Re: [tsvwg] [saag] Comments on draft-ietf-tsvwg-transport-encrypt-08.txt

Mirja Kuehlewind <mirja.kuehlewind@ericsson.com> Mon, 04 November 2019 09:26 UTC

Return-Path: <mirja.kuehlewind@ericsson.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36928120E0C; Mon, 4 Nov 2019 01:26:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eOeoUlBeSeTu; Mon, 4 Nov 2019 01:26:45 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70050.outbound.protection.outlook.com [40.107.7.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C75D8120D84; Mon, 4 Nov 2019 01:26:44 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FS8m6hcuTOQckae/3N3PywYXnSmFbRixdJ1dbR4uiHJ5qIhKYWF2o/RXvoMbcZ/QzbFebLrGW8I3gxlyRPamaMJ1+35ohPpI0I2WxZBYcjhyKQ1YoLHa+m0SikwAne7dTjlZIYb95RNnCBT6WK0gVN1gv6r0z49iwRdYuoCB/XfDtqhTLZg518X86pq/Wy8/DU458rPNSBKp+bl6JBD5YeNBmQZ8DNNbQ1mhp40i2/25+QaG7773OTj9tq0BLwzzQaf4fEBg5l8rYRst1UydbK+K4c2MNROYFdMJeKTWGC4hHG1w5lgr6bJcLViQyDXwI1yEuBFncRjrXimIRLn6rA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Abqr31sxdIjCQXuo0xrv3BmReiTFNAMatV60L4Oeh58=; b=YifavFvaL8m9XdGppnQhKvBGFiH9FYTAIrlcW/khZobSEW6402MuxPb0iQYrPrUTGiwd2F5zduSUyGJluSDLzkmgtiHz5M/rwlAxmsz8e1+LVaU8EcLuDlxaTkW1w1lSzw/pUq+0obOeZ3MdBGQSwT3JU4mDFBHjwMflgBRRoIWZdK6RVTIvPEBA2zYymn/HYcvgq6S8ya3mtaoy6hb9jGiQ1vIpOHvq0lCSJ+FrXE1kn/x1PnuBH3xMtJdB68A/8iZ9drPVyv4on/bxJREgf9JNnbWD0phpUFed9bNACkj+DqNKuf5isLhyOUqRUZCezMvYLRwKfn8mhFD8zyjuVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Abqr31sxdIjCQXuo0xrv3BmReiTFNAMatV60L4Oeh58=; b=MtJlAev3Xo327GeScJQ5ywUiKAGgopcdyM2qnxDfae57yQ6wsw6lAOX6sPI25mxpjezwrJF3GNUpwBvouiYyhkRb3DiST2BZoWzEWcmSFGUOxt8aP6GSomCQ1P5blhIdsH6uYpuXj1N9DUYpntAVRo8tAn3puE9yVpV93koUY+w=
Received: from AM0PR07MB4691.eurprd07.prod.outlook.com (52.135.149.158) by AM0PR07MB6387.eurprd07.prod.outlook.com (10.186.174.211) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2430.16; Mon, 4 Nov 2019 09:26:42 +0000
Received: from AM0PR07MB4691.eurprd07.prod.outlook.com ([fe80::4189:4ef8:bfc1:ec58]) by AM0PR07MB4691.eurprd07.prod.outlook.com ([fe80::4189:4ef8:bfc1:ec58%7]) with mapi id 15.20.2430.013; Mon, 4 Nov 2019 09:26:42 +0000
From: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
To: Bernard Aboba <bernard.aboba@gmail.com>, Eric Rescorla <ekr@rtfm.com>
CC: tsvwg IETF list <tsvwg@ietf.org>, "saag@ietf.org" <saag@ietf.org>
Thread-Topic: [tsvwg] [saag] Comments on draft-ietf-tsvwg-transport-encrypt-08.txt
Thread-Index: AQHVkqR0wv1Qw/jFZk2hvgC12JMRqqd6z2cA
Date: Mon, 04 Nov 2019 09:26:41 +0000
Message-ID: <FB244C01-0695-4C6F-8EB5-95D1CD78E971@ericsson.com>
