Re: [tcpm] Privacy problems of TCP Fast Open

Praveen Balasubramanian <pravb@microsoft.com> Wed, 22 May 2019 16:07 UTC

Return-Path: <pravb@microsoft.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 583D71200B8 for <tcpm@ietfa.amsl.com>; Wed, 22 May 2019 09:07:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level:
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 25dyd3rjc2u2 for <tcpm@ietfa.amsl.com>; Wed, 22 May 2019 09:07:22 -0700 (PDT)
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-dm3nam03on0720.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe49::720]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D95312013D for <tcpm@ietf.org>; Wed, 22 May 2019 09:07:19 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=testarcselector01; d=microsoft.com; cv=none; b=myoPEbNAxCBZwsweIW3bhbZ1dLaH+xtGr+YteOEsib8FoQbxUq5O1FaX1qlEUg45erJfv1AcRFa2QTyr4l/hH4nPz98mrZ1b49jROtXp9Vt4eBlRi2KfJTGXYtm3nuhoCIuIGJ4YdX0LTflFziQ8DuIHH5VuK6L65Mge8+qtDRw=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=testarcselector01; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+UMtRY5rj1NVMeNhKX5WPW1iCSXJafN0fg8tb7zXJRA=; b=mTDPZ8tmcFHZsOav99OldCsDowDCWcCZ8BKEEsJDlJRP0qZjijK2J0eN5GHQLo5j8Uson7BWVe2lEEs0iGbwRRZXd2kTfM1lDlIsQDLsYDPlnKHOsrJBwEZeC4i2d4D0kqFSSnlhu2Nt480vYDu60OZgVBVkT1cZlLWt2GOX6fc=
ARC-Authentication-Results: i=1; test.office365.com 1;spf=none;dmarc=none;dkim=none;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+UMtRY5rj1NVMeNhKX5WPW1iCSXJafN0fg8tb7zXJRA=; b=Xwkh+e6NPb9LsxDRS3sVAyfnSb9yzvkeUFLPKnEk/wJn3iXKCFthTNldAJqYjBre4woZ1panKgxtMwPFttRS1f5P3gPXO/NI4E+rNxdCqF8eNxXstdwlojB/NNSwnMJK1LXx+LE+hWhCM+/kYv+yvOuFNoZdXaxHUgYhUM4TS4c=
Received: from MW2PR2101MB1049.namprd21.prod.outlook.com (2603:10b6:302:a::13) by MW2PR2101MB0938.namprd21.prod.outlook.com (2603:10b6:302:4::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.6; Wed, 22 May 2019 16:07:17 +0000
Received: from MW2PR2101MB1049.namprd21.prod.outlook.com ([fe80::1486:9c49:385b:f1a2]) by MW2PR2101MB1049.namprd21.prod.outlook.com ([fe80::1486:9c49:385b:f1a2%4]) with mapi id 15.20.1943.006; Wed, 22 May 2019 16:07:17 +0000
From: Praveen Balasubramanian <pravb@microsoft.com>
To: "sy@informatik.uni-hamburg.de" <sy@informatik.uni-hamburg.de>, Praveen Balasubramanian <pravb=40microsoft.com@dmarc.ietf.org>
CC: tcpm IETF list <tcpm@ietf.org>
Thread-Topic: [tcpm] Privacy problems of TCP Fast Open
Thread-Index: AQHVByn/aakJ4ZD9PEmuWaFrgWjVpKZ0lRMAgACl5ICAAArjgIAAHh2AgABWEQCAADks4IAA46aAgACK91A=
Date: Wed, 22 May 2019 16:07:17 +0000
Message-ID: <MW2PR2101MB10490D1AF56B35466BE546E8B6000@MW2PR2101MB1049.namprd21.prod.outlook.com>
References: <ba3887b6-1554-9a67-8834-4bb598cf18f0@informatik.uni-hamburg.de> <fd9f22b0-03ee-a1ef-ee97-02a93bf2648b@informatik.uni-hamburg.de> <4194EE28-DCDF-46A3-8D26-5920E55040FD@lurchi.franken.de> <4e151b52-cd6d-7145-4e0f-94c6f94eb20b@informatik.uni-hamburg.de> <7B148CBB-3D8A-4D29-BCA7-0B241E548D4E@ifi.uio.no> <491A06E5-1D3C-46BF-B682-FBFB9B752906@trammell.ch> <MW2PR2101MB104947CF1DF2DF1D06161ECAB6070@MW2PR2101MB1049.namprd21.prod.outlook.com> <a5fe63dc-60ee-ecdb-7e92-fc81e6b2c287@informatik.uni-hamburg.de>
In-Reply-To: <a5fe63dc-60ee-ecdb-7e92-fc81e6b2c287@informatik.uni-hamburg.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=pravb@ntdev.microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-05-22T16:07:15.2795746Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=68e3f33c-bdd6-4abb-aae0-9c4cb44cd215; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pravb@microsoft.com;
x-originating-ip: [2001:4898:80e8:3:e567:b3c1:7ad8:9e57]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b41f1afc-dbeb-49c0-22c1-08d6decf8fd0
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(4618075)(2017052603328)(7193020); SRVR:MW2PR2101MB0938;
x-ms-traffictypediagnostic: MW2PR2101MB0938:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <MW2PR2101MB0938D180B7D64451902A40A4B6000@MW2PR2101MB0938.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:3044;
x-forefront-prvs: 0045236D47
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(136003)(366004)(396003)(376002)(346002)(53754006)(13464003)(199004)(189003)(10090500001)(68736007)(2906002)(14444005)(99286004)(52396003)(8990500004)(7696005)(256004)(22452003)(316002)(73956011)(11346002)(229853002)(446003)(486006)(66556008)(64756008)(66446008)(86362001)(6436002)(476003)(186003)(71200400001)(76116006)(66476007)(66946007)(46003)(55016002)(6306002)(86612001)(2501003)(9686003)(71190400001)(66574012)(81166006)(561944003)(10290500003)(478600001)(8936002)(966005)(5660300002)(74316002)(52536014)(53936002)(6246003)(30864003)(25786009)(6116002)(110136005)(76176011)(6506007)(53546011)(102836004)(33656002)(14454004)(7736002)(305945005)(8676002)(81156014)(4326008); DIR:OUT; SFP:1102; SCL:1; SRVR:MW2PR2101MB0938; H:MW2PR2101MB1049.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: AqFyulFpaor0Zjzc1Ia1Yjxm/QFfvkOn8aPS3wNutPvBVE0ky7M3rze7AsMDTcN4uTZm6VvEE1fi5Hsdlv0jnf6CKyxfKxKhzjucefjTKtkLlBEAjSLHNMFSDVbjkXnGNN6omHzs5Fc6SIpUZSKfvQzxljviJNSCKx5JVQY5A5LQK3pozlTEKFDYkAQ5c7ROUf+p4DQF6JgMznVOnSMNFFGSGndY7p+hcxub2Qh3CyciG8Atw1YprCNnlS5OYNobWClwZEPKa1HeB/+PpX6K5fn+dNuUtf4pDlpYk+SbYeQZ50DUxjokjhr4AFabsZsGJvc6/tCNKPvsRjEEmW5kfCDnIWsVP7IHprGHyXcdnJaiNI42D+NWS7tRwJ2R78TnFG/GdJ0okDC1UfuIuUIUV2LPNz479oHlHHOVSerzG7k=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b41f1afc-dbeb-49c0-22c1-08d6decf8fd0
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 May 2019 16:07:17.0773 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pravb@ntdev.microsoft.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR2101MB0938
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/qU7oAUmsmKrU5EVxz25OVei2X54>
Subject: Re: [tcpm] Privacy problems of TCP Fast Open
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 May 2019 16:07:26 -0000

