
From nobody Tue Mar  1 02:59:05 2022
Return-Path: <francesca.palombini@ericsson.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFF263A0163; Tue,  1 Mar 2022 02:59:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.11
X-Spam-Level: 
X-Spam-Status: No, score=-7.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MkHM3iJUIKbe; Tue,  1 Mar 2022 02:58:59 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on20619.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::619]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1743B3A012A; Tue,  1 Mar 2022 02:58:58 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=O7BmtseTPFXvSoY2uWJ0zlajBDYHeg4oz2Rz1mDWUkFyikQRyPp8F2Yoq4MOi94QpSOzMqYHkesmHlGBgB/RETaxAICAmgV3aX6LKlKwXHoAcLaN1oXj4fL7LiOX19qSU/zznp2vhtLvdjR8RevHEp8oTDV2JaqaaXSmnXAVhKx4DpjRsyfB+r1ioAQdctqGxPsbf/2b+ek/smhOssiiVB1fbBjxZBz1w7HFTFjMsrr0YTcU7bxBC8XunYfcn7HvWx0D31EsCvtHDRRzLsemSIUBfgA++o8K+2/o81PT2bsaafw5bx1yQsx5ob0m9H7H7PBdVkpoCmLERHW+jEnCOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0pGWSU0MRoTZcbn329TwWaren6Juoqgi/ZSQPfswi8A=; b=kJgS+xaCV0wLjA0vmP4GF4bcgQL6sbUc9V38dg1EOVopR3t06ZFnKWOMAhHwauK8g3IZ3iw7MkBsh7qm7myt05LbW8ASnKU/nwUo+KMwc34LGclHkVECV8nLRiQaovEMOQCG/A/XoPKUpKwW57/gEGiYVhesdPi7q8v2GgayDjlWjZREoQZIXtOcpotP0G9wrDx4foFZ8JLRkMXCLKwfSRcEyqRYyt1A+YxXlmfosIj6f9bk6VFS33KxeRtHnW8pPy/+YX3gmdtki/Uam0K+Pw12xaEWU+42RLh17mDeL4fRx/QhIUhoPg/Y6mcUiO13FTPcr9e9Uss9XK1IkjM2Cg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0pGWSU0MRoTZcbn329TwWaren6Juoqgi/ZSQPfswi8A=; b=l+G88piYEy0ylM9jhn2hjAmA8ZBPdX4KrZOm5LPiwk2vHXBfFADO8ZoNl6IQe430PayhOQcl715rinfVZ4b2Ru+8SwbEpDCNSAo53UxIG+qKPuwHlMLdmkdCLXoIbhISbWjfz8B9NGP+eBiYBU7PQWMgDj7pYUcGIs/9qH0BQxM=
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com (2603:10a6:7:96::33) by DB6PR0701MB2599.eurprd07.prod.outlook.com (2603:10a6:4:22::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.9; Tue, 1 Mar 2022 10:58:54 +0000
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::6d0c:b1c0:d332:6f33]) by HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::6d0c:b1c0:d332:6f33%6]) with mapi id 15.20.5038.013; Tue, 1 Mar 2022 10:58:54 +0000
From: Francesca Palombini <francesca.palombini@ericsson.com>
To: "core@ietf.org" <core@ietf.org>
CC: "core-chairs@ietf.org" <core-chairs@ietf.org>
Thread-Topic: Chairs update
Thread-Index: AQHYLVmHDvsuf2D+z0aqQDnWt0vQAA==
Date: Tue, 1 Mar 2022 10:58:54 +0000
Message-ID: <HE1PR07MB4217E4A3A08B29BA3A4D56B698029@HE1PR07MB4217.eurprd07.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 204fe608-5da9-4e25-0678-08d9fb727a5b
x-ms-traffictypediagnostic: DB6PR0701MB2599:EE_
x-microsoft-antispam-prvs: <DB6PR0701MB2599801C2F34ECAF512853C098029@DB6PR0701MB2599.eurprd07.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:HE1PR07MB4217.eurprd07.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(5660300002)(52536014)(82960400001)(44832011)(4326008)(7116003)(4744005)(64756008)(66446008)(66476007)(66556008)(66946007)(8676002)(55016003)(76116006)(450100002)(91956017)(33656002)(9686003)(7696005)(6506007)(86362001)(3480700007)(8936002)(38070700005)(186003)(6916009)(316002)(2906002)(508600001)(71200400001)(38100700002)(122000001); DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?dqzzLQP24pOdtxPRYNIgnbt5pocyfQoBK393YL/03WdRvNBNWA8XHUHI?= =?Windows-1252?Q?kP/9ZnOQpF+MbcCyToo7G60KidSsCO3aD589UqrpxMHSv69TdpfZ+JhC?= =?Windows-1252?Q?mqaUM8JMXZVWXFTaTqu8uO/LZHW+d0VcCCKhjo3PNEXMEM0hb9uFdzGn?= =?Windows-1252?Q?/ri0ZO4zCmeZjWxh92POolU0FyQNzYBQ0fNphAtT9li+xiXoQ25WM482?= =?Windows-1252?Q?lZxE4s8nvq8rxPWqOPxKrkwZ2jjmlewNEC9nd/9+6jLzt79spphlh+D6?= =?Windows-1252?Q?dE+5Lg7S4vMFOZ/jrr4UVQDtXSrW4SjevEmt7GCrJYxXSoiVa+J+2dsk?= =?Windows-1252?Q?+l+vu7L/kiYC6moIHIHDEeld7XMf5taNQ3L6izX5VceeiLG1g1KpA8Yf?= =?Windows-1252?Q?KcSQftfJ1CdJWTt9gvkiQ4QkmOCnzt3NwbzKKas+HKzRdI5hAia0Jae2?= =?Windows-1252?Q?6GVXItq12Qcj7dtGHa3NhDzyTXML9EvU1tNK5ieTdypirPJl1TCtkOjt?= =?Windows-1252?Q?Cbajf/AIkNAtZy9HfDT7KMaT/tjZfEygzmFE9QYuVrv3/WKzI/Kry52k?= =?Windows-1252?Q?QnjMUExse69A3JpQs1bvTWaAwgO2MgqKB17e/2RYPlcCykzlKs/L/JU8?= =?Windows-1252?Q?Hl3PSyjod7BVToAa18r46NOln1IrbnpFj4xp3FpjvxzNyYsyM33fd+sH?= =?Windows-1252?Q?liqZfPEAPS46fzb/vAbiS8y18XYNdygYDnwi4u0j41FQt4XRtBZN/XM7?= =?Windows-1252?Q?RRCU2R1MkpJnJrtVNDa2+YHG6qMwbQ09j5TLjyAfkLrOz5zOD/gj8cUv?= =?Windows-1252?Q?W/4haXrsv9WuN1rXhUi13Oj971OYkLz0LN9qP+moPbpjMSS/6A4YXj3V?= =?Windows-1252?Q?Bgyx0IFk2OvYzGGBMDvoRiJi974yBQxSUnDsd4IU8IbQpilHu3XciA0U?= =?Windows-1252?Q?2jpVLXlL7ksl4Y1IVBxh3huEnTTaj7pYUwLaiFX+6PwB/CylAiLMvszz?= =?Windows-1252?Q?8N20cyJDICXtVo5XCmGw3ZJGNBqld2S820RY6MDVfuHuZrKKW8FaRS2V?= =?Windows-1252?Q?dJAsvrbn0WMpI8GDkKHOWBfK+47eDQNop3nyOPh/tcOO4gK8TR9pbwcl?= =?Windows-1252?Q?O7cRis6W3TqVV25P9jkKvdZ9gXjwXU4+XMd1LTrV+xqP9WPdZEz+vaXB?= =?Windows-1252?Q?mnxpTTdmpcyoKHNTdTME5wozh39EkhrkDwlfRlzqAMqlMv4BkoGu+W4h?= =?Windows-1252?Q?mDpmTIMo/L2Wm8jGSud1NFlmLpFQvJ3S8BqV9JkGCmkGcZ+8v2Rm1BiI?= =?Windows-1252?Q?wd+GAo8sJRK3XuHOsOjOmujWAd8l7OdRvSnhYiUeRZKBABL6CS4nZu9/?= =?Windows-1252?Q?hyzEEuS9SnhIxSHFO2kaURMoey6Q7REhetjU15wzE249FZFu5fDEHcXA?= =?Windows-1252?Q?MpV3no1F9jHUqk4XW5fAm0pwPFXkGc+7z43RXY0rFK07NNYZgo3ZejjZ?= =?Windows-1252?Q?XTCX91wFTqrWxnf11wwywU/j3MzgY+voNUm1lFYRRxLZVQeH97dqoOJB?= =?Windows-1252?Q?v3BoSwigAjvKOLQxHBz1HIM+mwZZkyOUtzBFPAu5JLJSvODeSaQzxcJK?= =?Windows-1252?Q?7ZXZVpUJrgBcmP/zFOQcsZMw3FknJJkPDO3dV8XsADo0ZFampV3NqIdi?= =?Windows-1252?Q?/1wT0BAk2YHDWSOUNGWemyYNMqlbQcSNh1cZ4qEEUnfJlOuJLHsQGfhS?= =?Windows-1252?Q?G4U4z8gX35/hnt2mlo28TF3g4Spjr/X93dH1fWK36jTwRfB5fzYwbWFy?= =?Windows-1252?Q?Rih9KAU1gVJ6T/HBx5OQl3g2gdBYpG3X1WSBAhCRRATkO6fvPBo3hsHS?= =?Windows-1252?Q?qAU/XHzZuSxvaEWsItfOm0cEFaAkoi+DJQixlxDWFkJ+xjaa/06WwiWS?= =?Windows-1252?Q?aQ2mOivM?=
x-ms-exchange-antispam-messagedata-1: M5AMJFUWMDL+RPXG4HF0DwfiaGN1wg9jAd0=
Content-Type: multipart/alternative; boundary="_000_HE1PR07MB4217E4A3A08B29BA3A4D56B698029HE1PR07MB4217eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR07MB4217.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 204fe608-5da9-4e25-0678-08d9fb727a5b
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 10:58:54.5858 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vDoyc8Moy+MdxPzM4cnvYFYU/JAcy1i9Jtkjg5OA6Kf/jSaw8htvaFaUXtoQtM0VvcynpeggodRwmzDJKf9nVET8N8aBe+BqC3ipfttr1AhTyChY+v8t619RFI/pgjUp
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0701MB2599
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/g2CFU1GfnZOea8cZFd4OFnDHsfE>
Subject: [core] Chairs update
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Mar 2022 10:59:04 -0000

--_000_HE1PR07MB4217E4A3A08B29BA3A4D56B698029HE1PR07MB4217eurp_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi all,

Marco and Jaime have let me know that Jaime won=92t be able to chair CoRE f=
or some time. Carsten has accepted to help us and step back into the chair =
role for an indefinite amount of time - starting now, including and followi=
ng IETF 113, as needed - which is much appreciated. I will be adding Carste=
n as chair to the datatracker, so you should see some mail about that soon.

Thanks again Carsten for being willing to get back in your old shoes for th=
e time needed, and thanks Marco for holding the fort.
Francesca

--_000_HE1PR07MB4217E4A3A08B29BA3A4D56B698029HE1PR07MB4217eurp_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>
</head>
<body lang=3D"EN-GB" link=3D"#0563C1" vlink=3D"#954F72" style=3D"word-wrap:=
break-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Hi all,<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Marco and Jaime hav=
e let me know that Jaime won=92t be able to chair CoRE for some time. Carst=
en has accepted to help us and step back into the chair role for an indefin=
ite amount of time - starting now, including
 and following IETF 113, as needed - which is much appreciated. I will be a=
dding Carsten as chair to the datatracker, so you should see some mail abou=
t that soon.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Thanks again Carste=
n for being willing to get back in your old shoes for the time needed, and =
thanks Marco for holding the fort.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Francesca<o:p></o:p=
></span></p>
</div>
</body>
</html>

--_000_HE1PR07MB4217E4A3A08B29BA3A4D56B698029HE1PR07MB4217eurp_--


From nobody Wed Mar  2 06:37:44 2022
Return-Path: <christian@amsuess.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D9093A08A6 for <core@ietfa.amsl.com>; Wed,  2 Mar 2022 06:37:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVEJRV_Bocxm for <core@ietfa.amsl.com>; Wed,  2 Mar 2022 06:37:38 -0800 (PST)
Received: from smtp.akis.at (smtp.akis.at [IPv6:2a02:b18:500:a515::f455]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9834D3A08BF for <core@ietf.org>; Wed,  2 Mar 2022 06:37:37 -0800 (PST)
Received: from poseidon-mailhub.amsuess.com ([IPv6:2a02:b18:c13b:8010:a800:ff:fede:b1bd]) by smtp.akis.at (8.17.1/8.17.1) with ESMTPS id 222EbY1q054749 (version=TLSv1.2 cipher=ECDHE-ECDSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <core@ietf.org>; Wed, 2 Mar 2022 15:37:34 +0100 (CET) (envelope-from christian@amsuess.com)
X-Authentication-Warning: smtp.akis.at: Host [IPv6:2a02:b18:c13b:8010:a800:ff:fede:b1bd] claimed to be poseidon-mailhub.amsuess.com
Received: from poseidon-mailbox.amsuess.com (hermes.amsuess.com [10.13.13.254]) by poseidon-mailhub.amsuess.com (Postfix) with ESMTP id 2A451D0 for <core@ietf.org>; Wed,  2 Mar 2022 15:37:31 +0100 (CET)
Received: from hephaistos.amsuess.com (unknown [IPv6:2a02:b18:c13b:8010:b5b3:8f4d:f51c:7cb7]) by poseidon-mailbox.amsuess.com (Postfix) with ESMTPSA id 45D11FD for <core@ietf.org>; Wed,  2 Mar 2022 15:37:30 +0100 (CET)
Received: (nullmailer pid 3272975 invoked by uid 1000); Wed, 02 Mar 2022 14:37:29 -0000
Date: Wed, 2 Mar 2022 15:37:29 +0100
From: Christian =?iso-8859-1?Q?Ams=FCss?= <christian@amsuess.com>
To: core@ietf.org
Message-ID: <Yh+BKQ1e+TXFwc8T@hephaistos.amsuess.com>
References: <164623127479.18079.9103824327889774323@ietfa.amsl.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="5pGLwc08wH747184"
Content-Disposition: inline
In-Reply-To: <164623127479.18079.9103824327889774323@ietfa.amsl.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/JGboNw0EnDRHJpvdOx1c-nay8XI>
Subject: Re: [core] New Version Notification for draft-amsuess-core-coap-kitchensink-00.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2022 14:37:44 -0000

--5pGLwc08wH747184
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hello CoRE,

I've assembled a short (and clearly not comprehensive) overview of tools
built on top of CoAP, with the intention of making (re)usable components
known more widely, to get a better grip on where doing something over
CoAP makes sense and where not, and to identify gaps, closing some
(like, I've been using "poor man's NTP" for almost a decade now and
never wrote anything).

Therer is no clear direction for this document, and working on it may
easily not be in scope for this WG (well, the I-D format may not even
be ideal here), but nonetheless I hope it is of interest to some of you.

BR
c

On Wed, Mar 02, 2022 at 06:27:54AM -0800, internet-drafts@ietf.org wrote:
> A new version of I-D, draft-amsuess-core-coap-kitchensink-00.txt
> has been successfully submitted by Christian Ams=FCss and posted to the
> IETF repository.
>=20
> Name:		draft-amsuess-core-coap-kitchensink
> Revision:	00
> Title:		Everything over CoAP
> Document date:	2022-03-02
> Group:		Individual Submission
> Pages:		10
> URL:            https://www.ietf.org/archive/id/draft-amsuess-core-coap-k=
itchensink-00.txt
> Status:         https://datatracker.ietf.org/doc/draft-amsuess-core-coap-=
kitchensink/
> Html:           https://www.ietf.org/archive/id/draft-amsuess-core-coap-k=
itchensink-00.html
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-amsuess-core-=
coap-kitchensink
>=20
>=20
> Abstract:
>    The Constrained Application Protocol (CoAP) has become the base of
>    applications both inside of the constrained devices space it
>    originally aimed for and outside.  This document gives an overview of
>    applications that are, can, may, and would better not be implemented
>    on top of CoAP.

--=20
To use raw power is to make yourself infinitely vulnerable to greater power=
s.
  -- Bene Gesserit axiom

--5pGLwc08wH747184
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=+ZJ9
-----END PGP SIGNATURE-----

--5pGLwc08wH747184--


From nobody Wed Mar  2 11:16:36 2022
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D4813A0958 for <core@ietfa.amsl.com>; Wed,  2 Mar 2022 11:16:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level: 
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sandelman.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w9YbBkDvxkNG for <core@ietfa.amsl.com>; Wed,  2 Mar 2022 11:16:29 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7FF73A0C26 for <core@ietf.org>; Wed,  2 Mar 2022 11:16:29 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 9398338BC0; Wed,  2 Mar 2022 14:25:26 -0500 (EST)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id Y0igtw-sTs1m; Wed,  2 Mar 2022 14:25:23 -0500 (EST)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 7AA0238BB4; Wed,  2 Mar 2022 14:25:23 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sandelman.ca; s=mail; t=1646249123; bh=p1PgMOumzoiT4qyEc3R6frF5CgTl0v+7UwKiKyMsAZg=; h=From:To:cc:Subject:In-Reply-To:References:Date:From; b=2+cDUihpUEHOGDqbxdwGAc9d4EPO7WfM/xJ8oWDEi5l1SeB81qYMZnpMpXBYt+8R1 bfZN4jphO2sYsRCXwpwyMUNxaw0/jy76+QgAFCBo9xIzlIi4dVvfAUxmLRMWZ979rm K7mxaiC62PQUFpwh7rXidzmbEQIynylD47gQq2Ku9DjYZIabYPaLjFDTqUl2Lhlzld S4XKxzFnSdvxfVCrj3l//DmhDRDfnQ2ddreMqkwfNLm376PgL2GDeSTAH0Pg66Dh+w B7U2MREFl6wncqf/wLoBW0Oqol7Q5gR4iJtdcjpUh3hWNkn5BC8vYpowfa3AWnvH/a JJuLc1xUrf92g==
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 778CD2B3; Wed,  2 Mar 2022 14:16:22 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Christian =?us-ascii?Q?=3D=3Fiso-8859-1=3FQ=3FAms=3DFCss=3F=3D?= <christian@amsuess.com>
cc: core@ietf.org
In-Reply-To: <Yh+BKQ1e+TXFwc8T@hephaistos.amsuess.com>
References: <164623127479.18079.9103824327889774323@ietfa.amsl.com> <Yh+BKQ1e+TXFwc8T@hephaistos.amsuess.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Wed, 02 Mar 2022 14:16:22 -0500
Message-ID: <9489.1646248582@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/lu397pGererjloIiUB_dsULzxtk>
Subject: Re: [core] New Version Notification for draft-amsuess-core-coap-kitchensink-00.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2022 19:16:35 -0000

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Christian Ams=C3=BCss <christian@amsuess.com> wrote:
    > I've assembled a short (and clearly not comprehensive) overview of to=
ols
    > built on top of CoAP, with the intention of making (re)usable compone=
nts
    > known more widely, to get a better grip on where doing something over
    > CoAP makes sense and where not, and to identify gaps, closing some
    > (like, I've been using "poor man's NTP" for almost a decade now and
    > never wrote anything).

I think that I understand your goals.
I like how you indicate what it competes with, and what remains to be done.


=2D-
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=C3=B8T consulti=
ng )
           Sandelman Software Works Inc, Ottawa and Worldwide





--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iPMEAQEKAB0WIQSk7ZHEG9TCGBNASfm/sjw/rPYc8wUCYh/ChgAKCRC/sjw/rPYc
8whIBfsECoTL1eEn0PyWWh4aHNJgbnQcN1xUTalo63IMrBeiaRdyefl62fMMDsFI
suQVwCYvhYjxQSnin9O+7TUj9a0hSlCwLSR0pSLfODh5C/W4wgCvKGwRUyp7BYfs
QTsooL8yaUe2K4ES96s/A7eG/fV3iP7+svuGkZ2WmvZw9tnJY4oAf0NDb4sbVKCy
ebbYBYp0ymSFLKilzTSX3blJqVWuoeR9uGVg7qZYgyN9of3PYWjngSUGp1k4WJZ+
2RMlT1I=
=L/kY
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Thu Mar  3 04:18:41 2022
Return-Path: <rikard.hoglund@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2B053A079A for <core@ietfa.amsl.com>; Thu,  3 Mar 2022 04:18:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level: 
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 714JuM2cmJTc for <core@ietfa.amsl.com>; Thu,  3 Mar 2022 04:18:33 -0800 (PST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on20614.outbound.protection.outlook.com [IPv6:2a01:111:f400:7d00::614]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 197CA3A0780 for <core@ietf.org>; Thu,  3 Mar 2022 04:18:32 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WTCX92egfO2tf8hyOnCSXayW625u3558ZXXLcqbIlyUZjlT1FSRwkHSC3vfI/KgX5GvgGU0ANFJFIt61DKP3JdoDrwfKBQ/5vNoixdmwdb06ab6jUqQV27PqmB1jZsxL+2ZWi3t3+fGi5eWIt6ZelI72LYnBA2U6OHdAGIMES+1bIlJOctVL1eX9c3NuvI6lVvZ53wiAMjzrUBDhfZwDZP9D6SgKvVUDUgL28H+O95nwxBJaWAmZ7DXc4okwYGBAp+gEzgICn1nsb74SpC3iJmpKFRuv2/DDsmhVOwhWcIxf1j6CDPw1ANRq6XxUxcGFs9vrS0wWzFJUzyKjOPWJ+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=U8zOxQerZYJGVivnDYqXdZQ/Wa/lEQJnB2r5r0U7tlM=; b=NBQtEohbSU47FqtNY9QJoDvXQ6e+6HHiGedNHtwku8PeG6t/hDZYVdt0PsAIJ9fz5jYKNSzttYRPjK4qG5AvLbsFVvXhlLleo0wpQFF0nAnHsrY6xWia1k+vcXvHNQLBVAqwnp8WRZAZ2C3ew9T8v7JNTInDX0Q60kHyWbq9VKvVi/RNp77lUOQ078j3e86gaSW5BxV7/uHRuCaNA3o1xJQyAUcW2sODWoAGzzynpZ8SaZ7JHtWUnND+sZKXITH3fCH2WPN8Q07MhPWC9D4z6wZcm0nXCG/ZU1mVc1prYnym6ZlEtcjIq9/siLP+rI+INSN3Mp4T2UNiNjm0cbCCFA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=U8zOxQerZYJGVivnDYqXdZQ/Wa/lEQJnB2r5r0U7tlM=; b=CBAYZAFnpOxHF5HEbu7txC0Ekedp83gZg1WvGOBcTyeZLaEblQRl5Pm578IpCpAXz7KaiurBMsLYlPNg4on7QHx4gA2ay0mGStk7qzCFPW88hPn6T5AKbKD+iCspJ01yP/zY1S2XqavNhu4vhrIwewgml7/8M8SwvkX56c774MQ=
Received: from PAXP189MB1582.EURP189.PROD.OUTLOOK.COM (2603:10a6:102:139::13) by DB6P18901MB0007.EURP189.PROD.OUTLOOK.COM (2603:10a6:4:26::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 3 Mar 2022 12:18:26 +0000
Received: from PAXP189MB1582.EURP189.PROD.OUTLOOK.COM ([fe80::e961:6da9:682d:b8bc]) by PAXP189MB1582.EURP189.PROD.OUTLOOK.COM ([fe80::e961:6da9:682d:b8bc%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022 12:18:26 +0000
From: =?utf-8?B?UmlrYXJkIEjDtmdsdW5k?= <rikard.hoglund@ri.se>
To: =?utf-8?B?UmlrYXJkIEjDtmdsdW5k?= <rikard.hoglund=40ri.se@dmarc.ietf.org>,  =?utf-8?B?SmFpbWUgSmltw6luZXo=?= <jaime@iki.fi>, "core@ietf.org" <core@ietf.org>
Thread-Topic: =?utf-8?B?W2NvcmVdICDwn5SUIFdHIExhc3QgQ2FsbCBvZiBkcmFmdC1pZXRmLWNvcmUt?= =?utf-8?Q?oscore-groupcomm?=
Thread-Index: AQHX5sy5SM8wLy1RbkWdTBWR2KKP+qxepGJpgE99ums=
Date: Thu, 3 Mar 2022 12:18:26 +0000
Message-ID: <PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.PROD.OUTLOOK.COM>
References: <e1c0ac8b-cfa8-4a26-9d19-eee6d9f697b0@www.fastmail.com> <fd96f760-dd06-4a1e-b128-0ddebf280d6b@www.fastmail.com> <AM9P189MB1571DDC7EBCD95D358077C2783519@AM9P189MB1571.EURP189.PROD.OUTLOOK.COM>
In-Reply-To: <AM9P189MB1571DDC7EBCD95D358077C2783519@AM9P189MB1571.EURP189.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
suggested_attachment_session_id: 29a9118a-f910-bbfe-4a37-ffe6109e39d8
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 39231139-01b0-4c0c-b033-08d9fd0feb88
x-ms-traffictypediagnostic: DB6P18901MB0007:EE_
x-microsoft-antispam-prvs: <DB6P18901MB0007ABCF7E54D0BE9A462F9983049@DB6P18901MB0007.EURP189.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: TwGaSwxodhE13K8mEYY0pO77yG9gVf8N/dH92yDvABOsBAPjpvgRhKCzoarp4RLXTY9FUJ/ISpu48oCkv3+9QLMxId2p5Zx7iIhSWYShR2zSDcuOcuZLZC1pdN4WQwXB8NKW3Crmb2c0kD5aRae5lrwknYtuMlvv0oDSIQzBm43UZE1RPm4Mjj4wMWcizT5cHHkQJB7DIn3bMtQZEgl7WmxyXJeRuTEnLvUo+P5uCX81MhYnv6GceSkcev4AtVaI6VXz5+jCrstiOt7Y+paKRbK6BZHsWxnmo2hH0mJ6/li/qv0YTp/ygypTkrPH2Cj8jGiUK/jh29z43/XnCc6rQ6Dytdrh9gZXu+XC26sDYax7jG1LDYsNs+BOhAz0PiaDsS1nYXbAYpJ1/EJYNPoqTJeFOZXsj//R0XG6y1IPx//g8YlqDhjW2w+fhyDVZaPdbtkouWEAs4e7R9L4IGs1CxDbMi6cbYf10wxGUiVipA+jzYAxPbl59s0gKJRmw1RpYb3Q8toSlhkUlu7WyLNHcju9llMc3j5k8vU9jbY9FQFXXjkpkQdZosQKGjpivs4YJo4qX7gjnrnYF19s17tls+ZR6OLgz+uqo1lVRwdT9lGlBYkrn7SObGc0bcyOTFr0yYyKTSmUsa1YpFdx+XYGMgTXDxZfBua4qoLQ8FsdzGgMo1smYt6PcLpaLhwiNdv5eC4xBsuDKfWH7NkHGfvG8EwtV+3xxi3cB+TVG0Pnk4qGXcaDk+ge0mrRFEpu5QBKcqSbxoDN1NoWeyMfOG4QJZCK0FHT/0W/iljnzLux8RMBV1s3CaCmS+57TERggYM3
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:PAXP189MB1582.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(83380400001)(8936002)(85182001)(508600001)(19627405001)(85202003)(110136005)(316002)(966005)(76116006)(26005)(64756008)(186003)(66946007)(66556008)(66476007)(53546011)(66446008)(6506007)(7696005)(71200400001)(9686003)(5660300002)(91956017)(86362001)(66574015)(52536014)(55016003)(45080400002)(38070700005)(33656002)(166002)(122000001)(38100700002)(2906002)(10090945010); DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?aG11SUlucFBMMk5CZU1RMXBkekZmNkJaclVvMVR3NnZSZjM1OXh4UjV4czA1?= =?utf-8?B?LzEvWFRjRjA0L2RYVTllbGM4Nm9FRWRJS2F5TVJCdERkYTVkRDJKa1UyRXBv?= =?utf-8?B?V2xVY1R4aEZYU3VaaStOUklSclhxaWVLM2s2L1NINXdJZGVnT1BHc2xHaEND?= =?utf-8?B?RlNEc1ZWc0U5ZGdtY0NaMnRXaGZQemJmR2xlSnFHenVTNGJ2a2pITEwxYVpH?= =?utf-8?B?aGl1azU5ZnJWT3UxVHNxRERQUDRURVFFVHkvbXR2V3B0Mkl1bFREeGZIeEVG?= =?utf-8?B?YlNPZmc2NnkydERZTGFFTXJFOTdKT1NlcmVtemQxc1ltTG9JRHZsME1hRXlU?= =?utf-8?B?RDlhZ3NveDlQVU9WeWZsMHlkbW9HSC9wUUZVS0J5RisydEZWc1FSK2RSWUV6?= =?utf-8?B?ZlVxcVg4QTZvRW16MlpIWUNiTHR5SVdzR2RScitoSmxVanROV042UkxVb2lq?= =?utf-8?B?M2REMG0zdkdPSFEwS2pUdTQ1NlNYeVB4MHpRQXFhbStpb0J1bUN0VWtoalZr?= =?utf-8?B?eUs1TFUrTStRaU9kc3V5aXUzU0JndmxwWDNzOVlKVXlHSEhFTnhTTS9LbDVy?= =?utf-8?B?eFYzV3dYeXF4d2Y3blFmaVNiQzNaODRCZExzekpmbnlybURLb2dzSlZsRHpJ?= =?utf-8?B?ZXVXenROMENGNHFVRmVLUi9aYXFHeU1LNjIrTk10YUh3MCtHK3ovRU45Qks4?= =?utf-8?B?Tmo0VGN4Y0JGU21QQzg4YTJobGhmTUdXQmE3TmlDai9Lb3NWRGZJZ2lla0lR?= =?utf-8?B?WGxZSTRybVY4aFdlelVBcldjQ01zbmF0MXp1RGRrM1NuTFJGZnQ1RVZadkRD?= =?utf-8?B?OW01bXdVNmFnU3pTVEtkdStGSTBvb1hMbEhqYkpMNEZRZG0rU3Q2ekpMeGhM?= =?utf-8?B?a3Vac3gzVDlGeTFGUWNNYTNhcThrbXBydlZHdERxN0x2Mi9jVXpYVERYOHNo?= =?utf-8?B?NlZ6L0NFWXBHbVdLU1M3NjZmeXk4U0F2SG90WHBoNVZXQ3cwcHRVSjZyOThI?= =?utf-8?B?bnNsVUpwN3VuQ28vL3hSVklNYjAwclJoRmlkTVA0MkFQc1ZYY1AzN0RoQ3l4?= =?utf-8?B?U2VFeWdheXdKdUwvZlpRa29IS0JKaURpeWZjQ2lEU1BvVVRPZGIzZkxxeVFv?= =?utf-8?B?VnZTTStsWTFyWFhPN3hhR3JKcWcyM1NudG02bWxjTDVvU2h1MFhBYVVHTC82?= =?utf-8?B?ejBBSTBERDByczNtNjZiNzdjMHNpaUVWR2dQUFF6b3QvSDRPeXNVZmFUbWhP?= =?utf-8?B?R0NPeHhwTHl2SG1PeGoxNEFkMCtBN3VpLzhRbE1WVmZtdlBmU01TVnR1RFZL?= =?utf-8?B?SGRHT3BhcG9mdVFFSU5jV1o1MVBJVXJTVDJWa1l0dWw3UG9IQXhwR204NVpR?= =?utf-8?B?am1odWEyOW5DbktiK2owYTB4TnA5aEE4RnRJbWd5UkhCc08wSVdEVzg1NExH?= =?utf-8?B?cUUxOWNMTWEwVVVWZ3o5Mkp5dkpyY2JGTG1yekVRM3d3SFAvMUl1d1dFKzEz?= =?utf-8?B?NWwydUxlSmhWM0dWQmxCYWZKd1JZZzlKZUZNRitJTkNST2kwcnhyUlVOZTdm?= =?utf-8?B?Y1YvYklncTc1RmFhY1pMeFgyL2RmcS9zVDBFdVpsbHZ2KzdVTzlBdlZBc2hn?= =?utf-8?B?MFBHQUhmTm1XbHd5eHhsTjl4UmRUSGEyalo1K2JFMHFOVGwwRThHSC9iTFlR?= =?utf-8?B?S29ZcG1ScXdEaEIxdU5nRkVoSHlrbHhCWWh1VklZbXIvRU1VM3UxNzBSd3hz?= =?utf-8?B?MUZtOXlYTUZoZFFUTC9UR0IyR3FtemlsM3ZnUHBFR2lKYVljZDU0ZlFHSlZH?= =?utf-8?B?Vk9nNE1CTGdDMU5qczJBNTBONE9Rd0FhMWxSY0FSS3A0TDdRRVc2elFJRmxj?= =?utf-8?B?NVFyb0NydUVZbk1yV0t1NzRWdU9Vbm5zRWRURDlaYW1rNG1CUHIxYkVhVE1C?= =?utf-8?B?YmRLVFpCa2VLQW93bDVSS3d4Z3B6Q0gzL1NmYXNGR2ErUnU1TXlkNTlWcVRv?= =?utf-8?B?K0xRd1prendJN1M5aVdGUkJiNEZUd3lkS1BPSnRsUElqaWk5VnVPRFY1RWpP?= =?utf-8?B?dXgxb0Y4bXd4RGVYT2R0M04xWFNWVDlhMm9GRklKQXNiZ2dZbXRoUjJSOUlV?= =?utf-8?B?QU5LSUlML1JCV292ZTcyZU5CWW9aNU5nSGNzbTkxeFZnWVpyTStBek5LUGlK?= =?utf-8?B?dmc9PQ==?=
Content-Type: multipart/alternative; boundary="_000_PAXP189MB15821EE1D41BC355AEAB97D483049PAXP189MB1582EURP_"
MIME-Version: 1.0
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PAXP189MB1582.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 39231139-01b0-4c0c-b033-08d9fd0feb88
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 12:18:26.6014 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XboaB6Y64mkepFxFMHQ+Bju+r2sXZGeRbhi+czyv3VDZnyS81BuOvhc0Naq3A8Tu3vtWSKc3VEMtLhq7Q0j8uA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P18901MB0007
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/95pNiHE8RxBsVNFvzPZofAmjSmQ>
Subject: Re: [core]  =?utf-8?q?=F0=9F=94=94_WG_Last_Call_of_draft-ietf-core-os?= =?utf-8?q?core-groupcomm?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2022 12:18:39 -0000

--_000_PAXP189MB15821EE1D41BC355AEAB97D483049PAXP189MB1582EURP_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_PAXP189MB15821EE1D41BC355AEAB97D483049PAXP189MB1582EURP_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_PAXP189MB15821EE1D41BC355AEAB97D483049PAXP189MB1582EURP_--


From nobody Thu Mar  3 06:14:18 2022
Return-Path: <christian@amsuess.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B47D3A0ABD for <core@ietfa.amsl.com>; Thu,  3 Mar 2022 06:14:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F1W66IwPgQ0r for <core@ietfa.amsl.com>; Thu,  3 Mar 2022 06:14:13 -0800 (PST)
Received: from smtp.akis.at (smtp.akis.at [IPv6:2a02:b18:500:a515::f455]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E4B93A089C for <core@ietf.org>; Thu,  3 Mar 2022 06:14:12 -0800 (PST)
Received: from poseidon-mailhub.amsuess.com ([IPv6:2a02:b18:c13b:8010:a800:ff:fede:b1bd]) by smtp.akis.at (8.17.1/8.17.1) with ESMTPS id 223EE8fw094726 (version=TLSv1.2 cipher=ECDHE-ECDSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <core@ietf.org>; Thu, 3 Mar 2022 15:14:09 +0100 (CET) (envelope-from christian@amsuess.com)
X-Authentication-Warning: smtp.akis.at: Host [IPv6:2a02:b18:c13b:8010:a800:ff:fede:b1bd] claimed to be poseidon-mailhub.amsuess.com
Received: from poseidon-mailbox.amsuess.com (hermes.amsuess.com [10.13.13.254]) by poseidon-mailhub.amsuess.com (Postfix) with ESMTP id 7013DD0 for <core@ietf.org>; Thu,  3 Mar 2022 15:14:08 +0100 (CET)
Received: from hephaistos.amsuess.com (unknown [IPv6:2a02:b18:c13b:8010:12f9:8938:52d6:2553]) by poseidon-mailbox.amsuess.com (Postfix) with ESMTPSA id 2029FFD for <core@ietf.org>; Thu,  3 Mar 2022 15:14:08 +0100 (CET)
Received: (nullmailer pid 3559816 invoked by uid 1000); Thu, 03 Mar 2022 14:14:07 -0000
Date: Thu, 3 Mar 2022 15:14:07 +0100
From: Christian =?iso-8859-1?Q?Ams=FCss?= <christian@amsuess.com>
To: core@ietf.org
Message-ID: <YiDNL2UKSSmbFaOD@hephaistos.amsuess.com>
References: <164631589165.28413.4855247803286253814@ietfa.amsl.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="Iub5+l8stR/GuBM2"
Content-Disposition: inline
In-Reply-To: <164631589165.28413.4855247803286253814@ietfa.amsl.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/D4NZW9Hqy3euR3Nj6thbu9HOxBU>
Subject: [core] New Version Notification for draft-amsuess-core-transport-indication-03.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2022 14:14:17 -0000

--Iub5+l8stR/GuBM2
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hello CoRE,

as indicated in the 2022-02-24 interim, I've updated the document to
incorporate most of the recent input.

Changes I'd like to highlight are

* "the transport address indicated by" a URI is now a defined term that
  is used consistently (thus distinguishing the resource `/` on that
  server from the "socket" that the server has open), and

* considerations for the security of has-unique-proxy were added, but
  are not yet conclusive. Playing things through it's interesting that
  it wouldn't help much if the origin server said that the
  has-unique-proxy statement is good, but it's the server that gets
  redireced to whose ignorance becomes problematic.

  I'll keep pondering but don't expect to have a full solution before
  the cut-off -- the text there should anyway serve as a base for
  discussion.

  (Security text for the non-unique case have been improved, but this
  mess above doesn't spill over there).

Looking forward to discussing this in Vienna
Christian

--=20
To use raw power is to make yourself infinitely vulnerable to greater power=
s.
  -- Bene Gesserit axiom

--Iub5+l8stR/GuBM2
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=XKUi
-----END PGP SIGNATURE-----

--Iub5+l8stR/GuBM2--


From nobody Sat Mar  5 02:59:38 2022
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BEEB3A167B for <core@ietfa.amsl.com>; Sat,  5 Mar 2022 02:59:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level: 
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SYRwDirQfhuT for <core@ietfa.amsl.com>; Sat,  5 Mar 2022 02:59:29 -0800 (PST)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0621.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe1e::621]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32AB43A167A for <core@ietf.org>; Sat,  5 Mar 2022 02:59:28 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BxeNAg08zVPlTFCV6B+szn/UoRmFJpa6GFuh+kQscM9WmFepmNcN5MfpwIpy5jBR+dPOPEeNGKcJDT0wORUfBESzS9CgYOTsLWrh+wSGh8swG3XWfEmUjajne8mXr5soAFEZq61MkG2vHZ3kuwzdNuXhga0i0D6oGKKUpo2BasXgR8qHJ+Dgf1wTkdIBKaa/5Z759V1sxn4Cm/6o0gMkYUfSIdCkMDnr7vpq4wo+gO1nSq2cDkkVcFKfiRz1nKkB+b0soXffG+Z23i+P24iji2wasDKYV0MTqe3hfKhNCduPJl9zqRTvpQvv+8c8C9q6Y6nUpBqCpvyrYPRIPITE4w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CUIYQ+C616dWZVSPGbxb2lsrWoWI66hhu6EXlIegv8A=; b=ZvJrJZx+jQipX1pUjKjaWr1sb3NB7FcAg9Hc1/xnRrKt8SSk+ix/CazUMexN7VLY2fTMmBGYzJ9YMY2pA/+4A/y9gEBjPnek3Vx9IXWGnKXgLWmxs7cu/BHnThY7CpQTpL+pgU/K9+VdNfpSk9/z4dDkNs4W15wZ3bfDLwlL0GiwbiUIN1aPnYSzx1eogWTJVMeYzmkpL8xS1exQ0P74WRzEWGmlQebzBRkctNnuFE1eT5h632uRSf+nyhHpcZs/mxn5aj48qlWKqepxqi+B0Tyk8F8+LyhmBt8tvn/XhAb7zB8DJ18f3FG0Ocwb0eO0T4XU6XlPFyfUtgvXiT8wLw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CUIYQ+C616dWZVSPGbxb2lsrWoWI66hhu6EXlIegv8A=; b=eBevZKISc0TsZRRFA/MOtp5zfLjaopyGLvQZdR2kTRJI6tKbxluD5tVHXAnFCRGj7Q2dVOsICg7yVP6BbEvClXwtSqOPFIXiekKa0hT9ESmW5Fmiq6o7VgV7SzgfB8m7ICvEq5KZnwLRrJGVMna/hy6hsstAjMsKtxnCCvJcgyI=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by PR3P189MB0924.EURP189.PROD.OUTLOOK.COM (2603:10a6:102:4a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Sat, 5 Mar 2022 10:59:22 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::b0ea:12ff:4a7e:a24c]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::b0ea:12ff:4a7e:a24c%6]) with mapi id 15.20.5038.017; Sat, 5 Mar 2022 10:59:21 +0000
Message-ID: <929cf114-2df5-aeb1-9e32-a2f9a9688b9a@ri.se>
Date: Sat, 5 Mar 2022 11:59:18 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: =?UTF-8?Q?Rikard_H=c3=b6glund?= <rikard.hoglund=40ri.se@dmarc.ietf.org>, =?UTF-8?Q?Jaime_Jim=c3=a9nez?= <jaime@iki.fi>, "core@ietf.org" <core@ietf.org>
References: <e1c0ac8b-cfa8-4a26-9d19-eee6d9f697b0@www.fastmail.com> <fd96f760-dd06-4a1e-b128-0ddebf280d6b@www.fastmail.com> <AM9P189MB1571DDC7EBCD95D358077C2783519@AM9P189MB1571.EURP189.PROD.OUTLOOK.COM> <PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.PROD.OUTLOOK.COM>
From: Marco Tiloca <marco.tiloca@ri.se>
In-Reply-To: <PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.PROD.OUTLOOK.COM>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------AxsIlcUZOyf4ttw0cjqxWPao"
X-ClientProxiedBy: GV3P280CA0094.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:8::7) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f1154787-11fd-4c53-fad1-08d9fe9733d3
X-MS-TrafficTypeDiagnostic: PR3P189MB0924:EE_
X-Microsoft-Antispam-PRVS: <PR3P189MB092493AD331E412498082EFD99069@PR3P189MB0924.EURP189.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(6486002)(966005)(45080400002)(44832011)(66574015)(66556008)(21480400003)(19627405001)(5660300002)(235185007)(508600001)(36756003)(30864003)(8936002)(31686004)(2906002)(83380400001)(2616005)(66476007)(31696002)(66946007)(86362001)(316002)(186003)(26005)(6506007)(33964004)(53546011)(110136005)(38100700002)(166002)(6666004)(6512007)(45980500001)(43740500002)(579004)(559001)(10090945010); DIR:OUT; SFP:1101; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NDBCcHEzQnZCbFdSWWtDMk1Ed2pBeHUzdXljK2xhVlNuaGExaEFwSEp1cGd6?= =?utf-8?B?TGlJMGU3bzR1dXA3aFpJNlRyWFQwYitWRzdDbHcva1VoUUU3OG5yU1haMm14?= =?utf-8?B?WVIyTkFHTnBKQXVhUlZ4MEtDZHFMQnBrTkozSGlNWll1dllyeHBFclZEaTB3?= =?utf-8?B?WWZrQVRNR1pQZHlCU2dDckZoMkwzNFF3M2RtOVZEcW94cjhteFpUem12Nmdx?= =?utf-8?B?ZC9GcjdPNVZ5anNRbENNVEl5bklOaysvOFFycmlFSlpMTS9xN1dCZFRMdy9w?= =?utf-8?B?c3pwczd3eG5YVnpjUWZLMzVXQnRhWUxkSlloL3BTUXdNVjUrY3NmeTZrdWpn?= =?utf-8?B?ci9DRWZhRTZKUnNUQlFzQXJENVhTaVpIMlVvNytHRWpGeTBKVUtVaTBOZkFx?= =?utf-8?B?UUVwWlhDdEF0M01MdXhGbER1OEl0enRoenlrSTR0VzRiQlFVODZXb2tvWk5o?= =?utf-8?B?M3pXZm4vOWVXVmVvMG5Xblc0OVVNQ1RNK2VZRmFrK3BSUldyTkw2cnVRT056?= =?utf-8?B?OFBiR1FhNzY1a1NDVjkwWmNGOE1RclZnKy83MVAvUnRwRS9IS09kSm5vSzZN?= =?utf-8?B?OXR2RjF0OFZGNnFvc05mVktzZkkwU2ZIOGVZVDI0VXlTMW1SVExrZ1lQckZy?= =?utf-8?B?cUxOMnhaeGdWd2dQY3IxUHZtOUFMQ0ExMzJ0T3BpOEdqcVBlSkJmL0JFeU9a?= =?utf-8?B?R2ZnWitVRFFmQTJ5dGRyMGRBaW1MTGJxTE0yVUVHMWhvRGV0NW1ORGZSaklL?= =?utf-8?B?dW5xSXl5clNHS3grT1Y2d2V3elVVeGQvcldLV2lHck9KK3BYZnNMOE1Jc1Vh?= =?utf-8?B?TnhsRUFvb2JNREdGeUhVOWNRYUQwbDVNSGRqRkp5WEhCaE5HZHlLbFZDelVB?= =?utf-8?B?QVNyVWRiaWR6UHBPSlpuaGVYblNLMXgrU25TNHNjeEwyOEtmTDdaM3RjQnlj?= =?utf-8?B?TjdUZE9Cd2VWM0NqeHNaYTlBV2VVYTZyeG0yc3NyMjZiZ2xQVHdmdW5LWGYr?= =?utf-8?B?K0dTZGtzZDduZGd1VHVYaG00WXNCN0g1OFljTlJSbnhnQnBKNEUwOE5vczhO?= =?utf-8?B?WmhhV0YxQjBhMW5zbDM3OHI3UmVXVHJZaWRYTDhFdDRqeDgyUDR6dlE5SWxC?= =?utf-8?B?Mm96T3c0WElwaURPdmxZVnFnUWk4dzd5UnVZaE5JbUhET2M2U1pXOGowYVJT?= =?utf-8?B?amNwOG9aeXU4TXprV0xYMTE1OTAxVzErUHd1b2ZuLzVaNnA4T0l3aFBtUHFE?= =?utf-8?B?bmY4L1ZuM215WklENUp5cEp3MHdWRGk2cTcwOFRkMW4vSGxVY245R0Rydzk2?= =?utf-8?B?RVdQcXJlZytaWjhGbm0rWjBjdDJ1bVBkU0ZrWURzVXNHSGlYYmMzekppWFI2?= =?utf-8?B?d3pBS3J3UzVEYVB4RzdMWnFKVE9OdFpsSFhqRTJnSVhIcUkrWkFUUW0vc0w1?= =?utf-8?B?M3N3aTJPcmZEc0ZHditiek9FTWIrR3Yzck1oUCtZRTNWOHRtb2N0Zm1JSE83?= =?utf-8?B?aDlad2ZRbGhUNUhwbnV3aWtWRTJwL2pPM1FWbEg4S3RSeUx0NXg4c0RITE45?= =?utf-8?B?MzR1VER2V3F3cTMwN3JwZ2VacVhtU3NhYkJYcFEveTNsTmxxeCthbzdDSm9y?= =?utf-8?B?bUdNbUxncVVXQWNpQmtNYjhUSDQxOEljeWFxcTQxK1FRbXo4dWtxRXRHTmpp?= =?utf-8?B?OTJtM2NrQTJZQW5JZGRUZmcxYWJvc2tqSnpCTHk0MXUra2g4TVRNSG1ZaklE?= =?utf-8?B?NWJKS3lRdW5MMkFRMnVZaXlrWnZ5OCtwZVZ0YjNHcHZTNzRLQlV5dlRGM0Vi?= =?utf-8?B?WGFEK3ZvemV6U2FUSEM1YzRjTmNDZ2xGdmg4L3lSdU1kaHRaZ0EvL0I2b0R0?= =?utf-8?B?dVpiWjM0TVI4QTRRdlNsakNUMUtrR1ZFR2FRR1lVY0VURmxwV1hCZGp2UVJj?= =?utf-8?B?U0h2anNTbDdLZHB4V3J0NUU4QlZqYWhWNU9CK3dBRFBRaGFSWTR5Zk9uUTlR?= =?utf-8?B?RXFuY3NJVkIyWklzTjZYR1QwRk9PaFdUcFJPZERnc3c3a1E0ZWZ4Uzk1VWxL?= =?utf-8?B?WjQ2Y3NQOVVVT0hUY1ZVRjdQQm1Bd2ZNai8zWGhxZGdkb0hhVjFpT2psQzlB?= =?utf-8?B?K1RUTGtoalM5SWVwcm1wZm9PQkliOUNzM3NGY0p1cUczcGFKREVHRmd5ZWk1?= =?utf-8?Q?ZU7L/QtuMFxSfIn3xjv6qn8=3D?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: f1154787-11fd-4c53-fad1-08d9fe9733d3
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Mar 2022 10:59:21.5651 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: UDPegBXXlxYOKgvbg8lp4j40P7la6f4Yk/OFUJRD3gbPfRtHx7v8bLZvvKroPUKED2Qhb+aO4T8sgInBMkKZNw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR3P189MB0924
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/7SYKlVbIqw26ZaeBXPkM_pNj-ik>
Subject: Re: [core]  =?utf-8?q?=F0=9F=94=94_WG_Last_Call_of_draft-ietf-core-os?= =?utf-8?q?core-groupcomm?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Mar 2022 10:59:35 -0000

--------------AxsIlcUZOyf4ttw0cjqxWPao
Content-Type: multipart/mixed; boundary="------------rm4TP0CbDk3Jn1Avg9cEcWlj";
 protected-headers="v1"
From: Marco Tiloca <marco.tiloca@ri.se>
To: =?UTF-8?Q?Rikard_H=c3=b6glund?= <rikard.hoglund=40ri.se@dmarc.ietf.org>,
 =?UTF-8?Q?Jaime_Jim=c3=a9nez?= <jaime@iki.fi>, "core@ietf.org"
 <core@ietf.org>
Message-ID: <929cf114-2df5-aeb1-9e32-a2f9a9688b9a@ri.se>
Subject: =?UTF-8?Q?Re=3a_=5bcore=5d_=f0=9f=94=94_WG_Last_Call_of_draft-ietf-?=
 =?UTF-8?Q?core-oscore-groupcomm?=
References: <e1c0ac8b-cfa8-4a26-9d19-eee6d9f697b0@www.fastmail.com>
 <fd96f760-dd06-4a1e-b128-0ddebf280d6b@www.fastmail.com>
 <AM9P189MB1571DDC7EBCD95D358077C2783519@AM9P189MB1571.EURP189.PROD.OUTLOOK.COM>
 <PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.PROD.OUTLOOK.COM>
In-Reply-To: <PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.PROD.OUTLOOK.COM>

--------------rm4TP0CbDk3Jn1Avg9cEcWlj
Content-Type: multipart/mixed; boundary="------------piyfBYxvaNogxmp0E37xjJ0s"

--------------piyfBYxvaNogxmp0E37xjJ0s
Content-Type: multipart/alternative;
 boundary="------------9aMplPWxz2FGJIGawP9p8ud8"

--------------9aMplPWxz2FGJIGawP9p8ud8
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

SGkgUmlrYXJkLA0KDQpUaGFua3MgYSBsb3QgZm9yIHlvdXIgcmV2aWV3ISAoYW5kIGZvciBo
YXZpbmcgY29uc2lkZXJlZCB0aGUgbGF0ZXN0IA0KRWRpdG9yJ3MgY29weSkNCg0KVXBkYXRl
cyBiYXNlZCBvbiB5b3VyIGNvbW1lbnRzIGFyZSBjYXB0dXJlZCBpbiB0aGUgY29tbWl0IGF0
IFsxXS4NCg0KUGxlYXNlLCBmaW5kIGFsc28gbXkgYW5zd2VycyBpbiBsaW5lLg0KDQpCZXN0
LA0KL01hcmNvDQoNClsxXSANCmh0dHBzOi8vZ2l0aHViLmNvbS9jb3JlLXdnL29zY29yZS1n
cm91cGNvbW0vY29tbWl0LzUzMjUzNGViZDMyNDAyMTViMmI2YTVlOWFjMGJkZDczYWM5MGQw
ZjkNCg0KDQpPbiAyMDIyLTAzLTAzIDEzOjE4LCBSaWthcmQgSMO2Z2x1bmQgd3JvdGU6DQo+
DQo+IAkNCj4gVmlzc2Egc29tIGbDpXR0IGRldCBow6RyIG1lZGRlbGFuZGV0IGbDpXIgaW50
ZSBvZnRhIGUtcG9zdCBmcsOlbiANCj4gcmlrYXJkLmhvZ2x1bmQ9NDByaS5zZUBkbWFyYy5p
ZXRmLm9yZy4gU2UgdmFyZsO2ciBkZXQgw6RyIHZpa3RpZ3QgDQo+IDxodHRwOi8vYWthLm1z
L0xlYXJuQWJvdXRTZW5kZXJJZGVudGlmaWNhdGlvbj4NCj4gCQ0KPg0KPiBIZWxsby4NCj4N
Cj4gTXkgYXBvbG9naWVzwqBmb3Igc2VuZGluZyB0aGlzIG91dCBzbyBsYXRlLiBJIGhhdmUg
c3luY2VkIHdpdGggTWFyY28gDQo+IG9mZmxpbmUgc28gYXQgbGVhc3QgaGUgaXMgYXdhcmUg
aXQgaXMgY29taW5nLg0KPg0KPiBCZXN0IHdpc2hlcw0KPiBSaWthcmQNCj4NCj4gKlNlY3Rp
b24gMjoqDQo+IC9SZWdhcmRsZXNzIG9mIHdoYXQgaXQgYWN0dWFsbHkgc3VwcG9ydHMsDQo+
IC8NCj4gL8KgIMKgZWFjaCBlbmRwb2ludCBvZiBhIGdyb3VwIGlzIGF3YXJlIG9mIHdoZXRo
ZXIgdGhlIGdyb3VwIHVzZXMgdGhlIGdyb3VwLw0KPiAvwqAgwqBtb2RlLCBvciB0aGUgcGFp
cndpc2UgbW9kZSwgb3IgYm90aC4vDQo+DQo+IElzIHRoZSBmaXJzdCBwYXJ0IG9mIHRoZSBz
ZW50ZW5jZSByZWR1bmRhbnQ/DQoNCj09Pk1UDQpSZXBocmFzZWQgYXMgZm9sbG93cy4NCg0K
IkVhY2ggZW5kcG9pbnQgb2YgYSBncm91cCBpcyBhd2FyZSBvZiB3aGV0aGVyIHRoZSBncm91
cCB1c2VzIHRoZSBncm91cCANCm1vZGUsIG9yIHRoZSBwYWlyd2lzZSBtb2RlLCBvciBib3Ro
LiBUaGVuLCBhbiBlbmRwb2ludCBjYW4gdXNlIGFueSBtb2RlIA0KaXQgc3VwcG9ydHMgaWYg
YWxzbyB1c2VkIGluIHRoZSBncm91cC4iDQo8PT0NCg0KPg0KPiAqU2VjdGlvbiAyOioNCj4g
L1NpZ25hdHVyZSBFbmNyeXB0aW9uIEFsZ29yaXRobS8NCj4NCj4gSSB3b25kZXIgaWYgdGhp
cyBuYW1lIGNvdWxkIGJlIGNvbmZ1c2VkIGZvciBhbiBhbGdvcml0aG0gdXNlZCB0byANCj4g
ZW5jcnlwdCB0aGUgc2lnbmF0dXJlLg0KDQo9PT5NVA0KVG8gYXZvaWQgY29uZnVzaW9uLCBJ
J3ZlIG5vdyBhZGRlZCB0aGUgZm9sbG93aW5nIHNlbnRlbmNlLg0KDQoiVGhpcyBhbGdvcml0
aG0gaXMgbm90IHVzZWQgdG8gZW5jcnlwdCB0aGUgY291bnRlcnNpZ25hdHVyZSBpbiBtZXNz
YWdlcyANCnByb3RlY3RlZCB1c2luZyB0aGUgZ3JvdXAgbW9kZSwgZm9yIHdoaWNoIHRoZSBt
ZXRob2QgZGVmaW5lZCBpbiBTZWN0aW9uIA0KNC4xIGlzIHVzZWQuIg0KPD09DQoNCj4NCj4g
KlNlY3Rpb24gMi4yOioNCj4gL0EgbmV3bHkgaW5zdGFsbGVkIFJlY2lwaWVudCBDb250ZXh0
IHRoYXQgaGFzIHJlcXVpcmVkIHRvIGRlbGV0ZSANCj4gYW5vdGhlciBSZWNpcGllbnQgQ29u
dGV4dCBpcyBpbml0aWFsaXplZCB3aXRoIGFuIGludmFsaWQgUmVwbGF5IFdpbmRvdy8NCj4N
Cj4gSXMgaXQgdGhlIGNhc2UgdGhhdCBhbnkgUmVjaXBpZW50IENvbnRleHQgY3JlYXRlZCBh
ZnRlciBzb21lIGhhdmUgYmVlbiANCj4gZGVsZXRlZCBpcyB0byBoYXZlIGl0cyBSZXBsYXkg
V2luZG93IGJlIGludmFsaWQ/DQoNCj09Pk1UDQpZZXMuIE5vdyByZXBocmFzZWQgYXMgYmVs
b3cuDQoNCiJJZiB0aGUgbmV3IFJlY2lwaWVudCBDb250ZXh0IGhhcyBiZWVuIGluc3RhbGxl
ZCBhZnRlciB0aGUgZW5kcG9pbnQgaGFzIA0KZXhwZXJpZW5jZWQgdGhlIG92ZXJmbG93IGFi
b3ZlLCB0aGVuIHRoZSBSZWNpcGllbnQgQ29udGV4dCBpcyANCmluaXRpYWxpemVkIHdpdGgg
YW4gaW52YWxpZCBSZXBsYXkgV2luZG93IC4uLiINCjw9PQ0KDQo+DQo+ICpTZWN0aW9uICJB
dXRoZW50aWNhdGlvbiBDcmVkZW50aWFscyI6Kg0KPiAvVGhlIHVzZWQgZm9ybWF0IE1VU1Qg
cHJvdmlkZSB0aGUgcHVibGljIGtleSBhcyB3ZWxsIGFzIHRoZSBmdWxsIHNldCANCj4gb2Yg
aW5mb3JtYXRpb24gcmVsYXRlZCB0byB0aGUgcHVibGljIGtleSBhbGdvcml0aG0vDQo+DQo+
IENvdWxkIGl0IGJlIGFtYmlndW91cyB3aGF0IHRoZSAiZnVsbCBzZXQiIGlzPw0KDQo9PT5N
VA0KQ2hhbmdlZCB0byAiY29tcHJlaGVuc2l2ZSBzZXQiLg0KPD09DQoNCj4NCj4gKlNlY3Rp
b24gIkF1dGhlbnRpY2F0aW9uIENyZWRlbnRpYWxzIjoqDQo+IC9TdG9yaW5nIHdob2xlIGF1
dGhlbnRpY2F0aW9uIGNyZWRlbnRpYWxzIHJhdGhlciB0aGFuIG9ubHkgYSBzdWJzZXQgb2Yg
DQo+IHRob3NlIG1heSByZXN1bHQgaW4gYSBub24tbmVnbGlnaWJsZSBzdG9yYWdlIG92ZXJo
ZWFkLi8NCj4NCj4gTWF5IGJlIGNvbmZ1c2luZyBhcyB0aGUgcHJldmlvdXMgcGFyYWdyYXBo
IGlzIGFib3V0IG9ubHkgc3RvcmluZyBhIA0KPiBzdWJzZXQgb2YgYSBjaGFpbiBvciBhIGJh
Zy4gSXQgY291bGQgYmUgY2xlYXJlciB0aGF0IHRoaXMgaXMgYW4gDQo+IGV4cGxhbmF0aW9u
IGFuZCBqdXN0aWZpY2F0aW9uIG9mIGEgZGVzaWduIGNob2ljZS4NCg0KPT0+TVQNClRoZSBj
aGFpbi9iYWcgaXMgbm90IGEgY3JlZGVudGlhbC4gVGhlIHByZXZpb3VzIHBhcmFncmFwaCBz
YXlzIHRoYXQgdGhlIA0KYWN0dWFsIGNyZWRlbnRpYWwgaXMgb25seSB0aGUgZW5kLWVudGl0
eSBjZXJ0aWZpY2F0ZSBwcm92aWRlZCB3aXRoaW4gdGhlIA0KY2hhaW4vYmFnLCBhbmQgYXMg
c3VjaCBpdCBpcyBzdG9yZWQgYW5kIHVzZWQgbGF0ZXIgb24uDQo8PT0NCg0KPg0KPiAqU2Vj
dGlvbiAyLjQ6Kg0KPiAvR3JvdXAgT1NDT1JFIGtleXMgdXNlZCBmb3IgYm90aCBzaWduYXR1
cmUgYW5kIGVuY3J5cHRpb24gTVVTVCBOT1QgYmUgDQo+IHVzZWQgZm9yIGFueSBvdGhlciBw
dXJwb3NlcyB0aGFuIEdyb3VwIE9TQ09SRS4vDQo+DQo+IFRoZSBrZXlzIGFyZSBhbHNvIHVz
ZWQgdG93YXJkcyB0aGUgR3JvdXAgTWFuYWdlciwgd2hpY2ggYXJndWFibHkgaXNuJ3QgDQo+
IGV4YWN0bHkgR3JvdXAgT1NDT1JFLCBidXQgcmF0aGVyIHRoZSBqb2luaW5nIHByb2NlZHVy
ZS4NCg0KPT0+TVQNClJlcGhyYXNlZCBhcyBmb2xsb3dzLg0KDQoiR3JvdXAgT1NDT1JFIGtl
eXMgdXNlZCBmb3IgYm90aCBzaWduYXR1cmUgYW5kIGVuY3J5cHRpb24gTVVTVCBiZSB1c2Vk
IA0Kb25seSBmb3IgcHVycG9zZXMgcmVsYXRlZCB0byBHcm91cCBPU0NPUkUuIFRoZXNlIGlu
Y2x1ZGUgdGhlIHByb2Nlc3NpbmcgDQpvZiBtZXNzYWdlcyB3aXRoIEdyb3VwIE9TQ09SRSwg
YXMgd2VsbCBhcyBwZXJmb3JtaW5nIHByb29mLW9mLXBvc3Nlc3Npb24gDQpvZiBwcml2YXRl
IGtleXMsIGUuZy4sIHVwb24gam9pbmluZyBhIGdyb3VwIHRocm91Z2ggdGhlIEdyb3VwIE1h
bmFnZXIgDQooc2VlIFNlY3Rpb24gMykuIg0KPD09DQoNCj4NCj4gKlNlY3Rpb24gMi40LjM6
Kg0KPiAvT24gdGhlIG90aGVyIGhhbmQsIHdoZW4gY29tYmluaW5nIGdyb3VwIGFuZCBwYWly
d2lzZSBjb21tdW5pY2F0aW9uIA0KPiBtb2RlcywgdGhpcyBtYXkgcmVzdWx0IGluIHRoZSBQ
YXJ0aWFsIElWIHZhbHVlcyBtb3ZpbmcgZm9yd2FyZCBtb3JlIA0KPiBvZnRlbi4gVGhpcyBj
YW4gaGFwcGVuIHdoZW4gYSBjbGllbnQgZW5nYWdlcyBpbiBmcmVxdWVudCBvciBsb25nIA0K
PiBzZXF1ZW5jZXMgb2Ygb25lLXRvLW9uZSBleGNoYW5nZXMgd2l0aCBzZXJ2ZXJzIGluIHRo
ZSBncm91cCwgYnkgDQo+IHNlbmRpbmcgcmVxdWVzdHMgb3ZlciB1bmljYXN0Lg0KPiAvDQo+
DQo+IFRydWUsIGJ1dCBpcyBpdCBpbXBvcnRhbnQgdG8gbWVudGlvbj8gV2hhdCB0byBkbyB3
aXRoIHRoaXMgaW5mb3JtYXRpb24/DQoNCj09Pk1UDQpBZGRlZCBhIHNlbnRlbmNlIHRvIGNs
YXJpZnkgcHJhY3RpY2FsIGltcGxpY2F0aW9ucy4NCg0KIkluIHR1cm4sIHRoaXMgY29udHJp
YnV0ZXMgdG8gYSBzb29uZXIgZXhoYXVzdGlvbiBvZiB0aGUgU2VuZGVyIFNlcXVlbmNlIA0K
TnVtYmVyIHNwYWNlIG9mIHRoZSBjbGllbnQsIHdoaWNoIHdvdWxkIHRoZW4gcmVxdWlyZSB0
byB0YWtlIGFjdGlvbnMgZm9yIA0KZGVyaXZpbmcgYSBuZXcgU2VuZGVyIENvbnRleHQgYmVm
b3JlIHJlc3VtaW5nIGNvbW11bmljYXRpb25zIGluIHRoZSANCmdyb3VwIChzZWUgU2VjdGlv
biAyLjUuMikuIg0KPD09DQoNCj4NCj4gKlNlY3Rpb24gIkxvc3Mgb2YgTXV0YWJsZSBTZWN1
cml0eSBDb250ZXh0IjoqDQo+IC9BbiBhZHZlcnNhcnkgbWF5IGxldmVyYWdlIHRoZSBhYm92
ZSB0byBwZXJmb3JtIGEgRGVuaWFsIG9mIFNlcnZpY2UgDQo+IGF0dGFjayBhbmQgcHJldmVu
dCBzb21lIGdyb3VwIG1lbWJlcnMgZnJvbSBjb21tdW5pY2F0aW5nIGFsdG9nZXRoZXIuIA0K
PiBUaGF0IGlzLCB0aGUgYWR2ZXJzYXJ5IGNhbiBmaXJzdCBibG9jayB0aGUgY29tbXVuaWNh
dGlvbiBwYXRoIGJldHdlZW4gDQo+IHRoZSBHcm91cCBNYW5hZ2VyIGFuZCBzb21lIGluZGl2
aWR1YWwgZ3JvdXAgbWVtYmVycy4gVGhpcyBjYW4gYmUgDQo+IGFjaGlldmVkLCBmb3IgaW5z
dGFuY2UsIGJ5IGluamVjdGluZyBmYWtlIHJlc3BvbnNlcyB0byBETlMgcXVlcmllcyBmb3Ig
DQo+IHRoZSBHcm91cCBNYW5hZ2VyIGhvc3RuYW1lLCBvciBieSByZW1vdmluZyBhIG5ldHdv
cmsgbGluayB1c2VkIGZvciANCj4gcm91dGluZyB0cmFmZmljIHRvd2FyZHMgdGhlIEdyb3Vw
IE1hbmFnZXIuIFRoZW4sIHRoZSBhZHZlcnNhcnkgY2FuIA0KPiB0cmlnZ2VyIGEgc2hvcnQg
cG93ZXIgb3V0YWdlLCB3aGljaCBjYW4gcmVzdWx0IGluIGEgbWFzcyBwb3dlci1jeWNsZSAN
Cj4gYW5kIHJlYm9vdCBmb3Igc29tZSBlbmRwb2ludHMgaW4gdGhlIGdyb3VwLiBBZnRlciB0
aGF0LCBzdWNoIGVuZHBvaW50cyANCj4gdGhhdCBoYXZlIGxvc3QgdGhlaXIgU2VuZGVyIENv
bnRleHQgYW5kL29yIFJlY2lwaWVudCBDb250ZXh0cyANCj4gZm9sbG93aW5nIHRoZSByZWJv
b3Qgd291bGQgbm90IGJlIGFibGUgdG8gb2J0YWluIG5ldyBTZWN1cml0eSBDb250ZXh0IA0K
PiBwYXJhbWV0ZXJzIGZyb20gdGhlIEdyb3VwIE1hbmFnZXIgYXMgc3BlY2lmaWVkIGFib3Zl
LiBUaHVzLCB0aGV5IHdvdWxkIA0KPiBub3QgYmUgYWJsZSB0byBmdXJ0aGVyIGNvbW11bmlj
YXRlIGluIHRoZSBncm91cCB1bnRpbCBjb25uZWN0aXZpdHkgDQo+IHdpdGggdGhlIEdyb3Vw
IE1hbmFnZXIgaXMgcmVzdG9yZWQuLw0KPg0KPiBJcyB0aGlzIGJpZyBzZWN0aW9uIHJlbGV2
YW50IHRvIG1lbnRpb24/IElmIGFuIGFkdmVyc2FyeSBjYW4gaW5kdWNlIA0KPiBwb3dlciBv
dXRhZ2VzIGl0IGNhbiBkbyBhIGxvdCBtb3JlIGRhbWFnZSwgYW5kIGluIGRpZmZlcmVudCB3
YXlzLiANCj4gUGVyaGFwcyBpdCBjYW4gYmUgaW4gdGhlIHNlY3VyaXR5IGNvbnNpZGVyYXRp
b25zIGlmIGtlcHQuDQoNCj09Pk1UDQpUaGlzIGlucHV0IGNhbWUgZnJvbSBhbm90aGVyIHJl
dmlldyBhbmQgaXQgY29udmVuaWVudGx5IGZpdHMgaGVyZSwgc2luY2UgDQppdCBidWlsZHMg
b24gdGhlIGV4YWN0IGNvbnRleHQgZnJvbSB0aGUgcHJldmlvdXMgcGFyYWdyYXBocyBpbiBT
ZWN0aW9uIA0KMi41LjEuMSAod2hpY2ggd291bGQgYmUgcXVpdGUgaGFyZCB0byBidWlsZCBh
Z2FpbiBsYXRlciBvbiBpbiB0aGUgDQpzZWN1cml0eSBjb25zaWRlcmF0aW9ucykuDQoNCkkg
aGF2ZSBob3dldmVyIG1hZGUgc29tZSBtaW5vciByZXBocmFzaW5nIGFzIGJlbG93Lg0KDQpP
TEQ6DQoiVGhlbiwgdGhlIGFkdmVyc2FyeSBjYW4gdHJpZ2dlciBhIHNob3J0IHBvd2VyIG91
dGFnZSwgd2hpY2ggY2FuIHJlc3VsdCANCmluIGEgbWFzcyBwb3dlci1jeWNsZSBhbmQgcmVi
b290IGZvciBzb21lIGVuZHBvaW50cyBpbiB0aGUgZ3JvdXAuIg0KDQpORVc6DQoiVGhlbiwg
dGhlIGFkdmVyc2FyeSBjYW4gaW5kdWNlIGEgcmVib290IGZvciBzb21lIGVuZHBvaW50cyBp
biB0aGUgDQpncm91cCwgZS5nLiwgYnkgdHJpZ2dlcmluZyBhIHNob3J0IHBvd2VyIG91dGFn
ZS4iDQo8PT0NCg0KPg0KPiAqU2VjdGlvbiAiRXhoYXVzdGlvbiBvZiBTZW5kZXIgU2VxdWVu
Y2UgTnVtYmVyIjoqDQo+IC9FeGhhdXN0aW9uIG9mIFNlbmRlciBTZXF1ZW5jZSBOdW1iZXIv
DQo+DQo+IE1heSBiZSBlbm91Z2ggd2l0aCBqdXN0IGEgcmVmZXJlbmNlIHRvIHRoZSBlcXVp
dmFsZW50IE9TQ09SRSBzZWN0aW9uPyANCj4gQW5kIHNheWluZyB0byByZXRyaWV2ZSBuZXcg
U2VjdXJpdHkgQ29udGV4dCBwYXJhbWV0ZXJzIGZyb20gdGhlIEdNDQoNCj09Pk1UDQpLZXB0
IGFzIGlzIGFzIHRoZSByZXN1bHQgb2YgZGlzY3Vzc2lvbnMvcmV2aWV3cyBvbiBwcmV2aW91
cyB2ZXJzaW9ucyBvZiANCnRoZSBkb2N1bWVudC4NCjw9PQ0KDQo+DQo+ICpTZWN0aW9uIDIu
NS4zOioNCj4gL1RoZSBSZWNpcGllbnQgSUQgKCdraWQnKSBTSE9VTEQgTk9UIGJlIGNvbnNp
ZGVyZWQgYXMgYSBwZXJzaXN0ZW50IGFuZCANCj4gcmVsaWFibGUgaW5kaWNhdG9yIG9mIGEg
Z3JvdXAgbWVtYmVyLi8NCj4NCj4gSWRlbnRpZmllciByYXRoZXIgdGhhbiBpbmRpY2F0b3I/
IE5vdCAxMDAlIGNsZWFyIHdoYXQgYW4gaW5kaWNhdG9yIGlzIA0KPiBpbiB0aGlzIGNvbnRl
eHQuDQoNCj09Pk1UDQpDaGFuZ2VkIHRvICJpZGVudGlmaWVyIi4NCjw9PQ0KDQo+DQo+ICpT
ZWN0aW9uIDkuNjoqDQo+IC9BbHNvLCB1cG9uIHRoZSBlc3RhYmxpc2htZW50IG9mIGEgbmV3
IFNlY3VyaXR5IENvbnRleHQsIHRoZSBjbGllbnQgDQo+IHJlLWluaXRpYWxpemVzIGl0cyBS
ZXBsYXkgV2luZG93cyBpbiBpdHMgUmVjaXBpZW50IENvbnRleHRzIChzZWUgDQo+IHt7c2Vj
LWdyb3VwLWtleS1tYW5hZ2VtZW50fX0pLi8NCj4NCj4gSXNuJ3QgdGhpcyBqdXN0IGxpa2Ug
aW4gT1NDT1JFPyBJbiB0aGUgc2Vuc2UgdGhhdCBhIG5ldyBjb250ZXh0IGdldHMgYSANCj4g
cmVzZXQgZnJlc2ggcmVwbGF5IHdpbmRvdy4NCg0KPT0+TVQNClllcywgd2l0aCB0aGUgZGlm
ZmVyZW5jZSB0aGF0LCBpbiBnZW5lcmFsLCB0aGVyZSBhcmUgbXVsdGlwbGUgUmVjaXBpZW50
IA0KQ29udGV4dHMgd2l0aGluIHRoZSBzYW1lIFNlY3VyaXR5IENvbnRleHQuDQoNCkhvd2V2
ZXIsIEkgdG9vayB0aGUgb3Bwb3J0dW5pdHkgdG8gZml4IGEgc2VjdGlvbiByZWZlcmVuY2Us
IG5vdyANCmNvcnJlY3RseSBwb2ludGluZyB0byBTZWN0aW9uIDIuMi4NCjw9PQ0KDQo+DQo+
ICpTZWN0aW9uIDkuNjoqDQo+IC9Ib3dldmVyLCBzaW5jZSB0aGUgbm90aWZpY2F0aW9uIGlz
IHByb3RlY3RlZCBpbiBwYWlyd2lzZSBtb2RlLCB0aGUgDQo+IHB1YmxpYyBrZXkgaXMgbm90
IHVzZWQgZm9yIHZlcmlmeWluZyBhIGNvdW50ZXJzaWduYXR1cmUgYXMgaW4gDQo+IHt7c3Nl
Yy12ZXJpZnktcmVzcG9uc2V9fS4gSW5zdGVhZCwgdGhlIGV4cGVjdGVkIHNlcnZlcidzIA0K
PiBhdXRoZW50aWNhdGlvbiBjcmVkZW50aWFsIC0gbmFtZWx5IFJlY2lwaWVudCBBdXRoIENy
ZWQgYW5kIGluY2x1ZGluZyANCj4gdGhlIHNlcnZlcidzIHB1YmxpYyBrZXkgLSB3YXMgdGFr
ZW4gYXMgaW5wdXQgdG8gZGVyaXZlIHRoZSBQYWlyd2lzZSANCj4gUmVjaXBpZW50IEtleSB1
c2VkIHRvIGRlY3J5cHQgYW5kIHZlcmlmeSB0aGUgbm90aWZpY2F0aW9uIChzZWUgDQo+IHt7
a2V5LWRlcml2YXRpb24tcGFpcndpc2V9fSkuLw0KPg0KPiBKdXN0IHJlc3RhdGluZyB3aGF0
IGlzIHNhaWQgc2hvcnRseSBhYm92ZT8NCg0KPT0+TVQNClJlcGxhY2VkIHRoZSBxdW90ZWQg
dGV4dCB3aXRoIHRoZSBmb2xsb3dpbmcgc2VudGVuY2UuDQoNCiJBcyB0byB0aGUgZXhwZWN0
ZWQgc2VydmVyJ3MgYXV0aGVudGljYXRpb24gY3JlZGVudGlhbCwgdGhlIHNhbWUgaG9sZHMg
DQphcyBzcGVjaWZpZWQgYWJvdmUgZm9yIG5vbi1ub3RpZmljYXRpb24gcmVzcG9uc2VzLiIN
Cjw9PQ0KDQo+DQo+ICpTZWN0aW9uIDExLjY6Kg0KPiAvVGhlIGVudGl0eSBhc3NpZ25pbmcg
YW4gSVAgbXVsdGljYXN0IGFkZHJlc3MgbWF5IGhlbHAgbGltaXRpbmcgdGhlIA0KPiBjaGFu
Y2VzIHRvIGV4cGVyaWVuY2Ugc3VjaCBjb2xsaXNpb25zIG9mIEdyb3VwIElkZW50aWZpZXJz
Li8NCj4NCj4gR29vZCB0byBzYXkgdGhhdCBpdCBpcyByZWNvbW1lbmRlZCB0byBhc3NpZ24g
Z3JvdXBzIHRvIGRpZmZlcmVudCANCj4gbXVsdGljYXN0IElQcyB3aGVuIHBvc3NpYmxlPw0K
DQo9PT5NVA0KVGhlIHBvc3NpYmxlIG1hcHBpbmcgYmV0d2VlbiBzZWN1cml0eSBncm91cHMg
YW5kIENvQVAgZ3JvdXBzIGlzIGFjdHVhbGx5IA0KZGlzY3Vzc2VkIGluIHRoZSBncm91cGNv
bW0tYmlzIGRvY3VtZW50Lg0KDQpUaGlzIHBhcmFncmFwaCB3YXMgbWVhbnQgdG8gc3VnZ2Vz
dCBhIGRpZmZlcmVudCBraW5kIG9mIGhlbHAuIEkndmUgbm93IA0KcmVwaHJhc2VkIGFzIGJl
bG93LCB0byBwcm92aWRlIG1vcmUgY29udGV4dC4NCg0KIkluIGNhc2UgbXVsdGlwbGUgZ3Jv
dXBzIHVzZSB0aGUgc2FtZSBJUCBtdWx0aWNhc3QgYWRkcmVzcywgdGhlIGVudGl0eSANCmFz
c2lnbmluZyB0aGF0IGFkZHJlc3MgbWF5IGhlbHAgbGltaXRpbmcgdGhlIGNoYW5jZXMgdG8g
ZXhwZXJpZW5jZSBzdWNoIA0KY29sbGlzaW9ucyBvZiBHcm91cCBJZGVudGlmaWVycy4gSW4g
cGFydGljdWxhciwgaXQgbWF5IGFsbG93IHRoZSBHcm91cCANCk1hbmFnZXJzIG9mIHRob3Nl
IGdyb3VwcyB1c2luZyB0aGUgc2FtZSBJUCBtdWx0aWNhc3QgYWRkcmVzcyB0byBzaGFyZSAN
CnRoZWlyIHJlc3BlY3RpdmUgbGlzdCBvZiBhc3NpZ25lZCBHcm91cCBJZGVudGlmaWVycyBj
dXJyZW50bHkgaW4gdXNlLiINCjw9PQ0KDQo+DQo+ICpTZWN0aW9uIDExLjcuMToqDQo+IC9V
cG9uIHJlY2VpdmluZyBNMiwgdGhlcmUgaXMgYSBwcm9iYWJpbGl0eSBlcXVhbCB0byAyXi02
NCB0aGF0IFkgDQo+IHN1Y2Nlc3NmdWxseSB2ZXJpZmllcyB0aGUgc2FtZSB1bmNoYW5nZWQg
TUFDIGJ5IHVzaW5nIHRoZSBQYWlyd2lzZSANCj4gUmVjaXBpZW50IEtleSBhc3NvY2lhdGVk
IHdpdGggWCBpbiBHMi4vDQo+DQo+IEkgd29uZGVyIHdoeSB0aGUgcHJvYmFiaWxpdHkgaXMg
Ml4tNjQsIHdoeSBpcyB0aGlzIGF0dGFjayBiZXR0ZXIgdGhhbiANCj4gc2ltcGx5IGZvcmdp
bmcgYSBtZXNzYWdlIHRvIGEgZ3JvdXAgbWVtYmVyIChhbmQgaG9waW5nIHRoZSBNQUMgdmVy
aWZpZXMpPw0KDQo9PT5NVA0KKEZvbGxvd2luZyBzb21lIG1vcmUgc2VjdGlvbiByZXN0cnVj
dHVyaW5nLCB0aGlzIGlzIG5vdyBTZWN0aW9uIDEyLjcuMSkNCg0KSWYgb25lIGZvcmdlcyBh
IG1lc3NhZ2UgZnJvbSBzY3JhdGNoLCBvbmUgaGFzIGluZGVlZCB0aGUgc2FtZSANCnByb2Jh
YmlsaXR5IHRvIGJ1aWxkIHNvbWV0aGluZyB0aGF0IHlpZWxkcyBhIHN1Y2Nlc3NmdWwgZGVj
cnlwdGlvbiwgDQppLmUuLCBzdWNoIHRoYXQgdGhlIE1BQyB2ZXJpZmllcy4NCg0KT24gdG9w
IG9mIHRoYXQsIGhlcmUgdGhlIHJlc3VsdCB3b3VsZCBzdGlsbCBiZSB0aGUgbWVzc2FnZSBv
cmlnaW5hbGx5IA0Kc2VudCB0byBHMSwgY3JlYXRlZCBhcyB2YWxpZCBieSBpdHMgc2VuZGVy
IFguDQo8PT0NCg0KPg0KPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gKkZyb206KiBjb3JlIDxj
b3JlLWJvdW5jZXNAaWV0Zi5vcmc+IG9uIGJlaGFsZiBvZiBSaWthcmQgSMO2Z2x1bmQgDQo+
IDxyaWthcmQuaG9nbHVuZD00MHJpLnNlQGRtYXJjLmlldGYub3JnPg0KPiAqU2VudDoqIFR1
ZXNkYXksIEphbnVhcnkgMTEsIDIwMjIgMjM6MjANCj4gKlRvOiogSmFpbWUgSmltw6luZXog
PGphaW1lQGlraS5maT47IGNvcmVAaWV0Zi5vcmcgPGNvcmVAaWV0Zi5vcmc+DQo+ICpTdWJq
ZWN0OiogUmU6IFtjb3JlXSDwn5SUIFdHIExhc3QgQ2FsbCBvZiBkcmFmdC1pZXRmLWNvcmUt
b3Njb3JlLWdyb3VwY29tbQ0KPg0KPiAJDQo+IHJpa2FyZC5ob2dsdW5kPTQwcmkuc2VAZG1h
cmMuaWV0Zi5vcmcgbGlrbmFyIG7DpWdvbiBzb20gdGlkaWdhcmUgaGFyIA0KPiBza2lja2F0
IGUtcG9zdCB0aWxsIGRpZywgbWVuIGthbnNrZSBpbnRlIMOkciBkZW4gcGVyc29uZW4uIFNl
IHZhcmbDtnIgDQo+IGRldCBow6RyIGthbiB2YXJhIGVuIHJpc2sgPGh0dHA6Ly9ha2EubXMv
TGVhcm5BYm91dFNlbmRlcklkZW50aWZpY2F0aW9uPg0KPiAJDQo+DQo+IEhlbGxvLg0KPg0K
PiBJIGFtIHdvcmtpbmcgb24gYSByZXZpZXcgdGhhdCBJIHVuZm9ydHVuYXRlbHkgaGF2ZSBu
b3QgYmVlbiBhYmxlIHRvIA0KPiBmaW5pc2ggeWV0LiBIb3dldmVyIEkgd2lsbCBiZSBzZW5k
aW5nIGl0IG91dCBiZWZvcmUgdGhlIGVuZCBvZiB0aGUgd2Vlay4NCj4NCj4gQmVzdCB3aXNo
ZXMNCj4gUmlrYXJkIEjDtmdsdW5kDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiAqRnJvbToq
IGNvcmUgPGNvcmUtYm91bmNlc0BpZXRmLm9yZz4gb24gYmVoYWxmIG9mIEphaW1lIEppbcOp
bmV6IA0KPiA8amFpbWVAaWtpLmZpPg0KPiAqU2VudDoqIFdlZG5lc2RheSwgRGVjZW1iZXIg
MSwgMjAyMSAxNjo1OQ0KPiAqVG86KiBjb3JlQGlldGYub3JnIDxjb3JlQGlldGYub3JnPg0K
PiAqU3ViamVjdDoqIFJlOiBbY29yZV0g8J+UlCBXRyBMYXN0IENhbGwgb2YgZHJhZnQtaWV0
Zi1jb3JlLW9zY29yZS1ncm91cGNvbW0NCj4gRGVhciBhbGwsDQo+DQo+IHRoZSBkZWFkbGlu
ZSBmb3IgdGhpcyBXR0xDIGlzIHRvZGF5LiBHaXZlbiB0aGF0IHdlIGhhdmUgbm90IHJlY2Vp
dmVkIA0KPiBlbm91Z2ggcmV2aWV3cyBhbmQgdGhhdCB0aGUgQ2hyaXN0bWFzIHBlcmlvZCBp
cyBhcnJpdmluZyBzb29uLCB3ZSB3aWxsIA0KPiBoYXZlIHRvIGV4dGVuZCB0aGUgZGVhZGxp
bmUgZm9yIHRoaXMuDQo+DQo+IE1hcmNvIGFuZCBJIHByb3Bvc2UgNiBtb3JlIHdlZWtzIG9m
IGV4dGVuc2lvbiB1bnRpbCAyMDIyLTAxLTExIA0KPiBUdWVzZGF5LCB0byBnaXZlIG1vcmUg
YW1wbGUgdGltZSBmb3IgdGhvcm91Z2ggcmV2aWV3cy4NCj4NCj4gQ2lhbyENCj4gLS0gDQo+
IEphaW1lIEppbcOpbmV6DQo+DQo+IE9uIFR1ZSwgTm92IDksIDIwMjEsIGF0IDg6NTkgUE0s
IEphaW1lIEppbcOpbmV6IHdyb3RlOg0KPiA+IERlYXIgQ29SRSwNCj4gPg0KPiA+IGFzIHdl
IGRpc2N1c3NlZCB5ZXN0ZXJkYXksIHRoZSBhdXRob3JzIG9mDQo+ID4gZHJhZnQtaWV0Zi1j
b3JlLW9zY29yZS1ncm91cGNvbW0gdGhpbmsgdGhlaXIgZHJhZnQgaXMgcmVhZHkgZm9yIGEg
Mm5kDQo+ID4gV0dMQy4gVGhlIGN1cnJlbnQgdmVyc2lvbiBvZiB0aGUgZHJhZnQgKHYxMykg
aXMgbm90IGV4cGVjdGluZyBhbnkNCj4gPiB1cGRhdGVzIHNvIHlvdSBjYW4gc3RhcnQgeW91
ciBwbGFubmVkIHJldmlld3MuDQo+ID4NCj4gPiANCj4gaHR0cHM6Ly9ldXIwNS5zYWZlbGlu
a3MucHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGZGF0YXRyYWNr
ZXIuaWV0Zi5vcmclMkZkb2MlMkZodG1sJTJGZHJhZnQtaWV0Zi1jb3JlLW9zY29yZS1ncm91
cGNvbW0tMTMmYW1wO2RhdGE9MDQlN0MwMSU3Q3Jpa2FyZC5ob2dsdW5kJTQwcmkuc2UlN0Nj
NTE0NmRiMDMyMjA0ZmFmMTI1ZDA4ZDliNGUzYTY3NiU3QzVhOTgwOWNmMGJjYjQxM2E4Mzhh
MDllY2M0MGNjOWU4JTdDMCU3QzAlN0M2Mzc3Mzk3MTI5ODgzNzUyMTklN0NVbmtub3duJTdD
VFdGcGJHWnNiM2Q4ZXlKV0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRp
STZJazFoYVd3aUxDSlhWQ0k2TW4wJTNEJTdDMzAwMCZhbXA7c2RhdGE9NkI3ZEViSjhsNCUy
QnZjJTJCeHJNQmlGeE42R1JmN2xBb2k1RlVaQkk2OGNkTlElM0QmYW1wO3Jlc2VydmVkPTAg
DQo+IDxodHRwczovL2V1cjA1LnNhZmVsaW5rcy5wcm90ZWN0aW9uLm91dGxvb2suY29tLz91
cmw9aHR0cHMlM0ElMkYlMkZkYXRhdHJhY2tlci5pZXRmLm9yZyUyRmRvYyUyRmh0bWwlMkZk
cmFmdC1pZXRmLWNvcmUtb3Njb3JlLWdyb3VwY29tbS0xMyZkYXRhPTA0JTdDMDElN0NtYXJj
by50aWxvY2ElNDByaS5zZSU3QzA4ODM4NzllOWYzMzQyYzEwMzFkMDhkOWZkMGZmZjg4JTdD
NWE5ODA5Y2YwYmNiNDEzYTgzOGEwOWVjYzQwY2M5ZTglN0MwJTdDMCU3QzYzNzgxOTA2ODAw
NDAxMzUxNyU3Q1Vua25vd24lN0NUV0ZwYkdac2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxD
SlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENKWFZDSTZNbjAlM0QlN0MxMDAwJnNk
YXRhPTVzUyUyRnUlMkI1OHpkZHc1TFBPVnJhTG9tNlRWSGpWRTByYmN6Q1IwWmV2dkY0JTNE
JnJlc2VydmVkPTA+DQo+ID4NCj4gPiBJbiBhZGRpdGlvbiB0byB0aGUgZW1haWwgbGlzdCBk
aXNjdXNzaW9uIHJldmlld2VycyBjb3VsZCBjb25zaWRlcg0KPiA+IG9wZW5pbmcgbmV3IGlz
c3VlcyBvbiB0aGUgR2l0aHViIHJlcG8gb2YgdGhlIGRyYWZ0IGFzIGNvdXJ0ZXN5IHRvIHRo
ZQ0KPiA+IGF1dGhvcnMuDQo+ID4NCj4gPiANCj4gaHR0cHM6Ly9ldXIwNS5zYWZlbGlua3Mu
cHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGZ2l0aHViLmNvbSUy
RmNvcmUtd2clMkZvc2NvcmUtZ3JvdXBjb21tJmFtcDtkYXRhPTA0JTdDMDElN0NyaWthcmQu
aG9nbHVuZCU0MHJpLnNlJTdDYzUxNDZkYjAzMjIwNGZhZjEyNWQwOGQ5YjRlM2E2NzYlN0M1
YTk4MDljZjBiY2I0MTNhODM4YTA5ZWNjNDBjYzllOCU3QzAlN0MwJTdDNjM3NzM5NzEyOTg4
Mzc1MjE5JTdDVW5rbm93biU3Q1RXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENK
UUlqb2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMCUzRCU3QzMwMDAmYW1w
O3NkYXRhPVdGWHREcGlRMVJSaVcxaFAxSmVVeDAlMkY0JTJGNWkxVUtPaWE5Wk5UNU5kSW5z
JTNEJmFtcDtyZXNlcnZlZD0wIA0KPiA8aHR0cHM6Ly9ldXIwNS5zYWZlbGlua3MucHJvdGVj
dGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGZ2l0aHViLmNvbSUyRmNvcmUt
d2clMkZvc2NvcmUtZ3JvdXBjb21tJmRhdGE9MDQlN0MwMSU3Q21hcmNvLnRpbG9jYSU0MHJp
LnNlJTdDMDg4Mzg3OWU5ZjMzNDJjMTAzMWQwOGQ5ZmQwZmZmODglN0M1YTk4MDljZjBiY2I0
MTNhODM4YTA5ZWNjNDBjYzllOCU3QzAlN0MwJTdDNjM3ODE5MDY4MDA0MDEzNTE3JTdDVW5r
bm93biU3Q1RXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJ
aUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMCUzRCU3QzEwMDAmc2RhdGE9NUJ0S0tUTEE5
WmpaYVZKa2Vtem9IT2hDWWMlMkJhODViS1lxV3ViM2oyaTJVJTNEJnJlc2VydmVkPTA+DQo+
ID4NCj4gPiBBcyB3ZSBoYXZlIHRoZSBJRVRGIG9uZ29pbmcgYW5kIHRoZSBkb2N1bWVudCBu
ZWVkcyB0aW1lIHRvIGJlIGRpZ2VzdGVkLA0KPiA+IHdlIHBsYWNlIHRoZSBlbmQgb2YgdGhl
IGNhbGwgb24gdGhlIDFzdCBvZiBEZWNlbWJlciB3aXRoIGEgcG9zc2liaWxpdHkNCj4gPiBv
ZiBleHRlbnNpb24gZGVwZW5kaW5nIG9uIHRoZSBudW1iZXIgb2YgcmV2aWV3cy4NCj4gPg0K
PiA+PkZyb20gdGhlIG1pbnV0ZXMgSSB0YWtlIHRoYXQgQ0EsIFJILCBFRCBhbmQgVEYgd291
bGQgZ2l2ZSBpdCANCj4gdGhvcm91Z2ggbG9vay4gVGhhbmsgeW91IGFscmVhZHkgZm9yIHRo
YXQsIG11Y2ggYXBwcmVjaWF0ZWQhIQ0KPiA+DQo+ID4gQ2lhbyENCj4gPiAtLQ0KPiA+IEph
aW1lIEppbcOpbmV6DQo+ID4NCj4gPiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fXw0KPiA+IGNvcmUgbWFpbGluZyBsaXN0DQo+ID4gY29yZUBpZXRm
Lm9yZw0KPiA+IA0KPiBodHRwczovL2V1cjA1LnNhZmVsaW5rcy5wcm90ZWN0aW9uLm91dGxv
b2suY29tLz91cmw9aHR0cHMlM0ElMkYlMkZ3d3cuaWV0Zi5vcmclMkZtYWlsbWFuJTJGbGlz
dGluZm8lMkZjb3JlJmFtcDtkYXRhPTA0JTdDMDElN0NyaWthcmQuaG9nbHVuZCU0MHJpLnNl
JTdDYzUxNDZkYjAzMjIwNGZhZjEyNWQwOGQ5YjRlM2E2NzYlN0M1YTk4MDljZjBiY2I0MTNh
ODM4YTA5ZWNjNDBjYzllOCU3QzAlN0MwJTdDNjM3NzM5NzEyOTg4Mzc1MjE5JTdDVW5rbm93
biU3Q1RXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJaUxD
SkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMCUzRCU3QzMwMDAmYW1wO3NkYXRhPU80YmslMkZk
aGhsNmlkV2hYRGtxeFdOVXlHT1VnVXA0ZnFWa2VVMGhZa0NERSUzRCZhbXA7cmVzZXJ2ZWQ9
MCANCj4gPGh0dHBzOi8vZXVyMDUuc2FmZWxpbmtzLnByb3RlY3Rpb24ub3V0bG9vay5jb20v
P3VybD1odHRwcyUzQSUyRiUyRnd3dy5pZXRmLm9yZyUyRm1haWxtYW4lMkZsaXN0aW5mbyUy
RmNvcmUmZGF0YT0wNCU3QzAxJTdDbWFyY28udGlsb2NhJTQwcmkuc2UlN0MwODgzODc5ZTlm
MzM0MmMxMDMxZDA4ZDlmZDBmZmY4OCU3QzVhOTgwOWNmMGJjYjQxM2E4MzhhMDllY2M0MGNj
OWU4JTdDMCU3QzAlN0M2Mzc4MTkwNjgwMDQwMTM1MTclN0NVbmtub3duJTdDVFdGcGJHWnNi
M2Q4ZXlKV0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRpSTZJazFoYVd3
aUxDSlhWQ0k2TW4wJTNEJTdDMTAwMCZzZGF0YT1hZzRZJTJCUjFqN0xTRjRWYXVhMFhWR0k3
V1AlMkZZU1hJem9YQWQwcmxBbDV1QSUzRCZyZXNlcnZlZD0wPg0KPg0KPiBfX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiBjb3JlIG1haWxpbmcg
bGlzdA0KPiBjb3JlQGlldGYub3JnDQo+IGh0dHBzOi8vZXVyMDUuc2FmZWxpbmtzLnByb3Rl
Y3Rpb24ub3V0bG9vay5jb20vP3VybD1odHRwcyUzQSUyRiUyRnd3dy5pZXRmLm9yZyUyRm1h
aWxtYW4lMkZsaXN0aW5mbyUyRmNvcmUmYW1wO2RhdGE9MDQlN0MwMSU3Q3Jpa2FyZC5ob2ds
dW5kJTQwcmkuc2UlN0NjNTE0NmRiMDMyMjA0ZmFmMTI1ZDA4ZDliNGUzYTY3NiU3QzVhOTgw
OWNmMGJjYjQxM2E4MzhhMDllY2M0MGNjOWU4JTdDMCU3QzAlN0M2Mzc3Mzk3MTI5ODgzNzUy
MTklN0NVbmtub3duJTdDVFdGcGJHWnNiM2Q4ZXlKV0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpv
aVYybHVNeklpTENKQlRpSTZJazFoYVd3aUxDSlhWQ0k2TW4wJTNEJTdDMzAwMCZhbXA7c2Rh
dGE9TzRiayUyRmRoaGw2aWRXaFhEa3F4V05VeUdPVWdVcDRmcVZrZVUwaFlrQ0RFJTNEJmFt
cDtyZXNlcnZlZD0wIA0KPiA8aHR0cHM6Ly9ldXIwNS5zYWZlbGlua3MucHJvdGVjdGlvbi5v
dXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGd3d3LmlldGYub3JnJTJGbWFpbG1hbiUy
Rmxpc3RpbmZvJTJGY29yZSZkYXRhPTA0JTdDMDElN0NtYXJjby50aWxvY2ElNDByaS5zZSU3
QzA4ODM4NzllOWYzMzQyYzEwMzFkMDhkOWZkMGZmZjg4JTdDNWE5ODA5Y2YwYmNiNDEzYTgz
OGEwOWVjYzQwY2M5ZTglN0MwJTdDMCU3QzYzNzgxOTA2ODAwNDAxMzUxNyU3Q1Vua25vd24l
N0NUV0ZwYkdac2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pC
VGlJNklrMWhhV3dpTENKWFZDSTZNbjAlM0QlN0MxMDAwJnNkYXRhPWFnNFklMkJSMWo3TFNG
NFZhdWEwWFZHSTdXUCUyRllTWEl6b1hBZDBybEFsNXVBJTNEJnJlc2VydmVkPTA+DQo+DQo+
IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+IGNv
cmUgbWFpbGluZyBsaXN0DQo+IGNvcmVAaWV0Zi5vcmcNCj4gaHR0cHM6Ly93d3cuaWV0Zi5v
cmcvbWFpbG1hbi9saXN0aW5mby9jb3JlDQoNCi0tIA0KTWFyY28gVGlsb2NhDQpQaC5ELiwg
U2VuaW9yIFJlc2VhcmNoZXINCg0KRGl2aXNpb246IERpZ2l0YWwgU3lzdGVtcw0KRGVwYXJ0
bWVudDogQ29tcHV0ZXIgU2NpZW5jZQ0KVW5pdDogQ3liZXJzZWN1cml0eQ0KDQpSSVNFIFJl
c2VhcmNoIEluc3RpdHV0ZXMgb2YgU3dlZGVuDQpodHRwczovL3d3dy5yaS5zZQ0KDQpQaG9u
ZTogKzQ2ICgwKTcwIDYwIDQ2IDUwMQ0KSXNhZmpvcmRzZ2F0YW4gMjIgLyBLaXN0YWfDpW5n
ZW4gMTYNClNFLTE2NCA0MCBLaXN0YSAoU3dlZGVuKQ0KDQo=
--------------9aMplPWxz2FGJIGawP9p8ud8
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF=
-8">
  </head>
  <body>
    Hi Rikard,<br>
    <br>
    Thanks a lot for your review! (and for having considered the latest
    Editor's copy)<br>
    <br>
    Updates based on your comments are captured in the commit at [1].<br>=

    <br>
    Please, find also my answers in line.<br>
    <br>
    Best,<br>
    /Marco<br>
    <br>
    [1]
<a class=3D"moz-txt-link-freetext" href=3D"https://github.com/core-wg/osc=
ore-groupcomm/commit/532534ebd3240215b2b6a5e9ac0bdd73ac90d0f9">https://gi=
thub.com/core-wg/oscore-groupcomm/commit/532534ebd3240215b2b6a5e9ac0bdd73=
ac90d0f9</a><br>
    <br>
    <br>
    <div class=3D"moz-cite-prefix">On 2022-03-03 13:18, Rikard H=C3=B6glu=
nd
      wrote:<br>
    </div>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DU=
TF-8">
      <style type=3D"text/css" style=3D"display:none;">P {margin-top:0;ma=
rgin-bottom:0;}</style>
      <table
style=3D"cellpadding:0;border:0;cellspacing:0;display:table;width:100%;ta=
ble-layout:fixed;border-collapse:seperate;float:none;"
        width=3D"100%" cellspacing=3D"0" cellpadding=3D"0" border=3D"0"
        align=3D"left">
        <tbody>
          <tr>
            <td cellpadding=3D"7px 2px 7px 2px" style=3D"padding:7px 2px =
7px
              2px;background-color:#A6A6A6;valign:middle" width=3D"1px"
              valign=3D"middle" bgcolor=3D"#A6A6A6">
              <br>
            </td>
            <td cellpadding=3D"7px 5px 7px 15px" color=3D"#212121"
              style=3D"width:100%;background-color:#EAEAEA;padding:7px 5p=
x
              7px 15px;font-family:wf_segoe-ui_normal,Segoe UI,Segoe
              WP,Tahoma,Arial,
sans-serif;font-size:12px;font-weight:normal;color:#212121;text-align:lef=
t;word-wrap:break-word;"
              width=3D"100%" valign=3D"middle" bgcolor=3D"#EAEAEA">
              <div>Vissa som f=C3=A5tt det h=C3=A4r meddelandet f=C3=A5r =
inte ofta
                e-post fr=C3=A5n <a class=3D"moz-txt-link-abbreviated" hr=
ef=3D"mailto:rikard.hoglund=3D40ri.se@dmarc.ietf.org">rikard.hoglund=3D40=
ri.se@dmarc.ietf.org</a>.
                <a href=3D"http://aka.ms/LearnAboutSenderIdentification"
                  moz-do-not-send=3D"true">Se varf=C3=B6r det =C3=A4r vik=
tigt</a></div>
            </td>
            <td cellpadding=3D"7px 5px 7px 5px" color=3D"#212121"
              style=3D"width:75px;background-color:#EAEAEA;padding:7px 5p=
x
              7px 5px;font-family:wf_segoe-ui_normal,Segoe UI,Segoe
              WP,Tahoma,Arial,
sans-serif;font-size:12px;font-weight:normal;color:#212121;text-align:lef=
t;word-wrap:break-word;align:left"
              width=3D"75px" valign=3D"middle" bgcolor=3D"#EAEAEA"
              align=3D"left">
              <br>
            </td>
          </tr>
        </tbody>
      </table>
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          Hello.</div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <br>
        </div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          My apologies=C2=A0for sending this out so late. I have synced w=
ith
          Marco offline so at least he is aware it is coming.</div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <br>
        </div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          Best wishes</div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          Rikard</div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <br>
        </div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <b>Section 2:</b>
          <div><i>Regardless of what it actually supports,<br>
            </i></div>
          <div><i>=C2=A0 =C2=A0each endpoint of a group is aware of wheth=
er the
              group uses the group</i></div>
          <div><i>=C2=A0 =C2=A0mode, or the pairwise mode, or both.</i></=
div>
          <div><br>
          </div>
          <div>Is the first part of the sentence redundant?</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Rephrased as follows.<br>
    <br>
    "Each endpoint of a group is aware of whether the group uses the
    group mode, or the pairwise mode, or both. Then, an endpoint can use
    any mode it supports if also used in the group."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 2:</b></div>
          <div><i>Signature Encryption Algorithm</i><br>
          </div>
          <div><br>
          </div>
          <div>I wonder if this name could be confused for an algorithm
            used to encrypt the signature.</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    To avoid confusion, I've now added the following sentence.<br>
    <br>
    "This algorithm is not used to encrypt the countersignature in
    messages protected using the group mode, for which the method
    defined in Section 4.1 is used."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 2.2:</b></div>
          <div><i style=3D"color: inherit; font-family: inherit;
              font-size: inherit; font-variant-ligatures: inherit;
              font-variant-caps: inherit; font-weight: inherit;">A newly
              installed Recipient Context that has required to delete
              another Recipient Context is initialized with an invalid
              Replay Window</i><br>
          </div>
          <div><br>
          </div>
          <div>Is it the case that any Recipient Context created after
            some have been deleted is to have its Replay Window be
            invalid?</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Yes. Now rephrased as below.<br>
    <br>
    "If the new Recipient Context has been installed after the endpoint
    has experienced the overflow above, then the Recipient Context is
    initialized with an invalid Replay Window ..."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section "Authentication Credentials":</b></div>
          <div><i>The used format MUST provide the public key as well as
              the full set of information related to the public key
              algorithm</i><br>
          </div>
          <div><br>
          </div>
          <div>Could it be ambiguous what the "full set" is?</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Changed to "comprehensive set".<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section "Authentication Credentials":</b></div>
          <div><i>Storing whole authentication credentials rather than
              only a subset of those may result in a non-negligible
              storage overhead.</i><br>
          </div>
          <div><br>
          </div>
          <div>May be confusing as the previous paragraph is about only
            storing a subset of a chain or a bag. It could be clearer
            that this is an explanation and justification of a design
            choice.</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    The chain/bag is not a credential. The previous paragraph says that
    the actual credential is only the end-entity certificate provided
    within the chain/bag, and as such it is stored and used later on.<br>=

