Re: [Sipbrandy] AD Evaluation of draft-ietf-sipbrandy-osrtp-07

Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com> Fri, 26 April 2019 10:45 UTC

Return-Path: <gonzalo.camarillo@ericsson.com>
X-Original-To: sipbrandy@ietfa.amsl.com
Delivered-To: sipbrandy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 695731203A5 for <sipbrandy@ietfa.amsl.com>; Fri, 26 Apr 2019 03:45:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qUY64R70NozQ for <sipbrandy@ietfa.amsl.com>; Fri, 26 Apr 2019 03:45:42 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCD63120457 for <sipbrandy@ietf.org>; Fri, 26 Apr 2019 03:45:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/relaxed; q=dns/txt; i=@ericsson.com; t=1556275539; x=1558867539; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=3ffcnFeCxHaKY4R8exwShRFWQqgzFAyQaQPyY1mYSFc=; b=f5Hm0jeebdVe1+VnmlMbyQqRG5MCcolIpJNj0lCd+6/E09B2CYGg5VKP/dAcIYzL W+Hqml6YXJBQGLAsSRy8fJq0fbjrIK8GgatEwkBPeMSckO2rrmxe/KKs7TWX0el2 JBFrZR2CBHmoJP7wCoykJr7/cp/a6kpD37F4nRIT8yM=;
X-AuditID: c1b4fb2d-195ff70000001a6d-bb-5cc2e153f7ea
Received: from ESESBMB504.ericsson.se (Unknown_Domain [153.88.183.117]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id 51.17.06765.351E2CC5; Fri, 26 Apr 2019 12:45:39 +0200 (CEST)
Received: from ESESSMR504.ericsson.se (153.88.183.126) by ESESBMB504.ericsson.se (153.88.183.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Fri, 26 Apr 2019 12:45:39 +0200
Received: from ESESBMB503.ericsson.se (153.88.183.170) by ESESSMR504.ericsson.se (153.88.183.126) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Fri, 26 Apr 2019 12:45:39 +0200
Received: from [100.120.234.22] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.186) with Microsoft SMTP Server id 15.1.1713.5 via Frontend Transport; Fri, 26 Apr 2019 12:45:38 +0200
To: Andy Hutton <andyhutton.ietf@gmail.com>, Ben Campbell <ben@nostrum.com>
CC: "sipbrandy@ietf.org" <sipbrandy@ietf.org>, "draft-ietf-sipbrandy-osrtp.all@ietf.org" <draft-ietf-sipbrandy-osrtp.all@ietf.org>, ART ADs <art-ads@ietf.org>
References: <72C42C63-D5C4-403D-A895-429CB2238AC3@nostrum.com> <e6724bd0-1ea0-3014-8836-60dc454c2982@ericsson.com> <CAB7PXwTUXUa1Euar+hXY4EzOqZ0_U-eru=e1ApjTy4a2FCBYJg@mail.gmail.com> <CAB7PXwRSFXcB5zGdNP_zqyKWUJqZAK+bKsxeyWhK6eeogqJ8dw@mail.gmail.com> <A7A08115-5B69-4931-8C89-0EBDF3A76D10@nostrum.com> <c28ee3c0-b91d-3a12-e83b-4d3b727fc908@ericsson.com> <CAB7PXwRtAd1OC6r0AGJZ66km=ei_fq80QYUUuNbZuQGT4HmPkQ@mail.gmail.com> <741719ee-bbc6-adaf-a036-8fdd655e470f@ericsson.com> <CAB7PXwTkkN0905aHREPyoCX0YY1+adr9sbrVnGuPFp-Rgk3ONw@mail.gmail.com> <FBD2D501-6126-4FA0-B9BA-1BC042F529E2@nostrum.com> <CAB7PXwQYWrkhdM9LBiso++axdMyu2p08WG8K59Q1PaYJWbvn_A@mail.gmail.com>
From: Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com>
Openpgp: preference=signencrypt
