Re: [stir] I-D Action: draft-ietf-stir-passport-rcd-15.txt

Jack Rickard <jack.rickard@microsoft.com> Wed, 09 March 2022 18:44 UTC

Return-Path: <jack.rickard@microsoft.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D18383A041E for <stir@ietfa.amsl.com>; Wed, 9 Mar 2022 10:44:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.111
X-Spam-Level:
X-Spam-Status: No, score=-2.111 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JovCfJMVuRzh for <stir@ietfa.amsl.com>; Wed, 9 Mar 2022 10:44:53 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20712.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1b::712]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 39E2D3A046E for <stir@ietf.org>; Wed, 9 Mar 2022 10:44:52 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MpmHDef/9DY5uh6bL3bdOaJxZpxj5H3Yn7t8rkxgSMiB8v+rcKPJv8o0txhX4/slzMlYLkLOHtLJTFD/Zh7lyejtGVjPq4/MC7vhbEsixsXND9HWsqOwMoTgKQLBLo3ub3AddYfzU1n1tRVKGLaUjiuK4RUsTLbsexK7rqjC4iJdYsY6XodOk+z5hrj7jzgwVKHgZteVGpbhq8wl2Lpyy7JnOD3mQniKbYpbVZl7UaYTiMP3GLkTFMY8XZBWHKIBd8websoOCOoXxXRspTGyYtVrwThJM3WtbLOb0ywt9/i9BirLtqKh0zvbpqkFstCJFcsA/7gTsd2sJyTBvdOXTQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UKELyRY1/E5d/wCFTPFyHaAgJdcGo6v1P3YTT5KhjwI=; b=lB5uKlWLdzNhPj98DEyT86oSy3sKiDFLEnJUi1PdVfYZpQuy3HlVhs8M8blrlc4uA2ynf5595NDvoXNaF9hvEAt6QIyMQg4qTUkjbe5auoFIqxvc8+Vzg68Axrnnssir9oMDU0oy86Uvxen+RmByk7QkkHCXMbLFPULG/LAo/JuphLoK8F0KNJg92FCYSAn9gt0slego6e9HrZPn8pjCGuBCS6PxRDrL1l7FP4Paa/rbfZ80iWUPY1qpCM67sPk/VCS1MVumYEw2ixCHgZ9sW3lcvnWt5zXjCZKb4ODlCXZb1GUdAeExa5wJZSFWDFgR4nZ+A35NWxRKFEAW4yH65w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UKELyRY1/E5d/wCFTPFyHaAgJdcGo6v1P3YTT5KhjwI=; b=D+q13OX1l0WwkYl41GZBXgp+Lm20GM9lU62JYaw/5i/PyX5VFKtAUg5yI3KRkKmS8awriY4Q9R6aK41bwOHlEYbkGmTRcxL9vKjo2L6gx9Jhrzrn52TlNMt4FzCWYROFDNWDm9tuC0ZAwmpT2CrNsEP8C2LS/c2KuoxySPh9LTQ=
Received: from AM5PR83MB0355.EURPRD83.prod.outlook.com (2603:10a6:206:25::24) by VI1PR83MB0253.EURPRD83.prod.outlook.com (2603:10a6:802:78::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.4; Wed, 9 Mar 2022 18:44:45 +0000
Received: from AM5PR83MB0355.EURPRD83.prod.outlook.com ([fe80::dd7f:2b7c:4611:b51e]) by AM5PR83MB0355.EURPRD83.prod.outlook.com ([fe80::dd7f:2b7c:4611:b51e%7]) with mapi id 15.20.5081.007; Wed, 9 Mar 2022 18:44:39 +0000
From: Jack Rickard <jack.rickard@microsoft.com>
To: Chris Wendt <chris-ietf@chriswendt.net>, IETF STIR Mail List <stir@ietf.org>
Thread-Topic: [stir] I-D Action: draft-ietf-stir-passport-rcd-15.txt
Thread-Index: Adgzy3gnakCCdRlITOa0HILw8bXTLQ==
Date: Wed, 9 Mar 2022 18:44:36 +0000
Deferred-Delivery: Wed, 9 Mar 2022 18:44:07 +0000
Message-ID: <AM5PR83MB0355EEAD40D7BDAD596EB9B5880A9@AM5PR83MB0355.EURPRD83.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=176a3143-f061-4e52-9bd7-9324c68a248a; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-09T15:33:44Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 09545ca6-7dcb-4e06-b9c1-08da01fcdde4
