
From nobody Mon Feb  4 02:30:13 2019
Return-Path: <boris.pilka@x-works.io>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C6C9130E3F for <hackathon@ietfa.amsl.com>; Mon,  4 Feb 2019 02:30:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level: 
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_REMOTE_IMAGE=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=x-works-io.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TOOOLlyUinEh for <hackathon@ietfa.amsl.com>; Mon,  4 Feb 2019 02:29:57 -0800 (PST)
Received: from mail-wr1-x42a.google.com (mail-wr1-x42a.google.com [IPv6:2a00:1450:4864:20::42a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0AF18130DE7 for <hackathon@ietf.org>; Mon,  4 Feb 2019 02:29:52 -0800 (PST)
Received: by mail-wr1-x42a.google.com with SMTP id a16so8184525wrv.0 for <hackathon@ietf.org>; Mon, 04 Feb 2019 02:29:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=x-works-io.20150623.gappssmtp.com; s=20150623; h=from:subject:to:message-id:date:user-agent:mime-version :content-language; bh=gi18EnccZn2pPtLEMMJtRuKt+9NIykb7oDNQ+P9DzR4=; b=CIRG+7f+M03tDENl2GCnDGMHDTLxJ2RSWKTstOFlU5oWDJkYb5boPkYZXaWFP+XGiU nxV3Tc2HZixcQa4zCRBshACDPVZ+LktxRc3eQs7okncsOOnLX98rAowMssaDhQdcQk2s luhGs0vn8+/PVGCeNf4BLqC0lmBNXcMkgyTHF19JKpitb1zk9N71zZKOe+rdlgQZ7b7N HJ3ZIyETdfsOvdpn3XFdh+GmACKwpfm38QJrXHprzthMHi0edXYGA8/hJTGZyY10oemT zv1nyOVSDDJlClB5nBOuS5hDpT7gNfrMPEVcEtQF075JeqN8vjegLq27URNvB4Rksacm d65g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:subject:to:message-id:date:user-agent :mime-version:content-language; bh=gi18EnccZn2pPtLEMMJtRuKt+9NIykb7oDNQ+P9DzR4=; b=uZp+00Wm4USrUvse9pvPrbm6becRV7wOSd9urWvOnssoIWUeHxKJ6Rv9fIUIwvkxxE WT/ROTbHz6j/ApulH5J34Oy4Wfq5h8LvIoHYNm7lq9aDWN8IX3hDbLboSag/kflulNsG kHmIXMgPU1FPLPYxtgi//WzFeBjrwnPx9guTDU2QX09Y+zjtoeXWgVzipA1PAKT+Mgxb 1TeMdPGri8TvFvAPVgEFkgwf10Tm/d9NLjzgtBcGfMwlCFgLdXLl22KjxlYDE4e1zePk bpPxdnAWoj5U/k11zMrpRxiEek8yPQqNlVD6dNrgHqcnkG08lCsPho5kUtp01GbO1W48 st/g==
X-Gm-Message-State: AJcUukcmfUpt1nVtPzYVGWyMkBFDvZJegAbUyoaza6ICTasktWIST1FI d433YPGZ4c+1BIR1qaMWqsOG9OB3RwXwfA==
X-Google-Smtp-Source: ALg8bN4NEgUxlnoGaR1aLQno2djqGMjetXcYi1OgHVEzBpKN0espNS73HvKWy6mPuvAGfkkJfEEkSg==
X-Received: by 2002:adf:ee07:: with SMTP id y7mr50306723wrn.187.1549276190410;  Mon, 04 Feb 2019 02:29:50 -0800 (PST)
Received: from [192.168.0.18] ([195.28.94.38]) by smtp.gmail.com with ESMTPSA id f199sm12559936wmd.25.2019.02.04.02.29.49 for <hackathon@ietf.org> (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 04 Feb 2019 02:29:49 -0800 (PST)
From: Boris Pilka <boris.pilka@x-works.io>
To: hackathon@ietf.org
Message-ID: <a46d6df7-1374-c2a5-3b83-74498d289b3b@x-works.io>
Date: Mon, 4 Feb 2019 11:29:48 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.5.0
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------46A63AEE69D1637CC8C695C9"
Content-Language: en-US
X-Antivirus: Avast (VPS 190203-4, 02/03/2019), Outbound message
X-Antivirus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/zaDPwrxPKV-rjfgINI5lLee-Tog>
Subject: [hackathon] DTN - Bundle protocol agent
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2019 10:30:11 -0000

This is a multi-part message in MIME format.
--------------46A63AEE69D1637CC8C695C9
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Hello all,

below is a brief summary of what we would like to do on the upcoming 
IETF 104 Hackathon. If you find the project interesting, please, join us!

Kind regards,

Boris
=================================

Enhancements of pyDTN

What is pyDTN ?
   - proof of concept (POC) implementation of Bundle protocol agent in 
python3. Most of the integration work was done on 101th IETF's Hackathon.

What it does/doesn't do ?
   - able to receive and decode bundle (Bundle Protocol Version 7, 
https://tools.ietf.org/html/draft-ietf-dtn-bpbis-10)

   - uses TCP-based convergence layer for Delay-Tolerant Networking 
(DTN) - Delay-Tolerant Networking TCP Convergence-Layer 
Protocol(https://tools.ietf.org/html/rfc7242)
       - partial implementation - sending/receiving of contact headers

   - provides REST APIs for configuration of uPCN :
       - send bundle
       - schedule contact

   - partial implementation of DTN IP Neighbor Discovery (IPND) 
(https://tools.ietf.org/html/draft-irtf-dtnrg-ipnd-03)
       - code able to send/receive beacon is present, however it is not 
integrated to daemon

Goals for hackathon:
     - enhance implementation of TCP-based convergence layer
     - incorporate DTN IP Neighbor Discovery
     - any other enhancements are welcomed, will largely depend on size 
of the team




---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

--------------46A63AEE69D1637CC8C695C9
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Hello all,<br>
      <br>
      below is a brief summary of what we would like to do on the
      upcoming IETF 104 Hackathon. If you find the project interesting,
      please, join us! <br>
      <br>
      Kind regards,<br>
      <br>
      Boris<br>
      =================================</p>
    <tt>Enhancements of pyDTN</tt><tt><br>
    </tt><tt> </tt><tt><br>
    </tt><tt>What is pyDTN ?</tt><tt><br>
    </tt><tt>  - proof of concept (POC) implementation of Bundle
      protocol agent in python3. Most of the integration work was done
      on 101th IETF's Hackathon.</tt><tt><br>
    </tt><tt>  </tt><tt><br>
    </tt><tt>What it does/doesn't do ?</tt><tt><br>
    </tt><tt>  - able to receive and decode bundle (Bundle Protocol
      Version 7, <a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-ietf-dtn-bpbis-10">https://tools.ietf.org/html/draft-ietf-dtn-bpbis-10</a>)</tt><tt><br>
    </tt><tt><br>
    </tt><tt>  - uses TCP-based convergence layer for Delay-Tolerant
      Networking (DTN) - Delay-Tolerant Networking TCP Convergence-Layer
      Protocol(<a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/rfc7242">https://tools.ietf.org/html/rfc7242</a>)</tt><tt><br>
    </tt><tt>      - partial implementation - sending/receiving of
      contact headers</tt><tt><br>
    </tt><tt><br>
    </tt><tt>  - provides REST APIs for configuration of uPCN :</tt><tt><br>
    </tt><tt>      - send bundle</tt><tt><br>
    </tt><tt>      - schedule contact</tt><tt><br>
    </tt><tt><br>
    </tt><tt>  - partial implementation of DTN IP Neighbor Discovery
      (IPND) (<a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-irtf-dtnrg-ipnd-03">https://tools.ietf.org/html/draft-irtf-dtnrg-ipnd-03</a>)</tt><tt><br>
    </tt><tt>      - code able to send/receive beacon is present,
      however it is not integrated to daemon</tt><tt><br>
    </tt><tt><br>
    </tt><tt>Goals for hackathon:</tt><tt><br>
    </tt><tt>    - enhance implementation of TCP-based convergence layer</tt><tt><br>
    </tt><tt>    - incorporate DTN IP Neighbor Discovery</tt><tt><br>
    </tt><tt>    - any other enhancements are welcomed, will largely
      depend on size of the team</tt>
    <pre>
</pre>
    <br>
  <div id="DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2"><br />
<table style="border-top: 1px solid #D3D4DE;">
	<tr>
        <td style="width: 55px; padding-top: 13px;"><a href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=icon" target="_blank"><img src="https://ipmcdn.avast.com/images/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif" alt="" width="46" height="29" style="width: 46px; height: 29px;" /></a></td>
		<td style="width: 470px; padding-top: 12px; color: #41424e; font-size: 13px; font-family: Arial, Helvetica, sans-serif; line-height: 18px;">Virus-free. <a href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=link" target="_blank" style="color: #4453ea;">www.avast.com</a>
		</td>
	</tr>
</table><a href="#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2" width="1" height="1"> </a></div></body>
</html>

--------------46A63AEE69D1637CC8C695C9--


From nobody Tue Feb 19 09:01:20 2019
Return-Path: <phperric@cisco.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B503D130F2A for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:01:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xm7c_NQS6eCH for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:01:16 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B556130F29 for <hackathon@ietf.org>; Tue, 19 Feb 2019 09:01:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4233; q=dns/txt; s=iport; t=1550595676; x=1551805276; h=from:to:subject:date:message-id:mime-version; bh=PYCOzgd8Mc4837OH2Ea9AG/aFDyoKmDWRGHQBnroBUg=; b=l7/COdxwVcyRt1eSLcjc9hgee1/Ehe/26pVreLoT1H9VASTAjDF34NxL AEqwQI3tJcQ2qpuPHwP0C/zuoZvYWD6D2Q+07E6qnvLCxmKKeZmPyB51y er2rBuMx3Y1JkjBvJL9UEanOLYx3bzhAvd1yr0U6G2bg32meJ6Qs8qcVj c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BwAAA6NWxc/5xdJa1jHAEBAQQBAQc?= =?us-ascii?q?EAQGBUwUBAQsBgQ1MKmeBAzGYBZQ3hXGBewsBAYF3hmIiNgcNAQMBAQIBAQJ?= =?us-ascii?q?tHQuFfjsjAQx0HwcBBBuCT0qBDmSvB4ouhXqGSheBQD+PBAKKEQOGGocXjAQ?= =?us-ascii?q?JAoZ1i1ohkwSKRZF+AhEUgScmCCmBVnAVgyiQXEGMdYEfAQE?=
X-IronPort-AV: E=Sophos;i="5.58,388,1544486400";  d="scan'208,217";a="521263258"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2019 17:00:51 +0000
Received: from XCH-RCD-013.cisco.com (xch-rcd-013.cisco.com [173.37.102.23]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x1JH0pxs028935 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for <hackathon@ietf.org>; Tue, 19 Feb 2019 17:00:51 GMT
Received: from xch-aln-013.cisco.com (173.36.7.23) by XCH-RCD-013.cisco.com (173.37.102.23) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 19 Feb 2019 11:00:50 -0600
Received: from xch-aln-013.cisco.com ([173.36.7.23]) by XCH-ALN-013.cisco.com ([173.36.7.23]) with mapi id 15.00.1395.000; Tue, 19 Feb 2019 11:00:50 -0600
From: "Philip Perricone (phperric)" <phperric@cisco.com>
To: "hackathon@ietf.org" <hackathon@ietf.org>
Thread-Topic: question about hackathon cost
Thread-Index: AdTIdKO5JEJT+iJiRUe2nxdyTmJOWQ==
Date: Tue, 19 Feb 2019 17:00:50 +0000
Message-ID: <b079a026857c40459fdd2be0ba10f41f@XCH-ALN-013.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.234.134]
Content-Type: multipart/alternative; boundary="_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.23, xch-rcd-013.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/Ey6IngeyEhbuIcSHCx8S4OTy27c>
Subject: [hackathon] question about hackathon cost
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2019 17:01:19 -0000

--_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hello,

I have a questions related to the upcoming IETF 104 Hackathon.

On the IETF website, it says "IETF Hackathons are free to attend and open t=
o everyone".
It seems obvious, but could anyone with experience here confirm that regist=
ration (and payment) for the overall IETF conference
is NOT necessary to attend/participate in the Hackathon event?

In other words, the Hackathon truly is "free and open"?
I want to make sure that I understand correctly.

Thanks!

Philip Perricone
Cisco Systems, Inc.
Software Engineer
Security & Trust Organization
Research Triangle Park, NC


--_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hello,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I have a questions related to the upcoming IETF 104 =
Hackathon.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">On the IETF website, it says &#8220;IETF Hackathons =
are free to attend and open to everyone&#8221;.<o:p></o:p></p>
<p class=3D"MsoNormal">It seems obvious, but could anyone with experience h=
ere confirm that registration (and payment) for the overall IETF conference=
<o:p></o:p></p>
<p class=3D"MsoNormal">is NOT necessary to attend/participate in the Hackat=
hon event?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">In other words, the Hackathon truly is &#8220;free a=
nd open&#8221;?<o:p></o:p></p>
<p class=3D"MsoNormal">I want to make sure that I understand correctly.<o:p=
></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks!<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Philip Perricone<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Cisco Systems, Inc.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Software Engineer<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Security &amp; Trust Org=
anization<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Research Triangle Park, =
NC<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_--


From nobody Tue Feb 19 09:10:59 2019
Return-Path: <acm@research.att.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 433C3130F2C for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:10:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ID-EYMvoP3HB for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:10:54 -0800 (PST)
Received: from mx0a-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87760130F27 for <hackathon@ietf.org>; Tue, 19 Feb 2019 09:10:54 -0800 (PST)
Received: from pps.filterd (m0049459.ppops.net [127.0.0.1]) by m0049459.ppops.net-00191d01. (8.16.0.27/8.16.0.27) with SMTP id x1JH6lig036448; Tue, 19 Feb 2019 12:10:53 -0500
Received: from tlpd255.enaf.dadc.sbc.com (sbcsmtp3.sbc.com [144.160.112.28]) by m0049459.ppops.net-00191d01. with ESMTP id 2qrnpg0hh2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 19 Feb 2019 12:10:52 -0500
Received: from enaf.dadc.sbc.com (localhost [127.0.0.1]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAput069099; Tue, 19 Feb 2019 11:10:52 -0600
Received: from zlp30499.vci.att.com (zlp30499.vci.att.com [135.46.181.149]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAmEM069019; Tue, 19 Feb 2019 11:10:48 -0600
Received: from zlp30499.vci.att.com (zlp30499.vci.att.com [127.0.0.1]) by zlp30499.vci.att.com (Service) with ESMTP id DACD94013B46; Tue, 19 Feb 2019 17:10:48 +0000 (GMT)
Received: from clpi183.sldc.sbc.com (unknown [135.41.1.46]) by zlp30499.vci.att.com (Service) with ESMTP id B9FA44013B47; Tue, 19 Feb 2019 17:10:48 +0000 (GMT)
Received: from sldc.sbc.com (localhost [127.0.0.1]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAmR9021646; Tue, 19 Feb 2019 11:10:48 -0600
Received: from mail-green.research.att.com (mail-green.research.att.com [135.207.255.15]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAeZS021232; Tue, 19 Feb 2019 11:10:40 -0600
Received: from exchange.research.att.com (njbdcas1.research.att.com [135.197.255.61]) by mail-green.research.att.com (Postfix) with ESMTP id E66B9E41EB; Tue, 19 Feb 2019 12:10:05 -0500 (EST)
Received: from njmtexg5.research.att.com ([fe80::b09c:ff13:4487:78b6]) by njbdcas1.research.att.com ([fe80::8c6b:4b77:618f:9a01%11]) with mapi id 14.03.0439.000; Tue, 19 Feb 2019 12:10:39 -0500
From: "MORTON, ALFRED C (AL)" <acm@research.att.com>
To: "Philip Perricone (phperric)" <phperric@cisco.com>, "hackathon@ietf.org" <hackathon@ietf.org>
Thread-Topic: question about hackathon cost
Thread-Index: AdTIdKO5JEJT+iJiRUe2nxdyTmJOWQAASyEA
Date: Tue, 19 Feb 2019 17:10:16 +0000
Message-ID: <4D7F4AD313D3FC43A053B309F97543CF6BFFAA3F@njmtexg5.research.att.com>
References: <b079a026857c40459fdd2be0ba10f41f@XCH-ALN-013.cisco.com>
In-Reply-To: <b079a026857c40459fdd2be0ba10f41f@XCH-ALN-013.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.16.251.151]
Content-Type: multipart/alternative; boundary="_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-02-19_11:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=751 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902190126
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/pKV7IqU8JBA31gEdfxiyokbR3tQ>
Subject: Re: [hackathon] question about hackathon cost
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2019 17:10:57 -0000

--_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Yes, free and open is quite correct for the hackathon-only,
no IETF registration is required, Philip.

Al

From: hackathon [mailto:hackathon-bounces@ietf.org] On Behalf Of Philip Per=
ricone (phperric)
Sent: Tuesday, February 19, 2019 12:01 PM
To: hackathon@ietf.org
Subject: [hackathon] question about hackathon cost

Hello,

I have a questions related to the upcoming IETF 104 Hackathon.

On the IETF website, it says "IETF Hackathons are free to attend and open t=
o everyone".
It seems obvious, but could anyone with experience here confirm that regist=
ration (and payment) for the overall IETF conference
is NOT necessary to attend/participate in the Hackathon event?

In other words, the Hackathon truly is "free and open"?
I want to make sure that I understand correctly.

Thanks!

Philip Perricone
Cisco Systems, Inc.
Software Engineer
Security & Trust Organization
Research Triangle Park, NC


--_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Courier New",serif;
	color:black;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif;color:black">Yes, free and open is quite correct for the hackathon-onl=
y,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif;color:black">no IETF registration is required, Philip.<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif;color:black">Al<o:p></o:p></span></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"font-fami=
ly:&quot;Courier New&quot;,serif;color:black"><o:p>&nbsp;</o:p></span></a><=
/p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> hackathon [mailto:hackathon-bounces@iet=
f.org] <b>
On Behalf Of </b>Philip Perricone (phperric)<br>
<b>Sent:</b> Tuesday, February 19, 2019 12:01 PM<br>
<b>To:</b> hackathon@ietf.org<br>
<b>Subject:</b> [hackathon] question about hackathon cost<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Hello,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I have a questions related to the upcoming IETF 104 =
Hackathon.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">On the IETF website, it says &#8220;IETF Hackathons =
are free to attend and open to everyone&#8221;.<o:p></o:p></p>
<p class=3D"MsoNormal">It seems obvious, but could anyone with experience h=
ere confirm that registration (and payment) for the overall IETF conference=
<o:p></o:p></p>
<p class=3D"MsoNormal">is NOT necessary to attend/participate in the Hackat=
hon event?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">In other words, the Hackathon truly is &#8220;free a=
nd open&#8221;?<o:p></o:p></p>
<p class=3D"MsoNormal">I want to make sure that I understand correctly.<o:p=
></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks!<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Philip Perricone<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Cisco Systems, Inc.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Software Engineer<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Security &amp; Trust Org=
anization<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Research Triangle Park, =
NC<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_--


