Re: [tcmtf] Answers to possible questions in the BOF
"Jose Saldana" <jsaldana@unizar.es> Wed, 10 July 2013 07:51 UTC
Return-Path: <jsaldana@unizar.es>
X-Original-To: tcmtf@ietfa.amsl.com
Delivered-To: tcmtf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A89121F9C0A for <tcmtf@ietfa.amsl.com>; Wed, 10 Jul 2013 00:51:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.285
X-Spam-Level:
X-Spam-Status: No, score=-6.285 tagged_above=-999 required=5 tests=[AWL=0.314, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qebYHIYOM1Zz for <tcmtf@ietfa.amsl.com>; Wed, 10 Jul 2013 00:50:56 -0700 (PDT)
Received: from ortiz.unizar.es (ortiz.unizar.es [155.210.1.52]) by ietfa.amsl.com (Postfix) with ESMTP id 116B721F9BA8 for <tcmtf@ietf.org>; Wed, 10 Jul 2013 00:50:54 -0700 (PDT)
Received: from usuarioPC (gtc1pc12.cps.unizar.es [155.210.158.17]) by ortiz.unizar.es (8.13.8/8.13.8/Debian-3) with ESMTP id r6A7oYMA021190; Wed, 10 Jul 2013 09:50:47 +0200
From: Jose Saldana <jsaldana@unizar.es>
To: gorry@erg.abdn.ac.uk
References: "\"<007e01ce70c9$fe1a0aa0$fa4e1fe0$@unizar.es> <009901ce725a$d1623360$74269a20$@unizar.es> <2543ED38-A2FF-49D7-85E0-4790A31415BC@cisco.com>" <20130628105725.lmag0xgqsgogggww@webmail.unizar.es> <004601ce7bac$c8fc91b0$5af5b510$@unizar.es> <E6D8B95470ED0845B3376F61DCAB1A049CD0C7F1@EX10-MB2-MAD.hi.inet> <00b001ce7c91$1dcc6640$596532c0$@unizar.es> <408173bf1a2c57640e76ca5e8808a01b.squirrel@www.erg.abdn.ac.uk>
In-Reply-To: <408173bf1a2c57640e76ca5e8808a01b.squirrel@www.erg.abdn.ac.uk>
Date: Wed, 10 Jul 2013 09:50:50 +0200
Organization: Universidad de Zaragoza
Message-ID: <007a01ce7d42$3260a0b0$9721e210$@unizar.es>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQHxl5HfJe4XxEPJrqhURPk2/vEH5gJG8kQSAT8jBAUB238Z4AI2LB8yAU3srAwCFm+DUgLcQT0qmKiNLEA=
Content-Language: es
X-Mail-Scanned: Criba 2.0 + Clamd & Bogofilter
Cc: tcmtf@ietf.org, "'Muthu Arul Mozhi Perumal (mperumal)'" <mperumal@cisco.com>, "'Diego R. Lopez'" <diego@tid.es>, 'jsalazar' <jsalazar@unizar.es>, 'Dan Wing' <dwing@cisco.com>
Subject: Re: [tcmtf] Answers to possible questions in the BOF
X-BeenThere: tcmtf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: jsaldana@unizar.es
List-Id: "Tunneling Compressed Multiplexed Traffic Flows \(TCMTF\) discussion list" <tcmtf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcmtf>
List-Post: <mailto:tcmtf@ietf.org>
List-Help: <mailto:tcmtf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jul 2013 07:51:07 -0000
What about these "security considerations"? (including Gorry's suggestions): ------ The most straightforward option for securing a number of non-secured flows sharing a path is by the use of IPsec [IPsec], when TCM using an IP tunnel is employed. Instead of adding a security header to the packets of each native flow, and then compressing and multiplexing them, a single IPsec tunnel can be used in order to secure all the flows together, thus achieving a higher efficiency. This use of IPsec protects the packets only within the transport network between tunnel ingress and egress and therefore does not provide end-to-end authentication or encryption. In some cases , e.g., where the end points are trusted, this model may be appropriate. When a number of already secured flows including ESP [RFC4303] headers are optimized by means of TCM, and the addition of further security is not necessary, their ESP/IP headers can still be compressed using suitable algorithms [RFC5225], in order to improve the efficiency. This header compression does not change the end-to-end security model. Future versions of this document will consider whether some TCM-TF mechanisms could be potentially exploited in order to deploy or amplify DoS attacks against network infrastructure. ----- Do you think the third paragraph should be included in this version? Should we wait before talking about that? Thanks, Gorry, Jose > -----Mensaje original----- > De: gorry@erg.abdn.ac.uk [mailto:gorry@erg.abdn.ac.uk] > Enviado el: martes, 09 de julio de 2013 12:56 > Para: jsaldana@unizar.es > CC: 'Diego R. Lopez'; tcmtf@ietf.org; 'Muthu Arul Mozhi Perumal > (mperumal)'; 'jsalazar'; 'Dan Wing' > Asunto: Re: [tcmtf] Answers to possible questions in the BOF > > A few comments on the security considerations. > > Can you also please add the counter-argument to using IPsec? > > - This use of