Re: [Rats] Use case -> architecture document

"Eric Voit (evoit)" <evoit@cisco.com> Wed, 09 October 2019 14:25 UTC

Return-Path: <evoit@cisco.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B0CD1200E0 for <rats@ietfa.amsl.com>; Wed, 9 Oct 2019 07:25:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level:
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=BqJWQgUH; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=cisco.onmicrosoft.com header.b=UyydaXpf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p3GJerTXG5fe for <rats@ietfa.amsl.com>; Wed, 9 Oct 2019 07:25:54 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D10A12006E for <rats@ietf.org>; Wed, 9 Oct 2019 07:25:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=18796; q=dns/txt; s=iport; t=1570631154; x=1571840754; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=QtEP5EUqf5dm5svZ9WuHW7/DMtkahfD5Ht8sLCZUucQ=; b=BqJWQgUHYN6FXpvUulj9HNjWatr5ABpdKm9ywAAR85CFGBVe9el0VsP/ iBMb9DiK/h0Uo7bDRkzu6kwfTlDeH1yjEugrhXsZMSasmVxufrU+Ur4+H M/+SngUGpUKCbL+BsfCnRGslPO00saaVz9rJ6Gq3N+PYXhL2FApLHjaOT w=;
X-Files: smime.p7s : 3975
IronPort-PHdr: 9a23:5JIpeBzo8bsMn8rXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5YRyN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1kAgMQSkRYnBZuIF0r6MNbhbjcxG4JJU1o2t3w=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AeAAAC7Z1d/4wNJK1lGQEBAQEBAQEBAQEBAQEBAQEBEQEBAQEBAQEBAQEBgWoBAQEBAQELAYFKKScDbVYgBAsqCoQZg0cDikSCXIlqjhOBQoEQA1QCBwEBAQkDAQEYCwoCAQGEQAKCTyM3Bg4CAwkBAQQBAQECAQUEbYUtDIVLAQEBBAEBDAQRBBkBASMHAQEEBAMBCwQCAQYCEQEDAQEBJwMCAgIfBgIJFAMGCAIEAQ0FCAYUgwGBHU0DHQECDJQzkGECgTiIYXV/M4J9AQEFgTQBg1QNC4IQBwMGgTQBgVKDQ4VagR4YgUA/JmtGgU5+PoIaRwEBgSUJAQsHASEVFYJiMoIEIop6gXMcMoI0nRdBCoIig0KCMIYuhHEihAGCOodOhCyLDI4tijCPBgIEAgQFAg4BAQWBaCNncXAVO4JsUBAUgU+BJwECBYJEhRSFPgF0AYEokGgPF4ELAYEiAQE
X-IronPort-AV: E=Sophos;i="5.67,276,1566864000"; d="p7s'?scan'208";a="340426051"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 Oct 2019 14:25:52 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by alln-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id x99EPqJm030411 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 9 Oct 2019 14:25:52 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 9 Oct 2019 09:25:52 -0500
Received: from xhs-aln-003.cisco.com (173.37.135.120) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 9 Oct 2019 09:25:51 -0500
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 9 Oct 2019 09:25:51 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Qgw1T4ryXb52kGD8ui/w70pjMHAd+VZSCZlN3NBomIJwQxr2Nd6GKJ+3JNMRmmjkOah4B9e55nVmGKTP9UobPoWLYxjhowo/L1KRasJ9iN251G3DhxCGvePytei08wsctKxdMA9PnER/YYxeeMg11D0ONpxHNZEqMipRpRgjR8Rqr0TcqggRa5zCSY7SvP3CZVVePUWzsAW6hM6t1dOCo3cuUPEqhm6HuUfge1foE7WXIDWb2WalnNS4jGSALmUKIjvQGTWXir1iIAvfbeU/5tyss5U9CypB6SfL1rsWUmihimeIMYfvog+1zNIjok5Tc/hUtjDTpA35iWx+gwHGew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=avbAda/7tvxKQP04wOLKpXVWzZlvDKgN80e6fu8FQkM=; b=O84R//3c4YZUEuqzSwwC+8oS63yWClLU6xLvfuNXZo8hpnv/QIOcGT8PNSJ+slHDt/4hVo8552rJWwd6zlBgS/WR1Sf3QjNbkxQeZXrO1S/hFJg+YNgnsn3o6MdZl0HB3vPOVmt99myqHoHquUb5RvkKvgTklXXrq9XEJj3xC58N+mbYf/2eLzvzYubardKCALYMgJwCbZdJrlcPqty6ZSVe8eCMNDqfUsqosb+YfP19IEeaeQ8UxDqp8/OETY0Bjh/iLTpfHIXBV81m7iSJmTExwE2nSoh1tgR3xYYyqDT1Y20KXYHXkmLFaQb3md07wayi16l/jU9sdRPKXMO0rg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=avbAda/7tvxKQP04wOLKpXVWzZlvDKgN80e6fu8FQkM=; b=UyydaXpfJKoCRjaqdVK4PjmUhXpOEy4Ut8LijzB/Lsfk4twVt17/xLxBiNRTUkk2SAmJHrUNfW0Ly5WViHTy3AFejeth2JZBERLv9KxUMuQLXUpgkEkXi/f7ktktJPYSuAzjfgdeN204/M7qUSP8W6i0/PdzjP3Qml+Z2vDroD4=
