Re: [Sidrops] I-D Action: draft-sidrops-bgpsec-validation-signaling-05.txt

"Borchert, Oliver (Fed)" <oliver.borchert@nist.gov> Thu, 15 October 2020 19:14 UTC

Return-Path: <oliver.borchert@nist.gov>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56DA13A13F7 for <sidrops@ietfa.amsl.com>; Thu, 15 Oct 2020 12:14:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.297
X-Spam-Level:
X-Spam-Status: No, score=-4.297 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.2, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.998, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nist.gov
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YegyovjkxfZW for <sidrops@ietfa.amsl.com>; Thu, 15 Oct 2020 12:14:38 -0700 (PDT)
Received: from GCC02-BL0-obe.outbound.protection.outlook.com (mail-bl2gcc02on2116.outbound.protection.outlook.com [40.107.89.116]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E8513A12FD for <sidrops@ietf.org>; Thu, 15 Oct 2020 12:14:26 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g/1EIKHEQFb2V0sZDW5ZTqYkdlxf/fwIbAHQ4J+SDXCqYmZcv0enIHwK3ry58HVilyCQNX+vwuZ4opdqkZJ6yLyWuO53Z/AthDGhdvN9QRA/6e2ySVGJI5TVEqUjufKKXwj/YuY70J/okZtqGMwtsK+tOl7nZloVXDroZ0jA3f0OQ5Q77Kn2lFS6cH5RYoc2+gE5LbrpzSOZVdNQVCkMVLrk4Qm/7XhIUmwa7otbLjhsLCzo6fL6Kg/nJnnPMBCW1cZyZvgki5CkOKKQktLYyIXqnT4KXx9/bJo2kpXKyOEfq/JdCAESSXDFqf0N6On+/+TKLRvE1Ji0DtGVTT61KA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MLROwjJ+bS4VCUjFSfTfujAgaQaZOL+J0vQrYmG4wdM=; b=XvUOWcHfRBbchB9pa7xO4rtQLEdUeuwqy4xY7vMccVmZnzGN8X3VH4GQf3FjGst6mjZ1B3tPammvgpyBE0PmhVGFgD+AvVbYmPgnH2gXOOI9Z4klIG+xEna3E+P1s0qX8JSGtCIM3lznw5pTiTLrgd2L6sLHxfqSWd3KGSuhTKY1szcI0lPVhzIDIS3ArArbCeWe+cnIhP1+MNtS0uzbbHr7PMAF7s6hPn4oQ1BHTkF4R8MQ1q8Ja7YolG2qq1/Pn3iwtBCCQVvLprc7w2CNvr5UL8Vo3zyUF1/q0gtF+oyNgrsnc0ajFi/i3+/Y6drUQMVZa655wVB/R8d9oDR1Bw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nist.gov; dmarc=pass action=none header.from=nist.gov; dkim=pass header.d=nist.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MLROwjJ+bS4VCUjFSfTfujAgaQaZOL+J0vQrYmG4wdM=; b=RVQREDbg0WVOxFlIasFO392BPkSvZIO9fpOOp0q2C8R3JChVBb9nYkdFJl6v3tHYsIgReSDG5N1ZEBFLL7sWOQbYA1AczGVT1loe48SQAy+x1E1Z6Or8pkWE6podozqYlH5r2icbxiUj/qDzOuicuYGhY0rSE+LV7mjrdGKjzDA=
Received: from SA0PR09MB6636.namprd09.prod.outlook.com (2603:10b6:806:ac::19) by SA9PR09MB5280.namprd09.prod.outlook.com (2603:10b6:806:45::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3477.21; Thu, 15 Oct 2020 19:14:21 +0000
Received: from SA0PR09MB6636.namprd09.prod.outlook.com ([fe80::d1b8:7820:b990:b39d]) by SA0PR09MB6636.namprd09.prod.outlook.com ([fe80::d1b8:7820:b990:b39d%4]) with mapi id 15.20.3477.021; Thu, 15 Oct 2020 19:14:21 +0000
From: "Borchert, Oliver (Fed)" <oliver.borchert@nist.gov>
To: Job Snijders <job@ntt.net>, "sidrops@ietf.org" <sidrops@ietf.org>
CC: "Borchert, Oliver (Fed)" <oliver.borchert@nist.gov>, "Montgomery, Douglas C. (Fed)" <dougm@nist.gov>
Thread-Topic: [Sidrops] I-D Action: draft-sidrops-bgpsec-validation-signaling-05.txt
Thread-Index: AQHWk6uXSmv2SdqdjUWDbieQ3efDvqmBP5gAgBekxwA=
Date: Thu, 15 Oct 2020 19:14:21 +0000
Message-ID: <A77802CA-8914-469C-8BE7-904DA7E235FD@nist.gov>
References: <160108675080.9506.12588124331364773763@ietfa.amsl.com> <20200930141036.GD13264@bench.sobornost.net>
In-Reply-To: <20200930141036.GD13264@bench.sobornost.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.41.20091302
authentication-results: ntt.net; dkim=none (message not signed) header.d=none;ntt.net; dmarc=none action=none header.from=nist.gov;
x-originating-ip: [2610:20:6005:223::d8]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 0f3d5f83-9d34-4da1-7dd7-08d8713e855e
x-ms-traffictypediagnostic: SA9PR09MB5280:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <SA9PR09MB528086DB37C89DFF9D4C92F198020@SA9PR09MB5280.namprd09.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 0FSNtOmeT9e5nDmN23NFo4Sgy0+zC6Y6sEpSifczvJQ4Z3QNRZ37X0l//dSGIsMqNIFEF5eENpc13ce29JQCfFWva3vt84hclwfkSM3aRBbLzLqIyAaoaLKXjMN9z4eNC717jVQlq+qNTyYmu3ibLi3crona21lqrmEcAQnB/Xhv60iTfrSACYdNG01q5a60jo64U9vUrVjQ+5VnLechplh2znv6bUkIww9X09C7x+UqXj1JtAhLUdovWO5w5+XeLKCnn/IOGo919YrojM9QN2A4GUZWjMGmyobxz0tpMnef9c/P5GyYMmix6O8p4Nz6Cdulc5iA8wY3atABU7uX4Xal86dhj7nxGKjdfRSOLV9HIYmsfvwDzj2fBBYk3ZPK4uf24NCjMhgyU5UBXxc7cg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SA0PR09MB6636.namprd09.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(366004)(346002)(376002)(396003)(136003)(45080400002)(186003)(66946007)(8676002)(76116006)(91956017)(66556008)(6506007)(107886003)(66446008)(478600001)(64756008)(66476007)(4326008)(6512007)(966005)(71200400001)(2906002)(33656002)(86362001)(8936002)(83380400001)(30864003)(36756003)(54906003)(110136005)(316002)(66574015)(5660300002)(2616005)(6486002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <D293535D59F0CF4FA4F505E1E9F115C8@namprd09.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA0PR09MB6636.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0f3d5f83-9d34-4da1-7dd7-08d8713e855e
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Oct 2020 19:14:21.1104 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tZVCtgWInEmSACQWEfUPF3/Xb+CVlH60l972I+f0WfPknBoVAHcbBu/ss0m3a03foWxxqxiNKDmvdo6B1E4FuA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA9PR09MB5280
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/LGS9ltrTFM9NXl86GLCcSMGSOgE>
Subject: Re: [Sidrops] I-D Action: draft-sidrops-bgpsec-validation-signaling-05.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Oct 2020 19:14:47 -0000

