[tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
"Black, David" <David.Black@dell.com> Wed, 24 July 2024 18:17 UTC
Return-Path: <prvs=193501744b=david.black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E1C9C15106E; Wed, 24 Jul 2024 11:17:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.255
X-Spam-Level:
X-Spam-Status: No, score=-2.255 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kpY3eVw5wcyr; Wed, 24 Jul 2024 11:17:35 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4EAF4C14F73E; Wed, 24 Jul 2024 11:17:35 -0700 (PDT)
Received: from pps.filterd (m0170398.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 46OFuKji012726; Wed, 24 Jul 2024 14:17:33 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from :to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=smtpout1; bh=Gv0JosZ1zs23+xUZGW7gs 4WV0uJQs9KtFEMZFL/zjOY=; b=rwVPjwKOD6eqXLFmqT/9Yjbmw2CwcO6ucXbom v+t6X5eI+uQNeAf2ih8+2iyMF9m7vqLmofDDVOQ9n1eObAtf0tMTvKZ2BWDzo6hu rXR7EL+DwaTQdja9W1+Jius4Vc5tD+YVBEL4q6uoAv3F+5FnpdLV11/+FRP+pgwf 5HB1wlEnyoikgbD2y0qBsuP20/Q4QigqOwOHXKiEwkvl46NQ5lVRoAdvjC9Nqwkn BEHrQqYAiPdtXINfmu7e4fALgLm7fqubyPyIY9+/YdjC1H2n/bcjOFS073rpnOr0 DfoOwVIKADrGk5+evPGv3arekhVDAorSlkrDiif7yWLCDN3xg==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com (PPS) with ESMTPS id 40jvy989ek-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 24 Jul 2024 14:17:32 -0400 (EDT)
Received: from pps.filterd (m0134746.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 46OHxciU039017; Wed, 24 Jul 2024 14:17:32 -0400
Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2046.outbound.protection.outlook.com [104.47.74.46]) by mx0a-00154901.pphosted.com (PPS) with ESMTPS id 40jqem0k6s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 24 Jul 2024 14:17:31 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=p+3+4y9wc2CdHwnS6ZqqDhfh5azU7uKYJ88wIfIlBg+brS0GnQRZTXGIcyQ1VhahOCTQJa8SrIK6Lzji79QqKRXw+jlJOcdQTuq9+K1ijP80joyzOSTLEfsmx4Heq3E1PnZ61h8tUvMRiYBvQd6SGs+QVOYyuT1C4qiRBSrWDZyeuWvWsQwQdcMUUfH20/wimCIu20ZQxNLtl9GtXOyBo5lJs+vj967TtBQ5QY2db5NjgHtEH4zokKkrrG9dUNFljit+0BmETxFimOZZWvV51qbfSM2uQlxB25rIMTMGTZYhT1AyWEx5rgGqI8+Z0yTXXNk/nxie4ZY4bJVME/b8sg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Gv0JosZ1zs23+xUZGW7gs4WV0uJQs9KtFEMZFL/zjOY=; b=x53wavDcwQJe5h8IGdDAYWOyCjO7XVLnzDDsRIfNBdfNqR4aT05iX4wnFUZegohY+N3vD0zK+SCIG2p/ThK5s/j+e1PVE1EOYgPga92RtmhlkNi/Ezq2Ez4RdgkFwwXW8rGGBz5EFSm+kXr/O1fYrYg8SCqHanwGUpIQDYDa/ZQ1M4/qlU5/t+/sV6pCDAidwj6/mGCSHow0JJMvM/k9Cns0omrhtuzsxElsUR+9c9vA6KJTo8kIdn7GVQVbhARbCCc6G46DAWLS+V5Wltz0K0VHBvZEFuGRP7rZmqH90UEf6jFRAkWBcSmdii5NAu8GU9on/UP2bjywgSKjc2xPHw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by PH7PR19MB7509.namprd19.prod.outlook.com (2603:10b6:510:27b::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.29; Wed, 24 Jul 2024 18:17:27 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::656e:ea92:20c8:471e]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::656e:ea92:20c8:471e%3]) with mapi id 15.20.7784.017; Wed, 24 Jul 2024 18:17:26 +0000
From: "Black, David" <David.Black@dell.com>
To: "Livingood, Jason" <jason_livingood=40comcast.com@dmarc.ietf.org>, "Overcash, Michael (CCI-Atlanta)" <michael.overcash@cox.com>, gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>, gwhiteCL/NQBdraft <NQBdraft@noreply.github.com>
Thread-Topic: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
Thread-Index: AQHa3d2XqeYzEwFBzECN6MSZGXvJALIGA8JwgAAUk4CAAANuwIAACX2AgAAIZ4A=
Date: Wed, 24 Jul 2024 18:17:26 +0000
