Re: [Tm-rid] Proposed WG Charter v2

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Fri, 10 January 2020 10:01 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92265120873 for <tm-rid@ietfa.amsl.com>; Fri, 10 Jan 2020 02:01:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=ZIb6yG6W; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=Cnr35+1X
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2D7qe_G0L60h for <tm-rid@ietfa.amsl.com>; Fri, 10 Jan 2020 02:01:23 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0F1C12084B for <tm-rid@ietf.org>; Fri, 10 Jan 2020 02:01:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=45049; q=dns/txt; s=iport; t=1578650482; x=1579860082; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=2G2u5YNJe/9CDtNNi8Uo+cFJwBwlrkYyKImYCkz+7oI=; b=ZIb6yG6Wl3qfaiK++MWB6PF8k0VWhW7sPdaHWCqDb+vRSt/y6ELuIL6r rrH0hwcaj7VzFSNdPWuR7X0Vuv0SpyxutYmj++ioAPaG94C1uJlUP2mLq dEEorjtvQGzgc93ALfC44Qai/BENCM862ay+66TBbUXBHH6jRkKh///LU g=;
IronPort-PHdr: 9a23:8I2bYx+3QUhHwP9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUERoMiMEYhQslVcObGEvwL/PCZC0hF8MEX1hgrDm2
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CMAAADSxhe/5xdJa1bAQkZAQEBAQEBAQEBAQEBAQEBAQERAQEBAQEBAQEBAQGBe4ElLyknBWxYIAQLKoQJg0YDiwKCOiWBAZcMgUKBEANQBAkBAQEMAQEYAQoKAgEBgUyCdAIXgVkkOBMCAw0BAQQBAQECAQUEbYULCCQMhV4BAQEBAgEBARAICR0BASoCCwEECwIBCBEDAQIBFQsBBgMCAgIlCxQJCAIEAQ0FFAcHgwQBgX1NAw4gAQ6gMAKBOIgsNXWBMoJ+AQEFgkSCVhiCDAMGgTaKVoFDGoFBP4ERJwwUghc1PoJkAQECgRsBCBIBRAYNCQmCUTKCLI5sgV+FVySXf3UKgjeMfoQthQIbgkcwh0+QIo5ZgUmZKQIEAgQFAg4BAQWBaSKBWHAVOyoBgkEJRxgNhHmNVgsBF4EEAQIJgkCFFIU/dIEojXqCMgEB
X-IronPort-AV: E=Sophos;i="5.69,415,1571702400"; d="scan'208,217";a="421799435"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Jan 2020 10:01:11 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 00AA1BjR014406 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 10 Jan 2020 10:01:11 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 10 Jan 2020 04:01:10 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 10 Jan 2020 04:01:10 -0600
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 10 Jan 2020 05:01:09 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L04j/qkrxg5slHx7malIIqlhr20FaoYjt3AG5Frp42wIMTjiDKZG5sFWY3MSNojqaHmxHoe0mQCSFO2QTmyGhwlrdhmVrTm84vds/ITgjDjpANhHzAZEYhuWvxmf/ZkNboOU840RoUCg01Ybbfzkdgu3c8/02thVSN8ZfexCuITD22ukA2CMGvcFyjISDEPQOgeqgbAtDSR2EriLvUAPqsTDmvnMkNc8UKW+k8s59evc4Ncv1f1h8ds2uMN6ZOK8T8gSejnesrbsvJr5qfpHKcJ4+34VwXsb7xYH7MH+NUyGyby1W+8lqrS+yrvKUPNLtmPr5n3xwis3kTVGBbEt4g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2G2u5YNJe/9CDtNNi8Uo+cFJwBwlrkYyKImYCkz+7oI=; b=XJPta04Nmy6dMDWMr+90UvFXmMCnp+ye1iRLQOkKFcjCOxKbpRoaecrXwsSqfGTahYhgoDuK8mQ9r6S5XJJjOVimYbdn8RGEl/AEQlDdLzTQG+1hET1LLpnkZrpvhuQUqDmYtVTN+m3bhHZn/H2gQ7VFh/Sz3//ofFcG5Y55XsL7FF0SlR2h62ByVVbW76dzEacoZHJLngXvEo42Tx57P8qmygcOHB7YqpdrmmcAK0DCyNxQ4VGxBtiB+en5hevh2EsZ9AF3+2XYnwfy4rEa7CrVguFGe2KxklfAweVIHB2Iaj8rUzF2/GAnfpSe8B1oRJrc84SjQniJ5pFYHzBRlA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2G2u5YNJe/9CDtNNi8Uo+cFJwBwlrkYyKImYCkz+7oI=; b=Cnr35+1XSP1cDaqTtugLpN49T8vIJgjZL+jHcdp2vPaRgkYQdjqRf6DvRp0dfT2i1w5i2iyKEf8myEH4z649nDOL/kbc0kqOwpM7FGqBM/FLeP9u/nYrXRlL7EvPncZZhZX0UWr9qJJJruzdbNSpfsTINs9gpMErMOaa1t9lGB8=