Received: from BN7PR11MB2627.namprd11.prod.outlook.com (52.135.255.31) by BN7PR11MB2593.namprd11.prod.outlook.com (52.135.253.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2347.16; Wed, 9 Oct 2019 14:25:50 +0000
Received: from BN7PR11MB2627.namprd11.prod.outlook.com ([fe80::f067:b6d2:8855:b605]) by BN7PR11MB2627.namprd11.prod.outlook.com ([fe80::f067:b6d2:8855:b605%6]) with mapi id 15.20.2347.016; Wed, 9 Oct 2019 14:25:50 +0000
From: "Eric Voit (evoit)" <evoit@cisco.com>
To: "Diego R. Lopez" <diego.r.lopez@telefonica.com>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, "Xialiang (Frank, Network Standard & Patent Dept)" <frank.xialiang@huawei.com>
CC: "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] Use case -> architecture document
Thread-Index: AQHVfqF+IbjOe8kAO0OE0sucSIoiKKdSVNuQ
Date: Wed, 09 Oct 2019 14:25:50 +0000
Message-ID: <BN7PR11MB26273EBE2814BC138D0CEED8A1950@BN7PR11MB2627.namprd11.prod.outlook.com>
References: <CAHbuEH7f0jjquR=iZDgof4DkgpZKgxEP86NcQ0A1NQ=SP+_FHA@mail.gmail.com> <C02846B1344F344EB4FAA6FA7AF481F13E9560C0@dggemm511-mbx.china.huawei.com> <CAHbuEH7WkqeyUW3sL5bdw5N25B6O7ZEF0Qkx03fE5c42Sd4M5w@mail.gmail.com> <b91baad2-2fc3-a5e4-6898-e2cddcda300d@sit.fraunhofer.de> <49962FEC-77FB-46D3-8A18-46E00C0DED33@telefonica.com>
In-Reply-To: <49962FEC-77FB-46D3-8A18-46E00C0DED33@telefonica.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=evoit@cisco.com;
x-originating-ip: [173.38.117.86]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e7c60d65-ad1f-471b-acb2-08d74cc495b1
x-ms-traffictypediagnostic: BN7PR11MB2593:
x-microsoft-antispam-prvs: <BN7PR11MB2593DC481B03B262E8524CFCA1950@BN7PR11MB2593.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:3383;
x-forefront-prvs: 018577E36E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(366004)(376002)(346002)(39860400002)(136003)(13464003)(40134004)(199004)(189003)(966005)(14444005)(52536014)(5024004)(229853002)(561944003)(6246003)(55016002)(9686003)(6306002)(99936001)(14454004)(25786009)(71190400001)(71200400001)(30864003)(2906002)(33656002)(66574012)(5660300002)(6436002)(478600001)(45080400002)(66066001)(256004)(66946007)(66476007)(64756008)(66446008)(186003)(4326008)(316002)(86362001)(296002)(66556008)(26005)(8936002)(110136005)(76116006)(7736002)(3846002)(6116002)(66616009)(486006)(305945005)(446003)(11346002)(74316002)(476003)(76176011)(8676002)(7696005)(99286004)(53546011)(6506007)(102836004)(81156014)(81166006); DIR:OUT; SFP:1101; SCL:1; SRVR:BN7PR11MB2593; H:BN7PR11MB2627.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: V//f0P/OSNxWLjzodOv5oUi8hZrxUBPMTwyz0thBIh2j7Tq7WORk9qtnE0LrQe9xtx2xfLKlJ8CYAdOeGE3lmuWY62VVAqUr33T5E9V/Zs2ILBS47vKPAsZXvASJAhwYSrGWBGzQcksdfgdCRB7BTPj9t571HkvK7wXIQxSSVOE6PsqF/voQ8l2vnP51byXMvDxEZEso232dqXCXj8MZVn3NNUDtQRPG0dzDHMA4VXvJ7DOE1sw0zOMnD+wR0RiaeXZG2iRrodFb4ONEvjhcyoX9z9WBZVCKC6AP2r2mP5S///dQDvGXJDchyy6xiUiT5fC+u7/Mf36QeTiBiDg3hOdHaar+J7Z2rxl3+1uDed9+O/i310KlRoF324HroYxvVdK0Tkjg/0lilCz9DHm/KlYyO2E6QXzsXvU9Jqz/XH4=