x-ms-traffictypediagnostic: VI1PR83MB0253:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <VI1PR83MB0253E55ECF657A26E2E6C5CE880A9@VI1PR83MB0253.EURPRD83.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM5PR83MB0355.EURPRD83.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(451199009)(38100700002)(83380400001)(122000001)(10290500003)(508600001)(86362001)(966005)(66574015)(316002)(26005)(8990500004)(33656002)(19627235002)(55016003)(110136005)(71200400001)(2906002)(38070700005)(186003)(53546011)(9686003)(6506007)(8936002)(5660300002)(6666004)(52536014)(44832011)(82960400001)(8676002)(76116006)(7696005)(82950400001)(66946007)(66446008)(64756008)(66556008)(66476007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?vKxwGRAmCewyERxiskDEGNSJKSgWERb6quiFw+Gu0eWFRPMhiD2QP4mK8RlN?= =?us-ascii?Q?zL9zdreqwqOwTIU8F7UU10Oho8/OkHVSOqpZj08XuNw+z+JqVXsekp6pqrwI?= =?us-ascii?Q?ZsT6X34/ekAeBqlewh0mZhSY6375kBq8U3RuKGgCfmPjEYuV0FEDqe6mUX45?= =?us-ascii?Q?hK7NUvBc/VCaDGabyR0AF9kgtE1SrrjXzdNdNmQKtKs/r3XX5use5Z6wf+sg?= =?us-ascii?Q?vMSKjN6syWx1vHEEBjq83eLPm60hB0YnLYkMC2sZMTFckbGfb9TyMYOuw7xn?= =?us-ascii?Q?jnYDLKQyx3+Kb5sL/6OmdIrz+TR2ROe9CbyPO7zzNlEUw4L2dAYVQVtP/JBY?= =?us-ascii?Q?eY4TNkdF5ErsbA8X2RrBMZUhXkUliWGxzEt18wrnrVcOPV7E7AK3o/M8OCPf?= =?us-ascii?Q?Rmlmv+JDCUidddD0NRuiQmwKRNShiWH4nqzg385CFb61PIudvdA+AvskUiew?= =?us-ascii?Q?dlT1qorjIVnYF/vJXNyTalH2SM0SgUS0/AJ3A3C+/JEa1qT2FBSsde1/rAw7?= =?us-ascii?Q?OM7wvpTQeCPhsRZASHh3/kF6MiwKaSXbOMSoGmdukhVuZqMKrGOtcZyRl5Oi?= =?us-ascii?Q?kQaaMYQ31GvL04+WoRDcAkg9bst6WjZyDkpARNS+uG3X3gRZ/Q+Kk/7s/Vbv?= =?us-ascii?Q?lB2VZoIIKmurxD/JIF3AHp9O37pNG4RXnZKI676fywrgLOLtyVwTP4nLdF/I?= =?us-ascii?Q?krVh2qLaTffzAswWNWIFLqRuR/p6oRtfQiHeVM0mNBOWpWOZM/H3tm+tYvMh?= =?us-ascii?Q?cyRr6FO9L8uq43UCUO/MJH+fWBppzKcV4iuSfADFa41rtE6qxHr+mr5kkFfc?= =?us-ascii?Q?zrzmg+SVOrYW2lbALoQTapZ+lu57Jvzd+mgsTz0YWcT0R0CwCCUNf/cwDlin?= =?us-ascii?Q?ot0SnwKtUNCAX2k+y5+OSkhWFQGLp0jCzDc/EB0BKEvGwlUffTVmQtrkkQIq?= =?us-ascii?Q?pk2D+cMAuLKKWGSjQdh2kPNPcS6fYh6QS4iK9XhnG8zmB4AvyFfN7ki7crS2?= =?us-ascii?Q?SeSRvgQwXcL6h6YYvZ5ym3oLyk60kMtLDmcDVRjfDwlcUIN9LSP86UxqqeSU?= =?us-ascii?Q?ejRHNbiNNkmoqyja2fjDvWaFTP0IE9TXBodeVNeOhWdqlfd8smnO9tc3m+vP?= =?us-ascii?Q?nzQrzAMQHkZDWhJZa/+Hyly8FnGorp97Xej5HJLk24OdlhbJuswLeTt4DR4p?= =?us-ascii?Q?2L44HWjge8NI/L7F9iSITxBnpnH1H8YfDPtmAbyNydT/KxK8oy2Efm1zl2C0?= =?us-ascii?Q?cZhBtGj5i1E+s7Pw5q2O+7PUcw7gBm+j/Q+Vqr0jDFNFUqA/wz15QBYvnL5D?= =?us-ascii?Q?iqWkfI2CXCvBzNlLrC9xwxUDHTpBMfzyWYdlCjBXuy1/IOs3krsaT4iMxrws?= =?us-ascii?Q?IsikcG1rv6l2r00GsR+fpyP1edaO?=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM5PR83MB0355.EURPRD83.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 09545ca6-7dcb-4e06-b9c1-08da01fcdde4
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2022 18:44:39.0587 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mHR8+ZEt89IUIqC9pOicDPNJQZP/7b1udTmm7FZHa5boQDevejbvQK4QqC2oqXBDRTXslXePLgODgPl2Fhkwwz9s+p/x+8qZ9oG7QLaK8Ss=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR83MB0253
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/9Y28DS2dZcEHFlEDrcMbUcAVWzg>
Subject: Re: [stir] I-D Action: draft-ietf-stir-passport-rcd-15.txt
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2022 18:44:59 -0000