Message-ID: <MN2PR19MB40450AEB63B6A1220CECE82983AA2@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <gwhiteCL/NQBdraft/issues/48@github.com> <gwhiteCL/NQBdraft/issues/48/2244060936@github.com> <MN2PR19MB404591B9BAA1AEED7BBB900983A92@MN2PR19MB4045.namprd19.prod.outlook.com> <LV2PR01MB7622B7EA53C95951987C9B0B9FA92@LV2PR01MB7622.prod.exchangelabs.com> <MN2PR19MB4045E01E9923873F4A0BBD4883AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <6F90E433-3EC7-4A07-851B-8DEDE30061D7@comcast.com> <MN2PR19MB4045D937AF1494C11D8218E083AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <F8D37F2E-206C-414F-A25A-24FF32C607C3@comcast.com> <MN2PR19MB40457246F85DE00DE26D8B3883AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <62CCCB97-D4E2-406A-A214-F0834EE0D87E@comcast.com>
In-Reply-To: <62CCCB97-D4E2-406A-A214-F0834EE0D87E@comcast.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=dc085fbd-ef1b-4368-adba-a856a5ad6fe3; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2024-07-24T00:19:09Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR19MB4045:EE_|PH7PR19MB7509:EE_
x-ms-office365-filtering-correlation-id: eb12199b-5568-4ca1-7248-08dcac0cdf20
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018;
x-microsoft-antispam-message-info: jThZAOgJ6pv1VBdZEMxRZ7iarCvxvip/zBuDZc8DLC+YgyKhpmmTGO6g0jTuhArHGO2lzD2BF/eLeQ/Fj4OrsPy1x2liFBtPMLzQ/AegNzMzzIg4QG4xFhQKk0Kul1K4E25kaS3cyHMRyn7smOm7tvTC97fc54QNlY9y8H2YEzUtuSrMZUyAowzgz7bX2HCKRNKG34ad/8jNlV5B7HRaTYoL2FO+R5I1TLPVO/XijHvAuFNZqr5NehDRYRGMFvhIMkhLgAQpfZk9sX/okG4kGr5S8WGZaFmHOPr9uuJ7mUHi02OpwH4CO6BWwU3kCpW896b6kdxsC3XqgfiRbfq9fnD/Uj55tAmITdW+U69Z7sQVDeJGhMQlr7CwFQaPsCLnbR9L6BhrULsjj2ceYWD47HVMK1zKatRoYXAfzNwmo+4UofAiyJLtRQAmEDLnBxGWCKmlDWFdIWDkRD7U1x6x8oLRVXGIp8152To8rEfD7Yp1EkBi65MJ0ANR8cmxj9S+U0HctmoZ2/0ltiBUz7ZddFWO2yzG/swdxbnOapeeXe+G/nUGw9b7q9gDyPSFaqvHcl33Z1iJ0Y86q7vckf1/w7xa6DIHgX/mincXaSBLNivcCDtXQVEM8ybAQVgAu/tkLChp6CwjM4Qj04SUGfrpjcdKiDzz7yVRt/Z7BLrRC6ov0aBLnc0jLjXR3gzex6mOF5E+CA89+azSt45vcUMfzzmN+vigkqCGbiSy76FQcZNZM86r+qDlmWwRUqR0IoIHi4MPCRqOmGHl4AsOf/aOaz1Z0n4dW/QXQYEGJi9X+JCfXMIOTaQIuHkORDH7Lu/R8H8lo04aawKbfhjmThKkZPFzwdR6jhzAiFnKc++CcK9P9OP2UHdkPxqhtR1Ny2d+0cUVNLeRt8pbjywxMYGStGZz/3mR8whNhEAMtyv6tJ62c8M4Mb6f+lRjA+DEbgSrk8Q72xv4Lws/5iOlj9W4lHPn7BPza5wql6zOiNE9qQ52jIKZkG84A8cEP4pVjJHoo83SSwoRWd5BXKhmgTB9Wg3BkbDPhQJppItLjl8biD4bg1RYE5Sng/lkFAf74ADKrR7VdbX2e0W9DILSweXswyP+bGuaDuVDAAWX0gf9Fg1ZJTu0TUDB/nHzH0mFMjs6g3ctyl/K5kZBuARqp2UHAfCqUbOxoCFMKw5WEA6qI6b+8AjHpkdqjrU/d5xm2wpN7jxbXAzhDDwey3845Ny/cadDKxF0tsRgQvOl1Gh0p4O9+n3HK9+5PK+78B8igWdGeL83qUQ4Yy9+vu7TZkBM02jMqAMw72J/yDL6OlHSuIbL+Ns/+QdS7Yvs60ABWw4Ytei/SOdPpR0fiFHBcAnT5OxPJBevmSGDA10ytY/UWmNMfYgU+aKAUe+GW+QMLCphiROE+pQG3RexCHIVUcgclQ==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR19MB4045.namprd19.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR19MB40450AEB63B6A1220CECE82983AA2MN2PR19MB4045namp_"
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eb12199b-5568-4ca1-7248-08dcac0cdf20
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jul 2024 18:17:26.2353 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Zvonm9ur4CrmamyToUVWR+ifjLQXPtDYExIJb2ulcck3bku1LjFChJ1VQhwUEdw0mQheS8RTZ/F12mWO9m3YjA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR19MB7509
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-07-24_19,2024-07-24_01,2024-05-17_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1011 spamscore=0 malwarescore=0 mlxlogscore=999 mlxscore=0 suspectscore=0 bulkscore=0 adultscore=0 priorityscore=1501 phishscore=0 lowpriorityscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2407110000 definitions=main-2407240132
X-Proofpoint-ORIG-GUID: _vPFBTmeFa_urOTZHbYzsZtdylAGoNOF
X-Proofpoint-GUID: _vPFBTmeFa_urOTZHbYzsZtdylAGoNOF
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 impostorscore=0 clxscore=1015 phishscore=0 spamscore=0 malwarescore=0 bulkscore=0 mlxscore=0 priorityscore=1501 mlxlogscore=999 suspectscore=0 adultscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2407110000 definitions=main-2407240132