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; boundary="----=_NextPart_000_05FA_01D57E8B.E9D82C30"; micalg="SHA1"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: e7c60d65-ad1f-471b-acb2-08d74cc495b1
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Oct 2019 14:25:50.2736 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: P9UYIlvfQQMjByt7ME7Ev3JML8TJXvl7lA79HNdAGBWVdWZ+aegL6JIlvSM8cWc/
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR11MB2593
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xch-rcd-007.cisco.com
X-Outbound-Node: alln-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/AJYJymGbiZg2o2zTSf_vVL0vmCQ>
Subject: Re: [Rats] Use case -> architecture document
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Oct 2019 14:25:57 -0000

I have been interested in RATS for two reasons:

(1) The YANG model (for current needs)
Network operators are already asking for vendor independent ways for extracting router boot integrity measures.

(2) Consistent and precise architectural terms and roles (for our next needs)
I don't believe that it will be possible to explore issues in the WG without these formal constructs.  Such a document is needed for are discussions like:
 - when to use the passport model vs the background check, 
 - how to assemble a consolidated "Attester" security posture from cryptoprocessors on independent line cards, and 
 - how does a "Verifier" understand the relationship between the claims of physical and virtual components of an "Attester" 

I believe for (2), the current architecture draft is quite good.   While some wording tweaks wouldn't hurt, I certainly don't want to start over.  In fact I would prefer to see the architecture draft adopted.

Eric

> -----Original Message-----
> From: RATS <rats-bounces@ietf.org> On Behalf Of Diego R. Lopez
> Sent: Wednesday, October 9, 2019 9:00 AM
> To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>; Kathleen Moriarty
> <kathleen.moriarty.ietf@gmail.com>; Xialiang (Frank, Network Standard &
> Patent Dept) <frank.xialiang@huawei.com>
> Cc: rats@ietf.org
> Subject: Re: [Rats] Use case -> architecture document
> 
> Hi,
> 
> Given my current close-to-outsider position (I am afraid other more pressing
> issues have kept me much further away from RATS that I would have liked
> to), let me make a proposal in the hope this could synthesize both
> approaches. I agree with Frank it would be difficult to rewrite a document
> that has gone through a long process of consensus formation, and rebuilding
> that consensus with the additional goal of readability may become overly
> complicated. In that respect, I'd support Henk's comments regarding the
> identification of concrete ambiguities or statements that can be
> misinterpreted.
> 
> But, since I also acknowledge Kathleen concern on making the architecture
> well understandable and therefore applicable, I'd suggest we think of
> preparing a more readable document (or section if you prefer) in the form of
> describing application scenarios, clarifying how the general (and therefore
> complicated for novices) architecture can be used, and the assumptions
> required for that. That would not change the delicate consensus fabric in the
> whole architecture, making at the same time easier to understand where an
> how to use it.