Autocrypt: addr=Gonzalo.Camarillo@ericsson.com; prefer-encrypt=mutual; keydata= xsBNBEtSyYUBCADL7itybUN0VVtGQuO81AdviJNSo/BIc6xuVUofHlr/U9CbQcSrRSggvTfa 6n5o9t9zAuwp9pp+hQfSzn4/LrEaV2BmEfAFclSl57IhsXDJecw58JqGZrjahIjgU+rmZKPE RqLzubmI3ltEolLb4kkB9Y8FIQBnE1N3O0wHp7BE8VI5pQX24UkRkEtUptmhwnaehURg9atb 1myxbt1nUDEA5PLJNbPeXxPRJ058OEnPtToRinSCJ7BFtD6PoeUWgOL4kKdRbMyswDikiXnN Ntj1VkDQ6yi7pOb2qkviOzKOf/smqm4ovMxUrET7SzKw4icArL+xQUW3ayJyfSju1o5rABEB AAHNJkdvbnphbG8gQ2FtYXJpbGxvIDxnY2FtYXJpbEBnbWFpbC5jb20+wsCBBBMBAgArAhsj BgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAIZAQUCWhwGngUJFGzXmQAKCRDRM1CYcD+HNkjG CACG39D/tNsA5xxSqRtN3JJCTfpj+BWqRckMEpBjBWlOOtb94QY8r9NHRIDwvA5qCVYRqQTI qVyReNw/CkOuaah2rbCdhsng6ZAMzFovXSEnbz+wse4QiKybHvjlJJA9qQiNlne57NVlNvLN LrpZJGmSJlJBBEQRq3Z9Crl2tWFkB6mmoXNnoRej6eVmhFoAo3td5loHo55nqYVZYtAHbXan ggmPI12gUigKf4PuvIISpdokSlkpam02Y61ygtqrlYvNnM+GpbayW2X3ZY5x6bwUwfkRSUCj +xslGaRfJUwr8kUxhVlcLR6qVcjNxWeZf9XKVH86OxEJVUVFsChlDAvHzsBNBEtSyYUBCADB qzP0B7lWge5Hn1648WPWrmUg8r3723XL/zUZe1zyEVsY9VyWhrBmuEy7Xm7wdLt0+BBXWJez 7/wWR9w/63qT+3+W0fe6SDXeZqF+HtYO5QPuu/VYtex0e3TI2w4s53ZM5KQCQF60kTDoK43e 5a6/G2GCKMPpkVKxpIeOiDITiRXq9GV7KHkQpPczqj9ImWp2M9sEIngZRaKILU//TaiWnRGR i6vN/sAvfEuu1fXTwpR6bBdD9wIZgyeSqEgxnioDdyFZYkTFl9G8TuLxNIdpVPzW2M9PKRQs i/kl/Kadsgnd8RtlP7cPoIqLMjmOfGwR8EVbKpmkM1+iKJ+g9F/bABEBAAHCwGUEGAECAA8C GwwFAlocBq4FCRRs16kACgkQ0TNQmHA/hzamwgf/Tnr7/WYnKNmEYvwr/GxhSelVYsBwejkz tCXa4gmVkErgPBEYsUtWAP+jVoYndG74v/3zBPHl4CehE9RnAJ+lpsWjwsn0qPI7sCik3Xqv c44g/RQF9RSI8DckQM0MqLJNazzq4tBi/ZbILWNx2N4LrEzhwoePug3MDn3rCv1Xpr/B60or p1zixtSRKyZo+L7UjttUdJkqxUbC35pBlZlDAL2Dop9He7XwUFofyW1Xvn9xxx0NasnlJX9G 288peTb41bQrs9SqaH1aVLXBTo7S9o+8oB9DLTIIwDQqfxqTWpGIfBhiTm9d7ai9WcFC8jSW zJtc/6luXoGjvUlBzQx0jQ==
Message-ID: <8a1ab85c-0dd3-7db8-57ff-c7e76fffde62@ericsson.com>
Date: Fri, 26 Apr 2019 13:45:38 +0300
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <CAB7PXwQYWrkhdM9LBiso++axdMyu2p08WG8K59Q1PaYJWbvn_A@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprEIsWRmVeSWpSXmKPExsUyM2J7qW7ww0MxBrN3q1tcWreVyWLj08ks FvM7T7Nb3Lh+js1ixbpTTA6sHjtn3WX3WLLkJ5PHrJ1PWAKYo7hsUlJzMstSi/TtErgy7n2e wFKwzq/i5df7TA2M0xy7GDk5JARMJBZ86GTpYuTiEBI4yijx9GQDM4TzjVFix/w1LCBVYM6P 3yVwVc0HljCDJIQF3CWuPzrEBGKLCHhLfHi8HGwUs8AiRomW1hVsEB1rWSWOLroFNopNwEJi y637YDa/gLxE14KrYJMYBe7xSkx4mg9i8wrYSzS9WAxWwyKgKjH/6HxWEFtUIFbi6/TpbBA1 ghInZz4Bq+EUCJTYseASUA0H0GZNifW79EHCzALiEreezGeCsOUlmrfOZob4Rlti85pTjBMY RWchmTQLoXsWku5ZSLoXMLKsYhQtTi0uzk03MtZLLcpMLi7Oz9PLSy3ZxAiMqYNbfuvuYFz9 2vEQowAHoxIP78lLh2KEWBPLiitzDzFKcDArifCqmx6MEeJNSaysSi3Kjy8qzUktPsQozcGi JM4bvXpPjJBAemJJanZqakFqEUyWiYNTqoGR5cTGNa6vTV91+/MrPdNOergmwvBtpmfQzWJ/ 7kmPVk0+YfsviXsK4/aMko+SObkx8T5Wc18/FPpwRC400LSq4FCKYZZCaOkjNlsLy4wfawTm nugNmXY9+cTK+Qr/2b/9C5wUJ9u/sMfmhG8p90wG5599PXMXXV14Jc7jkI1TI8P311zlzjOV WIozEg21mIuKEwEPmKZ8pQIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipbrandy/IRJV7WRzo01P6c1Z7qIVrPPfW9U>
Subject: Re: [Sipbrandy] AD Evaluation of draft-ietf-sipbrandy-osrtp-07