References: <CABcZeBPajzuEdw8=M1g1i-TAniJ9O+H5dEMxv8c6N3tD=7mSvw@mail.gmail.com> <6E8A313A-2A3B-45D1-813C-029F90BA624B@gmail.com>
In-Reply-To: <6E8A313A-2A3B-45D1-813C-029F90BA624B@gmail.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=mirja.kuehlewind@ericsson.com;
x-originating-ip: [2003:eb:4700:cf00:3d57:7e7e:af67:8db2]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 98419dd2-cff7-4e8e-ec47-08d761091a5c
x-ms-traffictypediagnostic: AM0PR07MB6387:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <AM0PR07MB6387480AC5B2B360002E6C04F47F0@AM0PR07MB6387.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0211965D06
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(376002)(396003)(136003)(346002)(39860400002)(199004)(189003)(53754006)(478600001)(8936002)(86362001)(6246003)(44832011)(33656002)(6306002)(6512007)(102836004)(110136005)(81166006)(81156014)(8676002)(2906002)(316002)(30864003)(66574012)(486006)(5660300002)(186003)(6436002)(25786009)(6116002)(305945005)(7736002)(256004)(2616005)(54906003)(229853002)(6486002)(14454004)(14444005)(66946007)(66446008)(446003)(966005)(66556008)(66476007)(46003)(64756008)(71190400001)(71200400001)(76116006)(76176011)(11346002)(99286004)(476003)(6506007)(53546011)(4326008)(36756003); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR07MB6387; H:AM0PR07MB4691.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: o7L6UmDesSoKchnh8IBWuQ6cEycjCP3E+mgdUXSI1bdWZW0rT9IApOR36JFC0Wz7FI8qglKAq7Jbay9qHwwtDX2F//CZaq2v9OYDK8KzR10SLS8YUFlK8O63NQliI4bM3CcXdt0Tlo2BnTQnxrin0rQt466LpPfQpzsXwHaalsjRtWQIxf5eKpmFv/ow7+eD38JCx4YFvFLA8rEBowZPR/Cm1ZxM2oQ18otbKsXPdsSA5s/6H5t2kJpZYnS53KQrZXT2KzqMXaIRbcxIoECyexrVL6D2iCVz7+zdw1ZEkaGU3BIfRvcpnLOi4UFbOv0dl2TmkTRyZgQbiSMcsX0dJSeT6AtYNKioIncXZKwEx2xQHTc11LgWufcfoaZoVU++E8pK/tYXEs4Ur2fvhaQUVKQPC//7NeU9UT1YDmqSq1xQb/kPBlqObwGWmnDPodSZM7Hue8NaqgWEJ9vA8EfgW/Gh92w+RFW3k0P1eP2U+zI=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <4828ABCB23F34346B58242DB69A1CE9B@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 98419dd2-cff7-4e8e-ec47-08d761091a5c
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2019 09:26:42.0552 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: VQ0+XOhBKY8slJ7DdCPk8gYnXYsG0oG3VXZUOZXeOmBexcV3PjMPhjhKUp+mgils4DV6oHm/U3mm3RHjXQjpu43q0YXvCjfo3cyvX27Kgc0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB6387
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/OX2hhhurGzpufBiEl2sGOjmjBNc>
Subject: Re: [tsvwg] [saag] Comments on draft-ietf-tsvwg-transport-encrypt-08.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Nov 2019 09:26:52 -0000