>> If yes, how do you plan to protect your users against unlimited tracking periods?
Currently by simply not enabling it in InPrivate browsing mode. In future we may expire cookies periodically. FWIW in my observation cookies are expired by servers every few hours.

-----Original Message-----
From: tcpm <tcpm-bounces@ietf.org>; On Behalf Of Erik Sy
Sent: Wednesday, May 22, 2019 12:47 AM
To: Praveen Balasubramanian <pravb=40microsoft.com@dmarc.ietf.org>;
Cc: tcpm IETF list <tcpm@ietf.org>;
Subject: Re: [tcpm] Privacy problems of TCP Fast Open

Hi Praveen,

On 5/21/19 20:14, Praveen Balasubramanian wrote:
> We are removing support for TFO only in the InPrivate (incognito) mode of the Edge browser.
I'm happy to hear this :-)
> IPv6 privacy addresses mitigate this somewhat.

Let's say IPv6 addresses allow unique user identification for usually up to 24 hours. Thus, the additional privacy harm of TFO cookies is rather small.

Do you support TFO cookies on IPv4 addresses? If yes, how do you plan to protect your users against unlimited tracking periods?

>  Also, TFO servers will expire the cookies periodically as well.
This does not protect against this tracking mechanism. Server and network-based tracker can correlate the presented (invalid) TFO cookie with a subsequently issued TFO cookies.
> I wouldn't be opposed to some expiration scheme on client as well.
The deployment of such kernel patches takes several years. How do you plan to protect the user's privacy during this transition period?
>  And I am fine with adding some guidance around this. If TFO is to become a standards track RFC, then I agree that these concerns should be addressed. 
>
> Let's not overreact and deprecate the only path we have for low latency setup on TCP. 
Achieving low latency TCP connection establishments is a noble goal. The Internet changed a lot during the last years with transport encryption becoming the new default. We can use this as a chance to improve TFO with respect to its privacy, performance and deployment. A state-of-the-art TFO version will not be downwards compatible with today's TFO. I suggest to stop the experiment of RFC 7413 and apply the lessons learned to make the Internet work better :-)  
> Also, TFO could also be used on non-public Internet.

I guess, you can run anything on non-public Intenet ;-)

Best regards
Erik

>
> Brian a lot of major servers now support TFO. Client support is the problem.
> -----Original Message-----
> From: tcpm <tcpm-bounces@ietf.org>; On Behalf Of Brian Trammell
> Sent: Tuesday, May 21, 2019 7:48 AM
> To: Michael Welzl <michawe@ifi.uio.no>;
> Cc: Michael Tuexen <michael.tuexen@lurchi.franken.de>;; tcpm IETF list 
> <tcpm@ietf.org>;
> Subject: Re: [tcpm] Privacy problems of TCP Fast Open
>
> hi Michael,
>
> Further foolishness inside ;)
>
>> On 21 May 2019, at 09:39, Michael Welzl <michawe@ifi.uio.no>; wrote:
>>
>> Hi all,
>>
>> I'm about to make a fool of myself because I'm quite certain that I'm missing something.
>> But, I guess this is worth the risk - somehow I'm not risking much, as most people on this list already know me well enough to not be surprised by another foolish idea coming from me   :)
>>
>>
>> So...
>>
>>
>> Actually, couldn't we just remove the cookie from TFO?
>>
>>
>> As far as I understand, the main point of the cookie is to protect the server against clients that might spoof their IP addresses and just send tons of requests to the server - which could potentially be much heavier to handle than just the SYN state without TFO.
>> To some degree, this is an OS problem, not a network problem: methods could be in place to limit the time an application spends answering requests that are carried on SYNs. My question is: wouldn't that be enough?
> All simple cookie based-approaches have a pretty simple tradeoff: use a cookie which references some previous visible exchange between client and server, trading off load reduction on the server (and flexibility in deployment of DoS protection in front of the server) for traceability (which, in this case, is a requirement, not something to be avoided). The design of TFO (and SYN cookies before it). 
>
> More advanced 0RTT tokens have a different tradeoff; since the token is established between client and server without being observable on the path, here we gain traceability protection and retain server load reduction, but give up the ability to have front-ends that can reject attack traffic without some form of coordination with the server.
>
>> A few years ago, I'm sure that such a proposal would have been shot by people saying that data carried by TCP is general and TCP must serve all applications, and that we can't have that kind of special treatment for data arriving via SYNs.
>> However, TFO has already departed from this generality, in several ways: applications using it must be able to handle incoming duplicate requests; they need to use special API calls to access the data; importantly (for the point I'm making), rate limits should already be in place when using TFO (RFC 7413, section 5.1).
>>
>> So what I'm proposing is: couldn't we re-write TFO to just remove the Cookie from it, and say: "it's allowed for applications to accept data that comes with a SYN right away, but this must be done in a special way (as already described in RFC 7413), and in particular, the time an application spends processing TFO requests must be limited to avoid being DDoSed?"
> You're correct to point out that 0RTT resumption is and will always remain special, not only due to the special requirements it places on applications but also for cryptographic reasons (0RTT cannot be made forward-secret, so data sent in 0RTT for TLS1.3 or QUIC has different cryptographic properties than the rest of the session). 
>
> ISTM there are the following possibilities:
>
> (1) Do nothing.
>
> (1a) Do nothing, but issue guidance in an informational RFC notinf 
> that TFO cookies are traceable, and should be avoided in the open 
> Internet when
>
> (2) Deprecate TFO (and hope people who want 0RTT migrate to QUIC); explain the privacy reason behind the deprecation in the deprecated document.
>
> (3) Update TFO to make TFO cookies optional, and explain the tradeoffs.
>
> I would expect pushback on 2 or 3 from people running TFO on the Internet, because it requires coordinated implementation effort and changes the operational environment (which always carries risk).
>
> There is the caveat that I'm not sure how many are running TFO on the Internet. (I do know Google was the biggest one, at least a couple of years ago, from research I did before joining).
>
> Cheers,
>
> Brian
>
>> If a server is overloaded and can't process any more TFO data, the result could be that it just doesn't answer at all, and the client would then retransmit the SYN, just as if the SYN had been dropped.
>>
>>
>> Cheers,
>> Michael
>>
>>
>>
>>> On 21 May 2019, at 09:52, Erik Sy <sy@informatik.uni-hamburg.de>; wrote:
>>>
>>> Hi Michael,
>>>
>>> thanks for this question!
>>>
>>> Yes, TFO cookies are bound to the clients (local) IP address. 
>>> However, a client with a static local IP address in a home network 
>>> will use the same TFO cookie independently of it's publicly visible 
>>> IP address. As a result, TFO cookies present an independent tracking 
>>> mechanism, which does not necessarily rely on the client's publicly visible IP address.
>>>
>>> Returning to your example, onion routing does not necessarily 
>>> protect you against tracking via TFO cookies.
>>>
>>> Best regards,
>>> Erik
>>>
>>> On 5/21/19 09:13, Michael Tuexen wrote:
>>>>> On 20. May 2019, at 23:19, Erik Sy <sy@informatik.uni-hamburg.de>; wrote:
