
> >> --------------------------------------
> >> Type: Technical
> >> Reported by: Stéphane Bortzmeyer <bortzmeyer+ietf@nic.fr>
> >>
> >> Section: A.2.2
> >>
> >> Original Text
> >> -------------
> >>  openssl smime -encrypt -aes-256-cbc -in SN19842256.cfg \
> >>  -out SN19842256.enc \
> >>  -outform PEM SN19842256.crt
> >>
> >> Corrected Text
> >> --------------
> >> No corrected text, I think it requires more changes in the previous
> >> command.
> >>
> >>
> >> Notes
> >> -----
> >> The command in the RFC fails with:
> >>
> >> Error creating PKCS#7 structure
> >> 140616744621440:error:21082096:PKCS7
> >> routines:PKCS7_RECIP_INFO_set:encryption not supported for this key
> >> type:crypto/pkcs7/pk7_lib.c:487:
> >> 140616744621440:error:21073078:PKCS7 routines:PKCS7_encrypt:error
> adding
> >> recipient:crypto/pkcs7/pk7_smime.c:458:
> >>
> >> A rapid glance in some online discussions seem to indicate that you
> cannot
> >> S/MIME encrypt with elliptic curves.
> >>
> >> With RSA for the key, the command in the RFC works fine.
> >>
> >> Instructions:
> >> -------------
> >> This erratum is currently posted as "Reported". If necessary, please
> >> use "Reply All" to discuss whether it should be verified or
> >> rejected. When a decision is reached, the verifying party
> >> can log in to change the status and edit the report, if necessary.
> >>
> >> --------------------------------------
> >> RFC8886 (draft-ietf-opsawg-sdi-13)
> >> --------------------------------------
> >> Title               : Secure Device Install
> >> Publication Date    : September 2020
> >> Author(s)           : W. Kumari, C. Doyle
> >> Category            : INFORMATIONAL
> >> Source              : Operations and Management Area Working Group
> >> Area                : Operations and Management
> >> Stream              : IETF
> >> Verifying Party     : IESG