Received: from DM5PR11MB1753.namprd11.prod.outlook.com (10.175.88.141) by DM5PR11MB1691.namprd11.prod.outlook.com (10.168.103.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2623.11; Fri, 10 Jan 2020 10:01:08 +0000
Received: from DM5PR11MB1753.namprd11.prod.outlook.com ([fe80::9528:bb7a:843e:5ea3]) by DM5PR11MB1753.namprd11.prod.outlook.com ([fe80::9528:bb7a:843e:5ea3%12]) with mapi id 15.20.2623.013; Fri, 10 Jan 2020 10:01:08 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Card, Stu" <stu.card@axenterprize.com>, "tm-rid@ietf.org" <tm-rid@ietf.org>
CC: ryoung <ryoung@one-atm.net>
Thread-Topic: [Tm-rid] Proposed WG Charter v2
Thread-Index: AQHVpWms5b5JemfRHkGYhP40VoM5Fqem6AmAgAA5uYCAMQOjgIABR8yAgAqSfYA=
Date: Fri, 10 Jan 2020 10:01:08 +0000
Message-ID: <C88A276C-9973-4E7B-9264-C9EFC27DA3A8@cisco.com>
References: <579d29aa-e3d7-9886-91b6-46641eb1f944@labs.htt-consult.com> <5feb3288-b366-3580-0b1d-1134769bb305@labs.htt-consult.com> <22730.1575295477@localhost> <CAKM0pYPm0avmt3ULQX4j2PJC2d-f7GtjLgezQO1WB6L3uF4OgA@mail.gmail.com> <CAKM0pYM+_hxGK19Fc2NA0jFgVEiyzJfB46iWUsP7ciod=0XQNQ@mail.gmail.com> <391A6A9E-8A53-487D-AC0C-6739599EC9EE@cisco.com>
In-Reply-To: <391A6A9E-8A53-487D-AC0C-6739599EC9EE@cisco.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.20.0.191208
authentication-results: spf=none (sender IP is ) smtp.mailfrom=evyncke@cisco.com;
x-originating-ip: [2001:420:c0c1:36:b4c2:6774:f85c:239]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 68c429fd-53a4-4ae6-16ab-08d795b403e4
x-ms-traffictypediagnostic: DM5PR11MB1691:
x-microsoft-antispam-prvs: <DM5PR11MB1691643FB3AB1F903E8E6252A9380@DM5PR11MB1691.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02788FF38E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(366004)(376002)(346002)(396003)(136003)(199004)(189003)(51444003)(4326008)(8936002)(36756003)(966005)(53546011)(6506007)(478600001)(186003)(64756008)(33656002)(66946007)(66556008)(81156014)(91956017)(6512007)(8676002)(76116006)(66446008)(66476007)(81166006)(2616005)(5660300002)(30864003)(71200400001)(6486002)(316002)(86362001)(2906002)(110136005)(66574012); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR11MB1691; H:DM5PR11MB1753.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_C88A276C99734E7B9264C9EFC27DA3A8ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 68c429fd-53a4-4ae6-16ab-08d795b403e4
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jan 2020 10:01:08.6751 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: X6gDraJ6MfV3CQp8RGE6l6R8Hvf7Md/Z3/gqWlrYA+fPcKLcJrmDu5F5/cMxPsXM1OXO6a0T5HpgbNSSyH1tpw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1691
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/dadDN6fc1GJpSZVvtllURvG9-5U>
Subject: Re: [Tm-rid] Proposed WG Charter v2
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 10:01:27 -0000

