Re: [OPSAWG] AD review of draft-ietf-opsawg-l2nm-12

mohamed.boucadair@orange.com Tue, 05 April 2022 10:50 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ACEA3A2040; Tue, 5 Apr 2022 03:50:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SGjwuJ0C-VTH; Tue, 5 Apr 2022 03:49:59 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 955A43A1FFB; Tue, 5 Apr 2022 03:49:59 -0700 (PDT)
Received: from opfednr03.francetelecom.fr (unknown [xx.xx.xx.67]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr25.francetelecom.fr (ESMTP service) with ESMTPS id 4KXktY4l50zCs0P; Tue, 5 Apr 2022 12:49:57 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1649155797; bh=kYPmela7htMkqi6nYpqG7LsedrS/0HYx5wg113ErV60=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=GfU+oleTN0qD514nYztGSm9FkDZxGQl3QyU9Y3ZnCY7q4BcxDML7GVh040w7IKh9Z XsWlrlCWbE9adVEUvq/B3dU1SV5NKi4gjhDkl66r/Fyf35OKpqGYGqNBh2YY2lgrCr bT7jQsAZMka3/A27J/94DRJ+KCjfLaQo1w2lM5cwGOultVvlVvfP4bilX2O36K6zUc wni9hTamFsMUzu1ZN3JP/EZJUPToleEAwfCrY6Je00wUEV0iG0YZQw5EsYJPT4UOHn hkukWkpuAFe1nv+9YWCIlkto0Q7WK51mLVlqrjYYoSdD2fUYbWhRzhoeY/rNgPsg4A 7ZcNmht1OYwiw==
From: mohamed.boucadair@orange.com
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "draft-ietf-opsawg-l2nm.all@ietf.org" <draft-ietf-opsawg-l2nm.all@ietf.org>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: AD review of draft-ietf-opsawg-l2nm-12
Thread-Index: Adg6JPtifhjp1EZvStSuOAsRzkyF8gOh3FzgAAdhcyAABCrN4A==
Content-Class:
Date: Tue, 05 Apr 2022 10:49:57 +0000
Message-ID: <23916_1649155797_624C1ED5_23916_19_1_405ae951d6304c5eb2a06cb8d171fea6@orange.com>
References: <BY5PR11MB419654000FDB77787A24072CB5129@BY5PR11MB4196.namprd11.prod.outlook.com> <12878_1649142331_624BEA3B_12878_408_1_1dcfe77fa32941b2b1f08319d98e1231@orange.com> <BY5PR11MB4196D5B8871F4C5A469FD2C1B5E49@BY5PR11MB4196.namprd11.prod.outlook.com>
In-Reply-To: <BY5PR11MB4196D5B8871F4C5A469FD2C1B5E49@BY5PR11MB4196.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2022-04-05T10:49:52Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=6b047022-8dff-47f5-892d-10d452bab65c; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.115.27.51]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/jp4QrjkikgSTycykwsl4ZeOJxEw>
Subject: Re: [OPSAWG] AD review of draft-ietf-opsawg-l2nm-12
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2022 10:50:05 -0000

Re-,

The clarification looks good to me. fixed. 

I prefer to not add a dependency to rfc6991-bis now. Thanks. 

Cheers,
Med

> -----Message d'origine-----
> De : Rob Wilton (rwilton) <rwilton@cisco.com>
> Envoyé : mardi 5 avril 2022 11:04
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; draft-
> ietf-opsawg-l2nm.all@ietf.org
> Cc : opsawg@ietf.org
> Objet : RE: AD review of draft-ietf-opsawg-l2nm-12
> 
> Hi Med,
> 
> Thanks, your changes all look good, but I have a bit more comment on one
> specific point:
> 
> > > (3)
> > >       'mac-loop-prevention':  Container for MAC loop prevention.
> > >
> > >          'window':  The timer when a MAC mobility event is detected.
> > >
> > >          'frequency':  The number of times to detect MAC
> duplication,
> > >             where a 'duplicate MAC address' situation has occurred
> and
> > >             the duplicate MAC address has been added to a list of
> > >             duplicate MAC addresses.
> > >
> > > The description of frequency wasn't really clear to me, perhaps this
> > > could be made clearer, or perhaps I just need educating!