Hi Bernard, hi all,

please see below, marked with [MK].

Mirja

On 04.11.19, 01:11, "tsvwg on behalf of Bernard Aboba" <tsvwg-bounces@ietf.org on behalf of bernard.aboba@gmail.com> wrote:

    This document appears to have a *lot* of overlap with RFC 8404. So given that the basic point has already been made, it seems to me that this document needs to focus on new points and/or practical recommendations to make its publication worthwhile.
    
    The issues raised here are by no means new - they first arose with the introduction of IPsec. Endpoint monitoring makes it possible for endpoint owners to collect information on performance that they can choose to share with operators. 

[MK] Yes, these issues are not new but that makes it even more important to document them in a well written RFC, so we have a common basis for any further discussion. RFC8404 touches these points but also others. This document has a more narrow focus and gives more detail which I think is valuable for future discussion and therefore I support publication of this document.
    
    Thus the issue here is not really the loss of transport performance information since that remains available if consent can be obtained, but rather the collection of that information by unauthorized third parties.

[MK] The issue here IS loss of visibly. Yes it's not great that we have all the mechanisms in the network now that use the information that were not supposed to be used by the network. However, we can't deny that if we change the end-to-end protocol that this will have an impact on the network and how we mange networks today. In some cases we can be happy that some of the boxes will just go away but in other case this can cause problems and can noticeably impact end-to-end performance, e.g. when an operator is not able to quickly locate the root cause of a problem anymore.

[MK] Providing equivalent information based on consent is the solution to the problem described in this draft and something we should be working on but is not there yet.

[MK] Collection of information by unauthorized third party is another problem which still exists and is now just shifted to another layer but would for sure need another draft (or multiple ones).

