Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS and COMMENT)

Dirk.von-Hugo@telekom.de Wed, 04 November 2020 11:41 UTC

Return-Path: <Dirk.von-Hugo@telekom.de>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 573843A100D; Wed, 4 Nov 2020 03:41:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sQ6fi7EZGXLb; Wed, 4 Nov 2020 03:41:00 -0800 (PST)
Received: from mailout41.telekom.de (mailout41.telekom.de [194.25.225.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 733063A0FFD; Wed, 4 Nov 2020 03:40:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1604490059; x=1636026059; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=wdDSCxJWm8z6rvcCB6eIDCpHtSKANey+O9LGgftJFLs=; b=g3fybnLwiDgC0Gyfr7pn9FW4Zqw2do1fdR4jaTX/34xaTy/d7Wly9y/Y gIPobxOEiFcGQLumAunG487zAhpq9PurkqGENEFOGvCa8KE/mBlt1nCkc BBQ4RyFL6DxtrCiFazOoZjxsyKOlzHn/SvCbLl1j9lUrBkxVhucutL5vC cNqB8oBHcD9v9xxdeyRT/Uu61LQOC2sfA/qSPzlfssVOoI4kqSSicUkF8 aw5OhN06UCRLZq8Y/dkiH86o1yxKeAYofOfJpxzfn0xlCs5B46NYF4Llo O0n+AbPzLnqYemaobciVg2C4eSRwQ1jHXq7cm2RdcRn59SiZDaDTXPKlE w==;
IronPort-SDR: qwbGyusYZOwdhC9FP47Ed09I5m9cU6R//qczG9jwwOvkeOt9jo1EStQnHrLb7dMogxdfv72Aib 0RDSPO1fVJBg==
Received: from qde9xy.de.t-internal.com ([10.171.254.32]) by MAILOUT41.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 04 Nov 2020 12:40:55 +0100
IronPort-SDR: wcVFItBPqji8OFWiX33bqkNIi51BYRKiOya/8bToLzXwNzO1572CiJo1wqOYFcPi5Zs6iq783L je165msXiayDxpNPuw4O5RhQT3HUXUWV4=
X-IronPort-AV: E=Sophos;i="5.77,450,1596492000"; d="scan'208";a="204284363"
X-MGA-submission: MDElvnRwQVuvT/y9OFAuSibKlk3s00BLsYGjNiqNCMOcK8cPPcOr1wng7IXlasvKUjdtlMlx/Q2hRRwknWdN6ATLqBGI1X5nqk124Kv7h1yvgFQNXwhbqx5lnTE2Yim2ykldkGJMxUsPqsjSUEbWI9Kx52F5Hc8vW1mCpgdPc7S8nQ==
Received: from he105711.emea1.cds.t-internal.com ([10.169.118.42]) by QDE9Y1.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-SHA256; 04 Nov 2020 12:40:55 +0100
Received: from HE105716.EMEA1.cds.t-internal.com (10.169.118.52) by HE105711.emea1.cds.t-internal.com (10.169.118.42) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 4 Nov 2020 12:40:54 +0100
Received: from HE104160.emea1.cds.t-internal.com (10.171.40.36) by HE105716.EMEA1.cds.t-internal.com (10.169.118.52) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 4 Nov 2020 12:40:54 +0100
Received: from GER01-FRA-obe.outbound.protection.outlook.de (51.4.80.24) by O365mail03.telekom.de (172.30.0.232) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 4 Nov 2020 12:40:51 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ag6YyykaPdAQZsVXNS/2uwfL4YqjtZ5GUw1jklMoi3CpGii/C0c14FDVMnGhtJ3QY+4IR+VuM0eng/Ahvj5Mw87Im908VAYrbfGMOxUI96koKSEEwmyNV7Fg0aonIA7nFNef9zJaGhFl0ZCTkrpdU92fYaK+2uPB2qnHLlBU/ERvqopdO0pVjdwtCRmF3yh0lgz/59UrP7FDjAX1MZv9py5aV+6LoiXoCYwPFBt3SqA7EyxL7ucVGt5JlwcTHVOsMket7cevxOou21upJHJsP8+qAV0hIGyfSy5J9LKPKRwo5ztFSFWhV1jxQdRew2kLk1fnxPS6ytRbEgNfSPo7HA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wdDSCxJWm8z6rvcCB6eIDCpHtSKANey+O9LGgftJFLs=; b=fht18FXsli7ll3HaoFBRJ5iPSbbzCWG9kLddCUHWy2w2QZbEYBT/p5p/vZlKcnZV+eufkGhah/rcvm9LeSuyct/gqfyGm/m1DRI1pc7htWanS4DMK3dbECTBMa1I9GbvZJ2tnExG3pCS+oAC4SkT/ZvtTQF824CjuWnMg3IJPLyH8SnZc5NGUPpwrAtSd2XS2UjboK5yRQK61OIRCvpGIYSb+K93IWQthsdwzxAiuktoHfsYig+QXBLLvvP674V+pmz7/3eQizSbOVPnhUvgzQ9cTzVxxa/rkZqI4oVUN9tVxzDJJCgJJpgB6YqHW8S3ezIEWo1/dT4K06/k+UVyHQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FRAPR01MB1252.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c010:c::18) by FRAPR01MB1028.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c010:d::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.29; Wed, 4 Nov 2020 11:40:53 +0000
Received: from FRAPR01MB1252.DEUPRD01.PROD.OUTLOOK.DE ([fe80::9847:ebd1:45b4:17b0]) by FRAPR01MB1252.DEUPRD01.PROD.OUTLOOK.DE ([fe80::9847:ebd1:45b4:17b0%2]) with mapi id 15.20.3499.032; Wed, 4 Nov 2020 11:40:53 +0000
From: Dirk.von-Hugo@telekom.de
To: mohamed.boucadair@orange.com, kaduk@mit.edu, iesg@ietf.org
CC: draft-ietf-sfc-serviceid-header@ietf.org, sfc-chairs@ietf.org, sfc@ietf.org, gregimirsky@gmail.com
Thread-Topic: Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS and COMMENT)
Thread-Index: AQHWso57Vkf+w4EApUWtEWkeIPiKxqm30TZQ
Date: Wed, 04 Nov 2020 11:40:53 +0000
Message-ID: <FRAPR01MB1252F0535F179052F97F5E36D1EF0@FRAPR01MB1252.DEUPRD01.PROD.OUTLOOK.DE>
References: <160446460674.32614.15877665689972040502@ietfa.amsl.com> <28389_1604482785_5FA276E1_28389_92_3_787AE7BB302AE849A7480A190F8B93303156F9F0@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <28389_1604482785_5FA276E1_28389_92_3_787AE7BB302AE849A7480A190F8B93303156F9F0@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: orange.com; dkim=none (message not signed) header.d=none;orange.com; dmarc=none action=none header.from=telekom.de;
x-originating-ip: [212.201.104.11]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7a87f6b0-2e68-4e88-8304-08d880b67c97
x-ms-traffictypediagnostic: FRAPR01MB1028:
x-microsoft-antispam-prvs: <FRAPR01MB1028D1EE608A1F2B1EFF256AD1EF0@FRAPR01MB1028.DEUPRD01.PROD.OUTLOOK.DE>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 49SkFEduzYjqLXy6qYTdYQKIP5eo3Vu8jCyhix9DYwXEKOk7hLRa0xwiGl1AUfsA9d9ZcSDIgRuDb773th/0Qa6EBFA6Z5WrVToYwWos8jAqcWgWwZbX7tQZ5rGhS1jTNqDikpLBcUr4lE8yBuw4sR78d5BWvuRyjpjeIPgkI0/JdAQFfB0L6QPTWmF+f8y0V7LQB6jQRijP9aFFi50Od23FNHIQw3QceyrRdKaaR2KiiQA+j+oAWhtnbprV5L+kB4xN+Y2y54SS5iGWgHS+GuJ1d4OzuI41y6eYiK2XwpB9sQCoES67T4eRf/HjdbAI55V78TuB37hycC8VC/JwX+z+Sq0TcTS4fR3ee+MJv6KlDvbvJvJyIFH6FzckwFuz
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FRAPR01MB1252.DEUPRD01.PROD.OUTLOOK.DE; PTR:; CAT:NONE; SFS:(346002)(376002)(136003)(39860400002)(396003)(366004)(66556008)(83380400001)(7696005)(66476007)(9686003)(186003)(66946007)(64756008)(55016002)(26005)(53546011)(66446008)(76116006)(86362001)(5660300002)(4326008)(30864003)(508600001)(8676002)(2906002)(110136005)(33656002)(71200400001)(54906003)(8936002)(359044002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FRAPR01MB1252.DEUPRD01.PROD.OUTLOOK.DE
X-MS-Exchange-CrossTenant-Network-Message-Id: 7a87f6b0-2e68-4e88-8304-08d880b67c97
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2020 11:40:53.3123 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: A/YE9dn86Z0tFg6WuYzAyv4T5bilmJWKa2EkognPU0eq7WzijXvPb4OlubjckgehJ1A68FVWiAi1h50TmDtyHqBcGrK1AH1n0r2WvfSyBMw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRAPR01MB1028
X-TM-SNTS-SMTP: 60B1127F1A792A38B18DABFE6EF99EBB0A79D0F3AD77DB89838411C0ED535D102000:8
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/GLE2TzjyDW8j0zFC2DdGy4LgALs>
Subject: Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Nov 2020 11:41:02 -0000

