Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounsworth-pq-composite-sigs-11
"Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu> Fri, 09 February 2024 15:55 UTC
Return-Path: <prvs=4769eaa3a1=uri@ll.mit.edu>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08D24C14F5FF for <spasm@ietfa.amsl.com>; Fri, 9 Feb 2024 07:55:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.206
X-Spam-Level:
X-Spam-Status: No, score=-4.206 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iqJW36ncIdU9 for <spasm@ietfa.amsl.com>; Fri, 9 Feb 2024 07:55:46 -0800 (PST)
Received: from MX2.LL.MIT.EDU (mx2.ll.mit.edu [129.55.12.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 40269C14F5EF for <spasm@ietf.org>; Fri, 9 Feb 2024 07:55:46 -0800 (PST)
Received: from LLEX2019-2.mitll.ad.local (llex2019-2.llan.ll.mit.edu [172.25.4.124]) by MX2.LL.MIT.EDU (8.17.1.19/8.17.1.19) with ESMTPS id 419FsRal220151 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 9 Feb 2024 10:54:27 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=LoL10YdPyx9xF1SNMNrz9BdI+xQZoJ4EYdfQPZXAC7gvqJvReED5b/lSLGZCcL6vJUVIRj8SkboE7MFYbBTVCyo9NEx0Mpk9QacBrVrK0nH6qPozuHVkJKj5atGYZatXXPdMV3Gma8ucF3zb/MeoBMbilShXdstlz4a6dO3cUWOllHL71W8RRY+BqqtjAJfts5TUJdwrulfRlVAZ2c8D6UUWwc243WBsZbAT2yqPSZwddMQopyXOZJD5r/i3JovtMeuccJpGZstDm5PEHzvlVag538JIApyS132vDT2HNGNaWUVcGY4xiZSL3gOmVhP9fGnKeQLpHSTqHjYvj09Icw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2Wjbdfbf45agudL92aEiMeeWxnyGem805O08iYeygbM=; b=vq6X1IigftPnilFhP4mDZmqBO1FxOgLD9OC7AJoA1PzlU+LYhlU5IKBgF2KEfbaEp/mbi3TXshiI7o00kHRm4DVjWctVpdv6dOOOxlKY2ttkrUV1KjxtSHgaaI2gbY6FiBzcN6S/CqHjzYTrDJx87aaUYfr2vxjCkj7Vd7wmnQNF82rr0zySubLEO3PEzoEC1CSzky/lFp/r7bI6xzOjBI51vDtcgf9a32a7oMHhFwj79hblxmLnZ50melvYgNkx5clu1Wm12B/U6vhDYWfsO5G0P5bR72eI3eQyUUM9bxcUcXeDVObUhK6kbSSVnAzP1b/nubpZEQ7NXjfZ733AZQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ll.mit.edu; dmarc=pass action=none header.from=ll.mit.edu; dkim=pass header.d=ll.mit.edu; arc=none
From: "Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, "Kousidis, Stavros" <stavros.kousidis@bsi.bund.de>, "spasm@ietf.org" <spasm@ietf.org>
Thread-Topic: [EXT] Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-composite-sigs-11
Thread-Index: AQHaW0VL7pGEQ8tKu0OyyXR3FOPZSLECJoYA//+v8gA=
Date: Fri, 09 Feb 2024 15:55:35 +0000
Message-ID: <51BB4917-4C61-4330-992F-2EE5A531014E@ll.mit.edu>
References: <1751D067-A337-4611-A638-02DB5F90394A@amongbytes.com> <d3abe6ed-4150-43fb-b6f4-d3402ae41599@cs.tcd.ie> <CH0PR11MB5739F82A580E1B892DF90DF69F442@CH0PR11MB5739.namprd11.prod.outlook.com> <08a4e633-6972-4a7d-a295-5ffea82df6dc@cs.tcd.ie> <CH0PR11MB544498FB3F0A6B49AE27E62DC1442@CH0PR11MB5444.namprd11.prod.outlook.com> <762f191b-b0df-4d1e-9360-1b345625ec28@cs.tcd.ie> <CH0PR11MB573937A29F2E7BF1FFE613559F442@CH0PR11MB5739.namprd11.prod.outlook.com> <566fd7b4-d721-4c90-b533-161833619a51@cs.tcd.ie> <900e69865df14a68a2c1f34a62f9b8bd@bsi.bund.de> <5be59886-db6a-40ee-b3b6-2591be9fb2ac@cs.tcd.ie>
In-Reply-To: <5be59886-db6a-40ee-b3b6-2591be9fb2ac@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.81.24012814
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0P110MB1419:EE_|BN0P110MB2020:EE_
x-ms-office365-filtering-correlation-id: 72847f0e-998c-4815-d630-08dc29878dd6
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366004)(230273577357003)(230922051799003)(451199024)(186009)(1800799012)(2906002)(75432002)(38070700009)(966005)(86362001)(6506007)(99936003)(110136005)(38100700002)(76116006)(122000001)(5660300002)(8676002)(66946007)(66446008)(8936002)(66476007)(2616005)(71200400001)(6512007)(296002)(66556008)(508600001)(53546011)(6486002)(83380400001)(64756008)(30864003)(26005)(33656002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha256"; boundary="B_3790320935_739997922"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 72847f0e-998c-4815-d630-08dc29878dd6
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Feb 2024 15:55:35.6182 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 83d1efe3-698e-4819-911b-0a8fbe79d01c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0P110MB2020