Hi Chris,

Thanks for putting all these updates together, it's in a good place from my point of view and all my major issues have been addressed. I only have a few reasonably minor issues and some nitpicks on this draft.

Section 6.1
As described in a separate email, I think the process described in the last paragraph (the one just above section 6.2) can be simplified. Additionally I think it's in the wrong place at the moment, I think it applies to all of section 6.1 but its current position under section 6.1.4 suggests it only applies to "jcl".

Section 9.1
This draft replaced "A PASSporT that uses claims defined in this specification" with "An "rcd" PASSporT that uses claims defined in this specification", I think the old sentence may be more correct as this verification also applies to other passports containing RCD claims.

Section 15
The second paragraph seems to be suggesting that only certificates containing JWTClaimsConstraints should be trusted to add rcd information (without some other trust relationship), but I don't understand why this is the case? Surely, you either trust the entity that added the RCD information or you don't, why should extra constraints on the certificate have any impact on that? I expected this section to say something like "The verifier must validate that the signer is trusted to provide Rich Call Data, in addition to having authority over the originating address".

This also raises the question of whether an RCD passport authenticates the originator like a base passport? I don't think there's any text to suggest that it doesn't, but that would prevent intermediaries who have no authenticated relationship with the originator from adding RCD information.

Nits:
Section 4, Paragraph 2:
> The RCD integrity mechanism is a process of generating a sufficiently strong cryptographic digest for each resource referenced as a claim value or as a value within a claim value by one or more globally unique URIs (e.g., an image file referenced by "jcd" or a jCard referenced by "jcl").
doesn't make much sense to me, I think the following means the same and is clearer to me:
> The RCD integrity mechanism is a process of generating a sufficiently strong cryptographic digest for each resource referenced by a URI within a claim value (e.g., an image file referenced by "jcd" or a jCard referenced by "jcl").

Section 6.1.2:
> In order to reference the "icn" value for a digest, the JSON pointer string would be "/icn" and the digest string would be created using only the string pointed to by that "/apn" following the rules of JSON pointer.
The "/apn" shouldn't be there:
> In order to reference the "icn" value for a digest, the JSON pointer string would be "/icn" and the digest string would be created using the image data referenced by the URI.

Section 6.1.4, vcard example:
The vcard is missing commas after the photo and logo elements, I was also unable to replicate the digest:
echo -n '["vcard",[["version",{},"text","4.0"],["fn",{},"text","Q Branch"],["org",{},"text","MI6;Q Branch Spy Gadgets"],["photo",{},"uri","https://example.com/photos/quartermaster-256x256.png"],["logo",{},"uri","https://example.com/logos/mi6-256x256.jpg"],["logo",{},"uri","https://example.com/logos/mi6-64x64.jpg"]]]' | sha256sum | awk '{printf $1}' | xxd -r -p | base64 -w0
Outputs: tbxXX9mRY2dtss3vNdNkNkt9hrV9N1LqGST2hDlw97I

Thanks!
Jack

-----Original Message-----
From: stir <stir-bounces@ietf.org> On Behalf Of Chris Wendt
Sent: 07 March 2022 20:09
To: IETF STIR Mail List <stir@ietf.org>
Subject: [EXTERNAL] Re: [stir] I-D Action: draft-ietf-stir-passport-rcd-15.txt

Hi All,

I have submitted version 15 of this draft which incorporates quite a bit of discussion on a number of topics.  Given we won't have a meeting until after IETF two weeks from now, i'd like to get as much list feedback on 15 so that I can potentially incorporate into a 16 going into the virtual STIR meeting when it is scheduled and hopefully be in a good position to start really sending off for WGLC this time, if possible.  I think taking the time to get this right was valuable, but there is now starting to be a lot of implementation, so time to really wrap things up.