Hi Ben and Med,
I completely agree with Meds reply and just add my clarification as suggested inline.
Thanks!
Thanks and
Kind regards
Dirk

-----Original Message-----
From: mohamed.boucadair@orange.com <mohamed.boucadair@orange.com> 
Sent: Mittwoch, 4. November 2020 10:40
To: Benjamin Kaduk <kaduk@mit.edu>; The IESG <iesg@ietf.org>
Cc: draft-ietf-sfc-serviceid-header@ietf.org; sfc-chairs@ietf.org; sfc@ietf.org; Greg Mirsky <gregimirsky@gmail.com>
Subject: RE: Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS and COMMENT)

Hi Ben, 

Thanks for the detailed review. 

Starting with the "COMMENT" part. The DISCUSS will be in a separate message. 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Benjamin Kaduk via Datatracker [mailto:noreply@ietf.org] Envoyé : 
> mercredi 4 novembre 2020 05:37 À : The IESG <iesg@ietf.org> Cc : 
> draft-ietf-sfc-serviceid-header@ietf.org; sfc-chairs@ietf.org; 
> sfc@ietf.org; Greg Mirsky <gregimirsky@gmail.com>; 
> gregimirsky@gmail.com Objet : Benjamin Kaduk's Discuss on 
> draft-ietf-sfc-serviceid-header-
> 12: (with DISCUSS and COMMENT)

[...]

> --------------------------------------------------------------------
> --
> COMMENT:
> --------------------------------------------------------------------
> --
> 
> I am preparing a significant number of (hopefully) editorial 
> suggestions in a local copy of the XML source; I plan to send that as 
> a diff to the authors as a response to the ballot mail.
> 

[Med] Thanks. Already fixed in the local copy. 

> Section 1
> 
>    This document does not make any assumption about the structure of
>    subscriber or performance policy identifiers; each such identifier 
> is
>    treated as an opaque value.  The semantics and validation of these
>    identifiers are policies local to an SFC-enabled domain.  This
>    document focuses on the data plane behaviour.  Control plane
>    considerations are out of the scope.
> 
> (Control plane considerations probably touch on the privacy properties 
> of the system as a whole, but I think I understand the point being 
> made
> here.)

[Med] ACK.

> 
> Section 3
> 
>    The classifier and NSH-aware SFs MAY inject or strip a Subscriber
>    Identifier Context Header as a function of a local policy.  In 
> order
>    to prevent interoperability issues, the type and format of the
>    identifiers to be injected in a Subscriber Identifier Context 
> Header
>    should be configured to nodes authorized to inject and consume such
>    headers.  [...]
> 
> I think this is more of a "needs to" rather than a "should".

[Med] "Should" is used to accommodate deployments where "default format" are mandated by design (or RFPs). 

> 
>              For example, a node can be instructed to insert such data
>    following a type/set scheme (e.g., node X should inject subscriber 
> ID
>    type Y).  Other schemes may be envisaged.
> 
> Just to check my understanding, the fact that it was node X that 
> injected a given subscriber ID context header is determined from the 
> SPI, since the SPI uniquely identifies the SFP?

[Med] Yes. 

> 
>    Failures to inject such headers should be logged locally while a
>    notification alarm may be sent to a Control Element.  The details 
> of
>    sending notification alarms (i.e., the parameters affecting the
>    transmission of the notification alarms depend on the information 
> in
>    the Context Header such as frequency, thresholds, and content of 
> the
>    alarm (full header, timestamp, etc.)) should be configurable.
> 
> While this is purely an editorial remark (and I will be including a 
> proposal in my editorial diff), I did want to note that I can't 
> actually parse how the (outer) parenthetical is supposed to apply, and 
> expect that my suggestion is going to change the meaning somehow.

[Med] Reading your proposed edit, I confirm that you got it well. 

> 
>    This document adheres to the recommendations in [RFC8300] for
>    handling the Context Headers at both ingress and egress SFC 
> boundary
>    nodes (i.e., to strip such Context Headers).  Revealing any 
> personal
>    and subscriber-related information to third parties is avoided by
>    design to prevent privacy breaches in terms of user tracking.
> 
> I think s/third parties/parties outside the administrative domain/ may 
> be more accurate.

[Med] Went with "parties outside the SFC-enabled domain".

> 
> I would also end the last sentence after "design" and split the 
> remaining portion into a new sentence: "Accordingly, the scope for 
> privacy breaches and user tracking is limited to within the 
> administrative domain where the NSH is used".

[Med] OK. 

