Re: [T2TRG] RESTful Design & Security

"Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com> Wed, 08 March 2017 15:31 UTC

Return-Path: <oscar.garcia-morchon@philips.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 380C01296E8 for <t2trg@ietfa.amsl.com>; Wed, 8 Mar 2017 07:31:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=philips.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ORlHsfrBYjhK for <t2trg@ietfa.amsl.com>; Wed, 8 Mar 2017 07:31:51 -0800 (PST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10120.outbound.protection.outlook.com [40.107.1.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8BDDF129535 for <T2TRG@irtf.org>; Wed, 8 Mar 2017 07:31:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Philips.onmicrosoft.com; s=selector1-philips-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=kKyFbUQ3qJ+08DQm6avkte8egZnsEcoIqTN7d1yuj38=; b=sKVHhsN9CZPsrgG5+2HCL7BuBfqjwmGPR9ES2s8N97YMv5xi05XeLQApRnAMCGWmaMOBafoA3np/f7HXTMltI6vhXEBvaNH611zDjOj/xwrjsFCJIyHhpabiT8GQTYLF/93FBfMurci63k5bDTkEn1HckmIShvPIHwOGsp5T4rw=
Received: from VI1P122CA0008.EURP122.PROD.OUTLOOK.COM (129.75.142.82) by DB6P122MB0038.EURP122.PROD.OUTLOOK.COM (129.75.140.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.947.12; Wed, 8 Mar 2017 15:31:47 +0000
Received: from AM1FFO11FD040.protection.gbl (2a01:111:f400:7e00::169) by VI1P122CA0008.outlook.office365.com (2603:10a6:820:1c::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.947.12 via Frontend Transport; Wed, 8 Mar 2017 15:31:47 +0000
Authentication-Results: spf=neutral (sender IP is 23.103.247.180) smtp.mailfrom=philips.com; gmx.net; dkim=none (message not signed) header.d=none;gmx.net; dmarc=none action=none header.from=philips.com;
Received-SPF: Neutral (protection.outlook.com: 23.103.247.180 is neither permitted nor denied by domain of philips.com)
Received: from 011-smtp-out.Philips.com (23.103.247.180) by AM1FFO11FD040.mail.protection.outlook.com (10.174.64.229) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.947.7 via Frontend Transport; Wed, 8 Mar 2017 15:31:46 +0000
Received: from DB5PR9001MB0165.MGDPHG.emi.philips.com (141.251.190.209) by DB5PR9001MB0167.MGDPHG.emi.philips.com (141.251.190.211) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.933.12; Wed, 8 Mar 2017 15:31:46 +0000
Received: from DB5PR9001MB0165.MGDPHG.emi.philips.com ([141.251.190.209]) by DB5PR9001MB0165.MGDPHG.emi.philips.com ([141.251.190.209]) with mapi id 15.01.0933.026; Wed, 8 Mar 2017 15:31:46 +0000
From: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Eliot Lear <lear@cisco.com>, "Kovatsch, Matthias" <matthias.kovatsch@siemens.com>, "mcr+ietf@sandelman.ca" <mcr+ietf@sandelman.ca>
Thread-Topic: [T2TRG] RESTful Design & Security
Thread-Index: AQHSlpstzow5GSCUy0qO2HV2fKAQj6GJplEAgAAQwQCAAAGWgIAAByCAgAAHRICAAPIBgIAARgCAgAASgzA=
Date: Wed, 08 Mar 2017 15:31:46 +0000
Message-ID: <d6c78126308c4f6c94ab4a827d0a8c2e@DB5PR9001MB0165.MGDPHG.emi.philips.com>
References: <c15a387f-9dd3-987e-2901-b86fd8f60108@gmx.net> <10144.1488908366@obiwan.sandelman.ca> <952c4a16-174f-2457-1f11-8f733e738f90@gmx.net> <4EBB3DDD0FBF694CA2A87838DF129B3C01AA2F98@DEFTHW99EL4MSX.ww902.siemens.net> <558bae1a-ff84-9fb3-c6bf-021f492e9a04@gmx.net> <4EBB3DDD0FBF694CA2A87838DF129B3C01AA313F@DEFTHW99EL4MSX.ww902.siemens.net> <c85cbfa5-083c-9159-3e01-001b353a3e35@cisco.com> <f33f30cc-9a6d-513d-f20f-620ac4b611e1@gmx.net>