Message-ID-Hash: GHE6KOTWARW7GN37JVRRPK2MQYVXIK35
X-Message-ID-Hash: GHE6KOTWARW7GN37JVRRPK2MQYVXIK35
X-MailFrom: prvs=193501744b=david.black@dell.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tsvwg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: tsvwg IETF list <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
List-Id: Transport Area Working Group <tsvwg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/zxCwKhu9QvmRVgdDc-jM2WsqoeY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Owner: <mailto:tsvwg-owner@ietf.org>
List-Post: <mailto:tsvwg@ietf.org>
List-Subscribe: <mailto:tsvwg-join@ietf.org>
List-Unsubscribe: <mailto:tsvwg-leave@ietf.org>
>>> [JL] In any case, the user/device/home cannot exceed the bandwidth they have been provisioned. >>... would be a fine "abuser can only shoot itself in the foot" conclusion to most of the security concerns because the boundaries prevent damage to others. > [JL] Would that be best in this draft or a more generalized anti-DoS-resilience sort of draft, since this behavior can occur irrespective of whether NQB is used? Something would need to be stated in this draft in order to use presence of this class of provisioning and boundary enforcement functionality in support of the "abuser can only shoot itself in the foot" conclusion to most of the security concerns. OTOH, a complete explanation of the possible forms of this functionality and discussion of access network architecture is likely not necessary. > On the other hand, it seems obvious that if you have provisioned X bandwidth that it would be impossible to exceed that provisioned bandwidth. What is not obvious is the limitation of this PHB to equipment that can do that class of bandwidth provisioning and enforcement at user/device/home granularity – that would need to be stated. Thanks, --David From: Livingood, Jason <jason_livingood=40comcast.com@dmarc.ietf.org> Sent: Wednesday, July 24, 2024 1:40 PM To: Black, David <David.Black@dell.com>; Black, David <David.Black@dell.com>; Overcash, Michael (CCI-Atlanta) <michael.overcash@cox.com>; gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>; gwhiteCL/NQBdraft <NQBdraft@noreply.github.com> Cc: tsvwg IETF list <tsvwg@ietf.org> Subject: Re: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48) [EXTERNAL EMAIL] >> [JL] First hop access gear would typically still have per user/device/home flow boundaries >Would it be reasonable to specify those boundaries in a bit more detail and limit usage of this PHB to equipment that enforces such boundaries? >If that were to be done, then ... >> [JL] In any case, the user/device/home cannot exceed the bandwidth they have been provisioned. >... would be a fine "abuser can only shoot itself in the foot" conclusion to most of the security concerns because the boundaries prevent damage to others. [JL] Would that be best in this draft or a more generalized anti-DoS-resilience sort of draft, since this behavior can occur irrespective of whether NQB is used? It could be a very short BCP, basically saying it is best practice in an access network to enforce per-user/device/home bandwidth limits so that one user cannot exceed their provisioned bandwidth and negatively affect other users. On the other hand, it seems obvious that if you have provisioned X bandwidth that it would be impossible to exceed that provisioned bandwidth.
- [tsvwg] Re: [gwhiteCL/NQBdraft] Should traffic pr… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Jonathan Morton
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller