Re: [Pearg] More comments on draft-irtf-pearg-safe-internet-measurement-08

Mallory Knodel <mknodel@cdt.org> Tue, 07 November 2023 13:56 UTC

Return-Path: <mknodel@cdt.org>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C408C1519B2 for <pearg@ietfa.amsl.com>; Tue, 7 Nov 2023 05:56:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cdt.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A-wK0-meK9JZ for <pearg@ietfa.amsl.com>; Tue, 7 Nov 2023 05:56:49 -0800 (PST)
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com [IPv6:2607:f8b0:4864:20::52e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3AAFC17DBF1 for <pearg@irtf.org>; Tue, 7 Nov 2023 05:56:49 -0800 (PST)
Received: by mail-pg1-x52e.google.com with SMTP id 41be03b00d2f7-5bcfc508d14so4378183a12.3 for <pearg@irtf.org>; Tue, 07 Nov 2023 05:56:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cdt.org; s=google; t=1699365409; x=1699970209; darn=irtf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=shTCMQ6FN2HUFeCzYnUkk0haU6QGBHUfU4IDZ0jx6JM=; b=CY4ev3CGJhzVYqbagNjk+3IwSEb4v/G4WDaIyPbTf8NSvX5sTzysvLgl+Pyerlzr5O IMa/yRQWnhiOoA8AF+JUfFJN7vMdr3Co0jQ2lh+9MiHN7vc3Vtvp9tjqzryCHRTTlig4 TL69oIKpBA03H757FbVDwagva/4L5QQybEdhQ=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699365409; x=1699970209; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=shTCMQ6FN2HUFeCzYnUkk0haU6QGBHUfU4IDZ0jx6JM=; b=dfjaRauNQDYnzdCvBu//ng4DF0Ho+158AtYARTDUQjFk4GgukiU9XfiBsDwicFVOat +ssbV49+KneP+9eRe4UsmSoCV/hr48SJhv8BSoeyHRuya35V4mtB2OUW3eRoLuDJz3tx YCuPK3equGgwB/+DMOU7Uy1L9MHEqUnepseaSWjPtCcS5+T4V42shMDVNXw9r0ReCb5T yRCj+MrD2wl837pgJ3HOBijvVw6RAbukGV1JWhlexOhqbafPO0YxilAbfPSaVt2mI4Fo QhKOzTMoRr1+ZVtyRZU5Z+OSQIgW/DkroSKDekwHkt29qf+gi3BLopQqPX20W90yxEoi b6sA==
X-Gm-Message-State: AOJu0YxrW7EX0xn6zR/S0HeOSmEKF/1lESDkoslvbIz4aLnIsIfIj3Xe EJOt/03BX0OIoj9eZ8ysJl7t2Qq/ewBGBeOSIb6dn3PvYNk2lhv+vlc=
X-Google-Smtp-Source: AGHT+IH2yk1iHR0NVcADLgy3WhonEMkoT2GTUf5uD93Q8qrgrE5eYbQTUnQAgcBqVezF7AkdiRa7BZ9Miom3XylTZRw=
X-Received: by 2002:a17:90a:7e88:b0:280:c97:5968 with SMTP id j8-20020a17090a7e8800b002800c975968mr30541907pjl.5.1699365409185; Tue, 07 Nov 2023 05:56:49 -0800 (PST)
MIME-Version: 1.0
References: <CAMgphBD43bkD8+3y8McV6m0OvmgjSU7J5mrVGvSp1=_OcTx-Bw@mail.gmail.com> <CAL-akOsx09VviAohCUB_qP8j+6U+fnx72cpTR2NBL4AByLOrHQ@mail.gmail.com> <CAMgphBDgOmGu4axbRNq4LXdQ4gSdCh+G-qZHq_HNdOV-DOZhOQ@mail.gmail.com> <CAGVFjMJT+bN32oQOOtEY7h2-wdSVBF-UC=Rc1+p7yc0RX6BVEw@mail.gmail.com> <CABcZeBNAYoOnz0TazqOPCGF8e7DVLrqLcrZ9-CYaPwsGtgaB0A@mail.gmail.com> <CAGVFjML1yN_O2JTsUDXuSGYxzyF9rp3t42qwGjWd1uiDnTKoFg@mail.gmail.com> <cc08ea6e806e0966a5b48f11d7a2f370e555df7a.camel@fiebig.nl>
In-Reply-To: <cc08ea6e806e0966a5b48f11d7a2f370e555df7a.camel@fiebig.nl>
From: Mallory Knodel <mknodel@cdt.org>
Date: Tue, 07 Nov 2023 14:56:37 +0100
Message-ID: <CAGVFjMLG2TrgYA+wvjqQBkbTEYPOGz47FxcX5CmivS4_Mem3Fg@mail.gmail.com>
To: tobias@fiebig.nl
Cc: pearg@irtf.org
Content-Type: multipart/alternative; boundary="0000000000008eefb106099057d4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/ZQSdwYMRr43Zl0mlgdefftTPtMs>
Subject: Re: [Pearg] More comments on draft-irtf-pearg-safe-internet-measurement-08
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Nov 2023 13:56:54 -0000

Hi Tobias,

Thanks for your comments. This is a research group document and so any
suggestions for concrete text will help this direly needed text evolve into
something useful and not harmful.