From nobody Tue Feb 19 09:25:37 2019
Return-Path: <pbeal@cisco.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D440B130F44 for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:25:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level: 
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4CFbKGqv75eV for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:25:34 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52BEA130F40 for <hackathon@ietf.org>; Tue, 19 Feb 2019 09:25:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=127; q=dns/txt; s=iport; t=1550597134; x=1551806734; h=to:from:subject:message-id:date:mime-version: content-transfer-encoding; bh=zLlaij0lZ6g5hdvbKPupRPUxZ7jsCmiKwpMVla/53ZY=; b=mBH9OlMTou8NmZBy/0mAuiYyrfoUVOAmr5Ln4CtCvi2GA8dbfBipn5Bt JHHWqCu7zPg2KGqUREAT1V6LzOFvwtmRyOzL2E9NTvVJd1STkhRXioEwX DXST7MxZyyNibhRorCf02LwtoEkd/Aqbgw/BsNEtQVN+3qtZCbHkmeyLr U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AdAwDhOmxc/5xdJa1jHAEBAQQBAQc?= =?us-ascii?q?EAQGBZYIEgTcBMoQtlAmcIw2EYoN3IjgSAQMBAQIBAQJtHQuFdA8BewImAl8?= =?us-ascii?q?NCAEBgxyBc61ggS+KMIELhniEQReBQD+BOIp1glcCkVGReAmSUwYZgWEBkSK?= =?us-ascii?q?KRZIlgV0hKIEuMxoIGxWDKJB6IQOOEwEB?=
X-IronPort-AV: E=Sophos;i="5.58,388,1544486400"; d="scan'208";a="510817505"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2019 17:25:32 +0000
Received: from dhcp-10-150-34-131.cisco.com (dhcp-10-150-34-131.cisco.com [10.150.34.131]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTP id x1JHPWKC029001 for <hackathon@ietf.org>; Tue, 19 Feb 2019 17:25:32 GMT
To: "hackathon@ietf.org" <hackathon@ietf.org>
From: Peter Beal <pbeal@cisco.com>
Openpgp: preference=signencrypt
Autocrypt: addr=pbeal@cisco.com; prefer-encrypt=mutual; keydata= mQINBFXP0S8BEAC58SavuJHGtmMEd2SJvXdj3OKcFMLNUFamb7lJrFK4qxkBkFX23+H5aY4/ mn0g1ux8pGkktLggcnIinbevFwOSOMgVP6WYpTKhfRvN0DPslLKmypqcEWR+isFGafT51Pve J22JCvsyso+3PV3RwJn+jfnp7jwVE7ABElUFraeE7OrRVOMxlJEb0mqU09fZ14TpIj9zmSdy uqCkYST4Oy2UgXGBivHIg4aX5poOoP7EvWlCZyMymsSHNBjJPXnQLcrqTsrF66IGEJRIBWoh zg1IGPl50Dfv0W5zdKvfnsm6+0z5h9UAfVZrFnMGYnFRfZQrqleepOqrcaHIZhPchTuvMsPR duvxeVKeIsW6j41reMeAFSgTnHteiDE9SA+SSutNys49dYWZFQWotO9XzxDo4p3cDM6xt1hc hAx9rSTSAuH33yVwCUDb1l8H0aG05gp9Kf8nig/lq4mA+Ls3Nzkq3/H8VySR9Z/69ZtZSLSm zpUoGdZFyVuO9zYVLJgGslw8bJbARzQWZw715tfGbLouhrKwRX/qbnU68bSGJg0dPok1XTKN dQSaTQ+zgNzMUxfWjr7ST5ehpDW8scmB+gedimqc9YtmuDrke570XYLGNGIn8Pm6FO7kCh8N bIBDyhbKwsQlnt14ut/z5gL1a8sjnb3o+qVZSjXgjxlnqq8PsQARAQABtBxQZXRlciBCZWFs IDxwYmVhbEBjaXNjby5jb20+iQI9BBMBCgAnBQJVz9EvAhsDBQkHhh+ABQsJCAcDBRUKCQgL BRYCAwEAAh4BAheAAAoJEJ8J5d/C8fFUNb4P/jFaLHmFevaikD/eXwQIArRfY+NwBpGkSjBY YNlchlzxO0LCIp8yx8X8oWewqBFerNdf+TmWXzyb2ECaYmwRmCEpKid8iGFm2/1pf7V4GNpc L6uwCyJaZOUk+Q50n6REI1bj0NOJjXM35xMNWT2TRVmw3Bl3+8ce4VdxvabmSdtX8ZBzosq1 xjNYyrns9Unq7Xp+O82NUPOj/F0orsoc4q0mvPCCGlEYGS6KDWjhO7rNiRWtztm4IIsyWaJH eSvjhqtHu4g2/o6gRVrjBLHRHxGUMPX0e7WBlus6iXWt/jt18IU6LP7xZ3bJVGOjbuSHANDG 7fpOtZBAT2wAaXukB6CFWc5qEpGRnR435f9OKa8hc5pxxS+LZbCwWYCcfgIE421+Ce/PjsbM DnCijMmQlNPVsjZmI/h+eJPjYy7LlzBUJQKzFLBopr2oET8zvq6IuLgByVp/CxV11GV39A/g kE0yOOy8okyq4EsrcNHVZzQgYHFZKIQ4cQi8t19s2yckJHbLZKGdaTSbBAMmUfgNarXd2o/x hy7TpuhveJ9VFcXtyTUi8/HjxSR9B3Nwhc6+LTpe8/hpemyWvbmjp0HxwkLVheyjWSXTJib1 wgemB1tzTNJe0vZF8CK8p/d/cVwP81WAN7jjA/4Loj8XD+abPOroRAyhht7LSVErpwGRVqm6 uQINBFXP0S8BEADFFs4dxyoCzzloj9k0Po8GJmguFjB1ejZlnBXfniesrX7CshQf8p73NhLe FzrnGpq6vwoTN/PNa3iG2V+Xd2dzTaWOwxKIwD8uaoWS/M7eU024YuEBv3DJOkvmq3x+JmIL GgYsdBrzJEqvZLSYaHyfvLLH1hE90IIFvUOEGVAgL/Kq/OMWuOoHSmGycHpD7jPZ2YSNOsMv /u4g4/v20mxzCiL3a4i/GPNSuv0dk7F9Xk0QNG8UDhNX0BK/XD5e7hjpwXvdytUH+OsPEqwt A24Y1yabBe1HqZv/wiTI7lwAtDg8X8dC3nfJK8RgFHRqDr0u93JT7StyKYJohKNY1hGTryVa rnHFB+BeZutVU9RC48Gw6jjshcmUyclnkjyNG8ufnaVpW9yt+SEzvRq8/P1wR8zm+BbnuSY3 46T03k2GtXOMaKTPI7y4WDBs3s/SjJCfAwSpH5JgduWUItTZA2y5igfeZRVxlMng3F3OEfdu l6A9lmvvpdbwlkPe7nY0QRI447EdjbkLoQh/W/MNViLOhZzcmSPHVWdjl+OcpCEjgVshcbVn 5NVnw89Gd52XaUJ9ap8eQ5ni3iW9ARi4+9Uw7QIF/WZ43GpNrgWlgEoEaGYlAViC5wqjZ1kL RdwmDGjdAkdLP9pUdlFe2QzCvyOZ27FjziaskSr5AY4lS3nQ3QARAQABiQIlBBgBCgAPBQJV z9EvAhsMBQkHhh+AAAoJEJ8J5d/C8fFUeVgP/jXIKWGAxnmp1Cyqu3Mod0E1bcS2vsV/XbsQ pMMqwFB3za0MD4eoEcJ3aQn2/JzGI5+opygJb2pgKjbGpx2HVZrupGPhenMbqhBN8YhXWZLN lJPKt38D3DEJmiKWnEtfMzkfMBUUjUahypfBWe2slrYyve9LYoPrrEhPoaR11m/ZHveoolFi XlLTeCTxz30sw+Ucae1hEsD6329N9E/nxoJX3yc+O4EkItI84kfYAogfSSkXR7tguzSjY4kE 54nt25mFFFpwy9bG0Tm6CjNFh9njBQUaGbSamM+jjqy/VM7ptbnc8aJ+2Hdj0lv4pLuDE0SX EsXkI8z1KtQF6gJMDx+q6sS1fOhsMwG7aPY5frvdxZI1n+YYnXaIAGOxajazd55JKMDbAG+t yLu9BavKB3d0syzRTnlDyc2bjJFLLr6AwVNf32898gZD5b8v7Bz6uKyUYmpKr5vrdFKYHOGq FtHba/CgGtiZlywkJtTZ6jy9S0QJig+m7e6+KeKZMgWyu4x0E8FwBfHL5Gd1E+1SacSNwI2U pRPryQ9MNZ46eqXeoEmhRrxHsXice25gKDQcEog0psmdI/J7aNlCD/oomxS5jVSWwZ3r5rdx fTeG4WnaYqztCK8+0aCsEClkoqU32uKKsRzFrUjzT684u1iJmnvphFKedybWurJDalkJHraC
Message-ID: <7505e2cb-5f06-d7dd-f166-cfd3f33fc158@cisco.com>
Date: Tue, 19 Feb 2019 12:25:32 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Outbound-SMTP-Client: 10.150.34.131, dhcp-10-150-34-131.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/1PMU90HjzPBnLntX_SHho8PwlG0>
Subject: [hackathon] EST over coaps at the hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2019 17:25:36 -0000

Hi,

By any chance might there be testing of EST over coaps at this
hackathon?  Is anyone ready to test?

Thanks,
Pete


From nobody Tue Feb 19 09:38:00 2019
Return-Path: <lee.howard@retevia.net>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4416F130F2A for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:37:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=retevia.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0bT-fxUZfyCE for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:37:56 -0800 (PST)
Received: from eastern.maple.relay.mailchannels.net (eastern.maple.relay.mailchannels.net [23.83.214.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A4C112950A for <hackathon@ietf.org>; Tue, 19 Feb 2019 09:37:56 -0800 (PST)
X-Sender-Id: dreamhost|x-authsender|lee.howard@retevia.net
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 05BF15E3582 for <hackathon@ietf.org>; Tue, 19 Feb 2019 17:37:55 +0000 (UTC)
Received: from pdx1-sub0-mail-a34.g.dreamhost.com (unknown [100.96.19.78]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id 94E7B5E36F6 for <hackathon@ietf.org>; Tue, 19 Feb 2019 17:37:54 +0000 (UTC)
X-Sender-Id: dreamhost|x-authsender|lee.howard@retevia.net
Received: from pdx1-sub0-mail-a34.g.dreamhost.com (pop.dreamhost.com [64.90.62.162]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384) by 0.0.0.0:2500 (trex/5.16.2); Tue, 19 Feb 2019 17:37:54 +0000
X-MC-Relay: Neutral
X-MailChannels-SenderId: dreamhost|x-authsender|lee.howard@retevia.net
X-MailChannels-Auth-Id: dreamhost
X-Print-Troubled: 2c45e95b244d5c0c_1550597874868_1922329636
X-MC-Loop-Signature: 1550597874868:3976254047
X-MC-Ingress-Time: 1550597874867
Received: from pdx1-sub0-mail-a34.g.dreamhost.com (localhost [127.0.0.1]) by pdx1-sub0-mail-a34.g.dreamhost.com (Postfix) with ESMTP id F247D7FF1E for <hackathon@ietf.org>; Tue, 19 Feb 2019 09:37:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=retevia.net; h=subject:to :references:from:message-id:date:mime-version:in-reply-to :content-type; s=retevia.net; bh=TWyyxF6VIwGmpr3YsAjR9RytkSg=; b= qA6GPaeU/4nBJ3DDZ7b5mXpoUXQN6frF6YQ1uDoZnTyUeRnNSkAbr0y34yYJTEGT 1dx8vR8SQH0gE4MW8R9C+JPL3d1hRjBgJW9h/o20IuDqUmBt6PTxxq2vjhi4iFZW 7WD6BmDcWGaMQfy4Dkq1KaPPqCYxshYNkDu3ma6JvCQ=
Received: from [192.168.1.135] (ip68-100-71-215.dc.dc.cox.net [68.100.71.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: lee.howard@retevia.net) by pdx1-sub0-mail-a34.g.dreamhost.com (Postfix) with ESMTPSA id EA1A77FF16 for <hackathon@ietf.org>; Tue, 19 Feb 2019 09:37:52 -0800 (PST)
To: hackathon@ietf.org
References: <b079a026857c40459fdd2be0ba10f41f@XCH-ALN-013.cisco.com>
X-DH-BACKEND: pdx1-sub0-mail-a34
From: Lee Howard <lee.howard@retevia.net>
Message-ID: <a19358f4-fec2-aac7-69e8-ff42b39c0a24@retevia.net>
Date: Tue, 19 Feb 2019 12:37:51 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
In-Reply-To: <b079a026857c40459fdd2be0ba10f41f@XCH-ALN-013.cisco.com>
Content-Type: multipart/alternative; boundary="------------61CC91670C7874F315AF8B91"
Content-Language: en-US
X-VR-OUT-STATUS: OK
X-VR-OUT-SCORE: 0
X-VR-OUT-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedutddrtdeggddutddvucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuggftfghnshhusghstghrihgsvgdpffftgfetoffjqffuvfenuceurghilhhouhhtmecufedttdenucenucfjughrpefuvfhfhffkffgfgggjtgesrgdtreertdefheenucfhrhhomhepnfgvvgcujfhofigrrhguuceolhgvvgdrhhhofigrrhgusehrvghtvghvihgrrdhnvghtqeenucffohhmrghinhepihgvthhfrdhorhhgnecukfhppeeikedruddttddrjedurddvudehnecurfgrrhgrmhepmhhouggvpehsmhhtphdphhgvlhhopegludelvddrudeikedruddrudefhegnpdhinhgvthepieekrddutddtrdejuddrvdduhedprhgvthhurhhnqdhprghthhepnfgvvgcujfhofigrrhguuceolhgvvgdrhhhofigrrhgusehrvghtvghvihgrrdhnvghtqedpmhgrihhlfhhrohhmpehlvggvrdhhohifrghrugesrhgvthgvvhhirgdrnhgvthdpnhhrtghpthhtohephhgrtghkrghthhhonhesihgvthhfrdhorhhgnecuvehluhhsthgvrhfuihiivgeptd
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/IHQPtSN3epv8gxxtQvDiF8QZtec>
Subject: Re: [hackathon] question about hackathon cost
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2019 17:37:58 -0000

This is a multi-part message in MIME format.
--------------61CC91670C7874F315AF8B91
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: quoted-printable

Yes, it's true.

I have collaborated with people at Hackathons who were only there for=20
the Hackathon, and did not rgister for or attend the IETF meeting. They=20
do request registration, but I suspect that's mostly to know what size=20
T-shirt and how many cookies to have.

If you're undecided about whether to attend, definitely attend.

Lee

On 2/19/19 12:00 PM, Philip Perricone (phperric) wrote:
>
> Hello,
>
> I have a questions related to the upcoming IETF 104 Hackathon.
>
> On the IETF website, it says =93IETF Hackathons are free to attend and=20
> open to everyone=94.
>
> It seems obvious, but could anyone with experience here confirm that=20
> registration (and payment) for the overall IETF conference
>
> is NOT necessary to attend/participate in the Hackathon event?
>
> In other words, the Hackathon truly is =93free and open=94?
>
> I want to make sure that I understand correctly.
>
> Thanks!
>
> Philip Perricone
>
> Cisco Systems, Inc.
>
> Software Engineer
>
> Security & Trust Organization
>
> Research Triangle Park, NC
>
>
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org
> https://www.ietf.org/mailman/listinfo/hackathon

--------------61CC91670C7874F315AF8B91
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta http-equiv=3D"Content-Type" content=3D"text/html;
      charset=3Dwindows-1252">
  </head>
  <body text=3D"#000000" bgcolor=3D"#FFFFFF">
    <p>Yes, it's true.</p>
    <p>I have collaborated with people at Hackathons who were only there
      for the Hackathon, and did not rgister for or attend the IETF
      meeting. They do request registration, but I suspect that's mostly
      to know what size T-shirt and how many cookies to have.</p>
    <p>If you're undecided about whether to attend, definitely attend. <b=
r>
    </p>
    <p>Lee<br>
    </p>
    <div class=3D"moz-cite-prefix">On 2/19/19 12:00 PM, Philip Perricone
      (phperric) wrote:<br>
    </div>
    <blockquote type=3D"cite"
      cite=3D"mid:b079a026857c40459fdd2be0ba10f41f@XCH-ALN-013.cisco.com"=
>
      <meta http-equiv=3D"Content-Type" content=3D"text/html;
        charset=3Dwindows-1252">
      <meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
..MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
      <div class=3D"WordSection1">
        <p class=3D"MsoNormal">Hello,<o:p></o:p></p>
        <p class=3D"MsoNormal"><o:p>=A0</o:p></p>
        <p class=3D"MsoNormal">I have a questions related to the upcoming
          IETF 104 Hackathon.<o:p></o:p></p>
        <p class=3D"MsoNormal"><o:p>=A0</o:p></p>
        <p class=3D"MsoNormal">On the IETF website, it says =93IETF
          Hackathons are free to attend and open to everyone=94.<o:p></o:=
p></p>
        <p class=3D"MsoNormal">It seems obvious, but could anyone with
          experience here confirm that registration (and payment) for
          the overall IETF conference<o:p></o:p></p>
        <p class=3D"MsoNormal">is NOT necessary to attend/participate in
          the Hackathon event?<o:p></o:p></p>
        <p class=3D"MsoNormal"><o:p>=A0</o:p></p>
        <p class=3D"MsoNormal">In other words, the Hackathon truly is
          =93free and open=94?<o:p></o:p></p>
        <p class=3D"MsoNormal">I want to make sure that I understand
          correctly.<o:p></o:p></p>
        <p class=3D"MsoNormal"><o:p>=A0</o:p></p>
        <p class=3D"MsoNormal">Thanks!<o:p></o:p></p>
        <p class=3D"MsoNormal"><o:p>=A0</o:p></p>
        <p class=3D"MsoNormal"><span style=3D"color:black">Philip Perrico=
ne<o:p></o:p></span></p>
        <p class=3D"MsoNormal"><span style=3D"color:black">Cisco Systems,
            Inc.<o:p></o:p></span></p>
        <p class=3D"MsoNormal"><span style=3D"color:black">Software Engin=
eer<o:p></o:p></span></p>
        <p class=3D"MsoNormal"><span style=3D"color:black">Security &amp;
            Trust Organization<o:p></o:p></span></p>
        <p class=3D"MsoNormal"><span style=3D"color:black">Research Trian=
gle
            Park, NC<o:p></o:p></span></p>
        <p class=3D"MsoNormal"><o:p>=A0</o:p></p>
      </div>
      <br>
      <fieldset class=3D"mimeAttachmentHeader"></fieldset>
      <pre class=3D"moz-quote-pre" wrap=3D"">____________________________=
___________________
hackathon mailing list
<a class=3D"moz-txt-link-abbreviated" href=3D"mailto:hackathon@ietf.org">=
hackathon@ietf.org</a>
<a class=3D"moz-txt-link-freetext" href=3D"https://www.ietf.org/mailman/l=
istinfo/hackathon">https://www.ietf.org/mailman/listinfo/hackathon</a>
</pre>
    </blockquote>
  </body>
</html>