The changes from 14->15 are as follows:

Added a new "icn" key/value to the "rcd" claim, the intent of this is to correspond to the Call-Info purpose of "icon" and provide a default mechanism for adding an image icon for calls.  There was a lot of discussion about use of jCard if the only use was for including an image, and i think this hopefully is well received change by all.

By far the largest change is around the rules for integrity and constraints for direct values vs URI referenced content. I have made the document state that integrity and constraints for direct values is optional, but still have a preference to do so.  It is absolutely true that you can constrain direct values through JWTClaimConstraints and including the direct value in the permitted values.  However, there is one small concern about size of certificate, but i think a much bigger concern about including RCD information in a publicly accessible certificate. So, i try to detail that concern in the document.

I have also made a number of editorial changes, i've fixed some of the examples, made them lexicographic order, clarified a number of things here and there.

Please review and us know your thoughts and feedback. 

Thanks everyone!

-Chris

> On Mar 7, 2022, at 2:50 PM, internet-drafts@ietf.org wrote:
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Secure Telephone Identity Revisited WG of the IETF.
> 
>        Title           : PASSporT Extension for Rich Call Data
>        Authors         : Chris Wendt
>                          Jon Peterson
> 	Filename        : draft-ietf-stir-passport-rcd-15.txt
> 	Pages           : 33
> 	Date            : 2022-03-07
> 
> Abstract:
>   This document extends PASSporT, a token for conveying
>   cryptographically-signed call information about personal
>   communications, to include rich meta-data about a call and caller
>   that can be signed and integrity protected, transmitted, and
>   subsequently rendered to the called party.  This framework is
>   intended to include and extend caller and call specific information
>   beyond human-readable display name comparable to the "Caller ID"
>   function common on the telephone network.  The JSON element defined
>   for this purpose, Rich Call Data (RCD), is an extensible object
>   defined to either be used as part of STIR or with SIP Call-Info to
>   include related information about calls that helps people decide
>   whether to answer an incoming set of communications from another
>   party.  This signing of the RCD information is also enhanced with a
>   integrity mechanism that is designed to protect the authoring and
>   transport of this information between authoritative and non-
>   authoritative parties generating and signing the Rich Call Data for
>   support of different usage and content policies.
> 
> 
> The IETF datatracker status page for this draft is:
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-stir-passport-rcd%2F&amp;data=04%7C01%7Cjack.rickard%40microsoft.com%7C849b465873674ba44d8208da00766a2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822805851114750%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=rkQhUPZV5zMUbb1HAsiPuhrv5ZIuhL9tSkLCuwB7tMQ%3D&amp;reserved=0
> 
> There is also an htmlized version available at:
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-stir-passport-rcd-15&amp;data=04%7C01%7Cjack.rickard%40microsoft.com%7C849b465873674ba44d8208da00766a2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822805851114750%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=g8fF7kwA4NpfKsJn4O3c4kpADe6jBhqULjoVft9uOVM%3D&amp;reserved=0
> 
> A diff from the previous version is available at:
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-ietf-stir-passport-rcd-15&amp;data=04%7C01%7Cjack.rickard%40microsoft.com%7C849b465873674ba44d8208da00766a2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822805851114750%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=4UcnYYd7HQAVqvqLFIwcXn%2BJCeyxazp23mrPu2Y86oo%3D&amp;reserved=0
> 
> 
> Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
> 
> 
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fstir&amp;data=04%7C01%7Cjack.rickard%40microsoft.com%7C849b465873674ba44d8208da00766a2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822805851114750%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=%2BAkvRarPP%2FAy%2FiyX7NalukpAJjkTtbBQPtBISNetKHU%3D&amp;reserved=0

_______________________________________________
stir mailing list
stir@ietf.org
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fstir&amp;data=04%7C01%7Cjack.rickard%40microsoft.com%7C849b465873674ba44d8208da00766a2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822805851114750%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=%2BAkvRarPP%2FAy%2FiyX7NalukpAJjkTtbBQPtBISNetKHU%3D&amp;reserved=0