I’ll capture your comments in an issue and with another version try to
address them. A PR or draft text to the list will expedite closing this
issue.

Thanks!
-Mallory

On Tue, 7 Nov 2023 at 14:43, Tobias Fiebig <tobias=
40fiebig.nl@dmarc.ietf.org> wrote:

> Moin,
> I just was stumbled over this draft and just gave it a read. At the
> moment, i think that the draft has crucial limitations that may cause
> significant harm. In general, my core comments are relatively aligned
> with Marwan's (very spot-on comments). However, I also believe that
> there are some more fundamental issues that must be resolved.
>
> # Authoritativeness of documents
> Marwan noted that the document in its current form may cause harm if it
> is read by a non-domain expert (say: Medicine Professor) when
> evaluating a request for ethical clearance of a network measurement
> study. And yes, this _does_ happen.
>
> Reading the reply by Mallory creates the impression in me that there is
> some form of assumption that what is written in a document will not be
> read as authoritative if the authors only (outside the document or
> somewhere in another part of the document the concerned medicine prof
> just didn't scroll over) phrase things more in terms of their
> intentions.
>
> This is not really the case; For the domain where the document will be
> relevant and useful, those nuances will be lost. It is already hard to
> have security researchers understand the difference between a draft and
> and RFC, let alone all the other nuances there after. I would hence
> caution significant care with how the document can be perceived,
> especially in context for the point below.
>
> # Positionality / Perspective
>
> The draft has a strong perspective from the privacy measurement angle,
> also highlighted by the statement that some points "[are] based on the
> Tor network safe measurement guidelines— so, from the community of
> measurement and internet research."; The Tor community is a very
> specific (and small) subset of network measurement work, and I would
> argue that they are more rooted in the PETS community (also looking at
> the members of the board).
>
> This community, in terms of type of measurements and also in terms of
> volume, is very different from the network measurement community (ACM
> SIGCOMM-Bobble), which _again_ is different from the Network Security
> bobble (IEEE S&P/NDSS/USENIX SEC/ACM CCS).
>
> These communities have very different requirements and perspectives on
> network measurements (and potential harm they may cause).
>
> Hence, i'd argue that the draft needs a lot more engagement with these
> different communities, and should include the experiences of
> researchers doing that kind of work as well.
>
> # Superficial Nature of Sections 2.4ff
> >From Section 2.4 the draft gets extremely thin and ignores practical
> requirements of network measurements by taking a strong data
> minimization perspective (which is imperative for censorship
> measurements, but often _harmful_ for large scale measurements; If you
> do a large scale measurement and stripped a bit too much, redoing the
> measurement might be unnecessary harm; The same as having done an
> effectively useless measurement.).
>
> Similarly, the--somewhat simon-says-y--headlines thereafter just keep
> introducing shorter and shorter sections that hand wave away _critical_
> aspects that necessitate _very_ careful consideration and
> instruction... and--as said before--sometimes these imperative things
> may not even make sense.
>
> 2.6 and 2.7 are then close to dangerously short. A document claiming to
> provide guidelines should provide, for these critical mechanics, actual
> guidelines on how to, e.g., execute a harm benefit analysis. With the
> current form, the document essentially provides a blanket for
> researchers being like "ah, well, thought about it, best we could...
> uhm... ups, failed after following best practices, nothing we could
> have done". See also my paper from anrw at 117.
>
> # Summary
> In summary, as those speaking earlier, I am deeply convinced that the
> topic of the draft is direly needed; However, such a document should
> take a lot of context (communities etc.) into account which is not in -
> 08 (and i would argue what is missing is a multiple of what is already
> there). It must also provide guidelines on _how_ to do some of the
> things suggested, instead of just throwing in words, hoping that it is
> feasible.
>
> Otherwise, this document might cause harm by creating unnecessary red-
> tape, which will result in losing a lot of the progress that was made
> in researchers' consideration of ethical concerns and adherence to
> ethical principles; There will be frustration and 'trying to get
> around'.