    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 2.4:</b></div>
          <div><i>Group OSCORE keys used for both signature and
              encryption MUST NOT be used for any other purposes than
              Group OSCORE.</i><br>
          </div>
          <div><br>
          </div>
          <div>The keys are also used towards the Group Manager, which
            arguably isn't exactly Group OSCORE, but rather the joining
            procedure.</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Rephrased as follows.<br>
    <br>
    "Group OSCORE keys used for both signature and encryption MUST be
    used only for purposes related to Group OSCORE. These include the
    processing of messages with Group OSCORE, as well as performing
    proof-of-possession of private keys, e.g., upon joining a group
    through the Group Manager (see Section 3)."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 2.4.3:</b></div>
          <div><i>On the other hand, when combining group and pairwise
              communication modes, this may result in the Partial IV
              values moving forward more often. This can happen when a
              client engages in frequent or long sequences of one-to-one
              exchanges with servers in the group, by sending requests
              over unicast.<br>
            </i></div>
          <div><br>
          </div>
          <div>True, but is it important to mention? What to do with
            this information?</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Added a sentence to clarify practical implications.<br>
    <br>
    "In turn, this contributes to a sooner exhaustion of the Sender
    Sequence Number space of the client, which would then require to
    take actions for deriving a new Sender Context before resuming
    communications in the group (see Section 2.5.2)."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section "Loss of Mutable Security Context":</b></div>
          <div><i style=3D"color: inherit; font-family: inherit;
              font-size: inherit; font-variant-ligatures: inherit;
              font-variant-caps: inherit; font-weight: inherit;">An
              adversary may leverage the above to perform a Denial of
              Service attack and prevent some group members from
              communicating altogether. That is, the adversary can first
              block the communication path between the Group Manager and
              some individual group members. This can be achieved, for
              instance, by injecting fake responses to DNS queries for
              the Group Manager hostname, or by removing a network link
              used for routing traffic towards the Group Manager. Then,
              the adversary can trigger a short power outage, which can
              result in a mass power-cycle and reboot for some endpoints
              in the group. After that, such endpoints that have lost
              their Sender Context and/or Recipient Contexts following
              the reboot would not be able to obtain new Security
              Context parameters from the Group Manager as specified
              above. Thus, they would not be able to further communicate
              in the group until connectivity with the Group Manager is
              restored.</i><br>
          </div>
          <div><br>
          </div>
          <div>Is this big section relevant to mention? If an adversary
            can induce power outages it can do a lot more damage, and in
            different ways. Perhaps it can be in the security
            considerations if kept.</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    This input came from another review and it conveniently fits here,
    since it builds on the exact context from the previous paragraphs in
    Section 2.5.1.1 (which would be quite hard to build again later on
    in the security considerations).<br>
    <br>
    I have however made some minor rephrasing as below.<br>
    <br>
    OLD:<br>
    "Then, the adversary can trigger a short power outage, which can
    result in a mass power-cycle and reboot for some endpoints in the
    group."<br>
    <br>
    NEW:<br>
    "Then, the adversary can induce a reboot for some endpoints in the
    group, e.g., by triggering a short power outage."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section "Exhaustion of Sender Sequence Number":</b></di=
v>
          <div><i>Exhaustion of Sender Sequence Number</i><br>
          </div>
          <div><br>
          </div>
          <div>May be enough with just a reference to the equivalent
            OSCORE section? And saying to retrieve new Security Context
            parameters from the GM</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Kept as is as the result of discussions/reviews on previous versions
    of the document.<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 2.5.3:</b></div>
          <div><i>The Recipient ID ('kid') SHOULD NOT be considered as a
              persistent and reliable indicator of a group member.</i><br=
>
          </div>
          <div><br>
          </div>
          <div>Identifier rather than indicator? Not 100% clear what an
            indicator is in this context.<br>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Changed to "identifier".<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div>
          </div>
          <div><br>
          </div>
          <div><b>Section 9.6:</b></div>
          <div><i style=3D"color: inherit; font-family: inherit;
              font-size: inherit; font-variant-ligatures: inherit;
              font-variant-caps: inherit; font-weight: inherit;">Also,
              upon the establishment of a new Security Context, the
              client re-initializes its Replay Windows in its Recipient
              Contexts (see {{sec-group-key-management}}).</i><br>
          </div>
          <div><br>
          </div>
          <div>Isn't this just like in OSCORE? In the sense that a new
            context gets a reset fresh replay window.</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Yes, with the difference that, in general, there are multiple
    Recipient Contexts within the same Security Context.<br>
    <br>
    However, I took the opportunity to fix a section reference, now
    correctly pointing to Section 2.2.<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 9.6:</b></div>
          <div><i>However, since the notification is protected in
              pairwise mode, the public key is not used for verifying a
              countersignature as in {{ssec-verify-response}}. Instead,
              the expected server's authentication credential - namely
              Recipient Auth Cred and including the server's public key
              - was taken as input to derive the Pairwise Recipient Key
              used to decrypt and verify the notification (see
              {{key-derivation-pairwise}}).</i><br>
          </div>
          <div><br>
          </div>
          <div>Just restating what is said shortly above?</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    Replaced the quoted text with the following sentence.<br>
    <br>
    "As to the expected server's authentication credential, the same
    holds as specified above for non-notification responses."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 11.6:</b></div>
          <div><i>The entity assigning an IP multicast address may help
              limiting the chances to experience such collisions of
              Group Identifiers.</i><br>
          </div>
          <div><br>
          </div>
          <div>Good to say that it is recommended to assign groups to
            different multicast IPs when possible?</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    The possible mapping between security groups and CoAP groups is
    actually discussed in the groupcomm-bis document.<br>
    <br>
    This paragraph was meant to suggest a different kind of help. I've
    now rephrased as below, to provide more context. <br>
    <br>
    "In case multiple groups use the same IP multicast address, the
    entity assigning that address may help limiting the chances to
    experience such collisions of Group Identifiers. In particular, it
    may allow the Group Managers of those groups using the same IP
    multicast address to share their respective list of assigned Group
    Identifiers currently in use."<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <div><br>
          </div>
          <div><b>Section 11.7.1:</b></div>
          <div><i>Upon receiving M2, there is a probability equal to
              2^-64 that Y successfully verifies the same unchanged MAC
              by using the Pairwise Recipient Key associated with X in
              G2.</i><br>
          </div>
          <div><br>
          </div>
          <div>I wonder why the probability is 2^-64, why is this attack
            better than simply forging a message to a group member (and
            hoping the MAC verifies)?</div>
        </div>
      </div>
    </blockquote>
    <br>
    =3D=3D&gt;MT<br>
    (Following some more section restructuring, this is now Section
    12.7.1)<br>
    <br>
    If one forges a message from scratch, one has indeed the same
    probability to build something that yields a successful decryption,
    i.e., such that the MAC verifies.<br>
    <br>
    On top of that, here the result would still be the message
    originally sent to G1, created as valid by its sender X.<br>
    &lt;=3D=3D<br>
    <br>
    <blockquote type=3D"cite"
cite=3D"mid:PAXP189MB15821EE1D41BC355AEAB97D483049@PAXP189MB1582.EURP189.=
PROD.OUTLOOK.COM">
      <div>
        <div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif;=

          font-size: 12pt; color: rgb(0, 0, 0);">
          <span></span><br>
        </div>
        <hr style=3D"display:inline-block;width:98%" tabindex=3D"-1">
        <div id=3D"divRplyFwdMsg" dir=3D"ltr"><font style=3D"font-size:11=
pt"
            face=3D"Calibri, sans-serif" color=3D"#000000"><b>From:</b> c=
ore
            <a class=3D"moz-txt-link-rfc2396E" href=3D"mailto:core-bounce=
s@ietf.org">&lt;core-bounces@ietf.org&gt;</a> on behalf of Rikard H=C3=B6=
glund
            <a class=3D"moz-txt-link-rfc2396E" href=3D"mailto:rikard.hogl=
und=3D40ri.se@dmarc.ietf.org">&lt;rikard.hoglund=3D40ri.se@dmarc.ietf.org=
&gt;</a><br>
            <b>Sent:</b> Tuesday, January 11, 2022 23:20<br>
            <b>To:</b> Jaime Jim=C3=A9nez <a class=3D"moz-txt-link-rfc239=
6E" href=3D"mailto:jaime@iki.fi">&lt;jaime@iki.fi&gt;</a>; <a class=3D"mo=
z-txt-link-abbreviated" href=3D"mailto:core@ietf.org">core@ietf.org</a>
            <a class=3D"moz-txt-link-rfc2396E" href=3D"mailto:core@ietf.o=
rg">&lt;core@ietf.org&gt;</a><br>
            <b>Subject:</b> Re: [core] =F0=9F=94=94 WG Last Call of
            draft-ietf-core-oscore-groupcomm</font>
          <div>=C2=A0</div>
        </div>
        <style type=3D"text/css" style=3D"display:none">p
	{margin-top:0;
	margin-bottom:0}</style>
        <div dir=3D"ltr">
          <table style=3D"border:0; display:table; width:100%;
            table-layout:fixed; border-collapse:seperate; float:none"
            width=3D"100%" cellspacing=3D"0" cellpadding=3D"0" border=3D"=
0"
            align=3D"left">
            <tbody>
              <tr>
                <td cellpadding=3D"7px 2px 7px 2px" style=3D"padding:7px =
2px
                  7px 2px; background-color:#A6A6A6" width=3D"1px"
                  valign=3D"middle" bgcolor=3D"#A6A6A6">
                  <br>
                </td>
                <td cellpadding=3D"7px 5px 7px 15px" color=3D"#212121"
                  style=3D"width:100%; background-color:#EAEAEA;
                  padding:7px 5px 7px 15px;
                  font-family:wf_segoe-ui_normal,Segoe UI,Segoe
                  WP,Tahoma,Arial,sans-serif; font-size:12px;
                  font-weight:normal; color:#212121; text-align:left;
                  word-wrap:break-word" width=3D"100%" valign=3D"middle"
                  bgcolor=3D"#EAEAEA">
                  <div><a class=3D"moz-txt-link-abbreviated" href=3D"mail=
to:rikard.hoglund=3D40ri.se@dmarc.ietf.org">rikard.hoglund=3D40ri.se@dmar=
c.ietf.org</a> liknar
                    n=C3=A5gon som tidigare har skickat e-post till dig, =
men
                    kanske inte =C3=A4r den personen.
                    <a
                      href=3D"http://aka.ms/LearnAboutSenderIdentificatio=
n"
                      moz-do-not-send=3D"true">Se varf=C3=B6r det h=C3=A4=
r kan vara
                      en risk</a></div>
                </td>
                <td cellpadding=3D"7px 5px 7px 5px" color=3D"#212121"
                  style=3D"width:75px; background-color:#EAEAEA;
                  padding:7px 5px 7px 5px;
                  font-family:wf_segoe-ui_normal,Segoe UI,Segoe
                  WP,Tahoma,Arial,sans-serif; font-size:12px;
                  font-weight:normal; color:#212121; text-align:left;
                  word-wrap:break-word" width=3D"75px" valign=3D"middle"
                  bgcolor=3D"#EAEAEA" align=3D"left">
                  <br>
                </td>
              </tr>
            </tbody>
          </table>
          <div>
            <div style=3D"font-family:Calibri,Arial,Helvetica,sans-serif;=

              font-size:12pt; color:rgb(0,0,0)">
              Hello.</div>
            <div style=3D"font-family:Calibri,Arial,Helvetica,sans-serif;=

              font-size:12pt; color:rgb(0,0,0)">
              <br>
            </div>
            <div style=3D"font-family:Calibri,Arial,Helvetica,sans-serif;=

              font-size:12pt; color:rgb(0,0,0)">
              I am working on a review that I unfortunately have not
              been able to finish yet. However I will be sending it out
              before the end of the week.</div>
            <div style=3D"font-family:Calibri,Arial,Helvetica,sans-serif;=

              font-size:12pt; color:rgb(0,0,0)">
              <br>
            </div>
            <div style=3D"font-family:Calibri,Arial,Helvetica,sans-serif;=

              font-size:12pt; color:rgb(0,0,0)">
              Best wishes</div>
            <div style=3D"font-family:Calibri,Arial,Helvetica,sans-serif;=

              font-size:12pt; color:rgb(0,0,0)">
              Rikard H=C3=B6glund</div>
            <hr tabindex=3D"-1" style=3D"display:inline-block; width:98%"=
>
            <div id=3D"x_divRplyFwdMsg" dir=3D"ltr"><font
                style=3D"font-size:11pt" face=3D"Calibri, sans-serif"
                color=3D"#000000"><b>From:</b> core
                <a class=3D"moz-txt-link-rfc2396E" href=3D"mailto:core-bo=
unces@ietf.org">&lt;core-bounces@ietf.org&gt;</a> on behalf of Jaime Jim=C3=
=A9nez
                <a class=3D"moz-txt-link-rfc2396E" href=3D"mailto:jaime@i=
ki.fi">&lt;jaime@iki.fi&gt;</a><br>
                <b>Sent:</b> Wednesday, December 1, 2021 16:59<br>
                <b>To:</b> <a class=3D"moz-txt-link-abbreviated" href=3D"=
mailto:core@ietf.org">core@ietf.org</a> <a class=3D"moz-txt-link-rfc2396E=
" href=3D"mailto:core@ietf.org">&lt;core@ietf.org&gt;</a><br>
                <b>Subject:</b> Re: [core] =F0=9F=94=94 WG Last Call of
                draft-ietf-core-oscore-groupcomm</font>
              <div>=C2=A0</div>
            </div>
            <div class=3D"x_BodyFragment"><font size=3D"2"><span
                  style=3D"font-size:11pt">
                  <div class=3D"x_PlainText">Dear all,<br>
                    <br>
                    the deadline for this WGLC is today. Given that we
                    have not received enough reviews and that the
                    Christmas period is arriving soon, we will have to
                    extend the deadline for this.
                    <br>
                    <br>
                    Marco and I propose 6 more weeks of extension until
                    2022-01-11 Tuesday, to give more ample time for
                    thorough reviews.<br>
                    <br>
                    Ciao!<br>
                    -- <br>
                    Jaime Jim=C3=A9nez<br>
                    <br>
                    On Tue, Nov 9, 2021, at 8:59 PM, Jaime Jim=C3=A9nez
                    wrote:<br>
                    &gt; Dear CoRE,<br>
                    &gt;<br>
                    &gt; as we discussed yesterday, the authors of <br>
                    &gt; draft-ietf-core-oscore-groupcomm think their
                    draft is ready for a 2nd <br>
                    &gt; WGLC. The current version of the draft (v13) is
                    not expecting any <br>
                    &gt; updates so you can start your planned reviews.<b=
r>
                    &gt;<br>
                    &gt; <a
href=3D"https://eur05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-core-oscore-groupcomm-1=
3&amp;data=3D04%7C01%7Cmarco.tiloca%40ri.se%7C0883879e9f3342c1031d08d9fd0=
fff88%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C637819068004013517%7CU=
nknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi=
LCJXVCI6Mn0%3D%7C1000&amp;sdata=3D5sS%2Fu%2B58zddw5LPOVraLom6TVHjVE0rbczC=
R0ZevvF4%3D&amp;reserved=3D0"
originalsrc=3D"https://datatracker.ietf.org/doc/html/draft-ietf-core-osco=
re-groupcomm-13"
shash=3D"R+KC3tZf4YbBljwrMBQqvx8PlBfiXV0OlkmNk9kXUm3ULgsoeyZ+WSCkbxsHU3OQ=
EXhc7Y58tIrzrwqy3esM0/4B4WvqgzTKsDBDvB0TiDofkNbY4t6ZQsuXq4G8wHaVCBZbDTOSH=
ufdD50yAH1UyI5AAXtwYTYKxsB1+yGd8JE=3D"
                      moz-do-not-send=3D"true">
https://eur05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatat=
racker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-core-oscore-groupcomm-13&amp;am=
p;data=3D04%7C01%7Crikard.hoglund%40ri.se%7Cc5146db032204faf125d08d9b4e3a=
676%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C637739712988375219%7CUnk=
nown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLC=
JXVCI6Mn0%3D%7C3000&amp;amp;sdata=3D6B7dEbJ8l4%2Bvc%2BxrMBiFxN6GRf7lAoi5F=
UZBI68cdNQ%3D&amp;amp;reserved=3D0</a><br>
                    &gt;<br>
                    &gt; In addition to the email list discussion
                    reviewers could consider <br>
                    &gt; opening new issues on the Github repo of the
                    draft as courtesy to the <br>
                    &gt; authors.<br>
                    &gt;<br>
                    &gt; <a
href=3D"https://eur05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fgithub.com%2Fcore-wg%2Foscore-groupcomm&amp;data=3D04%7C01%7Cmarco.til=
oca%40ri.se%7C0883879e9f3342c1031d08d9fd0fff88%7C5a9809cf0bcb413a838a09ec=
c40cc9e8%7C0%7C0%7C637819068004013517%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4=
wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3D=
5BtKKTLA9ZjZaVJkemzoHOhCYc%2Ba85bKYqWub3j2i2U%3D&amp;reserved=3D0"
originalsrc=3D"https://github.com/core-wg/oscore-groupcomm"
shash=3D"FEQu5iSbCA2TkPac/103I655Aaza96mOq9XwU8v+TVvLOLAN+d2ymMP6MzqiWFtj=
ru0ueoy/+O6yk11x1kJidC8c/W2aWRdVWQKrrLl8b45bQnCQ6HSQE8mt44HojyyjyjeF9vS1v=
Xgb0DgVc5EOPkUT8yfOFvRt5/3Y/7mwhvE=3D"
                      moz-do-not-send=3D"true">
https://eur05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgithu=
b.com%2Fcore-wg%2Foscore-groupcomm&amp;amp;data=3D04%7C01%7Crikard.hoglun=
d%40ri.se%7Cc5146db032204faf125d08d9b4e3a676%7C5a9809cf0bcb413a838a09ecc4=
0cc9e8%7C0%7C0%7C637739712988375219%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wL=
jAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;amp;sdat=
a=3DWFXtDpiQ1RRiW1hP1JeUx0%2F4%2F5i1UKOia9ZNT5NdIns%3D&amp;amp;reserved=3D=
0</a><br>
                    &gt;<br>
                    &gt; As we have the IETF ongoing and the document
                    needs time to be digested, <br>
                    &gt; we place the end of the call on the 1st of
                    December with a possibility <br>
                    &gt; of extension depending on the number of
                    reviews.<br>
                    &gt;<br>
                    &gt;&gt;From the minutes I take that CA, RH, ED and
                    TF would give it thorough look. Thank you already
                    for that, much appreciated!!<br>
                    &gt;<br>
                    &gt; Ciao!<br>
                    &gt; -- <br>
                    &gt; Jaime Jim=C3=A9nez<br>
                    &gt;<br>
                    &gt; _______________________________________________<=
br>
                    &gt; core mailing list<br>
                    &gt; <a class=3D"moz-txt-link-abbreviated" href=3D"ma=
ilto:core@ietf.org">core@ietf.org</a><br>
                    &gt; <a
href=3D"https://eur05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fcore&amp;data=3D04%7C01%7Cmarco.ti=
loca%40ri.se%7C0883879e9f3342c1031d08d9fd0fff88%7C5a9809cf0bcb413a838a09e=
cc40cc9e8%7C0%7C0%7C637819068004013517%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC=
4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=
=3Dag4Y%2BR1j7LSF4Vaua0XVGI7WP%2FYSXIzoXAd0rlAl5uA%3D&amp;reserved=3D0"
originalsrc=3D"https://www.ietf.org/mailman/listinfo/core"
shash=3D"OpSvshjzpNZfjGdbyq2byMYuMGWGThEiUhuHAq34NSs/V/Pehu8GfGHZ6an6m3kj=
6vrnWMYxArOdDQFJMqboowjDdN2HuN+pxDE5GX3jWe3BO57HqF3kXdNX/zehOh5UimCxWBIqx=
1Y32Fk2Nfi+9qUMjUg6hBtROtdW/qrBNaI=3D"
                      moz-do-not-send=3D"true">
https://eur05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
etf.org%2Fmailman%2Flistinfo%2Fcore&amp;amp;data=3D04%7C01%7Crikard.hoglu=
nd%40ri.se%7Cc5146db032204faf125d08d9b4e3a676%7C5a9809cf0bcb413a838a09ecc=
40cc9e8%7C0%7C0%7C637739712988375219%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4w=
LjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;amp;sda=
ta=3DO4bk%2Fdhhl6idWhXDkqxWNUyGOUgUp4fqVkeU0hYkCDE%3D&amp;amp;reserved=3D=
0</a><br>
                    <br>
                    _______________________________________________<br>
                    core mailing list<br>
                    <a class=3D"moz-txt-link-abbreviated" href=3D"mailto:=
core@ietf.org">core@ietf.org</a><br>
                    <a
href=3D"https://eur05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fcore&amp;data=3D04%7C01%7Cmarco.ti=
loca%40ri.se%7C0883879e9f3342c1031d08d9fd0fff88%7C5a9809cf0bcb413a838a09e=
cc40cc9e8%7C0%7C0%7C637819068004013517%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC=
4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=
=3Dag4Y%2BR1j7LSF4Vaua0XVGI7WP%2FYSXIzoXAd0rlAl5uA%3D&amp;reserved=3D0"
originalsrc=3D"https://www.ietf.org/mailman/listinfo/core"
shash=3D"OpSvshjzpNZfjGdbyq2byMYuMGWGThEiUhuHAq34NSs/V/Pehu8GfGHZ6an6m3kj=
6vrnWMYxArOdDQFJMqboowjDdN2HuN+pxDE5GX3jWe3BO57HqF3kXdNX/zehOh5UimCxWBIqx=
1Y32Fk2Nfi+9qUMjUg6hBtROtdW/qrBNaI=3D"
                      moz-do-not-send=3D"true">https://eur05.safelinks.pr=
otection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistin=
fo%2Fcore&amp;amp;data=3D04%7C01%7Crikard.hoglund%40ri.se%7Cc5146db032204=
faf125d08d9b4e3a676%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C63773971=
2988375219%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC=
JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;amp;sdata=3DO4bk%2Fdhhl6idWhXDkqx=
WNUyGOUgUp4fqVkeU0hYkCDE%3D&amp;amp;reserved=3D0</a><br>
                  </div>
                </span></font></div>
          </div>
        </div>
      </div>
      <br>
      <fieldset class=3D"moz-mime-attachment-header"></fieldset>
      <pre class=3D"moz-quote-pre" wrap=3D"">____________________________=
___________________
core mailing list
<a class=3D"moz-txt-link-abbreviated" href=3D"mailto:core@ietf.org">core@=
ietf.org</a>
<a class=3D"moz-txt-link-freetext" href=3D"https://www.ietf.org/mailman/l=
istinfo/core">https://www.ietf.org/mailman/listinfo/core</a>
</pre>
    </blockquote>
    <br>
    <pre class=3D"moz-signature" cols=3D"72">--=20
Marco Tiloca
Ph.D., Senior Researcher

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

RISE Research Institutes of Sweden
<a class=3D"moz-txt-link-freetext" href=3D"https://www.ri.se">https://www=
=2Eri.se</a>

Phone: +46 (0)70 60 46 501
Isafjordsgatan 22 / Kistag=C3=A5ngen 16
SE-164 40 Kista (Sweden)</pre>
  </body>
</html>

--------------9aMplPWxz2FGJIGawP9p8ud8--

--------------piyfBYxvaNogxmp0E37xjJ0s
Content-Type: application/pgp-keys; name="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Disposition: attachment; filename="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFSNeRUBCAC44iazWzj/PE3TiAlBsaWna0JbdIAJFHB8PLrqthI0ZG7GnCLN
R8ZhDz6ZaRDPC4FR3UcMhPgZpJIqa6Zi8yWYCqF7A7QhT7E1WdQR1G0+6xUEd0ZD
+QBdf29pQadrVZAt0G4CkUnq5H+Sm05aw2Cpv3JfsATVaemWmujnMTvZ3dFudCGN
dsY6kPSVzMRyedX7ArLXyF+0Kh1T4WUW6NHfEWltnzkcqRhn2NcZtADsxWrMBgZX
kLE/dP67SnyFjWYpz7aNpxxA+mb5WBT+NrSetJlljT0QOXrXMGh98GLfNnLAl6gJ
ryE6MZazN5oxkJgkAep8SevFXzglj7CAsh4PABEBAAHNJ01hcmNvIFRpbG9jYSA8
bWFyY28udGlsb2NhODRAZ21haWwuY29tPsLAewQTAQIAJQIbAwYLCQgHAwIGFQgC
CQoLBBYCAwECHgECF4AFAlSNerkCGQEACgkQ7iZktA5Y2kMiuwgAt/bVZKqD92JN
WDTX6h1MUsgejwj4RXs6UYqFdWW/4nw4mFHzYS+gBjOQAWCBhzVZLOk6gKcRZ/s8
6ncVygiDUh9fbSDTcuzOp2qgu9nsc8sEsYp1hwmiIEbI6FHPtyeQQNilsfU8+VHX
2C9yQtMK/OXlf5qNkJMj9k55u+e1ELQ2sjUXkMB4MxMhmi/3P3hMz9PDcB66BtQc
DFYkx5PIaz/izCST0o28AJq0dionJpPsQ+hFOIAkJi6aCAt3xQf0KnXlAczWxCD3
J3XTFK4MES/b3n3oc2GJY8I+tsfT5jpNsWhfWGBkMaQSKZ939D4oFAhAq3gnNRgZ
szJeTvsMvcLAeAQTAQIAIgUCVI15FQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgEC
F4AACgkQ7iZktA5Y2kNZdgf/drEFkXWpz9pPm0/ZwNNfXzHkpGLqcfPlvQaSNFFb
oHwJaeKZ6s3dCGpzDlV6bLrRM9LN/sgNRT0eNiElJHtKDW/fqvzrHl3LCsDKed4L
K4Gg2mE0nvWvTno9Nyza8TatJm1+V2S7MbDgSE/F26QK2VL9Y/ur5BHgUI34mUar
4iE1Aq7nsFbN6NEvamyQPWlkN+rCjtnT0+NLGb5VnDVKAHSgiYgGQeDvlisWb9Nt
sxzXf1qge3tlCufadSWXyqa4oOq4hEcD3GBUQVuGfBNa7r0mqHzVZf0qd+Kxzs6D
p9LxTGp7aSjiXN6cBoapz7lSP0wXOgSzIJ1X2UtVssKv28LBYgQTAQoADAUCVZFC
zwWDB4YfgAAKCRBo+Jp/4mFufTrAEACwA4G0VlNs1JOAMgIOfE96v1lVsJiI9qod
5Njc1jlXqItPKDXzvmTJACy7JfA2UbRbwkym7eCc94jkQU6XdTzv8Qf6rpbVZhzF
9tNL38mzm8emh5vV3XDy8arElEP7bE9Jfgm23Lm9OEwubbtjLYf0z7poncThsYUu
aEexnxUVF/PXNMIlVBXil/27HkhuWKhpJQU7A35YiJz+lalfGS+9OSv9nJD9mdoT
Nk4eSG2sfYKRKs6rmN3X+J9ZITs9Hnpncgu3coayZaL69iicZ4ge1KXACiGG0zpK
666d5ByWgWU7PRqiFIkXwHDW1esZ/QHIJFIXN9zpCD5KaSctvj+tFPNTz2+quiVS
nWWQFv/92zRTS4SJgxXP6I3nTasuC6KJy+JnMNfzOVpj05Ef1lXuncc4kLCqd2As
1S6e/OC5Mdo5jQhe0Ozju5IwhRCoqKe1huSj4mbpaTvCjKyh67zVsJR/xDHFDzgt
doCsRRQQxWME8+V95FqsleNd1QfEU/jM+HS4JWTDwFs+f1kHzzwhDHWs73M0/jvs
8mUGlfRwSQVDfN6ygbuCn/i2Lvvtc2RWbxWGJVekG8x2rFxUOQ7B2DqmxBrRX3GL
okNJ7eWrLNLlYXGA7ptoGWLKQ1FcNNIgapKbxd0s5+s3ql7EaGViJ84ozNX5q52b
RceaSihi4s0cTWFyY28gVGlsb2NhIDxtYXJjb0BzaWNzLnNlPsLAeAQTAQIAIgUC
VI16cwIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQ7iZktA5Y2kNxXggA
hFyfi+VlqgIj5a54npaUoREoQ5Tj8gzUPmqOXddo0q9f1cQn/+ehKpbb3TDVzO35
HBXZvuFGn5DHBUYhqBFWTx+H5zHgGBRhF0imQ9Yi/gHe2StgrSIa5528iV2g47Oy
DDlSCoCWEM4WwWkJqv9CP2J53Gb63UOPuq5j+BF9wtDs6M6YAs9GdHIDhvUJWGDh
OZevyp/DWE5d3LCI+HJIajDjhJK02kVg47aBusW40mGXmjWmtJXP+QtZRfSaabFx
CVE3APBn+P4zuyb+mk1gwkN51OiFuYQr1ig3M55kaoGbrs57fVuGtaC9DSc1vgai
cJQrYpCbOrbR/yZAedz3xcLBYgQTAQoADAUCVZFCzgWDB4YfgAAKCRBo+Jp/4mFu
fWd/D/9PO2eZHdU0Rxr4f0EmNqhMnA6KKIo141DQnpQNqHs0RUgDlDUN1qHjgv1U
xu3gbtJoQ4PbT9rJan4Oem7/NJQxU6tsa/dFjDyn9txVGppd12pVFcnGRcDNhLDz
ALgZN1ABxfpOh4hQy79qn69Stn0GsSnK6gEq/+3+KROA0ZKEDWcE2rVEzw4UEv37
BUaVnBnHYvNQRQVY8hc43qi3WWUhM3Ot0Z+peAV7D3Y5ZkaSLN6kFoZPZFhrf0fh
lLx0ajFIIRDQ8R8ThXXcRopWhw+ifUFdtXoW0goWPFqOkgJw1HYNbYjT4G4DvUAY
t5ueCOP6MNXEkDS4r1Hz5JDemtee+FIoaIWbma+ccL3gceoQXwvMtNu1MYFN/n13
YYlqwg9AyIkobG56OeW4o9qqkNjb3GlX+cw6f4uf7l29IF7i3jOFh4GXlYoevYiw
9EpnqLWkWgm5KbT+J9h/tkgt99GXfGkfLzpyjU563esgxpIwWX586ssWlbJWlAPz
Cf3do08MiLWTRVcrY6pXVTGAF/c41uC6520+RFm4ytAfrefNac1+5eZBG5k84sTd
V9aamCAWkUIEaNQkTfMB7xSXAlq2T8I+kHJCsLSKXXPFdjMJtVRWSZ/gzaBE7cbE
Lu9KaHyVRAxNKSsMInAmn/FsxnW6VFaseoT5OtxTMuAnROjB0M02TWFyY28gVGls
b2NhIChtYXJjby50aWxvY2FAcmkuc2UpIDxtYXJjby50aWxvY2FAcmkuc2U+wsB3
BBMBCAAhBQJaQCeQAhsDBQsJCAcCBhUICQoLAgQWAgMBAh4BAheAAAoJEO4mZLQO
WNpDAS8IAIko8kg8YfSgacsljgbUjYOA2LJUq3UfiSRz95PwHP05JsDGBmjcmTLf
zZ7gNtprJatBEV6fRotIW7NtTgFfg79hFJoipQ7crBQ07WJMLrk4fPReKsaiE9Q6
xzRIQy2mb7jN9gbsbynfkwrSH2CnCAYwbSPSZlfhEOO7LALzyLVXELAxYZplGVSs
9eQLeeoMNFw+24QamdxaEBVC3Zmp7IhO/0oJSYOe2Zcs97q8Re058j1ncd6p4jw6
QbBemi1WhuAtr+ZWYWPoQAsPOPscLa61+DEQIEl12ZwMieu8aBORm1cRVvItC6Ir
bSUmZieY9Y3wNdpVVpDhc/+VdSvOgTPOwE0EVI15FQEIAJaan6TouRjj97Lt4Du6
ZhVzbaLJWoARebLANjMSN7BjBFyNOsf83HUSrCMgO5b4EESgwtFk4cKCaOjodGZY
i61xhUK32J6iS6W2Siv0EGhBU+Ij5OnnU6nTaJ+QZysRA1mLurd+Y62EVnBno0md
RsDZvJxopnygKW8MJCPoCMTJ0E+dLvdRoSgOyqwZWNnAKF84yDk7IWb3RCOkjDyb
S4NVwLMop/GrdP/Pu3JGC5whR7zgTMG64kERISMr+EXSdHYsOHVKEPb0VasVlI1V
UJW7VRhksBrJ/ygoocekz7CF+MRg7hewOlXjNDXkD4PXkdGIdHoB1/g8O08zUMLC
CCMAEQEAAcLAXwQYAQIACQUCVI15FQIbDAAKCRDuJmS0DljaQ8YTB/9Y2NPLfPvi
8uYfJxWwVdehDxbX7znyZHIB3RrwljNjfEHsJW2ojcfLz3hBzDgfobv30DU4v0HU
R4DxiPdo7PQ1tTJ/kZb6Ki2veHz4ogI5hnfj8FBo4vN28M2ZGgYef415POEXt5J6
I8qLaN7H41Wh2GM5UZfDwSFgaR5ku/KccRuiIszhNvI9tVH0ex1WooZVMPEpITed
qajeS+1jqzJEUiJTPlbMl9gC6pu3qbdPEMRvywD2nNou6GZ+clFzXYfk1VkRmYT8
SQkVOWQ/jCdnI5J/+vb9V3SIdq4HC/ntyljocUUx7uu8rizswTnNy04SXLkLo0K7
Vlo211S6oNI8
=3DAOQG
-----END PGP PUBLIC KEY BLOCK-----

--------------piyfBYxvaNogxmp0E37xjJ0s--

--------------rm4TP0CbDk3Jn1Avg9cEcWlj--

--------------AxsIlcUZOyf4ttw0cjqxWPao
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOEo4cV326Z7GypVg7iZktA5Y2kMFAmIjQoYFAwAAAAAACgkQ7iZktA5Y2kMa
cgf/aY6a+BzIg7GdJ5y155A3Gdf8oFM8NtlLSFEA2j640m0yOvpbpflje67w9Vf+r56p7RZt2A5V
p6MnOGYi/1dB7Kc79PnkNWk0xOOE/Vrfjujzl46JrOuQYjAl68ZKQgFDuYpw5LBDxENSTYiMIO7s
kz+9Q0VaYlyAHLgbh17P2zqKn3GZddZREsaPh0Uh9qclf963+rqhWYFUM7CMK7k16c9oBMXoDGSt
rIui7gmSGLoqb61kj9BkoM1hBBiFUBC2H2cV7vQsTLDNbw+lQe9K74ijQ8MoUp+SjTOXqH0r1jSK
QxTuRYs9KaodqyV64sq/waLXgyjkxnTwMVRNzMmtPg==
=44gV
-----END PGP SIGNATURE-----

--------------AxsIlcUZOyf4ttw0cjqxWPao--


From nobody Mon Mar  7 10:21:54 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C63A83A19DB; Mon,  7 Mar 2022 10:21:44 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164667730475.31783.4280856776535283703@ietfa.amsl.com>
Date: Mon, 07 Mar 2022 10:21:44 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/WgiXVtFVP34hC0J-bYoK9EwYFUE>
Subject: [core] I-D Action: draft-ietf-core-groupcomm-bis-06.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 18:21:52 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : Group Communication for the Constrained Application Protocol (CoAP)
        Authors         : Esko Dijk
                          Chonggang Wang
                          Marco Tiloca
	Filename        : draft-ietf-core-groupcomm-bis-06.txt
	Pages           : 76
	Date            : 2022-03-07

Abstract:
   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-groupcomm-bis/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-groupcomm-bis-06.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-groupcomm-bis-06


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Mon Mar  7 10:23:43 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8AEDE3A193B; Mon,  7 Mar 2022 10:23:34 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164667741450.26297.10095862953004023017@ietfa.amsl.com>
Date: Mon, 07 Mar 2022 10:23:34 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ERuha8b9gG96Asl7g6DaQar2FV8>
Subject: [core] I-D Action: draft-ietf-core-oscore-groupcomm-14.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 18:23:42 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : Group OSCORE - Secure Group Communication for CoAP
        Authors         : Marco Tiloca
                          Göran Selander
                          Francesca Palombini
                          John Preuss Mattsson
                          Jiye Park
	Filename        : draft-ietf-core-oscore-groupcomm-14.txt
	Pages           : 103
	Date            : 2022-03-07

Abstract:
   This document defines Group Object Security for Constrained RESTful
   Environments (Group OSCORE), providing end-to-end security of CoAP
   messages exchanged between members of a group, e.g., sent over IP
   multicast.  In particular, the described approach defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with any other
   member of the group for pairwise OSCORE communication.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-oscore-groupcomm/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-oscore-groupcomm-14.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-oscore-groupcomm-14


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Mon Mar  7 10:25:58 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F0123A11C5; Mon,  7 Mar 2022 10:25:56 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164667755652.3372.15599839111434629401@ietfa.amsl.com>
Date: Mon, 07 Mar 2022 10:25:56 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/MnF20kNFM7MVJ0zsqaZeqOmFD-A>
Subject: [core] I-D Action: draft-ietf-core-observe-multicast-notifications-03.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 18:25:57 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : Observe Notifications as CoAP Multicast Responses
        Authors         : Marco Tiloca
                          Rikard Höglund
                          Christian Amsüss
                          Francesca Palombini
	Filename        : draft-ietf-core-observe-multicast-notifications-03.txt
	Pages           : 80
	Date            : 2022-03-07

Abstract:
   The Constrained Application Protocol (CoAP) allows clients to
   "observe" resources at a server, and receive notifications as unicast
   responses upon changes of the resource state.  In some use cases,
   such as based on publish-subscribe, it would be convenient for the
   server to send a single notification addressed to all the clients
   observing a same target resource.  This document updates RFC7252 and
   RFC7641, and defines how a server sends observe notifications as
   response messages over multicast, synchronizing all the observers of
   a same resource on a same shared Token value.  Besides, this document
   defines how Group OSCORE can be used to protect multicast
   notifications end-to-end between the server and the observer clients.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-observe-multicast-notifications/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-observe-multicast-notifications-03.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-observe-multicast-notifications-03


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Mon Mar  7 10:27:35 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 250A93A16B0; Mon,  7 Mar 2022 10:27:28 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164667764812.9045.7945445074240339676@ietfa.amsl.com>
Date: Mon, 07 Mar 2022 10:27:28 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/Sd2hqer5J1O1x_looMKGtJQ8g-s>
Subject: [core] I-D Action: draft-ietf-core-oscore-edhoc-03.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 18:27:34 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : Profiling EDHOC for CoAP and OSCORE
        Authors         : Francesca Palombini
                          Marco Tiloca
                          Rikard Hoeglund
                          Stefan Hristozov
                          Goeran Selander
	Filename        : draft-ietf-core-oscore-edhoc-03.txt
	Pages           : 26
	Date            : 2022-03-07

Abstract:
   The lightweight authenticated key exchange protocol EDHOC can be run
   over CoAP and used by two peers to establish an OSCORE Security
   Context.  This document further profiles this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first subsequent OSCORE
   transaction.  This combination reduces the number of round trips
   required to set up an OSCORE Security Context and to complete an
   OSCORE transaction using that Security Context.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-oscore-edhoc/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-oscore-edhoc-03.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-oscore-edhoc-03


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Mon Mar  7 10:29:14 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BCAE3A17CC; Mon,  7 Mar 2022 10:29:00 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164667774048.25313.14539075256832228380@ietfa.amsl.com>
Date: Mon, 07 Mar 2022 10:29:00 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/_goCjCSkYiF5BLd9OYJuIT-Dt3E>
Subject: [core] I-D Action: draft-ietf-core-oscore-key-update-01.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 18:29:08 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : Key Update for OSCORE (KUDOS)
        Authors         : Rikard Höglund
                          Marco Tiloca
	Filename        : draft-ietf-core-oscore-key-update-01.txt
	Pages           : 45
	Date            : 2022-03-07

Abstract:
   Object Security for Constrained RESTful Environments (OSCORE) uses
   AEAD algorithms to ensure confidentiality and integrity of exchanged
   messages.  Due to known issues allowing forgery attacks against AEAD
   algorithms, limits should be followed on the number of times a
   specific key is used for encryption or decryption.  This document
   defines how two OSCORE peers must follow these limits and what steps
   they must take to preserve the security of their communications.
   Therefore, this document updates RFC8613.  Furthermore, this document
   specifies Key Update for OSCORE (KUDOS), a lightweight procedure that
   two peers can use to update their keying material and establish a new
   OSCORE Security Context.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-oscore-key-update/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-oscore-key-update-01.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-oscore-key-update-01


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Mon Mar  7 12:49:15 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E59DC3A0A9A; Mon,  7 Mar 2022 12:49:06 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164668614689.9161.17380622352897740691@ietfa.amsl.com>
Date: Mon, 07 Mar 2022 12:49:06 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/BCyQiBaSCl2TGkKrJWxDmjrrFGk>
Subject: [core] I-D Action: draft-ietf-core-coral-05.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 20:49:08 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : The Constrained RESTful Application Language (CoRAL)
        Authors         : Christian Amsüss
                          Thomas Fossati
	Filename        : draft-ietf-core-coral-05.txt
	Pages           : 48
	Date            : 2022-03-07

Abstract:
   The Constrained RESTful Application Language (CoRAL) defines a data
   model and interaction model as well as a compact serialization
   formats for the description of typed connections between resources on
   the Web ("links"), possible operations on such resources ("forms"),
   and simple resource metadata.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-coral/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-coral-05.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-coral-05


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Mon Mar  7 13:33:09 2022
Return-Path: <mlenders@zedat.fu-berlin.de>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 689653A15CF for <core@ietfa.amsl.com>; Mon,  7 Mar 2022 13:32:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level: 
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zrHDvES1ydFD for <core@ietfa.amsl.com>; Mon,  7 Mar 2022 13:32:51 -0800 (PST)
Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6ED63A11FE for <core@ietf.org>; Mon,  7 Mar 2022 13:32:19 -0800 (PST)
Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.94) for core@ietf.org with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (envelope-from <mlenders@zedat.fu-berlin.de>) id 1nRKxk-0008C8-Uj; Mon, 07 Mar 2022 22:32:16 +0100
Received: from ip5b424bda.dynamic.kabel-deutschland.de ([91.66.75.218] helo=[192.168.5.38]) by inpost2.zedat.fu-berlin.de (Exim 4.94) for core@ietf.org with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (envelope-from <m.lenders@fu-berlin.de>) id 1nRKxk-0048hW-Ks; Mon, 07 Mar 2022 22:32:16 +0100
Content-Type: multipart/alternative; boundary="------------gTfZSzvnoe7OwK001LRyF3FZ"
Message-ID: <1b201e59-4c04-025c-c8f5-20270ec8ee72@fu-berlin.de>
Date: Mon, 7 Mar 2022 22:32:15 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.6.2
References: <164668804149.3268.13405153308479622209@ietfa.amsl.com>
Content-Language: en-US
To: "core@ietf.org" <core@ietf.org>
From: Martine Sophie Lenders <m.lenders@fu-berlin.de>
In-Reply-To: <164668804149.3268.13405153308479622209@ietfa.amsl.com>
X-Forwarded-Message-Id: <164668804149.3268.13405153308479622209@ietfa.amsl.com>
X-Original-Sender: m.lenders@fu-berlin.de
X-Originating-IP: 91.66.75.218
X-ZEDAT-Hint: A
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/nadBtAAm478K2uRRniymqE6lsuk>
Subject: [core] Fwd: New Version Notification for draft-lenders-dns-over-coap-03.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 21:33:05 -0000

This is a multi-part message in MIME format.
--------------gTfZSzvnoe7OwK001LRyF3FZ
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi!

We have published a new version of our DNS over CoAP draft. The most 
important changes are:

-  Clarify server selection to be out-of-band and define "core.dns" 
resource type in Section 3 and Section 8.2
- Add message manipulation considerations for DoC servers in Section 5.1
- Update Considerations for Unencrypted Use in Section 6

Klaus Hartke started a discussion about the direction of our current 
approach [1] which we currently deliberate about among the co-authors 
and will provide a response to it soon and will also pick up during our 
IETF 113 meeting presentation.

Additional feedback is, of course, always welcome.

Cheers,
Martine

[1] https://github.com/anr-bmbf-pivot/draft-dns-over-coap/issues/18

-------- Weitergeleitete Nachricht --------
Betreff: 	New Version Notification for draft-lenders-dns-over-coap-03.txt
Datum: 	Mon, 07 Mar 2022 13:20:41 -0800
Von: 	internet-drafts@ietf.org
An: 	Thomas C. Schmidt <t.schmidt@haw-hamburg.de>, Cenk Gündoğan 
<cenk.guendogan@haw-hamburg.de>, Christian Amsüss 
<christian@amsuess.com>, Matthias Wählisch <m.waehlisch@fu-berlin.de>, 
Cenk Gundogan <cenk.guendogan@haw-hamburg.de>, Christian Amsuess 
<christian@amsuess.com>, Martine Lenders <m.lenders@fu-berlin.de>, 
Martine Sophie Lenders <m.lenders@fu-berlin.de>, Matthias Waehlisch 
<m.waehlisch@fu-berlin.de>, Thomas Schmidt <t.schmidt@haw-hamburg.de>




A new version of I-D, draft-lenders-dns-over-coap-03.txt
has been successfully submitted by Martine Lenders and posted to the
IETF repository.

Name: draft-lenders-dns-over-coap
Revision: 03
Title: DNS Queries over CoAP (DoC)
Document date: 2022-03-07
Group: Individual Submission
Pages: 14
URL: https://www.ietf.org/archive/id/draft-lenders-dns-over-coap-03.txt
Status: https://datatracker.ietf.org/doc/draft-lenders-dns-over-coap/
Html: https://www.ietf.org/archive/id/draft-lenders-dns-over-coap-03.html
Htmlized: https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap
Diff: https://www.ietf.org/rfcdiff?url2=draft-lenders-dns-over-coap-03

Abstract:
This document defines a protocol for sending DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages are
protected by DTLS-Secured CoAP (CoAPS) or Object Security for
Constrained RESTful Environments (OSCORE) to provide encrypted DNS
message exchange for constrained devices in the Internet of Things
(IoT).



The IETF Secretariat
--------------gTfZSzvnoe7OwK001LRyF3FZ
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<html data-lt-installed="true">
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body spellcheck="false" data-gramm="false">
    Hi!<br>
    <br>
    We have published a new version of our DNS over CoAP draft. The most
    important changes are:<br>
    <br>
    -  Clarify server selection to be out-of-band and define "core.dns"
    resource type in Section 3 and Section 8.2<br>
    - Add message manipulation considerations for DoC servers in Section
    5.1<br>
    - Update Considerations for Unencrypted Use in Section 6<br>
    <br>
    Klaus Hartke started a discussion about the direction of our current
    approach [1] which we currently deliberate about among the
    co-authors and will provide a response to it soon and will also pick
    up during our IETF 113 meeting presentation.<br>
    <br>
    Additional feedback is, of course, always welcome.<br>
    <br>
    Cheers,<br>
    Martine<br>
    <br>
    [1] <a class="moz-txt-link-freetext" href="https://github.com/anr-bmbf-pivot/draft-dns-over-coap/issues/18">https://github.com/anr-bmbf-pivot/draft-dns-over-coap/issues/18</a><br>
    <div class="moz-forward-container"><br>
      -------- Weitergeleitete Nachricht --------
      <table class="moz-email-headers-table" cellspacing="0"
        cellpadding="0" border="0">
        <tbody>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Betreff:
            </th>
            <td>New Version Notification for
              draft-lenders-dns-over-coap-03.txt</td>
          </tr>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Datum: </th>
            <td>Mon, 07 Mar 2022 13:20:41 -0800</td>
          </tr>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Von: </th>
            <td><a class="moz-txt-link-abbreviated" href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>
          </tr>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">An: </th>
            <td>Thomas C. Schmidt <a class="moz-txt-link-rfc2396E" href="mailto:t.schmidt@haw-hamburg.de">&lt;t.schmidt@haw-hamburg.de&gt;</a>, Cenk
              Gündoğan <a class="moz-txt-link-rfc2396E" href="mailto:cenk.guendogan@haw-hamburg.de">&lt;cenk.guendogan@haw-hamburg.de&gt;</a>, Christian
              Amsüss <a class="moz-txt-link-rfc2396E" href="mailto:christian@amsuess.com">&lt;christian@amsuess.com&gt;</a>, Matthias Wählisch
              <a class="moz-txt-link-rfc2396E" href="mailto:m.waehlisch@fu-berlin.de">&lt;m.waehlisch@fu-berlin.de&gt;</a>, Cenk Gundogan
              <a class="moz-txt-link-rfc2396E" href="mailto:cenk.guendogan@haw-hamburg.de">&lt;cenk.guendogan@haw-hamburg.de&gt;</a>, Christian Amsuess
              <a class="moz-txt-link-rfc2396E" href="mailto:christian@amsuess.com">&lt;christian@amsuess.com&gt;</a>, Martine Lenders
              <a class="moz-txt-link-rfc2396E" href="mailto:m.lenders@fu-berlin.de">&lt;m.lenders@fu-berlin.de&gt;</a>, Martine Sophie Lenders
              <a class="moz-txt-link-rfc2396E" href="mailto:m.lenders@fu-berlin.de">&lt;m.lenders@fu-berlin.de&gt;</a>, Matthias Waehlisch
              <a class="moz-txt-link-rfc2396E" href="mailto:m.waehlisch@fu-berlin.de">&lt;m.waehlisch@fu-berlin.de&gt;</a>, Thomas Schmidt
              <a class="moz-txt-link-rfc2396E" href="mailto:t.schmidt@haw-hamburg.de">&lt;t.schmidt@haw-hamburg.de&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <br>
      A new version of I-D, draft-lenders-dns-over-coap-03.txt<br>
      has been successfully submitted by Martine Lenders and posted to
      the<br>
      IETF repository.<br>
      <br>
      Name: draft-lenders-dns-over-coap<br>
      Revision: 03<br>
      Title: DNS Queries over CoAP (DoC)<br>
      Document date: 2022-03-07<br>
      Group: Individual Submission<br>
      Pages: 14<br>
      URL:
      <a class="moz-txt-link-freetext" href="https://www.ietf.org/archive/id/draft-lenders-dns-over-coap-03.txt">https://www.ietf.org/archive/id/draft-lenders-dns-over-coap-03.txt</a><br>
      Status:
      <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/draft-lenders-dns-over-coap/">https://datatracker.ietf.org/doc/draft-lenders-dns-over-coap/</a><br>
      Html:
      <a class="moz-txt-link-freetext" href="https://www.ietf.org/archive/id/draft-lenders-dns-over-coap-03.html">https://www.ietf.org/archive/id/draft-lenders-dns-over-coap-03.html</a><br>
      Htmlized:
      <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap">https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap</a><br>
      Diff:
      <a class="moz-txt-link-freetext" href="https://www.ietf.org/rfcdiff?url2=draft-lenders-dns-over-coap-03">https://www.ietf.org/rfcdiff?url2=draft-lenders-dns-over-coap-03</a><br>
      <br>
      Abstract:<br>
      This document defines a protocol for sending DNS messages over the<br>
      Constrained Application Protocol (CoAP). These CoAP messages are<br>
      protected by DTLS-Secured CoAP (CoAPS) or Object Security for<br>
      Constrained RESTful Environments (OSCORE) to provide encrypted DNS<br>
      message exchange for constrained devices in the Internet of Things<br>
      (IoT).<br>
      <br>
      <br>
      <br>
      The IETF Secretariat<br>
    </div>
  </body>
</html>

--------------gTfZSzvnoe7OwK001LRyF3FZ--


From nobody Mon Mar  7 14:23:44 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 923FA3A0EFA; Mon,  7 Mar 2022 14:23:33 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164669181354.9415.792188542891550207@ietfa.amsl.com>
Date: Mon, 07 Mar 2022 14:23:33 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/X8fZ4y6nw4zW_0_F5eCum3SEKrw>
Subject: [core] I-D Action: draft-ietf-core-href-10.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 22:23:34 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : Constrained Resource Identifiers
        Authors         : Carsten Bormann
                          Henk Birkholz
	Filename        : draft-ietf-core-href-10.txt
	Pages           : 25
	Date            : 2022-03-07

Abstract:
   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.

   The present revision -10 of this draft contains an experimental
   addition that allows representing user information
   (https://alice@chains.example) in the URI authority component.  This
   feature lacks test vectors and implementation experience at the time
   of writing and requires discussion.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-href/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-href-10.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-href-10


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Mon Mar  7 14:44:39 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 336173A1189; Mon,  7 Mar 2022 14:44:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RreXnyTSPmga; Mon,  7 Mar 2022 14:44:12 -0800 (PST)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E62D43A1113; Mon,  7 Mar 2022 14:44:11 -0800 (PST)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KCD605lT9zDCdf; Mon,  7 Mar 2022 23:44:08 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <162625700369.11227.18056605126082947991@ietfa.amsl.com>
Date: Mon, 7 Mar 2022 23:44:08 +0100
Cc: The IESG <iesg@ietf.org>, draft-ietf-core-yang-cbor@ietf.org, core-chairs@ietf.org, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>, Marco Tiloca <marco.tiloca@ri.se>
X-Mao-Original-Outgoing-Id: 668385848.139425-8b1001c490edae73a09daef4c9655da7
Content-Transfer-Encoding: quoted-printable
Message-Id: <15D47BED-3340-43F3-B29E-A6E4B760ED4D@tzi.org>
References: <162625700369.11227.18056605126082947991@ietfa.amsl.com>
To: =?utf-8?Q?=C3=89ric_Vyncke?= <evyncke@cisco.com>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ScaUSnSP7ZcFx7yByBrtuWwsles>
Subject: Re: [core]  =?utf-8?q?=C3=89ric_Vyncke=27s_No_Objection_on_draft-ietf?= =?utf-8?q?-core-yang-cbor-16=3A_=28with_COMMENT=29?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 22:44:24 -0000

Hi =C3=89ric,

a little blast from the past, as we haven=E2=80=99t replied to all the =
COMMENTs yet:

> On 2021-07-14, at 12:03, =C3=89ric Vyncke via Datatracker =
<noreply@ietf.org> wrote:
>=20
> =C3=89ric Vyncke has entered the following ballot position for
> draft-ietf-core-yang-cbor-16: No Objection
> [=E2=80=A6]
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>=20
> Thank you for the work put into this document.
>=20
> Special thanks to Marco Tiloca for his shepherd's write-up, which =
contains a
> good summary of the WG consensus and the doc reviews.
>=20
> Please find below 2 non-blocking COMMENT points.
>=20
> I hope that this helps to improve the document,
>=20
> Regards,
>=20
> -=C3=A9ric
>=20
> =3D=3D COMMENTS =3D=3D
>=20
> A generic comment about the operational issue of supporting TWO ways =
to encode
> a data node: either normal string or the SID. This means that either =
there is a
> 2-way negotiation mechanism or that all CORE nodes must support both =
encoding
> and have agreed on a common SID mappings. Section 7 only briefly =
touches this
> issue with "Content-Type" but not with "Accept".

Section 7 actually uses the term Content-Type as the combination of a =
media-type name and optional parameters, as it is used in RFC 9193-to-be =
(which is waiting for HTTP to be published).
So I don=E2=80=99t see a need to mention Accept here; readers versed in =
content-types (media types) should already see the connection.

>=20
> -- Section 4.2.1 & 4.4.1 --
> BTW, I like the idea of encoding a container with sequential SID and =
the delta
> CBOR encoding ;-)

Thank you!

Gr=C3=BC=C3=9Fe, Carsten



From nobody Mon Mar  7 14:52:05 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 670913A10D0; Mon,  7 Mar 2022 14:51:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pmGVquyPQh8S; Mon,  7 Mar 2022 14:51:43 -0800 (PST)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4C673A11A7; Mon,  7 Mar 2022 14:51:42 -0800 (PST)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KCDGh04DjzDCc2; Mon,  7 Mar 2022 23:51:39 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <162633062845.15354.15922725362070438996@ietfa.amsl.com>
Date: Mon, 7 Mar 2022 23:51:39 +0100
Cc: The IESG <iesg@ietf.org>, draft-ietf-core-yang-cbor@ietf.org, core-chairs@ietf.org, core@ietf.org, Marco Tiloca <marco.tiloca@ri.se>
X-Mao-Original-Outgoing-Id: 668386299.402666-1c1e5b6fb4b6d954627a0b132ed269e6
Content-Transfer-Encoding: quoted-printable
Message-Id: <344C0AF7-613C-4F9D-AD79-DE0E03C038AA@tzi.org>
References: <162633062845.15354.15922725362070438996@ietfa.amsl.com>
To: Murray Kucherawy <superuser@gmail.com>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/T6ePoxlkOyIEzQSMp995YPwVIvA>
Subject: Re: [core] Murray Kucherawy's No Objection on draft-ietf-core-yang-cbor-16: (with COMMENT)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 22:51:55 -0000

Hi Murray,

A little blast from the past...

> On 2021-07-15, at 08:30, Murray Kucherawy via Datatracker =
<noreply@ietf.org> wrote:
>=20
> Murray Kucherawy has entered the following ballot position for
> draft-ietf-core-yang-cbor-16: No Objection
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>=20
> I support Benjamin's second DISCUSS point.

We actually have disentangled the two drafts now so they no longer =
depend on each other.  I=E2=80=99m waiting for input from Ben and Rob =
whether we can go ahead with this.

> Section 2 imports the term "schema tree" which is not used in this =
document.

Fixed in d7ce4b5.

> In Section 9.1, "Required Parameters" should be "N/A", not "none".  =
See RFC
> 6838 Section 5.6.

Fixed in aeff3f1

> The layout of the table in Section 9.3 is a little confusing.  For =
instance,
> the first two rows are collectively describing a single entry, I =
think, but
> that's not obvious given there are horizontal lines between them.

It now looks great; fixed in 99bd7ab

Apart from the disentangling, these all are in =
draft-ietf-core-yang-cbor-18 already; we just didn=E2=80=99t get around =
to answering your email.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Tue Mar  8 00:37:54 2022
Return-Path: <evyncke@cisco.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E73F83A0C1F; Tue,  8 Mar 2022 00:37:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.606
X-Spam-Level: 
X-Spam-Status: No, score=-9.606 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=ikjPPVTX; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=g0ucjQAl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6AVN7Z01quDv; Tue,  8 Mar 2022 00:37:05 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 67FBA3A0C0C; Tue,  8 Mar 2022 00:37:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3584; q=dns/txt; s=iport; t=1646728625; x=1647938225; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=vY+ikZVXkIKpqKIKWaZ2Dw65DQjY2IrWSdWwuMTgsbs=; b=ikjPPVTXDFmYaRQaNA9+UjvMK/Bc2YVekkeQVbHYmfnuNffsuRc6aFLH cLuQ+s41bnHh+VC5TDKG5BtxTbFuwD2NzvBRAhhAqOnd9D2My5M7kTsz9 iwRxsj5tAP2MnzaxUav5v3u3wleddUtxn9OeUyiVBKszu7yE595pUZY9u U=;
X-IPAS-Result: =?us-ascii?q?A0ALAADwFCdimJRdJa1aHAEBAQEBAQcBARIBAQQEAQFAg?= =?us-ascii?q?UYHAQELAYFRVoFYN0SEVINKA4RZYIUQgwIDgSmaCIEugSUDVAsBAQENAQFBB?= =?us-ascii?q?AEBhQcCF4QIAiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBgQUAQEBA?= =?us-ascii?q?QEBAQEJCwkHBgwFEA4FIoVoDYZCAQEBAQIBEhERDAEBNwELBAIBBgIOAwMBA?= =?us-ascii?q?gECAiYCAgIwFQUDCAIEDgUigmKCZgMNIQGSAY82AYE6AoofeoExgQGCCAEBB?= =?us-ascii?q?gQEhQsYgjcJgRAsAYMQgwNWTIJdhDUnHIFJRIEVJxyCZz6HXzeCLpcwBEMIB?= =?us-ascii?q?yFfGWoTKDoDkgiDDEaKHY08kmsKg0mZdYV2BS6Dc4wsmAuFUpEDoUGFDwIEA?= =?us-ascii?q?gQFAg4BAQY1gSyCFXAVZQGCPlEZD44gDA0JFYM7il51OAIGAQoBAQMJAYI6j?= =?us-ascii?q?zQBAQ?=
IronPort-PHdr: A9a23:Oig/wxWF9q9ARmjP03a3l36w9CvV8K36AWYlg6HPw5pCcaWmqpLlO kGXpfBgl0TAUoiT7fVYw/HXvKbtVS1lg96BvXkOfYYKW0oDjsMbzAAlCdSOXEv8KvOiZicmH cNEAVli+XzzMUVcFMvkIVPIpXjn5j8JERK5Pg1wdYzI
IronPort-Data: A9a23:CtxJ5qCfFNJ1ehVW/9Pjw5YqxClBgxIJ4kV8jS/XYbTApGsq1TcEz WsdWjzSO6rfYDH9fIwkbdmzox9T7cLdmNMwOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4WGdIZuJpPljk/F3oLJ9RGQ7onVAOukYAL4EnopH1U8E39x0UsLd9MR2+aEv/DoW2thh vuqyyHvEAfNN+lcaz98Bwqr8XuDjdyq0N8qlgVWicNj4Dcyo0Io4Kc3fsldGZdXrr58RYZWT 86bpF2wE/iwEx0FUrtJmZ6jGqEGryK70QWm0hJrt6aebhdqmhw8lYUiEsIlQ0JYumXSupNb9 vRiqsnlIespFvWkdOU1SRJUFWR1OrdLveadZ3O+qseUiUbBdhMAwd03UxpwZtJeq70xWD0en RAbAGhlghSrivynxrm4R8Fnh98oK4/gO4Z3VnRInW2BU653G8qZK0nMzZh4xRIqvuFrJ/ide YlEZwhSdBOcRTQabz/7D7pnzLv32RETaQZwrVuPrq1x/2nXywd4+KLsdsHYEvSBQt9YtkeVu myA+H72ajkRM8aSjDGF+3O2ncfOkD/1HoUIG9WQ+uRjjkHWx2EPBlgdUkG25OiwjEH7UNhYM WQV9zYg668o+ySDT9TmUDW5rWKK+BkGVLJ4GOQw7ymR2KuS5ByWblXoVRZbY9Ag8cQxXzFvj wXPlNLyDjspu7qQIZ6AyluKhQ+CN282NEk6XAUBQjpVuPygir8SoQ2aG76PD5WJptHyHDjxx RWDoy4/m6gfgKY3O0OToAuvb9WE+8Ohc+Il2unEdjn/v18mPuZJc6TtuAaEtawfRGqMZgDZ5 CBspiSI0AwZ4XhhfgS3Qe4NFaul/PGDWNE3qQEyR8l4n9hBFoLKQGy9yCt1KEEsOcEedHqwO gnYuBha49lYO37CgU5Lj2CZVptCIUvITImNuhXogjxmOcQZmOivp30GWKJo9zqx+HXAaIlmU XthTe6iDGwBFYNsxyesSuEW3NcDn35imz2MGsCilU/4gNJygUJ5r59YbzNiichks8u5TPn9q L6zyuPTkUwECb2iCsUp2ddOdg9iwYcH6WDe8pwLKbHrzvtOE2A6APiZ2qI6Z4FghMxoehTgo BmAtrtj4AOn3xXvcFzSAlg6MeOHdcsh8RoTYHJ9VX71iylLSdv+t883KspoFZF5r7YL5aAvE JE4lzCoX64npsLvoWpNNPEQbeVKKXyWuO55F3b9MGhlIc86HFChFx2NVlKHyRTixxGf7aMWy 4BMHCuCKXbfb2yO1PrrVc8=
IronPort-HdrOrdr: A9a23:rIebUqkiUD65eFlXp5rGr52++73pDfN2iWdD5ihNYBxZY6Wkfp +V/cjzhCWbtN9OYh4dcIi7Sda9qXO1z+8T3WGIVY3SHTUOy1HYUr2KirGSgwEIeheOuNK1sJ 0BT0EQMqyKMbEXt7ee3OD8Kadd/DDlytHquQ699QYWcegCUcgJhG0VZnf5Yy9LrUt9dOcE/f Gnl6x6Tk+bCAwqh7OAdwA4tob41rn2vaOjRSRDKw8s6QGIgz/twqX9CQKk0hAXVC4K6as+8E De+jaJpJmLgrWe8FvxxmXT55NZlJ/K0d1YHvGBjcATN3HFlhuoXoJ8QLeP1QpF5d1HqWxa1O UkkS1Qefib2EmhJ11dZiGdgzUI5QxerEMKD2Xo2kcL7/aJHg7SQPAx9L6xOiGpm3bI+usMjZ 6iGwmixsVq5dSqplWg2zGAbWAZqqL/y0BS4tI7njhRV5ATZ6RWqpFa9ERJEI0YFCa/84w/Fv JyZfusqcq+XGnqJEwxhFMfiuBEn05DaCuuUwwHoIiYwjJWlHd2ww8Rw9EehG4J8NY4R4Nf7+ rJP6x0nPUWJ/VmIp5VFaMEW4+6G2bNSRXDPCabJknmDrgOPzbIp4Ts6Ls46em2cNgDzYc0mp 7GTFRE3FRCN37GGImLxtlG4xrNSGKyUXDkzdxf/YFwvvnmSL/iIUS4ORgTegub0rwi6+HgKo KO0chtcorexEPVaPF04zE=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,164,1643673600"; d="scan'208";a="840609222"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 08 Mar 2022 08:37:04 +0000
Received: from mail.cisco.com (xbe-rcd-002.cisco.com [173.37.102.17]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 2288b49U030655 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 8 Mar 2022 08:37:04 GMT
Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xbe-rcd-002.cisco.com (173.37.102.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Tue, 8 Mar 2022 02:37:03 -0600
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Tue, 8 Mar 2022 02:37:03 -0600
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Tue, 8 Mar 2022 02:37:03 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TXzM+8pJbKsbzvm773MAGfX4KyvDgi0vlWVPo9xICW0DBmd4L6TjFGevJ7UcRenQVwppaq2omH0lGU3qCZNegK92x4OUCWElsxGu7m/07X1oielWs8v6si2tF7esVt9HLKFDqVecjdhDiNtYjQvc6z8axqxzqlT0ri/2CyMB5BrTiw+9pwmRhGn4bpzaPD/TBby578QIdv9iLGBZ2/txOYEX1I37VSe0kFIVoB0YpMr8an+wBvb6kcOCAhuvHLIuYgEAwj35j0aTYVOWbifQ31JYvqIvQv14mPOSH7pPaLGIlXtEfRFsvr9tcdYx8RI6xdYlD5aQKNeFmoLU7PtpmQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vY+ikZVXkIKpqKIKWaZ2Dw65DQjY2IrWSdWwuMTgsbs=; b=Mzrs3UL3oF5lX6DyDZQ/+KCZWTPc717xruhCQJiDwpZhqHO9FNTj0IBXqR4TM9qQIsU07gyhKyRJbNjJZ1/Dxsz503b7cS9FN0Cg6M1YqzBEWH9W78JVLfaK7utYgKi6KmjlwfkUq8KfxHAbLEtU8Kze/DIfwAw4h9ReYEpviPaIhwdC2Ny2mJbnu3EOhkNevDA85HPhEJlcmPRp3FHdDCKHJT5/eCpmhPFzfK64BtoUgB+r0m+VPQYxR1A7DJQr4SpRjLo7iNvdnzcHMOK6yEn7pFHiIJ3Yc7oF/MRYscDxlpxhDeJ7bDzI3GC94WOO8P/QCns/OfEg1KLbdjUxag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vY+ikZVXkIKpqKIKWaZ2Dw65DQjY2IrWSdWwuMTgsbs=; b=g0ucjQAlhmflXJVaoU2jhKYnxw9C+Oqf76x+4XwqYydCU7sGeiql7i1/FQ9y2fZgf//rvGEzSIUJNCBbZPh8XI2eeYX/d7JsHeC/k0yWeK+L5rj5np3KzWajvJ5dRePrtL7Z9qnxWjKdvq1cl8hgeajnumWUXIbo4HSyIFT7SVY=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by BN6PR11MB1652.namprd11.prod.outlook.com (2603:10b6:405:10::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar 2022 08:37:01 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::1929:3b1b:99a3:312]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::1929:3b1b:99a3:312%9]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022 08:37:01 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Carsten Bormann <cabo@tzi.org>
CC: The IESG <iesg@ietf.org>, "draft-ietf-core-yang-cbor@ietf.org" <draft-ietf-core-yang-cbor@ietf.org>, "core-chairs@ietf.org" <core-chairs@ietf.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>, Marco Tiloca <marco.tiloca@ri.se>
Thread-Topic: =?utf-8?B?W2NvcmVdIMOJcmljIFZ5bmNrZSdzIE5vIE9iamVjdGlvbiBvbiBkcmFmdC1p?= =?utf-8?Q?etf-core-yang-cbor-16:_(with_COMMENT)?=
Thread-Index: AQHYMnTmemij2tHPXEGI/C1JbwqMlqy1OzQA
Date: Tue, 8 Mar 2022 08:37:01 +0000
Message-ID: <9D09F96B-11B9-49A6-94B0-0A8FB1330844@cisco.com>
References: <162625700369.11227.18056605126082947991@ietfa.amsl.com> <15D47BED-3340-43F3-B29E-A6E4B760ED4D@tzi.org>
In-Reply-To: <15D47BED-3340-43F3-B29E-A6E4B760ED4D@tzi.org>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/16.58.22021501
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d81fe154-0464-4a68-8c78-08da00ded0d8
x-ms-traffictypediagnostic: BN6PR11MB1652:EE_
x-microsoft-antispam-prvs: <BN6PR11MB165231AA5D93E8FA64EB24C1A9099@BN6PR11MB1652.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(366004)(66946007)(66476007)(86362001)(76116006)(4326008)(64756008)(91956017)(2616005)(508600001)(186003)(66556008)(66446008)(6512007)(71200400001)(6506007)(8936002)(53546011)(66574015)(5660300002)(33656002)(83380400001)(38100700002)(316002)(36756003)(122000001)(54906003)(2906002)(6916009)(224303003)(38070700005)(6486002)(45980500001); DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?eEp0M3JMRkxjVnE5K1VtS1lHWk91N21TWkduUDlnLzZqcEdwMzJkV2l2RThw?= =?utf-8?B?eGk4VHhGODlnT1ZGcUlLQlhVUkltWjlubXZ3eVhGZVkyd0ZiamUzRTMrRWpl?= =?utf-8?B?WjZvclhrTXNJTmJBZyt3eWhKTEZIL3RqTTBGRjBrZGI2VkRCNmxXYkVEenpM?= =?utf-8?B?VnQ3ZUpxOUNCME9QUG54c3RsTWpBRjRzSkY1SFp6YkxlVUMvdEpCWHYyYWxr?= =?utf-8?B?NzdGbEkxZlR0UzJhSndESXNhMGxteVE2MnVEYVMzS3hZNUJKNzJydDlMYzlV?= =?utf-8?B?LytZVjVSSnQ0UkFXTEZkSE9qdkVuSHVrRWgrYzEyMXA4QjVydCtBNFN1VStF?= =?utf-8?B?cFBJR0Z0MTdYTE04WGh3L201VzRucWlTYUd0YUozUXpaYzNkRjM5d1d1SklO?= =?utf-8?B?TlZjTTZlUnEwSTVPa2hKOHUxS0pHQzRZMWVuR0R6bmNDQ3NrVXY0ZFF6TGJ0?= =?utf-8?B?RWd5S0gyMXNNN2RCZnRDUkJYM1NwYjV1Y0R5OXZleGdGSlNDY0gvS0hqVW5t?= =?utf-8?B?WjYwZWEyTzhSc2RPdk5JUlBuYkFpQ0IwY1RZcTJwanZmM2hzMm1xK1F4eWRN?= =?utf-8?B?ajRFdkx2ZUlEWDQrRXNrVStodjNuR0s5T3VkdUhGN3dBNHhjdmQzTGN4OE81?= =?utf-8?B?UnlJT1J0eW5VZ2t6QzZsK1QyQ3RGZVZ1WmtWUi9WZTZlRGVPYzJBZndmM1cr?= =?utf-8?B?RzBXYnJaWVVWRGpvamdwS3JNY3lYSW9XWjBROWJsaTJOZGloYVB4YlFNN09n?= =?utf-8?B?c2V3Y0UwVFgxTmFvdSs3MmUrM0ZPOTFPMUlPQTZCcGY2ZW0wZ3pXc2x1T1VU?= =?utf-8?B?YmcxeGtOL1JxT2VVaXNLU0FFVlpGcG8zb2s1eWx2Slp6c1ovcmpzdmVYOEY1?= =?utf-8?B?NWpTSWFhVFRBTEJxb1R6SnIycjl2UkhpMGMzV1JxR21DcUJMbTMyc0NEZEpX?= =?utf-8?B?a28rc3hvSWVIYUwraThUQjdUbStUalkwQ25mTGVDM2ZlY0QrT3RLQmdqdG9x?= =?utf-8?B?anA5Wkw2RHpvclo1WTJsNU9xUEFuUTY1bUdsRVh1OVVZQ3lOT3dpbnZ6U0Jm?= =?utf-8?B?SjMzMEFseHdVSDVDYjgwM211cmZSVWR6bWQrdlFNNE1FeHZrTWNKL2pxWDJj?= =?utf-8?B?Q2VzbGVxQ2pNMXR6QmpYZk1ucVJ5VEZRUVpucjh2K1piZSs2b3dwTEFJdjhC?= =?utf-8?B?bkhjUVpYQ29xcGt5WGFRdGpJdlBzMjAwMVRWYnJqMFpKelNWaGlIcy9xSjIz?= =?utf-8?B?dW4vdDF1YmU4SUprZ1Q4VWdmczJvb2NZQTlMQ1E2KzROYUFpcU1HZUltd2Zp?= =?utf-8?B?bU9acVNEYmpFVmY3ZU1OY0dGZ3Q1d2lHbFlyOVFPZ2lMTDhsRjNRQkR3aDhj?= =?utf-8?B?S2YyclZWQUpCdVlIeFpTN2ZOa2VPWWRjUFlSelN0SFNaZEM1cnVmMzJ0ZXo1?= =?utf-8?B?SEVYVEo1Z2hXRDMvYitwMVVDbmdjL080Qm0wYUMvckoxTjlNOS9nMzk1NERQ?= =?utf-8?B?K3NKNHZWVE9laG4xMnNQRGQ3TE5mRTBZbjFZSEJSSW55R3VLTHloWmQ0a2lk?= =?utf-8?B?SEk4Q1BPRlRtVHdVMzd4ZEo5L2xXbzJFYkgzUmxkaGN5QTgyTy9VRzZMY09T?= =?utf-8?B?QjFSVTFwYU9sL1FCd3Vqb3NZbFRrTXBxb1FSWTlEUnE0TjVXNnQ5NDFSN1A5?= =?utf-8?B?UmNPMXdZa1B3S1NlRzEyOFJqVHFHcVE2eDRsOXEreGtYS2ppRmd1Y3BURytk?= =?utf-8?B?b1ozOGl2TGttTXhrVHR6cG5xTXhiZmtqcXFFWUNxVFZhVGJ2VjhuNXhiaWtQ?= =?utf-8?B?eE5FZS9ZS1pWS1V4bVJFSHdwRHROMW9CakF4NDRvWVNDNGpETzArQnFZK2VV?= =?utf-8?B?bTVWV0ZCMjY3dFU5QU9tMTgxbWJ4Njc0aXFJdkZ4NlV0L0R4WitVZThMSFAv?= =?utf-8?B?bDhPSzZ4bi9uL1BRVm1kY2NGNUNUZ0p1QkRwalFSdTFJandNWDZYZWJJUHZY?= =?utf-8?B?Z2RnR0N4OHVQU3g1NTNjcTdBbXBta0VqeUpyV0FUZzFkYkRHMHBmM3ZibERC?= =?utf-8?B?ZkJMdDB6U0l5c1Y4R016WlVZMmdDRmhTbnB2RHZnRjN5a2RLb3pnV0V3QWRB?= =?utf-8?B?ekFHYWpXR1IrQ3h1c3dFSFNFY3NFUW8zeHpwdTJVeWcrUDJMcm96UnVubnBV?= =?utf-8?B?a1dqUUZTOUpjV2R0MWE1NmxNZUk3eXFWY1FmL1pHdUZGNkpLWGZONUdqU00x?= =?utf-8?Q?REWBFIK2x09usycdV462dQW5bs2iU7xDI4FXwnWmUM=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <DFC9CE6966337B4FA7DF7F7030227A0E@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d81fe154-0464-4a68-8c78-08da00ded0d8
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 08:37:01.1376 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EUEFdGeA1/wfaIPAK8AYnv8HcP/jKkf+POTTop9qFsQeaftmABwb86lntwS1oBzTmb5K4ydWKbEMbpbnebM9Ag==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1652
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xbe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/fpyrggpsoNjG_wFSD0E9nK7fSZo>
Subject: Re: [core]  =?utf-8?q?=C3=89ric_Vyncke=27s_No_Objection_on_draft-ietf?= =?utf-8?q?-core-yang-cbor-16=3A_=28with_COMMENT=29?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2022 08:37:11 -0000
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From nobody Tue Mar  8 08:54:39 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB3113A16D8; Tue,  8 Mar 2022 08:54:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EdVW-53IQAJm; Tue,  8 Mar 2022 08:54:34 -0800 (PST)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59D073A16D4; Tue,  8 Mar 2022 08:54:31 -0800 (PST)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KChJ35N9bzDCjm; Tue,  8 Mar 2022 17:54:27 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <9D09F96B-11B9-49A6-94B0-0A8FB1330844@cisco.com>
Date: Tue, 8 Mar 2022 17:54:27 +0100
Cc: The IESG <iesg@ietf.org>, "draft-ietf-core-yang-cbor@ietf.org" <draft-ietf-core-yang-cbor@ietf.org>, "core-chairs@ietf.org" <core-chairs@ietf.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>, Marco Tiloca <marco.tiloca@ri.se>
X-Mao-Original-Outgoing-Id: 668451267.036399-541e599147c4b38ae180421275a901db
Content-Transfer-Encoding: quoted-printable
Message-Id: <8775288D-E960-4CA3-982D-F1E9B1EC8EDA@tzi.org>
References: <162625700369.11227.18056605126082947991@ietfa.amsl.com> <15D47BED-3340-43F3-B29E-A6E4B760ED4D@tzi.org> <9D09F96B-11B9-49A6-94B0-0A8FB1330844@cisco.com>
To: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/uYbsQQL-RPM-nUk7SylXWVhWcs8>
Subject: Re: [core]  =?utf-8?q?=C3=89ric_Vyncke=27s_No_Objection_on_draft-ietf?= =?utf-8?q?-core-yang-cbor-16=3A_=28with_COMMENT=29?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2022 16:54:37 -0000

Hi =C3=89ric,

good to know that you find COMMENT important.

So I did write a new paragraph for the end of Section 7.

https://github.com/core-wg/yang-cbor/commit/35733bc

Gr=C3=BC=C3=9Fe, Carsten


From nobody Tue Mar  8 09:49:36 2022
Return-Path: <evyncke@cisco.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2792D3A011F; Tue,  8 Mar 2022 09:49:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.605
X-Spam-Level: 
X-Spam-Status: No, score=-9.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=HeZqytFY; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=cQEjt7v+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0IQaa8dXvqPe; Tue,  8 Mar 2022 09:49:28 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F41083A00E5; Tue,  8 Mar 2022 09:49:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1072; q=dns/txt; s=iport; t=1646761767; x=1647971367; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=cBbSjreo5e4sDFdAxRbMFrcJ3cgZ7FDF5yKHnJRinoE=; b=HeZqytFYbQ2PhLVx4X4QP0vLG6xzHfiuoeX40ba59+7pFtJ6j+sswYoY PPyVpSvByQKsLrRRYgiB8xuDA54iySdLOoYhfVTLSWLhiP6NAa8SAYtlP hEL7IRn9NqGlq0PhjZhsrD1P0UPw0V9A9qvSW2v7MWyyaI8Rktt2g0w13 8=;
IronPort-PHdr: =?us-ascii?q?A9a23=3AIONBsBWCCAbiftL8fMXkcGF+J2LV8K36AWYlg?= =?us-ascii?q?6HPw5pCcaWmqpLlOkGXpfBgl0TAUoiT7fVYw/HXvKbtVS1lg96BvXkOfYYKW?= =?us-ascii?q?0oDjsMbzAAlCdSOXEv8KvOiZicmHcNEAVli+XzzMUVcFMvkIVPIpXjn5j8JE?= =?us-ascii?q?RK5Pg1wdYzI?=
IronPort-Data: =?us-ascii?q?A9a23=3AdeRkh6/Y5mdZNeaTSZjzDrUDBXyTJUtcMsCJ2?= =?us-ascii?q?f8bNWPcYEJGY0x3xmRKWz/VPanba2CkeYsjYdu1pkgOuceBydNqTwprrXhEQ?= =?us-ascii?q?iMRo6IpJzg2wmQcns+qw0aqoHtPt63yUfGdapBkJpPgjk31aOK59yEljfjgq?= =?us-ascii?q?ofUUYYoBAggHWeIdw954f5Ts7ZRbr9A2bBVMSvU0T/Bi5W31Gue5tJBGjl8B?= =?us-ascii?q?5RvB/9YlK+aVDsw5jTSbB3Q1bPUvyF94Jk3fcldI5ZkK7S4ENJWR86bpF241?= =?us-ascii?q?nnS8xFoAdS/n/OiNEYLWbXVewOJjxK6WYD73UME/XN0g/19badGAatUo23hc?= =?us-ascii?q?9RZxctcs5ezRC8iP7bHn6IWVBww/yRWbPIXp+OWcCXv2SCU5wicG5f2+N1rB?= =?us-ascii?q?Vs9OssE++JwCmhm7/1eMz1lRhuEne+ewb+nRK9rnMtLBMLsJo5asXFpzCvCJ?= =?us-ascii?q?fcrXZ6FRL/FjfdUxj4+moVPEOrQIsEeczcqfR3GbFhEMFANIJMzgOnugWPwG?= =?us-ascii?q?xVZpUmajas6/2aVyxZ+uJDmOdDSUsCYRINShEnwm45s1wwVGTkAP9CZjDGC6?= =?us-ascii?q?H/p36nEnDjwX8QZE7jQyxKju3XLrkR7NfHcfQLTTSGFt3OD?=
IronPort-HdrOrdr: =?us-ascii?q?A9a23=3A9Ey+56rNqLqz20z9znJddN4aV5txLNV00z?= =?us-ascii?q?EX/kB9WHVpm5Oj9vxGzc506farslkssSkb6K+90KnpewK6yXbsibNhfItKLz?= =?us-ascii?q?OWxldAS7sSrbcKogeQVREWk9Q86U4OSdkENDSdNykesS++2njFLz9C+qjFzE?= =?us-ascii?q?nLv5al854Fd2gDAMsMg3Ybe2Sm+w9NNXR77PECZfyhD7981kKdkAMsH72G7x?= =?us-ascii?q?c+Loz+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mFK10TDR1+?= =?us-ascii?q?GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy+Qzd4dvfrG?= =?us-ascii?q?rCouO85SvIDP4Dsk85uVvF+ScF7jOQlwrGLUWSkmNwz0GT+/ARDwhKevapzb?= =?us-ascii?q?gpAicxrXBQ4e2VFMlwrj2kX109N2KdoM213am7a/kh/HDE0kYKgKodiWdSXp?= =?us-ascii?q?AZb6IUpYsD/FlNGJNFBy7i7ps7edMeQf00ycwmOm9yVUqp9FWHAebcKEgbD1?= =?us-ascii?q?ODWAwPq8aV2z9ZkDRwyFYZ3tUWmjMF+IgmQ5dJ6uzYOuAw/Ys+AfM+fOZ4Hq?= =?us-ascii?q?MMUMG3AmvCTVbFN3+TO03uEOUCN2jWo5D67b0p7KWheYAOzpE1hJPdOWko+V?= =?us-ascii?q?IaagbrE4mDzZdL+hfCTCG0Wins0NhX49xjtrj1VNPQQGW+oZAV4oKdStkkc7?= =?us-ascii?q?nmsqyISedr6tfYXBzTJbo=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ABBwByHvlh/5hdJa1aHgEBCxIMQIF?= =?us-ascii?q?PC4FSVgd3WjcxhEmDRwOFOYUOgwWBKZVPhCyBLoElA1QLAQEBDQEBNQwEAQG?= =?us-ascii?q?FBQIXg0gCJTQJDgECBAEBARIBAQUBAQECAQYEgQkThWgNhkIBAQEBAxIREQw?= =?us-ascii?q?BATcBCwQCAQYCDgMDAQIDAiYCAgIwFQUDCAIEDgUigmIBgmUDLgEOknWPNgG?= =?us-ascii?q?BOgKKH3qBMYEBgggBAQYEBIE2AYNWGII3AwaBECqDDoQegluELCccgUlEgRU?= =?us-ascii?q?nDBCCZz6CYwKBYIMYN4Iukj5RQxCBGIFilQZGqiEKg0aLAZRcBS6oB4VOkHy?= =?us-ascii?q?ND5QrhQgCBAIEBQIOAQEGNYEsPIFZcBVlAYI+URkPjiAMFhWDOopedDgCBgE?= =?us-ascii?q?KAQEDCQGCOosRAQE?=
X-IronPort-AV: E=Sophos;i="5.88,333,1635206400"; d="scan'208";a="979749958"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 08 Mar 2022 17:49:26 +0000
Received: from mail.cisco.com (xbe-rcd-001.cisco.com [173.37.102.16]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 228HnQPU031237 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 8 Mar 2022 17:49:26 GMT
Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xbe-rcd-001.cisco.com (173.37.102.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Tue, 8 Mar 2022 11:49:26 -0600
Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Tue, 8 Mar 2022 12:49:25 -0500
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Tue, 8 Mar 2022 11:49:25 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=l6epqTCZ/LwivXbRDx5QGefl0Nyc80/+hF11YvdDJdULvTVJOJVE1558a14lNBQaYHnYCtaQx1FF1T6rxJtH4Gb+RXtXWq9opyN0LpbKLSvld0/I7ifQeTPB3NNNqNHhZ+vt634fqrDdzs6+6nBAMBlZrrbtqcJ+HfHcP829WOgxUooUoK4YL65h6iGnRY5zE60Nf2jRDBI58+jJM21xGQgtZg9fhhkVmuY1rx6miUkfK7lLAAWL07HQ3Oxi6r3R+HH2TeCUsNAt2voLHbkzaMPM88HP/cVGay7CxVnm5eQQE1adzQ2wbxxcX0eoVKUJasd7mgGL316ufAUstJBqwg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cBbSjreo5e4sDFdAxRbMFrcJ3cgZ7FDF5yKHnJRinoE=; b=NnflNMZVIiYgqRSvb3LZrI2rgAP1awylybwg2FAfnfvB9UqVHcYLT2KzxLThfVDaJ4r3hXg3X++hGIVoU7umz9FRgYUO6aIycpjyPdMaok2chDUIsP/CMmpoV5YRXfdDl5Bs0uPz+wRSCJb0oWfworg5UizgLeinXC/koGw1pcRYu//J1qW2fuYksKx8sKfu+MsVKoZgVNhL8u+uF2d9uYRdUnts6PVC3/+0YAm/6nlXQeR/fN1Gjefl9lhe7sFPi7X/SUrrWSJ71iW80bxGHSTkM6TUimfPdPGZUHxURPLKAAGqJGpf4//Cgir9hX52bOXCdU7VTsbzVhl3WDEtQQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cBbSjreo5e4sDFdAxRbMFrcJ3cgZ7FDF5yKHnJRinoE=; b=cQEjt7v+SbTj4nhcV8RsS90Pwn8HFbZsd2ksCRC1Ry6rUixDImSiU6YKd9fJppb7IhWEj98XbxPnce0rH/u8GkMWd4+jDor7UOlsKCQ4gQstWJp2EtVUKphRO24/la2GiLqIA3q/7ewkLkAl0sJSxSA3UxO2jeGMGS+tRRjp7yo=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by DM6PR11MB4060.namprd11.prod.outlook.com (2603:10b6:5:196::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar 2022 17:49:23 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::1929:3b1b:99a3:312]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::1929:3b1b:99a3:312%9]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022 17:49:23 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Carsten Bormann <cabo@tzi.org>
CC: The IESG <iesg@ietf.org>, "draft-ietf-core-yang-cbor@ietf.org" <draft-ietf-core-yang-cbor@ietf.org>, "core-chairs@ietf.org" <core-chairs@ietf.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>, Marco Tiloca <marco.tiloca@ri.se>
Thread-Topic: =?utf-8?B?W2NvcmVdIMOJcmljIFZ5bmNrZSdzIE5vIE9iamVjdGlvbiBvbiBkcmFmdC1p?= =?utf-8?Q?etf-core-yang-cbor-16:_(with_COMMENT)?=
Thread-Index: AQHYMnTmemij2tHPXEGI/C1JbwqMlqy1OzQAgAB6OYCAACAbgA==
Date: Tue, 8 Mar 2022 17:49:22 +0000
Message-ID: <3553F6C1-5DFC-4187-A4AD-FD22C3BECC7D@cisco.com>
References: <162625700369.11227.18056605126082947991@ietfa.amsl.com> <15D47BED-3340-43F3-B29E-A6E4B760ED4D@tzi.org> <9D09F96B-11B9-49A6-94B0-0A8FB1330844@cisco.com> <8775288D-E960-4CA3-982D-F1E9B1EC8EDA@tzi.org>
In-Reply-To: <8775288D-E960-4CA3-982D-F1E9B1EC8EDA@tzi.org>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/16.58.22021501
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e6175923-7aaa-42c0-2117-08da012bfaeb
x-ms-traffictypediagnostic: DM6PR11MB4060:EE_
x-microsoft-antispam-prvs: <DM6PR11MB406093FDE607C0B8D836EE50A9099@DM6PR11MB4060.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(366004)(966005)(4744005)(38070700005)(6916009)(54906003)(66556008)(76116006)(6486002)(66946007)(186003)(122000001)(316002)(6512007)(6506007)(53546011)(71200400001)(66574015)(8936002)(2616005)(33656002)(38100700002)(83380400001)(224303003)(86362001)(36756003)(4326008)(66446008)(66476007)(2906002)(91956017)(64756008)(508600001)(5660300002)(45980500001); DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ZTdGTjQvOFk3eTh3djRMYnZIM3VyazhDaCsvTGs5TUwxMFF6T3BKWnYzc1V4?= =?utf-8?B?aEVpRDJZOHJOeUhhcjF5dDhEMTFYTHFWVXVLVkFSa3prSlUraEtza3hyQWhH?= =?utf-8?B?U2lacmtXOGdoWldreHFpcFRVUzZZaDJxVldVT3U1ZFFyRTZoYkNaUk95N3dm?= =?utf-8?B?MHUzOHhQVWFKNnFHRzNXb3FBL0V0RXBZL01RdWE2UGgrdE81K1BCSkVxbXBN?= =?utf-8?B?UENVQmtvc2tkdklEanlaTjArL09mNW16aFU2YzVRbklPQm9RL1dlWFNqVkR6?= =?utf-8?B?eWxJMklsLy91NXpXWHp1K3NqSGxLbXpEaUxjM21pOC95M0EyNEE0UTFEaEx0?= =?utf-8?B?dnUxb2Z2T04zeHBWR1pDc3g4MWx4MU41aXJ1c3FJMjVTZU1XMkFteVdUSFRB?= =?utf-8?B?MDlmWDFVVGc5ZTlCYkdKNHU1NWZTZFl5c2o5MTl5NHVzZ2lhZDNvbjJrWGFE?= =?utf-8?B?d1lkZWNJMUZTamduYnpGVGNndWhzbS9BSXh3d0VTZkYraDRmalhWd1hjdjAy?= =?utf-8?B?VFQ4dStRMHpsR0ZVTUpZSXB4U244RzFaeEpTbzFSd2ZYcTMrZ2g2TFY1YVpC?= =?utf-8?B?NmRYOUd4T0VvVVdObUdzN0F3UVB2YUUyVlVFd3RRLzM0cEE1K0t4WTh1RUFn?= =?utf-8?B?OFlVdTlZTWZ4bGVYWXRmT0tWcHB6Z1BQamgzTEdwM00yNytvUGNDREk0cklq?= =?utf-8?B?VUcwNkkrdGRPREhqUWx1NU82NERKaytyOW51THpMM3BFV1NJNmdPanozY1dh?= =?utf-8?B?cnc4dGd1K2JzSXc0L3F6TU5wbnVWSnpIUVFyNEcvT0VUNVkxeW43WUNIT0l0?= =?utf-8?B?MGRCOVRmWnVtS2htb3JFZ1gwQTYvTlhiMnEzWkJZWjFlRlM3YW9QalEwUmZQ?= =?utf-8?B?anJqQjV0MG1EREFtM3RlZVNHNVpRaHZJRy95ZTlFc2IvY3IrZ2VQelVVOEtv?= =?utf-8?B?WHI5RG1sNDF6MnZPQ0JheDFOTWNWQ2VuNFFZaXovMTNxNE9nV29kNU9xSk9k?= =?utf-8?B?S0EySUpZUWZVRFBtRmVXWDM0Q2paRHNZQ2ZneGlkaGFyZ21IWWdUTHkvVzFj?= =?utf-8?B?cTFURkd6YjA5NWNhMk5WRUZlVHVVV0kvS0pNMkEzVUxHUU9wc3hTTkdPcHJS?= =?utf-8?B?bWdGV0xXSmRsVHBTS1IwQUg2VGEvNjhWYTZlRk1VS1IwSlJKUm1pUU1KZWdI?= =?utf-8?B?TEpyeThKNXlFQWVOTVlXZ1BnOWZuSFNSb1VSRUFzMUI2WWdickxOdDU4RlU4?= =?utf-8?B?Tnh3bzkrdVNZbS82aHpmZTRraUpxVTJLZG9xamQ0MzduMm9GTEVPUkQ1NlNp?= =?utf-8?B?eXRXbzRqZ0MvanNPVDdkQjVlQjhuWkx0aG9SRktnMW13bWFqU3Zvd3FiSG5I?= =?utf-8?B?ajRzbWg4Vmdicm9XbW54MGJOb2xKbnEvL3NBbVNzNEVkc3FjMUh0M21RWkpY?= =?utf-8?B?MFljNUZpSytlWnVmSFFmU2djdGY4dEFLSzZWR1QzODBmR2ZIMWNnS0lwb1VS?= =?utf-8?B?MkVESVFHN0MwQjJ6bERTOGdyb0JORExtdTIrdzkzdTJLMzZ2YzV3VzhaVFZV?= =?utf-8?B?WVJPbGFPcFdmUkthSjdFUzhSaFBjQXgxYTI5SkZEbDMwWFNydVdVeTZwamY2?= =?utf-8?B?bjlBRXFWSXdVd3VkenFWNHQ3NGt3UGdidk5zeDNYTThDc0N6cDl2OXV2TkFD?= =?utf-8?B?VS9oTzQ1RkFwNU1rUG9ibnBMYXBjZ242RkpSa0ROMXZSUUQwMXFjNjNMU2s0?= =?utf-8?B?MFI2T0dkV2ZQRkpvT3NZdzZFK1lvd0Z0VGxtWm5yVXFxaU1hOFN4U2xjTkNt?= =?utf-8?B?ZkcwNW15M3lETEVZbXgzVFl0QmRaRkFxK0xQT1lnRTNqTGM5cXVldUlxUGRl?= =?utf-8?B?OTZwdGpxMm10cUFidlMxOHgrbWF4UzR5NFEwU1JWR2hLT2xwb2VSSlk1aWdZ?= =?utf-8?B?M0Fmbys4VUNXMGNWUENmU0cyR1BEMlU4MnpScmM3anlVVVZ5azdKbVN1TUhl?= =?utf-8?B?VENycGl3UEJ3Q3ArQk9LZU9ucEYxUXAvM2dwNGdnNWY2UUVWeHNtUlNBVWpQ?= =?utf-8?B?NDBUQVAyMFpoWFp0RXBXdFJoN3J5QlpGUTN4VGpac2pvTDlNOHcya2JyK3JY?= =?utf-8?B?V1Y0TVBpZmNDelVGSzREV3pOVmw3U3ZUVEVRWkhqRW00OFZ3VkZ6ZE9NUGtE?= =?utf-8?B?NWYvVTFMbnErTnE2K2VGa1ZTdkZyaWwyaVVIaDNIVVRBcGNXZEltZG9mSktR?= =?utf-8?Q?gvXaI2MTLLWwe6++MzVgBxwkT6Qt01dSDQRhlHH0OI=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <C6BCE19190735945A0994D8D1F5C8729@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e6175923-7aaa-42c0-2117-08da012bfaeb
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 17:49:22.9875 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /2XJaDdpXcdXV2PhYx3471euOXrIKFMtD94hnJmjUqE2payk9/Cj5ueDZEmEbdSGpPnDt3d0Wbk+Im/p6HuUIg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4060
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.16, xbe-rcd-001.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/X2H9A8rZ3ud8BkbFAxu63iDdQsU>
Subject: Re: [core]  =?utf-8?q?=C3=89ric_Vyncke=27s_No_Objection_on_draft-ietf?= =?utf-8?q?-core-yang-cbor-16=3A_=28with_COMMENT=29?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2022 17:49:33 -0000
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From nobody Wed Mar  9 02:12:14 2022
Return-Path: <esko.dijk@iotconsultancy.nl>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB28E3A09B5; Wed,  9 Mar 2022 02:12:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level: 
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iotconsultancy.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oVorEN3m1DJa; Wed,  9 Mar 2022 02:12:05 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2071c.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::71c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 112053A09CC; Wed,  9 Mar 2022 02:12:01 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eR0EB8A0WwEGoQkAD36mt4DseJQrOtpWSY/evRGFw50uM7+jR591PnDU8vx3NC16Zo9hba8ZgDHuvmK8BLwhqXxMPiYmrC3BPVFnMBcueHt/69iqoOTE6kCIWjArkn3qWyf+IVHM1CFb1Z06Q+3i+9U7IxGp0btGzQbeAJpRiRkqJYMkEhiGsx1gmyBFg3PWmNAUg2gkuRU1JZRmoq2V/ypMsW6jiMYlYF+PuDKrqDHUbMXRWrvESwp+Bw4mZt4MTU9pfrIkcafoyRVWB3PyhiBazu8lvUNt7cK2e7JtWFP61LT5Lif8dWmTrPurupx+0r4HmpP8G7ZZygU3+k1mbQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=eFSWnRsI1BYhMFl0n0VdTbWulCrwHRVu0mbWfAwAF50=; b=C0FlOwbinbbTVE3Orxe3pviRibco8HnqjrL7CVJ8o/Zc8iGSDEZbutIHjEo2sFk9x4KGbUSeXGbncPnAlXMTZukfj9LmpkelYloHmQ3HI34A8FGN1nnXktwADeYbUCzVSvCkUgpKA7Q57MiBr1bQ75fmpEEUP1f3FDYAWmYWUaanDFUUlBLQxj3OEMEp5vOene1I8NGKbfAy45KsJoARHHyK6+iZo/G6gIcF9x7H+3CTtXAFwkSdzdH1Zlu2JJYmPEf9vBC3YRid2brUu2FZmJT9ZBKDyxsajGrHLGg/aGl1lgC2qeeQ78ANG52YxdmRCMeRdw2Aiz7d6Bn4YyarQg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=iotconsultancy.nl; dmarc=pass action=none header.from=iotconsultancy.nl; dkim=pass header.d=iotconsultancy.nl; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iotconsultancy.nl; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eFSWnRsI1BYhMFl0n0VdTbWulCrwHRVu0mbWfAwAF50=; b=e2aMBeRwH9OnktixkAyqXvDvybbrzUBm2Tu90Jn8FiKN2NiEeOYzJgotOUbyLjTspXhxd4fsYrpwOEDIUfcwU0ZJhR5u6u7fNWQhGKtqm/9Goczjbfnel5acDfGuWzDSc/bu10FNndZCTg3QLd2f5gZ8qlkFu2UVfGj1i1NeJRQ=
Received: from DBAP190MB0981.EURP190.PROD.OUTLOOK.COM (2603:10a6:10:1b3::9) by HE1P190MB0252.EURP190.PROD.OUTLOOK.COM (2603:10a6:7:56::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.23; Wed, 9 Mar 2022 10:11:53 +0000
Received: from DBAP190MB0981.EURP190.PROD.OUTLOOK.COM ([fe80::88ca:e2f6:45dd:5841]) by DBAP190MB0981.EURP190.PROD.OUTLOOK.COM ([fe80::88ca:e2f6:45dd:5841%4]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022 10:11:52 +0000
From: Esko Dijk <esko.dijk@iotconsultancy.nl>
To: Marco Tiloca <marco.tiloca@ri.se>, =?utf-8?B?SmFpbWUgSmltw6luZXo=?= <jaime@iki.fi>, "core@ietf.org" <core@ietf.org>
CC: "draft-ietf-core-oscore-groupcomm.authors@ietf.org" <draft-ietf-core-oscore-groupcomm.authors@ietf.org>
Thread-Topic: =?utf-8?B?W2NvcmVdIPCflJQgV0cgTGFzdCBDYWxsIG9mIGRyYWZ0LWlldGYtY29yZS1v?= =?utf-8?Q?score-groupcomm?=
Thread-Index: AQHX1ZwLhI+MshUoXUubuOyktGdNOqxd3p0ggAy/KgCATO1AQA==
Date: Wed, 9 Mar 2022 10:11:52 +0000
Message-ID: <DBAP190MB0981701C495C3C005DD9B86DFD0A9@DBAP190MB0981.EURP190.PROD.OUTLOOK.COM>
References: <e1c0ac8b-cfa8-4a26-9d19-eee6d9f697b0@www.fastmail.com> <AM8P190MB09793B5DFBA3340109FC46EBFD519@AM8P190MB0979.EURP190.PROD.OUTLOOK.COM> <6591fcc6-5d2b-571b-7b93-cb06d623c3ba@ri.se>
In-Reply-To: <6591fcc6-5d2b-571b-7b93-cb06d623c3ba@ri.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=iotconsultancy.nl;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cfc73ad8-aea8-4cac-0c9f-08da01b53bb1
x-ms-traffictypediagnostic: HE1P190MB0252:EE_
x-microsoft-antispam-prvs: <HE1P190MB02524E4CF898D2A02FD1B139FD0A9@HE1P190MB0252.EURP190.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DBAP190MB0981.EURP190.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(346002)(136003)(376002)(396003)(39830400003)(366004)(33656002)(966005)(45080400002)(508600001)(66574015)(83380400001)(7696005)(9686003)(53546011)(6506007)(186003)(66446008)(122000001)(66476007)(66556008)(52536014)(5660300002)(64756008)(4326008)(76116006)(38100700002)(66946007)(86362001)(2906002)(38070700005)(30864003)(44832011)(110136005)(55016003)(316002)(71200400001)(8936002)(559001)(579004); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?NkNzaE5mSDlvMHNEa2g0Tk11bXZrUEhqQ2lvc2NjZ2ZCL20wOXZISHNjczJD?= =?utf-8?B?NGR0d2xqL1NoTGozSTBZRlcrcjF0ZWUxekRMUlA0TVJITWlwNDlOYkVyMi9M?= =?utf-8?B?QkxmRmI3QXNJMld4dmRCVG95VHBpYnZGMkhzQk1FSFoyQTZqaDh5M1F6VnFX?= =?utf-8?B?ZmN0cDRtWEVOTDh6N3IxNDBkSlNpdmpaRUhzSE1tQzhjUG54VW03SWE0NW9B?= =?utf-8?B?d1JUSmNWUlQwOUhiakdMYkx4LzFuTGRPK3ZHYlBkQWVVa0hkVUp5UDNnZkZk?= =?utf-8?B?WUJVK2RxOFdDaDc5Y2RIQ1puMjJGSXV3b1UvYmlWM09QUzF0b2U5dFdhQ2VM?= =?utf-8?B?QVlPaG83aW9JZ0VHek1QUkRUS3g5UUJSU2pFV0wwaEcvNjM4UlYwYXdqZFly?= =?utf-8?B?enRTeHk1RWZMZzFCRGx6RW44eFB1WVZWQ0RablRtbkdRSkxyeDBFVW5VSnEx?= =?utf-8?B?dW5FZFp3d1N5SXNXalZTaHZFZ1A3dlN4WElZQVZGS2F1OEJnYlliRThKL0dT?= =?utf-8?B?UkRpT3ZwTHpOYllxNU1BQzJSUkZBMm0zdGpFNUEvbnV3ZUJneE9tTGdMLysy?= =?utf-8?B?aDR4amdLUGpqblA5S0RhVUJtTjd1OW9hOUJoeFdvNGV5ZjBDMnJQaTNyNW5y?= =?utf-8?B?TlUvVTJVa3IvSWlPb25nOHEwUVF2UXBCQ0VpdUpnUGRzN0VvWDc1YUl1NTBk?= =?utf-8?B?bFlTWExrSmZnYU9DUThEN2RjTVpjQXFtVkljVXhwMDNLdDRqU0RodTZNa3lL?= =?utf-8?B?NytweFlvdW12NWFPcURFUGhKTDdTY0hxdFBYbkFPSUtuc2ZhYno4WE1JZzJS?= =?utf-8?B?ZVpQdk5EZ3Z2NnVSbUIwcW5QZXgyRk5kZnJFY001bk5TcVdLcGxWK21JZGlL?= =?utf-8?B?ZC9VdmpkcmNUT3ZiNEtnemJsZCs0ODNIUWFBQjFSczl0L0p2ZTdMdnk4TmN6?= =?utf-8?B?RnB3OEYxYlVZZCtJcGtuL3dnWERlT0doME1nbUMva2xlbFI3RjR6Vzk2TlV4?= =?utf-8?B?eFFGN2FrNGdpa1RrZ2FvQTdNNXNFUURobGFGK0tYSTNlREVhZzk1M2hVaWtq?= =?utf-8?B?QTNjZitjd2hRbGYraGNPb0FvRUttbzYwMUs0TmtQTmN2eFFDOHZGV2RJK3Fj?= =?utf-8?B?MVg0elpCNnBQejBpanFoS0QzMDZvNW9lTzlxZk44M3ZNT043c3ArWnIydUJF?= =?utf-8?B?T3hCMWJ5Nk84VTV0WW55aHdxaHlXeTc1QmNXVGV0OFIvMnhialE3UHlYV1Er?= =?utf-8?B?Und0ZkV6RzV4YTNVRWZLaWFUekZHVS9JalNIT2FIdFEzZTRZa1RVU2dXTVFQ?= =?utf-8?B?MFFBblYrRWhjUW9nYmRzWmRJbEJ4RUxoNWFXRkhsYlkwbGMxRW1iZkNHOUM0?= =?utf-8?B?cVJWT1ZsT1dQTEhaNk9LaktqQ0NsL1NQY01XT29Xc2xRY21sai9wNmZSL3d3?= =?utf-8?B?TERFY1VWeGN1SjdaanFIWmNhMm9IS0RVcS9OQmlNOTc5V3BkOHU5czRPTmQ1?= =?utf-8?B?RVFTWW85OFh5OEI5NnljR29jaDAyVGxuSVZVNGc4RHc1dFlOQjY2WjhFTWZj?= =?utf-8?B?QjU2WVk2dEN1NzRudnJCWGQ5OXFsN1lSeTgyeFZ2eVNUV1VXeFZWRWRobklZ?= =?utf-8?B?NzlUdVBhQlNlNko2L0JZcjVka0dkV3NQVUYxYzR3OUZHY3F0UFhyZS9rd2Z0?= =?utf-8?B?VWlLVkxTeHdRVkxXeUFCem55dWFUNXJGK3ZHVFN2TkQzWHM5cWcwYWMwQUsy?= =?utf-8?B?c1dOOXEyYndtbnpLeEcwT3FhVWJCOTlucm15TGRlZWtnT0ltZHFueU5JeGhW?= =?utf-8?B?SUpWWkdCalZwL3c3WFo2VlRNb3BhRmpuSDFFSURBUEg5d1dUQThBQlIyYk9I?= =?utf-8?B?dGpSK3pQTG9LbGtuZjRlU1BubzNLenNDbTZiVEhJQ3dXYlpLVUptMk1RbnV6?= =?utf-8?B?RFFhejJiMldjeXJlVzNzZjA5dVNOd284VHl3Vnl5MnRWRDB3ejFodkswcnEz?= =?utf-8?B?RFFQVVp1Wm9MUXhmMnlsdHg0K3QyQWdxQ0ZJTExxVzluT3Q4R2g5TmpubUht?= =?utf-8?B?Q3RnZmd0aktCRWszVzVxYWFWSlh1NmtwVFZTMlJ6L2FvUDBRRUlDclRWQVBt?= =?utf-8?B?dms0VXU2c2kyazlYcDdUekcvay9Vc3d4QndLWmRab2syY1M1b1FrTHNFaTNz?= =?utf-8?B?SkpTZ1pZRlF1OXh0OU9kblJOVTRJdXdFQzdLcjJQZGFydW5UUTZUQkNUek1W?= =?utf-8?B?b2ZhMUxFWmg0TStWSWFEdGFDanN1NlNpY3ZPeW95N2dYcCtKb1pVWVBSTTlO?= =?utf-8?B?MlQ0MXR4MGtTRVpKc3pCR29SVzBveUJMbzV3N25TcCtvc21vRnlOUT09?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: iotconsultancy.nl
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DBAP190MB0981.EURP190.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: cfc73ad8-aea8-4cac-0c9f-08da01b53bb1
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2022 10:11:52.7420 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 58bbf628-15d2-46bc-820b-863b6774d44b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 08qCVZPB/xe0bLUDlLj6s8NtKbd1o5eeOBleRqOQrArd4eGQlaDrWUvHjSDI68OT0aDXmPHRI8STZhu/0/Hm2IriB/QDCs3sofdylxhxROU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1P190MB0252
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/C2t1jRJf-nMFOyM0g-SzoPq3m-w>
Subject: Re: [core]  =?utf-8?q?=F0=9F=94=94_WG_Last_Call_of_draft-ietf-core-os?= =?utf-8?q?core-groupcomm?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2022 10:12:12 -0000