Stu, Adam, Bob and other,

The clock is starting to click towards IETF-107 and it takes several weeks to create a WG. In short, it becomes really important that the TM-RID community rally around a draft charter that can be reviewed by the IESG as a first step. IMHO, the v2 will have difficulties to go through the evaluation if my comments below are not taken into account.

Regards

-éric

From: Eric Vyncke <evyncke@cisco.com>
Date: Friday, 3 January 2020 at 17:34
To: "Card, Stu" <stu.card@axenterprize.com>, "tm-rid@ietf.org" <tm-rid@ietf.org>
Cc: ryoung <ryoung@one-atm.net>
Subject: Re: [Tm-rid] Proposed WG Charter v2

Happy New Year all

Stu, exactly one month ;-)

This TM-RID community needs to work more and faster around this chartering. A liaison statement from FAA or other CAA or ICAO or ASTM (not exclusive) on this work could also help a lot.

About the charter itself, it is difficult to parse as there are many acronyms + their expansion. Unsure how to solve this issue though (except like this trick[1]).

The charter flow does not follow the usual one. E.g., it would benefit a lot of clearly identifying the work items (or at least clearly the WG scope). Having milestones (i.e. dates) is also helpful for chartering a WG, milestones are outside of the charter itself but can be enumerated, for now, as bullets after the charter.

Citing the existing Internet drafts is also typical in a charter.

To be direct, I am afraid that statement like “HIP HIT is uniquely ideally suited to serving as an UAS ID Type” will NOT attract consensus in a charter. I would suggest to have a work item to check the adequacy of HIP to the problem statement than trying to defend this assumption in the charter itself.

Please continue this good work and let’s try to have more interactivity around this topic

-eric

[1] I believe that footnotes can be added to charters ;-)

From: Tm-rid <tm-rid-bounces@ietf.org> on behalf of "Card, Stu" <stu.card@axenterprize.com>
Date: Thursday, 2 January 2020 at 23:01
To: "tm-rid@ietf.org" <tm-rid@ietf.org>
Cc: ryoung <ryoung@one-atm.net>
Subject: Re: [Tm-rid] Proposed WG Charter v2

Week turned into month but here's my attempt. All please review and comment.

Trustworthy Multipurpose Remote Identification (TM-RID) Proposed WG Charter v3

Civil Aviation Authorities (CAAs) worldwide (e.g. United States Federal Aviation Administration, FAA), have initiated rule making for Unmanned Aircraft Systems (UAS) Remote Identification (RID).  CAAs currently promulgate performance-based regulations that do not mandate specific techniques, but rather cite industry consensus technical standards as acceptable means of compliance. One key standard here is ASTM International F38 Committee Work Item WK65041, “Standard Specification for UAS Remote ID and Tracking”.  ASTM Network RID defines a set of information for UAS to make available globally indirectly via the Internet. ASTM Broadcast RID defines a set of messages for Unmanned Aircraft (UA) to send locally directly one-way over Bluetooth or IEEE 802.11. WK65041 addresses neither how to ensure trustworthiness of RID information nor how to make it instantly useful.

TM-RID’s goal is to make RID immediately actionable, in both Internet and local-only connected scenarios, especially emergencies, in severely constrained UAS environments, balancing legitimate (e.g. public safety) authorities’ Need To Know trustworthy information with UAS operators’ privacy. To accomplish this, TM-RID will liaise with ASTM, CTA, ICAO, RTCA, et al and complement their standards with IETF work to meet this urgent need. An Applicability Statement RFC for UAS RID, showing how to use IETF standardized technologies for this purpose, will be a central work product. Other Technical Specification RFCs will address enhancements of specific supporting protocols. Prototypes using the contemplated technical approach have already been successfully flown.

The Host Identity Protocol (HIP) Host Identity Tag (HIT) is uniquely ideally suited to serving as an UAS ID Type. A  HIT, an Overlay Routable Cryptographic Hash Identifier (ORCHID), is derived from and compactly (as an IPv6 address) represents a Host Identity (HI), a [self-generated] public key. HITs can verifiably identify all entities in the UAS Traffic Management (UTM) ecosystem: UA, Ground Control Stations (GCS), observer devices, registries, etc. TM-RID will specify how to leverage HITs –

- Provide strong RID authentication by using the HI in public key operations to:
= prove ownership of the claimed ID (HIT);
= authenticate other claims made via RID (e.g. location) as signed by the owner of that ID; and
= provide observers [w/o Internet connectivity] locally verifiable proof that ID is in a known registry.

- Use DNS to enable observers to use a received HIT to look up minimal public ID information.

- Use access controlled RDAP to enable authorized observers to look up more extensive private information (including operator Personally Identifiable Information, PII) needed for legitimate (e.g. public safety or security) purposes from an Internet domain name (Whois) or similar registry.

This provides stronger privacy than other FAA Notice of Proposed Rulemaking (NPRM) / ASTM standard UAS ID Types, while providing greater assurance of authenticity to authorized observers, but necessitates several HIP enhancements –

- Hierarchical HIT (HHIT): Enable scalable and trustable UA registration and information retrieval (e.g. with DNS and RDAP) by adding optional structure to the (currently flat) HIT/ORCHID space.

- registration extensions:  Prevent registration of duplicate HHITs, populate registries with IDs and associated data, update DNS, support Rendez-Vous Servers (RVS) and provide proof of authenticity.