>
> With best regards,
> Tobias
>
> On Tue, 2023-11-07 at 13:56 +0100, Mallory Knodel wrote:
> > On Tue, 7 Nov 2023 at 13:45, Eric Rescorla <ekr@rtfm.com> wrote:
> >
> > >
> > >
> > > On Tue, Nov 7, 2023 at 12:17 AM Mallory Knodel <mknodel=
> > > 40cdt.org@dmarc.ietf.org> wrote:
> > >
> > > > Hi Marwan,
> > > >
> > > > Top post on terminology. IRTF documents cannot use rfc2119 terms
> > > > with
> > > > precision, because this is not a standards track doc.
> > > >
> > > > And, the use of attacker is the appropriate and precise term for
> > > > designing systems with a threat model, which is what this
> > > > document does.
> > > > I’ll look for ways to bring the tone down a notch, though this
> > > > will add
> > > > more words to a doc that was meant to be lightweight. Worth it to
> > > > get it
> > > > right, however.
> > > >
> > >
> > > Hi Mallory,
> > >
> > > I concur with Marwan that the use of "attack" here is not really
> > > quite
> > > right.
> > >
> > > It's certainly true that measurements can have negative impacts on
> > > users,
> > > but when we use the term "attack" in the security context, we
> > > import
> > > assumptions about the motivations of the attackers. In cases where
> > > there
> > > are incidental negative impacts of behaviors -- e.g., where NATs
> > > are
> > > misdesigned and make it difficult to deploy protocols like QUIC --
> > > we don't
> > > typically refer to that as an attack. It seems to me that a number
> > > of the
> > > impacts you discuss in 1.3 fall into this category, so I think you
> > > should
> > > avoid the term "attack".
> > >
> >
> > Convinced. Suggested replacement terms are welcomed!
> >
> > -M
> >
> >
> > > -Ekr
> > >
> > >
> > > >
> > > > Many thanks for the ongoing discussion and offer to bring in more
> > > > reviews. I haven’t got a new version out with these changes but I
> > > > will do
> > > > soon.
> > > >
> > > > Let’s keep talking,
> > > > -Mallory
> > > >
> > > >
> > > > On Tue, 7 Nov 2023 at 09:01, Marwan Fayed <marwan=
> > > > 40cloudflare.com@dmarc.ietf.org> wrote:
> > > >
> > > > > Thanks Mallory and Tara. I shall keep my promise and share with
> > > > > the
> > > > > wider measurement community at SIGCOMM and others.
> > > > >
> > > > > In the meantime, a constructive thought: Perhaps it would be
> > > > > useful to
> > > > > reconstruct or reframe the contents of this draft using IETF
> > > > > terminology?
> > > > > (For non-IETFers, last I knew, the vocabulary is
> > > > > https://datatracker.ietf.org/doc/rfc2119 .) Measurement
> > > > > practice has
> > > > > many subtleties, some very clear do/do-nots. It occurs to me
> > > > > that many of
> > > > > the subtleties in a draft like this would pop out when
> > > > > presented as MUST or
> > > > > SHOULD NOT statements (if they can be, at all). It may help to
> > > > > read public
> > > > > statements from open research, in which measurement studies are
> > > > > now always
> > > > > accompanied by documentation explaining choices, and more. For
> > > > > example, see
> > > > > 'Ethics' in https://conferences.sigcomm.org/imc/2023/cfp/
> > > > >
> > > > > The suggestion to user IETF terminology is motivated by a
> > > > > simple
> > > > > question, the likes of which IETF exists to answer: What does
> > > > > "interop"
> > > > > look like for measurement practice?
> > > > >
> > > > > Setting details and subtleties aside, I must reiterate that the
> > > > > tone in
> > > > > this draft placing measurement on par with attacks is likely to
> > > > > present as
> > > > > problematic for people who know this domain well, many whose
> > > > > established
> > > > > expertise is measurement practice. It also could be misleading
> > > > > for
> > > > > non-experts who are reviewing measurement plans or practice --
> > > > > in other
> > > > > words, the risks may outweigh the benefits in current form.
> > > > >
> > > > > It has taken the measurement community years to get to where it
> > > > > is now;
> > > > > even so our knowledge and practice continues to evolve. In this
> > > > > wider
> > > > > context this draft is no small endeavour, and the effort is
> > > > > commendable!
> > > > > (Thank you, Contributors!) No matter the outcome of this draft,
> > > > > it brings
> > > > > visibility to an important subject.