Hi Job,

I'm sorry for my late reply, my emailer was hiding this email from me and I just found it.

I do not believe there is a need to change the title to specifically include "Internal BGP".
Within the latest changes, we specifically aligned the draft to follow the signaling as 
specified within RFC 4360.  As you know, RFC 4360 does govern the boundaries in which 
non-transitive attributes can be used and we referred to RFC 4360 where ever necessary.

In fact, upon your request during 108, we modified the draft in such that it goes one step 
further by limiting the signaling of validation state to only values that were locally computed 
by the sending BGP router itself.  That is, at the router level, the attribute is non-transitive, even in the case of iBGP.

Therefore I do not see any need for further modification. 

Thanks,
Oliver

-----------------------------------------------
Oliver Borchert, Computer Scientist
National Institute of Standards and Technology
(Office) +1.301.975.4856


On 9/30/20, 10:10 AM, "Sidrops on behalf of Job Snijders" <sidrops-bounces@ietf.org on behalf of job@ntt.net> wrote:

    Dear all,

    I have reviewed the document and would like to offer some feedback.

    The title probably should read "BGPsec Validation State Signaling via Internal BGP" 

    Furthermore the document probably benefits replacing "BGP neighbor" with
    "IBGP neighbor", similarly "BGP peer" and "peer" should be replaced with
    "IBGP neighbor" and "neighbor" for more consistent reading. Emphasis on
    IBGP is important as this document outlines non-transitive extended
    communities. (Let's park discussion about EBGP vs CONFED vs IBGP for the
    sake of progressing conversation about the substance of this draft)

    Internal inconsistency in draft-sidrops-bgpsec-validation-signaling
    -------------------------------------------------------------------

    RFC 8205 section 5.1 states "BGPsec validation need only be performed at
    the eBGP edge.", and also "a BGPsec speaker MAY temporarily defer
    validation of incoming UPDATE messages." 

    With the above in mind, in section 4 of draft-sidrops-bgpsec-validation-signaling
    the first paragraph references an EBGP speaker that received a BGPsec
    UPDATE from a neighbor outside the administrative domain. If one follows
    the logical outcomes of temporarily deferment of validation, the EBGP
    node was unable to perform BGPsec path validation, thus MUST set
    validation state 'Unverified'. Consequently the BGP UPDATE is
    distributed to IBGP speakers, which all have to perform full BGPsec path
    validation in order to confirm that the validation state is indeed
    "Unverified". One might as well not attach any community at all because
    speaker A doesn't signal of note - because it doesn't know.

    If the EBGP edge device that (temporarily or forever) is unable to do
    BGPsec validation, it will for the duration of that event be unable to
    set the appropriate community, as it cannot validate. Whatever
    communities it sets, other nodes in the network still need to verify
    whether or not the community is true. As such, the communities are
    merely overhead.

    Imagine a two node network (ascii art, mind your MUA):

    				 +--------+
    				 |AS 65123|
    				 +----+---+
    					  |
    			   +------+----+
    	+--EBGP1---+ AS 650001 +----------------EBGP2------+
    	|          +-----------+                           |
    	|                                                  |
    	|        +-----------------------------------+     |
    	|        | AS 65666 running draft-signaling  |     |
    	|        |                                   |     |
    	|        | +---------------+                 |     |
    	+----------+ BGP speaker A |****IBGP         |     |
    			 | +---------------+     *           |     |
    			 |                       *           |     |
    			 |               +-------*-------+   |     |
    			 |               | BGP Speaker B +---------+
    			 |               +---------------+   |
    			 |                                   |
    			 +-----------------------------------+

    If BGP speaker A cannot perform BGPsec validation on EBGP1, it can't
    confirm whether _65001_65123$ is a valid BGPSec_PATH or not. But
    whatever conclusion speaker A draws, speaker B receives the
    _650001_65123$ path via its own EBGP2 session with 650001. Whatever
    validation (and signaling) happens via the IBGP session, it does not in
    any way positively impact speaker B's decisions, as speaker B can't use
    IBGP information as input into its decision making process regarding the
    BGP UPDATE received via EBGP2. Draft-sidrops-bgpsec-validation-signaling
    is not a replacement or alternative to the RPKI-To-Router protocol.

    If the meaning of the 'unverified' state is 'maybe I will do validation
    later, maybe not', I don't see any practical application.

    If the meaning of 'valid' is to be taken at face value, again, there is
    no value in a standardized community, see RFC 3514.

    If the meaning of 'invalid' is that following BGPsec path validation the
    route is deemed invalid, then why was it propagated in the first place?

    If Speaker B is not able to do Path Validation, whatever 'invalid'
    signal it receives on its IBGP session does not and cannot override or
    influence what was received via EBGP2.

