Re: [tcmtf] Answers to possible questions in the BOF
Dan Wing <dwing@cisco.com> Fri, 12 July 2013 15:53 UTC
Return-Path: <dwing@cisco.com>
X-Original-To: tcmtf@ietfa.amsl.com
Delivered-To: tcmtf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 407BC21F9ECE for <tcmtf@ietfa.amsl.com>; Fri, 12 Jul 2013 08:53:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.485
X-Spam-Level:
X-Spam-Status: No, score=-110.485 tagged_above=-999 required=5 tests=[AWL=0.114, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZjF5aRY3wetd for <tcmtf@ietfa.amsl.com>; Fri, 12 Jul 2013 08:53:17 -0700 (PDT)
Received: from mtv-iport-4.cisco.com (mtv-iport-4.cisco.com [173.36.130.15]) by ietfa.amsl.com (Postfix) with ESMTP id 510F721F9E77 for <tcmtf@ietf.org>; Fri, 12 Jul 2013 08:53:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19784; q=dns/txt; s=iport; t=1373644395; x=1374853995; h=mime-version:subject:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=b+dTAaSICdRrSTgBXFdI/QpiiT5ZeMSmg1S6BAGU4e8=; b=Z3bwsZr4EjUCgzY1nZJspOMSvivTlVBsuKm9bn/E+uOsvj+zICkjiqSy hIonVVtW9gCjOcUmLrTOFKtDJgcGDgSbuEMJEx3vp8aOL5C0Cf1NWcLc1 /utvMTf/CrWnNTZjpmmFaBfHGweRXFZffFrX2sDkpUP9VDiFDNwUmugWe g=;
X-IronPort-AV: E=Sophos;i="4.89,654,1367971200"; d="scan'208";a="85810458"
Received: from mtv-core-1.cisco.com ([171.68.58.6]) by mtv-iport-4.cisco.com with ESMTP; 12 Jul 2013 15:53:12 +0000
Received: from sjc-vpn3-1253.cisco.com (sjc-vpn3-1253.cisco.com [10.21.68.229]) by mtv-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id r6CFrBhF027695; Fri, 12 Jul 2013 15:53:11 GMT
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Dan Wing <dwing@cisco.com>
In-Reply-To: <007a01ce7d42$3260a0b0$9721e210$@unizar.es>
Date: Fri, 12 Jul 2013 08:53:11 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <961D17FB-C262-41A9-88C8-AF1B0CF32BD6@cisco.com>
References: "\"<007e01ce70c9$fe1a0aa0$fa4e1fe0$@unizar.es> <009901ce725a$d1623360$74269a20$@unizar.es> <2543ED38-A2FF-49D7-85E0-4790A31415BC@cisco.com>" <20130628105725.lmag0xgqsgogggww@webmail.unizar.es> <004601ce7bac$c8fc91b0$5af5b510$@unizar.es> <E6D8B95470ED0845B3376F61DCAB1A049CD0C7F1@EX10-MB2-MAD.hi.inet> <00b001ce7c91$1dcc6640$596532c0$@unizar.es> <408173bf1a2c57640e76ca5e8808a01b.squirrel@www.erg.abdn.ac.uk> <007a01ce7d42$3260a0b0$9721e210$@unizar.es>
To: jsaldana@unizar.es
X-Mailer: Apple Mail (2.1508)
Cc: gorry@erg.abdn.ac.uk, tcmtf@ietf.org, "'Diego R. Lopez'" <diego@tid.es>, 'jsalazar' <jsalazar@unizar.es>, "'Muthu Arul Mozhi Perumal (mperumal)'" <mperumal@cisco.com>
Subject: Re: [tcmtf] Answers to possible questions in the BOF
X-BeenThere: tcmtf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Tunneling Compressed Multiplexed Traffic Flows \(TCMTF\) discussion list" <tcmtf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcmtf>
List-Post: <mailto:tcmtf@ietf.org>
List-Help: <mailto:tcmtf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jul 2013 15:53:22 -0000
On Jul 10, 2013, at 12:50 AM, Jose Saldana <jsaldana@unizar.es> wrote: > What about these "security considerations"? (including Gorry's suggestions): > > ------ > The most straightforward option for securing a number of non-secured flows > sharing a path is by the use of IPsec [IPsec], when TCM using an IP tunnel > is employed. Instead of adding a security header to the packets of each > native flow, and then compressing and multiplexing them, a single IPsec > tunnel can be used in order to secure all the flows together, thus achieving > a higher efficiency. This use of IPsec protects the packets only within the > transport network between tunnel ingress and egress and therefore does not > provide end-to-end authentication or encryption. In some cases , e.g., where > the end points are trusted, this model may be appropriate. I was agreeing with you until the