Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE: How do we plan to solve the hash-then-sign paradigm in Dilithium, Falcon and Sphincs+?
Mike Ounsworth <Mike.Ounsworth@entrust.com> Wed, 14 December 2022 15:56 UTC
Return-Path: <Mike.Ounsworth@entrust.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50E0BC14CE3F; Wed, 14 Dec 2022 07:56:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.995
X-Spam-Level:
X-Spam-Status: No, score=-6.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=entrust.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bMZ8M6QCS252; Wed, 14 Dec 2022 07:56:47 -0800 (PST)
Received: from mx07-0015a003.pphosted.com (mx07-0015a003.pphosted.com [185.132.183.227]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F578C1522B0; Wed, 14 Dec 2022 07:56:45 -0800 (PST)
Received: from pps.filterd (m0242864.ppops.net [127.0.0.1]) by mx08-0015a003.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2BEEZSXX030262; Wed, 14 Dec 2022 09:56:43 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=entrust.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=mail1; bh=6r9V1LS7d5zQPRARCveo0Fs//XsD/cQSWM5wTnNedOY=; b=knpXka9UV9zHAD1TjgslSDVOadamFKf8Goygxg4xsNgW3HsSUynqkEtczmiE6TmWULsI iAPhH2gJBxOy5BxViqvzZih0VQA0n7CDAcbFMf0SmE1k9THWNqXyWrnXAn3rmRQ9QTRj 0BzIF7bxA4lCMrTXwL8a5ZIrycTsiNcjgVZTepW8VTsEM9s8fBgGgpnq8eD2fTxU6p0e GzybFiIvkpg6/ffLo3lFpJpmwEdF4XrZVBfThbPT3XKbzpi8W+6t5D+5LNOYbDKYKmTn YfjWlNT5zRwoudzh8deADX/Ggf1PmdliGvQllVjTwmaA341UuY3c62lIdylQwQSClWXJ fg==
Received: from nam12-bn8-obe.outbound.protection.outlook.com (mail-bn8nam12lp2177.outbound.protection.outlook.com [104.47.55.177]) by mx08-0015a003.pphosted.com (PPS) with ESMTPS id 3mf6r82e2q-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 14 Dec 2022 09:56:43 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lnQ82c3/5cxtvSQOei+C2g2Zavb2FJQPORVzdfvtEpMlMmYeY13PVOXFQ6lmV1hILcfoloQRQF+ViyhohQYOEexgddV9N3d1A4c1VnAd8/mOaiXhpIEVxZoide5FhWGkLKP1+Unl3ov9MxAWnj3kvx7xPf22dok5k30RBpjAf856DSOBsVbB7917sLArvJ8jYs9r4+Ung+anXJzxe/CGns+aFOSZOyvUSh9tkLh622HFRzJ0Z73UTdkneREwAD/nOpTMfJZ+6L2Aw/V/69dT0zvpRrpnfJN6JQfTP22mphO63doaeg2fMPtmGOM0PmasIBy3S5PuFLhItCMrIc7Jsw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6r9V1LS7d5zQPRARCveo0Fs//XsD/cQSWM5wTnNedOY=; b=YPq3BRaHauyc6HMwUVO5yjtto51L4WHtdSV3orVEDogTEtmnI7Cm1m7BL0QstBAjGggkrl3O7FUS7X7ksKSqK5S1gXYgyRfSrxbgfKVLyg66V3r4MosouE5M4LvkWmghx1X0JIdQBTN4UKFZY4snO0lmoayALY8NQn/5hQ7rZP61hwKdZkIMR+/SqImjakmlC5BBfEseOJVe04uNJuHai7KfA670bvSJuvm2jGdhrLFOgSaDA9R7+RNqm8YVNA6h7TWB1PH0KYdLomfRNwzRIqaINSxR5qiMLf209WKSS4TpndUGjlrHCVdMu74OevPxJuEla0gKhLiiXBkYC6BiwQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=entrust.com; dmarc=pass action=none header.from=entrust.com; dkim=pass header.d=entrust.com; arc=none
Received: from CH0PR11MB5739.namprd11.prod.outlook.com (2603:10b6:610:100::20) by SJ0PR11MB4798.namprd11.prod.outlook.com (2603:10b6:a03:2d5::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5880.19; Wed, 14 Dec 2022 15:56:39 +0000
Received: from CH0PR11MB5739.namprd11.prod.outlook.com ([fe80::a95:6d:ab71:f8e1]) by CH0PR11MB5739.namprd11.prod.outlook.com ([fe80::a95:6d:ab71:f8e1%9]) with mapi id 15.20.5880.019; Wed, 14 Dec 2022 15:56:38 +0000
From: Mike Ounsworth <Mike.Ounsworth@entrust.com>
To: "Kampanakis, Panos" <kpanos=40amazon.com@dmarc.ietf.org>, John Gray <John.Gray=40entrust.com@dmarc.ietf.org>, "spasm@ietf.org" <spasm@ietf.org>
Thread-Topic: [EXTERNAL] Re: [lamps] [UNVERIFIED SENDER] RE: How do we plan to solve the hash-then-sign paradigm in Dilithium, Falcon and Sphincs+?