    
    > On Nov 3, 2019, at 2:20 PM, Eric Rescorla <ekr@rtfm.com> wrote:
    > 
    > 
    > After reviewing this document, I share Christian Huitema's concern
    > about the tone and perspective of this document, which, while saying
    > that encryption is good, then proceeds to mostly lament how difficult
    > it makes life for various entities other than the endpoints. It seems
    > to me rather problematic to publish this document as an RFC for
    > several reasons:
    > 
    > - Yes, it's true that the trend towards encrypting everything has
    >   and continues to make a number of entities sad, but that's a point
    >   which is already made in RFC 8404. How does all of the additional
    >   detail here help?
    > 
    > - The community of people designing new transport protocols has
    >   already weighed all the considerations here and come down pretty
    >   decisively on the side of "encrypt all the things". Given that
    >   both SCTP-over-DTLS and QUIC do this, it seems pretty unlikely
    >   we're going to design a new transport protocol that doesn't.
    > 
    > - Having an IETF Consensus RFC that is so heavily weighted on the side
    >   of "this is how encryption inconveniences us" and so light on "these
    >   are the attacks we are preventing" gives a misleading picture of the
    >   IETF community's view of the relative priority of these
    >   concerns. ISTM that RFC 8558 -- though perhaps imperfect -- far more
    >   closely reflects that consensus.
    > 
    > In short, I do not think this draft should be published as an RFC.
    > 
    > I have appended a number of detailed comments which IMO need to be
    > addressed in any case, but even if they were resolved, that would not
    > address my primary concern.
    > 
    > 
    > COMMENTS
    > S 2.1.
    > >   2.1.  Use of Transport Header Information in the Network
    > >   
    > >      In-network measurement of transport flow characteristics can be used
    > >      to enhance performance, and control cost and service reliability.
    > >      Some operators have deployed functionality in middleboxes to both
    > >      support network operations and enhance performance.  This reliance on
    > 
    > This seems like a contested point. My understanding is that while
    > these middleboxes are *intended* to enhance performance that there is
    > doubt that they actually do.
    > 
    > 
    > S 2.1.
    > >      to enhance performance, and control cost and service reliability.
    > >      Some operators have deployed functionality in middleboxes to both
    > >      support network operations and enhance performance.  This reliance on
    > >      the presence and semantics of specific header information leads to
    > >      ossification, where an endpoint could be required to supply a
    > >      specific header to receive the network service that it desires.  In
    > 
    > Well, not just the network service it desires but *any* service.
    > 
    > 
    > S 2.1.
    > >      specific header to receive the network service that it desires.  In
    > >      some cases, this could be benign or advantageous to the protocol
    > >      (e.g., recognising the start of a connection, or explicitly exposing
    > >      protocol information can be expected to provide more consistent
    > >      decisions by on-path devices than the use of diverse methods to infer
    > >      semantics from other flow properties).  In other cases, the
    > 
    > Is there evidence of this?
    > 
    > 
    > S 2.1.
    > >   
    > >      As an example of ossification, consider the experience of developing
    > >      Transport Layer Security (TLS) 1.3 [RFC8446].  This required a design
    > >      that recognised that deployed middleboxes relied on the presence of
    > >      certain header filed exposed in TLS 1.2, and failed if those headers
    > >      were changed.  Other examples of the impact of ossification can be
    > 
    > I think you mean "fields" and it wasn't headers so much as handshake
    > data.
    > 
    > 
    > S 2.2.
    > >      This supports use of this information by on-path devices, but at the
    > >      same time can be expected to lead to ossification of the transport
    > >      header, because network forwarding could evolve to depend on the
    > >      presence and/or value of these fields.  To avoid unwanted inspection,
    > >      a protocol could intentionally vary the format or value of exposed
    > >      header fields [I-D.ietf-tls-grease].
    > 
    > It's not just a matter of unwanted inspection. There's a real question
    > about whether we want these on-path devices to have this information
    > at all, as it is potentially used for surveillance, traffic
    > analysis, etc.
    > 
    > 
    > 
    > S 2..2.
    > >   
    > >      While encryption can hide transport header information, it does not
    > >      prevent ossification of the network service.  People seeking to
    > >      understand network traffic could come to rely on pattern inferences
    > >      and other heuristics as the basis for network decision and to derive
    > >      measurement data.  This can create new dependencies on the transport
    > 
    > This also seems quite contested. Do you have any evidence of such a
    > thing happening? 
    > 
    > 
    > S 2.3.
    > >         anomalies, and failure pathologies at any point along the Internet
    > >         path.  In many cases, it is important to relate observations to
    > >         specific equipment/configurations or network segments.
    > >   
    > >         Concealing transport header information makes performance/
    > >         behaviour unavailable to passive observers along the path,
    > 
    > While also making traffic analysis more difficult.
    > 
    > 
    > S 2.3.
    > >         applications it is important to relate observations to specific
    > >         equipment/configurations or particular network segments.
    > >   
    > >         Concealing transport header information can make analysis harder
    > >         or impossible.  This could impact the ability for an operator to
    > >         anticipate the need for network upgrades and roll-out.  It can
    > 
    > Or to reduce the opportunities for traffic discrimination.
    > 
    > 
    > S 2.3.
    > >   
    > >      Different parties will view the relative importance of these issues
    > >      differently.  For some, the benefits of encrypting some, or all, of
    > >      the transport headers may outweigh the impact of doing so; others
    > >      might make a different trade-off.  The purpose of highlighting the
    > >      trade-offs is to make such analysis possible.
    > 
    > This whole section seems to really just ignore the fact that many of