SGkgTWFyY28sDQoNClRoYW5rcyBmb3IgeW91ciBjb25zaWRlcmVkIHVwZGF0ZXMgYW5kIGRldGFp
bGVkIHJlc3BvbnNlcy4gSSBkaWRuJ3QgZm9sbG93IHRoZSBkZXRhaWxzIG9mIGhvdyB0aGUgZG9j
dW1lbnQgZXZvbHZlZCBiYXNlZCBvbiB0aGUgcmV2aWV3IGNvbW1lbnRzLg0KSWYgdGhlcmUncyBh
bnl0aGluZyB5b3UgbmVlZCBteSBpbnB1dCBvbiwgcGxlYXNlIGxldCBtZSBrbm93LiAgWW91ciBw
cm9wb3NhbHMgbG9vayBva2F5IHRvIG1lLg0KDQpPbmUgY29tbWVudCBvbiB0aGUgcmUtdXNpbmcg
b2YgR0lEIHZhbHVlczogYmFzZWQgb24geW91ciByZXBseSwgaXQgbG9va3MgbGlrZSByZS11c2Ug
b2YgR0lEcyBtYXkgYmUgY29tbW9uIGluIHNvbWUgaW1wbGVtZW50YXRpb25zIChlLmcuIHdoZW4g
dXNpbmcgdGhlIHNtYWxsIEdyb3VwIEVwb2NoIG51bWJlciBzcGFjZSBvZiAxNiBiaXRzIGxpa2Ug
aW4gQXBwZW5kaXggQywgaW4gdGhlIEdJRCkuDQpJZiB0aGF0J3MgdGhlIGNhc2UgdGhlbiB3ZSBj
YW4ndCByZWFsbHkgYXZvaWQgdGhlIGNvbXBsZXhpdGllcyBhc3NvY2lhdGVkIHRvIEdJRCByZS11
c2UsIHdoaWNoIHdlIHJhdGhlciB3b3VsZCB3YW50IHRvIGF2b2lkIGJ5IGp1c3QgcGlja2luZyBh
IHN1ZmZpY2llbnRseSBsYXJnZSBHSUQgbnVtYmVyIHNwYWNlIHRoYXQgbmV2ZXIgcnVucyBvdXQu
DQpJbiBjYXNlIHdlIHRoaW5rIHRoYXQgR0lEIHJlLXVzZSBzaG91bGQgc3RpbGwgYmUgYSByYXJl
IGNhc2UgLyBjb3JuZXIgY2FzZSwgdGhlbiBpdCB3b3VsZCBiZSBiZXR0ZXIgdG8gaGFuZGxlIHRo
ZSBjb21wbGV4aXR5IG9mIHRoaXMgaW4gYSBzZXBhcmF0ZSBzZWN0aW9uIHRoYXQgd2UgY2FuIHBv
aW50IHRvLiBUaGlzIHNlY3Rpb24gY2FuIHRoZW4gaW5jbHVkZSB0aGUgZGV0YWlscyBsaWtlIGV2
aWN0aW9uIG9mIGVsZGVyIG1lbWJlcnMuICAgVGhlbiBpdCBhdm9pZHMgYWxsIHRoYXQgY29tcGxl
eGl0eSBmb3IgaW1wbGVtZW50ZXJzIHdobyBvbmx5IHVzZSBhICJHSURzIGFyZSBuZXZlciByZS11
c2VkIiB0eXBlIG9mIHNvbHV0aW9uLg0KDQpCZXN0IHJlZ2FyZHMNCkVza28NCg0KLS0tLS1Pcmln
aW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IE1hcmNvIFRpbG9jYSA8bWFyY28udGlsb2NhQHJpLnNl
PiANClNlbnQ6IFdlZG5lc2RheSwgSmFudWFyeSAxOSwgMjAyMiAxMjowNg0KVG86IEVza28gRGlq
ayA8ZXNrby5kaWprQGlvdGNvbnN1bHRhbmN5Lm5sPjsgSmFpbWUgSmltw6luZXogPGphaW1lQGlr
aS5maT47IGNvcmVAaWV0Zi5vcmcNCkNjOiBkcmFmdC1pZXRmLWNvcmUtb3Njb3JlLWdyb3VwY29t
bS5hdXRob3JzQGlldGYub3JnDQpTdWJqZWN0OiBSZTogW2NvcmVdIPCflJQgV0cgTGFzdCBDYWxs
IG9mIGRyYWZ0LWlldGYtY29yZS1vc2NvcmUtZ3JvdXBjb21tDQoNCkhpIEVza28sDQoNClRoYW5r
IHlvdSB2ZXJ5IG11Y2ggYWdhaW4gZm9yIHlvdSByZXZpZXchDQoNClBsZWFzZSwgZmluZCBkZXRh
aWxlZCByZXBsaWVzIGlubGluZS4NCg0KQmVzdCwNCi9NYXJjbw0KDQpPbiAyMDIyLTAxLTExIDEw
OjE0LCBFc2tvIERpamsgd3JvdGU6DQo+IEhpIGV2ZXJ5b25lLA0KPg0KPiBJIGNvbXBsZXRlZCBt
eSByZXZpZXcgb2YgZHJhZnQtaWV0Zi1jb3JlLW9zY29yZS1ncm91cGNvbW0gZm9yIHRoaXMgMm5k
IGxhc3QgY2FsbC4gQmVsb3cgc29tZSBwb2ludHMgZm9yIGRpc2N1c3Npb24gb3IgY2xhcmlmaWNh
dGlvbiBhcmUgbGlzdGVkLiBJbiBhbm90aGVyIGVtYWlsIHRvZGF5IG9yIHRvbW9ycm93IEknbGwg
c2VuZCB0aGUgZWRpdG9yaWFsL3RleHR1YWwvbml0IGNvbW1lbnRzLg0KPiBPdmVyYWxsIG15IGlt
cHJlc3Npb24gb2YgdGhlIGRyYWZ0IGlzIGdvb2Q7IHRoZXJlIGhhcyBiZWVuIG11Y2ggYXR0ZW50
aW9uIHRvIGRldGFpbCBhbmQgZ3VpZGFuY2UgZm9yIHRoZSByZWFkZXJzL2ltcGxlbWVudGVycy4g
QWxzbyBpdHMgc2NvcGUgaXMgc2V0IHRvIHN1cHBvcnQgYXMgbWFueSB2YXJpYXRpb25zIGFzIHBv
c3NpYmxlIChlLmcuIHdpdGgvd2l0aG91dCBwYWlyd2lzZSBtb2RlLCBncm91cCBtb2RlLCB3aXRo
L3dpdGhvdXQgT2JzZXJ2ZSwgQmxvY2t3aXNlLCBzdXBwb3J0aW5nIG9ic2VydmF0aW9uIGFjcm9z
cyByZWtleWluZyBldmVudHMsIGV0Yy4pLiAgVGhlIGRvd25zaWRlIG9mIHRoYXQgaXMgdGhhdCB0
aGUgc3BlYyBiZWNvbWVzIGNvbXBsZXggYXQgcGFydGljdWxhciBwbGFjZXMgdG8gc3VwcG9ydCBh
bGwgb2YgdGhhdCBhdCB0aGUgc2FtZSB0aW1lLCBzZWN1cmVseS4gTWF5YmUgaW1wbGVtZW50ZXJz
IHdpbGwgdGhlcmVmb3JlIGNvbnNpZGVyIHRvIGltcGxlbWVudCBhIHN1YnNldCBvbmx5IHRvIGF2
b2lkIHNvbWUgb2YgdGhlIGNvbXBsZXhpdHk7IHdoaWNoIHNob3VsZCBiZSBvay4NCj4NCj4gQmVz
dCByZWdhcmRzDQo+IEVza28NCj4NCj4gLS0tDQo+DQo+IDENCj4gImluIG9yZGVyIHRvIHByb3Rl
Y3QgdGhlIHJvdXRpbmcgaW5mb3JtYXRpb24gb2YgcGFja2V0cyBmcm9tIG9ic2VydmVycyINCj4g
LT4gdGhpcyBmZWVscyBjb3VudGVyLWludHVpdGl2ZTsgd2hpY2ggcm91dGluZyBpbmZvcm1hdGlv
biBpcyBwcm90ZWN0ZWQgYnkgRFRMUz8gIElQIGhlYWRlcnMgcmVtYWluIHZpc2libGUuIE9yIGlz
IHRoZXJlIG1vcmUvb3RoZXIgcm91dGluZyBpbmZvcm1hdGlvbiBwcm90ZWN0ZWQgYnkgd3JhcHBp
bmcgR3JvdXAgT1NDT1JFIG1lc3NhZ2VzIGluIERUTFM/DQoNCj09Pk1UDQpUaGUgd29yZGluZyAi
cm91dGluZyBpbmZvcm1hdGlvbiIgd2FzIHN1Z2dlc3RlZCBieSBKaW0gaW4gYW4gb2xkIHJldmll
dy4gDQpUaGlzIHJlZmVycyB0byBDb0FQIG9wdGlvbnMgc3VjaCBhcyBVcmktSG9zdCwgVXJpLVBv
cnQgYW5kIFByb3h5LVVyaSwgDQp3aGljaCB3b3VsZCBub3QgYmUgcHJvdGVjdGVkIGJ5IChHcm91
cCkgT1NDT1JFIGJ1dCB3b3VsZCBiZSBwcm90ZWN0ZWQgYnkgDQpEVExTLg0KDQoNClBST1BPU0FM
OiBSZXBocmFzZSBhcyBmb2xsb3dzLg0KDQpPTEQ6DQoiLi4uIChhbmQgdmljZSB2ZXJzYSksIGlu
IG9yZGVyIHRvIHByb3RlY3QgdGhlIHJvdXRpbmcgaW5mb3JtYXRpb24gb2YgDQpwYWNrZXRzIGZy
b20gb2JzZXJ2ZXJzLiINCg0KTkVXOg0KIi4uLiAoYW5kIHZpY2UgdmVyc2EpLiBUaGlzIHByZXZl
bnRzIG9ic2VydmVycyBmcm9tIGFjY2Vzc2luZyBhZGRyZXNzaW5nIA0KaW5mb3JtYXRpb24gY29u
dmV5ZWQgaW4gQ29BUCBvcHRpb25zIHRoYXQgd291bGQgbm90IGJlIHByb3RlY3RlZCBieSANCkdy
b3VwIE9TQ09SRSwgYnV0IHdvdWxkIGJlIHByb3RlY3RlZCBieSBEVExTLiBUaGVzZSBvcHRpb25z
IGluY2x1ZGUgDQpVcmktSG9zdCwgVXJpLVBvcnQgYW5kIFByb3h5LVVyaS4NCjw9PQ0KDQo+DQo+
ICJidXQgaGFzIHRoZSBiZW5lZml0IG9mIHJlc3RyaWN0aW5nIHRoZSBzeW1tZXRyaWMga2V5aW5n
IG1hdGVyaWFsIHdoaWxlIGRpc3RyaWJ1dGluZyBvbmx5IHRoZSBwdWJsaWMga2V5IG9mIGVhY2gg
Z3JvdXAgbWVtYmVyLiINCj4gLT4gY2FuIGJlIGZvcm11bGF0ZWQgbW9yZSBjbGVhcmx5OiBpbiB3
aGF0IHdheSBpcyB0aGUgc3ltbWV0cmljIGtleWluZyBtYXRlcmlhbCByZXN0cmljdGVkPyBFLmcu
IGRvIHdlIG1lYW4gcmVzdHJpY3RpbmcgYW55IGdpdmVuIHN5bW1ldHJpYyBrZXkgdG8gb25seSB0
aG9zZSAyIENvQVAgZW5kcG9pbnRzIHRoYXQgbmVlZCB0byBjb21tdW5pY2F0ZSB1c2luZyBpdC4g
SXQgaXMgbm90IHJlc3RyaWN0ZWQgaW4gdGhlIHNlbnNlIG9mIHJlc3RyaWN0ZWQgc2NvcGUgb3Is
IHNheSwgcmVzdHJpY3RlZCAobG93ZXIpIGtleSBsZW5ndGguDQo+ICAgIEFuZCAnd2hpbGUgZGlz
dHJpYnV0aW5nIG9ubHkgdGhlIHB1YmxpYyBrZXkgb2YgZWFjaCBncm91cCBtZW1iZXInIGNvdWxk
IGJlIG1vcmUgc3BlY2lmaWMgYWxzby4gVG8gd2hhdCBvdGhlciBub2RlKHMpIGlzIHRoZSBwdWJs
aWMga2V5IG9mIGEgZ3JvdXAgbWVtYmVyIHNlbnQ/IEUuZy4gb25seSB0byB0aG9zZSBDb0FQIGVu
ZHBvaW50cyB0aGF0IG5lZWQgdG8gY29tbXVuaWNhdGUgd2l0aCB0aGF0IGdyb3VwIG1lbWJlciwg
bm90IHRvDQo+IGFsbCBncm91cCBtZW1iZXJzIEkgdGhpbmsuDQoNCj09Pk1UDQpPbiB0aGUgZmly
c3QgcG9pbnQsIHRoZSByZXN0cmljdGlvbiBpcyBub3QgYWJvdXQgdGhlIHNjb3BlIG9mIGtleSB1
c2FnZSANCm9yIGFib3V0IGtleSBsZW5ndGguIEl0IGlzIGFib3V0IHRoZSBhbW91bnQgb2Ygc3lt
bWV0cmljIG1hdGVyaWFsIHRvIA0KZGlzdHJpYnV0ZS4gUmF0aGVyIHRoYW4gZGlzdHJpYnV0aW5n
IChhdCBtb3N0KSBvbmUgc3ltbWV0cmljIGtleSBwZXIgDQpvdGhlciBncm91cCBtZW1iZXIsIHRo
ZSBHcm91cCBNYW5hZ2VyIHByb3ZpZGVzIG9uZSBzaGFyZWQgTWFzdGVyIFNlY3JldCANCmFuZCAo
YXQgbW9zdCkgb25lIHB1YmxpYyBrZXkgcGVyIGdyb3VwIG1lbWJlci4NCg0KT24gdGhlIHNlY29u
ZCBwb2ludCwgdGhlIGRpc3RyaWJ1dGlvbiBvZiBwdWJsaWMga2V5cyB0byBhIGNlcnRhaW4gbm9k
ZSBYIA0KY2FuIGJhc2ljYWxseSBoYXBwZW4gYXQgdHdvIHBvaW50cyBpbiB0aW1lOiB3aGVuIFgg
KHJlLSlqb2lucyB0aGUgZ3JvdXAgDQpvciB3aGVuIFggYXNrcyB0aGUgR3JvdXAgTWFuYWdlciBm
b3Igb3RoZXIgbWVtYmVycycgcHVibGljIGtleXMgd2hpbGUgDQphbHJlYWR5IGEgZ3JvdXAgbWVt
YmVyLiBJbiBlaXRoZXIgY2FzZSwgWCBjYW4sIGUuZy4sIGFzayBmb3IgdGhlIHB1YmxpYyANCmtl
eXMgb2YgYWxsIGdyb3VwIG1lbWJlcnMsIG9yIHNwZWNpZnkgc29tZSBmaWx0ZXIgY3JpdGVyaWEg
dG8gb2J0YWluIHRoZSANCnB1YmxpYyBrZXlzIG9mIG9ubHkgc29tZSBtZW1iZXJzLg0KDQpUaGVz
ZSBkZXRhaWxzIHJlbGF0ZWQgdG8ga2V5IGRpc3RyaWJ1dGlvbiBhcmUgaW50ZW50aW9uYWxseSBv
dXQgb2Ygc2NvcGUgDQpmb3IgR3JvdXAgT1NDT1JFLiBJbiB0aGUgYXBwcm9hY2ggZGVmaW5lZCBp
biANCmRyYWZ0LWlldGYtYWNlLWtleS1ncm91cGNvbW0tb3Njb3JlwqAgYWxsIHN1Y2ggZGV0YWls
cyBhcmUgYWxzbyBkZWZpbmVkLg0KDQoNClBST1BPU0FMOiBJbiBvcmRlciB0byBhZGRyZXNzIHRo
aXMgY29tbWVudCB3aGlsZSBub3QgZ2V0dGluZyBpbnRvIGtleSANCmRpc3RyaWJ1dGlvbiBkZXRh
aWxzLCB3ZSBjYW4gcmVwaHJhc2UgYXMgZm9sbG93cy4NCg0KDQpPTEQ6DQoiLi4uIGl0IGlzIGRl
c2lyYWJsZSB0byByZXN0cmljdCB0aGUgcHJvdmlzaW9uZWQga2V5aW5nIG1hdGVyaWFsLiINCg0K
TkVXOg0KIi4uLiBpdCBpcyBkZXNpcmFibGUgdG8gcmVzdHJpY3QgdGhlIGFtb3VudCBvZiBzZWNy
ZXQga2V5aW5nIG1hdGVyaWFsIA0KcHJvdmlkZWQgdG8gZWFjaCBub2RlLiINCg0KDQpPTEQ6DQoi
Li4uIChzZWUgU2VjdGlvbiAzKSwgYnV0IGhhcyB0aGUgYmVuZWZpdCBvZiByZXN0cmljdGluZyB0
aGUgc3ltbWV0cmljIA0Ka2V5aW5nIG1hdGVyaWFsIHdoaWxlIGRpc3RyaWJ1dGluZyBvbmx5IHRo
ZSBwdWJsaWMga2V5IG9mIGVhY2ggZ3JvdXAgDQptZW1iZXIuIg0KDQpORVcNCiIuLi4gKHNlZSBT
ZWN0aW9uIDMpLiBIb3dldmVyLCBpdCBoYXMgdGhlIGJlbmVmaXQgb2YgZGlzdHJpYnV0aW5nIGEg
DQpzaW5nbGUgc2hhcmVkIHNlY3JldCwgd2hpbGUgZGlzdHJpYnV0aW5nIG9ubHkgdGhlIHB1Ymxp
YyBrZXlzIG9mIGdyb3VwIA0KbWVtYmVycyBvciBhIHN1YnNldCBvZiB0aG9zZS4iDQoNCjw9PQ0K
DQo+DQo+IDEuMSBUZXJtaW5vbG9neQ0KPiBQZXJoYXBzIHRoZSBkaWZmZXJlbmNlIGJldHdlZW4g
Im5vZGUiIGFuZCAiZW5kcG9pbnQiIGNhbiBiZSByZWl0ZXJhdGVkIGhlcmUsIGV2ZW4gdGhvdWdo
IGl0IHdhcyBkZWZpbmVkIGJ5IFJGQyA3MjUyLiAgSW4gdGhpcyBkcmFmdCB0aGUgJ3Rlcm0nIG5v
ZGUgaXMgb2Z0ZW4gdXNlZCBlLmcuIGluIFNlY3Rpb24gMy4yIHRvIGluZGljYXRlIGEgbm9kZSB3
aXRoIGEgc2luZ2xlIGVuZHBvaW50IHdoZXJlIHRoYXQgZW5kcG9pbnQgam9pbnMgYSBncm91cC4g
IFNvIHdoZW4gd2UgdGFsayBhYm91dCBhICdub2RlIGFzIGEgZ3JvdXAgbWVtYmVyJyB0aGF0IGl0
IG1lYW5zIGEgc2luZ2xlIGVuZHBvaW50IGhvc3RlZCBvbiB0aGF0IG5vZGUuIExhdGVyIGluIFNl
Y3Rpb24gMy4yLiBpdCBlLmcuIHN0YXRlcyBlbmRwb2ludHMgYXJlIHJlbW92ZWQgZnJvbSB0aGUg
Z3JvdXAgd2hpY2ggdGhlbiBleGNsdWRlcyBub2RlcyBmcm9tIGNvbW11bmljYXRpb24gd2l0aCB0
aGUgZ3JvdXAuIEluIGNhc2UgYSBub2RlIGNhbiBob3N0IG11bHRpcGxlIGVuZHBvaW50cywgd2Ug
bWF5IG5lZWQgdG8gc2F5IHRoZW4gdGhhdCBhbGwgZW5kcG9pbnRzIG9mIGEgcGFydGljdWxhciBu
b2RlIG5lZWQgdG8gYmUgcmVtb3ZlZCBmcm9tIHRoZSBncm91cC4gKEFzc3VtaW5nIGl0IGNhbiBo
YXZlIG11bHRpcGxlIGxpa2UgZGVmaW5lZCBieSBSRkMgNzI1Mi4pIFNvIHRoZW4gaXQgYmVjb21l
cyBpbXBvcnRhbnQgZm9yIHNlY3VyaXR5IHJlYXNvbnMgdG8gZ2V0IHRoZSBkaXN0aW5jdGlvbiBj
bGVhci4NCg0KPT0+TVQNCkdvb2QgcG9pbnRzLiBJIHNlZSB0aGlzIGNvbW1lbnQgYXMgdHdvZm9s
ZC4NCg0KT24gdGhlIGZpcnN0IHBhcnQsIGxvb2tpbmcgYXQgUkZDIDg2MTMsIE9TQ09SRSBhbHdh
eXMgdXNlcyAiZW5kcG9pbnQiIA0KZm9yIHdoYXQgY29uY2VybnMgdGhlIGFjdHVhbCBzZWN1cml0
eSBwcm90b2NvbC4gSW5zdGVhZCwgaXQgdXNlcyAibm9kZSIgDQpvbmx5IGZvciAiY29uc3RyYWlu
ZWQgbm9kZSIsICJpbnRlcm1lZGlhcnkgbm9kZSIgb3IgIm5leHQgbm9kZSIuDQoNClRoZSBvY2N1
cnJlbmNlcyBvZiAibm9kZSIgdGhhdCB5b3UgZm91bmQgY2FuIGJlIGJldHRlciByZXBsYWNlZCBi
eSANCiJtZW1iZXIiIG9yICJlbmRwb2ludCIgKGRlcGVuZGluZyBvbiB0aGUgY29udGV4dCkuIE5v
dGUgdGhhdCBhIGdyb3VwIA0KbWVtYmVyIGlzIGFjdHVhbGx5IGFuICJlbmRwb2ludCIuIEluIGZh
Y3QsIFNlbmRlciBJRHMgYXNzaWduZWQgdG8gZ3JvdXAgDQptZW1iZXJzIGFyZSBmaXJzdCBvZiBh
bGwgZGVmaW5lZCBieSBPU0NPUkUgYXMgYXNzb2NpYXRlZCB0byBlbmRwb2ludHMuDQoNClJlbGF0
ZWQgZml4ZXMgYXJlOg0KDQpTZWN0aW9uIDE6IHMvbnVtYmVyIG9mIG5vZGVzL251bWJlciBvZiBl
bmRwb2ludHMNCihub3RlICJlbmRwb2ludHMiIHJhdGhlciB0aGFuICJtZW1iZXJzIiBoZXJlLCB0
aHVzIHRha2luZyBpbnRvIGFjY291bnQgDQpib3RoIGN1cnJlbnQgZ3JvdXAgbWVtYmVycyBhbmQg
Y2FuZGlkYXRlIGdyb3VwIG1lbWJlcnMgdGhhdCBzdGlsbCBoYXZlIA0KdG8gam9pbikNCg0KU2Vj
dGlvbiAzLjE6IHMvV2hlbiBhIG5vZGUgKHJlLSlqb2lucyBhIGdyb3VwL1doZW4gYW4gZW5kcG9p
bnQgDQoocmUtKWpvaW5zIGEgZ3JvdXANCg0KU2VjdGlvbiAzLjE6IHMvdGhlIEJpcnRoIEdpZCBv
ZiB0aGF0IG5vZGUvdGhlIEJpcnRoIEdpZCBvZiB0aGF0IGVuZHBvaW50DQoNClNlY3Rpb24gMy4x
OiBzL0luIGNhc2UgdGhlIG5vZGUgaGFzIGluIGZhY3QvSW4gY2FzZSB0aGUgZW5kcG9pbnQgaGFz
IGluIGZhY3QNCg0KU2VjdGlvbiAzLjE6IHMvVXBvbiBub2Rlcycgam9pbmluZy9VcG9uIGVuZHBv
aW50cycgam9pbmluZw0KDQpTZWN0aW9uIDMuMjogcy90aGlzIGV4Y2x1ZGVzIHN1Y2ggbm9kZXMv
dGhpcyBleGNsdWRlcyBzdWNoIGVuZHBvaW50cw0KKHRoaXMgd291bGQgYWxzbyBiZSBjb25zaXN0
ZW50IHdpdGggdGhlIHByZXZpb3VzIHNlbnRlbmNlIG9mIHRoZSBzZWN0aW9uKQ0KDQpTZWN0aW9u
IDExLjE6IHMvaW4gY2FzZSBvZiBub2RlcycgbGVhdmluZy9pbiBjYXNlIG9mIG1lbWJlcnMnIGxl
YXZpbmcNCg0KSSBjb3VsZG4ndCBmaW5kIG90aGVyIGFtYmlndW91cyB1c2VzIG9mICJub2RlIiBh
bmQgImVuZHBvaW50Ii4NCg0KDQpPbiB0aGUgc2Vjb25kIHBhcnQsIHllcywgYSBub2RlIG1pZ2h0
IGFkbWl0IG11bHRpcGxlIGVuZHBvaW50cywgc2F5IEUxIA0KYW5kIEUyLCB3aGljaCB0aHVzIHdv
dWxkIGhhdmUgc2VwYXJhdGVseSBqb2luZWQgdGhlIGdyb3VwIGFzIGRpc3RpbmN0IA0KZ3JvdXAg
bWVtYmVycy4gVGhlIGV2aWN0aW9uIG9mIEUxIGFzIGNvbXByb21pc2VkIGRvZXMgbm90IG5lY2Vz
c2FyaWx5IA0KbWVhbiB0aGF0IEUyIGlzIGFsc28gY29tcHJvbWlzZWQgYW5kIHRvIGJlIGV2aWN0
ZWQuDQoNCg0KUFJPUE9TQUw6IFBlcmZvcm0gdGhlIGZpeGVzIGFuZCByZXBocmFzaW5nIGFib3Zl
LiBJbiBTZWN0aW9uIDMuMiwgd2UgY2FuIA0KY2xhcmlmeSB0aGF0IGlmIGEgKm5vZGUqIGlzIGRl
dGVjdGVkIHRvIGJlIGNvbXByb21pc2VkLCB0aGUgR3JvdXAgDQpNYW5hZ2VyIG11c3QgZXZpY3Qg
YWxsIHRoZSBncm91cCBtZW1iZXJzIGNvcnJlc3BvbmRpbmcgdG8gZW5kcG9pbnRzIA0KImxpdmlu
ZyIgaW4gdGhhdCBub2RlLg0KPD09DQoNCj4NCj4gMi4zIC8gMi40LjENCj4gU2VjdGlvbiAyLjMg
ZGlzY3Vzc2VzIGZvcm1hdCByZXF1aXJlbWVudHMgZm9yIHB1YmxpYyBrZXlzLiBJdCBhbHNvIHNh
eXMgIkZvciBleGFtcGxlLCBhbiBYLjUwOSBjZXJ0aWZpY2F0ZSBpcyBwcm92aWRlZCBhcyBpdHMg
ZGlyZWN0IGJpbmFyeSBzZXJpYWxpemF0aW9uLiIgd2hpY2ggd2FzIHF1aXRlIGNvbmZ1c2luZyB0
byBtZSBhcyBpdCBzdWdnZXN0cyB0aGUgZW50aXJlIGNlcnRpZmljYXRlIGlzIGRlbm90ZWQgYXMg
YSAicHViaWMga2V5IiBhbmQgdXNlZCBhcyBzdWNoIGluIDIuNC4xIHByb2NlZHVyZXMuDQo+IERv
ZXMgdGhpcyBtZWFuIGluIFNlY3Rpb24gMi40LjEgdGhlIGVudGlyZSBYLjUwOSBjZXJ0aWZpY2F0
ZSBpcyB1c2VkIHRvIGRlcml2ZSB0aGUgcGFpcndpc2Uga2V5PyBUaGF0IHNlZW1zIGxlc3MgZWZm
aWNpZW50IGFzIGEgbm9kZSB0aGVuIGhhcyB0byBzdG9yZSB0aGUgZW50aXJlIFguNTA5IGNlcnRp
ZmljYXRlIG9mIGVhY2ggcGVlciwgaW5zdGVhZCBvZiBqdXN0IHRoZSBwdWJsaWMta2V5IHBhcnQg
b2YgaXQgKHRoZSBTdWJqZWN0UHVibGljS2V5SW5mbyBzdHJ1Y3R1cmUpLiBUaGF0IHdpbGwgdGFr
ZSBtb3JlIG1lbW9yeSB0aGFuIHBlcmhhcHMgbmVlZGVkLg0KPiBNYXliZSB0aGVyZSdzIHNvbWUg
cmVhc29uIHRoZSBmdWxsIGNlcnRpZmljYXRlIGlzIHVzZWQgYW5kIG5vdCBqdXN0IHRoZSBTdWJq
ZWN0UHVibGljS2V5SW5mbyBwYXJ0IG9mIGl0PyBJdCBjb3VsZCBhdm9pZCBmdXJ0aGVyIHBhcnNp
bmcgb2YgdGhlIGNlcnRpZmljYXRlIHN0cnVjdHVyZS4gIEFsc28gd2hlbiBvbmx5IGEgcGFydCBp
cyB1c2VkIGl0IG5lZWRzIHRvIGJlIHJlYWxseSBjbGVhcmx5IGRlZmluZWQgdG8gYXZvaWQgdW5j
bGFyaXRpZXMgYWJvdXQgd2hhdCBwYXJ0IHRvIHJlYWxseSB1c2UgKGFzIHdlIGhhZCBpbiB0aGUg
QU5JTUEgV0cpLg0KPiBBbmQgYW5vdGhlciB0aG91Z2h0OiBiZXNpZGVzIG1lbW9yeSBpbXBhY3Qs
IHdvdWxkIHVzaW5nIHRoZSBmdWxsIFguNTA5IGJlIG1vcmUgb3ZlcmhlYWQgb24gYSBjb25zdHJh
aW5lZCBkZXZpY2UgaW5zdGVhZCBvZiBqdXN0IHRoZSBTdWJqZWN0UHVibGljS2V5SW5mbyBwYXJ0
IG9mIGl0PyBJLmUuIHRoZSBpbnB1dCB0byB0aGUgSEtERiguKSBpcyBzdWJzdGFudGlhbGx5IGxv
bmdlciB3aGVuIHVzaW5nIHRoZSBmdWxsIGNlcnQuDQoNCj09Pk1UDQpZZXMsIHlvdSB1bmRlcnN0
b29kIGNvcnJlY3RseSwgdGhlIHdob2xlIFguNTA5IGNlcnRpZmljYXRlIGFuZCBpdHMgDQpzZXJp
YWxpemF0aW9uIHdvdWxkIGJlIHN0b3JlZCBhbmQgdXNlZCBmb3IgdGhlIHByb2Nlc3MgeW91IG1l
bnRpb24uDQoNCldoYXQgZm9sbG93cyByZWxhdGVzIHRvIHRoZSB0aHJlZSBkaWZmZXJlbnQgcGFy
dHMgb2YgdGhlIGNvbW1lbnRzLg0KDQoxKSBZZXMsIHRoZSBjdXJyZW50IHRleHQgZGVub3RlcyB0
aGUgZW50aXJlIGNlcnRpZmljYXRlIGFzIHRoZSAicHVibGljIGtleSIuDQoNCiDCoMKgIFRvIGF2
b2lkIGFueSBjb25mdXNpb24sIHdlIGNhbiBmb2xsb3cgbW9yZSBjbG9zZWx5IHRoZSBzYW1lIA0K
dGVybWlub2xvZ3kgdXNlZCBpbiBkcmFmdC1pZXRmLWxha2UtZWRob2MgLCBhbmQgdXNlICJhdXRo
ZW50aWNhdGlvbiANCmNyZWRlbnRpYWwiIHRvIGRlbm90ZSBYLjUwOSBvciBDNTA5IGNlcnRpZmlj
YXRlcywgQ1dULCBhbmQgQ0NTLg0KDQogwqDCoCBUaGVuIGFuICJhdXRoZW50aWNhdGlvbiBjcmVk
ZW50aWFsIiBpbmNsdWRlcyBhICJwdWJsaWMga2V5IiBhcyANCmF1dGhlbnRpY2F0aW9uIGtleSwg
d2l0aCBkZXRhaWxzIGRlcGVuZGluZyBvbiB0aGUgdHlwZSBvZiANCiJhdXRoZW50aWNhdGlvbiBj
cmVkZW50aWFsIi4NCg0KIMKgwqAgVGhhdCBzYWlkLCB0aGUgd2hvbGUgImF1dGhlbnRpY2F0aW9u
IGNyZWRlbnRpYWxzIiBhcmUgY3VycmVudGx5IA0KdXNlZDogaSkgdG8gZGVyaXZlIHBhaXJ3aXNl
IGtleXMsIHNlZSBTZWN0aW9uIDIuNC4xLCBvbiB3aGljaCBwcm9jZXNzIGEgDQpzZWN1cml0eSBw
cm9vZiBoYXMgYmVlbiBhY2NvcmRpbmdseSBwcm9kdWNlZCBpbiBbVGhvcm1hcmtlcl07IGFuZCBp
aSkgdG8gDQpmaWxsIHRoZSBleHRlcm5hbF9hYWQgc3RydWN0dXJlLCBzZWUgU2VjdGlvbiA0LjMu
DQoNCiDCoMKgIEluc3RlYWQsIHRoZSAicHVibGljIGtleSIgYWxvbmUgaXMgdXNlZDogaSkgdG8g
Y29tcHV0ZSBhIA0KRGlmZmllLUhlbGxtYW4gc2hhcmVkIHNlY3JldCB0byBkZXJpdmUgcGFpcndp
c2Uga2V5cywgc2VlIFNlY3Rpb24gDQoyLjQuMS47IGFuZCBpaSkgdG8gdmVyaWZ5IHRoZSBzaWdu
YXR1cmUgb2YgaW5jb21pbmcgbWVzc2FnZXMgcHJvdGVjdGVkIA0KaW4gZ3JvdXAgbW9kZSwgc2Vl
IFNlY3Rpb25zIDguMiBhbmQgOC40Lg0KDQoNCiDCoMKgIFBST1BPU0FMOiBUaGUgZG9jdW1lbnQg
Y2FuIGJlIHJldmlzZWQgdG8gY29uc2lzdGVudGx5IHVzZSANCiJhdXRoZW50aWNhdGlvbiBjcmVk
ZW50aWFsIiBvciAicHVibGljIGtleSIgYXMgYWJvdmUuDQoNCg0KMikgT24gY29uc2lkZXJpbmcg
dGhlIHdob2xlICJhdXRoZW50aWNhdGlvbiBjcmVkZW50aWFscyIgdmVyYmF0aW0gYXMgcGVyIA0K
dGhlIHByZXZpb3VzIHBvaW50LCB0aGlzIGhhcyBiZWVuIGFsaWduZWQgdG8gZHJhZnQtaWV0Zi1s
YWtlLWVkaG9jLg0KDQogwqDCoCBXaGlsZSBjb25zaWRlcmluZyB0aGF0ICJhdXRoZW50aWNhdGlv
biBjcmVkZW50aWFscyIgYXJlIGludm9sdmVkIGluIA0Ka2V5IGRlcml2YXRpb24gKGkuZS4sIG9m
IHBhaXJ3aXNlIGtleXMpIGFuZCBpbiBzdHJ1Y3R1cmVzIHByb3ZpZGluZyANCnNlY3VyZSBtZXNz
YWdlIGJpbmRpbmcgKGkuZS4sIHRoZSBleHRlcm5hbF9hYWQpLCB0aGVyZSBhcmUgcmVhc29ucyB0
byANCmNvbnNpZGVyIGtlZXBpbmcgdGhlbSB2ZXJiYXRpbS4NCg0KIMKgwqAgKiBJdCBlbnN1cmVz
IHRvIGNhcnJ5IG9uIGFsc28gbWV0YWRhdGEgYW5kIHBhcmFtZXRlcnMgcmVsYXRlZCB0byB0aGUg
DQpwdWJsaWMga2V5LiBUaGVzZSBpbmNsdWRlIG5vdCBvbmx5IHRoZSBwdWJsaWMga2V5IGFsZ29y
aXRobSAodGhhdCB3b3VsZCANCmluZGVlZCBiZSwgZS5nLiwgaW4gdGhlIFN1YmplY3RQdWJsaWNL
ZXlJbmZvIHN0cnVjdHVyZSBvZiBhbiBYLjUwOSANCmNlcnRpZmljYXRlKSwgYnV0IGFsc28gb3Ro
ZXIgcmVsZXZhbnQgcGllY2VzIG9mIGluZm9ybWF0aW9uIChpZiBwcmVzZW50KSANCnN1Y2ggYXMg
a2V5IHVzYWdlLCBleHBpcmF0aW9uIHRpbWUsIGlzc3VlciBhbmQgc3ViamVjdC4NCg0KIMKgwqAg
KiBJdCBlbnN1cmVzIHRoYXQgYWxsIGVuZHBvaW50cyB1c2luZyBhbm90aGVyIGVuZHBvaW50J3Mg
DQoiYXV0aGVudGljYXRpb24gY3JlZGVudGlhbCIgaGFuZGxlIGV4YWN0bHkgdGhlIHNhbWUgYnl0
ZXMsIGFzIG9idGFpbmVkIA0KYnkgdGhlIGNyZWRlbnRpYWwgcHJvdmlkZXIgKGUuZy4sIHRoZSBP
U0NPUkUgR3JvdXAgTWFuYWdlcikgYW5kIGFzIA0KY3JhZnRlZCBieSB0aGUgb3JpZ2luYWwgY3Jl
ZGVudGlhbCBpc3N1ZXIuDQoNCiDCoMKgIFN1cmUsIHRoaXMgc2ltcGxpY2l0eSBpbnRyb2R1Y2Vz
IHRoZSBjb3N0IG9mIHN0b3JpbmcgdGhlIHdob2xlIA0KImF1dGhlbnRpY2F0aW9uIGNyZWRlbnRp
YWwiIGFzIGEgbGFyZ2VyIG9iamVjdCwgYWxzbyBhZnRlciBoYXZpbmcgDQpzdWNjZXNzZnVsbHkg
dmFsaWRhdGVkIGl0LiBIb3dldmVyLCBub3QgZG9pbmcgdGhhdCBhbmQgcmF0aGVyIHByZXNlcnZp
bmcgDQpvbmx5IGEgc3Vic2V0IG9mIGl0cyBjb250ZW50LCB3b3VsZCByZXN1bHQgaW4gZGlmZmVy
ZW50IGNvbXBsaWNhdGlvbnMuDQoNCiDCoMKgICogRm9yIGVhY2ggdHlwZSBvZiBjdXJyZW50IGFu
ZCBmdXR1cmUgImF1dGhlbnRpY2F0aW9uIGNyZWRlbnRpYWwiLCANCml0IGJlY29tZXMgbmVjZXNz
YXJ5IHRvIGRlZmluZSB0aGUgZXhhY3Qgc3Vic2V0IG9mIGluZm9ybWF0aW9uIHRvIGJlIA0KZXh0
cmFjdGVkIGFuZCBwcmVzZXJ2ZWQuIFRoaXMgc3Vic2V0IG11c3QgYmUga2VwdCB1cCB0byBkYXRl
IGlmIGEgdHlwZSANCm9mICJhdXRoZW50aWNhdGlvbiBjcmVkZW50aWFsIiBpcyBleHRlbmRlZCBp
biB0aGUgZnV0dXJlLg0KDQogwqDCoCAqIEZvciBlYWNoIHR5cGUgb2YgY3VycmVudCBhbmQgZnV0
dXJlICJhdXRoZW50aWNhdGlvbiBjcmVkZW50aWFsIiwgDQppdCBiZWNvbWVzIG5lY2Vzc2FyeSB0
byBkZWZpbmUgdGhlIGV4YWN0IGNhbm9uaWNhbCB3YXkgdG8gZW5jb2RlIHN1Y2ggYSANCnN1YnNl
dCwgaW4gb3JkZXIgdG8gZW5zdXJlIHRoYXQgYWxsIGVuZHBvaW50cyBjb252ZXJnZSB0byB0aGUg
c2FtZSByZXN1bHQuDQoNCiDCoMKgIFRoaXMgaXMgYSB0cmFkZS1vZmYgYmV0d2VlbiBzdG9yYWdl
IG9uIG9uZSBoYW5kLCBhbmQgDQpjb21wbGV4aXR5L2ZlYXNpYmlsaXR5L2ZsZXhpYmlsaXR5IGlu
IGNvcnJlY3RseSBoYW5kbGluZyAiYXV0aGVudGljYXRpb24gDQpjcmVkZW50aWFscyIgKHdoaWNo
LCBpbiB0aGUgZnV0dXJlLCBjYW4gYmUgZXh0ZW5kZWQgb3IgbmV3bHkgaW50cm9kdWNlZCkuDQoN
CiDCoMKgIFBlcnNvbmFsbHksIEkgdGVuZCB0byBmYXZvciB0aGUgbGF0dGVyLCB3aGlsZSBzZWVp
bmcgdGhlIGZvcm1lciBhcyANCmFuIGluY2VudGl2ZSB0byBwcmVmZXIgbW9yZSBjb21wYWN0IHR5
cGVzIG9mICJhdXRoZW50aWNhdGlvbiANCmNyZWRlbnRpYWwiLCBlc3BlY2lhbGx5IGluIGxhcmdl
IGdyb3Vwcy4NCg0KDQogwqDCoCBQUk9QT1NBTDogQWRkIHRyYWRlLW9mZiBjb25zaWRlcmF0aW9u
cyBhcyBhYm92ZT8NCg0KDQozKSBCZXNpZGVzIHRoZSBtZW1vcnkgaW1wYWN0IGFuZCByYXRoZXIg
Y29uc2lkZXJpbmcgdGhlIHByb2Nlc3Npbmcgc2lkZSANCndoZW4gZGVyaXZpbmcgcGFpcndpc2Ug
a2V5cyBpbiBTZWN0aW9uIDIuNC4xLCBwcm92aWRpbmcgYSBsb25nZXIgaW5wdXQgDQp0byBIREtG
KC4pIHNob3VsZCBzdGlsbCBiZSBmaW5lLiBJbiBmYWN0LCB0aGUgd2hvbGUgImF1dGhlbnRpY2F0
aW9uIA0KY3JlZGVudGlhbHMiIGFyZSB1c2VkIHRvIGJ1aWxkIHRoZSBJS00gcGFyYW1ldGVyIG9m
IEhLREYsIHdoaWNoIGluIHR1cm4gDQppcyB1c2VkIGluIHRoZSBFeHRyYWN0IHN0ZXAgY29uc2lz
dGluZyBvZiBhIHNpbmdsZSBITUFDLUhhc2goKSANCmludm9jYXRpb24sIHNlZSBSRkMgNTg2OS4N
Cg0KDQogwqDCoCBQUk9QT1NBTDogaWYgdGhlIGFib3ZlIGlzIGNsZWFyIGFuZCBhZ3JlZWQsIG5v
IGFjdGlvbi4NCjw9PQ0KDQo+DQo+IDIuNC4xDQo+IHRoZSBhZGplY3RpdmUgIihzaWduYXR1cmUp
IiBpcyB1c2VkIGEgY291cGxlIG9mIHRpbWVzLiBJIGRvbid0IHNlZSBhICJzaWduYXR1cmUgcHVi
bGljIGtleSIgYmVpbmcgZGVmaW5lZCBleHBsaWNpdGx5LiBBbHNvIEZpZyAxIGRvZXMgbm90IHVz
ZSAiKHNpZ25hdHVyZSkiLiBEbyBJIG1pc3Mgc29tZXRoaW5nPw0KDQo9PT5NVA0KTm8sIHRoYXQg
d2FzIGp1c3QgYSB0b28gY29tcHJlc3NlZCB3YXkgdG8gaW5kaWNhdGUgdGhhdCBhIHB1YmxpYyBr
ZXkgY2FuIA0KYmUgZWl0aGVyIGEgc2lnbmF0dXJlIHB1YmxpYyBrZXkgb3IgYSBEaWZmaWUtSGVs
bG1hbiBwdWJsaWMga2V5Lg0KDQpUaGUgZm9ybWVyIGNhc2UgaXMgdGhlIHR5cGljYWwgb25lLCB3
aGVyZSB0aGUgZ3JvdXAgdXNlcyB0aGUgZ3JvdXAgbW9kZSwgDQpwb3NzaWJseSB0b2dldGhlciB3
aXRoIHRoZSBwYWlyd2lzZSBtb2RlLiBUaGVuLCBwdWJsaWMga2V5cyBhcmUgDQpzaWduYXR1cmUg
a2V5cy4NCg0KVGhlIGxhdHRlciBjYXNlIGlzIHJlbGV2YW50IHRvIGEgZ3JvdXAgdXNpbmcgb25s
eSB0aGUgcGFpcndpc2UgbW9kZSwgDQp3aGVyZSBlbmRwb2ludHMgd2lsbCBoYXZlIERpZmZpZS1I
ZWxsbWFuIGtleXMgYXMgcHVibGljIGtleXMuDQoNCg0KUFJPUE9TQUw6IENvbnNpZGVyaW5nIHRo
ZSBwb3NzaWJsZSBjb25mdXNpb24gYW5kIHRoZSBkaXNjdXNzaW9uIG9uIA0KdGVybWlub2xvZ3kg
aW4gdGhlIHByZXZpb3VzIHBvaW50LCAiKHNpZ25hdHVyZSkgcHVibGljIGtleSIgY2FuIGJlIA0K
Y2hhbmdlZCB0byAiYXV0aGVudGljYXRpb24gY3JlZGVudGlhbCIsIHdoaWNoIGlzIGluIGZhY3Qg
d2hhdCBpcyB1c2VkIA0Kd2hlbiBidWlsZGluZyBJS00tU2VuZGVyIGFuZCBJS00tUmVjaXBpZW50
IHRocm91Z2ggYnl0ZSBjb25jYXRlbmF0aW9uLg0KPD09DQoNCj4NCj4gMy4yDQo+IFNlZSBTZWN0
aW9uIDEuMSBjb21tZW50Lg0KDQo9PT5NVA0KU2VlIHJlcGx5IHRvIFNlY3Rpb24gMS4xIGNvbW1l
bnQgYWJvdmUuDQoNCg0KUFJPUE9TQUw6IG5vIGZ1cnRoZXIgYWN0aW9uLg0KPD09DQoNCj4NCj4g
IlRoZSBHcm91cCBNYW5hZ2VyIE1VU1QgY2hlY2sgaWYgdGhlIG5ldyBHaWQgdG8gYmUgZGlzdHJp
YnV0ZWQgY29pbmNpZGVzIHdpdGggdGhlIEJpcnRoIEdpZCBvZiBhbnkgb2YgdGhlIGN1cnJlbnQg
Z3JvdXAgbWVtYmVycyINCj4gLT4gVGhpcyBpcyB1bmNsZWFyIHRvIG1lLiBJbiB0aGUgZmlyc3Qg
cGFyYWdyYXBoIG9mIDMuMiwgaXQgaXMgc3RhdGVkIHRoYXQgR00gY3JlYXRlcyBhIG5ldyBHaWQu
IFNvIGhvdyBjb3VsZCBpdCBjb2luY2lkZSBpZiBpdCBpcyByZWFsbHkgbmV3PyAoQWxzbyBub3Qg
Y2xlYXIgd2hhdCAnY29pbmNpZGUnIG1lYW5zIGhlcmUuIEVxdWFsPyBJZiBzbywgd2Ugc2hvdWxk
IHdyaXRlICdlcXVhbHMnKQ0KPiAtPiBXaGF0IGlzIHRoZSBwdXJwb3NlIG9mIGV2aWN0aW5nIHRo
ZSBlbGRlciBtZW1iZXJzPyAgVGhpcyBpcyBwdXp6bGluZywgYXMgdGhlIGFpbSBpcyB0byBrZWVw
IHRoZSBlbGRlciBtZW1iZXJzIGluIHRoZSBncm91cCBzdXJlbHkuDQoNCj09Pk1UDQpGaXJzdCBv
ZmYsIHllcywgaGVyZSAiY29pbmNpZGUiIG1lYW5zICJlcXVhbCIuIFdlIHdpbGwgcmVwbGFjZSBp
dCAoYWxzbyANCmluIG90aGVyIHBhcnRzIG9mIHRoZSBkb2N1bWVudCB3aGVyZSBpdCBpcyBzaW1p
bGFybHkgdXNlZCkuDQoNClRoZSBmaXJzdCBwYXJhZ3JhcGggb2YgU2VjdGlvbiAzLjIgbWVhbnMg
dGhhdDogdGhlIGdyb3VwIGhhcyBHaWQgRzEgDQpiZWZvcmUgcmVrZXlpbmc7IGFuZCwgd2hlbiBy
ZWtleWluZyB0aGUgZ3JvdXAsIHRoZSBHcm91cCBNYW5hZ2VyIA0KZ2VuZXJhdGVzIGFuZCBhc3Np
Z25zIGEgbmV3IEdpZCBHMiBkaWZmZXJlbnQgZnJvbSBHMS4gVGhhdCBpcywgdHdvIA0KY29uc2Vj
dXRpdmVseSB1c2VkIEdpZCB2YWx1ZXMgYXJlIGNlcnRhaW5seSBkaWZmZXJlbnQuIFVzaW5nICJl
cXVhbCIgDQpyYXRoZXIgdGhhbiAiY29pbmNpZGUiIHNob3VsZCBhbHJlYWR5IG1ha2UgaXQgY2xl
YXJlciwgYW5kIHdlIGNhbiBhbHNvIA0KZXhwbGljaXRseSBjbGFyaWZ5IGFzIGFib3ZlLg0KDQpC
ZXNpZGVzIHRoYXQgYW5kIG1vcmUgaW4gZ2VuZXJhbCwgdGhlIEdpZCBHMSBtYXkgYmUgcmUtYXNz
aWduZWQgbGF0ZXIgDQpvbiwgYXQgc29tZSBwb2ludCBpbiB0aW1lIGR1cmluZyB0aGUgZ3JvdXAg
bGlmZXRpbWUuIFRoaXMgYWxsb3dzIGEgZ3JvdXAgDQp0byAibGl2ZSBmb3JldmVyIiwgZXZlbiBh
ZnRlciB0aGUgd2hvbGUgc3BhY2Ugb2YgR2lkIHZhbHVlcyBoYXMgYmVlbiANCmV4aGF1c3RlZCwg
c28gdGhhdCB2YWx1ZXMgY2FuIGJlIHJldXNlZC4NCg0KVGhlIGRldGFpbHMgcmVhbGx5IGRlcGVu
ZCBvbiBob3cgdGhlIEdyb3VwIE1hbmFnZXIgZ2VuZXJhdGVzLCBtYW5hZ2VzIA0KYW5kIGZvcm1h
dHMgdGhlIEdpZCB2YWx1ZXMuIEFuIGV4YW1wbGUgaXMgcHJvdmlkZWQgaW4gQXBwZW5kaXggQywg
d2hlcmUgDQphIEdpZCB2YWx1ZSBpcyBjb21wb3NlZCBvZiBhIGZpeGVkIEdyb3VwIFByZWZpeCBm
b2xsb3dlZCBieSBhIEdyb3VwIA0KRXBvY2ggc3ViamVjdCB0byBpbmNyZW1lbnQgYXQgZXZlcnkg
cmVrZXlpbmcuIEV2ZW50dWFsbHksIHRoZSBHcm91cCANCkVwb2NoIHdvdWxkIHdyYXAtYXJvdW5k
LCB0aHVzIHlpZWxkaW5nIHRoZSByZXVzZSBvZiBwYXN0IEdpZCB2YWx1ZXMuIFRoZSANCnNhbWUg
Y2FuIGhhcHBlbiB3aXRoIGRpZmZlcmVudCBHaWQgZm9ybWF0cy4NCg0KDQpXaXRoIHRoZSBhYm92
ZSBpbiBtaW5kLCBsZXQncyBnZXQgdG8gdGhlIHB1cnBvc2Ugb2YgZG9pbmcgd2hhdCBpcyBpbiB0
aGUgDQp0ZXh0IHlvdSBoYXZlIHF1b3RlZC4gVGhlIGZvbGxvd2luZyBleHBhbmRzIG9uIHdoYXQg
aXMgdmVyeSBzaG9ydGx5IA0Kc3VtbWFyaXplZCBpbiB0aGUgZHJhZnQgYXM6ICJUaGlzIGVuc3Vy
ZXMgdGhhdCBhbiBPYnNlcnZlIG5vdGlmaWNhdGlvbiANCltSRkM3NjQxXSBjYW4gbmV2ZXINCnN1
Y2Nlc3NmdWxseSBtYXRjaCBhZ2FpbnN0IHRoZSBPYnNlcnZlIHJlcXVlc3RzIG9mIHR3byBkaWZm
ZXJlbnQgDQpvYnNlcnZhdGlvbnMuIg0KDQoNCkluIGdlbmVyYWwsIGFzIHlvdSBzYXksIHRoZSBh
aW0gaXMgaW5kZWVkIHRvIGtlZXAgY3VycmVudCBtZW1iZXJzIGluIHRoZSANCmdyb3VwLCB1bmxl
c3MgdG8gYmUgZXZpY3RlZCBmb3Igb3RoZXIgcmVhc29ucyAoZS5nLiwgYXMgY29tcHJvbWlzZWQp
LiANCkhvd2V2ZXIsIGEgcGFydGljdWxhciAiZWxkZXIgbWVtYmVyIiBNIGFzIGRlZmluZWQgaW4g
dGhlIHRleHQgaXMgbm90IA0Kc2FmZSB0byBrZWVwIGluIHRoZSBncm91cCwgc2luY2UgdGhhdCB3
b3VsZCBwdXQgaW4gZGFuZ2VyIHRoZSBzZWN1cml0eSANCm9mIGl0cyB2ZXJ5IG9sZCwgb25nb2lu
ZyBvYnNlcnZhdGlvbnMuIEluIGZhY3QsIHRoaXMgaXMgd2hhdCBtaWdodCBoYXBwZW4uDQoNCiog
VGhlIGVuZHBvaW50IE0gam9pbnMgdGhlIGdyb3VwLCBvYnRhaW5pbmcgR2lkIEcxIGFuZCBTZW5k
ZXIgSUQgSUQxLiANClRoYXQgaXMsIEcxIGlzIHRoZSAiQmlydGggR2lkIiBvZiBNLg0KDQoqIFRo
ZSBlbmRwb2ludCBNIHN0YXJ0cyBhbiBvYnNlcnZhdGlvbiBPQlMxLCBzYXkgdXNpbmcgUGFydGlh
bCBJViBlcXVhbCANCnRvIDQyLiBUaGlzIG9ic2VydmF0aW9uIHdvdWxkIGxldmVyYWdlIGFuIGV4
dGVybmFsX2FhZCBpbmNsdWRpbmcgdGhlIA0KdHJpcGxlICg0MiwgRzEsIElEMSksIGluIG9yZGVy
IHRvIG1hdGNoIG5vdGlmaWNhdGlvbnMgdG8gdGhlIG9ic2VydmF0aW9uIA0KcmVxdWVzdC4NCg0K
KiBUaGUgZ3JvdXAgaXMgcmVrZXllZCBzZXZlcmFsIHRpbWVzLCB0aHVzIGNoYW5naW5nIGl0cyBH
aWQgdmFsdWUgDQptdWx0aXBsZSB0aW1lcy4gSW4gdGhlIG1lYW53aGlsZSwgdGhlIGVuZHBvaW50
IE0ga2VlcHMgT0JTMSBhY3RpdmUgYW5kIA0KcmV0YWlucyBpdHMgb3JpZ2luYWwgU2VuZGVyIElE
IElEMS4NCg0KKiBFdmVudHVhbGx5LCB0aGUgR3JvdXAgTWFuYWdlciByZWtleXMgdGhlIGdyb3Vw
IGFuZCByZS1hc3NpZ25zIEdpZCBHMS4gDQpOb3csIHRoZSBuZXdseSBhc3NpZ25lZCBHaWQgRzEs
IGlzIGVxdWFsIHRvIHRoZSAiQmlydGggR2lkIiBvZiB0aGUgDQplbmRwb2ludCBNLg0KDQoNCklm
IHRoZSBlbmRwb2ludCBNIHdhcyBub3QgZXZpY3RlZCBmcm9tIHRoZSBncm91cCBhcyBkZWZpbmVk
IGluIHRoZSANCmN1cnJlbnQgZHJhZnQsIHRoZSBmb2xsb3dpbmcgY2FuIGhhcHBlbi4NCg0KVGhl
IGVuZHBvaW50IE0gc3RhcnRzIGEgbmV3IG9ic2VydmF0aW9uIE9CUzIuIEFzIGFuIHVubHVja3kg
Y29pbmNpZGVuY2UsIA0KTSB1c2VzIFBhcnRpYWwgSVYgZXF1YWwgdG8gNDIgaW4gdGhlIG9ic2Vy
dmF0aW9uIHJlcXVlc3QuIFRoZXJlZm9yZSwgDQpqdXN0IGxpa2UgdGhlIHN0aWxsIG9uZ29pbmcg
T0JTMSwgYWxzbyBPQlMyIHdvdWxkIGxldmVyYWdlIGFuIA0KZXh0ZXJuYWxfYWFkIGluY2x1ZGlu
ZyB0aGUgdHJpcGxlICg0MiwgRzEsIElEMSkuDQoNCkhlbmNlLCBmcm9tIHRoZW4gb24sIGEgbm90
aWZpY2F0aW9uIHJlbGF0ZWQgdG8gT0JTMSBvciBPQlMyIHdvdWxkIA0KY3J5cHRvZ3JhcGhpY2Fs
bHkgbWF0Y2ggdGhlIG9ic2VydmF0aW9uIHJlcXVlc3Qgb2YgYm90aCBPQlMxIGFuZCBPQlMyLCAN
CndoaWNoIGlzIG5vdCBzZWN1cmUuDQoNCg0KSW5zdGVhZCwgYnkgZXZpY3RpbmcgdGhlIGVuZHBv
aW50IE0gYXMgdGhlICJlbGRlciBtZW1iZXIiIGluIHF1ZXN0aW9uLCBNIA0Kd291bGQgZXZlbnR1
YWxseSByZS1qb2luIHRoZSBncm91cC4gV2hlbiB0aGlzIGhhcHBlbnMsIE0gdGVybWluYXRlcyBh
bGwgDQppdHMgb25nb2luZyBvYnNlcnZhdGlvbnMgKHNlZSBTZWN0aW9uIDYuMSksIGluIGFkZGl0
aW9uIHRvIG9idGFpbmluZyBhIA0KbmV3IFNlbmRlciBJRCBhbmQgcmVzZXR0aW5nIGl0cyBTZW5k
ZXIgU2VxdWVuY2UgTnVtYmVyIHRvIHVzZSBhcyBQYXJ0aWFsIA0KSVYgdG8gMCAoc2VlIFNlY3Rp
b24gMi41LjMuMSkuDQoNCg0KUFJPUE9TQUw6IHdlIGhhdmUgbm90IGluY2x1ZGVkIHRoZSBhYm92
ZSBkZXRhaWxlZCByZWFzb25pbmcgaW4gdGhlIA0KZHJhZnQsIHNpbmNlIGl0IGlzIG1vcmUgcmVs
YXRlZCB0byBkZXNpZ24gY29uc2lkZXJhdGlvbnMgdGhhbiB0byANCnByb3RvY29sIGRlc2NyaXB0
aW9uLiBTaG91bGQgd2UgaW5jbHVkZSBpdCBpbnN0ZWFkPyBJZiBzbywgd291bGQgeW91IA0Kc3Vn
Z2VzdCwgZS5nLiwgU2VjdGlvbiAzLjIgYWdhaW4gb3IgcmF0aGVyIGluIHRoZSBTZWN1cml0eSAN
CkNvbnNpZGVyYXRpb25zIHNlY3Rpb24/DQo8PT0NCg0KPg0KPiAzLjIuMQ0KPg0KPiAJRXZlbiB3
aGVuIGFuIGVuZHBvaW50IGpvaW5pbmcgYSBncm91cCBpcyByZWNvZ25pemVkIGFzIGEgY3VycmVu
dA0KPiAJICAgbWVtYmVyIG9mIHRoYXQgZ3JvdXAsIGUuZy4sIHRocm91Z2ggdGhlIG9uZ29pbmcg
c2VjdXJlIGNvbW11bmljYXRpb24NCj4gCSAgIGFzc29jaWF0aW9uLCB0aGUgR3JvdXAgTWFuYWdl
ciBNVVNUIGFzc2lnbiBhIG5ldyBTZW5kZXIgSUQgZGlmZmVyZW50DQo+IAkgICB0aGFuIHRoZSBv
bmUgY3VycmVudGx5IHVzZWQgYnkgdGhlIGVuZHBvaW50IGluIHRoZSBncm91cCwgdW5sZXNzIHRo
ZQ0KPiAJICAgZ3JvdXAgaXMgcmVrZXllZCBmaXJzdCBhbmQgYSBuZXcgR2lkIHZhbHVlIGlzIGVz
dGFibGlzaGVkLg0KPiAtPiBIb3cgY2FuIGFuIGFscmVhZHktam9pbmVkIGVuZHBvaW50LCBpLmUu
IGEgbWVtYmVyLCBqb2luIHRoZSBzYW1lIGdyb3VwPyAgT3IgZG9lcyB0aGlzIHRleHQgYXNzdW1l
IHRoYXQgdGhlIEdNIGtub3dzIHRoZSBlbmRwb2ludCBpcyBhIG1lbWJlciB3aGlsZSB0aGUgZW5k
cG9pbnQgaXRzZWxmICJmb3Jnb3QiIHRoaXMgb3IgcHVycG9zZWx5IGRlbGV0ZWQgaXRzIGdyb3Vw
LXJlbGF0ZWQgZGF0YSB0byBkbyBhIHJlLWpvaW4/DQo+IFNlY3Rpb24gMy4zIHN0ZXAgNiBoYXMg
dGhlIHNhbWUgcXVlc3Rpb24uDQoNCj09Pk1UDQpXaGlsZSB0aGUgR3JvdXAgTWFuYWdlciBrbm93
cywgZS5nLCBiYXNlZCBvbiB0aGUgb25nb2luZyBzZWN1cmUgDQpjb21tdW5pY2F0aW9uIGFzc29j
aWF0aW9uIGl0IGhhcyB3aXRoIHRoYXQgZW5kcG9pbnQsIHRoZSBlbmRwb2ludCBkb2VzIA0Kbm90
ICJmb3JnZXQiIGFib3V0IGl0cyBtZW1iZXJzaGlwIChleGNlcHQgaW4gdGhlIGNhc2UgaXQgcmVi
b290cyBhbmQgDQpsb3NlcyBpdHMgU2VjdXJpdHkgQ29udGV4dCkuDQoNCkluIGdlbmVyYWwsIGFu
IGVuZHBvaW50IG1heSByZS1qb2luIHRoZSBncm91cC4gVGhlIGRldGFpbHMgYWJvdXQgdGhlIA0K
YWN0dWFsIHByb2NlZHVyZSBhcmUgdXAgdG8gdGhlIHNwZWNpZmljIEdyb3VwIE1hbmFnZXIgKGUu
Zy4sIHRoZSBvbmUgDQpkZWZpbmVkIGluIGRyYWZ0LWlldGYtYWNlLWtleS1ncm91cGNvbW0tb3Nj
b3JlKSwgYnV0IGEgcmUtam9pbiBjYW4gDQpoYXBwZW4gaW4gYSBudW1iZXIgb2YgY2FzZXMuIEZv
ciBpbnN0YW5jZToNCg0KKiBGb2xsb3dpbmcgYSBmb3JjZWZ1bCBldmljdGlvbi4gSW4gdGhlIHNp
dHVhdGlvbiBkaXNjdXNzZWQgaW4gdGhlIA0KcHJldmlvdXMgY29tbWVudCwgYSByZS1qb2luIHdv
dWxkIGluIGZhY3QgYmUgc3VjY2Vzc2Z1bCwgc2luY2UgdGhlIA0KZXZpY3Rpb24gd2FzIGludGVu
dGlvbmFsbHkgcGVyZm9ybWVkIHRvIGZvcmNlIGEgcmUtam9pbmluZyBhbmQgdGhlIA0KdGVybWlu
YXRpb24gb2YgdmVyeSBsb25nLWxpdmluZyBvYnNlcnZhdGlvbnMuDQoNCiogQXMgZGlzY3Vzc2Vk
IGluIFNlY3Rpb24gMi41LjMgKGFuZCBtb3JlIGluIGRldGFpbHMgaW4gU2VjdGlvbiAyLjUuMy4x
IA0KYW5kIDIuNS4zLjIpLCBhbiBlbmRwb2ludCBtaWdodCBuZWVkIG5ldyBTZWN1cml0eSBDb250
ZXh0IHBhcmFtZXRlcnMgDQpmcm9tIHRoZSBHcm91cCBNYW5hZ2VyLiBJbiBwYXJ0aWN1bGFyLCBp
dCByZXF1aXJlcyBhIG5ldyBTZW5kZXIgSUQgaWYgaXQgDQpoYXMgcnVuIG91dCBvZiBTZW5kZXIg
U2VxdWVuY2UgTnVtYmVyIHZhbHVlcywgb3IgdGhlIGxhdGVzdCBncm91cCBrZXlpbmcgDQptYXRl
cmlhbCBpZiBpdCByZWFsaXplcyB0byBoYXZlIG1pc3NlZCBzb21lIGdyb3VwIHJla2V5aW5nIGlu
c3RhbmNlcy4NCg0KIMKgwqAgV2hhdCB0aGlzIGRyYWZ0IGlzIGNvbmNlcm5lZCBhYm91dCBpcyB0
aGF0IHRoZSBHcm91cCBNYW5hZ2VyIGlzIGFibGUgDQp0byBwcm92aWRlIHRoZXNlIHBhcmFtZXRl
cnMgdG8gdGhlIGVuZHBvaW50IGlmIG5lZWQgYmUuIEFnYWluLCBob3cgdGhpcyANCmV4YWN0bHkg
aGFwcGVucyBkZXBlbmRzIG9uIHRoZSBzcGVjaWZpYyBHcm91cCBNYW5hZ2VyIGFuZCB0aGUgaW50
ZXJmYWNlIA0KaXQgcHJvdmlkZXMgdG8gdGhlIGN1cnJlbnQgb3IgY2FuZGlkYXRlIGdyb3VwIG1l
bWJlcnMgKHNlZSBhYm92ZSkuDQoNCiDCoMKgIFRoYXQgc2FpZCwgZnVsbHkgcmUtam9pbmluZyB0
aGUgZ3JvdXAgaXMgYSBtaW5pbWFsbHkgZ3JhbnRlZCB3YXkgdG8gDQphY3F1aXJlIGFsbCB0aG9z
ZSBwYXJhbWV0ZXJzIGF0IG9uY2UsIHJhdGhlciB0aGFuIHRocm91Z2ggbW9yZSANCmZpbmUtZ3Jh
aW5lZCBpbnRlcmFjdGlvbnMgdGhhdCB0aGUgR3JvdXAgTWFuYWdlciBtaWdodCwgaW4gZ2VuZXJh
bCwgbm90IA0KaW1wbGVtZW50LiBUaGF0IGlzLCB1cG9uIHJlLWpvaW5pbmcgdGhlIGdyb3VwLCB0
aGUgZW5kcG9pbnQgd291bGQgDQpyZWNlaXZlIGEgbmV3IFNlbmRlciBJRCAoaGVuY2UgdGVjaG5p
Y2FsbHkgYmVjb21pbmcgYSBuZXcgZW5kcG9pbnQpIGFuZCANCnRoZSBsYXRlc3Qga2V5aW5nIG1h
dGVyaWFsIHRvIHVzZSBpbiB0aGUgZ3JvdXAuDQoNCg0KUFJPUE9TQUw6IGlmIHRoZSBhYm92ZSBp
cyBjbGVhciBhbmQgYWdyZWVkLCBubyBhY3Rpb24uDQo8PT0NCg0KPg0KPiBGaWd1cmUgMiBzYXlz
ICJBZnRlciBjaGFuZ2luZyBHcm91cCBJRCwgYW4gdW51c2VkIGtpZCBjYW4gYmUgYXNzaWduZWQi
LiBEbyB3ZSBtZWFuIGhlcmUgYSBwcmV2aW91c2x5IHVzZWQga2lkICh1bmRlciBhIEdpZD1OKSB0
aGF0IGlzIGN1cnJlbnRseSB1bnVzZWQgKHVuZGVyIEdpZD1OKSwgY2FuIGJlIHJlLWFzc2lnbmVk
IGFmdGVyIEdpZCBjaGFuZ2UgdG8gR2lkICE9IE4gPyAgTm90IHN1cmUgd2hldGhlciB3ZSBjYW4g
Zml0IHRoZSBpbnRlbmRlZCBzZW50ZW5jZSBpbiBzdWNoIGEgc21hbGwgc3BhY2UuIE1heWJlICJB
ZnRlciBHcm91cCBJRCBjaGFuZ2UsIGEgZm9ybWVybHkgdXNlZCBraWQgY2FuIGJlIHJlLXVzZWQi
ID8NCg0KPT0+TVQNCldlbGwsIGl0IHdhcyBub3QgbmVjZXNzYXJpbHkgZm9ybWVybHkgdXNlZCwg
aXQgbWlnaHQgaGF2ZSBuZXZlciBiZWVuIGJlZm9yZS4NCg0KVGhhdCBpcywgYXNzdW1lIHRoYXQg
cG9zc2libGUga2lkIHZhbHVlcyBhcmUgezAsIDEsIC4uLiwgOX0uDQoNClVuZGVyIEdpZD0xMDAs
IHRoZSBHcm91cCBNYW5hZ2VyIGFzc2lnbnMgdGhlIGtpZCB2YWx1ZXMgezAsIDEsIC4uLiwgN30u
IA0KVGhlbjoNCg0KKiBUaGUgZW5kcG9pbnQgd2l0aCBraWQgPSAwIGxlYXZlcyB0aGUgZ3JvdXAu
DQoqIFRoZSBHcm91cCBNYW5hZ2VyIHJla2V5cyB0aGUgZ3JvdXAgYW5kIGFzc2lnbnMgR2lkPTIw
MC4NCg0KVGhlbiwgdW5kZXIgR2lkPTIwMDoNCg0KKiBUaGUga2lkIHZhbHVlcyB7MSwgMiwgLi4u
LCA3fSBhcmUgdGFrZW4uDQoqIFRoZSBraWQgdmFsdWVzIHswLCA4LCA5fSBhcmUgYXZhaWxhYmxl
IHRvIGJlIGFzc2lnbmVkLg0KDQpOb3RlIHRoYXQgMCB3YXMgaW5kZWVkIGZvcm1lcmx5IHVzZWQg
dW5kZXIgdGhlIHByZXZpb3VzIEdpZCB2YWx1ZSwgYnV0IDggDQphbmQgOSBoYXZlIG5ldmVyIGJl
ZW4uDQoNCg0KUFJPUE9TQUw6IHRoZSB0ZXh0IGluIEZpZ3VyZSAyIGNhbiBiZSB1cGRhdGVkIGFz
OiAiQWZ0ZXIgR3JvdXAgSUQgDQpjaGFuZ2UsIGFuIHVudXNlZCBraWQgYmVjb21lcyBwb3NzaWJs
ZSB0byBhc3NpZ24sIGV2ZW4gaWYgdXNlZCBiZWZvcmUgDQp0aGUgR3JvdXAgSUQgY2hhbmdlLiIN
Cjw9PQ0KDQo+DQo+IDgNCj4gUmVjb21tZW5kYXRpb25zIGluIHRoZSBsYXN0IHBhcmFncmFwaCB0
byBub3Qgc2VuZCBiYWNrIGFueSBlcnJvciBtZXNzYWdlOiBpcyB0aGlzIGFsc28gYXBwbGljYWJs
ZSB3aGVuIHRoZSBncm91cCByZXF1ZXN0IGlzIHNlbnQgb3ZlciBhIHVuaWNhc3QgdHJhbnNwb3J0
PyBJbiB0aGF0IGNhc2UgaXQgc2hvdWxkIGJlIG9rIHRvIHJlc3BvbmQgZXJyb3IsIHNpbmNlIHRo
ZXJlJ3Mgbm8gcmlzayBvZiBhbXBsaWZpY2F0aW9uIGF0dGFjay4NCj4gRS5nLiBmb3IgYSB1bmlj
YXN0IHBhaXJ3aXNlIHJlcXVlc3QgaXQgaXMgZGVmaW5lZCB0aGF0IGFuIGVycm9yIGNhbiBiZSBz
ZW50IGUuZy4gaW4gOS40LiAgQWx0aG91Z2ggc2VuZGluZyBncm91cCByZXF1ZXN0IG92ZXIgdW5p
Y2FzdCBpcyBnZW5lcmFsbHkgbm90IHJlY29tbWVuZGVkIGFzIHN0YXRlZCBlbHNld2hlcmUgaW4g
dGhlIGRyYWZ0LCB0aGVyZSB3ZXJlIHNvbWUgdmFsaWQgY2FzZXMgY2l0ZWQgc28gd2UgY2FuIGNv
bnNpZGVyIGdyb3VwIHJlcXVlc3Qgb3ZlciB1bmljYXN0IGNhc2VzLg0KDQo9PT5NVA0KR29vZCBw
b2ludHMuIFRvIGNsYXJpZnksIGEgcmVxdWVzdCBjYW4gYmUgc2VudCBvdmVyIHVuaWNhc3Qgb3Ig
DQptdWx0aWNhc3QsIHdoZW4gcHJvdGVjdGVkIGluIGdyb3VwIG1vZGUgb3IgaW4gcGFpcndpc2Ug
bW9kZS4gVGhhdCBpczoNCg0KLSBNdWx0aWNhc3QgcmVxdWVzdCBpbiBncm91cCBtb2RlLiBUaGlz
IGlzIHRoZSB0eXBpY2FsIGNhc2UgZm9yIHRoZSANCmdyb3VwIG1vZGUuDQoNCi0gVW5pY2FzdCBy
ZXF1ZXN0IGluIGdyb3VwIG1vZGUuIFRoaXMgaXMgbm90IHJlY29tbWVuZGVkIGFzIGRpc2N1c3Nl
ZCBpbiANClNlY3Rpb24gMTEuOS4NCg0KLSBVbmljYXN0IHJlcXVlc3QgaW4gcGFpcndpc2UgbW9k
ZS4gVGhpcyBpcyB0aGUgdHlwaWNhbCBjYXNlIGZvciB0aGUgDQpwYWlyd2lzZSBtb2RlLCBhbmQg
aXMgdmVyeSBzaW1pbGFyIHRvIGhvdyBPU0NPUkUgd29ya3MuDQoNCi0gTXVsdGljYXN0IHJlcXVl
c3QgaW4gcGFpcndpc2UgbW9kZS4gVGhpcyBpcyBhIHBhcnRpY3VsYXIgY2FzZSwgd2l0aCANCnR3
byByZWxldmFudCBleGFtcGxlczoNCi0tLSBUaGUgbGFzdCBwYXJhZ3JhcGggaW4gU2VjdGlvbiA5
LjAsIGluIHR1cm4gcG9pbnRpbmcgdG8gU2VjdGlvbiA5LjEuDQotLS0gU2VjdGlvbiAzLjQuNSBv
ZiBkcmFmdC1hbXN1ZXNzLWNvcmUtY2FjaGFibGUtb3Njb3JlLTAzDQoNCk5vdGUgdGhhdCBhIHNl
cnZlciBtaWdodCBub3QgYmUgYWJsZSB0byBhc3NlcnQgaWYgYSByZWNlaXZlZCByZXF1ZXN0IHdh
cyANCnNlbnQgb3ZlciB1bmljYXN0IG9yIG11bHRpY2FzdC4gQWx0aG91Z2ggZm9yIGRpZmZlcmVu
dCByZWFzb25zLCB0aGlzIGlzIA0KYWxyZWFkeSBtZW50aW9uZWQgaW4gU2VjdGlvbiA0LjQgb2Yg
UkZDIDcyNTIsIGFuZCB3ZSBoYWQgYSBwcmFjdGljYWwgDQpldmlkZW5jZSBpbiBKYXZhIGltcGxl
bWVudGF0aW9ucy4NCg0KDQpQUk9QT1NBTDogYmFzZWQgb24gdGhlIGFib3ZlLCB3ZSBjYW4gcmV2
aXNlIHRoZSByZWNvbW1lbmRhdGlvbiBpbiANClNlY3Rpb24gOCBhcyBmb2xsb3dzLg0KDQppKSBz
ZXJ2ZXJzIHRoYXQgYXJlIG5vdCBhYmxlIHRvIGRpc3Rpbmd1aXNoIG11bHRpY2FzdCBhbmQgdW5p
Y2FzdCANCnJlcXVlc3RzIGFyZSBSRUNPTU1FTkRFRCB0byBzdXBwcmVzcyBlcnJvciByZXNwb25z
ZXMuDQoNCmlpKSBzZXJ2ZXJzIHRoYXQgYXJlIGFibGUgdG8gZGlzdGluZ3Vpc2ggbXVsdGljYXN0
IGFuZCB1bmljYXN0IHJlcXVlc3RzIA0KYXJlIFJFQ09NTUVOREVEIHRvIHN1cHByZXNzIGVycm9y
IHJlc3BvbnNlcyB0byBtdWx0aWNhc3QgcmVxdWVzdHMuDQoNCjw9PQ0KDQo+DQo+IDguMy4xDQo+
ICJGb3IgZWFjaCBvbmdvaW5nIG9ic2VydmF0aW9uLCB0aGUgc2VydmVyIGNhbiBoZWxwIHRoZSBj
bGllbnQgdG8NCj4gICAgIHN5bmNocm9uaXplLCBieSBpbmNsdWRpbmcgYWxzbyB0aGUgJ2tpZCBj
b250ZXh0JyBwYXJhbWV0ZXIgaW4NCj4gICAgIG5vdGlmaWNhdGlvbnMgZm9sbG93aW5nIGEgZ3Jv
dXAgcmVrZXlpbmcsICINCj4gLT4gSSdtIHdvbmRlcmluZyBpbiB3aGF0IHdheSB0aGlzIGhlbHBz
LiBJcyBpdCBhIHJlZHVjdGlvbiBvZiB0aW1lIC8gZW5lcmd5IHVzZWQgYnkgdGhlIGNsaWVudCwg
YmVjYXVzZSBzZW5kaW5nIGl0IGxldHMgdGhlIGNsaWVudCBhdm9pZCB0cnlpbmcgb3V0IGRlY3J5
cHRpb24vdmFsaWRhdGlvbiB1c2luZyBmaXJzdCB0aGUgb2xkIEdpZC9jb250ZXh0LCB3aGljaCB3
b3VsZCBmYWlsPw0KPiBUaGUgZG93bnNpZGUgb2Ygb3B0aW9uYWxseSBpbmNsdWRpbmcgaXQgaXMg
YSBtb3JlIGNvbXBsZXggaGFuZGxpbmcgaW4gdGhlIGNvZGUgaS5lLiBtb3JlIG1lc3NhZ2UgdmFy
aWF0aW9ucyA9IG1vcmUgY29kZSBwYXRocyA9IG1vcmUgdGhpbmdzIHBvdGVudGlhbGx5IGdvaW5n
IHdyb25nIGFuZCB0byB0ZXN0Lg0KDQo9PT5NVA0KV2VsbCwgd2hpbGUgdXN1YWxseSBub3QgbmVj
ZXNzYXJ5LCBpdCBpcyBub3Qgd3JvbmcgdG8gaW5jbHVkZSAna2lkIA0KY29udGV4dCcgaW4gYSBy
ZXNwb25zZSBtZXNzYWdlLg0KDQpJbiB0aGlzIHBhcnRpY3VsYXIgY2FzZSwgdGhlIG5vdGlmaWNh
dGlvbiBpbmNsdWRpbmcgdGhlIG5ldyBHaWQgaW4gJ2tpZCANCmNvbnRleHQnIG1ha2VzIHRoZSBj
bGllbnQgYXdhcmUgdGhhdCBhIGdyb3VwIHJla2V5aW5nIGhhcyBoYXBwZW5lZCwgb3IgDQppcyB1
bmRlcndheSBhbmQgdGhlIGNsaWVudCBoYXMgbm90IGdvdCByZWtleWluZyBtZXNzYWdlcyB5ZXQu
DQoNCk5vdywgaWYgdGhlIGNsaWVudCBoYXMgYWxyZWFkeSBzd2l0Y2hlZCB0byB0aGUgbmV3IFNl
Y3VyaXR5IENvbnRleHQsIA0KdGhlbiB0aGUgb2xkIG9uZSB3b3VsZCBoYXZlIGJlZW4gZGlzY2Fy
ZGVkLg0KDQpJZiB0aGUgY2xpZW50IGhhcyBub3QgYWxyZWFkeSBzd2l0Y2hlZCB0byB0aGUgbmV3
IFNlY3VyaXR5IENvbnRleHQsIHRoZSANCm5vdGlmaWNhdGlvbiBjYW4gbWFrZSB0aGUgY2xpZW50
IHJlYWxpemUgdG8gaGF2ZSBtaXNzZWQgb25lIG9yIG1vcmUgDQpncm91cCByZWtleWluZyBpbnN0
YW5jZXMuIFRoZSBjbGllbnQgd2lsbCB0aGVuIHByb21wdGx5IGNoZWNrIHdpdGggdGhlIA0KR3Jv
dXAgTWFuYWdlciBhbmQgcmV0cmlldmUgdGhlIGxhdGVzdCBncm91cCBrZXlpbmcgbWF0ZXJpYWwg
Zm9yIGRlcml2aW5nIA0KdGhlIGxhdGVzdCBTZWN1cml0eSBDb250ZXh0LCByYXRoZXIgdGhhbiBk
b2luZyB0aGF0IGFueXdheSAobXVjaCkgbGF0ZXIsIA0KZS5nLiwgYWZ0ZXIgZXhwZXJpZW5jaW5n
IHNldmVyYWwgY29uc2VjdXRpdmUgZGVjcnlwdGlvbiBmYWlsdXJlcy4NCg0KRXNwZWNpYWxseSBm
b3IgYSBjbGllbnQgdGhhdCBkb2VzIG5vdCBzZW5kIHJlcXVlc3RzIHRoYXQgb2Z0ZW4gKG9yIGRv
ZXMgDQpub3QgcmVjZWl2ZSByZXF1ZXN0cyB0aGF0IG9mdGVuIGlmIGFjdGluZyBhbHNvIGFzIGEg
c2VydmVyKSwgdGhpcyBoaW50IA0KaXMgYW4gb3Bwb3J0dW5pc3RpYyBzaG9ydGN1dCB0byByZWFs
aXplIGl0cyBtaXNhbGlnbm1lbnQgaW4gdGVybXMgb2YgDQpTZWN1cml0eSBDb250ZXh0LCB3aGlj
aCBtaWdodCBvdGhlcndpc2UgcmVxdWlyZSBtb3JlIHRpbWUgYW5kIGRlY3J5cHRpb24gDQpmYWls
dXJlcy4NCg0KDQpQUk9QT1NBTDogaWYgdGhlIGFib3ZlIGlzIGNsZWFyIGFuZCBhZ3JlZWQsIG5v
IGFjdGlvbi4NCjw9PQ0KDQo+DQo+IDEwDQo+DQo+IAlDb25zdHJhaW5lZCBJb1QgZGV2aWNlcyBt
YXkgYWx0ZXJuYXRpdmVseSByZXByZXNlbnQgTW9udGdvbWVyeSBjdXJ2ZXMNCj4gCSAgIGFuZCAo
dHdpc3RlZCkgRWR3YXJkcyBjdXJ2ZXMgW1JGQzc3NDhdIGluIHRoZSBzaG9ydC1XZWllcnN0cmFz
cyBmb3JtDQo+IAkgICBXZWkyNTUxOSwgd2l0aCB3aGljaCB0aGUgYWxnb3JpdGhtcyBFQ0RTQTI1
NTE5IGFuZCBFQ0RIMjU1MTkgY2FuIGJlDQo+IAkgICB1c2VkIGZvciBzaWduYXR1cmUgb3BlcmF0
aW9ucyBhbmQgRGlmZmllLUhlbGxtYW4gc2VjcmV0IGNhbGN1bGF0aW9uLA0KPiAJICAgcmVzcGVj
dGl2ZWx5IFtJLUQuaWV0Zi1sd2lnLWN1cnZlLXJlcHJlc2VudGF0aW9uc10uDQo+DQo+IC0+IFRo
aXMgc291bmRzIG9wdGlvbmFsICgnbWF5JykuIEJ1dCB0aGUgcGFyYWdyYXBoIGlzIGluIHRoZSBz
ZWN0aW9uICJNYW5kYXRvcnktdG8tSW1wbGVtZW50Ijsgd2h5IHBsYWNlIGl0IHRoZXJlPw0KPiAt
PiBBbHNvIHNldmVyYWwgU0hPVUxEL1JFQ09NTUVOREVEIGl0ZW1zIGFyZSBpbiB0aGlzIHNlY3Rp
b24uICBTYW1lIHF1ZXN0aW9uLCBkb2Vzbid0IGl0IGNvbnRyYWRpY3QgdGhlIHRpdGxlPw0KDQo9
PT5NVA0KVGhlIHNlY3Rpb24gdGl0bGUgaXMgIk1hbmRhdG9yeS10by1JbXBsZW1lbnQgQ29tcGxp
YW5jZSBSZXF1aXJlbWVudHMiLCANCmxpa2UgaW4gdGhlIGFuYWxvZ291cyBzZWN0aW9uIG9mIGRy
YWZ0LWlldGYtbGFrZS1lZGhvYyAsIGFuZCB1c2VzIHRoZSANCml0ZW1zIHlvdSBtZW50aW9uIGlu
IGEgc2ltaWxhciB3YXkuDQoNCklmIEkgdW5kZXJzdGFuZCB0aGUgY29tbWVudCBjb3JyZWN0bHks
IHlvdSB3b3VsZCBleHBlY3QgYSBzZWN0aW9uIG5hbWVkIA0KIk1hbmRhdG9yeS10by1JbXBsZW1l
bnQgLi4uIiB0byBjb3ZlciBpdHMgcG9pbnRzIG9ubHkgdXNpbmcgTVVTVC9TSEFMTC4gDQpDb3Jy
ZWN0Pw0KDQoNClBST1BPU0FMOiBTaW5jZSB3ZSBkbyBtZWFuIHdoYXQgaXMgaW4gdGhlIHRleHQg
aGVyZSwgaXQgY2FuIGhlbHAgdG8gDQpjaGFuZ2UgdGhlIHNlY3Rpb24gdGl0bGUgdG8gIkltcGxl
bWVudGF0aW9uIENvbXBsaWFuY2UiLiBUaGVuLCBzb21lIG9mIA0KdGhlIGNvdmVyZWQgcG9pbnRz
IHdvdWxkIGJlIGluZGVlZCBtYW5kYXRvcnktdG8taW1wbGVtZW50IHJlcXVpcmVtZW50cywgDQp3
aGlsZSBvdGhlciB3b3VsZCBub3QuDQo8PT0NCg0KPg0KPiAxMQ0KPiBJIGRpZCBub3QgZmluZCBh
IGNvbnNpZGVyYXRpb24gYWJvdXQgc2VsZWN0aW5nIHRoZSB2YWx1ZS9sZW5ndGggb2YgdGhlIE1h
c3RlciBTYWx0LCBhbmQgd2hldGhlciBpdCBuZWVkcyB0byBiZSBzZXQgYXQgYWxsIChpLmUuIG90
aGVyIHRoYW4gdGhlIGRlZmF1bHQgdmFsdWUgb2YgTWFzdGVyIFNhbHQpLiBJcyBpdCB1c2VmdWwg
Zm9yIGdyb3VwIGNvbW11bmljYXRpb24/IEluIHdoYXQgc2l0dWF0aW9ucz8NCg0KPT0+TVQNClRo
ZXJlIGFyZSBubyBkaWZmZXJlbmNlcyBjb21wYXJlZCB0byBPU0NPUkUsIGhlbmNlIEdyb3VwIE9T
Q09SRSBzaW1wbHkgDQppbmhlcml0cyB3aGF0IGlzIGRlZmluZWQgaW4gUkZDIDg2MTMuDQoNCkxp
a2UgaW4gT1NDT1JFLCB0aGUgTWFzdGVyIFNhbHQgaGFzIHZhcmlhYmxlIGxlbmd0aCwgYW5kIGl0
cyBsZW5ndGggYW5kIA0KdmFsdWUgbWF5IGJlIHByZXNlcnZlZCBvciBjaGFuZ2VkIHdoZW4gcmVr
ZXlpbmcgdGhlIGdyb3VwLg0KDQpJdHMgdXNlIGFuZCB1c2VmdWxuZXNzIGFyZSBhbHNvIHRoZSBz
YW1lIGFzIGluIE9TQ09SRS4gVGhhdCBpcywgYnkgDQpjb250cmlidXRpbmcgaW4gdGhlIGtleSBk
ZXJpdmF0aW9uIHByb2Nlc3MsIGl0IHByZXZlbnRzIGNyeXB0YW5hbHlzaXMgDQooc2VlIFNlY3Rp
b24gMTIuNiBvZiBSRkMgODYxMyBhbHNvIGluaGVyaXRlZCBpbiBTZWN0aW9uIDExLjE1IG9mIEdy
b3VwIA0KT1NDT1JFKS4NCg0KDQpQUk9QT1NBTDogaWYgdGhlIGFib3ZlIGlzIGNsZWFyIGFuZCBh
Z3JlZWQsIG5vIGFjdGlvbi4NCjw9PQ0KDQo+DQo+IFdoYXQgYWJvdXQgYSBjb25zaWRlcmF0aW9u
IG9uIGEgcG9zc2libGUgRG9TIGF0dGFjazogIGFuIGF0dGFja2VyIGZpcnN0IGJsb2NrcyB0aGUg
SVAgY29tbXVuaWNhdGlvbiBwYXRoIHRvIHRoZSBHcm91cCBNYW5hZ2VyICwgYW5kIHRoZW4gdHJp
Z2dlciBhIG1hc3MgcG93ZXItY3ljbGUgKHJlYm9vdCkgaW5jbHVkaW5nIGRldmljZXMgdGhhdCBh
cmUgZG9pbmcgR3JvdXAgT1NDT1JFIGNvbW11bmljYXRpb24uIFRoZXNlIGRldmljZSB3aWxsIHRo
ZW4gbm90IHBlcmZvcm0gZ3JvdXAgY29tbXVuaWNhdGlvbiBhbnltb3JlIGR1ZSB0byB0aGUgc2Vj
dGlvbiAyLjUuMS4xIHJlcXVpcmVtZW50cyBsYXN0IHBhcmFncmFwaC4gICBCbG9ja2luZyB0aGUg
SVAgY29tbXVuaWNhdGlvbiBwYXRoIHRvIHRoZSBHTSBjb3VsZCBiZSBkb25lIGUuZy4gYnkgaW5q
ZWN0aW5nIGZha2UgRE5TIHJlc3BvbnNlcyBmb3IgR00gaG9zdG5hbWUgcXVlcmllcyBvciBieSBy
ZW1vdmluZyBhIG5ldHdvcmsgbGluayB0aGF0J3MgdXNlZCBmb3Igcm91dGluZyB0b3dhcmRzIHRo
ZSBHTS4gQXQgbGVhc3QgaW4gdGhlIG1vdmllcyBhbiBhdHRhY2tlciBpcyBvY2Fzc2lvbmFsbHkg
YWJsZSB0byB0cmlnZ2VyIGEgcG93ZXIgb3V0YWdlIGZvciBhIGZldyBzZWNvbmRzICA7KQ0KDQo9
PT5NVA0KVGhhbmtzLCBJIHRoaW5rIGl0IGlzIGdvb2QgdG8gZWxhYm9yYXRlIG9uIHRoaXMuDQoN
CkkgYW0ganVzdCBub3Qgc3VyZSB3aGVyZSBleGFjdGx5LiBUaGlzIG1pZ2h0IHJlcXVpcmUgYSBu
ZXcgZGVkaWNhdGVkIA0Kc3Vic2VjdGlvbiB3aXRoaW4gU2VjdGlvbiAxMSwgdG9nZXRoZXIgd2l0
aCBhbiBlZmZlY3RpdmUgcmVtaW5kZXIgb2YgDQpTZWN0aW9uIDIuNS4xLjEgZm9yIHRoZSByZWFk
ZXIuDQoNCg0KUFJPUE9TQUw6IGVsYWJvcmF0ZSBvbiB0aGlzIHBvaW50LCBvbmNlIHVuZGVyc3Rv
b2Qgd2hlcmUgZXhhY3RseSwgYnV0IA0KbW9zdCBsaWtlbHkgd2l0aGluIHRoZSBzZWN1cml0eSBj
b25zaWRlcmF0aW9ucy4NCjw9PQ0KDQo+DQo+IDExLjENCj4gIlRodXMsIGEgY3VycmVudCBncm91
cCBtZW1iZXIgb3duaW5nIHRoZQ0KPiAgICAgICAgbGF0ZXN0IGdyb3VwIGtleWluZyBtYXRlcmlh
bCBkb2VzIG5vdCBvd24gdGhlIHB1YmxpYyBrZXkgb2YgYW55DQo+ICAgICAgICBmb3JtZXIgZ3Jv
dXAgbWVtYmVyLiINCj4gLT4gTm90IHN1cmUgd2hhdCB0aGlzIGludGVuZHMgdG8gc2F5LiBBIGdy
b3VwIG1lbWJlciBtYXkgc3RvcmUgYSBwdWJsaWMga2V5IG9mIGFueSBncm91cCBtZW1iZXIuIEJ1
dCBpdCBuZXZlciAib3ducyIgdGhlIHB1YmxpYyBrZXkgb2YgYW5vdGhlciBub2RlLCBpbiB0aGUg
c2Vuc2UgdGhhdCBpdCBkb2Vzbid0IGhhdmUgYWNjZXNzIHRvIGl0cyBwcml2YXRlIGtleSByaWdo
dD8NCj4gTWF5YmUgaXQgd2FzIGludGVuZGVkIHRvIHNheSB0aGF0IGR1ZSB0byBwcm90b2NvbC9H
TSBkZXNpZ24sIGEgbm9kZSBkb2Vzbid0IHN0b3JlIHRoZSBwdWJsaWMga2V5IG9mIGEgZm9ybWVy
IGdyb3VwIG1lbWJlciBiZWNhdXNlIGl0IGdldHMgZGVsZXRlZCBhdCB0aGUgbW9tZW50IHRoYXQg
dGhlIG1lbWJlciBsZWF2ZXMuDQo+IENoYW5naW5nICJvd25lZCIgdG8gInN0b3JlZCIgbWF5IGhl
bHAgdG8gcmVwaHJhc2UuDQoNCj09Pk1UDQpKdXN0IGxpa2UgeW91IHNhaWQ6IG5vdCAib3duZWQi
IGFzIHJlbGF0ZWQgdG8gYSBwcm9wZXJ0eSwgYnV0IHJhdGhlciB0byANCnNvbWV0aGluZyBhdmFp
bGFibGUgaW4gbG9jYWwgc3RvcmFnZS4NCg0KDQpQUk9QT1NBTDogY2hhbmdlICJvd24iLyJvd25l
ZCIgdG8gInN0b3JlIi8ic3RvcmVkIi4gVGhpcyBwcm9iYWJseSANCmFmZmVjdHPCoCBzb21lIG90
aGVyIHNlbnRlbmNlIGluIHRoZSBkb2N1bWVudC4NCjw9PQ0KDQo+DQo+IDExLjcuMg0KPiBUb3dh
cmRzIHRoZSBlbmQgdGhlIHJlYWRlciBtYXkgbG9zZSBhIGJpdCB0aGUgY29udGV4dCBvZiB0aGUg
cHJpb3IgIndvdWxkIiBzdGF0ZW1lbnRzLiBFLmcuIHdlIGhhdmU6DQo+DQo+IAlTaW5jZSB0aGUg
UGFydGlhbCBJViBpcyA1IGJ5dGVzIGluIHNpemUsIHRoaXMgcmVxdWlyZXMgMl40MA0KPiAJICAg
b3BlcmF0aW9ucyB0byB0ZXN0IGFsbCB0aGUgUGFydGlhbCBJVnMsIHdoaWNoIGNhbiBiZSBkb25l
IGluIHJlYWwtDQo+IAkgICB0aW1lLiAgVGhlIHByb2JhYmlsaXR5IHRoYXQgYSBzaW5nbGUgZ2l2
ZW4gbWVzc2FnZSBNMSBjYW4gYmUgdXNlZCB0bw0KPiAJICAgZm9yZ2UgYSByZXNwb25zZSBNMiBm
b3IgYSBnaXZlbiByZXF1ZXN0IHdvdWxkIGJlIGVxdWFsIHRvIDJeLTI0LA0KPiAJICAgc2luY2Ug
dGhlcmUgYXJlIG1vcmUgTUFDIHZhbHVlcyAoOCBieXRlcyBpbiBzaXplKSB0aGFuIFBhcnRpYWwg
SVYNCj4gCSAgIHZhbHVlcyAoNSBieXRlcyBpbiBzaXplKS4NCj4NCj4gSXMgdGhpcyBpbiB0aGUg
Y29udGV4dCBvZiB0aGUgcHJlc2VudCBzb2x1dGlvbiBzcGVjaWZpZWQsIG9yIGluIGNvbnRleHQg
b2YgYSBoeXBvdGhldGljYWwgY2FzZSBvZiBhIGNvdW50ZXJzaWduYXR1cmUgdGhhdCBkb2VzICpu
b3QqIGNvdmVyIHRoZSBPU0NPUkUgT3B0aW9uPw0KPiBTYW1lIHF1ZXN0aW9uIGZvciB0aGUgcGFy
YWdyYXBoOg0KPiAJTm90ZSB0aGF0LCBieSBjaGFuZ2luZyB0aGUgUGFydGlhbCBJViBhcyBkaXNj
dXNzZWQgYWJvdmUsIGFueSBtZW1iZXINCj4gCSAgIG9mIEcxIHdvdWxkIGFsc28gYmUgYWJsZSB0
byBmb3JnZSBhIHZhbGlkIHNpZ25lZCByZXNwb25zZSBtZXNzYWdlIE0yDQo+IAkgICB0byBiZSBp
bmplY3RlZCBpbiB0aGUgc2FtZSBncm91cCBHMS4NCj4gKEluIG90aGVyIHdvcmRzOiBkbyB3ZSB3
YW50IHRvIHNheSBoZXJlIHRoYXQgYSBtZW1iZXIgb2YgRzIgY2FuICpub3QqIGZvcmdlIGEgdmFs
aWQgc2lnbmVkIHJlc3BvbnNlIG1lc3NhZ2UgTTIsIGJlY2F1c2Ugd2Ugbm93IGhhdmUgYSBjb3Vu
dGVyc2lnbmF0dXJlIHRoYXQgY292ZXJzIHRoZSBPU0NPUkUgT3B0aW9uPw0KPiBPciBkbyB3ZSB3
YW50IHRvIHNheSB0aGF0IGEgbWVtYmVyIG9mIEcyICpjYW4qIGZvcmdlIGluIHJlYWwtdGltZS4p
DQoNCj09Pk1UDQpTdGFydGluZyBmcm9tIHRoZSBwYXJhZ3JhcGggIklmIHRoZSBjb3VudGVyc2ln
bmF0dXJlIGRpZCBub3QgY292ZXIgLi4uIiANCiwgdGhlIHRleHQgZGlzY3Vzc2VzIHRoZSBoeXBv
dGhldGljYWwgY2FzZSBvZiB0aGUgY291bnRlcnNpZ25hdHVyZSAqbm90KiANCmNvdmVyaW5nIHRo
ZSBPU0NPUkUgb3B0aW9uLg0KDQpUbyBtYWtlIGl0IGNsZWFyZXIgYW5kIGVuc3VyZSB0aGF0IHRo
ZSByZWFkZXIgZG9lcyBub3QgbG9vc2UgY29udGV4dCwgd2UgDQpjYW4gcGVyZm9ybSB0aGUgZm9s
bG93aW5nIGVkaXRvcmlhbCBmaXhlcywgYnkgYWxzbyBsZXZlcmFnaW5nIGEgYnVsbGV0IA0KbGlz
dCBhbmQgaXRzIGluZGVudGF0aW9uLg0KDQoiDQpJZiwgaHlwb3RoZXRpY2FsbHksIHRoZSBjb3Vu
dGVyc2lnbmF0dXJlIGRpZCBub3QgY292ZXIgdGhlIE9TQ09SRSBvcHRpb246DQoNCiogVGhlIGF0
dGFjayBkZXNjcmliZWQgaW4gU2VjdGlvbiAxMS43LjEgd291bGQgc3RpbGwgYmUgcG9zc2libGUg
YWdhaW5zdCANCnJlc3BvbnNlIG1lc3NhZ2VzIC4uLg0KDQoqIEEgc2ltcGxpZmljYXRpb24gd291
bGQgYWxzbyBiZSBwb3NzaWJsZSBpbiBwZXJmb3JtaW5nIHRoZSBhdHRhY2ssIA0Kc2luY2UgWiBp
cyBhYmxlIHRvIC4uLg0KDQogwqDCoCBTaW5jZSB0aGUgUGFydGlhbCBJViBpcyA1IGJ5dGVzIGlu
IHNpemUsIC4uLg0KDQogwqDCoCBOb3RlIHRoYXQsIGJ5IGNoYW5naW5nIHRoZSBQYXJ0aWFsIElW
IC4uLg0KIg0KDQoNClBST1BPU0FMOiBwZXJmb3JtIHRoZSBlZGl0b3JpYWwgdXBkYXRlcyBhYm92
ZS4NCjw9PQ0KDQo+DQo+IFJlZmVyZW5jZXMNCj4gUXVpdGUgYSBudW1iZXIgb2YgcmVmZXJlbmNl
cyBhcmUgaW5mb3JtYXRpdmUuIFRoaXMgbWF5IG5lZWQgdG8gYmUgY2hhbmdlZCBmb3Igc29tZSwg
YmFzZWQgb24gdGhlIGd1aWRlbGluZXMgaW4gaHR0cHM6Ly9ldXIwNS5zYWZlbGlua3MucHJvdGVj
dGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGd3d3LmlldGYub3JnJTJGYWJvdXQl
MkZncm91cHMlMkZpZXNnJTJGc3RhdGVtZW50cyUyRm5vcm1hdGl2ZS1pbmZvcm1hdGl2ZS1yZWZl
cmVuY2VzJTJGJmFtcDtkYXRhPTA0JTdDMDElN0NtYXJjby50aWxvY2ElNDByaS5zZSU3QzBkOGYx
MDg1NDVjZTQ3MmQzMmNjMDhkOWQ0ZTJjZTJiJTdDNWE5ODA5Y2YwYmNiNDEzYTgzOGEwOWVjYzQw
Y2M5ZTglN0MwJTdDMCU3QzYzNzc3NDg5MzcyODk4ODk4NCU3Q1Vua25vd24lN0NUV0ZwYkdac2Iz
ZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENK
WFZDSTZNbjAlM0QlN0MyMDAwJmFtcDtzZGF0YT1oVURnU1EzRGVDcjVnQzBhUW1IZnduMklMczd1
TDhsRDJyaEFYYmdnYWRzJTNEJmFtcDtyZXNlcnZlZD0wLg0KDQo9PT5NVA0KVGhhbmtzLCBlc3Bl
Y2lhbGx5IHR3byBwb2ludHMgc2hvdWxkIGJlIGNvbnNpZGVyZWQgZnJvbSB0aGUgZ3VpZGVsaW5l
cyANCihyZXN0YXRlZCBoZXJlIGZvciByZWZlcmVuY2UgaW4gdGhlIGZvbGxvd2luZyBjb21tZW50
cykuDQoNCkdMMTogIk5vcm1hdGl2ZSByZWZlcmVuY2VzIHNwZWNpZnkgZG9jdW1lbnRzIHRoYXQg
bXVzdCBiZSByZWFkIHRvIA0KdW5kZXJzdGFuZCBvciBpbXBsZW1lbnQgdGhlIHRlY2hub2xvZ3kg
aW4gdGhlIG5ldyBSRkMsIG9yIHdob3NlIA0KdGVjaG5vbG9neSBtdXN0IGJlIHByZXNlbnQgZm9y
IHRoZSB0ZWNobm9sb2d5IGluIHRoZSBuZXcgUkZDIHRvIHdvcmsuIg0KDQpHTDI6ICJFdmVuIHJl
ZmVyZW5jZXMgdGhhdCBhcmUgcmVsZXZhbnQgb25seSBmb3Igb3B0aW9uYWwgZmVhdHVyZXMgbXVz
dCANCmJlIGNsYXNzaWZpZWQgYXMgbm9ybWF0aXZlIGlmIHRoZXkgbWVldCB0aGUgYWJvdmUgY29u
ZGl0aW9ucyBmb3IgDQpub3JtYXRpdmUgcmVmZXJlbmNlcy4iDQo8PT0NCg0KPiBSZWZlcmVuY2Ug
W0ktRC5tYXR0c3Nvbi1jZnJnLWRldC1zaWdzLXdpdGgtbm9pc2VdIGlzIHVzZWQgaW4gYSBub3Jt
YXRpdmUgcmVxdWlyZW1lbnQgKFNIT1VMRCksIHNvIHRoZSByZWZlcmVuY2Ugc2hvdWxkIGJlIG5v
cm1hdGl2ZSBldmVuIHRob3VnaCBzb21lIGltcGxlbWVudGF0aW9ucyBtYXkgbm90IHVzZSBpdC4g
IChBc3N1bXB0aW9uIGhlcmUgaXMgdGhhdCBtb3N0IHdpbGwuKQ0KDQo9PT5NVA0KRm9yIGluZm9y
bWF0aW9uLCBub3RlIHRoYXQgU2VjdGlvbiAxIG9mIA0KW0ktRC5tYXR0c3Nvbi1jZnJnLWRldC1z
aWdzLXdpdGgtbm9pc2VdIHNheXM6DQoNCuKAnFByb2R1Y2VkIHNpZ25hdHVyZXMgcmVtYWluIGZ1
bGx5IGNvbXBhdGlibGUgd2l0aCB1bm1vZGlmaWVkIEVDRFNBIGFuZCANCkVkRFNBIHZlcmlmaWVy
cyBhbmQgZXhpc3Rpbmcga2V5IHBhaXJzIGNhbiBjb250aW51ZSB0byBiZSB1c2VkLuKAnQ0KDQpU
aGF0IGlzLCB0aGUgYXBwcm9hY2ggY2FuIGJlIHVzZWQgd2l0aCBvbmx5IG9uZSBjb21tdW5pY2F0
aW9uIHNpZGUgDQpzdXBwb3J0aW5nIGl0Lg0KDQpSZWdhcmRsZXNzLCB3aGlsZSBrZWVwaW5nIHRo
ZSByZWZlcmVuY2UgYXMgaW5mb3JtYXRpdmUsIHBvc3NpYmxlIA0KYWx0ZXJuYXRpdmVzIHRvIHRh
a2UgaW4gU2VjdGlvbiAxMCBmb3IgYWRkcmVzc2luZyB0aGUgZ3VpZGVsaW5lIEdMMSBjYW4gYmU6
DQoNCiogQ2hhbmdpbmcgIlJFQ09NTUVOREVEIiB0byAicmVjb21tZW5kZWQiLg0KDQoqIFJlcGhy
YXNpbmcgdGhlIHdob2xlIGJ1bGxldCBwb2ludCBhcyBmb2xsb3dzLCBvciBzaW1pbGFyOg0KDQpP
TEQ6DQpJZiBlbGxpcHRpYyBjdXJ2ZSBzaWduYXR1cmVzIGFyZSB1c2VkLCBpdCBpcyBSRUNPTU1F
TkRFRCB0byBpbXBsZW1lbnQgDQpkZXRlcm1pbmlzdGljIHNpZ25hdHVyZXMgd2l0aCBhZGRpdGlv
bmFsIHJhbmRvbW5lc3MgYXMgc3BlY2lmaWVkIGluIA0KW0ktRC5tYXR0c3Nvbi1jZnJnLWRldC1z
aWdzLXdpdGgtbm9pc2VdLg0KDQpORVc6DQrigJxJZiBlbGxpcHRpYyBjdXJ2ZSBzaWduYXR1cmVz
IGFyZSB1c2VkLCBpdCBpcyBSRUNPTU1FTkRFRCBmb3IgDQpkZXBsb3ltZW50cyB3aGVyZSBzaWRl
LWNoYW5uZWwgYW5kIGZhdWx0IGluamVjdGlvbiBhdHRhY2tzIGFyZSBhIGNvbmNlcm4gDQp0byBp
bXBsZW1lbnQgZGV0ZXJtaW5pc3RpYyBzaWduYXR1cmVzIHdpdGggYWRkaXRpb25hbCByYW5kb21u
ZXNzLCBmb3IgDQpleGFtcGxlIGJ5IHVzaW5nIHRoZSBjb25zdHJ1Y3Rpb25zIHNwZWNpZmllZCBp
biANCltJLUQubWF0dHNzb24tY2ZyZy1kZXQtc2lncy13aXRoLW5vaXNlXS7igJ0NCg0KDQpQUk9Q
T1NBTDoga2VlcCB0aGUgcmVmZXJlbmNlIGluZm9ybWF0aXZlIGFuZCB0YWtlIG9uZSBvZiB0aGUg
dHdvIA0KYWx0ZXJuYXRpdmVzIGFib3ZlIChwcmVmZXJhYmx5IHRoZSBzZWNvbmQgb25lKS4NCjw9
PQ0KDQo+IFNpbWlsYXIgZm9yIFtJLUQuaWV0Zi1hY2Uta2V5LWdyb3VwY29tbS1vc2NvcmVdLCAg
ICBbSS1ELmlldGYtYWNlLWtleS1ncm91cGNvbW0tb3Njb3JlXTogdXNlZCBpbiBhIFNIT1VMRC4N
Cg0KPT0+TVQNClRoZSBvY2N1cnJlbmNlcyBpbiBxdWVzdGlvbiBhcmU6DQoNCiogU2VjdGlvbiAz
ICJUaGUgR3JvdXAgTWFuYWdlciI6IEl0IGlzIFJFQ09NTUVOREVEIHRvIHVzZSBhIEdyb3VwIA0K
TWFuYWdlciBhcyBkZXNjcmliZWQgaW4gW0ktRC5pZXRmLWFjZS1rZXktZ3JvdXBjb21tLW9zY29y
ZV0uDQoNCiogU2VjdGlvbiAzLjIgIk1hbmFnZW1lbnQgb2YgR3JvdXAgS2V5aW5nIE1hdGVyaWFs
IjogVGhlIHNwZWNpZmljIGdyb3VwIA0Ka2V5IG1hbmFnZW1lbnQgc2NoZW1lIHVzZWQgdG8gZGlz
dHJpYnV0ZSBuZXcga2V5aW5nIG1hdGVyaWFsLCBpcyBvdXQgb2YgDQp0aGUgc2NvcGUgb2YgdGhp
cyBkb2N1bWVudC4gSG93ZXZlciwgaXQgaXMgUkVDT01NRU5ERUQgdGhhdCB0aGUgR3JvdXAgDQpN
YW5hZ2VyIHN1cHBvcnRzIHRoZSBHcm91cCBSZWtleWluZyBQcm9jZXNzIGRlc2NyaWJlZCBpbiAN
CltJLUQuaWV0Zi1hY2Uta2V5LWdyb3VwY29tbS1vc2NvcmVdLg0KDQoqIEFwcGVuZGl4IEQgIlNl
dC11cCBvZiBOZXcgRW5kcG9pbnRzIjogSXQgaXMgUkVDT01NRU5ERUQgdGhhdCB0aGUgam9pbiAN
CnByb2Nlc3MgYWRvcHRzIHRoZSBhcHByb2FjaCBkZXNjcmliZWQgaW4gDQpbSS1ELmlldGYtYWNl
LWtleS1ncm91cGNvbW0tb3Njb3JlXSAuLi4NCg0KDQpUaGVyZSBhcmUgdHdvIHNhZmUgYWx0ZXJu
YXRpdmUgdG8gdGFrZSBpbiB0aGUgc2VjdGlvbnMgYWJvdmUgdG8gYWRkcmVzcyANCnRoZSBndWlk
ZWxpbmUgR0wxOg0KDQoqIE1ha2UgdGhlIHJlZmVyZW5jZSBub3JtYXRpdmUuDQoNCiogUmVsYXgg
dGhlIHN0YXRlbWVudHMgdG8gYmUgbm9uIG5vcm1hdGl2ZSwgd2hpbGUgcG9pbnRpbmcgdG8gdGhl
IEFDRSANCmRvY3VtZW50IHByb3ZpZGluZyBhIHBvc3NpYmxlIEdyb3VwIE1hbmFnZXIgdG8gdXNl
LCBhcyBpbmNsdWRpbmcgYWxzbyBhIA0KZ3JvdXAgcmVrZXlpbmcgcHJvY2VzcyBhbmQgYSBqb2lu
IHByb2Nlc3MgaW4gaXRzIHNwZWNpZmljYXRpb24uDQoNCg0KUFJPUE9TQUw6IHRha2Ugb25lIG9m
IHRoZSB0d28gYWx0ZXJuYXRpdmVzIGFib3ZlIChwcmVmZXJhYmx5IHRoZSBzZWNvbmQgb25lKQ0K
PD09DQoNCj4gQ29BUCBPYnNlcnZlIFJGQyA3NjQxIHBsYXlzIGFuIGltcG9ydGFudCByb2xlIHNv
IHNob3VsZCBiZSBhIG5vcm1hdGl2ZSByZWZlcmVuY2UuICBUaGF0IGlzIHRydWUgcmVnYXJkbGVz
cyBvZiB0aGUgZmFjdCB0aGF0IE9ic2VydmUgaXMgYW4gb3B0aW9uYWwgZmVhdHVyZTsgc2luY2Ug
bWFueSBvZiB0aGUgc2VjdGlvbnMgZGVmaW5lIHNwZWNpZmljIHByb3RvY29sIGVsZW1lbnRzIGZv
ciBPYnNlcnZlIGkuZS4gaXQgZGVmaW5lcyBuZXcgdGVjaG5vbG9neSB0aGF0IGJ1aWxkcyBub3Jt
YXRpdmVseSBvbiBPYnNlcnZlLg0KDQo9PT5NVA0KQWdyZWUsIGFzIGNvbnNpc3RlbnQgd2l0aCB0
aGUgZ3VpZGVsaW5lIEdMMi4NCg0KDQpQUk9QT1NBTDogbWFrZSBSRkMgNzY0MSBhIG5vcm1hdGl2
ZSByZWZlcmVuY2UuDQo8PT0NCg0KPg0KPiBSZWZlcmVuY2UgW0ktRC5pZXRmLWNvcmUtZWNoby1y
ZXF1ZXN0LXRhZ10gaXMgdXNlZCBpbiBhIG5vcm1hdGl2ZSBNVVNUIHJlcXVpcmVtZW50IChpbiAy
LjUuMS4yKSwgc28gaGVyZSB0aGUgcmVmZXJlbmNlIHNob3VsZCBiZSBub3JtYXRpdmUuDQo+IE9y
IGRvIEkgbWlzdW5kZXJzdGFuZCB0aGlzPyBJdCBjYW4gYWxzbyBiZSBpbnRlcnByZXRlZCBhcyBv
bmx5IEFwcGVuZGl4IEUgYmVpbmcgdGhlIHRhcmdldCBvZiB0aGUgTVVTVCByZXF1aXJlbWVudCwg
d2hpbGUgW0ktRC5pZXRmLWNvcmUtZWNoby1yZXF1ZXN0LXRhZ10gaXMgb25seSBpbmZvcm1hdGl2
ZSAtIGJ1dCB0aGF0IHNlZW1zIHRvIGJlIG5vdCB0aGUgY2FzZSwgYXMgdGhlIGZvcm1hdCBvZiB0
aGUgRWNobyBvcHRpb24gaXMgYWN0dWFsbHkgdXNlZCBpbiB0aGUgQXBwZW5kaXggRSBhcHByb2Fj
aC4gSW4gb3RoZXIgd29yZHMgeW91IG5lZWQgdG8gcmVhZCBbSS1ELmlldGYtY29yZS1lY2hvLXJl
cXVlc3QtdGFnXSBkZWZpbml0aW9ucyB0byBpbXBsZW1lbnQgdGhlIHNvbHV0aW9uIG9mIEFwcGVu
ZGl4IEUgYW5kIGl0IGNhbm5vdCB3b3JrIG90aGVyd2lzZS4NCg0KPT0+TVQNCnRsZHI7IENvbnNp
c3RlbnRseSB3aXRoIHRoZSBndWlkZWxpbmUgaW4gR0wyLCBhZ3JlZSB0aGF0IA0KZWNoby1yZXF1
ZXN0LXRhZyBzaG91bGQgYmUgYSBub3JtYXRpdmUgcmVmZXJlbmNlIGR1ZSB0byBTZWN0aW9uIDIu
NS4xLjIuDQoNCk9yaWdpbmFsbHksIEFwcGVuZGl4IEUgd2FzIGludGVuZGVkIHRvIHByb3ZpZGUg
YSBwb3NzaWJsZSB3YXkgdG8gZGVhbCANCndpdGggbWVzc2FnZSBmcmVzaG5lc3MgYW5kIGNsaWVu
dCBhbGl2ZW5lc3MsIGFzIHRoZSBhbmFsb2dvdXMgb2YgDQpBcHBlbmRpeCBCLjEuMiBvZiBSRkMg
ODYxMy4NCg0KVGh1cywgY29uc2lzdGVudGx5IHdpdGggUkZDIDg2MTMsIHdlOiBpKSB3cm90ZSBp
dCBhcyBhbiBhcHBlbmRpeCANCnByZXNlbnRpbmcgYSBwb3NzaWJsZSBhcHByb2FjaCB0byB1c2Ug
Zm9yIHN5bmNocm9uaXphdGlvbjsgaWkpIGhhZCANCmVjaG8tcmVxdWVzdC10YWcgYXMgYW4gaW5m
b3JtYXRpdmUgcmVmZXJlbmNlOyBpaWkpIGhhZCBub3Qgbm9ybWF0aXZlIA0KbGFuZ3VhZ2UgYWJv
dXQgaXQgaW4gU2VjdGlvbnMgNi4zICJNZXNzYWdlIEZyZXNobmVzcyIsIDExLjEzICJNZXNzYWdl
IA0KRnJlc2huZXNzIiBhbmQgMTEuMTQgIkNsaWVudCBBbGl2ZW5lc3MiLg0KDQpTZWN0aW9uIDIu
NS4xLjIgYW5kIHRoZSBwcm9ibGVtIGl0IGRpc2N1c3NlcyBjYW1lIGxhdGVyLCBhbmQgYWRtaXR0
ZWRseSANCnJhaXNlIHRoZSBiYXIgYWJvdXQgdGhlIHJvbGUgYW5kIGltcG9ydGFuY2Ugb2YgZWNo
by1yZXF1ZXN0LXRhZywgd2hpY2ggDQppcyBzdGlsbCBwcmVzZW50ZWQgYXMgb25lIG9mIHR3byBh
bHRlcm5hdGl2ZXMsIGJ1dCBhbHNvIGFzIHRoZSANClJFQ09NTUVOREVEIG9uZS4NCg0KVGh1cywg
aXQgc291bmRzIHJpZ2h0IHRvIG1ha2UgZWNoby1yZXF1ZXN0LXRhZyBhIG5vcm1hdGl2ZSByZWZl
cmVuY2UuDQoNCg0KUFJPUE9TQUw6IG1ha2UgZHJhZnQtaWV0Zi1jb3JlLWVjaG8tcmVxdWVzdC10
YWcgYSBub3JtYXRpdmUgcmVmZXJlbmNlLg0KPD09DQoNCj4NCj4gQXBwZW5kaWNlcw0KPiBBbGw6
IFNvbWUgYXBwZW5kaWNlcyBoYXZlIG5vcm1hdGl2ZSBsYW5ndWFnZTsgc28gaXQgc2VlbXMgdGhl
eSBhcmUgbm90IG1lcmVseSBpbmZvcm1hdGl2ZS4gSXMgdGhlcmUgYSBwYXJ0aWN1bGFyIHJlYXNv
biBmb3IgcHV0dGluZyB0aGlzIGluZm9ybWF0aW9uIGluIGFuIGFwcGVuZGl4IGFuZCBub3QgaW4g
bWFpbiB0ZXh0Pw0KPiBTaG91bGQgd2UgaW5kaWNhdGUgaW4gdGhlIGludHJvZHVjdGlvbiB3aGlj
aCBBcHBlbmRpY2VzIGFyZSBub3JtYXRpdmUgYW5kIHdoaWNoIGluZm9ybWF0aXZlPw0KDQo9PT5N
VA0KVGhpcyBpcyB0aGUgY2FzZSBmb3IgQXBwZW5kaXggRCBhbmQgQXBwZW5kaXggRS4NCg0KQXMg
dG8gQXBwZW5kaXggRCAiU2V0LXVwIG9mIE5ldyBFbmRwb2ludHMiLCBpdCB1c2VzIFJFQ09NTUVO
REVEIG9uY2UsIA0KZm9yIGRyYWZ0LWlldGYtYWNlLWtleS1ncm91cGNvbW0tb3Njb3JlIHJlZ2Fy
ZGluZyB0aGUgam9pbiBwcm9jZXNzIHRvIA0KdXNlLiBIb3dldmVyLCB0aGlzIGlzIHNpbXBseSBy
ZXN0YXRpbmcgdGhlIHNhbWUgbm9ybWF0aXZlIHJlY29tbWVuZGF0aW9uIA0KZnJvbSBTZWN0aW9u
IDMuIEl0IHNob3VsZCBoZWxwIHRvIHNpbXBseSBjaGFuZ2UgIlJFQ09NTUVOREVEIiB0byANCiJy
ZWNvbW1lbmRlZCIgaW4gQXBwZW5kaXggRC4gSG93ZXZlciwgYmFzZWQgb24gYSBwcmV2aW91cyBj
b21tZW50LCB0aGlzIA0KcmVjb21tZW5kYXRpb24gdGhyb3VnaG91dCB0aGUgZG9jdW1lbnQgY2Fu
IGJlIHJlbGF4ZWQgdG8gYmUgDQpub24tbm9ybWF0aXZlIGluIHRoZSBmaXJzdCBwbGFjZS4NCg0K
QXMgdG8gQXBwZW5kaXggRSAiQ2hhbGxlbmdlLVJlc3BvbnNlIFN5bmNocm9uaXphdGlvbiIsIHRo
ZSBhbmFsb2dvdXMgDQpBcHBlbmRpeCBCLjEuMiBvZiBSRkMgODYxMyBhbHNvIHVzZXMgbm9ybWF0
aXZlIGxhbmd1YWdlIChqdXN0IGxpa2UgaXRzIA0KQXBwZW5kaXggQi4yKS4gVGhhdCBpcywgb25j
ZSBjbGFyaWZpZWQgdXBmcm9udCB0aGF0IHRoZSBhcHBlbmRpeCANCmRlc2NyaWJlcyBhIHBvc3Np
YmxlIGFwcHJvYWNoLCBpdCBzaG91bGQgYmUgZmluZSB0byB1c2Ugbm9ybWF0aXZlIA0KbGFuZ3Vh
Z2UgdG8gZGVzY3JpYmUgZGV0YWlscyBhYm91dCBob3cgdGhhdCBhcHByb2FjaCBoYXMgdG8gd29y
ayB3aGVuIA0KdXNlZC4gSG93ZXZlciwgYmFzZWQgb24gdGhlIGZpbmFsIGNvbW1lbnQgYmVsb3cs
IEFwcGVuZGl4IEUgbWlnaHQgYmVjb21lIA0KYW4gYWN0dWFsIHNlY3Rpb24gaW4gdGhlIGRvY3Vt
ZW50IGJvZHkuDQoNCg0KUFJPUE9TQUw6IGluIEFwcGVuZGl4IEQsIGNoYW5nZSAiUkVDT01NRU5E
RUQiIHRvICJyZWNvbW1lbmRlZCIgDQoocmVnYXJkbGVzcyBvZiBob3cgdGhlIHJlY29tbWVuZGF0
aW9uIGJlY29tZXMgaW4gdGhlIHJlc3Qgb2YgdGhlIGRvY3VtZW50KS4NCjw9PQ0KDQo+DQo+IEFw
cGVuZGl4IEEuMQ0KPiAiTXVsdGljYXN0IGRhdGEgc2VjdXJpdHkgY2lwaGVyc3VpdGU6IGFsbCBt
ZW1iZXJzIG9mIGEgc2VjdXJpdHkgZ3JvdXAgbXVzdCBhZ3JlZSBvbiBhIGNpcGhlcnN1aXRlIg0K
PiAtPiBJc24ndCBpdCBkZXRlcm1pbmVkIGJ5IHRoZSBHTT8gRS5nLiB0aGUgR00gbmVlZHMgdG8g
ZXN0YWJsaXNoIGEgY2lwaGVyc3VpdGUgdGhhdCBhbGwgbWVtYmVycyBjYW4gc3VwcG9ydC4gVGhl
cmUncyBubyBhZ3JlZW1lbnQgcHJvdG9jb2wgb3Igc28uDQoNCj09Pk1UDQpDb3JyZWN0LCBpdCBp
cyBpbmRlZWQgZGV0ZXJtaW5lZCBieSB0aGUgR3JvdXAgTWFuYWdlcjsgdG8gYmUgY2xhcmlmaWVk
IA0KYXMsIGUuZy46ICJhbGwgbWVtYmVycyBvZiBhIHNlY3VyaXR5IGdyb3VwIG11c3QgdXNlIGEg
c2FtZSBjaXBoZXJzdWl0ZSANCnRvIC4uLiIuDQoNCg0KUFJPUE9TQUw6IGNsYXJpZnkgdGhlIHF1
b3RlZCBzZW50ZW5jZS4NCjw9PQ0KDQo+DQo+IEFwcGVuZGl4IEQNCj4gCUl0IGlzIFJFQ09NTUVO
REVEIHRoYXQgdGhlIGpvaW4gcHJvY2VzcyBhZG9wdHMgdGhlIGFwcHJvYWNoIGRlc2NyaWJlZA0K
PiAJICAgaW4gW0ktRC5pZXRmLWFjZS1rZXktZ3JvdXBjb21tLW9zY29yZV0gYW5kIGJhc2VkIG9u
IHRoZSBBQ0UgZnJhbWV3b3JrDQo+IAkgICBmb3IgQXV0aGVudGljYXRpb24gYW5kIEF1dGhvcml6
YXRpb24gaW4gY29uc3RyYWluZWQgZW52aXJvbm1lbnRzDQo+IAkgICBbSS1ELmlldGYtYWNlLW9h
dXRoLWF1dGh6XS4NCj4gLT4gdGhlIHBhcnQgImFuZCBiYXNlZCBvbiB0aGUgQUNFIGZyYW1ld29y
ayAuLi4iIGlzIG5vdCBzbyBjbGVhci4gSXMgYXBwbHlpbmcgW0ktRC5pZXRmLWFjZS1vYXV0aC1h
dXRoel0gUkVDT01NRU5ERUQ/IE9yIGlzIGl0IGp1c3QgaW5mb3JtYXRpb25hbCBzYXlpbmcgdGhh
dCBbSS1ELmlldGYtYWNlLWtleS1ncm91cGNvbW0tb3Njb3JlXSBpcyBiYXNpbmcgaXRzZWxmIG9u
IFtJLUQuaWV0Zi1hY2Utb2F1dGgtYXV0aHpdLCBhcyBhICJGWUkiIHN0YXRlbWVudD8NCg0KPT0+
TVQNClRoZSBsYXR0ZXIuDQoNCg0KUFJPUE9TQUw6IG5vIGFjdGlvbi4NCjw9PQ0KDQo+IFNlY3Rp
b24gMyBsYW5ndWFnZSBvbiB0aGlzIHNhbWUgc3ViamVjdCBpcyBtb3JlIGNsZWFyIGFuZCBjb3Vs
ZCBiZSB1c2VkIGluc3RlYWQuICBPciBtYXliZSByZWZlciB0byB0aGUgU2VjdGlvbiAzIHN0YXRl
bWVudCBmcm9tIGhlcmUgdG8gYXZvaWQgZHVwbGljYXRpb24uDQoNCj09Pk1UDQpUaGFua3MgZm9y
IHRoZSBzdWdnZXN0aW9uLg0KDQoNClBST1BPU0FMOiByZXBocmFzZSBhcyBwZXIgU2VjdGlvbiAz
Lg0KPD09DQoNCj4NCj4gQXBwZW5kaXggRQ0KPiBHaXZlbiB0aGUgbm9ybWF0aXZlLXJlZmVyZW5j
ZXMgZGlzY3Vzc2lvbiBhYm92ZSBhbmQgbm9ybWF0aXZlIHJlZmVyZW5jZXMgbWFkZSB0byBBcHBl
bmRpeCBFLCB3aHkgaXNuJ3QgdGhpcyBjb250ZW50IGluIGEgbWFpbiBkb2N1bWVudCBzZWN0aW9u
Pw0KDQo9PT5NVA0KU2VlIHRoZSBoaXN0b3J5IG9mIEFwcGVuZGl4IEUgaW4gdGhlIHJlcGx5IHRv
IGEgcHJldmlvdXMgY29tbWVudC4NCg0KQXMgYWxzbyBtZW50aW9uZWQgYWJvdmUsIGR1ZSB0byB0
aGUgcm9sZS9pbXBvcnRhbmNlIG9mIGVjaG8tcmVxdWVzdC10YWcgDQppbiB0aGUgbW9yZSByZWNl
bnQgU2VjdGlvbiAyLjUuMS4yLCBpdCB3b3VsZCBiZSBnb29kIHRvIG1ha2UgaXQgYSANCnNlY3Rp
b24gaW4gdGhlIGRvY3VtZW50IGJvZHksIGUuZy4sIGFmdGVyIHRoZSBjdXJyZW50IFNlY3Rpb24g
OSAiTWVzc2FnZSANClByb2Nlc3NpbmcgaW4gUGFpcndpc2UgTW9kZSIuDQoNCkNvbnNpc3RlbnRs
eSwgYW5kIGFzIGRpc2N1c3NlZCBpbiBhIGNvbW1lbnQgYWJvdmUsIGVjaG8tcmVxdWVzdC10YWcg
DQp3b3VsZCBhbHNvIGJlY29tZSBhIG5vcm1hdGl2ZSByZWZlcmVuY2UuDQoNCg0KUFJPUE9TQUw6
IGlmIGFncmVlZCwgbW92ZSBBcHBlbmRpeCBFIHRvIHRoZSBkb2N1bWVudCBib2R5Lg0KPD09DQoN
Cg0KPT0+TVQNClRoYW5rcyBhIGxvdCBhZ2FpbiENCjw9PQ0KDQo+DQo+DQo+IC0tLS0tT3JpZ2lu
YWwgTWVzc2FnZS0tLS0tDQo+IEZyb206IGNvcmUgPGNvcmUtYm91bmNlc0BpZXRmLm9yZz4gT24g
QmVoYWxmIE9mIEphaW1lIEppbcOpbmV6DQo+IFNlbnQ6IFR1ZXNkYXksIE5vdmVtYmVyIDksIDIw
MjEgMjA6MDANCj4gVG86IGNvcmVAaWV0Zi5vcmcNCj4gQ2M6IGRyYWZ0LWlldGYtY29yZS1vc2Nv
cmUtZ3JvdXBjb21tLmF1dGhvcnNAaWV0Zi5vcmcNCj4gU3ViamVjdDogW2NvcmVdIPCflJQgV0cg
TGFzdCBDYWxsIG9mIGRyYWZ0LWlldGYtY29yZS1vc2NvcmUtZ3JvdXBjb21tDQo+DQo+IERlYXIg
Q29SRSwNCj4NCj4gYXMgd2UgZGlzY3Vzc2VkIHllc3RlcmRheSwgdGhlIGF1dGhvcnMgb2YgZHJh
ZnQtaWV0Zi1jb3JlLW9zY29yZS1ncm91cGNvbW0gdGhpbmsgdGhlaXIgZHJhZnQgaXMgcmVhZHkg
Zm9yIGEgMm5kIFdHTEMuIFRoZSBjdXJyZW50IHZlcnNpb24gb2YgdGhlIGRyYWZ0ICh2MTMpIGlz
IG5vdCBleHBlY3RpbmcgYW55IHVwZGF0ZXMgc28geW91IGNhbiBzdGFydCB5b3VyIHBsYW5uZWQg
cmV2aWV3cy4NCj4NCj4gaHR0cHM6Ly9ldXIwNS5zYWZlbGlua3MucHJvdGVjdGlvbi5vdXRsb29r
LmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGZGF0YXRyYWNrZXIuaWV0Zi5vcmclMkZkb2MlMkZodG1s
JTJGZHJhZnQtaWV0Zi1jb3JlLW9zY29yZS1ncm91cGNvbW0tMTMmYW1wO2RhdGE9MDQlN0MwMSU3
Q21hcmNvLnRpbG9jYSU0MHJpLnNlJTdDMGQ4ZjEwODU0NWNlNDcyZDMyY2MwOGQ5ZDRlMmNlMmIl
N0M1YTk4MDljZjBiY2I0MTNhODM4YTA5ZWNjNDBjYzllOCU3QzAlN0MwJTdDNjM3Nzc0ODkzNzI4
OTg4OTg0JTdDVW5rbm93biU3Q1RXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlq
b2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMCUzRCU3QzIwMDAmYW1wO3NkYXRh
PVZWdWQlMkJxSkdsUk5mVGFPQUVMJTJGRFRwU0FkOWFxcmtDUkpDaXBMN09ueWJNJTNEJmFtcDty
ZXNlcnZlZD0wDQo+DQo+IEluIGFkZGl0aW9uIHRvIHRoZSBlbWFpbCBsaXN0IGRpc2N1c3Npb24g
cmV2aWV3ZXJzIGNvdWxkIGNvbnNpZGVyIG9wZW5pbmcgbmV3IGlzc3VlcyBvbiB0aGUgR2l0aHVi
IHJlcG8gb2YgdGhlIGRyYWZ0IGFzIGNvdXJ0ZXN5IHRvIHRoZSBhdXRob3JzLg0KPg0KPiBodHRw
czovL2V1cjA1LnNhZmVsaW5rcy5wcm90ZWN0aW9uLm91dGxvb2suY29tLz91cmw9aHR0cHMlM0El
MkYlMkZnaXRodWIuY29tJTJGY29yZS13ZyUyRm9zY29yZS1ncm91cGNvbW0mYW1wO2RhdGE9MDQl
N0MwMSU3Q21hcmNvLnRpbG9jYSU0MHJpLnNlJTdDMGQ4ZjEwODU0NWNlNDcyZDMyY2MwOGQ5ZDRl
MmNlMmIlN0M1YTk4MDljZjBiY2I0MTNhODM4YTA5ZWNjNDBjYzllOCU3QzAlN0MwJTdDNjM3Nzc0
ODkzNzI4OTg4OTg0JTdDVW5rbm93biU3Q1RXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFp
TENKUUlqb2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMCUzRCU3QzIwMDAmYW1w
O3NkYXRhPXJsWmpxTncxNFRDQmlmeDRQTkxiSmNGbkJsNWJzakl2JTJGJTJGWVVLbzFSSiUyQjAl
M0QmYW1wO3Jlc2VydmVkPTANCj4NCj4gQXMgd2UgaGF2ZSB0aGUgSUVURiBvbmdvaW5nIGFuZCB0
aGUgZG9jdW1lbnQgbmVlZHMgdGltZSB0byBiZSBkaWdlc3RlZCwgd2UgcGxhY2UgdGhlIGVuZCBv
ZiB0aGUgY2FsbCBvbiB0aGUgMXN0IG9mIERlY2VtYmVyIHdpdGggYSBwb3NzaWJpbGl0eSBvZiBl
eHRlbnNpb24gZGVwZW5kaW5nIG9uIHRoZSBudW1iZXIgb2YgcmV2aWV3cy4NCj4NCj4gPkZyb20g
dGhlIG1pbnV0ZXMgSSB0YWtlIHRoYXQgQ0EsIFJILCBFRCBhbmQgVEYgd291bGQgZ2l2ZSBpdCB0
aG9yb3VnaCBsb29rLiBUaGFuayB5b3UgYWxyZWFkeSBmb3IgdGhhdCwgbXVjaCBhcHByZWNpYXRl
ZCEhDQo+DQo+IENpYW8hDQoNCi0tIA0KTWFyY28gVGlsb2NhDQpQaC5ELiwgU2VuaW9yIFJlc2Vh
cmNoZXINCg0KRGl2aXNpb246IERpZ2l0YWwgU3lzdGVtDQpEZXBhcnRtZW50OiBDb21wdXRlciBT
Y2llbmNlDQpVbml0OiBDeWJlcnNlY3VyaXR5DQoNClJJU0UgUmVzZWFyY2ggSW5zdGl0dXRlcyBv
ZiBTd2VkZW4NCmh0dHBzOi8vd3d3LnJpLnNlDQoNClBob25lOiArNDYgKDApNzAgNjAgNDYgNTAx
DQpJc2Fmam9yZHNnYXRhbiAyMiAvIEtpc3RhZ8OlbmdlbiAxNg0KU0UtMTY0IDQwIEtpc3RhIChT
d2VkZW4pDQoNCg==