Thread-Index: AQHZDm7j1jgNxF3LwkqPA4HzuJcn6q5tixvA
Date: Wed, 14 Dec 2022 15:56:38 +0000
Message-ID: <CH0PR11MB57394D97E1CCA3F3F08C3CDE9FE09@CH0PR11MB5739.namprd11.prod.outlook.com>
References: <DM6PR11MB2585810643D7CC4DB76F55A1EAE29@DM6PR11MB2585.namprd11.prod.outlook.com> <373950f4f7d44c03ac6bece0e8a53ba1@amazon.com> <DM6PR11MB2585CF94E666240C8B62B031EAE29@DM6PR11MB2585.namprd11.prod.outlook.com> <4d0aed52857a4e009db0f10b978522fd@amazon.com>
In-Reply-To: <4d0aed52857a4e009db0f10b978522fd@amazon.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH0PR11MB5739:EE_|SJ0PR11MB4798:EE_
x-ms-office365-filtering-correlation-id: 17a09be9-aab9-477f-68ac-08daddebc93a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR11MB5739.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(346002)(366004)(136003)(39860400002)(396003)(376002)(451199015)(33656002)(64756008)(86362001)(2906002)(66946007)(83380400001)(66476007)(55016003)(122000001)(38070700005)(110136005)(71200400001)(6506007)(53546011)(478600001)(26005)(966005)(186003)(7696005)(9686003)(5660300002)(66446008)(38100700002)(52536014)(8676002)(41300700001)(66556008)(76116006)(8936002)(166002)(316002)(66899015); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH0PR11MB57394D97E1CCA3F3F08C3CDE9FE09CH0PR11MB5739namp_"
MIME-Version: 1.0
X-OriginatorOrg: entrust.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR11MB5739.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 17a09be9-aab9-477f-68ac-08daddebc93a
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Dec 2022 15:56:38.9135 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f46cf439-27ef-4acf-a800-15072bb7ddc1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ZKcLRU7gLjEQW4zuzJRUPPVqh5Hn3H+Ub0oDDPwIrNdirlA7CqUj7JPzsCN4U5An6PutVBwudlCa1RuuKhFBkNH12m7Wfl9itUiGDGDjUUI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB4798
X-Proofpoint-GUID: wp-DxQ76xabjfYX-Mb3RzB4skYrSNImZ
X-Proofpoint-ORIG-GUID: wp-DxQ76xabjfYX-Mb3RzB4skYrSNImZ
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-12-14_07,2022-12-14_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 mlxscore=0 phishscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 bulkscore=0 priorityscore=1501 clxscore=1015 lowpriorityscore=0 suspectscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2212140127
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/l6vSGAP9qseSHpdt8ZN-zdibMiY>
Subject: Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE: How do we plan to solve the hash-then-sign paradigm in Dilithium, Falcon and Sphincs+?