> >
> > [Med] Please check https://github.com/IETF-OPSAWG-WG/lxnm/issues/241
> > (especially the response from Raul when I asked the same question
> > about frequency vs window).
> 
> Perhaps it would help if these descriptions were tweaked slightly? E.g.,
> something like:
> 
>    'window':  The time interval over which a MAC mobility event is
> detected and checked.
> 
>    'frequency':  The number of times to detect MAC duplication,
>    where a 'duplicate MAC address' situation has occurred within
>    the 'window' time interval and the duplicate MAC address has
>    been added to a list of duplicate MAC addresses.
> 
> If you do decide to update the descriptions here, you might also want to
> check the YANG descriptions as well.  And, in case it is of interest
> rfc6991-bis adds a type for a time interval in seconds (and it may have
> other useful types as well).  This has gone through WG LC, so I would
> expect it to be sent to the IESG relatively soon, but equally I
> understand if you don't want to create the dependency.
> 
> Thanks,
> Rob
> 
> 
> > -----Original Message-----
> > From: mohamed.boucadair@orange.com
> > <mohamed.boucadair@orange.com>
> > Sent: 05 April 2022 08:06
> > To: Rob Wilton (rwilton) <rwilton@cisco.com>; draft-ietf-opsawg-
> > l2nm.all@ietf.org
> > Cc: opsawg@ietf.org
> > Subject: RE: AD review of draft-ietf-opsawg-l2nm-12
> >
> > Hi Rob,
> >
> > Many thanks for the careful AD review.
> >
> > Staring with the last part. You can track the changes at:
> > https://tinyurl.com/l2nm-latest. Please see inline for more context.
> >
> > There are also other edits that I made to fix nits, update references,
> etc.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De : Rob Wilton (rwilton) <rwilton@cisco.com> Envoyé : jeudi 17 mars
> > > 2022 21:53 À : draft-ietf-opsawg-l2nm.all@ietf.org
> > > Cc : opsawg@ietf.org
> > > Objet : AD review of draft-ietf-opsawg-l2nm-12
> > >
> > > Hi,
> > >
> > > Apologies for the delay, but I have now managed my AD review of
> > > draft- ietf-opsawg-l2nm-12.  (Also attached in case my email is
> > > truncated ...)
> > >
> > > I would like to thank the authors, WG for their work on this
> > > document, and the shepherd for his review.  I found the document to
> > > be well written and pretty straightforward to follow and understand.
> > > I also believe that this document is a useful addition to the YANG
> > > and Network Management Ecosystem, to thank you for that.
> > >
> > > Anyway, here my comments.  I think that they mostly pretty minor,
> > > but perhaps a few that my need a bit more thought.  Hopefully they
> > > will help improve the doc.
> > >
> > > ---
> > ...
> > >
> > >
> > > Minor comments/nits:
> > >
> > > (1)
> > >    In particular, the model can be used in the communication
> > >    interface between the entity that interacts directly with the
> > >    customer, the service orchestrator (either fully automated or a
> human
> > >    operator), and the entity in charge of network orchestration and
> > >    control (a.k.a., network controller/orchestrator) by allowing for
> > >    more network-centric information to be included.
> > >
> > > Nit (since this is explained more clearly later in the document): It
> > > was unclear to me whether this this sentence is about 3 entities or
> 2.
> > > I.e., specifically, whether the "entity that interacts directly with
> > > the customer" is the service orchestrator.  For clarity, would it be
> > > clearer
> > > as: ",i.e., the service orchestrator,".
> > >
> >
> > [Med] I adjusted the sentence for better clarity.
> >
> > > (2)    'signaling-type':  Indicates the signaling that is used for
> > > setting
> > >       pseudowires.
> > >
> > > Nit: setting pseudowires => setting up pseudowires?
> >
> > [Med] Fixed.
> >
> > >
> > > (3)
> > >       'mac-loop-prevention':  Container for MAC loop prevention.
> > >
> > >          'window':  The timer when a MAC mobility event is detected.
> > >
> > >          'frequency':  The number of times to detect MAC
> duplication,
> > >             where a 'duplicate MAC address' situation has occurred
> and
> > >             the duplicate MAC address has been added to a list of
> > >             duplicate MAC addresses.