>>>>>
>>>>> I think it is important to warn users about the privacy risks of 
>>>>> RFC 7413. For example, Mozilla reacted to the privacy problems of 
>>>>> TCP Fast Open by deprecating this protocol on all it's Firefox 
>>>>> branches. In total, TCP Fast Open has significant issues with 
>>>>> respect to user privacy, performance and deployment on the 
>>>>> real-world Internet. From my point of view, it is about time to deprecate RFC 7413.
>>>> Hi Eric,
>>>>
>>>> my understanding is that a cookie is specific to a client address, 
>>>> a server address and a server port. So it would make sense for a 
>>>> client to remove entries from the cookie cache on an address change.
>>>> Assuming that, how does your described host based attacks relate to 
>>>> the server just using the client IP address for tracking? If you 
>>>> are trying to hide you IP-address (like using a TOR browser) you 
>>>> don't want to use TFO, but you are not optimising for small RTTs in that case, so it makes no sense in that case.
>>>>
>>>> Best regards
>>>> Michael
>>>>> Regards,
>>>>> Erik
>>>>>
>>>>> On 5/10/19 14:14, Erik Sy wrote:
>>>>>
>>>>>> Hi everyone,
>>>>>>
>>>>>> TCP Fast Open has significant privacy problems which are not 
>>>>>> considered in RFC 7413.
>>>>>> For example, this protocol allows a passive network observer to 
>>>>>> correlate connections established by the same client, which 
>>>>>> protocols such as TLS 1.3 and QUIC actively protect against.
>>>>>> Furthermore, Fast Open cookies present a kernel-based tracking 
>>>>>> mechanism which is quite persistent. Amongst others, they can be 
>>>>>> used to conduct cross-browser tracking on the same operating system.
>>>>>> For further details please refer to this article:
>>>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2
>>>>>> F 
>>>>>> arxiv.org%2Fpdf%2F1905.03518.pdf&amp;data=02%7C01%7Cpravb%40micro
>>>>>> s
>>>>>> oft.com%7Cc8f0e624868541da87c808d6ddfb5d71%7C72f988bf86f141af91ab
>>>>>> 2 
>>>>>> d7cd011db47%7C1%7C1%7C636940469018140114&amp;sdata=dkgWLSFZYKENl7
>>>>>> l
>>>>>> scesJExW6SbZCGfOUXEN8oPHWh2k%3D&amp;reserved=0
>>>>>>
>>>>>> I suggest, that the working group takes steps to highlight these 
>>>>>> privacy problems of RFC 7413.
>>>>>>
>>>>>> Regards,
>>>>>> Erik
>>>>>>
>>>>>> _______________________________________________
>>>>>> tcpm mailing list
>>>>>> tcpm@ietf.org
>>>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2
>>>>>> F 
>>>>>> https://nam06.safelinks.protection.outlook.com/?url=www.ietf.org&
>>>>>> amp;data=02%7C01%7Cpravb%40microsoft.com%7Cbad41804907040cc48c808
>>>>>> d6de89c701%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636941080
>>>>>> 685657359&amp;sdata=EcBpP%2FOcXZdjtYcaWuPbV%2FUWQrgHYVT8OayLDfPIN
>>>>>> hc%3D&amp;reserved=0%2Fmailman%2Flistinfo%2Ftcpm&amp;data=02%7C01
>>>>>> %7Cpravb%
>>>>>> 40microsoft.com%7Cc8f0e624868541da87c808d6ddfb5d71%7C72f988bf86f1
>>>>>> 4 
>>>>>> 1af91ab2d7cd011db47%7C1%7C1%7C636940469018140114&amp;sdata=05KZ4W
>>>>>> %
>>>>>> 2BrEPGOmzC0zUf4KGYQWicR%2BS7%2F3VKYXvlizj4%3D&amp;reserved=0
>>>>> _______________________________________________
>>>>> tcpm mailing list
>>>>> tcpm@ietf.org
>>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2F
>>>>> w
>>>>> ww.ietf.org%2Fmailman%2Flistinfo%2Ftcpm&amp;data=02%7C01%7Cpravb%4
>>>>> 0 
>>>>> microsoft.com%7Cc8f0e624868541da87c808d6ddfb5d71%7C72f988bf86f141a
>>>>> f 
>>>>> 91ab2d7cd011db47%7C1%7C1%7C636940469018140114&amp;sdata=05KZ4W%2Br
>>>>> E
>>>>> PGOmzC0zUf4KGYQWicR%2BS7%2F3VKYXvlizj4%3D&amp;reserved=0
>>> _______________________________________________
>>> tcpm mailing list
>>> tcpm@ietf.org
>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww
>>> w 
>>> .ietf.org%2Fmailman%2Flistinfo%2Ftcpm&amp;data=02%7C01%7Cpravb%40mic
>>> r 
>>> osoft.com%7Cc8f0e624868541da87c808d6ddfb5d71%7C72f988bf86f141af91ab2
>>> d 
>>> 7cd011db47%7C1%7C1%7C636940469018140114&amp;sdata=05KZ4W%2BrEPGOmzC0
>>> z
>>> Uf4KGYQWicR%2BS7%2F3VKYXvlizj4%3D&amp;reserved=0
>> _______________________________________________
>> tcpm mailing list
>> tcpm@ietf.org
>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
>> ietf.org%2Fmailman%2Flistinfo%2Ftcpm&amp;data=02%7C01%7Cpravb%40micro
>> s 
>> oft.com%7Cc8f0e624868541da87c808d6ddfb5d71%7C72f988bf86f141af91ab2d7c
>> d 
>> 011db47%7C1%7C1%7C636940469018140114&amp;sdata=05KZ4W%2BrEPGOmzC0zUf4
>> K
>> GYQWicR%2BS7%2F3VKYXvlizj4%3D&amp;reserved=0
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> ietf.org%2Fmailman%2Flistinfo%2Ftcpm&amp;data=02%7C01%7Cpravb%40micros
> oft.com%7Cbad41804907040cc48c808d6de89c701%7C72f988bf86f141af91ab2d7cd
> 011db47%7C1%7C0%7C636941080685657359&amp;sdata=7AcPUzNPsP7BTpH974kFHWl
> ZWSB%2BBKyYqTOEQDMD2II%3D&amp;reserved=0
>
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> ietf.org%2Fmailman%2Flistinfo%2Ftcpm&amp;data=02%7C01%7Cpravb%40micros
> oft.com%7Cbad41804907040cc48c808d6de89c701%7C72f988bf86f141af91ab2d7cd
> 011db47%7C1%7C0%7C636941080685657359&amp;sdata=7AcPUzNPsP7BTpH974kFHWl
> ZWSB%2BBKyYqTOEQDMD2II%3D&amp;reserved=0

_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftcpm&amp;data=02%7C01%7Cpravb%40microsoft.com%7Cbad41804907040cc48c808d6de89c701%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636941080685657359&amp;sdata=7AcPUzNPsP7BTpH974kFHWlZWSB%2BBKyYqTOEQDMD2II%3D&amp;reserved=0