> 
> Be goode,
> 
> --
> "Esta vez no fallaremos, Doctor Infierno"
> 
> Dr Diego R. Lopez
> Telefonica I+D
> https://www.linkedin.com/in/dr2lopez/
> 
> e-mail: diego.r.lopez@telefonica.com
> Tel:         +34 913 129 041
> Mobile:  +34 682 051 091
> ----------------------------------
> 
> On 09/10/2019, 13:56, "RATS on behalf of Henk Birkholz" <rats-
> bounces@ietf.org on behalf of henk.birkholz@sit.fraunhofer.de> wrote:
> 
>     Hi Kathleen,
>     hi list,
> 
>     it would help everybody, if you could explicitly highlight what the
>     exact issues wrt readability in the current architecture I-D are -
>     always in comparison with the use-case I-D, if it is doing a better job
>     in that part?
> 
>     Jürgen provided a good example of what he found confusing as a first
>     time reader - and that was really helpful and is resulting in ongoing work.
> 
>     Please mind, not everything is fleshed out in the architecture (e.g. the
>     workflows derived from the use-cases). The plan was to aim for a stable
>     nucleus, address the issues raised by the list, go through adoption, and
>     finish the document via the issue tracker in a structured process.
> 
>     In summary, without an actual understanding why you (or others!) think
>     the document is still hard to read, there is no way of compare
>     readability later on also. It would be really good to get more precise
>     feedback on that.
> 
>     Viele Grüße,
> 
>     Henk
> 
> 
> 
> 
>     On 09.10.19 13:31, Kathleen Moriarty wrote:
>     > Hi Frank,
>     >
>     > Thank you for voicing your concern.  I think some may hold off until the
>     > updates are provided, but please do voice your opinions.  I agree that
>     > this work is too important and as such, readability is a high priority.
>     > If you read through the TEEP and SUIT architecture drafts, they are
>     > quite easy to follow and understand.  That is critical for wide spread
>     > adoption.  We may be able to find a balance, but I think this exercise
>     > may speed progress as we have not decided to adopt this draft yet as a
>     > working group item.
>     >
>     > As it stands, the use case document is not an architecture document,
> but
>     > it could be shaped as such and I'd really like to see if we can do that
>     > in short order to have a comparison prior to an adoption call.
>     >
>     > Best regards,
>     > Kathleen
>     >
>     > On Wed, Oct 9, 2019 at 6:53 AM Xialiang (Frank, Network Standard &
>     > Patent Dept) <frank.xialiang@huawei.com
>     > <mailto:frank.xialiang@huawei.com>> wrote:
>     >
>     >     Hi Kathleen,____
>     >
>     >     __ __
>     >
>     >     I am very concerned with this new direction and I strongly object.____
>     >
>     >     __ __
>     >
>     >     Current architecture draft goes through a lot discussions and
>     >     reaches many consensus. Right now, it really helps IETF (Teep for
>     >     example), FIDO, TCG and many others. The only issues are on
>     >     readability, the standards track and the completeness (e.g.,
>     >     passport and background check are still missing). It is an very good
>     >     document and correct terminology is very important for remote
>     >     attestation.____
>     >
>     >     __ __
>     >
>     >     About use cases document, Its goal is just to clarify a sample list
>     >     of scenarios that remote attestation can apply to and then deduce
>     >     the requirements and the following concrete protocol drafts. It is
>     >     not fit to be an architecture.____
>     >
>     >     __ __
>     >
>     >     The current architecture is too important for telecom and network
>     >     equipment vendors and service providers. I have strong doubts that
>     >     current EAT and OTrPv2 alone is suitable for the (virtualized)
>     >     network infrastructure situation.____
>     >
>     >     __ __
>     >
>     >     B.R.____
>     >
>     >     Frank____
>     >
>     >     ____
>     >
>     >     __ __
>     >
>     >     This e-mail and its attachments contain confidential information
>     >     from HUAWEI, which is intended only for the person or entity whose
>     >     address is listed above. Any use of the information contained herein
>     >     in any way (including, but not limited to, total or partial
>     >     disclosure, reproduction, or dissemination) by persons other than
>     >     the intended recipient(s) is prohibited. If you receive this e-mail
>     >     in error, please notify the sender by phone or email immediately and
>     >     delete it!____
>     >
>     >     __ __
>     >
>     >     *发件人:*RATS [mailto:rats-bounces@ietf.org
>     >     <mailto:rats-bounces@ietf.org>] *代表 *Kathleen Moriarty
>     >     *发送时间:*2019年10月8日19:25
>     >     *收件人:*rats@ietf.org <mailto:rats@ietf.org>
>     >     *主题:*[Rats] Use case -> architecture document____
>     >
>     >     __ __
>     >
>     >     Hello!