example, which suggests endpoint trust is somehow useful/important for using IPsec to protect traffic. It is not relevant if the endpoints are trusted (botnet traffic is perfectly okay to get put inside an IPsec tunnel); rather, it is relevant to use IPsec if the IPsec-protected path is vulnerable to attack (passive attack [sniffing] or active attack [injection]). I would just drop that last sentence (the sentence starting with "In some case, ..."). > When a number of already secured flows including ESP [RFC4303] headers are > optimized by means of TCM, and the addition of further security is not > necessary, their ESP/IP headers can still be compressed using suitable > algorithms [RFC5225], in order to improve the efficiency. This header > compression does not change the end-to-end security model. > > Future versions of this document will consider whether some TCM-TF > mechanisms could be potentially exploited in order to deploy or amplify DoS > attacks against network infrastructure. > ----- Gorry was worried about DoS of TCMTF itself, too. So change last paragraph to also say "will consider DoS vulnerability of TCM-TF itself" in addition to what you already have about TCMTF being used to create a DoS attack against other stuff. But, keeping it simpler, how about just saying: "The resilience of TCM-TF to denial of service, and the use of TCM-TF to deny service to other parts of the network infrastructure, is for future study." -d > Do you think the third paragraph should be included in this version? Should > we wait before talking about that? > > Thanks, Gorry, > > Jose > >> -----Mensaje original----- >> De: gorry@erg.abdn.ac.uk [mailto:gorry@erg.abdn.ac.uk] >> Enviado el: martes, 09 de julio de 2013 12:56 >> Para: jsaldana@unizar.es >> CC: 'Diego R. Lopez'; tcmtf@ietf.org; 'Muthu Arul Mozhi Perumal >> (mperumal)'; 'jsalazar'; 'Dan Wing' >> Asunto: Re: [tcmtf] Answers to possible questions in the BOF >> >> A few comments on the security considerations. >> >> Can you also please add the counter-argument to using IPsec? >> >> - This use of IPsec protects the packets only within the transport network >> between tunnel ingress and egress and therefore does not provide end-to- >> end authentication or encryption. In some cases , e.g. where the end > points >> are trusted this model may be appropriate. >> >> - On the second point, please clarify: >> -- which headers are compressed? >> -- does this change the end-to-end security model (I think not). >> >> I suggest you quote RFCs for the security mechanisms that you discuss. >> >> Finally, you may like to consider DoS attacks against TCMTF. Transport > groups >> are usually required to consider whether the mechanisms can be exploited >> to generate traffic that does not respond to congestion control or can be >> used to amplify the attack on network infrastructure. If you can comment > on >> these that would seem good - I suggest you should note this as future work >> in later revisions of the draft. >> >> Gorry >> >> >>> Hi all, >>> >>> I am finishing the next version of the draft. In the "security >>> considerations" section in the end. The idea is talking about the two >>> options (as summarized by Diego): >>> >>> - Securing the application of TCMTF itself >>> - Applying TCMTF to enhance (or provide a better support to) security >>> network services, like IPsec or VPNs >>> >>> So I would include these two paragraphs, if you agree: >>> >>> >>> The most straightforward option for securing a number of non-secured >>> flows sharing a path is by the use of IPsec [IPsec], when TCM using an >>> IP tunnel is employed. Instead of adding a security header to the >>> packets of each native flow, and then compressing and multiplexing, a >>> single IPsec tunnel can be used in order to secure all the