> > > > >
> > > > > Best,
> > > > > --marwan
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > On Sun, 5 Nov 2023 at 10:27, Tara Tarakiyee <me@tarakiyee.com>
> > > > > wrote:
> > > > >
> > > > > > Dear Marwan,
> > > > > >
> > > > > > Thank you for sharing your review. I've read the draft with
> > > > > > the
> > > > > > perspective of someone who was a measurement volunteer and
> > > > > > who organised
> > > > > > measurement volunteers in contexts very similar to the
> > > > > > example under 2.1
> > > > > > and I can say I didn't find the positioning of measurement in
> > > > > > this document
> > > > > > to be bad or biased, considering that it's a safety
> > > > > > considerations
> > > > > > document. In fact, an alternative framing that sugarcoats
> > > > > > risks involved
> > > > > > with measurement would counter the goals of the document.
> > > > > >
> > > > > > That said, I agree with your point on 2.1 about taking into
> > > > > > account the
> > > > > > power dynamic between the seeker of consent and the user.
> > > > > > Furthermore, I
> > > > > > think 2.1 should be closely tied to 2.7, it's not enough that
> > > > > > the user
> > > > > > considers risk to themselves, but the measurer should also
> > > > > > take into
> > > > > > consideration the overall benefits vs risks involved to their
> > > > > > measurement
> > > > > > participants even if they have informed consent. Another
> > > > > > consideration to
> > > > > > add to informed consent is the capabilities of the user. A
> > > > > > volunteer
> > > > > > working alone might be inclined to accept the risk because
> > > > > > they want to
> > > > > > help, but their understanding of the risk could be improved
> > > > > > by connecting
> > > > > > them with a local technologist, or exposure to the risk could
> > > > > > be minimized
> > > > > > by connecting them to local legal resources.
> > > > > >
> > > > > > Best wishes,
> > > > > > Tara Tarakiyee
> > > > > >
> > > > > >
> > > > > >
> > > > > >
> > > > > > On Fri, Oct 27, 2023 at 7:01 PM Marwan Fayed <marwan=
> > > > > > 40cloudflare.com@dmarc.ietf.org> wrote:
> > > > > >
> > > > > > > Opening with thanks for the reminders to comment on this
> > > > > > > draft!
> > > > > > > Perhaps a most useful suggestion is to solicit feedback
> > > > > > > from beyond the
> > > > > > > IRTF/IETF community since so much of our best practice and
> > > > > > > guidance has
> > > > > > > been developed, and is tracked, outside of the IRTF/IETF.
> > > > > > > I'm happy to help
> > > > > > > in this regard.
> > > > > > >
> > > > > > > As a member of the measurement community, I can echo
> > > > > > > earlier
> > > > > > > sentiments that this draft is useful. I also see gaps, but
> > > > > > > have additional
> > > > > > > concerns about the way it positions measurement, overall,
> > > > > > > in ways that (at
> > > > > > > a minimum) could adversely bias institutional review or
> > > > > > > other forms of
> > > > > > > scrutiny by panels and people unfamiliar with the
> > > > > > > measurement domain.
> > > > > > >
> > > > > > > First, and most importantly, my reading of the draft's set-
> > > > > > > up in its
> > > > > > > current form is that it (unintentionally no doubt)
> > > > > > > presupposes that
> > > > > > > measurement is bad and harmful. Specifically, the draft
> > > > > > > explicitly equates
> > > > > > > many if not all forms of measurement each as being a type
> > > > > > > of attack. Some
> > > > > > > examples:
> > > > > > >
> > > > > > >  - [1.2] "Passive measurements use surveillance..." -- the
> > > > > > > Oxford
> > > > > > > definition of surveillance is "[noun] close observation,
> > > > > > > especially
> > > > > > > of a suspected spy or criminal."
> > > > > > >
> > > > > > >  - [1.3] encapsulates all measurements as being sources of
> > > > > > > attack.
> > > > > > > There are 12 explicit definitions, 9 of which start by "An
> > > > > > > attack".
> > > > > > >
> > > > > > > It's important to recognise that a draft like this would be
> > > > > > > beneficial
> > > > > > > to a wide audience. At the same time I am unable to see how
> > > > > > > an outside
> > > > > > > observer or reviewer, e.g. institutional review, using
> > > > > > > guidelines of this
> > > > > > > form (and likely have to consider liability along with safe
> > > > > > > and responsible
> > > > > > > practice), wouldn't automatically be forced into a starting
> > > > > > > position of
> > > > > > > defensiveness against measurement. (Aside: one additional
> > > > > > > suggestion may be
> > > > > > > to use 'responsible' alongside 'safe', which is a common
> > > > > > > convention in the
> > > > > > > research community.)