    The text in the abstract and introduction about 'temporarily deferment of
    validation' should probably be removed as it is hard to see how in the
    situation of temporarily deferment the existence of these communities
    makes sense.

    Undeployability
    ---------------

    An architectural choice to use BGP communities for any purpose
    oftentimes stems from an operator's ability to deploy 'a new thing' in a
    network where (part of) the nodes have not yet been upgraded. Good
    useful examples of this mechanism are GRACEFUL_SHUTDOWN and NO_EXPORT.

    The document states in section 3 "If the router supports the extension
    as defined in this document" ... which implies that all nodes in an
    administrative domain must be upgraded, which in turn somewhat nullifies
    the justification to use communities in the first place. This doesn't
    allow a brownfield upgrade!

    Section 3.1 "Error Handling at Peers" reads as a simple paragraph, but
    is brittle and error-prone to implement in routing policy. Most network
    operators are accustomed to implementing a 'test & branch' procedure by
    positive community matching and then taking some action. RFC 1997
    defines communities as "A community is a group of destinations which
    share some common property." The implication is that when multiple
    communities are attached to a route, the route simply has multiple
    properties.

    However, this document outlines a mechanism where specific combinations
    of communities are invalid input: "(0x43,TBD,0) ∩ (0x43,TBD,1)", or
    "(0x43,TBD,1) ∩ (0x43,TBD,2)", or "(0x43,TBD,2) ∩ (0x43,TBD,0)". In
    currently available commercial|free-of-the-shelf BGP implementations
    implementing adequate error handling is error-prone. RFC 8097 shares
    this weakness.

    The Introduction proposes that a reduction of path validation processing
    load can be achieved, however Section 4 states that if there is a
    discrepancy between the locally computed validation state and the
    community, the locally computed state takes precedence. Thus, no load
    processing reduction can be achieved because a BGPsec capable node must
    compute the validation state before it can compare it to the community.

    Not analogous to RFC 8097
    -------------------------

    To many this draft may appear as 'for sure, we need something similar
    for bgpsec as we have for route origin validation' - but I think no such
    equivalence exists, or needs to exist.

    RFC 8097 defines a set of BGP communities which can optionally be
    associated with a prefix *after* the Origin Validation procedure (RFC
    6811) *successfully* is executed. This in contrast to
    draft-bgpsec-validation-signaling, where a node is *unable* to path
    validation, thus can never set the appropriate communities. RFC 8097
    does not describe a situation where Origin Validation is temporarily
    deferred.

    Reject don't tag (do, don't talk about doing it)
    ------------------------------------------------

    If a route is considered invalid (for whatever reason, beauty is in the
    eye of the beholder), the route should be rejected. Merely tagging an
    invalid route with a specific community and propagating it further, is a
    useless excercise. Such designs hampers deployment of actual security
    measures. If an operator wants to tag invalid routes for analytical
    purposes, they can easily do so and can choose from milions of values
    using any of the flavors of communities that are available. If you *are*
    propagating an invalid route, you are propagating an invalid route - in
    which case it does not matter whatever communities are attached to it.

    Conclusion
    ----------

    At this point in time I don't think this draft can proceed to
    publication, from the document itself it is not clear to me what
    benefits can be achieved and how this benefits Internet operations. The
    draft requires new code on devices in addition to what a BGPsec capable
    implementation would require. And in today's world there aren't
    off-the-shelf BGPsec implementations to start with, so piling on
    additional code requirements is too early in the innovation cycle
    anyhow. Using communities is no substitute for BGPsec validation or for
    RTR, this document may subtly lead people to believe otherwise.

    It is possible I misunderstood things, I look forward to feedback from
    the group.

    Kind regards,

    Job

    ps. nitpick: one of the author's company names seems misspelled.