--------------61CC91670C7874F315AF8B91--


From nobody Tue Feb 19 09:50:37 2019
Return-Path: <eckelcu@cisco.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE145130F2B for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:50:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=NXS0xCBm; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=AwNgbjt5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ekpZYH93Q1so for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 09:50:33 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA0D3130F41 for <hackathon@ietf.org>; Tue, 19 Feb 2019 09:50:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14401; q=dns/txt; s=iport; t=1550598632; x=1551808232; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=s5tgtl3vJ72nU/lcDRpGLdxkIyJtPBEMiq6idUyXvMU=; b=NXS0xCBmf1OdIOc6VEkMWSEVHKux1L2/2JRGZp+QRzxnvjJK1NY1+D7z cWbEefOcGunhYyfJC+wN05Ppu9HGb1SZyUfOP20nlwcvSUcqspfkOMUz/ OJ0Hodpk92/pWhp9PNXZk2tOdc6kjWiH2WJfHzJ/6f3nhfhcJrZDQ69F+ Q=;
IronPort-PHdr: =?us-ascii?q?9a23=3AzCysRxK1ZYgawbU0SNmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvad2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXEDwL/PuZDESF8VZX1gj9Ha+YgBY?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AFAAB8QGxc/4oNJK1jGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBUQUBAQEBCwGBDSMpJwNndAQLJwqDfINHA4RQiyVKgg2SKoV?= =?us-ascii?q?xgSQDVAsBARgBCgmBS4IvRgIXg1QiNAkNAQMBAQIBAQJtHAyFSgEBAQEDAQE?= =?us-ascii?q?hChMBASYGDA8CAQgRAwECKAMCAgIlCxQJCAEBBAESgldJAYEOTAMVAQIMolU?= =?us-ascii?q?CihRxgS+CeAEBBYJFgkEYggsDBYV6hkoXgX+BOB+CTIMeAQGCAQ0JglMxgia?= =?us-ascii?q?KEwOGGocXjAQJAoZ1hDSHLhmBcIVViz+KRZF+AgQCBAUCDQEBBYFGOIFWcBU?= =?us-ascii?q?7KgGCQYIcDBeDS4UUhT9yAYEnixwBgR4BAQ?=
X-IronPort-AV: E=Sophos;i="5.58,388,1544486400";  d="scan'208,217";a="303141034"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2019 17:50:24 +0000
Received: from XCH-ALN-011.cisco.com (xch-aln-011.cisco.com [173.36.7.21]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x1JHoNjl032042 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 19 Feb 2019 17:50:23 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-011.cisco.com (173.36.7.21) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 19 Feb 2019 11:50:22 -0600
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 19 Feb 2019 11:50:22 -0600
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Tue, 19 Feb 2019 11:50:22 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=s5tgtl3vJ72nU/lcDRpGLdxkIyJtPBEMiq6idUyXvMU=; b=AwNgbjt50BqV+TKD0bnWiVIqMrTib86Uzq3xxouyGh+IMe2RMMJ6lFqvVIQAJWdN0inH8qJ7lnuPtOt75AVzuYzJaaY878QwHR0xKdtMBdPmn5NF/T0j3WJq04M5urYOl2RksaN2ACUVxbTE+y5SfFcPtqPagmes1P9b+dSqNd4=
Received: from DM6PR11MB3547.namprd11.prod.outlook.com (20.178.229.140) by DM6PR11MB2777.namprd11.prod.outlook.com (20.176.100.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1622.16; Tue, 19 Feb 2019 17:50:21 +0000
Received: from DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79]) by DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79%5]) with mapi id 15.20.1622.018; Tue, 19 Feb 2019 17:50:21 +0000
From: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
To: Lee Howard <lee.howard@retevia.net>, "hackathon@ietf.org" <hackathon@ietf.org>
Thread-Topic: [hackathon] question about hackathon cost
Thread-Index: AdTIdKO5JEJT+iJiRUe2nxdyTmJOWQABTJuA//99X4A=
Date: Tue, 19 Feb 2019 17:50:20 +0000
Message-ID: <9FF2F5DB-14C7-4DD4-8AE6-AF5646407105@cisco.com>
References: <b079a026857c40459fdd2be0ba10f41f@XCH-ALN-013.cisco.com> <a19358f4-fec2-aac7-69e8-ff42b39c0a24@retevia.net>
In-Reply-To: <a19358f4-fec2-aac7-69e8-ff42b39c0a24@retevia.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.16.0.190211
authentication-results: spf=none (sender IP is ) smtp.mailfrom=eckelcu@cisco.com; 
x-originating-ip: [128.107.241.168]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f16f4d6a-5b07-41ba-c6c2-08d69692b7b0
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600110)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:DM6PR11MB2777; 
x-ms-traffictypediagnostic: DM6PR11MB2777:
x-ms-exchange-purlcount: 2
x-microsoft-exchange-diagnostics: =?utf-8?B?MTtETTZQUjExTUIyNzc3OzIzOk9jMUZhMFprM3ZnaWVTeGVROElNbER5T1p2?= =?utf-8?B?MGF2eDdhMFh6L29kMGJ5T1VCK0JWYnVLOHRCTlBPRm1YdDVndktFOTFMRFJs?= =?utf-8?B?OW5Bb1phdkFTbGhhalRWSmxWREoycmFiTEltRm1nL3V4eW8reDNCTW4yb2Ft?= =?utf-8?B?bEZZLzZlQVM4ZXJNZC9tcGtnWUhsYjNWYmMzVkVlVlRZR3A1SUgxbEZCcjd6?= =?utf-8?B?NVBsdlhIeTQ0elk3UjdtS0psdmRjTE12UFFrL2xNQS9NQWJibDlQRjFyVnRz?= =?utf-8?B?VmNaTWJFNWZyY0RJRkFxZXNjajl1TnlqU3UrMkZqeHN3amtIRXJDVThFZXRP?= =?utf-8?B?NkJQQkxHVEMzK0lLOVE5aUh4RHNmb1NFa1ZjZkhObk5icmxvdlJlUFF0d3Fu?= =?utf-8?B?bDFBZ0EveFRrZzN6ZUpoUWZ1dlAxMVB4aHV1dGNlK2xHMUJUVlZoSlltSitq?= =?utf-8?B?MWtnanVLZlRCN3kyM21ZNmhlVk5jei9Pc0UwQ1pZMUlKRDNPOHA4ckI4NXN2?= =?utf-8?B?MFp5SGdtN0M4TDdrenZRWlVZM0d4SkR3alZwbWhNOWowd2t3MkRGcjAzRTFp?= =?utf-8?B?MHJ6SmNBRUN4R0N5M0RPSVZoSmlYUXp1eWd0OVFmVWxyYzFCNnlhNDNJNE1y?= =?utf-8?B?ekZWcjgxRFdYOFEvdmtRVHVGWHBURko1UHhGM1VlQVlHUnlnQ2c4Tk13TEQy?= =?utf-8?B?K3k0VVhpeWtZRlYwY3lzcHgxU3d4cFU4NlZGVVc3TUJyb0VVTHRNT0NiRFRE?= =?utf-8?B?M0tiOFhvS0lCL0UyYVpOU2x6U25CZjV1LytZWmJYNldJQUFFUUh4NEVsb0lY?= =?utf-8?B?M0FlSUhCRHpkUis2NTRFWE1pWHNwWm5TVHo3RGJBcmpXMTJYQXpDTDdnUXdj?= =?utf-8?B?Syt4WmF5NEtlUGQyMWF0WTJmZ0xNOU9DVU10UDBsZUkwd2Vkd3VFdHJPdEtk?= =?utf-8?B?MmVYYUFicFFyY1dOOUR1VDkwTjdBcWZIZVQxTlhwQlhJb0s1KzJTV3ZJMmFK?= =?utf-8?B?RkJsTkNzVGtRcFovZm8zZzhrNE9GbkR5aHRTMmRwVTBVdmZ0K0tXUkxQNEtF?= =?utf-8?B?dW1UUTVkaDRhWFpTS0RYMG84MDVCTjduQldMUUdKVkxoYWprMUhZMTRCZkpZ?= =?utf-8?B?eCtDcHJ4ZTh0azh0ME95YnZYL3Bpc3ZxVkRUYkxXUDViK0xLS0xMVlVxakMv?= =?utf-8?B?ZmlHVE5qMWh3U0pyU0FDMG1scHNWb3J3SjdPRjBxbjlWQTNoWUc5bVJ6QjBK?= =?utf-8?B?R1NCN1NKSFBpWGpOVTFiSWNMWDllcGZCd1F2OWpMckVTZHhkMDVuUnVmK216?= =?utf-8?B?L0dNTnZzSnc4aUNzU0c0eXRWelhsaGIxZEcwMkxaUlk3cGZwOGV0clNRUDRy?= =?utf-8?B?QlVYMVdCY01SREt6QjgvN0srbGEzUkJSeTdTWXhZdXNZVjdLSHQ3OWh0MUdE?= =?utf-8?B?R0lmU1gvSVdGbjdtbENEYmlLVmw3MS9KZ3Nic25jNUlweGx2d01RbWVqQjA1?= =?utf-8?B?UEFsRGNOQUhhdmJ4bnliQWs0U0JNbkwvS25ya0l6Vk5iZk1kL3NNRi9xbVhS?= =?utf-8?B?WGJ6bVNRMW1mdm9IWGlpV3ZlT2JDankzZnN3dk9lMUVvRm1ad1M3ZzUzazZw?= =?utf-8?B?M3ZxUTltelVvcEZuZW9rUVl1dUN4TEtvdXdhbS9PRUpxakgwZ2lJU2RqWXZJ?= =?utf-8?B?ZTBDUkp1UnZXT1gyajdZSzloQU1INFhadkZOR3EzYWNXbU9HQkR4QVhyNkhh?= =?utf-8?B?bDZRR3p5ck5vN1F2MkRSMW1GZndQYkp5S01oU082b1NKdjhKOE8wajQ1S1Fi?= =?utf-8?B?TnVZNWtNd01reWo2MTZkVmY3aHAzbTVCRUdma1lWWFltaGc9PQ==?=
x-microsoft-antispam-prvs: <DM6PR11MB2777AD57CC75B8CE6B71F29DB27C0@DM6PR11MB2777.namprd11.prod.outlook.com>
x-forefront-prvs: 09538D3531
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(136003)(396003)(39860400002)(366004)(376002)(189003)(199004)(316002)(256004)(6436002)(53546011)(6506007)(6486002)(58126008)(11346002)(68736007)(446003)(102836004)(54896002)(86362001)(71190400001)(97736004)(5660300002)(14444005)(2906002)(478600001)(82746002)(83716004)(6512007)(236005)(229853002)(6306002)(71200400001)(66066001)(14454004)(33656002)(476003)(2616005)(76176011)(99286004)(966005)(36756003)(53936002)(25786009)(2501003)(606006)(486006)(105586002)(8936002)(81166006)(81156014)(186003)(7736002)(8676002)(3846002)(6116002)(6246003)(106356001)(110136005)(790700001)(26005); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB2777; H:DM6PR11MB3547.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: pFcp06m7gM7UWDQIHj0Dq5O85j8vZzXuclERgXaesqplfl8nx03kwG3T78qT4iO5yBpcJTSdXmhM3VT30ESSBNc647XwR4ZEjbY2gfvXTm/I2BObtJhy9NX77ddqyklx4hcCLEnPoJ6YjhWLj8joCocpPYWeyIu2ENGQvc0wDH/rpAJRxQRpP8zO3Qzugc+owg+jUXoVE+O9X82CTe+2KPbaokTPaEEa89eL7PDKrWaU/CCCeiuziSkQg80PPuFKTIujoFVTRiWPaZYBcJzrOPZsdtY/NRRxBNmbvzE4PGWPS7l0CnXBQ53EGmoQQNZ4x1Y6kd7RhX7iFhgNW6jBNpNXk1rghrYr1BH9uq7hxNhzeHx3p7WK26v0Ze+sOXP6uroLVbswmZOvroYldqvdGUi3/R9b483G1iKPdfltJ5s=
Content-Type: multipart/alternative; boundary="_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f16f4d6a-5b07-41ba-c6c2-08d69692b7b0
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2019 17:50:20.9640 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB2777
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.21, xch-aln-011.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/eDRJE7M9VD0_I3-dXePBnPfN4aU>
Subject: Re: [hackathon] question about hackathon cost
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2019 17:50:36 -0000

--_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <A2A70A1CADDA2A4CAB55D939790127CE@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_--


From nobody Tue Feb 19 10:58:56 2019
Return-Path: <mcr@sandelman.ca>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46554128D0B for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 10:58:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ic7n1KYZ8zQL for <hackathon@ietfa.amsl.com>; Tue, 19 Feb 2019 10:58:53 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 222451277CC for <hackathon@ietf.org>; Tue, 19 Feb 2019 10:58:53 -0800 (PST)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 334EB3826A; Tue, 19 Feb 2019 13:58:46 -0500 (EST)
Received: by sandelman.ca (Postfix, from userid 179) id 2E50D83B; Tue, 19 Feb 2019 13:58:52 -0500 (EST)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 2CCAB55A; Tue, 19 Feb 2019 13:58:52 -0500 (EST)
From: Michael Richardson <mcr@sandelman.ca>
To: Peter Beal <pbeal@cisco.com>
cc: "hackathon\@ietf.org" <hackathon@ietf.org>
In-Reply-To: <7505e2cb-5f06-d7dd-f166-cfd3f33fc158@cisco.com>
References: <7505e2cb-5f06-d7dd-f166-cfd3f33fc158@cisco.com>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Date: Tue, 19 Feb 2019 13:58:52 -0500
Message-ID: <32526.1550602732@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/2wmyfClcuTHC3fY19EiB0E7UiQU>
Subject: Re: [hackathon] EST over coaps at the hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2019 18:58:55 -0000

Peter Beal <pbeal@cisco.com> wrote:
    > By any chance might there be testing of EST over coaps at this
    > hackathon?=C2=A0 Is anyone ready to test?

Yes, you should join the ANIMA table.

--
]               Never tell me the odds!                 | ipv6 mesh network=
s [
]   Michael Richardson, Sandelman Software Works        |    IoT architect =
  [
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails  =
  [


From nobody Wed Feb 20 15:54:30 2019
Return-Path: <s.rajaei.17@ucl.ac.uk>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65FC6130E2F for <hackathon@ietfa.amsl.com>; Wed, 20 Feb 2019 15:54:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=liveuclac.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kwX-6JqXdu4b for <hackathon@ietfa.amsl.com>; Wed, 20 Feb 2019 15:54:26 -0800 (PST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150097.outbound.protection.outlook.com [40.107.15.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34BC7130E58 for <hackathon@ietf.org>; Wed, 20 Feb 2019 15:54:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=liveuclac.onmicrosoft.com; s=selector1-ucl-ac-uk; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UAzEvhvf3cRTPgOs390HVcbFgC2NhtYKLP6KvA3dcQg=; b=AnOnD+SPCsDoHqiFjqwneGVeZc0MlkCti9t+sL897PzZNjSTAIotLuRmT9nPAeE+K0lRG9gzvyXPsYg9uFM7NUgKe9YakX/Vi2LEvmLcOuOLtmwtugdhccKD4iNAB4I+62C97Bx9xtvLaf0cyoEuOlBS4XxvSHdT1CNh4MQcHt0=
Received: from AM6PR01MB4440.eurprd01.prod.exchangelabs.com (20.177.190.225) by AM6PR01MB5191.eurprd01.prod.exchangelabs.com (20.178.86.224) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1643.14; Wed, 20 Feb 2019 23:54:24 +0000
Received: from AM6PR01MB4440.eurprd01.prod.exchangelabs.com ([fe80::515e:399a:958:b398]) by AM6PR01MB4440.eurprd01.prod.exchangelabs.com ([fe80::515e:399a:958:b398%4]) with mapi id 15.20.1622.018; Wed, 20 Feb 2019 23:54:23 +0000
From: "Rajaei, Saman" <s.rajaei.17@ucl.ac.uk>
To: "hackathon@ietf.org" <hackathon@ietf.org>
Thread-Topic: Invitation letters for visa purposes?
Thread-Index: AQHUyXea48Q0GtnW3UKX1rycZzpXUw==
Date: Wed, 20 Feb 2019 23:54:23 +0000
Message-ID: <AM6PR01MB44406CB283313AC4E465F9F9FD7D0@AM6PR01MB4440.eurprd01.prod.exchangelabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=s.rajaei.17@ucl.ac.uk; 
x-originating-ip: [82.35.86.181]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e1d3dfaf-c418-4d4d-0986-08d6978ebd80
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600110)(711020)(4605104)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7167020)(7153060)(7193020); SRVR:AM6PR01MB5191; 
x-ms-traffictypediagnostic: AM6PR01MB5191:
x-microsoft-exchange-diagnostics: =?iso-8859-1?Q?1; AM6PR01MB5191; 23:kLq5vpE51pyPAI7VJIvZ2OenCvM50IC2JodYalB?= =?iso-8859-1?Q?BaTzE1ehyrAsDZ2lH2wcJ0CsQokHMq7vjNquVLYsybuiHTUnGA7D6gEkVM?= =?iso-8859-1?Q?CtuElECA6zygzEBXsigGSsTVfCOrUbhgSeNdxs0A6tuxGrOUNHoF+W4Cfd?= =?iso-8859-1?Q?VdrOfoKhfh3brX8xYkT6bnFJ8wUisPqpPEUrI56iT4cs6QGGfOLCnXlcnQ?= =?iso-8859-1?Q?nsnl02jGf/HxglyKK+d1kSVYn9KsuJhmoGqO7UX+3PQPsQH1I7YxUEZQ49?= =?iso-8859-1?Q?aLsOlU8a2MImebjB5CGknCRELCsm2tbsKytjwOukEKicelVXVHFHqPLHKA?= =?iso-8859-1?Q?72rdORk9bCNbZSokqd85f89zSWsuCO5aosp1McsD6RROzEuQTUESssU0uy?= =?iso-8859-1?Q?qUxSWKJTHH/y3ge6AwTZdhOOd9C9lCsI0Zlk6NI3KnTWjax4G7kNmbaKi0?= =?iso-8859-1?Q?sF2nfsdis8lnAqyxpVAgwp0NJmJ6WGbCO+7RT0F6s0CyshHPmGMBm0q4UY?= =?iso-8859-1?Q?K6dpY8gqKLE57ogLwUs/LBVI4GA2kMElEwAXiixl0SAkjBNDOh8KTYohLL?= =?iso-8859-1?Q?VjeEr1yfdPTXudGmBGK9yteawRl/3vLxrLfkCAlana6G2woAqLFYJqIv1t?= =?iso-8859-1?Q?vjO9RuQzI2zkrYdBSarP/kx4Tn+N+CZLmb/nh+XPwPSXvdhro8p1ZEqSRe?= =?iso-8859-1?Q?gQJX0YGx0j4h8ZuOmC+4J9OhAd3AL0O1XloF2nyIg/c/n+BjLRzlg9c6ha?= =?iso-8859-1?Q?oiXDn2FguMjnaXDqq3hpHFY2WOGgiuZx4DuwRVs07a3Z2GeoNF94APAY/Q?= =?iso-8859-1?Q?Vj96IHPhvmgoyeNgvxxWXsk/Ex71SnO/cNWjksdBKLqwfy7KfK5Qe4gcEM?= =?iso-8859-1?Q?RD8klQlQ+/vBos6i90PdbU8GvOJ8/LQunbJocpTTa3IZJUy3onhoDCGZRq?= =?iso-8859-1?Q?Yky/DZDZ7SNonHyVGd5VhbY6gBiPfYHjXxsUmUf7j6/QAPzRJe6Gi+6SpV?= =?iso-8859-1?Q?ucUeK+rdvR7Z1TWcwjomBho8jJZWY3SBsM+tLYuxNNVaTYNRdmtxsYRVFx?= =?iso-8859-1?Q?VvxzRkkNzCZyK1izLy1P2QV9ZU6q6ppfA8m0xgJtkATlvjUpkEa4Po/bXs?= =?iso-8859-1?Q?yEvVyePv8EkHH9FnFa1+/jxSlCwdPGwQvItSzA5V2G/pzhwrmGGTkHBG0/?= =?iso-8859-1?Q?2fUxt5oCjsSysdGxwtdC3ujTzGqZB6YI3rLjp8kTqFPVK+dtQYKTdM4qOm?= =?iso-8859-1?Q?WHSFsGpfnVjwkc1UjNEYUrOAzNLPY6E2N5OY1hjMdpmXSNAeUDt1zAo6i6?= =?iso-8859-1?Q?n1jJwX8W+YkbPWP+I2gYYZyW7gczwh2ScQ2eDaE8F9xCg=3D=3D?=
x-microsoft-antispam-prvs: <AM6PR01MB51915C9FB868E1CEDC953A2EFD7D0@AM6PR01MB5191.eurprd01.prod.exchangelabs.com>
x-forefront-prvs: 0954EE4910
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(366004)(136003)(376002)(396003)(199004)(51874003)(189003)(105586002)(33656002)(5640700003)(256004)(2501003)(478600001)(19627405001)(5660300002)(55016002)(6436002)(74482002)(9686003)(106356001)(2351001)(4744005)(53936002)(25786009)(71200400001)(68736007)(6916009)(54896002)(105004)(66066001)(99286004)(2906002)(71190400001)(86362001)(81166006)(486006)(8676002)(102836004)(1730700003)(7696005)(186003)(55236004)(97736004)(26005)(476003)(81156014)(6116002)(786003)(316002)(14454004)(3846002)(8936002)(7736002)(74316002)(6506007); DIR:OUT; SFP:1102; SCL:1; SRVR:AM6PR01MB5191; H:AM6PR01MB4440.eurprd01.prod.exchangelabs.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ucl.ac.uk does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Rd0xZ+60EDrb53GzYahdKbwM9JhOfkE262nDnX9Bnos/d639opDDFH2qlgkC3TgsN8XIinr6RxAOkHLkfXQApAAtXDKwQDEzTeEWeIqXOHQxhOTwPIuOujtVAZzgxKCT76pQK5oGkPaLL+ww/Qiwd4OAJGAqOwPZnpIuUPVI9UW0eIcxmJqhYnQ3kJ/KZSRv1fKp0TL+kYhi1brUiD4hZBeTTKPpPwzsLvnibmN0MYAXYgJFk24tmXrWhI2iX2oxPwTmbFIJzWzUEvEMowBiRBAXsAetZkNJGQ3Hlwlk78IL3ACJB1tKXeZPYvMBzk35hf1WjRPHhJ9dVmv/X3++usxoIteMIauBeiklv9tUeuKc8TO/SbU63gEzhmPa1s6Os+2NcZuUOwz2IRfX6jsiu3WVoMm9Sc62xTVYyVd9spg=
Content-Type: multipart/alternative; boundary="_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ucl.ac.uk
X-MS-Exchange-CrossTenant-Network-Message-Id: e1d3dfaf-c418-4d4d-0986-08d6978ebd80
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Feb 2019 23:54:23.8858 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 1faf88fe-a998-4c5b-93c9-210a11d9a5c2
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR01MB5191
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/ll27tB88_I5JKfPuYbQqCXWMZBg>
Subject: [hackathon] Invitation letters for visa purposes?
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2019 23:54:29 -0000

--_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi there,

I've registered for the IETF Hackathon Montreal in July and am looking forw=
ard to participate in the event. Since I require Visa to travel to Canada, =
I was wondering whether we would be able to get an official invitation lett=
er at some point (right now you can't click on the invitation letter option=
 on the website).