X-BeenThere: sipbrandy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIPBRANDY working group discussion list <sipbrandy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipbrandy>, <mailto:sipbrandy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipbrandy/>
List-Post: <mailto:sipbrandy@ietf.org>
List-Help: <mailto:sipbrandy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipbrandy>, <mailto:sipbrandy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Apr 2019 10:45:47 -0000

Hi Andy,

yes, please, go ahead revise the draft so that Ben's AD review is
addressed. Alexey will take it from there.

Cheers,

Gonzalo

On 25-Apr-19 14:07, Andy Hutton wrote:
> Thanks Ben for suggesting text.
> 
> I would be happy to add the text Ben suggested to the security
> considerations section if that is what is needed to get this done.
> 
> Regards
> Andy
> 
> 
> 
> On Tue, 23 Apr 2019 at 22:25, Ben Campbell <ben@nostrum.com> wrote:
>>
>> (Please keep in mind I am no longer an AD; at this point my concern should be treated like last call feedback.)
>>
>> The issue with SDES is that, while SDES says messages with “a=crypto” SHOULD be protected end-to-end, and that hop-by-hop things such as TLS and IPSec SHOULD NOT be used across with intermediaries, in practice that SHOULD and SHOULD NOT are routinely ignored.
>>
>> I don’t think this requires a huge change. I propose adding a paragraph to the effect of the following before the current last paragraph in section 4:
>>
>> “While OSRTP does not require authentication of the key-agreement mechanism, it does need them to avoid exposing
>> SRTP keys to eavesdroppers, since this could enable passive attacks against SRTP.  Section 8.3 of [RFC4568] requires that any messages that contain SRTP keys be encrypted, and further says that encryption “SHOULD”  provide end-to-end confidentiality protection if intermediaries that could inspect the SDP message are present. At the time of this writing, that “SHOULD” is commonly ignored. Therefore, if OSRTP is used with Security Descriptions, any such intermediaries (e.g., SIP proxies) must be assumed to have access to the SRTP keys.”
>>
>> Thanks!
>>
>> Ben.
>>
>>
>>
>>> On Apr 8, 2019, at 5:47 AM, Andy Hutton <andyhutton.ietf@gmail.com> wrote:
>>>
>>> I looked at this again and I am not convinced that any further changes
>>> to the draft are needed but if someone wants to suggest text then I
>>> can include it in the draft.
>>>
>>> In the case of SDES the security considerations states that an
>>> encrypted signalling channel must still be used so this draft changes
>>> nothing with respect to intermediaries and the SDES (RFC 4568)
>>> security considerations still apply.
>>>
>>> Regards
>>> Andy
>>>
>>> On Tue, 2 Apr 2019 at 14:56, Gonzalo Camarillo
>>> <gonzalo.camarillo@ericsson.com> wrote:
>>>>
>>>> Hi Andy,
>>>>
>>>> Ben's response below indicates that his main substantive comment was not
>>>> addressed in the revision you submitted last week. Could you please look
>>>> into it and get back to Ben? Thanks!
>>>>
>>>>>> With regard to Ben's comment on the relaxing of the authentication
>>>>>> requirement then this is consistent with the Opportunistic
>>>>>> Security RFC 7435 and I added a reference to this as
>>>>>> clarification.
>>>>>
>>>>> If I recall correctly, RFC 7435 does not discuss scenarios with
>>>>> separate signaling and media channels, and how OS applies to each
>>>>> channel. I was looking more for something about the impacts of this
>>>>> “relaxation” specific to these sorts of scenarios with dtls-srtp and
>>>>> sdes, and resulting assurances.
>>>>>
>>>>> For example, dtls-srtp with no authentication does not give you
>>>>> assurances about who you are talking to, but it still allows
>>>>> encryption. SDES without encryption lets an eavesdropper potentially
>>>>> learn the encryption keys, etc. SDES with transport level protection
>>>>> (e.g. SIPS) protects from off-path eavesdroppers, but allows proxies
>>>>> and b2bua’s in the signaling path to learn the encryption keys.
>>>>
>>>>
>>>> Cheers,
>>>>
>>>> Gonzalo
>>>>
>>>> On 02-Apr-19 16:50, Andy Hutton wrote:
>>>>> I believe all Ben's points are addressed in the draft I submitted
>>>>> last week https://tools.ietf.org/html/draft-ietf-sipbrandy-osrtp-08
>>>>>
>>>>> Regards Andy
>>>>>
>>>>> On Tue, 2 Apr 2019 at 12:03, Gonzalo Camarillo
>>>>> <gonzalo.camarillo@ericsson.com> wrote:
>>>>>>
>>>>>> Hi Andy, authors,
>>>>>>
>>>>>> could you please let Alexey when he should expect a new revision of
>>>>>> this draft that addresses Ben's point below?
>>>>>>
>>>>>> Cheers,
>>>>>>
>>>>>> Gonzalo
>>>>>>
>>>>>> On 26-Mar-19 18:10, Ben Campbell wrote:
>>>>>>> (+Alexey, who will take over SIPBRANDY when I step down as AD)
>>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> Thanks for the response. This does not quite address my main
>>>>>>> substantive comment. It does address everything else :-)
>>>>>>>
>>>>>>> Please see comment in line.
>>>>>>>
>>>>>>> Thanks!
>>>>>>>
>>>>>>> Ben.
>>>>>>>
>>>>>>>> On Mar 26, 2019, at 11:58 AM, Andy Hutton
>>>>>>>> <andyhutton.ietf@gmail.com> wrote:
>>>>>>>>
>>>>>>>> I submitted an update in response to Ben's comments -
>>>>>>>> https://tools.ietf.org/html/draft-ietf-sipbrandy-osrtp-08
>>>>>>>>
>>>>>>>> With regard to Ben's comment on the relaxing of the
>>>>>>>> authentication requirement then this is consistent with the
>>>>>>>> Opportunistic Security RFC 7435 and I added a reference to this
>>>>>>>> as clarification.
>>>>>>>
>>>>>>> If I recall correctly, RFC 7435 does not discuss scenarios with
>>>>>>> separate signaling and media channels, and how OS applies to each
>>>>>>> channel. I was looking more for something about the impacts of
>>>>>>> this “relaxation” specific to these sorts of scenarios with
>>>>>>> dtls-srtp and sdes, and resulting assurances.
>>>>>>>
>>>>>>> For example, dtls-srtp with no authentication does not give you
>>>>>>> assurances about who you are talking to, but it still allows
>>>>>>> encryption. SDES without encryption lets an eavesdropper
>>>>>>> potentially learn the encryption keys, etc. SDES with transport
>>>>>>> level protection  (e.g. SIPS) protects from off-path
>>>>>>> eavesdroppers, but allows proxies and b2bua’s in the signaling
>>>>>>> path to learn the encryption keys.
>>>>>>>
>>>>>>>
>>>>>>>>
>>>>>>>> Hopefully we can get this to RFC status now.
>>>>>>>>
>>>>>>>> Regards Andy
>>>>>>>>
>>>>>>>> On Mon, 25 Mar 2019 at 22:26, Andy Hutton
>>>>>>>> <andyhutton.ietf@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>> Sorry about the delay.
>>>>>>>>>
>>>>>>>>> See below.