flows >>> together, thus achieving a better efficiency. >>> >>> When a number of already secured flows including ESP headers is >>> optimized by means of TCM, and the addition of further security is not >>> necessary, their ESP headers can still be compressed using suitable >>> algorithms, in order to improve the efficiency. >>> >>> >>> Any improvements? Any other ideas? >>> >>> Jose >>> >>>> -----Mensaje original----- >>>> De: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] En nombre >>>> de Diego R. Lopez Enviado el: lunes, 08 de julio de 2013 11:59 >>>> Para: <jsaldana@unizar.es> >>>> CC: <tcmtf@ietf.org>; Muthu Arul Mozhi Perumal (mperumal); jsalazar; >>>> Dan Wing >>>> Asunto: Re: [tcmtf] Answers to possible questions in the BOF >>>> >>>> Hi, >>>> >>>> When talking about security, we should not forget two different > aspects: >>>> >>>> 1) Applying TCMTF to enhance (or provide a better support to) >>>> security network services, like IPsec or VPNs >>>> >>>> 2) Securing the application of TCMTF itself >>>> >>>> As far as I can tell, most of the discussion so far has been on the >>>> first >>> aspect. >>>> This could be outlined as an use case, and further discussed in a >>>> separate document if required, oriented towards "Applying TCMTF in >>>> secure environments" or the like >>>> >>>> Regarding the second issue, I tried to make a few points some time ago: >>>> >>>> 8<--- >>>> >>>>> We can consider different security contexts for different tunnels, >>> according >>>> to some policy agreed by both end-points at a given tunnel. The >>>> security contexts would define encryption, authentication, or both. >>>> We'd have to go into more detail to evaluate potential savings, but I >>>> have the feeling >>> they >>>> could be worth considering. >>>>> >>>>> The point is that if we go for these different security contexts, >>>>> we >>> must >>>> consider how they can be established by mutual authentication of the >>> tunnel >>>> end-points, and this opens additional issues regarding configuration >>>> and crypto material exchange, as well as the possibility of >>>> user-initiated authentication by means of protocols like OAuth. >>>>> >>>>> I'd keep this in the list of the "soon-to-open" issues, focusing on >>>> the >>> three >>>> main docs we have been discussing so far. >>>> >>>> 8<--- >>>> >>>> I had the intention to elaborate them a little more, but other >>>> matters >>> pre- >>>> empted this :-( My take is that some reflections on this should be >>> included in >>>> the "Security Considerations" section of the framework document, and >>>> a further document on this be considered in a further stage. >>>> >>>> Be goode, >>>> >>>> On 8 Jul 2013, at 09:28 , Jose Saldana wrote: >>>> >>>>> Hi, Muthu, Dan, Jose Luis. >>>>> >>>>> It seems that we have identified some cases in which different >>>> security >>>> options are possible. The question here is: >>>>> >>>>> Can this be issued in the TCMTF main draft (TCMTF Reference Model)? >>>>> >>>>> Or do you think a TCMTF-security document would be interesting? >>>>> >>>>> Jose >>>>> >>>>> -----Mensaje original----- >>>>> De: jsalazar [mailto:jsalazar@unizar.es] Enviado el: jueves, 04 de >>>>> julio de 2013 19:36 >>>>> Para: jsaldana@unizar.es >>>>> Asunto: RE: [tcmtf] Answers to possible questions in the BOF >>>>> >>>>> Hi all. >>>>> With your last question, you have just hit the bullseye. I think >>>>> the >>>> classification is correct. Cases 1 and 2a are a good way to keep the >>>> compromise between security and efficency. However, case 2b gives a >>>> step beyond and the security is compromised in the interest of > efficiency. >>>>> In that case, users have to trust in tcmtf manager for managing >>>>> their privacy also. Then, we will leave the tipical Public Key >>>>> Infraestructure >>>>> (PKI) security architecture and use the Identity Based Encryption >>>> (IBE) >>> one >>>> (http://tools.ietf.org/html/rfc5408). >>>>> They are three different scenarios and all of them seem to be very >>>> interesting, but the last one a bit more. >>>>> Regards: >>>>> >>>>> JL >>>>> >>>>> "I see them falling out the skies like eagles All mirrored glass >>>>> and >>> shattered >>>> egos" >>>>> >>>>> Simple Minds. >>>>> >>>>> El 2013-07-03 17:58, Jose Saldana escribió: >>>>>> Hi, Jose Luis. Good point. >>>>>> >>>>>> Regarding security, we could establish this classification: >>>>>> >>>>>> 1- Adding security to TCM: I have a number of non-secured flows >>>>>> traveling through a "dangerous" network segment (perhaps a tunnel >>>>>> between appliances connecting remote offices of a company), and I >>>>>> want not only traffic optimization but also security. In this >>>>>> case, I can simply use IPsec on the tunnel. >>>>>> >>>>>> >>>>>> 2- Using TCM for optimizing already secured communications: I have >>>>>> a bunch of already secured flows. Which is the best way for >>>>>> tunneling, compressing and multiplexing them? >>>>>> >>>>>> Two subcases: >>>>>> >>>>>> 2a- I can use TCM normally, but not only compress IP, TCP or UDP >>>>>> headers, but also security headers using a header compression >> method. >>>>>> Some possibilities for compressing security headers: >>>>>> >>>>>> - ROHCoIPsec, RFC5856 (http://tools.ietf.org/html/rfc5856) >>>>>> - RFC5225 http://tools.ietf.org/html/rfc5225 >>>>>> >>>>>> >>>>>> 2b- But I can save more bandwidth if the TCM-ingress optimizer >>>>>> (TCM-IO) is able to: >>>>>> - rebuild the packets to their native form >>>>>> - TCM-optimize them >>>>>> - put them into a single security tunnel >>>>>> >>>>>> I have three phases (let's suppose I have 20 communications): >>>>>> >>>>>> Origin 1 >>>>>> Origin 2 <----20 secured flows --------> TCM-IO <------1 >>>>>> tunnel------> TCM-EO <-------- 20 secured flows----> destination >>>>>> tunnel------> 1, 2, >>>>>> 20 >>>>>> ... >>>>>> Origin 20 >>>>>> >>>>>> I have an advantage: In the shared network path, I use a single >>>>>> tunnel instead of 20 different tunnels. >>>>>> >>>>>> But I have some additional requirements: I need processing >>>>>> capacity in the TCM optimizers, and the endpoints should trust them. >>>>>> >>>>>> >>>>>> Is this classification correct? Any other options? Any other >>>>>> requirements? It is time for "security experts". >>>>>> >>>>>> Jose >>>>>> >>>>>> -----Mensaje original----- >>>>>> De: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] En >>>>>> nombre de jsalazar Enviado el: lunes, 01 de julio de 2013 20:50 >>>>>> Para: tcmtf@ietf.org >>>>>> Asunto: Re: [tcmtf] Answers to possible questions in the BOF >>>>>> >>>>>> Hi all: >>>>>> Mmmmmmm. Since I see tcm-tf as a service, I can design the service >>>>>> with added security features that the type of communication is >>>>>> requiring. I think we have to be clear what we are expressing when >>>>>> we are talking about secure tcm-tf: Ensuring the service tcm-tf or >>>>>> applying the tcm-tf service for secure communications. >>>>>> The first possibility is not a great technological sophistication >>>>>> and the second one might consider the first one as a possible >>>>>> additional service. >>>>>> Therefore, >>>>>> every time we use the term "secure tcm-tf" should think the second >>>>>> option, for generality. >>>>>> On the other hand, we must also keep in mind that whenever users >>>>>> employ secure tcm-tf, they must trust the service fully and >>>>>> consider delegating the use of their keys (including private ones) > to >> tcm-tf. >>>>>> >>>>>> Regards. >>>>>> >>>>>> JL >>>>>> >>>>>> "I see them falling out the skies like eagles All mirrored glass >>>>>> and shattered