 I remember last year (Montreal 102 event by Juniper and others) there was =
an option on the website that would automatically generate invitation lette=
rs for you.

Thanks in advance,
Saman

--_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none;"> P {margin-top:0;margin-bo=
ttom:0;} </style>
</head>
<body dir=3D"ltr">
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Hi there,&nbsp;</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
I've registered for the IETF Hackathon Montreal in July and am looking forw=
ard to participate in the event. Since I require Visa to travel to Canada, =
I was wondering whether we would be able to get an official invitation lett=
er at some point (right now you
 can't click on the invitation letter option on the website).</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
&nbsp;I remember last year (Montreal 102 event by Juniper and others) there=
 was an option on the website that would automatically generate invitation =
letters for you.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Thanks in advance,&nbsp;</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Saman&nbsp;</div>
</body>
</html>

--_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_--


From nobody Wed Feb 20 16:21:14 2019
Return-Path: <amorris@amsl.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30603130E9C for <hackathon@ietfa.amsl.com>; Wed, 20 Feb 2019 16:21:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XQYf5tcoOOry for <hackathon@ietfa.amsl.com>; Wed, 20 Feb 2019 16:21:11 -0800 (PST)
Received: from mail.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 675C6130E2F for <hackathon@ietf.org>; Wed, 20 Feb 2019 16:21:11 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 421E11C5ACB; Wed, 20 Feb 2019 16:20:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X7MhhpBgJsvl; Wed, 20 Feb 2019 16:20:59 -0800 (PST)
Received: from [192.168.0.104] (47-208-183-54.trckcmtc01.res.dyn.suddenlink.net [47.208.183.54]) by c8a.amsl.com (Postfix) with ESMTPSA id E06781C55DD; Wed, 20 Feb 2019 16:20:58 -0800 (PST)
From: Alexa Morris <amorris@amsl.com>
Message-Id: <5E208ED9-DD02-4A66-90CD-C13C02FFD585@amsl.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Wed, 20 Feb 2019 16:21:09 -0800
In-Reply-To: <AM6PR01MB44406CB283313AC4E465F9F9FD7D0@AM6PR01MB4440.eurprd01.prod.exchangelabs.com>
Cc: "hackathon@ietf.org" <hackathon@ietf.org>
To: "Rajaei, Saman" <s.rajaei.17@ucl.ac.uk>
References: <AM6PR01MB44406CB283313AC4E465F9F9FD7D0@AM6PR01MB4440.eurprd01.prod.exchangelabs.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/26ywQUwpjPDTc1znBgr6DpqYLIc>
Subject: Re: [hackathon] Invitation letters for visa purposes?
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2019 00:21:13 -0000

--Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Saman,

I=E2=80=99m delighted to hear that you plan to attend the IETF 105 =
Hackathon in Montreal. Registration is not yet open for the IETF 105 =
Hackathon =E2=80=94 did you perhaps register for the 104 Hackathon, =
taking place in Prague this March, by mistake?=20

Either way, we will definitely be providing letters of invitation for =
IETF 105, and for the IETF 105 Hackathon. We are preparing them now, and =
they will be ready no later than the week of April 29 (when registration =
opens).

Regards,
Alexa

> On Feb 20, 2019, at 3:54 PM, Rajaei, Saman <s.rajaei.17@ucl.ac.uk> =
wrote:
>=20
> Hi there,=20
>=20
> I've registered for the IETF Hackathon Montreal in July and am looking =
forward to participate in the event. Since I require Visa to travel to =
Canada, I was wondering whether we would be able to get an official =
invitation letter at some point (right now you can't click on the =
invitation letter option on the website).
>=20
>  I remember last year (Montreal 102 event by Juniper and others) there =
was an option on the website that would automatically generate =
invitation letters for you.
>=20
> Thanks in advance,=20
> Saman=20
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org <mailto:hackathon@ietf.org>
> https://www.ietf.org/mailman/listinfo/hackathon =
<https://www.ietf.org/mailman/listinfo/hackathon>

--Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Saman,<div class=3D""><br class=3D""></div><div class=3D"">I=E2=80=99m =
delighted to hear that you plan to attend the IETF 105 Hackathon in =
Montreal. Registration is not yet open for the IETF 105 Hackathon =E2=80=94=
 did you perhaps register for the 104 Hackathon, taking place in Prague =
this March, by mistake?&nbsp;</div><div class=3D""><br =
class=3D""></div><div class=3D"">Either way, we will definitely be =
providing letters of invitation for IETF 105, and for the IETF 105 =
Hackathon. We are preparing them now, and they will be ready no later =
than the week of April 29 (when registration opens).</div><div =
class=3D""><br class=3D""></div><div class=3D"">Regards,</div><div =
class=3D"">Alexa</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On Feb 20, 2019, at 3:54 PM, Rajaei, Saman =
&lt;<a href=3D"mailto:s.rajaei.17@ucl.ac.uk" =
class=3D"">s.rajaei.17@ucl.ac.uk</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
style=3D"caret-color: rgb(0, 0, 0); font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D"">Hi there,&nbsp;</div><div =
style=3D"caret-color: rgb(0, 0, 0); font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D""><br class=3D""></div><div =
style=3D"caret-color: rgb(0, 0, 0); font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D"">I've registered for the IETF =
Hackathon Montreal in July and am looking forward to participate in the =
event. Since I require Visa to travel to Canada, I was wondering whether =
we would be able to get an official invitation letter at some point =
(right now you can't click on the invitation letter option on the =
website).</div><div style=3D"caret-color: rgb(0, 0, 0); font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D""><br class=3D""></div><div =
style=3D"caret-color: rgb(0, 0, 0); font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D"">&nbsp;I remember last year =
(Montreal 102 event by Juniper and others) there was an option on the =
website that would automatically generate invitation letters for =
you.</div><div style=3D"caret-color: rgb(0, 0, 0); font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D""><br class=3D""></div><div =
style=3D"caret-color: rgb(0, 0, 0); font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D"">Thanks in =
advance,&nbsp;</div><div style=3D"caret-color: rgb(0, 0, 0); font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; font-family: Calibri, Arial, Helvetica, =
sans-serif; font-size: 12pt;" class=3D"">Saman&nbsp;</div><span =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; float: none; =
display: inline !important;" =
class=3D"">_______________________________________________</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><span =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; float: none; =
display: inline !important;" class=3D"">hackathon mailing list</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><a =
href=3D"mailto:hackathon@ietf.org" style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">hackathon@ietf.org</a><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/hackathon" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" =
class=3D"">https://www.ietf.org/mailman/listinfo/hackathon</a></div></bloc=
kquote></div><br class=3D""></body></html>=

--Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA--


From nobody Fri Feb 22 02:31:18 2019
Return-Path: <aleksi.peltonen@aalto.fi>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADDC0129524; Fri, 22 Feb 2019 02:31:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level: 
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=aalto.fi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cjdUs3wJADBF; Fri, 22 Feb 2019 02:31:07 -0800 (PST)
Received: from smtp-out-01.aalto.fi (smtp-out-01.aalto.fi [130.233.228.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F54D128CB7; Fri, 22 Feb 2019 02:31:07 -0800 (PST)
Received: from smtp-out-01.aalto.fi (localhost.localdomain [127.0.0.1]) by localhost (Email Security Appliance) with SMTP id 64E4F1156F9_C6FCE46B; Fri, 22 Feb 2019 10:26:14 +0000 (GMT)
Received: from exng4.org.aalto.fi (exng4.org.aalto.fi [130.233.223.23]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (Client CN "exng4.org.aalto.fi", Issuer "org.aalto.fi RootCA" (not verified)) by smtp-out-01.aalto.fi (Sophos Email Appliance) with ESMTPS id 02ABE115532_C6FCE46F; Fri, 22 Feb 2019 10:26:14 +0000 (GMT)
Received: from [130.233.193.86] (130.233.0.5) by exng4.org.aalto.fi (130.233.223.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Fri, 22 Feb 2019 12:31:01 +0200
From: Aleksi Peltonen <aleksi.peltonen@aalto.fi>
To: <hackathon@ietf.org>, <emu@ietf.org>
CC: <eduardo.ingles@um.es>
Message-ID: <30e0a051-f492-35d8-ebf3-57fefacb01e3@aalto.fi>
Date: Fri, 22 Feb 2019 12:30:56 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------9D6F113EB7B5E6621185F202"
Content-Language: en-US
X-Originating-IP: [130.233.0.5]
X-ClientProxiedBy: exng8.org.aalto.fi (130.233.223.27) To exng4.org.aalto.fi (130.233.223.23)
X-SASI-RCODE: 200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aalto.fi; h=from:subject:to:cc:message-id:date:mime-version:content-type; s=its18; bh=1PbdK+mdSs/wfLEcFmEs/oHmOyexGNgRZAi0TJn5Log=; b=hRE2kfiluWWIu/2tyjx9wgpaAKyEnkIkALHRa1HHTVbxZmW4djD8d/LsH6quq3rfzVlOui+rKm+SlSgKMskxNng4859FGAXgH2fyivwdlX8QakM5oyIGhG0/8ck0gy5nViOx9gzin0f3Zv9vvoqGUPhZ4XP8Zc4YPEjELF3cqmsuU/fwU0aK7Gz8tjHVlI/TzGKnaJa93VKY7/Ltnkg+GNKLe2ywZzlOlB1fpWmH90KP1mEtCrEztBKW8LKBwgu/wcx+rO47ficcXPwM04UbqI7GUHM0riSekpH+dcTs2BXd8CmQPafF0BG5p7MUGwCBMkT2lQmSlex1iHhdcxOTdw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/ASVI7al9WsTjYpi0UfNZHVIhdLQ>
Subject: [hackathon] EAP-NOOB at the IETF 104 hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2019 10:31:11 -0000

--------------9D6F113EB7B5E6621185F202
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 8bit

Dear all,

My colleagues and I will be working on the EAP-NOOB protocol during the 
hackathon. Feel free to join our table!

Please find the project details below or in the hackathon wiki 
https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon.

  *
    Champions:
      o Aleksi Peltonen <aleksi.peltonen at aalto.fi>
      o Eduardo Inglés Sánchez <eduardo.ingles at um.es>
      o Tuomas Aura <tuomas.aura at aalto.fi>
  *
    Project:
      o
        EAP-NOOB
          +
            EAP-NOOB is an EAP method where the authentication is based
            on a user-assisted out-of-band (OOB) channel between the
            server and peer.
          +
            It is intended as a generic bootstrapping solution for
            Internet-of-Things devices which have no pre-configured
            authentication credentials and which are not yet registered
            on the authentication server. Consider devices you just
            bought or borrowed.
      o
        Working open source implementation with wpa_supplicant and
        hostapd on github: https://github.com/tuomaura/eap-noob
      o
        During the hackathon we plan to work on the following:
          +
            Various bug fixes
          + Interop testing between implementations
          +
            Testing the code with new kinds of IoT devices and OOB
            channels such as audio
          +
            User experience in real deployment

Regards,
Aleksi

--------------9D6F113EB7B5E6621185F202
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Dear all,</p>
    <p>My colleagues and I will be working on the EAP-NOOB protocol
      during the hackathon. Feel free to join our table!</p>
    <p>Please find the project details below or in the hackathon wiki <a
        moz-do-not-send="true"
        href="https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon">https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon</a>.<br>
    </p>
    <ul>
      <li class="level1">
        <div class="li"> Champions:</div>
      </li>
      <ul>
        <li>Aleksi Peltonen &lt;aleksi.peltonen at aalto.fi&gt;
        </li>
        <li>Eduardo Inglés Sánchez &lt;eduardo.ingles at um.es&gt;</li>
        <li>Tuomas Aura &lt;tuomas.aura at aalto.fi&gt;<br>
        </li>
      </ul>
      <li class="level2">
        <div class="li"> Project:</div>
        <ul>
          <li class="level3">
            <div class="li"> EAP-NOOB<br>
            </div>
            <ul>
              <li class="level4">
                <div class="li"> EAP-NOOB is an EAP method where the
                  authentication is based on a user-assisted out-of-band
                  (OOB) channel between the server and peer. </div>
              </li>
              <li class="level4">
                <div class="li"> It is intended as a generic
                  bootstrapping solution for Internet-of-Things devices
                  which have no pre-configured authentication
                  credentials and which are not yet registered on the
                  authentication server. Consider devices you just
                  bought or borrowed.</div>
              </li>
            </ul>
          </li>
          <li class="level3">
            <div class="li"> Working open source implementation with
              wpa_supplicant and hostapd on github: <a
                href="https://github.com/tuomaura/eap-noob"
                class="urlextern"
                title="https://github.com/tuomaura/eap-noob"
                rel="nofollow">https://github.com/tuomaura/eap-noob</a></div>
          </li>
          <li class="level3">
            <div class="li"> During the hackathon we plan to work on the
              following:</div>
            <ul>
              <li class="level4">
                <div class="li"> Various bug fixes</div>
              </li>
              <li class="level4">Interop testing between implementations<br>
              </li>
              <li class="level4">
                <div class="li"> Testing the code with new kinds of IoT
                  devices and OOB channels such as audio</div>
              </li>
              <li class="level4">
                <div class="li"> User experience in real deployment</div>
              </li>
            </ul>
          </li>
        </ul>
      </li>
    </ul>
    Regards,<br>
    Aleksi<br>
  </body>
</html>

--------------9D6F113EB7B5E6621185F202--


From nobody Fri Feb 22 05:34:12 2019
Return-Path: <lumuscar@cisco.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB861128766 for <hackathon@ietfa.amsl.com>; Fri, 22 Feb 2019 05:34:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ye-KozmS5fBt for <hackathon@ietfa.amsl.com>; Fri, 22 Feb 2019 05:34:09 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2390712426E for <hackathon@ietf.org>; Fri, 22 Feb 2019 05:34:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17458; q=dns/txt; s=iport; t=1550842449; x=1552052049; h=from:to:cc:subject:date:message-id:mime-version; bh=d0s8c3M9aPl16vJJHN2+oAux6F895uJgW7n+gGPS8XA=; b=lgyEbv4SFIO5+WXLj3nV7vL7I/Zs2yyISUbAuI8QCumCEC1HXsohpqHi fH2kQNyl6M5XlPXEEm6OJ8++XmICuCCBPs+AtLF11QPXDD+k+C1yinVY9 amvgYgAXPPnUgEH4aDTPrJeCWg2u5exLCzFiBCmZ/x4CNcJyectmowEXA U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AnAABm+W9c/40NJK1lHAEBAQQBAQc?= =?us-ascii?q?EAQGBUQcBAQsBgQ12Z4EDJwqDfYgaoA2FcYF7CwEBI4RJGYNnIjQJDQEDAQE?= =?us-ascii?q?CAQECbRwBC4V0VhIBSgIEMCcEDoMlAYEOZA+rOoEvhC8BE0FAhGqMSBeBQD+?= =?us-ascii?q?BEScfgkyBQYFdAgMBgUdUgksxgiYCkDKHGowNCQKHPIsiGYJJkEaKToUPQYw?= =?us-ascii?q?+AhEUgSgfOIFWcBVlAYJBCYIrg1aCZIIwhT9BMY5sgR8BAQ?=
X-IronPort-AV: E=Sophos;i="5.58,399,1544486400";  d="scan'208,217";a="240364106"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Feb 2019 13:34:08 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id x1MDY8sL011547 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 22 Feb 2019 13:34:08 GMT
Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 22 Feb 2019 07:34:07 -0600
Received: from xch-aln-008.cisco.com ([173.36.7.18]) by XCH-ALN-008.cisco.com ([173.36.7.18]) with mapi id 15.00.1395.000; Fri, 22 Feb 2019 07:34:07 -0600
From: "Luca Muscariello (lumuscar)" <lumuscar@cisco.com>
To: "hackathon@ietf.org" <hackathon@ietf.org>
CC: "hicn-dev@lists.fd.io" <hicn-dev@lists.fd.io>
Thread-Topic: hICN project at IETF 104  hackathon
Thread-Index: AQHUyrNIGVI8U4JJHUmBqIMizyMexQ==
Date: Fri, 22 Feb 2019 13:34:07 +0000
Message-ID: <451AB404-DA41-497D-A7BF-F1CF33501A66@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.15.0.190117
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.228.40.37]
Content-Type: multipart/alternative; boundary="_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.36.7.16, xch-aln-006.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/Ne877gH7ZlNllbE3R1hTSIv7uzw>
Subject: [hackathon] hICN project at IETF 104  hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2019 13:34:11 -0000

--_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <B1F6DD4C66EDA0468A560E9DADD45F1F@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_--


From nobody Mon Feb 25 17:15:09 2019
Return-Path: <brunorijsman@gmail.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 840AF129C6A; Mon, 25 Feb 2019 17:15:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rlR4q9zx8StQ; Mon, 25 Feb 2019 17:15:06 -0800 (PST)
Received: from mail-qk1-x743.google.com (mail-qk1-x743.google.com [IPv6:2607:f8b0:4864:20::743]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F843128B14; Mon, 25 Feb 2019 17:15:06 -0800 (PST)
Received: by mail-qk1-x743.google.com with SMTP id p15so6626244qkl.5; Mon, 25 Feb 2019 17:15:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:mime-version:date:subject:message-id:to; bh=GEmU0e231G12yE9FbEj2KzhhvBaqoDI+oYoNj/yREM4=; b=r/FxiJhzEIZKN+eFvmgEn06JBwXm+63SDPKBwfPKmhFAVPCwRUszRuuk7CYSVb6+bZ FTqJemV6lwEo1VauyBaECIJ2t6WQBXSG14WwaYwppCW5/sIO3JccZ7WZj2Z7oZgigTJo NX+XtQCwoE/Thz7y6QJLdid0/u7IMb1oFXkNiEqlB7OuQDYiE+K3Rh09pNwNZZYEw+pI xFc88B2VUggQ5wCNR0IXc/pAbGBFCKegM2ZZAHimyFolTMOhLkwr7EW4kUVMtmXFncXw C9gJepEqJJNwXjcpc4KCsTOKWFg16yDR8qt+1WMC601mjq4cflu0g7lH9XPlHft67oJm YFdQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:date:subject:message-id:to; bh=GEmU0e231G12yE9FbEj2KzhhvBaqoDI+oYoNj/yREM4=; b=m+rELOXbanf2D/wxt/3DHCf2GDRl7wKISRw3RKA2LIebiAubK4MWc56eSaTZiACDL5 jnG6uo0nPacLGRsN/sH6eohwAGjWvOUq6DLxhkyN5qgzRfAOeURC2aO4OXnL7IkqeviR 9wUiWqby/v/HaEkk1AZZOmQA7vLmvh/JClJ/gYeUUJqe3mh23yEMxYQxVME1qITfQlkY 6ndDDWMWEZ0MHXPJ2btnlJHN5WUB+rx/eY6f7GVTFV+J5BBM1s2dTsVmVa1lTvSDZdiQ J9urgnygyefo4HjfuJdkV4f3/FdYt6hLaiArPg086IIuxa5IcTYbfK5QS2CRDaS2q087 SAIg==
X-Gm-Message-State: AHQUAuaWl4+Ll9qrJ4mr6yAH6zLWmfkohuLLoj4HepIvjeq8RACL+kNk YAUkkJ9rSxpXWbNtdzltR5kNQRCQp44=
X-Google-Smtp-Source: AHgI3IYpExyJpuL3jpHpdgyfC+J0tdH/ne40iymmAFL3JEm8d7Q/4S0bPVLf2vr9Yw1dK/Bio3ONSw==
X-Received: by 2002:a37:4f45:: with SMTP id d66mr15203371qkb.81.1551143704720;  Mon, 25 Feb 2019 17:15:04 -0800 (PST)
Received: from [192.168.8.108] (ip-53-226-107-190.nextelmovil.cl. [190.107.226.53]) by smtp.gmail.com with ESMTPSA id b83sm6466519qkg.12.2019.02.25.17.15.01 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 25 Feb 2019 17:15:03 -0800 (PST)
From: Bruno Rijsman <brunorijsman@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Mon, 25 Feb 2019 22:14:59 -0300
Message-Id: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com>
To: hackathon@ietf.org, rift@ietf.org
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/eT4jH0ASqQkHi5318XfwR-U0c9s>
Subject: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2019 01:15:08 -0000

--Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi everyone,
=20
At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we will =
be working on "chaos monkey" testing of two RIFT implementations: the =
RIFT-Python open source implementation and a vendor RIFT implementation.