From nobody Wed Mar  9 07:49:38 2022
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53DF93A0B5E; Wed,  9 Mar 2022 07:49:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level: 
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lOltlzb4SdhG; Wed,  9 Mar 2022 07:49:28 -0800 (PST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0623.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe02::623]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 412493A0BC5; Wed,  9 Mar 2022 07:49:26 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mV5yb18W5/OAeiWI93QIURHBvhsUtHsLT2yBloBXX+qXQDEYvsqB2qc28cXcS+tAOBYVrUWvOEwnmqmpP1a5AYD4f4hm8SkWr7e4f+wwS9pBqjdSguoGsFdG8BqG8MecNeOFaMwReAU1Qpv0yRH5WJur0f5/S01tUy/4MHfHnfqHSWVcFSG3QUm+twhLaBnV7J3pmBAooFun/JMmNb0V3nR+/dUsXeNyP5J7EzRZUaPwNUmf/oPQZjFqGZL/fM8Z5sWsmjvtg3hqrKhiZY3rCpMjHir2aDRpdU4qAP6CpA8Pnh+Ugar5vIJVlBDEwaPwfAmRmkFjnQL23O9XFJnIzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LSna20IZMMGaLTyNGZMLcgDTREC/1RZTh6bg0GapE/Y=; b=Gj/da0ewA83nDkZqR+nPFlLAxfFXThCgsL3PSvMsKggCZWoSKu4VgiakjE/FN2brROeM+ec4alPPUw8KIp+d8juSIgwD8qMB/BVhPApnsffFQrCB00bZfpSVrbWj4QFkC+U/q1rRpnMlOsgaGwHQzleubVWs4U/FJvTSRIXTEm1Fr0OIv36h7bJtFfaaZxXSbQW4ezQcaJLiGeBrMbyLDv6WuFX7PWjdJxf4YxTUoMzUXXdJipkohtgSXVlRhoifDG9oX7/SOetF4M0hdqTyfiU8qSEgNN2ubiHqT1RU6RXN3gZwX23gVAKMBeYGV0El3hMW5x9VfyyI4fexJH9Ohg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LSna20IZMMGaLTyNGZMLcgDTREC/1RZTh6bg0GapE/Y=; b=VU42Qxj4Pzwv/pzj2402/liYbNrZZe+b7+cX3HRtjz1sEVRSZgrqA1WdLgkqqymRw72AxtRchFTX6vDMqAvPGz2955ToD/Nuu00abhw6FL+NcAxhE9DJfdejjGuaHGeRue6gB3EMTzG1KKTnBC66ez8Tj2wZHDPtkOoFDwMXrZo=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by DBBP189MB1273.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:1e8::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Wed, 9 Mar 2022 15:49:22 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::b0ea:12ff:4a7e:a24c]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::b0ea:12ff:4a7e:a24c%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022 15:49:22 +0000
Message-ID: <51a930e4-5c83-9921-981f-bb860494ee90@ri.se>
Date: Wed, 9 Mar 2022 16:49:19 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: Esko Dijk <esko.dijk@iotconsultancy.nl>, =?UTF-8?Q?Jaime_Jim=c3=a9nez?= <jaime@iki.fi>, "core@ietf.org" <core@ietf.org>
Cc: "draft-ietf-core-oscore-groupcomm.authors@ietf.org" <draft-ietf-core-oscore-groupcomm.authors@ietf.org>
References: <e1c0ac8b-cfa8-4a26-9d19-eee6d9f697b0@www.fastmail.com> <AM8P190MB09793B5DFBA3340109FC46EBFD519@AM8P190MB0979.EURP190.PROD.OUTLOOK.COM> <6591fcc6-5d2b-571b-7b93-cb06d623c3ba@ri.se> <DBAP190MB0981701C495C3C005DD9B86DFD0A9@DBAP190MB0981.EURP190.PROD.OUTLOOK.COM>
From: Marco Tiloca <marco.tiloca@ri.se>
In-Reply-To: <DBAP190MB0981701C495C3C005DD9B86DFD0A9@DBAP190MB0981.EURP190.PROD.OUTLOOK.COM>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------lpySSIH3cwNHzEDkcbEGeQEo"
X-ClientProxiedBy: GV3P280CA0025.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:b::21) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 27c3a560-ca88-4f5f-8eec-08da01e460de
X-MS-TrafficTypeDiagnostic: DBBP189MB1273:EE_
X-Microsoft-Antispam-PRVS: <DBBP189MB12737DFAC42C4B92C2AFBCCA990A9@DBBP189MB1273.EURP189.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(66946007)(66476007)(66556008)(44832011)(6506007)(33964004)(53546011)(30864003)(36756003)(6512007)(6666004)(235185007)(316002)(4326008)(8936002)(31696002)(45080400002)(21480400003)(66574015)(2616005)(5660300002)(6486002)(110136005)(38100700002)(966005)(86362001)(2906002)(31686004)(83380400001)(186003)(26005)(508600001)(43740500002)(45980500001)(579004); DIR:OUT; SFP:1101; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?STZlZS9FenhDNEVQZ2lQRGRPVzAzUlZOc0FLYmRnRWlBRm9ldElnWFBFckI1?= =?utf-8?B?NlhwczhHV3M2anJWNnArU1l1QUtFR2o4VjROdGZ6RXdsSEp3d2xVRWcrTWwr?= =?utf-8?B?LzN0emNZRVNvUE9LTlRHa25JTjlCQzg1dElPTXRTbkFWWnUwRW5NZjVsaUpM?= =?utf-8?B?RnBXeUUyQjlweVArZm92ZkczMHJUUXAzQ1VwelNvMHpaelN4MWFWYlZ0Z0xu?= =?utf-8?B?dXhocUR6eWZWeWpLS0M4YVdxSlNuR1NxMjBwSXN5VW82ODBlY0R3Y1MrMk9l?= =?utf-8?B?M2pCOTBuaFFHelgxTDA4cllPT2ZLN3FxcWhWVmJlVy9CQWJhMFBPUC84bjZP?= =?utf-8?B?ZHpndDFDM3V5SHZySDlocGZIdDVmbFowK3RZblJLY2RNQ00vd0ozSzE4bFdn?= =?utf-8?B?QlQrQi8rWWZHRTg4YjJhREFkdnZSenYrMTM1dGVDR1l6RDVCSDRuR004TnRi?= =?utf-8?B?Sk9PTjV5TEhGTXZ3UDZaV3V4cVhGWEw2cjUwZWVRRGUxdVBkaEUvVG9TcnZZ?= =?utf-8?B?blBVak9jQ0o4QzJmMitaYmNvTTJCZ1RaMmpwVVN2WUdDak5hMStoRHJmWG1y?= =?utf-8?B?YnIrZjV4djRUdFFmeHIreFoxYldIQkxSL1ZwN1o1enVZTHB5TVlMNkQzaEVR?= =?utf-8?B?Y1AvSlc5MG1VZzVkSklydGhzRk9RQWF6VFJKMSsvZUJFdmFFV1NRT251ZzFQ?= =?utf-8?B?SHNPVXlCNmVJSHFGSXVBakxZTStIRFBoYWc2VkJFRmFsdXRWOEZTOWpoclhJ?= =?utf-8?B?TEV2N3djQkk5RUQ2b0trUm1ScEgzQmFvbFNqc2k3SnhFR1VjRzlpMVJuVm91?= =?utf-8?B?ZmRwSk5BTXJHNTcyN3lFNzlCeTFUTWlOM294WXJlWEVVT2JMZkplNHFyamdZ?= =?utf-8?B?RE5SMExNaHdvaFV5azdRU295SGg3NVpvSDlvT3QzbUtjMUdsTTVqSG5XbTRM?= =?utf-8?B?NGZJMERpZ01yZVU5NHJvOFBaQXhCaDdYMVFva2xOb0xxVVpvcEZyM2hPZnM5?= =?utf-8?B?VVFnU2hsV3E1ejMyVGVyaGNoQVArRG5xWTZSRW5BY2dTYml4T1NCbWN5bVY5?= =?utf-8?B?dzhoaXZXOURGNnVaSzdlMW5ScEV3bzVyeUFWM09IcTVLakx0eXJJSXRXQXIz?= =?utf-8?B?dWpCVk9mb0ZNRnNrcVpCSk5ybEc2M21rRXZLSndTcW43YWZkVFN2RXpUOElR?= =?utf-8?B?c0hkeU95UFMyU2N5NUlzK3FJbm9xdGYrZlVPbXNPL1ZXZDAwcDViRFJoNmpF?= =?utf-8?B?ZHdDRkFvNDhNWWU2T2lybWNhQ011Y2k5d2d6NHE0cXRZVWY5MFRubWsyemU2?= =?utf-8?B?VG1tUkgxamxJbDlqeHVwS3U1R2sxYmRZNjJyMmwzaFlwZXlzbklzZC9OK29J?= =?utf-8?B?WWJ1cWZtYTJEdmNBSWNWUW9wQmJITGR5Zk9IRkJyUHdOYWc0SFJHdmZnVTNW?= =?utf-8?B?eG9sZGZ5Z3QzTm1XOENLdFdJQVlxUGd1bmV3ajZaczVucGEwS0hpeHRIdEMy?= =?utf-8?B?d0hwSVZlV0ExUktwWXJhRitNL3FvdC9SRzN1Znh5eDlTbXREWHkwUDdQNnUy?= =?utf-8?B?RnNFMi9hMk1iSGd6enVWakdOYWFIL2thdFBrWGQzUVMrQ3dzUExqVlFLQ2h5?= =?utf-8?B?N2pxYndLbjJQMWZldVJPdk9URFMxT21iemlhS3ZmSlBaZTROOFFwMmt3UWpp?= =?utf-8?B?SGtkcS9JSU1uZEdGenJpb1ZWbE50OHBUN2lWUm14Z0pYOCtPWTMzbWRneVBx?= =?utf-8?B?dEsyMmVjaXBZVTl0RDltRnc4dlFZdWZOS2tHNkNaeE1MVWNJcXJKWFl2dU02?= =?utf-8?B?d1NKNCtCQVVsM1I0TXJ4Tk1JRm5MTUFtV3FMVjBqS3k5enUwb2p5MFA3WTNa?= =?utf-8?B?MlY2TFczcmNVdWpoREg2STNUaHlXNnJ3K0dzWDVGbURGNWlUeUlDUkdhb1Bl?= =?utf-8?B?ZVRkTEh5UEJxOGZhU3M5bjZvUUM1b2lHaVdEWDJuQ0lFNENONk1KU1NYa1hF?= =?utf-8?B?UjMrZ2dFcHBUaXY0Y0ZPVVNYTEIzc3hTNGkxN3Axb2c2ZGdKOUhiWmNIMm1z?= =?utf-8?B?V0xrZ1RrTnNnOTBUekxCNjJlelNuMTJ6L2FFZ1pReW9OTVVWYWZSdDgzY0I2?= =?utf-8?B?NGxGZDlBemU0QkVHVlVUVFh1OU9NeTM3MXp1K0gyS0N5cGxiZnhzRUwyakUw?= =?utf-8?Q?oFCezFW4OY0Kj+8rJcTzX1o=3D?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 27c3a560-ca88-4f5f-8eec-08da01e460de
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:49:21.9934 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0mLWUX/19Gb0q/LeXcobz9tvbLXOOey9tSc2Hgi4IfcQLSa31rGQJ7Q0jXXRPjKfXlPmMZ4abZvXhxd0zbmOBQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBP189MB1273
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/vbUG2NpRC128zxI16ZK7K4RziVw>
Subject: Re: [core]  =?utf-8?q?=F0=9F=94=94_WG_Last_Call_of_draft-ietf-core-os?= =?utf-8?q?core-groupcomm?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2022 15:49:36 -0000

--------------lpySSIH3cwNHzEDkcbEGeQEo
Content-Type: multipart/mixed; boundary="------------qQmD8YEa0Pl0d6W2ztXZXVtS";
 protected-headers="v1"
From: Marco Tiloca <marco.tiloca@ri.se>
To: Esko Dijk <esko.dijk@iotconsultancy.nl>, =?UTF-8?Q?Jaime_Jim=c3=a9nez?=
 <jaime@iki.fi>, "core@ietf.org" <core@ietf.org>
Cc: "draft-ietf-core-oscore-groupcomm.authors@ietf.org"
 <draft-ietf-core-oscore-groupcomm.authors@ietf.org>
Message-ID: <51a930e4-5c83-9921-981f-bb860494ee90@ri.se>
Subject: =?UTF-8?Q?Re=3a_=5bcore=5d_=f0=9f=94=94_WG_Last_Call_of_draft-ietf-?=
 =?UTF-8?Q?core-oscore-groupcomm?=
References: <e1c0ac8b-cfa8-4a26-9d19-eee6d9f697b0@www.fastmail.com>
 <AM8P190MB09793B5DFBA3340109FC46EBFD519@AM8P190MB0979.EURP190.PROD.OUTLOOK.COM>
 <6591fcc6-5d2b-571b-7b93-cb06d623c3ba@ri.se>
 <DBAP190MB0981701C495C3C005DD9B86DFD0A9@DBAP190MB0981.EURP190.PROD.OUTLOOK.COM>
In-Reply-To: <DBAP190MB0981701C495C3C005DD9B86DFD0A9@DBAP190MB0981.EURP190.PROD.OUTLOOK.COM>

--------------qQmD8YEa0Pl0d6W2ztXZXVtS
Content-Type: multipart/mixed; boundary="------------t2k1ajseIYZD0EM6RXzSwq5F"

--------------t2k1ajseIYZD0EM6RXzSwq5F
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