X-Proofpoint-ORIG-GUID: IEk3ddpz-ZdU1ooiIbqx4-yfGAISZvrn
X-Proofpoint-GUID: IEk3ddpz-ZdU1ooiIbqx4-yfGAISZvrn
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-02-09_13,2024-02-08_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 adultscore=0 suspectscore=0 phishscore=0 mlxscore=0 spamscore=0 mlxlogscore=999 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311290000 definitions=main-2402090118
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/tgPWtk1_liG156FRJXzS3P-msoE>
Subject: Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounsworth-pq-composite-sigs-11
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: This is the mail list for the LAMPS Working Group <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2024 15:55:50 -0000
Not going too deep into this conversation (yet), at this point I agree with Stephen. I'm not looking forward to these proposed changes. TNX -- V/R, Uri On 2/9/24, 10:42, "Spasm on behalf of Stephen Farrell" <spasm-bounces@ietf.org <mailto:spasm-bounces@ietf.org> on behalf of stephen.farrell@cs.tcd.ie <mailto:stephen.farrell@cs.tcd.ie>> wrote: Hiya, On 09/02/2024 10:45, Kousidis, Stavros wrote: > Hi Stephen, > > I’ll try to explain again the motivation of the BSI for recommending > hybrid signatures especially in the context of PKIs which I did > already in short in my answer to Kris, see > https://mailarchive.ietf.org/arch/msg/spasm/LdjVSB4asaSsWteEnUVzCIR-_u4/ <https://mailarchive.ietf.org/arch/msg/spasm/LdjVSB4asaSsWteEnUVzCIR-_u4/>. > > > > 1) The BSI recommends „a solution that is at least as secure as > what we have now“ with RSA or ECC (sentence borrowed from Scott’s > text: > https://mailarchive.ietf.org/arch/msg/spasm/a16OpwGzWRKbwDstTsNxaT0lx1A/ <https://mailarchive.ietf.org/arch/msg/spasm/a16OpwGzWRKbwDstTsNxaT0lx1A/>). Sounds like a reasonable goal. > We recommend a simple Generally, claims as to simplicity aren't useful for IETF protocols as it almost never turns out that way:-) > and secure hybrid signature construction by > saying to concatenate two, sign independently and having an > AND-verifier. This recommendation will be published soon in our 2024 > version of the BSI technical guideline on crypto TR-02102-1 > (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-1.html <https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-1.html>). > We are in the final steps of putting that online. > > > 2) We want a simple solution, concepts like multiple > certificates and/or periodic local countersigning add complexity to > an already inherently complex PKI. The normal subscriber is sometimes > already overburdened with managing even one certificate. With PQC a > subscriber will have already two, one for signing and one for > encryption. Now you are asking to give him multiple certs. We decided > against this in our infrastructure. Wait. For a real email system, won't senders have to have multiple signing certs anyway, in order for recipients who've not got PQ algs at all to verify something? What MUA has considered these issues for email? Given BSI did that analysis is there a sketch somewhere of the kinds of changes that MUAs will need? E.g. what's to be done if a cleartext signed email is to be sent to a set of recipients some of whom do have pq algs, and some of whom don't (or where the sender can't tell)? > 3) A PKI (such that the one for the German administration) has > very long migration periods that are beyond 10 years. Every little > change in cryptography is subject to long development, testing and > deployment cycles. That's a bit of a circular argument: we want to radically change the PKI; changing the PKI takes 10 years, therefore we must start now. The "start now" part depends on it really being necessary to make radical changes to the PKI. (And yes, the change you call "simple," I call "radical":-) I don't disagree that if radical changes to PKI are needed, then those'll take a long time to get deployed. OTOH, if we propose the wrong radical changes, then getting a deployed PKI that meets the real needs will probably take even more time and involve a pile