This hackathon is inspired by the concept of chaos engineering and in =
particular by the chaos monkey tool, which intentionally and randomly =
shuts down servers in a production environment. This is intended to =
build confidence in the system's capability to withstand turbulent and =
unexpected conditions.

In this hackathon we will do something similar for RIFT networks. We =
will build a large fat tree network of RIFT routers. Then we will =
randomly insert failures into the network and make sure that the network =
behaves correctly. We will make sure the RIFT routers don't crash or =
otherwise behave badly. And we will make sure that the routers =
forwarding tables and link-state databases converge correctly.

We will use (and possibly enhance) the chaos testing framework as well =
as the visualization and verification tools that are already part of the =
RIFT-Python open source project.

Even if you are not much interested in the RIFT routing protocol, but =
you are interested in testing large network topologies using =
container-like technology, or in visualization tools, or in chaos =
testing, this might be the right hackathon for you.

A detailed description of the planned activities at the hackathon is =
available at: http://bit.ly/rift-hackathon-ietf-104 =
<http://bit.ly/rift-hackathon-ietf-104>

The project is listed on the IETF 104 hackathon wiki page: =
https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon =
<https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon> (info copied =
below)
=20
Feel free to join us.

Bruno Rijsman


Routing In Fat Trees (RIFT) Chaos Monkey Testing

* Champions
  * Tony Przygienda <prz at juniper.net> (will join in person)
  * Bruno Rijsman <brunorijsman at gmail.com> (will join remotely)
* Project(s)
  * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC =
routing protocol
  * =E2=80=8BDetailed description of the planned activities at the =
hackathon at=20
    http://bit.ly/rift-hackathon-ietf-104
  * We have two implementations now:
    * RIFT-Python open source
    * Vendor implementation
    * The open source one has a chaos monkey framework in place we can =
use=20
      to stress protocol implementations and interoperability between =
them.=20
      Unusual hackathon but that will be very, very useful for further=20=

      development and quality of implementations while breaking =
completely=20
      new grounds (chaos testing on model based protocol =
specifications).
* Preconditions:
  * Python knowledge
  * Familiarity with the open source RIFT code on =
=E2=80=8Bhttps://github.com/brunorijsman/rift-python
  * RIFT Specification in some detail =E2=80=8BRIFT draft
  * Familiarity with creating virtual machines in AWS


--Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"auto" style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Hi everyone,</div><div class=3D"">&nbsp;</div><div =
class=3D"">At the Routing In Fat Trees (RIFT) IETF 104 hackathon in =
Prague we will be working on "chaos monkey" testing of two RIFT =
implementations: the RIFT-Python open source implementation and a vendor =
RIFT implementation.</div><div class=3D""><br class=3D""></div><div =
class=3D"">This hackathon is inspired by the concept of chaos =
engineering and in particular by the chaos monkey tool, which =
intentionally and randomly shuts down servers in a production =
environment. This is intended to build confidence in the system's =
capability to withstand turbulent and unexpected conditions.</div><div =
class=3D""><br class=3D""></div><div class=3D"">In this hackathon we =
will do something similar for RIFT networks. We will build a large fat =
tree network of RIFT routers. Then we will randomly insert failures into =
the network and make sure that the network behaves correctly. We will =
make sure the RIFT routers don't crash or otherwise behave badly. And we =
will make sure that the routers forwarding tables and link-state =
databases converge correctly.</div><div class=3D""><br =
class=3D""></div><div class=3D"">We will use (and possibly enhance) the =
chaos testing framework as well as the visualization and verification =
tools that are already part of the RIFT-Python open source =
project.</div><div class=3D""><br class=3D""></div><div class=3D"">Even =
if you are not much interested in the RIFT routing protocol, but you are =
interested in testing large network topologies using container-like =
technology, or in visualization tools, or in chaos testing, this might =
be the right hackathon for you.</div><div class=3D""><br =
class=3D""></div><div class=3D""><b class=3D"">A detailed description of =
the planned activities at the hackathon is available at:&nbsp;<a =
href=3D"http://bit.ly/rift-hackathon-ietf-104" =
class=3D"">http://bit.ly/rift-hackathon-ietf-104</a></b></div><div =
class=3D""><br class=3D""></div><div class=3D"">The project is listed on =
the IETF 104 hackathon wiki page:&nbsp;<a =
href=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon" =
class=3D"">https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon</a>&n=
bsp;(info copied below)</div><div class=3D"">&nbsp;</div><div =
class=3D"">Feel free to join us.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Bruno Rijsman</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D"">Routing In Fat Trees (RIFT) Chaos Monkey Testing</div><div =
class=3D""><br class=3D""></div><div class=3D"">* Champions</div><div =
class=3D"">&nbsp; * Tony Przygienda &lt;prz at <a =
href=3D"http://juniper.net" class=3D"">juniper.net</a>&gt; (will join in =
person)</div><div class=3D"">&nbsp; * Bruno Rijsman &lt;brunorijsman at =
<a href=3D"http://gmail.com" class=3D"">gmail.com</a>&gt; (will join =
remotely)</div><div class=3D"">* Project(s)</div><div class=3D"">&nbsp; =
* =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC =
routing protocol</div><div class=3D"">&nbsp; * =E2=80=8BDetailed =
description of the planned activities at the hackathon =
at&nbsp;</div><div class=3D"">&nbsp; &nbsp; <a =
href=3D"http://bit.ly/rift-hackathon-ietf-104" =
class=3D"">http://bit.ly/rift-hackathon-ietf-104</a></div><div =
class=3D"">&nbsp; * We have two implementations now:</div><div =
class=3D"">&nbsp; &nbsp; * RIFT-Python open source</div><div =
class=3D"">&nbsp; &nbsp; * Vendor implementation</div><div =
class=3D"">&nbsp; &nbsp; * The open source one has a chaos monkey =
framework in place we can use&nbsp;</div><div class=3D"">&nbsp; &nbsp; =
&nbsp; to stress protocol implementations and interoperability between =
them.&nbsp;</div><div class=3D"">&nbsp; &nbsp; &nbsp; Unusual hackathon =
but that will be very, very useful for further&nbsp;</div><div =
class=3D"">&nbsp; &nbsp; &nbsp; development and quality of =
implementations while breaking completely&nbsp;</div><div =
class=3D"">&nbsp; &nbsp; &nbsp; new grounds (chaos testing on model =
based protocol specifications).</div><div class=3D"">* =
Preconditions:</div><div class=3D"">&nbsp; * Python knowledge</div><div =
class=3D"">&nbsp; * Familiarity with the open source RIFT code on =E2=80=8B=
<a href=3D"https://github.com/brunorijsman/rift-python" =
class=3D"">https://github.com/brunorijsman/rift-python</a></div><div =
class=3D"">&nbsp; * RIFT Specification in some detail =E2=80=8BRIFT =
draft</div><div class=3D"">&nbsp; * Familiarity with creating virtual =
machines in AWS</div><div class=3D""><br =
class=3D""></div></div></body></html>=

--Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B--


From nobody Tue Feb 26 07:33:52 2019
Return-Path: <tonysietf@gmail.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0E69128CB7; Tue, 26 Feb 2019 07:33:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MsYRVBIS3kTJ; Tue, 26 Feb 2019 07:33:47 -0800 (PST)
Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27F06130E84; Tue, 26 Feb 2019 07:33:47 -0800 (PST)
Received: by mail-ed1-x536.google.com with SMTP id b20so11056921edw.11; Tue, 26 Feb 2019 07:33:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sXYC48EZeUSxjcGUPsLwBtrYfyr9K4MJ+X8xqKf7obs=; b=nY5lbQvBXmZTYCBaErvtrgt+MnJVxf0sqYIksnlyfvc0mgCGVxhRW5usFpXrJiMIMY k+KD6Y1jipT2OhyL5LD9ICF3LvMzFeP+u4xBfz4UQCpydrOLRKSoRc2buwZxnQuZZ8SH r9HoDg4dZKe/sKwmIN7mm2YL9KbtjjfdZi5o5lGCPtnBpoW5cPj6E3asesDYhaN6ZbpB c5Za1HQyLvRFxP4xw5S3yxNqMeC2mfVVva3rHqHvb3yqbWUjwKnysqp6Cl8Otr7FrFiZ ITeMwpZ3PHtW1b5kcpNTGXKsI9/dQbhP1CcTd7x+Kq3qMBvPb6l5NoQO56ypcsVBvbaI Ifgw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sXYC48EZeUSxjcGUPsLwBtrYfyr9K4MJ+X8xqKf7obs=; b=CwJD2oDStmxVeIb2FkUz7GcfFut3ug8Rk3dzRuQYiwGR1K01ZoVffWPOH5h3EwNut9 zw3wrq0c6P4FzYLnxvMuHVKA2JXk09YCZMSYvsWOxjxQLFgAPapAeQJ5jpSwZ7PK55RV bor2B+bDCw3q+3rQGFrfypOLCRGj9gwSyGK7LV/hgSFAsNQcCC10tzmytHYatWFwdhVT 1KPg0+yq+V0Ph3KVlVxZJlLUNNxdtTo31RB0VpHjj3vbc8uo9LNEWyYPJNk/m6yz6NZp ACXgHvUlrhXz1HOPZ8zdlebTc6PNSEzDEZyyp2bhKXwudms0PDGQhzull8kxRuvnE40t wouQ==
X-Gm-Message-State: AHQUAuaz5HbyRcWfQKwskyrLZFpykKSRDAgwfQweVIhCa5cRu8URYIAp XsMM4u7MQUw/tCBRPE6rmV64o3DYjzweaYDRa7E=
X-Google-Smtp-Source: AHgI3Ia3C5V1a0VqCw7gGKNCoS1NLd41xupsEIg/L2ioc6db9kh6TRMN7eJijvt63svNQD4Vrl75W6jVL1CMEIdOxKg=
X-Received: by 2002:a50:ad13:: with SMTP id y19mr19357724edc.86.1551195225504;  Tue, 26 Feb 2019 07:33:45 -0800 (PST)
MIME-Version: 1.0
References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com>
In-Reply-To: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Tue, 26 Feb 2019 07:33:09 -0800
Message-ID: <CA+wi2hMJGTVpt+NzQDS_e8DFe5QCh+w2fjnAdLs5g7zqHRJkYg@mail.gmail.com>
To: Bruno Rijsman <brunorijsman@gmail.com>
Cc: hackathon@ietf.org, rift@ietf.org
Content-Type: multipart/alternative; boundary="00000000000064bf340582cdc88f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/Fqdbopc6ikLD-XuN8O4G0SvLcSo>
Subject: Re: [hackathon] [Rift] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2019 15:33:50 -0000

--00000000000064bf340582cdc88f
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I'll be setting up a 16 or so cores AWS account next week that we can use
for larger runs during hackathon. For development purposes I think e'one
can chuck with a micro freebie ...

Ubuntu I assume?

thanks

--- tony

On Mon, Feb 25, 2019 at 5:15 PM Bruno Rijsman <brunorijsman@gmail.com>
wrote:

> Hi everyone,
>
> At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we will b=
e
> working on "chaos monkey" testing of two RIFT implementations: the
> RIFT-Python open source implementation and a vendor RIFT implementation.
>
> This hackathon is inspired by the concept of chaos engineering and in
> particular by the chaos monkey tool, which intentionally and randomly shu=
ts
> down servers in a production environment. This is intended to build
> confidence in the system's capability to withstand turbulent and unexpect=
ed
> conditions.
>
> In this hackathon we will do something similar for RIFT networks. We will
> build a large fat tree network of RIFT routers. Then we will randomly
> insert failures into the network and make sure that the network behaves
> correctly. We will make sure the RIFT routers don't crash or otherwise
> behave badly. And we will make sure that the routers forwarding tables an=
d
> link-state databases converge correctly.
>
> We will use (and possibly enhance) the chaos testing framework as well as
> the visualization and verification tools that are already part of the
> RIFT-Python open source project.
>
> Even if you are not much interested in the RIFT routing protocol, but you
> are interested in testing large network topologies using container-like
> technology, or in visualization tools, or in chaos testing, this might be
> the right hackathon for you.
>
> *A detailed description of the planned activities at the hackathon is
> available at: http://bit.ly/rift-hackathon-ietf-104
> <http://bit.ly/rift-hackathon-ietf-104>*
>
> The project is listed on the IETF 104 hackathon wiki page:
> https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon (info copied
> below)
>
> Feel free to join us.
>
> Bruno Rijsman
>
>
> Routing In Fat Trees (RIFT) Chaos Monkey Testing
>
> * Champions
>   * Tony Przygienda <prz at juniper.net> (will join in person)
>   * Bruno Rijsman <brunorijsman at gmail.com> (will join remotely)
> * Project(s)
>   * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC rout=
ing
> protocol
>   * =E2=80=8BDetailed description of the planned activities at the hackat=
hon at
>     http://bit.ly/rift-hackathon-ietf-104
>   * We have two implementations now:
>     * RIFT-Python open source
>     * Vendor implementation
>     * The open source one has a chaos monkey framework in place we can us=
e
>       to stress protocol implementations and interoperability between
> them.
>       Unusual hackathon but that will be very, very useful for further
>       development and quality of implementations while breaking completel=
y
>       new grounds (chaos testing on model based protocol specifications).
> * Preconditions:
>   * Python knowledge
>   * Familiarity with the open source RIFT code on =E2=80=8B
> https://github.com/brunorijsman/rift-python
>   * RIFT Specification in some detail =E2=80=8BRIFT draft
>   * Familiarity with creating virtual machines in AWS
>
> _______________________________________________
> RIFT mailing list
> RIFT@ietf.org
> https://www.ietf.org/mailman/listinfo/rift
>

--00000000000064bf340582cdc88f
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I&#39;ll be setting up a 16 or so cores AWS account n=
ext week that we can use for larger runs during hackathon. For development =
purposes I think e&#39;one can chuck with a micro freebie ... <br></div><di=
v><br></div><div>Ubuntu I assume? <br></div><div><br></div><div>thanks <br>=
</div><div><br></div><div>--- tony<br></div></div><br><div class=3D"gmail_q=
uote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Feb 25, 2019 at 5:15 PM=
 Bruno Rijsman &lt;<a href=3D"mailto:brunorijsman@gmail.com">brunorijsman@g=
mail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><div style=3D"overflow-wrap: break-word;">
<div dir=3D"auto" style=3D"overflow-wrap: break-word;"><div>Hi everyone,</d=
iv><div>=C2=A0</div><div>At the Routing In Fat Trees (RIFT) IETF 104 hackat=
hon in Prague we will be working on &quot;chaos monkey&quot; testing of two=
 RIFT implementations: the RIFT-Python open source implementation and a ven=
dor RIFT implementation.</div><div><br></div><div>This hackathon is inspire=
d by the concept of chaos engineering and in particular by the chaos monkey=
 tool, which intentionally and randomly shuts down servers in a production =
environment. This is intended to build confidence in the system&#39;s capab=
ility to withstand turbulent and unexpected conditions.</div><div><br></div=
><div>In this hackathon we will do something similar for RIFT networks. We =
will build a large fat tree network of RIFT routers. Then we will randomly =
insert failures into the network and make sure that the network behaves cor=
rectly. We will make sure the RIFT routers don&#39;t crash or otherwise beh=
ave badly. And we will make sure that the routers forwarding tables and lin=
k-state databases converge correctly.</div><div><br></div><div>We will use =
(and possibly enhance) the chaos testing framework as well as the visualiza=
tion and verification tools that are already part of the RIFT-Python open s=
ource project.</div><div><br></div><div>Even if you are not much interested=
 in the RIFT routing protocol, but you are interested in testing large netw=
ork topologies using container-like technology, or in visualization tools, =
or in chaos testing, this might be the right hackathon for you.</div><div><=
br></div><div><b>A detailed description of the planned activities at the ha=
ckathon is available at:=C2=A0<a href=3D"http://bit.ly/rift-hackathon-ietf-=
104" target=3D"_blank">http://bit.ly/rift-hackathon-ietf-104</a></b></div><=
div><br></div><div>The project is listed on the IETF 104 hackathon wiki pag=
e:=C2=A0<a href=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/104hackatho=
n" target=3D"_blank">https://trac.ietf.org/trac/ietf/meeting/wiki/104hackat=
hon</a>=C2=A0(info copied below)</div><div>=C2=A0</div><div>Feel free to jo=
in us.</div><div><br></div><div>Bruno Rijsman</div><div><br></div><div><br>=
</div><div>Routing In Fat Trees (RIFT) Chaos Monkey Testing</div><div><br><=
/div><div>* Champions</div><div>=C2=A0 * Tony Przygienda &lt;prz at <a href=
=3D"http://juniper.net" target=3D"_blank">juniper.net</a>&gt; (will join in=
 person)</div><div>=C2=A0 * Bruno Rijsman &lt;brunorijsman at <a href=3D"ht=
tp://gmail.com" target=3D"_blank">gmail.com</a>&gt; (will join remotely)</d=
iv><div>* Project(s)</div><div>=C2=A0 * =E2=80=8BRIFT is a STD track WG wor=
king on a modern IP fabric/DC routing protocol</div><div>=C2=A0 * =E2=80=8B=
Detailed description of the planned activities at the hackathon at=C2=A0</d=
iv><div>=C2=A0 =C2=A0 <a href=3D"http://bit.ly/rift-hackathon-ietf-104" tar=
get=3D"_blank">http://bit.ly/rift-hackathon-ietf-104</a></div><div>=C2=A0 *=
 We have two implementations now:</div><div>=C2=A0 =C2=A0 * RIFT-Python ope=
n source</div><div>=C2=A0 =C2=A0 * Vendor implementation</div><div>=C2=A0 =
=C2=A0 * The open source one has a chaos monkey framework in place we can u=
se=C2=A0</div><div>=C2=A0 =C2=A0 =C2=A0 to stress protocol implementations =
and interoperability between them.=C2=A0</div><div>=C2=A0 =C2=A0 =C2=A0 Unu=
sual hackathon but that will be very, very useful for further=C2=A0</div><d=
iv>=C2=A0 =C2=A0 =C2=A0 development and quality of implementations while br=
eaking completely=C2=A0</div><div>=C2=A0 =C2=A0 =C2=A0 new grounds (chaos t=
esting on model based protocol specifications).</div><div>* Preconditions:<=
/div><div>=C2=A0 * Python knowledge</div><div>=C2=A0 * Familiarity with the=
 open source RIFT code on =E2=80=8B<a href=3D"https://github.com/brunorijsm=
an/rift-python" target=3D"_blank">https://github.com/brunorijsman/rift-pyth=
on</a></div><div>=C2=A0 * RIFT Specification in some detail =E2=80=8BRIFT d=
raft</div><div>=C2=A0 * Familiarity with creating virtual machines in AWS</=
div><div><br></div></div></div>____________________________________________=
___<br>
RIFT mailing list<br>
<a href=3D"mailto:RIFT@ietf.org" target=3D"_blank">RIFT@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/rift" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/rift</a><br>
</blockquote></div>