SGkgRXNrbywNCg0KT24gMjAyMi0wMy0wOSAxMToxMSwgRXNrbyBEaWprIHdyb3RlOg0KPiBI
aSBNYXJjbywNCj4NCj4gVGhhbmtzIGZvciB5b3VyIGNvbnNpZGVyZWQgdXBkYXRlcyBhbmQg
ZGV0YWlsZWQgcmVzcG9uc2VzLiBJIGRpZG4ndCBmb2xsb3cgdGhlIGRldGFpbHMgb2YgaG93
IHRoZSBkb2N1bWVudCBldm9sdmVkIGJhc2VkIG9uIHRoZSByZXZpZXcgY29tbWVudHMuDQo+
IElmIHRoZXJlJ3MgYW55dGhpbmcgeW91IG5lZWQgbXkgaW5wdXQgb24sIHBsZWFzZSBsZXQg
bWUga25vdy4gIFlvdXIgcHJvcG9zYWxzIGxvb2sgb2theSB0byBtZS4NCg0KPT0+TVQNCkdy
ZWF0IHRvIGhlYXIsIGFuZCB0aGFuayB5b3UgYWdhaW4gZm9yIHRoZSBnb29kIGFuZCBpbi1k
ZXB0aCByZXZpZXchDQo8PT0NCg0KPg0KPiBPbmUgY29tbWVudCBvbiB0aGUgcmUtdXNpbmcg
b2YgR0lEIHZhbHVlczogYmFzZWQgb24geW91ciByZXBseSwgaXQgbG9va3MgbGlrZSByZS11
c2Ugb2YgR0lEcyBtYXkgYmUgY29tbW9uIGluIHNvbWUgaW1wbGVtZW50YXRpb25zIChlLmcu
IHdoZW4gdXNpbmcgdGhlIHNtYWxsIEdyb3VwIEVwb2NoIG51bWJlciBzcGFjZSBvZiAxNiBi
aXRzIGxpa2UgaW4gQXBwZW5kaXggQywgaW4gdGhlIEdJRCkuDQo+IElmIHRoYXQncyB0aGUg
Y2FzZSB0aGVuIHdlIGNhbid0IHJlYWxseSBhdm9pZCB0aGUgY29tcGxleGl0aWVzIGFzc29j
aWF0ZWQgdG8gR0lEIHJlLXVzZSwgd2hpY2ggd2UgcmF0aGVyIHdvdWxkIHdhbnQgdG8gYXZv
aWQgYnkganVzdCBwaWNraW5nIGEgc3VmZmljaWVudGx5IGxhcmdlIEdJRCBudW1iZXIgc3Bh
Y2UgdGhhdCBuZXZlciBydW5zIG91dC4NCj4gSW4gY2FzZSB3ZSB0aGluayB0aGF0IEdJRCBy
ZS11c2Ugc2hvdWxkIHN0aWxsIGJlIGEgcmFyZSBjYXNlIC8gY29ybmVyIGNhc2UsIHRoZW4g
aXQgd291bGQgYmUgYmV0dGVyIHRvIGhhbmRsZSB0aGUgY29tcGxleGl0eSBvZiB0aGlzIGlu
IGEgc2VwYXJhdGUgc2VjdGlvbiB0aGF0IHdlIGNhbiBwb2ludCB0by4gVGhpcyBzZWN0aW9u
IGNhbiB0aGVuIGluY2x1ZGUgdGhlIGRldGFpbHMgbGlrZSBldmljdGlvbiBvZiBlbGRlciBt
ZW1iZXJzLiAgIFRoZW4gaXQgYXZvaWRzIGFsbCB0aGF0IGNvbXBsZXhpdHkgZm9yIGltcGxl
bWVudGVycyB3aG8gb25seSB1c2UgYSAiR0lEcyBhcmUgbmV2ZXIgcmUtdXNlZCIgdHlwZSBv
ZiBzb2x1dGlvbi4NCg0KPT0+TVQNCg0KVEw7RFI6IENvdWxkIHlvdSBwbGVhc2UgY2hlY2sg
dGhlIGxhdGVzdCBTZWN0aW9uIDMuMi4xLjEgWzFdIGFuZCBzZWUgaWYgDQppdCBhbHJlYWR5
IGFkZHJlc3NlcyB5b3VyIGNvbW1lbnQgaW4gdGhpcyBtYWlsPw0KDQoNClRoZSBvcmlnaW5h
bCBwcm9wb3NhbCBpbiB0aGUgb2xkIG1haWwgYmVsb3cgd2FzIGEgaGlnaC1sZXZlbCBzdGFy
dGluZyANCnBvaW50LiBXaGVuIHJldmlzaW5nIHRoZSBkcmFmdCwgSSB0cmllZCB0byBwdXQg
dG9nZXRoZXIgdGhhdCBkaXJlY3Rpb24gDQphbmQgd2hhdCB3YXMgZnVydGhlciBhZ3JlZWQg
YXQgdGhlIGludGVyaW0gbWVldGluZyBvbiAyMDIyLTAxLTE5Lg0KDQpUaGUgY29uY2x1c2lv
biB3YXMgdG8gbWFrZSB0aGUgcmVjeWNsaW5nIG9mIEdJRHMgb3B0aW9uYWwgdG8gc3VwcG9y
dCBmb3IgDQp0aGUgR3JvdXAgTWFuYWdlci4gV2hpbGUgcmVjeWNsaW5nIEdJRHMgaGFzIGFu
IGltcGFjdCBvbiB0aGUgZ3JvdXAgDQpsaWZldGltZSwgaXQgZG9lcyBub3QgaGF2ZSBhbiBp
bXBhY3Qgb24gdGhlIGltcGxlbWVudGF0aW9uIG9mIGdyb3VwIA0KbWVtYmVycy4gVGhhdCBp
cywgaWYgc3VwcG9ydGVkLCBpdCdzIGFsbCBvbiB0aGUgR3JvdXAgTWFuYWdlci4NCg0KSSBh
bSBub3Qgc3VyZSB3ZSBoYXZlL25lZWQgdG8gdGFrZSBhIHBhcnRpY3VsYXIgc3RhbmNlIGFi
b3V0IEdJRCANCmV4aGF1c3Rpb24gYmVpbmcgYSByYXJlIG9yIGNvbW1vbiBldmVudCwgb3Ig
YWJvdXQgYmVpbmcgcmFyZSBvciBjb21tb24gDQpmb3IgYSBHcm91cCBNYW5hZ2VyIHRvIGJl
IGFibGUgdG8gaGFuZGxlIGl0IHRocm91Z2ggR0lEIHJlY3ljbGluZy4gT24gDQp0aGUgb3Ro
ZXIgaGFuZCwgd2UgYXJlIGRpc2N1c3NpbmcgdGhlIGV4aGF1c3Rpb24gaXNzdWUgYXMgc3Vj
aCBhbmQgDQpwcmVzZW50aW5nIGFuIG9wdGlvbmFsIHNvbHV0aW9uIHRvIGFkb3B0Lg0KDQpN
b3JlIHByYWN0aWNhbGx5LCBpbiB0aGUgbGF0ZXN0IHZlcnNpb24gLTE0IG9mIHRoZSBkcmFm
dCwgdGhlIHRvcGljIG9mIA0KR0lEIHJlY3ljbGluZyBoYXMgYmVlbiBpbiBmYWN0IGNvbmNl
bnRyYXRlZCBpbiB0aGUgc2luZ2xlIGRlZGljYXRlZCANClNlY3Rpb24gMy4yLjEuMSBbMV0u
DQoNClRoZSBmaXJzdCB0d28gcGFyYWdyYXBocyBkaXNjdXNzIHRoZSBwb3NzaWJsZSBleGhh
dXN0aW9uIG9mIEdJRHMgaW4gDQpnZW5lcmFsLCBhcyBhbHNvIGFmZmVjdGVkIGJ5IHRoZSB1
c2VkIGZvcm1hdCBhbmQgc2l6ZS4gVGhlbiwgYXMgDQpkZXNjcmliZWQgcmlnaHQgYWZ0ZXIs
IHVwb24gR0lEIGV4aGF1c3Rpb24gdGhlIEdyb3VwIE1hbmFnZXIgY2FuIHNpbXBseSANCnRl
cm1pbmF0ZSB0aGUgZ3JvdXAgb3IsIG9wdGlvbmFsbHksIHVzZSB0aGUgb3JpZ2luYWxseSBw
cm9wb3NlZCANCnJlY3ljbGluZyBhcHByb2FjaCBub3cgcHJlc2VudGVkIGluIHRoaXMgc2Vj
dGlvbiBvbmx5Lg0KDQpTbywgdGhlIGludGVudCBvZiB0aGlzIG5ldyBTZWN0aW9uIDMuMi4x
LjEgd2FzIGluZGVlZCB0byBwcm92aWRlIGEgd2VsbCANCmNpcmN1bXNjcmliZWQgZGVzY3Jp
cHRpb24gb2YgdGhlIEdJRCBleGhhdXN0aW9uIGFuZCBvZiB0aGVpciByZWN5Y2xpbmcgDQph
cyBhbiBvcHRpb25hbCBmZWF0dXJlIGZvciB0aGUgR3JvdXAgTWFuYWdlci4gSW4gcGFydGlj
dWxhciwgdW5saWtlIGluIA0KcHJldmlvdXMgdmVyc2lvbnMgb2YgdGhlIGRyYWZ0LCBub3cg
dGhlIG1haW4gbWFuYWdlbWVudCBwcm9jZWR1cmVzIG9mIA0KU2VjdGlvbiAzLjIuMCBkbyBu
b3QgbWVudGlvbiB0aGUgaXNzdWUgYW5kIHBvc3NpYmxlIHNvbHV0aW9ucyBhcyANCmludGVy
c3BlcnNlZCB0ZXh0IGFueW1vcmUuDQoNCkJlc3QsDQovTWFyY28NCg0KDQpbMV0gDQpodHRw
czovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtY29yZS1vc2Nv
cmUtZ3JvdXBjb21tLTE0I3NlY3Rpb24tMy4yLjEuMQ0KDQo8PT0NCg0KPg0KPiBCZXN0IHJl
Z2FyZHMNCj4gRXNrbw0KPg0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9t
OiBNYXJjbyBUaWxvY2EgPG1hcmNvLnRpbG9jYUByaS5zZT4NCj4gU2VudDogV2VkbmVzZGF5
LCBKYW51YXJ5IDE5LCAyMDIyIDEyOjA2DQo+IFRvOiBFc2tvIERpamsgPGVza28uZGlqa0Bp
b3Rjb25zdWx0YW5jeS5ubD47IEphaW1lIEppbcOpbmV6IDxqYWltZUBpa2kuZmk+OyBjb3Jl
QGlldGYub3JnDQo+IENjOiBkcmFmdC1pZXRmLWNvcmUtb3Njb3JlLWdyb3VwY29tbS5hdXRo
b3JzQGlldGYub3JnDQo+IFN1YmplY3Q6IFJlOiBbY29yZV0g8J+UlCBXRyBMYXN0IENhbGwg
b2YgZHJhZnQtaWV0Zi1jb3JlLW9zY29yZS1ncm91cGNvbW0NCj4NCj4gSGkgRXNrbywNCj4N
Cj4gVGhhbmsgeW91IHZlcnkgbXVjaCBhZ2FpbiBmb3IgeW91IHJldmlldyENCj4NCj4gUGxl
YXNlLCBmaW5kIGRldGFpbGVkIHJlcGxpZXMgaW5saW5lLg0KPg0KPiBCZXN0LA0KPiAvTWFy
Y28NCj4NCj4gT24gMjAyMi0wMS0xMSAxMDoxNCwgRXNrbyBEaWprIHdyb3RlOg0KPj4gSGkg
ZXZlcnlvbmUsDQo+Pg0KPj4gSSBjb21wbGV0ZWQgbXkgcmV2aWV3IG9mIGRyYWZ0LWlldGYt
Y29yZS1vc2NvcmUtZ3JvdXBjb21tIGZvciB0aGlzIDJuZCBsYXN0IGNhbGwuIEJlbG93IHNv
bWUgcG9pbnRzIGZvciBkaXNjdXNzaW9uIG9yIGNsYXJpZmljYXRpb24gYXJlIGxpc3RlZC4g
SW4gYW5vdGhlciBlbWFpbCB0b2RheSBvciB0b21vcnJvdyBJJ2xsIHNlbmQgdGhlIGVkaXRv
cmlhbC90ZXh0dWFsL25pdCBjb21tZW50cy4NCj4+IE92ZXJhbGwgbXkgaW1wcmVzc2lvbiBv
ZiB0aGUgZHJhZnQgaXMgZ29vZDsgdGhlcmUgaGFzIGJlZW4gbXVjaCBhdHRlbnRpb24gdG8g
ZGV0YWlsIGFuZCBndWlkYW5jZSBmb3IgdGhlIHJlYWRlcnMvaW1wbGVtZW50ZXJzLiBBbHNv
IGl0cyBzY29wZSBpcyBzZXQgdG8gc3VwcG9ydCBhcyBtYW55IHZhcmlhdGlvbnMgYXMgcG9z
c2libGUgKGUuZy4gd2l0aC93aXRob3V0IHBhaXJ3aXNlIG1vZGUsIGdyb3VwIG1vZGUsIHdp
dGgvd2l0aG91dCBPYnNlcnZlLCBCbG9ja3dpc2UsIHN1cHBvcnRpbmcgb2JzZXJ2YXRpb24g
YWNyb3NzIHJla2V5aW5nIGV2ZW50cywgZXRjLikuICBUaGUgZG93bnNpZGUgb2YgdGhhdCBp
cyB0aGF0IHRoZSBzcGVjIGJlY29tZXMgY29tcGxleCBhdCBwYXJ0aWN1bGFyIHBsYWNlcyB0
byBzdXBwb3J0IGFsbCBvZiB0aGF0IGF0IHRoZSBzYW1lIHRpbWUsIHNlY3VyZWx5LiBNYXli
ZSBpbXBsZW1lbnRlcnMgd2lsbCB0aGVyZWZvcmUgY29uc2lkZXIgdG8gaW1wbGVtZW50IGEg
c3Vic2V0IG9ubHkgdG8gYXZvaWQgc29tZSBvZiB0aGUgY29tcGxleGl0eTsgd2hpY2ggc2hv
dWxkIGJlIG9rLg0KPj4NCj4+IEJlc3QgcmVnYXJkcw0KPj4gRXNrbw0KPj4NCj4+IC0tLQ0K
Pj4NCj4+IDENCj4+ICJpbiBvcmRlciB0byBwcm90ZWN0IHRoZSByb3V0aW5nIGluZm9ybWF0
aW9uIG9mIHBhY2tldHMgZnJvbSBvYnNlcnZlcnMiDQo+PiAtPiB0aGlzIGZlZWxzIGNvdW50
ZXItaW50dWl0aXZlOyB3aGljaCByb3V0aW5nIGluZm9ybWF0aW9uIGlzIHByb3RlY3RlZCBi
eSBEVExTPyAgSVAgaGVhZGVycyByZW1haW4gdmlzaWJsZS4gT3IgaXMgdGhlcmUgbW9yZS9v
dGhlciByb3V0aW5nIGluZm9ybWF0aW9uIHByb3RlY3RlZCBieSB3cmFwcGluZyBHcm91cCBP
U0NPUkUgbWVzc2FnZXMgaW4gRFRMUz8NCj4gPT0+TVQNCj4gVGhlIHdvcmRpbmcgInJvdXRp
bmcgaW5mb3JtYXRpb24iIHdhcyBzdWdnZXN0ZWQgYnkgSmltIGluIGFuIG9sZCByZXZpZXcu
DQo+IFRoaXMgcmVmZXJzIHRvIENvQVAgb3B0aW9ucyBzdWNoIGFzIFVyaS1Ib3N0LCBVcmkt
UG9ydCBhbmQgUHJveHktVXJpLA0KPiB3aGljaCB3b3VsZCBub3QgYmUgcHJvdGVjdGVkIGJ5
IChHcm91cCkgT1NDT1JFIGJ1dCB3b3VsZCBiZSBwcm90ZWN0ZWQgYnkNCj4gRFRMUy4NCj4N
Cj4NCj4gUFJPUE9TQUw6IFJlcGhyYXNlIGFzIGZvbGxvd3MuDQo+DQo+IE9MRDoNCj4gIi4u
LiAoYW5kIHZpY2UgdmVyc2EpLCBpbiBvcmRlciB0byBwcm90ZWN0IHRoZSByb3V0aW5nIGlu
Zm9ybWF0aW9uIG9mDQo+IHBhY2tldHMgZnJvbSBvYnNlcnZlcnMuIg0KPg0KPiBORVc6DQo+
ICIuLi4gKGFuZCB2aWNlIHZlcnNhKS4gVGhpcyBwcmV2ZW50cyBvYnNlcnZlcnMgZnJvbSBh
Y2Nlc3NpbmcgYWRkcmVzc2luZw0KPiBpbmZvcm1hdGlvbiBjb252ZXllZCBpbiBDb0FQIG9w
dGlvbnMgdGhhdCB3b3VsZCBub3QgYmUgcHJvdGVjdGVkIGJ5DQo+IEdyb3VwIE9TQ09SRSwg
YnV0IHdvdWxkIGJlIHByb3RlY3RlZCBieSBEVExTLiBUaGVzZSBvcHRpb25zIGluY2x1ZGUN
Cj4gVXJpLUhvc3QsIFVyaS1Qb3J0IGFuZCBQcm94eS1VcmkuDQo+IDw9PQ0KPg0KPj4gImJ1
dCBoYXMgdGhlIGJlbmVmaXQgb2YgcmVzdHJpY3RpbmcgdGhlIHN5bW1ldHJpYyBrZXlpbmcg
bWF0ZXJpYWwgd2hpbGUgZGlzdHJpYnV0aW5nIG9ubHkgdGhlIHB1YmxpYyBrZXkgb2YgZWFj
aCBncm91cCBtZW1iZXIuIg0KPj4gLT4gY2FuIGJlIGZvcm11bGF0ZWQgbW9yZSBjbGVhcmx5
OiBpbiB3aGF0IHdheSBpcyB0aGUgc3ltbWV0cmljIGtleWluZyBtYXRlcmlhbCByZXN0cmlj
dGVkPyBFLmcuIGRvIHdlIG1lYW4gcmVzdHJpY3RpbmcgYW55IGdpdmVuIHN5bW1ldHJpYyBr
ZXkgdG8gb25seSB0aG9zZSAyIENvQVAgZW5kcG9pbnRzIHRoYXQgbmVlZCB0byBjb21tdW5p
Y2F0ZSB1c2luZyBpdC4gSXQgaXMgbm90IHJlc3RyaWN0ZWQgaW4gdGhlIHNlbnNlIG9mIHJl
c3RyaWN0ZWQgc2NvcGUgb3IsIHNheSwgcmVzdHJpY3RlZCAobG93ZXIpIGtleSBsZW5ndGgu
DQo+PiAgICAgQW5kICd3aGlsZSBkaXN0cmlidXRpbmcgb25seSB0aGUgcHVibGljIGtleSBv
ZiBlYWNoIGdyb3VwIG1lbWJlcicgY291bGQgYmUgbW9yZSBzcGVjaWZpYyBhbHNvLiBUbyB3
aGF0IG90aGVyIG5vZGUocykgaXMgdGhlIHB1YmxpYyBrZXkgb2YgYSBncm91cCBtZW1iZXIg
c2VudD8gRS5nLiBvbmx5IHRvIHRob3NlIENvQVAgZW5kcG9pbnRzIHRoYXQgbmVlZCB0byBj
b21tdW5pY2F0ZSB3aXRoIHRoYXQgZ3JvdXAgbWVtYmVyLCBub3QgdG8NCj4+IGFsbCBncm91
cCBtZW1iZXJzIEkgdGhpbmsuDQo+ID09Pk1UDQo+IE9uIHRoZSBmaXJzdCBwb2ludCwgdGhl
IHJlc3RyaWN0aW9uIGlzIG5vdCBhYm91dCB0aGUgc2NvcGUgb2Yga2V5IHVzYWdlDQo+IG9y
IGFib3V0IGtleSBsZW5ndGguIEl0IGlzIGFib3V0IHRoZSBhbW91bnQgb2Ygc3ltbWV0cmlj
IG1hdGVyaWFsIHRvDQo+IGRpc3RyaWJ1dGUuIFJhdGhlciB0aGFuIGRpc3RyaWJ1dGluZyAo
YXQgbW9zdCkgb25lIHN5bW1ldHJpYyBrZXkgcGVyDQo+IG90aGVyIGdyb3VwIG1lbWJlciwg
dGhlIEdyb3VwIE1hbmFnZXIgcHJvdmlkZXMgb25lIHNoYXJlZCBNYXN0ZXIgU2VjcmV0DQo+
IGFuZCAoYXQgbW9zdCkgb25lIHB1YmxpYyBrZXkgcGVyIGdyb3VwIG1lbWJlci4NCj4NCj4g
T24gdGhlIHNlY29uZCBwb2ludCwgdGhlIGRpc3RyaWJ1dGlvbiBvZiBwdWJsaWMga2V5cyB0
byBhIGNlcnRhaW4gbm9kZSBYDQo+IGNhbiBiYXNpY2FsbHkgaGFwcGVuIGF0IHR3byBwb2lu
dHMgaW4gdGltZTogd2hlbiBYIChyZS0pam9pbnMgdGhlIGdyb3VwDQo+IG9yIHdoZW4gWCBh
c2tzIHRoZSBHcm91cCBNYW5hZ2VyIGZvciBvdGhlciBtZW1iZXJzJyBwdWJsaWMga2V5cyB3
aGlsZQ0KPiBhbHJlYWR5IGEgZ3JvdXAgbWVtYmVyLiBJbiBlaXRoZXIgY2FzZSwgWCBjYW4s
IGUuZy4sIGFzayBmb3IgdGhlIHB1YmxpYw0KPiBrZXlzIG9mIGFsbCBncm91cCBtZW1iZXJz
LCBvciBzcGVjaWZ5IHNvbWUgZmlsdGVyIGNyaXRlcmlhIHRvIG9idGFpbiB0aGUNCj4gcHVi
bGljIGtleXMgb2Ygb25seSBzb21lIG1lbWJlcnMuDQo+DQo+IFRoZXNlIGRldGFpbHMgcmVs
YXRlZCB0byBrZXkgZGlzdHJpYnV0aW9uIGFyZSBpbnRlbnRpb25hbGx5IG91dCBvZiBzY29w
ZQ0KPiBmb3IgR3JvdXAgT1NDT1JFLiBJbiB0aGUgYXBwcm9hY2ggZGVmaW5lZCBpbg0KPiBk
cmFmdC1pZXRmLWFjZS1rZXktZ3JvdXBjb21tLW9zY29yZcKgIGFsbCBzdWNoIGRldGFpbHMg
YXJlIGFsc28gZGVmaW5lZC4NCj4NCj4NCj4gUFJPUE9TQUw6IEluIG9yZGVyIHRvIGFkZHJl
c3MgdGhpcyBjb21tZW50IHdoaWxlIG5vdCBnZXR0aW5nIGludG8ga2V5DQo+IGRpc3RyaWJ1
dGlvbiBkZXRhaWxzLCB3ZSBjYW4gcmVwaHJhc2UgYXMgZm9sbG93cy4NCj4NCj4NCj4gT0xE
Og0KPiAiLi4uIGl0IGlzIGRlc2lyYWJsZSB0byByZXN0cmljdCB0aGUgcHJvdmlzaW9uZWQg
a2V5aW5nIG1hdGVyaWFsLiINCj4NCj4gTkVXOg0KPiAiLi4uIGl0IGlzIGRlc2lyYWJsZSB0
byByZXN0cmljdCB0aGUgYW1vdW50IG9mIHNlY3JldCBrZXlpbmcgbWF0ZXJpYWwNCj4gcHJv
dmlkZWQgdG8gZWFjaCBub2RlLiINCj4NCj4NCj4gT0xEOg0KPiAiLi4uIChzZWUgU2VjdGlv
biAzKSwgYnV0IGhhcyB0aGUgYmVuZWZpdCBvZiByZXN0cmljdGluZyB0aGUgc3ltbWV0cmlj
DQo+IGtleWluZyBtYXRlcmlhbCB3aGlsZSBkaXN0cmlidXRpbmcgb25seSB0aGUgcHVibGlj
IGtleSBvZiBlYWNoIGdyb3VwDQo+IG1lbWJlci4iDQo+DQo+IE5FVw0KPiAiLi4uIChzZWUg
U2VjdGlvbiAzKS4gSG93ZXZlciwgaXQgaGFzIHRoZSBiZW5lZml0IG9mIGRpc3RyaWJ1dGlu
ZyBhDQo+IHNpbmdsZSBzaGFyZWQgc2VjcmV0LCB3aGlsZSBkaXN0cmlidXRpbmcgb25seSB0
aGUgcHVibGljIGtleXMgb2YgZ3JvdXANCj4gbWVtYmVycyBvciBhIHN1YnNldCBvZiB0aG9z
ZS4iDQo+DQo+IDw9PQ0KPg0KPj4gMS4xIFRlcm1pbm9sb2d5DQo+PiBQZXJoYXBzIHRoZSBk
aWZmZXJlbmNlIGJldHdlZW4gIm5vZGUiIGFuZCAiZW5kcG9pbnQiIGNhbiBiZSByZWl0ZXJh
dGVkIGhlcmUsIGV2ZW4gdGhvdWdoIGl0IHdhcyBkZWZpbmVkIGJ5IFJGQyA3MjUyLiAgSW4g
dGhpcyBkcmFmdCB0aGUgJ3Rlcm0nIG5vZGUgaXMgb2Z0ZW4gdXNlZCBlLmcuIGluIFNlY3Rp
b24gMy4yIHRvIGluZGljYXRlIGEgbm9kZSB3aXRoIGEgc2luZ2xlIGVuZHBvaW50IHdoZXJl
IHRoYXQgZW5kcG9pbnQgam9pbnMgYSBncm91cC4gIFNvIHdoZW4gd2UgdGFsayBhYm91dCBh
ICdub2RlIGFzIGEgZ3JvdXAgbWVtYmVyJyB0aGF0IGl0IG1lYW5zIGEgc2luZ2xlIGVuZHBv
aW50IGhvc3RlZCBvbiB0aGF0IG5vZGUuIExhdGVyIGluIFNlY3Rpb24gMy4yLiBpdCBlLmcu
IHN0YXRlcyBlbmRwb2ludHMgYXJlIHJlbW92ZWQgZnJvbSB0aGUgZ3JvdXAgd2hpY2ggdGhl
biBleGNsdWRlcyBub2RlcyBmcm9tIGNvbW11bmljYXRpb24gd2l0aCB0aGUgZ3JvdXAuIElu
IGNhc2UgYSBub2RlIGNhbiBob3N0IG11bHRpcGxlIGVuZHBvaW50cywgd2UgbWF5IG5lZWQg
dG8gc2F5IHRoZW4gdGhhdCBhbGwgZW5kcG9pbnRzIG9mIGEgcGFydGljdWxhciBub2RlIG5l
ZWQgdG8gYmUgcmVtb3ZlZCBmcm9tIHRoZSBncm91cC4gKEFzc3VtaW5nIGl0IGNhbiBoYXZl
IG11bHRpcGxlIGxpa2UgZGVmaW5lZCBieSBSRkMgNzI1Mi4pIFNvIHRoZW4gaXQgYmVjb21l
cyBpbXBvcnRhbnQgZm9yIHNlY3VyaXR5IHJlYXNvbnMgdG8gZ2V0IHRoZSBkaXN0aW5jdGlv
biBjbGVhci4NCj4gPT0+TVQNCj4gR29vZCBwb2ludHMuIEkgc2VlIHRoaXMgY29tbWVudCBh
cyB0d29mb2xkLg0KPg0KPiBPbiB0aGUgZmlyc3QgcGFydCwgbG9va2luZyBhdCBSRkMgODYx
MywgT1NDT1JFIGFsd2F5cyB1c2VzICJlbmRwb2ludCINCj4gZm9yIHdoYXQgY29uY2VybnMg
dGhlIGFjdHVhbCBzZWN1cml0eSBwcm90b2NvbC4gSW5zdGVhZCwgaXQgdXNlcyAibm9kZSIN
Cj4gb25seSBmb3IgImNvbnN0cmFpbmVkIG5vZGUiLCAiaW50ZXJtZWRpYXJ5IG5vZGUiIG9y
ICJuZXh0IG5vZGUiLg0KPg0KPiBUaGUgb2NjdXJyZW5jZXMgb2YgIm5vZGUiIHRoYXQgeW91
IGZvdW5kIGNhbiBiZSBiZXR0ZXIgcmVwbGFjZWQgYnkNCj4gIm1lbWJlciIgb3IgImVuZHBv
aW50IiAoZGVwZW5kaW5nIG9uIHRoZSBjb250ZXh0KS4gTm90ZSB0aGF0IGEgZ3JvdXANCj4g
bWVtYmVyIGlzIGFjdHVhbGx5IGFuICJlbmRwb2ludCIuIEluIGZhY3QsIFNlbmRlciBJRHMg
YXNzaWduZWQgdG8gZ3JvdXANCj4gbWVtYmVycyBhcmUgZmlyc3Qgb2YgYWxsIGRlZmluZWQg
YnkgT1NDT1JFIGFzIGFzc29jaWF0ZWQgdG8gZW5kcG9pbnRzLg0KPg0KPiBSZWxhdGVkIGZp
eGVzIGFyZToNCj4NCj4gU2VjdGlvbiAxOiBzL251bWJlciBvZiBub2Rlcy9udW1iZXIgb2Yg
ZW5kcG9pbnRzDQo+IChub3RlICJlbmRwb2ludHMiIHJhdGhlciB0aGFuICJtZW1iZXJzIiBo
ZXJlLCB0aHVzIHRha2luZyBpbnRvIGFjY291bnQNCj4gYm90aCBjdXJyZW50IGdyb3VwIG1l
bWJlcnMgYW5kIGNhbmRpZGF0ZSBncm91cCBtZW1iZXJzIHRoYXQgc3RpbGwgaGF2ZQ0KPiB0
byBqb2luKQ0KPg0KPiBTZWN0aW9uIDMuMTogcy9XaGVuIGEgbm9kZSAocmUtKWpvaW5zIGEg
Z3JvdXAvV2hlbiBhbiBlbmRwb2ludA0KPiAocmUtKWpvaW5zIGEgZ3JvdXANCj4NCj4gU2Vj
dGlvbiAzLjE6IHMvdGhlIEJpcnRoIEdpZCBvZiB0aGF0IG5vZGUvdGhlIEJpcnRoIEdpZCBv
ZiB0aGF0IGVuZHBvaW50DQo+DQo+IFNlY3Rpb24gMy4xOiBzL0luIGNhc2UgdGhlIG5vZGUg
aGFzIGluIGZhY3QvSW4gY2FzZSB0aGUgZW5kcG9pbnQgaGFzIGluIGZhY3QNCj4NCj4gU2Vj
dGlvbiAzLjE6IHMvVXBvbiBub2Rlcycgam9pbmluZy9VcG9uIGVuZHBvaW50cycgam9pbmlu
Zw0KPg0KPiBTZWN0aW9uIDMuMjogcy90aGlzIGV4Y2x1ZGVzIHN1Y2ggbm9kZXMvdGhpcyBl
eGNsdWRlcyBzdWNoIGVuZHBvaW50cw0KPiAodGhpcyB3b3VsZCBhbHNvIGJlIGNvbnNpc3Rl
bnQgd2l0aCB0aGUgcHJldmlvdXMgc2VudGVuY2Ugb2YgdGhlIHNlY3Rpb24pDQo+DQo+IFNl
Y3Rpb24gMTEuMTogcy9pbiBjYXNlIG9mIG5vZGVzJyBsZWF2aW5nL2luIGNhc2Ugb2YgbWVt
YmVycycgbGVhdmluZw0KPg0KPiBJIGNvdWxkbid0IGZpbmQgb3RoZXIgYW1iaWd1b3VzIHVz
ZXMgb2YgIm5vZGUiIGFuZCAiZW5kcG9pbnQiLg0KPg0KPg0KPiBPbiB0aGUgc2Vjb25kIHBh
cnQsIHllcywgYSBub2RlIG1pZ2h0IGFkbWl0IG11bHRpcGxlIGVuZHBvaW50cywgc2F5IEUx
DQo+IGFuZCBFMiwgd2hpY2ggdGh1cyB3b3VsZCBoYXZlIHNlcGFyYXRlbHkgam9pbmVkIHRo
ZSBncm91cCBhcyBkaXN0aW5jdA0KPiBncm91cCBtZW1iZXJzLiBUaGUgZXZpY3Rpb24gb2Yg
RTEgYXMgY29tcHJvbWlzZWQgZG9lcyBub3QgbmVjZXNzYXJpbHkNCj4gbWVhbiB0aGF0IEUy
IGlzIGFsc28gY29tcHJvbWlzZWQgYW5kIHRvIGJlIGV2aWN0ZWQuDQo+DQo+DQo+IFBST1BP
U0FMOiBQZXJmb3JtIHRoZSBmaXhlcyBhbmQgcmVwaHJhc2luZyBhYm92ZS4gSW4gU2VjdGlv
biAzLjIsIHdlIGNhbg0KPiBjbGFyaWZ5IHRoYXQgaWYgYSAqbm9kZSogaXMgZGV0ZWN0ZWQg
dG8gYmUgY29tcHJvbWlzZWQsIHRoZSBHcm91cA0KPiBNYW5hZ2VyIG11c3QgZXZpY3QgYWxs
IHRoZSBncm91cCBtZW1iZXJzIGNvcnJlc3BvbmRpbmcgdG8gZW5kcG9pbnRzDQo+ICJsaXZp
bmciIGluIHRoYXQgbm9kZS4NCj4gPD09DQo+DQo+PiAyLjMgLyAyLjQuMQ0KPj4gU2VjdGlv
biAyLjMgZGlzY3Vzc2VzIGZvcm1hdCByZXF1aXJlbWVudHMgZm9yIHB1YmxpYyBrZXlzLiBJ
dCBhbHNvIHNheXMgIkZvciBleGFtcGxlLCBhbiBYLjUwOSBjZXJ0aWZpY2F0ZSBpcyBwcm92
aWRlZCBhcyBpdHMgZGlyZWN0IGJpbmFyeSBzZXJpYWxpemF0aW9uLiIgd2hpY2ggd2FzIHF1
aXRlIGNvbmZ1c2luZyB0byBtZSBhcyBpdCBzdWdnZXN0cyB0aGUgZW50aXJlIGNlcnRpZmlj
YXRlIGlzIGRlbm90ZWQgYXMgYSAicHViaWMga2V5IiBhbmQgdXNlZCBhcyBzdWNoIGluIDIu
NC4xIHByb2NlZHVyZXMuDQo+PiBEb2VzIHRoaXMgbWVhbiBpbiBTZWN0aW9uIDIuNC4xIHRo
ZSBlbnRpcmUgWC41MDkgY2VydGlmaWNhdGUgaXMgdXNlZCB0byBkZXJpdmUgdGhlIHBhaXJ3
aXNlIGtleT8gVGhhdCBzZWVtcyBsZXNzIGVmZmljaWVudCBhcyBhIG5vZGUgdGhlbiBoYXMg
dG8gc3RvcmUgdGhlIGVudGlyZSBYLjUwOSBjZXJ0aWZpY2F0ZSBvZiBlYWNoIHBlZXIsIGlu
c3RlYWQgb2YganVzdCB0aGUgcHVibGljLWtleSBwYXJ0IG9mIGl0ICh0aGUgU3ViamVjdFB1
YmxpY0tleUluZm8gc3RydWN0dXJlKS4gVGhhdCB3aWxsIHRha2UgbW9yZSBtZW1vcnkgdGhh
biBwZXJoYXBzIG5lZWRlZC4NCj4+IE1heWJlIHRoZXJlJ3Mgc29tZSByZWFzb24gdGhlIGZ1
bGwgY2VydGlmaWNhdGUgaXMgdXNlZCBhbmQgbm90IGp1c3QgdGhlIFN1YmplY3RQdWJsaWNL
ZXlJbmZvIHBhcnQgb2YgaXQ/IEl0IGNvdWxkIGF2b2lkIGZ1cnRoZXIgcGFyc2luZyBvZiB0
aGUgY2VydGlmaWNhdGUgc3RydWN0dXJlLiAgQWxzbyB3aGVuIG9ubHkgYSBwYXJ0IGlzIHVz
ZWQgaXQgbmVlZHMgdG8gYmUgcmVhbGx5IGNsZWFybHkgZGVmaW5lZCB0byBhdm9pZCB1bmNs
YXJpdGllcyBhYm91dCB3aGF0IHBhcnQgdG8gcmVhbGx5IHVzZSAoYXMgd2UgaGFkIGluIHRo
ZSBBTklNQSBXRykuDQo+PiBBbmQgYW5vdGhlciB0aG91Z2h0OiBiZXNpZGVzIG1lbW9yeSBp
bXBhY3QsIHdvdWxkIHVzaW5nIHRoZSBmdWxsIFguNTA5IGJlIG1vcmUgb3ZlcmhlYWQgb24g
YSBjb25zdHJhaW5lZCBkZXZpY2UgaW5zdGVhZCBvZiBqdXN0IHRoZSBTdWJqZWN0UHVibGlj
S2V5SW5mbyBwYXJ0IG9mIGl0PyBJLmUuIHRoZSBpbnB1dCB0byB0aGUgSEtERiguKSBpcyBz
dWJzdGFudGlhbGx5IGxvbmdlciB3aGVuIHVzaW5nIHRoZSBmdWxsIGNlcnQuDQo+ID09Pk1U
DQo+IFllcywgeW91IHVuZGVyc3Rvb2QgY29ycmVjdGx5LCB0aGUgd2hvbGUgWC41MDkgY2Vy
dGlmaWNhdGUgYW5kIGl0cw0KPiBzZXJpYWxpemF0aW9uIHdvdWxkIGJlIHN0b3JlZCBhbmQg
dXNlZCBmb3IgdGhlIHByb2Nlc3MgeW91IG1lbnRpb24uDQo+DQo+IFdoYXQgZm9sbG93cyBy
ZWxhdGVzIHRvIHRoZSB0aHJlZSBkaWZmZXJlbnQgcGFydHMgb2YgdGhlIGNvbW1lbnRzLg0K
Pg0KPiAxKSBZZXMsIHRoZSBjdXJyZW50IHRleHQgZGVub3RlcyB0aGUgZW50aXJlIGNlcnRp
ZmljYXRlIGFzIHRoZSAicHVibGljIGtleSIuDQo+DQo+ICAgwqDCoCBUbyBhdm9pZCBhbnkg
Y29uZnVzaW9uLCB3ZSBjYW4gZm9sbG93IG1vcmUgY2xvc2VseSB0aGUgc2FtZQ0KPiB0ZXJt
aW5vbG9neSB1c2VkIGluIGRyYWZ0LWlldGYtbGFrZS1lZGhvYyAsIGFuZCB1c2UgImF1dGhl
bnRpY2F0aW9uDQo+IGNyZWRlbnRpYWwiIHRvIGRlbm90ZSBYLjUwOSBvciBDNTA5IGNlcnRp
ZmljYXRlcywgQ1dULCBhbmQgQ0NTLg0KPg0KPiAgIMKgwqAgVGhlbiBhbiAiYXV0aGVudGlj
YXRpb24gY3JlZGVudGlhbCIgaW5jbHVkZXMgYSAicHVibGljIGtleSIgYXMNCj4gYXV0aGVu
dGljYXRpb24ga2V5LCB3aXRoIGRldGFpbHMgZGVwZW5kaW5nIG9uIHRoZSB0eXBlIG9mDQo+
ICJhdXRoZW50aWNhdGlvbiBjcmVkZW50aWFsIi4NCj4NCj4gICDCoMKgIFRoYXQgc2FpZCwg
dGhlIHdob2xlICJhdXRoZW50aWNhdGlvbiBjcmVkZW50aWFscyIgYXJlIGN1cnJlbnRseQ0K
PiB1c2VkOiBpKSB0byBkZXJpdmUgcGFpcndpc2Uga2V5cywgc2VlIFNlY3Rpb24gMi40LjEs
IG9uIHdoaWNoIHByb2Nlc3MgYQ0KPiBzZWN1cml0eSBwcm9vZiBoYXMgYmVlbiBhY2NvcmRp
bmdseSBwcm9kdWNlZCBpbiBbVGhvcm1hcmtlcl07IGFuZCBpaSkgdG8NCj4gZmlsbCB0aGUg
ZXh0ZXJuYWxfYWFkIHN0cnVjdHVyZSwgc2VlIFNlY3Rpb24gNC4zLg0KPg0KPiAgIMKgwqAg
SW5zdGVhZCwgdGhlICJwdWJsaWMga2V5IiBhbG9uZSBpcyB1c2VkOiBpKSB0byBjb21wdXRl
IGENCj4gRGlmZmllLUhlbGxtYW4gc2hhcmVkIHNlY3JldCB0byBkZXJpdmUgcGFpcndpc2Ug
a2V5cywgc2VlIFNlY3Rpb24NCj4gMi40LjEuOyBhbmQgaWkpIHRvIHZlcmlmeSB0aGUgc2ln
bmF0dXJlIG9mIGluY29taW5nIG1lc3NhZ2VzIHByb3RlY3RlZA0KPiBpbiBncm91cCBtb2Rl
LCBzZWUgU2VjdGlvbnMgOC4yIGFuZCA4LjQuDQo+DQo+DQo+ICAgwqDCoCBQUk9QT1NBTDog
VGhlIGRvY3VtZW50IGNhbiBiZSByZXZpc2VkIHRvIGNvbnNpc3RlbnRseSB1c2UNCj4gImF1
dGhlbnRpY2F0aW9uIGNyZWRlbnRpYWwiIG9yICJwdWJsaWMga2V5IiBhcyBhYm92ZS4NCj4N
Cj4NCj4gMikgT24gY29uc2lkZXJpbmcgdGhlIHdob2xlICJhdXRoZW50aWNhdGlvbiBjcmVk
ZW50aWFscyIgdmVyYmF0aW0gYXMgcGVyDQo+IHRoZSBwcmV2aW91cyBwb2ludCwgdGhpcyBo
YXMgYmVlbiBhbGlnbmVkIHRvIGRyYWZ0LWlldGYtbGFrZS1lZGhvYy4NCj4NCj4gICDCoMKg
IFdoaWxlIGNvbnNpZGVyaW5nIHRoYXQgImF1dGhlbnRpY2F0aW9uIGNyZWRlbnRpYWxzIiBh
cmUgaW52b2x2ZWQgaW4NCj4ga2V5IGRlcml2YXRpb24gKGkuZS4sIG9mIHBhaXJ3aXNlIGtl
eXMpIGFuZCBpbiBzdHJ1Y3R1cmVzIHByb3ZpZGluZw0KPiBzZWN1cmUgbWVzc2FnZSBiaW5k
aW5nIChpLmUuLCB0aGUgZXh0ZXJuYWxfYWFkKSwgdGhlcmUgYXJlIHJlYXNvbnMgdG8NCj4g
Y29uc2lkZXIga2VlcGluZyB0aGVtIHZlcmJhdGltLg0KPg0KPiAgIMKgwqAgKiBJdCBlbnN1
cmVzIHRvIGNhcnJ5IG9uIGFsc28gbWV0YWRhdGEgYW5kIHBhcmFtZXRlcnMgcmVsYXRlZCB0
byB0aGUNCj4gcHVibGljIGtleS4gVGhlc2UgaW5jbHVkZSBub3Qgb25seSB0aGUgcHVibGlj
IGtleSBhbGdvcml0aG0gKHRoYXQgd291bGQNCj4gaW5kZWVkIGJlLCBlLmcuLCBpbiB0aGUg
U3ViamVjdFB1YmxpY0tleUluZm8gc3RydWN0dXJlIG9mIGFuIFguNTA5DQo+IGNlcnRpZmlj
YXRlKSwgYnV0IGFsc28gb3RoZXIgcmVsZXZhbnQgcGllY2VzIG9mIGluZm9ybWF0aW9uIChp
ZiBwcmVzZW50KQ0KPiBzdWNoIGFzIGtleSB1c2FnZSwgZXhwaXJhdGlvbiB0aW1lLCBpc3N1
ZXIgYW5kIHN1YmplY3QuDQo+DQo+ICAgwqDCoCAqIEl0IGVuc3VyZXMgdGhhdCBhbGwgZW5k
cG9pbnRzIHVzaW5nIGFub3RoZXIgZW5kcG9pbnQncw0KPiAiYXV0aGVudGljYXRpb24gY3Jl
ZGVudGlhbCIgaGFuZGxlIGV4YWN0bHkgdGhlIHNhbWUgYnl0ZXMsIGFzIG9idGFpbmVkDQo+
IGJ5IHRoZSBjcmVkZW50aWFsIHByb3ZpZGVyIChlLmcuLCB0aGUgT1NDT1JFIEdyb3VwIE1h
bmFnZXIpIGFuZCBhcw0KPiBjcmFmdGVkIGJ5IHRoZSBvcmlnaW5hbCBjcmVkZW50aWFsIGlz
c3Vlci4NCj4NCj4gICDCoMKgIFN1cmUsIHRoaXMgc2ltcGxpY2l0eSBpbnRyb2R1Y2VzIHRo
ZSBjb3N0IG9mIHN0b3JpbmcgdGhlIHdob2xlDQo+ICJhdXRoZW50aWNhdGlvbiBjcmVkZW50
aWFsIiBhcyBhIGxhcmdlciBvYmplY3QsIGFsc28gYWZ0ZXIgaGF2aW5nDQo+IHN1Y2Nlc3Nm
dWxseSB2YWxpZGF0ZWQgaXQuIEhvd2V2ZXIsIG5vdCBkb2luZyB0aGF0IGFuZCByYXRoZXIg
cHJlc2VydmluZw0KPiBvbmx5IGEgc3Vic2V0IG9mIGl0cyBjb250ZW50LCB3b3VsZCByZXN1
bHQgaW4gZGlmZmVyZW50IGNvbXBsaWNhdGlvbnMuDQo+DQo+ICAgwqDCoCAqIEZvciBlYWNo
IHR5cGUgb2YgY3VycmVudCBhbmQgZnV0dXJlICJhdXRoZW50aWNhdGlvbiBjcmVkZW50aWFs
IiwNCj4gaXQgYmVjb21lcyBuZWNlc3NhcnkgdG8gZGVmaW5lIHRoZSBleGFjdCBzdWJzZXQg
b2YgaW5mb3JtYXRpb24gdG8gYmUNCj4gZXh0cmFjdGVkIGFuZCBwcmVzZXJ2ZWQuIFRoaXMg
c3Vic2V0IG11c3QgYmUga2VwdCB1cCB0byBkYXRlIGlmIGEgdHlwZQ0KPiBvZiAiYXV0aGVu
dGljYXRpb24gY3JlZGVudGlhbCIgaXMgZXh0ZW5kZWQgaW4gdGhlIGZ1dHVyZS4NCj4NCj4g
ICDCoMKgICogRm9yIGVhY2ggdHlwZSBvZiBjdXJyZW50IGFuZCBmdXR1cmUgImF1dGhlbnRp
Y2F0aW9uIGNyZWRlbnRpYWwiLA0KPiBpdCBiZWNvbWVzIG5lY2Vzc2FyeSB0byBkZWZpbmUg
dGhlIGV4YWN0IGNhbm9uaWNhbCB3YXkgdG8gZW5jb2RlIHN1Y2ggYQ0KPiBzdWJzZXQsIGlu
IG9yZGVyIHRvIGVuc3VyZSB0aGF0IGFsbCBlbmRwb2ludHMgY29udmVyZ2UgdG8gdGhlIHNh
bWUgcmVzdWx0Lg0KPg0KPiAgIMKgwqAgVGhpcyBpcyBhIHRyYWRlLW9mZiBiZXR3ZWVuIHN0
b3JhZ2Ugb24gb25lIGhhbmQsIGFuZA0KPiBjb21wbGV4aXR5L2ZlYXNpYmlsaXR5L2ZsZXhp
YmlsaXR5IGluIGNvcnJlY3RseSBoYW5kbGluZyAiYXV0aGVudGljYXRpb24NCj4gY3JlZGVu
dGlhbHMiICh3aGljaCwgaW4gdGhlIGZ1dHVyZSwgY2FuIGJlIGV4dGVuZGVkIG9yIG5ld2x5
IGludHJvZHVjZWQpLg0KPg0KPiAgIMKgwqAgUGVyc29uYWxseSwgSSB0ZW5kIHRvIGZhdm9y
IHRoZSBsYXR0ZXIsIHdoaWxlIHNlZWluZyB0aGUgZm9ybWVyIGFzDQo+IGFuIGluY2VudGl2
ZSB0byBwcmVmZXIgbW9yZSBjb21wYWN0IHR5cGVzIG9mICJhdXRoZW50aWNhdGlvbg0KPiBj
cmVkZW50aWFsIiwgZXNwZWNpYWxseSBpbiBsYXJnZSBncm91cHMuDQo+DQo+DQo+ICAgwqDC
oCBQUk9QT1NBTDogQWRkIHRyYWRlLW9mZiBjb25zaWRlcmF0aW9ucyBhcyBhYm92ZT8NCj4N
Cj4NCj4gMykgQmVzaWRlcyB0aGUgbWVtb3J5IGltcGFjdCBhbmQgcmF0aGVyIGNvbnNpZGVy
aW5nIHRoZSBwcm9jZXNzaW5nIHNpZGUNCj4gd2hlbiBkZXJpdmluZyBwYWlyd2lzZSBrZXlz
IGluIFNlY3Rpb24gMi40LjEsIHByb3ZpZGluZyBhIGxvbmdlciBpbnB1dA0KPiB0byBIREtG
KC4pIHNob3VsZCBzdGlsbCBiZSBmaW5lLiBJbiBmYWN0LCB0aGUgd2hvbGUgImF1dGhlbnRp
Y2F0aW9uDQo+IGNyZWRlbnRpYWxzIiBhcmUgdXNlZCB0byBidWlsZCB0aGUgSUtNIHBhcmFt
ZXRlciBvZiBIS0RGLCB3aGljaCBpbiB0dXJuDQo+IGlzIHVzZWQgaW4gdGhlIEV4dHJhY3Qg
c3RlcCBjb25zaXN0aW5nIG9mIGEgc2luZ2xlIEhNQUMtSGFzaCgpDQo+IGludm9jYXRpb24s
IHNlZSBSRkMgNTg2OS4NCj4NCj4NCj4gICDCoMKgIFBST1BPU0FMOiBpZiB0aGUgYWJvdmUg
aXMgY2xlYXIgYW5kIGFncmVlZCwgbm8gYWN0aW9uLg0KPiA8PT0NCj4NCj4+IDIuNC4xDQo+
PiB0aGUgYWRqZWN0aXZlICIoc2lnbmF0dXJlKSIgaXMgdXNlZCBhIGNvdXBsZSBvZiB0aW1l
cy4gSSBkb24ndCBzZWUgYSAic2lnbmF0dXJlIHB1YmxpYyBrZXkiIGJlaW5nIGRlZmluZWQg
ZXhwbGljaXRseS4gQWxzbyBGaWcgMSBkb2VzIG5vdCB1c2UgIihzaWduYXR1cmUpIi4gRG8g
SSBtaXNzIHNvbWV0aGluZz8NCj4gPT0+TVQNCj4gTm8sIHRoYXQgd2FzIGp1c3QgYSB0b28g
Y29tcHJlc3NlZCB3YXkgdG8gaW5kaWNhdGUgdGhhdCBhIHB1YmxpYyBrZXkgY2FuDQo+IGJl
IGVpdGhlciBhIHNpZ25hdHVyZSBwdWJsaWMga2V5IG9yIGEgRGlmZmllLUhlbGxtYW4gcHVi
bGljIGtleS4NCj4NCj4gVGhlIGZvcm1lciBjYXNlIGlzIHRoZSB0eXBpY2FsIG9uZSwgd2hl
cmUgdGhlIGdyb3VwIHVzZXMgdGhlIGdyb3VwIG1vZGUsDQo+IHBvc3NpYmx5IHRvZ2V0aGVy
IHdpdGggdGhlIHBhaXJ3aXNlIG1vZGUuIFRoZW4sIHB1YmxpYyBrZXlzIGFyZQ0KPiBzaWdu
YXR1cmUga2V5cy4NCj4NCj4gVGhlIGxhdHRlciBjYXNlIGlzIHJlbGV2YW50IHRvIGEgZ3Jv
dXAgdXNpbmcgb25seSB0aGUgcGFpcndpc2UgbW9kZSwNCj4gd2hlcmUgZW5kcG9pbnRzIHdp
bGwgaGF2ZSBEaWZmaWUtSGVsbG1hbiBrZXlzIGFzIHB1YmxpYyBrZXlzLg0KPg0KPg0KPiBQ
Uk9QT1NBTDogQ29uc2lkZXJpbmcgdGhlIHBvc3NpYmxlIGNvbmZ1c2lvbiBhbmQgdGhlIGRp
c2N1c3Npb24gb24NCj4gdGVybWlub2xvZ3kgaW4gdGhlIHByZXZpb3VzIHBvaW50LCAiKHNp
Z25hdHVyZSkgcHVibGljIGtleSIgY2FuIGJlDQo+IGNoYW5nZWQgdG8gImF1dGhlbnRpY2F0
aW9uIGNyZWRlbnRpYWwiLCB3aGljaCBpcyBpbiBmYWN0IHdoYXQgaXMgdXNlZA0KPiB3aGVu
IGJ1aWxkaW5nIElLTS1TZW5kZXIgYW5kIElLTS1SZWNpcGllbnQgdGhyb3VnaCBieXRlIGNv
bmNhdGVuYXRpb24uDQo+IDw9PQ0KPg0KPj4gMy4yDQo+PiBTZWUgU2VjdGlvbiAxLjEgY29t
bWVudC4NCj4gPT0+TVQNCj4gU2VlIHJlcGx5IHRvIFNlY3Rpb24gMS4xIGNvbW1lbnQgYWJv
dmUuDQo+DQo+DQo+IFBST1BPU0FMOiBubyBmdXJ0aGVyIGFjdGlvbi4NCj4gPD09DQo+DQo+
PiAiVGhlIEdyb3VwIE1hbmFnZXIgTVVTVCBjaGVjayBpZiB0aGUgbmV3IEdpZCB0byBiZSBk
aXN0cmlidXRlZCBjb2luY2lkZXMgd2l0aCB0aGUgQmlydGggR2lkIG9mIGFueSBvZiB0aGUg
Y3VycmVudCBncm91cCBtZW1iZXJzIg0KPj4gLT4gVGhpcyBpcyB1bmNsZWFyIHRvIG1lLiBJ
biB0aGUgZmlyc3QgcGFyYWdyYXBoIG9mIDMuMiwgaXQgaXMgc3RhdGVkIHRoYXQgR00gY3Jl
YXRlcyBhIG5ldyBHaWQuIFNvIGhvdyBjb3VsZCBpdCBjb2luY2lkZSBpZiBpdCBpcyByZWFs
bHkgbmV3PyAoQWxzbyBub3QgY2xlYXIgd2hhdCAnY29pbmNpZGUnIG1lYW5zIGhlcmUuIEVx
dWFsPyBJZiBzbywgd2Ugc2hvdWxkIHdyaXRlICdlcXVhbHMnKQ0KPj4gLT4gV2hhdCBpcyB0
aGUgcHVycG9zZSBvZiBldmljdGluZyB0aGUgZWxkZXIgbWVtYmVycz8gIFRoaXMgaXMgcHV6
emxpbmcsIGFzIHRoZSBhaW0gaXMgdG8ga2VlcCB0aGUgZWxkZXIgbWVtYmVycyBpbiB0aGUg
Z3JvdXAgc3VyZWx5Lg0KPiA9PT5NVA0KPiBGaXJzdCBvZmYsIHllcywgaGVyZSAiY29pbmNp
ZGUiIG1lYW5zICJlcXVhbCIuIFdlIHdpbGwgcmVwbGFjZSBpdCAoYWxzbw0KPiBpbiBvdGhl
ciBwYXJ0cyBvZiB0aGUgZG9jdW1lbnQgd2hlcmUgaXQgaXMgc2ltaWxhcmx5IHVzZWQpLg0K
Pg0KPiBUaGUgZmlyc3QgcGFyYWdyYXBoIG9mIFNlY3Rpb24gMy4yIG1lYW5zIHRoYXQ6IHRo
ZSBncm91cCBoYXMgR2lkIEcxDQo+IGJlZm9yZSByZWtleWluZzsgYW5kLCB3aGVuIHJla2V5
aW5nIHRoZSBncm91cCwgdGhlIEdyb3VwIE1hbmFnZXINCj4gZ2VuZXJhdGVzIGFuZCBhc3Np
Z25zIGEgbmV3IEdpZCBHMiBkaWZmZXJlbnQgZnJvbSBHMS4gVGhhdCBpcywgdHdvDQo+IGNv
bnNlY3V0aXZlbHkgdXNlZCBHaWQgdmFsdWVzIGFyZSBjZXJ0YWlubHkgZGlmZmVyZW50LiBV
c2luZyAiZXF1YWwiDQo+IHJhdGhlciB0aGFuICJjb2luY2lkZSIgc2hvdWxkIGFscmVhZHkg
bWFrZSBpdCBjbGVhcmVyLCBhbmQgd2UgY2FuIGFsc28NCj4gZXhwbGljaXRseSBjbGFyaWZ5
IGFzIGFib3ZlLg0KPg0KPiBCZXNpZGVzIHRoYXQgYW5kIG1vcmUgaW4gZ2VuZXJhbCwgdGhl
IEdpZCBHMSBtYXkgYmUgcmUtYXNzaWduZWQgbGF0ZXINCj4gb24sIGF0IHNvbWUgcG9pbnQg
aW4gdGltZSBkdXJpbmcgdGhlIGdyb3VwIGxpZmV0aW1lLiBUaGlzIGFsbG93cyBhIGdyb3Vw
DQo+IHRvICJsaXZlIGZvcmV2ZXIiLCBldmVuIGFmdGVyIHRoZSB3aG9sZSBzcGFjZSBvZiBH
aWQgdmFsdWVzIGhhcyBiZWVuDQo+IGV4aGF1c3RlZCwgc28gdGhhdCB2YWx1ZXMgY2FuIGJl
IHJldXNlZC4NCj4NCj4gVGhlIGRldGFpbHMgcmVhbGx5IGRlcGVuZCBvbiBob3cgdGhlIEdy
b3VwIE1hbmFnZXIgZ2VuZXJhdGVzLCBtYW5hZ2VzDQo+IGFuZCBmb3JtYXRzIHRoZSBHaWQg
dmFsdWVzLiBBbiBleGFtcGxlIGlzIHByb3ZpZGVkIGluIEFwcGVuZGl4IEMsIHdoZXJlDQo+
IGEgR2lkIHZhbHVlIGlzIGNvbXBvc2VkIG9mIGEgZml4ZWQgR3JvdXAgUHJlZml4IGZvbGxv
d2VkIGJ5IGEgR3JvdXANCj4gRXBvY2ggc3ViamVjdCB0byBpbmNyZW1lbnQgYXQgZXZlcnkg
cmVrZXlpbmcuIEV2ZW50dWFsbHksIHRoZSBHcm91cA0KPiBFcG9jaCB3b3VsZCB3cmFwLWFy
b3VuZCwgdGh1cyB5aWVsZGluZyB0aGUgcmV1c2Ugb2YgcGFzdCBHaWQgdmFsdWVzLiBUaGUN
Cj4gc2FtZSBjYW4gaGFwcGVuIHdpdGggZGlmZmVyZW50IEdpZCBmb3JtYXRzLg0KPg0KPg0K
PiBXaXRoIHRoZSBhYm92ZSBpbiBtaW5kLCBsZXQncyBnZXQgdG8gdGhlIHB1cnBvc2Ugb2Yg
ZG9pbmcgd2hhdCBpcyBpbiB0aGUNCj4gdGV4dCB5b3UgaGF2ZSBxdW90ZWQuIFRoZSBmb2xs
b3dpbmcgZXhwYW5kcyBvbiB3aGF0IGlzIHZlcnkgc2hvcnRseQ0KPiBzdW1tYXJpemVkIGlu
IHRoZSBkcmFmdCBhczogIlRoaXMgZW5zdXJlcyB0aGF0IGFuIE9ic2VydmUgbm90aWZpY2F0
aW9uDQo+IFtSRkM3NjQxXSBjYW4gbmV2ZXINCj4gc3VjY2Vzc2Z1bGx5IG1hdGNoIGFnYWlu
c3QgdGhlIE9ic2VydmUgcmVxdWVzdHMgb2YgdHdvIGRpZmZlcmVudA0KPiBvYnNlcnZhdGlv
bnMuIg0KPg0KPg0KPiBJbiBnZW5lcmFsLCBhcyB5b3Ugc2F5LCB0aGUgYWltIGlzIGluZGVl
ZCB0byBrZWVwIGN1cnJlbnQgbWVtYmVycyBpbiB0aGUNCj4gZ3JvdXAsIHVubGVzcyB0byBi
ZSBldmljdGVkIGZvciBvdGhlciByZWFzb25zIChlLmcuLCBhcyBjb21wcm9taXNlZCkuDQo+
IEhvd2V2ZXIsIGEgcGFydGljdWxhciAiZWxkZXIgbWVtYmVyIiBNIGFzIGRlZmluZWQgaW4g
dGhlIHRleHQgaXMgbm90DQo+IHNhZmUgdG8ga2VlcCBpbiB0aGUgZ3JvdXAsIHNpbmNlIHRo
YXQgd291bGQgcHV0IGluIGRhbmdlciB0aGUgc2VjdXJpdHkNCj4gb2YgaXRzIHZlcnkgb2xk
LCBvbmdvaW5nIG9ic2VydmF0aW9ucy4gSW4gZmFjdCwgdGhpcyBpcyB3aGF0IG1pZ2h0IGhh
cHBlbi4NCj4NCj4gKiBUaGUgZW5kcG9pbnQgTSBqb2lucyB0aGUgZ3JvdXAsIG9idGFpbmlu
ZyBHaWQgRzEgYW5kIFNlbmRlciBJRCBJRDEuDQo+IFRoYXQgaXMsIEcxIGlzIHRoZSAiQmly
dGggR2lkIiBvZiBNLg0KPg0KPiAqIFRoZSBlbmRwb2ludCBNIHN0YXJ0cyBhbiBvYnNlcnZh
dGlvbiBPQlMxLCBzYXkgdXNpbmcgUGFydGlhbCBJViBlcXVhbA0KPiB0byA0Mi4gVGhpcyBv
YnNlcnZhdGlvbiB3b3VsZCBsZXZlcmFnZSBhbiBleHRlcm5hbF9hYWQgaW5jbHVkaW5nIHRo
ZQ0KPiB0cmlwbGUgKDQyLCBHMSwgSUQxKSwgaW4gb3JkZXIgdG8gbWF0Y2ggbm90aWZpY2F0
aW9ucyB0byB0aGUgb2JzZXJ2YXRpb24NCj4gcmVxdWVzdC4NCj4NCj4gKiBUaGUgZ3JvdXAg
aXMgcmVrZXllZCBzZXZlcmFsIHRpbWVzLCB0aHVzIGNoYW5naW5nIGl0cyBHaWQgdmFsdWUN
Cj4gbXVsdGlwbGUgdGltZXMuIEluIHRoZSBtZWFud2hpbGUsIHRoZSBlbmRwb2ludCBNIGtl
ZXBzIE9CUzEgYWN0aXZlIGFuZA0KPiByZXRhaW5zIGl0cyBvcmlnaW5hbCBTZW5kZXIgSUQg
SUQxLg0KPg0KPiAqIEV2ZW50dWFsbHksIHRoZSBHcm91cCBNYW5hZ2VyIHJla2V5cyB0aGUg
Z3JvdXAgYW5kIHJlLWFzc2lnbnMgR2lkIEcxLg0KPiBOb3csIHRoZSBuZXdseSBhc3NpZ25l
ZCBHaWQgRzEsIGlzIGVxdWFsIHRvIHRoZSAiQmlydGggR2lkIiBvZiB0aGUNCj4gZW5kcG9p
bnQgTS4NCj4NCj4NCj4gSWYgdGhlIGVuZHBvaW50IE0gd2FzIG5vdCBldmljdGVkIGZyb20g
dGhlIGdyb3VwIGFzIGRlZmluZWQgaW4gdGhlDQo+IGN1cnJlbnQgZHJhZnQsIHRoZSBmb2xs
b3dpbmcgY2FuIGhhcHBlbi4NCj4NCj4gVGhlIGVuZHBvaW50IE0gc3RhcnRzIGEgbmV3IG9i
c2VydmF0aW9uIE9CUzIuIEFzIGFuIHVubHVja3kgY29pbmNpZGVuY2UsDQo+IE0gdXNlcyBQ
YXJ0aWFsIElWIGVxdWFsIHRvIDQyIGluIHRoZSBvYnNlcnZhdGlvbiByZXF1ZXN0LiBUaGVy
ZWZvcmUsDQo+IGp1c3QgbGlrZSB0aGUgc3RpbGwgb25nb2luZyBPQlMxLCBhbHNvIE9CUzIg
d291bGQgbGV2ZXJhZ2UgYW4NCj4gZXh0ZXJuYWxfYWFkIGluY2x1ZGluZyB0aGUgdHJpcGxl
ICg0MiwgRzEsIElEMSkuDQo+DQo+IEhlbmNlLCBmcm9tIHRoZW4gb24sIGEgbm90aWZpY2F0
aW9uIHJlbGF0ZWQgdG8gT0JTMSBvciBPQlMyIHdvdWxkDQo+IGNyeXB0b2dyYXBoaWNhbGx5
IG1hdGNoIHRoZSBvYnNlcnZhdGlvbiByZXF1ZXN0IG9mIGJvdGggT0JTMSBhbmQgT0JTMiwN
Cj4gd2hpY2ggaXMgbm90IHNlY3VyZS4NCj4NCj4NCj4gSW5zdGVhZCwgYnkgZXZpY3Rpbmcg
dGhlIGVuZHBvaW50IE0gYXMgdGhlICJlbGRlciBtZW1iZXIiIGluIHF1ZXN0aW9uLCBNDQo+
IHdvdWxkIGV2ZW50dWFsbHkgcmUtam9pbiB0aGUgZ3JvdXAuIFdoZW4gdGhpcyBoYXBwZW5z
LCBNIHRlcm1pbmF0ZXMgYWxsDQo+IGl0cyBvbmdvaW5nIG9ic2VydmF0aW9ucyAoc2VlIFNl
Y3Rpb24gNi4xKSwgaW4gYWRkaXRpb24gdG8gb2J0YWluaW5nIGENCj4gbmV3IFNlbmRlciBJ
RCBhbmQgcmVzZXR0aW5nIGl0cyBTZW5kZXIgU2VxdWVuY2UgTnVtYmVyIHRvIHVzZSBhcyBQ
YXJ0aWFsDQo+IElWIHRvIDAgKHNlZSBTZWN0aW9uIDIuNS4zLjEpLg0KPg0KPg0KPiBQUk9Q
T1NBTDogd2UgaGF2ZSBub3QgaW5jbHVkZWQgdGhlIGFib3ZlIGRldGFpbGVkIHJlYXNvbmlu
ZyBpbiB0aGUNCj4gZHJhZnQsIHNpbmNlIGl0IGlzIG1vcmUgcmVsYXRlZCB0byBkZXNpZ24g
Y29uc2lkZXJhdGlvbnMgdGhhbiB0bw0KPiBwcm90b2NvbCBkZXNjcmlwdGlvbi4gU2hvdWxk
IHdlIGluY2x1ZGUgaXQgaW5zdGVhZD8gSWYgc28sIHdvdWxkIHlvdQ0KPiBzdWdnZXN0LCBl
LmcuLCBTZWN0aW9uIDMuMiBhZ2FpbiBvciByYXRoZXIgaW4gdGhlIFNlY3VyaXR5DQo+IENv
bnNpZGVyYXRpb25zIHNlY3Rpb24/DQo+IDw9PQ0KPg0KPj4gMy4yLjENCj4+DQo+PiAJRXZl
biB3aGVuIGFuIGVuZHBvaW50IGpvaW5pbmcgYSBncm91cCBpcyByZWNvZ25pemVkIGFzIGEg
Y3VycmVudA0KPj4gCSAgIG1lbWJlciBvZiB0aGF0IGdyb3VwLCBlLmcuLCB0aHJvdWdoIHRo
ZSBvbmdvaW5nIHNlY3VyZSBjb21tdW5pY2F0aW9uDQo+PiAJICAgYXNzb2NpYXRpb24sIHRo
ZSBHcm91cCBNYW5hZ2VyIE1VU1QgYXNzaWduIGEgbmV3IFNlbmRlciBJRCBkaWZmZXJlbnQN
Cj4+IAkgICB0aGFuIHRoZSBvbmUgY3VycmVudGx5IHVzZWQgYnkgdGhlIGVuZHBvaW50IGlu
IHRoZSBncm91cCwgdW5sZXNzIHRoZQ0KPj4gCSAgIGdyb3VwIGlzIHJla2V5ZWQgZmlyc3Qg
YW5kIGEgbmV3IEdpZCB2YWx1ZSBpcyBlc3RhYmxpc2hlZC4NCj4+IC0+IEhvdyBjYW4gYW4g
YWxyZWFkeS1qb2luZWQgZW5kcG9pbnQsIGkuZS4gYSBtZW1iZXIsIGpvaW4gdGhlIHNhbWUg
Z3JvdXA/ICBPciBkb2VzIHRoaXMgdGV4dCBhc3N1bWUgdGhhdCB0aGUgR00ga25vd3MgdGhl
IGVuZHBvaW50IGlzIGEgbWVtYmVyIHdoaWxlIHRoZSBlbmRwb2ludCBpdHNlbGYgImZvcmdv
dCIgdGhpcyBvciBwdXJwb3NlbHkgZGVsZXRlZCBpdHMgZ3JvdXAtcmVsYXRlZCBkYXRhIHRv
IGRvIGEgcmUtam9pbj8NCj4+IFNlY3Rpb24gMy4zIHN0ZXAgNiBoYXMgdGhlIHNhbWUgcXVl
c3Rpb24uDQo+ID09Pk1UDQo+IFdoaWxlIHRoZSBHcm91cCBNYW5hZ2VyIGtub3dzLCBlLmcs
IGJhc2VkIG9uIHRoZSBvbmdvaW5nIHNlY3VyZQ0KPiBjb21tdW5pY2F0aW9uIGFzc29jaWF0
aW9uIGl0IGhhcyB3aXRoIHRoYXQgZW5kcG9pbnQsIHRoZSBlbmRwb2ludCBkb2VzDQo+IG5v
dCAiZm9yZ2V0IiBhYm91dCBpdHMgbWVtYmVyc2hpcCAoZXhjZXB0IGluIHRoZSBjYXNlIGl0
IHJlYm9vdHMgYW5kDQo+IGxvc2VzIGl0cyBTZWN1cml0eSBDb250ZXh0KS4NCj4NCj4gSW4g
Z2VuZXJhbCwgYW4gZW5kcG9pbnQgbWF5IHJlLWpvaW4gdGhlIGdyb3VwLiBUaGUgZGV0YWls
cyBhYm91dCB0aGUNCj4gYWN0dWFsIHByb2NlZHVyZSBhcmUgdXAgdG8gdGhlIHNwZWNpZmlj
IEdyb3VwIE1hbmFnZXIgKGUuZy4sIHRoZSBvbmUNCj4gZGVmaW5lZCBpbiBkcmFmdC1pZXRm
LWFjZS1rZXktZ3JvdXBjb21tLW9zY29yZSksIGJ1dCBhIHJlLWpvaW4gY2FuDQo+IGhhcHBl
biBpbiBhIG51bWJlciBvZiBjYXNlcy4gRm9yIGluc3RhbmNlOg0KPg0KPiAqIEZvbGxvd2lu
ZyBhIGZvcmNlZnVsIGV2aWN0aW9uLiBJbiB0aGUgc2l0dWF0aW9uIGRpc2N1c3NlZCBpbiB0
aGUNCj4gcHJldmlvdXMgY29tbWVudCwgYSByZS1qb2luIHdvdWxkIGluIGZhY3QgYmUgc3Vj
Y2Vzc2Z1bCwgc2luY2UgdGhlDQo+IGV2aWN0aW9uIHdhcyBpbnRlbnRpb25hbGx5IHBlcmZv
cm1lZCB0byBmb3JjZSBhIHJlLWpvaW5pbmcgYW5kIHRoZQ0KPiB0ZXJtaW5hdGlvbiBvZiB2
ZXJ5IGxvbmctbGl2aW5nIG9ic2VydmF0aW9ucy4NCj4NCj4gKiBBcyBkaXNjdXNzZWQgaW4g
U2VjdGlvbiAyLjUuMyAoYW5kIG1vcmUgaW4gZGV0YWlscyBpbiBTZWN0aW9uIDIuNS4zLjEN
Cj4gYW5kIDIuNS4zLjIpLCBhbiBlbmRwb2ludCBtaWdodCBuZWVkIG5ldyBTZWN1cml0eSBD
b250ZXh0IHBhcmFtZXRlcnMNCj4gZnJvbSB0aGUgR3JvdXAgTWFuYWdlci4gSW4gcGFydGlj
dWxhciwgaXQgcmVxdWlyZXMgYSBuZXcgU2VuZGVyIElEIGlmIGl0DQo+IGhhcyBydW4gb3V0
IG9mIFNlbmRlciBTZXF1ZW5jZSBOdW1iZXIgdmFsdWVzLCBvciB0aGUgbGF0ZXN0IGdyb3Vw
IGtleWluZw0KPiBtYXRlcmlhbCBpZiBpdCByZWFsaXplcyB0byBoYXZlIG1pc3NlZCBzb21l
IGdyb3VwIHJla2V5aW5nIGluc3RhbmNlcy4NCj4NCj4gICDCoMKgIFdoYXQgdGhpcyBkcmFm
dCBpcyBjb25jZXJuZWQgYWJvdXQgaXMgdGhhdCB0aGUgR3JvdXAgTWFuYWdlciBpcyBhYmxl
DQo+IHRvIHByb3ZpZGUgdGhlc2UgcGFyYW1ldGVycyB0byB0aGUgZW5kcG9pbnQgaWYgbmVl
ZCBiZS4gQWdhaW4sIGhvdyB0aGlzDQo+IGV4YWN0bHkgaGFwcGVucyBkZXBlbmRzIG9uIHRo
ZSBzcGVjaWZpYyBHcm91cCBNYW5hZ2VyIGFuZCB0aGUgaW50ZXJmYWNlDQo+IGl0IHByb3Zp
ZGVzIHRvIHRoZSBjdXJyZW50IG9yIGNhbmRpZGF0ZSBncm91cCBtZW1iZXJzIChzZWUgYWJv
dmUpLg0KPg0KPiAgIMKgwqAgVGhhdCBzYWlkLCBmdWxseSByZS1qb2luaW5nIHRoZSBncm91
cCBpcyBhIG1pbmltYWxseSBncmFudGVkIHdheSB0bw0KPiBhY3F1aXJlIGFsbCB0aG9zZSBw
YXJhbWV0ZXJzIGF0IG9uY2UsIHJhdGhlciB0aGFuIHRocm91Z2ggbW9yZQ0KPiBmaW5lLWdy
YWluZWQgaW50ZXJhY3Rpb25zIHRoYXQgdGhlIEdyb3VwIE1hbmFnZXIgbWlnaHQsIGluIGdl
bmVyYWwsIG5vdA0KPiBpbXBsZW1lbnQuIFRoYXQgaXMsIHVwb24gcmUtam9pbmluZyB0aGUg
Z3JvdXAsIHRoZSBlbmRwb2ludCB3b3VsZA0KPiByZWNlaXZlIGEgbmV3IFNlbmRlciBJRCAo
aGVuY2UgdGVjaG5pY2FsbHkgYmVjb21pbmcgYSBuZXcgZW5kcG9pbnQpIGFuZA0KPiB0aGUg
bGF0ZXN0IGtleWluZyBtYXRlcmlhbCB0byB1c2UgaW4gdGhlIGdyb3VwLg0KPg0KPg0KPiBQ
Uk9QT1NBTDogaWYgdGhlIGFib3ZlIGlzIGNsZWFyIGFuZCBhZ3JlZWQsIG5vIGFjdGlvbi4N
Cj4gPD09DQo+DQo+PiBGaWd1cmUgMiBzYXlzICJBZnRlciBjaGFuZ2luZyBHcm91cCBJRCwg
YW4gdW51c2VkIGtpZCBjYW4gYmUgYXNzaWduZWQiLiBEbyB3ZSBtZWFuIGhlcmUgYSBwcmV2
aW91c2x5IHVzZWQga2lkICh1bmRlciBhIEdpZD1OKSB0aGF0IGlzIGN1cnJlbnRseSB1bnVz
ZWQgKHVuZGVyIEdpZD1OKSwgY2FuIGJlIHJlLWFzc2lnbmVkIGFmdGVyIEdpZCBjaGFuZ2Ug
dG8gR2lkICE9IE4gPyAgTm90IHN1cmUgd2hldGhlciB3ZSBjYW4gZml0IHRoZSBpbnRlbmRl
ZCBzZW50ZW5jZSBpbiBzdWNoIGEgc21hbGwgc3BhY2UuIE1heWJlICJBZnRlciBHcm91cCBJ
RCBjaGFuZ2UsIGEgZm9ybWVybHkgdXNlZCBraWQgY2FuIGJlIHJlLXVzZWQiID8NCj4gPT0+
TVQNCj4gV2VsbCwgaXQgd2FzIG5vdCBuZWNlc3NhcmlseSBmb3JtZXJseSB1c2VkLCBpdCBt
aWdodCBoYXZlIG5ldmVyIGJlZW4gYmVmb3JlLg0KPg0KPiBUaGF0IGlzLCBhc3N1bWUgdGhh
dCBwb3NzaWJsZSBraWQgdmFsdWVzIGFyZSB7MCwgMSwgLi4uLCA5fS4NCj4NCj4gVW5kZXIg
R2lkPTEwMCwgdGhlIEdyb3VwIE1hbmFnZXIgYXNzaWducyB0aGUga2lkIHZhbHVlcyB7MCwg
MSwgLi4uLCA3fS4NCj4gVGhlbjoNCj4NCj4gKiBUaGUgZW5kcG9pbnQgd2l0aCBraWQgPSAw
IGxlYXZlcyB0aGUgZ3JvdXAuDQo+ICogVGhlIEdyb3VwIE1hbmFnZXIgcmVrZXlzIHRoZSBn
cm91cCBhbmQgYXNzaWducyBHaWQ9MjAwLg0KPg0KPiBUaGVuLCB1bmRlciBHaWQ9MjAwOg0K
Pg0KPiAqIFRoZSBraWQgdmFsdWVzIHsxLCAyLCAuLi4sIDd9IGFyZSB0YWtlbi4NCj4gKiBU
aGUga2lkIHZhbHVlcyB7MCwgOCwgOX0gYXJlIGF2YWlsYWJsZSB0byBiZSBhc3NpZ25lZC4N
Cj4NCj4gTm90ZSB0aGF0IDAgd2FzIGluZGVlZCBmb3JtZXJseSB1c2VkIHVuZGVyIHRoZSBw
cmV2aW91cyBHaWQgdmFsdWUsIGJ1dCA4DQo+IGFuZCA5IGhhdmUgbmV2ZXIgYmVlbi4NCj4N
Cj4NCj4gUFJPUE9TQUw6IHRoZSB0ZXh0IGluIEZpZ3VyZSAyIGNhbiBiZSB1cGRhdGVkIGFz
OiAiQWZ0ZXIgR3JvdXAgSUQNCj4gY2hhbmdlLCBhbiB1bnVzZWQga2lkIGJlY29tZXMgcG9z
c2libGUgdG8gYXNzaWduLCBldmVuIGlmIHVzZWQgYmVmb3JlDQo+IHRoZSBHcm91cCBJRCBj
aGFuZ2UuIg0KPiA8PT0NCj4NCj4+IDgNCj4+IFJlY29tbWVuZGF0aW9ucyBpbiB0aGUgbGFz
dCBwYXJhZ3JhcGggdG8gbm90IHNlbmQgYmFjayBhbnkgZXJyb3IgbWVzc2FnZTogaXMgdGhp
cyBhbHNvIGFwcGxpY2FibGUgd2hlbiB0aGUgZ3JvdXAgcmVxdWVzdCBpcyBzZW50IG92ZXIg
YSB1bmljYXN0IHRyYW5zcG9ydD8gSW4gdGhhdCBjYXNlIGl0IHNob3VsZCBiZSBvayB0byBy
ZXNwb25kIGVycm9yLCBzaW5jZSB0aGVyZSdzIG5vIHJpc2sgb2YgYW1wbGlmaWNhdGlvbiBh
dHRhY2suDQo+PiBFLmcuIGZvciBhIHVuaWNhc3QgcGFpcndpc2UgcmVxdWVzdCBpdCBpcyBk
ZWZpbmVkIHRoYXQgYW4gZXJyb3IgY2FuIGJlIHNlbnQgZS5nLiBpbiA5LjQuICBBbHRob3Vn
aCBzZW5kaW5nIGdyb3VwIHJlcXVlc3Qgb3ZlciB1bmljYXN0IGlzIGdlbmVyYWxseSBub3Qg
cmVjb21tZW5kZWQgYXMgc3RhdGVkIGVsc2V3aGVyZSBpbiB0aGUgZHJhZnQsIHRoZXJlIHdl
cmUgc29tZSB2YWxpZCBjYXNlcyBjaXRlZCBzbyB3ZSBjYW4gY29uc2lkZXIgZ3JvdXAgcmVx
dWVzdCBvdmVyIHVuaWNhc3QgY2FzZXMuDQo+ID09Pk1UDQo+IEdvb2QgcG9pbnRzLiBUbyBj
bGFyaWZ5LCBhIHJlcXVlc3QgY2FuIGJlIHNlbnQgb3ZlciB1bmljYXN0IG9yDQo+IG11bHRp
Y2FzdCwgd2hlbiBwcm90ZWN0ZWQgaW4gZ3JvdXAgbW9kZSBvciBpbiBwYWlyd2lzZSBtb2Rl
LiBUaGF0IGlzOg0KPg0KPiAtIE11bHRpY2FzdCByZXF1ZXN0IGluIGdyb3VwIG1vZGUuIFRo
aXMgaXMgdGhlIHR5cGljYWwgY2FzZSBmb3IgdGhlDQo+IGdyb3VwIG1vZGUuDQo+DQo+IC0g
VW5pY2FzdCByZXF1ZXN0IGluIGdyb3VwIG1vZGUuIFRoaXMgaXMgbm90IHJlY29tbWVuZGVk
IGFzIGRpc2N1c3NlZCBpbg0KPiBTZWN0aW9uIDExLjkuDQo+DQo+IC0gVW5pY2FzdCByZXF1
ZXN0IGluIHBhaXJ3aXNlIG1vZGUuIFRoaXMgaXMgdGhlIHR5cGljYWwgY2FzZSBmb3IgdGhl
DQo+IHBhaXJ3aXNlIG1vZGUsIGFuZCBpcyB2ZXJ5IHNpbWlsYXIgdG8gaG93IE9TQ09SRSB3
b3Jrcy4NCj4NCj4gLSBNdWx0aWNhc3QgcmVxdWVzdCBpbiBwYWlyd2lzZSBtb2RlLiBUaGlz
IGlzIGEgcGFydGljdWxhciBjYXNlLCB3aXRoDQo+IHR3byByZWxldmFudCBleGFtcGxlczoN
Cj4gLS0tIFRoZSBsYXN0IHBhcmFncmFwaCBpbiBTZWN0aW9uIDkuMCwgaW4gdHVybiBwb2lu
dGluZyB0byBTZWN0aW9uIDkuMS4NCj4gLS0tIFNlY3Rpb24gMy40LjUgb2YgZHJhZnQtYW1z
dWVzcy1jb3JlLWNhY2hhYmxlLW9zY29yZS0wMw0KPg0KPiBOb3RlIHRoYXQgYSBzZXJ2ZXIg
bWlnaHQgbm90IGJlIGFibGUgdG8gYXNzZXJ0IGlmIGEgcmVjZWl2ZWQgcmVxdWVzdCB3YXMN
Cj4gc2VudCBvdmVyIHVuaWNhc3Qgb3IgbXVsdGljYXN0LiBBbHRob3VnaCBmb3IgZGlmZmVy
ZW50IHJlYXNvbnMsIHRoaXMgaXMNCj4gYWxyZWFkeSBtZW50aW9uZWQgaW4gU2VjdGlvbiA0
LjQgb2YgUkZDIDcyNTIsIGFuZCB3ZSBoYWQgYSBwcmFjdGljYWwNCj4gZXZpZGVuY2UgaW4g
SmF2YSBpbXBsZW1lbnRhdGlvbnMuDQo+DQo+DQo+IFBST1BPU0FMOiBiYXNlZCBvbiB0aGUg
YWJvdmUsIHdlIGNhbiByZXZpc2UgdGhlIHJlY29tbWVuZGF0aW9uIGluDQo+IFNlY3Rpb24g
OCBhcyBmb2xsb3dzLg0KPg0KPiBpKSBzZXJ2ZXJzIHRoYXQgYXJlIG5vdCBhYmxlIHRvIGRp
c3Rpbmd1aXNoIG11bHRpY2FzdCBhbmQgdW5pY2FzdA0KPiByZXF1ZXN0cyBhcmUgUkVDT01N
RU5ERUQgdG8gc3VwcHJlc3MgZXJyb3IgcmVzcG9uc2VzLg0KPg0KPiBpaSkgc2VydmVycyB0
aGF0IGFyZSBhYmxlIHRvIGRpc3Rpbmd1aXNoIG11bHRpY2FzdCBhbmQgdW5pY2FzdCByZXF1
ZXN0cw0KPiBhcmUgUkVDT01NRU5ERUQgdG8gc3VwcHJlc3MgZXJyb3IgcmVzcG9uc2VzIHRv
IG11bHRpY2FzdCByZXF1ZXN0cy4NCj4NCj4gPD09DQo+DQo+PiA4LjMuMQ0KPj4gIkZvciBl
YWNoIG9uZ29pbmcgb2JzZXJ2YXRpb24sIHRoZSBzZXJ2ZXIgY2FuIGhlbHAgdGhlIGNsaWVu
dCB0bw0KPj4gICAgICBzeW5jaHJvbml6ZSwgYnkgaW5jbHVkaW5nIGFsc28gdGhlICdraWQg
Y29udGV4dCcgcGFyYW1ldGVyIGluDQo+PiAgICAgIG5vdGlmaWNhdGlvbnMgZm9sbG93aW5n
IGEgZ3JvdXAgcmVrZXlpbmcsICINCj4+IC0+IEknbSB3b25kZXJpbmcgaW4gd2hhdCB3YXkg
dGhpcyBoZWxwcy4gSXMgaXQgYSByZWR1Y3Rpb24gb2YgdGltZSAvIGVuZXJneSB1c2VkIGJ5
IHRoZSBjbGllbnQsIGJlY2F1c2Ugc2VuZGluZyBpdCBsZXRzIHRoZSBjbGllbnQgYXZvaWQg
dHJ5aW5nIG91dCBkZWNyeXB0aW9uL3ZhbGlkYXRpb24gdXNpbmcgZmlyc3QgdGhlIG9sZCBH
aWQvY29udGV4dCwgd2hpY2ggd291bGQgZmFpbD8NCj4+IFRoZSBkb3duc2lkZSBvZiBvcHRp
b25hbGx5IGluY2x1ZGluZyBpdCBpcyBhIG1vcmUgY29tcGxleCBoYW5kbGluZyBpbiB0aGUg
Y29kZSBpLmUuIG1vcmUgbWVzc2FnZSB2YXJpYXRpb25zID0gbW9yZSBjb2RlIHBhdGhzID0g
bW9yZSB0aGluZ3MgcG90ZW50aWFsbHkgZ29pbmcgd3JvbmcgYW5kIHRvIHRlc3QuDQo+ID09
Pk1UDQo+IFdlbGwsIHdoaWxlIHVzdWFsbHkgbm90IG5lY2Vzc2FyeSwgaXQgaXMgbm90IHdy
b25nIHRvIGluY2x1ZGUgJ2tpZA0KPiBjb250ZXh0JyBpbiBhIHJlc3BvbnNlIG1lc3NhZ2Uu
DQo+DQo+IEluIHRoaXMgcGFydGljdWxhciBjYXNlLCB0aGUgbm90aWZpY2F0aW9uIGluY2x1
ZGluZyB0aGUgbmV3IEdpZCBpbiAna2lkDQo+IGNvbnRleHQnIG1ha2VzIHRoZSBjbGllbnQg
YXdhcmUgdGhhdCBhIGdyb3VwIHJla2V5aW5nIGhhcyBoYXBwZW5lZCwgb3INCj4gaXMgdW5k
ZXJ3YXkgYW5kIHRoZSBjbGllbnQgaGFzIG5vdCBnb3QgcmVrZXlpbmcgbWVzc2FnZXMgeWV0
Lg0KPg0KPiBOb3csIGlmIHRoZSBjbGllbnQgaGFzIGFscmVhZHkgc3dpdGNoZWQgdG8gdGhl
IG5ldyBTZWN1cml0eSBDb250ZXh0LA0KPiB0aGVuIHRoZSBvbGQgb25lIHdvdWxkIGhhdmUg
YmVlbiBkaXNjYXJkZWQuDQo+DQo+IElmIHRoZSBjbGllbnQgaGFzIG5vdCBhbHJlYWR5IHN3
aXRjaGVkIHRvIHRoZSBuZXcgU2VjdXJpdHkgQ29udGV4dCwgdGhlDQo+IG5vdGlmaWNhdGlv
biBjYW4gbWFrZSB0aGUgY2xpZW50IHJlYWxpemUgdG8gaGF2ZSBtaXNzZWQgb25lIG9yIG1v
cmUNCj4gZ3JvdXAgcmVrZXlpbmcgaW5zdGFuY2VzLiBUaGUgY2xpZW50IHdpbGwgdGhlbiBw
cm9tcHRseSBjaGVjayB3aXRoIHRoZQ0KPiBHcm91cCBNYW5hZ2VyIGFuZCByZXRyaWV2ZSB0
aGUgbGF0ZXN0IGdyb3VwIGtleWluZyBtYXRlcmlhbCBmb3IgZGVyaXZpbmcNCj4gdGhlIGxh
dGVzdCBTZWN1cml0eSBDb250ZXh0LCByYXRoZXIgdGhhbiBkb2luZyB0aGF0IGFueXdheSAo
bXVjaCkgbGF0ZXIsDQo+IGUuZy4sIGFmdGVyIGV4cGVyaWVuY2luZyBzZXZlcmFsIGNvbnNl
Y3V0aXZlIGRlY3J5cHRpb24gZmFpbHVyZXMuDQo+DQo+IEVzcGVjaWFsbHkgZm9yIGEgY2xp
ZW50IHRoYXQgZG9lcyBub3Qgc2VuZCByZXF1ZXN0cyB0aGF0IG9mdGVuIChvciBkb2VzDQo+
IG5vdCByZWNlaXZlIHJlcXVlc3RzIHRoYXQgb2Z0ZW4gaWYgYWN0aW5nIGFsc28gYXMgYSBz
ZXJ2ZXIpLCB0aGlzIGhpbnQNCj4gaXMgYW4gb3Bwb3J0dW5pc3RpYyBzaG9ydGN1dCB0byBy
ZWFsaXplIGl0cyBtaXNhbGlnbm1lbnQgaW4gdGVybXMgb2YNCj4gU2VjdXJpdHkgQ29udGV4
dCwgd2hpY2ggbWlnaHQgb3RoZXJ3aXNlIHJlcXVpcmUgbW9yZSB0aW1lIGFuZCBkZWNyeXB0
aW9uDQo+IGZhaWx1cmVzLg0KPg0KPg0KPiBQUk9QT1NBTDogaWYgdGhlIGFib3ZlIGlzIGNs
ZWFyIGFuZCBhZ3JlZWQsIG5vIGFjdGlvbi4NCj4gPD09DQo+DQo+PiAxMA0KPj4NCj4+IAlD
b25zdHJhaW5lZCBJb1QgZGV2aWNlcyBtYXkgYWx0ZXJuYXRpdmVseSByZXByZXNlbnQgTW9u
dGdvbWVyeSBjdXJ2ZXMNCj4+IAkgICBhbmQgKHR3aXN0ZWQpIEVkd2FyZHMgY3VydmVzIFtS
RkM3NzQ4XSBpbiB0aGUgc2hvcnQtV2VpZXJzdHJhc3MgZm9ybQ0KPj4gCSAgIFdlaTI1NTE5
LCB3aXRoIHdoaWNoIHRoZSBhbGdvcml0aG1zIEVDRFNBMjU1MTkgYW5kIEVDREgyNTUxOSBj
YW4gYmUNCj4+IAkgICB1c2VkIGZvciBzaWduYXR1cmUgb3BlcmF0aW9ucyBhbmQgRGlmZmll
LUhlbGxtYW4gc2VjcmV0IGNhbGN1bGF0aW9uLA0KPj4gCSAgIHJlc3BlY3RpdmVseSBbSS1E
LmlldGYtbHdpZy1jdXJ2ZS1yZXByZXNlbnRhdGlvbnNdLg0KPj4NCj4+IC0+IFRoaXMgc291
bmRzIG9wdGlvbmFsICgnbWF5JykuIEJ1dCB0aGUgcGFyYWdyYXBoIGlzIGluIHRoZSBzZWN0
aW9uICJNYW5kYXRvcnktdG8tSW1wbGVtZW50Ijsgd2h5IHBsYWNlIGl0IHRoZXJlPw0KPj4g
LT4gQWxzbyBzZXZlcmFsIFNIT1VMRC9SRUNPTU1FTkRFRCBpdGVtcyBhcmUgaW4gdGhpcyBz
ZWN0aW9uLiAgU2FtZSBxdWVzdGlvbiwgZG9lc24ndCBpdCBjb250cmFkaWN0IHRoZSB0aXRs
ZT8NCj4gPT0+TVQNCj4gVGhlIHNlY3Rpb24gdGl0bGUgaXMgIk1hbmRhdG9yeS10by1JbXBs
ZW1lbnQgQ29tcGxpYW5jZSBSZXF1aXJlbWVudHMiLA0KPiBsaWtlIGluIHRoZSBhbmFsb2dv
dXMgc2VjdGlvbiBvZiBkcmFmdC1pZXRmLWxha2UtZWRob2MgLCBhbmQgdXNlcyB0aGUNCj4g
aXRlbXMgeW91IG1lbnRpb24gaW4gYSBzaW1pbGFyIHdheS4NCj4NCj4gSWYgSSB1bmRlcnN0
YW5kIHRoZSBjb21tZW50IGNvcnJlY3RseSwgeW91IHdvdWxkIGV4cGVjdCBhIHNlY3Rpb24g
bmFtZWQNCj4gIk1hbmRhdG9yeS10by1JbXBsZW1lbnQgLi4uIiB0byBjb3ZlciBpdHMgcG9p
bnRzIG9ubHkgdXNpbmcgTVVTVC9TSEFMTC4NCj4gQ29ycmVjdD8NCj4NCj4NCj4gUFJPUE9T
QUw6IFNpbmNlIHdlIGRvIG1lYW4gd2hhdCBpcyBpbiB0aGUgdGV4dCBoZXJlLCBpdCBjYW4g
aGVscCB0bw0KPiBjaGFuZ2UgdGhlIHNlY3Rpb24gdGl0bGUgdG8gIkltcGxlbWVudGF0aW9u
IENvbXBsaWFuY2UiLiBUaGVuLCBzb21lIG9mDQo+IHRoZSBjb3ZlcmVkIHBvaW50cyB3b3Vs
ZCBiZSBpbmRlZWQgbWFuZGF0b3J5LXRvLWltcGxlbWVudCByZXF1aXJlbWVudHMsDQo+IHdo
aWxlIG90aGVyIHdvdWxkIG5vdC4NCj4gPD09DQo+DQo+PiAxMQ0KPj4gSSBkaWQgbm90IGZp
bmQgYSBjb25zaWRlcmF0aW9uIGFib3V0IHNlbGVjdGluZyB0aGUgdmFsdWUvbGVuZ3RoIG9m
IHRoZSBNYXN0ZXIgU2FsdCwgYW5kIHdoZXRoZXIgaXQgbmVlZHMgdG8gYmUgc2V0IGF0IGFs
bCAoaS5lLiBvdGhlciB0aGFuIHRoZSBkZWZhdWx0IHZhbHVlIG9mIE1hc3RlciBTYWx0KS4g
SXMgaXQgdXNlZnVsIGZvciBncm91cCBjb21tdW5pY2F0aW9uPyBJbiB3aGF0IHNpdHVhdGlv
bnM/DQo+ID09Pk1UDQo+IFRoZXJlIGFyZSBubyBkaWZmZXJlbmNlcyBjb21wYXJlZCB0byBP
U0NPUkUsIGhlbmNlIEdyb3VwIE9TQ09SRSBzaW1wbHkNCj4gaW5oZXJpdHMgd2hhdCBpcyBk
ZWZpbmVkIGluIFJGQyA4NjEzLg0KPg0KPiBMaWtlIGluIE9TQ09SRSwgdGhlIE1hc3RlciBT
YWx0IGhhcyB2YXJpYWJsZSBsZW5ndGgsIGFuZCBpdHMgbGVuZ3RoIGFuZA0KPiB2YWx1ZSBt
YXkgYmUgcHJlc2VydmVkIG9yIGNoYW5nZWQgd2hlbiByZWtleWluZyB0aGUgZ3JvdXAuDQo+
DQo+IEl0cyB1c2UgYW5kIHVzZWZ1bG5lc3MgYXJlIGFsc28gdGhlIHNhbWUgYXMgaW4gT1ND
T1JFLiBUaGF0IGlzLCBieQ0KPiBjb250cmlidXRpbmcgaW4gdGhlIGtleSBkZXJpdmF0aW9u
IHByb2Nlc3MsIGl0IHByZXZlbnRzIGNyeXB0YW5hbHlzaXMNCj4gKHNlZSBTZWN0aW9uIDEy
LjYgb2YgUkZDIDg2MTMgYWxzbyBpbmhlcml0ZWQgaW4gU2VjdGlvbiAxMS4xNSBvZiBHcm91
cA0KPiBPU0NPUkUpLg0KPg0KPg0KPiBQUk9QT1NBTDogaWYgdGhlIGFib3ZlIGlzIGNsZWFy
IGFuZCBhZ3JlZWQsIG5vIGFjdGlvbi4NCj4gPD09DQo+DQo+PiBXaGF0IGFib3V0IGEgY29u
c2lkZXJhdGlvbiBvbiBhIHBvc3NpYmxlIERvUyBhdHRhY2s6ICBhbiBhdHRhY2tlciBmaXJz
dCBibG9ja3MgdGhlIElQIGNvbW11bmljYXRpb24gcGF0aCB0byB0aGUgR3JvdXAgTWFuYWdl
ciAsIGFuZCB0aGVuIHRyaWdnZXIgYSBtYXNzIHBvd2VyLWN5Y2xlIChyZWJvb3QpIGluY2x1
ZGluZyBkZXZpY2VzIHRoYXQgYXJlIGRvaW5nIEdyb3VwIE9TQ09SRSBjb21tdW5pY2F0aW9u
LiBUaGVzZSBkZXZpY2Ugd2lsbCB0aGVuIG5vdCBwZXJmb3JtIGdyb3VwIGNvbW11bmljYXRp
b24gYW55bW9yZSBkdWUgdG8gdGhlIHNlY3Rpb24gMi41LjEuMSByZXF1aXJlbWVudHMgbGFz
dCBwYXJhZ3JhcGguICAgQmxvY2tpbmcgdGhlIElQIGNvbW11bmljYXRpb24gcGF0aCB0byB0
aGUgR00gY291bGQgYmUgZG9uZSBlLmcuIGJ5IGluamVjdGluZyBmYWtlIEROUyByZXNwb25z
ZXMgZm9yIEdNIGhvc3RuYW1lIHF1ZXJpZXMgb3IgYnkgcmVtb3ZpbmcgYSBuZXR3b3JrIGxp
bmsgdGhhdCdzIHVzZWQgZm9yIHJvdXRpbmcgdG93YXJkcyB0aGUgR00uIEF0IGxlYXN0IGlu
IHRoZSBtb3ZpZXMgYW4gYXR0YWNrZXIgaXMgb2Nhc3Npb25hbGx5IGFibGUgdG8gdHJpZ2dl
ciBhIHBvd2VyIG91dGFnZSBmb3IgYSBmZXcgc2Vjb25kcyAgOykNCj4gPT0+TVQNCj4gVGhh
bmtzLCBJIHRoaW5rIGl0IGlzIGdvb2QgdG8gZWxhYm9yYXRlIG9uIHRoaXMuDQo+DQo+IEkg
YW0ganVzdCBub3Qgc3VyZSB3aGVyZSBleGFjdGx5LiBUaGlzIG1pZ2h0IHJlcXVpcmUgYSBu
ZXcgZGVkaWNhdGVkDQo+IHN1YnNlY3Rpb24gd2l0aGluIFNlY3Rpb24gMTEsIHRvZ2V0aGVy
IHdpdGggYW4gZWZmZWN0aXZlIHJlbWluZGVyIG9mDQo+IFNlY3Rpb24gMi41LjEuMSBmb3Ig
dGhlIHJlYWRlci4NCj4NCj4NCj4gUFJPUE9TQUw6IGVsYWJvcmF0ZSBvbiB0aGlzIHBvaW50
LCBvbmNlIHVuZGVyc3Rvb2Qgd2hlcmUgZXhhY3RseSwgYnV0DQo+IG1vc3QgbGlrZWx5IHdp
dGhpbiB0aGUgc2VjdXJpdHkgY29uc2lkZXJhdGlvbnMuDQo+IDw9PQ0KPg0KPj4gMTEuMQ0K
Pj4gIlRodXMsIGEgY3VycmVudCBncm91cCBtZW1iZXIgb3duaW5nIHRoZQ0KPj4gICAgICAg
ICBsYXRlc3QgZ3JvdXAga2V5aW5nIG1hdGVyaWFsIGRvZXMgbm90IG93biB0aGUgcHVibGlj
IGtleSBvZiBhbnkNCj4+ICAgICAgICAgZm9ybWVyIGdyb3VwIG1lbWJlci4iDQo+PiAtPiBO
b3Qgc3VyZSB3aGF0IHRoaXMgaW50ZW5kcyB0byBzYXkuIEEgZ3JvdXAgbWVtYmVyIG1heSBz
dG9yZSBhIHB1YmxpYyBrZXkgb2YgYW55IGdyb3VwIG1lbWJlci4gQnV0IGl0IG5ldmVyICJv
d25zIiB0aGUgcHVibGljIGtleSBvZiBhbm90aGVyIG5vZGUsIGluIHRoZSBzZW5zZSB0aGF0
IGl0IGRvZXNuJ3QgaGF2ZSBhY2Nlc3MgdG8gaXRzIHByaXZhdGUga2V5IHJpZ2h0Pw0KPj4g
TWF5YmUgaXQgd2FzIGludGVuZGVkIHRvIHNheSB0aGF0IGR1ZSB0byBwcm90b2NvbC9HTSBk
ZXNpZ24sIGEgbm9kZSBkb2Vzbid0IHN0b3JlIHRoZSBwdWJsaWMga2V5IG9mIGEgZm9ybWVy
IGdyb3VwIG1lbWJlciBiZWNhdXNlIGl0IGdldHMgZGVsZXRlZCBhdCB0aGUgbW9tZW50IHRo
YXQgdGhlIG1lbWJlciBsZWF2ZXMuDQo+PiBDaGFuZ2luZyAib3duZWQiIHRvICJzdG9yZWQi
IG1heSBoZWxwIHRvIHJlcGhyYXNlLg0KPiA9PT5NVA0KPiBKdXN0IGxpa2UgeW91IHNhaWQ6
IG5vdCAib3duZWQiIGFzIHJlbGF0ZWQgdG8gYSBwcm9wZXJ0eSwgYnV0IHJhdGhlciB0bw0K
PiBzb21ldGhpbmcgYXZhaWxhYmxlIGluIGxvY2FsIHN0b3JhZ2UuDQo+DQo+DQo+IFBST1BP
U0FMOiBjaGFuZ2UgIm93biIvIm93bmVkIiB0byAic3RvcmUiLyJzdG9yZWQiLiBUaGlzIHBy
b2JhYmx5DQo+IGFmZmVjdHPCoCBzb21lIG90aGVyIHNlbnRlbmNlIGluIHRoZSBkb2N1bWVu
dC4NCj4gPD09DQo+DQo+PiAxMS43LjINCj4+IFRvd2FyZHMgdGhlIGVuZCB0aGUgcmVhZGVy
IG1heSBsb3NlIGEgYml0IHRoZSBjb250ZXh0IG9mIHRoZSBwcmlvciAid291bGQiIHN0YXRl
bWVudHMuIEUuZy4gd2UgaGF2ZToNCj4+DQo+PiAJU2luY2UgdGhlIFBhcnRpYWwgSVYgaXMg
NSBieXRlcyBpbiBzaXplLCB0aGlzIHJlcXVpcmVzIDJeNDANCj4+IAkgICBvcGVyYXRpb25z
IHRvIHRlc3QgYWxsIHRoZSBQYXJ0aWFsIElWcywgd2hpY2ggY2FuIGJlIGRvbmUgaW4gcmVh
bC0NCj4+IAkgICB0aW1lLiAgVGhlIHByb2JhYmlsaXR5IHRoYXQgYSBzaW5nbGUgZ2l2ZW4g
bWVzc2FnZSBNMSBjYW4gYmUgdXNlZCB0bw0KPj4gCSAgIGZvcmdlIGEgcmVzcG9uc2UgTTIg
Zm9yIGEgZ2l2ZW4gcmVxdWVzdCB3b3VsZCBiZSBlcXVhbCB0byAyXi0yNCwNCj4+IAkgICBz
aW5jZSB0aGVyZSBhcmUgbW9yZSBNQUMgdmFsdWVzICg4IGJ5dGVzIGluIHNpemUpIHRoYW4g
UGFydGlhbCBJVg0KPj4gCSAgIHZhbHVlcyAoNSBieXRlcyBpbiBzaXplKS4NCj4+DQo+PiBJ
cyB0aGlzIGluIHRoZSBjb250ZXh0IG9mIHRoZSBwcmVzZW50IHNvbHV0aW9uIHNwZWNpZmll
ZCwgb3IgaW4gY29udGV4dCBvZiBhIGh5cG90aGV0aWNhbCBjYXNlIG9mIGEgY291bnRlcnNp
Z25hdHVyZSB0aGF0IGRvZXMgKm5vdCogY292ZXIgdGhlIE9TQ09SRSBPcHRpb24/DQo+PiBT
YW1lIHF1ZXN0aW9uIGZvciB0aGUgcGFyYWdyYXBoOg0KPj4gCU5vdGUgdGhhdCwgYnkgY2hh
bmdpbmcgdGhlIFBhcnRpYWwgSVYgYXMgZGlzY3Vzc2VkIGFib3ZlLCBhbnkgbWVtYmVyDQo+
PiAJICAgb2YgRzEgd291bGQgYWxzbyBiZSBhYmxlIHRvIGZvcmdlIGEgdmFsaWQgc2lnbmVk
IHJlc3BvbnNlIG1lc3NhZ2UgTTINCj4+IAkgICB0byBiZSBpbmplY3RlZCBpbiB0aGUgc2Ft
ZSBncm91cCBHMS4NCj4+IChJbiBvdGhlciB3b3JkczogZG8gd2Ugd2FudCB0byBzYXkgaGVy
ZSB0aGF0IGEgbWVtYmVyIG9mIEcyIGNhbiAqbm90KiBmb3JnZSBhIHZhbGlkIHNpZ25lZCBy
ZXNwb25zZSBtZXNzYWdlIE0yLCBiZWNhdXNlIHdlIG5vdyBoYXZlIGEgY291bnRlcnNpZ25h
dHVyZSB0aGF0IGNvdmVycyB0aGUgT1NDT1JFIE9wdGlvbj8NCj4+IE9yIGRvIHdlIHdhbnQg
dG8gc2F5IHRoYXQgYSBtZW1iZXIgb2YgRzIgKmNhbiogZm9yZ2UgaW4gcmVhbC10aW1lLikN
Cj4gPT0+TVQNCj4gU3RhcnRpbmcgZnJvbSB0aGUgcGFyYWdyYXBoICJJZiB0aGUgY291bnRl
cnNpZ25hdHVyZSBkaWQgbm90IGNvdmVyIC4uLiINCj4gLCB0aGUgdGV4dCBkaXNjdXNzZXMg
dGhlIGh5cG90aGV0aWNhbCBjYXNlIG9mIHRoZSBjb3VudGVyc2lnbmF0dXJlICpub3QqDQo+
IGNvdmVyaW5nIHRoZSBPU0NPUkUgb3B0aW9uLg0KPg0KPiBUbyBtYWtlIGl0IGNsZWFyZXIg
YW5kIGVuc3VyZSB0aGF0IHRoZSByZWFkZXIgZG9lcyBub3QgbG9vc2UgY29udGV4dCwgd2UN
Cj4gY2FuIHBlcmZvcm0gdGhlIGZvbGxvd2luZyBlZGl0b3JpYWwgZml4ZXMsIGJ5IGFsc28g
bGV2ZXJhZ2luZyBhIGJ1bGxldA0KPiBsaXN0IGFuZCBpdHMgaW5kZW50YXRpb24uDQo+DQo+
ICINCj4gSWYsIGh5cG90aGV0aWNhbGx5LCB0aGUgY291bnRlcnNpZ25hdHVyZSBkaWQgbm90
IGNvdmVyIHRoZSBPU0NPUkUgb3B0aW9uOg0KPg0KPiAqIFRoZSBhdHRhY2sgZGVzY3JpYmVk
IGluIFNlY3Rpb24gMTEuNy4xIHdvdWxkIHN0aWxsIGJlIHBvc3NpYmxlIGFnYWluc3QNCj4g
cmVzcG9uc2UgbWVzc2FnZXMgLi4uDQo+DQo+ICogQSBzaW1wbGlmaWNhdGlvbiB3b3VsZCBh
bHNvIGJlIHBvc3NpYmxlIGluIHBlcmZvcm1pbmcgdGhlIGF0dGFjaywNCj4gc2luY2UgWiBp
cyBhYmxlIHRvIC4uLg0KPg0KPiAgIMKgwqAgU2luY2UgdGhlIFBhcnRpYWwgSVYgaXMgNSBi
eXRlcyBpbiBzaXplLCAuLi4NCj4NCj4gICDCoMKgIE5vdGUgdGhhdCwgYnkgY2hhbmdpbmcg
dGhlIFBhcnRpYWwgSVYgLi4uDQo+ICINCj4NCj4NCj4gUFJPUE9TQUw6IHBlcmZvcm0gdGhl
IGVkaXRvcmlhbCB1cGRhdGVzIGFib3ZlLg0KPiA8PT0NCj4NCj4+IFJlZmVyZW5jZXMNCj4+
IFF1aXRlIGEgbnVtYmVyIG9mIHJlZmVyZW5jZXMgYXJlIGluZm9ybWF0aXZlLiBUaGlzIG1h
eSBuZWVkIHRvIGJlIGNoYW5nZWQgZm9yIHNvbWUsIGJhc2VkIG9uIHRoZSBndWlkZWxpbmVz
IGluIGh0dHBzOi8vZXVyMDUuc2FmZWxpbmtzLnByb3RlY3Rpb24ub3V0bG9vay5jb20vP3Vy
bD1odHRwcyUzQSUyRiUyRnd3dy5pZXRmLm9yZyUyRmFib3V0JTJGZ3JvdXBzJTJGaWVzZyUy
RnN0YXRlbWVudHMlMkZub3JtYXRpdmUtaW5mb3JtYXRpdmUtcmVmZXJlbmNlcyUyRiZhbXA7
ZGF0YT0wNCU3QzAxJTdDbWFyY28udGlsb2NhJTQwcmkuc2UlN0MwZWVjYjdlOWRiZWU0MTg1
ZjcyZTA4ZGEwMWI1M2UzNSU3QzVhOTgwOWNmMGJjYjQxM2E4MzhhMDllY2M0MGNjOWU4JTdD
MCU3QzAlN0M2Mzc4MjQxNzU3ODU2MDY3NDAlN0NVbmtub3duJTdDVFdGcGJHWnNiM2Q4ZXlK
V0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRpSTZJazFoYVd3aUxDSlhW
Q0k2TW4wJTNEJTdDMTAwMCZhbXA7c2RhdGE9VFRCSEVHdVdpd25LdHg4bGFoMGpIJTJCdEwz
TXZBYkMlMkZPZmhPb3NKeGdpT1UlM0QmYW1wO3Jlc2VydmVkPTAuDQo+ID09Pk1UDQo+IFRo
YW5rcywgZXNwZWNpYWxseSB0d28gcG9pbnRzIHNob3VsZCBiZSBjb25zaWRlcmVkIGZyb20g
dGhlIGd1aWRlbGluZXMNCj4gKHJlc3RhdGVkIGhlcmUgZm9yIHJlZmVyZW5jZSBpbiB0aGUg
Zm9sbG93aW5nIGNvbW1lbnRzKS4NCj4NCj4gR0wxOiAiTm9ybWF0aXZlIHJlZmVyZW5jZXMg
c3BlY2lmeSBkb2N1bWVudHMgdGhhdCBtdXN0IGJlIHJlYWQgdG8NCj4gdW5kZXJzdGFuZCBv
ciBpbXBsZW1lbnQgdGhlIHRlY2hub2xvZ3kgaW4gdGhlIG5ldyBSRkMsIG9yIHdob3NlDQo+
IHRlY2hub2xvZ3kgbXVzdCBiZSBwcmVzZW50IGZvciB0aGUgdGVjaG5vbG9neSBpbiB0aGUg
bmV3IFJGQyB0byB3b3JrLiINCj4NCj4gR0wyOiAiRXZlbiByZWZlcmVuY2VzIHRoYXQgYXJl
IHJlbGV2YW50IG9ubHkgZm9yIG9wdGlvbmFsIGZlYXR1cmVzIG11c3QNCj4gYmUgY2xhc3Np
ZmllZCBhcyBub3JtYXRpdmUgaWYgdGhleSBtZWV0IHRoZSBhYm92ZSBjb25kaXRpb25zIGZv
cg0KPiBub3JtYXRpdmUgcmVmZXJlbmNlcy4iDQo+IDw9PQ0KPg0KPj4gUmVmZXJlbmNlIFtJ
LUQubWF0dHNzb24tY2ZyZy1kZXQtc2lncy13aXRoLW5vaXNlXSBpcyB1c2VkIGluIGEgbm9y
bWF0aXZlIHJlcXVpcmVtZW50IChTSE9VTEQpLCBzbyB0aGUgcmVmZXJlbmNlIHNob3VsZCBi
ZSBub3JtYXRpdmUgZXZlbiB0aG91Z2ggc29tZSBpbXBsZW1lbnRhdGlvbnMgbWF5IG5vdCB1
c2UgaXQuICAoQXNzdW1wdGlvbiBoZXJlIGlzIHRoYXQgbW9zdCB3aWxsLikNCj4gPT0+TVQN
Cj4gRm9yIGluZm9ybWF0aW9uLCBub3RlIHRoYXQgU2VjdGlvbiAxIG9mDQo+IFtJLUQubWF0
dHNzb24tY2ZyZy1kZXQtc2lncy13aXRoLW5vaXNlXSBzYXlzOg0KPg0KPiDigJxQcm9kdWNl
ZCBzaWduYXR1cmVzIHJlbWFpbiBmdWxseSBjb21wYXRpYmxlIHdpdGggdW5tb2RpZmllZCBF
Q0RTQSBhbmQNCj4gRWREU0EgdmVyaWZpZXJzIGFuZCBleGlzdGluZyBrZXkgcGFpcnMgY2Fu
IGNvbnRpbnVlIHRvIGJlIHVzZWQu4oCdDQo+DQo+IFRoYXQgaXMsIHRoZSBhcHByb2FjaCBj
YW4gYmUgdXNlZCB3aXRoIG9ubHkgb25lIGNvbW11bmljYXRpb24gc2lkZQ0KPiBzdXBwb3J0
aW5nIGl0Lg0KPg0KPiBSZWdhcmRsZXNzLCB3aGlsZSBrZWVwaW5nIHRoZSByZWZlcmVuY2Ug
YXMgaW5mb3JtYXRpdmUsIHBvc3NpYmxlDQo+IGFsdGVybmF0aXZlcyB0byB0YWtlIGluIFNl
Y3Rpb24gMTAgZm9yIGFkZHJlc3NpbmcgdGhlIGd1aWRlbGluZSBHTDEgY2FuIGJlOg0KPg0K
PiAqIENoYW5naW5nICJSRUNPTU1FTkRFRCIgdG8gInJlY29tbWVuZGVkIi4NCj4NCj4gKiBS
ZXBocmFzaW5nIHRoZSB3aG9sZSBidWxsZXQgcG9pbnQgYXMgZm9sbG93cywgb3Igc2ltaWxh
cjoNCj4NCj4gT0xEOg0KPiBJZiBlbGxpcHRpYyBjdXJ2ZSBzaWduYXR1cmVzIGFyZSB1c2Vk
LCBpdCBpcyBSRUNPTU1FTkRFRCB0byBpbXBsZW1lbnQNCj4gZGV0ZXJtaW5pc3RpYyBzaWdu
YXR1cmVzIHdpdGggYWRkaXRpb25hbCByYW5kb21uZXNzIGFzIHNwZWNpZmllZCBpbg0KPiBb
SS1ELm1hdHRzc29uLWNmcmctZGV0LXNpZ3Mtd2l0aC1ub2lzZV0uDQo+DQo+IE5FVzoNCj4g
4oCcSWYgZWxsaXB0aWMgY3VydmUgc2lnbmF0dXJlcyBhcmUgdXNlZCwgaXQgaXMgUkVDT01N
RU5ERUQgZm9yDQo+IGRlcGxveW1lbnRzIHdoZXJlIHNpZGUtY2hhbm5lbCBhbmQgZmF1bHQg
aW5qZWN0aW9uIGF0dGFja3MgYXJlIGEgY29uY2Vybg0KPiB0byBpbXBsZW1lbnQgZGV0ZXJt
aW5pc3RpYyBzaWduYXR1cmVzIHdpdGggYWRkaXRpb25hbCByYW5kb21uZXNzLCBmb3INCj4g
ZXhhbXBsZSBieSB1c2luZyB0aGUgY29uc3RydWN0aW9ucyBzcGVjaWZpZWQgaW4NCj4gW0kt
RC5tYXR0c3Nvbi1jZnJnLWRldC1zaWdzLXdpdGgtbm9pc2VdLuKAnQ0KPg0KPg0KPiBQUk9Q
T1NBTDoga2VlcCB0aGUgcmVmZXJlbmNlIGluZm9ybWF0aXZlIGFuZCB0YWtlIG9uZSBvZiB0
aGUgdHdvDQo+IGFsdGVybmF0aXZlcyBhYm92ZSAocHJlZmVyYWJseSB0aGUgc2Vjb25kIG9u
ZSkuDQo+IDw9PQ0KPg0KPj4gU2ltaWxhciBmb3IgW0ktRC5pZXRmLWFjZS1rZXktZ3JvdXBj
b21tLW9zY29yZV0sICAgIFtJLUQuaWV0Zi1hY2Uta2V5LWdyb3VwY29tbS1vc2NvcmVdOiB1
c2VkIGluIGEgU0hPVUxELg0KPiA9PT5NVA0KPiBUaGUgb2NjdXJyZW5jZXMgaW4gcXVlc3Rp
b24gYXJlOg0KPg0KPiAqIFNlY3Rpb24gMyAiVGhlIEdyb3VwIE1hbmFnZXIiOiBJdCBpcyBS
RUNPTU1FTkRFRCB0byB1c2UgYSBHcm91cA0KPiBNYW5hZ2VyIGFzIGRlc2NyaWJlZCBpbiBb
SS1ELmlldGYtYWNlLWtleS1ncm91cGNvbW0tb3Njb3JlXS4NCj4NCj4gKiBTZWN0aW9uIDMu
MiAiTWFuYWdlbWVudCBvZiBHcm91cCBLZXlpbmcgTWF0ZXJpYWwiOiBUaGUgc3BlY2lmaWMg
Z3JvdXANCj4ga2V5IG1hbmFnZW1lbnQgc2NoZW1lIHVzZWQgdG8gZGlzdHJpYnV0ZSBuZXcg
a2V5aW5nIG1hdGVyaWFsLCBpcyBvdXQgb2YNCj4gdGhlIHNjb3BlIG9mIHRoaXMgZG9jdW1l
bnQuIEhvd2V2ZXIsIGl0IGlzIFJFQ09NTUVOREVEIHRoYXQgdGhlIEdyb3VwDQo+IE1hbmFn
ZXIgc3VwcG9ydHMgdGhlIEdyb3VwIFJla2V5aW5nIFByb2Nlc3MgZGVzY3JpYmVkIGluDQo+
IFtJLUQuaWV0Zi1hY2Uta2V5LWdyb3VwY29tbS1vc2NvcmVdLg0KPg0KPiAqIEFwcGVuZGl4
IEQgIlNldC11cCBvZiBOZXcgRW5kcG9pbnRzIjogSXQgaXMgUkVDT01NRU5ERUQgdGhhdCB0
aGUgam9pbg0KPiBwcm9jZXNzIGFkb3B0cyB0aGUgYXBwcm9hY2ggZGVzY3JpYmVkIGluDQo+
IFtJLUQuaWV0Zi1hY2Uta2V5LWdyb3VwY29tbS1vc2NvcmVdIC4uLg0KPg0KPg0KPiBUaGVy
ZSBhcmUgdHdvIHNhZmUgYWx0ZXJuYXRpdmUgdG8gdGFrZSBpbiB0aGUgc2VjdGlvbnMgYWJv
dmUgdG8gYWRkcmVzcw0KPiB0aGUgZ3VpZGVsaW5lIEdMMToNCj4NCj4gKiBNYWtlIHRoZSBy
ZWZlcmVuY2Ugbm9ybWF0aXZlLg0KPg0KPiAqIFJlbGF4IHRoZSBzdGF0ZW1lbnRzIHRvIGJl
IG5vbiBub3JtYXRpdmUsIHdoaWxlIHBvaW50aW5nIHRvIHRoZSBBQ0UNCj4gZG9jdW1lbnQg
cHJvdmlkaW5nIGEgcG9zc2libGUgR3JvdXAgTWFuYWdlciB0byB1c2UsIGFzIGluY2x1ZGlu
ZyBhbHNvIGENCj4gZ3JvdXAgcmVrZXlpbmcgcHJvY2VzcyBhbmQgYSBqb2luIHByb2Nlc3Mg
aW4gaXRzIHNwZWNpZmljYXRpb24uDQo+DQo+DQo+IFBST1BPU0FMOiB0YWtlIG9uZSBvZiB0
aGUgdHdvIGFsdGVybmF0aXZlcyBhYm92ZSAocHJlZmVyYWJseSB0aGUgc2Vjb25kIG9uZSkN
Cj4gPD09DQo+DQo+PiBDb0FQIE9ic2VydmUgUkZDIDc2NDEgcGxheXMgYW4gaW1wb3J0YW50
IHJvbGUgc28gc2hvdWxkIGJlIGEgbm9ybWF0aXZlIHJlZmVyZW5jZS4gIFRoYXQgaXMgdHJ1
ZSByZWdhcmRsZXNzIG9mIHRoZSBmYWN0IHRoYXQgT2JzZXJ2ZSBpcyBhbiBvcHRpb25hbCBm
ZWF0dXJlOyBzaW5jZSBtYW55IG9mIHRoZSBzZWN0aW9ucyBkZWZpbmUgc3BlY2lmaWMgcHJv
dG9jb2wgZWxlbWVudHMgZm9yIE9ic2VydmUgaS5lLiBpdCBkZWZpbmVzIG5ldyB0ZWNobm9s
b2d5IHRoYXQgYnVpbGRzIG5vcm1hdGl2ZWx5IG9uIE9ic2VydmUuDQo+ID09Pk1UDQo+IEFn
cmVlLCBhcyBjb25zaXN0ZW50IHdpdGggdGhlIGd1aWRlbGluZSBHTDIuDQo+DQo+DQo+IFBS
T1BPU0FMOiBtYWtlIFJGQyA3NjQxIGEgbm9ybWF0aXZlIHJlZmVyZW5jZS4NCj4gPD09DQo+
DQo+PiBSZWZlcmVuY2UgW0ktRC5pZXRmLWNvcmUtZWNoby1yZXF1ZXN0LXRhZ10gaXMgdXNl
ZCBpbiBhIG5vcm1hdGl2ZSBNVVNUIHJlcXVpcmVtZW50IChpbiAyLjUuMS4yKSwgc28gaGVy
ZSB0aGUgcmVmZXJlbmNlIHNob3VsZCBiZSBub3JtYXRpdmUuDQo+PiBPciBkbyBJIG1pc3Vu
ZGVyc3RhbmQgdGhpcz8gSXQgY2FuIGFsc28gYmUgaW50ZXJwcmV0ZWQgYXMgb25seSBBcHBl
bmRpeCBFIGJlaW5nIHRoZSB0YXJnZXQgb2YgdGhlIE1VU1QgcmVxdWlyZW1lbnQsIHdoaWxl
IFtJLUQuaWV0Zi1jb3JlLWVjaG8tcmVxdWVzdC10YWddIGlzIG9ubHkgaW5mb3JtYXRpdmUg
LSBidXQgdGhhdCBzZWVtcyB0byBiZSBub3QgdGhlIGNhc2UsIGFzIHRoZSBmb3JtYXQgb2Yg
dGhlIEVjaG8gb3B0aW9uIGlzIGFjdHVhbGx5IHVzZWQgaW4gdGhlIEFwcGVuZGl4IEUgYXBw
cm9hY2guIEluIG90aGVyIHdvcmRzIHlvdSBuZWVkIHRvIHJlYWQgW0ktRC5pZXRmLWNvcmUt
ZWNoby1yZXF1ZXN0LXRhZ10gZGVmaW5pdGlvbnMgdG8gaW1wbGVtZW50IHRoZSBzb2x1dGlv
biBvZiBBcHBlbmRpeCBFIGFuZCBpdCBjYW5ub3Qgd29yayBvdGhlcndpc2UuDQo+ID09Pk1U
DQo+IHRsZHI7IENvbnNpc3RlbnRseSB3aXRoIHRoZSBndWlkZWxpbmUgaW4gR0wyLCBhZ3Jl
ZSB0aGF0DQo+IGVjaG8tcmVxdWVzdC10YWcgc2hvdWxkIGJlIGEgbm9ybWF0aXZlIHJlZmVy
ZW5jZSBkdWUgdG8gU2VjdGlvbiAyLjUuMS4yLg0KPg0KPiBPcmlnaW5hbGx5LCBBcHBlbmRp
eCBFIHdhcyBpbnRlbmRlZCB0byBwcm92aWRlIGEgcG9zc2libGUgd2F5IHRvIGRlYWwNCj4g
d2l0aCBtZXNzYWdlIGZyZXNobmVzcyBhbmQgY2xpZW50IGFsaXZlbmVzcywgYXMgdGhlIGFu
YWxvZ291cyBvZg0KPiBBcHBlbmRpeCBCLjEuMiBvZiBSRkMgODYxMy4NCj4NCj4gVGh1cywg
Y29uc2lzdGVudGx5IHdpdGggUkZDIDg2MTMsIHdlOiBpKSB3cm90ZSBpdCBhcyBhbiBhcHBl
bmRpeA0KPiBwcmVzZW50aW5nIGEgcG9zc2libGUgYXBwcm9hY2ggdG8gdXNlIGZvciBzeW5j
aHJvbml6YXRpb247IGlpKSBoYWQNCj4gZWNoby1yZXF1ZXN0LXRhZyBhcyBhbiBpbmZvcm1h
dGl2ZSByZWZlcmVuY2U7IGlpaSkgaGFkIG5vdCBub3JtYXRpdmUNCj4gbGFuZ3VhZ2UgYWJv
dXQgaXQgaW4gU2VjdGlvbnMgNi4zICJNZXNzYWdlIEZyZXNobmVzcyIsIDExLjEzICJNZXNz
YWdlDQo+IEZyZXNobmVzcyIgYW5kIDExLjE0ICJDbGllbnQgQWxpdmVuZXNzIi4NCj4NCj4g
U2VjdGlvbiAyLjUuMS4yIGFuZCB0aGUgcHJvYmxlbSBpdCBkaXNjdXNzZXMgY2FtZSBsYXRl
ciwgYW5kIGFkbWl0dGVkbHkNCj4gcmFpc2UgdGhlIGJhciBhYm91dCB0aGUgcm9sZSBhbmQg
aW1wb3J0YW5jZSBvZiBlY2hvLXJlcXVlc3QtdGFnLCB3aGljaA0KPiBpcyBzdGlsbCBwcmVz
ZW50ZWQgYXMgb25lIG9mIHR3byBhbHRlcm5hdGl2ZXMsIGJ1dCBhbHNvIGFzIHRoZQ0KPiBS
RUNPTU1FTkRFRCBvbmUuDQo+DQo+IFRodXMsIGl0IHNvdW5kcyByaWdodCB0byBtYWtlIGVj
aG8tcmVxdWVzdC10YWcgYSBub3JtYXRpdmUgcmVmZXJlbmNlLg0KPg0KPg0KPiBQUk9QT1NB
TDogbWFrZSBkcmFmdC1pZXRmLWNvcmUtZWNoby1yZXF1ZXN0LXRhZyBhIG5vcm1hdGl2ZSBy
ZWZlcmVuY2UuDQo+IDw9PQ0KPg0KPj4gQXBwZW5kaWNlcw0KPj4gQWxsOiBTb21lIGFwcGVu
ZGljZXMgaGF2ZSBub3JtYXRpdmUgbGFuZ3VhZ2U7IHNvIGl0IHNlZW1zIHRoZXkgYXJlIG5v
dCBtZXJlbHkgaW5mb3JtYXRpdmUuIElzIHRoZXJlIGEgcGFydGljdWxhciByZWFzb24gZm9y
IHB1dHRpbmcgdGhpcyBpbmZvcm1hdGlvbiBpbiBhbiBhcHBlbmRpeCBhbmQgbm90IGluIG1h
aW4gdGV4dD8NCj4+IFNob3VsZCB3ZSBpbmRpY2F0ZSBpbiB0aGUgaW50cm9kdWN0aW9uIHdo
aWNoIEFwcGVuZGljZXMgYXJlIG5vcm1hdGl2ZSBhbmQgd2hpY2ggaW5mb3JtYXRpdmU/DQo+
ID09Pk1UDQo+IFRoaXMgaXMgdGhlIGNhc2UgZm9yIEFwcGVuZGl4IEQgYW5kIEFwcGVuZGl4
IEUuDQo+DQo+IEFzIHRvIEFwcGVuZGl4IEQgIlNldC11cCBvZiBOZXcgRW5kcG9pbnRzIiwg
aXQgdXNlcyBSRUNPTU1FTkRFRCBvbmNlLA0KPiBmb3IgZHJhZnQtaWV0Zi1hY2Uta2V5LWdy
b3VwY29tbS1vc2NvcmUgcmVnYXJkaW5nIHRoZSBqb2luIHByb2Nlc3MgdG8NCj4gdXNlLiBI
b3dldmVyLCB0aGlzIGlzIHNpbXBseSByZXN0YXRpbmcgdGhlIHNhbWUgbm9ybWF0aXZlIHJl
Y29tbWVuZGF0aW9uDQo+IGZyb20gU2VjdGlvbiAzLiBJdCBzaG91bGQgaGVscCB0byBzaW1w
bHkgY2hhbmdlICJSRUNPTU1FTkRFRCIgdG8NCj4gInJlY29tbWVuZGVkIiBpbiBBcHBlbmRp
eCBELiBIb3dldmVyLCBiYXNlZCBvbiBhIHByZXZpb3VzIGNvbW1lbnQsIHRoaXMNCj4gcmVj
b21tZW5kYXRpb24gdGhyb3VnaG91dCB0aGUgZG9jdW1lbnQgY2FuIGJlIHJlbGF4ZWQgdG8g
YmUNCj4gbm9uLW5vcm1hdGl2ZSBpbiB0aGUgZmlyc3QgcGxhY2UuDQo+DQo+IEFzIHRvIEFw
cGVuZGl4IEUgIkNoYWxsZW5nZS1SZXNwb25zZSBTeW5jaHJvbml6YXRpb24iLCB0aGUgYW5h
bG9nb3VzDQo+IEFwcGVuZGl4IEIuMS4yIG9mIFJGQyA4NjEzIGFsc28gdXNlcyBub3JtYXRp
dmUgbGFuZ3VhZ2UgKGp1c3QgbGlrZSBpdHMNCj4gQXBwZW5kaXggQi4yKS4gVGhhdCBpcywg
b25jZSBjbGFyaWZpZWQgdXBmcm9udCB0aGF0IHRoZSBhcHBlbmRpeA0KPiBkZXNjcmliZXMg
YSBwb3NzaWJsZSBhcHByb2FjaCwgaXQgc2hvdWxkIGJlIGZpbmUgdG8gdXNlIG5vcm1hdGl2
ZQ0KPiBsYW5ndWFnZSB0byBkZXNjcmliZSBkZXRhaWxzIGFib3V0IGhvdyB0aGF0IGFwcHJv
YWNoIGhhcyB0byB3b3JrIHdoZW4NCj4gdXNlZC4gSG93ZXZlciwgYmFzZWQgb24gdGhlIGZp
bmFsIGNvbW1lbnQgYmVsb3csIEFwcGVuZGl4IEUgbWlnaHQgYmVjb21lDQo+IGFuIGFjdHVh
bCBzZWN0aW9uIGluIHRoZSBkb2N1bWVudCBib2R5Lg0KPg0KPg0KPiBQUk9QT1NBTDogaW4g
QXBwZW5kaXggRCwgY2hhbmdlICJSRUNPTU1FTkRFRCIgdG8gInJlY29tbWVuZGVkIg0KPiAo
cmVnYXJkbGVzcyBvZiBob3cgdGhlIHJlY29tbWVuZGF0aW9uIGJlY29tZXMgaW4gdGhlIHJl
c3Qgb2YgdGhlIGRvY3VtZW50KS4NCj4gPD09DQo+DQo+PiBBcHBlbmRpeCBBLjENCj4+ICJN
dWx0aWNhc3QgZGF0YSBzZWN1cml0eSBjaXBoZXJzdWl0ZTogYWxsIG1lbWJlcnMgb2YgYSBz
ZWN1cml0eSBncm91cCBtdXN0IGFncmVlIG9uIGEgY2lwaGVyc3VpdGUiDQo+PiAtPiBJc24n
dCBpdCBkZXRlcm1pbmVkIGJ5IHRoZSBHTT8gRS5nLiB0aGUgR00gbmVlZHMgdG8gZXN0YWJs
aXNoIGEgY2lwaGVyc3VpdGUgdGhhdCBhbGwgbWVtYmVycyBjYW4gc3VwcG9ydC4gVGhlcmUn
cyBubyBhZ3JlZW1lbnQgcHJvdG9jb2wgb3Igc28uDQo+ID09Pk1UDQo+IENvcnJlY3QsIGl0
IGlzIGluZGVlZCBkZXRlcm1pbmVkIGJ5IHRoZSBHcm91cCBNYW5hZ2VyOyB0byBiZSBjbGFy
aWZpZWQNCj4gYXMsIGUuZy46ICJhbGwgbWVtYmVycyBvZiBhIHNlY3VyaXR5IGdyb3VwIG11
c3QgdXNlIGEgc2FtZSBjaXBoZXJzdWl0ZQ0KPiB0byAuLi4iLg0KPg0KPg0KPiBQUk9QT1NB
TDogY2xhcmlmeSB0aGUgcXVvdGVkIHNlbnRlbmNlLg0KPiA8PT0NCj4NCj4+IEFwcGVuZGl4
IEQNCj4+IAlJdCBpcyBSRUNPTU1FTkRFRCB0aGF0IHRoZSBqb2luIHByb2Nlc3MgYWRvcHRz
IHRoZSBhcHByb2FjaCBkZXNjcmliZWQNCj4+IAkgICBpbiBbSS1ELmlldGYtYWNlLWtleS1n
cm91cGNvbW0tb3Njb3JlXSBhbmQgYmFzZWQgb24gdGhlIEFDRSBmcmFtZXdvcmsNCj4+IAkg
ICBmb3IgQXV0aGVudGljYXRpb24gYW5kIEF1dGhvcml6YXRpb24gaW4gY29uc3RyYWluZWQg
ZW52aXJvbm1lbnRzDQo+PiAJICAgW0ktRC5pZXRmLWFjZS1vYXV0aC1hdXRoel0uDQo+PiAt
PiB0aGUgcGFydCAiYW5kIGJhc2VkIG9uIHRoZSBBQ0UgZnJhbWV3b3JrIC4uLiIgaXMgbm90
IHNvIGNsZWFyLiBJcyBhcHBseWluZyBbSS1ELmlldGYtYWNlLW9hdXRoLWF1dGh6XSBSRUNP
TU1FTkRFRD8gT3IgaXMgaXQganVzdCBpbmZvcm1hdGlvbmFsIHNheWluZyB0aGF0IFtJLUQu
aWV0Zi1hY2Uta2V5LWdyb3VwY29tbS1vc2NvcmVdIGlzIGJhc2luZyBpdHNlbGYgb24gW0kt
RC5pZXRmLWFjZS1vYXV0aC1hdXRoel0sIGFzIGEgIkZZSSIgc3RhdGVtZW50Pw0KPiA9PT5N
VA0KPiBUaGUgbGF0dGVyLg0KPg0KPg0KPiBQUk9QT1NBTDogbm8gYWN0aW9uLg0KPiA8PT0N
Cj4NCj4+IFNlY3Rpb24gMyBsYW5ndWFnZSBvbiB0aGlzIHNhbWUgc3ViamVjdCBpcyBtb3Jl
IGNsZWFyIGFuZCBjb3VsZCBiZSB1c2VkIGluc3RlYWQuICBPciBtYXliZSByZWZlciB0byB0
aGUgU2VjdGlvbiAzIHN0YXRlbWVudCBmcm9tIGhlcmUgdG8gYXZvaWQgZHVwbGljYXRpb24u
DQo+ID09Pk1UDQo+IFRoYW5rcyBmb3IgdGhlIHN1Z2dlc3Rpb24uDQo+DQo+DQo+IFBST1BP
U0FMOiByZXBocmFzZSBhcyBwZXIgU2VjdGlvbiAzLg0KPiA8PT0NCj4NCj4+IEFwcGVuZGl4
IEUNCj4+IEdpdmVuIHRoZSBub3JtYXRpdmUtcmVmZXJlbmNlcyBkaXNjdXNzaW9uIGFib3Zl
IGFuZCBub3JtYXRpdmUgcmVmZXJlbmNlcyBtYWRlIHRvIEFwcGVuZGl4IEUsIHdoeSBpc24n
dCB0aGlzIGNvbnRlbnQgaW4gYSBtYWluIGRvY3VtZW50IHNlY3Rpb24/DQo+ID09Pk1UDQo+
IFNlZSB0aGUgaGlzdG9yeSBvZiBBcHBlbmRpeCBFIGluIHRoZSByZXBseSB0byBhIHByZXZp
b3VzIGNvbW1lbnQuDQo+DQo+IEFzIGFsc28gbWVudGlvbmVkIGFib3ZlLCBkdWUgdG8gdGhl
IHJvbGUvaW1wb3J0YW5jZSBvZiBlY2hvLXJlcXVlc3QtdGFnDQo+IGluIHRoZSBtb3JlIHJl
Y2VudCBTZWN0aW9uIDIuNS4xLjIsIGl0IHdvdWxkIGJlIGdvb2QgdG8gbWFrZSBpdCBhDQo+
IHNlY3Rpb24gaW4gdGhlIGRvY3VtZW50IGJvZHksIGUuZy4sIGFmdGVyIHRoZSBjdXJyZW50
IFNlY3Rpb24gOSAiTWVzc2FnZQ0KPiBQcm9jZXNzaW5nIGluIFBhaXJ3aXNlIE1vZGUiLg0K
Pg0KPiBDb25zaXN0ZW50bHksIGFuZCBhcyBkaXNjdXNzZWQgaW4gYSBjb21tZW50IGFib3Zl
LCBlY2hvLXJlcXVlc3QtdGFnDQo+IHdvdWxkIGFsc28gYmVjb21lIGEgbm9ybWF0aXZlIHJl
ZmVyZW5jZS4NCj4NCj4NCj4gUFJPUE9TQUw6IGlmIGFncmVlZCwgbW92ZSBBcHBlbmRpeCBF
IHRvIHRoZSBkb2N1bWVudCBib2R5Lg0KPiA8PT0NCj4NCj4NCj4gPT0+TVQNCj4gVGhhbmtz
IGEgbG90IGFnYWluIQ0KPiA8PT0NCj4NCj4+DQo+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2Ut
LS0tLQ0KPj4gRnJvbTogY29yZSA8Y29yZS1ib3VuY2VzQGlldGYub3JnPiBPbiBCZWhhbGYg
T2YgSmFpbWUgSmltw6luZXoNCj4+IFNlbnQ6IFR1ZXNkYXksIE5vdmVtYmVyIDksIDIwMjEg
MjA6MDANCj4+IFRvOiBjb3JlQGlldGYub3JnDQo+PiBDYzogZHJhZnQtaWV0Zi1jb3JlLW9z
Y29yZS1ncm91cGNvbW0uYXV0aG9yc0BpZXRmLm9yZw0KPj4gU3ViamVjdDogW2NvcmVdIPCf
lJQgV0cgTGFzdCBDYWxsIG9mIGRyYWZ0LWlldGYtY29yZS1vc2NvcmUtZ3JvdXBjb21tDQo+
Pg0KPj4gRGVhciBDb1JFLA0KPj4NCj4+IGFzIHdlIGRpc2N1c3NlZCB5ZXN0ZXJkYXksIHRo
ZSBhdXRob3JzIG9mIGRyYWZ0LWlldGYtY29yZS1vc2NvcmUtZ3JvdXBjb21tIHRoaW5rIHRo
ZWlyIGRyYWZ0IGlzIHJlYWR5IGZvciBhIDJuZCBXR0xDLiBUaGUgY3VycmVudCB2ZXJzaW9u
IG9mIHRoZSBkcmFmdCAodjEzKSBpcyBub3QgZXhwZWN0aW5nIGFueSB1cGRhdGVzIHNvIHlv
dSBjYW4gc3RhcnQgeW91ciBwbGFubmVkIHJldmlld3MuDQo+Pg0KPj4gaHR0cHM6Ly9ldXIw
NS5zYWZlbGlua3MucHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJG
ZGF0YXRyYWNrZXIuaWV0Zi5vcmclMkZkb2MlMkZodG1sJTJGZHJhZnQtaWV0Zi1jb3JlLW9z
Y29yZS1ncm91cGNvbW0tMTMmYW1wO2RhdGE9MDQlN0MwMSU3Q21hcmNvLnRpbG9jYSU0MHJp
LnNlJTdDMGVlY2I3ZTlkYmVlNDE4NWY3MmUwOGRhMDFiNTNlMzUlN0M1YTk4MDljZjBiY2I0
MTNhODM4YTA5ZWNjNDBjYzllOCU3QzAlN0MwJTdDNjM3ODI0MTc1Nzg1NjA2NzQwJTdDVW5r
bm93biU3Q1RXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJ
aUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMCUzRCU3QzEwMDAmYW1wO3NkYXRhPXZSQ3pu
JTJCaHZvYWxCU09IRlNDTVpQRk5rTHpEciUyRlpQUlFYNXVYZzE3OUFRJTNEJmFtcDtyZXNl
cnZlZD0wDQo+Pg0KPj4gSW4gYWRkaXRpb24gdG8gdGhlIGVtYWlsIGxpc3QgZGlzY3Vzc2lv
biByZXZpZXdlcnMgY291bGQgY29uc2lkZXIgb3BlbmluZyBuZXcgaXNzdWVzIG9uIHRoZSBH
aXRodWIgcmVwbyBvZiB0aGUgZHJhZnQgYXMgY291cnRlc3kgdG8gdGhlIGF1dGhvcnMuDQo+
Pg0KPj4gaHR0cHM6Ly9ldXIwNS5zYWZlbGlua3MucHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/
dXJsPWh0dHBzJTNBJTJGJTJGZ2l0aHViLmNvbSUyRmNvcmUtd2clMkZvc2NvcmUtZ3JvdXBj
b21tJmFtcDtkYXRhPTA0JTdDMDElN0NtYXJjby50aWxvY2ElNDByaS5zZSU3QzBlZWNiN2U5
ZGJlZTQxODVmNzJlMDhkYTAxYjUzZTM1JTdDNWE5ODA5Y2YwYmNiNDEzYTgzOGEwOWVjYzQw
Y2M5ZTglN0MwJTdDMCU3QzYzNzgyNDE3NTc4NTYwNjc0MCU3Q1Vua25vd24lN0NUV0ZwYkda
c2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhh
V3dpTENKWFZDSTZNbjAlM0QlN0MxMDAwJmFtcDtzZGF0YT1CZENqRmlzOHBuSzJ3dEp6VW9p
Q2NPRjJDZnFVeGVJZjlnM3liSGJDVUpNJTNEJmFtcDtyZXNlcnZlZD0wDQo+Pg0KPj4gQXMg
d2UgaGF2ZSB0aGUgSUVURiBvbmdvaW5nIGFuZCB0aGUgZG9jdW1lbnQgbmVlZHMgdGltZSB0
byBiZSBkaWdlc3RlZCwgd2UgcGxhY2UgdGhlIGVuZCBvZiB0aGUgY2FsbCBvbiB0aGUgMXN0
IG9mIERlY2VtYmVyIHdpdGggYSBwb3NzaWJpbGl0eSBvZiBleHRlbnNpb24gZGVwZW5kaW5n
IG9uIHRoZSBudW1iZXIgb2YgcmV2aWV3cy4NCj4+DQo+PiA+RnJvbSB0aGUgbWludXRlcyBJ
IHRha2UgdGhhdCBDQSwgUkgsIEVEIGFuZCBURiB3b3VsZCBnaXZlIGl0IHRob3JvdWdoIGxv
b2suIFRoYW5rIHlvdSBhbHJlYWR5IGZvciB0aGF0LCBtdWNoIGFwcHJlY2lhdGVkISENCj4+
DQo+PiBDaWFvIQ0KDQotLSANCk1hcmNvIFRpbG9jYQ0KUGguRC4sIFNlbmlvciBSZXNlYXJj
aGVyDQoNCkRpdmlzaW9uOiBEaWdpdGFsIFN5c3RlbXMNCkRlcGFydG1lbnQ6IENvbXB1dGVy
IFNjaWVuY2UNClVuaXQ6IEN5YmVyc2VjdXJpdHkNCg0KUklTRSBSZXNlYXJjaCBJbnN0aXR1
dGVzIG9mIFN3ZWRlbg0KaHR0cHM6Ly93d3cucmkuc2UNCg0KUGhvbmU6ICs0NiAoMCk3MCA2
MCA0NiA1MDENCklzYWZqb3Jkc2dhdGFuIDIyIC8gS2lzdGFnw6VuZ2VuIDE2DQpTRS0xNjQg
NDAgS2lzdGEgKFN3ZWRlbikNCg0K
--------------t2k1ajseIYZD0EM6RXzSwq5F
Content-Type: application/pgp-keys; name="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Disposition: attachment; filename="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DAOQG
-----END PGP PUBLIC KEY BLOCK-----

--------------t2k1ajseIYZD0EM6RXzSwq5F--

--------------qQmD8YEa0Pl0d6W2ztXZXVtS--

--------------lpySSIH3cwNHzEDkcbEGeQEo
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOEo4cV326Z7GypVg7iZktA5Y2kMFAmIozH8FAwAAAAAACgkQ7iZktA5Y2kOU
Ggf/S3Qli1s9GRSpx2r4HrHYwgSwsSivo8RBuR3dXTqpkUTATMn5eCcqE3xpFTjmD8aYCYtSoH2V
hUrdqy2e9pUT0Rv1fu0l+LnJnaYqnGgyTzrwLmEcmrYrgCkRgncoK/R3c2KuHYhHE0Ddz/8qEH46
fDxnJDa8KwN1A0mnZAhj5Qxoaqlfzl/WePQoVQUaK5VyWcpPonHRXmErmASxZ/tiENkG+j8vlVXo
XsBpHr8w2TUelUwWZ3PG08nipyb9KlaJkhkYTVKBJhFTCn+w4CrXAGtB30+CkUpRwo//MDk+ocJr
/qI6tPnHaptydy2cjClQ8wCOlXm6O2tod8cvqcOizg==
=XBNl
-----END PGP SIGNATURE-----

--------------lpySSIH3cwNHzEDkcbEGeQEo--


From nobody Wed Mar  9 15:00:28 2022
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 574B43A11CD for <core@ietfa.amsl.com>; Wed,  9 Mar 2022 15:00:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.112
X-Spam-Level: 
X-Spam-Status: No, score=-2.112 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zVVd_uua1Twy for <core@ietfa.amsl.com>; Wed,  9 Mar 2022 15:00:11 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70080.outbound.protection.outlook.com [40.107.7.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A89F3A1196 for <core@ietf.org>; Wed,  9 Mar 2022 15:00:10 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MWzfVeZUV1Un4JhhW9AyFgDgsp+O2LUBl9uOPLMx9pBPW4Q/4OIsoQYDLHFq9s4KcYi85m3Tz1qYQC50PX0/ao537tFJAHxtn98wB0YKGGU7QJUrleKe931sc7EssjJesPvmhE3jLZ4aAIgNeIiab8u6Oa9J92C0smRSlfKFC/kKxzs1iRMRrdxpCgzBtlKLVw/8PoJeH5svIR8OhonhFnkmXKnXlQIOFsEVRrkvnG/anu4nt7vxkm2RhsZYQpIcwINoYIfWTpRwVTqiWjuZzuALSJ7lyYUxWXP5/6EnE2jmE2rfbOpoyfJIOgopT6t8rsnWY+4eF0qdbK1LCqIrqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g+IvFUZ0eoVTI9ePQNXekBYikBb+wb555t65dIvZbUc=; b=Dk/zHOA9wQKydb5d5mT4759T2vpDnBUnsom5+KclWsoo8mrzCbk+6qeBrrBxAsKmnDC9UswrQB02u/CQynOF0sR2FFjERg3EgHHvY8x5yAVR9Ex9l/vA3gXdMyWzio3UkUyigzcUDxcYouPSdQXReaXYr2JMa10xJM05jJon/CdvVmVSrstNzNXq7B5eXbIJobnNcXrnErtb2w9JWIhRiKfg7bdZ3dW70yhCPAptGBlyKp8ju6lhguAKrZojj3PpkTbZzQCLWI95jPlfawJmA28z1eOwsB0SZGxaXVjPkOLKfXQhbiMPxwGZyqRirlC5lyCd2hom9VN7s1w266kj6Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g+IvFUZ0eoVTI9ePQNXekBYikBb+wb555t65dIvZbUc=; b=A1vVEN1HXHoSkJIJmQ1GWqViFTuwnBis2DTljWt4m/r7D0M2k5b/dWCbIAmxLWVpdKWnOroUTZgjIRei1LghtpRc2dHCnIKf44r6tHX656OuuH+hKFb6DeWicM3YqpfLKMZ7tXEpZoIhxcdBMuHhe0ZrxzuId08sAdBzJt25NwE=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by VI1P189MB0589.EURP189.PROD.OUTLOOK.COM (2603:10a6:802:2f::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.26; Wed, 9 Mar 2022 23:00:05 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::b0ea:12ff:4a7e:a24c]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::b0ea:12ff:4a7e:a24c%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022 23:00:05 +0000
Message-ID: <e76b177a-7edf-0c4a-dc87-cf636ec686d5@ri.se>
Date: Thu, 10 Mar 2022 00:00:02 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
From: Marco Tiloca <marco.tiloca@ri.se>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------5QhRpwyyj2mSJXw22AxUe4g1"
X-ClientProxiedBy: GV3P280CA0013.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:b::34) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6088bc3a-9a4e-4706-d5d5-08da02208c8e
X-MS-TrafficTypeDiagnostic: VI1P189MB0589:EE_
X-Microsoft-Antispam-PRVS: <VI1P189MB05895D03197D8B8F6C019113990A9@VI1P189MB0589.EURP189.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(44832011)(316002)(6916009)(8936002)(5660300002)(235185007)(33964004)(6506007)(86362001)(6666004)(36756003)(966005)(6512007)(508600001)(31696002)(6486002)(31686004)(38100700002)(2616005)(21480400003)(186003)(26005)(66946007)(66476007)(8676002)(83380400001)(66556008)(2906002)(45980500001)(43740500002); DIR:OUT; SFP:1101; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?aWoxelQ0K21GaGVDaTY4UlRBRFBoTC9DSnlEUVhqdXJXZGxUeGh2MElVeEdK?= =?utf-8?B?dWJGTSt1dk1qYjdVYkVLczM1bk9YSDQ3N3dST1NKWWVSOUgzdGswQjBBOHNL?= =?utf-8?B?eGVrRlA2Zi9PNlNtME13d082SlJIV0VjL2FsODdYYnV0bW9pKzJKMFFoQXZx?= =?utf-8?B?dFB5UFlUQURWODMrdTU5bENwUldlT1YvelBhN09LRkVHNi8wWVlJYVNPWU1Z?= =?utf-8?B?cFhGWXkyV1VTY2FON2w4R3Joc3FTU1J1Y2FhZnZ0ZUZQN081czZKYTVvWmFO?= =?utf-8?B?TkJUVlRveVAzQUR3Zy96SzdYZDIvK0FTYmxWbXlremdxemViYTdUR1AyZTEz?= =?utf-8?B?TTlUVHNpOGpJbkI5aFg0eThnV1NjMG1Qam9DRXpDdlRySFRpN3ViRXpiOHdZ?= =?utf-8?B?dUNaRUVxUjYyVnFKN0lFeXhuVTFIVzZGK3hrYjJhMEdlcDBreHRtVXRWdjV5?= =?utf-8?B?VFdCNENxL2VlMWxqN1RGRTJJMFNjbUFBUjl0NnRLNksySEcxTFUyVi9sMzVx?= =?utf-8?B?cHVCU2lFZkp2Zm9XYnhacE9POVBtSmd6N05EZXpKOHVNSll4SFk1Ui9HSEV4?= =?utf-8?B?OGVWYmVIaHFMNXNpZmtnclcralB6ZUJmcVRyRHBhZ0V0WlFqdUdqcnkyK2pm?= =?utf-8?B?bE5CRWo2aXBZZkJZQW5aTEpoRFdpb3oxL2F2VHEzSDY3T0JnSWhpcVJySHJS?= =?utf-8?B?eTJtbi9QUFdWQ0tUTnFmS0lkVEZ6Q3pOY1RSV0FGeFdGNUNzZEh5VkZ2amx2?= =?utf-8?B?VGN6Vi81dzBQaEowNzJoQnpyZ0U0aFFqcytXK1hoMlA2VThWdHVYVEViYWJy?= =?utf-8?B?SzVtL09EdGFwR1JCT3lvUGRNb3NIZ3dzL1VHNldRV0hib2R0Z3JhdVNZSHM1?= =?utf-8?B?MEtXWmdBSjF6Y1h1WHdYUTVlaGNGazNUMDhpNmdtR3pvanRqYXQzT01qMmRY?= =?utf-8?B?OXVmUTdzT0kxcFJNZTBTWEo3NTlWRmJxenk5R1NBQmFJa21Dei9nQ3VzKy9P?= =?utf-8?B?eEhZTnUwN2RYcmdMditHN0dLeUlTRGJ3aDE5eHhPbWl2Tm9rR1FIdFphSGlh?= =?utf-8?B?RnBtUDZRaC80U1VkUUcyV3JvZEdTUTZvNDhEMmhWaUR1dDFTREZabVNVVlFj?= =?utf-8?B?OHMrNkdEL3dXNHdQa3UwVlhpd25lVUh6ZTFXRitiUkRpU0x1elRWMGk3UnlD?= =?utf-8?B?MTAxOFdmb1VPeFlTeXFqaDlzYXFVbDFyVG1QRnlZMVdhUmRFOFlWYnc2cXRW?= =?utf-8?B?MlNzZzNDK1NlV1NMNkxxSTJzVTBrR0w4YkZGNDYvSEpGcUtzdXFDRHdQTkVn?= =?utf-8?B?MTZCNjdWRm91RHdNQWNPYzdQck53SVhYNEszbFhlcWVDU3U3cHJLVHRpdkww?= =?utf-8?B?NXc1QmI3VGZOb0kycjgrTjV0dEJudXZab01qdFgyN1cyeGt1Ty9KeER2elRP?= =?utf-8?B?Qm5RQTloQ1dPNW9Za1JXODhEOUY4MDlndDljVW5mK2FtZVZMWmxzN0VNUDBm?= =?utf-8?B?QTcxd3gvME5zUUVWekJ3Znh4UzVJakhXOWtTMEJyN3V6S1pnT3JrODF4anNJ?= =?utf-8?B?MkZubG9IZEF5allNeHMyc2NnNkc2SGZuQ1pndHQ1N1JBMFZkVFRZd2J5NUVJ?= =?utf-8?B?U3EvWStXZ0NmdTBYTy9xemgzS3NjZll1VEh1MWdIcTgyUytURHBiTmdWZVhh?= =?utf-8?B?Q1R6Sjg3M0VZVEZ3STRXbkw0cmVZMzlpRWtpLzZjWGdya2t4QkVDaVRWbkRX?= =?utf-8?B?YTRLb2ZLRkt1MkZCQ0dmWno2RXdzYVlMZHgxdHZZODdQQlYwK3hoUkJVR1V0?= =?utf-8?B?RWUxQlZNa3pPZUZDRVNOcnV3dW5WT3FVWjAxczViQVdyTVo4MG9Lem43VXVr?= =?utf-8?B?TDhSc1RGWDl2YXF4d2g0YWVnTHJadFJkZ21rcmRXZEcvR1pLS0hZRjlldEhI?= =?utf-8?B?ZVNINGNKeDIwb0ZIMFZjNnMycmM0ZVpNTS81UnltbEVLR0hteFBaVU5PZ0E2?= =?utf-8?B?UmtZcU1Qa0M4UHBGS3VKYUVVaFc1b2ErTnMvRFBVSm5tUmdzZjJtb3pKVmhv?= =?utf-8?B?MERvWjJNcVgwbHdkeWVEVjZFSzdZbFJEdzV1TDJzd3daZFplRDEyOHpIL0dH?= =?utf-8?B?RGdPSUp5QW1BSGlGSVhMQWRvR0VjU1RET2JuVmZkUFY0RTFCY1VKVExTREgv?= =?utf-8?Q?IGfrHTPLycNPFTpCQIvwZLc=3D?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 6088bc3a-9a4e-4706-d5d5-08da02208c8e
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 23:00:04.8925 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: MpYAbKe0jiHuUNwCSn+MSTuQ49ZUnqUVuPx0SnWkcNq/rtRhU1NE4edKonlM/5JmMSBGWfklfjDcgAZh6H/UAg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1P189MB0589
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/Jkn96UjMP9MuNks2i82qO9TPwAo>
Subject: [core] CoRE Agenda for IETF 113
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2022 23:00:26 -0000

--------------5QhRpwyyj2mSJXw22AxUe4g1
Content-Type: multipart/mixed; boundary="------------2p7xCoacENypELz13beG6IN2";
 protected-headers="v1"
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Message-ID: <e76b177a-7edf-0c4a-dc87-cf636ec686d5@ri.se>
Subject: [core] CoRE Agenda for IETF 113

--------------2p7xCoacENypELz13beG6IN2
Content-Type: multipart/mixed; boundary="------------qrxrOKmvwT98XSR3tImD9g2t"

--------------qrxrOKmvwT98XSR3tImD9g2t
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------qrxrOKmvwT98XSR3tImD9g2t
Content-Type: application/pgp-keys; name="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Disposition: attachment; filename="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DAOQG
-----END PGP PUBLIC KEY BLOCK-----

--------------qrxrOKmvwT98XSR3tImD9g2t--

--------------2p7xCoacENypELz13beG6IN2--

--------------5QhRpwyyj2mSJXw22AxUe4g1
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOEo4cV326Z7GypVg7iZktA5Y2kMFAmIpMXIFAwAAAAAACgkQ7iZktA5Y2kOw
FAf9H0Lq3PWD2Dtb6ILIzm3STJ4GSuImUJ3XJ64M3p9V5Tn0cgRvx7uogetBo8HIDR5b51m7eXmX
y2sW+m905xKvGa513zxFZ5FB85jLidQWiZpiuGhnJevPpfVLq8QzwabSet8wC9/Pe7VLMtMANdJ9
nKihPeIxv9GlruxsOczWI5ICus7Oku00FlFfjP+OsXSnDnCtvHhGpg35fzDcZU9gykXlU4ajdAh5
wCJMs2d4HHeeuUnJODPbk9voVDO/QYt/g9t3pV9XxpQ50nQKSDsLOiCHP6BzkFTg+sLvwhp1FJ6B
u7OlV5tiVGB47xKO8rvLjs0qPZiJEo6d8323ehUbvA==
=b3zY
-----END PGP SIGNATURE-----

--------------5QhRpwyyj2mSJXw22AxUe4g1--


From nobody Fri Mar 11 08:17:14 2022
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 329B13A03EC for <core@ietfa.amsl.com>; Fri, 11 Mar 2022 08:17:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.111
X-Spam-Level: 
X-Spam-Status: No, score=-7.111 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MEmap_IiLq0A for <core@ietfa.amsl.com>; Fri, 11 Mar 2022 08:17:06 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04on061d.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0d::61d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 228283A0121 for <core@ietf.org>; Fri, 11 Mar 2022 08:17:05 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DIHoTabwWnG6qDwgMOktVS2kzeuL5myaIZ7I0kktL65h+lUvQLUnqObBNh1ZZU2da9vskIF3yserXbxOZGGFUZKMbFEnlWh1r12ru1dMid/QuT7nbNi3UZ/CZHBjkHs9vbcbcmcszlO1PY1VOtpYh8HE5LTc7D9LkU3J/1dx99GNHaC2Rpp4psJ74lC7IBcs84viA1AGlz+A031UUanO/xQhV3KJRpA8rtgVY+6dYEEZ60y+iejsYF7EB/Qt0o7wU10yGKRRwGuZHGAUitnulJamtZMTPXI0IZEXsZUBnMSSj55bNXMoFCXQTOYLiIU9BMdAgwnZmzQINrifi/oS8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HB+ccXkzGBsBPkM3Tt1i5YW3u93iFfi9mpRfZRmLRDs=; b=LM2c1QWbYG6GIJ0xvOZGTAmX9uXEBPOWEWCmT7HhPsc56U3FpmJsqsfu3/1dj67MdNNlEO2wOyb1BYCgmtEbNrozFXZPp4POhIm7fh/TzFAnmDmssk1Hk1TEsJERcSVL2Qcdp/taXbU74mVBwyRSL3ejeVhI1xHEv7Lp876hGHaxQfcy6xHaGr+FFe+UhrVWQmqCcL7ja/53lLzVvwPXcbaVZQxhU6A6BgOgJVc686OLjcno1HC3HTOmfc6o+EostlV9n/ZfBrf0JvVNDvaPe97MIPfF9HDNErfAaqDadCb+LYYeRBK6hvWh408FVl+1mrjy+bMC40QPOupxenZ+sw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HB+ccXkzGBsBPkM3Tt1i5YW3u93iFfi9mpRfZRmLRDs=; b=JTxQZqzQ9+Ifjiwj9xkAwOyAhy4gUhx8CpBiDqHleGwyuuaH8vKb9t2EelFUaghOODmIvJZkdxL/wu+6Y2vIeGyYUNqq/v0wOO/HdzYFlUY0d+GBUsgg8EtwzgxwMkoZiq3eV7GxgK1VbPEMhgBECTqTxcf41iHL3IJgH+cHeFw=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by VE1P189MB1120.EURP189.PROD.OUTLOOK.COM (2603:10a6:800:16d::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar 2022 16:16:57 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d%6]) with mapi id 15.20.5061.024; Fri, 11 Mar 2022 16:16:53 +0000
Message-ID: <b0b687ef-015a-8af4-60c3-b830ccc84ddb@ri.se>
Date: Fri, 11 Mar 2022 17:16:35 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: supjps-ietf@jpshallow.com, Achim Kraus <achimkraus@gmx.net>
Cc: mohamed.boucadair@orange.com, core@ietf.org
References: <cadf5151-8f7f-9311-6987-de5bf533abe2@ri.se> <28040_1645773815_621883F7_28040_64_1_787AE7BB302AE849A7480A190F8B9330354999C4@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <55ce01d82a31$f052c530$d0f84f90$@jpshallow.com> <01663e0e-ccb7-84d2-08aa-3792799a783c@gmx.net> <5a5401d82a86$c10bf440$4323dcc0$@jpshallow.com>
From: Marco Tiloca <marco.tiloca@ri.se>
In-Reply-To: <5a5401d82a86$c10bf440$4323dcc0$@jpshallow.com>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------07IUhzQnFdMGCX8jeP6pOKA0"
X-ClientProxiedBy: GV3P280CA0070.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:a::25) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 696c9135-807c-40d6-b39b-08da037a84be
X-MS-TrafficTypeDiagnostic: VE1P189MB1120:EE_
X-Microsoft-Antispam-PRVS: <VE1P189MB1120F9859364DD24A054BEF6990C9@VE1P189MB1120.EURP189.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(45080400002)(6486002)(966005)(316002)(2616005)(86362001)(31696002)(6916009)(508600001)(6666004)(66574015)(21480400003)(186003)(26005)(53546011)(38100700002)(33964004)(6506007)(6512007)(83380400001)(44832011)(30864003)(31686004)(235185007)(8936002)(2906002)(66556008)(8676002)(66476007)(36756003)(5660300002)(66946007)(4326008)(45980500001)(43740500002); DIR:OUT; SFP:1101; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?T3QwRUg1S21EUUovUFRzNEV3aXpkelRxOEdxenBGMXdVL2xEL1g4anNGTU0x?= =?utf-8?B?YUdYOWFkWTc1eno1L3o2QjgrL3Q4VDRQRzRFbjRUR2kyZEd4OUNzNVFkSDFx?= =?utf-8?B?WGtQNmcvL2ZLRmZQVVJ6UHEzamJ2WnA4WDlCeFRVR0NqdXpscE9RVy9WMW9u?= =?utf-8?B?d2tib0xLTVNzdUtxUkFadnBsZk1XYUpUUnRkbUJkOXlhbnp2aVgrTXVjZnpU?= =?utf-8?B?c0VsNnVXTVJvK1g5SDNCU0QzSmIrNWRJbmdPSU15T0MveHZSRzB2Uy91SVY5?= =?utf-8?B?MC9EWVlHUXhRcWNFYm5DWEVjT1plWGdnUkhLdDNyT09EN01WZXJuVkMvVDBN?= =?utf-8?B?cFpsL2sreG90L1YwcVVkam5zVXJqWi9nOVg4eW9QZXAwQkJ1cFhzNnpCYU5P?= =?utf-8?B?aGlDMkNROGpsSnM5cklVV09MSzNDclpNY2JoZ21tSVArK2NHM2hVdXUzc3c2?= =?utf-8?B?QkFpQ1VZQUxMWnRrWVNLSkdOL1V2Y1NNTTdwUlcwR1NyTlpCMkdyRy96NWZn?= =?utf-8?B?KzlRMVBiRHMwZmxoOHNXLzcvZFdNYmZaQXpFYXBDbzNudk5tQ3p2c3pSakx5?= =?utf-8?B?ZmxwU3RrQlZGYmx5WEN4NHROMStBaUNPaHdnMFRXTVZtV1FEcEFLL0pMWmF3?= =?utf-8?B?c1oyZXJPVG82N3Bob1ZVbGFKMm56alFLajZjUlVqVUJYcjl1VWpVQmdtUzZX?= =?utf-8?B?a0xrUDdxZWVoNys0VGk1VEtCVzBvYWFsQlU3NFpzWGRXZ25SSTljQ2J3V3Vv?= =?utf-8?B?Y1JVWXppempNaVZZT2RnUkhVOUpVU1oyQ3FLTDZ0aVJ3am9UVVpZakpEbU9i?= =?utf-8?B?Und4VVMvNUt6R3pDWGNVTUJ2ZHpsb1phNVFQMmFhdzJvTEl2YUNVQzB0RnJ0?= =?utf-8?B?aDVVcm4yWC9xN0FUNVdZVEF5Z1I1QmdZbEFvWm1Maml0SVBZbnJNUEhIcEdV?= =?utf-8?B?Vk5RY2VmN0IxNjVFSXVOaGh5Y0NGSWVhQXQ0cmt1K0xQRmRrRk9FbEllc1k4?= =?utf-8?B?Vmh2M2locWttUlA1OVJLZ09mNVVkNnpNTnI2cFQrVWhDajNTd3NnU3d2L1I2?= =?utf-8?B?d0QvdmJjb1NRZzFLS20vZlhBcHZGdktSVnBLT3N5aXZReWpHaWx0SmZjSnRj?= =?utf-8?B?bGU3TkpQQTA0SjQzTVhDclM2MDByU2tXWVFwZ2RBME0ySGJXYVRKbUc1cHZD?= =?utf-8?B?MXhJMkZ4aGNzMDBzeWhaUXZIKzBvOWMwQjE1S1RlOWtOSWp1NEZRV2taUUQy?= =?utf-8?B?djRkRG81UU4zdVdQdERXZ3dBQXd5c3IyZU5DTXFBeE5zVVZiTitrdlVSSjM4?= =?utf-8?B?eENDZk5PY3B0cHdORkl3N01KYWVKWE5IcmJxU0FzTkdENmxiWWlHNkM0TXNr?= =?utf-8?B?QlpvMzlua0oxV3oxYUxYenhKTTZVVDlUODZRZ2FRb2hNc3lWZkdOdmxlUWtl?= =?utf-8?B?NHNIbi9lb05VVHRQQ0VVa3d6NGNmL0VDMEpYMG1IRU1yRTJ2RHpxZmhjTU1v?= =?utf-8?B?YWdyVFRkbVViQ3JTR09sM0xHTGRJZ2hjaStZYlNJRkRYZkNsa0JlNWJidURp?= =?utf-8?B?U1k0YTVucitWNWlrMW56OXdvYUp3SC9MTFpNRFViaUJwOEtIQVZzeEZUZkoz?= =?utf-8?B?NG9QZ1lKNTdEV0ZiKzhHK2R0bmFTL3FkQ3JRT1krWWo3ejEwQ3p2bUpUdUNN?= =?utf-8?B?MTljL0JrSWVwK09xWlZpQU1BRzdlVWg1c3RDUm90NXpaNkNoR29XbnlMeHZN?= =?utf-8?B?dUJ4VXFEcnd6cjNpN0VtLytuV1lvUmdhZjlNVUVHQzZuUTBBdFM3NUlTRnhO?= =?utf-8?B?d0J1QkJ6RmdFNVVZSklXeWRwbThGWnloT21TZ2tWejRqMnN5M1djR3F3Y2Q0?= =?utf-8?B?TFZsZUpwcEhjSlNQc1ljT2JNUDhxaWRRNVBCSlFDQTRZMW1BQVI4ZjVxZkRr?= =?utf-8?Q?cKa4+yKUPej4g9zVlXZ7Zs4OjnhV3zHn?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 696c9135-807c-40d6-b39b-08da037a84be
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 16:16:53.6584 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: f8RxLRkTw1/7V9TNEiFxztex1vnA80OWvVV/mEEFPRXSoI9g4I2QXE7fxYXTNwyCr2RefSPWjAjF/6/O4OV+YA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1P189MB1120
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/66zuMNuAmTKY6W6cv1aoy_izMzg>
Subject: Re: [core] WG Adoption Call for draft-mattsson-core-coap-attacks
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2022 16:17:13 -0000

--------------07IUhzQnFdMGCX8jeP6pOKA0
Content-Type: multipart/mixed; boundary="------------s0TQhhSPVwJg3kyYhQGhNeeH";
 protected-headers="v1"
From: Marco Tiloca <marco.tiloca@ri.se>
To: supjps-ietf@jpshallow.com, Achim Kraus <achimkraus@gmx.net>
Cc: mohamed.boucadair@orange.com, core@ietf.org
Message-ID: <b0b687ef-015a-8af4-60c3-b830ccc84ddb@ri.se>
Subject: Re: [core] WG Adoption Call for draft-mattsson-core-coap-attacks
References: <cadf5151-8f7f-9311-6987-de5bf533abe2@ri.se>
 <28040_1645773815_621883F7_28040_64_1_787AE7BB302AE849A7480A190F8B9330354999C4@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
 <55ce01d82a31$f052c530$d0f84f90$@jpshallow.com>
 <01663e0e-ccb7-84d2-08aa-3792799a783c@gmx.net>
 <5a5401d82a86$c10bf440$4323dcc0$@jpshallow.com>
In-Reply-To: <5a5401d82a86$c10bf440$4323dcc0$@jpshallow.com>

--------------s0TQhhSPVwJg3kyYhQGhNeeH
Content-Type: multipart/mixed; boundary="------------H4ZYAR00sGajBeaobB4pFOle"

--------------H4ZYAR00sGajBeaobB4pFOle
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------H4ZYAR00sGajBeaobB4pFOle
Content-Type: application/pgp-keys; name="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Disposition: attachment; filename="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DAOQG
-----END PGP PUBLIC KEY BLOCK-----

--------------H4ZYAR00sGajBeaobB4pFOle--

--------------s0TQhhSPVwJg3kyYhQGhNeeH--

--------------07IUhzQnFdMGCX8jeP6pOKA0
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOEo4cV326Z7GypVg7iZktA5Y2kMFAmIrdeMFAwAAAAAACgkQ7iZktA5Y2kNT
ywf/Xnj1E5zLJ+TjWaybMh7fBJQZmN+38z37CMBth+KONL5mvkfCjupmjn05ZqnJcCYS/s6prRvE
YzYLKjKqg/FXHf4NIc1vhxoYVl3mL9d259rX9Pgzc80AA/N/LMq+Y3OHLPUz+IDBMbCfFTrssabg
UhbI0yOO/lngvOnimWLWypXaH59N2Ae7w8gKgcTQg4TgnF86WmlW9iDWq0k1EPAlf6/ySWc0VW93
qfUonphx9NxtagQ6B645NKynBXd3yJUV5bCXvcFygxsfg3pFO8Uii7guZ//5mSJNqrXDdXm5LxHD
OYTRMkAN+YBSzy2Ev9c+4IstpMSHoHLaW0OyDXhNYg==
=rTNG
-----END PGP SIGNATURE-----

--------------07IUhzQnFdMGCX8jeP6pOKA0--


From nobody Mon Mar 14 11:08:47 2022
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A5F073A1010; Mon, 14 Mar 2022 11:08:45 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IESG Secretary <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164728132545.7729.16055041585866718878@ietfa.amsl.com>
Date: Mon, 14 Mar 2022 11:08:45 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/D1cI8ZrWdFYH80AA77F8pDll1e0>
Subject: [core] Constrained RESTful Environments (core) WG Virtual Meeting: 2022-04-27
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2022 18:08:46 -0000

The Constrained RESTful Environments (core) WG will hold
a virtual interim meeting on 2022-04-27 from 16:00 to 17:30 Europe/Stockholm (14:00 to 15:30 UTC).

Agenda:
(No agenda submitted)

Information about remote participation:
https://meetings.conf.meetecho.com/interim/?short=079d3466-b1ef-437c-b8b5-cc947e87f70d


From nobody Mon Mar 14 11:09:51 2022
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 524453A11C9; Mon, 14 Mar 2022 11:09:41 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IESG Secretary <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164728138122.7747.1250926851460578498@ietfa.amsl.com>
Date: Mon, 14 Mar 2022 11:09:41 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/umUVtnAHjF027y_imMgK6UkYErc>
Subject: [core] Constrained RESTful Environments (core) WG Virtual Meeting: 2022-05-11
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2022 18:09:49 -0000

The Constrained RESTful Environments (core) WG will hold
a virtual interim meeting on 2022-05-11 from 16:00 to 17:30 Europe/Stockholm (14:00 to 15:30 UTC).

Agenda:
(No agenda submitted)

Information about remote participation:
https://meetings.conf.meetecho.com/interim/?short=32d2bad8-f2fa-4fa2-8818-4d037e0cd2c4


From nobody Mon Mar 14 11:10:08 2022
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 128063A11C3; Mon, 14 Mar 2022 11:09:58 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IESG Secretary <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164728139803.8420.9386956169062386215@ietfa.amsl.com>
Date: Mon, 14 Mar 2022 11:09:58 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/3D5377I5I018jjoWL0ZKOOgZgJ4>
Subject: [core] Constrained RESTful Environments (core) WG Virtual Meeting: 2022-05-25
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2022 18:10:07 -0000

The Constrained RESTful Environments (core) WG will hold
a virtual interim meeting on 2022-05-25 from 16:00 to 17:30 Europe/Stockholm (14:00 to 15:30 UTC).

Agenda:
(No agenda submitted)

Information about remote participation:
https://meetings.conf.meetecho.com/interim/?short=46d8f147-a420-4ee6-9786-b535fb563435


From nobody Mon Mar 14 11:12:07 2022
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DA6D13A1206; Mon, 14 Mar 2022 11:11:53 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IESG Secretary <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164728151375.7724.17904616353515992239@ietfa.amsl.com>
Date: Mon, 14 Mar 2022 11:11:53 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/c7NCD_FruuSoNZOURRZU1mnMWNU>
Subject: [core] Constrained RESTful Environments (core) WG Virtual Meeting: 2022-06-08
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2022 18:12:02 -0000

The Constrained RESTful Environments (core) WG will hold
a virtual interim meeting on 2022-06-08 from 16:00 to 17:30 Europe/Stockholm (14:00 to 15:30 UTC).

Agenda:
(No agenda submitted)

Information about remote participation:
https://meetings.conf.meetecho.com/interim/?short=08a866db-d268-4b9e-bead-4a9f0c3fed22


From nobody Mon Mar 14 11:12:26 2022
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B7EB3A109E; Mon, 14 Mar 2022 11:12:09 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IESG Secretary <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164728152911.7801.12217837891801142186@ietfa.amsl.com>
Date: Mon, 14 Mar 2022 11:12:09 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/MzHX5fFArRe5AmLAhbKFQ_XGBCA>
Subject: [core] Constrained RESTful Environments (core) WG Virtual Meeting: 2022-06-22
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2022 18:12:17 -0000

The Constrained RESTful Environments (core) WG will hold
a virtual interim meeting on 2022-06-22 from 16:00 to 17:30 Europe/Stockholm (14:00 to 15:30 UTC).

Agenda:
(No agenda submitted)

Information about remote participation:
https://meetings.conf.meetecho.com/interim/?short=77630d7e-3863-4885-81f7-51e7867407c9


From nobody Mon Mar 14 11:12:36 2022
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1369C3A1744; Mon, 14 Mar 2022 11:12:24 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IESG Secretary <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164728154403.7720.17637132074990831043@ietfa.amsl.com>
Date: Mon, 14 Mar 2022 11:12:24 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/UuOXXotz92nXvJ4-JoL8l2--eTE>
Subject: [core] Constrained RESTful Environments (core) WG Virtual Meeting: 2022-07-06
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2022 18:12:32 -0000

The Constrained RESTful Environments (core) WG will hold
a virtual interim meeting on 2022-07-06 from 16:00 to 17:30 Europe/Stockholm (14:00 to 15:30 UTC).