egos" >>>>>> >>>>>> Simple Minds. >>>>>> >>>>>> El 2013-07-01 18:55, Dan Wing escribió: >>>>>>> On Jun 28, 2013, at 1:57 AM, jltornos@unizar.es wrote: >>>>>>> >>>>>>> Hi all, >>>>>>> >>>>>>> Few days ago Julian talked about TCM-TF's security and now I've >>>>>>> read in the link included by Dan, saying that the gain obtained >>>>>>> when multiplexing Ipsec-encrypted packets is 20-to-1. We have >>>>>>> been looking for more information about this issue and thinking >>>>>>> about a way to reduce the needed bandwidth in IPsec flows. >>>>>>> >>>>>>> The main idea is to find a way to change the authentication of >>>>>>> the individual packets and merge all of them in a unique >> authentication. >>>>>>> Thus, instead of using 20 IPsec tunnels, we would have a single >>>>>>> tunnel including 20 flows. Is this something similar than how >>>>>>> Cisco gets the improvement? >>>>>>> >>>>>>> We would not be able to change IPsec any more than we could >>>>>>> change TCP, so I would not look at how to change IPsec >> authentication. >>>>>>> >>>>>>> However, if there are a bunch of IPsec packets sharing a common >>>>>>> path, I could see them being successfully multiplexed into one >>>>>>> larger packet at one tunnel endpoint and then de-multiplexed at >>>>>>> the other tunnel endpoint. This can provide a packet per second >>>>>>> reduction. I don't think there are enough bytes in an IPsec >>>>>>> header to bother trying to do IPsec header compression (SPI and >>>>>>> sequence >>>> number are only 64 bits). >>>>>>> >>>>>>> -d >>>>>>> >>>>>>> >>>>>>> >>>>>>> José Luis >>>>>>> >>>>>>> >>>>>>> >>>>>>> Dan Wing <dwing@cisco.com> ha escrito: >>>>>>> >>>>>>> >>>>>>> On Jun 26, 2013, at 3:49 AM, Jose Saldana <jsaldana@unizar.es> >>>> wrote: >>>>>>> >>>>>>> Question 4: Is TCM-TF interesting for the Industry? Should the >>>>>>> IETF standardize this? >>>>>>> >>>>>>> Answer: >>>>>>> >>>>>>> 1) TCM-TF intends to update RFC4170, which optimizes RTP VoIP >>> traffic. >>>>>>> So if RFC4170 was interesting, why not updating it? >>>>>>> >>>>>>> 2) TCM-TF can be useful in order to save bandwidth in many cases: >>>>>>> >>>>>>> - Aggregation network of *network operators*: We are saving >>>>>>> bandwidth by optimizing and putting together traffic flows. Is >>>>>>> this interesting for a network operator? What about >> overprovisioning? >>>>>>> The idea is that there are places and moments in which a number >>>>>>> of flows based on small packets are in the same place and at the >>>>>>> same moment. Then, TCM-TF can be applied in order to provide >> flexibility. >>>>>>> We are not optimizing the overall Internet traffic, we are >>>>>>> optimizing specific flows with very tight delay requirements, >>>>>>> which network operators have to take care of in a special way. >>>>>>> www.huawei.com/ilink/en/download/HW_193034 >>>>>>> >>>>>>> - *End to end* optimization: Nowadays, many appliances are used >>>>>>> to connect remote offices of the same company (creating a VPN). >>>>>>> So if a tunnel exists, why not optimizing this traffic when >>>>>>> possible? We would save bandwidth in the access network, where it >> can be scarce. >>>>>>> >>>>>>> - Wireless and satellite scenarios. >>>>>>> >>>>>>> "Cisco adds IP multiplexing to mobile satellite package", April >>>>>>> 2012, >>>>>>> http://www.networkworld.com/news/2012/040912-cisco-ip- >>>> multiplexing- >>>>>> 258082.html >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> Any other thoughts? Any other scenarios in mind? Potential >>>>>>> beneficiaries? >>>>>>> >>>>>>> Some networks, today, use cRTP (RFC2508) on their access links. >>>> This >>>>>>> gives bandwidth savings on the access link, but consumes >>>>>>> considerable CPU horsepower on the aggregation router (to perform >>>> cRTP), but >>>>>>> provides no bandwidth savings