--00000000000064bf340582cdc88f--


From nobody Tue Feb 26 07:36:55 2019
Return-Path: <eckelcu@cisco.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45C07130EA7; Tue, 26 Feb 2019 07:36:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level: 
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=EBo/zaxU; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=gzRUDx53
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id if6h6aGr5IH5; Tue, 26 Feb 2019 07:36:51 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 486F4130E84; Tue, 26 Feb 2019 07:36:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19805; q=dns/txt; s=iport; t=1551195411; x=1552405011; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=BSWvF8QcagSYpgCVtIxHKmbV4eAoq4y7DCg2DPd8jNc=; b=EBo/zaxUMdbuh9TsS8LbG430pNLBheYMULK4SZDf4PkDjPfF9e8powGg JbxCfF4to5sOtpKYL3LZOGSXuVR6rBeKCNRHH8VFtQKevB3fw8cCIDvmn yddg5o7997SchQbKSRZg7TjTN75smNVZdAF5TxSA/OdThfyrTUNYHju3J w=;
IronPort-PHdr: =?us-ascii?q?9a23=3AcvoIjRx7DmBlzk3XCy+N+z0EezQntrPoPwUc9p?= =?us-ascii?q?sgjfdUf7+++4j5YhSN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1?= =?us-ascii?q?kAgMQSkRYnBZuIAk72KPX3Ryc7B89FElRi+iLzPA=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AsAABfXHVc/51dJa1eBhwBAQEEAQE?= =?us-ascii?q?HBAEBgVEHAQELAYENI1ADZ3QECyeECINHA4RQixFKgg2JLYkAhXGBJANUCwE?= =?us-ascii?q?BIwmEQAIXg2siNAkNAQMBAQIBAQJtHAyFSgEBAQQjHQEBOA8CAQgRAwECKwI?= =?us-ascii?q?CAh8RHQgCBAESgyABgQ5MAxUBAgygOAKKFHGBLx2CWwEBBYEwAYNZDQuCCwi?= =?us-ascii?q?MSBeBf4ERJx+BTn6BQYEWRwKBRQ4uDYJdMYImikCBfYN/hx2LWzMJAodAh2m?= =?us-ascii?q?DPRmBc1iFBYtKilmFVIEuVIo/AgQCBAUCDQEBBYFHOIFWcBVlAYJBCRaBfRg?= =?us-ascii?q?egziDcWg7hT9yGAGBD48bAQE?=
X-IronPort-AV: E=Sophos;i="5.58,416,1544486400";  d="scan'208,217";a="522670645"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Feb 2019 15:36:49 +0000
Received: from XCH-ALN-020.cisco.com (xch-aln-020.cisco.com [173.36.7.30]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id x1QFanPQ021175 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 26 Feb 2019 15:36:49 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-ALN-020.cisco.com (173.36.7.30) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 26 Feb 2019 09:36:49 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 26 Feb 2019 10:36:48 -0500
Received: from NAM05-DM3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Tue, 26 Feb 2019 09:36:48 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BSWvF8QcagSYpgCVtIxHKmbV4eAoq4y7DCg2DPd8jNc=; b=gzRUDx53TtBO/l7qAi2whII8uqsop3srboS7OjqYq7Q4vOW/8StSTMkOCW9gmcFaPV8NMF5/Womr07vaaHKtuJezpb+tJEgDIFtbOsaLn28dBUWDO7DnGC2nCNCr/1MJU33HXHxApZeUXmsXg/5DVQm+T6URjeSRspI7c8d/LNc=
Received: from DM6PR11MB3547.namprd11.prod.outlook.com (20.178.229.140) by DM6PR11MB3371.namprd11.prod.outlook.com (20.176.122.210) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1643.21; Tue, 26 Feb 2019 15:36:47 +0000
Received: from DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79]) by DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79%5]) with mapi id 15.20.1643.019; Tue, 26 Feb 2019 15:36:47 +0000
From: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
To: Bruno Rijsman <brunorijsman@gmail.com>, "hackathon@ietf.org" <hackathon@ietf.org>, "rift@ietf.org" <rift@ietf.org>
Thread-Topic: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague
Thread-Index: AQHUzXDM6r0DYyR53UCSXp0VW2v9IaXxsSsA
Date: Tue, 26 Feb 2019 15:36:47 +0000
Message-ID: <C08AF988-16C9-445B-B005-BD91F3146FA6@cisco.com>
References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com>
In-Reply-To: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.16.1.190220
authentication-results: spf=none (sender IP is ) smtp.mailfrom=eckelcu@cisco.com; 
x-originating-ip: [2001:420:303:1250:59d:b356:298f:24c8]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 828af5be-dc34-4ced-b560-08d69c003811
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:DM6PR11MB3371; 
x-ms-traffictypediagnostic: DM6PR11MB3371:
x-ms-exchange-purlcount: 5
x-microsoft-exchange-diagnostics: =?utf-8?B?MTtETTZQUjExTUIzMzcxOzIzOmpZclUrVzQ3eUpRWXZGd1R5YjRHenpJcDRM?= =?utf-8?B?TVlNaUFjZDA3VFRIMFBzUThWZm9uc2pZbk5WRGFzWi9YMUlveGF0ays2bmZR?= =?utf-8?B?cFE2NG1mNzlVSHVEbTZNcjZBdnBBMmhuWkRLVTk3SWs0d1AwVzBPa1JmWGFZ?= =?utf-8?B?dGFnRWVNU2pnMFZTcTV2Vk1kbXhvU0dQWDBsMmFvMEpQTjY5N3lnL05uczNT?= =?utf-8?B?NUFUVjlxa3ozcHJLT3F1UFo1dzVMWWVGSkw3alZDQ0FUMXdNblFuVE4wOEVX?= =?utf-8?B?U1g1QlNzSUlIWmE5bVV6U3oxSm9odjhCQjFmck0rOEkzUWs4U1V4bE1UL1M3?= =?utf-8?B?T0prbER3UVpkaGNzU3RBM3RhQmlXQU9ocElYUm5tU1hvMU5NMS8rT2J3MHgw?= =?utf-8?B?MGlOMlV4VlZjbGt5YUEzQ1NsTWYyL1VmUjhTay82ZG9Fc01EQ3ByZGJ2M1B3?= =?utf-8?B?Z1RyRmowME5acXhrc2F3RHJ3UXpUSno0YVhIT0llcjRwSlZnOGhoZG1yQXVv?= =?utf-8?B?V05kYS85emlHU01vZUhPVUUwaDA5QUxTUyt2MmhTZ1kvT2dNcWJzWUl6MGhN?= =?utf-8?B?SDlGYWJFZTM5bERyWXU5dXNBVnVGeHM3Wk9WbUMzY0NJSTYwc3RYMlJsbXRs?= =?utf-8?B?OFlKQnQ3eGp6VFpOZXJFWFNHYmI1UUhZRnhOVmVWZWRsYnFhbENva1JGTmNW?= =?utf-8?B?QkUvbEM0NFkzUWdBRlg3VHcxWElIZDlZZWlidGhXOU1RSko3Q3E5aVVhSEkv?= =?utf-8?B?Mm04WW5ndnFjUy9VQ2Z5bHBjRFpIZ3A2bnJIMmtqUk0yVW5rcUdmdFRuUzho?= =?utf-8?B?ajdlYTlFVnliS1FISjRVa2hKWXBBNzNxTURCVklocEJZbXpnLzNYUUJUanlp?= =?utf-8?B?akQySGRWTXRhTkR4S0dmQWMwc1ZscEp3b0NZendaeEQzcHZSUmd2c1ZISE1R?= =?utf-8?B?TlFsc3Jubkl3aDlOd2gyNTF3QkJxL01sRnBvQTBlcktkQzkwWmNPK3RzYjR2?= =?utf-8?B?S0NnWmI2ZXZkU01ETlhaek1CUTEvMERoT0xWYW5Rb1g0ZmxHVDE3bzdBY1Q5?= =?utf-8?B?T294NVdaNzJVWGMzb3ZjODFMdFNqMFdxWCtFRDFPUXVJcmpDSkRWMlNQcndI?= =?utf-8?B?ZzNPeFA1SEoveXVpK3pjazRJMElOUWxScFphZ2NjZ0pEbVhNRVhqN0Y0Uk42?= =?utf-8?B?QUlrSno3RFA3aDQrSTdpbHhFSk5XNXQ1eUNkUGV3VjJ0dWQzOXV1SmFJdk1x?= =?utf-8?B?T2ZKRDhsenVPc0FMd1RteWRBaDlqRmk3MGVIU3VPSmZQRkVmR3J6aWwrWUhV?= =?utf-8?B?YThhSWZ3QkRlMVUyZmlvYnBLZnA4YlZKMUY4SkVlTmY5U29GcCtpMDJHdC9h?= =?utf-8?B?TDVpVWVWNzFvUlNIWDN2YW03RUNkZnlwTlRYNGFkc3E3VWN0QjYvTDFQdGo1?= =?utf-8?B?SHp0MHd0ZlpYT2NOUUNNMy9tZ1B1MFFaL0xNMi9Bbk8yeGZWQld2RU8xS1FO?= =?utf-8?B?TnVMWW1RMHNrN2gvblR1WTUzdFY0US96ZXp3YUdTdnZWL2ttNDg0eEFOd3Vh?= =?utf-8?B?NVQxWkZ0RWNyaHNMeHd6M3B0Q1dHUEN1cXVVR1BRQng2Wi9RbzU3RFRNTlBy?= =?utf-8?B?eEpiTm1hcitwanpGdkpiT29VWDZ4WXlMSmhudEMwd3J0QmRXNXIrUExvTGlh?= =?utf-8?B?V3VrOVdhRU9HL2lDaHBKL3ZST1doYzVkWmMxSTlxeVlXYVJaYnIrb2U5RmRG?= =?utf-8?B?ZGI2WTBpKzE3U05FVXpRM3RkR0t3eEhhbHBwZHdXQUtPU29GdXgzU3lITDEx?= =?utf-8?B?VE9lQlltbmVFVVhOTllCMzlFdUNNc3hZZXByczRmNkdaYkRPei9Jb25MOU5K?= =?utf-8?B?TDEraTh3Zm50VTRwMS9GbUtPVVVMLzBRdGpjMm5lZURIMUpnRER2dkFiQXdu?= =?utf-8?B?K3ZWMTlsOFlrZm1wVHNuWDdkNU5PNUdCQUVtT3VqUjdsa1d5VHZKcmFjbXJs?= =?utf-8?B?VjJnS1g2Tlh6Ni9LK21rSll5VW1kcXM3UlVLZz09?=
x-microsoft-antispam-prvs: <DM6PR11MB3371EE26727975DC2CC923B8B27B0@DM6PR11MB3371.namprd11.prod.outlook.com>
x-forefront-prvs: 096029FF66
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(346002)(396003)(136003)(366004)(376002)(199004)(189003)(53754006)(6306002)(54896002)(478600001)(8676002)(606006)(81156014)(81166006)(7736002)(2906002)(110136005)(8936002)(105586002)(316002)(229853002)(25786009)(6436002)(6116002)(58126008)(76176011)(9326002)(68736007)(102836004)(53936002)(966005)(6506007)(6512007)(6486002)(82746002)(5660300002)(53546011)(36756003)(236005)(86362001)(14454004)(14444005)(256004)(97736004)(476003)(11346002)(83716004)(53376002)(53366004)(2201001)(6246003)(2501003)(106356001)(33656002)(71200400001)(71190400001)(186003)(446003)(486006)(2616005)(46003)(99286004)(53386004)(11634002)(493534005)(19477635001); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB3371; H:DM6PR11MB3547.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: KWLvZL10wdj9ELVjAwWZ3SyNH7nscUuktC544+6cpAU2lXfFRHa9LGLaCUc006yR3SyUtJ7p9dNrmNkiMS5O1DklJYfZ+GHvClsQ+iXu4JoKKyDAryG6lVQyjcCKL25ZP3X853USyhKvjETNhzKLQ6rSKuqhZNLosiIXRvxItAZ2HRSksHr2TRyLZOGLr6/EEF9e56prxvFa0VXmfMBz7rD2v2Dh/1iCef+UHWq1LlFZxtmhgBQ8XkuCdbkYo7KWznRqD6g0ajGlvrqqdZjB3uflsoKbHXRiOOL50Pr1CfQyXEU+/JOeC9EBupmaEDlTXygLXiRS2hahy1QF7ON+J5zwq2M7NOqVlWrzcvO+KArDR9qxtb2jcuBVQf5jhuoydcqtXk8+NR5wlduEHje9qhE/zUN4oeldJZljP4M1dkc=
Content-Type: multipart/alternative; boundary="_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 828af5be-dc34-4ced-b560-08d69c003811
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2019 15:36:47.2840 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3371
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.30, xch-aln-020.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/kvt6_OLjnv0PyE2PjV8RXV6qdoc>
Subject: Re: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2019 15:36:54 -0000

--_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <DF5502B19557C241A0211771A307AC23@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4
bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo
dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo
dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp
dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l
dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg
bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj
ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2
IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy
IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJUaW1lcyBO
ZXcgUm9tYW4gXChCb2R5IENTXCkiOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30N
Ci8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYu
TXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQt
c2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KYTpsaW5r
LCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1
ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBl
cmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0K
CXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5tc29ub3JtYWwwLCBsaS5tc29ub3JtYWww
LCBkaXYubXNvbm9ybWFsMA0KCXttc28tc3R5bGUtbmFtZTptc29ub3JtYWw7DQoJbXNvLW1hcmdp
bi10b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBpbjsNCgltc28tbWFyZ2luLWJvdHRvbS1h
bHQ6YXV0bzsNCgltYXJnaW4tbGVmdDowaW47DQoJZm9udC1zaXplOjExLjBwdDsNCglmb250LWZh
bWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQpzcGFuLkVtYWlsU3R5bGUxOA0KCXttc28tc3R5
bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixz
ZXJpZjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10
eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24x
DQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9
DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+DQo8
L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSI+DQo8
ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1
b3Q7LHNlcmlmIj5IaSBCcnVubyw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtmb250LWZhbWlseTomcXVvdDtU
aW1lcyBOZXcgUm9tYW4mcXVvdDssc2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyxzZXJpZiI+VGhpcyBsb29rcyBsaWtl
IGEgZ3JlYXQgcHJvamVjdC4gVGhhbmtzIGZvciBicmluZ2luZyBpdCB0byB0aGUgaGFja2F0aG9u
LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTIuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90
OyxzZXJpZiI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMg
TmV3IFJvbWFuJnF1b3Q7LHNlcmlmIj5EbyB5b3UgaGF2ZSBhbnkgc3BlY2lhbCBuZXR3b3JrIHJl
cXVpcmVtZW50cz8gUG93ZXIgYW5kIGFjY2VzcyB0byB0aGUgSUVURiBuZXR3b3JrIHZpYSBXaUZp
IHdpbGwgYmUgYXZhaWxhYmxlIGF0IGFsbCB0YWJsZXMuIElmIHlvdSBuZWVkIHdpcmVkIGFjY2Vz
cyBvciBhbnl0aGluZyBlbHNlLCBwbGVhc2UNCiBsZXQgbWUga25vdyBhcyBzb29uIGFzIHBvc3Np
YmxlIGFuZCB3ZSB3aWxsIGRvIG91ciBiZXN0IHRvIGFjY29tbW9kYXRlLjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyxzZXJpZiI+PG86cD4m
bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1b3Q7
LHNlcmlmIj5DaGVlcnMsPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMg
TmV3IFJvbWFuJnF1b3Q7LHNlcmlmIj5DaGFybGVzPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1b3Q7LHNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwv
c3Bhbj48L3A+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItdG9wOnNvbGlkICNCNUM0
REYgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBpbiI+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
IiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4w
cHQ7Y29sb3I6YmxhY2siPkZyb206DQo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSJmb250LXNpemU6
MTIuMHB0O2NvbG9yOmJsYWNrIj5oYWNrYXRob24gJmx0O2hhY2thdGhvbi1ib3VuY2VzQGlldGYu
b3JnJmd0OyBvbiBiZWhhbGYgb2YgQnJ1bm8gUmlqc21hbiAmbHQ7YnJ1bm9yaWpzbWFuQGdtYWls
LmNvbSZndDs8YnI+DQo8Yj5EYXRlOiA8L2I+TW9uZGF5LCBGZWJydWFyeSAyNSwgMjAxOSBhdCA1
OjE1IFBNPGJyPg0KPGI+VG86IDwvYj4mcXVvdDtoYWNrYXRob25AaWV0Zi5vcmcmcXVvdDsgJmx0
O2hhY2thdGhvbkBpZXRmLm9yZyZndDssICZxdW90O3JpZnRAaWV0Zi5vcmcmcXVvdDsgJmx0O3Jp
ZnRAaWV0Zi5vcmcmZ3Q7PGJyPg0KPGI+U3ViamVjdDogPC9iPltoYWNrYXRob25dIFtSSUZUXSBS
b3V0aW5nIGluIEZhdCBUcmVlcyAmcXVvdDtjaGFvcyB0ZXN0aW5nJnF1b3Q7IGhhY2thdGhvbiBh
dCBJRVRGIDEwNCBpbiBQcmFndWU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86cD4mbmJz
cDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPkhpIGV2ZXJ5b25lLDxvOnA+PC9vOnA+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4i
PiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPkF0IHRoZSBSb3V0aW5nIEluIEZhdCBUcmVlcyAo
UklGVCkgSUVURiAxMDQgaGFja2F0aG9uIGluIFByYWd1ZSB3ZSB3aWxsIGJlIHdvcmtpbmcgb24g
JnF1b3Q7Y2hhb3MgbW9ua2V5JnF1b3Q7IHRlc3Rpbmcgb2YgdHdvIFJJRlQgaW1wbGVtZW50YXRp
b25zOiB0aGUgUklGVC1QeXRob24gb3BlbiBzb3VyY2UgaW1wbGVtZW50YXRpb24gYW5kIGEgdmVu
ZG9yIFJJRlQgaW1wbGVtZW50YXRpb24uPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86cD4mbmJzcDs8
L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFy
Z2luLWxlZnQ6LjVpbiI+VGhpcyBoYWNrYXRob24gaXMgaW5zcGlyZWQgYnkgdGhlIGNvbmNlcHQg
b2YgY2hhb3MgZW5naW5lZXJpbmcgYW5kIGluIHBhcnRpY3VsYXIgYnkgdGhlIGNoYW9zIG1vbmtl
eSB0b29sLCB3aGljaCBpbnRlbnRpb25hbGx5IGFuZCByYW5kb21seSBzaHV0cyBkb3duIHNlcnZl
cnMgaW4gYSBwcm9kdWN0aW9uIGVudmlyb25tZW50LiBUaGlzIGlzIGludGVuZGVkIHRvIGJ1aWxk
DQogY29uZmlkZW5jZSBpbiB0aGUgc3lzdGVtJ3MgY2FwYWJpbGl0eSB0byB3aXRoc3RhbmQgdHVy
YnVsZW50IGFuZCB1bmV4cGVjdGVkIGNvbmRpdGlvbnMuPG86cD48L286cD48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86
cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+SW4gdGhpcyBoYWNrYXRob24gd2Ugd2lsbCBkbyBzb21l
dGhpbmcgc2ltaWxhciBmb3IgUklGVCBuZXR3b3Jrcy4gV2Ugd2lsbCBidWlsZCBhIGxhcmdlIGZh
dCB0cmVlIG5ldHdvcmsgb2YgUklGVCByb3V0ZXJzLiBUaGVuIHdlIHdpbGwgcmFuZG9tbHkgaW5z
ZXJ0IGZhaWx1cmVzIGludG8gdGhlIG5ldHdvcmsgYW5kIG1ha2Ugc3VyZSB0aGF0IHRoZSBuZXR3
b3JrIGJlaGF2ZXMNCiBjb3JyZWN0bHkuIFdlIHdpbGwgbWFrZSBzdXJlIHRoZSBSSUZUIHJvdXRl
cnMgZG9uJ3QgY3Jhc2ggb3Igb3RoZXJ3aXNlIGJlaGF2ZSBiYWRseS4gQW5kIHdlIHdpbGwgbWFr
ZSBzdXJlIHRoYXQgdGhlIHJvdXRlcnMgZm9yd2FyZGluZyB0YWJsZXMgYW5kIGxpbmstc3RhdGUg
ZGF0YWJhc2VzIGNvbnZlcmdlIGNvcnJlY3RseS48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj48bzpwPiZu
YnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl
PSJtYXJnaW4tbGVmdDouNWluIj5XZSB3aWxsIHVzZSAoYW5kIHBvc3NpYmx5IGVuaGFuY2UpIHRo
ZSBjaGFvcyB0ZXN0aW5nIGZyYW1ld29yayBhcyB3ZWxsIGFzIHRoZSB2aXN1YWxpemF0aW9uIGFu
ZCB2ZXJpZmljYXRpb24gdG9vbHMgdGhhdCBhcmUgYWxyZWFkeSBwYXJ0IG9mIHRoZSBSSUZULVB5
dGhvbiBvcGVuIHNvdXJjZSBwcm9qZWN0LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPjxvOnA+Jm5ic3A7
PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1h
cmdpbi1sZWZ0Oi41aW4iPkV2ZW4gaWYgeW91IGFyZSBub3QgbXVjaCBpbnRlcmVzdGVkIGluIHRo
ZSBSSUZUIHJvdXRpbmcgcHJvdG9jb2wsIGJ1dCB5b3UgYXJlIGludGVyZXN0ZWQgaW4gdGVzdGlu
ZyBsYXJnZSBuZXR3b3JrIHRvcG9sb2dpZXMgdXNpbmcgY29udGFpbmVyLWxpa2UgdGVjaG5vbG9n
eSwgb3IgaW4gdmlzdWFsaXphdGlvbiB0b29scywgb3IgaW4gY2hhb3MgdGVzdGluZywgdGhpcw0K
IG1pZ2h0IGJlIHRoZSByaWdodCBoYWNrYXRob24gZm9yIHlvdS48bzpwPjwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWlu
Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj48Yj5BIGRldGFpbGVkIGRlc2NyaXB0aW9uIG9m
IHRoZSBwbGFubmVkIGFjdGl2aXRpZXMgYXQgdGhlIGhhY2thdGhvbiBpcyBhdmFpbGFibGUgYXQ6
Jm5ic3A7PGEgaHJlZj0iaHR0cDovL2JpdC5seS9yaWZ0LWhhY2thdGhvbi1pZXRmLTEwNCI+aHR0
cDovL2JpdC5seS9yaWZ0LWhhY2thdGhvbi1pZXRmLTEwNDwvYT48L2I+PG86cD48L286cD48L3A+
DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6
LjVpbiI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+VGhlIHByb2plY3QgaXMgbGlzdGVkIG9u
IHRoZSBJRVRGIDEwNCBoYWNrYXRob24gd2lraSBwYWdlOiZuYnNwOzxhIGhyZWY9Imh0dHBzOi8v
dHJhYy5pZXRmLm9yZy90cmFjL2lldGYvbWVldGluZy93aWtpLzEwNGhhY2thdGhvbiI+aHR0cHM6
Ly90cmFjLmlldGYub3JnL3RyYWMvaWV0Zi9tZWV0aW5nL3dpa2kvMTA0aGFja2F0aG9uPC9hPiZu
YnNwOyhpbmZvIGNvcGllZCBiZWxvdyk8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJzcDs8bzpwPjwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn
aW4tbGVmdDouNWluIj5GZWVsIGZyZWUgdG8gam9pbiB1cy48bzpwPjwvbzpwPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
IHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj5CcnVubyBSaWpzbWFuPG86cD48L286cD48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVp
biI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+
Um91dGluZyBJbiBGYXQgVHJlZXMgKFJJRlQpIENoYW9zIE1vbmtleSBUZXN0aW5nPG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2lu
LWxlZnQ6LjVpbiI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+KiBDaGFtcGlvbnM8bzpwPjwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn
aW4tbGVmdDouNWluIj4mbmJzcDsgKiBUb255IFByenlnaWVuZGEgJmx0O3ByeiBhdCA8YSBocmVm
PSJodHRwOi8vanVuaXBlci5uZXQiPg0KanVuaXBlci5uZXQ8L2E+Jmd0OyAod2lsbCBqb2luIGlu
IHBlcnNvbik8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJzcDsgKiBCcnVubyBSaWpzbWFuICZsdDti
cnVub3JpanNtYW4gYXQgPGEgaHJlZj0iaHR0cDovL2dtYWlsLmNvbSI+DQpnbWFpbC5jb208L2E+
Jmd0OyAod2lsbCBqb2luIHJlbW90ZWx5KTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiogUHJvamVjdChz
KTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5
bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAqIOKAi1JJRlQgaXMgYSBTVEQgdHJhY2sgV0cg
d29ya2luZyBvbiBhIG1vZGVybiBJUCBmYWJyaWMvREMgcm91dGluZyBwcm90b2NvbDxvOnA+PC9v
OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdp
bi1sZWZ0Oi41aW4iPiZuYnNwOyAqIOKAi0RldGFpbGVkIGRlc2NyaXB0aW9uIG9mIHRoZSBwbGFu
bmVkIGFjdGl2aXRpZXMgYXQgdGhlIGhhY2thdGhvbiBhdCZuYnNwOzxvOnA+PC9vOnA+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41
aW4iPiZuYnNwOyAmbmJzcDsgPGEgaHJlZj0iaHR0cDovL2JpdC5seS9yaWZ0LWhhY2thdGhvbi1p
ZXRmLTEwNCI+DQpodHRwOi8vYml0Lmx5L3JpZnQtaGFja2F0aG9uLWlldGYtMTA0PC9hPjxvOnA+
PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1h
cmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAqIFdlIGhhdmUgdHdvIGltcGxlbWVudGF0aW9ucyBub3c6
PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHls
ZT0ibWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7ICZuYnNwOyAqIFJJRlQtUHl0aG9uIG9wZW4gc291
cmNlPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7ICZuYnNwOyAqIFZlbmRvciBpbXBsZW1lbnRh
dGlvbjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgKiBUaGUgb3BlbiBzb3VyY2Ug
b25lIGhhcyBhIGNoYW9zIG1vbmtleSBmcmFtZXdvcmsgaW4gcGxhY2Ugd2UgY2FuIHVzZSZuYnNw
OzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5
bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgJm5ic3A7IHRvIHN0cmVzcyBwcm90
b2NvbCBpbXBsZW1lbnRhdGlvbnMgYW5kIGludGVyb3BlcmFiaWxpdHkgYmV0d2VlbiB0aGVtLiZu
YnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgJm5ic3A7IFVudXN1YWwgaGFj
a2F0aG9uIGJ1dCB0aGF0IHdpbGwgYmUgdmVyeSwgdmVyeSB1c2VmdWwgZm9yIGZ1cnRoZXImbmJz
cDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0
eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJzcDsgJm5ic3A7ICZuYnNwOyBkZXZlbG9wbWVudCBh
bmQgcXVhbGl0eSBvZiBpbXBsZW1lbnRhdGlvbnMgd2hpbGUgYnJlYWtpbmcgY29tcGxldGVseSZu
YnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgJm5ic3A7IG5ldyBncm91bmRz
IChjaGFvcyB0ZXN0aW5nIG9uIG1vZGVsIGJhc2VkIHByb3RvY29sIHNwZWNpZmljYXRpb25zKS48
bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl
PSJtYXJnaW4tbGVmdDouNWluIj4qIFByZWNvbmRpdGlvbnM6PG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+
Jm5ic3A7ICogUHl0aG9uIGtub3dsZWRnZTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAqIEZh
bWlsaWFyaXR5IHdpdGggdGhlIG9wZW4gc291cmNlIFJJRlQgY29kZSBvbiDigIs8YSBocmVmPSJo
dHRwczovL2dpdGh1Yi5jb20vYnJ1bm9yaWpzbWFuL3JpZnQtcHl0aG9uIj5odHRwczovL2dpdGh1
Yi5jb20vYnJ1bm9yaWpzbWFuL3JpZnQtcHl0aG9uPC9hPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZu
YnNwOyAqIFJJRlQgU3BlY2lmaWNhdGlvbiBpbiBzb21lIGRldGFpbCDigItSSUZUIGRyYWZ0PG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i
bWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7ICogRmFtaWxpYXJpdHkgd2l0aCBjcmVhdGluZyB2aXJ0
dWFsIG1hY2hpbmVzIGluIEFXUzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPjxvOnA+Jm5ic3A7PC9vOnA+
PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_--