In-Reply-To: <f33f30cc-9a6d-513d-f20f-620ac4b611e1@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2.247.245.210]
X-MS-Office365-Filtering-Correlation-Id: c6f0f599-9e16-4e8d-7a0f-08d466383b8c
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OrganizationHeadersPreserved: DB5PR9001MB0167.MGDPHG.emi.philips.com
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:23.103.247.180; IPV:NLI; CTRY:; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(39410400002)(39850400002)(39840400002)(39450400003)(39860400002)(2980300002)(24454002)(13464003)(199003)(189002)(85714005)(377454003)(374574003)(9170700003)(8676002)(15650500001)(2950100002)(55016002)(356003)(38730400002)(4326008)(23676002)(189998001)(50986999)(305945005)(53546006)(229853002)(24736003)(76176999)(8936002)(50466002)(54356999)(6306002)(53936002)(81166006)(6246003)(7696004)(2906002)(106116001)(86362001)(108616004)(5660300001)(105586002)(3846002)(6116002)(93886004)(33646002)(2900100001)(102836003)(106466001)(7736002)(66066001)(47776003); DIR:OUT; SFP:1102; SCL:1; SRVR:DB6P122MB0038; H:011-smtp-out.Philips.com; FPR:; SPF:Neutral; MLV:sfv; A:1; MX:1; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; AM1FFO11FD040; 1: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
X-CrossPremisesHeadersPromoted: AM1FFO11FD040.protection.gbl
X-CrossPremisesHeadersFiltered: AM1FFO11FD040.protection.gbl
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:DB6P122MB0038;
X-Microsoft-Exchange-Diagnostics: 1; DB6P122MB0038; 3:LYBgY+/4BjcpfeDZBV5r2C5zm3M18HpIbh7iyX2Q/aaxeTRTikETuaXcF7E5O7NAuGCVUHuPzJRVfiP/OBUQp7RAFWhQhP5CTlLmcqkZNcP7EfdplpDzMgt8rEDgP14fccXgkycli+JJ8XoKRbCLDF6BoHTCDEDR9HRtT+CyUhyLlQmsd8dO6PASURAts99enzK+WhdxcMZTUMxXUdpqfNwpM6SDQ9lH91yiKKeSY+N8zIWW4O7kRlmEw47rgTZg+Ijufr57EP+/gtRuD19fjJfwE8M47knUWKxmRIeRFzjNnV6j/+ZjN+Pjcagob6zkNpQ6W7CyoBTC804mJ/Cw2UUeC8xFqIsPd4LHGPwHVJ6t3ximF3/KFdYUYatwck3m; 25:6pgIaT5hdHqk2NzTMir6T+Noes4aNM275wTS1KgP6kaqYZe3/yI54Rc4/KaHEVGbaz0cp01du12gxXqc+bMVo4Oa2PkbPtaZJR7wU9KK/nD26fdpbd10loRuiBeHdGlzPWlW4RIimkcdI8J/CJWPz+bIYzDizj6y0Oewe/K/SiXYZJe/ew7LzAP+6rtNa9eNQZOo7JfLNbTzfu8ZVKRto99PMbBZpHqCikm4JOG5zdFIV/1YNo9uY1pxMjoceis5T4qouVbaovokgUNnKzZCSQS6ZokVwPqSiBnuUB3fXrH8TbY1gq7PRNMsIQtSVVTt2F0nEiO9wmSMNmLEZ66h8X72NUCXO5w65DQIYz23EbfdXgQKQrUfYH1KNy89yWjfTxB6sccBwm/GAdz8QlnhiZh7aow2OVKGQCe6vXXVAgppA5lyOP6jgv7N9beLNIhdzWc28EhSU+GB2SZOJ+jwmg==
X-Microsoft-Exchange-Diagnostics: 1; DB6P122MB0038; 31:PAoAxu8wCO4aad6lr3K1WuqlxZQ+93IE85ZMPDd3l/3IWxAsiAZCZvH3lXdCoKGFvQJsuh3gJS0Ymkmo66ROpCMlL11jEHFS7jBOamFHfmWHHEe6T0zOwfqUWYreER/wWH6SmYC/Vl46m5xzXqj9CDY08AZNNWCG2uH3iKFOP51xbdjfns8yLHARu6xcrg2K7hAoIZjkBlVLXOZm1qIcqtcWFy8C0Z6jzH8vMVLxEYwEhy1BbEm9zxN9ZrIWYXqsDP9S69/VRdJkD9aQyYs57u2ZFtm4121DYcDEZcAEfkw=; 20:Ri2vBtbVRxmDVWaq/pota2O0A5+3LZwu5Nhxjo/ol5JVH6KNlKgb5e+6mEkO5Lr/oVgFdwWXxryX5AcbfLWlTbO96ZbqtnModP4fOfTqEjS5qp72rpdLOEF7Mi8xdbj/0yJg03AVOLJ+p/R7ht8m9CJbnwVfIiByG1usuujYTAdV5Lg2skvqyvAR/w+NOlwYPUEW6+vwjXFWpUHkLh+jeioAn8BcJHgmj8XEXy7VrYDClH2Uj4wiflVIPBpxzW5k2bDLBfgbv0IwTbFfT2A7jBKwJPl5qklgq5cS/3YW1zmvYVxDsCs4HO682xxKAXhj2iDcWF8V98fiu7UE+aMJ6PuPlUFzWi7IiEms3UkcWmzNLRYYI70GCM+YfbVQWRLJkaEysoHHw3AtUKdxubPGJOY0/aqpKnO6P6pziVV8NewfMQ1JaDRRivY0FNu3rdDRl7O0yo8RKu92bOtVFs4XZacXcnAkXlcYkUj6LX1qc+oZyOaD+qT2plRDXR5S7jTc
X-Microsoft-Antispam-PRVS: <DB6P122MB0038BB25CDB23BD21F705D96C82E0@DB6P122MB0038.EURP122.PROD.OUTLOOK.COM>