of essentially wasted effort. > We don’t make use of cut-off date changes here as > we don’t touch the PKI prior to being absolutel sure that we can > uphold business continuity. It’s hard for me to imagine that the BSI > is the only institution that is maximally careful when it comes to > PKIs with #subscribers in the magnitude >= 10^6. I don't doubt anyone's desire to keep things working. > 4) Given 3) it is easy to conclude that even if we start > migrating now we will have a quantum-safe PKI at the earliest by 2035 > (if not 2040). So yes, these concepts (like hybrid signatures) are > needed now. Maybe this gets to the heart of the issue: I don't think new features for PKI are first order goals here unless those are demonstrated necessary for real applications that need to use security mechanisms that benefit from a PKI. The goal rather is to end up with robust applications and a PKI that works for those, so the question to ask is whether or not such applications need hybrid signatures. I'm still not seeing that they do. As an aside: with the best will in the world, we (incl. me;-), set out to develop PKI stuff in PKIX back in the late '90s. I think we got lots of it fairly wrong, in no small part because we were working on PKI stuff first rather then on real applications that benefit from PKI. It was only when the acme stuff started that we really started seeing a WebPKI that worked well, and that was less than 10 years ago. So I'm very wary of arguments that we should start here by making (radical:-) changes to PKI and only later figure out how applications can benefit from those. > The argument concerning extremely long migration periods for PKIs is > a different argument then Mike’s long-term resistance one. In the PKI > scenario periodic local countersigning is not helping. > > You are asking if the BSI did analyze its needs and options – answer: > yes, it did. The composite signatures seem to be the most simple > approach that satisfy our needs. This is the way we would like to > proceed. Therefore we would implement them in our PKI as already > stated in > https://mailarchive.ietf.org/arch/msg/spasm/LdjVSB4asaSsWteEnUVzCIR-_u4/ <https://mailarchive.ietf.org/arch/msg/spasm/LdjVSB4asaSsWteEnUVzCIR-_u4/>. > > If you still lack a use case or need one proposed – goto 1-4) > above. I still do not see the use case where hybrid signatures are needed, sorry. And I did follow the goto:-) > > Texts out published by the BSI concerning PKIs and X.509: > > - In our guide „Quantum-safe cryptography – fundamentals, > current developments and recommendations“ see section „3.4 X.509“ and > recommendation „6.10 Migration to quantum-safe public key > infrastructures“. Though this is from 2021 and intended as an > overview touching on many topics not only on PKIs. > > - Specifics on what the BSI plans for its PKI are (and our > expected migration periods), you will find in the article „A > Quantum-Safe Public Key Infrastructure for the Public Administration“ > published in the BSI Magazine „Security in focus“ > 2023/01(https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Magazin/BSI-Magazin_2023-01.pdf?__blob=publicationFile&v=2 <https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Magazin/BSI-Magazin_2023-01.pdf?__blob=publicationFile&v=2>). More reading:-) Fair enough, will add that to my list. Cheers, S. > > Best Stavros > > Von: Stephen Farrell <stephen.farrell@cs.tcd.ie <mailto:stephen.farrell@cs.tcd.ie> Gesendet: Donnerstag, > 8. Februar 2024 20:34 An: Mike Ounsworth > <Mike.Ounsworth@entrust.com <mailto:Mike.Ounsworth@entrust.com>>; Scott Fluhrer (sfluhrer) > <sfluhrer@cisco.com <mailto:sfluhrer@cisco.com>>; Kris Kwiatkowski <kris@amongbytes.com <mailto:kris@amongbytes.com>>; > spasm@ietf.org <mailto:spasm@ietf.org> Betreff: Re: [lamps] [EXTERNAL] Re: > draft-ounsworth-pq-composite-sigs-11 > > > > Hiya, > > On 08/02/2024 19:09, Mike Ounsworth wrote: >>> Exactly. I'd like to know that we're talking about something that >>> is needed, and needed now. Surely someone has documented such a >>> thing that's IETF relevant? >> >> Ok, let