From nobody Tue Feb 26 07:43:15 2019
Return-Path: <brunorijsman@gmail.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 121DB130E5D; Tue, 26 Feb 2019 07:43:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d31DdCoVXmF8; Tue, 26 Feb 2019 07:43:03 -0800 (PST)
Received: from mail-qk1-x742.google.com (mail-qk1-x742.google.com [IPv6:2607:f8b0:4864:20::742]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08BFB130E84; Tue, 26 Feb 2019 07:43:03 -0800 (PST)
Received: by mail-qk1-x742.google.com with SMTP id z13so7840817qki.2; Tue, 26 Feb 2019 07:43:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:message-id:mime-version:date:subject:in-reply-to:to:references;  bh=OuZmxSy1zxudTYP0+dEhc2bGnX1s5ZAUNNJi9yJORug=; b=Rg0Lda4T1MUieGFI85n37v0ivkD8nFIETjQ4rkfo464kXGOnZ4n2YNsshf7j8drIVw 0owe/IbFyhCS8NW7K7ZmSzMyOOFpB1ypCAPnBRtnnLDjUSHxohORwu4+K6wWzJIajtPW i7y70BIx5BqvqswOk2+evHv09xU4AxGaVPrO9yLb5Nl09bk3QcOZuy40RAr1N+B9oUKH 15ea4nA0xvVuXsspxsQyfbWDsMhthwSL2+HmJ8dzGd4Frn4/ALpjj7Xe73HCVgGHyXuD iR1XnS3YDg2E0vegwzaGTOr+dX5A1gPeAlDcwil6GJry/qEkfm3y8A86IkpZTZSFgjY5 VYMg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:date:subject :in-reply-to:to:references; bh=OuZmxSy1zxudTYP0+dEhc2bGnX1s5ZAUNNJi9yJORug=; b=l32l0C0h/VGDubgANELNarrkrqOea8W2WjgB4VfW6ynDMP/f3PzVF7tgwFazg+C5WK b+CNzLSedh9mTItyn6wn2++4/bDuL12osuXYA2wOKx0H2Ob8adQCq3gEN0i0OLR9u6xO ZcUcMm76v32mYEeA+fVYxaY5CunNpBhY4ilEMldY/hgd8PIgBLEdaH6CeQ3gMW7Ohv7g KO4ZIp9LUwCr7pevZsV5DByBhLYV8gXgOPT74u7BTMeYkbP4DaJzEGNIj4riG5+3mPUX U7wIznccj8reY3cGYR6a56PUI9i4VubRB/jq/Y3JpPpozmQY204cXozW0R4mCctn+P+5 Nkkw==
X-Gm-Message-State: AHQUAuZbQllTumMRE9HDvkrn7sj0Fon2EmyZ2jBPcy8UVVFD5LeH2CMe fy9K0CxjkiNx7OR+vHkYsIH/toBYPyA=
X-Google-Smtp-Source: AHgI3IZ7omz2gfNku6S7iu1SqIcL/zvXg3rFIEz24eIOXkl2pa/oKSuF5Yd8tTL6F3Cra50f/pnW0A==
X-Received: by 2002:a37:a704:: with SMTP id q4mr17919539qke.245.1551195780369;  Tue, 26 Feb 2019 07:43:00 -0800 (PST)
Received: from [192.168.8.108] (ip-53-226-107-190.nextelmovil.cl. [190.107.226.53]) by smtp.gmail.com with ESMTPSA id z43sm8405237qtj.66.2019.02.26.07.42.55 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Feb 2019 07:42:59 -0800 (PST)
From: Bruno Rijsman <brunorijsman@gmail.com>
Message-Id: <57A11D39-A3DC-4482-AEBF-B72597CA1D61@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 26 Feb 2019 12:42:53 -0300
In-Reply-To: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com>
To: hackathon@ietf.org, rift@ietf.org
References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/_3zTR5P-HYBZ27jlAu5cpjj6HPQ>
Subject: Re: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2019 15:43:06 -0000

--Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Quick follow-up: I also posted a youtube video of a hands-on walkthrough =
of RIFT chaos testing: https://youtu.be/GqebgPmA4Xc =
<https://youtu.be/GqebgPmA4Xc>

> On Feb 25, 2019, at 10:14 PM, Bruno Rijsman <brunorijsman@gmail.com> =
wrote:
>=20
> Hi everyone,
> =20
> At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we =
will be working on "chaos monkey" testing of two RIFT implementations: =
the RIFT-Python open source implementation and a vendor RIFT =
implementation.
>=20
> This hackathon is inspired by the concept of chaos engineering and in =
particular by the chaos monkey tool, which intentionally and randomly =
shuts down servers in a production environment. This is intended to =
build confidence in the system's capability to withstand turbulent and =
unexpected conditions.
>=20
> In this hackathon we will do something similar for RIFT networks. We =
will build a large fat tree network of RIFT routers. Then we will =
randomly insert failures into the network and make sure that the network =
behaves correctly. We will make sure the RIFT routers don't crash or =
otherwise behave badly. And we will make sure that the routers =
forwarding tables and link-state databases converge correctly.
>=20
> We will use (and possibly enhance) the chaos testing framework as well =
as the visualization and verification tools that are already part of the =
RIFT-Python open source project.
>=20
> Even if you are not much interested in the RIFT routing protocol, but =
you are interested in testing large network topologies using =
container-like technology, or in visualization tools, or in chaos =
testing, this might be the right hackathon for you.
>=20
> A detailed description of the planned activities at the hackathon is =
available at: http://bit.ly/rift-hackathon-ietf-104 =
<http://bit.ly/rift-hackathon-ietf-104>
>=20
> The project is listed on the IETF 104 hackathon wiki page: =
https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon =
<https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon> (info copied =
below)
> =20
> Feel free to join us.
>=20
> Bruno Rijsman
>=20
>=20
> Routing In Fat Trees (RIFT) Chaos Monkey Testing
>=20
> * Champions
>   * Tony Przygienda <prz at juniper.net <http://juniper.net/>> (will =
join in person)
>   * Bruno Rijsman <brunorijsman at gmail.com <http://gmail.com/>> =
(will join remotely)
> * Project(s)
>   * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC =
routing protocol
>   * =E2=80=8BDetailed description of the planned activities at the =
hackathon at=20
>     http://bit.ly/rift-hackathon-ietf-104 =
<http://bit.ly/rift-hackathon-ietf-104>
>   * We have two implementations now:
>     * RIFT-Python open source
>     * Vendor implementation
>     * The open source one has a chaos monkey framework in place we can =
use=20
>       to stress protocol implementations and interoperability between =
them.=20
>       Unusual hackathon but that will be very, very useful for further=20=

>       development and quality of implementations while breaking =
completely=20
>       new grounds (chaos testing on model based protocol =
specifications).
> * Preconditions:
>   * Python knowledge
>   * Familiarity with the open source RIFT code on =
=E2=80=8Bhttps://github.com/brunorijsman/rift-python =
<https://github.com/brunorijsman/rift-python>
>   * RIFT Specification in some detail =E2=80=8BRIFT draft
>   * Familiarity with creating virtual machines in AWS
>=20


--Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Quick=
 follow-up: I also posted a youtube video of a hands-on walkthrough of =
RIFT chaos testing:&nbsp;<a href=3D"https://youtu.be/GqebgPmA4Xc" =
class=3D"">https://youtu.be/GqebgPmA4Xc</a><br class=3D""><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Feb =
25, 2019, at 10:14 PM, Bruno Rijsman &lt;<a =
href=3D"mailto:brunorijsman@gmail.com" =
class=3D"">brunorijsman@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; line-break: after-white-space;" class=3D"">
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"auto" style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Hi everyone,</div><div class=3D"">&nbsp;</div><div =
class=3D"">At the Routing In Fat Trees (RIFT) IETF 104 hackathon in =
Prague we will be working on "chaos monkey" testing of two RIFT =
implementations: the RIFT-Python open source implementation and a vendor =
RIFT implementation.</div><div class=3D""><br class=3D""></div><div =
class=3D"">This hackathon is inspired by the concept of chaos =
engineering and in particular by the chaos monkey tool, which =
intentionally and randomly shuts down servers in a production =
environment. This is intended to build confidence in the system's =
capability to withstand turbulent and unexpected conditions.</div><div =
class=3D""><br class=3D""></div><div class=3D"">In this hackathon we =
will do something similar for RIFT networks. We will build a large fat =
tree network of RIFT routers. Then we will randomly insert failures into =
the network and make sure that the network behaves correctly. We will =
make sure the RIFT routers don't crash or otherwise behave badly. And we =
will make sure that the routers forwarding tables and link-state =
databases converge correctly.</div><div class=3D""><br =
class=3D""></div><div class=3D"">We will use (and possibly enhance) the =
chaos testing framework as well as the visualization and verification =
tools that are already part of the RIFT-Python open source =
project.</div><div class=3D""><br class=3D""></div><div class=3D"">Even =
if you are not much interested in the RIFT routing protocol, but you are =
interested in testing large network topologies using container-like =
technology, or in visualization tools, or in chaos testing, this might =
be the right hackathon for you.</div><div class=3D""><br =
class=3D""></div><div class=3D""><b class=3D"">A detailed description of =
the planned activities at the hackathon is available at:&nbsp;<a =
href=3D"http://bit.ly/rift-hackathon-ietf-104" =
class=3D"">http://bit.ly/rift-hackathon-ietf-104</a></b></div><div =
class=3D""><br class=3D""></div><div class=3D"">The project is listed on =
the IETF 104 hackathon wiki page:&nbsp;<a =
href=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon" =
class=3D"">https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon</a>&n=
bsp;(info copied below)</div><div class=3D"">&nbsp;</div><div =
class=3D"">Feel free to join us.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Bruno Rijsman</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D"">Routing In Fat Trees (RIFT) Chaos Monkey Testing</div><div =
class=3D""><br class=3D""></div><div class=3D"">* Champions</div><div =
class=3D"">&nbsp; * Tony Przygienda &lt;prz at <a =
href=3D"http://juniper.net/" class=3D"">juniper.net</a>&gt; (will join =
in person)</div><div class=3D"">&nbsp; * Bruno Rijsman &lt;brunorijsman =
at <a href=3D"http://gmail.com/" class=3D"">gmail.com</a>&gt; (will join =
remotely)</div><div class=3D"">* Project(s)</div><div class=3D"">&nbsp; =
* =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC =
routing protocol</div><div class=3D"">&nbsp; * =E2=80=8BDetailed =
description of the planned activities at the hackathon =
at&nbsp;</div><div class=3D"">&nbsp; &nbsp; <a =
href=3D"http://bit.ly/rift-hackathon-ietf-104" =
class=3D"">http://bit.ly/rift-hackathon-ietf-104</a></div><div =
class=3D"">&nbsp; * We have two implementations now:</div><div =
class=3D"">&nbsp; &nbsp; * RIFT-Python open source</div><div =
class=3D"">&nbsp; &nbsp; * Vendor implementation</div><div =
class=3D"">&nbsp; &nbsp; * The open source one has a chaos monkey =
framework in place we can use&nbsp;</div><div class=3D"">&nbsp; &nbsp; =
&nbsp; to stress protocol implementations and interoperability between =
them.&nbsp;</div><div class=3D"">&nbsp; &nbsp; &nbsp; Unusual hackathon =
but that will be very, very useful for further&nbsp;</div><div =
class=3D"">&nbsp; &nbsp; &nbsp; development and quality of =
implementations while breaking completely&nbsp;</div><div =
class=3D"">&nbsp; &nbsp; &nbsp; new grounds (chaos testing on model =
based protocol specifications).</div><div class=3D"">* =
Preconditions:</div><div class=3D"">&nbsp; * Python knowledge</div><div =
class=3D"">&nbsp; * Familiarity with the open source RIFT code on =E2=80=8B=
<a href=3D"https://github.com/brunorijsman/rift-python" =
class=3D"">https://github.com/brunorijsman/rift-python</a></div><div =
class=3D"">&nbsp; * RIFT Specification in some detail =E2=80=8BRIFT =
draft</div><div class=3D"">&nbsp; * Familiarity with creating virtual =
machines in AWS</div><div class=3D""><br =
class=3D""></div></div></div></div></blockquote></div><br =
class=3D""></body></html>=

--Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308--


From nobody Tue Feb 26 07:45:05 2019
Return-Path: <brunorijsman@gmail.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 779FF130E5D; Tue, 26 Feb 2019 07:44:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.112
X-Spam-Level: *
X-Spam-Status: No, score=1.112 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URI_HEX=1.122] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Joo0aY8RaIJo; Tue, 26 Feb 2019 07:44:54 -0800 (PST)
Received: from mail-qk1-x72a.google.com (mail-qk1-x72a.google.com [IPv6:2607:f8b0:4864:20::72a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF27D130EC7; Tue, 26 Feb 2019 07:44:52 -0800 (PST)
Received: by mail-qk1-x72a.google.com with SMTP id v139so7799113qkb.12; Tue, 26 Feb 2019 07:44:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=U7lxjBVAAAz0WfiW1OGg1xuIp+6/QR5WxcLoCXt+oxY=; b=OkSRUHSrt8lieKnjzq0qdmojXU5A/UytbMoRh1yhs4c/n8xidSodTjq5mJmMsP1xam QCABPg+NSFo9chS+WzMW4z1yRUhq2Q0Wty3vs9wi/Poh81e/GkD8uH8V3Whjtbq2uUxW ZNXHo3C8HEE/UYF/WjQtQm/IEx0zIrFMpF3z7ICYPCElwlODmT1V2IL5KIQjtcz5ggjB a9Kc6bfXAWJ8Im7TteAOa+ULAkFls4QCF+U7Knedme/0e9w6LnmN1j3+yisqSY9ansd4 SS+91RqWC5Layv7YVj/xn+7iHzQ7fSgqj+u0iMDcoAN45MnfOP/XfbZLgZawBxKroY4/ S6WA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=U7lxjBVAAAz0WfiW1OGg1xuIp+6/QR5WxcLoCXt+oxY=; b=c2axaa4BllGFxlyggJOK3jMgMs81daDNqEopF3Yz3c4L+ptc4b8cJEL32Xr+vwPZM7 i18N5JpkeTGOwkiyWvvHSVfNqhAkQLfrxkJf/jv/v1kOEMT04hBoHkNCVU77A9nKvjwB N5jMRI/QRR1Hr8OMD6Z41lS+LDj2PaYojG1CzSramuCoC3IHLcvr+eoGVT5tRKZs7rQ3 r72zujP93q+cxJV6T7u2aMR4munu8Axm+zF8/cs7IzXwwOnH7yOKtFiChWSEGmG20hkh HfjdnyxEbx22wW7WPO7y4s53DxmQieUwPXXJ+ldYDCnIgwcYEAUm82nh85UHK/bGwg4n 4UYQ==
X-Gm-Message-State: AHQUAuZtaFFLXdeAagSGIZZFRShjf8Zuf3tTeOPv2sPUw8oQ7RRsLFJm R2McSzRr2a/xsHUjuk/usgo=
X-Google-Smtp-Source: AHgI3Ib+ZDrvQ2pLcYFswMqFQQnWrReBU3BN8K8/+E8ReL5XsavB5Y7BSSlwPY8Q6vTfmtUPsjawEw==
X-Received: by 2002:ae9:ea0f:: with SMTP id f15mr17670403qkg.113.1551195891593;  Tue, 26 Feb 2019 07:44:51 -0800 (PST)
Received: from [192.168.8.108] (ip-53-226-107-190.nextelmovil.cl. [190.107.226.53]) by smtp.gmail.com with ESMTPSA id u18sm3578791qka.25.2019.02.26.07.44.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Feb 2019 07:44:50 -0800 (PST)
From: Bruno Rijsman <brunorijsman@gmail.com>
Message-Id: <379F1E9E-7EAA-4B06-946A-6A1FDDC0BF57@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 26 Feb 2019 12:44:46 -0300
In-Reply-To: <C08AF988-16C9-445B-B005-BD91F3146FA6@cisco.com>
Cc: "hackathon@ietf.org" <hackathon@ietf.org>, "rift@ietf.org" <rift@ietf.org>
To: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> <C08AF988-16C9-445B-B005-BD91F3146FA6@cisco.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/prhybqnfU929BIrSepmPr0AJuUo>
Subject: Re: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2019 15:44:57 -0000

--Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Charles,=20

No, no special requirements.  Just good Internet access, since all of =
the heavy lifting will happen in the AWS cloud.