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(248736688235697)(95692535739014)(126837547833334);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040375)(2401047)(8121501046)(5005006)(13016025)(13018025)(3002001)(10201501046)(6055026)(6041248)(20161123560025)(20161123555025)(20161123564025)(20161123558025)(20161123562025)(6072148); SRVR:DB6P122MB0038; BCL:0; PCL:0; RULEID:; SRVR:DB6P122MB0038;
X-Microsoft-Exchange-Diagnostics: 1; DB6P122MB0038; 4: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
X-Forefront-PRVS: 02408926C4
X-Microsoft-Exchange-Diagnostics: 1;DB6P122MB0038;23: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
X-Microsoft-Exchange-Diagnostics: 1; DB6P122MB0038; 6:yY5i0e6sBITd0oDHiHjJmb7F9R/VPOW5Bo3aY5bTovtmW7XgGgGR/mU3EnUjKv5KeC67DQQ2f2K4GKeGJAf7yOee4667ic6+GhEvIEFlAn+6ZUDzxN/BfgKR2BdF1ogUxyMFRxAw89PMscOOvBLUiyuWhEQf0bWyQR5ibr8LN60k8cIqdYY0jvTM1M0JbxSBrbp169mrhfVd/c2ENJ6uJY0OUVOYUm47HhCxfRPx5zxfTpX4uW5b0jYrP85RXJJzbTcSLGG5OlUz5+4V6lAtvrV6tpKn5THlnWgRD+dVM4PQpytDXFSY8MpQiH8QKV4Km9NMV1xo1sK1tYQ4UIbc2k46nUF4YRDv337+m92TdIOz0LXIX615mR3+k3b2J7pmxEXphYbPe91PULwVdpcr6zwkpZtIfkuAbu108IWSG24=; 5:hNyK9/cZB/ON+PnMrp6ROm+z8NhZrKoq+fbsBsKKWxI0qCdB4H28sDvIrkNQRjAdEO9J7cp1QbeAsOxHOIcmsNvuqO73ILnLBYxeGRpVhoNZi8wLKbOlnxMhhsWvi0UCMQ/nNi1O4IFm26hM54U2ZA==; 24:3AJ9yBV0v76MyrNYdWWffOoDEU4kSoDxtZ7+3xJJ0thHoayOilspUbETO0QW1DZzPnKdgB/bbXSjB6fHEI66NGps6S80abbcHHCC1LTmqLM=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; DB6P122MB0038; 7:Wx0xMnD/TDcNGKEAkji64o7suaVHnBsATntaVqPnAbWcbIluNKEeq5IAXW5eO2ObRfcZXtMDRbpaNy/mVgT9qdJFS69rjx2afnCC35PwDMZmr57GnP5u9Oej4MxqILnzolRw9/CkZpbVNtdJGKhn0G+KTvv5hVMFN6UkzbII7QuC7flXrA/u7H6zfJ2HVrnjJjsKgq3yTcGznOjx5p8MN4LVBYKUUWIHJ0ytvFeOa9rSMnsVy+Td9IddrxzTnqGCdK4wf1WBGH2P1sYuThOPipwRRWJqa/SgGccenKKLVm6LqeZoD0P/UUGV0mM/lhBxLgbbwTpaiQlJX/VIs/C7pw==
X-OriginatorOrg: philips.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2017 15:31:46.8722 (UTC)
X-MS-Exchange-CrossTenant-Id: 1a407a2d-7675-4d17-8692-b3ac285306e4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=1a407a2d-7675-4d17-8692-b3ac285306e4; Ip=[23.103.247.180]; Helo=[011-smtp-out.Philips.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P122MB0038
X-MS-Exchange-CrossPremises-AuthAs: Internal
X-MS-Exchange-CrossPremises-AuthMechanism: 04
X-MS-Exchange-CrossPremises-AuthSource: DB5PR9001MB0165.MGDPHG.emi.philips.com
X-MS-Exchange-CrossPremises-SCL: 1
X-MS-Exchange-CrossPremises-messagesource: StoreDriver
X-MS-Exchange-CrossPremises-BCC:
X-MS-Exchange-CrossPremises-originalclientipaddress: 2.247.245.210
X-MS-Exchange-CrossPremises-disclaimer-hash: 7fd5309d68bb4378c576a4d2c2ad972d336f5eb0475879c2a0b14da1aac98972
X-MS-Exchange-CrossPremises-processed-by-journaling: Journal Agent
X-MS-Exchange-CrossPremises-AVStamp-Service: 1.0
X-MS-Exchange-CrossPremises-Antispam-ScanContext: DIR:Originating; SFV:NSPM; SKIP:0;
X-OrganizationHeadersPreserved: DB6P122MB0038.EURP122.PROD.OUTLOOK.COM
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/lLfY1ZnzHPGWu1_UE1JX3MbXsiw>
Cc: "T2TRG@irtf.org" <T2TRG@irtf.org>
Subject: Re: [T2TRG] RESTful Design & Security
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IRTF Thing-to-Thing \(T2T\) Research-Group-in-creation" <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Mar 2017 15:31:54 -0000