>     >
>     >     I read through the latest version of the ‘use case’ document
>     >     yesterday and found it very easy to read and understand, meaning I
>     >     think it is written well and could be easily understood by many
>     >     without having to climb up a learning curve. ____
>     >
>     >     __ __
>     >
>     >     First, this could be a very useful document to register claims for
>     >     the use cases.
>     >
>     >     Second, if the workflow for the passport and background check were
>     >     added and put in terms of the open trust protocol v2 from TEEP, we
>     >     have a fairly nice architecture document that’s easy to read and may
>     >     gain adoption.  The workflows cover the various interactions between
>     >     roles and TEEP has actively broken up OTrP in v2 to
>     >     accommodate using EAT tokens, this would help create that link and
>     >     make it very clear.
>     >
>     >     The other thing I like about the use case document and think we
>     >     should expand on is the references to other work items.  This makes
>     >     it an architecture document that maps out the full plan of the WG.
>     >     One like that was extremely well received by all the ADs that don’t
>     >     like informational/helpful documents.
>     >
>     >     I’m a bit nervous with the terminology being defined and would love
>     >     to see something like this that’s simplified and more easily
>     >     adoptable. ____
>     >
>     >     __ __
>     >
>     >     I appreciate the work done to improve the architecture document, but
>     >     I do think the structure changes to the use case document as
>     >     suggested could result in an easier to understand (and therefore
>     >     easier to adopt) document.____
>     >
>     >     __ __
>     >
>     >     While the architecture document is more readable, I think we can do
>     >     better.  Adoption is important and our timeliness matters a lot for
>     >     this work.  EATs can be used for may use cases with OTrPv2, so let's
>     >     keep it as simple as we can.
>     >
>     >     Thoughts are appreciated.
>     >
>     >     Best regards,
>     >     Kathleen-- ____
>     >
>     >     __ __
>     >
>     >     Best regards,____
>     >
>     >     Kathleen____
>     >
>     >
>     >
>     > --
>     >
>     > Best regards,
>     > Kathleen
>     >
>     > _______________________________________________
>     > RATS mailing list
>     > RATS@ietf.org
>     > https://www.ietf.org/mailman/listinfo/rats
>     >
> 
>     _______________________________________________
>     RATS mailing list
>     RATS@ietf.org
>     https://www.ietf.org/mailman/listinfo/rats
> 
> 
> 
> ________________________________
> 
> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario,
> puede contener información privilegiada o confidencial y es para uso
> exclusivo de la persona o entidad de destino. Si no es usted. el destinatario
> indicado, queda notificado de que la lectura, utilización, divulgación y/o
> copia sin autorización puede estar prohibida en virtud de la legislación
> vigente. Si ha recibido este mensaje por error, le rogamos que nos lo
> comunique inmediatamente por esta misma vía y proceda a su destrucción.
> 
> The information contained in this transmission is privileged and confidential
> information intended only for the use of the individual or entity named
> above. If the reader of this message is not the intended recipient, you are
> hereby notified that any dissemination, distribution or copying of this
> communication is strictly prohibited. If you have received this transmission
> in error, do not read it. Please immediately reply to the sender that you
> have received this communication in error and then delete it.
> 
> Esta mensagem e seus anexos se dirigem exclusivamente ao seu
> destinatário, pode conter informação privilegiada ou confidencial e é para
> uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o
> destinatário indicado, fica notificado de que a leitura, utilização, divulgação
> e/ou cópia sem autorização pode estar proibida em virtude da legislação
> vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o
> comunique imediatamente por esta mesma via e proceda a sua destruição
> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats