Re: [OPSAWG] Fwd: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt

"Rose, Scott W. (Fed)" <scott.rose@nist.gov> Wed, 08 July 2020 13:56 UTC

Return-Path: <scott.rose@nist.gov>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 083C93A0BF1 for <opsawg@ietfa.amsl.com>; Wed, 8 Jul 2020 06:56:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nist.gov
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wmXrMMRbncMo for <opsawg@ietfa.amsl.com>; Wed, 8 Jul 2020 06:56:14 -0700 (PDT)
Received: from GCC02-DM3-obe.outbound.protection.outlook.com (mail-dm3gcc02on2122.outbound.protection.outlook.com [40.107.91.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA5203A0BF0 for <opsawg@ietf.org>; Wed, 8 Jul 2020 06:56:14 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZZIymgREEpm6QeXhqzkW5EuGjMhEgO1QI+JD3o598ZVgmNZv0DeVwLux0oUMWF7GX/HQmHyTdzCG3AI6lVV3O9csp8bspwL82QRwgtpZucnyi5co9c4bi6WYhUMUZWXvgMFKhMyvzHoC5ZitFKdDYY6vOx6QYFEZX5jVZRcCv6vmQYDqywoTlcamUQnQbwxfxCnr5Xjqg2HdBEJZ4BkshS0XXGvlW85EeNsnHCMge4wUa2wrtMkGvQi1Ag8aZp0IrQXjXufuvhlK7Ke03GDKlgdpMZ3FQGms/dwgOKzHRDRvChzEoppXewwY4FEzEXmbaS9a6CAr/uoHzSukHvAZvQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nQpX+DuzpSfi4I+sBP54De4KGfVRnwgg2fy0uBZd0GA=; b=MPiubj2Q9rpZi97tppD3o8Z46d+/DlJt4BxL8JyeNvIHjfXNSa9EhQKhBeU6d1ntmOMMJnE1WQd1T5LpedDZZMbPwBIImHembpCXoAr9wri4JqMULEl+L7qDmrNl2cpgeDDWex3CAh33dbDvlcCgCBUAK3+s7JVAajFAtP/V7z8SgoUqhRcb2F9X0OD55UwbO2Xej8ucYwIsHst9dwbhcVqRqMZpv0Q0R1myhF8sBMmmARz2tC947a0/s2NuJ4l9TLemB11F46hcSxKWrFsgkvbJqD+H4DRvHv8HkBBe8qX1t6onpVrty6+QGT/Nglt4gmKSvykGsMf6XpM0sSJc3Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nist.gov; dmarc=pass action=none header.from=nist.gov; dkim=pass header.d=nist.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nQpX+DuzpSfi4I+sBP54De4KGfVRnwgg2fy0uBZd0GA=; b=piKaXDIm5gzCiUcW4KDHoZzq6M+2bzfG6nIOsYTQf0BmaG7lvhKQz2M3042WyHEnKYhL0j26mKHIi0qMjcv+nxac+glSMpjHFF0wNaI4bCVBkSymBZu/YxpxECeSbT3V30VQVuxLeN9lKLUOvMyEOVeFz0hFOHmq5MdTKLH2l/k=
Received: from DM6PR09MB4789.namprd09.prod.outlook.com (2603:10b6:5:269::20) by DM6PR09MB4512.namprd09.prod.outlook.com (2603:10b6:5:1b6::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3174.21; Wed, 8 Jul 2020 13:56:11 +0000
Received: from DM6PR09MB4789.namprd09.prod.outlook.com ([fe80::dc73:5302:ca2d:93e2]) by DM6PR09MB4789.namprd09.prod.outlook.com ([fe80::dc73:5302:ca2d:93e2%7]) with mapi id 15.20.3174.022; Wed, 8 Jul 2020 13:56:11 +0000
From: "Rose, Scott W. (Fed)" <scott.rose@nist.gov>
To: "Yangjie (Jay, IP Standard)" <jay.yang@huawei.com>, "lear@cisco.com" <lear@cisco.com>, "mranga@gmail.com" <mranga@gmail.com>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: Re : [OPSAWG] Fwd: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt
Thread-Index: AdZQQl83sVliF6JPQeqVhjOiKm7Q/gEy6FEA
Date: Wed, 08 Jul 2020 13:56:11 +0000
Message-ID: <C80450E5-12B5-48CC-8DEC-FB04F0128742@nist.gov>
References: <78d6c4e0d35547829ab0b8dd32c2b0ff@huawei.com>
In-Reply-To: <78d6c4e0d35547829ab0b8dd32c2b0ff@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.38.20061401
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=nist.gov;
x-originating-ip: [2610:20:6005:21::53]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 286006da-3b32-4368-774b-08d82346ac5d
x-ms-traffictypediagnostic: DM6PR09MB4512:
x-microsoft-antispam-prvs: <DM6PR09MB451242DA3E58FA35252B22FDF0670@DM6PR09MB4512.namprd09.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: iV/WgVVtnAmA0FihbLTZiMDUOUotOL/aPOgkGXpMnukm3tQLeav2RdYEGSwIvfBXkUkSPIrc/yjQpUc1CJvlmjbCeJqIEgfV+zFPtfpMcEEx3o2rAOd1V9VT9oLRDMghTmNEFXtWUmDD2XOElov/KOUvbK6MTOdsVR8l3L4AD8ccbJbNpDH11a2pXwfFefpPtxX0/i0TCrhyBUz63PHGoEOHx0f4g3X1qhrVsnmyZN7F4SbjIPJcW1fOY3TDsafJ+oEJlKh6jO0auKzJF+YFht47QjNYaisbvWhW/MePESfGn+NRCw1GoeY38S+ZoFz0Y21XMy0r7WOc2ERwdIX15LZMfLDNoVojJbY/r/DMyz+85S0brmSCUyYucoui0quG2rS4Ub7qnHUxDVzQJ48vpw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR09MB4789.namprd09.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(366004)(39860400002)(396003)(136003)(376002)(346002)(66574015)(86362001)(71200400001)(83380400001)(53546011)(8676002)(110136005)(2906002)(8936002)(15650500001)(33656002)(316002)(66946007)(6506007)(5660300002)(91956017)(76116006)(4326008)(2616005)(478600001)(186003)(966005)(99936003)(66446008)(66576008)(66476007)(64756008)(166002)(66556008)(6486002)(6512007)(36756003)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/related; boundary="_006_C80450E512B548CC8DECFB04F0128742nistgov_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR09MB4789.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 286006da-3b32-4368-774b-08d82346ac5d
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jul 2020 13:56:11.8090 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: C5P5aIJCtR+ZrKChlkB6g2BNZG8VxxJHMfKB9i7C2GJZuCFEJNuE4vjIIhhAQXuD
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR09MB4512
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/Qs_xDSNFcUiF-eHrxhv8i5D_ajA>
Subject: Re: [OPSAWG] Fwd: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jul 2020 13:56:18 -0000

Jay,
I would like to think that manufacturers would quickly alert customers when they have a vulnerable device, but that is not always what happens.  Sometimes threat intelligence service providers, CERT services, etc. are quicker in disseminating alerts about new bugs or vulnerabilities.  Many enterprises want the know the components in the device in order to set security policies.

draft-moran-suit-mud-00 is similar to our work, but both may co-exist.  Our work is aimed to make as little modification to the MUD controller as necessary.  It does not need to parse a SUIT manifest, only perform an action if the SBOM extension is seen. However, both solutions co-exist on different platforms or classes of devices.

Scott
--
Scott Rose, NIST ITL
scott.rose@nist.gov<mailto:scott.rose@nist.gov>
ph: +1-301-975-8439
GVoice: +1-571-249-3671


From: "Yangjie (Jay, IP Standard)" <jay.yang@huawei.com>
Date: Thursday, July 2, 2020 at 3:30 AM
To: "Rose, Scott W. (Fed)" <scott.rose@nist.gov>, "lear@cisco.com" <lear@cisco.com>, Michael Richardson <mcr+ietf@sandelman.ca>, "mranga@gmail.com" <mranga@gmail.com>, "Brendan.Moran@arm.com" <Brendan.Moran@arm.com>, "hannes.tschofenig@arm.com" <hannes.tschofenig@arm.com>
Cc: "opsawg@ietf.org" <opsawg@ietf.org>
Subject: Re: Re : [OPSAWG] Fwd: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt


Hi, All,

About extending security enhancement based-on MUD architecture, I’m looking forward to design with you.
Thanks.



And Scott,

I think, If MUD file only extend SBOM information without the manufacture’s policy recommendations, maybe this extension will be redundant.

When new vulnerabilities are disclosed, the manufacture should be update its devices’ SBOM, and push some alarm to his customer with proposing to patch these as soon as possible, this maybe the current common practice.
To the manufacture, if only give the SBOM information in MUD file, but didn’t give the corresponding vulnerabilities repair-suggestion, for most network administrator, they don’t know how to do next,  most likely they will ignore these. So one optional solution is collaborate SUIT(or other updating technology) with MUD, like the draft: “draft-moran-suit-mud-00” give the scenario.