Hi Hannes,

the document " draft-irtf-t2trg-iot-seccons-01" summarizes protocols.  But I do not think that we do this happily but seriously. Summarizing existing protocols/work is one of the goals of the document.

The document also acknowledges that devices have different capabilities and requirements, also in terms of security. In my view, this fits with the idea of minimum requirements. It would be great to have your input on your use cases and your views on minimum assumptions in different deployment scenarios/security capabilities of different types of devices.

Cheers, Oscar.


-----Original Message-----
From: T2TRG [mailto:t2trg-bounces@irtf.org] On Behalf Of Hannes Tschofenig
Sent: Wednesday, March 8, 2017 3:13 PM
To: Eliot Lear <lear@cisco.com>; Kovatsch, Matthias <matthias.kovatsch@siemens.com>; mcr+ietf@sandelman.ca
Cc: T2TRG@irtf.org
Subject: Re: [T2TRG] RESTful Design & Security

Hi Eliot,

this would indeed be a good conversation to have. I have tried to trigger it a couple of times in context of the IoT device classes but it is very hard to get people to state what their minimum assumptions are.

I believe it has to do with the type of standardization approach we are exercising today and this gives us a hard time to describe the big picture of how the various building blocks are supposed to work together. In fact, the picture becomes extremely complex and fragmented since there are just so many options while at the same time we envision super constrained devices. The T2TRG security document
(draft-irtf-t2trg-iot-seccons-01) confirms this and happily talks about normal IPsec/IKE, diet IPsec, HIP, MIKEY, OSCOAP, JOSE, COSE, etc. etc.

Ciao
Hannes

On 03/08/2017 11:02 AM, Eliot Lear wrote:
> Matthias,
>
> I think the key question that everyone seems to be dancing around is this:
>
> What is an Internet host in the context of IoT?  What are the minimum
> qualities it must possess?  I don't mean this to be a vote, but more
> of a law of physics sort of thing.  For instance, does a host have a
> secure unique identity?  What capabilities must it have?  I would
> expect them to be very few, but there are assuredly some...
>
> Eliot
>
>
> On 3/7/17 8:36 PM, Kovatsch, Matthias wrote:
>> Fair enough.
>>
>> Yes, I am on this IoT Directorate. I would say a large fraction of
>> the T2TRG participants has been arguing that the Internet of Gateways
>> is not a good approach. Your security-related summary proves this point.
>>
>> I personally don't see end-to-end security happening if we keep
>> mixing application protocols, keep using black-magic middleboxes, and
>> keep using proprietary interfaces at the device level. We need
>> something end-to-end (or T2T) for end-to-end security.
>>
>> Best wishes
>> Matthias
>>
>>
>>
>> Sent from my phone, limitations might apply.
>>
>> -----Original Message-----
>> *From:* Hannes Tschofenig [hannes.tschofenig@gmx.net]
>> *Received:* Tuesday, 07 Mar 2017, 20:10
>> *To:* Kovatsch, Matthias (CT RDA NEC EMB-DE)
>> [matthias.kovatsch@siemens.com]; mcr+ietf@sandelman.ca
>> [mcr+ietf@sandelman.ca]
>> *CC:* T2TRG@irtf.org [T2TRG@irtf.org]
>> *Subject:* Re: [T2TRG] RESTful Design & Security
>>
>> Hi Matthias,
>>
>> I know that this is a research group and everyone can create whatever
>> they want.
>>
>> We briefly talked about security at the IoT directorate conference
>> call and I would be interesting to hear what works and what does not
>> work for others.
>>
>> Ciao
>> Hannes
>>
>>
>> On 03/07/2017 07:45 PM, Kovatsch, Matthias wrote:
>> > On big propaganda tour? :P
>> >
>> > Regards
>> > Matthias
>> >
>> >
>> > Sent from my phone, limitations might apply.
>> >
>> > -----Original Message-----
>> > *From:* Hannes Tschofenig [hannes.tschofenig@gmx.net]
>> > *Received:* Tuesday, 07 Mar 2017, 19:39
>> > *To:* Michael Richardson [mcr+ietf@sandelman.ca]
>> > *CC:* t2trg@irtf.org [T2TRG@irtf.org]
>> > *Subject:* Re: [T2TRG] RESTful Design & Security
>> >
>> > OSCOAP does not work when
>> >
>> > * you mix protocols,
>> > * use a middlebox for some processing interactions (such as data
>> > aggregation), and
>> > * when one of the protocols is a non-RESTful protocol, such as BLE
>> or MQTT.
>> >
>> > Unfortunately, these the use cases we are facing in current IoT
>> > deployments. For similar reasons we cannot use RFC 8075 either.
>> >
>> > Maybe you are seeing different deployment environments.
>> >
>> > Ciao
>> > Hannes
>> >
>> > On 03/07/2017 06:39 PM, Michael Richardson wrote:
>> >>
>> >> Hannes Tschofenig <hannes.tschofenig@gmx.net> wrote:
>> >>     > Needless to say that these challenges have also been
>> >> observed
>> in other
>> >>     > protocols as well, such as HTTP and even SIP.
>> >>
>> >>     > What is the story for providing application layer security?
>> >>
>> >> OSCOAP seems to be end-to-end to me.
>> >>
>> >> --
>> >> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software
>> >> Works  -= IPv6 IoT consulting =-
>> >>
>> >>
>> >>
>> >
>> >
>> >
>> > _______________________________________________
>> > T2TRG mailing list
>> > T2TRG@irtf.org
>> > https://www.irtf.org/mailman/listinfo/t2trg
>> >
>>
>>
>>
>> _______________________________________________
>> T2TRG mailing list
>> T2TRG@irtf.org
>> https://www.irtf.org/mailman/listinfo/t2trg
>


________________________________
The information contained in this message may be confidential and legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this message is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original message.