=E2=80=94 Bruno

> On Feb 26, 2019, at 12:36 PM, Charles Eckel (eckelcu) =
<eckelcu@cisco.com> wrote:
>=20
> Hi Bruno,
> =20
> This looks like a great project. Thanks for bringing it to the =
hackathon.
> =20
> Do you have any special network requirements? Power and access to the =
IETF network via WiFi will be available at all tables. If you need wired =
access or anything else, please let me know as soon as possible and we =
will do our best to accommodate.
> =20
> Cheers,
> Charles
> =20
> From: hackathon <hackathon-bounces@ietf.org> on behalf of Bruno =
Rijsman <brunorijsman@gmail.com>
> Date: Monday, February 25, 2019 at 5:15 PM
> To: "hackathon@ietf.org" <hackathon@ietf.org>, "rift@ietf.org" =
<rift@ietf.org>
> Subject: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" =
hackathon at IETF 104 in Prague
> =20
> Hi everyone,
> =20
> At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we =
will be working on "chaos monkey" testing of two RIFT implementations: =
the RIFT-Python open source implementation and a vendor RIFT =
implementation.
> =20
> This hackathon is inspired by the concept of chaos engineering and in =
particular by the chaos monkey tool, which intentionally and randomly =
shuts down servers in a production environment. This is intended to =
build confidence in the system's capability to withstand turbulent and =
unexpected conditions.
> =20
> In this hackathon we will do something similar for RIFT networks. We =
will build a large fat tree network of RIFT routers. Then we will =
randomly insert failures into the network and make sure that the network =
behaves correctly. We will make sure the RIFT routers don't crash or =
otherwise behave badly. And we will make sure that the routers =
forwarding tables and link-state databases converge correctly.
> =20
> We will use (and possibly enhance) the chaos testing framework as well =
as the visualization and verification tools that are already part of the =
RIFT-Python open source project.
> =20
> Even if you are not much interested in the RIFT routing protocol, but =
you are interested in testing large network topologies using =
container-like technology, or in visualization tools, or in chaos =
testing, this might be the right hackathon for you.
> =20
> A detailed description of the planned activities at the hackathon is =
available at: http://bit.ly/rift-hackathon-ietf-104 =
<https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fbit.ly=
%2Frift-hackathon-ietf-104&data=3D02%7C01%7C%7C8041ec8127374fcea70c08d69c0=
04347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294829286&sdat=
a=3Da3ClcYZX1avQH27yzXl48Wxo47YPAmUoSCZ7M3aG6JQ%3D&reserved=3D0>
> =20
> The project is listed on the IETF 104 hackathon wiki page: =
https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon =
<https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftrac.=
ietf.org%2Ftrac%2Fietf%2Fmeeting%2Fwiki%2F104hackathon&data=3D02%7C01%7C%7=
C8041ec8127374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7=
C0%7C636867922294839291&sdata=3DL3w0gXD524rbYqEXQw2kbgCGNFj9Nv3W55%2BbDHiN=
vYA%3D&reserved=3D0> (info copied below)
> =20
> Feel free to join us.
> =20
> Bruno Rijsman
> =20
> =20
> Routing In Fat Trees (RIFT) Chaos Monkey Testing
> =20
> * Champions
>   * Tony Przygienda <prz at juniper.net =
<https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fjunipe=
r.net&data=3D02%7C01%7C%7C8041ec8127374fcea70c08d69c004347%7C84df9e7fe9f64=
0afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294849296&sdata=3DpLCTPG%2FVfwguCn9=
dqi07KH3fAfu1EZcFTSg7%2B5svXDE%3D&reserved=3D0>> (will join in person)
>   * Bruno Rijsman <brunorijsman at gmail.com =
<https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fgmail.=
com&data=3D02%7C01%7C%7C8041ec8127374fcea70c08d69c004347%7C84df9e7fe9f640a=
fb435aaaaaaaaaaaa%7C1%7C0%7C636867922294869324&sdata=3DNm8L6rVMOWZm3%2Bu7a=
Nim3h%2FqV3UuNQ%2Bj9ixIXpwWkts%3D&reserved=3D0>> (will join remotely)
> * Project(s)
>   * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC =
routing protocol
>   * =E2=80=8BDetailed description of the planned activities at the =
hackathon at=20
>     http://bit.ly/rift-hackathon-ietf-104 =
<https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fbit.ly=
%2Frift-hackathon-ietf-104&data=3D02%7C01%7C%7C8041ec8127374fcea70c08d69c0=
04347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294879323&sdat=
a=3DSyZTYxEQA2B7r%2BxpaDrXIvyqwM58JoLs5FO5YdRRwAA%3D&reserved=3D0>
>   * We have two implementations now:
>     * RIFT-Python open source
>     * Vendor implementation
>     * The open source one has a chaos monkey framework in place we can =
use=20
>       to stress protocol implementations and interoperability between =
them.=20
>       Unusual hackathon but that will be very, very useful for further=20=

>       development and quality of implementations while breaking =
completely=20
>       new grounds (chaos testing on model based protocol =
specifications).
> * Preconditions:
>   * Python knowledge
>   * Familiarity with the open source RIFT code on =
=E2=80=8Bhttps://github.com/brunorijsman/rift-python =
<https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgithu=
b.com%2Fbrunorijsman%2Frift-python&data=3D02%7C01%7C%7C8041ec8127374fcea70=
c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294889=
340&sdata=3DZiZEg53UuJEb2TTkWOcmWFefP4WyGHALpzOzgtwif3E%3D&reserved=3D0>
>   * RIFT Specification in some detail =E2=80=8BRIFT draft
>   * Familiarity with creating virtual machines in AWS
> =20
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org <mailto:hackathon@ietf.org>
> =
https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.ie=
tf.org%2Fmailman%2Flistinfo%2Fhackathon&amp;data=3D02%7C01%7C%7C8041ec8127=
374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867=
922294939371&amp;sdata=3D1bGO7%2FcCFOJp%2F4s3AbEpMtjoRTl7pqYcLtBSMhGMzWY%3=
D&amp;reserved=3D0 =
<https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
etf.org%2Fmailman%2Flistinfo%2Fhackathon&amp;data=3D02%7C01%7C%7C8041ec812=
7374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63686=
7922294939371&amp;sdata=3D1bGO7%2FcCFOJp%2F4s3AbEpMtjoRTl7pqYcLtBSMhGMzWY%=
3D&amp;reserved=3D0>

--Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Charles,&nbsp;<div class=3D""><br class=3D""></div><div class=3D"">No, =
no special requirements. &nbsp;Just good Internet access, since all of =
the heavy lifting will happen in the AWS cloud.</div><div class=3D""><br =
class=3D""></div><div class=3D"">=E2=80=94 Bruno<br class=3D""><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Feb =
26, 2019, at 12:36 PM, Charles Eckel (eckelcu) &lt;<a =
href=3D"mailto:eckelcu@cisco.com" class=3D"">eckelcu@cisco.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D"">Hi Bruno,<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-size: 12pt; =
font-family: &quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D"">This looks like a great project. Thanks =
for bringing it to the hackathon.<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-size: 12pt; =
font-family: &quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D"">Do you have any special network =
requirements? Power and access to the IETF network via WiFi will be =
available at all tables. If you need wired access or anything else, =
please let me know as soon as possible and we will do our best to =
accommodate.<o:p class=3D""></o:p></span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D"">Cheers,<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D"">Charles<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-size: 12pt; =
font-family: &quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"border-style: solid =
none none; border-top-width: 1pt; border-top-color: rgb(181, 196, 223); =
padding: 3pt 0in 0in;" class=3D""><div style=3D"margin: 0in 0in 0.0001pt =
0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><b =
class=3D""><span style=3D"font-size: 12pt;" class=3D"">From:<span =
class=3D"Apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size: 12pt;" class=3D"">hackathon &lt;<a =
href=3D"mailto:hackathon-bounces@ietf.org" =
class=3D"">hackathon-bounces@ietf.org</a>&gt; on behalf of Bruno Rijsman =
&lt;<a href=3D"mailto:brunorijsman@gmail.com" =
class=3D"">brunorijsman@gmail.com</a>&gt;<br class=3D""><b =
class=3D"">Date:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Monday, February 25, =
2019 at 5:15 PM<br class=3D""><b class=3D"">To:<span =
class=3D"Apple-converted-space">&nbsp;</span></b>"<a =
href=3D"mailto:hackathon@ietf.org" class=3D"">hackathon@ietf.org</a>" =
&lt;<a href=3D"mailto:hackathon@ietf.org" =
class=3D"">hackathon@ietf.org</a>&gt;, "<a href=3D"mailto:rift@ietf.org" =
class=3D"">rift@ietf.org</a>" &lt;<a href=3D"mailto:rift@ietf.org" =
class=3D"">rift@ietf.org</a>&gt;<br class=3D""><b class=3D"">Subject:<span=
 class=3D"Apple-converted-space">&nbsp;</span></b>[hackathon] [RIFT] =
Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague<o:p =
class=3D""></o:p></span></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">Hi =
everyone,<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">At the Routing In Fat Trees (RIFT) IETF 104 hackathon in =
Prague we will be working on "chaos monkey" testing of two RIFT =
implementations: the RIFT-Python open source implementation and a vendor =
RIFT implementation.<o:p class=3D""></o:p></div></div><div class=3D""><div=
 style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D"">This hackathon is inspired by the concept of =
chaos engineering and in particular by the chaos monkey tool, which =
intentionally and randomly shuts down servers in a production =
environment. This is intended to build confidence in the system's =
capability to withstand turbulent and unexpected conditions.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">In this hackathon we will do something =
similar for RIFT networks. We will build a large fat tree network of =
RIFT routers. Then we will randomly insert failures into the network and =
make sure that the network behaves correctly. We will make sure the RIFT =
routers don't crash or otherwise behave badly. And we will make sure =
that the routers forwarding tables and link-state databases converge =
correctly.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D"">We will use (and possibly enhance) the chaos =
testing framework as well as the visualization and verification tools =
that are already part of the RIFT-Python open source project.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Even if you are not much interested in =
the RIFT routing protocol, but you are interested in testing large =
network topologies using container-like technology, or in visualization =
tools, or in chaos testing, this might be the right hackathon for =
you.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D""><b class=3D"">A detailed description of the =
planned activities at the hackathon is available at:&nbsp;<a =
href=3D"https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2=
Fbit.ly%2Frift-hackathon-ietf-104&amp;data=3D02%7C01%7C%7C8041ec8127374fce=
a70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294=
829286&amp;sdata=3Da3ClcYZX1avQH27yzXl48Wxo47YPAmUoSCZ7M3aG6JQ%3D&amp;rese=
rved=3D0" originalsrc=3D"http://bit.ly/rift-hackathon-ietf-104" =
shash=3D"z6kJAx3+GZoMrvvcyV0We2+9RUhrR7GET74CWvJuB5vqlKumpY9a5XmsqJevIXkCN=
lg0dQXDMWXCk1FiN7hG95cfvIi7lyzWzFvv2d+15/Ft6Wu4/fsWaxK78lPzEUonEVRXaTmb7Ut=
S3wxkdTSVBhZaRVv67zN3PiU054Dl0rw=3D" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">http://bit.ly/rift-hackathon-ietf-104</a></b><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">The project is listed on the IETF 104 =
hackathon wiki page:&nbsp;<a =
href=3D"https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%=
2Ftrac.ietf.org%2Ftrac%2Fietf%2Fmeeting%2Fwiki%2F104hackathon&amp;data=3D0=
2%7C01%7C%7C8041ec8127374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaa=
aaaaa%7C1%7C0%7C636867922294839291&amp;sdata=3DL3w0gXD524rbYqEXQw2kbgCGNFj=
9Nv3W55%2BbDHiNvYA%3D&amp;reserved=3D0" =
originalsrc=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon" =
shash=3D"dsPDFh6SoGWP5WgAXMqHz5mfgtJOjOH0ajxjFaX+Dr5js45nKi8LDN5e+VZquDuIU=
2Yc7hVB6HYOWDHZp831nhe2WzpWAmSv0R4LLO8fbfTPDzb4ppJBCv8H7e2j4G9pNsg3tWPM6ld=
1s2usZI6lilrNPY9KuQ5vb7GO5+TwwC8=3D" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon</a>&n=
bsp;(info copied below)<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Feel free to join us.<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D"">Bruno Rijsman<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D"">Routing In Fat Trees (RIFT) Chaos Monkey =
Testing<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D"">* Champions<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; * Tony =
Przygienda &lt;prz at<span class=3D"Apple-converted-space">&nbsp;</span><a=
 =
href=3D"https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2=
Fjuniper.net&amp;data=3D02%7C01%7C%7C8041ec8127374fcea70c08d69c004347%7C84=
df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294849296&amp;sdata=3DpL=
CTPG%2FVfwguCn9dqi07KH3fAfu1EZcFTSg7%2B5svXDE%3D&amp;reserved=3D0" =
originalsrc=3D"http://juniper.net" =
shash=3D"dsc1uDf8tiBBduyivyCXiHAZ7+vBsvBIMevpYbmAM1cGMucwABfpSQNa6cJdk9Vv0=
P1yXSaH/ItvKyHh1Y1vRqtFceY1QR7oEnMAjuEsj96uBliBHspw5FmzCXlp0kHQ/gAVAGu2lTk=
6PQSohY6W6a4WgvsBN3Sb0rAkGNBOkmM=3D" style=3D"color: purple; =
text-decoration: underline;" class=3D"">juniper.net</a>&gt; (will join =
in person)<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; * Bruno Rijsman &lt;brunorijsman =
at<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2=
Fgmail.com&amp;data=3D02%7C01%7C%7C8041ec8127374fcea70c08d69c004347%7C84df=
9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294869324&amp;sdata=3DNm8L=
6rVMOWZm3%2Bu7aNim3h%2FqV3UuNQ%2Bj9ixIXpwWkts%3D&amp;reserved=3D0" =
originalsrc=3D"http://gmail.com" =
shash=3D"EHRPb/gpTeYMVGMtjA9/OAUPwDDyV8Ee/BTjNaTf+z81yO3kEKBE44l0Rl6hvj8CQ=
WbqYbbRNg/XSYvT/izDkMeJ91D1xkmv+mXQry79h75TrhkLfkkwHiSwYz1+hadp3ZTezRTx1zx=
ewl3jrqu6M7f74pt1q90GhUfAtDJ1W5w=3D" style=3D"color: purple; =
text-decoration: underline;" class=3D"">gmail.com</a>&gt; (will join =
remotely)<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">* Project(s)<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; * =E2=80=8BRIFT is a STD track WG working on a modern =
IP fabric/DC routing protocol<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; * =E2=80=8BDeta=
iled description of the planned activities at the hackathon at&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://nam05.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2=
Fbit.ly%2Frift-hackathon-ietf-104&amp;data=3D02%7C01%7C%7C8041ec8127374fce=
a70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867922294=
879323&amp;sdata=3DSyZTYxEQA2B7r%2BxpaDrXIvyqwM58JoLs5FO5YdRRwAA%3D&amp;re=
served=3D0" originalsrc=3D"http://bit.ly/rift-hackathon-ietf-104" =
shash=3D"XQKfTqFSXjh0TLbK7F+rr0aHGH2bglcCe/pjt1O4eub7TmSgPl5xix9YtWnd1zNJK=
VKIIpn40NVkR+2rXWlHpLfAF/+n5lgCwkrZ6qD5GooXHLGpX/rHdk6onofm76KI/E85qxzsbPf=
D8Aj8AUNqqGUHiJOm13BJWHOsN9Cb8Nk=3D" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">http://bit.ly/rift-hackathon-ietf-104</a><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; * We have two implementations now:<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; * RIFT-Python open source<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; * Vendor implementation<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; * The open source one has a chaos monkey =
framework in place we can use&nbsp;<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; &nbsp; &nbsp; =
to stress protocol implementations and interoperability between =
them.&nbsp;<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; &nbsp; &nbsp; Unusual hackathon =
but that will be very, very useful for further&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; &nbsp; development and quality of =
implementations while breaking completely&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; &nbsp; new grounds (chaos testing on model =
based protocol specifications).<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D"">* Preconditions:<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; * Python knowledge<o:p class=3D""></o:p></div></div><div=
 class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; * Familiarity =
with the open source RIFT code on =E2=80=8B<a =
href=3D"https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%=
2Fgithub.com%2Fbrunorijsman%2Frift-python&amp;data=3D02%7C01%7C%7C8041ec81=
27374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C6368=
67922294889340&amp;sdata=3DZiZEg53UuJEb2TTkWOcmWFefP4WyGHALpzOzgtwif3E%3D&=
amp;reserved=3D0" =
originalsrc=3D"https://github.com/brunorijsman/rift-python" =
shash=3D"SMf9FZj+qVL4xYa+X28e/MptgfqNdZMDbAZfZT7RYlBDNLDJvM/L5Fykxbcg2YrM2=
ZXo1j3dxcB/ZZsQSti08IkVUughPcsAk4RCZnGUBsk3/ZVFSePvDE7e4obcPpfdNa3yZicmneY=
GcC/nqFwazW5h/1MqSDbh4W5QdXbEjC0=3D" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">https://github.com/brunorijsman/rift-python</a><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt 0.5in; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; * RIFT Specification in some detail =E2=80=8BRIFT =
draft<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; * Familiarity with creating =
virtual machines in AWS<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div></div></div><span style=3D"caret-color:=
 rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; float: none; display: inline !important;" =
class=3D"">_______________________________________________</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><span =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; float: none; =
display: inline !important;" class=3D"">hackathon mailing list</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><a =
href=3D"mailto:hackathon@ietf.org" style=3D"color: purple; =
text-decoration: underline; font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">hackathon@ietf.org</a><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><a =
href=3D"https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%=
2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fhackathon&amp;amp;data=3D02%7C01%7C%=
7C8041ec8127374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%=
7C0%7C636867922294939371&amp;amp;sdata=3D1bGO7%2FcCFOJp%2F4s3AbEpMtjoRTl7p=
qYcLtBSMhGMzWY%3D&amp;amp;reserved=3D0" style=3D"color: purple; =
text-decoration: underline; font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" =
class=3D"">https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%=
2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fhackathon&amp;amp;data=3D02%7C01%=
7C%7C8041ec8127374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7=
C1%7C0%7C636867922294939371&amp;amp;sdata=3D1bGO7%2FcCFOJp%2F4s3AbEpMtjoRT=
l7pqYcLtBSMhGMzWY%3D&amp;amp;reserved=3D0</a></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974--