> > >
> > > The description of frequency wasn't really clear to me, perhaps this
> > > could be made clearer, or perhaps I just need educating!
> >
> > [Med] Please check https://github.com/IETF-OPSAWG-WG/lxnm/issues/241
> > (especially the response from Raul when I asked the same question
> > about frequency vs window).
> >
> > >
> > > (4)    'multicast-like':  Controls whether multicast is allowed in
> the
> > >       service.
> > >
> > > 'multicast-like' seems like a strange name. Wouldn't the service
> > > either support/emulate multicast or not?
> >
> > [Med] Indeed. removed "-like". I lost the context why this name ended
> > in the draft.
> >
> > >
> > > (5) 	7.5.  VPN Nodes
> > >
> > >                +--rw vpn-nodes
> > >                   +--rw vpn-node* [vpn-node-id]
> > >                      +--rw vpn-node-id            vpn-common:vpn-id
> > >                      +--rw description?           string
> > >                      +--rw ne-id?                 string
> > >                      +--rw role?                  identityref
> > >
> > > 'role' doesn't seem to be described in the description that follows,
> > > or specifically, it is not in the description where I expected it to
> be.
> >
> > [Med] Good catch. Fixed. Thanks.
> >
> > >
> > > (6)
> > >              |  +--rw (signaling-option)?
> > >              |     ...
> > >              |     +--:(bgp)
> > >              |     |  ...
> > >              |     +--:(ldp-or-l2tp)
> > >
> > > It's not obvious to me why LDP and L2TP are bundled together in the
> > > same signaling option.
> >
> > [Med] Because they share a set of common attributes.
> >
> > >
> > > More generally, I was surprised that you don't have containers at
> > > the top-level of the signaling-options, e.g, to be explicit about
> > > what signaling option is being used (i.e., what branch of the choice
> > > is being selected).  Is the thinking that you already have
> "signaling-type"
> > > earlier in the definition.  Personally, I think that having
> > > containers here would probably be clearer, but I'm happy to leave it
> > > to the authors discretion.
> > >
> >
> > [Med] The signaling type is set at the service level (signaling-type).
> > Among the values that can be used for that attribute, we do have
> > l2tp-signaling or ldp- signaling.
> >
> > > (7) Section 8.1/8.2
> > >
> > > Quite a lot of these types look like they are probably dead or not
> > > useful.  I guess that publishing them all to keep them directly in
> > > sync with the associated IANA registries makes sense, but I wonder
> > > if it would be helpful to have any text indicating that only some of
> > > these types are likely to be useful, or perhaps highlight the ones
> > > that are more likely to be used?
> >
> > [Med] I agree that only a subset of these values are useful, but we
> > need to avoid that this document conflicts with the authoritative
> > RFCs. For example,
> > rfc4667#section-4.2 says the following:
> >
> >    Before establishing the intended pseudowire, each pair of peering
> PEs
> >    exchanges control connection messages to establish a control
> >    connection.  Each advertises its supported pseudowire types, as
> >    defined in [PWE3IANA], in the Pseudowire Capabilities List AVP.
> >
> > FWIW, Adrian get in touch with PALS WG chairs about some entries for
> > this registry. A stale reference was found and the PALS WG chairs
> > contacted IANA to fix that.
> >
> > >
> > > (8)
> > >            leaf mac-num-limit {
> > >              type uint16;
> > >              default "2";
> > >              description
> > >                "Maximum number of MAC addresses learned from
> > >                 the customer for a single service instance.";
> > >            }
> > >
> > > "2" feels like a slightly strange default here, rather than say "1"
> > > or having no default.  What is the basis of this value.
> >
> > [Med] This is inherited from what is the service model (L2SM,
> RFC8466):
> >
> >                 default "2";
> >                 description
> >                   "Maximum number of MAC addresses learned from
> >                    the subscriber for a single service instance.
> >                    The default allowed maximum number of MAC
> >                    addresses is 2.";
> >
> > >
> > > (9)
> > >                           leaf action {
> > >                            type identityref {
> > >                              base mac-action;
> > >                            }
> > >                            default "warning";
> > >                            description
> > >                              "specify the action when the upper
> limit is
> > >                               exceeded: drop the packet, flood the
> > >                               packet, or simply send a warning log
> > >                               message.";
> > >                          }
> > >
> > > In the case of sending a warning log message, does this mean that
> > > the packet is still forwarded normally?
> >
> > [Med] Updated the text to make the intent explicit: "or simply send a
> > warning log message (without dropping the packet)"
> >
> >   In the case of flood, does that
> > > mean that the MAC address is not learned?
> >
> > [Med] It is.
> >
> > >
> > > (10)
> > >                leaf router-id {
> > >                  type rt-types:router-id;
> > >                  description
> > >                    "A 32-bit number in the dotted-quad format that
> is
> > >                     used to uniquely identify a node within an
> > >                     autonomous system (AS). ";
> > >                }
> > >
> > > Nit: Trailing space in the description.
> >
> > [Med] Fixed.
> >
> > >
> > > (11)                            container bum-management {
> > >                              description
> > >                                "Broadcast-unknown-unicast-multicast
> > >                                 management.";
> > >                              leaf discard-broadcast {
> > >                                type boolean;
> > >                                description
> > >                                  "Discards broadcast, when
> enabled.";
> > >                              }
> > >                              leaf discard-unknown-multicast {
> > >                                type boolean;
> > >                                description
> > >                                  "Discards unknown multicast, when
> > >                                   enabled.";
> > >                              }
> > >                              leaf discard-unknown-unicast {
> > >                                type boolean;
> > >                                description
> > >                                  "Discards unknown unicast, when
> > >                                   enabled.";
> > >                              }
> > >                            }
> > >
> > > >From the descriptions, it looks like these could be default "false"
> > > (subject to the comment about hierarchical configuration)?
> > >
> >
> > [Med]
> >
> > > (12)
> > > 9.  Security Considerations
> > >
> > >    *  'ethernet-segments' and 'vpn-services': An attacker who is
> able to
> > >       access network nodes can undertake various attacks, such as
> > >       deleting a running L2VPN service, interrupting all the traffic
> of
> > >       a client.
> > >
> > > Is there a risk that an attacker could add a VPN endpoint that they
> > > control, and hence either inject or snoop traffic in the L2VPN
> > > service (which is arguably worse than either interrupting or
> > > deleting the L2VPN service)?
> > >
> >
> > [Med] An attacker that accesses a node can a lot of harm. This
> > includes of course intercept, read, or redirect to traffic. However,
> > in addition to access control, "such activity can be detected by
> > adequately monitoring and tracking network configuration changes" as
> noted at the end of the bullet you quoted.
> >
> > Added "or intercept/redirect the traffic to a non-authorized node" to
> > highlight the risk.
> >
> > > (13)
> > > 	10.2.  BGP Layer 2 Encapsulation Types
> > >
> > >     This document defines the initial version of the IANA-maintained
> > > 	"iana-bgp-l2-encaps" YANG module.
> > >
> > > Perhaps include the reference back to the section where the YANG
> > > module is defined?  And similarly for the PW types YANG module.
> > >
> >
> > [Med] Done.
> >
> > > (14)
> > >    When a Layer 2 encapsulation type is added to the "BGP Layer 2
> > >    Encapsulation Types" registry, a new "identity" statement must be
> > >    added to the "iana-bgp-l2-encaps" YANG module.  The name of the
> > >    "identity" is the lower-case of encapsulation name provided in
> the
> > >    description.  The "identity" statement should have the following
> sub-
> > >    statements defined:
> > >
> > > Nit:  of encapsulation name => of the encapsultion name
> > >
> >
> > [Med] Fixed. Thanks.
> >
> > > (15)
> > >    When the "iana-bgp-l2-encaps" YANG module is updated, a new
> > >    "revision" statement must be added in front of the existing
> revision
> > >    statements.
> > >
> > > Possibly refine this to (for both modules) - there was a case where
> > > IANA accidentally created two entries with the same revision date
> > > when adding
> > > 2 types:
> > >
> > >    When the "iana-bgp-l2-encaps" YANG module is updated, a new
> > >    "revision" statement with a unique revision date must be added in
> > > front
> > >    of the existing revision statements.
> > >
> >
> > [Med] OK. Made the change for both modules.