Agenda:
(No agenda submitted)

Information about remote participation:
https://meetings.conf.meetecho.com/interim/?short=1d90ca08-560f-464b-9322-4ce82574b748


From nobody Tue Mar 15 12:16:41 2022
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A80603A161E for <core@ietfa.amsl.com>; Tue, 15 Mar 2022 12:16:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.111
X-Spam-Level: 
X-Spam-Status: No, score=-2.111 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xXFtoDNwqNjz for <core@ietfa.amsl.com>; Tue, 15 Mar 2022 12:16:34 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150049.outbound.protection.outlook.com [40.107.15.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 583383A1683 for <core@ietf.org>; Tue, 15 Mar 2022 12:16:33 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JSj+DnPPqzCooyOGNBxT/LYfD3ihwABgWwn0tIrsjN73o/8AqP3Zt1oZix37H//Qkjwr28pdIoLbTC0ZBGqHWHZjgzz9XI7HtxdAiZiVnmn+iX91evsihW8eqMKtjyeNjRmUkJ73SYD6pVxg1lk/tZrXC4+Tu/gjmrjSmp0Dk5I1UTkzeON0KxGgz9BDLHdG1ao/Jb6mPPa4VaPbKqTUeB0Ufs8KPWpJf3jAn3qG7z1uTykJziKPL5RqxjeOOpjhCBAwlZrPKbPZcmagxJ8NKyuIvmAWjP4LHGk73gRRzJHzWtJP7ZoOPejvX2wyu2nwHNVXkW5+CHB5NK3kX6Z7vw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KK0c5cGOqdvCm0QPnMfooSijjNnOs5+HENpXd+Rgw8U=; b=nNZ3ldGDJv5PcORXf7OApTdBrg59YOTPZkn383ORO8pgaIg3QFOZiocPWFW5jAQ0cPxR4isJDM/UPSXIkZd0gyov8q1NQjNpWe8IHiqQpp3Atz1V/QmuSR225YT0xaecIt8Pxyu7PqdaN0JGeqp2zPlwoZblpehXfaVg0ZS/CLWP+3UfVGvJrQE1T5E0+pl3o9Xx0psZcy90rLNMlpmfAkOw5Tz0G7Nky8xJGWa1gMKCfGbq9iGW3WnZzQ4ragAoyOlDsDXZu7wZlkSaw1d7+2c3q2OHCAjsg59sla+npNfDaWPSAkflBnX4ou1vuuL3KlEz98aw3SZQbW/UFi2dGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KK0c5cGOqdvCm0QPnMfooSijjNnOs5+HENpXd+Rgw8U=; b=Q/Q0Q/0caYaer8sCAiwHO7K/6QIz2PH/FNNu5+TIFKWuBRrynEtgm0YPvj9CNdVwEJ1xQgWmVcI5UitGvFl4in0xm1UeiRGNDejeUvji9Zh2D1wrUNMx0En1oO83pSpJxeml+qbS3iDQjZtJ1rXD04WyqiWN03aUyL5hOflmWOI=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by DBBP189MB1306.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:1e9::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Tue, 15 Mar 2022 19:16:21 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d%8]) with mapi id 15.20.5081.014; Tue, 15 Mar 2022 19:16:20 +0000
Message-ID: <c487beeb-3e54-9644-a973-a3c6b2dbaf11@ri.se>
Date: Tue, 15 Mar 2022 20:16:16 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
References: <e76b177a-7edf-0c4a-dc87-cf636ec686d5@ri.se>
In-Reply-To: <e76b177a-7edf-0c4a-dc87-cf636ec686d5@ri.se>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------oq47rtr9qKRSa2JuVzhDquhH"
X-ClientProxiedBy: AS9PR06CA0089.eurprd06.prod.outlook.com (2603:10a6:20b:464::14) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 889c0e47-a14b-4b59-0c97-08da06b84979
X-MS-TrafficTypeDiagnostic: DBBP189MB1306:EE_
X-Microsoft-Antispam-PRVS: <DBBP189MB1306479DBFF4F4C149EF06A599109@DBBP189MB1306.EURP189.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(38100700002)(8936002)(316002)(6916009)(66946007)(8676002)(66476007)(66556008)(86362001)(31696002)(235185007)(5660300002)(44832011)(83380400001)(21480400003)(2616005)(186003)(26005)(66574015)(508600001)(6486002)(966005)(53546011)(33964004)(6666004)(6512007)(6506007)(2906002)(36756003)(31686004)(45980500001)(43740500002); DIR:OUT; SFP:1101; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Ymo2K3lOazR2K3dBT2IvR1UwMnd5VkoyVUgwdTUvUnoxM1JnQnNOdTVsRHNP?= =?utf-8?B?elhwdVI0NjRjYVpUUGl6a1FSVFR4SUs0VWtGWEk1cFFZK1VTNlBxeDR2aVhn?= =?utf-8?B?Y25idUJMdlVwZXB0ME9wYjBoU2ltSll6eGRRK1NzTVRQRHVLY0FOcnJVTXB0?= =?utf-8?B?ZXM1a2VDTlJ2L2xWcWVsaXNtK3dCUDhEMFc3N1Z2KzRqdkFKayszYldMR0pz?= =?utf-8?B?VUVYa2VoVnhOV3ZZS0V4UTJMdHdnc2FndVNCL204NkMwZk5ya1p0ckM4Q0I5?= =?utf-8?B?eWN4S2h2SWM0UnBwTmMyZUpPVzVGbzNYdDI4WGNqQ0pTUzVwR2x2OFo5aHVR?= =?utf-8?B?Q3ZuT1N3NEpHS1dnSnd5bDNXMlRhcXNUK25UQUVrYmR3MnNxOHdFd2FNTjFw?= =?utf-8?B?YXVIRnRkZjhFVHNmUU1kbE5PbDRsRThzWGxCM1BUMSs3QTcwL3c5R2tXZDZE?= =?utf-8?B?MERDcys3SUVMUmJ2dkQ0TzFEdktTQ1pRaXpaa2Rqc2lHRVRGdlp3OHU3Ymkr?= =?utf-8?B?NWhGeTlwMGRpQWt5NHZDQ1Fkc3JlS1FmL1oySGZFRHI3ejJXRVltZTdveHdC?= =?utf-8?B?QVRZM3NtcnBId2R1cmI2bEJiZkdMYW9OdWZCQnUwUWpZZGRFaTRNckF5TS9P?= =?utf-8?B?UXZ6R1dJcEpJTDVDWUV2QXNJRGJqV2xGZVM5OFFXYXpYM1FYRlJFNlFHMjVY?= =?utf-8?B?d1JGQW9GUlFCRXlHUmxHTG40TGNXZUdWMGtKc2JjMTBndTZBdC9FdGtJMUM4?= =?utf-8?B?aDdXTDk2SXhKTHdkVldpSDltMEl6S0xKS3F1aG1hRnFCNGIwMGZqaTRsYWRa?= =?utf-8?B?cVAxZThZcVkzQ09QVDNNVkh5YkhrZi93b01DbEI2ODd6UjNQZS83WFI2ejNM?= =?utf-8?B?Q0NjRlJOSmhIeXB1Q21GUzRIVFpTNVd3SWE3OUJEUFJVeXdWR0daaEFCUmNt?= =?utf-8?B?UU9PYmt1U0hPNHdRSXdObW8yV3B1azhDRUdBUHJUWERvMHVJRnMxMEVmeDc5?= =?utf-8?B?TDJLdVZINlNGVjVNTENEODBpWWh6cGI5ZmE0UVh6LzFraTRIcjlyZ051OVlL?= =?utf-8?B?Tm9oaFhUOGVhV3RsOEhwZFFVSVdDRnRudVBQY0phbE9URWhEYnFsTkJ1aUZF?= =?utf-8?B?azI1V05uZ2tvZ1BMZExEVldickJRWGRhMmZOaDl5dTdVb0hMNUZSOW5uSy92?= =?utf-8?B?ejdvY1dmNzRacldXZFF2clhlVjRnV240K3NKZFRmZVpUTEtheU1vK3pRRDM3?= =?utf-8?B?TVBpZm9PZlJhZWk4eFFobnNoeXZjajF3alhwdnIyT2FXU3NsTkwxL2VVTGhj?= =?utf-8?B?UXRRcTByVEQ5ZWtReFBwSk13RkVnMGlndERZSDBRVWpqV0FTWUFLZXJITXl2?= =?utf-8?B?K2ZId0R1eFlrOTJ5WXNidW1FZG5YYTNtNjNzaWljZStHaXNNWWljaW9wNkhR?= =?utf-8?B?eUlTS05oTmFSSzBLQzVNR2theWtROERrWjZtY1hwUnk5bUJSaEowMTczRm85?= =?utf-8?B?LzQ0OEgrbkc0RysrY2lJWk1FYWNuV3RGSzRiSExRTE5UelZIVmFleFZ3d2Q2?= =?utf-8?B?QlZyY3dqT0QyUmJPMlYrMkZCSzNVYXZ1UmhjWXlDZm5ndEF6SlQxTEM1RC9Q?= =?utf-8?B?SWl5MTZFTkR6RDlYRVNaWHhmOVNWcmMycGlqdmxaTkhQdlJpZzM1emcxOGha?= =?utf-8?B?c3NWcU9MRVlHSjVtVTZDeWs3YWlaV3hFZU5yTE1ReFlOU0Nia1FjZUovSStq?= =?utf-8?B?RThBSThESENuamIweFBxRFN3UGlpYjNFbFRXQUZ0OGNkK1RSZDdvVFBmbFNV?= =?utf-8?B?aVlpWnpxSGIyZlc2bWloMG9ZSm5XUEJEQUV3OVA5WEZMY0FCZEZFelBPVEw4?= =?utf-8?B?bzAreThMTUdseGpHVURRK3c1WU5PZXorUmFmRjdLbUFYQ050aEk0VVJXU1pC?= =?utf-8?Q?9i2jPkhCmTrK25c8MXuGR8yJNVxfc/e2?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 889c0e47-a14b-4b59-0c97-08da06b84979
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 19:16:20.5577 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: KcbP1+fwpDw4EZqmviA28yvDiIms2aEcJi5oRW9+w2dtlZwNAc8XscUR97jwpJogVbT7fD4ENE69k/rvMZUOfg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBP189MB1306
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/L0ruIXNmZaGdbHYZHTJgq0o-SBA>
Subject: Re: [core] CoRE Agenda for IETF 113
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2022 19:16:40 -0000

--------------oq47rtr9qKRSa2JuVzhDquhH
Content-Type: multipart/mixed; boundary="------------XnbErlVZXiA98m8Ntrcs0TSv";
 protected-headers="v1"
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Message-ID: <c487beeb-3e54-9644-a973-a3c6b2dbaf11@ri.se>
Subject: Re: [core] CoRE Agenda for IETF 113
References: <e76b177a-7edf-0c4a-dc87-cf636ec686d5@ri.se>
In-Reply-To: <e76b177a-7edf-0c4a-dc87-cf636ec686d5@ri.se>

--------------XnbErlVZXiA98m8Ntrcs0TSv
Content-Type: multipart/mixed; boundary="------------0Y0sxBxns7SrgXAs5HWSuNYO"

--------------0Y0sxBxns7SrgXAs5HWSuNYO
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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=
--------------0Y0sxBxns7SrgXAs5HWSuNYO
Content-Type: application/pgp-keys; name="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Disposition: attachment; filename="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DAOQG
-----END PGP PUBLIC KEY BLOCK-----

--------------0Y0sxBxns7SrgXAs5HWSuNYO--

--------------XnbErlVZXiA98m8Ntrcs0TSv--

--------------oq47rtr9qKRSa2JuVzhDquhH
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOEo4cV326Z7GypVg7iZktA5Y2kMFAmIw5gAFAwAAAAAACgkQ7iZktA5Y2kOZ
mgf/SGbiz59bmSLdiKQEDD/Tb/IDyMeTyx8lm7Lxd8sGmjq3BCvvjvf2Ng49W+WhT1WV7UIV7n2d
vwLGYV4qwtbJfA9e0u2PDEjKr78upsewHzzAuLfeHLCdKeCPAJFfhU8TIPIHGphBbjfmxs2y7JGw
7VleeypoF4tIC0IzjFoZl5UBOPMyKd1xe4H1JLFDGjUpkd8h9gcCF4skA4yrhragujDmguFSP3Um
yisE8Wq6z7bgxukeFLtnMrLWNYzz0lxAHuswfVxxJnZrpclYtlipcHlczIeCer2dq8YxSqtQR1Sn
gy0kBhkPZfjhUHg8GS2ZTx8DsXu03BKRlMORK9HoCA==
=GMNp
-----END PGP SIGNATURE-----

--------------oq47rtr9qKRSa2JuVzhDquhH--


From nobody Thu Mar 17 06:30:24 2022
Return-Path: <esko.dijk@iotconsultancy.nl>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 899553A122F; Thu, 17 Mar 2022 06:30:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level: 
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iotconsultancy.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6WcI6JBEmoF2; Thu, 17 Mar 2022 06:30:15 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-ve1eur03on071c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe09::71c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC9313A0D8F; Thu, 17 Mar 2022 06:30:13 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HVF376umAsGwZRA6cnFJ4SoS4V+n3C2I1nLdLMYkUIfUxmMcZHcimzQeVs4U+aVHfTaBGAVRQmj1CXmv3HVSqHIbl19wS/6UJQjyCds4vJD0FSh3aH7lpbBbtz3V8aQWkSVqUU5ThcWORdcxw6rM4DGKihAdmXTvidWAAmNIsOvFjYEtM5DqdBZJ9jQk3Mf0DTEfZjiOmZbgrT7wBbIra4wtxdxrGyLSS9Ok1pI+CCSYBS7Eim1wogHevM3L8Oo8cygt3fB9XturPCvq5EG3ULIFdJFldzjZ0+lDCuwVKN0YLLfiatGvGNJt9nfqkFvWTkvIED986Jaf2+vw0ckJmQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9Up18K6qb0FA8Co/ZtY/qKCJ+ggXZd8wlGL1l0Q/t/8=; b=lhA7zIE3UaZTfX2stmsPghQMTBF/CEYsvU9KNgn7+oPLRL+NJyfdCP5kafo6XNn8zEYl9qKOcHVSrjNaa5NJj6hImCG6YoE0d/HHZuuxFcCPhVIxojDCtXK66wExdLsLWyyXGmlSWiidmHHZyWSBay3/zzBUAOJQE54k3EVPTC3/8L6OmGogfLxyoR0Vr/WuK65Ue51pQ4IHCF3XvLq4O6KbA+9bww+IXzYrCY/EACzQrsndXY7r38cp3LBqlWNYS1wbZTCi8039jbtZ7Vd3sb3bcqEoJyf/Mx8btA9/g8A88MQFIcDnzZq10jN4rEBumiAs4U14aphliuiXAfi31A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=iotconsultancy.nl; dmarc=pass action=none header.from=iotconsultancy.nl; dkim=pass header.d=iotconsultancy.nl; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iotconsultancy.nl; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9Up18K6qb0FA8Co/ZtY/qKCJ+ggXZd8wlGL1l0Q/t/8=; b=orBOSTnXaTbcYnON7OK46Df2MKWnFdonvNYQC+QHNMRVezNSz7CVssTncgJH81c01vgZcajRtA6P1J5AJqme2syTBSsDc/MdS2uKoC3BCHxY1Xtj3vTq7qEZV7ruUYliohzV0Y4ofVFP+D4oNBmJK5YN8zy4o0HMSoFXyrvcPx8=
Received: from AM8P190MB0979.EURP190.PROD.OUTLOOK.COM (2603:10a6:20b:1d3::8) by HE1P190MB0428.EURP190.PROD.OUTLOOK.COM (2603:10a6:7:5c::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Thu, 17 Mar 2022 13:29:56 +0000
Received: from AM8P190MB0979.EURP190.PROD.OUTLOOK.COM ([fe80::5545:b132:c1b9:c3c2]) by AM8P190MB0979.EURP190.PROD.OUTLOOK.COM ([fe80::5545:b132:c1b9:c3c2%2]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022 13:29:56 +0000
From: Esko Dijk <esko.dijk@iotconsultancy.nl>
To: Marco Tiloca <marco.tiloca@ri.se>, =?utf-8?B?SmFpbWUgSmltw6luZXo=?= <jaime@iki.fi>, "core@ietf.org" <core@ietf.org>
CC: "draft-ietf-core-oscore-groupcomm.authors@ietf.org" <draft-ietf-core-oscore-groupcomm.authors@ietf.org>
Thread-Topic: =?utf-8?B?W2NvcmVdIPCflJQgV0cgTGFzdCBDYWxsIG9mIGRyYWZ0LWlldGYtY29yZS1v?= =?utf-8?Q?score-groupcomm?=
Thread-Index: AQHX1ZwLhI+MshUoXUubuOyktGdNOqxd3p0ggAy/KgCATO1AQIAAZDqAgAxrfzA=
Date: Thu, 17 Mar 2022 13:29:56 +0000
Message-ID: <AM8P190MB0979BAA8D471EB5572ECFC8BFD129@AM8P190MB0979.EURP190.PROD.OUTLOOK.COM>
References: <e1c0ac8b-cfa8-4a26-9d19-eee6d9f697b0@www.fastmail.com> <AM8P190MB09793B5DFBA3340109FC46EBFD519@AM8P190MB0979.EURP190.PROD.OUTLOOK.COM> <6591fcc6-5d2b-571b-7b93-cb06d623c3ba@ri.se> <DBAP190MB0981701C495C3C005DD9B86DFD0A9@DBAP190MB0981.EURP190.PROD.OUTLOOK.COM> <51a930e4-5c83-9921-981f-bb860494ee90@ri.se>
In-Reply-To: <51a930e4-5c83-9921-981f-bb860494ee90@ri.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=iotconsultancy.nl;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2c0510f3-2b56-4796-0b20-08da081a3a11
x-ms-traffictypediagnostic: HE1P190MB0428:EE_
x-microsoft-antispam-prvs: <HE1P190MB04280AF055BC5822C7565367FD129@HE1P190MB0428.EURP190.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:AM8P190MB0979.EURP190.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(396003)(376002)(346002)(136003)(39830400003)(366004)(8936002)(30864003)(6506007)(186003)(52536014)(83380400001)(7696005)(44832011)(38070700005)(53546011)(66574015)(38100700002)(9686003)(122000001)(66556008)(64756008)(66446008)(66476007)(5660300002)(4326008)(76116006)(66946007)(26005)(71200400001)(110136005)(86362001)(316002)(2906002)(45080400002)(508600001)(966005)(55016003)(33656002)(579004)(559001); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?WGpmRkZqNTBCN1VBblJyVkJyZkQ0aEk0aDdGLzk1OUF6a3FEdFowb3hMSUZO?= =?utf-8?B?U1lJYWlPUkNVTE5lZngyU1RRczVoei9qRmdnampKK1RjSi9LbEl3U01ZSXNG?= =?utf-8?B?cUR1ekRHY1RSZ0ttRy82eEM3dUs3OTZ2TDZOUGl6TDhUc21rckNxZmNpSVdL?= =?utf-8?B?NmhNVVR6clRzOVNkZmpvM2RXSmZZdDFxSmVld25yamI5SWNDQWN5VHdCcG5B?= =?utf-8?B?SHFaVXJCNE1sWXRQNWJxeG05R3FjSXhqaDZOMDhrbnhTcm9veFZGcDBLbVd1?= =?utf-8?B?Y0dGMEdIdWR1V3BUbC9VbmFKd0FaejJLQVgrV1BacXlPcmpDb3JPYjJYT0Vx?= =?utf-8?B?Q01xK2xRR0ZoRjNMNTFLOXhFNFdrUVRFMWFBQWRuYW83RVB4dzlvZUJaU2xv?= =?utf-8?B?a2FKbjh3NzlQU1o3d2orbDFuMi92Qk1GT0l1dTNNZHFNenlNMElwTExNNnlr?= =?utf-8?B?M25qY1RTOVRPMTdPbUZvSzN6NkFjWmhJdGxsNlQxeDJoV0Q5aDl1a3ZUVjBi?= =?utf-8?B?MUk5RFlHVDdPZFlIR003RzE5OEJERTJXU1M3OUVPcTFpUEI5ODROazgrbDhD?= =?utf-8?B?ZFJqbWhOZUdiUUh6UTJDZXF4Y3VrSVJJQ2w0cDJQR1Q2K25GWSsrTjdCT3cx?= =?utf-8?B?Qm05bGRPVXBSZ1NOQ2hkcmx4bk9iSUEzbUNvU25QS042OVVwSjZiTlNvcFd5?= =?utf-8?B?OUNrc3ovM0ptVnE0Nk9xeW83Z3F1UXlSaHd2bUNQRHdXNS96dHl0R01zM21W?= =?utf-8?B?UlBlVVFrNDRTUjJiazU5SDJzbzlFWWJQd0p5YlljQklnSFVUc2dFb0lWbjBt?= =?utf-8?B?ejNLaVE4dXRENnRGRzdwaUE5bTJWSHZHYU1KaGV2UzJBL01iN0RsTVVSUVp4?= =?utf-8?B?elJkTGFJVTR5ZjBlRXBuTGdKWjFYZ3VNSEdwNlk5blJiNEpzSS9hNWxCL1VQ?= =?utf-8?B?c1ZKSEFFdHZDVFJ6S0lSUXg1YUlDZ0dkYlFmLzRaaXB5UEY1UlM1Mks4VWZV?= =?utf-8?B?blIyWDE2TkhvaC9Id0IvLzNIQlBMUWpncFhIY1NHUDFuL2Z3OHFtZ3kvelNX?= =?utf-8?B?Nzd5djdMVlp4YlZUaWl3bkZBN1ZTOVE2M3RJVjZ5dUNyNnN5QksvNU1oeGhZ?= =?utf-8?B?MExZZEVpeFkwY3pERTB6R1hUWFROOFRFQUNTTTNlVnVPY0tPb2NGMzNzNWE4?= =?utf-8?B?b0RGSHFHODN5c0lxTVRPdU9yc2IrNHkrVGxOci80QTBLOGRySGQveHBFQkQ2?= =?utf-8?B?ZytIQTIvY3RHVWNBQ1lmWUZUVEZDNWx6UEFkQjhjMkNSaC9qcks5Ym5TUGc4?= =?utf-8?B?cjFxcnErKzBmUmpvK3JTREhyc0Z6NDEyR2VPMjhQRVl6VXhJV1lDZGdmVS9n?= =?utf-8?B?cFIyY011anJiYzZxOFhTZmlxeTc4R2RPRkpxbHFPcjNLN3JyZjZOSG5qZkp4?= =?utf-8?B?QlBFN3RscjhVMjRPdFBTOUhFalMzY1JzMWtSNDFCWm9YdFJ2YURIcXFxUytL?= =?utf-8?B?Q1pPWk52blNBUjFQeGllT2oyc2RobGk5TFJVWGtvM3ZGUzNmZk02bklZSHM4?= =?utf-8?B?eEdhZmgzeHlQSDFBVmxGOGhLTStjcnJtM3pSSzlwRXBoWjVJeTBDcENPSThD?= =?utf-8?B?WjNoUHBpVUczbHM4TmVYWWg0SGxRVUlhWlNEVys0S21HTjNSUS9XSmFXWUVR?= =?utf-8?B?TXhkbDY3Y3BTaDVoM2lWT0hZRkErMDJERXVpcGt2bHd0Yi9mcU8zenhWVm5p?= =?utf-8?B?SnF2NHRTSHhHSDd3QU5YN1ZFM1JyZVhyUGRxdE10TzJKUjNqU01PKzVnOUpP?= =?utf-8?B?SmxiaFgzUXBzTVRqQ2RsOUU2NVVwYmUrajFTVEloSDUvanhraXdyYzdCNjlD?= =?utf-8?B?dDg0VktBUzdzdWtYNFJlYzJWb1BEQ3hqQXo5TGY2ejVjRVBqWGVacWJ2VUZL?= =?utf-8?B?RjVkNEVqUmpMWEczNmRGWVlqN1lQbGgrWmdHTllSeXpvYndiSU03UWM2b1I1?= =?utf-8?B?RWZzNDJkc2ZSdHFyWlNNNFNXb3Z6Q0VrOGZtRUkraFFxUHhDMFdPM2lEVEh0?= =?utf-8?B?UU93NkplS0hLQjJPbnkwSFhRRnR3aXIxMklDS05BMFovR0Y2MnZHdjdmMytm?= =?utf-8?B?TkZ2b2tBeEFIVnd0dU9XdmVGL0xGQmdKcVV6c0xVTFh6dTJLRi9JbnM5bTBJ?= =?utf-8?B?dEFQd21UM3ZBUXVsSzVmRTE0dnF3bUpFaFVIMGg2RlFNN3MyUlh3cDUwdlA0?= =?utf-8?B?bzlRT3NEMDAwS2pTSUNXdkZ0QktRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: iotconsultancy.nl
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM8P190MB0979.EURP190.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 2c0510f3-2b56-4796-0b20-08da081a3a11
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 13:29:56.1776 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 58bbf628-15d2-46bc-820b-863b6774d44b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: HtEQudMtoUyI7uvtMowA11vGiKXhTr32PyYSpLQMWrIe1XeFhhanWs2kTXNgBdIRL5BohbxrY7k8YAiXeriRp4h/f7zmXxaB2GjUJ2rmaJo=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1P190MB0428
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/R_kdhpC8JOziQGc3uKB6AgllcCk>
Subject: Re: [core]  =?utf-8?q?=F0=9F=94=94_WG_Last_Call_of_draft-ietf-core-os?= =?utf-8?q?core-groupcomm?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2022 13:30:22 -0000
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From nobody Sun Mar 20 10:20:20 2022
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CCEDD3A1272; Sun, 20 Mar 2022 10:20:17 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <164779681772.16669.17192231545801904156@ietfa.amsl.com>
Date: Sun, 20 Mar 2022 10:20:17 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/2Bh99Kmg_KCX68fttQiqNRnpThk>
Subject: [core] I-D Action: draft-ietf-core-yang-cbor-19.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Mar 2022 17:20:18 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Constrained RESTful Environments WG of the IETF.

        Title           : CBOR Encoding of Data Modeled with YANG
        Authors         : Michel Veillette
                          Ivaylo Petrov
                          Alexander Pelov
                          Carsten Bormann
                          Michael Richardson
	Filename        : draft-ietf-core-yang-cbor-19.txt
	Pages           : 50
	Date            : 2022-03-20

Abstract:
   Based on the Concise Binary Object Representation (CBOR, RFC 8949),
   this document defines encoding rules for representing configuration
   data, state data, parameters and results of Remote Procedure Call
   (RPC) operations or actions, and notifications, defined using YANG
   (RFC 7950).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-yang-cbor/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-yang-cbor-19.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-core-yang-cbor-19


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts



From nobody Sun Mar 20 10:22:57 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F5973A126B; Sun, 20 Mar 2022 10:22:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level: 
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HhOWYbwjoPXh; Sun, 20 Mar 2022 10:22:34 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6581F3A1250; Sun, 20 Mar 2022 10:22:33 -0700 (PDT)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KM4Lt3d3MzDCcJ; Sun, 20 Mar 2022 18:22:30 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <162621559930.12938.14682203115579801462@ietfa.amsl.com>
Date: Sun, 20 Mar 2022 18:22:30 +0100
Cc: The IESG <iesg@ietf.org>, draft-ietf-core-yang-cbor@ietf.org, core-chairs@ietf.org, core@ietf.org, Marco Tiloca <marco.tiloca@ri.se>
X-Mao-Original-Outgoing-Id: 669489750.069975-26b7500e417f6af47a3c9ec1ed709e43
Content-Transfer-Encoding: quoted-printable
Message-Id: <EDBFD81B-1D25-440B-804C-C81EE3E6C71A@tzi.org>
References: <162621559930.12938.14682203115579801462@ietfa.amsl.com>
To: Benjamin Kaduk <kaduk@mit.edu>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/PNVNWUGZ3ZbSdujKexhUwkCyLkY>
Subject: Re: [core] Benjamin Kaduk's No Objection on draft-ietf-core-yang-cbor-17: (COMMENT)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Mar 2022 17:22:39 -0000

Hi Ben,

It seems you didn=E2=80=99t send email with these comments we plucked =
out of the datatracker.  However, we want to make sure we address all of =
them, so here is a reply you can read or just file :-)

The comments in this mail, together with the comments of other ADs, led =
to draft-ietf-core-yang-cbor-19.  Since we narrowly missed to submit =
this before the IETF-113 deadline, we only submitted this today. =20
-19 is intended to address all outstanding COMMENTS.

https://datatracker.ietf.org/doc/draft-ietf-core-yang-cbor/
https://www.ietf.org/archive/id/draft-ietf-core-yang-cbor-19.html
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-core-yang-cbor-19.txt

> Thanks for addressing my previous Discuss points!

As I mentioned off-list, we actually have disentangled the two drafts =
core-yang-cbor and core-sid now so they no longer depend on each other.  =
Since moving to a mutual normative reference was one of your DISCUSS =
points, I feel I need to alert you to this (as I already did in an =
earlier private mail).

> With respect to my previous point (1) (relating to the handling of the
> 'bits' type if there are trailing bytes with no bits set), it now =
looks
> like a recipient should be able to handle such things using the normal
> rules without any issue, and given that, rejecting them doesn't make
> much sense.  Do we want to say anything about how no special handling
> on the recipient is needed in order to do the right thing if such zero
> bytes are generated in violation of the requirement?

Added a =E2=80=9CMAY accept=E2=80=9D in 0ffcde6

> One new nit in the -17, in Section 7:
>=20
>   This media-type represents a CBOR YANG document containing one or
>   multiple data node values.  If the media-type parameter id is
>   present, depending its value, each data node is identified by its
>   associated namespace qualified name as defined in Section 3.3
>   (id=3Dname), by its associated YANG SID (represented as a SID delta =
or
>   via tag 47) as defined in Section 3.2 (id=3Dsid).  If no id =
parameter
>   is given, both forms may be present.
>=20
> This used to be a three-item list, but the last item is now a =
standalone
> sentence.  That means that we need to replace the comma with the =
conjunction
> "or".

We chose =E2=80=9C, or" in 716a206

> The remainder of this comment section was generated by taking my =
comments
> from the -16 and attempting to remove those that no longer apply.
> It is possible I missed a change and erroneously left in some comments
> that no longer apply.
>=20
> I can see why it would not make sense to do so in this document that =
is
> so tightly integrated with CORECONF, but is there any work to produce =
a
> CBOR encoding for the "structure" extension from RFC 8791?

We believe that should now be covered; see the various occurrences of =
=E2=80=9CYANG data structure=E2=80=9D (which is an RFC 8791 term).

> As a general note, I did not look particularly carefully at the =
example
> CBOR encodings, on the assumption that they were automatically =
generated
> as part of the document production process.
>=20
> Section 4.2
>=20
>   This specification supports two types of CBOR keys; SID as defined =
in
>   Section 3.2 and names as defined in Section 3.3.
>=20
> I suggest making an explicit statement about whether the two types of
> keys can be comingled in the same container/etc, possibly just by
> forward-reference to the media-type parameter.

Added 8d08538

> Section 4.2.2
>=20
>   [...] A namespace-qualified name
>   MUST be used each time the namespace of a schema node and its parent
>   differ.  In all other cases, the simple form of the name MUST be
>   used.  [...]
>=20
> We have a similar statement in =C2=A73.3 that is only "the simple form =
of the
> name SHOULD be used" for the latter sentence.  It's not entirely clear
> to me what causes the strength of requirement to be different between
> the two cases.

The one in 3.3 also should be a MUST.
Changed in def18b4

> Section 4.6
>=20
> Do we want to explicitly acknowledge the mismatch between the "xml" in
> "anyxml" and the actual CBOR contents?

See the other ADs' comments about this :-)
Added comment in 65dc7c0

> Section 5.2
>=20
>   The yang-data extensions encoded using names are carried in a CBOR
>   map containing a single item pair.  The key of this item is set to
>   the namespace qualified name of the yang-data extension container;
>   the value is set to the CBOR encoding of this container as defined =
in
>   Section 3.3.
>=20
> I'm not sure if this is a nit or not, so putting it here: is =C2=A73.3 =
the
> right reference for the encoding of the container (vs. =C2=A74.2)?

4.2 certainly is better here.
Fixed in 62f42c2

> Section 6.6
>=20
> Requiring the string form for enumeration constants in a union seems
> like a big loss on encoded size.  Is it worth putting some discussion =
in
> the document (or an appendix thereto) about why other options like
> tagged integer are not usable?  (Similar discussion might be relevant
> for the bits-in-union case.)

It is hard to discuss this without saying bad things about the way this =
has defined in YANG, and my mother has told me to only ever say good =
things about other people.

> While it's banal, we might also put an example of the integer-encoded
> form (as used by non-union contexts) so that the tagged-text-string
> example isn't the only one given.

Passing on this for now=E2=80=A6

>=20
>   Leafs of type enumeration MUST be encoded using a CBOR unsigned
>   integer (major type 0) or CBOR negative integer (major type 1),
>   depending on the actual value.  [...]
>=20
> I think we should also mention the tagged-text-string case here.

Yes: a0be5db

> Section 6.7
>=20
>   In a number of cases the array would only need to have one element -
>   a byte string with a small number of bytes inside.  For this case, =
it
>   is expected to omit the array element and have only the byte array
>   that would have been inside.  [...]
>=20
> I think it is actually required (not just "expected") based on some
> later text.

Indeed, 7b2970b

> Section 6.10, 6.13
>=20
> I strongly encourage explicit mention of the use of a CBOR tag when
> these elements appear inside a union, analogous to the text in =C2=A76.6=
 and
> 6.7.  The list in =C2=A76.12 is pretty easy to miss, and the word =
"tag" does
> not appear at all in these sections.

Good point; addressed in fa37812

> Section 7
>=20
>   This specification defines the media-type "application/yang-
>   data+cbor", which can be used without parameters or with the
>   parameter "id=3Dname" or "id=3Dsid".
>=20
> I think the media-type discussions should refer to the "id" parameter
> and the two possible values for that parameter ('=3D' is not allowed =
in a
> parameter name).
> [ed. I was thinking something like "with the 'id' parameter set to
> either 'name' or 'sid'" in this paragraph.  The subsequent paragraphs
> look to be treated well in the -17; thanks!]
>=20

Right!
Now 5f4e316

>   This media-type represents a CBOR YANG document containing one or
>   multiple data node values.  Depending on the presence and value of
>   the media-type parameter "id", each data node is identified by its
>   associated namespace qualified name as defined in Section 3.3
>   ("id=3Dname"), by its associated YANG SID (represented as a SID =
delta
>   or via tag 47) as defined in Section 3.2 ("id=3Dsid"), or either of
>   these (no "id" parameter given).
>=20
> I think that for identityref and instance-identifier we don't use the
> tag 47 for absolute (non-delta) SIDs, at least outside of a union
> context.

I just turned this into an example: 56d8956

> Section 8
>=20
> It might be worth mentioning that when the 'id' parameter to the media
> type is used, it's important to properly reject identifiers of the =
other
> type, to avoid scenarios where different implementations interpret a
> given content in different ways.

Good point, I stole your text for 2c12398

> Section 10.1
>=20
> It's not clear to me that RFC 6241 needs to be classified as =
normative,
> at least based on the one place in the text where we reference it.

It is now informative.

> NITS
>=20
> Section 2
>=20
>   *  child: A schema node defined as a child node of a container, a
>      list, a case, a notification, an RPC input, an RPC output, an
>      action input, or an action output.
>=20
> Is this enumeration of "parent" node types guaranteed to be fixed for
> all time, or should we consider a more generic wording to describe it?
> (Likewise for the "parent" definition.)

It is already wrong, as it doesn=E2=80=99t mention structures etc.
Fortunately, we already got rid of the definition when defining =
=E2=80=9Crepresentation nodes=E2=80=9D...

> Section 4
>=20
> The example from RFC 7317 may have truncated a little too much of the
> content; "mandatory true" for choice transport, the "inet:" prefix for
> "type inet:host" and "inet:port-number", etc.

I assume this is about 4.4?
Changing that would probably also change the YANG-CBOR.
Instead, I added =E2=80=9Csimplified=E2=80=9D=E2=80=A6  39d5c73

>=20
> Section 4.5
>=20
>   *  CBOR map keys of any inner schema nodes MUST be set to valid
>      deltas or names.
>=20
>   *  The CBOR array MUST contain either unique scalar values (as a
>      leaf-list, see Section 4.3), or maps (as a list, see Section =
4.4).
>=20
> I think a parallel list structure would be "CBOR arrays MUST contain
> [...]".
>=20
>   *  CBOR map values MUST follow the encoding rules of one of the
>      datatypes listed in Section 4.
>=20
> (A recursive reference, though I mostly trust the reader to pick out =
the
> relevant subsections.)

CBOR people are used to recursion (in contrast to YANG people :-)

Gr=C3=BC=C3=9Fe, Carsten


From nobody Mon Mar 21 13:51:22 2022
Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C712C3A1B23 for <core@ietfa.amsl.com>; Mon, 21 Mar 2022 13:51:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=QwnVLJ/L; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=QwnVLJ/L
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C10Oxji_PvzT for <core@ietfa.amsl.com>; Mon, 21 Mar 2022 13:51:14 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-db5eur03on061b.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0a::61b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E1B83A1B49 for <core@ietf.org>; Mon, 21 Mar 2022 13:51:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6s2V1zlE8wSa15yTcc8PPQMv68jaBVeY2RYVxa/ej9w=; b=QwnVLJ/LbtPQLFTeHDbVQO9BCaf0ozJ2y8LJOaZu6jk39kuiEjIYBtw3dq9+g0n0sviuyD8D+VupQl1rxJEdQEMPxeoTxHWti2PGIod8XoHxtAQ2ry1AsQ6WXdxIDpTVq8TLZIPsYf0i6fCsJL1YpXiKB0uUEUNBRfNAxabJ/Ws=
Received: from DB9PR05CA0024.eurprd05.prod.outlook.com (2603:10a6:10:1da::29) by DB9PR08MB6974.eurprd08.prod.outlook.com (2603:10a6:10:2c1::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Mon, 21 Mar 2022 20:51:06 +0000
Received: from DB5EUR03FT014.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:1da:cafe::95) by DB9PR05CA0024.outlook.office365.com (2603:10a6:10:1da::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22 via Frontend Transport; Mon, 21 Mar 2022 20:51:06 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT014.mail.protection.outlook.com (10.152.20.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend Transport; Mon, 21 Mar 2022 20:51:05 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113"); Mon, 21 Mar 2022 20:51:05 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: d8dc061cab6b4d1d
X-CR-MTA-TID: 64aa7808
Received: from 79bdde3092de.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id E16FF784-3D27-4DB9-B981-B72D710AE500.1;  Mon, 21 Mar 2022 20:50:59 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 79bdde3092de.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 21 Mar 2022 20:50:59 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fIXS7J4ZtvJeaU/+gG7jBHpfui3+qvj45kEtKxSsvofc5RE9raC+3YpzlX4LQQPuQUZPbWHGJAU6HoQqpeoRMVutcYVxmue/DXPBcFdPHdGTHJFDVlgWkcOJo750EC4HvxHqmAWc0v77g/WxoJVDrOWcKmEhZSmGbCVHCBPJcFJAnuuj3MBk3f7a1ajStM17nni09odzntXPh0BCcdDQ3CYNLMyFzD/7l4CV6ivxqG+ulYRIFh6WcFBUD1IuQ6qqrh65+VgEuRI62IL/EvUypR912JQwo4DaPyuMkMx81GoWJHSR7WR0oB9vwf4NtonkHa4ZObYpEKnYKaSUYWhHpw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6s2V1zlE8wSa15yTcc8PPQMv68jaBVeY2RYVxa/ej9w=; b=GM7byA5WWhcR12BSO4w8lPsBZNpI4U1PpsAgRUsYrgBkVVfp3BwE1LjaS7D0tJjP+kcwm1zZH2en7pNDxJzOGjb2QWXRq2nOUOy5UKIva92feRJD1Ymukx07D9Y8SYE4A1TO8WCOJc9NWugE3TFdToanmxAHKCAFUZy20cKwCI7DjzBTAlrYaA6xskzYsAbkb2/V2mGfZqRXR3CXITznTEfDR/7Jqzv5I8jBDpfkgO5dGo84k6ae+SIa+lL5Zje2yPRMMo2LFM1pVJ2FW3FEE033Mtd3wswuj213i/RQQ+kEQiS9jQ0WgFJAz7z84TwSprKT+xCBsaW3Gvrx+/efTg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6s2V1zlE8wSa15yTcc8PPQMv68jaBVeY2RYVxa/ej9w=; b=QwnVLJ/LbtPQLFTeHDbVQO9BCaf0ozJ2y8LJOaZu6jk39kuiEjIYBtw3dq9+g0n0sviuyD8D+VupQl1rxJEdQEMPxeoTxHWti2PGIod8XoHxtAQ2ry1AsQ6WXdxIDpTVq8TLZIPsYf0i6fCsJL1YpXiKB0uUEUNBRfNAxabJ/Ws=
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com (2603:10a6:10:251::8) by VI1PR08MB4317.eurprd08.prod.outlook.com (2603:10a6:803:101::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Mon, 21 Mar 2022 20:50:57 +0000
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::d971:bb59:de21:68]) by DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::d971:bb59:de21:68%2]) with mapi id 15.20.5081.023; Mon, 21 Mar 2022 20:50:56 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: Carsten Bormann <cabo@tzi.org>, Thomas Fossati <tho.ietf@gmail.com>
CC: "core@ietf.org WG" <core@ietf.org>
Thread-Topic: [core] time to start the deprecation of CCM_8?
Thread-Index: AQHXxCJDWX71RmuEuEazn5jBqReJUavY5baAgAFH/QCAAWfxgIAAAm6AgAAA/YCAAAzsAIAAHlEAgAAy/ICAAAL8AIDuj75N
Date: Mon, 21 Mar 2022 20:50:56 +0000
Message-ID: <DB9PR08MB6524297453A3393064D7B4739C169@DB9PR08MB6524.eurprd08.prod.outlook.com>
References: <CAObGJnOCHG_aNWTHsQyXdEcwviPDpZjzE3aEBXRd7GLfBHYtuw@mail.gmail.com> <081C80A8-5317-4DB1-BBCB-21654AE6F444@tzi.org> <20585.1634642284@localhost> <CAObGJnMwgEDX_LqxpKEU_v6WkLFFmzyizKLtjbR1JsMOdnJxGQ@mail.gmail.com> <4603B5A0-8179-40D7-9335-52D9FD59BAE8@tzi.org> <3B735512-CAAE-433E-BBF1-446088E3FFD2@tzi.org> <CAObGJnNfP894FqY9bsUtNeDisqCmAURrnA=x0y0eD+O+oO-Y-w@mail.gmail.com> <166EBE02-113B-4054-9B99-043EC31A68FB@tzi.org> <CAObGJnOSJJTmE7-MrdFfddMGsfreu8iZ=YmR7k5Ts6PD5GFaxA@mail.gmail.com> <569437DE-A7A4-497F-8427-627A7E137F92@tzi.org>
In-Reply-To: <569437DE-A7A4-497F-8427-627A7E137F92@tzi.org>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1016b34a-dbdf-4c4c-7d8d-08da0b7c84c7
x-ms-traffictypediagnostic: VI1PR08MB4317:EE_|DB5EUR03FT014:EE_|DB9PR08MB6974:EE_
X-Microsoft-Antispam-PRVS: <DB9PR08MB6974B2251E8F9C1C6DBBE5AE9C169@DB9PR08MB6974.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR08MB6524.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(33656002)(8936002)(86362001)(83380400001)(91956017)(52536014)(38100700002)(966005)(71200400001)(55016003)(316002)(38070700005)(110136005)(508600001)(2906002)(26005)(186003)(76116006)(66476007)(64756008)(4326008)(66556008)(66446008)(8676002)(66946007)(166002)(5660300002)(53546011)(9686003)(122000001)(6506007)(7696005)(4001150100001); DIR:OUT; SFP:1101; 
Content-Type: multipart/alternative; boundary="_000_DB9PR08MB6524297453A3393064D7B4739C169DB9PR08MB6524eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4317
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT014.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 2fa30e63-2c25-4f9d-fb4b-08da0b7c7f82
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:;  IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com;  PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(70586007)(82310400004)(966005)(52536014)(166002)(8936002)(4001150100001)(8676002)(47076005)(70206006)(33656002)(508600001)(4326008)(81166007)(83380400001)(7696005)(9686003)(6506007)(5660300002)(53546011)(356005)(36860700001)(186003)(26005)(336012)(55016003)(2906002)(316002)(40460700003)(110136005)(86362001); DIR:OUT; SFP:1101; 
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 20:51:05.7778 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1016b34a-dbdf-4c4c-7d8d-08da0b7c84c7
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123];  Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT014.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6974
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/iKjLyWgxtm-SYA6lY49b3mDIHAE>
Subject: Re: [core] time to start the deprecation of CCM_8?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2022 20:51:20 -0000

--_000_DB9PR08MB6524297453A3393064D7B4739C169DB9PR08MB6524eurp_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi all,

Coming back to this thread to give you an update on the current (draft) pro=
posal:

https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-04.html#se=
ction-18

Please have a look and let us know what you think.

Thanks!

From: core <core-bounces@ietf.org> on behalf of Carsten Bormann <cabo@tzi.o=
rg>
Date: Wednesday, 20 October 2021 at 15:47
To: Thomas Fossati <tho.ietf@gmail.com>
Cc: core@ietf.org WG <core@ietf.org>
Subject: Re: [core] time to start the deprecation of CCM_8?
On 2021-10-20, at 16:35, Thomas Fossati <tho.ietf@gmail.com> wrote:
>
> On Wed, Oct 20, 2021 at 1:41 PM Carsten Bormann <cabo@tzi.org> wrote:
>> On 20. Oct 2021, at 11:44, Thomas Fossati <tho.ietf@gmail.com> wrote:
>>>
>>> Not sure I understand this comment: irrespective of what openssl does,
>>> what other chiphersuite provides 8-byte auth tags?  If the requirement
>>> is an 8-byte auth tag version you are left with no other choice than
>>> CCM.  Is this your requirement?
>>
>> If we want to replace CCM_8, it would be natural to choose something tha=
t has similar performance characteristics.
>
> By performance characteristic I assume you refer to the wire image
> size, correct?  If so, that's exactly the problem: the small tag size
> (which is the major factor in the size reduction) is what makes CCM_8
> a bad choice unless
> ${insert_long_and_complicated_list_of_considerations}.  However, I
> strongly suspect we'd end up in a similar situation with regards to
> the integrity bounds if we hypothetically came up with a ciphersuite
> based on a different primitive and/or mode but sporting similarly
> sized auth tags. So ... (continues below)

The NIST document that was earlier referenced in this thread does deprecate=
d 32-bit tags (no wonder), but does leave room for 64-bit tags.
So I was assuming they are still in the realm of consideration.

>> I can imagine openssl doesn=92t have a 64-bit authenticator option; mayb=
e we need to cough up one.
>
> (I guess s/openssl/TLS/ ?)
>
> ... if you mean defining a new XYZ_8 ciphersuite I'd rather stay with
> CCM_8 since the analysis is already done and implementations exist.

Which works for me :-)
I=92d like to have John=92s numbers written up somewhere so we can point to=
 the usage limitations.

>> (Or we could leave CCM_8 in place, i.e., deprecate it slightly less.)
>
> By "deprecating slightly less" what do you mean exactly?  Is it:
> * MAY CCM_8 if ...
> instead of
> * SHOULD NOT CCM_8 unless ...
> and
> * MUST/SHOULD XYZ

I used wishy-washy words because I=92m not sure of the language either.
Instead of carefully selecting a word of deprecation, I think we should be =
explicit about the remaining area of application.  We can then put in a str=
ong word for applications outside that boundary.

* MUST NOT be used with manually keyed environments
* SHOULD only be used where the performance difference between 8-byte and 1=
6-byte tags is a deciding factor in the viability of the application, and w=
here the somewhat increased risk (see table 1) is acceptable.
* MUST be used with a mechanism that keeps visibility over whether the usag=
e limits are being reached.

(Well, 1 follows from 3, but better be explicit.)
Insert your requirements (and table 1) here...

Gr=FC=DFe, Carsten

_______________________________________________
core mailing list
core@ietf.org
https://www.ietf.org/mailman/listinfo/core
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_DB9PR08MB6524297453A3393064D7B4739C169DB9PR08MB6524eurp_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	font-size:10.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple" style=3D"word-wrap:brea=
k-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US">Hi all,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US">Coming back to this thread to give you an update on the current (dr=
aft) proposal:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US"><a href=3D"https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot=
-profile-04.html#section-18">https://www.ietf.org/archive/id/draft-ietf-uta=
-tls13-iot-profile-04.html#section-18</a><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US">Please have a look and let us know what you think.<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US">Thanks!<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;mso-fareast-language=
:EN-US"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0cm;margin-right:0cm;mar=
gin-bottom:12.0pt;margin-left:36.0pt">
<b><span style=3D"font-size:12.0pt;color:black">From: </span></b><span styl=
e=3D"font-size:12.0pt;color:black">core &lt;core-bounces@ietf.org&gt; on be=
half of Carsten Bormann &lt;cabo@tzi.org&gt;<br>
<b>Date: </b>Wednesday, 20 October 2021 at 15:47<br>
<b>To: </b>Thomas Fossati &lt;tho.ietf@gmail.com&gt;<br>
<b>Cc: </b>core@ietf.org WG &lt;core@ietf.org&gt;<br>
<b>Subject: </b>Re: [core] time to start the deprecation of CCM_8?<o:p></o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><span style=3D"font-siz=
e:11.0pt">On 2021-10-20, at 16:35, Thomas Fossati &lt;tho.ietf@gmail.com&gt=
; wrote:<br>
&gt; <br>
&gt; On Wed, Oct 20, 2021 at 1:41 PM Carsten Bormann &lt;cabo@tzi.org&gt; w=
rote:<br>
&gt;&gt; On 20. Oct 2021, at 11:44, Thomas Fossati &lt;tho.ietf@gmail.com&g=
t; wrote:<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; Not sure I understand this comment: irrespective of what opens=
sl does,<br>
&gt;&gt;&gt; what other chiphersuite provides 8-byte auth tags?&nbsp; If th=
e requirement<br>
&gt;&gt;&gt; is an 8-byte auth tag version you are left with no other choic=
e than<br>
&gt;&gt;&gt; CCM.&nbsp; Is this your requirement?<br>
&gt;&gt; <br>
&gt;&gt; If we want to replace CCM_8, it would be natural to choose somethi=
ng that has similar performance characteristics.<br>
&gt; <br>
&gt; By performance characteristic I assume you refer to the wire image<br>
&gt; size, correct?&nbsp; If so, that's exactly the problem: the small tag =
size<br>
&gt; (which is the major factor in the size reduction) is what makes CCM_8<=
br>
&gt; a bad choice unless<br>
&gt; ${insert_long_and_complicated_list_of_considerations}.&nbsp; However, =
I<br>
&gt; strongly suspect we'd end up in a similar situation with regards to<br=
>
&gt; the integrity bounds if we hypothetically came up with a ciphersuite<b=
r>
&gt; based on a different primitive and/or mode but sporting similarly<br>
&gt; sized auth tags. So ... (continues below)<br>
<br>
The NIST document that was earlier referenced in this thread does deprecate=
d 32-bit tags (no wonder), but does leave room for 64-bit tags.<br>
So I was assuming they are still in the realm of consideration.<br>
<br>
&gt;&gt; I can imagine openssl doesn=92t have a 64-bit authenticator option=
; maybe we need to cough up one.<br>
&gt; <br>
&gt; (I guess s/openssl/TLS/ ?)<br>
&gt; <br>
&gt; ... if you mean defining a new XYZ_8 ciphersuite I'd rather stay with<=
br>
&gt; CCM_8 since the analysis is already done and implementations exist.<br=
>
<br>
Which works for me :-)<br>
I=92d like to have John=92s numbers written up somewhere so we can point to=
 the usage limitations.<br>
<br>
&gt;&gt; (Or we could leave CCM_8 in place, i.e., deprecate it slightly les=
s.)<br>
&gt; <br>
&gt; By &quot;deprecating slightly less&quot; what do you mean exactly?&nbs=
p; Is it:<br>
&gt; * MAY CCM_8 if ...<br>
&gt; instead of<br>
&gt; * SHOULD NOT CCM_8 unless ...<br>
&gt; and<br>
&gt; * MUST/SHOULD XYZ<br>
<br>
I used wishy-washy words because I=92m not sure of the language either.<br>
Instead of carefully selecting a word of deprecation, I think we should be =
explicit about the remaining area of application.&nbsp; We can then put in =
a strong word for applications outside that boundary.<br>
<br>
* MUST NOT be used with manually keyed environments<br>
* SHOULD only be used where the performance difference between 8-byte and 1=
6-byte tags is a deciding factor in the viability of the application, and w=
here the somewhat increased risk (see table 1) is acceptable.<br>
* MUST be used with a mechanism that keeps visibility over whether the usag=
e limits are being reached.<br>
<br>
(Well, 1 follows from 3, but better be explicit.)<br>
Insert your requirements (and table 1) here...<br>
<br>
Gr=FC=DFe, Carsten<br>
<br>
_______________________________________________<br>
core mailing list<br>
core@ietf.org<br>
</span><a href=3D"https://www.ietf.org/mailman/listinfo/core"><span style=
=3D"font-size:11.0pt">https://www.ietf.org/mailman/listinfo/core</span></a>=
<span style=3D"font-size:11.0pt"><o:p></o:p></span></p>
</div>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_DB9PR08MB6524297453A3393064D7B4739C169DB9PR08MB6524eurp_--


From nobody Mon Mar 21 14:32:10 2022
Return-Path: <kivinen@iki.fi>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08B923A1B4D for <core@ietfa.amsl.com>; Mon, 21 Mar 2022 14:32:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level: 
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=iki.fi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5bi90o0FgRt8 for <core@ietfa.amsl.com>; Mon, 21 Mar 2022 14:32:04 -0700 (PDT)
Received: from lahtoruutu.iki.fi (lahtoruutu.iki.fi [IPv6:2a0b:5c81:1c1::37]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3A053A1B3E for <core@ietf.org>; Mon, 21 Mar 2022 14:32:03 -0700 (PDT)
Received: from fireball.acr.fi (fireball.kivinen.iki.fi [IPv6:2001:1bc8:100d::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: kivinen@iki.fi) by lahtoruutu.iki.fi (Postfix) with ESMTPSA id 45B721B0029D; Mon, 21 Mar 2022 23:31:59 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=lahtoruutu;  t=1647898319; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=CRECPm93QtFnyDiMPbtiXTWAi2odg5O1vJ5ntYmcyVY=; b=U7Z8SvTjf/gvduKKbPPLu1jQnGn+k8QJzsTWOoi0f/0rnFM463ZsIvT+7G3TjBCA8sHKKD z2r1hbcYYrdSt3srtkwkXSs1u4sMjkhuu/fQaoO5e9J3gmMb/OrrCcAlvfAzDr5PG+vSqf mLyQO6VKzHCWWNspSPACiRx6RGZIDtdfK+wbOpdRqbvBxq2Tjr7ST/pjZ9gvqKnmLLQBRw 96amozwm8/sAS7WvPEB+Sr/2UJvUlR54+ovv2glRb4Th3gqnLgwLcIdEORKww7NMaIveSX 2kh50+2DPwkoF30dtricNnAxmHK0RNaIoJEIn0W9cJ7GZMgLe8a4aIKq8gyVNg==
Received: by fireball.acr.fi (Postfix, from userid 15204) id 3427325C12EA; Mon, 21 Mar 2022 23:31:58 +0200 (EET)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <25144.61133.932882.915897@fireball.acr.fi>
Date: Mon, 21 Mar 2022 23:31:57 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: Thomas Fossati <Thomas.Fossati@arm.com>
Cc: Carsten Bormann <cabo@tzi.org>, Thomas Fossati <tho.ietf@gmail.com>, "core\@ietf.org WG" <core@ietf.org>
In-Reply-To: <DB9PR08MB6524297453A3393064D7B4739C169@DB9PR08MB6524.eurprd08.prod.outlook.com>
References: <CAObGJnOCHG_aNWTHsQyXdEcwviPDpZjzE3aEBXRd7GLfBHYtuw@mail.gmail.com> <081C80A8-5317-4DB1-BBCB-21654AE6F444@tzi.org> <20585.1634642284@localhost> <CAObGJnMwgEDX_LqxpKEU_v6WkLFFmzyizKLtjbR1JsMOdnJxGQ@mail.gmail.com> <4603B5A0-8179-40D7-9335-52D9FD59BAE8@tzi.org> <3B735512-CAAE-433E-BBF1-446088E3FFD2@tzi.org> <CAObGJnNfP894FqY9bsUtNeDisqCmAURrnA=x0y0eD+O+oO-Y-w@mail.gmail.com> <166EBE02-113B-4054-9B99-043EC31A68FB@tzi.org> <CAObGJnOSJJTmE7-MrdFfddMGsfreu8iZ=YmR7k5Ts6PD5GFaxA@mail.gmail.com> <569437DE-A7A4-497F-8427-627A7E137F92@tzi.org> <DB9PR08MB6524297453A3393064D7B4739C169@DB9PR08MB6524.eurprd08.prod.outlook.com>
X-Mailer: VM 8.2.0b under 26.3 (x86_64--netbsd)
X-Edit-Time: 10 min
X-Total-Time: 17 min
ARC-Authentication-Results: i=1; ORIGINATING; auth=pass smtp.auth=kivinen@iki.fi smtp.mailfrom=kivinen@iki.fi
ARC-Seal: i=1; s=lahtoruutu; d=iki.fi; t=1647898319; a=rsa-sha256; cv=none; b=r5dODS1vSOmgtdte52OFfuyioq8lu0aE6mi2VTChSP+CZQQGUedOip6yoeEsnwNgsRmyOD 5JNrx+8d4HjtKwfuX+NHYwCkcBP4VzJegajhIc9n7lIknAsCkGr+Q8UX4Y+vM3H+o8kQYJ LB9kbUEoCqho9PJNct3qJ36egw857w4e+NM5hDMkqCGwVnhWOMUdG6nBVmjS3Ei0BkPp7m d3KVizp72fGMekEOmzhPV2Sdx3DqJacH9iKlPdlGGmWIPmJgNJILZ9hPtu8wGvlkvwNTi6 LxIEEHQ0t+/gB+CxDXhLvbnBxl6bzUSiMu32ZuULe/pACHyRUQr4Dibot6EJCw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=lahtoruutu; t=1647898319; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=CRECPm93QtFnyDiMPbtiXTWAi2odg5O1vJ5ntYmcyVY=; b=GGPyA+uEVYYkXX+iKpLKyod1ECEHDvjoCE+0EJJLPb4Yy4MgVp++ddyoeXXASn0nwHyjSJ /i5dZ72IS8C0d+jkdiLTykktep7Cxj2DnnLFhuIjT6tCjQCGqEAzxuFcp2KR7iU+IUqC1o POx/PGXDTgACOWV1GYVJ9DRo+WUQJvJ96GIjtNtLUdJyAWgOr6ktTOUe9rPUK48htJnssX ++TastVqZ5VFrR8z4ZMhum220vNRfr5ZzgomTHArj7LYfHvtHHu9pR5Lkfs/ItWCWv9mkw vR3LpumPmPY8sHOf8ukrbxScz2+5ZwD/L5GDpl0vgVI61Xb4+lgXE8zugnBFdg==
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/dBgYm8cMvgvhwenmyyq1M_bYfD4>
Subject: Re: [core] time to start the deprecation of CCM_8?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2022 21:32:08 -0000

Thomas Fossati writes:
> Coming back to this thread to give you an update on the current (draft)
> proposal:
> 
> https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-04.html#section-18
> 
> Please have a look and let us know what you think.

I have not been able to parse that CFRG draft properly to really
understand what their limits mean.

I.e. the assumptions there seem to be for normal internet traffic, but
if we assume IoT use case, for example IEEE 802.15.4, and use say
maximum packet size of 127 bytes (normal packet size is most likely
something like 80-100 bytes), maximum data rate of 250 kBit/s, i.e.
about 300-400 packets / second, how long would one of those forgery
attempts take in seconds?

I would assume that on environments which are not that constrained
(i.e., has packet sizes over 0.5 kB, or speed over 1MBit/s) do not
need to save bytes and use CCM_8. Those environments can (and should)
use normal CCM, so only the very constrained devices shuld be of
interest when talking about CCM_8.
-- 
kivinen@iki.fi


From nobody Tue Mar 22 02:18:59 2022
Return-Path: <achimkraus@gmx.net>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CABA43A0D1F for <core@ietfa.amsl.com>; Tue, 22 Mar 2022 02:18:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level: 
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wlF866BNPfLZ for <core@ietfa.amsl.com>; Tue, 22 Mar 2022 02:18:51 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06AFE3A0D12 for <core@ietf.org>; Tue, 22 Mar 2022 02:18:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1647940680; bh=rDD9xLnYTlnfgiBEV9jTNkcxXMPCRj6+8vyvsVOgaL0=; h=X-UI-Sender-Class:Date:Subject:To:Cc:References:From:In-Reply-To; b=OhH5DGB3I/BWFtZtfOTAJWhlwJ90TvqVMn1Io/XeImrSBTkNqVFS45VnWAQUFmOcy 3BdWPu3USb+0xHz7PMiFIa6HxB4aRlQY5FbrEPTIBlFhZEBI1+4l+buz3S2vTZqD2a 6ICdbDF0MvyIGvKVpTKam+JpDPHJ5ebMnEkrt6Jg=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.178.10] ([5.146.193.130]) by mail.gmx.net (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MWASY-1nZR893v6w-00XeSP; Tue, 22 Mar 2022 10:17:59 +0100
Message-ID: <cc3dc7ef-2455-ba23-9957-2ececfd9fe0d@gmx.net>
Date: Tue, 22 Mar 2022 10:17:59 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: de-AT-frami
To: Tero Kivinen <kivinen@iki.fi>
Cc: "core@ietf.org WG" <core@ietf.org>, Thomas Fossati <Thomas.Fossati@arm.com>
References: <CAObGJnOCHG_aNWTHsQyXdEcwviPDpZjzE3aEBXRd7GLfBHYtuw@mail.gmail.com> <081C80A8-5317-4DB1-BBCB-21654AE6F444@tzi.org> <20585.1634642284@localhost> <CAObGJnMwgEDX_LqxpKEU_v6WkLFFmzyizKLtjbR1JsMOdnJxGQ@mail.gmail.com> <4603B5A0-8179-40D7-9335-52D9FD59BAE8@tzi.org> <3B735512-CAAE-433E-BBF1-446088E3FFD2@tzi.org> <CAObGJnNfP894FqY9bsUtNeDisqCmAURrnA=x0y0eD+O+oO-Y-w@mail.gmail.com> <166EBE02-113B-4054-9B99-043EC31A68FB@tzi.org> <CAObGJnOSJJTmE7-MrdFfddMGsfreu8iZ=YmR7k5Ts6PD5GFaxA@mail.gmail.com> <569437DE-A7A4-497F-8427-627A7E137F92@tzi.org> <DB9PR08MB6524297453A3393064D7B4739C169@DB9PR08MB6524.eurprd08.prod.outlook.com> <25144.61133.932882.915897@fireball.acr.fi>
From: Achim Kraus <achimkraus@gmx.net>
In-Reply-To: <25144.61133.932882.915897@fireball.acr.fi>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: quoted-printable
X-Provags-ID: V03:K1:AAKxIksHPEhp5pjzTLfchHlWwv94F8xLNawlzo9uOtYohlhFZ0E gDkTiqgaMD3sk2eqP+dMWKBNGZLtbVxR64xQwABcG1q2+aN1rFd4ieQb7l7OfGjOQT8Yp2a YcmFaXag7cOVB+QVgv3rAN0oemgbPecbpi4LlQwZ/tVg2Uj2cW+UaL1akl0JvxZtjr2+1ZO JBqU8gPSX/CHiytbW2xoQ==
X-UI-Out-Filterresults: notjunk:1;V03:K0:Ob/kR3A2sZE=:i3q9l5Ps3o7nxwPeC1O6Vf bpmpBZXjBteol2uDGAE4+u03BkO0BnasDBufjR04TKcWcL/sJGxpS6zpIBJmmF/MzjW6cOcu3 iXeU/MXyfzYWwck/enjIWXo56IqYyU0cwGJ4Ahn5w1uc7AhEViNgAa8fIBaw3bLsNPJYN2nCA EAZLKeNNELmANfIrcQ4XnpiDjBJRp9wufCvaLeK/zenSrp0QAPPfyk5BDUyQLQMmP+5HzhZ0j kfqPh8tvE9E5hhLim5+tvfFMUPC5zuhBkdlEISaS5xpVu4I9d5Yde8VcbZHCXvKH84MGtVWyT FsbiDU86Q4icRgsjBJ8WyK1HVcZJQyk25rQI6klaBLxV0obEtJkZC6i2p+duc0dZ6KZmWd9nB YgJKxTAwZxtWKi1waUzy4xDjdZQ5JuZ1ntrvcrYXCLOHgAvdAmSFDHPQHf3eT4zsJRzGnsS2h IJxup4itxHBhgOAN2h9zrrqpLjjhiaiQXTtYYZm5iGw25Gu73NiTS9VZeMDaHd6Br3aL3RzHZ 7d2QCoRfOAk0dtrN6CQSRvZUI1zN/2MM5fG/2kT/d6ckKQi4tQIVGXtPEhjE71KUUv+41DT3C qfzdTNRtf14FHuuZ/SYgZbNKGbkSOciq3qYBfgDX97d/GS/JMCP3mbO3am0xMYua+rYCoMCFd ZCSpa1d8PqUKp52ce0JH3fGn5fcfgLCGuaF4giHNvMzR1DOz5uOyFqL+AR9dMCeYX6YQwqFud aMGocuf9j7P6MfSzxw0ibn2q9a90Mdpk/SeusEcKOp4SbnUC/4Z9So1sU9FKtpNYB7FUsp8GK s1vL8ByBKhcRgpvncWqKT6JwqRDMrgdZLwW98LwUB8HM4eeyMnWHFHCfcwK+H7UnIOR756Dev kyHWOq7Yoj+oK4OaaxnbI2v5yoe4PIePwTGq+0QH9+j4B6DEqKWt0ii4B2DDbj0jbXfbLG0wi lSA8uARBotnOrP0m8CehSTWDGz1raGcLNEHKWI7bOxe1S1Q9cq3ftKN37aGgpXcADuXdJYo8m K8GpfgEFHqCK5xdjHcszHhmMHkmZMqMcrRPER66lXPqN+EZTgfK/6FjjI3dRuLfY2KYZKsnKQ KkHGWj4cOk5k1A=
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ETtbhGyO8TJAmcnYlp6zFWzvcYs>
Subject: Re: [core] time to start the deprecation of CCM_8?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 09:18:57 -0000

Hi Tero,

as I wrote last year in
https://mailarchive.ietf.org/arch/msg/core/qFNAXTWVWr8X0ROLPlbvSy965nk/

"- check for each deployment, if the 8 bytes saving is relevant. For
normal IP(v4) traffic we have 20 bytes IP, 8 bytes UDP, 13 bytes DTLS
1.2 record, 8 bytes nonce, and 8 or 16 bytes MAC. That's in sum 57 vs.
65 (or about 12%). Adding a CoAP message with 32 byte, the relative
saving is less. In some cases it's more the MTU, which makes the 8 bytes
saving relevant in order not to use 2 low-layer-messages."

The saving isn't that large, at least, if there is no mistake in that
calculation. For cases with "header compression", someone, who is more
common to that, may provide an additional calculation.

For me the question is:
- is it easier (less effort) to go with the TLS mainstream and
"deprecate CCM8".
- or to dig into the "57 bit assumption", which causes the pain for the
"64 bit MAC".

For the second, we can try to get some help from one of the crypto
experts, to get more background for the 57 bit. But I would appreciate,
if that is not only my question and more of that group raise their interes=
t.
For the most of my usage, CCM will do it, so personally I tend to go for
the first, just use ccm without dig into the 57bit.

best regards
Achim

Am 21.03.22 um 22:31 schrieb Tero Kivinen:
> Thomas Fossati writes:
>> Coming back to this thread to give you an update on the current (draft)
>> proposal:
>>
>> https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-04.htm=
l#section-18
>>
>> Please have a look and let us know what you think.
>
> I have not been able to parse that CFRG draft properly to really
> understand what their limits mean.
>
> I.e. the assumptions there seem to be for normal internet traffic, but
> if we assume IoT use case, for example IEEE 802.15.4, and use say
> maximum packet size of 127 bytes (normal packet size is most likely
> something like 80-100 bytes), maximum data rate of 250 kBit/s, i.e.
> about 300-400 packets / second, how long would one of those forgery
> attempts take in seconds?
>
> I would assume that on environments which are not that constrained
> (i.e., has packet sizes over 0.5 kB, or speed over 1MBit/s) do not
> need to save bytes and use CCM_8. Those environments can (and should)
> use normal CCM, so only the very constrained devices shuld be of
> interest when talking about CCM_8.


From nobody Tue Mar 22 17:33:56 2022
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9041C3A1549; Tue, 22 Mar 2022 17:33:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wwvsD6gvhExn; Tue, 22 Mar 2022 17:33:48 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1900:3001:11::31]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 849E83A1536; Tue, 22 Mar 2022 17:33:44 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 499) id 91C083BA9D; Tue, 22 Mar 2022 17:33:43 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
From: rfc-editor@rfc-editor.org
Cc: rfc-editor@rfc-editor.org, drafts-update-ref@iana.org, core@ietf.org
Content-type: text/plain; charset=UTF-8
Message-Id: <20220323003343.91C083BA9D@rfc-editor.org>
Date: Tue, 22 Mar 2022 17:33:43 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/GjS7qwjGTVJ2sMd03Ljqd2OGDd4>
Subject: [core] =?utf-8?q?RFC_9177_on_Constrained_Application_Protocol_?= =?utf-8?q?=28CoAP=29_Block-Wise_Transfer_Options_Supporting_Robust_Transm?= =?utf-8?q?ission?=
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2022 00:33:53 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 9177

        Title:      Constrained Application Protocol (CoAP) Block-Wise 
                    Transfer Options Supporting Robust Transmission 
        Author:     M. Boucadair,
                    J. Shallow
        Status:     Standards Track
        Stream:     IETF
        Date:       March 2022
        Mailbox:    mohamed.boucadair@orange.com,
                    supjps-ietf@jpshallow.com
        Pages:      41
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-core-new-block-14.txt

        URL:        https://www.rfc-editor.org/info/rfc9177

        DOI:        10.17487/RFC9177

This document specifies alternative Constrained Application Protocol
(CoAP) block-wise transfer options: Q-Block1 and Q-Block2.

These options are similar to, but distinct from, the CoAP Block1 and
Block2 options defined in RFC 7959. The Q-Block1 and Q-Block2 options
are not intended to replace the Block1 and Block2 options but rather
have the goal of supporting Non-confirmable (NON) messages for large
amounts of data with fewer packet interchanges. Also, the Q-Block1
and Q-Block2 options support faster recovery should any of the blocks
get lost in transmission.

This document is a product of the Constrained RESTful Environments Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC



From nobody Wed Mar 23 08:25:45 2022
Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BD643A150C for <core@ietfa.amsl.com>; Wed, 23 Mar 2022 08:25:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level: 
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=gbSKmm0z; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=gbSKmm0z
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id btcvdqDBQD4S for <core@ietfa.amsl.com>; Wed, 23 Mar 2022 08:25:28 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2062b.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::62b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C41F3A17A3 for <core@ietf.org>; Wed, 23 Mar 2022 08:25:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=V36TVrtC1/4CNiKvnDsCMK3Yoz70s12UH10M6BT0bVc=; b=gbSKmm0z0kuejqe3WY2P+FLkXSfPdbu/X63yB9Yw0wLFwfgAnDnVerlyyfoe9miFaWMKSlW9PCrKlF9FoZxVzJjQt/xlPmH/WIXHAGFrK+5TtNIQFlfVpNN0beX+xpgIZJFfHLS63rMh9C5eiXceApROtgta4uX0vv17LmHHDZk=
Received: from AM6PR04CA0040.eurprd04.prod.outlook.com (2603:10a6:20b:f0::17) by AM0PR08MB5044.eurprd08.prod.outlook.com (2603:10a6:208:156::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 23 Mar 2022 15:25:14 +0000
Received: from AM5EUR03FT018.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:f0:cafe::51) by AM6PR04CA0040.outlook.office365.com (2603:10a6:20b:f0::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend Transport; Wed, 23 Mar 2022 15:25:14 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT018.mail.protection.outlook.com (10.152.16.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend Transport; Wed, 23 Mar 2022 15:25:14 +0000
Received: ("Tessian outbound 31aeb3346a45:v113"); Wed, 23 Mar 2022 15:25:14 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 70f9a65b87e669f5
X-CR-MTA-TID: 64aa7808
Received: from fa8ab3c8a1ed.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id C71C1C40-BC7F-4508-A9E0-11D326519E8E.1;  Wed, 23 Mar 2022 15:25:08 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fa8ab3c8a1ed.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 23 Mar 2022 15:25:08 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GoADkfYSw0fWcoH7AjZy/wHLR5z9HmGg4/AubHXq8upSKbBF3wMo8ar2fSnsoOPpyxwXEEa7HuNxD4XDj76RWiMFBBTPIIjI3cPjTB7bRx1JImcplU3FKniuFKTj4pinEDq7oBJiqOV3oZmfi2+Z+arcmF10rEqULz4VKeL/UrGVtL8kGNrZcz8u7NXGdFHhPyVhMkpPd1vsL2eDVt5NtkiQfzcsUj+e9j4JcYwE1nnhqcg+Hc4WnZAPaHIdkyAW45F907zbCyuLPE9/ixaH/BV1izUepfZuAyb0aQj2I9/t79SxINuzOyrNwWKYuD7Rp8KI5l5DV28wHun7jySTdw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=V36TVrtC1/4CNiKvnDsCMK3Yoz70s12UH10M6BT0bVc=; b=MFircvMLEf6lUJWTluBW0NH7Ik8zUtFr9JA4TSZ0jkSase6fQOlyAH916lr9HiMlpq8MhC8dsR8QQIURH5A4hix2DeOPS0t83XUK6Vdcd6xoPOD85yJmmNvZ9lHUeCttLNs94ccn61iqC2wrDfRjQ4Hro3eqzJx0aJKyZK9RzLYyc8HrcNsa0At7AewaOxDgy/NaeZ9aJnM4x9ruW4SMgzolB4Z1QunpvNtqougyIIZKkD2LZQaf59dUWCmSWx7r4vU4ILrA1RdbVrLk79iobBJUR8/HKK6gAur+Zb24BFMZS2+Vcb0kc04IxCBQLGObv/M67doEMAhokaiyImY4xg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=V36TVrtC1/4CNiKvnDsCMK3Yoz70s12UH10M6BT0bVc=; b=gbSKmm0z0kuejqe3WY2P+FLkXSfPdbu/X63yB9Yw0wLFwfgAnDnVerlyyfoe9miFaWMKSlW9PCrKlF9FoZxVzJjQt/xlPmH/WIXHAGFrK+5TtNIQFlfVpNN0beX+xpgIZJFfHLS63rMh9C5eiXceApROtgta4uX0vv17LmHHDZk=
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com (2603:10a6:10:251::8) by AM0PR08MB4050.eurprd08.prod.outlook.com (2603:10a6:208:12a::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Wed, 23 Mar 2022 15:25:01 +0000
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::d971:bb59:de21:68]) by DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::d971:bb59:de21:68%2]) with mapi id 15.20.5102.016; Wed, 23 Mar 2022 15:25:01 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: Tero Kivinen <kivinen@iki.fi>
CC: Carsten Bormann <cabo@tzi.org>, Thomas Fossati <tho.ietf@gmail.com>, "core@ietf.org WG" <core@ietf.org>
Thread-Topic: [core] time to start the deprecation of CCM_8?
Thread-Index: AQHXxCJDWX71RmuEuEazn5jBqReJUavY5baAgAFH/QCAAWfxgIAAAm6AgAAA/YCAAAzsAIAAHlEAgAAy/ICAAAL8AIDuj75NgADD6ICAArpl3w==
Date: Wed, 23 Mar 2022 15:25:01 +0000
Message-ID: <DB9PR08MB652437F020F11D18E724D1AE9C189@DB9PR08MB6524.eurprd08.prod.outlook.com>
References: <CAObGJnOCHG_aNWTHsQyXdEcwviPDpZjzE3aEBXRd7GLfBHYtuw@mail.gmail.com> <081C80A8-5317-4DB1-BBCB-21654AE6F444@tzi.org>	<20585.1634642284@localhost> <CAObGJnMwgEDX_LqxpKEU_v6WkLFFmzyizKLtjbR1JsMOdnJxGQ@mail.gmail.com> <4603B5A0-8179-40D7-9335-52D9FD59BAE8@tzi.org> <3B735512-CAAE-433E-BBF1-446088E3FFD2@tzi.org> <CAObGJnNfP894FqY9bsUtNeDisqCmAURrnA=x0y0eD+O+oO-Y-w@mail.gmail.com> <166EBE02-113B-4054-9B99-043EC31A68FB@tzi.org> <CAObGJnOSJJTmE7-MrdFfddMGsfreu8iZ=YmR7k5Ts6PD5GFaxA@mail.gmail.com> <569437DE-A7A4-497F-8427-627A7E137F92@tzi.org> <DB9PR08MB6524297453A3393064D7B4739C169@DB9PR08MB6524.eurprd08.prod.outlook.com> <25144.61133.932882.915897@fireball.acr.fi>
In-Reply-To: <25144.61133.932882.915897@fireball.acr.fi>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: b26c3f0f-3e27-46f7-a72d-08da0ce1540f
x-ms-traffictypediagnostic: AM0PR08MB4050:EE_|AM5EUR03FT018:EE_|AM0PR08MB5044:EE_
X-Microsoft-Antispam-PRVS: <AM0PR08MB504467049E032280D47C761C9C189@AM0PR08MB5044.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR08MB6524.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(5660300002)(508600001)(6916009)(83380400001)(91956017)(4326008)(8676002)(64756008)(76116006)(8936002)(66946007)(66476007)(66556008)(9326002)(66446008)(54906003)(52536014)(966005)(71200400001)(316002)(7696005)(6506007)(9686003)(122000001)(33656002)(38100700002)(86362001)(186003)(38070700005)(66574015)(26005)(55016003)(2906002); DIR:OUT; SFP:1101; 
Content-Type: multipart/alternative; boundary="_000_DB9PR08MB652437F020F11D18E724D1AE9C189DB9PR08MB6524eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4050
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT018.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 9bae1a82-c1a9-41f1-e912-08da0ce14c8f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:;  IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com;  PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(4326008)(81166007)(70586007)(6862004)(70206006)(52536014)(36860700001)(356005)(9326002)(8936002)(5660300002)(186003)(26005)(86362001)(40460700003)(47076005)(8676002)(66574015)(336012)(82310400004)(54906003)(316002)(83380400001)(9686003)(508600001)(966005)(7696005)(6506007)(33656002)(55016003)(2906002); DIR:OUT; SFP:1101; 
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 15:25:14.2939 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b26c3f0f-3e27-46f7-a72d-08da0ce1540f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123];  Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT018.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5044
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ilw_zhCFriZxQUo6MLO5257OqhE>
Subject: Re: [core] time to start the deprecation of CCM_8?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2022 15:25:35 -0000

--_000_DB9PR08MB652437F020F11D18E724D1AE9C189DB9PR08MB6524eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Tero,

Thanks very much for you comments.

> Tero Kivinen <kivinen@iki.fi> wrote:
> Thomas Fossati writes:
> > Coming back to this thread to give you an update on the current
> > (draft) proposal:
> >
> > https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-04.htm=
l#section-18
> >
> > Please have a look and let us know what you think.
>
> I have not been able to parse that CFRG draft properly to really
> understand what their limits mean.
>
> I.e. the assumptions there seem to be for normal internet traffic, but
> if we assume IoT use case, for example IEEE 802.15.4, and use say
> maximum packet size of 127 bytes (normal packet size is most likely
> something like 80-100 bytes), maximum data rate of 250 kBit/s, i.e.
> about 300-400 packets / second, how long would one of those forgery
> attempts take in seconds?

We are trying to avoid writing this stuff down because it tends to
depend on a lot of variables and the tradeoff is not always clear.
Marco and Rikard are trying to provide that kind of guidance in [1] for
OSCORE, and while I find their effort extremely laudable (kudos!), I
also reckon that that kind of approach would not necessarily make the
life easier to operators and developers alike.

> I would assume that on environments which are not that constrained
> (i.e., has packet sizes over 0.5 kB, or speed over 1MBit/s) do not
> need to save bytes and use CCM_8. Those environments can (and should)
> use normal CCM, so only the very constrained devices shuld be of
> interest when talking about CCM_8.

Yep, that's the gist of the recommendation in [2], which basically
amount to providing an interoperable and (as much as possible) risk-free
fallback for CoAP, and more generally IoT deployments.

cheers, t

[1] https://www.ietf.org/archive/id/draft-ietf-core-oscore-key-update-01.ht=
ml#appendix-A
[2] https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-04.htm=
l#section-18






IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_DB9PR08MB652437F020F11D18E724D1AE9C189DB9PR08MB6524eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	font-size:10.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple" style=3D"word-wrap:brea=
k-word">
<div class=3D"WordSection1">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Hi Tero,<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Thanks very much fo=
r you comments.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; Tero Kivinen &=
lt;kivinen@iki.fi&gt; wrote:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; Thomas Fossati=
 writes:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; &gt; Coming ba=
ck to this thread to give you an update on the current<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; &gt; (draft) p=
roposal:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; &gt; <o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; &gt; https://w=
ww.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-04.html#section-18<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; &gt; <o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; &gt; Please ha=
ve a look and let us know what you think.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; <o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; I have not bee=
n able to parse that CFRG draft properly to really<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; understand wha=
t their limits mean.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; <o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; I.e. the assum=
ptions there seem to be for normal internet traffic, but<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; if we assume I=
oT use case, for example IEEE 802.15.4, and use say<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; maximum packet=
 size of 127 bytes (normal packet size is most likely<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; something like=
 80-100 bytes), maximum data rate of 250 kBit/s, i.e.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; about 300-400 =
packets / second, how long would one of those forgery<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; attempts take =
in seconds?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">We are trying to av=
oid writing this stuff down because it tends to<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">depend on a lot of =
variables and the tradeoff is not always clear.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Marco and Rikard ar=
e trying to provide that kind of guidance in [1] for<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">OSCORE, and while I=
 find their effort extremely laudable (kudos!), I<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">also reckon that th=
at kind of approach would not necessarily make the<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">life easier to oper=
ators and developers alike.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; I would assume=
 that on environments which are not that constrained<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; (i.e., has pac=
ket sizes over 0.5 kB, or speed over 1MBit/s) do not<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; need to save b=
ytes and use CCM_8. Those environments can (and should)<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; use normal CCM=
, so only the very constrained devices shuld be of<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">&gt; interest when =
talking about CCM_8.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Yep, that's the gis=
t of the recommendation in [2], which basically<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">amount to providing=
 an interoperable and (as much as possible) risk-free<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">fallback for CoAP, =
and more generally IoT deployments.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">cheers, t<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">[1] https://www.iet=
f.org/archive/id/draft-ietf-core-oscore-key-update-01.html#appendix-A<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt">[2] https://www.iet=
f.org/archive/id/draft-ietf-uta-tls13-iot-profile-04.html#section-18<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
</div>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_DB9PR08MB652437F020F11D18E724D1AE9C189DB9PR08MB6524eurp_--


From nobody Thu Mar 24 11:32:07 2022
Return-Path: <mcr@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA3E13A13CA for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 11:31:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jacGFwUhwYrM for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 11:31:51 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00:e000:2bb::1]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B49A43A12B8 for <core@ietf.org>; Thu, 24 Mar 2022 11:31:51 -0700 (PDT)
Received: from dooku.sandelman.ca (dynamic-046-114-148-245.46.114.pool.telefonica.de [46.114.148.245]) by relay.sandelman.ca (Postfix) with ESMTPS id 124051F458; Thu, 24 Mar 2022 18:31:47 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 2E4BC1A01AA; Thu, 24 Mar 2022 19:31:41 +0100 (CET)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: core@ietf.org
X-Attribution: mcr
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Thu, 24 Mar 2022 19:31:41 +0100
Message-ID: <32267.1648146701@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/A5UMsBVEIylT8gCFVO_mxfQ7zjg>
Subject: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 18:32:04 -0000

--=-=-=
Content-Type: text/plain


Today in discussion with ADs Rob Wilton and Francesca, it became clear that
we really need to add a status entry to the SID file for allocations.

The use case is where we have taken a YANG module to RFC, and have created a
stable set of SID allocations for it.  Then, we revise the module. During
that process of doing draft-foo-bar-rfcBIS, we might want to reset the SID
numbering as we add/subtract/modify the extension proposals.

So we need to know which parts of the SID file we can reset, and which parts
we can not.

This is a rudamentary pull request to do that.  I am uncertain if this YANG
module parses as yet.  I haven't done any work on sid.py to implement this.

Please let me know if I captured the proposal well enough.
I don't know what to call the thing which is not stable.
I feel that "unstable" does not quite capture the proper intent.

https://github.com/core-wg/yang-cbor/pull/141

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=Gx1V
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Thu Mar 24 12:46:13 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCA493A02BC for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 12:46:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.897
X-Spam-Level: 
X-Spam-Status: No, score=-6.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oxn-MhBukTmy for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 12:46:00 -0700 (PDT)
Received: from mail-yw1-x1131.google.com (mail-yw1-x1131.google.com [IPv6:2607:f8b0:4864:20::1131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BBEE53A00E0 for <core@ietf.org>; Thu, 24 Mar 2022 12:46:00 -0700 (PDT)
Received: by mail-yw1-x1131.google.com with SMTP id 00721157ae682-2e5827a76f4so62264877b3.6 for <core@ietf.org>; Thu, 24 Mar 2022 12:46:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6LjbEqyGEbODdKU6n669qab6YTrb/orcbM6VS8gFnMk=; b=plFmFesWV8UVHOCzjbiuM98Drred2xpnNxxadsvdgzlEsibhoCW+tJfBC0keGeobtB LgKiMXS38ZDpJSNaGu5AgQjoo0SH4B3o+zH1XQ8fgtP3Ps18GnltImWVaPhTp/LETGDh ytXFCEJQXSpvmxTaOc4ycdlSI5JMtxykwy1ohOMgiFFgEvRO12Gi2H1ASZaen9vbJeKc 4qoegHTsIcsCf3wGPglLF+2onlnClACWzpwoHADqmVvHj5lcyVurBzQTZkIG8jWkRVuN BCIhbQvqqGpWiWpiVABWgDZnSU0+BpTOB+xg2zKMN2Z7V63CHowSWie5ZeLCBo2FG0jR HOrw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6LjbEqyGEbODdKU6n669qab6YTrb/orcbM6VS8gFnMk=; b=rhxwTyLLRPv42I//VB7tzTaumehOXDwLx2WVcwREczCyY+CbUVfxnVQp49d0upJtfv S+e8RrhSKPCobX4uMFP9dMr3lcTXkj3YCeUoj3NuBj5Gw62RB7b0qBd+wSXenYAYDmI6 KK51URsc5Gb/eaxpiongOUIfiNQjfehrjpNprQx+SpjoUW5FTRWWMp85rHYSv7ofuhQV Wga+vNoL7T6bib5c8Pq25uWhzgvkiD3s5hxONM8X/DsdsRCmTz59dbWoY1JQEoMgT2kZ rhZLjLpSlmnoE6nTdF2AdaxZ1fdGOyafvs9KGwuk4zBWJgOKa0VZa2szUUvOdi/wLpex jZMw==
X-Gm-Message-State: AOAM531jKcBA0fhrzuEgrVWDUjTZka+Y/otLGglkiYsxGIJSTgs+OUH/ gXP6+O7DNpsgYXMxfenO7eKzy8k2PjaweRpxbTC9O1IqnueCgg==
X-Google-Smtp-Source: ABdhPJx8TF45z9Vvc1Bf/YtatwXDrfvoIj0GFy9RNILZPy9N1sFfZ95jDtRs/sQYVNSeMAeIuZ7CTx6UQDaQltf9bcA=
X-Received: by 2002:a81:84d2:0:b0:2e5:c04e:1976 with SMTP id u201-20020a8184d2000000b002e5c04e1976mr6477410ywf.212.1648151159544; Thu, 24 Mar 2022 12:45:59 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku>
In-Reply-To: <32267.1648146701@dooku>
From: Andy Bierman <andy@yumaworks.com>
Date: Thu, 24 Mar 2022 12:45:48 -0700
Message-ID: <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: Core <core@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000066b03905dafc18f1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/GDT-LKbmIC7GDM1wDdC3LbnnYeU>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 19:46:10 -0000

--00000000000066b03905dafc18f1
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 24, 2022 at 11:33 AM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Today in discussion with ADs Rob Wilton and Francesca, it became clear that
> we really need to add a status entry to the SID file for allocations.


> The use case is where we have taken a YANG module to RFC, and have created
> a
> stable set of SID allocations for it.  Then, we revise the module. During
> that process of doing draft-foo-bar-rfcBIS, we might want to reset the SID
> numbering as we add/subtract/modify the extension proposals.


> So we need to know which parts of the SID file we can reset, and which
> parts
> we can not.
>

This information is part of the development work in progress.
The SID file for an RFC MUST be stable, so the value of each leaf in an RFC
SID file
will always be 'stable' (and therefore useless).

Subsequent RFCs MUST NOT alter previous SID assignments made in previous
RFCs.
If SID assignments can be undone by a new RFC they can never be considered
stable.

All changes to I-Ds are inherently subject-to-review.
This may be worth noting at the file-level, but certainly
not at the SID level.


Andy



> This is a rudamentary pull request to do that.  I am uncertain if this YANG
> module parses as yet.  I haven't done any work on sid.py to implement this.
>
> Please let me know if I captured the proposal well enough.
> I don't know what to call the thing which is not stable.
> I feel that "unstable" does not quite capture the proper intent.
>
> https://github.com/core-wg/yang-cbor/pull/141
>
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-
>
>
>
> _______________________________________________
> core mailing list
> core@ietf.org
> https://www.ietf.org/mailman/listinfo/core
>

--00000000000066b03905dafc18f1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Mar 24, 2022 at 11:33 AM Mich=
ael Richardson &lt;<a href=3D"mailto:mcr%2Bietf@sandelman.ca" target=3D"_bl=
ank">mcr+ietf@sandelman.ca</a>&gt; wrote:<br></div><blockquote class=3D"gma=
il_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,2=
04,204);padding-left:1ex"><br>
Today in discussion with ADs Rob Wilton and Francesca, it became clear that=
<br>
we really need to add a status entry to the SID file for allocations.</bloc=
kquote><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;=
border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
The use case is where we have taken a YANG module to RFC, and have created =
a<br>
stable set of SID allocations for it.=C2=A0 Then, we revise the module. Dur=
ing<br>
that process of doing draft-foo-bar-rfcBIS, we might want to reset the SID<=
br>
numbering as we add/subtract/modify the extension proposals.</blockquote><b=
lockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-le=
ft:1px solid rgb(204,204,204);padding-left:1ex">
<br>
So we need to know which parts of the SID file we can reset, and which part=
s<br>
we can not.<br></blockquote><div><br></div><div>This information is part of=
 the development work in progress.</div><div>The SID file for an RFC MUST b=
e stable, so the value of each leaf in an RFC SID file</div><div>will alway=
s be &#39;stable&#39; (and therefore useless).</div><div><br></div><div>Sub=
sequent RFCs MUST NOT alter previous SID assignments made in previous RFCs.=
</div><div><div>If SID assignments can be undone by a new RFC they can neve=
r be considered stable.</div><div><br></div></div><div>All changes to I-Ds =
are inherently subject-to-review.</div><div>This may be worth noting at the=
 file-level, but certainly</div><div>not at the SID level.</div><div><br></=
div><div><br></div><div>Andy</div><div><br></div><div><br></div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px so=
lid rgb(204,204,204);padding-left:1ex">
<br>
This is a rudamentary pull request to do that.=C2=A0 I am uncertain if this=
 YANG<br>
module parses as yet.=C2=A0 I haven&#39;t done any work on sid.py to implem=
ent this.<br>
<br>
Please let me know if I captured the proposal well enough.<br>
I don&#39;t know what to call the thing which is not stable.<br>
I feel that &quot;unstable&quot; does not quite capture the proper intent.<=
br>
<br>
<a href=3D"https://github.com/core-wg/yang-cbor/pull/141" rel=3D"noreferrer=
" target=3D"_blank">https://github.com/core-wg/yang-cbor/pull/141</a><br>
<br>
--<br>
Michael Richardson &lt;<a href=3D"mailto:mcr%2BIETF@sandelman.ca" target=3D=
"_blank">mcr+IETF@sandelman.ca</a>&gt;, Sandelman Software Works<br>
=C2=A0-=3D IPv6 IoT consulting =3D-<br>
<br>
<br>
<br>
_______________________________________________<br>
core mailing list<br>
<a href=3D"mailto:core@ietf.org" target=3D"_blank">core@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/core</a><br>
</blockquote></div></div>

--00000000000066b03905dafc18f1--


From nobody Thu Mar 24 12:57:58 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 150C83A1338 for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 12:57:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ackSgeoDABSb for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 12:57:54 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6B083A077F for <core@ietf.org>; Thu, 24 Mar 2022 12:57:53 -0700 (PDT)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KPbcG0LRMzDCbG; Thu, 24 Mar 2022 20:57:50 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com>
Date: Thu, 24 Mar 2022 20:57:49 +0100
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, Core <core@ietf.org>
X-Mao-Original-Outgoing-Id: 669844669.617728-6e59a0bc951d29f36268a95aae3c2e27
Content-Transfer-Encoding: quoted-printable
Message-Id: <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org>
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com>
To: Andy Bierman <andy@yumaworks.com>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/eDLcaq8vclwKBiA7G2opVwtt9W4>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 19:57:57 -0000

> This information is part of the development work in progress.

Exactly!
We distinguished the SID files you use for working with =E2=80=9Cunstable=E2=
=80=9D YANG modules (e.g., still at I-D status for IETF, but the =
terminology needs to be wider than that) with the ones that have been =
adopted for =E2=80=9Cstable=E2=80=9D YANG modules (in the IETF, =
published in an RFC).

> The SID file for an RFC MUST be stable, so the value of each leaf in =
an RFC SID file
> will always be 'stable' (and therefore useless).

This is why =E2=80=99stable=E2=80=99 is the default, so we can use =
existing SID files.

> Subsequent RFCs MUST NOT alter previous SID assignments made in =
previous RFCs.

Exactly, that=E2=80=99s why these are marked stable.

> If SID assignments can be undone by a new RFC they can never be =
considered stable.

Indeed.

> All changes to I-Ds are inherently subject-to-review.

Well, =E2=80=9Csubject-to-review=E2=80=9D was not the word we used in =
the discussion.
We used =E2=80=9Cunstable=E2=80=9D, deliberately.

> This may be worth noting at the file-level, but certainly
> not at the SID level.

That would be true if we could make sure that SID files never turn up in =
a place where their context may not be immediatelyavailable.

E.g., if I start revising a YANG module, I will feed the stable SID file =
to pyang and get a new SID file.  Now I need to make sure that SID file =
never gets into the hands of people who might think about this as the =
final product.
So pyang will mark some of the assignments as unstable.
I can even feed that to pyang after revising the YANG module again, and =
pyang will respect both the stable and the unstable assignments in the =
same file, but transfer the stability status to the new SID file, =
alongside with marking any new ones as unstable.  Until the YANG module =
itself makes the transition from unstable to stable, at which time I=E2=80=
=99d make a final allocation step, marking all surviving new allocations =
as stable (as well as the existing stable ones).

Gr=C3=BC=C3=9Fe, Carsten



From nobody Thu Mar 24 13:16:19 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EC4A3A141B for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 13:16:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6_bVwYizsZGG for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 13:16:12 -0700 (PDT)
Received: from mail-yb1-xb33.google.com (mail-yb1-xb33.google.com [IPv6:2607:f8b0:4864:20::b33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 735C93A1401 for <core@ietf.org>; Thu, 24 Mar 2022 13:16:12 -0700 (PDT)
Received: by mail-yb1-xb33.google.com with SMTP id x20so10315519ybi.5 for <core@ietf.org>; Thu, 24 Mar 2022 13:16:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7qttDZJS8QgS1oMRhGRn5oX5c3PlQVxws3FdgQA4T28=; b=OS95efKZnFjjGvNcdHf0xa03FgXapDqkMIGndnLE/WvKXNsLZSa/92vFSZHdlW8LMw a9rME3gAKz5RpZF1qeQqqPOx2EEZDvn1mWfXL2qtIUCFEdQQNqHNmeEpC4x4go3tYOLE xh93z35vUUCEkJUJ1Om9o3dcJPHwOsthf5gxP94ksGQEAMP8+CRGTVhrYtAEK2An7u1J Tzfa1KieMfkgVZGc9rG4vkNqN5WHso2nx7KPRG8Zic89e26XDWCXE/7hBroOpAoHjVK0 Nwi6Yh0BpgBNyWJn46HGJRXnd3KNyaGuwnDKyksEsOoJK4umhFG2KjuCefHfxTFK+LYR kbrQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7qttDZJS8QgS1oMRhGRn5oX5c3PlQVxws3FdgQA4T28=; b=zH2EQ2ehG07/q9qiiI3xdCnDdY7+rU6sN+iZu4ieR96WLjR6wklWGA62SSRlXQpkM6 LdwqO5bPZP4oIdQvBOS9y4RQZQWYRtdO820ZyxHFhShzJ7hC8vCK20ml4P1swjEoiYnE GZQ6giA2Dr/vMVF3eFAKUPdDKTWetgnNj8IL+V4+T+hK+axZ8EV5h/8xpuuzN/OrVtyB E44YWkbza7PkmdVcjcwfd/qIq1H6VZA0OIigSXZKonrzXGIWZUcyUYBlrTWj3uLTrrZ5 6dkbPtlcC9OOD/p8sVblM0vPK52oUZfft3oUM48ZC22sCrBgm4pPP/28ff1XXkuNhOgz ZjaA==
X-Gm-Message-State: AOAM531JHNdlD6Er7XlTrVbLmtcrlVMvLP1eo8awl81Zv7d2GIZM1svz bW0JKST1y2Y+4Gcn2sKRc+RyHDQPxNxeNN7X1GMP9w==
X-Google-Smtp-Source: ABdhPJwuuyd8+pqSPRNJUPnfcdjkOCL0lg7Y+8RaxqyKpIaS7Fxbh9g0Xq2e9cTATSCpSz2+GV5qPNr3NB5azK0e29g=
X-Received: by 2002:a25:a123:0:b0:633:a6b3:875b with SMTP id z32-20020a25a123000000b00633a6b3875bmr6637852ybh.430.1648152971476; Thu, 24 Mar 2022 13:16:11 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org>
In-Reply-To: <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org>
From: Andy Bierman <andy@yumaworks.com>
Date: Thu, 24 Mar 2022 13:16:00 -0700
Message-ID: <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, Core <core@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006697f605dafc8420"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/6iL_c2RXfGN03L-sOHKOVgVqlz4>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 20:16:18 -0000

--0000000000006697f605dafc8420
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Mar 24, 2022 at 12:57 PM Carsten Bormann <cabo@tzi.org> wrote:

> > This information is part of the development work in progress.
>
> Exactly!
> We distinguished the SID files you use for working with =E2=80=9Cunstable=
=E2=80=9D YANG
> modules (e.g., still at I-D status for IETF, but the terminology needs to
> be wider than that) with the ones that have been adopted for =E2=80=9Csta=
ble=E2=80=9D YANG
> modules (in the IETF, published in an RFC).
>
> > The SID file for an RFC MUST be stable, so the value of each leaf in an
> RFC SID file
> > will always be 'stable' (and therefore useless).
>
> This is why =E2=80=99stable=E2=80=99 is the default, so we can use existi=
ng SID files.
>
> > Subsequent RFCs MUST NOT alter previous SID assignments made in previou=
s
> RFCs.
>
> Exactly, that=E2=80=99s why these are marked stable.
>
> > If SID assignments can be undone by a new RFC they can never be
> considered stable.
>
> Indeed.
>
> > All changes to I-Ds are inherently subject-to-review.
>
> Well, =E2=80=9Csubject-to-review=E2=80=9D was not the word we used in the=
 discussion.
> We used =E2=80=9Cunstable=E2=80=9D, deliberately.
>
> > This may be worth noting at the file-level, but certainly
> > not at the SID level.
>
> That would be true if we could make sure that SID files never turn up in =
a
> place where their context may not be immediatelyavailable.
>
> E.g., if I start revising a YANG module, I will feed the stable SID file
> to pyang and get a new SID file.  Now I need to make sure that SID file
> never gets into the hands of people who might think about this as the fin=
al
> product.
> So pyang will mark some of the assignments as unstable.
> I can even feed that to pyang after revising the YANG module again, and
> pyang will respect both the stable and the unstable assignments in the sa=
me
> file, but transfer the stability status to the new SID file, alongside wi=
th
> marking any new ones as unstable.  Until the YANG module itself makes the
> transition from unstable to stable, at which time I=E2=80=99d make a fina=
l
> allocation step, marking all surviving new allocations as stable (as well
> as the existing stable ones).
>
>

Is the WG supposed to hand-edit SID files for inclusion in I-Ds?
pyang needs to have the parent SID file to generate an update.

How does a developer know which individual SID assignments to set to
'unstable'?
If the tooling is supposed to know, then why do developers need to care?


Gr=C3=BC=C3=9Fe, Carsten
>
>
>
Andy

--0000000000006697f605dafc8420
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Mar 24, 2022 at 12:57 PM Cars=
ten Bormann &lt;<a href=3D"mailto:cabo@tzi.org" target=3D"_blank">cabo@tzi.=
org</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"marg=
in:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1e=
x">&gt; This information is part of the development work in progress.<br>
<br>
Exactly!<br>
We distinguished the SID files you use for working with =E2=80=9Cunstable=
=E2=80=9D YANG modules (e.g., still at I-D status for IETF, but the termino=
logy needs to be wider than that) with the ones that have been adopted for =
=E2=80=9Cstable=E2=80=9D YANG modules (in the IETF, published in an RFC).<b=
r>
<br>
&gt; The SID file for an RFC MUST be stable, so the value of each leaf in a=
n RFC SID file<br>
&gt; will always be &#39;stable&#39; (and therefore useless).<br>
<br>
This is why =E2=80=99stable=E2=80=99 is the default, so we can use existing=
 SID files.<br>
<br>
&gt; Subsequent RFCs MUST NOT alter previous SID assignments made in previo=
us RFCs.<br>
<br>
Exactly, that=E2=80=99s why these are marked stable.<br>
<br>
&gt; If SID assignments can be undone by a new RFC they can never be consid=
ered stable.<br>
<br>
Indeed.<br>
<br>
&gt; All changes to I-Ds are inherently subject-to-review.<br>
<br>
Well, =E2=80=9Csubject-to-review=E2=80=9D was not the word we used in the d=
iscussion.<br>
We used =E2=80=9Cunstable=E2=80=9D, deliberately.<br>
<br>
&gt; This may be worth noting at the file-level, but certainly<br>
&gt; not at the SID level.<br>
<br>
That would be true if we could make sure that SID files never turn up in a =
place where their context may not be immediatelyavailable.<br>
<br>
E.g., if I start revising a YANG module, I will feed the stable SID file to=
 pyang and get a new SID file.=C2=A0 Now I need to make sure that SID file =
never gets into the hands of people who might think about this as the final=
 product.<br>
So pyang will mark some of the assignments as unstable.<br>
I can even feed that to pyang after revising the YANG module again, and pya=
ng will respect both the stable and the unstable assignments in the same fi=
le, but transfer the stability status to the new SID file, alongside with m=
arking any new ones as unstable.=C2=A0 Until the YANG module itself makes t=
he transition from unstable to stable, at which time I=E2=80=99d make a fin=
al allocation step, marking all surviving new allocations as stable (as wel=
l as the existing stable ones).<br>
<br></blockquote><div><br></div><div><br></div><div>Is the=C2=A0WG supposed=
 to hand-edit SID files for inclusion in I-Ds?</div><div>pyang needs to hav=
e the parent SID file to generate an update.</div><div><br></div><div>How d=
oes a developer know which individual SID assignments to set to &#39;unstab=
le&#39;?</div><div>If the tooling is supposed to know, then why do develope=
rs need to care?</div><div><br></div><div><br></div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex">
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div></div></div=
>

--0000000000006697f605dafc8420--


From nobody Thu Mar 24 13:22:33 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B45D3A0938 for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 13:22:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level: 
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V4ZbZnggckLs for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 13:22:26 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75B1B3A0933 for <core@ietf.org>; Thu, 24 Mar 2022 13:22:25 -0700 (PDT)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KPc8Z4jJhzDCbJ; Thu, 24 Mar 2022 21:22:22 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com>
Date: Thu, 24 Mar 2022 21:22:22 +0100
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, Core <core@ietf.org>
X-Mao-Original-Outgoing-Id: 669846142.250386-d1276b50ed03866155ebbd09e70ddc74
Content-Transfer-Encoding: quoted-printable
Message-Id: <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org>
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org> <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com>
To: Andy Bierman <andy@yumaworks.com>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/s1M8-LEl6NYNBDekEHr3VvlQkJ8>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 20:22:32 -0000

On 2022-03-24, at 21:16, Andy Bierman <andy@yumaworks.com> wrote:
>=20
> Is the WG supposed to hand-edit SID files for inclusion in I-Ds?

I hope not.

> pyang needs to have the parent SID file to generate an update.

Yes.  Plus a flag that says whether this is another SID file with =
unstable SIDs or whether the resulting SID file will be the new stable.
(The first case could even be split into an =E2=80=9Cadd-only=E2=80=9D =
and a =E2=80=9Cwholesale replace=E2=80=9D for the unstable ones =E2=80=94 =
the unstable ones would simply be ignored in the latter case.)

> How does a developer know which individual SID assignments to set to =
'unstable'?

Pyang knows (once given the above flag).

> If the tooling is supposed to know, then why do developers need to =
care?

Indeed, we didn=E2=80=99t say *why* you would want that information =
(except that it makes life easier for the tooling).
It was Rob=E2=80=99s conviction that you would want that, and I do =
sympathize with that.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Thu Mar 24 15:09:12 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 097193A0A42 for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 15:09:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.897
X-Spam-Level: 
X-Spam-Status: No, score=-6.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Co1Sq7x-XUFB for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 15:09:04 -0700 (PDT)
Received: from mail-yb1-xb33.google.com (mail-yb1-xb33.google.com [IPv6:2607:f8b0:4864:20::b33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 226EE3A0B8F for <core@ietf.org>; Thu, 24 Mar 2022 15:09:04 -0700 (PDT)
Received: by mail-yb1-xb33.google.com with SMTP id o5so10923536ybe.2 for <core@ietf.org>; Thu, 24 Mar 2022 15:09:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mce97jQC7fWWzYmZbJouWmhntb2/YizuMnL/D4UiSMg=; b=GOb3TFxydw3z+BGsdGEWeoDokEl8KJwQyZUc2vVNubHMeE3ZRleOtea9ST7rDN7cvf 5l+FE3ADzy49w2D/eeIQ/2gIUHFZSb+JpVC+juULoBUo67zyZ+ZRs+xmfAunX0Wz9Hd4 0nt9AJDEIqNCN1hxpwM3iERIBkuBH8RAVtyugzXNFcz82zlx2lL727674enhc7Dquy6y dCYinyEi7ChSIVfpG3Fx2LcoH9Fw+YKyBlouvv7xJhiq16UhlIv58RYgRrfkRg0BUavc 7MCwqpZOqTesXWmwJsnwYpg5z2QvZ6FS20f4EeYqVdrqlFtN3t3/z6bRSvOmDKgp5rEu nh3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mce97jQC7fWWzYmZbJouWmhntb2/YizuMnL/D4UiSMg=; b=dHDhnakJ4yvutq5BHrd+MyP4/JUR5Vn9OpBO+4N3Fkc98B8+WQ8m59C6revN31LuNy N5T8NjYAn9rZS2hPV1Z7nQNfl6EsEEFkM+QJT654swZ1uwrf2NZnbRwKhrxNZt9aJl8B 2HH5onNLW63pJlzicLCD+pZJAnDP2n4RpTk51VMZcvi3Yrf9WGZUU3+BYB6pjeRWeaYE gr476kMXzCabuUalNEYGQ5Zl/H/LwaFYP9dU+LcHO+UFIuNDqJAoU8DcZPXotC3Wjm2k p6XTUFAhNixce1eqM+0g92QYLgHmSsiqxt8lPVruiaJXycR7G4gy/sX8jvw2E3TnvtWN K1YQ==
X-Gm-Message-State: AOAM5310W9C1+mVk2iLJBoXYH71HPwaHLFAUKpgKjV9YvRjnd0M4SVDw V5+Rh7RS8rZStJxjv8K1AFrh+3GwuCsSYkezcks7NQ==
X-Google-Smtp-Source: ABdhPJx6FysY44/pwTzoOw5uJny4By17CSMHaWSv33M6gE70ptQHtWux2hA/1szQEGf5eh6nls8D6bFq+tt7uGTAhLU=
X-Received: by 2002:a25:41d8:0:b0:634:1a47:8165 with SMTP id o207-20020a2541d8000000b006341a478165mr6536209yba.262.1648159742758; Thu, 24 Mar 2022 15:09:02 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org> <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com> <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org>
In-Reply-To: <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org>
From: Andy Bierman <andy@yumaworks.com>
Date: Thu, 24 Mar 2022 15:08:51 -0700
Message-ID: <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, Core <core@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000026c805dafe18f1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/kp864xRGzRYkpo5wiEchKzSUcys>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 22:09:11 -0000

--0000000000000026c805dafe18f1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Mar 24, 2022 at 1:22 PM Carsten Bormann <cabo@tzi.org> wrote:

> On 2022-03-24, at 21:16, Andy Bierman <andy@yumaworks.com> wrote:
> >
> > Is the WG supposed to hand-edit SID files for inclusion in I-Ds?
>
> I hope not.
>
> > pyang needs to have the parent SID file to generate an update.
>
> Yes.  Plus a flag that says whether this is another SID file with unstabl=
e
> SIDs or whether the resulting SID file will be the new stable.
> (The first case could even be split into an =E2=80=9Cadd-only=E2=80=9D an=
d a =E2=80=9Cwholesale
> replace=E2=80=9D for the unstable ones =E2=80=94 the unstable ones would =
simply be ignored
> in the latter case.)
>
> > How does a developer know which individual SID assignments to set to
> 'unstable'?
>
> Pyang knows (once given the above flag).
>
> > If the tooling is supposed to know, then why do developers need to care=
?
>
> Indeed, we didn=E2=80=99t say *why* you would want that information (exce=
pt that
> it makes life easier for the tooling).
> It was Rob=E2=80=99s conviction that you would want that, and I do sympat=
hize with
> that.
>
>
The process for managing SID assignments should be marked 'unstable'.

I imagined that a SID allocation block would be the lowest granularity
needed for module updates.
So the granularity is the assignment-range, not each SID.

leaf /sid-file/assignment-range/stable { type boolean; default true; }

e.g.


Module foo initially has 1 assignment range

All I-Ds leading to first RFC:
{
    entry-point=3D2000
    size=3D40
    stable=3Dfalse
}

Publish the first RFC (locking the assignment range forever!)

{
    entry-point=3D2000
    size=3D40
    stable=3Dtrue
}

Later, a new assignment range is allocated for new SIDs intended for RFC_2

All I-Ds after RFC_N, leading to RFC_N+1 (now have 2 assignment ranges)

{
    entry-point=3D2000
    size=3D40
    stable=3Dtrue
},
{
    entry-point=3D6000
    size=3D40
    stable=3Dfalse
}



What are the use-cases for marking some SIDs within a range as stable,
and other SIDs in the same range as unstable?

The ranges are already intentionally small so "SID waste" is minimized.