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Dec 2022 15:56:51 -0000
> I am saying this is not necessary imo because it will not get used like PrehashEdDSA did not. I'm not sure that you can make "It turned out that nobody used it" type arguments based on EdDSA because has not (yet) been adopted into any of the hard cases. It's not FIPS-approved. We don't have WebPKIs at scale on EdDSA (ex.: Let's Encrypt is still rooted in ECDSA P-384). I can't imagine any PIV card or ePassport CAs are using EdDSA. So I think that pointing at something that hasn't yet had to deal with the hard cases, and say "Look, they didn't have any problems!" --- Mike Ounsworth From: Spasm <spasm-bounces@ietf.org> On Behalf Of Kampanakis, Panos Sent: December 12, 2022 3:13 PM To: John Gray <John.Gray=40entrust.com@dmarc.ietf.org>; spasm@ietf.org Subject: [EXTERNAL] Re: [lamps] [UNVERIFIED SENDER] RE: How do we plan to solve the hash-then-sign paradigm in Dilithium, Falcon and Sphincs+? WARNING: This email originated outside of Entrust. DO NOT CLICK links or attachments unless you trust the sender and know the content is safe. ________________________________ > The easiest solution seems to define a prehash version of the PQ algorithms, but if that is not preferred, we are open to other solutions. I am saying this is not necessary imo because it will not get used like PrehashEdDSA did not. TLS, IKE, SSH, X.509, CMS all use PureEdDSA. Also I am not sure OCSP or CRLs have an issue here because the message to be signed/verified is available as a whole to both the signer and the verifier. PKCS#11 includes an incremental API. The CKM_ECDSA_SHA256 mechanism is used with the incremental API which allows the signer/verifier to take the message piece by piece. So PKCS##11 could define a mechanism like CKM_FALCON_SHA3-512 which prehashes the message and it could have CKM_PUREFALCON mechanism which does not. Or it could do the same thing with one mechanism CKM_FALCON which based on the input parameter can prehash or not. This is what PKCS#11 has today for EdDSA. It is the CKM_EDDSA mechanism which takes optional CK_EDDSA_PARAMS. So, LAMPS does not need to specify anything in this case. PKCS#11 can take care of it like they did with EdDSA. From: John Gray <John.Gray=40entrust.com@dmarc.ietf.org<mailto:John.Gray=40entrust.com@dmarc.ietf.org>> Sent: Monday, December 12, 2022 3:29 PM To: Kampanakis, Panos <kpanos@amazon.com<mailto:kpanos@amazon.com>>; spasm@ietf.org<mailto:spasm@ietf.org> Subject: [EXTERNAL] [UNVERIFIED SENDER] RE: [lamps] How do we plan to solve the hash-then-sign paradigm in Dilithium, Falcon and Sphincs+? CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. Thanks for the reply Panos, I am a bit confused by your reply. On one hand you say we need to use pre-hashing for use-cases like the PKCS#11 big message (and also the use-cases I mention in my previous email). EdDSA had a similar issue and defined a HashEdDSA to handle that case. You suggest we should follow that case, which sound great, and I agree. However, then you say lamps should only specify and use the pure versions of signatures. Are you suggesting hash versions of the PQ algorithms be defined somewhere else, or do you mean we just digest when needed for the handful of use-cases that need it and not worry about defining hash versions of the algorithms? PKCS#11 as an API could require pre-hashing, but what if PKCS#11 is not being used? Perhaps an information best practices document for these types of use-cases needs to be written? We don't want to cause interop issues. For example, if a CRL is signed using a digest of the CRL verses the full message using a PQ signature, you have two different signature outputs. How would an end-entity verifier know which method was used? Try one and if it fails, try the other? That doesn't seem good. Another approach would be to update 5280 to say CRL signing should be over a digest of the data to be signed. Then at least there would be no ambiguity. I am not saying that should be done either, I would just like there to be no ambiguity for the verifier. The easiest solution seems to define a prehash version of the PQ algorithms, but if that is not preferred, we are open to other solutions. Cheers, John Gray Entrust From: Kampanakis, Panos <kpanos=40amazon.com@dmarc.ietf.org<mailto:kpanos=40amazon.com@dmarc.ietf.org>> Sent: Monday, December 12, 2022 3:01 PM To: John Gray <John.Gray@entrust.com<mailto:John.Gray@entrust.com>>; spasm@ietf.org<mailto:spasm@ietf.org> Subject: [EXTERNAL] RE: [lamps] How do we plan to solve the hash-then-sign paradigm in Dilithium, Falcon and Sphincs+? WARNING: This email originated outside of Entrust. DO NOT CLICK links or attachments unless you trust the sender and know the content is safe. ________________________________ Hi John, As discussed before, this existed with EdDSA which ended up standardizing Pure and Prehash versions. In the end, only Prehash ended up getting used almost everywhere. So, I would suggest to follow the same logic as with PureEdDSA