me try. > > Thanks! > >> >> First, I will define "now" to be "between 2024 and 20xx when BSI, >> ANSSI and others recommend using lattice schemes by themselves". >> >> As a concrete example, I provide S/MIME: > > I'm assume we're talking email here. > >> Encryption: I publish my encryption certificate so that people can >> encrypt email to me. If the data in that email requires long-term >> resistance to Harvest-Now-Decrypt-Later, then that S/MIME >> encryption certificate needs to be a ML-KEM+ECC or ML-KEM+RSA >> hybrid. This is consistent with the above referenced BSI >> recommendation document. > > A hybrid KEM, sure, that has real utility as you say. > >> Signatures: I publish my signing certificate so that people can >> verify the signatures on emails that I send. If the data in that >> email requires long-term resistance to forgery and non-repudiation >> attacks, then that S/SIME signing certificate needs to be a >> ML-DSA+ECC or ML-DSA+RSA hybrid. This is consistent with the above >> referenced BSI recommendation document. > > So depending solely on long term certificates and signatures to try > verify the signer long after the fact is a fairly tough ask as I > guess we all know. It's entirely unclear to me that signing > separately twice would be any worse, once one considers all the > timestamping and countersignature stuff etc that's really needed (but > probably almost never used?) to properly do that verification long > after the eamil is received. > > As a strawman, periodic local countersigning of the mail in the > message store with the fashionable pq sig de-jure without changing > the PKI (at signing time) could be a path worth exploring. It's not > clear to me that the authorities cited earlier actually did that kind > of analysis, but maybe they did? > >> Now, there are design choices here: we could, for example, define a >> new CMS extension that indicates that two SignerInfos MUST be >> verified together, but I am not aware of such an extension, and if >> such an I-D were submitted, I would argue that it is a more complex >> and difficult-to-implement mechanism than the composite signature / >> composite certificate mechanism proposed here. So, in absence of >> any other proposed solutions, we are left with this composite >> signatures draft. > > Or, we could note that nobody actually properly does that kind of > email signature verification (if that's the case) giving us a good > bit more time for pq sig algs to improve and gain confidence. > > For context, 'case it helps, I've never believed x.509 alone gets us > N-R, and I don't think I'm alone in that opinion. > > So, thanks again for trying to provide the kind of answer for which > I'm asking, but in this case, I don't conclude that this scenario > actually demonstrates a need for hybrid sig algs. > > Cheers, S. > > PS: I'll read the BSI doc but probably not this evening. > >> >> --- Mike Ounsworth >> >> -----Original Message----- From: Stephen Farrell >> <stephen.farrell@cs.tcd.ie <mailto:stephen.farrell@cs.tcd.ie><mailto:stephen.farrell@cs.tcd.ie <mailto:stephen.farrell@cs.tcd.ie>>> Sent: >> Thursday, February 8, 2024 12:56 PM To: Scott Fluhrer (sfluhrer) >> <sfluhrer@cisco.com <mailto:sfluhrer@cisco.com><mailto:sfluhrer@cisco.com <mailto:sfluhrer@cisco.com>>>; Mike Ounsworth >> <Mike.Ounsworth@entrust.com <mailto:Mike.Ounsworth@entrust.com><mailto:Mike.Ounsworth@entrust.com <mailto:Mike.Ounsworth@entrust.com>>>; >> Kris Kwiatkowski >> <kris@amongbytes.com <mailto:kris@amongbytes.com><mailto:kris@amongbytes.com <mailto:kris@amongbytes.com>>>; >> spasm@ietf.org <mailto:spasm@ietf.org><mailto:spasm@ietf.org <mailto:spasm@ietf.org>> Subject: Re: [lamps] >> [EXTERNAL] Re: draft-ounsworth-pq-composite-sigs-11 >> >> >> Hiya, >> >> Just to focus on the main point.. >> >> On 08/02/2024 18:51, Scott Fluhrer (sfluhrer) wrote: >>> I would disagree; I do not believe that it is LAMPS's job to >>> determine the appropriate solution for all the various use cases >>> (we can give guidance, however what people use is out of our >>> hands). >> >> I didn't ask for "all," just for one. >> >>> I believe that LAMPS does have the responsibility for giving >>> people the tools they need >> >> Exactly. I'd like to know that we're talking about something that >> is needed, and needed now. >> >> Surely someone has documented such a thing that's IETF relevant? >> >> Ta, S. >> >>