    > these practices are unwanted.
    > 
    > 
    > S 3.1.
    > >      Firewalls).  Common issues concerning IP address sharing are
    > >      described in [RFC6269].
    > >   
    > >   3.1.  Observing Transport Information in the Network
    > >   
    > >      If in-network observation of transport protocol headers is needed,
    > 
    > Why is this needed? I know some people might want it.
    > 
    > 
    > S 3.1.1.
    > >   3.1.1.  Flow Identification Using Transport Layer Headers
    > >   
    > >      Flow identification is a common function.  For example, performed by
    > >      measurement activities, QoS classification, firewalls, Denial of
    > >      Service, DOS, prevention.  This becomes more complex and less easily
    > >      achieved when multiplexing is used at or above the transport layer.
    > 
    > Also traffic discrimination and blocking.
    > 
    > 
    > S 3.1.1.
    > >      use heuristics to infer that short UDP packets with regular spacing
    > >      carry audio traffic.  Operational practices aimed at inferring
    > >      transport parameters are out of scope for this document, and are only
    > >      mentioned here to recognize that encryption does not prevent
    > >      operators from attempting to apply practices that were used with
    > >      unencrypted transport headers.
    > 
    > This has a really threatening tone. If you don't give us what we want,
    > look what could happen.
    > 
    > 
    > S 3.1.2.
    > >   
    > >      This information can support network operations, inform capacity
    > >      planning, and assist in determining the need for equipment and/or
    > >      configuration changes by network operators.  It can also inform
    > >      Internet engineering activities by informing the development of new
    > >      protocols, methodologies, and procedures.
    > 
    > What is the point of this exhaustive list?
    > 
    > 
    > S 3.1.3.
    > >   
    > >         AQM and ECN offer a range of algorithms and configuration options.
    > >         Tools therefore need to be available to network operators and
    > >         researchers to understand the implication of configuration choices
    > >         and transport behaviour as the use of ECN increases and new
    > >         methods emerge [RFC7567].
    > 
    > QUIC sort of hides ECN feedback but not ECN marking.
    > 
    > 
    > S 3.2.4.
    > >   
    > >         A network operator needs tools to understand if datagram flows
    > >         (e.g., using UDP) comply with congestion control expectations and
    > >         therefore whether there is a need to deploy methods such as rate-
    > >         limiters, transport circuit breakers, or other methods to enforce
    > >         acceptable usage for the offered service.
    > 
    > Does it *need* it or does it just want it. Note that we have had DTLS-
    > SCTP with WebRTC without this property for some time now. Can you provide
    > some evidence that operators have been inconvenienced by not having it.
    > 
    > 
    > S 3.3.
    > >      operators bring together heterogeneous types of network equipment and
    > >      seek to deploy opportunistic methods to access radio spectrum.
    > >   
    > >      A flow that conceals its transport header information could imply
    > >      "don't touch" to some operators.  This could limit a trouble-shooting
    > >      response to "can't help, no trouble found".
    > 
    > We have quite a bit of QUIC traffic now. I'd be interested in hearing
    > from the gQUIC team whether they have seen anything like this.
    > 
    > 
    > S 4.
    > >   
    > >      There are several motivations for encryption:
    > >   
    > >      o  One motive to use encryption is a response to perceptions that the
    > >         network has become ossified by over-reliance on middleboxes that
    > >         prevent new protocols and mechanisms from being deployed.  This
    > 
    > This isn't just a perception, it's a demonstrable reality.
    > 
    > 
    > S 4.
    > >   
    > >      o  One motive to use encryption is a response to perceptions that the
    > >         network has become ossified by over-reliance on middleboxes that
    > >         prevent new protocols and mechanisms from being deployed.  This
    > >         has lead to a perception that there is too much "manipulation" of
    > >         protocol headers within the network, and that designing to deploy
    > 
    > Not just manipulation, also inspection.
    > 
    > 
    > S 4.
    > >   
    > >         One example of encryption at the network layer is the use of IPsec
    > >         Encapsulating Security Payload (ESP) [RFC4303] in tunnel mode.
    > >         This encrypts and authenticates all transport headers, preventing
    > >         visibility of the transport headers by in-network devices.  Some
    > >         VPN methods also encrypt these headers.
    > 
    > This seems like a bad example as part of the point of a VPN is to
    > conceal the headers form the network.
    > 
    > 
    > S 6.1.
    > >   
    > >   6.1.  Independent Measurement
    > >   
    > >      Independent observation by multiple actors is important if the
    > >      transport community is to maintain an accurate understanding of the
    > >      network.  Encrypting transport header encryption changes the ability
    > 
    > This is ironic because QUIC is much better for endpoint measurement
    > than TCP because the details are accessible at the application layer.
    > 
    > 
    > S 8.
    > >      example, an attacker could construct a DOS attack by sending packets
    > >      with a sequence number that falls within the currently accepted range
    > >      of sequence numbers at the receiving endpoint, this would then
    > >      introduce additional work at the receiving endpoint, even though the
    > >      data in the attacking packet may not finally be delivered by the
    > >      transport layer.  This is sometimes known as a "shadowing attack".
    > 
    > This doesn't seem to be an issue with protocols that authenticate the SN.
    > 
    > 
    > S 8.
    > >   
    > >      An attack can, for example, disrupt receiver processing, trigger loss
    > >      and retransmission, or make a receiving endpoint perform unproductive
    > >      decryption of packets that cannot be successfully decrypted (forcing
    > >      a receiver to commit decryption resources, or to update and then
    > >      restore protocol state).
    > 
    > This is not a real issue for QUIC or similar protocols
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    > _______________________________________________
    > saag mailing list
    > saag@ietf.org
    > https://www.ietf.org/mailman/listinfo/saag