> 
>    if the NSH-aware SF is instructed to do so.  For example, an SF 
> that
>    expects an internal IP address as subscriber identifier will 
> discard
>    Subscriber Identifier Context Headers conveying Mobile Subscriber
>    ISDN Number (MSISDN), International Mobile Subscriber Identity
>    (IMSI), or malformed IP addresses.
> 
> There's a little bit of cognitive dissonance here in that we say that 
> the content of the context header is opaque, yet are giving a list of 
> things that would involve peeking inside that opacity (and possibly 
> some additional structure to identify the type).  (No specific action 
> requested here, just making an observation.)

[Med] These examples make it easy to understand why we allow for more IDs in the same message. It is less evident with abstract examples. 

> 
> Section 4
> 
>    instance selection, or policy selection at SFs.  Note that the use 
> of
>    the Performance Policy Identifier is not helpful if the path
>    computation is centralized and a strict SFP is presented as local
>    policy to SF Forwarders (SFFs).
> 
> I'm not sure I understand why this is the case; wouldn't the 
> performance policy information still be useful for, e.g., not dropping 
> UHR packets when buffers are full, regardless of whether the SFP is 
> strict or not?

[Med] The text is about path computation and selection. 

We are not using for marking because otherwise we will have the "usual" comments why not using flow lable, dscp marking, etc. 

> 
>    performance, or proximity considerations.  For the particular case 
> of
>    UHR services, the stand-by operation of back-up capacity or the
>    deployment of multiple SF instances may be requested.
> 
> I'm not sure that I understand how a per-packet header would request
> *deployment* of multiple instances.  Perhaps the intent is to say that 
> the presence of multiple instances is requested?  (Or perhaps I 
> misunderstand, of course.)

[Med] I let this one to Dirk :-)

[Dirk] Quite right: The intent is to give an example how a policy with high reliability requirements can be enforced - e.g. by choosing a SFP along SFs which are (already) deployed in multiple redundant instances - so your proposal should fit:

s/ deployment of multiple SF instances/ presence of SFs deployed in multiple instances/

Thanks!
> 
>    In an environment characterised by frequent changes of link and 
> path
>    behaviour, for example due to variable load or availability caused 
> by
>    propagation conditions on a wireless link, the SFP may have to be
>    adapted dynamically by on-the-move SFC path and SF instance
>    selection.
> 
> (Is "on-the-move selection" a new term here?  I kind of thought we had 
> used a different term to describe this type of behavior in a previous 
> document, but couldn't find it quickly.)
> 
>    Multiple Performance Policy Identifier Context Headers MAY be 
> present
>    in the NSH, each carrying an opaque value for a distinct policy 
> that
>    need to be enforced for a flow.  Supplying conflicting policies may
>    complicate the SFP computation and SF instance location.
>    Corresponding rules to detect conflicting policies may be provided 
> as
>    a local policy to the NSH-aware nodes.  When such conflict is
>    detected by an NSH-aware node, the default behavior of the node is 
> to
>    discard the packet and send a notification alarm to a Control
>    Element.
> 
> [It seems like we are providing guidance on the "default behavior"
> of something that is entirely dependent on there being some local 
> policy, which is perhaps an unusual thing to do.  I don't object to 
> it, per se, though.]
> 
> Section 6
> 
> When we recommend logging on exception conditions, we typically also 
> include a note about the risk of DoS due to log spew.

[Med] Added this NEW: 

"Some events are logged locally with notification alerts sent by NSH-aware nodes to a Control Element. These events SHOULD be rate limited. "

> 
> With respect to privacy considerations, whenever we have multiple 
> Subscriber Identifier Context Headers present we are providing the 
> information that thos different (types of) identifiers identify the 
> same subscriber or individual.  This can be used to correlate other 
> observations and track that individual more effectively.

[Med] Fair point. Added this NEW text:

"The presence of multiple Subscriber Identifier Context Headers in the same NSH allows a misbehaving node from within the SFC-enabled domain to bind these identifiers to the same subscriber. This can be used to track  that subscriber more effectively."

> 
> If one was able to spoof a performance policy identification context 
> header one would be in a position to steal (quality of) service, which 
> is related to the "service disruption" attack already discussed in the 
> text, but IMO distinct from it.

[Med] "disruption" is used from an operator standpoint: deliver the service to the appropriate subscriber and appropriate quality level. 

> 
>    trusted ([RFC8300]).  Means to check that only authorized nodes are
>    solicited when a packet is crossing an SFC-enabled domain are out 
> of
>    scope of this document.
> 
> I'm not entirely sure that I understand what "solicited" is being used 
> for, here.  Is it something to do with the source/destination (ouside 
> the SFC domain) of the packet, or the nodes on the path within the SFC 
> domain, or something else?


[Med] We meant that nodes that are "visited"/"invoked" as the packet progresses in the SFP within a domain.

> 
> Section 8.2
> 
> [RFC8459] seems to be unused.
> 

[Med] Used to be cited in previous version. Fixed. 


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.