across the network core. If, >>>> instead, >>>>>>> the bandwidth could be saved on the access link, across the >>>>>>> core, and on the far-end access link -- all without the CPU >>>>>>> impact on the aggregation router -- it is a considerable win. >>>>>>> >>>>>>> -d >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> Jose >>>>>>> >>>>>>> De: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] En >>>> nombre >>>>>>> de Jose Saldana Enviado el: lunes, 24 de junio de 2013 13:00 >>>>>>> Para: tcmtf@ietf.org >>>>>>> Asunto: [tcmtf] Answers to possible questions in the BOF >>>>>>> >>>>>>> I would like to start a thread about possible questions people >>>>>>> may ask in the BOF. Obviously, we also need answers, so we should >>>> cooperate. >>>>>>> >>>>>>> This is different from the "questions to ask in the BOF". This >>>>>>> will be discussed separately. >>>>>>> >>>>>>> Thanks! >>>>>>> >>>>>>> Jose >>>>>>> >>>>>>> _______________________________________________ >>>>>>> tcmtf mailing list >>>>>>> tcmtf@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/tcmtf >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> _______________________________________________ >>>>>>> tcmtf mailing list >>>>>>> tcmtf@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/tcmtf >>>>>> >>>>>> _______________________________________________ >>>>>> tcmtf mailing list >>>>>> tcmtf@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/tcmtf >>>>> >>>>> _______________________________________________ >>>>> tcmtf mailing list >>>>> tcmtf@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/tcmtf >>>> >>>> >>>> -- >>>> "Esta vez no fallaremos, Doctor Infierno" >>>> >>>> Dr Diego R. Lopez >>>> Telefonica I+D >>>> http://people.tid.es/diego.lopez/ >>>> >>>> e-mail: diego@tid.es >>>> Tel: +34 913 129 041 >>>> Mobile: +34 682 051 091 >>>> ----------------------------------------- >>>> >>>> >>>> ________________________________ >>>> >>>> Este mensaje se dirige exclusivamente a su destinatario. Puede >>>> consultar nuestra política de envío y recepción de correo electrónico >>>> en el enlace situado más abajo. >>>> This message is intended exclusively for its addressee. We only send >>>> and receive email on the basis of the terms set out at: >>>> http://www.tid.es/ES/PAGINAS/disclaimer.aspx >>>> _______________________________________________ >>>> tcmtf mailing list >>>> tcmtf@ietf.org >>>> https://www.ietf.org/mailman/listinfo/tcmtf >>> >>> _______________________________________________ >>> tcmtf mailing list >>> tcmtf@ietf.org >>> https://www.ietf.org/mailman/listinfo/tcmtf >>> > >
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- [tcmtf] Answers to possible questions in the BOF Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Julián Fernández-Navajas
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Julián Fernández-Navajas
- Re: [tcmtf] Answers to possible questions in the … Mirko Sužnjević
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … DAVID FLOREZ RODRIGUEZ
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Tomaso.deCola
- Re: [tcmtf] Answers to possible questions in the … jltornos
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Michael Ramalho (mramalho)
- Re: [tcmtf] Answers to possible questions in the … jsalazar
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Michael Ramalho (mramalho)
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- [tcmtf] Fwd: RE: Answers to possible questions in… jsalazar
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Diego R. Lopez
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … gorry
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … jltornos
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Spencer Dawkins
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Diego R. Lopez