> >
> > > (16)
> > > 	A.5
> > >
> > >              "auto-ethernet-segment-identifier":
> "01:11:00:11:00:11:\
> > >    11:9A:00:00"
> > >
> > > lowercase A would be canonical in the hex string.
> > >
> > >
> >
> > [Med] Fixed.
> >
> > > --------
> > >
> > > Grammar nits from an automated tool.
> >
> > [Med] Fixed those that I think are appropriate.
> >
> > >
> > > Grammar Warnings:
> > > Section: 2, draft text:
> > > The VPN node will identify the service providers node on which the
> > > VPN is deployed.
> > > Warning:  Apostrophe might be missing.
> > > Suggested change:  "providers'"
> > >
> > > Section: 7.2, draft text:
> > > An external connectivity may be an access to the Internet or a
> > > restricted connectivity such as access to a public/private cloud.
> > > Warning:  Uncountable nouns are usually not used with an indefinite
> > > article. Use simply access.
> > > Suggested change:  "access"
> > >
> > > Section: 7.4, draft text:
> > > Some of the data nodes can be adjusted at the VPN node or VPN
> > > network access levels.
> > > Warning:  If the text is a generality, 'of the' is not necessary.
> > > Suggested change:  "Some"
> > >
> > > Section: 7.6, draft text:
> > > A 'vpn-network-access' ([vpn_network_access_tree]) represents an
> > > entry point to a VPN service .
> > > Warning:  Don't put a space before the full stop.
> > > Suggested change:  "."
> > >
> > > Section: 7.6, draft text:
> > > A 'vpn-network-access' includes information such as the connection
> > > on which the access is defined , the specific Layer 2 service
> > > requirements, etc.
> > > Warning:  Put a space after the comma, but not before the comma.
> > > Suggested change:  ","
> > >
> > > Section: 7.6, draft text:
> > > The VPN network access is comprised of:
> > > Warning:  Did you mean comprises or consists of or is composed of?
> > > Suggested change:  "comprises"
> > >
> > > Section: 7.6, draft text:
> > > However, some of the inherited data nodes (e.g., ACL policies) can
> > > be overridden at the VPN network access level.
> > > Warning:  If the text is a generality, 'of the' is not necessary.
> > > Suggested change:  "some"
> > >
> > > Section: 7.6.1, draft text:
> > > The L2NM inherits the 'member-link-list' structure from the L2SM
> > > (including indication of OAM 802.3ah support [IEEE-802-3ah].
> > > Warning:  Unpaired symbol: ')' seems to be missing
> > >
> > > Section: 7.6.4, draft text:
> > > An ACL can be based on source MAC address, source MAC address mask,
> > > destination MAC address , and destination MAC address mask.
> > > Warning:  Put a space after the comma, but not before the comma.
> > > Suggested change:  ","
> > >
> > > Section: 9, draft text:
> > > Some of the readable data nodes in the "ietf-l2vpn-ntw" YANG module
> > > may be considered sensitive or vulnerable in some network
> environments.
> > > Warning:  If the text is a generality, 'of the' is not necessary.
> > > Suggested change:  "Some"
> > >
> > > Section: A.1, draft text:
> > > This section provides an example to illustrate how the L2NM can be
> > > used to mange BGP-based VPLS.
> > > Warning:  Did you mean manage?
> > > Suggested change:  "manage"
> > >
> > > Regards,
> > > Rob
> >
> >
> > ________________________________________________________________
> > _________________________________________________________
> >
> > Ce message et ses pieces jointes peuvent contenir des informations
> > confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
> > exploites ou copies sans autorisation. Si vous avez recu ce message
> > par erreur, veuillez le signaler a l'expediteur et le detruire ainsi
> > que les pieces jointes. Les messages electroniques etant susceptibles
> > d'alteration, Orange decline toute responsabilite si ce message a ete
> > altere, deforme ou falsifie. Merci.
> >
> > This message and its attachments may contain confidential or
> > privileged information that may be protected by law; they should not
> > be distributed, used or copied without authorisation.
> > If you have received this email in error, please notify the sender and
> > delete this message and its attachments.
> > As emails may be altered, Orange is not liable for messages that have
> > been modified, changed or falsified.
> > Thank you.


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.