IPsec protects the packets only within the transport network > between tunnel ingress and egress and therefore does not provide end-to- > end authentication or encryption. In some cases , e.g. where the end points > are trusted this model may be appropriate. > > - On the second point, please clarify: > -- which headers are compressed? > -- does this change the end-to-end security model (I think not). > > I suggest you quote RFCs for the security mechanisms that you discuss. > > Finally, you may like to consider DoS attacks against TCMTF. Transport groups > are usually required to consider whether the mechanisms can be exploited > to generate traffic that does not respond to congestion control or can be > used to amplify the attack on network infrastructure. If you can comment on > these that would seem good - I suggest you should note this as future work > in later revisions of the draft. > > Gorry > > > > Hi all, > > > > I am finishing the next version of the draft. In the "security > > considerations" section in the end. The idea is talking about the two > > options (as summarized by Diego): > > > > - Securing the application of TCMTF itself > > - Applying TCMTF to enhance (or provide a better support to) security > > network services, like IPsec or VPNs > > > > So I would include these two paragraphs, if you agree: > > > > > > The most straightforward option for securing a number of non-secured > > flows sharing a path is by the use of IPsec [IPsec], when TCM using an > > IP tunnel is employed. Instead of adding a security header to the > > packets of each native flow, and then compressing and multiplexing, a > > single IPsec tunnel can be used in order to secure all the flows > > together, thus achieving a better efficiency. > > > > When a number of already secured flows including ESP headers is > > optimized by means of TCM, and the addition of further security is not > > necessary, their ESP headers can still be compressed using suitable > > algorithms, in order to improve the efficiency. > > > > > > Any improvements? Any other ideas? > > > > Jose > > > >> -----Mensaje original----- > >> De: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] En nombre > >> de Diego R. Lopez Enviado el: lunes, 08 de julio de 2013 11:59 > >> Para: <jsaldana@unizar.es> > >> CC: <tcmtf@ietf.org>; Muthu Arul Mozhi Perumal (mperumal); jsalazar; > >> Dan Wing > >> Asunto: Re: [tcmtf] Answers to possible questions in the BOF > >> > >> Hi, > >> > >> When talking about security, we should not forget two different aspects: > >> > >> 1) Applying TCMTF to enhance (or provide a better support to) > >> security network services, like IPsec or VPNs > >> > >> 2) Securing the application of TCMTF itself > >> > >> As far as I can tell, most of the discussion so far has been on the > >> first > > aspect. > >> This could be outlined as an use case, and further discussed in a > >> separate document if required, oriented towards "Applying TCMTF in > >> secure environments" or the like > >> > >> Regarding the second issue, I tried to make a few points some time ago: > >> > >> 8<--- > >> > >> > We can consider different security contexts for different tunnels, > > according > >> to some policy agreed by both end-points at a given tunnel. The > >> security contexts would define encryption, authentication, or both. > >> We'd have to go into more detail to evaluate potential savings, but I > >> have the feeling > > they > >> could be worth considering. > >> > > >> > The point is that if we go for these different security contexts, > >> > we > > must > >> consider how they can be established by mutual authentication of the > > tunnel > >> end-points, and this opens additional issues regarding configuration > >> and crypto material exchange, as well as the possibility of > >> user-initiated authentication by means of protocols like OAuth. > >> > > >> > I'd keep this in the list of the "soon-to-open" issues, focusing on > >> the > > three > >> main docs we have been discussing so far. > >> > >> 8<--- > >> > >> I had the intention to elaborate them a little more, but other > >> matters > > pre- > >> empted this :-( My take is that some reflections on this should be > > included in > >> the "Security Considerations" section of the framework document, and > >> a further document on this be considered in a further stage. > >> > >> Be goode, > >> > >> On 8 Jul 2013, at 09:28 , Jose Saldana wrote: > >> > >> > Hi, Muthu, Dan, Jose Luis. > >> > > >> > It seems that we have identified some cases in which different > >> security > >> options are possible. The question here is: > >> > > >> > Can this be issued in the TCMTF main draft (TCMTF Reference Model)? > >> > > >> > Or do you think a TCMTF-security document would be interesting? > >> > > >> > Jose > >> > > >> > -----Mensaje original----- > >> > De: jsalazar [mailto:jsalazar@unizar.es] Enviado el: jueves, 04 de > >> > julio de 2013 19:36 > >> > Para: jsaldana@unizar.es > >> > Asunto: RE: [tcmtf] Answers to possible questions in the BOF > >> > > >> > Hi all. > >> > With your last question, you have just hit the bullseye. I think > >> > the > >> classification is correct. Cases 1 and 2a are a good way to keep the > >> compromise between security and efficency. However, case 2b gives a > >> step beyond and the security is compromised in the interest of efficiency. > >> > In that case, users have to trust in tcmtf manager for managing > >> > their privacy also. Then, we will leave the tipical Public Key > >> > Infraestructure > >> > (PKI) security architecture and use the Identity Based Encryption > >> (IBE) > > one > >> (http://tools.ietf.org/html/rfc5408). > >> > They are three different scenarios and all of them seem to be very > >> interesting, but the last one a bit more. > >> > Regards: > >> > > >> > JL > >> > > >> > "I see them falling out the skies like eagles All mirrored glass > >> > and > > shattered > >> egos" > >> > > >> > Simple Minds. > >> > > >> > El 2013-07-03 17:58, Jose Saldana escribió: > >> >> Hi, Jose Luis. Good point. > >> >> > >> >> Regarding security, we could establish this classification: > >> >> > >> >> 1- Adding security to TCM: I have a number of non-secured flows > >> >> traveling through a dangerous network segment (perhaps a tunnel > >> >> between appliances connecting remote offices of a company), and I > >> >> want not only traffic optimization but also security. In this > >> >> case, I can simply use IPsec on the tunnel. > >> >> > >> >> > >> >> 2- Using TCM for optimizing already secured communications: I have > >> >> a bunch of already secured flows. Which is the best way for > >> >> tunneling, compressing and multiplexing them? > >> >> > >> >> Two subcases: > >> >> > >> >> 2a- I can use TCM normally, but not only compress IP, TCP or UDP > >> >> headers, but also security headers using a header compression > method. > >> >> Some possibilities for compressing security headers: > >> >> > >> >> - ROHCoIPsec, RFC5856 (http://tools.ietf.org/html/rfc5856) > >> >> - RFC5225 http://tools.ietf.org/html/rfc5225 > >> >> > >> >> > >> >> 2b- But I can save more bandwidth if the TCM-ingress optimizer > >> >> (TCM-IO) is able to: > >> >> - rebuild the packets to their native form > >> >> - TCM-optimize them > >> >> - put them into a single security tunnel > >> >> > >> >> I have three phases (let's suppose I have 20 communications): > >> >> > >> >> Origin 1 > >> >> Origin 2 <----20 secured flows --------> TCM-IO <------1 > >> >> tunnel------> TCM-EO <-------- 20 secured flows----> destination > >> >> tunnel------> 1, 2, > >> >> 20 > >> >> ... > >> >> Origin 20 > >> >> > >> >> I have an advantage: In the shared network path, I use a single > >> >> tunnel instead of 20 different tunnels. > >> >> > >> >> But I have some additional requirements: I need processing > >> >> capacity in the TCM optimizers, and the endpoints should trust them. > >> >> > >> >> > >> >> Is this classification correct? Any other options? Any other > >> >> requirements? It is time for "security experts". > >> >> > >> >> Jose > >> >> > >> >> -----Mensaje original----- > >> >> De: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] En > >> >> nombre de jsalazar Enviado el: lunes, 01 de julio de 2013 20:50 > >> >> Para: tcmtf@ietf.org > >> >> Asunto: Re: [tcmtf] Answers to possible questions in the BOF > >> >> > >> >> Hi all: > >> >> Mmmmmmm. Since I see tcm-tf as a service, I can design the service > >> >> with added security features that the type of communication is > >> >> requiring. I think we have to be clear what we are expressing when > >> >> we are talking about secure tcm-tf: Ensuring the service tcm-tf or > >> >> applying the tcm-tf service for secure communications. > >> >> The first possibility is not a great technological sophistication > >> >> and the second one might consider the first one as a possible > >> >> additional service. > >> >> Therefore, > >> >> every time we use the term "secure tcm-tf" should think the second > >> >> option, for generality. > >> >> On the other hand, we must also keep in mind that whenever users > >> >> employ secure tcm-tf, they must trust the service fully and > >> >> consider delegating the use of their keys (including private ones) to > tcm-tf. > >> >> > >> >> Regards. > >> >> > >> >> JL > >> >> > >> >> "I see them falling out the skies like eagles All mirrored glass > >> >> and shattered egos" > >> >> > >> >> Simple Minds. > >> >> > >> >> El 2013-07-01 18:55, Dan Wing escribió: > >> >>> On Jun 28, 2013, at 1:57 AM, jltornos@unizar.es wrote: > >> >>> > >> >>> Hi all, > >> >>> > >> >>> Few days ago Julian talked about TCM-TF's security and now I've > >> >>> read in the link included by Dan, saying that the gain obtained > >> >>> when multiplexing Ipsec-encrypted packets is 20-to-1. We have > >> >>> been looking for more information about this issue and thinking > >> >>> about a way to reduce the needed bandwidth in IPsec flows. > >> >>> > >> >>> The main idea is to find a way to change the authentication of > >> >>> the individual packets and merge all of them in a unique > authentication. > >> >>> Thus, instead of using 20 IPsec tunnels, we would have a single > >> >>> tunnel including 20 flows. Is this something similar than how > >> >>> Cisco gets the improvement? > >> >>> > >> >>> We would not be able to change IPsec any more than we could > >> >>> change TCP, so I would not look at how to change IPsec > authentication. > >> >>> > >> >>> However, if there are a bunch of IPsec packets sharing a common > >> >>> path, I could see them being successfully multiplexed into one > >> >>> larger packet at one tunnel endpoint and then de-multiplexed at > >> >>> the other tunnel endpoint. This can provide a packet per second > >> >>> reduction. I don't think there are enough bytes in an IPsec > >> >>> header to bother trying to do IPsec header compression (SPI and > >> >>> sequence > >> number are only 64 bits). > >> >>> > >> >>> -d > >> >>> > >> >>> > >> >>> > >> >>> José Luis > >> >>> > >> >>> > >> >>> > >> >>> Dan Wing <dwing@cisco.com> ha escrito: > >> >>> > >> >>> > >> >>> On Jun 26, 2013, at 3:49 AM, Jose Saldana <jsaldana@unizar.es> > >> wrote: > >> >>> > >> >>> Question 4: Is TCM-TF interesting for the Industry? Should the > >> >>> IETF standardize this? > >> >>> > >> >>> Answer: > >> >>> > >> >>> 1) TCM-TF intends to update RFC4170, which optimizes RTP VoIP > > traffic. > >> >>> So if RFC4170 was interesting, why not updating it? > >> >>> > >> >>> 2) TCM-TF can be useful in order to save bandwidth in many cases: > >> >>> > >> >>> - Aggregation network of *network operators*: We are saving > >> >>> bandwidth by optimizing and putting together traffic flows. Is > >> >>> this interesting for a network operator? What about > overprovisioning? > >> >>> The idea is that there are places and moments in which a number > >> >>> of flows based on small packets are in the same place and at the > >> >>> same moment. Then, TCM-TF can be applied in order to provide > flexibility. > >> >>> We are not optimizing the overall Internet traffic, we are > >> >>> optimizing specific flows with very tight delay requirements, > >> >>> which network operators have to take care of in a special way. > >> >>> www.huawei.com/ilink/en/download/HW_193034 > >> >>> > >> >>> - *End to end* optimization: Nowadays, many appliances are used > >> >>> to connect remote offices of the same company (creating a VPN). > >> >>> So if a tunnel exists, why not optimizing this traffic when > >> >>> possible? We would save bandwidth in the access network, where it > can be scarce. > >> >>> > >> >>> - Wireless and satellite scenarios. > >> >>> > >> >>> "Cisco adds IP multiplexing to mobile satellite package", April > >> >>> 2012, > >> >>> http://www.networkworld.com/news/2012/040912-cisco-ip- > >> multiplexing- > >> >> 258082.html > >> >>> > >> >>> > >> >>> > >> >>> > >> >>> > >> >>> Any other thoughts? Any other scenarios in mind? Potential > >> >>> beneficiaries? > >> >>> > >> >>> Some networks, today, use cRTP (RFC2508) on their access links. > >> This > >> >>> gives bandwidth savings on the access link, but consumes > >> >>> considerable CPU horsepower on the aggregation router (to perform > >> cRTP), but > >> >>> provides no bandwidth savings across the network core. If, > >> instead, > >> >>> the bandwidth could be saved on the access link, across the > >> >>> core, and on the far-end access link -- all without the CPU > >> >>> impact on the aggregation router -- it is a considerable win. > >> >>> > >> >>> -d > >> >>> > >> >>> > >> >>> > >> >>> > >> >>> > >> >>> Jose > >> >>> > >> >>> De: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] En > >> nombre > >> >>> de Jose Saldana Enviado el: lunes, 24 de junio de 2013 13:00 > >> >>> Para: tcmtf@ietf.org > >> >>> Asunto: [tcmtf] Answers to possible questions in the BOF > >> >>> > >> >>> I would like to start a thread about possible questions people > >> >>> may ask in the BOF. Obviously, we also need answers, so we should > >> cooperate. > >> >>> > >> >>> This is different from the "questions to ask in the BOF". This > >> >>> will be discussed separately. > >> >>> > >> >>> Thanks! > >> >>> > >> >>> Jose > >> >>> > >> >>> _______________________________________________ > >> >>> tcmtf mailing list > >> >>> tcmtf@ietf.org > >> >>> https://www.ietf.org/mailman/listinfo/tcmtf > >> >>> > >> >>> > >> >>> > >> >>> > >> >>> > >> >>> > >> >>> _______________________________________________ > >> >>> tcmtf mailing list > >> >>> tcmtf@ietf.org > >> >>> https://www.ietf.org/mailman/listinfo/tcmtf > >> >> > >> >> _______________________________________________ > >> >> tcmtf mailing list > >> >> tcmtf@ietf.org > >> >> https://www.ietf.org/mailman/listinfo/tcmtf > >> > > >> > _______________________________________________ > >> > tcmtf mailing list > >> > tcmtf@ietf.org > >> > https://www.ietf.org/mailman/listinfo/tcmtf > >> > >> > >> -- > >> "Esta vez no fallaremos, Doctor Infierno" > >> > >> Dr Diego R. Lopez > >> Telefonica I+D > >> http://people.tid.es/diego.lopez/ > >> > >> e-mail: diego@tid.es > >> Tel: +34 913 129 041 > >> Mobile: +34 682 051 091 > >> ----------------------------------------- > >> > >> > >> ________________________________ > >> > >> Este mensaje se dirige exclusivamente a su destinatario. Puede > >> consultar nuestra política de envío y recepción de correo electrónico > >> en el enlace situado más abajo. > >> This message is intended exclusively for its addressee. We only send > >> and receive email on the basis of the terms set out at: > >> http://www.tid.es/ES/PAGINAS/disclaimer.aspx > >> _______________________________________________ > >> tcmtf mailing list > >> tcmtf@ietf.org > >> https://www.ietf.org/mailman/listinfo/tcmtf > > > > _______________________________________________ > > tcmtf mailing list > > tcmtf@ietf.org > > https://www.ietf.org/mailman/listinfo/tcmtf > >
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- [tcmtf] Answers to possible questions in the BOF Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Julián Fernández-Navajas
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Julián Fernández-Navajas
- Re: [tcmtf] Answers to possible questions in the … Mirko Sužnjević
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … DAVID FLOREZ RODRIGUEZ
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Tomaso.deCola
- Re: [tcmtf] Answers to possible questions in the … jltornos
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Michael Ramalho (mramalho)
- Re: [tcmtf] Answers to possible questions in the … jsalazar
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Michael Ramalho (mramalho)
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- [tcmtf] Fwd: RE: Answers to possible questions in… jsalazar
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Diego R. Lopez
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … gorry
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … jltornos
- Re: [tcmtf] Answers to possible questions in the … Muthu Arul Mozhi Perumal (mperumal)
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Spencer Dawkins
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Dan Wing
- Re: [tcmtf] Answers to possible questions in the … Jose Saldana
- Re: [tcmtf] Answers to possible questions in the … Diego R. Lopez