https://www.rfc-editor.org/rfc/rfc8410<https://urldefense.com/v3/__https:/www.rfc-editor.org/rfc/rfc8410__;!!FJ-Y8qCqXTj2!ZOQNbCxQcFausvZgqh55FDqgCowunlVQ0LFH2ud86mrhI8aNOdinzUxjQG9ihRE13qfLnu0_G8mocpHh6qiqHmSv72u2pnGE$> [...] EdDSA has defined two modes: the PureEdDSA mode without prehashing and the HashEdDSA mode with prehashing. The convention used for identifying the algorithm/curve combinations is to use "Ed25519" and "Ed448" for the PureEdDSA mode. This document does not provide the conventions needed for the prehash versions of the signature algorithm. The only case where it breaks (that I am aware of) is in PKCS#11 with big messages (incremental API) with Falcon and SPHINCS+ (not Dilithium). In these cases the PKCS#11 spec will need to digest before signing which is something they already specified for EdDSA (and the incremental API). So, I don't think LAMPS should specify any Prehash versions. Imo, LAMPS should specify and use only the Pure versions of the PQ signatures in X.509, CRLs, CMS etc. From: Spasm <spasm-bounces@ietf.org<mailto:spasm-bounces@ietf.org>> On Behalf Of John Gray Sent: Monday, December 12, 2022 12:23 PM To: spasm@ietf.org<mailto:spasm@ietf.org> Subject: [EXTERNAL] [lamps] How do we plan to solve the hash-then-sign paradigm in Dilithium, Falcon and Sphincs+? CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. We are working on making transition plans from existing signatures to the PQ candidates, and are wondering how lamps / X509 plans to address the pre-hashing of data before signatures (also known as hash-then-sign). The Dilithium, Falcon and Sphincs+ drafts do not have a signature mode where the toBeSigned message is first hashed, and then signed. Many PKI systems today actually rely on being able to hash (aka 1-way compress) a message that will be sent over a network to an HSM device for signing. Some use cases: Signing CRL (especially large combined CRL's): The CA's that sign CRL's today would typically send a hash (32-bytes for SHA-256 for example) to an HSM for signing. The network bandwidth required is therefore reduced from x Megabytes to 32-bytes. With Dilithium, Sphincs+ or Falcon the entire message will have to be sent (unless a pre-hash mode of Signature operation is added to Dilithium, Sphincs+ or Falcon). OCSP signing: OCSP response are small, but instead of signing thousands to millions of 32-byte hashes, it might be 1000 or more bytes each, which again magnifies the network requirement by many times. With larger signatures due to PQ algorithms, this will be magnified even more. CSR Signing: A local USB token device or HSM would need to sign the full CSR. Other use-cases? We know many protocols like CMS include pre-hashing in the protocol, so that resolves the issue because the digest is taken as part of the protocol. However, for all the cases which are not part of a protocol this will be another hurdle to hinder the transition to Post Quantum for many existing applications in production today. Is there anyone working to solve this issue? The simplest solution would seem to be to have signatures defined for Dilithium, Falcon and Sphincs+ (and any future PQ selections) which pre-hash. I know there has already been discussions on this mailing list in this regard. I know there was much discussion on why it shouldn't be done because it reduces the security to the collision resistance of the chosen hash function, or for other reasons, but that doesn't provide a solution. If we accept the reduction of the message to the size of a hash for protocols like CMS, and non-protocol use-cases today (RSA and EC), why is it not acceptable to pre-hash for these use-cases with Dilithium, Falcon and Sphincs+? There must be a practical solution otherwise it will likely delay adoption of these new algorithms in many environments which could be an even greater security risk. Suggestions? John Gray Entrust Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.
- [lamps] How do we plan to solve the hash-then-sig… John Gray
- Re: [lamps] How do we plan to solve the hash-then… Ilari Liusvaara
- Re: [lamps] How do we plan to solve the hash-then… Kampanakis, Panos
- Re: [lamps] How do we plan to solve the hash-then… John Gray
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Kampanakis, Panos
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Mike Ounsworth
- Re: [lamps] How do we plan to solve the hash-then… Phillip Hallam-Baker
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Kampanakis, Panos
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Phillip Hallam-Baker
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Kampanakis, Panos
- Re: [lamps] How do we plan to solve the hash-then… Ilari Liusvaara
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Phillip Hallam-Baker
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Ilari Liusvaara
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Tomas Gustavsson
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Kampanakis, Panos
- Re: [lamps] [UNVERIFIED SENDER] RE: How do we pla… Tomas Gustavsson
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Phillip Hallam-Baker
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Phillip Hallam-Baker
- Re: [lamps] [EXTERNAL] Re: [UNVERIFIED SENDER] RE… Mike Ounsworth