    On Fri, Sep 25, 2020 at 07:19:10PM -0700, internet-drafts@ietf.org wrote:
    > 
    > A New Internet-Draft is available from the on-line Internet-Drafts directories.
    > This draft is a work item of the SIDR Operations WG of the IETF.
    > 
    >         Title           : BGPsec Validation State Signaling
    >         Authors         : Oliver Borchert
    >                           Doug Montgomery
    >                           Daniel Kopp
    > 	Filename        : draft-sidrops-bgpsec-validation-signaling-05.txt
    > 	Pages           : 8
    > 	Date            : 2020-09-25
    > 
    > Abstract:
    >    This document defines a new BGP non-transitive extended community to
    >    carry the BGPsec path validation state.  BGP speakers that receive
    >    this community string can use the embedded BGPsec validation state in
    >    conjunction with configured local policies to influence their
    >    decision process.  The ability to accept and act on BGPsec path
    >    validation state from a neighbor allows for a reduction of path
    >    validation processing load and/or increased resilience in the event
    >    that a router is temporarily unable to perform local path validation.
    > 
    > 
    > The IETF datatracker status page for this draft is:
    > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-sidrops-bgpsec-validation-signaling%2F&amp;data=02%7C01%7Coliver.borchert%40nist.gov%7C912e66dc7cdc4e408fd908d8654aa58a%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C1%7C637370718565010135&amp;sdata=j%2Foh6jiZlwSn1Mct6aBZUfX7F7IWgfbLcv89c5gvsJ0%3D&amp;reserved=0
    > 
    > There are also htmlized versions available at:
    > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-sidrops-bgpsec-validation-signaling-05&amp;data=02%7C01%7Coliver.borchert%40nist.gov%7C912e66dc7cdc4e408fd908d8654aa58a%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C1%7C637370718565010135&amp;sdata=3xIMx3oHQ19n9ew7MBgoXvhTUkWm%2BxAGxqVtt%2BY3rR8%3D&amp;reserved=0
    > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-sidrops-bgpsec-validation-signaling-05&amp;data=02%7C01%7Coliver.borchert%40nist.gov%7C912e66dc7cdc4e408fd908d8654aa58a%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C1%7C637370718565020091&amp;sdata=c4JC9l9ljT0k2pO%2BXVDtNtcRPxLljbH5Xe8dMsO3wcE%3D&amp;reserved=0
    > 
    > A diff from the previous version is available at:
    > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-sidrops-bgpsec-validation-signaling-05&amp;data=02%7C01%7Coliver.borchert%40nist.gov%7C912e66dc7cdc4e408fd908d8654aa58a%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C1%7C637370718565020091&amp;sdata=d4zUvQ%2FqIzT5rFJrGYQA40lNdw3GHfeWXbPGWXUaKEM%3D&amp;reserved=0
    > 
    > 
    > Please note that it may take a couple of minutes from the time of submission
    > until the htmlized version and diff are available at tools.ietf.org.
    > 
    > Internet-Drafts are also available by anonymous FTP at:
    > https://gcc02.safelinks.protection.outlook.com/?url=ftp%3A%2F%2Fftp.ietf.org%2Finternet-drafts%2F&amp;data=02%7C01%7Coliver.borchert%40nist.gov%7C912e66dc7cdc4e408fd908d8654aa58a%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C1%7C637370718565020091&amp;sdata=bH0U1QIrlyWFsQ76zz%2FNBMlCNK18geKnrDIAAIyFUOU%3D&amp;reserved=0
    > 
    > 
    > _______________________________________________
    > Sidrops mailing list
    > Sidrops@ietf.org
    > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsidrops&amp;data=02%7C01%7Coliver.borchert%40nist.gov%7C912e66dc7cdc4e408fd908d8654aa58a%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C1%7C637370718565020091&amp;sdata=YUjNAzORi4NTfdI2bVvD3wzEqGZ7F%2BtzhmfRxRPKEI4%3D&amp;reserved=0

    _______________________________________________
    Sidrops mailing list
    Sidrops@ietf.org
    https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsidrops&amp;data=02%7C01%7Coliver.borchert%40nist.gov%7C912e66dc7cdc4e408fd908d8654aa58a%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C1%7C637370718565020091&amp;sdata=YUjNAzORi4NTfdI2bVvD3wzEqGZ7F%2BtzhmfRxRPKEI4%3D&amp;reserved=0