- [lamps] draft-ounsworth-pq-composite-sigs-11 Kris Kwiatkowski
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Mike Ounsworth
- Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounswo… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] draft-ounsworth-pq-composite-sigs-11 Stephen Farrell
- Re: [lamps] draft-ounsworth-pq-composite-sigs-11 Tim Hollebeek
- Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounswo… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Stephen Farrell
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Stephen Farrell
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Scott Fluhrer (sfluhrer)
- Re: [lamps] draft-ounsworth-pq-composite-sigs-11 Mike Ounsworth
- Re: [lamps] [EXTERNAL] draft-ounsworth-pq-composi… Mike Ounsworth
- Re: [lamps] draft-ounsworth-pq-composite-sigs-11 Kousidis, Stavros
- Re: [lamps] draft-ounsworth-pq-composite-sigs-11 Tim Hollebeek
- Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounswo… Tim Hollebeek
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Hubert Kario
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Stephen Farrell
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Mike Ounsworth
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Hubert Kario
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Mike Ounsworth
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Stephen Farrell
- Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounswo… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Michael Richardson
- Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounswo… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Michael Richardson
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Jan Klaußner
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Tim Hollebeek
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXT] Re: [EXTERNAL] Re: draft-ounswo… Tim Hollebeek
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Russ Housley
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Jan Klaußner
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Russ Housley
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Jan Klaußner
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Tomas Gustavsson
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… John Gray
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Tim Hollebeek
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Tomas Gustavsson
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Tim Hollebeek
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Jan Klaußner
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Tomas Gustavsson
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… John Gray
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Kousidis, Stavros
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… John Gray
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Ilari Liusvaara
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Carl Wallace
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Carl Wallace
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Jan Klaußner
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Ilari Liusvaara
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Jan Klaußner
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Falko Strenzke
- Re: [lamps] [EXTERNAL] Re: draft-ounsworth-pq-com… Mike Ounsworth
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Stephen Farrell
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Mike Ounsworth
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Falko Strenzke
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Michael Richardson
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Jan Klaußner
- Re: [lamps] [EXT] [EXTERNAL] draft-ounsworth-pq-c… Russ Housley