- proxies: Enable any party observing an UA to contact a RVS or other intermediary that will either deny or facilitate secure communications with the party controlling the UA, while maintaining the privacy of the latter’s identity, location and other information to all but authorized parties, per policy.

- multicast: To securely and efficiently communicate with a group, multicast to their ephemeral (and likely multiple per host) IP addresses, starting from individual and/or group HITs.

- new cryptographic algorithms: Extremely compact keys and signatures (such as are enabled by EdDSA and Keccak functions) are needed for severely constrained [UAS] environments.

TM-RID potentially could be applied to verifiably identify other types of registered things reported to be in specified physical locations, but the urgent motivation and clear initial focus is UAS. TM-RID enhancements to HIP will be generic: of these, only HHITs with their associated registration procedures and compact crypto are vital to support UAS RID; HIP proxies and HIP multicast are stretch goals. Some UTM concepts envision using OAuth for GCS and personnel; HIP as an OAuth method also will be investigated. The Applicability Statement and the Technical Specifications initially essential for UAS RID will be published within one year of the 2019 DEC 31 FAA NPRM.


On Mon, Dec 2, 2019 at 12:31 PM Card, Stu <stu.card@axenterprize.com<mailto:stu.card@axenterprize.com>> wrote:
I will try wordsmithing this week.

On Mon, Dec 2, 2019, 09:04 Michael Richardson <mcr+ietf@sandelman.ca<mailto:mcr%2Bietf@sandelman.ca>> wrote:

I am enthusiatic about this work, although I don't anticipate being able to
be more than a bystandard on this.

Robert Moskowitz <rgm@labs.htt-consult.com<mailto:rgm@labs.htt-consult.com>> wrote:
    > TM-RID will build upon the Host Identity Tag (HIT) from the Host Identity
    > Protocol (HIP) as an RID and augment it and supporting HIP and other IETF
    > technologies to add trustworthiness to the ASTM messaging suite.

I think that this sentence needs editing.  Too many ".. and"

    > The goal is
    > to provide trustworthiness both in an Internet connected environment and
    > emergency, unconnected situations within the highly constrained environment
    > of UAS.

I think that a reference for the nature of the constrained environment might
be in order.

    > The Host Identity Tag (HIT) is ideally, in fact uniquely, suited to work
    > within this RID effort.  The Host Identity (HI) behind the HIT can be used to
    > sign Broadcast Authentication Messages, thus proving ownership of the RID
    > (HIT) and signed messages.  HITs provide significantly superior privacy
    > compared to other allowed RID types while providing greater assurance to
    > authorized observers that they are accessing the proper PII for the UA.

This wanders into solution space, and I think it would be better to omit this.

    > TM-RID will create specifications for HIP-augmented ASTM RID messages..
    > Initially this will consist of additional RID Authentication Messages that
    > use the HI in public key signing operations: to prove UAS ownership of a
    > Hierarchical HIT (HHIT); to authenticate other claims made via RID, such as
    > position and velocity, as having been made by the owner of that HHIT; and to
    > provide observers lacking current Internet connectivity with locally
    > verifiable UAS proof-of-registration objects.

removing some of the solutions, leaving the requirements:

TM-RID will create specifications to prove UAS ownership of a
Hierarchical HIT (HHIT); providing a framework to authenticate other claims, such as
position and velocity, as having been made by the owner of that HHIT; and to
provide observers lacking current Internet connectivity with locally
verifiable UAS proof-of-registration objects.

I would have written this as numbered points.

    > For this, HIP would be amended to be used effectively in this environment:

I think you could put a period instead of : and omit the next three paragraphs.

    > HHITs are envisioned to identify all components in the UAS/UTM (UAS Traffic
    > Management) environment: UA, Command Consoles, Observer devices, and
    > Registries.  This will entail further work as experience is gained in using
    > HIP for UAS RID.  For example, some (UTM) systems envision using OAuth for
    > Ground Control Systems (GCS) and authorized safety personnel.  HIP as an
    > OAuth method may help in merging HIP into these systems.

    > The workgroup will need to liaison with the various SDOs working in the UAS
    > regulation space.

Please if you could list those SDOs?
Do we need to do liason agreements with them?  I would be happier if that was
part of the plan.

How will we engage with implementers?  I.e. how are we going to get running-code?



--
Michael Richardson <mcr+IETF@sandelman.ca<mailto:mcr%2BIETF@sandelman.ca>>, Sandelman Software Works
 -= IPv6 IoT consulting =-



--
Tm-rid mailing list
Tm-rid@ietf.org<mailto:Tm-rid@ietf.org>
https://www.ietf.org/mailman/listinfo/tm-rid