> > > > > > >
> > > > > > > The 'risk' in this current draft is that its current set-up
> > > > > > > reverses a
> > > > > > > lot of the incredibly hard and tireless efforts from the
> > > > > > > measurement
> > > > > > > community to define, account for, report, and review best
> > > > > > > practices, as
> > > > > > > well as call out violations.
> > > > > > >
> > > > > > > Second, there are a few subtleties missing from some
> > > > > > > 'Guidelines' that
> > > > > > > cannot be overlooked. Their omission could lull a reader
> > > > > > > into false senses
> > > > > > > of security that they've checked certain boxes. In
> > > > > > > particular,
> > > > > > >
> > > > > > >  - [2.1] suggests that informed consent is sufficient, when
> > > > > > > in fact we
> > > > > > > know that even fully informed consent in some circumstances
> > > > > > > may not be
> > > > > > > enough. For example, the value and merit of consent to
> > > > > > > statements like "by
> > > > > > > helping this measurement you could go to jail" is
> > > > > > > questionable, at best.
> > > > > > > Alongside, the seeker of consent has to be taken into
> > > > > > > consideration; for
> > > > > > > example, there is no way to know the effect of a consent-
> > > > > > > seeker on a
> > > > > > > consent-giver who may be more or less inclined to trust a
> > > > > > > multinational
> > > > > > > corporation, foreign government, civil liberty group, or a
> > > > > > > university lab
> > > > > > > -- these are just not the same, and an individual may trust
> > > > > > > more or less
> > > > > > > depending.
> > > > > > >
> > > > > > >  - [2.3] This is a good one! If it's helpful, even the
> > > > > > > seemingly
> > > > > > > obviously 'ok' can have caveats. Speedtests are a great
> > > > > > > example. It might
> > > > > > > be reasonable to assume that any speedtest server is happy
> > > > > > > to receive a
> > > > > > > test request, and any subscriber who pays for access is
> > > > > > > entitled to request
> > > > > > > the test -- but what about the transit provider in-between?
> > > > > > >
> > > > > > >  - [2.4] Also great, and easy to overlook. Here, too,
> > > > > > > however, I
> > > > > > > wonder if all requests are equal? As an example, what does
> > > > > > > it mean for
> > > > > > > Google to request do-not-scan? (I honestly don't know!) One
> > > > > > > possible
> > > > > > > addition may be to suggest that "self-identify" is good
> > > > > > > practice,
> > > > > > > especially when releasing measurement tools into the world.
> > > > > > > For example,
> > > > > > > the popular zmap tool self identifies itself by placing
> > > > > > > "54321" in the
> > > > > > > IP-ID field.
> > > > > > >
> > > > > > > One last suggestion: It's hard to know which are the most
> > > > > > > useful
> > > > > > > references in this space, so a draft like this would be a
> > > > > > > great place to
> > > > > > > have a comprehensive list of pointers to best and current
> > > > > > > practice in this
> > > > > > > space (e.g. the CACM written by Partridge and Allman), and
> > > > > > > docs that might
> > > > > > > include case studies. Even better might be to have one or
> > > > > > > two sentences for
> > > > > > > each to describe why the reference is useful, or what it
> > > > > > > offers.
> > > > > > > (Acknowledging in advance that distilling down from
> > > > > > > multiple inputs is a
> > > > > > > challenge in itself, and would be a great feat!)
> > > > > > >
> > > > > > > Hope some of this helps.
> > > > > > >
> > > > > > > --marwan
> > > > > > >
> > > > > > >
> > > > > > >
> > > > > > >
> > > > > > >
> > > > > > > --
> > > > > > > Pearg mailing list
> > > > > > > Pearg@irtf.org
> > > > > > > https://mailman.irtf.org/mailman/listinfo/pearg
> > > > > > >
> > > > > > --
> > > > > > Pearg mailing list
> > > > > > Pearg@irtf.org
> > > > > > https://mailman.irtf.org/mailman/listinfo/pearg
> > > > > >
> > > > > --
> > > > > Pearg mailing list
> > > > > Pearg@irtf.org
> > > > > https://mailman.irtf.org/mailman/listinfo/pearg
> > > > >
> > > > --
> > > > Pearg mailing list
> > > > Pearg@irtf.org
> > > > https://mailman.irtf.org/mailman/listinfo/pearg
> > > >
> > >
>
> --
> Dr.-Ing. Tobias Fiebig
> T +31 616 80 98 99
> M tobias@fiebig.nl
>
> --
> Pearg mailing list
> Pearg@irtf.org
> https://mailman.irtf.org/mailman/listinfo/pearg
>