Gr=C3=BC=C3=9Fe, Carsten
>


Andy

--0000000000000026c805dafe18f1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Mar 24, 2022 at 1:22 PM Carst=
en Bormann &lt;<a href=3D"mailto:cabo@tzi.org">cabo@tzi.org</a>&gt; wrote:<=
br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8e=
x;border-left:1px solid rgb(204,204,204);padding-left:1ex">On 2022-03-24, a=
t 21:16, Andy Bierman &lt;<a href=3D"mailto:andy@yumaworks.com" target=3D"_=
blank">andy@yumaworks.com</a>&gt; wrote:<br>
&gt; <br>
&gt; Is the WG supposed to hand-edit SID files for inclusion in I-Ds?<br>
<br>
I hope not.<br>
<br>
&gt; pyang needs to have the parent SID file to generate an update.<br>
<br>
Yes.=C2=A0 Plus a flag that says whether this is another SID file with unst=
able SIDs or whether the resulting SID file will be the new stable.<br>
(The first case could even be split into an =E2=80=9Cadd-only=E2=80=9D and =
a =E2=80=9Cwholesale replace=E2=80=9D for the unstable ones =E2=80=94 the u=
nstable ones would simply be ignored in the latter case.)<br>
<br>
&gt; How does a developer know which individual SID assignments to set to &=
#39;unstable&#39;?<br>
<br>
Pyang knows (once given the above flag).<br>
<br>
&gt; If the tooling is supposed to know, then why do developers need to car=
e?<br>
<br>
Indeed, we didn=E2=80=99t say *why* you would want that information (except=
 that it makes life easier for the tooling).<br>
It was Rob=E2=80=99s conviction that you would want that, and I do sympathi=
ze with that.<br>
<br></blockquote><div><br></div><div>The process for managing SID assignmen=
ts should be marked &#39;unstable&#39;.</div><div><br></div><div>I imagined=
 that a SID allocation block would be the lowest granularity needed for mod=
ule updates.</div><div>So the granularity is the assignment-range, not each=
 SID.</div><div><br></div><div>leaf /sid-file/assignment-range/stable { typ=
e boolean; default true; }<br></div><div><br></div><div>e.g.</div><div><br>=
</div><div><br></div><div>Module foo initially has 1 assignment range</div>=
<div><br></div><div>All I-Ds leading to first RFC:<br></div><div>{</div><di=
v>=C2=A0 =C2=A0 entry-point=3D2000</div><div>=C2=A0 =C2=A0 size=3D40</div><=
div>=C2=A0 =C2=A0 stable=3Dfalse</div><div>}</div><div><br></div><div>Publi=
sh the first RFC (locking the assignment=C2=A0range forever!)</div><div><br=
></div><div><div>{<br class=3D"gmail-Apple-interchange-newline">=C2=A0 =C2=
=A0 entry-point=3D2000</div><div>=C2=A0 =C2=A0 size=3D40</div><div>=C2=A0 =
=C2=A0 stable=3Dtrue</div><div>}</div></div><div><br></div><div>Later, a ne=
w assignment range is allocated for new SIDs intended for RFC_2</div><div><=
br></div><div>All I-Ds after RFC_N, leading to RFC_N+1 (now have 2 assignme=
nt ranges)</div><div><br></div><div><div>{<br class=3D"gmail-Apple-intercha=
nge-newline">=C2=A0 =C2=A0 entry-point=3D2000</div><div>=C2=A0 =C2=A0 size=
=3D40</div><div>=C2=A0 =C2=A0 stable=3Dtrue</div><div>},</div></div><div><d=
iv>{<br class=3D"gmail-Apple-interchange-newline">=C2=A0 =C2=A0 entry-point=
=3D6000</div><div>=C2=A0 =C2=A0 size=3D40</div><div>=C2=A0 =C2=A0 stable=3D=
false</div><div>}</div></div><div><br></div><div><br></div><div><br></div><=
div>What are the use-cases for marking some SIDs within a range as stable,<=
/div><div>and other SIDs in the same range as unstable?</div><div><br></div=
><div>The ranges are already intentionally=C2=A0small so &quot;SID waste&qu=
ot; is minimized.</div><div><br></div><div><br></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204=
,204,204);padding-left:1ex">
Gr=C3=BC=C3=9Fe, Carsten<br></blockquote><div><br></div><div><br></div><div=
>Andy</div><div>=C2=A0</div></div></div>

--0000000000000026c805dafe18f1--


From nobody Thu Mar 24 19:23:32 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CDAC3A1340 for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 19:23:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level: 
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L8nTeSS8Tqka for <core@ietfa.amsl.com>; Thu, 24 Mar 2022 19:23:25 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EA543A1334 for <core@ietf.org>; Thu, 24 Mar 2022 19:23:22 -0700 (PDT)
Received: from smtpclient.apple (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KPm942qZSzDCbj; Fri, 25 Mar 2022 03:23:20 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com>
Date: Fri, 25 Mar 2022 03:23:19 +0100
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, Core <core@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9C3ADD5E-6B10-4592-B258-9569313C90F8@tzi.org>
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org> <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com> <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org> <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com>
To: Andy Bierman <andy@yumaworks.com>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/4ZNHG3SGigAh0m6ocIHOIXHKLzc>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 02:23:30 -0000

On 24. Mar 2022, at 23:08, Andy Bierman <andy@yumaworks.com> wrote:
>=20
> What are the use-cases for marking some SIDs within a range as stable,
> and other SIDs in the same range as unstable?

There is quite some benefit from keeping the SIDs used by a module close =
together.
If you plan for evolution, you keep some free space in the SID range =
allocated for a module.
So the bis version of a module can expand into that free space first =
before needing to allocate a second range.

> The ranges are already intentionally small so "SID waste" is =
minimized.

There is a tradeoff here, and I would expect we arrive at some rule of =
thumb for how many SIDs we want to keep available in the SID range used =
for a module and its revisions (e.g., keep 1/3 for expansion?).

So I don=E2=80=99t think the granularity of stable/unstable assignment =
can be per range, it really needs to be per SID.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Fri Mar 25 04:39:44 2022
Return-Path: <mlenders@zedat.fu-berlin.de>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2780C3A1122 for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 04:39:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level: 
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1r_4UkZjwHKe for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 04:39:39 -0700 (PDT)
Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBB2B3A1139 for <core@ietf.org>; Fri, 25 Mar 2022 04:39:38 -0700 (PDT)
Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (envelope-from <mlenders@zedat.fu-berlin.de>) id 1nXiI4-0047RC-2R; Fri, 25 Mar 2022 12:39:36 +0100
Received: from dhcp-8071.meeting.ietf.org ([31.133.128.113]) by inpost2.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (envelope-from <m.lenders@fu-berlin.de>) id 1nXiI3-002ggq-Sl; Fri, 25 Mar 2022 12:39:36 +0100
Message-ID: <426473c4-167d-226f-00ef-60d6f5aed54b@fu-berlin.de>
Date: Fri, 25 Mar 2022 12:39:34 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
To: "core@ietf.org" <core@ietf.org>
From: Martine Sophie Lenders <m.lenders@fu-berlin.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Original-Sender: m.lenders@fu-berlin.de
X-Originating-IP: 31.133.128.113
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/qZCr8CR7NhcZkiBleqNYpplInFw>
Subject: [core] DNS over CoAP: A new Content-Format
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 11:39:43 -0000

Hi,

during today's meeting, I was asked to put the four discussion points I 
presented in my talk on DoC [1] on the list. Here is the discussion 
points on a potentially new Content-Format (slides 8-9 at [2], maybe 
also 7 for context).

Due to the overhead we face with, e.g., OSCORE and link-layer security, 
we might already run into 6LoWPAN fragmentation. Sure, this could be 
circumvented with block-wise transfer, but it would be better 
performance-wise, to put as much information as possible into one 
message and link-layer PDU. As such, we probably need some kind of 
compression of DNS messages.

Here is the rough collection of ideas I presented during:

- Omit authority and additional sections in DNS responses
- Question section always size 1: omit QDCount field
- Make class and type optional (imply IN/AAAA)
- Self-delimiting numeric values for classes, types, counts, TTLs, etc.?
- Question section optional in responses?

I also briefly discussed two options:
- Put everything in a CBOR-array: Question section CBOR-array and answer 
section: CBOR-array of arrays, or
- implement some “remote getaddrbyname()” (i.e., query name (maybe 
type?), expect address as response)?

Carsten also proposed some way to squeeze some bytes out of the name, 
perhaps he could also write something up here on this.

We also thought about, but I did not explicitly mention, some 6LoWPAN- 
or SCHC-like address prefix compression, but that might need some 
additional architecture.

And then there is the question if this is even something we should 
discuss in the same draft as DoC itself and if this is even a core topic 
or rather should go to dnsop.

Cheers,
Martine

[1] https://datatracker.ietf.org/doc/draft-lenders-dns-over-coap/
[2] 
https://datatracker.ietf.org/meeting/113/materials/slides-113-core-dns-queries-over-coap-doc-00


From nobody Fri Mar 25 04:56:20 2022
Return-Path: <mlenders@zedat.fu-berlin.de>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B2C33A11D8 for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 04:56:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level: 
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qf0Vpdgahf-S for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 04:56:04 -0700 (PDT)
Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EAE03A121F for <core@ietf.org>; Fri, 25 Mar 2022 04:56:03 -0700 (PDT)
Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (envelope-from <mlenders@zedat.fu-berlin.de>) id 1nXiXw-004C11-Vn; Fri, 25 Mar 2022 12:56:01 +0100
Received: from dhcp-8071.meeting.ietf.org ([31.133.128.113]) by inpost2.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (envelope-from <m.lenders@fu-berlin.de>) id 1nXiXw-002iX1-Pa; Fri, 25 Mar 2022 12:56:00 +0100
Message-ID: <4ceb78f1-dca5-b0b8-b9af-9d1fde8d258f@fu-berlin.de>
Date: Fri, 25 Mar 2022 12:55:59 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
To: "core@ietf.org" <core@ietf.org>
From: Martine Sophie Lenders <m.lenders@fu-berlin.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Original-Sender: m.lenders@fu-berlin.de
X-Originating-IP: 31.133.128.113
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/4bKzYe-V85AjkY8cqo2Owuewq7o>
Subject: [core] DNS over CoAP: Caching and CoAP Max-Age vs DNS TTL
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 11:56:18 -0000

Hi,

during today's meeting, I was asked to put the four discussion points I 
presented in my talk on DoC [1] on the list. Here is the discussion 
points on the implications of caching and the problem of Max-Age and DNS 
TTL (slides 10-12 of [2]).

When caching at a CoAP proxy, we face the issue that both CoAP's Max-Age 
option and the TTL value in DNS are expressed by means of a relative 
time frame: A caching proxy (which might not be aware of DoC) might 
update the Max-Age accordingly on Cache Hit, but not the TTLs. As such, 
to get the real time a record is valid, the DoC client need to adapt the 
DNS TTLs according the CoAP Max-Age.

I presented two options, already discussed in our GitHub PRs [3].

Option 1 [4] would basically take the DoH route and just use the minimum 
TTL min(TTLs) as the Max-Age and not further manipulate the DNS 
response. Consequently, the client would need to check the TTLs then 
again the Max-Age of the response and, if the Max-Age is lesser than the 
minimum TTL, adapt the TTLs accordingly, by doing

TTL_new = TTL_old - (min(TTLs) - Max-Age)

Option 2 [5] puts most of that workload on the server, which apart from 
using the minimum TTL min(TTLs) as the Max-Age then uses that value to 
adapt all TTLs within the DNS response by doing

TTL_new = TTL_old - min(TTLs)

The client then doesn't need to search the minimum TTL first and compare 
it to the Max-Age, but just can add the current Max-Age to all TTLs:

TTL_new = TTL_old + Max-Age

This option has the added bonus that it is also more robust against 
cache invalidation when using content-based ETags: The TTLs do not 
change in the CoAP response, even if different TTLs are reported from 
upstream (assuming they are still have the same differences to each 
other). The disadvantage is, that we add an explicit dependency of the 
application data on CoAP context.

So the questions are: Which Option should we go for? Is this even 
something that should be discussed in the draft?

Cheers,
Martine

[1] https://datatracker.ietf.org/doc/draft-lenders-dns-over-coap/
[2] 
https://datatracker.ietf.org/meeting/113/materials/slides-113-core-dns-queries-over-coap-doc-00
[3] https://github.com/anr-bmbf-pivot/draft-dns-over-coap/pulls
[4] https://github.com/anr-bmbf-pivot/draft-dns-over-coap/pull/17
[5] https://github.com/anr-bmbf-pivot/draft-dns-over-coap/pull/19


From nobody Fri Mar 25 05:08:23 2022
Return-Path: <mlenders@zedat.fu-berlin.de>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D52D83A0DE5 for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 05:08:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level: 
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XvwZiK3mcHdD for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 05:08:16 -0700 (PDT)
Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E89C3A0DB0 for <core@ietf.org>; Fri, 25 Mar 2022 05:08:15 -0700 (PDT)
Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (envelope-from <mlenders@zedat.fu-berlin.de>) id 1nXijl-0005yO-H0; Fri, 25 Mar 2022 13:08:13 +0100
Received: from dhcp-8071.meeting.ietf.org ([31.133.128.113]) by inpost2.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (envelope-from <m.lenders@fu-berlin.de>) id 1nXijl-002k00-7u; Fri, 25 Mar 2022 13:08:13 +0100
Message-ID: <8733668d-fc35-9551-1a3c-d779a8af9666@fu-berlin.de>
Date: Fri, 25 Mar 2022 13:08:12 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
To: "core@ietf.org" <core@ietf.org>
From: Martine Sophie Lenders <m.lenders@fu-berlin.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Original-Sender: m.lenders@fu-berlin.de
X-Originating-IP: 31.133.128.113
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/peJIhXC7lbl4MgPvpl73c1-qN8E>
Subject: [core] DNS over CoAP: OBSERVE needed?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 12:08:20 -0000

Hi,

during today's meeting, I was asked to put the four discussion points I 
presented in my talk on DoC [1] on the list. Here is the discussion 
point on OBSERVE/Server push (slides 13 of [2]).

Our current version (-03) of the draft has a TBD section on OBSERVE 
(section 5.3). That came from considerations put forward in DoH, RFC 
8484, section 4.3 which discusses the delivery of further HTTP responses 
with the queried name, e.g., the index.html at the root of the name 
requested. The question is: do we need or want this in CoRE? A use case 
could be to also deliver the resource directories entries, when a node 
requests its name. If we want this, some extension to CoAP would be 
required to deliver the "intended request" with the unsolicited response 
(or OBSERVE notification?), so it can be properly cached at the client.

For OBSERVE specifically, there were also some more use cases put 
forward, such as RFC 8490 (DNS Stateful Operations) and RFC 8765 (DNS 
Push Notifications), which might be less constructed and less HTTP-ey 
use cases to include considerations on OBSERVE in DoC.

Cheers,
Martine

[1] https://datatracker.ietf.org/doc/draft-lenders-dns-over-coap/
[2] 
https://datatracker.ietf.org/meeting/113/materials/slides-113-core-dns-queries-over-coap-doc-00 


From nobody Fri Mar 25 05:13:50 2022
Return-Path: <mlenders@zedat.fu-berlin.de>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F9E13A11CD for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 05:13:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level: 
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p8cRHB24DFBF for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 05:13:46 -0700 (PDT)
Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 373813A11C6 for <core@ietf.org>; Fri, 25 Mar 2022 05:13:45 -0700 (PDT)
Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (envelope-from <mlenders@zedat.fu-berlin.de>) id 1nXip5-00082i-Su; Fri, 25 Mar 2022 13:13:43 +0100
Received: from dhcp-8071.meeting.ietf.org ([31.133.128.113]) by inpost2.zedat.fu-berlin.de (Exim 4.95) for core@ietf.org with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (envelope-from <m.lenders@fu-berlin.de>) id 1nXip5-002kbL-M0; Fri, 25 Mar 2022 13:13:43 +0100
Message-ID: <2fc8d13d-11cd-dd8a-6f9f-84c63a339737@fu-berlin.de>
Date: Fri, 25 Mar 2022 13:13:42 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
To: "core@ietf.org" <core@ietf.org>
From: Martine Sophie Lenders <m.lenders@fu-berlin.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Original-Sender: m.lenders@fu-berlin.de
X-Originating-IP: 31.133.128.113
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/dZdAkASeR3yysLeXAavUJdDh0ak>
Subject: [core] DNS over CoAP: How abstract should the draft be?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 12:13:49 -0000

Hi,

during today's meeting, I was asked to put the four discussion points I 
presented in my talk on DoC [1] on the list. Here is the discussion 
point on how abstract the draft should be (slide 14 of [2]).

Klaus proposed in GitHub issue #18 to focus less on protocol details and 
rather to just define a REST API for how to fetch DNS information from a 
DoC server.

The question is, if such a more abstract specification is what would be 
more desirable and if the "how to implement over CoAP" should be more 
relegated to the Appendix or another document.

Cheers,
Martine

[1] https://datatracker.ietf.org/doc/draft-lenders-dns-over-coap/
[2] 
https://datatracker.ietf.org/meeting/113/materials/slides-113-core-dns-queries-over-coap-doc-00 

[3] https://github.com/anr-bmbf-pivot/draft-dns-over-coap/issues/18


From nobody Fri Mar 25 06:31:45 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EFBC3A125D for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 06:31:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level: 
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lRa-4-YZSQln for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 06:31:39 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05DAF3A1255 for <core@ietf.org>; Fri, 25 Mar 2022 06:31:38 -0700 (PDT)
Received: from smtpclient.apple (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KQ3033JMHzDCf6; Fri, 25 Mar 2022 14:31:30 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <2fc8d13d-11cd-dd8a-6f9f-84c63a339737@fu-berlin.de>
Date: Fri, 25 Mar 2022 14:31:29 +0100
Cc: "core@ietf.org" <core@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <B635BD04-847B-4D43-B050-8367828A5EC1@tzi.org>
References: <2fc8d13d-11cd-dd8a-6f9f-84c63a339737@fu-berlin.de>
To: Martine Sophie Lenders <m.lenders@fu-berlin.de>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/yWaxXmaw_f5gBFkAfVbT-wdOpWg>
Subject: Re: [core] DNS over CoAP: How abstract should the draft be?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 13:31:44 -0000

On 25. Mar 2022, at 13:13, Martine Sophie Lenders =
<m.lenders@fu-berlin.de> wrote:
>=20
> Klaus proposed in GitHub issue #18 to focus less on protocol details =
and rather to just define a REST API for how to fetch DNS information =
from a DoC server.
>=20
> The question is, if such a more abstract specification is what would =
be more desirable and if the "how to implement over CoAP" should be more =
relegated to the Appendix or another document.

What is better about leaving this open instead of simply defining it?

Gr=C3=BC=C3=9Fe, Carsten



From nobody Fri Mar 25 06:34:14 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02C3E3A125E for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 06:34:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level: 
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Ij0T1rD3DlB for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 06:34:08 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75AA73A125D for <core@ietf.org>; Fri, 25 Mar 2022 06:34:07 -0700 (PDT)
Received: from smtpclient.apple (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KQ32y1PdTzDCcM; Fri, 25 Mar 2022 14:34:01 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <B635BD04-847B-4D43-B050-8367828A5EC1@tzi.org>
Date: Fri, 25 Mar 2022 14:33:58 +0100
Cc: "core@ietf.org" <core@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <E39364C9-3E3E-4BC2-96F7-C4668A1602F9@tzi.org>
References: <2fc8d13d-11cd-dd8a-6f9f-84c63a339737@fu-berlin.de> <B635BD04-847B-4D43-B050-8367828A5EC1@tzi.org>
To: Martine Sophie Lenders <m.lenders@fu-berlin.de>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/xebY4-GGsnQ-HtKL1DWBiMA8j08>
Subject: Re: [core] DNS over CoAP: How abstract should the draft be?
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 13:34:13 -0000

On 25. Mar 2022, at 14:31, Carsten Bormann <cabo@tzi.org> wrote:
>=20
> What is better about leaving this open instead of simply defining it?

Maybe I misunderstood the question.

I think Klaus may be pointing out the =E2=80=9Crestatement =
anti-pattern=E2=80=9D: We don=E2=80=99t need text in the draft that =
explains how CoAP works (except maybe in examples).
So you would explain the protocol in terms of CoAP=E2=80=99s service, =
not in terms of CoAP=E2=80=99s individual messages that CoAP uses to =
provide this service.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Fri Mar 25 08:36:57 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 032AB3A1775 for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 08:36:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MP-Cq-xopdLh for <core@ietfa.amsl.com>; Fri, 25 Mar 2022 08:36:48 -0700 (PDT)
Received: from mail-yw1-x112c.google.com (mail-yw1-x112c.google.com [IPv6:2607:f8b0:4864:20::112c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B39A83A1773 for <core@ietf.org>; Fri, 25 Mar 2022 08:36:34 -0700 (PDT)
Received: by mail-yw1-x112c.google.com with SMTP id 00721157ae682-2e5757b57caso87147337b3.4 for <core@ietf.org>; Fri, 25 Mar 2022 08:36:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=bIaBIOfZuwTvq7w7NlQZwjDjHe0XoBhnHgBJCqNCpTA=; b=CqonShYwprYwGgrgQaKwfZHnmBnBjJXzEwwj1MxarSyogOFtHRyaY1jG/Mtt7Ey6Aj LQlTo3PhvTKps8LWmlNqv2U0hEVLlOJnzq/xMvOhT4SXsTlQOTq69KMEK6DcvSKmWpkT bwka+tKM5foJIx8RYXU8N8ND0f3LGLU3uI7Fi6/77J/igTzvkvnmER1vEGV7OySKQOWa 0QNyv6eN3IDeNbl1lBNa+6cbO7mPD67YjhBM7F6ympEgCLpw7Z/SrxfNisfwKZmrv1XC FsxEczTZUO8z9JfH0CkXeCFiJpF4ZTHYPMYEVpuQ9rliZWlRh2WyH9R5S9UQcff0s8tD 6amA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=bIaBIOfZuwTvq7w7NlQZwjDjHe0XoBhnHgBJCqNCpTA=; b=jyvGCx0vQWUP6Xneu4Ah3lf9Utw/Y3EW+W5Tc/WpOTiKDDTneho8AXULS8RLQ/ahGC mdlmWYcNIDW0NJLpgNotZdcRSDop5GFdwirRxYlgwIQs3OX04Zzrn6BN8UjhFbfS/JpB uyBYNf935GPFeUCsSTj0yY+3LUL7Nc4Dgf+FkfzTuztBqTVU8qIbfUBPTDGk9gpn064t 8I7hCHgNGEju13EcQm6rnPxNIKKtTk1rBoYYKHyrr9nKe175APwCjna6Ek1siH4rVYtI N6C13+/3yONE/mnwT0YE+DD5gwH8IDHqF5W5Dm1uGKw3ec9C3lR9obYoOYaMKodAd/Pi ImtA==
X-Gm-Message-State: AOAM532V7R7FxUoUPOhdKVIFZhdrmutP2XyCDlGA9IvRUHVQIWOvSLMm yJL81F9Q4tISmYkz9ExGKpvQERFh5UeURqcMl4er8A==
X-Google-Smtp-Source: ABdhPJxtzQO0pnXnNoK59A4QxZQTFx7cMMKJuNYielUacNWaXSPYiysrTIJt3ZdczerQKiTb1e7bzcbkGRGXjpjyjLg=
X-Received: by 2002:a81:5845:0:b0:2e5:a75d:ed20 with SMTP id m66-20020a815845000000b002e5a75ded20mr11134375ywb.110.1648222593064; Fri, 25 Mar 2022 08:36:33 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org> <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com> <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org> <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com> <9C3ADD5E-6B10-4592-B258-9569313C90F8@tzi.org>
In-Reply-To: <9C3ADD5E-6B10-4592-B258-9569313C90F8@tzi.org>
From: Andy Bierman <andy@yumaworks.com>
Date: Fri, 25 Mar 2022 08:36:22 -0700
Message-ID: <CABCOCHTVijw_Xv_eeKzg8iOAJ3=Ju84BuQzSbARju-VXUYM-Ww@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, Core <core@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002bb91f05db0cbae4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/9q3q6BtCXpCVmFco5_TEurgZZ6c>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 15:36:53 -0000

--0000000000002bb91f05db0cbae4
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Mar 24, 2022 at 7:23 PM Carsten Bormann <cabo@tzi.org> wrote:

> On 24. Mar 2022, at 23:08, Andy Bierman <andy@yumaworks.com> wrote:
> >
> > What are the use-cases for marking some SIDs within a range as stable,
> > and other SIDs in the same range as unstable?
>
> There is quite some benefit from keeping the SIDs used by a module close
> together.
> If you plan for evolution, you keep some free space in the SID range
> allocated for a module.
> So the bis version of a module can expand into that free space first
> before needing to allocate a second range.
>
> > The ranges are already intentionally small so "SID waste" is minimized.
>
> There is a tradeoff here, and I would expect we arrive at some rule of
> thumb for how many SIDs we want to keep available in the SID range used f=
or
> a module and its revisions (e.g., keep 1/3 for expansion?).
>
> So I don=E2=80=99t think the granularity of stable/unstable assignment ca=
n be per
> range, it really needs to be per SID.
>
>

The per-SID entry flag allows for non-contiguous stable vs. unstable SIDs.
Is this really needed?   SID_base +17 and +19 are stable but +18 is
unstable?
If not, then a simple 'block-used' leaf should work:

// if any SIDs left in a range at RFC publication then last-used will be
less
// than entry-point + size - 1
{
    entry-point=3D2000
    size=3D40
    last-used=3D2039
},
{
    entry-point=3D6000
    size=3D40
    last-used=3D6004
}

Whatever the changes are, the SID file draft should contain normative text
explaining
exactly how this 'status=3Dunstable' flag is used in the SID file.

It should be possible for multiple independent implementations of a SID
file generator
tool to be written, from the RFC.  It should be possible for such tools to
produce
the same exact series of SID files, for the same exact set of input YANG
modules.

The plan seems to be just to publish whatever pyang generates.
How will anybody know if the SID file is correct?

Gr=C3=BC=C3=9Fe, Carsten
>

Andy

--0000000000002bb91f05db0cbae4
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Mar 24, 2022 at 7:23 PM Carst=
en Bormann &lt;<a href=3D"mailto:cabo@tzi.org" target=3D"_blank">cabo@tzi.o=
rg</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex=
">On 24. Mar 2022, at 23:08, Andy Bierman &lt;<a href=3D"mailto:andy@yumawo=
rks.com" target=3D"_blank">andy@yumaworks.com</a>&gt; wrote:<br>
&gt; <br>
&gt; What are the use-cases for marking some SIDs within a range as stable,=
<br>
&gt; and other SIDs in the same range as unstable?<br>
<br>
There is quite some benefit from keeping the SIDs used by a module close to=
gether.<br>
If you plan for evolution, you keep some free space in the SID range alloca=
ted for a module.<br>
So the bis version of a module can expand into that free space first before=
 needing to allocate a second range.<br>
<br>
&gt; The ranges are already intentionally small so &quot;SID waste&quot; is=
 minimized.<br>
<br>
There is a tradeoff here, and I would expect we arrive at some rule of thum=
b for how many SIDs we want to keep available in the SID range used for a m=
odule and its revisions (e.g., keep 1/3 for expansion?).<br>
<br>
So I don=E2=80=99t think the granularity of stable/unstable assignment can =
be per range, it really needs to be per SID.<br>
<br></blockquote><div><br></div><div><br></div><div>The per-SID entry flag =
allows for non-contiguous stable vs. unstable SIDs.</div><div>Is this reall=
y needed?=C2=A0 =C2=A0SID_base +17 and +19 are stable but=C2=A0+18 is unsta=
ble?</div><div>If not, then a simple &#39;block-used&#39; leaf should work:=
</div><div><br></div><div>// if any SIDs left in a range at RFC publication=
 then last-used will be less</div><div>// than entry-point=C2=A0+ size - 1<=
/div><div>{<br>=C2=A0 =C2=A0 entry-point=3D2000<br>=C2=A0 =C2=A0 size=3D40<=
br>=C2=A0 =C2=A0 last-used=3D2039<br>},<br>{<br>=C2=A0 =C2=A0 entry-point=
=3D6000<br>=C2=A0 =C2=A0 size=3D40<br>=C2=A0 =C2=A0 last-used=3D6004<br>}<b=
r></div><div><br></div><div>Whatever the changes are, the SID file draft sh=
ould contain normative text explaining</div><div>exactly how this &#39;stat=
us=3Dunstable&#39; flag is used in the SID file.</div><div><br></div><div>I=
t should be possible for multiple independent=C2=A0implementations of a SID=
 file generator</div><div>tool to be written, from the RFC.=C2=A0 It should=
 be possible for such tools to produce</div><div>the same exact series of S=
ID files, for the same exact set of input YANG modules.</div><div><br></div=
><div>The plan seems to be just to publish whatever pyang generates.</div><=
div>How will anybody know if the SID file is correct?</div><div><br></div><=
blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-l=
eft:1px solid rgb(204,204,204);padding-left:1ex">
Gr=C3=BC=C3=9Fe, Carsten<br></blockquote><div><br></div><div>Andy</div><div=
>=C2=A0</div></div></div>

--0000000000002bb91f05db0cbae4--


From nobody Sat Mar 26 05:42:51 2022
Return-Path: <mcr@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D0CB3A0933; Sat, 26 Mar 2022 05:42:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l4iHKjQ30I6n; Sat, 26 Mar 2022 05:42:12 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00:e000:2bb::1]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEC933A08C6; Sat, 26 Mar 2022 05:42:08 -0700 (PDT)
Received: from dooku.sandelman.ca (unknown [62.218.44.74]) by relay.sandelman.ca (Postfix) with ESMTPS id BBDDB1F458; Sat, 26 Mar 2022 12:42:06 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id BC2DB1A01DE; Sat, 26 Mar 2022 13:42:05 +0100 (CET)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: uta@ietf.org, core@ietf.org, iotops@ietf.org
X-Attribution: mcr
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Sat, 26 Mar 2022 13:42:05 +0100
Message-ID: <59686.1648298525@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/kATfmCXYgEkOsB_reUi8smHw1gM>
Subject: [core] comments on draft-ietf-uta-tls13-iot-profile-04:
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2022 12:42:18 -0000

--=-=-=
Content-Type: text/plain


I read draft-ietf-uta-tls13-iot-profile-04 today.
Thank you Hannes for presenting it at IOTOPS.  To be, it is precisely this
kind of thing that IOTOPS was created for.

1) I feel that the 4.25 Too Early allocation for CoAP could use a bit more
   explanation, and probably there needs to be some more clear review at CORE.
   (maybe it already happened and I missed it?)
   Reading through the lines, it appears that a server that can't handle
   early data needs to send an error code.  But such a server probably
   doesn't know about the error code.  I would have thought it should just
   hang on to the data until the (D)TLS negotiation is complete.
   I'm also concerned that this requires too much cross-layer communication
   between DTLS layer and CoAP layer.

2) A long thread at LAMPS two years suggests that the term "Intermediate CA"
   applies only to cross-certification authoritiy bridges, and the term
   "Subordinate CA" should be used.  That this is consistent with history
   going back to RFC4949.

3) While section 10 on SNI does not say *how* to use DoH or DPRIVE to provide
   for confidentiality of names that are looked up, a naive use of DoH with
   Google/Cloudflare/etc. by IoT devices would be a problem for almost all
   enterprises that wish to filter the DNS used by IoT devices, and to use
   DNS canaries to identify malware.

Given that such an involved discussion is not in scope for this document,
it might be better just to refer to the ADD WG without mentioning specific
solutions.
I am, in general, not convinced that encrypted SNI serves any purpose for
most IoT devices.

4) section 15
   There is much discussion about what goes into the certificates.
   I didn't really understand why that is in this document.
   Validation of server certificates is well covered in RFC6125, I think.

Validation of client certificates (whether factory provisioned IDevIDs, or
locally enrolled LDevIDs) is a topic that I care a lot about, and
this text is inadequate.

As the (industrial) IoT market embraces IDevID certificates, there is some
concern that different markets will put different requirements on IDevID
contents.  So far it does not appear that anyone has created a situation
where a single (fat) IDevID certificate couldn't be used in a variety of
market verticals, the concern remains.

It was my intention to introduce a document about this issue. I think that
it's something that only the IETF can do.  Perhaps that would fit into this
UTA document, or perhaps parts of this section 15 goes into another document.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=UtqA
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Mon Mar 28 00:02:51 2022
Return-Path: <mcr@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0A813A0B68 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 00:02:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J0J4qY7oRgPD for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 00:02:42 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00:e000:2bb::1]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C42C63A0BB4 for <core@ietf.org>; Mon, 28 Mar 2022 00:02:41 -0700 (PDT)
Received: from dooku.sandelman.ca (unknown [193.43.158.229]) by relay.sandelman.ca (Postfix) with ESMTPS id A4A751F45E; Mon, 28 Mar 2022 07:02:38 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 92B7A1A0285; Mon, 28 Mar 2022 09:02:37 +0200 (CEST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Andy Bierman <andy@yumaworks.com>, Carsten Bormann <cabo@tzi.org>, Core <core@ietf.org>
In-reply-to: <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com>
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org> <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com> <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org> <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com>
Comments: In-reply-to Andy Bierman <andy@yumaworks.com> message dated "Thu, 24 Mar 2022 15:08:51 -0700."
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Mon, 28 Mar 2022 09:02:37 +0200
Message-ID: <85894.1648450957@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/FtAxc9wtc4HvPNGzbm1B3_SFmzo>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 07:02:48 -0000

--=-=-=
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable


Andy Bierman <andy@yumaworks.com> wrote:
    > Module foo initially has 1 assignment range

    > All I-Ds leading to first RFC: { entry-point=3D2000 size=3D40 stable=
=3Dfalse
    > }

    > Publish the first RFC (locking the assignment range forever!)

    > { entry-point=3D2000 size=3D40 stable=3Dtrue }

We prefered not to say stable=3Dtrue/false, on the assumption that there mi=
ght
in the future be a third value.  So "status=3Dstable"

    > What are the use-cases for marking some SIDs within a range as stable,
    > and other SIDs in the same range as unstable?

Because when in the I-D stage for a RFCXXXXbis, we need to keep the SIDs
allocated by RFCXXXX stable, but the new ones from XXXXbis (an ID) could be
renumbered without conseuqnece.

=2D-=20
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -=3D IPv6 IoT consulting =3D-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=6bBb
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Mon Mar 28 00:05:27 2022
Return-Path: <mcr@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC0A73A0BCA for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 00:05:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level: 
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j-N8RbmOfqok for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 00:05:20 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00:e000:2bb::1]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EEA23A0BB4 for <core@ietf.org>; Mon, 28 Mar 2022 00:05:18 -0700 (PDT)
Received: from dooku.sandelman.ca (unknown [193.43.158.229]) by relay.sandelman.ca (Postfix) with ESMTPS id B34431F45E; Mon, 28 Mar 2022 07:05:16 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 732851A0285; Mon, 28 Mar 2022 09:05:15 +0200 (CEST)
From: Michael Richardson <mcr@sandelman.ca>
To: Andy Bierman <andy@yumaworks.com>, Carsten Bormann <cabo@tzi.org>, Core <core@ietf.org>
In-reply-to: <CABCOCHTVijw_Xv_eeKzg8iOAJ3=Ju84BuQzSbARju-VXUYM-Ww@mail.gmail.com>
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org> <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com> <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org> <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com> <9C3ADD5E-6B10-4592-B258-9569313C90F8@tzi.org> <CABCOCHTVijw_Xv_eeKzg8iOAJ3=Ju84BuQzSbARju-VXUYM-Ww@mail.gmail.com>
Comments: In-reply-to Andy Bierman <andy@yumaworks.com> message dated "Fri, 25 Mar 2022 08:36:22 -0700."
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Mon, 28 Mar 2022 09:05:15 +0200
Message-ID: <86105.1648451115@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/NX_bWqsZu6y48uiV9KypA9CopVk>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 07:05:26 -0000

--=-=-=
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable


Andy Bierman <andy@yumaworks.com> wrote:
    > The per-SID entry flag allows for non-contiguous stable vs. unstable
    > SIDs.  Is this really needed?  SID_base +17 and +19 are stable but +18
    > is unstable?  If not, then a simple 'block-used' leaf should work:

1) You assume two ranges, which many modules will not have.
2) SIDs created during RFCXXXXbis are unstable.

    > It should be possible for multiple independent implementations of a S=
ID
    > file generator tool to be written, from the RFC.  It should be possib=
le
    > for such tools to produce the same exact series of SID files, for the
    > same exact set of input YANG modules.

Agreed.

    > The plan seems to be just to publish whatever pyang generates.  How
    > will anybody know if the SID file is correct?

I agree that we need to examine .sid files careful for awhile.
Certainly, core-sid can't go to Internet Standard until there is a second
implementation. (pyang being the first)




=20

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=4Esh
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Mon Mar 28 03:21:44 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 672D33A1152 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 03:21:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 45Dm1CRW-rCJ for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 03:21:36 -0700 (PDT)
Received: from mail-yb1-xb2c.google.com (mail-yb1-xb2c.google.com [IPv6:2607:f8b0:4864:20::b2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CF383A1142 for <core@ietf.org>; Mon, 28 Mar 2022 03:21:36 -0700 (PDT)
Received: by mail-yb1-xb2c.google.com with SMTP id x20so25008916ybi.5 for <core@ietf.org>; Mon, 28 Mar 2022 03:21:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=r2JX7V4eXxPD0njxltVZmFRNXIfQLFzsnpku1F7pJqg=; b=VrsD/Tn/687rQ7GtoelmxpV/Apeq6b5a4bf9BcfprZ9cQTNYPIqwYuYumkfZb9vXJ1 P9+EHbI+IvYljep2jnNjQEDkjHXdig7JX/ijqBpRXFoZbDJb/FlDgwxolPv8ehgpOo5P qiV3fbm19QwnRUjxDU5Hc7pvZFkHWtTx8BCZgSIl0hbCAoZ70+jSLDfVa9jHFFKB/i58 mPKzIAv2hE+jq2qOe1UkppKqcG2f8mPLIciphUqTXn0fQt1tZ+wH8vpp9PmwK8LgG7+T Sl8/afkZ2unH8pkPlTRf9bpPNyZ/ACYJMAZxdkZ7g/AMtuBfom7vJl9LdFEKegQSR9ZB Jrig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=r2JX7V4eXxPD0njxltVZmFRNXIfQLFzsnpku1F7pJqg=; b=LJbBTyWa552z2W44oVq1OkkjbCO5feyJT4ACtc5joQF23oJBkdeIStrjUqYTqFumAN bPxvA4zW5Z5F6Sew3pszE/DvJVlj0x7g+u8UPIkvgTcPyxnQVhsjdLhPRaTqdE/OKhk4 9I/ziZNE6nsl/pZBRuJVQuD0YuXonqv7HQLbJtmMgnTv3NK5HqBsMhbb5jIW47lo5Hm1 atmZ0iTlLfkf4UcrbEqoQUYHBpAFkbTwnoKDoEccRykglGQ9SttogoJ6Q6rHAr3Bm7+D AQhex+txN3iq+6V5K83GO4H2H3l5ME03VkNI9eWydIIPNIXdMpqCMyylSbyA2Ly+KK6Z hQtw==
X-Gm-Message-State: AOAM53192q08jWO1i09ss5Apfsr6n0+3BxUTJQsHbTchJHz90qDy3a5i KRFcBp3k0REiTHP9lbPY7s7qvjkgd8BJfcoVa11f+A==
X-Google-Smtp-Source: ABdhPJxmr9UT9Xvp6ICYcuXBijs/qnCf9xkN/najUVjaEeXPCziADOtYuGWZgMBQgClRBM9UN1DC9xfrCPWLdjKcEhs=
X-Received: by 2002:a25:be8a:0:b0:608:67d7:22fe with SMTP id i10-20020a25be8a000000b0060867d722femr20721657ybk.336.1648462895115; Mon, 28 Mar 2022 03:21:35 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CABCOCHSDe9zbVAkVZFJDuaSN7endQMq2R0ab+R_PYoXJpyXp-w@mail.gmail.com> <131810E8-5D08-4574-A9D2-1518A8F09745@tzi.org> <CABCOCHQJ5O1ubdLiwoHT4X2GgUoDX3iQ52T=MP83mOYenG6ymw@mail.gmail.com> <AD05968C-C7FA-45BE-9683-9B5DB4192D93@tzi.org> <CABCOCHSaSH0r8oTZTcKQGq+7RP0HtS-A4ayHuFehNDVaKR+Z=Q@mail.gmail.com> <85894.1648450957@dooku>
In-Reply-To: <85894.1648450957@dooku>
From: Andy Bierman <andy@yumaworks.com>
Date: Mon, 28 Mar 2022 03:21:24 -0700
Message-ID: <CABCOCHTcvSge2GJNwavFBXxX4V1kghQM6xn1BBDiYy+Uyfzt-Q@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: Carsten Bormann <cabo@tzi.org>, Core <core@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004a038305db44ad9a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/zwYR2Uqrbp3Cx8K8kce_QdI0UL8>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 10:21:42 -0000

--0000000000004a038305db44ad9a
Content-Type: text/plain; charset="UTF-8"

On Mon, Mar 28, 2022 at 12:02 AM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Andy Bierman <andy@yumaworks.com> wrote:
>     > Module foo initially has 1 assignment range
>
>     > All I-Ds leading to first RFC: { entry-point=2000 size=40
> stable=false
>     > }
>
>     > Publish the first RFC (locking the assignment range forever!)
>
>     > { entry-point=2000 size=40 stable=true }
>
> We prefered not to say stable=true/false, on the assumption that there
> might
> in the future be a third value.  So "status=stable"
>
>     > What are the use-cases for marking some SIDs within a range as
> stable,
>     > and other SIDs in the same range as unstable?
>
> Because when in the I-D stage for a RFCXXXXbis, we need to keep the SIDs
> allocated by RFCXXXX stable, but the new ones from XXXXbis (an ID) could be
> renumbered without conseuqnece.
>


I assume the exact procedures for automatic SID file generation will be
updated
to reflect the changes being made.  It looks like the procedure is not
manual and ad-hoc,
IMO dramatically reducing its robustness and reliability

I think the statements about permanent assignments is false:

   SIDs are assigned permanently.  Items introduced by a new revision of
   a YANG module are added to the list of SIDs already assigned.
   Assignment of SIDs to YANG items are usually automated as discussed
   in Appendix B, which also discusses some cases where manual
   interventions may be appropriate.






> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-
>
>
>
Andy

--0000000000004a038305db44ad9a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at 12:02 AM Mich=
ael Richardson &lt;<a href=3D"mailto:mcr%2Bietf@sandelman.ca">mcr+ietf@sand=
elman.ca</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><br>
Andy Bierman &lt;<a href=3D"mailto:andy@yumaworks.com" target=3D"_blank">an=
dy@yumaworks.com</a>&gt; wrote:<br>
=C2=A0 =C2=A0 &gt; Module foo initially has 1 assignment range<br>
<br>
=C2=A0 =C2=A0 &gt; All I-Ds leading to first RFC: { entry-point=3D2000 size=
=3D40 stable=3Dfalse<br>
=C2=A0 =C2=A0 &gt; }<br>
<br>
=C2=A0 =C2=A0 &gt; Publish the first RFC (locking the assignment range fore=
ver!)<br>
<br>
=C2=A0 =C2=A0 &gt; { entry-point=3D2000 size=3D40 stable=3Dtrue }<br>
<br>
We prefered not to say stable=3Dtrue/false, on the assumption that there mi=
ght<br>
in the future be a third value.=C2=A0 So &quot;status=3Dstable&quot;<br>
<br>
=C2=A0 =C2=A0 &gt; What are the use-cases for marking some SIDs within a ra=
nge as stable,<br>
=C2=A0 =C2=A0 &gt; and other SIDs in the same range as unstable?<br>
<br>
Because when in the I-D stage for a RFCXXXXbis, we need to keep the SIDs<br=
>
allocated by RFCXXXX stable, but the new ones from XXXXbis (an ID) could be=
<br>
renumbered without conseuqnece.<br></blockquote><div><br></div><div><br></d=
iv><div>I assume the exact procedures=C2=A0for automatic SID file generatio=
n will be updated</div><div>to reflect the changes being made.=C2=A0 It loo=
ks like the procedure is not manual and ad-hoc,</div><div>IMO dramatically =
reducing its robustness and reliability</div><div><br></div><div>I think th=
e statements about permanent assignments is false:</div><div><br></div><div=
><pre style=3D"color:rgb(0,0,0);white-space:pre-wrap">   SIDs are assigned =
permanently.  Items introduced by a new revision of
   a YANG module are added to the list of SIDs already assigned.
   Assignment of SIDs to YANG items are usually automated as discussed
   in Appendix B, which also discusses some cases where manual
   interventions may be appropriate.</pre></div><div><br></div><div><br></d=
iv><div><br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex">
<br>
-- <br>
Michael Richardson &lt;<a href=3D"mailto:mcr%2BIETF@sandelman.ca" target=3D=
"_blank">mcr+IETF@sandelman.ca</a>&gt;, Sandelman Software Works<br>
=C2=A0-=3D IPv6 IoT consulting =3D-<br>
<br>
<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div></div></div=
>

--0000000000004a038305db44ad9a--


From nobody Mon Mar 28 06:22:55 2022
Return-Path: <alexander@ackl.io>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 539F73A0DD8 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 06:22:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ackl-io.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hvZKqquIsAi6 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 06:22:46 -0700 (PDT)
Received: from mail-io1-xd31.google.com (mail-io1-xd31.google.com [IPv6:2607:f8b0:4864:20::d31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0B663A0DF1 for <core@ietf.org>; Mon, 28 Mar 2022 06:22:45 -0700 (PDT)
Received: by mail-io1-xd31.google.com with SMTP id e22so16962832ioe.11 for <core@ietf.org>; Mon, 28 Mar 2022 06:22:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ackl-io.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=THMk8p2KudDd2TgfQRaGi+8/9GBPb146oq5NnDMYbcE=; b=IeVxXFwhR1yk/BrwdSOhKhtrWKtNPoRsDKDYwlrssJjdFf/eVX/ysDvPDMmEHShSRe s4ZNNqgcBC8RpsIiKUi+s6VsI6lJJ9pCv6fgMZiOBglQ95/FbOXtU0sxj906NeDe+tPJ PNp9hsgITtVkI9wtNut/9Cvtaft8O4hyoqZoHJ0cfXEO0ICL169ogyLYpmHgCho8rE8l XeX1XLpK639cKvXF/Blg1H1UcYgPI4Hm6+WK6BfaUIqF4+QIoHw7dr9EIrjrLTVuL/+q vNGaSG31+rupDis/8ohMOin7B9ce1aRs0/13CghRPs9yPNK1PvfgVpL/sAGDHkWmSiFE IIHA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=THMk8p2KudDd2TgfQRaGi+8/9GBPb146oq5NnDMYbcE=; b=FnQd4HvxTMgjx/3MYvqpAFNA1r0J3v3VUJwtUfJUSPLIgLVPe111rSB8S1JiBgoLZL gMxf1cAhFSkqLzL3HyUZ1zBVAJeIYQqWLjCRVzSgk858qRixLgt7zRtD30dbFqS1g4nV 0yREdBGP0Ip5jM1dE0hwoq9bTMYrqOrnsHMMdWMwS0MU87icGnGjEfZjTvl96cfOamzo SqcAjS5WBDG15a5uqoi/kang7IN+cu7kU2E6spJuUwDBEBk8mqqPsA7pYlu7J2kcrDjw 1qvsTaicaCbipSQcW2Qm/WLYhtjU5c2++ElFIgUCIRKDuGgUrlx+27iMyJ/mLD9fTB9Y pw0Q==
X-Gm-Message-State: AOAM530Y6edxOgCp3+fPHMLwidoINZkf/F9EAlAichw8CYonAYz7JNPo LelyoH+s3d/CP5/hGaFp05cyAOQiT42Hmmfq56po+GaEN7BAiw==
X-Google-Smtp-Source: ABdhPJzd6jpzMczNf9w5XwyWjBYlo6GB3w+rDkbNJqNdL8MyJJ0xqZsWD3bHTuN3mJoNnPMbvWwHmiUkdM3w6xHxa7U=
X-Received: by 2002:a6b:7a49:0:b0:645:d134:830f with SMTP id k9-20020a6b7a49000000b00645d134830fmr6299522iop.136.1648473764405; Mon, 28 Mar 2022 06:22:44 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku>
In-Reply-To: <32267.1648146701@dooku>
From: Alexander Pelov <a@ackl.io>
Date: Mon, 28 Mar 2022 15:22:33 +0200
Message-ID: <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002639e205db473564"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/sIBzAAKKS2wOKOcI-zGsQ_hBb1w>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 13:22:51 -0000

--0000000000002639e205db473564
Content-Type: text/plain; charset="UTF-8"

Dear Michael, all,

Thanks for getting the discussion to the mailing list! It is indeed
exciting to see the IETF in-person meetings allowing for these discussions
to take place.

I am not sure I understand the premise of your mail, and the discussion
that follows touches upon several possibilities.
If you revise a module, you provide a new YANG file (with a different
name/revision), and if you need to change the semantics of some item..
well, you need a new SID.

Can you please provide an example that needs adding something new and
cannot be solved as currently it stands?

Cheers,
Alexander






On Thu, Mar 24, 2022 at 7:33 PM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Today in discussion with ADs Rob Wilton and Francesca, it became clear that
> we really need to add a status entry to the SID file for allocations.
>
> The use case is where we have taken a YANG module to RFC, and have created
> a
> stable set of SID allocations for it.  Then, we revise the module. During
> that process of doing draft-foo-bar-rfcBIS, we might want to reset the SID
> numbering as we add/subtract/modify the extension proposals.
>
> So we need to know which parts of the SID file we can reset, and which
> parts
> we can not.
>
> This is a rudamentary pull request to do that.  I am uncertain if this YANG
> module parses as yet.  I haven't done any work on sid.py to implement this.
>
> Please let me know if I captured the proposal well enough.
> I don't know what to call the thing which is not stable.
> I feel that "unstable" does not quite capture the proper intent.
>
> https://github.com/core-wg/yang-cbor/pull/141
>
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-
>
>
>
> _______________________________________________
> core mailing list
> core@ietf.org
> https://www.ietf.org/mailman/listinfo/core
>

--0000000000002639e205db473564
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear Michael, all,<div><br></div><div>Thanks for getting t=
he discussion to the mailing list! It is indeed exciting to see the IETF in=
-person meetings allowing for these discussions to take place.</div><div><b=
r></div><div>I am not sure I understand the premise of your mail, and the d=
iscussion that follows touches upon several possibilities.</div><div>If you=
 revise a module, you provide a new YANG file (with a different name/revisi=
on), and if you need to change the semantics of some item.. well, you need =
a new SID.</div><div><br></div><div>Can you please provide an example that =
needs adding something new and cannot be solved as currently it stands?</di=
v><div><br></div><div>Cheers,</div><div>Alexander</div><div><br></div><div>=
<br></div><div><br></div><div><br></div><div><br></div></div><br><div class=
=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Thu, Mar 24, 2022=
 at 7:33 PM Michael Richardson &lt;<a href=3D"mailto:mcr%2Bietf@sandelman.c=
a">mcr+ietf@sandelman.ca</a>&gt; wrote:<br></div><blockquote class=3D"gmail=
_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204=
,204);padding-left:1ex"><br>
Today in discussion with ADs Rob Wilton and Francesca, it became clear that=
<br>
we really need to add a status entry to the SID file for allocations.<br>
<br>
The use case is where we have taken a YANG module to RFC, and have created =
a<br>
stable set of SID allocations for it.=C2=A0 Then, we revise the module. Dur=
ing<br>
that process of doing draft-foo-bar-rfcBIS, we might want to reset the SID<=
br>
numbering as we add/subtract/modify the extension proposals.<br>
<br>
So we need to know which parts of the SID file we can reset, and which part=
s<br>
we can not.<br>
<br>
This is a rudamentary pull request to do that.=C2=A0 I am uncertain if this=
 YANG<br>
module parses as yet.=C2=A0 I haven&#39;t done any work on sid.py to implem=
ent this.<br>
<br>
Please let me know if I captured the proposal well enough.<br>
I don&#39;t know what to call the thing which is not stable.<br>
I feel that &quot;unstable&quot; does not quite capture the proper intent.<=
br>
<br>
<a href=3D"https://github.com/core-wg/yang-cbor/pull/141" rel=3D"noreferrer=
" target=3D"_blank">https://github.com/core-wg/yang-cbor/pull/141</a><br>
<br>
--<br>
Michael Richardson &lt;<a href=3D"mailto:mcr%2BIETF@sandelman.ca" target=3D=
"_blank">mcr+IETF@sandelman.ca</a>&gt;, Sandelman Software Works<br>
=C2=A0-=3D IPv6 IoT consulting =3D-<br>
<br>
<br>
<br>
_______________________________________________<br>
core mailing list<br>
<a href=3D"mailto:core@ietf.org" target=3D"_blank">core@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/core</a><br>
</blockquote></div>

--0000000000002639e205db473564--


From nobody Mon Mar 28 07:07:14 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EEB73A111F for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 07:07:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cyhl21Xct0d7 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 07:07:06 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 25A4D3A116D for <core@ietf.org>; Mon, 28 Mar 2022 07:07:05 -0700 (PDT)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KRvdf07JWzDCnD; Mon, 28 Mar 2022 16:07:01 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com>
Date: Mon, 28 Mar 2022 16:07:01 +0200
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
X-Mao-Original-Outgoing-Id: 670169221.567598-4c8d787bdc2fb7cffb11613bb1524e59
Content-Transfer-Encoding: quoted-printable
Message-Id: <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org>
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com>
To: Alexander Pelov <a@ackl.io>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/AaXtvDfBPr-k9MycDZyhO3zhtNE>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 14:07:11 -0000

On 2022-03-28, at 15:22, Alexander Pelov <a@ackl.io> wrote:
>=20
> Dear Michael, all,
>=20
> Thanks for getting the discussion to the mailing list! It is indeed =
exciting to see the IETF in-person meetings allowing for these =
discussions to take place.
>=20
> I am not sure I understand the premise of your mail, and the =
discussion that follows touches upon several possibilities.
> If you revise a module, you provide a new YANG file (with a different =
name/revision), and if you need to change the semantics of some item.. =
well, you need a new SID.

Hi Alex,

we have to distinguish two cases here:

(1) The YANG module was unstable (e.g., early I-D state).
In this case, we can do what we want, including changing the (also =
unstable) SID-name mapping.

(2) The YANG module was stable (e.g., we are working on a -bis for a =
published RFC).
In this case, the SID-name mapping already has been marked stable.
I also think it would be highly inadvisable to =E2=80=9Cchange the =
semantics of some item=E2=80=9D even in the YANG module =E2=80=94 if you =
want to do that, give it a new name, too, which allows you to allocate a =
new SID for the new name.
But the old name will keep its stable SID.

The reason we want to do this is:
(1) to keep the SID-name mapping a function =E2=80=94 there never can be =
two YANG names associated with a single SID.
(2) to keep the name-SID mapping =E2=80=9Cmostly" a function =E2=80=94 =
while we cannot completely prevent several independent SID allocations =
for a YANG name, one objective is to have a single =E2=80=9Ccanonical=E2=80=
=9D SID mapping for each YANG name, preferably with the same provenance =
that the YANG module itself has.

Yes, this still has to be written up at this level of clarity, which I =
plan to do in the next 10 days or so.

Gr=C3=BC=C3=9Fe, Carsten


>=20
> Can you please provide an example that needs adding something new and =
cannot be solved as currently it stands?
>=20
> Cheers,
> Alexander
>=20
>=20
>=20
>=20
>=20
>=20
> On Thu, Mar 24, 2022 at 7:33 PM Michael Richardson =
<mcr+ietf@sandelman.ca> wrote:
>=20
> Today in discussion with ADs Rob Wilton and Francesca, it became clear =
that
> we really need to add a status entry to the SID file for allocations.
>=20
> The use case is where we have taken a YANG module to RFC, and have =
created a
> stable set of SID allocations for it.  Then, we revise the module. =
During
> that process of doing draft-foo-bar-rfcBIS, we might want to reset the =
SID
> numbering as we add/subtract/modify the extension proposals.
>=20
> So we need to know which parts of the SID file we can reset, and which =
parts
> we can not.
>=20
> This is a rudamentary pull request to do that.  I am uncertain if this =
YANG
> module parses as yet.  I haven't done any work on sid.py to implement =
this.
>=20
> Please let me know if I captured the proposal well enough.
> I don't know what to call the thing which is not stable.
> I feel that "unstable" does not quite capture the proper intent.
>=20
> https://github.com/core-wg/yang-cbor/pull/141
>=20
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -=3D IPv6 IoT consulting =3D-
>=20
>=20
>=20
> _______________________________________________
> core mailing list
> core@ietf.org
> https://www.ietf.org/mailman/listinfo/core
> _______________________________________________
> core mailing list
> core@ietf.org
> https://www.ietf.org/mailman/listinfo/core


From nobody Mon Mar 28 07:30:40 2022
Return-Path: <alexander@ackl.io>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BC443A1224 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 07:30:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level: 
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ackl-io.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J7TOtg3Nt-aV for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 07:30:34 -0700 (PDT)
Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 442943A121F for <core@ietf.org>; Mon, 28 Mar 2022 07:30:34 -0700 (PDT)
Received: by mail-io1-xd34.google.com with SMTP id g21so4051181iom.13 for <core@ietf.org>; Mon, 28 Mar 2022 07:30:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ackl-io.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=rqJWUoLQM43FBaCcW8Jw2x/f1/p3672HIFaDjdcman8=; b=eyNjMSkiycNbVMvE+J7JAwvITnZQQNzP96V8Fn/+jPqfW5ntvSA2XsWkGEoE7CM7Wz /JpS5QIVhY76uq42lM1VxAyGV7I6XHz1JBA6e6JkuCzlR0I/JmUdzkZTUFGd1fzqwUuM do/8+/3OPSutydFxlw7X54/P1FYfM5aTAkS8oUgsmwTkKQGPCZaFK3YDa14UN19Wgxee N8irb9viwREhbDyMP0zC+7CuLq7O3KZh/k9ctaVE9jW05wonI7G78Io4AmES4b8YwXxf EsDU+n6WAgSDtZqKaf/Mgw4wSkaA4ukwsN12NafF5a8CHIygjzDXFAmzW9Vmi5dFJWOM nERw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=rqJWUoLQM43FBaCcW8Jw2x/f1/p3672HIFaDjdcman8=; b=VRKps5X3WF48e5bdJgleCL2feNumZT+Jfi/HkmY0OS0AJHkEXQPFvFh2DA1bp4U5Rg xfRidvIzAAKpAVxLU8iHj66aEwVqn/C0hvvQGHOqueceVu7JH+ysBVKWoG7/nNjjPDlv 810lIoVYxaU6gXGoYga9x1Sv5MbKDa9Yaove3FFKg8I+/KSz9cKbrdjZ+rZa2trlYqj5 tdP2Y8uZGAwDi8yLikZCGBGZC4U3cBMtyvz4oA1a/fWH6gaFp0wJIw8K2YowOUCZLkHP cGUaSdi/IM2pqYf7nxMlT0FZsHw3VuKYE2/r0iIHKsNzRQtgTDp7kbxuymN8Of0xQ+M6 uljg==
X-Gm-Message-State: AOAM53181j3g9n9aKP7cn2CfPEd94NenV4RT5EBDJo60tDgx4cSN1czO lv+8TMMco1Uzh765l7jWtgGlaBaEOaS38L0DhjEFGnHowengjg==
X-Google-Smtp-Source: ABdhPJyXh4h2mU2KikjZGfg+sY4Od5iMsy19voMjs8OMMZHiN2MM1oepup95AsgvX3zxV0N4KAiqY7OuvHOj5B85AhI=
X-Received: by 2002:a05:6638:2401:b0:323:7234:5217 with SMTP id z1-20020a056638240100b0032372345217mr1151906jat.68.1648477831774; Mon, 28 Mar 2022 07:30:31 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org>
In-Reply-To: <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org>
From: Alexander Pelov <a@ackl.io>
Date: Mon, 28 Mar 2022 16:30:21 +0200
Message-ID: <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>,  "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000095576305db4827ae"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/rjpWGm4WJXQRCX6EBKUfkxFCVNo>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 14:30:39 -0000

--00000000000095576305db4827ae
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Carsten,

Thanks a lot for the clarifications! (Fully agree with the comments on
changing the semantics of an item!)

I was really looking at which problem we are trying to solve.
The "stable/unstable" is already getting to a solution (which may be the
best, but I am not sure what the problem is yet).

>From what I understand, the problem we are trying to solve is (and I am
paraphrasing to see if we are on the same page) to try to limit and have
one SID per YANG name. Something like a 'canonical SID' (which would make
for a bijective correspondence "YANG name" <-> "canonical SID", for YANG
modules that have SID allocations). Is there something else we are trying
to solve with the "stable/unstable" solution?

Cheers,
Alexander



On Mon, Mar 28, 2022 at 4:07 PM Carsten Bormann <cabo@tzi.org> wrote:

> On 2022-03-28, at 15:22, Alexander Pelov <a@ackl.io> wrote:
> >
> > Dear Michael, all,
> >
> > Thanks for getting the discussion to the mailing list! It is indeed
> exciting to see the IETF in-person meetings allowing for these discussion=
s
> to take place.
> >
> > I am not sure I understand the premise of your mail, and the discussion
> that follows touches upon several possibilities.
> > If you revise a module, you provide a new YANG file (with a different
> name/revision), and if you need to change the semantics of some item..
> well, you need a new SID.
>
> Hi Alex,
>
> we have to distinguish two cases here:
>
> (1) The YANG module was unstable (e.g., early I-D state).
> In this case, we can do what we want, including changing the (also
> unstable) SID-name mapping.
>
> (2) The YANG module was stable (e.g., we are working on a -bis for a
> published RFC).
> In this case, the SID-name mapping already has been marked stable.
> I also think it would be highly inadvisable to =E2=80=9Cchange the semant=
ics of
> some item=E2=80=9D even in the YANG module =E2=80=94 if you want to do th=
at, give it a new
> name, too, which allows you to allocate a new SID for the new name.
> But the old name will keep its stable SID.
>
> The reason we want to do this is:
> (1) to keep the SID-name mapping a function =E2=80=94 there never can be =
two YANG
> names associated with a single SID.
> (2) to keep the name-SID mapping =E2=80=9Cmostly" a function =E2=80=94 wh=
ile we cannot
> completely prevent several independent SID allocations for a YANG name, o=
ne
> objective is to have a single =E2=80=9Ccanonical=E2=80=9D SID mapping for=
 each YANG name,
> preferably with the same provenance that the YANG module itself has.
>
> Yes, this still has to be written up at this level of clarity, which I
> plan to do in the next 10 days or so.
>
> Gr=C3=BC=C3=9Fe, Carsten
>
>
> >
> > Can you please provide an example that needs adding something new and
> cannot be solved as currently it stands?
> >
> > Cheers,
> > Alexander
> >
> >
> >
> >
> >
> >
> > On Thu, Mar 24, 2022 at 7:33 PM Michael Richardson <
> mcr+ietf@sandelman.ca> wrote:
> >
> > Today in discussion with ADs Rob Wilton and Francesca, it became clear
> that
> > we really need to add a status entry to the SID file for allocations.
> >
> > The use case is where we have taken a YANG module to RFC, and have
> created a
> > stable set of SID allocations for it.  Then, we revise the module. Duri=
ng
> > that process of doing draft-foo-bar-rfcBIS, we might want to reset the
> SID
> > numbering as we add/subtract/modify the extension proposals.
> >
> > So we need to know which parts of the SID file we can reset, and which
> parts
> > we can not.
> >
> > This is a rudamentary pull request to do that.  I am uncertain if this
> YANG
> > module parses as yet.  I haven't done any work on sid.py to implement
> this.
> >
> > Please let me know if I captured the proposal well enough.
> > I don't know what to call the thing which is not stable.
> > I feel that "unstable" does not quite capture the proper intent.
> >
> > https://github.com/core-wg/yang-cbor/pull/141
> >
> > --
> > Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
> >  -=3D IPv6 IoT consulting =3D-
> >
> >
> >
> > _______________________________________________
> > core mailing list
> > core@ietf.org
> > https://www.ietf.org/mailman/listinfo/core
> > _______________________________________________
> > core mailing list
> > core@ietf.org
> > https://www.ietf.org/mailman/listinfo/core
>
>

--00000000000095576305db4827ae
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Hi=C2=A0Carsten,<div><br></div><div>Thank=
s a lot for the clarifications! (Fully agree with the comments on changing =
the semantics of an item!)</div><div><br></div><div>I was really looking at=
 which problem we are trying to solve.=C2=A0=C2=A0</div><div>The &quot;stab=
le/unstable&quot; is already getting to a solution=C2=A0(which may be the b=
est, but I am not sure what the problem is yet).=C2=A0</div><div><br></div>=
<div>From what=C2=A0I understand, the=C2=A0problem we are trying to solve i=
s (and I am paraphrasing to see if we are on the same page) to try to limit=
 and have one SID per YANG name. Something like a &#39;canonical SID&#39; (=
which would make for a bijective correspondence &quot;YANG name&quot; &lt;-=
&gt; &quot;canonical SID&quot;, for YANG modules that have SID allocations)=
. Is there something else we are trying to solve with the &quot;stable/unst=
able&quot; solution?</div><div><br></div><div>Cheers,</div><div>Alexander</=
div><div><br></div><div><br></div></div><br><div class=3D"gmail_quote"><div=
 dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at 4:07 PM Carsten B=
ormann &lt;<a href=3D"mailto:cabo@tzi.org">cabo@tzi.org</a>&gt; wrote:<br><=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex">On 2022-03-28, at 15=
:22, Alexander Pelov &lt;<a href=3D"mailto:a@ackl.io" target=3D"_blank">a@a=
ckl.io</a>&gt; wrote:<br>
&gt; <br>
&gt; Dear Michael, all,<br>
&gt; <br>
&gt; Thanks for getting the discussion to the mailing list! It is indeed ex=
citing to see the IETF in-person meetings allowing for these discussions to=
 take place.<br>
&gt; <br>
&gt; I am not sure I understand the premise of your mail, and the discussio=
n that follows touches upon several possibilities.<br>
&gt; If you revise a module, you provide a new YANG file (with a different =
name/revision), and if you need to change the semantics of some item.. well=
, you need a new SID.<br>
<br>
Hi Alex,<br>
<br>
we have to distinguish two cases here:<br>
<br>
(1) The YANG module was unstable (e.g., early I-D state).<br>
In this case, we can do what we want, including changing the (also unstable=
) SID-name mapping.<br>
<br>
(2) The YANG module was stable (e.g., we are working on a -bis for a publis=
hed RFC).<br>
In this case, the SID-name mapping already has been marked stable.<br>
I also think it would be highly inadvisable to =E2=80=9Cchange the semantic=
s of some item=E2=80=9D even in the YANG module =E2=80=94 if you want to do=
 that, give it a new name, too, which allows you to allocate a new SID for =
the new name.<br>
But the old name will keep its stable SID.<br>
<br>
The reason we want to do this is:<br>
(1) to keep the SID-name mapping a function =E2=80=94 there never can be tw=
o YANG names associated with a single SID.<br>
(2) to keep the name-SID mapping =E2=80=9Cmostly&quot; a function =E2=80=94=
 while we cannot completely prevent several independent SID allocations for=
 a YANG name, one objective is to have a single =E2=80=9Ccanonical=E2=80=9D=
 SID mapping for each YANG name, preferably with the same provenance that t=
he YANG module itself has.<br>
<br>
Yes, this still has to be written up at this level of clarity, which I plan=
 to do in the next 10 days or so.<br>
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
<br>
&gt; <br>
&gt; Can you please provide an example that needs adding something new and =
cannot be solved as currently it stands?<br>
&gt; <br>
&gt; Cheers,<br>
&gt; Alexander<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; On Thu, Mar 24, 2022 at 7:33 PM Michael Richardson &lt;<a href=3D"mail=
to:mcr%2Bietf@sandelman.ca" target=3D"_blank">mcr+ietf@sandelman.ca</a>&gt;=
 wrote:<br>
&gt; <br>
&gt; Today in discussion with ADs Rob Wilton and Francesca, it became clear=
 that<br>
&gt; we really need to add a status entry to the SID file for allocations.<=
br>
&gt; <br>
&gt; The use case is where we have taken a YANG module to RFC, and have cre=
ated a<br>
&gt; stable set of SID allocations for it.=C2=A0 Then, we revise the module=
. During<br>
&gt; that process of doing draft-foo-bar-rfcBIS, we might want to reset the=
 SID<br>
&gt; numbering as we add/subtract/modify the extension proposals.<br>
&gt; <br>
&gt; So we need to know which parts of the SID file we can reset, and which=
 parts<br>
&gt; we can not.<br>
&gt; <br>
&gt; This is a rudamentary pull request to do that.=C2=A0 I am uncertain if=
 this YANG<br>
&gt; module parses as yet.=C2=A0 I haven&#39;t done any work on sid.py to i=
mplement this.<br>
&gt; <br>
&gt; Please let me know if I captured the proposal well enough.<br>
&gt; I don&#39;t know what to call the thing which is not stable.<br>
&gt; I feel that &quot;unstable&quot; does not quite capture the proper int=
ent.<br>
&gt; <br>
&gt; <a href=3D"https://github.com/core-wg/yang-cbor/pull/141" rel=3D"noref=
errer" target=3D"_blank">https://github.com/core-wg/yang-cbor/pull/141</a><=
br>
&gt; <br>
&gt; --<br>
&gt; Michael Richardson &lt;<a href=3D"mailto:mcr%2BIETF@sandelman.ca" targ=
et=3D"_blank">mcr+IETF@sandelman.ca</a>&gt;, Sandelman Software Works<br>
&gt;=C2=A0 -=3D IPv6 IoT consulting =3D-<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; core mailing list<br>
&gt; <a href=3D"mailto:core@ietf.org" target=3D"_blank">core@ietf.org</a><b=
r>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferr=
er" target=3D"_blank">https://www.ietf.org/mailman/listinfo/core</a><br>
&gt; _______________________________________________<br>
&gt; core mailing list<br>
&gt; <a href=3D"mailto:core@ietf.org" target=3D"_blank">core@ietf.org</a><b=
r>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferr=
er" target=3D"_blank">https://www.ietf.org/mailman/listinfo/core</a><br>
<br>
</blockquote></div></div>

--00000000000095576305db4827ae--


From nobody Mon Mar 28 07:34:59 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 142933A15A4 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 07:34:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level: 
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ewgGtft2i5pM for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 07:34:47 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A1453A153C for <core@ietf.org>; Mon, 28 Mar 2022 07:34:46 -0700 (PDT)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KRwFc5XmQzDCj5; Mon, 28 Mar 2022 16:34:44 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com>
Date: Mon, 28 Mar 2022 16:34:44 +0200
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
X-Mao-Original-Outgoing-Id: 670170884.273596-fbefee19de2296598dbb79a6fd83c1b5
Content-Transfer-Encoding: quoted-printable
Message-Id: <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org>
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com>
To: Alexander Pelov <a@ackl.io>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/GWJZu6LQS6YbA3OFI8v5KDuiQns>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 14:34:58 -0000

On 2022-03-28, at 16:30, Alexander Pelov <a@ackl.io> wrote:
>=20
> =46rom what I understand, the problem we are trying to solve is (and I =
am paraphrasing to see if we are on the same page) to try to limit and =
have one SID per YANG name. Something like a 'canonical SID' (which =
would make for a bijective correspondence "YANG name" <-> "canonical =
SID", for YANG modules that have SID allocations).

Indeed.

> Is there something else we are trying to solve with the =
"stable/unstable" solution?

The main observation is that these SID files may get wings and may turn =
up in places where they were not meant to be.  Being able to identify =
that some of the SID allocations in a SID file are still unstable may =
help in avoiding these SIDs turning up in production.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Mon Mar 28 14:04:07 2022
Return-Path: <alexander@ackl.io>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 350A73A1925 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:04:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level: 
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ackl-io.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J0ZKKhna_pBx for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:04:00 -0700 (PDT)
Received: from mail-io1-xd33.google.com (mail-io1-xd33.google.com [IPv6:2607:f8b0:4864:20::d33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DD093A1935 for <core@ietf.org>; Mon, 28 Mar 2022 14:04:00 -0700 (PDT)
Received: by mail-io1-xd33.google.com with SMTP id z6so18725407iot.0 for <core@ietf.org>; Mon, 28 Mar 2022 14:04:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ackl-io.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fHsf3Z2FPPNevbGv/BhnZTYwagArPqxdB1bYHkI40m8=; b=cP+w22WHjmt4fFUmot4uJEyfTyyJF4BoHIvMHctuzJYHSdHJBQwUm04P0PJRMIcwX4 Dp0R1jCOYqhTvSX7oCfVJh7j1fd7/93OTfaXIVErcK1jUcjeq1eBxljc99d7+JCNgZuO xQLPe+o6s0I0aziPHE+agNmHoiaUElSlFY/WTwE7dSl51Hls1DtwThLkFVEfLWhgaz+n 4GcePfMlpckgzbh4jNyJzRVSD8anGs1mGBLqBl0WfR6u9ogjLblPhxq+uUpS7C4GKVUD ZPFz6j4vi9pYFcGpgnpVLhsAyLFoA9gDGotujDBRu+eVjLzF6kFFoWMJRMgZLry6gfdx MrSw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fHsf3Z2FPPNevbGv/BhnZTYwagArPqxdB1bYHkI40m8=; b=LQB02WjcsDDLnEZWRDXF0e9r7XPNclJStVcElp7cpHHkI1r6mtI5dD/+gES+woxjno ey58VrAu1qCeDxKaPGk+J22DuFn7oIIoQaoXe15KwF0fICVIlN9MEi+cltqMm9+hEIMj TtOSYY0NYEXeUrljD+pCuyXUysQnXL6bKkmc5+iR0+EQ3p1iejm3JuSq0wWJJKQbPFHD LeVpOMV4TFv6y6J1UMFSrzz8MbfuODc0sSDKfIs/KjwCux+94tM0AM+z9XdUnX0dEogC JvQDLyIJttW6iElcCcBe70x95UBpAsAksErXjfFSi7wGxFxxMc48DhQL6NqBEZa8oOB2 KbsA==
X-Gm-Message-State: AOAM531oqDE14SnN2nXpemie3W8cMSvCKACe47dAFT11Ef7tb0XWvJQa 8CBY/jKPuJud3VVkSDIzHIUwQdrKTH0tYZ08x00X9g==
X-Google-Smtp-Source: ABdhPJxtg7w0OaffA4Xpt7O/6uNTNnK3Qy2Gr48gAm5oSqF5b7a1jh+aF5CDQ0NPELvR/W3vwz5P87eAdltUQVJr9Gg=
X-Received: by 2002:a05:6602:341a:b0:649:e793:ba9b with SMTP id n26-20020a056602341a00b00649e793ba9bmr7254853ioz.4.1648501439118; Mon, 28 Mar 2022 14:03:59 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org>
In-Reply-To: <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org>
From: Alexander Pelov <a@ackl.io>
Date: Mon, 28 Mar 2022 23:03:48 +0200
Message-ID: <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>,  "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b0d89805db4da655"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/99A9wLXL_S95JWIV_wI9ZoJpjjM>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 21:04:06 -0000

--000000000000b0d89805db4da655
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi again,

Thanks for the clarifications!

On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann <cabo@tzi.org> wrote:

> On 2022-03-28, at 16:30, Alexander Pelov <a@ackl.io> wrote:
> >
> > From what I understand, the problem we are trying to solve is (and I am
> paraphrasing to see if we are on the same page) to try to limit and have
> one SID per YANG name. Something like a 'canonical SID' (which would make
> for a bijective correspondence "YANG name" <-> "canonical SID", for YANG
> modules that have SID allocations).
>
> Indeed.


It seems to me that the "canonical SID" property is nice to have (but not a
must have, because it cannot be really guaranteed).

The SID files winding up somewhere are the real pain here -> which is
actually simpler to solve if you consider that the definitive allocation is
an atomic operation.

Say, you have RFC123456.yang, with allocation of SIDs described in
RFC123456.SID.
Now, you have draft-RFC123456bis.yang -> until this one becomes an RFC, the
corresponding SID file can be considered in its entirety as provisional
allocation / temporary / draft / unstable.

In that sense, the stable/unstable (or other term for the same meaning)
works on the file level and is in direct connection to the YANG file.


> Is there something else we are trying to solve with the "stable/unstable"
> solution?


> The main observation is that these SID files may get wings and may turn u=
p
> in places where they were not meant to be.  Being able to identify that
> some of the SID allocations in a SID file are still unstable may help in
> avoiding these SIDs turning up in production.
>


During development, to know which SIDs you can regenerate freely and which
you CANNOT because they have been allocated in a "parent" module, you only
need the full history of the YANG / SID allocation. This you need in any
case to do the check, and the per-range stable/unstable option can be seen
as a way to ease the life of a tool developer, but cannot be used to
actually be trusted.

The example is the following:
The developers of draft-RFC123456bis.yang have access to both
RFC123456.yang and RFC123456.SID. When you allocate SIDs for
draft-RFC123456bis.yang, it is a very straightforward operation to make the
diff between what's already in RFC123456.SID and what needs to be allocated
and in what manner. As a matter of fact, "pyang sid" already does this!


Does that make sense? Can we simply have a per-SID-file "draft" property?

Cheers,
Alexander


>
> Gr=C3=BC=C3=9Fe, Carsten
>
>

--000000000000b0d89805db4da655
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi again,</div><div><br></div><div>Thanks for the cla=
rifications!</div><div><br></div><div class=3D"gmail_quote"><div dir=3D"ltr=
" class=3D"gmail_attr">On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann &lt;=
<a href=3D"mailto:cabo@tzi.org">cabo@tzi.org</a>&gt; wrote:<br></div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">On 2022-03-28, at 16:30, Alexan=
der Pelov &lt;<a href=3D"mailto:a@ackl.io" target=3D"_blank">a@ackl.io</a>&=
gt; wrote:<br>
&gt; <br>
&gt; From what I understand, the problem we are trying to solve is (and I a=
m paraphrasing to see if we are on the same page) to try to limit and have =
one SID per YANG name. Something like a &#39;canonical SID&#39; (which woul=
d make for a bijective correspondence &quot;YANG name&quot; &lt;-&gt; &quot=
;canonical SID&quot;, for YANG modules that have SID allocations).<br>
<br>
Indeed.=C2=A0</blockquote><div><br></div><div><div>It seems to me that the =
&quot;canonical SID&quot; property is nice to have (but not a must have, be=
cause it cannot be really guaranteed).</div><div><br></div><div>The SID fil=
es winding up somewhere are the real pain here -&gt; which is actually simp=
ler to solve if you consider that the definitive allocation is an atomic op=
eration.=C2=A0</div><div><br></div><div>Say, you have RFC123456.yang, with =
allocation of SIDs described in RFC123456.SID.</div><div>Now, you have draf=
t-RFC123456bis.yang=C2=A0-&gt; until this one becomes an RFC, the correspon=
ding SID file can be considered in its entirety as provisional allocation /=
 temporary / draft / unstable.=C2=A0</div><div><br></div><div>In that sense=
, the stable/unstable (or other term for the same meaning) works on the fil=
e level and is in direct connection to the YANG file.</div></div><div>=C2=
=A0</div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt; Is there something else we are trying to solve with the &quot;stable/u=
nstable&quot; solution?=C2=A0</blockquote><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">
<br>
The main observation is that these SID files may get wings and may turn up =
in places where they were not meant to be.=C2=A0 Being able to identify tha=
t some of the SID allocations in a SID file are still unstable may help in =
avoiding these SIDs turning up in production.<br></blockquote><div><br></di=
v><div><br></div><div><div>During development, to know which SIDs you can r=
egenerate freely and which you CANNOT because they have been allocated in a=
 &quot;parent&quot; module, you only need the full history of the YANG / SI=
D allocation. This you need in any case to do the check, and the per-range =
stable/unstable option can be seen as a way to ease the life of a tool deve=
loper, but cannot be used to actually be trusted.</div><div><br></div><div>=
The example is the following:</div><div>The developers of draft-RFC123456bi=
s.yang have access to both RFC123456.yang=C2=A0and=C2=A0RFC123456.SID. When=
 you allocate SIDs for draft-RFC123456bis.yang, it is a very straightforwar=
d=C2=A0operation=C2=A0to make the diff between what&#39;s already in RFC123=
456.SID and what needs to be allocated and in what manner. As a matter of f=
act, &quot;pyang sid&quot; already does this!</div></div><div><br></div><di=
v><br></div><div>Does that make sense? Can we simply have a per-SID-file &q=
uot;draft&quot; property?=C2=A0</div><div><br></div><div>Cheers,</div><div>=
Alexander</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"=
margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-lef=
t:1ex">
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
</blockquote></div></div>

--000000000000b0d89805db4da655--


From nobody Mon Mar 28 14:20:22 2022
Return-Path: <mcr@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9AE663A1973 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:20:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level: 
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bX2GNipGOtP9 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:20:13 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [176.58.120.209]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9FEA3A196E for <core@ietf.org>; Mon, 28 Mar 2022 14:20:13 -0700 (PDT)
Received: from dooku.sandelman.ca (ipv6.dooku.sandelman.ca [IPv6:2607:f0b0:f:6::1]) by relay.sandelman.ca (Postfix) with ESMTPS id 26D6E1F45E; Mon, 28 Mar 2022 21:20:11 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id C18AF1A0215; Mon, 28 Mar 2022 23:20:02 +0200 (CEST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Alexander Pelov <a@ackl.io>
cc: "core\@ietf.org WG \(core\@ietf.org\)" <core@ietf.org>
In-reply-to: <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com>
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com>
Comments: In-reply-to Alexander Pelov <a@ackl.io> message dated "Mon, 28 Mar 2022 15:22:33 +0200."
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Mon, 28 Mar 2022 17:20:02 -0400
Message-ID: <107379.1648502402@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/H1AenELscEeIQ5ItraBBBCQntLI>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 21:20:20 -0000

--=-=-=
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable


Alexander Pelov <a@ackl.io> wrote:
    > I am not sure I understand the premise of your mail, and the discussi=
on
    > that follows touches upon several possibilities.  If you revise a
    > module, you provide a new YANG file (with a different name/revision),
    > and if you need to change the semantics of some item..  well, you need
    > a new SID.

Yes.  That's what it looks like from the outside.

But, inside the sausage factory of the IETF, during the process we create i=
nternet-drafts.
When those internet drafts are revisions to published RFCs, they will conta=
in
a mix of SID allocations which are published (and thus immutable), and some
which are new, and which are mutable during the WG deliberations.

We need to keep track of which is which so that we can:
  1) renumber/revise the mutable allocations
  2) make sure never to change the immutable ones

    > Can you please provide an example that needs adding something new and
    > cannot be solved as currently it stands?

It's all solvable as is, but people have to pay more attention than may be
realistic outside of our design team.
The changes we discussed would just make the tooling better able to help the
user.  We could add it later if we can't get consensus on this.

=2D-=20
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -=3D IPv6 IoT consulting =3D-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=OENq
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Mon Mar 28 14:22:31 2022
Return-Path: <mcr@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9E3B3A1973 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:22:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fdgt4J-EYFkI for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:22:24 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [176.58.120.209]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2360B3A196E for <core@ietf.org>; Mon, 28 Mar 2022 14:22:24 -0700 (PDT)
Received: from dooku.sandelman.ca (ipv6.dooku.sandelman.ca [IPv6:2607:f0b0:f:6::1]) by relay.sandelman.ca (Postfix) with ESMTPS id 7C8F11F45E; Mon, 28 Mar 2022 21:22:22 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 849E71A0215; Mon, 28 Mar 2022 23:22:20 +0200 (CEST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Carsten Bormann <cabo@tzi.org>, Alexander Pelov <a@ackl.io>, "core\@ietf.org WG \(core\@ietf.org\)" <core@ietf.org>
In-reply-to: <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org>
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org>
Comments: In-reply-to Carsten Bormann <cabo@tzi.org> message dated "Mon, 28 Mar 2022 16:34:44 +0200."
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Mon, 28 Mar 2022 17:22:20 -0400
Message-ID: <107474.1648502540@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/veO8AM9UH4sE-uvxTWtbAfJQ9FE>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 21:22:29 -0000

--=-=-=
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable


Carsten Bormann <cabo@tzi.org> wrote:
    >> Is there something else we are trying to solve with the
    >> "stable/unstable" solution?

    > The main observation is that these SID files may get wings and may tu=
rn
    > up in places where they were not meant to be.  Being able to identify
    > that some of the SID allocations in a SID file are still unstable may
    > help in avoiding these SIDs turning up in production.

That's something I hadn't thought about.
It's entirely a good thing that in development SID files can be identified.
So +10.

=2D-=20
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -=3D IPv6 IoT consulting =3D-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=72mV
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Mon Mar 28 14:54:52 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7336A3A1985 for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:54:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MtN0lsNDgDkk for <core@ietfa.amsl.com>; Mon, 28 Mar 2022 14:54:41 -0700 (PDT)
Received: from mail-yb1-xb35.google.com (mail-yb1-xb35.google.com [IPv6:2607:f8b0:4864:20::b35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47CD53A1597 for <core@ietf.org>; Mon, 28 Mar 2022 14:54:41 -0700 (PDT)
Received: by mail-yb1-xb35.google.com with SMTP id y38so25795409ybi.8 for <core@ietf.org>; Mon, 28 Mar 2022 14:54:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Tf8zrQ7vL6fd/AwyqCI9WnPN4ii9vKWjGKE6TbIY0jo=; b=7Ft/PAimelVlescsRvWSec4xRC9ZlHJLjxwtZ3C/5ekuVfwrIkj9sm5kTrQUnYrTcp KHV2nDny6N0CastEIfeEHFgtmQyn71n7McFu5OnyyYKVM+bjI2jSiJkvntmhP83GNbOc EOdoZ17ahkU69hlmSepL1ChfepvxQe3QUo4Uln4mwa2/MmVlAzRCOkD8mFbNL3t3K5d2 ggcysvfmhLy/r892MEZjf5wlNCGgEPxL/msnYmICzWo7LyRe3IfY9NzsNjRB05w0LWA/ ZdgtRWsxwg0wFriNBRWD4ahxicbKKi1xx/QOJoXSVNaMCJV0INXGomzyQhVMT/jsR+XD H/wA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Tf8zrQ7vL6fd/AwyqCI9WnPN4ii9vKWjGKE6TbIY0jo=; b=o/A3BEJeCOpWADvaiiSNQsgpMqlZ12weU77+3M7rXHdYOH04CTn+KGONW4kx4IAfWw R2RLlEoqjGKqpixAzFCazXVg6JJbtbuituFc/IG02WM6WZlh8W+IS2S0Q03y5fGyawP+ eQ+Dko7jVH+8UlY6LwvkQ/9FORPZUvNW4+9ZBFbNByfnK2psbjq7pBUsKqiPAgdFCEJX t0yfCTNOq+xXzct57WJqNgvcW52TRQlMa1MoslsiWn4PKdxWbD2auvxUpLSdJEv8UGIh 0jygNQNsZa3P7jbAN5F+zjz8fzm1s/rZTidEejhw+Hi8ZEm3mM88ao3HO4qji3s5S09u rQpA==
X-Gm-Message-State: AOAM532gBJnDpQYB1ii60R5pRhDyj3g80sJNNZwP/Si2wYHHexQakJ24 kdxQO6sbOjcRuRghTQovpluCBxlsF/Ij1sVkWXnJC/dz5KcUZA==
X-Google-Smtp-Source: ABdhPJxvUJz3hWtKGnwiN/DDL2TXG5ojs0guqT3TLdP9jhBztcBgKVnJ6G3CSXgXJCPLxvGH+dZ/4wqHhlTYgXVIsyE=
X-Received: by 2002:a05:6902:20e:b0:627:f1cb:a9ee with SMTP id j14-20020a056902020e00b00627f1cba9eemr24175690ybs.129.1648504480057; Mon, 28 Mar 2022 14:54:40 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org> <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com>
In-Reply-To: <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Mon, 28 Mar 2022 14:54:27 -0700
Message-ID: <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com>
To: Alexander Pelov <a@ackl.io>
Cc: Carsten Bormann <cabo@tzi.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f1e2a705db4e5b8c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/zXLN-peYy7s8DoYBDbQdMLBO0-A>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 21:54:48 -0000

--000000000000f1e2a705db4e5b8c
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Mon, Mar 28, 2022 at 2:04 PM Alexander Pelov <a@ackl.io> wrote:

> Hi again,
>
> Thanks for the clarifications!
>
> On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann <cabo@tzi.org> wrote:
>
>> On 2022-03-28, at 16:30, Alexander Pelov <a@ackl.io> wrote:
>> >
>> > From what I understand, the problem we are trying to solve is (and I a=
m
>> paraphrasing to see if we are on the same page) to try to limit and have
>> one SID per YANG name. Something like a 'canonical SID' (which would mak=
e
>> for a bijective correspondence "YANG name" <-> "canonical SID", for YANG
>> modules that have SID allocations).
>>
>> Indeed.
>
>
> It seems to me that the "canonical SID" property is nice to have (but not
> a must have, because it cannot be really guaranteed).
>
> The SID files winding up somewhere are the real pain here -> which is
> actually simpler to solve if you consider that the definitive allocation =
is
> an atomic operation.
>
> Say, you have RFC123456.yang, with allocation of SIDs described in
> RFC123456.SID.
> Now, you have draft-RFC123456bis.yang -> until this one becomes an RFC,
> the corresponding SID file can be considered in its entirety as provision=
al
> allocation / temporary / draft / unstable.
>
> In that sense, the stable/unstable (or other term for the same meaning)
> works on the file level and is in direct connection to the YANG file.
>
>
>
Agreed



> > Is there something else we are trying to solve with the
>> "stable/unstable" solution?
>
>
>> The main observation is that these SID files may get wings and may turn
>> up in places where they were not meant to be.  Being able to identify th=
at
>> some of the SID allocations in a SID file are still unstable may help in
>> avoiding these SIDs turning up in production.
>>
>
>
> During development, to know which SIDs you can regenerate freely and whic=
h
> you CANNOT because they have been allocated in a "parent" module, you onl=
y
> need the full history of the YANG / SID allocation. This you need in any
> case to do the check, and the per-range stable/unstable option can be see=
n
> as a way to ease the life of a tool developer, but cannot be used to
> actually be trusted.
>
> The example is the following:
> The developers of draft-RFC123456bis.yang have access to both
> RFC123456.yang and RFC123456.SID. When you allocate SIDs for
> draft-RFC123456bis.yang, it is a very straightforward operation to make t=
he
> diff between what's already in RFC123456.SID and what needs to be allocat=
ed
> and in what manner. As a matter of fact, "pyang sid" already does this!
>
>
> Does that make sense? Can we simply have a per-SID-file "draft" property?
>

Almost.

It would be set if the SID file also records the "last-sid-file" revision
somehow.
The pyang tool requires this for the --sid-update-file parameter.

A WG does not need to renumber RFC123456bis every time a new bis draft is
released.
The RFC123456 SIDs MUST be preserved in each bis release, but none of the
new "draft" SIDs need to be preserved.

If the SID file recorded the previous version somehow then ANY SID
generation
tool can create the correct file, but without it, not even pyang can do it.

E.g.

RFC123456 published             2021-01-01             draft=3Dfalse
RFC123456bis published        2022-01-01  (-00)    draft=3Dtrue
RFC123456bis published        2022-02-01  (-01)    draft=3Dtrue
RFC123456bis published        2022-03-01  (-02)    draft=3Dtrue

The bis -00 MUST use RFC123456 as the --sid-update-file.
But -01 and -02 bis releases can choose to be a delta from any previous I-D
or
start over with a delta from the RFC version.

If a per-SID flag is used, the ability to go back to a previous SID file
revision as the base is lost.
Once the SID is marked stable in a new SID file, the tool does not know if
it was marked
stable in the RFC or later, so it can never change it back to unstable.

The ability for any tool to verify that a proper delta was generated is
needed and currently
does not exist. The [last-sid-file, current-YANG-file] are needed for this
purpose.




> Cheers,
> Alexander
>


Andy


>
>
>>
>> Gr=C3=BC=C3=9Fe, Carsten
>>
>> _______________________________________________
> core mailing list
> core@ietf.org
> https://www.ietf.org/mailman/listinfo/core
>

--000000000000f1e2a705db4e5b8c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at 2:04 PM Alexa=
nder Pelov &lt;<a href=3D"mailto:a@ackl.io">a@ackl.io</a>&gt; wrote:<br></d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div>=
Hi again,</div><div><br></div><div>Thanks for the clarifications!</div><div=
><br></div><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr"=
>On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann &lt;<a href=3D"mailto:cabo=
@tzi.org" target=3D"_blank">cabo@tzi.org</a>&gt; wrote:<br></div><blockquot=
e class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px s=
olid rgb(204,204,204);padding-left:1ex">On 2022-03-28, at 16:30, Alexander =
Pelov &lt;<a href=3D"mailto:a@ackl.io" target=3D"_blank">a@ackl.io</a>&gt; =
wrote:<br>
&gt; <br>
&gt; From what I understand, the problem we are trying to solve is (and I a=
m paraphrasing to see if we are on the same page) to try to limit and have =
one SID per YANG name. Something like a &#39;canonical SID&#39; (which woul=
d make for a bijective correspondence &quot;YANG name&quot; &lt;-&gt; &quot=
;canonical SID&quot;, for YANG modules that have SID allocations).<br>
<br>
Indeed.=C2=A0</blockquote><div><br></div><div><div>It seems to me that the =
&quot;canonical SID&quot; property is nice to have (but not a must have, be=
cause it cannot be really guaranteed).</div><div><br></div><div>The SID fil=
es winding up somewhere are the real pain here -&gt; which is actually simp=
ler to solve if you consider that the definitive allocation is an atomic op=
eration.=C2=A0</div><div><br></div><div>Say, you have RFC123456.yang, with =
allocation of SIDs described in RFC123456.SID.</div><div>Now, you have draf=
t-RFC123456bis.yang=C2=A0-&gt; until this one becomes an RFC, the correspon=
ding SID file can be considered in its entirety as provisional allocation /=
 temporary / draft / unstable.=C2=A0</div><div><br></div><div>In that sense=
, the stable/unstable (or other term for the same meaning) works on the fil=
e level and is in direct connection to the YANG file.</div></div><div>=C2=
=A0</div><div><br></div></div></div></blockquote><div><br></div><div>Agreed=
</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
&gt; Is there something else we are trying to solve with the &quot;stable/u=
nstable&quot; solution?=C2=A0</blockquote><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">
<br>
The main observation is that these SID files may get wings and may turn up =
in places where they were not meant to be.=C2=A0 Being able to identify tha=
t some of the SID allocations in a SID file are still unstable may help in =
avoiding these SIDs turning up in production.<br></blockquote><div><br></di=
v><div><br></div><div><div>During development, to know which SIDs you can r=
egenerate freely and which you CANNOT because they have been allocated in a=
 &quot;parent&quot; module, you only need the full history of the YANG / SI=
D allocation. This you need in any case to do the check, and the per-range =
stable/unstable option can be seen as a way to ease the life of a tool deve=
loper, but cannot be used to actually be trusted.</div><div><br></div><div>=
The example is the following:</div><div>The developers of draft-RFC123456bi=
s.yang have access to both RFC123456.yang=C2=A0and=C2=A0RFC123456.SID. When=
 you allocate SIDs for draft-RFC123456bis.yang, it is a very straightforwar=
d=C2=A0operation=C2=A0to make the diff between what&#39;s already in RFC123=
456.SID and what needs to be allocated and in what manner. As a matter of f=
act, &quot;pyang sid&quot; already does this!</div></div><div><br></div><di=
v><br></div><div>Does that make sense? Can we simply have a per-SID-file &q=
uot;draft&quot; property?=C2=A0</div></div></div></blockquote><div><br></di=
v><div>Almost.</div><div><br></div><div>It would be set if the SID file als=
o records the &quot;last-sid-file&quot; revision somehow.</div><div>The pya=
ng tool requires this for the --sid-update-file parameter.</div><div><br></=
div><div>A WG does not need to renumber RFC123456bis every time a new bis d=
raft is released.</div><div>The RFC123456 SIDs MUST be preserved in each bi=
s release, but none of the new &quot;draft&quot; SIDs need to be preserved.=
</div><div><br></div><div>If the SID file recorded the previous version som=
ehow then ANY SID generation</div><div>tool can create the correct file, bu=
t without it, not even pyang can do it.</div><div><br></div><div>E.g.</div>=
<div><br></div><div>RFC123456 published=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A02021-01-01=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draf=
t=3Dfalse</div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-=
01-01=C2=A0 (-00)=C2=A0 =C2=A0 draft=3Dtrue</div><div>RFC123456bis publishe=
d=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-02-01=C2=A0 (-01)=C2=A0 =C2=A0 draft=3Dtr=
ue<br></div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-03-=
01=C2=A0 (-02)=C2=A0 =C2=A0 draft=3Dtrue<br></div><div><br></div><div>The b=
is -00 MUST use RFC123456 as the --sid-update-file.</div><div>But -01 and -=
02 bis releases can choose to be a delta from any previous I-D or=C2=A0</di=
v><div>start over with a delta from the RFC version.</div><div><br></div><d=
iv>If a per-SID flag is used, the ability to go back to a previous SID file=
 revision as the base is lost.</div><div>Once the SID is marked stable in a=
 new SID file, the tool does not know if it was marked</div><div>stable in =
the RFC or later, so it can never change it back to unstable.</div><div><br=
></div><div>The ability for any tool to verify that a proper delta was gene=
rated is needed and currently</div><div>does not exist. The [last-sid-file,=
 current-YANG-file] are needed for this purpose.</div><div><br></div><div><=
br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><=
div dir=3D"ltr"><div class=3D"gmail_quote"><div><br></div><div>Cheers,</div=
><div>Alexander</div></div></div></blockquote><div><br></div><div><br></div=
><div>Andy</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
</blockquote></div></div>
_______________________________________________<br>
core mailing list<br>
<a href=3D"mailto:core@ietf.org" target=3D"_blank">core@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/core</a><br>
</blockquote></div></div>

--000000000000f1e2a705db4e5b8c--


From nobody Tue Mar 29 06:25:02 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB7A03A18B6 for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 06:24:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UTmtgYpXV-NN for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 06:24:56 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA3FE3A09A1 for <core@ietf.org>; Tue, 29 Mar 2022 06:24:54 -0700 (PDT)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KSVfW5sNQzDCcc; Tue, 29 Mar 2022 15:24:51 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
Date: Tue, 29 Mar 2022 15:24:51 +0200
X-Mao-Original-Outgoing-Id: 670253091.401177-d283f1fe65ae4a68b936510dcb17a3bb
Content-Transfer-Encoding: quoted-printable
Message-Id: <2A7617A8-A8A5-4A0B-9131-129EFBD8A0ED@tzi.org>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/DkkURqNcvYG0i9rl_Amiu0GCrME>
Subject: [core] YANG-CBOR: documenting the SID management objectives
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 13:25:00 -0000

At IETF113, we had a side discussion about what would be needed to move =
the reference from yang-cbor to core-sid to informative.  We came up =
with documenting the SID management objectives in yang-cbor, independent =
of core-sid.

Here is a pull request:

https://github.com/core-wg/yang-cbor/pull/142

Comments welcome.
As far as I can see, this is the last item still in the way of =
publishing yang-cbor.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Tue Mar 29 13:20:44 2022
Return-Path: <alexander@ackl.io>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 012503A1BB3 for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 13:20:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ackl-io.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IthMeRNQizY5 for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 13:20:37 -0700 (PDT)
Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCA083A1BC4 for <core@ietf.org>; Tue, 29 Mar 2022 13:20:37 -0700 (PDT)
Received: by mail-io1-xd34.google.com with SMTP id x4so22403747iop.7 for <core@ietf.org>; Tue, 29 Mar 2022 13:20:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ackl-io.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fblh6N9rsmPDMkow2SgrSRUGKyIBLfSxB7Yy5b6vTDc=; b=zsWfqTtXKbYlxr+WcjMw50CQIBNGRoMWmSsGQRzRJzXwVc4wi5pSyPWfeQuuDXi7Ck QR3b9aPbA56W3ljrQGT1ABtr2vEvXld2GBoUHgUQ5qy+qiszu6JWuKdupqnnamZ/Zq3T HyLgyBm6E0u6P6ZjdQQ27diYyKDr9dGRBHzzpY+4VHQkUqL0zxT9YZYstUt/Nga2WUQn T9DdJNjOFHs7aVIGglYFtbZQoWtKnBh7/ilydPg3t420wS+yflT2bKONebVsmxkP+Oqk M9dJcSEgGTBoou8cJVgHS5u++qlALuHPjBlF8mNdTAlT5fbArdbUKm6u1rHVAQ9GF2kP 3naw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fblh6N9rsmPDMkow2SgrSRUGKyIBLfSxB7Yy5b6vTDc=; b=k9hGk35pEHXVPxq35WVIqhkmlqhThgprrtglUNMJd2egXn2qtjCewMiklCVzkrKw+D hudpT0yApbuY8ohlm3NwgGKNepZAAGphDwHw3vl5UM1nMeGreBw16aww/BM9LX5jHhnN ZUkI/Jt1rCeKIa7zX0XAG3HCe1+k+MHzlYHe+mIYeFsWqJA3GZd/6mxtn9bTL4F3cLdW l6aprDE+pH3nxMm51cmgf+qyPhFQFqdCSNJXnRlfnxTMo46qKSt3dU2YBL0LyTlhyIYr 7ytvENr+NTpHe28oQxf5+QIm3DNg5VPUKC0S9wSTiKDjb8Jj4UEa3hAG7wAB+6iK/wT4 j7Iw==
X-Gm-Message-State: AOAM531Wl4E7NJ1+9NZwnrz478eOodzgQRqpxEwGLVqzY1RdZk2Te+1I /o70Yre2NdyANtr8VxNboTH+MliwnkeSMJIKNjCJ6Q==
X-Google-Smtp-Source: ABdhPJwh11+JzG3kzlNnrOQkgnZj4PE16tj76+ElFylL9c+Oy/Dz3AUTPQnbvlqeZ8zeZGegauJNZ4zkfGePdZlvPp0=
X-Received: by 2002:a02:cb98:0:b0:323:64bb:7c57 with SMTP id u24-20020a02cb98000000b0032364bb7c57mr7940349jap.126.1648585236505; Tue, 29 Mar 2022 13:20:36 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org> <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com> <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com>
In-Reply-To: <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com>
From: Alexander Pelov <a@ackl.io>
Date: Tue, 29 Mar 2022 22:20:25 +0200
Message-ID: <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com>
To: Andy Bierman <andy@yumaworks.com>
Cc: Carsten Bormann <cabo@tzi.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000677be805db612938"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/UwtCru06Y14i8IlEJKLyYDoqFjE>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 20:20:43 -0000

--000000000000677be805db612938
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Andy, Michael, all,

Thanks for the examples !

Once again, to see if we are on the same page, the problem seems to come
from needing two SID files:
RFC123456 and the last work version of RFC123456bis-02 (because of you have
both you can infer the immutable from RFC123456 and the provisionnaly
allocated for the RFC123456bis-01).

If this is the case, isn't it simply solved by saving a RFC123456bis-01.sid
and then using pyang --sid-update-file RFC123456bis-01.sid to generate the
RFC123456bis-02.sid

And if you want to have RFC123456bis-03.sid renumber from the 01 version
you simply do it based on RFC123456bis-01.sid.

It's just that I get the feeling we are trying to do version control here
and if this is the case I would really prefer we stick to git and some best
practices.