For one organization, if they wish to have access policy based-on some SBOM on a device, I think this is service layer policy from its user. If network give some special policy which are not known by the user. I think it’s difficult to be standard, unless these policy are common, and it’s better to be given in MUD file, like the draft:”draft-yang-opsawg-iot-devices-active-scanning-00”.

And, for the manufacture, what’s the purpose to provide SBOM information in MUD file? They can’t get any benefits at all, even this will less their devices’ features. Security is for better availability, it the vulnerabilities are disclosed, the manufacture have the responsibilities to patch them. So I haven’t understood…  (1. If SBOM vulnerabilities have disclosed, the manufacture should patch them quickly. In this case, one optional solution for automation is given a quarantine way for patching with MUD extension, like the draft: “draft-richardson-shg-mud-quarantined-access-01”…)


About extending security enhancement based-on MUD architecture, I’m looking forward to design with you.
Thanks.



Best Regards,
Jay
from Huawei Technologies Co.,Ltd..


发件人: Rose, Scott W. (Fed) [mailto:scott.rose@nist.gov]
发送时间: 2020年7月1日 22:51
收件人: Yangjie (Jay, IP Standard) <jay.yang@huawei.com>; lear@cisco.com
抄送: opsawg@ietf.org
主题: Re: Re : [OPSAWG] Fwd: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt

Jay,
Yes, that is one possible use of a SBOM for IoT devices.  An organization may wish to have access policies based on what OS, firmware or component version is in use on a device.  Another scenario is when new vulnerabilities are disclosed, SBOMs may help an organization identify at-risk devices.  For example, a new vulnerability is discovered in a common SSH client.  An organization can generate a list of devices on their network that has that client version installed and can then perform whatever action they think is necessary (frequent scanning, quarantine until patched, etc.).

This draft does not attempt to give instruction on to what organizations should do with the information, just specify a way to discover the SBOM for a given IoT device.

Thanks,
Scott


Scott Rose, NIST ITL
scott.rose@nist.gov<mailto:scott.rose@nist.gov>
ph: +1-301-975-8439
GVoice: +1-571-249-3671


From: "Yangjie (Jay, IP Standard)" <jay.yang@huawei.com<mailto:jay.yang@huawei.com>>
Date: Wednesday, July 1, 2020 at 12:00 AM
To: "lear@cisco.com<mailto:lear@cisco.com>" <lear@cisco.com<mailto:lear@cisco.com>>, "Rose, Scott W. (Fed)" <scott.rose@nist.gov<mailto:scott.rose@nist.gov>>
Cc: "opsawg@ietf.org<mailto:opsawg@ietf.org>" <opsawg@ietf.org<mailto:opsawg@ietf.org>>
Subject: Re : [OPSAWG] Fwd: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt



Hi, Eliot and Scott,

Base-on MUD extension with SBOM information, network administrator can evaluate the access risks of IoT devices actively, and adopt some measures for secure access. This is helpful for network administrator.

Like “draft-yang-opsawg-iot-devices-active-scanning” described, by active scanning weak password, mandatory and hazardous services, etc, the network administrator can discover security vulnerabilities in advance.
Surely, in mud file, these security risk-characters and proposed-policy are listed, which are commonly with default and come to an agreement by iot owner and network administrator.


Here, about SBOM risks, I am confused on how to achieve E2E automation integrated with IoT Platform?  Like the case for example:
A customer bought some iot devices, sometimes he don’t know whether its OS-version is lower or not, (one way is to get from its handbook, but maybe this is also older version), in fact he needn’t care it at all.
His aim is to let this devices on-boarding and can be working normally. If its OS-version is lower, the device should access the network securely and finish updating its OS-version rightly, this will be the optimal solution. Especially without his perception…
If the network administrator set deny policy firstly based-on MUD information actively, and then wait some time to do the next confirmation, which may make iot user unhappy, especially he didn’t know the reason, …

“draft-richardson-shg-mud-quarantined-access-01” give a “quaranteed-device-policy” for devices’  secure updating.
I think, if apply this way into the above case, list or pinpoint the fundamental policy in MUD file, may be solve SBOM vulnerabilities during on-boarding, and achieve E2E automation.

Is that so, and is my understanding right?
Hope to receive your suggestion,  Thanks,

Best Regards,
Jay.



[OPSAWG] Fwd: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt

Eliot Lear <lear@cisco.com<mailto:lear@cisco.com>> Mon, 18 May 2020 10:12 UTCShow header<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fopsawg%2FSR7dHKdL_FMgakJG4Y-71HlUzko%2F&data=02%7C01%7Cscott.rose%40nist.gov%7Ce0b6a55966834e5af8cb08d81e59cb44%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C637292718321549766&sdata=OUZIvEE2xWVu2O25SttkdYDbxLqcI22Nu9PsgWv7KFY%3D&reserved=0>

Hi everyone,



Below is a draft that Scott Rose and I have co-authored.  Its purpose is to help deployments identify software bills of materials (SBOMs) when they are available.  An SBOM is a software inventory that includes some additional meta-information, such as what dependencies a component may have.  The idea behind SBOMs is that they can provide licensing status to developers, and some notion of vulnerability status to everyone (and I mean everyone).



MUD is ideal as a discovery mechanism.  The goal is not to create new ways to retrieve the information, but simply to advertise what ways are available for a given device.



Eliot



> Begin forwarded message:

>

> From: <internet-drafts@ietf.org><mailto:&lt;internet-drafts@ietf.org&gt;>

> Subject: New Version Notification for draft-lear-opsawg-mud-sbom-00.txt

> Date: 18 May 2020 at 12:05:29 CEST

> To: Scott Rose <scott.rose@nist.gov><mailto:&lt;scott.rose@nist.gov&gt;>ov>, Eliot Lear <lear@cisco.com><mailto:&lt;lear@cisco.com&gt;>

>

>

> A new version of I-D, draft-lear-opsawg-mud-sbom-00.txt

> has been successfully submitted by Eliot Lear and posted to the

> IETF repository.

>

> Name:                           draft-lear-opsawg-mud-sbom

> Revision:  00

> Title:                             SBOM Extension for MUD

> Document date:             2020-05-18

> Group:                          Individual Submission

> Pages:                           14

> URL:            https://www.ietf.org/internet-drafts/draft-lear-opsawg-mud-sbom-00.txt<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Finternet-drafts%2Fdraft-lear-opsawg-mud-sbom-00.txt&data=02%7C01%7Cscott.rose%40nist.gov%7Ce0b6a55966834e5af8cb08d81e59cb44%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C637292718321549766&sdata=poECJf9KadZ54oWW7Mx%2BM79ZOJrnYKemTTmOCkbSIPM%3D&reserved=0>

> Status:         https://datatracker.ietf.org/doc/draft-lear-opsawg-mud-sbom/<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-lear-opsawg-mud-sbom%2F&data=02%7C01%7Cscott.rose%40nist.gov%7Ce0b6a55966834e5af8cb08d81e59cb44%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C637292718321559723&sdata=kLnJAflZ5D%2BU%2Bp%2BQnix18iMUnupEVsFs6wi6YUQdKwU%3D&reserved=0>

> Htmlized:       https://tools.ietf.org/html/draft-lear-opsawg-mud-sbom-00<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-lear-opsawg-mud-sbom-00&data=02%7C01%7Cscott.rose%40nist.gov%7Ce0b6a55966834e5af8cb08d81e59cb44%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C637292718321559723&sdata=AsARr%2BoONQH2aAPUz5ubjht1hYPlEsPnbHwoOj4EK0w%3D&reserved=0>

> Htmlized:       https://datatracker.ietf.org/doc/html/draft-lear-opsawg-mud-sbom<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-lear-opsawg-mud-sbom&data=02%7C01%7Cscott.rose%40nist.gov%7Ce0b6a55966834e5af8cb08d81e59cb44%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C637292718321559723&sdata=WLZF70S1NGCN%2BqBaLW1Hifi6uY6xGNWC3pZxSunKTLs%3D&reserved=0>

>

>

> Abstract:

>   Software bills of materials (SBOMs) are formal descriptions of what

>   pieces of software are included in a product.  This memo specifies a

>   means for manufacturers to state how SBOMs may be retrieved through

>   an extension to manufacturer usage descriptions (MUD).

>

>

>

>

> Please note that it may take a couple of minutes from the time of submission

> until the htmlized version and diff are available at tools.ietf.org<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2F&data=02%7C01%7Cscott.rose%40nist.gov%7Ce0b6a55966834e5af8cb08d81e59cb44%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C637292718321569674&sdata=rn%2F5S1woz3ggmkNtsPMPm4krWxP2fSyiBilDJGGYRsc%3D&reserved=0>.

>

> The IETF Secretariat

>

>




Note that SBOMs may change more frequently than access control
requirements. A change to software does not necessarily mean a
change to control channels that are used. Therefore, it is important
to retrieve the MUD file as suggested by the manufacturer in the
cache-validity period. In many cases, only the SBOM list will have
been updated.




Best Regards,


[cid:image002.png@01D6550E.00FF6910]
杨杰 (Jay Yang)
数据通信标准专利部
Mobile: 13852295541
E-mail:jay.yang@huawei.com<mailto:123456@huawei.com>
中国(China)-南京(Nanjing)-雨花台区软件大道101号华为南京基地N3-1F