>>>>>>>>>
>>>>>>>>> I will update the draft.
>>>>>>>>>
>>>>>>>>> Andy
>>>>>>>>>
>>>>>>>>> On Fri, 15 Feb 2019 at 08:46, Gonzalo Camarillo
>>>>>>>>> <gonzalo.camarillo@ericsson.com> wrote:
>>>>>>>>>>
>>>>>>>>>> Thanks for the quick review, Ben!
>>>>>>>>>>
>>>>>>>>>> Authors, please address Ben's comments below.
>>>>>>>>>>
>>>>>>>>>> Cheers,
>>>>>>>>>>
>>>>>>>>>> Gonzalo
>>>>>>>>>>
>>>>>>>>>> On 14-Feb-19 22:46, Ben Campbell wrote:
>>>>>>>>>>> Hi,
>>>>>>>>>>>
>>>>>>>>>>> This is my AD Evaluation of
>>>>>>>>>>> draft-ietf-sipbrandy-osrtp-07.
>>>>>>>>>>>
>>>>>>>>>>> Thank you for a readable and easy to understand
>>>>>>>>>>> document.There is one comment I would like to resolve
>>>>>>>>>>> prior to IETF LC. The others can be resolved along with
>>>>>>>>>>> any last call feedback.
>>>>>>>>>>>
>>>>>>>>>>> *** Please resolve prior to IETF LC ***
>>>>>>>>>>>
>>>>>>>>>>> §4: The relaxation of authentication requirements for
>>>>>>>>>>> DTLS-SRTP and SDES could use some elaboration on why this
>>>>>>>>>>> acceptable. I _think_ the answer is that, since OSRTP
>>>>>>>>>>> doesn’t guaranty authentication, there’s no need for such
>>>>>>>>>>> a guaranty from the signaling channel. Is that correct?
>>>>>>>>>>>
>>>>>>>>>>> OTOH, §1 says "third mode for security between
>>>>>>>>>>> "cleartext” and "comprehensive protection" that allows
>>>>>>>>>>> encryption and authentication to be used if supported…”.
>>>>>>>>>>> That suggests that that authentication is sometimes
>>>>>>>>>>> provided. Is there a distinction between the
>>>>>>>>>>> authenticated case and unauthenticated case that should
>>>>>>>>>>> be mentioned somewhere? (For example, is there a need to
>>>>>>>>>>> indicate the distinction to the user?)
>>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> $1 should I think say "allows encryption and authenticated
>>>>>>>>> media" but I cannot remember why we said the signalling
>>>>>>>>> authentication requirements are relaxed this has been in the
>>>>>>>>> draft from day 1 and I guess it is consistent with the best
>>>>>>>>> effort approach.
>>>>>>>>>
>>>>>>>>> Anyone else want to comment?
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>>> *** Other Substantive Comments ***
>>>>>>>>>>>
>>>>>>>>>>> §2: Please use the new boilerplate from RFC 8174.
>>>>>>>>>
>>>>>>>>> Will do.
>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> §3.1: Please clarify that that the offer can contain more
>>>>>>>>>>> than one key management attribute. This is mentioned in
>>>>>>>>>>> §3.1, but not actually in the section on generating the
>>>>>>>>>>> offer.
>>>>>>>>>
>>>>>>>>> Will do.
>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> *** Editorial Comments ***
>>>>>>>>>>>
>>>>>>>>>>> §3: "As discussed in [RFC7435], this is the
>>>>>>>>>>> "comprehensive protection" for media mode.” s/this/that
>>>>>>>>>
>>>>>>>>> Thanks
>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> §3.4: "meaning that the decision to create an OSRTP type
>>>>>>>>>>> offer or something else should not be influenced” That’s
>>>>>>>>>>> referring to the decision to create a _new_ offer, right?
>>>>>>>>>>> Not the original offer?
>>>>>>>>>
>>>>>>>>> Correct.
>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________ Sipbrandy
>>>>>>>>>>> mailing list Sipbrandy@ietf.org
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sipbrandy
>>>>>>>>>>>
>>>>>>>>>> _______________________________________________ Sipbrandy
>>>>>>>>>> mailing list Sipbrandy@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sipbrandy
>>>>>>>
>>>>>>
>>>>>
>>>>> _______________________________________________ Sipbrandy mailing
>>>>> list Sipbrandy@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sipbrandy
>>>>>
>>