Cheers,
Alexander



Le lun. 28 mars 2022, 23:54, Andy Bierman <andy@yumaworks.com> a =C3=A9crit=
 :

>
>
> On Mon, Mar 28, 2022 at 2:04 PM Alexander Pelov <a@ackl.io> wrote:
>
>> Hi again,
>>
>> Thanks for the clarifications!
>>
>> On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann <cabo@tzi.org> wrote:
>>
>>> On 2022-03-28, at 16:30, Alexander Pelov <a@ackl.io> wrote:
>>> >
>>> > From what I understand, the problem we are trying to solve is (and I
>>> am paraphrasing to see if we are on the same page) to try to limit and =
have
>>> one SID per YANG name. Something like a 'canonical SID' (which would ma=
ke
>>> for a bijective correspondence "YANG name" <-> "canonical SID", for YAN=
G
>>> modules that have SID allocations).
>>>
>>> Indeed.
>>
>>
>> It seems to me that the "canonical SID" property is nice to have (but no=
t
>> a must have, because it cannot be really guaranteed).
>>
>> The SID files winding up somewhere are the real pain here -> which is
>> actually simpler to solve if you consider that the definitive allocation=
 is
>> an atomic operation.
>>
>> Say, you have RFC123456.yang, with allocation of SIDs described in
>> RFC123456.SID.
>> Now, you have draft-RFC123456bis.yang -> until this one becomes an RFC,
>> the corresponding SID file can be considered in its entirety as provisio=
nal
>> allocation / temporary / draft / unstable.
>>
>> In that sense, the stable/unstable (or other term for the same meaning)
>> works on the file level and is in direct connection to the YANG file.
>>
>>
>>
> Agreed
>
>
>
>> > Is there something else we are trying to solve with the
>>> "stable/unstable" solution?
>>
>>
>>> The main observation is that these SID files may get wings and may turn
>>> up in places where they were not meant to be.  Being able to identify t=
hat
>>> some of the SID allocations in a SID file are still unstable may help i=
n
>>> avoiding these SIDs turning up in production.
>>>
>>
>>
>> During development, to know which SIDs you can regenerate freely and
>> which you CANNOT because they have been allocated in a "parent" module, =
you
>> only need the full history of the YANG / SID allocation. This you need i=
n
>> any case to do the check, and the per-range stable/unstable option can b=
e
>> seen as a way to ease the life of a tool developer, but cannot be used t=
o
>> actually be trusted.
>>
>> The example is the following:
>> The developers of draft-RFC123456bis.yang have access to both
>> RFC123456.yang and RFC123456.SID. When you allocate SIDs for
>> draft-RFC123456bis.yang, it is a very straightforward operation to make =
the
>> diff between what's already in RFC123456.SID and what needs to be alloca=
ted
>> and in what manner. As a matter of fact, "pyang sid" already does this!
>>
>>
>> Does that make sense? Can we simply have a per-SID-file "draft" property=
?
>>
>
> Almost.
>
> It would be set if the SID file also records the "last-sid-file" revision
> somehow.
> The pyang tool requires this for the --sid-update-file parameter.
>
> A WG does not need to renumber RFC123456bis every time a new bis draft is
> released.
> The RFC123456 SIDs MUST be preserved in each bis release, but none of the
> new "draft" SIDs need to be preserved.
>
> If the SID file recorded the previous version somehow then ANY SID
> generation
> tool can create the correct file, but without it, not even pyang can do i=
t.
>
> E.g.
>
> RFC123456 published             2021-01-01             draft=3Dfalse
> RFC123456bis published        2022-01-01  (-00)    draft=3Dtrue
> RFC123456bis published        2022-02-01  (-01)    draft=3Dtrue
> RFC123456bis published        2022-03-01  (-02)    draft=3Dtrue
>
> The bis -00 MUST use RFC123456 as the --sid-update-file.
> But -01 and -02 bis releases can choose to be a delta from any previous
> I-D or
> start over with a delta from the RFC version.
>
> If a per-SID flag is used, the ability to go back to a previous SID file
> revision as the base is lost.
> Once the SID is marked stable in a new SID file, the tool does not know i=
f
> it was marked
> stable in the RFC or later, so it can never change it back to unstable.
>
> The ability for any tool to verify that a proper delta was generated is
> needed and currently
> does not exist. The [last-sid-file, current-YANG-file] are needed for thi=
s
> purpose.
>
>
>
>
>> Cheers,
>> Alexander
>>
>
>
> Andy
>
>
>>
>>
>>>
>>> Gr=C3=BC=C3=9Fe, Carsten
>>>
>>> _______________________________________________
>> core mailing list
>> core@ietf.org
>> https://www.ietf.org/mailman/listinfo/core
>>
>

--000000000000677be805db612938
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Hi Andy, Michael, all,<div dir=3D"auto"><br></div><div di=
r=3D"auto">Thanks for the examples !</div><div dir=3D"auto"><br></div><div =
dir=3D"auto">Once again, to see if we are on the same page, the problem see=
ms to come from needing two SID files:</div><div dir=3D"auto">RFC123456 and=
 the last work version of RFC123456bis-02 (because of you have both you can=
 infer the immutable from RFC123456 and the provisionnaly allocated for the=
 RFC123456bis-01).</div><div dir=3D"auto"><br></div><div dir=3D"auto">If th=
is is the case, isn&#39;t it simply solved by saving a RFC123456bis-01.sid =
and then using pyang --sid-update-file RFC123456bis-01.sid to generate the =
RFC123456bis-02.sid</div><div dir=3D"auto"><br></div><div dir=3D"auto">And =
if you want to have RFC123456bis-03.sid renumber from the 01 version you si=
mply do it based on RFC123456bis-01.sid.</div><div dir=3D"auto"><br></div><=
div dir=3D"auto">It&#39;s just that I get the feeling we are trying to do v=
ersion control here and if this is the case I would really prefer we stick =
to git and some best practices.</div><div dir=3D"auto"><br></div><div dir=
=3D"auto">Cheers,=C2=A0</div><div dir=3D"auto">Alexander=C2=A0</div><div di=
r=3D"auto"><br></div><br><br><div class=3D"gmail_quote" dir=3D"auto"><div d=
ir=3D"ltr" class=3D"gmail_attr">Le lun. 28 mars 2022, 23:54, Andy Bierman &=
lt;<a href=3D"mailto:andy@yumaworks.com">andy@yumaworks.com</a>&gt; a =C3=
=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><di=
v dir=3D"ltr"><br></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" cla=
ss=3D"gmail_attr">On Mon, Mar 28, 2022 at 2:04 PM Alexander Pelov &lt;<a hr=
ef=3D"mailto:a@ackl.io" target=3D"_blank" rel=3D"noreferrer">a@ackl.io</a>&=
gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div =
dir=3D"ltr"><div>Hi again,</div><div><br></div><div>Thanks for the clarific=
ations!</div><div><br></div><div class=3D"gmail_quote"><div dir=3D"ltr" cla=
ss=3D"gmail_attr">On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann &lt;<a hr=
ef=3D"mailto:cabo@tzi.org" target=3D"_blank" rel=3D"noreferrer">cabo@tzi.or=
g</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin=
:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"=
>On 2022-03-28, at 16:30, Alexander Pelov &lt;<a href=3D"mailto:a@ackl.io" =
target=3D"_blank" rel=3D"noreferrer">a@ackl.io</a>&gt; wrote:<br>
&gt; <br>
&gt; From what I understand, the problem we are trying to solve is (and I a=
m paraphrasing to see if we are on the same page) to try to limit and have =
one SID per YANG name. Something like a &#39;canonical SID&#39; (which woul=
d make for a bijective correspondence &quot;YANG name&quot; &lt;-&gt; &quot=
;canonical SID&quot;, for YANG modules that have SID allocations).<br>
<br>
Indeed.=C2=A0</blockquote><div><br></div><div><div>It seems to me that the =
&quot;canonical SID&quot; property is nice to have (but not a must have, be=
cause it cannot be really guaranteed).</div><div><br></div><div>The SID fil=
es winding up somewhere are the real pain here -&gt; which is actually simp=
ler to solve if you consider that the definitive allocation is an atomic op=
eration.=C2=A0</div><div><br></div><div>Say, you have RFC123456.yang, with =
allocation of SIDs described in RFC123456.SID.</div><div>Now, you have draf=
t-RFC123456bis.yang=C2=A0-&gt; until this one becomes an RFC, the correspon=
ding SID file can be considered in its entirety as provisional allocation /=
 temporary / draft / unstable.=C2=A0</div><div><br></div><div>In that sense=
, the stable/unstable (or other term for the same meaning) works on the fil=
e level and is in direct connection to the YANG file.</div></div><div>=C2=
=A0</div><div><br></div></div></div></blockquote><div><br></div><div>Agreed=
</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
&gt; Is there something else we are trying to solve with the &quot;stable/u=
nstable&quot; solution?=C2=A0</blockquote><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">
<br>
The main observation is that these SID files may get wings and may turn up =
in places where they were not meant to be.=C2=A0 Being able to identify tha=
t some of the SID allocations in a SID file are still unstable may help in =
avoiding these SIDs turning up in production.<br></blockquote><div><br></di=
v><div><br></div><div><div>During development, to know which SIDs you can r=
egenerate freely and which you CANNOT because they have been allocated in a=
 &quot;parent&quot; module, you only need the full history of the YANG / SI=
D allocation. This you need in any case to do the check, and the per-range =
stable/unstable option can be seen as a way to ease the life of a tool deve=
loper, but cannot be used to actually be trusted.</div><div><br></div><div>=
The example is the following:</div><div>The developers of draft-RFC123456bi=
s.yang have access to both RFC123456.yang=C2=A0and=C2=A0RFC123456.SID. When=
 you allocate SIDs for draft-RFC123456bis.yang, it is a very straightforwar=
d=C2=A0operation=C2=A0to make the diff between what&#39;s already in RFC123=
456.SID and what needs to be allocated and in what manner. As a matter of f=
act, &quot;pyang sid&quot; already does this!</div></div><div><br></div><di=
v><br></div><div>Does that make sense? Can we simply have a per-SID-file &q=
uot;draft&quot; property?=C2=A0</div></div></div></blockquote><div><br></di=
v><div>Almost.</div><div><br></div><div>It would be set if the SID file als=
o records the &quot;last-sid-file&quot; revision somehow.</div><div>The pya=
ng tool requires this for the --sid-update-file parameter.</div><div><br></=
div><div>A WG does not need to renumber RFC123456bis every time a new bis d=
raft is released.</div><div>The RFC123456 SIDs MUST be preserved in each bi=
s release, but none of the new &quot;draft&quot; SIDs need to be preserved.=
</div><div><br></div><div>If the SID file recorded the previous version som=
ehow then ANY SID generation</div><div>tool can create the correct file, bu=
t without it, not even pyang can do it.</div><div><br></div><div>E.g.</div>=
<div><br></div><div>RFC123456 published=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A02021-01-01=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draf=
t=3Dfalse</div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-=
01-01=C2=A0 (-00)=C2=A0 =C2=A0 draft=3Dtrue</div><div>RFC123456bis publishe=
d=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-02-01=C2=A0 (-01)=C2=A0 =C2=A0 draft=3Dtr=
ue<br></div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-03-=
01=C2=A0 (-02)=C2=A0 =C2=A0 draft=3Dtrue<br></div><div><br></div><div>The b=
is -00 MUST use RFC123456 as the --sid-update-file.</div><div>But -01 and -=
02 bis releases can choose to be a delta from any previous I-D or=C2=A0</di=
v><div>start over with a delta from the RFC version.</div><div><br></div><d=
iv>If a per-SID flag is used, the ability to go back to a previous SID file=
 revision as the base is lost.</div><div>Once the SID is marked stable in a=
 new SID file, the tool does not know if it was marked</div><div>stable in =
the RFC or later, so it can never change it back to unstable.</div><div><br=
></div><div>The ability for any tool to verify that a proper delta was gene=
rated is needed and currently</div><div>does not exist. The [last-sid-file,=
 current-YANG-file] are needed for this purpose.</div><div><br></div><div><=
br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><=
div dir=3D"ltr"><div class=3D"gmail_quote"><div><br></div><div>Cheers,</div=
><div>Alexander</div></div></div></blockquote><div><br></div><div><br></div=
><div>Andy</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
</blockquote></div></div>
_______________________________________________<br>
core mailing list<br>
<a href=3D"mailto:core@ietf.org" target=3D"_blank" rel=3D"noreferrer">core@=
ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferrer no=
referrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/core</a><=
br>
</blockquote></div></div>
</blockquote></div></div>

--000000000000677be805db612938--


From nobody Tue Mar 29 13:43:35 2022
Return-Path: <cabo@tzi.org>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C0F63A14EC for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 13:43:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level: 
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id egS1SiAQQHqY for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 13:43:28 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [134.102.50.15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1074E3A1CA8 for <core@ietf.org>; Tue, 29 Mar 2022 13:43:27 -0700 (PDT)
Received: from [192.168.217.118] (p5089ad4f.dip0.t-ipconnect.de [80.137.173.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4KShNX4fS1zDCbq; Tue, 29 Mar 2022 22:43:24 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com>
Date: Tue, 29 Mar 2022 22:43:24 +0200
Cc: Andy Bierman <andy@yumaworks.com>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
X-Mao-Original-Outgoing-Id: 670279404.228931-54991a7061cbd126cc0f1ca8a7510fd6
Content-Transfer-Encoding: quoted-printable
Message-Id: <4CC34621-BCFF-4C44-9737-81B0496DBCE3@tzi.org>
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org> <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com> <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com> <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com>
To: Alexander Pelov <a@ackl.io>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/f1-qmNZz-rdOY-0NI0WSGgIIQP4>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 20:43:33 -0000

On 2022-03-29, at 22:20, Alexander Pelov <a@ackl.io> wrote:
>=20
> If this is the case, isn't it simply solved by saving a =
RFC123456bis-01.sid and then using pyang --sid-update-file =
RFC123456bis-01.sid to generate the RFC123456bis-02.sid

Yes, and that needs the stable/unstable information per SID.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Tue Mar 29 14:03:18 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A24C3A0B5E for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 14:03:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qjY1VGRjpH_S for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 14:03:09 -0700 (PDT)
Received: from mail-yw1-x1136.google.com (mail-yw1-x1136.google.com [IPv6:2607:f8b0:4864:20::1136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C70EB3A0ADC for <core@ietf.org>; Tue, 29 Mar 2022 14:03:08 -0700 (PDT)
Received: by mail-yw1-x1136.google.com with SMTP id 00721157ae682-2e64a6b20eeso197493587b3.3 for <core@ietf.org>; Tue, 29 Mar 2022 14:03:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Z/1J1OqSB4ni8zOh3rcR5V8XKrFwqc0F+QaR9VTj3Xc=; b=beV1vGJzeTyFolIsawDiwCMyu1v5eGdFZQ0c+gFiHabl2PX7pQksUrKmZ+6GAtfeVM aID7lZ4VUa8qa9Mp/QqfAYJMzM5kKPv+Hy6YYNvxM2WJQXftlfQfMocftDDndJbroGo6 cyNf6ksVLiGKfgkdkb8HIBPLG6iihlH7re/MMsvkNqrMambqa1TdTnC8Lk9y7oTmwRKL s/+BGDgfzqrvWzidmLFb736Fn9s3BVIXZawDdFioWgZX0tj+C5lNsHhh5/0stf6lhz1f b58hW5ETOQYeQE4c0HH8g7Feo8owvcLLg+zTRQ6PT6QFkOEfhJ6ifB4vKTnCSz6elMdG gSEg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Z/1J1OqSB4ni8zOh3rcR5V8XKrFwqc0F+QaR9VTj3Xc=; b=kuQgDC30KnB2s7WjReZI2i0gLyUUboZgy4SFNGOVulUwIvigdKXwvoITKBur4ebZ07 jZ4IUU6vY8ibc+ABWKlF/6dz23vNymyVE8taz6fx+X3Uyizbm27nlG5SPHKJTcy/gVkT tVMvVqiaZGwSibhGxoUKrSe0dntlyUiJSVP4dFSlBmzLGcffjQx3pU/8NzlH3uSNWDax eKNotll9M8iBviJC0f+1aAkmZh2iJ00EaQ8ySop0RW3yS2Ronpf9JHRN6O/20ybcNaQL kNGKjNZlvHDLaO/OzHg2o3FUSn4FDGbgSFh2gsfyOgMF1hSNMY9tYx28r3iuzBoOT/02 W3jQ==
X-Gm-Message-State: AOAM530yB5YzSfujCnr/A5nJmBS9u3s7zBHO7WCp73DbVXYUlvaiT55W EzWVENiOO/x/6KEeAbfq+6z4Fe84ssZoTZ+ws8YuNf+pm0I=
X-Google-Smtp-Source: ABdhPJwVMTX21RfOi7VSLu81PvGp7QKZtYtr/Ia00qdu3ZL6OcHCWrZCXSGdiPM4dhyr5Y3EtcPHCw4HbfZaIhe/t0w=
X-Received: by 2002:a81:5845:0:b0:2e5:a75d:ed20 with SMTP id m66-20020a815845000000b002e5a75ded20mr33051978ywb.110.1648587787535; Tue, 29 Mar 2022 14:03:07 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org> <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com> <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com> <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com>
In-Reply-To: <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Tue, 29 Mar 2022 14:02:56 -0700
Message-ID: <CABCOCHQnqN9UpHdC44Grc15hdu66Obm_zbXAj0+UEHLSvDW1qQ@mail.gmail.com>
To: Alexander Pelov <a@ackl.io>
Cc: Carsten Bormann <cabo@tzi.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007518e405db61c1f4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/Izlx7sXZa46kTnYK4HXdxpuBRls>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 21:03:15 -0000

--0000000000007518e405db61c1f4
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Tue, Mar 29, 2022 at 1:20 PM Alexander Pelov <a@ackl.io> wrote:

> Hi Andy, Michael, all,
>
> Thanks for the examples !
>
> Once again, to see if we are on the same page, the problem seems to come
> from needing two SID files:
> RFC123456 and the last work version of RFC123456bis-02 (because of you
> have both you can infer the immutable from RFC123456 and the provisionnal=
y
> allocated for the RFC123456bis-01).
>
> If this is the case, isn't it simply solved by saving a
> RFC123456bis-01.sid and then using pyang --sid-update-file
> RFC123456bis-01.sid to generate the RFC123456bis-02.sid
>
> And if you want to have RFC123456bis-03.sid renumber from the 01 version
> you simply do it based on RFC123456bis-01.sid.
>


Yes.

I want some operational verification of the SID file to be possible
A more robust solution can be achieved if the SID file stored the following
information:

  - parent-stable:  the revision-date of the stable ancestor for this SID
file.
     (present only if there is a stable ancestor e.g. RFC123456.sid)

  - parent-unstable: the revision-date for the parent of this SID file.
     (present only if this is draft and the parent is not the same as
parent-stable)

  - draft: TRUE if this is a work-in-progress; FALSE if this is a published
and stable SID file

It should be possible for one SID tool to check the correctness of a SID
file.
Currently there is not even a datestamp or a checksum or any of the metadat=
a
(passed to pyang as parameters) saved in the SID file.

It's just that I get the feeling we are trying to do version control here
> and if this is the case I would really prefer we stick to git and some be=
st
> practices.
>


There is an assumption that SID files are like YANG modules, but they are
not.
A SID file expands the YANG module and therefore relies on all the imports.
If a YANG module uses groupings (about 90% of them?) then it is quite
possible
for the SID file to change even if the YANG module it is for did not change=
.

I am much more concerned about operational robustness than the ability
for a WG writing a bis-draft to save a few extra bytes in the CBOR encoding=
.





> Cheers,
> Alexander
>
>
>
Andy


>
> Le lun. 28 mars 2022, 23:54, Andy Bierman <andy@yumaworks.com> a =C3=A9cr=
it :
>
>>
>>
>> On Mon, Mar 28, 2022 at 2:04 PM Alexander Pelov <a@ackl.io> wrote:
>>
>>> Hi again,
>>>
>>> Thanks for the clarifications!
>>>
>>> On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann <cabo@tzi.org> wrote:
>>>
>>>> On 2022-03-28, at 16:30, Alexander Pelov <a@ackl.io> wrote:
>>>> >
>>>> > From what I understand, the problem we are trying to solve is (and I
>>>> am paraphrasing to see if we are on the same page) to try to limit and=
 have
>>>> one SID per YANG name. Something like a 'canonical SID' (which would m=
ake
>>>> for a bijective correspondence "YANG name" <-> "canonical SID", for YA=
NG
>>>> modules that have SID allocations).
>>>>
>>>> Indeed.
>>>
>>>
>>> It seems to me that the "canonical SID" property is nice to have (but
>>> not a must have, because it cannot be really guaranteed).
>>>
>>> The SID files winding up somewhere are the real pain here -> which is
>>> actually simpler to solve if you consider that the definitive allocatio=
n is
>>> an atomic operation.
>>>
>>> Say, you have RFC123456.yang, with allocation of SIDs described in
>>> RFC123456.SID.
>>> Now, you have draft-RFC123456bis.yang -> until this one becomes an RFC,
>>> the corresponding SID file can be considered in its entirety as provisi=
onal
>>> allocation / temporary / draft / unstable.
>>>
>>> In that sense, the stable/unstable (or other term for the same meaning)
>>> works on the file level and is in direct connection to the YANG file.
>>>
>>>
>>>
>> Agreed
>>
>>
>>
>>> > Is there something else we are trying to solve with the
>>>> "stable/unstable" solution?
>>>
>>>
>>>> The main observation is that these SID files may get wings and may tur=
n
>>>> up in places where they were not meant to be.  Being able to identify =
that
>>>> some of the SID allocations in a SID file are still unstable may help =
in
>>>> avoiding these SIDs turning up in production.
>>>>
>>>
>>>
>>> During development, to know which SIDs you can regenerate freely and
>>> which you CANNOT because they have been allocated in a "parent" module,=
 you
>>> only need the full history of the YANG / SID allocation. This you need =
in
>>> any case to do the check, and the per-range stable/unstable option can =
be
>>> seen as a way to ease the life of a tool developer, but cannot be used =
to
>>> actually be trusted.
>>>
>>> The example is the following:
>>> The developers of draft-RFC123456bis.yang have access to both
>>> RFC123456.yang and RFC123456.SID. When you allocate SIDs for
>>> draft-RFC123456bis.yang, it is a very straightforward operation to make=
 the
>>> diff between what's already in RFC123456.SID and what needs to be alloc=
ated
>>> and in what manner. As a matter of fact, "pyang sid" already does this!
>>>
>>>
>>> Does that make sense? Can we simply have a per-SID-file "draft"
>>> property?
>>>
>>
>> Almost.
>>
>> It would be set if the SID file also records the "last-sid-file" revisio=
n
>> somehow.
>> The pyang tool requires this for the --sid-update-file parameter.
>>
>> A WG does not need to renumber RFC123456bis every time a new bis draft i=
s
>> released.
>> The RFC123456 SIDs MUST be preserved in each bis release, but none of th=
e
>> new "draft" SIDs need to be preserved.
>>
>> If the SID file recorded the previous version somehow then ANY SID
>> generation
>> tool can create the correct file, but without it, not even pyang can do
>> it.
>>
>> E.g.
>>
>> RFC123456 published             2021-01-01             draft=3Dfalse
>> RFC123456bis published        2022-01-01  (-00)    draft=3Dtrue
>> RFC123456bis published        2022-02-01  (-01)    draft=3Dtrue
>> RFC123456bis published        2022-03-01  (-02)    draft=3Dtrue
>>
>> The bis -00 MUST use RFC123456 as the --sid-update-file.
>> But -01 and -02 bis releases can choose to be a delta from any previous
>> I-D or
>> start over with a delta from the RFC version.
>>
>> If a per-SID flag is used, the ability to go back to a previous SID file
>> revision as the base is lost.
>> Once the SID is marked stable in a new SID file, the tool does not know
>> if it was marked
>> stable in the RFC or later, so it can never change it back to unstable.
>>
>> The ability for any tool to verify that a proper delta was generated is
>> needed and currently
>> does not exist. The [last-sid-file, current-YANG-file] are needed for
>> this purpose.
>>
>>
>>
>>
>>> Cheers,
>>> Alexander
>>>
>>
>>
>> Andy
>>
>>
>>>
>>>
>>>>
>>>> Gr=C3=BC=C3=9Fe, Carsten
>>>>
>>>> _______________________________________________
>>> core mailing list
>>> core@ietf.org
>>> https://www.ietf.org/mailman/listinfo/core
>>>
>>

--0000000000007518e405db61c1f4
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Tue, Mar 29, 2022 at 1:20 PM Alexa=
nder Pelov &lt;<a href=3D"mailto:a@ackl.io">a@ackl.io</a>&gt; wrote:<br></d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"auto">Hi A=
ndy, Michael, all,<div dir=3D"auto"><br></div><div dir=3D"auto">Thanks for =
the examples !</div><div dir=3D"auto"><br></div><div dir=3D"auto">Once agai=
n, to see if we are on the same page, the problem seems to come from needin=
g two SID files:</div><div dir=3D"auto">RFC123456 and the last work version=
 of RFC123456bis-02 (because of you have both you can infer the immutable f=
rom RFC123456 and the provisionnaly allocated for the RFC123456bis-01).</di=
v><div dir=3D"auto"><br></div><div dir=3D"auto">If this is the case, isn&#3=
9;t it simply solved by saving a RFC123456bis-01.sid and then using pyang -=
-sid-update-file RFC123456bis-01.sid to generate the RFC123456bis-02.sid</d=
iv><div dir=3D"auto"><br></div><div dir=3D"auto">And if you want to have RF=
C123456bis-03.sid renumber from the 01 version you simply do it based on RF=
C123456bis-01.sid.</div></div></blockquote><div><br></div><div><br></div><d=
iv>Yes.</div><div><br></div><div>I want some operational verification of th=
e SID file to be possible</div><div>A more robust solution can be achieved =
if the SID file stored the following information:=C2=A0</div><div><br></div=
><div>=C2=A0 - parent-stable:=C2=A0 the revision-date of the stable ancesto=
r for this SID file.</div><div>=C2=A0 =C2=A0 =C2=A0(present only if there i=
s a stable ancestor e.g. RFC123456.sid)</div><div><br></div><div>=C2=A0 - p=
arent-unstable: the revision-date for the parent of this SID file.</div><di=
v>=C2=A0 =C2=A0 =C2=A0(present only if this is draft and the parent is not =
the same as parent-stable)</div><div><br></div><div>=C2=A0 - draft: TRUE if=
 this is a work-in-progress; FALSE if this is a published and stable SID fi=
le</div><div><br></div><div>It should be possible for one SID tool to check=
 the correctness of a SID file.</div><div>Currently there is not even a dat=
estamp=C2=A0or a checksum or any of the metadata</div><div>(passed to pyang=
 as parameters) saved in the SID file.</div><div><br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid r=
gb(204,204,204);padding-left:1ex"><div dir=3D"auto"><div dir=3D"auto">It&#3=
9;s just that I get the feeling we are trying to do version control here an=
d if this is the case I would really prefer we stick to git and some best p=
ractices.</div></div></blockquote><div><br></div><div><br></div><div>There =
is an assumption that SID files are like YANG modules, but they are not.</d=
iv><div>A SID file expands the YANG module and therefore relies on all the =
imports.</div><div>If a YANG module uses groupings (about 90% of them?) the=
n it is quite possible</div><div>for the SID file to change even if the YAN=
G module it is for did not change.</div><div><br></div><div>I am much more =
concerned about operational robustness than the ability</div><div>for a WG =
writing a bis-draft to save a few extra bytes in the CBOR encoding.</div><d=
iv><br></div><div><br></div><div><br></div><div><br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex"><div dir=3D"auto"><div dir=3D"auto"><br></=
div><div dir=3D"auto">Cheers,=C2=A0</div><div dir=3D"auto">Alexander=C2=A0<=
/div><div dir=3D"auto"><br></div><br></div></blockquote><div><br></div><div=
>Andy</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"marg=
in:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1e=
x"><div dir=3D"auto"><br><div class=3D"gmail_quote" dir=3D"auto"><div dir=
=3D"ltr" class=3D"gmail_attr">Le lun. 28 mars 2022, 23:54, Andy Bierman &lt=
;<a href=3D"mailto:andy@yumaworks.com" target=3D"_blank">andy@yumaworks.com=
</a>&gt; a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"=
gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at =
2:04 PM Alexander Pelov &lt;<a href=3D"mailto:a@ackl.io" rel=3D"noreferrer"=
 target=3D"_blank">a@ackl.io</a>&gt; wrote:<br></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204=
,204,204);padding-left:1ex"><div dir=3D"ltr"><div>Hi again,</div><div><br><=
/div><div>Thanks for the clarifications!</div><div><br></div><div class=3D"=
gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at =
4:34 PM Carsten Bormann &lt;<a href=3D"mailto:cabo@tzi.org" rel=3D"noreferr=
er" target=3D"_blank">cabo@tzi.org</a>&gt; wrote:<br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid r=
gb(204,204,204);padding-left:1ex">On 2022-03-28, at 16:30, Alexander Pelov =
&lt;<a href=3D"mailto:a@ackl.io" rel=3D"noreferrer" target=3D"_blank">a@ack=
l.io</a>&gt; wrote:<br>
&gt; <br>
&gt; From what I understand, the problem we are trying to solve is (and I a=
m paraphrasing to see if we are on the same page) to try to limit and have =
one SID per YANG name. Something like a &#39;canonical SID&#39; (which woul=
d make for a bijective correspondence &quot;YANG name&quot; &lt;-&gt; &quot=
;canonical SID&quot;, for YANG modules that have SID allocations).<br>
<br>
Indeed.=C2=A0</blockquote><div><br></div><div><div>It seems to me that the =
&quot;canonical SID&quot; property is nice to have (but not a must have, be=
cause it cannot be really guaranteed).</div><div><br></div><div>The SID fil=
es winding up somewhere are the real pain here -&gt; which is actually simp=
ler to solve if you consider that the definitive allocation is an atomic op=
eration.=C2=A0</div><div><br></div><div>Say, you have RFC123456.yang, with =
allocation of SIDs described in RFC123456.SID.</div><div>Now, you have draf=
t-RFC123456bis.yang=C2=A0-&gt; until this one becomes an RFC, the correspon=
ding SID file can be considered in its entirety as provisional allocation /=
 temporary / draft / unstable.=C2=A0</div><div><br></div><div>In that sense=
, the stable/unstable (or other term for the same meaning) works on the fil=
e level and is in direct connection to the YANG file.</div></div><div>=C2=
=A0</div><div><br></div></div></div></blockquote><div><br></div><div>Agreed=
</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
&gt; Is there something else we are trying to solve with the &quot;stable/u=
nstable&quot; solution?=C2=A0</blockquote><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">
<br>
The main observation is that these SID files may get wings and may turn up =
in places where they were not meant to be.=C2=A0 Being able to identify tha=
t some of the SID allocations in a SID file are still unstable may help in =
avoiding these SIDs turning up in production.<br></blockquote><div><br></di=
v><div><br></div><div><div>During development, to know which SIDs you can r=
egenerate freely and which you CANNOT because they have been allocated in a=
 &quot;parent&quot; module, you only need the full history of the YANG / SI=
D allocation. This you need in any case to do the check, and the per-range =
stable/unstable option can be seen as a way to ease the life of a tool deve=
loper, but cannot be used to actually be trusted.</div><div><br></div><div>=
The example is the following:</div><div>The developers of draft-RFC123456bi=
s.yang have access to both RFC123456.yang=C2=A0and=C2=A0RFC123456.SID. When=
 you allocate SIDs for draft-RFC123456bis.yang, it is a very straightforwar=
d=C2=A0operation=C2=A0to make the diff between what&#39;s already in RFC123=
456.SID and what needs to be allocated and in what manner. As a matter of f=
act, &quot;pyang sid&quot; already does this!</div></div><div><br></div><di=
v><br></div><div>Does that make sense? Can we simply have a per-SID-file &q=
uot;draft&quot; property?=C2=A0</div></div></div></blockquote><div><br></di=
v><div>Almost.</div><div><br></div><div>It would be set if the SID file als=
o records the &quot;last-sid-file&quot; revision somehow.</div><div>The pya=
ng tool requires this for the --sid-update-file parameter.</div><div><br></=
div><div>A WG does not need to renumber RFC123456bis every time a new bis d=
raft is released.</div><div>The RFC123456 SIDs MUST be preserved in each bi=
s release, but none of the new &quot;draft&quot; SIDs need to be preserved.=
</div><div><br></div><div>If the SID file recorded the previous version som=
ehow then ANY SID generation</div><div>tool can create the correct file, bu=
t without it, not even pyang can do it.</div><div><br></div><div>E.g.</div>=
<div><br></div><div>RFC123456 published=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A02021-01-01=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draf=
t=3Dfalse</div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-=
01-01=C2=A0 (-00)=C2=A0 =C2=A0 draft=3Dtrue</div><div>RFC123456bis publishe=
d=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-02-01=C2=A0 (-01)=C2=A0 =C2=A0 draft=3Dtr=
ue<br></div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-03-=
01=C2=A0 (-02)=C2=A0 =C2=A0 draft=3Dtrue<br></div><div><br></div><div>The b=
is -00 MUST use RFC123456 as the --sid-update-file.</div><div>But -01 and -=
02 bis releases can choose to be a delta from any previous I-D or=C2=A0</di=
v><div>start over with a delta from the RFC version.</div><div><br></div><d=
iv>If a per-SID flag is used, the ability to go back to a previous SID file=
 revision as the base is lost.</div><div>Once the SID is marked stable in a=
 new SID file, the tool does not know if it was marked</div><div>stable in =
the RFC or later, so it can never change it back to unstable.</div><div><br=
></div><div>The ability for any tool to verify that a proper delta was gene=
rated is needed and currently</div><div>does not exist. The [last-sid-file,=
 current-YANG-file] are needed for this purpose.</div><div><br></div><div><=
br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><=
div dir=3D"ltr"><div class=3D"gmail_quote"><div><br></div><div>Cheers,</div=
><div>Alexander</div></div></div></blockquote><div><br></div><div><br></div=
><div>Andy</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
</blockquote></div></div>
_______________________________________________<br>
core mailing list<br>
<a href=3D"mailto:core@ietf.org" rel=3D"noreferrer" target=3D"_blank">core@=
ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferrer no=
referrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/core</a><=
br>
</blockquote></div></div>
</blockquote></div></div>
</blockquote></div></div>

--0000000000007518e405db61c1f4--


From nobody Tue Mar 29 14:35:48 2022
Return-Path: <alexander@ackl.io>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E95493A10C7 for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 14:35:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ackl-io.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KGhVBL2shA0N for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 14:35:40 -0700 (PDT)
Received: from mail-io1-xd2b.google.com (mail-io1-xd2b.google.com [IPv6:2607:f8b0:4864:20::d2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F32733A10B4 for <core@ietf.org>; Tue, 29 Mar 2022 14:35:39 -0700 (PDT)
Received: by mail-io1-xd2b.google.com with SMTP id q11so22615327iod.6 for <core@ietf.org>; Tue, 29 Mar 2022 14:35:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ackl-io.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GFfo5PG588u5Qv+VuGmCSZUzcV2gGCFJe1IUOC8RsI0=; b=rK3pYZkrlZomlcK1zyUzfTfx8FfVwwpdk0srzyw3ZN9Yig2m172YEtpbLID8ivTf8Q 7kSH72O3Q4k5NeMkNd3W35uV6++JvC3Wd5bz7w3p9dXdpTENggCJZOFap09reFkFicpD aTZAoNLDYLeMBF/0vbs2mjO+lhIHOuTE3xtxMpzBmkYqYjDaYLVlSHUTqIDHqe715mmg tmUq0L7BlUZYEyaYnkNMtNyP8IKv0AKUmO/X2w6zp1Xj8TPC3iHhNvJ2dobxf0sH3SEu 6nDZABD9+yTiqQR67pZV4hj7LLfj/3lDSRNocDhlJ+bbttjfFkPFnroawkZUXlntQQaS ZRJA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GFfo5PG588u5Qv+VuGmCSZUzcV2gGCFJe1IUOC8RsI0=; b=ilfMFL5BmxTSsNoZlscxnwR2/0cQYTGUu1GIgu/70/saJGTRRjf3/N5RMO0LqDP35E T6XVgoaVNTgrG1ZjtxepWl3BZaG1Ws9CpfBJMdpsO4s+Z4kNORFeBlZS+wIor5PM2J+x iDtIQWpoXN6o4m2Ghqt/xz5qeWP2ZXtOm8gNeNtvPKcz0t4EO9ouOFyym3SBDeuN/ddl k4q9OFWYY14VRu3GEsvly5NkNCXLT6sAatK/FMDRGXEB0lYfrcJ/Vcvc9zpGYarm4UAn MLHdTx/bPOTqKxdAAF2LSzrOJscIqXodb2zQwInSwZhQ4jrFWr3rj44FQbUsd6FdV9Je o2FQ==
X-Gm-Message-State: AOAM5333WeGcQIRLSNnlBogOV/L5jYhxEbJMusJZpGEnM0KNrlyaxtTT jSesMes3VBILkh/skgb1H2LmCZ8eOEY8LqiFWCFPRQ==
X-Google-Smtp-Source: ABdhPJznCXyll/vVXgP7Q7VSfHvB+ekQ05bterXx/w+6xnLR7wSGlIkCZ1bCrzlyhu55TwQ32YxRpymvNxyS3bQmbdk=
X-Received: by 2002:a05:6602:45b:b0:645:bdc2:fe13 with SMTP id e27-20020a056602045b00b00645bdc2fe13mr10038658iov.114.1648589738507; Tue, 29 Mar 2022 14:35:38 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org> <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com> <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com> <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com> <CABCOCHQnqN9UpHdC44Grc15hdu66Obm_zbXAj0+UEHLSvDW1qQ@mail.gmail.com>
In-Reply-To: <CABCOCHQnqN9UpHdC44Grc15hdu66Obm_zbXAj0+UEHLSvDW1qQ@mail.gmail.com>
From: Alexander Pelov <a@ackl.io>
Date: Tue, 29 Mar 2022 23:35:27 +0200
Message-ID: <CACQW0ErYrAKh_p6tDpLMoFGrX4f00ZR3k_nAEaSp-R+NHM3LDg@mail.gmail.com>
To: Andy Bierman <andy@yumaworks.com>
Cc: Carsten Bormann <cabo@tzi.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000be96f705db62358c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/duKbkbuLaXDWubXxlSHd9oCu_KA>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 21:35:45 -0000

--000000000000be96f705db62358c
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Andy,

>From what I understood until now, the stable/unstable tag is helpful only
to the authors that work on draft-123456bis-02 so that they can generate
new SIDs keeping the previously temporary allocated for draft-123456bis-01.

Once the document becomes and RFC the whole stable/unstable difference
becomes useless. Also, it is meaningless to anyone other than the authors
of the YANG file, between versions.

Do you expect these to be used at any other moment?

(I do agree adding metadata such as dare created, "draft", or other file
level may be useful)

Cheers,
Alexander






Le mar. 29 mars 2022, 23:03, Andy Bierman <andy@yumaworks.com> a =C3=A9crit=
 :

>
>
> On Tue, Mar 29, 2022 at 1:20 PM Alexander Pelov <a@ackl.io> wrote:
>
>> Hi Andy, Michael, all,
>>
>> Thanks for the examples !
>>
>> Once again, to see if we are on the same page, the problem seems to come
>> from needing two SID files:
>> RFC123456 and the last work version of RFC123456bis-02 (because of you
>> have both you can infer the immutable from RFC123456 and the provisionna=
ly
>> allocated for the RFC123456bis-01).
>>
>> If this is the case, isn't it simply solved by saving a
>> RFC123456bis-01.sid and then using pyang --sid-update-file
>> RFC123456bis-01.sid to generate the RFC123456bis-02.sid
>>
>> And if you want to have RFC123456bis-03.sid renumber from the 01 version
>> you simply do it based on RFC123456bis-01.sid.
>>
>
>
> Yes.
>
> I want some operational verification of the SID file to be possible
> A more robust solution can be achieved if the SID file stored the
> following information:
>
>   - parent-stable:  the revision-date of the stable ancestor for this SID
> file.
>      (present only if there is a stable ancestor e.g. RFC123456.sid)
>
>   - parent-unstable: the revision-date for the parent of this SID file.
>      (present only if this is draft and the parent is not the same as
> parent-stable)
>
>   - draft: TRUE if this is a work-in-progress; FALSE if this is a
> published and stable SID file
>
> It should be possible for one SID tool to check the correctness of a SID
> file.
> Currently there is not even a datestamp or a checksum or any of the
> metadata
> (passed to pyang as parameters) saved in the SID file.
>
> It's just that I get the feeling we are trying to do version control here
>> and if this is the case I would really prefer we stick to git and some b=
est
>> practices.
>>
>
>
> There is an assumption that SID files are like YANG modules, but they are
> not.
> A SID file expands the YANG module and therefore relies on all the import=
s.
> If a YANG module uses groupings (about 90% of them?) then it is quite
> possible
> for the SID file to change even if the YANG module it is for did not
> change.
>
> I am much more concerned about operational robustness than the ability
> for a WG writing a bis-draft to save a few extra bytes in the CBOR
> encoding.
>
>
>
>
>
>> Cheers,
>> Alexander
>>
>>
>>
> Andy
>
>
>>
>> Le lun. 28 mars 2022, 23:54, Andy Bierman <andy@yumaworks.com> a =C3=A9c=
rit :
>>
>>>
>>>
>>> On Mon, Mar 28, 2022 at 2:04 PM Alexander Pelov <a@ackl.io> wrote:
>>>
>>>> Hi again,
>>>>
>>>> Thanks for the clarifications!
>>>>
>>>> On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann <cabo@tzi.org> wrote:
>>>>
>>>>> On 2022-03-28, at 16:30, Alexander Pelov <a@ackl.io> wrote:
>>>>> >
>>>>> > From what I understand, the problem we are trying to solve is (and =
I
>>>>> am paraphrasing to see if we are on the same page) to try to limit an=
d have
>>>>> one SID per YANG name. Something like a 'canonical SID' (which would =
make
>>>>> for a bijective correspondence "YANG name" <-> "canonical SID", for Y=
ANG
>>>>> modules that have SID allocations).
>>>>>
>>>>> Indeed.
>>>>
>>>>
>>>> It seems to me that the "canonical SID" property is nice to have (but
>>>> not a must have, because it cannot be really guaranteed).
>>>>
>>>> The SID files winding up somewhere are the real pain here -> which is
>>>> actually simpler to solve if you consider that the definitive allocati=
on is
>>>> an atomic operation.
>>>>
>>>> Say, you have RFC123456.yang, with allocation of SIDs described in
>>>> RFC123456.SID.
>>>> Now, you have draft-RFC123456bis.yang -> until this one becomes an RFC=
,
>>>> the corresponding SID file can be considered in its entirety as provis=
ional
>>>> allocation / temporary / draft / unstable.
>>>>
>>>> In that sense, the stable/unstable (or other term for the same meaning=
)
>>>> works on the file level and is in direct connection to the YANG file.
>>>>
>>>>
>>>>
>>> Agreed
>>>
>>>
>>>
>>>> > Is there something else we are trying to solve with the
>>>>> "stable/unstable" solution?
>>>>
>>>>
>>>>> The main observation is that these SID files may get wings and may
>>>>> turn up in places where they were not meant to be.  Being able to ide=
ntify
>>>>> that some of the SID allocations in a SID file are still unstable may=
 help
>>>>> in avoiding these SIDs turning up in production.
>>>>>
>>>>
>>>>
>>>> During development, to know which SIDs you can regenerate freely and
>>>> which you CANNOT because they have been allocated in a "parent" module=
, you
>>>> only need the full history of the YANG / SID allocation. This you need=
 in
>>>> any case to do the check, and the per-range stable/unstable option can=
 be
>>>> seen as a way to ease the life of a tool developer, but cannot be used=
 to
>>>> actually be trusted.
>>>>
>>>> The example is the following:
>>>> The developers of draft-RFC123456bis.yang have access to both
>>>> RFC123456.yang and RFC123456.SID. When you allocate SIDs for
>>>> draft-RFC123456bis.yang, it is a very straightforward operation to mak=
e the
>>>> diff between what's already in RFC123456.SID and what needs to be allo=
cated
>>>> and in what manner. As a matter of fact, "pyang sid" already does this=
!
>>>>
>>>>
>>>> Does that make sense? Can we simply have a per-SID-file "draft"
>>>> property?
>>>>
>>>
>>> Almost.
>>>
>>> It would be set if the SID file also records the "last-sid-file"
>>> revision somehow.
>>> The pyang tool requires this for the --sid-update-file parameter.
>>>
>>> A WG does not need to renumber RFC123456bis every time a new bis draft
>>> is released.
>>> The RFC123456 SIDs MUST be preserved in each bis release, but none of
>>> the new "draft" SIDs need to be preserved.
>>>
>>> If the SID file recorded the previous version somehow then ANY SID
>>> generation
>>> tool can create the correct file, but without it, not even pyang can do
>>> it.
>>>
>>> E.g.
>>>
>>> RFC123456 published             2021-01-01             draft=3Dfalse
>>> RFC123456bis published        2022-01-01  (-00)    draft=3Dtrue
>>> RFC123456bis published        2022-02-01  (-01)    draft=3Dtrue
>>> RFC123456bis published        2022-03-01  (-02)    draft=3Dtrue
>>>
>>> The bis -00 MUST use RFC123456 as the --sid-update-file.
>>> But -01 and -02 bis releases can choose to be a delta from any previous
>>> I-D or
>>> start over with a delta from the RFC version.
>>>
>>> If a per-SID flag is used, the ability to go back to a previous SID fil=
e
>>> revision as the base is lost.
>>> Once the SID is marked stable in a new SID file, the tool does not know
>>> if it was marked
>>> stable in the RFC or later, so it can never change it back to unstable.
>>>
>>> The ability for any tool to verify that a proper delta was generated is
>>> needed and currently
>>> does not exist. The [last-sid-file, current-YANG-file] are needed for
>>> this purpose.
>>>
>>>
>>>
>>>
>>>> Cheers,
>>>> Alexander
>>>>
>>>
>>>
>>> Andy
>>>
>>>
>>>>
>>>>
>>>>>
>>>>> Gr=C3=BC=C3=9Fe, Carsten
>>>>>
>>>>> _______________________________________________
>>>> core mailing list
>>>> core@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/core
>>>>
>>>

--000000000000be96f705db62358c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div>Hi Andy,=C2=A0<div dir=3D"auto"><br></div>From what =
I understood until now, the stable/unstable tag is helpful only to the auth=
ors that work on draft-123456bis-02 so that they can generate new SIDs keep=
ing the previously temporary allocated for draft-123456bis-01.=C2=A0</div><=
div dir=3D"auto"><br></div><div dir=3D"auto">Once the document becomes and =
RFC the whole stable/unstable difference becomes useless. Also, it is meani=
ngless to anyone other than the authors of the YANG file, between versions.=
</div><div dir=3D"auto"><br></div><div dir=3D"auto">Do you expect these to =
be used at any other moment?</div><div dir=3D"auto"><br></div><div dir=3D"a=
uto">(I do agree adding metadata such as dare created, &quot;draft&quot;, o=
r other file level may be useful)</div><div dir=3D"auto"><br></div><div dir=
=3D"auto">Cheers,</div><div dir=3D"auto">Alexander=C2=A0</div><div dir=3D"a=
uto"><br></div><div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><div=
 dir=3D"auto"><br></div><div dir=3D"auto"><br><br><div class=3D"gmail_quote=
" dir=3D"auto"><div dir=3D"ltr" class=3D"gmail_attr">Le mar. 29 mars 2022, =
23:03, Andy Bierman &lt;<a href=3D"mailto:andy@yumaworks.com">andy@yumawork=
s.com</a>&gt; a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote=
" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><=
div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote"><=
div dir=3D"ltr" class=3D"gmail_attr">On Tue, Mar 29, 2022 at 1:20 PM Alexan=
der Pelov &lt;<a href=3D"mailto:a@ackl.io" target=3D"_blank" rel=3D"norefer=
rer">a@ackl.io</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padd=
ing-left:1ex"><div dir=3D"auto">Hi Andy, Michael, all,<div dir=3D"auto"><br=
></div><div dir=3D"auto">Thanks for the examples !</div><div dir=3D"auto"><=
br></div><div dir=3D"auto">Once again, to see if we are on the same page, t=
he problem seems to come from needing two SID files:</div><div dir=3D"auto"=
>RFC123456 and the last work version of RFC123456bis-02 (because of you hav=
e both you can infer the immutable from RFC123456 and the provisionnaly all=
ocated for the RFC123456bis-01).</div><div dir=3D"auto"><br></div><div dir=
=3D"auto">If this is the case, isn&#39;t it simply solved by saving a RFC12=
3456bis-01.sid and then using pyang --sid-update-file RFC123456bis-01.sid t=
o generate the RFC123456bis-02.sid</div><div dir=3D"auto"><br></div><div di=
r=3D"auto">And if you want to have RFC123456bis-03.sid renumber from the 01=
 version you simply do it based on RFC123456bis-01.sid.</div></div></blockq=
uote><div><br></div><div><br></div><div>Yes.</div><div><br></div><div>I wan=
t some operational verification of the SID file to be possible</div><div>A =
more robust solution can be achieved if the SID file stored the following i=
nformation:=C2=A0</div><div><br></div><div>=C2=A0 - parent-stable:=C2=A0 th=
e revision-date of the stable ancestor for this SID file.</div><div>=C2=A0 =
=C2=A0 =C2=A0(present only if there is a stable ancestor e.g. RFC123456.sid=
)</div><div><br></div><div>=C2=A0 - parent-unstable: the revision-date for =
the parent of this SID file.</div><div>=C2=A0 =C2=A0 =C2=A0(present only if=
 this is draft and the parent is not the same as parent-stable)</div><div><=
br></div><div>=C2=A0 - draft: TRUE if this is a work-in-progress; FALSE if =
this is a published and stable SID file</div><div><br></div><div>It should =
be possible for one SID tool to check the correctness of a SID file.</div><=
div>Currently there is not even a datestamp=C2=A0or a checksum or any of th=
e metadata</div><div>(passed to pyang as parameters) saved in the SID file.=
</div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div=
 dir=3D"auto"><div dir=3D"auto">It&#39;s just that I get the feeling we are=
 trying to do version control here and if this is the case I would really p=
refer we stick to git and some best practices.</div></div></blockquote><div=
><br></div><div><br></div><div>There is an assumption that SID files are li=
ke YANG modules, but they are not.</div><div>A SID file expands the YANG mo=
dule and therefore relies on all the imports.</div><div>If a YANG module us=
es groupings (about 90% of them?) then it is quite possible</div><div>for t=
he SID file to change even if the YANG module it is for did not change.</di=
v><div><br></div><div>I am much more concerned about operational robustness=
 than the ability</div><div>for a WG writing a bis-draft to save a few extr=
a bytes in the CBOR encoding.</div><div><br></div><div><br></div><div><br><=
/div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div =
dir=3D"auto"><div dir=3D"auto"><br></div><div dir=3D"auto">Cheers,=C2=A0</d=
iv><div dir=3D"auto">Alexander=C2=A0</div><div dir=3D"auto"><br></div><br><=
/div></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><blockquot=
e class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px s=
olid rgb(204,204,204);padding-left:1ex"><div dir=3D"auto"><br><div class=3D=
"gmail_quote" dir=3D"auto"><div dir=3D"ltr" class=3D"gmail_attr">Le lun. 28=
 mars 2022, 23:54, Andy Bierman &lt;<a href=3D"mailto:andy@yumaworks.com" t=
arget=3D"_blank" rel=3D"noreferrer">andy@yumaworks.com</a>&gt; a =C3=A9crit=
=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px =
0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=
=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote"><div dir=
=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at 2:04 PM Alexander Pel=
ov &lt;<a href=3D"mailto:a@ackl.io" rel=3D"noreferrer noreferrer" target=3D=
"_blank">a@ackl.io</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote=
" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);=
padding-left:1ex"><div dir=3D"ltr"><div>Hi again,</div><div><br></div><div>=
Thanks for the clarifications!</div><div><br></div><div class=3D"gmail_quot=
e"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at 4:34 PM Ca=
rsten Bormann &lt;<a href=3D"mailto:cabo@tzi.org" rel=3D"noreferrer norefer=
rer" target=3D"_blank">cabo@tzi.org</a>&gt; wrote:<br></div><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex">On 2022-03-28, at 16:30, Alexander Pelov=
 &lt;<a href=3D"mailto:a@ackl.io" rel=3D"noreferrer noreferrer" target=3D"_=
blank">a@ackl.io</a>&gt; wrote:<br>
&gt; <br>
&gt; From what I understand, the problem we are trying to solve is (and I a=
m paraphrasing to see if we are on the same page) to try to limit and have =
one SID per YANG name. Something like a &#39;canonical SID&#39; (which woul=
d make for a bijective correspondence &quot;YANG name&quot; &lt;-&gt; &quot=
;canonical SID&quot;, for YANG modules that have SID allocations).<br>
<br>
Indeed.=C2=A0</blockquote><div><br></div><div><div>It seems to me that the =
&quot;canonical SID&quot; property is nice to have (but not a must have, be=
cause it cannot be really guaranteed).</div><div><br></div><div>The SID fil=
es winding up somewhere are the real pain here -&gt; which is actually simp=
ler to solve if you consider that the definitive allocation is an atomic op=
eration.=C2=A0</div><div><br></div><div>Say, you have RFC123456.yang, with =
allocation of SIDs described in RFC123456.SID.</div><div>Now, you have draf=
t-RFC123456bis.yang=C2=A0-&gt; until this one becomes an RFC, the correspon=
ding SID file can be considered in its entirety as provisional allocation /=
 temporary / draft / unstable.=C2=A0</div><div><br></div><div>In that sense=
, the stable/unstable (or other term for the same meaning) works on the fil=
e level and is in direct connection to the YANG file.</div></div><div>=C2=
=A0</div><div><br></div></div></div></blockquote><div><br></div><div>Agreed=
</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
&gt; Is there something else we are trying to solve with the &quot;stable/u=
nstable&quot; solution?=C2=A0</blockquote><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">
<br>
The main observation is that these SID files may get wings and may turn up =
in places where they were not meant to be.=C2=A0 Being able to identify tha=
t some of the SID allocations in a SID file are still unstable may help in =
avoiding these SIDs turning up in production.<br></blockquote><div><br></di=
v><div><br></div><div><div>During development, to know which SIDs you can r=
egenerate freely and which you CANNOT because they have been allocated in a=
 &quot;parent&quot; module, you only need the full history of the YANG / SI=
D allocation. This you need in any case to do the check, and the per-range =
stable/unstable option can be seen as a way to ease the life of a tool deve=
loper, but cannot be used to actually be trusted.</div><div><br></div><div>=
The example is the following:</div><div>The developers of draft-RFC123456bi=
s.yang have access to both RFC123456.yang=C2=A0and=C2=A0RFC123456.SID. When=
 you allocate SIDs for draft-RFC123456bis.yang, it is a very straightforwar=
d=C2=A0operation=C2=A0to make the diff between what&#39;s already in RFC123=
456.SID and what needs to be allocated and in what manner. As a matter of f=
act, &quot;pyang sid&quot; already does this!</div></div><div><br></div><di=
v><br></div><div>Does that make sense? Can we simply have a per-SID-file &q=
uot;draft&quot; property?=C2=A0</div></div></div></blockquote><div><br></di=
v><div>Almost.</div><div><br></div><div>It would be set if the SID file als=
o records the &quot;last-sid-file&quot; revision somehow.</div><div>The pya=
ng tool requires this for the --sid-update-file parameter.</div><div><br></=
div><div>A WG does not need to renumber RFC123456bis every time a new bis d=
raft is released.</div><div>The RFC123456 SIDs MUST be preserved in each bi=
s release, but none of the new &quot;draft&quot; SIDs need to be preserved.=
</div><div><br></div><div>If the SID file recorded the previous version som=
ehow then ANY SID generation</div><div>tool can create the correct file, bu=
t without it, not even pyang can do it.</div><div><br></div><div>E.g.</div>=
<div><br></div><div>RFC123456 published=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A02021-01-01=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draf=
t=3Dfalse</div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-=
01-01=C2=A0 (-00)=C2=A0 =C2=A0 draft=3Dtrue</div><div>RFC123456bis publishe=
d=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-02-01=C2=A0 (-01)=C2=A0 =C2=A0 draft=3Dtr=
ue<br></div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-03-=
01=C2=A0 (-02)=C2=A0 =C2=A0 draft=3Dtrue<br></div><div><br></div><div>The b=
is -00 MUST use RFC123456 as the --sid-update-file.</div><div>But -01 and -=
02 bis releases can choose to be a delta from any previous I-D or=C2=A0</di=
v><div>start over with a delta from the RFC version.</div><div><br></div><d=
iv>If a per-SID flag is used, the ability to go back to a previous SID file=
 revision as the base is lost.</div><div>Once the SID is marked stable in a=
 new SID file, the tool does not know if it was marked</div><div>stable in =
the RFC or later, so it can never change it back to unstable.</div><div><br=
></div><div>The ability for any tool to verify that a proper delta was gene=
rated is needed and currently</div><div>does not exist. The [last-sid-file,=
 current-YANG-file] are needed for this purpose.</div><div><br></div><div><=
br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><=
div dir=3D"ltr"><div class=3D"gmail_quote"><div><br></div><div>Cheers,</div=
><div>Alexander</div></div></div></blockquote><div><br></div><div><br></div=
><div>Andy</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
</blockquote></div></div>
_______________________________________________<br>
core mailing list<br>
<a href=3D"mailto:core@ietf.org" rel=3D"noreferrer noreferrer" target=3D"_b=
lank">core@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferrer no=
referrer noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinf=
o/core</a><br>
</blockquote></div></div>
</blockquote></div></div>
</blockquote></div></div>
</blockquote></div></div></div>

--000000000000be96f705db62358c--


From nobody Tue Mar 29 15:22:40 2022
Return-Path: <andy@yumaworks.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 169E93A0DA6 for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 15:22:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G_HSoEFoOuRC for <core@ietfa.amsl.com>; Tue, 29 Mar 2022 15:22:34 -0700 (PDT)
Received: from mail-yw1-x1130.google.com (mail-yw1-x1130.google.com [IPv6:2607:f8b0:4864:20::1130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E841C3A0DA4 for <core@ietf.org>; Tue, 29 Mar 2022 15:22:33 -0700 (PDT)
Received: by mail-yw1-x1130.google.com with SMTP id 00721157ae682-2e5e176e1b6so198980517b3.13 for <core@ietf.org>; Tue, 29 Mar 2022 15:22:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wYzML3IQPT3lTt1F3fPOa+4jTKR1D7eSHVk5dxwKNzU=; b=UdM2+8LELGhrnrSkVOICu2E4Z5+TadXiTgxmRQHorwitrrLi2NVAuW2Wi1whpKLCVm PONcy94DWmDuUb294ePKNT2y4zp9+vpfyInd3U9RK77h6fuMBFjVWlIQnWYqraREqOiu 36o0ghMAZ2ZgbMDFfHcs70Gxu/wm2/tSBERXE2GAtlkejTyzPgKmRI/5OoAabwU6eC8Y h8VGHCbXQUEXRMd6i1EH4hlwOpp8WTlUJmVV2OekRYt+sazgg9wr+6fkFK3nTi5IzbNk 0uEpTZr/zm2pWJZSqmwGOKOmtohfytuVgwB1AP5pDkIH2xeoiCm72YW+2sw6eoAej1uR EP1g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wYzML3IQPT3lTt1F3fPOa+4jTKR1D7eSHVk5dxwKNzU=; b=2DouKzZfjFQhZWFJkrNBcVSs0rvSQxS36YigbrRmbve/bqeACu5WTHbtvnB3lkqI54 /ZPuaUkhrLw1fkZtBxDGDbGsJpHZxYb2+ne9cd3FPzkKN1sqPYTmoaDIiPAhM5JQ7PbU 1xRnK2QTTfmsHty0pRU/zMpvN/9p/vTJOPBMr727oOWIrpOizG77Fw+TywZ+YPO4XKm3 QS4ScVk4cCP15Lci5xfui1IDqxJfpln196X6AYrX35Gj+v4CbgchNXfPJlzmyOaStZ1R 46IE4Fz7qe7C7K3UPwII2THPyxj9LN96x9f4fmPi8BvgT1fotRxcJ/lVZKf/aPDRt9Cd PvGQ==
X-Gm-Message-State: AOAM533iwn2aQiFiitxn9iIsfig/BRpDBSuYJUf9xrVskX/4f/RQKol7 Ob2jnOiruUyLb7ZIDHU8RAxLzKXPdc6SuWbaDb/8rQ==
X-Google-Smtp-Source: ABdhPJxtijK/0kHmv3CxjaG983z0CVHRS7bWYYcU0k8q+pB+98vqFTRPHR7xd8+w0onsCpQ2BOAgkHorqTmxlbOefS4=
X-Received: by 2002:a81:5dd6:0:b0:2d6:3041:12e0 with SMTP id r205-20020a815dd6000000b002d6304112e0mr33922554ywb.331.1648592551302; Tue, 29 Mar 2022 15:22:31 -0700 (PDT)
MIME-Version: 1.0
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org> <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com> <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com> <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com> <CABCOCHQnqN9UpHdC44Grc15hdu66Obm_zbXAj0+UEHLSvDW1qQ@mail.gmail.com> <CACQW0ErYrAKh_p6tDpLMoFGrX4f00ZR3k_nAEaSp-R+NHM3LDg@mail.gmail.com>
In-Reply-To: <CACQW0ErYrAKh_p6tDpLMoFGrX4f00ZR3k_nAEaSp-R+NHM3LDg@mail.gmail.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Tue, 29 Mar 2022 15:22:20 -0700
Message-ID: <CABCOCHS-fBAF16_-nehPtpUKC8=+gXiGkRKYw2B8cDTXoyLcVw@mail.gmail.com>
To: Alexander Pelov <a@ackl.io>
Cc: Carsten Bormann <cabo@tzi.org>, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000666cbf05db62ddc2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/SbZHIMRy0fTc91VVUDFA2zIgupI>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 22:22:40 -0000

--000000000000666cbf05db62ddc2
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Tue, Mar 29, 2022 at 2:35 PM Alexander Pelov <a@ackl.io> wrote:

> Hi Andy,
>
> From what I understood until now, the stable/unstable tag is helpful only
> to the authors that work on draft-123456bis-02 so that they can generate
> new SIDs keeping the previously temporary allocated for draft-123456bis-0=
1.
>

The info used for --sid-update-file is needed in the SID file for a tool
to read that SID file and decide if it is correct.



> Once the document becomes and RFC the whole stable/unstable difference
> becomes useless. Also, it is meaningless to anyone other than the authors
> of the YANG file, between versions.
>
>
The stable=3Dtrue flag is useful for developers and operators to  know that
the SID file is stable.

IMO, the WG should regenerate the I-D SID file from the RFC each time, or
at least
done at the end before RFC publication.

The most important factor for delta-SID performance is the difference
between
a SID for a container or list and its children.  The best numbering is
achieved
by sorting the path identifiers once, NOT multiple times.

Do you expect these to be used at any other moment?
>

Could be useful for debugging.
There is plenty of info in the SID file used only to generate an updated
SID file.



> (I do agree adding metadata such as dare created, "draft", or other file
> level may be useful)
>
>

The current pyang design is limited (without a sid-file-version in the
filename).
The date in the filename is tied to the YANG module revision, not the SID
file.
If imported groupings change, a new SID file using the same revision date
is needed to pick up these imported changes.  The 'parent' is a SID file,
not a YANG
file, so it needs the identifier [module-name, module-revision,
sid-file-version].


Cheers,
> Alexander
>
>
>
Andy


>
>
>
>
> Le mar. 29 mars 2022, 23:03, Andy Bierman <andy@yumaworks.com> a =C3=A9cr=
it :
>
>>
>>
>> On Tue, Mar 29, 2022 at 1:20 PM Alexander Pelov <a@ackl.io> wrote:
>>
>>> Hi Andy, Michael, all,
>>>
>>> Thanks for the examples !
>>>
>>> Once again, to see if we are on the same page, the problem seems to com=
e
>>> from needing two SID files:
>>> RFC123456 and the last work version of RFC123456bis-02 (because of you
>>> have both you can infer the immutable from RFC123456 and the provisionn=
aly
>>> allocated for the RFC123456bis-01).
>>>
>>> If this is the case, isn't it simply solved by saving a
>>> RFC123456bis-01.sid and then using pyang --sid-update-file
>>> RFC123456bis-01.sid to generate the RFC123456bis-02.sid
>>>
>>> And if you want to have RFC123456bis-03.sid renumber from the 01 versio=
n
>>> you simply do it based on RFC123456bis-01.sid.
>>>
>>
>>
>> Yes.
>>
>> I want some operational verification of the SID file to be possible
>> A more robust solution can be achieved if the SID file stored the
>> following information:
>>
>>   - parent-stable:  the revision-date of the stable ancestor for this SI=
D
>> file.
>>      (present only if there is a stable ancestor e.g. RFC123456.sid)
>>
>>   - parent-unstable: the revision-date for the parent of this SID file.
>>      (present only if this is draft and the parent is not the same as
>> parent-stable)
>>
>>   - draft: TRUE if this is a work-in-progress; FALSE if this is a
>> published and stable SID file
>>
>> It should be possible for one SID tool to check the correctness of a SID
>> file.
>> Currently there is not even a datestamp or a checksum or any of the
>> metadata
>> (passed to pyang as parameters) saved in the SID file.
>>
>> It's just that I get the feeling we are trying to do version control her=
e
>>> and if this is the case I would really prefer we stick to git and some =
best
>>> practices.
>>>
>>
>>
>> There is an assumption that SID files are like YANG modules, but they ar=
e
>> not.
>> A SID file expands the YANG module and therefore relies on all the
>> imports.
>> If a YANG module uses groupings (about 90% of them?) then it is quite
>> possible
>> for the SID file to change even if the YANG module it is for did not
>> change.
>>
>> I am much more concerned about operational robustness than the ability
>> for a WG writing a bis-draft to save a few extra bytes in the CBOR
>> encoding.
>>
>>
>>
>>
>>
>>> Cheers,
>>> Alexander
>>>
>>>
>>>
>> Andy
>>
>>
>>>
>>> Le lun. 28 mars 2022, 23:54, Andy Bierman <andy@yumaworks.com> a =C3=A9=
crit :
>>>
>>>>
>>>>
>>>> On Mon, Mar 28, 2022 at 2:04 PM Alexander Pelov <a@ackl.io> wrote:
>>>>
>>>>> Hi again,
>>>>>
>>>>> Thanks for the clarifications!
>>>>>
>>>>> On Mon, Mar 28, 2022 at 4:34 PM Carsten Bormann <cabo@tzi.org> wrote:
>>>>>
>>>>>> On 2022-03-28, at 16:30, Alexander Pelov <a@ackl.io> wrote:
>>>>>> >
>>>>>> > From what I understand, the problem we are trying to solve is (and
>>>>>> I am paraphrasing to see if we are on the same page) to try to limit=
 and
>>>>>> have one SID per YANG name. Something like a 'canonical SID' (which =
would
>>>>>> make for a bijective correspondence "YANG name" <-> "canonical SID",=
 for
>>>>>> YANG modules that have SID allocations).
>>>>>>
>>>>>> Indeed.
>>>>>
>>>>>
>>>>> It seems to me that the "canonical SID" property is nice to have (but
>>>>> not a must have, because it cannot be really guaranteed).
>>>>>
>>>>> The SID files winding up somewhere are the real pain here -> which is
>>>>> actually simpler to solve if you consider that the definitive allocat=
ion is
>>>>> an atomic operation.
>>>>>
>>>>> Say, you have RFC123456.yang, with allocation of SIDs described in
>>>>> RFC123456.SID.
>>>>> Now, you have draft-RFC123456bis.yang -> until this one becomes an
>>>>> RFC, the corresponding SID file can be considered in its entirety as
>>>>> provisional allocation / temporary / draft / unstable.
>>>>>
>>>>> In that sense, the stable/unstable (or other term for the same
>>>>> meaning) works on the file level and is in direct connection to the Y=
ANG
>>>>> file.
>>>>>
>>>>>
>>>>>
>>>> Agreed
>>>>
>>>>
>>>>
>>>>> > Is there something else we are trying to solve with the
>>>>>> "stable/unstable" solution?
>>>>>
>>>>>
>>>>>> The main observation is that these SID files may get wings and may
>>>>>> turn up in places where they were not meant to be.  Being able to id=
entify
>>>>>> that some of the SID allocations in a SID file are still unstable ma=
y help
>>>>>> in avoiding these SIDs turning up in production.
>>>>>>
>>>>>
>>>>>
>>>>> During development, to know which SIDs you can regenerate freely and
>>>>> which you CANNOT because they have been allocated in a "parent" modul=
e, you
>>>>> only need the full history of the YANG / SID allocation. This you nee=
d in
>>>>> any case to do the check, and the per-range stable/unstable option ca=
n be
>>>>> seen as a way to ease the life of a tool developer, but cannot be use=
d to
>>>>> actually be trusted.
>>>>>
>>>>> The example is the following:
>>>>> The developers of draft-RFC123456bis.yang have access to both
>>>>> RFC123456.yang and RFC123456.SID. When you allocate SIDs for
>>>>> draft-RFC123456bis.yang, it is a very straightforward operation to ma=
ke the
>>>>> diff between what's already in RFC123456.SID and what needs to be all=
ocated
>>>>> and in what manner. As a matter of fact, "pyang sid" already does thi=
s!
>>>>>
>>>>>
>>>>> Does that make sense? Can we simply have a per-SID-file "draft"
>>>>> property?
>>>>>
>>>>
>>>> Almost.
>>>>
>>>> It would be set if the SID file also records the "last-sid-file"
>>>> revision somehow.
>>>> The pyang tool requires this for the --sid-update-file parameter.
>>>>
>>>> A WG does not need to renumber RFC123456bis every time a new bis draft
>>>> is released.
>>>> The RFC123456 SIDs MUST be preserved in each bis release, but none of
>>>> the new "draft" SIDs need to be preserved.
>>>>
>>>> If the SID file recorded the previous version somehow then ANY SID
>>>> generation
>>>> tool can create the correct file, but without it, not even pyang can d=
o
>>>> it.
>>>>
>>>> E.g.
>>>>
>>>> RFC123456 published             2021-01-01             draft=3Dfalse
>>>> RFC123456bis published        2022-01-01  (-00)    draft=3Dtrue
>>>> RFC123456bis published        2022-02-01  (-01)    draft=3Dtrue
>>>> RFC123456bis published        2022-03-01  (-02)    draft=3Dtrue
>>>>
>>>> The bis -00 MUST use RFC123456 as the --sid-update-file.
>>>> But -01 and -02 bis releases can choose to be a delta from any previou=
s
>>>> I-D or
>>>> start over with a delta from the RFC version.
>>>>
>>>> If a per-SID flag is used, the ability to go back to a previous SID
>>>> file revision as the base is lost.
>>>> Once the SID is marked stable in a new SID file, the tool does not kno=
w
>>>> if it was marked
>>>> stable in the RFC or later, so it can never change it back to unstable=
.
>>>>
>>>> The ability for any tool to verify that a proper delta was generated i=
s
>>>> needed and currently
>>>> does not exist. The [last-sid-file, current-YANG-file] are needed for
>>>> this purpose.
>>>>
>>>>
>>>>
>>>>
>>>>> Cheers,
>>>>> Alexander
>>>>>
>>>>
>>>>
>>>> Andy
>>>>
>>>>
>>>>>
>>>>>
>>>>>>
>>>>>> Gr=C3=BC=C3=9Fe, Carsten
>>>>>>
>>>>>> _______________________________________________
>>>>> core mailing list
>>>>> core@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/core
>>>>>
>>>>

--000000000000666cbf05db62ddc2
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Tue, Mar 29, 2022 at 2:35 PM Alexa=
nder Pelov &lt;<a href=3D"mailto:a@ackl.io">a@ackl.io</a>&gt; wrote:<br></d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"auto"><div=
>Hi Andy,=C2=A0<div dir=3D"auto"><br></div>From what I understood until now=
, the stable/unstable tag is helpful only to the authors that work on draft=
-123456bis-02 so that they can generate new SIDs keeping the previously tem=
porary allocated for draft-123456bis-01.=C2=A0</div></div></blockquote><div=
><br></div><div>The info used for --sid-update-file is needed in the SID fi=
le for a tool</div><div>to read that SID file and decide if it is correct.<=
/div><div><br></div><div><br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex"><div dir=3D"auto"><div dir=3D"auto"><br></div><div dir=3D"auto">=
Once the document becomes and RFC the whole stable/unstable difference beco=
mes useless. Also, it is meaningless to anyone other than the authors of th=
e YANG file, between versions.</div><div dir=3D"auto"><br></div></div></blo=
ckquote><div><br></div><div>The stable=3Dtrue flag is useful for developers=
 and operators to=C2=A0 know that the SID file is stable.</div><div><br></d=
iv><div>IMO, the WG should regenerate the I-D SID file from the RFC each ti=
me, or at least</div><div>done at the end before RFC publication.</div><div=
><br></div><div>The most important factor for delta-SID performance is the =
difference between</div><div>a SID for a container or list and its children=
.=C2=A0 The best numbering is achieved</div><div>by sorting the path identi=
fiers once, NOT multiple times.</div><div><br></div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex"><div dir=3D"auto"><div dir=3D"auto"></div><div d=
ir=3D"auto">Do you expect these to be used at any other moment?</div></div>=
</blockquote><div><br></div><div>Could be useful for debugging.</div><div>T=
here is plenty of info in the SID file used only to generate an updated SID=
 file.</div><div><br></div><div><br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex"><div dir=3D"auto"><div dir=3D"auto"><br></div><div dir=3D"=
auto">(I do agree adding metadata such as dare created, &quot;draft&quot;, =
or other file level may be useful)</div><div dir=3D"auto"><br></div></div><=
/blockquote><div><br></div><div><br></div><div>The current pyang design is =
limited (without a sid-file-version in the filename).</div><div>The date in=
 the filename is tied to the YANG module revision, not the SID file.</div><=
div>If imported groupings change, a new SID file using the same revision da=
te</div><div>is needed to pick up these imported changes.=C2=A0 The &#39;pa=
rent&#39; is a SID file, not a YANG</div><div>file, so it needs the identif=
ier [module-name, module-revision, sid-file-version].</div><div><br></div><=
div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px=
 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D=
"auto"><div dir=3D"auto"></div><div dir=3D"auto">Cheers,</div><div dir=3D"a=
uto">Alexander=C2=A0</div><div dir=3D"auto"><br></div><div dir=3D"auto"><br=
></div></div></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-le=
ft:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"auto"><div dir=
=3D"auto"></div><div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><di=
v dir=3D"auto"><br><br><div class=3D"gmail_quote" dir=3D"auto"><div dir=3D"=
ltr" class=3D"gmail_attr">Le mar. 29 mars 2022, 23:03, Andy Bierman &lt;<a =
href=3D"mailto:andy@yumaworks.com" target=3D"_blank">andy@yumaworks.com</a>=
&gt; a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gm=
ail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Mar 29, 2022 at 1:=
20 PM Alexander Pelov &lt;<a href=3D"mailto:a@ackl.io" rel=3D"noreferrer" t=
arget=3D"_blank">a@ackl.io</a>&gt; wrote:<br></div><blockquote class=3D"gma=
il_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,2=
04,204);padding-left:1ex"><div dir=3D"auto">Hi Andy, Michael, all,<div dir=
=3D"auto"><br></div><div dir=3D"auto">Thanks for the examples !</div><div d=
ir=3D"auto"><br></div><div dir=3D"auto">Once again, to see if we are on the=
 same page, the problem seems to come from needing two SID files:</div><div=
 dir=3D"auto">RFC123456 and the last work version of RFC123456bis-02 (becau=
se of you have both you can infer the immutable from RFC123456 and the prov=
isionnaly allocated for the RFC123456bis-01).</div><div dir=3D"auto"><br></=
div><div dir=3D"auto">If this is the case, isn&#39;t it simply solved by sa=
ving a RFC123456bis-01.sid and then using pyang --sid-update-file RFC123456=
bis-01.sid to generate the RFC123456bis-02.sid</div><div dir=3D"auto"><br><=
/div><div dir=3D"auto">And if you want to have RFC123456bis-03.sid renumber=
 from the 01 version you simply do it based on RFC123456bis-01.sid.</div></=
div></blockquote><div><br></div><div><br></div><div>Yes.</div><div><br></di=
v><div>I want some operational verification of the SID file to be possible<=
/div><div>A more robust solution can be achieved if the SID file stored the=
 following information:=C2=A0</div><div><br></div><div>=C2=A0 - parent-stab=
le:=C2=A0 the revision-date of the stable ancestor for this SID file.</div>=
<div>=C2=A0 =C2=A0 =C2=A0(present only if there is a stable ancestor e.g. R=
FC123456.sid)</div><div><br></div><div>=C2=A0 - parent-unstable: the revisi=
on-date for the parent of this SID file.</div><div>=C2=A0 =C2=A0 =C2=A0(pre=
sent only if this is draft and the parent is not the same as parent-stable)=
</div><div><br></div><div>=C2=A0 - draft: TRUE if this is a work-in-progres=
s; FALSE if this is a published and stable SID file</div><div><br></div><di=
v>It should be possible for one SID tool to check the correctness of a SID =
file.</div><div>Currently there is not even a datestamp=C2=A0or a checksum =
or any of the metadata</div><div>(passed to pyang as parameters) saved in t=
he SID file.</div><div><br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><div dir=3D"auto"><div dir=3D"auto">It&#39;s just that I get the fe=
eling we are trying to do version control here and if this is the case I wo=
uld really prefer we stick to git and some best practices.</div></div></blo=
ckquote><div><br></div><div><br></div><div>There is an assumption that SID =
files are like YANG modules, but they are not.</div><div>A SID file expands=
 the YANG module and therefore relies on all the imports.</div><div>If a YA=
NG module uses groupings (about 90% of them?) then it is quite possible</di=
v><div>for the SID file to change even if the YANG module it is for did not=
 change.</div><div><br></div><div>I am much more concerned about operationa=
l robustness than the ability</div><div>for a WG writing a bis-draft to sav=
e a few extra bytes in the CBOR encoding.</div><div><br></div><div><br></di=
v><div><br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"=
margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-lef=
t:1ex"><div dir=3D"auto"><div dir=3D"auto"><br></div><div dir=3D"auto">Chee=
rs,=C2=A0</div><div dir=3D"auto">Alexander=C2=A0</div><div dir=3D"auto"><br=
></div><br></div></blockquote><div><br></div><div>Andy</div><div>=C2=A0</di=
v><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"auto"><br><=
div class=3D"gmail_quote" dir=3D"auto"><div dir=3D"ltr" class=3D"gmail_attr=
">Le lun. 28 mars 2022, 23:54, Andy Bierman &lt;<a href=3D"mailto:andy@yuma=
works.com" rel=3D"noreferrer" target=3D"_blank">andy@yumaworks.com</a>&gt; =
a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex"><div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quo=
te"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022 at 2:04 PM A=
lexander Pelov &lt;<a href=3D"mailto:a@ackl.io" rel=3D"noreferrer noreferre=
r" target=3D"_blank">a@ackl.io</a>&gt; wrote:<br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex"><div dir=3D"ltr"><div>Hi again,</div><div><br=
></div><div>Thanks for the clarifications!</div><div><br></div><div class=
=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 28, 2022=
 at 4:34 PM Carsten Bormann &lt;<a href=3D"mailto:cabo@tzi.org" rel=3D"nore=
ferrer noreferrer" target=3D"_blank">cabo@tzi.org</a>&gt; wrote:<br></div><=
blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-l=
eft:1px solid rgb(204,204,204);padding-left:1ex">On 2022-03-28, at 16:30, A=
lexander Pelov &lt;<a href=3D"mailto:a@ackl.io" rel=3D"noreferrer noreferre=
r" target=3D"_blank">a@ackl.io</a>&gt; wrote:<br>
&gt; <br>
&gt; From what I understand, the problem we are trying to solve is (and I a=
m paraphrasing to see if we are on the same page) to try to limit and have =
one SID per YANG name. Something like a &#39;canonical SID&#39; (which woul=
d make for a bijective correspondence &quot;YANG name&quot; &lt;-&gt; &quot=
;canonical SID&quot;, for YANG modules that have SID allocations).<br>
<br>
Indeed.=C2=A0</blockquote><div><br></div><div><div>It seems to me that the =
&quot;canonical SID&quot; property is nice to have (but not a must have, be=
cause it cannot be really guaranteed).</div><div><br></div><div>The SID fil=
es winding up somewhere are the real pain here -&gt; which is actually simp=
ler to solve if you consider that the definitive allocation is an atomic op=
eration.=C2=A0</div><div><br></div><div>Say, you have RFC123456.yang, with =
allocation of SIDs described in RFC123456.SID.</div><div>Now, you have draf=
t-RFC123456bis.yang=C2=A0-&gt; until this one becomes an RFC, the correspon=
ding SID file can be considered in its entirety as provisional allocation /=
 temporary / draft / unstable.=C2=A0</div><div><br></div><div>In that sense=
, the stable/unstable (or other term for the same meaning) works on the fil=
e level and is in direct connection to the YANG file.</div></div><div>=C2=
=A0</div><div><br></div></div></div></blockquote><div><br></div><div>Agreed=
</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
&gt; Is there something else we are trying to solve with the &quot;stable/u=
nstable&quot; solution?=C2=A0</blockquote><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">
<br>
The main observation is that these SID files may get wings and may turn up =
in places where they were not meant to be.=C2=A0 Being able to identify tha=
t some of the SID allocations in a SID file are still unstable may help in =
avoiding these SIDs turning up in production.<br></blockquote><div><br></di=
v><div><br></div><div><div>During development, to know which SIDs you can r=
egenerate freely and which you CANNOT because they have been allocated in a=
 &quot;parent&quot; module, you only need the full history of the YANG / SI=
D allocation. This you need in any case to do the check, and the per-range =
stable/unstable option can be seen as a way to ease the life of a tool deve=
loper, but cannot be used to actually be trusted.</div><div><br></div><div>=
The example is the following:</div><div>The developers of draft-RFC123456bi=
s.yang have access to both RFC123456.yang=C2=A0and=C2=A0RFC123456.SID. When=
 you allocate SIDs for draft-RFC123456bis.yang, it is a very straightforwar=
d=C2=A0operation=C2=A0to make the diff between what&#39;s already in RFC123=
456.SID and what needs to be allocated and in what manner. As a matter of f=
act, &quot;pyang sid&quot; already does this!</div></div><div><br></div><di=
v><br></div><div>Does that make sense? Can we simply have a per-SID-file &q=
uot;draft&quot; property?=C2=A0</div></div></div></blockquote><div><br></di=
v><div>Almost.</div><div><br></div><div>It would be set if the SID file als=
o records the &quot;last-sid-file&quot; revision somehow.</div><div>The pya=
ng tool requires this for the --sid-update-file parameter.</div><div><br></=
div><div>A WG does not need to renumber RFC123456bis every time a new bis d=
raft is released.</div><div>The RFC123456 SIDs MUST be preserved in each bi=
s release, but none of the new &quot;draft&quot; SIDs need to be preserved.=
</div><div><br></div><div>If the SID file recorded the previous version som=
ehow then ANY SID generation</div><div>tool can create the correct file, bu=
t without it, not even pyang can do it.</div><div><br></div><div>E.g.</div>=
<div><br></div><div>RFC123456 published=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A02021-01-01=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draf=
t=3Dfalse</div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-=
01-01=C2=A0 (-00)=C2=A0 =C2=A0 draft=3Dtrue</div><div>RFC123456bis publishe=
d=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-02-01=C2=A0 (-01)=C2=A0 =C2=A0 draft=3Dtr=
ue<br></div><div>RFC123456bis published=C2=A0 =C2=A0 =C2=A0 =C2=A0 2022-03-=
01=C2=A0 (-02)=C2=A0 =C2=A0 draft=3Dtrue<br></div><div><br></div><div>The b=
is -00 MUST use RFC123456 as the --sid-update-file.</div><div>But -01 and -=
02 bis releases can choose to be a delta from any previous I-D or=C2=A0</di=
v><div>start over with a delta from the RFC version.</div><div><br></div><d=
iv>If a per-SID flag is used, the ability to go back to a previous SID file=
 revision as the base is lost.</div><div>Once the SID is marked stable in a=
 new SID file, the tool does not know if it was marked</div><div>stable in =
the RFC or later, so it can never change it back to unstable.</div><div><br=
></div><div>The ability for any tool to verify that a proper delta was gene=
rated is needed and currently</div><div>does not exist. The [last-sid-file,=
 current-YANG-file] are needed for this purpose.</div><div><br></div><div><=
br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><=
div dir=3D"ltr"><div class=3D"gmail_quote"><div><br></div><div>Cheers,</div=
><div>Alexander</div></div></div></blockquote><div><br></div><div><br></div=
><div>Andy</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
</blockquote></div></div>
_______________________________________________<br>
core mailing list<br>
<a href=3D"mailto:core@ietf.org" rel=3D"noreferrer noreferrer" target=3D"_b=
lank">core@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/core" rel=3D"noreferrer no=
referrer noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinf=
o/core</a><br>
</blockquote></div></div>
</blockquote></div></div>
</blockquote></div></div>
</blockquote></div></div></div>
</blockquote></div></div>

--000000000000666cbf05db62ddc2--


From nobody Wed Mar 30 00:45:20 2022
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5AB823A0E7E for <core@ietfa.amsl.com>; Wed, 30 Mar 2022 00:45:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.11
X-Spam-Level: 
X-Spam-Status: No, score=-7.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AEZdrGc_mVWO for <core@ietfa.amsl.com>; Wed, 30 Mar 2022 00:45:12 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2060d.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::60d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A8BB3A0E64 for <core@ietf.org>; Wed, 30 Mar 2022 00:45:11 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VNn8k/nR3pn3gY8lGl9w97p5N3CSYlrBXwpcYyAvYJCMf4I1lXm65YpvdfpnEtoEot5TqcBFtiXlblCzHWOpjkoFpNmLKy541/T6C7CVgPWA9m4xvMh4kGhC/hNWY7CnRcwO43GOCybVCcrpspd+ow7WSk4e/2rAxXFULjTCwnOs6tav8Kf9QurtIVh7BU/d1q7+SY/mBcC4U98sGD8Sxbd3CgD7zFB5Uk9p31kHTk+gD8INu8ZtU8A9d4JrYHb/iF1gxbMeADyRZ/bzH6ZdAetRIE/udVsgsMX11SGtiKzwZf18mmgHq7rtuS5TQf5ngTuu+6bMuB5C49vieKlMoQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rcJdPIF6Efq7bZ/tLQ6H1nzoJthtB3fffBKUr6f+8kQ=; b=QWPMibxuVZ0XW/P4SpiW3e6YzbY4lVi4wBfHzS3dQktj1/zc71B1xB7sBXIopZyg4Gl0jyskdfvIY2/KyxdG6+5tsw+KsXr3TrAhOTQnplzuwgEDLnjSqojW+c79bws2upnEXUo5YrmibI8rfVOsLYe1f7zX5PEGSFBmtdOygiwat7mLYPjRE8dBqqV9d2vaknlQqX/m54Ea1s85DV8ITCQ3B9vmKr88IlzGPykrAfljUkVJexx59vNF2RkBgpsP1zaUaKuN4CugvLhpVbnMNZIINFqI/HHyDq9ERG0ppbGodVF/SI4/FVBWtn7n+IiMOQDfxK9hi+tcilwttzYtZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rcJdPIF6Efq7bZ/tLQ6H1nzoJthtB3fffBKUr6f+8kQ=; b=hgESixbnWrVS4SxZa8M3AVfFMV7Ext3mkmw0rnK66W6CEFOyhS0bAJ3ZtiqSl5K3UzoRhhmGlIC0tPrOplmtnwgeUtG7Q0mHW9BUZXGMevfKPF5tYq9j+v/US42ly3QWkzpEMZMdhwtmXPrIyn16Qgef2SABuei+HuCSX+Lecfg=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by AM7P189MB0852.EURP189.PROD.OUTLOOK.COM (2603:10a6:20b:17c::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Wed, 30 Mar 2022 07:45:05 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d%7]) with mapi id 15.20.5102.023; Wed, 30 Mar 2022 07:45:05 +0000
Message-ID: <926428a6-3f19-eb5f-a1ee-662d12ca20a8@ri.se>
Date: Wed, 30 Mar 2022 09:45:03 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------KAFHpnE5GMFzIRx7upD0fgCE"
X-ClientProxiedBy: GV3P280CA0010.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:b::11) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4cd8f315-4143-4866-94c2-08da12213496
X-MS-TrafficTypeDiagnostic: AM7P189MB0852:EE_
X-Microsoft-Antispam-PRVS: <AM7P189MB085257CBF168422BC9A64BC8991F9@AM7P189MB0852.EURP189.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(6916009)(2616005)(316002)(26005)(33964004)(186003)(6512007)(6486002)(508600001)(36756003)(966005)(66476007)(83380400001)(31686004)(8676002)(21480400003)(66946007)(66556008)(6506007)(2906002)(31696002)(38100700002)(235185007)(86362001)(8936002)(5660300002)(44832011)(45980500001)(43740500002); DIR:OUT; SFP:1101; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VDFFa0dMekZtOVVjSjBkRkVwREkvNXVzL2dlYTNTc3U0azY1aFREdG02cmFs?= =?utf-8?B?M3BoSVJ4dnZseEhvVm9lL3BYbkZMOTdDK3owRTB3RjNjOWlGZGdYb3E2QzQ1?= =?utf-8?B?Qml6OVRyQzdrOFQ0dVZNdktVVDllYnJvT0xkaHFGQyswY0lLZTRQMDhXaGVr?= =?utf-8?B?K3BLYW5tdERXT2EwZkhUUk8vWk1BNFVXVmE0K2E0ckRSMW4yVXVOVGMyRGZr?= =?utf-8?B?dVdtUTVWQ3prM2wybFA3NVlxYmJRM3dibmVSK0dQUko3WWtBaklHTkJGL0xW?= =?utf-8?B?WWN2VmdwQXVTOWVxcno1UmRXWlN3a3FEdnR2RllMck5nL081OVlOc1FCQm9R?= =?utf-8?B?YUJNeE1aZjdwc2hvNVgwRlVBK2dHT1kvclpzQVYwVEZOdlpzNHVITzUzTmlU?= =?utf-8?B?ck42b1B3UXp0ZS9kVnByaUVPT0lnWXJTRmw4cTVaNy9jRDJCNkJ2MTU2ZDdW?= =?utf-8?B?ZC9HQ21HNStxNkIzaTNSbmFiYTFQSGFmVjhyOHRqNGRwcmlSb0ZFQjdJRGRD?= =?utf-8?B?eGk1NjNWLzluMEhTS1ZXWUIrckYyQWJjQ1QwTW5zS3JkMU93cjhLWkFmU0JB?= =?utf-8?B?U1gwaURHVzhZb0pST1cva1dUQ3dpTE1CRU9JbjFCOUNVQldHRk1STVdMU2RC?= =?utf-8?B?MElCMm5iNmZGcG1iRnY1czVJQ1dtNFExNHcxYjIvd3BJZStQanBzS0kyUUE0?= =?utf-8?B?SWIvRkE2R3ZIU2xONTR4ZmZudDAreWxjd3NVWnJsM2UrMjRiRVBNTmNXcjl6?= =?utf-8?B?S2NHN0Q2VG9kUnBMb2svd0dieXNwTDVUYThNZFZwRnBQWGN4R0RkblJ6c21a?= =?utf-8?B?dDVROGlnNloxbEJqNUV4RmhJV1lDZDdXbEpBNnBpd0Vod21mWllyRWszS2FF?= =?utf-8?B?a2ZGTTh2ZDNZUktnU21TNFF4U01JZVo0eFFaU3NXKzlRTUdsb3B4bG5pR2x3?= =?utf-8?B?Mlg5aDhXMUgxcUdiNVI0dC9qbkJCTFhpaGdNdzRFazJzMExheituS2tHaXZY?= =?utf-8?B?czdHVjRCUlhWd3ZxVGpFbFJlVXN6NDU5M3psdmVMeXRwU290T3FUa2VBWExJ?= =?utf-8?B?MUFZUElscGNjZzkzWVVUTHZncXRVTCttV2YvbkhsTjVFRVhxTE5aVnhwYTVl?= =?utf-8?B?cUt1Mmd0bzB6elROYkdBejJ3SXQvcmhML21XZ1hSSTU0V1ZHR3F2N2o3VFVN?= =?utf-8?B?RWxHZmllaVIyaUhBNElVSTljVFNOZmhSbHNGazlHZG11aDZCa1RIQTlQOXN4?= =?utf-8?B?bzdod01SVGd1NnRtbG13UmVmWG92TVFLZTA2YzZPVC92ZW1ZcE9IelRxMnlt?= =?utf-8?B?SnlWaTNTL2FiZktOci9VTG9KQjNaZGdJNXd1RG0rc1dRcWE2WFhKNXFaK3Uy?= =?utf-8?B?cGdzblVlc01nM3NQS0NuKzRpWU83V3BTVncvTk0wTHJFZUowUy96c2diRTNk?= =?utf-8?B?OGpQN1B2TytjL3VSbFBjamlmVmlHY0hVVDJudjA3eGszMUpZUTFadU5lVllz?= =?utf-8?B?YjlZMW9wRGhqYnoxSDBMV2FQK0tybGxRM2NCWldWU3JzVlFSM0Jadklsd0p0?= =?utf-8?B?LzRJY241UVQ3VW5rSHMwa01DUTJMSlpSUGN0ejd4dUpwR0tEV2xXdjJRdHFu?= =?utf-8?B?UU9HNkNQM200Uk1pZWJDcG96ZlJHd242WEVKYkYxejdiSmRVZkxkOXBQV0JT?= =?utf-8?B?bEdwN0VzNTFMUWlsbU94KzR6WUpkWGJhdlgxbnh6NnU2dDFWOVh6TnhBUVd1?= =?utf-8?B?dk5GT0RQazlWZ3VyNDdZTU56YjRteVNwWndkbTBxMGJRS05rT0x5R0VLSTFR?= =?utf-8?B?Zkx1YVpZci9TZjI3TmgvU2pZK3luOUJaVkIzdCtYMXBjQW5SNWU1cXFnZU9p?= =?utf-8?B?eTVHelpWVjMwaUNDUlZacnVRaC9RTCtHTnNZeHNZN3JXaElsRFZjWHN5VEVV?= =?utf-8?B?ckJJemVmNnM0aUd1OUk4RjVFenhNV01wTGVKclRiRWVIOHdUcU1YeHYxMXpW?= =?utf-8?B?T3BwSXNCWFVnbUQxUi9lUjRYUVRaNnFuRUdnc2NFZEphSUNWaHhuUm1iSldP?= =?utf-8?B?WTBJeWxoZS9mUW9DOHE2ZTFuaXdrS1RxR2JEcklzS3NMVU8zRjBGYW4wd0k4?= =?utf-8?B?ZTUwK1pjNTlOcXlhR09RV25wU25vbDhRWFhxb1ZPUEhHRHpPcS94N2tsMnJh?= =?utf-8?B?TG1tbjNLYWVlZm9FcHlwa05Xbm5HdFJoQ0xVYzdVRkxpYzlaV3RWdnNTMndK?= =?utf-8?B?R1ZuQ0NvdXJvb1hEQUNtcitGM080M0IyTFVGWityM014OEhwQmNONm1sTEYz?= =?utf-8?B?ZmRjSjA4UHZMWGF6Tkw0WmcvUnh1MCt0Skpjb1BFZ1FpY3ZPY2kwQT09?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 4cd8f315-4143-4866-94c2-08da12213496
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 07:45:05.4675 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ax7hUy5ObuPo8WW8EYyyK65vGW6KgSXRhqaVD6diQOfPRFKRJkyMIbYNvxlH3cF8KRAP9/CfGpACQhWvmWCoGQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7P189MB0852
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/c573ErIp9rgzjz-IvL252L1R0Vk>
Subject: [core] CoRE @ IETF 113 - Minutes
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 07:45:18 -0000

--------------KAFHpnE5GMFzIRx7upD0fgCE
Content-Type: multipart/mixed; boundary="------------0IqeaCyPzU6uvfzNm77U4Roy";
 protected-headers="v1"
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Message-ID: <926428a6-3f19-eb5f-a1ee-662d12ca20a8@ri.se>
Subject: [core] CoRE @ IETF 113 - Minutes

--------------0IqeaCyPzU6uvfzNm77U4Roy
Content-Type: multipart/mixed; boundary="------------zXU0qSJUyASEg4ebLeGEtIlc"

--------------zXU0qSJUyASEg4ebLeGEtIlc
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------zXU0qSJUyASEg4ebLeGEtIlc
Content-Type: application/pgp-keys; name="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Disposition: attachment; filename="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DAOQG
-----END PGP PUBLIC KEY BLOCK-----

--------------zXU0qSJUyASEg4ebLeGEtIlc--

--------------0IqeaCyPzU6uvfzNm77U4Roy--

--------------KAFHpnE5GMFzIRx7upD0fgCE
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOEo4cV326Z7GypVg7iZktA5Y2kMFAmJECn8FAwAAAAAACgkQ7iZktA5Y2kNg
Xgf/bBKV2lnVuPdqHvCArPDR5MwfU5gIyw8rXSNJ+xUAkmC5rpL5zIdXOpnlLM4ELnVCWrB7xYyg
GSWWaIc7VSwcaNLJ5ROF8Dt4nXAB5dgD+7+4B+ZEKH/gMBVMFsK7hYlMc6QZEZuE377mDtM2Nb7a
qsB5P8ClIDeZFEEuhtGn/4dfUm0/XVCrblsoyZFsqApzWc6D1y8My45kVLYQiEVNsgM4qu71nQrZ
BuANYv0jMHqcNO1mgdhqiToRro+t8QvcGbYr9OORBOfgaVi4gRvw/47IhQ7yMG0yShqTbqp4M9Kh
kmWtCQ21/fZk9oSBj8DJgZEAoKLR8h6aMmTKGRaMww==
=VXM8
-----END PGP SIGNATURE-----

--------------KAFHpnE5GMFzIRx7upD0fgCE--


From nobody Wed Mar 30 00:57:49 2022
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97A963A1068 for <core@ietfa.amsl.com>; Wed, 30 Mar 2022 00:57:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level: 
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RcmfW247_aFh for <core@ietfa.amsl.com>; Wed, 30 Mar 2022 00:57:42 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20609.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1b::609]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48D3A3A1053 for <core@ietf.org>; Wed, 30 Mar 2022 00:57:41 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y0AyV1fehfKX45vgKgezHH8ZoZk0VOO6nEZLeW6HzccswKg/Tec579IXjJmhTWtEuMP5o/QO32xOQEuptGAwmMaQ7XPZZE3I642gbLBaWaBr8q2jjzYbwvzdKXotYqri6Kl7Ne0Fd27pCx+CRuX0hZ6Gtc3ADyP3LYjjv1RkiDLXTue6/yZqClE5jAlMdwBrBA5KFUK1geSF49f+0w7RSy23uMoMDuar6GgQUuhlMKdUCb1FpG0j397c0eyBBwxLdk2nU+/dFYaojjtO5kqSysUvJS5IsfBDnH+j0SmgZkAgEoEezUKQvz5SsgEIdQqA7bmwwGIxxukJ5ApWkF5IlA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/MTVxZlirYLxDerk9AjShLgmUw1stmV9VLBkm0ZJjD0=; b=YmQXA2ZvOscLUsY4Eh1j56pxnT8ogNOzF5/JomIU0zPpCTtg0XdzDhur7U8ztgSyanSPkt0N7hc2vikJQIE1Hi1uKS7Z9giE1+brN8ca3XLJC7qaFMz9uxmPRIdV/erFTdWCjUdbMmoh40qgfIEw6SPYdYtnzcQn+oZ8Z9ngZtNnap+7Up3S8u6fhIbCFe1+uGb8ZBIRcNsE5qd5skItdy2WkRrbnCTEax1zQ/F2G0vkd8626gYrbyg8GOtjH1EXjUKLKbB/aYai2YCh+uxxgIOmt8gKBmN7ZXdb9R90tjIP8xEAqSsp8+LhPQErFy8I6jISEWYdk8MeWMnXrMX3ZQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/MTVxZlirYLxDerk9AjShLgmUw1stmV9VLBkm0ZJjD0=; b=H3Sz+hYURqbGAPAeOlsTn+4fmvXuwGREq+yc+bCNopSmXqs1zaxIcDpQIIHzftfReVK66V0cB53A3xq8dogeLjqE/WrXdrD9KtvEFuAHN7B0EVFyNpwZcKY6zeqcO8TMzvxD02EiI3xGAgG4/8zy0kcLywwt9knTK5mFj/JvjCw=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by AS8P189MB1766.EURP189.PROD.OUTLOOK.COM (2603:10a6:20b:396::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Wed, 30 Mar 2022 07:57:37 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::7406:4429:8288:c4d%7]) with mapi id 15.20.5102.023; Wed, 30 Mar 2022 07:57:37 +0000
Message-ID: <ed490ea1-9998-fdef-a92c-1707106e22cc@ri.se>
Date: Wed, 30 Mar 2022 09:57:35 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
From: Marco Tiloca <marco.tiloca@ri.se>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------cqWtKh1CZKpE1UqRFSwziWjt"
X-ClientProxiedBy: GV3P280CA0029.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:b::20) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 393c18fd-f72e-412a-9c83-08da1222f4c6
X-MS-TrafficTypeDiagnostic: AS8P189MB1766:EE_
X-Microsoft-Antispam-PRVS: <AS8P189MB17667445E3AADC39CF9EAA9D991F9@AS8P189MB1766.EURP189.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: uZmPS7HrKd6PqDjLajrBTQf8J+qd29em6lxUqPK2mmW242rNx1yGafW9IqWp9yiVlNm3o/b0cHlxr1sHdrsC0p52l48U7GuEhReUhUkn9KFahrsCpKgmPNyZStdkwmrh3iIoSywAlM4041tdcR3lGNage4ZuA82P8KnwahRCbeqo1iH1wSrodeeTCnY9Rf/bLOYXhhg+ThN06m8xtHoDANfx4LHtUjJd7pPZAZT3igr+xjtg2gwYZdSel6N7+CoEWxT4coV9WM83PMYlTfpwUqtrbSEmWiR2/ls9S+eMYEJDwO9iBh1Peq48lcqZUAtLjb36T5H+bEDPjg0zCdKAq5eXANUA8CmHlQEsKqhjqVtVJnr6OI2xphHOmtiKmjhm66g36Il8hxkqAqau+fg5EZ4CMRdtx/A7CTgiiyQQ+S10B9J2DzG0ete4Tz99OK502Zsm3qPVRFzzwIQULtNdf3XAyv1LSHl16WR72/oodpF0VCaJgrg8JsFXzbWA+1bnwdy8CFW+U+WzWD6KfFUPlcBXg3c4XCsj3bxxjFRPj2ZqEKtsHoDuLeHTwH7IXgOYVBxbIHdhXipvB1AWnOC2OFyqbe96b5Rczr5EJzPGIJ2lCXAifLer98EnlTw4JhWK+1Gc/X9t38HwGpiFpg5ojFAo7rP7rhAbJLrKLfgGFY/fVOLh13e4F0P0QwxU6T+BpcpV3V789ADZ/5mfkJPkQv2JlotB9LwXR6koGMybbRDAa0L+3d/Zgu8DOZtw+s4x5U70KcGIwCeSjyO1U1fyWdc2njE02QhvDtBLGH5FfamfhIm1ATndp9OgGu42OFZz
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(31686004)(31696002)(86362001)(5660300002)(36756003)(508600001)(6512007)(38100700002)(8676002)(186003)(316002)(83380400001)(2906002)(66946007)(966005)(8936002)(44832011)(6486002)(6916009)(21480400003)(26005)(235185007)(2616005)(66556008)(33964004)(6506007)(66574015)(66476007)(45980500001)(43740500002); DIR:OUT; SFP:1101; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?djBobXRMaHZsSUxSNi84ZmcybnNkNytFYWh3eElHaFlGQ2xTa3R4TXVXN055?= =?utf-8?B?TGthSkxyRm9OaFBmUGRuUHErVThZczU5eDJQRlk4YTBROEFFQlZQTFRuSHFN?= =?utf-8?B?VG96aFhabXJHSmlSWTZGbis2TnZlMTkrQXU1eGQ1cG9wU2JQTnl0M2p6M3Nu?= =?utf-8?B?SW1lRVcrTWJzQUx6Tk5DMjFqWStkNlZYdUwyTjJxd0J4WE02VWZDT2FmZGNY?= =?utf-8?B?OFdnbHFkYXMzYVB6dUdPaWNpN1Z1clJaWmtaVGRhTXlyd3B3Si9kSndrazU0?= =?utf-8?B?c0d0aEJxaElYZVVNc3E3dWIxM0ZUUmt2QWpMTVZvS0xDRFBHa1F4SjNsOWJE?= =?utf-8?B?aGJuU0ZoTkJRTEJhaDc2Rk5XNWo3M0RPNEFjaHV6bnRoWW51TjhXUUphVlFT?= =?utf-8?B?NERPTjlzNFRvWXdIUHRGZ01JWUE5clBiK251VGd2TjNuRU1mcmgvRlBIZjBO?= =?utf-8?B?SHV1cXJVMjlFN2dHblBuOFd4VVEzUHpKWk94dHdLaXJOVS9ycnoyV3ZjY3lF?= =?utf-8?B?Sm9mZjJMR2xVWDVZNk1FeGxMWFFrT01WWllxNDZtK2Z3cGVpNTRhRlJoeWtX?= =?utf-8?B?SGpmZmlWL0NPQ2Nxd25kRjFYNjk5eFNyRTZ4d0VoS2liNFBlTFlwT0U4cDkw?= =?utf-8?B?NHRCQlUzYzN1VnlPQmdBMHMwTUtUOEVsQjQ5aFFPWURONy91cW9Da3UwMHdX?= =?utf-8?B?N281WU1OVVRDWFVDTFU0YWFVaElFNTNFY0U0UVZoYzhJNjNDSFR1TTlXUnJh?= =?utf-8?B?elQvSnNYaWFHUXFmQSs4dkpyblMzQ1RQRmViaTdqS0tuMCtNaU5xMDVhZUsv?= =?utf-8?B?Z1RYVGpmRlJSNjVSY2JHem5YSElzM3c1M2JjaUVLNUR5aU5QRXhqQjk1ZHRk?= =?utf-8?B?Nkl6RDlQZDBZUFQ0d3ZoQ3FnT2VJUTU0eUtJTlpObEcwaE9VSWl0Y2d3QU5U?= =?utf-8?B?K0xGb2NNTnlHaDBMdEdjVWpxeHllaEQzbHdMbDU4SFpvSGIzb1E2cUF4SWhG?= =?utf-8?B?SFhlSnFZRC9ld1JjREJ2eUFpU3BkWlFVQVV5TzRHdjJWbFk2WEc3UVhXOFps?= =?utf-8?B?Y1Y0YlJQRmFodXZBdVNVZGx5Z2pVVmxBVFNGejhkazE3UUpmVjgvSEFKUnhF?= =?utf-8?B?R3p3dmJoSU5QcDdRVGZqbGMrenlGMHNjMjV6SWpWTXIwTTdFT1RoeGJkRnR5?= =?utf-8?B?N2ZwbkJQeEJzaFRvU3FFN1grMm9OcU5ZZVM5VzJzTWIvM3hPTXZFYUFaZStr?= =?utf-8?B?ME10bHJKb3doTWFtaDRmWXV5WWZWVSthZzF6U1dJMkJhYUh2NXp1SWRSRk5J?= =?utf-8?B?a1dqRkE0TVNRMVFYdmZEekdQNFhjQ1Y2SUhxb2JFUVQydkI0MnM5eTlmcWsx?= =?utf-8?B?RFpDVmFqVy9hbnVoTHBtdXkzS1F4ZTBvbXRnKytTU1NvS0tRbWZUQmt1Yloy?= =?utf-8?B?Q29BWHRpK1dESmg1S3ltcGlSU29FWkZIMlZWWXBrSlFMd3Yxbzd4Y21jZ3pi?= =?utf-8?B?bDNvZWZ0TkRBdGVFWW9Famx6RUdaa2REREJYeW5jdFRrWWNMRUI3anZXVlNv?= =?utf-8?B?UVMrS3hRbFZiTFlxc0dKZEdOTS9iS0d0WWdJZnd0T1NsZEtNUm12cm5raGxT?= =?utf-8?B?SlQ2K0hOaVpYWGVuT29OS3l1eW1BcVlvM2lVcnc0WDNrdTJHYkh0aGFxeHVZ?= =?utf-8?B?eXBIVmF4RmQ0ZldCclNxcE9CVTdvMGJjblVPYnlHTG5wNjZxSVR4cHJ2MXhW?= =?utf-8?B?aU5Qck1OdWt2Q3pRWVdVRE5JYlczeGx3WnM4aS80QWJvUUIwcHZmRXRxNisy?= =?utf-8?B?NnJvamFGMmxyNDVIcnhQWjZuejE0NFB2MHBhTTB1cGtGZkZHbENqM21sM2JO?= =?utf-8?B?ZGcwZTVPRUJFVXJ1TXpxcTdZN1JHRnduNmFZdkt2eTlsVnJpbkpna0lQSUt4?= =?utf-8?B?amlOMmFFSFlZaVZqc0RSeG42N0FaNXpuQVBybHBkdUEyV2tWaXMvZkdpN3FD?= =?utf-8?B?U3VaaFBQYWwyL2tOMlIxalcyWEZlZk1qcU1sQUZJdy95WE9jVVJJODlzbTU2?= =?utf-8?B?K2hqREIwb2JVR3ZXcThEUXZQNndOYWNGSUkwWDJVWmhvL2U4S2FtbjJCaEth?= =?utf-8?B?Um9nTC9mb1Q3Q1AxOGoxcWVtVWVaT3A4aWdWcHdBZGR4dXdWZFZkWHIvQ1ZY?= =?utf-8?B?NVh3YmVsSnhDODNZbFFzOG0yMWtwQTJpUDFKZW9GKzZucHZ0M1NPclRJai91?= =?utf-8?B?Y0d4ZkIrY25EbU5QZG1PQ2Z4dnFWdFpCemRxQTErR2JFcGZKaEFjRWZZem1H?= =?utf-8?B?a0s4VVBTZTZHMzRhRkcvQXFlQjNVcm5GSXpJeXJsVWM1bElnRmxUdz09?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 393c18fd-f72e-412a-9c83-08da1222f4c6
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 07:57:37.3080 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: InvnOyc65/IIYM7HOluC8d1VYLdDWbzIVf+hulNJWPYLXof3brFZxosfCOO3lBwKaD24aWlQjWunGCUZ3qn4mg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8P189MB1766
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/YdORt27oiV_JXoJfK0t9UQjewE8>
Subject: [core] Confirming the adoption of draft-amsuess-core-transport-indication-03 as a CoRE WG document
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 07:57:48 -0000

--------------cqWtKh1CZKpE1UqRFSwziWjt
Content-Type: multipart/mixed; boundary="------------bNpJ0UJQDgh27qlcMG3buR5H";
 protected-headers="v1"
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Message-ID: <ed490ea1-9998-fdef-a92c-1707106e22cc@ri.se>
Subject: [core] Confirming the adoption of
 draft-amsuess-core-transport-indication-03 as a CoRE WG document

--------------bNpJ0UJQDgh27qlcMG3buR5H
Content-Type: multipart/mixed; boundary="------------VCOVXOHm4P5Stj5etNRQWigT"

--------------VCOVXOHm4P5Stj5etNRQWigT
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------VCOVXOHm4P5Stj5etNRQWigT
Content-Type: application/pgp-keys; name="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Disposition: attachment; filename="OpenPGP_0xEE2664B40E58DA43.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DAOQG
-----END PGP PUBLIC KEY BLOCK-----

--------------VCOVXOHm4P5Stj5etNRQWigT--

--------------bNpJ0UJQDgh27qlcMG3buR5H--

--------------cqWtKh1CZKpE1UqRFSwziWjt
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOEo4cV326Z7GypVg7iZktA5Y2kMFAmJEDW8FAwAAAAAACgkQ7iZktA5Y2kMx
FQf/Wa0vP04yyhMZiCnoUUXS7erfZ9x++eH6m8YT7nn/T3ITsNUgvDZWyWegBR+DUBYU0lISU1Q8
HB5oPt3s/7KScboFlteYhqE3fJ+S2ZSG1NtBh0KhVsekugYDDdN1tju92Ta1gVZ305SFNABO2NQg
cLe3GF4DZ+PxsTcsNptyF1n2TEuC50qs3TC9O/3KlBLKtYWW70hZiAr8f+WCJ1MrMGucr70DkgIQ
cVdFySqVkawlIgMQBPG06AKJrD1IRU3/vGtwXieoC23lCZxYotcqZeE0CE8DCEjcSAp+a3rVFcIV
XF97EJ71uYBADPQOYvCtZsSG/9H9/eUAEmRiu6TRjg==
=waNd
-----END PGP SIGNATURE-----

--------------cqWtKh1CZKpE1UqRFSwziWjt--


From nobody Wed Mar 30 01:00:47 2022
Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CA83E3A10A4; Wed, 30 Mar 2022 01:00:44 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
To: <core-chairs@ietf.org>, <core@ietf.org>, <draft-amsuess-core-transport-indication@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164862724478.26451.12169127734559884078@ietfa.amsl.com>
Date: Wed, 30 Mar 2022 01:00:44 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/X8RUmfTYRYiWI987EaF5ES83yXQ>
Subject: [core] The CORE WG has placed draft-amsuess-core-transport-indication in state "Call For Adoption By WG Issued"
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 08:00:45 -0000

The CORE WG has placed draft-amsuess-core-transport-indication in state
Call For Adoption By WG Issued (entered by Marco Tiloca)

The document is available at
https://datatracker.ietf.org/doc/draft-amsuess-core-transport-indication/



From nobody Wed Mar 30 09:44:36 2022
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A34B3A14E9 for <core@ietfa.amsl.com>; Wed, 30 Mar 2022 09:44:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level: 
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sandelman.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C9lmICimPfql for <core@ietfa.amsl.com>; Wed, 30 Mar 2022 09:44:28 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37CC33A14E5 for <core@ietf.org>; Wed, 30 Mar 2022 09:44:27 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 6DED638C7A; Wed, 30 Mar 2022 12:55:10 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id Nckh2QRwzjtr; Wed, 30 Mar 2022 12:55:06 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id AB2D038C51; Wed, 30 Mar 2022 12:55:06 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sandelman.ca; s=mail; t=1648659306; bh=PFoGHyqWBbktaZn/nLOr3/fbDLi77u6t2znUeBvwogM=; h=From:To:cc:Subject:In-Reply-To:References:Date:From; b=fp6lL49U5uRT7uMD08oiqi0zwgrf3wfzmQSgSV9deX7BWZWC7JrpAs3XmbuXokcKm kfcwVsdNTrpxy66KJLsSpF4/VfzGZE2uC2Qi19BMfNqkOqhQi1WMQFmF2yp/ZoPaNq vo48yQW0v/N8ihi5hfH12pCgAigi9XmzZjsKhSmvT0V0jaFSqM8Ro3EQGp2jpkDqNA Zc11byxtIS+p4F2MqvNibezJBGa8QtY4jcVNZ5ExmxUgfn0wD2z2Mj392ngPIATOc3 rIh2LxGTZDJFQWQYIthiZDm/VoG4VaFmTiEie8G7eEhUafoPX9RPu8Y9AhsZJ7YCM6 YvEDnCGSz9chA==
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id D33DF468; Wed, 30 Mar 2022 12:44:20 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Alexander Pelov <a@ackl.io>
cc: Andy Bierman <andy@yumaworks.com>, "core\@ietf.org WG \(core\@ietf.org\)" <core@ietf.org>
In-Reply-To: <CACQW0ErYrAKh_p6tDpLMoFGrX4f00ZR3k_nAEaSp-R+NHM3LDg@mail.gmail.com>
References: <32267.1648146701@dooku> <CACQW0Eqz3=+Fe50L+H=gSMG=CNRPn+u3L9z70cC4E651Z25ihw@mail.gmail.com> <B64B68AA-153D-4B67-998D-3E4CBEBA2C31@tzi.org> <CACQW0EpdpFPynrxdt0frr-AAQStGqe4PpSDcj1nVYfh6siS=NA@mail.gmail.com> <4E8666FA-6F9E-48BF-9BF4-05B8EEC177D7@tzi.org> <CACQW0Eq5QV7dBwVh=xxY=VStWstmQSXPNymyK2QSu=rORfqEtw@mail.gmail.com> <CABCOCHRN+su0GrTqvhjxYgrf-sKRRvnF8w7qJYaH4T9zzXeqNQ@mail.gmail.com> <CACQW0Eq50UXSZ4oypX3mMKUL7iABENBqOjRVRarRO_T3aUqTCw@mail.gmail.com> <CABCOCHQnqN9UpHdC44Grc15hdu66Obm_zbXAj0+UEHLSvDW1qQ@mail.gmail.com> <CACQW0ErYrAKh_p6tDpLMoFGrX4f00ZR3k_nAEaSp-R+NHM3LDg@mail.gmail.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Wed, 30 Mar 2022 12:44:20 -0400
Message-ID: <13031.1648658660@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/xg3aSa25lCvbXewidEOeUuGXOK0>
Subject: Re: [core] SID file --- status entry for allocation
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 16:44:34 -0000

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Alexander Pelov <a@ackl.io> wrote:
    > From what I understood until now, the stable/unstable tag is helpful =
only
    > to the authors that work on draft-123456bis-02 so that they can gener=
ate
    > new SIDs keeping the previously temporary allocated for
    > draft-123456bis-01.

Correct.

    > Once the document becomes and RFC the whole stable/unstable difference
    > becomes useless. Also, it is meaningless to anyone other than the aut=
hors
    > of the YANG file, between versions.

Correct.

If someone feeds the SID file into a code generator, then we want the result
to be clearly marked as unstable... do not ship to customers, etc.


=2D-
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=C3=B8T consulti=
ng )
           Sandelman Software Works Inc, Ottawa and Worldwide





--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAmJEiOQACgkQgItw+93Q
3WVWZAf9HEthbJycnBcoJkg1DGj9UQ0YDmTtd3WPxcvyftb+2pMdXQtTJR1TzPqi
ueTU67gk54DVfmQk4pvuKdqeyQXWfEznRj6qD/WA76omJR16SO8ZrJQQ6IzrOFFt
hN/KaijhFqJT0Xn6TD3skDfy2YMWCahV5IuIs7BmDKY97ygq40wrNgGUe5gOD8Ta
lTfhqoe85dmWnSVEAdmNTIz21GrUaLGdnnbMU23kamw5d2VtJflm4gcVsEQzYvgi
RGq4MKoHTrkdWNVbjEeeuQGO38ZwUEK9uzYV7BkOii70Oc9BVTGOvMT6Wg52Mh1y
XLnnkfqKiL41tHHQAq2RYWK2hLbP8Q==
=VFxZ
-----END PGP SIGNATURE-----
--=-=-=--

